0s autopkgtest [20:16:28]: starting date and time: 2026-02-06 20:16:28+0000 0s autopkgtest [20:16:28]: git checkout: 4b346b80 nova: make wait_reboot return success even when a no-op 0s autopkgtest [20:16:28]: host juju-7f2275-prod-proposed-migration-environment-15; command line: /home/ubuntu/autopkgtest/runner/autopkgtest --output-dir /tmp/autopkgtest-work.7iuw7b8p/out --timeout-copy=6000 --needs-internet=try --setup-commands /home/ubuntu/autopkgtest-cloud/worker-config-production/setup-canonical.sh --apt-pocket=proposed=src:glibc --apt-upgrade libreswan --timeout-short=300 --timeout-copy=20000 --timeout-build=20000 --env=ADT_TEST_TRIGGERS=glibc/2.42-2ubuntu5 -- ssh -s /home/ubuntu/autopkgtest/ssh-setup/nova -- --flavor autopkgtest-cpu2-ram4-disk20-amd64 --security-groups autopkgtest-juju-7f2275-prod-proposed-migration-environment-15@sto01-37.secgroup --name adt-resolute-amd64-libreswan-20260206-201628-juju-7f2275-prod-proposed-migration-environment-15-af9b9ff4-a3fc-47f9-975b-fe1125d0cefc --image adt/ubuntu-resolute-amd64-server --keyname testbed-juju-7f2275-prod-proposed-migration-environment-15 --net-id=net_prod-autopkgtest-workers-amd64 -e TERM=linux --mirror=http://ftpmaster.internal/ubuntu/ 3s Creating nova instance adt-resolute-amd64-libreswan-20260206-201628-juju-7f2275-prod-proposed-migration-environment-15-af9b9ff4-a3fc-47f9-975b-fe1125d0cefc from image adt/ubuntu-resolute-amd64-server-20260204.img (UUID fedf54b4-458b-493e-8072-6425c19717b4)... 86s autopkgtest [20:17:54]: testbed dpkg architecture: amd64 86s autopkgtest [20:17:54]: testbed apt version: 3.1.14 87s autopkgtest [20:17:55]: @@@@@@@@@@@@@@@@@@@@ test bed setup 88s autopkgtest [20:17:56]: testbed release detected to be: None 90s autopkgtest [20:17:58]: updating testbed package index (apt update) 90s Get:1 http://ftpmaster.internal/ubuntu resolute-proposed InRelease [124 kB] 90s Hit:2 http://ftpmaster.internal/ubuntu resolute InRelease 90s Hit:3 http://ftpmaster.internal/ubuntu resolute-updates InRelease 91s Hit:4 http://ftpmaster.internal/ubuntu resolute-security InRelease 91s Get:5 http://ftpmaster.internal/ubuntu resolute-proposed/main Sources [199 kB] 91s Get:6 http://ftpmaster.internal/ubuntu resolute-proposed/multiverse Sources [32.1 kB] 91s Get:7 http://ftpmaster.internal/ubuntu resolute-proposed/restricted Sources [10.7 kB] 91s Get:8 http://ftpmaster.internal/ubuntu resolute-proposed/universe Sources [1528 kB] 91s Get:9 http://ftpmaster.internal/ubuntu resolute-proposed/main i386 Packages [188 kB] 91s Get:10 http://ftpmaster.internal/ubuntu resolute-proposed/main amd64 Packages [265 kB] 91s Get:11 http://ftpmaster.internal/ubuntu resolute-proposed/main amd64 c-n-f Metadata [6500 B] 91s Get:12 http://ftpmaster.internal/ubuntu resolute-proposed/restricted i386 Packages [3692 B] 91s Get:13 http://ftpmaster.internal/ubuntu resolute-proposed/restricted amd64 Packages [80.4 kB] 91s Get:14 http://ftpmaster.internal/ubuntu resolute-proposed/restricted amd64 c-n-f Metadata [336 B] 91s Get:15 http://ftpmaster.internal/ubuntu resolute-proposed/universe amd64 Packages [1432 kB] 91s Get:16 http://ftpmaster.internal/ubuntu resolute-proposed/universe i386 Packages [550 kB] 91s Get:17 http://ftpmaster.internal/ubuntu resolute-proposed/universe amd64 c-n-f Metadata [36.8 kB] 91s Get:18 http://ftpmaster.internal/ubuntu resolute-proposed/multiverse amd64 Packages [28.2 kB] 91s Get:19 http://ftpmaster.internal/ubuntu resolute-proposed/multiverse i386 Packages [4892 B] 91s Get:20 http://ftpmaster.internal/ubuntu resolute-proposed/multiverse amd64 c-n-f Metadata [1104 B] 92s Fetched 4492 kB in 1s (4222 kB/s) 93s Reading package lists... 95s Hit:1 http://ftpmaster.internal/ubuntu resolute-proposed InRelease 95s Hit:2 http://ftpmaster.internal/ubuntu resolute InRelease 95s Hit:3 http://ftpmaster.internal/ubuntu resolute-updates InRelease 95s Hit:4 http://ftpmaster.internal/ubuntu resolute-security InRelease 95s Reading package lists... 95s Reading package lists... 95s Building dependency tree... 95s Reading state information... 96s Calculating upgrade... 96s The following packages will be upgraded: 96s amd64-microcode apt busybox-initramfs busybox-static dmsetup findutils less 96s libapt-pkg7.0 libattr1 libc-bin libc-gconv-modules-extra libc6 96s libdevmapper1.02.1 libdrm-amdgpu1 libdrm-common libdrm2 libgpm2 libkeyutils1 96s libmaxminddb0 libnpth0t64 libsensors-config libsensors5 locales mawk patch 96s pollinate python3-linkify-it python3-markdown-it python3-referencing sed tar 96s 31 upgraded, 0 newly installed, 0 to remove and 0 not upgraded. 96s Need to get 14.4 MB of archives. 96s After this operation, 270 kB disk space will be freed. 96s Get:1 http://ftpmaster.internal/ubuntu resolute/main amd64 findutils amd64 4.10.0-3build2 [307 kB] 96s Get:2 http://ftpmaster.internal/ubuntu resolute/main amd64 sed amd64 4.9-2build3 [195 kB] 96s Get:3 http://ftpmaster.internal/ubuntu resolute/main amd64 tar amd64 1.35+dfsg-3.1build2 [257 kB] 96s Get:4 http://ftpmaster.internal/ubuntu resolute-proposed/main amd64 libc-gconv-modules-extra amd64 2.42-2ubuntu5 [1394 kB] 96s Get:5 http://ftpmaster.internal/ubuntu resolute-proposed/main amd64 libc6 amd64 2.42-2ubuntu5 [2041 kB] 96s Get:6 http://ftpmaster.internal/ubuntu resolute-proposed/main amd64 libc-bin amd64 2.42-2ubuntu5 [702 kB] 96s Get:7 http://ftpmaster.internal/ubuntu resolute/main amd64 libattr1 amd64 1:2.5.2-3build2 [11.4 kB] 96s Get:8 http://ftpmaster.internal/ubuntu resolute/main amd64 mawk amd64 1.3.4.20260129-1 [133 kB] 96s Get:9 http://ftpmaster.internal/ubuntu resolute/main amd64 libapt-pkg7.0 amd64 3.1.15 [1151 kB] 96s Get:10 http://ftpmaster.internal/ubuntu resolute/main amd64 apt amd64 3.1.15 [1479 kB] 96s Get:11 http://ftpmaster.internal/ubuntu resolute/main amd64 libdevmapper1.02.1 amd64 2:1.02.205-2ubuntu3 [142 kB] 96s Get:12 http://ftpmaster.internal/ubuntu resolute/main amd64 dmsetup amd64 2:1.02.205-2ubuntu3 [79.4 kB] 96s Get:13 http://ftpmaster.internal/ubuntu resolute/main amd64 less amd64 668-1build1 [172 kB] 96s Get:14 http://ftpmaster.internal/ubuntu resolute/main amd64 libkeyutils1 amd64 1.6.3-6ubuntu3 [10.6 kB] 96s Get:15 http://ftpmaster.internal/ubuntu resolute-proposed/main amd64 locales all 2.42-2ubuntu5 [4255 kB] 96s Get:16 http://ftpmaster.internal/ubuntu resolute/main amd64 python3-linkify-it all 2.0.3-1ubuntu3 [19.4 kB] 96s Get:17 http://ftpmaster.internal/ubuntu resolute/main amd64 python3-markdown-it all 3.0.0-3build1 [54.4 kB] 96s Get:18 http://ftpmaster.internal/ubuntu resolute/main amd64 busybox-static amd64 1:1.37.0-7ubuntu1 [1034 kB] 96s Get:19 http://ftpmaster.internal/ubuntu resolute/main amd64 libdrm-common all 2.4.131-1 [9774 B] 96s Get:20 http://ftpmaster.internal/ubuntu resolute/main amd64 libdrm2 amd64 2.4.131-1 [42.3 kB] 96s Get:21 http://ftpmaster.internal/ubuntu resolute/main amd64 libgpm2 amd64 1.20.7-12build1 [14.4 kB] 96s Get:22 http://ftpmaster.internal/ubuntu resolute/main amd64 libmaxminddb0 amd64 1.12.2-1build2 [18.9 kB] 96s Get:23 http://ftpmaster.internal/ubuntu resolute/main amd64 libsensors-config all 1:3.6.2-2build1 [6862 B] 96s Get:24 http://ftpmaster.internal/ubuntu resolute/main amd64 libsensors5 amd64 1:3.6.2-2build1 [28.9 kB] 96s Get:25 http://ftpmaster.internal/ubuntu resolute/main amd64 busybox-initramfs amd64 1:1.37.0-7ubuntu1 [191 kB] 96s Get:26 http://ftpmaster.internal/ubuntu resolute/main amd64 libdrm-amdgpu1 amd64 2.4.131-1 [23.2 kB] 96s Get:27 http://ftpmaster.internal/ubuntu resolute/main amd64 libnpth0t64 amd64 1.8-3build1 [9302 B] 96s Get:28 http://ftpmaster.internal/ubuntu resolute/main amd64 patch amd64 2.8-2build1 [95.7 kB] 96s Get:29 http://ftpmaster.internal/ubuntu resolute/main amd64 pollinate all 4.33-4ubuntu5 [14.0 kB] 96s Get:30 http://ftpmaster.internal/ubuntu resolute/main amd64 python3-referencing all 0.36.2-1ubuntu2 [22.2 kB] 96s Get:31 http://ftpmaster.internal/ubuntu resolute/main amd64 amd64-microcode amd64 3.20251202.1ubuntu1 [459 kB] 96s dpkg-preconfigure: unable to re-open stdin: No such file or directory 96s Fetched 14.4 MB in 1s (25.9 MB/s) 97s (Reading database ... (Reading database ... 5% (Reading database ... 10% (Reading database ... 15% (Reading database ... 20% (Reading database ... 25% (Reading database ... 30% (Reading database ... 35% (Reading database ... 40% (Reading database ... 45% (Reading database ... 50% (Reading database ... 55% (Reading database ... 60% (Reading database ... 65% (Reading database ... 70% (Reading database ... 75% (Reading database ... 80% (Reading database ... 85% (Reading database ... 90% (Reading database ... 95% (Reading database ... 100% (Reading database ... 83957 files and directories currently installed.) 97s Preparing to unpack .../findutils_4.10.0-3build2_amd64.deb ... 97s Unpacking findutils (4.10.0-3build2) over (4.10.0-3build1) ... 97s Setting up findutils (4.10.0-3build2) ... 97s (Reading database ... (Reading database ... 5% (Reading database ... 10% (Reading database ... 15% (Reading database ... 20% (Reading database ... 25% (Reading database ... 30% (Reading database ... 35% (Reading database ... 40% (Reading database ... 45% (Reading database ... 50% (Reading database ... 55% (Reading database ... 60% (Reading database ... 65% (Reading database ... 70% (Reading database ... 75% (Reading database ... 80% (Reading database ... 85% (Reading database ... 90% (Reading database ... 95% (Reading database ... 100% (Reading database ... 83957 files and directories currently installed.) 97s Preparing to unpack .../sed_4.9-2build3_amd64.deb ... 97s Unpacking sed (4.9-2build3) over (4.9-2build2) ... 97s Setting up sed (4.9-2build3) ... 97s (Reading database ... (Reading database ... 5% (Reading database ... 10% (Reading database ... 15% (Reading database ... 20% (Reading database ... 25% (Reading database ... 30% (Reading database ... 35% (Reading database ... 40% (Reading database ... 45% (Reading database ... 50% (Reading database ... 55% (Reading database ... 60% (Reading database ... 65% (Reading database ... 70% (Reading database ... 75% (Reading database ... 80% (Reading database ... 85% (Reading database ... 90% (Reading database ... 95% (Reading database ... 100% (Reading database ... 83957 files and directories currently installed.) 97s Preparing to unpack .../tar_1.35+dfsg-3.1build2_amd64.deb ... 97s Unpacking tar (1.35+dfsg-3.1build2) over (1.35+dfsg-3.1build1) ... 97s Setting up tar (1.35+dfsg-3.1build2) ... 97s (Reading database ... (Reading database ... 5% (Reading database ... 10% (Reading database ... 15% (Reading database ... 20% (Reading database ... 25% (Reading database ... 30% (Reading database ... 35% (Reading database ... 40% (Reading database ... 45% (Reading database ... 50% (Reading database ... 55% (Reading database ... 60% (Reading database ... 65% (Reading database ... 70% (Reading database ... 75% (Reading database ... 80% (Reading database ... 85% (Reading database ... 90% (Reading database ... 95% (Reading database ... 100% (Reading database ... 83957 files and directories currently installed.) 97s Preparing to unpack .../libc-gconv-modules-extra_2.42-2ubuntu5_amd64.deb ... 97s Unpacking libc-gconv-modules-extra:amd64 (2.42-2ubuntu5) over (2.42-2ubuntu4) ... 97s Setting up libc-gconv-modules-extra:amd64 (2.42-2ubuntu5) ... 97s (Reading database ... (Reading database ... 5% (Reading database ... 10% (Reading database ... 15% (Reading database ... 20% (Reading database ... 25% (Reading database ... 30% (Reading database ... 35% (Reading database ... 40% (Reading database ... 45% (Reading database ... 50% (Reading database ... 55% (Reading database ... 60% (Reading database ... 65% (Reading database ... 70% (Reading database ... 75% (Reading database ... 80% (Reading database ... 85% (Reading database ... 90% (Reading database ... 95% (Reading database ... 100% (Reading database ... 83957 files and directories currently installed.) 97s Preparing to unpack .../libc6_2.42-2ubuntu5_amd64.deb ... 97s Unpacking libc6:amd64 (2.42-2ubuntu5) over (2.42-2ubuntu4) ... 97s Setting up libc6:amd64 (2.42-2ubuntu5) ... 97s (Reading database ... (Reading database ... 5% (Reading database ... 10% (Reading database ... 15% (Reading database ... 20% (Reading database ... 25% (Reading database ... 30% (Reading database ... 35% (Reading database ... 40% (Reading database ... 45% (Reading database ... 50% (Reading database ... 55% (Reading database ... 60% (Reading database ... 65% (Reading database ... 70% (Reading database ... 75% (Reading database ... 80% (Reading database ... 85% (Reading database ... 90% (Reading database ... 95% (Reading database ... 100% (Reading database ... 83957 files and directories currently installed.) 97s Preparing to unpack .../libc-bin_2.42-2ubuntu5_amd64.deb ... 97s Unpacking libc-bin (2.42-2ubuntu5) over (2.42-2ubuntu4) ... 97s Setting up libc-bin (2.42-2ubuntu5) ... 98s (Reading database ... (Reading database ... 5% (Reading database ... 10% (Reading database ... 15% (Reading database ... 20% (Reading database ... 25% (Reading database ... 30% (Reading database ... 35% (Reading database ... 40% (Reading database ... 45% (Reading database ... 50% (Reading database ... 55% (Reading database ... 60% (Reading database ... 65% (Reading database ... 70% (Reading database ... 75% (Reading database ... 80% (Reading database ... 85% (Reading database ... 90% (Reading database ... 95% (Reading database ... 100% (Reading database ... 83957 files and directories currently installed.) 98s Preparing to unpack .../libattr1_1%3a2.5.2-3build2_amd64.deb ... 98s Unpacking libattr1:amd64 (1:2.5.2-3build2) over (1:2.5.2-3build1) ... 98s Setting up libattr1:amd64 (1:2.5.2-3build2) ... 98s (Reading database ... (Reading database ... 5% (Reading database ... 10% (Reading database ... 15% (Reading database ... 20% (Reading database ... 25% (Reading database ... 30% (Reading database ... 35% (Reading database ... 40% (Reading database ... 45% (Reading database ... 50% (Reading database ... 55% (Reading database ... 60% (Reading database ... 65% (Reading database ... 70% (Reading database ... 75% (Reading database ... 80% (Reading database ... 85% (Reading database ... 90% (Reading database ... 95% (Reading database ... 100% (Reading database ... 83957 files and directories currently installed.) 98s Preparing to unpack .../00-mawk_1.3.4.20260129-1_amd64.deb ... 98s Unpacking mawk (1.3.4.20260129-1) over (1.3.4.20250131-2) ... 98s Preparing to unpack .../01-libapt-pkg7.0_3.1.15_amd64.deb ... 98s Unpacking libapt-pkg7.0:amd64 (3.1.15) over (3.1.14) ... 98s Preparing to unpack .../02-apt_3.1.15_amd64.deb ... 98s Unpacking apt (3.1.15) over (3.1.14) ... 98s Preparing to unpack .../03-libdevmapper1.02.1_2%3a1.02.205-2ubuntu3_amd64.deb ... 98s Unpacking libdevmapper1.02.1:amd64 (2:1.02.205-2ubuntu3) over (2:1.02.205-2ubuntu2) ... 98s Preparing to unpack .../04-dmsetup_2%3a1.02.205-2ubuntu3_amd64.deb ... 98s Unpacking dmsetup (2:1.02.205-2ubuntu3) over (2:1.02.205-2ubuntu2) ... 98s Preparing to unpack .../05-less_668-1build1_amd64.deb ... 98s Unpacking less (668-1build1) over (668-1) ... 98s Preparing to unpack .../06-libkeyutils1_1.6.3-6ubuntu3_amd64.deb ... 98s Unpacking libkeyutils1:amd64 (1.6.3-6ubuntu3) over (1.6.3-6ubuntu2) ... 98s Preparing to unpack .../07-locales_2.42-2ubuntu5_all.deb ... 98s Unpacking locales (2.42-2ubuntu5) over (2.42-2ubuntu4) ... 98s Preparing to unpack .../08-python3-linkify-it_2.0.3-1ubuntu3_all.deb ... 98s Unpacking python3-linkify-it (2.0.3-1ubuntu3) over (2.0.3-1ubuntu2) ... 98s Preparing to unpack .../09-python3-markdown-it_3.0.0-3build1_all.deb ... 98s Unpacking python3-markdown-it (3.0.0-3build1) over (3.0.0-3) ... 98s Preparing to unpack .../10-busybox-static_1%3a1.37.0-7ubuntu1_amd64.deb ... 98s Unpacking busybox-static (1:1.37.0-7ubuntu1) over (1:1.37.0-4ubuntu1) ... 98s Preparing to unpack .../11-libdrm-common_2.4.131-1_all.deb ... 98s Unpacking libdrm-common (2.4.131-1) over (2.4.129-1) ... 98s Preparing to unpack .../12-libdrm2_2.4.131-1_amd64.deb ... 98s Unpacking libdrm2:amd64 (2.4.131-1) over (2.4.129-1) ... 98s Preparing to unpack .../13-libgpm2_1.20.7-12build1_amd64.deb ... 98s Unpacking libgpm2:amd64 (1.20.7-12build1) over (1.20.7-12) ... 98s Preparing to unpack .../14-libmaxminddb0_1.12.2-1build2_amd64.deb ... 98s Unpacking libmaxminddb0:amd64 (1.12.2-1build2) over (1.12.2-1build1) ... 98s Preparing to unpack .../15-libsensors-config_1%3a3.6.2-2build1_all.deb ... 98s Unpacking libsensors-config (1:3.6.2-2build1) over (1:3.6.2-2) ... 99s Preparing to unpack .../16-libsensors5_1%3a3.6.2-2build1_amd64.deb ... 99s Unpacking libsensors5:amd64 (1:3.6.2-2build1) over (1:3.6.2-2) ... 99s Preparing to unpack .../17-busybox-initramfs_1%3a1.37.0-7ubuntu1_amd64.deb ... 99s Unpacking busybox-initramfs (1:1.37.0-7ubuntu1) over (1:1.37.0-4ubuntu1) ... 99s Preparing to unpack .../18-libdrm-amdgpu1_2.4.131-1_amd64.deb ... 99s Unpacking libdrm-amdgpu1:amd64 (2.4.131-1) over (2.4.129-1) ... 99s Preparing to unpack .../19-libnpth0t64_1.8-3build1_amd64.deb ... 99s Unpacking libnpth0t64:amd64 (1.8-3build1) over (1.8-3) ... 99s Preparing to unpack .../20-patch_2.8-2build1_amd64.deb ... 99s Unpacking patch (2.8-2build1) over (2.8-2) ... 99s Preparing to unpack .../21-pollinate_4.33-4ubuntu5_all.deb ... 99s Unpacking pollinate (4.33-4ubuntu5) over (4.33-4ubuntu4) ... 99s Preparing to unpack .../22-python3-referencing_0.36.2-1ubuntu2_all.deb ... 99s Unpacking python3-referencing (0.36.2-1ubuntu2) over (0.36.2-1ubuntu1) ... 99s Preparing to unpack .../23-amd64-microcode_3.20251202.1ubuntu1_amd64.deb ... 99s Unpacking amd64-microcode (3.20251202.1ubuntu1) over (3.20250708.1ubuntu1) ... 99s Setting up libnpth0t64:amd64 (1.8-3build1) ... 99s Setting up libkeyutils1:amd64 (1.6.3-6ubuntu3) ... 99s Setting up libgpm2:amd64 (1.20.7-12build1) ... 99s Setting up libmaxminddb0:amd64 (1.12.2-1build2) ... 99s Setting up libsensors-config (1:3.6.2-2build1) ... 99s Setting up less (668-1build1) ... 99s Setting up amd64-microcode (3.20251202.1ubuntu1) ... 99s amd64-microcode: microcode will be updated at next boot 99s Setting up locales (2.42-2ubuntu5) ... 99s Generating locales (this might take a while)... 100s en_US.UTF-8... done 100s Generation complete. 100s Setting up pollinate (4.33-4ubuntu5) ... 111s Setting up busybox-static (1:1.37.0-7ubuntu1) ... 111s Setting up patch (2.8-2build1) ... 111s Setting up libsensors5:amd64 (1:3.6.2-2build1) ... 111s Setting up busybox-initramfs (1:1.37.0-7ubuntu1) ... 111s Setting up libdevmapper1.02.1:amd64 (2:1.02.205-2ubuntu3) ... 111s Setting up dmsetup (2:1.02.205-2ubuntu3) ... 111s Setting up python3-linkify-it (2.0.3-1ubuntu3) ... 111s Setting up mawk (1.3.4.20260129-1) ... 111s Setting up libapt-pkg7.0:amd64 (3.1.15) ... 111s Setting up libdrm-common (2.4.131-1) ... 111s Setting up python3-referencing (0.36.2-1ubuntu2) ... 111s Setting up apt (3.1.15) ... 111s Setting up python3-markdown-it (3.0.0-3build1) ... 111s Setting up libdrm2:amd64 (2.4.131-1) ... 111s Setting up libdrm-amdgpu1:amd64 (2.4.131-1) ... 111s Processing triggers for libc-bin (2.42-2ubuntu5) ... 111s Processing triggers for systemd (259-1ubuntu3) ... 112s Processing triggers for man-db (2.13.1-1) ... 113s Processing triggers for install-info (7.2-5) ... 113s Processing triggers for initramfs-tools (0.150ubuntu7) ... 113s update-initramfs: Generating /boot/initrd.img-6.18.0-9-generic 118s autopkgtest [20:18:26]: upgrading testbed (apt dist-upgrade and autopurge) 119s Reading package lists... 119s Building dependency tree... 119s Reading state information... 119s Calculating upgrade... 119s 0 upgraded, 0 newly installed, 0 to remove and 0 not upgraded. 120s Reading package lists... 120s Building dependency tree... 120s Reading state information... 120s Solving dependencies... 120s 0 upgraded, 0 newly installed, 0 to remove and 0 not upgraded. 121s autopkgtest [20:18:29]: rebooting testbed after setup commands that affected boot 152s autopkgtest [20:19:00]: testbed running kernel: Linux 6.18.0-9-generic #9-Ubuntu SMP PREEMPT_DYNAMIC Mon Jan 12 16:49:02 UTC 2026 154s autopkgtest [20:19:02]: @@@@@@@@@@@@@@@@@@@@ apt-source libreswan 155s Get:1 http://ftpmaster.internal/ubuntu resolute/universe libreswan 5.2-2.2ubuntu1 (dsc) [2735 B] 155s Get:2 http://ftpmaster.internal/ubuntu resolute/universe libreswan 5.2-2.2ubuntu1 (tar) [4132 kB] 155s Get:3 http://ftpmaster.internal/ubuntu resolute/universe libreswan 5.2-2.2ubuntu1 (asc) [862 B] 155s Get:4 http://ftpmaster.internal/ubuntu resolute/universe libreswan 5.2-2.2ubuntu1 (diff) [16.7 kB] 155s gpgv: Signature made Thu Jul 31 14:30:12 2025 UTC 155s gpgv: using RSA key 25E3FF2D7F469DBE7D0D4E50AFCFEC8E669CE1C2 155s gpgv: Can't check signature: No public key 155s dpkg-source: warning: cannot verify inline signature for ./libreswan_5.2-2.2ubuntu1.dsc: no acceptable signature found 156s autopkgtest [20:19:04]: testing package libreswan version 5.2-2.2ubuntu1 156s autopkgtest [20:19:04]: build not needed 158s autopkgtest [20:19:06]: test opportunistic: preparing testbed 158s Reading package lists... 158s Building dependency tree... 158s Reading state information... 158s Solving dependencies... 158s The following NEW packages will be installed: 158s dns-root-data libevent-2.1-7t64 libevent-pthreads-2.1-7t64 libldns3t64 158s libnss3-tools libreswan libunbound8 158s 0 upgraded, 7 newly installed, 0 to remove and 0 not upgraded. 158s Need to get 2953 kB of archives. 158s After this operation, 11.9 MB of additional disk space will be used. 158s Get:1 http://ftpmaster.internal/ubuntu resolute/main amd64 dns-root-data all 2025080400build1 [6022 B] 159s Get:2 http://ftpmaster.internal/ubuntu resolute/main amd64 libnss3-tools amd64 2:3.120-1 [626 kB] 159s Get:3 http://ftpmaster.internal/ubuntu resolute/main amd64 libevent-pthreads-2.1-7t64 amd64 2.1.12-stable-10build1 [8360 B] 159s Get:4 http://ftpmaster.internal/ubuntu resolute/universe amd64 libldns3t64 amd64 1.8.4-2build1 [173 kB] 159s Get:5 http://ftpmaster.internal/ubuntu resolute/main amd64 libevent-2.1-7t64 amd64 2.1.12-stable-10build1 [155 kB] 159s Get:6 http://ftpmaster.internal/ubuntu resolute/main amd64 libunbound8 amd64 1.24.2-1ubuntu1 [462 kB] 159s Get:7 http://ftpmaster.internal/ubuntu resolute/universe amd64 libreswan amd64 5.2-2.2ubuntu1 [1523 kB] 159s Fetched 2953 kB in 0s (16.6 MB/s) 159s Selecting previously unselected package dns-root-data. 159s (Reading database ... (Reading database ... 5% (Reading database ... 10% (Reading database ... 15% (Reading database ... 20% (Reading database ... 25% (Reading database ... 30% (Reading database ... 35% (Reading database ... 40% (Reading database ... 45% (Reading database ... 50% (Reading database ... 55% (Reading database ... 60% (Reading database ... 65% (Reading database ... 70% (Reading database ... 75% (Reading database ... 80% (Reading database ... 85% (Reading database ... 90% (Reading database ... 95% (Reading database ... 100% (Reading database ... 83962 files and directories currently installed.) 159s Preparing to unpack .../0-dns-root-data_2025080400build1_all.deb ... 159s Unpacking dns-root-data (2025080400build1) ... 159s Selecting previously unselected package libnss3-tools. 159s Preparing to unpack .../1-libnss3-tools_2%3a3.120-1_amd64.deb ... 159s Unpacking libnss3-tools (2:3.120-1) ... 159s Selecting previously unselected package libevent-pthreads-2.1-7t64:amd64. 159s Preparing to unpack .../2-libevent-pthreads-2.1-7t64_2.1.12-stable-10build1_amd64.deb ... 159s Unpacking libevent-pthreads-2.1-7t64:amd64 (2.1.12-stable-10build1) ... 159s Selecting previously unselected package libldns3t64:amd64. 159s Preparing to unpack .../3-libldns3t64_1.8.4-2build1_amd64.deb ... 159s Unpacking libldns3t64:amd64 (1.8.4-2build1) ... 159s Selecting previously unselected package libevent-2.1-7t64:amd64. 159s Preparing to unpack .../4-libevent-2.1-7t64_2.1.12-stable-10build1_amd64.deb ... 159s Unpacking libevent-2.1-7t64:amd64 (2.1.12-stable-10build1) ... 159s Selecting previously unselected package libunbound8:amd64. 159s Preparing to unpack .../5-libunbound8_1.24.2-1ubuntu1_amd64.deb ... 159s Unpacking libunbound8:amd64 (1.24.2-1ubuntu1) ... 159s Selecting previously unselected package libreswan. 159s Preparing to unpack .../6-libreswan_5.2-2.2ubuntu1_amd64.deb ... 159s Unpacking libreswan (5.2-2.2ubuntu1) ... 159s Setting up libldns3t64:amd64 (1.8.4-2build1) ... 159s Setting up libevent-pthreads-2.1-7t64:amd64 (2.1.12-stable-10build1) ... 159s Setting up libevent-2.1-7t64:amd64 (2.1.12-stable-10build1) ... 159s Setting up dns-root-data (2025080400build1) ... 159s Setting up libunbound8:amd64 (1.24.2-1ubuntu1) ... 159s Setting up libnss3-tools (2:3.120-1) ... 159s Setting up libreswan (5.2-2.2ubuntu1) ... 159s ipsec.service is a disabled or a static unit, not starting it. 159s Processing triggers for man-db (2.13.1-1) ... 160s Processing triggers for libc-bin (2.42-2ubuntu5) ... 162s autopkgtest [20:19:10]: test opportunistic: [----------------------- 162s ping: oe.libreswan.org: No address associated with hostname 162s autopkgtest [20:19:10]: test opportunistic: -----------------------] 163s autopkgtest [20:19:11]: test opportunistic: - - - - - - - - - - results - - - - - - - - - - 163s opportunistic SKIP exit status 77 and marked as skippable 163s autopkgtest [20:19:11]: test cryptocheck: preparing testbed 182s Creating nova instance adt-resolute-amd64-libreswan-20260206-201628-juju-7f2275-prod-proposed-migration-environment-15-af9b9ff4-a3fc-47f9-975b-fe1125d0cefc from image adt/ubuntu-resolute-amd64-server-20260204.img (UUID fedf54b4-458b-493e-8072-6425c19717b4)... 260s autopkgtest [20:20:48]: testbed dpkg architecture: amd64 260s autopkgtest [20:20:48]: testbed apt version: 3.1.14 261s autopkgtest [20:20:49]: @@@@@@@@@@@@@@@@@@@@ test bed setup 261s autopkgtest [20:20:49]: testbed release detected to be: resolute 261s autopkgtest [20:20:49]: updating testbed package index (apt update) 262s Get:1 http://ftpmaster.internal/ubuntu resolute-proposed InRelease [124 kB] 262s Hit:2 http://ftpmaster.internal/ubuntu resolute InRelease 262s Hit:3 http://ftpmaster.internal/ubuntu resolute-updates InRelease 262s Hit:4 http://ftpmaster.internal/ubuntu resolute-security InRelease 262s Get:5 http://ftpmaster.internal/ubuntu resolute-proposed/universe Sources [1528 kB] 262s Get:6 http://ftpmaster.internal/ubuntu resolute-proposed/main Sources [199 kB] 262s Get:7 http://ftpmaster.internal/ubuntu resolute-proposed/multiverse Sources [32.1 kB] 262s Get:8 http://ftpmaster.internal/ubuntu resolute-proposed/restricted Sources [10.7 kB] 262s Get:9 http://ftpmaster.internal/ubuntu resolute-proposed/main amd64 Packages [265 kB] 262s Get:10 http://ftpmaster.internal/ubuntu resolute-proposed/main i386 Packages [188 kB] 262s Get:11 http://ftpmaster.internal/ubuntu resolute-proposed/main amd64 c-n-f Metadata [6500 B] 262s Get:12 http://ftpmaster.internal/ubuntu resolute-proposed/restricted i386 Packages [3692 B] 262s Get:13 http://ftpmaster.internal/ubuntu resolute-proposed/restricted amd64 Packages [80.4 kB] 262s Get:14 http://ftpmaster.internal/ubuntu resolute-proposed/restricted amd64 c-n-f Metadata [336 B] 262s Get:15 http://ftpmaster.internal/ubuntu resolute-proposed/universe i386 Packages [550 kB] 262s Get:16 http://ftpmaster.internal/ubuntu resolute-proposed/universe amd64 Packages [1432 kB] 262s Get:17 http://ftpmaster.internal/ubuntu resolute-proposed/universe amd64 c-n-f Metadata [36.8 kB] 262s Get:18 http://ftpmaster.internal/ubuntu resolute-proposed/multiverse i386 Packages [4892 B] 262s Get:19 http://ftpmaster.internal/ubuntu resolute-proposed/multiverse amd64 Packages [28.2 kB] 262s Get:20 http://ftpmaster.internal/ubuntu resolute-proposed/multiverse amd64 c-n-f Metadata [1104 B] 263s Fetched 4492 kB in 1s (5852 kB/s) 263s Reading package lists... 264s Hit:1 http://ftpmaster.internal/ubuntu resolute-proposed InRelease 264s Hit:2 http://ftpmaster.internal/ubuntu resolute InRelease 264s Hit:3 http://ftpmaster.internal/ubuntu resolute-updates InRelease 264s Hit:4 http://ftpmaster.internal/ubuntu resolute-security InRelease 265s Reading package lists... 265s Reading package lists... 265s Building dependency tree... 265s Reading state information... 265s Calculating upgrade... 265s The following packages will be upgraded: 265s amd64-microcode apt busybox-initramfs busybox-static dmsetup findutils less 265s libapt-pkg7.0 libattr1 libc-bin libc-gconv-modules-extra libc6 265s libdevmapper1.02.1 libdrm-amdgpu1 libdrm-common libdrm2 libgpm2 libkeyutils1 265s libmaxminddb0 libnpth0t64 libsensors-config libsensors5 locales mawk patch 265s pollinate python3-linkify-it python3-markdown-it python3-referencing sed tar 265s 31 upgraded, 0 newly installed, 0 to remove and 0 not upgraded. 265s Need to get 14.4 MB of archives. 265s After this operation, 270 kB disk space will be freed. 265s Get:1 http://ftpmaster.internal/ubuntu resolute/main amd64 findutils amd64 4.10.0-3build2 [307 kB] 265s Get:2 http://ftpmaster.internal/ubuntu resolute/main amd64 sed amd64 4.9-2build3 [195 kB] 265s Get:3 http://ftpmaster.internal/ubuntu resolute/main amd64 tar amd64 1.35+dfsg-3.1build2 [257 kB] 265s Get:4 http://ftpmaster.internal/ubuntu resolute-proposed/main amd64 libc-gconv-modules-extra amd64 2.42-2ubuntu5 [1394 kB] 266s Get:5 http://ftpmaster.internal/ubuntu resolute-proposed/main amd64 libc6 amd64 2.42-2ubuntu5 [2041 kB] 266s Get:6 http://ftpmaster.internal/ubuntu resolute-proposed/main amd64 libc-bin amd64 2.42-2ubuntu5 [702 kB] 266s Get:7 http://ftpmaster.internal/ubuntu resolute/main amd64 libattr1 amd64 1:2.5.2-3build2 [11.4 kB] 266s Get:8 http://ftpmaster.internal/ubuntu resolute/main amd64 mawk amd64 1.3.4.20260129-1 [133 kB] 266s Get:9 http://ftpmaster.internal/ubuntu resolute/main amd64 libapt-pkg7.0 amd64 3.1.15 [1151 kB] 267s Get:10 http://ftpmaster.internal/ubuntu resolute/main amd64 apt amd64 3.1.15 [1479 kB] 267s Get:11 http://ftpmaster.internal/ubuntu resolute/main amd64 libdevmapper1.02.1 amd64 2:1.02.205-2ubuntu3 [142 kB] 267s Get:12 http://ftpmaster.internal/ubuntu resolute/main amd64 dmsetup amd64 2:1.02.205-2ubuntu3 [79.4 kB] 267s Get:13 http://ftpmaster.internal/ubuntu resolute/main amd64 less amd64 668-1build1 [172 kB] 267s Get:14 http://ftpmaster.internal/ubuntu resolute/main amd64 libkeyutils1 amd64 1.6.3-6ubuntu3 [10.6 kB] 267s Get:15 http://ftpmaster.internal/ubuntu resolute-proposed/main amd64 locales all 2.42-2ubuntu5 [4255 kB] 267s Get:16 http://ftpmaster.internal/ubuntu resolute/main amd64 python3-linkify-it all 2.0.3-1ubuntu3 [19.4 kB] 267s Get:17 http://ftpmaster.internal/ubuntu resolute/main amd64 python3-markdown-it all 3.0.0-3build1 [54.4 kB] 267s Get:18 http://ftpmaster.internal/ubuntu resolute/main amd64 busybox-static amd64 1:1.37.0-7ubuntu1 [1034 kB] 267s Get:19 http://ftpmaster.internal/ubuntu resolute/main amd64 libdrm-common all 2.4.131-1 [9774 B] 267s Get:20 http://ftpmaster.internal/ubuntu resolute/main amd64 libdrm2 amd64 2.4.131-1 [42.3 kB] 267s Get:21 http://ftpmaster.internal/ubuntu resolute/main amd64 libgpm2 amd64 1.20.7-12build1 [14.4 kB] 267s Get:22 http://ftpmaster.internal/ubuntu resolute/main amd64 libmaxminddb0 amd64 1.12.2-1build2 [18.9 kB] 267s Get:23 http://ftpmaster.internal/ubuntu resolute/main amd64 libsensors-config all 1:3.6.2-2build1 [6862 B] 267s Get:24 http://ftpmaster.internal/ubuntu resolute/main amd64 libsensors5 amd64 1:3.6.2-2build1 [28.9 kB] 267s Get:25 http://ftpmaster.internal/ubuntu resolute/main amd64 busybox-initramfs amd64 1:1.37.0-7ubuntu1 [191 kB] 267s Get:26 http://ftpmaster.internal/ubuntu resolute/main amd64 libdrm-amdgpu1 amd64 2.4.131-1 [23.2 kB] 267s Get:27 http://ftpmaster.internal/ubuntu resolute/main amd64 libnpth0t64 amd64 1.8-3build1 [9302 B] 267s Get:28 http://ftpmaster.internal/ubuntu resolute/main amd64 patch amd64 2.8-2build1 [95.7 kB] 267s Get:29 http://ftpmaster.internal/ubuntu resolute/main amd64 pollinate all 4.33-4ubuntu5 [14.0 kB] 267s Get:30 http://ftpmaster.internal/ubuntu resolute/main amd64 python3-referencing all 0.36.2-1ubuntu2 [22.2 kB] 267s Get:31 http://ftpmaster.internal/ubuntu resolute/main amd64 amd64-microcode amd64 3.20251202.1ubuntu1 [459 kB] 267s dpkg-preconfigure: unable to re-open stdin: No such file or directory 267s Fetched 14.4 MB in 2s (8826 kB/s) 267s (Reading database ... (Reading database ... 5% (Reading database ... 10% (Reading database ... 15% (Reading database ... 20% (Reading database ... 25% (Reading database ... 30% (Reading database ... 35% (Reading database ... 40% (Reading database ... 45% (Reading database ... 50% (Reading database ... 55% (Reading database ... 60% (Reading database ... 65% (Reading database ... 70% (Reading database ... 75% (Reading database ... 80% (Reading database ... 85% (Reading database ... 90% (Reading database ... 95% (Reading database ... 100% (Reading database ... 83957 files and directories currently installed.) 267s Preparing to unpack .../findutils_4.10.0-3build2_amd64.deb ... 267s Unpacking findutils (4.10.0-3build2) over (4.10.0-3build1) ... 267s Setting up findutils (4.10.0-3build2) ... 267s (Reading database ... (Reading database ... 5% (Reading database ... 10% (Reading database ... 15% (Reading database ... 20% (Reading database ... 25% (Reading database ... 30% (Reading database ... 35% (Reading database ... 40% (Reading database ... 45% (Reading database ... 50% (Reading database ... 55% (Reading database ... 60% (Reading database ... 65% (Reading database ... 70% (Reading database ... 75% (Reading database ... 80% (Reading database ... 85% (Reading database ... 90% (Reading database ... 95% (Reading database ... 100% (Reading database ... 83957 files and directories currently installed.) 267s Preparing to unpack .../sed_4.9-2build3_amd64.deb ... 267s Unpacking sed (4.9-2build3) over (4.9-2build2) ... 267s Setting up sed (4.9-2build3) ... 267s (Reading database ... (Reading database ... 5% (Reading database ... 10% (Reading database ... 15% (Reading database ... 20% (Reading database ... 25% (Reading database ... 30% (Reading database ... 35% (Reading database ... 40% (Reading database ... 45% (Reading database ... 50% (Reading database ... 55% (Reading database ... 60% (Reading database ... 65% (Reading database ... 70% (Reading database ... 75% (Reading database ... 80% (Reading database ... 85% (Reading database ... 90% (Reading database ... 95% (Reading database ... 100% (Reading database ... 83957 files and directories currently installed.) 268s Preparing to unpack .../tar_1.35+dfsg-3.1build2_amd64.deb ... 268s Unpacking tar (1.35+dfsg-3.1build2) over (1.35+dfsg-3.1build1) ... 268s Setting up tar (1.35+dfsg-3.1build2) ... 268s (Reading database ... (Reading database ... 5% (Reading database ... 10% (Reading database ... 15% (Reading database ... 20% (Reading database ... 25% (Reading database ... 30% (Reading database ... 35% (Reading database ... 40% (Reading database ... 45% (Reading database ... 50% (Reading database ... 55% (Reading database ... 60% (Reading database ... 65% (Reading database ... 70% (Reading database ... 75% (Reading database ... 80% (Reading database ... 85% (Reading database ... 90% (Reading database ... 95% (Reading database ... 100% (Reading database ... 83957 files and directories currently installed.) 268s Preparing to unpack .../libc-gconv-modules-extra_2.42-2ubuntu5_amd64.deb ... 268s Unpacking libc-gconv-modules-extra:amd64 (2.42-2ubuntu5) over (2.42-2ubuntu4) ... 268s Setting up libc-gconv-modules-extra:amd64 (2.42-2ubuntu5) ... 268s (Reading database ... (Reading database ... 5% (Reading database ... 10% (Reading database ... 15% (Reading database ... 20% (Reading database ... 25% (Reading database ... 30% (Reading database ... 35% (Reading database ... 40% (Reading database ... 45% (Reading database ... 50% (Reading database ... 55% (Reading database ... 60% (Reading database ... 65% (Reading database ... 70% (Reading database ... 75% (Reading database ... 80% (Reading database ... 85% (Reading database ... 90% (Reading database ... 95% (Reading database ... 100% (Reading database ... 83957 files and directories currently installed.) 268s Preparing to unpack .../libc6_2.42-2ubuntu5_amd64.deb ... 268s Unpacking libc6:amd64 (2.42-2ubuntu5) over (2.42-2ubuntu4) ... 268s Setting up libc6:amd64 (2.42-2ubuntu5) ... 268s (Reading database ... (Reading database ... 5% (Reading database ... 10% (Reading database ... 15% (Reading database ... 20% (Reading database ... 25% (Reading database ... 30% (Reading database ... 35% (Reading database ... 40% (Reading database ... 45% (Reading database ... 50% (Reading database ... 55% (Reading database ... 60% (Reading database ... 65% (Reading database ... 70% (Reading database ... 75% (Reading database ... 80% (Reading database ... 85% (Reading database ... 90% (Reading database ... 95% (Reading database ... 100% (Reading database ... 83957 files and directories currently installed.) 268s Preparing to unpack .../libc-bin_2.42-2ubuntu5_amd64.deb ... 268s Unpacking libc-bin (2.42-2ubuntu5) over (2.42-2ubuntu4) ... 268s Setting up libc-bin (2.42-2ubuntu5) ... 268s (Reading database ... (Reading database ... 5% (Reading database ... 10% (Reading database ... 15% (Reading database ... 20% (Reading database ... 25% (Reading database ... 30% (Reading database ... 35% (Reading database ... 40% (Reading database ... 45% (Reading database ... 50% (Reading database ... 55% (Reading database ... 60% (Reading database ... 65% (Reading database ... 70% (Reading database ... 75% (Reading database ... 80% (Reading database ... 85% (Reading database ... 90% (Reading database ... 95% (Reading database ... 100% (Reading database ... 83957 files and directories currently installed.) 268s Preparing to unpack .../libattr1_1%3a2.5.2-3build2_amd64.deb ... 268s Unpacking libattr1:amd64 (1:2.5.2-3build2) over (1:2.5.2-3build1) ... 268s Setting up libattr1:amd64 (1:2.5.2-3build2) ... 268s (Reading database ... (Reading database ... 5% (Reading database ... 10% (Reading database ... 15% (Reading database ... 20% (Reading database ... 25% (Reading database ... 30% (Reading database ... 35% (Reading database ... 40% (Reading database ... 45% (Reading database ... 50% (Reading database ... 55% (Reading database ... 60% (Reading database ... 65% (Reading database ... 70% (Reading database ... 75% (Reading database ... 80% (Reading database ... 85% (Reading database ... 90% (Reading database ... 95% (Reading database ... 100% (Reading database ... 83957 files and directories currently installed.) 268s Preparing to unpack .../00-mawk_1.3.4.20260129-1_amd64.deb ... 268s Unpacking mawk (1.3.4.20260129-1) over (1.3.4.20250131-2) ... 268s Preparing to unpack .../01-libapt-pkg7.0_3.1.15_amd64.deb ... 268s Unpacking libapt-pkg7.0:amd64 (3.1.15) over (3.1.14) ... 268s Preparing to unpack .../02-apt_3.1.15_amd64.deb ... 268s Unpacking apt (3.1.15) over (3.1.14) ... 268s Preparing to unpack .../03-libdevmapper1.02.1_2%3a1.02.205-2ubuntu3_amd64.deb ... 268s Unpacking libdevmapper1.02.1:amd64 (2:1.02.205-2ubuntu3) over (2:1.02.205-2ubuntu2) ... 269s Preparing to unpack .../04-dmsetup_2%3a1.02.205-2ubuntu3_amd64.deb ... 269s Unpacking dmsetup (2:1.02.205-2ubuntu3) over (2:1.02.205-2ubuntu2) ... 269s Preparing to unpack .../05-less_668-1build1_amd64.deb ... 269s Unpacking less (668-1build1) over (668-1) ... 269s Preparing to unpack .../06-libkeyutils1_1.6.3-6ubuntu3_amd64.deb ... 269s Unpacking libkeyutils1:amd64 (1.6.3-6ubuntu3) over (1.6.3-6ubuntu2) ... 269s Preparing to unpack .../07-locales_2.42-2ubuntu5_all.deb ... 269s Unpacking locales (2.42-2ubuntu5) over (2.42-2ubuntu4) ... 269s Preparing to unpack .../08-python3-linkify-it_2.0.3-1ubuntu3_all.deb ... 269s Unpacking python3-linkify-it (2.0.3-1ubuntu3) over (2.0.3-1ubuntu2) ... 269s Preparing to unpack .../09-python3-markdown-it_3.0.0-3build1_all.deb ... 269s Unpacking python3-markdown-it (3.0.0-3build1) over (3.0.0-3) ... 269s Preparing to unpack .../10-busybox-static_1%3a1.37.0-7ubuntu1_amd64.deb ... 269s Unpacking busybox-static (1:1.37.0-7ubuntu1) over (1:1.37.0-4ubuntu1) ... 269s Preparing to unpack .../11-libdrm-common_2.4.131-1_all.deb ... 269s Unpacking libdrm-common (2.4.131-1) over (2.4.129-1) ... 269s Preparing to unpack .../12-libdrm2_2.4.131-1_amd64.deb ... 269s Unpacking libdrm2:amd64 (2.4.131-1) over (2.4.129-1) ... 269s Preparing to unpack .../13-libgpm2_1.20.7-12build1_amd64.deb ... 269s Unpacking libgpm2:amd64 (1.20.7-12build1) over (1.20.7-12) ... 269s Preparing to unpack .../14-libmaxminddb0_1.12.2-1build2_amd64.deb ... 269s Unpacking libmaxminddb0:amd64 (1.12.2-1build2) over (1.12.2-1build1) ... 269s Preparing to unpack .../15-libsensors-config_1%3a3.6.2-2build1_all.deb ... 269s Unpacking libsensors-config (1:3.6.2-2build1) over (1:3.6.2-2) ... 269s Preparing to unpack .../16-libsensors5_1%3a3.6.2-2build1_amd64.deb ... 269s Unpacking libsensors5:amd64 (1:3.6.2-2build1) over (1:3.6.2-2) ... 269s Preparing to unpack .../17-busybox-initramfs_1%3a1.37.0-7ubuntu1_amd64.deb ... 269s Unpacking busybox-initramfs (1:1.37.0-7ubuntu1) over (1:1.37.0-4ubuntu1) ... 269s Preparing to unpack .../18-libdrm-amdgpu1_2.4.131-1_amd64.deb ... 269s Unpacking libdrm-amdgpu1:amd64 (2.4.131-1) over (2.4.129-1) ... 269s Preparing to unpack .../19-libnpth0t64_1.8-3build1_amd64.deb ... 269s Unpacking libnpth0t64:amd64 (1.8-3build1) over (1.8-3) ... 269s Preparing to unpack .../20-patch_2.8-2build1_amd64.deb ... 269s Unpacking patch (2.8-2build1) over (2.8-2) ... 269s Preparing to unpack .../21-pollinate_4.33-4ubuntu5_all.deb ... 269s Unpacking pollinate (4.33-4ubuntu5) over (4.33-4ubuntu4) ... 269s Preparing to unpack .../22-python3-referencing_0.36.2-1ubuntu2_all.deb ... 269s Unpacking python3-referencing (0.36.2-1ubuntu2) over (0.36.2-1ubuntu1) ... 269s Preparing to unpack .../23-amd64-microcode_3.20251202.1ubuntu1_amd64.deb ... 269s Unpacking amd64-microcode (3.20251202.1ubuntu1) over (3.20250708.1ubuntu1) ... 270s Setting up libnpth0t64:amd64 (1.8-3build1) ... 270s Setting up libkeyutils1:amd64 (1.6.3-6ubuntu3) ... 270s Setting up libgpm2:amd64 (1.20.7-12build1) ... 270s Setting up libmaxminddb0:amd64 (1.12.2-1build2) ... 270s Setting up libsensors-config (1:3.6.2-2build1) ... 270s Setting up less (668-1build1) ... 270s Setting up amd64-microcode (3.20251202.1ubuntu1) ... 270s amd64-microcode: microcode will be updated at next boot 270s Setting up locales (2.42-2ubuntu5) ... 270s Generating locales (this might take a while)... 271s en_US.UTF-8... done 271s Generation complete. 271s Setting up pollinate (4.33-4ubuntu5) ... 281s Setting up busybox-static (1:1.37.0-7ubuntu1) ... 281s Setting up patch (2.8-2build1) ... 281s Setting up libsensors5:amd64 (1:3.6.2-2build1) ... 281s Setting up busybox-initramfs (1:1.37.0-7ubuntu1) ... 281s Setting up libdevmapper1.02.1:amd64 (2:1.02.205-2ubuntu3) ... 281s Setting up dmsetup (2:1.02.205-2ubuntu3) ... 281s Setting up python3-linkify-it (2.0.3-1ubuntu3) ... 281s Setting up mawk (1.3.4.20260129-1) ... 281s Setting up libapt-pkg7.0:amd64 (3.1.15) ... 281s Setting up libdrm-common (2.4.131-1) ... 281s Setting up python3-referencing (0.36.2-1ubuntu2) ... 282s Setting up apt (3.1.15) ... 282s Setting up python3-markdown-it (3.0.0-3build1) ... 282s Setting up libdrm2:amd64 (2.4.131-1) ... 282s Setting up libdrm-amdgpu1:amd64 (2.4.131-1) ... 282s Processing triggers for libc-bin (2.42-2ubuntu5) ... 282s Processing triggers for systemd (259-1ubuntu3) ... 283s Processing triggers for man-db (2.13.1-1) ... 284s Processing triggers for install-info (7.2-5) ... 284s Processing triggers for initramfs-tools (0.150ubuntu7) ... 284s update-initramfs: Generating /boot/initrd.img-6.18.0-9-generic 289s autopkgtest [20:21:17]: upgrading testbed (apt dist-upgrade and autopurge) 290s Reading package lists... 290s Building dependency tree... 290s Reading state information... 290s Calculating upgrade... 290s 0 upgraded, 0 newly installed, 0 to remove and 0 not upgraded. 290s Reading package lists... 291s Building dependency tree... 291s Reading state information... 291s Solving dependencies... 291s 0 upgraded, 0 newly installed, 0 to remove and 0 not upgraded. 291s autopkgtest [20:21:19]: rebooting testbed after setup commands that affected boot 322s Reading package lists... 322s Building dependency tree... 322s Reading state information... 322s Solving dependencies... 323s The following NEW packages will be installed: 323s dns-root-data libevent-2.1-7t64 libevent-pthreads-2.1-7t64 libldns3t64 323s libnss3-tools libreswan libunbound8 323s 0 upgraded, 7 newly installed, 0 to remove and 0 not upgraded. 323s Need to get 2953 kB of archives. 323s After this operation, 11.9 MB of additional disk space will be used. 323s Get:1 http://ftpmaster.internal/ubuntu resolute/main amd64 dns-root-data all 2025080400build1 [6022 B] 323s Get:2 http://ftpmaster.internal/ubuntu resolute/main amd64 libnss3-tools amd64 2:3.120-1 [626 kB] 323s Get:3 http://ftpmaster.internal/ubuntu resolute/main amd64 libevent-pthreads-2.1-7t64 amd64 2.1.12-stable-10build1 [8360 B] 323s Get:4 http://ftpmaster.internal/ubuntu resolute/universe amd64 libldns3t64 amd64 1.8.4-2build1 [173 kB] 323s Get:5 http://ftpmaster.internal/ubuntu resolute/main amd64 libevent-2.1-7t64 amd64 2.1.12-stable-10build1 [155 kB] 323s Get:6 http://ftpmaster.internal/ubuntu resolute/main amd64 libunbound8 amd64 1.24.2-1ubuntu1 [462 kB] 323s Get:7 http://ftpmaster.internal/ubuntu resolute/universe amd64 libreswan amd64 5.2-2.2ubuntu1 [1523 kB] 323s Fetched 2953 kB in 0s (24.0 MB/s) 323s Selecting previously unselected package dns-root-data. 323s (Reading database ... (Reading database ... 5% (Reading database ... 10% (Reading database ... 15% (Reading database ... 20% (Reading database ... 25% (Reading database ... 30% (Reading database ... 35% (Reading database ... 40% (Reading database ... 45% (Reading database ... 50% (Reading database ... 55% (Reading database ... 60% (Reading database ... 65% (Reading database ... 70% (Reading database ... 75% (Reading database ... 80% (Reading database ... 85% (Reading database ... 90% (Reading database ... 95% (Reading database ... 100% (Reading database ... 83962 files and directories currently installed.) 323s Preparing to unpack .../0-dns-root-data_2025080400build1_all.deb ... 323s Unpacking dns-root-data (2025080400build1) ... 323s Selecting previously unselected package libnss3-tools. 323s Preparing to unpack .../1-libnss3-tools_2%3a3.120-1_amd64.deb ... 323s Unpacking libnss3-tools (2:3.120-1) ... 323s Selecting previously unselected package libevent-pthreads-2.1-7t64:amd64. 323s Preparing to unpack .../2-libevent-pthreads-2.1-7t64_2.1.12-stable-10build1_amd64.deb ... 323s Unpacking libevent-pthreads-2.1-7t64:amd64 (2.1.12-stable-10build1) ... 323s Selecting previously unselected package libldns3t64:amd64. 323s Preparing to unpack .../3-libldns3t64_1.8.4-2build1_amd64.deb ... 323s Unpacking libldns3t64:amd64 (1.8.4-2build1) ... 323s Selecting previously unselected package libevent-2.1-7t64:amd64. 323s Preparing to unpack .../4-libevent-2.1-7t64_2.1.12-stable-10build1_amd64.deb ... 323s Unpacking libevent-2.1-7t64:amd64 (2.1.12-stable-10build1) ... 323s Selecting previously unselected package libunbound8:amd64. 323s Preparing to unpack .../5-libunbound8_1.24.2-1ubuntu1_amd64.deb ... 323s Unpacking libunbound8:amd64 (1.24.2-1ubuntu1) ... 323s Selecting previously unselected package libreswan. 323s Preparing to unpack .../6-libreswan_5.2-2.2ubuntu1_amd64.deb ... 323s Unpacking libreswan (5.2-2.2ubuntu1) ... 323s Setting up libldns3t64:amd64 (1.8.4-2build1) ... 323s Setting up libevent-pthreads-2.1-7t64:amd64 (2.1.12-stable-10build1) ... 323s Setting up libevent-2.1-7t64:amd64 (2.1.12-stable-10build1) ... 323s Setting up dns-root-data (2025080400build1) ... 323s Setting up libunbound8:amd64 (1.24.2-1ubuntu1) ... 323s Setting up libnss3-tools (2:3.120-1) ... 323s Setting up libreswan (5.2-2.2ubuntu1) ... 324s ipsec.service is a disabled or a static unit, not starting it. 324s Processing triggers for man-db (2.13.1-1) ... 324s Processing triggers for libc-bin (2.42-2ubuntu5) ... 395s autopkgtest [20:23:03]: test cryptocheck: [----------------------- 395s Testing installed binary: /usr/libexec/ipsec/algparse 395s Testing installed binary: /usr/libexec/ipsec/pluto 395s testing -tp 395s ipsec algparse: Encryption algorithms: 395s ipsec algparse: AES_CCM_16 {256,192,*128} IKEv1: ESP IKEv2: ESP FIPS aes_ccm, aes_ccm_c 395s ipsec algparse: AES_CCM_12 {256,192,*128} IKEv1: ESP IKEv2: ESP FIPS aes_ccm_b 395s ipsec algparse: AES_CCM_8 {256,192,*128} IKEv1: ESP IKEv2: ESP FIPS aes_ccm_a 395s ipsec algparse: 3DES_CBC [*192] IKEv1: IKE ESP IKEv2: IKE ESP FIPS NSS(CBC) 3des 395s ipsec algparse: CAMELLIA_CTR {256,192,*128} IKEv1: ESP IKEv2: ESP 395s ipsec algparse: CAMELLIA_CBC {256,192,*128} IKEv1: IKE ESP IKEv2: IKE ESP NSS(CBC) camellia 395s ipsec algparse: AES_GCM_16 {256,192,*128} IKEv1: ESP IKEv2: IKE ESP FIPS NSS(AEAD) aes_gcm, aes_gcm_c 395s ipsec algparse: AES_GCM_12 {256,192,*128} IKEv1: ESP IKEv2: IKE ESP FIPS NSS(AEAD) aes_gcm_b 395s ipsec algparse: AES_GCM_8 {256,192,*128} IKEv1: ESP IKEv2: IKE ESP FIPS NSS(AEAD) aes_gcm_a 395s ipsec algparse: AES_CTR {256,192,*128} IKEv1: IKE ESP IKEv2: IKE ESP FIPS NSS(CTR) aesctr 395s ipsec algparse: AES_CBC {256,192,*128} IKEv1: IKE ESP IKEv2: IKE ESP FIPS NSS(CBC) aes 395s ipsec algparse: NULL_AUTH_AES_GMAC {256,192,*128} IKEv1: ESP IKEv2: ESP FIPS aes_gmac 395s ipsec algparse: NULL [] IKEv1: ESP IKEv2: ESP NULL 395s ipsec algparse: CHACHA20_POLY1305 [*256] IKEv1: IKEv2: IKE ESP NSS(AEAD) chacha20poly1305 395s ipsec algparse: Hash algorithms: 395s ipsec algparse: MD5 IKEv1: IKE IKEv2: NSS 395s ipsec algparse: SHA1 IKEv1: IKE IKEv2: IKE FIPS NSS sha 395s ipsec algparse: SHA2_256 IKEv1: IKE IKEv2: IKE FIPS NSS sha2, sha256 395s ipsec algparse: SHA2_384 IKEv1: IKE IKEv2: IKE FIPS NSS sha384 395s ipsec algparse: SHA2_512 IKEv1: IKE IKEv2: IKE FIPS NSS sha512 395s ipsec algparse: IDENTITY IKEv1: IKEv2: FIPS 395s ipsec algparse: PRF algorithms: 395s ipsec algparse: HMAC_MD5 IKEv1: IKE IKEv2: IKE NSS md5 395s ipsec algparse: HMAC_SHA1 IKEv1: IKE IKEv2: IKE FIPS NSS sha, sha1 395s ipsec algparse: HMAC_SHA2_256 IKEv1: IKE IKEv2: IKE FIPS NSS sha2, sha256, sha2_256 395s ipsec algparse: HMAC_SHA2_384 IKEv1: IKE IKEv2: IKE FIPS NSS sha384, sha2_384 395s ipsec algparse: HMAC_SHA2_512 IKEv1: IKE IKEv2: IKE FIPS NSS sha512, sha2_512 395s ipsec algparse: AES_XCBC IKEv1: IKEv2: IKE native(XCBC) aes128_xcbc 395s ipsec algparse: Integrity algorithms: 395s ipsec algparse: HMAC_MD5_96 IKEv1: IKE ESP AH IKEv2: IKE ESP AH NSS md5, hmac_md5 395s ipsec algparse: HMAC_SHA1_96 IKEv1: IKE ESP AH IKEv2: IKE ESP AH FIPS NSS sha, sha1, sha1_96, hmac_sha1 395s ipsec algparse: HMAC_SHA2_512_256 IKEv1: IKE ESP AH IKEv2: IKE ESP AH FIPS NSS sha512, sha2_512, sha2_512_256, hmac_sha2_512 395s ipsec algparse: HMAC_SHA2_384_192 IKEv1: IKE ESP AH IKEv2: IKE ESP AH FIPS NSS sha384, sha2_384, sha2_384_192, hmac_sha2_384 395s ipsec algparse: HMAC_SHA2_256_128 IKEv1: IKE ESP AH IKEv2: IKE ESP AH FIPS NSS sha2, sha256, sha2_256, sha2_256_128, hmac_sha2_256 395s ipsec algparse: HMAC_SHA2_256_TRUNCBUG IKEv1: ESP AH IKEv2: AH 395s ipsec algparse: AES_XCBC_96 IKEv1: ESP AH IKEv2: IKE ESP AH native(XCBC) aes_xcbc, aes128_xcbc, aes128_xcbc_96 395s ipsec algparse: AES_CMAC_96 IKEv1: ESP AH IKEv2: ESP AH FIPS aes_cmac 395s ipsec algparse: NONE IKEv1: ESP IKEv2: IKE ESP FIPS null 395s ipsec algparse: DH algorithms: 395s ipsec algparse: NONE IKEv1: IKEv2: IKE ESP AH FIPS NSS(MODP) null, dh0 395s ipsec algparse: MODP1536 IKEv1: IKE ESP AH IKEv2: IKE ESP AH NSS(MODP) dh5 395s ipsec algparse: MODP2048 IKEv1: IKE ESP AH IKEv2: IKE ESP AH FIPS NSS(MODP) dh14 395s ipsec algparse: MODP3072 IKEv1: IKE ESP AH IKEv2: IKE ESP AH FIPS NSS(MODP) dh15 395s ipsec algparse: MODP4096 IKEv1: IKE ESP AH IKEv2: IKE ESP AH FIPS NSS(MODP) dh16 395s ipsec algparse: MODP6144 IKEv1: IKE ESP AH IKEv2: IKE ESP AH FIPS NSS(MODP) dh17 395s ipsec algparse: MODP8192 IKEv1: IKE ESP AH IKEv2: IKE ESP AH FIPS NSS(MODP) dh18 395s ipsec algparse: DH19 IKEv1: IKE IKEv2: IKE ESP AH FIPS NSS(ECP) ecp_256, ecp256 395s ipsec algparse: DH20 IKEv1: IKE IKEv2: IKE ESP AH FIPS NSS(ECP) ecp_384, ecp384 395s ipsec algparse: DH21 IKEv1: IKE IKEv2: IKE ESP AH FIPS NSS(ECP) ecp_521, ecp521 395s ipsec algparse: DH31 IKEv1: IKE IKEv2: IKE ESP AH NSS(ECP) curve25519 395s ipsec algparse: IPCOMP algorithms: 395s ipsec algparse: DEFLATE IKEv1: ESP AH IKEv2: ESP AH FIPS 395s ipsec algparse: LZS IKEv1: IKEv2: ESP AH FIPS 395s ipsec algparse: LZJH IKEv1: IKEv2: ESP AH FIPS 395s | parsing 'AES_GCM_16_256,AES_GCM_16_128,CHACHA20_POLY1305,AES_CBC_256,AES_CBC_128' for ESP 395s | proposal: 'AES_GCM_16_256' 395s | token: '' '' "AES_GCM_16_256" '' 395s | token: '' "AES_GCM_16_256" '' '' 395s | ike_alg_byname() failed: ESP encryption algorithm 'AES_GCM_16_256' is not recognized 395s | token: '' '' '' 395s | appending ESP encryption algorithm AES_GCM_16[_256] 395s | appending ESP integrity algorithm NONE[_0] 395s | proposal: 'AES_GCM_16_128' 395s | token: '' '' "AES_GCM_16_128" '' 395s | token: '' "AES_GCM_16_128" '' '' 395s | ike_alg_byname() failed: ESP encryption algorithm 'AES_GCM_16_128' is not recognized 395s | token: '' '' '' 395s | appending ESP encryption algorithm AES_GCM_16[_128] 395s | appending ESP integrity algorithm NONE[_0] 395s | proposal: 'CHACHA20_POLY1305' 395s | token: '' '' "CHACHA20_POLY1305" '' 395s | token: '' "CHACHA20_POLY1305" '' '' 395s | token: '' '' '' 395s | appending ESP encryption algorithm CHACHA20_POLY1305[_0] 395s | appending ESP integrity algorithm NONE[_0] 395s | proposal: 'AES_CBC_256' 395s | token: '' '' "AES_CBC_256" '' 395s | token: '' "AES_CBC_256" '' '' 395s | ike_alg_byname() failed: ESP encryption algorithm 'AES_CBC_256' is not recognized 395s | token: '' '' '' 395s | appending ESP encryption algorithm AES_CBC[_256] 395s | appending ESP integrity algorithm HMAC_SHA2_512_256[_0] 395s | appending ESP integrity algorithm HMAC_SHA2_256_128[_0] 395s | proposal: 'AES_CBC_128' 395s | token: '' '' "AES_CBC_128" '' 395s | token: '' "AES_CBC_128" '' '' 395s | ike_alg_byname() failed: ESP encryption algorithm 'AES_CBC_128' is not recognized 395s | token: '' '' '' 395s | appending ESP encryption algorithm AES_CBC[_128] 395s | appending ESP integrity algorithm HMAC_SHA2_512_256[_0] 395s | appending ESP integrity algorithm HMAC_SHA2_256_128[_0] 395s | parsing '' for ESP 395s algparse -v2 'esp' (expect SUCCESS) 395s AES_GCM_16_256-NONE 395s AES_GCM_16_128-NONE 395s CHACHA20_POLY1305-NONE 395s AES_CBC_256-HMAC_SHA2_512_256+HMAC_SHA2_256_128 395s AES_CBC_128-HMAC_SHA2_512_256+HMAC_SHA2_256_128 395s algparse -v2 'esp=' (expect ERROR) 395s ERROR: ESP proposal is empty 395s algparse -v2 'esp=aes' (expect SUCCESS) 395s AES_CBC-HMAC_SHA2_512_256+HMAC_SHA2_256_128 395s algparse -v2 'esp=aes;modp2048' (expect SUCCESS) 395s AES_CBC-HMAC_SHA2_512_256+HMAC_SHA2_256_128 395s algparse -v2 'esp=aes-sha1' (expect SUCCESS) 395s AES_CBC-HMAC_SHA1_96 395s algparse -v2 'esp=aes-sha1' (expect SUCCESS) 395s AES_CBC-HMAC_SHA1_96 395s algparse -v2 'esp=aes-sha1-modp2048' (expect SUCCESS) 395s AES_CBC-HMAC_SHA1_96 395s algparse -v2 'esp=aes-128-sha1' (expect SUCCESS) 395s AES_CBC_128-HMAC_SHA1_96 395s algparse -v2 'esp=aes-128-sha1' (expect SUCCESS) 395s AES_CBC_128-HMAC_SHA1_96 395s algparse -v2 'esp=aes-128-sha1-modp2048' (expect SUCCESS) 395s AES_CBC_128-HMAC_SHA1_96 395s algparse -v2 'esp=aes-128' (expect SUCCESS) 395s AES_CBC_128-HMAC_SHA2_512_256+HMAC_SHA2_256_128 395s algparse -v2 'esp=aes_gcm_a-128-null' (expect SUCCESS) 395s AES_GCM_8_128-NONE 395s algparse -v2 'esp=3des-sha1;modp1024' (expect ERROR) 395s ERROR: ESP DH algorithm 'modp1024' is not supported 395s algparse -v2 'esp=3des-sha1;modp1536' (expect SUCCESS) 395s 3DES_CBC-HMAC_SHA1_96 395s algparse -v2 'esp=3des-sha1;modp2048' (expect SUCCESS) 395s 3DES_CBC-HMAC_SHA1_96 395s algparse -v2 'esp=3des-sha1;dh21' (expect SUCCESS) 395s 3DES_CBC-HMAC_SHA1_96 395s algparse -v2 'esp=3des-sha1;ecp_521' (expect SUCCESS) 395s 3DES_CBC-HMAC_SHA1_96 395s algparse -v2 'esp=3des-sha1;dh23' (expect ERROR) 395s ERROR: ESP DH algorithm 'dh23' is not supported 395s algparse -v2 'esp=3des-sha1;dh24' (expect ERROR) 395s ERROR: ESP DH algorithm 'dh24' is not supported 395s algparse -v2 'esp=3des-sha1' (expect SUCCESS) 395s 3DES_CBC-HMAC_SHA1_96 395s algparse -v2 'esp=null-sha1' (expect SUCCESS) 395s NULL-HMAC_SHA1_96 395s algparse -v2 'esp=aes_cbc' (expect SUCCESS) 395s AES_CBC-HMAC_SHA2_512_256+HMAC_SHA2_256_128 395s algparse -v2 'esp=aes-sha' (expect SUCCESS) 395s AES_CBC-HMAC_SHA1_96 395s algparse -v2 'esp=aes-sha1' (expect SUCCESS) 395s | parsing 'aes' for ESP 395s | proposal: 'aes' 395s | token: '' '' "aes" '' 395s | token: '' "aes" '' '' 395s | token: '' '' '' 395s | appending ESP encryption algorithm AES_CBC[_0] 395s | appending ESP integrity algorithm HMAC_SHA2_512_256[_0] 395s | appending ESP integrity algorithm HMAC_SHA2_256_128[_0] 395s | parsing 'aes;modp2048' for ESP 395s | proposal: 'aes;modp2048' 395s | token: '' '' "aes" ';' 395s | token: '' "aes" ';' "modp2048" '' 395s | token: ';' "modp2048" '' '' 395s | appending ESP encryption algorithm AES_CBC[_0] 395s | parsing dh: 395s | appending ESP DH algorithm MODP2048[_0] 395s | token: '' '' '' 395s | appending ESP integrity algorithm HMAC_SHA2_512_256[_0] 395s | appending ESP integrity algorithm HMAC_SHA2_256_128[_0] 395s ipsec algparse: ignoring ESP DH algorithm MODP2048 as PFS policy is disabled 395s | parsing 'aes-sha1' for ESP 395s | proposal: 'aes-sha1' 395s | token: '' '' "aes" '-' 395s | token: '' "aes" '-' "sha1" '' 395s | token: '-' "sha1" '' '' 395s | appending ESP encryption algorithm AES_CBC[_0] 395s | parsing integ: 395s | appending ESP integrity algorithm HMAC_SHA1_96[_0] 395s | token: '' '' '' 395s | parsing 'aes-sha1' for ESP 395s | proposal: 'aes-sha1' 395s | token: '' '' "aes" '-' 395s | token: '' "aes" '-' "sha1" '' 395s | token: '-' "sha1" '' '' 395s | appending ESP encryption algorithm AES_CBC[_0] 395s | parsing integ: 395s | appending ESP integrity algorithm HMAC_SHA1_96[_0] 395s | token: '' '' '' 395s | parsing 'aes-sha1-modp2048' for ESP 395s | proposal: 'aes-sha1-modp2048' 395s | token: '' '' "aes" '-' 395s | token: '' "aes" '-' "sha1" '-' 395s | token: '-' "sha1" '-' "modp2048" '' 395s | appending ESP encryption algorithm AES_CBC[_0] 395s | parsing integ: 395s | appending ESP integrity algorithm HMAC_SHA1_96[_0] 395s | token: '-' "modp2048" '' '' 395s | parsing dh: 395s | appending ESP DH algorithm MODP2048[_0] 395s | token: '' '' '' 395s ipsec algparse: ignoring ESP DH algorithm MODP2048 as PFS policy is disabled 395s | parsing 'aes-128-sha1' for ESP 395s | proposal: 'aes-128-sha1' 395s | token: '' '' "aes" '-' 395s | token: '' "aes" '-' "128" '-' 395s | token: '-' "128" '-' "sha1" '' 395s | token: '-' "sha1" '' '' 395s | appending ESP encryption algorithm AES_CBC[_128] 395s | parsing integ: 395s | appending ESP integrity algorithm HMAC_SHA1_96[_0] 395s | token: '' '' '' 395s | parsing 'aes-128-sha1' for ESP 395s | proposal: 'aes-128-sha1' 395s | token: '' '' "aes" '-' 395s | token: '' "aes" '-' "128" '-' 395s | token: '-' "128" '-' "sha1" '' 395s | token: '-' "sha1" '' '' 395s | appending ESP encryption algorithm AES_CBC[_128] 395s | parsing integ: 395s | appending ESP integrity algorithm HMAC_SHA1_96[_0] 395s | token: '' '' '' 395s | parsing 'aes-128-sha1-modp2048' for ESP 395s | proposal: 'aes-128-sha1-modp2048' 395s | token: '' '' "aes" '-' 395s | token: '' "aes" '-' "128" '-' 395s | token: '-' "128" '-' "sha1" '-' 395s | token: '-' "sha1" '-' "modp2048" '' 395s | appending ESP encryption algorithm AES_CBC[_128] 395s | parsing integ: 395s | appending ESP integrity algorithm HMAC_SHA1_96[_0] 395s | token: '-' "modp2048" '' '' 395s | parsing dh: 395s | appending ESP DH algorithm MODP2048[_0] 395s | token: '' '' '' 395s ipsec algparse: ignoring ESP DH algorithm MODP2048 as PFS policy is disabled 395s | parsing 'aes-128' for ESP 395s | proposal: 'aes-128' 395s | token: '' '' "aes" '-' 395s | token: '' "aes" '-' "128" '' 395s | token: '-' "128" '' '' 395s | token: '' '' '' 395s | appending ESP encryption algorithm AES_CBC[_128] 395s | appending ESP integrity algorithm HMAC_SHA2_512_256[_0] 395s | appending ESP integrity algorithm HMAC_SHA2_256_128[_0] 395s | parsing 'aes_gcm_a-128-null' for ESP 395s | proposal: 'aes_gcm_a-128-null' 395s | token: '' '' "aes_gcm_a" '-' 395s | token: '' "aes_gcm_a" '-' "128" '-' 395s | token: '-' "128" '-' "null" '' 395s | token: '-' "null" '' '' 395s | appending ESP encryption algorithm AES_GCM_8[_128] 395s | parsing integ: 395s | appending ESP integrity algorithm NONE[_0] 395s | token: '' '' '' 395s | parsing '3des-sha1;modp1024' for ESP 395s | proposal: '3des-sha1;modp1024' 395s | token: '' '' "3des" '-' 395s | token: '' "3des" '-' "sha1" ';' 395s | token: '-' "sha1" ';' "modp1024" '' 395s | appending ESP encryption algorithm 3DES_CBC[_0] 395s | parsing integ: 395s | appending ESP integrity algorithm HMAC_SHA1_96[_0] 395s | token: ';' "modp1024" '' '' 395s | parsing dh: 395s | ike_alg_byname() failed: ESP DH algorithm 'modp1024' is not supported 395s | lookup for DH algorithm 'modp1024' failed 395s | ... failed 'ESP DH algorithm 'modp1024' is not supported' 395s | parsing '3des-sha1;modp1536' for ESP 395s | proposal: '3des-sha1;modp1536' 395s | token: '' '' "3des" '-' 395s | token: '' "3des" '-' "sha1" ';' 395s | token: '-' "sha1" ';' "modp1536" '' 395s | appending ESP encryption algorithm 3DES_CBC[_0] 395s | parsing integ: 395s | appending ESP integrity algorithm HMAC_SHA1_96[_0] 395s | token: ';' "modp1536" '' '' 395s | parsing dh: 395s | appending ESP DH algorithm MODP1536[_0] 395s | token: '' '' '' 395s ipsec algparse: ignoring ESP DH algorithm MODP1536 as PFS policy is disabled 395s | parsing '3des-sha1;modp2048' for ESP 395s | proposal: '3des-sha1;modp2048' 395s | token: '' '' "3des" '-' 395s | token: '' "3des" '-' "sha1" ';' 395s | token: '-' "sha1" ';' "modp2048" '' 395s | appending ESP encryption algorithm 3DES_CBC[_0] 395s | parsing integ: 395s | appending ESP integrity algorithm HMAC_SHA1_96[_0] 395s | token: ';' "modp2048" '' '' 395s | parsing dh: 395s | appending ESP DH algorithm MODP2048[_0] 395s | token: '' '' '' 395s ipsec algparse: ignoring ESP DH algorithm MODP2048 as PFS policy is disabled 395s | parsing '3des-sha1;dh21' for ESP 395s | proposal: '3des-sha1;dh21' 395s | token: '' '' "3des" '-' 395s | token: '' "3des" '-' "sha1" ';' 395s | token: '-' "sha1" ';' "dh21" '' 395s | appending ESP encryption algorithm 3DES_CBC[_0] 395s | parsing integ: 395s | appending ESP integrity algorithm HMAC_SHA1_96[_0] 395s | token: ';' "dh21" '' '' 395s | parsing dh: 395s | appending ESP DH algorithm DH21[_0] 395s | token: '' '' '' 395s ipsec algparse: ignoring ESP DH algorithm DH21 as PFS policy is disabled 395s | parsing '3des-sha1;ecp_521' for ESP 395s | proposal: '3des-sha1;ecp_521' 395s | token: '' '' "3des" '-' 395s | token: '' "3des" '-' "sha1" ';' 395s | token: '-' "sha1" ';' "ecp_521" '' 395s | appending ESP encryption algorithm 3DES_CBC[_0] 395s | parsing integ: 395s | appending ESP integrity algorithm HMAC_SHA1_96[_0] 395s | token: ';' "ecp_521" '' '' 395s | parsing dh: 395s | appending ESP DH algorithm DH21[_0] 395s | token: '' '' '' 395s ipsec algparse: ignoring ESP DH algorithm DH21 as PFS policy is disabled 395s | parsing '3des-sha1;dh23' for ESP 395s | proposal: '3des-sha1;dh23' 395s | token: '' '' "3des" '-' 395s | token: '' "3des" '-' "sha1" ';' 395s | token: '-' "sha1" ';' "dh23" '' 395s | appending ESP encryption algorithm 3DES_CBC[_0] 395s | parsing integ: 395s | appending ESP integrity algorithm HMAC_SHA1_96[_0] 395s | token: ';' "dh23" '' '' 395s | parsing dh: 395s | ike_alg_byname() failed: ESP DH algorithm 'dh23' is not supported 395s | lookup for DH algorithm 'dh23' failed 395s | ... failed 'ESP DH algorithm 'dh23' is not supported' 395s | parsing '3des-sha1;dh24' for ESP 395s | proposal: '3des-sha1;dh24' 395s | token: '' '' "3des" '-' 395s | token: '' "3des" '-' "sha1" ';' 395s | token: '-' "sha1" ';' "dh24" '' 395s | appending ESP encryption algorithm 3DES_CBC[_0] 395s | parsing integ: 395s | appending ESP integrity algorithm HMAC_SHA1_96[_0] 395s | token: ';' "dh24" '' '' 395s | parsing dh: 395s | ike_alg_byname() failed: ESP DH algorithm 'dh24' is not supported 395s | lookup for DH algorithm 'dh24' failed 395s | ... failed 'ESP DH algorithm 'dh24' is not supported' 395s | parsing '3des-sha1' for ESP 395s | proposal: '3des-sha1' 395s | token: '' '' "3des" '-' 395s | token: '' "3des" '-' "sha1" '' 395s | token: '-' "sha1" '' '' 395s | appending ESP encryption algorithm 3DES_CBC[_0] 395s | parsing integ: 395s | appending ESP integrity algorithm HMAC_SHA1_96[_0] 395s | token: '' '' '' 395s | parsing 'null-sha1' for ESP 395s | proposal: 'null-sha1' 395s | token: '' '' "null" '-' 395s | token: '' "null" '-' "sha1" '' 395s | token: '-' "sha1" '' '' 395s | appending ESP encryption algorithm NULL[_0] 395s | parsing integ: 395s | appending ESP integrity algorithm HMAC_SHA1_96[_0] 395s | token: '' '' '' 395s | parsing 'aes_cbc' for ESP 395s | proposal: 'aes_cbc' 395s | token: '' '' "aes_cbc" '' 395s | token: '' "aes_cbc" '' '' 395s | token: '' '' '' 395s | appending ESP encryption algorithm AES_CBC[_0] 395s | appending ESP integrity algorithm HMAC_SHA2_512_256[_0] 395s | appending ESP integrity algorithm HMAC_SHA2_256_128[_0] 395s | parsing 'aes-sha' for ESP 395s | proposal: 'aes-sha' 395s | token: '' '' "aes" '-' 395s | token: '' "aes" '-' "sha" '' 395s | token: '-' "sha" '' '' 395s | appending ESP encryption algorithm AES_CBC[_0] 395s | parsing integ: 395s | appending ESP integrity algorithm HMAC_SHA1_96[_0] 395s | token: '' '' '' 395s | parsing 'aes-sha1' for ESP 395s | proposal: 'aes-sha1' 395s | token: '' '' "aes" '-' 395s | token: '' "aes" '-' "sha1" '' 395s | token: '-' "sha1" '' '' 395s | appending ESP encryption algorithm AES_CBC[_0] 395s | parsing integ: 395s | appending ESP integrity algorithm HMAC_SHA1_96[_0] 395s | token: '' '' '' 395s | parsing 'aes128-sha1' for ESP 395s | proposal: 'aes128-sha1' 395s | token: '' '' "aes128" '-' 395s | token: '' "aes128" '-' "sha1" '' 395s | ike_alg_byname() failed: ESP encryption algorithm 'aes128' is not recognized 395s | token: '-' "sha1" '' '' 395s | appending ESP encryption algorithm AES_CBC[_128] 395s | parsing integ: 395s | appending ESP integrity algorithm HMAC_SHA1_96[_0] 395s | token: '' '' '' 395s | parsing 'aes-sha2' for ESP 395s | proposal: 'aes-sha2' 395s | token: '' '' "aes" '-' 395s | token: '' "aes" '-' "sha2" '' 395s | token: '-' "sha2" '' '' 395s | appending ESP encryption algorithm AES_CBC[_0] 395s | parsing integ: 395s | appending ESP integrity algorithm HMAC_SHA2_256_128[_0] 395s | token: '' '' '' 395s | parsing 'aes-sha256' for ESP 395s | proposal: 'aes-sha256' 395s | token: '' '' "aes" '-' 395s | token: '' "aes" '-' "sha256" '' 395s | token: '-' "sha256" '' '' 395s | appending ESP encryption algorithm AES_CBC[_0] 395s | parsing integ: 395s | appending ESP integrity algorithm HMAC_SHA2_256_128[_0] 395s | token: '' '' '' 395s | parsing 'aes-sha384' for ESP 395s | proposal: 'aes-sha384' 395s | token: '' '' "aes" '-' 395s | token: '' "aes" '-' "sha384" '' 395s | token: '-' "sha384" '' '' 395s | appending ESP encryption algorithm AES_CBC[_0] 395s | parsing integ: 395s | appending ESP integrity algorithm HMAC_SHA2_384_192[_0] 395s | token: '' '' '' 395s | parsing 'aes-sha512' for ESP 395s | proposal: 'aes-sha512' 395s | token: '' '' "aes" '-' 395s | token: '' "aes" '-' "sha512" '' 395s | token: '-' "sha512" '' '' 395s | appending ESP encryption algorithm AES_CBC[_0] 395s | parsing integ: 395s | appending ESP integrity algorithm HMAC_SHA2_512_256[_0] 395s | token: '' '' '' 395s | parsing 'aes128-aes_xcbc' for ESP 395s | proposal: 'aes128-aes_xcbc' 395s | token: '' '' "aes128" '-' 395s | token: '' "aes128" '-' "aes_xcbc" '' 395s | ike_alg_byname() failed: ESP encryption algorithm 'aes128' is not recognized 395s | token: '-' "aes_xcbc" '' '' 395s | appending ESP encryption algorithm AES_CBC[_128] 395s | parsing integ: 395s | appending ESP integrity algorithm AES_XCBC_96[_0] 395s | token: '' '' '' 395s | parsing 'aes192-sha1' for ESP 395s | proposal: 'aes192-sha1' 395s | token: '' '' "aes192" '-' 395s | token: '' "aes192" '-' "sha1" '' 395s | ike_alg_byname() failed: ESP encryption algorithm 'aes192' is not recognized 395s | token: '-' "sha1" '' '' 395s | appending ESP encryption algorithm AES_CBC[_192] 395s | parsing integ: 395s | appending ESP integrity algorithm HMAC_SHA1_96[_0] 395s | token: '' '' '' 395s | parsing 'aes256-sha1' for ESP 395s | proposal: 'aes256-sha1' 395s | token: '' '' "aes256" '-' 395s | token: '' "aes256" '-' "sha1" '' 395s | ike_alg_byname() failed: ESP encryption algorithm 'aes256' is not recognized 395s | token: '-' "sha1" '' '' 395s | appending ESP encryption algorithm AES_CBC[_256] 395s | parsing integ: 395s | appending ESP integrity algorithm HMAC_SHA1_96[_0] 395s | token: '' '' '' 395s | parsing 'aes256-sha' for ESP 395s | proposal: 'aes256-sha' 395s | token: '' '' "aes256" '-' 395s | token: '' "aes256" '-' "sha" '' 395s | ike_alg_byname() failed: ESP encryption algorithm 'aes256' is not recognized 395s | token: '-' "sha" '' '' 395s | appending ESP encryption algorithm AES_CBC[_256] 395s | parsing integ: 395s | appending ESP integrity algorithm HMAC_SHA1_96[_0] 395s | token: '' '' '' 395s | parsing 'aes256-sha2' for ESP 395s | proposal: 'aes256-sha2' 395s | token: '' '' "aes256" '-' 395s | token: '' "aes256" '-' "sha2" '' 395s | ike_alg_byname() failed: ESP encryption algorithm 'aes256' is not recognized 395s | token: '-' "sha2" '' '' 395s | appending ESP encryption algorithm AES_CBC[_256] 395s | parsing integ: 395s | appending ESP integrity algorithm HMAC_SHA2_256_128[_0] 395s | token: '' '' '' 395s | parsing 'aes256-sha2_256' for ESP 395s | proposal: 'aes256-sha2_256' 395s | token: '' '' "aes256" '-' 395s | token: '' "aes256" '-' "sha2_256" '' 395s | ike_alg_byname() failed: ESP encryption algorithm 'aes256' is not recognized 395s | token: '-' "sha2_256" '' '' 395s | appending ESP encryption algorithm AES_CBC[_256] 395s | parsing integ: 395s | appending ESP integrity algorithm HMAC_SHA2_256_128[_0] 395s | token: '' '' '' 395s | parsing 'aes256-sha2_384' for ESP 395s | proposal: 'aes256-sha2_384' 395s | token: '' '' "aes256" '-' 395s | token: '' "aes256" '-' "sha2_384" '' 395s | ike_alg_byname() failed: ESP encryption algorithm 'aes256' is not recognized 395s | token: '-' "sha2_384" '' '' 395s | appending ESP encryption algorithm AES_CBC[_256] 395s | parsing integ: 395s | appending ESP integrity algorithm HMAC_SHA2_384_192[_0] 395s | token: '' '' '' 395s | parsing 'aes256-sha2_512' for ESP 395s | proposal: 'aes256-sha2_512' 395s | token: '' '' "aes256" '-' 395s | token: '' "aes256" '-' "sha2_512" '' 395s | ike_alg_byname() failed: ESP encryption algorithm 'aes256' is not recognized 395s | token: '-' "sha2_512" '' '' 395s | appending ESP encryption algorithm AES_CBC[_256] 395s | parsing integ: 395s | appending ESP integrity algorithm HMAC_SHA2_512_256[_0] 395s | token: '' '' '' 395s | parsing 'camellia' for ESP 395s | proposal: 'camellia' 395s | token: '' '' "camellia" '' 395s | token: '' "camellia" '' '' 395s | token: '' '' '' 395s | appending ESP encryption algorithm CAMELLIA_CBC[_0] 395s | appending ESP integrity algorithm HMAC_SHA2_512_256[_0] 395s | appending ESP integrity algorithm HMAC_SHA2_256_128[_0] 395s | parsing 'camellia128' for ESP 395s | proposal: 'camellia128' 395s | token: '' '' "camellia128" '' 395s | token: '' "camellia128" '' '' 395s | ike_alg_byname() failed: ESP encryption algorithm 'camellia128' is not recognized 395s | token: '' '' '' 395s | appending ESP encryption algorithm CAMELLIA_CBC[_128] 395s | appending ESP integrity algorithm HMAC_SHA2_512_256[_0] 395s | appending ESP integrity algorithm HMAC_SHA2_256_128[_0] 395s | parsing 'camellia192' for ESP 395s | proposal: 'camellia192' 395s | token: '' '' "camellia192" '' 395s | token: '' "camellia192" '' '' 395s | ike_alg_byname() failed: ESP encryption algorithm 'camellia192' is not recognized 395s | token: '' '' '' 395s | appending ESP encryption algorithm CAMELLIA_CBC[_192] 395s | appending ESP integrity algorithm HMAC_SHA2_512_256[_0] 395s | appending ESP integrity algorithm HMAC_SHA2_256_128[_0] 395s | parsing 'camellia256' for ESP 395s | proposal: 'camellia256' 395s | token: '' '' "camellia256" '' 395s | token: '' "camellia256" '' '' 395s | ike_alg_byname() failed: ESP encryption algorithm 'camellia256' is not recognized 395s | token: '' '' '' 395s | appending ESP encryption algorithm CAMELLIA_CBC[_256] 395s | appending ESP integrity algorithm HMAC_SHA2_512_256[_0] 395s | appending ESP integrity algorithm HMAC_SHA2_256_128[_0] 395s | parsing 'aes_ccm' for ESP 395s | proposal: 'aes_ccm' 395s | token: '' '' "aes_ccm" '' 395s | token: '' "aes_ccm" '' '' 395s | token: '' '' '' 395s | appending ESP encryption algorithm AES_CCM_16[_0] 395s | appending ESP integrity algorithm NONE[_0] 395s | parsing 'aes_ccm_a-128-null' for ESP 395s | proposal: 'aes_ccm_a-128-null' 395s | token: '' '' "aes_ccm_a" '-' 395s | token: '' "aes_ccm_a" '-' "128" '-' 395s | token: '-' "128" '-' "null" '' 395s | token: '-' "null" '' '' 395s | appending ESP encryption algorithm AES_CCM_8[_128] 395s | parsing integ: 395s | appending ESP integrity algorithm NONE[_0] 395s | token: '' '' '' 395s | parsing 'aes_ccm_a-192-null' for ESP 395s | proposal: 'aes_ccm_a-192-null' 395s | token: '' '' "aes_ccm_a" '-' 395s | token: '' "aes_ccm_a" '-' "192" '-' 395s | token: '-' "192" '-' "null" '' 395s | token: '-' "null" '' '' 395s | appending ESP encryption algorithm AES_CCM_8[_192] 395s | parsing integ: 395s | appending ESP integrity algorithm NONE[_0] 395s | token: '' '' '' 395s | parsing 'aes_ccm_a-256-null' for ESP 395s | proposal: 'aes_ccm_a-256-null' 395s | token: '' '' "aes_ccm_a" '-' 395s | token: '' "aes_ccm_a" '-' "256" '-' 395s | token: '-' "256" '-' "null" '' 395s | token: '-' "null" '' '' 395s | appending ESP encryption algorithm AES_CCM_8[_256] 395s | parsing integ: 395s | appending ESP integrity algorithm NONE[_0] 395s | token: '' '' '' 395s | parsing 'aes_ccm_b-128-null' for ESP 395s | proposal: 'aes_ccm_b-128-null' 395s | token: '' '' "aes_ccm_b" '-' 395s | token: '' "aes_ccm_b" '-' "128" '-' 395s | token: '-' "128" '-' "null" '' 395s | token: '-' "null" '' '' 395s | appending ESP encryption algorithm AES_CCM_12[_128] 395s | parsing integ: 395s | appending ESP integrity algorithm NONE[_0] 395s | token: '' '' '' 395s | parsing 'aes_ccm_b-192-null' for ESP 395s | proposal: 'aes_ccm_b-192-null' 395s | token: '' '' "aes_ccm_b" '-' 395s | token: '' "aes_ccm_b" '-' "192" '-' 395s | token: '-' "192" '-' "null" '' 395s | token: '-' "null" '' '' 395s | appending ESP encryption algorithm AES_CCM_12[_192] 395s | parsing integ: 395s | appending ESP integrity algorithm NONE[_0] 395s | token: '' '' '' 395s | parsing 'aes_ccm_b-256-null' for ESP 395s | proposal: 'aes_ccm_b-256-null' 395s | token: '' '' "aes_ccm_b" '-' 395s | token: '' "aes_ccm_b" '-' "256" '-' 395s | token: '-' "256" '-' "null" '' 395s | token: '-' "null" '' '' 395s | appending ESP encryption algorithm AES_CCM_12[_256] 395s | parsing integ: 395s | appending ESP integrity algorithm NONE[_0] 395s | token: '' '' '' 395s | parsing 'aes_ccm_c-128-null' for ESP 395s | proposal: 'aes_ccm_c-128-null' 395s | token: '' '' "aes_ccm_c" '-' 395s | token: '' "aes_ccm_c" '-' "128" '-' 395s | token: '-' "128" '-' "null" '' 395s | token: '-' "null" '' '' 395s | appending ESP encryption algorithm AES_CCM_16[_128] 395s | parsing integ: 395s | appending ESP integrity algorithm NONE[_0] 395s | token: '' '' '' 395s | parsing 'aes_ccm_c-192-null' for ESP 395s | proposal: 'aes_ccm_c-192-null' 395s | token: '' '' "aes_ccm_c" '-' 395s | token: '' "aes_ccm_c" '-' "192" '-' 395s | token: '-' "192" '-' "null" '' 395s | token: '-' "null" '' '' 395s | appending ESP encryption algorithm AES_CCM_16[_192] 395s | parsing integ: 395s | appending ESP integrity algorithm NONE[_0] 395s | token: '' '' '' 395s | parsing 'aes_ccm_c-256-null' for ESP 395s | proposal: 'aes_ccm_c-256-null' 395s | token: '' '' "aes_ccm_c" '-' 395s | token: '' "aes_ccm_c" '-' "256" '-' 395s | token: '-' "256" '-' "null" '' 395s | token: '-' "null" '' '' 395s | appending ESP encryption algorithm AES_CCM_16[_256] 395s | parsing integ: 395s | appending ESP integrity algorithm NONE[_0] 395s | token: '' '' '' 395s | parsing 'aes_gcm' for ESP 395s | proposal: 'aes_gcm' 395s | token: '' '' "aes_gcm" '' 395s | token: '' "aes_gcm" '' '' 395s | token: '' '' '' 395s | appending ESP encryption algorithm AES_GCM_16[_0] 395s | appending ESP integrity algorithm NONE[_0] 395s | parsing 'aes_gcm_a-128-null' for ESP 395s | proposal: 'aes_gcm_a-128-null' 395s | token: '' '' "aes_gcm_a" '-' 395s | token: '' "aes_gcm_a" '-' "128" '-' 395s | token: '-' "128" '-' "null" '' 395s | token: '-' "null" '' '' 395s | appending ESP encryption algorithm AES_GCM_8[_128] 395s | parsing integ: 395s | appending ESP integrity algorithm NONE[_0] 395s | token: '' '' '' 395s | parsing 'aes_gcm_a-192-null' for ESP 395s | proposal: 'aes_gcm_a-192-null' 395s | token: '' '' "aes_gcm_a" '-' 395s | token: '' "aes_gcm_a" '-' "192" '-' 395s | token: '-' "192" '-' "null" '' 395s | token: '-' "null" '' '' 395s | appending ESP encryption algorithm AES_GCM_8[_192] 395s | parsing integ: 395s | appending ESP integrity algorithm NONE[_0] 395s | token: '' '' '' 395s | parsing 'aes_gcm_a-256-null' for ESP 395s | proposal: 'aes_gcm_a-256-null' 395s | token: '' '' "aes_gcm_a" '-' 395s | token: '' "aes_gcm_a" '-' "256" '-' 395s | token: '-' "256" '-' "null" '' 395s | token: '-' "null" '' '' 395s | appending ESP encryption algorithm AES_GCM_8[_256] 395s | parsing integ: 395s | appending ESP integrity algorithm NONE[_0] 395s | token: '' '' '' 395s | parsing 'aes_gcm_b-128-null' for ESP 395s | proposal: 'aes_gcm_b-128-null' 395s | token: '' '' "aes_gcm_b" '-' 395s | token: '' "aes_gcm_b" '-' "128" '-' 395s | token: '-' "128" '-' "null" '' 395s | token: '-' "null" '' '' 395s | appending ESP encryption algorithm AES_GCM_12[_128] 395s | parsing integ: 395s | appending ESP integrity algorithm NONE[_0] 395s | token: '' '' '' 395s | parsing 'aes_gcm_b-192-null' for ESP 395s | proposal: 'aes_gcm_b-192-null' 395s | token: '' '' "aes_gcm_b" '-' 395s | token: '' "aes_gcm_b" '-' "192" '-' 395s | token: '-' "192" '-' "null" '' 395s | token: '-' "null" '' '' 395s | appending ESP encryption algorithm AES_GCM_12[_192] 395s | parsing integ: 395s | appending ESP integrity algorithm NONE[_0] 395s | token: '' '' '' 395s | parsing 'aes_gcm_b-256-null' for ESP 395s | proposal: 'aes_gcm_b-256-null' 395s | token: '' '' "aes_gcm_b" '-' 395s | token: '' "aes_gcm_b" '-' "256" '-' 395s | token: '-' "256" '-' "null" '' 395s | token: '-' "null" '' '' 395s | appending ESP encryption algorithm AES_GCM_12[_256] 395s | parsing integ: 395s | appending ESP integrity algorithm NONE[_0] 395s | token: '' '' '' 395s | parsing 'aes_gcm_c-128-null' for ESP 395s | proposal: 'aes_gcm_c-128-null' 395s | token: '' '' "aes_gcm_c" '-' 395s | token: '' "aes_gcm_c" '-' "128" '-' 395s | token: '-' "128" '-' "null" '' 395s | token: '-' "null" '' '' 395s | appending ESP encryption algorithm AES_GCM_16[_128] 395s | parsing integ: 395s | appending ESP integrity algorithm NONE[_0] 395s | token: '' '' '' 395s | parsing 'aes_gcm_c-192-null' for ESP 395s | proposal: 'aes_gcm_c-192-null' 395s | token: '' '' "aes_gcm_c" '-' 395s | token: '' "aes_gcm_c" '-' "192" '-' 395s | token: '-' "192" '-' "null" '' 395s | token: '-' "null" '' '' 395s | appending ESP encryption algorithm AES_GCM_16[_192] 395s | parsing integ: 395s | appending ESP integrity algorithm NONE[_0] 395s | token: '' '' '' 395s | parsing 'aes_gcm_c-256-null' for ESP 395s | proposal: 'aes_gcm_c-256-null' 395s | token: '' '' "aes_gcm_c" '-' 395s | token: '' "aes_gcm_c" '-' "256" '-' 395s | token: '-' "256" '-' "null" '' 395s | token: '-' "null" '' '' 395s | appending ESP encryption algorithm AES_GCM_16[_256] 395s | parsing integ: 395s | appending ESP integrity algorithm NONE[_0] 395s | token: '' '' '' 395s | parsing 'aes_ccm_a-null' for ESP 395s | proposal: 'aes_ccm_a-null' 395s | token: '' '' "aes_ccm_a" '-' 395s | token: '' "aes_ccm_a" '-' "null" '' 395s | token: '-' "null" '' '' 395s | appending ESP encryption algorithm AES_CCM_8[_0] 395s | parsing integ: 395s | appending ESP integrity algorithm NONE[_0] 395s | token: '' '' '' 395s | parsing 'aes_ccm_b-null' for ESP 395s | proposal: 'aes_ccm_b-null' 395s | token: '' '' "aes_ccm_b" '-' 395s | token: '' "aes_ccm_b" '-' "null" '' 395s | token: '-' "null" '' '' 395s | appending ESP encryption algorithm AES_CCM_12[_0] 395s | parsing integ: 395s | appending ESP integrity algorithm NONE[_0] 395s | token: '' '' '' 395s | parsing 'aes_ccm_c-null' for ESP 395s | proposal: 'aes_ccm_c-null' 395s | token: '' '' "aes_ccm_c" '-' 395s | token: '' "aes_ccm_c" '-' "null" '' 395s | token: '-' "null" '' '' 395s | appending ESP encryption algorithm AES_CCM_16[_0] 395s | parsing integ: 395s | appending ESP integrity algorithm NONE[_0] 395s | token: '' '' '' 395s | parsing 'aes_gcm_a-null' for ESP 395s | proposal: 'aes_gcm_a-null' 395s | token: '' '' "aes_gcm_a" '-' 395s | token: '' "aes_gcm_a" '-' "null" '' 395s | token: '-' "null" '' '' 395s | appending ESP encryption algorithm AES_GCM_8[_0] 395s | parsing integ: 395s | appending ESP integrity algorithm NONE[_0] 395s | token: '' '' '' 395s AES_CBC-HMAC_SHA1_96 395s algparse -v2 'esp=aes128-sha1' (expect SUCCESS) 395s AES_CBC_128-HMAC_SHA1_96 395s algparse -v2 'esp=aes-sha2' (expect SUCCESS) 395s AES_CBC-HMAC_SHA2_256_128 395s algparse -v2 'esp=aes-sha256' (expect SUCCESS) 395s AES_CBC-HMAC_SHA2_256_128 395s algparse -v2 'esp=aes-sha384' (expect SUCCESS) 395s AES_CBC-HMAC_SHA2_384_192 395s algparse -v2 'esp=aes-sha512' (expect SUCCESS) 395s AES_CBC-HMAC_SHA2_512_256 395s algparse -v2 'esp=aes128-aes_xcbc' (expect SUCCESS) 395s AES_CBC_128-AES_XCBC_96 395s algparse -v2 'esp=aes192-sha1' (expect SUCCESS) 395s AES_CBC_192-HMAC_SHA1_96 395s algparse -v2 'esp=aes256-sha1' (expect SUCCESS) 395s AES_CBC_256-HMAC_SHA1_96 395s algparse -v2 'esp=aes256-sha' (expect SUCCESS) 395s AES_CBC_256-HMAC_SHA1_96 395s algparse -v2 'esp=aes256-sha2' (expect SUCCESS) 395s AES_CBC_256-HMAC_SHA2_256_128 395s algparse -v2 'esp=aes256-sha2_256' (expect SUCCESS) 395s AES_CBC_256-HMAC_SHA2_256_128 395s algparse -v2 'esp=aes256-sha2_384' (expect SUCCESS) 395s AES_CBC_256-HMAC_SHA2_384_192 395s algparse -v2 'esp=aes256-sha2_512' (expect SUCCESS) 395s AES_CBC_256-HMAC_SHA2_512_256 395s algparse -v2 'esp=camellia' (expect SUCCESS) 395s CAMELLIA_CBC-HMAC_SHA2_512_256+HMAC_SHA2_256_128 395s algparse -v2 'esp=camellia128' (expect SUCCESS) 395s CAMELLIA_CBC_128-HMAC_SHA2_512_256+HMAC_SHA2_256_128 395s algparse -v2 'esp=camellia192' (expect SUCCESS) 395s CAMELLIA_CBC_192-HMAC_SHA2_512_256+HMAC_SHA2_256_128 395s algparse -v2 'esp=camellia256' (expect SUCCESS) 395s CAMELLIA_CBC_256-HMAC_SHA2_512_256+HMAC_SHA2_256_128 395s algparse -v2 'esp=aes_ccm' (expect SUCCESS) 395s AES_CCM_16-NONE 395s algparse -v2 'esp=aes_ccm_a-128-null' (expect SUCCESS) 395s AES_CCM_8_128-NONE 395s algparse -v2 'esp=aes_ccm_a-192-null' (expect SUCCESS) 395s AES_CCM_8_192-NONE 395s algparse -v2 'esp=aes_ccm_a-256-null' (expect SUCCESS) 395s AES_CCM_8_256-NONE 395s algparse -v2 'esp=aes_ccm_b-128-null' (expect SUCCESS) 395s AES_CCM_12_128-NONE 395s algparse -v2 'esp=aes_ccm_b-192-null' (expect SUCCESS) 395s AES_CCM_12_192-NONE 395s algparse -v2 'esp=aes_ccm_b-256-null' (expect SUCCESS) 395s AES_CCM_12_256-NONE 395s algparse -v2 'esp=aes_ccm_c-128-null' (expect SUCCESS) 395s AES_CCM_16_128-NONE 395s algparse -v2 'esp=aes_ccm_c-192-null' (expect SUCCESS) 395s AES_CCM_16_192-NONE 395s algparse -v2 'esp=aes_ccm_c-256-null' (expect SUCCESS) 395s AES_CCM_16_256-NONE 395s algparse -v2 'esp=aes_gcm' (expect SUCCESS) 395s AES_GCM_16-NONE 395s algparse -v2 'esp=aes_gcm_a-128-null' (expect SUCCESS) 395s AES_GCM_8_128-NONE 395s algparse -v2 'esp=aes_gcm_a-192-null' (expect SUCCESS) 395s AES_GCM_8_192-NONE 395s algparse -v2 'esp=aes_gcm_a-256-null' (expect SUCCESS) 395s AES_GCM_8_256-NONE 395s algparse -v2 'esp=aes_gcm_b-128-null' (expect SUCCESS) 395s AES_GCM_12_128-NONE 395s algparse -v2 'esp=aes_gcm_b-192-null' (expect SUCCESS) 395s AES_GCM_12_192-NONE 395s algparse -v2 'esp=aes_gcm_b-256-null' (expect SUCCESS) 395s AES_GCM_12_256-NONE 395s algparse -v2 'esp=aes_gcm_c-128-null' (expect SUCCESS) 395s AES_GCM_16_128-NONE 395s algparse -v2 'esp=aes_gcm_c-192-null' (expect SUCCESS) 395s AES_GCM_16_192-NONE 395s algparse -v2 'esp=aes_gcm_c-256-null' (expect SUCCESS) 395s AES_GCM_16_256-NONE 395s algparse -v2 'esp=aes_ccm_a-null' (expect SUCCESS) 395s AES_CCM_8-NONE 395s algparse -v2 'esp=aes_ccm_b-null' (expect SUCCESS) 395s AES_CCM_12-NONE 395s algparse -v2 'esp=aes_ccm_c-null' (expect SUCCESS) 395s AES_CCM_16-NONE 395s algparse -v2 'esp=aes_gcm_a-null' (expect SUCCESS) 395s AES_GCM_8-NONE 395s algparse -v2 'esp=aes_gcm_b-null' (expect SUCCESS) 395s AES_GCM_12-NONE 395s algparse -v2 'esp=aes_gcm_c-null' (expect SUCCESS) 395s AES_GCM_16-NONE 395s algparse -v2 'esp=aes_ccm-null' (expect SUCCESS) 395s AES_CCM_16-NONE 395s algparse -v2 'esp=aes_gcm-null' (expect SUCCESS) 395s AES_GCM_16-NONE 395s algparse -v2 'esp=aes_ccm-256-null' (expect SUCCESS) 395s AES_CCM_16_256-NONE 395s algparse -v2 'esp=aes_gcm-192-null' (expect SUCCESS) 395s AES_GCM_16_192-NONE 395s algparse -v2 'esp=aes_ccm_256-null' (expect SUCCESS) 395s AES_CCM_16_256-NONE 395s algparse -v2 'esp=aes_gcm_192-null' (expect SUCCESS) 395s AES_GCM_16_192-NONE 395s algparse -v2 'esp=aes_ccm_8-null' (expect SUCCESS) 395s AES_CCM_8-NONE 395s algparse -v2 'esp=aes_ccm_12-null' (expect SUCCESS) 395s AES_CCM_12-NONE 395s algparse -v2 'esp=aes_ccm_16-null' (expect SUCCESS) 395s AES_CCM_16-NONE 395s algparse -v2 'esp=aes_gcm_8-null' (expect SUCCESS) 395s AES_GCM_8-NONE 395s algparse -v2 'esp=aes_gcm_12-null' (expect SUCCESS) 395s AES_GCM_12-NONE 395s algparse -v2 'esp=aes_gcm_16-null' (expect SUCCESS) 395s | parsing 'aes_gcm_b-null' for ESP 395s | proposal: 'aes_gcm_b-null' 395s | token: '' '' "aes_gcm_b" '-' 395s | token: '' "aes_gcm_b" '-' "null" '' 395s | token: '-' "null" '' '' 395s | appending ESP encryption algorithm AES_GCM_12[_0] 395s | parsing integ: 395s | appending ESP integrity algorithm NONE[_0] 395s | token: '' '' '' 395s | parsing 'aes_gcm_c-null' for ESP 395s | proposal: 'aes_gcm_c-null' 395s | token: '' '' "aes_gcm_c" '-' 395s | token: '' "aes_gcm_c" '-' "null" '' 395s | token: '-' "null" '' '' 395s | appending ESP encryption algorithm AES_GCM_16[_0] 395s | parsing integ: 395s | appending ESP integrity algorithm NONE[_0] 395s | token: '' '' '' 395s | parsing 'aes_ccm-null' for ESP 395s | proposal: 'aes_ccm-null' 395s | token: '' '' "aes_ccm" '-' 395s | token: '' "aes_ccm" '-' "null" '' 395s | token: '-' "null" '' '' 395s | appending ESP encryption algorithm AES_CCM_16[_0] 395s | parsing integ: 395s | appending ESP integrity algorithm NONE[_0] 395s | token: '' '' '' 395s | parsing 'aes_gcm-null' for ESP 395s | proposal: 'aes_gcm-null' 395s | token: '' '' "aes_gcm" '-' 395s | token: '' "aes_gcm" '-' "null" '' 395s | token: '-' "null" '' '' 395s | appending ESP encryption algorithm AES_GCM_16[_0] 395s | parsing integ: 395s | appending ESP integrity algorithm NONE[_0] 395s | token: '' '' '' 395s | parsing 'aes_ccm-256-null' for ESP 395s | proposal: 'aes_ccm-256-null' 395s | token: '' '' "aes_ccm" '-' 395s | token: '' "aes_ccm" '-' "256" '-' 395s | token: '-' "256" '-' "null" '' 395s | token: '-' "null" '' '' 395s | appending ESP encryption algorithm AES_CCM_16[_256] 395s | parsing integ: 395s | appending ESP integrity algorithm NONE[_0] 395s | token: '' '' '' 395s | parsing 'aes_gcm-192-null' for ESP 395s | proposal: 'aes_gcm-192-null' 395s | token: '' '' "aes_gcm" '-' 395s | token: '' "aes_gcm" '-' "192" '-' 395s | token: '-' "192" '-' "null" '' 395s | token: '-' "null" '' '' 395s | appending ESP encryption algorithm AES_GCM_16[_192] 395s | parsing integ: 395s | appending ESP integrity algorithm NONE[_0] 395s | token: '' '' '' 395s | parsing 'aes_ccm_256-null' for ESP 395s | proposal: 'aes_ccm_256-null' 395s | token: '' '' "aes_ccm_256" '-' 395s | token: '' "aes_ccm_256" '-' "null" '' 395s | ike_alg_byname() failed: ESP encryption algorithm 'aes_ccm_256' is not recognized 395s | token: '-' "null" '' '' 395s | appending ESP encryption algorithm AES_CCM_16[_256] 395s | parsing integ: 395s | appending ESP integrity algorithm NONE[_0] 395s | token: '' '' '' 395s | parsing 'aes_gcm_192-null' for ESP 395s | proposal: 'aes_gcm_192-null' 395s | token: '' '' "aes_gcm_192" '-' 395s | token: '' "aes_gcm_192" '-' "null" '' 395s | ike_alg_byname() failed: ESP encryption algorithm 'aes_gcm_192' is not recognized 395s | token: '-' "null" '' '' 395s | appending ESP encryption algorithm AES_GCM_16[_192] 395s | parsing integ: 395s | appending ESP integrity algorithm NONE[_0] 395s | token: '' '' '' 395s | parsing 'aes_ccm_8-null' for ESP 395s | proposal: 'aes_ccm_8-null' 395s | token: '' '' "aes_ccm_8" '-' 395s | token: '' "aes_ccm_8" '-' "null" '' 395s | token: '-' "null" '' '' 395s | appending ESP encryption algorithm AES_CCM_8[_0] 395s | parsing integ: 395s | appending ESP integrity algorithm NONE[_0] 395s | token: '' '' '' 395s | parsing 'aes_ccm_12-null' for ESP 395s | proposal: 'aes_ccm_12-null' 395s | token: '' '' "aes_ccm_12" '-' 395s | token: '' "aes_ccm_12" '-' "null" '' 395s | token: '-' "null" '' '' 395s | appending ESP encryption algorithm AES_CCM_12[_0] 395s | parsing integ: 395s | appending ESP integrity algorithm NONE[_0] 395s | token: '' '' '' 395s | parsing 'aes_ccm_16-null' for ESP 395s | proposal: 'aes_ccm_16-null' 395s | token: '' '' "aes_ccm_16" '-' 395s | token: '' "aes_ccm_16" '-' "null" '' 395s | token: '-' "null" '' '' 395s | appending ESP encryption algorithm AES_CCM_16[_0] 395s | parsing integ: 395s | appending ESP integrity algorithm NONE[_0] 395s | token: '' '' '' 395s | parsing 'aes_gcm_8-null' for ESP 395s | proposal: 'aes_gcm_8-null' 395s | token: '' '' "aes_gcm_8" '-' 395s | token: '' "aes_gcm_8" '-' "null" '' 395s | token: '-' "null" '' '' 395s | appending ESP encryption algorithm AES_GCM_8[_0] 395s | parsing integ: 395s | appending ESP integrity algorithm NONE[_0] 395s | token: '' '' '' 395s | parsing 'aes_gcm_12-null' for ESP 395s | proposal: 'aes_gcm_12-null' 395s | token: '' '' "aes_gcm_12" '-' 395s | token: '' "aes_gcm_12" '-' "null" '' 395s | token: '-' "null" '' '' 395s | appending ESP encryption algorithm AES_GCM_12[_0] 395s | parsing integ: 395s | appending ESP integrity algorithm NONE[_0] 395s | token: '' '' '' 395s | parsing 'aes_gcm_16-null' for ESP 395s | proposal: 'aes_gcm_16-null' 395s | token: '' '' "aes_gcm_16" '-' 395s | token: '' "aes_gcm_16" '-' "null" '' 395s | token: '-' "null" '' '' 395s | appending ESP encryption algorithm AES_GCM_16[_0] 395s | parsing integ: 395s | appending ESP integrity algorithm NONE[_0] 395s | token: '' '' '' 395s | parsing 'aes_ccm_8-128-null' for ESP 395s | proposal: 'aes_ccm_8-128-null' 395s | token: '' '' "aes_ccm_8" '-' 395s | token: '' "aes_ccm_8" '-' "128" '-' 395s | token: '-' "128" '-' "null" '' 395s | token: '-' "null" '' '' 395s | appending ESP encryption algorithm AES_CCM_8[_128] 395s | parsing integ: 395s AES_GCM_16-NONE 395s algparse -v2 'esp=aes_ccm_8-128-null' (expect SUCCESS) 395s AES_CCM_8_128-NONE 395s algparse -v2 'esp=aes_ccm_12-192-null' (expect SUCCESS) 395s AES_CCM_12_192-NONE 395s algparse -v2 'esp=aes_ccm_16-256-null' (expect SUCCESS) 395s AES_CCM_16_256-NONE 395s algparse -v2 'esp=aes_gcm_8-128-null' (expect SUCCESS) 395s AES_GCM_8_128-NONE 395s algparse -v2 'esp=aes_gcm_12-192-null' (expect SUCCESS) 395s AES_GCM_12_192-NONE 395s algparse -v2 'esp=aes_gcm_16-256-null' (expect SUCCESS) 395s AES_GCM_16_256-NONE 395s algparse -v2 'esp=aes_ccm_8_128-null' (expect SUCCESS) 395s AES_CCM_8_128-NONE 395s algparse -v2 'esp=aes_ccm_12_192-null' (expect SUCCESS) 395s AES_CCM_12_192-NONE 395s algparse -v2 'esp=aes_ccm_16_256-null' (expect SUCCESS) 395s AES_CCM_16_256-NONE 395s algparse -v2 'esp=aes_gcm_8_128-null' (expect SUCCESS) 395s AES_GCM_8_128-NONE 395s algparse -v2 'esp=aes_gcm_12_192-null' (expect SUCCESS) 395s AES_GCM_12_192-NONE 395s algparse -v2 'esp=aes_gcm_16_256-null' (expect SUCCESS) 395s AES_GCM_16_256-NONE 395s algparse -v2 'esp=aes_ctr' (expect SUCCESS) 395s AES_CTR-HMAC_SHA2_512_256+HMAC_SHA2_256_128 395s algparse -v2 'esp=aesctr' (expect SUCCESS) 395s AES_CTR-HMAC_SHA2_512_256+HMAC_SHA2_256_128 395s algparse -v2 'esp=aes_ctr128' (expect SUCCESS) 395s AES_CTR_128-HMAC_SHA2_512_256+HMAC_SHA2_256_128 395s algparse -v2 'esp=aes_ctr192' (expect SUCCESS) 395s AES_CTR_192-HMAC_SHA2_512_256+HMAC_SHA2_256_128 395s algparse -v2 'esp=aes_ctr256' (expect SUCCESS) 395s AES_CTR_256-HMAC_SHA2_512_256+HMAC_SHA2_256_128 395s algparse -v2 'esp=camellia_cbc_256-hmac_sha2_512_256;modp8192' (expect SUCCESS) 395s CAMELLIA_CBC_256-HMAC_SHA2_512_256 395s algparse -v2 'esp=null_auth_aes_gmac_256-null;modp8192' (expect SUCCESS) 395s | appending ESP integrity algorithm NONE[_0] 395s | token: '' '' '' 395s | parsing 'aes_ccm_12-192-null' for ESP 395s | proposal: 'aes_ccm_12-192-null' 395s | token: '' '' "aes_ccm_12" '-' 395s | token: '' "aes_ccm_12" '-' "192" '-' 395s | token: '-' "192" '-' "null" '' 395s | token: '-' "null" '' '' 395s | appending ESP encryption algorithm AES_CCM_12[_192] 395s | parsing integ: 395s | appending ESP integrity algorithm NONE[_0] 395s | token: '' '' '' 395s | parsing 'aes_ccm_16-256-null' for ESP 395s | proposal: 'aes_ccm_16-256-null' 395s | token: '' '' "aes_ccm_16" '-' 395s | token: '' "aes_ccm_16" '-' "256" '-' 395s | token: '-' "256" '-' "null" '' 395s | token: '-' "null" '' '' 395s | appending ESP encryption algorithm AES_CCM_16[_256] 395s | parsing integ: 395s | appending ESP integrity algorithm NONE[_0] 395s | token: '' '' '' 395s | parsing 'aes_gcm_8-128-null' for ESP 395s | proposal: 'aes_gcm_8-128-null' 395s | token: '' '' "aes_gcm_8" '-' 395s | token: '' "aes_gcm_8" '-' "128" '-' 395s | token: '-' "128" '-' "null" '' 395s | token: '-' "null" '' '' 395s | appending ESP encryption algorithm AES_GCM_8[_128] 395s | parsing integ: 395s | appending ESP integrity algorithm NONE[_0] 395s | token: '' '' '' 395s | parsing 'aes_gcm_12-192-null' for ESP 395s | proposal: 'aes_gcm_12-192-null' 395s | token: '' '' "aes_gcm_12" '-' 395s | token: '' "aes_gcm_12" '-' "192" '-' 395s | token: '-' "192" '-' "null" '' 395s | token: '-' "null" '' '' 395s | appending ESP encryption algorithm AES_GCM_12[_192] 395s | parsing integ: 395s | appending ESP integrity algorithm NONE[_0] 395s | token: '' '' '' 395s | parsing 'aes_gcm_16-256-null' for ESP 395s | proposal: 'aes_gcm_16-256-null' 395s | token: '' '' "aes_gcm_16" '-' 395s | token: '' "aes_gcm_16" '-' "256" '-' 395s | token: '-' "256" '-' "null" '' 395s | token: '-' "null" '' '' 395s | appending ESP encryption algorithm AES_GCM_16[_256] 395s | parsing integ: 395s | appending ESP integrity algorithm NONE[_0] 395s | token: '' '' '' 395s | parsing 'aes_ccm_8_128-null' for ESP 395s | proposal: 'aes_ccm_8_128-null' 395s | token: '' '' "aes_ccm_8_128" '-' 395s | token: '' "aes_ccm_8_128" '-' "null" '' 395s | ike_alg_byname() failed: ESP encryption algorithm 'aes_ccm_8_128' is not recognized 395s | token: '-' "null" '' '' 395s | appending ESP encryption algorithm AES_CCM_8[_128] 395s | parsing integ: 395s | appending ESP integrity algorithm NONE[_0] 395s | token: '' '' '' 395s | parsing 'aes_ccm_12_192-null' for ESP 395s | proposal: 'aes_ccm_12_192-null' 395s | token: '' '' "aes_ccm_12_192" '-' 395s | token: '' "aes_ccm_12_192" '-' "null" '' 395s | ike_alg_byname() failed: ESP encryption algorithm 'aes_ccm_12_192' is not recognized 395s | token: '-' "null" '' '' 395s | appending ESP encryption algorithm AES_CCM_12[_192] 395s | parsing integ: 395s | appending ESP integrity algorithm NONE[_0] 395s | token: '' '' '' 395s | parsing 'aes_ccm_16_256-null' for ESP 395s | proposal: 'aes_ccm_16_256-null' 395s | token: '' '' "aes_ccm_16_256" '-' 395s | token: '' "aes_ccm_16_256" '-' "null" '' 395s | ike_alg_byname() failed: ESP encryption algorithm 'aes_ccm_16_256' is not recognized 395s | token: '-' "null" '' '' 395s | appending ESP encryption algorithm AES_CCM_16[_256] 395s | parsing integ: 395s | appending ESP integrity algorithm NONE[_0] 395s | token: '' '' '' 395s | parsing 'aes_gcm_8_128-null' for ESP 395s | proposal: 'aes_gcm_8_128-null' 395s | token: '' '' "aes_gcm_8_128" '-' 395s | token: '' "aes_gcm_8_128" '-' "null" '' 395s | ike_alg_byname() failed: ESP encryption algorithm 'aes_gcm_8_128' is not recognized 395s | token: '-' "null" '' '' 395s | appending ESP encryption algorithm AES_GCM_8[_128] 395s | parsing integ: 395s | appending ESP integrity algorithm NONE[_0] 395s | token: '' '' '' 395s | parsing 'aes_gcm_12_192-null' for ESP 395s | proposal: 'aes_gcm_12_192-null' 395s | token: '' '' "aes_gcm_12_192" '-' 395s | token: '' "aes_gcm_12_192" '-' "null" '' 395s | ike_alg_byname() failed: ESP encryption algorithm 'aes_gcm_12_192' is not recognized 395s | token: '-' "null" '' '' 395s | appending ESP encryption algorithm AES_GCM_12[_192] 395s | parsing integ: 395s | appending ESP integrity algorithm NONE[_0] 395s | token: '' '' '' 395s | parsing 'aes_gcm_16_256-null' for ESP 395s | proposal: 'aes_gcm_16_256-null' 395s | token: '' '' "aes_gcm_16_256" '-' 395s | token: '' "aes_gcm_16_256" '-' "null" '' 395s | ike_alg_byname() failed: ESP encryption algorithm 'aes_gcm_16_256' is not recognized 395s | token: '-' "null" '' '' 395s | appending ESP encryption algorithm AES_GCM_16[_256] 395s | parsing integ: 395s | appending ESP integrity algorithm NONE[_0] 395s | token: '' '' '' 395s | parsing 'aes_ctr' for ESP 395s | proposal: 'aes_ctr' 395s | token: '' '' "aes_ctr" '' 395s | token: '' "aes_ctr" '' '' 395s | token: '' '' '' 395s | appending ESP encryption algorithm AES_CTR[_0] 395s | appending ESP integrity algorithm HMAC_SHA2_512_256[_0] 395s | appending ESP integrity algorithm HMAC_SHA2_256_128[_0] 395s | parsing 'aesctr' for ESP 395s | proposal: 'aesctr' 395s | token: '' '' "aesctr" '' 395s | token: '' "aesctr" '' '' 395s | token: '' '' '' 395s | appending ESP encryption algorithm AES_CTR[_0] 395s | appending ESP integrity algorithm HMAC_SHA2_512_256[_0] 395s | appending ESP integrity algorithm HMAC_SHA2_256_128[_0] 395s | parsing 'aes_ctr128' for ESP 395s | proposal: 'aes_ctr128' 395s | token: '' '' "aes_ctr128" '' 395s | token: '' "aes_ctr128" '' '' 395s | ike_alg_byname() failed: ESP encryption algorithm 'aes_ctr128' is not recognized 395s | token: '' '' '' 395s | appending ESP encryption algorithm AES_CTR[_128] 395s | appending ESP integrity algorithm HMAC_SHA2_512_256[_0] 395s | appending ESP integrity algorithm HMAC_SHA2_256_128[_0] 395s | parsing 'aes_ctr192' for ESP 395s | proposal: 'aes_ctr192' 395s | token: '' '' "aes_ctr192" '' 395s | token: '' "aes_ctr192" '' '' 395s | ike_alg_byname() failed: ESP encryption algorithm 'aes_ctr192' is not recognized 395s | token: '' '' '' 395s | appending ESP encryption algorithm AES_CTR[_192] 395s | appending ESP integrity algorithm HMAC_SHA2_512_256[_0] 395s | appending ESP integrity algorithm HMAC_SHA2_256_128[_0] 395s | parsing 'aes_ctr256' for ESP 395s | proposal: 'aes_ctr256' 395s | token: '' '' "aes_ctr256" '' 395s | token: '' "aes_ctr256" '' '' 395s | ike_alg_byname() failed: ESP encryption algorithm 'aes_ctr256' is not recognized 395s | token: '' '' '' 395s | appending ESP encryption algorithm AES_CTR[_256] 395s | appending ESP integrity algorithm HMAC_SHA2_512_256[_0] 395s | appending ESP integrity algorithm HMAC_SHA2_256_128[_0] 395s | parsing 'camellia_cbc_256-hmac_sha2_512_256;modp8192' for ESP 395s | proposal: 'camellia_cbc_256-hmac_sha2_512_256;modp8192' 395s | token: '' '' "camellia_cbc_256" '-' 395s | token: '' "camellia_cbc_256" '-' "hmac_sha2_512_256" ';' 395s | ike_alg_byname() failed: ESP encryption algorithm 'camellia_cbc_256' is not recognized 395s | token: '-' "hmac_sha2_512_256" ';' "modp8192" '' 395s | appending ESP encryption algorithm CAMELLIA_CBC[_256] 395s | parsing integ: 395s | appending ESP integrity algorithm HMAC_SHA2_512_256[_0] 395s | token: ';' "modp8192" '' '' 395s | parsing dh: 395s | appending ESP DH algorithm MODP8192[_0] 395s | token: '' '' '' 395s ipsec algparse: ignoring ESP DH algorithm MODP8192 as PFS policy is disabled 395s | parsing 'null_auth_aes_gmac_256-null;modp8192' for ESP 395s | proposal: 'null_auth_aes_gmac_256-null;modp8192' 395s | token: '' '' "null_auth_aes_gmac_256" '-' 395s | token: '' "null_auth_aes_gmac_256" '-' "null" ';' 395s | ike_alg_byname() failed: ESP encryption algorithm 'null_auth_aes_gmac_256' is not recognized 395s | token: '-' "null" ';' "modp8192" '' 395s | appending ESP encryption algorithm NULL_AUTH_AES_GMAC[_256] 395s | parsing integ: 395s | appending ESP integrity algorithm NONE[_0] 395s | token: ';' "modp8192" '' '' 395s | parsing dh: 395s | appending ESP DH algorithm MODP8192[_0] 395s | token: '' '' '' 395s ipsec algparse: ignoring ESP DH algorithm MODP8192 as PFS policy is disabled 395s NULL_AUTH_AES_GMAC_256-NONE 395s algparse -v2 'esp=3des-sha1;modp8192' (expect SUCCESS) 395s 3DES_CBC-HMAC_SHA1_96 395s algparse -v2 'esp=3des-sha1-modp8192' (expect SUCCESS) 395s 3DES_CBC-HMAC_SHA1_96 395s algparse -v2 'esp=aes-sha1,3des-sha1;modp8192' (expect SUCCESS) 395s AES_CBC-HMAC_SHA1_96 395s 3DES_CBC-HMAC_SHA1_96 395s algparse -v2 'esp=aes-sha1-modp8192,3des-sha1-modp8192' (expect SUCCESS) 395s AES_CBC-HMAC_SHA1_96 395s 3DES_CBC-HMAC_SHA1_96 395s algparse -v2 'esp=aes-sha1-modp8192,aes-sha1-modp8192,aes-sha1-modp8192' (expect SUCCESS) 395s AES_CBC-HMAC_SHA1_96 395s algparse -v2 'esp=aes;none' (expect SUCCESS) 395s AES_CBC-HMAC_SHA2_512_256+HMAC_SHA2_256_128 395s algparse -v2 'esp=aes;none,aes' (expect SUCCESS) 395s AES_CBC-HMAC_SHA2_512_256+HMAC_SHA2_256_128 395s AES_CBC-HMAC_SHA2_512_256+HMAC_SHA2_256_128 395s algparse -v2 'esp=aes;none,aes;modp2048' (expect SUCCESS) 395s AES_CBC-HMAC_SHA2_512_256+HMAC_SHA2_256_128 395s AES_CBC-HMAC_SHA2_512_256+HMAC_SHA2_256_128 395s algparse -v2 'esp=aes-sha1-none' (expect SUCCESS) 395s AES_CBC-HMAC_SHA1_96 395s algparse -v2 'esp=aes-sha1;none' (expect SUCCESS) 395s AES_CBC-HMAC_SHA1_96 395s algparse -v2 'esp=3des168-sha1' (expect ERROR) 395s ERROR: ESP encryption algorithm 3DES_CBC does not allow a key lengths 395s algparse -v2 'esp=3des-null' (expect ERROR) 395s ERROR: non-AEAD ESP encryption algorithm 3DES_CBC cannot have 'NONE' as the integrity algorithm 395s algparse -v2 'esp=aes128-null' (expect ERROR) 395s ERROR: non-AEAD ESP encryption algorithm AES_CBC cannot have 'NONE' as the integrity algorithm 395s algparse -v2 'esp=aes224-sha1' (expect ERROR) 395s ERROR: ESP encryption algorithm AES_CBC with key length 224 invalid; valid key lengths: 128, 192, 256 395s algparse -v2 'esp=aes-224-sha1' (expect ERROR) 395s ERROR: ESP encryption algorithm AES_CBC with key length 224 invalid; valid key lengths: 128, 192, 256 395s algparse -v2 'esp=aes0-sha1' (expect ERROR) 395s ERROR: ESP encryption key length is zero 395s algparse -v2 'esp=aes-0-sha1' (expect ERROR) 395s ERROR: ESP encryption key length is zero 395s algparse -v2 'esp=aes512-sha1' (expect ERROR) 395s ERROR: ESP encryption algorithm AES_CBC with key length 512 invalid; valid key lengths: 128, 192, 256 395s algparse -v2 'esp=aes-sha1555' (expect ERROR) 395s ERROR: ESP integrity algorithm 'sha1555' is not recognized 395s algparse -v2 'esp=camellia666-sha1' (expect ERROR) 395s ERROR: ESP encryption algorithm CAMELLIA_CBC with key length 666 invalid; valid key lengths: 128, 192, 256 395s algparse -v2 'esp=blowfish' (expect ERROR) 395s ERROR: ESP encryption algorithm 'blowfish' is not supported 395s algparse -v2 'esp=des-sha1' (expect ERROR) 395s ERROR: ESP encryption algorithm 'des' is not supported 395s algparse -v2 'esp=aes_ctr666' (expect ERROR) 395s ERROR: ESP encryption algorithm AES_CTR with key length 666 invalid; valid key lengths: 128, 192, 256 395s algparse -v2 'esp=aes128-sha2_128' (expect ERROR) 395s ERROR: ESP integrity algorithm 'sha2_128' is not recognized 395s algparse -v2 'esp=aes256-sha2_256-4096' (expect ERROR) 395s ERROR: ESP DH algorithm '4096' is not recognized 395s algparse -v2 'esp=aes256-sha2_256-128' (expect ERROR) 395s ERROR: ESP DH algorithm '128' is not recognized 395s algparse -v2 'esp=vanitycipher' (expect ERROR) 395s ERROR: ESP encryption algorithm 'vanitycipher' is not recognized 395s algparse -v2 'esp=ase-sah' (expect ERROR) 395s ERROR: ESP encryption algorithm 'ase' is not recognized 395s algparse -v2 'esp=aes-sah1' (expect ERROR) 395s ERROR: ESP integrity algorithm 'sah1' is not recognized 395s algparse -v2 'esp=id3' (expect ERROR) 395s ERROR: ESP encryption algorithm 'id3' is not recognized 395s algparse -v2 'esp=aes-id3' (expect ERROR) 395s ERROR: ESP integrity algorithm 'id3' is not recognized 395s algparse -v2 'esp=aes_gcm-md5' (expect ERROR) 395s ERROR: AEAD ESP encryption algorithm AES_GCM_16 must have 'NONE' as the integrity algorithm 395s algparse -v2 'esp=mars' (expect ERROR) 395s ERROR: ESP encryption algorithm 'mars' is not supported 395s algparse -v2 'esp=aes_gcm-16' (expect ERROR) 395s ERROR: ESP encryption algorithm AES_GCM_16 with key length 16 invalid; valid key lengths: 128, 192, 256 395s algparse -v2 'esp=aes_gcm-0' (expect ERROR) 395s ERROR: ESP encryption key length is zero 395s algparse -v2 'esp=aes_gcm-123456789012345' (expect ERROR) 395s ERROR: ESP encryption algorithm 'aes_gcm-123456789012345' key length WAY too big 395s algparse -v2 'esp=3des-sha1;dh22' (expect ERROR) 395s ERROR: ESP DH algorithm 'dh22' is not supported 395s algparse -v2 'esp=3des-sha1;modp8192,3des-sha2' (expect SUCCESS) 395s 3DES_CBC-HMAC_SHA1_96 395s 3DES_CBC-HMAC_SHA2_256_128 395s algparse -v2 'esp=3des-sha1-modp8192,3des-sha2' (expect SUCCESS) 395s 3DES_CBC-HMAC_SHA1_96 395s 3DES_CBC-HMAC_SHA2_256_128 395s algparse -v2 'esp=3des-sha1-modp8192,3des-sha2-modp8192' (expect SUCCESS) 395s 3DES_CBC-HMAC_SHA1_96 395s 3DES_CBC-HMAC_SHA2_256_128 395s algparse -v2 'esp=3des-sha1-modp8192,3des-sha2;modp8192' (expect SUCCESS) 395s 3DES_CBC-HMAC_SHA1_96 395s 3DES_CBC-HMAC_SHA2_256_128 395s algparse -v2 'esp=3des-sha1;modp8192,3des-sha2-modp8192' (expect SUCCESS) 395s | parsing '3des-sha1;modp8192' for ESP 395s | proposal: '3des-sha1;modp8192' 395s | token: '' '' "3des" '-' 395s | token: '' "3des" '-' "sha1" ';' 395s | token: '-' "sha1" ';' "modp8192" '' 395s | appending ESP encryption algorithm 3DES_CBC[_0] 395s | parsing integ: 395s | appending ESP integrity algorithm HMAC_SHA1_96[_0] 395s | token: ';' "modp8192" '' '' 395s | parsing dh: 395s | appending ESP DH algorithm MODP8192[_0] 395s | token: '' '' '' 395s ipsec algparse: ignoring ESP DH algorithm MODP8192 as PFS policy is disabled 395s | parsing '3des-sha1-modp8192' for ESP 395s | proposal: '3des-sha1-modp8192' 395s | token: '' '' "3des" '-' 395s | token: '' "3des" '-' "sha1" '-' 395s | token: '-' "sha1" '-' "modp8192" '' 395s | appending ESP encryption algorithm 3DES_CBC[_0] 395s | parsing integ: 395s | appending ESP integrity algorithm HMAC_SHA1_96[_0] 395s | token: '-' "modp8192" '' '' 395s | parsing dh: 395s | appending ESP DH algorithm MODP8192[_0] 395s | token: '' '' '' 395s ipsec algparse: ignoring ESP DH algorithm MODP8192 as PFS policy is disabled 395s | parsing 'aes-sha1,3des-sha1;modp8192' for ESP 395s | proposal: 'aes-sha1' 395s | token: '' '' "aes" '-' 395s | token: '' "aes" '-' "sha1" '' 395s | token: '-' "sha1" '' '' 395s | appending ESP encryption algorithm AES_CBC[_0] 395s | parsing integ: 395s | appending ESP integrity algorithm HMAC_SHA1_96[_0] 395s | token: '' '' '' 395s | proposal: '3des-sha1;modp8192' 395s | token: '' '' "3des" '-' 395s | token: '' "3des" '-' "sha1" ';' 395s | token: '-' "sha1" ';' "modp8192" '' 395s | appending ESP encryption algorithm 3DES_CBC[_0] 395s | parsing integ: 395s | appending ESP integrity algorithm HMAC_SHA1_96[_0] 395s | token: ';' "modp8192" '' '' 395s | parsing dh: 395s | appending ESP DH algorithm MODP8192[_0] 395s | token: '' '' '' 395s ipsec algparse: ignoring ESP DH algorithm MODP8192 as PFS policy is disabled 395s | parsing 'aes-sha1-modp8192,3des-sha1-modp8192' for ESP 395s | proposal: 'aes-sha1-modp8192' 395s | token: '' '' "aes" '-' 395s | token: '' "aes" '-' "sha1" '-' 395s | token: '-' "sha1" '-' "modp8192" '' 395s | appending ESP encryption algorithm AES_CBC[_0] 395s | parsing integ: 395s | appending ESP integrity algorithm HMAC_SHA1_96[_0] 395s | token: '-' "modp8192" '' '' 395s | parsing dh: 395s | appending ESP DH algorithm MODP8192[_0] 395s | token: '' '' '' 395s | proposal: '3des-sha1-modp8192' 395s | token: '' '' "3des" '-' 395s | token: '' "3des" '-' "sha1" '-' 395s | token: '-' "sha1" '-' "modp8192" '' 395s | appending ESP encryption algorithm 3DES_CBC[_0] 395s | parsing integ: 395s | appending ESP integrity algorithm HMAC_SHA1_96[_0] 395s | token: '-' "modp8192" '' '' 395s | parsing dh: 395s | appending ESP DH algorithm MODP8192[_0] 395s | token: '' '' '' 395s ipsec algparse: ignoring ESP DH algorithm MODP8192 as PFS policy is disabled 395s ipsec algparse: ignoring ESP DH algorithm MODP8192 as PFS policy is disabled 395s | parsing 'aes-sha1-modp8192,aes-sha1-modp8192,aes-sha1-modp8192' for ESP 395s | proposal: 'aes-sha1-modp8192' 395s | token: '' '' "aes" '-' 395s | token: '' "aes" '-' "sha1" '-' 395s | token: '-' "sha1" '-' "modp8192" '' 395s | appending ESP encryption algorithm AES_CBC[_0] 395s | parsing integ: 395s | appending ESP integrity algorithm HMAC_SHA1_96[_0] 395s | token: '-' "modp8192" '' '' 395s | parsing dh: 395s | appending ESP DH algorithm MODP8192[_0] 395s | token: '' '' '' 395s | proposal: 'aes-sha1-modp8192' 395s | token: '' '' "aes" '-' 395s | token: '' "aes" '-' "sha1" '-' 395s | token: '-' "sha1" '-' "modp8192" '' 395s | appending ESP encryption algorithm AES_CBC[_0] 395s | parsing integ: 395s | appending ESP integrity algorithm HMAC_SHA1_96[_0] 395s | token: '-' "modp8192" '' '' 395s | parsing dh: 395s | appending ESP DH algorithm MODP8192[_0] 395s | token: '' '' '' 395s | proposal: 'aes-sha1-modp8192' 395s | token: '' '' "aes" '-' 395s | token: '' "aes" '-' "sha1" '-' 395s | token: '-' "sha1" '-' "modp8192" '' 395s | appending ESP encryption algorithm AES_CBC[_0] 395s | parsing integ: 395s | appending ESP integrity algorithm HMAC_SHA1_96[_0] 395s | token: '-' "modp8192" '' '' 395s | parsing dh: 395s | appending ESP DH algorithm MODP8192[_0] 395s | token: '' '' '' 395s ipsec algparse: ignoring ESP DH algorithm MODP8192 as PFS policy is disabled 395s | parsing 'aes;none' for ESP 395s | proposal: 'aes;none' 395s | token: '' '' "aes" ';' 395s | token: '' "aes" ';' "none" '' 395s | token: ';' "none" '' '' 395s | appending ESP encryption algorithm AES_CBC[_0] 395s | parsing dh: 395s | appending ESP DH algorithm NONE[_0] 395s | token: '' '' '' 395s | appending ESP integrity algorithm HMAC_SHA2_512_256[_0] 395s | appending ESP integrity algorithm HMAC_SHA2_256_128[_0] 395s ipsec algparse: ignoring redundant ESP DH algorithm NONE as PFS policy is disabled 395s | parsing 'aes;none,aes' for ESP 395s | proposal: 'aes;none' 395s | token: '' '' "aes" ';' 395s | token: '' "aes" ';' "none" '' 395s | token: ';' "none" '' '' 395s | appending ESP encryption algorithm AES_CBC[_0] 395s | parsing dh: 395s | appending ESP DH algorithm NONE[_0] 395s | token: '' '' '' 395s | appending ESP integrity algorithm HMAC_SHA2_512_256[_0] 395s | appending ESP integrity algorithm HMAC_SHA2_256_128[_0] 395s | proposal: 'aes' 395s | token: '' '' "aes" '' 395s | token: '' "aes" '' '' 395s | token: '' '' '' 395s | appending ESP encryption algorithm AES_CBC[_0] 395s | appending ESP integrity algorithm HMAC_SHA2_512_256[_0] 395s | appending ESP integrity algorithm HMAC_SHA2_256_128[_0] 395s ipsec algparse: ignoring redundant ESP DH algorithm NONE as PFS policy is disabled 395s | parsing 'aes;none,aes;modp2048' for ESP 395s | proposal: 'aes;none' 395s | token: '' '' "aes" ';' 395s | token: '' "aes" ';' "none" '' 395s | token: ';' "none" '' '' 395s | appending ESP encryption algorithm AES_CBC[_0] 395s | parsing dh: 395s | appending ESP DH algorithm NONE[_0] 395s | token: '' '' '' 395s | appending ESP integrity algorithm HMAC_SHA2_512_256[_0] 395s | appending ESP integrity algorithm HMAC_SHA2_256_128[_0] 395s | proposal: 'aes;modp2048' 395s | token: '' '' "aes" ';' 395s | token: '' "aes" ';' "modp2048" '' 395s | token: ';' "modp2048" '' '' 395s | appending ESP encryption algorithm AES_CBC[_0] 395s | parsing dh: 395s | appending ESP DH algorithm MODP2048[_0] 395s | token: '' '' '' 395s | appending ESP integrity algorithm HMAC_SHA2_512_256[_0] 395s | appending ESP integrity algorithm HMAC_SHA2_256_128[_0] 395s ipsec algparse: ignoring redundant ESP DH algorithm NONE as PFS policy is disabled 395s ipsec algparse: ignoring ESP DH algorithm MODP2048 as PFS policy is disabled 395s | parsing 'aes-sha1-none' for ESP 395s | proposal: 'aes-sha1-none' 395s | token: '' '' "aes" '-' 395s | token: '' "aes" '-' "sha1" '-' 395s | token: '-' "sha1" '-' "none" '' 395s | appending ESP encryption algorithm AES_CBC[_0] 395s | parsing integ: 395s | appending ESP integrity algorithm HMAC_SHA1_96[_0] 395s | token: '-' "none" '' '' 395s | parsing dh: 395s | appending ESP DH algorithm NONE[_0] 395s | token: '' '' '' 395s ipsec algparse: ignoring redundant ESP DH algorithm NONE as PFS policy is disabled 395s | parsing 'aes-sha1;none' for ESP 395s | proposal: 'aes-sha1;none' 395s | token: '' '' "aes" '-' 395s | token: '' "aes" '-' "sha1" ';' 395s | token: '-' "sha1" ';' "none" '' 395s | appending ESP encryption algorithm AES_CBC[_0] 395s | parsing integ: 395s | appending ESP integrity algorithm HMAC_SHA1_96[_0] 395s | token: ';' "none" '' '' 395s | parsing dh: 395s | appending ESP DH algorithm NONE[_0] 395s | token: '' '' '' 395s ipsec algparse: ignoring redundant ESP DH algorithm NONE as PFS policy is disabled 395s | parsing '3des168-sha1' for ESP 395s | proposal: '3des168-sha1' 395s | token: '' '' "3des168" '-' 395s | token: '' "3des168" '-' "sha1" '' 395s | ike_alg_byname() failed: ESP encryption algorithm '3des168' is not recognized 395s | parsing '3des-null' for ESP 395s | proposal: '3des-null' 395s | token: '' '' "3des" '-' 395s | token: '' "3des" '-' "null" '' 395s | token: '-' "null" '' '' 395s | appending ESP encryption algorithm 3DES_CBC[_0] 395s | parsing integ: 395s | appending ESP integrity algorithm NONE[_0] 395s | token: '' '' '' 395s | parsing 'aes128-null' for ESP 395s | proposal: 'aes128-null' 395s | token: '' '' "aes128" '-' 395s | token: '' "aes128" '-' "null" '' 395s | ike_alg_byname() failed: ESP encryption algorithm 'aes128' is not recognized 395s | token: '-' "null" '' '' 395s | appending ESP encryption algorithm AES_CBC[_128] 395s | parsing integ: 395s | appending ESP integrity algorithm NONE[_0] 395s | token: '' '' '' 395s | parsing 'aes224-sha1' for ESP 395s | proposal: 'aes224-sha1' 395s | token: '' '' "aes224" '-' 395s | token: '' "aes224" '-' "sha1" '' 395s | ike_alg_byname() failed: ESP encryption algorithm 'aes224' is not recognized 395s | parsing 'aes-224-sha1' for ESP 395s | proposal: 'aes-224-sha1' 395s | token: '' '' "aes" '-' 395s | token: '' "aes" '-' "224" '-' 395s | byname('aes') with ='224' failed: ESP encryption algorithm AES_CBC with key length 224 invalid; valid key lengths: 128, 192, 256 395s | parsing 'aes0-sha1' for ESP 395s | proposal: 'aes0-sha1' 395s | token: '' '' "aes0" '-' 395s | token: '' "aes0" '-' "sha1" '' 395s | ike_alg_byname() failed: ESP encryption algorithm 'aes0' is not recognized 395s | parsing 'aes-0-sha1' for ESP 395s | proposal: 'aes-0-sha1' 395s | token: '' '' "aes" '-' 395s | token: '' "aes" '-' "0" '-' 395s | parsing 'aes512-sha1' for ESP 395s | proposal: 'aes512-sha1' 395s | token: '' '' "aes512" '-' 395s | token: '' "aes512" '-' "sha1" '' 395s | ike_alg_byname() failed: ESP encryption algorithm 'aes512' is not recognized 395s | parsing 'aes-sha1555' for ESP 395s | proposal: 'aes-sha1555' 395s | token: '' '' "aes" '-' 395s | token: '' "aes" '-' "sha1555" '' 395s | token: '-' "sha1555" '' '' 395s | appending ESP encryption algorithm AES_CBC[_0] 395s | parsing integ: 395s | ike_alg_byname() failed: ESP integrity algorithm 'sha1555' is not recognized 395s | lookup for integrity algorithm 'sha1555' failed 395s | or - failed 'ESP integrity algorithm 'sha1555' is not recognized') 395s | parsing 'camellia666-sha1' for ESP 395s | proposal: 'camellia666-sha1' 395s | token: '' '' "camellia666" '-' 395s | token: '' "camellia666" '-' "sha1" '' 395s | ike_alg_byname() failed: ESP encryption algorithm 'camellia666' is not recognized 395s | parsing 'blowfish' for ESP 395s | proposal: 'blowfish' 395s | token: '' '' "blowfish" '' 395s | token: '' "blowfish" '' '' 395s | ike_alg_byname() failed: ESP encryption algorithm 'blowfish' is not supported 395s | parsing 'des-sha1' for ESP 395s | proposal: 'des-sha1' 395s | token: '' '' "des" '-' 395s | token: '' "des" '-' "sha1" '' 395s | ike_alg_byname() failed: ESP encryption algorithm 'des' is not supported 395s | parsing 'aes_ctr666' for ESP 395s | proposal: 'aes_ctr666' 395s | token: '' '' "aes_ctr666" '' 395s | token: '' "aes_ctr666" '' '' 395s | ike_alg_byname() failed: ESP encryption algorithm 'aes_ctr666' is not recognized 395s | parsing 'aes128-sha2_128' for ESP 395s | proposal: 'aes128-sha2_128' 395s | token: '' '' "aes128" '-' 395s | token: '' "aes128" '-' "sha2_128" '' 395s | ike_alg_byname() failed: ESP encryption algorithm 'aes128' is not recognized 395s | token: '-' "sha2_128" '' '' 395s | appending ESP encryption algorithm AES_CBC[_128] 395s | parsing integ: 395s | ike_alg_byname() failed: ESP integrity algorithm 'sha2_128' is not recognized 395s | lookup for integrity algorithm 'sha2_128' failed 395s | or - failed 'ESP integrity algorithm 'sha2_128' is not recognized') 395s | parsing 'aes256-sha2_256-4096' for ESP 395s | proposal: 'aes256-sha2_256-4096' 395s | token: '' '' "aes256" '-' 395s | token: '' "aes256" '-' "sha2_256" '-' 395s | ike_alg_byname() failed: ESP encryption algorithm 'aes256' is not recognized 395s | token: '-' "sha2_256" '-' "4096" '' 395s | appending ESP encryption algorithm AES_CBC[_256] 395s | parsing integ: 395s | appending ESP integrity algorithm HMAC_SHA2_256_128[_0] 395s | token: '-' "4096" '' '' 395s | parsing dh: 395s | ike_alg_byname() failed: ESP DH algorithm '4096' is not recognized 395s | lookup for DH algorithm '4096' failed 395s | ... failed 'ESP DH algorithm '4096' is not recognized' 395s | parsing 'aes256-sha2_256-128' for ESP 395s | proposal: 'aes256-sha2_256-128' 395s | token: '' '' "aes256" '-' 395s | token: '' "aes256" '-' "sha2_256" '-' 395s | ike_alg_byname() failed: ESP encryption algorithm 'aes256' is not recognized 395s | token: '-' "sha2_256" '-' "128" '' 395s | appending ESP encryption algorithm AES_CBC[_256] 395s | parsing integ: 395s | appending ESP integrity algorithm HMAC_SHA2_256_128[_0] 395s | token: '-' "128" '' '' 395s | parsing dh: 395s | ike_alg_byname() failed: ESP DH algorithm '128' is not recognized 395s | lookup for DH algorithm '128' failed 395s | ... failed 'ESP DH algorithm '128' is not recognized' 395s | parsing 'vanitycipher' for ESP 395s | proposal: 'vanitycipher' 395s | token: '' '' "vanitycipher" '' 395s | token: '' "vanitycipher" '' '' 395s | ike_alg_byname() failed: ESP encryption algorithm 'vanitycipher' is not recognized 395s | parsing 'ase-sah' for ESP 395s | proposal: 'ase-sah' 395s | token: '' '' "ase" '-' 395s | token: '' "ase" '-' "sah" '' 395s | ike_alg_byname() failed: ESP encryption algorithm 'ase' is not recognized 395s | parsing 'aes-sah1' for ESP 395s | proposal: 'aes-sah1' 395s | token: '' '' "aes" '-' 395s | token: '' "aes" '-' "sah1" '' 395s | token: '-' "sah1" '' '' 395s | appending ESP encryption algorithm AES_CBC[_0] 395s | parsing integ: 395s | ike_alg_byname() failed: ESP integrity algorithm 'sah1' is not recognized 395s | lookup for integrity algorithm 'sah1' failed 395s | or - failed 'ESP integrity algorithm 'sah1' is not recognized') 395s | parsing 'id3' for ESP 395s | proposal: 'id3' 395s | token: '' '' "id3" '' 395s | token: '' "id3" '' '' 395s | ike_alg_byname() failed: ESP encryption algorithm 'id3' is not recognized 395s | ike_alg_byname() failed: ESP encryption algorithm 'id3' is not recognized 395s | parsing 'aes-id3' for ESP 395s | proposal: 'aes-id3' 395s | token: '' '' "aes" '-' 395s | token: '' "aes" '-' "id3" '' 395s | token: '-' "id3" '' '' 395s | appending ESP encryption algorithm AES_CBC[_0] 395s | parsing integ: 395s | ike_alg_byname() failed: ESP integrity algorithm 'id3' is not recognized 395s | lookup for integrity algorithm 'id3' failed 395s | or - failed 'ESP integrity algorithm 'id3' is not recognized') 395s | parsing 'aes_gcm-md5' for ESP 395s | proposal: 'aes_gcm-md5' 395s | token: '' '' "aes_gcm" '-' 395s | token: '' "aes_gcm" '-' "md5" '' 395s | token: '-' "md5" '' '' 395s | appending ESP encryption algorithm AES_GCM_16[_0] 395s | parsing integ: 395s | appending ESP integrity algorithm HMAC_MD5_96[_0] 395s | token: '' '' '' 395s | parsing 'mars' for ESP 395s | proposal: 'mars' 395s | token: '' '' "mars" '' 395s | token: '' "mars" '' '' 395s | ike_alg_byname() failed: ESP encryption algorithm 'mars' is not supported 395s | parsing 'aes_gcm-16' for ESP 395s | proposal: 'aes_gcm-16' 395s | token: '' '' "aes_gcm" '-' 395s | token: '' "aes_gcm" '-' "16" '' 395s | byname('aes_gcm') with ='16' failed: ESP encryption algorithm AES_GCM_16 with key length 16 invalid; valid key lengths: 128, 192, 256 395s | parsing 'aes_gcm-0' for ESP 395s | proposal: 'aes_gcm-0' 395s | token: '' '' "aes_gcm" '-' 395s | token: '' "aes_gcm" '-' "0" '' 395s | parsing 'aes_gcm-123456789012345' for ESP 395s | proposal: 'aes_gcm-123456789012345' 395s | token: '' '' "aes_gcm" '-' 395s | token: '' "aes_gcm" '-' "123456789012345" '' 395s | parsing '3des-sha1;dh22' for ESP 395s | proposal: '3des-sha1;dh22' 395s | token: '' '' "3des" '-' 395s | token: '' "3des" '-' "sha1" ';' 395s | token: '-' "sha1" ';' "dh22" '' 395s | appending ESP encryption algorithm 3DES_CBC[_0] 395s | parsing integ: 395s | appending ESP integrity algorithm HMAC_SHA1_96[_0] 395s | token: ';' "dh22" '' '' 395s | parsing dh: 395s | ike_alg_byname() failed: ESP DH algorithm 'dh22' is not supported 395s | lookup for DH algorithm 'dh22' failed 395s | ... failed 'ESP DH algorithm 'dh22' is not supported' 395s | parsing '3des-sha1;modp8192,3des-sha2' for ESP 395s | proposal: '3des-sha1;modp8192' 395s | token: '' '' "3des" '-' 395s | token: '' "3des" '-' "sha1" ';' 395s | token: '-' "sha1" ';' "modp8192" '' 395s | appending ESP encryption algorithm 3DES_CBC[_0] 395s | parsing integ: 395s | appending ESP integrity algorithm HMAC_SHA1_96[_0] 395s | token: ';' "modp8192" '' '' 395s | parsing dh: 395s | appending ESP DH algorithm MODP8192[_0] 395s | token: '' '' '' 395s | proposal: '3des-sha2' 395s | token: '' '' "3des" '-' 395s | token: '' "3des" '-' "sha2" '' 395s | token: '-' "sha2" '' '' 395s | appending ESP encryption algorithm 3DES_CBC[_0] 395s | parsing integ: 395s | appending ESP integrity algorithm HMAC_SHA2_256_128[_0] 395s | token: '' '' '' 395s ipsec algparse: ignoring ESP DH algorithm MODP8192 as PFS policy is disabled 395s | parsing '3des-sha1-modp8192,3des-sha2' for ESP 395s | proposal: '3des-sha1-modp8192' 395s | token: '' '' "3des" '-' 395s | token: '' "3des" '-' "sha1" '-' 395s | token: '-' "sha1" '-' "modp8192" '' 395s | appending ESP encryption algorithm 3DES_CBC[_0] 395s | parsing integ: 395s | appending ESP integrity algorithm HMAC_SHA1_96[_0] 395s | token: '-' "modp8192" '' '' 395s | parsing dh: 395s | appending ESP DH algorithm MODP8192[_0] 395s | token: '' '' '' 395s | proposal: '3des-sha2' 395s | token: '' '' "3des" '-' 395s | token: '' "3des" '-' "sha2" '' 395s | token: '-' "sha2" '' '' 395s | appending ESP encryption algorithm 3DES_CBC[_0] 395s | parsing integ: 395s | appending ESP integrity algorithm HMAC_SHA2_256_128[_0] 395s | token: '' '' '' 395s ipsec algparse: ignoring ESP DH algorithm MODP8192 as PFS policy is disabled 395s | parsing '3des-sha1-modp8192,3des-sha2-modp8192' for ESP 395s | proposal: '3des-sha1-modp8192' 395s | token: '' '' "3des" '-' 395s | token: '' "3des" '-' "sha1" '-' 395s | token: '-' "sha1" '-' "modp8192" '' 395s | appending ESP encryption algorithm 3DES_CBC[_0] 395s | parsing integ: 395s | appending ESP integrity algorithm HMAC_SHA1_96[_0] 395s | token: '-' "modp8192" '' '' 395s | parsing dh: 395s | appending ESP DH algorithm MODP8192[_0] 395s | token: '' '' '' 395s | proposal: '3des-sha2-modp8192' 395s | token: '' '' "3des" '-' 395s | token: '' "3des" '-' "sha2" '-' 395s | token: '-' "sha2" '-' "modp8192" '' 395s | appending ESP encryption algorithm 3DES_CBC[_0] 395s | parsing integ: 395s | appending ESP integrity algorithm HMAC_SHA2_256_128[_0] 395s | token: '-' "modp8192" '' '' 395s | parsing dh: 395s | appending ESP DH algorithm MODP8192[_0] 395s | token: '' '' '' 395s ipsec algparse: ignoring ESP DH algorithm MODP8192 as PFS policy is disabled 395s ipsec algparse: ignoring ESP DH algorithm MODP8192 as PFS policy is disabled 395s | parsing '3des-sha1-modp8192,3des-sha2;modp8192' for ESP 395s | proposal: '3des-sha1-modp8192' 395s | token: '' '' "3des" '-' 395s | token: '' "3des" '-' "sha1" '-' 395s | token: '-' "sha1" '-' "modp8192" '' 395s | appending ESP encryption algorithm 3DES_CBC[_0] 395s | parsing integ: 395s | appending ESP integrity algorithm HMAC_SHA1_96[_0] 395s | token: '-' "modp8192" '' '' 395s | parsing dh: 395s | appending ESP DH algorithm MODP8192[_0] 395s | token: '' '' '' 395s | proposal: '3des-sha2;modp8192' 395s | token: '' '' "3des" '-' 395s | token: '' "3des" '-' "sha2" ';' 395s | token: '-' "sha2" ';' "modp8192" '' 395s | appending ESP encryption algorithm 3DES_CBC[_0] 395s | parsing integ: 395s | appending ESP integrity algorithm HMAC_SHA2_256_128[_0] 395s | token: ';' "modp8192" '' '' 395s | parsing dh: 395s | appending ESP DH algorithm MODP8192[_0] 395s | token: '' '' '' 395s ipsec algparse: ignoring ESP DH algorithm MODP8192 as PFS policy is disabled 395s ipsec algparse: ignoring ESP DH algorithm MODP8192 as PFS policy is disabled 395s | parsing '3des-sha1;modp8192,3des-sha2-modp8192' for ESP 395s | proposal: '3des-sha1;modp8192' 395s | token: '' '' "3des" '-' 395s | token: '' "3des" '-' "sha1" ';' 395s | token: '-' "sha1" ';' "modp8192" '' 395s | appending ESP encryption algorithm 3DES_CBC[_0] 395s | parsing integ: 395s | appending ESP integrity algorithm HMAC_SHA1_96[_0] 395s | token: ';' "modp8192" '' '' 395s | parsing dh: 395s | appending ESP DH algorithm MODP8192[_0] 395s | token: '' '' '' 395s | proposal: '3des-sha2-modp8192' 395s | token: '' '' "3des" '-' 395s | token: '' "3des" '-' "sha2" '-' 395s | token: '-' "sha2" '-' "modp8192" '' 395s | appending ESP encryption algorithm 3DES_CBC[_0] 395s | parsing integ: 395s | appending ESP integrity algorithm HMAC_SHA2_256_128[_0] 395s | token: '-' "modp8192" '' '' 395s | parsing dh: 395s | appending ESP DH algorithm MODP8192[_0] 395s | token: '' '' '' 395s ipsec algparse: ignoring ESP DH algorithm MODP8192 as PFS policy is disabled 395s ipsec algparse: ignoring ESP DH algorithm MODP8192 as PFS policy is disabled 395s | parsing '3des-sha1;modp8192,3des-sha2;modp8192' for ESP 395s | proposal: '3des-sha1;modp8192' 395s | token: '' '' "3des" '-' 395s | token: '' "3des" '-' "sha1" ';' 395s | token: '-' "sha1" ';' "modp8192" '' 395s | appending ESP encryption algorithm 3DES_CBC[_0] 395s | parsing integ: 395s | appending ESP integrity algorithm HMAC_SHA1_96[_0] 395s | token: ';' "modp8192" '' '' 395s | parsing dh: 395s | appending ESP DH algorithm MODP8192[_0] 395s | token: '' '' '' 395s | proposal: '3des-sha2;modp8192' 395s | token: '' '' "3des" '-' 395s | token: '' "3des" '-' "sha2" ';' 395s | token: '-' "sha2" ';' "modp8192" '' 395s | appending ESP encryption algorithm 3DES_CBC[_0] 395s | parsing integ: 395s | appending ESP integrity algorithm HMAC_SHA2_256_128[_0] 395s | token: ';' "modp8192" '' '' 395s | parsing dh: 395s | appending ESP DH algorithm MODP8192[_0] 395s | token: '' '' '' 395s ipsec algparse: ignoring ESP DH algorithm MODP8192 as PFS policy is disabled 395s ipsec algparse: ignoring ESP DH algorithm MODP8192 as PFS policy is disabled 395s | parsing '3des-sha1-modp8192,3des-sha2-modp2048' for ESP 395s | proposal: '3des-sha1-modp8192' 395s | token: '' '' "3des" '-' 395s | token: '' "3des" '-' "sha1" '-' 395s | token: '-' "sha1" '-' "modp8192" '' 395s | appending ESP encryption algorithm 3DES_CBC[_0] 395s | parsing integ: 395s | appending ESP integrity algorithm HMAC_SHA1_96[_0] 395s | token: '-' "modp8192" '' '' 395s | parsing dh: 395s | appending ESP DH algorithm MODP8192[_0] 395s | token: '' '' '' 395s | proposal: '3des-sha2-modp2048' 395s | token: '' '' "3des" '-' 395s | token: '' "3des" '-' "sha2" '-' 395s | token: '-' "sha2" '-' "modp2048" '' 395s | appending ESP encryption algorithm 3DES_CBC[_0] 395s | parsing integ: 395s | appending ESP integrity algorithm HMAC_SHA2_256_128[_0] 395s | token: '-' "modp2048" '' '' 395s | parsing dh: 395s | appending ESP DH algorithm MODP2048[_0] 395s | token: '' '' '' 395s ipsec algparse: ignoring ESP DH algorithm MODP8192 as PFS policy is disabled 395s ipsec algparse: ignoring ESP DH algorithm MODP2048 as PFS policy is disabled 395s | parsing 'SHA2_512_256,SHA2_256_128' for AH 395s | proposal: 'SHA2_512_256' 395s | token: '' '' "SHA2_512_256" '' 395s | token: '' "SHA2_512_256" '' '' 395s | parsing integ: 395s | appending AH integrity algorithm HMAC_SHA2_512_256[_0] 395s | token: '' '' '' 395s | proposal: 'SHA2_256_128' 395s | token: '' '' "SHA2_256_128" '' 395s | token: '' "SHA2_256_128" '' '' 395s | parsing integ: 395s | appending AH integrity algorithm HMAC_SHA2_256_128[_0] 395s | token: '' '' '' 395s | parsing '' for AH 395s | parsing 'md5' for AH 395s | proposal: 'md5' 395s | token: '' '' "md5" '' 395s | token: '' "md5" '' '' 395s | parsing integ: 395s | appending AH integrity algorithm HMAC_MD5_96[_0] 395s | token: '' '' '' 395s | parsing 'sha' for AH 395s | proposal: 'sha' 395s | token: '' '' "sha" '' 395s | token: '' "sha" '' '' 395s | parsing integ: 395s | appending AH integrity algorithm HMAC_SHA1_96[_0] 395s | token: '' '' '' 395s | parsing 'sha;modp2048' for AH 395s | proposal: 'sha;modp2048' 395s | token: '' '' "sha" ';' 395s | token: '' "sha" ';' "modp2048" '' 395s | parsing integ: 395s | appending AH integrity algorithm HMAC_SHA1_96[_0] 395s | token: ';' "modp2048" '' '' 395s | parsing dh: 395s | appending AH DH algorithm MODP2048[_0] 395s | token: '' '' '' 395s ipsec algparse: ignoring AH DH algorithm MODP2048 as PFS policy is disabled 395s | parsing 'sha1' for AH 395s | proposal: 'sha1' 395s | token: '' '' "sha1" '' 395s | token: '' "sha1" '' '' 395s | parsing integ: 395s | appending AH integrity algorithm HMAC_SHA1_96[_0] 395s | token: '' '' '' 395s | parsing 'sha2' for AH 395s | proposal: 'sha2' 395s | token: '' '' "sha2" '' 395s | token: '' "sha2" '' '' 395s | parsing integ: 395s | appending AH integrity algorithm HMAC_SHA2_256_128[_0] 395s | token: '' '' '' 395s | parsing 'sha256' for AH 395s | proposal: 'sha256' 395s | token: '' '' "sha256" '' 395s | token: '' "sha256" '' '' 395s | parsing integ: 395s | appending AH integrity algorithm HMAC_SHA2_256_128[_0] 395s | token: '' '' '' 395s | parsing 'sha384' for AH 395s | proposal: 'sha384' 395s | token: '' '' "sha384" '' 395s | token: '' "sha384" '' '' 395s | parsing integ: 395s | appending AH integrity algorithm HMAC_SHA2_384_192[_0] 395s | token: '' '' '' 395s | parsing 'sha512' for AH 395s | proposal: 'sha512' 395s | token: '' '' "sha512" '' 395s | token: '' "sha512" '' '' 395s | parsing integ: 395s | appending AH integrity algorithm HMAC_SHA2_512_256[_0] 395s | token: '' '' '' 395s | parsing 'sha2_256' for AH 395s | proposal: 'sha2_256' 395s | token: '' '' "sha2_256" '' 395s | token: '' "sha2_256" '' '' 395s | parsing integ: 395s | appending AH integrity algorithm HMAC_SHA2_256_128[_0] 395s | token: '' '' '' 395s | parsing 'sha2_384' for AH 395s | proposal: 'sha2_384' 395s | token: '' '' "sha2_384" '' 395s | token: '' "sha2_384" '' '' 395s | parsing integ: 395s | appending AH integrity algorithm HMAC_SHA2_384_192[_0] 395s | token: '' '' '' 395s | parsing 'sha2_512' for AH 395s | proposal: 'sha2_512' 395s | token: '' '' "sha2_512" '' 395s | token: '' "sha2_512" '' '' 395s | parsing integ: 395s | appending AH integrity algorithm HMAC_SHA2_512_256[_0] 395s | token: '' '' '' 395s | parsing 'aes_xcbc' for AH 395s | proposal: 'aes_xcbc' 395s | token: '' '' "aes_xcbc" '' 395s | token: '' "aes_xcbc" '' '' 395s | parsing integ: 395s | appending AH integrity algorithm AES_XCBC_96[_0] 395s | token: '' '' '' 395s | parsing 'sha2-none' for AH 395s | proposal: 'sha2-none' 395s | token: '' '' "sha2" '-' 395s | token: '' "sha2" '-' "none" '' 395s | parsing integ: 395s | appending AH integrity algorithm HMAC_SHA2_256_128[_0] 395s | token: '-' "none" '' '' 395s | parsing dh: 395s | appending AH DH algorithm NONE[_0] 395s | token: '' '' '' 395s ipsec algparse: ignoring redundant AH DH algorithm NONE as PFS policy is disabled 395s | parsing 'sha2;none' for AH 395s | proposal: 'sha2;none' 395s | token: '' '' "sha2" ';' 395s | token: '' "sha2" ';' "none" '' 395s | parsing integ: 395s | appending AH integrity algorithm HMAC_SHA2_256_128[_0] 395s | token: ';' "none" '' '' 395s | parsing dh: 395s | appending AH DH algorithm NONE[_0] 395s | token: '' '' '' 395s ipsec algparse: ignoring redundant AH DH algorithm NONE as PFS policy is disabled 395s | parsing 'sha1-modp8192,sha1-modp8192,sha1-modp8192' for AH 395s | proposal: 'sha1-modp8192' 395s | token: '' '' "sha1" '-' 395s | token: '' "sha1" '-' "modp8192" '' 395s | parsing integ: 395s | appending AH integrity algorithm HMAC_SHA1_96[_0] 395s | token: '-' "modp8192" '' '' 395s | parsing dh: 395s | appending AH DH algorithm MODP8192[_0] 395s | token: '' '' '' 395s | proposal: 'sha1-modp8192' 395s | token: '' '' "sha1" '-' 395s | token: '' "sha1" '-' "modp8192" '' 395s | parsing integ: 395s | appending AH integrity algorithm HMAC_SHA1_96[_0] 395s | token: '-' "modp8192" '' '' 395s | parsing dh: 395s | appending AH DH algorithm MODP8192[_0] 395s | token: '' '' '' 395s | proposal: 'sha1-modp8192' 395s | token: '' '' "sha1" '-' 395s | token: '' "sha1" '-' "modp8192" '' 395s | parsing integ: 395s | appending AH integrity algorithm HMAC_SHA1_96[_0] 395s | token: '-' "modp8192" '' '' 395s | parsing dh: 395s | appending AH DH algorithm MODP8192[_0] 395s | token: '' '' '' 395s ipsec algparse: ignoring AH DH algorithm MODP8192 as PFS policy is disabled 395s 3DES_CBC-HMAC_SHA1_96 395s 3DES_CBC-HMAC_SHA2_256_128 395s algparse -v2 'esp=3des-sha1;modp8192,3des-sha2;modp8192' (expect SUCCESS) 395s 3DES_CBC-HMAC_SHA1_96 395s 3DES_CBC-HMAC_SHA2_256_128 395s algparse -v2 'esp=3des-sha1-modp8192,3des-sha2-modp2048' (expect SUCCESS) 395s 3DES_CBC-HMAC_SHA1_96 395s 3DES_CBC-HMAC_SHA2_256_128 395s algparse -v2 'ah' (expect SUCCESS) 395s HMAC_SHA2_512_256 395s HMAC_SHA2_256_128 395s algparse -v2 'ah=' (expect ERROR) 395s ERROR: AH proposal is empty 395s algparse -v2 'ah=md5' (expect SUCCESS) 395s HMAC_MD5_96 395s algparse -v2 'ah=sha' (expect SUCCESS) 395s HMAC_SHA1_96 395s algparse -v2 'ah=sha;modp2048' (expect SUCCESS) 395s HMAC_SHA1_96 395s algparse -v2 'ah=sha1' (expect SUCCESS) 395s HMAC_SHA1_96 395s algparse -v2 'ah=sha2' (expect SUCCESS) 395s HMAC_SHA2_256_128 395s algparse -v2 'ah=sha256' (expect SUCCESS) 395s HMAC_SHA2_256_128 395s algparse -v2 'ah=sha384' (expect SUCCESS) 395s HMAC_SHA2_384_192 395s algparse -v2 'ah=sha512' (expect SUCCESS) 395s HMAC_SHA2_512_256 395s algparse -v2 'ah=sha2_256' (expect SUCCESS) 395s HMAC_SHA2_256_128 395s algparse -v2 'ah=sha2_384' (expect SUCCESS) 395s HMAC_SHA2_384_192 395s algparse -v2 'ah=sha2_512' (expect SUCCESS) 395s HMAC_SHA2_512_256 395s algparse -v2 'ah=aes_xcbc' (expect SUCCESS) 395s AES_XCBC_96 395s algparse -v2 'ah=sha2-none' (expect SUCCESS) 395s HMAC_SHA2_256_128 395s algparse -v2 'ah=sha2;none' (expect SUCCESS) 395s HMAC_SHA2_256_128 395s algparse -v2 'ah=sha1-modp8192,sha1-modp8192,sha1-modp8192' (expect SUCCESS) 395s HMAC_SHA1_96 395s algparse -v2 'ah=aes-sha1' (expect ERROR) 395s ERROR: AH integrity algorithm 'aes' is not recognized 395s algparse -v2 'ah=vanityhash1' (expect ERROR) 395s ERROR: AH integrity algorithm 'vanityhash1' is not recognized 395s algparse -v2 'ah=aes_gcm_c-256' (expect ERROR) 395s ERROR: AH integrity algorithm 'aes_gcm_c' is not recognized 395s algparse -v2 'ah=id3' (expect ERROR) 395s ERROR: AH integrity algorithm 'id3' is not recognized 395s algparse -v2 'ah=3des' (expect ERROR) 395s ERROR: AH integrity algorithm '3des' is not recognized 395s algparse -v2 'ah=null' (expect ERROR) 395s ERROR: AH cannot have 'none' as the integrity algorithm 395s algparse -v2 'ah=aes_gcm' (expect ERROR) 395s ERROR: AH integrity algorithm 'aes_gcm' is not recognized 395s algparse -v2 'ah=aes_ccm' (expect ERROR) 395s ERROR: AH integrity algorithm 'aes_ccm' is not recognized 395s algparse -v2 'ah=ripemd' (expect ERROR) 395s ERROR: AH integrity algorithm 'ripemd' is not recognized 395s algparse -v2 'ike' (expect SUCCESS) 395s | parsing 'aes-sha1' for AH 395s | proposal: 'aes-sha1' 395s | token: '' '' "aes" '-' 395s | token: '' "aes" '-' "sha1" '' 395s | parsing integ: 395s | ike_alg_byname() failed: AH integrity algorithm 'aes' is not recognized 395s | lookup for integrity algorithm 'aes' failed 395s | or - failed 'AH integrity algorithm 'aes' is not recognized') 395s | parsing 'vanityhash1' for AH 395s | proposal: 'vanityhash1' 395s | token: '' '' "vanityhash1" '' 395s | token: '' "vanityhash1" '' '' 395s | parsing integ: 395s | ike_alg_byname() failed: AH integrity algorithm 'vanityhash1' is not recognized 395s | lookup for integrity algorithm 'vanityhash1' failed 395s | or - failed 'AH integrity algorithm 'vanityhash1' is not recognized') 395s | parsing 'aes_gcm_c-256' for AH 395s | proposal: 'aes_gcm_c-256' 395s | token: '' '' "aes_gcm_c" '-' 395s | token: '' "aes_gcm_c" '-' "256" '' 395s | parsing integ: 395s | ike_alg_byname() failed: AH integrity algorithm 'aes_gcm_c' is not recognized 395s | lookup for integrity algorithm 'aes_gcm_c' failed 395s | or - failed 'AH integrity algorithm 'aes_gcm_c' is not recognized') 395s | parsing 'id3' for AH 395s | proposal: 'id3' 395s | token: '' '' "id3" '' 395s | token: '' "id3" '' '' 395s | parsing integ: 395s | ike_alg_byname() failed: AH integrity algorithm 'id3' is not recognized 395s | lookup for integrity algorithm 'id3' failed 395s | or - failed 'AH integrity algorithm 'id3' is not recognized') 395s | parsing '3des' for AH 395s | proposal: '3des' 395s | token: '' '' "3des" '' 395s | token: '' "3des" '' '' 395s | parsing integ: 395s | ike_alg_byname() failed: AH integrity algorithm '3des' is not recognized 395s | lookup for integrity algorithm '3des' failed 395s | or - failed 'AH integrity algorithm '3des' is not recognized') 395s | parsing 'null' for AH 395s | proposal: 'null' 395s | token: '' '' "null" '' 395s | token: '' "null" '' '' 395s | parsing integ: 395s | appending AH integrity algorithm NONE[_0] 395s | token: '' '' '' 395s | parsing 'aes_gcm' for AH 395s | proposal: 'aes_gcm' 395s | token: '' '' "aes_gcm" '' 395s | token: '' "aes_gcm" '' '' 395s | parsing integ: 395s | ike_alg_byname() failed: AH integrity algorithm 'aes_gcm' is not recognized 395s | lookup for integrity algorithm 'aes_gcm' failed 395s | or - failed 'AH integrity algorithm 'aes_gcm' is not recognized') 395s | parsing 'aes_ccm' for AH 395s | proposal: 'aes_ccm' 395s | token: '' '' "aes_ccm" '' 395s | token: '' "aes_ccm" '' '' 395s | parsing integ: 395s | ike_alg_byname() failed: AH integrity algorithm 'aes_ccm' is not recognized 395s | lookup for integrity algorithm 'aes_ccm' failed 395s | or - failed 'AH integrity algorithm 'aes_ccm' is not recognized') 395s | parsing 'ripemd' for AH 395s | proposal: 'ripemd' 395s | token: '' '' "ripemd" '' 395s | token: '' "ripemd" '' '' 395s | parsing integ: 395s | ike_alg_byname() failed: AH integrity algorithm 'ripemd' is not recognized 395s | lookup for integrity algorithm 'ripemd' failed 395s | or - failed 'AH integrity algorithm 'ripemd' is not recognized') 395s | parsing 'AES_GCM_16_256,AES_GCM_16_128,CHACHA20_POLY1305,AES_CBC_256,AES_CBC_128' for IKE 395s | proposal: 'AES_GCM_16_256' 395s | token: '' '' "AES_GCM_16_256" '' 395s | token: '' "AES_GCM_16_256" '' '' 395s | ike_alg_byname() failed: IKE encryption algorithm 'AES_GCM_16_256' is not recognized 395s | token: '' '' '' 395s | appending IKE encryption algorithm AES_GCM_16[_256] 395s | appending IKE PRF algorithm HMAC_SHA2_512[_0] 395s | appending IKE PRF algorithm HMAC_SHA2_256[_0] 395s | appending IKE integrity algorithm NONE[_0] 395s | appending IKE DH algorithm DH19[_0] 395s | appending IKE DH algorithm DH20[_0] 395s | appending IKE DH algorithm DH21[_0] 395s | appending IKE DH algorithm DH31[_0] 395s | appending IKE DH algorithm MODP4096[_0] 395s | appending IKE DH algorithm MODP3072[_0] 395s | appending IKE DH algorithm MODP2048[_0] 395s | appending IKE DH algorithm MODP8192[_0] 395s | proposal: 'AES_GCM_16_128' 395s | token: '' '' "AES_GCM_16_128" '' 395s | token: '' "AES_GCM_16_128" '' '' 395s | ike_alg_byname() failed: IKE encryption algorithm 'AES_GCM_16_128' is not recognized 395s | token: '' '' '' 395s | appending IKE encryption algorithm AES_GCM_16[_128] 395s | appending IKE PRF algorithm HMAC_SHA2_512[_0] 395s | appending IKE PRF algorithm HMAC_SHA2_256[_0] 395s | appending IKE integrity algorithm NONE[_0] 395s | appending IKE DH algorithm DH19[_0] 395s | appending IKE DH algorithm DH20[_0] 395s | appending IKE DH algorithm DH21[_0] 395s | appending IKE DH algorithm DH31[_0] 395s | appending IKE DH algorithm MODP4096[_0] 395s | appending IKE DH algorithm MODP3072[_0] 395s | appending IKE DH algorithm MODP2048[_0] 395s | appending IKE DH algorithm MODP8192[_0] 395s | proposal: 'CHACHA20_POLY1305' 395s | token: '' '' "CHACHA20_POLY1305" '' 395s | token: '' "CHACHA20_POLY1305" '' '' 395s | token: '' '' '' 395s | appending IKE encryption algorithm CHACHA20_POLY1305[_0] 395s | appending IKE PRF algorithm HMAC_SHA2_512[_0] 395s | appending IKE PRF algorithm HMAC_SHA2_256[_0] 395s | appending IKE integrity algorithm NONE[_0] 395s | appending IKE DH algorithm DH19[_0] 395s | appending IKE DH algorithm DH20[_0] 395s | appending IKE DH algorithm DH21[_0] 395s | appending IKE DH algorithm DH31[_0] 395s | appending IKE DH algorithm MODP4096[_0] 395s | appending IKE DH algorithm MODP3072[_0] 395s | appending IKE DH algorithm MODP2048[_0] 395s | appending IKE DH algorithm MODP8192[_0] 395s | proposal: 'AES_CBC_256' 395s | token: '' '' "AES_CBC_256" '' 395s | token: '' "AES_CBC_256" '' '' 395s | ike_alg_byname() failed: IKE encryption algorithm 'AES_CBC_256' is not recognized 395s | token: '' '' '' 395s | appending IKE encryption algorithm AES_CBC[_256] 395s | appending IKE PRF algorithm HMAC_SHA2_512[_0] 395s | appending IKE PRF algorithm HMAC_SHA2_256[_0] 395s | appending IKE integrity algorithm HMAC_SHA2_512_256[_0] 395s | appending IKE integrity algorithm HMAC_SHA2_256_128[_0] 395s | appending IKE DH algorithm DH19[_0] 395s | appending IKE DH algorithm DH20[_0] 395s | appending IKE DH algorithm DH21[_0] 395s | appending IKE DH algorithm DH31[_0] 395s | appending IKE DH algorithm MODP4096[_0] 395s | appending IKE DH algorithm MODP3072[_0] 395s | appending IKE DH algorithm MODP2048[_0] 395s | appending IKE DH algorithm MODP8192[_0] 395s | proposal: 'AES_CBC_128' 395s | token: '' '' "AES_CBC_128" '' 395s | token: '' "AES_CBC_128" '' '' 395s | ike_alg_byname() failed: IKE encryption algorithm 'AES_CBC_128' is not recognized 395s | token: '' '' '' 395s | appending IKE encryption algorithm AES_CBC[_128] 395s AES_GCM_16_256-HMAC_SHA2_512+HMAC_SHA2_256-DH19+DH20+DH21+DH31+MODP4096+MODP3072+MODP2048+MODP8192 395s AES_GCM_16_128-HMAC_SHA2_512+HMAC_SHA2_256-DH19+DH20+DH21+DH31+MODP4096+MODP3072+MODP2048+MODP8192 395s CHACHA20_POLY1305-HMAC_SHA2_512+HMAC_SHA2_256-DH19+DH20+DH21+DH31+MODP4096+MODP3072+MODP2048+MODP8192 395s AES_CBC_256-HMAC_SHA2_512+HMAC_SHA2_256-DH19+DH20+DH21+DH31+MODP4096+MODP3072+MODP2048+MODP8192 395s AES_CBC_128-HMAC_SHA2_512+HMAC_SHA2_256-DH19+DH20+DH21+DH31+MODP4096+MODP3072+MODP2048+MODP8192 395s algparse -v2 'ike=' (expect ERROR) 395s ERROR: IKE proposal is empty 395s algparse -v2 'ike=3des-sha1' (expect SUCCESS) 395s 3DES_CBC-HMAC_SHA1-DH19+DH20+DH21+DH31+MODP4096+MODP3072+MODP2048+MODP8192 395s algparse -v2 'ike=3des-sha1' (expect SUCCESS) 395s 3DES_CBC-HMAC_SHA1-DH19+DH20+DH21+DH31+MODP4096+MODP3072+MODP2048+MODP8192 395s algparse -v2 'ike=3des-sha1;modp1536' (expect SUCCESS) 395s 3DES_CBC-HMAC_SHA1-MODP1536 395s algparse -v2 'ike=3des;dh21' (expect SUCCESS) 395s 3DES_CBC-HMAC_SHA2_512+HMAC_SHA2_256-DH21 395s algparse -v2 'ike=3des-sha1;dh21' (expect SUCCESS) 395s 3DES_CBC-HMAC_SHA1-DH21 395s algparse -v2 'ike=3des-sha1-ecp_521' (expect SUCCESS) 395s 3DES_CBC-HMAC_SHA1-DH21 395s algparse -v2 'ike=3des+aes' (expect SUCCESS) 395s 3DES_CBC+AES_CBC-HMAC_SHA2_512+HMAC_SHA2_256-DH19+DH20+DH21+DH31+MODP4096+MODP3072+MODP2048+MODP8192 395s algparse -v2 'ike=aes;none' (expect ERROR) 395s ERROR: IKE DH algorithm 'none' not permitted 395s algparse -v2 'ike=id2' (expect ERROR) 395s ERROR: IKE encryption algorithm 'id2' is not recognized 395s algparse -v2 'ike=3des-id2' (expect ERROR) 395s ERROR: IKE PRF algorithm 'id2' is not recognized 395s algparse -v2 'ike=aes_ccm' (expect ERROR) 395s ERROR: IKE encryption algorithm 'aes_ccm' is not supported 395s algparse -v2 'ike=aes-sha1-sha2-ecp_521' (expect ERROR) 395s ERROR: IKE DH algorithm 'sha2' is not recognized 395s algparse -v2 'ike=aes-sha2-sha2;ecp_521' (expect ERROR) 395s ERROR: IKE DH algorithm 'sha2' is not recognized 395s algparse -v2 'ike=aes-sha1_96-sha2-ecp_521' (expect SUCCESS) 395s AES_CBC-HMAC_SHA1_96-HMAC_SHA2_256-DH21 395s algparse -v2 'ike=aes-sha1_96-sha2;ecp_521' (expect SUCCESS) 395s AES_CBC-HMAC_SHA1_96-HMAC_SHA2_256-DH21 395s algparse -v2 'ike=aes+aes-sha1+sha1-modp8192+modp8192' (expect SUCCESS) 395s AES_CBC-HMAC_SHA1-MODP8192 395s algparse -v2 'ike=3des+aes+aes-sha2+sha1+sha1-modp4096+modp8192+modp8192' (expect SUCCESS) 395s 3DES_CBC+AES_CBC-HMAC_SHA2_256+HMAC_SHA1-MODP4096+MODP8192 395s algparse -v2 'ike=aes+3des+aes-sha1+sha2+sha1-modp8192+modp4096+modp8192' (expect SUCCESS) 395s AES_CBC+3DES_CBC-HMAC_SHA1+HMAC_SHA2_256-MODP8192+MODP4096 395s algparse -v2 'ike=aes+aes+3des-sha1+sha1+sha2-modp8192+modp8192+modp4096' (expect SUCCESS) 395s AES_CBC+3DES_CBC-HMAC_SHA1+HMAC_SHA2_256-MODP8192+MODP4096 395s algparse -v2 'ike=aes+aes128+aes256' (expect SUCCESS) 395s AES_CBC-HMAC_SHA2_512+HMAC_SHA2_256-DH19+DH20+DH21+DH31+MODP4096+MODP3072+MODP2048+MODP8192 395s algparse -v2 'ike=aes128+aes+aes256' (expect SUCCESS) 395s AES_CBC_128+AES_CBC-HMAC_SHA2_512+HMAC_SHA2_256-DH19+DH20+DH21+DH31+MODP4096+MODP3072+MODP2048+MODP8192 395s algparse -v2 'ike=aes128+aes256+aes' (expect SUCCESS) 395s AES_CBC_128+AES_CBC_256+AES_CBC-HMAC_SHA2_512+HMAC_SHA2_256-DH19+DH20+DH21+DH31+MODP4096+MODP3072+MODP2048+MODP8192 395s algparse -v2 'ike=aes-sha1-modp8192,aes-sha1-modp8192,aes-sha1-modp8192' (expect SUCCESS) 395s AES_CBC-HMAC_SHA1-MODP8192 395s algparse -v2 'ike=aes-sha1-modp8192,aes-sha2-modp8192,aes-sha1-modp8192' (expect SUCCESS) 395s AES_CBC-HMAC_SHA1-MODP8192 395s AES_CBC-HMAC_SHA2_256-MODP8192 395s algparse -v2 'ike=aes_gcm' (expect SUCCESS) 395s AES_GCM_16-HMAC_SHA2_512+HMAC_SHA2_256-DH19+DH20+DH21+DH31+MODP4096+MODP3072+MODP2048+MODP8192 395s algparse -v2 'ike=aes_gcm-sha2' (expect SUCCESS) 395s AES_GCM_16-HMAC_SHA2_256-DH19+DH20+DH21+DH31+MODP4096+MODP3072+MODP2048+MODP8192 395s algparse -v2 'ike=aes_gcm-sha2-modp2048' (expect SUCCESS) 395s AES_GCM_16-HMAC_SHA2_256-MODP2048 395s algparse -v2 'ike=aes_gcm-sha2;modp2048' (expect SUCCESS) 395s AES_GCM_16-HMAC_SHA2_256-MODP2048 395s algparse -v2 'ike=aes_gcm-modp2048' (expect ERROR) 395s ERROR: IKE PRF algorithm 'modp2048' is not recognized 395s algparse -v2 'ike=aes_gcm;modp2048' (expect SUCCESS) 395s AES_GCM_16-HMAC_SHA2_512+HMAC_SHA2_256-MODP2048 395s algparse -v2 'ike=aes_gcm-none' (expect SUCCESS) 395s AES_GCM_16-HMAC_SHA2_512+HMAC_SHA2_256-DH19+DH20+DH21+DH31+MODP4096+MODP3072+MODP2048+MODP8192 395s algparse -v2 'ike=aes_gcm-none-sha2' (expect SUCCESS) 395s AES_GCM_16-HMAC_SHA2_256-DH19+DH20+DH21+DH31+MODP4096+MODP3072+MODP2048+MODP8192 395s algparse -v2 'ike=aes_gcm-none-sha2-modp2048' (expect SUCCESS) 395s AES_GCM_16-HMAC_SHA2_256-MODP2048 395s algparse -v2 'ike=aes_gcm-none-sha2;modp2048' (expect SUCCESS) 395s AES_GCM_16-HMAC_SHA2_256-MODP2048 395s algparse -v2 'ike=aes_gcm-none-modp2048' (expect ERROR) 395s ERROR: IKE PRF algorithm 'modp2048' is not recognized 395s algparse -v2 'ike=aes_gcm-none;modp2048' (expect SUCCESS) 395s AES_GCM_16-HMAC_SHA2_512+HMAC_SHA2_256-MODP2048 395s algparse -v2 'ike=aes_gcm-sha1-none-modp2048' (expect ERROR) 395s ERROR: IKE proposal contains unexpected 'modp2048' 395s algparse -v2 'ike=aes_gcm-sha1-none;modp2048' (expect ERROR) 395s ERROR: IKE proposal contains unexpected 'modp2048' 395s algparse -v2 'ike=aes+aes_gcm' (expect ERROR) 395s ERROR: AEAD and non-AEAD IKE encryption algorithm cannot be combined 395s algparse -v2 'ike=,' (expect ERROR) 395s ERROR: IKE encryption algorithm is empty 395s algparse -v2 'ike=aes,' (expect ERROR) 395s ERROR: IKE encryption algorithm is empty 395s algparse -v2 'ike=aes,,aes' (expect ERROR) 395s ERROR: IKE encryption algorithm is empty 395s algparse -v2 'ike=,aes' (expect ERROR) 395s ERROR: IKE encryption algorithm is empty 395s algparse -v2 'ike=-' (expect ERROR) 395s ERROR: IKE encryption algorithm is empty 395s algparse -v2 'ike=+' (expect ERROR) 395s ERROR: IKE encryption algorithm is empty 395s algparse -v2 'ike=;' (expect ERROR) 395s ERROR: IKE encryption algorithm is empty 395s algparse -v2 'ike=aes-' (expect ERROR) 395s ERROR: IKE PRF algorithm is empty 395s algparse -v2 'ike=aes+' (expect ERROR) 395s ERROR: IKE encryption algorithm is empty 395s algparse -v2 'ike=aes;' (expect ERROR) 395s ERROR: IKE DH algorithm is empty 395s algparse -v2 'ike=-aes' (expect ERROR) 395s ERROR: IKE encryption algorithm is empty 395s algparse -v2 'ike=+aes' (expect ERROR) 395s ERROR: IKE encryption algorithm is empty 395s algparse -v2 'ike=;aes' (expect ERROR) 395s ERROR: IKE encryption algorithm is empty 395s algparse -v2 'ike=aes+-' (expect ERROR) 395s ERROR: IKE encryption algorithm is empty 395s algparse -v2 'ike=aes+;' (expect ERROR) 395s ERROR: IKE encryption algorithm is empty 395s algparse -v2 'ike=aes++' (expect ERROR) 395s ERROR: IKE encryption algorithm is empty 395s testing -ta 395s | appending IKE PRF algorithm HMAC_SHA2_512[_0] 395s | appending IKE PRF algorithm HMAC_SHA2_256[_0] 395s | appending IKE integrity algorithm HMAC_SHA2_512_256[_0] 395s | appending IKE integrity algorithm HMAC_SHA2_256_128[_0] 395s | appending IKE DH algorithm DH19[_0] 395s | appending IKE DH algorithm DH20[_0] 395s | appending IKE DH algorithm DH21[_0] 395s | appending IKE DH algorithm DH31[_0] 395s | appending IKE DH algorithm MODP4096[_0] 395s | appending IKE DH algorithm MODP3072[_0] 395s | appending IKE DH algorithm MODP2048[_0] 395s | appending IKE DH algorithm MODP8192[_0] 395s | parsing '' for IKE 395s | parsing '3des-sha1' for IKE 395s | proposal: '3des-sha1' 395s | token: '' '' "3des" '-' 395s | token: '' "3des" '-' "sha1" '' 395s | token: '-' "sha1" '' '' 395s | appending IKE encryption algorithm 3DES_CBC[_0] 395s | parsing prf: 395s | appending IKE PRF algorithm HMAC_SHA1[_0] 395s | token: '' '' '' 395s | - succeeded, advancing tokens 395s | appending IKE integrity algorithm HMAC_SHA1_96[_0] 395s | appending IKE DH algorithm DH19[_0] 395s | appending IKE DH algorithm DH20[_0] 395s | appending IKE DH algorithm DH21[_0] 395s | appending IKE DH algorithm DH31[_0] 395s | appending IKE DH algorithm MODP4096[_0] 395s | appending IKE DH algorithm MODP3072[_0] 395s | appending IKE DH algorithm MODP2048[_0] 395s | appending IKE DH algorithm MODP8192[_0] 395s | parsing '3des-sha1' for IKE 395s | proposal: '3des-sha1' 395s | token: '' '' "3des" '-' 395s | token: '' "3des" '-' "sha1" '' 395s | token: '-' "sha1" '' '' 395s | appending IKE encryption algorithm 3DES_CBC[_0] 395s | parsing prf: 395s | appending IKE PRF algorithm HMAC_SHA1[_0] 395s | token: '' '' '' 395s | - succeeded, advancing tokens 395s | appending IKE integrity algorithm HMAC_SHA1_96[_0] 395s | appending IKE DH algorithm DH19[_0] 395s | appending IKE DH algorithm DH20[_0] 395s | appending IKE DH algorithm DH21[_0] 395s | appending IKE DH algorithm DH31[_0] 395s | appending IKE DH algorithm MODP4096[_0] 395s | appending IKE DH algorithm MODP3072[_0] 395s | appending IKE DH algorithm MODP2048[_0] 395s | appending IKE DH algorithm MODP8192[_0] 395s | parsing '3des-sha1;modp1536' for IKE 395s | proposal: '3des-sha1;modp1536' 395s | token: '' '' "3des" '-' 395s | token: '' "3des" '-' "sha1" ';' 395s | token: '-' "sha1" ';' "modp1536" '' 395s | appending IKE encryption algorithm 3DES_CBC[_0] 395s | parsing prf: 395s | appending IKE PRF algorithm HMAC_SHA1[_0] 395s | token: ';' "modp1536" '' '' 395s | - succeeded, advancing tokens 395s | parsing dh: 395s | appending IKE DH algorithm MODP1536[_0] 395s | token: '' '' '' 395s | appending IKE integrity algorithm HMAC_SHA1_96[_0] 395s | parsing '3des;dh21' for IKE 395s | proposal: '3des;dh21' 395s | token: '' '' "3des" ';' 395s | token: '' "3des" ';' "dh21" '' 395s | token: ';' "dh21" '' '' 395s | appending IKE encryption algorithm 3DES_CBC[_0] 395s | parsing dh: 395s | appending IKE DH algorithm DH21[_0] 395s | token: '' '' '' 395s | appending IKE PRF algorithm HMAC_SHA2_512[_0] 395s | appending IKE PRF algorithm HMAC_SHA2_256[_0] 395s | appending IKE integrity algorithm HMAC_SHA2_512_256[_0] 395s | appending IKE integrity algorithm HMAC_SHA2_256_128[_0] 395s | parsing '3des-sha1;dh21' for IKE 395s | proposal: '3des-sha1;dh21' 395s | token: '' '' "3des" '-' 395s | token: '' "3des" '-' "sha1" ';' 395s | token: '-' "sha1" ';' "dh21" '' 395s | appending IKE encryption algorithm 3DES_CBC[_0] 395s | parsing prf: 395s | appending IKE PRF algorithm HMAC_SHA1[_0] 395s | token: ';' "dh21" '' '' 395s | - succeeded, advancing tokens 395s | parsing dh: 395s | appending IKE DH algorithm DH21[_0] 395s | token: '' '' '' 395s | appending IKE integrity algorithm HMAC_SHA1_96[_0] 395s | parsing '3des-sha1-ecp_521' for IKE 395s | proposal: '3des-sha1-ecp_521' 395s | token: '' '' "3des" '-' 395s | token: '' "3des" '-' "sha1" '-' 395s | token: '-' "sha1" '-' "ecp_521" '' 395s | appending IKE encryption algorithm 3DES_CBC[_0] 395s | parsing prf: 395s | appending IKE PRF algorithm HMAC_SHA1[_0] 395s | token: '-' "ecp_521" '' '' 395s | - succeeded, advancing tokens 395s | parsing dh: 395s | appending IKE DH algorithm DH21[_0] 395s | token: '' '' '' 395s | appending IKE integrity algorithm HMAC_SHA1_96[_0] 395s | parsing '3des+aes' for IKE 395s | proposal: '3des+aes' 395s | token: '' '' "3des" '+' 395s | token: '' "3des" '+' "aes" '' 395s | token: '+' "aes" '' '' 395s | appending IKE encryption algorithm 3DES_CBC[_0] 395s | token: '' '' '' 395s | appending IKE encryption algorithm AES_CBC[_0] 395s | appending IKE PRF algorithm HMAC_SHA2_512[_0] 395s | appending IKE PRF algorithm HMAC_SHA2_256[_0] 395s | appending IKE integrity algorithm HMAC_SHA2_512_256[_0] 395s | appending IKE integrity algorithm HMAC_SHA2_256_128[_0] 395s | appending IKE DH algorithm DH19[_0] 395s | appending IKE DH algorithm DH20[_0] 395s | appending IKE DH algorithm DH21[_0] 395s | appending IKE DH algorithm DH31[_0] 395s | appending IKE DH algorithm MODP4096[_0] 395s | appending IKE DH algorithm MODP3072[_0] 395s | appending IKE DH algorithm MODP2048[_0] 395s | appending IKE DH algorithm MODP8192[_0] 395s | parsing 'aes;none' for IKE 395s | proposal: 'aes;none' 395s | token: '' '' "aes" ';' 395s | token: '' "aes" ';' "none" '' 395s | token: ';' "none" '' '' 395s | appending IKE encryption algorithm AES_CBC[_0] 395s | parsing dh: 395s | appending IKE DH algorithm NONE[_0] 395s | token: '' '' '' 395s | appending IKE PRF algorithm HMAC_SHA2_512[_0] 395s | appending IKE PRF algorithm HMAC_SHA2_256[_0] 395s | appending IKE integrity algorithm HMAC_SHA2_512_256[_0] 395s | appending IKE integrity algorithm HMAC_SHA2_256_128[_0] 395s | parsing 'id2' for IKE 395s | proposal: 'id2' 395s | token: '' '' "id2" '' 395s | token: '' "id2" '' '' 395s | ike_alg_byname() failed: IKE encryption algorithm 'id2' is not recognized 395s | ike_alg_byname() failed: IKE encryption algorithm 'id2' is not recognized 395s | parsing '3des-id2' for IKE 395s | proposal: '3des-id2' 395s | token: '' '' "3des" '-' 395s | token: '' "3des" '-' "id2" '' 395s | token: '-' "id2" '' '' 395s | appending IKE encryption algorithm 3DES_CBC[_0] 395s | parsing prf: 395s | ike_alg_byname() failed: IKE PRF algorithm 'id2' is not recognized 395s | lookup for PRF algorithm 'id2' failed 395s | - failed, saving error 'IKE PRF algorithm 'id2' is not recognized' and tossing result 395s | parsing integ: 395s | ike_alg_byname() failed: IKE integrity algorithm 'id2' is not recognized 395s | lookup for integrity algorithm 'id2' failed 395s | - and - failed, returning earlier PRF error 'IKE PRF algorithm 'id2' is not recognized' and discarding INTEG error 'IKE integrity algorithm 'id2' is not recognized') 395s | parsing 'aes_ccm' for IKE 395s | proposal: 'aes_ccm' 395s | token: '' '' "aes_ccm" '' 395s | token: '' "aes_ccm" '' '' 395s | alg_byname_ok() failed: IKE encryption algorithm 'aes_ccm' is not supported 395s | parsing 'aes-sha1-sha2-ecp_521' for IKE 395s | proposal: 'aes-sha1-sha2-ecp_521' 395s | token: '' '' "aes" '-' 395s | token: '' "aes" '-' "sha1" '-' 395s | token: '-' "sha1" '-' "sha2" '-' 395s | appending IKE encryption algorithm AES_CBC[_0] 395s | parsing prf: 395s | appending IKE PRF algorithm HMAC_SHA1[_0] 395s | token: '-' "sha2" '-' "ecp_521" '' 395s | - succeeded, advancing tokens 395s | parsing dh: 395s | ike_alg_byname() failed: IKE DH algorithm 'sha2' is not recognized 395s | lookup for DH algorithm 'sha2' failed 395s | ... failed 'IKE DH algorithm 'sha2' is not recognized' 395s | parsing 'aes-sha2-sha2;ecp_521' for IKE 395s | proposal: 'aes-sha2-sha2;ecp_521' 395s | token: '' '' "aes" '-' 395s | token: '' "aes" '-' "sha2" '-' 395s | token: '-' "sha2" '-' "sha2" ';' 395s | appending IKE encryption algorithm AES_CBC[_0] 395s | parsing prf: 395s | appending IKE PRF algorithm HMAC_SHA2_256[_0] 395s | token: '-' "sha2" ';' "ecp_521" '' 395s | - succeeded, advancing tokens 395s | parsing dh: 395s | ike_alg_byname() failed: IKE DH algorithm 'sha2' is not recognized 395s | lookup for DH algorithm 'sha2' failed 395s | ... failed 'IKE DH algorithm 'sha2' is not recognized' 395s | parsing 'aes-sha1_96-sha2-ecp_521' for IKE 395s | proposal: 'aes-sha1_96-sha2-ecp_521' 395s | token: '' '' "aes" '-' 395s | token: '' "aes" '-' "sha1_96" '-' 395s | token: '-' "sha1_96" '-' "sha2" '-' 395s | appending IKE encryption algorithm AES_CBC[_0] 395s | parsing prf: 395s | ike_alg_byname() failed: IKE PRF algorithm 'sha1_96' is not recognized 395s | lookup for PRF algorithm 'sha1_96' failed 395s | - failed, saving error 'IKE PRF algorithm 'sha1_96' is not recognized' and tossing result 395s | parsing integ: 395s | appending IKE integrity algorithm HMAC_SHA1_96[_0] 395s | token: '-' "sha2" '-' "ecp_521" '' 395s | parsing prf: 395s | appending IKE PRF algorithm HMAC_SHA2_256[_0] 395s | token: '-' "ecp_521" '' '' 395s | parsing dh: 395s | appending IKE DH algorithm DH21[_0] 395s | token: '' '' '' 395s | parsing 'aes-sha1_96-sha2;ecp_521' for IKE 395s | proposal: 'aes-sha1_96-sha2;ecp_521' 395s | token: '' '' "aes" '-' 395s | token: '' "aes" '-' "sha1_96" '-' 395s | token: '-' "sha1_96" '-' "sha2" ';' 395s | appending IKE encryption algorithm AES_CBC[_0] 395s | parsing prf: 395s | ike_alg_byname() failed: IKE PRF algorithm 'sha1_96' is not recognized 395s | lookup for PRF algorithm 'sha1_96' failed 395s | - failed, saving error 'IKE PRF algorithm 'sha1_96' is not recognized' and tossing result 395s | parsing integ: 395s | appending IKE integrity algorithm HMAC_SHA1_96[_0] 395s | token: '-' "sha2" ';' "ecp_521" '' 395s | parsing prf: 395s | appending IKE PRF algorithm HMAC_SHA2_256[_0] 395s | token: ';' "ecp_521" '' '' 395s | parsing dh: 395s | appending IKE DH algorithm DH21[_0] 395s | token: '' '' '' 395s | parsing 'aes+aes-sha1+sha1-modp8192+modp8192' for IKE 395s | proposal: 'aes+aes-sha1+sha1-modp8192+modp8192' 395s | token: '' '' "aes" '+' 395s | token: '' "aes" '+' "aes" '-' 395s | token: '+' "aes" '-' "sha1" '+' 395s | appending IKE encryption algorithm AES_CBC[_0] 395s | token: '-' "sha1" '+' "sha1" '-' 395s | appending IKE encryption algorithm AES_CBC[_0] 395s ipsec algparse: discarding duplicate IKE encryption algorithm AES_CBC 395s | parsing prf: 395s | appending IKE PRF algorithm HMAC_SHA1[_0] 395s | token: '+' "sha1" '-' "modp8192" '+' 395s | appending IKE PRF algorithm HMAC_SHA1[_0] 395s | token: '-' "modp8192" '+' "modp8192" '' 395s ipsec algparse: discarding duplicate IKE PRF algorithm HMAC_SHA1 395s | - succeeded, advancing tokens 395s | parsing dh: 395s | appending IKE DH algorithm MODP8192[_0] 395s | token: '+' "modp8192" '' '' 395s | appending IKE DH algorithm MODP8192[_0] 395s | token: '' '' '' 395s ipsec algparse: discarding duplicate IKE DH algorithm MODP8192 395s | appending IKE integrity algorithm HMAC_SHA1_96[_0] 395s | parsing '3des+aes+aes-sha2+sha1+sha1-modp4096+modp8192+modp8192' for IKE 395s | proposal: '3des+aes+aes-sha2+sha1+sha1-modp4096+modp8192+modp8192' 395s | token: '' '' "3des" '+' 395s | token: '' "3des" '+' "aes" '+' 395s | token: '+' "aes" '+' "aes" '-' 395s | appending IKE encryption algorithm 3DES_CBC[_0] 395s | token: '+' "aes" '-' "sha2" '+' 395s | appending IKE encryption algorithm AES_CBC[_0] 395s | token: '-' "sha2" '+' "sha1" '+' 395s | appending IKE encryption algorithm AES_CBC[_0] 395s ipsec algparse: discarding duplicate IKE encryption algorithm AES_CBC 395s | parsing prf: 395s | appending IKE PRF algorithm HMAC_SHA2_256[_0] 395s | token: '+' "sha1" '+' "sha1" '-' 395s | appending IKE PRF algorithm HMAC_SHA1[_0] 395s | token: '+' "sha1" '-' "modp4096" '+' 395s | appending IKE PRF algorithm HMAC_SHA1[_0] 395s | token: '-' "modp4096" '+' "modp8192" '+' 395s ipsec algparse: discarding duplicate IKE PRF algorithm HMAC_SHA1 395s | - succeeded, advancing tokens 395s | parsing dh: 395s | appending IKE DH algorithm MODP4096[_0] 395s | token: '+' "modp8192" '+' "modp8192" '' 395s | appending IKE DH algorithm MODP8192[_0] 395s | token: '+' "modp8192" '' '' 395s | appending IKE DH algorithm MODP8192[_0] 395s | token: '' '' '' 395s ipsec algparse: discarding duplicate IKE DH algorithm MODP8192 395s | appending IKE integrity algorithm HMAC_SHA2_256_128[_0] 395s | appending IKE integrity algorithm HMAC_SHA1_96[_0] 395s | parsing 'aes+3des+aes-sha1+sha2+sha1-modp8192+modp4096+modp8192' for IKE 395s | proposal: 'aes+3des+aes-sha1+sha2+sha1-modp8192+modp4096+modp8192' 395s | token: '' '' "aes" '+' 395s | token: '' "aes" '+' "3des" '+' 395s | token: '+' "3des" '+' "aes" '-' 395s | appending IKE encryption algorithm AES_CBC[_0] 395s | token: '+' "aes" '-' "sha1" '+' 395s | appending IKE encryption algorithm 3DES_CBC[_0] 395s | token: '-' "sha1" '+' "sha2" '+' 395s | appending IKE encryption algorithm AES_CBC[_0] 395s ipsec algparse: discarding duplicate IKE encryption algorithm AES_CBC 395s | parsing prf: 395s | appending IKE PRF algorithm HMAC_SHA1[_0] 395s | token: '+' "sha2" '+' "sha1" '-' 395s | appending IKE PRF algorithm HMAC_SHA2_256[_0] 395s | token: '+' "sha1" '-' "modp8192" '+' 395s | appending IKE PRF algorithm HMAC_SHA1[_0] 395s | token: '-' "modp8192" '+' "modp4096" '+' 395s ipsec algparse: discarding duplicate IKE PRF algorithm HMAC_SHA1 395s | - succeeded, advancing tokens 395s | parsing dh: 395s | appending IKE DH algorithm MODP8192[_0] 395s | token: '+' "modp4096" '+' "modp8192" '' 395s | appending IKE DH algorithm MODP4096[_0] 395s | token: '+' "modp8192" '' '' 395s | appending IKE DH algorithm MODP8192[_0] 395s | token: '' '' '' 395s ipsec algparse: discarding duplicate IKE DH algorithm MODP8192 395s | appending IKE integrity algorithm HMAC_SHA1_96[_0] 395s | appending IKE integrity algorithm HMAC_SHA2_256_128[_0] 395s | parsing 'aes+aes+3des-sha1+sha1+sha2-modp8192+modp8192+modp4096' for IKE 395s | proposal: 'aes+aes+3des-sha1+sha1+sha2-modp8192+modp8192+modp4096' 395s | token: '' '' "aes" '+' 395s | token: '' "aes" '+' "aes" '+' 395s | token: '+' "aes" '+' "3des" '-' 395s | appending IKE encryption algorithm AES_CBC[_0] 395s | token: '+' "3des" '-' "sha1" '+' 395s | appending IKE encryption algorithm AES_CBC[_0] 395s | token: '-' "sha1" '+' "sha1" '+' 395s | appending IKE encryption algorithm 3DES_CBC[_0] 395s ipsec algparse: discarding duplicate IKE encryption algorithm AES_CBC 395s | parsing prf: 395s | appending IKE PRF algorithm HMAC_SHA1[_0] 395s | token: '+' "sha1" '+' "sha2" '-' 395s | appending IKE PRF algorithm HMAC_SHA1[_0] 395s | token: '+' "sha2" '-' "modp8192" '+' 395s | appending IKE PRF algorithm HMAC_SHA2_256[_0] 395s | token: '-' "modp8192" '+' "modp8192" '+' 395s ipsec algparse: discarding duplicate IKE PRF algorithm HMAC_SHA1 395s | - succeeded, advancing tokens 395s | parsing dh: 395s | appending IKE DH algorithm MODP8192[_0] 395s | token: '+' "modp8192" '+' "modp4096" '' 395s | appending IKE DH algorithm MODP8192[_0] 395s | token: '+' "modp4096" '' '' 395s | appending IKE DH algorithm MODP4096[_0] 395s | token: '' '' '' 395s ipsec algparse: discarding duplicate IKE DH algorithm MODP8192 395s | appending IKE integrity algorithm HMAC_SHA1_96[_0] 395s | appending IKE integrity algorithm HMAC_SHA2_256_128[_0] 395s | parsing 'aes+aes128+aes256' for IKE 395s | proposal: 'aes+aes128+aes256' 395s | token: '' '' "aes" '+' 395s | token: '' "aes" '+' "aes128" '+' 395s | token: '+' "aes128" '+' "aes256" '' 395s | appending IKE encryption algorithm AES_CBC[_0] 395s | ike_alg_byname() failed: IKE encryption algorithm 'aes128' is not recognized 395s | token: '+' "aes256" '' '' 395s | appending IKE encryption algorithm AES_CBC[_128] 395s | ike_alg_byname() failed: IKE encryption algorithm 'aes256' is not recognized 395s | token: '' '' '' 395s | appending IKE encryption algorithm AES_CBC[_256] 395s ipsec algparse: discarding duplicate IKE encryption algorithm AES_CBC_128 395s ipsec algparse: discarding duplicate IKE encryption algorithm AES_CBC_256 395s | appending IKE PRF algorithm HMAC_SHA2_512[_0] 395s | appending IKE PRF algorithm HMAC_SHA2_256[_0] 395s | appending IKE integrity algorithm HMAC_SHA2_512_256[_0] 395s | appending IKE integrity algorithm HMAC_SHA2_256_128[_0] 395s | appending IKE DH algorithm DH19[_0] 395s | appending IKE DH algorithm DH20[_0] 395s | appending IKE DH algorithm DH21[_0] 395s | appending IKE DH algorithm DH31[_0] 395s | appending IKE DH algorithm MODP4096[_0] 395s | appending IKE DH algorithm MODP3072[_0] 395s | appending IKE DH algorithm MODP2048[_0] 395s | appending IKE DH algorithm MODP8192[_0] 395s | parsing 'aes128+aes+aes256' for IKE 395s | proposal: 'aes128+aes+aes256' 395s | token: '' '' "aes128" '+' 395s | token: '' "aes128" '+' "aes" '+' 395s | ike_alg_byname() failed: IKE encryption algorithm 'aes128' is not recognized 395s | token: '+' "aes" '+' "aes256" '' 395s | appending IKE encryption algorithm AES_CBC[_128] 395s | token: '+' "aes256" '' '' 395s | appending IKE encryption algorithm AES_CBC[_0] 395s | ike_alg_byname() failed: IKE encryption algorithm 'aes256' is not recognized 395s | token: '' '' '' 395s | appending IKE encryption algorithm AES_CBC[_256] 395s ipsec algparse: discarding duplicate IKE encryption algorithm AES_CBC_256 395s | appending IKE PRF algorithm HMAC_SHA2_512[_0] 395s | appending IKE PRF algorithm HMAC_SHA2_256[_0] 395s | appending IKE integrity algorithm HMAC_SHA2_512_256[_0] 395s | appending IKE integrity algorithm HMAC_SHA2_256_128[_0] 395s | appending IKE DH algorithm DH19[_0] 395s | appending IKE DH algorithm DH20[_0] 395s | appending IKE DH algorithm DH21[_0] 395s | appending IKE DH algorithm DH31[_0] 395s | appending IKE DH algorithm MODP4096[_0] 395s | appending IKE DH algorithm MODP3072[_0] 395s | appending IKE DH algorithm MODP2048[_0] 395s | appending IKE DH algorithm MODP8192[_0] 395s | parsing 'aes128+aes256+aes' for IKE 395s | proposal: 'aes128+aes256+aes' 395s | token: '' '' "aes128" '+' 395s | token: '' "aes128" '+' "aes256" '+' 395s | ike_alg_byname() failed: IKE encryption algorithm 'aes128' is not recognized 395s | token: '+' "aes256" '+' "aes" '' 395s | appending IKE encryption algorithm AES_CBC[_128] 395s | ike_alg_byname() failed: IKE encryption algorithm 'aes256' is not recognized 395s | token: '+' "aes" '' '' 395s | appending IKE encryption algorithm AES_CBC[_256] 395s | token: '' '' '' 395s | appending IKE encryption algorithm AES_CBC[_0] 395s | appending IKE PRF algorithm HMAC_SHA2_512[_0] 395s | appending IKE PRF algorithm HMAC_SHA2_256[_0] 395s | appending IKE integrity algorithm HMAC_SHA2_512_256[_0] 395s | appending IKE integrity algorithm HMAC_SHA2_256_128[_0] 395s | appending IKE DH algorithm DH19[_0] 395s | appending IKE DH algorithm DH20[_0] 395s | appending IKE DH algorithm DH21[_0] 395s | appending IKE DH algorithm DH31[_0] 395s | appending IKE DH algorithm MODP4096[_0] 395s | appending IKE DH algorithm MODP3072[_0] 395s | appending IKE DH algorithm MODP2048[_0] 395s | appending IKE DH algorithm MODP8192[_0] 395s | parsing 'aes-sha1-modp8192,aes-sha1-modp8192,aes-sha1-modp8192' for IKE 395s | proposal: 'aes-sha1-modp8192' 395s | token: '' '' "aes" '-' 395s | token: '' "aes" '-' "sha1" '-' 395s | token: '-' "sha1" '-' "modp8192" '' 395s | appending IKE encryption algorithm AES_CBC[_0] 395s | parsing prf: 395s | appending IKE PRF algorithm HMAC_SHA1[_0] 395s | token: '-' "modp8192" '' '' 395s | - succeeded, advancing tokens 395s | parsing dh: 395s | appending IKE DH algorithm MODP8192[_0] 395s | token: '' '' '' 395s | appending IKE integrity algorithm HMAC_SHA1_96[_0] 395s | proposal: 'aes-sha1-modp8192' 395s | token: '' '' "aes" '-' 395s | token: '' "aes" '-' "sha1" '-' 395s | token: '-' "sha1" '-' "modp8192" '' 395s | appending IKE encryption algorithm AES_CBC[_0] 395s | parsing prf: 395s | appending IKE PRF algorithm HMAC_SHA1[_0] 395s | token: '-' "modp8192" '' '' 395s | - succeeded, advancing tokens 395s | parsing dh: 395s | appending IKE DH algorithm MODP8192[_0] 395s | token: '' '' '' 395s | appending IKE integrity algorithm HMAC_SHA1_96[_0] 395s | proposal: 'aes-sha1-modp8192' 395s | token: '' '' "aes" '-' 395s | token: '' "aes" '-' "sha1" '-' 395s | token: '-' "sha1" '-' "modp8192" '' 395s | appending IKE encryption algorithm AES_CBC[_0] 395s | parsing prf: 395s | appending IKE PRF algorithm HMAC_SHA1[_0] 395s | token: '-' "modp8192" '' '' 395s | - succeeded, advancing tokens 395s | parsing dh: 395s | appending IKE DH algorithm MODP8192[_0] 395s | token: '' '' '' 395s | appending IKE integrity algorithm HMAC_SHA1_96[_0] 395s | parsing 'aes-sha1-modp8192,aes-sha2-modp8192,aes-sha1-modp8192' for IKE 395s | proposal: 'aes-sha1-modp8192' 395s | token: '' '' "aes" '-' 395s | token: '' "aes" '-' "sha1" '-' 395s | token: '-' "sha1" '-' "modp8192" '' 395s | appending IKE encryption algorithm AES_CBC[_0] 395s | parsing prf: 395s | appending IKE PRF algorithm HMAC_SHA1[_0] 395s | token: '-' "modp8192" '' '' 395s | - succeeded, advancing tokens 395s | parsing dh: 395s | appending IKE DH algorithm MODP8192[_0] 395s | token: '' '' '' 395s | appending IKE integrity algorithm HMAC_SHA1_96[_0] 395s | proposal: 'aes-sha2-modp8192' 395s | token: '' '' "aes" '-' 395s | token: '' "aes" '-' "sha2" '-' 395s | token: '-' "sha2" '-' "modp8192" '' 395s | appending IKE encryption algorithm AES_CBC[_0] 395s | parsing prf: 395s | appending IKE PRF algorithm HMAC_SHA2_256[_0] 395s | token: '-' "modp8192" '' '' 395s | - succeeded, advancing tokens 395s | parsing dh: 395s | appending IKE DH algorithm MODP8192[_0] 395s | token: '' '' '' 395s | appending IKE integrity algorithm HMAC_SHA2_256_128[_0] 395s | proposal: 'aes-sha1-modp8192' 395s | token: '' '' "aes" '-' 395s | token: '' "aes" '-' "sha1" '-' 395s | token: '-' "sha1" '-' "modp8192" '' 395s | appending IKE encryption algorithm AES_CBC[_0] 395s | parsing prf: 395s | appending IKE PRF algorithm HMAC_SHA1[_0] 395s | token: '-' "modp8192" '' '' 395s | - succeeded, advancing tokens 395s | parsing dh: 395s | appending IKE DH algorithm MODP8192[_0] 395s | token: '' '' '' 395s | appending IKE integrity algorithm HMAC_SHA1_96[_0] 395s | parsing 'aes_gcm' for IKE 395s | proposal: 'aes_gcm' 395s | token: '' '' "aes_gcm" '' 395s | token: '' "aes_gcm" '' '' 395s | token: '' '' '' 395s | appending IKE encryption algorithm AES_GCM_16[_0] 395s | appending IKE PRF algorithm HMAC_SHA2_512[_0] 395s | appending IKE PRF algorithm HMAC_SHA2_256[_0] 395s | appending IKE integrity algorithm NONE[_0] 395s | appending IKE DH algorithm DH19[_0] 395s | appending IKE DH algorithm DH20[_0] 395s | appending IKE DH algorithm DH21[_0] 395s | appending IKE DH algorithm DH31[_0] 395s | appending IKE DH algorithm MODP4096[_0] 395s | appending IKE DH algorithm MODP3072[_0] 395s | appending IKE DH algorithm MODP2048[_0] 395s | appending IKE DH algorithm MODP8192[_0] 395s | parsing 'aes_gcm-sha2' for IKE 395s | proposal: 'aes_gcm-sha2' 395s | token: '' '' "aes_gcm" '-' 395s | token: '' "aes_gcm" '-' "sha2" '' 395s | token: '-' "sha2" '' '' 395s | appending IKE encryption algorithm AES_GCM_16[_0] 395s | parsing prf: 395s | appending IKE PRF algorithm HMAC_SHA2_256[_0] 395s | token: '' '' '' 395s | - succeeded, advancing tokens 395s | appending IKE integrity algorithm NONE[_0] 395s | appending IKE DH algorithm DH19[_0] 395s | appending IKE DH algorithm DH20[_0] 395s | appending IKE DH algorithm DH21[_0] 395s | appending IKE DH algorithm DH31[_0] 395s | appending IKE DH algorithm MODP4096[_0] 395s | appending IKE DH algorithm MODP3072[_0] 395s | appending IKE DH algorithm MODP2048[_0] 395s | appending IKE DH algorithm MODP8192[_0] 395s | parsing 'aes_gcm-sha2-modp2048' for IKE 395s | proposal: 'aes_gcm-sha2-modp2048' 395s | token: '' '' "aes_gcm" '-' 395s | token: '' "aes_gcm" '-' "sha2" '-' 395s | token: '-' "sha2" '-' "modp2048" '' 395s | appending IKE encryption algorithm AES_GCM_16[_0] 395s | parsing prf: 395s | appending IKE PRF algorithm HMAC_SHA2_256[_0] 395s | token: '-' "modp2048" '' '' 395s | - succeeded, advancing tokens 395s | parsing dh: 395s | appending IKE DH algorithm MODP2048[_0] 395s | token: '' '' '' 395s | appending IKE integrity algorithm NONE[_0] 395s | parsing 'aes_gcm-sha2;modp2048' for IKE 395s | proposal: 'aes_gcm-sha2;modp2048' 395s | token: '' '' "aes_gcm" '-' 395s | token: '' "aes_gcm" '-' "sha2" ';' 395s | token: '-' "sha2" ';' "modp2048" '' 395s | appending IKE encryption algorithm AES_GCM_16[_0] 395s | parsing prf: 395s | appending IKE PRF algorithm HMAC_SHA2_256[_0] 395s | token: ';' "modp2048" '' '' 395s | - succeeded, advancing tokens 395s | parsing dh: 395s | appending IKE DH algorithm MODP2048[_0] 395s | token: '' '' '' 395s | appending IKE integrity algorithm NONE[_0] 395s | parsing 'aes_gcm-modp2048' for IKE 395s | proposal: 'aes_gcm-modp2048' 395s | token: '' '' "aes_gcm" '-' 395s | token: '' "aes_gcm" '-' "modp2048" '' 395s | token: '-' "modp2048" '' '' 395s | appending IKE encryption algorithm AES_GCM_16[_0] 395s | parsing prf: 395s | ike_alg_byname() failed: IKE PRF algorithm 'modp2048' is not recognized 395s | lookup for PRF algorithm 'modp2048' failed 395s | - failed, saving error 'IKE PRF algorithm 'modp2048' is not recognized' and tossing result 395s | parsing integ: 395s | ike_alg_byname() failed: IKE integrity algorithm 'modp2048' is not recognized 395s | lookup for integrity algorithm 'modp2048' failed 395s | - and - failed, returning earlier PRF error 'IKE PRF algorithm 'modp2048' is not recognized' and discarding INTEG error 'IKE integrity algorithm 'modp2048' is not recognized') 395s | parsing 'aes_gcm;modp2048' for IKE 395s | proposal: 'aes_gcm;modp2048' 395s | token: '' '' "aes_gcm" ';' 395s | token: '' "aes_gcm" ';' "modp2048" '' 395s | token: ';' "modp2048" '' '' 395s | appending IKE encryption algorithm AES_GCM_16[_0] 395s | parsing dh: 395s | appending IKE DH algorithm MODP2048[_0] 395s | token: '' '' '' 395s | appending IKE PRF algorithm HMAC_SHA2_512[_0] 395s | appending IKE PRF algorithm HMAC_SHA2_256[_0] 395s | appending IKE integrity algorithm NONE[_0] 395s | parsing 'aes_gcm-none' for IKE 395s | proposal: 'aes_gcm-none' 395s | token: '' '' "aes_gcm" '-' 395s | token: '' "aes_gcm" '-' "none" '' 395s | token: '-' "none" '' '' 395s | appending IKE encryption algorithm AES_GCM_16[_0] 395s | parsing prf: 395s | ike_alg_byname() failed: IKE PRF algorithm 'none' is not recognized 395s | lookup for PRF algorithm 'none' failed 395s | - failed, saving error 'IKE PRF algorithm 'none' is not recognized' and tossing result 395s | parsing integ: 395s | appending IKE integrity algorithm NONE[_0] 395s | token: '' '' '' 395s | appending IKE PRF algorithm HMAC_SHA2_512[_0] 395s | appending IKE PRF algorithm HMAC_SHA2_256[_0] 395s | appending IKE DH algorithm DH19[_0] 395s | appending IKE DH algorithm DH20[_0] 395s | appending IKE DH algorithm DH21[_0] 395s | appending IKE DH algorithm DH31[_0] 395s | appending IKE DH algorithm MODP4096[_0] 395s | appending IKE DH algorithm MODP3072[_0] 395s | appending IKE DH algorithm MODP2048[_0] 395s | appending IKE DH algorithm MODP8192[_0] 395s | parsing 'aes_gcm-none-sha2' for IKE 395s | proposal: 'aes_gcm-none-sha2' 395s | token: '' '' "aes_gcm" '-' 395s | token: '' "aes_gcm" '-' "none" '-' 395s | token: '-' "none" '-' "sha2" '' 395s | appending IKE encryption algorithm AES_GCM_16[_0] 395s | parsing prf: 395s | ike_alg_byname() failed: IKE PRF algorithm 'none' is not recognized 395s | lookup for PRF algorithm 'none' failed 395s | - failed, saving error 'IKE PRF algorithm 'none' is not recognized' and tossing result 395s | parsing integ: 395s | appending IKE integrity algorithm NONE[_0] 395s | token: '-' "sha2" '' '' 395s | parsing prf: 395s | appending IKE PRF algorithm HMAC_SHA2_256[_0] 395s | token: '' '' '' 395s | appending IKE DH algorithm DH19[_0] 395s | appending IKE DH algorithm DH20[_0] 395s | appending IKE DH algorithm DH21[_0] 395s | appending IKE DH algorithm DH31[_0] 395s | appending IKE DH algorithm MODP4096[_0] 395s | appending IKE DH algorithm MODP3072[_0] 395s | appending IKE DH algorithm MODP2048[_0] 395s | appending IKE DH algorithm MODP8192[_0] 395s | parsing 'aes_gcm-none-sha2-modp2048' for IKE 395s | proposal: 'aes_gcm-none-sha2-modp2048' 395s | token: '' '' "aes_gcm" '-' 395s | token: '' "aes_gcm" '-' "none" '-' 395s | token: '-' "none" '-' "sha2" '-' 395s | appending IKE encryption algorithm AES_GCM_16[_0] 395s | parsing prf: 395s | ike_alg_byname() failed: IKE PRF algorithm 'none' is not recognized 395s | lookup for PRF algorithm 'none' failed 395s | - failed, saving error 'IKE PRF algorithm 'none' is not recognized' and tossing result 395s | parsing integ: 395s | appending IKE integrity algorithm NONE[_0] 395s | token: '-' "sha2" '-' "modp2048" '' 395s | parsing prf: 395s | appending IKE PRF algorithm HMAC_SHA2_256[_0] 395s | token: '-' "modp2048" '' '' 395s | parsing dh: 395s | appending IKE DH algorithm MODP2048[_0] 395s | token: '' '' '' 395s | parsing 'aes_gcm-none-sha2;modp2048' for IKE 395s | proposal: 'aes_gcm-none-sha2;modp2048' 395s | token: '' '' "aes_gcm" '-' 395s | token: '' "aes_gcm" '-' "none" '-' 395s | token: '-' "none" '-' "sha2" ';' 395s | appending IKE encryption algorithm AES_GCM_16[_0] 395s | parsing prf: 395s | ike_alg_byname() failed: IKE PRF algorithm 'none' is not recognized 395s | lookup for PRF algorithm 'none' failed 395s | - failed, saving error 'IKE PRF algorithm 'none' is not recognized' and tossing result 395s | parsing integ: 395s | appending IKE integrity algorithm NONE[_0] 395s | token: '-' "sha2" ';' "modp2048" '' 395s | parsing prf: 395s | appending IKE PRF algorithm HMAC_SHA2_256[_0] 395s | token: ';' "modp2048" '' '' 395s | parsing dh: 395s | appending IKE DH algorithm MODP2048[_0] 395s | token: '' '' '' 395s | parsing 'aes_gcm-none-modp2048' for IKE 395s | proposal: 'aes_gcm-none-modp2048' 395s | token: '' '' "aes_gcm" '-' 395s | token: '' "aes_gcm" '-' "none" '-' 395s | token: '-' "none" '-' "modp2048" '' 395s | appending IKE encryption algorithm AES_GCM_16[_0] 395s | parsing prf: 395s | ike_alg_byname() failed: IKE PRF algorithm 'none' is not recognized 395s | lookup for PRF algorithm 'none' failed 395s | - failed, saving error 'IKE PRF algorithm 'none' is not recognized' and tossing result 395s | parsing integ: 395s | appending IKE integrity algorithm NONE[_0] 395s | token: '-' "modp2048" '' '' 395s | parsing prf: 395s | ike_alg_byname() failed: IKE PRF algorithm 'modp2048' is not recognized 395s | lookup for PRF algorithm 'modp2048' failed 395s | -- failed 'IKE PRF algorithm 'modp2048' is not recognized' 395s | parsing 'aes_gcm-none;modp2048' for IKE 395s | proposal: 'aes_gcm-none;modp2048' 395s | token: '' '' "aes_gcm" '-' 395s | token: '' "aes_gcm" '-' "none" ';' 395s | token: '-' "none" ';' "modp2048" '' 395s | appending IKE encryption algorithm AES_GCM_16[_0] 395s | parsing prf: 395s | ike_alg_byname() failed: IKE PRF algorithm 'none' is not recognized 395s | lookup for PRF algorithm 'none' failed 395s | - failed, saving error 'IKE PRF algorithm 'none' is not recognized' and tossing result 395s | parsing integ: 395s | appending IKE integrity algorithm NONE[_0] 395s | token: ';' "modp2048" '' '' 395s | parsing dh: 395s | appending IKE DH algorithm MODP2048[_0] 395s | token: '' '' '' 395s | appending IKE PRF algorithm HMAC_SHA2_512[_0] 395s | appending IKE PRF algorithm HMAC_SHA2_256[_0] 395s | parsing 'aes_gcm-sha1-none-modp2048' for IKE 395s | proposal: 'aes_gcm-sha1-none-modp2048' 395s | token: '' '' "aes_gcm" '-' 395s | token: '' "aes_gcm" '-' "sha1" '-' 395s | token: '-' "sha1" '-' "none" '-' 395s | appending IKE encryption algorithm AES_GCM_16[_0] 395s | parsing prf: 395s | appending IKE PRF algorithm HMAC_SHA1[_0] 395s | token: '-' "none" '-' "modp2048" '' 395s | - succeeded, advancing tokens 395s | parsing dh: 395s | appending IKE DH algorithm NONE[_0] 395s | token: '-' "modp2048" '' '' 395s | parsing 'aes_gcm-sha1-none;modp2048' for IKE 395s | proposal: 'aes_gcm-sha1-none;modp2048' 395s | token: '' '' "aes_gcm" '-' 395s | token: '' "aes_gcm" '-' "sha1" '-' 395s | token: '-' "sha1" '-' "none" ';' 395s | appending IKE encryption algorithm AES_GCM_16[_0] 395s | parsing prf: 395s | appending IKE PRF algorithm HMAC_SHA1[_0] 395s | token: '-' "none" ';' "modp2048" '' 395s | - succeeded, advancing tokens 395s | parsing dh: 395s | appending IKE DH algorithm NONE[_0] 395s | token: ';' "modp2048" '' '' 395s | parsing 'aes+aes_gcm' for IKE 395s | proposal: 'aes+aes_gcm' 395s | token: '' '' "aes" '+' 395s | token: '' "aes" '+' "aes_gcm" '' 395s | token: '+' "aes_gcm" '' '' 395s | appending IKE encryption algorithm AES_CBC[_0] 395s | token: '' '' '' 395s | appending IKE encryption algorithm AES_GCM_16[_0] 395s | appending IKE PRF algorithm HMAC_SHA2_512[_0] 395s | appending IKE PRF algorithm HMAC_SHA2_256[_0] 395s | appending IKE DH algorithm DH19[_0] 395s | appending IKE DH algorithm DH20[_0] 395s | appending IKE DH algorithm DH21[_0] 395s | appending IKE DH algorithm DH31[_0] 395s | appending IKE DH algorithm MODP4096[_0] 395s | appending IKE DH algorithm MODP3072[_0] 395s | appending IKE DH algorithm MODP2048[_0] 395s | appending IKE DH algorithm MODP8192[_0] 395s | parsing ',' for IKE 395s | proposal: '' 395s | token: '' '' "" '' 395s | token: '' "" '' '' 395s | parsing 'aes,' for IKE 395s | proposal: 'aes' 395s | token: '' '' "aes" '' 395s | token: '' "aes" '' '' 395s | token: '' '' '' 395s | appending IKE encryption algorithm AES_CBC[_0] 395s | appending IKE PRF algorithm HMAC_SHA2_512[_0] 395s | appending IKE PRF algorithm HMAC_SHA2_256[_0] 395s | appending IKE integrity algorithm HMAC_SHA2_512_256[_0] 395s | appending IKE integrity algorithm HMAC_SHA2_256_128[_0] 395s | appending IKE DH algorithm DH19[_0] 395s | appending IKE DH algorithm DH20[_0] 395s | appending IKE DH algorithm DH21[_0] 395s | appending IKE DH algorithm DH31[_0] 395s | appending IKE DH algorithm MODP4096[_0] 395s | appending IKE DH algorithm MODP3072[_0] 395s | appending IKE DH algorithm MODP2048[_0] 395s | appending IKE DH algorithm MODP8192[_0] 395s | proposal: '' 395s | token: '' '' "" '' 395s | token: '' "" '' '' 395s | parsing 'aes,,aes' for IKE 395s | proposal: 'aes' 395s | token: '' '' "aes" '' 395s | token: '' "aes" '' '' 395s | token: '' '' '' 395s | appending IKE encryption algorithm AES_CBC[_0] 395s | appending IKE PRF algorithm HMAC_SHA2_512[_0] 395s | appending IKE PRF algorithm HMAC_SHA2_256[_0] 395s | appending IKE integrity algorithm HMAC_SHA2_512_256[_0] 395s | appending IKE integrity algorithm HMAC_SHA2_256_128[_0] 395s | appending IKE DH algorithm DH19[_0] 395s | appending IKE DH algorithm DH20[_0] 395s | appending IKE DH algorithm DH21[_0] 395s | appending IKE DH algorithm DH31[_0] 395s | appending IKE DH algorithm MODP4096[_0] 395s | appending IKE DH algorithm MODP3072[_0] 395s | appending IKE DH algorithm MODP2048[_0] 395s | appending IKE DH algorithm MODP8192[_0] 395s | proposal: '' 395s | token: '' '' "" '' 395s | token: '' "" '' '' 395s | parsing ',aes' for IKE 395s | proposal: '' 395s | token: '' '' "" '' 395s | token: '' "" '' '' 395s | parsing '-' for IKE 395s | proposal: '-' 395s | token: '' '' "" '-' 395s | token: '' "" '-' "" '' 395s | parsing '+' for IKE 395s | proposal: '+' 395s | token: '' '' "" '+' 395s | token: '' "" '+' "" '' 395s | parsing ';' for IKE 395s | proposal: ';' 395s | token: '' '' "" ';' 395s | token: '' "" ';' "" '' 395s | parsing 'aes-' for IKE 395s | proposal: 'aes-' 395s | token: '' '' "aes" '-' 395s | token: '' "aes" '-' "" '' 395s | token: '-' "" '' '' 395s | appending IKE encryption algorithm AES_CBC[_0] 395s | parsing prf: 395s | - failed, saving error 'IKE PRF algorithm is empty' and tossing result 395s | parsing integ: 395s | - and - failed, returning earlier PRF error 'IKE PRF algorithm is empty' and discarding INTEG error 'IKE integrity algorithm is empty') 395s | parsing 'aes+' for IKE 395s | proposal: 'aes+' 395s | token: '' '' "aes" '+' 395s | token: '' "aes" '+' "" '' 395s | token: '+' "" '' '' 395s | appending IKE encryption algorithm AES_CBC[_0] 395s | parsing 'aes;' for IKE 395s | proposal: 'aes;' 395s | token: '' '' "aes" ';' 395s | token: '' "aes" ';' "" '' 395s | token: ';' "" '' '' 395s | appending IKE encryption algorithm AES_CBC[_0] 395s | parsing dh: 395s | ... failed 'IKE DH algorithm is empty' 395s | parsing '-aes' for IKE 395s | proposal: '-aes' 395s | token: '' '' "" '-' 395s | token: '' "" '-' "aes" '' 395s | parsing '+aes' for IKE 395s | proposal: '+aes' 395s | token: '' '' "" '+' 395s | token: '' "" '+' "aes" '' 395s | parsing ';aes' for IKE 395s | proposal: ';aes' 395s | token: '' '' "" ';' 395s | token: '' "" ';' "aes" '' 395s | parsing 'aes+-' for IKE 395s | proposal: 'aes+-' 395s | token: '' '' "aes" '+' 395s | token: '' "aes" '+' "" '-' 395s | token: '+' "" '-' "" '' 395s | appending IKE encryption algorithm AES_CBC[_0] 395s | parsing 'aes+;' for IKE 395s | proposal: 'aes+;' 395s | token: '' '' "aes" '+' 395s | token: '' "aes" '+' "" ';' 395s | token: '+' "" ';' "" '' 395s | appending IKE encryption algorithm AES_CBC[_0] 395s | parsing 'aes++' for IKE 395s | proposal: 'aes++' 395s | token: '' '' "aes" '+' 395s | token: '' "aes" '+' "" '+' 395s | token: '+' "" '+' "" '' 395s | appending IKE encryption algorithm AES_CBC[_0] 395s ipsec algparse: leak detective found no leaks 395s ipsec algparse: Encryption algorithms: 395s ipsec algparse: AES_CCM_16 {256,192,*128} IKEv1: ESP IKEv2: ESP FIPS aes_ccm, aes_ccm_c 395s ipsec algparse: AES_CCM_12 {256,192,*128} IKEv1: ESP IKEv2: ESP FIPS aes_ccm_b 395s ipsec algparse: AES_CCM_8 {256,192,*128} IKEv1: ESP IKEv2: ESP FIPS aes_ccm_a 395s ipsec algparse: 3DES_CBC [*192] IKEv1: IKE ESP IKEv2: IKE ESP FIPS NSS(CBC) 3des 395s ipsec algparse: CAMELLIA_CTR {256,192,*128} IKEv1: ESP IKEv2: ESP 395s ipsec algparse: CAMELLIA_CBC {256,192,*128} IKEv1: IKE ESP IKEv2: IKE ESP NSS(CBC) camellia 395s ipsec algparse: AES_GCM_16 {256,192,*128} IKEv1: ESP IKEv2: IKE ESP FIPS NSS(AEAD) aes_gcm, aes_gcm_c 395s ipsec algparse: AES_GCM_12 {256,192,*128} IKEv1: ESP IKEv2: IKE ESP FIPS NSS(AEAD) aes_gcm_b 395s ipsec algparse: AES_GCM_8 {256,192,*128} IKEv1: ESP IKEv2: IKE ESP FIPS NSS(AEAD) aes_gcm_a 395s ipsec algparse: AES_CTR {256,192,*128} IKEv1: IKE ESP IKEv2: IKE ESP FIPS NSS(CTR) aesctr 395s ipsec algparse: AES_CBC {256,192,*128} IKEv1: IKE ESP IKEv2: IKE ESP FIPS NSS(CBC) aes 395s ipsec algparse: NULL_AUTH_AES_GMAC {256,192,*128} IKEv1: ESP IKEv2: ESP FIPS aes_gmac 395s ipsec algparse: NULL [] IKEv1: ESP IKEv2: ESP NULL 395s ipsec algparse: CHACHA20_POLY1305 [*256] IKEv1: IKEv2: IKE ESP NSS(AEAD) chacha20poly1305 395s ipsec algparse: Hash algorithms: 395s ipsec algparse: MD5 IKEv1: IKE IKEv2: NSS 395s ipsec algparse: SHA1 IKEv1: IKE IKEv2: IKE FIPS NSS sha 395s ipsec algparse: SHA2_256 IKEv1: IKE IKEv2: IKE FIPS NSS sha2, sha256 395s ipsec algparse: SHA2_384 IKEv1: IKE IKEv2: IKE FIPS NSS sha384 395s ipsec algparse: SHA2_512 IKEv1: IKE IKEv2: IKE FIPS NSS sha512 395s ipsec algparse: IDENTITY IKEv1: IKEv2: FIPS 395s ipsec algparse: PRF algorithms: 395s ipsec algparse: HMAC_MD5 IKEv1: IKE IKEv2: IKE NSS md5 395s ipsec algparse: HMAC_SHA1 IKEv1: IKE IKEv2: IKE FIPS NSS sha, sha1 395s ipsec algparse: HMAC_SHA2_256 IKEv1: IKE IKEv2: IKE FIPS NSS sha2, sha256, sha2_256 395s ipsec algparse: HMAC_SHA2_384 IKEv1: IKE IKEv2: IKE FIPS NSS sha384, sha2_384 395s ipsec algparse: HMAC_SHA2_512 IKEv1: IKE IKEv2: IKE FIPS NSS sha512, sha2_512 395s ipsec algparse: AES_XCBC IKEv1: IKEv2: IKE native(XCBC) aes128_xcbc 395s ipsec algparse: Integrity algorithms: 395s ipsec algparse: HMAC_MD5_96 IKEv1: IKE ESP AH IKEv2: IKE ESP AH NSS md5, hmac_md5 395s ipsec algparse: HMAC_SHA1_96 IKEv1: IKE ESP AH IKEv2: IKE ESP AH FIPS NSS sha, sha1, sha1_96, hmac_sha1 395s ipsec algparse: HMAC_SHA2_512_256 IKEv1: IKE ESP AH IKEv2: IKE ESP AH FIPS NSS sha512, sha2_512, sha2_512_256, hmac_sha2_512 395s ipsec algparse: HMAC_SHA2_384_192 IKEv1: IKE ESP AH IKEv2: IKE ESP AH FIPS NSS sha384, sha2_384, sha2_384_192, hmac_sha2_384 395s ipsec algparse: HMAC_SHA2_256_128 IKEv1: IKE ESP AH IKEv2: IKE ESP AH FIPS NSS sha2, sha256, sha2_256, sha2_256_128, hmac_sha2_256 395s ipsec algparse: HMAC_SHA2_256_TRUNCBUG IKEv1: ESP AH IKEv2: AH 395s ipsec algparse: AES_XCBC_96 IKEv1: ESP AH IKEv2: IKE ESP AH native(XCBC) aes_xcbc, aes128_xcbc, aes128_xcbc_96 395s ipsec algparse: AES_CMAC_96 IKEv1: ESP AH IKEv2: ESP AH FIPS aes_cmac 395s ipsec algparse: NONE IKEv1: ESP IKEv2: IKE ESP FIPS null 395s ipsec algparse: DH algorithms: 395s ipsec algparse: NONE IKEv1: IKEv2: IKE ESP AH FIPS NSS(MODP) null, dh0 395s ipsec algparse: MODP1536 IKEv1: IKE ESP AH IKEv2: IKE ESP AH NSS(MODP) dh5 395s ipsec algparse: MODP2048 IKEv1: IKE ESP AH IKEv2: IKE ESP AH FIPS NSS(MODP) dh14 395s ipsec algparse: MODP3072 IKEv1: IKE ESP AH IKEv2: IKE ESP AH FIPS NSS(MODP) dh15 395s ipsec algparse: MODP4096 IKEv1: IKE ESP AH IKEv2: IKE ESP AH FIPS NSS(MODP) dh16 395s ipsec algparse: MODP6144 IKEv1: IKE ESP AH IKEv2: IKE ESP AH FIPS NSS(MODP) dh17 395s ipsec algparse: MODP8192 IKEv1: IKE ESP AH IKEv2: IKE ESP AH FIPS NSS(MODP) dh18 395s ipsec algparse: DH19 IKEv1: IKE IKEv2: IKE ESP AH FIPS NSS(ECP) ecp_256, ecp256 395s ipsec algparse: DH20 IKEv1: IKE IKEv2: IKE ESP AH FIPS NSS(ECP) ecp_384, ecp384 395s ipsec algparse: DH21 IKEv1: IKE IKEv2: IKE ESP AH FIPS NSS(ECP) ecp_521, ecp521 395s ipsec algparse: DH31 IKEv1: IKE IKEv2: IKE ESP AH NSS(ECP) curve25519 395s ipsec algparse: IPCOMP algorithms: 395s ipsec algparse: DEFLATE IKEv1: ESP AH IKEv2: ESP AH FIPS 395s ipsec algparse: LZS IKEv1: IKEv2: ESP AH FIPS 395s ipsec algparse: LZJH IKEv1: IKEv2: ESP AH FIPS 395s ipsec algparse: testing CAMELLIA_CBC: 395s ipsec algparse: Camellia: 16 bytes with 128-bit key 395s | decode_to_chunk() raw_key: input "0x00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00" 395s | decode_to_chunk() output: 395s | 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................ 395s | CONCATENATE_DATA_AND_BASE: 395s | target: EXTRACT_KEY_FROM_KEY 395s | base: base-key@0x55685bc944c0 (16-bytes, AES_KEY_GEN) 395s | params: 16-bytes@0x7ffff22a3e10 395s | key-offset: 0, key-size: 16 395s | EXTRACT_KEY_FROM_KEY: 395s | target: CAMELLIA_CBC 395s | flags: ENCRYPT+DECRYPT 395s | key_size: 16-bytes 395s | base: base-key@0x55685bc974d0 (32-bytes, EXTRACT_KEY_FROM_KEY) 395s | operation: FLAGS_ONLY 395s | params: 8-bytes@0x7ffff22a3dd8 395s | decode_to_mac() IV: : input "0x00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00" 395s | decode_to_mac() output: 395s | 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................ 395s | decode_to_chunk() new IV: : input "0x07 92 3A 39 EB 0A 81 7D 1C 4D 87 BD B8 2D 1F 1C" 395s | decode_to_chunk() output: 395s | 07 92 3a 39 eb 0a 81 7d 1c 4d 87 bd b8 2d 1f 1c ..:9...}.M...-.. 395s | decode_to_chunk() plaintext: : input "0x80 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00" 395s | decode_to_chunk() output: 395s | 80 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................ 395s | decode_to_chunk() ciphertext: : input "0x07 92 3A 39 EB 0A 81 7D 1C 4D 87 BD B8 2D 1F 1C" 395s | decode_to_chunk() output: 395s | 07 92 3a 39 eb 0a 81 7d 1c 4d 87 bd b8 2d 1f 1c ..:9...}.M...-.. 395s | NSS ike_alg_nss_cbc: CAMELLIA_CBC - enter (nil) 395s | using IKEv1 IV 395s | NSS ike_alg_nss_cbc: CAMELLIA_CBC - exit 395s | verify_bytes() Camellia: 16 bytes with 128-bit key: encrypt: ok 395s | verify_bytes() Camellia: 16 bytes with 128-bit key: updated CBC IV: ok 395s | decode_to_mac() IV: : input "0x00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00" 395s | decode_to_mac() output: 395s | 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................ 395s | decode_to_chunk() new IV: : input "0x07 92 3A 39 EB 0A 81 7D 1C 4D 87 BD B8 2D 1F 1C" 395s | decode_to_chunk() output: 395s | 07 92 3a 39 eb 0a 81 7d 1c 4d 87 bd b8 2d 1f 1c ..:9...}.M...-.. 395s | decode_to_chunk() ciphertext: : input "0x07 92 3A 39 EB 0A 81 7D 1C 4D 87 BD B8 2D 1F 1C" 395s | decode_to_chunk() output: 395s | 07 92 3a 39 eb 0a 81 7d 1c 4d 87 bd b8 2d 1f 1c ..:9...}.M...-.. 395s | decode_to_chunk() plaintext: : input "0x80 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00" 395s | decode_to_chunk() output: 395s | 80 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................ 395s | NSS ike_alg_nss_cbc: CAMELLIA_CBC - enter (nil) 395s | using IKEv1 IV 395s | NSS ike_alg_nss_cbc: CAMELLIA_CBC - exit 395s | verify_bytes() Camellia: 16 bytes with 128-bit key: decrypt: ok 395s | verify_bytes() Camellia: 16 bytes with 128-bit key: updated CBC IV: ok 395s ipsec algparse: Camellia: 16 bytes with 128-bit key 395s | decode_to_chunk() raw_key: input "0x00 11 22 33 44 55 66 77 88 99 AA BB CC DD EE FF" 395s | decode_to_chunk() output: 395s | 00 11 22 33 44 55 66 77 88 99 aa bb cc dd ee ff .."3DUfw........ 395s | CONCATENATE_DATA_AND_BASE: 395s | target: EXTRACT_KEY_FROM_KEY 395s | base: base-key@0x55685bc944c0 (16-bytes, AES_KEY_GEN) 395s | params: 16-bytes@0x7ffff22a3e10 395s | key-offset: 0, key-size: 16 395s | EXTRACT_KEY_FROM_KEY: 395s | target: CAMELLIA_CBC 395s | flags: ENCRYPT+DECRYPT 395s | key_size: 16-bytes 395s | base: base-key@0x55685bc974d0 (32-bytes, EXTRACT_KEY_FROM_KEY) 395s | operation: FLAGS_ONLY 395s | params: 8-bytes@0x7ffff22a3dd8 395s | decode_to_mac() IV: : input "0x00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00" 395s | decode_to_mac() output: 395s | 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................ 395s | decode_to_chunk() new IV: : input "0x14 4D 2B 0F 50 0C 27 B7 EC 2C D1 2D 91 59 6F 37" 395s | decode_to_chunk() output: 395s | 14 4d 2b 0f 50 0c 27 b7 ec 2c d1 2d 91 59 6f 37 .M+.P.'..,.-.Yo7 395s | decode_to_chunk() plaintext: : input "0x00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 01 " 395s | decode_to_chunk() output: 395s | 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 01 ................ 395s | decode_to_chunk() ciphertext: : input "0x14 4D 2B 0F 50 0C 27 B7 EC 2C D1 2D 91 59 6F 37" 395s | decode_to_chunk() output: 395s | 14 4d 2b 0f 50 0c 27 b7 ec 2c d1 2d 91 59 6f 37 .M+.P.'..,.-.Yo7 395s | NSS ike_alg_nss_cbc: CAMELLIA_CBC - enter (nil) 395s | using IKEv1 IV 395s | NSS ike_alg_nss_cbc: CAMELLIA_CBC - exit 395s | verify_bytes() Camellia: 16 bytes with 128-bit key: encrypt: ok 395s | verify_bytes() Camellia: 16 bytes with 128-bit key: updated CBC IV: ok 395s | decode_to_mac() IV: : input "0x00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00" 395s | decode_to_mac() output: 395s | 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................ 395s | decode_to_chunk() new IV: : input "0x14 4D 2B 0F 50 0C 27 B7 EC 2C D1 2D 91 59 6F 37" 395s | decode_to_chunk() output: 395s | 14 4d 2b 0f 50 0c 27 b7 ec 2c d1 2d 91 59 6f 37 .M+.P.'..,.-.Yo7 395s | decode_to_chunk() ciphertext: : input "0x14 4D 2B 0F 50 0C 27 B7 EC 2C D1 2D 91 59 6F 37" 395s | decode_to_chunk() output: 395s | 14 4d 2b 0f 50 0c 27 b7 ec 2c d1 2d 91 59 6f 37 .M+.P.'..,.-.Yo7 395s | decode_to_chunk() plaintext: : input "0x00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 01 " 395s | decode_to_chunk() output: 395s | 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 01 ................ 395s | NSS ike_alg_nss_cbc: CAMELLIA_CBC - enter (nil) 395s | using IKEv1 IV 395s | NSS ike_alg_nss_cbc: CAMELLIA_CBC - exit 395s | verify_bytes() Camellia: 16 bytes with 128-bit key: decrypt: ok 395s | verify_bytes() Camellia: 16 bytes with 128-bit key: updated CBC IV: ok 395s ipsec algparse: Camellia: 16 bytes with 256-bit key 395s | decode_to_chunk() raw_key: input "0x00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00" 395s | decode_to_chunk() output: 395s | 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................ 395s | 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................ 395s | CONCATENATE_DATA_AND_BASE: 395s | target: EXTRACT_KEY_FROM_KEY 395s | base: base-key@0x55685bc944c0 (16-bytes, AES_KEY_GEN) 395s | params: 16-bytes@0x7ffff22a3e10 395s | key-offset: 0, key-size: 32 395s | EXTRACT_KEY_FROM_KEY: 395s | target: CAMELLIA_CBC 395s | flags: ENCRYPT+DECRYPT 395s | key_size: 32-bytes 395s | base: base-key@0x55685bc974d0 (48-bytes, EXTRACT_KEY_FROM_KEY) 395s | operation: FLAGS_ONLY 395s | params: 8-bytes@0x7ffff22a3dd8 395s | decode_to_mac() IV: : input "0x00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00" 395s | decode_to_mac() output: 395s | 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................ 395s | decode_to_chunk() new IV: : input "0xB0 C6 B8 8A EA 51 8A B0 9E 84 72 48 E9 1B 1B 9D" 395s | decode_to_chunk() output: 395s | b0 c6 b8 8a ea 51 8a b0 9e 84 72 48 e9 1b 1b 9d .....Q....rH.... 395s | decode_to_chunk() plaintext: : input "0x80 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00" 395s | decode_to_chunk() output: 395s | 80 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................ 395s | decode_to_chunk() ciphertext: : input "0xB0 C6 B8 8A EA 51 8A B0 9E 84 72 48 E9 1B 1B 9D" 395s | decode_to_chunk() output: 395s | b0 c6 b8 8a ea 51 8a b0 9e 84 72 48 e9 1b 1b 9d .....Q....rH.... 395s | NSS ike_alg_nss_cbc: CAMELLIA_CBC - enter (nil) 395s | using IKEv1 IV 395s | NSS ike_alg_nss_cbc: CAMELLIA_CBC - exit 395s | verify_bytes() Camellia: 16 bytes with 256-bit key: encrypt: ok 395s | verify_bytes() Camellia: 16 bytes with 256-bit key: updated CBC IV: ok 395s | decode_to_mac() IV: : input "0x00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00" 395s | decode_to_mac() output: 395s | 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................ 395s | decode_to_chunk() new IV: : input "0xB0 C6 B8 8A EA 51 8A B0 9E 84 72 48 E9 1B 1B 9D" 395s | decode_to_chunk() output: 395s | b0 c6 b8 8a ea 51 8a b0 9e 84 72 48 e9 1b 1b 9d .....Q....rH.... 395s | decode_to_chunk() ciphertext: : input "0xB0 C6 B8 8A EA 51 8A B0 9E 84 72 48 E9 1B 1B 9D" 395s | decode_to_chunk() output: 395s | b0 c6 b8 8a ea 51 8a b0 9e 84 72 48 e9 1b 1b 9d .....Q....rH.... 395s | decode_to_chunk() plaintext: : input "0x80 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00" 395s | decode_to_chunk() output: 395s | 80 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................ 395s | NSS ike_alg_nss_cbc: CAMELLIA_CBC - enter (nil) 395s | using IKEv1 IV 395s | NSS ike_alg_nss_cbc: CAMELLIA_CBC - exit 395s | verify_bytes() Camellia: 16 bytes with 256-bit key: decrypt: ok 395s | verify_bytes() Camellia: 16 bytes with 256-bit key: updated CBC IV: ok 395s ipsec algparse: Camellia: 16 bytes with 256-bit key 395s | decode_to_chunk() raw_key: input "0x00 11 22 33 44 55 66 77 88 99 AA BB CC DD EE FF FF EE DD CC BB AA 99 88 77 66 55 44 33 22 11 00" 395s | decode_to_chunk() output: 395s | 00 11 22 33 44 55 66 77 88 99 aa bb cc dd ee ff .."3DUfw........ 395s | ff ee dd cc bb aa 99 88 77 66 55 44 33 22 11 00 ........wfUD3".. 395s | CONCATENATE_DATA_AND_BASE: 395s | target: EXTRACT_KEY_FROM_KEY 395s | base: base-key@0x55685bc944c0 (16-bytes, AES_KEY_GEN) 395s | params: 16-bytes@0x7ffff22a3e10 395s | key-offset: 0, key-size: 32 395s | EXTRACT_KEY_FROM_KEY: 395s | target: CAMELLIA_CBC 395s | flags: ENCRYPT+DECRYPT 395s | key_size: 32-bytes 395s | base: base-key@0x55685bc974d0 (48-bytes, EXTRACT_KEY_FROM_KEY) 395s | operation: FLAGS_ONLY 395s | params: 8-bytes@0x7ffff22a3dd8 395s | decode_to_mac() IV: : input "0x00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00" 395s | decode_to_mac() output: 395s | 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................ 395s | decode_to_chunk() new IV: : input "0xCC 39 FF EE 18 56 D3 EB 61 02 5E 93 21 9B 65 23 " 395s | decode_to_chunk() output: 395s | cc 39 ff ee 18 56 d3 eb 61 02 5e 93 21 9b 65 23 .9...V..a.^.!.e# 395s | decode_to_chunk() plaintext: : input "0x00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 01" 395s | decode_to_chunk() output: 395s | 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 01 ................ 395s | decode_to_chunk() ciphertext: : input "0xCC 39 FF EE 18 56 D3 EB 61 02 5E 93 21 9B 65 23 " 395s | decode_to_chunk() output: 395s | cc 39 ff ee 18 56 d3 eb 61 02 5e 93 21 9b 65 23 .9...V..a.^.!.e# 395s | NSS ike_alg_nss_cbc: CAMELLIA_CBC - enter (nil) 395s | using IKEv1 IV 395s | NSS ike_alg_nss_cbc: CAMELLIA_CBC - exit 395s | verify_bytes() Camellia: 16 bytes with 256-bit key: encrypt: ok 395s | verify_bytes() Camellia: 16 bytes with 256-bit key: updated CBC IV: ok 395s | decode_to_mac() IV: : input "0x00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00" 395s | decode_to_mac() output: 395s | 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................ 395s | decode_to_chunk() new IV: : input "0xCC 39 FF EE 18 56 D3 EB 61 02 5E 93 21 9B 65 23 " 395s | decode_to_chunk() output: 395s | cc 39 ff ee 18 56 d3 eb 61 02 5e 93 21 9b 65 23 .9...V..a.^.!.e# 395s | decode_to_chunk() ciphertext: : input "0xCC 39 FF EE 18 56 D3 EB 61 02 5E 93 21 9B 65 23 " 395s | decode_to_chunk() output: 395s | cc 39 ff ee 18 56 d3 eb 61 02 5e 93 21 9b 65 23 .9...V..a.^.!.e# 395s | decode_to_chunk() plaintext: : input "0x00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 01" 395s | decode_to_chunk() output: 395s | 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 01 ................ 395s | NSS ike_alg_nss_cbc: CAMELLIA_CBC - enter (nil) 395s | using IKEv1 IV 395s | NSS ike_alg_nss_cbc: CAMELLIA_CBC - exit 395s | verify_bytes() Camellia: 16 bytes with 256-bit key: decrypt: ok 395s | verify_bytes() Camellia: 16 bytes with 256-bit key: updated CBC IV: ok 395s ipsec algparse: testing AES_GCM_16: 395s ipsec algparse: empty string 395s | decode_to_chunk() raw_key: input "0xcf063a34d4a9a76c2c86787d3f96db71" 395s | decode_to_chunk() output: 395s | cf 06 3a 34 d4 a9 a7 6c 2c 86 78 7d 3f 96 db 71 ..:4...l,.x}?..q 395s | CONCATENATE_DATA_AND_BASE: 395s | target: EXTRACT_KEY_FROM_KEY 395s | base: base-key@0x55685bc944c0 (16-bytes, AES_KEY_GEN) 395s | params: 16-bytes@0x7ffff22a3d50 395s | key-offset: 0, key-size: 16 395s | EXTRACT_KEY_FROM_KEY: 395s | target: AES_GCM 395s | flags: ENCRYPT+DECRYPT 395s | key_size: 16-bytes 395s | base: base-key@0x55685bc974d0 (32-bytes, EXTRACT_KEY_FROM_KEY) 395s | operation: FLAGS_ONLY 395s | params: 8-bytes@0x7ffff22a3d18 395s | decode_to_chunk() salted IV: input "0x113b9785971864c83b01c787" 395s | decode_to_chunk() output: 395s | 11 3b 97 85 97 18 64 c8 3b 01 c7 87 .;....d.;... 395s | decode_to_chunk() AAD: input "" 395s | decode_to_chunk() output: 395s | 395s | decode_to_chunk() plaintext: input "" 395s | decode_to_chunk() output: 395s | 395s | decode_to_chunk() ciphertext: input "" 395s | decode_to_chunk() output: 395s | 395s | decode_to_chunk() tag: input "0x72ac8493e3a5228b5d130a69d2510e42" 395s | decode_to_chunk() output: 395s | 72 ac 84 93 e3 a5 22 8b 5d 13 0a 69 d2 51 0e 42 r.....".]..i.Q.B 395s | test_gcm_vector() DECRYPT: aad-size=0 salt-size=4 wire-IV-size=8 text-size=0 tag-size=16 text+tag in: 395s | 72 ac 84 93 e3 a5 22 8b 5d 13 0a 69 d2 51 0e 42 r.....".]..i.Q.B 395s | verify_bytes() empty string: output ciphertext: ok 395s | verify_bytes() empty string: TAG: ok 395s | test_gcm_vector() text+tag out: 395s | 72 ac 84 93 e3 a5 22 8b 5d 13 0a 69 d2 51 0e 42 r.....".]..i.Q.B 395s | test_gcm_vector() ENCRYPT: aad-size=0 salt-size=4 wire-IV-size=8 text-size=0 tag-size=16 text+tag in: 395s | 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................ 395s | verify_bytes() empty string: output ciphertext: ok 395s | verify_bytes() empty string: TAG: ok 395s | test_gcm_vector() text+tag out: 395s | 72 ac 84 93 e3 a5 22 8b 5d 13 0a 69 d2 51 0e 42 r.....".]..i.Q.B 395s ipsec algparse: one block 395s | decode_to_chunk() raw_key: input "0xe98b72a9881a84ca6b76e0f43e68647a" 395s | decode_to_chunk() output: 395s | e9 8b 72 a9 88 1a 84 ca 6b 76 e0 f4 3e 68 64 7a ..r.....kv..>hdz 395s | CONCATENATE_DATA_AND_BASE: 395s | target: EXTRACT_KEY_FROM_KEY 395s | base: base-key@0x55685bc944c0 (16-bytes, AES_KEY_GEN) 395s | params: 16-bytes@0x7ffff22a3d50 395s | key-offset: 0, key-size: 16 395s | EXTRACT_KEY_FROM_KEY: 395s | target: AES_GCM 395s | flags: ENCRYPT+DECRYPT 395s | key_size: 16-bytes 395s | base: base-key@0x55685bc974d0 (32-bytes, EXTRACT_KEY_FROM_KEY) 395s | operation: FLAGS_ONLY 395s | params: 8-bytes@0x7ffff22a3d18 395s | decode_to_chunk() salted IV: input "0x8b23299fde174053f3d652ba" 395s | decode_to_chunk() output: 395s | 8b 23 29 9f de 17 40 53 f3 d6 52 ba .#)...@S..R. 395s | decode_to_chunk() AAD: input "" 395s | decode_to_chunk() output: 395s | 395s | decode_to_chunk() plaintext: input "0x28286a321293253c3e0aa2704a278032" 395s | decode_to_chunk() output: 395s | 28 28 6a 32 12 93 25 3c 3e 0a a2 70 4a 27 80 32 ((j2..%<>..pJ'.2 395s | decode_to_chunk() ciphertext: input "0x5a3c1cf1985dbb8bed818036fdd5ab42" 395s | decode_to_chunk() output: 395s | 5a 3c 1c f1 98 5d bb 8b ed 81 80 36 fd d5 ab 42 Z<...].....6...B 395s | decode_to_chunk() tag: input "0x23c7ab0f952b7091cd324835043b5eb5" 395s | decode_to_chunk() output: 395s | 23 c7 ab 0f 95 2b 70 91 cd 32 48 35 04 3b 5e b5 #....+p..2H5.;^. 395s | test_gcm_vector() DECRYPT: aad-size=0 salt-size=4 wire-IV-size=8 text-size=16 tag-size=16 text+tag in: 395s | 5a 3c 1c f1 98 5d bb 8b ed 81 80 36 fd d5 ab 42 Z<...].....6...B 395s | 23 c7 ab 0f 95 2b 70 91 cd 32 48 35 04 3b 5e b5 #....+p..2H5.;^. 395s | verify_bytes() one block: output ciphertext: ok 395s | verify_bytes() one block: TAG: ok 395s | test_gcm_vector() text+tag out: 395s | 28 28 6a 32 12 93 25 3c 3e 0a a2 70 4a 27 80 32 ((j2..%<>..pJ'.2 395s | 23 c7 ab 0f 95 2b 70 91 cd 32 48 35 04 3b 5e b5 #....+p..2H5.;^. 395s | test_gcm_vector() ENCRYPT: aad-size=0 salt-size=4 wire-IV-size=8 text-size=16 tag-size=16 text+tag in: 395s | 28 28 6a 32 12 93 25 3c 3e 0a a2 70 4a 27 80 32 ((j2..%<>..pJ'.2 395s | 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................ 395s | verify_bytes() one block: output ciphertext: ok 395s | verify_bytes() one block: TAG: ok 395s | test_gcm_vector() text+tag out: 395s | 5a 3c 1c f1 98 5d bb 8b ed 81 80 36 fd d5 ab 42 Z<...].....6...B 395s | 23 c7 ab 0f 95 2b 70 91 cd 32 48 35 04 3b 5e b5 #....+p..2H5.;^. 395s ipsec algparse: two blocks 395s | decode_to_chunk() raw_key: input "0xbfd414a6212958a607a0f5d3ab48471d" 395s | decode_to_chunk() output: 395s | bf d4 14 a6 21 29 58 a6 07 a0 f5 d3 ab 48 47 1d ....!)X......HG. 395s | CONCATENATE_DATA_AND_BASE: 395s | target: EXTRACT_KEY_FROM_KEY 395s | base: base-key@0x55685bc944c0 (16-bytes, AES_KEY_GEN) 395s | params: 16-bytes@0x7ffff22a3d50 395s | key-offset: 0, key-size: 16 395s | EXTRACT_KEY_FROM_KEY: 395s | target: AES_GCM 395s | flags: ENCRYPT+DECRYPT 395s | key_size: 16-bytes 395s | base: base-key@0x55685bc974d0 (32-bytes, EXTRACT_KEY_FROM_KEY) 395s | operation: FLAGS_ONLY 395s | params: 8-bytes@0x7ffff22a3d18 395s | decode_to_chunk() salted IV: input "0x86d8ea0ab8e40dcc481cd0e2" 395s | decode_to_chunk() output: 395s | 86 d8 ea 0a b8 e4 0d cc 48 1c d0 e2 ........H... 395s | decode_to_chunk() AAD: input "" 395s | decode_to_chunk() output: 395s | 395s | decode_to_chunk() plaintext: input "0xa6b76a066e63392c9443e60272ceaeb9d25c991b0f2e55e2804e168c05ea591a" 395s | decode_to_chunk() output: 395s | a6 b7 6a 06 6e 63 39 2c 94 43 e6 02 72 ce ae b9 ..j.nc9,.C..r... 395s | d2 5c 99 1b 0f 2e 55 e2 80 4e 16 8c 05 ea 59 1a .\....U..N....Y. 395s | decode_to_chunk() ciphertext: input "0x62171db33193292d930bf6647347652c1ef33316d7feca99d54f1db4fcf513f8" 395s | decode_to_chunk() output: 395s | 62 17 1d b3 31 93 29 2d 93 0b f6 64 73 47 65 2c b...1.)-...dsGe, 395s | 1e f3 33 16 d7 fe ca 99 d5 4f 1d b4 fc f5 13 f8 ..3......O...... 395s | decode_to_chunk() tag: input "0xc28280aa5c6c7a8bd366f28c1cfd1f6e" 395s | decode_to_chunk() output: 395s | c2 82 80 aa 5c 6c 7a 8b d3 66 f2 8c 1c fd 1f 6e ....\lz..f.....n 395s | test_gcm_vector() DECRYPT: aad-size=0 salt-size=4 wire-IV-size=8 text-size=32 tag-size=16 text+tag in: 395s | 62 17 1d b3 31 93 29 2d 93 0b f6 64 73 47 65 2c b...1.)-...dsGe, 395s | 1e f3 33 16 d7 fe ca 99 d5 4f 1d b4 fc f5 13 f8 ..3......O...... 395s | c2 82 80 aa 5c 6c 7a 8b d3 66 f2 8c 1c fd 1f 6e ....\lz..f.....n 395s | verify_bytes() two blocks: output ciphertext: ok 395s | verify_bytes() two blocks: TAG: ok 395s | test_gcm_vector() text+tag out: 395s | a6 b7 6a 06 6e 63 39 2c 94 43 e6 02 72 ce ae b9 ..j.nc9,.C..r... 395s | d2 5c 99 1b 0f 2e 55 e2 80 4e 16 8c 05 ea 59 1a .\....U..N....Y. 395s | c2 82 80 aa 5c 6c 7a 8b d3 66 f2 8c 1c fd 1f 6e ....\lz..f.....n 395s | test_gcm_vector() ENCRYPT: aad-size=0 salt-size=4 wire-IV-size=8 text-size=32 tag-size=16 text+tag in: 395s | a6 b7 6a 06 6e 63 39 2c 94 43 e6 02 72 ce ae b9 ..j.nc9,.C..r... 395s | d2 5c 99 1b 0f 2e 55 e2 80 4e 16 8c 05 ea 59 1a .\....U..N....Y. 395s | 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................ 395s | verify_bytes() two blocks: output ciphertext: ok 395s | verify_bytes() two blocks: TAG: ok 395s | test_gcm_vector() text+tag out: 395s | 62 17 1d b3 31 93 29 2d 93 0b f6 64 73 47 65 2c b...1.)-...dsGe, 395s | 1e f3 33 16 d7 fe ca 99 d5 4f 1d b4 fc f5 13 f8 ..3......O...... 395s | c2 82 80 aa 5c 6c 7a 8b d3 66 f2 8c 1c fd 1f 6e ....\lz..f.....n 395s ipsec algparse: two blocks with associated data 395s | decode_to_chunk() raw_key: input "0x95bcde70c094f04e3dd8259cafd88ce8" 395s | decode_to_chunk() output: 395s | 95 bc de 70 c0 94 f0 4e 3d d8 25 9c af d8 8c e8 ...p...N=.%..... 395s | CONCATENATE_DATA_AND_BASE: 395s | target: EXTRACT_KEY_FROM_KEY 395s | base: base-key@0x55685bc944c0 (16-bytes, AES_KEY_GEN) 395s | params: 16-bytes@0x7ffff22a3d50 395s | key-offset: 0, key-size: 16 395s | EXTRACT_KEY_FROM_KEY: 395s | target: AES_GCM 395s | flags: ENCRYPT+DECRYPT 395s | key_size: 16-bytes 395s | base: base-key@0x55685bc974d0 (32-bytes, EXTRACT_KEY_FROM_KEY) 395s | operation: FLAGS_ONLY 395s | params: 8-bytes@0x7ffff22a3d18 395s | decode_to_chunk() salted IV: input "0x12cf097ad22380432ff40a5c" 395s | decode_to_chunk() output: 395s | 12 cf 09 7a d2 23 80 43 2f f4 0a 5c ...z.#.C/..\ 395s | decode_to_chunk() AAD: input "0xc783a0cca10a8d9fb8d27d69659463f2" 395s | decode_to_chunk() output: 395s | c7 83 a0 cc a1 0a 8d 9f b8 d2 7d 69 65 94 63 f2 ..........}ie.c. 395s | decode_to_chunk() plaintext: input "0x32f51e837a9748838925066d69e87180f34a6437e6b396e5643b34cb2ee4f7b1" 395s | decode_to_chunk() output: 395s | 32 f5 1e 83 7a 97 48 83 89 25 06 6d 69 e8 71 80 2...z.H..%.mi.q. 395s | f3 4a 64 37 e6 b3 96 e5 64 3b 34 cb 2e e4 f7 b1 .Jd7....d;4..... 395s | decode_to_chunk() ciphertext: input "0x8a023ba477f5b809bddcda8f55e09064d6d88aaec99c1e141212ea5b08503660" 395s | decode_to_chunk() output: 395s | 8a 02 3b a4 77 f5 b8 09 bd dc da 8f 55 e0 90 64 ..;.w.......U..d 395s | d6 d8 8a ae c9 9c 1e 14 12 12 ea 5b 08 50 36 60 ...........[.P6` 395s | decode_to_chunk() tag: input "0x562f500dae635d60a769b466e15acd1e" 395s | decode_to_chunk() output: 395s | 56 2f 50 0d ae 63 5d 60 a7 69 b4 66 e1 5a cd 1e V/P..c]`.i.f.Z.. 395s | test_gcm_vector() DECRYPT: aad-size=16 salt-size=4 wire-IV-size=8 text-size=32 tag-size=16 text+tag in: 395s | 8a 02 3b a4 77 f5 b8 09 bd dc da 8f 55 e0 90 64 ..;.w.......U..d 395s | d6 d8 8a ae c9 9c 1e 14 12 12 ea 5b 08 50 36 60 ...........[.P6` 395s | 56 2f 50 0d ae 63 5d 60 a7 69 b4 66 e1 5a cd 1e V/P..c]`.i.f.Z.. 395s | verify_bytes() two blocks with associated data: output ciphertext: ok 395s | verify_bytes() two blocks with associated data: TAG: ok 395s | test_gcm_vector() text+tag out: 395s | 32 f5 1e 83 7a 97 48 83 89 25 06 6d 69 e8 71 80 2...z.H..%.mi.q. 395s | f3 4a 64 37 e6 b3 96 e5 64 3b 34 cb 2e e4 f7 b1 .Jd7....d;4..... 395s | 56 2f 50 0d ae 63 5d 60 a7 69 b4 66 e1 5a cd 1e V/P..c]`.i.f.Z.. 395s | test_gcm_vector() ENCRYPT: aad-size=16 salt-size=4 wire-IV-size=8 text-size=32 tag-size=16 text+tag in: 395s | 32 f5 1e 83 7a 97 48 83 89 25 06 6d 69 e8 71 80 2...z.H..%.mi.q. 395s | f3 4a 64 37 e6 b3 96 e5 64 3b 34 cb 2e e4 f7 b1 .Jd7....d;4..... 395s | 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................ 395s | verify_bytes() two blocks with associated data: output ciphertext: ok 395s | verify_bytes() two blocks with associated data: TAG: ok 395s | test_gcm_vector() text+tag out: 395s | 8a 02 3b a4 77 f5 b8 09 bd dc da 8f 55 e0 90 64 ..;.w.......U..d 395s | d6 d8 8a ae c9 9c 1e 14 12 12 ea 5b 08 50 36 60 ...........[.P6` 395s | 56 2f 50 0d ae 63 5d 60 a7 69 b4 66 e1 5a cd 1e V/P..c]`.i.f.Z.. 395s ipsec algparse: testing AES_CTR: 395s ipsec algparse: Encrypting 16 octets using AES-CTR with 128-bit key 395s | decode_to_chunk() raw_key: input "0x AE 68 52 F8 12 10 67 CC 4B F7 A5 76 55 77 F3 9E" 395s | decode_to_chunk() output: 395s | ae 68 52 f8 12 10 67 cc 4b f7 a5 76 55 77 f3 9e .hR...g.K..vUw.. 395s | CONCATENATE_DATA_AND_BASE: 395s | target: EXTRACT_KEY_FROM_KEY 395s | base: base-key@0x55685bc944c0 (16-bytes, AES_KEY_GEN) 395s | params: 16-bytes@0x7ffff22a3e10 395s | key-offset: 0, key-size: 16 395s | EXTRACT_KEY_FROM_KEY: 395s | target: AES_CTR 395s | flags: ENCRYPT+DECRYPT 395s | key_size: 16-bytes 395s | base: base-key@0x55685bc974d0 (32-bytes, EXTRACT_KEY_FROM_KEY) 395s | operation: FLAGS_ONLY 395s | params: 8-bytes@0x7ffff22a3dd8 395s | decode_to_mac() input counter-block: : input "0x 00 00 00 30 00 00 00 00 00 00 00 00 00 00 00 01" 395s | decode_to_mac() output: 395s | 00 00 00 30 00 00 00 00 00 00 00 00 00 00 00 01 ...0............ 395s | decode_to_chunk() Plaintext: input "0x 53 69 6E 67 6C 65 20 62 6C 6F 63 6B 20 6D 73 67" 395s | decode_to_chunk() output: 395s | 53 69 6e 67 6c 65 20 62 6c 6f 63 6b 20 6d 73 67 Single block msg 395s | decode_to_chunk() Ciphertext: input "0x E4 09 5D 4F B7 A7 B3 79 2D 61 75 A3 26 13 11 B8" 395s | decode_to_chunk() output: 395s | e4 09 5d 4f b7 a7 b3 79 2d 61 75 a3 26 13 11 b8 ..]O...y-au.&... 395s | decode_to_chunk() expected counter-block: : input "0x 00 00 00 30 00 00 00 00 00 00 00 00 00 00 00 02" 395s | decode_to_chunk() output: 395s | 00 00 00 30 00 00 00 00 00 00 00 00 00 00 00 02 ...0............ 395s | cipher_op_ctr_nss() enter AES_CTR 0x55685bc97d60 use IKEv1 IV wire_iv 0 count 0 395s | ctr_param: count 32 iv 00000030000000000000000000000001 395s | cipher_op_ctr_nss() counter-block updated from 0x1 to 0x2 for 16 bytes 395s | do_aes_ctr: exit 395s | cipher_op_context_destroy_ctr_nss() 395s | verify_bytes() Encrypting 16 octets using AES-CTR with 128-bit key: encrypt: ok 395s | verify_bytes() Encrypting 16 octets using AES-CTR with 128-bit key: counter-block: ok 395s | decode_to_mac() input counter-block: : input "0x 00 00 00 30 00 00 00 00 00 00 00 00 00 00 00 01" 395s | decode_to_mac() output: 395s | 00 00 00 30 00 00 00 00 00 00 00 00 00 00 00 01 ...0............ 395s | decode_to_chunk() Ciphertext: input "0x E4 09 5D 4F B7 A7 B3 79 2D 61 75 A3 26 13 11 B8" 395s | decode_to_chunk() output: 395s | e4 09 5d 4f b7 a7 b3 79 2d 61 75 a3 26 13 11 b8 ..]O...y-au.&... 395s | decode_to_chunk() Plaintext: input "0x 53 69 6E 67 6C 65 20 62 6C 6F 63 6B 20 6D 73 67" 395s | decode_to_chunk() output: 395s | 53 69 6e 67 6c 65 20 62 6c 6f 63 6b 20 6d 73 67 Single block msg 395s | decode_to_chunk() expected counter-block: : input "0x 00 00 00 30 00 00 00 00 00 00 00 00 00 00 00 02" 395s | decode_to_chunk() output: 395s | 00 00 00 30 00 00 00 00 00 00 00 00 00 00 00 02 ...0............ 395s | cipher_op_ctr_nss() enter AES_CTR 0x55685bc97d60 use IKEv1 IV wire_iv 0 count 0 395s | ctr_param: count 32 iv 00000030000000000000000000000001 395s | cipher_op_ctr_nss() counter-block updated from 0x1 to 0x2 for 16 bytes 395s | do_aes_ctr: exit 395s | cipher_op_context_destroy_ctr_nss() 395s | verify_bytes() Encrypting 16 octets using AES-CTR with 128-bit key: decrypt: ok 395s | verify_bytes() Encrypting 16 octets using AES-CTR with 128-bit key: counter-block: ok 395s ipsec algparse: Encrypting 32 octets using AES-CTR with 128-bit key 395s | decode_to_chunk() raw_key: input "0x 7E 24 06 78 17 FA E0 D7 43 D6 CE 1F 32 53 91 63" 395s | decode_to_chunk() output: 395s | 7e 24 06 78 17 fa e0 d7 43 d6 ce 1f 32 53 91 63 ~$.x....C...2S.c 395s | CONCATENATE_DATA_AND_BASE: 395s | target: EXTRACT_KEY_FROM_KEY 395s | base: base-key@0x55685bc944c0 (16-bytes, AES_KEY_GEN) 395s | params: 16-bytes@0x7ffff22a3e10 395s | key-offset: 0, key-size: 16 395s | EXTRACT_KEY_FROM_KEY: 395s | target: AES_CTR 395s | flags: ENCRYPT+DECRYPT 395s | key_size: 16-bytes 395s | base: base-key@0x55685bc974d0 (32-bytes, EXTRACT_KEY_FROM_KEY) 395s | operation: FLAGS_ONLY 395s | params: 8-bytes@0x7ffff22a3dd8 395s | decode_to_mac() input counter-block: : input "0x 00 6C B6 DB C0 54 3B 59 DA 48 D9 0B 00 00 00 01" 395s | decode_to_mac() output: 395s | 00 6c b6 db c0 54 3b 59 da 48 d9 0b 00 00 00 01 .l...T;Y.H...... 395s | decode_to_chunk() Plaintext: input "0x00 01 02 03 04 05 06 07 08 09 0A 0B 0C 0D 0E 0F10 11 12 13 14 15 16 17 18 19 1A 1B 1C 1D 1E 1F" 395s | decode_to_chunk() output: 395s | 00 01 02 03 04 05 06 07 08 09 0a 0b 0c 0d 0e 0f ................ 395s | 10 11 12 13 14 15 16 17 18 19 1a 1b 1c 1d 1e 1f ................ 395s | decode_to_chunk() Ciphertext: input "0x51 04 A1 06 16 8A 72 D9 79 0D 41 EE 8E DA D3 88EB 2E 1E FC 46 DA 57 C8 FC E6 30 DF 91 41 BE 28" 395s | decode_to_chunk() output: 395s | 51 04 a1 06 16 8a 72 d9 79 0d 41 ee 8e da d3 88 Q.....r.y.A..... 395s | eb 2e 1e fc 46 da 57 c8 fc e6 30 df 91 41 be 28 ....F.W...0..A.( 395s | decode_to_chunk() expected counter-block: : input "0x 00 6C B6 DB C0 54 3B 59 DA 48 D9 0B 00 00 00 03" 395s | decode_to_chunk() output: 395s | 00 6c b6 db c0 54 3b 59 da 48 d9 0b 00 00 00 03 .l...T;Y.H...... 395s | cipher_op_ctr_nss() enter AES_CTR 0x55685bc94390 use IKEv1 IV wire_iv 0 count 0 395s | ctr_param: count 32 iv 006cb6dbc0543b59da48d90b00000001 395s | cipher_op_ctr_nss() counter-block updated from 0x1 to 0x3 for 32 bytes 395s | do_aes_ctr: exit 395s | cipher_op_context_destroy_ctr_nss() 395s | verify_bytes() Encrypting 32 octets using AES-CTR with 128-bit key: encrypt: ok 395s | verify_bytes() Encrypting 32 octets using AES-CTR with 128-bit key: counter-block: ok 395s | decode_to_mac() input counter-block: : input "0x 00 6C B6 DB C0 54 3B 59 DA 48 D9 0B 00 00 00 01" 395s | decode_to_mac() output: 395s | 00 6c b6 db c0 54 3b 59 da 48 d9 0b 00 00 00 01 .l...T;Y.H...... 395s | decode_to_chunk() Ciphertext: input "0x51 04 A1 06 16 8A 72 D9 79 0D 41 EE 8E DA D3 88EB 2E 1E FC 46 DA 57 C8 FC E6 30 DF 91 41 BE 28" 395s | decode_to_chunk() output: 395s | 51 04 a1 06 16 8a 72 d9 79 0d 41 ee 8e da d3 88 Q.....r.y.A..... 395s | eb 2e 1e fc 46 da 57 c8 fc e6 30 df 91 41 be 28 ....F.W...0..A.( 395s | decode_to_chunk() Plaintext: input "0x00 01 02 03 04 05 06 07 08 09 0A 0B 0C 0D 0E 0F10 11 12 13 14 15 16 17 18 19 1A 1B 1C 1D 1E 1F" 395s | decode_to_chunk() output: 395s | 00 01 02 03 04 05 06 07 08 09 0a 0b 0c 0d 0e 0f ................ 395s | 10 11 12 13 14 15 16 17 18 19 1a 1b 1c 1d 1e 1f ................ 395s | decode_to_chunk() expected counter-block: : input "0x 00 6C B6 DB C0 54 3B 59 DA 48 D9 0B 00 00 00 03" 395s | decode_to_chunk() output: 395s | 00 6c b6 db c0 54 3b 59 da 48 d9 0b 00 00 00 03 .l...T;Y.H...... 395s | cipher_op_ctr_nss() enter AES_CTR 0x55685bc94390 use IKEv1 IV wire_iv 0 count 0 395s | ctr_param: count 32 iv 006cb6dbc0543b59da48d90b00000001 395s | cipher_op_ctr_nss() counter-block updated from 0x1 to 0x3 for 32 bytes 395s | do_aes_ctr: exit 395s | cipher_op_context_destroy_ctr_nss() 395s | verify_bytes() Encrypting 32 octets using AES-CTR with 128-bit key: decrypt: ok 395s | verify_bytes() Encrypting 32 octets using AES-CTR with 128-bit key: counter-block: ok 395s ipsec algparse: Encrypting 36 octets using AES-CTR with 128-bit key 395s | decode_to_chunk() raw_key: input "0x 76 91 BE 03 5E 50 20 A8 AC 6E 61 85 29 F9 A0 DC" 395s | decode_to_chunk() output: 395s | 76 91 be 03 5e 50 20 a8 ac 6e 61 85 29 f9 a0 dc v...^P ..na.)... 395s | CONCATENATE_DATA_AND_BASE: 395s | target: EXTRACT_KEY_FROM_KEY 395s | base: base-key@0x55685bc944c0 (16-bytes, AES_KEY_GEN) 395s | params: 16-bytes@0x7ffff22a3e10 395s | key-offset: 0, key-size: 16 395s | EXTRACT_KEY_FROM_KEY: 395s | target: AES_CTR 395s | flags: ENCRYPT+DECRYPT 395s | key_size: 16-bytes 395s | base: base-key@0x55685bc974d0 (32-bytes, EXTRACT_KEY_FROM_KEY) 395s | operation: FLAGS_ONLY 395s | params: 8-bytes@0x7ffff22a3dd8 395s | decode_to_mac() input counter-block: : input "0x 00 E0 01 7B 27 77 7F 3F 4A 17 86 F0 00 00 00 01" 395s | decode_to_mac() output: 395s | 00 e0 01 7b 27 77 7f 3f 4a 17 86 f0 00 00 00 01 ...{'w.?J....... 395s | decode_to_chunk() Plaintext: input "0x00 01 02 03 04 05 06 07 08 09 0A 0B 0C 0D 0E 0F10 11 12 13 14 15 16 17 18 19 1A 1B 1C 1D 1E 1F20 21 22 23" 395s | decode_to_chunk() output: 395s | 00 01 02 03 04 05 06 07 08 09 0a 0b 0c 0d 0e 0f ................ 395s | 10 11 12 13 14 15 16 17 18 19 1a 1b 1c 1d 1e 1f ................ 395s | 20 21 22 23 !"# 395s | decode_to_chunk() Ciphertext: input "0xC1 CF 48 A8 9F 2F FD D9 CF 46 52 E9 EF DB 72 D745 40 A4 2B DE 6D 78 36 D5 9A 5C EA AE F3 10 5325 B2 07 2F" 395s | decode_to_chunk() output: 395s | c1 cf 48 a8 9f 2f fd d9 cf 46 52 e9 ef db 72 d7 ..H../...FR...r. 395s | 45 40 a4 2b de 6d 78 36 d5 9a 5c ea ae f3 10 53 E@.+.mx6..\....S 395s | 25 b2 07 2f %../ 395s | decode_to_chunk() expected counter-block: : input "0x 00 E0 01 7B 27 77 7F 3F 4A 17 86 F0 00 00 00 04" 395s | decode_to_chunk() output: 395s | 00 e0 01 7b 27 77 7f 3f 4a 17 86 f0 00 00 00 04 ...{'w.?J....... 395s | cipher_op_ctr_nss() enter AES_CTR 0x55685bc941f0 use IKEv1 IV wire_iv 0 count 0 395s | ctr_param: count 32 iv 00e0017b27777f3f4a1786f000000001 395s | cipher_op_ctr_nss() counter-block updated from 0x1 to 0x4 for 36 bytes 395s | do_aes_ctr: exit 395s | cipher_op_context_destroy_ctr_nss() 395s | verify_bytes() Encrypting 36 octets using AES-CTR with 128-bit key: encrypt: ok 395s | verify_bytes() Encrypting 36 octets using AES-CTR with 128-bit key: counter-block: ok 395s | decode_to_mac() input counter-block: : input "0x 00 E0 01 7B 27 77 7F 3F 4A 17 86 F0 00 00 00 01" 395s | decode_to_mac() output: 395s | 00 e0 01 7b 27 77 7f 3f 4a 17 86 f0 00 00 00 01 ...{'w.?J....... 395s | decode_to_chunk() Ciphertext: input "0xC1 CF 48 A8 9F 2F FD D9 CF 46 52 E9 EF DB 72 D745 40 A4 2B DE 6D 78 36 D5 9A 5C EA AE F3 10 5325 B2 07 2F" 395s | decode_to_chunk() output: 395s | c1 cf 48 a8 9f 2f fd d9 cf 46 52 e9 ef db 72 d7 ..H../...FR...r. 395s | 45 40 a4 2b de 6d 78 36 d5 9a 5c ea ae f3 10 53 E@.+.mx6..\....S 395s | 25 b2 07 2f %../ 395s | decode_to_chunk() Plaintext: input "0x00 01 02 03 04 05 06 07 08 09 0A 0B 0C 0D 0E 0F10 11 12 13 14 15 16 17 18 19 1A 1B 1C 1D 1E 1F20 21 22 23" 395s | decode_to_chunk() output: 395s | 00 01 02 03 04 05 06 07 08 09 0a 0b 0c 0d 0e 0f ................ 395s | 10 11 12 13 14 15 16 17 18 19 1a 1b 1c 1d 1e 1f ................ 395s | 20 21 22 23 !"# 395s | decode_to_chunk() expected counter-block: : input "0x 00 E0 01 7B 27 77 7F 3F 4A 17 86 F0 00 00 00 04" 395s | decode_to_chunk() output: 395s | 00 e0 01 7b 27 77 7f 3f 4a 17 86 f0 00 00 00 04 ...{'w.?J....... 395s | cipher_op_ctr_nss() enter AES_CTR 0x55685bc941f0 use IKEv1 IV wire_iv 0 count 0 395s | ctr_param: count 32 iv 00e0017b27777f3f4a1786f000000001 395s | cipher_op_ctr_nss() counter-block updated from 0x1 to 0x4 for 36 bytes 395s | do_aes_ctr: exit 395s | cipher_op_context_destroy_ctr_nss() 395s | verify_bytes() Encrypting 36 octets using AES-CTR with 128-bit key: decrypt: ok 395s | verify_bytes() Encrypting 36 octets using AES-CTR with 128-bit key: counter-block: ok 395s ipsec algparse: Encrypting 16 octets using AES-CTR with 192-bit key 395s | decode_to_chunk() raw_key: input "0x16 AF 5B 14 5F C9 F5 79 C1 75 F9 3E 3B FB 0E ED86 3D 06 CC FD B7 85 15" 395s | decode_to_chunk() output: 395s | 16 af 5b 14 5f c9 f5 79 c1 75 f9 3e 3b fb 0e ed ..[._..y.u.>;... 395s | 86 3d 06 cc fd b7 85 15 .=...... 395s | CONCATENATE_DATA_AND_BASE: 395s | target: EXTRACT_KEY_FROM_KEY 395s | base: base-key@0x55685bc944c0 (16-bytes, AES_KEY_GEN) 395s | params: 16-bytes@0x7ffff22a3e10 395s | key-offset: 0, key-size: 24 395s | EXTRACT_KEY_FROM_KEY: 395s | target: AES_CTR 395s | flags: ENCRYPT+DECRYPT 395s | key_size: 24-bytes 395s | base: base-key@0x55685bc974d0 (40-bytes, EXTRACT_KEY_FROM_KEY) 395s | operation: FLAGS_ONLY 395s | params: 8-bytes@0x7ffff22a3dd8 395s | decode_to_mac() input counter-block: : input "0x 00 00 00 48 36 73 3C 14 7D 6D 93 CB 00 00 00 01" 395s | decode_to_mac() output: 395s | 00 00 00 48 36 73 3c 14 7d 6d 93 cb 00 00 00 01 ...H6s<.}m...... 395s | decode_to_chunk() Plaintext: input "0x 53 69 6E 67 6C 65 20 62 6C 6F 63 6B 20 6D 73 67" 395s | decode_to_chunk() output: 395s | 53 69 6e 67 6c 65 20 62 6c 6f 63 6b 20 6d 73 67 Single block msg 395s | decode_to_chunk() Ciphertext: input "0x 4B 55 38 4F E2 59 C9 C8 4E 79 35 A0 03 CB E9 28" 395s | decode_to_chunk() output: 395s | 4b 55 38 4f e2 59 c9 c8 4e 79 35 a0 03 cb e9 28 KU8O.Y..Ny5....( 395s | decode_to_chunk() expected counter-block: : input "0x 00 00 00 48 36 73 3C 14 7D 6D 93 CB 00 00 00 02" 395s | decode_to_chunk() output: 395s | 00 00 00 48 36 73 3c 14 7d 6d 93 cb 00 00 00 02 ...H6s<.}m...... 395s | cipher_op_ctr_nss() enter AES_CTR 0x55685bc97d40 use IKEv1 IV wire_iv 0 count 0 395s | ctr_param: count 32 iv 0000004836733c147d6d93cb00000001 395s | cipher_op_ctr_nss() counter-block updated from 0x1 to 0x2 for 16 bytes 395s | do_aes_ctr: exit 395s | cipher_op_context_destroy_ctr_nss() 395s | verify_bytes() Encrypting 16 octets using AES-CTR with 192-bit key: encrypt: ok 395s | verify_bytes() Encrypting 16 octets using AES-CTR with 192-bit key: counter-block: ok 395s | decode_to_mac() input counter-block: : input "0x 00 00 00 48 36 73 3C 14 7D 6D 93 CB 00 00 00 01" 395s | decode_to_mac() output: 395s | 00 00 00 48 36 73 3c 14 7d 6d 93 cb 00 00 00 01 ...H6s<.}m...... 395s | decode_to_chunk() Ciphertext: input "0x 4B 55 38 4F E2 59 C9 C8 4E 79 35 A0 03 CB E9 28" 395s | decode_to_chunk() output: 395s | 4b 55 38 4f e2 59 c9 c8 4e 79 35 a0 03 cb e9 28 KU8O.Y..Ny5....( 395s | decode_to_chunk() Plaintext: input "0x 53 69 6E 67 6C 65 20 62 6C 6F 63 6B 20 6D 73 67" 395s | decode_to_chunk() output: 395s | 53 69 6e 67 6c 65 20 62 6c 6f 63 6b 20 6d 73 67 Single block msg 395s | decode_to_chunk() expected counter-block: : input "0x 00 00 00 48 36 73 3C 14 7D 6D 93 CB 00 00 00 02" 395s | decode_to_chunk() output: 395s | 00 00 00 48 36 73 3c 14 7d 6d 93 cb 00 00 00 02 ...H6s<.}m...... 395s | cipher_op_ctr_nss() enter AES_CTR 0x55685bc97d40 use IKEv1 IV wire_iv 0 count 0 395s | ctr_param: count 32 iv 0000004836733c147d6d93cb00000001 395s | cipher_op_ctr_nss() counter-block updated from 0x1 to 0x2 for 16 bytes 395s | do_aes_ctr: exit 395s | cipher_op_context_destroy_ctr_nss() 395s | verify_bytes() Encrypting 16 octets using AES-CTR with 192-bit key: decrypt: ok 395s | verify_bytes() Encrypting 16 octets using AES-CTR with 192-bit key: counter-block: ok 395s ipsec algparse: Encrypting 32 octets using AES-CTR with 192-bit key 395s | decode_to_chunk() raw_key: input "0x7C 5C B2 40 1B 3D C3 3C 19 E7 34 08 19 E0 F6 9C67 8C 3D B8 E6 F6 A9 1A" 395s | decode_to_chunk() output: 395s | 7c 5c b2 40 1b 3d c3 3c 19 e7 34 08 19 e0 f6 9c |\.@.=.<..4..... 395s | 67 8c 3d b8 e6 f6 a9 1a g.=..... 395s | CONCATENATE_DATA_AND_BASE: 395s | target: EXTRACT_KEY_FROM_KEY 395s | base: base-key@0x55685bc944c0 (16-bytes, AES_KEY_GEN) 395s | params: 16-bytes@0x7ffff22a3e10 395s | key-offset: 0, key-size: 24 395s | EXTRACT_KEY_FROM_KEY: 395s | target: AES_CTR 395s | flags: ENCRYPT+DECRYPT 395s | key_size: 24-bytes 395s | base: base-key@0x55685bc974d0 (40-bytes, EXTRACT_KEY_FROM_KEY) 395s | operation: FLAGS_ONLY 395s | params: 8-bytes@0x7ffff22a3dd8 395s | decode_to_mac() input counter-block: : input "0x 00 96 B0 3B 02 0C 6E AD C2 CB 50 0D 00 00 00 01" 395s | decode_to_mac() output: 395s | 00 96 b0 3b 02 0c 6e ad c2 cb 50 0d 00 00 00 01 ...;..n...P..... 395s | decode_to_chunk() Plaintext: input "0x00 01 02 03 04 05 06 07 08 09 0A 0B 0C 0D 0E 0F10 11 12 13 14 15 16 17 18 19 1A 1B 1C 1D 1E 1F" 395s | decode_to_chunk() output: 395s | 00 01 02 03 04 05 06 07 08 09 0a 0b 0c 0d 0e 0f ................ 395s | 10 11 12 13 14 15 16 17 18 19 1a 1b 1c 1d 1e 1f ................ 395s | decode_to_chunk() Ciphertext: input "0x45 32 43 FC 60 9B 23 32 7E DF AA FA 71 31 CD 9F84 90 70 1C 5A D4 A7 9C FC 1F E0 FF 42 F4 FB 00" 395s | decode_to_chunk() output: 395s | 45 32 43 fc 60 9b 23 32 7e df aa fa 71 31 cd 9f E2C.`.#2~...q1.. 395s | 84 90 70 1c 5a d4 a7 9c fc 1f e0 ff 42 f4 fb 00 ..p.Z.......B... 395s | decode_to_chunk() expected counter-block: : input "0x 00 96 B0 3B 02 0C 6E AD C2 CB 50 0D 00 00 00 03" 395s | decode_to_chunk() output: 395s | 00 96 b0 3b 02 0c 6e ad c2 cb 50 0d 00 00 00 03 ...;..n...P..... 395s | cipher_op_ctr_nss() enter AES_CTR 0x55685bc941f0 use IKEv1 IV wire_iv 0 count 0 395s | ctr_param: count 32 iv 0096b03b020c6eadc2cb500d00000001 395s | cipher_op_ctr_nss() counter-block updated from 0x1 to 0x3 for 32 bytes 395s | do_aes_ctr: exit 395s | cipher_op_context_destroy_ctr_nss() 395s | verify_bytes() Encrypting 32 octets using AES-CTR with 192-bit key: encrypt: ok 395s | verify_bytes() Encrypting 32 octets using AES-CTR with 192-bit key: counter-block: ok 395s | decode_to_mac() input counter-block: : input "0x 00 96 B0 3B 02 0C 6E AD C2 CB 50 0D 00 00 00 01" 395s | decode_to_mac() output: 395s | 00 96 b0 3b 02 0c 6e ad c2 cb 50 0d 00 00 00 01 ...;..n...P..... 395s | decode_to_chunk() Ciphertext: input "0x45 32 43 FC 60 9B 23 32 7E DF AA FA 71 31 CD 9F84 90 70 1C 5A D4 A7 9C FC 1F E0 FF 42 F4 FB 00" 395s | decode_to_chunk() output: 395s | 45 32 43 fc 60 9b 23 32 7e df aa fa 71 31 cd 9f E2C.`.#2~...q1.. 395s | 84 90 70 1c 5a d4 a7 9c fc 1f e0 ff 42 f4 fb 00 ..p.Z.......B... 395s | decode_to_chunk() Plaintext: input "0x00 01 02 03 04 05 06 07 08 09 0A 0B 0C 0D 0E 0F10 11 12 13 14 15 16 17 18 19 1A 1B 1C 1D 1E 1F" 395s | decode_to_chunk() output: 395s | 00 01 02 03 04 05 06 07 08 09 0a 0b 0c 0d 0e 0f ................ 395s | 10 11 12 13 14 15 16 17 18 19 1a 1b 1c 1d 1e 1f ................ 395s | decode_to_chunk() expected counter-block: : input "0x 00 96 B0 3B 02 0C 6E AD C2 CB 50 0D 00 00 00 03" 395s | decode_to_chunk() output: 395s | 00 96 b0 3b 02 0c 6e ad c2 cb 50 0d 00 00 00 03 ...;..n...P..... 395s | cipher_op_ctr_nss() enter AES_CTR 0x55685bc941f0 use IKEv1 IV wire_iv 0 count 0 395s | ctr_param: count 32 iv 0096b03b020c6eadc2cb500d00000001 395s | cipher_op_ctr_nss() counter-block updated from 0x1 to 0x3 for 32 bytes 395s | do_aes_ctr: exit 395s | cipher_op_context_destroy_ctr_nss() 395s | verify_bytes() Encrypting 32 octets using AES-CTR with 192-bit key: decrypt: ok 395s | verify_bytes() Encrypting 32 octets using AES-CTR with 192-bit key: counter-block: ok 395s ipsec algparse: Encrypting 36 octets using AES-CTR with 192-bit key 395s | decode_to_chunk() raw_key: input "0x02 BF 39 1E E8 EC B1 59 B9 59 61 7B 09 65 27 9BF5 9B 60 A7 86 D3 E0 FE" 395s | decode_to_chunk() output: 395s | 02 bf 39 1e e8 ec b1 59 b9 59 61 7b 09 65 27 9b ..9....Y.Ya{.e'. 395s | f5 9b 60 a7 86 d3 e0 fe ..`..... 395s | CONCATENATE_DATA_AND_BASE: 395s | target: EXTRACT_KEY_FROM_KEY 395s | base: base-key@0x55685bc944c0 (16-bytes, AES_KEY_GEN) 395s | params: 16-bytes@0x7ffff22a3e10 395s | key-offset: 0, key-size: 24 395s | EXTRACT_KEY_FROM_KEY: 395s | target: AES_CTR 395s | flags: ENCRYPT+DECRYPT 395s | key_size: 24-bytes 395s | base: base-key@0x55685bc974d0 (40-bytes, EXTRACT_KEY_FROM_KEY) 395s | operation: FLAGS_ONLY 395s | params: 8-bytes@0x7ffff22a3dd8 395s | decode_to_mac() input counter-block: : input "0x 00 07 BD FD 5C BD 60 27 8D CC 09 12 00 00 00 01" 395s | decode_to_mac() output: 395s | 00 07 bd fd 5c bd 60 27 8d cc 09 12 00 00 00 01 ....\.`'........ 395s | decode_to_chunk() Plaintext: input "0x00 01 02 03 04 05 06 07 08 09 0A 0B 0C 0D 0E 0F10 11 12 13 14 15 16 17 18 19 1A 1B 1C 1D 1E 1F20 21 22 23" 395s | decode_to_chunk() output: 395s | 00 01 02 03 04 05 06 07 08 09 0a 0b 0c 0d 0e 0f ................ 395s | 10 11 12 13 14 15 16 17 18 19 1a 1b 1c 1d 1e 1f ................ 395s | 20 21 22 23 !"# 395s | decode_to_chunk() Ciphertext: input "0x96 89 3F C5 5E 5C 72 2F 54 0B 7D D1 DD F7 E7 58D2 88 BC 95 C6 91 65 88 45 36 C8 11 66 2F 21 88AB EE 09 35" 395s | decode_to_chunk() output: 395s | 96 89 3f c5 5e 5c 72 2f 54 0b 7d d1 dd f7 e7 58 ..?.^\r/T.}....X 395s | d2 88 bc 95 c6 91 65 88 45 36 c8 11 66 2f 21 88 ......e.E6..f/!. 395s | ab ee 09 35 ...5 395s | decode_to_chunk() expected counter-block: : input "0x 00 07 BD FD 5C BD 60 27 8D CC 09 12 00 00 00 04" 395s | decode_to_chunk() output: 395s | 00 07 bd fd 5c bd 60 27 8d cc 09 12 00 00 00 04 ....\.`'........ 395s | cipher_op_ctr_nss() enter AES_CTR 0x55685bc941f0 use IKEv1 IV wire_iv 0 count 0 395s | ctr_param: count 32 iv 0007bdfd5cbd60278dcc091200000001 395s | cipher_op_ctr_nss() counter-block updated from 0x1 to 0x4 for 36 bytes 395s | do_aes_ctr: exit 395s | cipher_op_context_destroy_ctr_nss() 395s | verify_bytes() Encrypting 36 octets using AES-CTR with 192-bit key: encrypt: ok 395s | verify_bytes() Encrypting 36 octets using AES-CTR with 192-bit key: counter-block: ok 395s | decode_to_mac() input counter-block: : input "0x 00 07 BD FD 5C BD 60 27 8D CC 09 12 00 00 00 01" 395s | decode_to_mac() output: 395s | 00 07 bd fd 5c bd 60 27 8d cc 09 12 00 00 00 01 ....\.`'........ 395s | decode_to_chunk() Ciphertext: input "0x96 89 3F C5 5E 5C 72 2F 54 0B 7D D1 DD F7 E7 58D2 88 BC 95 C6 91 65 88 45 36 C8 11 66 2F 21 88AB EE 09 35" 395s | decode_to_chunk() output: 395s | 96 89 3f c5 5e 5c 72 2f 54 0b 7d d1 dd f7 e7 58 ..?.^\r/T.}....X 395s | d2 88 bc 95 c6 91 65 88 45 36 c8 11 66 2f 21 88 ......e.E6..f/!. 395s | ab ee 09 35 ...5 395s | decode_to_chunk() Plaintext: input "0x00 01 02 03 04 05 06 07 08 09 0A 0B 0C 0D 0E 0F10 11 12 13 14 15 16 17 18 19 1A 1B 1C 1D 1E 1F20 21 22 23" 395s | decode_to_chunk() output: 395s | 00 01 02 03 04 05 06 07 08 09 0a 0b 0c 0d 0e 0f ................ 395s | 10 11 12 13 14 15 16 17 18 19 1a 1b 1c 1d 1e 1f ................ 395s | 20 21 22 23 !"# 395s | decode_to_chunk() expected counter-block: : input "0x 00 07 BD FD 5C BD 60 27 8D CC 09 12 00 00 00 04" 395s | decode_to_chunk() output: 395s | 00 07 bd fd 5c bd 60 27 8d cc 09 12 00 00 00 04 ....\.`'........ 395s | cipher_op_ctr_nss() enter AES_CTR 0x55685bc941f0 use IKEv1 IV wire_iv 0 count 0 395s | ctr_param: count 32 iv 0007bdfd5cbd60278dcc091200000001 395s | cipher_op_ctr_nss() counter-block updated from 0x1 to 0x4 for 36 bytes 395s | do_aes_ctr: exit 395s | cipher_op_context_destroy_ctr_nss() 395s | verify_bytes() Encrypting 36 octets using AES-CTR with 192-bit key: decrypt: ok 395s | verify_bytes() Encrypting 36 octets using AES-CTR with 192-bit key: counter-block: ok 395s ipsec algparse: Encrypting 16 octets using AES-CTR with 256-bit key 395s | decode_to_chunk() raw_key: input "0x77 6B EF F2 85 1D B0 6F 4C 8A 05 42 C8 69 6F 6C6A 81 AF 1E EC 96 B4 D3 7F C1 D6 89 E6 C1 C1 04" 395s | decode_to_chunk() output: 395s | 77 6b ef f2 85 1d b0 6f 4c 8a 05 42 c8 69 6f 6c wk.....oL..B.iol 395s | 6a 81 af 1e ec 96 b4 d3 7f c1 d6 89 e6 c1 c1 04 j............... 395s | CONCATENATE_DATA_AND_BASE: 395s | target: EXTRACT_KEY_FROM_KEY 395s | base: base-key@0x55685bc944c0 (16-bytes, AES_KEY_GEN) 395s | params: 16-bytes@0x7ffff22a3e10 395s | key-offset: 0, key-size: 32 395s | EXTRACT_KEY_FROM_KEY: 395s | target: AES_CTR 395s | flags: ENCRYPT+DECRYPT 395s | key_size: 32-bytes 395s | base: base-key@0x55685bc974d0 (48-bytes, EXTRACT_KEY_FROM_KEY) 395s | operation: FLAGS_ONLY 395s | params: 8-bytes@0x7ffff22a3dd8 395s | decode_to_mac() input counter-block: : input "0x 00 00 00 60 DB 56 72 C9 7A A8 F0 B2 00 00 00 01" 395s | decode_to_mac() output: 395s | 00 00 00 60 db 56 72 c9 7a a8 f0 b2 00 00 00 01 ...`.Vr.z....... 395s | decode_to_chunk() Plaintext: input "0x 53 69 6E 67 6C 65 20 62 6C 6F 63 6B 20 6D 73 67" 395s | decode_to_chunk() output: 395s | 53 69 6e 67 6c 65 20 62 6c 6f 63 6b 20 6d 73 67 Single block msg 395s | decode_to_chunk() Ciphertext: input "0x 14 5A D0 1D BF 82 4E C7 56 08 63 DC 71 E3 E0 C0" 395s | decode_to_chunk() output: 395s | 14 5a d0 1d bf 82 4e c7 56 08 63 dc 71 e3 e0 c0 .Z....N.V.c.q... 395s | decode_to_chunk() expected counter-block: : input "0x 00 00 00 60 DB 56 72 C9 7A A8 F0 B2 00 00 00 02" 395s | decode_to_chunk() output: 395s | 00 00 00 60 db 56 72 c9 7a a8 f0 b2 00 00 00 02 ...`.Vr.z....... 395s | cipher_op_ctr_nss() enter AES_CTR 0x55685bc97d40 use IKEv1 IV wire_iv 0 count 0 395s | ctr_param: count 32 iv 00000060db5672c97aa8f0b200000001 395s | cipher_op_ctr_nss() counter-block updated from 0x1 to 0x2 for 16 bytes 395s | do_aes_ctr: exit 395s | cipher_op_context_destroy_ctr_nss() 395s | verify_bytes() Encrypting 16 octets using AES-CTR with 256-bit key: encrypt: ok 395s | verify_bytes() Encrypting 16 octets using AES-CTR with 256-bit key: counter-block: ok 395s | decode_to_mac() input counter-block: : input "0x 00 00 00 60 DB 56 72 C9 7A A8 F0 B2 00 00 00 01" 395s | decode_to_mac() output: 395s | 00 00 00 60 db 56 72 c9 7a a8 f0 b2 00 00 00 01 ...`.Vr.z....... 395s | decode_to_chunk() Ciphertext: input "0x 14 5A D0 1D BF 82 4E C7 56 08 63 DC 71 E3 E0 C0" 395s | decode_to_chunk() output: 395s | 14 5a d0 1d bf 82 4e c7 56 08 63 dc 71 e3 e0 c0 .Z....N.V.c.q... 395s | decode_to_chunk() Plaintext: input "0x 53 69 6E 67 6C 65 20 62 6C 6F 63 6B 20 6D 73 67" 395s | decode_to_chunk() output: 395s | 53 69 6e 67 6c 65 20 62 6c 6f 63 6b 20 6d 73 67 Single block msg 395s | decode_to_chunk() expected counter-block: : input "0x 00 00 00 60 DB 56 72 C9 7A A8 F0 B2 00 00 00 02" 395s | decode_to_chunk() output: 395s | 00 00 00 60 db 56 72 c9 7a a8 f0 b2 00 00 00 02 ...`.Vr.z....... 395s | cipher_op_ctr_nss() enter AES_CTR 0x55685bc97d40 use IKEv1 IV wire_iv 0 count 0 395s | ctr_param: count 32 iv 00000060db5672c97aa8f0b200000001 395s | cipher_op_ctr_nss() counter-block updated from 0x1 to 0x2 for 16 bytes 395s | do_aes_ctr: exit 395s | cipher_op_context_destroy_ctr_nss() 395s | verify_bytes() Encrypting 16 octets using AES-CTR with 256-bit key: decrypt: ok 395s | verify_bytes() Encrypting 16 octets using AES-CTR with 256-bit key: counter-block: ok 395s ipsec algparse: Encrypting 32 octets using AES-CTR with 256-bit key 395s | decode_to_chunk() raw_key: input "0xF6 D6 6D 6B D5 2D 59 BB 07 96 36 58 79 EF F8 86C6 6D D5 1A 5B 6A 99 74 4B 50 59 0C 87 A2 38 84" 395s | decode_to_chunk() output: 395s | f6 d6 6d 6b d5 2d 59 bb 07 96 36 58 79 ef f8 86 ..mk.-Y...6Xy... 395s | c6 6d d5 1a 5b 6a 99 74 4b 50 59 0c 87 a2 38 84 .m..[j.tKPY...8. 395s | CONCATENATE_DATA_AND_BASE: 395s | target: EXTRACT_KEY_FROM_KEY 395s | base: base-key@0x55685bc944c0 (16-bytes, AES_KEY_GEN) 395s | params: 16-bytes@0x7ffff22a3e10 395s | key-offset: 0, key-size: 32 395s | EXTRACT_KEY_FROM_KEY: 395s | target: AES_CTR 395s | flags: ENCRYPT+DECRYPT 395s | key_size: 32-bytes 395s | base: base-key@0x55685bc974d0 (48-bytes, EXTRACT_KEY_FROM_KEY) 395s | operation: FLAGS_ONLY 395s | params: 8-bytes@0x7ffff22a3dd8 395s | decode_to_mac() input counter-block: : input "0x 00 FA AC 24 C1 58 5E F1 5A 43 D8 75 00 00 00 01" 395s | decode_to_mac() output: 395s | 00 fa ac 24 c1 58 5e f1 5a 43 d8 75 00 00 00 01 ...$.X^.ZC.u.... 395s | decode_to_chunk() Plaintext: input "0x00 01 02 03 04 05 06 07 08 09 0A 0B 0C 0D 0E 0F10 11 12 13 14 15 16 17 18 19 1A 1B 1C 1D 1E 1F" 395s | decode_to_chunk() output: 395s | 00 01 02 03 04 05 06 07 08 09 0a 0b 0c 0d 0e 0f ................ 395s | 10 11 12 13 14 15 16 17 18 19 1a 1b 1c 1d 1e 1f ................ 395s | decode_to_chunk() Ciphertext: input "0xF0 5E 23 1B 38 94 61 2C 49 EE 00 0B 80 4E B2 A9B8 30 6B 50 8F 83 9D 6A 55 30 83 1D 93 44 AF 1C" 395s | decode_to_chunk() output: 395s | f0 5e 23 1b 38 94 61 2c 49 ee 00 0b 80 4e b2 a9 .^#.8.a,I....N.. 395s | b8 30 6b 50 8f 83 9d 6a 55 30 83 1d 93 44 af 1c .0kP...jU0...D.. 395s | decode_to_chunk() expected counter-block: : input "0x 00 FA AC 24 C1 58 5E F1 5A 43 D8 75 00 00 00 03" 395s | decode_to_chunk() output: 395s | 00 fa ac 24 c1 58 5e f1 5a 43 d8 75 00 00 00 03 ...$.X^.ZC.u.... 395s | cipher_op_ctr_nss() enter AES_CTR 0x55685bc941f0 use IKEv1 IV wire_iv 0 count 0 395s | ctr_param: count 32 iv 00faac24c1585ef15a43d87500000001 395s | cipher_op_ctr_nss() counter-block updated from 0x1 to 0x3 for 32 bytes 395s | do_aes_ctr: exit 395s | cipher_op_context_destroy_ctr_nss() 395s | verify_bytes() Encrypting 32 octets using AES-CTR with 256-bit key: encrypt: ok 395s | verify_bytes() Encrypting 32 octets using AES-CTR with 256-bit key: counter-block: ok 395s | decode_to_mac() input counter-block: : input "0x 00 FA AC 24 C1 58 5E F1 5A 43 D8 75 00 00 00 01" 395s | decode_to_mac() output: 395s | 00 fa ac 24 c1 58 5e f1 5a 43 d8 75 00 00 00 01 ...$.X^.ZC.u.... 395s | decode_to_chunk() Ciphertext: input "0xF0 5E 23 1B 38 94 61 2C 49 EE 00 0B 80 4E B2 A9B8 30 6B 50 8F 83 9D 6A 55 30 83 1D 93 44 AF 1C" 395s | decode_to_chunk() output: 395s | f0 5e 23 1b 38 94 61 2c 49 ee 00 0b 80 4e b2 a9 .^#.8.a,I....N.. 395s | b8 30 6b 50 8f 83 9d 6a 55 30 83 1d 93 44 af 1c .0kP...jU0...D.. 395s | decode_to_chunk() Plaintext: input "0x00 01 02 03 04 05 06 07 08 09 0A 0B 0C 0D 0E 0F10 11 12 13 14 15 16 17 18 19 1A 1B 1C 1D 1E 1F" 395s | decode_to_chunk() output: 395s | 00 01 02 03 04 05 06 07 08 09 0a 0b 0c 0d 0e 0f ................ 395s | 10 11 12 13 14 15 16 17 18 19 1a 1b 1c 1d 1e 1f ................ 395s | decode_to_chunk() expected counter-block: : input "0x 00 FA AC 24 C1 58 5E F1 5A 43 D8 75 00 00 00 03" 395s | decode_to_chunk() output: 395s | 00 fa ac 24 c1 58 5e f1 5a 43 d8 75 00 00 00 03 ...$.X^.ZC.u.... 395s | cipher_op_ctr_nss() enter AES_CTR 0x55685bc941f0 use IKEv1 IV wire_iv 0 count 0 395s | ctr_param: count 32 iv 00faac24c1585ef15a43d87500000001 395s | cipher_op_ctr_nss() counter-block updated from 0x1 to 0x3 for 32 bytes 395s | do_aes_ctr: exit 395s | cipher_op_context_destroy_ctr_nss() 395s | verify_bytes() Encrypting 32 octets using AES-CTR with 256-bit key: decrypt: ok 395s | verify_bytes() Encrypting 32 octets using AES-CTR with 256-bit key: counter-block: ok 395s ipsec algparse: Encrypting 36 octets using AES-CTR with 256-bit key 395s | decode_to_chunk() raw_key: input "0xFF 7A 61 7C E6 91 48 E4 F1 72 6E 2F 43 58 1D E2AA 62 D9 F8 05 53 2E DF F1 EE D6 87 FB 54 15 3D" 395s | decode_to_chunk() output: 395s | ff 7a 61 7c e6 91 48 e4 f1 72 6e 2f 43 58 1d e2 .za|..H..rn/CX.. 395s | aa 62 d9 f8 05 53 2e df f1 ee d6 87 fb 54 15 3d .b...S.......T.= 395s | CONCATENATE_DATA_AND_BASE: 395s | target: EXTRACT_KEY_FROM_KEY 395s | base: base-key@0x55685bc944c0 (16-bytes, AES_KEY_GEN) 395s | params: 16-bytes@0x7ffff22a3e10 395s | key-offset: 0, key-size: 32 395s | EXTRACT_KEY_FROM_KEY: 395s | target: AES_CTR 395s | flags: ENCRYPT+DECRYPT 395s | key_size: 32-bytes 395s | base: base-key@0x55685bc974d0 (48-bytes, EXTRACT_KEY_FROM_KEY) 395s | operation: FLAGS_ONLY 395s | params: 8-bytes@0x7ffff22a3dd8 395s | decode_to_mac() input counter-block: : input "0x 00 1C C5 B7 51 A5 1D 70 A1 C1 11 48 00 00 00 01" 395s | decode_to_mac() output: 395s | 00 1c c5 b7 51 a5 1d 70 a1 c1 11 48 00 00 00 01 ....Q..p...H.... 395s | decode_to_chunk() Plaintext: input "0x00 01 02 03 04 05 06 07 08 09 0A 0B 0C 0D 0E 0F10 11 12 13 14 15 16 17 18 19 1A 1B 1C 1D 1E 1F20 21 22 23" 395s | decode_to_chunk() output: 395s | 00 01 02 03 04 05 06 07 08 09 0a 0b 0c 0d 0e 0f ................ 395s | 10 11 12 13 14 15 16 17 18 19 1a 1b 1c 1d 1e 1f ................ 395s | 20 21 22 23 !"# 395s | decode_to_chunk() Ciphertext: input "0xEB 6C 52 82 1D 0B BB F7 CE 75 94 46 2A CA 4F AAB4 07 DF 86 65 69 FD 07 F4 8C C0 B5 83 D6 07 1F1E C0 E6 B8" 395s | decode_to_chunk() output: 395s | eb 6c 52 82 1d 0b bb f7 ce 75 94 46 2a ca 4f aa .lR......u.F*.O. 395s | b4 07 df 86 65 69 fd 07 f4 8c c0 b5 83 d6 07 1f ....ei.......... 395s | 1e c0 e6 b8 .... 395s | decode_to_chunk() expected counter-block: : input "0x 00 1C C5 B7 51 A5 1D 70 A1 C1 11 48 00 00 00 04" 395s | decode_to_chunk() output: 395s | 00 1c c5 b7 51 a5 1d 70 a1 c1 11 48 00 00 00 04 ....Q..p...H.... 395s | cipher_op_ctr_nss() enter AES_CTR 0x55685bc941f0 use IKEv1 IV wire_iv 0 count 0 395s | ctr_param: count 32 iv 001cc5b751a51d70a1c1114800000001 395s | cipher_op_ctr_nss() counter-block updated from 0x1 to 0x4 for 36 bytes 395s | do_aes_ctr: exit 395s | cipher_op_context_destroy_ctr_nss() 395s | verify_bytes() Encrypting 36 octets using AES-CTR with 256-bit key: encrypt: ok 395s | verify_bytes() Encrypting 36 octets using AES-CTR with 256-bit key: counter-block: ok 395s | decode_to_mac() input counter-block: : input "0x 00 1C C5 B7 51 A5 1D 70 A1 C1 11 48 00 00 00 01" 395s | decode_to_mac() output: 395s | 00 1c c5 b7 51 a5 1d 70 a1 c1 11 48 00 00 00 01 ....Q..p...H.... 395s | decode_to_chunk() Ciphertext: input "0xEB 6C 52 82 1D 0B BB F7 CE 75 94 46 2A CA 4F AAB4 07 DF 86 65 69 FD 07 F4 8C C0 B5 83 D6 07 1F1E C0 E6 B8" 395s | decode_to_chunk() output: 395s | eb 6c 52 82 1d 0b bb f7 ce 75 94 46 2a ca 4f aa .lR......u.F*.O. 395s | b4 07 df 86 65 69 fd 07 f4 8c c0 b5 83 d6 07 1f ....ei.......... 395s | 1e c0 e6 b8 .... 395s | decode_to_chunk() Plaintext: input "0x00 01 02 03 04 05 06 07 08 09 0A 0B 0C 0D 0E 0F10 11 12 13 14 15 16 17 18 19 1A 1B 1C 1D 1E 1F20 21 22 23" 395s | decode_to_chunk() output: 395s | 00 01 02 03 04 05 06 07 08 09 0a 0b 0c 0d 0e 0f ................ 395s | 10 11 12 13 14 15 16 17 18 19 1a 1b 1c 1d 1e 1f ................ 395s | 20 21 22 23 !"# 395s | decode_to_chunk() expected counter-block: : input "0x 00 1C C5 B7 51 A5 1D 70 A1 C1 11 48 00 00 00 04" 395s | decode_to_chunk() output: 395s | 00 1c c5 b7 51 a5 1d 70 a1 c1 11 48 00 00 00 04 ....Q..p...H.... 395s | cipher_op_ctr_nss() enter AES_CTR 0x55685bc941f0 use IKEv1 IV wire_iv 0 count 0 395s | ctr_param: count 32 iv 001cc5b751a51d70a1c1114800000001 395s | cipher_op_ctr_nss() counter-block updated from 0x1 to 0x4 for 36 bytes 395s | do_aes_ctr: exit 395s | cipher_op_context_destroy_ctr_nss() 395s | verify_bytes() Encrypting 36 octets using AES-CTR with 256-bit key: decrypt: ok 395s | verify_bytes() Encrypting 36 octets using AES-CTR with 256-bit key: counter-block: ok 395s ipsec algparse: testing AES_CBC: 395s ipsec algparse: Encrypting 16 bytes (1 block) using AES-CBC with 128-bit key 395s | decode_to_chunk() raw_key: input "0x06a9214036b8a15b512e03d534120006" 395s | decode_to_chunk() output: 395s | 06 a9 21 40 36 b8 a1 5b 51 2e 03 d5 34 12 00 06 ..!@6..[Q...4... 395s | CONCATENATE_DATA_AND_BASE: 395s | target: EXTRACT_KEY_FROM_KEY 395s | base: base-key@0x55685bc944c0 (16-bytes, AES_KEY_GEN) 395s | params: 16-bytes@0x7ffff22a3e10 395s | key-offset: 0, key-size: 16 395s | EXTRACT_KEY_FROM_KEY: 395s | target: AES_CBC 395s | flags: ENCRYPT+DECRYPT 395s | key_size: 16-bytes 395s | base: base-key@0x55685bc974d0 (32-bytes, EXTRACT_KEY_FROM_KEY) 395s | operation: FLAGS_ONLY 395s | params: 8-bytes@0x7ffff22a3dd8 395s | decode_to_mac() IV: : input "0x3dafba429d9eb430b422da802c9fac41" 395s | decode_to_mac() output: 395s | 3d af ba 42 9d 9e b4 30 b4 22 da 80 2c 9f ac 41 =..B...0."..,..A 395s | decode_to_chunk() new IV: : input "0xe353779c1079aeb82708942dbe77181a" 395s | decode_to_chunk() output: 395s | e3 53 77 9c 10 79 ae b8 27 08 94 2d be 77 18 1a .Sw..y..'..-.w.. 395s | decode_to_chunk() plaintext: : input "Single block msg" 395s | decode_to_chunk() output: 395s | 53 69 6e 67 6c 65 20 62 6c 6f 63 6b 20 6d 73 67 Single block msg 395s | decode_to_chunk() ciphertext: : input "0xe353779c1079aeb82708942dbe77181a" 395s | decode_to_chunk() output: 395s | e3 53 77 9c 10 79 ae b8 27 08 94 2d be 77 18 1a .Sw..y..'..-.w.. 395s | NSS ike_alg_nss_cbc: AES_CBC - enter (nil) 395s | using IKEv1 IV 395s | NSS ike_alg_nss_cbc: AES_CBC - exit 395s | verify_bytes() Encrypting 16 bytes (1 block) using AES-CBC with 128-bit key: encrypt: ok 395s | verify_bytes() Encrypting 16 bytes (1 block) using AES-CBC with 128-bit key: updated CBC IV: ok 395s | decode_to_mac() IV: : input "0x3dafba429d9eb430b422da802c9fac41" 395s | decode_to_mac() output: 395s | 3d af ba 42 9d 9e b4 30 b4 22 da 80 2c 9f ac 41 =..B...0."..,..A 395s | decode_to_chunk() new IV: : input "0xe353779c1079aeb82708942dbe77181a" 395s | decode_to_chunk() output: 395s | e3 53 77 9c 10 79 ae b8 27 08 94 2d be 77 18 1a .Sw..y..'..-.w.. 395s | decode_to_chunk() ciphertext: : input "0xe353779c1079aeb82708942dbe77181a" 395s | decode_to_chunk() output: 395s | e3 53 77 9c 10 79 ae b8 27 08 94 2d be 77 18 1a .Sw..y..'..-.w.. 395s | decode_to_chunk() plaintext: : input "Single block msg" 395s | decode_to_chunk() output: 395s | 53 69 6e 67 6c 65 20 62 6c 6f 63 6b 20 6d 73 67 Single block msg 395s | NSS ike_alg_nss_cbc: AES_CBC - enter (nil) 395s | using IKEv1 IV 395s | NSS ike_alg_nss_cbc: AES_CBC - exit 395s | verify_bytes() Encrypting 16 bytes (1 block) using AES-CBC with 128-bit key: decrypt: ok 395s | verify_bytes() Encrypting 16 bytes (1 block) using AES-CBC with 128-bit key: updated CBC IV: ok 395s ipsec algparse: Encrypting 32 bytes (2 blocks) using AES-CBC with 128-bit key 395s | decode_to_chunk() raw_key: input "0xc286696d887c9aa0611bbb3e2025a45a" 395s | decode_to_chunk() output: 395s | c2 86 69 6d 88 7c 9a a0 61 1b bb 3e 20 25 a4 5a ..im.|..a..> %.Z 395s | CONCATENATE_DATA_AND_BASE: 395s | target: EXTRACT_KEY_FROM_KEY 395s | base: base-key@0x55685bc944c0 (16-bytes, AES_KEY_GEN) 395s | params: 16-bytes@0x7ffff22a3e10 395s | key-offset: 0, key-size: 16 395s | EXTRACT_KEY_FROM_KEY: 395s | target: AES_CBC 395s | flags: ENCRYPT+DECRYPT 395s | key_size: 16-bytes 395s | base: base-key@0x55685bc974d0 (32-bytes, EXTRACT_KEY_FROM_KEY) 395s | operation: FLAGS_ONLY 395s | params: 8-bytes@0x7ffff22a3dd8 395s | decode_to_mac() IV: : input "0x562e17996d093d28ddb3ba695a2e6f58" 395s | decode_to_mac() output: 395s | 56 2e 17 99 6d 09 3d 28 dd b3 ba 69 5a 2e 6f 58 V...m.=(...iZ.oX 395s | decode_to_chunk() new IV: : input "0xd296cd94c2cccf8a3a863028b5e1dc0a7586602d253cfff91b8266bea6d61ab1" 395s | decode_to_chunk() output: 395s | d2 96 cd 94 c2 cc cf 8a 3a 86 30 28 b5 e1 dc 0a ........:.0(.... 395s | 75 86 60 2d 25 3c ff f9 1b 82 66 be a6 d6 1a b1 u.`-%<....f..... 395s | decode_to_chunk() plaintext: : input "0x000102030405060708090a0b0c0d0e0f101112131415161718191a1b1c1d1e1f" 395s | decode_to_chunk() output: 395s | 00 01 02 03 04 05 06 07 08 09 0a 0b 0c 0d 0e 0f ................ 395s | 10 11 12 13 14 15 16 17 18 19 1a 1b 1c 1d 1e 1f ................ 395s | decode_to_chunk() ciphertext: : input "0xd296cd94c2cccf8a3a863028b5e1dc0a7586602d253cfff91b8266bea6d61ab1" 395s | decode_to_chunk() output: 395s | d2 96 cd 94 c2 cc cf 8a 3a 86 30 28 b5 e1 dc 0a ........:.0(.... 395s | 75 86 60 2d 25 3c ff f9 1b 82 66 be a6 d6 1a b1 u.`-%<....f..... 395s | NSS ike_alg_nss_cbc: AES_CBC - enter (nil) 395s | using IKEv1 IV 395s | NSS ike_alg_nss_cbc: AES_CBC - exit 395s | verify_bytes() Encrypting 32 bytes (2 blocks) using AES-CBC with 128-bit key: encrypt: ok 395s | verify_bytes() Encrypting 32 bytes (2 blocks) using AES-CBC with 128-bit key: updated CBC IV: ok 395s | decode_to_mac() IV: : input "0x562e17996d093d28ddb3ba695a2e6f58" 395s | decode_to_mac() output: 395s | 56 2e 17 99 6d 09 3d 28 dd b3 ba 69 5a 2e 6f 58 V...m.=(...iZ.oX 395s | decode_to_chunk() new IV: : input "0xd296cd94c2cccf8a3a863028b5e1dc0a7586602d253cfff91b8266bea6d61ab1" 395s | decode_to_chunk() output: 395s | d2 96 cd 94 c2 cc cf 8a 3a 86 30 28 b5 e1 dc 0a ........:.0(.... 395s | 75 86 60 2d 25 3c ff f9 1b 82 66 be a6 d6 1a b1 u.`-%<....f..... 395s | decode_to_chunk() ciphertext: : input "0xd296cd94c2cccf8a3a863028b5e1dc0a7586602d253cfff91b8266bea6d61ab1" 395s | decode_to_chunk() output: 395s | d2 96 cd 94 c2 cc cf 8a 3a 86 30 28 b5 e1 dc 0a ........:.0(.... 395s | 75 86 60 2d 25 3c ff f9 1b 82 66 be a6 d6 1a b1 u.`-%<....f..... 395s | decode_to_chunk() plaintext: : input "0x000102030405060708090a0b0c0d0e0f101112131415161718191a1b1c1d1e1f" 395s | decode_to_chunk() output: 395s | 00 01 02 03 04 05 06 07 08 09 0a 0b 0c 0d 0e 0f ................ 395s | 10 11 12 13 14 15 16 17 18 19 1a 1b 1c 1d 1e 1f ................ 395s | NSS ike_alg_nss_cbc: AES_CBC - enter (nil) 395s | using IKEv1 IV 395s | NSS ike_alg_nss_cbc: AES_CBC - exit 395s | verify_bytes() Encrypting 32 bytes (2 blocks) using AES-CBC with 128-bit key: decrypt: ok 395s | verify_bytes() Encrypting 32 bytes (2 blocks) using AES-CBC with 128-bit key: updated CBC IV: ok 395s ipsec algparse: Encrypting 48 bytes (3 blocks) using AES-CBC with 128-bit key 395s | decode_to_chunk() raw_key: input "0x6c3ea0477630ce21a2ce334aa746c2cd" 395s | decode_to_chunk() output: 395s | 6c 3e a0 47 76 30 ce 21 a2 ce 33 4a a7 46 c2 cd l>.Gv0.!..3J.F.. 395s | CONCATENATE_DATA_AND_BASE: 395s | target: EXTRACT_KEY_FROM_KEY 395s | base: base-key@0x55685bc944c0 (16-bytes, AES_KEY_GEN) 395s | params: 16-bytes@0x7ffff22a3e10 395s | key-offset: 0, key-size: 16 395s | EXTRACT_KEY_FROM_KEY: 395s | target: AES_CBC 395s | flags: ENCRYPT+DECRYPT 395s | key_size: 16-bytes 395s | base: base-key@0x55685bc974d0 (32-bytes, EXTRACT_KEY_FROM_KEY) 395s | operation: FLAGS_ONLY 395s | params: 8-bytes@0x7ffff22a3dd8 395s | decode_to_mac() IV: : input "0xc782dc4c098c66cbd9cd27d825682c81" 395s | decode_to_mac() output: 395s | c7 82 dc 4c 09 8c 66 cb d9 cd 27 d8 25 68 2c 81 ...L..f...'.%h,. 395s | decode_to_chunk() new IV: : input "0xd0a02b3836451753d493665d33f0e8862dea54cdb293abc7506939276772f8d5021c19216bad525c8579695d83ba2684" 395s | decode_to_chunk() output: 395s | d0 a0 2b 38 36 45 17 53 d4 93 66 5d 33 f0 e8 86 ..+86E.S..f]3... 395s | 2d ea 54 cd b2 93 ab c7 50 69 39 27 67 72 f8 d5 -.T.....Pi9'gr.. 395s | 02 1c 19 21 6b ad 52 5c 85 79 69 5d 83 ba 26 84 ...!k.R\.yi]..&. 395s | decode_to_chunk() plaintext: : input "This is a 48-byte message (exactly 3 AES blocks)" 395s | decode_to_chunk() output: 395s | 54 68 69 73 20 69 73 20 61 20 34 38 2d 62 79 74 This is a 48-byt 395s | 65 20 6d 65 73 73 61 67 65 20 28 65 78 61 63 74 e message (exact 395s | 6c 79 20 33 20 41 45 53 20 62 6c 6f 63 6b 73 29 ly 3 AES blocks) 395s | decode_to_chunk() ciphertext: : input "0xd0a02b3836451753d493665d33f0e8862dea54cdb293abc7506939276772f8d5021c19216bad525c8579695d83ba2684" 395s | decode_to_chunk() output: 395s | d0 a0 2b 38 36 45 17 53 d4 93 66 5d 33 f0 e8 86 ..+86E.S..f]3... 395s | 2d ea 54 cd b2 93 ab c7 50 69 39 27 67 72 f8 d5 -.T.....Pi9'gr.. 395s | 02 1c 19 21 6b ad 52 5c 85 79 69 5d 83 ba 26 84 ...!k.R\.yi]..&. 395s | NSS ike_alg_nss_cbc: AES_CBC - enter (nil) 395s | using IKEv1 IV 395s | NSS ike_alg_nss_cbc: AES_CBC - exit 395s | verify_bytes() Encrypting 48 bytes (3 blocks) using AES-CBC with 128-bit key: encrypt: ok 395s | verify_bytes() Encrypting 48 bytes (3 blocks) using AES-CBC with 128-bit key: updated CBC IV: ok 395s | decode_to_mac() IV: : input "0xc782dc4c098c66cbd9cd27d825682c81" 395s | decode_to_mac() output: 395s | c7 82 dc 4c 09 8c 66 cb d9 cd 27 d8 25 68 2c 81 ...L..f...'.%h,. 395s | decode_to_chunk() new IV: : input "0xd0a02b3836451753d493665d33f0e8862dea54cdb293abc7506939276772f8d5021c19216bad525c8579695d83ba2684" 395s | decode_to_chunk() output: 395s | d0 a0 2b 38 36 45 17 53 d4 93 66 5d 33 f0 e8 86 ..+86E.S..f]3... 395s | 2d ea 54 cd b2 93 ab c7 50 69 39 27 67 72 f8 d5 -.T.....Pi9'gr.. 395s | 02 1c 19 21 6b ad 52 5c 85 79 69 5d 83 ba 26 84 ...!k.R\.yi]..&. 395s | decode_to_chunk() ciphertext: : input "0xd0a02b3836451753d493665d33f0e8862dea54cdb293abc7506939276772f8d5021c19216bad525c8579695d83ba2684" 395s | decode_to_chunk() output: 395s | d0 a0 2b 38 36 45 17 53 d4 93 66 5d 33 f0 e8 86 ..+86E.S..f]3... 395s | 2d ea 54 cd b2 93 ab c7 50 69 39 27 67 72 f8 d5 -.T.....Pi9'gr.. 395s | 02 1c 19 21 6b ad 52 5c 85 79 69 5d 83 ba 26 84 ...!k.R\.yi]..&. 395s | decode_to_chunk() plaintext: : input "This is a 48-byte message (exactly 3 AES blocks)" 395s | decode_to_chunk() output: 395s | 54 68 69 73 20 69 73 20 61 20 34 38 2d 62 79 74 This is a 48-byt 395s | 65 20 6d 65 73 73 61 67 65 20 28 65 78 61 63 74 e message (exact 395s | 6c 79 20 33 20 41 45 53 20 62 6c 6f 63 6b 73 29 ly 3 AES blocks) 395s | NSS ike_alg_nss_cbc: AES_CBC - enter (nil) 395s | using IKEv1 IV 395s | NSS ike_alg_nss_cbc: AES_CBC - exit 395s | verify_bytes() Encrypting 48 bytes (3 blocks) using AES-CBC with 128-bit key: decrypt: ok 395s | verify_bytes() Encrypting 48 bytes (3 blocks) using AES-CBC with 128-bit key: updated CBC IV: ok 395s ipsec algparse: Encrypting 64 bytes (4 blocks) using AES-CBC with 128-bit key 395s | decode_to_chunk() raw_key: input "0x56e47a38c5598974bc46903dba290349" 395s | decode_to_chunk() output: 395s | 56 e4 7a 38 c5 59 89 74 bc 46 90 3d ba 29 03 49 V.z8.Y.t.F.=.).I 395s | CONCATENATE_DATA_AND_BASE: 395s | target: EXTRACT_KEY_FROM_KEY 395s | base: base-key@0x55685bc944c0 (16-bytes, AES_KEY_GEN) 395s | params: 16-bytes@0x7ffff22a3e10 395s | key-offset: 0, key-size: 16 395s | EXTRACT_KEY_FROM_KEY: 395s | target: AES_CBC 395s | flags: ENCRYPT+DECRYPT 395s | key_size: 16-bytes 395s | base: base-key@0x55685bc974d0 (32-bytes, EXTRACT_KEY_FROM_KEY) 395s | operation: FLAGS_ONLY 395s | params: 8-bytes@0x7ffff22a3dd8 395s | decode_to_mac() IV: : input "0x8ce82eefbea0da3c44699ed7db51b7d9" 395s | decode_to_mac() output: 395s | 8c e8 2e ef be a0 da 3c 44 69 9e d7 db 51 b7 d9 ...........U 395s | decode_to_chunk() plaintext: : input "0xa0a1a2a3a4a5a6a7a8a9aaabacadaeafb0b1b2b3b4b5b6b7b8b9babbbcbdbebfc0c1c2c3c4c5c6c7c8c9cacbcccdcecfd0d1d2d3d4d5d6d7d8d9dadbdcdddedf" 395s | decode_to_chunk() output: 395s | a0 a1 a2 a3 a4 a5 a6 a7 a8 a9 aa ab ac ad ae af ................ 395s | b0 b1 b2 b3 b4 b5 b6 b7 b8 b9 ba bb bc bd be bf ................ 395s | c0 c1 c2 c3 c4 c5 c6 c7 c8 c9 ca cb cc cd ce cf ................ 395s | d0 d1 d2 d3 d4 d5 d6 d7 d8 d9 da db dc dd de df ................ 395s | decode_to_chunk() ciphertext: : input "0xc30e32ffedc0774e6aff6af0869f71aa0f3af07a9a31a9c684db207eb0ef8e4e35907aa632c3ffdf868bb7b29d3d46ad83ce9f9a102ee99d49a53e87f4c3da55" 395s | decode_to_chunk() output: 395s | c3 0e 32 ff ed c0 77 4e 6a ff 6a f0 86 9f 71 aa ..2...wNj.j...q. 395s | 0f 3a f0 7a 9a 31 a9 c6 84 db 20 7e b0 ef 8e 4e .:.z.1.... ~...N 395s | 35 90 7a a6 32 c3 ff df 86 8b b7 b2 9d 3d 46 ad 5.z.2........=F. 395s | 83 ce 9f 9a 10 2e e9 9d 49 a5 3e 87 f4 c3 da 55 ........I.>....U 395s | NSS ike_alg_nss_cbc: AES_CBC - enter (nil) 395s | using IKEv1 IV 395s | NSS ike_alg_nss_cbc: AES_CBC - exit 395s | verify_bytes() Encrypting 64 bytes (4 blocks) using AES-CBC with 128-bit key: encrypt: ok 395s | verify_bytes() Encrypting 64 bytes (4 blocks) using AES-CBC with 128-bit key: updated CBC IV: ok 395s | decode_to_mac() IV: : input "0x8ce82eefbea0da3c44699ed7db51b7d9" 395s | decode_to_mac() output: 395s | 8c e8 2e ef be a0 da 3c 44 69 9e d7 db 51 b7 d9 ...........U 395s | decode_to_chunk() ciphertext: : input "0xc30e32ffedc0774e6aff6af0869f71aa0f3af07a9a31a9c684db207eb0ef8e4e35907aa632c3ffdf868bb7b29d3d46ad83ce9f9a102ee99d49a53e87f4c3da55" 395s | decode_to_chunk() output: 395s | c3 0e 32 ff ed c0 77 4e 6a ff 6a f0 86 9f 71 aa ..2...wNj.j...q. 395s | 0f 3a f0 7a 9a 31 a9 c6 84 db 20 7e b0 ef 8e 4e .:.z.1.... ~...N 395s | 35 90 7a a6 32 c3 ff df 86 8b b7 b2 9d 3d 46 ad 5.z.2........=F. 395s | 83 ce 9f 9a 10 2e e9 9d 49 a5 3e 87 f4 c3 da 55 ........I.>....U 395s | decode_to_chunk() plaintext: : input "0xa0a1a2a3a4a5a6a7a8a9aaabacadaeafb0b1b2b3b4b5b6b7b8b9babbbcbdbebfc0c1c2c3c4c5c6c7c8c9cacbcccdcecfd0d1d2d3d4d5d6d7d8d9dadbdcdddedf" 395s | decode_to_chunk() output: 395s | a0 a1 a2 a3 a4 a5 a6 a7 a8 a9 aa ab ac ad ae af ................ 395s | b0 b1 b2 b3 b4 b5 b6 b7 b8 b9 ba bb bc bd be bf ................ 395s | c0 c1 c2 c3 c4 c5 c6 c7 c8 c9 ca cb cc cd ce cf ................ 395s | d0 d1 d2 d3 d4 d5 d6 d7 d8 d9 da db dc dd de df ................ 395s | NSS ike_alg_nss_cbc: AES_CBC - enter (nil) 395s | using IKEv1 IV 395s | NSS ike_alg_nss_cbc: AES_CBC - exit 395s | verify_bytes() Encrypting 64 bytes (4 blocks) using AES-CBC with 128-bit key: decrypt: ok 395s | verify_bytes() Encrypting 64 bytes (4 blocks) using AES-CBC with 128-bit key: updated CBC IV: ok 395s ipsec algparse: testing AES_XCBC: 395s ipsec algparse: RFC 3566 Test Case 1: AES-XCBC-MAC-96 with 0-byte input 395s | decode_to_chunk() test_prf_vector: input "0x000102030405060708090a0b0c0d0e0f" 395s | decode_to_chunk() output: 395s | 00 01 02 03 04 05 06 07 08 09 0a 0b 0c 0d 0e 0f ................ 395s | decode_to_chunk() test_prf_vector: input "" 395s | decode_to_chunk() output: 395s | 395s | decode_to_chunk() test_prf_vector: input "0x75f0251d528ac01c4573dfd584d79f29" 395s | decode_to_chunk() output: 395s | 75 f0 25 1d 52 8a c0 1c 45 73 df d5 84 d7 9f 29 u.%.R...Es.....) 395s | PRF chunk interface PRF AES_XCBC init key hunk 0x55685bc97800 (length 16) 395s | 00 01 02 03 04 05 06 07 08 09 0a 0b 0c 0d 0e 0f ................ 395s | CONCATENATE_DATA_AND_BASE: 395s | target: EXTRACT_KEY_FROM_KEY 395s | base: base-key@0x55685bc944c0 (16-bytes, AES_KEY_GEN) 395s | params: 16-bytes@0x7ffff22a3d00 395s | key-offset: 0, key-size: 16 395s | EXTRACT_KEY_FROM_KEY: 395s | target: EXTRACT_KEY_FROM_KEY 395s | key_size: 16-bytes 395s | base: base-key@0x55685bc974d0 (32-bytes, EXTRACT_KEY_FROM_KEY) 395s | operation: FLAGS_ONLY 395s | params: 8-bytes@0x7ffff22a3c98 395s | XCBC: Key 16=16 just right 395s | key-offset: 0, key-size: 16 395s | EXTRACT_KEY_FROM_KEY: 395s | target: AES_ECB 395s | flags: SIGN 395s | key_size: 16-bytes 395s | base: base-key@0x55685bc95de0 (16-bytes, EXTRACT_KEY_FROM_KEY) 395s | operation: FLAGS_ONLY 395s | params: 8-bytes@0x7ffff22a3c48 395s | PRF chunk interface PRF AES_XCBC 0x55685bc94460 395s | PRF chunk interface PRF AES_XCBC update message (0x55685bc95d10 length 0) 395s | 395s | XCBC: data 395s | 395s | K extracting all 16 bytes of key@0x55685bc974d0 395s | K: symkey-key@0x55685bc974d0 (16-bytes, AES_ECB) 395s | sizeof bytes 16 395s | wrapper: (SECItemType)538976288: 4c fe 7f c5 ad d7 9f b4 e0 cf 64 4d 6b e6 15 dc 395s | K extracted len 16 bytes at 0x55685bc98010 395s | unwrapped: 395s | 00 01 02 03 04 05 06 07 08 09 0a 0b 0c 0d 0e 0f ................ 395s | XCBC: K: 395s | 00 01 02 03 04 05 06 07 08 09 0a 0b 0c 0d 0e 0f ................ 395s | XCBC: K1 395s | c3 52 80 57 54 23 7f 31 1a c0 ff f4 e3 e0 3e 78 .R.WT#.1......>x 395s | CONCATENATE_DATA_AND_BASE: 395s | target: EXTRACT_KEY_FROM_KEY 395s | base: base-key@0x55685bc944c0 (16-bytes, AES_KEY_GEN) 395s | params: 16-bytes@0x7ffff22a3bb0 395s | key-offset: 0, key-size: 16 395s | EXTRACT_KEY_FROM_KEY: 395s | target: AES_ECB 395s | flags: SIGN 395s | key_size: 16-bytes 395s | base: base-key@0x55685bc981a0 (32-bytes, EXTRACT_KEY_FROM_KEY) 395s | operation: FLAGS_ONLY 395s | params: 8-bytes@0x7ffff22a3b98 395s | Computing E[0] using K3 395s | XCBC: K3 395s | c1 a7 ab a1 a2 3a 94 06 58 07 a0 8c c8 ee d0 6e .....:..X......n 395s | XCBC: E[n-1] 395s | 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................ 395s | XCBC: M[n] 395s | 395s | XCBC: M[n] 395s | 395s | XCBC: M[n]:80...^E[n-1]^K3 395s | 41 a7 ab a1 a2 3a 94 06 58 07 a0 8c c8 ee d0 6e A....:..X......n 395s | XCBC: MAC 395s | 75 f0 25 1d 52 8a c0 1c 45 73 df d5 84 d7 9f 29 u.%.R...Es.....) 395s | PRF chunk interface PRF AES_XCBC final length 16 395s | 75 f0 25 1d 52 8a c0 1c 45 73 df d5 84 d7 9f 29 u.%.R...Es.....) 395s | chunk output 395s | 75 f0 25 1d 52 8a c0 1c 45 73 df d5 84 d7 9f 29 u.%.R...Es.....) 395s | verify_bytes() RFC 3566 Test Case 1: AES-XCBC-MAC-96 with 0-byte input: prf OUT: ok 395s | CONCATENATE_DATA_AND_BASE: 395s | target: EXTRACT_KEY_FROM_KEY 395s | base: base-key@0x55685bc944c0 (16-bytes, AES_KEY_GEN) 395s | params: 16-bytes@0x7ffff22a3d80 395s | key-offset: 0, key-size: 16 395s | EXTRACT_KEY_FROM_KEY: 395s | target: EXTRACT_KEY_FROM_KEY 395s | key_size: 16-bytes 395s | base: base-key@0x55685bc95de0 (32-bytes, EXTRACT_KEY_FROM_KEY) 395s | operation: FLAGS_ONLY 395s | params: 8-bytes@0x7ffff22a3d18 395s | PRF symkey interface PRF AES_XCBC init key symkey-key@0x55685bc974d0 (size 16) 395s | PRF symkey interface: key symkey-key@0x55685bc974d0 (16-bytes, EXTRACT_KEY_FROM_KEY) 395s | XCBC: Key 16=16 just right 395s | key-offset: 0, key-size: 16 395s | EXTRACT_KEY_FROM_KEY: 395s | target: AES_ECB 395s | flags: SIGN 395s | key_size: 16-bytes 395s | base: base-key@0x55685bc974d0 (16-bytes, EXTRACT_KEY_FROM_KEY) 395s | operation: FLAGS_ONLY 395s | params: 8-bytes@0x7ffff22a3c88 395s | PRF symkey interface PRF AES_XCBC 0x55685bc94460 395s | PRF symkey interface PRF AES_XCBC update symkey message-key@(nil) (size 0) 395s | PRF symkey interface: symkey message-key@NULL 395s | symkey message NULL key has no bytes 395s | XCBC: data 395s | 395s | K extracting all 16 bytes of key@0x55685bc95de0 395s | K: symkey-key@0x55685bc95de0 (16-bytes, AES_ECB) 395s | sizeof bytes 16 395s | wrapper: (SECItemType)-232114176: 4c fe 7f c5 ad d7 9f b4 e0 cf 64 4d 6b e6 15 dc 395s | K extracted len 16 bytes at 0x55685bc98010 395s | unwrapped: 395s | 00 01 02 03 04 05 06 07 08 09 0a 0b 0c 0d 0e 0f ................ 395s | XCBC: K: 395s | 00 01 02 03 04 05 06 07 08 09 0a 0b 0c 0d 0e 0f ................ 395s | XCBC: K1 395s | c3 52 80 57 54 23 7f 31 1a c0 ff f4 e3 e0 3e 78 .R.WT#.1......>x 395s | CONCATENATE_DATA_AND_BASE: 395s | target: EXTRACT_KEY_FROM_KEY 395s | base: base-key@0x55685bc944c0 (16-bytes, AES_KEY_GEN) 395s | params: 16-bytes@0x7ffff22a3c00 395s | key-offset: 0, key-size: 16 395s | EXTRACT_KEY_FROM_KEY: 395s | target: AES_ECB 395s | flags: SIGN 395s | key_size: 16-bytes 395s | base: base-key@0x55685bc984e0 (32-bytes, EXTRACT_KEY_FROM_KEY) 395s | operation: FLAGS_ONLY 395s | params: 8-bytes@0x7ffff22a3be8 395s | Computing E[0] using K3 395s | XCBC: K3 395s | c1 a7 ab a1 a2 3a 94 06 58 07 a0 8c c8 ee d0 6e .....:..X......n 395s | XCBC: E[n-1] 395s | 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................ 395s | XCBC: M[n] 395s | 395s | XCBC: M[n] 395s | 395s | XCBC: M[n]:80...^E[n-1]^K3 395s | 41 a7 ab a1 a2 3a 94 06 58 07 a0 8c c8 ee d0 6e A....:..X......n 395s | XCBC: MAC 395s | 75 f0 25 1d 52 8a c0 1c 45 73 df d5 84 d7 9f 29 u.%.R...Es.....) 395s | CONCATENATE_DATA_AND_BASE: 395s | target: EXTRACT_KEY_FROM_KEY 395s | base: base-key@0x55685bc944c0 (16-bytes, AES_KEY_GEN) 395s | params: 16-bytes@0x7ffff22a3d10 395s | key-offset: 0, key-size: 16 395s | EXTRACT_KEY_FROM_KEY: 395s | target: EXTRACT_KEY_FROM_KEY 395s | key_size: 16-bytes 395s | base: base-key@0x55685bc984e0 (32-bytes, EXTRACT_KEY_FROM_KEY) 395s | operation: FLAGS_ONLY 395s | params: 8-bytes@0x7ffff22a3ca8 395s | PRF symkey interface PRF AES_XCBC final-key@0x55685bc981a0 (size 16) 395s | PRF symkey interface: key-key@0x55685bc981a0 (16-bytes, EXTRACT_KEY_FROM_KEY) 395s | output: symkey-key@0x55685bc981a0 (16-bytes, EXTRACT_KEY_FROM_KEY) 395s | RFC 3566 Test Case 1: AES-XCBC-MAC-96 with 0-byte input extracting all 16 bytes of key@0x55685bc981a0 395s | RFC 3566 Test Case 1: AES-XCBC-MAC-96 with 0-byte input: symkey-key@0x55685bc981a0 (16-bytes, EXTRACT_KEY_FROM_KEY) 395s | sizeof bytes 16 395s | wrapper: (SECItemType)976: b7 18 c8 32 e5 a6 be ea ab 95 25 32 21 d7 68 d5 395s | RFC 3566 Test Case 1: AES-XCBC-MAC-96 with 0-byte input extracted len 16 bytes at 0x55685bc98180 395s | unwrapped: 395s | 75 f0 25 1d 52 8a c0 1c 45 73 df d5 84 d7 9f 29 u.%.R...Es.....) 395s | verify_bytes() RFC 3566 Test Case 1: AES-XCBC-MAC-96 with 0-byte input: symkey: ok 395s ipsec algparse: RFC 3566 Test Case 2: AES-XCBC-MAC-96 with 3-byte input 395s | decode_to_chunk() test_prf_vector: input "0x000102030405060708090a0b0c0d0e0f" 395s | decode_to_chunk() output: 395s | 00 01 02 03 04 05 06 07 08 09 0a 0b 0c 0d 0e 0f ................ 395s | decode_to_chunk() test_prf_vector: input "0x000102" 395s | decode_to_chunk() output: 395s | 00 01 02 ... 395s | decode_to_chunk() test_prf_vector: input "0x5b376580ae2f19afe7219ceef172756f" 395s | decode_to_chunk() output: 395s | 5b 37 65 80 ae 2f 19 af e7 21 9c ee f1 72 75 6f [7e../...!...ruo 395s | PRF chunk interface PRF AES_XCBC init key hunk 0x55685bc97800 (length 16) 395s | 00 01 02 03 04 05 06 07 08 09 0a 0b 0c 0d 0e 0f ................ 395s | CONCATENATE_DATA_AND_BASE: 395s | target: EXTRACT_KEY_FROM_KEY 395s | base: base-key@0x55685bc944c0 (16-bytes, AES_KEY_GEN) 395s | params: 16-bytes@0x7ffff22a3d00 395s | key-offset: 0, key-size: 16 395s | EXTRACT_KEY_FROM_KEY: 395s | target: EXTRACT_KEY_FROM_KEY 395s | key_size: 16-bytes 395s | base: base-key@0x55685bc974d0 (32-bytes, EXTRACT_KEY_FROM_KEY) 395s | operation: FLAGS_ONLY 395s | params: 8-bytes@0x7ffff22a3c98 395s | XCBC: Key 16=16 just right 395s | key-offset: 0, key-size: 16 395s | EXTRACT_KEY_FROM_KEY: 395s | target: AES_ECB 395s | flags: SIGN 395s | key_size: 16-bytes 395s | base: base-key@0x55685bc981a0 (16-bytes, EXTRACT_KEY_FROM_KEY) 395s | operation: FLAGS_ONLY 395s | params: 8-bytes@0x7ffff22a3c48 395s | PRF chunk interface PRF AES_XCBC 0x55685bc94460 395s | PRF chunk interface PRF AES_XCBC update message (0x55685bc95d10 length 3) 395s | 00 01 02 ... 395s | XCBC: data 395s | 00 01 02 ... 395s | K extracting all 16 bytes of key@0x55685bc974d0 395s | K: symkey-key@0x55685bc974d0 (16-bytes, AES_ECB) 395s | sizeof bytes 16 395s | wrapper: (SECItemType)538976288: 4c fe 7f c5 ad d7 9f b4 e0 cf 64 4d 6b e6 15 dc 395s | K extracted len 16 bytes at 0x55685bc97820 395s | unwrapped: 395s | 00 01 02 03 04 05 06 07 08 09 0a 0b 0c 0d 0e 0f ................ 395s | XCBC: K: 395s | 00 01 02 03 04 05 06 07 08 09 0a 0b 0c 0d 0e 0f ................ 395s | XCBC: K1 395s | c3 52 80 57 54 23 7f 31 1a c0 ff f4 e3 e0 3e 78 .R.WT#.1......>x 395s | CONCATENATE_DATA_AND_BASE: 395s | target: EXTRACT_KEY_FROM_KEY 395s | base: base-key@0x55685bc944c0 (16-bytes, AES_KEY_GEN) 395s | params: 16-bytes@0x7ffff22a3bb0 395s | key-offset: 0, key-size: 16 395s | EXTRACT_KEY_FROM_KEY: 395s | target: AES_ECB 395s | flags: SIGN 395s | key_size: 16-bytes 395s | base: base-key@0x55685bc95de0 (32-bytes, EXTRACT_KEY_FROM_KEY) 395s | operation: FLAGS_ONLY 395s | params: 8-bytes@0x7ffff22a3b98 395s | Computing E[1] using K3 395s | XCBC: K3 395s | c1 a7 ab a1 a2 3a 94 06 58 07 a0 8c c8 ee d0 6e .....:..X......n 395s | XCBC: E[n-1] 395s | 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................ 395s | XCBC: M[n] 395s | 00 01 02 ... 395s | XCBC: M[n] 395s | 00 01 02 ... 395s | XCBC: M[n]:80...^E[n-1]^K3 395s | c1 a6 a9 21 a2 3a 94 06 58 07 a0 8c c8 ee d0 6e ...!.:..X......n 395s | XCBC: MAC 395s | 5b 37 65 80 ae 2f 19 af e7 21 9c ee f1 72 75 6f [7e../...!...ruo 395s | PRF chunk interface PRF AES_XCBC final length 16 395s | 5b 37 65 80 ae 2f 19 af e7 21 9c ee f1 72 75 6f [7e../...!...ruo 395s | chunk output 395s | 5b 37 65 80 ae 2f 19 af e7 21 9c ee f1 72 75 6f [7e../...!...ruo 395s | verify_bytes() RFC 3566 Test Case 2: AES-XCBC-MAC-96 with 3-byte input: prf OUT: ok 395s | CONCATENATE_DATA_AND_BASE: 395s | target: EXTRACT_KEY_FROM_KEY 395s | base: base-key@0x55685bc944c0 (16-bytes, AES_KEY_GEN) 395s | params: 16-bytes@0x7ffff22a3d80 395s | key-offset: 0, key-size: 16 395s | EXTRACT_KEY_FROM_KEY: 395s | target: EXTRACT_KEY_FROM_KEY 395s | key_size: 16-bytes 395s | base: base-key@0x55685bc981a0 (32-bytes, EXTRACT_KEY_FROM_KEY) 395s | operation: FLAGS_ONLY 395s | params: 8-bytes@0x7ffff22a3d18 395s | PRF symkey interface PRF AES_XCBC init key symkey-key@0x55685bc974d0 (size 16) 395s | PRF symkey interface: key symkey-key@0x55685bc974d0 (16-bytes, EXTRACT_KEY_FROM_KEY) 395s | XCBC: Key 16=16 just right 395s | key-offset: 0, key-size: 16 395s | EXTRACT_KEY_FROM_KEY: 395s | target: AES_ECB 395s | flags: SIGN 395s | key_size: 16-bytes 395s | base: base-key@0x55685bc974d0 (16-bytes, EXTRACT_KEY_FROM_KEY) 395s | operation: FLAGS_ONLY 395s | params: 8-bytes@0x7ffff22a3c88 395s | PRF symkey interface PRF AES_XCBC 0x55685bc94460 395s | CONCATENATE_DATA_AND_BASE: 395s | target: EXTRACT_KEY_FROM_KEY 395s | base: base-key@0x55685bc944c0 (16-bytes, AES_KEY_GEN) 395s | params: 16-bytes@0x7ffff22a3d80 395s | key-offset: 0, key-size: 3 395s | EXTRACT_KEY_FROM_KEY: 395s | target: EXTRACT_KEY_FROM_KEY 395s | key_size: 3-bytes 395s | base: base-key@0x55685bc984e0 (19-bytes, EXTRACT_KEY_FROM_KEY) 395s | operation: FLAGS_ONLY 395s | params: 8-bytes@0x7ffff22a3d18 395s | PRF symkey interface PRF AES_XCBC update symkey message-key@0x55685bc95de0 (size 3) 395s | PRF symkey interface: symkey message-key@0x55685bc95de0 (3-bytes, EXTRACT_KEY_FROM_KEY) 395s | symkey message extracting all 3 bytes of key@0x55685bc95de0 395s | symkey message: symkey-key@0x55685bc95de0 (3-bytes, EXTRACT_KEY_FROM_KEY) 395s | sizeof bytes 16 395s | wrapper: (SECItemType)-232113904: e1 bc 03 f4 d9 18 9f 8f 4d 27 3c 33 71 f1 e6 1c 395s | symkey message extracted len 16 bytes at 0x55685bc97820 395s | unwrapped: 395s | 00 01 02 00 00 00 00 00 00 00 00 00 00 00 00 00 ................ 395s | XCBC: data 395s | 00 01 02 ... 395s | K extracting all 16 bytes of key@0x55685bc981a0 395s | K: symkey-key@0x55685bc981a0 (16-bytes, AES_ECB) 395s | sizeof bytes 16 395s | wrapper: (SECItemType)-232114112: 4c fe 7f c5 ad d7 9f b4 e0 cf 64 4d 6b e6 15 dc 395s | K extracted len 16 bytes at 0x55685bc94390 395s | unwrapped: 395s | 00 01 02 03 04 05 06 07 08 09 0a 0b 0c 0d 0e 0f ................ 395s | XCBC: K: 395s | 00 01 02 03 04 05 06 07 08 09 0a 0b 0c 0d 0e 0f ................ 395s | XCBC: K1 395s | c3 52 80 57 54 23 7f 31 1a c0 ff f4 e3 e0 3e 78 .R.WT#.1......>x 395s | CONCATENATE_DATA_AND_BASE: 395s | target: EXTRACT_KEY_FROM_KEY 395s | base: base-key@0x55685bc944c0 (16-bytes, AES_KEY_GEN) 395s | params: 16-bytes@0x7ffff22a3c00 395s | key-offset: 0, key-size: 16 395s | EXTRACT_KEY_FROM_KEY: 395s | target: AES_ECB 395s | flags: SIGN 395s | key_size: 16-bytes 395s | base: base-key@0x55685bc98840 (32-bytes, EXTRACT_KEY_FROM_KEY) 395s | operation: FLAGS_ONLY 395s | params: 8-bytes@0x7ffff22a3be8 395s | Computing E[1] using K3 395s | XCBC: K3 395s | c1 a7 ab a1 a2 3a 94 06 58 07 a0 8c c8 ee d0 6e .....:..X......n 395s | XCBC: E[n-1] 395s | 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................ 395s | XCBC: M[n] 395s | 00 01 02 ... 395s | XCBC: M[n] 395s | 00 01 02 ... 395s | XCBC: M[n]:80...^E[n-1]^K3 395s | c1 a6 a9 21 a2 3a 94 06 58 07 a0 8c c8 ee d0 6e ...!.:..X......n 395s | XCBC: MAC 395s | 5b 37 65 80 ae 2f 19 af e7 21 9c ee f1 72 75 6f [7e../...!...ruo 395s | CONCATENATE_DATA_AND_BASE: 395s | target: EXTRACT_KEY_FROM_KEY 395s | base: base-key@0x55685bc944c0 (16-bytes, AES_KEY_GEN) 395s | params: 16-bytes@0x7ffff22a3d10 395s | key-offset: 0, key-size: 16 395s | EXTRACT_KEY_FROM_KEY: 395s | target: EXTRACT_KEY_FROM_KEY 395s | key_size: 16-bytes 395s | base: base-key@0x55685bc98840 (32-bytes, EXTRACT_KEY_FROM_KEY) 395s | operation: FLAGS_ONLY 395s | params: 8-bytes@0x7ffff22a3ca8 395s | PRF symkey interface PRF AES_XCBC final-key@0x55685bc984e0 (size 16) 395s | PRF symkey interface: key-key@0x55685bc984e0 (16-bytes, EXTRACT_KEY_FROM_KEY) 395s | output: symkey-key@0x55685bc984e0 (16-bytes, EXTRACT_KEY_FROM_KEY) 395s | RFC 3566 Test Case 2: AES-XCBC-MAC-96 with 3-byte input extracting all 16 bytes of key@0x55685bc984e0 395s | RFC 3566 Test Case 2: AES-XCBC-MAC-96 with 3-byte input: symkey-key@0x55685bc984e0 (16-bytes, EXTRACT_KEY_FROM_KEY) 395s | sizeof bytes 16 395s | wrapper: (SECItemType)976: fa 47 98 50 a2 10 74 7d 00 b0 48 08 e2 72 da 33 395s | RFC 3566 Test Case 2: AES-XCBC-MAC-96 with 3-byte input extracted len 16 bytes at 0x55685bc94390 395s | unwrapped: 395s | 5b 37 65 80 ae 2f 19 af e7 21 9c ee f1 72 75 6f [7e../...!...ruo 395s | verify_bytes() RFC 3566 Test Case 2: AES-XCBC-MAC-96 with 3-byte input: symkey: ok 395s ipsec algparse: RFC 3566 Test Case 3: AES-XCBC-MAC-96 with 16-byte input 395s | decode_to_chunk() test_prf_vector: input "0x000102030405060708090a0b0c0d0e0f" 395s | decode_to_chunk() output: 395s | 00 01 02 03 04 05 06 07 08 09 0a 0b 0c 0d 0e 0f ................ 395s | decode_to_chunk() test_prf_vector: input "0x000102030405060708090a0b0c0d0e0f" 395s | decode_to_chunk() output: 395s | 00 01 02 03 04 05 06 07 08 09 0a 0b 0c 0d 0e 0f ................ 395s | decode_to_chunk() test_prf_vector: input "0xd2a246fa349b68a79998a4394ff7a263" 395s | decode_to_chunk() output: 395s | d2 a2 46 fa 34 9b 68 a7 99 98 a4 39 4f f7 a2 63 ..F.4.h....9O..c 395s | PRF chunk interface PRF AES_XCBC init key hunk 0x55685bc97800 (length 16) 395s | 00 01 02 03 04 05 06 07 08 09 0a 0b 0c 0d 0e 0f ................ 395s | CONCATENATE_DATA_AND_BASE: 395s | target: EXTRACT_KEY_FROM_KEY 395s | base: base-key@0x55685bc944c0 (16-bytes, AES_KEY_GEN) 395s | params: 16-bytes@0x7ffff22a3d00 395s | key-offset: 0, key-size: 16 395s | EXTRACT_KEY_FROM_KEY: 395s | target: EXTRACT_KEY_FROM_KEY 395s | key_size: 16-bytes 395s | base: base-key@0x55685bc974d0 (32-bytes, EXTRACT_KEY_FROM_KEY) 395s | operation: FLAGS_ONLY 395s | params: 8-bytes@0x7ffff22a3c98 395s | XCBC: Key 16=16 just right 395s | key-offset: 0, key-size: 16 395s | EXTRACT_KEY_FROM_KEY: 395s | target: AES_ECB 395s | flags: SIGN 395s | key_size: 16-bytes 395s | base: base-key@0x55685bc984e0 (16-bytes, EXTRACT_KEY_FROM_KEY) 395s | operation: FLAGS_ONLY 395s | params: 8-bytes@0x7ffff22a3c48 395s | PRF chunk interface PRF AES_XCBC 0x55685bc94460 395s | PRF chunk interface PRF AES_XCBC update message (0x55685bc95d10 length 16) 395s | 00 01 02 03 04 05 06 07 08 09 0a 0b 0c 0d 0e 0f ................ 395s | XCBC: data 395s | 00 01 02 03 04 05 06 07 08 09 0a 0b 0c 0d 0e 0f ................ 395s | K extracting all 16 bytes of key@0x55685bc974d0 395s | K: symkey-key@0x55685bc974d0 (16-bytes, AES_ECB) 395s | sizeof bytes 16 395s | wrapper: (SECItemType)543502368: 4c fe 7f c5 ad d7 9f b4 e0 cf 64 4d 6b e6 15 dc 395s | K extracted len 16 bytes at 0x55685bc98010 395s | unwrapped: 395s | 00 01 02 03 04 05 06 07 08 09 0a 0b 0c 0d 0e 0f ................ 395s | XCBC: K: 395s | 00 01 02 03 04 05 06 07 08 09 0a 0b 0c 0d 0e 0f ................ 395s | XCBC: K1 395s | c3 52 80 57 54 23 7f 31 1a c0 ff f4 e3 e0 3e 78 .R.WT#.1......>x 395s | CONCATENATE_DATA_AND_BASE: 395s | target: EXTRACT_KEY_FROM_KEY 395s | base: base-key@0x55685bc944c0 (16-bytes, AES_KEY_GEN) 395s | params: 16-bytes@0x7ffff22a3bb0 395s | key-offset: 0, key-size: 16 395s | EXTRACT_KEY_FROM_KEY: 395s | target: AES_ECB 395s | flags: SIGN 395s | key_size: 16-bytes 395s | base: base-key@0x55685bc95de0 (32-bytes, EXTRACT_KEY_FROM_KEY) 395s | operation: FLAGS_ONLY 395s | params: 8-bytes@0x7ffff22a3b98 395s | XCBC: Computing E[1] using K2 395s | XCBC: K2 395s | bd 86 2f fb 97 ad 2f b8 f8 b8 91 f6 03 2f 36 cb ../.../....../6. 395s | XCBC: E[n-1] 395s | 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................ 395s | XCBC: M[n] 395s | 00 01 02 03 04 05 06 07 08 09 0a 0b 0c 0d 0e 0f ................ 395s | XCBC: M[n]^E[n-1]^K2 395s | bd 87 2d f8 93 a8 29 bf f0 b1 9b fd 0f 22 38 c4 ..-...)......"8. 395s | XCBC: MAC 395s | d2 a2 46 fa 34 9b 68 a7 99 98 a4 39 4f f7 a2 63 ..F.4.h....9O..c 395s | PRF chunk interface PRF AES_XCBC final length 16 395s | d2 a2 46 fa 34 9b 68 a7 99 98 a4 39 4f f7 a2 63 ..F.4.h....9O..c 395s | chunk output 395s | d2 a2 46 fa 34 9b 68 a7 99 98 a4 39 4f f7 a2 63 ..F.4.h....9O..c 395s | verify_bytes() RFC 3566 Test Case 3: AES-XCBC-MAC-96 with 16-byte input: prf OUT: ok 395s | CONCATENATE_DATA_AND_BASE: 395s | target: EXTRACT_KEY_FROM_KEY 395s | base: base-key@0x55685bc944c0 (16-bytes, AES_KEY_GEN) 395s | params: 16-bytes@0x7ffff22a3d80 395s | key-offset: 0, key-size: 16 395s | EXTRACT_KEY_FROM_KEY: 395s | target: EXTRACT_KEY_FROM_KEY 395s | key_size: 16-bytes 395s | base: base-key@0x55685bc984e0 (32-bytes, EXTRACT_KEY_FROM_KEY) 395s | operation: FLAGS_ONLY 395s | params: 8-bytes@0x7ffff22a3d18 395s | PRF symkey interface PRF AES_XCBC init key symkey-key@0x55685bc974d0 (size 16) 395s | PRF symkey interface: key symkey-key@0x55685bc974d0 (16-bytes, EXTRACT_KEY_FROM_KEY) 395s | XCBC: Key 16=16 just right 395s | key-offset: 0, key-size: 16 395s | EXTRACT_KEY_FROM_KEY: 395s | target: AES_ECB 395s | flags: SIGN 395s | key_size: 16-bytes 395s | base: base-key@0x55685bc974d0 (16-bytes, EXTRACT_KEY_FROM_KEY) 395s | operation: FLAGS_ONLY 395s | params: 8-bytes@0x7ffff22a3c88 395s | PRF symkey interface PRF AES_XCBC 0x55685bc94460 395s | CONCATENATE_DATA_AND_BASE: 395s | target: EXTRACT_KEY_FROM_KEY 395s | base: base-key@0x55685bc944c0 (16-bytes, AES_KEY_GEN) 395s | params: 16-bytes@0x7ffff22a3d80 395s | key-offset: 0, key-size: 16 395s | EXTRACT_KEY_FROM_KEY: 395s | target: EXTRACT_KEY_FROM_KEY 395s | key_size: 16-bytes 395s | base: base-key@0x55685bc981a0 (32-bytes, EXTRACT_KEY_FROM_KEY) 395s | operation: FLAGS_ONLY 395s | params: 8-bytes@0x7ffff22a3d18 395s | PRF symkey interface PRF AES_XCBC update symkey message-key@0x55685bc95de0 (size 16) 395s | PRF symkey interface: symkey message-key@0x55685bc95de0 (16-bytes, EXTRACT_KEY_FROM_KEY) 395s | symkey message extracting all 16 bytes of key@0x55685bc95de0 395s | symkey message: symkey-key@0x55685bc95de0 (16-bytes, EXTRACT_KEY_FROM_KEY) 395s | sizeof bytes 16 395s | wrapper: (SECItemType)-232113904: 4c fe 7f c5 ad d7 9f b4 e0 cf 64 4d 6b e6 15 dc 395s | symkey message extracted len 16 bytes at 0x55685bc98010 395s | unwrapped: 395s | 00 01 02 03 04 05 06 07 08 09 0a 0b 0c 0d 0e 0f ................ 395s | XCBC: data 395s | 00 01 02 03 04 05 06 07 08 09 0a 0b 0c 0d 0e 0f ................ 395s | K extracting all 16 bytes of key@0x55685bc984e0 395s | K: symkey-key@0x55685bc984e0 (16-bytes, AES_ECB) 395s | sizeof bytes 16 395s | wrapper: (SECItemType)-232114112: 4c fe 7f c5 ad d7 9f b4 e0 cf 64 4d 6b e6 15 dc 395s | K extracted len 16 bytes at 0x55685bc941f0 395s | unwrapped: 395s | 00 01 02 03 04 05 06 07 08 09 0a 0b 0c 0d 0e 0f ................ 395s | XCBC: K: 395s | 00 01 02 03 04 05 06 07 08 09 0a 0b 0c 0d 0e 0f ................ 395s | XCBC: K1 395s | c3 52 80 57 54 23 7f 31 1a c0 ff f4 e3 e0 3e 78 .R.WT#.1......>x 395s | CONCATENATE_DATA_AND_BASE: 395s | target: EXTRACT_KEY_FROM_KEY 395s | base: base-key@0x55685bc944c0 (16-bytes, AES_KEY_GEN) 395s | params: 16-bytes@0x7ffff22a3c00 395s | key-offset: 0, key-size: 16 395s | EXTRACT_KEY_FROM_KEY: 395s | target: AES_ECB 395s | flags: SIGN 395s | key_size: 16-bytes 395s | base: base-key@0x55685bc98840 (32-bytes, EXTRACT_KEY_FROM_KEY) 395s | operation: FLAGS_ONLY 395s | params: 8-bytes@0x7ffff22a3be8 395s | XCBC: Computing E[1] using K2 395s | XCBC: K2 395s | bd 86 2f fb 97 ad 2f b8 f8 b8 91 f6 03 2f 36 cb ../.../....../6. 395s | XCBC: E[n-1] 395s | 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................ 395s | XCBC: M[n] 395s | 00 01 02 03 04 05 06 07 08 09 0a 0b 0c 0d 0e 0f ................ 395s | XCBC: M[n]^E[n-1]^K2 395s | bd 87 2d f8 93 a8 29 bf f0 b1 9b fd 0f 22 38 c4 ..-...)......"8. 395s | XCBC: MAC 395s | d2 a2 46 fa 34 9b 68 a7 99 98 a4 39 4f f7 a2 63 ..F.4.h....9O..c 395s | CONCATENATE_DATA_AND_BASE: 395s | target: EXTRACT_KEY_FROM_KEY 395s | base: base-key@0x55685bc944c0 (16-bytes, AES_KEY_GEN) 395s | params: 16-bytes@0x7ffff22a3d10 395s | key-offset: 0, key-size: 16 395s | EXTRACT_KEY_FROM_KEY: 395s | target: EXTRACT_KEY_FROM_KEY 395s | key_size: 16-bytes 395s | base: base-key@0x55685bc98840 (32-bytes, EXTRACT_KEY_FROM_KEY) 395s | operation: FLAGS_ONLY 395s | params: 8-bytes@0x7ffff22a3ca8 395s | PRF symkey interface PRF AES_XCBC final-key@0x55685bc981a0 (size 16) 395s | PRF symkey interface: key-key@0x55685bc981a0 (16-bytes, EXTRACT_KEY_FROM_KEY) 395s | output: symkey-key@0x55685bc981a0 (16-bytes, EXTRACT_KEY_FROM_KEY) 395s | RFC 3566 Test Case 3: AES-XCBC-MAC-96 with 16-byte input extracting all 16 bytes of key@0x55685bc981a0 395s | RFC 3566 Test Case 3: AES-XCBC-MAC-96 with 16-byte input: symkey-key@0x55685bc981a0 (16-bytes, EXTRACT_KEY_FROM_KEY) 395s | sizeof bytes 16 395s | wrapper: (SECItemType)976: 5e 2c e0 9d ae b2 3a a6 b1 9f 1f af 00 52 99 30 395s | RFC 3566 Test Case 3: AES-XCBC-MAC-96 with 16-byte input extracted len 16 bytes at 0x55685bc941f0 395s | unwrapped: 395s | d2 a2 46 fa 34 9b 68 a7 99 98 a4 39 4f f7 a2 63 ..F.4.h....9O..c 395s | verify_bytes() RFC 3566 Test Case 3: AES-XCBC-MAC-96 with 16-byte input: symkey: ok 395s ipsec algparse: RFC 3566 Test Case 4: AES-XCBC-MAC-96 with 20-byte input 395s | decode_to_chunk() test_prf_vector: input "0x000102030405060708090a0b0c0d0e0f" 395s | decode_to_chunk() output: 395s | 00 01 02 03 04 05 06 07 08 09 0a 0b 0c 0d 0e 0f ................ 395s | decode_to_chunk() test_prf_vector: input "0x000102030405060708090a0b0c0d0e0f10111213" 395s | decode_to_chunk() output: 395s | 00 01 02 03 04 05 06 07 08 09 0a 0b 0c 0d 0e 0f ................ 395s | 10 11 12 13 .... 395s | decode_to_chunk() test_prf_vector: input "0x47f51b4564966215b8985c63055ed308" 395s | decode_to_chunk() output: 395s | 47 f5 1b 45 64 96 62 15 b8 98 5c 63 05 5e d3 08 G..Ed.b...\c.^.. 395s | PRF chunk interface PRF AES_XCBC init key hunk 0x55685bc97800 (length 16) 395s | 00 01 02 03 04 05 06 07 08 09 0a 0b 0c 0d 0e 0f ................ 395s | CONCATENATE_DATA_AND_BASE: 395s | target: EXTRACT_KEY_FROM_KEY 395s | base: base-key@0x55685bc944c0 (16-bytes, AES_KEY_GEN) 395s | params: 16-bytes@0x7ffff22a3d00 395s | key-offset: 0, key-size: 16 395s | EXTRACT_KEY_FROM_KEY: 395s | target: EXTRACT_KEY_FROM_KEY 395s | key_size: 16-bytes 395s | base: base-key@0x55685bc974d0 (32-bytes, EXTRACT_KEY_FROM_KEY) 395s | operation: FLAGS_ONLY 395s | params: 8-bytes@0x7ffff22a3c98 395s | XCBC: Key 16=16 just right 395s | key-offset: 0, key-size: 16 395s | EXTRACT_KEY_FROM_KEY: 395s | target: AES_ECB 395s | flags: SIGN 395s | key_size: 16-bytes 395s | base: base-key@0x55685bc981a0 (16-bytes, EXTRACT_KEY_FROM_KEY) 395s | operation: FLAGS_ONLY 395s | params: 8-bytes@0x7ffff22a3c48 395s | PRF chunk interface PRF AES_XCBC 0x55685bc94460 395s | PRF chunk interface PRF AES_XCBC update message (0x55685bc95d10 length 20) 395s | 00 01 02 03 04 05 06 07 08 09 0a 0b 0c 0d 0e 0f ................ 395s | 10 11 12 13 .... 395s | XCBC: data 395s | 00 01 02 03 04 05 06 07 08 09 0a 0b 0c 0d 0e 0f ................ 395s | 10 11 12 13 .... 395s | K extracting all 16 bytes of key@0x55685bc974d0 395s | K: symkey-key@0x55685bc974d0 (16-bytes, AES_ECB) 395s | sizeof bytes 16 395s | wrapper: (SECItemType)538976288: 4c fe 7f c5 ad d7 9f b4 e0 cf 64 4d 6b e6 15 dc 395s | K extracted len 16 bytes at 0x55685bc97b10 395s | unwrapped: 395s | 00 01 02 03 04 05 06 07 08 09 0a 0b 0c 0d 0e 0f ................ 395s | XCBC: K: 395s | 00 01 02 03 04 05 06 07 08 09 0a 0b 0c 0d 0e 0f ................ 395s | XCBC: K1 395s | c3 52 80 57 54 23 7f 31 1a c0 ff f4 e3 e0 3e 78 .R.WT#.1......>x 395s | CONCATENATE_DATA_AND_BASE: 395s | target: EXTRACT_KEY_FROM_KEY 395s | base: base-key@0x55685bc944c0 (16-bytes, AES_KEY_GEN) 395s | params: 16-bytes@0x7ffff22a3bb0 395s | key-offset: 0, key-size: 16 395s | EXTRACT_KEY_FROM_KEY: 395s | target: AES_ECB 395s | flags: SIGN 395s | key_size: 16-bytes 395s | base: base-key@0x55685bc95de0 (32-bytes, EXTRACT_KEY_FROM_KEY) 395s | operation: FLAGS_ONLY 395s | params: 8-bytes@0x7ffff22a3b98 395s | Computing E[2] using K3 395s | XCBC: K3 395s | c1 a7 ab a1 a2 3a 94 06 58 07 a0 8c c8 ee d0 6e .....:..X......n 395s | XCBC: E[n-1] 395s | 1d 04 48 fa cf 4d 9c 6f 55 b9 93 da 09 80 3d b3 ..H..M.oU.....=. 395s | XCBC: M[n] 395s | 10 11 12 13 .... 395s | XCBC: M[n] 395s | 10 11 12 13 .... 395s | XCBC: M[n]:80...^E[n-1]^K3 395s | cc b2 f1 48 ed 77 08 69 0d be 33 56 c1 6e ed dd ...H.w.i..3V.n.. 395s | XCBC: MAC 395s | 47 f5 1b 45 64 96 62 15 b8 98 5c 63 05 5e d3 08 G..Ed.b...\c.^.. 395s | PRF chunk interface PRF AES_XCBC final length 16 395s | 47 f5 1b 45 64 96 62 15 b8 98 5c 63 05 5e d3 08 G..Ed.b...\c.^.. 395s | chunk output 395s | 47 f5 1b 45 64 96 62 15 b8 98 5c 63 05 5e d3 08 G..Ed.b...\c.^.. 395s | verify_bytes() RFC 3566 Test Case 4: AES-XCBC-MAC-96 with 20-byte input: prf OUT: ok 395s | CONCATENATE_DATA_AND_BASE: 395s | target: EXTRACT_KEY_FROM_KEY 395s | base: base-key@0x55685bc944c0 (16-bytes, AES_KEY_GEN) 395s | params: 16-bytes@0x7ffff22a3d80 395s | key-offset: 0, key-size: 16 395s | EXTRACT_KEY_FROM_KEY: 395s | target: EXTRACT_KEY_FROM_KEY 395s | key_size: 16-bytes 395s | base: base-key@0x55685bc981a0 (32-bytes, EXTRACT_KEY_FROM_KEY) 395s | operation: FLAGS_ONLY 395s | params: 8-bytes@0x7ffff22a3d18 395s | PRF symkey interface PRF AES_XCBC init key symkey-key@0x55685bc974d0 (size 16) 395s | PRF symkey interface: key symkey-key@0x55685bc974d0 (16-bytes, EXTRACT_KEY_FROM_KEY) 395s | XCBC: Key 16=16 just right 395s | key-offset: 0, key-size: 16 395s | EXTRACT_KEY_FROM_KEY: 395s | target: AES_ECB 395s | flags: SIGN 395s | key_size: 16-bytes 395s | base: base-key@0x55685bc974d0 (16-bytes, EXTRACT_KEY_FROM_KEY) 395s | operation: FLAGS_ONLY 395s | params: 8-bytes@0x7ffff22a3c88 395s | PRF symkey interface PRF AES_XCBC 0x55685bc94460 395s | CONCATENATE_DATA_AND_BASE: 395s | target: EXTRACT_KEY_FROM_KEY 395s | base: base-key@0x55685bc944c0 (16-bytes, AES_KEY_GEN) 395s | params: 16-bytes@0x7ffff22a3d80 395s | key-offset: 0, key-size: 20 395s | EXTRACT_KEY_FROM_KEY: 395s | target: EXTRACT_KEY_FROM_KEY 395s | key_size: 20-bytes 395s | base: base-key@0x55685bc984e0 (36-bytes, EXTRACT_KEY_FROM_KEY) 395s | operation: FLAGS_ONLY 395s | params: 8-bytes@0x7ffff22a3d18 395s | PRF symkey interface PRF AES_XCBC update symkey message-key@0x55685bc95de0 (size 20) 395s | PRF symkey interface: symkey message-key@0x55685bc95de0 (20-bytes, EXTRACT_KEY_FROM_KEY) 395s | symkey message extracting all 20 bytes of key@0x55685bc95de0 395s | symkey message: symkey-key@0x55685bc95de0 (20-bytes, EXTRACT_KEY_FROM_KEY) 395s | sizeof bytes 32 395s | wrapper: (SECItemType)-232113904: 4c fe 7f c5 ad d7 9f b4 e0 cf 64 4d 6b e6 15 dc 2f f2 1b 58 a6 ac 10 38 99 a5 1f 80 26 48 1a e3 395s | symkey message extracted len 32 bytes at 0x55685bc97d80 395s | unwrapped: 395s | 00 01 02 03 04 05 06 07 08 09 0a 0b 0c 0d 0e 0f ................ 395s | 10 11 12 13 00 00 00 00 00 00 00 00 00 00 00 00 ................ 395s | XCBC: data 395s | 00 01 02 03 04 05 06 07 08 09 0a 0b 0c 0d 0e 0f ................ 395s | 10 11 12 13 .... 395s | K extracting all 16 bytes of key@0x55685bc981a0 395s | K: symkey-key@0x55685bc981a0 (16-bytes, AES_ECB) 395s | sizeof bytes 16 395s | wrapper: (SECItemType)-232114112: 4c fe 7f c5 ad d7 9f b4 e0 cf 64 4d 6b e6 15 dc 395s | K extracted len 16 bytes at 0x55685bc97820 395s | unwrapped: 395s | 00 01 02 03 04 05 06 07 08 09 0a 0b 0c 0d 0e 0f ................ 395s | XCBC: K: 395s | 00 01 02 03 04 05 06 07 08 09 0a 0b 0c 0d 0e 0f ................ 395s | XCBC: K1 395s | c3 52 80 57 54 23 7f 31 1a c0 ff f4 e3 e0 3e 78 .R.WT#.1......>x 395s | CONCATENATE_DATA_AND_BASE: 395s | target: EXTRACT_KEY_FROM_KEY 395s | base: base-key@0x55685bc944c0 (16-bytes, AES_KEY_GEN) 395s | params: 16-bytes@0x7ffff22a3c00 395s | key-offset: 0, key-size: 16 395s | EXTRACT_KEY_FROM_KEY: 395s | target: AES_ECB 395s | flags: SIGN 395s | key_size: 16-bytes 395s | base: base-key@0x55685bc98840 (32-bytes, EXTRACT_KEY_FROM_KEY) 395s | operation: FLAGS_ONLY 395s | params: 8-bytes@0x7ffff22a3be8 395s | Computing E[2] using K3 395s | XCBC: K3 395s | c1 a7 ab a1 a2 3a 94 06 58 07 a0 8c c8 ee d0 6e .....:..X......n 395s | XCBC: E[n-1] 395s | 1d 04 48 fa cf 4d 9c 6f 55 b9 93 da 09 80 3d b3 ..H..M.oU.....=. 395s | XCBC: M[n] 395s | 10 11 12 13 .... 395s | XCBC: M[n] 395s | 10 11 12 13 .... 395s | XCBC: M[n]:80...^E[n-1]^K3 395s | cc b2 f1 48 ed 77 08 69 0d be 33 56 c1 6e ed dd ...H.w.i..3V.n.. 395s | XCBC: MAC 395s | 47 f5 1b 45 64 96 62 15 b8 98 5c 63 05 5e d3 08 G..Ed.b...\c.^.. 395s | CONCATENATE_DATA_AND_BASE: 395s | target: EXTRACT_KEY_FROM_KEY 395s | base: base-key@0x55685bc944c0 (16-bytes, AES_KEY_GEN) 395s | params: 16-bytes@0x7ffff22a3d10 395s | key-offset: 0, key-size: 16 395s | EXTRACT_KEY_FROM_KEY: 395s | target: EXTRACT_KEY_FROM_KEY 395s | key_size: 16-bytes 395s | base: base-key@0x55685bc98840 (32-bytes, EXTRACT_KEY_FROM_KEY) 395s | operation: FLAGS_ONLY 395s | params: 8-bytes@0x7ffff22a3ca8 395s | PRF symkey interface PRF AES_XCBC final-key@0x55685bc984e0 (size 16) 395s | PRF symkey interface: key-key@0x55685bc984e0 (16-bytes, EXTRACT_KEY_FROM_KEY) 395s | output: symkey-key@0x55685bc984e0 (16-bytes, EXTRACT_KEY_FROM_KEY) 395s | RFC 3566 Test Case 4: AES-XCBC-MAC-96 with 20-byte input extracting all 16 bytes of key@0x55685bc984e0 395s | RFC 3566 Test Case 4: AES-XCBC-MAC-96 with 20-byte input: symkey-key@0x55685bc984e0 (16-bytes, EXTRACT_KEY_FROM_KEY) 395s | sizeof bytes 16 395s | wrapper: (SECItemType)976: 6c 44 c8 9c 36 6e bb 30 02 aa 69 80 e8 1b ce c4 395s | RFC 3566 Test Case 4: AES-XCBC-MAC-96 with 20-byte input extracted len 16 bytes at 0x55685bc97820 395s | unwrapped: 395s | 47 f5 1b 45 64 96 62 15 b8 98 5c 63 05 5e d3 08 G..Ed.b...\c.^.. 395s | verify_bytes() RFC 3566 Test Case 4: AES-XCBC-MAC-96 with 20-byte input: symkey: ok 395s ipsec algparse: RFC 3566 Test Case 5: AES-XCBC-MAC-96 with 32-byte input 395s | decode_to_chunk() test_prf_vector: input "0x000102030405060708090a0b0c0d0e0f" 395s | decode_to_chunk() output: 395s | 00 01 02 03 04 05 06 07 08 09 0a 0b 0c 0d 0e 0f ................ 395s | decode_to_chunk() test_prf_vector: input "0x000102030405060708090a0b0c0d0e0f101112131415161718191a1b1c1d1e1f" 395s | decode_to_chunk() output: 395s | 00 01 02 03 04 05 06 07 08 09 0a 0b 0c 0d 0e 0f ................ 395s | 10 11 12 13 14 15 16 17 18 19 1a 1b 1c 1d 1e 1f ................ 395s | decode_to_chunk() test_prf_vector: input "0xf54f0ec8d2b9f3d36807734bd5283fd4" 395s | decode_to_chunk() output: 395s | f5 4f 0e c8 d2 b9 f3 d3 68 07 73 4b d5 28 3f d4 .O......h.sK.(?. 395s | PRF chunk interface PRF AES_XCBC init key hunk 0x55685bc97800 (length 16) 395s | 00 01 02 03 04 05 06 07 08 09 0a 0b 0c 0d 0e 0f ................ 395s | CONCATENATE_DATA_AND_BASE: 395s | target: EXTRACT_KEY_FROM_KEY 395s | base: base-key@0x55685bc944c0 (16-bytes, AES_KEY_GEN) 395s | params: 16-bytes@0x7ffff22a3d00 395s | key-offset: 0, key-size: 16 395s | EXTRACT_KEY_FROM_KEY: 395s | target: EXTRACT_KEY_FROM_KEY 395s | key_size: 16-bytes 395s | base: base-key@0x55685bc974d0 (32-bytes, EXTRACT_KEY_FROM_KEY) 395s | operation: FLAGS_ONLY 395s | params: 8-bytes@0x7ffff22a3c98 395s | XCBC: Key 16=16 just right 395s | key-offset: 0, key-size: 16 395s | EXTRACT_KEY_FROM_KEY: 395s | target: AES_ECB 395s | flags: SIGN 395s | key_size: 16-bytes 395s | base: base-key@0x55685bc984e0 (16-bytes, EXTRACT_KEY_FROM_KEY) 395s | operation: FLAGS_ONLY 395s | params: 8-bytes@0x7ffff22a3c48 395s | PRF chunk interface PRF AES_XCBC 0x55685bc97d80 395s | PRF chunk interface PRF AES_XCBC update message (0x55685bc94460 length 32) 395s | 00 01 02 03 04 05 06 07 08 09 0a 0b 0c 0d 0e 0f ................ 395s | 10 11 12 13 14 15 16 17 18 19 1a 1b 1c 1d 1e 1f ................ 395s | XCBC: data 395s | 00 01 02 03 04 05 06 07 08 09 0a 0b 0c 0d 0e 0f ................ 395s | 10 11 12 13 14 15 16 17 18 19 1a 1b 1c 1d 1e 1f ................ 395s | K extracting all 16 bytes of key@0x55685bc974d0 395s | K: symkey-key@0x55685bc974d0 (16-bytes, AES_ECB) 395s | sizeof bytes 16 395s | wrapper: (SECItemType)543502624: 4c fe 7f c5 ad d7 9f b4 e0 cf 64 4d 6b e6 15 dc 395s | K extracted len 16 bytes at 0x55685bc94390 395s | unwrapped: 395s | 00 01 02 03 04 05 06 07 08 09 0a 0b 0c 0d 0e 0f ................ 395s | XCBC: K: 395s | 00 01 02 03 04 05 06 07 08 09 0a 0b 0c 0d 0e 0f ................ 395s | XCBC: K1 395s | c3 52 80 57 54 23 7f 31 1a c0 ff f4 e3 e0 3e 78 .R.WT#.1......>x 395s | CONCATENATE_DATA_AND_BASE: 395s | target: EXTRACT_KEY_FROM_KEY 395s | base: base-key@0x55685bc944c0 (16-bytes, AES_KEY_GEN) 395s | params: 16-bytes@0x7ffff22a3bb0 395s | key-offset: 0, key-size: 16 395s | EXTRACT_KEY_FROM_KEY: 395s | target: AES_ECB 395s | flags: SIGN 395s | key_size: 16-bytes 395s | base: base-key@0x55685bc95de0 (32-bytes, EXTRACT_KEY_FROM_KEY) 395s | operation: FLAGS_ONLY 395s | params: 8-bytes@0x7ffff22a3b98 395s | XCBC: Computing E[2] using K2 395s | XCBC: K2 395s | bd 86 2f fb 97 ad 2f b8 f8 b8 91 f6 03 2f 36 cb ../.../....../6. 395s | XCBC: E[n-1] 395s | 1d 04 48 fa cf 4d 9c 6f 55 b9 93 da 09 80 3d b3 ..H..M.oU.....=. 395s | XCBC: M[n] 395s | 10 11 12 13 14 15 16 17 18 19 1a 1b 1c 1d 1e 1f ................ 395s | XCBC: M[n]^E[n-1]^K2 395s | b0 93 75 12 4c f5 a5 c0 b5 18 18 37 16 b2 15 67 ..u.L......7...g 395s | XCBC: MAC 395s | f5 4f 0e c8 d2 b9 f3 d3 68 07 73 4b d5 28 3f d4 .O......h.sK.(?. 395s | PRF chunk interface PRF AES_XCBC final length 16 395s | f5 4f 0e c8 d2 b9 f3 d3 68 07 73 4b d5 28 3f d4 .O......h.sK.(?. 395s | chunk output 395s | f5 4f 0e c8 d2 b9 f3 d3 68 07 73 4b d5 28 3f d4 .O......h.sK.(?. 395s | verify_bytes() RFC 3566 Test Case 5: AES-XCBC-MAC-96 with 32-byte input: prf OUT: ok 395s | CONCATENATE_DATA_AND_BASE: 395s | target: EXTRACT_KEY_FROM_KEY 395s | base: base-key@0x55685bc944c0 (16-bytes, AES_KEY_GEN) 395s | params: 16-bytes@0x7ffff22a3d80 395s | key-offset: 0, key-size: 16 395s | EXTRACT_KEY_FROM_KEY: 395s | target: EXTRACT_KEY_FROM_KEY 395s | key_size: 16-bytes 395s | base: base-key@0x55685bc984e0 (32-bytes, EXTRACT_KEY_FROM_KEY) 395s | operation: FLAGS_ONLY 395s | params: 8-bytes@0x7ffff22a3d18 395s | PRF symkey interface PRF AES_XCBC init key symkey-key@0x55685bc974d0 (size 16) 395s | PRF symkey interface: key symkey-key@0x55685bc974d0 (16-bytes, EXTRACT_KEY_FROM_KEY) 395s | XCBC: Key 16=16 just right 395s | key-offset: 0, key-size: 16 395s | EXTRACT_KEY_FROM_KEY: 395s | target: AES_ECB 395s | flags: SIGN 395s | key_size: 16-bytes 395s | base: base-key@0x55685bc974d0 (16-bytes, EXTRACT_KEY_FROM_KEY) 395s | operation: FLAGS_ONLY 395s | params: 8-bytes@0x7ffff22a3c88 395s | PRF symkey interface PRF AES_XCBC 0x55685bc97d80 395s | CONCATENATE_DATA_AND_BASE: 395s | target: EXTRACT_KEY_FROM_KEY 395s | base: base-key@0x55685bc944c0 (16-bytes, AES_KEY_GEN) 395s | params: 16-bytes@0x7ffff22a3d80 395s | key-offset: 0, key-size: 32 395s | EXTRACT_KEY_FROM_KEY: 395s | target: EXTRACT_KEY_FROM_KEY 395s | key_size: 32-bytes 395s | base: base-key@0x55685bc981a0 (48-bytes, EXTRACT_KEY_FROM_KEY) 395s | operation: FLAGS_ONLY 395s | params: 8-bytes@0x7ffff22a3d18 395s | PRF symkey interface PRF AES_XCBC update symkey message-key@0x55685bc95de0 (size 32) 395s | PRF symkey interface: symkey message-key@0x55685bc95de0 (32-bytes, EXTRACT_KEY_FROM_KEY) 395s | symkey message extracting all 32 bytes of key@0x55685bc95de0 395s | symkey message: symkey-key@0x55685bc95de0 (32-bytes, EXTRACT_KEY_FROM_KEY) 395s | sizeof bytes 32 395s | wrapper: (SECItemType)-232113904: 4c fe 7f c5 ad d7 9f b4 e0 cf 64 4d 6b e6 15 dc ca a6 b6 6d 97 63 10 c1 77 3b 96 e5 1f 99 90 05 395s | symkey message extracted len 32 bytes at 0x55685bc98b00 395s | unwrapped: 395s | 00 01 02 03 04 05 06 07 08 09 0a 0b 0c 0d 0e 0f ................ 395s | 10 11 12 13 14 15 16 17 18 19 1a 1b 1c 1d 1e 1f ................ 395s | XCBC: data 395s | 00 01 02 03 04 05 06 07 08 09 0a 0b 0c 0d 0e 0f ................ 395s | 10 11 12 13 14 15 16 17 18 19 1a 1b 1c 1d 1e 1f ................ 395s | K extracting all 16 bytes of key@0x55685bc984e0 395s | K: symkey-key@0x55685bc984e0 (16-bytes, AES_ECB) 395s | sizeof bytes 16 395s | wrapper: (SECItemType)-232114112: 4c fe 7f c5 ad d7 9f b4 e0 cf 64 4d 6b e6 15 dc 395s | K extracted len 16 bytes at 0x55685bc98010 395s | unwrapped: 395s | 00 01 02 03 04 05 06 07 08 09 0a 0b 0c 0d 0e 0f ................ 395s | XCBC: K: 395s | 00 01 02 03 04 05 06 07 08 09 0a 0b 0c 0d 0e 0f ................ 395s | XCBC: K1 395s | c3 52 80 57 54 23 7f 31 1a c0 ff f4 e3 e0 3e 78 .R.WT#.1......>x 395s | CONCATENATE_DATA_AND_BASE: 395s | target: EXTRACT_KEY_FROM_KEY 395s | base: base-key@0x55685bc944c0 (16-bytes, AES_KEY_GEN) 395s | params: 16-bytes@0x7ffff22a3c00 395s | key-offset: 0, key-size: 16 395s | EXTRACT_KEY_FROM_KEY: 395s | target: AES_ECB 395s | flags: SIGN 395s | key_size: 16-bytes 395s | base: base-key@0x55685bc98840 (32-bytes, EXTRACT_KEY_FROM_KEY) 395s | operation: FLAGS_ONLY 395s | params: 8-bytes@0x7ffff22a3be8 395s | XCBC: Computing E[2] using K2 395s | XCBC: K2 395s | bd 86 2f fb 97 ad 2f b8 f8 b8 91 f6 03 2f 36 cb ../.../....../6. 395s | XCBC: E[n-1] 395s | 1d 04 48 fa cf 4d 9c 6f 55 b9 93 da 09 80 3d b3 ..H..M.oU.....=. 395s | XCBC: M[n] 395s | 10 11 12 13 14 15 16 17 18 19 1a 1b 1c 1d 1e 1f ................ 395s | XCBC: M[n]^E[n-1]^K2 395s | b0 93 75 12 4c f5 a5 c0 b5 18 18 37 16 b2 15 67 ..u.L......7...g 395s | XCBC: MAC 395s | f5 4f 0e c8 d2 b9 f3 d3 68 07 73 4b d5 28 3f d4 .O......h.sK.(?. 395s | CONCATENATE_DATA_AND_BASE: 395s | target: EXTRACT_KEY_FROM_KEY 395s | base: base-key@0x55685bc944c0 (16-bytes, AES_KEY_GEN) 395s | params: 16-bytes@0x7ffff22a3d10 395s | key-offset: 0, key-size: 16 395s | EXTRACT_KEY_FROM_KEY: 395s | target: EXTRACT_KEY_FROM_KEY 395s | key_size: 16-bytes 395s | base: base-key@0x55685bc98840 (32-bytes, EXTRACT_KEY_FROM_KEY) 395s | operation: FLAGS_ONLY 395s | params: 8-bytes@0x7ffff22a3ca8 395s | PRF symkey interface PRF AES_XCBC final-key@0x55685bc981a0 (size 16) 395s | PRF symkey interface: key-key@0x55685bc981a0 (16-bytes, EXTRACT_KEY_FROM_KEY) 395s | output: symkey-key@0x55685bc981a0 (16-bytes, EXTRACT_KEY_FROM_KEY) 395s | RFC 3566 Test Case 5: AES-XCBC-MAC-96 with 32-byte input extracting all 16 bytes of key@0x55685bc981a0 395s | RFC 3566 Test Case 5: AES-XCBC-MAC-96 with 32-byte input: symkey-key@0x55685bc981a0 (16-bytes, EXTRACT_KEY_FROM_KEY) 395s | sizeof bytes 16 395s | wrapper: (SECItemType)976: 4e 5b 85 ba 1a 41 46 2b 0d f1 ce da c5 ae 29 42 395s | RFC 3566 Test Case 5: AES-XCBC-MAC-96 with 32-byte input extracted len 16 bytes at 0x55685bc97b10 395s | unwrapped: 395s | f5 4f 0e c8 d2 b9 f3 d3 68 07 73 4b d5 28 3f d4 .O......h.sK.(?. 395s | verify_bytes() RFC 3566 Test Case 5: AES-XCBC-MAC-96 with 32-byte input: symkey: ok 395s ipsec algparse: RFC 3566 Test Case 6: AES-XCBC-MAC-96 with 34-byte input 395s | decode_to_chunk() test_prf_vector: input "0x000102030405060708090a0b0c0d0e0f" 395s | decode_to_chunk() output: 395s | 00 01 02 03 04 05 06 07 08 09 0a 0b 0c 0d 0e 0f ................ 395s | decode_to_chunk() test_prf_vector: input "0x000102030405060708090a0b0c0d0e0f101112131415161718191a1b1c1d1e1f2021" 395s | decode_to_chunk() output: 395s | 00 01 02 03 04 05 06 07 08 09 0a 0b 0c 0d 0e 0f ................ 395s | 10 11 12 13 14 15 16 17 18 19 1a 1b 1c 1d 1e 1f ................ 395s | 20 21 ! 395s | decode_to_chunk() test_prf_vector: input "0xbecbb3bccdb518a30677d5481fb6b4d8" 395s | decode_to_chunk() output: 395s | be cb b3 bc cd b5 18 a3 06 77 d5 48 1f b6 b4 d8 .........w.H.... 395s | PRF chunk interface PRF AES_XCBC init key hunk 0x55685bc95d10 (length 16) 395s | 00 01 02 03 04 05 06 07 08 09 0a 0b 0c 0d 0e 0f ................ 395s | CONCATENATE_DATA_AND_BASE: 395s | target: EXTRACT_KEY_FROM_KEY 395s | base: base-key@0x55685bc944c0 (16-bytes, AES_KEY_GEN) 395s | params: 16-bytes@0x7ffff22a3d00 395s | key-offset: 0, key-size: 16 395s | EXTRACT_KEY_FROM_KEY: 395s | target: EXTRACT_KEY_FROM_KEY 395s | key_size: 16-bytes 395s | base: base-key@0x55685bc974d0 (32-bytes, EXTRACT_KEY_FROM_KEY) 395s | operation: FLAGS_ONLY 395s | params: 8-bytes@0x7ffff22a3c98 395s | XCBC: Key 16=16 just right 395s | key-offset: 0, key-size: 16 395s | EXTRACT_KEY_FROM_KEY: 395s | target: AES_ECB 395s | flags: SIGN 395s | key_size: 16-bytes 395s | base: base-key@0x55685bc981a0 (16-bytes, EXTRACT_KEY_FROM_KEY) 395s | operation: FLAGS_ONLY 395s | params: 8-bytes@0x7ffff22a3c48 395s | PRF chunk interface PRF AES_XCBC 0x55685bc94460 395s | PRF chunk interface PRF AES_XCBC update message (0x55685bc94490 length 34) 395s | 00 01 02 03 04 05 06 07 08 09 0a 0b 0c 0d 0e 0f ................ 395s | 10 11 12 13 14 15 16 17 18 19 1a 1b 1c 1d 1e 1f ................ 395s | 20 21 ! 395s | XCBC: data 395s | 00 01 02 03 04 05 06 07 08 09 0a 0b 0c 0d 0e 0f ................ 395s | 10 11 12 13 14 15 16 17 18 19 1a 1b 1c 1d 1e 1f ................ 395s | 20 21 ! 395s | K extracting all 16 bytes of key@0x55685bc974d0 395s | K: symkey-key@0x55685bc974d0 (16-bytes, AES_ECB) 395s | sizeof bytes 16 395s | wrapper: (SECItemType)538976288: 4c fe 7f c5 ad d7 9f b4 e0 cf 64 4d 6b e6 15 dc 395s | K extracted len 16 bytes at 0x55685bc98010 395s | unwrapped: 395s | 00 01 02 03 04 05 06 07 08 09 0a 0b 0c 0d 0e 0f ................ 395s | XCBC: K: 395s | 00 01 02 03 04 05 06 07 08 09 0a 0b 0c 0d 0e 0f ................ 395s | XCBC: K1 395s | c3 52 80 57 54 23 7f 31 1a c0 ff f4 e3 e0 3e 78 .R.WT#.1......>x 395s | CONCATENATE_DATA_AND_BASE: 395s | target: EXTRACT_KEY_FROM_KEY 395s | base: base-key@0x55685bc944c0 (16-bytes, AES_KEY_GEN) 395s | params: 16-bytes@0x7ffff22a3bb0 395s | key-offset: 0, key-size: 16 395s | EXTRACT_KEY_FROM_KEY: 395s | target: AES_ECB 395s | flags: SIGN 395s | key_size: 16-bytes 395s | base: base-key@0x55685bc95de0 (32-bytes, EXTRACT_KEY_FROM_KEY) 395s | operation: FLAGS_ONLY 395s | params: 8-bytes@0x7ffff22a3b98 395s | Computing E[3] using K3 395s | XCBC: K3 395s | c1 a7 ab a1 a2 3a 94 06 58 07 a0 8c c8 ee d0 6e .....:..X......n 395s | XCBC: E[n-1] 395s | 09 02 5e 5a 67 25 20 72 44 14 5c 6b 80 66 85 79 ..^Zg% rD.\k.f.y 395s | XCBC: M[n] 395s | 20 21 ! 395s | XCBC: M[n] 395s | 20 21 ! 395s | XCBC: M[n]:80...^E[n-1]^K3 395s | e8 84 75 fb c5 1f b4 74 1c 13 fc e7 48 88 55 17 ..u....t....H.U. 395s | XCBC: MAC 395s | be cb b3 bc cd b5 18 a3 06 77 d5 48 1f b6 b4 d8 .........w.H.... 395s | PRF chunk interface PRF AES_XCBC final length 16 395s | be cb b3 bc cd b5 18 a3 06 77 d5 48 1f b6 b4 d8 .........w.H.... 395s | chunk output 395s | be cb b3 bc cd b5 18 a3 06 77 d5 48 1f b6 b4 d8 .........w.H.... 395s | verify_bytes() RFC 3566 Test Case 6: AES-XCBC-MAC-96 with 34-byte input: prf OUT: ok 395s | CONCATENATE_DATA_AND_BASE: 395s | target: EXTRACT_KEY_FROM_KEY 395s | base: base-key@0x55685bc944c0 (16-bytes, AES_KEY_GEN) 395s | params: 16-bytes@0x7ffff22a3d80 395s | key-offset: 0, key-size: 16 395s | EXTRACT_KEY_FROM_KEY: 395s | target: EXTRACT_KEY_FROM_KEY 395s | key_size: 16-bytes 395s | base: base-key@0x55685bc981a0 (32-bytes, EXTRACT_KEY_FROM_KEY) 395s | operation: FLAGS_ONLY 395s | params: 8-bytes@0x7ffff22a3d18 395s | PRF symkey interface PRF AES_XCBC init key symkey-key@0x55685bc974d0 (size 16) 395s | PRF symkey interface: key symkey-key@0x55685bc974d0 (16-bytes, EXTRACT_KEY_FROM_KEY) 395s | XCBC: Key 16=16 just right 395s | key-offset: 0, key-size: 16 395s | EXTRACT_KEY_FROM_KEY: 395s | target: AES_ECB 395s | flags: SIGN 395s | key_size: 16-bytes 395s | base: base-key@0x55685bc974d0 (16-bytes, EXTRACT_KEY_FROM_KEY) 395s | operation: FLAGS_ONLY 395s | params: 8-bytes@0x7ffff22a3c88 395s | PRF symkey interface PRF AES_XCBC 0x55685bc94460 395s | CONCATENATE_DATA_AND_BASE: 395s | target: EXTRACT_KEY_FROM_KEY 395s | base: base-key@0x55685bc944c0 (16-bytes, AES_KEY_GEN) 395s | params: 16-bytes@0x7ffff22a3d80 395s | key-offset: 0, key-size: 34 395s | EXTRACT_KEY_FROM_KEY: 395s | target: EXTRACT_KEY_FROM_KEY 395s | key_size: 34-bytes 395s | base: base-key@0x55685bc984e0 (50-bytes, EXTRACT_KEY_FROM_KEY) 395s | operation: FLAGS_ONLY 395s | params: 8-bytes@0x7ffff22a3d18 395s | PRF symkey interface PRF AES_XCBC update symkey message-key@0x55685bc95de0 (size 34) 395s | PRF symkey interface: symkey message-key@0x55685bc95de0 (34-bytes, EXTRACT_KEY_FROM_KEY) 395s | symkey message extracting all 34 bytes of key@0x55685bc95de0 395s | symkey message: symkey-key@0x55685bc95de0 (34-bytes, EXTRACT_KEY_FROM_KEY) 395s | sizeof bytes 48 395s | wrapper: (SECItemType)-232113904: 4c fe 7f c5 ad d7 9f b4 e0 cf 64 4d 6b e6 15 dc ca a6 b6 6d 97 63 10 c1 77 3b 96 e5 1f 99 90 05 3f 2f b9 74 c2 82 16 00 81 9c 7c 79 b1 e6 5a ea 395s | symkey message extracted len 48 bytes at 0x55685bc97b30 395s | unwrapped: 395s | 00 01 02 03 04 05 06 07 08 09 0a 0b 0c 0d 0e 0f ................ 395s | 10 11 12 13 14 15 16 17 18 19 1a 1b 1c 1d 1e 1f ................ 395s | 20 21 00 00 00 00 00 00 00 00 00 00 00 00 00 00 !.............. 395s | XCBC: data 395s | 00 01 02 03 04 05 06 07 08 09 0a 0b 0c 0d 0e 0f ................ 395s | 10 11 12 13 14 15 16 17 18 19 1a 1b 1c 1d 1e 1f ................ 395s | 20 21 ! 395s | K extracting all 16 bytes of key@0x55685bc981a0 395s | K: symkey-key@0x55685bc981a0 (16-bytes, AES_ECB) 395s | sizeof bytes 16 395s | wrapper: (SECItemType)-232114112: 4c fe 7f c5 ad d7 9f b4 e0 cf 64 4d 6b e6 15 dc 395s | K extracted len 16 bytes at 0x55685bc94390 395s | unwrapped: 395s | 00 01 02 03 04 05 06 07 08 09 0a 0b 0c 0d 0e 0f ................ 395s | XCBC: K: 395s | 00 01 02 03 04 05 06 07 08 09 0a 0b 0c 0d 0e 0f ................ 395s | XCBC: K1 395s | c3 52 80 57 54 23 7f 31 1a c0 ff f4 e3 e0 3e 78 .R.WT#.1......>x 395s | CONCATENATE_DATA_AND_BASE: 395s | target: EXTRACT_KEY_FROM_KEY 395s | base: base-key@0x55685bc944c0 (16-bytes, AES_KEY_GEN) 395s | params: 16-bytes@0x7ffff22a3c00 395s | key-offset: 0, key-size: 16 395s | EXTRACT_KEY_FROM_KEY: 395s | target: AES_ECB 395s | flags: SIGN 395s | key_size: 16-bytes 395s | base: base-key@0x55685bc98840 (32-bytes, EXTRACT_KEY_FROM_KEY) 395s | operation: FLAGS_ONLY 395s | params: 8-bytes@0x7ffff22a3be8 395s | Computing E[3] using K3 395s | XCBC: K3 395s | c1 a7 ab a1 a2 3a 94 06 58 07 a0 8c c8 ee d0 6e .....:..X......n 395s | XCBC: E[n-1] 395s | 09 02 5e 5a 67 25 20 72 44 14 5c 6b 80 66 85 79 ..^Zg% rD.\k.f.y 395s | XCBC: M[n] 395s | 20 21 ! 395s | XCBC: M[n] 395s | 20 21 ! 395s | XCBC: M[n]:80...^E[n-1]^K3 395s | e8 84 75 fb c5 1f b4 74 1c 13 fc e7 48 88 55 17 ..u....t....H.U. 395s | XCBC: MAC 395s | be cb b3 bc cd b5 18 a3 06 77 d5 48 1f b6 b4 d8 .........w.H.... 395s | CONCATENATE_DATA_AND_BASE: 395s | target: EXTRACT_KEY_FROM_KEY 395s | base: base-key@0x55685bc944c0 (16-bytes, AES_KEY_GEN) 395s | params: 16-bytes@0x7ffff22a3d10 395s | key-offset: 0, key-size: 16 395s | EXTRACT_KEY_FROM_KEY: 395s | target: EXTRACT_KEY_FROM_KEY 395s | key_size: 16-bytes 395s | base: base-key@0x55685bc98840 (32-bytes, EXTRACT_KEY_FROM_KEY) 395s | operation: FLAGS_ONLY 395s | params: 8-bytes@0x7ffff22a3ca8 395s | PRF symkey interface PRF AES_XCBC final-key@0x55685bc984e0 (size 16) 395s | PRF symkey interface: key-key@0x55685bc984e0 (16-bytes, EXTRACT_KEY_FROM_KEY) 395s | output: symkey-key@0x55685bc984e0 (16-bytes, EXTRACT_KEY_FROM_KEY) 395s | RFC 3566 Test Case 6: AES-XCBC-MAC-96 with 34-byte input extracting all 16 bytes of key@0x55685bc984e0 395s | RFC 3566 Test Case 6: AES-XCBC-MAC-96 with 34-byte input: symkey-key@0x55685bc984e0 (16-bytes, EXTRACT_KEY_FROM_KEY) 395s | sizeof bytes 16 395s | wrapper: (SECItemType)976: d7 e9 cb f4 0c d5 3d 78 e4 2f 2e bd 78 fc 80 d9 395s | RFC 3566 Test Case 6: AES-XCBC-MAC-96 with 34-byte input extracted len 16 bytes at 0x55685bc97700 395s | unwrapped: 395s | be cb b3 bc cd b5 18 a3 06 77 d5 48 1f b6 b4 d8 .........w.H.... 395s | verify_bytes() RFC 3566 Test Case 6: AES-XCBC-MAC-96 with 34-byte input: symkey: ok 395s ipsec algparse: RFC 3566 Test Case 7: AES-XCBC-MAC-96 with 1000-byte input 395s | decode_to_chunk() test_prf_vector: input "0x000102030405060708090a0b0c0d0e0f" 395s | decode_to_chunk() output: 395s | 00 01 02 03 04 05 06 07 08 09 0a 0b 0c 0d 0e 0f ................ 395s | decode_to_chunk() test_prf_vector: input "0xf0dafee895db30253761103b5d84528f" 395s | decode_to_chunk() output: 395s | f0 da fe e8 95 db 30 25 37 61 10 3b 5d 84 52 8f ......0%7a.;].R. 395s | PRF chunk interface PRF AES_XCBC init key hunk 0x55685bc97820 (length 16) 395s | 00 01 02 03 04 05 06 07 08 09 0a 0b 0c 0d 0e 0f ................ 395s | CONCATENATE_DATA_AND_BASE: 395s | target: EXTRACT_KEY_FROM_KEY 395s | base: base-key@0x55685bc944c0 (16-bytes, AES_KEY_GEN) 395s | params: 16-bytes@0x7ffff22a3d00 395s | key-offset: 0, key-size: 16 395s | EXTRACT_KEY_FROM_KEY: 395s | target: EXTRACT_KEY_FROM_KEY 395s | key_size: 16-bytes 395s | base: base-key@0x55685bc974d0 (32-bytes, EXTRACT_KEY_FROM_KEY) 395s | operation: FLAGS_ONLY 395s | params: 8-bytes@0x7ffff22a3c98 395s | XCBC: Key 16=16 just right 395s | key-offset: 0, key-size: 16 395s | EXTRACT_KEY_FROM_KEY: 395s | target: AES_ECB 395s | flags: SIGN 395s | key_size: 16-bytes 395s | base: base-key@0x55685bc984e0 (16-bytes, EXTRACT_KEY_FROM_KEY) 395s | operation: FLAGS_ONLY 395s | params: 8-bytes@0x7ffff22a3c48 395s | PRF chunk interface PRF AES_XCBC 0x55685bc97d80 395s | PRF chunk interface PRF AES_XCBC update message (0x55685bc95f10 length 1000) 395s | 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................ 395s | 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................ 395s | 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................ 395s | 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................ 395s | 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................ 395s | 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................ 395s | 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................ 395s | 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................ 395s | 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................ 395s | 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................ 395s | 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................ 395s | 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................ 395s | 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................ 395s | 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................ 395s | 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................ 395s | 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................ 395s | 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................ 395s | 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................ 395s | 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................ 395s | 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................ 395s | 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................ 395s | 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................ 395s | 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................ 395s | 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................ 395s | 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................ 395s | 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................ 395s | 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................ 395s | 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................ 395s | 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................ 395s | 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................ 395s | 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................ 395s | 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................ 395s | 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................ 395s | 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................ 395s | 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................ 395s | 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................ 395s | 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................ 395s | 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................ 395s | 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................ 395s | 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................ 395s | 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................ 395s | 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................ 395s | 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................ 395s | 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................ 395s | 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................ 395s | 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................ 395s | 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................ 395s | 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................ 395s | 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................ 395s | 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................ 395s | 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................ 395s | 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................ 395s | 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................ 395s | 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................ 395s | 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................ 395s | 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................ 395s | 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................ 395s | 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................ 395s | 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................ 395s | 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................ 395s | 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................ 395s | 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................ 395s | 00 00 00 00 00 00 00 00 ........ 395s | XCBC: data 395s | 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................ 395s | 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................ 395s | 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................ 395s | 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................ 395s | 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................ 395s | 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................ 395s | 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................ 395s | 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................ 395s | 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................ 395s | 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................ 395s | 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................ 395s | 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................ 395s | 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................ 395s | 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................ 395s | 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................ 395s | 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................ 395s | 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................ 395s | 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................ 395s | 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................ 395s | 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................ 395s | 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................ 395s | 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................ 395s | 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................ 395s | 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................ 395s | 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................ 395s | 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................ 395s | 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................ 395s | 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................ 395s | 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................ 395s | 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................ 395s | 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................ 395s | 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................ 395s | 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................ 395s | 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................ 395s | 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................ 395s | 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................ 395s | 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................ 395s | 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................ 395s | 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................ 395s | 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................ 395s | 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................ 395s | 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................ 395s | 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................ 395s | 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................ 395s | 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................ 395s | 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................ 395s | 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................ 395s | 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................ 395s | 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................ 395s | 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................ 395s | 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................ 395s | 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................ 395s | 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................ 395s | 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................ 395s | 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................ 395s | 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................ 395s | 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................ 395s | 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................ 395s | 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................ 395s | 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................ 395s | 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................ 395s | 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................ 395s | 00 00 00 00 00 00 00 00 ........ 395s | K extracting all 16 bytes of key@0x55685bc974d0 395s | K: symkey-key@0x55685bc974d0 (16-bytes, AES_ECB) 395s | sizeof bytes 16 395s | wrapper: (SECItemType)538976288: 4c fe 7f c5 ad d7 9f b4 e0 cf 64 4d 6b e6 15 dc 395s | K extracted len 16 bytes at 0x55685bc94390 395s | unwrapped: 395s | 00 01 02 03 04 05 06 07 08 09 0a 0b 0c 0d 0e 0f ................ 395s | XCBC: K: 395s | 00 01 02 03 04 05 06 07 08 09 0a 0b 0c 0d 0e 0f ................ 395s | XCBC: K1 395s | c3 52 80 57 54 23 7f 31 1a c0 ff f4 e3 e0 3e 78 .R.WT#.1......>x 395s | CONCATENATE_DATA_AND_BASE: 395s | target: EXTRACT_KEY_FROM_KEY 395s | base: base-key@0x55685bc944c0 (16-bytes, AES_KEY_GEN) 395s | params: 16-bytes@0x7ffff22a3bb0 395s | key-offset: 0, key-size: 16 395s | EXTRACT_KEY_FROM_KEY: 395s | target: AES_ECB 395s | flags: SIGN 395s | key_size: 16-bytes 395s | base: base-key@0x55685bc95de0 (32-bytes, EXTRACT_KEY_FROM_KEY) 395s | operation: FLAGS_ONLY 395s | params: 8-bytes@0x7ffff22a3b98 395s | Computing E[63] using K3 395s | XCBC: K3 395s | c1 a7 ab a1 a2 3a 94 06 58 07 a0 8c c8 ee d0 6e .....:..X......n 395s | XCBC: E[n-1] 395s | 5c 88 af cc 1e 1e 83 fc c4 2c 0c e4 12 12 f5 17 \........,...... 395s | XCBC: M[n] 395s | 00 00 00 00 00 00 00 00 ........ 395s | XCBC: M[n] 395s | 00 00 00 00 00 00 00 00 ........ 395s | XCBC: M[n]:80...^E[n-1]^K3 395s | 9d 2f 04 6d bc 24 17 fa 1c 2b ac 68 da fc 25 79 ./.m.$...+.h..%y 395s | XCBC: MAC 395s | f0 da fe e8 95 db 30 25 37 61 10 3b 5d 84 52 8f ......0%7a.;].R. 395s | PRF chunk interface PRF AES_XCBC final length 16 395s | f0 da fe e8 95 db 30 25 37 61 10 3b 5d 84 52 8f ......0%7a.;].R. 395s | chunk output 395s | f0 da fe e8 95 db 30 25 37 61 10 3b 5d 84 52 8f ......0%7a.;].R. 395s | verify_bytes() RFC 3566 Test Case 7: AES-XCBC-MAC-96 with 1000-byte input: prf OUT: ok 395s | CONCATENATE_DATA_AND_BASE: 395s | target: EXTRACT_KEY_FROM_KEY 395s | base: base-key@0x55685bc944c0 (16-bytes, AES_KEY_GEN) 395s | params: 16-bytes@0x7ffff22a3d80 395s | key-offset: 0, key-size: 16 395s | EXTRACT_KEY_FROM_KEY: 395s | target: EXTRACT_KEY_FROM_KEY 395s | key_size: 16-bytes 395s | base: base-key@0x55685bc984e0 (32-bytes, EXTRACT_KEY_FROM_KEY) 395s | operation: FLAGS_ONLY 395s | params: 8-bytes@0x7ffff22a3d18 395s | PRF symkey interface PRF AES_XCBC init key symkey-key@0x55685bc974d0 (size 16) 395s | PRF symkey interface: key symkey-key@0x55685bc974d0 (16-bytes, EXTRACT_KEY_FROM_KEY) 395s | XCBC: Key 16=16 just right 395s | key-offset: 0, key-size: 16 395s | EXTRACT_KEY_FROM_KEY: 395s | target: AES_ECB 395s | flags: SIGN 395s | key_size: 16-bytes 395s | base: base-key@0x55685bc974d0 (16-bytes, EXTRACT_KEY_FROM_KEY) 395s | operation: FLAGS_ONLY 395s | params: 8-bytes@0x7ffff22a3c88 395s | PRF symkey interface PRF AES_XCBC 0x55685bc97d80 395s | CONCATENATE_DATA_AND_BASE: 395s | target: EXTRACT_KEY_FROM_KEY 395s | base: base-key@0x55685bc944c0 (16-bytes, AES_KEY_GEN) 395s | params: 16-bytes@0x7ffff22a3d80 395s | key-offset: 0, key-size: 1000 395s | EXTRACT_KEY_FROM_KEY: 395s | target: EXTRACT_KEY_FROM_KEY 395s | key_size: 1000-bytes 395s | base: base-key@0x55685bc981a0 (1016-bytes, EXTRACT_KEY_FROM_KEY) 395s | operation: FLAGS_ONLY 395s | params: 8-bytes@0x7ffff22a3d18 395s | PRF symkey interface PRF AES_XCBC update symkey message-key@0x55685bc95de0 (size 1000) 395s | PRF symkey interface: symkey message-key@0x55685bc95de0 (1000-bytes, EXTRACT_KEY_FROM_KEY) 395s | symkey message extracting all 1000 bytes of key@0x55685bc95de0 395s | symkey message: symkey-key@0x55685bc95de0 (1000-bytes, EXTRACT_KEY_FROM_KEY) 395s | sizeof bytes 1008 395s | wrapper: (SECItemType)-232113904: f8 29 55 23 7f 64 dd 8c f8 b2 8a 02 68 2e ca c1 f8 29 55 23 7f 64 dd 8c f8 b2 8a 02 68 2e ca c1 f8 29 55 23 7f 64 dd 8c f8 b2 8a 02 68 2e ca c1 f8 29 55 23 7f 64 dd 8c f8 b2 8a 02 68 2e ca c1 f8 29 55 23 7f 64 dd 8c f8 b2 8a 02 68 2e ca c1 f8 29 55 23 7f 64 dd 8c f8 b2 8a 02 68 2e ca c1 f8 29 55 23 7f 64 dd 8c f8 b2 8a 02 68 2e ca c1 f8 29 55 23 7f 64 dd 8c f8 b2 8a 02 68 2e ca c1 f8 29 55 23 7f 64 dd 8c f8 b2 8a 02 68 2e ca c1 f8 29 55 23 7f 64 dd 8c f8 b2 8a 02 68 2e ca c1 f8 29 55 23 7f 64 dd 8c f8 b2 8a 02 68 2e ca c1 f8 29 55 23 7f 64 dd 8c f8 b2 8a 02 68 2e ca c1 f8 29 55 23 7f 64 dd 8c f8 b2 8a 02 68 2e ca c1 f8 29 55 23 7f 64 dd 8c f8 b2 8a 02 68 2e ca c1 f8 29 55 23 7f 64 dd 8c f8 b2 8a 02 68 2e ca c1 f8 29 55 23 7f 64 dd 8c f8 b2 8a 02 68 2e ca c1 f8 29 55 23 7f 64 dd 8c f8 b2 8a 02 68 2e ca c1 f8 29 55 23 7f 64 dd 8c f8 b2 8a 02 68 2e ca c1 f8 29 55 23 7f 64 dd 8c f8 b2 8a 02 68 2e ca... 395s | symkey message extracted len 1008 bytes at 0x55685bc96af0 395s | unwrapped: 395s | 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................ 395s | 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................ 395s | 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................ 395s | 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................ 395s | 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................ 395s | 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................ 395s | 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................ 395s | 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................ 395s | 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................ 395s | 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................ 395s | 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................ 395s | 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................ 395s | 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................ 395s | 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................ 395s | 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................ 395s | 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................ 395s | 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................ 395s | 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................ 395s | 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................ 395s | 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................ 395s | 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................ 395s | 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................ 395s | 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................ 395s | 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................ 395s | 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................ 395s | 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................ 395s | 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................ 395s | 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................ 395s | 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................ 395s | 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................ 395s | 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................ 395s | 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................ 395s | 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................ 395s | 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................ 395s | 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................ 395s | 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................ 395s | 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................ 395s | 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................ 395s | 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................ 395s | 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................ 395s | 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................ 395s | 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................ 395s | 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................ 395s | 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................ 395s | 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................ 395s | 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................ 395s | 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................ 395s | 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................ 395s | 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................ 395s | 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................ 395s | 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................ 395s | 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................ 395s | 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................ 395s | 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................ 395s | 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................ 395s | 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................ 395s | 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................ 395s | 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................ 395s | 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................ 395s | 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................ 395s | 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................ 395s | 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................ 395s | 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................ 395s | XCBC: data 395s | 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................ 395s | 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................ 395s | 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................ 395s | 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................ 395s | 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................ 395s | 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................ 395s | 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................ 395s | 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................ 395s | 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................ 395s | 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................ 395s | 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................ 395s | 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................ 395s | 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................ 395s | 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................ 395s | 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................ 395s | 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................ 395s | 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................ 395s | 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................ 395s | 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................ 395s | 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................ 395s | 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................ 395s | 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................ 395s | 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................ 395s | 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................ 395s | 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................ 395s | 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................ 395s | 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................ 395s | 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................ 395s | 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................ 395s | 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................ 395s | 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................ 395s | 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................ 395s | 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................ 395s | 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................ 395s | 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................ 395s | 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................ 395s | 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................ 395s | 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................ 395s | 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................ 395s | 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................ 395s | 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................ 395s | 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................ 395s | 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................ 395s | 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................ 395s | 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................ 395s | 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................ 395s | 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................ 395s | 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................ 395s | 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................ 395s | 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................ 395s | 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................ 395s | 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................ 395s | 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................ 395s | 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................ 395s | 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................ 395s | 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................ 395s | 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................ 395s | 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................ 395s | 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................ 395s | 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................ 395s | 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................ 395s | 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................ 395s | 00 00 00 00 00 00 00 00 ........ 395s | K extracting all 16 bytes of key@0x55685bc984e0 395s | K: symkey-key@0x55685bc984e0 (16-bytes, AES_ECB) 395s | sizeof bytes 16 395s | wrapper: (SECItemType)-232114112: 4c fe 7f c5 ad d7 9f b4 e0 cf 64 4d 6b e6 15 dc 395s | K extracted len 16 bytes at 0x55685bc98010 395s | unwrapped: 395s | 00 01 02 03 04 05 06 07 08 09 0a 0b 0c 0d 0e 0f ................ 395s | XCBC: K: 395s | 00 01 02 03 04 05 06 07 08 09 0a 0b 0c 0d 0e 0f ................ 395s | XCBC: K1 395s | c3 52 80 57 54 23 7f 31 1a c0 ff f4 e3 e0 3e 78 .R.WT#.1......>x 395s | CONCATENATE_DATA_AND_BASE: 395s | target: EXTRACT_KEY_FROM_KEY 395s | base: base-key@0x55685bc944c0 (16-bytes, AES_KEY_GEN) 395s | params: 16-bytes@0x7ffff22a3c00 395s | key-offset: 0, key-size: 16 395s | EXTRACT_KEY_FROM_KEY: 395s | target: AES_ECB 395s | flags: SIGN 395s | key_size: 16-bytes 395s | base: base-key@0x55685bc98840 (32-bytes, EXTRACT_KEY_FROM_KEY) 395s | operation: FLAGS_ONLY 395s | params: 8-bytes@0x7ffff22a3be8 395s | Computing E[63] using K3 395s | XCBC: K3 395s | c1 a7 ab a1 a2 3a 94 06 58 07 a0 8c c8 ee d0 6e .....:..X......n 395s | XCBC: E[n-1] 395s | 5c 88 af cc 1e 1e 83 fc c4 2c 0c e4 12 12 f5 17 \........,...... 395s | XCBC: M[n] 395s | 00 00 00 00 00 00 00 00 ........ 395s | XCBC: M[n] 395s | 00 00 00 00 00 00 00 00 ........ 395s | XCBC: M[n]:80...^E[n-1]^K3 395s | 9d 2f 04 6d bc 24 17 fa 1c 2b ac 68 da fc 25 79 ./.m.$...+.h..%y 395s | XCBC: MAC 395s | f0 da fe e8 95 db 30 25 37 61 10 3b 5d 84 52 8f ......0%7a.;].R. 395s | CONCATENATE_DATA_AND_BASE: 395s | target: EXTRACT_KEY_FROM_KEY 395s | base: base-key@0x55685bc944c0 (16-bytes, AES_KEY_GEN) 395s | params: 16-bytes@0x7ffff22a3d10 395s | key-offset: 0, key-size: 16 395s | EXTRACT_KEY_FROM_KEY: 395s | target: EXTRACT_KEY_FROM_KEY 395s | key_size: 16-bytes 395s | base: base-key@0x55685bc98840 (32-bytes, EXTRACT_KEY_FROM_KEY) 395s | operation: FLAGS_ONLY 395s | params: 8-bytes@0x7ffff22a3ca8 395s | PRF symkey interface PRF AES_XCBC final-key@0x55685bc981a0 (size 16) 395s | PRF symkey interface: key-key@0x55685bc981a0 (16-bytes, EXTRACT_KEY_FROM_KEY) 395s | output: symkey-key@0x55685bc981a0 (16-bytes, EXTRACT_KEY_FROM_KEY) 395s | RFC 3566 Test Case 7: AES-XCBC-MAC-96 with 1000-byte input extracting all 16 bytes of key@0x55685bc981a0 395s | RFC 3566 Test Case 7: AES-XCBC-MAC-96 with 1000-byte input: symkey-key@0x55685bc981a0 (16-bytes, EXTRACT_KEY_FROM_KEY) 395s | sizeof bytes 16 395s | wrapper: (SECItemType)976: 96 a2 04 f5 56 56 13 eb 9d 15 18 e2 35 d8 af 8e 395s | RFC 3566 Test Case 7: AES-XCBC-MAC-96 with 1000-byte input extracted len 16 bytes at 0x55685bc97b10 395s | unwrapped: 395s | f0 da fe e8 95 db 30 25 37 61 10 3b 5d 84 52 8f ......0%7a.;].R. 395s | verify_bytes() RFC 3566 Test Case 7: AES-XCBC-MAC-96 with 1000-byte input: symkey: ok 395s ipsec algparse: RFC 4434 Test Case AES-XCBC-PRF-128 with 20-byte input (key length 16) 395s | decode_to_chunk() test_prf_vector: input "0x000102030405060708090a0b0c0d0e0f" 395s | decode_to_chunk() output: 395s | 00 01 02 03 04 05 06 07 08 09 0a 0b 0c 0d 0e 0f ................ 395s | decode_to_chunk() test_prf_vector: input "0x000102030405060708090a0b0c0d0e0f10111213" 395s | decode_to_chunk() output: 395s | 00 01 02 03 04 05 06 07 08 09 0a 0b 0c 0d 0e 0f ................ 395s | 10 11 12 13 .... 395s | decode_to_chunk() test_prf_vector: input "0x47f51b4564966215b8985c63055ed308" 395s | decode_to_chunk() output: 395s | 47 f5 1b 45 64 96 62 15 b8 98 5c 63 05 5e d3 08 G..Ed.b...\c.^.. 395s | PRF chunk interface PRF AES_XCBC init key hunk 0x55685bc97800 (length 16) 395s | 00 01 02 03 04 05 06 07 08 09 0a 0b 0c 0d 0e 0f ................ 395s | CONCATENATE_DATA_AND_BASE: 395s | target: EXTRACT_KEY_FROM_KEY 395s | base: base-key@0x55685bc944c0 (16-bytes, AES_KEY_GEN) 395s | params: 16-bytes@0x7ffff22a3d00 395s | key-offset: 0, key-size: 16 395s | EXTRACT_KEY_FROM_KEY: 395s | target: EXTRACT_KEY_FROM_KEY 395s | key_size: 16-bytes 395s | base: base-key@0x55685bc974d0 (32-bytes, EXTRACT_KEY_FROM_KEY) 395s | operation: FLAGS_ONLY 395s | params: 8-bytes@0x7ffff22a3c98 395s | XCBC: Key 16=16 just right 395s | key-offset: 0, key-size: 16 395s | EXTRACT_KEY_FROM_KEY: 395s | target: AES_ECB 395s | flags: SIGN 395s | key_size: 16-bytes 395s | base: base-key@0x55685bc981a0 (16-bytes, EXTRACT_KEY_FROM_KEY) 395s | operation: FLAGS_ONLY 395s | params: 8-bytes@0x7ffff22a3c48 395s | PRF chunk interface PRF AES_XCBC 0x55685bc97d80 395s | PRF chunk interface PRF AES_XCBC update message (0x55685bc95d10 length 20) 395s | 00 01 02 03 04 05 06 07 08 09 0a 0b 0c 0d 0e 0f ................ 395s | 10 11 12 13 .... 395s | XCBC: data 395s | 00 01 02 03 04 05 06 07 08 09 0a 0b 0c 0d 0e 0f ................ 395s | 10 11 12 13 .... 395s | K extracting all 16 bytes of key@0x55685bc974d0 395s | K: symkey-key@0x55685bc974d0 (16-bytes, AES_ECB) 395s | sizeof bytes 16 395s | wrapper: (SECItemType)538976288: 4c fe 7f c5 ad d7 9f b4 e0 cf 64 4d 6b e6 15 dc 395s | K extracted len 16 bytes at 0x55685bc98820 395s | unwrapped: 395s | 00 01 02 03 04 05 06 07 08 09 0a 0b 0c 0d 0e 0f ................ 395s | XCBC: K: 395s | 00 01 02 03 04 05 06 07 08 09 0a 0b 0c 0d 0e 0f ................ 395s | XCBC: K1 395s | c3 52 80 57 54 23 7f 31 1a c0 ff f4 e3 e0 3e 78 .R.WT#.1......>x 395s | CONCATENATE_DATA_AND_BASE: 395s | target: EXTRACT_KEY_FROM_KEY 395s | base: base-key@0x55685bc944c0 (16-bytes, AES_KEY_GEN) 395s | params: 16-bytes@0x7ffff22a3bb0 395s | key-offset: 0, key-size: 16 395s | EXTRACT_KEY_FROM_KEY: 395s | target: AES_ECB 395s | flags: SIGN 395s | key_size: 16-bytes 395s | base: base-key@0x55685bc95de0 (32-bytes, EXTRACT_KEY_FROM_KEY) 395s | operation: FLAGS_ONLY 395s | params: 8-bytes@0x7ffff22a3b98 395s | Computing E[2] using K3 395s | XCBC: K3 395s | c1 a7 ab a1 a2 3a 94 06 58 07 a0 8c c8 ee d0 6e .....:..X......n 395s | XCBC: E[n-1] 395s | 1d 04 48 fa cf 4d 9c 6f 55 b9 93 da 09 80 3d b3 ..H..M.oU.....=. 395s | XCBC: M[n] 395s | 10 11 12 13 .... 395s | XCBC: M[n] 395s | 10 11 12 13 .... 395s | XCBC: M[n]:80...^E[n-1]^K3 395s | cc b2 f1 48 ed 77 08 69 0d be 33 56 c1 6e ed dd ...H.w.i..3V.n.. 395s | XCBC: MAC 395s | 47 f5 1b 45 64 96 62 15 b8 98 5c 63 05 5e d3 08 G..Ed.b...\c.^.. 395s | PRF chunk interface PRF AES_XCBC final length 16 395s | 47 f5 1b 45 64 96 62 15 b8 98 5c 63 05 5e d3 08 G..Ed.b...\c.^.. 395s | chunk output 395s | 47 f5 1b 45 64 96 62 15 b8 98 5c 63 05 5e d3 08 G..Ed.b...\c.^.. 395s | verify_bytes() RFC 4434 Test Case AES-XCBC-PRF-128 with 20-byte input (key length 16): prf OUT: ok 395s | CONCATENATE_DATA_AND_BASE: 395s | target: EXTRACT_KEY_FROM_KEY 395s | base: base-key@0x55685bc944c0 (16-bytes, AES_KEY_GEN) 395s | params: 16-bytes@0x7ffff22a3d80 395s | key-offset: 0, key-size: 16 395s | EXTRACT_KEY_FROM_KEY: 395s | target: EXTRACT_KEY_FROM_KEY 395s | key_size: 16-bytes 395s | base: base-key@0x55685bc981a0 (32-bytes, EXTRACT_KEY_FROM_KEY) 395s | operation: FLAGS_ONLY 395s | params: 8-bytes@0x7ffff22a3d18 395s | PRF symkey interface PRF AES_XCBC init key symkey-key@0x55685bc974d0 (size 16) 395s | PRF symkey interface: key symkey-key@0x55685bc974d0 (16-bytes, EXTRACT_KEY_FROM_KEY) 395s | XCBC: Key 16=16 just right 395s | key-offset: 0, key-size: 16 395s | EXTRACT_KEY_FROM_KEY: 395s | target: AES_ECB 395s | flags: SIGN 395s | key_size: 16-bytes 395s | base: base-key@0x55685bc974d0 (16-bytes, EXTRACT_KEY_FROM_KEY) 395s | operation: FLAGS_ONLY 395s | params: 8-bytes@0x7ffff22a3c88 395s | PRF symkey interface PRF AES_XCBC 0x55685bc97d80 395s | CONCATENATE_DATA_AND_BASE: 395s | target: EXTRACT_KEY_FROM_KEY 395s | base: base-key@0x55685bc944c0 (16-bytes, AES_KEY_GEN) 395s | params: 16-bytes@0x7ffff22a3d80 395s | key-offset: 0, key-size: 20 395s | EXTRACT_KEY_FROM_KEY: 395s | target: EXTRACT_KEY_FROM_KEY 395s | key_size: 20-bytes 395s | base: base-key@0x55685bc984e0 (36-bytes, EXTRACT_KEY_FROM_KEY) 395s | operation: FLAGS_ONLY 395s | params: 8-bytes@0x7ffff22a3d18 395s | PRF symkey interface PRF AES_XCBC update symkey message-key@0x55685bc95de0 (size 20) 395s | PRF symkey interface: symkey message-key@0x55685bc95de0 (20-bytes, EXTRACT_KEY_FROM_KEY) 395s | symkey message extracting all 20 bytes of key@0x55685bc95de0 395s | symkey message: symkey-key@0x55685bc95de0 (20-bytes, EXTRACT_KEY_FROM_KEY) 395s | sizeof bytes 32 395s | wrapper: (SECItemType)-232113904: 4c fe 7f c5 ad d7 9f b4 e0 cf 64 4d 6b e6 15 dc 2f f2 1b 58 a6 ac 10 38 99 a5 1f 80 26 48 1a e3 395s | symkey message extracted len 32 bytes at 0x55685bc94460 395s | unwrapped: 395s | 00 01 02 03 04 05 06 07 08 09 0a 0b 0c 0d 0e 0f ................ 395s | 10 11 12 13 00 00 00 00 00 00 00 00 00 00 00 00 ................ 395s | XCBC: data 395s | 00 01 02 03 04 05 06 07 08 09 0a 0b 0c 0d 0e 0f ................ 395s | 10 11 12 13 .... 395s | K extracting all 16 bytes of key@0x55685bc981a0 395s | K: symkey-key@0x55685bc981a0 (16-bytes, AES_ECB) 395s | sizeof bytes 16 395s | wrapper: (SECItemType)-232114112: 4c fe 7f c5 ad d7 9f b4 e0 cf 64 4d 6b e6 15 dc 395s | K extracted len 16 bytes at 0x55685bc94390 395s | unwrapped: 395s | 00 01 02 03 04 05 06 07 08 09 0a 0b 0c 0d 0e 0f ................ 395s | XCBC: K: 395s | 00 01 02 03 04 05 06 07 08 09 0a 0b 0c 0d 0e 0f ................ 395s | XCBC: K1 395s | c3 52 80 57 54 23 7f 31 1a c0 ff f4 e3 e0 3e 78 .R.WT#.1......>x 395s | CONCATENATE_DATA_AND_BASE: 395s | target: EXTRACT_KEY_FROM_KEY 395s | base: base-key@0x55685bc944c0 (16-bytes, AES_KEY_GEN) 395s | params: 16-bytes@0x7ffff22a3c00 395s | key-offset: 0, key-size: 16 395s | EXTRACT_KEY_FROM_KEY: 395s | target: AES_ECB 395s | flags: SIGN 395s | key_size: 16-bytes 395s | base: base-key@0x55685bc98840 (32-bytes, EXTRACT_KEY_FROM_KEY) 395s | operation: FLAGS_ONLY 395s | params: 8-bytes@0x7ffff22a3be8 395s | Computing E[2] using K3 395s | XCBC: K3 395s | c1 a7 ab a1 a2 3a 94 06 58 07 a0 8c c8 ee d0 6e .....:..X......n 395s | XCBC: E[n-1] 395s | 1d 04 48 fa cf 4d 9c 6f 55 b9 93 da 09 80 3d b3 ..H..M.oU.....=. 395s | XCBC: M[n] 395s | 10 11 12 13 .... 395s | XCBC: M[n] 395s | 10 11 12 13 .... 395s | XCBC: M[n]:80...^E[n-1]^K3 395s | cc b2 f1 48 ed 77 08 69 0d be 33 56 c1 6e ed dd ...H.w.i..3V.n.. 395s | XCBC: MAC 395s | 47 f5 1b 45 64 96 62 15 b8 98 5c 63 05 5e d3 08 G..Ed.b...\c.^.. 395s | CONCATENATE_DATA_AND_BASE: 395s | target: EXTRACT_KEY_FROM_KEY 395s | base: base-key@0x55685bc944c0 (16-bytes, AES_KEY_GEN) 395s | params: 16-bytes@0x7ffff22a3d10 395s | key-offset: 0, key-size: 16 395s | EXTRACT_KEY_FROM_KEY: 395s | target: EXTRACT_KEY_FROM_KEY 395s | key_size: 16-bytes 395s | base: base-key@0x55685bc98840 (32-bytes, EXTRACT_KEY_FROM_KEY) 395s | operation: FLAGS_ONLY 395s | params: 8-bytes@0x7ffff22a3ca8 395s | PRF symkey interface PRF AES_XCBC final-key@0x55685bc984e0 (size 16) 395s | PRF symkey interface: key-key@0x55685bc984e0 (16-bytes, EXTRACT_KEY_FROM_KEY) 395s | output: symkey-key@0x55685bc984e0 (16-bytes, EXTRACT_KEY_FROM_KEY) 395s | RFC 4434 Test Case AES-XCBC-PRF-128 with 20-byte input (key length 16) extracting all 16 bytes of key@0x55685bc984e0 395s | RFC 4434 Test Case AES-XCBC-PRF-128 with 20-byte input (key length 16): symkey-key@0x55685bc984e0 (16-bytes, EXTRACT_KEY_FROM_KEY) 395s | sizeof bytes 16 395s | wrapper: (SECItemType)976: 6c 44 c8 9c 36 6e bb 30 02 aa 69 80 e8 1b ce c4 395s | RFC 4434 Test Case AES-XCBC-PRF-128 with 20-byte input (key length 16) extracted len 16 bytes at 0x55685bc94390 395s | unwrapped: 395s | 47 f5 1b 45 64 96 62 15 b8 98 5c 63 05 5e d3 08 G..Ed.b...\c.^.. 395s | verify_bytes() RFC 4434 Test Case AES-XCBC-PRF-128 with 20-byte input (key length 16): symkey: ok 395s ipsec algparse: RFC 4434 Test Case AES-XCBC-PRF-128 with 20-byte input (key length 10) 395s | decode_to_chunk() test_prf_vector: input "0x00010203040506070809" 395s | decode_to_chunk() output: 395s | 00 01 02 03 04 05 06 07 08 09 .......... 395s | decode_to_chunk() test_prf_vector: input "0x000102030405060708090a0b0c0d0e0f10111213" 395s | decode_to_chunk() output: 395s | 00 01 02 03 04 05 06 07 08 09 0a 0b 0c 0d 0e 0f ................ 395s | 10 11 12 13 .... 395s | decode_to_chunk() test_prf_vector: input "0x0fa087af7d866e7653434e602fdde835" 395s | decode_to_chunk() output: 395s | 0f a0 87 af 7d 86 6e 76 53 43 4e 60 2f dd e8 35 ....}.nvSCN`/..5 395s | PRF chunk interface PRF AES_XCBC init key hunk 0x55685bc97800 (length 10) 395s | 00 01 02 03 04 05 06 07 08 09 .......... 395s | CONCATENATE_DATA_AND_BASE: 395s | target: EXTRACT_KEY_FROM_KEY 395s | base: base-key@0x55685bc944c0 (16-bytes, AES_KEY_GEN) 395s | params: 16-bytes@0x7ffff22a3d00 395s | key-offset: 0, key-size: 10 395s | EXTRACT_KEY_FROM_KEY: 395s | target: EXTRACT_KEY_FROM_KEY 395s | key_size: 10-bytes 395s | base: base-key@0x55685bc974d0 (26-bytes, EXTRACT_KEY_FROM_KEY) 395s | operation: FLAGS_ONLY 395s | params: 8-bytes@0x7ffff22a3c98 395s | XCBC: Key 10<16 too small, padding with zeros 395s | CONCATENATE_BASE_AND_DATA: 395s | target: EXTRACT_KEY_FROM_KEY 395s | base: base-key@0x55685bc984e0 (10-bytes, EXTRACT_KEY_FROM_KEY) 395s | params: 16-bytes@0x7ffff22a3c40 395s | key-offset: 0, key-size: 16 395s | EXTRACT_KEY_FROM_KEY: 395s | target: AES_ECB 395s | flags: SIGN 395s | key_size: 16-bytes 395s | base: base-key@0x55685bc974d0 (16-bytes, EXTRACT_KEY_FROM_KEY) 395s | operation: FLAGS_ONLY 395s | params: 8-bytes@0x7ffff22a3c48 395s | PRF chunk interface PRF AES_XCBC 0x55685bc97d80 395s | PRF chunk interface PRF AES_XCBC update message (0x55685bc95d10 length 20) 395s | 00 01 02 03 04 05 06 07 08 09 0a 0b 0c 0d 0e 0f ................ 395s | 10 11 12 13 .... 395s | XCBC: data 395s | 00 01 02 03 04 05 06 07 08 09 0a 0b 0c 0d 0e 0f ................ 395s | 10 11 12 13 .... 395s | K extracting all 16 bytes of key@0x55685bc95de0 395s | K: symkey-key@0x55685bc95de0 (16-bytes, AES_ECB) 395s | sizeof bytes 16 395s | wrapper: (SECItemType)538976288: dc 77 bd b1 11 1a 6d fd bc 11 88 8d 3b 7e fa 9f 395s | K extracted len 16 bytes at 0x55685bc97820 395s | unwrapped: 395s | 00 01 02 03 04 05 06 07 08 09 00 00 00 00 00 00 ................ 395s | XCBC: K: 395s | 00 01 02 03 04 05 06 07 08 09 00 00 00 00 00 00 ................ 395s | XCBC: K1 395s | 50 ca b2 4d 03 34 45 5e 40 7b 25 0f dd 7c f8 d5 P..M.4E^@{%..|.. 395s | CONCATENATE_DATA_AND_BASE: 395s | target: EXTRACT_KEY_FROM_KEY 395s | base: base-key@0x55685bc944c0 (16-bytes, AES_KEY_GEN) 395s | params: 16-bytes@0x7ffff22a3bb0 395s | key-offset: 0, key-size: 16 395s | EXTRACT_KEY_FROM_KEY: 395s | target: AES_ECB 395s | flags: SIGN 395s | key_size: 16-bytes 395s | base: base-key@0x55685bc974d0 (32-bytes, EXTRACT_KEY_FROM_KEY) 395s | operation: FLAGS_ONLY 395s | params: 8-bytes@0x7ffff22a3b98 395s | Computing E[2] using K3 395s | XCBC: K3 395s | 8e f7 48 db 56 f1 f7 26 24 72 f2 c5 63 b0 3f 88 ..H.V..&$r..c.?. 395s | XCBC: E[n-1] 395s | fe 1f 63 e9 65 1a 4b bb 3c cc cd 0d cc 83 e4 30 ..c.e.K.<......0 395s | XCBC: M[n] 395s | 10 11 12 13 .... 395s | XCBC: M[n] 395s | 10 11 12 13 .... 395s | XCBC: M[n]:80...^E[n-1]^K3 395s | 60 f9 39 21 b3 eb bc 9d 18 be 3f c8 af 33 db b8 `.9!......?..3.. 395s | XCBC: MAC 395s | 0f a0 87 af 7d 86 6e 76 53 43 4e 60 2f dd e8 35 ....}.nvSCN`/..5 395s | PRF chunk interface PRF AES_XCBC final length 16 395s | 0f a0 87 af 7d 86 6e 76 53 43 4e 60 2f dd e8 35 ....}.nvSCN`/..5 395s | chunk output 395s | 0f a0 87 af 7d 86 6e 76 53 43 4e 60 2f dd e8 35 ....}.nvSCN`/..5 395s | verify_bytes() RFC 4434 Test Case AES-XCBC-PRF-128 with 20-byte input (key length 10): prf OUT: ok 395s | CONCATENATE_DATA_AND_BASE: 395s | target: EXTRACT_KEY_FROM_KEY 395s | base: base-key@0x55685bc944c0 (16-bytes, AES_KEY_GEN) 395s | params: 16-bytes@0x7ffff22a3d80 395s | key-offset: 0, key-size: 10 395s | EXTRACT_KEY_FROM_KEY: 395s | target: EXTRACT_KEY_FROM_KEY 395s | key_size: 10-bytes 395s | base: base-key@0x55685bc984e0 (26-bytes, EXTRACT_KEY_FROM_KEY) 395s | operation: FLAGS_ONLY 395s | params: 8-bytes@0x7ffff22a3d18 395s | PRF symkey interface PRF AES_XCBC init key symkey-key@0x55685bc95de0 (size 10) 395s | PRF symkey interface: key symkey-key@0x55685bc95de0 (10-bytes, EXTRACT_KEY_FROM_KEY) 395s | XCBC: Key 10<16 too small, padding with zeros 395s | CONCATENATE_BASE_AND_DATA: 395s | target: EXTRACT_KEY_FROM_KEY 395s | base: base-key@0x55685bc95de0 (10-bytes, EXTRACT_KEY_FROM_KEY) 395s | params: 16-bytes@0x7ffff22a3c80 395s | key-offset: 0, key-size: 16 395s | EXTRACT_KEY_FROM_KEY: 395s | target: AES_ECB 395s | flags: SIGN 395s | key_size: 16-bytes 395s | base: base-key@0x55685bc984e0 (16-bytes, EXTRACT_KEY_FROM_KEY) 395s | operation: FLAGS_ONLY 395s | params: 8-bytes@0x7ffff22a3c88 395s | PRF symkey interface PRF AES_XCBC 0x55685bc97d80 395s | CONCATENATE_DATA_AND_BASE: 395s | target: EXTRACT_KEY_FROM_KEY 395s | base: base-key@0x55685bc944c0 (16-bytes, AES_KEY_GEN) 395s | params: 16-bytes@0x7ffff22a3d80 395s | key-offset: 0, key-size: 20 395s | EXTRACT_KEY_FROM_KEY: 395s | target: EXTRACT_KEY_FROM_KEY 395s | key_size: 20-bytes 395s | base: base-key@0x55685bc981a0 (36-bytes, EXTRACT_KEY_FROM_KEY) 395s | operation: FLAGS_ONLY 395s | params: 8-bytes@0x7ffff22a3d18 395s | PRF symkey interface PRF AES_XCBC update symkey message-key@0x55685bc984e0 (size 20) 395s | PRF symkey interface: symkey message-key@0x55685bc984e0 (20-bytes, EXTRACT_KEY_FROM_KEY) 395s | symkey message extracting all 20 bytes of key@0x55685bc984e0 395s | symkey message: symkey-key@0x55685bc984e0 (20-bytes, EXTRACT_KEY_FROM_KEY) 395s | sizeof bytes 32 395s | wrapper: (SECItemType)-232113904: 4c fe 7f c5 ad d7 9f b4 e0 cf 64 4d 6b e6 15 dc 2f f2 1b 58 a6 ac 10 38 99 a5 1f 80 26 48 1a e3 395s | symkey message extracted len 32 bytes at 0x55685bc94490 395s | unwrapped: 395s | 00 01 02 03 04 05 06 07 08 09 0a 0b 0c 0d 0e 0f ................ 395s | 10 11 12 13 00 00 00 00 00 00 00 00 00 00 00 00 ................ 395s | XCBC: data 395s | 00 01 02 03 04 05 06 07 08 09 0a 0b 0c 0d 0e 0f ................ 395s | 10 11 12 13 .... 395s | K extracting all 16 bytes of key@0x55685bc974d0 395s | K: symkey-key@0x55685bc974d0 (16-bytes, AES_ECB) 395s | sizeof bytes 16 395s | wrapper: (SECItemType)-232114112: dc 77 bd b1 11 1a 6d fd bc 11 88 8d 3b 7e fa 9f 395s | K extracted len 16 bytes at 0x55685bc98180 395s | unwrapped: 395s | 00 01 02 03 04 05 06 07 08 09 00 00 00 00 00 00 ................ 395s | XCBC: K: 395s | 00 01 02 03 04 05 06 07 08 09 00 00 00 00 00 00 ................ 395s | XCBC: K1 395s | 50 ca b2 4d 03 34 45 5e 40 7b 25 0f dd 7c f8 d5 P..M.4E^@{%..|.. 395s | CONCATENATE_DATA_AND_BASE: 395s | target: EXTRACT_KEY_FROM_KEY 395s | base: base-key@0x55685bc944c0 (16-bytes, AES_KEY_GEN) 395s | params: 16-bytes@0x7ffff22a3c00 395s | key-offset: 0, key-size: 16 395s | EXTRACT_KEY_FROM_KEY: 395s | target: AES_ECB 395s | flags: SIGN 395s | key_size: 16-bytes 395s | base: base-key@0x55685bc98840 (32-bytes, EXTRACT_KEY_FROM_KEY) 395s | operation: FLAGS_ONLY 395s | params: 8-bytes@0x7ffff22a3be8 395s | Computing E[2] using K3 395s | XCBC: K3 395s | 8e f7 48 db 56 f1 f7 26 24 72 f2 c5 63 b0 3f 88 ..H.V..&$r..c.?. 395s | XCBC: E[n-1] 395s | fe 1f 63 e9 65 1a 4b bb 3c cc cd 0d cc 83 e4 30 ..c.e.K.<......0 395s | XCBC: M[n] 395s | 10 11 12 13 .... 395s | XCBC: M[n] 395s | 10 11 12 13 .... 395s | XCBC: M[n]:80...^E[n-1]^K3 395s | 60 f9 39 21 b3 eb bc 9d 18 be 3f c8 af 33 db b8 `.9!......?..3.. 395s | XCBC: MAC 395s | 0f a0 87 af 7d 86 6e 76 53 43 4e 60 2f dd e8 35 ....}.nvSCN`/..5 395s | CONCATENATE_DATA_AND_BASE: 395s | target: EXTRACT_KEY_FROM_KEY 395s | base: base-key@0x55685bc944c0 (16-bytes, AES_KEY_GEN) 395s | params: 16-bytes@0x7ffff22a3d10 395s | key-offset: 0, key-size: 16 395s | EXTRACT_KEY_FROM_KEY: 395s | target: EXTRACT_KEY_FROM_KEY 395s | key_size: 16-bytes 395s | base: base-key@0x55685bc98840 (32-bytes, EXTRACT_KEY_FROM_KEY) 395s | operation: FLAGS_ONLY 395s | params: 8-bytes@0x7ffff22a3ca8 395s | PRF symkey interface PRF AES_XCBC final-key@0x55685bc981a0 (size 16) 395s | PRF symkey interface: key-key@0x55685bc981a0 (16-bytes, EXTRACT_KEY_FROM_KEY) 395s | output: symkey-key@0x55685bc981a0 (16-bytes, EXTRACT_KEY_FROM_KEY) 395s | RFC 4434 Test Case AES-XCBC-PRF-128 with 20-byte input (key length 10) extracting all 16 bytes of key@0x55685bc981a0 395s | RFC 4434 Test Case AES-XCBC-PRF-128 with 20-byte input (key length 10): symkey-key@0x55685bc981a0 (16-bytes, EXTRACT_KEY_FROM_KEY) 395s | sizeof bytes 16 395s | wrapper: (SECItemType)976: 43 59 78 df 71 79 ad f3 66 4d d9 91 e4 28 3a 1a 395s | RFC 4434 Test Case AES-XCBC-PRF-128 with 20-byte input (key length 10) extracted len 16 bytes at 0x55685bc98180 395s | unwrapped: 395s | 0f a0 87 af 7d 86 6e 76 53 43 4e 60 2f dd e8 35 ....}.nvSCN`/..5 395s | verify_bytes() RFC 4434 Test Case AES-XCBC-PRF-128 with 20-byte input (key length 10): symkey: ok 395s ipsec algparse: RFC 4434 Test Case AES-XCBC-PRF-128 with 20-byte input (key length 18) 395s | decode_to_chunk() test_prf_vector: input "0x000102030405060708090a0b0c0d0e0fedcb" 395s | decode_to_chunk() output: 395s | 00 01 02 03 04 05 06 07 08 09 0a 0b 0c 0d 0e 0f ................ 395s | ed cb .. 395s | decode_to_chunk() test_prf_vector: input "0x000102030405060708090a0b0c0d0e0f10111213" 395s | decode_to_chunk() output: 395s | 00 01 02 03 04 05 06 07 08 09 0a 0b 0c 0d 0e 0f ................ 395s | 10 11 12 13 .... 395s | decode_to_chunk() test_prf_vector: input "0x8cd3c93ae598a9803006ffb67c40e9e4" 395s | decode_to_chunk() output: 395s | 8c d3 c9 3a e5 98 a9 80 30 06 ff b6 7c 40 e9 e4 ...:....0...|@.. 395s | PRF chunk interface PRF AES_XCBC init key hunk 0x55685bc97800 (length 18) 395s | 00 01 02 03 04 05 06 07 08 09 0a 0b 0c 0d 0e 0f ................ 395s | ed cb .. 395s | CONCATENATE_DATA_AND_BASE: 395s | target: EXTRACT_KEY_FROM_KEY 395s | base: base-key@0x55685bc944c0 (16-bytes, AES_KEY_GEN) 395s | params: 16-bytes@0x7ffff22a3d00 395s | key-offset: 0, key-size: 18 395s | EXTRACT_KEY_FROM_KEY: 395s | target: EXTRACT_KEY_FROM_KEY 395s | key_size: 18-bytes 395s | base: base-key@0x55685bc95de0 (34-bytes, EXTRACT_KEY_FROM_KEY) 395s | operation: FLAGS_ONLY 395s | params: 8-bytes@0x7ffff22a3c98 395s | XCBC: Key 18>16 too big, rehashing to size 395s | CONCATENATE_DATA_AND_BASE: 395s | target: EXTRACT_KEY_FROM_KEY 395s | base: base-key@0x55685bc944c0 (16-bytes, AES_KEY_GEN) 395s | params: 16-bytes@0x7ffff22a3c00 395s | key-offset: 0, key-size: 16 395s | EXTRACT_KEY_FROM_KEY: 395s | target: AES_ECB 395s | flags: SIGN 395s | key_size: 16-bytes 395s | base: base-key@0x55685bc984e0 (32-bytes, EXTRACT_KEY_FROM_KEY) 395s | operation: FLAGS_ONLY 395s | params: 8-bytes@0x7ffff22a3be8 395s | draft_chunk extracting all 18 bytes of key@0x55685bc981a0 395s | draft_chunk: symkey-key@0x55685bc981a0 (18-bytes, EXTRACT_KEY_FROM_KEY) 395s | sizeof bytes 32 395s | wrapper: (SECItemType)1095914584: 4c fe 7f c5 ad d7 9f b4 e0 cf 64 4d 6b e6 15 dc a3 67 eb 25 e7 50 e3 19 33 e3 fc 61 35 64 36 9d 395s | draft_chunk extracted len 32 bytes at 0x55685bc94490 395s | unwrapped: 395s | 00 01 02 03 04 05 06 07 08 09 0a 0b 0c 0d 0e 0f ................ 395s | ed cb 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................ 395s | XCBC: data 395s | 00 01 02 03 04 05 06 07 08 09 0a 0b 0c 0d 0e 0f ................ 395s | ed cb .. 395s | K extracting all 16 bytes of key@0x55685bc95de0 395s | K: symkey-key@0x55685bc95de0 (16-bytes, AES_ECB) 395s | sizeof bytes 16 395s | wrapper: (SECItemType)774778414: f8 29 55 23 7f 64 dd 8c f8 b2 8a 02 68 2e ca c1 395s | K extracted len 16 bytes at 0x55685bc98820 395s | unwrapped: 395s | 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................ 395s | XCBC: K: 395s | 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................ 395s | XCBC: K1 395s | e1 4d 5d 0e e2 77 15 df 08 b4 15 2b a2 3d a8 e0 .M]..w.....+.=.. 395s | CONCATENATE_DATA_AND_BASE: 395s | target: EXTRACT_KEY_FROM_KEY 395s | base: base-key@0x55685bc944c0 (16-bytes, AES_KEY_GEN) 395s | params: 16-bytes@0x7ffff22a3b30 395s | key-offset: 0, key-size: 16 395s | EXTRACT_KEY_FROM_KEY: 395s | target: AES_ECB 395s | flags: SIGN 395s | key_size: 16-bytes 395s | base: base-key@0x55685bc974d0 (32-bytes, EXTRACT_KEY_FROM_KEY) 395s | operation: FLAGS_ONLY 395s | params: 8-bytes@0x7ffff22a3b18 395s | Computing E[2] using K3 395s | XCBC: K3 395s | 8d 34 ef cb 3b d5 45 ca 06 2a ec df ef 7c 0b fa .4..;.E..*...|.. 395s | XCBC: E[n-1] 395s | 0b 72 b2 ae 0a 37 79 81 75 6a d5 9c 79 c0 e6 96 .r...7y.uj..y... 395s | XCBC: M[n] 395s | ed cb .. 395s | XCBC: M[n] 395s | ed cb .. 395s | XCBC: M[n]:80...^E[n-1]^K3 395s | 6b 8d dd 65 31 e2 3c 4b 73 40 39 43 96 bc ed 6c k..e1.16 too big, rehashing to size 395s | CONCATENATE_DATA_AND_BASE: 395s | target: EXTRACT_KEY_FROM_KEY 395s | base: base-key@0x55685bc944c0 (16-bytes, AES_KEY_GEN) 395s | params: 16-bytes@0x7ffff22a3c40 395s | key-offset: 0, key-size: 16 395s | EXTRACT_KEY_FROM_KEY: 395s | target: AES_ECB 395s | flags: SIGN 395s | key_size: 16-bytes 395s | base: base-key@0x55685bc95de0 (32-bytes, EXTRACT_KEY_FROM_KEY) 395s | operation: FLAGS_ONLY 395s | params: 8-bytes@0x7ffff22a3c28 395s | draft_chunk extracting all 18 bytes of key@0x55685bc984e0 395s | draft_chunk: symkey-key@0x55685bc984e0 (18-bytes, EXTRACT_KEY_FROM_KEY) 395s | sizeof bytes 32 395s | wrapper: (SECItemType)16: 4c fe 7f c5 ad d7 9f b4 e0 cf 64 4d 6b e6 15 dc a3 67 eb 25 e7 50 e3 19 33 e3 fc 61 35 64 36 9d 395s | draft_chunk extracted len 32 bytes at 0x55685bc97d80 395s | unwrapped: 395s | 00 01 02 03 04 05 06 07 08 09 0a 0b 0c 0d 0e 0f ................ 395s | ed cb 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................ 395s | XCBC: data 395s | 00 01 02 03 04 05 06 07 08 09 0a 0b 0c 0d 0e 0f ................ 395s | ed cb .. 395s | K extracting all 16 bytes of key@0x55685bc981a0 395s | K: symkey-key@0x55685bc981a0 (16-bytes, AES_ECB) 395s | sizeof bytes 16 395s | wrapper: (SECItemType)774778414: f8 29 55 23 7f 64 dd 8c f8 b2 8a 02 68 2e ca c1 395s | K extracted len 16 bytes at 0x55685bc97700 395s | unwrapped: 395s | 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................ 395s | XCBC: K: 395s | 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................ 395s | XCBC: K1 395s | e1 4d 5d 0e e2 77 15 df 08 b4 15 2b a2 3d a8 e0 .M]..w.....+.=.. 395s | CONCATENATE_DATA_AND_BASE: 395s | target: EXTRACT_KEY_FROM_KEY 395s | base: base-key@0x55685bc944c0 (16-bytes, AES_KEY_GEN) 395s | params: 16-bytes@0x7ffff22a3b70 395s | key-offset: 0, key-size: 16 395s | EXTRACT_KEY_FROM_KEY: 395s | target: AES_ECB 395s | flags: SIGN 395s | key_size: 16-bytes 395s | base: base-key@0x55685bc974d0 (32-bytes, EXTRACT_KEY_FROM_KEY) 395s | operation: FLAGS_ONLY 395s | params: 8-bytes@0x7ffff22a3b58 395s | Computing E[2] using K3 395s | XCBC: K3 395s | 8d 34 ef cb 3b d5 45 ca 06 2a ec df ef 7c 0b fa .4..;.E..*...|.. 395s | XCBC: E[n-1] 395s | 0b 72 b2 ae 0a 37 79 81 75 6a d5 9c 79 c0 e6 96 .r...7y.uj..y... 395s | XCBC: M[n] 395s | ed cb .. 395s | XCBC: M[n] 395s | ed cb .. 395s | XCBC: M[n]:80...^E[n-1]^K3 395s | 6b 8d dd 65 31 e2 3c 4b 73 40 39 43 96 bc ed 6c k..e1.j.....n1.].8 395s | PRF chunk interface PRF HMAC_MD5 init key hunk 0x55685bc95d10 (length 4) 395s | 4a 65 66 65 Jefe 395s | CONCATENATE_DATA_AND_BASE: 395s | target: EXTRACT_KEY_FROM_KEY 395s | base: base-key@0x55685bc944c0 (16-bytes, AES_KEY_GEN) 395s | params: 16-bytes@0x7ffff22a3cb0 395s | key-offset: 0, key-size: 4 395s | EXTRACT_KEY_FROM_KEY: 395s | target: MD5_HMAC 395s | flags: SIGN 395s | key_size: 4-bytes 395s | base: base-key@0x55685bc974d0 (20-bytes, EXTRACT_KEY_FROM_KEY) 395s | operation: FLAGS_ONLY 395s | params: 8-bytes@0x7ffff22a3c98 395s | PRF chunk interface prf: created HMAC_MD5 context 0x55685bc97840 from key-key@0x55685bc984e0 395s | PRF chunk interface prf: begin HMAC_MD5 with context 0x55685bc97840 from key-key@0x55685bc984e0 395s | PRF chunk interface PRF HMAC_MD5 0x55685bc97e10 395s | PRF chunk interface PRF HMAC_MD5 update message (0x55685bc97d80 length 28) 395s | 77 68 61 74 20 64 6f 20 79 61 20 77 61 6e 74 20 what do ya want 395s | 66 6f 72 20 6e 6f 74 68 69 6e 67 3f for nothing? 395s | PRF chunk interface PRF HMAC_MD5 final length 16 395s | 75 0c 78 3e 6a b0 b5 03 ea a8 6e 31 0a 5d b7 38 u.x>j.....n1.].8 395s | chunk output 395s | 75 0c 78 3e 6a b0 b5 03 ea a8 6e 31 0a 5d b7 38 u.x>j.....n1.].8 395s | verify_bytes() RFC 2104: MD5_HMAC test 2: prf OUT: ok 395s | CONCATENATE_DATA_AND_BASE: 395s | target: EXTRACT_KEY_FROM_KEY 395s | base: base-key@0x55685bc944c0 (16-bytes, AES_KEY_GEN) 395s | params: 16-bytes@0x7ffff22a3d80 395s | key-offset: 0, key-size: 4 395s | EXTRACT_KEY_FROM_KEY: 395s | target: EXTRACT_KEY_FROM_KEY 395s | key_size: 4-bytes 395s | base: base-key@0x55685bc974d0 (20-bytes, EXTRACT_KEY_FROM_KEY) 395s | operation: FLAGS_ONLY 395s | params: 8-bytes@0x7ffff22a3d18 395s | PRF symkey interface PRF HMAC_MD5 init key symkey-key@0x55685bc984e0 (size 4) 395s | PRF symkey interface: key symkey-key@0x55685bc984e0 (4-bytes, EXTRACT_KEY_FROM_KEY) 395s | key-offset: 0, key-size: 4 395s | EXTRACT_KEY_FROM_KEY: 395s | target: MD5_HMAC 395s | flags: SIGN 395s | key_size: 4-bytes 395s | base: base-key@0x55685bc984e0 (4-bytes, EXTRACT_KEY_FROM_KEY) 395s | operation: FLAGS_ONLY 395s | params: 8-bytes@0x7ffff22a3cf8 395s | PRF symkey interface prf: created HMAC_MD5 context 0x55685bc982e0 from key symkey-key@0x55685bc974d0 395s | PRF symkey interface prf: begin HMAC_MD5 with context 0x55685bc982e0 from key symkey-key@0x55685bc974d0 395s | PRF symkey interface PRF HMAC_MD5 0x55685bc94460 395s | CONCATENATE_DATA_AND_BASE: 395s | target: EXTRACT_KEY_FROM_KEY 395s | base: base-key@0x55685bc944c0 (16-bytes, AES_KEY_GEN) 395s | params: 16-bytes@0x7ffff22a3d80 395s | key-offset: 0, key-size: 28 395s | EXTRACT_KEY_FROM_KEY: 395s | target: EXTRACT_KEY_FROM_KEY 395s | key_size: 28-bytes 395s | base: base-key@0x55685bc95de0 (44-bytes, EXTRACT_KEY_FROM_KEY) 395s | operation: FLAGS_ONLY 395s | params: 8-bytes@0x7ffff22a3d18 395s | PRF symkey interface PRF HMAC_MD5 update symkey message-key@0x55685bc981a0 (size 28) 395s | PRF symkey interface: symkey message-key@0x55685bc981a0 (28-bytes, EXTRACT_KEY_FROM_KEY) 395s | nss hmac digest hack extracting all 28 bytes of key@0x55685bc981a0 395s | nss hmac digest hack: symkey-key@0x55685bc981a0 (28-bytes, EXTRACT_KEY_FROM_KEY) 395s | sizeof bytes 32 395s | wrapper: (SECItemType)-232113904: e5 a3 40 08 b0 65 18 ce 90 5b d3 69 52 e6 13 c2 d4 f3 24 f4 97 2f d7 ff aa 43 3f eb 61 02 91 ad 395s | nss hmac digest hack extracted len 32 bytes at 0x55685bc9cdd0 395s | unwrapped: 395s | 77 68 61 74 20 64 6f 20 79 61 20 77 61 6e 74 20 what do ya want 395s | 66 6f 72 20 6e 6f 74 68 69 6e 67 3f 00 00 00 00 for nothing?.... 395s | CONCATENATE_DATA_AND_BASE: 395s | target: EXTRACT_KEY_FROM_KEY 395s | base: base-key@0x55685bc944c0 (16-bytes, AES_KEY_GEN) 395s | params: 16-bytes@0x7ffff22a3d20 395s | key-offset: 0, key-size: 16 395s | EXTRACT_KEY_FROM_KEY: 395s | target: EXTRACT_KEY_FROM_KEY 395s | key_size: 16-bytes 395s | base: base-key@0x55685bc95de0 (32-bytes, EXTRACT_KEY_FROM_KEY) 395s | operation: FLAGS_ONLY 395s | params: 8-bytes@0x7ffff22a3cb8 395s | PRF symkey interface PRF HMAC_MD5 final-key@0x55685bc974d0 (size 16) 395s | PRF symkey interface: key-key@0x55685bc974d0 (16-bytes, EXTRACT_KEY_FROM_KEY) 395s | output: symkey-key@0x55685bc974d0 (16-bytes, EXTRACT_KEY_FROM_KEY) 395s | RFC 2104: MD5_HMAC test 2 extracting all 16 bytes of key@0x55685bc974d0 395s | RFC 2104: MD5_HMAC test 2: symkey-key@0x55685bc974d0 (16-bytes, EXTRACT_KEY_FROM_KEY) 395s | sizeof bytes 16 395s | wrapper: (SECItemType)976: 67 93 69 40 8f 8c 1d 38 aa a3 25 8a 3a 99 c5 d9 395s | RFC 2104: MD5_HMAC test 2 extracted len 16 bytes at 0x55685bc97820 395s | unwrapped: 395s | 75 0c 78 3e 6a b0 b5 03 ea a8 6e 31 0a 5d b7 38 u.x>j.....n1.].8 395s | verify_bytes() RFC 2104: MD5_HMAC test 2: symkey: ok 395s ipsec algparse: RFC 2104: MD5_HMAC test 3 395s | decode_to_chunk() test_prf_vector: input "0xAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAA" 395s | decode_to_chunk() output: 395s | aa aa aa aa aa aa aa aa aa aa aa aa aa aa aa aa ................ 395s | decode_to_chunk() test_prf_vector: input "0xDDDDDDDDDDDDDDDDDDDDDDDDDDDDDDDDDDDDDDDDDDDDDDDDDDDDDDDDDDDDDDDDDDDDDDDDDDDDDDDDDDDDDDDDDDDDDDDDDDDD" 395s | decode_to_chunk() output: 395s | dd dd dd dd dd dd dd dd dd dd dd dd dd dd dd dd ................ 395s | dd dd dd dd dd dd dd dd dd dd dd dd dd dd dd dd ................ 395s | dd dd dd dd dd dd dd dd dd dd dd dd dd dd dd dd ................ 395s | dd dd .. 395s | decode_to_chunk() test_prf_vector: input "0x56be34521d144c88dbb8c733f0e8b3f6" 395s | decode_to_chunk() output: 395s | 56 be 34 52 1d 14 4c 88 db b8 c7 33 f0 e8 b3 f6 V.4R..L....3.... 395s | PRF chunk interface PRF HMAC_MD5 init key hunk 0x55685bc94390 (length 16) 395s | aa aa aa aa aa aa aa aa aa aa aa aa aa aa aa aa ................ 395s | CONCATENATE_DATA_AND_BASE: 395s | target: EXTRACT_KEY_FROM_KEY 395s | base: base-key@0x55685bc944c0 (16-bytes, AES_KEY_GEN) 395s | params: 16-bytes@0x7ffff22a3cb0 395s | key-offset: 0, key-size: 16 395s | EXTRACT_KEY_FROM_KEY: 395s | target: MD5_HMAC 395s | flags: SIGN 395s | key_size: 16-bytes 395s | base: base-key@0x55685bc984e0 (32-bytes, EXTRACT_KEY_FROM_KEY) 395s | operation: FLAGS_ONLY 395s | params: 8-bytes@0x7ffff22a3c98 395s | PRF chunk interface prf: created HMAC_MD5 context 0x55685bc988d0 from key-key@0x55685bc974d0 395s | PRF chunk interface prf: begin HMAC_MD5 with context 0x55685bc988d0 from key-key@0x55685bc974d0 395s | PRF chunk interface PRF HMAC_MD5 0x55685bc94490 395s | PRF chunk interface PRF HMAC_MD5 update message (0x55685bc97d40 length 50) 395s | dd dd dd dd dd dd dd dd dd dd dd dd dd dd dd dd ................ 395s | dd dd dd dd dd dd dd dd dd dd dd dd dd dd dd dd ................ 395s | dd dd dd dd dd dd dd dd dd dd dd dd dd dd dd dd ................ 395s | dd dd .. 395s | PRF chunk interface PRF HMAC_MD5 final length 16 395s | 56 be 34 52 1d 14 4c 88 db b8 c7 33 f0 e8 b3 f6 V.4R..L....3.... 395s | chunk output 395s | 56 be 34 52 1d 14 4c 88 db b8 c7 33 f0 e8 b3 f6 V.4R..L....3.... 395s | verify_bytes() RFC 2104: MD5_HMAC test 3: prf OUT: ok 395s | CONCATENATE_DATA_AND_BASE: 395s | target: EXTRACT_KEY_FROM_KEY 395s | base: base-key@0x55685bc944c0 (16-bytes, AES_KEY_GEN) 395s | params: 16-bytes@0x7ffff22a3d80 395s | key-offset: 0, key-size: 16 395s | EXTRACT_KEY_FROM_KEY: 395s | target: EXTRACT_KEY_FROM_KEY 395s | key_size: 16-bytes 395s | base: base-key@0x55685bc984e0 (32-bytes, EXTRACT_KEY_FROM_KEY) 395s | operation: FLAGS_ONLY 395s | params: 8-bytes@0x7ffff22a3d18 395s | PRF symkey interface PRF HMAC_MD5 init key symkey-key@0x55685bc974d0 (size 16) 395s | PRF symkey interface: key symkey-key@0x55685bc974d0 (16-bytes, EXTRACT_KEY_FROM_KEY) 395s | key-offset: 0, key-size: 16 395s | EXTRACT_KEY_FROM_KEY: 395s | target: MD5_HMAC 395s | flags: SIGN 395s | key_size: 16-bytes 395s | base: base-key@0x55685bc974d0 (16-bytes, EXTRACT_KEY_FROM_KEY) 395s | operation: FLAGS_ONLY 395s | params: 8-bytes@0x7ffff22a3cf8 395s | PRF symkey interface prf: created HMAC_MD5 context 0x55685bc97300 from key symkey-key@0x55685bc984e0 395s | PRF symkey interface prf: begin HMAC_MD5 with context 0x55685bc97300 from key symkey-key@0x55685bc984e0 395s | PRF symkey interface PRF HMAC_MD5 0x55685bc97d80 395s | CONCATENATE_DATA_AND_BASE: 395s | target: EXTRACT_KEY_FROM_KEY 395s | base: base-key@0x55685bc944c0 (16-bytes, AES_KEY_GEN) 395s | params: 16-bytes@0x7ffff22a3d80 395s | key-offset: 0, key-size: 50 395s | EXTRACT_KEY_FROM_KEY: 395s | target: EXTRACT_KEY_FROM_KEY 395s | key_size: 50-bytes 395s | base: base-key@0x55685bc95de0 (66-bytes, EXTRACT_KEY_FROM_KEY) 395s | operation: FLAGS_ONLY 395s | params: 8-bytes@0x7ffff22a3d18 395s | PRF symkey interface PRF HMAC_MD5 update symkey message-key@0x55685bc981a0 (size 50) 395s | PRF symkey interface: symkey message-key@0x55685bc981a0 (50-bytes, EXTRACT_KEY_FROM_KEY) 395s | nss hmac digest hack extracting all 50 bytes of key@0x55685bc981a0 395s | nss hmac digest hack: symkey-key@0x55685bc981a0 (50-bytes, EXTRACT_KEY_FROM_KEY) 395s | sizeof bytes 64 395s | wrapper: (SECItemType)-232113904: 90 d2 fa cb ab 3e d9 40 45 d8 63 51 84 52 72 2a 90 d2 fa cb ab 3e d9 40 45 d8 63 51 84 52 72 2a 90 d2 fa cb ab 3e d9 40 45 d8 63 51 84 52 72 2a a4 fb e8 71 25 33 ea b8 97 62 55 36 03 03 7d 85 395s | nss hmac digest hack extracted len 64 bytes at 0x55685bc97e40 395s | unwrapped: 395s | dd dd dd dd dd dd dd dd dd dd dd dd dd dd dd dd ................ 395s | dd dd dd dd dd dd dd dd dd dd dd dd dd dd dd dd ................ 395s | dd dd dd dd dd dd dd dd dd dd dd dd dd dd dd dd ................ 395s | dd dd 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................ 395s | CONCATENATE_DATA_AND_BASE: 395s | target: EXTRACT_KEY_FROM_KEY 395s | base: base-key@0x55685bc944c0 (16-bytes, AES_KEY_GEN) 395s | params: 16-bytes@0x7ffff22a3d20 395s | key-offset: 0, key-size: 16 395s | EXTRACT_KEY_FROM_KEY: 395s | target: EXTRACT_KEY_FROM_KEY 395s | key_size: 16-bytes 395s | base: base-key@0x55685bc95de0 (32-bytes, EXTRACT_KEY_FROM_KEY) 395s | operation: FLAGS_ONLY 395s | params: 8-bytes@0x7ffff22a3cb8 395s | PRF symkey interface PRF HMAC_MD5 final-key@0x55685bc984e0 (size 16) 395s | PRF symkey interface: key-key@0x55685bc984e0 (16-bytes, EXTRACT_KEY_FROM_KEY) 395s | output: symkey-key@0x55685bc984e0 (16-bytes, EXTRACT_KEY_FROM_KEY) 395s | RFC 2104: MD5_HMAC test 3 extracting all 16 bytes of key@0x55685bc984e0 395s | RFC 2104: MD5_HMAC test 3: symkey-key@0x55685bc984e0 (16-bytes, EXTRACT_KEY_FROM_KEY) 395s | sizeof bytes 16 395s | wrapper: (SECItemType)976: a7 18 e1 c5 a9 28 04 e8 33 c5 99 bb 92 2c 62 22 395s | RFC 2104: MD5_HMAC test 3 extracted len 16 bytes at 0x55685bc97b10 395s | unwrapped: 395s | 56 be 34 52 1d 14 4c 88 db b8 c7 33 f0 e8 b3 f6 V.4R..L....3.... 395s | verify_bytes() RFC 2104: MD5_HMAC test 3: symkey: ok 395s ipsec algparse: testing HMAC_SHA1: 395s ipsec algparse: CAVP: IKEv2 key derivation with HMAC-SHA1 395s | decode_to_chunk() test_kdf_vector: input "0x32b50d5f4a3763f3" 395s | decode_to_chunk() output: 395s | 32 b5 0d 5f 4a 37 63 f3 2.._J7c. 395s | decode_to_chunk() test_kdf_vector: input "0x9206a04b26564cb1" 395s | decode_to_chunk() output: 395s | 92 06 a0 4b 26 56 4c b1 ...K&VL. 395s | decode_to_chunk() test_kdf_vector: input "0x34c9e7c188868785" 395s | decode_to_chunk() output: 395s | 34 c9 e7 c1 88 86 87 85 4....... 395s | decode_to_chunk() test_kdf_vector: input "0x3ff77d760d2b2199" 395s | decode_to_chunk() output: 395s | 3f f7 7d 76 0d 2b 21 99 ?.}v.+!. 395s | decode_to_chunk() test_kdf_vector: input "0x4b2c1f971981a8ad8d0abeafabf38cf75fc8349c148142465ed9c8b516b8be52" 395s | decode_to_chunk() output: 395s | 4b 2c 1f 97 19 81 a8 ad 8d 0a be af ab f3 8c f7 K,.............. 395s | 5f c8 34 9c 14 81 42 46 5e d9 c8 b5 16 b8 be 52 _.4...BF^......R 395s | decode_to_chunk() test_kdf_vector: input "0x863f3c9d06efd39d2b907b97f8699e5dd5251ef64a2a176f36ee40c87d4f9330" 395s | decode_to_chunk() output: 395s | 86 3f 3c 9d 06 ef d3 9d 2b 90 7b 97 f8 69 9e 5d .?<.....+.{..i.] 395s | d5 25 1e f6 4a 2a 17 6f 36 ee 40 c8 7d 4f 93 30 .%..J*.o6.@.}O.0 395s | decode_to_chunk() test_kdf_vector: input "0xa9a7b222b59f8f48645f28a1db5b5f5d7479cba7" 395s | decode_to_chunk() output: 395s | a9 a7 b2 22 b5 9f 8f 48 64 5f 28 a1 db 5b 5f 5d ..."...Hd_(..[_] 395s | 74 79 cb a7 ty.. 395s | decode_to_chunk() test_kdf_vector: input "0x63e81194946ebd05df7df5ebf5d8750056bf1f1d" 395s | decode_to_chunk() output: 395s | 63 e8 11 94 94 6e bd 05 df 7d f5 eb f5 d8 75 00 c....n...}....u. 395s | 56 bf 1f 1d V... 395s | decode_to_chunk() test_kdf_vector: input "0xa14293677cc80ff8f9cc0eee30d895da9d8f405666e30ef0dfcb63c634a46002a2a63080e514a062768b76606f9fa5e992204fc5a670bde3f10d6b027113936a5c55b648a194ae587b0088d52204b702c979fa280870d2ed41efa9c549fd11198af1670b143d384bd275c5f594cf266b05ebadca855e4249520a441a81157435a7a56cc4" 395s | decode_to_chunk() output: 395s | a1 42 93 67 7c c8 0f f8 f9 cc 0e ee 30 d8 95 da .B.g|.......0... 395s | 9d 8f 40 56 66 e3 0e f0 df cb 63 c6 34 a4 60 02 ..@Vf.....c.4.`. 395s | a2 a6 30 80 e5 14 a0 62 76 8b 76 60 6f 9f a5 e9 ..0....bv.v`o... 395s | 92 20 4f c5 a6 70 bd e3 f1 0d 6b 02 71 13 93 6a . O..p....k.q..j 395s | 5c 55 b6 48 a1 94 ae 58 7b 00 88 d5 22 04 b7 02 \U.H...X{..."... 395s | c9 79 fa 28 08 70 d2 ed 41 ef a9 c5 49 fd 11 19 .y.(.p..A...I... 395s | 8a f1 67 0b 14 3d 38 4b d2 75 c5 f5 94 cf 26 6b ..g..=8K.u....&k 395s | 05 eb ad ca 85 5e 42 49 52 0a 44 1a 81 15 74 35 .....^BIR.D...t5 395s | a7 a5 6c c4 ..l. 395s | CONCATENATE_DATA_AND_BASE: 395s | target: EXTRACT_KEY_FROM_KEY 395s | base: base-key@0x55685bc944c0 (16-bytes, AES_KEY_GEN) 395s | params: 16-bytes@0x7ffff22a3db0 395s | key-offset: 0, key-size: 32 395s | EXTRACT_KEY_FROM_KEY: 395s | target: EXTRACT_KEY_FROM_KEY 395s | key_size: 32-bytes 395s | base: base-key@0x55685bc974d0 (48-bytes, EXTRACT_KEY_FROM_KEY) 395s | operation: FLAGS_ONLY 395s | params: 8-bytes@0x7ffff22a3d48 395s | NSS_IKE_PRF_DERIVE: 395s | target: NSS_IKE_PRF_PLUS_DERIVE 395s | base: base-key@0x55685bc984e0 (32-bytes, EXTRACT_KEY_FROM_KEY) 395s | params: 56-bytes@0x7ffff22a3db0 395s | CAVP: IKEv2 key derivation with HMAC-SHA1 extracting all 20 bytes of key@0x55685bc974d0 395s | CAVP: IKEv2 key derivation with HMAC-SHA1: symkey-key@0x55685bc974d0 (20-bytes, NSS_IKE_PRF_PLUS_DERIVE) 395s | sizeof bytes 32 395s | wrapper: (SECItemType)538976380: 1d e5 1c ee 1a 4a ea 10 bd f7 bb 13 b9 26 3f 11 e2 9e ce 50 52 95 68 5c c1 32 38 fd 38 f2 6f 75 395s | CAVP: IKEv2 key derivation with HMAC-SHA1 extracted len 32 bytes at 0x55685bc97e10 395s | unwrapped: 395s | a9 a7 b2 22 b5 9f 8f 48 64 5f 28 a1 db 5b 5f 5d ..."...Hd_(..[_] 395s | 74 79 cb a7 00 00 00 00 00 00 00 00 00 00 00 00 ty.............. 395s | verify_bytes() CAVP: IKEv2 key derivation with HMAC-SHA1: skeyseed: ok 395s | NSS_IKE_PRF_PLUS_DERIVE: 395s | target: EXTRACT_KEY_FROM_KEY 395s | key_size: 132-bytes 395s | base: base-key@0x55685bc974d0 (20-bytes, NSS_IKE_PRF_PLUS_DERIVE) 395s | params: 40-bytes@0x7ffff22a3cf0 395s | CAVP: IKEv2 key derivation with HMAC-SHA1 extracting all 132 bytes of key@0x55685bc981a0 395s | CAVP: IKEv2 key derivation with HMAC-SHA1: symkey-key@0x55685bc981a0 (132-bytes, EXTRACT_KEY_FROM_KEY) 395s | sizeof bytes 144 395s | wrapper: (SECItemType)538976380: ea 58 72 ac 42 ac 07 23 16 ca 22 64 b7 96 0b 8a 0d 62 f2 a3 ca 1f 78 13 f7 2b ae 59 75 7f c3 ff 87 7a 4e e1 4b 80 5a 21 1c 83 fe 20 89 d5 3b 46 be fa 7b 6a f4 7a c7 dc b7 2b f5 97 61 ff fa c0 e1 d2 f5 a0 be e7 d5 19 fe 2a 3c 11 fb 84 21 13 22 b7 e5 d9 bc 0d 39 df 3f 26 02 40 00 b0 7a 9f c4 c9 92 2e 8c 7a 27 83 24 4d 02 55 43 08 28 dd 5f 83 ed df 1e de 82 f6 eb 3b e9 81 3d 96 5e 0d a7 b8 46 25 b6 9f 78 ad d4 d4 24 2a bf bf 9a 0f 395s | CAVP: IKEv2 key derivation with HMAC-SHA1 extracted len 144 bytes at 0x55685bc973b0 395s | unwrapped: 395s | a1 42 93 67 7c c8 0f f8 f9 cc 0e ee 30 d8 95 da .B.g|.......0... 395s | 9d 8f 40 56 66 e3 0e f0 df cb 63 c6 34 a4 60 02 ..@Vf.....c.4.`. 395s | a2 a6 30 80 e5 14 a0 62 76 8b 76 60 6f 9f a5 e9 ..0....bv.v`o... 395s | 92 20 4f c5 a6 70 bd e3 f1 0d 6b 02 71 13 93 6a . O..p....k.q..j 395s | 5c 55 b6 48 a1 94 ae 58 7b 00 88 d5 22 04 b7 02 \U.H...X{..."... 395s | c9 79 fa 28 08 70 d2 ed 41 ef a9 c5 49 fd 11 19 .y.(.p..A...I... 395s | 8a f1 67 0b 14 3d 38 4b d2 75 c5 f5 94 cf 26 6b ..g..=8K.u....&k 395s | 05 eb ad ca 85 5e 42 49 52 0a 44 1a 81 15 74 35 .....^BIR.D...t5 395s | a7 a5 6c c4 00 00 00 00 00 00 00 00 00 00 00 00 ..l............. 395s | verify_bytes() CAVP: IKEv2 key derivation with HMAC-SHA1: DKM: ok 395s | key-offset: 0, key-size: 20 395s | EXTRACT_KEY_FROM_KEY: 395s | target: EXTRACT_KEY_FROM_KEY 395s | key_size: 20-bytes 395s | base: base-key@0x55685bc981a0 (132-bytes, EXTRACT_KEY_FROM_KEY) 395s | operation: FLAGS_ONLY 395s | params: 8-bytes@0x7ffff22a3dc8 395s | CONCATENATE_DATA_AND_BASE: 395s | target: EXTRACT_KEY_FROM_KEY 395s | base: base-key@0x55685bc944c0 (16-bytes, AES_KEY_GEN) 395s | params: 16-bytes@0x7ffff22a3da0 395s | key-offset: 0, key-size: 32 395s | EXTRACT_KEY_FROM_KEY: 395s | target: EXTRACT_KEY_FROM_KEY 395s | key_size: 32-bytes 395s | base: base-key@0x55685bc98230 (48-bytes, EXTRACT_KEY_FROM_KEY) 395s | operation: FLAGS_ONLY 395s | params: 8-bytes@0x7ffff22a3d38 395s | NSS_IKE_PRF_DERIVE: 395s | target: NSS_IKE_PRF_PLUS_DERIVE 395s | base: base-key@0x55685bc95de0 (20-bytes, EXTRACT_KEY_FROM_KEY) 395s | params: 56-bytes@0x7ffff22a3d90 395s | CAVP: IKEv2 key derivation with HMAC-SHA1 extracting all 20 bytes of key@0x55685bc98230 395s | CAVP: IKEv2 key derivation with HMAC-SHA1: symkey-key@0x55685bc98230 (20-bytes, NSS_IKE_PRF_PLUS_DERIVE) 395s | sizeof bytes 32 395s | wrapper: (SECItemType)962868065: 3d 82 79 95 50 cc 60 43 be 0c dc a9 70 d2 08 4d 69 8d a1 66 9a 3b f4 80 53 13 0f 77 66 db 4d 79 395s | CAVP: IKEv2 key derivation with HMAC-SHA1 extracted len 32 bytes at 0x55685bc94490 395s | unwrapped: 395s | 63 e8 11 94 94 6e bd 05 df 7d f5 eb f5 d8 75 00 c....n...}....u. 395s | 56 bf 1f 1d 00 00 00 00 00 00 00 00 00 00 00 00 V............... 395s | verify_bytes() CAVP: IKEv2 key derivation with HMAC-SHA1: skeyseed_rekey: ok 395s ipsec algparse: leak detective found no leaks 395s /usr/libexec/ipsec/pluto: adjusting nssdir to /tmp/tmp.tXewTepaGU 395s /usr/libexec/ipsec/pluto: selftest: skipping lock 395s /usr/libexec/ipsec/pluto: selftest: skipping control socket 395s /usr/libexec/ipsec/pluto: selftest: skipping fork 395s Starting Pluto (Libreswan Version 5.2 IKEv2 IKEv1 XFRM XFRMI esp-hw-offload FORK PTHREAD_SETSCHEDPRIO NSS (IPsec profile) (NSS-KDF) DNSSEC SYSTEMD_WATCHDOG LABELED_IPSEC (SELINUX) LIBCAP_NG LINUX_AUDIT AUTH_PAM NETWORKMANAGER CURL(non-NSS) LDAP(non-NSS) NFTABLES CAT NFLOG) pid:1539 395s operating system: Linux 6.18.0 [Linux 6.18.0-9-generic #9-Ubuntu SMP PREEMPT_DYNAMIC Mon Jan 12 16:49:02 UTC 2026 x86_64] 395s core dump dir: /run/pluto 395s secrets file: /etc/ipsec.secrets 395s Initializing NSS using read-only database "sql:/tmp/tmp.tXewTepaGU" 395s FIPS Mode: OFF 395s NSS crypto library initialized 395s FIPS mode disabled for pluto daemon 395s FIPS HMAC integrity support [not required] 395s libcap-ng capng_apply failed to apply changes, err=-5. see: man capng_apply 395s libcap-ng support [enabled] 395s Linux audit support [enabled] 395s leak-detective disabled 395s NSS crypto [enabled] 395s XAUTH PAM support [enabled] 395s initializing libevent in pthreads mode: headers: 2.1.12-stable (2010c00); library: 2.1.12-stable (2010c00) 395s NAT-Traversal: keep-alive period 20s 395s ERROR: xfrmi is not supported, failed to create ipsec-interface ipsec1 bound to lo 395s ipsec-interface is not working: xfrmi is not supported 395s IPsec Interface [disabled] 395s refreshed session resume keys, issuing key 1 395s Encryption algorithms: 395s AES_CCM_16 {256,192,*128} IKEv1: ESP IKEv2: ESP FIPS aes_ccm, aes_ccm_c 395s AES_CCM_12 {256,192,*128} IKEv1: ESP IKEv2: ESP FIPS aes_ccm_b 395s AES_CCM_8 {256,192,*128} IKEv1: ESP IKEv2: ESP FIPS aes_ccm_a 395s 3DES_CBC [*192] IKEv1: IKE ESP IKEv2: IKE ESP FIPS NSS(CBC) 3des 395s CAMELLIA_CTR {256,192,*128} IKEv1: ESP IKEv2: ESP 395s CAMELLIA_CBC {256,192,*128} IKEv1: IKE ESP IKEv2: IKE ESP NSS(CBC) camellia 395s AES_GCM_16 {256,192,*128} IKEv1: ESP IKEv2: IKE ESP FIPS NSS(AEAD) aes_gcm, aes_gcm_c 395s AES_GCM_12 {256,192,*128} IKEv1: ESP IKEv2: IKE ESP FIPS NSS(AEAD) aes_gcm_b 395s AES_GCM_8 {256,192,*128} IKEv1: ESP IKEv2: IKE ESP FIPS NSS(AEAD) aes_gcm_a 395s AES_CTR {256,192,*128} IKEv1: IKE ESP IKEv2: IKE ESP FIPS NSS(CTR) aesctr 395s AES_CBC {256,192,*128} IKEv1: IKE ESP IKEv2: IKE ESP FIPS NSS(CBC) aes 395s NULL_AUTH_AES_GMAC {256,192,*128} IKEv1: ESP IKEv2: ESP FIPS aes_gmac 395s NULL [] IKEv1: ESP IKEv2: ESP NULL 395s CHACHA20_POLY1305 [*256] IKEv1: IKEv2: IKE ESP NSS(AEAD) chacha20poly1305 395s Hash algorithms: 395s MD5 IKEv1: IKE IKEv2: NSS 395s SHA1 IKEv1: IKE IKEv2: IKE FIPS NSS sha 395s SHA2_256 IKEv1: IKE IKEv2: IKE FIPS NSS sha2, sha256 395s SHA2_384 IKEv1: IKE IKEv2: IKE FIPS NSS sha384 395s SHA2_512 IKEv1: IKE IKEv2: IKE FIPS NSS sha512 395s IDENTITY IKEv1: IKEv2: FIPS 395s PRF algorithms: 395s HMAC_MD5 IKEv1: IKE IKEv2: IKE NSS md5 395s HMAC_SHA1 IKEv1: IKE IKEv2: IKE FIPS NSS sha, sha1 395s HMAC_SHA2_256 IKEv1: IKE IKEv2: IKE FIPS NSS sha2, sha256, sha2_256 395s HMAC_SHA2_384 IKEv1: IKE IKEv2: IKE FIPS NSS sha384, sha2_384 395s HMAC_SHA2_512 IKEv1: IKE IKEv2: IKE FIPS NSS sha512, sha2_512 395s AES_XCBC IKEv1: IKEv2: IKE native(XCBC) aes128_xcbc 395s Integrity algorithms: 395s HMAC_MD5_96 IKEv1: IKE ESP AH IKEv2: IKE ESP AH NSS md5, hmac_md5 395s HMAC_SHA1_96 IKEv1: IKE ESP AH IKEv2: IKE ESP AH FIPS NSS sha, sha1, sha1_96, hmac_sha1 395s HMAC_SHA2_512_256 IKEv1: IKE ESP AH IKEv2: IKE ESP AH FIPS NSS sha512, sha2_512, sha2_512_256, hmac_sha2_512 395s HMAC_SHA2_384_192 IKEv1: IKE ESP AH IKEv2: IKE ESP AH FIPS NSS sha384, sha2_384, sha2_384_192, hmac_sha2_384 395s HMAC_SHA2_256_128 IKEv1: IKE ESP AH IKEv2: IKE ESP AH FIPS NSS sha2, sha256, sha2_256, sha2_256_128, hmac_sha2_256 395s HMAC_SHA2_256_TRUNCBUG IKEv1: ESP AH IKEv2: AH 395s AES_XCBC_96 IKEv1: ESP AH IKEv2: IKE ESP AH native(XCBC) aes_xcbc, aes128_xcbc, aes128_xcbc_96 395s AES_CMAC_96 IKEv1: ESP AH IKEv2: ESP AH FIPS aes_cmac 395s NONE IKEv1: ESP IKEv2: IKE ESP FIPS null 395s DH algorithms: 395s NONE IKEv1: IKEv2: IKE ESP AH FIPS NSS(MODP) null, dh0 395s MODP1536 IKEv1: IKE ESP AH IKEv2: IKE ESP AH NSS(MODP) dh5 395s MODP2048 IKEv1: IKE ESP AH IKEv2: IKE ESP AH FIPS NSS(MODP) dh14 395s MODP3072 IKEv1: IKE ESP AH IKEv2: IKE ESP AH FIPS NSS(MODP) dh15 395s MODP4096 IKEv1: IKE ESP AH IKEv2: IKE ESP AH FIPS NSS(MODP) dh16 395s MODP6144 IKEv1: IKE ESP AH IKEv2: IKE ESP AH FIPS NSS(MODP) dh17 395s MODP8192 IKEv1: IKE ESP AH IKEv2: IKE ESP AH FIPS NSS(MODP) dh18 395s DH19 IKEv1: IKE IKEv2: IKE ESP AH FIPS NSS(ECP) ecp_256, ecp256 395s DH20 IKEv1: IKE IKEv2: IKE ESP AH FIPS NSS(ECP) ecp_384, ecp384 395s DH21 IKEv1: IKE IKEv2: IKE ESP AH FIPS NSS(ECP) ecp_521, ecp521 395s DH31 IKEv1: IKE IKEv2: IKE ESP AH NSS(ECP) curve25519 395s IPCOMP algorithms: 395s DEFLATE IKEv1: ESP AH IKEv2: ESP AH FIPS 395s LZS IKEv1: IKEv2: ESP AH FIPS 395s LZJH IKEv1: IKEv2: ESP AH FIPS 395s testing CAMELLIA_CBC: 395s Camellia: 16 bytes with 128-bit key 395s Camellia: 16 bytes with 128-bit key 395s Camellia: 16 bytes with 256-bit key 395s Camellia: 16 bytes with 256-bit key 395s testing AES_GCM_16: 395s empty string 395s one block 395s two blocks 395s two blocks with associated data 395s testing AES_CTR: 395s Encrypting 16 octets using AES-CTR with 128-bit key 395s Encrypting 32 octets using AES-CTR with 128-bit key 395s Encrypting 36 octets using AES-CTR with 128-bit key 395s Encrypting 16 octets using AES-CTR with 192-bit key 395s Encrypting 32 octets using AES-CTR with 192-bit key 395s Encrypting 36 octets using AES-CTR with 192-bit key 395s Encrypting 16 octets using AES-CTR with 256-bit key 395s Encrypting 32 octets using AES-CTR with 256-bit key 395s Encrypting 36 octets using AES-CTR with 256-bit key 395s testing AES_CBC: 395s Encrypting 16 bytes (1 block) using AES-CBC with 128-bit key 395s Encrypting 32 bytes (2 blocks) using AES-CBC with 128-bit key 395s Encrypting 48 bytes (3 blocks) using AES-CBC with 128-bit key 395s Encrypting 64 bytes (4 blocks) using AES-CBC with 128-bit key 395s testing AES_XCBC: 395s RFC 3566 Test Case 1: AES-XCBC-MAC-96 with 0-byte input 395s RFC 3566 Test Case 2: AES-XCBC-MAC-96 with 3-byte input 395s RFC 3566 Test Case 3: AES-XCBC-MAC-96 with 16-byte input 395s RFC 3566 Test Case 4: AES-XCBC-MAC-96 with 20-byte input 395s RFC 3566 Test Case 5: AES-XCBC-MAC-96 with 32-byte input 395s RFC 3566 Test Case 6: AES-XCBC-MAC-96 with 34-byte input 395s RFC 3566 Test Case 7: AES-XCBC-MAC-96 with 1000-byte input 395s RFC 4434 Test Case AES-XCBC-PRF-128 with 20-byte input (key length 16) 395s RFC 4434 Test Case AES-XCBC-PRF-128 with 20-byte input (key length 10) 395s RFC 4434 Test Case AES-XCBC-PRF-128 with 20-byte input (key length 18) 395s testing HMAC_MD5: 395s RFC 2104: MD5_HMAC test 1 395s RFC 2104: MD5_HMAC test 2 395s RFC 2104: MD5_HMAC test 3 395s testing HMAC_SHA1: 395s CAVP: IKEv2 key derivation with HMAC-SHA1 395s selftest: exiting pluto 395s initializing NSS db 395s running pluto selftest 396s autopkgtest [20:23:04]: test cryptocheck: -----------------------] 396s autopkgtest [20:23:04]: test cryptocheck: - - - - - - - - - - results - - - - - - - - - - 396s cryptocheck PASS 396s autopkgtest [20:23:04]: test cavp: preparing testbed 416s Creating nova instance adt-resolute-amd64-libreswan-20260206-201628-juju-7f2275-prod-proposed-migration-environment-15-af9b9ff4-a3fc-47f9-975b-fe1125d0cefc from image adt/ubuntu-resolute-amd64-server-20260204.img (UUID fedf54b4-458b-493e-8072-6425c19717b4)... 488s autopkgtest [20:24:36]: testbed dpkg architecture: amd64 489s autopkgtest [20:24:37]: testbed apt version: 3.1.14 489s autopkgtest [20:24:37]: @@@@@@@@@@@@@@@@@@@@ test bed setup 489s autopkgtest [20:24:37]: testbed release detected to be: resolute 490s autopkgtest [20:24:38]: updating testbed package index (apt update) 490s Get:1 http://ftpmaster.internal/ubuntu resolute-proposed InRelease [124 kB] 490s Hit:2 http://ftpmaster.internal/ubuntu resolute InRelease 490s Hit:3 http://ftpmaster.internal/ubuntu resolute-updates InRelease 490s Hit:4 http://ftpmaster.internal/ubuntu resolute-security InRelease 490s Get:5 http://ftpmaster.internal/ubuntu resolute-proposed/restricted Sources [10.7 kB] 490s Get:6 http://ftpmaster.internal/ubuntu resolute-proposed/main Sources [199 kB] 490s Get:7 http://ftpmaster.internal/ubuntu resolute-proposed/universe Sources [1528 kB] 490s Get:8 http://ftpmaster.internal/ubuntu resolute-proposed/multiverse Sources [32.1 kB] 490s Get:9 http://ftpmaster.internal/ubuntu resolute-proposed/main amd64 Packages [265 kB] 490s Get:10 http://ftpmaster.internal/ubuntu resolute-proposed/main i386 Packages [188 kB] 490s Get:11 http://ftpmaster.internal/ubuntu resolute-proposed/main amd64 c-n-f Metadata [6500 B] 490s Get:12 http://ftpmaster.internal/ubuntu resolute-proposed/restricted amd64 Packages [80.4 kB] 490s Get:13 http://ftpmaster.internal/ubuntu resolute-proposed/restricted i386 Packages [3692 B] 490s Get:14 http://ftpmaster.internal/ubuntu resolute-proposed/restricted amd64 c-n-f Metadata [336 B] 490s Get:15 http://ftpmaster.internal/ubuntu resolute-proposed/universe amd64 Packages [1432 kB] 491s Get:16 http://ftpmaster.internal/ubuntu resolute-proposed/universe i386 Packages [550 kB] 491s Get:17 http://ftpmaster.internal/ubuntu resolute-proposed/universe amd64 c-n-f Metadata [36.8 kB] 491s Get:18 http://ftpmaster.internal/ubuntu resolute-proposed/multiverse amd64 Packages [28.2 kB] 491s Get:19 http://ftpmaster.internal/ubuntu resolute-proposed/multiverse i386 Packages [4892 B] 491s Get:20 http://ftpmaster.internal/ubuntu resolute-proposed/multiverse amd64 c-n-f Metadata [1104 B] 492s Fetched 4492 kB in 2s (2957 kB/s) 492s Reading package lists... 493s Hit:1 http://ftpmaster.internal/ubuntu resolute-proposed InRelease 493s Hit:2 http://ftpmaster.internal/ubuntu resolute InRelease 493s Hit:3 http://ftpmaster.internal/ubuntu resolute-updates InRelease 493s Hit:4 http://ftpmaster.internal/ubuntu resolute-security InRelease 494s Reading package lists... 494s Reading package lists... 494s Building dependency tree... 494s Reading state information... 494s Calculating upgrade... 494s The following packages will be upgraded: 494s amd64-microcode apt busybox-initramfs busybox-static dmsetup findutils less 494s libapt-pkg7.0 libattr1 libc-bin libc-gconv-modules-extra libc6 494s libdevmapper1.02.1 libdrm-amdgpu1 libdrm-common libdrm2 libgpm2 libkeyutils1 494s libmaxminddb0 libnpth0t64 libsensors-config libsensors5 locales mawk patch 494s pollinate python3-linkify-it python3-markdown-it python3-referencing sed tar 494s 31 upgraded, 0 newly installed, 0 to remove and 0 not upgraded. 494s Need to get 14.4 MB of archives. 494s After this operation, 270 kB disk space will be freed. 494s Get:1 http://ftpmaster.internal/ubuntu resolute/main amd64 findutils amd64 4.10.0-3build2 [307 kB] 494s Get:2 http://ftpmaster.internal/ubuntu resolute/main amd64 sed amd64 4.9-2build3 [195 kB] 494s Get:3 http://ftpmaster.internal/ubuntu resolute/main amd64 tar amd64 1.35+dfsg-3.1build2 [257 kB] 495s Get:4 http://ftpmaster.internal/ubuntu resolute-proposed/main amd64 libc-gconv-modules-extra amd64 2.42-2ubuntu5 [1394 kB] 495s Get:5 http://ftpmaster.internal/ubuntu resolute-proposed/main amd64 libc6 amd64 2.42-2ubuntu5 [2041 kB] 495s Get:6 http://ftpmaster.internal/ubuntu resolute-proposed/main amd64 libc-bin amd64 2.42-2ubuntu5 [702 kB] 495s Get:7 http://ftpmaster.internal/ubuntu resolute/main amd64 libattr1 amd64 1:2.5.2-3build2 [11.4 kB] 495s Get:8 http://ftpmaster.internal/ubuntu resolute/main amd64 mawk amd64 1.3.4.20260129-1 [133 kB] 495s Get:9 http://ftpmaster.internal/ubuntu resolute/main amd64 libapt-pkg7.0 amd64 3.1.15 [1151 kB] 496s Get:10 http://ftpmaster.internal/ubuntu resolute/main amd64 apt amd64 3.1.15 [1479 kB] 496s Get:11 http://ftpmaster.internal/ubuntu resolute/main amd64 libdevmapper1.02.1 amd64 2:1.02.205-2ubuntu3 [142 kB] 496s Get:12 http://ftpmaster.internal/ubuntu resolute/main amd64 dmsetup amd64 2:1.02.205-2ubuntu3 [79.4 kB] 496s Get:13 http://ftpmaster.internal/ubuntu resolute/main amd64 less amd64 668-1build1 [172 kB] 496s Get:14 http://ftpmaster.internal/ubuntu resolute/main amd64 libkeyutils1 amd64 1.6.3-6ubuntu3 [10.6 kB] 496s Get:15 http://ftpmaster.internal/ubuntu resolute-proposed/main amd64 locales all 2.42-2ubuntu5 [4255 kB] 496s Get:16 http://ftpmaster.internal/ubuntu resolute/main amd64 python3-linkify-it all 2.0.3-1ubuntu3 [19.4 kB] 496s Get:17 http://ftpmaster.internal/ubuntu resolute/main amd64 python3-markdown-it all 3.0.0-3build1 [54.4 kB] 496s Get:18 http://ftpmaster.internal/ubuntu resolute/main amd64 busybox-static amd64 1:1.37.0-7ubuntu1 [1034 kB] 496s Get:19 http://ftpmaster.internal/ubuntu resolute/main amd64 libdrm-common all 2.4.131-1 [9774 B] 496s Get:20 http://ftpmaster.internal/ubuntu resolute/main amd64 libdrm2 amd64 2.4.131-1 [42.3 kB] 496s Get:21 http://ftpmaster.internal/ubuntu resolute/main amd64 libgpm2 amd64 1.20.7-12build1 [14.4 kB] 496s Get:22 http://ftpmaster.internal/ubuntu resolute/main amd64 libmaxminddb0 amd64 1.12.2-1build2 [18.9 kB] 496s Get:23 http://ftpmaster.internal/ubuntu resolute/main amd64 libsensors-config all 1:3.6.2-2build1 [6862 B] 496s Get:24 http://ftpmaster.internal/ubuntu resolute/main amd64 libsensors5 amd64 1:3.6.2-2build1 [28.9 kB] 496s Get:25 http://ftpmaster.internal/ubuntu resolute/main amd64 busybox-initramfs amd64 1:1.37.0-7ubuntu1 [191 kB] 496s Get:26 http://ftpmaster.internal/ubuntu resolute/main amd64 libdrm-amdgpu1 amd64 2.4.131-1 [23.2 kB] 496s Get:27 http://ftpmaster.internal/ubuntu resolute/main amd64 libnpth0t64 amd64 1.8-3build1 [9302 B] 496s Get:28 http://ftpmaster.internal/ubuntu resolute/main amd64 patch amd64 2.8-2build1 [95.7 kB] 496s Get:29 http://ftpmaster.internal/ubuntu resolute/main amd64 pollinate all 4.33-4ubuntu5 [14.0 kB] 496s Get:30 http://ftpmaster.internal/ubuntu resolute/main amd64 python3-referencing all 0.36.2-1ubuntu2 [22.2 kB] 496s Get:31 http://ftpmaster.internal/ubuntu resolute/main amd64 amd64-microcode amd64 3.20251202.1ubuntu1 [459 kB] 496s dpkg-preconfigure: unable to re-open stdin: No such file or directory 496s Fetched 14.4 MB in 2s (7272 kB/s) 497s (Reading database ... (Reading database ... 5% (Reading database ... 10% (Reading database ... 15% (Reading database ... 20% (Reading database ... 25% (Reading database ... 30% (Reading database ... 35% (Reading database ... 40% (Reading database ... 45% (Reading database ... 50% (Reading database ... 55% (Reading database ... 60% (Reading database ... 65% (Reading database ... 70% (Reading database ... 75% (Reading database ... 80% (Reading database ... 85% (Reading database ... 90% (Reading database ... 95% (Reading database ... 100% (Reading database ... 83957 files and directories currently installed.) 497s Preparing to unpack .../findutils_4.10.0-3build2_amd64.deb ... 497s Unpacking findutils (4.10.0-3build2) over (4.10.0-3build1) ... 497s Setting up findutils (4.10.0-3build2) ... 497s (Reading database ... (Reading database ... 5% (Reading database ... 10% (Reading database ... 15% (Reading database ... 20% (Reading database ... 25% (Reading database ... 30% (Reading database ... 35% (Reading database ... 40% (Reading database ... 45% (Reading database ... 50% (Reading database ... 55% (Reading database ... 60% (Reading database ... 65% (Reading database ... 70% (Reading database ... 75% (Reading database ... 80% (Reading database ... 85% (Reading database ... 90% (Reading database ... 95% (Reading database ... 100% (Reading database ... 83957 files and directories currently installed.) 497s Preparing to unpack .../sed_4.9-2build3_amd64.deb ... 497s Unpacking sed (4.9-2build3) over (4.9-2build2) ... 497s Setting up sed (4.9-2build3) ... 497s (Reading database ... (Reading database ... 5% (Reading database ... 10% (Reading database ... 15% (Reading database ... 20% (Reading database ... 25% (Reading database ... 30% (Reading database ... 35% (Reading database ... 40% (Reading database ... 45% (Reading database ... 50% (Reading database ... 55% (Reading database ... 60% (Reading database ... 65% (Reading database ... 70% (Reading database ... 75% (Reading database ... 80% (Reading database ... 85% (Reading database ... 90% (Reading database ... 95% (Reading database ... 100% (Reading database ... 83957 files and directories currently installed.) 497s Preparing to unpack .../tar_1.35+dfsg-3.1build2_amd64.deb ... 497s Unpacking tar (1.35+dfsg-3.1build2) over (1.35+dfsg-3.1build1) ... 497s Setting up tar (1.35+dfsg-3.1build2) ... 497s (Reading database ... (Reading database ... 5% (Reading database ... 10% (Reading database ... 15% (Reading database ... 20% (Reading database ... 25% (Reading database ... 30% (Reading database ... 35% (Reading database ... 40% (Reading database ... 45% (Reading database ... 50% (Reading database ... 55% (Reading database ... 60% (Reading database ... 65% (Reading database ... 70% (Reading database ... 75% (Reading database ... 80% (Reading database ... 85% (Reading database ... 90% (Reading database ... 95% (Reading database ... 100% (Reading database ... 83957 files and directories currently installed.) 497s Preparing to unpack .../libc-gconv-modules-extra_2.42-2ubuntu5_amd64.deb ... 497s Unpacking libc-gconv-modules-extra:amd64 (2.42-2ubuntu5) over (2.42-2ubuntu4) ... 497s Setting up libc-gconv-modules-extra:amd64 (2.42-2ubuntu5) ... 497s (Reading database ... (Reading database ... 5% (Reading database ... 10% (Reading database ... 15% (Reading database ... 20% (Reading database ... 25% (Reading database ... 30% (Reading database ... 35% (Reading database ... 40% (Reading database ... 45% (Reading database ... 50% (Reading database ... 55% (Reading database ... 60% (Reading database ... 65% (Reading database ... 70% (Reading database ... 75% (Reading database ... 80% (Reading database ... 85% (Reading database ... 90% (Reading database ... 95% (Reading database ... 100% (Reading database ... 83957 files and directories currently installed.) 497s Preparing to unpack .../libc6_2.42-2ubuntu5_amd64.deb ... 497s Unpacking libc6:amd64 (2.42-2ubuntu5) over (2.42-2ubuntu4) ... 497s Setting up libc6:amd64 (2.42-2ubuntu5) ... 497s (Reading database ... (Reading database ... 5% (Reading database ... 10% (Reading database ... 15% (Reading database ... 20% (Reading database ... 25% (Reading database ... 30% (Reading database ... 35% (Reading database ... 40% (Reading database ... 45% (Reading database ... 50% (Reading database ... 55% (Reading database ... 60% (Reading database ... 65% (Reading database ... 70% (Reading database ... 75% (Reading database ... 80% (Reading database ... 85% (Reading database ... 90% (Reading database ... 95% (Reading database ... 100% (Reading database ... 83957 files and directories currently installed.) 497s Preparing to unpack .../libc-bin_2.42-2ubuntu5_amd64.deb ... 497s Unpacking libc-bin (2.42-2ubuntu5) over (2.42-2ubuntu4) ... 497s Setting up libc-bin (2.42-2ubuntu5) ... 497s (Reading database ... (Reading database ... 5% (Reading database ... 10% (Reading database ... 15% (Reading database ... 20% (Reading database ... 25% (Reading database ... 30% (Reading database ... 35% (Reading database ... 40% (Reading database ... 45% (Reading database ... 50% (Reading database ... 55% (Reading database ... 60% (Reading database ... 65% (Reading database ... 70% (Reading database ... 75% (Reading database ... 80% (Reading database ... 85% (Reading database ... 90% (Reading database ... 95% (Reading database ... 100% (Reading database ... 83957 files and directories currently installed.) 497s Preparing to unpack .../libattr1_1%3a2.5.2-3build2_amd64.deb ... 497s Unpacking libattr1:amd64 (1:2.5.2-3build2) over (1:2.5.2-3build1) ... 497s Setting up libattr1:amd64 (1:2.5.2-3build2) ... 497s (Reading database ... (Reading database ... 5% (Reading database ... 10% (Reading database ... 15% (Reading database ... 20% (Reading database ... 25% (Reading database ... 30% (Reading database ... 35% (Reading database ... 40% (Reading database ... 45% (Reading database ... 50% (Reading database ... 55% (Reading database ... 60% (Reading database ... 65% (Reading database ... 70% (Reading database ... 75% (Reading database ... 80% (Reading database ... 85% (Reading database ... 90% (Reading database ... 95% (Reading database ... 100% (Reading database ... 83957 files and directories currently installed.) 497s Preparing to unpack .../00-mawk_1.3.4.20260129-1_amd64.deb ... 497s Unpacking mawk (1.3.4.20260129-1) over (1.3.4.20250131-2) ... 497s Preparing to unpack .../01-libapt-pkg7.0_3.1.15_amd64.deb ... 497s Unpacking libapt-pkg7.0:amd64 (3.1.15) over (3.1.14) ... 497s Preparing to unpack .../02-apt_3.1.15_amd64.deb ... 498s Unpacking apt (3.1.15) over (3.1.14) ... 498s Preparing to unpack .../03-libdevmapper1.02.1_2%3a1.02.205-2ubuntu3_amd64.deb ... 498s Unpacking libdevmapper1.02.1:amd64 (2:1.02.205-2ubuntu3) over (2:1.02.205-2ubuntu2) ... 498s Preparing to unpack .../04-dmsetup_2%3a1.02.205-2ubuntu3_amd64.deb ... 498s Unpacking dmsetup (2:1.02.205-2ubuntu3) over (2:1.02.205-2ubuntu2) ... 498s Preparing to unpack .../05-less_668-1build1_amd64.deb ... 498s Unpacking less (668-1build1) over (668-1) ... 498s Preparing to unpack .../06-libkeyutils1_1.6.3-6ubuntu3_amd64.deb ... 498s Unpacking libkeyutils1:amd64 (1.6.3-6ubuntu3) over (1.6.3-6ubuntu2) ... 498s Preparing to unpack .../07-locales_2.42-2ubuntu5_all.deb ... 498s Unpacking locales (2.42-2ubuntu5) over (2.42-2ubuntu4) ... 498s Preparing to unpack .../08-python3-linkify-it_2.0.3-1ubuntu3_all.deb ... 498s Unpacking python3-linkify-it (2.0.3-1ubuntu3) over (2.0.3-1ubuntu2) ... 498s Preparing to unpack .../09-python3-markdown-it_3.0.0-3build1_all.deb ... 498s Unpacking python3-markdown-it (3.0.0-3build1) over (3.0.0-3) ... 498s Preparing to unpack .../10-busybox-static_1%3a1.37.0-7ubuntu1_amd64.deb ... 498s Unpacking busybox-static (1:1.37.0-7ubuntu1) over (1:1.37.0-4ubuntu1) ... 498s Preparing to unpack .../11-libdrm-common_2.4.131-1_all.deb ... 498s Unpacking libdrm-common (2.4.131-1) over (2.4.129-1) ... 498s Preparing to unpack .../12-libdrm2_2.4.131-1_amd64.deb ... 498s Unpacking libdrm2:amd64 (2.4.131-1) over (2.4.129-1) ... 498s Preparing to unpack .../13-libgpm2_1.20.7-12build1_amd64.deb ... 498s Unpacking libgpm2:amd64 (1.20.7-12build1) over (1.20.7-12) ... 498s Preparing to unpack .../14-libmaxminddb0_1.12.2-1build2_amd64.deb ... 498s Unpacking libmaxminddb0:amd64 (1.12.2-1build2) over (1.12.2-1build1) ... 498s Preparing to unpack .../15-libsensors-config_1%3a3.6.2-2build1_all.deb ... 498s Unpacking libsensors-config (1:3.6.2-2build1) over (1:3.6.2-2) ... 498s Preparing to unpack .../16-libsensors5_1%3a3.6.2-2build1_amd64.deb ... 498s Unpacking libsensors5:amd64 (1:3.6.2-2build1) over (1:3.6.2-2) ... 498s Preparing to unpack .../17-busybox-initramfs_1%3a1.37.0-7ubuntu1_amd64.deb ... 498s Unpacking busybox-initramfs (1:1.37.0-7ubuntu1) over (1:1.37.0-4ubuntu1) ... 498s Preparing to unpack .../18-libdrm-amdgpu1_2.4.131-1_amd64.deb ... 498s Unpacking libdrm-amdgpu1:amd64 (2.4.131-1) over (2.4.129-1) ... 498s Preparing to unpack .../19-libnpth0t64_1.8-3build1_amd64.deb ... 498s Unpacking libnpth0t64:amd64 (1.8-3build1) over (1.8-3) ... 498s Preparing to unpack .../20-patch_2.8-2build1_amd64.deb ... 498s Unpacking patch (2.8-2build1) over (2.8-2) ... 498s Preparing to unpack .../21-pollinate_4.33-4ubuntu5_all.deb ... 498s Unpacking pollinate (4.33-4ubuntu5) over (4.33-4ubuntu4) ... 499s Preparing to unpack .../22-python3-referencing_0.36.2-1ubuntu2_all.deb ... 499s Unpacking python3-referencing (0.36.2-1ubuntu2) over (0.36.2-1ubuntu1) ... 499s Preparing to unpack .../23-amd64-microcode_3.20251202.1ubuntu1_amd64.deb ... 499s Unpacking amd64-microcode (3.20251202.1ubuntu1) over (3.20250708.1ubuntu1) ... 499s Setting up libnpth0t64:amd64 (1.8-3build1) ... 499s Setting up libkeyutils1:amd64 (1.6.3-6ubuntu3) ... 499s Setting up libgpm2:amd64 (1.20.7-12build1) ... 499s Setting up libmaxminddb0:amd64 (1.12.2-1build2) ... 499s Setting up libsensors-config (1:3.6.2-2build1) ... 499s Setting up less (668-1build1) ... 499s Setting up amd64-microcode (3.20251202.1ubuntu1) ... 499s amd64-microcode: microcode will be updated at next boot 499s Setting up locales (2.42-2ubuntu5) ... 499s Generating locales (this might take a while)... 500s en_US.UTF-8... done 500s Generation complete. 500s Setting up pollinate (4.33-4ubuntu5) ... 510s Setting up busybox-static (1:1.37.0-7ubuntu1) ... 510s Setting up patch (2.8-2build1) ... 510s Setting up libsensors5:amd64 (1:3.6.2-2build1) ... 510s Setting up busybox-initramfs (1:1.37.0-7ubuntu1) ... 510s Setting up libdevmapper1.02.1:amd64 (2:1.02.205-2ubuntu3) ... 510s Setting up dmsetup (2:1.02.205-2ubuntu3) ... 510s Setting up python3-linkify-it (2.0.3-1ubuntu3) ... 510s Setting up mawk (1.3.4.20260129-1) ... 511s Setting up libapt-pkg7.0:amd64 (3.1.15) ... 511s Setting up libdrm-common (2.4.131-1) ... 511s Setting up python3-referencing (0.36.2-1ubuntu2) ... 511s Setting up apt (3.1.15) ... 511s Setting up python3-markdown-it (3.0.0-3build1) ... 511s Setting up libdrm2:amd64 (2.4.131-1) ... 511s Setting up libdrm-amdgpu1:amd64 (2.4.131-1) ... 511s Processing triggers for libc-bin (2.42-2ubuntu5) ... 511s Processing triggers for systemd (259-1ubuntu3) ... 512s Processing triggers for man-db (2.13.1-1) ... 513s Processing triggers for install-info (7.2-5) ... 513s Processing triggers for initramfs-tools (0.150ubuntu7) ... 513s update-initramfs: Generating /boot/initrd.img-6.18.0-9-generic 518s autopkgtest [20:25:06]: upgrading testbed (apt dist-upgrade and autopurge) 519s Reading package lists... 519s Building dependency tree... 519s Reading state information... 519s Calculating upgrade... 519s 0 upgraded, 0 newly installed, 0 to remove and 0 not upgraded. 519s Reading package lists... 520s Building dependency tree... 520s Reading state information... 520s Solving dependencies... 520s 0 upgraded, 0 newly installed, 0 to remove and 0 not upgraded. 520s autopkgtest [20:25:08]: rebooting testbed after setup commands that affected boot 553s Reading package lists... 554s Building dependency tree... 554s Reading state information... 554s Solving dependencies... 554s The following NEW packages will be installed: 554s dns-root-data libevent-2.1-7t64 libevent-pthreads-2.1-7t64 libldns3t64 554s libnss3-tools libreswan libunbound8 554s 0 upgraded, 7 newly installed, 0 to remove and 0 not upgraded. 554s Need to get 2953 kB of archives. 554s After this operation, 11.9 MB of additional disk space will be used. 554s Get:1 http://ftpmaster.internal/ubuntu resolute/main amd64 dns-root-data all 2025080400build1 [6022 B] 554s Get:2 http://ftpmaster.internal/ubuntu resolute/main amd64 libnss3-tools amd64 2:3.120-1 [626 kB] 554s Get:3 http://ftpmaster.internal/ubuntu resolute/main amd64 libevent-pthreads-2.1-7t64 amd64 2.1.12-stable-10build1 [8360 B] 554s Get:4 http://ftpmaster.internal/ubuntu resolute/universe amd64 libldns3t64 amd64 1.8.4-2build1 [173 kB] 554s Get:5 http://ftpmaster.internal/ubuntu resolute/main amd64 libevent-2.1-7t64 amd64 2.1.12-stable-10build1 [155 kB] 554s Get:6 http://ftpmaster.internal/ubuntu resolute/main amd64 libunbound8 amd64 1.24.2-1ubuntu1 [462 kB] 554s Get:7 http://ftpmaster.internal/ubuntu resolute/universe amd64 libreswan amd64 5.2-2.2ubuntu1 [1523 kB] 554s Fetched 2953 kB in 0s (24.3 MB/s) 554s Selecting previously unselected package dns-root-data. 554s (Reading database ... (Reading database ... 5% (Reading database ... 10% (Reading database ... 15% (Reading database ... 20% (Reading database ... 25% (Reading database ... 30% (Reading database ... 35% (Reading database ... 40% (Reading database ... 45% (Reading database ... 50% (Reading database ... 55% (Reading database ... 60% (Reading database ... 65% (Reading database ... 70% (Reading database ... 75% (Reading database ... 80% (Reading database ... 85% (Reading database ... 90% (Reading database ... 95% (Reading database ... 100% (Reading database ... 83962 files and directories currently installed.) 554s Preparing to unpack .../0-dns-root-data_2025080400build1_all.deb ... 554s Unpacking dns-root-data (2025080400build1) ... 554s Selecting previously unselected package libnss3-tools. 554s Preparing to unpack .../1-libnss3-tools_2%3a3.120-1_amd64.deb ... 554s Unpacking libnss3-tools (2:3.120-1) ... 554s Selecting previously unselected package libevent-pthreads-2.1-7t64:amd64. 554s Preparing to unpack .../2-libevent-pthreads-2.1-7t64_2.1.12-stable-10build1_amd64.deb ... 554s Unpacking libevent-pthreads-2.1-7t64:amd64 (2.1.12-stable-10build1) ... 554s Selecting previously unselected package libldns3t64:amd64. 554s Preparing to unpack .../3-libldns3t64_1.8.4-2build1_amd64.deb ... 554s Unpacking libldns3t64:amd64 (1.8.4-2build1) ... 554s Selecting previously unselected package libevent-2.1-7t64:amd64. 554s Preparing to unpack .../4-libevent-2.1-7t64_2.1.12-stable-10build1_amd64.deb ... 554s Unpacking libevent-2.1-7t64:amd64 (2.1.12-stable-10build1) ... 554s Selecting previously unselected package libunbound8:amd64. 554s Preparing to unpack .../5-libunbound8_1.24.2-1ubuntu1_amd64.deb ... 554s Unpacking libunbound8:amd64 (1.24.2-1ubuntu1) ... 554s Selecting previously unselected package libreswan. 554s Preparing to unpack .../6-libreswan_5.2-2.2ubuntu1_amd64.deb ... 554s Unpacking libreswan (5.2-2.2ubuntu1) ... 554s Setting up libldns3t64:amd64 (1.8.4-2build1) ... 554s Setting up libevent-pthreads-2.1-7t64:amd64 (2.1.12-stable-10build1) ... 554s Setting up libevent-2.1-7t64:amd64 (2.1.12-stable-10build1) ... 554s Setting up dns-root-data (2025080400build1) ... 554s Setting up libunbound8:amd64 (1.24.2-1ubuntu1) ... 554s Setting up libnss3-tools (2:3.120-1) ... 554s Setting up libreswan (5.2-2.2ubuntu1) ... 555s ipsec.service is a disabled or a static unit, not starting it. 555s Processing triggers for man-db (2.13.1-1) ... 555s Processing triggers for libc-bin (2.42-2ubuntu5) ... 617s autopkgtest [20:26:45]: test cavp: [----------------------- 618s Testing installed CAVP binary: /usr/libexec/ipsec/cavp 619s test: IKE v2 619s Reading from ikev2.fax 622s test: IKE v1 Digital Signature Authentication 622s Reading from ikev1_dsa.fax 624s test: IKE v1 Pre-shared Key Authentication 624s Reading from ikev1_psk.fax 626s /tmp/autopkgtest.B9Q77a/build.FNo/src 626s autopkgtest [20:26:54]: test cavp: -----------------------] 626s autopkgtest [20:26:54]: test cavp: - - - - - - - - - - results - - - - - - - - - - 626s cavp PASS 626s autopkgtest [20:26:54]: @@@@@@@@@@@@@@@@@@@@ summary 626s opportunistic SKIP exit status 77 and marked as skippable 626s cryptocheck PASS 626s cavp PASS