0s autopkgtest [03:04:34]: starting date and time: 2026-02-03 03:04:34+0000 0s autopkgtest [03:04:34]: git checkout: 4b346b80 nova: make wait_reboot return success even when a no-op 0s autopkgtest [03:04:34]: host juju-7f2275-prod-proposed-migration-environment-20; command line: /home/ubuntu/autopkgtest/runner/autopkgtest --output-dir /tmp/autopkgtest-work.pjnqv5gr/out --timeout-copy=6000 --needs-internet=try --setup-commands /home/ubuntu/autopkgtest-cloud/worker-config-production/setup-canonical.sh --apt-pocket=proposed=src:ca-certificates --apt-upgrade libreswan --timeout-short=300 --timeout-copy=20000 --timeout-build=20000 --env=ADT_TEST_TRIGGERS=ca-certificates/20250419build1 -- ssh -s /home/ubuntu/autopkgtest/ssh-setup/nova -- --flavor autopkgtest-cpu2-ram4-disk20-arm64 --security-groups autopkgtest-juju-7f2275-prod-proposed-migration-environment-20@sto01-arm64-17.secgroup --name adt-resolute-arm64-libreswan-20260203-030434-juju-7f2275-prod-proposed-migration-environment-20-452e2a45-054c-448a-921c-182b44bafda6 --image adt/ubuntu-resolute-arm64-server --keyname testbed-juju-7f2275-prod-proposed-migration-environment-20 --net-id=net_prod-autopkgtest-workers-arm64 -e TERM=linux --mirror=http://ftpmaster.internal/ubuntu/ 4s Creating nova instance adt-resolute-arm64-libreswan-20260203-030434-juju-7f2275-prod-proposed-migration-environment-20-452e2a45-054c-448a-921c-182b44bafda6 from image adt/ubuntu-resolute-arm64-server-20260202.img (UUID e5b8703b-d12e-4238-a70e-a72a9b0d7948)... 60s autopkgtest [03:05:34]: testbed dpkg architecture: arm64 61s autopkgtest [03:05:35]: testbed apt version: 3.1.14 61s autopkgtest [03:05:35]: @@@@@@@@@@@@@@@@@@@@ test bed setup 61s autopkgtest [03:05:35]: testbed release detected to be: None 62s autopkgtest [03:05:36]: updating testbed package index (apt update) 62s Get:1 http://ftpmaster.internal/ubuntu resolute-proposed InRelease [124 kB] 63s Hit:2 http://ftpmaster.internal/ubuntu resolute InRelease 63s Hit:3 http://ftpmaster.internal/ubuntu resolute-updates InRelease 63s Hit:4 http://ftpmaster.internal/ubuntu resolute-security InRelease 63s Get:5 http://ftpmaster.internal/ubuntu resolute-proposed/multiverse Sources [28.4 kB] 63s Get:6 http://ftpmaster.internal/ubuntu resolute-proposed/universe Sources [1275 kB] 63s Get:7 http://ftpmaster.internal/ubuntu resolute-proposed/restricted Sources [5256 B] 63s Get:8 http://ftpmaster.internal/ubuntu resolute-proposed/main Sources [271 kB] 63s Get:9 http://ftpmaster.internal/ubuntu resolute-proposed/main arm64 Packages [309 kB] 63s Get:10 http://ftpmaster.internal/ubuntu resolute-proposed/main arm64 c-n-f Metadata [3628 B] 63s Get:11 http://ftpmaster.internal/ubuntu resolute-proposed/restricted arm64 Packages [52.9 kB] 63s Get:12 http://ftpmaster.internal/ubuntu resolute-proposed/restricted arm64 c-n-f Metadata [328 B] 63s Get:13 http://ftpmaster.internal/ubuntu resolute-proposed/universe arm64 Packages [1116 kB] 63s Get:14 http://ftpmaster.internal/ubuntu resolute-proposed/universe arm64 c-n-f Metadata [26.2 kB] 63s Get:15 http://ftpmaster.internal/ubuntu resolute-proposed/multiverse arm64 Packages [21.8 kB] 63s Get:16 http://ftpmaster.internal/ubuntu resolute-proposed/multiverse arm64 c-n-f Metadata [756 B] 66s Fetched 3234 kB in 1s (3017 kB/s) 67s Reading package lists... 68s Hit:1 http://ftpmaster.internal/ubuntu resolute-proposed InRelease 68s Hit:2 http://ftpmaster.internal/ubuntu resolute InRelease 68s Hit:3 http://ftpmaster.internal/ubuntu resolute-updates InRelease 68s Hit:4 http://ftpmaster.internal/ubuntu resolute-security InRelease 69s Reading package lists... 69s Reading package lists... 69s Building dependency tree... 69s Reading state information... 69s Calculating upgrade... 70s The following packages will be upgraded: 70s ca-certificates cloud-init cloud-init-base libexpat1 liblocale-gettext-perl 70s 5 upgraded, 0 newly installed, 0 to remove and 0 not upgraded. 70s Need to get 891 kB of archives. 70s After this operation, 2048 B of additional disk space will be used. 70s Get:1 http://ftpmaster.internal/ubuntu resolute/main arm64 libexpat1 arm64 2.7.4-1 [85.7 kB] 70s Get:2 http://ftpmaster.internal/ubuntu resolute/main arm64 liblocale-gettext-perl arm64 1.07-8 [15.6 kB] 70s Get:3 http://ftpmaster.internal/ubuntu resolute-proposed/main arm64 ca-certificates all 20250419build1 [163 kB] 70s Get:4 http://ftpmaster.internal/ubuntu resolute/main arm64 cloud-init-base all 25.4~4g26c7d38d-0ubuntu1 [624 kB] 70s Get:5 http://ftpmaster.internal/ubuntu resolute/main arm64 cloud-init all 25.4~4g26c7d38d-0ubuntu1 [2120 B] 70s dpkg-preconfigure: unable to re-open stdin: No such file or directory 70s Fetched 891 kB in 0s (5512 kB/s) 70s (Reading database ... (Reading database ... 5% (Reading database ... 10% (Reading database ... 15% (Reading database ... 20% (Reading database ... 25% (Reading database ... 30% (Reading database ... 35% (Reading database ... 40% (Reading database ... 45% (Reading database ... 50% (Reading database ... 55% (Reading database ... 60% (Reading database ... 65% (Reading database ... 70% (Reading database ... 75% (Reading database ... 80% (Reading database ... 85% (Reading database ... 90% (Reading database ... 95% (Reading database ... 100% (Reading database ... 89359 files and directories currently installed.) 70s Preparing to unpack .../libexpat1_2.7.4-1_arm64.deb ... 70s Unpacking libexpat1:arm64 (2.7.4-1) over (2.7.3-1) ... 70s Preparing to unpack .../liblocale-gettext-perl_1.07-8_arm64.deb ... 70s Unpacking liblocale-gettext-perl (1.07-8) over (1.07-7build1) ... 70s Preparing to unpack .../ca-certificates_20250419build1_all.deb ... 70s Unpacking ca-certificates (20250419build1) over (20250419) ... 71s Preparing to unpack .../cloud-init-base_25.4~4g26c7d38d-0ubuntu1_all.deb ... 71s Unpacking cloud-init-base (25.4~4g26c7d38d-0ubuntu1) over (25.4~3g78f6f15e-0ubuntu1) ... 71s Preparing to unpack .../cloud-init_25.4~4g26c7d38d-0ubuntu1_all.deb ... 71s Unpacking cloud-init (25.4~4g26c7d38d-0ubuntu1) over (25.4~3g78f6f15e-0ubuntu1) ... 71s Setting up libexpat1:arm64 (2.7.4-1) ... 71s Setting up cloud-init-base (25.4~4g26c7d38d-0ubuntu1) ... 71s Clearing ignored debconf value cloud-init/datasources 71s Encountered debconf setting for cloud-init-base/datasources. 73s Setting up ca-certificates (20250419build1) ... 75s Updating certificates in /etc/ssl/certs... 76s 0 added, 0 removed; done. 76s Setting up liblocale-gettext-perl (1.07-8) ... 76s Setting up cloud-init (25.4~4g26c7d38d-0ubuntu1) ... 76s Processing triggers for rsyslog (8.2512.0-1ubuntu2) ... 77s Processing triggers for man-db (2.13.1-1) ... 78s Processing triggers for libc-bin (2.42-2ubuntu4) ... 78s Processing triggers for ca-certificates (20250419build1) ... 78s Updating certificates in /etc/ssl/certs... 79s 0 added, 0 removed; done. 79s Running hooks in /etc/ca-certificates/update.d... 79s done. 79s autopkgtest [03:05:53]: upgrading testbed (apt dist-upgrade and autopurge) 79s Reading package lists... 79s Building dependency tree... 79s Reading state information... 80s Calculating upgrade... 80s 0 upgraded, 0 newly installed, 0 to remove and 0 not upgraded. 80s Reading package lists... 80s Building dependency tree... 80s Reading state information... 81s Solving dependencies... 81s 0 upgraded, 0 newly installed, 0 to remove and 0 not upgraded. 81s autopkgtest [03:05:55]: rebooting testbed after setup commands that affected boot 122s autopkgtest [03:06:36]: testbed running kernel: Linux 6.18.0-9-generic #9-Ubuntu SMP PREEMPT_DYNAMIC Mon Jan 12 16:41:39 UTC 2026 125s autopkgtest [03:06:39]: @@@@@@@@@@@@@@@@@@@@ apt-source libreswan 127s Get:1 http://ftpmaster.internal/ubuntu resolute/universe libreswan 5.2-2.2ubuntu1 (dsc) [2735 B] 127s Get:2 http://ftpmaster.internal/ubuntu resolute/universe libreswan 5.2-2.2ubuntu1 (tar) [4132 kB] 127s Get:3 http://ftpmaster.internal/ubuntu resolute/universe libreswan 5.2-2.2ubuntu1 (asc) [862 B] 127s Get:4 http://ftpmaster.internal/ubuntu resolute/universe libreswan 5.2-2.2ubuntu1 (diff) [16.7 kB] 127s gpgv: Signature made Thu Jul 31 14:30:12 2025 UTC 127s gpgv: using RSA key 25E3FF2D7F469DBE7D0D4E50AFCFEC8E669CE1C2 127s gpgv: Can't check signature: No public key 127s dpkg-source: warning: cannot verify inline signature for ./libreswan_5.2-2.2ubuntu1.dsc: no acceptable signature found 131s autopkgtest [03:06:45]: testing package libreswan version 5.2-2.2ubuntu1 132s autopkgtest [03:06:46]: build not needed 135s autopkgtest [03:06:49]: test opportunistic: preparing testbed 135s Reading package lists... 135s Building dependency tree... 135s Reading state information... 135s Solving dependencies... 136s The following NEW packages will be installed: 136s dns-root-data libevent-2.1-7t64 libevent-pthreads-2.1-7t64 libldns3t64 136s libnss3-tools libreswan libunbound8 136s 0 upgraded, 7 newly installed, 0 to remove and 0 not upgraded. 136s Need to get 2870 kB of archives. 136s After this operation, 13.6 MB of additional disk space will be used. 136s Get:1 http://ftpmaster.internal/ubuntu resolute/main arm64 dns-root-data all 2025080400 [5908 B] 137s Get:2 http://ftpmaster.internal/ubuntu resolute/main arm64 libnss3-tools arm64 2:3.120-1 [604 kB] 137s Get:3 http://ftpmaster.internal/ubuntu resolute/main arm64 libevent-pthreads-2.1-7t64 arm64 2.1.12-stable-10build1 [8272 B] 137s Get:4 http://ftpmaster.internal/ubuntu resolute/universe arm64 libldns3t64 arm64 1.8.4-2build1 [164 kB] 137s Get:5 http://ftpmaster.internal/ubuntu resolute/main arm64 libevent-2.1-7t64 arm64 2.1.12-stable-10build1 [152 kB] 137s Get:6 http://ftpmaster.internal/ubuntu resolute/main arm64 libunbound8 arm64 1.24.2-1ubuntu1 [436 kB] 137s Get:7 http://ftpmaster.internal/ubuntu resolute/universe arm64 libreswan arm64 5.2-2.2ubuntu1 [1500 kB] 137s Fetched 2870 kB in 1s (2076 kB/s) 137s Selecting previously unselected package dns-root-data. 138s (Reading database ... (Reading database ... 5% (Reading database ... 10% (Reading database ... 15% (Reading database ... 20% (Reading database ... 25% (Reading database ... 30% (Reading database ... 35% (Reading database ... 40% (Reading database ... 45% (Reading database ... 50% (Reading database ... 55% (Reading database ... 60% (Reading database ... 65% (Reading database ... 70% (Reading database ... 75% (Reading database ... 80% (Reading database ... 85% (Reading database ... 90% (Reading database ... 95% (Reading database ... 100% (Reading database ... 89359 files and directories currently installed.) 138s Preparing to unpack .../0-dns-root-data_2025080400_all.deb ... 138s Unpacking dns-root-data (2025080400) ... 138s Selecting previously unselected package libnss3-tools. 138s Preparing to unpack .../1-libnss3-tools_2%3a3.120-1_arm64.deb ... 138s Unpacking libnss3-tools (2:3.120-1) ... 138s Selecting previously unselected package libevent-pthreads-2.1-7t64:arm64. 138s Preparing to unpack .../2-libevent-pthreads-2.1-7t64_2.1.12-stable-10build1_arm64.deb ... 138s Unpacking libevent-pthreads-2.1-7t64:arm64 (2.1.12-stable-10build1) ... 138s Selecting previously unselected package libldns3t64:arm64. 138s Preparing to unpack .../3-libldns3t64_1.8.4-2build1_arm64.deb ... 138s Unpacking libldns3t64:arm64 (1.8.4-2build1) ... 138s Selecting previously unselected package libevent-2.1-7t64:arm64. 138s Preparing to unpack .../4-libevent-2.1-7t64_2.1.12-stable-10build1_arm64.deb ... 138s Unpacking libevent-2.1-7t64:arm64 (2.1.12-stable-10build1) ... 138s Selecting previously unselected package libunbound8:arm64. 138s Preparing to unpack .../5-libunbound8_1.24.2-1ubuntu1_arm64.deb ... 138s Unpacking libunbound8:arm64 (1.24.2-1ubuntu1) ... 138s Selecting previously unselected package libreswan. 138s Preparing to unpack .../6-libreswan_5.2-2.2ubuntu1_arm64.deb ... 138s Unpacking libreswan (5.2-2.2ubuntu1) ... 138s Setting up libldns3t64:arm64 (1.8.4-2build1) ... 138s Setting up libevent-pthreads-2.1-7t64:arm64 (2.1.12-stable-10build1) ... 138s Setting up libevent-2.1-7t64:arm64 (2.1.12-stable-10build1) ... 138s Setting up dns-root-data (2025080400) ... 138s Setting up libunbound8:arm64 (1.24.2-1ubuntu1) ... 138s Setting up libnss3-tools (2:3.120-1) ... 138s Setting up libreswan (5.2-2.2ubuntu1) ... 138s ipsec.service is a disabled or a static unit, not starting it. 138s Processing triggers for man-db (2.13.1-1) ... 139s Processing triggers for libc-bin (2.42-2ubuntu4) ... 140s autopkgtest [03:06:54]: test opportunistic: [----------------------- 142s ping: oe.libreswan.org: No address associated with hostname 143s autopkgtest [03:06:56]: test opportunistic: -----------------------] 147s opportunistic SKIP exit status 77 and marked as skippable 147s autopkgtest [03:06:57]: test opportunistic: - - - - - - - - - - results - - - - - - - - - - 147s autopkgtest [03:07:01]: test cryptocheck: preparing testbed 166s Creating nova instance adt-resolute-arm64-libreswan-20260203-030434-juju-7f2275-prod-proposed-migration-environment-20-452e2a45-054c-448a-921c-182b44bafda6 from image adt/ubuntu-resolute-arm64-server-20260202.img (UUID e5b8703b-d12e-4238-a70e-a72a9b0d7948)... 220s autopkgtest [03:08:14]: testbed dpkg architecture: arm64 220s autopkgtest [03:08:14]: testbed apt version: 3.1.14 221s autopkgtest [03:08:15]: @@@@@@@@@@@@@@@@@@@@ test bed setup 221s autopkgtest [03:08:15]: testbed release detected to be: resolute 222s autopkgtest [03:08:16]: updating testbed package index (apt update) 223s Get:1 http://ftpmaster.internal/ubuntu resolute-proposed InRelease [124 kB] 223s Hit:2 http://ftpmaster.internal/ubuntu resolute InRelease 223s Hit:3 http://ftpmaster.internal/ubuntu resolute-updates InRelease 223s Hit:4 http://ftpmaster.internal/ubuntu resolute-security InRelease 223s Get:5 http://ftpmaster.internal/ubuntu resolute-proposed/multiverse Sources [28.4 kB] 223s Get:6 http://ftpmaster.internal/ubuntu resolute-proposed/universe Sources [1275 kB] 223s Get:7 http://ftpmaster.internal/ubuntu resolute-proposed/main Sources [271 kB] 223s Get:8 http://ftpmaster.internal/ubuntu resolute-proposed/restricted Sources [5256 B] 223s Get:9 http://ftpmaster.internal/ubuntu resolute-proposed/main arm64 Packages [309 kB] 224s Get:10 http://ftpmaster.internal/ubuntu resolute-proposed/main arm64 c-n-f Metadata [3628 B] 224s Get:11 http://ftpmaster.internal/ubuntu resolute-proposed/restricted arm64 Packages [52.9 kB] 224s Get:12 http://ftpmaster.internal/ubuntu resolute-proposed/restricted arm64 c-n-f Metadata [328 B] 224s Get:13 http://ftpmaster.internal/ubuntu resolute-proposed/universe arm64 Packages [1116 kB] 224s Get:14 http://ftpmaster.internal/ubuntu resolute-proposed/universe arm64 c-n-f Metadata [26.2 kB] 224s Get:15 http://ftpmaster.internal/ubuntu resolute-proposed/multiverse arm64 Packages [21.8 kB] 224s Get:16 http://ftpmaster.internal/ubuntu resolute-proposed/multiverse arm64 c-n-f Metadata [756 B] 226s Fetched 3234 kB in 2s (1715 kB/s) 227s Reading package lists... 228s Hit:1 http://ftpmaster.internal/ubuntu resolute-proposed InRelease 228s Hit:2 http://ftpmaster.internal/ubuntu resolute InRelease 228s Hit:3 http://ftpmaster.internal/ubuntu resolute-updates InRelease 228s Hit:4 http://ftpmaster.internal/ubuntu resolute-security InRelease 229s Reading package lists... 229s Reading package lists... 229s Building dependency tree... 229s Reading state information... 229s Calculating upgrade... 230s The following packages will be upgraded: 230s ca-certificates cloud-init cloud-init-base libexpat1 liblocale-gettext-perl 230s 5 upgraded, 0 newly installed, 0 to remove and 0 not upgraded. 230s Need to get 891 kB of archives. 230s After this operation, 2048 B of additional disk space will be used. 230s Get:1 http://ftpmaster.internal/ubuntu resolute/main arm64 libexpat1 arm64 2.7.4-1 [85.7 kB] 230s Get:2 http://ftpmaster.internal/ubuntu resolute/main arm64 liblocale-gettext-perl arm64 1.07-8 [15.6 kB] 230s Get:3 http://ftpmaster.internal/ubuntu resolute-proposed/main arm64 ca-certificates all 20250419build1 [163 kB] 230s Get:4 http://ftpmaster.internal/ubuntu resolute/main arm64 cloud-init-base all 25.4~4g26c7d38d-0ubuntu1 [624 kB] 230s Get:5 http://ftpmaster.internal/ubuntu resolute/main arm64 cloud-init all 25.4~4g26c7d38d-0ubuntu1 [2120 B] 230s dpkg-preconfigure: unable to re-open stdin: No such file or directory 230s Fetched 891 kB in 0s (3410 kB/s) 230s (Reading database ... (Reading database ... 5% (Reading database ... 10% (Reading database ... 15% (Reading database ... 20% (Reading database ... 25% (Reading database ... 30% (Reading database ... 35% (Reading database ... 40% (Reading database ... 45% (Reading database ... 50% (Reading database ... 55% (Reading database ... 60% (Reading database ... 65% (Reading database ... 70% (Reading database ... 75% (Reading database ... 80% (Reading database ... 85% (Reading database ... 90% (Reading database ... 95% (Reading database ... 100% (Reading database ... 89359 files and directories currently installed.) 230s Preparing to unpack .../libexpat1_2.7.4-1_arm64.deb ... 230s Unpacking libexpat1:arm64 (2.7.4-1) over (2.7.3-1) ... 231s Preparing to unpack .../liblocale-gettext-perl_1.07-8_arm64.deb ... 231s Unpacking liblocale-gettext-perl (1.07-8) over (1.07-7build1) ... 231s Preparing to unpack .../ca-certificates_20250419build1_all.deb ... 231s Unpacking ca-certificates (20250419build1) over (20250419) ... 231s Preparing to unpack .../cloud-init-base_25.4~4g26c7d38d-0ubuntu1_all.deb ... 231s Unpacking cloud-init-base (25.4~4g26c7d38d-0ubuntu1) over (25.4~3g78f6f15e-0ubuntu1) ... 231s Preparing to unpack .../cloud-init_25.4~4g26c7d38d-0ubuntu1_all.deb ... 231s Unpacking cloud-init (25.4~4g26c7d38d-0ubuntu1) over (25.4~3g78f6f15e-0ubuntu1) ... 231s Setting up libexpat1:arm64 (2.7.4-1) ... 231s Setting up cloud-init-base (25.4~4g26c7d38d-0ubuntu1) ... 231s Clearing ignored debconf value cloud-init/datasources 231s Encountered debconf setting for cloud-init-base/datasources. 233s Setting up ca-certificates (20250419build1) ... 235s Updating certificates in /etc/ssl/certs... 237s 0 added, 0 removed; done. 237s Setting up liblocale-gettext-perl (1.07-8) ... 237s Setting up cloud-init (25.4~4g26c7d38d-0ubuntu1) ... 237s Processing triggers for rsyslog (8.2512.0-1ubuntu2) ... 237s Processing triggers for man-db (2.13.1-1) ... 238s Processing triggers for libc-bin (2.42-2ubuntu4) ... 238s Processing triggers for ca-certificates (20250419build1) ... 238s Updating certificates in /etc/ssl/certs... 239s 0 added, 0 removed; done. 239s Running hooks in /etc/ca-certificates/update.d... 239s done. 239s autopkgtest [03:08:33]: upgrading testbed (apt dist-upgrade and autopurge) 239s Reading package lists... 240s Building dependency tree... 240s Reading state information... 240s Calculating upgrade... 240s 0 upgraded, 0 newly installed, 0 to remove and 0 not upgraded. 240s Reading package lists... 241s Building dependency tree... 241s Reading state information... 241s Solving dependencies... 241s 0 upgraded, 0 newly installed, 0 to remove and 0 not upgraded. 241s autopkgtest [03:08:35]: rebooting testbed after setup commands that affected boot 282s Reading package lists... 282s Building dependency tree... 282s Reading state information... 282s Solving dependencies... 283s The following NEW packages will be installed: 283s dns-root-data libevent-2.1-7t64 libevent-pthreads-2.1-7t64 libldns3t64 283s libnss3-tools libreswan libunbound8 283s 0 upgraded, 7 newly installed, 0 to remove and 0 not upgraded. 283s Need to get 2870 kB of archives. 283s After this operation, 13.6 MB of additional disk space will be used. 283s Get:1 http://ftpmaster.internal/ubuntu resolute/main arm64 dns-root-data all 2025080400 [5908 B] 283s Get:2 http://ftpmaster.internal/ubuntu resolute/main arm64 libnss3-tools arm64 2:3.120-1 [604 kB] 283s Get:3 http://ftpmaster.internal/ubuntu resolute/main arm64 libevent-pthreads-2.1-7t64 arm64 2.1.12-stable-10build1 [8272 B] 283s Get:4 http://ftpmaster.internal/ubuntu resolute/universe arm64 libldns3t64 arm64 1.8.4-2build1 [164 kB] 283s Get:5 http://ftpmaster.internal/ubuntu resolute/main arm64 libevent-2.1-7t64 arm64 2.1.12-stable-10build1 [152 kB] 283s Get:6 http://ftpmaster.internal/ubuntu resolute/main arm64 libunbound8 arm64 1.24.2-1ubuntu1 [436 kB] 283s Get:7 http://ftpmaster.internal/ubuntu resolute/universe arm64 libreswan arm64 5.2-2.2ubuntu1 [1500 kB] 284s Fetched 2870 kB in 1s (3129 kB/s) 284s Selecting previously unselected package dns-root-data. 284s (Reading database ... (Reading database ... 5% (Reading database ... 10% (Reading database ... 15% (Reading database ... 20% (Reading database ... 25% (Reading database ... 30% (Reading database ... 35% (Reading database ... 40% (Reading database ... 45% (Reading database ... 50% (Reading database ... 55% (Reading database ... 60% (Reading database ... 65% (Reading database ... 70% (Reading database ... 75% (Reading database ... 80% (Reading database ... 85% (Reading database ... 90% (Reading database ... 95% (Reading database ... 100% (Reading database ... 89359 files and directories currently installed.) 284s Preparing to unpack .../0-dns-root-data_2025080400_all.deb ... 284s Unpacking dns-root-data (2025080400) ... 284s Selecting previously unselected package libnss3-tools. 284s Preparing to unpack .../1-libnss3-tools_2%3a3.120-1_arm64.deb ... 284s Unpacking libnss3-tools (2:3.120-1) ... 284s Selecting previously unselected package libevent-pthreads-2.1-7t64:arm64. 284s Preparing to unpack .../2-libevent-pthreads-2.1-7t64_2.1.12-stable-10build1_arm64.deb ... 284s Unpacking libevent-pthreads-2.1-7t64:arm64 (2.1.12-stable-10build1) ... 284s Selecting previously unselected package libldns3t64:arm64. 284s Preparing to unpack .../3-libldns3t64_1.8.4-2build1_arm64.deb ... 284s Unpacking libldns3t64:arm64 (1.8.4-2build1) ... 284s Selecting previously unselected package libevent-2.1-7t64:arm64. 284s Preparing to unpack .../4-libevent-2.1-7t64_2.1.12-stable-10build1_arm64.deb ... 284s Unpacking libevent-2.1-7t64:arm64 (2.1.12-stable-10build1) ... 284s Selecting previously unselected package libunbound8:arm64. 284s Preparing to unpack .../5-libunbound8_1.24.2-1ubuntu1_arm64.deb ... 284s Unpacking libunbound8:arm64 (1.24.2-1ubuntu1) ... 284s Selecting previously unselected package libreswan. 284s Preparing to unpack .../6-libreswan_5.2-2.2ubuntu1_arm64.deb ... 284s Unpacking libreswan (5.2-2.2ubuntu1) ... 285s Setting up libldns3t64:arm64 (1.8.4-2build1) ... 285s Setting up libevent-pthreads-2.1-7t64:arm64 (2.1.12-stable-10build1) ... 285s Setting up libevent-2.1-7t64:arm64 (2.1.12-stable-10build1) ... 285s Setting up dns-root-data (2025080400) ... 285s Setting up libunbound8:arm64 (1.24.2-1ubuntu1) ... 285s Setting up libnss3-tools (2:3.120-1) ... 285s Setting up libreswan (5.2-2.2ubuntu1) ... 285s ipsec.service is a disabled or a static unit, not starting it. 285s Processing triggers for man-db (2.13.1-1) ... 286s Processing triggers for libc-bin (2.42-2ubuntu4) ... 303s autopkgtest [03:09:37]: test cryptocheck: [----------------------- 303s Testing installed binary: /usr/libexec/ipsec/algparse 303s Testing installed binary: /usr/libexec/ipsec/pluto 303s testing -tp 303s algparse -v2 'esp' (expect SUCCESS) 303s AES_GCM_16_256-NONE 303s AES_GCM_16_128-NONE 303s CHACHA20_POLY1305-NONE 303s AES_CBC_256-HMAC_SHA2_512_256+HMAC_SHA2_256_128 303s AES_CBC_128-HMAC_SHA2_512_256+HMAC_SHA2_256_128 303s algparse -v2 'esp=' (expect ERROR) 303s ERROR: ESP proposal is empty 303s algparse -v2 'esp=aes' (expect SUCCESS) 303s AES_CBC-HMAC_SHA2_512_256+HMAC_SHA2_256_128 303s algparse -v2 'esp=aes;modp2048' (expect SUCCESS) 303s AES_CBC-HMAC_SHA2_512_256+HMAC_SHA2_256_128 303s algparse -v2 'esp=aes-sha1' (expect SUCCESS) 303s AES_CBC-HMAC_SHA1_96 303s algparse -v2 'esp=aes-sha1' (expect SUCCESS) 303s AES_CBC-HMAC_SHA1_96 303s algparse -v2 'esp=aes-sha1-modp2048' (expect SUCCESS) 303s AES_CBC-HMAC_SHA1_96 303s algparse -v2 'esp=aes-128-sha1' (expect SUCCESS) 303s AES_CBC_128-HMAC_SHA1_96 303s algparse -v2 'esp=aes-128-sha1' (expect SUCCESS) 303s AES_CBC_128-HMAC_SHA1_96 303s algparse -v2 'esp=aes-128-sha1-modp2048' (expect SUCCESS) 303s AES_CBC_128-HMAC_SHA1_96 303s algparse -v2 'esp=aes-128' (expect SUCCESS) 303s AES_CBC_128-HMAC_SHA2_512_256+HMAC_SHA2_256_128 303s algparse -v2 'esp=aes_gcm_a-128-null' (expect SUCCESS) 303s AES_GCM_8_128-NONE 303s algparse -v2 'esp=3des-sha1;modp1024' (expect ERROR) 303s ERROR: ESP DH algorithm 'modp1024' is not supported 303s algparse -v2 'esp=3des-sha1;modp1536' (expect SUCCESS) 303s 3DES_CBC-HMAC_SHA1_96 303s algparse -v2 'esp=3des-sha1;modp2048' (expect SUCCESS) 303s 3DES_CBC-HMAC_SHA1_96 303s algparse -v2 'esp=3des-sha1;dh21' (expect SUCCESS) 303s 3DES_CBC-HMAC_SHA1_96 303s algparse -v2 'esp=3des-sha1;ecp_521' (expect SUCCESS) 303s 3DES_CBC-HMAC_SHA1_96 303s algparse -v2 'esp=3des-sha1;dh23' (expect ERROR) 303s ERROR: ESP DH algorithm 'dh23' is not supported 303s algparse -v2 'esp=3des-sha1;dh24' (expect ERROR) 303s ERROR: ESP DH algorithm 'dh24' is not supported 303s algparse -v2 'esp=3des-sha1' (expect SUCCESS) 303s 3DES_CBC-HMAC_SHA1_96 303s algparse -v2 'esp=null-sha1' (expect SUCCESS) 303s NULL-HMAC_SHA1_96 303s algparse -v2 'esp=aes_cbc' (expect SUCCESS) 303s AES_CBC-HMAC_SHA2_512_256+HMAC_SHA2_256_128 303s algparse -v2 'esp=aes-sha' (expect SUCCESS) 303s AES_CBC-HMAC_SHA1_96 303s algparse -v2 'esp=aes-sha1' (expect SUCCESS) 303s AES_CBC-HMAC_SHA1_96 303s algparse -v2 'esp=aes128-sha1' (expect SUCCESS) 303s AES_CBC_128-HMAC_SHA1_96 303s algparse -v2 'esp=aes-sha2' (expect SUCCESS) 303s AES_CBC-HMAC_SHA2_256_128 303s algparse -v2 'esp=aes-sha256' (expect SUCCESS) 303s AES_CBC-HMAC_SHA2_256_128 303s algparse -v2 'esp=aes-sha384' (expect SUCCESS) 303s AES_CBC-HMAC_SHA2_384_192 303s algparse -v2 'esp=aes-sha512' (expect SUCCESS) 303s ipsec algparse: Encryption algorithms: 303s ipsec algparse: AES_CCM_16 {256,192,*128} IKEv1: ESP IKEv2: ESP FIPS aes_ccm, aes_ccm_c 303s ipsec algparse: AES_CCM_12 {256,192,*128} IKEv1: ESP IKEv2: ESP FIPS aes_ccm_b 303s ipsec algparse: AES_CCM_8 {256,192,*128} IKEv1: ESP IKEv2: ESP FIPS aes_ccm_a 303s ipsec algparse: 3DES_CBC [*192] IKEv1: IKE ESP IKEv2: IKE ESP FIPS NSS(CBC) 3des 303s ipsec algparse: CAMELLIA_CTR {256,192,*128} IKEv1: ESP IKEv2: ESP 303s ipsec algparse: CAMELLIA_CBC {256,192,*128} IKEv1: IKE ESP IKEv2: IKE ESP NSS(CBC) camellia 303s ipsec algparse: AES_GCM_16 {256,192,*128} IKEv1: ESP IKEv2: IKE ESP FIPS NSS(AEAD) aes_gcm, aes_gcm_c 303s ipsec algparse: AES_GCM_12 {256,192,*128} IKEv1: ESP IKEv2: IKE ESP FIPS NSS(AEAD) aes_gcm_b 303s ipsec algparse: AES_GCM_8 {256,192,*128} IKEv1: ESP IKEv2: IKE ESP FIPS NSS(AEAD) aes_gcm_a 303s ipsec algparse: AES_CTR {256,192,*128} IKEv1: IKE ESP IKEv2: IKE ESP FIPS NSS(CTR) aesctr 303s ipsec algparse: AES_CBC {256,192,*128} IKEv1: IKE ESP IKEv2: IKE ESP FIPS NSS(CBC) aes 303s ipsec algparse: NULL_AUTH_AES_GMAC {256,192,*128} IKEv1: ESP IKEv2: ESP FIPS aes_gmac 303s ipsec algparse: NULL [] IKEv1: ESP IKEv2: ESP NULL 303s ipsec algparse: CHACHA20_POLY1305 [*256] IKEv1: IKEv2: IKE ESP NSS(AEAD) chacha20poly1305 303s ipsec algparse: Hash algorithms: 303s ipsec algparse: MD5 IKEv1: IKE IKEv2: NSS 303s ipsec algparse: SHA1 IKEv1: IKE IKEv2: IKE FIPS NSS sha 303s ipsec algparse: SHA2_256 IKEv1: IKE IKEv2: IKE FIPS NSS sha2, sha256 303s ipsec algparse: SHA2_384 IKEv1: IKE IKEv2: IKE FIPS NSS sha384 303s ipsec algparse: SHA2_512 IKEv1: IKE IKEv2: IKE FIPS NSS sha512 303s ipsec algparse: IDENTITY IKEv1: IKEv2: FIPS 303s ipsec algparse: PRF algorithms: 303s ipsec algparse: HMAC_MD5 IKEv1: IKE IKEv2: IKE NSS md5 303s ipsec algparse: HMAC_SHA1 IKEv1: IKE IKEv2: IKE FIPS NSS sha, sha1 303s ipsec algparse: HMAC_SHA2_256 IKEv1: IKE IKEv2: IKE FIPS NSS sha2, sha256, sha2_256 303s ipsec algparse: HMAC_SHA2_384 IKEv1: IKE IKEv2: IKE FIPS NSS sha384, sha2_384 303s ipsec algparse: HMAC_SHA2_512 IKEv1: IKE IKEv2: IKE FIPS NSS sha512, sha2_512 303s ipsec algparse: AES_XCBC IKEv1: IKEv2: IKE native(XCBC) aes128_xcbc 303s ipsec algparse: Integrity algorithms: 303s ipsec algparse: HMAC_MD5_96 IKEv1: IKE ESP AH IKEv2: IKE ESP AH NSS md5, hmac_md5 303s ipsec algparse: HMAC_SHA1_96 IKEv1: IKE ESP AH IKEv2: IKE ESP AH FIPS NSS sha, sha1, sha1_96, hmac_sha1 303s ipsec algparse: HMAC_SHA2_512_256 IKEv1: IKE ESP AH IKEv2: IKE ESP AH FIPS NSS sha512, sha2_512, sha2_512_256, hmac_sha2_512 303s ipsec algparse: HMAC_SHA2_384_192 IKEv1: IKE ESP AH IKEv2: IKE ESP AH FIPS NSS sha384, sha2_384, sha2_384_192, hmac_sha2_384 303s ipsec algparse: HMAC_SHA2_256_128 IKEv1: IKE ESP AH IKEv2: IKE ESP AH FIPS NSS sha2, sha256, sha2_256, sha2_256_128, hmac_sha2_256 303s ipsec algparse: HMAC_SHA2_256_TRUNCBUG IKEv1: ESP AH IKEv2: AH 303s ipsec algparse: AES_XCBC_96 IKEv1: ESP AH IKEv2: IKE ESP AH native(XCBC) aes_xcbc, aes128_xcbc, aes128_xcbc_96 303s ipsec algparse: AES_CMAC_96 IKEv1: ESP AH IKEv2: ESP AH FIPS aes_cmac 303s ipsec algparse: NONE IKEv1: ESP IKEv2: IKE ESP FIPS null 303s ipsec algparse: DH algorithms: 303s ipsec algparse: NONE IKEv1: IKEv2: IKE ESP AH FIPS NSS(MODP) null, dh0 303s ipsec algparse: MODP1536 IKEv1: IKE ESP AH IKEv2: IKE ESP AH NSS(MODP) dh5 303s ipsec algparse: MODP2048 IKEv1: IKE ESP AH IKEv2: IKE ESP AH FIPS NSS(MODP) dh14 303s ipsec algparse: MODP3072 IKEv1: IKE ESP AH IKEv2: IKE ESP AH FIPS NSS(MODP) dh15 303s ipsec algparse: MODP4096 IKEv1: IKE ESP AH IKEv2: IKE ESP AH FIPS NSS(MODP) dh16 303s ipsec algparse: MODP6144 IKEv1: IKE ESP AH IKEv2: IKE ESP AH FIPS NSS(MODP) dh17 303s ipsec algparse: MODP8192 IKEv1: IKE ESP AH IKEv2: IKE ESP AH FIPS NSS(MODP) dh18 303s ipsec algparse: DH19 IKEv1: IKE IKEv2: IKE ESP AH FIPS NSS(ECP) ecp_256, ecp256 303s ipsec algparse: DH20 IKEv1: IKE IKEv2: IKE ESP AH FIPS NSS(ECP) ecp_384, ecp384 303s ipsec algparse: DH21 IKEv1: IKE IKEv2: IKE ESP AH FIPS NSS(ECP) ecp_521, ecp521 303s ipsec algparse: DH31 IKEv1: IKE IKEv2: IKE ESP AH NSS(ECP) curve25519 303s ipsec algparse: IPCOMP algorithms: 303s ipsec algparse: DEFLATE IKEv1: ESP AH IKEv2: ESP AH FIPS 303s ipsec algparse: LZS IKEv1: IKEv2: ESP AH FIPS 303s ipsec algparse: LZJH IKEv1: IKEv2: ESP AH FIPS 303s | parsing 'AES_GCM_16_256,AES_GCM_16_128,CHACHA20_POLY1305,AES_CBC_256,AES_CBC_128' for ESP 303s | proposal: 'AES_GCM_16_256' 303s | token: '' '' "AES_GCM_16_256" '' 303s | token: '' "AES_GCM_16_256" '' '' 303s | ike_alg_byname() failed: ESP encryption algorithm 'AES_GCM_16_256' is not recognized 303s | token: '' '' '' 303s | appending ESP encryption algorithm AES_GCM_16[_256] 303s | appending ESP integrity algorithm NONE[_0] 303s | proposal: 'AES_GCM_16_128' 303s | token: '' '' "AES_GCM_16_128" '' 303s | token: '' "AES_GCM_16_128" '' '' 303s | ike_alg_byname() failed: ESP encryption algorithm 'AES_GCM_16_128' is not recognized 303s | token: '' '' '' 303s | appending ESP encryption algorithm AES_GCM_16[_128] 303s | appending ESP integrity algorithm NONE[_0] 303s | proposal: 'CHACHA20_POLY1305' 303s | token: '' '' "CHACHA20_POLY1305" '' 303s | token: '' "CHACHA20_POLY1305" '' '' 303s | token: '' '' '' 303s | appending ESP encryption algorithm CHACHA20_POLY1305[_0] 303s AES_CBC-HMAC_SHA2_512_256 303s algparse -v2 'esp=aes128-aes_xcbc' (expect SUCCESS) 303s AES_CBC_128-AES_XCBC_96 303s algparse -v2 'esp=aes192-sha1' (expect SUCCESS) 303s AES_CBC_192-HMAC_SHA1_96 303s algparse -v2 'esp=aes256-sha1' (expect SUCCESS) 303s AES_CBC_256-HMAC_SHA1_96 303s algparse -v2 'esp=aes256-sha' (expect SUCCESS) 303s AES_CBC_256-HMAC_SHA1_96 303s algparse -v2 'esp=aes256-sha2' (expect SUCCESS) 303s AES_CBC_256-HMAC_SHA2_256_128 303s algparse -v2 'esp=aes256-sha2_256' (expect SUCCESS) 303s AES_CBC_256-HMAC_SHA2_256_128 303s algparse -v2 'esp=aes256-sha2_384' (expect SUCCESS) 303s AES_CBC_256-HMAC_SHA2_384_192 303s algparse -v2 'esp=aes256-sha2_512' (expect SUCCESS) 303s AES_CBC_256-HMAC_SHA2_512_256 303s algparse -v2 'esp=camellia' (expect SUCCESS) 303s CAMELLIA_CBC-HMAC_SHA2_512_256+HMAC_SHA2_256_128 303s algparse -v2 'esp=camellia128' (expect SUCCESS) 303s CAMELLIA_CBC_128-HMAC_SHA2_512_256+HMAC_SHA2_256_128 303s algparse -v2 'esp=camellia192' (expect SUCCESS) 303s CAMELLIA_CBC_192-HMAC_SHA2_512_256+HMAC_SHA2_256_128 303s algparse -v2 'esp=camellia256' (expect SUCCESS) 303s CAMELLIA_CBC_256-HMAC_SHA2_512_256+HMAC_SHA2_256_128 303s algparse -v2 'esp=aes_ccm' (expect SUCCESS) 303s AES_CCM_16-NONE 303s algparse -v2 'esp=aes_ccm_a-128-null' (expect SUCCESS) 303s AES_CCM_8_128-NONE 303s algparse -v2 'esp=aes_ccm_a-192-null' (expect SUCCESS) 303s AES_CCM_8_192-NONE 303s algparse -v2 'esp=aes_ccm_a-256-null' (expect SUCCESS) 303s AES_CCM_8_256-NONE 303s algparse -v2 'esp=aes_ccm_b-128-null' (expect SUCCESS) 303s AES_CCM_12_128-NONE 303s algparse -v2 'esp=aes_ccm_b-192-null' (expect SUCCESS) 303s AES_CCM_12_192-NONE 303s algparse -v2 'esp=aes_ccm_b-256-null' (expect SUCCESS) 303s AES_CCM_12_256-NONE 303s algparse -v2 'esp=aes_ccm_c-128-null' (expect SUCCESS) 303s AES_CCM_16_128-NONE 303s algparse -v2 'esp=aes_ccm_c-192-null' (expect SUCCESS) 303s AES_CCM_16_192-NONE 303s algparse -v2 'esp=aes_ccm_c-256-null' (expect SUCCESS) 303s AES_CCM_16_256-NONE 303s algparse -v2 'esp=aes_gcm' (expect SUCCESS) 303s AES_GCM_16-NONE 303s algparse -v2 'esp=aes_gcm_a-128-null' (expect SUCCESS) 303s AES_GCM_8_128-NONE 303s algparse -v2 'esp=aes_gcm_a-192-null' (expect SUCCESS) 303s AES_GCM_8_192-NONE 303s algparse -v2 'esp=aes_gcm_a-256-null' (expect SUCCESS) 303s AES_GCM_8_256-NONE 303s algparse -v2 'esp=aes_gcm_b-128-null' (expect SUCCESS) 303s AES_GCM_12_128-NONE 303s algparse -v2 'esp=aes_gcm_b-192-null' (expect SUCCESS) 303s AES_GCM_12_192-NONE 303s algparse -v2 'esp=aes_gcm_b-256-null' (expect SUCCESS) 303s AES_GCM_12_256-NONE 303s algparse -v2 'esp=aes_gcm_c-128-null' (expect SUCCESS) 303s AES_GCM_16_128-NONE 303s algparse -v2 'esp=aes_gcm_c-192-null' (expect SUCCESS) 303s AES_GCM_16_192-NONE 303s algparse -v2 'esp=aes_gcm_c-256-null' (expect SUCCESS) 303s AES_GCM_16_256-NONE 303s algparse -v2 'esp=aes_ccm_a-null' (expect SUCCESS) 303s AES_CCM_8-NONE 303s algparse -v2 'esp=aes_ccm_b-null' (expect SUCCESS) 303s AES_CCM_12-NONE 303s algparse -v2 'esp=aes_ccm_c-null' (expect SUCCESS) 303s AES_CCM_16-NONE 303s algparse -v2 'esp=aes_gcm_a-null' (expect SUCCESS) 303s AES_GCM_8-NONE 303s algparse -v2 'esp=aes_gcm_b-null' (expect SUCCESS) 303s AES_GCM_12-NONE 303s algparse -v2 'esp=aes_gcm_c-null' (expect SUCCESS) 303s AES_GCM_16-NONE 303s algparse -v2 'esp=aes_ccm-null' (expect SUCCESS) 303s AES_CCM_16-NONE 303s algparse -v2 'esp=aes_gcm-null' (expect SUCCESS) 303s AES_GCM_16-NONE 303s algparse -v2 'esp=aes_ccm-256-null' (expect SUCCESS) 303s AES_CCM_16_256-NONE 303s algparse -v2 'esp=aes_gcm-192-null' (expect SUCCESS) 303s AES_GCM_16_192-NONE 303s algparse -v2 'esp=aes_ccm_256-null' (expect SUCCESS) 303s AES_CCM_16_256-NONE 303s algparse -v2 'esp=aes_gcm_192-null' (expect SUCCESS) 303s AES_GCM_16_192-NONE 303s algparse -v2 'esp=aes_ccm_8-null' (expect SUCCESS) 303s AES_CCM_8-NONE 303s algparse -v2 'esp=aes_ccm_12-null' (expect SUCCESS) 303s AES_CCM_12-NONE 303s algparse -v2 'esp=aes_ccm_16-null' (expect SUCCESS) 303s AES_CCM_16-NONE 303s algparse -v2 'esp=aes_gcm_8-null' (expect SUCCESS) 303s AES_GCM_8-NONE 303s algparse -v2 'esp=aes_gcm_12-null' (expect SUCCESS) 303s AES_GCM_12-NONE 303s algparse -v2 'esp=aes_gcm_16-null' (expect SUCCESS) 303s AES_GCM_16-NONE 303s algparse -v2 'esp=aes_ccm_8-128-null' (expect SUCCESS) 303s AES_CCM_8_128-NONE 303s algparse -v2 'esp=aes_ccm_12-192-null' (expect SUCCESS) 303s AES_CCM_12_192-NONE 303s algparse -v2 'esp=aes_ccm_16-256-null' (expect SUCCESS) 303s AES_CCM_16_256-NONE 303s algparse -v2 'esp=aes_gcm_8-128-null' (expect SUCCESS) 303s AES_GCM_8_128-NONE 303s algparse -v2 'esp=aes_gcm_12-192-null' (expect SUCCESS) 303s AES_GCM_12_192-NONE 303s algparse -v2 'esp=aes_gcm_16-256-null' (expect SUCCESS) 303s AES_GCM_16_256-NONE 303s algparse -v2 'esp=aes_ccm_8_128-null' (expect SUCCESS) 303s AES_CCM_8_128-NONE 303s algparse -v2 'esp=aes_ccm_12_192-null' (expect SUCCESS) 303s AES_CCM_12_192-NONE 303s algparse -v2 'esp=aes_ccm_16_256-null' (expect SUCCESS) 303s | appending ESP integrity algorithm NONE[_0] 303s | proposal: 'AES_CBC_256' 303s | token: '' '' "AES_CBC_256" '' 303s | token: '' "AES_CBC_256" '' '' 303s | ike_alg_byname() failed: ESP encryption algorithm 'AES_CBC_256' is not recognized 303s | token: '' '' '' 303s | appending ESP encryption algorithm AES_CBC[_256] 303s | appending ESP integrity algorithm HMAC_SHA2_512_256[_0] 303s | appending ESP integrity algorithm HMAC_SHA2_256_128[_0] 303s | proposal: 'AES_CBC_128' 303s | token: '' '' "AES_CBC_128" '' 303s | token: '' "AES_CBC_128" '' '' 303s | ike_alg_byname() failed: ESP encryption algorithm 'AES_CBC_128' is not recognized 303s | token: '' '' '' 303s | appending ESP encryption algorithm AES_CBC[_128] 303s | appending ESP integrity algorithm HMAC_SHA2_512_256[_0] 303s | appending ESP integrity algorithm HMAC_SHA2_256_128[_0] 303s | parsing '' for ESP 303s | parsing 'aes' for ESP 303s | proposal: 'aes' 303s | token: '' '' "aes" '' 303s | token: '' "aes" '' '' 303s | token: '' '' '' 303s | appending ESP encryption algorithm AES_CBC[_0] 303s | appending ESP integrity algorithm HMAC_SHA2_512_256[_0] 303s | appending ESP integrity algorithm HMAC_SHA2_256_128[_0] 303s | parsing 'aes;modp2048' for ESP 303s | proposal: 'aes;modp2048' 303s | token: '' '' "aes" ';' 303s | token: '' "aes" ';' "modp2048" '' 303s | token: ';' "modp2048" '' '' 303s | appending ESP encryption algorithm AES_CBC[_0] 303s | parsing dh: 303s | appending ESP DH algorithm MODP2048[_0] 303s | token: '' '' '' 303s | appending ESP integrity algorithm HMAC_SHA2_512_256[_0] 303s | appending ESP integrity algorithm HMAC_SHA2_256_128[_0] 303s ipsec algparse: ignoring ESP DH algorithm MODP2048 as PFS policy is disabled 303s | parsing 'aes-sha1' for ESP 303s | proposal: 'aes-sha1' 303s | token: '' '' "aes" '-' 303s | token: '' "aes" '-' "sha1" '' 303s | token: '-' "sha1" '' '' 303s | appending ESP encryption algorithm AES_CBC[_0] 303s | parsing integ: 303s | appending ESP integrity algorithm HMAC_SHA1_96[_0] 303s | token: '' '' '' 303s | parsing 'aes-sha1' for ESP 303s | proposal: 'aes-sha1' 303s | token: '' '' "aes" '-' 303s | token: '' "aes" '-' "sha1" '' 303s | token: '-' "sha1" '' '' 303s | appending ESP encryption algorithm AES_CBC[_0] 303s | parsing integ: 303s | appending ESP integrity algorithm HMAC_SHA1_96[_0] 303s | token: '' '' '' 303s | parsing 'aes-sha1-modp2048' for ESP 303s | proposal: 'aes-sha1-modp2048' 303s | token: '' '' "aes" '-' 303s | token: '' "aes" '-' "sha1" '-' 303s | token: '-' "sha1" '-' "modp2048" '' 303s | appending ESP encryption algorithm AES_CBC[_0] 303s | parsing integ: 303s | appending ESP integrity algorithm HMAC_SHA1_96[_0] 303s | token: '-' "modp2048" '' '' 303s | parsing dh: 303s | appending ESP DH algorithm MODP2048[_0] 303s | token: '' '' '' 303s ipsec algparse: ignoring ESP DH algorithm MODP2048 as PFS policy is disabled 303s | parsing 'aes-128-sha1' for ESP 303s | proposal: 'aes-128-sha1' 303s | token: '' '' "aes" '-' 303s | token: '' "aes" '-' "128" '-' 303s | token: '-' "128" '-' "sha1" '' 303s | token: '-' "sha1" '' '' 303s | appending ESP encryption algorithm AES_CBC[_128] 303s | parsing integ: 303s | appending ESP integrity algorithm HMAC_SHA1_96[_0] 303s | token: '' '' '' 303s | parsing 'aes-128-sha1' for ESP 303s | proposal: 'aes-128-sha1' 303s | token: '' '' "aes" '-' 303s | token: '' "aes" '-' "128" '-' 303s | token: '-' "128" '-' "sha1" '' 303s | token: '-' "sha1" '' '' 303s | appending ESP encryption algorithm AES_CBC[_128] 303s | parsing integ: 303s | appending ESP integrity algorithm HMAC_SHA1_96[_0] 303s | token: '' '' '' 303s | parsing 'aes-128-sha1-modp2048' for ESP 303s | proposal: 'aes-128-sha1-modp2048' 303s | token: '' '' "aes" '-' 303s | token: '' "aes" '-' "128" '-' 303s | token: '-' "128" '-' "sha1" '-' 303s | token: '-' "sha1" '-' "modp2048" '' 303s | appending ESP encryption algorithm AES_CBC[_128] 303s | parsing integ: 303s | appending ESP integrity algorithm HMAC_SHA1_96[_0] 303s | token: '-' "modp2048" '' '' 303s | parsing dh: 303s | appending ESP DH algorithm MODP2048[_0] 303s | token: '' '' '' 303s ipsec algparse: ignoring ESP DH algorithm MODP2048 as PFS policy is disabled 303s | parsing 'aes-128' for ESP 303s | proposal: 'aes-128' 303s | token: '' '' "aes" '-' 303s | token: '' "aes" '-' "128" '' 303s | token: '-' "128" '' '' 303s | token: '' '' '' 303s | appending ESP encryption algorithm AES_CBC[_128] 303s | appending ESP integrity algorithm HMAC_SHA2_512_256[_0] 303s | appending ESP integrity algorithm HMAC_SHA2_256_128[_0] 303s | parsing 'aes_gcm_a-128-null' for ESP 303s | proposal: 'aes_gcm_a-128-null' 303s | token: '' '' "aes_gcm_a" '-' 303s | token: '' "aes_gcm_a" '-' "128" '-' 303s | token: '-' "128" '-' "null" '' 303s | token: '-' "null" '' '' 303s | appending ESP encryption algorithm AES_GCM_8[_128] 303s | parsing integ: 303s | appending ESP integrity algorithm NONE[_0] 303s | token: '' '' '' 303s | parsing '3des-sha1;modp1024' for ESP 303s | proposal: '3des-sha1;modp1024' 303s | token: '' '' "3des" '-' 303s | token: '' "3des" '-' "sha1" ';' 303s | token: '-' "sha1" ';' "modp1024" '' 303s | appending ESP encryption algorithm 3DES_CBC[_0] 303s | parsing integ: 303s | appending ESP integrity algorithm HMAC_SHA1_96[_0] 303s | token: ';' "modp1024" '' '' 303s | parsing dh: 303s | ike_alg_byname() failed: ESP DH algorithm 'modp1024' is not supported 303s | lookup for DH algorithm 'modp1024' failed 303s | ... failed 'ESP DH algorithm 'modp1024' is not supported' 303s | parsing '3des-sha1;modp1536' for ESP 303s | proposal: '3des-sha1;modp1536' 303s | token: '' '' "3des" '-' 303s | token: '' "3des" '-' "sha1" ';' 303s | token: '-' "sha1" ';' "modp1536" '' 303s | appending ESP encryption algorithm 3DES_CBC[_0] 303s | parsing integ: 303s | appending ESP integrity algorithm HMAC_SHA1_96[_0] 303s | token: ';' "modp1536" '' '' 303s | parsing dh: 303s | appending ESP DH algorithm MODP1536[_0] 303s | token: '' '' '' 303s ipsec algparse: ignoring ESP DH algorithm MODP1536 as PFS policy is disabled 303s | parsing '3des-sha1;modp2048' for ESP 303s | proposal: '3des-sha1;modp2048' 303s | token: '' '' "3des" '-' 303s | token: '' "3des" '-' "sha1" ';' 303s | token: '-' "sha1" ';' "modp2048" '' 303s | appending ESP encryption algorithm 3DES_CBC[_0] 303s | parsing integ: 303s | appending ESP integrity algorithm HMAC_SHA1_96[_0] 303s | token: ';' "modp2048" '' '' 303s | parsing dh: 303s | appending ESP DH algorithm MODP2048[_0] 303s | token: '' '' '' 303s ipsec algparse: ignoring ESP DH algorithm MODP2048 as PFS policy is disabled 303s | parsing '3des-sha1;dh21' for ESP 303s | proposal: '3des-sha1;dh21' 303s | token: '' '' "3des" '-' 303s | token: '' "3des" '-' "sha1" ';' 303s | token: '-' "sha1" ';' "dh21" '' 303s | appending ESP encryption algorithm 3DES_CBC[_0] 303s | parsing integ: 303s | appending ESP integrity algorithm HMAC_SHA1_96[_0] 303s | token: ';' "dh21" '' '' 303s | parsing dh: 303s | appending ESP DH algorithm DH21[_0] 303s | token: '' '' '' 303s ipsec algparse: ignoring ESP DH algorithm DH21 as PFS policy is disabled 303s | parsing '3des-sha1;ecp_521' for ESP 303s | proposal: '3des-sha1;ecp_521' 303s | token: '' '' "3des" '-' 303s | token: '' "3des" '-' "sha1" ';' 303s | token: '-' "sha1" ';' "ecp_521" '' 303s | appending ESP encryption algorithm 3DES_CBC[_0] 303s | parsing integ: 303s | appending ESP integrity algorithm HMAC_SHA1_96[_0] 303s | token: ';' "ecp_521" '' '' 303s | parsing dh: 303s | appending ESP DH algorithm DH21[_0] 303s | token: '' '' '' 303s ipsec algparse: ignoring ESP DH algorithm DH21 as PFS policy is disabled 303s | parsing '3des-sha1;dh23' for ESP 303s | proposal: '3des-sha1;dh23' 303s | token: '' '' "3des" '-' 303s | token: '' "3des" '-' "sha1" ';' 303s | token: '-' "sha1" ';' "dh23" '' 303s | appending ESP encryption algorithm 3DES_CBC[_0] 303s | parsing integ: 303s | appending ESP integrity algorithm HMAC_SHA1_96[_0] 303s | token: ';' "dh23" '' '' 303s | parsing dh: 303s | ike_alg_byname() failed: ESP DH algorithm 'dh23' is not supported 303s | lookup for DH algorithm 'dh23' failed 303s | ... failed 'ESP DH algorithm 'dh23' is not supported' 303s | parsing '3des-sha1;dh24' for ESP 303s | proposal: '3des-sha1;dh24' 303s | token: '' '' "3des" '-' 303s | token: '' "3des" '-' "sha1" ';' 303s | token: '-' "sha1" ';' "dh24" '' 303s | appending ESP encryption algorithm 3DES_CBC[_0] 303s | parsing integ: 303s | appending ESP integrity algorithm HMAC_SHA1_96[_0] 303s | token: ';' "dh24" '' '' 303s | parsing dh: 303s | ike_alg_byname() failed: ESP DH algorithm 'dh24' is not supported 303s | lookup for DH algorithm 'dh24' failed 303s | ... failed 'ESP DH algorithm 'dh24' is not supported' 303s | parsing '3des-sha1' for ESP 303s | proposal: '3de AES_CCM_16_256-NONE 303s algparse -v2 'esp=aes_gcm_8_128-null' (expect SUCCESS) 303s AES_GCM_8_128-NONE 303s algparse -v2 'esp=aes_gcm_12_192-null' (expect SUCCESS) 303s AES_GCM_12_192-NONE 303s algparse -v2 'esp=aes_gcm_16_256-null' (expect SUCCESS) 303s AES_GCM_16_256-NONE 303s algparse -v2 'esp=aes_ctr' (expect SUCCESS) 303s AES_CTR-HMAC_SHA2_512_256+HMAC_SHA2_256_128 303s algparse -v2 'esp=aesctr' (expect SUCCESS) 303s AES_CTR-HMAC_SHA2_512_256+HMAC_SHA2_256_128 303s algparse -v2 'esp=aes_ctr128' (expect SUCCESS) 303s AES_CTR_128-HMAC_SHA2_512_256+HMAC_SHA2_256_128 303s algparse -v2 'esp=aes_ctr192' (expect SUCCESS) 303s AES_CTR_192-HMAC_SHA2_512_256+HMAC_SHA2_256_128 303s algparse -v2 'esp=aes_ctr256' (expect SUCCESS) 303s AES_CTR_256-HMAC_SHA2_512_256+HMAC_SHA2_256_128 303s algparse -v2 'esp=camellia_cbc_256-hmac_sha2_512_256;modp8192' (expect SUCCESS) 303s s-sha1' 303s | token: '' '' "3des" '-' 303s | token: '' "3des" '-' "sha1" '' 303s | token: '-' "sha1" '' '' 303s | appending ESP encryption algorithm 3DES_CBC[_0] 303s | parsing integ: 303s | appending ESP integrity algorithm HMAC_SHA1_96[_0] 303s | token: '' '' '' 303s | parsing 'null-sha1' for ESP 303s | proposal: 'null-sha1' 303s | token: '' '' "null" '-' 303s | token: '' "null" '-' "sha1" '' 303s | token: '-' "sha1" '' '' 303s | appending ESP encryption algorithm NULL[_0] 303s | parsing integ: 303s | appending ESP integrity algorithm HMAC_SHA1_96[_0] 303s | token: '' '' '' 303s | parsing 'aes_cbc' for ESP 303s | proposal: 'aes_cbc' 303s | token: '' '' "aes_cbc" '' 303s | token: '' "aes_cbc" '' '' 303s | token: '' '' '' 303s | appending ESP encryption algorithm AES_CBC[_0] 303s | appending ESP integrity algorithm HMAC_SHA2_512_256[_0] 303s | appending ESP integrity algorithm HMAC_SHA2_256_128[_0] 303s | parsing 'aes-sha' for ESP 303s | proposal: 'aes-sha' 303s | token: '' '' "aes" '-' 303s | token: '' "aes" '-' "sha" '' 303s | token: '-' "sha" '' '' 303s | appending ESP encryption algorithm AES_CBC[_0] 303s | parsing integ: 303s | appending ESP integrity algorithm HMAC_SHA1_96[_0] 303s | token: '' '' '' 303s | parsing 'aes-sha1' for ESP 303s | proposal: 'aes-sha1' 303s | token: '' '' "aes" '-' 303s | token: '' "aes" '-' "sha1" '' 303s | token: '-' "sha1" '' '' 303s | appending ESP encryption algorithm AES_CBC[_0] 303s | parsing integ: 303s | appending ESP integrity algorithm HMAC_SHA1_96[_0] 303s | token: '' '' '' 303s | parsing 'aes128-sha1' for ESP 303s | proposal: 'aes128-sha1' 303s | token: '' '' "aes128" '-' 303s | token: '' "aes128" '-' "sha1" '' 303s | ike_alg_byname() failed: ESP encryption algorithm 'aes128' is not recognized 303s | token: '-' "sha1" '' '' 303s | appending ESP encryption algorithm AES_CBC[_128] 303s | parsing integ: 303s | appending ESP integrity algorithm HMAC_SHA1_96[_0] 303s | token: '' '' '' 303s | parsing 'aes-sha2' for ESP 303s | proposal: 'aes-sha2' 303s | token: '' '' "aes" '-' 303s | token: '' "aes" '-' "sha2" '' 303s | token: '-' "sha2" '' '' 303s | appending ESP encryption algorithm AES_CBC[_0] 303s | parsing integ: 303s | appending ESP integrity algorithm HMAC_SHA2_256_128[_0] 303s | token: '' '' '' 303s | parsing 'aes-sha256' for ESP 303s | proposal: 'aes-sha256' 303s | token: '' '' "aes" '-' 303s | token: '' "aes" '-' "sha256" '' 303s | token: '-' "sha256" '' '' 303s | appending ESP encryption algorithm AES_CBC[_0] 303s | parsing integ: 303s | appending ESP integrity algorithm HMAC_SHA2_256_128[_0] 303s | token: '' '' '' 303s | parsing 'aes-sha384' for ESP 303s | proposal: 'aes-sha384' 303s | token: '' '' "aes" '-' 303s | token: '' "aes" '-' "sha384" '' 303s | token: '-' "sha384" '' '' 303s | appending ESP encryption algorithm AES_CBC[_0] 303s | parsing integ: 303s | appending ESP integrity algorithm HMAC_SHA2_384_192[_0] 303s | token: '' '' '' 303s | parsing 'aes-sha512' for ESP 303s | proposal: 'aes-sha512' 303s | token: '' '' "aes" '-' 303s | token: '' "aes" '-' "sha512" '' 303s | token: '-' "sha512" '' '' 303s | appending ESP encryption algorithm AES_CBC[_0] 303s | parsing integ: 303s | appending ESP integrity algorithm HMAC_SHA2_512_256[_0] 303s | token: '' '' '' 303s | parsing 'aes128-aes_xcbc' for ESP 303s | proposal: 'aes128-aes_xcbc' 303s | token: '' '' "aes128" '-' 303s | token: '' "aes128" '-' "aes_xcbc" '' 303s | ike_alg_byname() failed: ESP encryption algorithm 'aes128' is not recognized 303s | token: '-' "aes_xcbc" '' '' 303s | appending ESP encryption algorithm AES_CBC[_128] 303s | parsing integ: 303s | appending ESP integrity algorithm AES_XCBC_96[_0] 303s | token: '' '' '' 303s | parsing 'aes192-sha1' for ESP 303s | proposal: 'aes192-sha1' 303s | token: '' '' "aes192" '-' 303s | token: '' "aes192" '-' "sha1" '' 303s | ike_alg_byname() failed: ESP encryption algorithm 'aes192' is not recognized 303s | token: '-' "sha1" '' '' 303s | appending ESP encryption algorithm AES_CBC[_192] 303s | parsing integ: 303s | appending ESP integrity algorithm HMAC_SHA1_96[_0] 303s | token: '' '' '' 303s | parsing 'aes256-sha1' for ESP 303s | proposal: 'aes256-sha1' 303s | token: '' '' "aes256" '-' 303s | token: '' "aes256" '-' "sha1" '' 303s | ike_alg_byname() failed: ESP encryption algorithm 'aes256' is not recognized 303s | token: '-' "sha1" '' '' 303s | appending ESP encryption algorithm AES_CBC[_256] 303s | parsing integ: 303s | appending ESP integrity algorithm HMAC_SHA1_96[_0] 303s | token: '' '' '' 303s | parsing 'aes256-sha' for ESP 303s | proposal: 'aes256-sha' 303s | token: '' '' "aes256" '-' 303s | token: '' "aes256" '-' "sha" '' 303s | ike_alg_byname() failed: ESP encryption algorithm 'aes256' is not recognized 303s | token: '-' "sha" '' '' 303s | appending ESP encryption algorithm AES_CBC[_256] 303s | parsing integ: 303s | appending ESP integrity algorithm HMAC_SHA1_96[_0] 303s | token: '' '' '' 303s | parsing 'aes256-sha2' for ESP 303s | proposal: 'aes256-sha2' 303s | token: '' '' "aes256" '-' 303s | token: '' "aes256" '-' "sha2" '' 303s | ike_alg_byname() failed: ESP encryption algorithm 'aes256' is not recognized 303s | token: '-' "sha2" '' '' 303s | appending ESP encryption algorithm AES_CBC[_256] 303s | parsing integ: 303s | appending ESP integrity algorithm HMAC_SHA2_256_128[_0] 303s | token: '' '' '' 303s | parsing 'aes256-sha2_256' for ESP 303s | proposal: 'aes256-sha2_256' 303s | token: '' '' "aes256" '-' 303s | token: '' "aes256" '-' "sha2_256" '' 303s | ike_alg_byname() failed: ESP encryption algorithm 'aes256' is not recognized 303s | token: '-' "sha2_256" '' '' 303s | appending ESP encryption algorithm AES_CBC[_256] 303s | parsing integ: 303s | appending ESP integrity algorithm HMAC_SHA2_256_128[_0] 303s | token: '' '' '' 303s | parsing 'aes256-sha2_384' for ESP 303s | proposal: 'aes256-sha2_384' 303s | token: '' '' "aes256" '-' 303s | token: '' "aes256" '-' "sha2_384" '' 303s | ike_alg_byname() failed: ESP encryption algorithm 'aes256' is not recognized 303s | token: '-' "sha2_384" '' '' 303s | appending ESP encryption algorithm AES_CBC[_256] 303s | parsing integ: 303s | appending ESP integrity algorithm HMAC_SHA2_384_192[_0] 303s | token: '' '' '' 303s | parsing 'aes256-sha2_512' for ESP 303s | proposal: 'aes256-sha2_512' 303s | token: '' '' "aes256" '-' 303s | token: '' "aes256" '-' "sha2_512" '' 303s | ike_alg_byname() failed: ESP encryption algorithm 'aes256' is not recognized 303s | token: '-' "sha2_512" '' '' 303s | appending ESP encryption algorithm AES_CBC[_256] 303s | parsing integ: 303s | appending ESP integrity algorithm HMAC_SHA2_512_256[_0] 303s | token: '' '' '' 303s | parsing 'camellia' for ESP 303s | proposal: 'camellia' 303s | token: '' '' "camellia" '' 303s | token: '' "camellia" '' '' 303s | token: '' '' '' 303s | appending ESP encryption algorithm CAMELLIA_CBC[_0] 303s | appending ESP integrity algorithm HMAC_SHA2_512_256[_0] 303s | appending ESP integrity algorithm HMAC_SHA2_256_128[_0] 303s | parsing 'camellia128' for ESP 303s | proposal: 'camellia128' 303s | token: '' '' "camellia128" '' 303s | token: '' "camellia128" '' '' 303s | ike_alg_byname() failed: ESP encryption algorithm 'camellia128' is not recognized 303s | token: '' '' '' 303s | appending ESP encryption algorithm CAMELLIA_CBC[_128] 303s | appending ESP integrity algorithm HMAC_SHA2_512_256[_0] 303s | appending ESP integrity algorithm HMAC_SHA2_256_128[_0] 303s | parsing 'camellia192' for ESP 303s | proposal: 'camellia192' 303s | token: '' '' "camellia192" '' 303s | token: '' "camellia192" '' '' 303s | ike_alg_byname() failed: ESP encryption algorithm 'camellia192' is not recognized 303s | token: '' '' '' 303s | appending ESP encryption algorithm CAMELLIA_CBC[_192] 303s | appending ESP integrity algorithm HMAC_SHA2_512_256[_0] 303s | appending ESP integrity algorithm HMAC_SHA2_256_128[_0] 303s | parsing 'camellia256' for ESP 303s | proposal: 'camellia256' 303s | token: '' '' "camellia256" '' 303s | token: '' "camellia256" '' '' 303s | ike_alg_byname() failed: ESP encryption algorithm 'camellia256' is not recognized 303s | token: '' '' '' 303s | appending ESP encryption algorithm CAMELLIA_CBC[_256] 303s | appending ESP integrity algorithm HMAC_SHA2_512_256[_0] 303s | appending ESP integrity algorithm HMAC_SHA2_256_128[_0] 303s | parsing 'aes_ccm' for ESP 303s | proposal: 'aes_ccm' 303s | token: '' '' "aes_ccm" '' 303s | token: '' "aes_ccm" '' '' 303s | token: '' '' '' 303s | appending ESP encryption algorithm AES_CCM_16[_0] 303s | appending ESP integrity algorithm NONE[_0] 303s | parsing 'aes_ccm_a-128-null' for ESP 303s | proposal: 'aes_ccm_a-128-null' 303s | token: '' '' "aes_ccm_a" '-' 303s | token: '' "aes_ccm_a" '-' "128" '-' 303s | token: '-' "128" '-' "null" '' 303s | token: '-' "null" '' '' 303s | appending ESP encryption algorithm AES_CCM_8[_128] 303s | parsing integ: 303s | appending ESP integrity algorithm NONE[_0] 303s | token: '' '' '' 303s | parsing 'aes_ccm_a-192-null' for ESP 303s | proposal: 'aes_ccm_a-192-null' 303s | token: '' '' "aes_ccm_a" '-' 303s | token: '' "aes_ccm_a" '-' "192" '-' 303s | token: '-' "192" '-' "null" '' 303s | token: '-' "null" '' '' 303s | appending ESP encryption algorithm AES_CCM_8[_192] 303s | parsing integ: 303s | appending ESP integrity algorithm NONE[_0] 303s | token: '' '' '' 303s | parsing 'aes_ccm_a-256-null' for ESP 303s | proposal: 'aes_ccm_a-256-null' 303s | token: '' '' "aes_ccm_a" '-' 303s | token: '' "aes_ccm_a" '-' "256" '-' 303s | token: '-' "256" '-' "null" '' 303s | token: '-' "null" '' '' 303s | appending ESP encryption algorithm AES_CCM_8[_256] 303s | parsing integ: 303s | appending ESP integrity algorithm NONE[_0] 303s | token: '' '' '' 303s | parsing 'aes_ccm_b-128-null' for ESP 303s | proposal: 'aes_ccm_b-128-null' 303s | token: '' '' "aes_ccm_b" '-' 303s | token: '' "aes_ccm_b" '-' "128" '-' 303s | token: '-' "128" '-' "null" '' 303s | token: '-' "null" '' '' 303s | appending ESP encryption algorithm AES_CCM_12[_128] 303s | parsing integ: 303s | appending ESP integrity algorithm NONE[_0] 303s | token: '' '' '' 303s | parsing 'aes_ccm_b-192-null' for ESP 303s | proposal: 'aes_ccm_b-192-null' 303s | token: '' '' "aes_ccm_b" '-' 303s | token: '' "aes_ccm_b" '-' "192" '-' 303s | token: '-' "192" '-' "null" '' 303s | token: '-' "null" '' '' 303s | appending ESP encryption algorithm AES_CCM_12[_192] 303s | parsing integ: 303s | appending ESP integrity algorithm NONE[_0] 303s | token: '' '' '' 303s | parsing 'aes_ccm_b-256-null' for ESP 303s | proposal: 'aes_ccm_b-256-null' 303s | token: '' '' "aes_ccm_b" '-' 303s | token: '' "aes_ccm_b" '-' "256" '-' 303s | token: '-' "256" '-' "null" '' 303s | token: '-' "null" '' '' 303s | appending ESP encryption algorithm AES_CCM_12[_256] 303s | parsing integ: 303s | appending ESP integrity algorithm NONE[_0] 303s | token: '' '' '' 303s | parsing 'aes_ccm_c-128-null' for ESP 303s | proposal: 'aes_ccm_c-128-null' 303s | token: '' '' "aes_ccm_c" '-' 303s | token: '' "aes_ccm_c" '-' "128" '-' 303s | token: '-' "128" '-' "null" '' 303s | token: '-' "null" '' '' 303s | appending ESP encryption algorithm AES_CCM_16[_128] 303s | parsing integ: 303s | appending ESP integrity algorithm NONE[_0] 303s | token: '' '' '' 303s | parsing 'aes_ccm_c-192-null' for ESP 303s | proposal: 'aes_ccm_c-192-null' 303s | token: '' '' "aes_ccm_c" '-' 303s | token: '' "aes_ccm_c" '-' "192" '-' 303s | token: '-' "192" '-' "null" '' 303s | token: '-' "null" '' '' 303s | appending ESP encryption algorithm AES_CCM_16[_192] 303s | parsing integ: 303s | appending ESP integrity algorithm NONE[_0] 303s | token: '' '' '' 303s | parsing 'aes_ccm_c-256-null' for ESP 303s | proposal: 'aes_ccm_c-256-null' 303s | token: '' '' "aes_ccm_c" '-' 303s | token: '' "aes_ccm_c" '-' "256" '-' 303s | token: '-' "256" '-' "null" '' 303s | token: '-' "null" '' '' 303s | appending ESP encryption algorithm AES_CCM_16[_256] 303s | parsing integ: 303s | appending ESP integrity algorithm NONE[_0] 303s | token: '' '' '' 303s | parsing 'aes_gcm' for ESP 303s | proposal: 'aes_gcm' 303s | token: '' '' "aes_gcm" '' 303s | token: '' "aes_gcm" '' '' 303s | token: '' '' '' 303s | appending ESP encryption algorithm AES_GCM_16[_0] 303s | appending ESP integrity algorithm NONE[_0] 303s | parsing 'aes_gcm_a-128-null' for ESP 303s | proposal: 'aes_gcm_a-128-null' 303s | token: '' '' "aes_gcm_a" '-' 303s | token: '' "aes_gcm_a" '-' "128" '-' 303s | token: '-' "128" '-' "null" '' 303s | token: '-' "null" '' '' 303s | appending ESP encryption algorithm AES_GCM_8[_128] 303s | parsing integ: 303s | appending ESP integrity algorithm NONE[_0] 303s | token: '' '' '' 303s | parsing 'aes_gcm_a-192-null' for ESP 303s | proposal: 'aes_gcm_a-192-null' 303s | token: '' '' "aes_gcm_a" '-' 303s | token: '' "aes_gcm_a" '-' "192" '-' 303s | token: '-' "192" '-' "null" '' 303s | token: '-' "null" '' '' 303s | appending ESP encryption algorithm AES_GCM_8[_192] 303s | parsing integ: 303s | appending ESP integrity algorithm NONE[_0] 303s | token: '' '' '' 303s | parsing 'aes_gcm_a-256-null' for ESP 303s | proposal: 'aes_gcm_a-256-null' 303s | token: '' '' "aes_gcm_a" '-' 303s | token: '' "aes_gcm_a" '-' "256" '-' 303s | token: '-' "256" '-' "null" '' 303s | token: '-' "null" '' '' 303s | appending ESP encryption algorithm AES_GCM_8[_256] 303s | parsing integ: 303s | appending ESP integrity algorithm NONE[_0] 303s | token: '' '' '' 303s | parsing 'aes_gcm_b-128-null' for ESP 303s | proposal: 'aes_gcm_b-128-null' 303s | token: '' '' "aes_gcm_b" '-' 303s | token: '' "aes_gcm_b" '-' "128" '-' 303s | token: '-' "128" '-' "null" '' 303s | token: '-' "null" '' '' 303s | appending ESP encryption algorithm AES_GCM_12[_128] 303s | parsing integ: 303s | appending ESP integrity algorithm NONE[_0] 303s | token: '' '' '' 303s | parsing 'aes_gcm_b-192-null' for ESP 303s | proposal: 'aes_gcm_b-192-null' 303s | token: '' '' "aes_gcm_b" '-' 303s | token: '' "aes_gcm_b" '-' "192" '-' 303s | token: '-' "192" '-' "null" '' 303s | token: '-' "null" '' '' 303s | appending ESP encryption algorithm AES_GCM_12[_192] 303s | parsing integ: 303s | appending ESP integrity algorithm NONE[_0] 303s | token: '' '' '' 303s | parsing 'aes_gcm_b-256-null' for ESP 303s | proposal: 'aes_gcm_b-256-null' 303s | token: '' '' "aes_gcm_b" '-' 303s | token: '' "aes_gcm_b" '-' "256" '-' 303s | token: '-' "256" '-' "null" '' 303s | token: '-' "null" '' '' 303s | appending ESP encryption algorithm AES_GCM_12[_256] 303s | parsing integ: 303s | appending ESP integrity algorithm NONE[_0] 303s | token: '' '' '' 303s | parsing 'aes_gcm_c-128-null' for ESP 303s | proposal: 'aes_gcm_c-128-null' 303s | token: '' '' "aes_gcm_c" '-' 303s | token: '' "aes_gcm_c" '-' "128" '-' 303s | token: '-' "128" '-' "null" '' 303s | token: '-' "null" '' '' 303s | appending ESP encryption algorithm AES_GCM_16[_128] 303s | parsing integ: 303s | appending ESP integrity algorithm NONE[_0] 303s | token: '' '' '' 303s | parsing 'aes_gcm_c-192-null' for ESP 303s | proposal: 'aes_gcm_c-192-null' 303s | token: '' '' "aes_gcm_c" '-' 303s | token: '' "aes_gcm_c" '-' "192" '-' 303s | token: '-' "192" '-' "null" '' 303s | token: '-' "null" '' '' 303s | appending ESP encryption algorithm AES_GCM_16[_192] 303s | parsing integ: 303s | appending ESP integrity algorithm NONE[_0] 303s | token: '' '' '' 303s | parsing 'aes_gcm_c-256-null' for ESP 303s | proposal: 'aes_gcm_c-256-null' 303s | token: '' '' "aes_gcm_c" '-' 303s | token: '' "aes_gcm_c" '-' "256" '-' 303s | token: '-' "256" '-' "null" '' 303s | token: '-' "null" '' '' 303s | appending ESP encryption algorithm AES_GCM_16[_256] 303s | parsing integ: 303s | appending ESP integrity algorithm NONE[_0] 303s | token: '' '' '' 303s | parsing 'aes_ccm_a-null' for ESP 303s | proposal: 'aes_ccm_a-null' 303s | token: '' '' "aes_ccm_a" '-' 303s | token: '' "aes_ccm_a" '-' "null" '' 303s | token: '-' "null" '' '' 303s | appending ESP encryption algorithm AES_CCM_8[_0] 303s | parsing integ: 303s | appending ESP integrity algorithm NONE[_0] 303s | token: '' '' '' 303s | parsing 'aes_ccm_b-null' for ESP 303s | proposal: 'aes_ccm_b-null' 303s | token: '' '' "aes_ccm_b" '-' 303s | token: '' "aes_ccm_b" '-' "null" '' 303s | token: '-' "null" '' '' 303s | appending ESP encryption algorithm AES_CCM_12[_0] 303s | parsing integ: 303s | appending ESP integrity algorithm NONE[_0] 303s | token: '' '' '' 303s | parsing 'aes_ccm_c-null' for ESP 303s | proposal: 'aes_ccm_c-null' 303s | token: '' '' "aes_ccm_c" '-' 303s | token: '' "aes_ccm_c" '-' "null" '' 303s | token: '-' "null" '' '' 303s | appending ESP encryption algorithm AES_CCM_16[_0] 303s | parsing integ: 303s | appending ESP integrity algorithm NONE[_0] 303s | token: '' '' '' 303s | parsing 'aes_gcm_a-null' for ESP 303s | proposal: 'aes_gcm_a-null' 303s | token: '' '' "aes_gcm_a" '-' 303s | token: '' "aes_gcm_a" '-' "null" '' 303s | token: '-' "null" '' '' 303s | appending ESP encryption algorithm AES_GCM_8[_0] 303s | parsing integ: 303s | appending ESP integrity algorithm NONE[_0] 303s | token: '' '' '' 303s | parsing 'aes_gcm_b-null' for ESP 303s | proposal: 'aes_gcm_b-null' 303s | token: '' '' "aes_gcm_b" '-' 303s | token: '' "aes_gcm_b" '-' "null" '' 303s | token: '-' "null" '' '' 303s | appending ESP encryption algorithm AES_GCM_12[_0] 303s | parsing integ: 303s | appending ESP integrity algorithm NONE[_0] 303s | token: '' '' '' 303s | parsing 'aes_gcm_c-null' for ESP 303s | proposal: 'aes_gcm_c-null' 303s | token: '' '' "aes_gcm_c" '-' 303s | token: '' "aes_gcm_c" '-' "null" '' 303s | token: '-' "null" '' '' 303s | appending ESP encryption algorithm AES_GCM_16[_0] 303s | parsing integ: 303s | appending ESP integrity algorithm NONE[_0] 303s | token: '' '' '' 303s | parsing 'aes_ccm-null' for ESP 303s | proposal: 'aes_ccm-null' 303s | token: '' '' "aes_ccm" '-' 303s | token: '' "aes_ccm" '-' "null" '' 303s | token: '-' "null" '' '' 303s | appending ESP encryption algorithm AES_CCM_16[_0] 303s | parsing integ: 303s | appending ESP integrity algorithm NONE[_0] 303s | token: '' '' '' 303s | parsing 'aes_gcm-null' for ESP 303s | proposal: 'aes_gcm-null' 303s | token: '' '' "aes_gcm" '-' 303s | token: '' "aes_gcm" '-' "null" '' 303s | token: '-' "null" '' '' 303s | appending ESP encryption algorithm AES_GCM_16[_0] 303s | parsing integ: 303s | appending ESP integrity algorithm NONE[_0] 303s | token: '' '' '' 303s | parsing 'aes_ccm-256-null' for ESP 303s | proposal: 'aes_ccm-256-null' 303s | token: '' '' "aes_ccm" '-' 303s | token: '' "aes_ccm" '-' "256" '-' 303s | token: '-' "256" '-' "null" '' 303s | token: '-' "null" '' '' 303s | appending ESP encryption algorithm AES_CCM_16[_256] 303s | parsing integ: 303s | appending ESP integrity algorithm NONE[_0] 303s | token: '' '' '' 303s | parsing 'aes_gcm-192-null' for ESP 303s | proposal: 'aes_gcm-192-null' 303s | token: '' '' "aes_gcm" '-' 303s | token: '' "aes_gcm" '-' "192" '-' 303s | token: '-' "192" '-' "null" '' 303s | token: '-' "null" '' '' 303s | appending ESP encryption algorithm AES_GCM_16[_192] 303s | parsing integ: 303s | appending ESP integrity algorithm NONE[_0] 303s | token: '' '' '' 303s | parsing 'aes_ccm_256-null' for ESP 303s | proposal: 'aes_ccm_256-null' 303s | token: '' '' "aes_ccm_256" '-' 303s | token: '' "aes_ccm_256" '-' "null" '' 303s | ike_alg_byname() failed: ESP encryption algorithm 'aes_ccm_256' is not recognized 303s | token: '-' "null" '' '' 303s | appending ESP encryption algorithm AES_CCM_16[_256] 303s | parsing integ: 303s | appending ESP integrity algorithm NONE[_0] 303s | token: '' '' '' 303s | parsing 'aes_gcm_192-null' for ESP 303s | proposal: 'aes_gcm_192-null' 303s | token: '' '' "aes_gcm_192" '-' 303s | token: '' "aes_gcm_192" '-' "null" '' 303s | ike_alg_byname() failed: ESP encryption algorithm 'aes_gcm_192' is not recognized 303s | token: '-' "null" '' '' 303s | appending ESP encryption algorithm AES_GCM_16[_192] 303s | parsing integ: 303s | appending ESP integrity algorithm NONE[_0] 303s | token: '' '' '' 303s | parsing 'aes_ccm_8-null' for ESP 303s | proposal: 'aes_ccm_8-null' 303s | token: '' '' "aes_ccm_8" '-' 303s | token: '' "aes_ccm_8" '-' "null" '' 303s | token: '-' "null" '' '' 303s | appending ESP encryption algorithm AES_CCM_8[_0] 303s | parsing integ: 303s | appending ESP integrity algorithm NONE[_0] 303s | token: '' '' '' 303s | parsing 'aes_ccm_12-null' for ESP 303s | proposal: 'aes_ccm_12-null' 303s | token: '' '' "aes_ccm_12" '-' 303s | token: '' "aes_ccm_12" '-' "null" '' 303s | token: '-' "null" '' '' 303s | appending ESP encryption algorithm AES_CCM_12[_0] 303s | parsing integ: 303s | appending ESP integrity algorithm NONE[_0] 303s | token: '' '' '' 303s | parsing 'aes_ccm_16-null' for ESP 303s | proposal: 'aes_ccm_16-null' 303s | token: '' '' "aes_ccm_16" '-' 303s | token: '' "aes_ccm_16" '-' "null" '' 303s | token: '-' "null" '' '' 303s | appending ESP encryption algorithm AES_CCM_16[_0] 303s | parsing integ: 303s | appending ESP integrity algorithm NONE[_0] 303s | token: '' '' '' 303s | parsing 'aes_gcm_8-null' for ESP 303s | proposal: 'aes_gcm_8-null' 303s | token: '' '' "aes_gcm_8" '-' 303s | token: '' "aes_gcm_8" '-' "null" '' 303s | token: '-' "null" '' '' 303s | appending ESP encryption algorithm AES_GCM_8[_0] 303s | parsing integ: 303s | appending ESP integrity algorithm NONE[_0] 303s | token: '' '' '' 303s | parsing 'aes_gcm_12-null' for ESP 303s | proposal: 'aes_gcm_12-null' 303s | token: '' '' "aes_gcm_12" '-' 303s | token: '' "aes_gcm_12" '-' "null" '' 303s | token: '-' "null" '' '' 303s | appending ESP encryption algorithm AES_GCM_12[_0] 303s | parsing integ: 303s | appending ESP integrity algorithm NONE[_0] 303s | token: '' '' '' 303s | parsing 'aes_gcm_16-null' for ESP 303s | proposal: 'aes_gcm_16-null' 303s | token: '' '' "aes_gcm_16" '-' 303s | token: '' "aes_gcm_16" '-' "null" '' 303s | token: '-' "null" '' '' 303s | appending ESP encryption algorithm AES_GCM_16[_0] 303s | parsing integ: 303s | appending ESP integrity algorithm NONE[_0] 303s | token: '' '' '' 303s | parsing 'aes_ccm_8-128-null' for ESP 303s | proposal: 'aes_ccm_8-128-null' 303s | token: '' '' "aes_ccm_8" '-' 303s | token: '' "aes_ccm_8" '-' "128" '-' 303s | token: '-' "128" '-' "null" '' 303s | token: '-' "null" '' '' 303s | appending ESP encryption algorithm AES_CCM_8[_128] 303s | parsing integ: 303s | appending ESP integrity algorithm NONE[_0] 303s | token: '' '' '' 303s | parsing 'aes_ccm_12-192-null' for ESP 303s | proposal: 'aes_ccm_12-192-null' 303s | token: '' '' "aes_ccm_12" '-' 303s | token: '' "aes_ccm_12" '-' "192" '-' 303s | token: '-' "192" '-' "null" '' 303s | token: '-' "null" '' '' 303s | appending ESP encryption algorithm AES_CCM_12[_192] 303s | parsing integ: 303s | appending ESP integrity algorithm NONE[_0] 303s | token: '' '' '' 303s | parsing 'aes_ccm_16-256-null' for ESP 303s | proposal: 'aes_ccm_16-256-null' 303s | token: '' '' "aes_ccm_16" '-' 303s | token: '' "aes_ccm_16" '-' "256" '-' 303s | token: '-' "256" '-' "null" '' 303s | token: '-' "null" '' '' 303s | appending ESP encryption algorithm AES_CCM_16[_256] 303s | parsing integ: 303s | appending ESP integrity algorithm NONE[_0] 303s | token: '' '' '' 303s | parsing 'aes_gcm_8-128-null' for ESP 303s | proposal: 'aes_gcm_8-128-null' 303s | token: '' '' "aes_gcm_8" '-' 303s | token: '' "aes_gcm_8" '-' "128" '-' 303s | token: '-' "128" '-' "null" '' 303s | token: '-' "null" '' '' 303s | appending ESP encryption algorithm AES_GCM_8[_128] 303s | parsing integ: 303s | appending ESP integrity algorithm NONE[_0] 303s | token: '' '' '' 303s | parsing 'aes_gcm_12-192-null' for ESP 303s | proposal: 'aes_gcm_12-192-null' 303s | token: '' '' "aes_gcm_12" '-' 303s | token: '' "aes_gcm_12" '-' "192" '-' 303s | token: '-' "192" '-' "null" '' 303s | token: '-' "null" '' '' 303s | appending ESP encryption algorithm AES_GCM_12[_192] 303s | parsing integ: 303s | appending ESP integrity algorithm NONE[_0] 303s | token: '' '' '' 303s | parsing 'aes_gcm_16-256-null' for ESP 303s | proposal: 'aes_gcm_16-256-null' 303s | token: '' '' "aes_gcm_16" '-' 303s | token: '' "aes_gcm_16" '-' "256" '-' 303s | token: '-' "256" '-' "null" '' 303s | token: '-' "null" '' '' 303s | appending ESP encryption algorithm AES_GCM_16[_256] 303s | parsing integ: 303s | appending ESP integrity algorithm NONE[_0] 303s | token: '' '' '' 303s | parsing 'aes_ccm_8_128-null' for ESP 303s | proposal: 'aes_ccm_8_128-null' 303s | token: '' '' "aes_ccm_8_128" '-' 303s | token: '' "aes_ccm_8_128" '-' "null" '' 303s | ike_alg_byname() failed: ESP encryption algorithm 'aes_ccm_8_128' is not recognized 303s | token: '-' "null" '' '' 303s | appending ESP encryption algorithm AES_CCM_8[_128] 303s | parsing integ: 303s | appending ESP integrity algorithm NONE[_0] 303s | token: '' '' '' 303s | parsing 'aes_ccm_12_192-null' for ESP 303s | proposal: 'aes_ccm_12_192-null' 303s | token: '' '' "aes_ccm_12_192" '-' 303s | token: '' "aes_ccm_12_192" '-' "null" '' 303s | ike_alg_byname() failed: ESP encryption algorithm 'aes_ccm_12_192' is not recognized 303s | token: '-' "null" '' '' 303s | appending ESP encryption algorithm AES_CCM_12[_192] 303s | parsing integ: 303s | appending ESP integrity algorithm NONE[_0] 303s | token: '' '' '' 303s | parsing 'aes_ccm_16_256-null' for ESP 303s | proposal: 'aes_ccm_16_256-null' 303s | token: '' '' "aes_ccm_16_256" '-' 303s | token: '' "aes_ccm_16_256" '-' "null" '' 303s | ike_alg_byname() failed: ESP encryption algorithm 'aes_ccm_16_256' is not recognized 303s | token: '-' "null" '' '' 303s | appending ESP encryption algorithm AES_CCM_16[_256] 303s | parsing integ: 303s | appending ESP integrity algorithm NONE[_0] 303s | token: '' '' '' 303s | parsing 'aes_gcm_8_128-null' for ESP 303s | proposal: 'aes_gcm_8_128-null' 303s | token: '' '' "aes_gcm_8_128" '-' 303s | token: '' "aes_gcm_8_128" '-' "null" '' 303s | ike_alg_byname() failed: ESP encryption algorithm 'aes_gcm_8_128' is not recognized 303s | token: '-' "null" '' '' 303s | appending ESP encryption algorithm AES_GCM_8[_128] 303s | parsing integ: 303s | appending ESP integrity algorithm NONE[_0] 303s | token: '' '' '' 303s | parsing 'aes_gcm_12_192-null' for ESP 303s | proposal: 'aes_gcm_12_192-null' 303s | token: '' '' "aes_gcm_12_192" '-' 303s | token: '' "aes_gcm_12_192" '-' "null" '' 303s | ike_alg_byname() failed: ESP encryption algorithm 'aes_gcm_12_192' is not recognized 303s | token: '-' "null" '' '' 303s | appending ESP encryption algorithm AES_GCM_12[_192] 303s | parsing integ: 303s | appending ESP integrity algorithm NONE[_0] 303s | token: '' '' '' 303s | parsing 'aes_gcm_16_256-null' for ESP 303s | proposal: 'aes_gcm_16_256-null' 303s | token: '' '' "aes_gcm_16_256" '-' 303s | token: '' "aes_gcm_16_256" '-' "null" '' 303s | ike_alg_byname() failed: ESP encryption algorithm 'aes_gcm_16_256' is not recognized 303s | token: '-' "null" '' '' 303s | appending ESP encryption algorithm AES_GCM_16[_256] 303s | parsing integ: 303s | appending ESP integrity algorithm NONE[_0] 303s | token: '' '' '' 303s | parsing 'aes_ctr' for ESP 303s | proposal: 'aes_ctr' 303s | token: '' '' "aes_ctr" '' 303s | token: '' "aes_ctr" '' '' 303s | token: '' '' '' 303s | appending ESP encryption algorithm AES_CTR[_0] 303s | appending ESP integrity algorithm HMAC_SHA2_512_256[_0] 303s | appending ESP integrity algorithm HMAC_SHA2_256_128[_0] 303s | parsing 'aesctr' for ESP 303s | proposal: 'aesctr' 303s | token: '' '' "aesctr" '' 303s | token: '' "aesctr" '' '' 303s | token: '' '' '' 303s | appending ESP encryption algorithm AES_CTR[_0] 303s | appending ESP integrity algorithm HMAC_SHA2_512_256[_0] 303s | appending ESP integrity algorithm HMAC_SHA2_256_128[_0] 303s | parsing 'aes_ctr128' for ESP 303s | proposal: 'aes_ctr128' 303s | token: '' '' "aes_ctr128" '' 303s | token: '' "aes_ctr128" '' '' 303s | ike_alg_byname() failed: ESP encryption algorithm 'aes_ctr128' is not recognized 303s | token: '' '' '' 303s | appending ESP encryption algorithm AES_CTR[_128] 303s | appending ESP integrity algorithm HMAC_SHA2_512_256[_0] 303s | appending ESP integrity algorithm HMAC_SHA2_256_128[_0] 303s | parsing 'aes_ctr192' for ESP 303s | proposal: 'aes_ctr192' 303s | token: '' '' "aes_ctr192" '' 303s | token: '' "aes_ctr192" '' '' 303s | ike_alg_byname() failed: ESP encryption algorithm 'aes_ctr192' is not recognized 303s | token: '' '' '' 303s | appending ESP encryption algorithm AES_CTR[_192] 303s | appending ESP integrity algorithm HMAC_SHA2_512_256[_0] 303s | appending ESP integrity algorithm HMAC_SHA2_256_128[_0] 303s | parsing 'aes_ctr256' for ESP 303s | proposal: 'aes_ctr256' 303s | token: '' '' "aes_ctr256" '' 303s | token: '' "aes_ctr256" '' '' 303s | ike_alg_byname() failed: ESP encryption algorithm 'aes_ctr256' is not recognized 303s | token: '' '' '' 303s | appending ESP encryption algorithm AES_CTR[_256] 303s | appending ESP integrity algorithm HMAC_SHA2_512_256[_0] 303s | appending ESP integrity algorithm HMAC_SHA2_256_128[_0] 303s | parsing 'camellia_cbc_256-hmac_sha2_512_256;modp8192' for ESP 303s | proposal: 'camellia_cbc_256-hmac_sha2_512_256;modp8192' 303s | token: '' '' "camellia_cbc_256" '-' 303s | token: '' "camellia_cbc_256" '-' "hmac_sha2_512_256" ';' 303s | ike_alg_byname() failed: ESP encryption algorithm 'camellia_cbc_256' is not recognized 303s | token: '-' "hmac_sha2_512_256" ';' "modp8192" '' 303s | appending ESP encryption algorithm CAMELLIA_CBC[_256] 303s CAMELLIA_CBC_256-HMAC_SHA2_512_256 303s algparse -v2 'esp=null_auth_aes_gmac_256-null;modp8192' (expect SUCCESS) 303s NULL_AUTH_AES_GMAC_256-NONE 303s algparse -v2 'esp=3des-sha1;modp8192' (expect SUCCESS) 303s 3DES_CBC-HMAC_SHA1_96 303s algparse -v2 'esp=3des-sha1-modp8192' (expect SUCCESS) 303s 3DES_CBC-HMAC_SHA1_96 303s algparse -v2 'esp=aes-sha1,3des-sha1;modp8192' (expect SUCCESS) 303s AES_CBC-HMAC_SHA1_96 303s 3DES_CBC-HMAC_SHA1_96 303s algparse -v2 'esp=aes-sha1-modp8192,3des-sha1-modp8192' (expect SUCCESS) 303s AES_CBC-HMAC_SHA1_96 303s 3DES_CBC-HMAC_SHA1_96 303s algparse -v2 'esp=aes-sha1-modp8192,aes-sha1-modp8192,aes-sha1-modp8192' (expect SUCCESS) 303s AES_CBC-HMAC_SHA1_96 303s algparse -v2 'esp=aes;none' (expect SUCCESS) 303s AES_CBC-HMAC_SHA2_512_256+HMAC_SHA2_256_128 303s algparse -v2 'esp=aes;none,aes' (expect SUCCESS) 303s AES_CBC-HMAC_SHA2_512_256+HMAC_SHA2_256_128 303s AES_CBC-HMAC_SHA2_512_256+HMAC_SHA2_256_128 303s algparse -v2 'esp=aes;none,aes;modp2048' (expect SUCCESS) 303s AES_CBC-HMAC_SHA2_512_256+HMAC_SHA2_256_128 303s AES_CBC-HMAC_SHA2_512_256+HMAC_SHA2_256_128 303s algparse -v2 'esp=aes-sha1-none' (expect SUCCESS) 303s AES_CBC-HMAC_SHA1_96 303s algparse -v2 'esp=aes-sha1;none' (expect SUCCESS) 303s AES_CBC-HMAC_SHA1_96 303s algparse -v2 'esp=3des168-sha1' (expect ERROR) 303s ERROR: ESP encryption algorithm 3DES_CBC does not allow a key lengths 303s algparse -v2 'esp=3des-null' (expect ERROR) 303s ERROR: non-AEAD ESP encryption algorithm 3DES_CBC cannot have 'NONE' as the integrity algorithm 303s algparse -v2 'esp=aes128-null' (expect ERROR) 303s ERROR: non-AEAD ESP encryption algorithm AES_CBC cannot have 'NONE' as the integrity algorithm 303s algparse -v2 'esp=aes224-sha1' (expect ERROR) 303s ERROR: ESP encryption algorithm AES_CBC with key length 224 invalid; valid key lengths: 128, 192, 256 303s algparse -v2 'esp=aes-224-sha1' (expect ERROR) 303s ERROR: ESP encryption algorithm AES_CBC with key length 224 invalid; valid key lengths: 128, 192, 256 303s algparse -v2 'esp=aes0-sha1' (expect ERROR) 303s ERROR: ESP encryption key length is zero 303s algparse -v2 'esp=aes-0-sha1' (expect ERROR) 303s ERROR: ESP encryption key length is zero 303s algparse -v2 'esp=aes512-sha1' (expect ERROR) 303s ERROR: ESP encryption algorithm AES_CBC with key length 512 invalid; valid key lengths: 128, 192, 256 303s algparse -v2 'esp=aes-sha1555' (expect ERROR) 303s ERROR: ESP integrity algorithm 'sha1555' is not recognized 303s algparse -v2 'esp=camellia666-sha1' (expect ERROR) 303s ERROR: ESP encryption algorithm CAMELLIA_CBC with key length 666 invalid; valid key lengths: 128, 192, 256 303s algparse -v2 'esp=blowfish' (expect ERROR) 303s ERROR: ESP encryption algorithm 'blowfish' is not supported 303s algparse -v2 'esp=des-sha1' (expect ERROR) 303s ERROR: ESP encryption algorithm 'des' is not supported 303s algparse -v2 'esp=aes_ctr666' (expect ERROR) 303s ERROR: ESP encryption algorithm AES_CTR with key length 666 invalid; valid key lengths: 128, 192, 256 303s algparse -v2 'esp=aes128-sha2_128' (expect ERROR) 303s ERROR: ESP integrity algorithm 'sha2_128' is not recognized 303s algparse -v2 'esp=aes256-sha2_256-4096' (expect ERROR) 303s | parsing integ: 303s | appending ESP integrity algorithm HMAC_SHA2_512_256[_0] 303s | token: ';' "modp8192" '' '' 303s | parsing dh: 303s | appending ESP DH algorithm MODP8192[_0] 303s | token: '' '' '' 303s ipsec algparse: ignoring ESP DH algorithm MODP8192 as PFS policy is disabled 303s | parsing 'null_auth_aes_gmac_256-null;modp8192' for ESP 303s | proposal: 'null_auth_aes_gmac_256-null;modp8192' 303s | token: '' '' "null_auth_aes_gmac_256" '-' 303s | token: '' "null_auth_aes_gmac_256" '-' "null" ';' 303s | ike_alg_byname() failed: ESP encryption algorithm 'null_auth_aes_gmac_256' is not recognized 303s | token: '-' "null" ';' "modp8192" '' 303s | appending ESP encryption algorithm NULL_AUTH_AES_GMAC[_256] 303s | parsing integ: 303s | appending ESP integrity algorithm NONE[_0] 303s | token: ';' "modp8192" '' '' 303s | parsing dh: 303s | appending ESP DH algorithm MODP8192[_0] 303s | token: '' '' '' 303s ipsec algparse: ignoring ESP DH algorithm MODP8192 as PFS policy is disabled 303s | parsing '3des-sha1;modp8192' for ESP 303s | proposal: '3des-sha1;modp8192' 303s | token: '' '' "3des" '-' 303s | token: '' "3des" '-' "sha1" ';' 303s | token: '-' "sha1" ';' "modp8192" '' 303s | appending ESP encryption algorithm 3DES_CBC[_0] 303s | parsing integ: 303s | appending ESP integrity algorithm HMAC_SHA1_96[_0] 303s | token: ';' "modp8192" '' '' 303s | parsing dh: 303s | appending ESP DH algorithm MODP8192[_0] 303s | token: '' '' '' 303s ipsec algparse: ignoring ESP DH algorithm MODP8192 as PFS policy is disabled 303s | parsing '3des-sha1-modp8192' for ESP 303s | proposal: '3des-sha1-modp8192' 303s | token: '' '' "3des" '-' 303s | token: '' "3des" '-' "sha1" '-' 303s | token: '-' "sha1" '-' "modp8192" '' 303s | appending ESP encryption algorithm 3DES_CBC[_0] 303s | parsing integ: 303s | appending ESP integrity algorithm HMAC_SHA1_96[_0] 303s | token: '-' "modp8192" '' '' 303s | parsing dh: 303s | appending ESP DH algorithm MODP8192[_0] 303s | token: '' '' '' 303s ipsec algparse: ignoring ESP DH algorithm MODP8192 as PFS policy is disabled 303s | parsing 'aes-sha1,3des-sha1;modp8192' for ESP 303s | proposal: 'aes-sha1' 303s | token: '' '' "aes" '-' 303s | token: '' "aes" '-' "sha1" '' 303s | token: '-' "sha1" '' '' 303s | appending ESP encryption algorithm AES_CBC[_0] 303s | parsing integ: 303s | appending ESP integrity algorithm HMAC_SHA1_96[_0] 303s | token: '' '' '' 303s | proposal: '3des-sha1;modp8192' 303s | token: '' '' "3des" '-' 303s | token: '' "3des" '-' "sha1" ';' 303s | token: '-' "sha1" ';' "modp8192" '' 303s | appending ESP encryption algorithm 3DES_CBC[_0] 303s | parsing integ: 303s | appending ESP integrity algorithm HMAC_SHA1_96[_0] 303s | token: ';' "modp8192" '' '' 303s | parsing dh: 303s | appending ESP DH algorithm MODP8192[_0] 303s | token: '' '' '' 303s ipsec algparse: ignoring ESP DH algorithm MODP8192 as PFS policy is disabled 303s | parsing 'aes-sha1-modp8192,3des-sha1-modp8192' for ESP 303s | proposal: 'aes-sha1-modp8192' 303s | token: '' '' "aes" '-' 303s | token: '' "aes" '-' "sha1" '-' 303s | token: '-' "sha1" '-' "modp8192" '' 303s | appending ESP encryption algorithm AES_CBC[_0] 303s | parsing integ: 303s | appending ESP integrity algorithm HMAC_SHA1_96[_0] 303s | token: '-' "modp8192" '' '' 303s | parsing dh: 303s | appending ESP DH algorithm MODP8192[_0] 303s | token: '' '' '' 303s | proposal: '3des-sha1-modp8192' 303s | token: '' '' "3des" '-' 303s | token: '' "3des" '-' "sha1" '-' 303s | token: '-' "sha1" '-' "modp8192" '' 303s | appending ESP encryption algorithm 3DES_CBC[_0] 303s | parsing integ: 303s | appending ESP integrity algorithm HMAC_SHA1_96[_0] 303s | token: '-' "modp8192" '' '' 303s | parsing dh: 303s | appending ESP DH algorithm MODP8192[_0] 303s | token: '' '' '' 303s ipsec algparse: ignoring ESP DH algorithm MODP8192 as PFS policy is disabled 303s ipsec algparse: ignoring ESP DH algorithm MODP8192 as PFS policy is disabled 303s | parsing 'aes-sha1-modp8192,aes-sha1-modp8192,aes-sha1-modp8192' for ESP 303s | proposal: 'aes-sha1-modp8192' 303s | token: '' '' "aes" '-' 303s | token: '' "aes" '-' "sha1" '-' 303s | token: '-' "sha1" '-' "modp8192" '' 303s | appending ESP encryption algorithm AES_CBC[_0] 303s | parsing integ: 303s | appending ESP integrity algorithm HMAC_SHA1_96[_0] 303s | token: '-' "modp8192" '' '' 303s | parsing dh: 303s | appending ESP DH algorithm MODP8192[_0] 303s | token: '' '' '' 303s | proposal: 'aes-sha1-modp8192' 303s | token: '' '' "aes" '-' 303s | token: '' "aes" '-' "sha1" '-' 303s | token: '-' "sha1" '-' "modp8192" '' 303s | appending ESP encryption algorithm AES_CBC[_0] 303s | parsing integ: 303s | appending ESP integrity algorithm HMAC_SHA1_96[_0] 303s | token: '-' "modp8192" '' '' 303s | parsing dh: 303s | appending ESP DH algorithm MODP8192[_0] 303s | token: '' '' '' 303s | proposal: 'aes-sha1-modp8192' 303s | token: '' '' "aes" '-' 303s | token: '' "aes" '-' "sha1" '-' 303s | token: '-' "sha1" '-' "modp8192" '' 303s | appending ESP encryption algorithm AES_CBC[_0] 303s | parsing integ: 303s | appending ESP integrity algorithm HMAC_SHA1_96[_0] 303s | token: '-' "modp8192" '' '' 303s | parsing dh: 303s | appending ESP DH algorithm MODP8192[_0] 303s | token: '' '' '' 303s ipsec algparse: ignoring ESP DH algorithm MODP8192 as PFS policy is disabled 303s | parsing 'aes;none' for ESP 303s | proposal: 'aes;none' 303s | token: '' '' "aes" ';' 303s | token: '' "aes" ';' "none" '' 303s | token: ';' "none" '' '' 303s | appending ESP encryption algorithm AES_CBC[_0] 303s | parsing dh: 303s | appending ESP DH algorithm NONE[_0] 303s | token: '' '' '' 303s | appending ESP integrity algorithm HMAC_SHA2_512_256[_0] 303s | appending ESP integrity algorithm HMAC_SHA2_256_128[_0] 303s ipsec algparse: ignoring redundant ESP DH algorithm NONE as PFS policy is disabled 303s | parsing 'aes;none,aes' for ESP 303s | proposal: 'aes;none' 303s | token: '' '' "aes" ';' 303s | token: '' "aes" ';' "none" '' 303s | token: ';' "none" '' '' 303s | appending ESP encryption algorithm AES_CBC[_0] 303s | parsing dh: 303s | appending ESP DH algorithm NONE[_0] 303s | token: '' '' '' 303s | appending ESP integrity algorithm HMAC_SHA2_512_256[_0] 303s | appending ESP integrity algorithm HMAC_SHA2_256_128[_0] 303s | proposal: 'aes' 303s | token: '' '' "aes" '' 303s | token: '' "aes" '' '' 303s | token: '' '' '' 303s | appending ESP encryption algorithm AES_CBC[_0] 303s | appending ESP integrity algorithm HMAC_SHA2_512_256[_0] 303s | appending ESP integrity algorithm HMAC_SHA2_256_128[_0] 303s ipsec algparse: ignoring redundant ESP DH algorithm NONE as PFS policy is disabled 303s | parsing 'aes;none,aes;modp2048' for ESP 303s | proposal: 'aes;none' 303s | token: '' '' "aes" ';' 303s | token: '' "aes" ';' "none" '' 303s | token: ';' "none" '' '' 303s | appending ESP encryption algorithm AES_CBC[_0] 303s | parsing dh: 303s | appending ESP DH algorithm NONE[_0] 303s | token: '' '' '' 303s | appending ESP integrity algorithm HMAC_SHA2_512_256[_0] 303s | appending ESP integrity algorithm HMAC_SHA2_256_128[_0] 303s | proposal: 'aes;modp2048' 303s | token: '' '' "aes" ';' 303s | token: '' "aes" ';' "modp2048" '' 303s | token: ';' "modp2048" '' '' 303s | appending ESP encryption algorithm AES_CBC[_0] 303s | parsing dh: 303s | appending ESP DH algorithm MODP2048[_0] 303s | token: '' '' '' 303s | appending ESP integrity algorithm HMAC_SHA2_512_256[_0] 303s | appending ESP integrity algorithm HMAC_SHA2_256_128[_0] 303s ipsec algparse: ignoring redundant ESP DH algorithm NONE as PFS policy is disabled 303s ipsec algparse: ignoring ESP DH algorithm MODP2048 as PFS policy is disabled 303s | parsing 'aes-sha1-none' for ESP 303s | proposal: 'aes-sha1-none' 303s | token: '' '' "aes" '-' 303s | token: '' "aes" '-' "sha1" '-' 303s | token: '-' "sha1" '-' "none" '' 303s | appending ESP encryption algorithm AES_CBC[_0] 303s | parsing integ: 303s | appending ESP integrity algorithm HMAC_SHA1_96[_0] 303s | token: '-' "none" '' '' 303s | parsing dh: 303s | appending ESP DH algorithm NONE[_0] 303s | token: '' '' '' 303s ipsec algparse: ignoring redundant ESP DH algorithm NONE as PFS policy is disabled 303s | parsing 'aes-sha1;none' for ESP 303s | proposal: 'aes-sha1;none' 303s | token: '' '' "aes" '-' 303s | token: '' "aes" '-' "sha1" ';' 303s | token: '-' "sha1" ';' "none" '' 303s | appending ESP encryption algorithm AES_CBC[_0] 303s | parsing integ: 303s | appending ESP integrity algorithm HMAC_SHA1_96[_0] 303s | token: ';' "none" '' '' 303s | parsing dh: 303s | appending ESP DH algorithm NONE[_0] 303s | token: '' '' '' 303s ipsec algparse: ignoring redundant ESP DH algorithm NONE as PFS policy is disabled 303s | parsing '3des168-sha1' for ESP 303s | proposal: '3des168-sha1' 303s | token: '' '' "3des168" '-' 303s | token: '' "3des168" '-' "sha1" '' 303s | ike_alg_byname() failed: ESP encryption algorithm '3des168' is not recognized 303s | parsing '3des-null' for ESP 303s | proposal: '3des-null' 303s | token: '' '' "3des" '-' 303s | token: '' "3des" '-' "null" '' 303s | token: '-' "null" '' '' 303s | appending ESP encryption algorithm 3DES_CBC[_0] 303s | parsing integ: 303s | appending ESP integrity algorithm NONE[_0] 303s | token: '' '' '' 303s | parsing 'aes128-null' for ESP 303s | proposal: 'aes128-null' 303s | token: '' '' "aes128" '-' 303s | token: '' "aes128" '-' "null" '' 303s | ike_alg_byname() failed: ESP encryption algorithm 'aes128' is not recognized 303s | token: '-' "null" '' '' 303s | appending ESP encryption algorithm AES_CBC[_128] 303s | parsing integ: 303s | appending ESP integrity algorithm NONE[_0] 303s | token: '' '' '' 303s | parsing 'aes224-sha1' for ESP 303s | proposal: 'aes224-sha1' 303s | token: '' '' "aes224" '-' 303s | token: '' "aes224" '-' "sha1" '' 303s | ike_alg_byname() failed: ESP encryption algorithm 'aes224' is not recognized 303s | parsing 'aes-224-sha1' for ESP 303s | proposal: 'aes-224-sha1' 303s | token: '' '' "aes" '-' 303s | token: '' "aes" '-' "224" '-' 303s | byname('aes') with ='224' failed: ESP encryption algorithm AES_CBC with key length 224 invalid; valid key lengths: 128, 192, 256 303s | parsing 'aes0-sha1' for ESP 303s | proposal: 'aes0-sha1' 303s | token: '' '' "aes0" '-' 303s | token: '' "aes0" '-' "sha1" '' 303s | ike_alg_byname() failed: ESP encryption algorithm 'aes0' is not recognized 303s | parsing 'aes-0-sha1' for ESP 303s | proposal: 'aes-0-sha1' 303s | token: '' '' "aes" '-' 303s | token: '' "aes" '-' "0" '-' 303s | parsing 'aes512-sha1' for ESP 303s | proposal: 'aes512-sha1' 303s | token: '' '' "aes512" '-' 303s | token: '' "aes512" '-' "sha1" '' 303s | ike_alg_byname() failed: ESP encryption algorithm 'aes512' is not recognized 303s | parsing 'aes-sha1555' for ESP 303s | proposal: 'aes-sha1555' 303s | token: '' '' "aes" '-' 303s | token: '' "aes" '-' "sha1555" '' 303s | token: '-' "sha1555" '' '' 303s | appending ESP encryption algorithm AES_CBC[_0] 303s | parsing integ: 303s | ike_alg_byname() failed: ESP integrity algorithm 'sha1555' is not recognized 303s | lookup for integrity algorithm 'sha1555' failed 303s | or - failed 'ESP integrity algorithm 'sha1555' is not recognized') 303s | parsing 'camellia666-sha1' for ESP 303s | proposal: 'camellia666-sha1' 303s | token: '' '' "camellia666" '-' 303s | token: '' "camellia666" '-' "sha1" '' 303s | ike_alg_byname() failed: ESP encryption algorithm 'camellia666' is not recognized 303s | parsing 'blowfish' for ESP 303s | proposal: 'blowfish' 303s | token: '' '' "blowfish" '' 303s | token: '' "blowfish" '' '' 303s | ike_alg_byname() failed: ESP encryption algorithm 'blowfish' is not supported 303s | parsing 'des-sha1' for ESP 303s | proposal: 'des-sha1' 303s | token: '' '' "des" '-' 303s | token: '' "des" '-' "sha1" '' 303s | ike_alg_byname() failed: ESP encryption algorithm 'des' is not supported 303s | parsing 'aes_ctr666' for ESP 303s | proposal: 'aes_ctr666' 303s | token: '' '' "aes_ctr666" '' 303s | token: '' "aes_ctr666" '' '' 303s | ike_alg_byname() failed: ESP encryption algorithm 'aes_ctr666' is not recognized 303s | parsing 'aes128-sha2_128' for ESP 303s | proposal: 'aes128-sha2_128' 303s | token: '' '' "aes128" '-' 303s | token: '' "aes128" '-' "sha2_128" '' 303s | ike_alg_byname() failed: ESP encryption algorithm 'aes128' is not recognized 303s | token: '-' "sha2_128" '' '' 303s | appending ESP encryption algorithm AES_CBC[_128] 303s | parsing integ: 303s | ike_alg_byname() failed: ESP integrity algorithm 'sha2_128' is not recognized 303s | lookup for integrity algorithm 'sha2_128' failed 303s | or - failed 'ESP integrity algorithm 'sha2_128' is not recognized') 303s | parsing 'aes256-sha2_256-4096' for ESP 303s | proposal: 'aes256-sha2_256-4096' 303s | token: '' '' "aes256" '-' 303s | token: '' "aes256" '-' "sha2_256" '-' 303s | ike_alg_byname() failed: ESP encryption algorithm 'aes256' is not recognized 303s | token: '-' "sha2_256" '-' "4096" '' 303s | appending ESP encryption algorithm AES_CBC[_256] 303s | parsing integ: 303s | appending ESP integrity algorithm HMAC_SHA2_256_128[_0] 303s | token: '-' "4096" '' '' 303s | parsing dh: 303s ERROR: ESP DH algorithm '4096' is not recognized 303s algparse -v2 'esp=aes256-sha2_256-128' (expect ERROR) 303s ERROR: ESP DH algorithm '128' is not recognized 303s algparse -v2 'esp=vanitycipher' (expect ERROR) 303s ERROR: ESP encryption algorithm 'vanitycipher' is not recognized 303s algparse -v2 'esp=ase-sah' (expect ERROR) 303s ERROR: ESP encryption algorithm 'ase' is not recognized 303s algparse -v2 'esp=aes-sah1' (expect ERROR) 303s ERROR: ESP integrity algorithm 'sah1' is not recognized 303s algparse -v2 'esp=id3' (expect ERROR) 303s ERROR: ESP encryption algorithm 'id3' is not recognized 303s algparse -v2 'esp=aes-id3' (expect ERROR) 303s ERROR: ESP integrity algorithm 'id3' is not recognized 303s algparse -v2 'esp=aes_gcm-md5' (expect ERROR) 303s ERROR: AEAD ESP encryption algorithm AES_GCM_16 must have 'NONE' as the integrity algorithm 303s algparse -v2 'esp=mars' (expect ERROR) 303s ERROR: ESP encryption algorithm 'mars' is not supported 303s algparse -v2 'esp=aes_gcm-16' (expect ERROR) 303s ERROR: ESP encryption algorithm AES_GCM_16 with key length 16 invalid; valid key lengths: 128, 192, 256 303s algparse -v2 'esp=aes_gcm-0' (expect ERROR) 303s ERROR: ESP encryption key length is zero 303s algparse -v2 'esp=aes_gcm-123456789012345' (expect ERROR) 303s ERROR: ESP encryption algorithm 'aes_gcm-123456789012345' key length WAY too big 303s algparse -v2 'esp=3des-sha1;dh22' (expect ERROR) 303s ERROR: ESP DH algorithm 'dh22' is not supported 303s algparse -v2 'esp=3des-sha1;modp8192,3des-sha2' (expect SUCCESS) 303s 3DES_CBC-HMAC_SHA1_96 303s 3DES_CBC-HMAC_SHA2_256_128 303s algparse -v2 'esp=3des-sha1-modp8192,3des-sha2' (expect SUCCESS) 303s 3DES_CBC-HMAC_SHA1_96 303s 3DES_CBC-HMAC_SHA2_256_128 303s algparse -v2 'esp=3des-sha1-modp8192,3des-sha2-modp8192' (expect SUCCESS) 303s 3DES_CBC-HMAC_SHA1_96 303s 3DES_CBC-HMAC_SHA2_256_128 303s algparse -v2 'esp=3des-sha1-modp8192,3des-sha2;modp8192' (expect SUCCESS) 303s 3DES_CBC-HMAC_SHA1_96 303s 3DES_CBC-HMAC_SHA2_256_128 303s algparse -v2 'esp=3des-sha1;modp8192,3des-sha2-modp8192' (expect SUCCESS) 303s 3DES_CBC-HMAC_SHA1_96 303s 3DES_CBC-HMAC_SHA2_256_128 303s algparse -v2 'esp=3des-sha1;modp8192,3des-sha2;modp8192' (expect SUCCESS) 303s | ike_alg_byname() failed: ESP DH algorithm '4096' is not recognized 303s | lookup for DH algorithm '4096' failed 303s | ... failed 'ESP DH algorithm '4096' is not recognized' 303s | parsing 'aes256-sha2_256-128' for ESP 303s | proposal: 'aes256-sha2_256-128' 303s | token: '' '' "aes256" '-' 303s | token: '' "aes256" '-' "sha2_256" '-' 303s | ike_alg_byname() failed: ESP encryption algorithm 'aes256' is not recognized 303s | token: '-' "sha2_256" '-' "128" '' 303s | appending ESP encryption algorithm AES_CBC[_256] 303s | parsing integ: 303s | appending ESP integrity algorithm HMAC_SHA2_256_128[_0] 303s | token: '-' "128" '' '' 303s | parsing dh: 303s | ike_alg_byname() failed: ESP DH algorithm '128' is not recognized 303s | lookup for DH algorithm '128' failed 303s | ... failed 'ESP DH algorithm '128' is not recognized' 303s | parsing 'vanitycipher' for ESP 303s | proposal: 'vanitycipher' 303s | token: '' '' "vanitycipher" '' 303s | token: '' "vanitycipher" '' '' 303s | ike_alg_byname() failed: ESP encryption algorithm 'vanitycipher' is not recognized 303s | parsing 'ase-sah' for ESP 303s | proposal: 'ase-sah' 303s | token: '' '' "ase" '-' 303s | token: '' "ase" '-' "sah" '' 303s | ike_alg_byname() failed: ESP encryption algorithm 'ase' is not recognized 303s | parsing 'aes-sah1' for ESP 303s | proposal: 'aes-sah1' 303s | token: '' '' "aes" '-' 303s | token: '' "aes" '-' "sah1" '' 303s | token: '-' "sah1" '' '' 303s | appending ESP encryption algorithm AES_CBC[_0] 303s | parsing integ: 303s | ike_alg_byname() failed: ESP integrity algorithm 'sah1' is not recognized 303s | lookup for integrity algorithm 'sah1' failed 303s | or - failed 'ESP integrity algorithm 'sah1' is not recognized') 303s | parsing 'id3' for ESP 303s | proposal: 'id3' 303s | token: '' '' "id3" '' 303s | token: '' "id3" '' '' 303s | ike_alg_byname() failed: ESP encryption algorithm 'id3' is not recognized 303s | ike_alg_byname() failed: ESP encryption algorithm 'id3' is not recognized 303s | parsing 'aes-id3' for ESP 303s | proposal: 'aes-id3' 303s | token: '' '' "aes" '-' 303s | token: '' "aes" '-' "id3" '' 303s | token: '-' "id3" '' '' 303s | appending ESP encryption algorithm AES_CBC[_0] 303s | parsing integ: 303s | ike_alg_byname() failed: ESP integrity algorithm 'id3' is not recognized 303s | lookup for integrity algorithm 'id3' failed 303s | or - failed 'ESP integrity algorithm 'id3' is not recognized') 303s | parsing 'aes_gcm-md5' for ESP 303s | proposal: 'aes_gcm-md5' 303s | token: '' '' "aes_gcm" '-' 303s | token: '' "aes_gcm" '-' "md5" '' 303s | token: '-' "md5" '' '' 303s | appending ESP encryption algorithm AES_GCM_16[_0] 303s | parsing integ: 303s | appending ESP integrity algorithm HMAC_MD5_96[_0] 303s | token: '' '' '' 303s | parsing 'mars' for ESP 303s | proposal: 'mars' 303s | token: '' '' "mars" '' 303s | token: '' "mars" '' '' 303s | ike_alg_byname() failed: ESP encryption algorithm 'mars' is not supported 303s | parsing 'aes_gcm-16' for ESP 303s | proposal: 'aes_gcm-16' 303s | token: '' '' "aes_gcm" '-' 303s | token: '' "aes_gcm" '-' "16" '' 303s | byname('aes_gcm') with ='16' failed: ESP encryption algorithm AES_GCM_16 with key length 16 invalid; valid key lengths: 128, 192, 256 303s | parsing 'aes_gcm-0' for ESP 303s | proposal: 'aes_gcm-0' 303s | token: '' '' "aes_gcm" '-' 303s | token: '' "aes_gcm" '-' "0" '' 303s | parsing 'aes_gcm-123456789012345' for ESP 303s | proposal: 'aes_gcm-123456789012345' 303s | token: '' '' "aes_gcm" '-' 303s | token: '' "aes_gcm" '-' "123456789012345" '' 303s | parsing '3des-sha1;dh22' for ESP 303s | proposal: '3des-sha1;dh22' 303s | token: '' '' "3des" '-' 303s | token: '' "3des" '-' "sha1" ';' 303s | token: '-' "sha1" ';' "dh22" '' 303s | appending ESP encryption algorithm 3DES_CBC[_0] 303s | parsing integ: 303s | appending ESP integrity algorithm HMAC_SHA1_96[_0] 303s | token: ';' "dh22" '' '' 303s | parsing dh: 303s | ike_alg_byname() failed: ESP DH algorithm 'dh22' is not supported 303s | lookup for DH algorithm 'dh22' failed 303s | ... failed 'ESP DH algorithm 'dh22' is not supported' 303s | parsing '3des-sha1;modp8192,3des-sha2' for ESP 303s | proposal: '3des-sha1;modp8192' 303s | token: '' '' "3des" '-' 303s | token: '' "3des" '-' "sha1" ';' 303s | token: '-' "sha1" ';' "modp8192" '' 303s | appending ESP encryption algorithm 3DES_CBC[_0] 303s | parsing integ: 303s | appending ESP integrity algorithm HMAC_SHA1_96[_0] 303s | token: ';' "modp8192" '' '' 303s | parsing dh: 303s | appending ESP DH algorithm MODP8192[_0] 303s | token: '' '' '' 303s | proposal: '3des-sha2' 303s | token: '' '' "3des" '-' 303s | token: '' "3des" '-' "sha2" '' 303s | token: '-' "sha2" '' '' 303s | appending ESP encryption algorithm 3DES_CBC[_0] 303s | parsing integ: 303s | appending ESP integrity algorithm HMAC_SHA2_256_128[_0] 303s | token: '' '' '' 303s ipsec algparse: ignoring ESP DH algorithm MODP8192 as PFS policy is disabled 303s | parsing '3des-sha1-modp8192,3des-sha2' for ESP 303s | proposal: '3des-sha1-modp8192' 303s | token: '' '' "3des" '-' 303s | token: '' "3des" '-' "sha1" '-' 303s | token: '-' "sha1" '-' "modp8192" '' 303s | appending ESP encryption algorithm 3DES_CBC[_0] 303s | parsing integ: 303s | appending ESP integrity algorithm HMAC_SHA1_96[_0] 303s | token: '-' "modp8192" '' '' 303s | parsing dh: 303s | appending ESP DH algorithm MODP8192[_0] 303s | token: '' '' '' 303s | proposal: '3des-sha2' 303s | token: '' '' "3des" '-' 303s | token: '' "3des" '-' "sha2" '' 303s | token: '-' "sha2" '' '' 303s | appending ESP encryption algorithm 3DES_CBC[_0] 303s | parsing integ: 303s | appending ESP integrity algorithm HMAC_SHA2_256_128[_0] 303s | token: '' '' '' 303s ipsec algparse: ignoring ESP DH algorithm MODP8192 as PFS policy is disabled 303s | parsing '3des-sha1-modp8192,3des-sha2-modp8192' for ESP 303s | proposal: '3des-sha1-modp8192' 303s | token: '' '' "3des" '-' 303s | token: '' "3des" '-' "sha1" '-' 303s | token: '-' "sha1" '-' "modp8192" '' 303s | appending ESP encryption algorithm 3DES_CBC[_0] 303s | parsing integ: 303s | appending ESP integrity algorithm HMAC_SHA1_96[_0] 303s | token: '-' "modp8192" '' '' 303s | parsing dh: 303s | appending ESP DH algorithm MODP8192[_0] 303s | token: '' '' '' 303s | proposal: '3des-sha2-modp8192' 303s | token: '' '' "3des" '-' 303s | token: '' "3des" '-' "sha2" '-' 303s | token: '-' "sha2" '-' "modp8192" '' 303s | appending ESP encryption algorithm 3DES_CBC[_0] 303s | parsing integ: 303s | appending ESP integrity algorithm HMAC_SHA2_256_128[_0] 303s | token: '-' "modp8192" '' '' 303s | parsing dh: 303s | appending ESP DH algorithm MODP8192[_0] 303s | token: '' '' '' 303s ipsec algparse: ignoring ESP DH algorithm MODP8192 as PFS policy is disabled 303s ipsec algparse: ignoring ESP DH algorithm MODP8192 as PFS policy is disabled 303s | parsing '3des-sha1-modp8192,3des-sha2;modp8192' for ESP 303s | proposal: '3des-sha1-modp8192' 303s | token: '' '' "3des" '-' 303s | token: '' "3des" '-' "sha1" '-' 303s | token: '-' "sha1" '-' "modp8192" '' 303s | appending ESP encryption algorithm 3DES_CBC[_0] 303s | parsing integ: 303s | appending ESP integrity algorithm HMAC_SHA1_96[_0] 303s | token: '-' "modp8192" '' '' 303s | parsing dh: 303s | appending ESP DH algorithm MODP8192[_0] 303s | token: '' '' '' 303s | proposal: '3des-sha2;modp8192' 303s | token: '' '' "3des" '-' 303s | token: '' "3des" '-' "sha2" ';' 303s | token: '-' "sha2" ';' "modp8192" '' 303s | appending ESP encryption algorithm 3DES_CBC[_0] 303s | parsing integ: 303s | appending ESP integrity algorithm HMAC_SHA2_256_128[_0] 303s | token: ';' "modp8192" '' '' 303s | parsing dh: 303s | appending ESP DH algorithm MODP8192[_0] 303s | token: '' '' '' 303s ipsec algparse: ignoring ESP DH algorithm MODP8192 as PFS policy is disabled 303s ipsec algparse: ignoring ESP DH algorithm MODP8192 as PFS policy is disabled 303s | parsing '3des-sha1;modp8192,3des-sha2-modp8192' for ESP 303s | proposal: '3des-sha1;modp8192' 303s | token: '' '' "3des" '-' 303s | token: '' "3des" '-' "sha1" ';' 303s | token: '-' "sha1" ';' "modp8192" '' 303s | appending ESP encryption algorithm 3DES_CBC[_0] 303s | parsing integ: 303s | appending ESP integrity algorithm HMAC_SHA1_96[_0] 303s | token: ';' "modp8192" '' '' 303s | parsing dh: 303s | appending ESP DH algorithm MODP8192[_0] 303s | token: '' '' '' 303s | proposal: '3des-sha2-modp8192' 303s | token: '' '' "3des" '-' 303s | token: '' "3des" '-' "sha2" '-' 303s | token: '-' "sha2" '-' "modp8192" '' 303s | appending ESP encryption algorithm 3DES_CBC[_0] 303s | parsing integ: 303s | appending ESP integrity algorithm HMAC_SHA2_256_128[_0] 303s | token: '-' "modp8192" '' '' 303s | parsing dh: 303s | appending ESP DH algorithm MODP8192[_0] 303s | token: '' '' '' 303s ipsec algparse: ignoring ESP DH algorithm MODP8192 as PFS policy is disabled 303s ipsec algparse: ignoring ESP DH algorithm MODP8192 as PFS policy is disabled 303s | parsing '3des-sha1;modp8192,3des-sha2;modp8192' for ESP 303s | proposal: '3des-sha1;modp8192' 303s | token: '' '' "3des" '-' 303s | token: '' "3des" '-' "sha1" ';' 303s | token: '-' "sha1" ';' "modp8192" '' 303s | appending ESP encryption algorithm 3DES_CBC[_0] 303s | parsing integ: 303s | appending ESP integrity algorithm HMAC_SHA1_96[_0] 303s | token: ';' "modp8192" '' '' 303s | parsing dh: 303s | appending ESP DH algorithm MODP8192[_0] 303s | token: '' '' '' 303s | proposal: '3des-sha2;modp8192' 303s | token: '' '' "3des" '-' 303s | token: '' "3des" '-' "sha2" ';' 303s | token: '-' "sha2" ';' "modp8192" '' 303s | appending ESP encryption algorithm 3DES_CBC[_0] 303s | parsing integ: 303s | appending ESP integrity algorithm HMAC_SHA2_256_128[_0] 303s | token: ';' "modp8192" '' '' 303s | parsing dh: 303s | appending ESP DH algorithm MODP8192[_0] 303s | token: '' '' '' 303s ipsec algparse: ignoring ESP DH algorithm MODP8192 as PFS policy is disabled 303s ipsec algparse: ignoring ESP DH algorithm MODP8192 as PFS policy is disabled 303s | parsing '3des-sha1-modp8192,3des-sha2-modp2048' for ESP 303s | proposal: '3des-sha1-modp8192' 303s | token: '' '' "3des" '-' 303s | token: '' "3des" '-' "sha1" '-' 303s | token: '-' "sha1" '-' "modp8192" '' 303s | appending ESP encryption algorithm 3DES_CBC[_0] 303s | parsing integ: 303s | appending ESP integrity algorithm HMAC_SHA1_96[_0] 303s | token: '-' "modp8192" '' '' 303s | parsing dh: 303s | appending ESP DH algorithm MODP8192[_0] 303s | token: '' '' '' 303s | proposal: '3des-sha2-modp2048' 303s | token: '' '' "3des" '-' 303s | token: '' "3des" '-' "sha2" '-' 303s | token: '-' "sha2" '-' "modp2048" '' 303s | appending ESP encryption algorithm 3DES_CBC[_0] 303s | parsing integ: 303s | appending ESP integrity algorithm HMAC_SHA2_256_128[_0] 303s | token: '-' "modp2048" '' '' 303s | parsing dh: 303s | appending ESP DH algorithm MODP2048[_0] 303s | token: '' '' '' 303s ipsec algparse: ignoring ESP DH algorithm MODP8192 as PFS policy is disabled 303s ipsec algparse: ignoring ESP DH algorithm MODP2048 as PFS policy is disabled 303s | parsing 'SHA2_512_256,SHA2_256_128' for AH 303s | proposal: 'SHA2_512_256' 303s | token: '' '' "SHA2_512_256" '' 303s | token: '' "SHA2_512_256" '' '' 303s | parsing integ: 303s | appending AH integrity algorithm HMAC_SHA2_512_256[_0] 303s | token: '' '' '' 303s | proposal: 'SHA2_256_128' 303s | token: '' '' "SHA2_256_128" '' 303s | token: '' "SHA2_256_128" '' '' 303s | parsing integ: 303s | appending AH integrity algorithm HMAC_SHA2_256_128[_0] 303s | token: '' '' '' 303s | parsing '' for AH 303s | parsing 'md5' for AH 303s | proposal: 'md5' 303s | token: '' '' "md5" '' 303s | token: '' "md5" '' '' 303s | parsing integ: 303s | appending AH integrity algorithm HMAC_MD5_96[_0] 303s | token: '' '' '' 303s | parsing 'sha' for AH 303s | proposal: 'sha' 303s | token: '' '' "sha" '' 303s | token: '' "sha" '' '' 303s | parsing integ: 303s | appending AH integrity algorithm HMAC_SHA1_96[_0] 303s | token: '' '' '' 303s | parsing 'sha;modp2048' for AH 303s | proposal: 'sha;modp2048' 303s | token: '' '' "sha" ';' 303s | token: '' "sha" ';' "modp2048" '' 303s | parsing integ: 303s | appending AH integrity algorithm HMAC_SHA1_96[_0] 303s | token: ';' "modp2048" '' '' 303s | parsing dh: 303s | appending AH DH algorithm MODP2048[_0] 303s | token: '' '' '' 303s ipsec algparse: ignoring AH DH algorithm MODP2048 as PFS policy is disabled 303s | parsing 'sha1' for AH 303s | proposal: 'sha1' 303s | token: '' '' "sha1" '' 303s | token: '' "sha1" '' '' 303s | parsing integ: 303s | appending AH integrity algorithm HMAC_SHA1_96[_0] 303s | token: '' '' '' 303s | parsing 'sha2' for AH 303s | proposal: 'sha2' 303s | token: '' '' "sha2" '' 303s | token: '' "sha2" '' '' 303s | parsing integ: 303s | appending AH integrity algorithm HMAC_SHA2_256_128[_0] 303s | token: '' '' '' 303s | parsing 'sha256' for AH 303s | proposal: 'sha256' 303s | token: '' '' "sha256" '' 303s | token: '' "sha256" '' '' 303s | parsing integ: 303s | appending AH integrity algorithm HMAC_SHA2_256_128[_0] 303s | token: '' '' '' 303s | parsing 'sha384' for AH 303s | proposal: 'sha384' 303s | token: '' '' "sha384" '' 303s | token: '' "sha384" '' '' 303s | parsing integ: 303s | appending AH integrity algorithm HMAC_SHA2_384_192[_0] 303s | token: '' '' '' 303s | parsing 'sha512' for AH 303s | proposal: 'sha512' 303s | token: '' '' "sha512" '' 303s | token: '' "sha512" '' '' 303s | parsing integ: 303s | appending AH integrity algorithm HMAC_SHA2_512_256[_0] 303s | token: '' '' '' 303s | parsing 'sha2_256' for AH 303s | proposal: 'sha2_256' 303s | token: '' '' "sha2_256" '' 303s | token: '' "sha2_256" '' '' 303s | parsing integ: 303s | appending AH integrity algorithm HMAC_SHA2_256_128[_0] 303s | token: '' '' '' 303s | parsing 'sha2_384' for AH 303s | proposal: 'sha2_384' 303s | token: '' '' "sha2_384" '' 303s | token: '' "sha2_384" '' '' 303s | parsing integ: 303s | appending AH integrity algorithm HMAC_SHA2_384_192[_0] 303s | token: '' '' '' 303s | parsing 'sha2_512' for AH 303s | proposal: 'sha2_512' 303s | token: '' '' "sha2_512" '' 303s | token: '' "sha2_512" '' '' 303s | parsing integ: 303s | appending AH integrity algorithm HMAC_SHA2_512_256[_0] 303s | token: '' '' '' 303s | parsing 'aes_xcbc' for AH 303s | proposal: 'aes_xcbc' 303s | token: '' '' "aes_xcbc" '' 303s | token: '' "aes_xcbc" '' '' 303s | parsing integ: 303s | appending AH integrity algorithm AES_XCBC_96[_0] 303s | token: '' '' '' 303s | parsing 'sha2-none' for AH 303s | proposal: 'sha2-none' 303s | token: '' '' "sha2" '-' 303s | token: '' "sha2" '-' "none" '' 303s | parsing integ: 303s | appending AH integrity algorithm HMAC_SHA2_256_128[_0] 303s | token: '-' "none" '' '' 303s | parsing dh: 303s | appending AH DH algorithm NONE[_0] 303s | token: '' '' '' 303s ipsec algparse: ignoring redundant AH DH algorithm NONE as PFS policy is disabled 303s | parsing 'sha2;none' for AH 303s | proposal: 'sha2;none' 303s | token: '' '' "sha2" ';' 303s | token: '' "sha2" ';' "none" '' 303s | parsing integ: 303s | appending AH integrity algorithm HMAC_SHA2_256_128[_0] 303s | token: ';' "none" '' '' 303s | parsing dh: 303s | appending AH DH algorithm NONE[_0] 303s | token: '' '' '' 303s ipsec algparse: ignoring redundant AH DH algorithm NONE as PFS policy is disabled 303s | parsing 'sha1-modp8192,sha1-modp8192,sha1-modp8192' for AH 303s | proposal: 'sha1-modp8192' 303s | token: '' '' "sha1" '-' 303s | token: '' "sha1" '-' "modp8192" '' 303s | parsing integ: 303s | appending AH integrity algorithm HMAC_SHA1_96[_0] 303s | token: '-' "modp8192" '' '' 303s | parsing dh: 303s | appending AH DH algorithm MODP8192[_0] 303s | token: '' '' '' 303s | proposal: 'sha1-modp8192' 303s | token: '' '' "sha1" '-' 303s | token: '' "sha1" '-' "modp8192" '' 303s | parsing integ: 303s | appending AH integrity algorithm HMAC_SHA1_96[_0] 303s | token: '-' "modp8192" '' '' 303s | parsing dh: 303s | appending AH DH algorithm MODP8192[_0] 303s | token: '' '' '' 303s | proposal: 'sha1-modp8192' 303s | token: '' '' "sha1" '-' 303s | token: '' "sha1" '-' "modp8192" '' 303s | parsing integ: 303s | appending AH integrity algorithm HMAC_SHA1_96[_0] 303s 3DES_CBC-HMAC_SHA1_96 303s 3DES_CBC-HMAC_SHA2_256_128 303s algparse -v2 'esp=3des-sha1-modp8192,3des-sha2-modp2048' (expect SUCCESS) 303s 3DES_CBC-HMAC_SHA1_96 303s 3DES_CBC-HMAC_SHA2_256_128 303s algparse -v2 'ah' (expect SUCCESS) 303s HMAC_SHA2_512_256 303s HMAC_SHA2_256_128 303s algparse -v2 'ah=' (expect ERROR) 303s ERROR: AH proposal is empty 303s algparse -v2 'ah=md5' (expect SUCCESS) 303s HMAC_MD5_96 303s algparse -v2 'ah=sha' (expect SUCCESS) 303s HMAC_SHA1_96 303s algparse -v2 'ah=sha;modp2048' (expect SUCCESS) 303s HMAC_SHA1_96 303s algparse -v2 'ah=sha1' (expect SUCCESS) 303s HMAC_SHA1_96 303s algparse -v2 'ah=sha2' (expect SUCCESS) 303s HMAC_SHA2_256_128 303s algparse -v2 'ah=sha256' (expect SUCCESS) 303s HMAC_SHA2_256_128 303s algparse -v2 'ah=sha384' (expect SUCCESS) 303s HMAC_SHA2_384_192 303s algparse -v2 'ah=sha512' (expect SUCCESS) 303s HMAC_SHA2_512_256 303s algparse -v2 'ah=sha2_256' (expect SUCCESS) 303s HMAC_SHA2_256_128 303s algparse -v2 'ah=sha2_384' (expect SUCCESS) 303s HMAC_SHA2_384_192 303s algparse -v2 'ah=sha2_512' (expect SUCCESS) 303s HMAC_SHA2_512_256 303s algparse -v2 'ah=aes_xcbc' (expect SUCCESS) 303s AES_XCBC_96 303s algparse -v2 'ah=sha2-none' (expect SUCCESS) 303s HMAC_SHA2_256_128 303s algparse -v2 'ah=sha2;none' (expect SUCCESS) 303s HMAC_SHA2_256_128 303s algparse -v2 'ah=sha1-modp8192,sha1-modp8192,sha1-modp8192' (expect SUCCESS) 303s HMAC_SHA1_96 303s algparse -v2 'ah=aes-sha1' (expect ERROR) 303s ERROR: AH integrity algorithm 'aes' is not recognized 303s algparse -v2 'ah=vanityhash1' (expect ERROR) 303s ERROR: AH integrity algorithm 'vanityhash1' is not recognized 303s algparse -v2 'ah=aes_gcm_c-256' (expect ERROR) 303s ERROR: AH integrity algorithm 'aes_gcm_c' is not recognized 303s algparse -v2 'ah=id3' (expect ERROR) 303s ERROR: AH integrity algorithm 'id3' is not recognized 303s algparse -v2 'ah=3des' (expect ERROR) 303s ERROR: AH integrity algorithm '3des' is not recognized 303s algparse -v2 'ah=null' (expect ERROR) 303s ERROR: AH cannot have 'none' as the integrity algorithm 303s algparse -v2 'ah=aes_gcm' (expect ERROR) 303s ERROR: AH integrity algorithm 'aes_gcm' is not recognized 303s algparse -v2 'ah=aes_ccm' (expect ERROR) 303s ERROR: AH integrity algorithm 'aes_ccm' is not recognized 303s algparse -v2 'ah=ripemd' (expect ERROR) 303s ERROR: AH integrity algorithm 'ripemd' is not recognized 303s algparse -v2 'ike' (expect SUCCESS) 303s AES_GCM_16_256-HMAC_SHA2_512+HMAC_SHA2_256-DH19+DH20+DH21+DH31+MODP4096+MODP3072+MODP2048+MODP8192 303s AES_GCM_16_128-HMAC_SHA2_512+HMAC_SHA2_256-DH19+DH20+DH21+DH31+MODP4096+MODP3072+MODP2048+MODP8192 303s CHACHA20_POLY1305-HMAC_SHA2_512+HMAC_SHA2_256-DH19+DH20+DH21+DH31+MODP4096+MODP3072+MODP2048+MODP8192 303s AES_CBC_256-HMAC_SHA2_512+HMAC_SHA2_256-DH19+DH20+DH21+DH31+MODP4096+MODP3072+MODP2048+MODP8192 303s AES_CBC_128-HMAC_SHA2_512+HMAC_SHA2_256-DH19+DH20+DH21+DH31+MODP4096+MODP3072+MODP2048+MODP8192 303s algparse -v2 'ike=' (expect ERROR) 303s ERROR: IKE proposal is empty 303s algparse -v2 'ike=3des-sha1' (expect SUCCESS) 303s 3DES_CBC-HMAC_SHA1-DH19+DH20+DH21+DH31+MODP4096+MODP3072+MODP2048+MODP8192 303s algparse -v2 'ike=3des-sha1' (expect SUCCESS) 303s | token: '-' "modp8192" '' '' 303s | parsing dh: 303s | appending AH DH algorithm MODP8192[_0] 303s | token: '' '' '' 303s ipsec algparse: ignoring AH DH algorithm MODP8192 as PFS policy is disabled 303s | parsing 'aes-sha1' for AH 303s | proposal: 'aes-sha1' 303s | token: '' '' "aes" '-' 303s | token: '' "aes" '-' "sha1" '' 303s | parsing integ: 303s | ike_alg_byname() failed: AH integrity algorithm 'aes' is not recognized 303s | lookup for integrity algorithm 'aes' failed 303s | or - failed 'AH integrity algorithm 'aes' is not recognized') 303s | parsing 'vanityhash1' for AH 303s | proposal: 'vanityhash1' 303s | token: '' '' "vanityhash1" '' 303s | token: '' "vanityhash1" '' '' 303s | parsing integ: 303s | ike_alg_byname() failed: AH integrity algorithm 'vanityhash1' is not recognized 303s | lookup for integrity algorithm 'vanityhash1' failed 303s | or - failed 'AH integrity algorithm 'vanityhash1' is not recognized') 303s | parsing 'aes_gcm_c-256' for AH 303s | proposal: 'aes_gcm_c-256' 303s | token: '' '' "aes_gcm_c" '-' 303s | token: '' "aes_gcm_c" '-' "256" '' 303s | parsing integ: 303s | ike_alg_byname() failed: AH integrity algorithm 'aes_gcm_c' is not recognized 303s | lookup for integrity algorithm 'aes_gcm_c' failed 303s | or - failed 'AH integrity algorithm 'aes_gcm_c' is not recognized') 303s | parsing 'id3' for AH 303s | proposal: 'id3' 303s | token: '' '' "id3" '' 303s | token: '' "id3" '' '' 303s | parsing integ: 303s | ike_alg_byname() failed: AH integrity algorithm 'id3' is not recognized 303s | lookup for integrity algorithm 'id3' failed 303s | or - failed 'AH integrity algorithm 'id3' is not recognized') 303s | parsing '3des' for AH 303s | proposal: '3des' 303s | token: '' '' "3des" '' 303s | token: '' "3des" '' '' 303s | parsing integ: 303s | ike_alg_byname() failed: AH integrity algorithm '3des' is not recognized 303s | lookup for integrity algorithm '3des' failed 303s | or - failed 'AH integrity algorithm '3des' is not recognized') 303s | parsing 'null' for AH 303s | proposal: 'null' 303s | token: '' '' "null" '' 303s | token: '' "null" '' '' 303s | parsing integ: 303s | appending AH integrity algorithm NONE[_0] 303s | token: '' '' '' 303s | parsing 'aes_gcm' for AH 303s | proposal: 'aes_gcm' 303s | token: '' '' "aes_gcm" '' 303s | token: '' "aes_gcm" '' '' 303s | parsing integ: 303s | ike_alg_byname() failed: AH integrity algorithm 'aes_gcm' is not recognized 303s | lookup for integrity algorithm 'aes_gcm' failed 303s | or - failed 'AH integrity algorithm 'aes_gcm' is not recognized') 303s | parsing 'aes_ccm' for AH 303s | proposal: 'aes_ccm' 303s | token: '' '' "aes_ccm" '' 303s | token: '' "aes_ccm" '' '' 303s | parsing integ: 303s | ike_alg_byname() failed: AH integrity algorithm 'aes_ccm' is not recognized 303s | lookup for integrity algorithm 'aes_ccm' failed 303s | or - failed 'AH integrity algorithm 'aes_ccm' is not recognized') 303s | parsing 'ripemd' for AH 303s | proposal: 'ripemd' 303s | token: '' '' "ripemd" '' 303s | token: '' "ripemd" '' '' 303s | parsing integ: 303s | ike_alg_byname() failed: AH integrity algorithm 'ripemd' is not recognized 303s | lookup for integrity algorithm 'ripemd' failed 303s | or - failed 'AH integrity algorithm 'ripemd' is not recognized') 303s | parsing 'AES_GCM_16_256,AES_GCM_16_128,CHACHA20_POLY1305,AES_CBC_256,AES_CBC_128' for IKE 303s | proposal: 'AES_GCM_16_256' 303s | token: '' '' "AES_GCM_16_256" '' 303s | token: '' "AES_GCM_16_256" '' '' 303s | ike_alg_byname() failed: IKE encryption algorithm 'AES_GCM_16_256' is not recognized 303s | token: '' '' '' 303s | appending IKE encryption algorithm AES_GCM_16[_256] 303s | appending IKE PRF algorithm HMAC_SHA2_512[_0] 303s | appending IKE PRF algorithm HMAC_SHA2_256[_0] 303s | appending IKE integrity algorithm NONE[_0] 303s | appending IKE DH algorithm DH19[_0] 303s | appending IKE DH algorithm DH20[_0] 303s | appending IKE DH algorithm DH21[_0] 303s | appending IKE DH algorithm DH31[_0] 303s | appending IKE DH algorithm MODP4096[_0] 303s | appending IKE DH algorithm MODP3072[_0] 303s | appending IKE DH algorithm MODP2048[_0] 303s | appending IKE DH algorithm MODP8192[_0] 303s | proposal: 'AES_GCM_16_128' 303s | token: '' '' "AES_GCM_16_128" '' 303s | token: '' "AES_GCM_16_128" '' '' 303s | ike_alg_byname() failed: IKE encryption algorithm 'AES_GCM_16_128' is not recognized 303s | token: '' '' '' 303s | appending IKE encryption algorithm AES_GCM_16[_128] 303s | appending IKE PRF algorithm HMAC_SHA2_512[_0] 303s | appending IKE PRF algorithm HMAC_SHA2_256[_0] 303s | appending IKE integrity algorithm NONE[_0] 303s | appending IKE DH algorithm DH19[_0] 303s | appending IKE DH algorithm DH20[_0] 303s | appending IKE DH algorithm DH21[_0] 303s | appending IKE DH algorithm DH31[_0] 303s | appending IKE DH algorithm MODP4096[_0] 303s | appending IKE DH algorithm MODP3072[_0] 303s | appending IKE DH algorithm MODP2048[_0] 303s | appending IKE DH algorithm MODP8192[_0] 303s | proposal: 'CHACHA20_POLY1305' 303s | token: '' '' "CHACHA20_POLY1305" '' 303s | token: '' "CHACHA20_POLY1305" '' '' 303s | token: '' '' '' 303s | appending IKE encryption algorithm CHACHA20_POLY1305[_0] 303s | appending IKE PRF algorithm HMAC_SHA2_512[_0] 303s | appending IKE PRF algorithm HMAC_SHA2_256[_0] 303s | appending IKE integrity algorithm NONE[_0] 303s | appending IKE DH algorithm DH19[_0] 303s | appending IKE DH algorithm DH20[_0] 303s | appending IKE DH algorithm DH21[_0] 303s | appending IKE DH algorithm DH31[_0] 303s | appending IKE DH algorithm MODP4096[_0] 303s | appending IKE DH algorithm MODP3072[_0] 303s | appending IKE DH algorithm MODP2048[_0] 303s | appending IKE DH algorithm MODP8192[_0] 303s | proposal: 'AES_CBC_256' 303s | token: '' '' "AES_CBC_256" '' 303s | token: '' "AES_CBC_256" '' '' 303s | ike_alg_byname() failed: IKE encryption algorithm 'AES_CBC_256' is not recognized 303s | token: '' '' '' 303s | appending IKE encryption algorithm AES_CBC[_256] 303s | appending IKE PRF algorithm HMAC_SHA2_512[_0] 303s | appending IKE PRF algorithm HMAC_SHA2_256[_0] 303s | appending IKE integrity algorithm HMAC_SHA2_512_256[_0] 303s | appending IKE integrity algorithm HMAC_SHA2_256_128[_0] 303s | appending IKE DH algorithm DH19[_0] 303s | appending IKE DH algorithm DH20[_0] 303s | appending IKE DH algorithm DH21[_0] 303s | appending IKE DH algorithm DH31[_0] 303s | appending IKE DH algorithm MODP4096[_0] 303s | appending IKE DH algorithm MODP3072[_0] 303s | appending IKE DH algorithm MODP2048[_0] 303s | appending IKE DH algorithm MODP8192[_0] 303s | proposal: 'AES_CBC_128' 303s | token: '' '' "AES_CBC_128" '' 303s | token: '' "AES_CBC_128" '' '' 303s | ike_alg_byname() failed: IKE encryption algorithm 'AES_CBC_128' is not recognized 303s | token: '' '' '' 303s | appending IKE encryption algorithm AES_CBC[_128] 303s | appending IKE PRF algorithm HMAC_SHA2_512[_0] 303s | appending IKE PRF algorithm HMAC_SHA2_256[_0] 303s | appending IKE integrity algorithm HMAC_SHA2_512_256[_0] 303s | appending IKE integrity algorithm HMAC_SHA2_256_128[_0] 303s | appending IKE DH algorithm DH19[_0] 303s | appending IKE DH algorithm DH20[_0] 303s | appending IKE DH algorithm DH21[_0] 303s | appending IKE DH algorithm DH31[_0] 303s | appending IKE DH algorithm MODP4096[_0] 303s | appending IKE DH algorithm MODP3072[_0] 303s | appending IKE DH algorithm MODP2048[_0] 303s | appending IKE DH algorithm MODP8192[_0] 303s | parsing '' for IKE 303s | parsing '3des-sha1' for IKE 303s | proposal: '3des-sha1' 303s | token: '' '' "3des" '-' 303s | token: '' "3des" '-' "sha1" '' 303s | token: '-' "sha1" '' '' 303s | appending IKE encryption algorithm 3DES_CBC[_0] 303s | parsing prf: 303s | appending IKE PRF algorithm HMAC_SHA1[_0] 303s | token: '' '' '' 303s | - succeeded, advancing tokens 303s | appending IKE integrity algorithm HMAC_SHA1_96[_0] 303s | appending IKE DH algorithm DH19[_0] 303s | appending IKE DH algorithm DH20[_0] 303s | appending IKE DH algorithm DH21[_0] 303s | appending IKE DH algorithm DH31[_0] 303s | appending IKE DH algorithm MODP4096[_0] 303s | appending IKE DH algorithm MODP3072[_0] 303s | appending IKE DH algorithm MODP2048[_0] 303s | appending IKE DH algorithm MODP8192[_0] 303s | parsing '3des-sha1' for IKE 303s | proposal: '3des-sha1' 303s | token: '' '' "3des" '-' 303s | token: '' "3des" '-' "sha1" '' 303s | token: '-' "sha1" '' '' 303s | appending IKE encryption algorithm 3DES_CBC[_0] 303s | parsing prf: 303s | appending IKE PRF algorithm HMAC_SHA1[_0] 303s | token: '' '' '' 303s | - succeeded, advancing tokens 303s | appending IKE integrity algorithm HMAC_SHA1_96[_0] 303s | appending IKE DH algorithm DH19[_0] 303s | appending IKE DH algorithm DH20[_0] 303s | appending IKE DH algorithm DH21[_0] 303s | appending IKE DH algorithm DH31[_0] 303s | appending IKE DH algorithm MODP4096[_0] 303s | appending IKE DH algorithm MODP3072[_0] 303s | appending IKE DH algorithm MODP2048[_0] 303s | appending IKE DH algorithm MODP8192[_0] 303s | parsing '3des-sha1;modp1536' for IKE 303s | proposal: '3des-sha1;modp1536' 303s | token: '' '' "3des" '-' 303s | token: '' "3des" '-' "sha1" ';' 303s | token: '-' "sha1" ';' "modp1536" '' 303s | appending IKE encryption algorithm 3DES_CBC[_0] 303s | parsing prf: 303s | appending IKE PRF algorithm HMAC_SHA1[_0] 303s | token: ';' "modp1536" '' '' 303s | - succeeded, advancing tokens 303s | parsing dh: 303s | appending IKE DH algorithm MODP1536[_0] 303s | token: '' '' '' 303s | appending IKE integrity algorithm HMAC_SHA1_96[_0] 303s | parsing '3des;dh21' for IKE 303s | proposal: '3des;dh21' 303s | token: '' '' "3des" ';' 303s | token: '' "3des" ';' "dh21" '' 303s | token: ';' "dh21" '' '' 303s | appending IKE encryption algorithm 3DES_CBC[_0] 303s | parsing dh: 303s 3DES_CBC-HMAC_SHA1-DH19+DH20+DH21+DH31+MODP4096+MODP3072+MODP2048+MODP8192 303s algparse -v2 'ike=3des-sha1;modp1536' (expect SUCCESS) 303s 3DES_CBC-HMAC_SHA1-MODP1536 303s algparse -v2 'ike=3des;dh21' (expect SUCCESS) 303s 3DES_CBC-HMAC_SHA2_512+HMAC_SHA2_256-DH21 303s algparse -v2 'ike=3des-sha1;dh21' (expect SUCCESS) 303s 3DES_CBC-HMAC_SHA1-DH21 303s algparse -v2 'ike=3des-sha1-ecp_521' (expect SUCCESS) 303s 3DES_CBC-HMAC_SHA1-DH21 303s algparse -v2 'ike=3des+aes' (expect SUCCESS) 303s 3DES_CBC+AES_CBC-HMAC_SHA2_512+HMAC_SHA2_256-DH19+DH20+DH21+DH31+MODP4096+MODP3072+MODP2048+MODP8192 303s algparse -v2 'ike=aes;none' (expect ERROR) 303s ERROR: IKE DH algorithm 'none' not permitted 303s algparse -v2 'ike=id2' (expect ERROR) 303s ERROR: IKE encryption algorithm 'id2' is not recognized 303s algparse -v2 'ike=3des-id2' (expect ERROR) 303s ERROR: IKE PRF algorithm 'id2' is not recognized 303s algparse -v2 'ike=aes_ccm' (expect ERROR) 303s ERROR: IKE encryption algorithm 'aes_ccm' is not supported 303s algparse -v2 'ike=aes-sha1-sha2-ecp_521' (expect ERROR) 303s ERROR: IKE DH algorithm 'sha2' is not recognized 303s algparse -v2 'ike=aes-sha2-sha2;ecp_521' (expect ERROR) 303s ERROR: IKE DH algorithm 'sha2' is not recognized 303s algparse -v2 'ike=aes-sha1_96-sha2-ecp_521' (expect SUCCESS) 303s AES_CBC-HMAC_SHA1_96-HMAC_SHA2_256-DH21 303s algparse -v2 'ike=aes-sha1_96-sha2;ecp_521' (expect SUCCESS) 303s AES_CBC-HMAC_SHA1_96-HMAC_SHA2_256-DH21 303s algparse -v2 'ike=aes+aes-sha1+sha1-modp8192+modp8192' (expect SUCCESS) 303s AES_CBC-HMAC_SHA1-MODP8192 303s algparse -v2 'ike=3des+aes+aes-sha2+sha1+sha1-modp4096+modp8192+modp8192' (expect SUCCESS) 303s 3DES_CBC+AES_CBC-HMAC_SHA2_256+HMAC_SHA1-MODP4096+MODP8192 303s algparse -v2 'ike=aes+3des+aes-sha1+sha2+sha1-modp8192+modp4096+modp8192' (expect SUCCESS) 303s AES_CBC+3DES_CBC-HMAC_SHA1+HMAC_SHA2_256-MODP8192+MODP4096 303s algparse -v2 'ike=aes+aes+3des-sha1+sha1+sha2-modp8192+modp8192+modp4096' (expect SUCCESS) 303s AES_CBC+3DES_CBC-HMAC_SHA1+HMAC_SHA2_256-MODP8192+MODP4096 303s algparse -v2 'ike=aes+aes128+aes256' (expect SUCCESS) 303s AES_CBC-HMAC_SHA2_512+HMAC_SHA2_256-DH19+DH20+DH21+DH31+MODP4096+MODP3072+MODP2048+MODP8192 303s algparse -v2 'ike=aes128+aes+aes256' (expect SUCCESS) 303s AES_CBC_128+AES_CBC-HMAC_SHA2_512+HMAC_SHA2_256-DH19+DH20+DH21+DH31+MODP4096+MODP3072+MODP2048+MODP8192 303s algparse -v2 'ike=aes128+aes256+aes' (expect SUCCESS) 303s AES_CBC_128+AES_CBC_256+AES_CBC-HMAC_SHA2_512+HMAC_SHA2_256-DH19+DH20+DH21+DH31+MODP4096+MODP3072+MODP2048+MODP8192 303s algparse -v2 'ike=aes-sha1-modp8192,aes-sha1-modp8192,aes-sha1-modp8192' (expect SUCCESS) 303s AES_CBC-HMAC_SHA1-MODP8192 303s algparse -v2 'ike=aes-sha1-modp8192,aes-sha2-modp8192,aes-sha1-modp8192' (expect SUCCESS) 303s AES_CBC-HMAC_SHA1-MODP8192 303s AES_CBC-HMAC_SHA2_256-MODP8192 303s algparse -v2 'ike=aes_gcm' (expect SUCCESS) 303s AES_GCM_16-HMAC_SHA2_512+HMAC_SHA2_256-DH19+DH20+DH21+DH31+MODP4096+MODP3072+MODP2048+MODP8192 303s algparse -v2 'ike=aes_gcm-sha2' (expect SUCCESS) 303s AES_GCM_16-HMAC_SHA2_256-DH19+DH20+DH21+DH31+MODP4096+MODP3072+MODP2048+MODP8192 303s algparse -v2 'ike=aes_gcm-sha2-modp2048' (expect SUCCESS) 303s AES_GCM_16-HMAC_SHA2_256-MODP2048 303s algparse -v2 'ike=aes_gcm-sha2;modp2048' (expect SUCCESS) 303s AES_GCM_16-HMAC_SHA2_256-MODP2048 303s algparse -v2 'ike=aes_gcm-modp2048' (expect ERROR) 303s ERROR: IKE PRF algorithm 'modp2048' is not recognized 303s algparse -v2 'ike=aes_gcm;modp2048' (expect SUCCESS) 303s AES_GCM_16-HMAC_SHA2_512+HMAC_SHA2_256-MODP2048 303s algparse -v2 'ike=aes_gcm-none' (expect SUCCESS) 303s AES_GCM_16-HMAC_SHA2_512+HMAC_SHA2_256-DH19+DH20+DH21+DH31+MODP4096+MODP3072+MODP2048+MODP8192 303s algparse -v2 'ike=aes_gcm-none-sha2' (expect SUCCESS) 303s AES_GCM_16-HMAC_SHA2_256-DH19+DH20+DH21+DH31+MODP4096+MODP3072+MODP2048+MODP8192 303s algparse -v2 'ike=aes_gcm-none-sha2-modp2048' (expect SUCCESS) 303s AES_GCM_16-HMAC_SHA2_256-MODP2048 303s algparse -v2 'ike=aes_gcm-none-sha2;modp2048' (expect SUCCESS) 303s AES_GCM_16-HMAC_SHA2_256-MODP2048 303s algparse -v2 'ike=aes_gcm-none-modp2048' (expect ERROR) 303s | appending IKE DH algorithm DH21[_0] 303s | token: '' '' '' 303s | appending IKE PRF algorithm HMAC_SHA2_512[_0] 303s | appending IKE PRF algorithm HMAC_SHA2_256[_0] 303s | appending IKE integrity algorithm HMAC_SHA2_512_256[_0] 303s | appending IKE integrity algorithm HMAC_SHA2_256_128[_0] 303s | parsing '3des-sha1;dh21' for IKE 303s | proposal: '3des-sha1;dh21' 303s | token: '' '' "3des" '-' 303s | token: '' "3des" '-' "sha1" ';' 303s | token: '-' "sha1" ';' "dh21" '' 303s | appending IKE encryption algorithm 3DES_CBC[_0] 303s | parsing prf: 303s | appending IKE PRF algorithm HMAC_SHA1[_0] 303s | token: ';' "dh21" '' '' 303s | - succeeded, advancing tokens 303s | parsing dh: 303s | appending IKE DH algorithm DH21[_0] 303s | token: '' '' '' 303s | appending IKE integrity algorithm HMAC_SHA1_96[_0] 303s | parsing '3des-sha1-ecp_521' for IKE 303s | proposal: '3des-sha1-ecp_521' 303s | token: '' '' "3des" '-' 303s | token: '' "3des" '-' "sha1" '-' 303s | token: '-' "sha1" '-' "ecp_521" '' 303s | appending IKE encryption algorithm 3DES_CBC[_0] 303s | parsing prf: 303s | appending IKE PRF algorithm HMAC_SHA1[_0] 303s | token: '-' "ecp_521" '' '' 303s | - succeeded, advancing tokens 303s | parsing dh: 303s | appending IKE DH algorithm DH21[_0] 303s | token: '' '' '' 303s | appending IKE integrity algorithm HMAC_SHA1_96[_0] 303s | parsing '3des+aes' for IKE 303s | proposal: '3des+aes' 303s | token: '' '' "3des" '+' 303s | token: '' "3des" '+' "aes" '' 303s | token: '+' "aes" '' '' 303s | appending IKE encryption algorithm 3DES_CBC[_0] 303s | token: '' '' '' 303s | appending IKE encryption algorithm AES_CBC[_0] 303s | appending IKE PRF algorithm HMAC_SHA2_512[_0] 303s | appending IKE PRF algorithm HMAC_SHA2_256[_0] 303s | appending IKE integrity algorithm HMAC_SHA2_512_256[_0] 303s | appending IKE integrity algorithm HMAC_SHA2_256_128[_0] 303s | appending IKE DH algorithm DH19[_0] 303s | appending IKE DH algorithm DH20[_0] 303s | appending IKE DH algorithm DH21[_0] 303s | appending IKE DH algorithm DH31[_0] 303s | appending IKE DH algorithm MODP4096[_0] 303s | appending IKE DH algorithm MODP3072[_0] 303s | appending IKE DH algorithm MODP2048[_0] 303s | appending IKE DH algorithm MODP8192[_0] 303s | parsing 'aes;none' for IKE 303s | proposal: 'aes;none' 303s | token: '' '' "aes" ';' 303s | token: '' "aes" ';' "none" '' 303s | token: ';' "none" '' '' 303s | appending IKE encryption algorithm AES_CBC[_0] 303s | parsing dh: 303s | appending IKE DH algorithm NONE[_0] 303s | token: '' '' '' 303s | appending IKE PRF algorithm HMAC_SHA2_512[_0] 303s | appending IKE PRF algorithm HMAC_SHA2_256[_0] 303s | appending IKE integrity algorithm HMAC_SHA2_512_256[_0] 303s | appending IKE integrity algorithm HMAC_SHA2_256_128[_0] 303s | parsing 'id2' for IKE 303s | proposal: 'id2' 303s | token: '' '' "id2" '' 303s | token: '' "id2" '' '' 303s | ike_alg_byname() failed: IKE encryption algorithm 'id2' is not recognized 303s | ike_alg_byname() failed: IKE encryption algorithm 'id2' is not recognized 303s | parsing '3des-id2' for IKE 303s | proposal: '3des-id2' 303s | token: '' '' "3des" '-' 303s | token: '' "3des" '-' "id2" '' 303s | token: '-' "id2" '' '' 303s | appending IKE encryption algorithm 3DES_CBC[_0] 303s | parsing prf: 303s | ike_alg_byname() failed: IKE PRF algorithm 'id2' is not recognized 303s | lookup for PRF algorithm 'id2' failed 303s | - failed, saving error 'IKE PRF algorithm 'id2' is not recognized' and tossing result 303s | parsing integ: 303s | ike_alg_byname() failed: IKE integrity algorithm 'id2' is not recognized 303s | lookup for integrity algorithm 'id2' failed 303s | - and - failed, returning earlier PRF error 'IKE PRF algorithm 'id2' is not recognized' and discarding INTEG error 'IKE integrity algorithm 'id2' is not recognized') 303s | parsing 'aes_ccm' for IKE 303s | proposal: 'aes_ccm' 303s | token: '' '' "aes_ccm" '' 303s | token: '' "aes_ccm" '' '' 303s | alg_byname_ok() failed: IKE encryption algorithm 'aes_ccm' is not supported 303s | parsing 'aes-sha1-sha2-ecp_521' for IKE 303s | proposal: 'aes-sha1-sha2-ecp_521' 303s | token: '' '' "aes" '-' 303s | token: '' "aes" '-' "sha1" '-' 303s | token: '-' "sha1" '-' "sha2" '-' 303s | appending IKE encryption algorithm AES_CBC[_0] 303s | parsing prf: 303s | appending IKE PRF algorithm HMAC_SHA1[_0] 303s | token: '-' "sha2" '-' "ecp_521" '' 303s | - succeeded, advancing tokens 303s | parsing dh: 303s | ike_alg_byname() failed: IKE DH algorithm 'sha2' is not recognized 303s | lookup for DH algorithm 'sha2' failed 303s | ... failed 'IKE DH algorithm 'sha2' is not recognized' 303s | parsing 'aes-sha2-sha2;ecp_521' for IKE 303s | proposal: 'aes-sha2-sha2;ecp_521' 303s | token: '' '' "aes" '-' 303s | token: '' "aes" '-' "sha2" '-' 303s | token: '-' "sha2" '-' "sha2" ';' 303s | appending IKE encryption algorithm AES_CBC[_0] 303s | parsing prf: 303s | appending IKE PRF algorithm HMAC_SHA2_256[_0] 303s | token: '-' "sha2" ';' "ecp_521" '' 303s | - succeeded, advancing tokens 303s | parsing dh: 303s | ike_alg_byname() failed: IKE DH algorithm 'sha2' is not recognized 303s | lookup for DH algorithm 'sha2' failed 303s | ... failed 'IKE DH algorithm 'sha2' is not recognized' 303s | parsing 'aes-sha1_96-sha2-ecp_521' for IKE 303s | proposal: 'aes-sha1_96-sha2-ecp_521' 303s | token: '' '' "aes" '-' 303s | token: '' "aes" '-' "sha1_96" '-' 303s | token: '-' "sha1_96" '-' "sha2" '-' 303s | appending IKE encryption algorithm AES_CBC[_0] 303s | parsing prf: 303s | ike_alg_byname() failed: IKE PRF algorithm 'sha1_96' is not recognized 303s | lookup for PRF algorithm 'sha1_96' failed 303s | - failed, saving error 'IKE PRF algorithm 'sha1_96' is not recognized' and tossing result 303s | parsing integ: 303s | appending IKE integrity algorithm HMAC_SHA1_96[_0] 303s | token: '-' "sha2" '-' "ecp_521" '' 303s | parsing prf: 303s | appending IKE PRF algorithm HMAC_SHA2_256[_0] 303s | token: '-' "ecp_521" '' '' 303s | parsing dh: 303s | appending IKE DH algorithm DH21[_0] 303s | token: '' '' '' 303s | parsing 'aes-sha1_96-sha2;ecp_521' for IKE 303s | proposal: 'aes-sha1_96-sha2;ecp_521' 303s | token: '' '' "aes" '-' 303s | token: '' "aes" '-' "sha1_96" '-' 303s | token: '-' "sha1_96" '-' "sha2" ';' 303s | appending IKE encryption algorithm AES_CBC[_0] 303s | parsing prf: 303s | ike_alg_byname() failed: IKE PRF algorithm 'sha1_96' is not recognized 303s | lookup for PRF algorithm 'sha1_96' failed 303s | - failed, saving error 'IKE PRF algorithm 'sha1_96' is not recognized' and tossing result 303s | parsing integ: 303s | appending IKE integrity algorithm HMAC_SHA1_96[_0] 303s | token: '-' "sha2" ';' "ecp_521" '' 303s | parsing prf: 303s | appending IKE PRF algorithm HMAC_SHA2_256[_0] 303s | token: ';' "ecp_521" '' '' 303s | parsing dh: 303s | appending IKE DH algorithm DH21[_0] 303s | token: '' '' '' 303s | parsing 'aes+aes-sha1+sha1-modp8192+modp8192' for IKE 303s | proposal: 'aes+aes-sha1+sha1-modp8192+modp8192' 303s | token: '' '' "aes" '+' 303s | token: '' "aes" '+' "aes" '-' 303s | token: '+' "aes" '-' "sha1" '+' 303s | appending IKE encryption algorithm AES_CBC[_0] 303s | token: '-' "sha1" '+' "sha1" '-' 303s | appending IKE encryption algorithm AES_CBC[_0] 303s ipsec algparse: discarding duplicate IKE encryption algorithm AES_CBC 303s | parsing prf: 303s | appending IKE PRF algorithm HMAC_SHA1[_0] 303s | token: '+' "sha1" '-' "modp8192" '+' 303s | appending IKE PRF algorithm HMAC_SHA1[_0] 303s | token: '-' "modp8192" '+' "modp8192" '' 303s ipsec algparse: discarding duplicate IKE PRF algorithm HMAC_SHA1 303s | - succeeded, advancing tokens 303s | parsing dh: 303s | appending IKE DH algorithm MODP8192[_0] 303s | token: '+' "modp8192" '' '' 303s | appending IKE DH algorithm MODP8192[_0] 303s | token: '' '' '' 303s ipsec algparse: discarding duplicate IKE DH algorithm MODP8192 303s | appending IKE integrity algorithm HMAC_SHA1_96[_0] 303s | parsing '3des+aes+aes-sha2+sha1+sha1-modp4096+modp8192+modp8192' for IKE 303s | proposal: '3des+aes+aes-sha2+sha1+sha1-modp4096+modp8192+modp8192' 303s | token: '' '' "3des" '+' 303s | token: '' "3des" '+' "aes" '+' 303s | token: '+' "aes" '+' "aes" '-' 303s | appending IKE encryption algorithm 3DES_CBC[_0] 303s | token: '+' "aes" '-' "sha2" '+' 303s | appending IKE encryption algorithm AES_CBC[_0] 303s | token: '-' "sha2" '+' "sha1" '+' 303s | appending IKE encryption algorithm AES_CBC[_0] 303s ipsec algparse: discarding duplicate IKE encryption algorithm AES_CBC 303s | parsing prf: 303s | appending IKE PRF algorithm HMAC_SHA2_256[_0] 303s | token: '+' "sha1" '+' "sha1" '-' 303s | appending IKE PRF algorithm HMAC_SHA1[_0] 303s | token: '+' "sha1" '-' "modp4096" '+' 303s | appending IKE PRF algorithm HMAC_SHA1[_0] 303s | token: '-' "modp4096" '+' "modp8192" '+' 303s ipsec algparse: discarding duplicate IKE PRF algorithm HMAC_SHA1 303s | - succeeded, advancing tokens 303s | parsing dh: 303s | appending IKE DH algorithm MODP4096[_0] 303s | token: '+' "modp8192" '+' "modp8192" '' 303s | appending IKE DH algorithm MODP8192[_0] 303s | token: '+' "modp8192" '' '' 303s | appending IKE DH algorithm MODP8192[_0] 303s | token: '' '' '' 303s ipsec algparse: discarding duplicate IKE DH algorithm MODP8192 303s | appending IKE integrity algorithm HMAC_SHA2_256_128[_0] 303s | appending IKE integrity algorithm HMAC_SHA1_96[_0] 303s | parsing 'aes+3des+aes-sha1+sha2+sha1-modp8192+modp4096+modp8192' for IKE 303s | proposal: 'aes+3des+aes-sha1+sha2+sha1-modp8192+modp4096+modp8192' 303s | token: '' '' "aes" '+' 303s | token: '' "aes" '+' "3des" '+' 303s | token: '+' "3des" '+' "aes" '-' 303s | appending IKE encryption algorithm AES_CBC[_0] 303s | token: '+' "aes" '-' "sha1" '+' 303s | appending IKE encryption algorithm 3DES_CBC[_0] 303s | token: '-' "sha1" '+' "sha2" '+' 303s | appending IKE encryption algorithm AES_CBC[_0] 303s ipsec algparse: discarding duplicate IKE encryption algorithm AES_CBC 303s | parsing prf: 303s | appending IKE PRF algorithm HMAC_SHA1[_0] 303s | token: '+' "sha2" '+' "sha1" '-' 303s | appending IKE PRF algorithm HMAC_SHA2_256[_0] 303s | token: '+' "sha1" '-' "modp8192" '+' 303s | appending IKE PRF algorithm HMAC_SHA1[_0] 303s | token: '-' "modp8192" '+' "modp4096" '+' 303s ipsec algparse: discarding duplicate IKE PRF algorithm HMAC_SHA1 303s | - succeeded, advancing tokens 303s | parsing dh: 303s | appending IKE DH algorithm MODP8192[_0] 303s | token: '+' "modp4096" '+' "modp8192" '' 303s | appending IKE DH algorithm MODP4096[_0] 303s | token: '+' "modp8192" '' '' 303s | appending IKE DH algorithm MODP8192[_0] 303s | token: '' '' '' 303s ipsec algparse: discarding duplicate IKE DH algorithm MODP8192 303s | appending IKE integrity algorithm HMAC_SHA1_96[_0] 303s | appending IKE integrity algorithm HMAC_SHA2_256_128[_0] 303s | parsing 'aes+aes+3des-sha1+sha1+sha2-modp8192+modp8192+modp4096' for IKE 303s | proposal: 'aes+aes+3des-sha1+sha1+sha2-modp8192+modp8192+modp4096' 303s | token: '' '' "aes" '+' 303s | token: '' "aes" '+' "aes" '+' 303s | token: '+' "aes" '+' "3des" '-' 303s | appending IKE encryption algorithm AES_CBC[_0] 303s | token: '+' "3des" '-' "sha1" '+' 303s | appending IKE encryption algorithm AES_CBC[_0] 303s | token: '-' "sha1" '+' "sha1" '+' 303s | appending IKE encryption algorithm 3DES_CBC[_0] 303s ipsec algparse: discarding duplicate IKE encryption algorithm AES_CBC 303s | parsing prf: 303s | appending IKE PRF algorithm HMAC_SHA1[_0] 303s | token: '+' "sha1" '+' "sha2" '-' 303s | appending IKE PRF algorithm HMAC_SHA1[_0] 303s | token: '+' "sha2" '-' "modp8192" '+' 303s | appending IKE PRF algorithm HMAC_SHA2_256[_0] 303s | token: '-' "modp8192" '+' "modp8192" '+' 303s ipsec algparse: discarding duplicate IKE PRF algorithm HMAC_SHA1 303s | - succeeded, advancing tokens 303s | parsing dh: 303s | appending IKE DH algorithm MODP8192[_0] 303s | token: '+' "modp8192" '+' "modp4096" '' 303s | appending IKE DH algorithm MODP8192[_0] 303s | token: '+' "modp4096" '' '' 303s | appending IKE DH algorithm MODP4096[_0] 303s | token: '' '' '' 303s ipsec algparse: discarding duplicate IKE DH algorithm MODP8192 303s | appending IKE integrity algorithm HMAC_SHA1_96[_0] 303s | appending IKE integrity algorithm HMAC_SHA2_256_128[_0] 303s | parsing 'aes+aes128+aes256' for IKE 303s | proposal: 'aes+aes128+aes256' 303s | token: '' '' "aes" '+' 303s | token: '' "aes" '+' "aes128" '+' 303s | token: '+' "aes128" '+' "aes256" '' 303s | appending IKE encryption algorithm AES_CBC[_0] 303s | ike_alg_byname() failed: IKE encryption algorithm 'aes128' is not recognized 303s | token: '+' "aes256" '' '' 303s | appending IKE encryption algorithm AES_CBC[_128] 303s | ike_alg_byname() failed: IKE encryption algorithm 'aes256' is not recognized 303s | token: '' '' '' 303s | appending IKE encryption algorithm AES_CBC[_256] 303s ipsec algparse: discarding duplicate IKE encryption algorithm AES_CBC_128 303s ipsec algparse: discarding duplicate IKE encryption algorithm AES_CBC_256 303s | appending IKE PRF algorithm HMAC_SHA2_512[_0] 303s | appending IKE PRF algorithm HMAC_SHA2_256[_0] 303s | appending IKE integrity algorithm HMAC_SHA2_512_256[_0] 303s | appending IKE integrity algorithm HMAC_SHA2_256_128[_0] 303s | appending IKE DH algorithm DH19[_0] 303s | appending IKE DH algorithm DH20[_0] 303s | appending IKE DH algorithm DH21[_0] 303s | appending IKE DH algorithm DH31[_0] 303s | appending IKE DH algorithm MODP4096[_0] 303s | appending IKE DH algorithm MODP3072[_0] 303s | appending IKE DH algorithm MODP2048[_0] 303s | appending IKE DH algorithm MODP8192[_0] 303s | parsing 'aes128+aes+aes256' for IKE 303s | proposal: 'aes128+aes+aes256' 303s | token: '' '' "aes128" '+' 303s | token: '' "aes128" '+' "aes" '+' 303s | ike_alg_byname() failed: IKE encryption algorithm 'aes128' is not recognized 303s | token: '+' "aes" '+' "aes256" '' 303s | appending IKE encryption algorithm AES_CBC[_128] 303s | token: '+' "aes256" '' '' 303s | appending IKE encryption algorithm AES_CBC[_0] 303s | ike_alg_byname() failed: IKE encryption algorithm 'aes256' is not recognized 303s | token: '' '' '' 303s | appending IKE encryption algorithm AES_CBC[_256] 303s ipsec algparse: discarding duplicate IKE encryption algorithm AES_CBC_256 303s | appending IKE PRF algorithm HMAC_SHA2_512[_0] 303s | appending IKE PRF algorithm HMAC_SHA2_256[_0] 303s | appending IKE integrity algorithm HMAC_SHA2_512_256[_0] 303s | appending IKE integrity algorithm HMAC_SHA2_256_128[_0] 303s | appending IKE DH algorithm DH19[_0] 303s | appending IKE DH algorithm DH20[_0] 303s | appending IKE DH algorithm DH21[_0] 303s | appending IKE DH algorithm DH31[_0] 303s | appending IKE DH algorithm MODP4096[_0] 303s | appending IKE DH algorithm MODP3072[_0] 303s | appending IKE DH algorithm MODP2048[_0] 303s | appending IKE DH algorithm MODP8192[_0] 303s | parsing 'aes128+aes256+aes' for IKE 303s | proposal: 'aes128+aes256+aes' 303s | token: '' '' "aes128" '+' 303s | token: '' "aes128" '+' "aes256" '+' 303s | ike_alg_byname() failed: IKE encryption algorithm 'aes128' is not recognized 303s | token: '+' "aes256" '+' "aes" '' 303s | appending IKE encryption algorithm AES_CBC[_128] 303s | ike_alg_byname() failed: IKE encryption algorithm 'aes256' is not recognized 303s | token: '+' "aes" '' '' 303s | appending IKE encryption algorithm AES_CBC[_256] 303s | token: '' '' '' 303s | appending IKE encryption algorithm AES_CBC[_0] 303s | appending IKE PRF algorithm HMAC_SHA2_512[_0] 303s | appending IKE PRF algorithm HMAC_SHA2_256[_0] 303s | appending IKE integrity algorithm HMAC_SHA2_512_256[_0] 303s | appending IKE integrity algorithm HMAC_SHA2_256_128[_0] 303s | appending IKE DH algorithm DH19[_0] 303s | appending IKE DH algorithm DH20[_0] 303s | appending IKE DH algorithm DH21[_0] 303s | appending IKE DH algorithm DH31[_0] 303s | appending IKE DH algorithm MODP4096[_0] 303s | appending IKE DH algorithm MODP3072[_0] 303s | appending IKE DH algorithm MODP2048[_0] 303s | appending IKE DH algorithm MODP8192[_0] 303s | parsing 'aes-sha1-modp8192,aes-sha1-modp8192,aes-sha1-modp8192' for IKE 303s | proposal: 'aes-sha1-modp8192' 303s | token: '' '' "aes" '-' 303s | token: '' "aes" '-' "sha1" '-' 303s | token: '-' "sha1" '-' "modp8192" '' 303s | appending IKE encryption algorithm AES_CBC[_0] 303s | parsing prf: 303s | appending IKE PRF algorithm HMAC_SHA1[_0] 303s | token: '-' "modp8192" '' '' 303s | - succeeded, advancing tokens 303s | parsing dh: 303s | appending IKE DH algorithm MODP8192[_0] 303s | token: '' '' '' 303s | appending IKE integrity algorithm HMAC_SHA1_96[_0] 303s | proposal: 'aes-sha1-modp8192' 303s | token: '' '' "aes" '-' 303s | token: '' "aes" '-' "sha1" '-' 303s | token: '-' "sha1" '-' "modp8192" '' 303s | appending IKE encryption algorithm AES_CBC[_0] 303s | parsing prf: 303s | appending IKE PRF algorithm HMAC_SHA1[_0] 303s | token: '-' "modp8192" '' '' 303s | - succeeded, advancing tokens 303s | parsing dh: 303s | appending IKE DH algorithm MODP8192[_0] 303s | token: '' '' '' 303s | appending IKE integrity algorithm HMAC_SHA1_96[_0] 303s | proposal: 'aes-sha1-modp8192' 303s | token: '' '' "aes" '-' 303s | token: '' "aes" '-' "sha1" '-' 303s | token: '-' "sha1" '-' "modp8192" '' 303s | appending IKE encryption algorithm AES_CBC[_0] 303s | parsing prf: 303s | appending IKE PRF algorithm HMAC_SHA1[_0] 303s | token: '-' "modp8192" '' '' 303s | - succeeded, advancing tokens 303s | parsing dh: 303s | appending IKE DH algorithm MODP8192[_0] 303s | token: '' '' '' 303s | appending IKE integrity algorithm HMAC_SHA1_96[_0] 303s | parsing 'aes-sha1-modp8192,aes-sha2-modp8192,aes-sha1-modp8192' for IKE 303s | proposal: 'aes-sha1-modp8192' 303s | token: '' '' "aes" '-' 303s | token: '' "aes" '-' "sha1" '-' 303s | token: '-' "sha1" '-' "modp8192" '' 303s | appending IKE encryption algorithm AES_CBC[_0] 303s | parsing prf: 303s | appending IKE PRF algorithm HMAC_SHA1[_0] 303s | token: '-' "modp8192" '' '' 303s | - succeeded, advancing tokens 303s | parsing dh: 303s | appending IKE DH algorithm MODP8192[_0] 303s | token: '' '' '' 303s | appending IKE integrity algorithm HMAC_SHA1_96[_0] 303s | proposal: 'aes-sha2-modp8192' 303s | token: '' '' "aes" '-' 303s | token: '' "aes" '-' "sha2" '-' 303s | token: '-' "sha2" '-' "modp8192" '' 303s | appending IKE encryption algorithm AES_CBC[_0] 303s | parsing prf: 303s | appending IKE PRF algorithm HMAC_SHA2_256[_0] 303s | token: '-' "modp8192" '' '' 303s | - succeeded, advancing tokens 303s | parsing dh: 303s | appending IKE DH algorithm MODP8192[_0] 303s | token: '' '' '' 303s | appending IKE integrity algorithm HMAC_SHA2_256_128[_0] 303s | proposal: 'aes-sha1-modp8192' 303s | token: '' '' "aes" '-' 303s | token: '' "aes" '-' "sha1" '-' 303s | token: '-' "sha1" '-' "modp8192" '' 303s | appending IKE encryption algorithm AES_CBC[_0] 303s | parsing prf: 303s | appending IKE PRF algorithm HMAC_SHA1[_0] 303s | token: '-' "modp8192" '' '' 303s | - succeeded, advancing tokens 303s | parsing dh: 303s | appending IKE DH algorithm MODP8192[_0] 303s | token: '' '' '' 303s | appending IKE integrity algorithm HMAC_SHA1_96[_0] 303s | parsing 'aes_gcm' for IKE 303s | proposal: 'aes_gcm' 303s | token: '' '' "aes_gcm" '' 303s | token: '' "aes_gcm" '' '' 303s | token: '' '' '' 303s | appending IKE encryption algorithm AES_GCM_16[_0] 303s | appending IKE PRF algorithm HMAC_SHA2_512[_0] 303s | appending IKE PRF algorithm HMAC_SHA2_256[_0] 303s | appending IKE integrity algorithm NONE[_0] 303s | appending IKE DH algorithm DH19[_0] 303s | appending IKE DH algorithm DH20[_0] 303s | appending IKE DH algorithm DH21[_0] 303s | appending IKE DH algorithm DH31[_0] 303s | appending IKE DH algorithm MODP4096[_0] 303s | appending IKE DH algorithm MODP3072[_0] 303s | appending IKE DH algorithm MODP2048[_0] 303s | appending IKE DH algorithm MODP8192[_0] 303s | parsing 'aes_gcm-sha2' for IKE 303s | proposal: 'aes_gcm-sha2' 303s | token: '' '' "aes_gcm" '-' 303s | token: '' "aes_gcm" '-' "sha2" '' 303s | token: '-' "sha2" '' '' 303s | appending IKE encryption algorithm AES_GCM_16[_0] 303s | parsing prf: 303s | appending IKE PRF algorithm HMAC_SHA2_256[_0] 303s | token: '' '' '' 303s | - succeeded, advancing tokens 303s | appending IKE integrity algorithm NONE[_0] 303s | appending IKE DH algorithm DH19[_0] 303s | appending IKE DH algorithm DH20[_0] 303s | appending IKE DH algorithm DH21[_0] 303s | appending IKE DH algorithm DH31[_0] 303s | appending IKE DH algorithm MODP4096[_0] 303s | appending IKE DH algorithm MODP3072[_0] 303s | appending IKE DH algorithm MODP2048[_0] 303s | appending IKE DH algorithm MODP8192[_0] 303s | parsing 'aes_gcm-sha2-modp2048' for IKE 303s | proposal: 'aes_gcm-sha2-modp2048' 303s | token: '' '' "aes_gcm" '-' 303s | token: '' "aes_gcm" '-' "sha2" '-' 303s | token: '-' "sha2" '-' "modp2048" '' 303s | appending IKE encryption algorithm AES_GCM_16[_0] 303s | parsing prf: 303s | appending IKE PRF algorithm HMAC_SHA2_256[_0] 303s | token: '-' "modp2048" '' '' 303s | - succeeded, advancing tokens 303s | parsing dh: 303s | appending IKE DH algorithm MODP2048[_0] 303s | token: '' '' '' 303s | appending IKE integrity algorithm NONE[_0] 303s | parsing 'aes_gcm-sha2;modp2048' for IKE 303s | proposal: 'aes_gcm-sha2;modp2048' 303s | token: '' '' "aes_gcm" '-' 303s | token: '' "aes_gcm" '-' "sha2" ';' 303s | token: '-' "sha2" ';' "modp2048" '' 303s | appending IKE encryption algorithm AES_GCM_16[_0] 303s | parsing prf: 303s | appending IKE PRF algorithm HMAC_SHA2_256[_0] 303s | token: ';' "modp2048" '' '' 303s | - succeeded, advancing tokens 303s | parsing dh: 303s | appending IKE DH algorithm MODP2048[_0] 303s | token: '' '' '' 303s | appending IKE integrity algorithm NONE[_0] 303s | parsing 'aes_gcm-modp2048' for IKE 303s | proposal: 'aes_gcm-modp2048' 303s | token: '' '' "aes_gcm" '-' 303s | token: '' "aes_gcm" '-' "modp2048" '' 303s | token: '-' "modp2048" '' '' 303s | appending IKE encryption algorithm AES_GCM_16[_0] 303s | parsing prf: 303s | ike_alg_byname() failed: IKE PRF algorithm 'modp2048' is not recognized 303s | lookup for PRF algorithm 'modp2048' failed 303s | - failed, saving error 'IKE PRF algorithm 'modp2048' is not recognized' and tossing result 303s | parsing integ: 303s | ike_alg_byname() failed: IKE integrity algorithm 'modp2048' is not recognized 303s | lookup for integrity algorithm 'modp2048' failed 303s | - and - failed, returning earlier PRF error 'IKE PRF algorithm 'modp2048' is not recognized' and discarding INTEG error 'IKE integrity algorithm 'modp2048' is not recognized') 303s | parsing 'aes_gcm;modp2048' for IKE 303s | proposal: 'aes_gcm;modp2048' 303s | token: '' '' "aes_gcm" ';' 303s | token: '' "aes_gcm" ';' "modp2048" '' 303s | token: ';' "modp2048" '' '' 303s | appending IKE encryption algorithm AES_GCM_16[_0] 303s | parsing dh: 303s | appending IKE DH algorithm MODP2048[_0] 303s | token: '' '' '' 303s | appending IKE PRF algorithm HMAC_SHA2_512[_0] 303s | appending IKE PRF algorithm HMAC_SHA2_256[_0] 303s | appending IKE integrity algorithm NONE[_0] 303s | parsing 'aes_gcm-none' for IKE 303s | proposal: 'aes_gcm-none' 303s | token: '' '' "aes_gcm" '-' 303s | token: '' "aes_gcm" '-' "none" '' 303s | token: '-' "none" '' '' 303s | appending IKE encryption algorithm AES_GCM_16[_0] 303s | parsing prf: 303s | ike_alg_byname() failed: IKE PRF algorithm 'none' is not recognized 303s | lookup for PRF algorithm 'none' failed 303s | - failed, saving error 'IKE PRF algorithm 'none' is not recognized' and tossing result 303s | parsing integ: 303s | appending IKE integrity algorithm NONE[_0] 303s | token: '' '' '' 303s | appending IKE PRF algorithm HMAC_SHA2_512[_0] 303s | appending IKE PRF algorithm HMAC_SHA2_256[_0] 303s | appending IKE DH algorithm DH19[_0] 303s | appending IKE DH algorithm DH20[_0] 303s | appending IKE DH algorithm DH21[_0] 303s | appending IKE DH algorithm DH31[_0] 303s | appending IKE DH algorithm MODP4096[_0] 303s | appending IKE DH algorithm MODP3072[_0] 303s | appending IKE DH algorithm MODP2048[_0] 303s | appending IKE DH algorithm MODP8192[_0] 303s | parsing 'aes_gcm-none-sha2' for IKE 303s | proposal: 'aes_gcm-none-sha2' 303s | token: '' '' "aes_gcm" '-' 303s | token: '' "aes_gcm" '-' "none" '-' 303s | token: '-' "none" '-' "sha2" '' 303s | appending IKE encryption algorithm AES_GCM_16[_0] 303s | parsing prf: 303s | ike_alg_byname() failed: IKE PRF algorithm 'none' is not recognized 303s | lookup for PRF algorithm 'none' failed 303s | - failed, saving error 'IKE PRF algorithm 'none' is not recognized' and tossing result 303s | parsing integ: 303s | appending IKE integrity algorithm NONE[_0] 303s | token: '-' "sha2" '' '' 303s | parsing prf: 303s | appending IKE PRF algorithm HMAC_SHA2_256[_0] 303s | token: '' '' '' 303s | appending IKE DH algorithm DH19[_0] 303s | appending IKE DH algorithm DH20[_0] 303s | appending IKE DH algorithm DH21[_0] 303s | appending IKE DH algorithm DH31[_0] 303s | appending IKE DH algorithm MODP4096[_0] 303s | appending IKE DH algorithm MODP3072[_0] 303s | appending IKE DH algorithm MODP2048[_0] 303s | appending IKE DH algorithm MODP8192[_0] 303s | parsing 'aes_gcm-none-sha2-modp2048' for IKE 303s | proposal: 'aes_gcm-none-sha2-modp2048' 303s | token: '' '' "aes_gcm" '-' 303s | token: '' "aes_gcm" '-' "none" '-' 303s | token: '-' "none" '-' "sha2" '-' 303s | appending IKE encryption algorithm AES_GCM_16[_0] 303s | parsing prf: 303s | ike_alg_byname() failed: IKE PRF algorithm 'none' is not recognized 303s | lookup for PRF algorithm 'none' failed 303s | - failed, saving error 'IKE PRF algorithm 'none' is not recognized' and tossing result 303s | parsing integ: 303s | appending IKE integrity algorithm NONE[_0] 303s | token: '-' "sha2" '-' "modp2048" '' 303s | parsing prf: 303s | appending IKE PRF algorithm HMAC_SHA2_256[_0] 303s | token: '-' "modp2048" '' '' 303s | parsing dh: 303s | appending IKE DH algorithm MODP2048[_0] 303s | token: '' '' '' 303s | parsing 'aes_gcm-none-sha2;modp2048' for IKE 303s | proposal: 'aes_gcm-none-sha2;modp2048' 303s | token: '' '' "aes_gcm" '-' 303s | token: '' "aes_gcm" '-' "none" '-' 303s | token: '-' "none" '-' "sha2" ';' 303s | appending IKE encryption algorithm AES_GCM_16[_0] 303s | parsing prf: 303s | ike_alg_byname() failed: IKE PRF algorithm 'none' is not recognized 303s | lookup for PRF algorithm 'none' failed 303s | - failed, saving error 'IKE PRF algorithm 'none' is not recognized' and tossing result 303s | parsing integ: 303s | appending IKE integrity algorithm NONE[_0] 303s | token: '-' "sha2" ';' "modp2048" '' 303s | parsing prf: 303s | appending IKE PRF algorithm HMAC_SHA2_256[_0] 303s | token: ';' "modp2048" '' '' 303s | parsing dh: 303s | appending IKE DH algorithm MODP2048[_0] 303s | token: '' '' '' 303s | parsing 'aes_gcm-none-modp2048' for IKE 303s | proposal: 'aes_gcm-none-modp2048' 303s | token: '' '' "aes_gcm" '-' 303s | token: '' "aes_gcm" '-' "none" '-' 303s | token: '-' "none" '-' "modp2048" '' 303s | appending IKE encryption algorithm AES_GCM_16[_0] 303s | parsing prf: 303s ERROR: IKE PRF algorithm 'modp2048' is not recognized 303s algparse -v2 'ike=aes_gcm-none;modp2048' (expect SUCCESS) 303s AES_GCM_16-HMAC_SHA2_512+HMAC_SHA2_256-MODP2048 303s algparse -v2 'ike=aes_gcm-sha1-none-modp2048' (expect ERROR) 303s ERROR: IKE proposal contains unexpected 'modp2048' 303s algparse -v2 'ike=aes_gcm-sha1-none;modp2048' (expect ERROR) 303s ERROR: IKE proposal contains unexpected 'modp2048' 303s algparse -v2 'ike=aes+aes_gcm' (expect ERROR) 303s | ike_alg_byname() failed: IKE PRF algorithm 'none' is not recognized 303s | lookup for PRF algorithm 'none' failed 303s | - failed, saving error 'IKE PRF algorithm 'none' is not recognized' and tossing result 303s | parsing integ: 303s | appending IKE integrity algorithm NONE[_0] 303s | token: '-' "modp2048" '' '' 303s | parsing prf: 303s | ike_alg_byname() failed: IKE PRF algorithm 'modp2048' is not recognized 303s | lookup for PRF algorithm 'modp2048' failed 303s | -- failed 'IKE PRF algorithm 'modp2048' is not recognized' 303s | parsing 'aes_gcm-none;modp2048' for IKE 303s | proposal: 'aes_gcm-none;modp2048' 303s | token: '' '' "aes_gcm" '-' 303s | token: '' "aes_gcm" '-' "none" ';' 303s | token: '-' "none" ';' "modp2048" '' 303s | appending IKE encryption algorithm AES_GCM_16[_0] 303s | parsing prf: 303s | ike_alg_byname() failed: IKE PRF algorithm 'none' is not recognized 303s | lookup for PRF algorithm 'none' failed 303s | - failed, saving error 'IKE PRF algorithm 'none' is not recognized' and tossing result 303s | parsing integ: 303s | appending IKE integrity algorithm NONE[_0] 303s | token: ';' "modp2048" '' '' 303s | parsing dh: 303s | appending IKE DH algorithm MODP2048[_0] 303s | token: '' '' '' 303s | appending IKE PRF algorithm HMAC_SHA2_512[_0] 303s | appending IKE PRF algorithm HMAC_SHA2_256[_0] 303s | parsing 'aes_gcm-sha1-none-modp2048' for IKE 303s | proposal: 'aes_gcm-sha1-none-modp2048' 303s | token: '' '' "aes_gcm" '-' 303s | token: '' "aes_gcm" '-' "sha1" '-' 303s | token: '-' "sha1" '-' "none" '-' 303s | appending IKE encryption algorithm AES_GCM_16[_0] 303s | parsing prf: 303s | appending IKE PRF algorithm HMAC_SHA1[_0] 303s | token: '-' "none" '-' "modp2048" '' 303s | - succeeded, advancing tokens 303s | parsing dh: 303s | appending IKE DH algorithm NONE[_0] 303s | token: '-' "modp2048" '' '' 303s | parsing 'aes_gcm-sha1-none;modp2048' for IKE 303s | proposal: 'aes_gcm-sha1-none;modp2048' 303s | token: '' '' "aes_gcm" '-' 303s | token: '' "aes_gcm" '-' "sha1" '-' 303s | token: '-' "sha1" '-' "none" ';' 303s | appending IKE encryption algorithm AES_GCM_16[_0] 303s | parsing prf: 303s | appending IKE PRF algorithm HMAC_SHA1[_0] 303s | token: '-' "none" ';' "modp2048" '' 303s | - succeeded, advancing tokens 303s | parsing dh: 303s | appending IKE DH algorithm NONE[_0] 303s | token: ';' "modp2048" '' '' 303s | parsing 'aes+aes_gcm' for IKE 303s | proposal: 'aes+aes_gcm' 303s | token: '' '' "aes" '+' 303s | token: '' "aes" '+' "aes_gcm" '' 303s | token: '+' "aes_gcm" '' '' 303s | appending IKE encryption algorithm AES_CBC[_0] 303s | token: '' '' '' 303s | appending IKE encryption algorithm AES_GCM_16[_0] 303s | appending IKE PRF algorithm HMAC_SHA2_512[_0] 303s | appending IKE PRF algorithm HMAC_SHA2_256[_0] 303s | appending IKE DH algorithm DH19[_0] 303s | appending IKE DH algorithm DH20[_0] 303s | appending IKE DH algorithm DH21[_0] 303s | appending IKE DH algorithm DH31[_0] 303s | appending IKE DH algorithm MODP4096[_0] 303s | appending IKE DH algorithm MODP3072[_0] 303s | appending IKE DH algorithm MODP2048[_0] 303s | appending IKE DH algorithm MODP8192[_0] 303s | parsing ',' for IKE 303s | proposal: '' 303s | token: '' '' "" '' 303s | token: '' "" '' '' 303s | parsing 'aes,' for IKE 303s | proposal: 'aes' 303s | token: '' '' "aes" '' 303s | token: '' "aes" '' '' 303s | token: '' '' '' 303s | appending IKE encryption algorithm AES_CBC[_0] 303s | appending IKE PRF algorithm HMAC_SHA2_512[_0] 303s | appending IKE PRF algorithm HMAC_SHA2_256[_0] 303s | appending IKE integrity algorithm HMAC_SHA2_512_256[_0] 303s | appending IKE integrity algorithm HMAC_SHA2_256_128[_0] 303s | appending IKE DH algorithm DH19[_0] 303s | appending IKE DH algorithm DH20[_0] 303s | appending IKE DH algorithm DH21[_0] 303s | appending IKE DH algorithm DH31[_0] 303s | appending IKE DH algorithm MODP4096[_0] 303s | appending IKE DH algorithm MODP3072[_0] 303s | appending IKE DH algorithm MODP2048[_0] 303s | appending IKE DH algorithm MODP8192[_0] 303s | proposal: '' 303s | token: '' '' "" '' 303s | token: '' "" '' '' 303s | parsing 'aes,,aes' for IKE 303s | proposal: 'aes' 303s | token: '' '' "aes" '' 303s | token: '' "aes" '' '' 303s | token: '' '' '' 303s | appending IKE encryption algorithm AES_CBC[_0] 303s | appending IKE PRF algorithm HMAC_SHA2_512[_0] 303s | appending IKE PRF algorithm HMAC_SHA2_256[_0] 303s | appending IKE integrity algorithm HMAC_SHA2_512_256[_0] 303s | appending IKE integrity algorithm HMAC_SHA2_256_128[_0] 303s | appending IKE DH algorithm DH19[_0] 303s | appending IKE DH algorithm DH20[_0] 303s | appending IKE DH algorithm DH21[_0] 303s | appending IKE DH algorithm DH31[_0] 303s | appending IKE DH algorithm MODP4096[_0] 303s | appending IKE DH algorithm MODP3072[_0] 303s | appending IKE DH algorithm MODP2048[_0] 303s | appending IKE DH algorithm MODP8192[_0] 303s | proposal: '' 303s | token: '' '' "" '' 303s | token: '' "" '' '' 303s | parsing ',aes' for IKE 303s | proposal: '' 303s | token: '' '' "" '' 303s | token: '' "" '' '' 303s | parsing '-' for IKE 303s | proposal: '-' 303s | token: '' '' "" '-' 303s | token: '' "" '-' "" '' 303s | parsing '+' for IKE 303s | proposal: '+' 303s | token: '' '' "" '+' 303s | token: '' "" '+' "" '' 303s | parsing ';' for IKE 303s | proposal: ';' 303s | token: '' '' "" ';' 303s | token: '' "" ';' "" '' 303s | parsing 'aes-' for IKE 303s | proposal: 'aes-' 303s | token: '' '' "aes" '-' 303s | token: '' "aes" '-' "" '' 303s ERROR: AEAD and non-AEAD IKE encryption algorithm cannot be combined 303s algparse -v2 'ike=,' (expect ERROR) 303s ERROR: IKE encryption algorithm is empty 303s algparse -v2 'ike=aes,' (expect ERROR) 303s ERROR: IKE encryption algorithm is empty 303s algparse -v2 'ike=aes,,aes' (expect ERROR) 303s ERROR: IKE encryption algorithm is empty 303s algparse -v2 'ike=,aes' (expect ERROR) 303s ERROR: IKE encryption algorithm is empty 303s algparse -v2 'ike=-' (expect ERROR) 303s ERROR: IKE encryption algorithm is empty 303s algparse -v2 'ike=+' (expect ERROR) 303s ERROR: IKE encryption algorithm is empty 303s algparse -v2 'ike=;' (expect ERROR) 303s ERROR: IKE encryption algorithm is empty 303s algparse -v2 'ike=aes-' (expect ERROR) 303s ERROR: IKE PRF algorithm is empty 303s algparse -v2 'ike=aes+' (expect ERROR) 303s ERROR: IKE encryption algorithm is empty 303s algparse -v2 'ike=aes;' (expect ERROR) 303s ERROR: IKE DH algorithm is empty 303s algparse -v2 'ike=-aes' (expect ERROR) 303s ERROR: IKE encryption algorithm is empty 303s algparse -v2 'ike=+aes' (expect ERROR) 303s ERROR: IKE encryption algorithm is empty 303s algparse -v2 'ike=;aes' (expect ERROR) 303s ERROR: IKE encryption algorithm is empty 303s algparse -v2 'ike=aes+-' (expect ERROR) 303s ERROR: IKE encryption algorithm is empty 303s algparse -v2 'ike=aes+;' (expect ERROR) 303s ERROR: IKE encryption algorithm is empty 303s algparse -v2 'ike=aes++' (expect ERROR) 303s ERROR: IKE encryption algorithm is empty 303s testing -ta 303s | token: '-' "" '' '' 303s | appending IKE encryption algorithm AES_CBC[_0] 303s | parsing prf: 303s | - failed, saving error 'IKE PRF algorithm is empty' and tossing result 303s | parsing integ: 303s | - and - failed, returning earlier PRF error 'IKE PRF algorithm is empty' and discarding INTEG error 'IKE integrity algorithm is empty') 303s | parsing 'aes+' for IKE 303s | proposal: 'aes+' 303s | token: '' '' "aes" '+' 303s | token: '' "aes" '+' "" '' 303s | token: '+' "" '' '' 303s | appending IKE encryption algorithm AES_CBC[_0] 303s | parsing 'aes;' for IKE 303s | proposal: 'aes;' 303s | token: '' '' "aes" ';' 303s | token: '' "aes" ';' "" '' 303s | token: ';' "" '' '' 303s | appending IKE encryption algorithm AES_CBC[_0] 303s | parsing dh: 303s | ... failed 'IKE DH algorithm is empty' 303s | parsing '-aes' for IKE 303s | proposal: '-aes' 303s | token: '' '' "" '-' 303s | token: '' "" '-' "aes" '' 303s | parsing '+aes' for IKE 303s | proposal: '+aes' 303s | token: '' '' "" '+' 303s | token: '' "" '+' "aes" '' 303s | parsing ';aes' for IKE 303s | proposal: ';aes' 303s | token: '' '' "" ';' 303s | token: '' "" ';' "aes" '' 303s | parsing 'aes+-' for IKE 303s | proposal: 'aes+-' 303s | token: '' '' "aes" '+' 303s | token: '' "aes" '+' "" '-' 303s | token: '+' "" '-' "" '' 303s | appending IKE encryption algorithm AES_CBC[_0] 303s | parsing 'aes+;' for IKE 303s | proposal: 'aes+;' 303s | token: '' '' "aes" '+' 303s | token: '' "aes" '+' "" ';' 303s | token: '+' "" ';' "" '' 303s | appending IKE encryption algorithm AES_CBC[_0] 303s | parsing 'aes++' for IKE 303s | proposal: 'aes++' 303s | token: '' '' "aes" '+' 303s | token: '' "aes" '+' "" '+' 303s | token: '+' "" '+' "" '' 303s | appending IKE encryption algorithm AES_CBC[_0] 303s ipsec algparse: leak detective found no leaks 303s ipsec algparse: Encryption algorithms: 303s ipsec algparse: AES_CCM_16 {256,192,*128} IKEv1: ESP IKEv2: ESP FIPS aes_ccm, aes_ccm_c 303s ipsec algparse: AES_CCM_12 {256,192,*128} IKEv1: ESP IKEv2: ESP FIPS aes_ccm_b 303s ipsec algparse: AES_CCM_8 {256,192,*128} IKEv1: ESP IKEv2: ESP FIPS aes_ccm_a 303s ipsec algparse: 3DES_CBC [*192] IKEv1: IKE ESP IKEv2: IKE ESP FIPS NSS(CBC) 3des 303s ipsec algparse: CAMELLIA_CTR {256,192,*128} IKEv1: ESP IKEv2: ESP 303s ipsec algparse: CAMELLIA_CBC {256,192,*128} IKEv1: IKE ESP IKEv2: IKE ESP NSS(CBC) camellia 303s ipsec algparse: AES_GCM_16 {256,192,*128} IKEv1: ESP IKEv2: IKE ESP FIPS NSS(AEAD) aes_gcm, aes_gcm_c 303s ipsec algparse: AES_GCM_12 {256,192,*128} IKEv1: ESP IKEv2: IKE ESP FIPS NSS(AEAD) aes_gcm_b 303s ipsec algparse: AES_GCM_8 {256,192,*128} IKEv1: ESP IKEv2: IKE ESP FIPS NSS(AEAD) aes_gcm_a 303s ipsec algparse: AES_CTR {256,192,*128} IKEv1: IKE ESP IKEv2: IKE ESP FIPS NSS(CTR) aesctr 303s ipsec algparse: AES_CBC {256,192,*128} IKEv1: IKE ESP IKEv2: IKE ESP FIPS NSS(CBC) aes 303s ipsec algparse: NULL_AUTH_AES_GMAC {256,192,*128} IKEv1: ESP IKEv2: ESP FIPS aes_gmac 303s ipsec algparse: NULL [] IKEv1: ESP IKEv2: ESP NULL 303s ipsec algparse: CHACHA20_POLY1305 [*256] IKEv1: IKEv2: IKE ESP NSS(AEAD) chacha20poly1305 303s ipsec algparse: Hash algorithms: 303s ipsec algparse: MD5 IKEv1: IKE IKEv2: NSS 303s ipsec algparse: SHA1 IKEv1: IKE IKEv2: IKE FIPS NSS sha 303s ipsec algparse: SHA2_256 IKEv1: IKE IKEv2: IKE FIPS NSS sha2, sha256 303s ipsec algparse: SHA2_384 IKEv1: IKE IKEv2: IKE FIPS NSS sha384 303s ipsec algparse: SHA2_512 IKEv1: IKE IKEv2: IKE FIPS NSS sha512 303s ipsec algparse: IDENTITY IKEv1: IKEv2: FIPS 303s ipsec algparse: PRF algorithms: 303s ipsec algparse: HMAC_MD5 IKEv1: IKE IKEv2: IKE NSS md5 303s ipsec algparse: HMAC_SHA1 IKEv1: IKE IKEv2: IKE FIPS NSS sha, sha1 303s ipsec algparse: HMAC_SHA2_256 IKEv1: IKE IKEv2: IKE FIPS NSS sha2, sha256, sha2_256 303s ipsec algparse: HMAC_SHA2_384 IKEv1: IKE IKEv2: IKE FIPS NSS sha384, sha2_384 303s ipsec algparse: HMAC_SHA2_512 IKEv1: IKE IKEv2: IKE FIPS NSS sha512, sha2_512 303s ipsec algparse: AES_XCBC IKEv1: IKEv2: IKE native(XCBC) aes128_xcbc 303s ipsec algparse: Integrity algorithms: 303s ipsec algparse: HMAC_MD5_96 IKEv1: IKE ESP AH IKEv2: IKE ESP AH NSS md5, hmac_md5 303s ipsec algparse: HMAC_SHA1_96 IKEv1: IKE ESP AH IKEv2: IKE ESP AH FIPS NSS sha, sha1, sha1_96, hmac_sha1 303s ipsec algparse: HMAC_SHA2_512_256 IKEv1: IKE ESP AH IKEv2: IKE ESP AH FIPS NSS sha512, sha2_512, sha2_512_256, hmac_sha2_512 303s ipsec algparse: HMAC_SHA2_384_192 IKEv1: IKE ESP AH IKEv2: IKE ESP AH FIPS NSS sha384, sha2_384, sha2_384_192, hmac_sha2_384 303s ipsec algparse: HMAC_SHA2_256_128 IKEv1: IKE ESP AH IKEv2: IKE ESP AH FIPS NSS sha2, sha256, sha2_256, sha2_256_128, hmac_sha2_256 303s ipsec algparse: HMAC_SHA2_256_TRUNCBUG IKEv1: ESP AH IKEv2: AH 303s ipsec algparse: AES_XCBC_96 IKEv1: ESP AH IKEv2: IKE ESP AH native(XCBC) aes_xcbc, aes128_xcbc, aes128_xcbc_96 303s ipsec algparse: AES_CMAC_96 IKEv1: ESP AH IKEv2: ESP AH FIPS aes_cmac 303s ipsec algparse: NONE IKEv1: ESP IKEv2: IKE ESP FIPS null 303s ipsec algparse: DH algorithms: 303s ipsec algparse: NONE IKEv1: IKEv2: IKE ESP AH FIPS NSS(MODP) null, dh0 303s ipsec algparse: MODP1536 IKEv1: IKE ESP AH IKEv2: IKE ESP AH NSS(MODP) dh5 303s ipsec algparse: MODP2048 IKEv1: IKE ESP AH IKEv2: IKE ESP AH FIPS NSS(MODP) dh14 303s ipsec algparse: MODP3072 IKEv1: IKE ESP AH IKEv2: IKE ESP AH FIPS NSS(MODP) dh15 303s ipsec algparse: MODP4096 IKEv1: IKE ESP AH IKEv2: IKE ESP AH FIPS NSS(MODP) dh16 303s ipsec algparse: MODP6144 IKEv1: IKE ESP AH IKEv2: IKE ESP AH FIPS NSS(MODP) dh17 303s ipsec algparse: MODP8192 IKEv1: IKE ESP AH IKEv2: IKE ESP AH FIPS NSS(MODP) dh18 303s ipsec algparse: DH19 IKEv1: IKE IKEv2: IKE ESP AH FIPS NSS(ECP) ecp_256, ecp256 303s ipsec algparse: DH20 IKEv1: IKE IKEv2: IKE ESP AH FIPS NSS(ECP) ecp_384, ecp384 303s ipsec algparse: DH21 IKEv1: IKE IKEv2: IKE ESP AH FIPS NSS(ECP) ecp_521, ecp521 303s ipsec algparse: DH31 IKEv1: IKE IKEv2: IKE ESP AH NSS(ECP) curve25519 303s ipsec algparse: IPCOMP algorithms: 303s ipsec algparse: DEFLATE IKEv1: ESP AH IKEv2: ESP AH FIPS 303s ipsec algparse: LZS IKEv1: IKEv2: ESP AH FIPS 303s ipsec algparse: LZJH IKEv1: IKEv2: ESP AH FIPS 303s ipsec algparse: testing CAMELLIA_CBC: 303s ipsec algparse: Camellia: 16 bytes with 128-bit key 303s | decode_to_chunk() raw_key: input "0x00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00" 303s | decode_to_chunk() output: 303s | 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................ 303s | CONCATENATE_DATA_AND_BASE: 303s | target: EXTRACT_KEY_FROM_KEY 303s | base: base-key@0xc1dc749d4bc0 (16-bytes, AES_KEY_GEN) 303s | params: 16-bytes@0xffffe203ceb0 303s | key-offset: 0, key-size: 16 303s | EXTRACT_KEY_FROM_KEY: 303s | target: CAMELLIA_CBC 303s | flags: ENCRYPT+DECRYPT 303s | key_size: 16-bytes 303s | base: base-key@0xc1dc749d7c00 (32-bytes, EXTRACT_KEY_FROM_KEY) 303s | operation: FLAGS_ONLY 303s | params: 8-bytes@0xffffe203ceb8 303s | decode_to_mac() IV: : input "0x00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00" 303s | decode_to_mac() output: 303s | 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................ 303s | decode_to_chunk() new IV: : input "0x07 92 3A 39 EB 0A 81 7D 1C 4D 87 BD B8 2D 1F 1C" 303s | decode_to_chunk() output: 303s | 07 92 3a 39 eb 0a 81 7d 1c 4d 87 bd b8 2d 1f 1c ..:9...}.M...-.. 303s | decode_to_chunk() plaintext: : input "0x80 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00" 303s | decode_to_chunk() output: 303s | 80 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................ 303s | decode_to_chunk() ciphertext: : input "0x07 92 3A 39 EB 0A 81 7D 1C 4D 87 BD B8 2D 1F 1C" 303s | decode_to_chunk() output: 303s | 07 92 3a 39 eb 0a 81 7d 1c 4d 87 bd b8 2d 1f 1c ..:9...}.M...-.. 303s | NSS ike_alg_nss_cbc: CAMELLIA_CBC - enter (nil) 303s | using IKEv1 IV 303s | NSS ike_alg_nss_cbc: CAMELLIA_CBC - exit 303s | verify_bytes() Camellia: 16 bytes with 128-bit key: encrypt: ok 303s | verify_bytes() Camellia: 16 bytes with 128-bit key: updated CBC IV: ok 303s | decode_to_mac() IV: : input "0x00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00" 303s | decode_to_mac() output: 303s | 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................ 303s | decode_to_chunk() new IV: : input "0x07 92 3A 39 EB 0A 81 7D 1C 4D 87 BD B8 2D 1F 1C" 303s | decode_to_chunk() output: 303s | 07 92 3a 39 eb 0a 81 7d 1c 4d 87 bd b8 2d 1f 1c ..:9...}.M...-.. 303s | decode_to_chunk() ciphertext: : input "0x07 92 3A 39 EB 0A 81 7D 1C 4D 87 BD B8 2D 1F 1C" 303s | decode_to_chunk() output: 303s | 07 92 3a 39 eb 0a 81 7d 1c 4d 87 bd b8 2d 1f 1c ..:9...}.M...-.. 303s | decode_to_chunk() plaintext: : input "0x80 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00" 303s | decode_to_chunk() output: 303s | 80 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................ 303s | NSS ike_alg_nss_cbc: CAMELLIA_CBC - enter (nil) 303s | using IKEv1 IV 303s | NSS ike_alg_nss_cbc: CAMELLIA_CBC - exit 303s | verify_bytes() Camellia: 16 bytes with 128-bit key: decrypt: ok 303s | verify_bytes() Camellia: 16 bytes with 128-bit key: updated CBC IV: ok 303s ipsec algparse: Camellia: 16 bytes with 128-bit key 303s | decode_to_chunk() raw_key: input "0x00 11 22 33 44 55 66 77 88 99 AA BB CC DD EE FF" 303s | decode_to_chunk() output: 303s | 00 11 22 33 44 55 66 77 88 99 aa bb cc dd ee ff .."3DUfw........ 303s | CONCATENATE_DATA_AND_BASE: 303s | target: EXTRACT_KEY_FROM_KEY 303s | base: base-key@0xc1dc749d4bc0 (16-bytes, AES_KEY_GEN) 303s | params: 16-bytes@0xffffe203ceb0 303s | key-offset: 0, key-size: 16 303s | EXTRACT_KEY_FROM_KEY: 303s | target: CAMELLIA_CBC 303s | flags: ENCRYPT+DECRYPT 303s | key_size: 16-bytes 303s | base: base-key@0xc1dc749d7c00 (32-bytes, EXTRACT_KEY_FROM_KEY) 303s | operation: FLAGS_ONLY 303s | params: 8-bytes@0xffffe203ceb8 303s | decode_to_mac() IV: : input "0x00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00" 303s | decode_to_mac() output: 303s | 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................ 303s | decode_to_chunk() new IV: : input "0x14 4D 2B 0F 50 0C 27 B7 EC 2C D1 2D 91 59 6F 37" 303s | decode_to_chunk() output: 303s | 14 4d 2b 0f 50 0c 27 b7 ec 2c d1 2d 91 59 6f 37 .M+.P.'..,.-.Yo7 303s | decode_to_chunk() plaintext: : input "0x00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 01 " 303s | decode_to_chunk() output: 303s | 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 01 ................ 303s | decode_to_chunk() ciphertext: : input "0x14 4D 2B 0F 50 0C 27 B7 EC 2C D1 2D 91 59 6F 37" 303s | decode_to_chunk() output: 303s | 14 4d 2b 0f 50 0c 27 b7 ec 2c d1 2d 91 59 6f 37 .M+.P.'..,.-.Yo7 303s | NSS ike_alg_nss_cbc: CAMELLIA_CBC - enter (nil) 303s | using IKEv1 IV 303s | NSS ike_alg_nss_cbc: CAMELLIA_CBC - exit 303s | verify_bytes() Camellia: 16 bytes with 128-bit key: encrypt: ok 303s | verify_bytes() Camellia: 16 bytes with 128-bit key: updated CBC IV: ok 303s | decode_to_mac() IV: : input "0x00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00" 303s | decode_to_mac() output: 303s | 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................ 303s | decode_to_chunk() new IV: : input "0x14 4D 2B 0F 50 0C 27 B7 EC 2C D1 2D 91 59 6F 37" 303s | decode_to_chunk() output: 303s | 14 4d 2b 0f 50 0c 27 b7 ec 2c d1 2d 91 59 6f 37 .M+.P.'..,.-.Yo7 303s | decode_to_chunk() ciphertext: : input "0x14 4D 2B 0F 50 0C 27 B7 EC 2C D1 2D 91 59 6F 37" 303s | decode_to_chunk() output: 303s | 14 4d 2b 0f 50 0c 27 b7 ec 2c d1 2d 91 59 6f 37 .M+.P.'..,.-.Yo7 303s | decode_to_chunk() plaintext: : input "0x00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 01 " 303s | decode_to_chunk() output: 303s | 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 01 ................ 303s | NSS ike_alg_nss_cbc: CAMELLIA_CBC - enter (nil) 303s | using IKEv1 IV 303s | NSS ike_alg_nss_cbc: CAMELLIA_CBC - exit 303s | verify_bytes() Camellia: 16 bytes with 128-bit key: decrypt: ok 303s | verify_bytes() Camellia: 16 bytes with 128-bit key: updated CBC IV: ok 303s ipsec algparse: Camellia: 16 bytes with 256-bit key 303s | decode_to_chunk() raw_key: input "0x00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00" 303s | decode_to_chunk() output: 303s | 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................ 303s | 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................ 303s | CONCATENATE_DATA_AND_BASE: 303s | target: EXTRACT_KEY_FROM_KEY 303s | base: base-key@0xc1dc749d4bc0 (16-bytes, AES_KEY_GEN) 303s | params: 16-bytes@0xffffe203ceb0 303s | key-offset: 0, key-size: 32 303s | EXTRACT_KEY_FROM_KEY: 303s | target: CAMELLIA_CBC 303s | flags: ENCRYPT+DECRYPT 303s | key_size: 32-bytes 303s | base: base-key@0xc1dc749d7c00 (48-bytes, EXTRACT_KEY_FROM_KEY) 303s | operation: FLAGS_ONLY 303s | params: 8-bytes@0xffffe203ceb8 303s | decode_to_mac() IV: : input "0x00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00" 303s | decode_to_mac() output: 303s | 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................ 303s | decode_to_chunk() new IV: : input "0xB0 C6 B8 8A EA 51 8A B0 9E 84 72 48 E9 1B 1B 9D" 303s | decode_to_chunk() output: 303s | b0 c6 b8 8a ea 51 8a b0 9e 84 72 48 e9 1b 1b 9d .....Q....rH.... 303s | decode_to_chunk() plaintext: : input "0x80 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00" 303s | decode_to_chunk() output: 303s | 80 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................ 303s | decode_to_chunk() ciphertext: : input "0xB0 C6 B8 8A EA 51 8A B0 9E 84 72 48 E9 1B 1B 9D" 303s | decode_to_chunk() output: 303s | b0 c6 b8 8a ea 51 8a b0 9e 84 72 48 e9 1b 1b 9d .....Q....rH.... 303s | NSS ike_alg_nss_cbc: CAMELLIA_CBC - enter (nil) 303s | using IKEv1 IV 303s | NSS ike_alg_nss_cbc: CAMELLIA_CBC - exit 303s | verify_bytes() Camellia: 16 bytes with 256-bit key: encrypt: ok 303s | verify_bytes() Camellia: 16 bytes with 256-bit key: updated CBC IV: ok 303s | decode_to_mac() IV: : input "0x00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00" 303s | decode_to_mac() output: 303s | 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................ 303s | decode_to_chunk() new IV: : input "0xB0 C6 B8 8A EA 51 8A B0 9E 84 72 48 E9 1B 1B 9D" 303s | decode_to_chunk() output: 303s | b0 c6 b8 8a ea 51 8a b0 9e 84 72 48 e9 1b 1b 9d .....Q....rH.... 303s | decode_to_chunk() ciphertext: : input "0xB0 C6 B8 8A EA 51 8A B0 9E 84 72 48 E9 1B 1B 9D" 303s | decode_to_chunk() output: 303s | b0 c6 b8 8a ea 51 8a b0 9e 84 72 48 e9 1b 1b 9d .....Q....rH.... 303s | decode_to_chunk() plaintext: : input "0x80 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00" 303s | decode_to_chunk() output: 303s | 80 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................ 303s | NSS ike_alg_nss_cbc: CAMELLIA_CBC - enter (nil) 303s | using IKEv1 IV 303s | NSS ike_alg_nss_cbc: CAMELLIA_CBC - exit 303s | verify_bytes() Camellia: 16 bytes with 256-bit key: decrypt: ok 303s | verify_bytes() Camellia: 16 bytes with 256-bit key: updated CBC IV: ok 303s ipsec algparse: Camellia: 16 bytes with 256-bit key 303s | decode_to_chunk() raw_key: input "0x00 11 22 33 44 55 66 77 88 99 AA BB CC DD EE FF FF EE DD CC BB AA 99 88 77 66 55 44 33 22 11 00" 303s | decode_to_chunk() output: 303s | 00 11 22 33 44 55 66 77 88 99 aa bb cc dd ee ff .."3DUfw........ 303s | ff ee dd cc bb aa 99 88 77 66 55 44 33 22 11 00 ........wfUD3".. 303s | CONCATENATE_DATA_AND_BASE: 303s | target: EXTRACT_KEY_FROM_KEY 303s | base: base-key@0xc1dc749d4bc0 (16-bytes, AES_KEY_GEN) 303s | params: 16-bytes@0xffffe203ceb0 303s | key-offset: 0, key-size: 32 303s | EXTRACT_KEY_FROM_KEY: 303s | target: CAMELLIA_CBC 303s | flags: ENCRYPT+DECRYPT 303s | key_size: 32-bytes 303s | base: base-key@0xc1dc749d7c00 (48-bytes, EXTRACT_KEY_FROM_KEY) 303s | operation: FLAGS_ONLY 303s | params: 8-bytes@0xffffe203ceb8 303s | decode_to_mac() IV: : input "0x00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00" 303s | decode_to_mac() output: 303s | 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................ 303s | decode_to_chunk() new IV: : input "0xCC 39 FF EE 18 56 D3 EB 61 02 5E 93 21 9B 65 23 " 303s | decode_to_chunk() output: 303s | cc 39 ff ee 18 56 d3 eb 61 02 5e 93 21 9b 65 23 .9...V..a.^.!.e# 303s | decode_to_chunk() plaintext: : input "0x00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 01" 303s | decode_to_chunk() output: 303s | 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 01 ................ 303s | decode_to_chunk() ciphertext: : input "0xCC 39 FF EE 18 56 D3 EB 61 02 5E 93 21 9B 65 23 " 303s | decode_to_chunk() output: 303s | cc 39 ff ee 18 56 d3 eb 61 02 5e 93 21 9b 65 23 .9...V..a.^.!.e# 303s | NSS ike_alg_nss_cbc: CAMELLIA_CBC - enter (nil) 303s | using IKEv1 IV 303s | NSS ike_alg_nss_cbc: CAMELLIA_CBC - exit 303s | verify_bytes() Camellia: 16 bytes with 256-bit key: encrypt: ok 303s | verify_bytes() Camellia: 16 bytes with 256-bit key: updated CBC IV: ok 303s | decode_to_mac() IV: : input "0x00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00" 303s | decode_to_mac() output: 303s | 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................ 303s | decode_to_chunk() new IV: : input "0xCC 39 FF EE 18 56 D3 EB 61 02 5E 93 21 9B 65 23 " 303s | decode_to_chunk() output: 303s | cc 39 ff ee 18 56 d3 eb 61 02 5e 93 21 9b 65 23 .9...V..a.^.!.e# 303s | decode_to_chunk() ciphertext: : input "0xCC 39 FF EE 18 56 D3 EB 61 02 5E 93 21 9B 65 23 " 303s | decode_to_chunk() output: 303s | cc 39 ff ee 18 56 d3 eb 61 02 5e 93 21 9b 65 23 .9...V..a.^.!.e# 303s | decode_to_chunk() plaintext: : input "0x00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 01" 303s | decode_to_chunk() output: 303s | 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 01 ................ 303s | NSS ike_alg_nss_cbc: CAMELLIA_CBC - enter (nil) 303s | using IKEv1 IV 303s | NSS ike_alg_nss_cbc: CAMELLIA_CBC - exit 303s | verify_bytes() Camellia: 16 bytes with 256-bit key: decrypt: ok 303s | verify_bytes() Camellia: 16 bytes with 256-bit key: updated CBC IV: ok 303s ipsec algparse: testing AES_GCM_16: 303s ipsec algparse: empty string 303s | decode_to_chunk() raw_key: input "0xcf063a34d4a9a76c2c86787d3f96db71" 303s | decode_to_chunk() output: 303s | cf 06 3a 34 d4 a9 a7 6c 2c 86 78 7d 3f 96 db 71 ..:4...l,.x}?..q 303s | CONCATENATE_DATA_AND_BASE: 303s | target: EXTRACT_KEY_FROM_KEY 303s | base: base-key@0xc1dc749d4bc0 (16-bytes, AES_KEY_GEN) 303s | params: 16-bytes@0xffffe203ce30 303s | key-offset: 0, key-size: 16 303s | EXTRACT_KEY_FROM_KEY: 303s | target: AES_GCM 303s | flags: ENCRYPT+DECRYPT 303s | key_size: 16-bytes 303s | base: base-key@0xc1dc749d7c00 (32-bytes, EXTRACT_KEY_FROM_KEY) 303s | operation: FLAGS_ONLY 303s | params: 8-bytes@0xffffe203ce38 303s | decode_to_chunk() salted IV: input "0x113b9785971864c83b01c787" 303s | decode_to_chunk() output: 303s | 11 3b 97 85 97 18 64 c8 3b 01 c7 87 .;....d.;... 303s | decode_to_chunk() AAD: input "" 303s | decode_to_chunk() output: 303s | 303s | decode_to_chunk() plaintext: input "" 303s | decode_to_chunk() output: 303s | 303s | decode_to_chunk() ciphertext: input "" 303s | decode_to_chunk() output: 303s | 303s | decode_to_chunk() tag: input "0x72ac8493e3a5228b5d130a69d2510e42" 303s | decode_to_chunk() output: 303s | 72 ac 84 93 e3 a5 22 8b 5d 13 0a 69 d2 51 0e 42 r.....".]..i.Q.B 303s | test_gcm_vector() DECRYPT: aad-size=0 salt-size=4 wire-IV-size=8 text-size=0 tag-size=16 text+tag in: 303s | 72 ac 84 93 e3 a5 22 8b 5d 13 0a 69 d2 51 0e 42 r.....".]..i.Q.B 303s | verify_bytes() empty string: output ciphertext: ok 303s | verify_bytes() empty string: TAG: ok 303s | test_gcm_vector() text+tag out: 303s | 72 ac 84 93 e3 a5 22 8b 5d 13 0a 69 d2 51 0e 42 r.....".]..i.Q.B 303s | test_gcm_vector() ENCRYPT: aad-size=0 salt-size=4 wire-IV-size=8 text-size=0 tag-size=16 text+tag in: 303s | 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................ 303s | verify_bytes() empty string: output ciphertext: ok 303s | verify_bytes() empty string: TAG: ok 303s | test_gcm_vector() text+tag out: 303s | 72 ac 84 93 e3 a5 22 8b 5d 13 0a 69 d2 51 0e 42 r.....".]..i.Q.B 303s ipsec algparse: one block 303s | decode_to_chunk() raw_key: input "0xe98b72a9881a84ca6b76e0f43e68647a" 303s | decode_to_chunk() output: 303s | e9 8b 72 a9 88 1a 84 ca 6b 76 e0 f4 3e 68 64 7a ..r.....kv..>hdz 303s | CONCATENATE_DATA_AND_BASE: 303s | target: EXTRACT_KEY_FROM_KEY 303s | base: base-key@0xc1dc749d4bc0 (16-bytes, AES_KEY_GEN) 303s | params: 16-bytes@0xffffe203ce30 303s | key-offset: 0, key-size: 16 303s | EXTRACT_KEY_FROM_KEY: 303s | target: AES_GCM 303s | flags: ENCRYPT+DECRYPT 303s | key_size: 16-bytes 303s | base: base-key@0xc1dc749d7c00 (32-bytes, EXTRACT_KEY_FROM_KEY) 303s | operation: FLAGS_ONLY 303s | params: 8-bytes@0xffffe203ce38 303s | decode_to_chunk() salted IV: input "0x8b23299fde174053f3d652ba" 303s | decode_to_chunk() output: 303s | 8b 23 29 9f de 17 40 53 f3 d6 52 ba .#)...@S..R. 303s | decode_to_chunk() AAD: input "" 303s | decode_to_chunk() output: 303s | 303s | decode_to_chunk() plaintext: input "0x28286a321293253c3e0aa2704a278032" 303s | decode_to_chunk() output: 303s | 28 28 6a 32 12 93 25 3c 3e 0a a2 70 4a 27 80 32 ((j2..%<>..pJ'.2 303s | decode_to_chunk() ciphertext: input "0x5a3c1cf1985dbb8bed818036fdd5ab42" 303s | decode_to_chunk() output: 303s | 5a 3c 1c f1 98 5d bb 8b ed 81 80 36 fd d5 ab 42 Z<...].....6...B 303s | decode_to_chunk() tag: input "0x23c7ab0f952b7091cd324835043b5eb5" 303s | decode_to_chunk() output: 303s | 23 c7 ab 0f 95 2b 70 91 cd 32 48 35 04 3b 5e b5 #....+p..2H5.;^. 303s | test_gcm_vector() DECRYPT: aad-size=0 salt-size=4 wire-IV-size=8 text-size=16 tag-size=16 text+tag in: 303s | 5a 3c 1c f1 98 5d bb 8b ed 81 80 36 fd d5 ab 42 Z<...].....6...B 303s | 23 c7 ab 0f 95 2b 70 91 cd 32 48 35 04 3b 5e b5 #....+p..2H5.;^. 303s | verify_bytes() one block: output ciphertext: ok 303s | verify_bytes() one block: TAG: ok 303s | test_gcm_vector() text+tag out: 303s | 28 28 6a 32 12 93 25 3c 3e 0a a2 70 4a 27 80 32 ((j2..%<>..pJ'.2 303s | 23 c7 ab 0f 95 2b 70 91 cd 32 48 35 04 3b 5e b5 #....+p..2H5.;^. 303s | test_gcm_vector() ENCRYPT: aad-size=0 salt-size=4 wire-IV-size=8 text-size=16 tag-size=16 text+tag in: 303s | 28 28 6a 32 12 93 25 3c 3e 0a a2 70 4a 27 80 32 ((j2..%<>..pJ'.2 303s | 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................ 303s | verify_bytes() one block: output ciphertext: ok 303s | verify_bytes() one block: TAG: ok 303s | test_gcm_vector() text+tag out: 303s | 5a 3c 1c f1 98 5d bb 8b ed 81 80 36 fd d5 ab 42 Z<...].....6...B 303s | 23 c7 ab 0f 95 2b 70 91 cd 32 48 35 04 3b 5e b5 #....+p..2H5.;^. 303s ipsec algparse: two blocks 303s | decode_to_chunk() raw_key: input "0xbfd414a6212958a607a0f5d3ab48471d" 303s | decode_to_chunk() output: 303s | bf d4 14 a6 21 29 58 a6 07 a0 f5 d3 ab 48 47 1d ....!)X......HG. 303s | CONCATENATE_DATA_AND_BASE: 303s | target: EXTRACT_KEY_FROM_KEY 303s | base: base-key@0xc1dc749d4bc0 (16-bytes, AES_KEY_GEN) 303s | params: 16-bytes@0xffffe203ce30 303s | key-offset: 0, key-size: 16 303s | EXTRACT_KEY_FROM_KEY: 303s | target: AES_GCM 303s | flags: ENCRYPT+DECRYPT 303s | key_size: 16-bytes 303s | base: base-key@0xc1dc749d7c00 (32-bytes, EXTRACT_KEY_FROM_KEY) 303s | operation: FLAGS_ONLY 303s | params: 8-bytes@0xffffe203ce38 303s | decode_to_chunk() salted IV: input "0x86d8ea0ab8e40dcc481cd0e2" 303s | decode_to_chunk() output: 303s | 86 d8 ea 0a b8 e4 0d cc 48 1c d0 e2 ........H... 303s | decode_to_chunk() AAD: input "" 303s | decode_to_chunk() output: 303s | 303s | decode_to_chunk() plaintext: input "0xa6b76a066e63392c9443e60272ceaeb9d25c991b0f2e55e2804e168c05ea591a" 303s | decode_to_chunk() output: 303s | a6 b7 6a 06 6e 63 39 2c 94 43 e6 02 72 ce ae b9 ..j.nc9,.C..r... 303s | d2 5c 99 1b 0f 2e 55 e2 80 4e 16 8c 05 ea 59 1a .\....U..N....Y. 303s | decode_to_chunk() ciphertext: input "0x62171db33193292d930bf6647347652c1ef33316d7feca99d54f1db4fcf513f8" 303s | decode_to_chunk() output: 303s | 62 17 1d b3 31 93 29 2d 93 0b f6 64 73 47 65 2c b...1.)-...dsGe, 303s | 1e f3 33 16 d7 fe ca 99 d5 4f 1d b4 fc f5 13 f8 ..3......O...... 303s | decode_to_chunk() tag: input "0xc28280aa5c6c7a8bd366f28c1cfd1f6e" 303s | decode_to_chunk() output: 303s | c2 82 80 aa 5c 6c 7a 8b d3 66 f2 8c 1c fd 1f 6e ....\lz..f.....n 303s | test_gcm_vector() DECRYPT: aad-size=0 salt-size=4 wire-IV-size=8 text-size=32 tag-size=16 text+tag in: 303s | 62 17 1d b3 31 93 29 2d 93 0b f6 64 73 47 65 2c b...1.)-...dsGe, 303s | 1e f3 33 16 d7 fe ca 99 d5 4f 1d b4 fc f5 13 f8 ..3......O...... 303s | c2 82 80 aa 5c 6c 7a 8b d3 66 f2 8c 1c fd 1f 6e ....\lz..f.....n 303s | verify_bytes() two blocks: output ciphertext: ok 303s | verify_bytes() two blocks: TAG: ok 303s | test_gcm_vector() text+tag out: 303s | a6 b7 6a 06 6e 63 39 2c 94 43 e6 02 72 ce ae b9 ..j.nc9,.C..r... 303s | d2 5c 99 1b 0f 2e 55 e2 80 4e 16 8c 05 ea 59 1a .\....U..N....Y. 303s | c2 82 80 aa 5c 6c 7a 8b d3 66 f2 8c 1c fd 1f 6e ....\lz..f.....n 303s | test_gcm_vector() ENCRYPT: aad-size=0 salt-size=4 wire-IV-size=8 text-size=32 tag-size=16 text+tag in: 303s | a6 b7 6a 06 6e 63 39 2c 94 43 e6 02 72 ce ae b9 ..j.nc9,.C..r... 303s | d2 5c 99 1b 0f 2e 55 e2 80 4e 16 8c 05 ea 59 1a .\....U..N....Y. 303s | 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................ 303s | verify_bytes() two blocks: output ciphertext: ok 303s | verify_bytes() two blocks: TAG: ok 303s | test_gcm_vector() text+tag out: 303s | 62 17 1d b3 31 93 29 2d 93 0b f6 64 73 47 65 2c b...1.)-...dsGe, 303s | 1e f3 33 16 d7 fe ca 99 d5 4f 1d b4 fc f5 13 f8 ..3......O...... 303s | c2 82 80 aa 5c 6c 7a 8b d3 66 f2 8c 1c fd 1f 6e ....\lz..f.....n 303s ipsec algparse: two blocks with associated data 303s | decode_to_chunk() raw_key: input "0x95bcde70c094f04e3dd8259cafd88ce8" 303s | decode_to_chunk() output: 303s | 95 bc de 70 c0 94 f0 4e 3d d8 25 9c af d8 8c e8 ...p...N=.%..... 303s | CONCATENATE_DATA_AND_BASE: 303s | target: EXTRACT_KEY_FROM_KEY 303s | base: base-key@0xc1dc749d4bc0 (16-bytes, AES_KEY_GEN) 303s | params: 16-bytes@0xffffe203ce30 303s | key-offset: 0, key-size: 16 303s | EXTRACT_KEY_FROM_KEY: 303s | target: AES_GCM 303s | flags: ENCRYPT+DECRYPT 303s | key_size: 16-bytes 303s | base: base-key@0xc1dc749d7c00 (32-bytes, EXTRACT_KEY_FROM_KEY) 303s | operation: FLAGS_ONLY 303s | params: 8-bytes@0xffffe203ce38 303s | decode_to_chunk() salted IV: input "0x12cf097ad22380432ff40a5c" 303s | decode_to_chunk() output: 303s | 12 cf 09 7a d2 23 80 43 2f f4 0a 5c ...z.#.C/..\ 303s | decode_to_chunk() AAD: input "0xc783a0cca10a8d9fb8d27d69659463f2" 303s | decode_to_chunk() output: 303s | c7 83 a0 cc a1 0a 8d 9f b8 d2 7d 69 65 94 63 f2 ..........}ie.c. 303s | decode_to_chunk() plaintext: input "0x32f51e837a9748838925066d69e87180f34a6437e6b396e5643b34cb2ee4f7b1" 303s | decode_to_chunk() output: 303s | 32 f5 1e 83 7a 97 48 83 89 25 06 6d 69 e8 71 80 2...z.H..%.mi.q. 303s | f3 4a 64 37 e6 b3 96 e5 64 3b 34 cb 2e e4 f7 b1 .Jd7....d;4..... 303s | decode_to_chunk() ciphertext: input "0x8a023ba477f5b809bddcda8f55e09064d6d88aaec99c1e141212ea5b08503660" 303s | decode_to_chunk() output: 303s | 8a 02 3b a4 77 f5 b8 09 bd dc da 8f 55 e0 90 64 ..;.w.......U..d 303s | d6 d8 8a ae c9 9c 1e 14 12 12 ea 5b 08 50 36 60 ...........[.P6` 303s | decode_to_chunk() tag: input "0x562f500dae635d60a769b466e15acd1e" 303s | decode_to_chunk() output: 303s | 56 2f 50 0d ae 63 5d 60 a7 69 b4 66 e1 5a cd 1e V/P..c]`.i.f.Z.. 303s | test_gcm_vector() DECRYPT: aad-size=16 salt-size=4 wire-IV-size=8 text-size=32 tag-size=16 text+tag in: 303s | 8a 02 3b a4 77 f5 b8 09 bd dc da 8f 55 e0 90 64 ..;.w.......U..d 303s | d6 d8 8a ae c9 9c 1e 14 12 12 ea 5b 08 50 36 60 ...........[.P6` 303s | 56 2f 50 0d ae 63 5d 60 a7 69 b4 66 e1 5a cd 1e V/P..c]`.i.f.Z.. 303s | verify_bytes() two blocks with associated data: output ciphertext: ok 303s | verify_bytes() two blocks with associated data: TAG: ok 303s | test_gcm_vector() text+tag out: 303s | 32 f5 1e 83 7a 97 48 83 89 25 06 6d 69 e8 71 80 2...z.H..%.mi.q. 303s | f3 4a 64 37 e6 b3 96 e5 64 3b 34 cb 2e e4 f7 b1 .Jd7....d;4..... 303s | 56 2f 50 0d ae 63 5d 60 a7 69 b4 66 e1 5a cd 1e V/P..c]`.i.f.Z.. 303s | test_gcm_vector() ENCRYPT: aad-size=16 salt-size=4 wire-IV-size=8 text-size=32 tag-size=16 text+tag in: 303s | 32 f5 1e 83 7a 97 48 83 89 25 06 6d 69 e8 71 80 2...z.H..%.mi.q. 303s | f3 4a 64 37 e6 b3 96 e5 64 3b 34 cb 2e e4 f7 b1 .Jd7....d;4..... 303s | 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................ 303s | verify_bytes() two blocks with associated data: output ciphertext: ok 303s | verify_bytes() two blocks with associated data: TAG: ok 303s | test_gcm_vector() text+tag out: 303s | 8a 02 3b a4 77 f5 b8 09 bd dc da 8f 55 e0 90 64 ..;.w.......U..d 303s | d6 d8 8a ae c9 9c 1e 14 12 12 ea 5b 08 50 36 60 ...........[.P6` 303s | 56 2f 50 0d ae 63 5d 60 a7 69 b4 66 e1 5a cd 1e V/P..c]`.i.f.Z.. 303s ipsec algparse: testing AES_CTR: 303s ipsec algparse: Encrypting 16 octets using AES-CTR with 128-bit key 303s | decode_to_chunk() raw_key: input "0x AE 68 52 F8 12 10 67 CC 4B F7 A5 76 55 77 F3 9E" 303s | decode_to_chunk() output: 303s | ae 68 52 f8 12 10 67 cc 4b f7 a5 76 55 77 f3 9e .hR...g.K..vUw.. 303s | CONCATENATE_DATA_AND_BASE: 303s | target: EXTRACT_KEY_FROM_KEY 303s | base: base-key@0xc1dc749d4bc0 (16-bytes, AES_KEY_GEN) 303s | params: 16-bytes@0xffffe203cea0 303s | key-offset: 0, key-size: 16 303s | EXTRACT_KEY_FROM_KEY: 303s | target: AES_CTR 303s | flags: ENCRYPT+DECRYPT 303s | key_size: 16-bytes 303s | base: base-key@0xc1dc749d7c00 (32-bytes, EXTRACT_KEY_FROM_KEY) 303s | operation: FLAGS_ONLY 303s | params: 8-bytes@0xffffe203cea8 303s | decode_to_mac() input counter-block: : input "0x 00 00 00 30 00 00 00 00 00 00 00 00 00 00 00 01" 303s | decode_to_mac() output: 303s | 00 00 00 30 00 00 00 00 00 00 00 00 00 00 00 01 ...0............ 303s | decode_to_chunk() Plaintext: input "0x 53 69 6E 67 6C 65 20 62 6C 6F 63 6B 20 6D 73 67" 303s | decode_to_chunk() output: 303s | 53 69 6e 67 6c 65 20 62 6c 6f 63 6b 20 6d 73 67 Single block msg 303s | decode_to_chunk() Ciphertext: input "0x E4 09 5D 4F B7 A7 B3 79 2D 61 75 A3 26 13 11 B8" 303s | decode_to_chunk() output: 303s | e4 09 5d 4f b7 a7 b3 79 2d 61 75 a3 26 13 11 b8 ..]O...y-au.&... 303s | decode_to_chunk() expected counter-block: : input "0x 00 00 00 30 00 00 00 00 00 00 00 00 00 00 00 02" 303s | decode_to_chunk() output: 303s | 00 00 00 30 00 00 00 00 00 00 00 00 00 00 00 02 ...0............ 303s | cipher_op_ctr_nss() enter AES_CTR 0xc1dc749d85d0 use IKEv1 IV wire_iv 0 count 0 303s | ctr_param: count 32 iv 00000030000000000000000000000001 303s | cipher_op_ctr_nss() counter-block updated from 0x1 to 0x2 for 16 bytes 303s | do_aes_ctr: exit 303s | cipher_op_context_destroy_ctr_nss() 303s | verify_bytes() Encrypting 16 octets using AES-CTR with 128-bit key: encrypt: ok 303s | verify_bytes() Encrypting 16 octets using AES-CTR with 128-bit key: counter-block: ok 303s | decode_to_mac() input counter-block: : input "0x 00 00 00 30 00 00 00 00 00 00 00 00 00 00 00 01" 303s | decode_to_mac() output: 303s | 00 00 00 30 00 00 00 00 00 00 00 00 00 00 00 01 ...0............ 303s | decode_to_chunk() Ciphertext: input "0x E4 09 5D 4F B7 A7 B3 79 2D 61 75 A3 26 13 11 B8" 303s | decode_to_chunk() output: 303s | e4 09 5d 4f b7 a7 b3 79 2d 61 75 a3 26 13 11 b8 ..]O...y-au.&... 303s | decode_to_chunk() Plaintext: input "0x 53 69 6E 67 6C 65 20 62 6C 6F 63 6B 20 6D 73 67" 303s | decode_to_chunk() output: 303s | 53 69 6e 67 6c 65 20 62 6c 6f 63 6b 20 6d 73 67 Single block msg 303s | decode_to_chunk() expected counter-block: : input "0x 00 00 00 30 00 00 00 00 00 00 00 00 00 00 00 02" 303s | decode_to_chunk() output: 303s | 00 00 00 30 00 00 00 00 00 00 00 00 00 00 00 02 ...0............ 303s | cipher_op_ctr_nss() enter AES_CTR 0xc1dc749d85d0 use IKEv1 IV wire_iv 0 count 0 303s | ctr_param: count 32 iv 00000030000000000000000000000001 303s | cipher_op_ctr_nss() counter-block updated from 0x1 to 0x2 for 16 bytes 303s | do_aes_ctr: exit 303s | cipher_op_context_destroy_ctr_nss() 303s | verify_bytes() Encrypting 16 octets using AES-CTR with 128-bit key: decrypt: ok 303s | verify_bytes() Encrypting 16 octets using AES-CTR with 128-bit key: counter-block: ok 303s ipsec algparse: Encrypting 32 octets using AES-CTR with 128-bit key 303s | decode_to_chunk() raw_key: input "0x 7E 24 06 78 17 FA E0 D7 43 D6 CE 1F 32 53 91 63" 303s | decode_to_chunk() output: 303s | 7e 24 06 78 17 fa e0 d7 43 d6 ce 1f 32 53 91 63 ~$.x....C...2S.c 303s | CONCATENATE_DATA_AND_BASE: 303s | target: EXTRACT_KEY_FROM_KEY 303s | base: base-key@0xc1dc749d4bc0 (16-bytes, AES_KEY_GEN) 303s | params: 16-bytes@0xffffe203cea0 303s | key-offset: 0, key-size: 16 303s | EXTRACT_KEY_FROM_KEY: 303s | target: AES_CTR 303s | flags: ENCRYPT+DECRYPT 303s | key_size: 16-bytes 303s | base: base-key@0xc1dc749d7c00 (32-bytes, EXTRACT_KEY_FROM_KEY) 303s | operation: FLAGS_ONLY 303s | params: 8-bytes@0xffffe203cea8 303s | decode_to_mac() input counter-block: : input "0x 00 6C B6 DB C0 54 3B 59 DA 48 D9 0B 00 00 00 01" 303s | decode_to_mac() output: 303s | 00 6c b6 db c0 54 3b 59 da 48 d9 0b 00 00 00 01 .l...T;Y.H...... 303s | decode_to_chunk() Plaintext: input "0x00 01 02 03 04 05 06 07 08 09 0A 0B 0C 0D 0E 0F10 11 12 13 14 15 16 17 18 19 1A 1B 1C 1D 1E 1F" 303s | decode_to_chunk() output: 303s | 00 01 02 03 04 05 06 07 08 09 0a 0b 0c 0d 0e 0f ................ 303s | 10 11 12 13 14 15 16 17 18 19 1a 1b 1c 1d 1e 1f ................ 303s | decode_to_chunk() Ciphertext: input "0x51 04 A1 06 16 8A 72 D9 79 0D 41 EE 8E DA D3 88EB 2E 1E FC 46 DA 57 C8 FC E6 30 DF 91 41 BE 28" 303s | decode_to_chunk() output: 303s | 51 04 a1 06 16 8a 72 d9 79 0d 41 ee 8e da d3 88 Q.....r.y.A..... 303s | eb 2e 1e fc 46 da 57 c8 fc e6 30 df 91 41 be 28 ....F.W...0..A.( 303s | decode_to_chunk() expected counter-block: : input "0x 00 6C B6 DB C0 54 3B 59 DA 48 D9 0B 00 00 00 03" 303s | decode_to_chunk() output: 303s | 00 6c b6 db c0 54 3b 59 da 48 d9 0b 00 00 00 03 .l...T;Y.H...... 303s | cipher_op_ctr_nss() enter AES_CTR 0xc1dc749d4a80 use IKEv1 IV wire_iv 0 count 0 303s | ctr_param: count 32 iv 006cb6dbc0543b59da48d90b00000001 303s | cipher_op_ctr_nss() counter-block updated from 0x1 to 0x3 for 32 bytes 303s | do_aes_ctr: exit 303s | cipher_op_context_destroy_ctr_nss() 303s | verify_bytes() Encrypting 32 octets using AES-CTR with 128-bit key: encrypt: ok 303s | verify_bytes() Encrypting 32 octets using AES-CTR with 128-bit key: counter-block: ok 303s | decode_to_mac() input counter-block: : input "0x 00 6C B6 DB C0 54 3B 59 DA 48 D9 0B 00 00 00 01" 303s | decode_to_mac() output: 303s | 00 6c b6 db c0 54 3b 59 da 48 d9 0b 00 00 00 01 .l...T;Y.H...... 303s | decode_to_chunk() Ciphertext: input "0x51 04 A1 06 16 8A 72 D9 79 0D 41 EE 8E DA D3 88EB 2E 1E FC 46 DA 57 C8 FC E6 30 DF 91 41 BE 28" 303s | decode_to_chunk() output: 303s | 51 04 a1 06 16 8a 72 d9 79 0d 41 ee 8e da d3 88 Q.....r.y.A..... 303s | eb 2e 1e fc 46 da 57 c8 fc e6 30 df 91 41 be 28 ....F.W...0..A.( 303s | decode_to_chunk() Plaintext: input "0x00 01 02 03 04 05 06 07 08 09 0A 0B 0C 0D 0E 0F10 11 12 13 14 15 16 17 18 19 1A 1B 1C 1D 1E 1F" 303s | decode_to_chunk() output: 303s | 00 01 02 03 04 05 06 07 08 09 0a 0b 0c 0d 0e 0f ................ 303s | 10 11 12 13 14 15 16 17 18 19 1a 1b 1c 1d 1e 1f ................ 303s | decode_to_chunk() expected counter-block: : input "0x 00 6C B6 DB C0 54 3B 59 DA 48 D9 0B 00 00 00 03" 303s | decode_to_chunk() output: 303s | 00 6c b6 db c0 54 3b 59 da 48 d9 0b 00 00 00 03 .l...T;Y.H...... 303s | cipher_op_ctr_nss() enter AES_CTR 0xc1dc749d4a80 use IKEv1 IV wire_iv 0 count 0 303s | ctr_param: count 32 iv 006cb6dbc0543b59da48d90b00000001 303s | cipher_op_ctr_nss() counter-block updated from 0x1 to 0x3 for 32 bytes 303s | do_aes_ctr: exit 303s | cipher_op_context_destroy_ctr_nss() 303s | verify_bytes() Encrypting 32 octets using AES-CTR with 128-bit key: decrypt: ok 303s | verify_bytes() Encrypting 32 octets using AES-CTR with 128-bit key: counter-block: ok 303s ipsec algparse: Encrypting 36 octets using AES-CTR with 128-bit key 303s | decode_to_chunk() raw_key: input "0x 76 91 BE 03 5E 50 20 A8 AC 6E 61 85 29 F9 A0 DC" 303s | decode_to_chunk() output: 303s | 76 91 be 03 5e 50 20 a8 ac 6e 61 85 29 f9 a0 dc v...^P ..na.)... 303s | CONCATENATE_DATA_AND_BASE: 303s | target: EXTRACT_KEY_FROM_KEY 303s | base: base-key@0xc1dc749d4bc0 (16-bytes, AES_KEY_GEN) 303s | params: 16-bytes@0xffffe203cea0 303s | key-offset: 0, key-size: 16 303s | EXTRACT_KEY_FROM_KEY: 303s | target: AES_CTR 303s | flags: ENCRYPT+DECRYPT 303s | key_size: 16-bytes 303s | base: base-key@0xc1dc749d7c00 (32-bytes, EXTRACT_KEY_FROM_KEY) 303s | operation: FLAGS_ONLY 303s | params: 8-bytes@0xffffe203cea8 303s | decode_to_mac() input counter-block: : input "0x 00 E0 01 7B 27 77 7F 3F 4A 17 86 F0 00 00 00 01" 303s | decode_to_mac() output: 303s | 00 e0 01 7b 27 77 7f 3f 4a 17 86 f0 00 00 00 01 ...{'w.?J....... 303s | decode_to_chunk() Plaintext: input "0x00 01 02 03 04 05 06 07 08 09 0A 0B 0C 0D 0E 0F10 11 12 13 14 15 16 17 18 19 1A 1B 1C 1D 1E 1F20 21 22 23" 303s | decode_to_chunk() output: 303s | 00 01 02 03 04 05 06 07 08 09 0a 0b 0c 0d 0e 0f ................ 303s | 10 11 12 13 14 15 16 17 18 19 1a 1b 1c 1d 1e 1f ................ 303s | 20 21 22 23 !"# 303s | decode_to_chunk() Ciphertext: input "0xC1 CF 48 A8 9F 2F FD D9 CF 46 52 E9 EF DB 72 D745 40 A4 2B DE 6D 78 36 D5 9A 5C EA AE F3 10 5325 B2 07 2F" 303s | decode_to_chunk() output: 303s | c1 cf 48 a8 9f 2f fd d9 cf 46 52 e9 ef db 72 d7 ..H../...FR...r. 303s | 45 40 a4 2b de 6d 78 36 d5 9a 5c ea ae f3 10 53 E@.+.mx6..\....S 303s | 25 b2 07 2f %../ 303s | decode_to_chunk() expected counter-block: : input "0x 00 E0 01 7B 27 77 7F 3F 4A 17 86 F0 00 00 00 04" 303s | decode_to_chunk() output: 303s | 00 e0 01 7b 27 77 7f 3f 4a 17 86 f0 00 00 00 04 ...{'w.?J....... 303s | cipher_op_ctr_nss() enter AES_CTR 0xc1dc749d48c0 use IKEv1 IV wire_iv 0 count 0 303s | ctr_param: count 32 iv 00e0017b27777f3f4a1786f000000001 303s | cipher_op_ctr_nss() counter-block updated from 0x1 to 0x4 for 36 bytes 303s | do_aes_ctr: exit 303s | cipher_op_context_destroy_ctr_nss() 303s | verify_bytes() Encrypting 36 octets using AES-CTR with 128-bit key: encrypt: ok 303s | verify_bytes() Encrypting 36 octets using AES-CTR with 128-bit key: counter-block: ok 303s | decode_to_mac() input counter-block: : input "0x 00 E0 01 7B 27 77 7F 3F 4A 17 86 F0 00 00 00 01" 303s | decode_to_mac() output: 303s | 00 e0 01 7b 27 77 7f 3f 4a 17 86 f0 00 00 00 01 ...{'w.?J....... 303s | decode_to_chunk() Ciphertext: input "0xC1 CF 48 A8 9F 2F FD D9 CF 46 52 E9 EF DB 72 D745 40 A4 2B DE 6D 78 36 D5 9A 5C EA AE F3 10 5325 B2 07 2F" 303s | decode_to_chunk() output: 303s | c1 cf 48 a8 9f 2f fd d9 cf 46 52 e9 ef db 72 d7 ..H../...FR...r. 303s | 45 40 a4 2b de 6d 78 36 d5 9a 5c ea ae f3 10 53 E@.+.mx6..\....S 303s | 25 b2 07 2f %../ 303s | decode_to_chunk() Plaintext: input "0x00 01 02 03 04 05 06 07 08 09 0A 0B 0C 0D 0E 0F10 11 12 13 14 15 16 17 18 19 1A 1B 1C 1D 1E 1F20 21 22 23" 303s | decode_to_chunk() output: 303s | 00 01 02 03 04 05 06 07 08 09 0a 0b 0c 0d 0e 0f ................ 303s | 10 11 12 13 14 15 16 17 18 19 1a 1b 1c 1d 1e 1f ................ 303s | 20 21 22 23 !"# 303s | decode_to_chunk() expected counter-block: : input "0x 00 E0 01 7B 27 77 7F 3F 4A 17 86 F0 00 00 00 04" 303s | decode_to_chunk() output: 303s | 00 e0 01 7b 27 77 7f 3f 4a 17 86 f0 00 00 00 04 ...{'w.?J....... 303s | cipher_op_ctr_nss() enter AES_CTR 0xc1dc749d48c0 use IKEv1 IV wire_iv 0 count 0 303s | ctr_param: count 32 iv 00e0017b27777f3f4a1786f000000001 303s | cipher_op_ctr_nss() counter-block updated from 0x1 to 0x4 for 36 bytes 303s | do_aes_ctr: exit 303s | cipher_op_context_destroy_ctr_nss() 303s | verify_bytes() Encrypting 36 octets using AES-CTR with 128-bit key: decrypt: ok 303s | verify_bytes() Encrypting 36 octets using AES-CTR with 128-bit key: counter-block: ok 303s ipsec algparse: Encrypting 16 octets using AES-CTR with 192-bit key 303s | decode_to_chunk() raw_key: input "0x16 AF 5B 14 5F C9 F5 79 C1 75 F9 3E 3B FB 0E ED86 3D 06 CC FD B7 85 15" 303s | decode_to_chunk() output: 303s | 16 af 5b 14 5f c9 f5 79 c1 75 f9 3e 3b fb 0e ed ..[._..y.u.>;... 303s | 86 3d 06 cc fd b7 85 15 .=...... 303s | CONCATENATE_DATA_AND_BASE: 303s | target: EXTRACT_KEY_FROM_KEY 303s | base: base-key@0xc1dc749d4bc0 (16-bytes, AES_KEY_GEN) 303s | params: 16-bytes@0xffffe203cea0 303s | key-offset: 0, key-size: 24 303s | EXTRACT_KEY_FROM_KEY: 303s | target: AES_CTR 303s | flags: ENCRYPT+DECRYPT 303s | key_size: 24-bytes 303s | base: base-key@0xc1dc749d7c00 (40-bytes, EXTRACT_KEY_FROM_KEY) 303s | operation: FLAGS_ONLY 303s | params: 8-bytes@0xffffe203cea8 303s | decode_to_mac() input counter-block: : input "0x 00 00 00 48 36 73 3C 14 7D 6D 93 CB 00 00 00 01" 303s | decode_to_mac() output: 303s | 00 00 00 48 36 73 3c 14 7d 6d 93 cb 00 00 00 01 ...H6s<.}m...... 303s | decode_to_chunk() Plaintext: input "0x 53 69 6E 67 6C 65 20 62 6C 6F 63 6B 20 6D 73 67" 303s | decode_to_chunk() output: 303s | 53 69 6e 67 6c 65 20 62 6c 6f 63 6b 20 6d 73 67 Single block msg 303s | decode_to_chunk() Ciphertext: input "0x 4B 55 38 4F E2 59 C9 C8 4E 79 35 A0 03 CB E9 28" 303s | decode_to_chunk() output: 303s | 4b 55 38 4f e2 59 c9 c8 4e 79 35 a0 03 cb e9 28 KU8O.Y..Ny5....( 303s | decode_to_chunk() expected counter-block: : input "0x 00 00 00 48 36 73 3C 14 7D 6D 93 CB 00 00 00 02" 303s | decode_to_chunk() output: 303s | 00 00 00 48 36 73 3c 14 7d 6d 93 cb 00 00 00 02 ...H6s<.}m...... 303s | cipher_op_ctr_nss() enter AES_CTR 0xc1dc749d85b0 use IKEv1 IV wire_iv 0 count 0 303s | ctr_param: count 32 iv 0000004836733c147d6d93cb00000001 303s | cipher_op_ctr_nss() counter-block updated from 0x1 to 0x2 for 16 bytes 303s | do_aes_ctr: exit 303s | cipher_op_context_destroy_ctr_nss() 303s | verify_bytes() Encrypting 16 octets using AES-CTR with 192-bit key: encrypt: ok 303s | verify_bytes() Encrypting 16 octets using AES-CTR with 192-bit key: counter-block: ok 303s | decode_to_mac() input counter-block: : input "0x 00 00 00 48 36 73 3C 14 7D 6D 93 CB 00 00 00 01" 303s | decode_to_mac() output: 303s | 00 00 00 48 36 73 3c 14 7d 6d 93 cb 00 00 00 01 ...H6s<.}m...... 303s | decode_to_chunk() Ciphertext: input "0x 4B 55 38 4F E2 59 C9 C8 4E 79 35 A0 03 CB E9 28" 303s | decode_to_chunk() output: 303s | 4b 55 38 4f e2 59 c9 c8 4e 79 35 a0 03 cb e9 28 KU8O.Y..Ny5....( 303s | decode_to_chunk() Plaintext: input "0x 53 69 6E 67 6C 65 20 62 6C 6F 63 6B 20 6D 73 67" 303s | decode_to_chunk() output: 303s | 53 69 6e 67 6c 65 20 62 6c 6f 63 6b 20 6d 73 67 Single block msg 303s | decode_to_chunk() expected counter-block: : input "0x 00 00 00 48 36 73 3C 14 7D 6D 93 CB 00 00 00 02" 303s | decode_to_chunk() output: 303s | 00 00 00 48 36 73 3c 14 7d 6d 93 cb 00 00 00 02 ...H6s<.}m...... 303s | cipher_op_ctr_nss() enter AES_CTR 0xc1dc749d85b0 use IKEv1 IV wire_iv 0 count 0 303s | ctr_param: count 32 iv 0000004836733c147d6d93cb00000001 303s | cipher_op_ctr_nss() counter-block updated from 0x1 to 0x2 for 16 bytes 303s | do_aes_ctr: exit 303s | cipher_op_context_destroy_ctr_nss() 303s | verify_bytes() Encrypting 16 octets using AES-CTR with 192-bit key: decrypt: ok 303s | verify_bytes() Encrypting 16 octets using AES-CTR with 192-bit key: counter-block: ok 303s ipsec algparse: Encrypting 32 octets using AES-CTR with 192-bit key 303s | decode_to_chunk() raw_key: input "0x7C 5C B2 40 1B 3D C3 3C 19 E7 34 08 19 E0 F6 9C67 8C 3D B8 E6 F6 A9 1A" 303s | decode_to_chunk() output: 303s | 7c 5c b2 40 1b 3d c3 3c 19 e7 34 08 19 e0 f6 9c |\.@.=.<..4..... 303s | 67 8c 3d b8 e6 f6 a9 1a g.=..... 303s | CONCATENATE_DATA_AND_BASE: 303s | target: EXTRACT_KEY_FROM_KEY 303s | base: base-key@0xc1dc749d4bc0 (16-bytes, AES_KEY_GEN) 303s | params: 16-bytes@0xffffe203cea0 303s | key-offset: 0, key-size: 24 303s | EXTRACT_KEY_FROM_KEY: 303s | target: AES_CTR 303s | flags: ENCRYPT+DECRYPT 303s | key_size: 24-bytes 303s | base: base-key@0xc1dc749d7c00 (40-bytes, EXTRACT_KEY_FROM_KEY) 303s | operation: FLAGS_ONLY 303s | params: 8-bytes@0xffffe203cea8 303s | decode_to_mac() input counter-block: : input "0x 00 96 B0 3B 02 0C 6E AD C2 CB 50 0D 00 00 00 01" 303s | decode_to_mac() output: 303s | 00 96 b0 3b 02 0c 6e ad c2 cb 50 0d 00 00 00 01 ...;..n...P..... 303s | decode_to_chunk() Plaintext: input "0x00 01 02 03 04 05 06 07 08 09 0A 0B 0C 0D 0E 0F10 11 12 13 14 15 16 17 18 19 1A 1B 1C 1D 1E 1F" 303s | decode_to_chunk() output: 303s | 00 01 02 03 04 05 06 07 08 09 0a 0b 0c 0d 0e 0f ................ 303s | 10 11 12 13 14 15 16 17 18 19 1a 1b 1c 1d 1e 1f ................ 303s | decode_to_chunk() Ciphertext: input "0x45 32 43 FC 60 9B 23 32 7E DF AA FA 71 31 CD 9F84 90 70 1C 5A D4 A7 9C FC 1F E0 FF 42 F4 FB 00" 303s | decode_to_chunk() output: 303s | 45 32 43 fc 60 9b 23 32 7e df aa fa 71 31 cd 9f E2C.`.#2~...q1.. 303s | 84 90 70 1c 5a d4 a7 9c fc 1f e0 ff 42 f4 fb 00 ..p.Z.......B... 303s | decode_to_chunk() expected counter-block: : input "0x 00 96 B0 3B 02 0C 6E AD C2 CB 50 0D 00 00 00 03" 303s | decode_to_chunk() output: 303s | 00 96 b0 3b 02 0c 6e ad c2 cb 50 0d 00 00 00 03 ...;..n...P..... 303s | cipher_op_ctr_nss() enter AES_CTR 0xc1dc749d48c0 use IKEv1 IV wire_iv 0 count 0 303s | ctr_param: count 32 iv 0096b03b020c6eadc2cb500d00000001 303s | cipher_op_ctr_nss() counter-block updated from 0x1 to 0x3 for 32 bytes 303s | do_aes_ctr: exit 303s | cipher_op_context_destroy_ctr_nss() 303s | verify_bytes() Encrypting 32 octets using AES-CTR with 192-bit key: encrypt: ok 303s | verify_bytes() Encrypting 32 octets using AES-CTR with 192-bit key: counter-block: ok 303s | decode_to_mac() input counter-block: : input "0x 00 96 B0 3B 02 0C 6E AD C2 CB 50 0D 00 00 00 01" 303s | decode_to_mac() output: 303s | 00 96 b0 3b 02 0c 6e ad c2 cb 50 0d 00 00 00 01 ...;..n...P..... 303s | decode_to_chunk() Ciphertext: input "0x45 32 43 FC 60 9B 23 32 7E DF AA FA 71 31 CD 9F84 90 70 1C 5A D4 A7 9C FC 1F E0 FF 42 F4 FB 00" 303s | decode_to_chunk() output: 303s | 45 32 43 fc 60 9b 23 32 7e df aa fa 71 31 cd 9f E2C.`.#2~...q1.. 303s | 84 90 70 1c 5a d4 a7 9c fc 1f e0 ff 42 f4 fb 00 ..p.Z.......B... 303s | decode_to_chunk() Plaintext: input "0x00 01 02 03 04 05 06 07 08 09 0A 0B 0C 0D 0E 0F10 11 12 13 14 15 16 17 18 19 1A 1B 1C 1D 1E 1F" 303s | decode_to_chunk() output: 303s | 00 01 02 03 04 05 06 07 08 09 0a 0b 0c 0d 0e 0f ................ 303s | 10 11 12 13 14 15 16 17 18 19 1a 1b 1c 1d 1e 1f ................ 303s | decode_to_chunk() expected counter-block: : input "0x 00 96 B0 3B 02 0C 6E AD C2 CB 50 0D 00 00 00 03" 303s | decode_to_chunk() output: 303s | 00 96 b0 3b 02 0c 6e ad c2 cb 50 0d 00 00 00 03 ...;..n...P..... 303s | cipher_op_ctr_nss() enter AES_CTR 0xc1dc749d48c0 use IKEv1 IV wire_iv 0 count 0 303s | ctr_param: count 32 iv 0096b03b020c6eadc2cb500d00000001 303s | cipher_op_ctr_nss() counter-block updated from 0x1 to 0x3 for 32 bytes 303s | do_aes_ctr: exit 303s | cipher_op_context_destroy_ctr_nss() 303s | verify_bytes() Encrypting 32 octets using AES-CTR with 192-bit key: decrypt: ok 303s | verify_bytes() Encrypting 32 octets using AES-CTR with 192-bit key: counter-block: ok 303s ipsec algparse: Encrypting 36 octets using AES-CTR with 192-bit key 303s | decode_to_chunk() raw_key: input "0x02 BF 39 1E E8 EC B1 59 B9 59 61 7B 09 65 27 9BF5 9B 60 A7 86 D3 E0 FE" 303s | decode_to_chunk() output: 303s | 02 bf 39 1e e8 ec b1 59 b9 59 61 7b 09 65 27 9b ..9....Y.Ya{.e'. 303s | f5 9b 60 a7 86 d3 e0 fe ..`..... 303s | CONCATENATE_DATA_AND_BASE: 303s | target: EXTRACT_KEY_FROM_KEY 303s | base: base-key@0xc1dc749d4bc0 (16-bytes, AES_KEY_GEN) 303s | params: 16-bytes@0xffffe203cea0 303s | key-offset: 0, key-size: 24 303s | EXTRACT_KEY_FROM_KEY: 303s | target: AES_CTR 303s | flags: ENCRYPT+DECRYPT 303s | key_size: 24-bytes 303s | base: base-key@0xc1dc749d7c00 (40-bytes, EXTRACT_KEY_FROM_KEY) 303s | operation: FLAGS_ONLY 303s | params: 8-bytes@0xffffe203cea8 303s | decode_to_mac() input counter-block: : input "0x 00 07 BD FD 5C BD 60 27 8D CC 09 12 00 00 00 01" 303s | decode_to_mac() output: 303s | 00 07 bd fd 5c bd 60 27 8d cc 09 12 00 00 00 01 ....\.`'........ 303s | decode_to_chunk() Plaintext: input "0x00 01 02 03 04 05 06 07 08 09 0A 0B 0C 0D 0E 0F10 11 12 13 14 15 16 17 18 19 1A 1B 1C 1D 1E 1F20 21 22 23" 303s | decode_to_chunk() output: 303s | 00 01 02 03 04 05 06 07 08 09 0a 0b 0c 0d 0e 0f ................ 303s | 10 11 12 13 14 15 16 17 18 19 1a 1b 1c 1d 1e 1f ................ 303s | 20 21 22 23 !"# 303s | decode_to_chunk() Ciphertext: input "0x96 89 3F C5 5E 5C 72 2F 54 0B 7D D1 DD F7 E7 58D2 88 BC 95 C6 91 65 88 45 36 C8 11 66 2F 21 88AB EE 09 35" 303s | decode_to_chunk() output: 303s | 96 89 3f c5 5e 5c 72 2f 54 0b 7d d1 dd f7 e7 58 ..?.^\r/T.}....X 303s | d2 88 bc 95 c6 91 65 88 45 36 c8 11 66 2f 21 88 ......e.E6..f/!. 303s | ab ee 09 35 ...5 303s | decode_to_chunk() expected counter-block: : input "0x 00 07 BD FD 5C BD 60 27 8D CC 09 12 00 00 00 04" 303s | decode_to_chunk() output: 303s | 00 07 bd fd 5c bd 60 27 8d cc 09 12 00 00 00 04 ....\.`'........ 303s | cipher_op_ctr_nss() enter AES_CTR 0xc1dc749d48c0 use IKEv1 IV wire_iv 0 count 0 303s | ctr_param: count 32 iv 0007bdfd5cbd60278dcc091200000001 303s | cipher_op_ctr_nss() counter-block updated from 0x1 to 0x4 for 36 bytes 303s | do_aes_ctr: exit 303s | cipher_op_context_destroy_ctr_nss() 303s | verify_bytes() Encrypting 36 octets using AES-CTR with 192-bit key: encrypt: ok 303s | verify_bytes() Encrypting 36 octets using AES-CTR with 192-bit key: counter-block: ok 303s | decode_to_mac() input counter-block: : input "0x 00 07 BD FD 5C BD 60 27 8D CC 09 12 00 00 00 01" 303s | decode_to_mac() output: 303s | 00 07 bd fd 5c bd 60 27 8d cc 09 12 00 00 00 01 ....\.`'........ 303s | decode_to_chunk() Ciphertext: input "0x96 89 3F C5 5E 5C 72 2F 54 0B 7D D1 DD F7 E7 58D2 88 BC 95 C6 91 65 88 45 36 C8 11 66 2F 21 88AB EE 09 35" 303s | decode_to_chunk() output: 303s | 96 89 3f c5 5e 5c 72 2f 54 0b 7d d1 dd f7 e7 58 ..?.^\r/T.}....X 303s | d2 88 bc 95 c6 91 65 88 45 36 c8 11 66 2f 21 88 ......e.E6..f/!. 303s | ab ee 09 35 ...5 303s | decode_to_chunk() Plaintext: input "0x00 01 02 03 04 05 06 07 08 09 0A 0B 0C 0D 0E 0F10 11 12 13 14 15 16 17 18 19 1A 1B 1C 1D 1E 1F20 21 22 23" 303s | decode_to_chunk() output: 303s | 00 01 02 03 04 05 06 07 08 09 0a 0b 0c 0d 0e 0f ................ 303s | 10 11 12 13 14 15 16 17 18 19 1a 1b 1c 1d 1e 1f ................ 303s | 20 21 22 23 !"# 303s | decode_to_chunk() expected counter-block: : input "0x 00 07 BD FD 5C BD 60 27 8D CC 09 12 00 00 00 04" 303s | decode_to_chunk() output: 303s | 00 07 bd fd 5c bd 60 27 8d cc 09 12 00 00 00 04 ....\.`'........ 303s | cipher_op_ctr_nss() enter AES_CTR 0xc1dc749d48c0 use IKEv1 IV wire_iv 0 count 0 303s | ctr_param: count 32 iv 0007bdfd5cbd60278dcc091200000001 303s | cipher_op_ctr_nss() counter-block updated from 0x1 to 0x4 for 36 bytes 303s | do_aes_ctr: exit 303s | cipher_op_context_destroy_ctr_nss() 303s | verify_bytes() Encrypting 36 octets using AES-CTR with 192-bit key: decrypt: ok 303s | verify_bytes() Encrypting 36 octets using AES-CTR with 192-bit key: counter-block: ok 303s ipsec algparse: Encrypting 16 octets using AES-CTR with 256-bit key 303s | decode_to_chunk() raw_key: input "0x77 6B EF F2 85 1D B0 6F 4C 8A 05 42 C8 69 6F 6C6A 81 AF 1E EC 96 B4 D3 7F C1 D6 89 E6 C1 C1 04" 303s | decode_to_chunk() output: 303s | 77 6b ef f2 85 1d b0 6f 4c 8a 05 42 c8 69 6f 6c wk.....oL..B.iol 303s | 6a 81 af 1e ec 96 b4 d3 7f c1 d6 89 e6 c1 c1 04 j............... 303s | CONCATENATE_DATA_AND_BASE: 303s | target: EXTRACT_KEY_FROM_KEY 303s | base: base-key@0xc1dc749d4bc0 (16-bytes, AES_KEY_GEN) 303s | params: 16-bytes@0xffffe203cea0 303s | key-offset: 0, key-size: 32 303s | EXTRACT_KEY_FROM_KEY: 303s | target: AES_CTR 303s | flags: ENCRYPT+DECRYPT 303s | key_size: 32-bytes 303s | base: base-key@0xc1dc749d7c00 (48-bytes, EXTRACT_KEY_FROM_KEY) 303s | operation: FLAGS_ONLY 303s | params: 8-bytes@0xffffe203cea8 303s | decode_to_mac() input counter-block: : input "0x 00 00 00 60 DB 56 72 C9 7A A8 F0 B2 00 00 00 01" 303s | decode_to_mac() output: 303s | 00 00 00 60 db 56 72 c9 7a a8 f0 b2 00 00 00 01 ...`.Vr.z....... 303s | decode_to_chunk() Plaintext: input "0x 53 69 6E 67 6C 65 20 62 6C 6F 63 6B 20 6D 73 67" 303s | decode_to_chunk() output: 303s | 53 69 6e 67 6c 65 20 62 6c 6f 63 6b 20 6d 73 67 Single block msg 303s | decode_to_chunk() Ciphertext: input "0x 14 5A D0 1D BF 82 4E C7 56 08 63 DC 71 E3 E0 C0" 303s | decode_to_chunk() output: 303s | 14 5a d0 1d bf 82 4e c7 56 08 63 dc 71 e3 e0 c0 .Z....N.V.c.q... 303s | decode_to_chunk() expected counter-block: : input "0x 00 00 00 60 DB 56 72 C9 7A A8 F0 B2 00 00 00 02" 303s | decode_to_chunk() output: 303s | 00 00 00 60 db 56 72 c9 7a a8 f0 b2 00 00 00 02 ...`.Vr.z....... 303s | cipher_op_ctr_nss() enter AES_CTR 0xc1dc749d85b0 use IKEv1 IV wire_iv 0 count 0 303s | ctr_param: count 32 iv 00000060db5672c97aa8f0b200000001 303s | cipher_op_ctr_nss() counter-block updated from 0x1 to 0x2 for 16 bytes 303s | do_aes_ctr: exit 303s | cipher_op_context_destroy_ctr_nss() 303s | verify_bytes() Encrypting 16 octets using AES-CTR with 256-bit key: encrypt: ok 303s | verify_bytes() Encrypting 16 octets using AES-CTR with 256-bit key: counter-block: ok 303s | decode_to_mac() input counter-block: : input "0x 00 00 00 60 DB 56 72 C9 7A A8 F0 B2 00 00 00 01" 303s | decode_to_mac() output: 303s | 00 00 00 60 db 56 72 c9 7a a8 f0 b2 00 00 00 01 ...`.Vr.z....... 303s | decode_to_chunk() Ciphertext: input "0x 14 5A D0 1D BF 82 4E C7 56 08 63 DC 71 E3 E0 C0" 303s | decode_to_chunk() output: 303s | 14 5a d0 1d bf 82 4e c7 56 08 63 dc 71 e3 e0 c0 .Z....N.V.c.q... 303s | decode_to_chunk() Plaintext: input "0x 53 69 6E 67 6C 65 20 62 6C 6F 63 6B 20 6D 73 67" 303s | decode_to_chunk() output: 303s | 53 69 6e 67 6c 65 20 62 6c 6f 63 6b 20 6d 73 67 Single block msg 303s | decode_to_chunk() expected counter-block: : input "0x 00 00 00 60 DB 56 72 C9 7A A8 F0 B2 00 00 00 02" 303s | decode_to_chunk() output: 303s | 00 00 00 60 db 56 72 c9 7a a8 f0 b2 00 00 00 02 ...`.Vr.z....... 303s | cipher_op_ctr_nss() enter AES_CTR 0xc1dc749d85b0 use IKEv1 IV wire_iv 0 count 0 303s | ctr_param: count 32 iv 00000060db5672c97aa8f0b200000001 303s | cipher_op_ctr_nss() counter-block updated from 0x1 to 0x2 for 16 bytes 303s | do_aes_ctr: exit 303s | cipher_op_context_destroy_ctr_nss() 303s | verify_bytes() Encrypting 16 octets using AES-CTR with 256-bit key: decrypt: ok 303s | verify_bytes() Encrypting 16 octets using AES-CTR with 256-bit key: counter-block: ok 303s ipsec algparse: Encrypting 32 octets using AES-CTR with 256-bit key 303s | decode_to_chunk() raw_key: input "0xF6 D6 6D 6B D5 2D 59 BB 07 96 36 58 79 EF F8 86C6 6D D5 1A 5B 6A 99 74 4B 50 59 0C 87 A2 38 84" 303s | decode_to_chunk() output: 303s | f6 d6 6d 6b d5 2d 59 bb 07 96 36 58 79 ef f8 86 ..mk.-Y...6Xy... 303s | c6 6d d5 1a 5b 6a 99 74 4b 50 59 0c 87 a2 38 84 .m..[j.tKPY...8. 303s | CONCATENATE_DATA_AND_BASE: 303s | target: EXTRACT_KEY_FROM_KEY 303s | base: base-key@0xc1dc749d4bc0 (16-bytes, AES_KEY_GEN) 303s | params: 16-bytes@0xffffe203cea0 303s | key-offset: 0, key-size: 32 303s | EXTRACT_KEY_FROM_KEY: 303s | target: AES_CTR 303s | flags: ENCRYPT+DECRYPT 303s | key_size: 32-bytes 303s | base: base-key@0xc1dc749d7c00 (48-bytes, EXTRACT_KEY_FROM_KEY) 303s | operation: FLAGS_ONLY 303s | params: 8-bytes@0xffffe203cea8 303s | decode_to_mac() input counter-block: : input "0x 00 FA AC 24 C1 58 5E F1 5A 43 D8 75 00 00 00 01" 303s | decode_to_mac() output: 303s | 00 fa ac 24 c1 58 5e f1 5a 43 d8 75 00 00 00 01 ...$.X^.ZC.u.... 303s | decode_to_chunk() Plaintext: input "0x00 01 02 03 04 05 06 07 08 09 0A 0B 0C 0D 0E 0F10 11 12 13 14 15 16 17 18 19 1A 1B 1C 1D 1E 1F" 303s | decode_to_chunk() output: 303s | 00 01 02 03 04 05 06 07 08 09 0a 0b 0c 0d 0e 0f ................ 303s | 10 11 12 13 14 15 16 17 18 19 1a 1b 1c 1d 1e 1f ................ 303s | decode_to_chunk() Ciphertext: input "0xF0 5E 23 1B 38 94 61 2C 49 EE 00 0B 80 4E B2 A9B8 30 6B 50 8F 83 9D 6A 55 30 83 1D 93 44 AF 1C" 303s | decode_to_chunk() output: 303s | f0 5e 23 1b 38 94 61 2c 49 ee 00 0b 80 4e b2 a9 .^#.8.a,I....N.. 303s | b8 30 6b 50 8f 83 9d 6a 55 30 83 1d 93 44 af 1c .0kP...jU0...D.. 303s | decode_to_chunk() expected counter-block: : input "0x 00 FA AC 24 C1 58 5E F1 5A 43 D8 75 00 00 00 03" 303s | decode_to_chunk() output: 303s | 00 fa ac 24 c1 58 5e f1 5a 43 d8 75 00 00 00 03 ...$.X^.ZC.u.... 303s | cipher_op_ctr_nss() enter AES_CTR 0xc1dc749d48c0 use IKEv1 IV wire_iv 0 count 0 303s | ctr_param: count 32 iv 00faac24c1585ef15a43d87500000001 303s | cipher_op_ctr_nss() counter-block updated from 0x1 to 0x3 for 32 bytes 303s | do_aes_ctr: exit 303s | cipher_op_context_destroy_ctr_nss() 303s | verify_bytes() Encrypting 32 octets using AES-CTR with 256-bit key: encrypt: ok 303s | verify_bytes() Encrypting 32 octets using AES-CTR with 256-bit key: counter-block: ok 303s | decode_to_mac() input counter-block: : input "0x 00 FA AC 24 C1 58 5E F1 5A 43 D8 75 00 00 00 01" 303s | decode_to_mac() output: 303s | 00 fa ac 24 c1 58 5e f1 5a 43 d8 75 00 00 00 01 ...$.X^.ZC.u.... 303s | decode_to_chunk() Ciphertext: input "0xF0 5E 23 1B 38 94 61 2C 49 EE 00 0B 80 4E B2 A9B8 30 6B 50 8F 83 9D 6A 55 30 83 1D 93 44 AF 1C" 303s | decode_to_chunk() output: 303s | f0 5e 23 1b 38 94 61 2c 49 ee 00 0b 80 4e b2 a9 .^#.8.a,I....N.. 303s | b8 30 6b 50 8f 83 9d 6a 55 30 83 1d 93 44 af 1c .0kP...jU0...D.. 303s | decode_to_chunk() Plaintext: input "0x00 01 02 03 04 05 06 07 08 09 0A 0B 0C 0D 0E 0F10 11 12 13 14 15 16 17 18 19 1A 1B 1C 1D 1E 1F" 303s | decode_to_chunk() output: 303s | 00 01 02 03 04 05 06 07 08 09 0a 0b 0c 0d 0e 0f ................ 303s | 10 11 12 13 14 15 16 17 18 19 1a 1b 1c 1d 1e 1f ................ 303s | decode_to_chunk() expected counter-block: : input "0x 00 FA AC 24 C1 58 5E F1 5A 43 D8 75 00 00 00 03" 303s | decode_to_chunk() output: 303s | 00 fa ac 24 c1 58 5e f1 5a 43 d8 75 00 00 00 03 ...$.X^.ZC.u.... 303s | cipher_op_ctr_nss() enter AES_CTR 0xc1dc749d48c0 use IKEv1 IV wire_iv 0 count 0 303s | ctr_param: count 32 iv 00faac24c1585ef15a43d87500000001 303s | cipher_op_ctr_nss() counter-block updated from 0x1 to 0x3 for 32 bytes 303s | do_aes_ctr: exit 303s | cipher_op_context_destroy_ctr_nss() 303s | verify_bytes() Encrypting 32 octets using AES-CTR with 256-bit key: decrypt: ok 303s | verify_bytes() Encrypting 32 octets using AES-CTR with 256-bit key: counter-block: ok 303s ipsec algparse: Encrypting 36 octets using AES-CTR with 256-bit key 303s | decode_to_chunk() raw_key: input "0xFF 7A 61 7C E6 91 48 E4 F1 72 6E 2F 43 58 1D E2AA 62 D9 F8 05 53 2E DF F1 EE D6 87 FB 54 15 3D" 303s | decode_to_chunk() output: 303s | ff 7a 61 7c e6 91 48 e4 f1 72 6e 2f 43 58 1d e2 .za|..H..rn/CX.. 303s | aa 62 d9 f8 05 53 2e df f1 ee d6 87 fb 54 15 3d .b...S.......T.= 303s | CONCATENATE_DATA_AND_BASE: 303s | target: EXTRACT_KEY_FROM_KEY 303s | base: base-key@0xc1dc749d4bc0 (16-bytes, AES_KEY_GEN) 303s | params: 16-bytes@0xffffe203cea0 303s | key-offset: 0, key-size: 32 303s | EXTRACT_KEY_FROM_KEY: 303s | target: AES_CTR 303s | flags: ENCRYPT+DECRYPT 303s | key_size: 32-bytes 303s | base: base-key@0xc1dc749d7c00 (48-bytes, EXTRACT_KEY_FROM_KEY) 303s | operation: FLAGS_ONLY 303s | params: 8-bytes@0xffffe203cea8 303s | decode_to_mac() input counter-block: : input "0x 00 1C C5 B7 51 A5 1D 70 A1 C1 11 48 00 00 00 01" 303s | decode_to_mac() output: 303s | 00 1c c5 b7 51 a5 1d 70 a1 c1 11 48 00 00 00 01 ....Q..p...H.... 303s | decode_to_chunk() Plaintext: input "0x00 01 02 03 04 05 06 07 08 09 0A 0B 0C 0D 0E 0F10 11 12 13 14 15 16 17 18 19 1A 1B 1C 1D 1E 1F20 21 22 23" 303s | decode_to_chunk() output: 303s | 00 01 02 03 04 05 06 07 08 09 0a 0b 0c 0d 0e 0f ................ 303s | 10 11 12 13 14 15 16 17 18 19 1a 1b 1c 1d 1e 1f ................ 303s | 20 21 22 23 !"# 303s | decode_to_chunk() Ciphertext: input "0xEB 6C 52 82 1D 0B BB F7 CE 75 94 46 2A CA 4F AAB4 07 DF 86 65 69 FD 07 F4 8C C0 B5 83 D6 07 1F1E C0 E6 B8" 303s | decode_to_chunk() output: 303s | eb 6c 52 82 1d 0b bb f7 ce 75 94 46 2a ca 4f aa .lR......u.F*.O. 303s | b4 07 df 86 65 69 fd 07 f4 8c c0 b5 83 d6 07 1f ....ei.......... 303s | 1e c0 e6 b8 .... 303s | decode_to_chunk() expected counter-block: : input "0x 00 1C C5 B7 51 A5 1D 70 A1 C1 11 48 00 00 00 04" 303s | decode_to_chunk() output: 303s | 00 1c c5 b7 51 a5 1d 70 a1 c1 11 48 00 00 00 04 ....Q..p...H.... 303s | cipher_op_ctr_nss() enter AES_CTR 0xc1dc749d48c0 use IKEv1 IV wire_iv 0 count 0 303s | ctr_param: count 32 iv 001cc5b751a51d70a1c1114800000001 303s | cipher_op_ctr_nss() counter-block updated from 0x1 to 0x4 for 36 bytes 303s | do_aes_ctr: exit 303s | cipher_op_context_destroy_ctr_nss() 303s | verify_bytes() Encrypting 36 octets using AES-CTR with 256-bit key: encrypt: ok 303s | verify_bytes() Encrypting 36 octets using AES-CTR with 256-bit key: counter-block: ok 303s | decode_to_mac() input counter-block: : input "0x 00 1C C5 B7 51 A5 1D 70 A1 C1 11 48 00 00 00 01" 303s | decode_to_mac() output: 303s | 00 1c c5 b7 51 a5 1d 70 a1 c1 11 48 00 00 00 01 ....Q..p...H.... 303s | decode_to_chunk() Ciphertext: input "0xEB 6C 52 82 1D 0B BB F7 CE 75 94 46 2A CA 4F AAB4 07 DF 86 65 69 FD 07 F4 8C C0 B5 83 D6 07 1F1E C0 E6 B8" 303s | decode_to_chunk() output: 303s | eb 6c 52 82 1d 0b bb f7 ce 75 94 46 2a ca 4f aa .lR......u.F*.O. 303s | b4 07 df 86 65 69 fd 07 f4 8c c0 b5 83 d6 07 1f ....ei.......... 303s | 1e c0 e6 b8 .... 303s | decode_to_chunk() Plaintext: input "0x00 01 02 03 04 05 06 07 08 09 0A 0B 0C 0D 0E 0F10 11 12 13 14 15 16 17 18 19 1A 1B 1C 1D 1E 1F20 21 22 23" 303s | decode_to_chunk() output: 303s | 00 01 02 03 04 05 06 07 08 09 0a 0b 0c 0d 0e 0f ................ 303s | 10 11 12 13 14 15 16 17 18 19 1a 1b 1c 1d 1e 1f ................ 303s | 20 21 22 23 !"# 303s | decode_to_chunk() expected counter-block: : input "0x 00 1C C5 B7 51 A5 1D 70 A1 C1 11 48 00 00 00 04" 303s | decode_to_chunk() output: 303s | 00 1c c5 b7 51 a5 1d 70 a1 c1 11 48 00 00 00 04 ....Q..p...H.... 303s | cipher_op_ctr_nss() enter AES_CTR 0xc1dc749d48c0 use IKEv1 IV wire_iv 0 count 0 303s | ctr_param: count 32 iv 001cc5b751a51d70a1c1114800000001 303s | cipher_op_ctr_nss() counter-block updated from 0x1 to 0x4 for 36 bytes 303s | do_aes_ctr: exit 303s | cipher_op_context_destroy_ctr_nss() 303s | verify_bytes() Encrypting 36 octets using AES-CTR with 256-bit key: decrypt: ok 303s | verify_bytes() Encrypting 36 octets using AES-CTR with 256-bit key: counter-block: ok 303s ipsec algparse: testing AES_CBC: 303s ipsec algparse: Encrypting 16 bytes (1 block) using AES-CBC with 128-bit key 303s | decode_to_chunk() raw_key: input "0x06a9214036b8a15b512e03d534120006" 303s | decode_to_chunk() output: 303s | 06 a9 21 40 36 b8 a1 5b 51 2e 03 d5 34 12 00 06 ..!@6..[Q...4... 303s | CONCATENATE_DATA_AND_BASE: 303s | target: EXTRACT_KEY_FROM_KEY 303s | base: base-key@0xc1dc749d4bc0 (16-bytes, AES_KEY_GEN) 303s | params: 16-bytes@0xffffe203ceb0 303s | key-offset: 0, key-size: 16 303s | EXTRACT_KEY_FROM_KEY: 303s | target: AES_CBC 303s | flags: ENCRYPT+DECRYPT 303s | key_size: 16-bytes 303s | base: base-key@0xc1dc749d7c00 (32-bytes, EXTRACT_KEY_FROM_KEY) 303s | operation: FLAGS_ONLY 303s | params: 8-bytes@0xffffe203ceb8 303s | decode_to_mac() IV: : input "0x3dafba429d9eb430b422da802c9fac41" 303s | decode_to_mac() output: 303s | 3d af ba 42 9d 9e b4 30 b4 22 da 80 2c 9f ac 41 =..B...0."..,..A 303s | decode_to_chunk() new IV: : input "0xe353779c1079aeb82708942dbe77181a" 303s | decode_to_chunk() output: 303s | e3 53 77 9c 10 79 ae b8 27 08 94 2d be 77 18 1a .Sw..y..'..-.w.. 303s | decode_to_chunk() plaintext: : input "Single block msg" 303s | decode_to_chunk() output: 303s | 53 69 6e 67 6c 65 20 62 6c 6f 63 6b 20 6d 73 67 Single block msg 303s | decode_to_chunk() ciphertext: : input "0xe353779c1079aeb82708942dbe77181a" 303s | decode_to_chunk() output: 303s | e3 53 77 9c 10 79 ae b8 27 08 94 2d be 77 18 1a .Sw..y..'..-.w.. 303s | NSS ike_alg_nss_cbc: AES_CBC - enter (nil) 303s | using IKEv1 IV 303s | NSS ike_alg_nss_cbc: AES_CBC - exit 303s | verify_bytes() Encrypting 16 bytes (1 block) using AES-CBC with 128-bit key: encrypt: ok 303s | verify_bytes() Encrypting 16 bytes (1 block) using AES-CBC with 128-bit key: updated CBC IV: ok 303s | decode_to_mac() IV: : input "0x3dafba429d9eb430b422da802c9fac41" 303s | decode_to_mac() output: 303s | 3d af ba 42 9d 9e b4 30 b4 22 da 80 2c 9f ac 41 =..B...0."..,..A 303s | decode_to_chunk() new IV: : input "0xe353779c1079aeb82708942dbe77181a" 303s | decode_to_chunk() output: 303s | e3 53 77 9c 10 79 ae b8 27 08 94 2d be 77 18 1a .Sw..y..'..-.w.. 303s | decode_to_chunk() ciphertext: : input "0xe353779c1079aeb82708942dbe77181a" 303s | decode_to_chunk() output: 303s | e3 53 77 9c 10 79 ae b8 27 08 94 2d be 77 18 1a .Sw..y..'..-.w.. 303s | decode_to_chunk() plaintext: : input "Single block msg" 303s | decode_to_chunk() output: 303s | 53 69 6e 67 6c 65 20 62 6c 6f 63 6b 20 6d 73 67 Single block msg 303s | NSS ike_alg_nss_cbc: AES_CBC - enter (nil) 303s | using IKEv1 IV 303s | NSS ike_alg_nss_cbc: AES_CBC - exit 303s | verify_bytes() Encrypting 16 bytes (1 block) using AES-CBC with 128-bit key: decrypt: ok 303s | verify_bytes() Encrypting 16 bytes (1 block) using AES-CBC with 128-bit key: updated CBC IV: ok 303s ipsec algparse: Encrypting 32 bytes (2 blocks) using AES-CBC with 128-bit key 303s | decode_to_chunk() raw_key: input "0xc286696d887c9aa0611bbb3e2025a45a" 303s | decode_to_chunk() output: 303s | c2 86 69 6d 88 7c 9a a0 61 1b bb 3e 20 25 a4 5a ..im.|..a..> %.Z 303s | CONCATENATE_DATA_AND_BASE: 303s | target: EXTRACT_KEY_FROM_KEY 303s | base: base-key@0xc1dc749d4bc0 (16-bytes, AES_KEY_GEN) 303s | params: 16-bytes@0xffffe203ceb0 303s | key-offset: 0, key-size: 16 303s | EXTRACT_KEY_FROM_KEY: 303s | target: AES_CBC 303s | flags: ENCRYPT+DECRYPT 303s | key_size: 16-bytes 303s | base: base-key@0xc1dc749d7c00 (32-bytes, EXTRACT_KEY_FROM_KEY) 303s | operation: FLAGS_ONLY 303s | params: 8-bytes@0xffffe203ceb8 303s | decode_to_mac() IV: : input "0x562e17996d093d28ddb3ba695a2e6f58" 303s | decode_to_mac() output: 303s | 56 2e 17 99 6d 09 3d 28 dd b3 ba 69 5a 2e 6f 58 V...m.=(...iZ.oX 303s | decode_to_chunk() new IV: : input "0xd296cd94c2cccf8a3a863028b5e1dc0a7586602d253cfff91b8266bea6d61ab1" 303s | decode_to_chunk() output: 303s | d2 96 cd 94 c2 cc cf 8a 3a 86 30 28 b5 e1 dc 0a ........:.0(.... 303s | 75 86 60 2d 25 3c ff f9 1b 82 66 be a6 d6 1a b1 u.`-%<....f..... 303s | decode_to_chunk() plaintext: : input "0x000102030405060708090a0b0c0d0e0f101112131415161718191a1b1c1d1e1f" 303s | decode_to_chunk() output: 303s | 00 01 02 03 04 05 06 07 08 09 0a 0b 0c 0d 0e 0f ................ 303s | 10 11 12 13 14 15 16 17 18 19 1a 1b 1c 1d 1e 1f ................ 303s | decode_to_chunk() ciphertext: : input "0xd296cd94c2cccf8a3a863028b5e1dc0a7586602d253cfff91b8266bea6d61ab1" 303s | decode_to_chunk() output: 303s | d2 96 cd 94 c2 cc cf 8a 3a 86 30 28 b5 e1 dc 0a ........:.0(.... 303s | 75 86 60 2d 25 3c ff f9 1b 82 66 be a6 d6 1a b1 u.`-%<....f..... 303s | NSS ike_alg_nss_cbc: AES_CBC - enter (nil) 303s | using IKEv1 IV 303s | NSS ike_alg_nss_cbc: AES_CBC - exit 303s | verify_bytes() Encrypting 32 bytes (2 blocks) using AES-CBC with 128-bit key: encrypt: ok 303s | verify_bytes() Encrypting 32 bytes (2 blocks) using AES-CBC with 128-bit key: updated CBC IV: ok 303s | decode_to_mac() IV: : input "0x562e17996d093d28ddb3ba695a2e6f58" 303s | decode_to_mac() output: 303s | 56 2e 17 99 6d 09 3d 28 dd b3 ba 69 5a 2e 6f 58 V...m.=(...iZ.oX 303s | decode_to_chunk() new IV: : input "0xd296cd94c2cccf8a3a863028b5e1dc0a7586602d253cfff91b8266bea6d61ab1" 303s | decode_to_chunk() output: 303s | d2 96 cd 94 c2 cc cf 8a 3a 86 30 28 b5 e1 dc 0a ........:.0(.... 303s | 75 86 60 2d 25 3c ff f9 1b 82 66 be a6 d6 1a b1 u.`-%<....f..... 303s | decode_to_chunk() ciphertext: : input "0xd296cd94c2cccf8a3a863028b5e1dc0a7586602d253cfff91b8266bea6d61ab1" 303s | decode_to_chunk() output: 303s | d2 96 cd 94 c2 cc cf 8a 3a 86 30 28 b5 e1 dc 0a ........:.0(.... 303s | 75 86 60 2d 25 3c ff f9 1b 82 66 be a6 d6 1a b1 u.`-%<....f..... 303s | decode_to_chunk() plaintext: : input "0x000102030405060708090a0b0c0d0e0f101112131415161718191a1b1c1d1e1f" 303s | decode_to_chunk() output: 303s | 00 01 02 03 04 05 06 07 08 09 0a 0b 0c 0d 0e 0f ................ 303s | 10 11 12 13 14 15 16 17 18 19 1a 1b 1c 1d 1e 1f ................ 303s | NSS ike_alg_nss_cbc: AES_CBC - enter (nil) 303s | using IKEv1 IV 303s | NSS ike_alg_nss_cbc: AES_CBC - exit 303s | verify_bytes() Encrypting 32 bytes (2 blocks) using AES-CBC with 128-bit key: decrypt: ok 303s | verify_bytes() Encrypting 32 bytes (2 blocks) using AES-CBC with 128-bit key: updated CBC IV: ok 303s ipsec algparse: Encrypting 48 bytes (3 blocks) using AES-CBC with 128-bit key 303s | decode_to_chunk() raw_key: input "0x6c3ea0477630ce21a2ce334aa746c2cd" 303s | decode_to_chunk() output: 303s | 6c 3e a0 47 76 30 ce 21 a2 ce 33 4a a7 46 c2 cd l>.Gv0.!..3J.F.. 303s | CONCATENATE_DATA_AND_BASE: 303s | target: EXTRACT_KEY_FROM_KEY 303s | base: base-key@0xc1dc749d4bc0 (16-bytes, AES_KEY_GEN) 303s | params: 16-bytes@0xffffe203ceb0 303s | key-offset: 0, key-size: 16 303s | EXTRACT_KEY_FROM_KEY: 303s | target: AES_CBC 303s | flags: ENCRYPT+DECRYPT 303s | key_size: 16-bytes 303s | base: base-key@0xc1dc749d7c00 (32-bytes, EXTRACT_KEY_FROM_KEY) 303s | operation: FLAGS_ONLY 303s | params: 8-bytes@0xffffe203ceb8 303s | decode_to_mac() IV: : input "0xc782dc4c098c66cbd9cd27d825682c81" 303s | decode_to_mac() output: 303s | c7 82 dc 4c 09 8c 66 cb d9 cd 27 d8 25 68 2c 81 ...L..f...'.%h,. 303s | decode_to_chunk() new IV: : input "0xd0a02b3836451753d493665d33f0e8862dea54cdb293abc7506939276772f8d5021c19216bad525c8579695d83ba2684" 303s | decode_to_chunk() output: 303s | d0 a0 2b 38 36 45 17 53 d4 93 66 5d 33 f0 e8 86 ..+86E.S..f]3... 303s | 2d ea 54 cd b2 93 ab c7 50 69 39 27 67 72 f8 d5 -.T.....Pi9'gr.. 303s | 02 1c 19 21 6b ad 52 5c 85 79 69 5d 83 ba 26 84 ...!k.R\.yi]..&. 303s | decode_to_chunk() plaintext: : input "This is a 48-byte message (exactly 3 AES blocks)" 303s | decode_to_chunk() output: 303s | 54 68 69 73 20 69 73 20 61 20 34 38 2d 62 79 74 This is a 48-byt 303s | 65 20 6d 65 73 73 61 67 65 20 28 65 78 61 63 74 e message (exact 303s | 6c 79 20 33 20 41 45 53 20 62 6c 6f 63 6b 73 29 ly 3 AES blocks) 303s | decode_to_chunk() ciphertext: : input "0xd0a02b3836451753d493665d33f0e8862dea54cdb293abc7506939276772f8d5021c19216bad525c8579695d83ba2684" 303s | decode_to_chunk() output: 303s | d0 a0 2b 38 36 45 17 53 d4 93 66 5d 33 f0 e8 86 ..+86E.S..f]3... 303s | 2d ea 54 cd b2 93 ab c7 50 69 39 27 67 72 f8 d5 -.T.....Pi9'gr.. 303s | 02 1c 19 21 6b ad 52 5c 85 79 69 5d 83 ba 26 84 ...!k.R\.yi]..&. 303s | NSS ike_alg_nss_cbc: AES_CBC - enter (nil) 303s | using IKEv1 IV 303s | NSS ike_alg_nss_cbc: AES_CBC - exit 303s | verify_bytes() Encrypting 48 bytes (3 blocks) using AES-CBC with 128-bit key: encrypt: ok 303s | verify_bytes() Encrypting 48 bytes (3 blocks) using AES-CBC with 128-bit key: updated CBC IV: ok 303s | decode_to_mac() IV: : input "0xc782dc4c098c66cbd9cd27d825682c81" 303s | decode_to_mac() output: 303s | c7 82 dc 4c 09 8c 66 cb d9 cd 27 d8 25 68 2c 81 ...L..f...'.%h,. 303s | decode_to_chunk() new IV: : input "0xd0a02b3836451753d493665d33f0e8862dea54cdb293abc7506939276772f8d5021c19216bad525c8579695d83ba2684" 303s | decode_to_chunk() output: 303s | d0 a0 2b 38 36 45 17 53 d4 93 66 5d 33 f0 e8 86 ..+86E.S..f]3... 303s | 2d ea 54 cd b2 93 ab c7 50 69 39 27 67 72 f8 d5 -.T.....Pi9'gr.. 303s | 02 1c 19 21 6b ad 52 5c 85 79 69 5d 83 ba 26 84 ...!k.R\.yi]..&. 303s | decode_to_chunk() ciphertext: : input "0xd0a02b3836451753d493665d33f0e8862dea54cdb293abc7506939276772f8d5021c19216bad525c8579695d83ba2684" 303s | decode_to_chunk() output: 303s | d0 a0 2b 38 36 45 17 53 d4 93 66 5d 33 f0 e8 86 ..+86E.S..f]3... 303s | 2d ea 54 cd b2 93 ab c7 50 69 39 27 67 72 f8 d5 -.T.....Pi9'gr.. 303s | 02 1c 19 21 6b ad 52 5c 85 79 69 5d 83 ba 26 84 ...!k.R\.yi]..&. 303s | decode_to_chunk() plaintext: : input "This is a 48-byte message (exactly 3 AES blocks)" 303s | decode_to_chunk() output: 303s | 54 68 69 73 20 69 73 20 61 20 34 38 2d 62 79 74 This is a 48-byt 303s | 65 20 6d 65 73 73 61 67 65 20 28 65 78 61 63 74 e message (exact 303s | 6c 79 20 33 20 41 45 53 20 62 6c 6f 63 6b 73 29 ly 3 AES blocks) 303s | NSS ike_alg_nss_cbc: AES_CBC - enter (nil) 303s | using IKEv1 IV 303s | NSS ike_alg_nss_cbc: AES_CBC - exit 303s | verify_bytes() Encrypting 48 bytes (3 blocks) using AES-CBC with 128-bit key: decrypt: ok 303s | verify_bytes() Encrypting 48 bytes (3 blocks) using AES-CBC with 128-bit key: updated CBC IV: ok 303s ipsec algparse: Encrypting 64 bytes (4 blocks) using AES-CBC with 128-bit key 303s | decode_to_chunk() raw_key: input "0x56e47a38c5598974bc46903dba290349" 303s | decode_to_chunk() output: 303s | 56 e4 7a 38 c5 59 89 74 bc 46 90 3d ba 29 03 49 V.z8.Y.t.F.=.).I 303s | CONCATENATE_DATA_AND_BASE: 303s | target: EXTRACT_KEY_FROM_KEY 303s | base: base-key@0xc1dc749d4bc0 (16-bytes, AES_KEY_GEN) 303s | params: 16-bytes@0xffffe203ceb0 303s | key-offset: 0, key-size: 16 303s | EXTRACT_KEY_FROM_KEY: 303s | target: AES_CBC 303s | flags: ENCRYPT+DECRYPT 303s | key_size: 16-bytes 303s | base: base-key@0xc1dc749d7c00 (32-bytes, EXTRACT_KEY_FROM_KEY) 303s | operation: FLAGS_ONLY 303s | params: 8-bytes@0xffffe203ceb8 303s | decode_to_mac() IV: : input "0x8ce82eefbea0da3c44699ed7db51b7d9" 303s | decode_to_mac() output: 303s | 8c e8 2e ef be a0 da 3c 44 69 9e d7 db 51 b7 d9 ...........U 303s | decode_to_chunk() plaintext: : input "0xa0a1a2a3a4a5a6a7a8a9aaabacadaeafb0b1b2b3b4b5b6b7b8b9babbbcbdbebfc0c1c2c3c4c5c6c7c8c9cacbcccdcecfd0d1d2d3d4d5d6d7d8d9dadbdcdddedf" 303s | decode_to_chunk() output: 303s | a0 a1 a2 a3 a4 a5 a6 a7 a8 a9 aa ab ac ad ae af ................ 303s | b0 b1 b2 b3 b4 b5 b6 b7 b8 b9 ba bb bc bd be bf ................ 303s | c0 c1 c2 c3 c4 c5 c6 c7 c8 c9 ca cb cc cd ce cf ................ 303s | d0 d1 d2 d3 d4 d5 d6 d7 d8 d9 da db dc dd de df ................ 303s | decode_to_chunk() ciphertext: : input "0xc30e32ffedc0774e6aff6af0869f71aa0f3af07a9a31a9c684db207eb0ef8e4e35907aa632c3ffdf868bb7b29d3d46ad83ce9f9a102ee99d49a53e87f4c3da55" 303s | decode_to_chunk() output: 303s | c3 0e 32 ff ed c0 77 4e 6a ff 6a f0 86 9f 71 aa ..2...wNj.j...q. 303s | 0f 3a f0 7a 9a 31 a9 c6 84 db 20 7e b0 ef 8e 4e .:.z.1.... ~...N 303s | 35 90 7a a6 32 c3 ff df 86 8b b7 b2 9d 3d 46 ad 5.z.2........=F. 303s | 83 ce 9f 9a 10 2e e9 9d 49 a5 3e 87 f4 c3 da 55 ........I.>....U 303s | NSS ike_alg_nss_cbc: AES_CBC - enter (nil) 303s | using IKEv1 IV 303s | NSS ike_alg_nss_cbc: AES_CBC - exit 303s | verify_bytes() Encrypting 64 bytes (4 blocks) using AES-CBC with 128-bit key: encrypt: ok 303s | verify_bytes() Encrypting 64 bytes (4 blocks) using AES-CBC with 128-bit key: updated CBC IV: ok 303s | decode_to_mac() IV: : input "0x8ce82eefbea0da3c44699ed7db51b7d9" 303s | decode_to_mac() output: 303s | 8c e8 2e ef be a0 da 3c 44 69 9e d7 db 51 b7 d9 ...........U 303s | decode_to_chunk() ciphertext: : input "0xc30e32ffedc0774e6aff6af0869f71aa0f3af07a9a31a9c684db207eb0ef8e4e35907aa632c3ffdf868bb7b29d3d46ad83ce9f9a102ee99d49a53e87f4c3da55" 303s | decode_to_chunk() output: 303s | c3 0e 32 ff ed c0 77 4e 6a ff 6a f0 86 9f 71 aa ..2...wNj.j...q. 303s | 0f 3a f0 7a 9a 31 a9 c6 84 db 20 7e b0 ef 8e 4e .:.z.1.... ~...N 303s | 35 90 7a a6 32 c3 ff df 86 8b b7 b2 9d 3d 46 ad 5.z.2........=F. 303s | 83 ce 9f 9a 10 2e e9 9d 49 a5 3e 87 f4 c3 da 55 ........I.>....U 303s | decode_to_chunk() plaintext: : input "0xa0a1a2a3a4a5a6a7a8a9aaabacadaeafb0b1b2b3b4b5b6b7b8b9babbbcbdbebfc0c1c2c3c4c5c6c7c8c9cacbcccdcecfd0d1d2d3d4d5d6d7d8d9dadbdcdddedf" 303s | decode_to_chunk() output: 303s | a0 a1 a2 a3 a4 a5 a6 a7 a8 a9 aa ab ac ad ae af ................ 303s | b0 b1 b2 b3 b4 b5 b6 b7 b8 b9 ba bb bc bd be bf ................ 303s | c0 c1 c2 c3 c4 c5 c6 c7 c8 c9 ca cb cc cd ce cf ................ 303s | d0 d1 d2 d3 d4 d5 d6 d7 d8 d9 da db dc dd de df ................ 303s | NSS ike_alg_nss_cbc: AES_CBC - enter (nil) 303s | using IKEv1 IV 303s | NSS ike_alg_nss_cbc: AES_CBC - exit 303s | verify_bytes() Encrypting 64 bytes (4 blocks) using AES-CBC with 128-bit key: decrypt: ok 303s | verify_bytes() Encrypting 64 bytes (4 blocks) using AES-CBC with 128-bit key: updated CBC IV: ok 303s ipsec algparse: testing AES_XCBC: 303s ipsec algparse: RFC 3566 Test Case 1: AES-XCBC-MAC-96 with 0-byte input 303s | decode_to_chunk() test_prf_vector: input "0x000102030405060708090a0b0c0d0e0f" 303s | decode_to_chunk() output: 303s | 00 01 02 03 04 05 06 07 08 09 0a 0b 0c 0d 0e 0f ................ 303s | decode_to_chunk() test_prf_vector: input "" 303s | decode_to_chunk() output: 303s | 303s | decode_to_chunk() test_prf_vector: input "0x75f0251d528ac01c4573dfd584d79f29" 303s | decode_to_chunk() output: 303s | 75 f0 25 1d 52 8a c0 1c 45 73 df d5 84 d7 9f 29 u.%.R...Es.....) 303s | PRF chunk interface PRF AES_XCBC init key hunk 0xc1dc749d7ff0 (length 16) 303s | 00 01 02 03 04 05 06 07 08 09 0a 0b 0c 0d 0e 0f ................ 303s | CONCATENATE_DATA_AND_BASE: 303s | target: EXTRACT_KEY_FROM_KEY 303s | base: base-key@0xc1dc749d4bc0 (16-bytes, AES_KEY_GEN) 303s | params: 16-bytes@0xffffe203ce00 303s | key-offset: 0, key-size: 16 303s | EXTRACT_KEY_FROM_KEY: 303s | target: EXTRACT_KEY_FROM_KEY 303s | key_size: 16-bytes 303s | base: base-key@0xc1dc749d7c00 (32-bytes, EXTRACT_KEY_FROM_KEY) 303s | operation: FLAGS_ONLY 303s | params: 8-bytes@0xffffe203cda8 303s | XCBC: Key 16=16 just right 303s | key-offset: 0, key-size: 16 303s | EXTRACT_KEY_FROM_KEY: 303s | target: AES_ECB 303s | flags: SIGN 303s | key_size: 16-bytes 303s | base: base-key@0xc1dc749d6510 (16-bytes, EXTRACT_KEY_FROM_KEY) 303s | operation: FLAGS_ONLY 303s | params: 8-bytes@0xffffe203cd58 303s | PRF chunk interface PRF AES_XCBC 0xc1dc749d4b60 303s | PRF chunk interface PRF AES_XCBC update message (0xc1dc749d6430 length 0) 303s | 303s | XCBC: data 303s | 303s | K extracting all 16 bytes of key@0xc1dc749d7c00 303s | K: symkey-key@0xc1dc749d7c00 (16-bytes, AES_ECB) 303s | sizeof bytes 16 303s | wrapper: (SECItemType)1735288172: f4 56 b2 72 40 b5 03 c0 51 38 56 d9 dc 71 2c 27 303s | K extracted len 16 bytes at 0xc1dc749d8880 303s | unwrapped: 303s | 00 01 02 03 04 05 06 07 08 09 0a 0b 0c 0d 0e 0f ................ 303s | XCBC: K: 303s | 00 01 02 03 04 05 06 07 08 09 0a 0b 0c 0d 0e 0f ................ 303s | XCBC: K1 303s | c3 52 80 57 54 23 7f 31 1a c0 ff f4 e3 e0 3e 78 .R.WT#.1......>x 303s | CONCATENATE_DATA_AND_BASE: 303s | target: EXTRACT_KEY_FROM_KEY 303s | base: base-key@0xc1dc749d4bc0 (16-bytes, AES_KEY_GEN) 303s | params: 16-bytes@0xffffe203ccc0 303s | key-offset: 0, key-size: 16 303s | EXTRACT_KEY_FROM_KEY: 303s | target: AES_ECB 303s | flags: SIGN 303s | key_size: 16-bytes 303s | base: base-key@0xc1dc749d8a20 (32-bytes, EXTRACT_KEY_FROM_KEY) 303s | operation: FLAGS_ONLY 303s | params: 8-bytes@0xffffe203ccc8 303s | Computing E[0] using K3 303s | XCBC: K3 303s | c1 a7 ab a1 a2 3a 94 06 58 07 a0 8c c8 ee d0 6e .....:..X......n 303s | XCBC: E[n-1] 303s | 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................ 303s | XCBC: M[n] 303s | 303s | XCBC: M[n] 303s | 303s | XCBC: M[n]:80...^E[n-1]^K3 303s | 41 a7 ab a1 a2 3a 94 06 58 07 a0 8c c8 ee d0 6e A....:..X......n 303s | XCBC: MAC 303s | 75 f0 25 1d 52 8a c0 1c 45 73 df d5 84 d7 9f 29 u.%.R...Es.....) 303s | PRF chunk interface PRF AES_XCBC final length 16 303s | 75 f0 25 1d 52 8a c0 1c 45 73 df d5 84 d7 9f 29 u.%.R...Es.....) 303s | chunk output 303s | 75 f0 25 1d 52 8a c0 1c 45 73 df d5 84 d7 9f 29 u.%.R...Es.....) 303s | verify_bytes() RFC 3566 Test Case 1: AES-XCBC-MAC-96 with 0-byte input: prf OUT: ok 303s | CONCATENATE_DATA_AND_BASE: 303s | target: EXTRACT_KEY_FROM_KEY 303s | base: base-key@0xc1dc749d4bc0 (16-bytes, AES_KEY_GEN) 303s | params: 16-bytes@0xffffe203ce80 303s | key-offset: 0, key-size: 16 303s | EXTRACT_KEY_FROM_KEY: 303s | target: EXTRACT_KEY_FROM_KEY 303s | key_size: 16-bytes 303s | base: base-key@0xc1dc749d6510 (32-bytes, EXTRACT_KEY_FROM_KEY) 303s | operation: FLAGS_ONLY 303s | params: 8-bytes@0xffffe203ce28 303s | PRF symkey interface PRF AES_XCBC init key symkey-key@0xc1dc749d7c00 (size 16) 303s | PRF symkey interface: key symkey-key@0xc1dc749d7c00 (16-bytes, EXTRACT_KEY_FROM_KEY) 303s | XCBC: Key 16=16 just right 303s | key-offset: 0, key-size: 16 303s | EXTRACT_KEY_FROM_KEY: 303s | target: AES_ECB 303s | flags: SIGN 303s | key_size: 16-bytes 303s | base: base-key@0xc1dc749d7c00 (16-bytes, EXTRACT_KEY_FROM_KEY) 303s | operation: FLAGS_ONLY 303s | params: 8-bytes@0xffffe203cd88 303s | PRF symkey interface PRF AES_XCBC 0xc1dc749d4b60 303s | PRF symkey interface PRF AES_XCBC update symkey message-key@(nil) (size 0) 303s | PRF symkey interface: symkey message-key@NULL 303s | symkey message NULL key has no bytes 303s | XCBC: data 303s | 303s | K extracting all 16 bytes of key@0xc1dc749d6510 303s | K: symkey-key@0xc1dc749d6510 (16-bytes, AES_ECB) 303s | sizeof bytes 16 303s | wrapper: (SECItemType)-503068256: f4 56 b2 72 40 b5 03 c0 51 38 56 d9 dc 71 2c 27 303s | K extracted len 16 bytes at 0xc1dc749d8880 303s | unwrapped: 303s | 00 01 02 03 04 05 06 07 08 09 0a 0b 0c 0d 0e 0f ................ 303s | XCBC: K: 303s | 00 01 02 03 04 05 06 07 08 09 0a 0b 0c 0d 0e 0f ................ 303s | XCBC: K1 303s | c3 52 80 57 54 23 7f 31 1a c0 ff f4 e3 e0 3e 78 .R.WT#.1......>x 303s | CONCATENATE_DATA_AND_BASE: 303s | target: EXTRACT_KEY_FROM_KEY 303s | base: base-key@0xc1dc749d4bc0 (16-bytes, AES_KEY_GEN) 303s | params: 16-bytes@0xffffe203cd10 303s | key-offset: 0, key-size: 16 303s | EXTRACT_KEY_FROM_KEY: 303s | target: AES_ECB 303s | flags: SIGN 303s | key_size: 16-bytes 303s | base: base-key@0xc1dc749d8d90 (32-bytes, EXTRACT_KEY_FROM_KEY) 303s | operation: FLAGS_ONLY 303s | params: 8-bytes@0xffffe203cd18 303s | Computing E[0] using K3 303s | XCBC: K3 303s | c1 a7 ab a1 a2 3a 94 06 58 07 a0 8c c8 ee d0 6e .....:..X......n 303s | XCBC: E[n-1] 303s | 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................ 303s | XCBC: M[n] 303s | 303s | XCBC: M[n] 303s | 303s | XCBC: M[n]:80...^E[n-1]^K3 303s | 41 a7 ab a1 a2 3a 94 06 58 07 a0 8c c8 ee d0 6e A....:..X......n 303s | XCBC: MAC 303s | 75 f0 25 1d 52 8a c0 1c 45 73 df d5 84 d7 9f 29 u.%.R...Es.....) 303s | CONCATENATE_DATA_AND_BASE: 303s | target: EXTRACT_KEY_FROM_KEY 303s | base: base-key@0xc1dc749d4bc0 (16-bytes, AES_KEY_GEN) 303s | params: 16-bytes@0xffffe203ce00 303s | key-offset: 0, key-size: 16 303s | EXTRACT_KEY_FROM_KEY: 303s | target: EXTRACT_KEY_FROM_KEY 303s | key_size: 16-bytes 303s | base: base-key@0xc1dc749d8d90 (32-bytes, EXTRACT_KEY_FROM_KEY) 303s | operation: FLAGS_ONLY 303s | params: 8-bytes@0xffffe203cda8 303s | PRF symkey interface PRF AES_XCBC final-key@0xc1dc749d8a20 (size 16) 303s | PRF symkey interface: key-key@0xc1dc749d8a20 (16-bytes, EXTRACT_KEY_FROM_KEY) 303s | output: symkey-key@0xc1dc749d8a20 (16-bytes, EXTRACT_KEY_FROM_KEY) 303s | RFC 3566 Test Case 1: AES-XCBC-MAC-96 with 0-byte input extracting all 16 bytes of key@0xc1dc749d8a20 303s | RFC 3566 Test Case 1: AES-XCBC-MAC-96 with 0-byte input: symkey-key@0xc1dc749d8a20 (16-bytes, EXTRACT_KEY_FROM_KEY) 303s | sizeof bytes 16 303s | wrapper: siBuffer: fb 10 ff c0 b7 2e bb 0a b9 20 c0 d2 5d dc 48 ab 303s | RFC 3566 Test Case 1: AES-XCBC-MAC-96 with 0-byte input extracted len 16 bytes at 0xc1dc749d8a00 303s | unwrapped: 303s | 75 f0 25 1d 52 8a c0 1c 45 73 df d5 84 d7 9f 29 u.%.R...Es.....) 303s | verify_bytes() RFC 3566 Test Case 1: AES-XCBC-MAC-96 with 0-byte input: symkey: ok 303s ipsec algparse: RFC 3566 Test Case 2: AES-XCBC-MAC-96 with 3-byte input 303s | decode_to_chunk() test_prf_vector: input "0x000102030405060708090a0b0c0d0e0f" 303s | decode_to_chunk() output: 303s | 00 01 02 03 04 05 06 07 08 09 0a 0b 0c 0d 0e 0f ................ 303s | decode_to_chunk() test_prf_vector: input "0x000102" 303s | decode_to_chunk() output: 303s | 00 01 02 ... 303s | decode_to_chunk() test_prf_vector: input "0x5b376580ae2f19afe7219ceef172756f" 303s | decode_to_chunk() output: 303s | 5b 37 65 80 ae 2f 19 af e7 21 9c ee f1 72 75 6f [7e../...!...ruo 303s | PRF chunk interface PRF AES_XCBC init key hunk 0xc1dc749d7ff0 (length 16) 303s | 00 01 02 03 04 05 06 07 08 09 0a 0b 0c 0d 0e 0f ................ 303s | CONCATENATE_DATA_AND_BASE: 303s | target: EXTRACT_KEY_FROM_KEY 303s | base: base-key@0xc1dc749d4bc0 (16-bytes, AES_KEY_GEN) 303s | params: 16-bytes@0xffffe203ce00 303s | key-offset: 0, key-size: 16 303s | EXTRACT_KEY_FROM_KEY: 303s | target: EXTRACT_KEY_FROM_KEY 303s | key_size: 16-bytes 303s | base: base-key@0xc1dc749d7c00 (32-bytes, EXTRACT_KEY_FROM_KEY) 303s | operation: FLAGS_ONLY 303s | params: 8-bytes@0xffffe203cda8 303s | XCBC: Key 16=16 just right 303s | key-offset: 0, key-size: 16 303s | EXTRACT_KEY_FROM_KEY: 303s | target: AES_ECB 303s | flags: SIGN 303s | key_size: 16-bytes 303s | base: base-key@0xc1dc749d8a20 (16-bytes, EXTRACT_KEY_FROM_KEY) 303s | operation: FLAGS_ONLY 303s | params: 8-bytes@0xffffe203cd58 303s | PRF chunk interface PRF AES_XCBC 0xc1dc749d4b60 303s | PRF chunk interface PRF AES_XCBC update message (0xc1dc749d6430 length 3) 303s | 00 01 02 ... 303s | XCBC: data 303s | 00 01 02 ... 303s | K extracting all 16 bytes of key@0xc1dc749d7c00 303s | K: symkey-key@0xc1dc749d7c00 (16-bytes, AES_ECB) 303s | sizeof bytes 16 303s | wrapper: (SECItemType)1735288172: f4 56 b2 72 40 b5 03 c0 51 38 56 d9 dc 71 2c 27 303s | K extracted len 16 bytes at 0xc1dc749d8010 303s | unwrapped: 303s | 00 01 02 03 04 05 06 07 08 09 0a 0b 0c 0d 0e 0f ................ 303s | XCBC: K: 303s | 00 01 02 03 04 05 06 07 08 09 0a 0b 0c 0d 0e 0f ................ 303s | XCBC: K1 303s | c3 52 80 57 54 23 7f 31 1a c0 ff f4 e3 e0 3e 78 .R.WT#.1......>x 303s | CONCATENATE_DATA_AND_BASE: 303s | target: EXTRACT_KEY_FROM_KEY 303s | base: base-key@0xc1dc749d4bc0 (16-bytes, AES_KEY_GEN) 303s | params: 16-bytes@0xffffe203ccc0 303s | key-offset: 0, key-size: 16 303s | EXTRACT_KEY_FROM_KEY: 303s | target: AES_ECB 303s | flags: SIGN 303s | key_size: 16-bytes 303s | base: base-key@0xc1dc749d6510 (32-bytes, EXTRACT_KEY_FROM_KEY) 303s | operation: FLAGS_ONLY 303s | params: 8-bytes@0xffffe203ccc8 303s | Computing E[1] using K3 303s | XCBC: K3 303s | c1 a7 ab a1 a2 3a 94 06 58 07 a0 8c c8 ee d0 6e .....:..X......n 303s | XCBC: E[n-1] 303s | 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................ 303s | XCBC: M[n] 303s | 00 01 02 ... 303s | XCBC: M[n] 303s | 00 01 02 ... 303s | XCBC: M[n]:80...^E[n-1]^K3 303s | c1 a6 a9 21 a2 3a 94 06 58 07 a0 8c c8 ee d0 6e ...!.:..X......n 303s | XCBC: MAC 303s | 5b 37 65 80 ae 2f 19 af e7 21 9c ee f1 72 75 6f [7e../...!...ruo 303s | PRF chunk interface PRF AES_XCBC final length 16 303s | 5b 37 65 80 ae 2f 19 af e7 21 9c ee f1 72 75 6f [7e../...!...ruo 303s | chunk output 303s | 5b 37 65 80 ae 2f 19 af e7 21 9c ee f1 72 75 6f [7e../...!...ruo 303s | verify_bytes() RFC 3566 Test Case 2: AES-XCBC-MAC-96 with 3-byte input: prf OUT: ok 303s | CONCATENATE_DATA_AND_BASE: 303s | target: EXTRACT_KEY_FROM_KEY 303s | base: base-key@0xc1dc749d4bc0 (16-bytes, AES_KEY_GEN) 303s | params: 16-bytes@0xffffe203ce80 303s | key-offset: 0, key-size: 16 303s | EXTRACT_KEY_FROM_KEY: 303s | target: EXTRACT_KEY_FROM_KEY 303s | key_size: 16-bytes 303s | base: base-key@0xc1dc749d8a20 (32-bytes, EXTRACT_KEY_FROM_KEY) 303s | operation: FLAGS_ONLY 303s | params: 8-bytes@0xffffe203ce28 303s | PRF symkey interface PRF AES_XCBC init key symkey-key@0xc1dc749d7c00 (size 16) 303s | PRF symkey interface: key symkey-key@0xc1dc749d7c00 (16-bytes, EXTRACT_KEY_FROM_KEY) 303s | XCBC: Key 16=16 just right 303s | key-offset: 0, key-size: 16 303s | EXTRACT_KEY_FROM_KEY: 303s | target: AES_ECB 303s | flags: SIGN 303s | key_size: 16-bytes 303s | base: base-key@0xc1dc749d7c00 (16-bytes, EXTRACT_KEY_FROM_KEY) 303s | operation: FLAGS_ONLY 303s | params: 8-bytes@0xffffe203cd88 303s | PRF symkey interface PRF AES_XCBC 0xc1dc749d4b60 303s | CONCATENATE_DATA_AND_BASE: 303s | target: EXTRACT_KEY_FROM_KEY 303s | base: base-key@0xc1dc749d4bc0 (16-bytes, AES_KEY_GEN) 303s | params: 16-bytes@0xffffe203ce80 303s | key-offset: 0, key-size: 3 303s | EXTRACT_KEY_FROM_KEY: 303s | target: EXTRACT_KEY_FROM_KEY 303s | key_size: 3-bytes 303s | base: base-key@0xc1dc749d8d90 (19-bytes, EXTRACT_KEY_FROM_KEY) 303s | operation: FLAGS_ONLY 303s | params: 8-bytes@0xffffe203ce28 303s | PRF symkey interface PRF AES_XCBC update symkey message-key@0xc1dc749d6510 (size 3) 303s | PRF symkey interface: symkey message-key@0xc1dc749d6510 (3-bytes, EXTRACT_KEY_FROM_KEY) 303s | symkey message extracting all 3 bytes of key@0xc1dc749d6510 303s | symkey message: symkey-key@0xc1dc749d6510 (3-bytes, EXTRACT_KEY_FROM_KEY) 303s | sizeof bytes 16 303s | wrapper: (SECItemType)41: 93 94 a3 8b 9e 78 91 a8 86 98 59 85 b0 6a e1 5d 303s | symkey message extracted len 16 bytes at 0xc1dc749d8010 303s | unwrapped: 303s | 00 01 02 00 00 00 00 00 00 00 00 00 00 00 00 00 ................ 303s | XCBC: data 303s | 00 01 02 ... 303s | K extracting all 16 bytes of key@0xc1dc749d8a20 303s | K: symkey-key@0xc1dc749d8a20 (16-bytes, AES_ECB) 303s | sizeof bytes 16 303s | wrapper: (SECItemType)-503070200: f4 56 b2 72 40 b5 03 c0 51 38 56 d9 dc 71 2c 27 303s | K extracted len 16 bytes at 0xc1dc749d4a80 303s | unwrapped: 303s | 00 01 02 03 04 05 06 07 08 09 0a 0b 0c 0d 0e 0f ................ 303s | XCBC: K: 303s | 00 01 02 03 04 05 06 07 08 09 0a 0b 0c 0d 0e 0f ................ 303s | XCBC: K1 303s | c3 52 80 57 54 23 7f 31 1a c0 ff f4 e3 e0 3e 78 .R.WT#.1......>x 303s | CONCATENATE_DATA_AND_BASE: 303s | target: EXTRACT_KEY_FROM_KEY 303s | base: base-key@0xc1dc749d4bc0 (16-bytes, AES_KEY_GEN) 303s | params: 16-bytes@0xffffe203cd10 303s | key-offset: 0, key-size: 16 303s | EXTRACT_KEY_FROM_KEY: 303s | target: AES_ECB 303s | flags: SIGN 303s | key_size: 16-bytes 303s | base: base-key@0xc1dc749d9120 (32-bytes, EXTRACT_KEY_FROM_KEY) 303s | operation: FLAGS_ONLY 303s | params: 8-bytes@0xffffe203cd18 303s | Computing E[1] using K3 303s | XCBC: K3 303s | c1 a7 ab a1 a2 3a 94 06 58 07 a0 8c c8 ee d0 6e .....:..X......n 303s | XCBC: E[n-1] 303s | 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................ 303s | XCBC: M[n] 303s | 00 01 02 ... 303s | XCBC: M[n] 303s | 00 01 02 ... 303s | XCBC: M[n]:80...^E[n-1]^K3 303s | c1 a6 a9 21 a2 3a 94 06 58 07 a0 8c c8 ee d0 6e ...!.:..X......n 303s | XCBC: MAC 303s | 5b 37 65 80 ae 2f 19 af e7 21 9c ee f1 72 75 6f [7e../...!...ruo 303s | CONCATENATE_DATA_AND_BASE: 303s | target: EXTRACT_KEY_FROM_KEY 303s | base: base-key@0xc1dc749d4bc0 (16-bytes, AES_KEY_GEN) 303s | params: 16-bytes@0xffffe203ce00 303s | key-offset: 0, key-size: 16 303s | EXTRACT_KEY_FROM_KEY: 303s | target: EXTRACT_KEY_FROM_KEY 303s | key_size: 16-bytes 303s | base: base-key@0xc1dc749d9120 (32-bytes, EXTRACT_KEY_FROM_KEY) 303s | operation: FLAGS_ONLY 303s | params: 8-bytes@0xffffe203cda8 303s | PRF symkey interface PRF AES_XCBC final-key@0xc1dc749d8d90 (size 16) 303s | PRF symkey interface: key-key@0xc1dc749d8d90 (16-bytes, EXTRACT_KEY_FROM_KEY) 303s | output: symkey-key@0xc1dc749d8d90 (16-bytes, EXTRACT_KEY_FROM_KEY) 303s | RFC 3566 Test Case 2: AES-XCBC-MAC-96 with 3-byte input extracting all 16 bytes of key@0xc1dc749d8d90 303s | RFC 3566 Test Case 2: AES-XCBC-MAC-96 with 3-byte input: symkey-key@0xc1dc749d8d90 (16-bytes, EXTRACT_KEY_FROM_KEY) 303s | sizeof bytes 16 303s | wrapper: siBuffer: 46 c2 48 c9 3e 20 b7 f9 ad 55 7f 22 41 c5 c2 90 303s | RFC 3566 Test Case 2: AES-XCBC-MAC-96 with 3-byte input extracted len 16 bytes at 0xc1dc749d4a80 303s | unwrapped: 303s | 5b 37 65 80 ae 2f 19 af e7 21 9c ee f1 72 75 6f [7e../...!...ruo 303s | verify_bytes() RFC 3566 Test Case 2: AES-XCBC-MAC-96 with 3-byte input: symkey: ok 303s ipsec algparse: RFC 3566 Test Case 3: AES-XCBC-MAC-96 with 16-byte input 303s | decode_to_chunk() test_prf_vector: input "0x000102030405060708090a0b0c0d0e0f" 303s | decode_to_chunk() output: 303s | 00 01 02 03 04 05 06 07 08 09 0a 0b 0c 0d 0e 0f ................ 303s | decode_to_chunk() test_prf_vector: input "0x000102030405060708090a0b0c0d0e0f" 303s | decode_to_chunk() output: 303s | 00 01 02 03 04 05 06 07 08 09 0a 0b 0c 0d 0e 0f ................ 303s | decode_to_chunk() test_prf_vector: input "0xd2a246fa349b68a79998a4394ff7a263" 303s | decode_to_chunk() output: 303s | d2 a2 46 fa 34 9b 68 a7 99 98 a4 39 4f f7 a2 63 ..F.4.h....9O..c 303s | PRF chunk interface PRF AES_XCBC init key hunk 0xc1dc749d7ff0 (length 16) 303s | 00 01 02 03 04 05 06 07 08 09 0a 0b 0c 0d 0e 0f ................ 303s | CONCATENATE_DATA_AND_BASE: 303s | target: EXTRACT_KEY_FROM_KEY 303s | base: base-key@0xc1dc749d4bc0 (16-bytes, AES_KEY_GEN) 303s | params: 16-bytes@0xffffe203ce00 303s | key-offset: 0, key-size: 16 303s | EXTRACT_KEY_FROM_KEY: 303s | target: EXTRACT_KEY_FROM_KEY 303s | key_size: 16-bytes 303s | base: base-key@0xc1dc749d7c00 (32-bytes, EXTRACT_KEY_FROM_KEY) 303s | operation: FLAGS_ONLY 303s | params: 8-bytes@0xffffe203cda8 303s | XCBC: Key 16=16 just right 303s | key-offset: 0, key-size: 16 303s | EXTRACT_KEY_FROM_KEY: 303s | target: AES_ECB 303s | flags: SIGN 303s | key_size: 16-bytes 303s | base: base-key@0xc1dc749d8d90 (16-bytes, EXTRACT_KEY_FROM_KEY) 303s | operation: FLAGS_ONLY 303s | params: 8-bytes@0xffffe203cd58 303s | PRF chunk interface PRF AES_XCBC 0xc1dc749d4b60 303s | PRF chunk interface PRF AES_XCBC update message (0xc1dc749d6430 length 16) 303s | 00 01 02 03 04 05 06 07 08 09 0a 0b 0c 0d 0e 0f ................ 303s | XCBC: data 303s | 00 01 02 03 04 05 06 07 08 09 0a 0b 0c 0d 0e 0f ................ 303s | K extracting all 16 bytes of key@0xc1dc749d7c00 303s | K: symkey-key@0xc1dc749d7c00 (16-bytes, AES_ECB) 303s | sizeof bytes 16 303s | wrapper: (SECItemType)1735262254: f4 56 b2 72 40 b5 03 c0 51 38 56 d9 dc 71 2c 27 303s | K extracted len 16 bytes at 0xc1dc749d8a00 303s | unwrapped: 303s | 00 01 02 03 04 05 06 07 08 09 0a 0b 0c 0d 0e 0f ................ 303s | XCBC: K: 303s | 00 01 02 03 04 05 06 07 08 09 0a 0b 0c 0d 0e 0f ................ 303s | XCBC: K1 303s | c3 52 80 57 54 23 7f 31 1a c0 ff f4 e3 e0 3e 78 .R.WT#.1......>x 303s | CONCATENATE_DATA_AND_BASE: 303s | target: EXTRACT_KEY_FROM_KEY 303s | base: base-key@0xc1dc749d4bc0 (16-bytes, AES_KEY_GEN) 303s | params: 16-bytes@0xffffe203ccc0 303s | key-offset: 0, key-size: 16 303s | EXTRACT_KEY_FROM_KEY: 303s | target: AES_ECB 303s | flags: SIGN 303s | key_size: 16-bytes 303s | base: base-key@0xc1dc749d6510 (32-bytes, EXTRACT_KEY_FROM_KEY) 303s | operation: FLAGS_ONLY 303s | params: 8-bytes@0xffffe203ccc8 303s | XCBC: Computing E[1] using K2 303s | XCBC: K2 303s | bd 86 2f fb 97 ad 2f b8 f8 b8 91 f6 03 2f 36 cb ../.../....../6. 303s | XCBC: E[n-1] 303s | 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................ 303s | XCBC: M[n] 303s | 00 01 02 03 04 05 06 07 08 09 0a 0b 0c 0d 0e 0f ................ 303s | XCBC: M[n]^E[n-1]^K2 303s | bd 87 2d f8 93 a8 29 bf f0 b1 9b fd 0f 22 38 c4 ..-...)......"8. 303s | XCBC: MAC 303s | d2 a2 46 fa 34 9b 68 a7 99 98 a4 39 4f f7 a2 63 ..F.4.h....9O..c 303s | PRF chunk interface PRF AES_XCBC final length 16 303s | d2 a2 46 fa 34 9b 68 a7 99 98 a4 39 4f f7 a2 63 ..F.4.h....9O..c 303s | chunk output 303s | d2 a2 46 fa 34 9b 68 a7 99 98 a4 39 4f f7 a2 63 ..F.4.h....9O..c 303s | verify_bytes() RFC 3566 Test Case 3: AES-XCBC-MAC-96 with 16-byte input: prf OUT: ok 303s | CONCATENATE_DATA_AND_BASE: 303s | target: EXTRACT_KEY_FROM_KEY 303s | base: base-key@0xc1dc749d4bc0 (16-bytes, AES_KEY_GEN) 303s | params: 16-bytes@0xffffe203ce80 303s | key-offset: 0, key-size: 16 303s | EXTRACT_KEY_FROM_KEY: 303s | target: EXTRACT_KEY_FROM_KEY 303s | key_size: 16-bytes 303s | base: base-key@0xc1dc749d8d90 (32-bytes, EXTRACT_KEY_FROM_KEY) 303s | operation: FLAGS_ONLY 303s | params: 8-bytes@0xffffe203ce28 303s | PRF symkey interface PRF AES_XCBC init key symkey-key@0xc1dc749d7c00 (size 16) 303s | PRF symkey interface: key symkey-key@0xc1dc749d7c00 (16-bytes, EXTRACT_KEY_FROM_KEY) 303s | XCBC: Key 16=16 just right 303s | key-offset: 0, key-size: 16 303s | EXTRACT_KEY_FROM_KEY: 303s | target: AES_ECB 303s | flags: SIGN 303s | key_size: 16-bytes 303s | base: base-key@0xc1dc749d7c00 (16-bytes, EXTRACT_KEY_FROM_KEY) 303s | operation: FLAGS_ONLY 303s | params: 8-bytes@0xffffe203cd88 303s | PRF symkey interface PRF AES_XCBC 0xc1dc749d4b60 303s | CONCATENATE_DATA_AND_BASE: 303s | target: EXTRACT_KEY_FROM_KEY 303s | base: base-key@0xc1dc749d4bc0 (16-bytes, AES_KEY_GEN) 303s | params: 16-bytes@0xffffe203ce80 303s | key-offset: 0, key-size: 16 303s | EXTRACT_KEY_FROM_KEY: 303s | target: EXTRACT_KEY_FROM_KEY 303s | key_size: 16-bytes 303s | base: base-key@0xc1dc749d8a20 (32-bytes, EXTRACT_KEY_FROM_KEY) 303s | operation: FLAGS_ONLY 303s | params: 8-bytes@0xffffe203ce28 303s | PRF symkey interface PRF AES_XCBC update symkey message-key@0xc1dc749d6510 (size 16) 303s | PRF symkey interface: symkey message-key@0xc1dc749d6510 (16-bytes, EXTRACT_KEY_FROM_KEY) 303s | symkey message extracting all 16 bytes of key@0xc1dc749d6510 303s | symkey message: symkey-key@0xc1dc749d6510 (16-bytes, EXTRACT_KEY_FROM_KEY) 303s | sizeof bytes 16 303s | wrapper: (SECItemType)41: f4 56 b2 72 40 b5 03 c0 51 38 56 d9 dc 71 2c 27 303s | symkey message extracted len 16 bytes at 0xc1dc749d8a00 303s | unwrapped: 303s | 00 01 02 03 04 05 06 07 08 09 0a 0b 0c 0d 0e 0f ................ 303s | XCBC: data 303s | 00 01 02 03 04 05 06 07 08 09 0a 0b 0c 0d 0e 0f ................ 303s | K extracting all 16 bytes of key@0xc1dc749d8d90 303s | K: symkey-key@0xc1dc749d8d90 (16-bytes, AES_ECB) 303s | sizeof bytes 16 303s | wrapper: (SECItemType)-503070200: f4 56 b2 72 40 b5 03 c0 51 38 56 d9 dc 71 2c 27 303s | K extracted len 16 bytes at 0xc1dc749d48c0 303s | unwrapped: 303s | 00 01 02 03 04 05 06 07 08 09 0a 0b 0c 0d 0e 0f ................ 303s | XCBC: K: 303s | 00 01 02 03 04 05 06 07 08 09 0a 0b 0c 0d 0e 0f ................ 303s | XCBC: K1 303s | c3 52 80 57 54 23 7f 31 1a c0 ff f4 e3 e0 3e 78 .R.WT#.1......>x 303s | CONCATENATE_DATA_AND_BASE: 303s | target: EXTRACT_KEY_FROM_KEY 303s | base: base-key@0xc1dc749d4bc0 (16-bytes, AES_KEY_GEN) 303s | params: 16-bytes@0xffffe203cd10 303s | key-offset: 0, key-size: 16 303s | EXTRACT_KEY_FROM_KEY: 303s | target: AES_ECB 303s | flags: SIGN 303s | key_size: 16-bytes 303s | base: base-key@0xc1dc749d9120 (32-bytes, EXTRACT_KEY_FROM_KEY) 303s | operation: FLAGS_ONLY 303s | params: 8-bytes@0xffffe203cd18 303s | XCBC: Computing E[1] using K2 303s | XCBC: K2 303s | bd 86 2f fb 97 ad 2f b8 f8 b8 91 f6 03 2f 36 cb ../.../....../6. 303s | XCBC: E[n-1] 303s | 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................ 303s | XCBC: M[n] 303s | 00 01 02 03 04 05 06 07 08 09 0a 0b 0c 0d 0e 0f ................ 303s | XCBC: M[n]^E[n-1]^K2 303s | bd 87 2d f8 93 a8 29 bf f0 b1 9b fd 0f 22 38 c4 ..-...)......"8. 303s | XCBC: MAC 303s | d2 a2 46 fa 34 9b 68 a7 99 98 a4 39 4f f7 a2 63 ..F.4.h....9O..c 303s | CONCATENATE_DATA_AND_BASE: 303s | target: EXTRACT_KEY_FROM_KEY 303s | base: base-key@0xc1dc749d4bc0 (16-bytes, AES_KEY_GEN) 303s | params: 16-bytes@0xffffe203ce00 303s | key-offset: 0, key-size: 16 303s | EXTRACT_KEY_FROM_KEY: 303s | target: EXTRACT_KEY_FROM_KEY 303s | key_size: 16-bytes 303s | base: base-key@0xc1dc749d9120 (32-bytes, EXTRACT_KEY_FROM_KEY) 303s | operation: FLAGS_ONLY 303s | params: 8-bytes@0xffffe203cda8 303s | PRF symkey interface PRF AES_XCBC final-key@0xc1dc749d8a20 (size 16) 303s | PRF symkey interface: key-key@0xc1dc749d8a20 (16-bytes, EXTRACT_KEY_FROM_KEY) 303s | output: symkey-key@0xc1dc749d8a20 (16-bytes, EXTRACT_KEY_FROM_KEY) 303s | RFC 3566 Test Case 3: AES-XCBC-MAC-96 with 16-byte input extracting all 16 bytes of key@0xc1dc749d8a20 303s | RFC 3566 Test Case 3: AES-XCBC-MAC-96 with 16-byte input: symkey-key@0xc1dc749d8a20 (16-bytes, EXTRACT_KEY_FROM_KEY) 303s | sizeof bytes 16 303s | wrapper: siBuffer: 0c 3e f2 3d e2 c4 8d 82 71 ba 12 48 df a0 6b d5 303s | RFC 3566 Test Case 3: AES-XCBC-MAC-96 with 16-byte input extracted len 16 bytes at 0xc1dc749d48c0 303s | unwrapped: 303s | d2 a2 46 fa 34 9b 68 a7 99 98 a4 39 4f f7 a2 63 ..F.4.h....9O..c 303s | verify_bytes() RFC 3566 Test Case 3: AES-XCBC-MAC-96 with 16-byte input: symkey: ok 303s ipsec algparse: RFC 3566 Test Case 4: AES-XCBC-MAC-96 with 20-byte input 303s | decode_to_chunk() test_prf_vector: input "0x000102030405060708090a0b0c0d0e0f" 303s | decode_to_chunk() output: 303s | 00 01 02 03 04 05 06 07 08 09 0a 0b 0c 0d 0e 0f ................ 303s | decode_to_chunk() test_prf_vector: input "0x000102030405060708090a0b0c0d0e0f10111213" 303s | decode_to_chunk() output: 303s | 00 01 02 03 04 05 06 07 08 09 0a 0b 0c 0d 0e 0f ................ 303s | 10 11 12 13 .... 303s | decode_to_chunk() test_prf_vector: input "0x47f51b4564966215b8985c63055ed308" 303s | decode_to_chunk() output: 303s | 47 f5 1b 45 64 96 62 15 b8 98 5c 63 05 5e d3 08 G..Ed.b...\c.^.. 303s | PRF chunk interface PRF AES_XCBC init key hunk 0xc1dc749d7ff0 (length 16) 303s | 00 01 02 03 04 05 06 07 08 09 0a 0b 0c 0d 0e 0f ................ 303s | CONCATENATE_DATA_AND_BASE: 303s | target: EXTRACT_KEY_FROM_KEY 303s | base: base-key@0xc1dc749d4bc0 (16-bytes, AES_KEY_GEN) 303s | params: 16-bytes@0xffffe203ce00 303s | key-offset: 0, key-size: 16 303s | EXTRACT_KEY_FROM_KEY: 303s | target: EXTRACT_KEY_FROM_KEY 303s | key_size: 16-bytes 303s | base: base-key@0xc1dc749d7c00 (32-bytes, EXTRACT_KEY_FROM_KEY) 303s | operation: FLAGS_ONLY 303s | params: 8-bytes@0xffffe203cda8 303s | XCBC: Key 16=16 just right 303s | key-offset: 0, key-size: 16 303s | EXTRACT_KEY_FROM_KEY: 303s | target: AES_ECB 303s | flags: SIGN 303s | key_size: 16-bytes 303s | base: base-key@0xc1dc749d8a20 (16-bytes, EXTRACT_KEY_FROM_KEY) 303s | operation: FLAGS_ONLY 303s | params: 8-bytes@0xffffe203cd58 303s | PRF chunk interface PRF AES_XCBC 0xc1dc749d4b60 303s | PRF chunk interface PRF AES_XCBC update message (0xc1dc749d6430 length 20) 303s | 00 01 02 03 04 05 06 07 08 09 0a 0b 0c 0d 0e 0f ................ 303s | 10 11 12 13 .... 303s | XCBC: data 303s | 00 01 02 03 04 05 06 07 08 09 0a 0b 0c 0d 0e 0f ................ 303s | 10 11 12 13 .... 303s | K extracting all 16 bytes of key@0xc1dc749d7c00 303s | K: symkey-key@0xc1dc749d7c00 (16-bytes, AES_ECB) 303s | sizeof bytes 16 303s | wrapper: (SECItemType)1735262254: f4 56 b2 72 40 b5 03 c0 51 38 56 d9 dc 71 2c 27 303s | K extracted len 16 bytes at 0xc1dc749d4a80 303s | unwrapped: 303s | 00 01 02 03 04 05 06 07 08 09 0a 0b 0c 0d 0e 0f ................ 303s | XCBC: K: 303s | 00 01 02 03 04 05 06 07 08 09 0a 0b 0c 0d 0e 0f ................ 303s | XCBC: K1 303s | c3 52 80 57 54 23 7f 31 1a c0 ff f4 e3 e0 3e 78 .R.WT#.1......>x 303s | CONCATENATE_DATA_AND_BASE: 303s | target: EXTRACT_KEY_FROM_KEY 303s | base: base-key@0xc1dc749d4bc0 (16-bytes, AES_KEY_GEN) 303s | params: 16-bytes@0xffffe203ccc0 303s | key-offset: 0, key-size: 16 303s | EXTRACT_KEY_FROM_KEY: 303s | target: AES_ECB 303s | flags: SIGN 303s | key_size: 16-bytes 303s | base: base-key@0xc1dc749d6510 (32-bytes, EXTRACT_KEY_FROM_KEY) 303s | operation: FLAGS_ONLY 303s | params: 8-bytes@0xffffe203ccc8 303s | Computing E[2] using K3 303s | XCBC: K3 303s | c1 a7 ab a1 a2 3a 94 06 58 07 a0 8c c8 ee d0 6e .....:..X......n 303s | XCBC: E[n-1] 303s | 1d 04 48 fa cf 4d 9c 6f 55 b9 93 da 09 80 3d b3 ..H..M.oU.....=. 303s | XCBC: M[n] 303s | 10 11 12 13 .... 303s | XCBC: M[n] 303s | 10 11 12 13 .... 303s | XCBC: M[n]:80...^E[n-1]^K3 303s | cc b2 f1 48 ed 77 08 69 0d be 33 56 c1 6e ed dd ...H.w.i..3V.n.. 303s | XCBC: MAC 303s | 47 f5 1b 45 64 96 62 15 b8 98 5c 63 05 5e d3 08 G..Ed.b...\c.^.. 303s | PRF chunk interface PRF AES_XCBC final length 16 303s | 47 f5 1b 45 64 96 62 15 b8 98 5c 63 05 5e d3 08 G..Ed.b...\c.^.. 303s | chunk output 303s | 47 f5 1b 45 64 96 62 15 b8 98 5c 63 05 5e d3 08 G..Ed.b...\c.^.. 303s | verify_bytes() RFC 3566 Test Case 4: AES-XCBC-MAC-96 with 20-byte input: prf OUT: ok 303s | CONCATENATE_DATA_AND_BASE: 303s | target: EXTRACT_KEY_FROM_KEY 303s | base: base-key@0xc1dc749d4bc0 (16-bytes, AES_KEY_GEN) 303s | params: 16-bytes@0xffffe203ce80 303s | key-offset: 0, key-size: 16 303s | EXTRACT_KEY_FROM_KEY: 303s | target: EXTRACT_KEY_FROM_KEY 303s | key_size: 16-bytes 303s | base: base-key@0xc1dc749d8a20 (32-bytes, EXTRACT_KEY_FROM_KEY) 303s | operation: FLAGS_ONLY 303s | params: 8-bytes@0xffffe203ce28 303s | PRF symkey interface PRF AES_XCBC init key symkey-key@0xc1dc749d7c00 (size 16) 303s | PRF symkey interface: key symkey-key@0xc1dc749d7c00 (16-bytes, EXTRACT_KEY_FROM_KEY) 303s | XCBC: Key 16=16 just right 303s | key-offset: 0, key-size: 16 303s | EXTRACT_KEY_FROM_KEY: 303s | target: AES_ECB 303s | flags: SIGN 303s | key_size: 16-bytes 303s | base: base-key@0xc1dc749d7c00 (16-bytes, EXTRACT_KEY_FROM_KEY) 303s | operation: FLAGS_ONLY 303s | params: 8-bytes@0xffffe203cd88 303s | PRF symkey interface PRF AES_XCBC 0xc1dc749d4b60 303s | CONCATENATE_DATA_AND_BASE: 303s | target: EXTRACT_KEY_FROM_KEY 303s | base: base-key@0xc1dc749d4bc0 (16-bytes, AES_KEY_GEN) 303s | params: 16-bytes@0xffffe203ce80 303s | key-offset: 0, key-size: 20 303s | EXTRACT_KEY_FROM_KEY: 303s | target: EXTRACT_KEY_FROM_KEY 303s | key_size: 20-bytes 303s | base: base-key@0xc1dc749d8d90 (36-bytes, EXTRACT_KEY_FROM_KEY) 303s | operation: FLAGS_ONLY 303s | params: 8-bytes@0xffffe203ce28 303s | PRF symkey interface PRF AES_XCBC update symkey message-key@0xc1dc749d6510 (size 20) 303s | PRF symkey interface: symkey message-key@0xc1dc749d6510 (20-bytes, EXTRACT_KEY_FROM_KEY) 303s | symkey message extracting all 20 bytes of key@0xc1dc749d6510 303s | symkey message: symkey-key@0xc1dc749d6510 (20-bytes, EXTRACT_KEY_FROM_KEY) 303s | sizeof bytes 32 303s | wrapper: (SECItemType)41: f4 56 b2 72 40 b5 03 c0 51 38 56 d9 dc 71 2c 27 05 24 53 15 31 9e 81 80 4c 1f c7 14 03 c6 fb 29 303s | symkey message extracted len 32 bytes at 0xc1dc749d85f0 303s | unwrapped: 303s | 00 01 02 03 04 05 06 07 08 09 0a 0b 0c 0d 0e 0f ................ 303s | 10 11 12 13 00 00 00 00 00 00 00 00 00 00 00 00 ................ 303s | XCBC: data 303s | 00 01 02 03 04 05 06 07 08 09 0a 0b 0c 0d 0e 0f ................ 303s | 10 11 12 13 .... 303s | K extracting all 16 bytes of key@0xc1dc749d8a20 303s | K: symkey-key@0xc1dc749d8a20 (16-bytes, AES_ECB) 303s | sizeof bytes 16 303s | wrapper: (SECItemType)-503070408: f4 56 b2 72 40 b5 03 c0 51 38 56 d9 dc 71 2c 27 303s | K extracted len 16 bytes at 0xc1dc749d8880 303s | unwrapped: 303s | 00 01 02 03 04 05 06 07 08 09 0a 0b 0c 0d 0e 0f ................ 303s | XCBC: K: 303s | 00 01 02 03 04 05 06 07 08 09 0a 0b 0c 0d 0e 0f ................ 303s | XCBC: K1 303s | c3 52 80 57 54 23 7f 31 1a c0 ff f4 e3 e0 3e 78 .R.WT#.1......>x 303s | CONCATENATE_DATA_AND_BASE: 303s | target: EXTRACT_KEY_FROM_KEY 303s | base: base-key@0xc1dc749d4bc0 (16-bytes, AES_KEY_GEN) 303s | params: 16-bytes@0xffffe203cd10 303s | key-offset: 0, key-size: 16 303s | EXTRACT_KEY_FROM_KEY: 303s | target: AES_ECB 303s | flags: SIGN 303s | key_size: 16-bytes 303s | base: base-key@0xc1dc749d9120 (32-bytes, EXTRACT_KEY_FROM_KEY) 303s | operation: FLAGS_ONLY 303s | params: 8-bytes@0xffffe203cd18 303s | Computing E[2] using K3 303s | XCBC: K3 303s | c1 a7 ab a1 a2 3a 94 06 58 07 a0 8c c8 ee d0 6e .....:..X......n 303s | XCBC: E[n-1] 303s | 1d 04 48 fa cf 4d 9c 6f 55 b9 93 da 09 80 3d b3 ..H..M.oU.....=. 303s | XCBC: M[n] 303s | 10 11 12 13 .... 303s | XCBC: M[n] 303s | 10 11 12 13 .... 303s | XCBC: M[n]:80...^E[n-1]^K3 303s | cc b2 f1 48 ed 77 08 69 0d be 33 56 c1 6e ed dd ...H.w.i..3V.n.. 303s | XCBC: MAC 303s | 47 f5 1b 45 64 96 62 15 b8 98 5c 63 05 5e d3 08 G..Ed.b...\c.^.. 303s | CONCATENATE_DATA_AND_BASE: 303s | target: EXTRACT_KEY_FROM_KEY 303s | base: base-key@0xc1dc749d4bc0 (16-bytes, AES_KEY_GEN) 303s | params: 16-bytes@0xffffe203ce00 303s | key-offset: 0, key-size: 16 303s | EXTRACT_KEY_FROM_KEY: 303s | target: EXTRACT_KEY_FROM_KEY 303s | key_size: 16-bytes 303s | base: base-key@0xc1dc749d9120 (32-bytes, EXTRACT_KEY_FROM_KEY) 303s | operation: FLAGS_ONLY 303s | params: 8-bytes@0xffffe203cda8 303s | PRF symkey interface PRF AES_XCBC final-key@0xc1dc749d8d90 (size 16) 303s | PRF symkey interface: key-key@0xc1dc749d8d90 (16-bytes, EXTRACT_KEY_FROM_KEY) 303s | output: symkey-key@0xc1dc749d8d90 (16-bytes, EXTRACT_KEY_FROM_KEY) 303s | RFC 3566 Test Case 4: AES-XCBC-MAC-96 with 20-byte input extracting all 16 bytes of key@0xc1dc749d8d90 303s | RFC 3566 Test Case 4: AES-XCBC-MAC-96 with 20-byte input: symkey-key@0xc1dc749d8d90 (16-bytes, EXTRACT_KEY_FROM_KEY) 303s | sizeof bytes 16 303s | wrapper: siBuffer: 41 3a 6d 7a f7 68 9f 73 96 d1 14 64 05 0e ad 29 303s | RFC 3566 Test Case 4: AES-XCBC-MAC-96 with 20-byte input extracted len 16 bytes at 0xc1dc749d8880 303s | unwrapped: 303s | 47 f5 1b 45 64 96 62 15 b8 98 5c 63 05 5e d3 08 G..Ed.b...\c.^.. 303s | verify_bytes() RFC 3566 Test Case 4: AES-XCBC-MAC-96 with 20-byte input: symkey: ok 303s ipsec algparse: RFC 3566 Test Case 5: AES-XCBC-MAC-96 with 32-byte input 303s | decode_to_chunk() test_prf_vector: input "0x000102030405060708090a0b0c0d0e0f" 303s | decode_to_chunk() output: 303s | 00 01 02 03 04 05 06 07 08 09 0a 0b 0c 0d 0e 0f ................ 303s | decode_to_chunk() test_prf_vector: input "0x000102030405060708090a0b0c0d0e0f101112131415161718191a1b1c1d1e1f" 303s | decode_to_chunk() output: 303s | 00 01 02 03 04 05 06 07 08 09 0a 0b 0c 0d 0e 0f ................ 303s | 10 11 12 13 14 15 16 17 18 19 1a 1b 1c 1d 1e 1f ................ 303s | decode_to_chunk() test_prf_vector: input "0xf54f0ec8d2b9f3d36807734bd5283fd4" 303s | decode_to_chunk() output: 303s | f5 4f 0e c8 d2 b9 f3 d3 68 07 73 4b d5 28 3f d4 .O......h.sK.(?. 303s | PRF chunk interface PRF AES_XCBC init key hunk 0xc1dc749d7ff0 (length 16) 303s | 00 01 02 03 04 05 06 07 08 09 0a 0b 0c 0d 0e 0f ................ 303s | CONCATENATE_DATA_AND_BASE: 303s | target: EXTRACT_KEY_FROM_KEY 303s | base: base-key@0xc1dc749d4bc0 (16-bytes, AES_KEY_GEN) 303s | params: 16-bytes@0xffffe203ce00 303s | key-offset: 0, key-size: 16 303s | EXTRACT_KEY_FROM_KEY: 303s | target: EXTRACT_KEY_FROM_KEY 303s | key_size: 16-bytes 303s | base: base-key@0xc1dc749d7c00 (32-bytes, EXTRACT_KEY_FROM_KEY) 303s | operation: FLAGS_ONLY 303s | params: 8-bytes@0xffffe203cda8 303s | XCBC: Key 16=16 just right 303s | key-offset: 0, key-size: 16 303s | EXTRACT_KEY_FROM_KEY: 303s | target: AES_ECB 303s | flags: SIGN 303s | key_size: 16-bytes 303s | base: base-key@0xc1dc749d8d90 (16-bytes, EXTRACT_KEY_FROM_KEY) 303s | operation: FLAGS_ONLY 303s | params: 8-bytes@0xffffe203cd58 303s | PRF chunk interface PRF AES_XCBC 0xc1dc749d85f0 303s | PRF chunk interface PRF AES_XCBC update message (0xc1dc749d4b60 length 32) 303s | 00 01 02 03 04 05 06 07 08 09 0a 0b 0c 0d 0e 0f ................ 303s | 10 11 12 13 14 15 16 17 18 19 1a 1b 1c 1d 1e 1f ................ 303s | XCBC: data 303s | 00 01 02 03 04 05 06 07 08 09 0a 0b 0c 0d 0e 0f ................ 303s | 10 11 12 13 14 15 16 17 18 19 1a 1b 1c 1d 1e 1f ................ 303s | K extracting all 16 bytes of key@0xc1dc749d7c00 303s | K: symkey-key@0xc1dc749d7c00 (16-bytes, AES_ECB) 303s | sizeof bytes 16 303s | wrapper: (SECItemType)1735262254: f4 56 b2 72 40 b5 03 c0 51 38 56 d9 dc 71 2c 27 303s | K extracted len 16 bytes at 0xc1dc749d8a00 303s | unwrapped: 303s | 00 01 02 03 04 05 06 07 08 09 0a 0b 0c 0d 0e 0f ................ 303s | XCBC: K: 303s | 00 01 02 03 04 05 06 07 08 09 0a 0b 0c 0d 0e 0f ................ 303s | XCBC: K1 303s | c3 52 80 57 54 23 7f 31 1a c0 ff f4 e3 e0 3e 78 .R.WT#.1......>x 303s | CONCATENATE_DATA_AND_BASE: 303s | target: EXTRACT_KEY_FROM_KEY 303s | base: base-key@0xc1dc749d4bc0 (16-bytes, AES_KEY_GEN) 303s | params: 16-bytes@0xffffe203ccc0 303s | key-offset: 0, key-size: 16 303s | EXTRACT_KEY_FROM_KEY: 303s | target: AES_ECB 303s | flags: SIGN 303s | key_size: 16-bytes 303s | base: base-key@0xc1dc749d6510 (32-bytes, EXTRACT_KEY_FROM_KEY) 303s | operation: FLAGS_ONLY 303s | params: 8-bytes@0xffffe203ccc8 303s | XCBC: Computing E[2] using K2 303s | XCBC: K2 303s | bd 86 2f fb 97 ad 2f b8 f8 b8 91 f6 03 2f 36 cb ../.../....../6. 303s | XCBC: E[n-1] 303s | 1d 04 48 fa cf 4d 9c 6f 55 b9 93 da 09 80 3d b3 ..H..M.oU.....=. 303s | XCBC: M[n] 303s | 10 11 12 13 14 15 16 17 18 19 1a 1b 1c 1d 1e 1f ................ 303s | XCBC: M[n]^E[n-1]^K2 303s | b0 93 75 12 4c f5 a5 c0 b5 18 18 37 16 b2 15 67 ..u.L......7...g 303s | XCBC: MAC 303s | f5 4f 0e c8 d2 b9 f3 d3 68 07 73 4b d5 28 3f d4 .O......h.sK.(?. 303s | PRF chunk interface PRF AES_XCBC final length 16 303s | f5 4f 0e c8 d2 b9 f3 d3 68 07 73 4b d5 28 3f d4 .O......h.sK.(?. 303s | chunk output 303s | f5 4f 0e c8 d2 b9 f3 d3 68 07 73 4b d5 28 3f d4 .O......h.sK.(?. 303s | verify_bytes() RFC 3566 Test Case 5: AES-XCBC-MAC-96 with 32-byte input: prf OUT: ok 303s | CONCATENATE_DATA_AND_BASE: 303s | target: EXTRACT_KEY_FROM_KEY 303s | base: base-key@0xc1dc749d4bc0 (16-bytes, AES_KEY_GEN) 303s | params: 16-bytes@0xffffe203ce80 303s | key-offset: 0, key-size: 16 303s | EXTRACT_KEY_FROM_KEY: 303s | target: EXTRACT_KEY_FROM_KEY 303s | key_size: 16-bytes 303s | base: base-key@0xc1dc749d8d90 (32-bytes, EXTRACT_KEY_FROM_KEY) 303s | operation: FLAGS_ONLY 303s | params: 8-bytes@0xffffe203ce28 303s | PRF symkey interface PRF AES_XCBC init key symkey-key@0xc1dc749d7c00 (size 16) 303s | PRF symkey interface: key symkey-key@0xc1dc749d7c00 (16-bytes, EXTRACT_KEY_FROM_KEY) 303s | XCBC: Key 16=16 just right 303s | key-offset: 0, key-size: 16 303s | EXTRACT_KEY_FROM_KEY: 303s | target: AES_ECB 303s | flags: SIGN 303s | key_size: 16-bytes 303s | base: base-key@0xc1dc749d7c00 (16-bytes, EXTRACT_KEY_FROM_KEY) 303s | operation: FLAGS_ONLY 303s | params: 8-bytes@0xffffe203cd88 303s | PRF symkey interface PRF AES_XCBC 0xc1dc749d85f0 303s | CONCATENATE_DATA_AND_BASE: 303s | target: EXTRACT_KEY_FROM_KEY 303s | base: base-key@0xc1dc749d4bc0 (16-bytes, AES_KEY_GEN) 303s | params: 16-bytes@0xffffe203ce80 303s | key-offset: 0, key-size: 32 303s | EXTRACT_KEY_FROM_KEY: 303s | target: EXTRACT_KEY_FROM_KEY 303s | key_size: 32-bytes 303s | base: base-key@0xc1dc749d8a20 (48-bytes, EXTRACT_KEY_FROM_KEY) 303s | operation: FLAGS_ONLY 303s | params: 8-bytes@0xffffe203ce28 303s | PRF symkey interface PRF AES_XCBC update symkey message-key@0xc1dc749d6510 (size 32) 303s | PRF symkey interface: symkey message-key@0xc1dc749d6510 (32-bytes, EXTRACT_KEY_FROM_KEY) 303s | symkey message extracting all 32 bytes of key@0xc1dc749d6510 303s | symkey message: symkey-key@0xc1dc749d6510 (32-bytes, EXTRACT_KEY_FROM_KEY) 303s | sizeof bytes 32 303s | wrapper: (SECItemType)41: f4 56 b2 72 40 b5 03 c0 51 38 56 d9 dc 71 2c 27 1e 20 32 5a 54 2d 82 43 07 bc d7 5d c1 d6 9d e9 303s | symkey message extracted len 32 bytes at 0xc1dc749d9360 303s | unwrapped: 303s | 00 01 02 03 04 05 06 07 08 09 0a 0b 0c 0d 0e 0f ................ 303s | 10 11 12 13 14 15 16 17 18 19 1a 1b 1c 1d 1e 1f ................ 303s | XCBC: data 303s | 00 01 02 03 04 05 06 07 08 09 0a 0b 0c 0d 0e 0f ................ 303s | 10 11 12 13 14 15 16 17 18 19 1a 1b 1c 1d 1e 1f ................ 303s | K extracting all 16 bytes of key@0xc1dc749d8d90 303s | K: symkey-key@0xc1dc749d8d90 (16-bytes, AES_ECB) 303s | sizeof bytes 16 303s | wrapper: (SECItemType)-503070408: f4 56 b2 72 40 b5 03 c0 51 38 56 d9 dc 71 2c 27 303s | K extracted len 16 bytes at 0xc1dc749d8250 303s | unwrapped: 303s | 00 01 02 03 04 05 06 07 08 09 0a 0b 0c 0d 0e 0f ................ 303s | XCBC: K: 303s | 00 01 02 03 04 05 06 07 08 09 0a 0b 0c 0d 0e 0f ................ 303s | XCBC: K1 303s | c3 52 80 57 54 23 7f 31 1a c0 ff f4 e3 e0 3e 78 .R.WT#.1......>x 303s | CONCATENATE_DATA_AND_BASE: 303s | target: EXTRACT_KEY_FROM_KEY 303s | base: base-key@0xc1dc749d4bc0 (16-bytes, AES_KEY_GEN) 303s | params: 16-bytes@0xffffe203cd10 303s | key-offset: 0, key-size: 16 303s | EXTRACT_KEY_FROM_KEY: 303s | target: AES_ECB 303s | flags: SIGN 303s | key_size: 16-bytes 303s | base: base-key@0xc1dc749d9120 (32-bytes, EXTRACT_KEY_FROM_KEY) 303s | operation: FLAGS_ONLY 303s | params: 8-bytes@0xffffe203cd18 303s | XCBC: Computing E[2] using K2 303s | XCBC: K2 303s | bd 86 2f fb 97 ad 2f b8 f8 b8 91 f6 03 2f 36 cb ../.../....../6. 303s | XCBC: E[n-1] 303s | 1d 04 48 fa cf 4d 9c 6f 55 b9 93 da 09 80 3d b3 ..H..M.oU.....=. 303s | XCBC: M[n] 303s | 10 11 12 13 14 15 16 17 18 19 1a 1b 1c 1d 1e 1f ................ 303s | XCBC: M[n]^E[n-1]^K2 303s | b0 93 75 12 4c f5 a5 c0 b5 18 18 37 16 b2 15 67 ..u.L......7...g 303s | XCBC: MAC 303s | f5 4f 0e c8 d2 b9 f3 d3 68 07 73 4b d5 28 3f d4 .O......h.sK.(?. 303s | CONCATENATE_DATA_AND_BASE: 303s | target: EXTRACT_KEY_FROM_KEY 303s | base: base-key@0xc1dc749d4bc0 (16-bytes, AES_KEY_GEN) 303s | params: 16-bytes@0xffffe203ce00 303s | key-offset: 0, key-size: 16 303s | EXTRACT_KEY_FROM_KEY: 303s | target: EXTRACT_KEY_FROM_KEY 303s | key_size: 16-bytes 303s | base: base-key@0xc1dc749d9120 (32-bytes, EXTRACT_KEY_FROM_KEY) 303s | operation: FLAGS_ONLY 303s | params: 8-bytes@0xffffe203cda8 303s | PRF symkey interface PRF AES_XCBC final-key@0xc1dc749d8a20 (size 16) 303s | PRF symkey interface: key-key@0xc1dc749d8a20 (16-bytes, EXTRACT_KEY_FROM_KEY) 303s | output: symkey-key@0xc1dc749d8a20 (16-bytes, EXTRACT_KEY_FROM_KEY) 303s | RFC 3566 Test Case 5: AES-XCBC-MAC-96 with 32-byte input extracting all 16 bytes of key@0xc1dc749d8a20 303s | RFC 3566 Test Case 5: AES-XCBC-MAC-96 with 32-byte input: symkey-key@0xc1dc749d8a20 (16-bytes, EXTRACT_KEY_FROM_KEY) 303s | sizeof bytes 16 303s | wrapper: siBuffer: f0 53 90 c4 42 b7 de 27 c9 b5 ee f2 3d a7 37 6c 303s | RFC 3566 Test Case 5: AES-XCBC-MAC-96 with 32-byte input extracted len 16 bytes at 0xc1dc749d4a80 303s | unwrapped: 303s | f5 4f 0e c8 d2 b9 f3 d3 68 07 73 4b d5 28 3f d4 .O......h.sK.(?. 303s | verify_bytes() RFC 3566 Test Case 5: AES-XCBC-MAC-96 with 32-byte input: symkey: ok 303s ipsec algparse: RFC 3566 Test Case 6: AES-XCBC-MAC-96 with 34-byte input 303s | decode_to_chunk() test_prf_vector: input "0x000102030405060708090a0b0c0d0e0f" 303s | decode_to_chunk() output: 303s | 00 01 02 03 04 05 06 07 08 09 0a 0b 0c 0d 0e 0f ................ 303s | decode_to_chunk() test_prf_vector: input "0x000102030405060708090a0b0c0d0e0f101112131415161718191a1b1c1d1e1f2021" 303s | decode_to_chunk() output: 303s | 00 01 02 03 04 05 06 07 08 09 0a 0b 0c 0d 0e 0f ................ 303s | 10 11 12 13 14 15 16 17 18 19 1a 1b 1c 1d 1e 1f ................ 303s | 20 21 ! 303s | decode_to_chunk() test_prf_vector: input "0xbecbb3bccdb518a30677d5481fb6b4d8" 303s | decode_to_chunk() output: 303s | be cb b3 bc cd b5 18 a3 06 77 d5 48 1f b6 b4 d8 .........w.H.... 303s | PRF chunk interface PRF AES_XCBC init key hunk 0xc1dc749d6430 (length 16) 303s | 00 01 02 03 04 05 06 07 08 09 0a 0b 0c 0d 0e 0f ................ 303s | CONCATENATE_DATA_AND_BASE: 303s | target: EXTRACT_KEY_FROM_KEY 303s | base: base-key@0xc1dc749d4bc0 (16-bytes, AES_KEY_GEN) 303s | params: 16-bytes@0xffffe203ce00 303s | key-offset: 0, key-size: 16 303s | EXTRACT_KEY_FROM_KEY: 303s | target: EXTRACT_KEY_FROM_KEY 303s | key_size: 16-bytes 303s | base: base-key@0xc1dc749d7c00 (32-bytes, initializing NSS db 303s running pluto selftest 303s EXTRACT_KEY_FROM_KEY) 303s | operation: FLAGS_ONLY 303s | params: 8-bytes@0xffffe203cda8 303s | XCBC: Key 16=16 just right 303s | key-offset: 0, key-size: 16 303s | EXTRACT_KEY_FROM_KEY: 303s | target: AES_ECB 303s | flags: SIGN 303s | key_size: 16-bytes 303s | base: base-key@0xc1dc749d8a20 (16-bytes, EXTRACT_KEY_FROM_KEY) 303s | operation: FLAGS_ONLY 303s | params: 8-bytes@0xffffe203cd58 303s | PRF chunk interface PRF AES_XCBC 0xc1dc749d4b60 303s | PRF chunk interface PRF AES_XCBC update message (0xc1dc749d4b90 length 34) 303s | 00 01 02 03 04 05 06 07 08 09 0a 0b 0c 0d 0e 0f ................ 303s | 10 11 12 13 14 15 16 17 18 19 1a 1b 1c 1d 1e 1f ................ 303s | 20 21 ! 303s | XCBC: data 303s | 00 01 02 03 04 05 06 07 08 09 0a 0b 0c 0d 0e 0f ................ 303s | 10 11 12 13 14 15 16 17 18 19 1a 1b 1c 1d 1e 1f ................ 303s | 20 21 ! 303s | K extracting all 16 bytes of key@0xc1dc749d7c00 303s | K: symkey-key@0xc1dc749d7c00 (16-bytes, AES_ECB) 303s | sizeof bytes 16 303s | wrapper: (SECItemType)1735262254: f4 56 b2 72 40 b5 03 c0 51 38 56 d9 dc 71 2c 27 303s | K extracted len 16 bytes at 0xc1dc749d8250 303s | unwrapped: 303s | 00 01 02 03 04 05 06 07 08 09 0a 0b 0c 0d 0e 0f ................ 303s | XCBC: K: 303s | 00 01 02 03 04 05 06 07 08 09 0a 0b 0c 0d 0e 0f ................ 303s | XCBC: K1 303s | c3 52 80 57 54 23 7f 31 1a c0 ff f4 e3 e0 3e 78 .R.WT#.1......>x 303s | CONCATENATE_DATA_AND_BASE: 303s | target: EXTRACT_KEY_FROM_KEY 303s | base: base-key@0xc1dc749d4bc0 (16-bytes, AES_KEY_GEN) 303s | params: 16-bytes@0xffffe203ccc0 303s | key-offset: 0, key-size: 16 303s | EXTRACT_KEY_FROM_KEY: 303s | target: AES_ECB 303s | flags: SIGN 303s | key_size: 16-bytes 303s | base: base-key@0xc1dc749d6510 (32-bytes, EXTRACT_KEY_FROM_KEY) 303s | operation: FLAGS_ONLY 303s | params: 8-bytes@0xffffe203ccc8 303s | Computing E[3] using K3 303s | XCBC: K3 303s | c1 a7 ab a1 a2 3a 94 06 58 07 a0 8c c8 ee d0 6e .....:..X......n 303s | XCBC: E[n-1] 303s | 09 02 5e 5a 67 25 20 72 44 14 5c 6b 80 66 85 79 ..^Zg% rD.\k.f.y 303s | XCBC: M[n] 303s | 20 21 ! 303s | XCBC: M[n] 303s | 20 21 ! 303s | XCBC: M[n]:80...^E[n-1]^K3 303s | e8 84 75 fb c5 1f b4 74 1c 13 fc e7 48 88 55 17 ..u....t....H.U. 303s | XCBC: MAC 303s | be cb b3 bc cd b5 18 a3 06 77 d5 48 1f b6 b4 d8 .........w.H.... 303s | PRF chunk interface PRF AES_XCBC final length 16 303s | be cb b3 bc cd b5 18 a3 06 77 d5 48 1f b6 b4 d8 .........w.H.... 303s | chunk output 303s | be cb b3 bc cd b5 18 a3 06 77 d5 48 1f b6 b4 d8 .........w.H.... 303s | verify_bytes() RFC 3566 Test Case 6: AES-XCBC-MAC-96 with 34-byte input: prf OUT: ok 303s | CONCATENATE_DATA_AND_BASE: 303s | target: EXTRACT_KEY_FROM_KEY 303s | base: base-key@0xc1dc749d4bc0 (16-bytes, AES_KEY_GEN) 303s | params: 16-bytes@0xffffe203ce80 303s | key-offset: 0, key-size: 16 303s | EXTRACT_KEY_FROM_KEY: 303s | target: EXTRACT_KEY_FROM_KEY 303s | key_size: 16-bytes 303s | base: base-key@0xc1dc749d8a20 (32-bytes, EXTRACT_KEY_FROM_KEY) 303s | operation: FLAGS_ONLY 303s | params: 8-bytes@0xffffe203ce28 303s | PRF symkey interface PRF AES_XCBC init key symkey-key@0xc1dc749d7c00 (size 16) 303s | PRF symkey interface: key symkey-key@0xc1dc749d7c00 (16-bytes, EXTRACT_KEY_FROM_KEY) 303s | XCBC: Key 16=16 just right 303s | key-offset: 0, key-size: 16 303s | EXTRACT_KEY_FROM_KEY: 303s | target: AES_ECB 303s | flags: SIGN 303s | key_size: 16-bytes 303s | base: base-key@0xc1dc749d7c00 (16-bytes, EXTRACT_KEY_FROM_KEY) 303s | operation: FLAGS_ONLY 303s | params: 8-bytes@0xffffe203cd88 303s | PRF symkey interface PRF AES_XCBC 0xc1dc749d4b60 303s | CONCATENATE_DATA_AND_BASE: 303s | target: EXTRACT_KEY_FROM_KEY 303s | base: base-key@0xc1dc749d4bc0 (16-bytes, AES_KEY_GEN) 303s | params: 16-bytes@0xffffe203ce80 303s | key-offset: 0, key-size: 34 303s | EXTRACT_KEY_FROM_KEY: 303s | target: EXTRACT_KEY_FROM_KEY 303s | key_size: 34-bytes 303s | base: base-key@0xc1dc749d8d90 (50-bytes, EXTRACT_KEY_FROM_KEY) 303s | operation: FLAGS_ONLY 303s | params: 8-bytes@0xffffe203ce28 303s | PRF symkey interface PRF AES_XCBC update symkey message-key@0xc1dc749d6510 (size 34) 303s | PRF symkey interface: symkey message-key@0xc1dc749d6510 (34-bytes, EXTRACT_KEY_FROM_KEY) 303s | symkey message extracting all 34 bytes of key@0xc1dc749d6510 303s | symkey message: symkey-key@0xc1dc749d6510 (34-bytes, EXTRACT_KEY_FROM_KEY) 303s | sizeof bytes 48 303s | wrapper: (SECItemType)41: f4 56 b2 72 40 b5 03 c0 51 38 56 d9 dc 71 2c 27 1e 20 32 5a 54 2d 82 43 07 bc d7 5d c1 d6 9d e9 4e 50 72 a9 1f 40 76 28 dd 0b 8a 93 2e 12 71 33 303s | symkey message extracted len 48 bytes at 0xc1dc749d8270 303s | unwrapped: 303s | 00 01 02 03 04 05 06 07 08 09 0a 0b 0c 0d 0e 0f ................ 303s | 10 11 12 13 14 15 16 17 18 19 1a 1b 1c 1d 1e 1f ................ 303s | 20 21 00 00 00 00 00 00 00 00 00 00 00 00 00 00 !.............. 303s | XCBC: data 303s | 00 01 02 03 04 05 06 07 08 09 0a 0b 0c 0d 0e 0f ................ 303s | 10 11 12 13 14 15 16 17 18 19 1a 1b 1c 1d 1e 1f ................ 303s | 20 21 ! 303s | K extracting all 16 bytes of key@0xc1dc749d8a20 303s | K: symkey-key@0xc1dc749d8a20 (16-bytes, AES_ECB) 303s | sizeof bytes 16 303s | wrapper: (SECItemType)-503070408: f4 56 b2 72 40 b5 03 c0 51 38 56 d9 dc 71 2c 27 303s | K extracted len 16 bytes at 0xc1dc749d8a00 303s | unwrapped: 303s | 00 01 02 03 04 05 06 07 08 09 0a 0b 0c 0d 0e 0f ................ 303s | XCBC: K: 303s | 00 01 02 03 04 05 06 07 08 09 0a 0b 0c 0d 0e 0f ................ 303s | XCBC: K1 303s | c3 52 80 57 54 23 7f 31 1a c0 ff f4 e3 e0 3e 78 .R.WT#.1......>x 303s | CONCATENATE_DATA_AND_BASE: 303s | target: EXTRACT_KEY_FROM_KEY 303s | base: base-key@0xc1dc749d4bc0 (16-bytes, AES_KEY_GEN) 303s | params: 16-bytes@0xffffe203cd10 303s | key-offset: 0, key-size: 16 303s | EXTRACT_KEY_FROM_KEY: 303s | target: AES_ECB 303s | flags: SIGN 303s | key_size: 16-bytes 303s | base: base-key@0xc1dc749d9120 (32-bytes, EXTRACT_KEY_FROM_KEY) 303s | operation: FLAGS_ONLY 303s | params: 8-bytes@0xffffe203cd18 303s | Computing E[3] using K3 303s | XCBC: K3 303s | c1 a7 ab a1 a2 3a 94 06 58 07 a0 8c c8 ee d0 6e .....:..X......n 303s | XCBC: E[n-1] 303s | 09 02 5e 5a 67 25 20 72 44 14 5c 6b 80 66 85 79 ..^Zg% rD.\k.f.y 303s | XCBC: M[n] 303s | 20 21 ! 303s | XCBC: M[n] 303s | 20 21 ! 303s | XCBC: M[n]:80...^E[n-1]^K3 303s | e8 84 75 fb c5 1f b4 74 1c 13 fc e7 48 88 55 17 ..u....t....H.U. 303s | XCBC: MAC 303s | be cb b3 bc cd b5 18 a3 06 77 d5 48 1f b6 b4 d8 .........w.H.... 303s | CONCATENATE_DATA_AND_BASE: 303s | target: EXTRACT_KEY_FROM_KEY 303s | base: base-key@0xc1dc749d4bc0 (16-bytes, AES_KEY_GEN) 303s | params: 16-bytes@0xffffe203ce00 303s | key-offset: 0, key-size: 16 303s | EXTRACT_KEY_FROM_KEY: 303s | target: EXTRACT_KEY_FROM_KEY 303s | key_size: 16-bytes 303s | base: base-key@0xc1dc749d9120 (32-bytes, EXTRACT_KEY_FROM_KEY) 303s | operation: FLAGS_ONLY 303s | params: 8-bytes@0xffffe203cda8 303s | PRF symkey interface PRF AES_XCBC final-key@0xc1dc749d8d90 (size 16) 303s | PRF symkey interface: key-key@0xc1dc749d8d90 (16-bytes, EXTRACT_KEY_FROM_KEY) 303s | output: symkey-key@0xc1dc749d8d90 (16-bytes, EXTRACT_KEY_FROM_KEY) 303s | RFC 3566 Test Case 6: AES-XCBC-MAC-96 with 34-byte input extracting all 16 bytes of key@0xc1dc749d8d90 303s | RFC 3566 Test Case 6: AES-XCBC-MAC-96 with 34-byte input: symkey-key@0xc1dc749d8d90 (16-bytes, EXTRACT_KEY_FROM_KEY) 303s | sizeof bytes 16 303s | wrapper: siBuffer: d4 db 12 3f ff d6 56 b9 35 cb a1 fc cc 84 a5 40 303s | RFC 3566 Test Case 6: AES-XCBC-MAC-96 with 34-byte input extracted len 16 bytes at 0xc1dc749d7e40 303s | unwrapped: 303s | be cb b3 bc cd b5 18 a3 06 77 d5 48 1f b6 b4 d8 .........w.H.... 303s | verify_bytes() RFC 3566 Test Case 6: AES-XCBC-MAC-96 with 34-byte input: symkey: ok 303s ipsec algparse: RFC 3566 Test Case 7: AES-XCBC-MAC-96 with 1000-byte input 303s | decode_to_chunk() test_prf_vector: input "0x000102030405060708090a0b0c0d0e0f" 303s | decode_to_chunk() output: 303s | 00 01 02 03 04 05 06 07 08 09 0a 0b 0c 0d 0e 0f ................ 303s | decode_to_chunk() test_prf_vector: input "0xf0dafee895db30253761103b5d84528f" 303s | decode_to_chunk() output: 303s | f0 da fe e8 95 db 30 25 37 61 10 3b 5d 84 52 8f ......0%7a.;].R. 303s | PRF chunk interface PRF AES_XCBC init key hunk 0xc1dc749d8880 (length 16) 303s | 00 01 02 03 04 05 06 07 08 09 0a 0b 0c 0d 0e 0f ................ 303s | CONCATENATE_DATA_AND_BASE: 303s | target: EXTRACT_KEY_FROM_KEY 303s | base: base-key@0xc1dc749d4bc0 (16-bytes, AES_KEY_GEN) 303s | params: 16-bytes@0xffffe203ce00 303s | key-offset: 0, key-size: 16 303s | EXTRACT_KEY_FROM_KEY: 303s | target: EXTRACT_KEY_FROM_KEY 303s | key_size: 16-bytes 303s | base: base-key@0xc1dc749d7c00 (32-bytes, EXTRACT_KEY_FROM_KEY) 303s | operation: FLAGS_ONLY 303s | params: 8-bytes@0xffffe203cda8 303s | XCBC: Key 16=16 just right 303s | key-offset: 0, key-size: 16 303s | EXTRACT_KEY_FROM_KEY: 303s | target: AES_ECB 303s | flags: SIGN 303s | key_size: 16-bytes 303s | base: base-key@0xc1dc749d8d90 (16-bytes, EXTRACT_KEY_FROM_KEY) 303s | operation: FLAGS_ONLY 303s | params: 8-bytes@0xffffe203cd58 303s | PRF chunk interface PRF AES_XCBC 0xc1dc749d85f0 303s | PRF chunk interface PRF AES_XCBC update message (0xc1dc749d6640 length 1000) 303s | 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................ 303s | 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................ 303s | 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................ 303s | 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................ 303s | 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................ 303s | 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................ 303s | 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................ 303s | 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................ 303s | 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................ 303s | 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................ 303s | 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................ 303s | 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................ 303s | 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................ 303s | 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................ 303s | 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................ 303s | 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................ 303s | 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................ 303s | 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................ 303s | 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................ 303s | 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................ 303s | 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................ 303s | 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................ 303s | 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................ 303s | 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................ 303s | 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................ 303s | 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................ 303s | 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................ 303s | 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................ 303s | 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................ 303s | 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................ 303s | 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................ 303s | 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................ 303s | 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................ 303s | 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................ 303s | 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................ 303s | 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................ 303s | 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................ 303s | 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................ 303s | 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................ 303s | 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................ 303s | 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................ 303s | 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................ 303s | 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................ 303s | 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................ 303s | 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................ 303s | 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................ 303s | 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................ 303s | 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................ 303s | 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................ 303s | 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................ 303s | 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................ 303s | 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................ 303s | 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................ 303s | 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................ 303s | 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................ 303s | 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................ 303s | 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................ 303s | 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................ 303s | 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................ 303s | 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................ 303s | 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................ 303s | 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................ 303s | 00 00 00 00 00 00 00 00 ........ 303s | XCBC: data 303s | 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................ 303s | 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................ 303s | 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................ 303s | 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................ 303s | 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................ 303s | 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................ 303s | 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................ 303s | 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................ 303s | 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................ 303s | 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................ 303s | 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................ 303s | 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................ 303s | 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................ 303s | 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................ 303s | 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................ 303s | 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................ 303s | 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................ 303s | 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................ 303s | 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................ 303s | 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................ 303s | 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................ 303s | 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................ 303s | 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................ 303s | 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................ 303s | 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................ 303s | 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................ 303s | 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................ 303s | 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................ 303s | 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................ 303s | 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................ 303s | 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................ 303s | 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................ 303s | 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................ 303s | 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................ 303s | 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................ 303s | 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................ 303s | 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................ 303s | 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................ 303s | 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................ 303s | 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................ 303s | 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................ 303s | 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................ 303s | 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................ 303s | 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................ 303s | 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................ 303s | 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................ 303s | 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................ 303s | 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................ 303s | 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................ 303s | 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................ 303s | 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................ 303s | 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................ 303s | 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................ 303s | 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................ 303s | 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................ 303s | 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................ 303s | 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................ 303s | 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................ 303s | 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................ 303s | 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................ 303s | 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................ 303s | 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................ 303s | 00 00 00 00 00 00 00 00 ........ 303s | K extracting all 16 bytes of key@0xc1dc749d7c00 303s | K: symkey-key@0xc1dc749d7c00 (16-bytes, AES_ECB) 303s | sizeof bytes 16 303s | wrapper: (SECItemType)1735262254: f4 56 b2 72 40 b5 03 c0 51 38 56 d9 dc 71 2c 27 303s | K extracted len 16 bytes at 0xc1dc749d8a00 303s | unwrapped: 303s | 00 01 02 03 04 05 06 07 08 09 0a 0b 0c 0d 0e 0f ................ 303s | XCBC: K: 303s | 00 01 02 03 04 05 06 07 08 09 0a 0b 0c 0d 0e 0f ................ 303s | XCBC: K1 303s | c3 52 80 57 54 23 7f 31 1a c0 ff f4 e3 e0 3e 78 .R.WT#.1......>x 303s | CONCATENATE_DATA_AND_BASE: 303s | target: EXTRACT_KEY_FROM_KEY 303s | base: base-key@0xc1dc749d4bc0 (16-bytes, AES_KEY_GEN) 303s | params: 16-bytes@0xffffe203ccc0 303s | key-offset: 0, key-size: 16 303s | EXTRACT_KEY_FROM_KEY: 303s | target: AES_ECB 303s | flags: SIGN 303s | key_size: 16-bytes 303s | base: base-key@0xc1dc749d6510 (32-bytes, EXTRACT_KEY_FROM_KEY) 303s | operation: FLAGS_ONLY 303s | params: 8-bytes@0xffffe203ccc8 303s | Computing E[63] using K3 303s | XCBC: K3 303s | c1 a7 ab a1 a2 3a 94 06 58 07 a0 8c c8 ee d0 6e .....:..X......n 303s | XCBC: E[n-1] 303s | 5c 88 af cc 1e 1e 83 fc c4 2c 0c e4 12 12 f5 17 \........,...... 303s | XCBC: M[n] 303s | 00 00 00 00 00 00 00 00 ........ 303s | XCBC: M[n] 303s | 00 00 00 00 00 00 00 00 ........ 303s | XCBC: M[n]:80...^E[n-1]^K3 303s | 9d 2f 04 6d bc 24 17 fa 1c 2b ac 68 da fc 25 79 ./.m.$...+.h..%y 303s | XCBC: MAC 303s | f0 da fe e8 95 db 30 25 37 61 10 3b 5d 84 52 8f ......0%7a.;].R. 303s | PRF chunk interface PRF AES_XCBC final length 16 303s | f0 da fe e8 95 db 30 25 37 61 10 3b 5d 84 52 8f ......0%7a.;].R. 303s | chunk output 303s | f0 da fe e8 95 db 30 25 37 61 10 3b 5d 84 52 8f ......0%7a.;].R. 303s | verify_bytes() RFC 3566 Test Case 7: AES-XCBC-MAC-96 with 1000-byte input: prf OUT: ok 303s | CONCATENATE_DATA_AND_BASE: 303s | target: EXTRACT_KEY_FROM_KEY 303s | base: base-key@0xc1dc749d4bc0 (16-bytes, AES_KEY_GEN) 303s | params: 16-bytes@0xffffe203ce80 303s | key-offset: 0, key-size: 16 303s | EXTRACT_KEY_FROM_KEY: 303s | target: EXTRACT_KEY_FROM_KEY 303s | key_size: 16-bytes 303s | base: base-key@0xc1dc749d8d90 (32-bytes, EXTRACT_KEY_FROM_KEY) 303s | operation: FLAGS_ONLY 303s | params: 8-bytes@0xffffe203ce28 303s | PRF symkey interface PRF AES_XCBC init key symkey-key@0xc1dc749d7c00 (size 16) 303s | PRF symkey interface: key symkey-key@0xc1dc749d7c00 (16-bytes, EXTRACT_KEY_FROM_KEY) 303s | XCBC: Key 16=16 just right 303s | key-offset: 0, key-size: 16 303s | EXTRACT_KEY_FROM_KEY: 303s | target: AES_ECB 303s | flags: SIGN 303s | key_size: 16-bytes 303s | base: base-key@0xc1dc749d7c00 (16-bytes, EXTRACT_KEY_FROM_KEY) 303s | operation: FLAGS_ONLY 303s | params: 8-bytes@0xffffe203cd88 303s | PRF symkey interface PRF AES_XCBC 0xc1dc749d85f0 303s | CONCATENATE_DATA_AND_BASE: 303s | target: EXTRACT_KEY_FROM_KEY 303s | base: base-key@0xc1dc749d4bc0 (16-bytes, AES_KEY_GEN) 303s | params: 16-bytes@0xffffe203ce80 303s | key-offset: 0, key-size: 1000 303s | EXTRACT_KEY_FROM_KEY: 303s | target: EXTRACT_KEY_FROM_KEY 303s | key_size: 1000-bytes 303s | base: base-key@0xc1dc749d8a20 (1016-bytes, EXTRACT_KEY_FROM_KEY) 303s | operation: FLAGS_ONLY 303s | params: 8-bytes@0xffffe203ce28 303s | PRF symkey interface PRF AES_XCBC update symkey message-key@0xc1dc749d6510 (size 1000) 303s | PRF symkey interface: symkey message-key@0xc1dc749d6510 (1000-bytes, EXTRACT_KEY_FROM_KEY) 303s | symkey message extracting all 1000 bytes of key@0xc1dc749d6510 303s | symkey message: symkey-key@0xc1dc749d6510 (1000-bytes, EXTRACT_KEY_FROM_KEY) 303s | sizeof bytes 1008 303s | wrapper: (SECItemType)41: f6 d6 c0 c0 81 af 4e 39 9f f9 f6 8d 8e 73 ce cb f6 d6 c0 c0 81 af 4e 39 9f f9 f6 8d 8e 73 ce cb f6 d6 c0 c0 81 af 4e 39 9f f9 f6 8d 8e 73 ce cb f6 d6 c0 c0 81 af 4e 39 9f f9 f6 8d 8e 73 ce cb f6 d6 c0 c0 81 af 4e 39 9f f9 f6 8d 8e 73 ce cb f6 d6 c0 c0 81 af 4e 39 9f f9 f6 8d 8e 73 ce cb f6 d6 c0 c0 81 af 4e 39 9f f9 f6 8d 8e 73 ce cb f6 d6 c0 c0 81 af 4e 39 9f f9 f6 8d 8e 73 ce cb f6 d6 c0 c0 81 af 4e 39 9f f9 f6 8d 8e 73 ce cb f6 d6 c0 c0 81 af 4e 39 9f f9 f6 8d 8e 73 ce cb f6 d6 c0 c0 81 af 4e 39 9f f9 f6 8d 8e 73 ce cb f6 d6 c0 c0 81 af 4e 39 9f f9 f6 8d 8e 73 ce cb f6 d6 c0 c0 81 af 4e 39 9f f9 f6 8d 8e 73 ce cb f6 d6 c0 c0 81 af 4e 39 9f f9 f6 8d 8e 73 ce cb f6 d6 c0 c0 81 af 4e 39 9f f9 f6 8d 8e 73 ce cb f6 d6 c0 c0 81 af 4e 39 9f f9 f6 8d 8e 73 ce cb f6 d6 c0 c0 81 af 4e 39 9f f9 f6 8d 8e 73 ce cb f6 d6 c0 c0 81 af 4e 39 9f f9 f6 8d 8e 73 ce cb f6 d6 c0 c0 81 af 4e 39 9f f9 f6 8d 8e 73 ce cb f6 ... 303s | symkey message extracted len 1008 bytes at 0xc1dc749d7220 303s | unwrapped: 303s | 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................ 303s | 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................ 303s | 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................ 303s | 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................ 303s | 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................ 303s | 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................ 303s | 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................ 303s | 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................ 303s | 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................ 303s | 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................ 303s | 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................ 303s | 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................ 303s | 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................ 303s | 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................ 303s | 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................ 303s | 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................ 303s | 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................ 303s | 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................ 303s | 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................ 303s | 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................ 303s | 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................ 303s | 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................ 303s | 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................ 303s | 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................ 303s | 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................ 303s | 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................ 303s | 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................ 303s | 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................ 303s | 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................ 303s | 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................ 303s | 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................ 303s | 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................ 303s | 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................ 303s | 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................ 303s | 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................ 303s | 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................ 303s | 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................ 303s | 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................ 303s | 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................ 303s | 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................ 303s | 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................ 303s | 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................ 303s | 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................ 303s | 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................ 303s | 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................ 303s | 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................ 303s | 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................ 303s | 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................ 303s | 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................ 303s | 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................ 303s | 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................ 303s | 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................ 303s | 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................ 303s | 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................ 303s | 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................ 303s | 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................ 303s | 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................ 303s | 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................ 303s | 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................ 303s | 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................ 303s | 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................ 303s | 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................ 303s | 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................ 303s | XCBC: data 303s | 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................ 303s | 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................ 303s | 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................ 303s | 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................ 303s | 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................ 303s | 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................ 303s | 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................ 303s | 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................ 303s | 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................ 303s | 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................ 303s | 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................ 303s | 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................ 303s | 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................ 303s | 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................ 303s | 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................ 303s | 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................ 303s | 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................ 303s | 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................ 303s | 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................ 303s | 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................ 303s | 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................ 303s | 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................ 303s | 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................ 303s | 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................ 303s | 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................ 303s | 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................ 303s | 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................ 303s | 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................ 303s | 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................ 303s | 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................ 303s | 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................ 303s | 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................ 303s | 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................ 303s | 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................ 303s | 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................ 303s | 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................ 303s | 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................ 303s | 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................ 303s | 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................ 303s | 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................ 303s | 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................ 303s | 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................ 303s | 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................ 303s | 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................ 303s | 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................ 303s | 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................ 303s | 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................ 303s | 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................ 303s | 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................ 303s | 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................ 303s | 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................ 303s | 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................ 303s | 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................ 303s | 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................ 303s | 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................ 303s | 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................ 303s | 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................ 303s | 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................ 303s | 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................ 303s | 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................ 303s | 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................ 303s | 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................ 303s | 00 00 00 00 00 00 00 00 ........ 303s | K extracting all 16 bytes of key@0xc1dc749d8d90 303s | K: symkey-key@0xc1dc749d8d90 (16-bytes, AES_ECB) 303s | sizeof bytes 16 303s | wrapper: (SECItemType)-503070408: f4 56 b2 72 40 b5 03 c0 51 38 56 d9 dc 71 2c 27 303s | K extracted len 16 bytes at 0xc1dc749d8250 303s | unwrapped: 303s | 00 01 02 03 04 05 06 07 08 09 0a 0b 0c 0d 0e 0f ................ 303s | XCBC: K: 303s | 00 01 02 03 04 05 06 07 08 09 0a 0b 0c 0d 0e 0f ................ 303s | XCBC: K1 303s | c3 52 80 57 54 23 7f 31 1a c0 ff f4 e3 e0 3e 78 .R.WT#.1......>x 303s | CONCATENATE_DATA_AND_BASE: 303s | target: EXTRACT_KEY_FROM_KEY 303s | base: base-key@0xc1dc749d4bc0 (16-bytes, AES_KEY_GEN) 303s | params: 16-bytes@0xffffe203cd10 303s | key-offset: 0, key-size: 16 303s | EXTRACT_KEY_FROM_KEY: 303s | target: AES_ECB 303s | flags: SIGN 303s | key_size: 16-bytes 303s | base: base-key@0xc1dc749d9120 (32-bytes, EXTRACT_KEY_FROM_KEY) 303s | operation: FLAGS_ONLY 303s | params: 8-bytes@0xffffe203cd18 303s | Computing E[63] using K3 303s | XCBC: K3 303s | c1 a7 ab a1 a2 3a 94 06 58 07 a0 8c c8 ee d0 6e .....:..X......n 303s | XCBC: E[n-1] 303s | 5c 88 af cc 1e 1e 83 fc c4 2c 0c e4 12 12 f5 17 \........,...... 303s | XCBC: M[n] 303s | 00 00 00 00 00 00 00 00 ........ 303s | XCBC: M[n] 303s | 00 00 00 00 00 00 00 00 ........ 303s | XCBC: M[n]:80...^E[n-1]^K3 303s | 9d 2f 04 6d bc 24 17 fa 1c 2b ac 68 da fc 25 79 ./.m.$...+.h..%y 303s | XCBC: MAC 303s | f0 da fe e8 95 db 30 25 37 61 10 3b 5d 84 52 8f ......0%7a.;].R. 303s | CONCATENATE_DATA_AND_BASE: 303s | target: EXTRACT_KEY_FROM_KEY 303s | base: base-key@0xc1dc749d4bc0 (16-bytes, AES_KEY_GEN) 303s | params: 16-bytes@0xffffe203ce00 303s | key-offset: 0, key-size: 16 303s | EXTRACT_KEY_FROM_KEY: 303s | target: EXTRACT_KEY_FROM_KEY 303s | key_size: 16-bytes 303s | base: base-key@0xc1dc749d9120 (32-bytes, EXTRACT_KEY_FROM_KEY) 303s | operation: FLAGS_ONLY 303s | params: 8-bytes@0xffffe203cda8 303s | PRF symkey interface PRF AES_XCBC final-key@0xc1dc749d8a20 (size 16) 303s | PRF symkey interface: key-key@0xc1dc749d8a20 (16-bytes, EXTRACT_KEY_FROM_KEY) 303s | output: symkey-key@0xc1dc749d8a20 (16-bytes, EXTRACT_KEY_FROM_KEY) 303s | RFC 3566 Test Case 7: AES-XCBC-MAC-96 with 1000-byte input extracting all 16 bytes of key@0xc1dc749d8a20 303s | RFC 3566 Test Case 7: AES-XCBC-MAC-96 with 1000-byte input: symkey-key@0xc1dc749d8a20 (16-bytes, EXTRACT_KEY_FROM_KEY) 303s | sizeof bytes 16 303s | wrapper: siBuffer: ba ee fb 54 fb 26 72 f1 35 17 e8 9b 98 69 c7 e5 303s | RFC 3566 Test Case 7: AES-XCBC-MAC-96 with 1000-byte input extracted len 16 bytes at 0xc1dc749d4a80 303s | unwrapped: 303s | f0 da fe e8 95 db 30 25 37 61 10 3b 5d 84 52 8f ......0%7a.;].R. 303s | verify_bytes() RFC 3566 Test Case 7: AES-XCBC-MAC-96 with 1000-byte input: symkey: ok 303s ipsec algparse: RFC 4434 Test Case AES-XCBC-PRF-128 with 20-byte input (key length 16) 303s | decode_to_chunk() test_prf_vector: input "0x000102030405060708090a0b0c0d0e0f" 303s | decode_to_chunk() output: 303s | 00 01 02 03 04 05 06 07 08 09 0a 0b 0c 0d 0e 0f ................ 303s | decode_to_chunk() test_prf_vector: input "0x000102030405060708090a0b0c0d0e0f10111213" 303s | decode_to_chunk() output: 303s | 00 01 02 03 04 05 06 07 08 09 0a 0b 0c 0d 0e 0f ................ 303s | 10 11 12 13 .... 303s | decode_to_chunk() test_prf_vector: input "0x47f51b4564966215b8985c63055ed308" 303s | decode_to_chunk() output: 303s | 47 f5 1b 45 64 96 62 15 b8 98 5c 63 05 5e d3 08 G..Ed.b...\c.^.. 303s | PRF chunk interface PRF AES_XCBC init key hunk 0xc1dc749d7ff0 (length 16) 303s | 00 01 02 03 04 05 06 07 08 09 0a 0b 0c 0d 0e 0f ................ 303s | CONCATENATE_DATA_AND_BASE: 303s | target: EXTRACT_KEY_FROM_KEY 303s | base: base-key@0xc1dc749d4bc0 (16-bytes, AES_KEY_GEN) 303s | params: 16-bytes@0xffffe203ce00 303s | key-offset: 0, key-size: 16 303s | EXTRACT_KEY_FROM_KEY: 303s | target: EXTRACT_KEY_FROM_KEY 303s | key_size: 16-bytes 303s | base: base-key@0xc1dc749d7c00 (32-bytes, EXTRACT_KEY_FROM_KEY) 303s | operation: FLAGS_ONLY 303s | params: 8-bytes@0xffffe203cda8 303s | XCBC: Key 16=16 just right 303s | key-offset: 0, key-size: 16 303s | EXTRACT_KEY_FROM_KEY: 303s | target: AES_ECB 303s | flags: SIGN 303s | key_size: 16-bytes 303s | base: base-key@0xc1dc749d8a20 (16-bytes, EXTRACT_KEY_FROM_KEY) 303s | operation: FLAGS_ONLY 303s | params: 8-bytes@0xffffe203cd58 303s | PRF chunk interface PRF AES_XCBC 0xc1dc749d85f0 303s | PRF chunk interface PRF AES_XCBC update message (0xc1dc749d6430 length 20) 303s | 00 01 02 03 04 05 06 07 08 09 0a 0b 0c 0d 0e 0f ................ 303s | 10 11 12 13 .... 303s | XCBC: data 303s | 00 01 02 03 04 05 06 07 08 09 0a 0b 0c 0d 0e 0f ................ 303s | 10 11 12 13 .... 303s | K extracting all 16 bytes of key@0xc1dc749d7c00 303s | K: symkey-key@0xc1dc749d7c00 (16-bytes, AES_ECB) 303s | sizeof bytes 16 303s | wrapper: (SECItemType)1735262254: f4 56 b2 72 40 b5 03 c0 51 38 56 d9 dc 71 2c 27 303s | K extracted len 16 bytes at 0xc1dc749d48c0 303s | unwrapped: 303s | 00 01 02 03 04 05 06 07 08 09 0a 0b 0c 0d 0e 0f ................ 303s | XCBC: K: 303s | 00 01 02 03 04 05 06 07 08 09 0a 0b 0c 0d 0e 0f ................ 303s | XCBC: K1 303s | c3 52 80 57 54 23 7f 31 1a c0 ff f4 e3 e0 3e 78 .R.WT#.1......>x 303s | CONCATENATE_DATA_AND_BASE: 303s | target: EXTRACT_KEY_FROM_KEY 303s | base: base-key@0xc1dc749d4bc0 (16-bytes, AES_KEY_GEN) 303s | params: 16-bytes@0xffffe203ccc0 303s | key-offset: 0, key-size: 16 303s | EXTRACT_KEY_FROM_KEY: 303s | target: AES_ECB 303s | flags: SIGN 303s | key_size: 16-bytes 303s | base: base-key@0xc1dc749d6510 (32-bytes, EXTRACT_KEY_FROM_KEY) 303s | operation: FLAGS_ONLY 303s | params: 8-bytes@0xffffe203ccc8 303s | Computing E[2] using K3 303s | XCBC: K3 303s | c1 a7 ab a1 a2 3a 94 06 58 07 a0 8c c8 ee d0 6e .....:..X......n 303s | XCBC: E[n-1] 303s | 1d 04 48 fa cf 4d 9c 6f 55 b9 93 da 09 80 3d b3 ..H..M.oU.....=. 303s | XCBC: M[n] 303s | 10 11 12 13 .... 303s | XCBC: M[n] 303s | 10 11 12 13 .... 303s | XCBC: M[n]:80...^E[n-1]^K3 303s | cc b2 f1 48 ed 77 08 69 0d be 33 56 c1 6e ed dd ...H.w.i..3V.n.. 303s | XCBC: MAC 303s | 47 f5 1b 45 64 96 62 15 b8 98 5c 63 05 5e d3 08 G..Ed.b...\c.^.. 303s | PRF chunk interface PRF AES_XCBC final length 16 303s | 47 f5 1b 45 64 96 62 15 b8 98 5c 63 05 5e d3 08 G..Ed.b...\c.^.. 303s | chunk output 303s | 47 f5 1b 45 64 96 62 15 b8 98 5c 63 05 5e d3 08 G..Ed.b...\c.^.. 303s | verify_bytes() RFC 4434 Test Case AES-XCBC-PRF-128 with 20-byte input (key length 16): prf OUT: ok 303s | CONCATENATE_DATA_AND_BASE: 303s | target: EXTRACT_KEY_FROM_KEY 303s | base: base-key@0xc1dc749d4bc0 (16-bytes, AES_KEY_GEN) 303s | params: 16-bytes@0xffffe203ce80 303s | key-offset: 0, key-size: 16 303s | EXTRACT_KEY_FROM_KEY: 303s | target: EXTRACT_KEY_FROM_KEY 303s | key_size: 16-bytes 303s | base: base-key@0xc1dc749d8a20 (32-bytes, EXTRACT_KEY_FROM_KEY) 303s | operation: FLAGS_ONLY 303s | params: 8-bytes@0xffffe203ce28 303s | PRF symkey interface PRF AES_XCBC init key symkey-key@0xc1dc749d7c00 (size 16) 303s | PRF symkey interface: key symkey-key@0xc1dc749d7c00 (16-bytes, EXTRACT_KEY_FROM_KEY) 303s | XCBC: Key 16=16 just right 303s | key-offset: 0, key-size: 16 303s | EXTRACT_KEY_FROM_KEY: 303s | target: AES_ECB 303s | flags: SIGN 303s | key_size: 16-bytes 303s | base: base-key@0xc1dc749d7c00 (16-bytes, EXTRACT_KEY_FROM_KEY) 303s | operation: FLAGS_ONLY 303s | params: 8-bytes@0xffffe203cd88 303s | PRF symkey interface PRF AES_XCBC 0xc1dc749d85f0 303s | CONCATENATE_DATA_AND_BASE: 303s | target: EXTRACT_KEY_FROM_KEY 303s | base: base-key@0xc1dc749d4bc0 (16-bytes, AES_KEY_GEN) 303s | params: 16-bytes@0xffffe203ce80 303s | key-offset: 0, key-size: 20 303s | EXTRACT_KEY_FROM_KEY: 303s | target: EXTRACT_KEY_FROM_KEY 303s | key_size: 20-bytes 303s | base: base-key@0xc1dc749d8d90 (36-bytes, EXTRACT_KEY_FROM_KEY) 303s | operation: FLAGS_ONLY 303s | params: 8-bytes@0xffffe203ce28 303s | PRF symkey interface PRF AES_XCBC update symkey message-key@0xc1dc749d6510 (size 20) 303s | PRF symkey interface: symkey message-key@0xc1dc749d6510 (20-bytes, EXTRACT_KEY_FROM_KEY) 303s | symkey message extracting all 20 bytes of key@0xc1dc749d6510 303s | symkey message: symkey-key@0xc1dc749d6510 (20-bytes, EXTRACT_KEY_FROM_KEY) 303s | sizeof bytes 32 303s | wrapper: (SECItemType)41: f4 56 b2 72 40 b5 03 c0 51 38 56 d9 dc 71 2c 27 05 24 53 15 31 9e 81 80 4c 1f c7 14 03 c6 fb 29 303s | symkey message extracted len 32 bytes at 0xc1dc749d4b60 303s | unwrapped: 303s | 00 01 02 03 04 05 06 07 08 09 0a 0b 0c 0d 0e 0f ................ 303s | 10 11 12 13 00 00 00 00 00 00 00 00 00 00 00 00 ................ 303s | XCBC: data 303s | 00 01 02 03 04 05 06 07 08 09 0a 0b 0c 0d 0e 0f ................ 303s | 10 11 12 13 .... 303s | K extracting all 16 bytes of key@0xc1dc749d8a20 303s | K: symkey-key@0xc1dc749d8a20 (16-bytes, AES_ECB) 303s | sizeof bytes 16 303s | wrapper: (SECItemType)-503070408: f4 56 b2 72 40 b5 03 c0 51 38 56 d9 dc 71 2c 27 303s | K extracted len 16 bytes at 0xc1dc749d9100 303s | unwrapped: 303s | 00 01 02 03 04 05 06 07 08 09 0a 0b 0c 0d 0e 0f ................ 303s | XCBC: K: 303s | 00 01 02 03 04 05 06 07 08 09 0a 0b 0c 0d 0e 0f ................ 303s | XCBC: K1 303s | c3 52 80 57 54 23 7f 31 1a c0 ff f4 e3 e0 3e 78 .R.WT#.1......>x 303s | CONCATENATE_DATA_AND_BASE: 303s | target: EXTRACT_KEY_FROM_KEY 303s | base: base-key@0xc1dc749d4bc0 (16-bytes, AES_KEY_GEN) 303s | params: 16-bytes@0xffffe203cd10 303s | key-offset: 0, key-size: 16 303s | EXTRACT_KEY_FROM_KEY: 303s | target: AES_ECB 303s | flags: SIGN 303s | key_size: 16-bytes 303s | base: base-key@0xc1dc749d9120 (32-bytes, EXTRACT_KEY_FROM_KEY) 303s | operation: FLAGS_ONLY 303s | params: 8-bytes@0xffffe203cd18 303s | Computing E[2] using K3 303s | XCBC: K3 303s | c1 a7 ab a1 a2 3a 94 06 58 07 a0 8c c8 ee d0 6e .....:..X......n 303s | XCBC: E[n-1] 303s | 1d 04 48 fa cf 4d 9c 6f 55 b9 93 da 09 80 3d b3 ..H..M.oU.....=. 303s | XCBC: M[n] 303s | 10 11 12 13 .... 303s | XCBC: M[n] 303s | 10 11 12 13 .... 303s | XCBC: M[n]:80...^E[n-1]^K3 303s | cc b2 f1 48 ed 77 08 69 0d be 33 56 c1 6e ed dd ...H.w.i..3V.n.. 303s | XCBC: MAC 303s | 47 f5 1b 45 64 96 62 15 b8 98 5c 63 05 5e d3 08 G..Ed.b...\c.^.. 303s | CONCATENATE_DATA_AND_BASE: 303s | target: EXTRACT_KEY_FROM_KEY 303s | base: base-key@0xc1dc749d4bc0 (16-bytes, AES_KEY_GEN) 303s | params: 16-bytes@0xffffe203ce00 303s | key-offset: 0, key-size: 16 303s | EXTRACT_KEY_FROM_KEY: 303s | target: EXTRACT_KEY_FROM_KEY 303s | key_size: 16-bytes 303s | base: base-key@0xc1dc749d9120 (32-bytes, EXTRACT_KEY_FROM_KEY) 303s | operation: FLAGS_ONLY 303s | params: 8-bytes@0xffffe203cda8 303s | PRF symkey interface PRF AES_XCBC final-key@0xc1dc749d8d90 (size 16) 303s | PRF symkey interface: key-key@0xc1dc749d8d90 (16-bytes, EXTRACT_KEY_FROM_KEY) 303s | output: symkey-key@0xc1dc749d8d90 (16-bytes, EXTRACT_KEY_FROM_KEY) 303s | RFC 4434 Test Case AES-XCBC-PRF-128 with 20-byte input (key length 16) extracting all 16 bytes of key@0xc1dc749d8d90 303s | RFC 4434 Test Case AES-XCBC-PRF-128 with 20-byte input (key length 16): symkey-key@0xc1dc749d8d90 (16-bytes, EXTRACT_KEY_FROM_KEY) 303s | sizeof bytes 16 303s | wrapper: siBuffer: 41 3a 6d 7a f7 68 9f 73 96 d1 14 64 05 0e ad 29 303s | RFC 4434 Test Case AES-XCBC-PRF-128 with 20-byte input (key length 16) extracted len 16 bytes at 0xc1dc749d9100 303s | unwrapped: 303s | 47 f5 1b 45 64 96 62 15 b8 98 5c 63 05 5e d3 08 G..Ed.b...\c.^.. 303s | verify_bytes() RFC 4434 Test Case AES-XCBC-PRF-128 with 20-byte input (key length 16): symkey: ok 303s ipsec algparse: RFC 4434 Test Case AES-XCBC-PRF-128 with 20-byte input (key length 10) 303s | decode_to_chunk() test_prf_vector: input "0x00010203040506070809" 303s | decode_to_chunk() output: 303s | 00 01 02 03 04 05 06 07 08 09 .......... 303s | decode_to_chunk() test_prf_vector: input "0x000102030405060708090a0b0c0d0e0f10111213" 303s | decode_to_chunk() output: 303s | 00 01 02 03 04 05 06 07 08 09 0a 0b 0c 0d 0e 0f ................ 303s | 10 11 12 13 .... 303s | decode_to_chunk() test_prf_vector: input "0x0fa087af7d866e7653434e602fdde835" 303s | decode_to_chunk() output: 303s | 0f a0 87 af 7d 86 6e 76 53 43 4e 60 2f dd e8 35 ....}.nvSCN`/..5 303s | PRF chunk interface PRF AES_XCBC init key hunk 0xc1dc749d7ff0 (length 10) 303s | 00 01 02 03 04 05 06 07 08 09 .......... 303s | CONCATENATE_DATA_AND_BASE: 303s | target: EXTRACT_KEY_FROM_KEY 303s | base: base-key@0xc1dc749d4bc0 (16-bytes, AES_KEY_GEN) 303s | params: 16-bytes@0xffffe203ce00 303s | key-offset: 0, key-size: 10 303s | EXTRACT_KEY_FROM_KEY: 303s | target: EXTRACT_KEY_FROM_KEY 303s | key_size: 10-bytes 303s | base: base-key@0xc1dc749d7c00 (26-bytes, EXTRACT_KEY_FROM_KEY) 303s | operation: FLAGS_ONLY 303s | params: 8-bytes@0xffffe203cda8 303s | XCBC: Key 10<16 too small, padding with zeros 303s | CONCATENATE_BASE_AND_DATA: 303s | target: EXTRACT_KEY_FROM_KEY 303s | base: base-key@0xc1dc749d8d90 (10-bytes, EXTRACT_KEY_FROM_KEY) 303s | params: 16-bytes@0xffffe203cd20 303s | key-offset: 0, key-size: 16 303s | EXTRACT_KEY_FROM_KEY: 303s | target: AES_ECB 303s | flags: SIGN 303s | key_size: 16-bytes 303s | base: base-key@0xc1dc749d7c00 (16-bytes, EXTRACT_KEY_FROM_KEY) 303s | operation: FLAGS_ONLY 303s | params: 8-bytes@0xffffe203cd58 303s | PRF chunk interface PRF AES_XCBC 0xc1dc749d85f0 303s | PRF chunk interface PRF AES_XCBC update message (0xc1dc749d6430 length 20) 303s | 00 01 02 03 04 05 06 07 08 09 0a 0b 0c 0d 0e 0f ................ 303s | 10 11 12 13 .... 303s | XCBC: data 303s | 00 01 02 03 04 05 06 07 08 09 0a 0b 0c 0d 0e 0f ................ 303s | 10 11 12 13 .... 303s | K extracting all 16 bytes of key@0xc1dc749d6510 303s | K: symkey-key@0xc1dc749d6510 (16-bytes, AES_ECB) 303s | sizeof bytes 16 303s | wrapper: (SECItemType)1735262254: d2 1d d4 60 3c a5 f3 cc d2 52 d7 a3 e3 e0 b1 a2 303s | K extracted len 16 bytes at 0xc1dc749d7e40 303s | unwrapped: 303s | 00 01 02 03 04 05 06 07 08 09 00 00 00 00 00 00 ................ 303s | XCBC: K: 303s | 00 01 02 03 04 05 06 07 08 09 00 00 00 00 00 00 ................ 303s | XCBC: K1 303s | 50 ca b2 4d 03 34 45 5e 40 7b 25 0f dd 7c f8 d5 P..M.4E^@{%..|.. 303s | CONCATENATE_DATA_AND_BASE: 303s | target: EXTRACT_KEY_FROM_KEY 303s | base: base-key@0xc1dc749d4bc0 (16-bytes, AES_KEY_GEN) 303s | params: 16-bytes@0xffffe203ccc0 303s | key-offset: 0, key-size: 16 303s | EXTRACT_KEY_FROM_KEY: 303s | target: AES_ECB 303s | flags: SIGN 303s | key_size: 16-bytes 303s | base: base-key@0xc1dc749d7c00 (32-bytes, EXTRACT_KEY_FROM_KEY) 303s | operation: FLAGS_ONLY 303s | params: 8-bytes@0xffffe203ccc8 303s | Computing E[2] using K3 303s | XCBC: K3 303s | 8e f7 48 db 56 f1 f7 26 24 72 f2 c5 63 b0 3f 88 ..H.V..&$r..c.?. 303s | XCBC: E[n-1] 303s | fe 1f 63 e9 65 1a 4b bb 3c cc cd 0d cc 83 e4 30 ..c.e.K.<......0 303s | XCBC: M[n] 303s | 10 11 12 13 .... 303s | XCBC: M[n] 303s | 10 11 12 13 .... 303s | XCBC: M[n]:80...^E[n-1]^K3 303s | 60 f9 39 21 b3 eb bc 9d 18 be 3f c8 af 33 db b8 `.9!......?..3.. 303s | XCBC: MAC 303s | 0f a0 87 af 7d 86 6e 76 53 43 4e 60 2f dd e8 35 ....}.nvSCN`/..5 303s | PRF chunk interface PRF AES_XCBC final length 16 303s | 0f a0 87 af 7d 86 6e 76 53 43 4e 60 2f dd e8 35 ....}.nvSCN`/..5 303s | chunk output 303s | 0f a0 87 af 7d 86 6e 76 53 43 4e 60 2f dd e8 35 ....}.nvSCN`/..5 303s | verify_bytes() RFC 4434 Test Case AES-XCBC-PRF-128 with 20-byte input (key length 10): prf OUT: ok 303s | CONCATENATE_DATA_AND_BASE: 303s | target: EXTRACT_KEY_FROM_KEY 303s | base: base-key@0xc1dc749d4bc0 (16-bytes, AES_KEY_GEN) 303s | params: 16-bytes@0xffffe203ce80 303s | key-offset: 0, key-size: 10 303s | EXTRACT_KEY_FROM_KEY: 303s | target: EXTRACT_KEY_FROM_KEY 303s | key_size: 10-bytes 303s | base: base-key@0xc1dc749d8d90 (26-bytes, EXTRACT_KEY_FROM_KEY) 303s | operation: FLAGS_ONLY 303s | params: 8-bytes@0xffffe203ce28 303s | PRF symkey interface PRF AES_XCBC init key symkey-key@0xc1dc749d6510 (size 10) 303s | PRF symkey interface: key symkey-key@0xc1dc749d6510 (10-bytes, EXTRACT_KEY_FROM_KEY) 303s | XCBC: Key 10<16 too small, padding with zeros 303s | CONCATENATE_BASE_AND_DATA: 303s | target: EXTRACT_KEY_FROM_KEY 303s | base: base-key@0xc1dc749d6510 (10-bytes, EXTRACT_KEY_FROM_KEY) 303s | params: 16-bytes@0xffffe203cd50 303s | key-offset: 0, key-size: 16 303s | EXTRACT_KEY_FROM_KEY: 303s | target: AES_ECB 303s | flags: SIGN 303s | key_size: 16-bytes 303s | base: base-key@0xc1dc749d8d90 (16-bytes, EXTRACT_KEY_FROM_KEY) 303s | operation: FLAGS_ONLY 303s | params: 8-bytes@0xffffe203cd88 303s | PRF symkey interface PRF AES_XCBC 0xc1dc749d85f0 303s | CONCATENATE_DATA_AND_BASE: 303s | target: EXTRACT_KEY_FROM_KEY 303s | base: base-key@0xc1dc749d4bc0 (16-bytes, AES_KEY_GEN) 303s | params: 16-bytes@0xffffe203ce80 303s | key-offset: 0, key-size: 20 303s | EXTRACT_KEY_FROM_KEY: 303s | target: EXTRACT_KEY_FROM_KEY 303s | key_size: 20-bytes 303s | base: base-key@0xc1dc749d8a20 (36-bytes, EXTRACT_KEY_FROM_KEY) 303s | operation: FLAGS_ONLY 303s | params: 8-bytes@0xffffe203ce28 303s | PRF symkey interface PRF AES_XCBC update symkey message-key@0xc1dc749d8d90 (size 20) 303s | PRF symkey interface: symkey message-key@0xc1dc749d8d90 (20-bytes, EXTRACT_KEY_FROM_KEY) 303s | symkey message extracting all 20 bytes of key@0xc1dc749d8d90 303s | symkey message: symkey-key@0xc1dc749d8d90 (20-bytes, EXTRACT_KEY_FROM_KEY) 303s | sizeof bytes 32 303s | wrapper: (SECItemType)41: f4 56 b2 72 40 b5 03 c0 51 38 56 d9 dc 71 2c 27 05 24 53 15 31 9e 81 80 4c 1f c7 14 03 c6 fb 29 303s | symkey message extracted len 32 bytes at 0xc1dc749d4b90 303s | unwrapped: 303s | 00 01 02 03 04 05 06 07 08 09 0a 0b 0c 0d 0e 0f ................ 303s | 10 11 12 13 00 00 00 00 00 00 00 00 00 00 00 00 ................ 303s | XCBC: data 303s | 00 01 02 03 04 05 06 07 08 09 0a 0b 0c 0d 0e 0f ................ 303s | 10 11 12 13 .... 303s | K extracting all 16 bytes of key@0xc1dc749d7c00 303s | K: symkey-key@0xc1dc749d7c00 (16-bytes, AES_ECB) 303s | sizeof bytes 16 303s | wrapper: (SECItemType)-503070408: d2 1d d4 60 3c a5 f3 cc d2 52 d7 a3 e3 e0 b1 a2 303s | K extracted len 16 bytes at 0xc1dc749d48c0 303s | unwrapped: 303s | 00 01 02 03 04 05 06 07 08 09 00 00 00 00 00 00 ................ 303s | XCBC: K: 303s | 00 01 02 03 04 05 06 07 08 09 00 00 00 00 00 00 ................ 303s | XCBC: K1 303s | 50 ca b2 4d 03 34 45 5e 40 7b 25 0f dd 7c f8 d5 P..M.4E^@{%..|.. 303s | CONCATENATE_DATA_AND_BASE: 303s | target: EXTRACT_KEY_FROM_KEY 303s | base: base-key@0xc1dc749d4bc0 (16-bytes, AES_KEY_GEN) 303s | params: 16-bytes@0xffffe203cd10 303s | key-offset: 0, key-size: 16 303s | EXTRACT_KEY_FROM_KEY: 303s | target: AES_ECB 303s | flags: SIGN 303s | key_size: 16-bytes 303s | base: base-key@0xc1dc749d9120 (32-bytes, EXTRACT_KEY_FROM_KEY) 303s | operation: FLAGS_ONLY 303s | params: 8-bytes@0xffffe203cd18 303s | Computing E[2] using K3 303s | XCBC: K3 303s | 8e f7 48 db 56 f1 f7 26 24 72 f2 c5 63 b0 3f 88 ..H.V..&$r..c.?. 303s | XCBC: E[n-1] 303s | fe 1f 63 e9 65 1a 4b bb 3c cc cd 0d cc 83 e4 30 ..c.e.K.<......0 303s | XCBC: M[n] 303s | 10 11 12 13 .... 303s | XCBC: M[n] 303s | 10 11 12 13 .... 303s | XCBC: M[n]:80...^E[n-1]^K3 303s | 60 f9 39 21 b3 eb bc 9d 18 be 3f c8 af 33 db b8 `.9!......?..3.. 303s | XCBC: MAC 303s | 0f a0 87 af 7d 86 6e 76 53 43 4e 60 2f dd e8 35 ....}.nvSCN`/..5 303s | CONCATENATE_DATA_AND_BASE: 303s | target: EXTRACT_KEY_FROM_KEY 303s | base: base-key@0xc1dc749d4bc0 (16-bytes, AES_KEY_GEN) 303s | params: 16-bytes@0xffffe203ce00 303s | key-offset: 0, key-size: 16 303s | EXTRACT_KEY_FROM_KEY: 303s | target: EXTRACT_KEY_FROM_KEY 303s | key_size: 16-bytes 303s | base: base-key@0xc1dc749d9120 (32-bytes, EXTRACT_KEY_FROM_KEY) 303s | operation: FLAGS_ONLY 303s | params: 8-bytes@0xffffe203cda8 303s | PRF symkey interface PRF AES_XCBC final-key@0xc1dc749d8a20 (size 16) 303s | PRF symkey interface: key-key@0xc1dc749d8a20 (16-bytes, EXTRACT_KEY_FROM_KEY) 303s | output: symkey-key@0xc1dc749d8a20 (16-bytes, EXTRACT_KEY_FROM_KEY) 303s | RFC 4434 Test Case AES-XCBC-PRF-128 with 20-byte input (key length 10) extracting all 16 bytes of key@0xc1dc749d8a20 303s | RFC 4434 Test Case AES-XCBC-PRF-128 with 20-byte input (key length 10): symkey-key@0xc1dc749d8a20 (16-bytes, EXTRACT_KEY_FROM_KEY) 303s | sizeof bytes 16 303s | wrapper: siBuffer: dd a1 42 86 63 48 28 1d e5 f0 6f 57 13 d4 d4 ae 303s | RFC 4434 Test Case AES-XCBC-PRF-128 with 20-byte input (key length 10) extracted len 16 bytes at 0xc1dc749d48c0 303s | unwrapped: 303s | 0f a0 87 af 7d 86 6e 76 53 43 4e 60 2f dd e8 35 ....}.nvSCN`/..5 303s | verify_bytes() RFC 4434 Test Case AES-XCBC-PRF-128 with 20-byte input (key length 10): symkey: ok 303s ipsec algparse: RFC 4434 Test Case AES-XCBC-PRF-128 with 20-byte input (key length 18) 303s | decode_to_chunk() test_prf_vector: input "0x000102030405060708090a0b0c0d0e0fedcb" 303s | decode_to_chunk() output: 303s | 00 01 02 03 04 05 06 07 08 09 0a 0b 0c 0d 0e 0f ................ 303s | ed cb .. 303s | decode_to_chunk() test_prf_vector: input "0x000102030405060708090a0b0c0d0e0f10111213" 303s | decode_to_chunk() output: 303s | 00 01 02 03 04 05 06 07 08 09 0a 0b 0c 0d 0e 0f ................ 303s | 10 11 12 13 .... 303s | decode_to_chunk() test_prf_vector: input "0x8cd3c93ae598a9803006ffb67c40e9e4" 303s | decode_to_chunk() output: 303s | 8c d3 c9 3a e5 98 a9 80 30 06 ff b6 7c 40 e9 e4 ...:....0...|@.. 303s | PRF chunk interface PRF AES_XCBC init key hunk 0xc1dc749d7ff0 (length 18) 303s | 00 01 02 03 04 05 06 07 08 09 0a 0b 0c 0d 0e 0f ................ 303s | ed cb .. 303s | CONCATENATE_DATA_AND_BASE: 303s | target: EXTRACT_KEY_FROM_KEY 303s | base: base-key@0xc1dc749d4bc0 (16-bytes, AES_KEY_GEN) 303s | params: 16-bytes@0xffffe203ce00 303s | key-offset: 0, key-size: 18 303s | EXTRACT_KEY_FROM_KEY: 303s | target: EXTRACT_KEY_FROM_KEY 303s | key_size: 18-bytes 303s | base: base-key@0xc1dc749d6510 (34-bytes, EXTRACT_KEY_FROM_KEY) 303s | operation: FLAGS_ONLY 303s | params: 8-bytes@0xffffe203cda8 303s | XCBC: Key 18>16 too big, rehashing to size 303s | CONCATENATE_DATA_AND_BASE: 303s | target: EXTRACT_KEY_FROM_KEY 303s | base: base-key@0xc1dc749d4bc0 (16-bytes, AES_KEY_GEN) 303s | params: 16-bytes@0xffffe203cd10 303s | key-offset: 0, key-size: 16 303s | EXTRACT_KEY_FROM_KEY: 303s | target: AES_ECB 303s | flags: SIGN 303s | key_size: 16-bytes 303s | base: base-key@0xc1dc749d8d90 (32-bytes, EXTRACT_KEY_FROM_KEY) 303s | operation: FLAGS_ONLY 303s | params: 8-bytes@0xffffe203cd18 303s | draft_chunk extracting all 18 bytes of key@0xc1dc749d8a20 303s | draft_chunk: symkey-key@0xc1dc749d8a20 (18-bytes, EXTRACT_KEY_FROM_KEY) 303s | sizeof bytes 32 303s | wrapper: (SECItemType)1702132066: f4 56 b2 72 40 b5 03 c0 51 38 56 d9 dc 71 2c 27 23 80 5f 7d 39 7f 82 07 d4 54 8e 03 de b0 6f 82 303s | draft_chunk extracted len 32 bytes at 0xc1dc749d4b90 303s | unwrapped: 303s | 00 01 02 03 04 05 06 07 08 09 0a 0b 0c 0d 0e 0f ................ 303s | ed cb 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................ 303s | XCBC: data 303s | 00 01 02 03 04 05 06 07 08 09 0a 0b 0c 0d 0e 0f ................ 303s | ed cb .. 303s | K extracting all 16 bytes of key@0xc1dc749d6510 303s | K: symkey-key@0xc1dc749d6510 (16-bytes, AES_ECB) 303s | sizeof bytes 16 303s | wrapper: (SECItemType)684837: f6 d6 c0 c0 81 af 4e 39 9f f9 f6 8d 8e 73 ce cb 303s | K extracted len 16 bytes at 0xc1dc749d8250 303s | unwrapped: 303s | 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................ 303s | XCBC: K: 303s | 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................ 303s | XCBC: K1 303s | e1 4d 5d 0e e2 77 15 df 08 b4 15 2b a2 3d a8 e0 .M]..w.....+.=.. 303s | CONCATENATE_DATA_AND_BASE: 303s | target: EXTRACT_KEY_FROM_KEY 303s | base: base-key@0xc1dc749d4bc0 (16-bytes, AES_KEY_GEN) 303s | params: 16-bytes@0xffffe203cc40 303s | key-offset: 0, key-size: 16 303s | EXTRACT_KEY_FROM_KEY: 303s | target: AES_ECB 303s | flags: SIGN 303s | key_size: 16-bytes 303s | base: base-key@0xc1dc749d7c00 (32-bytes, EXTRACT_KEY_FROM_KEY) 303s | operation: FLAGS_ONLY 303s | params: 8-bytes@0xffffe203cc48 303s | Computing E[2] using K3 303s | XCBC: K3 303s | 8d 34 ef cb 3b d5 45 ca 06 2a ec df ef 7c 0b fa .4..;.E..*...|.. 303s | XCBC: E[n-1] 303s | 0b 72 b2 ae 0a 37 79 81 75 6a d5 9c 79 c0 e6 96 .r...7y.uj..y... 303s | XCBC: M[n] 303s | ed cb .. 303s | XCBC: M[n] 303s | ed cb .. 303s | XCBC: M[n]:80...^E[n-1]^K3 303s | 6b 8d dd 65 31 e2 3c 4b 73 40 39 43 96 bc ed 6c k..e1.16 too big, rehashing to size 303s | CONCATENATE_DATA_AND_BASE: 303s | target: EXTRACT_KEY_FROM_KEY 303s | base: base-key@0xc1dc749d4bc0 (16-bytes, AES_KEY_GEN) 303s | params: 16-bytes@0xffffe203cd40 303s | key-offset: 0, key-size: 16 303s | EXTRACT_KEY_FROM_KEY: 303s | target: AES_ECB 303s | flags: SIGN 303s | key_size: 16-bytes 303s | base: base-key@0xc1dc749d6510 (32-bytes, EXTRACT_KEY_FROM_KEY) 303s | operation: FLAGS_ONLY 303s | params: 8-bytes@0xffffe203cd48 303s | draft_chunk extracting all 18 bytes of key@0xc1dc749d8d90 303s | draft_chunk: symkey-key@0xc1dc749d8d90 (18-bytes, EXTRACT_KEY_FROM_KEY) 303s | sizeof bytes 32 303s | wrapper: (SECItemType)-503068192: f4 56 b2 72 40 b5 03 c0 51 38 56 d9 dc 71 2c 27 23 80 5f 7d 39 7f 82 07 d4 54 8e 03 de b0 6f 82 303s | draft_chunk extracted len 32 bytes at 0xc1dc749d85f0 303s | unwrapped: 303s | 00 01 02 03 04 05 06 07 08 09 0a 0b 0c 0d 0e 0f ................ 303s | ed cb 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................ 303s | XCBC: data 303s | 00 01 02 03 04 05 06 07 08 09 0a 0b 0c 0d 0e 0f ................ 303s | ed cb .. 303s | K extracting all 16 bytes of key@0xc1dc749d8a20 303s | K: symkey-key@0xc1dc749d8a20 (16-bytes, AES_ECB) 303s | sizeof bytes 16 303s | wrapper: (SECItemType)684837: f6 d6 c0 c0 81 af 4e 39 9f f9 f6 8d 8e 73 ce cb 303s | K extracted len 16 bytes at 0xc1dc749d8a00 303s | unwrapped: 303s | 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................ 303s | XCBC: K: 303s | 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................ 303s | XCBC: K1 303s | e1 4d 5d 0e e2 77 15 df 08 b4 15 2b a2 3d a8 e0 .M]..w.....+.=.. 303s | CONCATENATE_DATA_AND_BASE: 303s | target: EXTRACT_KEY_FROM_KEY 303s | base: base-key@0xc1dc749d4bc0 (16-bytes, AES_KEY_GEN) 303s | params: 16-bytes@0xffffe203cc70 303s | key-offset: 0, key-size: 16 303s | EXTRACT_KEY_FROM_KEY: 303s | target: AES_ECB 303s | flags: SIGN 303s | key_size: 16-bytes 303s | base: base-key@0xc1dc749d7c00 (32-bytes, EXTRACT_KEY_FROM_KEY) 303s | operation: FLAGS_ONLY 303s | params: 8-bytes@0xffffe203cc78 303s | Computing E[2] using K3 303s | XCBC: K3 303s | 8d 34 ef cb 3b d5 45 ca 06 2a ec df ef 7c 0b fa .4..;.E..*...|.. 303s | XCBC: E[n-1] 303s | 0b 72 b2 ae 0a 37 79 81 75 6a d5 9c 79 c0 e6 96 .r...7y.uj..y... 303s | XCBC: M[n] 303s | ed cb .. 303s | XCBC: M[n] 303s | ed cb .. 303s | XCBC: M[n]:80...^E[n-1]^K3 303s | 6b 8d dd 65 31 e2 3c 4b 73 40 39 43 96 bc ed 6c k..e1.j.....n1.].8 303s | PRF chunk interface PRF HMAC_MD5 init key hunk 0xc1dc749d6430 (length 4) 303s | 4a 65 66 65 Jefe 303s | CONCATENATE_DATA_AND_BASE: 303s | target: EXTRACT_KEY_FROM_KEY 303s | base: base-key@0xc1dc749d4bc0 (16-bytes, AES_KEY_GEN) 303s | params: 16-bytes@0xffffe203cdd0 303s | key-offset: 0, key-size: 4 303s | EXTRACT_KEY_FROM_KEY: 303s | target: MD5_HMAC 303s | flags: SIGN 303s | key_size: 4-bytes 303s | base: base-key@0xc1dc749d7c00 (20-bytes, EXTRACT_KEY_FROM_KEY) 303s | operation: FLAGS_ONLY 303s | params: 8-bytes@0xffffe203cdd8 303s | PRF chunk interface prf: created HMAC_MD5 context 0xc1dc749d7ea0 from key-key@0xc1dc749d8d90 303s | PRF chunk interface prf: begin HMAC_MD5 with context 0xc1dc749d7ea0 from key-key@0xc1dc749d8d90 303s | PRF chunk interface PRF HMAC_MD5 0xc1dc749d8680 303s | PRF chunk interface PRF HMAC_MD5 update message (0xc1dc749d85f0 length 28) 303s | 77 68 61 74 20 64 6f 20 79 61 20 77 61 6e 74 20 what do ya want 303s | 66 6f 72 20 6e 6f 74 68 69 6e 67 3f for nothing? 303s | PRF chunk interface PRF HMAC_MD5 final length 16 303s | 75 0c 78 3e 6a b0 b5 03 ea a8 6e 31 0a 5d b7 38 u.x>j.....n1.].8 303s | chunk output 303s | 75 0c 78 3e 6a b0 b5 03 ea a8 6e 31 0a 5d b7 38 u.x>j.....n1.].8 303s | verify_bytes() RFC 2104: MD5_HMAC test 2: prf OUT: ok 303s | CONCATENATE_DATA_AND_BASE: 303s | target: EXTRACT_KEY_FROM_KEY 303s | base: base-key@0xc1dc749d4bc0 (16-bytes, AES_KEY_GEN) 303s | params: 16-bytes@0xffffe203ce80 303s | key-offset: 0, key-size: 4 303s | EXTRACT_KEY_FROM_KEY: 303s | target: EXTRACT_KEY_FROM_KEY 303s | key_size: 4-bytes 303s | base: base-key@0xc1dc749d7c00 (20-bytes, EXTRACT_KEY_FROM_KEY) 303s | operation: FLAGS_ONLY 303s | params: 8-bytes@0xffffe203ce28 303s | PRF symkey interface PRF HMAC_MD5 init key symkey-key@0xc1dc749d8d90 (size 4) 303s | PRF symkey interface: key symkey-key@0xc1dc749d8d90 (4-bytes, EXTRACT_KEY_FROM_KEY) 303s | key-offset: 0, key-size: 4 303s | EXTRACT_KEY_FROM_KEY: 303s | target: MD5_HMAC 303s | flags: SIGN 303s | key_size: 4-bytes 303s | base: base-key@0xc1dc749d8d90 (4-bytes, EXTRACT_KEY_FROM_KEY) 303s | operation: FLAGS_ONLY 303s | params: 8-bytes@0xffffe203cdf8 303s | PRF symkey interface prf: created HMAC_MD5 context 0xc1dc749d7ea0 from key symkey-key@0xc1dc749d7c00 303s | PRF symkey interface prf: begin HMAC_MD5 with context 0xc1dc749d7ea0 from key symkey-key@0xc1dc749d7c00 303s | PRF symkey interface PRF HMAC_MD5 0xc1dc749d4b60 303s | CONCATENATE_DATA_AND_BASE: 303s | target: EXTRACT_KEY_FROM_KEY 303s | base: base-key@0xc1dc749d4bc0 (16-bytes, AES_KEY_GEN) 303s | params: 16-bytes@0xffffe203ce80 303s | key-offset: 0, key-size: 28 303s | EXTRACT_KEY_FROM_KEY: 303s | target: EXTRACT_KEY_FROM_KEY 303s | key_size: 28-bytes 303s | base: base-key@0xc1dc749d6510 (44-bytes, EXTRACT_KEY_FROM_KEY) 303s | operation: FLAGS_ONLY 303s | params: 8-bytes@0xffffe203ce28 303s | PRF symkey interface PRF HMAC_MD5 update symkey message-key@0xc1dc749d8a20 (size 28) 303s | PRF symkey interface: symkey message-key@0xc1dc749d8a20 (28-bytes, EXTRACT_KEY_FROM_KEY) 303s | nss hmac digest hack extracting all 28 bytes of key@0xc1dc749d8a20 303s | nss hmac digest hack: symkey-key@0xc1dc749d8a20 (28-bytes, EXTRACT_KEY_FROM_KEY) 303s | sizeof bytes 32 303s | wrapper: (SECItemType)41: 2d 51 15 c0 c1 82 22 7e 46 25 66 0a b6 fa f4 7b 65 f3 b2 82 10 87 34 72 48 c4 0d ca e5 b6 07 fd 303s | nss hmac digest hack extracted len 32 bytes at 0xc1dc749df590 303s | unwrapped: 303s | 77 68 61 74 20 64 6f 20 79 61 20 77 61 6e 74 20 what do ya want 303s | 66 6f 72 20 6e 6f 74 68 69 6e 67 3f 00 00 00 00 for nothing?.... 303s | CONCATENATE_DATA_AND_BASE: 303s | target: EXTRACT_KEY_FROM_KEY 303s | base: base-key@0xc1dc749d4bc0 (16-bytes, AES_KEY_GEN) 303s | params: 16-bytes@0xffffe203ce10 303s | key-offset: 0, key-size: 16 303s | EXTRACT_KEY_FROM_KEY: 303s | target: EXTRACT_KEY_FROM_KEY 303s | key_size: 16-bytes 303s | base: base-key@0xc1dc749d6510 (32-bytes, EXTRACT_KEY_FROM_KEY) 303s | operation: FLAGS_ONLY 303s | params: 8-bytes@0xffffe203cdb8 303s | PRF symkey interface PRF HMAC_MD5 final-key@0xc1dc749d7c00 (size 16) 303s | PRF symkey interface: key-key@0xc1dc749d7c00 (16-bytes, EXTRACT_KEY_FROM_KEY) 303s | output: symkey-key@0xc1dc749d7c00 (16-bytes, EXTRACT_KEY_FROM_KEY) 303s | RFC 2104: MD5_HMAC test 2 extracting all 16 bytes of key@0xc1dc749d7c00 303s | RFC 2104: MD5_HMAC test 2: symkey-key@0xc1dc749d7c00 (16-bytes, EXTRACT_KEY_FROM_KEY) 303s | sizeof bytes 16 303s | wrapper: siBuffer: 4a 67 5d 8c 03 8e 83 5b d6 3b 94 9e 33 72 11 fe 303s | RFC 2104: MD5_HMAC test 2 extracted len 16 bytes at 0xc1dc749d8250 303s | unwrapped: 303s | 75 0c 78 3e 6a b0 b5 03 ea a8 6e 31 0a 5d b7 38 u.x>j.....n1.].8 303s | verify_bytes() RFC 2104: MD5_HMAC test 2: symkey: ok 303s ipsec algparse: RFC 2104: MD5_HMAC test 3 303s | decode_to_chunk() test_prf_vector: input "0xAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAA" 303s | decode_to_chunk() output: 303s | aa aa aa aa aa aa aa aa aa aa aa aa aa aa aa aa ................ 303s | decode_to_chunk() test_prf_vector: input "0xDDDDDDDDDDDDDDDDDDDDDDDDDDDDDDDDDDDDDDDDDDDDDDDDDDDDDDDDDDDDDDDDDDDDDDDDDDDDDDDDDDDDDDDDDDDDDDDDDDDD" 303s | decode_to_chunk() output: 303s | dd dd dd dd dd dd dd dd dd dd dd dd dd dd dd dd ................ 303s | dd dd dd dd dd dd dd dd dd dd dd dd dd dd dd dd ................ 303s | dd dd dd dd dd dd dd dd dd dd dd dd dd dd dd dd ................ 303s | dd dd .. 303s | decode_to_chunk() test_prf_vector: input "0x56be34521d144c88dbb8c733f0e8b3f6" 303s | decode_to_chunk() output: 303s | 56 be 34 52 1d 14 4c 88 db b8 c7 33 f0 e8 b3 f6 V.4R..L....3.... 303s | PRF chunk interface PRF HMAC_MD5 init key hunk 0xc1dc749d8010 (length 16) 303s | aa aa aa aa aa aa aa aa aa aa aa aa aa aa aa aa ................ 303s | CONCATENATE_DATA_AND_BASE: 303s | target: EXTRACT_KEY_FROM_KEY 303s | base: base-key@0xc1dc749d4bc0 (16-bytes, AES_KEY_GEN) 303s | params: 16-bytes@0xffffe203cdd0 303s | key-offset: 0, key-size: 16 303s | EXTRACT_KEY_FROM_KEY: 303s | target: MD5_HMAC 303s | flags: SIGN 303s | key_size: 16-bytes 303s | base: base-key@0xc1dc749d8d90 (32-bytes, EXTRACT_KEY_FROM_KEY) 303s | operation: FLAGS_ONLY 303s | params: 8-bytes@0xffffe203cdd8 303s | PRF chunk interface prf: created HMAC_MD5 context 0xc1dc749d7ea0 from key-key@0xc1dc749d7c00 303s | PRF chunk interface prf: begin HMAC_MD5 with context 0xc1dc749d7ea0 from key-key@0xc1dc749d7c00 303s | PRF chunk interface PRF HMAC_MD5 0xc1dc749d4b90 303s | PRF chunk interface PRF HMAC_MD5 update message (0xc1dc749d7bc0 length 50) 303s | dd dd dd dd dd dd dd dd dd dd dd dd dd dd dd dd ................ 303s | dd dd dd dd dd dd dd dd dd dd dd dd dd dd dd dd ................ 303s | dd dd dd dd dd dd dd dd dd dd dd dd dd dd dd dd ................ 303s | dd dd .. 303s | PRF chunk interface PRF HMAC_MD5 final length 16 303s | 56 be 34 52 1d 14 4c 88 db b8 c7 33 f0 e8 b3 f6 V.4R..L....3.... 303s | chunk output 303s | 56 be 34 52 1d 14 4c 88 db b8 c7 33 f0 e8 b3 f6 V.4R..L....3.... 303s | verify_bytes() RFC 2104: MD5_HMAC test 3: prf OUT: ok 303s | CONCATENATE_DATA_AND_BASE: 303s | target: EXTRACT_KEY_FROM_KEY 303s | base: base-key@0xc1dc749d4bc0 (16-bytes, AES_KEY_GEN) 303s | params: 16-bytes@0xffffe203ce80 303s | key-offset: 0, key-size: 16 303s | EXTRACT_KEY_FROM_KEY: 303s | target: EXTRACT_KEY_FROM_KEY 303s | key_size: 16-bytes 303s | base: base-key@0xc1dc749d8d90 (32-bytes, EXTRACT_KEY_FROM_KEY) 303s | operation: FLAGS_ONLY 303s | params: 8-bytes@0xffffe203ce28 303s | PRF symkey interface PRF HMAC_MD5 init key symkey-key@0xc1dc749d7c00 (size 16) 303s | PRF symkey interface: key symkey-key@0xc1dc749d7c00 (16-bytes, EXTRACT_KEY_FROM_KEY) 303s | key-offset: 0, key-size: 16 303s | EXTRACT_KEY_FROM_KEY: 303s | target: MD5_HMAC 303s | flags: SIGN 303s | key_size: 16-bytes 303s | base: base-key@0xc1dc749d7c00 (16-bytes, EXTRACT_KEY_FROM_KEY) 303s | operation: FLAGS_ONLY 303s | params: 8-bytes@0xffffe203cdf8 303s | PRF symkey interface prf: created HMAC_MD5 context 0xc1dc749d7ea0 from key symkey-key@0xc1dc749d8d90 303s | PRF symkey interface prf: begin HMAC_MD5 with context 0xc1dc749d7ea0 from key symkey-key@0xc1dc749d8d90 303s | PRF symkey interface PRF HMAC_MD5 0xc1dc749d85f0 303s | CONCATENATE_DATA_AND_BASE: 303s | target: EXTRACT_KEY_FROM_KEY 303s | base: base-key@0xc1dc749d4bc0 (16-bytes, AES_KEY_GEN) 303s | params: 16-bytes@0xffffe203ce80 303s | key-offset: 0, key-size: 50 303s | EXTRACT_KEY_FROM_KEY: 303s | target: EXTRACT_KEY_FROM_KEY 303s | key_size: 50-bytes 303s | base: base-key@0xc1dc749d6510 (66-bytes, EXTRACT_KEY_FROM_KEY) 303s | operation: FLAGS_ONLY 303s | params: 8-bytes@0xffffe203ce28 303s | PRF symkey interface PRF HMAC_MD5 update symkey message-key@0xc1dc749d8a20 (size 50) 303s | PRF symkey interface: symkey message-key@0xc1dc749d8a20 (50-bytes, EXTRACT_KEY_FROM_KEY) 303s | nss hmac digest hack extracting all 50 bytes of key@0xc1dc749d8a20 303s | nss hmac digest hack: symkey-key@0xc1dc749d8a20 (50-bytes, EXTRACT_KEY_FROM_KEY) 303s | sizeof bytes 64 303s | wrapper: (SECItemType)41: 33 42 b5 13 8c d5 12 08 92 95 87 6d fe f4 24 02 33 42 b5 13 8c d5 12 08 92 95 87 6d fe f4 24 02 33 42 b5 13 8c d5 12 08 92 95 87 6d fe f4 24 02 1f 57 5a a0 6e 9c 11 83 d2 e6 c0 c0 fc 15 f2 b1 303s | nss hmac digest hack extracted len 64 bytes at 0xc1dc749d86b0 303s | unwrapped: 303s | dd dd dd dd dd dd dd dd dd dd dd dd dd dd dd dd ................ 303s | dd dd dd dd dd dd dd dd dd dd dd dd dd dd dd dd ................ 303s | dd dd dd dd dd dd dd dd dd dd dd dd dd dd dd dd ................ 303s | dd dd 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................ 303s | CONCATENATE_DATA_AND_BASE: 303s | target: EXTRACT_KEY_FROM_KEY 303s | base: base-key@0xc1dc749d4bc0 (16-bytes, AES_KEY_GEN) 303s | params: 16-bytes@0xffffe203ce10 303s | key-offset: 0, key-size: 16 303s | EXTRACT_KEY_FROM_KEY: 303s | target: EXTRACT_KEY_FROM_KEY 303s | key_size: 16-bytes 303s | base: base-key@0xc1dc749d6510 (32-bytes, EXTRACT_KEY_FROM_KEY) 303s | operation: FLAGS_ONLY 303s | params: 8-bytes@0xffffe203cdb8 303s | PRF symkey interface PRF HMAC_MD5 final-key@0xc1dc749d8d90 (size 16) 303s | PRF symkey interface: key-key@0xc1dc749d8d90 (16-bytes, EXTRACT_KEY_FROM_KEY) 303s | output: symkey-key@0xc1dc749d8d90 (16-bytes, EXTRACT_KEY_FROM_KEY) 303s | RFC 2104: MD5_HMAC test 3 extracting all 16 bytes of key@0xc1dc749d8d90 303s | RFC 2104: MD5_HMAC test 3: symkey-key@0xc1dc749d8d90 (16-bytes, EXTRACT_KEY_FROM_KEY) 303s | sizeof bytes 16 303s | wrapper: siBuffer: b6 26 76 36 26 a6 a0 15 e2 4f 7c 86 42 11 5c 94 303s | RFC 2104: MD5_HMAC test 3 extracted len 16 bytes at 0xc1dc749d4a80 303s | unwrapped: 303s | 56 be 34 52 1d 14 4c 88 db b8 c7 33 f0 e8 b3 f6 V.4R..L....3.... 303s | verify_bytes() RFC 2104: MD5_HMAC test 3: symkey: ok 303s ipsec algparse: testing HMAC_SHA1: 303s ipsec algparse: CAVP: IKEv2 key derivation with HMAC-SHA1 303s | decode_to_chunk() test_kdf_vector: input "0x32b50d5f4a3763f3" 303s | decode_to_chunk() output: 303s | 32 b5 0d 5f 4a 37 63 f3 2.._J7c. 303s | decode_to_chunk() test_kdf_vector: input "0x9206a04b26564cb1" 303s | decode_to_chunk() output: 303s | 92 06 a0 4b 26 56 4c b1 ...K&VL. 303s | decode_to_chunk() test_kdf_vector: input "0x34c9e7c188868785" 303s | decode_to_chunk() output: 303s | 34 c9 e7 c1 88 86 87 85 4....... 303s | decode_to_chunk() test_kdf_vector: input "0x3ff77d760d2b2199" 303s | decode_to_chunk() output: 303s | 3f f7 7d 76 0d 2b 21 99 ?.}v.+!. 303s | decode_to_chunk() test_kdf_vector: input "0x4b2c1f971981a8ad8d0abeafabf38cf75fc8349c148142465ed9c8b516b8be52" 303s | decode_to_chunk() output: 303s | 4b 2c 1f 97 19 81 a8 ad 8d 0a be af ab f3 8c f7 K,.............. 303s | 5f c8 34 9c 14 81 42 46 5e d9 c8 b5 16 b8 be 52 _.4...BF^......R 303s | decode_to_chunk() test_kdf_vector: input "0x863f3c9d06efd39d2b907b97f8699e5dd5251ef64a2a176f36ee40c87d4f9330" 303s | decode_to_chunk() output: 303s | 86 3f 3c 9d 06 ef d3 9d 2b 90 7b 97 f8 69 9e 5d .?<.....+.{..i.] 303s | d5 25 1e f6 4a 2a 17 6f 36 ee 40 c8 7d 4f 93 30 .%..J*.o6.@.}O.0 303s | decode_to_chunk() test_kdf_vector: input "0xa9a7b222b59f8f48645f28a1db5b5f5d7479cba7" 303s | decode_to_chunk() output: 303s | a9 a7 b2 22 b5 9f 8f 48 64 5f 28 a1 db 5b 5f 5d ..."...Hd_(..[_] 303s | 74 79 cb a7 ty.. 303s | decode_to_chunk() test_kdf_vector: input "0x63e81194946ebd05df7df5ebf5d8750056bf1f1d" 303s | decode_to_chunk() output: 303s | 63 e8 11 94 94 6e bd 05 df 7d f5 eb f5 d8 75 00 c....n...}....u. 303s | 56 bf 1f 1d V... 303s | decode_to_chunk() test_kdf_vector: input "0xa14293677cc80ff8f9cc0eee30d895da9d8f405666e30ef0dfcb63c634a46002a2a63080e514a062768b76606f9fa5e992204fc5a670bde3f10d6b027113936a5c55b648a194ae587b0088d52204b702c979fa280870d2ed41efa9c549fd11198af1670b143d384bd275c5f594cf266b05ebadca855e4249520a441a81157435a7a56cc4" 303s | decode_to_chunk() output: 303s | a1 42 93 67 7c c8 0f f8 f9 cc 0e ee 30 d8 95 da .B.g|.......0... 303s | 9d 8f 40 56 66 e3 0e f0 df cb 63 c6 34 a4 60 02 ..@Vf.....c.4.`. 303s | a2 a6 30 80 e5 14 a0 62 76 8b 76 60 6f 9f a5 e9 ..0....bv.v`o... 303s | 92 20 4f c5 a6 70 bd e3 f1 0d 6b 02 71 13 93 6a . O..p....k.q..j 303s | 5c 55 b6 48 a1 94 ae 58 7b 00 88 d5 22 04 b7 02 \U.H...X{..."... 303s | c9 79 fa 28 08 70 d2 ed 41 ef a9 c5 49 fd 11 19 .y.(.p..A...I... 303s | 8a f1 67 0b 14 3d 38 4b d2 75 c5 f5 94 cf 26 6b ..g..=8K.u....&k 303s | 05 eb ad ca 85 5e 42 49 52 0a 44 1a 81 15 74 35 .....^BIR.D...t5 303s | a7 a5 6c c4 ..l. 303s | CONCATENATE_DATA_AND_BASE: 303s | target: EXTRACT_KEY_FROM_KEY 303s | base: base-key@0xc1dc749d4bc0 (16-bytes, AES_KEY_GEN) 303s | params: 16-bytes@0xffffe203ce80 303s | key-offset: 0, key-size: 32 303s | EXTRACT_KEY_FROM_KEY: 303s | target: EXTRACT_KEY_FROM_KEY 303s | key_size: 32-bytes 303s | base: base-key@0xc1dc749d7c00 (48-bytes, EXTRACT_KEY_FROM_KEY) 303s | operation: FLAGS_ONLY 303s | params: 8-bytes@0xffffe203ce28 303s | NSS_IKE_PRF_DERIVE: 303s | target: NSS_IKE_PRF_PLUS_DERIVE 303s | base: base-key@0xc1dc749d8d90 (32-bytes, EXTRACT_KEY_FROM_KEY) 303s | params: 56-bytes@0xffffe203ce90 303s | CAVP: IKEv2 key derivation with HMAC-SHA1 extracting all 20 bytes of key@0xc1dc749d7c00 303s | CAVP: IKEv2 key derivation with HMAC-SHA1: symkey-key@0xc1dc749d7c00 (20-bytes, NSS_IKE_PRF_PLUS_DERIVE) 303s | sizeof bytes 32 303s | wrapper: (SECItemType)1684156471: 01 78 8c 8c 38 e8 4e 53 53 a6 21 bf fa 47 e7 66 12 70 13 66 42 7e 88 93 87 ad e1 5e 24 f0 b2 8c 303s | CAVP: IKEv2 key derivation with HMAC-SHA1 extracted len 32 bytes at 0xc1dc749d8680 303s | unwrapped: 303s | a9 a7 b2 22 b5 9f 8f 48 64 5f 28 a1 db 5b 5f 5d ..."...Hd_(..[_] 303s | 74 79 cb a7 00 00 00 00 00 00 00 00 00 00 00 00 ty.............. 303s | verify_bytes() CAVP: IKEv2 key derivation with HMAC-SHA1: skeyseed: ok 303s | NSS_IKE_PRF_PLUS_DERIVE: 303s | target: EXTRACT_KEY_FROM_KEY 303s | key_size: 132-bytes 303s | base: base-key@0xc1dc749d7c00 (20-bytes, NSS_IKE_PRF_PLUS_DERIVE) 303s | params: 40-bytes@0xffffe203cde0 303s | CAVP: IKEv2 key derivation with HMAC-SHA1 extracting all 132 bytes of key@0xc1dc749d8a20 303s | CAVP: IKEv2 key derivation with HMAC-SHA1: symkey-key@0xc1dc749d8a20 (132-bytes, EXTRACT_KEY_FROM_KEY) 303s | sizeof bytes 144 303s | wrapper: (SECItemType)1684156471: 90 cf 56 02 cd 68 a8 f3 82 14 35 c0 32 63 b1 ad bc 7e eb 11 79 df 96 22 36 49 be 3a c3 63 f2 ec cb 90 2d ad 9b 59 26 60 5b 37 3a a5 b6 9a 6b 80 06 fd f9 df 63 4e a4 30 83 e9 e4 6c e9 2e 15 98 5f 8b 41 9a eb d1 09 11 25 c6 5d e9 b7 05 f0 b0 f4 8f be af 7c 8f e3 b2 08 82 26 5c ca c8 a6 36 06 75 be af 5a fb 9e 5a 60 69 5e 8b 00 80 af 8b 9d 6d 96 90 e2 f2 aa 67 36 e0 d4 9d 68 53 df 39 af 59 14 67 02 a1 d5 3a f5 82 3d d0 ed 8f e7 dc 303s | CAVP: IKEv2 key derivation with HMAC-SHA1 extracted len 144 bytes at 0xc1dc749d7a30 303s | unwrapped: 303s | a1 42 93 67 7c c8 0f f8 f9 cc 0e ee 30 d8 95 da .B.g|.......0... 303s | 9d 8f 40 56 66 e3 0e f0 df cb 63 c6 34 a4 60 02 ..@Vf.....c.4.`. 303s | a2 a6 30 80 e5 14 a0 62 76 8b 76 60 6f 9f a5 e9 ..0....bv.v`o... 303s | 92 20 4f c5 a6 70 bd e3 f1 0d 6b 02 71 13 93 6a . O..p....k.q..j 303s | 5c 55 b6 48 a1 94 ae 58 7b 00 88 d5 22 04 b7 02 \U.H...X{..."... 303s | c9 79 fa 28 08 70 d2 ed 41 ef a9 c5 49 fd 11 19 .y.(.p..A...I... 303s | 8a f1 67 0b 14 3d 38 4b d2 75 c5 f5 94 cf 26 6b ..g..=8K.u....&k 303s | 05 eb ad ca 85 5e 42 49 52 0a 44 1a 81 15 74 35 .....^BIR.D...t5 303s | a7 a5 6c c4 00 00 00 00 00 00 00 00 00 00 00 00 ..l............. 303s | verify_bytes() CAVP: IKEv2 key derivation with HMAC-SHA1: DKM: ok 303s | key-offset: 0, key-size: 20 303s | EXTRACT_KEY_FROM_KEY: 303s | target: EXTRACT_KEY_FROM_KEY 303s | key_size: 20-bytes 303s | base: base-key@0xc1dc749d8a20 (132-bytes, EXTRACT_KEY_FROM_KEY) 303s | operation: FLAGS_ONLY 303s | params: 8-bytes@0xffffe203cea8 303s | CONCATENATE_DATA_AND_BASE: 303s | target: EXTRACT_KEY_FROM_KEY 303s | base: base-key@0xc1dc749d4bc0 (16-bytes, AES_KEY_GEN) 303s | params: 16-bytes@0xffffe203ce80 303s | key-offset: 0, key-size: 32 303s | EXTRACT_KEY_FROM_KEY: 303s | target: EXTRACT_KEY_FROM_KEY 303s | key_size: 32-bytes 303s | base: base-key@0xc1dc749d8440 (48-bytes, EXTRACT_KEY_FROM_KEY) 303s | operation: FLAGS_ONLY 303s | params: 8-bytes@0xffffe203ce28 303s | NSS_IKE_PRF_DERIVE: 303s | target: NSS_IKE_PRF_PLUS_DERIVE 303s | base: base-key@0xc1dc749d6510 (20-bytes, EXTRACT_KEY_FROM_KEY) 303s | params: 56-bytes@0xffffe203ce80 303s | CAVP: IKEv2 key derivation with HMAC-SHA1 extracting all 20 bytes of key@0xc1dc749d8440 303s | CAVP: IKEv2 key derivation with HMAC-SHA1: symkey-key@0xc1dc749d8440 (20-bytes, NSS_IKE_PRF_PLUS_DERIVE) 303s | sizeof bytes 32 303s | wrapper: (SECItemType)1936548210: 08 19 9a 5e cb 08 a2 1f bd 96 3d 53 43 1a 53 2f f6 65 21 c1 c3 ba d3 fd f8 72 72 30 66 b6 15 24 303s | CAVP: IKEv2 key derivation with HMAC-SHA1 extracted len 32 bytes at 0xc1dc749d4b90 303s | unwrapped: 303s | 63 e8 11 94 94 6e bd 05 df 7d f5 eb f5 d8 75 00 c....n...}....u. 303s | 56 bf 1f 1d 00 00 00 00 00 00 00 00 00 00 00 00 V............... 303s | verify_bytes() CAVP: IKEv2 key derivation with HMAC-SHA1: skeyseed_rekey: ok 303s ipsec algparse: leak detective found no leaks 303s /usr/libexec/ipsec/pluto: adjusting nssdir to /tmp/tmp.XcHMbmLhzt 303s /usr/libexec/ipsec/pluto: selftest: skipping lock 303s /usr/libexec/ipsec/pluto: selftest: skipping control socket 303s /usr/libexec/ipsec/pluto: selftest: skipping fork 303s Starting Pluto (Libreswan Version 5.2 IKEv2 IKEv1 XFRM XFRMI esp-hw-offload FORK PTHREAD_SETSCHEDPRIO NSS (IPsec profile) (NSS-KDF) DNSSEC SYSTEMD_WATCHDOG LABELED_IPSEC (SELINUX) LIBCAP_NG LINUX_AUDIT AUTH_PAM NETWORKMANAGER CURL(non-NSS) LDAP(non-NSS) NFTABLES CAT NFLOG) pid:1516 303s operating system: Linux 6.18.0 [Linux 6.18.0-9-generic #9-Ubuntu SMP PREEMPT_DYNAMIC Mon Jan 12 16:41:39 UTC 2026 aarch64] 303s core dump dir: /run/pluto 303s secrets file: /etc/ipsec.secrets 303s Initializing NSS using read-only database "sql:/tmp/tmp.XcHMbmLhzt" 303s FIPS Mode: OFF 303s NSS crypto library initialized 303s FIPS mode disabled for pluto daemon 303s FIPS HMAC integrity support [not required] 303s libcap-ng capng_apply failed to apply changes, err=-5. see: man capng_apply 303s libcap-ng support [enabled] 303s Linux audit support [enabled] 303s leak-detective disabled 303s NSS crypto [enabled] 303s XAUTH PAM support [enabled] 303s initializing libevent in pthreads mode: headers: 2.1.12-stable (2010c00); library: 2.1.12-stable (2010c00) 303s NAT-Traversal: keep-alive period 20s 303s ERROR: xfrmi is not supported, failed to create ipsec-interface ipsec1 bound to lo 303s ipsec-interface is not working: xfrmi is not supported 303s IPsec Interface [disabled] 303s refreshed session resume keys, issuing key 1 303s Encryption algorithms: 303s AES_CCM_16 {256,192,*128} IKEv1: ESP IKEv2: ESP FIPS aes_ccm, aes_ccm_c 303s AES_CCM_12 {256,192,*128} IKEv1: ESP IKEv2: ESP FIPS aes_ccm_b 303s AES_CCM_8 {256,192,*128} IKEv1: ESP IKEv2: ESP FIPS aes_ccm_a 303s 3DES_CBC [*192] IKEv1: IKE ESP IKEv2: IKE ESP FIPS NSS(CBC) 3des 303s CAMELLIA_CTR {256,192,*128} IKEv1: ESP IKEv2: ESP 303s CAMELLIA_CBC {256,192,*128} IKEv1: IKE ESP IKEv2: IKE ESP NSS(CBC) camellia 303s AES_GCM_16 {256,192,*128} IKEv1: ESP IKEv2: IKE ESP FIPS NSS(AEAD) aes_gcm, aes_gcm_c 303s AES_GCM_12 {256,192,*128} IKEv1: ESP IKEv2: IKE ESP FIPS NSS(AEAD) aes_gcm_b 303s AES_GCM_8 {256,192,*128} IKEv1: ESP IKEv2: IKE ESP FIPS NSS(AEAD) aes_gcm_a 303s AES_CTR {256,192,*128} IKEv1: IKE ESP IKEv2: IKE ESP FIPS NSS(CTR) aesctr 303s AES_CBC {256,192,*128} IKEv1: IKE ESP IKEv2: IKE ESP FIPS NSS(CBC) aes 303s NULL_AUTH_AES_GMAC {256,192,*128} IKEv1: ESP IKEv2: ESP FIPS aes_gmac 303s NULL [] IKEv1: ESP IKEv2: ESP NULL 303s CHACHA20_POLY1305 [*256] IKEv1: IKEv2: IKE ESP NSS(AEAD) chacha20poly1305 303s Hash algorithms: 303s MD5 IKEv1: IKE IKEv2: NSS 303s SHA1 IKEv1: IKE IKEv2: IKE FIPS NSS sha 303s SHA2_256 IKEv1: IKE IKEv2: IKE FIPS NSS sha2, sha256 303s SHA2_384 IKEv1: IKE IKEv2: IKE FIPS NSS sha384 303s SHA2_512 IKEv1: IKE IKEv2: IKE FIPS NSS sha512 303s IDENTITY IKEv1: IKEv2: FIPS 303s PRF algorithms: 303s HMAC_MD5 IKEv1: IKE IKEv2: IKE NSS md5 303s HMAC_SHA1 IKEv1: IKE IKEv2: IKE FIPS NSS sha, sha1 303s HMAC_SHA2_256 IKEv1: IKE IKEv2: IKE FIPS NSS sha2, sha256, sha2_256 303s HMAC_SHA2_384 IKEv1: IKE IKEv2: IKE FIPS NSS sha384, sha2_384 303s HMAC_SHA2_512 IKEv1: IKE IKEv2: IKE FIPS NSS sha512, sha2_512 303s AES_XCBC IKEv1: IKEv2: IKE native(XCBC) aes128_xcbc 303s Integrity algorithms: 303s HMAC_MD5_96 IKEv1: IKE ESP AH IKEv2: IKE ESP AH NSS md5, hmac_md5 303s HMAC_SHA1_96 IKEv1: IKE ESP AH IKEv2: IKE ESP AH FIPS NSS sha, sha1, sha1_96, hmac_sha1 303s HMAC_SHA2_512_256 IKEv1: IKE ESP AH IKEv2: IKE ESP AH FIPS NSS sha512, sha2_512, sha2_512_256, hmac_sha2_512 303s HMAC_SHA2_384_192 IKEv1: IKE ESP AH IKEv2: IKE ESP AH FIPS NSS sha384, sha2_384, sha2_384_192, hmac_sha2_384 303s HMAC_SHA2_256_128 IKEv1: IKE ESP AH IKEv2: IKE ESP AH FIPS NSS sha2, sha256, sha2_256, sha2_256_128, hmac_sha2_256 303s HMAC_SHA2_256_TRUNCBUG IKEv1: ESP AH IKEv2: AH 303s AES_XCBC_96 IKEv1: ESP AH IKEv2: IKE ESP AH native(XCBC) aes_xcbc, aes128_xcbc, aes128_xcbc_96 303s AES_CMAC_96 IKEv1: ESP AH IKEv2: ESP AH FIPS aes_cmac 303s NONE IKEv1: ESP IKEv2: IKE ESP FIPS null 303s DH algorithms: 303s NONE IKEv1: IKEv2: IKE ESP AH FIPS NSS(MODP) null, dh0 303s MODP1536 IKEv1: IKE ESP AH IKEv2: IKE ESP AH NSS(MODP) dh5 303s MODP2048 IKEv1: IKE ESP AH IKEv2: IKE ESP AH FIPS NSS(MODP) dh14 303s MODP3072 IKEv1: IKE ESP AH IKEv2: IKE ESP AH FIPS NSS(MODP) dh15 303s MODP4096 IKEv1: IKE ESP AH IKEv2: IKE ESP AH FIPS NSS(MODP) dh16 303s MODP6144 IKEv1: IKE ESP AH IKEv2: IKE ESP AH FIPS NSS(MODP) dh17 303s MODP8192 IKEv1: IKE ESP AH IKEv2: IKE ESP AH FIPS NSS(MODP) dh18 303s DH19 IKEv1: IKE IKEv2: IKE ESP AH FIPS NSS(ECP) ecp_256, ecp256 303s DH20 IKEv1: IKE IKEv2: IKE ESP AH FIPS NSS(ECP) ecp_384, ecp384 303s DH21 IKEv1: IKE IKEv2: IKE ESP AH FIPS NSS(ECP) ecp_521, ecp521 303s DH31 IKEv1: IKE IKEv2: IKE ESP AH NSS(ECP) curve25519 303s IPCOMP algorithms: 303s DEFLATE IKEv1: ESP AH IKEv2: ESP AH FIPS 303s LZS IKEv1: IKEv2: ESP AH FIPS 303s LZJH IKEv1: IKEv2: ESP AH FIPS 303s testing CAMELLIA_CBC: 303s Camellia: 16 bytes with 128-bit key 303s Camellia: 16 bytes with 128-bit key 303s Camellia: 16 bytes with 256-bit key 303s Camellia: 16 bytes with 256-bit key 303s testing AES_GCM_16: 303s empty string 303s one block 303s two blocks 303s two blocks with associated data 303s testing AES_CTR: 303s Encrypting 16 octets using AES-CTR with 128-bit key 303s Encrypting 32 octets using AES-CTR with 128-bit key 303s Encrypting 36 octets using AES-CTR with 128-bit key 303s Encrypting 16 octets using AES-CTR with 192-bit key 303s Encrypting 32 octets using AES-CTR with 192-bit key 303s Encrypting 36 octets using AES-CTR with 192-bit key 303s Encrypting 16 octets using AES-CTR with 256-bit key 303s Encrypting 32 octets using AES-CTR with 256-bit key 303s Encrypting 36 octets using AES-CTR with 256-bit key 303s testing AES_CBC: 303s Encrypting 16 bytes (1 block) using AES-CBC with 128-bit key 303s Encrypting 32 bytes (2 blocks) using AES-CBC with 128-bit key 303s Encrypting 48 bytes (3 blocks) using AES-CBC with 128-bit key 303s Encrypting 64 bytes (4 blocks) using AES-CBC with 128-bit key 303s testing AES_XCBC: 303s RFC 3566 Test Case 1: AES-XCBC-MAC-96 with 0-byte input 303s RFC 3566 Test Case 2: AES-XCBC-MAC-96 with 3-byte input 303s RFC 3566 Test Case 3: AES-XCBC-MAC-96 with 16-byte input 303s RFC 3566 Test Case 4: AES-XCBC-MAC-96 with 20-byte input 303s RFC 3566 Test Case 5: AES-XCBC-MAC-96 with 32-byte input 303s RFC 3566 Test Case 6: AES-XCBC-MAC-96 with 34-byte input 303s RFC 3566 Test Case 7: AES-XCBC-MAC-96 with 1000-byte input 303s RFC 4434 Test Case AES-XCBC-PRF-128 with 20-byte input (key length 16) 303s RFC 4434 Test Case AES-XCBC-PRF-128 with 20-byte input (key length 10) 303s RFC 4434 Test Case AES-XCBC-PRF-128 with 20-byte input (key length 18) 303s testing HMAC_MD5: 303s RFC 2104: MD5_HMAC test 1 303s RFC 2104: MD5_HMAC test 2 303s RFC 2104: MD5_HMAC test 3 303s testing HMAC_SHA1: 303s CAVP: IKEv2 key derivation with HMAC-SHA1 303s selftest: exiting pluto 304s autopkgtest [03:09:38]: test cryptocheck: -----------------------] 304s autopkgtest [03:09:38]: test cryptocheck: - - - - - - - - - - results - - - - - - - - - - 304s cryptocheck PASS 304s autopkgtest [03:09:38]: test cavp: preparing testbed 324s Creating nova instance adt-resolute-arm64-libreswan-20260203-030434-juju-7f2275-prod-proposed-migration-environment-20-452e2a45-054c-448a-921c-182b44bafda6 from image adt/ubuntu-resolute-arm64-server-20260202.img (UUID e5b8703b-d12e-4238-a70e-a72a9b0d7948)... 375s autopkgtest [03:10:49]: testbed dpkg architecture: arm64 375s autopkgtest [03:10:49]: testbed apt version: 3.1.14 375s autopkgtest [03:10:49]: @@@@@@@@@@@@@@@@@@@@ test bed setup 376s autopkgtest [03:10:50]: testbed release detected to be: resolute 376s autopkgtest [03:10:50]: updating testbed package index (apt update) 377s Get:1 http://ftpmaster.internal/ubuntu resolute-proposed InRelease [124 kB] 377s Hit:2 http://ftpmaster.internal/ubuntu resolute InRelease 377s Hit:3 http://ftpmaster.internal/ubuntu resolute-updates InRelease 377s Hit:4 http://ftpmaster.internal/ubuntu resolute-security InRelease 377s Get:5 http://ftpmaster.internal/ubuntu resolute-proposed/multiverse Sources [28.4 kB] 377s Get:6 http://ftpmaster.internal/ubuntu resolute-proposed/restricted Sources [5256 B] 377s Get:7 http://ftpmaster.internal/ubuntu resolute-proposed/universe Sources [1275 kB] 377s Get:8 http://ftpmaster.internal/ubuntu resolute-proposed/main Sources [271 kB] 377s Get:9 http://ftpmaster.internal/ubuntu resolute-proposed/main arm64 Packages [309 kB] 377s Get:10 http://ftpmaster.internal/ubuntu resolute-proposed/main arm64 c-n-f Metadata [3628 B] 377s Get:11 http://ftpmaster.internal/ubuntu resolute-proposed/restricted arm64 Packages [52.9 kB] 377s Get:12 http://ftpmaster.internal/ubuntu resolute-proposed/restricted arm64 c-n-f Metadata [328 B] 377s Get:13 http://ftpmaster.internal/ubuntu resolute-proposed/universe arm64 Packages [1116 kB] 377s Get:14 http://ftpmaster.internal/ubuntu resolute-proposed/universe arm64 c-n-f Metadata [26.2 kB] 377s Get:15 http://ftpmaster.internal/ubuntu resolute-proposed/multiverse arm64 Packages [21.8 kB] 377s Get:16 http://ftpmaster.internal/ubuntu resolute-proposed/multiverse arm64 c-n-f Metadata [756 B] 380s Fetched 3234 kB in 1s (3862 kB/s) 381s Reading package lists... 381s Hit:1 http://ftpmaster.internal/ubuntu resolute-proposed InRelease 381s Hit:2 http://ftpmaster.internal/ubuntu resolute InRelease 381s Hit:3 http://ftpmaster.internal/ubuntu resolute-updates InRelease 381s Hit:4 http://ftpmaster.internal/ubuntu resolute-security InRelease 382s Reading package lists... 382s Reading package lists... 382s Building dependency tree... 382s Reading state information... 383s Calculating upgrade... 383s The following packages will be upgraded: 383s ca-certificates cloud-init cloud-init-base libexpat1 liblocale-gettext-perl 383s 5 upgraded, 0 newly installed, 0 to remove and 0 not upgraded. 383s Need to get 891 kB of archives. 383s After this operation, 2048 B of additional disk space will be used. 383s Get:1 http://ftpmaster.internal/ubuntu resolute/main arm64 libexpat1 arm64 2.7.4-1 [85.7 kB] 383s Get:2 http://ftpmaster.internal/ubuntu resolute/main arm64 liblocale-gettext-perl arm64 1.07-8 [15.6 kB] 383s Get:3 http://ftpmaster.internal/ubuntu resolute-proposed/main arm64 ca-certificates all 20250419build1 [163 kB] 383s Get:4 http://ftpmaster.internal/ubuntu resolute/main arm64 cloud-init-base all 25.4~4g26c7d38d-0ubuntu1 [624 kB] 383s Get:5 http://ftpmaster.internal/ubuntu resolute/main arm64 cloud-init all 25.4~4g26c7d38d-0ubuntu1 [2120 B] 384s dpkg-preconfigure: unable to re-open stdin: No such file or directory 384s Fetched 891 kB in 0s (5532 kB/s) 384s (Reading database ... (Reading database ... 5% (Reading database ... 10% (Reading database ... 15% (Reading database ... 20% (Reading database ... 25% (Reading database ... 30% (Reading database ... 35% (Reading database ... 40% (Reading database ... 45% (Reading database ... 50% (Reading database ... 55% (Reading database ... 60% (Reading database ... 65% (Reading database ... 70% (Reading database ... 75% (Reading database ... 80% (Reading database ... 85% (Reading database ... 90% (Reading database ... 95% (Reading database ... 100% (Reading database ... 89359 files and directories currently installed.) 384s Preparing to unpack .../libexpat1_2.7.4-1_arm64.deb ... 384s Unpacking libexpat1:arm64 (2.7.4-1) over (2.7.3-1) ... 384s Preparing to unpack .../liblocale-gettext-perl_1.07-8_arm64.deb ... 384s Unpacking liblocale-gettext-perl (1.07-8) over (1.07-7build1) ... 384s Preparing to unpack .../ca-certificates_20250419build1_all.deb ... 384s Unpacking ca-certificates (20250419build1) over (20250419) ... 384s Preparing to unpack .../cloud-init-base_25.4~4g26c7d38d-0ubuntu1_all.deb ... 384s Unpacking cloud-init-base (25.4~4g26c7d38d-0ubuntu1) over (25.4~3g78f6f15e-0ubuntu1) ... 385s Preparing to unpack .../cloud-init_25.4~4g26c7d38d-0ubuntu1_all.deb ... 385s Unpacking cloud-init (25.4~4g26c7d38d-0ubuntu1) over (25.4~3g78f6f15e-0ubuntu1) ... 385s Setting up libexpat1:arm64 (2.7.4-1) ... 385s Setting up cloud-init-base (25.4~4g26c7d38d-0ubuntu1) ... 385s Clearing ignored debconf value cloud-init/datasources 385s Encountered debconf setting for cloud-init-base/datasources. 386s Setting up ca-certificates (20250419build1) ... 389s Updating certificates in /etc/ssl/certs... 390s 0 added, 0 removed; done. 390s Setting up liblocale-gettext-perl (1.07-8) ... 390s Setting up cloud-init (25.4~4g26c7d38d-0ubuntu1) ... 390s Processing triggers for rsyslog (8.2512.0-1ubuntu2) ... 390s Processing triggers for man-db (2.13.1-1) ... 391s Processing triggers for libc-bin (2.42-2ubuntu4) ... 391s Processing triggers for ca-certificates (20250419build1) ... 391s Updating certificates in /etc/ssl/certs... 393s 0 added, 0 removed; done. 393s Running hooks in /etc/ca-certificates/update.d... 393s done. 393s autopkgtest [03:11:07]: upgrading testbed (apt dist-upgrade and autopurge) 393s Reading package lists... 393s Building dependency tree... 393s Reading state information... 393s Calculating upgrade... 394s 0 upgraded, 0 newly installed, 0 to remove and 0 not upgraded. 394s Reading package lists... 394s Building dependency tree... 394s Reading state information... 394s Solving dependencies... 395s 0 upgraded, 0 newly installed, 0 to remove and 0 not upgraded. 395s autopkgtest [03:11:09]: rebooting testbed after setup commands that affected boot 436s Reading package lists... 437s Building dependency tree... 437s Reading state information... 437s Solving dependencies... 437s The following NEW packages will be installed: 437s dns-root-data libevent-2.1-7t64 libevent-pthreads-2.1-7t64 libldns3t64 437s libnss3-tools libreswan libunbound8 438s 0 upgraded, 7 newly installed, 0 to remove and 0 not upgraded. 438s Need to get 2870 kB of archives. 438s After this operation, 13.6 MB of additional disk space will be used. 438s Get:1 http://ftpmaster.internal/ubuntu resolute/main arm64 dns-root-data all 2025080400 [5908 B] 438s Get:2 http://ftpmaster.internal/ubuntu resolute/main arm64 libnss3-tools arm64 2:3.120-1 [604 kB] 438s Get:3 http://ftpmaster.internal/ubuntu resolute/main arm64 libevent-pthreads-2.1-7t64 arm64 2.1.12-stable-10build1 [8272 B] 438s Get:4 http://ftpmaster.internal/ubuntu resolute/universe arm64 libldns3t64 arm64 1.8.4-2build1 [164 kB] 438s Get:5 http://ftpmaster.internal/ubuntu resolute/main arm64 libevent-2.1-7t64 arm64 2.1.12-stable-10build1 [152 kB] 438s Get:6 http://ftpmaster.internal/ubuntu resolute/main arm64 libunbound8 arm64 1.24.2-1ubuntu1 [436 kB] 438s Get:7 http://ftpmaster.internal/ubuntu resolute/universe arm64 libreswan arm64 5.2-2.2ubuntu1 [1500 kB] 439s Fetched 2870 kB in 1s (2203 kB/s) 439s Selecting previously unselected package dns-root-data. 439s (Reading database ... (Reading database ... 5% (Reading database ... 10% (Reading database ... 15% (Reading database ... 20% (Reading database ... 25% (Reading database ... 30% (Reading database ... 35% (Reading database ... 40% (Reading database ... 45% (Reading database ... 50% (Reading database ... 55% (Reading database ... 60% (Reading database ... 65% (Reading database ... 70% (Reading database ... 75% (Reading database ... 80% (Reading database ... 85% (Reading database ... 90% (Reading database ... 95% (Reading database ... 100% (Reading database ... 89359 files and directories currently installed.) 439s Preparing to unpack .../0-dns-root-data_2025080400_all.deb ... 439s Unpacking dns-root-data (2025080400) ... 439s Selecting previously unselected package libnss3-tools. 439s Preparing to unpack .../1-libnss3-tools_2%3a3.120-1_arm64.deb ... 439s Unpacking libnss3-tools (2:3.120-1) ... 439s Selecting previously unselected package libevent-pthreads-2.1-7t64:arm64. 439s Preparing to unpack .../2-libevent-pthreads-2.1-7t64_2.1.12-stable-10build1_arm64.deb ... 439s Unpacking libevent-pthreads-2.1-7t64:arm64 (2.1.12-stable-10build1) ... 439s Selecting previously unselected package libldns3t64:arm64. 439s Preparing to unpack .../3-libldns3t64_1.8.4-2build1_arm64.deb ... 439s Unpacking libldns3t64:arm64 (1.8.4-2build1) ... 439s Selecting previously unselected package libevent-2.1-7t64:arm64. 439s Preparing to unpack .../4-libevent-2.1-7t64_2.1.12-stable-10build1_arm64.deb ... 439s Unpacking libevent-2.1-7t64:arm64 (2.1.12-stable-10build1) ... 439s Selecting previously unselected package libunbound8:arm64. 439s Preparing to unpack .../5-libunbound8_1.24.2-1ubuntu1_arm64.deb ... 439s Unpacking libunbound8:arm64 (1.24.2-1ubuntu1) ... 439s Selecting previously unselected package libreswan. 439s Preparing to unpack .../6-libreswan_5.2-2.2ubuntu1_arm64.deb ... 439s Unpacking libreswan (5.2-2.2ubuntu1) ... 439s Setting up libldns3t64:arm64 (1.8.4-2build1) ... 439s Setting up libevent-pthreads-2.1-7t64:arm64 (2.1.12-stable-10build1) ... 439s Setting up libevent-2.1-7t64:arm64 (2.1.12-stable-10build1) ... 439s Setting up dns-root-data (2025080400) ... 439s Setting up libunbound8:arm64 (1.24.2-1ubuntu1) ... 439s Setting up libnss3-tools (2:3.120-1) ... 439s Setting up libreswan (5.2-2.2ubuntu1) ... 440s ipsec.service is a disabled or a static unit, not starting it. 440s Processing triggers for man-db (2.13.1-1) ... 441s Processing triggers for libc-bin (2.42-2ubuntu4) ... 451s autopkgtest [03:12:05]: test cavp: [----------------------- 451s Testing installed CAVP binary: /usr/libexec/ipsec/cavp 453s test: IKE v2 453s Reading from ikev2.fax 456s test: IKE v1 Digital Signature Authentication 456s Reading from ikev1_dsa.fax 458s test: IKE v1 Pre-shared Key Authentication 458s Reading from ikev1_psk.fax 460s /tmp/autopkgtest.REnWbM/build.Pwc/src 460s autopkgtest [03:12:14]: test cavp: -----------------------] 460s cavp PASS 460s autopkgtest [03:12:14]: test cavp: - - - - - - - - - - results - - - - - - - - - - 461s autopkgtest [03:12:15]: @@@@@@@@@@@@@@@@@@@@ summary 461s opportunistic SKIP exit status 77 and marked as skippable 461s cryptocheck PASS 461s cavp PASS