0s autopkgtest [21:31:00]: starting date and time: 2026-02-03 21:31:00+0000 0s autopkgtest [21:31:00]: git checkout: 4b346b80 nova: make wait_reboot return success even when a no-op 0s autopkgtest [21:31:00]: host juju-7f2275-prod-proposed-migration-environment-2; command line: /home/ubuntu/autopkgtest/runner/autopkgtest --output-dir /tmp/autopkgtest-work.rkbytha1/out --timeout-copy=6000 --needs-internet=try --setup-commands /home/ubuntu/autopkgtest-cloud/worker-config-production/setup-canonical.sh --apt-pocket=proposed=src:pam --apt-upgrade libreswan --timeout-short=300 --timeout-copy=20000 --timeout-build=20000 --env=ADT_TEST_TRIGGERS=pam/1.7.0-5ubuntu3 -- ssh -s /home/ubuntu/autopkgtest/ssh-setup/nova -- --flavor autopkgtest-cpu2-ram4-disk20-arm64 --security-groups autopkgtest-juju-7f2275-prod-proposed-migration-environment-2@sto01-arm64-4.secgroup --name adt-resolute-arm64-libreswan-20260203-213100-juju-7f2275-prod-proposed-migration-environment-2-e132cc3c-48fb-4160-a4db-bbd3006f3a61 --image adt/ubuntu-resolute-arm64-server --keyname testbed-juju-7f2275-prod-proposed-migration-environment-2 --net-id=net_prod-autopkgtest-workers-arm64 -e TERM=linux --mirror=http://ftpmaster.internal/ubuntu/ 4s Creating nova instance adt-resolute-arm64-libreswan-20260203-213100-juju-7f2275-prod-proposed-migration-environment-2-e132cc3c-48fb-4160-a4db-bbd3006f3a61 from image adt/ubuntu-resolute-arm64-server-20260203.img (UUID fd4bac28-a946-4216-8755-72db0faf84da)... 53s autopkgtest [21:31:53]: testbed dpkg architecture: arm64 53s autopkgtest [21:31:53]: testbed apt version: 3.1.14 54s autopkgtest [21:31:54]: @@@@@@@@@@@@@@@@@@@@ test bed setup 54s autopkgtest [21:31:54]: testbed release detected to be: None 55s autopkgtest [21:31:55]: updating testbed package index (apt update) 55s Get:1 http://ftpmaster.internal/ubuntu resolute-proposed InRelease [124 kB] 55s Hit:2 http://ftpmaster.internal/ubuntu resolute InRelease 55s Hit:3 http://ftpmaster.internal/ubuntu resolute-updates InRelease 55s Hit:4 http://ftpmaster.internal/ubuntu resolute-security InRelease 55s Get:5 http://ftpmaster.internal/ubuntu resolute-proposed/main Sources [242 kB] 55s Get:6 http://ftpmaster.internal/ubuntu resolute-proposed/multiverse Sources [27.9 kB] 55s Get:7 http://ftpmaster.internal/ubuntu resolute-proposed/restricted Sources [5260 B] 55s Get:8 http://ftpmaster.internal/ubuntu resolute-proposed/universe Sources [1343 kB] 55s Get:9 http://ftpmaster.internal/ubuntu resolute-proposed/main arm64 Packages [300 kB] 55s Get:10 http://ftpmaster.internal/ubuntu resolute-proposed/main arm64 c-n-f Metadata [6864 B] 55s Get:11 http://ftpmaster.internal/ubuntu resolute-proposed/restricted arm64 Packages [52.9 kB] 55s Get:12 http://ftpmaster.internal/ubuntu resolute-proposed/restricted arm64 c-n-f Metadata [328 B] 55s Get:13 http://ftpmaster.internal/ubuntu resolute-proposed/universe arm64 Packages [1188 kB] 55s Get:14 http://ftpmaster.internal/ubuntu resolute-proposed/universe arm64 c-n-f Metadata [27.8 kB] 55s Get:15 http://ftpmaster.internal/ubuntu resolute-proposed/multiverse arm64 Packages [21.5 kB] 55s Get:16 http://ftpmaster.internal/ubuntu resolute-proposed/multiverse arm64 c-n-f Metadata [744 B] 58s Fetched 3340 kB in 1s (5191 kB/s) 59s Reading package lists... 60s Hit:1 http://ftpmaster.internal/ubuntu resolute-proposed InRelease 60s Hit:2 http://ftpmaster.internal/ubuntu resolute InRelease 60s Hit:3 http://ftpmaster.internal/ubuntu resolute-updates InRelease 60s Hit:4 http://ftpmaster.internal/ubuntu resolute-security InRelease 61s Reading package lists... 61s Reading package lists... 61s Building dependency tree... 61s Reading state information... 61s Calculating upgrade... 62s The following packages will be upgraded: 62s firmware-sof-signed libpam-modules libpam-modules-bin libpam-runtime 62s libpam0g mtd-utils powermgmt-base 62s 7 upgraded, 0 newly installed, 0 to remove and 0 not upgraded. 62s Need to get 2622 kB of archives. 62s After this operation, 2048 B of additional disk space will be used. 62s Get:1 http://ftpmaster.internal/ubuntu resolute-proposed/main arm64 libpam-runtime all 1.7.0-5ubuntu3 [149 kB] 62s Get:2 http://ftpmaster.internal/ubuntu resolute-proposed/main arm64 libpam0g arm64 1.7.0-5ubuntu3 [69.5 kB] 62s Get:3 http://ftpmaster.internal/ubuntu resolute-proposed/main arm64 libpam-modules-bin arm64 1.7.0-5ubuntu3 [43.6 kB] 62s Get:4 http://ftpmaster.internal/ubuntu resolute-proposed/main arm64 libpam-modules arm64 1.7.0-5ubuntu3 [191 kB] 62s Get:5 http://ftpmaster.internal/ubuntu resolute/main arm64 firmware-sof-signed all 2025.05.1-1build1 [1696 kB] 62s Get:6 http://ftpmaster.internal/ubuntu resolute/main arm64 powermgmt-base all 1.38ubuntu2 [7878 B] 62s Get:7 http://ftpmaster.internal/ubuntu resolute/main arm64 mtd-utils arm64 1:2.3.0-1ubuntu2 [466 kB] 62s dpkg-preconfigure: unable to re-open stdin: No such file or directory 62s Fetched 2622 kB in 0s (10.3 MB/s) 63s (Reading database ... (Reading database ... 5% (Reading database ... 10% (Reading database ... 15% (Reading database ... 20% (Reading database ... 25% (Reading database ... 30% (Reading database ... 35% (Reading database ... 40% (Reading database ... 45% (Reading database ... 50% (Reading database ... 55% (Reading database ... 60% (Reading database ... 65% (Reading database ... 70% (Reading database ... 75% (Reading database ... 80% (Reading database ... 85% (Reading database ... 90% (Reading database ... 95% (Reading database ... 100% (Reading database ... 89360 files and directories currently installed.) 63s Preparing to unpack .../libpam-runtime_1.7.0-5ubuntu3_all.deb ... 63s Unpacking libpam-runtime (1.7.0-5ubuntu3) over (1.7.0-5ubuntu2) ... 63s Setting up libpam-runtime (1.7.0-5ubuntu3) ... 63s (Reading database ... (Reading database ... 5% (Reading database ... 10% (Reading database ... 15% (Reading database ... 20% (Reading database ... 25% (Reading database ... 30% (Reading database ... 35% (Reading database ... 40% (Reading database ... 45% (Reading database ... 50% (Reading database ... 55% (Reading database ... 60% (Reading database ... 65% (Reading database ... 70% (Reading database ... 75% (Reading database ... 80% (Reading database ... 85% (Reading database ... 90% (Reading database ... 95% (Reading database ... 100% (Reading database ... 89360 files and directories currently installed.) 63s Preparing to unpack .../libpam0g_1.7.0-5ubuntu3_arm64.deb ... 63s Unpacking libpam0g:arm64 (1.7.0-5ubuntu3) over (1.7.0-5ubuntu2) ... 63s Setting up libpam0g:arm64 (1.7.0-5ubuntu3) ... 63s (Reading database ... (Reading database ... 5% (Reading database ... 10% (Reading database ... 15% (Reading database ... 20% (Reading database ... 25% (Reading database ... 30% (Reading database ... 35% (Reading database ... 40% (Reading database ... 45% (Reading database ... 50% (Reading database ... 55% (Reading database ... 60% (Reading database ... 65% (Reading database ... 70% (Reading database ... 75% (Reading database ... 80% (Reading database ... 85% (Reading database ... 90% (Reading database ... 95% (Reading database ... 100% (Reading database ... 89360 files and directories currently installed.) 63s Preparing to unpack .../libpam-modules-bin_1.7.0-5ubuntu3_arm64.deb ... 63s Unpacking libpam-modules-bin (1.7.0-5ubuntu3) over (1.7.0-5ubuntu2) ... 63s Setting up libpam-modules-bin (1.7.0-5ubuntu3) ... 64s pam_namespace.service is a disabled or a static unit not running, not starting it. 64s (Reading database ... (Reading database ... 5% (Reading database ... 10% (Reading database ... 15% (Reading database ... 20% (Reading database ... 25% (Reading database ... 30% (Reading database ... 35% (Reading database ... 40% (Reading database ... 45% (Reading database ... 50% (Reading database ... 55% (Reading database ... 60% (Reading database ... 65% (Reading database ... 70% (Reading database ... 75% (Reading database ... 80% (Reading database ... 85% (Reading database ... 90% (Reading database ... 95% (Reading database ... 100% (Reading database ... 89360 files and directories currently installed.) 64s Preparing to unpack .../libpam-modules_1.7.0-5ubuntu3_arm64.deb ... 64s Unpacking libpam-modules:arm64 (1.7.0-5ubuntu3) over (1.7.0-5ubuntu2) ... 64s Setting up libpam-modules:arm64 (1.7.0-5ubuntu3) ... 64s (Reading database ... (Reading database ... 5% (Reading database ... 10% (Reading database ... 15% (Reading database ... 20% (Reading database ... 25% (Reading database ... 30% (Reading database ... 35% (Reading database ... 40% (Reading database ... 45% (Reading database ... 50% (Reading database ... 55% (Reading database ... 60% (Reading database ... 65% (Reading database ... 70% (Reading database ... 75% (Reading database ... 80% (Reading database ... 85% (Reading database ... 90% (Reading database ... 95% (Reading database ... 100% (Reading database ... 89360 files and directories currently installed.) 64s Preparing to unpack .../firmware-sof-signed_2025.05.1-1build1_all.deb ... 64s Unpacking firmware-sof-signed (2025.05.1-1build1) over (2025.05.1-1) ... 65s Preparing to unpack .../powermgmt-base_1.38ubuntu2_all.deb ... 65s Unpacking powermgmt-base (1.38ubuntu2) over (1.38ubuntu1) ... 65s Preparing to unpack .../mtd-utils_1%3a2.3.0-1ubuntu2_arm64.deb ... 65s Unpacking mtd-utils (1:2.3.0-1ubuntu2) over (1:2.3.0-1ubuntu1) ... 65s Setting up powermgmt-base (1.38ubuntu2) ... 65s Setting up firmware-sof-signed (2025.05.1-1build1) ... 65s Setting up mtd-utils (1:2.3.0-1ubuntu2) ... 65s Processing triggers for man-db (2.13.1-1) ... 66s Processing triggers for libc-bin (2.42-2ubuntu4) ... 66s autopkgtest [21:32:06]: upgrading testbed (apt dist-upgrade and autopurge) 66s Reading package lists... 67s Building dependency tree... 67s Reading state information... 67s Calculating upgrade... 67s 0 upgraded, 0 newly installed, 0 to remove and 0 not upgraded. 67s Reading package lists... 68s Building dependency tree... 68s Reading state information... 68s Solving dependencies... 68s 0 upgraded, 0 newly installed, 0 to remove and 0 not upgraded. 68s autopkgtest [21:32:08]: rebooting testbed after setup commands that affected boot 106s autopkgtest [21:32:46]: testbed running kernel: Linux 6.18.0-9-generic #9-Ubuntu SMP PREEMPT_DYNAMIC Mon Jan 12 16:41:39 UTC 2026 109s autopkgtest [21:32:49]: @@@@@@@@@@@@@@@@@@@@ apt-source libreswan 110s Get:1 http://ftpmaster.internal/ubuntu resolute/universe libreswan 5.2-2.2ubuntu1 (dsc) [2735 B] 110s Get:2 http://ftpmaster.internal/ubuntu resolute/universe libreswan 5.2-2.2ubuntu1 (tar) [4132 kB] 110s Get:3 http://ftpmaster.internal/ubuntu resolute/universe libreswan 5.2-2.2ubuntu1 (asc) [862 B] 110s Get:4 http://ftpmaster.internal/ubuntu resolute/universe libreswan 5.2-2.2ubuntu1 (diff) [16.7 kB] 111s gpgv: Signature made Thu Jul 31 14:30:12 2025 UTC 111s gpgv: using RSA key 25E3FF2D7F469DBE7D0D4E50AFCFEC8E669CE1C2 111s gpgv: Can't check signature: No public key 111s dpkg-source: warning: cannot verify inline signature for ./libreswan_5.2-2.2ubuntu1.dsc: no acceptable signature found 111s autopkgtest [21:32:51]: testing package libreswan version 5.2-2.2ubuntu1 112s autopkgtest [21:32:52]: build not needed 116s autopkgtest [21:32:56]: test opportunistic: preparing testbed 116s Reading package lists... 116s Building dependency tree... 116s Reading state information... 116s Solving dependencies... 117s The following NEW packages will be installed: 117s dns-root-data libevent-2.1-7t64 libevent-pthreads-2.1-7t64 libldns3t64 117s libnss3-tools libreswan libunbound8 117s 0 upgraded, 7 newly installed, 0 to remove and 0 not upgraded. 117s Need to get 2870 kB of archives. 117s After this operation, 13.6 MB of additional disk space will be used. 117s Get:1 http://ftpmaster.internal/ubuntu resolute/main arm64 dns-root-data all 2025080400build1 [6022 B] 117s Get:2 http://ftpmaster.internal/ubuntu resolute/main arm64 libnss3-tools arm64 2:3.120-1 [604 kB] 117s Get:3 http://ftpmaster.internal/ubuntu resolute/main arm64 libevent-pthreads-2.1-7t64 arm64 2.1.12-stable-10build1 [8272 B] 117s Get:4 http://ftpmaster.internal/ubuntu resolute/universe arm64 libldns3t64 arm64 1.8.4-2build1 [164 kB] 117s Get:5 http://ftpmaster.internal/ubuntu resolute/main arm64 libevent-2.1-7t64 arm64 2.1.12-stable-10build1 [152 kB] 117s Get:6 http://ftpmaster.internal/ubuntu resolute/main arm64 libunbound8 arm64 1.24.2-1ubuntu1 [436 kB] 117s Get:7 http://ftpmaster.internal/ubuntu resolute/universe arm64 libreswan arm64 5.2-2.2ubuntu1 [1500 kB] 117s Fetched 2870 kB in 0s (7979 kB/s) 117s Selecting previously unselected package dns-root-data. 118s (Reading database ... (Reading database ... 5% (Reading database ... 10% (Reading database ... 15% (Reading database ... 20% (Reading database ... 25% (Reading database ... 30% (Reading database ... 35% (Reading database ... 40% (Reading database ... 45% (Reading database ... 50% (Reading database ... 55% (Reading database ... 60% (Reading database ... 65% (Reading database ... 70% (Reading database ... 75% (Reading database ... 80% (Reading database ... 85% (Reading database ... 90% (Reading database ... 95% (Reading database ... 100% (Reading database ... 89360 files and directories currently installed.) 118s Preparing to unpack .../0-dns-root-data_2025080400build1_all.deb ... 118s Unpacking dns-root-data (2025080400build1) ... 118s Selecting previously unselected package libnss3-tools. 118s Preparing to unpack .../1-libnss3-tools_2%3a3.120-1_arm64.deb ... 118s Unpacking libnss3-tools (2:3.120-1) ... 118s Selecting previously unselected package libevent-pthreads-2.1-7t64:arm64. 118s Preparing to unpack .../2-libevent-pthreads-2.1-7t64_2.1.12-stable-10build1_arm64.deb ... 118s Unpacking libevent-pthreads-2.1-7t64:arm64 (2.1.12-stable-10build1) ... 118s Selecting previously unselected package libldns3t64:arm64. 118s Preparing to unpack .../3-libldns3t64_1.8.4-2build1_arm64.deb ... 118s Unpacking libldns3t64:arm64 (1.8.4-2build1) ... 118s Selecting previously unselected package libevent-2.1-7t64:arm64. 118s Preparing to unpack .../4-libevent-2.1-7t64_2.1.12-stable-10build1_arm64.deb ... 118s Unpacking libevent-2.1-7t64:arm64 (2.1.12-stable-10build1) ... 118s Selecting previously unselected package libunbound8:arm64. 118s Preparing to unpack .../5-libunbound8_1.24.2-1ubuntu1_arm64.deb ... 118s Unpacking libunbound8:arm64 (1.24.2-1ubuntu1) ... 118s Selecting previously unselected package libreswan. 118s Preparing to unpack .../6-libreswan_5.2-2.2ubuntu1_arm64.deb ... 118s Unpacking libreswan (5.2-2.2ubuntu1) ... 118s Setting up libldns3t64:arm64 (1.8.4-2build1) ... 118s Setting up libevent-pthreads-2.1-7t64:arm64 (2.1.12-stable-10build1) ... 118s Setting up libevent-2.1-7t64:arm64 (2.1.12-stable-10build1) ... 118s Setting up dns-root-data (2025080400build1) ... 118s Setting up libunbound8:arm64 (1.24.2-1ubuntu1) ... 118s Setting up libnss3-tools (2:3.120-1) ... 118s Setting up libreswan (5.2-2.2ubuntu1) ... 118s ipsec.service is a disabled or a static unit, not starting it. 118s Processing triggers for man-db (2.13.1-1) ... 120s Processing triggers for libc-bin (2.42-2ubuntu4) ... 121s autopkgtest [21:33:01]: test opportunistic: [----------------------- 121s ping: oe.libreswan.org: No address associated with hostname 121s autopkgtest [21:33:01]: test opportunistic: -----------------------] 122s opportunistic SKIP exit status 77 and marked as skippable 122s autopkgtest [21:33:02]: test opportunistic: - - - - - - - - - - results - - - - - - - - - - 122s autopkgtest [21:33:02]: test cryptocheck: preparing testbed 141s Creating nova instance adt-resolute-arm64-libreswan-20260203-213100-juju-7f2275-prod-proposed-migration-environment-2-e132cc3c-48fb-4160-a4db-bbd3006f3a61 from image adt/ubuntu-resolute-arm64-server-20260203.img (UUID fd4bac28-a946-4216-8755-72db0faf84da)... 191s autopkgtest [21:34:11]: testbed dpkg architecture: arm64 191s autopkgtest [21:34:11]: testbed apt version: 3.1.14 191s autopkgtest [21:34:11]: @@@@@@@@@@@@@@@@@@@@ test bed setup 192s autopkgtest [21:34:12]: testbed release detected to be: resolute 192s autopkgtest [21:34:12]: updating testbed package index (apt update) 193s Get:1 http://ftpmaster.internal/ubuntu resolute-proposed InRelease [124 kB] 193s Hit:2 http://ftpmaster.internal/ubuntu resolute InRelease 193s Hit:3 http://ftpmaster.internal/ubuntu resolute-updates InRelease 193s Hit:4 http://ftpmaster.internal/ubuntu resolute-security InRelease 193s Get:5 http://ftpmaster.internal/ubuntu resolute-proposed/restricted Sources [5260 B] 193s Get:6 http://ftpmaster.internal/ubuntu resolute-proposed/multiverse Sources [27.9 kB] 193s Get:7 http://ftpmaster.internal/ubuntu resolute-proposed/universe Sources [1343 kB] 193s Get:8 http://ftpmaster.internal/ubuntu resolute-proposed/main Sources [242 kB] 193s Get:9 http://ftpmaster.internal/ubuntu resolute-proposed/main arm64 Packages [300 kB] 193s Get:10 http://ftpmaster.internal/ubuntu resolute-proposed/main arm64 c-n-f Metadata [6864 B] 193s Get:11 http://ftpmaster.internal/ubuntu resolute-proposed/restricted arm64 Packages [52.9 kB] 193s Get:12 http://ftpmaster.internal/ubuntu resolute-proposed/restricted arm64 c-n-f Metadata [328 B] 193s Get:13 http://ftpmaster.internal/ubuntu resolute-proposed/universe arm64 Packages [1188 kB] 193s Get:14 http://ftpmaster.internal/ubuntu resolute-proposed/universe arm64 c-n-f Metadata [27.8 kB] 193s Get:15 http://ftpmaster.internal/ubuntu resolute-proposed/multiverse arm64 Packages [21.5 kB] 193s Get:16 http://ftpmaster.internal/ubuntu resolute-proposed/multiverse arm64 c-n-f Metadata [744 B] 196s Fetched 3340 kB in 1s (4536 kB/s) 197s Reading package lists... 197s Hit:1 http://ftpmaster.internal/ubuntu resolute-proposed InRelease 197s Hit:2 http://ftpmaster.internal/ubuntu resolute InRelease 197s Hit:3 http://ftpmaster.internal/ubuntu resolute-updates InRelease 197s Hit:4 http://ftpmaster.internal/ubuntu resolute-security InRelease 198s Reading package lists... 198s Reading package lists... 198s Building dependency tree... 198s Reading state information... 199s Calculating upgrade... 199s The following packages will be upgraded: 199s firmware-sof-signed libpam-modules libpam-modules-bin libpam-runtime 199s libpam0g mtd-utils powermgmt-base 199s 7 upgraded, 0 newly installed, 0 to remove and 0 not upgraded. 199s Need to get 2622 kB of archives. 199s After this operation, 2048 B of additional disk space will be used. 199s Get:1 http://ftpmaster.internal/ubuntu resolute-proposed/main arm64 libpam-runtime all 1.7.0-5ubuntu3 [149 kB] 199s Get:2 http://ftpmaster.internal/ubuntu resolute-proposed/main arm64 libpam0g arm64 1.7.0-5ubuntu3 [69.5 kB] 199s Get:3 http://ftpmaster.internal/ubuntu resolute-proposed/main arm64 libpam-modules-bin arm64 1.7.0-5ubuntu3 [43.6 kB] 199s Get:4 http://ftpmaster.internal/ubuntu resolute-proposed/main arm64 libpam-modules arm64 1.7.0-5ubuntu3 [191 kB] 199s Get:5 http://ftpmaster.internal/ubuntu resolute/main arm64 firmware-sof-signed all 2025.05.1-1build1 [1696 kB] 200s Get:6 http://ftpmaster.internal/ubuntu resolute/main arm64 powermgmt-base all 1.38ubuntu2 [7878 B] 200s Get:7 http://ftpmaster.internal/ubuntu resolute/main arm64 mtd-utils arm64 1:2.3.0-1ubuntu2 [466 kB] 200s dpkg-preconfigure: unable to re-open stdin: No such file or directory 200s Fetched 2622 kB in 0s (6433 kB/s) 200s (Reading database ... (Reading database ... 5% (Reading database ... 10% (Reading database ... 15% (Reading database ... 20% (Reading database ... 25% (Reading database ... 30% (Reading database ... 35% (Reading database ... 40% (Reading database ... 45% (Reading database ... 50% (Reading database ... 55% (Reading database ... 60% (Reading database ... 65% (Reading database ... 70% (Reading database ... 75% (Reading database ... 80% (Reading database ... 85% (Reading database ... 90% (Reading database ... 95% (Reading database ... 100% (Reading database ... 89360 files and directories currently installed.) 200s Preparing to unpack .../libpam-runtime_1.7.0-5ubuntu3_all.deb ... 200s Unpacking libpam-runtime (1.7.0-5ubuntu3) over (1.7.0-5ubuntu2) ... 200s Setting up libpam-runtime (1.7.0-5ubuntu3) ... 201s (Reading database ... (Reading database ... 5% (Reading database ... 10% (Reading database ... 15% (Reading database ... 20% (Reading database ... 25% (Reading database ... 30% (Reading database ... 35% (Reading database ... 40% (Reading database ... 45% (Reading database ... 50% (Reading database ... 55% (Reading database ... 60% (Reading database ... 65% (Reading database ... 70% (Reading database ... 75% (Reading database ... 80% (Reading database ... 85% (Reading database ... 90% (Reading database ... 95% (Reading database ... 100% (Reading database ... 89360 files and directories currently installed.) 201s Preparing to unpack .../libpam0g_1.7.0-5ubuntu3_arm64.deb ... 201s Unpacking libpam0g:arm64 (1.7.0-5ubuntu3) over (1.7.0-5ubuntu2) ... 201s Setting up libpam0g:arm64 (1.7.0-5ubuntu3) ... 201s (Reading database ... (Reading database ... 5% (Reading database ... 10% (Reading database ... 15% (Reading database ... 20% (Reading database ... 25% (Reading database ... 30% (Reading database ... 35% (Reading database ... 40% (Reading database ... 45% (Reading database ... 50% (Reading database ... 55% (Reading database ... 60% (Reading database ... 65% (Reading database ... 70% (Reading database ... 75% (Reading database ... 80% (Reading database ... 85% (Reading database ... 90% (Reading database ... 95% (Reading database ... 100% (Reading database ... 89360 files and directories currently installed.) 201s Preparing to unpack .../libpam-modules-bin_1.7.0-5ubuntu3_arm64.deb ... 201s Unpacking libpam-modules-bin (1.7.0-5ubuntu3) over (1.7.0-5ubuntu2) ... 201s Setting up libpam-modules-bin (1.7.0-5ubuntu3) ... 202s pam_namespace.service is a disabled or a static unit not running, not starting it. 202s (Reading database ... (Reading database ... 5% (Reading database ... 10% (Reading database ... 15% (Reading database ... 20% (Reading database ... 25% (Reading database ... 30% (Reading database ... 35% (Reading database ... 40% (Reading database ... 45% (Reading database ... 50% (Reading database ... 55% (Reading database ... 60% (Reading database ... 65% (Reading database ... 70% (Reading database ... 75% (Reading database ... 80% (Reading database ... 85% (Reading database ... 90% (Reading database ... 95% (Reading database ... 100% (Reading database ... 89360 files and directories currently installed.) 202s Preparing to unpack .../libpam-modules_1.7.0-5ubuntu3_arm64.deb ... 202s Unpacking libpam-modules:arm64 (1.7.0-5ubuntu3) over (1.7.0-5ubuntu2) ... 202s Setting up libpam-modules:arm64 (1.7.0-5ubuntu3) ... 202s (Reading database ... (Reading database ... 5% (Reading database ... 10% (Reading database ... 15% (Reading database ... 20% (Reading database ... 25% (Reading database ... 30% (Reading database ... 35% (Reading database ... 40% (Reading database ... 45% (Reading database ... 50% (Reading database ... 55% (Reading database ... 60% (Reading database ... 65% (Reading database ... 70% (Reading database ... 75% (Reading database ... 80% (Reading database ... 85% (Reading database ... 90% (Reading database ... 95% (Reading database ... 100% (Reading database ... 89360 files and directories currently installed.) 202s Preparing to unpack .../firmware-sof-signed_2025.05.1-1build1_all.deb ... 202s Unpacking firmware-sof-signed (2025.05.1-1build1) over (2025.05.1-1) ... 202s Preparing to unpack .../powermgmt-base_1.38ubuntu2_all.deb ... 202s Unpacking powermgmt-base (1.38ubuntu2) over (1.38ubuntu1) ... 202s Preparing to unpack .../mtd-utils_1%3a2.3.0-1ubuntu2_arm64.deb ... 202s Unpacking mtd-utils (1:2.3.0-1ubuntu2) over (1:2.3.0-1ubuntu1) ... 203s Setting up powermgmt-base (1.38ubuntu2) ... 203s Setting up firmware-sof-signed (2025.05.1-1build1) ... 203s Setting up mtd-utils (1:2.3.0-1ubuntu2) ... 203s Processing triggers for man-db (2.13.1-1) ... 204s Processing triggers for libc-bin (2.42-2ubuntu4) ... 204s autopkgtest [21:34:24]: upgrading testbed (apt dist-upgrade and autopurge) 204s Reading package lists... 205s Building dependency tree... 205s Reading state information... 205s Calculating upgrade... 205s 0 upgraded, 0 newly installed, 0 to remove and 0 not upgraded. 206s Reading package lists... 206s Building dependency tree... 206s Reading state information... 206s Solving dependencies... 206s 0 upgraded, 0 newly installed, 0 to remove and 0 not upgraded. 207s autopkgtest [21:34:27]: rebooting testbed after setup commands that affected boot 247s Reading package lists... 248s Building dependency tree... 248s Reading state information... 248s Solving dependencies... 248s The following NEW packages will be installed: 248s dns-root-data libevent-2.1-7t64 libevent-pthreads-2.1-7t64 libldns3t64 248s libnss3-tools libreswan libunbound8 248s 0 upgraded, 7 newly installed, 0 to remove and 0 not upgraded. 248s Need to get 2870 kB of archives. 248s After this operation, 13.6 MB of additional disk space will be used. 248s Get:1 http://ftpmaster.internal/ubuntu resolute/main arm64 dns-root-data all 2025080400build1 [6022 B] 248s Get:2 http://ftpmaster.internal/ubuntu resolute/main arm64 libnss3-tools arm64 2:3.120-1 [604 kB] 248s Get:3 http://ftpmaster.internal/ubuntu resolute/main arm64 libevent-pthreads-2.1-7t64 arm64 2.1.12-stable-10build1 [8272 B] 248s Get:4 http://ftpmaster.internal/ubuntu resolute/universe arm64 libldns3t64 arm64 1.8.4-2build1 [164 kB] 248s Get:5 http://ftpmaster.internal/ubuntu resolute/main arm64 libevent-2.1-7t64 arm64 2.1.12-stable-10build1 [152 kB] 248s Get:6 http://ftpmaster.internal/ubuntu resolute/main arm64 libunbound8 arm64 1.24.2-1ubuntu1 [436 kB] 248s Get:7 http://ftpmaster.internal/ubuntu resolute/universe arm64 libreswan arm64 5.2-2.2ubuntu1 [1500 kB] 249s Fetched 2870 kB in 0s (7523 kB/s) 249s Selecting previously unselected package dns-root-data. 249s (Reading database ... (Reading database ... 5% (Reading database ... 10% (Reading database ... 15% (Reading database ... 20% (Reading database ... 25% (Reading database ... 30% (Reading database ... 35% (Reading database ... 40% (Reading database ... 45% (Reading database ... 50% (Reading database ... 55% (Reading database ... 60% (Reading database ... 65% (Reading database ... 70% (Reading database ... 75% (Reading database ... 80% (Reading database ... 85% (Reading database ... 90% (Reading database ... 95% (Reading database ... 100% (Reading database ... 89360 files and directories currently installed.) 249s Preparing to unpack .../0-dns-root-data_2025080400build1_all.deb ... 249s Unpacking dns-root-data (2025080400build1) ... 249s Selecting previously unselected package libnss3-tools. 249s Preparing to unpack .../1-libnss3-tools_2%3a3.120-1_arm64.deb ... 249s Unpacking libnss3-tools (2:3.120-1) ... 249s Selecting previously unselected package libevent-pthreads-2.1-7t64:arm64. 249s Preparing to unpack .../2-libevent-pthreads-2.1-7t64_2.1.12-stable-10build1_arm64.deb ... 249s Unpacking libevent-pthreads-2.1-7t64:arm64 (2.1.12-stable-10build1) ... 249s Selecting previously unselected package libldns3t64:arm64. 249s Preparing to unpack .../3-libldns3t64_1.8.4-2build1_arm64.deb ... 249s Unpacking libldns3t64:arm64 (1.8.4-2build1) ... 249s Selecting previously unselected package libevent-2.1-7t64:arm64. 249s Preparing to unpack .../4-libevent-2.1-7t64_2.1.12-stable-10build1_arm64.deb ... 249s Unpacking libevent-2.1-7t64:arm64 (2.1.12-stable-10build1) ... 249s Selecting previously unselected package libunbound8:arm64. 249s Preparing to unpack .../5-libunbound8_1.24.2-1ubuntu1_arm64.deb ... 249s Unpacking libunbound8:arm64 (1.24.2-1ubuntu1) ... 249s Selecting previously unselected package libreswan. 249s Preparing to unpack .../6-libreswan_5.2-2.2ubuntu1_arm64.deb ... 249s Unpacking libreswan (5.2-2.2ubuntu1) ... 250s Setting up libldns3t64:arm64 (1.8.4-2build1) ... 250s Setting up libevent-pthreads-2.1-7t64:arm64 (2.1.12-stable-10build1) ... 250s Setting up libevent-2.1-7t64:arm64 (2.1.12-stable-10build1) ... 250s Setting up dns-root-data (2025080400build1) ... 250s Setting up libunbound8:arm64 (1.24.2-1ubuntu1) ... 250s Setting up libnss3-tools (2:3.120-1) ... 250s Setting up libreswan (5.2-2.2ubuntu1) ... 250s ipsec.service is a disabled or a static unit, not starting it. 250s Processing triggers for man-db (2.13.1-1) ... 251s Processing triggers for libc-bin (2.42-2ubuntu4) ... 259s autopkgtest [21:35:19]: test cryptocheck: [----------------------- 260s Testing installed binary: /usr/libexec/ipsec/algparse 260s Testing installed binary: /usr/libexec/ipsec/pluto 260s testing -tp 260s ipsec algparse: Encryption algorithms: 260s ipsec algparse: AES_CCM_16 {256,192,*128} IKEv1: ESP IKEv2: ESP FIPS aes_ccm, aes_ccm_c 260s ipsec algparse: AES_CCM_12 {256,192,*128} IKEv1: ESP IKEv2: ESP FIPS aes_ccm_b 260s ipsec algparse: AES_CCM_8 {256,192,*128} IKEv1: ESP IKEv2: ESP FIPS aes_ccm_a 260s ipsec algparse: 3DES_CBC [*192] IKEv1: IKE ESP IKEv2: IKE ESP FIPS NSS(CBC) 3des 260s ipsec algparse: CAMELLIA_CTR {256,192,*128} IKEv1: ESP IKEv2: ESP 260s ipsec algparse: CAMELLIA_CBC {256,192,*128} IKEv1: IKE ESP IKEv2: IKE ESP NSS(CBC) camellia 260s ipsec algparse: AES_GCM_16 {256,192,*128} IKEv1: ESP IKEv2: IKE ESP FIPS NSS(AEAD) aes_gcm, aes_gcm_c 260s ipsec algparse: AES_GCM_12 {256,192,*128} IKEv1: ESP IKEv2: IKE ESP FIPS NSS(AEAD) aes_gcm_b 260s ipsec algparse: AES_GCM_8 {256,192,*128} IKEv1: ESP IKEv2: IKE ESP FIPS NSS(AEAD) aes_gcm_a 260s ipsec algparse: AES_CTR {256,192,*128} IKEv1: IKE ESP IKEv2: IKE ESP FIPS NSS(CTR) aesctr 260s ipsec algparse: AES_CBC {256,192,*128} IKEv1: IKE ESP IKEv2: IKE ESP FIPS NSS(CBC) aes 260s ipsec algparse: NULL_AUTH_AES_GMAC {256,192,*128} IKEv1: ESP IKEv2: ESP FIPS aes_gmac 260s ipsec algparse: NULL [] IKEv1: ESP IKEv2: ESP NULL 260s ipsec algparse: CHACHA20_POLY1305 [*256] IKEv1: IKEv2: IKE ESP NSS(AEAD) chacha20poly1305 260s ipsec algparse: Hash algorithms: 260s ipsec algparse: MD5 IKEv1: IKE IKEv2: NSS 260s ipsec algparse: SHA1 IKEv1: IKE IKEv2: IKE FIPS NSS sha 260s ipsec algparse: SHA2_256 IKEv1: IKE IKEv2: IKE FIPS NSS sha2, sha256 260s ipsec algparse: SHA2_384 IKEv1: IKE IKEv2: IKE FIPS NSS sha384 260s ipsec algparse: SHA2_512 IKEv1: IKE IKEv2: IKE FIPS NSS sha512 260s ipsec algparse: IDENTITY IKEv1: IKEv2: FIPS 260s ipsec algparse: PRF algorithms: 260s ipsec algparse: HMAC_MD5 IKEv1: IKE IKEv2: IKE NSS md5 260s ipsec algparse: HMAC_SHA1 IKEv1: IKE IKEv2: IKE FIPS NSS sha, sha1 260s ipsec algparse: HMAC_SHA2_256 IKEv1: IKE IKEv2: IKE FIPS NSS sha2, sha256, sha2_256 260s ipsec algparse: HMAC_SHA2_384 IKEv1: IKE IKEv2: IKE FIPS NSS sha384, sha2_384 260s ipsec algparse: HMAC_SHA2_512 IKEv1: IKE IKEv2: IKE FIPS NSS sha512, sha2_512 260s ipsec algparse: AES_XCBC IKEv1: IKEv2: IKE native(XCBC) aes128_xcbc 260s ipsec algparse: Integrity algorithms: 260s ipsec algparse: HMAC_MD5_96 IKEv1: IKE ESP AH IKEv2: IKE ESP AH NSS md5, hmac_md5 260s ipsec algparse: HMAC_SHA1_96 IKEv1: IKE ESP AH IKEv2: IKE ESP AH FIPS NSS sha, sha1, sha1_96, hmac_sha1 260s ipsec algparse: HMAC_SHA2_512_256 IKEv1: IKE ESP AH IKEv2: IKE ESP AH FIPS NSS sha512, sha2_512, sha2_512_256, hmac_sha2_512 260s ipsec algparse: HMAC_SHA2_384_192 IKEv1: IKE ESP AH IKEv2: IKE ESP AH FIPS NSS sha384, sha2_384, sha2_384_192, hmac_sha2_384 260s ipsec algparse: HMAC_SHA2_256_128 IKEv1: IKE ESP AH IKEv2: IKE ESP AH FIPS NSS sha2, sha256, sha2_256, sha2_256_128, hmac_sha2_256 260s ipsec algparse: HMAC_SHA2_256_TRUNCBUG IKEv1: ESP AH IKEv2: AH 260s ipsec algparse: AES_XCBC_96 IKEv1: ESP AH IKEv2: IKE ESP AH native(XCBC) aes_xcbc, aes128_xcbc, aes128_xcbc_96 260s ipsec algparse: AES_CMAC_96 IKEv1: ESP AH IKEv2: ESP AH FIPS aes_cmac 260s ipsec algparse: NONE IKEv1: ESP IKEv2: IKE ESP FIPS null 260s ipsec algparse: DH algorithms: 260s ipsec algparse: NONE IKEv1: IKEv2: IKE ESP AH FIPS NSS(MODP) null, dh0 260s ipsec algparse: MODP1536 IKEv1: IKE ESP AH IKEv2: IKE ESP AH NSS(MODP) dh5 260s ipsec algparse: MODP2048 IKEv1: IKE ESP AH IKEv2: IKE ESP AH FIPS NSS(MODP) dh14 260s ipsec algparse: MODP3072 IKEv1: IKE ESP AH IKEv2: IKE ESP AH FIPS NSS(MODP) dh15 260s ipsec algparse: MODP4096 IKEv1: IKE ESP AH IKEv2: IKE ESP AH FIPS NSS(MODP) dh16 260s ipsec algparse: MODP6144 IKEv1: IKE ESP AH IKEv2: IKE ESP AH FIPS NSS(MODP) dh17 260s ipsec algparse: MODP8192 IKEv1: IKE ESP AH IKEv2: IKE ESP AH FIPS NSS(MODP) dh18 260s ipsec algparse: DH19 IKEv1: IKE IKEv2: IKE ESP AH FIPS NSS(ECP) ecp_256, ecp256 260s ipsec algparse: DH20 IKEv1: IKE IKEv2: IKE ESP AH FIPS NSS(ECP) ecp_384, ecp384 260s ipsec algparse: DH21 IKEv1: IKE IKEv2: IKE ESP AH FIPS NSS(ECP) ecp_521, ecp521 260s ipsec algparse: DH31 IKEv1: IKE IKEv2: IKE ESP AH NSS(ECP) curve25519 260s ipsec algparse: IPCOMP algorithms: 260s ipsec algparse: DEFLATE IKEv1: ESP AH IKEv2: ESP AH FIPS 260s ipsec algparse: LZS IKEv1: IKEv2: ESP AH FIPS 260s ipsec algparse: LZJH IKEv1: IKEv2: ESP AH FIPS 260s algparse -v2 'esp' (expect SUCCESS) 260s AES_GCM_16_256-NONE 260s AES_GCM_16_128-NONE 260s CHACHA20_POLY1305-NONE 260s AES_CBC_256-HMAC_SHA2_512_256+HMAC_SHA2_256_128 260s AES_CBC_128-HMAC_SHA2_512_256+HMAC_SHA2_256_128 260s algparse -v2 'esp=' (expect ERROR) 260s ERROR: ESP proposal is empty 260s algparse -v2 'esp=aes' (expect SUCCESS) 260s AES_CBC-HMAC_SHA2_512_256+HMAC_SHA2_256_128 260s algparse -v2 'esp=aes;modp2048' (expect SUCCESS) 260s AES_CBC-HMAC_SHA2_512_256+HMAC_SHA2_256_128 260s algparse -v2 'esp=aes-sha1' (expect SUCCESS) 260s AES_CBC-HMAC_SHA1_96 260s algparse -v2 'esp=aes-sha1' (expect SUCCESS) 260s AES_CBC-HMAC_SHA1_96 260s algparse -v2 'esp=aes-sha1-modp2048' (expect SUCCESS) 260s AES_CBC-HMAC_SHA1_96 260s algparse -v2 'esp=aes-128-sha1' (expect SUCCESS) 260s AES_CBC_128-HMAC_SHA1_96 260s algparse -v2 'esp=aes-128-sha1' (expect SUCCESS) 260s AES_CBC_128-HMAC_SHA1_96 260s algparse -v2 'esp=aes-128-sha1-modp2048' (expect SUCCESS) 260s AES_CBC_128-HMAC_SHA1_96 260s algparse -v2 'esp=aes-128' (expect SUCCESS) 260s AES_CBC_128-HMAC_SHA2_512_256+HMAC_SHA2_256_128 260s algparse -v2 'esp=aes_gcm_a-128-null' (expect SUCCESS) 260s AES_GCM_8_128-NONE 260s algparse -v2 'esp=3des-sha1;modp1024' (expect ERROR) 260s ERROR: ESP DH algorithm 'modp1024' is not supported 260s algparse -v2 'esp=3des-sha1;modp1536' (expect SUCCESS) 260s 3DES_CBC-HMAC_SHA1_96 260s algparse -v2 'esp=3des-sha1;modp2048' (expect SUCCESS) 260s 3DES_CBC-HMAC_SHA1_96 260s algparse -v2 'esp=3des-sha1;dh21' (expect SUCCESS) 260s | parsing 'AES_GCM_16_256,AES_GCM_16_128,CHACHA20_POLY1305,AES_CBC_256,AES_CBC_128' for ESP 260s | proposal: 'AES_GCM_16_256' 260s | token: '' '' "AES_GCM_16_256" '' 260s | token: '' "AES_GCM_16_256" '' '' 260s | ike_alg_byname() failed: ESP encryption algorithm 'AES_GCM_16_256' is not recognized 260s | token: '' '' '' 260s | appending ESP encryption algorithm AES_GCM_16[_256] 260s | appending ESP integrity algorithm NONE[_0] 260s | proposal: 'AES_GCM_16_128' 260s | token: '' '' "AES_GCM_16_128" '' 260s | token: '' "AES_GCM_16_128" '' '' 260s | ike_alg_byname() failed: ESP encryption algorithm 'AES_GCM_16_128' is not recognized 260s | token: '' '' '' 260s | appending ESP encryption algorithm AES_GCM_16[_128] 260s | appending ESP integrity algorithm NONE[_0] 260s | proposal: 'CHACHA20_POLY1305' 260s | token: '' '' "CHACHA20_POLY1305" '' 260s | token: '' "CHACHA20_POLY1305" '' '' 260s | token: '' '' '' 260s | appending ESP encryption algorithm CHACHA20_POLY1305[_0] 260s | appending ESP integrity algorithm NONE[_0] 260s | proposal: 'AES_CBC_256' 260s | token: '' '' "AES_CBC_256" '' 260s | token: '' "AES_CBC_256" '' '' 260s | ike_alg_byname() failed: ESP encryption algorithm 'AES_CBC_256' is not recognized 260s | token: '' '' '' 260s | appending ESP encryption algorithm AES_CBC[_256] 260s | appending ESP integrity algorithm HMAC_SHA2_512_256[_0] 260s | appending ESP integrity algorithm HMAC_SHA2_256_128[_0] 260s | proposal: 'AES_CBC_128' 260s | token: '' '' "AES_CBC_128" '' 260s | token: '' "AES_CBC_128" '' '' 260s | ike_alg_byname() failed: ESP encryption algorithm 'AES_CBC_128' is not recognized 260s | token: '' '' '' 260s | appending ESP encryption algorithm AES_CBC[_128] 260s | appending ESP integrity algorithm HMAC_SHA2_512_256[_0] 260s | appending ESP integrity algorithm HMAC_SHA2_256_128[_0] 260s | parsing '' for ESP 260s | parsing 'aes' for ESP 260s | proposal: 'aes' 260s | token: '' '' "aes" '' 260s | token: '' "aes" '' '' 260s | token: '' '' '' 260s | appending ESP encryption algorithm AES_CBC[_0] 260s | appending ESP integrity algorithm HMAC_SHA2_512_256[_0] 260s | appending ESP integrity algorithm HMAC_SHA2_256_128[_0] 260s | parsing 'aes;modp2048' for ESP 260s | proposal: 'aes;modp2048' 260s | token: '' '' "aes" ';' 260s | token: '' "aes" ';' "modp2048" '' 260s | token: ';' "modp2048" '' '' 260s | appending ESP encryption algorithm AES_CBC[_0] 260s | parsing dh: 260s | appending ESP DH algorithm MODP2048[_0] 260s | token: '' '' '' 260s | appending ESP integrity algorithm HMAC_SHA2_512_256[_0] 260s | appending ESP integrity algorithm HMAC_SHA2_256_128[_0] 260s ipsec algparse: ignoring ESP DH algorithm MODP2048 as PFS policy is disabled 260s | parsing 'aes-sha1' for ESP 260s | proposal: 'aes-sha1' 260s | token: '' '' "aes" '-' 260s | token: '' "aes" '-' "sha1" '' 260s | token: '-' "sha1" '' '' 260s | appending ESP encryption algorithm AES_CBC[_0] 260s | parsing integ: 260s | appending ESP integrity algorithm HMAC_SHA1_96[_0] 260s | token: '' '' '' 260s | parsing 'aes-sha1' for ESP 260s | proposal: 'aes-sha1' 260s | token: '' '' "aes" '-' 260s | token: '' "aes" '-' "sha1" '' 260s | token: '-' "sha1" '' '' 260s | appending ESP encryption algorithm AES_CBC[_0] 260s | parsing integ: 260s | appending ESP integrity algorithm HMAC_SHA1_96[_0] 260s | token: '' '' '' 260s | parsing 'aes-sha1-modp2048' for ESP 260s | proposal: 'aes-sha1-modp2048' 260s | token: '' '' "aes" '-' 260s | token: '' "aes" '-' "sha1" '-' 260s | token: '-' "sha1" '-' "modp2048" '' 260s | appending ESP encryption algorithm AES_CBC[_0] 260s | parsing integ: 260s | appending ESP integrity algorithm HMAC_SHA1_96[_0] 260s | token: '-' "modp2048" '' '' 260s | parsing dh: 260s | appending ESP DH algorithm MODP2048[_0] 260s | token: '' '' '' 260s ipsec algparse: ignoring ESP DH algorithm MODP2048 as PFS policy is disabled 260s | parsing 'aes-128-sha1' for ESP 260s | proposal: 'aes-128-sha1' 260s | token: '' '' "aes" '-' 260s | token: '' "aes" '-' "128" '-' 260s | token: '-' "128" '-' "sha1" '' 260s | token: '-' "sha1" '' '' 260s | appending ESP encryption algorithm AES_CBC[_128] 260s | parsing integ: 260s | appending ESP integrity algorithm HMAC_SHA1_96[_0] 260s | token: '' '' '' 260s | parsing 'aes-128-sha1' for ESP 260s | proposal: 'aes-128-sha1' 260s | token: '' '' "aes" '-' 260s | token: '' "aes" '-' "128" '-' 260s | token: '-' "128" '-' "sha1" '' 260s | token: '-' "sha1" '' '' 260s | appending ESP encryption algorithm AES_CBC[_128] 260s | parsing integ: 260s | appending ESP integrity algorithm HMAC_SHA1_96[_0] 260s | token: '' '' '' 260s | parsing 'aes-128-sha1-modp2048' for ESP 260s | proposal: 'aes-128-sha1-modp2048' 260s | token: '' '' "aes" '-' 260s | token: '' "aes" '-' "128" '-' 260s | token: '-' "128" '-' "sha1" '-' 260s | token: '-' "sha1" '-' "modp2048" '' 260s | appending ESP encryption algorithm AES_CBC[_128] 260s | parsing integ: 260s | appending ESP integrity algorithm HMAC_SHA1_96[_0] 260s | token: '-' "modp2048" '' '' 260s | parsing dh: 260s | appending ESP DH algorithm MODP2048[_0] 260s | token: '' '' '' 260s ipsec algparse: ignoring ESP DH algorithm MODP2048 as PFS policy is disabled 260s | parsing 'aes-128' for ESP 260s | proposal: 'aes-128' 260s | token: '' '' "aes" '-' 260s | token: '' "aes" '-' "128" '' 260s | token: '-' "128" '' '' 260s | token: '' '' '' 260s | appending ESP encryption algorithm AES_CBC[_128] 260s | appending ESP integrity algorithm HMAC_SHA2_512_256[_0] 260s | appending ESP integrity algorithm HMAC_SHA2_256_128[_0] 260s | parsing 'aes_gcm_a-128-null' for ESP 260s | proposal: 'aes_gcm_a-128-null' 260s | token: '' '' "aes_gcm_a" '-' 260s | token: '' "aes_gcm_a" '-' "128" '-' 260s | token: '-' "128" '-' "null" '' 260s | token: '-' "null" '' '' 260s | appending ESP encryption algorithm AES_GCM_8[_128] 260s | parsing integ: 260s | appending ESP integrity algorithm NONE[_0] 260s | token: '' '' '' 260s | parsing '3des-sha1;modp1024' for ESP 260s | proposal: '3des-sha1;modp1024' 260s | token: '' '' "3des" '-' 260s | token: '' "3des" '-' "sha1" ';' 260s | token: '-' "sha1" ';' "modp1024" '' 260s | appending ESP encryption algorithm 3DES_CBC[_0] 260s | parsing integ: 260s | appending ESP integrity algorithm HMAC_SHA1_96[_0] 260s | token: ';' "modp1024" '' '' 260s | parsing dh: 260s | ike_alg_byname() failed: ESP DH algorithm 'modp1024' is not supported 260s | lookup for DH algorithm 'modp1024' failed 260s | ... failed 'ESP DH algorithm 'modp1024' is not supported' 260s | parsing '3des-sha1;modp1536' for ESP 260s | proposal: '3des-sha1;modp1536' 260s | token: '' '' "3des" '-' 260s | token: '' "3des" '-' "sha1" ';' 260s | token: '-' "sha1" ';' "modp1536" '' 260s | appending ESP encryption algorithm 3DES_CBC[_0] 260s | parsing integ: 260s | appending ESP integrity algorithm HMAC_SHA1_96[_0] 260s | token: ';' "modp1536" '' '' 260s | parsing dh: 260s | appending ESP DH algorithm MODP1536[_0] 260s | token: '' '' '' 260s ipsec algparse: ignoring ESP DH algorithm MODP1536 as PFS policy is disabled 260s | parsing '3des-sha1;modp2048' for ESP 260s | proposal: '3des-sha1;modp2048' 260s | token: '' '' "3des" '-' 260s | token: '' "3des" '-' "sha1" ';' 260s | token: '-' "sha1" ';' "modp2048" '' 260s | appending ESP encryption algorithm 3DES_CBC[_0] 260s | parsing integ: 260s | appending ESP integrity algorithm HMAC_SHA1_96[_0] 260s | token: ';' "modp2048" '' '' 260s | parsing dh: 260s | appending ESP DH algorithm MODP2048[_0] 260s | token: '' '' '' 260s ipsec algparse: ignoring ESP DH algorithm MODP2048 as PFS policy is disabled 260s | parsing '3des-sha1;dh21' for ESP 260s | proposal: '3des-sha1;dh21' 260s | token: '' '' "3des" '-' 260s | token: '' "3des" '-' "sha1" ';' 260s | token: '-' "sha1" ';' "dh21" '' 260s | appending ESP encryption algorithm 3DES_CBC[_0] 260s | parsing integ: 260s | appending ESP integrity algorithm HMAC_SHA1_96[_0] 260s | token: ';' "dh21" '' '' 260s | parsing dh: 260s | appending ESP DH algorithm DH21[_0] 260s | token: '' '' '' 260s ipsec algparse: ignoring ESP DH algorithm DH21 as PFS policy is disabled 260s | parsing '3des-sha1;ecp_521' for ESP 260s | proposal: '3des-sha1;ecp_521' 260s | token: '' '' "3des" '-' 260s | token: '' "3des" '-' "sha1" ';' 260s | token: '-' "sha1" ';' "ecp_521" '' 260s | appending ESP encryption algorithm 3DES_CBC[_0] 260s | parsing integ: 260s | appending ESP integrity algorithm HMAC_SHA1_96[_0] 260s | token: ';' "ecp_521" '' '' 260s | parsing dh: 260s | appending ESP DH algorithm DH21[_0] 260s | token: '' '' '' 260s ipsec algparse: ignoring ESP DH algorithm DH21 as PFS policy is disabled 260s 3DES_CBC-HMAC_SHA1_96 260s algparse -v2 'esp=3des-sha1;ecp_521' (expect SUCCESS) 260s 3DES_CBC-HMAC_SHA1_96 260s algparse -v2 'esp=3des-sha1;dh23' (expect ERROR) 260s ERROR: ESP DH algorithm 'dh23' is not supported 260s algparse -v2 'esp=3des-sha1;dh24' (expect ERROR) 260s ERROR: ESP DH algorithm 'dh24' is not supported 260s algparse -v2 'esp=3des-sha1' (expect SUCCESS) 260s 3DES_CBC-HMAC_SHA1_96 260s algparse -v2 'esp=null-sha1' (expect SUCCESS) 260s NULL-HMAC_SHA1_96 260s algparse -v2 'esp=aes_cbc' (expect SUCCESS) 260s AES_CBC-HMAC_SHA2_512_256+HMAC_SHA2_256_128 260s algparse -v2 'esp=aes-sha' (expect SUCCESS) 260s AES_CBC-HMAC_SHA1_96 260s algparse -v2 'esp=aes-sha1' (expect SUCCESS) 260s AES_CBC-HMAC_SHA1_96 260s algparse -v2 'esp=aes128-sha1' (expect SUCCESS) 260s AES_CBC_128-HMAC_SHA1_96 260s algparse -v2 'esp=aes-sha2' (expect SUCCESS) 260s AES_CBC-HMAC_SHA2_256_128 260s algparse -v2 'esp=aes-sha256' (expect SUCCESS) 260s AES_CBC-HMAC_SHA2_256_128 260s algparse -v2 'esp=aes-sha384' (expect SUCCESS) 260s AES_CBC-HMAC_SHA2_384_192 260s algparse -v2 'esp=aes-sha512' (expect SUCCESS) 260s AES_CBC-HMAC_SHA2_512_256 260s algparse -v2 'esp=aes128-aes_xcbc' (expect SUCCESS) 260s AES_CBC_128-AES_XCBC_96 260s algparse -v2 'esp=aes192-sha1' (expect SUCCESS) 260s AES_CBC_192-HMAC_SHA1_96 260s algparse -v2 'esp=aes256-sha1' (expect SUCCESS) 260s AES_CBC_256-HMAC_SHA1_96 260s algparse -v2 'esp=aes256-sha' (expect SUCCESS) 260s AES_CBC_256-HMAC_SHA1_96 260s algparse -v2 'esp=aes256-sha2' (expect SUCCESS) 260s AES_CBC_256-HMAC_SHA2_256_128 260s algparse -v2 'esp=aes256-sha2_256' (expect SUCCESS) 260s AES_CBC_256-HMAC_SHA2_256_128 260s algparse -v2 'esp=aes256-sha2_384' (expect SUCCESS) 260s AES_CBC_256-HMAC_SHA2_384_192 260s algparse -v2 'esp=aes256-sha2_512' (expect SUCCESS) 260s AES_CBC_256-HMAC_SHA2_512_256 260s algparse -v2 'esp=camellia' (expect SUCCESS) 260s CAMELLIA_CBC-HMAC_SHA2_512_256+HMAC_SHA2_256_128 260s algparse -v2 'esp=camellia128' (expect SUCCESS) 260s CAMELLIA_CBC_128-HMAC_SHA2_512_256+HMAC_SHA2_256_128 260s algparse -v2 'esp=camellia192' (expect SUCCESS) 260s CAMELLIA_CBC_192-HMAC_SHA2_512_256+HMAC_SHA2_256_128 260s algparse -v2 'esp=camellia256' (expect SUCCESS) 260s CAMELLIA_CBC_256-HMAC_SHA2_512_256+HMAC_SHA2_256_128 260s algparse -v2 'esp=aes_ccm' (expect SUCCESS) 260s AES_CCM_16-NONE 260s algparse -v2 'esp=aes_ccm_a-128-null' (expect SUCCESS) 260s AES_CCM_8_128-NONE 260s algparse -v2 'esp=aes_ccm_a-192-null' (expect SUCCESS) 260s AES_CCM_8_192-NONE 260s algparse -v2 'esp=aes_ccm_a-256-null' (expect SUCCESS) 260s AES_CCM_8_256-NONE 260s algparse -v2 'esp=aes_ccm_b-128-null' (expect SUCCESS) 260s AES_CCM_12_128-NONE 260s algparse -v2 'esp=aes_ccm_b-192-null' (expect SUCCESS) 260s AES_CCM_12_192-NONE 260s algparse -v2 'esp=aes_ccm_b-256-null' (expect SUCCESS) 260s AES_CCM_12_256-NONE 260s algparse -v2 'esp=aes_ccm_c-128-null' (expect SUCCESS) 260s AES_CCM_16_128-NONE 260s algparse -v2 'esp=aes_ccm_c-192-null' (expect SUCCESS) 260s AES_CCM_16_192-NONE 260s algparse -v2 'esp=aes_ccm_c-256-null' (expect SUCCESS) 260s AES_CCM_16_256-NONE 260s algparse -v2 'esp=aes_gcm' (expect SUCCESS) 260s AES_GCM_16-NONE 260s algparse -v2 'esp=aes_gcm_a-128-null' (expect SUCCESS) 260s AES_GCM_8_128-NONE 260s algparse -v2 'esp=aes_gcm_a-192-null' (expect SUCCESS) 260s AES_GCM_8_192-NONE 260s algparse -v2 'esp=aes_gcm_a-256-null' (expect SUCCESS) 260s AES_GCM_8_256-NONE 260s algparse -v2 'esp=aes_gcm_b-128-null' (expect SUCCESS) 260s AES_GCM_12_128-NONE 260s algparse -v2 'esp=aes_gcm_b-192-null' (expect SUCCESS) 260s AES_GCM_12_192-NONE 260s algparse -v2 'esp=aes_gcm_b-256-null' (expect SUCCESS) 260s AES_GCM_12_256-NONE 260s algparse -v2 'esp=aes_gcm_c-128-null' (expect SUCCESS) 260s AES_GCM_16_128-NONE 260s algparse -v2 'esp=aes_gcm_c-192-null' (expect SUCCESS) 260s AES_GCM_16_192-NONE 260s algparse -v2 'esp=aes_gcm_c-256-null' (expect SUCCESS) 260s AES_GCM_16_256-NONE 260s algparse -v2 'esp=aes_ccm_a-null' (expect SUCCESS) 260s AES_CCM_8-NONE 260s algparse -v2 'esp=aes_ccm_b-null' (expect SUCCESS) 260s AES_CCM_12-NONE 260s algparse -v2 'esp=aes_ccm_c-null' (expect SUCCESS) 260s AES_CCM_16-NONE 260s algparse -v2 'esp=aes_gcm_a-null' (expect SUCCESS) 260s AES_GCM_8-NONE 260s algparse -v2 'esp=aes_gcm_b-null' (expect SUCCESS) 260s AES_GCM_12-NONE 260s algparse -v2 'esp=aes_gcm_c-null' (expect SUCCESS) 260s AES_GCM_16-NONE 260s algparse -v2 'esp=aes_ccm-null' (expect SUCCESS) 260s AES_CCM_16-NONE 260s algparse -v2 'esp=aes_gcm-null' (expect SUCCESS) 260s AES_GCM_16-NONE 260s algparse -v2 'esp=aes_ccm-256-null' (expect SUCCESS) 260s | parsing '3des-sha1;dh23' for ESP 260s | proposal: '3des-sha1;dh23' 260s | token: '' '' "3des" '-' 260s | token: '' "3des" '-' "sha1" ';' 260s | token: '-' "sha1" ';' "dh23" '' 260s | appending ESP encryption algorithm 3DES_CBC[_0] 260s | parsing integ: 260s | appending ESP integrity algorithm HMAC_SHA1_96[_0] 260s | token: ';' "dh23" '' '' 260s | parsing dh: 260s | ike_alg_byname() failed: ESP DH algorithm 'dh23' is not supported 260s | lookup for DH algorithm 'dh23' failed 260s | ... failed 'ESP DH algorithm 'dh23' is not supported' 260s | parsing '3des-sha1;dh24' for ESP 260s | proposal: '3des-sha1;dh24' 260s | token: '' '' "3des" '-' 260s | token: '' "3des" '-' "sha1" ';' 260s | token: '-' "sha1" ';' "dh24" '' 260s | appending ESP encryption algorithm 3DES_CBC[_0] 260s | parsing integ: 260s | appending ESP integrity algorithm HMAC_SHA1_96[_0] 260s | token: ';' "dh24" '' '' 260s | parsing dh: 260s | ike_alg_byname() failed: ESP DH algorithm 'dh24' is not supported 260s | lookup for DH algorithm 'dh24' failed 260s | ... failed 'ESP DH algorithm 'dh24' is not supported' 260s | parsing '3des-sha1' for ESP 260s | proposal: '3des-sha1' 260s | token: '' '' "3des" '-' 260s | token: '' "3des" '-' "sha1" '' 260s | token: '-' "sha1" '' '' 260s | appending ESP encryption algorithm 3DES_CBC[_0] 260s | parsing integ: 260s | appending ESP integrity algorithm HMAC_SHA1_96[_0] 260s | token: '' '' '' 260s | parsing 'null-sha1' for ESP 260s | proposal: 'null-sha1' 260s | token: '' '' "null" '-' 260s | token: '' "null" '-' "sha1" '' 260s | token: '-' "sha1" '' '' 260s | appending ESP encryption algorithm NULL[_0] 260s | parsing integ: 260s | appending ESP integrity algorithm HMAC_SHA1_96[_0] 260s | token: '' '' '' 260s | parsing 'aes_cbc' for ESP 260s | proposal: 'aes_cbc' 260s | token: '' '' "aes_cbc" '' 260s | token: '' "aes_cbc" '' '' 260s | token: '' '' '' 260s | appending ESP encryption algorithm AES_CBC[_0] 260s | appending ESP integrity algorithm HMAC_SHA2_512_256[_0] 260s | appending ESP integrity algorithm HMAC_SHA2_256_128[_0] 260s | parsing 'aes-sha' for ESP 260s | proposal: 'aes-sha' 260s | token: '' '' "aes" '-' 260s | token: '' "aes" '-' "sha" '' 260s | token: '-' "sha" '' '' 260s | appending ESP encryption algorithm AES_CBC[_0] 260s | parsing integ: 260s | appending ESP integrity algorithm HMAC_SHA1_96[_0] 260s | token: '' '' '' 260s | parsing 'aes-sha1' for ESP 260s | proposal: 'aes-sha1' 260s | token: '' '' "aes" '-' 260s | token: '' "aes" '-' "sha1" '' 260s | token: '-' "sha1" '' '' 260s | appending ESP encryption algorithm AES_CBC[_0] 260s | parsing integ: 260s | appending ESP integrity algorithm HMAC_SHA1_96[_0] 260s | token: '' '' '' 260s | parsing 'aes128-sha1' for ESP 260s | proposal: 'aes128-sha1' 260s | token: '' '' "aes128" '-' 260s | token: '' "aes128" '-' "sha1" '' 260s | ike_alg_byname() failed: ESP encryption algorithm 'aes128' is not recognized 260s | token: '-' "sha1" '' '' 260s | appending ESP encryption algorithm AES_CBC[_128] 260s | parsing integ: 260s | appending ESP integrity algorithm HMAC_SHA1_96[_0] 260s | token: '' '' '' 260s | parsing 'aes-sha2' for ESP 260s | proposal: 'aes-sha2' 260s | token: '' '' "aes" '-' 260s | token: '' "aes" '-' "sha2" '' 260s | token: '-' "sha2" '' '' 260s | appending ESP encryption algorithm AES_CBC[_0] 260s | parsing integ: 260s | appending ESP integrity algorithm HMAC_SHA2_256_128[_0] 260s | token: '' '' '' 260s | parsing 'aes-sha256' for ESP 260s | proposal: 'aes-sha256' 260s | token: '' '' "aes" '-' 260s | token: '' "aes" '-' "sha256" '' 260s | token: '-' "sha256" '' '' 260s | appending ESP encryption algorithm AES_CBC[_0] 260s | parsing integ: 260s | appending ESP integrity algorithm HMAC_SHA2_256_128[_0] 260s | token: '' '' '' 260s | parsing 'aes-sha384' for ESP 260s | proposal: 'aes-sha384' 260s | token: '' '' "aes" '-' 260s | token: '' "aes" '-' "sha384" '' 260s | token: '-' "sha384" '' '' 260s | appending ESP encryption algorithm AES_CBC[_0] 260s | parsing integ: 260s | appending ESP integrity algorithm HMAC_SHA2_384_192[_0] 260s | token: '' '' '' 260s | parsing 'aes-sha512' for ESP 260s | proposal: 'aes-sha512' 260s | token: '' '' "aes" '-' 260s | token: '' "aes" '-' "sha512" '' 260s | token: '-' "sha512" '' '' 260s | appending ESP encryption algorithm AES_CBC[_0] 260s | parsing integ: 260s | appending ESP integrity algorithm HMAC_SHA2_512_256[_0] 260s | token: '' '' '' 260s | parsing 'aes128-aes_xcbc' for ESP 260s | proposal: 'aes128-aes_xcbc' 260s | token: '' '' "aes128" '-' 260s | token: '' "aes128" '-' "aes_xcbc" '' 260s | ike_alg_byname() failed: ESP encryption algorithm 'aes128' is not recognized 260s | token: '-' "aes_xcbc" '' '' 260s | appending ESP encryption algorithm AES_CBC[_128] 260s | parsing integ: 260s | appending ESP integrity algorithm AES_XCBC_96[_0] 260s | token: '' '' '' 260s | parsing 'aes192-sha1' for ESP 260s | proposal: 'aes192-sha1' 260s | token: '' '' "aes192" '-' 260s | token: '' "aes192" '-' "sha1" '' 260s | ike_alg_byname() failed: ESP encryption algorithm 'aes192' is not recognized 260s | token: '-' "sha1" '' '' 260s | appending ESP encryption algorithm AES_CBC[_192] 260s | parsing integ: 260s | appending ESP integrity algorithm HMAC_SHA1_96[_0] 260s | token: '' '' '' 260s | parsing 'aes256-sha1' for ESP 260s | proposal: 'aes256-sha1' 260s | token: '' '' "aes256" '-' 260s | token: '' "aes256" '-' "sha1" '' 260s | ike_alg_byname() failed: ESP encryption algorithm 'aes256' is not recognized 260s | token: '-' "sha1" '' '' 260s | appending ESP encryption algorithm AES_CBC[_256] 260s | parsing integ: 260s | appending ESP integrity algorithm HMAC_SHA1_96[_0] 260s | token: '' '' '' 260s | parsing 'aes256-sha' for ESP 260s | proposal: 'aes256-sha' 260s | token: '' '' "aes256" '-' 260s | token: '' "aes256" '-' "sha" '' 260s | ike_alg_byname() failed: ESP encryption algorithm 'aes256' is not recognized 260s | token: '-' "sha" '' '' 260s | appending ESP encryption algorithm AES_CBC[_256] 260s | parsing integ: 260s | appending ESP integrity algorithm HMAC_SHA1_96[_0] 260s | token: '' '' '' 260s | parsing 'aes256-sha2' for ESP 260s | proposal: 'aes256-sha2' 260s | token: '' '' "aes256" '-' 260s | token: '' "aes256" '-' "sha2" '' 260s | ike_alg_byname() failed: ESP encryption algorithm 'aes256' is not recognized 260s | token: '-' "sha2" '' '' 260s | appending ESP encryption algorithm AES_CBC[_256] 260s | parsing integ: 260s | appending ESP integrity algorithm HMAC_SHA2_256_128[_0] 260s | token: '' '' '' 260s | parsing 'aes256-sha2_256' for ESP 260s | proposal: 'aes256-sha2_256' 260s | token: '' '' "aes256" '-' 260s | token: '' "aes256" '-' "sha2_256" '' 260s | ike_alg_byname() failed: ESP encryption algorithm 'aes256' is not recognized 260s | token: '-' "sha2_256" '' '' 260s | appending ESP encryption algorithm AES_CBC[_256] 260s | parsing integ: 260s | appending ESP integrity algorithm HMAC_SHA2_256_128[_0] 260s | token: '' '' '' 260s | parsing 'aes256-sha2_384' for ESP 260s | proposal: 'aes256-sha2_384' 260s | token: '' '' "aes256" '-' 260s | token: '' "aes256" '-' "sha2_384" '' 260s | ike_alg_byname() failed: ESP encryption algorithm 'aes256' is not recognized 260s | token: '-' "sha2_384" '' '' 260s | appending ESP encryption algorithm AES_CBC[_256] 260s | parsing integ: 260s | appending ESP integrity algorithm HMAC_SHA2_384_192[_0] 260s | token: '' '' '' 260s | parsing 'aes256-sha2_512' for ESP 260s | proposal: 'aes256-sha2_512' 260s | token: '' '' "aes256" '-' 260s | token: '' "aes256" '-' "sha2_512" '' 260s | ike_alg_byname() failed: ESP encryption algorithm 'aes256' is not recognized 260s | token: '-' "sha2_512" '' '' 260s | appending ESP encryption algorithm AES_CBC[_256] 260s | parsing integ: 260s | appending ESP integrity algorithm HMAC_SHA2_512_256[_0] 260s | token: '' '' '' 260s | parsing 'camellia' for ESP 260s | proposal: 'camellia' 260s | token: '' '' "camellia" '' 260s | token: '' "camellia" '' '' 260s | token: '' '' '' 260s | appending ESP encryption algorithm CAMELLIA_CBC[_0] 260s | appending ESP integrity algorithm HMAC_SHA2_512_256[_0] 260s | appending ESP integrity algorithm HMAC_SHA2_256_128[_0] 260s | parsing 'camellia128' for ESP 260s | proposal: 'camellia128' 260s | token: '' '' "camellia128" '' 260s | token: '' "camellia128" '' '' 260s | ike_alg_byname() failed: ESP encryption algorithm 'camellia128' is not recognized 260s | token: '' '' '' 260s | appending ESP encryption algorithm CAMELLIA_CBC[_128] 260s | appending ESP integrity algorithm HMAC_SHA2_512_256[_0] 260s | appending ESP integrity algorithm HMAC_SHA2_256_128[_0] 260s | parsing 'camellia192' for ESP 260s | proposal: 'camellia192' 260s | token: '' '' "camellia192" '' 260s | token: '' "camellia192" '' '' 260s | ike_alg_byname() failed: ESP encryption algorithm 'camellia192' is not recognized 260s | token: '' '' '' 260s | appending ESP encryption algorithm CAMELLIA_CBC[_192] 260s | appending ESP integrity algorithm HMAC_SHA2_512_256[_0] 260s | appending ESP integrity algorithm HMAC_SHA2_256_128[_0] 260s | parsing 'camellia256' for ESP 260s | proposal: 'camellia256' 260s | token: '' '' "camellia256" '' 260s | token: '' "camellia256" '' '' 260s | ike_alg_byname() failed: ESP encryption algorithm 'camellia256' is not recognized 260s | token: '' '' '' 260s | appending ESP encryption algorithm CAMELLIA_CBC[_256] 260s | appending ESP integrity algorithm HMAC_SHA2_512_256[_0] 260s | appending ESP integrity algorithm HMAC_SHA2_256_128[_0] 260s | parsing 'aes_ccm' for ESP 260s | proposal: 'aes_ccm' 260s | token: '' '' "aes_ccm" '' 260s | token: '' "aes_ccm" '' '' 260s | token: '' '' '' 260s | appending ESP encryption algorithm AES_CCM_16[_0] 260s | appending ESP integrity algorithm NONE[_0] 260s | parsing 'aes_ccm_a-128-null' for ESP 260s | proposal: 'aes_ccm_a-128-null' 260s | token: '' '' "aes_ccm_a" '-' 260s | token: '' "aes_ccm_a" '-' "128" '-' 260s | token: '-' "128" '-' "null" '' 260s | token: '-' "null" '' '' 260s | appending ESP encryption algorithm AES_CCM_8[_128] 260s | parsing integ: 260s | appending ESP integrity algorithm NONE[_0] 260s | token: '' '' '' 260s | parsing 'aes_ccm_a-192-null' for ESP 260s | proposal: 'aes_ccm_a-192-null' 260s | token: '' '' "aes_ccm_a" '-' 260s | token: '' "aes_ccm_a" '-' "192" '-' 260s | token: '-' "192" '-' "null" '' 260s | token: '-' "null" '' '' 260s | appending ESP encryption algorithm AES_CCM_8[_192] 260s | parsing integ: 260s | appending ESP integrity algorithm NONE[_0] 260s | token: '' '' '' 260s | parsing 'aes_ccm_a-256-null' for ESP 260s | proposal: 'aes_ccm_a-256-null' 260s | token: '' '' "aes_ccm_a" '-' 260s | token: '' "aes_ccm_a" '-' "256" '-' 260s | token: '-' "256" '-' "null" '' 260s | token: '-' "null" '' '' 260s | appending ESP encryption algorithm AES_CCM_8[_256] 260s | parsing integ: 260s | appending ESP integrity algorithm NONE[_0] 260s | token: '' '' '' 260s | parsing 'aes_ccm_b-128-null' for ESP 260s | proposal: 'aes_ccm_b-128-null' 260s | token: '' '' "aes_ccm_b" '-' 260s | token: '' "aes_ccm_b" '-' "128" '-' 260s | token: '-' "128" '-' "null" '' 260s | token: '-' "null" '' '' 260s | appending ESP encryption algorithm AES_CCM_12[_128] 260s | parsing integ: 260s | appending ESP integrity algorithm NONE[_0] 260s | token: '' '' '' 260s | parsing 'aes_ccm_b-192-null' for ESP 260s | proposal: 'aes_ccm_b-192-null' 260s | token: '' '' "aes_ccm_b" '-' 260s | token: '' "aes_ccm_b" '-' "192" '-' 260s | token: '-' "192" '-' "null" '' 260s | token: '-' "null" '' '' 260s | appending ESP encryption algorithm AES_CCM_12[_192] 260s | parsing integ: 260s | appending ESP integrity algorithm NONE[_0] 260s | token: '' '' '' 260s | parsing 'aes_ccm_b-256-null' for ESP 260s | proposal: 'aes_ccm_b-256-null' 260s | token: '' '' "aes_ccm_b" '-' 260s | token: '' "aes_ccm_b" '-' "256" '-' 260s | token: '-' "256" '-' "null" '' 260s | token: '-' "null" '' '' 260s | appending ESP encryption algorithm AES_CCM_12[_256] 260s | parsing integ: 260s | appending ESP integrity algorithm NONE[_0] 260s | token: '' '' '' 260s | parsing 'aes_ccm_c-128-null' for ESP 260s | proposal: 'aes_ccm_c-128-null' 260s | token: '' '' "aes_ccm_c" '-' 260s | token: '' "aes_ccm_c" '-' "128" '-' 260s | token: '-' "128" '-' "null" '' 260s | token: '-' "null" '' '' 260s | appending ESP encryption algorithm AES_CCM_16[_128] 260s | parsing integ: 260s | appending ESP integrity algorithm NONE[_0] 260s | token: '' '' '' 260s | parsing 'aes_ccm_c-192-null' for ESP 260s | proposal: 'aes_ccm_c-192-null' 260s | token: '' '' "aes_ccm_c" '-' 260s | token: '' "aes_ccm_c" '-' "192" '-' 260s | token: '-' "192" '-' "null" '' 260s | token: '-' "null" '' '' 260s | appending ESP encryption algorithm AES_CCM_16[_192] 260s | parsing integ: 260s | appending ESP integrity algorithm NONE[_0] 260s | token: '' '' '' 260s | parsing 'aes_ccm_c-256-null' for ESP 260s | proposal: 'aes_ccm_c-256-null' 260s | token: '' '' "aes_ccm_c" '-' 260s | token: '' "aes_ccm_c" '-' "256" '-' 260s | token: '-' "256" '-' "null" '' 260s | token: '-' "null" '' '' 260s | appending ESP encryption algorithm AES_CCM_16[_256] 260s | parsing integ: 260s | appending ESP integrity algorithm NONE[_0] 260s | token: '' '' '' 260s | parsing 'aes_gcm' for ESP 260s | proposal: 'aes_gcm' 260s | token: '' '' "aes_gcm" '' 260s | token: '' "aes_gcm" '' '' 260s | token: '' '' '' 260s | appending ESP encryption algorithm AES_GCM_16[_0] 260s | appending ESP integrity algorithm NONE[_0] 260s | parsing 'aes_gcm_a-128-null' for ESP 260s | proposal: 'aes_gcm_a-128-null' 260s | token: '' '' "aes_gcm_a" '-' 260s | token: '' "aes_gcm_a" '-' "128" '-' 260s | token: '-' "128" '-' "null" '' 260s | token: '-' "null" '' '' 260s | appending ESP encryption algorithm AES_GCM_8[_128] 260s | parsing integ: 260s | appending ESP integrity algorithm NONE[_0] 260s | token: '' '' '' 260s | parsing 'aes_gcm_a-192-null' for ESP 260s | proposal: 'aes_gcm_a-192-null' 260s | token: '' '' "aes_gcm_a" '-' 260s | token: '' "aes_gcm_a" '-' "192" '-' 260s | token: '-' "192" '-' "null" '' 260s | token: '-' "null" '' '' 260s | appending ESP encryption algorithm AES_GCM_8[_192] 260s | parsing integ: 260s | appending ESP integrity algorithm NONE[_0] 260s | token: '' '' '' 260s | parsing 'aes_gcm_a-256-null' for ESP 260s | proposal: 'aes_gcm_a-256-null' 260s | token: '' '' "aes_gcm_a" '-' 260s | token: '' "aes_gcm_a" '-' "256" '-' 260s | token: '-' "256" '-' "null" '' 260s | token: '-' "null" '' '' 260s | appending ESP encryption algorithm AES_GCM_8[_256] 260s | parsing integ: 260s | appending ESP integrity algorithm NONE[_0] 260s | token: '' '' '' 260s | parsing 'aes_gcm_b-128-null' for ESP 260s | proposal: 'aes_gcm_b-128-null' 260s | token: '' '' "aes_gcm_b" '-' 260s | token: '' "aes_gcm_b" '-' "128" '-' 260s | token: '-' "128" '-' "null" '' 260s | token: '-' "null" '' '' 260s | appending ESP encryption algorithm AES_GCM_12[_128] 260s | parsing integ: 260s | appending ESP integrity algorithm NONE[_0] 260s | token: '' '' '' 260s | parsing 'aes_gcm_b-192-null' for ESP 260s | proposal: 'aes_gcm_b-192-null' 260s | token: '' '' "aes_gcm_b" '-' 260s | token: '' "aes_gcm_b" '-' "192" '-' 260s | token: '-' "192" '-' "null" '' 260s | token: '-' "null" '' '' 260s | appending ESP encryption algorithm AES_GCM_12[_192] 260s | parsing integ: 260s | appending ESP integrity algorithm NONE[_0] 260s | token: '' '' '' 260s | parsing 'aes_gcm_b-256-null' for ESP 260s | proposal: 'aes_gcm_b-256-null' 260s | token: '' '' "aes_gcm_b" '-' 260s | token: '' "aes_gcm_b" '-' "256" '-' 260s | token: '-' "256" '-' "null" '' 260s | token: '-' "null" '' '' 260s | appending ESP encryption algorithm AES_GCM_12[_256] 260s | parsing integ: 260s | appending ESP integrity algorithm NONE[_0] 260s | token: '' '' '' 260s | parsing 'aes_gcm_c-128-null' for ESP 260s | proposal: 'aes_gcm_c-128-null' 260s | token: '' '' "aes_gcm_c" '-' 260s | token: '' "aes_gcm_c" '-' "128" '-' 260s | token: '-' "128" '-' "null" '' 260s | token: '-' "null" '' '' 260s | appending ESP encryption algorithm AES_GCM_16[_128] 260s | parsing integ: 260s | appending ESP integrity algorithm NONE[_0] 260s | token: '' '' '' 260s | parsing 'aes_gcm_c-192-null' for ESP 260s | proposal: 'aes_gcm_c-192-null' 260s | token: '' '' "aes_gcm_c" '-' 260s | token: '' "aes_gcm_c" '-' "192" '-' 260s | token: '-' "192" '-' "null" '' 260s | token: '-' "null" '' '' 260s | appending ESP encryption algorithm AES_GCM_16[_192] 260s | parsing integ: 260s | appending ESP integrity algorithm NONE[_0] 260s | token: '' '' '' 260s | parsing 'aes_gcm_c-256-null' for ESP 260s | proposal: 'aes_gcm_c-256-null' 260s | token: '' '' "aes_gcm_c" '-' 260s | token: '' "aes_gcm_c" '-' "256" '-' 260s | token: '-' "256" '-' "null" '' 260s | token: '-' "null" '' '' 260s | appending ESP encryption algorithm AES_GCM_16[_256] 260s | parsing integ: 260s | appending ESP integrity algorithm NONE[_0] 260s | token: '' '' '' 260s | parsing 'aes_ccm_a-null' for ESP 260s | proposal: 'aes_ccm_a-null' 260s | token: '' '' "aes_ccm_a" '-' 260s | token: '' "aes_ccm_a" '-' "null" '' 260s | token: '-' "null" '' '' 260s | appending ESP encryption algorithm AES_CCM_8[_0] 260s | parsing integ: 260s | appending ESP integrity algorithm NONE[_0] 260s | token: '' '' '' 260s | parsing 'aes_ccm_b-null' for ESP 260s | proposal: 'aes_ccm_b-null' 260s | token: '' '' "aes_ccm_b" '-' 260s | token: '' "aes_ccm_b" '-' "null" '' 260s | token: '-' "null" '' '' 260s | appending ESP encryption algorithm AES_CCM_12[_0] 260s | parsing integ: 260s | appending ESP integrity algorithm NONE[_0] 260s | token: '' '' '' 260s | parsing 'aes_ccm_c-null' for ESP 260s | proposal: 'aes_ccm_c-null' 260s | token: '' '' "aes_ccm_c" '-' 260s | token: '' "aes_ccm_c" '-' "null" '' 260s | token: '-' "null" '' '' 260s | appending ESP encryption algorithm AES_CCM_16[_0] 260s | parsing integ: 260s | appending ESP integrity algorithm NONE[_0] 260s | token: '' '' '' 260s | parsing 'aes_gcm_a-null' for ESP 260s | proposal: 'aes_gcm_a-null' 260s | token: '' '' "aes_gcm_a" '-' 260s | token: '' "aes_gcm_a" '-' "null" '' 260s | token: '-' "null" '' '' 260s | appending ESP encryption algorithm AES_GCM_8[_0] 260s | parsing integ: 260s | appending ESP integrity algorithm NONE[_0] 260s | token: '' '' '' 260s | parsing 'aes_gcm_b-null' for ESP 260s | proposal: 'aes_gcm_b-null' 260s | token: '' '' "aes_gcm_b" '-' 260s | token: '' "aes_gcm_b" '-' "null" '' 260s | token: '-' "null" '' '' 260s | appending ESP encryption algorithm AES_GCM_12[_0] 260s | parsing integ: 260s | appending ESP integrity algorithm NONE[_0] 260s | token: '' '' '' 260s | parsing 'aes_gcm_c-null' for ESP 260s | proposal: 'aes_gcm_c-null' 260s | token: '' '' "aes_gcm_c" '-' 260s | token: '' "aes_gcm_c" '-' "null" '' 260s | token: '-' "null" '' '' 260s | appending ESP encryption algorithm AES_GCM_16[_0] 260s | parsing integ: 260s | appending ESP integrity algorithm NONE[_0] 260s | token: '' '' '' 260s | parsing 'aes_ccm-null' for ESP 260s | proposal: 'aes_ccm-null' 260s | token: '' '' "aes_ccm" '-' 260s | token: '' "aes_ccm" '-' "null" '' 260s | token: '-' "null" '' '' 260s | appending ESP encryption algorithm AES_CCM_16[_0] 260s | parsing integ: 260s | appending ESP integrity algorithm NONE[_0] 260s | token: '' '' '' 260s | parsing 'aes_gcm-null' for ESP 260s | proposal: 'aes_gcm-null' 260s | token: '' '' "aes_gcm" '-' 260s | token: '' "aes_gcm" '-' "null" '' 260s | token: '-' "null" '' '' 260s | appending ESP encryption algorithm AES_GCM_16[_0] 260s | parsing integ: 260s | appending ESP integrity algorithm NONE[_0] 260s | token: '' '' '' 260s | parsing 'aes_ccm-256-null' for ESP 260s | proposal: 'aes_ccm-256-null' 260s | token: '' '' "aes_ccm" '-' 260s | token: '' "aes_ccm" '-' "256" '-' 260s | token: '-' "256" '-' "null" '' 260s | token: '-' "null" '' '' 260s | appending ESP encryption algorithm AES_CCM_16[_256] 260s | parsing integ: 260s | appending ESP integrity algorithm NONE[_0] 260s | token: '' '' '' 260s | parsing 'aes_gcm-192-null' for ESP 260s | proposal: 'aes_gcm-192-null' 260s | token: '' '' "aes_gcm" '-' 260s | token: '' "aes_gcm" '-' "192" '-' 260s | token: '-' "192" '-' "null" '' 260s | token: '-' "null" '' '' 260s | appending ESP encryption algorithm AES_GCM_16[_192] 260s | parsing integ: 260s | appending ESP integrity algorithm NONE[_0] 260s | token: '' '' '' 260s | parsing 'aes_ccm_256-null' for ESP 260s | proposal: 'aes_ccm_256-null' 260s | token: '' '' "aes_ccm_256" '-' 260s | token: '' "aes_ccm_256" '-' "null" '' 260s | ike_alg_byname() failed: ESP encryption algorithm 'aes_ccm_256' is not recognized 260s | token: '-' "null" '' '' 260s | appending ESP encryption algorithm AES_CCM_16[_256] 260s | parsing integ: 260s | appending ESP integrity algorithm NONE[_0] 260s | token: '' '' '' 260s | parsing 'aes_gcm_192-null' for ESP 260s | proposal: 'aes_gcm_192-null' 260s | token: '' '' "aes_gcm_192" '-' 260s | token: '' "aes_gcm_192" '-' "null" '' 260s | ike_alg_byname() failed: ESP encryption algorithm 'aes_gcm_192' is not recognized 260s | token: '-' "null" '' '' 260s | appending ESP encryption algorithm AES_GCM_16[_192] 260s | parsing integ: 260s | appending ESP integrity algorithm NONE[_0] 260s | token: '' '' '' 260s | parsing 'aes_ccm_8-null' for ESP 260s | proposal: 'aes_ccm_8-null' 260s | token: '' '' "aes_ccm_8" '-' 260s | token: '' "aes_ccm_8" '-' "null" '' 260s | token: '-' "null" '' '' 260s | appending ESP encryption algorithm AES_CCM_8[_0] 260s | parsing integ: 260s | appending ESP integrity algorithm NONE[_0] 260s | token: '' '' '' 260s | parsing 'aes_ccm_12-null' for ESP 260s | proposal: 'aes_ccm_12-null' 260s | token: '' '' "aes_ccm_12" '-' 260s | token: '' "aes_ccm_12" '-' "null" '' 260s | token: '-' "null" '' '' 260s | appending ESP encryption algorithm AES_CCM_12[_0] 260s | parsing integ: 260s | appending ESP integrity algorithm NONE[_0] 260s | token: '' '' '' 260s | parsing 'aes_ccm_16-null' for ESP 260s | proposal: 'aes_ccm_16-null' 260s | token: '' '' "aes_ccm_16" '-' 260s | token: '' "aes_ccm_16" '-' "null" '' 260s | token: '-' "null" '' '' 260s | appending ESP encryption algorithm AES_CCM_16[_0] 260s | parsing integ: 260s | appending ESP integrity algorithm NONE[_0] 260s | token: '' '' '' 260s | parsing 'aes_gcm_8-null' for ESP 260s | proposal: 'aes_gcm_8-null' 260s | token: '' '' "aes_gcm_8" '-' 260s | token: '' "aes_gcm_8" '-' "null" '' 260s | token: '-' "null" '' '' 260s | appending ESP encryption algorithm AES_GCM_8[_0] 260s | parsing integ: 260s | appending ESP integrity algorithm NONE[_0] 260s | token: '' '' '' 260s | parsing 'aes_gcm_12-null' for ESP 260s | proposal: 'aes_gcm_12-null' 260s | token: '' '' "aes_gcm_12" '-' 260s | token: '' "aes_gcm_12" '-' "null" '' 260s | token: '-' "null" '' '' 260s | appending ESP encryption algorithm AES_GCM_12[_0] 260s | parsing integ: 260s | appending ESP integrity algorithm NONE[_0] 260s | token: '' '' '' 260s | parsing 'aes_gcm_16-null' for ESP 260s | proposal: 'aes_gcm_16-null' 260s | token: '' '' "aes_gcm_16" '-' 260s | token: '' "aes_gcm_16" '-' "null" '' 260s | token: '-' "null" '' '' 260s | appending ESP encryption algorithm AES_GCM_16[_0] 260s | parsing integ: 260s | appending ESP integrity algorithm NONE[_0] 260s | token: '' '' '' 260s | parsing 'aes_ccm_8-128-null' for ESP 260s | proposal: 'aes_ccm_8-128-null' 260s | token: '' '' "aes_ccm_8" '-' 260s | token: '' "aes_ccm_8" '-' "128" '-' 260s | token: '-' "128" '-' "null" '' 260s | token: '-' "null" '' '' 260s | appending ESP encryption algorithm AES_CCM_8[_128] 260s | parsing integ: 260s | appending ESP integrity algorithm NONE[_0] 260s | token: '' '' '' 260s | parsing 'aes_ccm_12-192-null' for ESP 260s | proposal: 'aes_ccm_12-192-null' 260s | token: '' '' "aes_ccm_12" '-' 260s | token: '' "aes_ccm_12" '-' "192" '-' 260s | token: '-' "192" '-' "null" '' 260s | token: '-' "null" '' '' 260s | appending ESP encryption algorithm AES_CCM_12[_192] 260s | parsing integ: 260s | appending ESP integrity algorithm NONE[_0] 260s | token: '' '' '' 260s | parsing 'aes_ccm_16-256-null' for ESP 260s | proposal: 'aes_ccm_16-256-null' 260s | token: '' '' "aes_ccm_16" '-' 260s | token: '' "aes_ccm_16" '-' "256" '-' 260s | token: '-' "256" '-' "null" '' 260s | token: '-' "null" '' '' 260s | appending ESP encryption algorithm AES_CCM_16[_256] 260s | parsing integ: 260s | appending ESP integrity algorithm NONE[_0] 260s | token: '' '' '' 260s | parsing 'aes_gcm_8-128-null' for ESP 260s | proposal: 'aes_gcm_8-128-null' 260s | token: '' '' "aes_gcm_8" '-' 260s | token: '' "aes_gcm_8" '-' "128" '-' 260s | token: '-' "128" '-' "null" '' 260s | token: '-' "null" '' '' 260s | appending ESP encryption algorithm AES_GCM_8[_128] 260s | parsing integ: 260s | appending ESP integrity algorithm NONE[_0] 260s | token: '' '' '' 260s | parsing 'aes_gcm_12-192-null' for ESP 260s | proposal: 'aes_gcm_12-192-null' 260s | token: '' '' "aes_gcm_12" '-' 260s | token: '' "aes_gcm_12" '-' "192" '-' 260s | token: '-' "192" '-' "null" '' 260s | token: '-' "null" '' '' 260s | appending ESP encryption algorithm AES_GCM_12[_192] 260s | parsing integ: 260s | appending ESP integrity algorithm NONE[_0] 260s | token: '' '' '' 260s | parsing 'aes_gcm_16-256-null' for ESP 260s | proposal: 'aes_gcm_16-256-null' 260s | token: '' '' "aes_gcm_16" '-' 260s | token: '' "aes_gcm_16" '-' "256" '-' 260s | token: '-' "256" '-' "null" '' 260s | token: '-' "null" '' '' 260s | appending ESP encryption algorithm AES_GCM_16[_256] 260s | parsing integ: 260s | appending ESP integrity algorithm NONE[_0] 260s | token: '' '' '' 260s | parsing 'aes_ccm_8_128-null' for ESP 260s | proposal: 'aes_ccm_8_128-null' 260s | token: '' '' "aes_ccm_8_128" '-' 260s | token: '' "aes_ccm_8_128" '-' "null" '' 260s | ike_alg_byname() failed: ESP encryption algorithm 'aes_ccm_8_128' is not recognized 260s | token: '-' "null" '' '' 260s | appending ESP encryption algorithm AES_CCM_8[_128] 260s | parsing integ: 260s | appending ESP integrity algorithm NONE[_0] 260s | token: '' '' '' 260s | parsing 'aes_ccm_12_192-null' for ESP 260s | proposal: 'aes_ccm_12_192-null' 260s | token: '' '' "aes_ccm_12_192" '-' 260s | token: '' "aes_ccm_12_192" '-' "null" '' 260s | ike_alg_byname() failed: ESP encryption algorithm 'aes_ccm_12_192' is not recognized 260s | token: '-' "null" '' '' 260s | appending ESP encryption algorithm AES_CCM_12[_192] 260s | parsing integ: 260s | appending ESP integrity algorithm NONE[_0] 260s | token: '' '' '' 260s | parsing 'aes_ccm_16_256-null' for ESP 260s | proposal: 'aes_ccm_16_256-null' 260s | token: '' '' "aes_ccm_16_256" '-' 260s | token: '' "aes_ccm_16_256" '-' "null" '' 260s | ike_alg_byname() failed: ESP encryption algorithm 'aes_ccm_16_256' is not recognized 260s | token: '-' "null" '' '' 260s | appending ESP encryption algorithm AES_CCM_16[_256] 260s | parsing integ: 260s | appending ESP integrity algorithm NONE[_0] 260s | token: '' '' '' 260s | parsing 'aes_gcm_8_128-null' for ESP 260s | proposal: 'aes_gcm_8_128-null' 260s | token: '' '' "aes_gcm_8_128" '-' 260s | token: '' "aes_gcm_8_128" '-' "null" '' 260s | ike_alg_byname() failed: ESP encryption algorithm 'aes_gcm_8_128' is not recognized 260s | token: '-' "null" '' '' 260s | appending ESP encryption algorithm AES_GCM_8[_128] 260s | parsing integ: 260s | appending ESP integrity algorithm NONE[_0] 260s | token: '' '' '' 260s | parsing 'aes_gcm_12_192-null' for ESP 260s | proposal: 'aes_gcm_12_192-null' 260s | token: '' '' "aes_gcm_12_192" '-' 260s | token: '' "aes_gcm_12_192" '-' "null" '' 260s | ike_alg_byname() failed: ESP encryption algorithm 'aes_gcm_12_192' is not recognized 260s | token: '-' "null" '' '' 260s | appending ESP encryption algorithm AES_GCM_12[_192] 260s | parsing integ: 260s | appending ESP integrity algorithm NONE[_0] 260s | token: '' '' '' 260s | parsing 'aes_gcm_16_256-null' for ESP 260s | proposal: 'aes_gcm_16_256-null' 260s | token: '' '' "aes_gcm_16_256" '-' 260s | token: '' "aes_gcm_16_256" '-' "null" '' 260s | ike_alg_byname() failed: ESP encryption algorithm 'aes_gcm_16_256' is not recognized 260s | token: '-' "null" '' '' 260s | appending ESP encryption algorithm AES_GCM_16[_256] 260s | parsing integ: 260s | appending ESP integrity algorithm NONE[_0] 260s | token: '' '' '' 260s | parsing 'aes_ctr' for ESP 260s | proposal: 'aes_ctr' 260s | token: '' '' "aes_ctr" '' 260s | token: '' "aes_ctr" '' '' 260s | token: '' '' '' 260s | appending ESP encryption algorithm AES_CTR[_0] 260s | appending ESP integrity algorithm HMAC_SHA2_512_256[_0] 260s | appending ESP integrity algorithm HMAC_SHA2_256_128[_0] 260s | parsing 'aesctr' for ESP 260s | proposal: 'aesctr' 260s | token: '' '' "aesctr" '' 260s | token: '' "aesctr" '' '' 260s | token: '' '' '' 260s | appending ESP encryption algorithm AES_CTR[_0] 260s | appending ESP integrity algorithm HMAC_SHA2_512_256[_0] 260s | appending ESP integrity algorithm HMAC_SHA2_256_128[_0] 260s | parsing 'aes_ctr128' for ESP 260s | proposal: 'aes_ctr128' 260s | token: '' '' "aes_ctr128" '' 260s | token: '' "aes_ctr128" '' '' 260s | ike_alg_byname() failed: ESP encryption algorithm 'aes_ctr128' is not recognized 260s | token: '' '' '' 260s | appending ESP encryption algorithm AES_CTR[_128] 260s | appending ESP integrity algorithm HMAC_SHA2_512_256[_0] 260s | appending ESP integrity algorithm HMAC_SHA2_256_128[_0] 260s | parsing 'aes_ctr192' for ESP 260s | proposal: 'aes_ctr192' 260s | token: '' '' "aes_ctr192" '' 260s | token: '' "aes_ctr192" '' '' 260s | ike_alg_byname() failed: ESP encryption algorithm 'aes_ctr192' is not recognized 260s | token: '' '' '' 260s | appending ESP encryption algorithm AES_CTR[_192] 260s | appending ESP integrity algorithm HMAC_SHA2_512_256[_0] 260s | appending ESP integrity algorithm HMAC_SHA2_256_128[_0] 260s | parsing 'aes_ctr256' for ESP 260s | proposal: 'aes_ctr256' 260s | token: '' '' "aes_ctr256" '' 260s | token: '' "aes_ctr256" '' '' 260s | ike_alg_byname() failed: ESP encryption algorithm 'aes_ctr256' is not recognized 260s | token: '' '' '' 260s | appending ESP encryption algorithm AES_CTR[_256] 260s | appending ESP integrity algorithm HMAC_SHA2_512_256[_0] 260s | appending ESP integrity algorithm HMAC_SHA2_256_128[_0] 260s | parsing 'camellia_cbc_256-hmac_sha2_512_256;modp8192' for ESP 260s | proposal: 'camellia_cbc_256-hmac_sha2_512_256;modp8192' 260s | token: '' '' "camellia_cbc_256" '-' 260s | token: '' "camellia_cbc_256" '-' "hmac_sha2_512_256" ';' 260s | ike_alg_byname() failed: ESP encryption algorithm 'camellia_cbc_256' is not recognized 260s | token: '-' "hmac_sha2_512_256" ';' "modp8192" '' 260s | appending ESP encryption algorithm CAMELLIA_CBC[_256] 260s | parsing integ: 260s | appending ESP integrity algorithm HMAC_SHA2_512_256[_0] 260s | token: ';' "modp8192" '' '' 260s | parsing dh: 260s | appending ESP DH algorithm MODP8192[_0] 260s | token: '' '' '' 260s ipsec algparse: ignoring ESP DH algorithm MODP8192 as PFS policy is disabled 260s | parsing 'null_auth_aes_gmac_256-null;modp8192' for ESP 260s | proposal: 'null_auth_aes_gmac_256-null;modp8192' 260s | token: '' '' "null_auth_aes_gmac_256" '-' 260s | token: '' "null_auth_aes_gmac_256" '-' "null" ';' 260s | ike_alg_byname() failed: ESP encryption algorithm 'null_auth_aes_gmac_256' is not recognized 260s | token: '-' "null" ';' "modp8192" '' 260s | appending ESP encryption algorithm NULL_AUTH_AES_GMAC[_256] 260s | parsing integ: 260s | appending ESP integrity algorithm NONE[_0] 260s | token: ';' "modp8192" '' '' 260s | parsing dh: 260s | appending ESP DH algorithm MODP8192[_0] 260s | token: '' '' '' 260s ipsec algparse: ignoring ESP DH algorithm MODP8192 as PFS policy is disabled 260s | parsing '3des-sha1;modp8192' for ESP 260s | proposal: '3des-sha1;modp8192' 260s | token: '' '' "3des" '-' 260s | token: '' "3des" '-' "sha1" ';' 260s | token: '-' "sha1" ';' "modp8192" '' 260s | appending ESP encryption algorithm 3DES_CBC[_0] 260s | parsing integ: 260s | appending ESP integrity algorithm HMAC_SHA1_96[_0] 260s | token: ';' "modp8192" '' '' 260s | parsing dh: 260s | appending ESP DH algorithm MODP8192[_0] 260s | token: '' '' '' 260s ipsec algparse: ignoring ESP DH algorithm MODP8192 as PFS policy is disabled 260s | parsing '3des-sha1-modp8192' for ESP 260s | proposal: '3des-sha1-modp8192' 260s | token: '' '' "3des" '-' 260s | token: '' "3des" '-' "sha1" '-' 260s | token: '-' "sha1" '-' "modp8192" '' 260s | appending ESP encryption algorithm 3DES_CBC[_0] 260s | parsing integ: 260s | appending ESP integrity algorithm HMAC_SHA1_96[_0] 260s | token: '-' "modp8192" '' '' 260s | parsing dh: 260s | appending ESP DH algorithm MODP8192[_0] 260s | token: '' '' '' 260s ipsec algparse: ignoring ESP DH algorithm MODP8192 as PFS policy is disabled 260s | parsing 'aes-sha1,3des-sha1;modp8192' for ESP 260s | proposal: 'aes-sha1' 260s | token: '' '' "aes" '-' 260s | token: '' "aes" '-' "sha1" '' 260s | token: '-' "sha1" '' '' 260s | appending ESP encryption algorithm AES_CBC[_0] 260s | parsing integ: 260s | appending ESP integrity algorithm HMAC_SHA1_96[_0] 260s | token: '' '' '' 260s | proposal: '3des-sha1;modp8192' 260s | token: '' '' "3des" '-' 260s | token: '' "3des" '-' "sha1" ';' 260s | token: '-' "sha1" ';' "modp8192" '' 260s | appending ESP encryption algorithm 3DES_CBC[_0] 260s | parsing integ: 260s | appending ESP integrity algorithm HMAC_SHA1_96[_0] 260s | token: ';' "modp8192" '' '' 260s | parsing dh: 260s | appending ESP DH algorithm MODP8192[_0] 260s | token: '' '' '' 260s ipsec algparse: ignoring ESP DH algorithm MODP8192 as PFS policy is disabled 260s AES_CCM_16_256-NONE 260s algparse -v2 'esp=aes_gcm-192-null' (expect SUCCESS) 260s AES_GCM_16_192-NONE 260s algparse -v2 'esp=aes_ccm_256-null' (expect SUCCESS) 260s AES_CCM_16_256-NONE 260s algparse -v2 'esp=aes_gcm_192-null' (expect SUCCESS) 260s AES_GCM_16_192-NONE 260s algparse -v2 'esp=aes_ccm_8-null' (expect SUCCESS) 260s AES_CCM_8-NONE 260s algparse -v2 'esp=aes_ccm_12-null' (expect SUCCESS) 260s AES_CCM_12-NONE 260s algparse -v2 'esp=aes_ccm_16-null' (expect SUCCESS) 260s AES_CCM_16-NONE 260s algparse -v2 'esp=aes_gcm_8-null' (expect SUCCESS) 260s AES_GCM_8-NONE 260s algparse -v2 'esp=aes_gcm_12-null' (expect SUCCESS) 260s AES_GCM_12-NONE 260s algparse -v2 'esp=aes_gcm_16-null' (expect SUCCESS) 260s AES_GCM_16-NONE 260s algparse -v2 'esp=aes_ccm_8-128-null' (expect SUCCESS) 260s AES_CCM_8_128-NONE 260s algparse -v2 'esp=aes_ccm_12-192-null' (expect SUCCESS) 260s AES_CCM_12_192-NONE 260s algparse -v2 'esp=aes_ccm_16-256-null' (expect SUCCESS) 260s AES_CCM_16_256-NONE 260s algparse -v2 'esp=aes_gcm_8-128-null' (expect SUCCESS) 260s AES_GCM_8_128-NONE 260s algparse -v2 'esp=aes_gcm_12-192-null' (expect SUCCESS) 260s AES_GCM_12_192-NONE 260s algparse -v2 'esp=aes_gcm_16-256-null' (expect SUCCESS) 260s AES_GCM_16_256-NONE 260s algparse -v2 'esp=aes_ccm_8_128-null' (expect SUCCESS) 260s AES_CCM_8_128-NONE 260s algparse -v2 'esp=aes_ccm_12_192-null' (expect SUCCESS) 260s AES_CCM_12_192-NONE 260s algparse -v2 'esp=aes_ccm_16_256-null' (expect SUCCESS) 260s AES_CCM_16_256-NONE 260s algparse -v2 'esp=aes_gcm_8_128-null' (expect SUCCESS) 260s AES_GCM_8_128-NONE 260s algparse -v2 'esp=aes_gcm_12_192-null' (expect SUCCESS) 260s AES_GCM_12_192-NONE 260s algparse -v2 'esp=aes_gcm_16_256-null' (expect SUCCESS) 260s AES_GCM_16_256-NONE 260s algparse -v2 'esp=aes_ctr' (expect SUCCESS) 260s AES_CTR-HMAC_SHA2_512_256+HMAC_SHA2_256_128 260s algparse -v2 'esp=aesctr' (expect SUCCESS) 260s AES_CTR-HMAC_SHA2_512_256+HMAC_SHA2_256_128 260s algparse -v2 'esp=aes_ctr128' (expect SUCCESS) 260s AES_CTR_128-HMAC_SHA2_512_256+HMAC_SHA2_256_128 260s algparse -v2 'esp=aes_ctr192' (expect SUCCESS) 260s AES_CTR_192-HMAC_SHA2_512_256+HMAC_SHA2_256_128 260s algparse -v2 'esp=aes_ctr256' (expect SUCCESS) 260s AES_CTR_256-HMAC_SHA2_512_256+HMAC_SHA2_256_128 260s algparse -v2 'esp=camellia_cbc_256-hmac_sha2_512_256;modp8192' (expect SUCCESS) 260s CAMELLIA_CBC_256-HMAC_SHA2_512_256 260s algparse -v2 'esp=null_auth_aes_gmac_256-null;modp8192' (expect SUCCESS) 260s NULL_AUTH_AES_GMAC_256-NONE 260s algparse -v2 'esp=3des-sha1;modp8192' (expect SUCCESS) 260s 3DES_CBC-HMAC_SHA1_96 260s algparse -v2 'esp=3des-sha1-modp8192' (expect SUCCESS) 260s 3DES_CBC-HMAC_SHA1_96 260s algparse -v2 'esp=aes-sha1,3des-sha1;modp8192' (expect SUCCESS) 260s AES_CBC-HMAC_SHA1_96 260s 3DES_CBC-HMAC_SHA1_96 260s algparse -v2 'esp=aes-sha1-modp8192,3des-sha1-modp8192' (expect SUCCESS) 260s AES_CBC-HMAC_SHA1_96 260s 3DES_CBC-HMAC_SHA1_96 260s algparse -v2 'esp=aes-sha1-modp8192,aes-sha1-modp8192,aes-sha1-modp8192' (expect SUCCESS) 260s AES_CBC-HMAC_SHA1_96 260s algparse -v2 'esp=aes;none' (expect SUCCESS) 260s AES_CBC-HMAC_SHA2_512_256+HMAC_SHA2_256_128 260s algparse -v2 'esp=aes;none,aes' (expect SUCCESS) 260s AES_CBC-HMAC_SHA2_512_256+HMAC_SHA2_256_128 260s AES_CBC-HMAC_SHA2_512_256+HMAC_SHA2_256_128 260s algparse -v2 'esp=aes;none,aes;modp2048' (expect SUCCESS) 260s AES_CBC-HMAC_SHA2_512_256+HMAC_SHA2_256_128 260s AES_CBC-HMAC_SHA2_512_256+HMAC_SHA2_256_128 260s algparse -v2 'esp=aes-sha1-none' (expect SUCCESS) 260s AES_CBC-HMAC_SHA1_96 260s algparse -v2 'esp=aes-sha1;none' (expect SUCCESS) 260s AES_CBC-HMAC_SHA1_96 260s algparse -v2 'esp=3des168-sha1' (expect ERROR) 260s ERROR: ESP encryption algorithm 3DES_CBC does not allow a key lengths 260s algparse -v2 'esp=3des-null' (expect ERROR) 260s ERROR: non-AEAD ESP encryption algorithm 3DES_CBC cannot have 'NONE' as the integrity algorithm 260s algparse -v2 'esp=aes128-null' (expect ERROR) 260s ERROR: non-AEAD ESP encryption algorithm AES_CBC cannot have 'NONE' as the integrity algorithm 260s algparse -v2 'esp=aes224-sha1' (expect ERROR) 260s ERROR: ESP encryption algorithm AES_CBC with key length 224 invalid; valid key lengths: 128, 192, 256 260s algparse -v2 'esp=aes-224-sha1' (expect ERROR) 260s ERROR: ESP encryption algorithm AES_CBC with key length 224 invalid; valid key lengths: 128, 192, 256 260s algparse -v2 'esp=aes0-sha1' (expect ERROR) 260s ERROR: ESP encryption key length is zero 260s algparse -v2 'esp=aes-0-sha1' (expect ERROR) 260s ERROR: ESP encryption key length is zero 260s algparse -v2 'esp=aes512-sha1' (expect ERROR) 260s ERROR: ESP encryption algorithm AES_CBC with key length 512 invalid; valid key lengths: 128, 192, 256 260s algparse -v2 'esp=aes-sha1555' (expect ERROR) 260s ERROR: ESP integrity algorithm 'sha1555' is not recognized 260s algparse -v2 'esp=camellia666-sha1' (expect ERROR) 260s ERROR: ESP encryption algorithm CAMELLIA_CBC with key length 666 invalid; valid key lengths: 128, 192, 256 260s algparse -v2 'esp=blowfish' (expect ERROR) 260s ERROR: ESP encryption algorithm 'blowfish' is not supported 260s algparse -v2 'esp=des-sha1' (expect ERROR) 260s ERROR: ESP encryption algorithm 'des' is not supported 260s algparse -v2 'esp=aes_ctr666' (expect ERROR) 260s ERROR: ESP encryption algorithm AES_CTR with key length 666 invalid; valid key lengths: 128, 192, 256 260s algparse -v2 'esp=aes128-sha2_128' (expect ERROR) 260s ERROR: ESP integrity algorithm 'sha2_128' is not recognized 260s algparse -v2 'esp=aes256-sha2_256-4096' (expect ERROR) 260s ERROR: ESP DH algorithm '4096' is not recognized 260s algparse -v2 'esp=aes256-sha2_256-128' (expect ERROR) 260s ERROR: ESP DH algorithm '128' is not recognized 260s algparse -v2 'esp=vanitycipher' (expect ERROR) 260s ERROR: ESP encryption algorithm 'vanitycipher' is not recognized 260s algparse -v2 'esp=ase-sah' (expect ERROR) 260s ERROR: ESP encryption algorithm 'ase' is not recognized 260s algparse -v2 'esp=aes-sah1' (expect ERROR) 260s ERROR: ESP integrity algorithm 'sah1' is not recognized 260s algparse -v2 'esp=id3' (expect ERROR) 260s ERROR: ESP encryption algorithm 'id3' is not recognized 260s algparse -v2 'esp=aes-id3' (expect ERROR) 260s ERROR: ESP integrity algorithm 'id3' is not recognized 260s algparse -v2 'esp=aes_gcm-md5' (expect ERROR) 260s ERROR: AEAD ESP encryption algorithm AES_GCM_16 must have 'NONE' as the integrity algorithm 260s algparse -v2 'esp=mars' (expect ERROR) 260s ERROR: ESP encryption algorithm 'mars' is not supported 260s algparse -v2 'esp=aes_gcm-16' (expect ERROR) 260s ERROR: ESP encryption algorithm AES_GCM_16 with key length 16 invalid; valid key lengths: 128, 192, 256 260s algparse -v2 'esp=aes_gcm-0' (expect ERROR) 260s ERROR: ESP encryption key length is zero 260s algparse -v2 'esp=aes_gcm-123456789012345' (expect ERROR) 260s ERROR: ESP encryption algorithm 'aes_gcm-123456789012345' key length WAY too big 260s algparse -v2 'esp=3des-sha1;dh22' (expect ERROR) 260s ERROR: ESP DH algorithm 'dh22' is not supported 260s algparse -v2 'esp=3des-sha1;modp8192,3des-sha2' (expect SUCCESS) 260s 3DES_CBC-HMAC_SHA1_96 260s 3DES_CBC-HMAC_SHA2_256_128 260s algparse -v2 'esp=3des-sha1-modp8192,3des-sha2' (expect SUCCESS) 260s 3DES_CBC-HMAC_SHA1_96 260s 3DES_CBC-HMAC_SHA2_256_128 260s algparse -v2 'esp=3des-sha1-modp8192,3des-sha2-modp8192' (expect SUCCESS) 260s 3DES_CBC-HMAC_SHA1_96 260s 3DES_CBC-HMAC_SHA2_256_128 260s algparse -v2 'esp=3des-sha1-modp8192,3des-sha2;modp8192' (expect SUCCESS) 260s 3DES_CBC-HMAC_SHA1_96 260s 3DES_CBC-HMAC_SHA2_256_128 260s algparse -v2 'esp=3des-sha1;modp8192,3des-sha2-modp8192' (expect SUCCESS) 260s 3DES_CBC-HMAC_SHA1_96 260s 3DES_CBC-HMAC_SHA2_256_128 260s algparse -v2 'esp=3des-sha1;modp8192,3des-sha2;modp8192' (expect SUCCESS) 260s 3DES_CBC-HMAC_SHA1_96 260s 3DES_CBC-HMAC_SHA2_256_128 260s algparse -v2 'esp=3des-sha1-modp8192,3des-sha2-modp2048' (expect SUCCESS) 260s 3DES_CBC-HMAC_SHA1_96 260s 3DES_CBC-HMAC_SHA2_256_128 260s algparse -v2 'ah' (expect SUCCESS) 260s HMAC_SHA2_512_256 260s HMAC_SHA2_256_128 260s algparse -v2 'ah=' (expect ERROR) 260s ERROR: AH proposal is empty 260s algparse -v2 'ah=md5' (expect SUCCESS) 260s HMAC_MD5_96 260s algparse -v2 'ah=sha' (expect SUCCESS) 260s HMAC_SHA1_96 260s algparse -v2 'ah=sha;modp2048' (expect SUCCESS) 260s HMAC_SHA1_96 260s algparse -v2 'ah=sha1' (expect SUCCESS) 260s HMAC_SHA1_96 260s algparse -v2 'ah=sha2' (expect SUCCESS) 260s HMAC_SHA2_256_128 260s algparse -v2 'ah=sha256' (expect SUCCESS) 260s HMAC_SHA2_256_128 260s | parsing 'aes-sha1-modp8192,3des-sha1-modp8192' for ESP 260s | proposal: 'aes-sha1-modp8192' 260s | token: '' '' "aes" '-' 260s | token: '' "aes" '-' "sha1" '-' 260s | token: '-' "sha1" '-' "modp8192" '' 260s | appending ESP encryption algorithm AES_CBC[_0] 260s | parsing integ: 260s | appending ESP integrity algorithm HMAC_SHA1_96[_0] 260s | token: '-' "modp8192" '' '' 260s | parsing dh: 260s | appending ESP DH algorithm MODP8192[_0] 260s | token: '' '' '' 260s | proposal: '3des-sha1-modp8192' 260s | token: '' '' "3des" '-' 260s | token: '' "3des" '-' "sha1" '-' 260s | token: '-' "sha1" '-' "modp8192" '' 260s | appending ESP encryption algorithm 3DES_CBC[_0] 260s | parsing integ: 260s | appending ESP integrity algorithm HMAC_SHA1_96[_0] 260s | token: '-' "modp8192" '' '' 260s | parsing dh: 260s | appending ESP DH algorithm MODP8192[_0] 260s | token: '' '' '' 260s ipsec algparse: ignoring ESP DH algorithm MODP8192 as PFS policy is disabled 260s ipsec algparse: ignoring ESP DH algorithm MODP8192 as PFS policy is disabled 260s | parsing 'aes-sha1-modp8192,aes-sha1-modp8192,aes-sha1-modp8192' for ESP 260s | proposal: 'aes-sha1-modp8192' 260s | token: '' '' "aes" '-' 260s | token: '' "aes" '-' "sha1" '-' 260s | token: '-' "sha1" '-' "modp8192" '' 260s | appending ESP encryption algorithm AES_CBC[_0] 260s | parsing integ: 260s | appending ESP integrity algorithm HMAC_SHA1_96[_0] 260s | token: '-' "modp8192" '' '' 260s | parsing dh: 260s | appending ESP DH algorithm MODP8192[_0] 260s | token: '' '' '' 260s | proposal: 'aes-sha1-modp8192' 260s | token: '' '' "aes" '-' 260s | token: '' "aes" '-' "sha1" '-' 260s | token: '-' "sha1" '-' "modp8192" '' 260s | appending ESP encryption algorithm AES_CBC[_0] 260s | parsing integ: 260s | appending ESP integrity algorithm HMAC_SHA1_96[_0] 260s | token: '-' "modp8192" '' '' 260s | parsing dh: 260s | appending ESP DH algorithm MODP8192[_0] 260s | token: '' '' '' 260s | proposal: 'aes-sha1-modp8192' 260s | token: '' '' "aes" '-' 260s | token: '' "aes" '-' "sha1" '-' 260s | token: '-' "sha1" '-' "modp8192" '' 260s | appending ESP encryption algorithm AES_CBC[_0] 260s | parsing integ: 260s | appending ESP integrity algorithm HMAC_SHA1_96[_0] 260s | token: '-' "modp8192" '' '' 260s | parsing dh: 260s | appending ESP DH algorithm MODP8192[_0] 260s | token: '' '' '' 260s ipsec algparse: ignoring ESP DH algorithm MODP8192 as PFS policy is disabled 260s | parsing 'aes;none' for ESP 260s | proposal: 'aes;none' 260s | token: '' '' "aes" ';' 260s | token: '' "aes" ';' "none" '' 260s | token: ';' "none" '' '' 260s | appending ESP encryption algorithm AES_CBC[_0] 260s | parsing dh: 260s | appending ESP DH algorithm NONE[_0] 260s | token: '' '' '' 260s | appending ESP integrity algorithm HMAC_SHA2_512_256[_0] 260s | appending ESP integrity algorithm HMAC_SHA2_256_128[_0] 260s ipsec algparse: ignoring redundant ESP DH algorithm NONE as PFS policy is disabled 260s | parsing 'aes;none,aes' for ESP 260s | proposal: 'aes;none' 260s | token: '' '' "aes" ';' 260s | token: '' "aes" ';' "none" '' 260s | token: ';' "none" '' '' 260s | appending ESP encryption algorithm AES_CBC[_0] 260s | parsing dh: 260s | appending ESP DH algorithm NONE[_0] 260s | token: '' '' '' 260s | appending ESP integrity algorithm HMAC_SHA2_512_256[_0] 260s | appending ESP integrity algorithm HMAC_SHA2_256_128[_0] 260s | proposal: 'aes' 260s | token: '' '' "aes" '' 260s | token: '' "aes" '' '' 260s | token: '' '' '' 260s | appending ESP encryption algorithm AES_CBC[_0] 260s | appending ESP integrity algorithm HMAC_SHA2_512_256[_0] 260s | appending ESP integrity algorithm HMAC_SHA2_256_128[_0] 260s ipsec algparse: ignoring redundant ESP DH algorithm NONE as PFS policy is disabled 260s | parsing 'aes;none,aes;modp2048' for ESP 260s | proposal: 'aes;none' 260s | token: '' '' "aes" ';' 260s | token: '' "aes" ';' "none" '' 260s | token: ';' "none" '' '' 260s | appending ESP encryption algorithm AES_CBC[_0] 260s | parsing dh: 260s | appending ESP DH algorithm NONE[_0] 260s | token: '' '' '' 260s | appending ESP integrity algorithm HMAC_SHA2_512_256[_0] 260s | appending ESP integrity algorithm HMAC_SHA2_256_128[_0] 260s | proposal: 'aes;modp2048' 260s | token: '' '' "aes" ';' 260s | token: '' "aes" ';' "modp2048" '' 260s | token: ';' "modp2048" '' '' 260s | appending ESP encryption algorithm AES_CBC[_0] 260s | parsing dh: 260s | appending ESP DH algorithm MODP2048[_0] 260s | token: '' '' '' 260s | appending ESP integrity algorithm HMAC_SHA2_512_256[_0] 260s | appending ESP integrity algorithm HMAC_SHA2_256_128[_0] 260s ipsec algparse: ignoring redundant ESP DH algorithm NONE as PFS policy is disabled 260s ipsec algparse: ignoring ESP DH algorithm MODP2048 as PFS policy is disabled 260s | parsing 'aes-sha1-none' for ESP 260s | proposal: 'aes-sha1-none' 260s | token: '' '' "aes" '-' 260s | token: '' "aes" '-' "sha1" '-' 260s | token: '-' "sha1" '-' "none" '' 260s | appending ESP encryption algorithm AES_CBC[_0] 260s | parsing integ: 260s | appending ESP integrity algorithm HMAC_SHA1_96[_0] 260s | token: '-' "none" '' '' 260s | parsing dh: 260s | appending ESP DH algorithm NONE[_0] 260s | token: '' '' '' 260s ipsec algparse: ignoring redundant ESP DH algorithm NONE as PFS policy is disabled 260s | parsing 'aes-sha1;none' for ESP 260s | proposal: 'aes-sha1;none' 260s | token: '' '' "aes" '-' 260s | token: '' "aes" '-' "sha1" ';' 260s | token: '-' "sha1" ';' "none" '' 260s | appending ESP encryption algorithm AES_CBC[_0] 260s | parsing integ: 260s | appending ESP integrity algorithm HMAC_SHA1_96[_0] 260s | token: ';' "none" '' '' 260s | parsing dh: 260s | appending ESP DH algorithm NONE[_0] 260s | token: '' '' '' 260s ipsec algparse: ignoring redundant ESP DH algorithm NONE as PFS policy is disabled 260s | parsing '3des168-sha1' for ESP 260s | proposal: '3des168-sha1' 260s | token: '' '' "3des168" '-' 260s | token: '' "3des168" '-' "sha1" '' 260s | ike_alg_byname() failed: ESP encryption algorithm '3des168' is not recognized 260s | parsing '3des-null' for ESP 260s | proposal: '3des-null' 260s | token: '' '' "3des" '-' 260s | token: '' "3des" '-' "null" '' 260s | token: '-' "null" '' '' 260s | appending ESP encryption algorithm 3DES_CBC[_0] 260s | parsing integ: 260s | appending ESP integrity algorithm NONE[_0] 260s | token: '' '' '' 260s | parsing 'aes128-null' for ESP 260s | proposal: 'aes128-null' 260s | token: '' '' "aes128" '-' 260s | token: '' "aes128" '-' "null" '' 260s | ike_alg_byname() failed: ESP encryption algorithm 'aes128' is not recognized 260s | token: '-' "null" '' '' 260s | appending ESP encryption algorithm AES_CBC[_128] 260s | parsing integ: 260s | appending ESP integrity algorithm NONE[_0] 260s | token: '' '' '' 260s | parsing 'aes224-sha1' for ESP 260s | proposal: 'aes224-sha1' 260s | token: '' '' "aes224" '-' 260s | token: '' "aes224" '-' "sha1" '' 260s | ike_alg_byname() failed: ESP encryption algorithm 'aes224' is not recognized 260s | parsing 'aes-224-sha1' for ESP 260s | proposal: 'aes-224-sha1' 260s | token: '' '' "aes" '-' 260s | token: '' "aes" '-' "224" '-' 260s | byname('aes') with ='224' failed: ESP encryption algorithm AES_CBC with key length 224 invalid; valid key lengths: 128, 192, 256 260s | parsing 'aes0-sha1' for ESP 260s | proposal: 'aes0-sha1' 260s | token: '' '' "aes0" '-' 260s | token: '' "aes0" '-' "sha1" '' 260s | ike_alg_byname() failed: ESP encryption algorithm 'aes0' is not recognized 260s | parsing 'aes-0-sha1' for ESP 260s | proposal: 'aes-0-sha1' 260s | token: '' '' "aes" '-' 260s | token: '' "aes" '-' "0" '-' 260s | parsing 'aes512-sha1' for ESP 260s | proposal: 'aes512-sha1' 260s | token: '' '' "aes512" '-' 260s | token: '' "aes512" '-' "sha1" '' 260s | ike_alg_byname() failed: ESP encryption algorithm 'aes512' is not recognized 260s | parsing 'aes-sha1555' for ESP 260s | proposal: 'aes-sha1555' 260s | token: '' '' "aes" '-' 260s | token: '' "aes" '-' "sha1555" '' 260s | token: '-' "sha1555" '' '' 260s | appending ESP encryption algorithm AES_CBC[_0] 260s | parsing integ: 260s | ike_alg_byname() failed: ESP integrity algorithm 'sha1555' is not recognized 260s | lookup for integrity algorithm 'sha1555' failed 260s | or - failed 'ESP integrity algorithm 'sha1555' is not recognized') 260s | parsing 'camellia666-sha1' for ESP 260s | proposal: 'camellia666-sha1' 260s | token: '' '' "camellia666" '-' 260s | token: '' "camellia666" '-' "sha1" '' 260s | ike_alg_byname() failed: ESP encryption algorithm 'camellia666' is not recognized 260s | parsing 'blowfish' for ESP 260s | proposal: 'blowfish' 260s | token: '' '' "blowfish" '' 260s | token: '' "blowfish" '' '' 260s | ike_alg_byname() failed: ESP encryption algorithm 'blowfish' is not supported 260s | parsing 'des-sha1' for ESP 260s | proposal: 'des-sha1' 260s | token: '' '' "des" '-' 260s | token: '' "des" '-' "sha1" '' 260s | ike_alg_byname() failed: ESP encryption algorithm 'des' is not supported 260s | parsing 'aes_ctr666' for ESP 260s | proposal: 'aes_ctr666' 260s | token: '' '' "aes_ctr666" '' 260s | token: '' "aes_ctr666" '' '' 260s | ike_alg_byname() failed: ESP encryption algorithm 'aes_ctr666' is not recognized 260s | parsing 'aes128-sha2_128' for ESP 260s | proposal: 'aes128-sha2_128' 260s | token: '' '' "aes128" '-' 260s | token: '' "aes128" '-' "sha2_128" '' 260s | ike_alg_byname() failed: ESP encryption algorithm 'aes128' is not recognized 260s | token: '-' "sha2_128" '' '' 260s | appending ESP encryption algorithm AES_CBC[_128] 260s | parsing integ: 260s | ike_alg_byname() failed: ESP integrity algorithm 'sha2_128' is not recognized 260s | lookup for integrity algorithm 'sha2_128' failed 260s | or - failed 'ESP integrity algorithm 'sha2_128' is not recognized') 260s | parsing 'aes256-sha2_256-4096' for ESP 260s | proposal: 'aes256-sha2_256-4096' 260s | token: '' '' "aes256" '-' 260s | token: '' "aes256" '-' "sha2_256" '-' 260s | ike_alg_byname() failed: ESP encryption algorithm 'aes256' is not recognized 260s | token: '-' "sha2_256" '-' "4096" '' 260s | appending ESP encryption algorithm AES_CBC[_256] 260s | parsing integ: 260s | appending ESP integrity algorithm HMAC_SHA2_256_128[_0] 260s | token: '-' "4096" '' '' 260s | parsing dh: 260s | ike_alg_byname() failed: ESP DH algorithm '4096' is not recognized 260s | lookup for DH algorithm '4096' failed 260s | ... failed 'ESP DH algorithm '4096' is not recognized' 260s | parsing 'aes256-sha2_256-128' for ESP 260s | proposal: 'aes256-sha2_256-128' 260s | token: '' '' "aes256" '-' 260s | token: '' "aes256" '-' "sha2_256" '-' 260s | ike_alg_byname() failed: ESP encryption algorithm 'aes256' is not recognized 260s | token: '-' "sha2_256" '-' "128" '' 260s | appending ESP encryption algorithm AES_CBC[_256] 260s | parsing integ: 260s | appending ESP integrity algorithm HMAC_SHA2_256_128[_0] 260s | token: '-' "128" '' '' 260s | parsing dh: 260s | ike_alg_byname() failed: ESP DH algorithm '128' is not recognized 260s | lookup for DH algorithm '128' failed 260s | ... failed 'ESP DH algorithm '128' is not recognized' 260s | parsing 'vanitycipher' for ESP 260s | proposal: 'vanitycipher' 260s | token: '' '' "vanitycipher" '' 260s | token: '' "vanitycipher" '' '' 260s | ike_alg_byname() failed: ESP encryption algorithm 'vanitycipher' is not recognized 260s | parsing 'ase-sah' for ESP 260s | proposal: 'ase-sah' 260s | token: '' '' "ase" '-' 260s | token: '' "ase" '-' "sah" '' 260s | ike_alg_byname() failed: ESP encryption algorithm 'ase' is not recognized 260s | parsing 'aes-sah1' for ESP 260s | proposal: 'aes-sah1' 260s | token: '' '' "aes" '-' 260s | token: '' "aes" '-' "sah1" '' 260s | token: '-' "sah1" '' '' 260s | appending ESP encryption algorithm AES_CBC[_0] 260s | parsing integ: 260s | ike_alg_byname() failed: ESP integrity algorithm 'sah1' is not recognized 260s | lookup for integrity algorithm 'sah1' failed 260s | or - failed 'ESP integrity algorithm 'sah1' is not recognized') 260s | parsing 'id3' for ESP 260s | proposal: 'id3' 260s | token: '' '' "id3" '' 260s | token: '' "id3" '' '' 260s | ike_alg_byname() failed: ESP encryption algorithm 'id3' is not recognized 260s | ike_alg_byname() failed: ESP encryption algorithm 'id3' is not recognized 260s | parsing 'aes-id3' for ESP 260s | proposal: 'aes-id3' 260s | token: '' '' "aes" '-' 260s | token: '' "aes" '-' "id3" '' 260s | token: '-' "id3" '' '' 260s | appending ESP encryption algorithm AES_CBC[_0] 260s | parsing integ: 260s | ike_alg_byname() failed: ESP integrity algorithm 'id3' is not recognized 260s | lookup for integrity algorithm 'id3' failed 260s | or - failed 'ESP integrity algorithm 'id3' is not recognized') 260s | parsing 'aes_gcm-md5' for ESP 260s | proposal: 'aes_gcm-md5' 260s | token: '' '' "aes_gcm" '-' 260s | token: '' "aes_gcm" '-' "md5" '' 260s | token: '-' "md5" '' '' 260s | appending ESP encryption algorithm AES_GCM_16[_0] 260s | parsing integ: 260s | appending ESP integrity algorithm HMAC_MD5_96[_0] 260s | token: '' '' '' 260s | parsing 'mars' for ESP 260s | proposal: 'mars' 260s | token: '' '' "mars" '' 260s | token: '' "mars" '' '' 260s | ike_alg_byname() failed: ESP encryption algorithm 'mars' is not supported 260s | parsing 'aes_gcm-16' for ESP 260s | proposal: 'aes_gcm-16' 260s | token: '' '' "aes_gcm" '-' 260s | token: '' "aes_gcm" '-' "16" '' 260s | byname('aes_gcm') with ='16' failed: ESP encryption algorithm AES_GCM_16 with key length 16 invalid; valid key lengths: 128, 192, 256 260s | parsing 'aes_gcm-0' for ESP 260s | proposal: 'aes_gcm-0' 260s | token: '' '' "aes_gcm" '-' 260s | token: '' "aes_gcm" '-' "0" '' 260s | parsing 'aes_gcm-123456789012345' for ESP 260s | proposal: 'aes_gcm-123456789012345' 260s | token: '' '' "aes_gcm" '-' 260s | token: '' "aes_gcm" '-' "123456789012345" '' 260s | parsing '3des-sha1;dh22' for ESP 260s | proposal: '3des-sha1;dh22' 260s | token: '' '' "3des" '-' 260s | token: '' "3des" '-' "sha1" ';' 260s | token: '-' "sha1" ';' "dh22" '' 260s | appending ESP encryption algorithm 3DES_CBC[_0] 260s | parsing integ: 260s | appending ESP integrity algorithm HMAC_SHA1_96[_0] 260s | token: ';' "dh22" '' '' 260s | parsing dh: 260s | ike_alg_byname() failed: ESP DH algorithm 'dh22' is not supported 260s | lookup for DH algorithm 'dh22' failed 260s | ... failed 'ESP DH algorithm 'dh22' is not supported' 260s | parsing '3des-sha1;modp8192,3des-sha2' for ESP 260s | proposal: '3des-sha1;modp8192' 260s | token: '' '' "3des" '-' 260s | token: '' "3des" '-' "sha1" ';' 260s | token: '-' "sha1" ';' "modp8192" '' 260s | appending ESP encryption algorithm 3DES_CBC[_0] 260s | parsing integ: 260s | appending ESP integrity algorithm HMAC_SHA1_96[_0] 260s | token: ';' "modp8192" '' '' 260s | parsing dh: 260s | appending ESP DH algorithm MODP8192[_0] 260s | token: '' '' '' 260s | proposal: '3des-sha2' 260s | token: '' '' "3des" '-' 260s | token: '' "3des" '-' "sha2" '' 260s | token: '-' "sha2" '' '' 260s | appending ESP encryption algorithm 3DES_CBC[_0] 260s | parsing integ: 260s | appending ESP integrity algorithm HMAC_SHA2_256_128[_0] 260s | token: '' '' '' 260s ipsec algparse: ignoring ESP DH algorithm MODP8192 as PFS policy is disabled 260s | parsing '3des-sha1-modp8192,3des-sha2' for ESP 260s | proposal: '3des-sha1-modp8192' 260s | token: '' '' "3des" '-' 260s | token: '' "3des" '-' "sha1" '-' 260s | token: '-' "sha1" '-' "modp8192" '' 260s | appending ESP encryption algorithm 3DES_CBC[_0] 260s | parsing integ: 260s | appending ESP integrity algorithm HMAC_SHA1_96[_0] 260s | token: '-' "modp8192" '' '' 260s | parsing dh: 260s | appending ESP DH algorithm MODP8192[_0] 260s | token: '' '' '' 260s | proposal: '3des-sha2' 260s | token: '' '' "3des" '-' 260s | token: '' "3des" '-' "sha2" '' 260s | token: '-' "sha2" '' '' 260s | appending ESP encryption algorithm 3DES_CBC[_0] 260s | parsing integ: 260s | appending ESP integrity algorithm HMAC_SHA2_256_128[_0] 260s | token: '' '' '' 260s ipsec algparse: ignoring ESP DH algorithm MODP8192 as PFS policy is disabled 260s | parsing '3des-sha1-modp8192,3des-sha2-modp8192' for ESP 260s | proposal: '3des-sha1-modp8192' 260s | token: '' '' "3des" '-' 260s | token: '' "3des" '-' "sha1" '-' 260s | token: '-' "sha1" '-' "modp8192" '' 260s | appending ESP encryption algorithm 3DES_CBC[_0] 260s | parsing integ: 260s | appending ESP integrity algorithm HMAC_SHA1_96[_0] 260s | token: '-' "modp8192" '' '' 260s | parsing dh: 260s | appending ESP DH algorithm MODP8192[_0] 260s | token: '' '' '' 260s | proposal: '3des-sha2-modp8192' 260s | token: '' '' "3des" '-' 260s | token: '' "3des" '-' "sha2" '-' 260s | token: '-' "sha2" '-' "modp8192" '' 260s | appending ESP encryption algorithm 3DES_CBC[_0] 260s | parsing integ: 260s | appending ESP integrity algorithm HMAC_SHA2_256_128[_0] 260s | token: '-' "modp8192" '' '' 260s | parsing dh: 260s | appending ESP DH algorithm MODP8192[_0] 260s | token: '' '' '' 260s ipsec algparse: ignoring ESP DH algorithm MODP8192 as PFS policy is disabled 260s ipsec algparse: ignoring ESP DH algorithm MODP8192 as PFS policy is disabled 260s | parsing '3des-sha1-modp8192,3des-sha2;modp8192' for ESP 260s | proposal: '3des-sha1-modp8192' 260s | token: '' '' "3des" '-' 260s | token: '' "3des" '-' "sha1" '-' 260s | token: '-' "sha1" '-' "modp8192" '' 260s | appending ESP encryption algorithm 3DES_CBC[_0] 260s | parsing integ: 260s | appending ESP integrity algorithm HMAC_SHA1_96[_0] 260s | token: '-' "modp8192" '' '' 260s | parsing dh: 260s | appending ESP DH algorithm MODP8192[_0] 260s | token: '' '' '' 260s | proposal: '3des-sha2;modp8192' 260s | token: '' '' "3des" '-' 260s | token: '' "3des" '-' "sha2" ';' 260s | token: '-' "sha2" ';' "modp8192" '' 260s | appending ESP encryption algorithm 3DES_CBC[_0] 260s | parsing integ: 260s | appending ESP integrity algorithm HMAC_SHA2_256_128[_0] 260s | token: ';' "modp8192" '' '' 260s | parsing dh: 260s | appending ESP DH algorithm MODP8192[_0] 260s | token: '' '' '' 260s ipsec algparse: ignoring ESP DH algorithm MODP8192 as PFS policy is disabled 260s ipsec algparse: ignoring ESP DH algorithm MODP8192 as PFS policy is disabled 260s | parsing '3des-sha1;modp8192,3des-sha2-modp8192' for ESP 260s | proposal: '3des-sha1;modp8192' 260s | token: '' '' "3des" '-' 260s | token: '' "3des" '-' "sha1" ';' 260s | token: '-' "sha1" ';' "modp8192" '' 260s | appending ESP encryption algorithm 3DES_CBC[_0] 260s | parsing integ: 260s | appending ESP integrity algorithm HMAC_SHA1_96[_0] 260s | token: ';' "modp8192" '' '' 260s | parsing dh: 260s | appending ESP DH algorithm MODP8192[_0] 260s | token: '' '' '' 260s | proposal: '3des-sha2-modp8192' 260s | token: '' '' "3des" '-' 260s | token: '' "3des" '-' "sha2" '-' 260s | token: '-' "sha2" '-' "modp8192" '' 260s | appending ESP encryption algorithm 3DES_CBC[_0] 260s | parsing integ: 260s | appending ESP integrity algorithm HMAC_SHA2_256_128[_0] 260s | token: '-' "modp8192" '' '' 260s | parsing dh: 260s | appending ESP DH algorithm MODP8192[_0] 260s | token: '' '' '' 260s ipsec algparse: ignoring ESP DH algorithm MODP8192 as PFS policy is disabled 260s ipsec algparse: ignoring ESP DH algorithm MODP8192 as PFS policy is disabled 260s | parsing '3des-sha1;modp8192,3des-sha2;modp8192' for ESP 260s | proposal: '3des-sha1;modp8192' 260s | token: '' '' "3des" '-' 260s | token: '' "3des" '-' "sha1" ';' 260s | token: '-' "sha1" ';' "modp8192" '' 260s | appending ESP encryption algorithm 3DES_CBC[_0] 260s | parsing integ: 260s | appending ESP integrity algorithm HMAC_SHA1_96[_0] 260s | token: ';' "modp8192" '' '' 260s | parsing dh: 260s | appending ESP DH algorithm MODP8192[_0] 260s | token: '' '' '' 260s | proposal: '3des-sha2;modp8192' 260s | token: '' '' "3des" '-' 260s | token: '' "3des" '-' "sha2" ';' 260s | token: '-' "sha2" ';' "modp8192" '' 260s | appending ESP encryption algorithm 3DES_CBC[_0] 260s | parsing integ: 260s | appending ESP integrity algorithm HMAC_SHA2_256_128[_0] 260s | token: ';' "modp8192" '' '' 260s | parsing dh: 260s | appending ESP DH algorithm MODP8192[_0] 260s | token: '' '' '' 260s ipsec algparse: ignoring ESP DH algorithm MODP8192 as PFS policy is disabled 260s ipsec algparse: ignoring ESP DH algorithm MODP8192 as PFS policy is disabled 260s | parsing '3des-sha1-modp8192,3des-sha2-modp2048' for ESP 260s | proposal: '3des-sha1-modp8192' 260s | token: '' '' "3des" '-' 260s | token: '' "3des" '-' "sha1" '-' 260s | token: '-' "sha1" '-' "modp8192" '' 260s | appending ESP encryption algorithm 3DES_CBC[_0] 260s | parsing integ: 260s | appending ESP integrity algorithm HMAC_SHA1_96[_0] 260s | token: '-' "modp8192" '' '' 260s | parsing dh: 260s | appending ESP DH algorithm MODP8192[_0] 260s | token: '' '' '' 260s | proposal: '3des-sha2-modp2048' 260s | token: '' '' "3des" '-' 260s | token: '' "3des" '-' "sha2" '-' 260s | token: '-' "sha2" '-' "modp2048" '' 260s | appending ESP encryption algorithm 3DES_CBC[_0] 260s | parsing integ: 260s | appending ESP integrity algorithm HMAC_SHA2_256_128[_0] 260s | token: '-' "modp2048" '' '' 260s | parsing dh: 260s | appending ESP DH algorithm MODP2048[_0] 260s | token: '' '' '' 260s ipsec algparse: ignoring ESP DH algorithm MODP8192 as PFS policy is disabled 260s ipsec algparse: ignoring ESP DH algorithm MODP2048 as PFS policy is disabled 260s | parsing 'SHA2_512_256,SHA2_256_128' for AH 260s | proposal: 'SHA2_512_256' 260s | token: '' '' "SHA2_512_256" '' 260s | token: '' "SHA2_512_256" '' '' 260s | parsing integ: 260s | appending AH integrity algorithm HMAC_SHA2_512_256[_0] 260s | token: '' '' '' 260s | proposal: 'SHA2_256_128' 260s | token: '' '' "SHA2_256_128" '' 260s | token: '' "SHA2_256_128" '' '' 260s | parsing integ: 260s | appending AH integrity algorithm HMAC_SHA2_256_128[_0] 260s | token: '' '' '' 260s algparse -v2 'ah=sha384' (expect SUCCESS) 260s HMAC_SHA2_384_192 260s algparse -v2 'ah=sha512' (expect SUCCESS) 260s HMAC_SHA2_512_256 260s algparse -v2 'ah=sha2_256' (expect SUCCESS) 260s HMAC_SHA2_256_128 260s algparse -v2 'ah=sha2_384' (expect SUCCESS) 260s HMAC_SHA2_384_192 260s algparse -v2 'ah=sha2_512' (expect SUCCESS) 260s HMAC_SHA2_512_256 260s algparse -v2 'ah=aes_xcbc' (expect SUCCESS) 260s AES_XCBC_96 260s algparse -v2 'ah=sha2-none' (expect SUCCESS) 260s HMAC_SHA2_256_128 260s algparse -v2 'ah=sha2;none' (expect SUCCESS) 260s HMAC_SHA2_256_128 260s algparse -v2 'ah=sha1-modp8192,sha1-modp8192,sha1-modp8192' (expect SUCCESS) 260s | parsing '' for AH 260s | parsing 'md5' for AH 260s | proposal: 'md5' 260s | token: '' '' "md5" '' 260s | token: '' "md5" '' '' 260s | parsing integ: 260s | appending AH integrity algorithm HMAC_MD5_96[_0] 260s | token: '' '' '' 260s | parsing 'sha' for AH 260s | proposal: 'sha' 260s | token: '' '' "sha" '' 260s | token: '' "sha" '' '' 260s | parsing integ: 260s | appending AH integrity algorithm HMAC_SHA1_96[_0] 260s | token: '' '' '' 260s | parsing 'sha;modp2048' for AH 260s | proposal: 'sha;modp2048' 260s | token: '' '' "sha" ';' 260s | token: '' "sha" ';' "modp2048" '' 260s | parsing integ: 260s | appending AH integrity algorithm HMAC_SHA1_96[_0] 260s | token: ';' "modp2048" '' '' 260s | parsing dh: 260s | appending AH DH algorithm MODP2048[_0] 260s | token: '' '' '' 260s ipsec algparse: ignoring AH DH algorithm MODP2048 as PFS policy is disabled 260s | parsing 'sha1' for AH 260s | proposal: 'sha1' 260s | token: '' '' "sha1" '' 260s | token: '' "sha1" '' '' 260s | parsing integ: 260s | appending AH integrity algorithm HMAC_SHA1_96[_0] 260s | token: '' '' '' 260s | parsing 'sha2' for AH 260s | proposal: 'sha2' 260s | token: '' '' "sha2" '' 260s | token: '' "sha2" '' '' 260s | parsing integ: 260s | appending AH integrity algorithm HMAC_SHA2_256_128[_0] 260s | token: '' '' '' 260s | parsing 'sha256' for AH 260s | proposal: 'sha256' 260s | token: '' '' "sha256" '' 260s | token: '' "sha256" '' '' 260s | parsing integ: 260s | appending AH integrity algorithm HMAC_SHA2_256_128[_0] 260s | token: '' '' '' 260s | parsing 'sha384' for AH 260s | proposal: 'sha384' 260s | token: '' '' "sha384" '' 260s | token: '' "sha384" '' '' 260s | parsing integ: 260s | appending AH integrity algorithm HMAC_SHA2_384_192[_0] 260s | token: '' '' '' 260s | parsing 'sha512' for AH 260s | proposal: 'sha512' 260s | token: '' '' "sha512" '' 260s | token: '' "sha512" '' '' 260s | parsing integ: 260s | appending AH integrity algorithm HMAC_SHA2_512_256[_0] 260s | token: '' '' '' 260s | parsing 'sha2_256' for AH 260s | proposal: 'sha2_256' 260s | token: '' '' "sha2_256" '' 260s | token: '' "sha2_256" '' '' 260s | parsing integ: 260s | appending AH integrity algorithm HMAC_SHA2_256_128[_0] 260s | token: '' '' '' 260s | parsing 'sha2_384' for AH 260s | proposal: 'sha2_384' 260s | token: '' '' "sha2_384" '' 260s | token: '' "sha2_384" '' '' 260s | parsing integ: 260s | appending AH integrity algorithm HMAC_SHA2_384_192[_0] 260s | token: '' '' '' 260s | parsing 'sha2_512' for AH 260s | proposal: 'sha2_512' 260s | token: '' '' "sha2_512" '' 260s | token: '' "sha2_512" '' '' 260s | parsing integ: 260s | appending AH integrity algorithm HMAC_SHA2_512_256[_0] 260s | token: '' '' '' 260s | parsing 'aes_xcbc' for AH 260s | proposal: 'aes_xcbc' 260s | token: '' '' "aes_xcbc" '' 260s | token: '' "aes_xcbc" '' '' 260s | parsing integ: 260s | appending AH integrity algorithm AES_XCBC_96[_0] 260s | token: '' '' '' 260s | parsing 'sha2-none' for AH 260s | proposal: 'sha2-none' 260s | token: '' '' "sha2" '-' 260s | token: '' "sha2" '-' "none" '' 260s | parsing integ: 260s | appending AH integrity algorithm HMAC_SHA2_256_128[_0] 260s | token: '-' "none" '' '' 260s | parsing dh: 260s | appending AH DH algorithm NONE[_0] 260s | token: '' '' '' 260s ipsec algparse: ignoring redundant AH DH algorithm NONE as PFS policy is disabled 260s | parsing 'sha2;none' for AH 260s | proposal: 'sha2;none' 260s | token: '' '' "sha2" ';' 260s | token: '' "sha2" ';' "none" '' 260s | parsing integ: 260s | appending AH integrity algorithm HMAC_SHA2_256_128[_0] 260s | token: ';' "none" '' '' 260s | parsing dh: 260s | appending AH DH algorithm NONE[_0] 260s | token: '' '' '' 260s ipsec algparse: ignoring redundant AH DH algorithm NONE as PFS policy is disabled 260s | parsing 'sha1-modp8192,sha1-modp8192,sha1-modp8192' for AH 260s | proposal: 'sha1-modp8192' 260s | token: '' '' "sha1" '-' 260s | token: '' "sha1" '-' "modp8192" '' 260s | parsing integ: 260s | appending AH integrity algorithm HMAC_SHA1_96[_0] 260s | token: '-' "modp8192" '' '' 260s | parsing dh: 260s | appending AH DH algorithm MODP8192[_0] 260s | token: '' '' '' 260s | proposal: 'sha1-modp8192' 260s | token: '' '' "sha1" '-' 260s | token: '' "sha1" '-' "modp8192" '' 260s | parsing integ: 260s | appending AH integrity algorithm HMAC_SHA1_96[_0] 260s | token: '-' "modp8192" '' '' 260s | parsing dh: 260s | appending AH DH algorithm MODP8192[_0] 260s | token: '' '' '' 260s | proposal: 'sha1-modp8192' 260s | token: '' '' "sha1" '-' 260s | token: '' "sha1" '-' "modp8192" '' 260s | parsing integ: 260s | appending AH integrity algorithm HMAC_SHA1_96[_0] 260s | token: '-' "modp8192" '' '' 260s | parsing dh: 260s | appending AH DH algorithm MODP8192[_0] 260s | token: '' '' '' 260s ipsec algparse: ignoring AH DH algorithm MODP8192 as PFS policy is disabled 260s HMAC_SHA1_96 260s algparse -v2 'ah=aes-sha1' (expect ERROR) 260s ERROR: AH integrity algorithm 'aes' is not recognized 260s algparse -v2 'ah=vanityhash1' (expect ERROR) 260s ERROR: AH integrity algorithm 'vanityhash1' is not recognized 260s algparse -v2 'ah=aes_gcm_c-256' (expect ERROR) 260s ERROR: AH integrity algorithm 'aes_gcm_c' is not recognized 260s algparse -v2 'ah=id3' (expect ERROR) 260s ERROR: AH integrity algorithm 'id3' is not recognized 260s algparse -v2 'ah=3des' (expect ERROR) 260s ERROR: AH integrity algorithm '3des' is not recognized 260s algparse -v2 'ah=null' (expect ERROR) 260s ERROR: AH cannot have 'none' as the integrity algorithm 260s algparse -v2 'ah=aes_gcm' (expect ERROR) 260s ERROR: AH integrity algorithm 'aes_gcm' is not recognized 260s algparse -v2 'ah=aes_ccm' (expect ERROR) 260s ERROR: AH integrity algorithm 'aes_ccm' is not recognized 260s algparse -v2 'ah=ripemd' (expect ERROR) 260s ERROR: AH integrity algorithm 'ripemd' is not recognized 260s algparse -v2 'ike' (expect SUCCESS) 260s | parsing 'aes-sha1' for AH 260s | proposal: 'aes-sha1' 260s | token: '' '' "aes" '-' 260s | token: '' "aes" '-' "sha1" '' 260s | parsing integ: 260s | ike_alg_byname() failed: AH integrity algorithm 'aes' is not recognized 260s | lookup for integrity algorithm 'aes' failed 260s | or - failed 'AH integrity algorithm 'aes' is not recognized') 260s | parsing 'vanityhash1' for AH 260s | proposal: 'vanityhash1' 260s | token: '' '' "vanityhash1" '' 260s | token: '' "vanityhash1" '' '' 260s | parsing integ: 260s | ike_alg_byname() failed: AH integrity algorithm 'vanityhash1' is not recognized 260s | lookup for integrity algorithm 'vanityhash1' failed 260s | or - failed 'AH integrity algorithm 'vanityhash1' is not recognized') 260s | parsing 'aes_gcm_c-256' for AH 260s | proposal: 'aes_gcm_c-256' 260s | token: '' '' "aes_gcm_c" '-' 260s | token: '' "aes_gcm_c" '-' "256" '' 260s | parsing integ: 260s | ike_alg_byname() failed: AH integrity algorithm 'aes_gcm_c' is not recognized 260s | lookup for integrity algorithm 'aes_gcm_c' failed 260s | or - failed 'AH integrity algorithm 'aes_gcm_c' is not recognized') 260s | parsing 'id3' for AH 260s | proposal: 'id3' 260s | token: '' '' "id3" '' 260s | token: '' "id3" '' '' 260s | parsing integ: 260s | ike_alg_byname() failed: AH integrity algorithm 'id3' is not recognized 260s | lookup for integrity algorithm 'id3' failed 260s | or - failed 'AH integrity algorithm 'id3' is not recognized') 260s | parsing '3des' for AH 260s | proposal: '3des' 260s | token: '' '' "3des" '' 260s | token: '' "3des" '' '' 260s | parsing integ: 260s | ike_alg_byname() failed: AH integrity algorithm '3des' is not recognized 260s | lookup for integrity algorithm '3des' failed 260s | or - failed 'AH integrity algorithm '3des' is not recognized') 260s | parsing 'null' for AH 260s | proposal: 'null' 260s | token: '' '' "null" '' 260s | token: '' "null" '' '' 260s | parsing integ: 260s | appending AH integrity algorithm NONE[_0] 260s | token: '' '' '' 260s | parsing 'aes_gcm' for AH 260s | proposal: 'aes_gcm' 260s | token: '' '' "aes_gcm" '' 260s | token: '' "aes_gcm" '' '' 260s | parsing integ: 260s | ike_alg_byname() failed: AH integrity algorithm 'aes_gcm' is not recognized 260s | lookup for integrity algorithm 'aes_gcm' failed 260s | or - failed 'AH integrity algorithm 'aes_gcm' is not recognized') 260s | parsing 'aes_ccm' for AH 260s | proposal: 'aes_ccm' 260s | token: '' '' "aes_ccm" '' 260s | token: '' "aes_ccm" '' '' 260s | parsing integ: 260s | ike_alg_byname() failed: AH integrity algorithm 'aes_ccm' is not recognized 260s | lookup for integrity algorithm 'aes_ccm' failed 260s | or - failed 'AH integrity algorithm 'aes_ccm' is not recognized') 260s | parsing 'ripemd' for AH 260s | proposal: 'ripemd' 260s | token: '' '' "ripemd" '' 260s | token: '' "ripemd" '' '' 260s | parsing integ: 260s | ike_alg_byname() failed: AH integrity algorithm 'ripemd' is not recognized 260s | lookup for integrity algorithm 'ripemd' failed 260s | or - failed 'AH integrity algorithm 'ripemd' is not recognized') 260s | parsing 'AES_GCM_16_256,AES_GCM_16_128,CHACHA20_POLY1305,AES_CBC_256,AES_CBC_128' for IKE 260s | proposal: 'AES_GCM_16_256' 260s | token: '' '' "AES_GCM_16_256" '' 260s | token: '' "AES_GCM_16_256" '' '' 260s | ike_alg_byname() failed: IKE encryption algorithm 'AES_GCM_16_256' is not recognized 260s | token: '' '' '' 260s | appending IKE encryption algorithm AES_GCM_16[_256] 260s | appending IKE PRF algorithm HMAC_SHA2_512[_0] 260s | appending IKE PRF algorithm HMAC_SHA2_256[_0] 260s | appending IKE integrity algorithm NONE[_0] 260s | appending IKE DH algorithm DH19[_0] 260s | appending IKE DH algorithm DH20[_0] 260s | appending IKE DH algorithm DH21[_0] 260s | appending IKE DH algorithm DH31[_0] 260s | appending IKE DH algorithm MODP4096[_0] 260s | appending IKE DH algorithm MODP3072[_0] 260s | appending IKE DH algorithm MODP2048[_0] 260s | appending IKE DH algorithm MODP8192[_0] 260s | proposal: 'AES_GCM_16_128' 260s | token: '' '' "AES_GCM_16_128" '' 260s | token: '' "AES_GCM_16_128" '' '' 260s | ike_alg_byname() failed: IKE encryption algorithm 'AES_GCM_16_128' is not recognized 260s | token: '' '' '' 260s | appending IKE encryption algorithm AES_GCM_16[_128] 260s | appending IKE PRF algorithm HMAC_SHA2_512[_0] 260s | appending IKE PRF algorithm HMAC_SHA2_256[_0] 260s | appending IKE integrity algorithm NONE[_0] 260s | appending IKE DH algorithm DH19[_0] 260s | appending IKE DH algorithm DH20[_0] 260s | appending IKE DH algorithm DH21[_0] 260s | appending IKE DH algorithm DH31[_0] 260s | appending IKE DH algorithm MODP4096[_0] 260s | appending IKE DH algorithm MODP3072[_0] 260s | appending IKE DH algorithm MODP2048[_0] 260s | appending IKE DH algorithm MODP8192[_0] 260s | proposal: 'CHACHA20_POLY1305' 260s | token: '' '' "CHACHA20_POLY1305" '' 260s | token: '' "CHACHA20_POLY1305" '' '' 260s | token: '' '' '' 260s | appending IKE encryption algorithm CHACHA20_POLY1305[_0] 260s | appending IKE PRF algorithm HMAC_SHA2_512[_0] 260s | appending IKE PRF algorithm HMAC_SHA2_256[_0] 260s | appending IKE integrity algorithm NONE[_0] 260s | appending IKE DH algorithm DH19[_0] 260s | appending IKE DH algorithm DH20[_0] 260s | appending IKE DH algorithm DH21[_0] 260s | appending IKE DH algorithm DH31[_0] 260s | appending IKE DH algorithm MODP4096[_0] 260s | appending IKE DH algorithm MODP3072[_0] 260s | appending IKE DH algorithm MODP2048[_0] 260s | appending IKE DH algorithm MODP8192[_0] 260s | proposal: 'AES_CBC_256' 260s | token: '' '' "AES_CBC_256" '' 260s | token: '' "AES_CBC_256" '' '' 260s | ike_alg_byname() failed: IKE encryption algorithm 'AES_CBC_256' is not recognized 260s | token: '' '' '' 260s | appending IKE encryption algorithm AES_CBC[_256] 260s | appending IKE PRF algorithm HMAC_SHA2_512[_0] 260s | appending IKE PRF algorithm HMAC_SHA2_256[_0] 260s | appending IKE integrity algorithm HMAC_SHA2_512_256[_0] 260s | appending IKE integrity algorithm HMAC_SHA2_256_128[_0] 260s | appending IKE DH algorithm DH19[_0] 260s | appending IKE DH algorithm DH20[_0] 260s | appending IKE DH algorithm DH21[_0] 260s | appending IKE DH algorithm DH31[_0] 260s | appending IKE DH algorithm MODP4096[_0] 260s | appending IKE DH algorithm MODP3072[_0] 260s | appending IKE DH algorithm MODP2048[_0] 260s | appending IKE DH algorithm MODP8192[_0] 260s | proposal: 'AES_CBC_128' 260s | token: '' '' "AES_CBC_128" '' 260s | token: '' "AES_CBC_128" '' '' 260s | ike_alg_byname() failed: IKE encryption algorithm 'AES_CBC_128' is not recognized 260s | token: '' '' '' 260s | appending IKE encryption algorithm AES_CBC[_128] 260s | appending IKE PRF algorithm HMAC_SHA2_512[_0] 260s | appending IKE PRF algorithm HMAC_SHA2_256[_0] 260s | appending IKE integrity algorithm HMAC_SHA2_512_256[_0] 260s | appending IKE integrity algorithm HMAC_SHA2_256_128[_0] 260s | appending IKE DH algorithm DH19[_0] 260s | appending IKE DH algorithm DH20[_0] 260s | appending IKE DH algorithm DH21[_0] 260s | appending IKE DH algorithm DH31[_0] 260s | appending IKE DH algorithm MODP4096[_0] 260s | appending IKE DH algorithm MODP3072[_0] 260s | appending IKE DH algorithm MODP2048[_0] 260s | appending IKE DH algorithm MODP8192[_0] 260s AES_GCM_16_256-HMAC_SHA2_512+HMAC_SHA2_256-DH19+DH20+DH21+DH31+MODP4096+MODP3072+MODP2048+MODP8192 260s AES_GCM_16_128-HMAC_SHA2_512+HMAC_SHA2_256-DH19+DH20+DH21+DH31+MODP4096+MODP3072+MODP2048+MODP8192 260s CHACHA20_POLY1305-HMAC_SHA2_512+HMAC_SHA2_256-DH19+DH20+DH21+DH31+MODP4096+MODP3072+MODP2048+MODP8192 260s AES_CBC_256-HMAC_SHA2_512+HMAC_SHA2_256-DH19+DH20+DH21+DH31+MODP4096+MODP3072+MODP2048+MODP8192 260s AES_CBC_128-HMAC_SHA2_512+HMAC_SHA2_256-DH19+DH20+DH21+DH31+MODP4096+MODP3072+MODP2048+MODP8192 260s algparse -v2 'ike=' (expect ERROR) 260s ERROR: IKE proposal is empty 260s algparse -v2 'ike=3des-sha1' (expect SUCCESS) 260s 3DES_CBC-HMAC_SHA1-DH19+DH20+DH21+DH31+MODP4096+MODP3072+MODP2048+MODP8192 260s algparse -v2 'ike=3des-sha1' (expect SUCCESS) 260s 3DES_CBC-HMAC_SHA1-DH19+DH20+DH21+DH31+MODP4096+MODP3072+MODP2048+MODP8192 260s algparse -v2 'ike=3des-sha1;modp1536' (expect SUCCESS) 260s | parsing '' for IKE 260s | parsing '3des-sha1' for IKE 260s | proposal: '3des-sha1' 260s | token: '' '' "3des" '-' 260s | token: '' "3des" '-' "sha1" '' 260s | token: '-' "sha1" '' '' 260s | appending IKE encryption algorithm 3DES_CBC[_0] 260s | parsing prf: 260s | appending IKE PRF algorithm HMAC_SHA1[_0] 260s | token: '' '' '' 260s | - succeeded, advancing tokens 260s | appending IKE integrity algorithm HMAC_SHA1_96[_0] 260s | appending IKE DH algorithm DH19[_0] 260s | appending IKE DH algorithm DH20[_0] 260s | appending IKE DH algorithm DH21[_0] 260s | appending IKE DH algorithm DH31[_0] 260s | appending IKE DH algorithm MODP4096[_0] 260s | appending IKE DH algorithm MODP3072[_0] 260s | appending IKE DH algorithm MODP2048[_0] 260s | appending IKE DH algorithm MODP8192[_0] 260s | parsing '3des-sha1' for IKE 260s | proposal: '3des-sha1' 260s | token: '' '' "3des" '-' 260s | token: '' "3des" '-' "sha1" '' 260s | token: '-' "sha1" '' '' 260s | appending IKE encryption algorithm 3DES_CBC[_0] 260s | parsing prf: 260s | appending IKE PRF algorithm HMAC_SHA1[_0] 260s | token: '' '' '' 260s | - succeeded, advancing tokens 260s | appending IKE integrity algorithm HMAC_SHA1_96[_0] 260s | appending IKE DH algorithm DH19[_0] 260s | appending IKE DH algorithm DH20[_0] 260s | appending IKE DH algorithm DH21[_0] 260s | appending IKE DH algorithm DH31[_0] 260s | appending IKE DH algorithm MODP4096[_0] 260s | appending IKE DH algorithm MODP3072[_0] 260s | appending IKE DH algorithm MODP2048[_0] 260s | appending IKE DH algorithm MODP8192[_0] 260s | parsing '3des-sha1;modp1536' for IKE 260s | proposal: '3des-sha1;modp1536' 260s | token: '' '' "3des" '-' 260s | token: '' "3des" '-' "sha1" ';' 260s | token: '-' "sha1" ';' "modp1536" '' 260s | appending IKE encryption algorithm 3DES_CBC[_0] 260s | parsing prf: 260s | appending IKE PRF algorithm HMAC_SHA1[_0] 260s | token: ';' "modp1536" '' '' 260s | - succeeded, advancing tokens 260s | parsing dh: 260s | appending IKE DH algorithm MODP1536[_0] 260s | token: '' '' '' 260s | appending IKE integrity algorithm HMAC_SHA1_96[_0] 260s | parsing '3des;dh21' for IKE 260s | proposal: '3des;dh21' 260s | token: '' '' "3des" ';' 260s | token: '' "3des" ';' "dh21" '' 260s | token: ';' "dh21" '' '' 260s | appending IKE encryption algorithm 3DES_CBC[_0] 260s | parsing dh: 260s 3DES_CBC-HMAC_SHA1-MODP1536 260s algparse -v2 'ike=3des;dh21' (expect SUCCESS) 260s 3DES_CBC-HMAC_SHA2_512+HMAC_SHA2_256-DH21 260s algparse -v2 'ike=3des-sha1;dh21' (expect SUCCESS) 260s 3DES_CBC-HMAC_SHA1-DH21 260s algparse -v2 'ike=3des-sha1-ecp_521' (expect SUCCESS) 260s 3DES_CBC-HMAC_SHA1-DH21 260s algparse -v2 'ike=3des+aes' (expect SUCCESS) 260s 3DES_CBC+AES_CBC-HMAC_SHA2_512+HMAC_SHA2_256-DH19+DH20+DH21+DH31+MODP4096+MODP3072+MODP2048+MODP8192 260s algparse -v2 'ike=aes;none' (expect ERROR) 260s ERROR: IKE DH algorithm 'none' not permitted 260s algparse -v2 'ike=id2' (expect ERROR) 260s ERROR: IKE encryption algorithm 'id2' is not recognized 260s algparse -v2 'ike=3des-id2' (expect ERROR) 260s | appending IKE DH algorithm DH21[_0] 260s | token: '' '' '' 260s | appending IKE PRF algorithm HMAC_SHA2_512[_0] 260s | appending IKE PRF algorithm HMAC_SHA2_256[_0] 260s | appending IKE integrity algorithm HMAC_SHA2_512_256[_0] 260s | appending IKE integrity algorithm HMAC_SHA2_256_128[_0] 260s | parsing '3des-sha1;dh21' for IKE 260s | proposal: '3des-sha1;dh21' 260s | token: '' '' "3des" '-' 260s | token: '' "3des" '-' "sha1" ';' 260s | token: '-' "sha1" ';' "dh21" '' 260s | appending IKE encryption algorithm 3DES_CBC[_0] 260s | parsing prf: 260s | appending IKE PRF algorithm HMAC_SHA1[_0] 260s | token: ';' "dh21" '' '' 260s | - succeeded, advancing tokens 260s | parsing dh: 260s | appending IKE DH algorithm DH21[_0] 260s | token: '' '' '' 260s | appending IKE integrity algorithm HMAC_SHA1_96[_0] 260s | parsing '3des-sha1-ecp_521' for IKE 260s | proposal: '3des-sha1-ecp_521' 260s | token: '' '' "3des" '-' 260s | token: '' "3des" '-' "sha1" '-' 260s | token: '-' "sha1" '-' "ecp_521" '' 260s | appending IKE encryption algorithm 3DES_CBC[_0] 260s | parsing prf: 260s | appending IKE PRF algorithm HMAC_SHA1[_0] 260s | token: '-' "ecp_521" '' '' 260s | - succeeded, advancing tokens 260s | parsing dh: 260s | appending IKE DH algorithm DH21[_0] 260s | token: '' '' '' 260s | appending IKE integrity algorithm HMAC_SHA1_96[_0] 260s | parsing '3des+aes' for IKE 260s | proposal: '3des+aes' 260s | token: '' '' "3des" '+' 260s | token: '' "3des" '+' "aes" '' 260s | token: '+' "aes" '' '' 260s | appending IKE encryption algorithm 3DES_CBC[_0] 260s | token: '' '' '' 260s | appending IKE encryption algorithm AES_CBC[_0] 260s | appending IKE PRF algorithm HMAC_SHA2_512[_0] 260s | appending IKE PRF algorithm HMAC_SHA2_256[_0] 260s | appending IKE integrity algorithm HMAC_SHA2_512_256[_0] 260s | appending IKE integrity algorithm HMAC_SHA2_256_128[_0] 260s | appending IKE DH algorithm DH19[_0] 260s | appending IKE DH algorithm DH20[_0] 260s | appending IKE DH algorithm DH21[_0] 260s | appending IKE DH algorithm DH31[_0] 260s | appending IKE DH algorithm MODP4096[_0] 260s | appending IKE DH algorithm MODP3072[_0] 260s | appending IKE DH algorithm MODP2048[_0] 260s | appending IKE DH algorithm MODP8192[_0] 260s | parsing 'aes;none' for IKE 260s | proposal: 'aes;none' 260s | token: '' '' "aes" ';' 260s | token: '' "aes" ';' "none" '' 260s | token: ';' "none" '' '' 260s | appending IKE encryption algorithm AES_CBC[_0] 260s | parsing dh: 260s | appending IKE DH algorithm NONE[_0] 260s | token: '' '' '' 260s | appending IKE PRF algorithm HMAC_SHA2_512[_0] 260s | appending IKE PRF algorithm HMAC_SHA2_256[_0] 260s | appending IKE integrity algorithm HMAC_SHA2_512_256[_0] 260s | appending IKE integrity algorithm HMAC_SHA2_256_128[_0] 260s | parsing 'id2' for IKE 260s | proposal: 'id2' 260s | token: '' '' "id2" '' 260s | token: '' "id2" '' '' 260s ERROR: IKE PRF algorithm 'id2' is not recognized 260s algparse -v2 'ike=aes_ccm' (expect ERROR) 260s ERROR: IKE encryption algorithm 'aes_ccm' is not supported 260s algparse -v2 'ike=aes-sha1-sha2-ecp_521' (expect ERROR) 260s ERROR: IKE DH algorithm 'sha2' is not recognized 260s algparse -v2 'ike=aes-sha2-sha2;ecp_521' (expect ERROR) 260s ERROR: IKE DH algorithm 'sha2' is not recognized 260s algparse -v2 'ike=aes-sha1_96-sha2-ecp_521' (expect SUCCESS) 260s AES_CBC-HMAC_SHA1_96-HMAC_SHA2_256-DH21 260s algparse -v2 'ike=aes-sha1_96-sha2;ecp_521' (expect SUCCESS) 260s AES_CBC-HMAC_SHA1_96-HMAC_SHA2_256-DH21 260s algparse -v2 'ike=aes+aes-sha1+sha1-modp8192+modp8192' (expect SUCCESS) 260s AES_CBC-HMAC_SHA1-MODP8192 260s algparse -v2 'ike=3des+aes+aes-sha2+sha1+sha1-modp4096+modp8192+modp8192' (expect SUCCESS) 260s 3DES_CBC+AES_CBC-HMAC_SHA2_256+HMAC_SHA1-MODP4096+MODP8192 260s algparse -v2 'ike=aes+3des+aes-sha1+sha2+sha1-modp8192+modp4096+modp8192' (expect SUCCESS) 260s | ike_alg_byname() failed: IKE encryption algorithm 'id2' is not recognized 260s | ike_alg_byname() failed: IKE encryption algorithm 'id2' is not recognized 260s | parsing '3des-id2' for IKE 260s | proposal: '3des-id2' 260s | token: '' '' "3des" '-' 260s | token: '' "3des" '-' "id2" '' 260s | token: '-' "id2" '' '' 260s | appending IKE encryption algorithm 3DES_CBC[_0] 260s | parsing prf: 260s | ike_alg_byname() failed: IKE PRF algorithm 'id2' is not recognized 260s | lookup for PRF algorithm 'id2' failed 260s | - failed, saving error 'IKE PRF algorithm 'id2' is not recognized' and tossing result 260s | parsing integ: 260s | ike_alg_byname() failed: IKE integrity algorithm 'id2' is not recognized 260s | lookup for integrity algorithm 'id2' failed 260s | - and - failed, returning earlier PRF error 'IKE PRF algorithm 'id2' is not recognized' and discarding INTEG error 'IKE integrity algorithm 'id2' is not recognized') 260s | parsing 'aes_ccm' for IKE 260s | proposal: 'aes_ccm' 260s | token: '' '' "aes_ccm" '' 260s | token: '' "aes_ccm" '' '' 260s | alg_byname_ok() failed: IKE encryption algorithm 'aes_ccm' is not supported 260s | parsing 'aes-sha1-sha2-ecp_521' for IKE 260s | proposal: 'aes-sha1-sha2-ecp_521' 260s | token: '' '' "aes" '-' 260s | token: '' "aes" '-' "sha1" '-' 260s | token: '-' "sha1" '-' "sha2" '-' 260s | appending IKE encryption algorithm AES_CBC[_0] 260s | parsing prf: 260s | appending IKE PRF algorithm HMAC_SHA1[_0] 260s | token: '-' "sha2" '-' "ecp_521" '' 260s | - succeeded, advancing tokens 260s | parsing dh: 260s | ike_alg_byname() failed: IKE DH algorithm 'sha2' is not recognized 260s | lookup for DH algorithm 'sha2' failed 260s | ... failed 'IKE DH algorithm 'sha2' is not recognized' 260s | parsing 'aes-sha2-sha2;ecp_521' for IKE 260s | proposal: 'aes-sha2-sha2;ecp_521' 260s | token: '' '' "aes" '-' 260s | token: '' "aes" '-' "sha2" '-' 260s | token: '-' "sha2" '-' "sha2" ';' 260s | appending IKE encryption algorithm AES_CBC[_0] 260s | parsing prf: 260s | appending IKE PRF algorithm HMAC_SHA2_256[_0] 260s | token: '-' "sha2" ';' "ecp_521" '' 260s | - succeeded, advancing tokens 260s | parsing dh: 260s | ike_alg_byname() failed: IKE DH algorithm 'sha2' is not recognized 260s | lookup for DH algorithm 'sha2' failed 260s | ... failed 'IKE DH algorithm 'sha2' is not recognized' 260s | parsing 'aes-sha1_96-sha2-ecp_521' for IKE 260s | proposal: 'aes-sha1_96-sha2-ecp_521' 260s | token: '' '' "aes" '-' 260s | token: '' "aes" '-' "sha1_96" '-' 260s | token: '-' "sha1_96" '-' "sha2" '-' 260s | appending IKE encryption algorithm AES_CBC[_0] 260s | parsing prf: 260s | ike_alg_byname() failed: IKE PRF algorithm 'sha1_96' is not recognized 260s | lookup for PRF algorithm 'sha1_96' failed 260s | - failed, saving error 'IKE PRF algorithm 'sha1_96' is not recognized' and tossing result 260s | parsing integ: 260s | appending IKE integrity algorithm HMAC_SHA1_96[_0] 260s | token: '-' "sha2" '-' "ecp_521" '' 260s | parsing prf: 260s | appending IKE PRF algorithm HMAC_SHA2_256[_0] 260s | token: '-' "ecp_521" '' '' 260s | parsing dh: 260s | appending IKE DH algorithm DH21[_0] 260s | token: '' '' '' 260s | parsing 'aes-sha1_96-sha2;ecp_521' for IKE 260s | proposal: 'aes-sha1_96-sha2;ecp_521' 260s | token: '' '' "aes" '-' 260s | token: '' "aes" '-' "sha1_96" '-' 260s | token: '-' "sha1_96" '-' "sha2" ';' 260s | appending IKE encryption algorithm AES_CBC[_0] 260s | parsing prf: 260s | ike_alg_byname() failed: IKE PRF algorithm 'sha1_96' is not recognized 260s | lookup for PRF algorithm 'sha1_96' failed 260s | - failed, saving error 'IKE PRF algorithm 'sha1_96' is not recognized' and tossing result 260s | parsing integ: 260s | appending IKE integrity algorithm HMAC_SHA1_96[_0] 260s | token: '-' "sha2" ';' "ecp_521" '' 260s | parsing prf: 260s | appending IKE PRF algorithm HMAC_SHA2_256[_0] 260s | token: ';' "ecp_521" '' '' 260s | parsing dh: 260s | appending IKE DH algorithm DH21[_0] 260s | token: '' '' '' 260s | parsing 'aes+aes-sha1+sha1-modp8192+modp8192' for IKE 260s | proposal: 'aes+aes-sha1+sha1-modp8192+modp8192' 260s | token: '' '' "aes" '+' 260s | token: '' "aes" '+' "aes" '-' 260s | token: '+' "aes" '-' "sha1" '+' 260s | appending IKE encryption algorithm AES_CBC[_0] 260s | token: '-' "sha1" '+' "sha1" '-' 260s | appending IKE encryption algorithm AES_CBC[_0] 260s ipsec algparse: discarding duplicate IKE encryption algorithm AES_CBC 260s | parsing prf: 260s | appending IKE PRF algorithm HMAC_SHA1[_0] 260s | token: '+' "sha1" '-' "modp8192" '+' 260s | appending IKE PRF algorithm HMAC_SHA1[_0] 260s | token: '-' "modp8192" '+' "modp8192" '' 260s ipsec algparse: discarding duplicate IKE PRF algorithm HMAC_SHA1 260s | - succeeded, advancing tokens 260s | parsing dh: 260s | appending IKE DH algorithm MODP8192[_0] 260s | token: '+' "modp8192" '' '' 260s | appending IKE DH algorithm MODP8192[_0] 260s | token: '' '' '' 260s ipsec algparse: discarding duplicate IKE DH algorithm MODP8192 260s | appending IKE integrity algorithm HMAC_SHA1_96[_0] 260s | parsing '3des+aes+aes-sha2+sha1+sha1-modp4096+modp8192+modp8192' for IKE 260s | proposal: '3des+aes+aes-sha2+sha1+sha1-modp4096+modp8192+modp8192' 260s | token: '' '' "3des" '+' 260s | token: '' "3des" '+' "aes" '+' 260s | token: '+' "aes" '+' "aes" '-' 260s | appending IKE encryption algorithm 3DES_CBC[_0] 260s | token: '+' "aes" '-' "sha2" '+' 260s | appending IKE encryption algorithm AES_CBC[_0] 260s | token: '-' "sha2" '+' "sha1" '+' 260s | appending IKE encryption algorithm AES_CBC[_0] 260s ipsec algparse: discarding duplicate IKE encryption algorithm AES_CBC 260s | parsing prf: 260s | appending IKE PRF algorithm HMAC_SHA2_256[_0] 260s | token: '+' "sha1" '+' "sha1" '-' 260s | appending IKE PRF algorithm HMAC_SHA1[_0] 260s | token: '+' "sha1" '-' "modp4096" '+' 260s | appending IKE PRF algorithm HMAC_SHA1[_0] 260s | token: '-' "modp4096" '+' "modp8192" '+' 260s ipsec algparse: discarding duplicate IKE PRF algorithm HMAC_SHA1 260s | - succeeded, advancing tokens 260s | parsing dh: 260s | appending IKE DH algorithm MODP4096[_0] 260s | token: '+' "modp8192" '+' "modp8192" '' 260s | appending IKE DH algorithm MODP8192[_0] 260s | token: '+' "modp8192" '' '' 260s | appending IKE DH algorithm MODP8192[_0] 260s | token: '' '' '' 260s ipsec algparse: discarding duplicate IKE DH algorithm MODP8192 260s | appending IKE integrity algorithm HMAC_SHA2_256_128[_0] 260s | appending IKE integrity algorithm HMAC_SHA1_96[_0] 260s AES_CBC+3DES_CBC-HMAC_SHA1+HMAC_SHA2_256-MODP8192+MODP4096 260s algparse -v2 'ike=aes+aes+3des-sha1+sha1+sha2-modp8192+modp8192+modp4096' (expect SUCCESS) 260s AES_CBC+3DES_CBC-HMAC_SHA1+HMAC_SHA2_256-MODP8192+MODP4096 260s algparse -v2 'ike=aes+aes128+aes256' (expect SUCCESS) 260s AES_CBC-HMAC_SHA2_512+HMAC_SHA2_256-DH19+DH20+DH21+DH31+MODP4096+MODP3072+MODP2048+MODP8192 260s algparse -v2 'ike=aes128+aes+aes256' (expect SUCCESS) 260s AES_CBC_128+AES_CBC-HMAC_SHA2_512+HMAC_SHA2_256-DH19+DH20+DH21+DH31+MODP4096+MODP3072+MODP2048+MODP8192 260s algparse -v2 'ike=aes128+aes256+aes' (expect SUCCESS) 260s | parsing 'aes+3des+aes-sha1+sha2+sha1-modp8192+modp4096+modp8192' for IKE 260s | proposal: 'aes+3des+aes-sha1+sha2+sha1-modp8192+modp4096+modp8192' 260s | token: '' '' "aes" '+' 260s | token: '' "aes" '+' "3des" '+' 260s | token: '+' "3des" '+' "aes" '-' 260s | appending IKE encryption algorithm AES_CBC[_0] 260s | token: '+' "aes" '-' "sha1" '+' 260s | appending IKE encryption algorithm 3DES_CBC[_0] 260s | token: '-' "sha1" '+' "sha2" '+' 260s | appending IKE encryption algorithm AES_CBC[_0] 260s ipsec algparse: discarding duplicate IKE encryption algorithm AES_CBC 260s | parsing prf: 260s | appending IKE PRF algorithm HMAC_SHA1[_0] 260s | token: '+' "sha2" '+' "sha1" '-' 260s | appending IKE PRF algorithm HMAC_SHA2_256[_0] 260s | token: '+' "sha1" '-' "modp8192" '+' 260s | appending IKE PRF algorithm HMAC_SHA1[_0] 260s | token: '-' "modp8192" '+' "modp4096" '+' 260s ipsec algparse: discarding duplicate IKE PRF algorithm HMAC_SHA1 260s | - succeeded, advancing tokens 260s | parsing dh: 260s | appending IKE DH algorithm MODP8192[_0] 260s | token: '+' "modp4096" '+' "modp8192" '' 260s | appending IKE DH algorithm MODP4096[_0] 260s | token: '+' "modp8192" '' '' 260s | appending IKE DH algorithm MODP8192[_0] 260s | token: '' '' '' 260s ipsec algparse: discarding duplicate IKE DH algorithm MODP8192 260s | appending IKE integrity algorithm HMAC_SHA1_96[_0] 260s | appending IKE integrity algorithm HMAC_SHA2_256_128[_0] 260s | parsing 'aes+aes+3des-sha1+sha1+sha2-modp8192+modp8192+modp4096' for IKE 260s | proposal: 'aes+aes+3des-sha1+sha1+sha2-modp8192+modp8192+modp4096' 260s | token: '' '' "aes" '+' 260s | token: '' "aes" '+' "aes" '+' 260s | token: '+' "aes" '+' "3des" '-' 260s | appending IKE encryption algorithm AES_CBC[_0] 260s | token: '+' "3des" '-' "sha1" '+' 260s | appending IKE encryption algorithm AES_CBC[_0] 260s | token: '-' "sha1" '+' "sha1" '+' 260s | appending IKE encryption algorithm 3DES_CBC[_0] 260s ipsec algparse: discarding duplicate IKE encryption algorithm AES_CBC 260s | parsing prf: 260s | appending IKE PRF algorithm HMAC_SHA1[_0] 260s | token: '+' "sha1" '+' "sha2" '-' 260s | appending IKE PRF algorithm HMAC_SHA1[_0] 260s | token: '+' "sha2" '-' "modp8192" '+' 260s | appending IKE PRF algorithm HMAC_SHA2_256[_0] 260s | token: '-' "modp8192" '+' "modp8192" '+' 260s ipsec algparse: discarding duplicate IKE PRF algorithm HMAC_SHA1 260s | - succeeded, advancing tokens 260s | parsing dh: 260s | appending IKE DH algorithm MODP8192[_0] 260s | token: '+' "modp8192" '+' "modp4096" '' 260s | appending IKE DH algorithm MODP8192[_0] 260s | token: '+' "modp4096" '' '' 260s | appending IKE DH algorithm MODP4096[_0] 260s | token: '' '' '' 260s ipsec algparse: discarding duplicate IKE DH algorithm MODP8192 260s | appending IKE integrity algorithm HMAC_SHA1_96[_0] 260s | appending IKE integrity algorithm HMAC_SHA2_256_128[_0] 260s | parsing 'aes+aes128+aes256' for IKE 260s | proposal: 'aes+aes128+aes256' 260s | token: '' '' "aes" '+' 260s | token: '' "aes" '+' "aes128" '+' 260s | token: '+' "aes128" '+' "aes256" '' 260s | appending IKE encryption algorithm AES_CBC[_0] 260s | ike_alg_byname() failed: IKE encryption algorithm 'aes128' is not recognized 260s | token: '+' "aes256" '' '' 260s | appending IKE encryption algorithm AES_CBC[_128] 260s | ike_alg_byname() failed: IKE encryption algorithm 'aes256' is not recognized 260s | token: '' '' '' 260s | appending IKE encryption algorithm AES_CBC[_256] 260s ipsec algparse: discarding duplicate IKE encryption algorithm AES_CBC_128 260s ipsec algparse: discarding duplicate IKE encryption algorithm AES_CBC_256 260s | appending IKE PRF algorithm HMAC_SHA2_512[_0] 260s | appending IKE PRF algorithm HMAC_SHA2_256[_0] 260s | appending IKE integrity algorithm HMAC_SHA2_512_256[_0] 260s | appending IKE integrity algorithm HMAC_SHA2_256_128[_0] 260s | appending IKE DH algorithm DH19[_0] 260s | appending IKE DH algorithm DH20[_0] 260s | appending IKE DH algorithm DH21[_0] 260s | appending IKE DH algorithm DH31[_0] 260s | appending IKE DH algorithm MODP4096[_0] 260s | appending IKE DH algorithm MODP3072[_0] 260s | appending IKE DH algorithm MODP2048[_0] 260s | appending IKE DH algorithm MODP8192[_0] 260s | parsing 'aes128+aes+aes256' for IKE 260s | proposal: 'aes128+aes+aes256' 260s | token: '' '' "aes128" '+' 260s | token: '' "aes128" '+' "aes" '+' 260s | ike_alg_byname() failed: IKE encryption algorithm 'aes128' is not recognized 260s | token: '+' "aes" '+' "aes256" '' 260s | appending IKE encryption algorithm AES_CBC[_128] 260s | token: '+' "aes256" '' '' 260s | appending IKE encryption algorithm AES_CBC[_0] 260s | ike_alg_byname() failed: IKE encryption algorithm 'aes256' is not recognized 260s | token: '' '' '' 260s | appending IKE encryption algorithm AES_CBC[_256] 260s ipsec algparse: discarding duplicate IKE encryption algorithm AES_CBC_256 260s | appending IKE PRF algorithm HMAC_SHA2_512[_0] 260s | appending IKE PRF algorithm HMAC_SHA2_256[_0] 260s | appending IKE integrity algorithm HMAC_SHA2_512_256[_0] 260s | appending IKE integrity algorithm HMAC_SHA2_256_128[_0] 260s | appending IKE DH algorithm DH19[_0] 260s | appending IKE DH algorithm DH20[_0] 260s | appending IKE DH algorithm DH21[_0] 260s | appending IKE DH algorithm DH31[_0] 260s | appending IKE DH algorithm MODP4096[_0] 260s | appending IKE DH algorithm MODP3072[_0] 260s | appending IKE DH algorithm MODP2048[_0] 260s | appending IKE DH algorithm MODP8192[_0] 260s | parsing 'aes128+aes256+aes' for IKE 260s | proposal: 'aes128+aes256+aes' 260s | token: '' '' "aes128" '+' 260s | token: '' "aes128" '+' "aes256" '+' 260s | ike_alg_byname() failed: IKE encryption algorithm 'aes128' is not recognized 260s | token: '+' "aes256" '+' "aes" '' 260s | appending IKE encryption algorithm AES_CBC[_128] 260s | ike_alg_byname() failed: IKE encryption algorithm 'aes256' is not recognized 260s | token: '+' "aes" '' '' 260s | appending IKE encryption algorithm AES_CBC[_256] 260s | token: '' '' '' 260s | appending IKE encryption algorithm AES_CBC[_0] 260s | appending IKE PRF algorithm HMAC_SHA2_512[_0] 260s | appending IKE PRF algorithm HMAC_SHA2_256[_0] 260s | appending IKE integrity algorithm HMAC_SHA2_512_256[_0] 260s | appending IKE integrity algorithm HMAC_SHA2_256_128[_0] 260s | appending IKE DH algorithm DH19[_0] 260s | appending IKE DH algorithm DH20[_0] 260s | appending IKE DH algorithm DH21[_0] 260s | appending IKE DH algorithm DH31[_0] 260s | appending IKE DH algorithm MODP4096[_0] 260s | appending IKE DH algorithm MODP3072[_0] 260s | appending IKE DH algorithm MODP2048[_0] 260s | appending IKE DH algorithm MODP8192[_0] 260s | parsing 'aes-sha1-modp8192,aes-sha1-modp8192,aes-sha1-modp8192' for IKE 260s | proposal: 'aes-sha1-modp8192' 260s | token: '' '' "aes" '-' 260s | token: '' "aes" '-' "sha1" '-' 260s | token: '-' "sha1" '-' "modp8192" '' 260s | appending IKE encryption algorithm AES_CBC[_0] 260s | parsing prf: 260s | appending IKE PRF algorithm HMAC_SHA1[_0] 260s | token: '-' "modp8192" '' '' 260s | - succeeded, advancing tokens 260s | parsing dh: 260s | appending IKE DH algorithm MODP8192[_0] 260s | token: '' '' '' 260s | appending IKE integrity algorithm HMAC_SHA1_96[_0] 260s | proposal: 'aes-sha1-modp8192' 260s | token: '' '' "aes" '-' 260s | token: '' "aes" '-' "sha1" '-' 260s | token: '-' "sha1" '-' "modp8192" '' 260s | appending IKE encryption algorithm AES_CBC[_0] 260s | parsing prf: 260s | appending IKE PRF algorithm HMAC_SHA1[_0] 260s | token: '-' "modp8192" '' '' 260s | - succeeded, advancing tokens 260s | parsing dh: 260s | appending IKE DH algorithm MODP8192[_0] 260s | token: '' '' '' 260s | appending IKE integrity algorithm HMAC_SHA1_96[_0] 260s | proposal: 'aes-sha1-modp8192' 260s | token: '' '' "aes" '-' 260s | token: '' "aes" '-' "sha1" '-' 260s | token: '-' "sha1" '-' "modp8192" '' 260s | appending IKE encryption algorithm AES_CBC[_0] 260s | parsing prf: 260s | appending IKE PRF algorithm HMAC_SHA1[_0] 260s | token: '-' "modp8192" '' '' 260s | - succeeded, advancing tokens 260s | parsing dh: 260s | appending IKE DH algorithm MODP8192[_0] 260s | token: '' '' '' 260s | appending IKE integrity algorithm HMAC_SHA1_96[_0] 260s | parsing 'aes-sha1-modp8192,aes-sha2-modp8192,aes-sha1-modp8192' for IKE 260s | proposal: 'aes-sha1-modp8192' 260s | token: '' '' "aes" '-' 260s | token: '' "aes" '-' "sha1" '-' 260s | token: '-' "sha1" '-' "modp8192" '' 260s | appending IKE encryption algorithm AES_CBC[_0] 260s | parsing prf: 260s | appending IKE PRF algorithm HMAC_SHA1[_0] 260s | token: '-' "modp8192" '' '' 260s | - succeeded, advancing tokens 260s | parsing dh: 260s | appending IKE DH algorithm MODP8192[_0] 260s | token: '' '' '' 260s | appending IKE integrity algorithm HMAC_SHA1_96[_0] 260s | proposal: 'aes-sha2-modp8192' 260s | token: '' '' "aes" '-' 260s | token: '' "aes" '-' "sha2" '-' 260s | token: '-' "sha2" '-' "modp8192" '' 260s | appending IKE encryption algorithm AES_CBC[_0] 260s | parsing prf: 260s | appending IKE PRF algorithm HMAC_SHA2_256[_0] 260s | token: '-' "modp8192" '' '' 260s | - succeeded, advancing tokens 260s | parsing dh: 260s | appending IKE DH algorithm MODP8192[_0] 260s | token: '' '' '' 260s | appending IKE integrity algorithm HMAC_SHA2_256_128[_0] 260s | proposal: 'aes-sha1-modp8192' 260s | token: '' '' "aes" '-' 260s | token: '' "aes" '-' "sha1" '-' 260s | token: '-' "sha1" '-' "modp8192" '' 260s | appending IKE encryption algorithm AES_CBC[_0] 260s | parsing prf: 260s | appending IKE PRF algorithm HMAC_SHA1[_0] 260s | token: '-' "modp8192" '' '' 260s | - succeeded, advancing tokens 260s | parsing dh: 260s | appending IKE DH algorithm MODP8192[_0] 260s | token: '' '' '' 260s | appending IKE integrity algorithm HMAC_SHA1_96[_0] 260s | parsing 'aes_gcm' for IKE 260s | proposal: 'aes_gcm' 260s | token: '' '' "aes_gcm" '' 260s | token: '' "aes_gcm" '' '' 260s | token: '' '' '' 260s | appending IKE encryption algorithm AES_GCM_16[_0] 260s | appending IKE PRF algorithm HMAC_SHA2_512[_0] 260s | appending IKE PRF algorithm HMAC_SHA2_256[_0] 260s | appending IKE integrity algorithm NONE[_0] 260s | appending IKE DH algorithm DH19[_0] 260s | appending IKE DH algorithm DH20[_0] 260s | appending IKE DH algorithm DH21[_0] 260s | appending IKE DH algorithm DH31[_0] 260s | appending IKE DH algorithm MODP4096[_0] 260s | appending IKE DH algorithm MODP3072[_0] 260s | appending IKE DH algorithm MODP2048[_0] 260s | appending IKE DH algorithm MODP8192[_0] 260s | parsing 'aes_gcm-sha2' for IKE 260s | proposal: 'aes_gcm-sha2' 260s | token: '' '' "aes_gcm" '-' 260s | token: '' "aes_gcm" '-' "sha2" '' 260s | token: '-' "sha2" '' '' 260s | appending IKE encryption algorithm AES_GCM_16[_0] 260s | parsing prf: 260s | appending IKE PRF algorithm HMAC_SHA2_256[_0] 260s | token: '' '' '' 260s | - succeeded, advancing tokens 260s | appending IKE integrity algorithm NONE[_0] 260s | appending IKE DH algorithm DH19[_0] 260s | appending IKE DH algorithm DH20[_0] 260s | appending IKE DH algorithm DH21[_0] 260s | appending IKE DH algorithm DH31[_0] 260s | appending IKE DH algorithm MODP4096[_0] 260s | appending IKE DH algorithm MODP3072[_0] 260s | appending IKE DH algorithm MODP2048[_0] 260s | appending IKE DH algorithm MODP8192[_0] 260s | parsing 'aes_gcm-sha2-modp2048' for IKE 260s | proposal: 'aes_gcm-sha2-modp2048' 260s | token: '' '' "aes_gcm" '-' 260s | token: '' "aes_gcm" '-' "sha2" '-' 260s | token: '-' "sha2" '-' "modp2048" '' 260s | appending IKE encryption algorithm AES_GCM_16[_0] 260s | parsing prf: 260s | appending IKE PRF algorithm HMAC_SHA2_256[_0] 260s | token: '-' "modp2048" '' '' 260s | - succeeded, advancing tokens 260s | parsing dh: 260s | appending IKE DH algorithm MODP2048[_0] 260s | token: '' '' '' 260s | appending IKE integrity algorithm NONE[_0] 260s | parsing 'aes_gcm-sha2;modp2048' for IKE 260s | proposal: 'aes_gcm-sha2;modp2048' 260s | token: '' '' "aes_gcm" '-' 260s | token: '' "aes_gcm" '-' "sha2" ';' 260s | token: '-' "sha2" ';' "modp2048" '' 260s | appending IKE encryption algorithm AES_GCM_16[_0] 260s | parsing prf: 260s | appending IKE PRF algorithm HMAC_SHA2_256[_0] 260s | token: ';' "modp2048" '' '' 260s | - succeeded, advancing tokens 260s | parsing dh: 260s | appending IKE DH algorithm MODP2048[_0] 260s | token: '' '' '' 260s | appending IKE integrity algorithm NONE[_0] 260s | parsing 'aes_gcm-modp2048' for IKE 260s | proposal: 'aes_gcm-modp2048' 260s | token: '' '' "aes_gcm" '-' 260s | token: '' "aes_gcm" '-' "modp2048" '' 260s | token: '-' "modp2048" '' '' 260s | appending IKE encryption algorithm AES_GCM_16[_0] 260s | parsing prf: 260s | ike_alg_byname() failed: IKE PRF algorithm 'modp2048' is not recognized 260s | lookup for PRF algorithm 'modp2048' failed 260s | - failed, saving error 'IKE PRF algorithm 'modp2048' is not recognized' and tossing result 260s | parsing integ: 260s | ike_alg_byname() failed: IKE integrity algorithm 'modp2048' is not recognized 260s | lookup for integrity algorithm 'modp2048' failed 260s | - and - failed, returning earlier PRF error 'IKE PRF algorithm 'modp2048' is not recognized' and discarding INTEG error 'IKE integrity algorithm 'modp2048' is not recognized') 260s | parsing 'aes_gcm;modp2048' for IKE 260s | proposal: 'aes_gcm;modp2048' 260s | token: '' '' "aes_gcm" ';' 260s | token: '' "aes_gcm" ';' "modp2048" '' 260s | token: ';' "modp2048" '' '' 260s | appending IKE encryption algorithm AES_GCM_16[_0] 260s | parsing dh: 260s | appending IKE DH algorithm MODP2048[_0] 260s | token: '' '' '' 260s | appending IKE PRF algorithm HMAC_SHA2_512[_0] 260s | appending IKE PRF algorithm HMAC_SHA2_256[_0] 260s | appending IKE integrity algorithm NONE[_0] 260s | parsing 'aes_gcm-none' for IKE 260s | proposal: 'aes_gcm-none' 260s | token: '' '' "aes_gcm" '-' 260s | token: '' "aes_gcm" '-' "none" '' 260s | token: '-' "none" '' '' 260s | appending IKE encryption algorithm AES_GCM_16[_0] 260s | parsing prf: 260s | ike_alg_byname() failed: IKE PRF algorithm 'none' is not recognized 260s | lookup for PRF algorithm 'none' failed 260s | - failed, saving error 'IKE PRF algorithm 'none' is not recognized' and tossing result 260s | parsing integ: 260s | appending IKE integrity algorithm NONE[_0] 260s | token: '' '' '' 260s | appending IKE PRF algorithm HMAC_SHA2_512[_0] 260s | appending IKE PRF algorithm HMAC_SHA2_256[_0] 260s | appending IKE DH algorithm DH19[_0] 260s | appending IKE DH algorithm DH20[_0] 260s | appending IKE DH algorithm DH21[_0] 260s | appending IKE DH algorithm DH31[_0] 260s | appending IKE DH algorithm MODP4096[_0] 260s | appending IKE DH algorithm MODP3072[_0] 260s | appending IKE DH algorithm MODP2048[_0] 260s | appending IKE DH algorithm MODP8192[_0] 260s | parsing 'aes_gcm-none-sha2' for IKE 260s | proposal: 'aes_gcm-none-sha2' 260s | token: '' '' "aes_gcm" '-' 260s | token: '' "aes_gcm" '-' "none" '-' 260s | token: '-' "none" '-' "sha2" '' 260s | appending IKE encryption algorithm AES_GCM_16[_0] 260s | parsing prf: 260s | ike_alg_byname() failed: IKE PRF algorithm 'none' is not recognized 260s | lookup for PRF algorithm 'none' failed 260s | - failed, saving error 'IKE PRF algorithm 'none' is not recognized' and tossing result 260s | parsing integ: 260s | appending IKE integrity algorithm NONE[_0] 260s | token: '-' "sha2" '' '' 260s | parsing prf: 260s | appending IKE PRF algorithm HMAC_SHA2_256[_0] 260s | token: '' '' '' 260s | appending IKE DH algorithm DH19[_0] 260s | appending IKE DH algorithm DH20[_0] 260s | appending IKE DH algorithm DH21[_0] 260s | appending IKE DH algorithm DH31[_0] 260s | appending IKE DH algorithm MODP4096[_0] 260s | appending IKE DH algorithm MODP3072[_0] 260s | appending IKE DH algorithm MODP2048[_0] 260s | appending IKE DH algorithm MODP8192[_0] 260s | parsing 'aes_gcm-none-sha2-modp2048' for IKE 260s | proposal: 'aes_gcm-none-sha2-modp2048' 260s | token: '' '' "aes_gcm" '-' 260s | token: '' "aes_gcm" '-' "none" '-' 260s | token: '-' "none" '-' "sha2" '-' 260s | appending IKE encryption algorithm AES_GCM_16[_0] 260s | parsing prf: 260s | ike_alg_byname() failed: IKE PRF algorithm 'none' is not recognized 260s | lookup for PRF algorithm 'none' failed 260s | - failed, saving error 'IKE PRF algorithm 'none' is not recognized' and tossing result 260s | parsing integ: 260s | appending IKE integrity algorithm NONE[_0] 260s | token: '-' "sha2" '-' "modp2048" '' 260s | parsing prf: 260s | appending IKE PRF algorithm HMAC_SHA2_256[_0] 260s | token: '-' "modp2048" '' '' 260s | parsing dh: 260s | appending IKE DH algorithm MODP2048[_0] 260s | token: '' '' '' 260s | parsing 'aes_gcm-none-sha2;modp2048' for IKE 260s | proposal: 'aes_gcm-none-sha2;modp2048' 260s | token: '' '' "aes_gcm" '-' 260s | token: '' "aes_gcm" '-' "none" '-' 260s | token: '-' "none" '-' "sha2" ';' 260s | appending IKE encryption algorithm AES_GCM_16[_0] 260s | parsing prf: 260s | ike_alg_byname() failed: IKE PRF algorithm 'none' is not recognized 260s | lookup for PRF algorithm 'none' failed 260s | - failed, saving error 'IKE PRF algorithm 'none' is not recognized' and tossing result 260s | parsing integ: 260s | appending IKE integrity algorithm NONE[_0] 260s | token: '-' "sha2" ';' "modp2048" '' 260s | parsing prf: 260s | appending IKE PRF algorithm HMAC_SHA2_256[_0] 260s | token: ';' "modp2048" '' '' 260s | parsing dh: 260s | appending IKE DH algorithm MODP2048[_0] 260s | token: '' '' '' 260s | parsing 'aes_gcm-none-modp2048' for IKE 260s | proposal: 'aes_gcm-none-modp2048' 260s | token: '' '' "aes_gcm" '-' 260s | token: '' "aes_gcm" '-' "none" '-' 260s | token: '-' "none" '-' "modp2048" '' 260s | appending IKE encryption algorithm AES_GCM_16[_0] 260s | parsing prf: 260s | ike_alg_byname() failed: IKE PRF algorithm 'none' is not recognized 260s | lookup for PRF algorithm 'none' failed 260s | - failed, saving error 'IKE PRF algorithm 'none' is not recognized' and tossing result 260s | parsing integ: 260s | appending IKE integrity algorithm NONE[_0] 260s | token: '-' "modp2048" '' '' 260s | parsing prf: 260s | ike_alg_byname() failed: IKE PRF algorithm 'modp2048' is not recognized 260s | lookup for PRF algorithm 'modp2048' failed 260s | -- failed 'IKE PRF algorithm 'modp2048' is not recognized' 260s | parsing 'aes_gcm-none;modp2048' for IKE 260s | proposal: 'aes_gcm-none;modp2048' 260s | token: '' '' "aes_gcm" '-' 260s | token: '' "aes_gcm" '-' "none" ';' 260s | token: '-' "none" ';' "modp2048" '' 260s | appending IKE encryption algorithm AES_GCM_16[_0] 260s | parsing prf: 260s | ike_alg_byname() failed: IKE PRF algorithm 'none' is not recognized 260s | lookup for PRF algorithm 'none' failed 260s | - failed, saving error 'IKE PRF algorithm 'none' is not recognized' and tossing result 260s | parsing integ: 260s | appending IKE integrity algorithm NONE[_0] 260s | token: ';' "modp2048" '' '' 260s | parsing dh: 260s | appending IKE DH algorithm MODP2048[_0] 260s | token: '' '' '' 260s | appending IKE PRF algorithm HMAC_SHA2_512[_0] 260s | appending IKE PRF algorithm HMAC_SHA2_256[_0] 260s | parsing 'aes_gcm-sha1-none-modp2048' for IKE 260s | proposal: 'aes_gcm-sha1-none-modp2048' 260s | token: '' '' "aes_gcm" '-' 260s | token: '' "aes_gcm" '-' "sha1" '-' 260s | token: '-' "sha1" '-' "none" '-' 260s | appending IKE encryption algorithm AES_GCM_16[_0] 260s | parsing prf: 260s | appending IKE PRF algorithm HMAC_SHA1[_0] 260s | token: '-' "none" '-' "modp2048" '' 260s | - succeeded, advancing tokens 260s | parsing dh: 260s | appending IKE DH algorithm NONE[_0] 260s | token: '-' "modp2048" '' '' 260s | parsing 'aes_gcm-sha1-none;modp2048' for IKE 260s | proposal: 'aes_gcm-sha1-none;modp2048' 260s | token: '' '' "aes_gcm" '-' 260s | token: '' "aes_gcm" '-' "sha1" '-' 260s | token: '-' "sha1" '-' "none" ';' 260s | appending IKE encryption algorithm AES_GCM_16[_0] 260s | parsing prf: 260s | appending IKE PRF algorithm HMAC_SHA1[_0] 260s | token: '-' "none" ';' "modp2048" '' 260s AES_CBC_128+AES_CBC_256+AES_CBC-HMAC_SHA2_512+HMAC_SHA2_256-DH19+DH20+DH21+DH31+MODP4096+MODP3072+MODP2048+MODP8192 260s algparse -v2 'ike=aes-sha1-modp8192,aes-sha1-modp8192,aes-sha1-modp8192' (expect SUCCESS) 260s AES_CBC-HMAC_SHA1-MODP8192 260s algparse -v2 'ike=aes-sha1-modp8192,aes-sha2-modp8192,aes-sha1-modp8192' (expect SUCCESS) 260s AES_CBC-HMAC_SHA1-MODP8192 260s AES_CBC-HMAC_SHA2_256-MODP8192 260s algparse -v2 'ike=aes_gcm' (expect SUCCESS) 260s AES_GCM_16-HMAC_SHA2_512+HMAC_SHA2_256-DH19+DH20+DH21+DH31+MODP4096+MODP3072+MODP2048+MODP8192 260s algparse -v2 'ike=aes_gcm-sha2' (expect SUCCESS) 260s AES_GCM_16-HMAC_SHA2_256-DH19+DH20+DH21+DH31+MODP4096+MODP3072+MODP2048+MODP8192 260s algparse -v2 'ike=aes_gcm-sha2-modp2048' (expect SUCCESS) 260s AES_GCM_16-HMAC_SHA2_256-MODP2048 260s algparse -v2 'ike=aes_gcm-sha2;modp2048' (expect SUCCESS) 260s AES_GCM_16-HMAC_SHA2_256-MODP2048 260s algparse -v2 'ike=aes_gcm-modp2048' (expect ERROR) 260s ERROR: IKE PRF algorithm 'modp2048' is not recognized 260s algparse -v2 'ike=aes_gcm;modp2048' (expect SUCCESS) 260s AES_GCM_16-HMAC_SHA2_512+HMAC_SHA2_256-MODP2048 260s algparse -v2 'ike=aes_gcm-none' (expect SUCCESS) 260s AES_GCM_16-HMAC_SHA2_512+HMAC_SHA2_256-DH19+DH20+DH21+DH31+MODP4096+MODP3072+MODP2048+MODP8192 260s algparse -v2 'ike=aes_gcm-none-sha2' (expect SUCCESS) 260s AES_GCM_16-HMAC_SHA2_256-DH19+DH20+DH21+DH31+MODP4096+MODP3072+MODP2048+MODP8192 260s algparse -v2 'ike=aes_gcm-none-sha2-modp2048' (expect SUCCESS) 260s AES_GCM_16-HMAC_SHA2_256-MODP2048 260s algparse -v2 'ike=aes_gcm-none-sha2;modp2048' (expect SUCCESS) 260s AES_GCM_16-HMAC_SHA2_256-MODP2048 260s algparse -v2 'ike=aes_gcm-none-modp2048' (expect ERROR) 260s ERROR: IKE PRF algorithm 'modp2048' is not recognized 260s algparse -v2 'ike=aes_gcm-none;modp2048' (expect SUCCESS) 260s AES_GCM_16-HMAC_SHA2_512+HMAC_SHA2_256-MODP2048 260s algparse -v2 'ike=aes_gcm-sha1-none-modp2048' (expect ERROR) 260s ERROR: IKE proposal contains unexpected 'modp2048' 260s algparse -v2 'ike=aes_gcm-sha1-none;modp2048' (expect ERROR) 260s ERROR: IKE proposal contains unexpected 'modp2048' 260s algparse -v2 'ike=aes+aes_gcm' (expect ERROR) 260s ERROR: AEAD and non-AEAD IKE encryption algorithm cannot be combined 260s algparse -v2 'ike=,' (expect ERROR) 260s ERROR: IKE encryption algorithm is empty 260s algparse -v2 'ike=aes,' (expect ERROR) 260s ERROR: IKE encryption algorithm is empty 260s algparse -v2 'ike=aes,,aes' (expect ERROR) 260s ERROR: IKE encryption algorithm is empty 260s algparse -v2 'ike=,aes' (expect ERROR) 260s ERROR: IKE encryption algorithm is empty 260s algparse -v2 'ike=-' (expect ERROR) 260s ERROR: IKE encryption algorithm is empty 260s algparse -v2 'ike=+' (expect ERROR) 260s ERROR: IKE encryption algorithm is empty 260s algparse -v2 'ike=;' (expect ERROR) 260s ERROR: IKE encryption algorithm is empty 260s algparse -v2 'ike=aes-' (expect ERROR) 260s ERROR: IKE PRF algorithm is empty 260s algparse -v2 'ike=aes+' (expect ERROR) 260s ERROR: IKE encryption algorithm is empty 260s algparse -v2 'ike=aes;' (expect ERROR) 260s ERROR: IKE DH algorithm is empty 260s algparse -v2 'ike=-aes' (expect ERROR) 260s ERROR: IKE encryption algorithm is empty 260s algparse -v2 'ike=+aes' (expect ERROR) 260s ERROR: IKE encryption algorithm is empty 260s algparse -v2 'ike=;aes' (expect ERROR) 260s ERROR: IKE encryption algorithm is empty 260s algparse -v2 'ike=aes+-' (expect ERROR) 260s ERROR: IKE encryption algorithm is empty 260s algparse -v2 'ike=aes+;' (expect ERROR) 260s ERROR: IKE encryption algorithm is empty 260s algparse -v2 'ike=aes++' (expect ERROR) 260s ERROR: IKE encryption algorithm is empty 260s testing -ta 260s | - succeeded, advancing tokens 260s | parsing dh: 260s | appending IKE DH algorithm NONE[_0] 260s | token: ';' "modp2048" '' '' 260s | parsing 'aes+aes_gcm' for IKE 260s | proposal: 'aes+aes_gcm' 260s | token: '' '' "aes" '+' 260s | token: '' "aes" '+' "aes_gcm" '' 260s | token: '+' "aes_gcm" '' '' 260s | appending IKE encryption algorithm AES_CBC[_0] 260s | token: '' '' '' 260s | appending IKE encryption algorithm AES_GCM_16[_0] 260s | appending IKE PRF algorithm HMAC_SHA2_512[_0] 260s | appending IKE PRF algorithm HMAC_SHA2_256[_0] 260s | appending IKE DH algorithm DH19[_0] 260s | appending IKE DH algorithm DH20[_0] 260s | appending IKE DH algorithm DH21[_0] 260s | appending IKE DH algorithm DH31[_0] 260s | appending IKE DH algorithm MODP4096[_0] 260s | appending IKE DH algorithm MODP3072[_0] 260s | appending IKE DH algorithm MODP2048[_0] 260s | appending IKE DH algorithm MODP8192[_0] 260s | parsing ',' for IKE 260s | proposal: '' 260s | token: '' '' "" '' 260s | token: '' "" '' '' 260s | parsing 'aes,' for IKE 260s | proposal: 'aes' 260s | token: '' '' "aes" '' 260s | token: '' "aes" '' '' 260s | token: '' '' '' 260s | appending IKE encryption algorithm AES_CBC[_0] 260s | appending IKE PRF algorithm HMAC_SHA2_512[_0] 260s | appending IKE PRF algorithm HMAC_SHA2_256[_0] 260s | appending IKE integrity algorithm HMAC_SHA2_512_256[_0] 260s | appending IKE integrity algorithm HMAC_SHA2_256_128[_0] 260s | appending IKE DH algorithm DH19[_0] 260s | appending IKE DH algorithm DH20[_0] 260s | appending IKE DH algorithm DH21[_0] 260s | appending IKE DH algorithm DH31[_0] 260s | appending IKE DH algorithm MODP4096[_0] 260s | appending IKE DH algorithm MODP3072[_0] 260s | appending IKE DH algorithm MODP2048[_0] 260s | appending IKE DH algorithm MODP8192[_0] 260s | proposal: '' 260s | token: '' '' "" '' 260s | token: '' "" '' '' 260s | parsing 'aes,,aes' for IKE 260s | proposal: 'aes' 260s | token: '' '' "aes" '' 260s | token: '' "aes" '' '' 260s | token: '' '' '' 260s | appending IKE encryption algorithm AES_CBC[_0] 260s | appending IKE PRF algorithm HMAC_SHA2_512[_0] 260s | appending IKE PRF algorithm HMAC_SHA2_256[_0] 260s | appending IKE integrity algorithm HMAC_SHA2_512_256[_0] 260s | appending IKE integrity algorithm HMAC_SHA2_256_128[_0] 260s | appending IKE DH algorithm DH19[_0] 260s | appending IKE DH algorithm DH20[_0] 260s | appending IKE DH algorithm DH21[_0] 260s | appending IKE DH algorithm DH31[_0] 260s | appending IKE DH algorithm MODP4096[_0] 260s | appending IKE DH algorithm MODP3072[_0] 260s | appending IKE DH algorithm MODP2048[_0] 260s | appending IKE DH algorithm MODP8192[_0] 260s | proposal: '' 260s | token: '' '' "" '' 260s | token: '' "" '' '' 260s | parsing ',aes' for IKE 260s | proposal: '' 260s | token: '' '' "" '' 260s | token: '' "" '' '' 260s | parsing '-' for IKE 260s | proposal: '-' 260s | token: '' '' "" '-' 260s | token: '' "" '-' "" '' 260s | parsing '+' for IKE 260s | proposal: '+' 260s | token: '' '' "" '+' 260s | token: '' "" '+' "" '' 260s | parsing ';' for IKE 260s | proposal: ';' 260s | token: '' '' "" ';' 260s | token: '' "" ';' "" '' 260s | parsing 'aes-' for IKE 260s | proposal: 'aes-' 260s | token: '' '' "aes" '-' 260s | token: '' "aes" '-' "" '' 260s | token: '-' "" '' '' 260s | appending IKE encryption algorithm AES_CBC[_0] 260s | parsing prf: 260s | - failed, saving error 'IKE PRF algorithm is empty' and tossing result 260s | parsing integ: 260s | - and - failed, returning earlier PRF error 'IKE PRF algorithm is empty' and discarding INTEG error 'IKE integrity algorithm is empty') 260s | parsing 'aes+' for IKE 260s | proposal: 'aes+' 260s | token: '' '' "aes" '+' 260s | token: '' "aes" '+' "" '' 260s | token: '+' "" '' '' 260s | appending IKE encryption algorithm AES_CBC[_0] 260s | parsing 'aes;' for IKE 260s | proposal: 'aes;' 260s | token: '' '' "aes" ';' 260s | token: '' "aes" ';' "" '' 260s | token: ';' "" '' '' 260s | appending IKE encryption algorithm AES_CBC[_0] 260s | parsing dh: 260s | ... failed 'IKE DH algorithm is empty' 260s | parsing '-aes' for IKE 260s | proposal: '-aes' 260s | token: '' '' "" '-' 260s | token: '' "" '-' "aes" '' 260s | parsing '+aes' for IKE 260s | proposal: '+aes' 260s | token: '' '' "" '+' 260s | token: '' "" '+' "aes" '' 260s | parsing ';aes' for IKE 260s | proposal: ';aes' 260s | token: '' '' "" ';' 260s | token: '' "" ';' "aes" '' 260s | parsing 'aes+-' for IKE 260s | proposal: 'aes+-' 260s | token: '' '' "aes" '+' 260s | token: '' "aes" '+' "" '-' 260s | token: '+' "" '-' "" '' 260s | appending IKE encryption algorithm AES_CBC[_0] 260s | parsing 'aes+;' for IKE 260s | proposal: 'aes+;' 260s | token: '' '' "aes" '+' 260s | token: '' "aes" '+' "" ';' 260s | token: '+' "" ';' "" '' 260s | appending IKE encryption algorithm AES_CBC[_0] 260s | parsing 'aes++' for IKE 260s | proposal: 'aes++' 260s | token: '' '' "aes" '+' 260s | token: '' "aes" '+' "" '+' 260s | token: '+' "" '+' "" '' 260s | appending IKE encryption algorithm AES_CBC[_0] 260s ipsec algparse: leak detective found no leaks 260s ipsec algparse: Encryption algorithms: 260s ipsec algparse: AES_CCM_16 {256,192,*128} IKEv1: ESP IKEv2: ESP FIPS aes_ccm, aes_ccm_c 260s ipsec algparse: AES_CCM_12 {256,192,*128} IKEv1: ESP IKEv2: ESP FIPS aes_ccm_b 260s ipsec algparse: AES_CCM_8 {256,192,*128} IKEv1: ESP IKEv2: ESP FIPS aes_ccm_a 260s ipsec algparse: 3DES_CBC [*192] IKEv1: IKE ESP IKEv2: IKE ESP FIPS NSS(CBC) 3des 260s ipsec algparse: CAMELLIA_CTR {256,192,*128} IKEv1: ESP IKEv2: ESP 260s ipsec algparse: CAMELLIA_CBC {256,192,*128} IKEv1: IKE ESP IKEv2: IKE ESP NSS(CBC) camellia 260s ipsec algparse: AES_GCM_16 {256,192,*128} IKEv1: ESP IKEv2: IKE ESP FIPS NSS(AEAD) aes_gcm, aes_gcm_c 260s ipsec algparse: AES_GCM_12 {256,192,*128} IKEv1: ESP IKEv2: IKE ESP FIPS NSS(AEAD) aes_gcm_b 260s ipsec algparse: AES_GCM_8 {256,192,*128} IKEv1: ESP IKEv2: IKE ESP FIPS NSS(AEAD) aes_gcm_a 260s ipsec algparse: AES_CTR {256,192,*128} IKEv1: IKE ESP IKEv2: IKE ESP FIPS NSS(CTR) aesctr 260s ipsec algparse: AES_CBC {256,192,*128} IKEv1: IKE ESP IKEv2: IKE ESP FIPS NSS(CBC) aes 260s ipsec algparse: NULL_AUTH_AES_GMAC {256,192,*128} IKEv1: ESP IKEv2: ESP FIPS aes_gmac 260s ipsec algparse: NULL [] IKEv1: ESP IKEv2: ESP NULL 260s ipsec algparse: CHACHA20_POLY1305 [*256] IKEv1: IKEv2: IKE ESP NSS(AEAD) chacha20poly1305 260s ipsec algparse: Hash algorithms: 260s ipsec algparse: MD5 IKEv1: IKE IKEv2: NSS 260s ipsec algparse: SHA1 IKEv1: IKE IKEv2: IKE FIPS NSS sha 260s ipsec algparse: SHA2_256 IKEv1: IKE IKEv2: IKE FIPS NSS sha2, sha256 260s ipsec algparse: SHA2_384 IKEv1: IKE IKEv2: IKE FIPS NSS sha384 260s ipsec algparse: SHA2_512 IKEv1: IKE IKEv2: IKE FIPS NSS sha512 260s ipsec algparse: IDENTITY IKEv1: IKEv2: FIPS 260s ipsec algparse: PRF algorithms: 260s ipsec algparse: HMAC_MD5 IKEv1: IKE IKEv2: IKE NSS md5 260s ipsec algparse: HMAC_SHA1 IKEv1: IKE IKEv2: IKE FIPS NSS sha, sha1 260s ipsec algparse: HMAC_SHA2_256 IKEv1: IKE IKEv2: IKE FIPS NSS sha2, sha256, sha2_256 260s ipsec algparse: HMAC_SHA2_384 IKEv1: IKE IKEv2: IKE FIPS NSS sha384, sha2_384 260s ipsec algparse: HMAC_SHA2_512 IKEv1: IKE IKEv2: IKE FIPS NSS sha512, sha2_512 260s ipsec algparse: AES_XCBC IKEv1: IKEv2: IKE native(XCBC) aes128_xcbc 260s ipsec algparse: Integrity algorithms: 260s ipsec algparse: HMAC_MD5_96 IKEv1: IKE ESP AH IKEv2: IKE ESP AH NSS md5, hmac_md5 260s ipsec algparse: HMAC_SHA1_96 IKEv1: IKE ESP AH IKEv2: IKE ESP AH FIPS NSS sha, sha1, sha1_96, hmac_sha1 260s ipsec algparse: HMAC_SHA2_512_256 IKEv1: IKE ESP AH IKEv2: IKE ESP AH FIPS NSS sha512, sha2_512, sha2_512_256, hmac_sha2_512 260s ipsec algparse: HMAC_SHA2_384_192 IKEv1: IKE ESP AH IKEv2: IKE ESP AH FIPS NSS sha384, sha2_384, sha2_384_192, hmac_sha2_384 260s ipsec algparse: HMAC_SHA2_256_128 IKEv1: IKE ESP AH IKEv2: IKE ESP AH FIPS NSS sha2, sha256, sha2_256, sha2_256_128, hmac_sha2_256 260s ipsec algparse: HMAC_SHA2_256_TRUNCBUG IKEv1: ESP AH IKEv2: AH 260s ipsec algparse: AES_XCBC_96 IKEv1: ESP AH IKEv2: IKE ESP AH native(XCBC) aes_xcbc, aes128_xcbc, aes128_xcbc_96 260s ipsec algparse: AES_CMAC_96 IKEv1: ESP AH IKEv2: ESP AH FIPS aes_cmac 260s ipsec algparse: NONE IKEv1: ESP IKEv2: IKE ESP FIPS null 260s ipsec algparse: DH algorithms: 260s ipsec algparse: NONE IKEv1: IKEv2: IKE ESP AH FIPS NSS(MODP) null, dh0 260s ipsec algparse: MODP1536 IKEv1: IKE ESP AH IKEv2: IKE ESP AH NSS(MODP) dh5 260s ipsec algparse: MODP2048 IKEv1: IKE ESP AH IKEv2: IKE ESP AH FIPS NSS(MODP) dh14 260s ipsec algparse: MODP3072 IKEv1: IKE ESP AH IKEv2: IKE ESP AH FIPS NSS(MODP) dh15 260s ipsec algparse: MODP4096 IKEv1: IKE ESP AH IKEv2: IKE ESP AH FIPS NSS(MODP) dh16 260s ipsec algparse: MODP6144 IKEv1: IKE ESP AH IKEv2: IKE ESP AH FIPS NSS(MODP) dh17 260s ipsec algparse: MODP8192 IKEv1: IKE ESP AH IKEv2: IKE ESP AH FIPS NSS(MODP) dh18 260s ipsec algparse: DH19 IKEv1: IKE IKEv2: IKE ESP AH FIPS NSS(ECP) ecp_256, ecp256 260s ipsec algparse: DH20 IKEv1: IKE IKEv2: IKE ESP AH FIPS NSS(ECP) ecp_384, ecp384 260s ipsec algparse: DH21 IKEv1: IKE IKEv2: IKE ESP AH FIPS NSS(ECP) ecp_521, ecp521 260s ipsec algparse: DH31 IKEv1: IKE IKEv2: IKE ESP AH NSS(ECP) curve25519 260s ipsec algparse: IPCOMP algorithms: 260s ipsec algparse: DEFLATE IKEv1: ESP AH IKEv2: ESP AH FIPS 260s ipsec algparse: LZS IKEv1: IKEv2: ESP AH FIPS 260s ipsec algparse: LZJH IKEv1: IKEv2: ESP AH FIPS 260s ipsec algparse: testing CAMELLIA_CBC: 260s ipsec algparse: Camellia: 16 bytes with 128-bit key 260s | decode_to_chunk() raw_key: input "0x00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00" 260s | decode_to_chunk() output: 260s | 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................ 260s | CONCATENATE_DATA_AND_BASE: 260s | target: EXTRACT_KEY_FROM_KEY 260s | base: base-key@0xbed435402bc0 (16-bytes, AES_KEY_GEN) 260s | params: 16-bytes@0xffffc40c0e80 260s | key-offset: 0, key-size: 16 260s | EXTRACT_KEY_FROM_KEY: 260s | target: CAMELLIA_CBC 260s | flags: ENCRYPT+DECRYPT 260s | key_size: 16-bytes 260s | base: base-key@0xbed435405c00 (32-bytes, EXTRACT_KEY_FROM_KEY) 260s | operation: FLAGS_ONLY 260s | params: 8-bytes@0xffffc40c0e88 260s | decode_to_mac() IV: : input "0x00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00" 260s | decode_to_mac() output: 260s | 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................ 260s | decode_to_chunk() new IV: : input "0x07 92 3A 39 EB 0A 81 7D 1C 4D 87 BD B8 2D 1F 1C" 260s | decode_to_chunk() output: 260s | 07 92 3a 39 eb 0a 81 7d 1c 4d 87 bd b8 2d 1f 1c ..:9...}.M...-.. 260s | decode_to_chunk() plaintext: : input "0x80 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00" 260s | decode_to_chunk() output: 260s | 80 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................ 260s | decode_to_chunk() ciphertext: : input "0x07 92 3A 39 EB 0A 81 7D 1C 4D 87 BD B8 2D 1F 1C" 260s | decode_to_chunk() output: 260s | 07 92 3a 39 eb 0a 81 7d 1c 4d 87 bd b8 2d 1f 1c ..:9...}.M...-.. 260s | NSS ike_alg_nss_cbc: CAMELLIA_CBC - enter (nil) 260s | using IKEv1 IV 260s | NSS ike_alg_nss_cbc: CAMELLIA_CBC - exit 260s | verify_bytes() Camellia: 16 bytes with 128-bit key: encrypt: ok 260s | verify_bytes() Camellia: 16 bytes with 128-bit key: updated CBC IV: ok 260s | decode_to_mac() IV: : input "0x00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00" 260s | decode_to_mac() output: 260s | 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................ 260s | decode_to_chunk() new IV: : input "0x07 92 3A 39 EB 0A 81 7D 1C 4D 87 BD B8 2D 1F 1C" 260s | decode_to_chunk() output: 260s | 07 92 3a 39 eb 0a 81 7d 1c 4d 87 bd b8 2d 1f 1c ..:9...}.M...-.. 260s | decode_to_chunk() ciphertext: : input "0x07 92 3A 39 EB 0A 81 7D 1C 4D 87 BD B8 2D 1F 1C" 260s | decode_to_chunk() output: 260s | 07 92 3a 39 eb 0a 81 7d 1c 4d 87 bd b8 2d 1f 1c ..:9...}.M...-.. 260s | decode_to_chunk() plaintext: : input "0x80 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00" 260s | decode_to_chunk() output: 260s | 80 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................ 260s | NSS ike_alg_nss_cbc: CAMELLIA_CBC - enter (nil) 260s | using IKEv1 IV 260s | NSS ike_alg_nss_cbc: CAMELLIA_CBC - exit 260s | verify_bytes() Camellia: 16 bytes with 128-bit key: decrypt: ok 260s | verify_bytes() Camellia: 16 bytes with 128-bit key: updated CBC IV: ok 260s ipsec algparse: Camellia: 16 bytes with 128-bit key 260s | decode_to_chunk() raw_key: input "0x00 11 22 33 44 55 66 77 88 99 AA BB CC DD EE FF" 260s | decode_to_chunk() output: 260s | 00 11 22 33 44 55 66 77 88 99 aa bb cc dd ee ff .."3DUfw........ 260s | CONCATENATE_DATA_AND_BASE: 260s | target: EXTRACT_KEY_FROM_KEY 260s | base: base-key@0xbed435402bc0 (16-bytes, AES_KEY_GEN) 260s | params: 16-bytes@0xffffc40c0e80 260s | key-offset: 0, key-size: 16 260s | EXTRACT_KEY_FROM_KEY: 260s | target: CAMELLIA_CBC 260s | flags: ENCRYPT+DECRYPT 260s | key_size: 16-bytes 260s | base: base-key@0xbed435405c00 (32-bytes, EXTRACT_KEY_FROM_KEY) 260s | operation: FLAGS_ONLY 260s | params: 8-bytes@0xffffc40c0e88 260s | decode_to_mac() IV: : input "0x00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00" 260s | decode_to_mac() output: 260s | 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................ 260s | decode_to_chunk() new IV: : input "0x14 4D 2B 0F 50 0C 27 B7 EC 2C D1 2D 91 59 6F 37" 260s | decode_to_chunk() output: 260s | 14 4d 2b 0f 50 0c 27 b7 ec 2c d1 2d 91 59 6f 37 .M+.P.'..,.-.Yo7 260s | decode_to_chunk() plaintext: : input "0x00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 01 " 260s | decode_to_chunk() output: 260s | 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 01 ................ 260s | decode_to_chunk() ciphertext: : input "0x14 4D 2B 0F 50 0C 27 B7 EC 2C D1 2D 91 59 6F 37" 260s | decode_to_chunk() output: 260s | 14 4d 2b 0f 50 0c 27 b7 ec 2c d1 2d 91 59 6f 37 .M+.P.'..,.-.Yo7 260s | NSS ike_alg_nss_cbc: CAMELLIA_CBC - enter (nil) 260s | using IKEv1 IV 260s | NSS ike_alg_nss_cbc: CAMELLIA_CBC - exit 260s | verify_bytes() Camellia: 16 bytes with 128-bit key: encrypt: ok 260s | verify_bytes() Camellia: 16 bytes with 128-bit key: updated CBC IV: ok 260s | decode_to_mac() IV: : input "0x00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00" 260s | decode_to_mac() output: 260s | 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................ 260s | decode_to_chunk() new IV: : input "0x14 4D 2B 0F 50 0C 27 B7 EC 2C D1 2D 91 59 6F 37" 260s | decode_to_chunk() output: 260s | 14 4d 2b 0f 50 0c 27 b7 ec 2c d1 2d 91 59 6f 37 .M+.P.'..,.-.Yo7 260s | decode_to_chunk() ciphertext: : input "0x14 4D 2B 0F 50 0C 27 B7 EC 2C D1 2D 91 59 6F 37" 260s | decode_to_chunk() output: 260s | 14 4d 2b 0f 50 0c 27 b7 ec 2c d1 2d 91 59 6f 37 .M+.P.'..,.-.Yo7 260s | decode_to_chunk() plaintext: : input "0x00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 01 " 260s | decode_to_chunk() output: 260s | 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 01 ................ 260s | NSS ike_alg_nss_cbc: CAMELLIA_CBC - enter (nil) 260s | using IKEv1 IV 260s | NSS ike_alg_nss_cbc: CAMELLIA_CBC - exit 260s | verify_bytes() Camellia: 16 bytes with 128-bit key: decrypt: ok 260s | verify_bytes() Camellia: 16 bytes with 128-bit key: updated CBC IV: ok 260s ipsec algparse: Camellia: 16 bytes with 256-bit key 260s | decode_to_chunk() raw_key: input "0x00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00" 260s | decode_to_chunk() output: 260s | 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................ 260s | 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................ 260s | CONCATENATE_DATA_AND_BASE: 260s | target: EXTRACT_KEY_FROM_KEY 260s | base: base-key@0xbed435402bc0 (16-bytes, AES_KEY_GEN) 260s | params: 16-bytes@0xffffc40c0e80 260s | key-offset: 0, key-size: 32 260s | EXTRACT_KEY_FROM_KEY: 260s | target: CAMELLIA_CBC 260s | flags: ENCRYPT+DECRYPT 260s | key_size: 32-bytes 260s | base: base-key@0xbed435405c00 (48-bytes, EXTRACT_KEY_FROM_KEY) 260s | operation: FLAGS_ONLY 260s | params: 8-bytes@0xffffc40c0e88 260s | decode_to_mac() IV: : input "0x00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00" 260s | decode_to_mac() output: 260s | 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................ 260s | decode_to_chunk() new IV: : input "0xB0 C6 B8 8A EA 51 8A B0 9E 84 72 48 E9 1B 1B 9D" 260s | decode_to_chunk() output: 260s | b0 c6 b8 8a ea 51 8a b0 9e 84 72 48 e9 1b 1b 9d .....Q....rH.... 260s | decode_to_chunk() plaintext: : input "0x80 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00" 260s | decode_to_chunk() output: 260s | 80 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................ 260s | decode_to_chunk() ciphertext: : input "0xB0 C6 B8 8A EA 51 8A B0 9E 84 72 48 E9 1B 1B 9D" 260s | decode_to_chunk() output: 260s | b0 c6 b8 8a ea 51 8a b0 9e 84 72 48 e9 1b 1b 9d .....Q....rH.... 260s | NSS ike_alg_nss_cbc: CAMELLIA_CBC - enter (nil) 260s | using IKEv1 IV 260s | NSS ike_alg_nss_cbc: CAMELLIA_CBC - exit 260s | verify_bytes() Camellia: 16 bytes with 256-bit key: encrypt: ok 260s | verify_bytes() Camellia: 16 bytes with 256-bit key: updated CBC IV: ok 260s | decode_to_mac() IV: : input "0x00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00" 260s | decode_to_mac() output: 260s | 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................ 260s | decode_to_chunk() new IV: : input "0xB0 C6 B8 8A EA 51 8A B0 9E 84 72 48 E9 1B 1B 9D" 260s | decode_to_chunk() output: 260s | b0 c6 b8 8a ea 51 8a b0 9e 84 72 48 e9 1b 1b 9d .....Q....rH.... 260s | decode_to_chunk() ciphertext: : input "0xB0 C6 B8 8A EA 51 8A B0 9E 84 72 48 E9 1B 1B 9D" 260s | decode_to_chunk() output: 260s | b0 c6 b8 8a ea 51 8a b0 9e 84 72 48 e9 1b 1b 9d .....Q....rH.... 260s | decode_to_chunk() plaintext: : input "0x80 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00" 260s | decode_to_chunk() output: 260s | 80 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................ 260s | NSS ike_alg_nss_cbc: CAMELLIA_CBC - enter (nil) 260s | using IKEv1 IV 260s | NSS ike_alg_nss_cbc: CAMELLIA_CBC - exit 260s | verify_bytes() Camellia: 16 bytes with 256-bit key: decrypt: ok 260s | verify_bytes() Camellia: 16 bytes with 256-bit key: updated CBC IV: ok 260s ipsec algparse: Camellia: 16 bytes with 256-bit key 260s | decode_to_chunk() raw_key: input "0x00 11 22 33 44 55 66 77 88 99 AA BB CC DD EE FF FF EE DD CC BB AA 99 88 77 66 55 44 33 22 11 00" 260s | decode_to_chunk() output: 260s | 00 11 22 33 44 55 66 77 88 99 aa bb cc dd ee ff .."3DUfw........ 260s | ff ee dd cc bb aa 99 88 77 66 55 44 33 22 11 00 ........wfUD3".. 260s | CONCATENATE_DATA_AND_BASE: 260s | target: EXTRACT_KEY_FROM_KEY 260s | base: base-key@0xbed435402bc0 (16-bytes, AES_KEY_GEN) 260s | params: 16-bytes@0xffffc40c0e80 260s | key-offset: 0, key-size: 32 260s | EXTRACT_KEY_FROM_KEY: 260s | target: CAMELLIA_CBC 260s | flags: ENCRYPT+DECRYPT 260s | key_size: 32-bytes 260s | base: base-key@0xbed435405c00 (48-bytes, EXTRACT_KEY_FROM_KEY) 260s | operation: FLAGS_ONLY 260s | params: 8-bytes@0xffffc40c0e88 260s | decode_to_mac() IV: : input "0x00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00" 260s | decode_to_mac() output: 260s | 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................ 260s | decode_to_chunk() new IV: : input "0xCC 39 FF EE 18 56 D3 EB 61 02 5E 93 21 9B 65 23 " 260s | decode_to_chunk() output: 260s | cc 39 ff ee 18 56 d3 eb 61 02 5e 93 21 9b 65 23 .9...V..a.^.!.e# 260s | decode_to_chunk() plaintext: : input "0x00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 01" 260s | decode_to_chunk() output: 260s | 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 01 ................ 260s | decode_to_chunk() ciphertext: : input "0xCC 39 FF EE 18 56 D3 EB 61 02 5E 93 21 9B 65 23 " 260s | decode_to_chunk() output: 260s | cc 39 ff ee 18 56 d3 eb 61 02 5e 93 21 9b 65 23 .9...V..a.^.!.e# 260s | NSS ike_alg_nss_cbc: CAMELLIA_CBC - enter (nil) 260s | using IKEv1 IV 260s | NSS ike_alg_nss_cbc: CAMELLIA_CBC - exit 260s | verify_bytes() Camellia: 16 bytes with 256-bit key: encrypt: ok 260s | verify_bytes() Camellia: 16 bytes with 256-bit key: updated CBC IV: ok 260s | decode_to_mac() IV: : input "0x00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00" 260s | decode_to_mac() output: 260s | 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................ 260s | decode_to_chunk() new IV: : input "0xCC 39 FF EE 18 56 D3 EB 61 02 5E 93 21 9B 65 23 " 260s | decode_to_chunk() output: 260s | cc 39 ff ee 18 56 d3 eb 61 02 5e 93 21 9b 65 23 .9...V..a.^.!.e# 260s | decode_to_chunk() ciphertext: : input "0xCC 39 FF EE 18 56 D3 EB 61 02 5E 93 21 9B 65 23 " 260s | decode_to_chunk() output: 260s | cc 39 ff ee 18 56 d3 eb 61 02 5e 93 21 9b 65 23 .9...V..a.^.!.e# 260s | decode_to_chunk() plaintext: : input "0x00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 01" 260s | decode_to_chunk() output: 260s | 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 01 ................ 260s | NSS ike_alg_nss_cbc: CAMELLIA_CBC - enter (nil) 260s | using IKEv1 IV 260s | NSS ike_alg_nss_cbc: CAMELLIA_CBC - exit 260s | verify_bytes() Camellia: 16 bytes with 256-bit key: decrypt: ok 260s | verify_bytes() Camellia: 16 bytes with 256-bit key: updated CBC IV: ok 260s ipsec algparse: testing AES_GCM_16: 260s ipsec algparse: empty string 260s | decode_to_chunk() raw_key: input "0xcf063a34d4a9a76c2c86787d3f96db71" 260s | decode_to_chunk() output: 260s | cf 06 3a 34 d4 a9 a7 6c 2c 86 78 7d 3f 96 db 71 ..:4...l,.x}?..q 260s | CONCATENATE_DATA_AND_BASE: 260s | target: EXTRACT_KEY_FROM_KEY 260s | base: base-key@0xbed435402bc0 (16-bytes, AES_KEY_GEN) 260s | params: 16-bytes@0xffffc40c0e00 260s | key-offset: 0, key-size: 16 260s | EXTRACT_KEY_FROM_KEY: 260s | target: AES_GCM 260s | flags: ENCRYPT+DECRYPT 260s | key_size: 16-bytes 260s | base: base-key@0xbed435405c00 (32-bytes, EXTRACT_KEY_FROM_KEY) 260s | operation: FLAGS_ONLY 260s | params: 8-bytes@0xffffc40c0e08 260s | decode_to_chunk() salted IV: input "0x113b9785971864c83b01c787" 260s | decode_to_chunk() output: 260s | 11 3b 97 85 97 18 64 c8 3b 01 c7 87 .;....d.;... 260s | decode_to_chunk() AAD: input "" 260s | decode_to_chunk() output: 260s | 260s | decode_to_chunk() plaintext: input "" 260s | decode_to_chunk() output: 260s | 260s | decode_to_chunk() ciphertext: input "" 260s | decode_to_chunk() output: 260s | 260s | decode_to_chunk() tag: input "0x72ac8493e3a5228b5d130a69d2510e42" 260s | decode_to_chunk() output: 260s | 72 ac 84 93 e3 a5 22 8b 5d 13 0a 69 d2 51 0e 42 r.....".]..i.Q.B 260s | test_gcm_vector() DECRYPT: aad-size=0 salt-size=4 wire-IV-size=8 text-size=0 tag-size=16 text+tag in: 260s | 72 ac 84 93 e3 a5 22 8b 5d 13 0a 69 d2 51 0e 42 r.....".]..i.Q.B 260s | verify_bytes() empty string: output ciphertext: ok 260s | verify_bytes() empty string: TAG: ok 260s | test_gcm_vector() text+tag out: 260s | 72 ac 84 93 e3 a5 22 8b 5d 13 0a 69 d2 51 0e 42 r.....".]..i.Q.B 260s | test_gcm_vector() ENCRYPT: aad-size=0 salt-size=4 wire-IV-size=8 text-size=0 tag-size=16 text+tag in: 260s | 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................ 260s | verify_bytes() empty string: output ciphertext: ok 260s | verify_bytes() empty string: TAG: ok 260s | test_gcm_vector() text+tag out: 260s | 72 ac 84 93 e3 a5 22 8b 5d 13 0a 69 d2 51 0e 42 r.....".]..i.Q.B 260s ipsec algparse: one block 260s | decode_to_chunk() raw_key: input "0xe98b72a9881a84ca6b76e0f43e68647a" 260s | decode_to_chunk() output: 260s | e9 8b 72 a9 88 1a 84 ca 6b 76 e0 f4 3e 68 64 7a ..r.....kv..>hdz 260s | CONCATENATE_DATA_AND_BASE: 260s | target: EXTRACT_KEY_FROM_KEY 260s | base: base-key@0xbed435402bc0 (16-bytes, AES_KEY_GEN) 260s | params: 16-bytes@0xffffc40c0e00 260s | key-offset: 0, key-size: 16 260s | EXTRACT_KEY_FROM_KEY: 260s | target: AES_GCM 260s | flags: ENCRYPT+DECRYPT 260s | key_size: 16-bytes 260s | base: base-key@0xbed435405c00 (32-bytes, EXTRACT_KEY_FROM_KEY) 260s | operation: FLAGS_ONLY 260s | params: 8-bytes@0xffffc40c0e08 260s | decode_to_chunk() salted IV: input "0x8b23299fde174053f3d652ba" 260s | decode_to_chunk() output: 260s | 8b 23 29 9f de 17 40 53 f3 d6 52 ba .#)...@S..R. 260s | decode_to_chunk() AAD: input "" 260s | decode_to_chunk() output: 260s | 260s | decode_to_chunk() plaintext: input "0x28286a321293253c3e0aa2704a278032" 260s | decode_to_chunk() output: 260s | 28 28 6a 32 12 93 25 3c 3e 0a a2 70 4a 27 80 32 ((j2..%<>..pJ'.2 260s | decode_to_chunk() ciphertext: input "0x5a3c1cf1985dbb8bed818036fdd5ab42" 260s | decode_to_chunk() output: 260s | 5a 3c 1c f1 98 5d bb 8b ed 81 80 36 fd d5 ab 42 Z<...].....6...B 260s | decode_to_chunk() tag: input "0x23c7ab0f952b7091cd324835043b5eb5" 260s | decode_to_chunk() output: 260s | 23 c7 ab 0f 95 2b 70 91 cd 32 48 35 04 3b 5e b5 #....+p..2H5.;^. 260s | test_gcm_vector() DECRYPT: aad-size=0 salt-size=4 wire-IV-size=8 text-size=16 tag-size=16 text+tag in: 260s | 5a 3c 1c f1 98 5d bb 8b ed 81 80 36 fd d5 ab 42 Z<...].....6...B 260s | 23 c7 ab 0f 95 2b 70 91 cd 32 48 35 04 3b 5e b5 #....+p..2H5.;^. 260s | verify_bytes() one block: output ciphertext: ok 260s | verify_bytes() one block: TAG: ok 260s | test_gcm_vector() text+tag out: 260s | 28 28 6a 32 12 93 25 3c 3e 0a a2 70 4a 27 80 32 ((j2..%<>..pJ'.2 260s | 23 c7 ab 0f 95 2b 70 91 cd 32 48 35 04 3b 5e b5 #....+p..2H5.;^. 260s | test_gcm_vector() ENCRYPT: aad-size=0 salt-size=4 wire-IV-size=8 text-size=16 tag-size=16 text+tag in: 260s | 28 28 6a 32 12 93 25 3c 3e 0a a2 70 4a 27 80 32 ((j2..%<>..pJ'.2 260s | 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................ 260s | verify_bytes() one block: output ciphertext: ok 260s | verify_bytes() one block: TAG: ok 260s | test_gcm_vector() text+tag out: 260s | 5a 3c 1c f1 98 5d bb 8b ed 81 80 36 fd d5 ab 42 Z<...].....6...B 260s | 23 c7 ab 0f 95 2b 70 91 cd 32 48 35 04 3b 5e b5 #....+p..2H5.;^. 260s ipsec algparse: two blocks 260s | decode_to_chunk() raw_key: input "0xbfd414a6212958a607a0f5d3ab48471d" 260s | decode_to_chunk() output: 260s | bf d4 14 a6 21 29 58 a6 07 a0 f5 d3 ab 48 47 1d ....!)X......HG. 260s | CONCATENATE_DATA_AND_BASE: 260s | target: EXTRACT_KEY_FROM_KEY 260s | base: base-key@0xbed435402bc0 (16-bytes, AES_KEY_GEN) 260s | params: 16-bytes@0xffffc40c0e00 260s | key-offset: 0, key-size: 16 260s | EXTRACT_KEY_FROM_KEY: 260s | target: AES_GCM 260s | flags: ENCRYPT+DECRYPT 260s | key_size: 16-bytes 260s | base: base-key@0xbed435405c00 (32-bytes, EXTRACT_KEY_FROM_KEY) 260s | operation: FLAGS_ONLY 260s | params: 8-bytes@0xffffc40c0e08 260s | decode_to_chunk() salted IV: input "0x86d8ea0ab8e40dcc481cd0e2" 260s | decode_to_chunk() output: 260s | 86 d8 ea 0a b8 e4 0d cc 48 1c d0 e2 ........H... 260s | decode_to_chunk() AAD: input "" 260s | decode_to_chunk() output: 260s | 260s | decode_to_chunk() plaintext: input "0xa6b76a066e63392c9443e60272ceaeb9d25c991b0f2e55e2804e168c05ea591a" 260s | decode_to_chunk() output: 260s | a6 b7 6a 06 6e 63 39 2c 94 43 e6 02 72 ce ae b9 ..j.nc9,.C..r... 260s | d2 5c 99 1b 0f 2e 55 e2 80 4e 16 8c 05 ea 59 1a .\....U..N....Y. 260s | decode_to_chunk() ciphertext: input "0x62171db33193292d930bf6647347652c1ef33316d7feca99d54f1db4fcf513f8" 260s | decode_to_chunk() output: 260s | 62 17 1d b3 31 93 29 2d 93 0b f6 64 73 47 65 2c b...1.)-...dsGe, 260s | 1e f3 33 16 d7 fe ca 99 d5 4f 1d b4 fc f5 13 f8 ..3......O...... 260s | decode_to_chunk() tag: input "0xc28280aa5c6c7a8bd366f28c1cfd1f6e" 260s | decode_to_chunk() output: 260s | c2 82 80 aa 5c 6c 7a 8b d3 66 f2 8c 1c fd 1f 6e ....\lz..f.....n 260s | test_gcm_vector() DECRYPT: aad-size=0 salt-size=4 wire-IV-size=8 text-size=32 tag-size=16 text+tag in: 260s | 62 17 1d b3 31 93 29 2d 93 0b f6 64 73 47 65 2c b...1.)-...dsGe, 260s | 1e f3 33 16 d7 fe ca 99 d5 4f 1d b4 fc f5 13 f8 ..3......O...... 260s | c2 82 80 aa 5c 6c 7a 8b d3 66 f2 8c 1c fd 1f 6e ....\lz..f.....n 260s | verify_bytes() two blocks: output ciphertext: ok 260s | verify_bytes() two blocks: TAG: ok 260s | test_gcm_vector() text+tag out: 260s | a6 b7 6a 06 6e 63 39 2c 94 43 e6 02 72 ce ae b9 ..j.nc9,.C..r... 260s | d2 5c 99 1b 0f 2e 55 e2 80 4e 16 8c 05 ea 59 1a .\....U..N....Y. 260s | c2 82 80 aa 5c 6c 7a 8b d3 66 f2 8c 1c fd 1f 6e ....\lz..f.....n 260s | test_gcm_vector() ENCRYPT: aad-size=0 salt-size=4 wire-IV-size=8 text-size=32 tag-size=16 text+tag in: 260s | a6 b7 6a 06 6e 63 39 2c 94 43 e6 02 72 ce ae b9 ..j.nc9,.C..r... 260s | d2 5c 99 1b 0f 2e 55 e2 80 4e 16 8c 05 ea 59 1a .\....U..N....Y. 260s | 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................ 260s | verify_bytes() two blocks: output ciphertext: ok 260s | verify_bytes() two blocks: TAG: ok 260s | test_gcm_vector() text+tag out: 260s | 62 17 1d b3 31 93 29 2d 93 0b f6 64 73 47 65 2c b...1.)-...dsGe, 260s | 1e f3 33 16 d7 fe ca 99 d5 4f 1d b4 fc f5 13 f8 ..3......O...... 260s | c2 82 80 aa 5c 6c 7a 8b d3 66 f2 8c 1c fd 1f 6e ....\lz..f.....n 260s ipsec algparse: two blocks with associated data 260s | decode_to_chunk() raw_key: input "0x95bcde70c094f04e3dd8259cafd88ce8" 260s | decode_to_chunk() output: 260s | 95 bc de 70 c0 94 f0 4e 3d d8 25 9c af d8 8c e8 ...p...N=.%..... 260s | CONCATENATE_DATA_AND_BASE: 260s | target: EXTRACT_KEY_FROM_KEY 260s | base: base-key@0xbed435402bc0 (16-bytes, AES_KEY_GEN) 260s | params: 16-bytes@0xffffc40c0e00 260s | key-offset: 0, key-size: 16 260s | EXTRACT_KEY_FROM_KEY: 260s | target: AES_GCM 260s | flags: ENCRYPT+DECRYPT 260s | key_size: 16-bytes 260s | base: base-key@0xbed435405c00 (32-bytes, EXTRACT_KEY_FROM_KEY) 260s | operation: FLAGS_ONLY 260s | params: 8-bytes@0xffffc40c0e08 260s | decode_to_chunk() salted IV: input "0x12cf097ad22380432ff40a5c" 260s | decode_to_chunk() output: 260s | 12 cf 09 7a d2 23 80 43 2f f4 0a 5c ...z.#.C/..\ 260s | decode_to_chunk() AAD: input "0xc783a0cca10a8d9fb8d27d69659463f2" 260s | decode_to_chunk() output: 260s | c7 83 a0 cc a1 0a 8d 9f b8 d2 7d 69 65 94 63 f2 ..........}ie.c. 260s | decode_to_chunk() plaintext: input "0x32f51e837a9748838925066d69e87180f34a6437e6b396e5643b34cb2ee4f7b1" 260s | decode_to_chunk() output: 260s | 32 f5 1e 83 7a 97 48 83 89 25 06 6d 69 e8 71 80 2...z.H..%.mi.q. 260s | f3 4a 64 37 e6 b3 96 e5 64 3b 34 cb 2e e4 f7 b1 .Jd7....d;4..... 260s | decode_to_chunk() ciphertext: input "0x8a023ba477f5b809bddcda8f55e09064d6d88aaec99c1e141212ea5b08503660" 260s | decode_to_chunk() output: 260s | 8a 02 3b a4 77 f5 b8 09 bd dc da 8f 55 e0 90 64 ..;.w.......U..d 260s | d6 d8 8a ae c9 9c 1e 14 12 12 ea 5b 08 50 36 60 ...........[.P6` 260s | decode_to_chunk() tag: input "0x562f500dae635d60a769b466e15acd1e" 260s | decode_to_chunk() output: 260s | 56 2f 50 0d ae 63 5d 60 a7 69 b4 66 e1 5a cd 1e V/P..c]`.i.f.Z.. 260s | test_gcm_vector() DECRYPT: aad-size=16 salt-size=4 wire-IV-size=8 text-size=32 tag-size=16 text+tag in: 260s | 8a 02 3b a4 77 f5 b8 09 bd dc da 8f 55 e0 90 64 ..;.w.......U..d 260s | d6 d8 8a ae c9 9c 1e 14 12 12 ea 5b 08 50 36 60 ...........[.P6` 260s | 56 2f 50 0d ae 63 5d 60 a7 69 b4 66 e1 5a cd 1e V/P..c]`.i.f.Z.. 260s | verify_bytes() two blocks with associated data: output ciphertext: ok 260s | verify_bytes() two blocks with associated data: TAG: ok 260s | test_gcm_vector() text+tag out: 260s | 32 f5 1e 83 7a 97 48 83 89 25 06 6d 69 e8 71 80 2...z.H..%.mi.q. 260s | f3 4a 64 37 e6 b3 96 e5 64 3b 34 cb 2e e4 f7 b1 .Jd7....d;4..... 260s | 56 2f 50 0d ae 63 5d 60 a7 69 b4 66 e1 5a cd 1e V/P..c]`.i.f.Z.. 260s | test_gcm_vector() ENCRYPT: aad-size=16 salt-size=4 wire-IV-size=8 text-size=32 tag-size=16 text+tag in: 260s | 32 f5 1e 83 7a 97 48 83 89 25 06 6d 69 e8 71 80 2...z.H..%.mi.q. 260s | f3 4a 64 37 e6 b3 96 e5 64 3b 34 cb 2e e4 f7 b1 .Jd7....d;4..... 260s | 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................ 260s | verify_bytes() two blocks with associated data: output ciphertext: ok 260s | verify_bytes() two blocks with associated data: TAG: ok 260s | test_gcm_vector() text+tag out: 260s | 8a 02 3b a4 77 f5 b8 09 bd dc da 8f 55 e0 90 64 ..;.w.......U..d 260s | d6 d8 8a ae c9 9c 1e 14 12 12 ea 5b 08 50 36 60 ...........[.P6` 260s | 56 2f 50 0d ae 63 5d 60 a7 69 b4 66 e1 5a cd 1e V/P..c]`.i.f.Z.. 260s ipsec algparse: testing AES_CTR: 260s ipsec algparse: Encrypting 16 octets using AES-CTR with 128-bit key 260s | decode_to_chunk() raw_key: input "0x AE 68 52 F8 12 10 67 CC 4B F7 A5 76 55 77 F3 9E" 260s | decode_to_chunk() output: 260s | ae 68 52 f8 12 10 67 cc 4b f7 a5 76 55 77 f3 9e .hR...g.K..vUw.. 260s | CONCATENATE_DATA_AND_BASE: 260s | target: EXTRACT_KEY_FROM_KEY 260s | base: base-key@0xbed435402bc0 (16-bytes, AES_KEY_GEN) 260s | params: 16-bytes@0xffffc40c0e70 260s | key-offset: 0, key-size: 16 260s | EXTRACT_KEY_FROM_KEY: 260s | target: AES_CTR 260s | flags: ENCRYPT+DECRYPT 260s | key_size: 16-bytes 260s | base: base-key@0xbed435405c00 (32-bytes, EXTRACT_KEY_FROM_KEY) 260s | operation: FLAGS_ONLY 260s | params: 8-bytes@0xffffc40c0e78 260s | decode_to_mac() input counter-block: : input "0x 00 00 00 30 00 00 00 00 00 00 00 00 00 00 00 01" 260s | decode_to_mac() output: 260s | 00 00 00 30 00 00 00 00 00 00 00 00 00 00 00 01 ...0............ 260s | decode_to_chunk() Plaintext: input "0x 53 69 6E 67 6C 65 20 62 6C 6F 63 6B 20 6D 73 67" 260s | decode_to_chunk() output: 260s | 53 69 6e 67 6c 65 20 62 6c 6f 63 6b 20 6d 73 67 Single block msg 260s | decode_to_chunk() Ciphertext: input "0x E4 09 5D 4F B7 A7 B3 79 2D 61 75 A3 26 13 11 B8" 260s | decode_to_chunk() output: 260s | e4 09 5d 4f b7 a7 b3 79 2d 61 75 a3 26 13 11 b8 ..]O...y-au.&... 260s | decode_to_chunk() expected counter-block: : input "0x 00 00 00 30 00 00 00 00 00 00 00 00 00 00 00 02" 260s | decode_to_chunk() output: 260s | 00 00 00 30 00 00 00 00 00 00 00 00 00 00 00 02 ...0............ 260s | cipher_op_ctr_nss() enter AES_CTR 0xbed4354065d0 use IKEv1 IV wire_iv 0 count 0 260s | ctr_param: count 32 iv 00000030000000000000000000000001 260s | cipher_op_ctr_nss() counter-block updated from 0x1 to 0x2 for 16 bytes 260s | do_aes_ctr: exit 260s | cipher_op_context_destroy_ctr_nss() 260s | verify_bytes() Encrypting 16 octets using AES-CTR with 128-bit key: encrypt: ok 260s | verify_bytes() Encrypting 16 octets using AES-CTR with 128-bit key: counter-block: ok 260s | decode_to_mac() input counter-block: : input "0x 00 00 00 30 00 00 00 00 00 00 00 00 00 00 00 01" 260s | decode_to_mac() output: 260s | 00 00 00 30 00 00 00 00 00 00 00 00 00 00 00 01 ...0............ 260s | decode_to_chunk() Ciphertext: input "0x E4 09 5D 4F B7 A7 B3 79 2D 61 75 A3 26 13 11 B8" 260s | decode_to_chunk() output: 260s | e4 09 5d 4f b7 a7 b3 79 2d 61 75 a3 26 13 11 b8 ..]O...y-au.&... 260s | decode_to_chunk() Plaintext: input "0x 53 69 6E 67 6C 65 20 62 6C 6F 63 6B 20 6D 73 67" 260s | decode_to_chunk() output: 260s | 53 69 6e 67 6c 65 20 62 6c 6f 63 6b 20 6d 73 67 Single block msg 260s | decode_to_chunk() expected counter-block: : input "0x 00 00 00 30 00 00 00 00 00 00 00 00 00 00 00 02" 260s | decode_to_chunk() output: 260s | 00 00 00 30 00 00 00 00 00 00 00 00 00 00 00 02 ...0............ 260s | cipher_op_ctr_nss() enter AES_CTR 0xbed4354065d0 use IKEv1 IV wire_iv 0 count 0 260s | ctr_param: count 32 iv 00000030000000000000000000000001 260s | cipher_op_ctr_nss() counter-block updated from 0x1 to 0x2 for 16 bytes 260s | do_aes_ctr: exit 260s | cipher_op_context_destroy_ctr_nss() 260s | verify_bytes() Encrypting 16 octets using AES-CTR with 128-bit key: decrypt: ok 260s | verify_bytes() Encrypting 16 octets using AES-CTR with 128-bit key: counter-block: ok 260s ipsec algparse: Encrypting 32 octets using AES-CTR with 128-bit key 260s | decode_to_chunk() raw_key: input "0x 7E 24 06 78 17 FA E0 D7 43 D6 CE 1F 32 53 91 63" 260s | decode_to_chunk() output: 260s | 7e 24 06 78 17 fa e0 d7 43 d6 ce 1f 32 53 91 63 ~$.x....C...2S.c 260s | CONCATENATE_DATA_AND_BASE: 260s | target: EXTRACT_KEY_FROM_KEY 260s | base: base-key@0xbed435402bc0 (16-bytes, AES_KEY_GEN) 260s | params: 16-bytes@0xffffc40c0e70 260s | key-offset: 0, key-size: 16 260s | EXTRACT_KEY_FROM_KEY: 260s | target: AES_CTR 260s | flags: ENCRYPT+DECRYPT 260s | key_size: 16-bytes 260s | base: base-key@0xbed435405c00 (32-bytes, EXTRACT_KEY_FROM_KEY) 260s | operation: FLAGS_ONLY 260s | params: 8-bytes@0xffffc40c0e78 260s | decode_to_mac() input counter-block: : input "0x 00 6C B6 DB C0 54 3B 59 DA 48 D9 0B 00 00 00 01" 260s | decode_to_mac() output: 260s | 00 6c b6 db c0 54 3b 59 da 48 d9 0b 00 00 00 01 .l...T;Y.H...... 260s | decode_to_chunk() Plaintext: input "0x00 01 02 03 04 05 06 07 08 09 0A 0B 0C 0D 0E 0F10 11 12 13 14 15 16 17 18 19 1A 1B 1C 1D 1E 1F" 260s | decode_to_chunk() output: 260s | 00 01 02 03 04 05 06 07 08 09 0a 0b 0c 0d 0e 0f ................ 260s | 10 11 12 13 14 15 16 17 18 19 1a 1b 1c 1d 1e 1f ................ 260s | decode_to_chunk() Ciphertext: input "0x51 04 A1 06 16 8A 72 D9 79 0D 41 EE 8E DA D3 88EB 2E 1E FC 46 DA 57 C8 FC E6 30 DF 91 41 BE 28" 260s | decode_to_chunk() output: 260s | 51 04 a1 06 16 8a 72 d9 79 0d 41 ee 8e da d3 88 Q.....r.y.A..... 260s | eb 2e 1e fc 46 da 57 c8 fc e6 30 df 91 41 be 28 ....F.W...0..A.( 260s | decode_to_chunk() expected counter-block: : input "0x 00 6C B6 DB C0 54 3B 59 DA 48 D9 0B 00 00 00 03" 260s | decode_to_chunk() output: 260s | 00 6c b6 db c0 54 3b 59 da 48 d9 0b 00 00 00 03 .l...T;Y.H...... 260s | cipher_op_ctr_nss() enter AES_CTR 0xbed435402a80 use IKEv1 IV wire_iv 0 count 0 260s | ctr_param: count 32 iv 006cb6dbc0543b59da48d90b00000001 260s | cipher_op_ctr_nss() counter-block updated from 0x1 to 0x3 for 32 bytes 260s | do_aes_ctr: exit 260s | cipher_op_context_destroy_ctr_nss() 260s | verify_bytes() Encrypting 32 octets using AES-CTR with 128-bit key: encrypt: ok 260s | verify_bytes() Encrypting 32 octets using AES-CTR with 128-bit key: counter-block: ok 260s | decode_to_mac() input counter-block: : input "0x 00 6C B6 DB C0 54 3B 59 DA 48 D9 0B 00 00 00 01" 260s | decode_to_mac() output: 260s | 00 6c b6 db c0 54 3b 59 da 48 d9 0b 00 00 00 01 .l...T;Y.H...... 260s | decode_to_chunk() Ciphertext: input "0x51 04 A1 06 16 8A 72 D9 79 0D 41 EE 8E DA D3 88EB 2E 1E FC 46 DA 57 C8 FC E6 30 DF 91 41 BE 28" 260s | decode_to_chunk() output: 260s | 51 04 a1 06 16 8a 72 d9 79 0d 41 ee 8e da d3 88 Q.....r.y.A..... 260s | eb 2e 1e fc 46 da 57 c8 fc e6 30 df 91 41 be 28 ....F.W...0..A.( 260s | decode_to_chunk() Plaintext: input "0x00 01 02 03 04 05 06 07 08 09 0A 0B 0C 0D 0E 0F10 11 12 13 14 15 16 17 18 19 1A 1B 1C 1D 1E 1F" 260s | decode_to_chunk() output: 260s | 00 01 02 03 04 05 06 07 08 09 0a 0b 0c 0d 0e 0f ................ 260s | 10 11 12 13 14 15 16 17 18 19 1a 1b 1c 1d 1e 1f ................ 260s | decode_to_chunk() expected counter-block: : input "0x 00 6C B6 DB C0 54 3B 59 DA 48 D9 0B 00 00 00 03" 260s | decode_to_chunk() output: 260s | 00 6c b6 db c0 54 3b 59 da 48 d9 0b 00 00 00 03 .l...T;Y.H...... 260s | cipher_op_ctr_nss() enter AES_CTR 0xbed435402a80 use IKEv1 IV wire_iv 0 count 0 260s | ctr_param: count 32 iv 006cb6dbc0543b59da48d90b00000001 260s | cipher_op_ctr_nss() counter-block updated from 0x1 to 0x3 for 32 bytes 260s | do_aes_ctr: exit 260s | cipher_op_context_destroy_ctr_nss() 260s | verify_bytes() Encrypting 32 octets using AES-CTR with 128-bit key: decrypt: ok 260s | verify_bytes() Encrypting 32 octets using AES-CTR with 128-bit key: counter-block: ok 260s ipsec algparse: Encrypting 36 octets using AES-CTR with 128-bit key 260s | decode_to_chunk() raw_key: input "0x 76 91 BE 03 5E 50 20 A8 AC 6E 61 85 29 F9 A0 DC" 260s | decode_to_chunk() output: 260s | 76 91 be 03 5e 50 20 a8 ac 6e 61 85 29 f9 a0 dc v...^P ..na.)... 260s | CONCATENATE_DATA_AND_BASE: 260s | target: EXTRACT_KEY_FROM_KEY 260s | base: base-key@0xbed435402bc0 (16-bytes, AES_KEY_GEN) 260s | params: 16-bytes@0xffffc40c0e70 260s | key-offset: 0, key-size: 16 260s | EXTRACT_KEY_FROM_KEY: 260s | target: AES_CTR 260s | flags: ENCRYPT+DECRYPT 260s | key_size: 16-bytes 260s | base: base-key@0xbed435405c00 (32-bytes, EXTRACT_KEY_FROM_KEY) 260s | operation: FLAGS_ONLY 260s | params: 8-bytes@0xffffc40c0e78 260s | decode_to_mac() input counter-block: : input "0x 00 E0 01 7B 27 77 7F 3F 4A 17 86 F0 00 00 00 01" 260s | decode_to_mac() output: 260s | 00 e0 01 7b 27 77 7f 3f 4a 17 86 f0 00 00 00 01 ...{'w.?J....... 260s | decode_to_chunk() Plaintext: input "0x00 01 02 03 04 05 06 07 08 09 0A 0B 0C 0D 0E 0F10 11 12 13 14 15 16 17 18 19 1A 1B 1C 1D 1E 1F20 21 22 23" 260s | decode_to_chunk() output: 260s | 00 01 02 03 04 05 06 07 08 09 0a 0b 0c 0d 0e 0f ................ 260s | 10 11 12 13 14 15 16 17 18 19 1a 1b 1c 1d 1e 1f ................ 260s | 20 21 22 23 !"# 260s | decode_to_chunk() Ciphertext: input "0xC1 CF 48 A8 9F 2F FD D9 CF 46 52 E9 EF DB 72 D745 40 A4 2B DE 6D 78 36 D5 9A 5C EA AE F3 10 5325 B2 07 2F" 260s | decode_to_chunk() output: 260s | c1 cf 48 a8 9f 2f fd d9 cf 46 52 e9 ef db 72 d7 ..H../...FR...r. 260s | 45 40 a4 2b de 6d 78 36 d5 9a 5c ea ae f3 10 53 E@.+.mx6..\....S 260s | 25 b2 07 2f %../ 260s | decode_to_chunk() expected counter-block: : input "0x 00 E0 01 7B 27 77 7F 3F 4A 17 86 F0 00 00 00 04" 260s | decode_to_chunk() output: 260s | 00 e0 01 7b 27 77 7f 3f 4a 17 86 f0 00 00 00 04 ...{'w.?J....... 260s | cipher_op_ctr_nss() enter AES_CTR 0xbed4354028c0 use IKEv1 IV wire_iv 0 count 0 260s | ctr_param: count 32 iv 00e0017b27777f3f4a1786f000000001 260s | cipher_op_ctr_nss() counter-block updated from 0x1 to 0x4 for 36 bytes 260s | do_aes_ctr: exit 260s | cipher_op_context_destroy_ctr_nss() 260s | verify_bytes() Encrypting 36 octets using AES-CTR with 128-bit key: encrypt: ok 260s | verify_bytes() Encrypting 36 octets using AES-CTR with 128-bit key: counter-block: ok 260s | decode_to_mac() input counter-block: : input "0x 00 E0 01 7B 27 77 7F 3F 4A 17 86 F0 00 00 00 01" 260s | decode_to_mac() output: 260s | 00 e0 01 7b 27 77 7f 3f 4a 17 86 f0 00 00 00 01 ...{'w.?J....... 260s | decode_to_chunk() Ciphertext: input "0xC1 CF 48 A8 9F 2F FD D9 CF 46 52 E9 EF DB 72 D745 40 A4 2B DE 6D 78 36 D5 9A 5C EA AE F3 10 5325 B2 07 2F" 260s | decode_to_chunk() output: 260s | c1 cf 48 a8 9f 2f fd d9 cf 46 52 e9 ef db 72 d7 ..H../...FR...r. 260s | 45 40 a4 2b de 6d 78 36 d5 9a 5c ea ae f3 10 53 E@.+.mx6..\....S 260s | 25 b2 07 2f %../ 260s | decode_to_chunk() Plaintext: input "0x00 01 02 03 04 05 06 07 08 09 0A 0B 0C 0D 0E 0F10 11 12 13 14 15 16 17 18 19 1A 1B 1C 1D 1E 1F20 21 22 23" 260s | decode_to_chunk() output: 260s | 00 01 02 03 04 05 06 07 08 09 0a 0b 0c 0d 0e 0f ................ 260s | 10 11 12 13 14 15 16 17 18 19 1a 1b 1c 1d 1e 1f ................ 260s | 20 21 22 23 !"# 260s | decode_to_chunk() expected counter-block: : input "0x 00 E0 01 7B 27 77 7F 3F 4A 17 86 F0 00 00 00 04" 260s | decode_to_chunk() output: 260s | 00 e0 01 7b 27 77 7f 3f 4a 17 86 f0 00 00 00 04 ...{'w.?J....... 260s | cipher_op_ctr_nss() enter AES_CTR 0xbed4354028c0 use IKEv1 IV wire_iv 0 count 0 260s | ctr_param: count 32 iv 00e0017b27777f3f4a1786f000000001 260s | cipher_op_ctr_nss() counter-block updated from 0x1 to 0x4 for 36 bytes 260s | do_aes_ctr: exit 260s | cipher_op_context_destroy_ctr_nss() 260s | verify_bytes() Encrypting 36 octets using AES-CTR with 128-bit key: decrypt: ok 260s | verify_bytes() Encrypting 36 octets using AES-CTR with 128-bit key: counter-block: ok 260s ipsec algparse: Encrypting 16 octets using AES-CTR with 192-bit key 260s | decode_to_chunk() raw_key: input "0x16 AF 5B 14 5F C9 F5 79 C1 75 F9 3E 3B FB 0E ED86 3D 06 CC FD B7 85 15" 260s | decode_to_chunk() output: 260s | 16 af 5b 14 5f c9 f5 79 c1 75 f9 3e 3b fb 0e ed ..[._..y.u.>;... 260s | 86 3d 06 cc fd b7 85 15 .=...... 260s | CONCATENATE_DATA_AND_BASE: 260s | target: EXTRACT_KEY_FROM_KEY 260s | base: base-key@0xbed435402bc0 (16-bytes, AES_KEY_GEN) 260s | params: 16-bytes@0xffffc40c0e70 260s | key-offset: 0, key-size: 24 260s | EXTRACT_KEY_FROM_KEY: 260s | target: AES_CTR 260s | flags: ENCRYPT+DECRYPT 260s | key_size: 24-bytes 260s | base: base-key@0xbed435405c00 (40-bytes, EXTRACT_KEY_FROM_KEY) 260s | operation: FLAGS_ONLY 260s | params: 8-bytes@0xffffc40c0e78 260s | decode_to_mac() input counter-block: : input "0x 00 00 00 48 36 73 3C 14 7D 6D 93 CB 00 00 00 01" 260s | decode_to_mac() output: 260s | 00 00 00 48 36 73 3c 14 7d 6d 93 cb 00 00 00 01 ...H6s<.}m...... 260s | decode_to_chunk() Plaintext: input "0x 53 69 6E 67 6C 65 20 62 6C 6F 63 6B 20 6D 73 67" 260s | decode_to_chunk() output: 260s | 53 69 6e 67 6c 65 20 62 6c 6f 63 6b 20 6d 73 67 Single block msg 260s | decode_to_chunk() Ciphertext: input "0x 4B 55 38 4F E2 59 C9 C8 4E 79 35 A0 03 CB E9 28" 260s | decode_to_chunk() output: 260s | 4b 55 38 4f e2 59 c9 c8 4e 79 35 a0 03 cb e9 28 KU8O.Y..Ny5....( 260s | decode_to_chunk() expected counter-block: : input "0x 00 00 00 48 36 73 3C 14 7D 6D 93 CB 00 00 00 02" 260s | decode_to_chunk() output: 260s | 00 00 00 48 36 73 3c 14 7d 6d 93 cb 00 00 00 02 ...H6s<.}m...... 260s | cipher_op_ctr_nss() enter AES_CTR 0xbed4354065b0 use IKEv1 IV wire_iv 0 count 0 260s | ctr_param: count 32 iv 0000004836733c147d6d93cb00000001 260s | cipher_op_ctr_nss() counter-block updated from 0x1 to 0x2 for 16 bytes 260s | do_aes_ctr: exit 260s | cipher_op_context_destroy_ctr_nss() 260s | verify_bytes() Encrypting 16 octets using AES-CTR with 192-bit key: encrypt: ok 260s | verify_bytes() Encrypting 16 octets using AES-CTR with 192-bit key: counter-block: ok 260s | decode_to_mac() input counter-block: : input "0x 00 00 00 48 36 73 3C 14 7D 6D 93 CB 00 00 00 01" 260s | decode_to_mac() output: 260s | 00 00 00 48 36 73 3c 14 7d 6d 93 cb 00 00 00 01 ...H6s<.}m...... 260s | decode_to_chunk() Ciphertext: input "0x 4B 55 38 4F E2 59 C9 C8 4E 79 35 A0 03 CB E9 28" 260s | decode_to_chunk() output: 260s | 4b 55 38 4f e2 59 c9 c8 4e 79 35 a0 03 cb e9 28 KU8O.Y..Ny5....( 260s | decode_to_chunk() Plaintext: input "0x 53 69 6E 67 6C 65 20 62 6C 6F 63 6B 20 6D 73 67" 260s | decode_to_chunk() output: 260s | 53 69 6e 67 6c 65 20 62 6c 6f 63 6b 20 6d 73 67 Single block msg 260s | decode_to_chunk() expected counter-block: : input "0x 00 00 00 48 36 73 3C 14 7D 6D 93 CB 00 00 00 02" 260s | decode_to_chunk() output: 260s | 00 00 00 48 36 73 3c 14 7d 6d 93 cb 00 00 00 02 ...H6s<.}m...... 260s | cipher_op_ctr_nss() enter AES_CTR 0xbed4354065b0 use IKEv1 IV wire_iv 0 count 0 260s | ctr_param: count 32 iv 0000004836733c147d6d93cb00000001 260s | cipher_op_ctr_nss() counter-block updated from 0x1 to 0x2 for 16 bytes 260s | do_aes_ctr: exit 260s | cipher_op_context_destroy_ctr_nss() 260s | verify_bytes() Encrypting 16 octets using AES-CTR with 192-bit key: decrypt: ok 260s | verify_bytes() Encrypting 16 octets using AES-CTR with 192-bit key: counter-block: ok 260s ipsec algparse: Encrypting 32 octets using AES-CTR with 192-bit key 260s | decode_to_chunk() raw_key: input "0x7C 5C B2 40 1B 3D C3 3C 19 E7 34 08 19 E0 F6 9C67 8C 3D B8 E6 F6 A9 1A" 260s | decode_to_chunk() output: 260s | 7c 5c b2 40 1b 3d c3 3c 19 e7 34 08 19 e0 f6 9c |\.@.=.<..4..... 260s | 67 8c 3d b8 e6 f6 a9 1a g.=..... 260s | CONCATENATE_DATA_AND_BASE: 260s | target: EXTRACT_KEY_FROM_KEY 260s | base: base-key@0xbed435402bc0 (16-bytes, AES_KEY_GEN) 260s | params: 16-bytes@0xffffc40c0e70 260s | key-offset: 0, key-size: 24 260s | EXTRACT_KEY_FROM_KEY: 260s | target: AES_CTR 260s | flags: ENCRYPT+DECRYPT 260s | key_size: 24-bytes 260s | base: base-key@0xbed435405c00 (40-bytes, EXTRACT_KEY_FROM_KEY) 260s | operation: FLAGS_ONLY 260s | params: 8-bytes@0xffffc40c0e78 260s | decode_to_mac() input counter-block: : input "0x 00 96 B0 3B 02 0C 6E AD C2 CB 50 0D 00 00 00 01" 260s | decode_to_mac() output: 260s | 00 96 b0 3b 02 0c 6e ad c2 cb 50 0d 00 00 00 01 ...;..n...P..... 260s | decode_to_chunk() Plaintext: input "0x00 01 02 03 04 05 06 07 08 09 0A 0B 0C 0D 0E 0F10 11 12 13 14 15 16 17 18 19 1A 1B 1C 1D 1E 1F" 260s | decode_to_chunk() output: 260s | 00 01 02 03 04 05 06 07 08 09 0a 0b 0c 0d 0e 0f ................ 260s | 10 11 12 13 14 15 16 17 18 19 1a 1b 1c 1d 1e 1f ................ 260s | decode_to_chunk() Ciphertext: input "0x45 32 43 FC 60 9B 23 32 7E DF AA FA 71 31 CD 9F84 90 70 1C 5A D4 A7 9C FC 1F E0 FF 42 F4 FB 00" 260s | decode_to_chunk() output: 260s | 45 32 43 fc 60 9b 23 32 7e df aa fa 71 31 cd 9f E2C.`.#2~...q1.. 260s | 84 90 70 1c 5a d4 a7 9c fc 1f e0 ff 42 f4 fb 00 ..p.Z.......B... 260s | decode_to_chunk() expected counter-block: : input "0x 00 96 B0 3B 02 0C 6E AD C2 CB 50 0D 00 00 00 03" 260s | decode_to_chunk() output: 260s | 00 96 b0 3b 02 0c 6e ad c2 cb 50 0d 00 00 00 03 ...;..n...P..... 260s | cipher_op_ctr_nss() enter AES_CTR 0xbed4354028c0 use IKEv1 IV wire_iv 0 count 0 260s | ctr_param: count 32 iv 0096b03b020c6eadc2cb500d00000001 260s | cipher_op_ctr_nss() counter-block updated from 0x1 to 0x3 for 32 bytes 260s | do_aes_ctr: exit 260s | cipher_op_context_destroy_ctr_nss() 260s | verify_bytes() Encrypting 32 octets using AES-CTR with 192-bit key: encrypt: ok 260s | verify_bytes() Encrypting 32 octets using AES-CTR with 192-bit key: counter-block: ok 260s | decode_to_mac() input counter-block: : input "0x 00 96 B0 3B 02 0C 6E AD C2 CB 50 0D 00 00 00 01" 260s | decode_to_mac() output: 260s | 00 96 b0 3b 02 0c 6e ad c2 cb 50 0d 00 00 00 01 ...;..n...P..... 260s | decode_to_chunk() Ciphertext: input "0x45 32 43 FC 60 9B 23 32 7E DF AA FA 71 31 CD 9F84 90 70 1C 5A D4 A7 9C FC 1F E0 FF 42 F4 FB 00" 260s | decode_to_chunk() output: 260s | 45 32 43 fc 60 9b 23 32 7e df aa fa 71 31 cd 9f E2C.`.#2~...q1.. 260s | 84 90 70 1c 5a d4 a7 9c fc 1f e0 ff 42 f4 fb 00 ..p.Z.......B... 260s | decode_to_chunk() Plaintext: input "0x00 01 02 03 04 05 06 07 08 09 0A 0B 0C 0D 0E 0F10 11 12 13 14 15 16 17 18 19 1A 1B 1C 1D 1E 1F" 260s | decode_to_chunk() output: 260s | 00 01 02 03 04 05 06 07 08 09 0a 0b 0c 0d 0e 0f ................ 260s | 10 11 12 13 14 15 16 17 18 19 1a 1b 1c 1d 1e 1f ................ 260s | decode_to_chunk() expected counter-block: : input "0x 00 96 B0 3B 02 0C 6E AD C2 CB 50 0D 00 00 00 03" 260s | decode_to_chunk() output: 260s | 00 96 b0 3b 02 0c 6e ad c2 cb 50 0d 00 00 00 03 ...;..n...P..... 260s | cipher_op_ctr_nss() enter AES_CTR 0xbed4354028c0 use IKEv1 IV wire_iv 0 count 0 260s | ctr_param: count 32 iv 0096b03b020c6eadc2cb500d00000001 260s | cipher_op_ctr_nss() counter-block updated from 0x1 to 0x3 for 32 bytes 260s | do_aes_ctr: exit 260s | cipher_op_context_destroy_ctr_nss() 260s | verify_bytes() Encrypting 32 octets using AES-CTR with 192-bit key: decrypt: ok 260s | verify_bytes() Encrypting 32 octets using AES-CTR with 192-bit key: counter-block: ok 260s ipsec algparse: Encrypting 36 octets using AES-CTR with 192-bit key 260s | decode_to_chunk() raw_key: input "0x02 BF 39 1E E8 EC B1 59 B9 59 61 7B 09 65 27 9BF5 9B 60 A7 86 D3 E0 FE" 260s | decode_to_chunk() output: 260s | 02 bf 39 1e e8 ec b1 59 b9 59 61 7b 09 65 27 9b ..9....Y.Ya{.e'. 260s | f5 9b 60 a7 86 d3 e0 fe ..`..... 260s | CONCATENATE_DATA_AND_BASE: 260s | target: EXTRACT_KEY_FROM_KEY 260s | base: base-key@0xbed435402bc0 (16-bytes, AES_KEY_GEN) 260s | params: 16-bytes@0xffffc40c0e70 260s | key-offset: 0, key-size: 24 260s | EXTRACT_KEY_FROM_KEY: 260s | target: AES_CTR 260s | flags: ENCRYPT+DECRYPT 260s | key_size: 24-bytes 260s | base: base-key@0xbed435405c00 (40-bytes, EXTRACT_KEY_FROM_KEY) 260s | operation: FLAGS_ONLY 260s | params: 8-bytes@0xffffc40c0e78 260s | decode_to_mac() input counter-block: : input "0x 00 07 BD FD 5C BD 60 27 8D CC 09 12 00 00 00 01" 260s | decode_to_mac() output: 260s | 00 07 bd fd 5c bd 60 27 8d cc 09 12 00 00 00 01 ....\.`'........ 260s | decode_to_chunk() Plaintext: input "0x00 01 02 03 04 05 06 07 08 09 0A 0B 0C 0D 0E 0F10 11 12 13 14 15 16 17 18 19 1A 1B 1C 1D 1E 1F20 21 22 23" 260s | decode_to_chunk() output: 260s | 00 01 02 03 04 05 06 07 08 09 0a 0b 0c 0d 0e 0f ................ 260s | 10 11 12 13 14 15 16 17 18 19 1a 1b 1c 1d 1e 1f ................ 260s | 20 21 22 23 !"# 260s | decode_to_chunk() Ciphertext: input "0x96 89 3F C5 5E 5C 72 2F 54 0B 7D D1 DD F7 E7 58D2 88 BC 95 C6 91 65 88 45 36 C8 11 66 2F 21 88AB EE 09 35" 260s | decode_to_chunk() output: 260s | 96 89 3f c5 5e 5c 72 2f 54 0b 7d d1 dd f7 e7 58 ..?.^\r/T.}....X 260s | d2 88 bc 95 c6 91 65 88 45 36 c8 11 66 2f 21 88 ......e.E6..f/!. 260s | ab ee 09 35 ...5 260s | decode_to_chunk() expected counter-block: : input "0x 00 07 BD FD 5C BD 60 27 8D CC 09 12 00 00 00 04" 260s | decode_to_chunk() output: 260s | 00 07 bd fd 5c bd 60 27 8d cc 09 12 00 00 00 04 ....\.`'........ 260s | cipher_op_ctr_nss() enter AES_CTR 0xbed4354028c0 use IKEv1 IV wire_iv 0 count 0 260s | ctr_param: count 32 iv 0007bdfd5cbd60278dcc091200000001 260s | cipher_op_ctr_nss() counter-block updated from 0x1 to 0x4 for 36 bytes 260s | do_aes_ctr: exit 260s | cipher_op_context_destroy_ctr_nss() 260s | verify_bytes() Encrypting 36 octets using AES-CTR with 192-bit key: encrypt: ok 260s | verify_bytes() Encrypting 36 octets using AES-CTR with 192-bit key: counter-block: ok 260s | decode_to_mac() input counter-block: : input "0x 00 07 BD FD 5C BD 60 27 8D CC 09 12 00 00 00 01" 260s | decode_to_mac() output: 260s | 00 07 bd fd 5c bd 60 27 8d cc 09 12 00 00 00 01 ....\.`'........ 260s | decode_to_chunk() Ciphertext: input "0x96 89 3F C5 5E 5C 72 2F 54 0B 7D D1 DD F7 E7 58D2 88 BC 95 C6 91 65 88 45 36 C8 11 66 2F 21 88AB EE 09 35" 260s | decode_to_chunk() output: 260s | 96 89 3f c5 5e 5c 72 2f 54 0b 7d d1 dd f7 e7 58 ..?.^\r/T.}....X 260s | d2 88 bc 95 c6 91 65 88 45 36 c8 11 66 2f 21 88 ......e.E6..f/!. 260s | ab ee 09 35 ...5 260s | decode_to_chunk() Plaintext: input "0x00 01 02 03 04 05 06 07 08 09 0A 0B 0C 0D 0E 0F10 11 12 13 14 15 16 17 18 19 1A 1B 1C 1D 1E 1F20 21 22 23" 260s | decode_to_chunk() output: 260s | 00 01 02 03 04 05 06 07 08 09 0a 0b 0c 0d 0e 0f ................ 260s | 10 11 12 13 14 15 16 17 18 19 1a 1b 1c 1d 1e 1f ................ 260s | 20 21 22 23 !"# 260s | decode_to_chunk() expected counter-block: : input "0x 00 07 BD FD 5C BD 60 27 8D CC 09 12 00 00 00 04" 260s | decode_to_chunk() output: 260s | 00 07 bd fd 5c bd 60 27 8d cc 09 12 00 00 00 04 ....\.`'........ 260s | cipher_op_ctr_nss() enter AES_CTR 0xbed4354028c0 use IKEv1 IV wire_iv 0 count 0 260s | ctr_param: count 32 iv 0007bdfd5cbd60278dcc091200000001 260s | cipher_op_ctr_nss() counter-block updated from 0x1 to 0x4 for 36 bytes 260s | do_aes_ctr: exit 260s | cipher_op_context_destroy_ctr_nss() 260s | verify_bytes() Encrypting 36 octets using AES-CTR with 192-bit key: decrypt: ok 260s | verify_bytes() Encrypting 36 octets using AES-CTR with 192-bit key: counter-block: ok 260s ipsec algparse: Encrypting 16 octets using AES-CTR with 256-bit key 260s | decode_to_chunk() raw_key: input "0x77 6B EF F2 85 1D B0 6F 4C 8A 05 42 C8 69 6F 6C6A 81 AF 1E EC 96 B4 D3 7F C1 D6 89 E6 C1 C1 04" 260s | decode_to_chunk() output: 260s | 77 6b ef f2 85 1d b0 6f 4c 8a 05 42 c8 69 6f 6c wk.....oL..B.iol 260s | 6a 81 af 1e ec 96 b4 d3 7f c1 d6 89 e6 c1 c1 04 j............... 260s | CONCATENATE_DATA_AND_BASE: 260s | target: EXTRACT_KEY_FROM_KEY 260s | base: base-key@0xbed435402bc0 (16-bytes, AES_KEY_GEN) 260s | params: 16-bytes@0xffffc40c0e70 260s | key-offset: 0, key-size: 32 260s | EXTRACT_KEY_FROM_KEY: 260s | target: AES_CTR 260s | flags: ENCRYPT+DECRYPT 260s | key_size: 32-bytes 260s | base: base-key@0xbed435405c00 (48-bytes, EXTRACT_KEY_FROM_KEY) 260s | operation: FLAGS_ONLY 260s | params: 8-bytes@0xffffc40c0e78 260s | decode_to_mac() input counter-block: : input "0x 00 00 00 60 DB 56 72 C9 7A A8 F0 B2 00 00 00 01" 260s | decode_to_mac() output: 260s | 00 00 00 60 db 56 72 c9 7a a8 f0 b2 00 00 00 01 ...`.Vr.z....... 260s | decode_to_chunk() Plaintext: input "0x 53 69 6E 67 6C 65 20 62 6C 6F 63 6B 20 6D 73 67" 260s | decode_to_chunk() output: 260s | 53 69 6e 67 6c 65 20 62 6c 6f 63 6b 20 6d 73 67 Single block msg 260s | decode_to_chunk() Ciphertext: input "0x 14 5A D0 1D BF 82 4E C7 56 08 63 DC 71 E3 E0 C0" 260s | decode_to_chunk() output: 260s | 14 5a d0 1d bf 82 4e c7 56 08 63 dc 71 e3 e0 c0 .Z....N.V.c.q... 260s | decode_to_chunk() expected counter-block: : input "0x 00 00 00 60 DB 56 72 C9 7A A8 F0 B2 00 00 00 02" 260s | decode_to_chunk() output: 260s | 00 00 00 60 db 56 72 c9 7a a8 f0 b2 00 00 00 02 ...`.Vr.z....... 260s | cipher_op_ctr_nss() enter AES_CTR 0xbed4354065b0 use IKEv1 IV wire_iv 0 count 0 260s | ctr_param: count 32 iv 00000060db5672c97aa8f0b200000001 260s | cipher_op_ctr_nss() counter-block updated from 0x1 to 0x2 for 16 bytes 260s | do_aes_ctr: exit 260s | cipher_op_context_destroy_ctr_nss() 260s | verify_bytes() Encrypting 16 octets using AES-CTR with 256-bit key: encrypt: ok 260s | verify_bytes() Encrypting 16 octets using AES-CTR with 256-bit key: counter-block: ok 260s | decode_to_mac() input counter-block: : input "0x 00 00 00 60 DB 56 72 C9 7A A8 F0 B2 00 00 00 01" 260s | decode_to_mac() output: 260s | 00 00 00 60 db 56 72 c9 7a a8 f0 b2 00 00 00 01 ...`.Vr.z....... 260s | decode_to_chunk() Ciphertext: input "0x 14 5A D0 1D BF 82 4E C7 56 08 63 DC 71 E3 E0 C0" 260s | decode_to_chunk() output: 260s | 14 5a d0 1d bf 82 4e c7 56 08 63 dc 71 e3 e0 c0 .Z....N.V.c.q... 260s | decode_to_chunk() Plaintext: input "0x 53 69 6E 67 6C 65 20 62 6C 6F 63 6B 20 6D 73 67" 260s | decode_to_chunk() output: 260s | 53 69 6e 67 6c 65 20 62 6c 6f 63 6b 20 6d 73 67 Single block msg 260s | decode_to_chunk() expected counter-block: : input "0x 00 00 00 60 DB 56 72 C9 7A A8 F0 B2 00 00 00 02" 260s | decode_to_chunk() output: 260s | 00 00 00 60 db 56 72 c9 7a a8 f0 b2 00 00 00 02 ...`.Vr.z....... 260s | cipher_op_ctr_nss() enter AES_CTR 0xbed4354065b0 use IKEv1 IV wire_iv 0 count 0 260s | ctr_param: count 32 iv 00000060db5672c97aa8f0b200000001 260s | cipher_op_ctr_nss() counter-block updated from 0x1 to 0x2 for 16 bytes 260s | do_aes_ctr: exit 260s | cipher_op_context_destroy_ctr_nss() 260s | verify_bytes() Encrypting 16 octets using AES-CTR with 256-bit key: decrypt: ok 260s | verify_bytes() Encrypting 16 octets using AES-CTR with 256-bit key: counter-block: ok 260s ipsec algparse: Encrypting 32 octets using AES-CTR with 256-bit key 260s | decode_to_chunk() raw_key: input "0xF6 D6 6D 6B D5 2D 59 BB 07 96 36 58 79 EF F8 86C6 6D D5 1A 5B 6A 99 74 4B 50 59 0C 87 A2 38 84" 260s | decode_to_chunk() output: 260s | f6 d6 6d 6b d5 2d 59 bb 07 96 36 58 79 ef f8 86 ..mk.-Y...6Xy... 260s | c6 6d d5 1a 5b 6a 99 74 4b 50 59 0c 87 a2 38 84 .m..[j.tKPY...8. 260s | CONCATENATE_DATA_AND_BASE: 260s | target: EXTRACT_KEY_FROM_KEY 260s | base: base-key@0xbed435402bc0 (16-bytes, AES_KEY_GEN) 260s | params: 16-bytes@0xffffc40c0e70 260s | key-offset: 0, key-size: 32 260s | EXTRACT_KEY_FROM_KEY: 260s | target: AES_CTR 260s | flags: ENCRYPT+DECRYPT 260s | key_size: 32-bytes 260s | base: base-key@0xbed435405c00 (48-bytes, EXTRACT_KEY_FROM_KEY) 260s | operation: FLAGS_ONLY 260s | params: 8-bytes@0xffffc40c0e78 260s | decode_to_mac() input counter-block: : input "0x 00 FA AC 24 C1 58 5E F1 5A 43 D8 75 00 00 00 01" 260s | decode_to_mac() output: 260s | 00 fa ac 24 c1 58 5e f1 5a 43 d8 75 00 00 00 01 ...$.X^.ZC.u.... 260s | decode_to_chunk() Plaintext: input "0x00 01 02 03 04 05 06 07 08 09 0A 0B 0C 0D 0E 0F10 11 12 13 14 15 16 17 18 19 1A 1B 1C 1D 1E 1F" 260s | decode_to_chunk() output: 260s | 00 01 02 03 04 05 06 07 08 09 0a 0b 0c 0d 0e 0f ................ 260s | 10 11 12 13 14 15 16 17 18 19 1a 1b 1c 1d 1e 1f ................ 260s | decode_to_chunk() Ciphertext: input "0xF0 5E 23 1B 38 94 61 2C 49 EE 00 0B 80 4E B2 A9B8 30 6B 50 8F 83 9D 6A 55 30 83 1D 93 44 AF 1C" 260s | decode_to_chunk() output: 260s | f0 5e 23 1b 38 94 61 2c 49 ee 00 0b 80 4e b2 a9 .^#.8.a,I....N.. 260s | b8 30 6b 50 8f 83 9d 6a 55 30 83 1d 93 44 af 1c .0kP...jU0...D.. 260s | decode_to_chunk() expected counter-block: : input "0x 00 FA AC 24 C1 58 5E F1 5A 43 D8 75 00 00 00 03" 260s | decode_to_chunk() output: 260s | 00 fa ac 24 c1 58 5e f1 5a 43 d8 75 00 00 00 03 ...$.X^.ZC.u.... 260s | cipher_op_ctr_nss() enter AES_CTR 0xbed4354028c0 use IKEv1 IV wire_iv 0 count 0 260s | ctr_param: count 32 iv 00faac24c1585ef15a43d87500000001 260s | cipher_op_ctr_nss() counter-block updated from 0x1 to 0x3 for 32 bytes 260s | do_aes_ctr: exit 260s | cipher_op_context_destroy_ctr_nss() 260s | verify_bytes() Encrypting 32 octets using AES-CTR with 256-bit key: encrypt: ok 260s | verify_bytes() Encrypting 32 octets using AES-CTR with 256-bit key: counter-block: ok 260s | decode_to_mac() input counter-block: : input "0x 00 FA AC 24 C1 58 5E F1 5A 43 D8 75 00 00 00 01" 260s | decode_to_mac() output: 260s | 00 fa ac 24 c1 58 5e f1 5a 43 d8 75 00 00 00 01 ...$.X^.ZC.u.... 260s | decode_to_chunk() Ciphertext: input "0xF0 5E 23 1B 38 94 61 2C 49 EE 00 0B 80 4E B2 A9B8 30 6B 50 8F 83 9D 6A 55 30 83 1D 93 44 AF 1C" 260s | decode_to_chunk() output: 260s | f0 5e 23 1b 38 94 61 2c 49 ee 00 0b 80 4e b2 a9 .^#.8.a,I....N.. 260s | b8 30 6b 50 8f 83 9d 6a 55 30 83 1d 93 44 af 1c .0kP...jU0...D.. 260s | decode_to_chunk() Plaintext: input "0x00 01 02 03 04 05 06 07 08 09 0A 0B 0C 0D 0E 0F10 11 12 13 14 15 16 17 18 19 1A 1B 1C 1D 1E 1F" 260s | decode_to_chunk() output: 260s | 00 01 02 03 04 05 06 07 08 09 0a 0b 0c 0d 0e 0f ................ 260s | 10 11 12 13 14 15 16 17 18 19 1a 1b 1c 1d 1e 1f ................ 260s | decode_to_chunk() expected counter-block: : input "0x 00 FA AC 24 C1 58 5E F1 5A 43 D8 75 00 00 00 03" 260s | decode_to_chunk() output: 260s | 00 fa ac 24 c1 58 5e f1 5a 43 d8 75 00 00 00 03 ...$.X^.ZC.u.... 260s | cipher_op_ctr_nss() enter AES_CTR 0xbed4354028c0 use IKEv1 IV wire_iv 0 count 0 260s | ctr_param: count 32 iv 00faac24c1585ef15a43d87500000001 260s | cipher_op_ctr_nss() counter-block updated from 0x1 to 0x3 for 32 bytes 260s | do_aes_ctr: exit 260s | cipher_op_context_destroy_ctr_nss() 260s | verify_bytes() Encrypting 32 octets using AES-CTR with 256-bit key: decrypt: ok 260s | verify_bytes() Encrypting 32 octets using AES-CTR with 256-bit key: counter-block: ok 260s ipsec algparse: Encrypting 36 octets using AES-CTR with 256-bit key 260s | decode_to_chunk() raw_key: input "0xFF 7A 61 7C E6 91 48 E4 F1 72 6E 2F 43 58 1D E2AA 62 D9 F8 05 53 2E DF F1 EE D6 87 FB 54 15 3D" 260s | decode_to_chunk() output: 260s | ff 7a 61 7c e6 91 48 e4 f1 72 6e 2f 43 58 1d e2 .za|..H..rn/CX.. 260s | aa 62 d9 f8 05 53 2e df f1 ee d6 87 fb 54 15 3d .b...S.......T.= 260s | CONCATENATE_DATA_AND_BASE: 260s | target: EXTRACT_KEY_FROM_KEY 260s | base: base-key@0xbed435402bc0 (16-bytes, AES_KEY_GEN) 260s | params: 16-bytes@0xffffc40c0e70 260s | key-offset: 0, key-size: 32 260s | EXTRACT_KEY_FROM_KEY: 260s | target: AES_CTR 260s | flags: ENCRYPT+DECRYPT 260s | key_size: 32-bytes 260s | base: base-key@0xbed435405c00 (48-bytes, EXTRACT_KEY_FROM_KEY) 260s | operation: FLAGS_ONLY 260s | params: 8-bytes@0xffffc40c0e78 260s | decode_to_mac() input counter-block: : input "0x 00 1C C5 B7 51 A5 1D 70 A1 C1 11 48 00 00 00 01" 260s | decode_to_mac() output: 260s | 00 1c c5 b7 51 a5 1d 70 a1 c1 11 48 00 00 00 01 ....Q..p...H.... 260s | decode_to_chunk() Plaintext: input "0x00 01 02 03 04 05 06 07 08 09 0A 0B 0C 0D 0E 0F10 11 12 13 14 15 16 17 18 19 1A 1B 1C 1D 1E 1F20 21 22 23" 260s | decode_to_chunk() output: 260s | 00 01 02 03 04 05 06 07 08 09 0a 0b 0c 0d 0e 0f ................ 260s | 10 11 12 13 14 15 16 17 18 19 1a 1b 1c 1d 1e 1f ................ 260s | 20 21 22 23 !"# 260s | decode_to_chunk() Ciphertext: input "0xEB 6C 52 82 1D 0B BB F7 CE 75 94 46 2A CA 4F AAB4 07 DF 86 65 69 FD 07 F4 8C C0 B5 83 D6 07 1F1E C0 E6 B8" 260s | decode_to_chunk() output: 260s | eb 6c 52 82 1d 0b bb f7 ce 75 94 46 2a ca 4f aa .lR......u.F*.O. 260s | b4 07 df 86 65 69 fd 07 f4 8c c0 b5 83 d6 07 1f ....ei.......... 260s | 1e c0 e6 b8 .... 260s | decode_to_chunk() expected counter-block: : input "0x 00 1C C5 B7 51 A5 1D 70 A1 C1 11 48 00 00 00 04" 260s | decode_to_chunk() output: 260s | 00 1c c5 b7 51 a5 1d 70 a1 c1 11 48 00 00 00 04 ....Q..p...H.... 260s | cipher_op_ctr_nss() enter AES_CTR 0xbed4354028c0 use IKEv1 IV wire_iv 0 count 0 260s | ctr_param: count 32 iv 001cc5b751a51d70a1c1114800000001 260s | cipher_op_ctr_nss() counter-block updated from 0x1 to 0x4 for 36 bytes 260s | do_aes_ctr: exit 260s | cipher_op_context_destroy_ctr_nss() 260s | verify_bytes() Encrypting 36 octets using AES-CTR with 256-bit key: encrypt: ok 260s | verify_bytes() Encrypting 36 octets using AES-CTR with 256-bit key: counter-block: ok 260s | decode_to_mac() input counter-block: : input "0x 00 1C C5 B7 51 A5 1D 70 A1 C1 11 48 00 00 00 01" 260s | decode_to_mac() output: 260s | 00 1c c5 b7 51 a5 1d 70 a1 c1 11 48 00 00 00 01 ....Q..p...H.... 260s | decode_to_chunk() Ciphertext: input "0xEB 6C 52 82 1D 0B BB F7 CE 75 94 46 2A CA 4F AAB4 07 DF 86 65 69 FD 07 F4 8C C0 B5 83 D6 07 1F1E C0 E6 B8" 260s | decode_to_chunk() output: 260s | eb 6c 52 82 1d 0b bb f7 ce 75 94 46 2a ca 4f aa .lR......u.F*.O. 260s | b4 07 df 86 65 69 fd 07 f4 8c c0 b5 83 d6 07 1f ....ei.......... 260s | 1e c0 e6 b8 .... 260s | decode_to_chunk() Plaintext: input "0x00 01 02 03 04 05 06 07 08 09 0A 0B 0C 0D 0E 0F10 11 12 13 14 15 16 17 18 19 1A 1B 1C 1D 1E 1F20 21 22 23" 260s | decode_to_chunk() output: 260s | 00 01 02 03 04 05 06 07 08 09 0a 0b 0c 0d 0e 0f ................ 260s | 10 11 12 13 14 15 16 17 18 19 1a 1b 1c 1d 1e 1f ................ 260s | 20 21 22 23 !"# 260s | decode_to_chunk() expected counter-block: : input "0x 00 1C C5 B7 51 A5 1D 70 A1 C1 11 48 00 00 00 04" 260s | decode_to_chunk() output: 260s | 00 1c c5 b7 51 a5 1d 70 a1 c1 11 48 00 00 00 04 ....Q..p...H.... 260s | cipher_op_ctr_nss() enter AES_CTR 0xbed4354028c0 use IKEv1 IV wire_iv 0 count 0 260s | ctr_param: count 32 iv 001cc5b751a51d70a1c1114800000001 260s | cipher_op_ctr_nss() counter-block updated from 0x1 to 0x4 for 36 bytes 260s | do_aes_ctr: exit 260s | cipher_op_context_destroy_ctr_nss() 260s | verify_bytes() Encrypting 36 octets using AES-CTR with 256-bit key: decrypt: ok 260s | verify_bytes() Encrypting 36 octets using AES-CTR with 256-bit key: counter-block: ok 260s ipsec algparse: testing AES_CBC: 260s ipsec algparse: Encrypting 16 bytes (1 block) using AES-CBC with 128-bit key 260s | decode_to_chunk() raw_key: input "0x06a9214036b8a15b512e03d534120006" 260s | decode_to_chunk() output: 260s | 06 a9 21 40 36 b8 a1 5b 51 2e 03 d5 34 12 00 06 ..!@6..[Q...4... 260s | CONCATENATE_DATA_AND_BASE: 260s | target: EXTRACT_KEY_FROM_KEY 260s | base: base-key@0xbed435402bc0 (16-bytes, AES_KEY_GEN) 260s | params: 16-bytes@0xffffc40c0e80 260s | key-offset: 0, key-size: 16 260s | EXTRACT_KEY_FROM_KEY: 260s | target: AES_CBC 260s | flags: ENCRYPT+DECRYPT 260s | key_size: 16-bytes 260s | base: base-key@0xbed435405c00 (32-bytes, EXTRACT_KEY_FROM_KEY) 260s | operation: FLAGS_ONLY 260s | params: 8-bytes@0xffffc40c0e88 260s | decode_to_mac() IV: : input "0x3dafba429d9eb430b422da802c9fac41" 260s | decode_to_mac() output: 260s | 3d af ba 42 9d 9e b4 30 b4 22 da 80 2c 9f ac 41 =..B...0."..,..A 260s | decode_to_chunk() new IV: : input "0xe353779c1079aeb82708942dbe77181a" 260s | decode_to_chunk() output: 260s | e3 53 77 9c 10 79 ae b8 27 08 94 2d be 77 18 1a .Sw..y..'..-.w.. 260s | decode_to_chunk() plaintext: : input "Single block msg" 260s | decode_to_chunk() output: 260s | 53 69 6e 67 6c 65 20 62 6c 6f 63 6b 20 6d 73 67 Single block msg 260s | decode_to_chunk() ciphertext: : input "0xe353779c1079aeb82708942dbe77181a" 260s | decode_to_chunk() output: 260s | e3 53 77 9c 10 79 ae b8 27 08 94 2d be 77 18 1a .Sw..y..'..-.w.. 260s | NSS ike_alg_nss_cbc: AES_CBC - enter (nil) 260s | using IKEv1 IV 260s | NSS ike_alg_nss_cbc: AES_CBC - exit 260s | verify_bytes() Encrypting 16 bytes (1 block) using AES-CBC with 128-bit key: encrypt: ok 260s | verify_bytes() Encrypting 16 bytes (1 block) using AES-CBC with 128-bit key: updated CBC IV: ok 260s | decode_to_mac() IV: : input "0x3dafba429d9eb430b422da802c9fac41" 260s | decode_to_mac() output: 260s | 3d af ba 42 9d 9e b4 30 b4 22 da 80 2c 9f ac 41 =..B...0."..,..A 260s | decode_to_chunk() new IV: : input "0xe353779c1079aeb82708942dbe77181a" 260s | decode_to_chunk() output: 260s | e3 53 77 9c 10 79 ae b8 27 08 94 2d be 77 18 1a .Sw..y..'..-.w.. 260s | decode_to_chunk() ciphertext: : input "0xe353779c1079aeb82708942dbe77181a" 260s | decode_to_chunk() output: 260s | e3 53 77 9c 10 79 ae b8 27 08 94 2d be 77 18 1a .Sw..y..'..-.w.. 260s | decode_to_chunk() plaintext: : input "Single block msg" 260s | decode_to_chunk() output: 260s | 53 69 6e 67 6c 65 20 62 6c 6f 63 6b 20 6d 73 67 Single block msg 260s | NSS ike_alg_nss_cbc: AES_CBC - enter (nil) 260s | using IKEv1 IV 260s | NSS ike_alg_nss_cbc: AES_CBC - exit 260s | verify_bytes() Encrypting 16 bytes (1 block) using AES-CBC with 128-bit key: decrypt: ok 260s | verify_bytes() Encrypting 16 bytes (1 block) using AES-CBC with 128-bit key: updated CBC IV: ok 260s ipsec algparse: Encrypting 32 bytes (2 blocks) using AES-CBC with 128-bit key 260s | decode_to_chunk() raw_key: input "0xc286696d887c9aa0611bbb3e2025a45a" 260s | decode_to_chunk() output: 260s | c2 86 69 6d 88 7c 9a a0 61 1b bb 3e 20 25 a4 5a ..im.|..a..> %.Z 260s | CONCATENATE_DATA_AND_BASE: 260s | target: EXTRACT_KEY_FROM_KEY 260s | base: base-key@0xbed435402bc0 (16-bytes, AES_KEY_GEN) 260s | params: 16-bytes@0xffffc40c0e80 260s | key-offset: 0, key-size: 16 260s | EXTRACT_KEY_FROM_KEY: 260s | target: AES_CBC 260s | flags: ENCRYPT+DECRYPT 260s | key_size: 16-bytes 260s | base: base-key@0xbed435405c00 (32-bytes, EXTRACT_KEY_FROM_KEY) 260s | operation: FLAGS_ONLY 260s | params: 8-bytes@0xffffc40c0e88 260s | decode_to_mac() IV: : input "0x562e17996d093d28ddb3ba695a2e6f58" 260s | decode_to_mac() output: 260s | 56 2e 17 99 6d 09 3d 28 dd b3 ba 69 5a 2e 6f 58 V...m.=(...iZ.oX 260s | decode_to_chunk() new IV: : input "0xd296cd94c2cccf8a3a863028b5e1dc0a7586602d253cfff91b8266bea6d61ab1" 260s | decode_to_chunk() output: 260s | d2 96 cd 94 c2 cc cf 8a 3a 86 30 28 b5 e1 dc 0a ........:.0(.... 260s | 75 86 60 2d 25 3c ff f9 1b 82 66 be a6 d6 1a b1 u.`-%<....f..... 260s | decode_to_chunk() plaintext: : input "0x000102030405060708090a0b0c0d0e0f101112131415161718191a1b1c1d1e1f" 260s | decode_to_chunk() output: 260s | 00 01 02 03 04 05 06 07 08 09 0a 0b 0c 0d 0e 0f ................ 260s | 10 11 12 13 14 15 16 17 18 19 1a 1b 1c 1d 1e 1f ................ 260s | decode_to_chunk() ciphertext: : input "0xd296cd94c2cccf8a3a863028b5e1dc0a7586602d253cfff91b8266bea6d61ab1" 260s | decode_to_chunk() output: 260s | d2 96 cd 94 c2 cc cf 8a 3a 86 30 28 b5 e1 dc 0a ........:.0(.... 260s | 75 86 60 2d 25 3c ff f9 1b 82 66 be a6 d6 1a b1 u.`-%<....f..... 260s | NSS ike_alg_nss_cbc: AES_CBC - enter (nil) 260s | using IKEv1 IV 260s | NSS ike_alg_nss_cbc: AES_CBC - exit 260s | verify_bytes() Encrypting 32 bytes (2 blocks) using AES-CBC with 128-bit key: encrypt: ok 260s | verify_bytes() Encrypting 32 bytes (2 blocks) using AES-CBC with 128-bit key: updated CBC IV: ok 260s | decode_to_mac() IV: : input "0x562e17996d093d28ddb3ba695a2e6f58" 260s | decode_to_mac() output: 260s | 56 2e 17 99 6d 09 3d 28 dd b3 ba 69 5a 2e 6f 58 V...m.=(...iZ.oX 260s | decode_to_chunk() new IV: : input "0xd296cd94c2cccf8a3a863028b5e1dc0a7586602d253cfff91b8266bea6d61ab1" 260s | decode_to_chunk() output: 260s | d2 96 cd 94 c2 cc cf 8a 3a 86 30 28 b5 e1 dc 0a ........:.0(.... 260s | 75 86 60 2d 25 3c ff f9 1b 82 66 be a6 d6 1a b1 u.`-%<....f..... 260s | decode_to_chunk() ciphertext: : input "0xd296cd94c2cccf8a3a863028b5e1dc0a7586602d253cfff91b8266bea6d61ab1" 260s | decode_to_chunk() output: 260s | d2 96 cd 94 c2 cc cf 8a 3a 86 30 28 b5 e1 dc 0a ........:.0(.... 260s | 75 86 60 2d 25 3c ff f9 1b 82 66 be a6 d6 1a b1 u.`-%<....f..... 260s | decode_to_chunk() plaintext: : input "0x000102030405060708090a0b0c0d0e0f101112131415161718191a1b1c1d1e1f" 260s | decode_to_chunk() output: 260s | 00 01 02 03 04 05 06 07 08 09 0a 0b 0c 0d 0e 0f ................ 260s | 10 11 12 13 14 15 16 17 18 19 1a 1b 1c 1d 1e 1f ................ 260s | NSS ike_alg_nss_cbc: AES_CBC - enter (nil) 260s | using IKEv1 IV 260s | NSS ike_alg_nss_cbc: AES_CBC - exit 260s | verify_bytes() Encrypting 32 bytes (2 blocks) using AES-CBC with 128-bit key: decrypt: ok 260s | verify_bytes() Encrypting 32 bytes (2 blocks) using AES-CBC with 128-bit key: updated CBC IV: ok 260s ipsec algparse: Encrypting 48 bytes (3 blocks) using AES-CBC with 128-bit key 260s | decode_to_chunk() raw_key: input "0x6c3ea0477630ce21a2ce334aa746c2cd" 260s | decode_to_chunk() output: 260s | 6c 3e a0 47 76 30 ce 21 a2 ce 33 4a a7 46 c2 cd l>.Gv0.!..3J.F.. 260s | CONCATENATE_DATA_AND_BASE: 260s | target: EXTRACT_KEY_FROM_KEY 260s | base: base-key@0xbed435402bc0 (16-bytes, AES_KEY_GEN) 260s | params: 16-bytes@0xffffc40c0e80 260s | key-offset: 0, key-size: 16 260s | EXTRACT_KEY_FROM_KEY: 260s | target: AES_CBC 260s | flags: ENCRYPT+DECRYPT 260s | key_size: 16-bytes 260s | base: base-key@0xbed435405c00 (32-bytes, EXTRACT_KEY_FROM_KEY) 260s | operation: FLAGS_ONLY 260s | params: 8-bytes@0xffffc40c0e88 260s | decode_to_mac() IV: : input "0xc782dc4c098c66cbd9cd27d825682c81" 260s | decode_to_mac() output: 260s | c7 82 dc 4c 09 8c 66 cb d9 cd 27 d8 25 68 2c 81 ...L..f...'.%h,. 260s | decode_to_chunk() new IV: : input "0xd0a02b3836451753d493665d33f0e8862dea54cdb293abc7506939276772f8d5021c19216bad525c8579695d83ba2684" 260s | decode_to_chunk() output: 260s | d0 a0 2b 38 36 45 17 53 d4 93 66 5d 33 f0 e8 86 ..+86E.S..f]3... 260s | 2d ea 54 cd b2 93 ab c7 50 69 39 27 67 72 f8 d5 -.T.....Pi9'gr.. 260s | 02 1c 19 21 6b ad 52 5c 85 79 69 5d 83 ba 26 84 ...!k.R\.yi]..&. 260s | decode_to_chunk() plaintext: : input "This is a 48-byte message (exactly 3 AES blocks)" 260s | decode_to_chunk() output: 260s | 54 68 69 73 20 69 73 20 61 20 34 38 2d 62 79 74 This is a 48-byt 260s | 65 20 6d 65 73 73 61 67 65 20 28 65 78 61 63 74 e message (exact 260s | 6c 79 20 33 20 41 45 53 20 62 6c 6f 63 6b 73 29 ly 3 AES blocks) 260s | decode_to_chunk() ciphertext: : input "0xd0a02b3836451753d493665d33f0e8862dea54cdb293abc7506939276772f8d5021c19216bad525c8579695d83ba2684" 260s | decode_to_chunk() output: 260s | d0 a0 2b 38 36 45 17 53 d4 93 66 5d 33 f0 e8 86 ..+86E.S..f]3... 260s | 2d ea 54 cd b2 93 ab c7 50 69 39 27 67 72 f8 d5 -.T.....Pi9'gr.. 260s | 02 1c 19 21 6b ad 52 5c 85 79 69 5d 83 ba 26 84 ...!k.R\.yi]..&. 260s | NSS ike_alg_nss_cbc: AES_CBC - enter (nil) 260s | using IKEv1 IV 260s | NSS ike_alg_nss_cbc: AES_CBC - exit 260s | verify_bytes() Encrypting 48 bytes (3 blocks) using AES-CBC with 128-bit key: encrypt: ok 260s | verify_bytes() Encrypting 48 bytes (3 blocks) using AES-CBC with 128-bit key: updated CBC IV: ok 260s | decode_to_mac() IV: : input "0xc782dc4c098c66cbd9cd27d825682c81" 260s | decode_to_mac() output: 260s | c7 82 dc 4c 09 8c 66 cb d9 cd 27 d8 25 68 2c 81 ...L..f...'.%h,. 260s | decode_to_chunk() new IV: : input "0xd0a02b3836451753d493665d33f0e8862dea54cdb293abc7506939276772f8d5021c19216bad525c8579695d83ba2684" 260s | decode_to_chunk() output: 260s | d0 a0 2b 38 36 45 17 53 d4 93 66 5d 33 f0 e8 86 ..+86E.S..f]3... 260s | 2d ea 54 cd b2 93 ab c7 50 69 39 27 67 72 f8 d5 -.T.....Pi9'gr.. 260s | 02 1c 19 21 6b ad 52 5c 85 79 69 5d 83 ba 26 84 ...!k.R\.yi]..&. 260s | decode_to_chunk() ciphertext: : input "0xd0a02b3836451753d493665d33f0e8862dea54cdb293abc7506939276772f8d5021c19216bad525c8579695d83ba2684" 260s | decode_to_chunk() output: 260s | d0 a0 2b 38 36 45 17 53 d4 93 66 5d 33 f0 e8 86 ..+86E.S..f]3... 260s | 2d ea 54 cd b2 93 ab c7 50 69 39 27 67 72 f8 d5 -.T.....Pi9'gr.. 260s | 02 1c 19 21 6b ad 52 5c 85 79 69 5d 83 ba 26 84 ...!k.R\.yi]..&. 260s | decode_to_chunk() plaintext: : input "This is a 48-byte message (exactly 3 AES blocks)" 260s | decode_to_chunk() output: 260s | 54 68 69 73 20 69 73 20 61 20 34 38 2d 62 79 74 This is a 48-byt 260s | 65 20 6d 65 73 73 61 67 65 20 28 65 78 61 63 74 e message (exact 260s | 6c 79 20 33 20 41 45 53 20 62 6c 6f 63 6b 73 29 ly 3 AES blocks) 260s | NSS ike_alg_nss_cbc: AES_CBC - enter (nil) 260s | using IKEv1 IV 260s | NSS ike_alg_nss_cbc: AES_CBC - exit 260s | verify_bytes() Encrypting 48 bytes (3 blocks) using AES-CBC with 128-bit key: decrypt: ok 260s | verify_bytes() Encrypting 48 bytes (3 blocks) using AES-CBC with 128-bit key: updated CBC IV: ok 260s ipsec algparse: Encrypting 64 bytes (4 blocks) using AES-CBC with 128-bit key 260s | decode_to_chunk() raw_key: input "0x56e47a38c5598974bc46903dba290349" 260s | decode_to_chunk() output: 260s | 56 e4 7a 38 c5 59 89 74 bc 46 90 3d ba 29 03 49 V.z8.Y.t.F.=.).I 260s | CONCATENATE_DATA_AND_BASE: 260s | target: EXTRACT_KEY_FROM_KEY 260s | base: base-key@0xbed435402bc0 (16-bytes, AES_KEY_GEN) 260s | params: 16-bytes@0xffffc40c0e80 260s | key-offset: 0, key-size: 16 260s | EXTRACT_KEY_FROM_KEY: 260s | target: AES_CBC 260s | flags: ENCRYPT+DECRYPT 260s | key_size: 16-bytes 260s | base: base-key@0xbed435405c00 (32-bytes, EXTRACT_KEY_FROM_KEY) 260s | operation: FLAGS_ONLY 260s | params: 8-bytes@0xffffc40c0e88 260s | decode_to_mac() IV: : input "0x8ce82eefbea0da3c44699ed7db51b7d9" 260s | decode_to_mac() output: 260s | 8c e8 2e ef be a0 da 3c 44 69 9e d7 db 51 b7 d9 ...........U 260s | decode_to_chunk() plaintext: : input "0xa0a1a2a3a4a5a6a7a8a9aaabacadaeafb0b1b2b3b4b5b6b7b8b9babbbcbdbebfc0c1c2c3c4c5c6c7c8c9cacbcccdcecfd0d1d2d3d4d5d6d7d8d9dadbdcdddedf" 260s | decode_to_chunk() output: 260s | a0 a1 a2 a3 a4 a5 a6 a7 a8 a9 aa ab ac ad ae af ................ 260s | b0 b1 b2 b3 b4 b5 b6 b7 b8 b9 ba bb bc bd be bf ................ 260s | c0 c1 c2 c3 c4 c5 c6 c7 c8 c9 ca cb cc cd ce cf ................ 260s | d0 d1 d2 d3 d4 d5 d6 d7 d8 d9 da db dc dd de df ................ 260s | decode_to_chunk() ciphertext: : input "0xc30e32ffedc0774e6aff6af0869f71aa0f3af07a9a31a9c684db207eb0ef8e4e35907aa632c3ffdf868bb7b29d3d46ad83ce9f9a102ee99d49a53e87f4c3da55" 260s | decode_to_chunk() output: 260s | c3 0e 32 ff ed c0 77 4e 6a ff 6a f0 86 9f 71 aa ..2...wNj.j...q. 260s | 0f 3a f0 7a 9a 31 a9 c6 84 db 20 7e b0 ef 8e 4e .:.z.1.... ~...N 260s | 35 90 7a a6 32 c3 ff df 86 8b b7 b2 9d 3d 46 ad 5.z.2........=F. 260s | 83 ce 9f 9a 10 2e e9 9d 49 a5 3e 87 f4 c3 da 55 ........I.>....U 260s | NSS ike_alg_nss_cbc: AES_CBC - enter (nil) 260s | using IKEv1 IV 260s | NSS ike_alg_nss_cbc: AES_CBC - exit 260s | verify_bytes() Encrypting 64 bytes (4 blocks) using AES-CBC with 128-bit key: encrypt: ok 260s | verify_bytes() Encrypting 64 bytes (4 blocks) using AES-CBC with 128-bit key: updated CBC IV: ok 260s | decode_to_mac() IV: : input "0x8ce82eefbea0da3c44699ed7db51b7d9" 260s | decode_to_mac() output: 260s | 8c e8 2e ef be a0 da 3c 44 69 9e d7 db 51 b7 d9 ...........U 260s | decode_to_chunk() ciphertext: : input "0xc30e32ffedc0774e6aff6af0869f71aa0f3af07a9a31a9c684db207eb0ef8e4e35907aa632c3ffdf868bb7b29d3d46ad83ce9f9a102ee99d49a53e87f4c3da55" 260s | decode_to_chunk() output: 260s | c3 0e 32 ff ed c0 77 4e 6a ff 6a f0 86 9f 71 aa ..2...wNj.j...q. 260s | 0f 3a f0 7a 9a 31 a9 c6 84 db 20 7e b0 ef 8e 4e .:.z.1.... ~...N 260s | 35 90 7a a6 32 c3 ff df 86 8b b7 b2 9d 3d 46 ad 5.z.2........=F. 260s | 83 ce 9f 9a 10 2e e9 9d 49 a5 3e 87 f4 c3 da 55 ........I.>....U 260s | decode_to_chunk() plaintext: : input "0xa0a1a2a3a4a5a6a7a8a9aaabacadaeafb0b1b2b3b4b5b6b7b8b9babbbcbdbebfc0c1c2c3c4c5c6c7c8c9cacbcccdcecfd0d1d2d3d4d5d6d7d8d9dadbdcdddedf" 260s | decode_to_chunk() output: 260s | a0 a1 a2 a3 a4 a5 a6 a7 a8 a9 aa ab ac ad ae af ................ 260s | b0 b1 b2 b3 b4 b5 b6 b7 b8 b9 ba bb bc bd be bf ................ 260s | c0 c1 c2 c3 c4 c5 c6 c7 c8 c9 ca cb cc cd ce cf ................ 260s | d0 d1 d2 d3 d4 d5 d6 d7 d8 d9 da db dc dd de df ................ 260s | NSS ike_alg_nss_cbc: AES_CBC - enter (nil) 260s | using IKEv1 IV 260s | NSS ike_alg_nss_cbc: AES_CBC - exit 260s | verify_bytes() Encrypting 64 bytes (4 blocks) using AES-CBC with 128-bit key: decrypt: ok 260s | verify_bytes() Encrypting 64 bytes (4 blocks) using AES-CBC with 128-bit key: updated CBC IV: ok 260s ipsec algparse: testing AES_XCBC: 260s ipsec algparse: RFC 3566 Test Case 1: AES-XCBC-MAC-96 with 0-byte input 260s | decode_to_chunk() test_prf_vector: input "0x000102030405060708090a0b0c0d0e0f" 260s | decode_to_chunk() output: 260s | 00 01 02 03 04 05 06 07 08 09 0a 0b 0c 0d 0e 0f ................ 260s | decode_to_chunk() test_prf_vector: input "" 260s | decode_to_chunk() output: 260s | 260s | decode_to_chunk() test_prf_vector: input "0x75f0251d528ac01c4573dfd584d79f29" 260s | decode_to_chunk() output: 260s | 75 f0 25 1d 52 8a c0 1c 45 73 df d5 84 d7 9f 29 u.%.R...Es.....) 260s | PRF chunk interface PRF AES_XCBC init key hunk 0xbed435405ff0 (length 16) 260s | 00 01 02 03 04 05 06 07 08 09 0a 0b 0c 0d 0e 0f ................ 260s | CONCATENATE_DATA_AND_BASE: 260s | target: EXTRACT_KEY_FROM_KEY 260s | base: base-key@0xbed435402bc0 (16-bytes, AES_KEY_GEN) 260s | params: 16-bytes@0xffffc40c0dd0 260s | key-offset: 0, key-size: 16 260s | EXTRACT_KEY_FROM_KEY: 260s | target: EXTRACT_KEY_FROM_KEY 260s | key_size: 16-bytes 260s | base: base-key@0xbed435405c00 (32-bytes, EXTRACT_KEY_FROM_KEY) 260s | operation: FLAGS_ONLY 260s | params: 8-bytes@0xffffc40c0d78 260s | XCBC: Key 16=16 just right 260s | key-offset: 0, key-size: 16 260s | EXTRACT_KEY_FROM_KEY: 260s | target: AES_ECB 260s | flags: SIGN 260s | key_size: 16-bytes 260s | base: base-key@0xbed435404510 (16-bytes, EXTRACT_KEY_FROM_KEY) 260s | operation: FLAGS_ONLY 260s | params: 8-bytes@0xffffc40c0d28 260s | PRF chunk interface PRF AES_XCBC 0xbed435402b60 260s | PRF chunk interface PRF AES_XCBC update message (0xbed435404430 length 0) 260s | 260s | XCBC: data 260s | 260s | K extracting all 16 bytes of key@0xbed435405c00 260s | K: symkey-key@0xbed435405c00 (16-bytes, AES_ECB) 260s | sizeof bytes 16 260s | wrapper: (SECItemType)1735288172: 7c 83 43 2d 01 06 f1 8e f8 f5 f0 67 ba 2a 8d 3f 260s | K extracted len 16 bytes at 0xbed435406880 260s | unwrapped: 260s | 00 01 02 03 04 05 06 07 08 09 0a 0b 0c 0d 0e 0f ................ 260s | XCBC: K: 260s | 00 01 02 03 04 05 06 07 08 09 0a 0b 0c 0d 0e 0f ................ 260s | XCBC: K1 260s | c3 52 80 57 54 23 7f 31 1a c0 ff f4 e3 e0 3e 78 .R.WT#.1......>x 260s | CONCATENATE_DATA_AND_BASE: 260s | target: EXTRACT_KEY_FROM_KEY 260s | base: base-key@0xbed435402bc0 (16-bytes, AES_KEY_GEN) 260s | params: 16-bytes@0xffffc40c0c90 260s | key-offset: 0, key-size: 16 260s | EXTRACT_KEY_FROM_KEY: 260s | target: AES_ECB 260s | flags: SIGN 260s | key_size: 16-bytes 260s | base: base-key@0xbed435406a20 (32-bytes, EXTRACT_KEY_FROM_KEY) 260s | operation: FLAGS_ONLY 260s | params: 8-bytes@0xffffc40c0c98 260s | Computing E[0] using K3 260s | XCBC: K3 260s | c1 a7 ab a1 a2 3a 94 06 58 07 a0 8c c8 ee d0 6e .....:..X......n 260s | XCBC: E[n-1] 260s | 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................ 260s | XCBC: M[n] 260s | 260s | XCBC: M[n] 260s | 260s | XCBC: M[n]:80...^E[n-1]^K3 260s | 41 a7 ab a1 a2 3a 94 06 58 07 a0 8c c8 ee d0 6e A....:..X......n 260s | XCBC: MAC 260s | 75 f0 25 1d 52 8a c0 1c 45 73 df d5 84 d7 9f 29 u.%.R...Es.....) 260s | PRF chunk interface PRF AES_XCBC final length 16 260s | 75 f0 25 1d 52 8a c0 1c 45 73 df d5 84 d7 9f 29 u.%.R...Es.....) 260s | chunk output 260s | 75 f0 25 1d 52 8a c0 1c 45 73 df d5 84 d7 9f 29 u.%.R...Es.....) 260s | verify_bytes() RFC 3566 Test Case 1: AES-XCBC-MAC-96 with 0-byte input: prf OUT: ok 260s | CONCATENATE_DATA_AND_BASE: 260s | target: EXTRACT_KEY_FROM_KEY 260s | base: base-key@0xbed435402bc0 (16-bytes, AES_KEY_GEN) 260s | params: 16-bytes@0xffffc40c0e50 260s | key-offset: 0, key-size: 16 260s | EXTRACT_KEY_FROM_KEY: 260s | target: EXTRACT_KEY_FROM_KEY 260s | key_size: 16-bytes 260s | base: base-key@0xbed435404510 (32-bytes, EXTRACT_KEY_FROM_KEY) 260s | operation: FLAGS_ONLY 260s | params: 8-bytes@0xffffc40c0df8 260s | PRF symkey interface PRF AES_XCBC init key symkey-key@0xbed435405c00 (size 16) 260s | PRF symkey interface: key symkey-key@0xbed435405c00 (16-bytes, EXTRACT_KEY_FROM_KEY) 260s | XCBC: Key 16=16 just right 260s | key-offset: 0, key-size: 16 260s | EXTRACT_KEY_FROM_KEY: 260s | target: AES_ECB 260s | flags: SIGN 260s | key_size: 16-bytes 260s | base: base-key@0xbed435405c00 (16-bytes, EXTRACT_KEY_FROM_KEY) 260s | operation: FLAGS_ONLY 260s | params: 8-bytes@0xffffc40c0d58 260s | PRF symkey interface PRF AES_XCBC 0xbed435402b60 260s | PRF symkey interface PRF AES_XCBC update symkey message-key@(nil) (size 0) 260s | PRF symkey interface: symkey message-key@NULL 260s | symkey message NULL key has no bytes 260s | XCBC: data 260s | 260s | K extracting all 16 bytes of key@0xbed435404510 260s | K: symkey-key@0xbed435404510 (16-bytes, AES_ECB) 260s | sizeof bytes 16 260s | wrapper: (SECItemType)-1005844112: 7c 83 43 2d 01 06 f1 8e f8 f5 f0 67 ba 2a 8d 3f 260s | K extracted len 16 bytes at 0xbed435406880 260s | unwrapped: 260s | 00 01 02 03 04 05 06 07 08 09 0a 0b 0c 0d 0e 0f ................ 260s | XCBC: K: 260s | 00 01 02 03 04 05 06 07 08 09 0a 0b 0c 0d 0e 0f ................ 260s | XCBC: K1 260s | c3 52 80 57 54 23 7f 31 1a c0 ff f4 e3 e0 3e 78 .R.WT#.1......>x 260s | CONCATENATE_DATA_AND_BASE: 260s | target: EXTRACT_KEY_FROM_KEY 260s | base: base-key@0xbed435402bc0 (16-bytes, AES_KEY_GEN) 260s | params: 16-bytes@0xffffc40c0ce0 260s | key-offset: 0, key-size: 16 260s | EXTRACT_KEY_FROM_KEY: 260s | target: AES_ECB 260s | flags: SIGN 260s | key_size: 16-bytes 260s | base: base-key@0xbed435406d90 (32-bytes, EXTRACT_KEY_FROM_KEY) 260s | operation: FLAGS_ONLY 260s | params: 8-bytes@0xffffc40c0ce8 260s | Computing E[0] using K3 260s | XCBC: K3 260s | c1 a7 ab a1 a2 3a 94 06 58 07 a0 8c c8 ee d0 6e .....:..X......n 260s | XCBC: E[n-1] 260s | 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................ 260s | XCBC: M[n] 260s | 260s | XCBC: M[n] 260s | 260s | XCBC: M[n]:80...^E[n-1]^K3 260s | 41 a7 ab a1 a2 3a 94 06 58 07 a0 8c c8 ee d0 6e A....:..X......n 260s | XCBC: MAC 260s | 75 f0 25 1d 52 8a c0 1c 45 73 df d5 84 d7 9f 29 u.%.R...Es.....) 260s | CONCATENATE_DATA_AND_BASE: 260s | target: EXTRACT_KEY_FROM_KEY 260s | base: base-key@0xbed435402bc0 (16-bytes, AES_KEY_GEN) 260s | params: 16-bytes@0xffffc40c0dd0 260s | key-offset: 0, key-size: 16 260s | EXTRACT_KEY_FROM_KEY: 260s | target: EXTRACT_KEY_FROM_KEY 260s | key_size: 16-bytes 260s | base: base-key@0xbed435406d90 (32-bytes, EXTRACT_KEY_FROM_KEY) 260s | operation: FLAGS_ONLY 260s | params: 8-bytes@0xffffc40c0d78 260s | PRF symkey interface PRF AES_XCBC final-key@0xbed435406a20 (size 16) 260s | PRF symkey interface: key-key@0xbed435406a20 (16-bytes, EXTRACT_KEY_FROM_KEY) 260s | output: symkey-key@0xbed435406a20 (16-bytes, EXTRACT_KEY_FROM_KEY) 260s | RFC 3566 Test Case 1: AES-XCBC-MAC-96 with 0-byte input extracting all 16 bytes of key@0xbed435406a20 260s | RFC 3566 Test Case 1: AES-XCBC-MAC-96 with 0-byte input: symkey-key@0xbed435406a20 (16-bytes, EXTRACT_KEY_FROM_KEY) 260s | sizeof bytes 16 260s | wrapper: siBuffer: 72 51 b5 78 b8 19 62 f8 aa 7d c5 59 71 05 15 7f 260s | RFC 3566 Test Case 1: AES-XCBC-MAC-96 with 0-byte input extracted len 16 bytes at 0xbed435406a00 260s | unwrapped: 260s | 75 f0 25 1d 52 8a c0 1c 45 73 df d5 84 d7 9f 29 u.%.R...Es.....) 260s | verify_bytes() RFC 3566 Test Case 1: AES-XCBC-MAC-96 with 0-byte input: symkey: ok 260s ipsec algparse: RFC 3566 Test Case 2: AES-XCBC-MAC-96 with 3-byte input 260s | decode_to_chunk() test_prf_vector: input "0x000102030405060708090a0b0c0d0e0f" 260s | decode_to_chunk() output: 260s | 00 01 02 03 04 05 06 07 08 09 0a 0b 0c 0d 0e 0f ................ 260s | decode_to_chunk() test_prf_vector: input "0x000102" 260s | decode_to_chunk() output: 260s | 00 01 02 ... 260s | decode_to_chunk() test_prf_vector: input "0x5b376580ae2f19afe7219ceef172756f" 260s | decode_to_chunk() output: 260s | 5b 37 65 80 ae 2f 19 af e7 21 9c ee f1 72 75 6f [7e../...!...ruo 260s | PRF chunk interface PRF AES_XCBC init key hunk 0xbed435405ff0 (length 16) 260s | 00 01 02 03 04 05 06 07 08 09 0a 0b 0c 0d 0e 0f ................ 260s | CONCATENATE_DATA_AND_BASE: 260s | target: EXTRACT_KEY_FROM_KEY 260s | base: base-key@0xbed435402bc0 (16-bytes, AES_KEY_GEN) 260s | params: 16-bytes@0xffffc40c0dd0 260s | key-offset: 0, key-size: 16 260s | EXTRACT_KEY_FROM_KEY: 260s | target: EXTRACT_KEY_FROM_KEY 260s | key_size: 16-bytes 260s | base: base-key@0xbed435405c00 (32-bytes, EXTRACT_KEY_FROM_KEY) 260s | operation: FLAGS_ONLY 260s | params: 8-bytes@0xffffc40c0d78 260s | XCBC: Key 16=16 just right 260s | key-offset: 0, key-size: 16 260s | EXTRACT_KEY_FROM_KEY: 260s | target: AES_ECB 260s | flags: SIGN 260s | key_size: 16-bytes 260s | base: base-key@0xbed435406a20 (16-bytes, EXTRACT_KEY_FROM_KEY) 260s | operation: FLAGS_ONLY 260s | params: 8-bytes@0xffffc40c0d28 260s | PRF chunk interface PRF AES_XCBC 0xbed435402b60 260s | PRF chunk interface PRF AES_XCBC update message (0xbed435404430 length 3) 260s | 00 01 02 ... 260s | XCBC: data 260s | 00 01 02 ... 260s | K extracting all 16 bytes of key@0xbed435405c00 260s | K: symkey-key@0xbed435405c00 (16-bytes, AES_ECB) 260s | sizeof bytes 16 260s | wrapper: (SECItemType)1735288172: 7c 83 43 2d 01 06 f1 8e f8 f5 f0 67 ba 2a 8d 3f 260s | K extracted len 16 bytes at 0xbed435406010 260s | unwrapped: 260s | 00 01 02 03 04 05 06 07 08 09 0a 0b 0c 0d 0e 0f ................ 260s | XCBC: K: 260s | 00 01 02 03 04 05 06 07 08 09 0a 0b 0c 0d 0e 0f ................ 260s | XCBC: K1 260s | c3 52 80 57 54 23 7f 31 1a c0 ff f4 e3 e0 3e 78 .R.WT#.1......>x 260s | CONCATENATE_DATA_AND_BASE: 260s | target: EXTRACT_KEY_FROM_KEY 260s | base: base-key@0xbed435402bc0 (16-bytes, AES_KEY_GEN) 260s | params: 16-bytes@0xffffc40c0c90 260s | key-offset: 0, key-size: 16 260s | EXTRACT_KEY_FROM_KEY: 260s | target: AES_ECB 260s | flags: SIGN 260s | key_size: 16-bytes 260s | base: base-key@0xbed435404510 (32-bytes, EXTRACT_KEY_FROM_KEY) 260s | operation: FLAGS_ONLY 260s | params: 8-bytes@0xffffc40c0c98 260s | Computing E[1] using K3 260s | XCBC: K3 260s | c1 a7 ab a1 a2 3a 94 06 58 07 a0 8c c8 ee d0 6e .....:..X......n 260s | XCBC: E[n-1] 260s | 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................ 260s | XCBC: M[n] 260s | 00 01 02 ... 260s | XCBC: M[n] 260s | 00 01 02 ... 260s | XCBC: M[n]:80...^E[n-1]^K3 260s | c1 a6 a9 21 a2 3a 94 06 58 07 a0 8c c8 ee d0 6e ...!.:..X......n 260s | XCBC: MAC 260s | 5b 37 65 80 ae 2f 19 af e7 21 9c ee f1 72 75 6f [7e../...!...ruo 260s | PRF chunk interface PRF AES_XCBC final length 16 260s | 5b 37 65 80 ae 2f 19 af e7 21 9c ee f1 72 75 6f [7e../...!...ruo 260s | chunk output 260s | 5b 37 65 80 ae 2f 19 af e7 21 9c ee f1 72 75 6f [7e../...!...ruo 260s | verify_bytes() RFC 3566 Test Case 2: AES-XCBC-MAC-96 with 3-byte input: prf OUT: ok 260s | CONCATENATE_DATA_AND_BASE: 260s | target: EXTRACT_KEY_FROM_KEY 260s | base: base-key@0xbed435402bc0 (16-bytes, AES_KEY_GEN) 260s | params: 16-bytes@0xffffc40c0e50 260s | key-offset: 0, key-size: 16 260s | EXTRACT_KEY_FROM_KEY: 260s | target: EXTRACT_KEY_FROM_KEY 260s | key_size: 16-bytes 260s | base: base-key@0xbed435406a20 (32-bytes, EXTRACT_KEY_FROM_KEY) 260s | operation: FLAGS_ONLY 260s | params: 8-bytes@0xffffc40c0df8 260s | PRF symkey interface PRF AES_XCBC init key symkey-key@0xbed435405c00 (size 16) 260s | PRF symkey interface: key symkey-key@0xbed435405c00 (16-bytes, EXTRACT_KEY_FROM_KEY) 260s | XCBC: Key 16=16 just right 260s | key-offset: 0, key-size: 16 260s | EXTRACT_KEY_FROM_KEY: 260s | target: AES_ECB 260s | flags: SIGN 260s | key_size: 16-bytes 260s | base: base-key@0xbed435405c00 (16-bytes, EXTRACT_KEY_FROM_KEY) 260s | operation: FLAGS_ONLY 260s | params: 8-bytes@0xffffc40c0d58 260s | PRF symkey interface PRF AES_XCBC 0xbed435402b60 260s | CONCATENATE_DATA_AND_BASE: 260s | target: EXTRACT_KEY_FROM_KEY 260s | base: base-key@0xbed435402bc0 (16-bytes, AES_KEY_GEN) 260s | params: 16-bytes@0xffffc40c0e50 260s | key-offset: 0, key-size: 3 260s | EXTRACT_KEY_FROM_KEY: 260s | target: EXTRACT_KEY_FROM_KEY 260s | key_size: 3-bytes 260s | base: base-key@0xbed435406d90 (19-bytes, EXTRACT_KEY_FROM_KEY) 260s | operation: FLAGS_ONLY 260s | params: 8-bytes@0xffffc40c0df8 260s | PRF symkey interface PRF AES_XCBC update symkey message-key@0xbed435404510 (size 3) 260s | PRF symkey interface: symkey message-key@0xbed435404510 (3-bytes, EXTRACT_KEY_FROM_KEY) 260s | symkey message extracting all 3 bytes of key@0xbed435404510 260s | symkey message: symkey-key@0xbed435404510 (3-bytes, EXTRACT_KEY_FROM_KEY) 260s | sizeof bytes 16 260s | wrapper: (SECItemType)41: f9 af 7e c9 5b d2 be 5d 5c e6 47 47 a7 a0 3e 61 260s | symkey message extracted len 16 bytes at 0xbed435406010 260s | unwrapped: 260s | 00 01 02 00 00 00 00 00 00 00 00 00 00 00 00 00 ................ 260s | XCBC: data 260s | 00 01 02 ... 260s | K extracting all 16 bytes of key@0xbed435406a20 260s | K: symkey-key@0xbed435406a20 (16-bytes, AES_ECB) 260s | sizeof bytes 16 260s | wrapper: (SECItemType)-1005846056: 7c 83 43 2d 01 06 f1 8e f8 f5 f0 67 ba 2a 8d 3f 260s | K extracted len 16 bytes at 0xbed435402a80 260s | unwrapped: 260s | 00 01 02 03 04 05 06 07 08 09 0a 0b 0c 0d 0e 0f ................ 260s | XCBC: K: 260s | 00 01 02 03 04 05 06 07 08 09 0a 0b 0c 0d 0e 0f ................ 260s | XCBC: K1 260s | c3 52 80 57 54 23 7f 31 1a c0 ff f4 e3 e0 3e 78 .R.WT#.1......>x 260s | CONCATENATE_DATA_AND_BASE: 260s | target: EXTRACT_KEY_FROM_KEY 260s | base: base-key@0xbed435402bc0 (16-bytes, AES_KEY_GEN) 260s | params: 16-bytes@0xffffc40c0ce0 260s | key-offset: 0, key-size: 16 260s | EXTRACT_KEY_FROM_KEY: 260s | target: AES_ECB 260s | flags: SIGN 260s | key_size: 16-bytes 260s | base: base-key@0xbed435407120 (32-bytes, EXTRACT_KEY_FROM_KEY) 260s | operation: FLAGS_ONLY 260s | params: 8-bytes@0xffffc40c0ce8 260s | Computing E[1] using K3 260s | XCBC: K3 260s | c1 a7 ab a1 a2 3a 94 06 58 07 a0 8c c8 ee d0 6e .....:..X......n 260s | XCBC: E[n-1] 260s | 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................ 260s | XCBC: M[n] 260s | 00 01 02 ... 260s | XCBC: M[n] 260s | 00 01 02 ... 260s | XCBC: M[n]:80...^E[n-1]^K3 260s | c1 a6 a9 21 a2 3a 94 06 58 07 a0 8c c8 ee d0 6e ...!.:..X......n 260s | XCBC: MAC 260s | 5b 37 65 80 ae 2f 19 af e7 21 9c ee f1 72 75 6f [7e../...!...ruo 260s | CONCATENATE_DATA_AND_BASE: 260s | target: EXTRACT_KEY_FROM_KEY 260s | base: base-key@0xbed435402bc0 (16-bytes, AES_KEY_GEN) 260s | params: 16-bytes@0xffffc40c0dd0 260s | key-offset: 0, key-size: 16 260s | EXTRACT_KEY_FROM_KEY: 260s | target: EXTRACT_KEY_FROM_KEY 260s | key_size: 16-bytes 260s | base: base-key@0xbed435407120 (32-bytes, EXTRACT_KEY_FROM_KEY) 260s | operation: FLAGS_ONLY 260s | params: 8-bytes@0xffffc40c0d78 260s | PRF symkey interface PRF AES_XCBC final-key@0xbed435406d90 (size 16) 260s | PRF symkey interface: key-key@0xbed435406d90 (16-bytes, EXTRACT_KEY_FROM_KEY) 260s | output: symkey-key@0xbed435406d90 (16-bytes, EXTRACT_KEY_FROM_KEY) 260s | RFC 3566 Test Case 2: AES-XCBC-MAC-96 with 3-byte input extracting all 16 bytes of key@0xbed435406d90 260s | RFC 3566 Test Case 2: AES-XCBC-MAC-96 with 3-byte input: symkey-key@0xbed435406d90 (16-bytes, EXTRACT_KEY_FROM_KEY) 260s | sizeof bytes 16 260s | wrapper: siBuffer: 5d 7e b5 6e 6b b0 c8 2f 00 3d 10 7c 5b 98 5a e7 260s | RFC 3566 Test Case 2: AES-XCBC-MAC-96 with 3-byte input extracted len 16 bytes at 0xbed435402a80 260s | unwrapped: 260s | 5b 37 65 80 ae 2f 19 af e7 21 9c ee f1 72 75 6f [7e../...!...ruo 260s | verify_bytes() RFC 3566 Test Case 2: AES-XCBC-MAC-96 with 3-byte input: symkey: ok 260s ipsec algparse: RFC 3566 Test Case 3: AES-XCBC-MAC-96 with 16-byte input 260s | decode_to_chunk() test_prf_vector: input "0x000102030405060708090a0b0c0d0e0f" 260s | decode_to_chunk() output: 260s | 00 01 02 03 04 05 06 07 08 09 0a 0b 0c 0d 0e 0f ................ 260s | decode_to_chunk() test_prf_vector: input "0x000102030405060708090a0b0c0d0e0f" 260s | decode_to_chunk() output: 260s | 00 01 02 03 04 05 06 07 08 09 0a 0b 0c 0d 0e 0f ................ 260s | decode_to_chunk() test_prf_vector: input "0xd2a246fa349b68a79998a4394ff7a263" 260s | decode_to_chunk() output: 260s | d2 a2 46 fa 34 9b 68 a7 99 98 a4 39 4f f7 a2 63 ..F.4.h....9O..c 260s | PRF chunk interface PRF AES_XCBC init key hunk 0xbed435405ff0 (length 16) 260s | 00 01 02 03 04 05 06 07 08 09 0a 0b 0c 0d 0e 0f ................ 260s | CONCATENATE_DATA_AND_BASE: 260s | target: EXTRACT_KEY_FROM_KEY 260s | base: base-key@0xbed435402bc0 (16-bytes, AES_KEY_GEN) 260s | params: 16-bytes@0xffffc40c0dd0 260s | key-offset: 0, key-size: 16 260s | EXTRACT_KEY_FROM_KEY: 260s | target: EXTRACT_KEY_FROM_KEY 260s | key_size: 16-bytes 260s | base: base-key@0xbed435405c00 (32-bytes, EXTRACT_KEY_FROM_KEY) 260s | operation: FLAGS_ONLY 260s | params: 8-bytes@0xffffc40c0d78 260s | XCBC: Key 16=16 just right 260s | key-offset: 0, key-size: 16 260s | EXTRACT_KEY_FROM_KEY: 260s | target: AES_ECB 260s | flags: SIGN 260s | key_size: 16-bytes 260s | base: base-key@0xbed435406d90 (16-bytes, EXTRACT_KEY_FROM_KEY) 260s | operation: FLAGS_ONLY 260s | params: 8-bytes@0xffffc40c0d28 260s | PRF chunk interface PRF AES_XCBC 0xbed435402b60 260s | PRF chunk interface PRF AES_XCBC update message (0xbed435404430 length 16) 260s | 00 01 02 03 04 05 06 07 08 09 0a 0b 0c 0d 0e 0f ................ 260s | XCBC: data 260s | 00 01 02 03 04 05 06 07 08 09 0a 0b 0c 0d 0e 0f ................ 260s | K extracting all 16 bytes of key@0xbed435405c00 260s | K: symkey-key@0xbed435405c00 (16-bytes, AES_ECB) 260s | sizeof bytes 16 260s | wrapper: (SECItemType)1735262254: 7c 83 43 2d 01 06 f1 8e f8 f5 f0 67 ba 2a 8d 3f 260s | K extracted len 16 bytes at 0xbed435406a00 260s | unwrapped: 260s | 00 01 02 03 04 05 06 07 08 09 0a 0b 0c 0d 0e 0f ................ 260s | XCBC: K: 260s | 00 01 02 03 04 05 06 07 08 09 0a 0b 0c 0d 0e 0f ................ 260s | XCBC: K1 260s | c3 52 80 57 54 23 7f 31 1a c0 ff f4 e3 e0 3e 78 .R.WT#.1......>x 260s | CONCATENATE_DATA_AND_BASE: 260s | target: EXTRACT_KEY_FROM_KEY 260s | base: base-key@0xbed435402bc0 (16-bytes, AES_KEY_GEN) 260s | params: 16-bytes@0xffffc40c0c90 260s | key-offset: 0, key-size: 16 260s | EXTRACT_KEY_FROM_KEY: 260s | target: AES_ECB 260s | flags: SIGN 260s | key_size: 16-bytes 260s | base: base-key@0xbed435404510 (32-bytes, EXTRACT_KEY_FROM_KEY) 260s | operation: FLAGS_ONLY 260s | params: 8-bytes@0xffffc40c0c98 260s | XCBC: Computing E[1] using K2 260s | XCBC: K2 260s | bd 86 2f fb 97 ad 2f b8 f8 b8 91 f6 03 2f 36 cb ../.../....../6. 260s | XCBC: E[n-1] 260s | 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................ 260s | XCBC: M[n] 260s | 00 01 02 03 04 05 06 07 08 09 0a 0b 0c 0d 0e 0f ................ 260s | XCBC: M[n]^E[n-1]^K2 260s | bd 87 2d f8 93 a8 29 bf f0 b1 9b fd 0f 22 38 c4 ..-...)......"8. 260s | XCBC: MAC 260s | d2 a2 46 fa 34 9b 68 a7 99 98 a4 39 4f f7 a2 63 ..F.4.h....9O..c 260s | PRF chunk interface PRF AES_XCBC final length 16 260s | d2 a2 46 fa 34 9b 68 a7 99 98 a4 39 4f f7 a2 63 ..F.4.h....9O..c 260s | chunk output 260s | d2 a2 46 fa 34 9b 68 a7 99 98 a4 39 4f f7 a2 63 ..F.4.h....9O..c 260s | verify_bytes() RFC 3566 Test Case 3: AES-XCBC-MAC-96 with 16-byte input: prf OUT: ok 260s | CONCATENATE_DATA_AND_BASE: 260s | target: EXTRACT_KEY_FROM_KEY 260s | base: base-key@0xbed435402bc0 (16-bytes, AES_KEY_GEN) 260s | params: 16-bytes@0xffffc40c0e50 260s | key-offset: 0, key-size: 16 260s | EXTRACT_KEY_FROM_KEY: 260s | target: EXTRACT_KEY_FROM_KEY 260s | key_size: 16-bytes 260s | base: base-key@0xbed435406d90 (32-bytes, EXTRACT_KEY_FROM_KEY) 260s | operation: FLAGS_ONLY 260s | params: 8-bytes@0xffffc40c0df8 260s | PRF symkey interface PRF AES_XCBC init key symkey-key@0xbed435405c00 (size 16) 260s | PRF symkey interface: key symkey-key@0xbed435405c00 (16-bytes, EXTRACT_KEY_FROM_KEY) 260s | XCBC: Key 16=16 just right 260s | key-offset: 0, key-size: 16 260s | EXTRACT_KEY_FROM_KEY: 260s | target: AES_ECB 260s | flags: SIGN 260s | key_size: 16-bytes 260s | base: base-key@0xbed435405c00 (16-bytes, EXTRACT_KEY_FROM_KEY) 260s | operation: FLAGS_ONLY 260s | params: 8-bytes@0xffffc40c0d58 260s | PRF symkey interface PRF AES_XCBC 0xbed435402b60 260s | CONCATENATE_DATA_AND_BASE: 260s | target: EXTRACT_KEY_FROM_KEY 260s | base: base-key@0xbed435402bc0 (16-bytes, AES_KEY_GEN) 260s | params: 16-bytes@0xffffc40c0e50 260s | key-offset: 0, key-size: 16 260s | EXTRACT_KEY_FROM_KEY: 260s | target: EXTRACT_KEY_FROM_KEY 260s | key_size: 16-bytes 260s | base: base-key@0xbed435406a20 (32-bytes, EXTRACT_KEY_FROM_KEY) 260s | operation: FLAGS_ONLY 260s | params: 8-bytes@0xffffc40c0df8 260s | PRF symkey interface PRF AES_XCBC update symkey message-key@0xbed435404510 (size 16) 260s | PRF symkey interface: symkey message-key@0xbed435404510 (16-bytes, EXTRACT_KEY_FROM_KEY) 260s | symkey message extracting all 16 bytes of key@0xbed435404510 260s | symkey message: symkey-key@0xbed435404510 (16-bytes, EXTRACT_KEY_FROM_KEY) 260s | sizeof bytes 16 260s | wrapper: (SECItemType)41: 7c 83 43 2d 01 06 f1 8e f8 f5 f0 67 ba 2a 8d 3f 260s | symkey message extracted len 16 bytes at 0xbed435406a00 260s | unwrapped: 260s | 00 01 02 03 04 05 06 07 08 09 0a 0b 0c 0d 0e 0f ................ 260s | XCBC: data 260s | 00 01 02 03 04 05 06 07 08 09 0a 0b 0c 0d 0e 0f ................ 260s | K extracting all 16 bytes of key@0xbed435406d90 260s | K: symkey-key@0xbed435406d90 (16-bytes, AES_ECB) 260s | sizeof bytes 16 260s | wrapper: (SECItemType)-1005846056: 7c 83 43 2d 01 06 f1 8e f8 f5 f0 67 ba 2a 8d 3f 260s | K extracted len 16 bytes at 0xbed4354028c0 260s | unwrapped: 260s | 00 01 02 03 04 05 06 07 08 09 0a 0b 0c 0d 0e 0f ................ 260s | XCBC: K: 260s | 00 01 02 03 04 05 06 07 08 09 0a 0b 0c 0d 0e 0f ................ 260s | XCBC: K1 260s | c3 52 80 57 54 23 7f 31 1a c0 ff f4 e3 e0 3e 78 .R.WT#.1......>x 260s | CONCATENATE_DATA_AND_BASE: 260s | target: EXTRACT_KEY_FROM_KEY 260s | base: base-key@0xbed435402bc0 (16-bytes, AES_KEY_GEN) 260s | params: 16-bytes@0xffffc40c0ce0 260s | key-offset: 0, key-size: 16 260s | EXTRACT_KEY_FROM_KEY: 260s | target: AES_ECB 260s | flags: SIGN 260s | key_size: 16-bytes 260s | base: base-key@0xbed435407120 (32-bytes, EXTRACT_KEY_FROM_KEY) 260s | operation: FLAGS_ONLY 260s | params: 8-bytes@0xffffc40c0ce8 260s | XCBC: Computing E[1] using K2 260s | XCBC: K2 260s | bd 86 2f fb 97 ad 2f b8 f8 b8 91 f6 03 2f 36 cb ../.../....../6. 260s | XCBC: E[n-1] 260s | 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................ 260s | XCBC: M[n] 260s | 00 01 02 03 04 05 06 07 08 09 0a 0b 0c 0d 0e 0f ................ 260s | XCBC: M[n]^E[n-1]^K2 260s | bd 87 2d f8 93 a8 29 bf f0 b1 9b fd 0f 22 38 c4 ..-...)......"8. 260s | XCBC: MAC 260s | d2 a2 46 fa 34 9b 68 a7 99 98 a4 39 4f f7 a2 63 ..F.4.h....9O..c 260s | CONCATENATE_DATA_AND_BASE: 260s | target: EXTRACT_KEY_FROM_KEY 260s | base: base-key@0xbed435402bc0 (16-bytes, AES_KEY_GEN) 260s | params: 16-bytes@0xffffc40c0dd0 260s | key-offset: 0, key-size: 16 260s | EXTRACT_KEY_FROM_KEY: 260s | target: EXTRACT_KEY_FROM_KEY 260s | key_size: 16-bytes 260s | base: base-key@0xbed435407120 (32-bytes, EXTRACT_KEY_FROM_KEY) 260s | operation: FLAGS_ONLY 260s | params: 8-bytes@0xffffc40c0d78 260s | PRF symkey interface PRF AES_XCBC final-key@0xbed435406a20 (size 16) 260s | PRF symkey interface: key-key@0xbed435406a20 (16-bytes, EXTRACT_KEY_FROM_KEY) 260s | output: symkey-key@0xbed435406a20 (16-bytes, EXTRACT_KEY_FROM_KEY) 260s | RFC 3566 Test Case 3: AES-XCBC-MAC-96 with 16-byte input extracting all 16 bytes of key@0xbed435406a20 260s | RFC 3566 Test Case 3: AES-XCBC-MAC-96 with 16-byte input: symkey-key@0xbed435406a20 (16-bytes, EXTRACT_KEY_FROM_KEY) 260s | sizeof bytes 16 260s | wrapper: siBuffer: d1 d4 54 e0 2f 2b 26 ac dd d9 b1 30 ce df 10 ca 260s | RFC 3566 Test Case 3: AES-XCBC-MAC-96 with 16-byte input extracted len 16 bytes at 0xbed4354028c0 260s | unwrapped: 260s | d2 a2 46 fa 34 9b 68 a7 99 98 a4 39 4f f7 a2 63 ..F.4.h....9O..c 260s | verify_bytes() RFC 3566 Test Case 3: AES-XCBC-MAC-96 with 16-byte input: symkey: ok 260s ipsec algparse: RFC 3566 Test Case 4: AES-XCBC-MAC-96 with 20-byte input 260s | decode_to_chunk() test_prf_vector: input "0x000102030405060708090a0b0c0d0e0f" 260s | decode_to_chunk() output: 260s | 00 01 02 03 04 05 06 07 08 09 0a 0b 0c 0d 0e 0f ................ 260s | decode_to_chunk() test_prf_vector: input "0x000102030405060708090a0b0c0d0e0f10111213" 260s | decode_to_chunk() output: 260s | 00 01 02 03 04 05 06 07 08 09 0a 0b 0c 0d 0e 0f ................ 260s | 10 11 12 13 .... 260s | decode_to_chunk() test_prf_vector: input "0x47f51b4564966215b8985c63055ed308" 260s | decode_to_chunk() output: 260s | 47 f5 1b 45 64 96 62 15 b8 98 5c 63 05 5e d3 08 G..Ed.b...\c.^.. 260s | PRF chunk interface PRF AES_XCBC init key hunk 0xbed435405ff0 (length 16) 260s | 00 01 02 03 04 05 06 07 08 09 0a 0b 0c 0d 0e 0f ................ 260s | CONCATENATE_DATA_AND_BASE: 260s | target: EXTRACT_KEY_FROM_KEY 260s | base: base-key@0xbed435402bc0 (16-bytes, AES_KEY_GEN) 260s | params: 16-bytes@0xffffc40c0dd0 260s | key-offset: 0, key-size: 16 260s | EXTRACT_KEY_FROM_KEY: 260s | target: EXTRACT_KEY_FROM_KEY 260s | key_size: 16-bytes 260s | base: base-key@0xbed435405c00 (32-bytes, EXTRACT_KEY_FROM_KEY) 260s | operation: FLAGS_ONLY 260s | params: 8-bytes@0xffffc40c0d78 260s | XCBC: Key 16=16 just right 260s | key-offset: 0, key-size: 16 260s | EXTRACT_KEY_FROM_KEY: 260s | target: AES_ECB 260s | flags: SIGN 260s | key_size: 16-bytes 260s | base: base-key@0xbed435406a20 (16-bytes, EXTRACT_KEY_FROM_KEY) 260s | operation: FLAGS_ONLY 260s | params: 8-bytes@0xffffc40c0d28 260s | PRF chunk interface PRF AES_XCBC 0xbed435402b60 260s | PRF chunk interface PRF AES_XCBC update message (0xbed435404430 length 20) 260s | 00 01 02 03 04 05 06 07 08 09 0a 0b 0c 0d 0e 0f ................ 260s | 10 11 12 13 .... 260s | XCBC: data 260s | 00 01 02 03 04 05 06 07 08 09 0a 0b 0c 0d 0e 0f ................ 260s | 10 11 12 13 .... 260s | K extracting all 16 bytes of key@0xbed435405c00 260s | K: symkey-key@0xbed435405c00 (16-bytes, AES_ECB) 260s | sizeof bytes 16 260s | wrapper: (SECItemType)1735262254: 7c 83 43 2d 01 06 f1 8e f8 f5 f0 67 ba 2a 8d 3f 260s | K extracted len 16 bytes at 0xbed435402a80 260s | unwrapped: 260s | 00 01 02 03 04 05 06 07 08 09 0a 0b 0c 0d 0e 0f ................ 260s | XCBC: K: 260s | 00 01 02 03 04 05 06 07 08 09 0a 0b 0c 0d 0e 0f ................ 260s | XCBC: K1 260s | c3 52 80 57 54 23 7f 31 1a c0 ff f4 e3 e0 3e 78 .R.WT#.1......>x 260s | CONCATENATE_DATA_AND_BASE: 260s | target: EXTRACT_KEY_FROM_KEY 260s | base: base-key@0xbed435402bc0 (16-bytes, AES_KEY_GEN) 260s | params: 16-bytes@0xffffc40c0c90 260s | key-offset: 0, key-size: 16 260s | EXTRACT_KEY_FROM_KEY: 260s | target: AES_ECB 260s | flags: SIGN 260s | key_size: 16-bytes 260s | base: base-key@0xbed435404510 (32-bytes, EXTRACT_KEY_FROM_KEY) 260s | operation: FLAGS_ONLY 260s | params: 8-bytes@0xffffc40c0c98 260s | Computing E[2] using K3 260s | XCBC: K3 260s | c1 a7 ab a1 a2 3a 94 06 58 07 a0 8c c8 ee d0 6e .....:..X......n 260s | XCBC: E[n-1] 260s | 1d 04 48 fa cf 4d 9c 6f 55 b9 93 da 09 80 3d b3 ..H..M.oU.....=. 260s | XCBC: M[n] 260s | 10 11 12 13 .... 260s | XCBC: M[n] 260s | 10 11 12 13 .... 260s | XCBC: M[n]:80...^E[n-1]^K3 260s | cc b2 f1 48 ed 77 08 69 0d be 33 56 c1 6e ed dd ...H.w.i..3V.n.. 260s | XCBC: MAC 260s | 47 f5 1b 45 64 96 62 15 b8 98 5c 63 05 5e d3 08 G..Ed.b...\c.^.. 260s | PRF chunk interface PRF AES_XCBC final length 16 260s | 47 f5 1b 45 64 96 62 15 b8 98 5c 63 05 5e d3 08 G..Ed.b...\c.^.. 260s | chunk output 260s | 47 f5 1b 45 64 96 62 15 b8 98 5c 63 05 5e d3 08 G..Ed.b...\c.^.. 260s | verify_bytes() RFC 3566 Test Case 4: AES-XCBC-MAC-96 with 20-byte input: prf OUT: ok 260s | CONCATENATE_DATA_AND_BASE: 260s | target: EXTRACT_KEY_FROM_KEY 260s | base: base-key@0xbed435402bc0 (16-bytes, AES_KEY_GEN) 260s | params: 16-bytes@0xffffc40c0e50 260s | key-offset: 0, key-size: 16 260s | EXTRACT_KEY_FROM_KEY: 260s | target: EXTRACT_KEY_FROM_KEY 260s | key_size: 16-bytes 260s | base: base-key@0xbed435406a20 (32-bytes, EXTRACT_KEY_FROM_KEY) 260s | operation: FLAGS_ONLY 260s | params: 8-bytes@0xffffc40c0df8 260s | PRF symkey interface PRF AES_XCBC init key symkey-key@0xbed435405c00 (size 16) 260s | PRF symkey interface: key symkey-key@0xbed435405c00 (16-bytes, EXTRACT_KEY_FROM_KEY) 260s | XCBC: Key 16=16 just right 260s | key-offset: 0, key-size: 16 260s | EXTRACT_KEY_FROM_KEY: 260s | target: AES_ECB 260s | flags: SIGN 260s | key_size: 16-bytes 260s | base: base-key@0xbed435405c00 (16-bytes, EXTRACT_KEY_FROM_KEY) 260s | operation: FLAGS_ONLY 260s | params: 8-bytes@0xffffc40c0d58 260s | PRF symkey interface PRF AES_XCBC 0xbed435402b60 260s | CONCATENATE_DATA_AND_BASE: 260s | target: EXTRACT_KEY_FROM_KEY 260s | base: base-key@0xbed435402bc0 (16-bytes, AES_KEY_GEN) 260s | params: 16-bytes@0xffffc40c0e50 260s | key-offset: 0, key-size: 20 260s | EXTRACT_KEY_FROM_KEY: 260s | target: EXTRACT_KEY_FROM_KEY 260s | key_size: 20-bytes 260s | base: base-key@0xbed435406d90 (36-bytes, EXTRACT_KEY_FROM_KEY) 260s | operation: FLAGS_ONLY 260s | params: 8-bytes@0xffffc40c0df8 260s | PRF symkey interface PRF AES_XCBC update symkey message-key@0xbed435404510 (size 20) 260s | PRF symkey interface: symkey message-key@0xbed435404510 (20-bytes, EXTRACT_KEY_FROM_KEY) 260s | symkey message extracting all 20 bytes of key@0xbed435404510 260s | symkey message: symkey-key@0xbed435404510 (20-bytes, EXTRACT_KEY_FROM_KEY) 260s | sizeof bytes 32 260s | wrapper: (SECItemType)41: 7c 83 43 2d 01 06 f1 8e f8 f5 f0 67 ba 2a 8d 3f af 71 8a 1d 6e 8e 9b 45 3e 44 e3 0a 66 ac 96 93 260s | symkey message extracted len 32 bytes at 0xbed4354065f0 260s | unwrapped: 260s | 00 01 02 03 04 05 06 07 08 09 0a 0b 0c 0d 0e 0f ................ 260s | 10 11 12 13 00 00 00 00 00 00 00 00 00 00 00 00 ................ 260s | XCBC: data 260s | 00 01 02 03 04 05 06 07 08 09 0a 0b 0c 0d 0e 0f ................ 260s | 10 11 12 13 .... 260s | K extracting all 16 bytes of key@0xbed435406a20 260s | K: symkey-key@0xbed435406a20 (16-bytes, AES_ECB) 260s | sizeof bytes 16 260s | wrapper: (SECItemType)-1005846264: 7c 83 43 2d 01 06 f1 8e f8 f5 f0 67 ba 2a 8d 3f 260s | K extracted len 16 bytes at 0xbed435406880 260s | unwrapped: 260s | 00 01 02 03 04 05 06 07 08 09 0a 0b 0c 0d 0e 0f ................ 260s | XCBC: K: 260s | 00 01 02 03 04 05 06 07 08 09 0a 0b 0c 0d 0e 0f ................ 260s | XCBC: K1 260s | c3 52 80 57 54 23 7f 31 1a c0 ff f4 e3 e0 3e 78 .R.WT#.1......>x 260s | CONCATENATE_DATA_AND_BASE: 260s | target: EXTRACT_KEY_FROM_KEY 260s | base: base-key@0xbed435402bc0 (16-bytes, AES_KEY_GEN) 260s | params: 16-bytes@0xffffc40c0ce0 260s | key-offset: 0, key-size: 16 260s | EXTRACT_KEY_FROM_KEY: 260s | target: AES_ECB 260s | flags: SIGN 260s | key_size: 16-bytes 260s | base: base-key@0xbed435407120 (32-bytes, EXTRACT_KEY_FROM_KEY) 260s | operation: FLAGS_ONLY 260s | params: 8-bytes@0xffffc40c0ce8 260s | Computing E[2] using K3 260s | XCBC: K3 260s | c1 a7 ab a1 a2 3a 94 06 58 07 a0 8c c8 ee d0 6e .....:..X......n 260s | XCBC: E[n-1] 260s | 1d 04 48 fa cf 4d 9c 6f 55 b9 93 da 09 80 3d b3 ..H..M.oU.....=. 260s | XCBC: M[n] 260s | 10 11 12 13 .... 260s | XCBC: M[n] 260s | 10 11 12 13 .... 260s | XCBC: M[n]:80...^E[n-1]^K3 260s | cc b2 f1 48 ed 77 08 69 0d be 33 56 c1 6e ed dd ...H.w.i..3V.n.. 260s | XCBC: MAC 260s | 47 f5 1b 45 64 96 62 15 b8 98 5c 63 05 5e d3 08 G..Ed.b...\c.^.. 260s | CONCATENATE_DATA_AND_BASE: 260s | target: EXTRACT_KEY_FROM_KEY 260s | base: base-key@0xbed435402bc0 (16-bytes, AES_KEY_GEN) 260s | params: 16-bytes@0xffffc40c0dd0 260s | key-offset: 0, key-size: 16 260s | EXTRACT_KEY_FROM_KEY: 260s | target: EXTRACT_KEY_FROM_KEY 260s | key_size: 16-bytes 260s | base: base-key@0xbed435407120 (32-bytes, EXTRACT_KEY_FROM_KEY) 260s | operation: FLAGS_ONLY 260s | params: 8-bytes@0xffffc40c0d78 260s | PRF symkey interface PRF AES_XCBC final-key@0xbed435406d90 (size 16) 260s | PRF symkey interface: key-key@0xbed435406d90 (16-bytes, EXTRACT_KEY_FROM_KEY) 260s | output: symkey-key@0xbed435406d90 (16-bytes, EXTRACT_KEY_FROM_KEY) 260s | RFC 3566 Test Case 4: AES-XCBC-MAC-96 with 20-byte input extracting all 16 bytes of key@0xbed435406d90 260s | RFC 3566 Test Case 4: AES-XCBC-MAC-96 with 20-byte input: symkey-key@0xbed435406d90 (16-bytes, EXTRACT_KEY_FROM_KEY) 260s | sizeof bytes 16 260s | wrapper: siBuffer: bd d7 07 29 81 ba 8e 69 50 80 11 18 0d 10 63 76 260s | RFC 3566 Test Case 4: AES-XCBC-MAC-96 with 20-byte input extracted len 16 bytes at 0xbed435406880 260s | unwrapped: 260s | 47 f5 1b 45 64 96 62 15 b8 98 5c 63 05 5e d3 08 G..Ed.b...\c.^.. 260s | verify_bytes() RFC 3566 Test Case 4: AES-XCBC-MAC-96 with 20-byte input: symkey: ok 260s ipsec algparse: RFC 3566 Test Case 5: AES-XCBC-MAC-96 with 32-byte input 260s | decode_to_chunk() test_prf_vector: input "0x000102030405060708090a0b0c0d0e0f" 260s | decode_to_chunk() output: 260s | 00 01 02 03 04 05 06 07 08 09 0a 0b 0c 0d 0e 0f ................ 260s | decode_to_chunk() test_prf_vector: input "0x000102030405060708090a0b0c0d0e0f101112131415161718191a1b1c1d1e1f" 260s | decode_to_chunk() output: 260s | 00 01 02 03 04 05 06 07 08 09 0a 0b 0c 0d 0e 0f ................ 260s | 10 11 12 13 14 15 16 17 18 19 1a 1b 1c 1d 1e 1f ................ 260s | decode_to_chunk() test_prf_vector: input "0xf54f0ec8d2b9f3d36807734bd5283fd4" 260s | decode_to_chunk() output: 260s | f5 4f 0e c8 d2 b9 f3 d3 68 07 73 4b d5 28 3f d4 .O......h.sK.(?. 260s | PRF chunk interface PRF AES_XCBC init key hunk 0xbed435405ff0 (length 16) 260s | 00 01 02 03 04 05 06 07 08 09 0a 0b 0c 0d 0e 0f ................ 260s | CONCATENATE_DATA_AND_BASE: 260s | target: EXTRACT_KEY_FROM_KEY 260s | base: base-key@0xbed435402bc0 (16-bytes, AES_KEY_GEN) 260s | params: 16-bytes@0xffffc40c0dd0 260s | key-offset: 0, key-size: 16 260s | EXTRACT_KEY_FROM_KEY: 260s | target: EXTRACT_KEY_FROM_KEY 260s | key_size: 16-bytes 260s | base: base-key@0xbed435405c00 (32-bytes, EXTRACT_KEY_FROM_KEY) 260s | operation: FLAGS_ONLY 260s | params: 8-bytes@0xffffc40c0d78 260s | XCBC: Key 16=16 just right 260s | key-offset: 0, key-size: 16 260s | EXTRACT_KEY_FROM_KEY: 260s | target: AES_ECB 260s | flags: SIGN 260s | key_size: 16-bytes 260s | base: base-key@0xbed435406d90 (16-bytes, EXTRACT_KEY_FROM_KEY) 260s | operation: FLAGS_ONLY 260s | params: 8-bytes@0xffffc40c0d28 260s | PRF chunk interface PRF AES_XCBC 0xbed4354065f0 260s | PRF chunk interface PRF AES_XCBC update message (0xbed435402b60 length 32) 260s | 00 01 02 03 04 05 06 07 08 09 0a 0b 0c 0d 0e 0f ................ 260s | 10 11 12 13 14 15 16 17 18 19 1a 1b 1c 1d 1e 1f ................ 260s | XCBC: data 260s | 00 01 02 03 04 05 06 07 08 09 0a 0b 0c 0d 0e 0f ................ 260s | 10 11 12 13 14 15 16 17 18 19 1a 1b 1c 1d 1e 1f ................ 260s | K extracting all 16 bytes of key@0xbed435405c00 260s | K: symkey-key@0xbed435405c00 (16-bytes, AES_ECB) 260s | sizeof bytes 16 260s | wrapper: (SECItemType)1735262254: 7c 83 43 2d 01 06 f1 8e f8 f5 f0 67 ba 2a 8d 3f 260s | K extracted len 16 bytes at 0xbed435406a00 260s | unwrapped: 260s | 00 01 02 03 04 05 06 07 08 09 0a 0b 0c 0d 0e 0f ................ 260s | XCBC: K: 260s | 00 01 02 03 04 05 06 07 08 09 0a 0b 0c 0d 0e 0f ................ 260s | XCBC: K1 260s | c3 52 80 57 54 23 7f 31 1a c0 ff f4 e3 e0 3e 78 .R.WT#.1......>x 260s | CONCATENATE_DATA_AND_BASE: 260s | target: EXTRACT_KEY_FROM_KEY 260s | base: base-key@0xbed435402bc0 (16-bytes, AES_KEY_GEN) 260s | params: 16-bytes@0xffffc40c0c90 260s | key-offset: 0, key-size: 16 260s | EXTRACT_KEY_FROM_KEY: 260s | target: AES_ECB 260s | flags: SIGN 260s | key_size: 16-bytes 260s | base: base-key@0xbed435404510 (32-bytes, EXTRACT_KEY_FROM_KEY) 260s | operation: FLAGS_ONLY 260s | params: 8-bytes@0xffffc40c0c98 260s | XCBC: Computing E[2] using K2 260s | XCBC: K2 260s | bd 86 2f fb 97 ad 2f b8 f8 b8 91 f6 03 2f 36 cb ../.../....../6. 260s | XCBC: E[n-1] 260s | 1d 04 48 fa cf 4d 9c 6f 55 b9 93 da 09 80 3d b3 ..H..M.oU.....=. 260s | XCBC: M[n] 260s | 10 11 12 13 14 15 16 17 18 19 1a 1b 1c 1d 1e 1f ................ 260s | XCBC: M[n]^E[n-1]^K2 260s | b0 93 75 12 4c f5 a5 c0 b5 18 18 37 16 b2 15 67 ..u.L......7...g 260s | XCBC: MAC 260s | f5 4f 0e c8 d2 b9 f3 d3 68 07 73 4b d5 28 3f d4 .O......h.sK.(?. 260s | PRF chunk interface PRF AES_XCBC final length 16 260s | f5 4f 0e c8 d2 b9 f3 d3 68 07 73 4b d5 28 3f d4 .O......h.sK.(?. 260s | chunk output 260s | f5 4f 0e c8 d2 b9 f3 d3 68 07 73 4b d5 28 3f d4 .O......h.sK.(?. 260s | verify_bytes() RFC 3566 Test Case 5: AES-XCBC-MAC-96 with 32-byte input: prf OUT: ok 260s | CONCATENATE_DATA_AND_BASE: 260s | target: EXTRACT_KEY_FROM_KEY 260s | base: base-key@0xbed435402bc0 (16-bytes, AES_KEY_GEN) 260s | params: 16-bytes@0xffffc40c0e50 260s | key-offset: 0, key-size: 16 260s | EXTRACT_KEY_FROM_KEY: 260s | target: EXTRACT_KEY_FROM_KEY 260s | key_size: 16-bytes 260s | base: base-key@0xbed435406d90 (32-bytes, EXTRACT_KEY_FROM_KEY) 260s | operation: FLAGS_ONLY 260s | params: 8-bytes@0xffffc40c0df8 260s | PRF symkey interface PRF AES_XCBC init key symkey-key@0xbed435405c00 (size 16) 260s | PRF symkey interface: key symkey-key@0xbed435405c00 (16-bytes, EXTRACT_KEY_FROM_KEY) 260s | XCBC: Key 16=16 just right 260s | key-offset: 0, key-size: 16 260s | EXTRACT_KEY_FROM_KEY: 260s | target: AES_ECB 260s | flags: SIGN 260s | key_size: 16-bytes 260s | base: base-key@0xbed435405c00 (16-bytes, EXTRACT_KEY_FROM_KEY) 260s | operation: FLAGS_ONLY 260s | params: 8-bytes@0xffffc40c0d58 260s | PRF symkey interface PRF AES_XCBC 0xbed4354065f0 260s | CONCATENATE_DATA_AND_BASE: 260s | target: EXTRACT_KEY_FROM_KEY 260s | base: base-key@0xbed435402bc0 (16-bytes, AES_KEY_GEN) 260s | params: 16-bytes@0xffffc40c0e50 260s | key-offset: 0, key-size: 32 260s | EXTRACT_KEY_FROM_KEY: 260s | target: EXTRACT_KEY_FROM_KEY 260s | key_size: 32-bytes 260s | base: base-key@0xbed435406a20 (48-bytes, EXTRACT_KEY_FROM_KEY) 260s | operation: FLAGS_ONLY 260s | params: 8-bytes@0xffffc40c0df8 260s | PRF symkey interface PRF AES_XCBC update symkey message-key@0xbed435404510 (size 32) 260s | PRF symkey interface: symkey message-key@0xbed435404510 (32-bytes, EXTRACT_KEY_FROM_KEY) 260s | symkey message extracting all 32 bytes of key@0xbed435404510 260s | symkey message: symkey-key@0xbed435404510 (32-bytes, EXTRACT_KEY_FROM_KEY) 260s | sizeof bytes 32 260s | wrapper: (SECItemType)41: 7c 83 43 2d 01 06 f1 8e f8 f5 f0 67 ba 2a 8d 3f 4e 0e 4c 9b 84 29 8f 9f 28 08 f6 04 57 0f a9 ef 260s | symkey message extracted len 32 bytes at 0xbed435407360 260s | unwrapped: 260s | 00 01 02 03 04 05 06 07 08 09 0a 0b 0c 0d 0e 0f ................ 260s | 10 11 12 13 14 15 16 17 18 19 1a 1b 1c 1d 1e 1f ................ 260s | XCBC: data 260s | 00 01 02 03 04 05 06 07 08 09 0a 0b 0c 0d 0e 0f ................ 260s | 10 11 12 13 14 15 16 17 18 19 1a 1b 1c 1d 1e 1f ................ 260s | K extracting all 16 bytes of key@0xbed435406d90 260s | K: symkey-key@0xbed435406d90 (16-bytes, AES_ECB) 260s | sizeof bytes 16 260s | wrapper: (SECItemType)-1005846264: 7c 83 43 2d 01 06 f1 8e f8 f5 f0 67 ba 2a 8d 3f 260s | K extracted len 16 bytes at 0xbed435406250 260s | unwrapped: 260s | 00 01 02 03 04 05 06 07 08 09 0a 0b 0c 0d 0e 0f ................ 260s | XCBC: K: 260s | 00 01 02 03 04 05 06 07 08 09 0a 0b 0c 0d 0e 0f ................ 260s | XCBC: K1 260s | c3 52 80 57 54 23 7f 31 1a c0 ff f4 e3 e0 3e 78 .R.WT#.1......>x 260s | CONCATENATE_DATA_AND_BASE: 260s | target: EXTRACT_KEY_FROM_KEY 260s | base: base-key@0xbed435402bc0 (16-bytes, AES_KEY_GEN) 260s | params: 16-bytes@0xffffc40c0ce0 260s | key-offset: 0, key-size: 16 260s | EXTRACT_KEY_FROM_KEY: 260s | target: AES_ECB 260s | flags: SIGN 260s | key_size: 16-bytes 260s | base: base-key@0xbed435407120 (32-bytes, EXTRACT_KEY_FROM_KEY) 260s | operation: FLAGS_ONLY 260s | params: 8-bytes@0xffffc40c0ce8 260s | XCBC: Computing E[2] using K2 260s | XCBC: K2 260s | bd 86 2f fb 97 ad 2f b8 f8 b8 91 f6 03 2f 36 cb ../.../....../6. 260s | XCBC: E[n-1] 260s | 1d 04 48 fa cf 4d 9c 6f 55 b9 93 da 09 80 3d b3 ..H..M.oU.....=. 260s | XCBC: M[n] 260s | 10 11 12 13 14 15 16 17 18 19 1a 1b 1c 1d 1e 1f ................ 260s | XCBC: M[n]^E[n-1]^K2 260s | b0 93 75 12 4c f5 a5 c0 b5 18 18 37 16 b2 15 67 ..u.L......7...g 260s | XCBC: MAC 260s | f5 4f 0e c8 d2 b9 f3 d3 68 07 73 4b d5 28 3f d4 .O......h.sK.(?. 260s | CONCATENATE_DATA_AND_BASE: 260s | target: EXTRACT_KEY_FROM_KEY 260s | base: base-key@0xbed435402bc0 (16-bytes, AES_KEY_GEN) 260s | params: 16-bytes@0xffffc40c0dd0 260s | key-offset: 0, key-size: 16 260s | EXTRACT_KEY_FROM_KEY: 260s | target: EXTRACT_KEY_FROM_KEY 260s | key_size: 16-bytes 260s | base: base-key@0xbed435407120 (32-bytes, EXTRACT_KEY_FROM_KEY) 260s | operation: FLAGS_ONLY 260s | params: 8-bytes@0xffffc40c0d78 260s | PRF symkey interface PRF AES_XCBC final-key@0xbed435406a20 (size 16) 260s | PRF symkey interface: key-key@0xbed435406a20 (16-bytes, EXTRACT_KEY_FROM_KEY) 260s | output: symkey-key@0xbed435406a20 (16-bytes, EXTRACT_KEY_FROM_KEY) 260s | RFC 3566 Test Case 5: AES-XCBC-MAC-96 with 32-byte input extracting all 16 bytes of key@0xbed435406a20 260s | RFC 3566 Test Case 5: AES-XCBC-MAC-96 with 32-byte input: symkey-key@0xbed435406a20 (16-bytes, EXTRACT_KEY_FROM_KEY) 260s | sizeof bytes 16 260s | wrapper: siBuffer: ae 2d 62 97 75 c8 f5 d6 b1 fa 44 0f d8 d7 13 d9 260s | RFC 3566 Test Case 5: AES-XCBC-MAC-96 with 32-byte input extracted len 16 bytes at 0xbed435402a80 260s | unwrapped: 260s | f5 4f 0e c8 d2 b9 f3 d3 68 07 73 4b d5 28 3f d4 .O......h.sK.(?. 260s | verify_bytes() RFC 3566 Test Case 5: AES-XCBC-MAC-96 with 32-byte input: symkey: ok 260s ipsec algparse: RFC 3566 Test Case 6: AES-XCBC-MAC-96 with 34-byte input 260s | decode_to_chunk() test_prf_vector: input "0x000102030405060708090a0b0c0d0e0f" 260s | decode_to_chunk() output: 260s | 00 01 02 03 04 05 06 07 08 09 0a 0b 0c 0d 0e 0f ................ 260s | decode_to_chunk() test_prf_vector: input "0x000102030405060708090a0b0c0d0e0f101112131415161718191a1b1c1d1e1f2021" 260s | decode_to_chunk() output: 260s | 00 01 02 03 04 05 06 07 08 09 0a 0b 0c 0d 0e 0f ................ 260s | 10 11 12 13 14 15 16 17 18 19 1a 1b 1c 1d 1e 1f ................ 260s | 20 21 ! 260s | decode_to_chunk() test_prf_vector: input "0xbecbb3bccdb518a30677d5481fb6b4d8" 260s | decode_to_chunk() output: 260s | be cb b3 bc cd b5 18 a3 06 77 d5 48 1f b6 b4 d8 .........w.H.... 260s | PRF chunk interface PRF AES_XCBC init key hunk 0xbed435404430 (length 16) 260s | 00 01 02 03 04 05 06 07 08 09 0a 0b 0c 0d 0e 0f ................ 260s | CONCATENATE_DATA_AND_BASE: 260s | target: EXTRACT_KEY_FROM_KEY 260s | base: base-key@0xbed435402bc0 (16-bytes, AES_KEY_GEN) 260s | params: 16-bytes@0xffffc40c0dd0 260s | key-offset: 0, key-size: 16 260s | EXTRACT_KEY_FROM_KEY: 260s | target: EXTRACT_KEY_FROM_KEY 260s | key_size: 16-bytes 260s | base: base-key@0xbed435405c00 (32-bytes, EXTRACT_KEY_FROM_KEY) 260s | operation: FLAGS_ONLY 260s | params: 8-bytes@0xffffc40c0d78 260s | XCBC: Key 16=16 just right 260s | key-offset: 0, key-size: 16 260s | EXTRACT_KEY_FROM_KEY: 260s | target: AES_ECB 260s | flags: SIGN 260s | key_size: 16-bytes 260s | base: base-key@0xbed435406a20 (16-bytes, EXTRACT_KEY_FROM_KEY) 260s | operation: FLAGS_ONLY 260s | params: 8-bytes@0xffffc40c0d28 260s | PRF chunk interface PRF AES_XCBC 0xbed435402b60 260s | PRF chunk interface PRF AES_XCBC update message (0xbed435402b90 length 34) 260s | 00 01 02 03 04 05 06 07 08 09 0a 0b 0c 0d 0e 0f ................ 260s | 10 11 12 13 14 15 16 17 18 19 1a 1b 1c 1d 1e 1f ................ 260s | 20 21 ! 260s | XCBC: data 260s | 00 01 02 03 04 05 06 07 08 09 0a 0b 0c 0d 0e 0f ................ 260s | 10 11 12 13 14 15 16 17 18 19 1a 1b 1c 1d 1e 1f ................ 260s | 20 21 ! 260s | K extracting all 16 bytes of key@0xbed435405c00 260s | K: symkey-key@0xbed435405c00 (16-bytes, AES_ECB) 260s | sizeof bytes 16 260s | wrapper: (SECItemType)1735262254: 7c 83 43 2d 01 06 f1 8e f8 f5 f0 67 ba 2a 8d 3f 260s | K extracted len 16 bytes at 0xbed435406250 260s | unwrapped: 260s | 00 01 02 03 04 05 06 07 08 09 0a 0b 0c 0d 0e 0f ................ 260s | XCBC: K: 260s | 00 01 02 03 04 05 06 07 08 09 0a 0b 0c 0d 0e 0f ................ 260s | XCBC: K1 260s | c3 52 80 57 54 23 7f 31 1a c0 ff f4 e3 e0 3e 78 .R.WT#.1......>x 260s | CONCATENATE_DATA_AND_BASE: 260s | target: EXTRACT_KEY_FROM_KEY 260s | base: base-key@0xbed435402bc0 (16-bytes, AES_KEY_GEN) 260s | params: 16-bytes@0xffffc40c0c90 260s | key-offset: 0, key-size: 16 260s | EXTRACT_KEY_FROM_KEY: 260s | target: AES_ECB 260s | flags: SIGN 260s | key_size: 16-bytes 260s | base: base-key@0xbed435404510 (32-bytes, EXTRACT_KEY_FROM_KEY) 260s | operation: FLAGS_ONLY 260s | params: 8-bytes@0xffffc40c0c98 260s | Computing E[3] using K3 260s | XCBC: K3 260s | c1 a7 ab a1 a2 3a 94 06 58 07 a0 8c c8 ee d0 6e .....:..X......n 260s | XCBC: E[n-1] 260s | 09 02 5e 5a 67 25 20 72 44 14 5c 6b 80 66 85 79 ..^Zg% rD.\k.f.y 260s | XCBC: M[n] 260s | 20 21 ! 260s | XCBC: M[n] 260s | 20 21 ! 260s | XCBC: M[n]:80...^E[n-1]^K3 260s | e8 84 75 fb c5 1f b4 74 1c 13 fc e7 48 88 55 17 ..u....t....H.U. 260s | XCBC: MAC 260s | be cb b3 bc cd b5 18 a3 06 77 d5 48 1f b6 b4 d8 .........w.H.... 260s | PRF chunk interface PRF AES_XCBC final length 16 260s | be cb b3 bc cd b5 18 a3 06 77 d5 48 1f b6 b4 d8 .........w.H.... 260s | chunk output 260s | be cb b3 bc cd b5 18 a3 06 77 d5 48 1f b6 b4 d8 .........w.H.... 260s | verify_bytes() RFC 3566 Test Case 6: AES-XCBC-MAC-96 with 34-byte input: prf OUT: ok 260s | CONCATENATE_DATA_AND_BASE: 260s | target: EXTRACT_KEY_FROM_KEY 260s | base: base-key@0xbed435402bc0 (16-bytes, AES_KEY_GEN) 260s | params: 16-bytes@0xffffc40c0e50 260s | key-offset: 0, key-size: 16 260s | EXTRACT_KEY_FROM_KEY: 260s | target: EXTRACT_KEY_FROM_KEY 260s | key_size: 16-bytes 260s | base: base-key@0xbed435406a20 (32-bytes, EXTRACT_KEY_FROM_KEY) 260s | operation: FLAGS_ONLY 260s | params: 8-bytes@0xffffc40c0df8 260s | PRF symkey interface PRF AES_XCBC init key symkey-key@0xbed435405c00 (size 16) 260s | PRF symkey interface: key symkey-key@0xbed435405c00 (16-bytes, EXTRACT_KEY_FROM_KEY) 260s | XCBC: Key 16=16 just right 260s | key-offset: 0, key-size: 16 260s | EXTRACT_KEY_FROM_KEY: 260s | target: AES_ECB 260s | flags: SIGN 260s | key_size: 16-bytes 260s | base: base-key@0xbed435405c00 (16-bytes, EXTRACT_KEY_FROM_KEY) 260s | operation: FLAGS_ONLY 260s | params: 8-bytes@0xffffc40c0d58 260s | PRF symkey interface PRF AES_XCBC 0xbed435402b60 260s | CONCATENATE_DATA_AND_BASE: 260s | target: EXTRACT_KEY_FROM_KEY 260s | base: base-key@0xbed435402bc0 (16-bytes, AES_KEY_GEN) 260s | params: 16-bytes@0xffffc40c0e50 260s | key-offset: 0, key-size: 34 260s | EXTRACT_KEY_FROM_KEY: 260s | target: EXTRACT_KEY_FROM_KEY 260s | key_size: 34-bytes 260s | base: base-key@0xbed435406d90 (50-bytes, EXTRACT_KEY_FROM_KEY) 260s | operation: FLAGS_ONLY 260s | params: 8-bytes@0xffffc40c0df8 260s | PRF symkey interface PRF AES_XCBC update symkey message-key@0xbed435404510 (size 34) 260s | PRF symkey interface: symkey message-key@0xbed435404510 (34-bytes, EXTRACT_KEY_FROM_KEY) 260s | symkey message extracting all 34 bytes of key@0xbed435404510 260s | symkey message: symkey-key@0xbed435404510 (34-bytes, EXTRACT_KEY_FROM_KEY) 260s | sizeof bytes 48 260s | wrapper: (SECItemType)41: 7c 83 43 2d 01 06 f1 8e f8 f5 f0 67 ba 2a 8d 3f 4e 0e 4c 9b 84 29 8f 9f 28 08 f6 04 57 0f a9 ef 5f 05 87 e7 71 1b 43 16 48 74 f9 12 1c e1 70 15 260s | symkey message extracted len 48 bytes at 0xbed435406270 260s | unwrapped: 260s | 00 01 02 03 04 05 06 07 08 09 0a 0b 0c 0d 0e 0f ................ 260s | 10 11 12 13 14 15 16 17 18 19 1a 1b 1c 1d 1e 1f ................ 260s | 20 21 00 00 00 00 00 00 00 00 00 00 00 00 00 00 !.............. 260s | XCBC: data 260s | 00 01 02 03 04 05 06 07 08 09 0a 0b 0c 0d 0e 0f ................ 260s | 10 11 12 13 14 15 16 17 18 19 1a 1b 1c 1d 1e 1f ................ 260s | 20 21 ! 260s | K extracting all 16 bytes of key@0xbed435406a20 260s | K: symkey-key@0xbed435406a20 (16-bytes, AES_ECB) 260s | sizeof bytes 16 260s | wrapper: (SECItemType)-1005846264: 7c 83 43 2d 01 06 f1 8e f8 f5 f0 67 ba 2a 8d 3f 260s | K extracted len 16 bytes at 0xbed435406a00 260s | unwrapped: 260s | 00 01 02 03 04 05 06 07 08 09 0a 0b 0c 0d 0e 0f ................ 260s | XCBC: K: 260s | 00 01 02 03 04 05 06 07 08 09 0a 0b 0c 0d 0e 0f ................ 260s | XCBC: K1 260s | c3 52 80 57 54 23 7f 31 1a c0 ff f4 e3 e0 3e 78 .R.WT#.1......>x 260s | CONCATENATE_DATA_AND_BASE: 260s | target: EXTRACT_KEY_FROM_KEY 260s | base: base-key@0xbed435402bc0 (16-bytes, AES_KEY_GEN) 260s | params: 16-bytes@0xffffc40c0ce0 260s | key-offset: 0, key-size: 16 260s | EXTRACT_KEY_FROM_KEY: 260s | target: AES_ECB 260s | flags: SIGN 260s | key_size: 16-bytes 260s | base: base-key@0xbed435407120 (32-bytes, EXTRACT_KEY_FROM_KEY) 260s | operation: FLAGS_ONLY 260s | params: 8-bytes@0xffffc40c0ce8 260s | Computing E[3] using K3 260s | XCBC: K3 260s | c1 a7 ab a1 a2 3a 94 06 58 07 a0 8c c8 ee d0 6e .....:..X......n 260s | XCBC: E[n-1] 260s | 09 02 5e 5a 67 25 20 72 44 14 5c 6b 80 66 85 79 ..^Zg% rD.\k.f.y 260s | XCBC: M[n] 260s | 20 21 ! 260s | XCBC: M[n] 260s | 20 21 ! 260s | XCBC: M[n]:80...^E[n-1]^K3 260s | e8 84 75 fb c5 1f b4 74 1c 13 fc e7 48 88 55 17 ..u....t....H.U. 260s | XCBC: MAC 260s | be cb b3 bc cd b5 18 a3 06 77 d5 48 1f b6 b4 d8 .........w.H.... 260s | CONCATENATE_DATA_AND_BASE: 260s | target: EXTRACT_KEY_FROM_KEY 260s | base: base-key@0xbed435402bc0 (16-bytes, AES_KEY_GEN) 260s | params: 16-bytes@0xffffc40c0dd0 260s | key-offset: 0, key-size: 16 260s | EXTRACT_KEY_FROM_KEY: 260s | target: EXTRACT_KEY_FROM_KEY 260s | key_size: 16-bytes 260s | base: base-key@0xbed435407120 (32-bytes, EXTRACT_KEY_FROM_KEY) 260s | operation: FLAGS_ONLY 260s | params: 8-bytes@0xffffc40c0d78 260s | PRF symkey interface PRF AES_XCBC final-key@0xbed435406d90 (size 16) 260s | PRF symkey interface: key-key@0xbed435406d90 (16-bytes, EXTRACT_KEY_FROM_KEY) 260s | output: symkey-key@0xbed435406d90 (16-bytes, EXTRACT_KEY_FROM_KEY) 260s | RFC 3566 Test Case 6: AES-XCBC-MAC-96 with 34-byte input extracting all 16 bytes of key@0xbed435406d90 260s | RFC 3566 Test Case 6: AES-XCBC-MAC-96 with 34-byte input: symkey-key@0xbed435406d90 (16-bytes, EXTRACT_KEY_FROM_KEY) 260s | sizeof bytes 16 260s | wrapper: siBuffer: 6e 2a 4c af 9f 37 dc bf bf 56 07 11 96 19 20 04 260s | RFC 3566 Test Case 6: AES-XCBC-MAC-96 with 34-byte input extracted len 16 bytes at 0xbed435405e40 260s | unwrapped: 260s | be cb b3 bc cd b5 18 a3 06 77 d5 48 1f b6 b4 d8 .........w.H.... 260s | verify_bytes() RFC 3566 Test Case 6: AES-XCBC-MAC-96 with 34-byte input: symkey: ok 260s ipsec algparse: RFC 3566 Test Case 7: AES-XCBC-MAC-96 with 1000-byte input 260s | decode_to_chunk() test_prf_vector: input "0x000102030405060708090a0b0c0d0e0f" 260s | decode_to_chunk() output: 260s | 00 01 02 03 04 05 06 07 08 09 0a 0b 0c 0d 0e 0f ................ 260s | decode_to_chunk() test_prf_vector: input "0xf0dafee895db30253761103b5d84528f" 260s | decode_to_chunk() output: 260s | f0 da fe e8 95 db 30 25 37 61 10 3b 5d 84 52 8f ......0%7a.;].R. 260s | PRF chunk interface PRF AES_XCBC init key hunk 0xbed435406880 (length 16) 260s | 00 01 02 03 04 05 06 07 08 09 0a 0b 0c 0d 0e 0f ................ 260s | CONCATENATE_DATA_AND_BASE: 260s | target: EXTRACT_KEY_FROM_KEY 260s | base: base-key@0xbed435402bc0 (16-bytes, AES_KEY_GEN) 260s | params: 16-bytes@0xffffc40c0dd0 260s | key-offset: 0, key-size: 16 260s | EXTRACT_KEY_FROM_KEY: 260s | target: EXTRACT_KEY_FROM_KEY 260s | key_size: 16-bytes 260s | base: base-key@0xbed435405c00 (32-bytes, EXTRACT_KEY_FROM_KEY) 260s | operation: FLAGS_ONLY 260s | params: 8-bytes@0xffffc40c0d78 260s | XCBC: Key 16=16 just right 260s | key-offset: 0, key-size: 16 260s | EXTRACT_KEY_FROM_KEY: 260s | target: AES_ECB 260s | flags: SIGN 260s | key_size: 16-bytes 260s | base: base-key@0xbed435406d90 (16-bytes, EXTRACT_KEY_FROM_KEY) 260s | operation: FLAGS_ONLY 260s | params: 8-bytes@0xffffc40c0d28 260s | PRF chunk interface PRF AES_XCBC 0xbed4354065f0 260s | PRF chunk interface PRF AES_XCBC update message (0xbed435404640 length 1000) 260s | 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................ 260s | 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................ 260s | 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................ 260s | 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................ 260s | 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................ 260s | 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................ 260s | 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................ 260s | 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................ 260s | 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................ 260s | 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................ 260s | 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................ 260s | 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................ 260s | 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................ 260s | 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................ 260s | 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................ 260s | 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................ 260s | 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................ 260s | 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................ 260s | 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................ 260s | 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................ 260s | 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................ 260s | 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................ 260s | 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................ 260s | 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................ 260s | 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................ 260s | 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................ 260s | 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................ 260s | 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................ 260s | 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................ 260s | 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................ 260s | 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................ 260s | 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................ 260s | 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................ 260s | 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................ 260s | 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................ 260s | 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................ 260s | 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................ 260s | 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................ 260s | 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................ 260s | 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................ 260s | 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................ 260s | 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................ 260s | 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................ 260s | 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................ 260s | 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................ 260s | 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................ 260s | 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................ 260s | 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................ 260s | 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................ 260s | 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................ 260s | 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................ 260s | 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................ 260s | 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................ 260s | 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................ 260s | 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................ 260s | 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................ 260s | 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................ 260s | 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................ 260s | 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................ 260s | 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................ 260s | 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................ 260s | 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................ 260s | 00 00 00 00 00 00 00 00 ........ 260s | XCBC: data 260s | 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................ 260s | 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................ 260s | 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................ 260s | 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................ 260s | 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................ 260s | 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................ 260s | 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................ 260s | 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................ 260s | 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................ 260s | 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................ 260s | 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................ 260s | 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................ 260s | 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................ 260s | 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................ 260s | 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................ 260s | 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................ 260s | 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................ 260s | 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................ 260s | 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................ 260s | 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................ 260s | 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................ 260s | 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................ 260s | 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................ 260s | 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................ 260s | 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................ 260s | 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................ 260s | 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................ 260s | 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................ 260s | 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................ 260s | 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................ 260s | 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................ 260s | 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................ 260s | 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................ 260s | 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................ 260s | 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................ 260s | 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................ 260s | 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................ 260s | 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................ 260s | 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................ 260s | 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................ 260s | 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................ 260s | 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................ 260s | 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................ 260s | 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................ 260s | 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................ 260s | 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................ 260s | 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................ 260s | 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................ 260s | 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................ 260s | 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................ 260s | 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................ 260s | 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................ 260s | 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................ 260s | 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................ 260s | 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................ 260s | 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................ 260s | 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................ 260s | 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................ 260s | 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................ 260s | 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................ 260s | 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................ 260s | 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................ 260s | 00 00 00 00 00 00 00 00 ........ 260s | K extracting all 16 bytes of key@0xbed435405c00 260s | K: symkey-key@0xbed435405c00 (16-bytes, AES_ECB) 260s | sizeof bytes 16 260s | wrapper: (SECItemType)1735262254: 7c 83 43 2d 01 06 f1 8e f8 f5 f0 67 ba 2a 8d 3f 260s | K extracted len 16 bytes at 0xbed435406a00 260s | unwrapped: 260s | 00 01 02 03 04 05 06 07 08 09 0a 0b 0c 0d 0e 0f ................ 260s | XCBC: K: 260s | 00 01 02 03 04 05 06 07 08 09 0a 0b 0c 0d 0e 0f ................ 260s | XCBC: K1 260s | c3 52 80 57 54 23 7f 31 1a c0 ff f4 e3 e0 3e 78 .R.WT#.1......>x 260s | CONCATENATE_DATA_AND_BASE: 260s | target: EXTRACT_KEY_FROM_KEY 260s | base: base-key@0xbed435402bc0 (16-bytes, AES_KEY_GEN) 260s | params: 16-bytes@0xffffc40c0c90 260s | key-offset: 0, key-size: 16 260s | EXTRACT_KEY_FROM_KEY: 260s | target: AES_ECB 260s | flags: SIGN 260s | key_size: 16-bytes 260s | base: base-key@0xbed435404510 (32-bytes, EXTRACT_KEY_FROM_KEY) 260s | operation: FLAGS_ONLY 260s | params: 8-bytes@0xffffc40c0c98 260s | Computing E[63] using K3 260s | XCBC: K3 260s | c1 a7 ab a1 a2 3a 94 06 58 07 a0 8c c8 ee d0 6e .....:..X......n 260s | XCBC: E[n-1] 260s | 5c 88 af cc 1e 1e 83 fc c4 2c 0c e4 12 12 f5 17 \........,...... 260s | XCBC: M[n] 260s | 00 00 00 00 00 00 00 00 ........ 260s | XCBC: M[n] 260s | 00 00 00 00 00 00 00 00 ........ 260s | XCBC: M[n]:80...^E[n-1]^K3 260s | 9d 2f 04 6d bc 24 17 fa 1c 2b ac 68 da fc 25 79 ./.m.$...+.h..%y 260s | XCBC: MAC 260s | f0 da fe e8 95 db 30 25 37 61 10 3b 5d 84 52 8f ......0%7a.;].R. 260s | PRF chunk interface PRF AES_XCBC final length 16 260s | f0 da fe e8 95 db 30 25 37 61 10 3b 5d 84 52 8f ......0%7a.;].R. 260s | chunk output 260s | f0 da fe e8 95 db 30 25 37 61 10 3b 5d 84 52 8f ......0%7a.;].R. 260s | verify_bytes() RFC 3566 Test Case 7: AES-XCBC-MAC-96 with 1000-byte input: prf OUT: ok 260s | CONCATENATE_DATA_AND_BASE: 260s | target: EXTRACT_KEY_FROM_KEY 260s | base: base-key@0xbed435402bc0 (16-bytes, AES_KEY_GEN) 260s | params: 16-bytes@0xffffc40c0e50 260s | key-offset: 0, key-size: 16 260s | EXTRACT_KEY_FROM_KEY: 260s | target: EXTRACT_KEY_FROM_KEY 260s | key_size: 16-bytes 260s | base: base-key@0xbed435406d90 (32-bytes, EXTRACT_KEY_FROM_KEY) 260s | operation: FLAGS_ONLY 260s | params: 8-bytes@0xffffc40c0df8 260s | PRF symkey interface PRF AES_XCBC init key symkey-key@0xbed435405c00 (size 16) 260s | PRF symkey interface: key symkey-key@0xbed435405c00 (16-bytes, EXTRACT_KEY_FROM_KEY) 260s | XCBC: Key 16=16 just right 260s | key-offset: 0, key-size: 16 260s | EXTRACT_KEY_FROM_KEY: 260s | target: AES_ECB 260s | flags: SIGN 260s | key_size: 16-bytes 260s | base: base-key@0xbed435405c00 (16-bytes, EXTRACT_KEY_FROM_KEY) 260s | operation: FLAGS_ONLY 260s | params: 8-bytes@0xffffc40c0d58 260s | PRF symkey interface PRF AES_XCBC 0xbed4354065f0 260s | CONCATENATE_DATA_AND_BASE: 260s | target: EXTRACT_KEY_FROM_KEY 260s | base: base-key@0xbed435402bc0 (16-bytes, AES_KEY_GEN) 260s | params: 16-bytes@0xffffc40c0e50 260s | key-offset: 0, key-size: 1000 260s | EXTRACT_KEY_FROM_KEY: 260s | target: EXTRACT_KEY_FROM_KEY 260s | key_size: 1000-bytes 260s | base: base-key@0xbed435406a20 (1016-bytes, EXTRACT_KEY_FROM_KEY) 260s | operation: FLAGS_ONLY 260s | params: 8-bytes@0xffffc40c0df8 260s | PRF symkey interface PRF AES_XCBC update symkey message-key@0xbed435404510 (size 1000) 260s | PRF symkey interface: symkey message-key@0xbed435404510 (1000-bytes, EXTRACT_KEY_FROM_KEY) 260s | symkey message extracting all 1000 bytes of key@0xbed435404510 260s | symkey message: symkey-key@0xbed435404510 (1000-bytes, EXTRACT_KEY_FROM_KEY) 260s | sizeof bytes 1008 260s | wrapper: (SECItemType)41: a1 78 66 df 0e 45 80 54 88 ea 82 36 3a 06 1e 18 a1 78 66 df 0e 45 80 54 88 ea 82 36 3a 06 1e 18 a1 78 66 df 0e 45 80 54 88 ea 82 36 3a 06 1e 18 a1 78 66 df 0e 45 80 54 88 ea 82 36 3a 06 1e 18 a1 78 66 df 0e 45 80 54 88 ea 82 36 3a 06 1e 18 a1 78 66 df 0e 45 80 54 88 ea 82 36 3a 06 1e 18 a1 78 66 df 0e 45 80 54 88 ea 82 36 3a 06 1e 18 a1 78 66 df 0e 45 80 54 88 ea 82 36 3a 06 1e 18 a1 78 66 df 0e 45 80 54 88 ea 82 36 3a 06 1e 18 a1 78 66 df 0e 45 80 54 88 ea 82 36 3a 06 1e 18 a1 78 66 df 0e 45 80 54 88 ea 82 36 3a 06 1e 18 a1 78 66 df 0e 45 80 54 88 ea 82 36 3a 06 1e 18 a1 78 66 df 0e 45 80 54 88 ea 82 36 3a 06 1e 18 a1 78 66 df 0e 45 80 54 88 ea 82 36 3a 06 1e 18 a1 78 66 df 0e 45 80 54 88 ea 82 36 3a 06 1e 18 a1 78 66 df 0e 45 80 54 88 ea 82 36 3a 06 1e 18 a1 78 66 df 0e 45 80 54 88 ea 82 36 3a 06 1e 18 a1 78 66 df 0e 45 80 54 88 ea 82 36 3a 06 1e 18 a1 78 66 df 0e 45 80 54 88 ea 82 36 3a 06 1e 18 a1 ... 260s | symkey message extracted len 1008 bytes at 0xbed435405220 260s | unwrapped: 260s | 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................ 260s | 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................ 260s | 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................ 260s | 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................ 260s | 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................ 260s | 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................ 260s | 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................ 260s | 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................ 260s | 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................ 260s | 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................ 260s | 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................ 260s | 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................ 260s | 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................ 260s | 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................ 260s | 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................ 260s | 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................ 260s | 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................ 260s | 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................ 260s | 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................ 260s | 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................ 260s | 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................ 260s | 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................ 260s | 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................ 260s | 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................ 260s | 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................ 260s | 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................ 260s | 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................ 260s | 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................ 260s | 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................ 260s | 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................ 260s | 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................ 260s | 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................ 260s | 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................ 260s | 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................ 260s | 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................ 260s | 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................ 260s | 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................ 260s | 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................ 260s | 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................ 260s | 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................ 260s | 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................ 260s | 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................ 260s | 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................ 260s | 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................ 260s | 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................ 260s | 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................ 260s | 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................ 260s | 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................ 260s | 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................ 260s | 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................ 260s | 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................ 260s | 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................ 260s | 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................ 260s | 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................ 260s | 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................ 260s | 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................ 260s | 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................ 260s | 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................ 260s | 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................ 260s | 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................ 260s | 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................ 260s | 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................ 260s | 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................ 260s | XCBC: data 260s | 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................ 260s | 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................ 260s | 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................ 260s | 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................ 260s | 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................ 260s | 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................ 260s | 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................ 260s | 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................ 260s | 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................ 260s | 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................ 260s | 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................ 260s | 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................ 260s | 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................ 260s | 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................ 260s | 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................ 260s | 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................ 260s | 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................ 260s | 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................ 260s | 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................ 260s | 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................ 260s | 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................ 260s | 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................ 260s | 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................ 260s | 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................ 260s | 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................ 260s | 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................ 260s | 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................ 260s | 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................ 260s | 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................ 260s | 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................ 260s | 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................ 260s | 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................ 260s | 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................ 260s | 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................ 260s | 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................ 260s | 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................ 260s | 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................ 260s | 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................ 260s | 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................ 260s | 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................ 260s | 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................ 260s | 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................ 260s | 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................ 260s | 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................ 260s | 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................ 260s | 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................ 260s | 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................ 260s | 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................ 260s | 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................ 260s | 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................ 260s | 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................ 260s | 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................ 260s | 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................ 260s | 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................ 260s | 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................ 260s | 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................ 260s | 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................ 260s | 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................ 260s | 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................ 260s | 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................ 260s | 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................ 260s | 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................ 260s | 00 00 00 00 00 00 00 00 ........ 260s | K extracting all 16 bytes of key@0xbed435406d90 260s | K: symkey-key@0xbed435406d90 (16-bytes, AES_ECB) 260s | sizeof bytes 16 260s | wrapper: (SECItemType)-1005846264: 7c 83 43 2d 01 06 f1 8e f8 f5 f0 67 ba 2a 8d 3f 260s | K extracted len 16 bytes at 0xbed435406250 260s | unwrapped: 260s | 00 01 02 03 04 05 06 07 08 09 0a 0b 0c 0d 0e 0f ................ 260s | XCBC: K: 260s | 00 01 02 03 04 05 06 07 08 09 0a 0b 0c 0d 0e 0f ................ 260s | XCBC: K1 260s | c3 52 80 57 54 23 7f 31 1a c0 ff f4 e3 e0 3e 78 .R.WT#.1......>x 260s | CONCATENATE_DATA_AND_BASE: 260s | target: EXTRACT_KEY_FROM_KEY 260s | base: base-key@0xbed435402bc0 (16-bytes, AES_KEY_GEN) 260s | params: 16-bytes@0xffffc40c0ce0 260s | key-offset: 0, key-size: 16 260s | EXTRACT_KEY_FROM_KEY: 260s | target: AES_ECB 260s | flags: SIGN 260s | key_size: 16-bytes 260s | base: base-key@0xbed435407120 (32-bytes, EXTRACT_KEY_FROM_KEY) 260s | operation: FLAGS_ONLY 260s | params: 8-bytes@0xffffc40c0ce8 260s | Computing E[63] using K3 260s | XCBC: K3 260s | c1 a7 ab a1 a2 3a 94 06 58 07 a0 8c c8 ee d0 6e .....:..X......n 260s | XCBC: E[n-1] 260s | 5c 88 af cc 1e 1e 83 fc c4 2c 0c e4 12 12 f5 17 \........,...... 260s | XCBC: M[n] 260s | 00 00 00 00 00 00 00 00 ........ 260s | XCBC: M[n] 260s | 00 00 00 00 00 00 00 00 ........ 260s | XCBC: M[n]:80...^E[n-1]^K3 260s | 9d 2f 04 6d bc 24 17 fa 1c 2b ac 68 da fc 25 79 ./.m.$...+.h..%y 260s | XCBC: MAC 260s | f0 da fe e8 95 db 30 25 37 61 10 3b 5d 84 52 8f ......0%7a.;].R. 260s | CONCATENATE_DATA_AND_BASE: 260s | target: EXTRACT_KEY_FROM_KEY 260s | base: base-key@0xbed435402bc0 (16-bytes, AES_KEY_GEN) 260s | params: 16-bytes@0xffffc40c0dd0 260s | key-offset: 0, key-size: 16 260s | EXTRACT_KEY_FROM_KEY: 260s | target: EXTRACT_KEY_FROM_KEY 260s | key_size: 16-bytes 260s | base: base-key@0xbed435407120 (32-bytes, EXTRACT_KEY_FROM_KEY) 260s | operation: FLAGS_ONLY 260s | params: 8-bytes@0xffffc40c0d78 260s | PRF symkey interface PRF AES_XCBC final-key@0xbed435406a20 (size 16) 260s | PRF symkey interface: key-key@0xbed435406a20 (16-bytes, EXTRACT_KEY_FROM_KEY) 260s | output: symkey-key@0xbed435406a20 (16-bytes, EXTRACT_KEY_FROM_KEY) 260s | RFC 3566 Test Case 7: AES-XCBC-MAC-96 with 1000-byte input extracting all 16 bytes of key@0xbed435406a20 260s | RFC 3566 Test Case 7: AES-XCBC-MAC-96 with 1000-byte input: symkey-key@0xbed435406a20 (16-bytes, EXTRACT_KEY_FROM_KEY) 260s | sizeof bytes 16 260s | wrapper: siBuffer: 72 51 cb 10 0b 1b 2a 3b bb 78 15 51 71 e1 42 b2 260s | RFC 3566 Test Case 7: AES-XCBC-MAC-96 with 1000-byte input extracted len 16 bytes at 0xbed435402a80 260s | unwrapped: 260s | f0 da fe e8 95 db 30 25 37 61 10 3b 5d 84 52 8f ......0%7a.;].R. 260s | verify_bytes() RFC 3566 Test Case 7: AES-XCBC-MAC-96 with 1000-byte input: symkey: ok 260s ipsec algparse: RFC 4434 Test Case AES-XCBC-PRF-128 with 20-byte input (key length 16) 260s | decode_to_chunk() test_prf_vector: input "0x000102030405060708090a0b0c0d0e0f" 260s | decode_to_chunk() output: 260s | 00 01 02 03 04 05 06 07 08 09 0a 0b 0c 0d 0e 0f ................ 260s | decode_to_chunk() test_prf_vector: input "0x000102030405060708090a0b0c0d0e0f10111213" 260s | decode_to_chunk() output: 260s | 00 01 02 03 04 05 06 07 08 09 0a 0b 0c 0d 0e 0f ................ 260s | 10 11 12 13 .... 260s | decode_to_chunk() test_prf_vector: input "0x47f51b4564966215b8985c63055ed308" 260s | decode_to_chunk() output: 260s | 47 f5 1b 45 64 96 62 15 b8 98 5c 63 05 5e d3 08 G..Ed.b...\c.^.. 260s | PRF chunk interface PRF AES_XCBC init key hunk 0xbed435405ff0 (length 16) 260s | 00 01 02 03 04 05 06 07 08 09 0a 0b 0c 0d 0e 0f ................ 260s | CONCATENATE_DATA_AND_BASE: 260s | target: EXTRACT_KEY_FROM_KEY 260s | base: base-key@0xbed435402bc0 (16-bytes, AES_KEY_GEN) 260s | params: 16-bytes@0xffffc40c0dd0 260s | key-offset: 0, key-size: 16 260s | EXTRACT_KEY_FROM_KEY: 260s | target: EXTRACT_KEY_FROM_KEY 260s | key_size: 16-bytes 260s | base: base-key@0xbed435405c00 (32-bytes, EXTRACT_KEY_FROM_KEY) 260s | operation: FLAGS_ONLY 260s | params: 8-bytes@0xffffc40c0d78 260s | XCBC: Key 16=16 just right 260s | key-offset: 0, key-size: 16 260s | EXTRACT_KEY_FROM_KEY: 260s | target: AES_ECB 260s | flags: SIGN 260s | key_size: 16-bytes 260s | base: base-key@0xbed435406a20 (16-bytes, EXTRACT_KEY_FROM_KEY) 260s | operation: FLAGS_ONLY 260s | params: 8-bytes@0xffffc40c0d28 260s | PRF chunk interface PRF AES_XCBC 0xbed4354065f0 260s | PRF chunk interface PRF AES_XCBC update message (0xbed435404430 length 20) 260s | 00 01 02 03 04 05 06 07 08 09 0a 0b 0c 0d 0e 0f ................ 260s | 10 11 12 13 .... 260s | XCBC: data 260s | 00 01 02 03 04 05 06 07 08 09 0a 0b 0c 0d 0e 0f ................ 260s | 10 11 12 13 .... 260s | K extracting all 16 bytes of key@0xbed435405c00 260s | K: symkey-key@0xbed435405c00 (16-bytes, AES_ECB) 260s | sizeof bytes 16 260s | wrapper: (SECItemType)1735262254: 7c 83 43 2d 01 06 f1 8e f8 f5 f0 67 ba 2a 8d 3f 260s | K extracted len 16 bytes at 0xbed4354028c0 260s | unwrapped: 260s | 00 01 02 03 04 05 06 07 08 09 0a 0b 0c 0d 0e 0f ................ 260s | XCBC: K: 260s | 00 01 02 03 04 05 06 07 08 09 0a 0b 0c 0d 0e 0f ................ 260s | XCBC: K1 260s | c3 52 80 57 54 23 7f 31 1a c0 ff f4 e3 e0 3e 78 .R.WT#.1......>x 260s | CONCATENATE_DATA_AND_BASE: 260s | target: EXTRACT_KEY_FROM_KEY 260s | base: base-key@0xbed435402bc0 (16-bytes, AES_KEY_GEN) 260s | params: 16-bytes@0xffffc40c0c90 260s | key-offset: 0, key-size: 16 260s | EXTRACT_KEY_FROM_KEY: 260s | target: AES_ECB 260s | flags: SIGN 260s | key_size: 16-bytes 260s | base: base-key@0xbed435404510 (32-bytes, EXTRACT_KEY_FROM_KEY) 260s | operation: FLAGS_ONLY 260s | params: 8-bytes@0xffffc40c0c98 260s | Computing E[2] using K3 260s | XCBC: K3 260s | c1 a7 ab a1 a2 3a 94 06 58 07 a0 8c c8 ee d0 6e .....:..X......n 260s | XCBC: E[n-1] 260s | 1d 04 48 fa cf 4d 9c 6f 55 b9 93 da 09 80 3d b3 ..H..M.oU.....=. 260s | XCBC: M[n] 260s | 10 11 12 13 .... 260s | XCBC: M[n] 260s | 10 11 12 13 .... 260s | XCBC: M[n]:80...^E[n-1]^K3 260s | cc b2 f1 48 ed 77 08 69 0d be 33 56 c1 6e ed dd ...H.w.i..3V.n.. 260s | XCBC: MAC 260s | 47 f5 1b 45 64 96 62 15 b8 98 5c 63 05 5e d3 08 G..Ed.b...\c.^.. 260s | PRF chunk interface PRF AES_XCBC final length 16 260s | 47 f5 1b 45 64 96 62 15 b8 98 5c 63 05 5e d3 08 G..Ed.b...\c.^.. 260s | chunk output 260s | 47 f5 1b 45 64 96 62 15 b8 98 5c 63 05 5e d3 08 G..Ed.b...\c.^.. 260s | verify_bytes() RFC 4434 Test Case AES-XCBC-PRF-128 with 20-byte input (key length 16): prf OUT: ok 260s | CONCATENATE_DATA_AND_BASE: 260s | target: EXTRACT_KEY_FROM_KEY 260s | base: base-key@0xbed435402bc0 (16-bytes, AES_KEY_GEN) 260s | params: 16-bytes@0xffffc40c0e50 260s | key-offset: 0, key-size: 16 260s | EXTRACT_KEY_FROM_KEY: 260s | target: EXTRACT_KEY_FROM_KEY 260s | key_size: 16-bytes 260s | base: base-key@0xbed435406a20 (32-bytes, EXTRACT_KEY_FROM_KEY) 260s | operation: FLAGS_ONLY 260s | params: 8-bytes@0xffffc40c0df8 260s | PRF symkey interface PRF AES_XCBC init key symkey-key@0xbed435405c00 (size 16) 260s | PRF symkey interface: key symkey-key@0xbed435405c00 (16-bytes, EXTRACT_KEY_FROM_KEY) 260s | XCBC: Key 16=16 just right 260s | key-offset: 0, key-size: 16 260s | EXTRACT_KEY_FROM_KEY: 260s | target: AES_ECB 260s | flags: SIGN 260s | key_size: 16-bytes 260s | base: base-key@0xbed435405c00 (16-bytes, EXTRACT_KEY_FROM_KEY) 260s | operation: FLAGS_ONLY 260s | params: 8-bytes@0xffffc40c0d58 260s | PRF symkey interface PRF AES_XCBC 0xbed4354065f0 260s | CONCATENATE_DATA_AND_BASE: 260s | target: EXTRACT_KEY_FROM_KEY 260s | base: base-key@0xbed435402bc0 (16-bytes, AES_KEY_GEN) 260s | params: 16-bytes@0xffffc40c0e50 260s | key-offset: 0, key-size: 20 260s | EXTRACT_KEY_FROM_KEY: 260s | target: EXTRACT_KEY_FROM_KEY 260s | key_size: 20-bytes 260s | base: base-key@0xbed435406d90 (36-bytes, EXTRACT_KEY_FROM_KEY) 260s | operation: FLAGS_ONLY 260s | params: 8-bytes@0xffffc40c0df8 260s | PRF symkey interface PRF AES_XCBC update symkey message-key@0xbed435404510 (size 20) 260s | PRF symkey interface: symkey message-key@0xbed435404510 (20-bytes, EXTRACT_KEY_FROM_KEY) 260s | symkey message extracting all 20 bytes of key@0xbed435404510 260s | symkey message: symkey-key@0xbed435404510 (20-bytes, EXTRACT_KEY_FROM_KEY) 260s | sizeof bytes 32 260s | wrapper: (SECItemType)41: 7c 83 43 2d 01 06 f1 8e f8 f5 f0 67 ba 2a 8d 3f af 71 8a 1d 6e 8e 9b 45 3e 44 e3 0a 66 ac 96 93 260s | symkey message extracted len 32 bytes at 0xbed435402b60 260s | unwrapped: 260s | 00 01 02 03 04 05 06 07 08 09 0a 0b 0c 0d 0e 0f ................ 260s | 10 11 12 13 00 00 00 00 00 00 00 00 00 00 00 00 ................ 260s | XCBC: data 260s | 00 01 02 03 04 05 06 07 08 09 0a 0b 0c 0d 0e 0f ................ 260s | 10 11 12 13 .... 260s | K extracting all 16 bytes of key@0xbed435406a20 260s | K: symkey-key@0xbed435406a20 (16-bytes, AES_ECB) 260s | sizeof bytes 16 260s | wrapper: (SECItemType)-1005846264: 7c 83 43 2d 01 06 f1 8e f8 f5 f0 67 ba 2a 8d 3f 260s | K extracted len 16 bytes at 0xbed435407100 260s | unwrapped: 260s | 00 01 02 03 04 05 06 07 08 09 0a 0b 0c 0d 0e 0f ................ 260s | XCBC: K: 260s | 00 01 02 03 04 05 06 07 08 09 0a 0b 0c 0d 0e 0f ................ 260s | XCBC: K1 260s | c3 52 80 57 54 23 7f 31 1a c0 ff f4 e3 e0 3e 78 .R.WT#.1......>x 260s | CONCATENATE_DATA_AND_BASE: 260s | target: EXTRACT_KEY_FROM_KEY 260s | base: base-key@0xbed435402bc0 (16-bytes, AES_KEY_GEN) 260s | params: 16-bytes@0xffffc40c0ce0 260s | key-offset: 0, key-size: 16 260s | EXTRACT_KEY_FROM_KEY: 260s | target: AES_ECB 260s | flags: SIGN 260s | key_size: 16-bytes 260s | base: base-key@0xbed435407120 (32-bytes, EXTRACT_KEY_FROM_KEY) 260s | operation: FLAGS_ONLY 260s | params: 8-bytes@0xffffc40c0ce8 260s | Computing E[2] using K3 260s | XCBC: K3 260s | c1 a7 ab a1 a2 3a 94 06 58 07 a0 8c c8 ee d0 6e .....:..X......n 260s | XCBC: E[n-1] 260s | 1d 04 48 fa cf 4d 9c 6f 55 b9 93 da 09 80 3d b3 ..H..M.oU.....=. 260s | XCBC: M[n] 260s | 10 11 12 13 .... 260s | XCBC: M[n] 260s | 10 11 12 13 .... 260s | XCBC: M[n]:80...^E[n-1]^K3 260s | cc b2 f1 48 ed 77 08 69 0d be 33 56 c1 6e ed dd ...H.w.i..3V.n.. 260s | XCBC: MAC 260s | 47 f5 1b 45 64 96 62 15 b8 98 5c 63 05 5e d3 08 G..Ed.b...\c.^.. 260s | CONCATENATE_DATA_AND_BASE: 260s | target: EXTRACT_KEY_FROM_KEY 260s | base: base-key@0xbed435402bc0 (16-bytes, AES_KEY_GEN) 260s | params: 16-bytes@0xffffc40c0dd0 260s | key-offset: 0, key-size: 16 260s | EXTRACT_KEY_FROM_KEY: 260s | target: EXTRACT_KEY_FROM_KEY 260s | key_size: 16-bytes 260s | base: base-key@0xbed435407120 (32-bytes, EXTRACT_KEY_FROM_KEY) 260s | operation: FLAGS_ONLY 260s | params: 8-bytes@0xffffc40c0d78 260s | PRF symkey interface PRF AES_XCBC final-key@0xbed435406d90 (size 16) 260s | PRF symkey interface: key-key@0xbed435406d90 (16-bytes, EXTRACT_KEY_FROM_KEY) 260s | output: symkey-key@0xbed435406d90 (16-bytes, EXTRACT_KEY_FROM_KEY) 260s | RFC 4434 Test Case AES-XCBC-PRF-128 with 20-byte input (key length 16) extracting all 16 bytes of key@0xbed435406d90 260s | RFC 4434 Test Case AES-XCBC-PRF-128 with 20-byte input (key length 16): symkey-key@0xbed435406d90 (16-bytes, EXTRACT_KEY_FROM_KEY) 260s | sizeof bytes 16 260s | wrapper: siBuffer: bd d7 07 29 81 ba 8e 69 50 80 11 18 0d 10 63 76 260s | RFC 4434 Test Case AES-XCBC-PRF-128 with 20-byte input (key length 16) extracted len 16 bytes at 0xbed435407100 260s | unwrapped: 260s | 47 f5 1b 45 64 96 62 15 b8 98 5c 63 05 5e d3 08 G..Ed.b...\c.^.. 260s | verify_bytes() RFC 4434 Test Case AES-XCBC-PRF-128 with 20-byte input (key length 16): symkey: ok 260s ipsec algparse: RFC 4434 Test Case AES-XCBC-PRF-128 with 20-byte input (key length 10) 260s | decode_to_chunk() test_prf_vector: input "0x00010203040506070809" 260s | decode_to_chunk() output: 260s | 00 01 02 03 04 05 06 07 08 09 .......... 260s | decode_to_chunk() test_prf_vector: input "0x000102030405060708090a0b0c0d0e0f10111213" 260s | decode_to_chunk() output: 260s | 00 01 02 03 04 05 06 07 08 09 0a 0b 0c 0d 0e 0f ................ 260s | 10 11 12 13 .... 260s | decode_to_chunk() test_prf_vector: input "0x0fa087af7d866e7653434e602fdde835" 260s | decode_to_chunk() output: 260s | 0f a0 87 af 7d 86 6e 76 53 43 4e 60 2f dd e8 35 ....}.nvSCN`/..5 260s | PRF chunk interface PRF AES_XCBC init key hunk 0xbed435405ff0 (length 10) 260s | 00 01 02 03 04 05 06 07 08 09 .......... 260s | CONCATENATE_DATA_AND_BASE: 260s | target: EXTRACT_KEY_FROM_KEY 260s | base: base-key@0xbed435402bc0 (16-bytes, AES_KEY_GEN) 260s | params: 16-bytes@0xffffc40c0dd0 260s | key-offset: 0, key-size: 10 260s | EXTRACT_KEY_FROM_KEY: 260s | target: EXTRACT_KEY_FROM_KEY 260s | key_size: 10-bytes 260s | base: base-key@0xbed435405c00 (26-bytes, EXTRACT_KEY_FROM_KEY) 260s | operation: FLAGS_ONLY 260s | params: 8-bytes@0xffffc40c0d78 260s | XCBC: Key 10<16 too small, padding with zeros 260s | CONCATENATE_BASE_AND_DATA: 260s | target: EXTRACT_KEY_FROM_KEY 260s | base: base-key@0xbed435406d90 (10-bytes, EXTRACT_KEY_FROM_KEY) 260s | params: 16-bytes@0xffffc40c0cf0 260s | key-offset: 0, key-size: 16 260s | EXTRACT_KEY_FROM_KEY: 260s | target: AES_ECB 260s | flags: SIGN 260s | key_size: 16-bytes 260s | base: base-key@0xbed435405c00 (16-bytes, EXTRACT_KEY_FROM_KEY) 260s | operation: FLAGS_ONLY 260s | params: 8-bytes@0xffffc40c0d28 260s | PRF chunk interface PRF AES_XCBC 0xbed4354065f0 260s | PRF chunk interface PRF AES_XCBC update message (0xbed435404430 length 20) 260s | 00 01 02 03 04 05 06 07 08 09 0a 0b 0c 0d 0e 0f ................ 260s | 10 11 12 13 .... 260s | XCBC: data 260s | 00 01 02 03 04 05 06 07 08 09 0a 0b 0c 0d 0e 0f ................ 260s | 10 11 12 13 .... 260s | K extracting all 16 bytes of key@0xbed435404510 260s | K: symkey-key@0xbed435404510 (16-bytes, AES_ECB) 260s | sizeof bytes 16 260s | wrapper: (SECItemType)1735262254: c5 44 45 62 69 ea 52 75 51 b2 12 a4 bf 7e b5 ae 260s | K extracted len 16 bytes at 0xbed435405e40 260s | unwrapped: 260s | 00 01 02 03 04 05 06 07 08 09 00 00 00 00 00 00 ................ 260s | XCBC: K: 260s | 00 01 02 03 04 05 06 07 08 09 00 00 00 00 00 00 ................ 260s | XCBC: K1 260s | 50 ca b2 4d 03 34 45 5e 40 7b 25 0f dd 7c f8 d5 P..M.4E^@{%..|.. 260s | CONCATENATE_DATA_AND_BASE: 260s | target: EXTRACT_KEY_FROM_KEY 260s | base: base-key@0xbed435402bc0 (16-bytes, AES_KEY_GEN) 260s | params: 16-bytes@0xffffc40c0c90 260s | key-offset: 0, key-size: 16 260s | EXTRACT_KEY_FROM_KEY: 260s | target: AES_ECB 260s | flags: SIGN 260s | key_size: 16-bytes 260s | base: base-key@0xbed435405c00 (32-bytes, EXTRACT_KEY_FROM_KEY) 260s | operation: FLAGS_ONLY 260s | params: 8-bytes@0xffffc40c0c98 260s | Computing E[2] using K3 260s | XCBC: K3 260s | 8e f7 48 db 56 f1 f7 26 24 72 f2 c5 63 b0 3f 88 ..H.V..&$r..c.?. 260s | XCBC: E[n-1] 260s | fe 1f 63 e9 65 1a 4b bb 3c cc cd 0d cc 83 e4 30 ..c.e.K.<......0 260s | XCBC: M[n] 260s | 10 11 12 13 .... 260s | XCBC: M[n] 260s | 10 11 12 13 .... 260s | XCBC: M[n]:80...^E[n-1]^K3 260s | 60 f9 39 21 b3 eb bc 9d 18 be 3f c8 af 33 db b8 `.9!......?..3.. 260s | XCBC: MAC 260s | 0f a0 87 af 7d 86 6e 76 53 43 4e 60 2f dd e8 35 ....}.nvSCN`/..5 260s | PRF chunk interface PRF AES_XCBC final length 16 260s | 0f a0 87 af 7d 86 6e 76 53 43 4e 60 2f dd e8 35 ....}.nvSCN`/..5 260s | chunk output 260s | 0f a0 87 af 7d 86 6e 76 53 43 4e 60 2f dd e8 35 ....}.nvSCN`/..5 260s | verify_bytes() RFC 4434 Test Case AES-XCBC-PRF-128 with 20-byte input (key length 10): prf OUT: ok 260s | CONCATENATE_DATA_AND_BASE: 260s | target: EXTRACT_KEY_FROM_KEY 260s | base: base-key@0xbed435402bc0 (16-bytes, AES_KEY_GEN) 260s | params: 16-bytes@0xffffc40c0e50 260s | key-offset: 0, key-size: 10 260s | EXTRACT_KEY_FROM_KEY: 260s | target: EXTRACT_KEY_FROM_KEY 260s | key_size: 10-bytes 260s | base: base-key@0xbed435406d90 (26-bytes, EXTRACT_KEY_FROM_KEY) 260s | operation: FLAGS_ONLY 260s | params: 8-bytes@0xffffc40c0df8 260s | PRF symkey interface PRF AES_XCBC init key symkey-key@0xbed435404510 (size 10) 260s | PRF symkey interface: key symkey-key@0xbed435404510 (10-bytes, EXTRACT_KEY_FROM_KEY) 260s | XCBC: Key 10<16 too small, padding with zeros 260s | CONCATENATE_BASE_AND_DATA: 260s | target: EXTRACT_KEY_FROM_KEY 260s | base: base-key@0xbed435404510 (10-bytes, EXTRACT_KEY_FROM_KEY) 260s | params: 16-bytes@0xffffc40c0d20 260s | key-offset: 0, key-size: 16 260s | EXTRACT_KEY_FROM_KEY: 260s | target: AES_ECB 260s | flags: SIGN 260s | key_size: 16-bytes 260s | base: base-key@0xbed435406d90 (16-bytes, EXTRACT_KEY_FROM_KEY) 260s | operation: FLAGS_ONLY 260s | params: 8-bytes@0xffffc40c0d58 260s | PRF symkey interface PRF AES_XCBC 0xbed4354065f0 260s | CONCATENATE_DATA_AND_BASE: 260s | target: EXTRACT_KEY_FROM_KEY 260s | base: base-key@0xbed435402bc0 (16-bytes, AES_KEY_GEN) 260s | params: 16-bytes@0xffffc40c0e50 260s | key-offset: 0, key-size: 20 260s | EXTRACT_KEY_FROM_KEY: 260s | target: EXTRACT_KEY_FROM_KEY 260s | key_size: 20-bytes 260s | base: base-key@0xbed435406a20 (36-bytes, EXTRACT_KEY_FROM_KEY) 260s | operation: FLAGS_ONLY 260s | params: 8-bytes@0xffffc40c0df8 260s | PRF symkey interface PRF AES_XCBC update symkey message-key@0xbed435406d90 (size 20) 260s | PRF symkey interface: symkey message-key@0xbed435406d90 (20-bytes, EXTRACT_KEY_FROM_KEY) 260s | symkey message extracting all 20 bytes of key@0xbed435406d90 260s | symkey message: symkey-key@0xbed435406d90 (20-bytes, EXTRACT_KEY_FROM_KEY) 260s | sizeof bytes 32 260s | wrapper: (SECItemType)41: 7c 83 43 2d 01 06 f1 8e f8 f5 f0 67 ba 2a 8d 3f af 71 8a 1d 6e 8e 9b 45 3e 44 e3 0a 66 ac 96 93 260s | symkey message extracted len 32 bytes at 0xbed435402b90 260s | unwrapped: 260s | 00 01 02 03 04 05 06 07 08 09 0a 0b 0c 0d 0e 0f ................ 260s | 10 11 12 13 00 00 00 00 00 00 00 00 00 00 00 00 ................ 260s | XCBC: data 260s | 00 01 02 03 04 05 06 07 08 09 0a 0b 0c 0d 0e 0f ................ 260s | 10 11 12 13 .... 260s | K extracting all 16 bytes of key@0xbed435405c00 260s | K: symkey-key@0xbed435405c00 (16-bytes, AES_ECB) 260s | sizeof bytes 16 260s | wrapper: (SECItemType)-1005846264: c5 44 45 62 69 ea 52 75 51 b2 12 a4 bf 7e b5 ae 260s | K extracted len 16 bytes at 0xbed4354028c0 260s | unwrapped: 260s | 00 01 02 03 04 05 06 07 08 09 00 00 00 00 00 00 ................ 260s | XCBC: K: 260s | 00 01 02 03 04 05 06 07 08 09 00 00 00 00 00 00 ................ 260s | XCBC: K1 260s | 50 ca b2 4d 03 34 45 5e 40 7b 25 0f dd 7c f8 d5 P..M.4E^@{%..|.. 260s | CONCATENATE_DATA_AND_BASE: 260s | target: EXTRACT_KEY_FROM_KEY 260s | base: base-key@0xbed435402bc0 (16-bytes, AES_KEY_GEN) 260s | params: 16-bytes@0xffffc40c0ce0 260s | key-offset: 0, key-size: 16 260s | EXTRACT_KEY_FROM_KEY: 260s | target: AES_ECB 260s | flags: SIGN 260s | key_size: 16-bytes 260s | base: base-key@0xbed435407120 (32-bytes, EXTRACT_KEY_FROM_KEY) 260s | operation: FLAGS_ONLY 260s | params: 8-bytes@0xffffc40c0ce8 260s | Computing E[2] using K3 260s | XCBC: K3 260s | 8e f7 48 db 56 f1 f7 26 24 72 f2 c5 63 b0 3f 88 ..H.V..&$r..c.?. 260s | XCBC: E[n-1] 260s | fe 1f 63 e9 65 1a 4b bb 3c cc cd 0d cc 83 e4 30 ..c.e.K.<......0 260s | XCBC: M[n] 260s | 10 11 12 13 .... 260s | XCBC: M[n] 260s | 10 11 12 13 .... 260s | XCBC: M[n]:80...^E[n-1]^K3 260s | 60 f9 39 21 b3 eb bc 9d 18 be 3f c8 af 33 db b8 `.9!......?..3.. 260s | XCBC: MAC 260s | 0f a0 87 af 7d 86 6e 76 53 43 4e 60 2f dd e8 35 ....}.nvSCN`/..5 260s | CONCATENATE_DATA_AND_BASE: 260s | target: EXTRACT_KEY_FROM_KEY 260s | base: base-key@0xbed435402bc0 (16-bytes, AES_KEY_GEN) 260s | params: 16-bytes@0xffffc40c0dd0 260s | key-offset: 0, key-size: 16 260s | EXTRACT_KEY_FROM_KEY: 260s | target: EXTRACT_KEY_FROM_KEY 260s | key_size: 16-bytes 260s | base: base-key@0xbed435407120 (32-bytes, EXTRACT_KEY_FROM_KEY) 260s | operation: FLAGS_ONLY 260s | params: 8-bytes@0xffffc40c0d78 260s | PRF symkey interface PRF AES_XCBC final-key@0xbed435406a20 (size 16) 260s | PRF symkey interface: key-key@0xbed435406a20 (16-bytes, EXTRACT_KEY_FROM_KEY) 260s | output: symkey-key@0xbed435406a20 (16-bytes, EXTRACT_KEY_FROM_KEY) 260s | RFC 4434 Test Case AES-XCBC-PRF-128 with 20-byte input (key length 10) extracting all 16 bytes of key@0xbed435406a20 260s | RFC 4434 Test Case AES-XCBC-PRF-128 with 20-byte input (key length 10): symkey-key@0xbed435406a20 (16-bytes, EXTRACT_KEY_FROM_KEY) 260s | sizeof bytes 16 260s | wrapper: siBuffer: 23 5d 1e 29 fe 61 bc 8e f9 90 a9 7f cd cb e5 99 260s | RFC 4434 Test Case AES-XCBC-PRF-128 with 20-byte input (key length 10) extracted len 16 bytes at 0xbed4354028c0 260s | unwrapped: 260s | 0f a0 87 af 7d 86 6e 76 53 43 4e 60 2f dd e8 35 ....}.nvSCN`/..5 260s | verify_bytes() RFC 4434 Test Case AES-XCBC-PRF-128 with 20-byte input (key length 10): symkey: ok 260s ipsec algparse: RFC 4434 Test Case AES-XCBC-PRF-128 with 20-byte input (key length 18) 260s | decode_to_chunk() test_prf_vector: input "0x000102030405060708090a0b0c0d0e0fedcb" 260s | decode_to_chunk() output: 260s | 00 01 02 03 04 05 06 07 08 09 0a 0b 0c 0d 0e 0f ................ 260s | ed cb .. 260s | decode_to_chunk() test_prf_vector: input "0x000102030405060708090a0b0c0d0e0f10111213" 260s | decode_to_chunk() output: 260s | 00 01 02 03 04 05 06 07 08 09 0a 0b 0c 0d 0e 0f ................ 260s | 10 11 12 13 .... 260s | decode_to_chunk() test_prf_vector: input "0x8cd3c93ae598a9803006ffb67c40e9e4" 260s | decode_to_chunk() output: 260s | 8c d3 c9 3a e5 98 a9 80 30 06 ff b6 7c 40 e9 e4 ...:....0...|@.. 260s | PRF chunk interface PRF AES_XCBC init key hunk 0xbed435405ff0 (length 18) 260s | 00 01 02 03 04 05 06 07 08 09 0a 0b 0c 0d 0e 0f ................ 260s | ed cb .. 260s | CONCATENATE_DATA_AND_BASE: 260s | target: EXTRACT_KEY_FROM_KEY 260s | base: base-key@0xbed435402bc0 (16-bytes, AES_KEY_GEN) 260s | params: 16-bytes@0xffffc40c0dd0 260s | key-offset: 0, key-size: 18 260s | EXTRACT_KEY_FROM_KEY: 260s | target: EXTRACT_KEY_FROM_KEY 260s | key_size: 18-bytes 260s | base: base-key@0xbed435404510 (34-bytes, EXTRACT_KEY_FROM_KEY) 260s | operation: FLAGS_ONLY 260s | params: 8-bytes@0xffffc40c0d78 260s | XCBC: Key 18>16 too big, rehashing to size 260s | CONCATENATE_DATA_AND_BASE: 260s | target: EXTRACT_KEY_FROM_KEY 260s | base: base-key@0xbed435402bc0 (16-bytes, AES_KEY_GEN) 260s | params: 16-bytes@0xffffc40c0ce0 260s | key-offset: 0, key-size: 16 260s | EXTRACT_KEY_FROM_KEY: 260s | target: AES_ECB 260s | flags: SIGN 260s | key_size: 16-bytes 260s | base: base-key@0xbed435406d90 (32-bytes, EXTRACT_KEY_FROM_KEY) 260s | operation: FLAGS_ONLY 260s | params: 8-bytes@0xffffc40c0ce8 260s | draft_chunk extracting all 18 bytes of key@0xbed435406a20 260s | draft_chunk: symkey-key@0xbed435406a20 (18-bytes, EXTRACT_KEY_FROM_KEY) 260s | sizeof bytes 32 260s | wrapper: (SECItemType)1702132066: 7c 83 43 2d 01 06 f1 8e f8 f5 f0 67 ba 2a 8d 3f 43 dd 08 6f f4 41 8a ea 0f cb 79 97 81 87 5f fb 260s | draft_chunk extracted len 32 bytes at 0xbed435402b90 260s | unwrapped: 260s | 00 01 02 03 04 05 06 07 08 09 0a 0b 0c 0d 0e 0f ................ 260s | ed cb 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................ 260s | XCBC: data 260s | 00 01 02 03 04 05 06 07 08 09 0a 0b 0c 0d 0e 0f ................ 260s | ed cb .. 260s | K extracting all 16 bytes of key@0xbed435404510 260s | K: symkey-key@0xbed435404510 (16-bytes, AES_ECB) 260s | sizeof bytes 16 260s | wrapper: (SECItemType)684837: a1 78 66 df 0e 45 80 54 88 ea 82 36 3a 06 1e 18 260s | K extracted len 16 bytes at 0xbed435406250 260s | unwrapped: 260s | 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................ 260s | XCBC: K: 260s | 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................ 260s | XCBC: K1 260s | e1 4d 5d 0e e2 77 15 df 08 b4 15 2b a2 3d a8 e0 .M]..w.....+.=.. 260s | CONCATENATE_DATA_AND_BASE: 260s | target: EXTRACT_KEY_FROM_KEY 260s | base: base-key@0xbed435402bc0 (16-bytes, AES_KEY_GEN) 260s | params: 16-bytes@0xffffc40c0c10 260s | key-offset: 0, key-size: 16 260s | EXTRACT_KEY_FROM_KEY: 260s | target: AES_ECB 260s | flags: SIGN 260s | key_size: 16-bytes 260s | base: base-key@0xbed435405c00 (32-bytes, EXTRACT_KEY_FROM_KEY) 260s | operation: FLAGS_ONLY 260s | params: 8-bytes@0xffffc40c0c18 260s | Computing E[2] using K3 260s | XCBC: K3 260s | 8d 34 ef cb 3b d5 45 ca 06 2a ec df ef 7c 0b fa .4..;.E..*...|.. 260s | XCBC: E[n-1] 260s | 0b 72 b2 ae 0a 37 79 81 75 6a d5 9c 79 c0 e6 96 .r...7y.uj..y... 260s | XCBC: M[n] 260s | ed cb .. 260s | XCBC: M[n] 260s | ed cb .. 260s | XCBC: M[n]:80...^E[n-1]^K3 260s | 6b 8d dd 65 31 e2 3c 4b 73 40 39 43 96 bc ed 6c k..e1.16 too big, rehashing to size 260s | CONCATENATE_DATA_AND_BASE: 260s | target: EXTRACT_KEY_FROM_KEY 260s | base: base-key@0xbed435402bc0 (16-bytes, AES_KEY_GEN) 260s | params: 16-bytes@0xffffc40c0d10 260s | key-offset: 0, key-size: 16 260s | EXTRACT_KEY_FROM_KEY: 260s | target: AES_ECB 260s | flags: SIGN 260s | key_size: 16-bytes 260s | base: base-key@0xbed435404510 (32-bytes, EXTRACT_KEY_FROM_KEY) 260s | operation: FLAGS_ONLY 260s | params: 8-bytes@0xffffc40c0d18 260s | draft_chunk extracting all 18 bytes of key@0xbed435406d90 260s | draft_chunk: symkey-key@0xbed435406d90 (18-bytes, EXTRACT_KEY_FROM_KEY) 260s | sizeof bytes 32 260s | wrapper: (SECItemType)-1005844048: 7c 83 43 2d 01 06 f1 8e f8 f5 f0 67 ba 2a 8d 3f 43 dd 08 6f f4 41 8a ea 0f cb 79 97 81 87 5f fb 260s | draft_chunk extracted len 32 bytes at 0xbed4354065f0 260s | unwrapped: 260s | 00 01 02 03 04 05 06 07 08 09 0a 0b 0c 0d 0e 0f ................ 260s | ed cb 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................ 260s | XCBC: data 260s | 00 01 02 03 04 05 06 07 08 09 0a 0b 0c 0d 0e 0f ................ 260s | ed cb .. 260s | K extracting all 16 bytes of key@0xbed435406a20 260s | K: symkey-key@0xbed435406a20 (16-bytes, AES_ECB) 260s | sizeof bytes 16 260s | wrapper: (SECItemType)684837: a1 78 66 df 0e 45 80 54 88 ea 82 36 3a 06 1e 18 260s | K extracted len 16 bytes at 0xbed435406a00 260s | unwrapped: 260s | 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................ 260s | XCBC: K: 260s | 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................ 260s | XCBC: K1 260s | e1 4d 5d 0e e2 77 15 df 08 b4 15 2b a2 3d a8 e0 .M]..w.....+.=.. 260s | CONCATENATE_DATA_AND_BASE: 260s | target: EXTRACT_KEY_FROM_KEY 260s | base: base-key@0xbed435402bc0 (16-bytes, AES_KEY_GEN) 260s | params: 16-bytes@0xffffc40c0c40 260s | key-offset: 0, key-size: 16 260s | EXTRACT_KEY_FROM_KEY: 260s | target: AES_ECB 260s | flags: SIGN 260s | key_size: 16-bytes 260s | base: base-key@0xbed435405c00 (32-bytes, EXTRACT_KEY_FROM_KEY) 260s | operation: FLAGS_ONLY 260s | params: 8-bytes@0xffffc40c0c48 260s | Computing E[2] using K3 260s | XCBC: K3 260s | 8d 34 ef cb 3b d5 45 ca 06 2a ec df ef 7c 0b fa .4..;.E..*...|.. 260s | XCBC: E[n-1] 260s | 0b 72 b2 ae 0a 37 79 81 75 6a d5 9c 79 c0 e6 96 .r...7y.uj..y... 260s | XCBC: M[n] 260s | ed cb .. 260s | XCBC: M[n] 260s | ed cb .. 260s | XCBC: M[n]:80...^E[n-1]^K3 260s | 6b 8d dd 65 31 e2 3c 4b 73 40 39 43 96 bc ed 6c k..e1.j.....n1.].8 260s | PRF chunk interface PRF HMAC_MD5 init key hunk 0xbed435404430 (length 4) 260s | 4a 65 66 65 Jefe 260s | CONCATENATE_DATA_AND_BASE: 260s | target: EXTRACT_KEY_FROM_KEY 260s | base: base-key@0xbed435402bc0 (16-bytes, AES_KEY_GEN) 260s | params: 16-bytes@0xffffc40c0da0 260s | key-offset: 0, key-size: 4 260s | EXTRACT_KEY_FROM_KEY: 260s | target: MD5_HMAC 260s | flags: SIGN 260s | key_size: 4-bytes 260s | base: base-key@0xbed435405c00 (20-bytes, EXTRACT_KEY_FROM_KEY) 260s | operation: FLAGS_ONLY 260s | params: 8-bytes@0xffffc40c0da8 260s | PRF chunk interface prf: created HMAC_MD5 context 0xbed435405ea0 from key-key@0xbed435406d90 260s | PRF chunk interface prf: begin HMAC_MD5 with context 0xbed435405ea0 from key-key@0xbed435406d90 260s | PRF chunk interface PRF HMAC_MD5 0xbed435406680 260s | PRF chunk interface PRF HMAC_MD5 update message (0xbed4354065f0 length 28) 260s | 77 68 61 74 20 64 6f 20 79 61 20 77 61 6e 74 20 what do ya want 260s | 66 6f 72 20 6e 6f 74 68 69 6e 67 3f for nothing? 260s | PRF chunk interface PRF HMAC_MD5 final length 16 260s | 75 0c 78 3e 6a b0 b5 03 ea a8 6e 31 0a 5d b7 38 u.x>j.....n1.].8 260s | chunk output 260s | 75 0c 78 3e 6a b0 b5 03 ea a8 6e 31 0a 5d b7 38 u.x>j.....n1.].8 260s | verify_bytes() RFC 2104: MD5_HMAC test 2: prf OUT: ok 260s | CONCATENATE_DATA_AND_BASE: 260s | target: EXTRACT_KEY_FROM_KEY 260s | base: base-key@0xbed435402bc0 (16-bytes, AES_KEY_GEN) 260s | params: 16-bytes@0xffffc40c0e50 260s | key-offset: 0, key-size: 4 260s | EXTRACT_KEY_FROM_KEY: 260s | target: EXTRACT_KEY_FROM_KEY 260s | key_size: 4-bytes 260s | base: base-key@0xbed435405c00 (20-bytes, EXTRACT_KEY_FROM_KEY) 260s | operation: FLAGS_ONLY 260s | params: 8-bytes@0xffffc40c0df8 260s | PRF symkey interface PRF HMAC_MD5 init key symkey-key@0xbed435406d90 (size 4) 260s | PRF symkey interface: key symkey-key@0xbed435406d90 (4-bytes, EXTRACT_KEY_FROM_KEY) 260s | key-offset: 0, key-size: 4 260s | EXTRACT_KEY_FROM_KEY: 260s | target: MD5_HMAC 260s | flags: SIGN 260s | key_size: 4-bytes 260s | base: base-key@0xbed435406d90 (4-bytes, EXTRACT_KEY_FROM_KEY) 260s | operation: FLAGS_ONLY 260s | params: 8-bytes@0xffffc40c0dc8 260s | PRF symkey interface prf: created HMAC_MD5 context 0xbed435405ea0 from key symkey-key@0xbed435405c00 260s | PRF symkey interface prf: begin HMAC_MD5 with context 0xbed435405ea0 from key symkey-key@0xbed435405c00 260s | PRF symkey interface PRF HMAC_MD5 0xbed435402b60 260s | CONCATENATE_DATA_AND_BASE: 260s | target: EXTRACT_KEY_FROM_KEY 260s | base: base-key@0xbed435402bc0 (16-bytes, AES_KEY_GEN) 260s | params: 16-bytes@0xffffc40c0e50 260s | key-offset: 0, key-size: 28 260s | EXTRACT_KEY_FROM_KEY: 260s | target: EXTRACT_KEY_FROM_KEY 260s | key_size: 28-bytes 260s | base: base-key@0xbed435404510 (44-bytes, EXTRACT_KEY_FROM_KEY) 260s | operation: FLAGS_ONLY 260s | params: 8-bytes@0xffffc40c0df8 260s | PRF symkey interface PRF HMAC_MD5 update symkey message-key@0xbed435406a20 (size 28) 260s | PRF symkey interface: symkey message-key@0xbed435406a20 (28-bytes, EXTRACT_KEY_FROM_KEY) 260s | nss hmac digest hack extracting all 28 bytes of key@0xbed435406a20 260s | nss hmac digest hack: symkey-key@0xbed435406a20 (28-bytes, EXTRACT_KEY_FROM_KEY) 260s | sizeof bytes 32 260s | wrapper: (SECItemType)41: a7 b7 51 65 ea a9 bd 29 ff e5 66 f4 75 18 ff 51 34 68 75 85 d6 13 c8 9e 27 e3 16 65 cf de 3d 78 260s | nss hmac digest hack extracted len 32 bytes at 0xbed43540d590 260s | unwrapped: 260s | 77 68 61 74 20 64 6f 20 79 61 20 77 61 6e 74 20 what do ya want 260s | 66 6f 72 20 6e 6f 74 68 69 6e 67 3f 00 00 00 00 for nothing?.... 260s | CONCATENATE_DATA_AND_BASE: 260s | target: EXTRACT_KEY_FROM_KEY 260s | base: base-key@0xbed435402bc0 (16-bytes, AES_KEY_GEN) 260s | params: 16-bytes@0xffffc40c0de0 260s | key-offset: 0, key-size: 16 260s | EXTRACT_KEY_FROM_KEY: 260s | target: EXTRACT_KEY_FROM_KEY 260s | key_size: 16-bytes 260s | base: base-key@0xbed435404510 (32-bytes, EXTRACT_KEY_FROM_KEY) 260s | operation: FLAGS_ONLY 260s | params: 8-bytes@0xffffc40c0d88 260s | PRF symkey interface PRF HMAC_MD5 final-key@0xbed435405c00 (size 16) 260s | PRF symkey interface: key-key@0xbed435405c00 (16-bytes, EXTRACT_KEY_FROM_KEY) 260s | output: symkey-key@0xbed435405c00 (16-bytes, EXTRACT_KEY_FROM_KEY) 260s | RFC 2104: MD5_HMAC test 2 extracting all 16 bytes of key@0xbed435405c00 260s | RFC 2104: MD5_HMAC test 2: symkey-key@0xbed435405c00 (16-bytes, EXTRACT_KEY_FROM_KEY) 260s | sizeof bytes 16 260s | wrapper: siBuffer: 78 d2 b7 04 4b 6d 15 bc 1d b7 ff 26 a2 33 52 71 260s | RFC 2104: MD5_HMAC test 2 extracted len 16 bytes at 0xbed435406250 260s | unwrapped: 260s | 75 0c 78 3e 6a b0 b5 03 ea a8 6e 31 0a 5d b7 38 u.x>j.....n1.].8 260s | verify_bytes() RFC 2104: MD5_HMAC test 2: symkey: ok 260s ipsec algparse: RFC 2104: MD5_HMAC test 3 260s | decode_to_chunk() test_prf_vector: input "0xAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAA" 260s | decode_to_chunk() output: 260s | aa aa aa aa aa aa aa aa aa aa aa aa aa aa aa aa ................ 260s | decode_to_chunk() test_prf_vector: input "0xDDDDDDDDDDDDDDDDDDDDDDDDDDDDDDDDDDDDDDDDDDDDDDDDDDDDDDDDDDDDDDDDDDDDDDDDDDDDDDDDDDDDDDDDDDDDDDDDDDDD" 260s | decode_to_chunk() output: 260s | dd dd dd dd dd dd dd dd dd dd dd dd dd dd dd dd ................ 260s | dd dd dd dd dd dd dd dd dd dd dd dd dd dd dd dd ................ 260s | dd dd dd dd dd dd dd dd dd dd dd dd dd dd dd dd ................ 260s | dd dd .. 260s | decode_to_chunk() test_prf_vector: input "0x56be34521d144c88dbb8c733f0e8b3f6" 260s | decode_to_chunk() output: 260s | 56 be 34 52 1d 14 4c 88 db b8 c7 33 f0 e8 b3 f6 V.4R..L....3.... 260s | PRF chunk interface PRF HMAC_MD5 init key hunk 0xbed435406010 (length 16) 260s | aa aa aa aa aa aa aa aa aa aa aa aa aa aa aa aa ................ 260s | CONCATENATE_DATA_AND_BASE: 260s | target: EXTRACT_KEY_FROM_KEY 260s | base: base-key@0xbed435402bc0 (16-bytes, AES_KEY_GEN) 260s | params: 16-bytes@0xffffc40c0da0 260s | key-offset: 0, key-size: 16 260s | EXTRACT_KEY_FROM_KEY: 260s | target: MD5_HMAC 260s | flags: SIGN 260s | key_size: 16-bytes 260s | base: base-key@0xbed435406d90 (32-bytes, EXTRACT_KEY_FROM_KEY) 260s | operation: FLAGS_ONLY 260s | params: 8-bytes@0xffffc40c0da8 260s | PRF chunk interface prf: created HMAC_MD5 context 0xbed435405ea0 from key-key@0xbed435405c00 260s | PRF chunk interface prf: begin HMAC_MD5 with context 0xbed435405ea0 from key-key@0xbed435405c00 260s | PRF chunk interface PRF HMAC_MD5 0xbed435402b90 260s | PRF chunk interface PRF HMAC_MD5 update message (0xbed435405bc0 length 50) 260s | dd dd dd dd dd dd dd dd dd dd dd dd dd dd dd dd ................ 260s | dd dd dd dd dd dd dd dd dd dd dd dd dd dd dd dd ................ 260s | dd dd dd dd dd dd dd dd dd dd dd dd dd dd dd dd ................ 260s | dd dd .. 260s | PRF chunk interface PRF HMAC_MD5 final length 16 260s | 56 be 34 52 1d 14 4c 88 db b8 c7 33 f0 e8 b3 f6 V.4R..L....3.... 260s | chunk output 260s | 56 be 34 52 1d 14 4c 88 db b8 c7 33 f0 e8 b3 f6 V.4R..L....3.... 260s | verify_bytes() RFC 2104: MD5_HMAC test 3: prf OUT: ok 260s | CONCATENATE_DATA_AND_BASE: 260s | target: EXTRACT_KEY_FROM_KEY 260s | base: base-key@0xbed435402bc0 (16-bytes, AES_KEY_GEN) 260s | params: 16-bytes@0xffffc40c0e50 260s | key-offset: 0, key-size: 16 260s | EXTRACT_KEY_FROM_KEY: 260s | target: EXTRACT_KEY_FROM_KEY 260s | key_size: 16-bytes 260s | base: base-key@0xbed435406d90 (32-bytes, EXTRACT_KEY_FROM_KEY) 260s | operation: FLAGS_ONLY 260s | params: 8-bytes@0xffffc40c0df8 260s | PRF symkey interface PRF HMAC_MD5 init key symkey-key@0xbed435405c00 (size 16) 260s | PRF symkey interface: key symkey-key@0xbed435405c00 (16-bytes, EXTRACT_KEY_FROM_KEY) 260s | key-offset: 0, key-size: 16 260s | EXTRACT_KEY_FROM_KEY: 260s | target: MD5_HMAC 260s | flags: SIGN 260s | key_size: 16-bytes 260s | base: base-key@0xbed435405c00 (16-bytes, EXTRACT_KEY_FROM_KEY) 260s | operation: FLAGS_ONLY 260s | params: 8-bytes@0xffffc40c0dc8 260s | PRF symkey interface prf: created HMAC_MD5 context 0xbed435405ea0 from key symkey-key@0xbed435406d90 260s | PRF symkey interface prf: begin HMAC_MD5 with context 0xbed435405ea0 from key symkey-key@0xbed435406d90 260s | PRF symkey interface PRF HMAC_MD5 0xbed4354065f0 260s | CONCATENATE_DATA_AND_BASE: 260s | target: EXTRACT_KEY_FROM_KEY 260s | base: base-key@0xbed435402bc0 (16-bytes, AES_KEY_GEN) 260s | params: 16-bytes@0xffffc40c0e50 260s | key-offset: 0, key-size: 50 260s | EXTRACT_KEY_FROM_KEY: 260s | target: EXTRACT_KEY_FROM_KEY 260s | key_size: 50-bytes 260s | base: base-key@0xbed435404510 (66-bytes, EXTRACT_KEY_FROM_KEY) 260s | operation: FLAGS_ONLY 260s | params: 8-bytes@0xffffc40c0df8 260s | PRF symkey interface PRF HMAC_MD5 update symkey message-key@0xbed435406a20 (size 50) 260s | PRF symkey interface: symkey message-key@0xbed435406a20 (50-bytes, EXTRACT_KEY_FROM_KEY) 260s | nss hmac digest hack extracting all 50 bytes of key@0xbed435406a20 260s | nss hmac digest hack: symkey-key@0xbed435406a20 (50-bytes, EXTRACT_KEY_FROM_KEY) 260s | sizeof bytes 64 260s | wrapper: (SECItemType)41: 4c 99 e5 e6 2e 3d 58 b7 ce 4b 4e cb 03 d7 9f 51 4c 99 e5 e6 2e 3d 58 b7 ce 4b 4e cb 03 d7 9f 51 4c 99 e5 e6 2e 3d 58 b7 ce 4b 4e cb 03 d7 9f 51 83 a3 39 a2 05 ff 32 c5 a0 70 19 c6 fc 92 58 e5 260s | nss hmac digest hack extracted len 64 bytes at 0xbed4354066b0 260s | unwrapped: 260s | dd dd dd dd dd dd dd dd dd dd dd dd dd dd dd dd ................ 260s | dd dd dd dd dd dd dd dd dd dd dd dd dd dd dd dd ................ 260s | dd dd dd dd dd dd dd dd dd dd dd dd dd dd dd dd ................ 260s | dd dd 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................ 260s | CONCATENATE_DATA_AND_BASE: 260s | target: EXTRACT_KEY_FROM_KEY 260s | base: base-key@0xbed435402bc0 (16-bytes, AES_KEY_GEN) 260s | params: 16-bytes@0xffffc40c0de0 260s | key-offset: 0, key-size: 16 260s | EXTRACT_KEY_FROM_KEY: 260s | target: EXTRACT_KEY_FROM_KEY 260s | key_size: 16-bytes 260s | base: base-key@0xbed435404510 (32-bytes, EXTRACT_KEY_FROM_KEY) 260s | operation: FLAGS_ONLY 260s | params: 8-bytes@0xffffc40c0d88 260s | PRF symkey interface PRF HMAC_MD5 final-key@0xbed435406d90 (size 16) 260s | PRF symkey interface: key-key@0xbed435406d90 (16-bytes, EXTRACT_KEY_FROM_KEY) 260s | output: symkey-key@0xbed435406d90 (16-bytes, EXTRACT_KEY_FROM_KEY) 260s | RFC 2104: MD5_HMAC test 3 extracting all 16 bytes of key@0xbed435406d90 260s | RFC 2104: MD5_HMAC test 3: symkey-key@0xbed435406d90 (16-bytes, EXTRACT_KEY_FROM_KEY) 260s | sizeof bytes 16 260s | wrapper: siBuffer: 18 0c 9e 4d 64 3c 58 7d 49 64 0b bb 29 44 ba 99 260s | RFC 2104: MD5_HMAC test 3 extracted len 16 bytes at 0xbed435402a80 260s | unwrapped: 260s | 56 be 34 52 1d 14 4c 88 db b8 c7 33 f0 e8 b3 f6 V.4R..L....3.... 260s | verify_bytes() RFC 2104: MD5_HMAC test 3: symkey: ok 260s ipsec algparse: testing HMAC_SHA1: 260s ipsec algparse: CAVP: IKEv2 key derivation with HMAC-SHA1 260s | decode_to_chunk() test_kdf_vector: input "0x32b50d5f4a3763f3" 260s | decode_to_chunk() output: 260s | 32 b5 0d 5f 4a 37 63 f3 2.._J7c. 260s | decode_to_chunk() test_kdf_vector: input "0x9206a04b26564cb1" 260s | decode_to_chunk() output: 260s | 92 06 a0 4b 26 56 4c b1 ...K&VL. 260s | decode_to_chunk() test_kdf_vector: input "0x34c9e7c188868785" 260s | decode_to_chunk() output: 260s | 34 c9 e7 c1 88 86 87 85 4....... 260s | decode_to_chunk() test_kdf_vector: input "0x3ff77d760d2b2199" 260s | decode_to_chunk() output: 260s | 3f f7 7d 76 0d 2b 21 99 ?.}v.+!. 260s | decode_to_chunk() test_kdf_vector: input "0x4b2c1f971981a8ad8d0abeafabf38cf75fc8349c148142465ed9c8b516b8be52" 260s | decode_to_chunk() output: 260s | 4b 2c 1f 97 19 81 a8 ad 8d 0a be af ab f3 8c f7 K,.............. 260s | 5f c8 34 9c 14 81 42 46 5e d9 c8 b5 16 b8 be 52 _.4...BF^......R 260s | decode_to_chunk() test_kdf_vector: input "0x863f3c9d06efd39d2b907b97f8699e5dd5251ef64a2a176f36ee40c87d4f9330" 260s | decode_to_chunk() output: 260s | 86 3f 3c 9d 06 ef d3 9d 2b 90 7b 97 f8 69 9e 5d .?<.....+.{..i.] 260s | d5 25 1e f6 4a 2a 17 6f 36 ee 40 c8 7d 4f 93 30 .%..J*.o6.@.}O.0 260s | decode_to_chunk() test_kdf_vector: input "0xa9a7b222b59f8f48645f28a1db5b5f5d7479cba7" 260s | decode_to_chunk() output: 260s | a9 a7 b2 22 b5 9f 8f 48 64 5f 28 a1 db 5b 5f 5d ..."...Hd_(..[_] 260s | 74 79 cb a7 ty.. 260s | decode_to_chunk() test_kdf_vector: input "0x63e81194946ebd05df7df5ebf5d8750056bf1f1d" 260s | decode_to_chunk() output: 260s | 63 e8 11 94 94 6e bd 05 df 7d f5 eb f5 d8 75 00 c....n...}....u. 260s | 56 bf 1f 1d V... 260s | decode_to_chunk() test_kdf_vector: input "0xa14293677cc80ff8f9cc0eee30d895da9d8f405666e30ef0dfcb63c634a46002a2a63080e514a062768b76606f9fa5e992204fc5a670bde3f10d6b027113936a5c55b648a194ae587b0088d52204b702c979fa280870d2ed41efa9c549fd11198af1670b143d384bd275c5f594cf266b05ebadca855e4249520a441a81157435a7a56cc4" 260s | decode_to_chunk() output: 260s | a1 42 93 67 7c c8 0f f8 f9 cc 0e ee 30 d8 95 da .B.g|.......0... 260s | 9d 8f 40 56 66 e3 0e f0 df cb 63 c6 34 a4 60 02 ..@Vf.....c.4.`. 260s | a2 a6 30 80 e5 14 a0 62 76 8b 76 60 6f 9f a5 e9 ..0....bv.v`o... 260s | 92 20 4f c5 a6 70 bd e3 f1 0d 6b 02 71 13 93 6a . O..p....k.q..j 260s | 5c 55 b6 48 a1 94 ae 58 7b 00 88 d5 22 04 b7 02 \U.H...X{..."... 260s | c9 79 fa 28 08 70 d2 ed 41 ef a9 c5 49 fd 11 19 .y.(.p..A...I... 260s | 8a f1 67 0b 14 3d 38 4b d2 75 c5 f5 94 cf 26 6b ..g..=8K.u....&k 260s | 05 eb ad ca 85 5e 42 49 52 0a 44 1a 81 15 74 35 .....^BIR.D...t5 260s | a7 a5 6c c4 ..l. 260s | CONCATENATE_DATA_AND_BASE: 260s | target: EXTRACT_KEY_FROM_KEY 260s | base: base-key@0xbed435402bc0 (16-bytes, AES_KEY_GEN) 260s | params: 16-bytes@0xffffc40c0e50 260s | key-offset: 0, key-size: 32 260s | EXTRACT_KEY_FROM_KEY: 260s | target: EXTRACT_KEY_FROM_KEY 260s | key_size: 32-bytes 260s | base: base-key@0xbed435405c00 (48-bytes, EXTRACT_KEY_FROM_KEY) 260s | operation: FLAGS_ONLY 260s | params: 8-bytes@0xffffc40c0df8 260s | NSS_IKE_PRF_DERIVE: 260s | target: NSS_IKE_PRF_PLUS_DERIVE 260s | base: base-key@0xbed435406d90 (32-bytes, EXTRACT_KEY_FROM_KEY) 260s | params: 56-bytes@0xffffc40c0e60 260s | CAVP: IKEv2 key derivation with HMAC-SHA1 extracting all 20 bytes of key@0xbed435405c00 260s | CAVP: IKEv2 key derivation with HMAC-SHA1: symkey-key@0xbed435405c00 (20-bytes, NSS_IKE_PRF_PLUS_DERIVE) 260s | sizeof bytes 32 260s | wrapper: (SECItemType)1684156471: e8 d4 6f 14 09 d8 be 4c de 6d 85 48 1a 1f ee 8d d8 ac f8 30 04 6d 51 01 d5 cd 4a 09 b4 14 40 d0 260s | CAVP: IKEv2 key derivation with HMAC-SHA1 extracted len 32 bytes at 0xbed435406680 260s | unwrapped: 260s | a9 a7 b2 22 b5 9f 8f 48 64 5f 28 a1 db 5b 5f 5d ..."...Hd_(..[_] 260s | 74 79 cb a7 00 00 00 00 00 00 00 00 00 00 00 00 ty.............. 260s | verify_bytes() CAVP: IKEv2 key derivation with HMAC-SHA1: skeyseed: ok 260s | NSS_IKE_PRF_PLUS_DERIVE: 260s | target: EXTRACT_KEY_FROM_KEY 260s | key_size: 132-bytes 260s | base: base-key@0xbed435405c00 (20-bytes, NSS_IKE_PRF_PLUS_DERIVE) 260s | params: 40-bytes@0xffffc40c0db0 260s | CAVP: IKEv2 key derivation with HMAC-SHA1 extracting all 132 bytes of key@0xbed435406a20 260s | CAVP: IKEv2 key derivation with HMAC-SHA1: symkey-key@0xbed435406a20 (132-bytes, EXTRACT_KEY_FROM_KEY) 260s | sizeof bytes 144 260s | wrapper: (SECItemType)1684156471: 58 5d 73 fb 26 cc 7f 25 ee 53 3b 9b ae a7 3c c1 d2 e8 2a 84 45 be b2 8b 0e c0 44 df 64 94 57 53 58 e9 06 11 a3 1a 1d ec 5b 7c 48 97 9a f7 18 8f 30 89 ad 66 57 08 21 d7 68 f8 54 7e 6f 92 02 b1 40 d3 22 89 44 bf 46 6d 5e c3 69 5e fd 00 ea c5 99 29 80 ed 2d ae 72 5c 31 f0 99 d5 8d a8 ae e5 68 42 e3 64 b2 99 59 35 9c e9 80 e0 ac ba 94 fd 77 25 9a b8 f9 56 94 fb 15 cc 09 c0 92 c6 6d 2c 50 3e d0 c3 65 db 95 21 ed a8 53 80 b5 d4 cd 34 260s | CAVP: IKEv2 key derivation with HMAC-SHA1 extracted len 144 bytes at 0xbed435405a30 260s | unwrapped: 260s | a1 42 93 67 7c c8 0f f8 f9 cc 0e ee 30 d8 95 da .B.g|.......0... 260s | 9d 8f 40 56 66 e3 0e f0 df cb 63 c6 34 a4 60 02 ..@Vf.....c.4.`. 260s | a2 a6 30 80 e5 14 a0 62 76 8b 76 60 6f 9f a5 e9 ..0....bv.v`o... 260s | 92 20 4f c5 a6 70 bd e3 f1 0d 6b 02 71 13 93 6a . O..p....k.q..j 260s | 5c 55 b6 48 a1 94 ae 58 7b 00 88 d5 22 04 b7 02 \U.H...X{..."... 260s | c9 79 fa 28 08 70 d2 ed 41 ef a9 c5 49 fd 11 19 .y.(.p..A...I... 260s | 8a f1 67 0b 14 3d 38 4b d2 75 c5 f5 94 cf 26 6b ..g..=8K.u....&k 260s | 05 eb ad ca 85 5e 42 49 52 0a 44 1a 81 15 74 35 .....^BIR.D...t5 260s | a7 a5 6c c4 00 00 00 00 00 00 00 00 00 00 00 00 ..l............. 260s | verify_bytes() CAVP: IKEv2 key derivation with HMAC-SHA1: DKM: ok 260s | key-offset: 0, key-size: 20 260s | EXTRACT_KEY_FROM_KEY: 260s | target: EXTRACT_KEY_FROM_KEY 260s | key_size: 20-bytes 260s | base: base-key@0xbed435406a20 (132-bytes, EXTRACT_KEY_FROM_KEY) 260s | operation: FLAGS_ONLY 260s | params: 8-bytes@0xffffc40c0e78 260s | CONCATENATE_DATA_AND_BASE: 260s | target: EXTRACT_KEY_FROM_KEY 260s | base: base-key@0xbed435402bc0 (16-bytes, AES_KEY_GEN) 260s | params: 16-bytes@0xffffc40c0e50 260s | key-offset: 0, key-size: 32 260s | EXTRACT_KEY_FROM_KEY: 260s | target: EXTRACT_KEY_FROM_KEY 260s | key_size: 32-bytes 260s | base: base-key@0xbed435406440 (48-bytes, EXTRACT_KEY_FROM_KEY) 260s | operation: FLAGS_ONLY 260s | params: 8-bytes@0xffffc40c0df8 260s | NSS_IKE_PRF_DERIVE: 260s | target: NSS_IKE_PRF_PLUS_DERIVE 260s | base: base-key@0xbed435404510 (20-bytes, EXTRACT_KEY_FROM_KEY) 260s | params: 56-bytes@0xffffc40c0e50 260s | CAVP: IKEv2 key derivation with HMAC-SHA1 extracting all 20 bytes of key@0xbed435406440 260s | CAVP: IKEv2 key derivation with HMAC-SHA1: symkey-key@0xbed435406440 (20-bytes, NSS_IKE_PRF_PLUS_DERIVE) 260s | sizeof bytes 32 260s | wrapper: (SECItemType)1936548210: 66 03 b8 47 1a d8 d6 7b 3e 9c 3d 10 8b 1e 74 31 42 99 09 22 a4 68 71 a4 07 02 a3 cc fe 98 08 ec 260s | CAVP: IKEv2 key derivation with HMAC-SHA1 extracted len 32 bytes at 0xbed435402b90 260s | unwrapped: 260s | 63 e8 11 94 94 6e bd 05 df 7d f5 eb f5 d8 75 00 c....n...}....u. 260s | 56 bf 1f 1d 00 00 00 00 00 00 00 00 00 00 00 00 V............... 260s | verify_bytes() CAVP: IKEv2 key derivation with HMAC-SHA1: skeyseed_rekey: ok 260s ipsec algparse: leak detective found no leaks 260s /usr/libexec/ipsec/pluto: adjusting nssdir to /tmp/tmp.LU1rn8fu2T 260s /usr/libexec/ipsec/pluto: selftest: skipping lock 260s /usr/libexec/ipsec/pluto: selftest: skipping control socket 260s /usr/libexec/ipsec/pluto: selftest: skipping fork 260s Starting Pluto (Libreswan Version 5.2 IKEv2 IKEv1 XFRM XFRMI esp-hw-offload FORK PTHREAD_SETSCHEDPRIO NSS (IPsec profile) (NSS-KDF) DNSSEC SYSTEMD_WATCHDOG LABELED_IPSEC (SELINUX) LIBCAP_NG LINUX_AUDIT AUTH_PAM NETWORKMANAGER CURL(non-NSS) LDAP(non-NSS) NFTABLES CAT NFLOG) pid:1509 260s operating system: Linux 6.18.0 [Linux 6.18.0-9-generic #9-Ubuntu SMP PREEMPT_DYNAMIC Mon Jan 12 16:41:39 UTC 2026 aarch64] 260s core dump dir: /run/pluto 260s secrets file: /etc/ipsec.secrets 260s Initializing NSS using read-only database "sql:/tmp/tmp.LU1rn8fu2T" 260s FIPS Mode: OFF 260s NSS crypto library initialized 260s FIPS mode disabled for pluto daemon 260s FIPS HMAC integrity support [not required] 260s libcap-ng capng_apply failed to apply changes, err=-5. see: man capng_apply 260s libcap-ng support [enabled] 260s initializing NSS db 260s running pluto selftest 260s Linux audit support [enabled] 260s leak-detective disabled 260s NSS crypto [enabled] 260s XAUTH PAM support [enabled] 260s initializing libevent in pthreads mode: headers: 2.1.12-stable (2010c00); library: 2.1.12-stable (2010c00) 260s NAT-Traversal: keep-alive period 20s 260s ERROR: xfrmi is not supported, failed to create ipsec-interface ipsec1 bound to lo 260s ipsec-interface is not working: xfrmi is not supported 260s IPsec Interface [disabled] 260s refreshed session resume keys, issuing key 1 260s Encryption algorithms: 260s AES_CCM_16 {256,192,*128} IKEv1: ESP IKEv2: ESP FIPS aes_ccm, aes_ccm_c 260s AES_CCM_12 {256,192,*128} IKEv1: ESP IKEv2: ESP FIPS aes_ccm_b 260s AES_CCM_8 {256,192,*128} IKEv1: ESP IKEv2: ESP FIPS aes_ccm_a 260s 3DES_CBC [*192] IKEv1: IKE ESP IKEv2: IKE ESP FIPS NSS(CBC) 3des 260s CAMELLIA_CTR {256,192,*128} IKEv1: ESP IKEv2: ESP 260s CAMELLIA_CBC {256,192,*128} IKEv1: IKE ESP IKEv2: IKE ESP NSS(CBC) camellia 260s AES_GCM_16 {256,192,*128} IKEv1: ESP IKEv2: IKE ESP FIPS NSS(AEAD) aes_gcm, aes_gcm_c 260s AES_GCM_12 {256,192,*128} IKEv1: ESP IKEv2: IKE ESP FIPS NSS(AEAD) aes_gcm_b 260s AES_GCM_8 {256,192,*128} IKEv1: ESP IKEv2: IKE ESP FIPS NSS(AEAD) aes_gcm_a 260s AES_CTR {256,192,*128} IKEv1: IKE ESP IKEv2: IKE ESP FIPS NSS(CTR) aesctr 260s AES_CBC {256,192,*128} IKEv1: IKE ESP IKEv2: IKE ESP FIPS NSS(CBC) aes 260s NULL_AUTH_AES_GMAC {256,192,*128} IKEv1: ESP IKEv2: ESP FIPS aes_gmac 260s NULL [] IKEv1: ESP IKEv2: ESP NULL 260s CHACHA20_POLY1305 [*256] IKEv1: IKEv2: IKE ESP NSS(AEAD) chacha20poly1305 260s Hash algorithms: 260s MD5 IKEv1: IKE IKEv2: NSS 260s SHA1 IKEv1: IKE IKEv2: IKE FIPS NSS sha 260s SHA2_256 IKEv1: IKE IKEv2: IKE FIPS NSS sha2, sha256 260s SHA2_384 IKEv1: IKE IKEv2: IKE FIPS NSS sha384 260s SHA2_512 IKEv1: IKE IKEv2: IKE FIPS NSS sha512 260s IDENTITY IKEv1: IKEv2: FIPS 260s PRF algorithms: 260s HMAC_MD5 IKEv1: IKE IKEv2: IKE NSS md5 260s HMAC_SHA1 IKEv1: IKE IKEv2: IKE FIPS NSS sha, sha1 260s HMAC_SHA2_256 IKEv1: IKE IKEv2: IKE FIPS NSS sha2, sha256, sha2_256 260s HMAC_SHA2_384 IKEv1: IKE IKEv2: IKE FIPS NSS sha384, sha2_384 260s HMAC_SHA2_512 IKEv1: IKE IKEv2: IKE FIPS NSS sha512, sha2_512 260s AES_XCBC IKEv1: IKEv2: IKE native(XCBC) aes128_xcbc 260s Integrity algorithms: 260s HMAC_MD5_96 IKEv1: IKE ESP AH IKEv2: IKE ESP AH NSS md5, hmac_md5 260s HMAC_SHA1_96 IKEv1: IKE ESP AH IKEv2: IKE ESP AH FIPS NSS sha, sha1, sha1_96, hmac_sha1 260s HMAC_SHA2_512_256 IKEv1: IKE ESP AH IKEv2: IKE ESP AH FIPS NSS sha512, sha2_512, sha2_512_256, hmac_sha2_512 260s HMAC_SHA2_384_192 IKEv1: IKE ESP AH IKEv2: IKE ESP AH FIPS NSS sha384, sha2_384, sha2_384_192, hmac_sha2_384 260s HMAC_SHA2_256_128 IKEv1: IKE ESP AH IKEv2: IKE ESP AH FIPS NSS sha2, sha256, sha2_256, sha2_256_128, hmac_sha2_256 260s HMAC_SHA2_256_TRUNCBUG IKEv1: ESP AH IKEv2: AH 260s AES_XCBC_96 IKEv1: ESP AH IKEv2: IKE ESP AH native(XCBC) aes_xcbc, aes128_xcbc, aes128_xcbc_96 260s AES_CMAC_96 IKEv1: ESP AH IKEv2: ESP AH FIPS aes_cmac 260s NONE IKEv1: ESP IKEv2: IKE ESP FIPS null 260s DH algorithms: 260s NONE IKEv1: IKEv2: IKE ESP AH FIPS NSS(MODP) null, dh0 260s MODP1536 IKEv1: IKE ESP AH IKEv2: IKE ESP AH NSS(MODP) dh5 260s MODP2048 IKEv1: IKE ESP AH IKEv2: IKE ESP AH FIPS NSS(MODP) dh14 260s MODP3072 IKEv1: IKE ESP AH IKEv2: IKE ESP AH FIPS NSS(MODP) dh15 260s MODP4096 IKEv1: IKE ESP AH IKEv2: IKE ESP AH FIPS NSS(MODP) dh16 260s MODP6144 IKEv1: IKE ESP AH IKEv2: IKE ESP AH FIPS NSS(MODP) dh17 260s MODP8192 IKEv1: IKE ESP AH IKEv2: IKE ESP AH FIPS NSS(MODP) dh18 260s DH19 IKEv1: IKE IKEv2: IKE ESP AH FIPS NSS(ECP) ecp_256, ecp256 260s DH20 IKEv1: IKE IKEv2: IKE ESP AH FIPS NSS(ECP) ecp_384, ecp384 260s DH21 IKEv1: IKE IKEv2: IKE ESP AH FIPS NSS(ECP) ecp_521, ecp521 260s DH31 IKEv1: IKE IKEv2: IKE ESP AH NSS(ECP) curve25519 260s IPCOMP algorithms: 260s DEFLATE IKEv1: ESP AH IKEv2: ESP AH FIPS 260s LZS IKEv1: IKEv2: ESP AH FIPS 260s LZJH IKEv1: IKEv2: ESP AH FIPS 260s testing CAMELLIA_CBC: 260s Camellia: 16 bytes with 128-bit key 260s Camellia: 16 bytes with 128-bit key 260s Camellia: 16 bytes with 256-bit key 260s Camellia: 16 bytes with 256-bit key 260s testing AES_GCM_16: 260s empty string 260s one block 260s two blocks 260s two blocks with associated data 260s testing AES_CTR: 260s Encrypting 16 octets using AES-CTR with 128-bit key 260s Encrypting 32 octets using AES-CTR with 128-bit key 260s Encrypting 36 octets using AES-CTR with 128-bit key 260s Encrypting 16 octets using AES-CTR with 192-bit key 260s Encrypting 32 octets using AES-CTR with 192-bit key 260s Encrypting 36 octets using AES-CTR with 192-bit key 260s Encrypting 16 octets using AES-CTR with 256-bit key 260s Encrypting 32 octets using AES-CTR with 256-bit key 260s Encrypting 36 octets using AES-CTR with 256-bit key 260s testing AES_CBC: 260s Encrypting 16 bytes (1 block) using AES-CBC with 128-bit key 260s Encrypting 32 bytes (2 blocks) using AES-CBC with 128-bit key 260s Encrypting 48 bytes (3 blocks) using AES-CBC with 128-bit key 260s Encrypting 64 bytes (4 blocks) using AES-CBC with 128-bit key 260s testing AES_XCBC: 260s RFC 3566 Test Case 1: AES-XCBC-MAC-96 with 0-byte input 260s RFC 3566 Test Case 2: AES-XCBC-MAC-96 with 3-byte input 260s RFC 3566 Test Case 3: AES-XCBC-MAC-96 with 16-byte input 260s RFC 3566 Test Case 4: AES-XCBC-MAC-96 with 20-byte input 260s RFC 3566 Test Case 5: AES-XCBC-MAC-96 with 32-byte input 260s RFC 3566 Test Case 6: AES-XCBC-MAC-96 with 34-byte input 260s RFC 3566 Test Case 7: AES-XCBC-MAC-96 with 1000-byte input 260s RFC 4434 Test Case AES-XCBC-PRF-128 with 20-byte input (key length 16) 260s RFC 4434 Test Case AES-XCBC-PRF-128 with 20-byte input (key length 10) 260s RFC 4434 Test Case AES-XCBC-PRF-128 with 20-byte input (key length 18) 260s testing HMAC_MD5: 260s RFC 2104: MD5_HMAC test 1 260s RFC 2104: MD5_HMAC test 2 260s RFC 2104: MD5_HMAC test 3 260s testing HMAC_SHA1: 260s CAVP: IKEv2 key derivation with HMAC-SHA1 260s selftest: exiting pluto 260s autopkgtest [21:35:20]: test cryptocheck: -----------------------] 261s cryptocheck PASS 261s autopkgtest [21:35:21]: test cryptocheck: - - - - - - - - - - results - - - - - - - - - - 261s autopkgtest [21:35:21]: test cavp: preparing testbed 280s Creating nova instance adt-resolute-arm64-libreswan-20260203-213100-juju-7f2275-prod-proposed-migration-environment-2-e132cc3c-48fb-4160-a4db-bbd3006f3a61 from image adt/ubuntu-resolute-arm64-server-20260203.img (UUID fd4bac28-a946-4216-8755-72db0faf84da)... 330s autopkgtest [21:36:30]: testbed dpkg architecture: arm64 330s autopkgtest [21:36:30]: testbed apt version: 3.1.14 331s autopkgtest [21:36:31]: @@@@@@@@@@@@@@@@@@@@ test bed setup 331s autopkgtest [21:36:31]: testbed release detected to be: resolute 332s autopkgtest [21:36:32]: updating testbed package index (apt update) 332s Get:1 http://ftpmaster.internal/ubuntu resolute-proposed InRelease [124 kB] 332s Hit:2 http://ftpmaster.internal/ubuntu resolute InRelease 332s Hit:3 http://ftpmaster.internal/ubuntu resolute-updates InRelease 332s Hit:4 http://ftpmaster.internal/ubuntu resolute-security InRelease 332s Get:5 http://ftpmaster.internal/ubuntu resolute-proposed/multiverse Sources [27.9 kB] 332s Get:6 http://ftpmaster.internal/ubuntu resolute-proposed/restricted Sources [5260 B] 332s Get:7 http://ftpmaster.internal/ubuntu resolute-proposed/universe Sources [1343 kB] 332s Get:8 http://ftpmaster.internal/ubuntu resolute-proposed/main Sources [242 kB] 332s Get:9 http://ftpmaster.internal/ubuntu resolute-proposed/main arm64 Packages [300 kB] 332s Get:10 http://ftpmaster.internal/ubuntu resolute-proposed/main arm64 c-n-f Metadata [6864 B] 332s Get:11 http://ftpmaster.internal/ubuntu resolute-proposed/restricted arm64 Packages [52.9 kB] 332s Get:12 http://ftpmaster.internal/ubuntu resolute-proposed/restricted arm64 c-n-f Metadata [328 B] 332s Get:13 http://ftpmaster.internal/ubuntu resolute-proposed/universe arm64 Packages [1188 kB] 332s Get:14 http://ftpmaster.internal/ubuntu resolute-proposed/universe arm64 c-n-f Metadata [27.8 kB] 332s Get:15 http://ftpmaster.internal/ubuntu resolute-proposed/multiverse arm64 Packages [21.5 kB] 332s Get:16 http://ftpmaster.internal/ubuntu resolute-proposed/multiverse arm64 c-n-f Metadata [744 B] 335s Fetched 3340 kB in 1s (4804 kB/s) 336s Reading package lists... 337s Hit:1 http://ftpmaster.internal/ubuntu resolute-proposed InRelease 337s Hit:2 http://ftpmaster.internal/ubuntu resolute InRelease 337s Hit:3 http://ftpmaster.internal/ubuntu resolute-updates InRelease 337s Hit:4 http://ftpmaster.internal/ubuntu resolute-security InRelease 338s Reading package lists... 338s Reading package lists... 338s Building dependency tree... 338s Reading state information... 338s Calculating upgrade... 338s The following packages will be upgraded: 338s firmware-sof-signed libpam-modules libpam-modules-bin libpam-runtime 338s libpam0g mtd-utils powermgmt-base 339s 7 upgraded, 0 newly installed, 0 to remove and 0 not upgraded. 339s Need to get 2622 kB of archives. 339s After this operation, 2048 B of additional disk space will be used. 339s Get:1 http://ftpmaster.internal/ubuntu resolute-proposed/main arm64 libpam-runtime all 1.7.0-5ubuntu3 [149 kB] 339s Get:2 http://ftpmaster.internal/ubuntu resolute-proposed/main arm64 libpam0g arm64 1.7.0-5ubuntu3 [69.5 kB] 339s Get:3 http://ftpmaster.internal/ubuntu resolute-proposed/main arm64 libpam-modules-bin arm64 1.7.0-5ubuntu3 [43.6 kB] 339s Get:4 http://ftpmaster.internal/ubuntu resolute-proposed/main arm64 libpam-modules arm64 1.7.0-5ubuntu3 [191 kB] 339s Get:5 http://ftpmaster.internal/ubuntu resolute/main arm64 firmware-sof-signed all 2025.05.1-1build1 [1696 kB] 339s Get:6 http://ftpmaster.internal/ubuntu resolute/main arm64 powermgmt-base all 1.38ubuntu2 [7878 B] 339s Get:7 http://ftpmaster.internal/ubuntu resolute/main arm64 mtd-utils arm64 1:2.3.0-1ubuntu2 [466 kB] 339s dpkg-preconfigure: unable to re-open stdin: No such file or directory 339s Fetched 2622 kB in 1s (4917 kB/s) 340s (Reading database ... (Reading database ... 5% (Reading database ... 10% (Reading database ... 15% (Reading database ... 20% (Reading database ... 25% (Reading database ... 30% (Reading database ... 35% (Reading database ... 40% (Reading database ... 45% (Reading database ... 50% (Reading database ... 55% (Reading database ... 60% (Reading database ... 65% (Reading database ... 70% (Reading database ... 75% (Reading database ... 80% (Reading database ... 85% (Reading database ... 90% (Reading database ... 95% (Reading database ... 100% (Reading database ... 89360 files and directories currently installed.) 340s Preparing to unpack .../libpam-runtime_1.7.0-5ubuntu3_all.deb ... 340s Unpacking libpam-runtime (1.7.0-5ubuntu3) over (1.7.0-5ubuntu2) ... 340s Setting up libpam-runtime (1.7.0-5ubuntu3) ... 340s (Reading database ... (Reading database ... 5% (Reading database ... 10% (Reading database ... 15% (Reading database ... 20% (Reading database ... 25% (Reading database ... 30% (Reading database ... 35% (Reading database ... 40% (Reading database ... 45% (Reading database ... 50% (Reading database ... 55% (Reading database ... 60% (Reading database ... 65% (Reading database ... 70% (Reading database ... 75% (Reading database ... 80% (Reading database ... 85% (Reading database ... 90% (Reading database ... 95% (Reading database ... 100% (Reading database ... 89360 files and directories currently installed.) 340s Preparing to unpack .../libpam0g_1.7.0-5ubuntu3_arm64.deb ... 340s Unpacking libpam0g:arm64 (1.7.0-5ubuntu3) over (1.7.0-5ubuntu2) ... 340s Setting up libpam0g:arm64 (1.7.0-5ubuntu3) ... 341s (Reading database ... (Reading database ... 5% (Reading database ... 10% (Reading database ... 15% (Reading database ... 20% (Reading database ... 25% (Reading database ... 30% (Reading database ... 35% (Reading database ... 40% (Reading database ... 45% (Reading database ... 50% (Reading database ... 55% (Reading database ... 60% (Reading database ... 65% (Reading database ... 70% (Reading database ... 75% (Reading database ... 80% (Reading database ... 85% (Reading database ... 90% (Reading database ... 95% (Reading database ... 100% (Reading database ... 89360 files and directories currently installed.) 341s Preparing to unpack .../libpam-modules-bin_1.7.0-5ubuntu3_arm64.deb ... 341s Unpacking libpam-modules-bin (1.7.0-5ubuntu3) over (1.7.0-5ubuntu2) ... 341s Setting up libpam-modules-bin (1.7.0-5ubuntu3) ... 341s pam_namespace.service is a disabled or a static unit not running, not starting it. 341s (Reading database ... (Reading database ... 5% (Reading database ... 10% (Reading database ... 15% (Reading database ... 20% (Reading database ... 25% (Reading database ... 30% (Reading database ... 35% (Reading database ... 40% (Reading database ... 45% (Reading database ... 50% (Reading database ... 55% (Reading database ... 60% (Reading database ... 65% (Reading database ... 70% (Reading database ... 75% (Reading database ... 80% (Reading database ... 85% (Reading database ... 90% (Reading database ... 95% (Reading database ... 100% (Reading database ... 89360 files and directories currently installed.) 341s Preparing to unpack .../libpam-modules_1.7.0-5ubuntu3_arm64.deb ... 341s Unpacking libpam-modules:arm64 (1.7.0-5ubuntu3) over (1.7.0-5ubuntu2) ... 341s Setting up libpam-modules:arm64 (1.7.0-5ubuntu3) ... 342s (Reading database ... (Reading database ... 5% (Reading database ... 10% (Reading database ... 15% (Reading database ... 20% (Reading database ... 25% (Reading database ... 30% (Reading database ... 35% (Reading database ... 40% (Reading database ... 45% (Reading database ... 50% (Reading database ... 55% (Reading database ... 60% (Reading database ... 65% (Reading database ... 70% (Reading database ... 75% (Reading database ... 80% (Reading database ... 85% (Reading database ... 90% (Reading database ... 95% (Reading database ... 100% (Reading database ... 89360 files and directories currently installed.) 342s Preparing to unpack .../firmware-sof-signed_2025.05.1-1build1_all.deb ... 342s Unpacking firmware-sof-signed (2025.05.1-1build1) over (2025.05.1-1) ... 342s Preparing to unpack .../powermgmt-base_1.38ubuntu2_all.deb ... 342s Unpacking powermgmt-base (1.38ubuntu2) over (1.38ubuntu1) ... 342s Preparing to unpack .../mtd-utils_1%3a2.3.0-1ubuntu2_arm64.deb ... 342s Unpacking mtd-utils (1:2.3.0-1ubuntu2) over (1:2.3.0-1ubuntu1) ... 342s Setting up powermgmt-base (1.38ubuntu2) ... 342s Setting up firmware-sof-signed (2025.05.1-1build1) ... 342s Setting up mtd-utils (1:2.3.0-1ubuntu2) ... 342s Processing triggers for man-db (2.13.1-1) ... 343s Processing triggers for libc-bin (2.42-2ubuntu4) ... 344s autopkgtest [21:36:44]: upgrading testbed (apt dist-upgrade and autopurge) 344s Reading package lists... 344s Building dependency tree... 344s Reading state information... 344s Calculating upgrade... 345s 0 upgraded, 0 newly installed, 0 to remove and 0 not upgraded. 345s Reading package lists... 345s Building dependency tree... 345s Reading state information... 345s Solving dependencies... 346s 0 upgraded, 0 newly installed, 0 to remove and 0 not upgraded. 346s autopkgtest [21:36:46]: rebooting testbed after setup commands that affected boot 387s Reading package lists... 387s Building dependency tree... 387s Reading state information... 387s Solving dependencies... 387s The following NEW packages will be installed: 387s dns-root-data libevent-2.1-7t64 libevent-pthreads-2.1-7t64 libldns3t64 387s libnss3-tools libreswan libunbound8 387s 0 upgraded, 7 newly installed, 0 to remove and 0 not upgraded. 387s Need to get 2870 kB of archives. 387s After this operation, 13.6 MB of additional disk space will be used. 387s Get:1 http://ftpmaster.internal/ubuntu resolute/main arm64 dns-root-data all 2025080400build1 [6022 B] 387s Get:2 http://ftpmaster.internal/ubuntu resolute/main arm64 libnss3-tools arm64 2:3.120-1 [604 kB] 388s Get:3 http://ftpmaster.internal/ubuntu resolute/main arm64 libevent-pthreads-2.1-7t64 arm64 2.1.12-stable-10build1 [8272 B] 388s Get:4 http://ftpmaster.internal/ubuntu resolute/universe arm64 libldns3t64 arm64 1.8.4-2build1 [164 kB] 388s Get:5 http://ftpmaster.internal/ubuntu resolute/main arm64 libevent-2.1-7t64 arm64 2.1.12-stable-10build1 [152 kB] 388s Get:6 http://ftpmaster.internal/ubuntu resolute/main arm64 libunbound8 arm64 1.24.2-1ubuntu1 [436 kB] 388s Get:7 http://ftpmaster.internal/ubuntu resolute/universe arm64 libreswan arm64 5.2-2.2ubuntu1 [1500 kB] 388s Fetched 2870 kB in 0s (8179 kB/s) 388s Selecting previously unselected package dns-root-data. 388s (Reading database ... (Reading database ... 5% (Reading database ... 10% (Reading database ... 15% (Reading database ... 20% (Reading database ... 25% (Reading database ... 30% (Reading database ... 35% (Reading database ... 40% (Reading database ... 45% (Reading database ... 50% (Reading database ... 55% (Reading database ... 60% (Reading database ... 65% (Reading database ... 70% (Reading database ... 75% (Reading database ... 80% (Reading database ... 85% (Reading database ... 90% (Reading database ... 95% (Reading database ... 100% (Reading database ... 89360 files and directories currently installed.) 388s Preparing to unpack .../0-dns-root-data_2025080400build1_all.deb ... 388s Unpacking dns-root-data (2025080400build1) ... 388s Selecting previously unselected package libnss3-tools. 388s Preparing to unpack .../1-libnss3-tools_2%3a3.120-1_arm64.deb ... 388s Unpacking libnss3-tools (2:3.120-1) ... 388s Selecting previously unselected package libevent-pthreads-2.1-7t64:arm64. 388s Preparing to unpack .../2-libevent-pthreads-2.1-7t64_2.1.12-stable-10build1_arm64.deb ... 388s Unpacking libevent-pthreads-2.1-7t64:arm64 (2.1.12-stable-10build1) ... 388s Selecting previously unselected package libldns3t64:arm64. 389s Preparing to unpack .../3-libldns3t64_1.8.4-2build1_arm64.deb ... 389s Unpacking libldns3t64:arm64 (1.8.4-2build1) ... 389s Selecting previously unselected package libevent-2.1-7t64:arm64. 389s Preparing to unpack .../4-libevent-2.1-7t64_2.1.12-stable-10build1_arm64.deb ... 389s Unpacking libevent-2.1-7t64:arm64 (2.1.12-stable-10build1) ... 389s Selecting previously unselected package libunbound8:arm64. 389s Preparing to unpack .../5-libunbound8_1.24.2-1ubuntu1_arm64.deb ... 389s Unpacking libunbound8:arm64 (1.24.2-1ubuntu1) ... 389s Selecting previously unselected package libreswan. 389s Preparing to unpack .../6-libreswan_5.2-2.2ubuntu1_arm64.deb ... 389s Unpacking libreswan (5.2-2.2ubuntu1) ... 389s Setting up libldns3t64:arm64 (1.8.4-2build1) ... 389s Setting up libevent-pthreads-2.1-7t64:arm64 (2.1.12-stable-10build1) ... 389s Setting up libevent-2.1-7t64:arm64 (2.1.12-stable-10build1) ... 389s Setting up dns-root-data (2025080400build1) ... 389s Setting up libunbound8:arm64 (1.24.2-1ubuntu1) ... 389s Setting up libnss3-tools (2:3.120-1) ... 389s Setting up libreswan (5.2-2.2ubuntu1) ... 389s ipsec.service is a disabled or a static unit, not starting it. 389s Processing triggers for man-db (2.13.1-1) ... 390s Processing triggers for libc-bin (2.42-2ubuntu4) ... 397s autopkgtest [21:37:37]: test cavp: [----------------------- 397s Testing installed CAVP binary: /usr/libexec/ipsec/cavp 400s test: IKE v2 400s Reading from ikev2.fax 403s test: IKE v1 Digital Signature Authentication 403s Reading from ikev1_dsa.fax 405s test: IKE v1 Pre-shared Key Authentication 405s Reading from ikev1_psk.fax 407s /tmp/autopkgtest.sJmKFT/build.ao2/src 407s autopkgtest [21:37:47]: test cavp: -----------------------] 408s cavp PASS 408s autopkgtest [21:37:48]: test cavp: - - - - - - - - - - results - - - - - - - - - - 408s autopkgtest [21:37:48]: @@@@@@@@@@@@@@@@@@@@ summary 408s opportunistic SKIP exit status 77 and marked as skippable 408s cryptocheck PASS 408s cavp PASS