0s autopkgtest [03:34:26]: starting date and time: 2026-02-05 03:34:26+0000 0s autopkgtest [03:34:26]: git checkout: 4b346b80 nova: make wait_reboot return success even when a no-op 0s autopkgtest [03:34:26]: host juju-7f2275-prod-proposed-migration-environment-2; command line: /home/ubuntu/autopkgtest/runner/autopkgtest --output-dir /tmp/autopkgtest-work.t8x6t2w0/out --timeout-copy=6000 --needs-internet=try --setup-commands /home/ubuntu/autopkgtest-cloud/worker-config-production/setup-canonical.sh --apt-pocket=proposed=src:glibc,src:chiark-tcl --apt-upgrade libreswan --timeout-short=300 --timeout-copy=20000 --timeout-build=20000 '--env=ADT_TEST_TRIGGERS=glibc/2.42-2ubuntu5 chiark-tcl/1.3.7build1' -- ssh -s /home/ubuntu/autopkgtest/ssh-setup/nova -- --flavor autopkgtest-cpu2-ram4-disk20-arm64 --security-groups autopkgtest-juju-7f2275-prod-proposed-migration-environment-2@sto01-arm64-38.secgroup --name adt-resolute-arm64-libreswan-20260205-033426-juju-7f2275-prod-proposed-migration-environment-2-a2accc43-5592-4bf2-a1f2-a279ee71bf3e --image adt/ubuntu-resolute-arm64-server --keyname testbed-juju-7f2275-prod-proposed-migration-environment-2 --net-id=net_prod-autopkgtest-workers-arm64 -e TERM=linux --mirror=http://ftpmaster.internal/ubuntu/ 5s Creating nova instance adt-resolute-arm64-libreswan-20260205-033426-juju-7f2275-prod-proposed-migration-environment-2-a2accc43-5592-4bf2-a1f2-a279ee71bf3e from image adt/ubuntu-resolute-arm64-server-20260204.img (UUID f58d981d-b271-4157-b9b1-fd704695563c)... 76s autopkgtest [03:35:42]: testbed dpkg architecture: arm64 76s autopkgtest [03:35:42]: testbed apt version: 3.1.14 77s autopkgtest [03:35:43]: @@@@@@@@@@@@@@@@@@@@ test bed setup 77s autopkgtest [03:35:43]: testbed release detected to be: None 78s autopkgtest [03:35:44]: updating testbed package index (apt update) 79s Get:1 http://ftpmaster.internal/ubuntu resolute-proposed InRelease [124 kB] 79s Hit:2 http://ftpmaster.internal/ubuntu resolute InRelease 79s Hit:3 http://ftpmaster.internal/ubuntu resolute-updates InRelease 79s Hit:4 http://ftpmaster.internal/ubuntu resolute-security InRelease 79s Get:5 http://ftpmaster.internal/ubuntu resolute-proposed/restricted Sources [5260 B] 79s Get:6 http://ftpmaster.internal/ubuntu resolute-proposed/universe Sources [1719 kB] 79s Get:7 http://ftpmaster.internal/ubuntu resolute-proposed/main Sources [227 kB] 79s Get:8 http://ftpmaster.internal/ubuntu resolute-proposed/multiverse Sources [35.4 kB] 79s Get:9 http://ftpmaster.internal/ubuntu resolute-proposed/main arm64 Packages [265 kB] 79s Get:10 http://ftpmaster.internal/ubuntu resolute-proposed/main arm64 c-n-f Metadata [7328 B] 80s Get:11 http://ftpmaster.internal/ubuntu resolute-proposed/restricted arm64 Packages [52.9 kB] 80s Get:12 http://ftpmaster.internal/ubuntu resolute-proposed/restricted arm64 c-n-f Metadata [328 B] 80s Get:13 http://ftpmaster.internal/ubuntu resolute-proposed/universe arm64 Packages [1481 kB] 80s Get:14 http://ftpmaster.internal/ubuntu resolute-proposed/universe arm64 c-n-f Metadata [40.2 kB] 80s Get:15 http://ftpmaster.internal/ubuntu resolute-proposed/multiverse arm64 Packages [26.0 kB] 80s Get:16 http://ftpmaster.internal/ubuntu resolute-proposed/multiverse arm64 c-n-f Metadata [776 B] 84s Fetched 3984 kB in 2s (2259 kB/s) 84s Reading package lists... 86s Hit:1 http://ftpmaster.internal/ubuntu resolute-proposed InRelease 86s Hit:2 http://ftpmaster.internal/ubuntu resolute InRelease 86s Hit:3 http://ftpmaster.internal/ubuntu resolute-updates InRelease 86s Hit:4 http://ftpmaster.internal/ubuntu resolute-security InRelease 87s Reading package lists... 87s Reading package lists... 87s Building dependency tree... 87s Reading state information... 87s Calculating upgrade... 88s The following packages will be upgraded: 88s libc-bin libc-gconv-modules-extra libc6 locales pollinate python3-linkify-it 88s python3-referencing sed 88s 8 upgraded, 0 newly installed, 0 to remove and 0 not upgraded. 88s Need to get 8110 kB of archives. 88s After this operation, 0 B of additional disk space will be used. 88s Get:1 http://ftpmaster.internal/ubuntu resolute/main arm64 sed arm64 4.9-2build3 [193 kB] 88s Get:2 http://ftpmaster.internal/ubuntu resolute-proposed/main arm64 libc-gconv-modules-extra arm64 2.42-2ubuntu5 [1413 kB] 89s Get:3 http://ftpmaster.internal/ubuntu resolute-proposed/main arm64 libc6 arm64 2.42-2ubuntu5 [1594 kB] 89s Get:4 http://ftpmaster.internal/ubuntu resolute-proposed/main arm64 libc-bin arm64 2.42-2ubuntu5 [599 kB] 89s Get:5 http://ftpmaster.internal/ubuntu resolute-proposed/main arm64 locales all 2.42-2ubuntu5 [4255 kB] 89s Get:6 http://ftpmaster.internal/ubuntu resolute/main arm64 python3-linkify-it all 2.0.3-1ubuntu3 [19.4 kB] 89s Get:7 http://ftpmaster.internal/ubuntu resolute/main arm64 pollinate all 4.33-4ubuntu5 [14.0 kB] 89s Get:8 http://ftpmaster.internal/ubuntu resolute/main arm64 python3-referencing all 0.36.2-1ubuntu2 [22.2 kB] 89s dpkg-preconfigure: unable to re-open stdin: No such file or directory 89s Fetched 8110 kB in 1s (6761 kB/s) 90s (Reading database ... (Reading database ... 5% (Reading database ... 10% (Reading database ... 15% (Reading database ... 20% (Reading database ... 25% (Reading database ... 30% (Reading database ... 35% (Reading database ... 40% (Reading database ... 45% (Reading database ... 50% (Reading database ... 55% (Reading database ... 60% (Reading database ... 65% (Reading database ... 70% (Reading database ... 75% (Reading database ... 80% (Reading database ... 85% (Reading database ... 90% (Reading database ... 95% (Reading database ... 100% (Reading database ... 89360 files and directories currently installed.) 90s Preparing to unpack .../sed_4.9-2build3_arm64.deb ... 90s Unpacking sed (4.9-2build3) over (4.9-2build2) ... 90s Setting up sed (4.9-2build3) ... 90s (Reading database ... (Reading database ... 5% (Reading database ... 10% (Reading database ... 15% (Reading database ... 20% (Reading database ... 25% (Reading database ... 30% (Reading database ... 35% (Reading database ... 40% (Reading database ... 45% (Reading database ... 50% (Reading database ... 55% (Reading database ... 60% (Reading database ... 65% (Reading database ... 70% (Reading database ... 75% (Reading database ... 80% (Reading database ... 85% (Reading database ... 90% (Reading database ... 95% (Reading database ... 100% (Reading database ... 89360 files and directories currently installed.) 90s Preparing to unpack .../libc-gconv-modules-extra_2.42-2ubuntu5_arm64.deb ... 90s Unpacking libc-gconv-modules-extra:arm64 (2.42-2ubuntu5) over (2.42-2ubuntu4) ... 90s Setting up libc-gconv-modules-extra:arm64 (2.42-2ubuntu5) ... 90s (Reading database ... (Reading database ... 5% (Reading database ... 10% (Reading database ... 15% (Reading database ... 20% (Reading database ... 25% (Reading database ... 30% (Reading database ... 35% (Reading database ... 40% (Reading database ... 45% (Reading database ... 50% (Reading database ... 55% (Reading database ... 60% (Reading database ... 65% (Reading database ... 70% (Reading database ... 75% (Reading database ... 80% (Reading database ... 85% (Reading database ... 90% (Reading database ... 95% (Reading database ... 100% (Reading database ... 89360 files and directories currently installed.) 90s Preparing to unpack .../libc6_2.42-2ubuntu5_arm64.deb ... 90s Unpacking libc6:arm64 (2.42-2ubuntu5) over (2.42-2ubuntu4) ... 90s Setting up libc6:arm64 (2.42-2ubuntu5) ... 91s (Reading database ... (Reading database ... 5% (Reading database ... 10% (Reading database ... 15% (Reading database ... 20% (Reading database ... 25% (Reading database ... 30% (Reading database ... 35% (Reading database ... 40% (Reading database ... 45% (Reading database ... 50% (Reading database ... 55% (Reading database ... 60% (Reading database ... 65% (Reading database ... 70% (Reading database ... 75% (Reading database ... 80% (Reading database ... 85% (Reading database ... 90% (Reading database ... 95% (Reading database ... 100% (Reading database ... 89360 files and directories currently installed.) 91s Preparing to unpack .../libc-bin_2.42-2ubuntu5_arm64.deb ... 91s Unpacking libc-bin (2.42-2ubuntu5) over (2.42-2ubuntu4) ... 91s Setting up libc-bin (2.42-2ubuntu5) ... 91s (Reading database ... (Reading database ... 5% (Reading database ... 10% (Reading database ... 15% (Reading database ... 20% (Reading database ... 25% (Reading database ... 30% (Reading database ... 35% (Reading database ... 40% (Reading database ... 45% (Reading database ... 50% (Reading database ... 55% (Reading database ... 60% (Reading database ... 65% (Reading database ... 70% (Reading database ... 75% (Reading database ... 80% (Reading database ... 85% (Reading database ... 90% (Reading database ... 95% (Reading database ... 100% (Reading database ... 89360 files and directories currently installed.) 91s Preparing to unpack .../locales_2.42-2ubuntu5_all.deb ... 91s Unpacking locales (2.42-2ubuntu5) over (2.42-2ubuntu4) ... 91s Preparing to unpack .../python3-linkify-it_2.0.3-1ubuntu3_all.deb ... 91s Unpacking python3-linkify-it (2.0.3-1ubuntu3) over (2.0.3-1ubuntu2) ... 91s Preparing to unpack .../pollinate_4.33-4ubuntu5_all.deb ... 91s Unpacking pollinate (4.33-4ubuntu5) over (4.33-4ubuntu4) ... 91s Preparing to unpack .../python3-referencing_0.36.2-1ubuntu2_all.deb ... 91s Unpacking python3-referencing (0.36.2-1ubuntu2) over (0.36.2-1ubuntu1) ... 92s Setting up locales (2.42-2ubuntu5) ... 92s Generating locales (this might take a while)... 94s en_US.UTF-8... done 94s Generation complete. 94s Setting up pollinate (4.33-4ubuntu5) ... 105s Setting up python3-linkify-it (2.0.3-1ubuntu3) ... 105s Setting up python3-referencing (0.36.2-1ubuntu2) ... 105s Processing triggers for man-db (2.13.1-1) ... 106s Processing triggers for install-info (7.2-5) ... 106s Processing triggers for systemd (259-1ubuntu3) ... 107s autopkgtest [03:36:13]: upgrading testbed (apt dist-upgrade and autopurge) 107s Reading package lists... 108s Building dependency tree... 108s Reading state information... 108s Calculating upgrade... 108s 0 upgraded, 0 newly installed, 0 to remove and 0 not upgraded. 109s Reading package lists... 109s Building dependency tree... 109s Reading state information... 109s Solving dependencies... 109s 0 upgraded, 0 newly installed, 0 to remove and 0 not upgraded. 110s autopkgtest [03:36:16]: rebooting testbed after setup commands that affected boot 148s autopkgtest [03:36:54]: testbed running kernel: Linux 6.18.0-9-generic #9-Ubuntu SMP PREEMPT_DYNAMIC Mon Jan 12 16:41:39 UTC 2026 150s autopkgtest [03:36:56]: @@@@@@@@@@@@@@@@@@@@ apt-source libreswan 154s Get:1 http://ftpmaster.internal/ubuntu resolute/universe libreswan 5.2-2.2ubuntu1 (dsc) [2735 B] 154s Get:2 http://ftpmaster.internal/ubuntu resolute/universe libreswan 5.2-2.2ubuntu1 (tar) [4132 kB] 154s Get:3 http://ftpmaster.internal/ubuntu resolute/universe libreswan 5.2-2.2ubuntu1 (asc) [862 B] 154s Get:4 http://ftpmaster.internal/ubuntu resolute/universe libreswan 5.2-2.2ubuntu1 (diff) [16.7 kB] 154s gpgv: Signature made Thu Jul 31 14:30:12 2025 UTC 154s gpgv: using RSA key 25E3FF2D7F469DBE7D0D4E50AFCFEC8E669CE1C2 154s gpgv: Can't check signature: No public key 154s dpkg-source: warning: cannot verify inline signature for ./libreswan_5.2-2.2ubuntu1.dsc: no acceptable signature found 155s autopkgtest [03:37:01]: testing package libreswan version 5.2-2.2ubuntu1 157s autopkgtest [03:37:03]: build not needed 168s autopkgtest [03:37:14]: test opportunistic: preparing testbed 168s Reading package lists... 168s Building dependency tree... 168s Reading state information... 168s Solving dependencies... 169s The following NEW packages will be installed: 169s dns-root-data libevent-2.1-7t64 libevent-pthreads-2.1-7t64 libldns3t64 169s libnss3-tools libreswan libunbound8 169s 0 upgraded, 7 newly installed, 0 to remove and 0 not upgraded. 169s Need to get 2870 kB of archives. 169s After this operation, 13.6 MB of additional disk space will be used. 169s Get:1 http://ftpmaster.internal/ubuntu resolute/main arm64 dns-root-data all 2025080400build1 [6022 B] 169s Get:2 http://ftpmaster.internal/ubuntu resolute/main arm64 libnss3-tools arm64 2:3.120-1 [604 kB] 169s Get:3 http://ftpmaster.internal/ubuntu resolute/main arm64 libevent-pthreads-2.1-7t64 arm64 2.1.12-stable-10build1 [8272 B] 169s Get:4 http://ftpmaster.internal/ubuntu resolute/universe arm64 libldns3t64 arm64 1.8.4-2build1 [164 kB] 169s Get:5 http://ftpmaster.internal/ubuntu resolute/main arm64 libevent-2.1-7t64 arm64 2.1.12-stable-10build1 [152 kB] 169s Get:6 http://ftpmaster.internal/ubuntu resolute/main arm64 libunbound8 arm64 1.24.2-1ubuntu1 [436 kB] 169s Get:7 http://ftpmaster.internal/ubuntu resolute/universe arm64 libreswan arm64 5.2-2.2ubuntu1 [1500 kB] 170s Fetched 2870 kB in 1s (4588 kB/s) 170s Selecting previously unselected package dns-root-data. 170s (Reading database ... (Reading database ... 5% (Reading database ... 10% (Reading database ... 15% (Reading database ... 20% (Reading database ... 25% (Reading database ... 30% (Reading database ... 35% (Reading database ... 40% (Reading database ... 45% (Reading database ... 50% (Reading database ... 55% (Reading database ... 60% (Reading database ... 65% (Reading database ... 70% (Reading database ... 75% (Reading database ... 80% (Reading database ... 85% (Reading database ... 90% (Reading database ... 95% (Reading database ... 100% (Reading database ... 89360 files and directories currently installed.) 170s Preparing to unpack .../0-dns-root-data_2025080400build1_all.deb ... 170s Unpacking dns-root-data (2025080400build1) ... 170s Selecting previously unselected package libnss3-tools. 170s Preparing to unpack .../1-libnss3-tools_2%3a3.120-1_arm64.deb ... 170s Unpacking libnss3-tools (2:3.120-1) ... 170s Selecting previously unselected package libevent-pthreads-2.1-7t64:arm64. 170s Preparing to unpack .../2-libevent-pthreads-2.1-7t64_2.1.12-stable-10build1_arm64.deb ... 170s Unpacking libevent-pthreads-2.1-7t64:arm64 (2.1.12-stable-10build1) ... 170s Selecting previously unselected package libldns3t64:arm64. 170s Preparing to unpack .../3-libldns3t64_1.8.4-2build1_arm64.deb ... 170s Unpacking libldns3t64:arm64 (1.8.4-2build1) ... 170s Selecting previously unselected package libevent-2.1-7t64:arm64. 170s Preparing to unpack .../4-libevent-2.1-7t64_2.1.12-stable-10build1_arm64.deb ... 170s Unpacking libevent-2.1-7t64:arm64 (2.1.12-stable-10build1) ... 170s Selecting previously unselected package libunbound8:arm64. 170s Preparing to unpack .../5-libunbound8_1.24.2-1ubuntu1_arm64.deb ... 170s Unpacking libunbound8:arm64 (1.24.2-1ubuntu1) ... 170s Selecting previously unselected package libreswan. 170s Preparing to unpack .../6-libreswan_5.2-2.2ubuntu1_arm64.deb ... 170s Unpacking libreswan (5.2-2.2ubuntu1) ... 170s Setting up libldns3t64:arm64 (1.8.4-2build1) ... 170s Setting up libevent-pthreads-2.1-7t64:arm64 (2.1.12-stable-10build1) ... 170s Setting up libevent-2.1-7t64:arm64 (2.1.12-stable-10build1) ... 170s Setting up dns-root-data (2025080400build1) ... 170s Setting up libunbound8:arm64 (1.24.2-1ubuntu1) ... 170s Setting up libnss3-tools (2:3.120-1) ... 170s Setting up libreswan (5.2-2.2ubuntu1) ... 171s ipsec.service is a disabled or a static unit, not starting it. 171s Processing triggers for man-db (2.13.1-1) ... 172s Processing triggers for libc-bin (2.42-2ubuntu5) ... 173s autopkgtest [03:37:19]: test opportunistic: [----------------------- 173s ping: oe.libreswan.org: No address associated with hostname 173s autopkgtest [03:37:19]: test opportunistic: -----------------------] 174s autopkgtest [03:37:20]: test opportunistic: - - - - - - - - - - results - - - - - - - - - - 174s opportunistic SKIP exit status 77 and marked as skippable 174s autopkgtest [03:37:20]: test cryptocheck: preparing testbed 197s Creating nova instance adt-resolute-arm64-libreswan-20260205-033426-juju-7f2275-prod-proposed-migration-environment-2-a2accc43-5592-4bf2-a1f2-a279ee71bf3e from image adt/ubuntu-resolute-arm64-server-20260204.img (UUID f58d981d-b271-4157-b9b1-fd704695563c)... 261s autopkgtest [03:38:47]: testbed dpkg architecture: arm64 262s autopkgtest [03:38:48]: testbed apt version: 3.1.14 262s autopkgtest [03:38:48]: @@@@@@@@@@@@@@@@@@@@ test bed setup 262s autopkgtest [03:38:48]: testbed release detected to be: resolute 266s autopkgtest [03:38:52]: updating testbed package index (apt update) 267s Get:1 http://ftpmaster.internal/ubuntu resolute-proposed InRelease [124 kB] 267s Hit:2 http://ftpmaster.internal/ubuntu resolute InRelease 267s Hit:3 http://ftpmaster.internal/ubuntu resolute-updates InRelease 267s Hit:4 http://ftpmaster.internal/ubuntu resolute-security InRelease 267s Get:5 http://ftpmaster.internal/ubuntu resolute-proposed/main Sources [227 kB] 267s Get:6 http://ftpmaster.internal/ubuntu resolute-proposed/restricted Sources [5260 B] 267s Get:7 http://ftpmaster.internal/ubuntu resolute-proposed/multiverse Sources [35.4 kB] 267s Get:8 http://ftpmaster.internal/ubuntu resolute-proposed/universe Sources [1719 kB] 267s Get:9 http://ftpmaster.internal/ubuntu resolute-proposed/main arm64 Packages [265 kB] 267s Get:10 http://ftpmaster.internal/ubuntu resolute-proposed/main arm64 c-n-f Metadata [7328 B] 267s Get:11 http://ftpmaster.internal/ubuntu resolute-proposed/restricted arm64 Packages [52.9 kB] 267s Get:12 http://ftpmaster.internal/ubuntu resolute-proposed/restricted arm64 c-n-f Metadata [328 B] 267s Get:13 http://ftpmaster.internal/ubuntu resolute-proposed/universe arm64 Packages [1481 kB] 267s Get:14 http://ftpmaster.internal/ubuntu resolute-proposed/universe arm64 c-n-f Metadata [40.2 kB] 267s Get:15 http://ftpmaster.internal/ubuntu resolute-proposed/multiverse arm64 Packages [26.0 kB] 267s Get:16 http://ftpmaster.internal/ubuntu resolute-proposed/multiverse arm64 c-n-f Metadata [776 B] 271s Fetched 3984 kB in 1s (3064 kB/s) 272s Reading package lists... 278s Hit:1 http://ftpmaster.internal/ubuntu resolute-proposed InRelease 278s Hit:2 http://ftpmaster.internal/ubuntu resolute InRelease 278s Hit:3 http://ftpmaster.internal/ubuntu resolute-updates InRelease 278s Hit:4 http://ftpmaster.internal/ubuntu resolute-security InRelease 279s Reading package lists... 279s Reading package lists... 279s Building dependency tree... 279s Reading state information... 280s Calculating upgrade... 280s The following packages will be upgraded: 280s libc-bin libc-gconv-modules-extra libc6 locales pollinate python3-linkify-it 280s python3-referencing sed 280s 8 upgraded, 0 newly installed, 0 to remove and 0 not upgraded. 280s Need to get 8110 kB of archives. 280s After this operation, 0 B of additional disk space will be used. 280s Get:1 http://ftpmaster.internal/ubuntu resolute/main arm64 sed arm64 4.9-2build3 [193 kB] 280s Get:2 http://ftpmaster.internal/ubuntu resolute-proposed/main arm64 libc-gconv-modules-extra arm64 2.42-2ubuntu5 [1413 kB] 280s Get:3 http://ftpmaster.internal/ubuntu resolute-proposed/main arm64 libc6 arm64 2.42-2ubuntu5 [1594 kB] 280s Get:4 http://ftpmaster.internal/ubuntu resolute-proposed/main arm64 libc-bin arm64 2.42-2ubuntu5 [599 kB] 280s Get:5 http://ftpmaster.internal/ubuntu resolute-proposed/main arm64 locales all 2.42-2ubuntu5 [4255 kB] 280s Get:6 http://ftpmaster.internal/ubuntu resolute/main arm64 python3-linkify-it all 2.0.3-1ubuntu3 [19.4 kB] 280s Get:7 http://ftpmaster.internal/ubuntu resolute/main arm64 pollinate all 4.33-4ubuntu5 [14.0 kB] 280s Get:8 http://ftpmaster.internal/ubuntu resolute/main arm64 python3-referencing all 0.36.2-1ubuntu2 [22.2 kB] 281s dpkg-preconfigure: unable to re-open stdin: No such file or directory 281s Fetched 8110 kB in 0s (20.6 MB/s) 281s (Reading database ... (Reading database ... 5% (Reading database ... 10% (Reading database ... 15% (Reading database ... 20% (Reading database ... 25% (Reading database ... 30% (Reading database ... 35% (Reading database ... 40% (Reading database ... 45% (Reading database ... 50% (Reading database ... 55% (Reading database ... 60% (Reading database ... 65% (Reading database ... 70% (Reading database ... 75% (Reading database ... 80% (Reading database ... 85% (Reading database ... 90% (Reading database ... 95% (Reading database ... 100% (Reading database ... 89360 files and directories currently installed.) 281s Preparing to unpack .../sed_4.9-2build3_arm64.deb ... 281s Unpacking sed (4.9-2build3) over (4.9-2build2) ... 281s Setting up sed (4.9-2build3) ... 281s (Reading database ... (Reading database ... 5% (Reading database ... 10% (Reading database ... 15% (Reading database ... 20% (Reading database ... 25% (Reading database ... 30% (Reading database ... 35% (Reading database ... 40% (Reading database ... 45% (Reading database ... 50% (Reading database ... 55% (Reading database ... 60% (Reading database ... 65% (Reading database ... 70% (Reading database ... 75% (Reading database ... 80% (Reading database ... 85% (Reading database ... 90% (Reading database ... 95% (Reading database ... 100% (Reading database ... 89360 files and directories currently installed.) 281s Preparing to unpack .../libc-gconv-modules-extra_2.42-2ubuntu5_arm64.deb ... 281s Unpacking libc-gconv-modules-extra:arm64 (2.42-2ubuntu5) over (2.42-2ubuntu4) ... 281s Setting up libc-gconv-modules-extra:arm64 (2.42-2ubuntu5) ... 281s (Reading database ... (Reading database ... 5% (Reading database ... 10% (Reading database ... 15% (Reading database ... 20% (Reading database ... 25% (Reading database ... 30% (Reading database ... 35% (Reading database ... 40% (Reading database ... 45% (Reading database ... 50% (Reading database ... 55% (Reading database ... 60% (Reading database ... 65% (Reading database ... 70% (Reading database ... 75% (Reading database ... 80% (Reading database ... 85% (Reading database ... 90% (Reading database ... 95% (Reading database ... 100% (Reading database ... 89360 files and directories currently installed.) 281s Preparing to unpack .../libc6_2.42-2ubuntu5_arm64.deb ... 282s Unpacking libc6:arm64 (2.42-2ubuntu5) over (2.42-2ubuntu4) ... 282s Setting up libc6:arm64 (2.42-2ubuntu5) ... 282s (Reading database ... (Reading database ... 5% (Reading database ... 10% (Reading database ... 15% (Reading database ... 20% (Reading database ... 25% (Reading database ... 30% (Reading database ... 35% (Reading database ... 40% (Reading database ... 45% (Reading database ... 50% (Reading database ... 55% (Reading database ... 60% (Reading database ... 65% (Reading database ... 70% (Reading database ... 75% (Reading database ... 80% (Reading database ... 85% (Reading database ... 90% (Reading database ... 95% (Reading database ... 100% (Reading database ... 89360 files and directories currently installed.) 282s Preparing to unpack .../libc-bin_2.42-2ubuntu5_arm64.deb ... 282s Unpacking libc-bin (2.42-2ubuntu5) over (2.42-2ubuntu4) ... 282s Setting up libc-bin (2.42-2ubuntu5) ... 282s (Reading database ... (Reading database ... 5% (Reading database ... 10% (Reading database ... 15% (Reading database ... 20% (Reading database ... 25% (Reading database ... 30% (Reading database ... 35% (Reading database ... 40% (Reading database ... 45% (Reading database ... 50% (Reading database ... 55% (Reading database ... 60% (Reading database ... 65% (Reading database ... 70% (Reading database ... 75% (Reading database ... 80% (Reading database ... 85% (Reading database ... 90% (Reading database ... 95% (Reading database ... 100% (Reading database ... 89360 files and directories currently installed.) 282s Preparing to unpack .../locales_2.42-2ubuntu5_all.deb ... 282s Unpacking locales (2.42-2ubuntu5) over (2.42-2ubuntu4) ... 283s Preparing to unpack .../python3-linkify-it_2.0.3-1ubuntu3_all.deb ... 283s Unpacking python3-linkify-it (2.0.3-1ubuntu3) over (2.0.3-1ubuntu2) ... 283s Preparing to unpack .../pollinate_4.33-4ubuntu5_all.deb ... 283s Unpacking pollinate (4.33-4ubuntu5) over (4.33-4ubuntu4) ... 283s Preparing to unpack .../python3-referencing_0.36.2-1ubuntu2_all.deb ... 283s Unpacking python3-referencing (0.36.2-1ubuntu2) over (0.36.2-1ubuntu1) ... 283s Setting up locales (2.42-2ubuntu5) ... 284s Generating locales (this might take a while)... 285s en_US.UTF-8... done 285s Generation complete. 285s Setting up pollinate (4.33-4ubuntu5) ... 296s Setting up python3-linkify-it (2.0.3-1ubuntu3) ... 296s Setting up python3-referencing (0.36.2-1ubuntu2) ... 296s Processing triggers for man-db (2.13.1-1) ... 297s Processing triggers for install-info (7.2-5) ... 298s Processing triggers for systemd (259-1ubuntu3) ... 299s autopkgtest [03:39:25]: upgrading testbed (apt dist-upgrade and autopurge) 299s Reading package lists... 299s Building dependency tree... 299s Reading state information... 299s Calculating upgrade... 300s 0 upgraded, 0 newly installed, 0 to remove and 0 not upgraded. 300s Reading package lists... 300s Building dependency tree... 300s Reading state information... 300s Solving dependencies... 301s 0 upgraded, 0 newly installed, 0 to remove and 0 not upgraded. 301s autopkgtest [03:39:27]: rebooting testbed after setup commands that affected boot 640s Reading package lists... 640s Building dependency tree... 640s Reading state information... 640s Solving dependencies... 641s The following NEW packages will be installed: 641s dns-root-data libevent-2.1-7t64 libevent-pthreads-2.1-7t64 libldns3t64 641s libnss3-tools libreswan libunbound8 641s 0 upgraded, 7 newly installed, 0 to remove and 0 not upgraded. 641s Need to get 2870 kB of archives. 641s After this operation, 13.6 MB of additional disk space will be used. 641s Get:1 http://ftpmaster.internal/ubuntu resolute/main arm64 dns-root-data all 2025080400build1 [6022 B] 641s Get:2 http://ftpmaster.internal/ubuntu resolute/main arm64 libnss3-tools arm64 2:3.120-1 [604 kB] 641s Get:3 http://ftpmaster.internal/ubuntu resolute/main arm64 libevent-pthreads-2.1-7t64 arm64 2.1.12-stable-10build1 [8272 B] 641s Get:4 http://ftpmaster.internal/ubuntu resolute/universe arm64 libldns3t64 arm64 1.8.4-2build1 [164 kB] 641s Get:5 http://ftpmaster.internal/ubuntu resolute/main arm64 libevent-2.1-7t64 arm64 2.1.12-stable-10build1 [152 kB] 641s Get:6 http://ftpmaster.internal/ubuntu resolute/main arm64 libunbound8 arm64 1.24.2-1ubuntu1 [436 kB] 641s Get:7 http://ftpmaster.internal/ubuntu resolute/universe arm64 libreswan arm64 5.2-2.2ubuntu1 [1500 kB] 642s Fetched 2870 kB in 1s (3711 kB/s) 642s Selecting previously unselected package dns-root-data. 642s (Reading database ... (Reading database ... 5% (Reading database ... 10% (Reading database ... 15% (Reading database ... 20% (Reading database ... 25% (Reading database ... 30% (Reading database ... 35% (Reading database ... 40% (Reading database ... 45% (Reading database ... 50% (Reading database ... 55% (Reading database ... 60% (Reading database ... 65% (Reading database ... 70% (Reading database ... 75% (Reading database ... 80% (Reading database ... 85% (Reading database ... 90% (Reading database ... 95% (Reading database ... 100% (Reading database ... 89360 files and directories currently installed.) 642s Preparing to unpack .../0-dns-root-data_2025080400build1_all.deb ... 642s Unpacking dns-root-data (2025080400build1) ... 642s Selecting previously unselected package libnss3-tools. 642s Preparing to unpack .../1-libnss3-tools_2%3a3.120-1_arm64.deb ... 642s Unpacking libnss3-tools (2:3.120-1) ... 642s Selecting previously unselected package libevent-pthreads-2.1-7t64:arm64. 642s Preparing to unpack .../2-libevent-pthreads-2.1-7t64_2.1.12-stable-10build1_arm64.deb ... 642s Unpacking libevent-pthreads-2.1-7t64:arm64 (2.1.12-stable-10build1) ... 642s Selecting previously unselected package libldns3t64:arm64. 642s Preparing to unpack .../3-libldns3t64_1.8.4-2build1_arm64.deb ... 642s Unpacking libldns3t64:arm64 (1.8.4-2build1) ... 642s Selecting previously unselected package libevent-2.1-7t64:arm64. 642s Preparing to unpack .../4-libevent-2.1-7t64_2.1.12-stable-10build1_arm64.deb ... 642s Unpacking libevent-2.1-7t64:arm64 (2.1.12-stable-10build1) ... 642s Selecting previously unselected package libunbound8:arm64. 642s Preparing to unpack .../5-libunbound8_1.24.2-1ubuntu1_arm64.deb ... 642s Unpacking libunbound8:arm64 (1.24.2-1ubuntu1) ... 642s Selecting previously unselected package libreswan. 642s Preparing to unpack .../6-libreswan_5.2-2.2ubuntu1_arm64.deb ... 642s Unpacking libreswan (5.2-2.2ubuntu1) ... 642s Setting up libldns3t64:arm64 (1.8.4-2build1) ... 642s Setting up libevent-pthreads-2.1-7t64:arm64 (2.1.12-stable-10build1) ... 642s Setting up libevent-2.1-7t64:arm64 (2.1.12-stable-10build1) ... 642s Setting up dns-root-data (2025080400build1) ... 642s Setting up libunbound8:arm64 (1.24.2-1ubuntu1) ... 642s Setting up libnss3-tools (2:3.120-1) ... 642s Setting up libreswan (5.2-2.2ubuntu1) ... 643s ipsec.service is a disabled or a static unit, not starting it. 643s Processing triggers for man-db (2.13.1-1) ... 644s Processing triggers for libc-bin (2.42-2ubuntu5) ... 720s autopkgtest [03:46:26]: test cryptocheck: [----------------------- 720s Testing installed binary: /usr/libexec/ipsec/algparse 720s Testing installed binary: /usr/libexec/ipsec/pluto 720s testing -tp 720s ipsec algparse: Encryption algorithms: 720s ipsec algparse: AES_CCM_16 {256,192,*128} IKEv1: ESP IKEv2: ESP FIPS aes_ccm, aes_ccm_c 720s ipsec algparse: AES_CCM_12 {256,192,*128} IKEv1: ESP IKEv2: ESP FIPS aes_ccm_b 720s ipsec algparse: AES_CCM_8 {256,192,*128} IKEv1: ESP IKEv2: ESP FIPS aes_ccm_a 720s ipsec algparse: 3DES_CBC [*192] IKEv1: IKE ESP IKEv2: IKE ESP FIPS NSS(CBC) 3des 720s ipsec algparse: CAMELLIA_CTR {256,192,*128} IKEv1: ESP IKEv2: ESP 720s ipsec algparse: CAMELLIA_CBC {256,192,*128} IKEv1: IKE ESP IKEv2: IKE ESP NSS(CBC) camellia 720s ipsec algparse: AES_GCM_16 {256,192,*128} IKEv1: ESP IKEv2: IKE ESP FIPS NSS(AEAD) aes_gcm, aes_gcm_c 720s ipsec algparse: AES_GCM_12 {256,192,*128} IKEv1: ESP IKEv2: IKE ESP FIPS NSS(AEAD) aes_gcm_b 720s ipsec algparse: AES_GCM_8 {256,192,*128} IKEv1: ESP IKEv2: IKE ESP FIPS NSS(AEAD) aes_gcm_a 720s ipsec algparse: AES_CTR {256,192,*128} IKEv1: IKE ESP IKEv2: IKE ESP FIPS NSS(CTR) aesctr 720s ipsec algparse: AES_CBC {256,192,*128} IKEv1: IKE ESP IKEv2: IKE ESP FIPS NSS(CBC) aes 720s ipsec algparse: NULL_AUTH_AES_GMAC {256,192,*128} IKEv1: ESP IKEv2: ESP FIPS aes_gmac 720s ipsec algparse: NULL [] IKEv1: ESP IKEv2: ESP NULL 720s ipsec algparse: CHACHA20_POLY1305 [*256] IKEv1: IKEv2: IKE ESP NSS(AEAD) chacha20poly1305 720s ipsec algparse: Hash algorithms: 720s ipsec algparse: MD5 IKEv1: IKE IKEv2: NSS 720s ipsec algparse: SHA1 IKEv1: IKE IKEv2: IKE FIPS NSS sha 720s ipsec algparse: SHA2_256 IKEv1: IKE IKEv2: IKE FIPS NSS sha2, sha256 720s ipsec algparse: SHA2_384 IKEv1: IKE IKEv2: IKE FIPS NSS sha384 720s ipsec algparse: SHA2_512 IKEv1: IKE IKEv2: IKE FIPS NSS sha512 720s ipsec algparse: IDENTITY IKEv1: IKEv2: FIPS 720s ipsec algparse: PRF algorithms: 720s ipsec algparse: HMAC_MD5 IKEv1: IKE IKEv2: IKE NSS md5 720s ipsec algparse: HMAC_SHA1 IKEv1: IKE IKEv2: IKE FIPS NSS sha, sha1 720s ipsec algparse: HMAC_SHA2_256 IKEv1: IKE IKEv2: IKE FIPS NSS sha2, sha256, sha2_256 720s ipsec algparse: HMAC_SHA2_384 IKEv1: IKE IKEv2: IKE FIPS NSS sha384, sha2_384 720s ipsec algparse: HMAC_SHA2_512 IKEv1: IKE IKEv2: IKE FIPS NSS sha512, sha2_512 720s ipsec algparse: AES_XCBC IKEv1: IKEv2: IKE native(XCBC) aes128_xcbc 720s ipsec algparse: Integrity algorithms: 720s ipsec algparse: HMAC_MD5_96 IKEv1: IKE ESP AH IKEv2: IKE ESP AH NSS md5, hmac_md5 720s ipsec algparse: HMAC_SHA1_96 IKEv1: IKE ESP AH IKEv2: IKE ESP AH FIPS NSS sha, sha1, sha1_96, hmac_sha1 720s ipsec algparse: HMAC_SHA2_512_256 IKEv1: IKE ESP AH IKEv2: IKE ESP AH FIPS NSS sha512, sha2_512, sha2_512_256, hmac_sha2_512 720s ipsec algparse: HMAC_SHA2_384_192 IKEv1: IKE ESP AH IKEv2: IKE ESP AH FIPS NSS sha384, sha2_384, sha2_384_192, hmac_sha2_384 720s ipsec algparse: HMAC_SHA2_256_128 IKEv1: IKE ESP AH IKEv2: IKE ESP AH FIPS NSS sha2, sha256, sha2_256, sha2_256_128, hmac_sha2_256 720s ipsec algparse: HMAC_SHA2_256_TRUNCBUG IKEv1: ESP AH IKEv2: AH 720s ipsec algparse: AES_XCBC_96 IKEv1: ESP AH IKEv2: IKE ESP AH native(XCBC) aes_xcbc, aes128_xcbc, aes128_xcbc_96 720s ipsec algparse: AES_CMAC_96 IKEv1: ESP AH IKEv2: ESP AH FIPS aes_cmac 720s ipsec algparse: NONE IKEv1: ESP IKEv2: IKE ESP FIPS null 720s ipsec algparse: DH algorithms: 720s ipsec algparse: NONE IKEv1: IKEv2: IKE ESP AH FIPS NSS(MODP) null, dh0 720s ipsec algparse: MODP1536 IKEv1: IKE ESP AH IKEv2: IKE ESP AH NSS(MODP) dh5 720s ipsec algparse: MODP2048 IKEv1: IKE ESP AH IKEv2: IKE ESP AH FIPS NSS(MODP) dh14 720s ipsec algparse: MODP3072 IKEv1: IKE ESP AH IKEv2: IKE ESP AH FIPS NSS(MODP) dh15 720s ipsec algparse: MODP4096 IKEv1: IKE ESP AH IKEv2: IKE ESP AH FIPS NSS(MODP) dh16 720s ipsec algparse: MODP6144 IKEv1: IKE ESP AH IKEv2: IKE ESP AH FIPS NSS(MODP) dh17 720s ipsec algparse: MODP8192 IKEv1: IKE ESP AH IKEv2: IKE ESP AH FIPS NSS(MODP) dh18 720s ipsec algparse: DH19 IKEv1: IKE IKEv2: IKE ESP AH FIPS NSS(ECP) ecp_256, ecp256 720s ipsec algparse: DH20 IKEv1: IKE IKEv2: IKE ESP AH FIPS NSS(ECP) ecp_384, ecp384 720s ipsec algparse: DH21 IKEv1: IKE IKEv2: IKE ESP AH FIPS NSS(ECP) ecp_521, ecp521 720s ipsec algparse: DH31 IKEv1: IKE IKEv2: IKE ESP AH NSS(ECP) curve25519 720s ipsec algparse: IPCOMP algorithms: 720s ipsec algparse: DEFLATE IKEv1: ESP AH IKEv2: ESP AH FIPS 720s ipsec algparse: LZS IKEv1: IKEv2: ESP AH FIPS 720s ipsec algparse: LZJH IKEv1: IKEv2: ESP AH FIPS 721s algparse -v2 'esp' (expect SUCCESS) 721s AES_GCM_16_256-NONE 721s AES_GCM_16_128-NONE 721s CHACHA20_POLY1305-NONE 721s AES_CBC_256-HMAC_SHA2_512_256+HMAC_SHA2_256_128 721s AES_CBC_128-HMAC_SHA2_512_256+HMAC_SHA2_256_128 721s algparse -v2 'esp=' (expect ERROR) 721s ERROR: ESP proposal is empty 721s algparse -v2 'esp=aes' (expect SUCCESS) 721s AES_CBC-HMAC_SHA2_512_256+HMAC_SHA2_256_128 721s algparse -v2 'esp=aes;modp2048' (expect SUCCESS) 721s AES_CBC-HMAC_SHA2_512_256+HMAC_SHA2_256_128 721s algparse -v2 'esp=aes-sha1' (expect SUCCESS) 721s AES_CBC-HMAC_SHA1_96 721s algparse -v2 'esp=aes-sha1' (expect SUCCESS) 721s AES_CBC-HMAC_SHA1_96 721s algparse -v2 'esp=aes-sha1-modp2048' (expect SUCCESS) 721s AES_CBC-HMAC_SHA1_96 721s algparse -v2 'esp=aes-128-sha1' (expect SUCCESS) 721s AES_CBC_128-HMAC_SHA1_96 721s algparse -v2 'esp=aes-128-sha1' (expect SUCCESS) 721s AES_CBC_128-HMAC_SHA1_96 721s algparse -v2 'esp=aes-128-sha1-modp2048' (expect SUCCESS) 721s AES_CBC_128-HMAC_SHA1_96 721s algparse -v2 'esp=aes-128' (expect SUCCESS) 721s AES_CBC_128-HMAC_SHA2_512_256+HMAC_SHA2_256_128 721s algparse -v2 'esp=aes_gcm_a-128-null' (expect SUCCESS) 721s AES_GCM_8_128-NONE 721s algparse -v2 'esp=3des-sha1;modp1024' (expect ERROR) 721s ERROR: ESP DH algorithm 'modp1024' is not supported 721s algparse -v2 'esp=3des-sha1;modp1536' (expect SUCCESS) 721s 3DES_CBC-HMAC_SHA1_96 721s algparse -v2 'esp=3des-sha1;modp2048' (expect SUCCESS) 721s 3DES_CBC-HMAC_SHA1_96 721s algparse -v2 'esp=3des-sha1;dh21' (expect SUCCESS) 721s 3DES_CBC-HMAC_SHA1_96 721s algparse -v2 'esp=3des-sha1;ecp_521' (expect SUCCESS) 721s 3DES_CBC-HMAC_SHA1_96 721s algparse -v2 'esp=3des-sha1;dh23' (expect ERROR) 721s ERROR: ESP DH algorithm 'dh23' is not supported 721s algparse -v2 'esp=3des-sha1;dh24' (expect ERROR) 721s ERROR: ESP DH algorithm 'dh24' is not supported 721s algparse -v2 'esp=3des-sha1' (expect SUCCESS) 721s 3DES_CBC-HMAC_SHA1_96 721s algparse -v2 'esp=null-sha1' (expect SUCCESS) 721s NULL-HMAC_SHA1_96 721s algparse -v2 'esp=aes_cbc' (expect SUCCESS) 721s AES_CBC-HMAC_SHA2_512_256+HMAC_SHA2_256_128 721s algparse -v2 'esp=aes-sha' (expect SUCCESS) 721s AES_CBC-HMAC_SHA1_96 721s algparse -v2 'esp=aes-sha1' (expect SUCCESS) 721s AES_CBC-HMAC_SHA1_96 721s algparse -v2 'esp=aes128-sha1' (expect SUCCESS) 721s AES_CBC_128-HMAC_SHA1_96 721s algparse -v2 'esp=aes-sha2' (expect SUCCESS) 721s AES_CBC-HMAC_SHA2_256_128 721s algparse -v2 'esp=aes-sha256' (expect SUCCESS) 721s AES_CBC-HMAC_SHA2_256_128 721s algparse -v2 'esp=aes-sha384' (expect SUCCESS) 721s AES_CBC-HMAC_SHA2_384_192 721s algparse -v2 'esp=aes-sha512' (expect SUCCESS) 721s AES_CBC-HMAC_SHA2_512_256 721s algparse -v2 'esp=aes128-aes_xcbc' (expect SUCCESS) 721s AES_CBC_128-AES_XCBC_96 721s algparse -v2 'esp=aes192-sha1' (expect SUCCESS) 721s AES_CBC_192-HMAC_SHA1_96 721s algparse -v2 'esp=aes256-sha1' (expect SUCCESS) 721s AES_CBC_256-HMAC_SHA1_96 721s algparse -v2 'esp=aes256-sha' (expect SUCCESS) 721s AES_CBC_256-HMAC_SHA1_96 721s algparse -v2 'esp=aes256-sha2' (expect SUCCESS) 721s AES_CBC_256-HMAC_SHA2_256_128 721s algparse -v2 'esp=aes256-sha2_256' (expect SUCCESS) 721s AES_CBC_256-HMAC_SHA2_256_128 721s algparse -v2 'esp=aes256-sha2_384' (expect SUCCESS) 721s AES_CBC_256-HMAC_SHA2_384_192 721s algparse -v2 'esp=aes256-sha2_512' (expect SUCCESS) 721s AES_CBC_256-HMAC_SHA2_512_256 721s algparse -v2 'esp=camellia' (expect SUCCESS) 721s CAMELLIA_CBC-HMAC_SHA2_512_256+HMAC_SHA2_256_128 721s algparse -v2 'esp=camellia128' (expect SUCCESS) 721s CAMELLIA_CBC_128-HMAC_SHA2_512_256+HMAC_SHA2_256_128 721s algparse -v2 'esp=camellia192' (expect SUCCESS) 721s CAMELLIA_CBC_192-HMAC_SHA2_512_256+HMAC_SHA2_256_128 721s algparse -v2 'esp=camellia256' (expect SUCCESS) 721s CAMELLIA_CBC_256-HMAC_SHA2_512_256+HMAC_SHA2_256_128 721s algparse -v2 'esp=aes_ccm' (expect SUCCESS) 721s AES_CCM_16-NONE 721s algparse -v2 'esp=aes_ccm_a-128-null' (expect SUCCESS) 721s AES_CCM_8_128-NONE 721s algparse -v2 'esp=aes_ccm_a-192-null' (expect SUCCESS) 721s AES_CCM_8_192-NONE 721s algparse -v2 'esp=aes_ccm_a-256-null' (expect SUCCESS) 721s AES_CCM_8_256-NONE 721s algparse -v2 'esp=aes_ccm_b-128-null' (expect SUCCESS) 721s AES_CCM_12_128-NONE 721s algparse -v2 'esp=aes_ccm_b-192-null' (expect SUCCESS) 721s AES_CCM_12_192-NONE 721s algparse -v2 'esp=aes_ccm_b-256-null' (expect SUCCESS) 721s AES_CCM_12_256-NONE 721s algparse -v2 'esp=aes_ccm_c-128-null' (expect SUCCESS) 721s AES_CCM_16_128-NONE 721s algparse -v2 'esp=aes_ccm_c-192-null' (expect SUCCESS) 721s AES_CCM_16_192-NONE 721s algparse -v2 'esp=aes_ccm_c-256-null' (expect SUCCESS) 721s AES_CCM_16_256-NONE 721s algparse -v2 'esp=aes_gcm' (expect SUCCESS) 721s AES_GCM_16-NONE 721s algparse -v2 'esp=aes_gcm_a-128-null' (expect SUCCESS) 721s AES_GCM_8_128-NONE 721s algparse -v2 'esp=aes_gcm_a-192-null' (expect SUCCESS) 721s AES_GCM_8_192-NONE 721s algparse -v2 'esp=aes_gcm_a-256-null' (expect SUCCESS) 721s AES_GCM_8_256-NONE 721s algparse -v2 'esp=aes_gcm_b-128-null' (expect SUCCESS) 721s AES_GCM_12_128-NONE 721s algparse -v2 'esp=aes_gcm_b-192-null' (expect SUCCESS) 721s AES_GCM_12_192-NONE 721s algparse -v2 'esp=aes_gcm_b-256-null' (expect SUCCESS) 721s AES_GCM_12_256-NONE 721s algparse -v2 'esp=aes_gcm_c-128-null' (expect SUCCESS) 721s AES_GCM_16_128-NONE 721s algparse -v2 'esp=aes_gcm_c-192-null' (expect SUCCESS) 721s AES_GCM_16_192-NONE 721s algparse -v2 'esp=aes_gcm_c-256-null' (expect SUCCESS) 721s AES_GCM_16_256-NONE 721s algparse -v2 'esp=aes_ccm_a-null' (expect SUCCESS) 721s AES_CCM_8-NONE 721s algparse -v2 'esp=aes_ccm_b-null' (expect SUCCESS) 721s AES_CCM_12-NONE 721s algparse -v2 'esp=aes_ccm_c-null' (expect SUCCESS) 721s AES_CCM_16-NONE 721s algparse -v2 'esp=aes_gcm_a-null' (expect SUCCESS) 721s AES_GCM_8-NONE 721s algparse -v2 'esp=aes_gcm_b-null' (expect SUCCESS) 721s AES_GCM_12-NONE 721s algparse -v2 'esp=aes_gcm_c-null' (expect SUCCESS) 721s AES_GCM_16-NONE 721s algparse -v2 'esp=aes_ccm-null' (expect SUCCESS) 721s AES_CCM_16-NONE 721s algparse -v2 'esp=aes_gcm-null' (expect SUCCESS) 721s | parsing 'AES_GCM_16_256,AES_GCM_16_128,CHACHA20_POLY1305,AES_CBC_256,AES_CBC_128' for ESP 721s | proposal: 'AES_GCM_16_256' 721s | token: '' '' "AES_GCM_16_256" '' 721s | token: '' "AES_GCM_16_256" '' '' 721s | ike_alg_byname() failed: ESP encryption algorithm 'AES_GCM_16_256' is not recognized 721s | token: '' '' '' 721s | appending ESP encryption algorithm AES_GCM_16[_256] 721s | appending ESP integrity algorithm NONE[_0] 721s | proposal: 'AES_GCM_16_128' 721s | token: '' '' "AES_GCM_16_128" '' 721s | token: '' "AES_GCM_16_128" '' '' 721s | ike_alg_byname() failed: ESP encryption algorithm 'AES_GCM_16_128' is not recognized 721s | token: '' '' '' 721s | appending ESP encryption algorithm AES_GCM_16[_128] 721s | appending ESP integrity algorithm NONE[_0] 721s | proposal: 'CHACHA20_POLY1305' 721s | token: '' '' "CHACHA20_POLY1305" '' 721s | token: '' "CHACHA20_POLY1305" '' '' 721s | token: '' '' '' 721s | appending ESP encryption algorithm CHACHA20_POLY1305[_0] 721s | appending ESP integrity algorithm NONE[_0] 721s | proposal: 'AES_CBC_256' 721s | token: '' '' "AES_CBC_256" '' 721s | token: '' "AES_CBC_256" '' '' 721s | ike_alg_byname() failed: ESP encryption algorithm 'AES_CBC_256' is not recognized 721s | token: '' '' '' 721s | appending ESP encryption algorithm AES_CBC[_256] 721s | appending ESP integrity algorithm HMAC_SHA2_512_256[_0] 721s | appending ESP integrity algorithm HMAC_SHA2_256_128[_0] 721s | proposal: 'AES_CBC_128' 721s | token: '' '' "AES_CBC_128" '' 721s | token: '' "AES_CBC_128" '' '' 721s | ike_alg_byname() failed: ESP encryption algorithm 'AES_CBC_128' is not recognized 721s | token: '' '' '' 721s | appending ESP encryption algorithm AES_CBC[_128] 721s | appending ESP integrity algorithm HMAC_SHA2_512_256[_0] 721s | appending ESP integrity algorithm HMAC_SHA2_256_128[_0] 721s | parsing '' for ESP 721s | parsing 'aes' for ESP 721s | proposal: 'aes' 721s | token: '' '' "aes" '' 721s | token: '' "aes" '' '' 721s | token: '' '' '' 721s | appending ESP encryption algorithm AES_CBC[_0] 721s | appending ESP integrity algorithm HMAC_SHA2_512_256[_0] 721s | appending ESP integrity algorithm HMAC_SHA2_256_128[_0] 721s | parsing 'aes;modp2048' for ESP 721s | proposal: 'aes;modp2048' 721s | token: '' '' "aes" ';' 721s | token: '' "aes" ';' "modp2048" '' 721s | token: ';' "modp2048" '' '' 721s | appending ESP encryption algorithm AES_CBC[_0] 721s | parsing dh: 721s | appending ESP DH algorithm MODP2048[_0] 721s | token: '' '' '' 721s | appending ESP integrity algorithm HMAC_SHA2_512_256[_0] 721s | appending ESP integrity algorithm HMAC_SHA2_256_128[_0] 721s ipsec algparse: ignoring ESP DH algorithm MODP2048 as PFS policy is disabled 721s | parsing 'aes-sha1' for ESP 721s | proposal: 'aes-sha1' 721s | token: '' '' "aes" '-' 721s | token: '' "aes" '-' "sha1" '' 721s | token: '-' "sha1" '' '' 721s | appending ESP encryption algorithm AES_CBC[_0] 721s | parsing integ: 721s | appending ESP integrity algorithm HMAC_SHA1_96[_0] 721s | token: '' '' '' 721s | parsing 'aes-sha1' for ESP 721s | proposal: 'aes-sha1' 721s | token: '' '' "aes" '-' 721s | token: '' "aes" '-' "sha1" '' 721s | token: '-' "sha1" '' '' 721s | appending ESP encryption algorithm AES_CBC[_0] 721s | parsing integ: 721s | appending ESP integrity algorithm HMAC_SHA1_96[_0] 721s | token: '' '' '' 721s | parsing 'aes-sha1-modp2048' for ESP 721s | proposal: 'aes-sha1-modp2048' 721s | token: '' '' "aes" '-' 721s | token: '' "aes" '-' "sha1" '-' 721s | token: '-' "sha1" '-' "modp2048" '' 721s | appending ESP encryption algorithm AES_CBC[_0] 721s | parsing integ: 721s | appending ESP integrity algorithm HMAC_SHA1_96[_0] 721s | token: '-' "modp2048" '' '' 721s | parsing dh: 721s | appending ESP DH algorithm MODP2048[_0] 721s | token: '' '' '' 721s ipsec algparse: ignoring ESP DH algorithm MODP2048 as PFS policy is disabled 721s | parsing 'aes-128-sha1' for ESP 721s | proposal: 'aes-128-sha1' 721s | token: '' '' "aes" '-' 721s | token: '' "aes" '-' "128" '-' 721s | token: '-' "128" '-' "sha1" '' 721s | token: '-' "sha1" '' '' 721s | appending ESP encryption algorithm AES_CBC[_128] 721s | parsing integ: 721s | appending ESP integrity algorithm HMAC_SHA1_96[_0] 721s | token: '' '' '' 721s | parsing 'aes-128-sha1' for ESP 721s | proposal: 'aes-128-sha1' 721s | token: '' '' "aes" '-' 721s | token: '' "aes" '-' "128" '-' 721s | token: '-' "128" '-' "sha1" '' 721s | token: '-' "sha1" '' '' 721s | appending ESP encryption algorithm AES_CBC[_128] 721s | parsing integ: 721s | appending ESP integrity algorithm HMAC_SHA1_96[_0] 721s | token: '' '' '' 721s | parsing 'aes-128-sha1-modp2048' for ESP 721s | proposal: 'aes-128-sha1-modp2048' 721s | token: '' '' "aes" '-' 721s | token: '' "aes" '-' "128" '-' 721s | token: '-' "128" '-' "sha1" '-' 721s | token: '-' "sha1" '-' "modp2048" '' 721s | appending ESP encryption algorithm AES_CBC[_128] 721s | parsing integ: 721s | appending ESP integrity algorithm HMAC_SHA1_96[_0] 721s | token: '-' "modp2048" '' '' 721s | parsing dh: 721s | appending ESP DH algorithm MODP2048[_0] 721s | token: '' '' '' 721s ipsec algparse: ignoring ESP DH algorithm MODP2048 as PFS policy is disabled 721s | parsing 'aes-128' for ESP 721s | proposal: 'aes-128' 721s | token: '' '' "aes" '-' 721s | token: '' "aes" '-' "128" '' 721s | token: '-' "128" '' '' 721s | token: '' '' '' 721s | appending ESP encryption algorithm AES_CBC[_128] 721s | appending ESP integrity algorithm HMAC_SHA2_512_256[_0] 721s | appending ESP integrity algorithm HMAC_SHA2_256_128[_0] 721s | parsing 'aes_gcm_a-128-null' for ESP 721s | proposal: 'aes_gcm_a-128-null' 721s | token: '' '' "aes_gcm_a" '-' 721s | token: '' "aes_gcm_a" '-' "128" '-' 721s | token: '-' "128" '-' "null" '' 721s | token: '-' "null" '' '' 721s | appending ESP encryption algorithm AES_GCM_8[_128] 721s | parsing integ: 721s | appending ESP integrity algorithm NONE[_0] 721s | token: '' '' '' 721s | parsing '3des-sha1;modp1024' for ESP 721s | proposal: '3des-sha1;modp1024' 721s | token: '' '' "3des" '-' 721s | token: '' "3des" '-' "sha1" ';' 721s | token: '-' "sha1" ';' "modp1024" '' 721s | appending ESP encryption algorithm 3DES_CBC[_0] 721s | parsing integ: 721s | appending ESP integrity algorithm HMAC_SHA1_96[_0] 721s | token: ';' "modp1024" '' '' 721s | parsing dh: 721s | ike_alg_byname() failed: ESP DH algorithm 'modp1024' is not supported 721s | lookup for DH algorithm 'modp1024' failed 721s | ... failed 'ESP DH algorithm 'modp1024' is not supported' 721s | parsing '3des-sha1;modp1536' for ESP 721s | proposal: '3des-sha1;modp1536' 721s | token: '' '' "3des" '-' 721s | token: '' "3des" '-' "sha1" ';' 721s | token: '-' "sha1" ';' "modp1536" '' 721s | appending ESP encryption algorithm 3DES_CBC[_0] 721s | parsing integ: 721s | appending ESP integrity algorithm HMAC_SHA1_96[_0] 721s | token: ';' "modp1536" '' '' 721s | parsing dh: 721s | appending ESP DH algorithm MODP1536[_0] 721s | token: '' '' '' 721s ipsec algparse: ignoring ESP DH algorithm MODP1536 as PFS policy is disabled 721s | parsing '3des-sha1;modp2048' for ESP 721s | proposal: '3des-sha1;modp2048' 721s | token: '' '' "3des" '-' 721s | token: '' "3des" '-' "sha1" ';' 721s | token: '-' "sha1" ';' "modp2048" '' 721s | appending ESP encryption algorithm 3DES_CBC[_0] 721s | parsing integ: 721s | appending ESP integrity algorithm HMAC_SHA1_96[_0] 721s | token: ';' "modp2048" '' '' 721s | parsing dh: 721s | appending ESP DH algorithm MODP2048[_0] 721s | token: '' '' '' 721s ipsec algparse: ignoring ESP DH algorithm MODP2048 as PFS policy is disabled 721s | parsing '3des-sha1;dh21' for ESP 721s | proposal: '3des-sha1;dh21' 721s | token: '' '' "3des" '-' 721s | token: '' "3des" '-' "sha1" ';' 721s | token: '-' "sha1" ';' "dh21" '' 721s | appending ESP encryption algorithm 3DES_CBC[_0] 721s | parsing integ: 721s | appending ESP integrity algorithm HMAC_SHA1_96[_0] 721s | token: ';' "dh21" '' '' 721s | parsing dh: 721s | appending ESP DH algorithm DH21[_0] 721s | token: '' '' '' 721s ipsec algparse: ignoring ESP DH algorithm DH21 as PFS policy is disabled 721s | parsing '3des-sha1;ecp_521' for ESP 721s | proposal: '3des-sha1;ecp_521' 721s | token: '' '' "3des" '-' 721s | token: '' "3des" '-' "sha1" ';' 721s | token: '-' "sha1" ';' "ecp_521" '' 721s | appending ESP encryption algorithm 3DES_CBC[_0] 721s | parsing integ: 721s | appending ESP integrity algorithm HMAC_SHA1_96[_0] 721s | token: ';' "ecp_521" '' '' 721s | parsing dh: 721s | appending ESP DH algorithm DH21[_0] 721s | token: '' '' '' 721s ipsec algparse: ignoring ESP DH algorithm DH21 as PFS policy is disabled 721s | parsing '3des-sha1;dh23' for ESP 721s | proposal: '3des-sha1;dh23' 721s | token: '' '' "3des" '-' 721s | token: '' "3des" '-' "sha1" ';' 721s | token: '-' "sha1" ';' "dh23" '' 721s | appending ESP encryption algorithm 3DES_CBC[_0] 721s | parsing integ: 721s | appending ESP integrity algorithm HMAC_SHA1_96[_0] 721s | token: ';' "dh23" '' '' 721s | parsing dh: 721s | ike_alg_byname() failed: ESP DH algorithm 'dh23' is not supported 721s | lookup for DH algorithm 'dh23' failed 721s | ... failed 'ESP DH algorithm 'dh23' is not supported' 721s | parsing '3des-sha1;dh24' for ESP 721s | proposal: '3des-sha1;dh24' 721s | token: '' '' "3des" '-' 721s | token: '' "3des" '-' "sha1" ';' 721s | token: '-' "sha1" ';' "dh24" '' 721s | appending ESP encryption algorithm 3DES_CBC[_0] 721s | parsing integ: 721s | appending ESP integrity algorithm HMAC_SHA1_96[_0] 721s | token: ';' "dh24" '' '' 721s | parsing dh: 721s | ike_alg_byname() failed: ESP DH algorithm 'dh24' is not supported 721s | lookup for DH algorithm 'dh24' failed 721s | ... failed 'ESP DH algorithm 'dh24' is not supported' 721s | parsing '3des-sha1' for ESP 721s | proposal: '3des-sha1' 721s | token: '' '' "3des" '-' 721s | token: '' "3des" '-' "sha1" '' 721s | token: '-' "sha1" '' '' 721s | appending ESP encryption algorithm 3DES_CBC[_0] 721s | parsing integ: 721s | appending ESP integrity algorithm HMAC_SHA1_96[_0] 721s | token: '' '' '' 721s | parsing 'null-sha1' for ESP 721s | proposal: 'null-sha1' 721s | token: '' '' "null" '-' 721s | token: '' "null" '-' "sha1" '' 721s | token: '-' "sha1" '' '' 721s | appending ESP encryption algorithm NULL[_0] 721s | parsing integ: 721s | appending ESP integrity algorithm HMAC_SHA1_96[_0] 721s | token: '' '' '' 721s | parsing 'aes_cbc' for ESP 721s | proposal: 'aes_cbc' 721s | token: '' '' "aes_cbc" '' 721s | token: '' "aes_cbc" '' '' 721s | token: '' '' '' 721s | appending ESP encryption algorithm AES_CBC[_0] 721s | appending ESP integrity algorithm HMAC_SHA2_512_256[_0] 721s | appending ESP integrity algorithm HMAC_SHA2_256_128[_0] 721s | parsing 'aes-sha' for ESP 721s | proposal: 'aes-sha' 721s | token: '' '' "aes" '-' 721s | token: '' "aes" '-' "sha" '' 721s | token: '-' "sha" '' '' 721s | appending ESP encryption algorithm AES_CBC[_0] 721s | parsing integ: 721s | appending ESP integrity algorithm HMAC_SHA1_96[_0] 721s | token: '' '' '' 721s | parsing 'aes-sha1' for ESP 721s | proposal: 'aes-sha1' 721s | token: '' '' "aes" '-' 721s | token: '' "aes" '-' "sha1" '' 721s | token: '-' "sha1" '' '' 721s | appending ESP encryption algorithm AES_CBC[_0] 721s | parsing integ: 721s | appending ESP integrity algorithm HMAC_SHA1_96[_0] 721s | token: '' '' '' 721s | parsing 'aes128-sha1' for ESP 721s | proposal: 'aes128-sha1' 721s | token: '' '' "aes128" '-' 721s | token: '' "aes128" '-' "sha1" '' 721s | ike_alg_byname() failed: ESP encryption algorithm 'aes128' is not recognized 721s | token: '-' "sha1" '' '' 721s | appending ESP encryption algorithm AES_CBC[_128] 721s | parsing integ: 721s | appending ESP integrity algorithm HMAC_SHA1_96[_0] 721s | token: '' '' '' 721s | parsing 'aes-sha2' for ESP 721s | proposal: 'aes-sha2' 721s | token: '' '' "aes" '-' 721s | token: '' "aes" '-' "sha2" '' 721s | token: '-' "sha2" '' '' 721s | appending ESP encryption algorithm AES_CBC[_0] 721s | parsing integ: 721s | appending ESP integrity algorithm HMAC_SHA2_256_128[_0] 721s | token: '' '' '' 721s | parsing 'aes-sha256' for ESP 721s | proposal: 'aes-sha256' 721s | token: '' '' "aes" '-' 721s | token: '' "aes" '-' "sha256" '' 721s | token: '-' "sha256" '' '' 721s | appending ESP encryption algorithm AES_CBC[_0] 721s | parsing integ: 721s | appending ESP integrity algorithm HMAC_SHA2_256_128[_0] 721s | token: '' '' '' 721s | parsing 'aes-sha384' for ESP 721s | proposal: 'aes-sha384' 721s | token: '' '' "aes" '-' 721s | token: '' "aes" '-' "sha384" '' 721s | token: '-' "sha384" '' '' 721s | appending ESP encryption algorithm AES_CBC[_0] 721s | parsing integ: 721s | appending ESP integrity algorithm HMAC_SHA2_384_192[_0] 721s | token: '' '' '' 721s | parsing 'aes-sha512' for ESP 721s | proposal: 'aes-sha512' 721s | token: '' '' "aes" '-' 721s | token: '' "aes" '-' "sha512" '' 721s | token: '-' "sha512" '' '' 721s | appending ESP encryption algorithm AES_CBC[_0] 721s | parsing integ: 721s | appending ESP integrity algorithm HMAC_SHA2_512_256[_0] 721s | token: '' '' '' 721s | parsing 'aes128-aes_xcbc' for ESP 721s | proposal: 'aes128-aes_xcbc' 721s | token: '' '' "aes128" '-' 721s | token: '' "aes128" '-' "aes_xcbc" '' 721s | ike_alg_byname() failed: ESP encryption algorithm 'aes128' is not recognized 721s | token: '-' "aes_xcbc" '' '' 721s | appending ESP encryption algorithm AES_CBC[_128] 721s | parsing integ: 721s | appending ESP integrity algorithm AES_XCBC_96[_0] 721s | token: '' '' '' 721s | parsing 'aes192-sha1' for ESP 721s | proposal: 'aes192-sha1' 721s | token: '' '' "aes192" '-' 721s | token: '' "aes192" '-' "sha1" '' 721s | ike_alg_byname() failed: ESP encryption algorithm 'aes192' is not recognized 721s | token: '-' "sha1" '' '' 721s | appending ESP encryption algorithm AES_CBC[_192] 721s | parsing integ: 721s | appending ESP integrity algorithm HMAC_SHA1_96[_0] 721s | token: '' '' '' 721s | parsing 'aes256-sha1' for ESP 721s | proposal: 'aes256-sha1' 721s | token: '' '' "aes256" '-' 721s | token: '' "aes256" '-' "sha1" '' 721s | ike_alg_byname() failed: ESP encryption algorithm 'aes256' is not recognized 721s | token: '-' "sha1" '' '' 721s | appending ESP encryption algorithm AES_CBC[_256] 721s | parsing integ: 721s | appending ESP integrity algorithm HMAC_SHA1_96[_0] 721s | token: '' '' '' 721s | parsing 'aes256-sha' for ESP 721s | proposal: 'aes256-sha' 721s | token: '' '' "aes256" '-' 721s | token: '' "aes256" '-' "sha" '' 721s | ike_alg_byname() failed: ESP encryption algorithm 'aes256' is not recognized 721s | token: '-' "sha" '' '' 721s | appending ESP encryption algorithm AES_CBC[_256] 721s | parsing integ: 721s | appending ESP integrity algorithm HMAC_SHA1_96[_0] 721s | token: '' '' '' 721s | parsing 'aes256-sha2' for ESP 721s | proposal: 'aes256-sha2' 721s | token: '' '' "aes256" '-' 721s | token: '' "aes256" '-' "sha2" '' 721s | ike_alg_byname() failed: ESP encryption algorithm 'aes256' is not recognized 721s | token: '-' "sha2" '' '' 721s | appending ESP encryption algorithm AES_CBC[_256] 721s | parsing integ: 721s | appending ESP integrity algorithm HMAC_SHA2_256_128[_0] 721s | token: '' '' '' 721s | parsing 'aes256-sha2_256' for ESP 721s | proposal: 'aes256-sha2_256' 721s | token: '' '' "aes256" '-' 721s | token: '' "aes256" '-' "sha2_256" '' 721s | ike_alg_byname() failed: ESP encryption algorithm 'aes256' is not recognized 721s | token: '-' "sha2_256" '' '' 721s | appending ESP encryption algorithm AES_CBC[_256] 721s | parsing integ: 721s | appending ESP integrity algorithm HMAC_SHA2_256_128[_0] 721s | token: '' '' '' 721s | parsing 'aes256-sha2_384' for ESP 721s | proposal: 'aes256-sha2_384' 721s | token: '' '' "aes256" '-' 721s | token: '' "aes256" '-' "sha2_384" '' 721s | ike_alg_byname() failed: ESP encryption algorithm 'aes256' is not recognized 721s | token: '-' "sha2_384" '' '' 721s | appending ESP encryption algorithm AES_CBC[_256] 721s | parsing integ: 721s | appending ESP integrity algorithm HMAC_SHA2_384_192[_0] 721s | token: '' '' '' 721s | parsing 'aes256-sha2_512' for ESP 721s | proposal: 'aes256-sha2_512' 721s | token: '' '' "aes256" '-' 721s | token: '' "aes256" '-' "sha2_512" '' 721s | ike_alg_byname() failed: ESP encryption algorithm 'aes256' is not recognized 721s | token: '-' "sha2_512" '' '' 721s | appending ESP encryption algorithm AES_CBC[_256] 721s | parsing integ: 721s | appending ESP integrity algorithm HMAC_SHA2_512_256[_0] 721s | token: '' '' '' 721s | parsing 'camellia' for ESP 721s | proposal: 'camellia' 721s | token: '' '' "camellia" '' 721s | token: '' "camellia" '' '' 721s | token: '' '' '' 721s | appending ESP encryption algorithm CAMELLIA_CBC[_0] 721s | appending ESP integrity algorithm HMAC_SHA2_512_256[_0] 721s | appending ESP integrity algorithm HMAC_SHA2_256_128[_0] 721s | parsing 'camellia128' for ESP 721s | proposal: 'camellia128' 721s | token: '' '' "camellia128" '' 721s | token: '' "camellia128" '' '' 721s | ike_alg_byname() failed: ESP encryption algorithm 'camellia128' is not recognized 721s | token: '' '' '' 721s | appending ESP encryption algorithm CAMELLIA_CBC[_128] 721s | appending ESP integrity algorithm HMAC_SHA2_512_256[_0] 721s | appending ESP integrity algorithm HMAC_SHA2_256_128[_0] 721s | parsing 'camellia192' for ESP 721s | proposal: 'camellia192' 721s | token: '' '' "camellia192" '' 721s | token: '' "camellia192" '' '' 721s | ike_alg_byname() failed: ESP encryption algorithm 'camellia192' is not recognized 721s | token: '' '' '' 721s | appending ESP encryption algorithm CAMELLIA_CBC[_192] 721s | appending ESP integrity algorithm HMAC_SHA2_512_256[_0] 721s | appending ESP integrity algorithm HMAC_SHA2_256_128[_0] 721s | parsing 'camellia256' for ESP 721s | proposal: 'camellia256' 721s | token: '' '' "camellia256" '' 721s | token: '' "camellia256" '' '' 721s | ike_alg_byname() failed: ESP encryption algorithm 'camellia256' is not recognized 721s | token: '' '' '' 721s | appending ESP encryption algorithm CAMELLIA_CBC[_256] 721s | appending ESP integrity algorithm HMAC_SHA2_512_256[_0] 721s | appending ESP integrity algorithm HMAC_SHA2_256_128[_0] 721s | parsing 'aes_ccm' for ESP 721s | proposal: 'aes_ccm' 721s | token: '' '' "aes_ccm" '' 721s | token: '' "aes_ccm" '' '' 721s | token: '' '' '' 721s | appending ESP encryption algorithm AES_CCM_16[_0] 721s | appending ESP integrity algorithm NONE[_0] 721s | parsing 'aes_ccm_a-128-null' for ESP 721s | proposal: 'aes_ccm_a-128-null' 721s | token: '' '' "aes_ccm_a" '-' 721s | token: '' "aes_ccm_a" '-' "128" '-' 721s | token: '-' "128" '-' "null" '' 721s | token: '-' "null" '' '' 721s | appending ESP encryption algorithm AES_CCM_8[_128] 721s | parsing integ: 721s | appending ESP integrity algorithm NONE[_0] 721s | token: '' '' '' 721s | parsing 'aes_ccm_a-192-null' for ESP 721s | proposal: 'aes_ccm_a-192-null' 721s | token: '' '' "aes_ccm_a" '-' 721s | token: '' "aes_ccm_a" '-' "192" '-' 721s | token: '-' "192" '-' "null" '' 721s | token: '-' "null" '' '' 721s | appending ESP encryption algorithm AES_CCM_8[_192] 721s | parsing integ: 721s | appending ESP integrity algorithm NONE[_0] 721s | token: '' '' '' 721s | parsing 'aes_ccm_a-256-null' for ESP 721s | proposal: 'aes_ccm_a-256-null' 721s | token: '' '' "aes_ccm_a" '-' 721s | token: '' "aes_ccm_a" '-' "256" '-' 721s | token: '-' "256" '-' "null" '' 721s | token: '-' "null" '' '' 721s | appending ESP encryption algorithm AES_CCM_8[_256] 721s | parsing integ: 721s | appending ESP integrity algorithm NONE[_0] 721s | token: '' '' '' 721s | parsing 'aes_ccm_b-128-null' for ESP 721s | proposal: 'aes_ccm_b-128-null' 721s | token: '' '' "aes_ccm_b" '-' 721s | token: '' "aes_ccm_b" '-' "128" '-' 721s | token: '-' "128" '-' "null" '' 721s | token: '-' "null" '' '' 721s | appending ESP encryption algorithm AES_CCM_12[_128] 721s | parsing integ: 721s | appending ESP integrity algorithm NONE[_0] 721s | token: '' '' '' 721s | parsing 'aes_ccm_b-192-null' for ESP 721s | proposal: 'aes_ccm_b-192-null' 721s | token: '' '' "aes_ccm_b" '-' 721s | token: '' "aes_ccm_b" '-' "192" '-' 721s | token: '-' "192" '-' "null" '' 721s | token: '-' "null" '' '' 721s | appending ESP encryption algorithm AES_CCM_12[_192] 721s | parsing integ: 721s | appending ESP integrity algorithm NONE[_0] 721s | token: '' '' '' 721s | parsing 'aes_ccm_b-256-null' for ESP 721s | proposal: 'aes_ccm_b-256-null' 721s | token: '' '' "aes_ccm_b" '-' 721s | token: '' "aes_ccm_b" '-' "256" '-' 721s | token: '-' "256" '-' "null" '' 721s | token: '-' "null" '' '' 721s | appending ESP encryption algorithm AES_CCM_12[_256] 721s | parsing integ: 721s | appending ESP integrity algorithm NONE[_0] 721s | token: '' '' '' 721s | parsing 'aes_ccm_c-128-null' for ESP 721s | proposal: 'aes_ccm_c-128-null' 721s | token: '' '' "aes_ccm_c" '-' 721s | token: '' "aes_ccm_c" '-' "128" '-' 721s | token: '-' "128" '-' "null" '' 721s | token: '-' "null" '' '' 721s | appending ESP encryption algorithm AES_CCM_16[_128] 721s | parsing integ: 721s | appending ESP integrity algorithm NONE[_0] 721s | token: '' '' '' 721s | parsing 'aes_ccm_c-192-null' for ESP 721s | proposal: 'aes_ccm_c-192-null' 721s | token: '' '' "aes_ccm_c" '-' 721s | token: '' "aes_ccm_c" '-' "192" '-' 721s | token: '-' "192" '-' "null" '' 721s | token: '-' "null" '' '' 721s | appending ESP encryption algorithm AES_CCM_16[_192] 721s | parsing integ: 721s | appending ESP integrity algorithm NONE[_0] 721s | token: '' '' '' 721s | parsing 'aes_ccm_c-256-null' for ESP 721s | proposal: 'aes_ccm_c-256-null' 721s | token: '' '' "aes_ccm_c" '-' 721s | token: '' "aes_ccm_c" '-' "256" '-' 721s | token: '-' "256" '-' "null" '' 721s | token: '-' "null" '' '' 721s | appending ESP encryption algorithm AES_CCM_16[_256] 721s | parsing integ: 721s | appending ESP integrity algorithm NONE[_0] 721s | token: '' '' '' 721s | parsing 'aes_gcm' for ESP 721s | proposal: 'aes_gcm' 721s | token: '' '' "aes_gcm" '' 721s | token: '' "aes_gcm" '' '' 721s | token: '' '' '' 721s | appending ESP encryption algorithm AES_GCM_16[_0] 721s | appending ESP integrity algorithm NONE[_0] 721s | parsing 'aes_gcm_a-128-null' for ESP 721s | proposal: 'aes_gcm_a-128-null' 721s | token: '' '' "aes_gcm_a" '-' 721s | token: '' "aes_gcm_a" '-' "128" '-' 721s | token: '-' "128" '-' "null" '' 721s | token: '-' "null" '' '' 721s | appending ESP encryption algorithm AES_GCM_8[_128] 721s | parsing integ: 721s | appending ESP integrity algorithm NONE[_0] 721s | token: '' '' '' 721s | parsing 'aes_gcm_a-192-null' for ESP 721s | proposal: 'aes_gcm_a-192-null' 721s | token: '' '' "aes_gcm_a" '-' 721s | token: '' "aes_gcm_a" '-' "192" '-' 721s | token: '-' "192" '-' "null" '' 721s | token: '-' "null" '' '' 721s | appending ESP encryption algorithm AES_GCM_8[_192] 721s | parsing integ: 721s | appending ESP integrity algorithm NONE[_0] 721s | token: '' '' '' 721s | parsing 'aes_gcm_a-256-null' for ESP 721s | proposal: 'aes_gcm_a-256-null' 721s | token: '' '' "aes_gcm_a" '-' 721s | token: '' "aes_gcm_a" '-' "256" '-' 721s | token: '-' "256" '-' "null" '' 721s | token: '-' "null" '' '' 721s | appending ESP encryption algorithm AES_GCM_8[_256] 721s | parsing integ: 721s | appending ESP integrity algorithm NONE[_0] 721s | token: '' '' '' 721s | parsing 'aes_gcm_b-128-null' for ESP 721s | proposal: 'aes_gcm_b-128-null' 721s | token: '' '' "aes_gcm_b" '-' 721s | token: '' "aes_gcm_b" '-' "128" '-' 721s | token: '-' "128" '-' "null" '' 721s | token: '-' "null" '' '' 721s | appending ESP encryption algorithm AES_GCM_12[_128] 721s | parsing integ: 721s | appending ESP integrity algorithm NONE[_0] 721s | token: '' '' '' 721s | parsing 'aes_gcm_b-192-null' for ESP 721s | proposal: 'aes_gcm_b-192-null' 721s | token: '' '' "aes_gcm_b" '-' 721s | token: '' "aes_gcm_b" '-' "192" '-' 721s | token: '-' "192" '-' "null" '' 721s | token: '-' "null" '' '' 721s | appending ESP encryption algorithm AES_GCM_12[_192] 721s | parsing integ: 721s | appending ESP integrity algorithm NONE[_0] 721s | token: '' '' '' 721s | parsing 'aes_gcm_b-256-null' for ESP 721s | proposal: 'aes_gcm_b-256-null' 721s | token: '' '' "aes_gcm_b" '-' 721s | token: '' "aes_gcm_b" '-' "256" '-' 721s | token: '-' "256" '-' "null" '' 721s | token: '-' "null" '' '' 721s | appending ESP encryption algorithm AES_GCM_12[_256] 721s | parsing integ: 721s | appending ESP integrity algorithm NONE[_0] 721s | token: '' '' '' 721s | parsing 'aes_gcm_c-128-null' for ESP 721s | proposal: 'aes_gcm_c-128-null' 721s | token: '' '' "aes_gcm_c" '-' 721s | token: '' "aes_gcm_c" '-' "128" '-' 721s | token: '-' "128" '-' "null" '' 721s | token: '-' "null" '' '' 721s | appending ESP encryption algorithm AES_GCM_16[_128] 721s | parsing integ: 721s | appending ESP integrity algorithm NONE[_0] 721s | token: '' '' '' 721s | parsing 'aes_gcm_c-192-null' for ESP 721s | proposal: 'aes_gcm_c-192-null' 721s | token: '' '' "aes_gcm_c" '-' 721s | token: '' "aes_gcm_c" '-' "192" '-' 721s | token: '-' "192" '-' "null" '' 721s | token: '-' "null" '' '' 721s | appending ESP encryption algorithm AES_GCM_16[_192] 721s | parsing integ: 721s | appending ESP integrity algorithm NONE[_0] 721s | token: '' '' '' 721s | parsing 'aes_gcm_c-256-null' for ESP 721s | proposal: 'aes_gcm_c-256-null' 721s | token: '' '' "aes_gcm_c" '-' 721s | token: '' "aes_gcm_c" '-' "256" '-' 721s | token: '-' "256" '-' "null" '' 721s | token: '-' "null" '' '' 721s | appending ESP encryption algorithm AES_GCM_16[_256] 721s | parsing integ: 721s | appending ESP integrity algorithm NONE[_0] 721s | token: '' '' '' 721s | parsing 'aes_ccm_a-null' for ESP 721s | proposal: 'aes_ccm_a-null' 721s | token: '' '' "aes_ccm_a" '-' 721s | token: '' "aes_ccm_a" '-' "null" '' 721s | token: '-' "null" '' '' 721s | appending ESP encryption algorithm AES_CCM_8[_0] 721s | parsing integ: 721s | appending ESP integrity algorithm NONE[_0] 721s | token: '' '' '' 721s | parsing 'aes_ccm_b-null' for ESP 721s | proposal: 'aes_ccm_b-null' 721s | token: '' '' "aes_ccm_b" '-' 721s | token: '' "aes_ccm_b" '-' "null" '' 721s | token: '-' "null" '' '' 721s | appending ESP encryption algorithm AES_CCM_12[_0] 721s | parsing integ: 721s | appending ESP integrity algorithm NONE[_0] 721s | token: '' '' '' 721s | parsing 'aes_ccm_c-null' for ESP 721s | proposal: 'aes_ccm_c-null' 721s | token: '' '' "aes_ccm_c" '-' 721s | token: '' "aes_ccm_c" '-' "null" '' 721s | token: '-' "null" '' '' 721s | appending ESP encryption algorithm AES_CCM_16[_0] 721s | parsing integ: 721s | appending ESP integrity algorithm NONE[_0] 721s | token: '' '' '' 721s | parsing 'aes_gcm_a-null' for ESP 721s | proposal: 'aes_gcm_a-null' 721s | token: '' '' "aes_gcm_a" '-' 721s | token: '' "aes_gcm_a" '-' "null" '' 721s | token: '-' "null" '' '' 721s | appending ESP encryption algorithm AES_GCM_8[_0] 721s | parsing integ: 721s | appending ESP integrity algorithm NONE[_0] 721s | token: '' '' '' 721s | parsing 'aes_gcm_b-null' for ESP 721s | proposal: 'aes_gcm_b-null' 721s | token: '' '' "aes_gcm_b" '-' 721s | token: '' "aes_gcm_b" '-' "null" '' 721s | token: '-' "null" '' '' 721s | appending ESP encryption algorithm AES_GCM_12[_0] 721s | parsing integ: 721s | appending ESP integrity algorithm NONE[_0] 721s | token: '' '' '' 721s | parsing 'aes_gcm_c-null' for ESP 721s | proposal: 'aes_gcm_c-null' 721s | token: '' '' "aes_gcm_c" '-' 721s | token: '' "aes_gcm_c" '-' "null" '' 721s | token: '-' "null" '' '' 721s | appending ESP encryption algorithm AES_GCM_16[_0] 721s | parsing integ: 721s | appending ESP integrity algorithm NONE[_0] 721s | token: '' '' '' 721s AES_GCM_16-NONE 721s algparse -v2 'esp=aes_ccm-256-null' (expect SUCCESS) 721s AES_CCM_16_256-NONE 721s algparse -v2 'esp=aes_gcm-192-null' (expect SUCCESS) 721s AES_GCM_16_192-NONE 721s algparse -v2 'esp=aes_ccm_256-null' (expect SUCCESS) 721s AES_CCM_16_256-NONE 721s algparse -v2 'esp=aes_gcm_192-null' (expect SUCCESS) 721s AES_GCM_16_192-NONE 721s algparse -v2 'esp=aes_ccm_8-null' (expect SUCCESS) 721s AES_CCM_8-NONE 721s algparse -v2 'esp=aes_ccm_12-null' (expect SUCCESS) 721s AES_CCM_12-NONE 721s algparse -v2 'esp=aes_ccm_16-null' (expect SUCCESS) 721s AES_CCM_16-NONE 721s algparse -v2 'esp=aes_gcm_8-null' (expect SUCCESS) 721s AES_GCM_8-NONE 721s algparse -v2 'esp=aes_gcm_12-null' (expect SUCCESS) 721s AES_GCM_12-NONE 721s algparse -v2 'esp=aes_gcm_16-null' (expect SUCCESS) 721s AES_GCM_16-NONE 721s algparse -v2 'esp=aes_ccm_8-128-null' (expect SUCCESS) 721s AES_CCM_8_128-NONE 721s algparse -v2 'esp=aes_ccm_12-192-null' (expect SUCCESS) 721s AES_CCM_12_192-NONE 721s algparse -v2 'esp=aes_ccm_16-256-null' (expect SUCCESS) 721s AES_CCM_16_256-NONE 721s algparse -v2 'esp=aes_gcm_8-128-null' (expect SUCCESS) 721s AES_GCM_8_128-NONE 721s algparse -v2 'esp=aes_gcm_12-192-null' (expect SUCCESS) 721s AES_GCM_12_192-NONE 721s algparse -v2 'esp=aes_gcm_16-256-null' (expect SUCCESS) 721s AES_GCM_16_256-NONE 721s algparse -v2 'esp=aes_ccm_8_128-null' (expect SUCCESS) 721s AES_CCM_8_128-NONE 721s algparse -v2 'esp=aes_ccm_12_192-null' (expect SUCCESS) 721s AES_CCM_12_192-NONE 721s algparse -v2 'esp=aes_ccm_16_256-null' (expect SUCCESS) 721s AES_CCM_16_256-NONE 721s algparse -v2 'esp=aes_gcm_8_128-null' (expect SUCCESS) 721s AES_GCM_8_128-NONE 721s algparse -v2 'esp=aes_gcm_12_192-null' (expect SUCCESS) 721s AES_GCM_12_192-NONE 721s algparse -v2 'esp=aes_gcm_16_256-null' (expect SUCCESS) 721s AES_GCM_16_256-NONE 721s algparse -v2 'esp=aes_ctr' (expect SUCCESS) 721s AES_CTR-HMAC_SHA2_512_256+HMAC_SHA2_256_128 721s algparse -v2 'esp=aesctr' (expect SUCCESS) 721s AES_CTR-HMAC_SHA2_512_256+HMAC_SHA2_256_128 721s algparse -v2 'esp=aes_ctr128' (expect SUCCESS) 721s AES_CTR_128-HMAC_SHA2_512_256+HMAC_SHA2_256_128 721s algparse -v2 'esp=aes_ctr192' (expect SUCCESS) 721s | parsing 'aes_ccm-null' for ESP 721s | proposal: 'aes_ccm-null' 721s | token: '' '' "aes_ccm" '-' 721s | token: '' "aes_ccm" '-' "null" '' 721s | token: '-' "null" '' '' 721s | appending ESP encryption algorithm AES_CCM_16[_0] 721s | parsing integ: 721s | appending ESP integrity algorithm NONE[_0] 721s | token: '' '' '' 721s | parsing 'aes_gcm-null' for ESP 721s | proposal: 'aes_gcm-null' 721s | token: '' '' "aes_gcm" '-' 721s | token: '' "aes_gcm" '-' "null" '' 721s | token: '-' "null" '' '' 721s | appending ESP encryption algorithm AES_GCM_16[_0] 721s | parsing integ: 721s | appending ESP integrity algorithm NONE[_0] 721s | token: '' '' '' 721s | parsing 'aes_ccm-256-null' for ESP 721s | proposal: 'aes_ccm-256-null' 721s | token: '' '' "aes_ccm" '-' 721s | token: '' "aes_ccm" '-' "256" '-' 721s | token: '-' "256" '-' "null" '' 721s | token: '-' "null" '' '' 721s | appending ESP encryption algorithm AES_CCM_16[_256] 721s | parsing integ: 721s | appending ESP integrity algorithm NONE[_0] 721s | token: '' '' '' 721s | parsing 'aes_gcm-192-null' for ESP 721s | proposal: 'aes_gcm-192-null' 721s | token: '' '' "aes_gcm" '-' 721s | token: '' "aes_gcm" '-' "192" '-' 721s | token: '-' "192" '-' "null" '' 721s | token: '-' "null" '' '' 721s | appending ESP encryption algorithm AES_GCM_16[_192] 721s | parsing integ: 721s | appending ESP integrity algorithm NONE[_0] 721s | token: '' '' '' 721s | parsing 'aes_ccm_256-null' for ESP 721s | proposal: 'aes_ccm_256-null' 721s | token: '' '' "aes_ccm_256" '-' 721s | token: '' "aes_ccm_256" '-' "null" '' 721s | ike_alg_byname() failed: ESP encryption algorithm 'aes_ccm_256' is not recognized 721s | token: '-' "null" '' '' 721s | appending ESP encryption algorithm AES_CCM_16[_256] 721s | parsing integ: 721s | appending ESP integrity algorithm NONE[_0] 721s | token: '' '' '' 721s | parsing 'aes_gcm_192-null' for ESP 721s | proposal: 'aes_gcm_192-null' 721s | token: '' '' "aes_gcm_192" '-' 721s | token: '' "aes_gcm_192" '-' "null" '' 721s | ike_alg_byname() failed: ESP encryption algorithm 'aes_gcm_192' is not recognized 721s | token: '-' "null" '' '' 721s | appending ESP encryption algorithm AES_GCM_16[_192] 721s | parsing integ: 721s | appending ESP integrity algorithm NONE[_0] 721s | token: '' '' '' 721s | parsing 'aes_ccm_8-null' for ESP 721s | proposal: 'aes_ccm_8-null' 721s | token: '' '' "aes_ccm_8" '-' 721s | token: '' "aes_ccm_8" '-' "null" '' 721s | token: '-' "null" '' '' 721s | appending ESP encryption algorithm AES_CCM_8[_0] 721s | parsing integ: 721s | appending ESP integrity algorithm NONE[_0] 721s | token: '' '' '' 721s | parsing 'aes_ccm_12-null' for ESP 721s | proposal: 'aes_ccm_12-null' 721s | token: '' '' "aes_ccm_12" '-' 721s | token: '' "aes_ccm_12" '-' "null" '' 721s | token: '-' "null" '' '' 721s | appending ESP encryption algorithm AES_CCM_12[_0] 721s | parsing integ: 721s | appending ESP integrity algorithm NONE[_0] 721s | token: '' '' '' 721s | parsing 'aes_ccm_16-null' for ESP 721s | proposal: 'aes_ccm_16-null' 721s | token: '' '' "aes_ccm_16" '-' 721s | token: '' "aes_ccm_16" '-' "null" '' 721s | token: '-' "null" '' '' 721s | appending ESP encryption algorithm AES_CCM_16[_0] 721s | parsing integ: 721s | appending ESP integrity algorithm NONE[_0] 721s | token: '' '' '' 721s | parsing 'aes_gcm_8-null' for ESP 721s | proposal: 'aes_gcm_8-null' 721s | token: '' '' "aes_gcm_8" '-' 721s | token: '' "aes_gcm_8" '-' "null" '' 721s | token: '-' "null" '' '' 721s | appending ESP encryption algorithm AES_GCM_8[_0] 721s | parsing integ: 721s | appending ESP integrity algorithm NONE[_0] 721s | token: '' '' '' 721s | parsing 'aes_gcm_12-null' for ESP 721s | proposal: 'aes_gcm_12-null' 721s | token: '' '' "aes_gcm_12" '-' 721s | token: '' "aes_gcm_12" '-' "null" '' 721s | token: '-' "null" '' '' 721s | appending ESP encryption algorithm AES_GCM_12[_0] 721s | parsing integ: 721s | appending ESP integrity algorithm NONE[_0] 721s | token: '' '' '' 721s | parsing 'aes_gcm_16-null' for ESP 721s | proposal: 'aes_gcm_16-null' 721s | token: '' '' "aes_gcm_16" '-' 721s | token: '' "aes_gcm_16" '-' "null" '' 721s | token: '-' "null" '' '' 721s | appending ESP encryption algorithm AES_GCM_16[_0] 721s | parsing integ: 721s | appending ESP integrity algorithm NONE[_0] 721s | token: '' '' '' 721s | parsing 'aes_ccm_8-128-null' for ESP 721s | proposal: 'aes_ccm_8-128-null' 721s | token: '' '' "aes_ccm_8" '-' 721s | token: '' "aes_ccm_8" '-' "128" '-' 721s | token: '-' "128" '-' "null" '' 721s | token: '-' "null" '' '' 721s | appending ESP encryption algorithm AES_CCM_8[_128] 721s | parsing integ: 721s | appending ESP integrity algorithm NONE[_0] 721s | token: '' '' '' 721s | parsing 'aes_ccm_12-192-null' for ESP 721s | proposal: 'aes_ccm_12-192-null' 721s | token: '' '' "aes_ccm_12" '-' 721s | token: '' "aes_ccm_12" '-' "192" '-' 721s | token: '-' "192" '-' "null" '' 721s | token: '-' "null" '' '' 721s | appending ESP encryption algorithm AES_CCM_12[_192] 721s | parsing integ: 721s | appending ESP integrity algorithm NONE[_0] 721s | token: '' '' '' 721s | parsing 'aes_ccm_16-256-null' for ESP 721s | proposal: 'aes_ccm_16-256-null' 721s | token: '' '' "aes_ccm_16" '-' 721s | token: '' "aes_ccm_16" '-' "256" '-' 721s | token: '-' "256" '-' "null" '' 721s | token: '-' "null" '' '' 721s | appending ESP encryption algorithm AES_CCM_16[_256] 721s | parsing integ: 721s | appending ESP integrity algorithm NONE[_0] 721s | token: '' '' '' 721s | parsing 'aes_gcm_8-128-null' for ESP 721s | proposal: 'aes_gcm_8-128-null' 721s | token: '' '' "aes_gcm_8" '-' 721s | token: '' "aes_gcm_8" '-' "128" '-' 721s | token: '-' "128" '-' "null" '' 721s | token: '-' "null" '' '' 721s | appending ESP encryption algorithm AES_GCM_8[_128] 721s | parsing integ: 721s | appending ESP integrity algorithm NONE[_0] 721s | token: '' '' '' 721s | parsing 'aes_gcm_12-192-null' for ESP 721s | proposal: 'aes_gcm_12-192-null' 721s | token: '' '' "aes_gcm_12" '-' 721s | token: '' "aes_gcm_12" '-' "192" '-' 721s | token: '-' "192" '-' "null" '' 721s | token: '-' "null" '' '' 721s | appending ESP encryption algorithm AES_GCM_12[_192] 721s | parsing integ: 721s | appending ESP integrity algorithm NONE[_0] 721s | token: '' '' '' 721s | parsing 'aes_gcm_16-256-null' for ESP 721s | proposal: 'aes_gcm_16-256-null' 721s | token: '' '' "aes_gcm_16" '-' 721s | token: '' "aes_gcm_16" '-' "256" '-' 721s | token: '-' "256" '-' "null" '' 721s | token: '-' "null" '' '' 721s | appending ESP encryption algorithm AES_GCM_16[_256] 721s | parsing integ: 721s | appending ESP integrity algorithm NONE[_0] 721s | token: '' '' '' 721s | parsing 'aes_ccm_8_128-null' for ESP 721s | proposal: 'aes_ccm_8_128-null' 721s | token: '' '' "aes_ccm_8_128" '-' 721s | token: '' "aes_ccm_8_128" '-' "null" '' 721s | ike_alg_byname() failed: ESP encryption algorithm 'aes_ccm_8_128' is not recognized 721s | token: '-' "null" '' '' 721s | appending ESP encryption algorithm AES_CCM_8[_128] 721s | parsing integ: 721s | appending ESP integrity algorithm NONE[_0] 721s | token: '' '' '' 721s | parsing 'aes_ccm_12_192-null' for ESP 721s | proposal: 'aes_ccm_12_192-null' 721s | token: '' '' "aes_ccm_12_192" '-' 721s | token: '' "aes_ccm_12_192" '-' "null" '' 721s | ike_alg_byname() failed: ESP encryption algorithm 'aes_ccm_12_192' is not recognized 721s | token: '-' "null" '' '' 721s | appending ESP encryption algorithm AES_CCM_12[_192] 721s | parsing integ: 721s | appending ESP integrity algorithm NONE[_0] 721s | token: '' '' '' 721s | parsing 'aes_ccm_16_256-null' for ESP 721s | proposal: 'aes_ccm_16_256-null' 721s | token: '' '' "aes_ccm_16_256" '-' 721s | token: '' "aes_ccm_16_256" '-' "null" '' 721s | ike_alg_byname() failed: ESP encryption algorithm 'aes_ccm_16_256' is not recognized 721s | token: '-' "null" '' '' 721s | appending ESP encryption algorithm AES_CCM_16[_256] 721s | parsing integ: 721s | appending ESP integrity algorithm NONE[_0] 721s | token: '' '' '' 721s | parsing 'aes_gcm_8_128-null' for ESP 721s | proposal: 'aes_gcm_8_128-null' 721s | token: '' '' "aes_gcm_8_128" '-' 721s | token: '' "aes_gcm_8_128" '-' "null" '' 721s | ike_alg_byname() failed: ESP encryption algorithm 'aes_gcm_8_128' is not recognized 721s | token: '-' "null" '' '' 721s | appending ESP encryption algorithm AES_GCM_8[_128] 721s | parsing integ: 721s | appending ESP integrity algorithm NONE[_0] 721s | token: '' '' '' 721s | parsing 'aes_gcm_12_192-null' for ESP 721s | proposal: 'aes_gcm_12_192-null' 721s | token: '' '' "aes_gcm_12_192" '-' 721s | token: '' "aes_gcm_12_192" '-' "null" '' 721s | ike_alg_byname() failed: ESP encryption algorithm 'aes_gcm_1 AES_CTR_192-HMAC_SHA2_512_256+HMAC_SHA2_256_128 721s algparse -v2 'esp=aes_ctr256' (expect SUCCESS) 721s AES_CTR_256-HMAC_SHA2_512_256+HMAC_SHA2_256_128 721s algparse -v2 'esp=camellia_cbc_256-hmac_sha2_512_256;modp8192' (expect SUCCESS) 721s CAMELLIA_CBC_256-HMAC_SHA2_512_256 721s algparse -v2 'esp=null_auth_aes_gmac_256-null;modp8192' (expect SUCCESS) 721s NULL_AUTH_AES_GMAC_256-NONE 721s algparse -v2 'esp=3des-sha1;modp8192' (expect SUCCESS) 721s 3DES_CBC-HMAC_SHA1_96 721s algparse -v2 'esp=3des-sha1-modp8192' (expect SUCCESS) 721s 3DES_CBC-HMAC_SHA1_96 721s algparse -v2 'esp=aes-sha1,3des-sha1;modp8192' (expect SUCCESS) 721s AES_CBC-HMAC_SHA1_96 721s 3DES_CBC-HMAC_SHA1_96 721s algparse -v2 'esp=aes-sha1-modp8192,3des-sha1-modp8192' (expect SUCCESS) 721s AES_CBC-HMAC_SHA1_96 721s 3DES_CBC-HMAC_SHA1_96 721s algparse -v2 'esp=aes-sha1-modp8192,aes-sha1-modp8192,aes-sha1-modp8192' (expect SUCCESS) 721s AES_CBC-HMAC_SHA1_96 721s algparse -v2 'esp=aes;none' (expect SUCCESS) 721s AES_CBC-HMAC_SHA2_512_256+HMAC_SHA2_256_128 721s algparse -v2 'esp=aes;none,aes' (expect SUCCESS) 721s AES_CBC-HMAC_SHA2_512_256+HMAC_SHA2_256_128 721s AES_CBC-HMAC_SHA2_512_256+HMAC_SHA2_256_128 721s algparse -v2 'esp=aes;none,aes;modp2048' (expect SUCCESS) 721s AES_CBC-HMAC_SHA2_512_256+HMAC_SHA2_256_128 721s AES_CBC-HMAC_SHA2_512_256+HMAC_SHA2_256_128 721s algparse -v2 'esp=aes-sha1-none' (expect SUCCESS) 721s AES_CBC-HMAC_SHA1_96 721s algparse -v2 'esp=aes-sha1;none' (expect SUCCESS) 721s AES_CBC-HMAC_SHA1_96 721s algparse -v2 'esp=3des168-sha1' (expect ERROR) 721s ERROR: ESP encryption algorithm 3DES_CBC does not allow a key lengths 721s algparse -v2 'esp=3des-null' (expect ERROR) 721s ERROR: non-AEAD ESP encryption algorithm 3DES_CBC cannot have 'NONE' as the integrity algorithm 721s algparse -v2 'esp=aes128-null' (expect ERROR) 721s ERROR: non-AEAD ESP encryption algorithm AES_CBC cannot have 'NONE' as the integrity algorithm 721s algparse -v2 'esp=aes224-sha1' (expect ERROR) 721s ERROR: ESP encryption algorithm AES_CBC with key length 224 invalid; valid key lengths: 128, 192, 256 721s algparse -v2 'esp=aes-224-sha1' (expect ERROR) 721s ERROR: ESP encryption algorithm AES_CBC with key length 224 invalid; valid key lengths: 128, 192, 256 721s algparse -v2 'esp=aes0-sha1' (expect ERROR) 721s ERROR: ESP encryption key length is zero 721s algparse -v2 'esp=aes-0-sha1' (expect ERROR) 721s ERROR: ESP encryption key length is zero 721s algparse -v2 'esp=aes512-sha1' (expect ERROR) 721s ERROR: ESP encryption algorithm AES_CBC with key length 512 invalid; valid key lengths: 128, 192, 256 721s algparse -v2 'esp=aes-sha1555' (expect ERROR) 721s ERROR: ESP integrity algorithm 'sha1555' is not recognized 721s algparse -v2 'esp=camellia666-sha1' (expect ERROR) 721s ERROR: ESP encryption algorithm CAMELLIA_CBC with key length 666 invalid; valid key lengths: 128, 192, 256 721s algparse -v2 'esp=blowfish' (expect ERROR) 721s ERROR: ESP encryption algorithm 'blowfish' is not supported 721s algparse -v2 'esp=des-sha1' (expect ERROR) 721s ERROR: ESP encryption algorithm 'des' is not supported 721s algparse -v2 'esp=aes_ctr666' (expect ERROR) 721s ERROR: ESP encryption algorithm AES_CTR with key length 666 invalid; valid key lengths: 128, 192, 256 721s algparse -v2 'esp=aes128-sha2_128' (expect ERROR) 721s ERROR: ESP integrity algorithm 'sha2_128' is not recognized 721s algparse -v2 'esp=aes256-sha2_256-4096' (expect ERROR) 721s 2_192' is not recognized 721s | token: '-' "null" '' '' 721s | appending ESP encryption algorithm AES_GCM_12[_192] 721s | parsing integ: 721s | appending ESP integrity algorithm NONE[_0] 721s | token: '' '' '' 721s | parsing 'aes_gcm_16_256-null' for ESP 721s | proposal: 'aes_gcm_16_256-null' 721s | token: '' '' "aes_gcm_16_256" '-' 721s | token: '' "aes_gcm_16_256" '-' "null" '' 721s | ike_alg_byname() failed: ESP encryption algorithm 'aes_gcm_16_256' is not recognized 721s | token: '-' "null" '' '' 721s | appending ESP encryption algorithm AES_GCM_16[_256] 721s | parsing integ: 721s | appending ESP integrity algorithm NONE[_0] 721s | token: '' '' '' 721s | parsing 'aes_ctr' for ESP 721s | proposal: 'aes_ctr' 721s | token: '' '' "aes_ctr" '' 721s | token: '' "aes_ctr" '' '' 721s | token: '' '' '' 721s | appending ESP encryption algorithm AES_CTR[_0] 721s | appending ESP integrity algorithm HMAC_SHA2_512_256[_0] 721s | appending ESP integrity algorithm HMAC_SHA2_256_128[_0] 721s | parsing 'aesctr' for ESP 721s | proposal: 'aesctr' 721s | token: '' '' "aesctr" '' 721s | token: '' "aesctr" '' '' 721s | token: '' '' '' 721s | appending ESP encryption algorithm AES_CTR[_0] 721s | appending ESP integrity algorithm HMAC_SHA2_512_256[_0] 721s | appending ESP integrity algorithm HMAC_SHA2_256_128[_0] 721s | parsing 'aes_ctr128' for ESP 721s | proposal: 'aes_ctr128' 721s | token: '' '' "aes_ctr128" '' 721s | token: '' "aes_ctr128" '' '' 721s | ike_alg_byname() failed: ESP encryption algorithm 'aes_ctr128' is not recognized 721s | token: '' '' '' 721s | appending ESP encryption algorithm AES_CTR[_128] 721s | appending ESP integrity algorithm HMAC_SHA2_512_256[_0] 721s | appending ESP integrity algorithm HMAC_SHA2_256_128[_0] 721s | parsing 'aes_ctr192' for ESP 721s | proposal: 'aes_ctr192' 721s | token: '' '' "aes_ctr192" '' 721s | token: '' "aes_ctr192" '' '' 721s | ike_alg_byname() failed: ESP encryption algorithm 'aes_ctr192' is not recognized 721s | token: '' '' '' 721s | appending ESP encryption algorithm AES_CTR[_192] 721s | appending ESP integrity algorithm HMAC_SHA2_512_256[_0] 721s | appending ESP integrity algorithm HMAC_SHA2_256_128[_0] 721s | parsing 'aes_ctr256' for ESP 721s | proposal: 'aes_ctr256' 721s | token: '' '' "aes_ctr256" '' 721s | token: '' "aes_ctr256" '' '' 721s | ike_alg_byname() failed: ESP encryption algorithm 'aes_ctr256' is not recognized 721s | token: '' '' '' 721s | appending ESP encryption algorithm AES_CTR[_256] 721s | appending ESP integrity algorithm HMAC_SHA2_512_256[_0] 721s | appending ESP integrity algorithm HMAC_SHA2_256_128[_0] 721s | parsing 'camellia_cbc_256-hmac_sha2_512_256;modp8192' for ESP 721s | proposal: 'camellia_cbc_256-hmac_sha2_512_256;modp8192' 721s | token: '' '' "camellia_cbc_256" '-' 721s | token: '' "camellia_cbc_256" '-' "hmac_sha2_512_256" ';' 721s | ike_alg_byname() failed: ESP encryption algorithm 'camellia_cbc_256' is not recognized 721s | token: '-' "hmac_sha2_512_256" ';' "modp8192" '' 721s | appending ESP encryption algorithm CAMELLIA_CBC[_256] 721s | parsing integ: 721s | appending ESP integrity algorithm HMAC_SHA2_512_256[_0] 721s | token: ';' "modp8192" '' '' 721s | parsing dh: 721s | appending ESP DH algorithm MODP8192[_0] 721s | token: '' '' '' 721s ipsec algparse: ignoring ESP DH algorithm MODP8192 as PFS policy is disabled 721s | parsing 'null_auth_aes_gmac_256-null;modp8192' for ESP 721s | proposal: 'null_auth_aes_gmac_256-null;modp8192' 721s | token: '' '' "null_auth_aes_gmac_256" '-' 721s | token: '' "null_auth_aes_gmac_256" '-' "null" ';' 721s | ike_alg_byname() failed: ESP encryption algorithm 'null_auth_aes_gmac_256' is not recognized 721s | token: '-' "null" ';' "modp8192" '' 721s | appending ESP encryption algorithm NULL_AUTH_AES_GMAC[_256] 721s | parsing integ: 721s | appending ESP integrity algorithm NONE[_0] 721s | token: ';' "modp8192" '' '' 721s | parsing dh: 721s | appending ESP DH algorithm MODP8192[_0] 721s | token: '' '' '' 721s ipsec algparse: ignoring ESP DH algorithm MODP8192 as PFS policy is disabled 721s | parsing '3des-sha1;modp8192' for ESP 721s | proposal: '3des-sha1;modp8192' 721s | token: '' '' "3des" '-' 721s | token: '' "3des" '-' "sha1" ';' 721s | token: '-' "sha1" ';' "modp8192" '' 721s | appending ESP encryption algorithm 3DES_CB ERROR: ESP DH algorithm '4096' is not recognized 721s algparse -v2 'esp=aes256-sha2_256-128' (expect ERROR) 721s ERROR: ESP DH algorithm '128' is not recognized 721s algparse -v2 'esp=vanitycipher' (expect ERROR) 721s ERROR: ESP encryption algorithm 'vanitycipher' is not recognized 721s algparse -v2 'esp=ase-sah' (expect ERROR) 721s ERROR: ESP encryption algorithm 'ase' is not recognized 721s algparse -v2 'esp=aes-sah1' (expect ERROR) 721s ERROR: ESP integrity algorithm 'sah1' is not recognized 721s algparse -v2 'esp=id3' (expect ERROR) 721s ERROR: ESP encryption algorithm 'id3' is not recognized 721s algparse -v2 'esp=aes-id3' (expect ERROR) 721s ERROR: ESP integrity algorithm 'id3' is not recognized 721s algparse -v2 'esp=aes_gcm-md5' (expect ERROR) 721s ERROR: AEAD ESP encryption algorithm AES_GCM_16 must have 'NONE' as the integrity algorithm 721s algparse -v2 'esp=mars' (expect ERROR) 721s ERROR: ESP encryption algorithm 'mars' is not supported 721s algparse -v2 'esp=aes_gcm-16' (expect ERROR) 721s ERROR: ESP encryption algorithm AES_GCM_16 with key length 16 invalid; valid key lengths: 128, 192, 256 721s algparse -v2 'esp=aes_gcm-0' (expect ERROR) 721s ERROR: ESP encryption key length is zero 721s algparse -v2 'esp=aes_gcm-123456789012345' (expect ERROR) 721s ERROR: ESP encryption algorithm 'aes_gcm-123456789012345' key length WAY too big 721s algparse -v2 'esp=3des-sha1;dh22' (expect ERROR) 721s ERROR: ESP DH algorithm 'dh22' is not supported 721s algparse -v2 'esp=3des-sha1;modp8192,3des-sha2' (expect SUCCESS) 721s 3DES_CBC-HMAC_SHA1_96 721s 3DES_CBC-HMAC_SHA2_256_128 721s algparse -v2 'esp=3des-sha1-modp8192,3des-sha2' (expect SUCCESS) 721s 3DES_CBC-HMAC_SHA1_96 721s 3DES_CBC-HMAC_SHA2_256_128 721s algparse -v2 'esp=3des-sha1-modp8192,3des-sha2-modp8192' (expect SUCCESS) 721s 3DES_CBC-HMAC_SHA1_96 721s 3DES_CBC-HMAC_SHA2_256_128 721s algparse -v2 'esp=3des-sha1-modp8192,3des-sha2;modp8192' (expect SUCCESS) 721s 3DES_CBC-HMAC_SHA1_96 721s 3DES_CBC-HMAC_SHA2_256_128 721s algparse -v2 'esp=3des-sha1;modp8192,3des-sha2-modp8192' (expect SUCCESS) 721s 3DES_CBC-HMAC_SHA1_96 721s 3DES_CBC-HMAC_SHA2_256_128 721s algparse -v2 'esp=3des-sha1;modp8192,3des-sha2;modp8192' (expect SUCCESS) 721s 3DES_CBC-HMAC_SHA1_96 721s 3DES_CBC-HMAC_SHA2_256_128 721s algparse -v2 'esp=3des-sha1-modp8192,3des-sha2-modp2048' (expect SUCCESS) 721s 3DES_CBC-HMAC_SHA1_96 721s 3DES_CBC-HMAC_SHA2_256_128 721s algparse -v2 'ah' (expect SUCCESS) 721s HMAC_SHA2_512_256 721s HMAC_SHA2_256_128 721s algparse -v2 'ah=' (expect ERROR) 721s ERROR: AH proposal is empty 721s algparse -v2 'ah=md5' (expect SUCCESS) 721s HMAC_MD5_96 721s algparse -v2 'ah=sha' (expect SUCCESS) 721s HMAC_SHA1_96 721s algparse -v2 'ah=sha;modp2048' (expect SUCCESS) 721s HMAC_SHA1_96 721s algparse -v2 'ah=sha1' (expect SUCCESS) 721s HMAC_SHA1_96 721s algparse -v2 'ah=sha2' (expect SUCCESS) 721s HMAC_SHA2_256_128 721s algparse -v2 'ah=sha256' (expect SUCCESS) 721s HMAC_SHA2_256_128 721s algparse -v2 'ah=sha384' (expect SUCCESS) 721s HMAC_SHA2_384_192 721s algparse -v2 'ah=sha512' (expect SUCCESS) 721s HMAC_SHA2_512_256 721s algparse -v2 'ah=sha2_256' (expect SUCCESS) 721s HMAC_SHA2_256_128 721s algparse -v2 'ah=sha2_384' (expect SUCCESS) 721s HMAC_SHA2_384_192 721s algparse -v2 'ah=sha2_512' (expect SUCCESS) 721s HMAC_SHA2_512_256 721s algparse -v2 'ah=aes_xcbc' (expect SUCCESS) 721s AES_XCBC_96 721s algparse -v2 'ah=sha2-none' (expect SUCCESS) 721s HMAC_SHA2_256_128 721s algparse -v2 'ah=sha2;none' (expect SUCCESS) 721s HMAC_SHA2_256_128 721s algparse -v2 'ah=sha1-modp8192,sha1-modp8192,sha1-modp8192' (expect SUCCESS) 721s HMAC_SHA1_96 721s algparse -v2 'ah=aes-sha1' (expect ERROR) 721s ERROR: AH integrity algorithm 'aes' is not recognized 721s algparse -v2 'ah=vanityhash1' (expect ERROR) 721s ERROR: AH integrity algorithm 'vanityhash1' is not recognized 721s algparse -v2 'ah=aes_gcm_c-256' (expect ERROR) 721s ERROR: AH integrity algorithm 'aes_gcm_c' is not recognized 721s algparse -v2 'ah=id3' (expect ERROR) 721s ERROR: AH integrity algorithm 'id3' is not recognized 721s algparse -v2 'ah=3des' (expect ERROR) 721s ERROR: AH integrity algorithm '3des' is not recognized 721s algparse -v2 'ah=null' (expect ERROR) 721s ERROR: AH cannot have 'none' as the integrity algorithm 721s algparse -v2 'ah=aes_gcm' (expect ERROR) 721s ERROR: AH integrity algorithm 'aes_gcm' is not recognized 721s algparse -v2 'ah=aes_ccm' (expect ERROR) 721s C[_0] 721s | parsing integ: 721s | appending ESP integrity algorithm HMAC_SHA1_96[_0] 721s | token: ';' "modp8192" '' '' 721s | parsing dh: 721s | appending ESP DH algorithm MODP8192[_0] 721s | token: '' '' '' 721s ipsec algparse: ignoring ESP DH algorithm MODP8192 as PFS policy is disabled 721s | parsing '3des-sha1-modp8192' for ESP 721s | proposal: '3des-sha1-modp8192' 721s | token: '' '' "3des" '-' 721s | token: '' "3des" '-' "sha1" '-' 721s | token: '-' "sha1" '-' "modp8192" '' 721s | appending ESP encryption algorithm 3DES_CBC[_0] 721s | parsing integ: 721s | appending ESP integrity algorithm HMAC_SHA1_96[_0] 721s | token: '-' "modp8192" '' '' 721s | parsing dh: 721s | appending ESP DH algorithm MODP8192[_0] 721s | token: '' '' '' 721s ipsec algparse: ignoring ESP DH algorithm MODP8192 as PFS policy is disabled 721s | parsing 'aes-sha1,3des-sha1;modp8192' for ESP 721s | proposal: 'aes-sha1' 721s | token: '' '' "aes" '-' 721s | token: '' "aes" '-' "sha1" '' 721s | token: '-' "sha1" '' '' 721s | appending ESP encryption algorithm AES_CBC[_0] 721s | parsing integ: 721s | appending ESP integrity algorithm HMAC_SHA1_96[_0] 721s | token: '' '' '' 721s | proposal: '3des-sha1;modp8192' 721s | token: '' '' "3des" '-' 721s | token: '' "3des" '-' "sha1" ';' 721s | token: '-' "sha1" ';' "modp8192" '' 721s | appending ESP encryption algorithm 3DES_CBC[_0] 721s | parsing integ: 721s | appending ESP integrity algorithm HMAC_SHA1_96[_0] 721s | token: ';' "modp8192" '' '' 721s | parsing dh: 721s | appending ESP DH algorithm MODP8192[_0] 721s | token: '' '' '' 721s ipsec algparse: ignoring ESP DH algorithm MODP8192 as PFS policy is disabled 721s | parsing 'aes-sha1-modp8192,3des-sha1-modp8192' for ESP 721s | proposal: 'aes-sha1-modp8192' 721s | token: '' '' "aes" '-' 721s | token: '' "aes" '-' "sha1" '-' 721s | token: '-' "sha1" '-' "modp8192" '' 721s | appending ESP encryption algorithm AES_CBC[_0] 721s | parsing integ: 721s | appending ESP integrity algorithm HMAC_SHA1_96[_0] 721s | token: '-' "modp8192" '' '' 721s | parsing dh: 721s | appending ESP DH algorithm MODP8192[_0] 721s | token: '' '' '' 721s | proposal: '3des-sha1-modp8192' 721s | token: '' '' "3des" '-' 721s | token: '' "3des" '-' "sha1" '-' 721s | token: '-' "sha1" '-' "modp8192" '' 721s | appending ESP encryption algorithm 3DES_CBC[_0] 721s | parsing integ: 721s | appending ESP integrity algorithm HMAC_SHA1_96[_0] 721s | token: '-' "modp8192" '' '' 721s | parsing dh: 721s | appending ESP DH algorithm MODP8192[_0] 721s | token: '' '' '' 721s ipsec algparse: ignoring ESP DH algorithm MODP8192 as PFS policy is disabled 721s ipsec algparse: ignoring ESP DH algorithm MODP8192 as PFS policy is disabled 721s | parsing 'aes-sha1-modp8192,aes-sha1-modp8192,aes-sha1-modp8192' for ESP 721s | proposal: 'aes-sha1-modp8192' 721s | token: '' '' "aes" '-' 721s | token: '' "aes" '-' "sha1" '-' 721s | token: '-' "sha1" '-' "modp8192" '' 721s | appending ESP encryption algorithm AES_CBC[_0] 721s | parsing integ: 721s | appending ESP integrity algorithm HMAC_SHA1_96[_0] 721s | token: '-' "modp8192" '' '' 721s | parsing dh: 721s | appending ESP DH algorithm MODP8192[_0] 721s | token: '' '' '' 721s | proposal: 'aes-sha1-modp8192' 721s | token: '' '' "aes" '-' 721s | token: '' "aes" '-' "sha1" '-' 721s | token: '-' "sha1" '-' "modp8192" '' 721s | appending ESP encryption algorithm AES_CBC[_0] 721s | parsing integ: 721s | appending ESP integrity algorithm HMAC_SHA1_96[_0] 721s | token: '-' "modp8192" '' '' 721s | parsing dh: 721s | appending ESP DH algorithm MODP8192[_0] 721s | token: '' '' '' 721s | proposal: 'aes-sha1-modp8192' 721s | token: '' '' "aes" '-' 721s | token: '' "aes" '-' "sha1" '-' 721s | token: '-' "sha1" '-' "modp8192" '' 721s | appending ESP encryption algorithm AES_CBC[_0] 721s | parsing integ: 721s | appending ESP integrity algorithm HMAC_SHA1_96[_0] 721s | token: '-' "modp8192" '' '' 721s | parsing dh: 721s | appending ESP DH algorithm MODP8192[_0] 721s | token: '' '' '' 721s ipsec algparse: ignoring ESP DH algorithm MODP8192 as PFS policy is disabled 721s | parsing 'aes;none' for ESP 721s | proposal: 'aes;none' 721s | token: '' '' "aes" ';' 721s | token: '' "aes" ';' "none" '' 721s | token: ';' "none" '' '' 721s | appending ESP encryption algorithm AES_CBC[_0] 721s | parsing dh: 721s | appending ESP DH algorithm NONE[_0] 721s | token: '' '' '' 721s | appending ESP integrity algorithm HMAC_SHA2_512_256[_0] 721s | appending ESP integrity algorithm HMAC_SHA2_256_128[_0] 721s ipsec algparse: ignoring redundant ESP DH algorithm NONE as PFS policy is disabled 721s | parsing 'aes;none,aes' for ESP 721s | proposal: 'aes;none' 721s | token: '' '' "aes" ';' 721s | token: '' "aes" ';' "none" '' 721s | token: ';' "none" '' '' 721s | appending ESP encryption algorithm AES_CBC[_0] 721s | parsing dh: 721s | appending ESP DH algorithm NONE[_0] 721s | token: '' '' '' 721s | appending ESP integrity algorithm HMAC_SHA2_512_256[_0] 721s | appending ESP integrity algorithm HMAC_SHA2_256_128[_0] 721s | proposal: 'aes' 721s | token: '' '' "aes" '' 721s | token: '' "aes" '' '' 721s | token: '' '' '' 721s | appending ESP encryption algorithm AES_CBC[_0] 721s | appending ESP integrity algorithm HMAC_SHA2_512_256[_0] 721s | appending ESP integrity algorithm HMAC_SHA2_256_128[_0] 721s ipsec algparse: ignoring redundant ESP DH algorithm NONE as PFS policy is disabled 721s | parsing 'aes;none,aes;modp2048' for ESP 721s | proposal: 'aes;none' 721s | token: '' '' "aes" ';' 721s | token: '' "aes" ';' "none" '' 721s | token: ';' "none" '' '' 721s | appending ESP encryption algorithm AES_CBC[_0] 721s | parsing dh: 721s | appending ESP DH algorithm NONE[_0] 721s | token: '' '' '' 721s | appending ESP integrity algorithm HMAC_SHA2_512_256[_0] 721s | appending ESP integrity algorithm HMAC_SHA2_256_128[_0] 721s | proposal: 'aes;modp2048' 721s | token: '' '' "aes" ';' 721s | token: '' "aes" ';' "modp2048" '' 721s | token: ';' "modp2048" '' '' 721s | appending ESP encryption algorithm AES_CBC[_0] 721s | parsing dh: 721s | appending ESP DH algorithm MODP2048[_0] 721s | token: '' '' '' 721s | appending ESP integrity algorithm HMAC_SHA2_512_256[_0] 721s | appending ESP integrity algorithm HMAC_SHA2_256_128[_0] 721s ipsec algparse: ignoring redundant ESP DH algorithm NONE as PFS policy is disabled 721s ipsec algparse: ignoring ESP DH algorithm MODP2048 as PFS policy is disabled 721s | parsing 'aes-sha1-none' for ESP 721s | proposal: 'aes-sha1-none' 721s | token: '' '' "aes" '-' 721s | token: '' "aes" '-' "sha1" '-' 721s | token: '-' "sha1" '-' "none" '' 721s | appending ESP encryption algorithm AES_CBC[_0] 721s | parsing integ: 721s | appending ESP integrity algorithm HMAC_SHA1_96[_0] 721s | token: '-' "none" '' '' 721s | parsing dh: 721s | appending ESP DH algorithm NONE[_0] 721s | token: '' '' '' 721s ipsec algparse: ignoring redundant ESP DH algorithm NONE as PFS policy is disabled 721s | parsing 'aes-sha1;none' for ESP 721s | proposal: 'aes-sha1;none' 721s | token: '' '' "aes" '-' 721s | token: '' "aes" '-' "sha1" ';' 721s | token: '-' "sha1" ';' "none" '' 721s | appending ESP encryption algorithm AES_CBC[_0] 721s | parsing integ: 721s | appending ESP integrity algorithm HMAC_SHA1_96[_0] 721s | token: ';' "none" '' '' 721s | parsing dh: 721s | appending ESP DH algorithm NONE[_0] 721s | token: '' '' '' 721s ipsec algparse: ignoring redundant ESP DH algorithm NONE as PFS policy is disabled 721s | parsing '3des168-sha1' for ESP 721s | proposal: '3des168-sha1' 721s | token: '' '' "3des168" '-' 721s | token: '' "3des168" '-' "sha1" '' 721s | ike_alg_byname() failed: ESP encryption algorithm '3des168' is not recognized 721s | parsing '3des-null' for ESP 721s | proposal: '3des-null' 721s | token: '' '' "3des" '-' 721s | token: '' "3des" '-' "null" '' 721s | token: '-' "null" '' '' 721s | appending ESP encryption algorithm 3DES_CBC[_0] 721s | parsing integ: 721s | appending ESP integrity algorithm NONE[_0] 721s | token: '' '' '' 721s | parsing 'aes128-null' for ESP 721s | proposal: 'aes128-null' 721s | token: '' '' "aes128" '-' 721s | token: '' "aes128" '-' "null" '' 721s | ike_alg_byname() failed: ESP encryption algorithm 'aes128' is not recognized 721s | token: '-' "null" '' '' 721s | appending ESP encryption algorithm AES_CBC[_128] 721s | parsing integ: 721s | appending ESP integrity algorithm NONE[_0] 721s | token: '' '' '' 721s | parsing 'aes224-sha1' for ESP 721s | proposal: 'aes224-sha1' 721s | token: '' '' "aes224" '-' 721s | token: '' "aes224" '-' "sha1" '' 721s | ike_alg_byname() failed: ESP encryption algorithm 'aes224' is not recognized 721s | parsing 'aes-224-sha1' for ESP 721s | proposal: 'aes-224-sha1' 721s | token: '' '' "aes" '-' 721s | token: '' "aes" '-' "224" '-' 721s | byname('aes') with ='224' failed: ESP encryption algorithm AES_CBC with key length 224 invalid; valid key lengths: 128, 192, 256 721s | parsing 'aes0-sha1' for ESP 721s | proposal: 'aes0-sha1' 721s | token: '' '' "aes0" '-' 721s | token: '' "aes0" '-' "sha1" '' 721s | ike_alg_byname() failed: ESP encryption algorithm 'aes0' is not recognized 721s | parsing 'aes-0-sha1' for ESP 721s | proposal: 'aes-0-sha1' 721s | token: '' '' "aes" '-' 721s | token: '' "aes" '-' "0" '-' 721s | parsing 'aes512-sha1' for ESP 721s | proposal: 'aes512-sha1' 721s | token: '' '' "aes512" '-' 721s | token: '' "aes512" '-' "sha1" '' 721s | ike_alg_byname() failed: ESP encryption algorithm 'aes512' is not recognized 721s | parsing 'aes-sha1555' for ESP 721s | proposal: 'aes-sha1555' 721s | token: '' '' "aes" '-' 721s | token: '' "aes" '-' "sha1555" '' 721s | token: '-' "sha1555" '' '' 721s | appending ESP encryption algorithm AES_CBC[_0] 721s | parsing integ: 721s | ike_alg_byname() failed: ESP integrity algorithm 'sha1555' is not recognized 721s | lookup for integrity algorithm 'sha1555' failed 721s | or - failed 'ESP integrity algorithm 'sha1555' is not recognized') 721s | parsing 'camellia666-sha1' for ESP 721s | proposal: 'camellia666-sha1' 721s | token: '' '' "camellia666" '-' 721s | token: '' "camellia666" '-' "sha1" '' 721s | ike_alg_byname() failed: ESP encryption algorithm 'camellia666' is not recognized 721s | parsing 'blowfish' for ESP 721s | proposal: 'blowfish' 721s | token: '' '' "blowfish" '' 721s | token: '' "blowfish" '' '' 721s | ike_alg_byname() failed: ESP encryption algorithm 'blowfish' is not supported 721s | parsing 'des-sha1' for ESP 721s | proposal: 'des-sha1' 721s | token: '' '' "des" '-' 721s | token: '' "des" '-' "sha1" '' 721s | ike_alg_byname() failed: ESP encryption algorithm 'des' is not supported 721s | parsing 'aes_ctr666' for ESP 721s | proposal: 'aes_ctr666' 721s | token: '' '' "aes_ctr666" '' 721s | token: '' "aes_ctr666" '' '' 721s | ike_alg_byname() failed: ESP encryption algorithm 'aes_ctr666' is not recognized 721s | parsing 'aes128-sha2_128' for ESP 721s | proposal: 'aes128-sha2_128' 721s | token: '' '' "aes128" '-' 721s | token: '' "aes128" '-' "sha2_128" '' 721s | ike_alg_byname() failed: ESP encryption algorithm 'aes128' is not recognized 721s | token: '-' "sha2_128" '' '' 721s | appending ESP encryption algorithm AES_CBC[_128] 721s | parsing integ: 721s | ike_alg_byname() failed: ESP integrity algorithm 'sha2_128' is not recognized 721s | lookup for integrity algorithm 'sha2_128' failed 721s | or - failed 'ESP integrity algorithm 'sha2_128' is not recognized') 721s | parsing 'aes256-sha2_256-4096' for ESP 721s | proposal: 'aes256-sha2_256-4096' 721s | token: '' '' "aes256" '-' 721s | token: '' "aes256" '-' "sha2_256" '-' 721s | ike_alg_byname() failed: ESP encryption algorithm 'aes256' is not recognized 721s | token: '-' "sha2_256" '-' "4096" '' 721s | appending ESP encryption algorithm AES_CBC[_256] 721s | parsing integ: 721s | appending ESP integrity algorithm HMAC_SHA2_256_128[_0] 721s | token: '-' "4096" '' '' 721s | parsing dh: 721s | ike_alg_byname() failed: ESP DH algorithm '4096' is not recognized 721s | lookup for DH algorithm '4096' failed 721s | ... failed 'ESP DH algorithm '4096' is not recognized' 721s | parsing 'aes256-sha2_256-128' for ESP 721s | proposal: 'aes256-sha2_256-128' 721s | token: '' '' "aes256" '-' 721s | token: '' "aes256" '-' "sha2_256" '-' 721s | ike_alg_byname() failed: ESP encryption algorithm 'aes256' is not recognized 721s | token: '-' "sha2_256" '-' "128" '' 721s | appending ESP encryption algorithm AES_CBC[_256] 721s | parsing integ: 721s | appending ESP integrity algorithm HMAC_SHA2_256_128[_0] 721s | token: '-' "128" '' '' 721s | parsing dh: 721s | ike_alg_byname() failed: ESP DH algorithm '128' is not recognized 721s | lookup for DH algorithm '128' failed 721s | ... failed 'ESP DH algorithm '128' is not recognized' 721s | parsing 'vanitycipher' for ESP 721s | proposal: 'vanitycipher' 721s | token: '' '' "vanitycipher" '' 721s | token: '' "vanitycipher" '' '' 721s | ike_alg_byname() failed: ESP encryption algorithm 'vanitycipher' is not recognized 721s | parsing 'ase-sah' for ESP 721s | proposal: 'ase-sah' 721s | token: '' '' "ase" '-' 721s | token: '' "ase" '-' "sah" '' 721s | ike_alg_byname() failed: ESP encryption algorithm 'ase' is not recognized 721s | parsing 'aes-sah1' for ESP 721s | proposal: 'aes-sah1' 721s | token: '' '' "aes" '-' 721s | token: '' "aes" '-' "sah1" '' 721s | token: '-' "sah1" '' '' 721s | appending ESP encryption algorithm AES_CBC[_0] 721s | parsing integ: 721s | ike_alg_byname() failed: ESP integrity algorithm 'sah1' is not recognized 721s | lookup for integrity algorithm 'sah1' failed 721s | or - failed 'ESP integrity algorithm 'sah1' is not recognized') 721s | parsing 'id3' for ESP 721s | proposal: 'id3' 721s | token: '' '' "id3" '' 721s | token: '' "id3" '' '' 721s | ike_alg_byname() failed: ESP encryption algorithm 'id3' is not recognized 721s | ike_alg_byname() failed: ESP encryption algorithm 'id3' is not recognized 721s | parsing 'aes-id3' for ESP 721s | proposal: 'aes-id3' 721s | token: '' '' "aes" '-' 721s | token: '' "aes" '-' "id3" '' 721s | token: '-' "id3" '' '' 721s | appending ESP encryption algorithm AES_CBC[_0] 721s | parsing integ: 721s | ike_alg_byname() failed: ESP integrity algorithm 'id3' is not recognized 721s | lookup for integrity algorithm 'id3' failed 721s | or - failed 'ESP integrity algorithm 'id3' is not recognized') 721s | parsing 'aes_gcm-md5' for ESP 721s | proposal: 'aes_gcm-md5' 721s | token: '' '' "aes_gcm" '-' 721s | token: '' "aes_gcm" '-' "md5" '' 721s | token: '-' "md5" '' '' 721s | appending ESP encryption algorithm AES_GCM_16[_0] 721s | parsing integ: 721s | appending ESP integrity algorithm HMAC_MD5_96[_0] 721s | token: '' '' '' 721s | parsing 'mars' for ESP 721s | proposal: 'mars' 721s | token: '' '' "mars" '' 721s | token: '' "mars" '' '' 721s | ike_alg_byname() failed: ESP encryption algorithm 'mars' is not supported 721s | parsing 'aes_gcm-16' for ESP 721s | proposal: 'aes_gcm-16' 721s | token: '' '' "aes_gcm" '-' 721s | token: '' "aes_gcm" '-' "16" '' 721s | byname('aes_gcm') with ='16' failed: ESP encryption algorithm AES_GCM_16 with key length 16 invalid; valid key lengths: 128, 192, 256 721s | parsing 'aes_gcm-0' for ESP 721s | proposal: 'aes_gcm-0' 721s | token: '' '' "aes_gcm" '-' 721s | token: '' "aes_gcm" '-' "0" '' 721s | parsing 'aes_gcm-123456789012345' for ESP 721s | proposal: 'aes_gcm-123456789012345' 721s | token: '' '' "aes_gcm" '-' 721s | token: '' "aes_gcm" '-' "123456789012345" '' 721s | parsing '3des-sha1;dh22' for ESP 721s | proposal: '3des-sha1;dh22' 721s | token: '' '' "3des" '-' 721s | token: '' "3des" '-' "sha1" ';' 721s | token: '-' "sha1" ';' "dh22" '' 721s | appending ESP encryption algorithm 3DES_CBC[_0] 721s | parsing integ: 721s | appending ESP integrity algorithm HMAC_SHA1_96[_0] 721s | token: ';' "dh22" '' '' 721s | parsing dh: 721s | ike_alg_byname() failed: ESP DH algorithm 'dh22' is not supported 721s | lookup for DH algorithm 'dh22' failed 721s | ... failed 'ESP DH algorithm 'dh22' is not supported' 721s | parsing '3des-sha1;modp8192,3des-sha2' for ESP 721s | proposal: '3des-sha1;modp8192' 721s | token: '' '' "3des" '-' 721s | token: '' "3des" '-' "sha1" ';' 721s | token: '-' "sha1" ';' "modp8192" '' 721s | appending ESP encryption algorithm 3DES_CBC[_0] 721s | parsing integ: 721s | appending ESP integrity algorithm HMAC_SHA1_96[_0] 721s | token: ';' "modp8192" '' '' 721s | parsing dh: 721s | appending ESP DH algorithm MODP8192[_0] 721s | token: '' '' '' 721s | proposal: '3des-sha2' 721s | token: '' '' "3des" '-' 721s | token: '' "3des" '-' "sha2" '' 721s | token: '-' "sha2" '' '' 721s | appending ESP encryption algorithm 3DES_CBC[_0] 721s | parsing integ: 721s | appending ESP integrity algorithm HMAC_SHA2_256_128[_0] 721s | token: '' '' '' 721s ipsec algparse: ignoring ESP DH algorithm MODP8192 as PFS policy is disabled 721s | parsing '3des-sha1-modp8192,3des-sha2' for ESP 721s | proposal: '3des-sha1-modp8192' 721s | token: '' '' "3des" '-' 721s | token: '' "3des" '-' "sha1" '-' 721s | token: '-' "sha1" '-' "modp8192" '' 721s | appending ESP encryption algorithm 3DES_CBC[_0] 721s | parsing integ: 721s | appending ESP integrity algorithm HMAC_SHA1_96[_0] 721s | token: '-' "modp8192" '' '' 721s | parsing dh: 721s | appending ESP DH algorithm MODP8192[_0] 721s | token: '' '' '' 721s | proposal: '3des-sha2' 721s | token: '' '' "3des" '-' 721s | token: '' "3des" '-' "sha2" '' 721s | token: '-' "sha2" '' '' 721s | appending ESP encryption algorithm 3DES_CBC[_0] 721s | parsing integ: 721s | appending ESP integrity algorithm HMAC_SHA2_256_128[_0] 721s | token: '' '' '' 721s ipsec algparse: ignoring ESP DH algorithm MODP8192 as PFS policy is disabled 721s | parsing '3des-sha1-modp8192,3des-sha2-modp8192' for ESP 721s | proposal: '3des-sha1-modp8192' 721s | token: '' '' "3des" '-' 721s | token: '' "3des" '-' "sha1" '-' 721s | token: '-' "sha1" '-' "modp8192" '' 721s | appending ESP encryption algorithm 3DES_CBC[_0] 721s | parsing integ: 721s | appending ESP integrity algorithm HMAC_SHA1_96[_0] 721s | token: '-' "modp8192" '' '' 721s | parsing dh: 721s | appending ESP DH algorithm MODP8192[_0] 721s | token: '' '' '' 721s | proposal: '3des-sha2-modp8192' 721s | token: '' '' "3des" '-' 721s | token: '' "3des" '-' "sha2" '-' 721s | token: '-' "sha2" '-' "modp8192" '' 721s | appending ESP encryption algorithm 3DES_CBC[_0] 721s | parsing integ: 721s | appending ESP integrity algorithm HMAC_SHA2_256_128[_0] 721s | token: '-' "modp8192" '' '' 721s | parsing dh: 721s | appending ESP DH algorithm MODP8192[_0] 721s | token: '' '' '' 721s ipsec algparse: ignoring ESP DH algorithm MODP8192 as PFS policy is disabled 721s ipsec algparse: ignoring ESP DH algorithm MODP8192 as PFS policy is disabled 721s | parsing '3des-sha1-modp8192,3des-sha2;modp8192' for ESP 721s | proposal: '3des-sha1-modp8192' 721s | token: '' '' "3des" '-' 721s | token: '' "3des" '-' "sha1" '-' 721s | token: '-' "sha1" '-' "modp8192" '' 721s | appending ESP encryption algorithm 3DES_CBC[_0] 721s | parsing integ: 721s | appending ESP integrity algorithm HMAC_SHA1_96[_0] 721s | token: '-' "modp8192" '' '' 721s | parsing dh: 721s | appending ESP DH algorithm MODP8192[_0] 721s | token: '' '' '' 721s | proposal: '3des-sha2;modp8192' 721s | token: '' '' "3des" '-' 721s | token: '' "3des" '-' "sha2" ';' 721s | token: '-' "sha2" ';' "modp8192" '' 721s | appending ESP encryption algorithm 3DES_CBC[_0] 721s | parsing integ: 721s | appending ESP integrity algorithm HMAC_SHA2_256_128[_0] 721s | token: ';' "modp8192" '' '' 721s | parsing dh: 721s | appending ESP DH algorithm MODP8192[_0] 721s | token: '' '' '' 721s ipsec algparse: ignoring ESP DH algorithm MODP8192 as PFS policy is disabled 721s ipsec algparse: ignoring ESP DH algorithm MODP8192 as PFS policy is disabled 721s | parsing '3des-sha1;modp8192,3des-sha2-modp8192' for ESP 721s | proposal: '3des-sha1;modp8192' 721s | token: '' '' "3des" '-' 721s | token: '' "3des" '-' "sha1" ';' 721s | token: '-' "sha1" ';' "modp8192" '' 721s | appending ESP encryption algorithm 3DES_CBC[_0] 721s | parsing integ: 721s | appending ESP integrity algorithm HMAC_SHA1_96[_0] 721s | token: ';' "modp8192" '' '' 721s | parsing dh: 721s | appending ESP DH algorithm MODP8192[_0] 721s | token: '' '' '' 721s | proposal: '3des-sha2-modp8192' 721s | token: '' '' "3des" '-' 721s | token: '' "3des" '-' "sha2" '-' 721s | token: '-' "sha2" '-' "modp8192" '' 721s | appending ESP encryption algorithm 3DES_CBC[_0] 721s | parsing integ: 721s | appending ESP integrity algorithm HMAC_SHA2_256_128[_0] 721s | token: '-' "modp8192" '' '' 721s | parsing dh: 721s | appending ESP DH algorithm MODP8192[_0] 721s | token: '' '' '' 721s ipsec algparse: ignoring ESP DH algorithm MODP8192 as PFS policy is disabled 721s ipsec algparse: ignoring ESP DH algorithm MODP8192 as PFS policy is disabled 721s | parsing '3des-sha1;modp8192,3des-sha2;modp8192' for ESP 721s | proposal: '3des-sha1;modp8192' 721s | token: '' '' "3des" '-' 721s | token: '' "3des" '-' "sha1" ';' 721s | token: '-' "sha1" ';' "modp8192" '' 721s | appending ESP encryption algorithm 3DES_CBC[_0] 721s | parsing integ: 721s | appending ESP integrity algorithm HMAC_SHA1_96[_0] 721s | token: ';' "modp8192" '' '' 721s | parsing dh: 721s | appending ESP DH algorithm MODP8192[_0] 721s | token: '' '' '' 721s | proposal: '3des-sha2;modp8192' 721s | token: '' '' "3des" '-' 721s | token: '' "3des" '-' "sha2" ';' 721s | token: '-' "sha2" ';' "modp8192" '' 721s | appending ESP encryption algorithm 3DES_CBC[_0] 721s | parsing integ: 721s | appending ESP integrity algorithm HMAC_SHA2_256_128[_0] 721s | token: ';' "modp8192" '' '' 721s | parsing dh: 721s | appending ESP DH algorithm MODP8192[_0] 721s | token: '' '' '' 721s ipsec algparse: ignoring ESP DH algorithm MODP8192 as PFS policy is disabled 721s ipsec algparse: ignoring ESP DH algorithm MODP8192 as PFS policy is disabled 721s | parsing '3des-sha1-modp8192,3des-sha2-modp2048' for ESP 721s | proposal: '3des-sha1-modp8192' 721s | token: '' '' "3des" '-' 721s | token: '' "3des" '-' "sha1" '-' 721s | token: '-' "sha1" '-' "modp8192" '' 721s | appending ESP encryption algorithm 3DES_CBC[_0] 721s | parsing integ: 721s | appending ESP integrity algorithm HMAC_SHA1_96[_0] 721s | token: '-' "modp8192" '' '' 721s | parsing dh: 721s | appending ESP DH algorithm MODP8192[_0] 721s | token: '' '' '' 721s | proposal: '3des-sha2-modp2048' 721s | token: '' '' "3des" '-' 721s | token: '' "3des" '-' "sha2" '-' 721s | token: '-' "sha2" '-' "modp2048" '' 721s | appending ESP encryption algorithm 3DES_CBC[_0] 721s | parsing integ: 721s | appending ESP integrity algorithm HMAC_SHA2_256_128[_0] 721s | token: '-' "modp2048" '' '' 721s | parsing dh: 721s | appending ESP DH algorithm MODP2048[_0] 721s | token: '' '' '' 721s ipsec algparse: ignoring ESP DH algorithm MODP8192 as PFS policy is disabled 721s ipsec algparse: ignoring ESP DH algorithm MODP2048 as PFS policy is disabled 721s | parsing 'SHA2_512_256,SHA2_256_128' for AH 721s | proposal: 'SHA2_512_256' 721s | token: '' '' "SHA2_512_256" '' 721s | token: '' "SHA2_512_256" '' '' 721s | parsing integ: 721s | appending AH integrity algorithm HMAC_SHA2_512_256[_0] 721s | token: '' '' '' 721s | proposal: 'SHA2_256_128' 721s | token: '' '' "SHA2_256_128" '' 721s | token: '' "SHA2_256_128" '' '' 721s | parsing integ: 721s | appending AH integrity algorithm HMAC_SHA2_256_128[_0] 721s | token: '' '' '' 721s | parsing '' for AH 721s | parsing 'md5' for AH 721s | proposal: 'md5' 721s | token: '' '' "md5" '' 721s | token: '' "md5" '' '' 721s | parsing integ: 721s | appending AH integrity algorithm HMAC_MD5_96[_0] 721s | token: '' '' '' 721s | parsing 'sha' for AH 721s | proposal: 'sha' 721s | token: '' '' "sha" '' 721s | token: '' "sha" '' '' 721s | parsing integ: 721s | appending AH integrity algorithm HMAC_SHA1_96[_0] 721s | token: '' '' '' 721s | parsing 'sha;modp2048' for AH 721s | proposal: 'sha;modp2048' 721s | token: '' '' "sha" ';' 721s | token: '' "sha" ';' "modp2048" '' 721s | parsing integ: 721s | appending AH integrity algorithm HMAC_SHA1_96[_0] 721s | token: ';' "modp2048" '' '' 721s | parsing dh: 721s | appending AH DH algorithm MODP2048[_0] 721s | token: '' '' '' 721s ipsec algparse: ignoring AH DH algorithm MODP2048 as PFS policy is disabled 721s | parsing 'sha1' for AH 721s | proposal: 'sha1' 721s | token: '' '' "sha1" '' 721s | token: '' "sha1" '' '' 721s | parsing integ: 721s | appending AH integrity algorithm HMAC_SHA1_96[_0] 721s | token: '' '' '' 721s | parsing 'sha2' for AH 721s | proposal: 'sha2' 721s | token: '' '' "sha2" '' 721s | token: '' "sha2" '' '' 721s | parsing integ: 721s | appending AH integrity algorithm HMAC_SHA2_256_128[_0] 721s | token: '' '' '' 721s | parsing 'sha256' for AH 721s | proposal: 'sha256' 721s | token: '' '' "sha256" '' 721s | token: '' "sha256" '' '' 721s | parsing integ: 721s | appending AH integrity algorithm HMAC_SHA2_256_128[_0] 721s | token: '' '' '' 721s | parsing 'sha384' for AH 721s | proposal: 'sha384' 721s | token: '' '' "sha384" '' 721s | token: '' "sha384" '' '' 721s | parsing integ: 721s | appending AH integrity algorithm HMAC_SHA2_384_192[_0] 721s | token: '' '' '' 721s | parsing 'sha512' for AH 721s | proposal: 'sha512' 721s | token: '' '' "sha512" '' 721s | token: '' "sha512" '' '' 721s | parsing integ: 721s | appending AH integrity algorithm HMAC_SHA2_512_256[_0] 721s | token: '' '' '' 721s | parsing 'sha2_256' for AH 721s | proposal: 'sha2_256' 721s | token: '' '' "sha2_256" '' 721s | token: '' "sha2_256" '' '' 721s | parsing integ: 721s | appending AH integrity algorithm HMAC_SHA2_256_128[_0] 721s | token: '' '' '' 721s | parsing 'sha2_384' for AH 721s | proposal: 'sha2_384' 721s | token: '' '' "sha2_384" '' 721s | token: '' "sha2_384" '' '' 721s | parsing integ: 721s | appending AH integrity algorithm HMAC_SHA2_384_192[_0] 721s | token: '' '' '' 721s | parsing 'sha2_512' for AH 721s | proposal: 'sha2_512' 721s | token: '' '' "sha2_512" '' 721s | token: '' "sha2_512" '' '' 721s | parsing integ: 721s | appending AH integrity algorithm HMAC_SHA2_512_256[_0] 721s | token: '' '' '' 721s | parsing 'aes_xcbc' for AH 721s | proposal: 'aes_xcbc' 721s | token: '' '' "aes_xcbc" '' 721s | token: '' "aes_xcbc" '' '' 721s | parsing integ: 721s | appending AH integrity algorithm AES_XCBC_96[_0] 721s | token: '' '' '' 721s | parsing 'sha2-none' for AH 721s | proposal: 'sha2-none' 721s | token: '' '' "sha2" '-' 721s | token: '' "sha2" '-' "none" '' 721s | parsing integ: 721s | appending AH integrity algorithm HMAC_SHA2_256_128[_0] 721s | token: '-' "none" '' '' 721s | parsing dh: 721s | appending AH DH algorithm NONE[_0] 721s | token: '' '' '' 721s ipsec algparse: ignoring redundant AH DH algorithm NONE as PFS policy is disabled 721s ERROR: AH integrity algorithm 'aes_ccm' is not recognized 721s algparse -v2 'ah=ripemd' (expect ERROR) 721s ERROR: AH integrity algorithm 'ripemd' is not recognized 721s algparse -v2 'ike' (expect SUCCESS) 721s AES_GCM_16_256-HMAC_SHA2_512+HMAC_SHA2_256-DH19+DH20+DH21+DH31+MODP4096+MODP3072+MODP2048+MODP8192 721s AES_GCM_16_128-HMAC_SHA2_512+HMAC_SHA2_256-DH19+DH20+DH21+DH31+MODP4096+MODP3072+MODP2048+MODP8192 721s CHACHA20_POLY1305-HMAC_SHA2_512+HMAC_SHA2_256-DH19+DH20+DH21+DH31+MODP4096+MODP3072+MODP2048+MODP8192 721s AES_CBC_256-HMAC_SHA2_512+HMAC_SHA2_256-DH19+DH20+DH21+DH31+MODP4096+MODP3072+MODP2048+MODP8192 721s AES_CBC_128-HMAC_SHA2_512+HMAC_SHA2_256-DH19+DH20+DH21+DH31+MODP4096+MODP3072+MODP2048+MODP8192 721s algparse -v2 'ike=' (expect ERROR) 721s ERROR: IKE proposal is empty 721s algparse -v2 'ike=3des-sha1' (expect SUCCESS) 721s 3DES_CBC-HMAC_SHA1-DH19+DH20+DH21+DH31+MODP4096+MODP3072+MODP2048+MODP8192 721s algparse -v2 'ike=3des-sha1' (expect SUCCESS) 721s 3DES_CBC-HMAC_SHA1-DH19+DH20+DH21+DH31+MODP4096+MODP3072+MODP2048+MODP8192 721s algparse -v2 'ike=3des-sha1;modp1536' (expect SUCCESS) 721s 3DES_CBC-HMAC_SHA1-MODP1536 721s algparse -v2 'ike=3des;dh21' (expect SUCCESS) 721s 3DES_CBC-HMAC_SHA2_512+HMAC_SHA2_256-DH21 721s algparse -v2 'ike=3des-sha1;dh21' (expect SUCCESS) 721s 3DES_CBC-HMAC_SHA1-DH21 721s algparse -v2 'ike=3des-sha1-ecp_521' (expect SUCCESS) 721s 3DES_CBC-HMAC_SHA1-DH21 721s algparse -v2 'ike=3des+aes' (expect SUCCESS) 721s 3DES_CBC+AES_CBC-HMAC_SHA2_512+HMAC_SHA2_256-DH19+DH20+DH21+DH31+MODP4096+MODP3072+MODP2048+MODP8192 721s algparse -v2 'ike=aes;none' (expect ERROR) 721s ERROR: IKE DH algorithm 'none' not permitted 721s algparse -v2 'ike=id2' (expect ERROR) 721s ERROR: IKE encryption algorithm 'id2' is not recognized 721s algparse -v2 'ike=3des-id2' (expect ERROR) 721s ERROR: IKE PRF algorithm 'id2' is not recognized 721s algparse -v2 'ike=aes_ccm' (expect ERROR) 721s ERROR: IKE encryption algorithm 'aes_ccm' is not supported 721s algparse -v2 'ike=aes-sha1-sha2-ecp_521' (expect ERROR) 721s | parsing 'sha2;none' for AH 721s | proposal: 'sha2;none' 721s | token: '' '' "sha2" ';' 721s | token: '' "sha2" ';' "none" '' 721s | parsing integ: 721s | appending AH integrity algorithm HMAC_SHA2_256_128[_0] 721s | token: ';' "none" '' '' 721s | parsing dh: 721s | appending AH DH algorithm NONE[_0] 721s | token: '' '' '' 721s ipsec algparse: ignoring redundant AH DH algorithm NONE as PFS policy is disabled 721s | parsing 'sha1-modp8192,sha1-modp8192,sha1-modp8192' for AH 721s | proposal: 'sha1-modp8192' 721s | token: '' '' "sha1" '-' 721s | token: '' "sha1" '-' "modp8192" '' 721s | parsing integ: 721s | appending AH integrity algorithm HMAC_SHA1_96[_0] 721s | token: '-' "modp8192" '' '' 721s | parsing dh: 721s | appending AH DH algorithm MODP8192[_0] 721s | token: '' '' '' 721s | proposal: 'sha1-modp8192' 721s | token: '' '' "sha1" '-' 721s | token: '' "sha1" '-' "modp8192" '' 721s | parsing integ: 721s | appending AH integrity algorithm HMAC_SHA1_96[_0] 721s | token: '-' "modp8192" '' '' 721s | parsing dh: 721s | appending AH DH algorithm MODP8192[_0] 721s | token: '' '' '' 721s | proposal: 'sha1-modp8192' 721s | token: '' '' "sha1" '-' 721s | token: '' "sha1" '-' "modp8192" '' 721s | parsing integ: 721s | appending AH integrity algorithm HMAC_SHA1_96[_0] 721s | token: '-' "modp8192" '' '' 721s | parsing dh: 721s | appending AH DH algorithm MODP8192[_0] 721s | token: '' '' '' 721s ipsec algparse: ignoring AH DH algorithm MODP8192 as PFS policy is disabled 721s | parsing 'aes-sha1' for AH 721s | proposal: 'aes-sha1' 721s | token: '' '' "aes" '-' 721s | token: '' "aes" '-' "sha1" '' 721s | parsing integ: 721s | ike_alg_byname() failed: AH integrity algorithm 'aes' is not recognized 721s | lookup for integrity algorithm 'aes' failed 721s | or - failed 'AH integrity algorithm 'aes' is not recognized') 721s | parsing 'vanityhash1' for AH 721s | proposal: 'vanityhash1' 721s | token: '' '' "vanityhash1" '' 721s | token: '' "vanityhash1" '' '' 721s | parsing integ: 721s | ike_alg_byname() failed: AH integrity algorithm 'vanityhash1' is not recognized 721s | lookup for integrity algorithm 'vanityhash1' failed 721s | or - failed 'AH integrity algorithm 'vanityhash1' is not recognized') 721s | parsing 'aes_gcm_c-256' for AH 721s | proposal: 'aes_gcm_c-256' 721s | token: '' '' "aes_gcm_c" '-' 721s | token: '' "aes_gcm_c" '-' "256" '' 721s | parsing integ: 721s | ike_alg_byname() failed: AH integrity algorithm 'aes_gcm_c' is not recognized 721s | lookup for integrity algorithm 'aes_gcm_c' failed 721s | or - failed 'AH integrity algorithm 'aes_gcm_c' is not recognized') 721s | parsing 'id3' for AH 721s | proposal: 'id3' 721s | token: '' '' "id3" '' 721s | token: '' "id3" '' '' 721s | parsing integ: 721s | ike_alg_byname() failed: AH integrity algorithm 'id3' is not recognized 721s | lookup for integrity algorithm 'id3' failed 721s | or - failed 'AH integrity algorithm 'id3' is not recognized') 721s | parsing '3des' for AH 721s | proposal: '3des' 721s | token: '' '' "3des" '' 721s | token: '' "3des" '' '' 721s | parsing integ: 721s | ike_alg_byname() failed: AH integrity algorithm '3des' is not recognized 721s | lookup for integrity algorithm '3des' failed 721s | or - failed 'AH integrity algorithm '3des' is not recognized') 721s | parsing 'null' for AH 721s | proposal: 'null' 721s | token: '' '' "null" '' 721s | token: '' "null" '' '' 721s | parsing integ: 721s | appending AH integrity algorithm NONE[_0] 721s | token: '' '' '' 721s | parsing 'aes_gcm' for AH 721s | proposal: 'aes_gcm' 721s | token: '' '' "aes_gcm" '' 721s | token: '' "aes_gcm" '' '' 721s | parsing integ: 721s | ike_alg_byname() failed: AH integrity algorithm 'aes_gcm' is not recognized 721s | lookup for integrity algorithm 'aes_gcm' failed 721s | or - failed 'AH integrity algorithm 'aes_gcm' is not recognized') 721s | parsing 'aes_ccm' for AH 721s | proposal: 'aes_ccm' 721s | token: '' '' "aes_ccm" '' 721s | token: '' "aes_ccm" '' '' 721s | parsing integ: 721s | ike_alg_byname() failed: AH integrity algorithm 'aes_ccm' is not recognized 721s | lookup for integrity algorithm 'aes_ccm' failed 721s | or - failed 'AH integrity algorithm 'aes_ccm' is not recognized') 721s | parsing 'ripemd' for AH 721s | proposal: 'ripemd' 721s | token: '' '' "ripemd" '' 721s | token: '' "ripemd" '' '' 721s | parsing integ: 721s | ike_alg_byname() failed: AH integrity algorithm 'ripemd' is not recognized 721s | lookup for integrity algorithm 'ripemd' failed 721s | or - failed 'AH integrity algorithm 'ripemd' is not recognized') 721s | parsing 'AES_GCM_16_256,AES_GCM_16_128,CHACHA20_POLY1305,AES_CBC_256,AES_CBC_128' for IKE 721s | proposal: 'AES_GCM_16_256' 721s | token: '' '' "AES_GCM_16_256" '' 721s | token: '' "AES_GCM_16_256" '' '' 721s | ike_alg_byname() failed: IKE encryption algorithm 'AES_GCM_16_256' is not recognized 721s | token: '' '' '' 721s | appending IKE encryption algorithm AES_GCM_16[_256] 721s | appending IKE PRF algorithm HMAC_SHA2_512[_0] 721s | appending IKE PRF algorithm HMAC_SHA2_256[_0] 721s | appending IKE integrity algorithm NONE[_0] 721s | appending IKE DH algorithm DH19[_0] 721s | appending IKE DH algorithm DH20[_0] 721s | appending IKE DH algorithm DH21[_0] 721s | appending IKE DH algorithm DH31[_0] 721s | appending IKE DH algorithm MODP4096[_0] 721s | appending IKE DH algorithm MODP3072[_0] 721s | appending IKE DH algorithm MODP2048[_0] 721s | appending IKE DH algorithm MODP8192[_0] 721s | proposal: 'AES_GCM_16_128' 721s | token: '' '' "AES_GCM_16_128" '' 721s | token: '' "AES_GCM_16_128" '' '' 721s | ike_alg_byname() failed: IKE encryption algorithm 'AES_GCM_16_128' is not recognized 721s | token: '' '' '' 721s | appending IKE encryption algorithm AES_GCM_16[_128] 721s | appending IKE PRF algorithm HMAC_SHA2_512[_0] 721s | appending IKE PRF algorithm HMAC_SHA2_256[_0] 721s | appending IKE integrity algorithm NONE[_0] 721s | appending IKE DH algorithm DH19[_0] 721s | appending IKE DH algorithm DH20[_0] 721s | appending IKE DH algorithm DH21[_0] 721s | appending IKE DH algorithm DH31[_0] 721s | appending IKE DH algorithm MODP4096[_0] 721s | appending IKE DH algorithm MODP3072[_0] 721s | appending IKE DH algorithm MODP2048[_0] 721s | appending IKE DH algorithm MODP8192[_0] 721s | proposal: 'CHACHA20_POLY1305' 721s | token: '' '' "CHACHA20_POLY1305" '' 721s | token: '' "CHACHA20_POLY1305" '' '' 721s | token: '' '' '' 721s | appending IKE encryption algorithm CHACHA20_POLY1305[_0] 721s | appending IKE PRF algorithm HMAC_SHA2_512[_0] 721s | appending IKE PRF algorithm HMAC_SHA2_256[_0] 721s | appending IKE integrity algorithm NONE[_0] 721s | appending IKE DH algorithm DH19[_0] 721s | appending IKE DH algorithm DH20[_0] 721s | appending IKE DH algorithm DH21[_0] 721s | appending IKE DH algorithm DH31[_0] 721s | appending IKE DH algorithm MODP4096[_0] 721s | appending IKE DH algorithm MODP3072[_0] 721s | appending IKE DH algorithm MODP2048[_0] 721s | appending IKE DH algorithm MODP8192[_0] 721s | proposal: 'AES_CBC_256' 721s | token: '' '' "AES_CBC_256" '' 721s | token: '' "AES_CBC_256" '' '' 721s | ike_alg_byname() failed: IKE encryption algorithm 'AES_CBC_256' is not recognized 721s | token: '' '' '' 721s | appending IKE encryption algorithm AES_CBC[_256] 721s | appending IKE PRF algorithm HMAC_SHA2_512[_0] 721s | appending IKE PRF algorithm HMAC_SHA2_256[_0] 721s | appending IKE integrity algorithm HMAC_SHA2_512_256[_0] 721s | appending IKE integrity algorithm HMAC_SHA2_256_128[_0] 721s | appending IKE DH algorithm DH19[_0] 721s | appending IKE DH algorithm DH20[_0] 721s | appending IKE DH algorithm DH21[_0] 721s | appending IKE DH algorithm DH31[_0] 721s | appending IKE DH algorithm MODP4096[_0] 721s | appending IKE DH algorithm MODP3072[_0] 721s | appending IKE DH algorithm MODP2048[_0] 721s | appending IKE DH algorithm MODP8192[_0] 721s | proposal: 'AES_CBC_128' 721s | token: '' '' "AES_CBC_128" '' 721s | token: '' "AES_CBC_128" '' '' 721s | ike_alg_byname() failed: IKE encryption algorithm 'AES_CBC_128' is not recognized 721s | token: '' '' '' 721s | appending IKE encryption algorithm AES_CBC[_128] 721s | appending IKE PRF algorithm HMAC_SHA2_512[_0] 721s | appending IKE PRF algorithm HMAC_SHA2_256[_0] 721s | appending IKE integrity algorithm HMAC_SHA2_512_256[_0] 721s | appending IKE integrity algorithm HMAC_SHA2_256_128[_0] 721s | appending IKE DH algorithm DH19[_0] 721s | appending IKE DH algorithm DH20[_0] 721s | appending IKE DH algorithm DH21[_0] 721s | appending IKE DH algorithm DH31[_0] 721s | appending IKE DH algorithm MODP4096[_0] 721s | appending IKE DH algorithm MODP3072[_0] 721s | appe ERROR: IKE DH algorithm 'sha2' is not recognized 721s algparse -v2 'ike=aes-sha2-sha2;ecp_521' (expect ERROR) 721s ERROR: IKE DH algorithm 'sha2' is not recognized 721s algparse -v2 'ike=aes-sha1_96-sha2-ecp_521' (expect SUCCESS) 721s AES_CBC-HMAC_SHA1_96-HMAC_SHA2_256-DH21 721s algparse -v2 'ike=aes-sha1_96-sha2;ecp_521' (expect SUCCESS) 721s AES_CBC-HMAC_SHA1_96-HMAC_SHA2_256-DH21 721s algparse -v2 'ike=aes+aes-sha1+sha1-modp8192+modp8192' (expect SUCCESS) 721s AES_CBC-HMAC_SHA1-MODP8192 721s algparse -v2 'ike=3des+aes+aes-sha2+sha1+sha1-modp4096+modp8192+modp8192' (expect SUCCESS) 721s 3DES_CBC+AES_CBC-HMAC_SHA2_256+HMAC_SHA1-MODP4096+MODP8192 721s algparse -v2 'ike=aes+3des+aes-sha1+sha2+sha1-modp8192+modp4096+modp8192' (expect SUCCESS) 721s AES_CBC+3DES_CBC-HMAC_SHA1+HMAC_SHA2_256-MODP8192+MODP4096 721s algparse -v2 'ike=aes+aes+3des-sha1+sha1+sha2-modp8192+modp8192+modp4096' (expect SUCCESS) 721s AES_CBC+3DES_CBC-HMAC_SHA1+HMAC_SHA2_256-MODP8192+MODP4096 721s algparse -v2 'ike=aes+aes128+aes256' (expect SUCCESS) 721s AES_CBC-HMAC_SHA2_512+HMAC_SHA2_256-DH19+DH20+DH21+DH31+MODP4096+MODP3072+MODP2048+MODP8192 721s algparse -v2 'ike=aes128+aes+aes256' (expect SUCCESS) 721s AES_CBC_128+AES_CBC-HMAC_SHA2_512+HMAC_SHA2_256-DH19+DH20+DH21+DH31+MODP4096+MODP3072+MODP2048+MODP8192 721s algparse -v2 'ike=aes128+aes256+aes' (expect SUCCESS) 721s AES_CBC_128+AES_CBC_256+AES_CBC-HMAC_SHA2_512+HMAC_SHA2_256-DH19+DH20+DH21+DH31+MODP4096+MODP3072+MODP2048+MODP8192 721s algparse -v2 'ike=aes-sha1-modp8192,aes-sha1-modp8192,aes-sha1-modp8192' (expect SUCCESS) 721s AES_CBC-HMAC_SHA1-MODP8192 721s algparse -v2 'ike=aes-sha1-modp8192,aes-sha2-modp8192,aes-sha1-modp8192' (expect SUCCESS) 721s AES_CBC-HMAC_SHA1-MODP8192 721s AES_CBC-HMAC_SHA2_256-MODP8192 721s algparse -v2 'ike=aes_gcm' (expect SUCCESS) 721s AES_GCM_16-HMAC_SHA2_512+HMAC_SHA2_256-DH19+DH20+DH21+DH31+MODP4096+MODP3072+MODP2048+MODP8192 721s algparse -v2 'ike=aes_gcm-sha2' (expect SUCCESS) 721s AES_GCM_16-HMAC_SHA2_256-DH19+DH20+DH21+DH31+MODP4096+MODP3072+MODP2048+MODP8192 721s algparse -v2 'ike=aes_gcm-sha2-modp2048' (expect SUCCESS) 721s AES_GCM_16-HMAC_SHA2_256-MODP2048 721s algparse -v2 'ike=aes_gcm-sha2;modp2048' (expect SUCCESS) 721s AES_GCM_16-HMAC_SHA2_256-MODP2048 721s algparse -v2 'ike=aes_gcm-modp2048' (expect ERROR) 721s ERROR: IKE PRF algorithm 'modp2048' is not recognized 721s algparse -v2 'ike=aes_gcm;modp2048' (expect SUCCESS) 721s AES_GCM_16-HMAC_SHA2_512+HMAC_SHA2_256-MODP2048 721s algparse -v2 'ike=aes_gcm-none' (expect SUCCESS) 721s AES_GCM_16-HMAC_SHA2_512+HMAC_SHA2_256-DH19+DH20+DH21+DH31+MODP4096+MODP3072+MODP2048+MODP8192 721s algparse -v2 'ike=aes_gcm-none-sha2' (expect SUCCESS) 721s AES_GCM_16-HMAC_SHA2_256-DH19+DH20+DH21+DH31+MODP4096+MODP3072+MODP2048+MODP8192 721s algparse -v2 'ike=aes_gcm-none-sha2-modp2048' (expect SUCCESS) 721s AES_GCM_16-HMAC_SHA2_256-MODP2048 721s algparse -v2 'ike=aes_gcm-none-sha2;modp2048' (expect SUCCESS) 721s AES_GCM_16-HMAC_SHA2_256-MODP2048 721s algparse -v2 'ike=aes_gcm-none-modp2048' (expect ERROR) 721s ERROR: IKE PRF algorithm 'modp2048' is not recognized 721s algparse -v2 'ike=aes_gcm-none;modp2048' (expect SUCCESS) 721s AES_GCM_16-HMAC_SHA2_512+HMAC_SHA2_256-MODP2048 721s algparse -v2 'ike=aes_gcm-sha1-none-modp2048' (expect ERROR) 721s ERROR: IKE proposal contains unexpected 'modp2048' 721s algparse -v2 'ike=aes_gcm-sha1-none;modp2048' (expect ERROR) 721s ERROR: IKE proposal contains unexpected 'modp2048' 721s algparse -v2 'ike=aes+aes_gcm' (expect ERROR) 721s ERROR: AEAD and non-AEAD IKE encryption algorithm cannot be combined 721s algparse -v2 'ike=,' (expect ERROR) 721s ERROR: IKE encryption algorithm is empty 721s algparse -v2 'ike=aes,' (expect ERROR) 721s ERROR: IKE encryption algorithm is empty 721s algparse -v2 'ike=aes,,aes' (expect ERROR) 721s ERROR: IKE encryption algorithm is empty 721s algparse -v2 'ike=,aes' (expect ERROR) 721s ERROR: IKE encryption algorithm is empty 721s algparse -v2 'ike=-' (expect ERROR) 721s ERROR: IKE encryption algorithm is empty 721s algparse -v2 'ike=+' (expect ERROR) 721s ERROR: IKE encryption algorithm is empty 721s algparse -v2 'ike=;' (expect ERROR) 721s ERROR: IKE encryption algorithm is empty 721s algparse -v2 'ike=aes-' (expect ERROR) 721s ERROR: IKE PRF algorithm is empty 721s algparse -v2 'ike=aes+' (expect ERROR) 721s ERROR: IKE encryption algorithm is empty 721s algparse -v2 'ike=aes;' (expect ERROR) 721s ERROR: IKE DH algorithm is empty 721s algparse -v2 'ike=-aes' (expect ERROR) 721s ERROR: IKE encryption algorithm is empty 721s algparse -v2 'ike=+aes' (expect ERROR) 721s ERROR: IKE encryption algorithm is empty 721s algparse -v2 'ike=;aes' (expect ERROR) 721s ERROR: IKE encryption algorithm is empty 721s algparse -v2 'ike=aes+-' (expect ERROR) 721s ERROR: IKE encryption algorithm is empty 721s algparse -v2 'ike=aes+;' (expect ERROR) 721s ERROR: IKE encryption algorithm is empty 721s algparse -v2 'ike=aes++' (expect ERROR) 721s ERROR: IKE encryption algorithm is empty 721s testing -ta 721s nding IKE DH algorithm MODP2048[_0] 721s | appending IKE DH algorithm MODP8192[_0] 721s | parsing '' for IKE 721s | parsing '3des-sha1' for IKE 721s | proposal: '3des-sha1' 721s | token: '' '' "3des" '-' 721s | token: '' "3des" '-' "sha1" '' 721s | token: '-' "sha1" '' '' 721s | appending IKE encryption algorithm 3DES_CBC[_0] 721s | parsing prf: 721s | appending IKE PRF algorithm HMAC_SHA1[_0] 721s | token: '' '' '' 721s | - succeeded, advancing tokens 721s | appending IKE integrity algorithm HMAC_SHA1_96[_0] 721s | appending IKE DH algorithm DH19[_0] 721s | appending IKE DH algorithm DH20[_0] 721s | appending IKE DH algorithm DH21[_0] 721s | appending IKE DH algorithm DH31[_0] 721s | appending IKE DH algorithm MODP4096[_0] 721s | appending IKE DH algorithm MODP3072[_0] 721s | appending IKE DH algorithm MODP2048[_0] 721s | appending IKE DH algorithm MODP8192[_0] 721s | parsing '3des-sha1' for IKE 721s | proposal: '3des-sha1' 721s | token: '' '' "3des" '-' 721s | token: '' "3des" '-' "sha1" '' 721s | token: '-' "sha1" '' '' 721s | appending IKE encryption algorithm 3DES_CBC[_0] 721s | parsing prf: 721s | appending IKE PRF algorithm HMAC_SHA1[_0] 721s | token: '' '' '' 721s | - succeeded, advancing tokens 721s | appending IKE integrity algorithm HMAC_SHA1_96[_0] 721s | appending IKE DH algorithm DH19[_0] 721s | appending IKE DH algorithm DH20[_0] 721s | appending IKE DH algorithm DH21[_0] 721s | appending IKE DH algorithm DH31[_0] 721s | appending IKE DH algorithm MODP4096[_0] 721s | appending IKE DH algorithm MODP3072[_0] 721s | appending IKE DH algorithm MODP2048[_0] 721s | appending IKE DH algorithm MODP8192[_0] 721s | parsing '3des-sha1;modp1536' for IKE 721s | proposal: '3des-sha1;modp1536' 721s | token: '' '' "3des" '-' 721s | token: '' "3des" '-' "sha1" ';' 721s | token: '-' "sha1" ';' "modp1536" '' 721s | appending IKE encryption algorithm 3DES_CBC[_0] 721s | parsing prf: 721s | appending IKE PRF algorithm HMAC_SHA1[_0] 721s | token: ';' "modp1536" '' '' 721s | - succeeded, advancing tokens 721s | parsing dh: 721s | appending IKE DH algorithm MODP1536[_0] 721s | token: '' '' '' 721s | appending IKE integrity algorithm HMAC_SHA1_96[_0] 721s | parsing '3des;dh21' for IKE 721s | proposal: '3des;dh21' 721s | token: '' '' "3des" ';' 721s | token: '' "3des" ';' "dh21" '' 721s | token: ';' "dh21" '' '' 721s | appending IKE encryption algorithm 3DES_CBC[_0] 721s | parsing dh: 721s | appending IKE DH algorithm DH21[_0] 721s | token: '' '' '' 721s | appending IKE PRF algorithm HMAC_SHA2_512[_0] 721s | appending IKE PRF algorithm HMAC_SHA2_256[_0] 721s | appending IKE integrity algorithm HMAC_SHA2_512_256[_0] 721s | appending IKE integrity algorithm HMAC_SHA2_256_128[_0] 721s | parsing '3des-sha1;dh21' for IKE 721s | proposal: '3des-sha1;dh21' 721s | token: '' '' "3des" '-' 721s | token: '' "3des" '-' "sha1" ';' 721s | token: '-' "sha1" ';' "dh21" '' 721s | appending IKE encryption algorithm 3DES_CBC[_0] 721s | parsing prf: 721s | appending IKE PRF algorithm HMAC_SHA1[_0] 721s | token: ';' "dh21" '' '' 721s | - succeeded, advancing tokens 721s | parsing dh: 721s | appending IKE DH algorithm DH21[_0] 721s | token: '' '' '' 721s | appending IKE integrity algorithm HMAC_SHA1_96[_0] 721s | parsing '3des-sha1-ecp_521' for IKE 721s | proposal: '3des-sha1-ecp_521' 721s | token: '' '' "3des" '-' 721s | token: '' "3des" '-' "sha1" '-' 721s | token: '-' "sha1" '-' "ecp_521" '' 721s | appending IKE encryption algorithm 3DES_CBC[_0] 721s | parsing prf: 721s | appending IKE PRF algorithm HMAC_SHA1[_0] 721s | token: '-' "ecp_521" '' '' 721s | - succeeded, advancing tokens 721s | parsing dh: 721s | appending IKE DH algorithm DH21[_0] 721s | token: '' '' '' 721s | appending IKE integrity algorithm HMAC_SHA1_96[_0] 721s | parsing '3des+aes' for IKE 721s | proposal: '3des+aes' 721s | token: '' '' "3des" '+' 721s | token: '' "3des" '+' "aes" '' 721s | token: '+' "aes" '' '' 721s | appending IKE encryption algorithm 3DES_CBC[_0] 721s | token: '' '' '' 721s | appending IKE encryption algorithm AES_CBC[_0] 721s | appending IKE PRF algorithm HMAC_SHA2_512[_0] 721s | appending IKE PRF algorithm HMAC_SHA2_256[_0] 721s | appending IKE integrity algorithm HMAC_SHA2_512_256[_0] 721s | appending IKE integrity algorithm HMAC_SHA2_256_128[_0] 721s | appending IKE DH algorithm DH19[_0] 721s | appending IKE DH algorithm DH20[_0] 721s | appending IKE DH algorithm DH21[_0] 721s | appending IKE DH algorithm DH31[_0] 721s | appending IKE DH algorithm MODP4096[_0] 721s | appending IKE DH algorithm MODP3072[_0] 721s | appending IKE DH algorithm MODP2048[_0] 721s | appending IKE DH algorithm MODP8192[_0] 721s | parsing 'aes;none' for IKE 721s | proposal: 'aes;none' 721s | token: '' '' "aes" ';' 721s | token: '' "aes" ';' "none" '' 721s | token: ';' "none" '' '' 721s | appending IKE encryption algorithm AES_CBC[_0] 721s | parsing dh: 721s | appending IKE DH algorithm NONE[_0] 721s | token: '' '' '' 721s | appending IKE PRF algorithm HMAC_SHA2_512[_0] 721s | appending IKE PRF algorithm HMAC_SHA2_256[_0] 721s | appending IKE integrity algorithm HMAC_SHA2_512_256[_0] 721s | appending IKE integrity algorithm HMAC_SHA2_256_128[_0] 721s | parsing 'id2' for IKE 721s | proposal: 'id2' 721s | token: '' '' "id2" '' 721s | token: '' "id2" '' '' 721s | ike_alg_byname() failed: IKE encryption algorithm 'id2' is not recognized 721s | ike_alg_byname() failed: IKE encryption algorithm 'id2' is not recognized 721s | parsing '3des-id2' for IKE 721s | proposal: '3des-id2' 721s | token: '' '' "3des" '-' 721s | token: '' "3des" '-' "id2" '' 721s | token: '-' "id2" '' '' 721s | appending IKE encryption algorithm 3DES_CBC[_0] 721s | parsing prf: 721s | ike_alg_byname() failed: IKE PRF algorithm 'id2' is not recognized 721s | lookup for PRF algorithm 'id2' failed 721s | - failed, saving error 'IKE PRF algorithm 'id2' is not recognized' and tossing result 721s | parsing integ: 721s | ike_alg_byname() failed: IKE integrity algorithm 'id2' is not recognized 721s | lookup for integrity algorithm 'id2' failed 721s | - and - failed, returning earlier PRF error 'IKE PRF algorithm 'id2' is not recognized' and discarding INTEG error 'IKE integrity algorithm 'id2' is not recognized') 721s | parsing 'aes_ccm' for IKE 721s | proposal: 'aes_ccm' 721s | token: '' '' "aes_ccm" '' 721s | token: '' "aes_ccm" '' '' 721s | alg_byname_ok() failed: IKE encryption algorithm 'aes_ccm' is not supported 721s | parsing 'aes-sha1-sha2-ecp_521' for IKE 721s | proposal: 'aes-sha1-sha2-ecp_521' 721s | token: '' '' "aes" '-' 721s | token: '' "aes" '-' "sha1" '-' 721s | token: '-' "sha1" '-' "sha2" '-' 721s | appending IKE encryption algorithm AES_CBC[_0] 721s | parsing prf: 721s | appending IKE PRF algorithm HMAC_SHA1[_0] 721s | token: '-' "sha2" '-' "ecp_521" '' 721s | - succeeded, advancing tokens 721s | parsing dh: 721s | ike_alg_byname() failed: IKE DH algorithm 'sha2' is not recognized 721s | lookup for DH algorithm 'sha2' failed 721s | ... failed 'IKE DH algorithm 'sha2' is not recognized' 721s | parsing 'aes-sha2-sha2;ecp_521' for IKE 721s | proposal: 'aes-sha2-sha2;ecp_521' 721s | token: '' '' "aes" '-' 721s | token: '' "aes" '-' "sha2" '-' 721s | token: '-' "sha2" '-' "sha2" ';' 721s | appending IKE encryption algorithm AES_CBC[_0] 721s | parsing prf: 721s | appending IKE PRF algorithm HMAC_SHA2_256[_0] 721s | token: '-' "sha2" ';' "ecp_521" '' 721s | - succeeded, advancing tokens 721s | parsing dh: 721s | ike_alg_byname() failed: IKE DH algorithm 'sha2' is not recognized 721s | lookup for DH algorithm 'sha2' failed 721s | ... failed 'IKE DH algorithm 'sha2' is not recognized' 721s | parsing 'aes-sha1_96-sha2-ecp_521' for IKE 721s | proposal: 'aes-sha1_96-sha2-ecp_521' 721s | token: '' '' "aes" '-' 721s | token: '' "aes" '-' "sha1_96" '-' 721s | token: '-' "sha1_96" '-' "sha2" '-' 721s | appending IKE encryption algorithm AES_CBC[_0] 721s | parsing prf: 721s | ike_alg_byname() failed: IKE PRF algorithm 'sha1_96' is not recognized 721s | lookup for PRF algorithm 'sha1_96' failed 721s | - failed, saving error 'IKE PRF algorithm 'sha1_96' is not recognized' and tossing result 721s | parsing integ: 721s | appending IKE integrity algorithm HMAC_SHA1_96[_0] 721s | token: '-' "sha2" '-' "ecp_521" '' 721s | parsing prf: 721s | appending IKE PRF algorithm HMAC_SHA2_256[_0] 721s | token: '-' "ecp_521" '' '' 721s | parsing dh: 721s | appending IKE DH algorithm DH21[_0] 721s | token: '' '' '' 721s | parsing 'aes-sha1_96-sha2;ecp_521' for IKE 721s | proposal: 'aes-sha1_96-sha2;ecp_521' 721s | token: '' '' "aes" '-' 721s | token: '' "aes" '-' "sha1_96" '-' 721s | token: '-' "sha1_96" '-' "sha2" ';' 721s | appending IKE encryption algorithm AES_CBC[_0] 721s | parsing prf: 721s | ike_alg_byname() failed: IKE PRF algorithm 'sha1_96' is not recognized 721s | lookup for PRF algorithm 'sha1_96' failed 721s | - failed, saving error 'IKE PRF algorithm 'sha1_96' is not recognized' and tossing result 721s | parsing integ: 721s | appending IKE integrity algorithm HMAC_SHA1_96[_0] 721s | token: '-' "sha2" ';' "ecp_521" '' 721s | parsing prf: 721s | appending IKE PRF algorithm HMAC_SHA2_256[_0] 721s | token: ';' "ecp_521" '' '' 721s | parsing dh: 721s | appending IKE DH algorithm DH21[_0] 721s | token: '' '' '' 721s | parsing 'aes+aes-sha1+sha1-modp8192+modp8192' for IKE 721s | proposal: 'aes+aes-sha1+sha1-modp8192+modp8192' 721s | token: '' '' "aes" '+' 721s | token: '' "aes" '+' "aes" '-' 721s | token: '+' "aes" '-' "sha1" '+' 721s | appending IKE encryption algorithm AES_CBC[_0] 721s | token: '-' "sha1" '+' "sha1" '-' 721s | appending IKE encryption algorithm AES_CBC[_0] 721s ipsec algparse: discarding duplicate IKE encryption algorithm AES_CBC 721s | parsing prf: 721s | appending IKE PRF algorithm HMAC_SHA1[_0] 721s | token: '+' "sha1" '-' "modp8192" '+' 721s | appending IKE PRF algorithm HMAC_SHA1[_0] 721s | token: '-' "modp8192" '+' "modp8192" '' 721s ipsec algparse: discarding duplicate IKE PRF algorithm HMAC_SHA1 721s | - succeeded, advancing tokens 721s | parsing dh: 721s | appending IKE DH algorithm MODP8192[_0] 721s | token: '+' "modp8192" '' '' 721s | appending IKE DH algorithm MODP8192[_0] 721s | token: '' '' '' 721s ipsec algparse: discarding duplicate IKE DH algorithm MODP8192 721s | appending IKE integrity algorithm HMAC_SHA1_96[_0] 721s | parsing '3des+aes+aes-sha2+sha1+sha1-modp4096+modp8192+modp8192' for IKE 721s | proposal: '3des+aes+aes-sha2+sha1+sha1-modp4096+modp8192+modp8192' 721s | token: '' '' "3des" '+' 721s | token: '' "3des" '+' "aes" '+' 721s | token: '+' "aes" '+' "aes" '-' 721s | appending IKE encryption algorithm 3DES_CBC[_0] 721s | token: '+' "aes" '-' "sha2" '+' 721s | appending IKE encryption algorithm AES_CBC[_0] 721s | token: '-' "sha2" '+' "sha1" '+' 721s | appending IKE encryption algorithm AES_CBC[_0] 721s ipsec algparse: discarding duplicate IKE encryption algorithm AES_CBC 721s | parsing prf: 721s | appending IKE PRF algorithm HMAC_SHA2_256[_0] 721s | token: '+' "sha1" '+' "sha1" '-' 721s | appending IKE PRF algorithm HMAC_SHA1[_0] 721s | token: '+' "sha1" '-' "modp4096" '+' 721s | appending IKE PRF algorithm HMAC_SHA1[_0] 721s | token: '-' "modp4096" '+' "modp8192" '+' 721s ipsec algparse: discarding duplicate IKE PRF algorithm HMAC_SHA1 721s | - succeeded, advancing tokens 721s | parsing dh: 721s | appending IKE DH algorithm MODP4096[_0] 721s | token: '+' "modp8192" '+' "modp8192" '' 721s | appending IKE DH algorithm MODP8192[_0] 721s | token: '+' "modp8192" '' '' 721s | appending IKE DH algorithm MODP8192[_0] 721s | token: '' '' '' 721s ipsec algparse: discarding duplicate IKE DH algorithm MODP8192 721s | appending IKE integrity algorithm HMAC_SHA2_256_128[_0] 721s | appending IKE integrity algorithm HMAC_SHA1_96[_0] 721s | parsing 'aes+3des+aes-sha1+sha2+sha1-modp8192+modp4096+modp8192' for IKE 721s | proposal: 'aes+3des+aes-sha1+sha2+sha1-modp8192+modp4096+modp8192' 721s | token: '' '' "aes" '+' 721s | token: '' "aes" '+' "3des" '+' 721s | token: '+' "3des" '+' "aes" '-' 721s | appending IKE encryption algorithm AES_CBC[_0] 721s | token: '+' "aes" '-' "sha1" '+' 721s | appending IKE encryption algorithm 3DES_CBC[_0] 721s | token: '-' "sha1" '+' "sha2" '+' 721s | appending IKE encryption algorithm AES_CBC[_0] 721s ipsec algparse: discarding duplicate IKE encryption algorithm AES_CBC 721s | parsing prf: 721s | appending IKE PRF algorithm HMAC_SHA1[_0] 721s | token: '+' "sha2" '+' "sha1" '-' 721s | appending IKE PRF algorithm HMAC_SHA2_256[_0] 721s | token: '+' "sha1" '-' "modp8192" '+' 721s | appending IKE PRF algorithm HMAC_SHA1[_0] 721s | token: '-' "modp8192" '+' "modp4096" '+' 721s ipsec algparse: discarding duplicate IKE PRF algorithm HMAC_SHA1 721s | - succeeded, advancing tokens 721s | parsing dh: 721s | appending IKE DH algorithm MODP8192[_0] 721s | token: '+' "modp4096" '+' "modp8192" '' 721s | appending IKE DH algorithm MODP4096[_0] 721s | token: '+' "modp8192" '' '' 721s | appending IKE DH algorithm MODP8192[_0] 721s | token: '' '' '' 721s ipsec algparse: discarding duplicate IKE DH algorithm MODP8192 721s | appending IKE integrity algorithm HMAC_SHA1_96[_0] 721s | appending IKE integrity algorithm HMAC_SHA2_256_128[_0] 721s | parsing 'aes+aes+3des-sha1+sha1+sha2-modp8192+modp8192+modp4096' for IKE 721s | proposal: 'aes+aes+3des-sha1+sha1+sha2-modp8192+modp8192+modp4096' 721s | token: '' '' "aes" '+' 721s | token: '' "aes" '+' "aes" '+' 721s | token: '+' "aes" '+' "3des" '-' 721s | appending IKE encryption algorithm AES_CBC[_0] 721s | token: '+' "3des" '-' "sha1" '+' 721s | appending IKE encryption algorithm AES_CBC[_0] 721s | token: '-' "sha1" '+' "sha1" '+' 721s | appending IKE encryption algorithm 3DES_CBC[_0] 721s ipsec algparse: discarding duplicate IKE encryption algorithm AES_CBC 721s | parsing prf: 721s | appending IKE PRF algorithm HMAC_SHA1[_0] 721s | token: '+' "sha1" '+' "sha2" '-' 721s | appending IKE PRF algorithm HMAC_SHA1[_0] 721s | token: '+' "sha2" '-' "modp8192" '+' 721s | appending IKE PRF algorithm HMAC_SHA2_256[_0] 721s | token: '-' "modp8192" '+' "modp8192" '+' 721s ipsec algparse: discarding duplicate IKE PRF algorithm HMAC_SHA1 721s | - succeeded, advancing tokens 721s | parsing dh: 721s | appending IKE DH algorithm MODP8192[_0] 721s | token: '+' "modp8192" '+' "modp4096" '' 721s | appending IKE DH algorithm MODP8192[_0] 721s | token: '+' "modp4096" '' '' 721s | appending IKE DH algorithm MODP4096[_0] 721s | token: '' '' '' 721s ipsec algparse: discarding duplicate IKE DH algorithm MODP8192 721s | appending IKE integrity algorithm HMAC_SHA1_96[_0] 721s | appending IKE integrity algorithm HMAC_SHA2_256_128[_0] 721s | parsing 'aes+aes128+aes256' for IKE 721s | proposal: 'aes+aes128+aes256' 721s | token: '' '' "aes" '+' 721s | token: '' "aes" '+' "aes128" '+' 721s | token: '+' "aes128" '+' "aes256" '' 721s | appending IKE encryption algorithm AES_CBC[_0] 721s | ike_alg_byname() failed: IKE encryption algorithm 'aes128' is not recognized 721s | token: '+' "aes256" '' '' 721s | appending IKE encryption algorithm AES_CBC[_128] 721s | ike_alg_byname() failed: IKE encryption algorithm 'aes256' is not recognized 721s | token: '' '' '' 721s | appending IKE encryption algorithm AES_CBC[_256] 721s ipsec algparse: discarding duplicate IKE encryption algorithm AES_CBC_128 721s ipsec algparse: discarding duplicate IKE encryption algorithm AES_CBC_256 721s | appending IKE PRF algorithm HMAC_SHA2_512[_0] 721s | appending IKE PRF algorithm HMAC_SHA2_256[_0] 721s | appending IKE integrity algorithm HMAC_SHA2_512_256[_0] 721s | appending IKE integrity algorithm HMAC_SHA2_256_128[_0] 721s | appending IKE DH algorithm DH19[_0] 721s | appending IKE DH algorithm DH20[_0] 721s | appending IKE DH algorithm DH21[_0] 721s | appending IKE DH algorithm DH31[_0] 721s | appending IKE DH algorithm MODP4096[_0] 721s | appending IKE DH algorithm MODP3072[_0] 721s | appending IKE DH algorithm MODP2048[_0] 721s | appending IKE DH algorithm MODP8192[_0] 721s | parsing 'aes128+aes+aes256' for IKE 721s | proposal: 'aes128+aes+aes256' 721s | token: '' '' "aes128" '+' 721s | token: '' "aes128" '+' "aes" '+' 721s | ike_alg_byname() failed: IKE encryption algorithm 'aes128' is not recognized 721s | token: '+' "aes" '+' "aes256" '' 721s | appending IKE encryption algorithm AES_CBC[_128] 721s | token: '+' "aes256" '' '' 721s | appending IKE encryption algorithm AES_CBC[_0] 721s | ike_alg_byname() failed: IKE encryption algorithm 'aes256' is not recognized 721s | token: '' '' '' 721s | appending IKE encryption algorithm AES_CBC[_256] 721s ipsec algparse: discarding duplicate IKE encryption algorithm AES_CBC_256 721s | appending IKE PRF algorithm HMAC_SHA2_512[_0] 721s | appending IKE PRF algorithm HMAC_SHA2_256[_0] 721s | appending IKE integrity algorithm HMAC_SHA2_512_256[_0] 721s | appending IKE integrity algorithm HMAC_SHA2_256_128[_0] 721s | appending IKE DH algorithm DH19[_0] 721s | appending IKE DH algorithm DH20[_0] 721s | appending IKE DH algorithm DH21[_0] 721s | appending IKE DH algorithm DH31[_0] 721s | appending IKE DH algorithm MODP4096[_0] 721s | appending IKE DH algorithm MODP3072[_0] 721s | appending IKE DH algorithm MODP2048[_0] 721s | appending IKE DH algorithm MODP8192[_0] 721s | parsing 'aes128+aes256+aes' for IKE 721s | proposal: 'aes128+aes256+aes' 721s | token: '' '' "aes128" '+' 721s | token: '' "aes128" '+' "aes256" '+' 721s | ike_alg_byname() failed: IKE encryption algorithm 'aes128' is not recognized 721s | token: '+' "aes256" '+' "aes" '' 721s | appending IKE encryption algorithm AES_CBC[_128] 721s | ike_alg_byname() failed: IKE encryption algorithm 'aes256' is not recognized 721s | token: '+' "aes" '' '' 721s | appending IKE encryption algorithm AES_CBC[_256] 721s | token: '' '' '' 721s | appending IKE encryption algorithm AES_CBC[_0] 721s | appending IKE PRF algorithm HMAC_SHA2_512[_0] 721s | appending IKE PRF algorithm HMAC_SHA2_256[_0] 721s | appending IKE integrity algorithm HMAC_SHA2_512_256[_0] 721s | appending IKE integrity algorithm HMAC_SHA2_256_128[_0] 721s | appending IKE DH algorithm DH19[_0] 721s | appending IKE DH algorithm DH20[_0] 721s | appending IKE DH algorithm DH21[_0] 721s | appending IKE DH algorithm DH31[_0] 721s | appending IKE DH algorithm MODP4096[_0] 721s | appending IKE DH algorithm MODP3072[_0] 721s | appending IKE DH algorithm MODP2048[_0] 721s | appending IKE DH algorithm MODP8192[_0] 721s | parsing 'aes-sha1-modp8192,aes-sha1-modp8192,aes-sha1-modp8192' for IKE 721s | proposal: 'aes-sha1-modp8192' 721s | token: '' '' "aes" '-' 721s | token: '' "aes" '-' "sha1" '-' 721s | token: '-' "sha1" '-' "modp8192" '' 721s | appending IKE encryption algorithm AES_CBC[_0] 721s | parsing prf: 721s | appending IKE PRF algorithm HMAC_SHA1[_0] 721s | token: '-' "modp8192" '' '' 721s | - succeeded, advancing tokens 721s | parsing dh: 721s | appending IKE DH algorithm MODP8192[_0] 721s | token: '' '' '' 721s | appending IKE integrity algorithm HMAC_SHA1_96[_0] 721s | proposal: 'aes-sha1-modp8192' 721s | token: '' '' "aes" '-' 721s | token: '' "aes" '-' "sha1" '-' 721s | token: '-' "sha1" '-' "modp8192" '' 721s | appending IKE encryption algorithm AES_CBC[_0] 721s | parsing prf: 721s | appending IKE PRF algorithm HMAC_SHA1[_0] 721s | token: '-' "modp8192" '' '' 721s | - succeeded, advancing tokens 721s | parsing dh: 721s | appending IKE DH algorithm MODP8192[_0] 721s | token: '' '' '' 721s | appending IKE integrity algorithm HMAC_SHA1_96[_0] 721s | proposal: 'aes-sha1-modp8192' 721s | token: '' '' "aes" '-' 721s | token: '' "aes" '-' "sha1" '-' 721s | token: '-' "sha1" '-' "modp8192" '' 721s | appending IKE encryption algorithm AES_CBC[_0] 721s | parsing prf: 721s | appending IKE PRF algorithm HMAC_SHA1[_0] 721s | token: '-' "modp8192" '' '' 721s | - succeeded, advancing tokens 721s | parsing dh: 721s | appending IKE DH algorithm MODP8192[_0] 721s | token: '' '' '' 721s | appending IKE integrity algorithm HMAC_SHA1_96[_0] 721s | parsing 'aes-sha1-modp8192,aes-sha2-modp8192,aes-sha1-modp8192' for IKE 721s | proposal: 'aes-sha1-modp8192' 721s | token: '' '' "aes" '-' 721s | token: '' "aes" '-' "sha1" '-' 721s | token: '-' "sha1" '-' "modp8192" '' 721s | appending IKE encryption algorithm AES_CBC[_0] 721s | parsing prf: 721s | appending IKE PRF algorithm HMAC_SHA1[_0] 721s | token: '-' "modp8192" '' '' 721s | - succeeded, advancing tokens 721s | parsing dh: 721s | appending IKE DH algorithm MODP8192[_0] 721s | token: '' '' '' 721s | appending IKE integrity algorithm HMAC_SHA1_96[_0] 721s | proposal: 'aes-sha2-modp8192' 721s | token: '' '' "aes" '-' 721s | token: '' "aes" '-' "sha2" '-' 721s | token: '-' "sha2" '-' "modp8192" '' 721s | appending IKE encryption algorithm AES_CBC[_0] 721s | parsing prf: 721s | appending IKE PRF algorithm HMAC_SHA2_256[_0] 721s | token: '-' "modp8192" '' '' 721s | - succeeded, advancing tokens 721s | parsing dh: 721s | appending IKE DH algorithm MODP8192[_0] 721s | token: '' '' '' 721s | appending IKE integrity algorithm HMAC_SHA2_256_128[_0] 721s | proposal: 'aes-sha1-modp8192' 721s | token: '' '' "aes" '-' 721s | token: '' "aes" '-' "sha1" '-' 721s | token: '-' "sha1" '-' "modp8192" '' 721s | appending IKE encryption algorithm AES_CBC[_0] 721s | parsing prf: 721s | appending IKE PRF algorithm HMAC_SHA1[_0] 721s | token: '-' "modp8192" '' '' 721s | - succeeded, advancing tokens 721s | parsing dh: 721s | appending IKE DH algorithm MODP8192[_0] 721s | token: '' '' '' 721s | appending IKE integrity algorithm HMAC_SHA1_96[_0] 721s | parsing 'aes_gcm' for IKE 721s | proposal: 'aes_gcm' 721s | token: '' '' "aes_gcm" '' 721s | token: '' "aes_gcm" '' '' 721s | token: '' '' '' 721s | appending IKE encryption algorithm AES_GCM_16[_0] 721s | appending IKE PRF algorithm HMAC_SHA2_512[_0] 721s | appending IKE PRF algorithm HMAC_SHA2_256[_0] 721s | appending IKE integrity algorithm NONE[_0] 721s | appending IKE DH algorithm DH19[_0] 721s | appending IKE DH algorithm DH20[_0] 721s | appending IKE DH algorithm DH21[_0] 721s | appending IKE DH algorithm DH31[_0] 721s | appending IKE DH algorithm MODP4096[_0] 721s | appending IKE DH algorithm MODP3072[_0] 721s | appending IKE DH algorithm MODP2048[_0] 721s | appending IKE DH algorithm MODP8192[_0] 721s | parsing 'aes_gcm-sha2' for IKE 721s | proposal: 'aes_gcm-sha2' 721s | token: '' '' "aes_gcm" '-' 721s | token: '' "aes_gcm" '-' "sha2" '' 721s | token: '-' "sha2" '' '' 721s | appending IKE encryption algorithm AES_GCM_16[_0] 721s | parsing prf: 721s | appending IKE PRF algorithm HMAC_SHA2_256[_0] 721s | token: '' '' '' 721s | - succeeded, advancing tokens 721s | appending IKE integrity algorithm NONE[_0] 721s | appending IKE DH algorithm DH19[_0] 721s | appending IKE DH algorithm DH20[_0] 721s | appending IKE DH algorithm DH21[_0] 721s | appending IKE DH algorithm DH31[_0] 721s | appending IKE DH algorithm MODP4096[_0] 721s | appending IKE DH algorithm MODP3072[_0] 721s | appending IKE DH algorithm MODP2048[_0] 721s | appending IKE DH algorithm MODP8192[_0] 721s | parsing 'aes_gcm-sha2-modp2048' for IKE 721s | proposal: 'aes_gcm-sha2-modp2048' 721s | token: '' '' "aes_gcm" '-' 721s | token: '' "aes_gcm" '-' "sha2" '-' 721s | token: '-' "sha2" '-' "modp2048" '' 721s | appending IKE encryption algorithm AES_GCM_16[_0] 721s | parsing prf: 721s | appending IKE PRF algorithm HMAC_SHA2_256[_0] 721s | token: '-' "modp2048" '' '' 721s | - succeeded, advancing tokens 721s | parsing dh: 721s | appending IKE DH algorithm MODP2048[_0] 721s | token: '' '' '' 721s | appending IKE integrity algorithm NONE[_0] 721s | parsing 'aes_gcm-sha2;modp2048' for IKE 721s | proposal: 'aes_gcm-sha2;modp2048' 721s | token: '' '' "aes_gcm" '-' 721s | token: '' "aes_gcm" '-' "sha2" ';' 721s | token: '-' "sha2" ';' "modp2048" '' 721s | appending IKE encryption algorithm AES_GCM_16[_0] 721s | parsing prf: 721s | appending IKE PRF algorithm HMAC_SHA2_256[_0] 721s | token: ';' "modp2048" '' '' 721s | - succeeded, advancing tokens 721s | parsing dh: 721s | appending IKE DH algorithm MODP2048[_0] 721s | token: '' '' '' 721s | appending IKE integrity algorithm NONE[_0] 721s | parsing 'aes_gcm-modp2048' for IKE 721s | proposal: 'aes_gcm-modp2048' 721s | token: '' '' "aes_gcm" '-' 721s | token: '' "aes_gcm" '-' "modp2048" '' 721s | token: '-' "modp2048" '' '' 721s | appending IKE encryption algorithm AES_GCM_16[_0] 721s | parsing prf: 721s | ike_alg_byname() failed: IKE PRF algorithm 'modp2048' is not recognized 721s | lookup for PRF algorithm 'modp2048' failed 721s | - failed, saving error 'IKE PRF algorithm 'modp2048' is not recognized' and tossing result 721s | parsing integ: 721s | ike_alg_byname() failed: IKE integrity algorithm 'modp2048' is not recognized 721s | lookup for integrity algorithm 'modp2048' failed 721s | - and - failed, returning earlier PRF error 'IKE PRF algorithm 'modp2048' is not recognized' and discarding INTEG error 'IKE integrity algorithm 'modp2048' is not recognized') 721s | parsing 'aes_gcm;modp2048' for IKE 721s | proposal: 'aes_gcm;modp2048' 721s | token: '' '' "aes_gcm" ';' 721s | token: '' "aes_gcm" ';' "modp2048" '' 721s | token: ';' "modp2048" '' '' 721s | appending IKE encryption algorithm AES_GCM_16[_0] 721s | parsing dh: 721s | appending IKE DH algorithm MODP2048[_0] 721s | token: '' '' '' 721s | appending IKE PRF algorithm HMAC_SHA2_512[_0] 721s | appending IKE PRF algorithm HMAC_SHA2_256[_0] 721s | appending IKE integrity algorithm NONE[_0] 721s | parsing 'aes_gcm-none' for IKE 721s | proposal: 'aes_gcm-none' 721s | token: '' '' "aes_gcm" '-' 721s | token: '' "aes_gcm" '-' "none" '' 721s | token: '-' "none" '' '' 721s | appending IKE encryption algorithm AES_GCM_16[_0] 721s | parsing prf: 721s | ike_alg_byname() failed: IKE PRF algorithm 'none' is not recognized 721s | lookup for PRF algorithm 'none' failed 721s | - failed, saving error 'IKE PRF algorithm 'none' is not recognized' and tossing result 721s | parsing integ: 721s | appending IKE integrity algorithm NONE[_0] 721s | token: '' '' '' 721s | appending IKE PRF algorithm HMAC_SHA2_512[_0] 721s | appending IKE PRF algorithm HMAC_SHA2_256[_0] 721s | appending IKE DH algorithm DH19[_0] 721s | appending IKE DH algorithm DH20[_0] 721s | appending IKE DH algorithm DH21[_0] 721s | appending IKE DH algorithm DH31[_0] 721s | appending IKE DH algorithm MODP4096[_0] 721s | appending IKE DH algorithm MODP3072[_0] 721s | appending IKE DH algorithm MODP2048[_0] 721s | appending IKE DH algorithm MODP8192[_0] 721s | parsing 'aes_gcm-none-sha2' for IKE 721s | proposal: 'aes_gcm-none-sha2' 721s | token: '' '' "aes_gcm" '-' 721s | token: '' "aes_gcm" '-' "none" '-' 721s | token: '-' "none" '-' "sha2" '' 721s | appending IKE encryption algorithm AES_GCM_16[_0] 721s | parsing prf: 721s | ike_alg_byname() failed: IKE PRF algorithm 'none' is not recognized 721s | lookup for PRF algorithm 'none' failed 721s | - failed, saving error 'IKE PRF algorithm 'none' is not recognized' and tossing result 721s | parsing integ: 721s | appending IKE integrity algorithm NONE[_0] 721s | token: '-' "sha2" '' '' 721s | parsing prf: 721s | appending IKE PRF algorithm HMAC_SHA2_256[_0] 721s | token: '' '' '' 721s | appending IKE DH algorithm DH19[_0] 721s | appending IKE DH algorithm DH20[_0] 721s | appending IKE DH algorithm DH21[_0] 721s | appending IKE DH algorithm DH31[_0] 721s | appending IKE DH algorithm MODP4096[_0] 721s | appending IKE DH algorithm MODP3072[_0] 721s | appending IKE DH algorithm MODP2048[_0] 721s | appending IKE DH algorithm MODP8192[_0] 721s | parsing 'aes_gcm-none-sha2-modp2048' for IKE 721s | proposal: 'aes_gcm-none-sha2-modp2048' 721s | token: '' '' "aes_gcm" '-' 721s | token: '' "aes_gcm" '-' "none" '-' 721s | token: '-' "none" '-' "sha2" '-' 721s | appending IKE encryption algorithm AES_GCM_16[_0] 721s | parsing prf: 721s | ike_alg_byname() failed: IKE PRF algorithm 'none' is not recognized 721s | lookup for PRF algorithm 'none' failed 721s | - failed, saving error 'IKE PRF algorithm 'none' is not recognized' and tossing result 721s | parsing integ: 721s | appending IKE integrity algorithm NONE[_0] 721s | token: '-' "sha2" '-' "modp2048" '' 721s | parsing prf: 721s | appending IKE PRF algorithm HMAC_SHA2_256[_0] 721s | token: '-' "modp2048" '' '' 721s | parsing dh: 721s | appending IKE DH algorithm MODP2048[_0] 721s | token: '' '' '' 721s | parsing 'aes_gcm-none-sha2;modp2048' for IKE 721s | proposal: 'aes_gcm-none-sha2;modp2048' 721s | token: '' '' "aes_gcm" '-' 721s | token: '' "aes_gcm" '-' "none" '-' 721s | token: '-' "none" '-' "sha2" ';' 721s | appending IKE encryption algorithm AES_GCM_16[_0] 721s | parsing prf: 721s | ike_alg_byname() failed: IKE PRF algorithm 'none' is not recognized 721s | lookup for PRF algorithm 'none' failed 721s | - failed, saving error 'IKE PRF algorithm 'none' is not recognized' and tossing result 721s | parsing integ: 721s | appending IKE integrity algorithm NONE[_0] 721s | token: '-' "sha2" ';' "modp2048" '' 721s | parsing prf: 721s | appending IKE PRF algorithm HMAC_SHA2_256[_0] 721s | token: ';' "modp2048" '' '' 721s | parsing dh: 721s | appending IKE DH algorithm MODP2048[_0] 721s | token: '' '' '' 721s | parsing 'aes_gcm-none-modp2048' for IKE 721s | proposal: 'aes_gcm-none-modp2048' 721s | token: '' '' "aes_gcm" '-' 721s | token: '' "aes_gcm" '-' "none" '-' 721s | token: '-' "none" '-' "modp2048" '' 721s | appending IKE encryption algorithm AES_GCM_16[_0] 721s | parsing prf: 721s | ike_alg_byname() failed: IKE PRF algorithm 'none' is not recognized 721s | lookup for PRF algorithm 'none' failed 721s | - failed, saving error 'IKE PRF algorithm 'none' is not recognized' and tossing result 721s | parsing integ: 721s | appending IKE integrity algorithm NONE[_0] 721s | token: '-' "modp2048" '' '' 721s | parsing prf: 721s | ike_alg_byname() failed: IKE PRF algorithm 'modp2048' is not recognized 721s | lookup for PRF algorithm 'modp2048' failed 721s | -- failed 'IKE PRF algorithm 'modp2048' is not recognized' 721s | parsing 'aes_gcm-none;modp2048' for IKE 721s | proposal: 'aes_gcm-none;modp2048' 721s | token: '' '' "aes_gcm" '-' 721s | token: '' "aes_gcm" '-' "none" ';' 721s | token: '-' "none" ';' "modp2048" '' 721s | appending IKE encryption algorithm AES_GCM_16[_0] 721s | parsing prf: 721s | ike_alg_byname() failed: IKE PRF algorithm 'none' is not recognized 721s | lookup for PRF algorithm 'none' failed 721s | - failed, saving error 'IKE PRF algorithm 'none' is not recognized' and tossing result 721s | parsing integ: 721s | appending IKE integrity algorithm NONE[_0] 721s | token: ';' "modp2048" '' '' 721s | parsing dh: 721s | appending IKE DH algorithm MODP2048[_0] 721s | token: '' '' '' 721s | appending IKE PRF algorithm HMAC_SHA2_512[_0] 721s | appending IKE PRF algorithm HMAC_SHA2_256[_0] 721s | parsing 'aes_gcm-sha1-none-modp2048' for IKE 721s | proposal: 'aes_gcm-sha1-none-modp2048' 721s | token: '' '' "aes_gcm" '-' 721s | token: '' "aes_gcm" '-' "sha1" '-' 721s | token: '-' "sha1" '-' "none" '-' 721s | appending IKE encryption algorithm AES_GCM_16[_0] 721s | parsing prf: 721s | appending IKE PRF algorithm HMAC_SHA1[_0] 721s | token: '-' "none" '-' "modp2048" '' 721s | - succeeded, advancing tokens 721s | parsing dh: 721s | appending IKE DH algorithm NONE[_0] 721s | token: '-' "modp2048" '' '' 721s | parsing 'aes_gcm-sha1-none;modp2048' for IKE 721s | proposal: 'aes_gcm-sha1-none;modp2048' 721s | token: '' '' "aes_gcm" '-' 721s | token: '' "aes_gcm" '-' "sha1" '-' 721s | token: '-' "sha1" '-' "none" ';' 721s | appending IKE encryption algorithm AES_GCM_16[_0] 721s | parsing prf: 721s | appending IKE PRF algorithm HMAC_SHA1[_0] 721s | token: '-' "none" ';' "modp2048" '' 721s | - succeeded, advancing tokens 721s | parsing dh: 721s | appending IKE DH algorithm NONE[_0] 721s | token: ';' "modp2048" '' '' 721s | parsing 'aes+aes_gcm' for IKE 721s | proposal: 'aes+aes_gcm' 721s | token: '' '' "aes" '+' 721s | token: '' "aes" '+' "aes_gcm" '' 721s | token: '+' "aes_gcm" '' '' 721s | appending IKE encryption algorithm AES_CBC[_0] 721s | token: '' '' '' 721s | appending IKE encryption algorithm AES_GCM_16[_0] 721s | appending IKE PRF algorithm HMAC_SHA2_512[_0] 721s | appending IKE PRF algorithm HMAC_SHA2_256[_0] 721s | appending IKE DH algorithm DH19[_0] 721s | appending IKE DH algorithm DH20[_0] 721s | appending IKE DH algorithm DH21[_0] 721s | appending IKE DH algorithm DH31[_0] 721s | appending IKE DH algorithm MODP4096[_0] 721s | appending IKE DH algorithm MODP3072[_0] 721s | appending IKE DH algorithm MODP2048[_0] 721s | appending IKE DH algorithm MODP8192[_0] 721s | parsing ',' for IKE 721s | proposal: '' 721s | token: '' '' "" '' 721s | token: '' "" '' '' 721s | parsing 'aes,' for IKE 721s | proposal: 'aes' 721s | token: '' '' "aes" '' 721s | token: '' "aes" '' '' 721s | token: '' '' '' 721s | appending IKE encryption algorithm AES_CBC[_0] 721s | appending IKE PRF algorithm HMAC_SHA2_512[_0] 721s | appending IKE PRF algorithm HMAC_SHA2_256[_0] 721s | appending IKE integrity algorithm HMAC_SHA2_512_256[_0] 721s | appending IKE integrity algorithm HMAC_SHA2_256_128[_0] 721s | appending IKE DH algorithm DH19[_0] 721s | appending IKE DH algorithm DH20[_0] 721s | appending IKE DH algorithm DH21[_0] 721s | appending IKE DH algorithm DH31[_0] 721s | appending IKE DH algorithm MODP4096[_0] 721s | appending IKE DH algorithm MODP3072[_0] 721s | appending IKE DH algorithm MODP2048[_0] 721s | appending IKE DH algorithm MODP8192[_0] 721s | proposal: '' 721s | token: '' '' "" '' 721s | token: '' "" '' '' 721s | parsing 'aes,,aes' for IKE 721s | proposal: 'aes' 721s | token: '' '' "aes" '' 721s | token: '' "aes" '' '' 721s | token: '' '' '' 721s | appending IKE encryption algorithm AES_CBC[_0] 721s | appending IKE PRF algorithm HMAC_SHA2_512[_0] 721s | appending IKE PRF algorithm HMAC_SHA2_256[_0] 721s | appending IKE integrity algorithm HMAC_SHA2_512_256[_0] 721s | appending IKE integrity algorithm HMAC_SHA2_256_128[_0] 721s | appending IKE DH algorithm DH19[_0] 721s | appending IKE DH algorithm DH20[_0] 721s | appending IKE DH algorithm DH21[_0] 721s | appending IKE DH algorithm DH31[_0] 721s | appending IKE DH algorithm MODP4096[_0] 721s | appending IKE DH algorithm MODP3072[_0] 721s | appending IKE DH algorithm MODP2048[_0] 721s | appending IKE DH algorithm MODP8192[_0] 721s | proposal: '' 721s | token: '' '' "" '' 721s | token: '' "" '' '' 721s | parsing ',aes' for IKE 721s | proposal: '' 721s | token: '' '' "" '' 721s | token: '' "" '' '' 721s | parsing '-' for IKE 721s | proposal: '-' 721s | token: '' '' "" '-' 721s | token: '' "" '-' "" '' 721s | parsing '+' for IKE 721s | proposal: '+' 721s | token: '' '' "" '+' 721s | token: '' "" '+' "" '' 721s | parsing ';' for IKE 721s | proposal: ';' 721s | token: '' '' "" ';' 721s | token: '' "" ';' "" '' 721s | parsing 'aes-' for IKE 721s | proposal: 'aes-' 721s | token: '' '' "aes" '-' 721s | token: '' "aes" '-' "" '' 721s | token: '-' "" '' '' 721s | appending IKE encryption algorithm AES_CBC[_0] 721s | parsing prf: 721s | - failed, saving error 'IKE PRF algorithm is empty' and tossing result 721s | parsing integ: 721s | - and - failed, returning earlier PRF error 'IKE PRF algorithm is empty' and discarding INTEG error 'IKE integrity algorithm is empty') 721s | parsing 'aes+' for IKE 721s | proposal: 'aes+' 721s | token: '' '' "aes" '+' 721s | token: '' "aes" '+' "" '' 721s | token: '+' "" '' '' 721s | appending IKE encryption algorithm AES_CBC[_0] 721s | parsing 'aes;' for IKE 721s | proposal: 'aes;' 721s | token: '' '' "aes" ';' 721s | token: '' "aes" ';' "" '' 721s | token: ';' "" '' '' 721s | appending IKE encryption algorithm AES_CBC[_0] 721s | parsing dh: 721s | ... failed 'IKE DH algorithm is empty' 721s | parsing '-aes' for IKE 721s | proposal: '-aes' 721s | token: '' '' "" '-' 721s | token: '' "" '-' "aes" '' 721s | parsing '+aes' for IKE 721s | proposal: '+aes' 721s | token: '' '' "" '+' 721s | token: '' "" '+' "aes" '' 721s | parsing ';aes' for IKE 721s | proposal: ';aes' 721s | token: '' '' "" ';' 721s | token: '' "" ';' "aes" '' 721s | parsing 'aes+-' for IKE 721s | proposal: 'aes+-' 721s | token: '' '' "aes" '+' 721s | token: '' "aes" '+' "" '-' 721s | token: '+' "" '-' "" '' 721s | appending IKE encryption algorithm AES_CBC[_0] 721s | parsing 'aes+;' for IKE 721s | proposal: 'aes+;' 721s | token: '' '' "aes" '+' 721s | token: '' "aes" '+' "" ';' 721s | token: '+' "" ';' "" '' 721s | appending IKE encryption algorithm AES_CBC[_0] 721s | parsing 'aes++' for IKE 721s | proposal: 'aes++' 721s | token: '' '' "aes" '+' 721s | token: '' "aes" '+' "" '+' 721s | token: '+' "" '+' "" '' 721s | appending IKE encryption algorithm AES_CBC[_0] 721s ipsec algparse: leak detective found no leaks 721s ipsec algparse: Encryption algorithms: 721s ipsec algparse: AES_CCM_16 {256,192,*128} IKEv1: ESP IKEv2: ESP FIPS aes_ccm, aes_ccm_c 721s ipsec algparse: AES_CCM_12 {256,192,*128} IKEv1: ESP IKEv2: ESP FIPS aes_ccm_b 721s ipsec algparse: AES_CCM_8 {256,192,*128} IKEv1: ESP IKEv2: ESP FIPS aes_ccm_a 721s ipsec algparse: 3DES_CBC [*192] IKEv1: IKE ESP IKEv2: IKE ESP FIPS NSS(CBC) 3des 721s ipsec algparse: CAMELLIA_CTR {256,192,*128} IKEv1: ESP IKEv2: ESP 721s ipsec algparse: CAMELLIA_CBC {256,192,*128} IKEv1: IKE ESP IKEv2: IKE ESP NSS(CBC) camellia 721s ipsec algparse: AES_GCM_16 {256,192,*128} IKEv1: ESP IKEv2: IKE ESP FIPS NSS(AEAD) aes_gcm, aes_gcm_c 721s ipsec algparse: AES_GCM_12 {256,192,*128} IKEv1: ESP IKEv2: IKE ESP FIPS NSS(AEAD) aes_gcm_b 721s ipsec algparse: AES_GCM_8 {256,192,*128} IKEv1: ESP IKEv2: IKE ESP FIPS NSS(AEAD) aes_gcm_a 721s ipsec algparse: AES_CTR {256,192,*128} IKEv1: IKE ESP IKEv2: IKE ESP FIPS NSS(CTR) aesctr 721s ipsec algparse: AES_CBC {256,192,*128} IKEv1: IKE ESP IKEv2: IKE ESP FIPS NSS(CBC) aes 721s ipsec algparse: NULL_AUTH_AES_GMAC {256,192,*128} IKEv1: ESP IKEv2: ESP FIPS aes_gmac 721s ipsec algparse: NULL [] IKEv1: ESP IKEv2: ESP NULL 721s ipsec algparse: CHACHA20_POLY1305 [*256] IKEv1: IKEv2: IKE ESP NSS(AEAD) chacha20poly1305 721s ipsec algparse: Hash algorithms: 721s ipsec algparse: MD5 IKEv1: IKE IKEv2: NSS 721s ipsec algparse: SHA1 IKEv1: IKE IKEv2: IKE FIPS NSS sha 721s ipsec algparse: SHA2_256 IKEv1: IKE IKEv2: IKE FIPS NSS sha2, sha256 721s ipsec algparse: SHA2_384 IKEv1: IKE IKEv2: IKE FIPS NSS sha384 721s ipsec algparse: SHA2_512 IKEv1: IKE IKEv2: IKE FIPS NSS sha512 721s ipsec algparse: IDENTITY IKEv1: IKEv2: FIPS 721s ipsec algparse: PRF algorithms: 721s ipsec algparse: HMAC_MD5 IKEv1: IKE IKEv2: IKE NSS md5 721s ipsec algparse: HMAC_SHA1 IKEv1: IKE IKEv2: IKE FIPS NSS sha, sha1 721s ipsec algparse: HMAC_SHA2_256 IKEv1: IKE IKEv2: IKE FIPS NSS sha2, sha256, sha2_256 721s ipsec algparse: HMAC_SHA2_384 IKEv1: IKE IKEv2: IKE FIPS NSS sha384, sha2_384 721s ipsec algparse: HMAC_SHA2_512 IKEv1: IKE IKEv2: IKE FIPS NSS sha512, sha2_512 721s ipsec algparse: AES_XCBC IKEv1: IKEv2: IKE native(XCBC) aes128_xcbc 721s ipsec algparse: Integrity algorithms: 721s ipsec algparse: HMAC_MD5_96 IKEv1: IKE ESP AH IKEv2: IKE ESP AH NSS md5, hmac_md5 721s ipsec algparse: HMAC_SHA1_96 IKEv1: IKE ESP AH IKEv2: IKE ESP AH FIPS NSS sha, sha1, sha1_96, hmac_sha1 721s ipsec algparse: HMAC_SHA2_512_256 IKEv1: IKE ESP AH IKEv2: IKE ESP AH FIPS NSS sha512, sha2_512, sha2_512_256, hmac_sha2_512 721s ipsec algparse: HMAC_SHA2_384_192 IKEv1: IKE ESP AH IKEv2: IKE ESP AH FIPS NSS sha384, sha2_384, sha2_384_192, hmac_sha2_384 721s ipsec algparse: HMAC_SHA2_256_128 IKEv1: IKE ESP AH IKEv2: IKE ESP AH FIPS NSS sha2, sha256, sha2_256, sha2_256_128, hmac_sha2_256 721s ipsec algparse: HMAC_SHA2_256_TRUNCBUG IKEv1: ESP AH IKEv2: AH 721s ipsec algparse: AES_XCBC_96 IKEv1: ESP AH IKEv2: IKE ESP AH native(XCBC) aes_xcbc, aes128_xcbc, aes128_xcbc_96 721s ipsec algparse: AES_CMAC_96 IKEv1: ESP AH IKEv2: ESP AH FIPS aes_cmac 721s ipsec algparse: NONE IKEv1: ESP IKEv2: IKE ESP FIPS null 721s ipsec algparse: DH algorithms: 721s ipsec algparse: NONE IKEv1: IKEv2: IKE ESP AH FIPS NSS(MODP) null, dh0 721s ipsec algparse: MODP1536 IKEv1: IKE ESP AH IKEv2: IKE ESP AH NSS(MODP) dh5 721s ipsec algparse: MODP2048 IKEv1: IKE ESP AH IKEv2: IKE ESP AH FIPS NSS(MODP) dh14 721s ipsec algparse: MODP3072 IKEv1: IKE ESP AH IKEv2: IKE ESP AH FIPS NSS(MODP) dh15 721s ipsec algparse: MODP4096 IKEv1: IKE ESP AH IKEv2: IKE ESP AH FIPS NSS(MODP) dh16 721s ipsec algparse: MODP6144 IKEv1: IKE ESP AH IKEv2: IKE ESP AH FIPS NSS(MODP) dh17 721s ipsec algparse: MODP8192 IKEv1: IKE ESP AH IKEv2: IKE ESP AH FIPS NSS(MODP) dh18 721s ipsec algparse: DH19 IKEv1: IKE IKEv2: IKE ESP AH FIPS NSS(ECP) ecp_256, ecp256 721s ipsec algparse: DH20 IKEv1: IKE IKEv2: IKE ESP AH FIPS NSS(ECP) ecp_384, ecp384 721s ipsec algparse: DH21 IKEv1: IKE IKEv2: IKE ESP AH FIPS NSS(ECP) ecp_521, ecp521 721s ipsec algparse: DH31 IKEv1: IKE IKEv2: IKE ESP AH NSS(ECP) curve25519 721s ipsec algparse: IPCOMP algorithms: 721s ipsec algparse: DEFLATE IKEv1: ESP AH IKEv2: ESP AH FIPS 721s ipsec algparse: LZS IKEv1: IKEv2: ESP AH FIPS 721s ipsec algparse: LZJH IKEv1: IKEv2: ESP AH FIPS 721s ipsec algparse: testing CAMELLIA_CBC: 721s ipsec algparse: Camellia: 16 bytes with 128-bit key 721s | decode_to_chunk() raw_key: input "0x00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00" 721s | decode_to_chunk() output: 721s | 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................ 721s | CONCATENATE_DATA_AND_BASE: 721s | target: EXTRACT_KEY_FROM_KEY 721s | base: base-key@0xc63f95666bc0 (16-bytes, AES_KEY_GEN) 721s | params: 16-bytes@0xfffff84c1260 721s | key-offset: 0, key-size: 16 721s | EXTRACT_KEY_FROM_KEY: 721s | target: CAMELLIA_CBC 721s | flags: ENCRYPT+DECRYPT 721s | key_size: 16-bytes 721s | base: base-key@0xc63f95669c00 (32-bytes, EXTRACT_KEY_FROM_KEY) 721s | operation: FLAGS_ONLY 721s | params: 8-bytes@0xfffff84c1268 721s | decode_to_mac() IV: : input "0x00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00" 721s | decode_to_mac() output: 721s | 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................ 721s | decode_to_chunk() new IV: : input "0x07 92 3A 39 EB 0A 81 7D 1C 4D 87 BD B8 2D 1F 1C" 721s | decode_to_chunk() output: 721s | 07 92 3a 39 eb 0a 81 7d 1c 4d 87 bd b8 2d 1f 1c ..:9...}.M...-.. 721s | decode_to_chunk() plaintext: : input "0x80 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00" 721s | decode_to_chunk() output: 721s | 80 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................ 721s | decode_to_chunk() ciphertext: : input "0x07 92 3A 39 EB 0A 81 7D 1C 4D 87 BD B8 2D 1F 1C" 721s | decode_to_chunk() output: 721s | 07 92 3a 39 eb 0a 81 7d 1c 4d 87 bd b8 2d 1f 1c ..:9...}.M...-.. 721s | NSS ike_alg_nss_cbc: CAMELLIA_CBC - enter (nil) 721s | using IKEv1 IV 721s | NSS ike_alg_nss_cbc: CAMELLIA_CBC - exit 721s | verify_bytes() Camellia: 16 bytes with 128-bit key: encrypt: ok 721s | verify_bytes() Camellia: 16 bytes with 128-bit key: updated CBC IV: ok 721s | decode_to_mac() IV: : input "0x00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00" 721s | decode_to_mac() output: 721s | 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................ 721s | decode_to_chunk() new IV: : input "0x07 92 3A 39 EB 0A 81 7D 1C 4D 87 BD B8 2D 1F 1C" 721s | decode_to_chunk() output: 721s | 07 92 3a 39 eb 0a 81 7d 1c 4d 87 bd b8 2d 1f 1c ..:9...}.M...-.. 721s | decode_to_chunk() ciphertext: : input "0x07 92 3A 39 EB 0A 81 7D 1C 4D 87 BD B8 2D 1F 1C" 721s | decode_to_chunk() output: 721s | 07 92 3a 39 eb 0a 81 7d 1c 4d 87 bd b8 2d 1f 1c ..:9...}.M...-.. 721s | decode_to_chunk() plaintext: : input "0x80 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00" 721s | decode_to_chunk() output: 721s | 80 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................ 721s | NSS ike_alg_nss_cbc: CAMELLIA_CBC - enter (nil) 721s | using IKEv1 IV 721s | NSS ike_alg_nss_cbc: CAMELLIA_CBC - exit 721s | verify_bytes() Camellia: 16 bytes with 128-bit key: decrypt: ok 721s | verify_bytes() Camellia: 16 bytes with 128-bit key: updated CBC IV: ok 721s ipsec algparse: Camellia: 16 bytes with 128-bit key 721s | decode_to_chunk() raw_key: input "0x00 11 22 33 44 55 66 77 88 99 AA BB CC DD EE FF" 721s | decode_to_chunk() output: 721s | 00 11 22 33 44 55 66 77 88 99 aa bb cc dd ee ff .."3DUfw........ 721s | CONCATENATE_DATA_AND_BASE: 721s | target: EXTRACT_KEY_FROM_KEY 721s | base: base-key@0xc63f95666bc0 (16-bytes, AES_KEY_GEN) 721s | params: 16-bytes@0xfffff84c1260 721s | key-offset: 0, key-size: 16 721s | EXTRACT_KEY_FROM_KEY: 721s | target: CAMELLIA_CBC 721s | flags: ENCRYPT+DECRYPT 721s | key_size: 16-bytes 721s | base: base-key@0xc63f95669c00 (32-bytes, EXTRACT_KEY_FROM_KEY) 721s | operation: FLAGS_ONLY 721s | params: 8-bytes@0xfffff84c1268 721s | decode_to_mac() IV: : input "0x00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00" 721s | decode_to_mac() output: 721s | 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................ 721s | decode_to_chunk() new IV: : input "0x14 4D 2B 0F 50 0C 27 B7 EC 2C D1 2D 91 59 6F 37" 721s | decode_to_chunk() output: 721s | 14 4d 2b 0f 50 0c 27 b7 ec 2c d1 2d 91 59 6f 37 .M+.P.'..,.-.Yo7 721s | decode_to_chunk() plaintext: : input "0x00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 01 " 721s | decode_to_chunk() output: 721s | 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 01 ................ 721s | decode_to_chunk() ciphertext: : input "0x14 4D 2B 0F 50 0C 27 B7 EC 2C D1 2D 91 59 6F 37" 721s | decode_to_chunk() output: 721s | 14 4d 2b 0f 50 0c 27 b7 ec 2c d1 2d 91 59 6f 37 .M+.P.'..,.-.Yo7 721s | NSS ike_alg_nss_cbc: CAMELLIA_CBC - enter (nil) 721s | using IKEv1 IV 721s | NSS ike_alg_nss_cbc: CAMELLIA_CBC - exit 721s | verify_bytes() Camellia: 16 bytes with 128-bit key: encrypt: ok 721s | verify_bytes() Camellia: 16 bytes with 128-bit key: updated CBC IV: ok 721s | decode_to_mac() IV: : input "0x00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00" 721s | decode_to_mac() output: 721s | 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................ 721s | decode_to_chunk() new IV: : input "0x14 4D 2B 0F 50 0C 27 B7 EC 2C D1 2D 91 59 6F 37" 721s | decode_to_chunk() output: 721s | 14 4d 2b 0f 50 0c 27 b7 ec 2c d1 2d 91 59 6f 37 .M+.P.'..,.-.Yo7 721s | decode_to_chunk() ciphertext: : input "0x14 4D 2B 0F 50 0C 27 B7 EC 2C D1 2D 91 59 6F 37" 721s | decode_to_chunk() output: 721s | 14 4d 2b 0f 50 0c 27 b7 ec 2c d1 2d 91 59 6f 37 .M+.P.'..,.-.Yo7 721s | decode_to_chunk() plaintext: : input "0x00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 01 " 721s | decode_to_chunk() output: 721s | 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 01 ................ 721s | NSS ike_alg_nss_cbc: CAMELLIA_CBC - enter (nil) 721s | using IKEv1 IV 721s | NSS ike_alg_nss_cbc: CAMELLIA_CBC - exit 721s | verify_bytes() Camellia: 16 bytes with 128-bit key: decrypt: ok 721s | verify_bytes() Camellia: 16 bytes with 128-bit key: updated CBC IV: ok 721s ipsec algparse: Camellia: 16 bytes with 256-bit key 721s | decode_to_chunk() raw_key: input "0x00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00" 721s | decode_to_chunk() output: 721s | 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................ 721s | 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................ 721s | CONCATENATE_DATA_AND_BASE: 721s | target: EXTRACT_KEY_FROM_KEY 721s | base: base-key@0xc63f95666bc0 (16-bytes, AES_KEY_GEN) 721s | params: 16-bytes@0xfffff84c1260 721s | key-offset: 0, key-size: 32 721s | EXTRACT_KEY_FROM_KEY: 721s | target: CAMELLIA_CBC 721s | flags: ENCRYPT+DECRYPT 721s | key_size: 32-bytes 721s | base: base-key@0xc63f95669c00 (48-bytes, EXTRACT_KEY_FROM_KEY) 721s | operation: FLAGS_ONLY 721s | params: 8-bytes@0xfffff84c1268 721s | decode_to_mac() IV: : input "0x00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00" 721s | decode_to_mac() output: 721s | 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................ 721s | decode_to_chunk() new IV: : input "0xB0 C6 B8 8A EA 51 8A B0 9E 84 72 48 E9 1B 1B 9D" 721s | decode_to_chunk() output: 721s | b0 c6 b8 8a ea 51 8a b0 9e 84 72 48 e9 1b 1b 9d .....Q....rH.... 721s | decode_to_chunk() plaintext: : input "0x80 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00" 721s | decode_to_chunk() output: 721s | 80 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................ 721s | decode_to_chunk() ciphertext: : input "0xB0 C6 B8 8A EA 51 8A B0 9E 84 72 48 E9 1B 1B 9D" 721s | decode_to_chunk() output: 721s | b0 c6 b8 8a ea 51 8a b0 9e 84 72 48 e9 1b 1b 9d .....Q....rH.... 721s | NSS ike_alg_nss_cbc: CAMELLIA_CBC - enter (nil) 721s | using IKEv1 IV 721s | NSS ike_alg_nss_cbc: CAMELLIA_CBC - exit 721s | verify_bytes() Camellia: 16 bytes with 256-bit key: encrypt: ok 721s | verify_bytes() Camellia: 16 bytes with 256-bit key: updated CBC IV: ok 721s | decode_to_mac() IV: : input "0x00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00" 721s | decode_to_mac() output: 721s | 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................ 721s | decode_to_chunk() new IV: : input "0xB0 C6 B8 8A EA 51 8A B0 9E 84 72 48 E9 1B 1B 9D" 721s | decode_to_chunk() output: 721s | b0 c6 b8 8a ea 51 8a b0 9e 84 72 48 e9 1b 1b 9d .....Q....rH.... 721s | decode_to_chunk() ciphertext: : input "0xB0 C6 B8 8A EA 51 8A B0 9E 84 72 48 E9 1B 1B 9D" 721s | decode_to_chunk() output: 721s | b0 c6 b8 8a ea 51 8a b0 9e 84 72 48 e9 1b 1b 9d .....Q....rH.... 721s | decode_to_chunk() plaintext: : input "0x80 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00" 721s | decode_to_chunk() output: 721s | 80 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................ 721s | NSS ike_alg_nss_cbc: CAMELLIA_CBC - enter (nil) 721s | using IKEv1 IV 721s | NSS ike_alg_nss_cbc: CAMELLIA_CBC - exit 721s | verify_bytes() Camellia: 16 bytes with 256-bit key: decrypt: ok 721s | verify_bytes() Camellia: 16 bytes with 256-bit key: updated CBC IV: ok 721s ipsec algparse: Camellia: 16 bytes with 256-bit key 721s | decode_to_chunk() raw_key: input "0x00 11 22 33 44 55 66 77 88 99 AA BB CC DD EE FF FF EE DD CC BB AA 99 88 77 66 55 44 33 22 11 00" 721s | decode_to_chunk() output: 721s | 00 11 22 33 44 55 66 77 88 99 aa bb cc dd ee ff .."3DUfw........ 721s | ff ee dd cc bb aa 99 88 77 66 55 44 33 22 11 00 ........wfUD3".. 721s | CONCATENATE_DATA_AND_BASE: 721s | target: EXTRACT_KEY_FROM_KEY 721s | base: base-key@0xc63f95666bc0 (16-bytes, AES_KEY_GEN) 721s | params: 16-bytes@0xfffff84c1260 721s | key-offset: 0, key-size: 32 721s | EXTRACT_KEY_FROM_KEY: 721s | target: CAMELLIA_CBC 721s | flags: ENCRYPT+DECRYPT 721s | key_size: 32-bytes 721s | base: base-key@0xc63f95669c00 (48-bytes, EXTRACT_KEY_FROM_KEY) 721s | operation: FLAGS_ONLY 721s | params: 8-bytes@0xfffff84c1268 721s | decode_to_mac() IV: : input "0x00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00" 721s | decode_to_mac() output: 721s | 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................ 721s | decode_to_chunk() new IV: : input "0xCC 39 FF EE 18 56 D3 EB 61 02 5E 93 21 9B 65 23 " 721s | decode_to_chunk() output: 721s | cc 39 ff ee 18 56 d3 eb 61 02 5e 93 21 9b 65 23 .9...V..a.^.!.e# 721s | decode_to_chunk() plaintext: : input "0x00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 01" 721s | decode_to_chunk() output: 721s | 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 01 ................ 721s | decode_to_chunk() ciphertext: : input "0xCC 39 FF EE 18 56 D3 EB 61 02 5E 93 21 9B 65 23 " 721s | decode_to_chunk() output: 721s | cc 39 ff ee 18 56 d3 eb 61 02 5e 93 21 9b 65 23 .9...V..a.^.!.e# 721s | NSS ike_alg_nss_cbc: CAMELLIA_CBC - enter (nil) 721s | using IKEv1 IV 721s | NSS ike_alg_nss_cbc: CAMELLIA_CBC - exit 721s | verify_bytes() Camellia: 16 bytes with 256-bit key: encrypt: ok 721s | verify_bytes() Camellia: 16 bytes with 256-bit key: updated CBC IV: ok 721s | decode_to_mac() IV: : input "0x00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00" 721s | decode_to_mac() output: 721s | 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................ 721s | decode_to_chunk() new IV: : input "0xCC 39 FF EE 18 56 D3 EB 61 02 5E 93 21 9B 65 23 " 721s | decode_to_chunk() output: 721s | cc 39 ff ee 18 56 d3 eb 61 02 5e 93 21 9b 65 23 .9...V..a.^.!.e# 721s | decode_to_chunk() ciphertext: : input "0xCC 39 FF EE 18 56 D3 EB 61 02 5E 93 21 9B 65 23 " 721s | decode_to_chunk() output: 721s | cc 39 ff ee 18 56 d3 eb 61 02 5e 93 21 9b 65 23 .9...V..a.^.!.e# 721s | decode_to_chunk() plaintext: : input "0x00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 01" 721s | decode_to_chunk() output: 721s | 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 01 ................ 721s | NSS ike_alg_nss_cbc: CAMELLIA_CBC - enter (nil) 721s | using IKEv1 IV 721s | NSS ike_alg_nss_cbc: CAMELLIA_CBC - exit 721s | verify_bytes() Camellia: 16 bytes with 256-bit key: decrypt: ok 721s | verify_bytes() Camellia: 16 bytes with 256-bit key: updated CBC IV: ok 721s ipsec algparse: testing AES_GCM_16: 721s ipsec algparse: empty string 721s | decode_to_chunk() raw_key: input "0xcf063a34d4a9a76c2c86787d3f96db71" 721s | decode_to_chunk() output: 721s | cf 06 3a 34 d4 a9 a7 6c 2c 86 78 7d 3f 96 db 71 ..:4...l,.x}?..q 721s | CONCATENATE_DATA_AND_BASE: 721s | target: EXTRACT_KEY_FROM_KEY 721s | base: base-key@0xc63f95666bc0 (16-bytes, AES_KEY_GEN) 721s | params: 16-bytes@0xfffff84c11e0 721s | key-offset: 0, key-size: 16 721s | EXTRACT_KEY_FROM_KEY: 721s | target: AES_GCM 721s | flags: ENCRYPT+DECRYPT 721s | key_size: 16-bytes 721s | base: base-key@0xc63f95669c00 (32-bytes, EXTRACT_KEY_FROM_KEY) 721s | operation: FLAGS_ONLY 721s | params: 8-bytes@0xfffff84c11e8 721s | decode_to_chunk() salted IV: input "0x113b9785971864c83b01c787" 721s | decode_to_chunk() output: 721s | 11 3b 97 85 97 18 64 c8 3b 01 c7 87 .;....d.;... 721s | decode_to_chunk() AAD: input "" 721s | decode_to_chunk() output: 721s | 721s | decode_to_chunk() plaintext: input "" 721s | decode_to_chunk() output: 721s | 721s | decode_to_chunk() ciphertext: input "" 721s | decode_to_chunk() output: 721s | 721s | decode_to_chunk() tag: input "0x72ac8493e3a5228b5d130a69d2510e42" 721s | decode_to_chunk() output: 721s | 72 ac 84 93 e3 a5 22 8b 5d 13 0a 69 d2 51 0e 42 r.....".]..i.Q.B 721s | test_gcm_vector() DECRYPT: aad-size=0 salt-size=4 wire-IV-size=8 text-size=0 tag-size=16 text+tag in: 721s | 72 ac 84 93 e3 a5 22 8b 5d 13 0a 69 d2 51 0e 42 r.....".]..i.Q.B 721s | verify_bytes() empty string: output ciphertext: ok 721s | verify_bytes() empty string: TAG: ok 721s | test_gcm_vector() text+tag out: 721s | 72 ac 84 93 e3 a5 22 8b 5d 13 0a 69 d2 51 0e 42 r.....".]..i.Q.B 721s | test_gcm_vector() ENCRYPT: aad-size=0 salt-size=4 wire-IV-size=8 text-size=0 tag-size=16 text+tag in: 721s | 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................ 721s | verify_bytes() empty string: output ciphertext: ok 721s | verify_bytes() empty string: TAG: ok 721s | test_gcm_vector() text+tag out: 721s | 72 ac 84 93 e3 a5 22 8b 5d 13 0a 69 d2 51 0e 42 r.....".]..i.Q.B 721s ipsec algparse: one block 721s | decode_to_chunk() raw_key: input "0xe98b72a9881a84ca6b76e0f43e68647a" 721s | decode_to_chunk() output: 721s | e9 8b 72 a9 88 1a 84 ca 6b 76 e0 f4 3e 68 64 7a ..r.....kv..>hdz 721s | CONCATENATE_DATA_AND_BASE: 721s | target: EXTRACT_KEY_FROM_KEY 721s | base: base-key@0xc63f95666bc0 (16-bytes, AES_KEY_GEN) 721s | params: 16-bytes@0xfffff84c11e0 721s | key-offset: 0, key-size: 16 721s | EXTRACT_KEY_FROM_KEY: 721s | target: AES_GCM 721s | flags: ENCRYPT+DECRYPT 721s | key_size: 16-bytes 721s | base: base-key@0xc63f95669c00 (32-bytes, EXTRACT_KEY_FROM_KEY) 721s | operation: FLAGS_ONLY 721s | params: 8-bytes@0xfffff84c11e8 721s | decode_to_chunk() salted IV: input "0x8b23299fde174053f3d652ba" 721s | decode_to_chunk() output: 721s | 8b 23 29 9f de 17 40 53 f3 d6 52 ba .#)...@S..R. 721s | decode_to_chunk() AAD: input "" 721s | decode_to_chunk() output: 721s | 721s | decode_to_chunk() plaintext: input "0x28286a321293253c3e0aa2704a278032" 721s | decode_to_chunk() output: 721s | 28 28 6a 32 12 93 25 3c 3e 0a a2 70 4a 27 80 32 ((j2..%<>..pJ'.2 721s | decode_to_chunk() ciphertext: input "0x5a3c1cf1985dbb8bed818036fdd5ab42" 721s | decode_to_chunk() output: 721s | 5a 3c 1c f1 98 5d bb 8b ed 81 80 36 fd d5 ab 42 Z<...].....6...B 721s | decode_to_chunk() tag: input "0x23c7ab0f952b7091cd324835043b5eb5" 721s | decode_to_chunk() output: 721s | 23 c7 ab 0f 95 2b 70 91 cd 32 48 35 04 3b 5e b5 #....+p..2H5.;^. 721s | test_gcm_vector() DECRYPT: aad-size=0 salt-size=4 wire-IV-size=8 text-size=16 tag-size=16 text+tag in: 721s | 5a 3c 1c f1 98 5d bb 8b ed 81 80 36 fd d5 ab 42 Z<...].....6...B 721s | 23 c7 ab 0f 95 2b 70 91 cd 32 48 35 04 3b 5e b5 #....+p..2H5.;^. 721s | verify_bytes() one block: output ciphertext: ok 721s | verify_bytes() one block: TAG: ok 721s | test_gcm_vector() text+tag out: 721s | 28 28 6a 32 12 93 25 3c 3e 0a a2 70 4a 27 80 32 ((j2..%<>..pJ'.2 721s | 23 c7 ab 0f 95 2b 70 91 cd 32 48 35 04 3b 5e b5 #....+p..2H5.;^. 721s | test_gcm_vector() ENCRYPT: aad-size=0 salt-size=4 wire-IV-size=8 text-size=16 tag-size=16 text+tag in: 721s | 28 28 6a 32 12 93 25 3c 3e 0a a2 70 4a 27 80 32 ((j2..%<>..pJ'.2 721s | 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................ 721s | verify_bytes() one block: output ciphertext: ok 721s | verify_bytes() one block: TAG: ok 721s | test_gcm_vector() text+tag out: 721s | 5a 3c 1c f1 98 5d bb 8b ed 81 80 36 fd d5 ab 42 Z<...].....6...B 721s | 23 c7 ab 0f 95 2b 70 91 cd 32 48 35 04 3b 5e b5 #....+p..2H5.;^. 721s ipsec algparse: two blocks 721s | decode_to_chunk() raw_key: input "0xbfd414a6212958a607a0f5d3ab48471d" 721s | decode_to_chunk() output: 721s | bf d4 14 a6 21 29 58 a6 07 a0 f5 d3 ab 48 47 1d ....!)X......HG. 721s | CONCATENATE_DATA_AND_BASE: 721s | target: EXTRACT_KEY_FROM_KEY 721s | base: base-key@0xc63f95666bc0 (16-bytes, AES_KEY_GEN) 721s | params: 16-bytes@0xfffff84c11e0 721s | key-offset: 0, key-size: 16 721s | EXTRACT_KEY_FROM_KEY: 721s | target: AES_GCM 721s | flags: ENCRYPT+DECRYPT 721s | key_size: 16-bytes 721s | base: base-key@0xc63f95669c00 (32-bytes, EXTRACT_KEY_FROM_KEY) 721s | operation: FLAGS_ONLY 721s | params: 8-bytes@0xfffff84c11e8 721s | decode_to_chunk() salted IV: input "0x86d8ea0ab8e40dcc481cd0e2" 721s | decode_to_chunk() output: 721s | 86 d8 ea 0a b8 e4 0d cc 48 1c d0 e2 ........H... 721s | decode_to_chunk() AAD: input "" 721s | decode_to_chunk() output: 721s | 721s | decode_to_chunk() plaintext: input "0xa6b76a066e63392c9443e60272ceaeb9d25c991b0f2e55e2804e168c05ea591a" 721s | decode_to_chunk() output: 721s | a6 b7 6a 06 6e 63 39 2c 94 43 e6 02 72 ce ae b9 ..j.nc9,.C..r... 721s | d2 5c 99 1b 0f 2e 55 e2 80 4e 16 8c 05 ea 59 1a .\....U..N....Y. 721s | decode_to_chunk() ciphertext: input "0x62171db33193292d930bf6647347652c1ef33316d7feca99d54f1db4fcf513f8" 721s | decode_to_chunk() output: 721s | 62 17 1d b3 31 93 29 2d 93 0b f6 64 73 47 65 2c b...1.)-...dsGe, 721s | 1e f3 33 16 d7 fe ca 99 d5 4f 1d b4 fc f5 13 f8 ..3......O...... 721s | decode_to_chunk() tag: input "0xc28280aa5c6c7a8bd366f28c1cfd1f6e" 721s | decode_to_chunk() output: 721s | c2 82 80 aa 5c 6c 7a 8b d3 66 f2 8c 1c fd 1f 6e ....\lz..f.....n 721s | test_gcm_vector() DECRYPT: aad-size=0 salt-size=4 wire-IV-size=8 text-size=32 tag-size=16 text+tag in: 721s | 62 17 1d b3 31 93 29 2d 93 0b f6 64 73 47 65 2c b...1.)-...dsGe, 721s | 1e f3 33 16 d7 fe ca 99 d5 4f 1d b4 fc f5 13 f8 ..3......O...... 721s | c2 82 80 aa 5c 6c 7a 8b d3 66 f2 8c 1c fd 1f 6e ....\lz..f.....n 721s | verify_bytes() two blocks: output ciphertext: ok 721s | verify_bytes() two blocks: TAG: ok 721s | test_gcm_vector() text+tag out: 721s | a6 b7 6a 06 6e 63 39 2c 94 43 e6 02 72 ce ae b9 ..j.nc9,.C..r... 721s | d2 5c 99 1b 0f 2e 55 e2 80 4e 16 8c 05 ea 59 1a .\....U..N....Y. 721s | c2 82 80 aa 5c 6c 7a 8b d3 66 f2 8c 1c fd 1f 6e ....\lz..f.....n 721s | test_gcm_vector() ENCRYPT: aad-size=0 salt-size=4 wire-IV-size=8 text-size=32 tag-size=16 text+tag in: 721s | a6 b7 6a 06 6e 63 39 2c 94 43 e6 02 72 ce ae b9 ..j.nc9,.C..r... 721s | d2 5c 99 1b 0f 2e 55 e2 80 4e 16 8c 05 ea 59 1a .\....U..N....Y. 721s | 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................ 721s | verify_bytes() two blocks: output ciphertext: ok 721s | verify_bytes() two blocks: TAG: ok 721s | test_gcm_vector() text+tag out: 721s | 62 17 1d b3 31 93 29 2d 93 0b f6 64 73 47 65 2c b...1.)-...dsGe, 721s | 1e f3 33 16 d7 fe ca 99 d5 4f 1d b4 fc f5 13 f8 ..3......O...... 721s | c2 82 80 aa 5c 6c 7a 8b d3 66 f2 8c 1c fd 1f 6e ....\lz..f.....n 721s ipsec algparse: two blocks with associated data 721s | decode_to_chunk() raw_key: input "0x95bcde70c094f04e3dd8259cafd88ce8" 721s | decode_to_chunk() output: 721s | 95 bc de 70 c0 94 f0 4e 3d d8 25 9c af d8 8c e8 ...p...N=.%..... 721s | CONCATENATE_DATA_AND_BASE: 721s | target: EXTRACT_KEY_FROM_KEY 721s | base: base-key@0xc63f95666bc0 (16-bytes, AES_KEY_GEN) 721s | params: 16-bytes@0xfffff84c11e0 721s | key-offset: 0, key-size: 16 721s | EXTRACT_KEY_FROM_KEY: 721s | target: AES_GCM 721s | flags: ENCRYPT+DECRYPT 721s | key_size: 16-bytes 721s | base: base-key@0xc63f95669c00 (32-bytes, EXTRACT_KEY_FROM_KEY) 721s | operation: FLAGS_ONLY 721s | params: 8-bytes@0xfffff84c11e8 721s | decode_to_chunk() salted IV: input "0x12cf097ad22380432ff40a5c" 721s | decode_to_chunk() output: 721s | 12 cf 09 7a d2 23 80 43 2f f4 0a 5c ...z.#.C/..\ 721s | decode_to_chunk() AAD: input "0xc783a0cca10a8d9fb8d27d69659463f2" 721s | decode_to_chunk() output: 721s | c7 83 a0 cc a1 0a 8d 9f b8 d2 7d 69 65 94 63 f2 ..........}ie.c. 721s | decode_to_chunk() plaintext: input "0x32f51e837a9748838925066d69e87180f34a6437e6b396e5643b34cb2ee4f7b1" 721s | decode_to_chunk() output: 721s | 32 f5 1e 83 7a 97 48 83 89 25 06 6d 69 e8 71 80 2...z.H..%.mi.q. 721s | f3 4a 64 37 e6 b3 96 e5 64 3b 34 cb 2e e4 f7 b1 .Jd7....d;4..... 721s | decode_to_chunk() ciphertext: input "0x8a023ba477f5b809bddcda8f55e09064d6d88aaec99c1e141212ea5b08503660" 721s | decode_to_chunk() output: 721s | 8a 02 3b a4 77 f5 b8 09 bd dc da 8f 55 e0 90 64 ..;.w.......U..d 721s | d6 d8 8a ae c9 9c 1e 14 12 12 ea 5b 08 50 36 60 ...........[.P6` 721s | decode_to_chunk() tag: input "0x562f500dae635d60a769b466e15acd1e" 721s | decode_to_chunk() output: 721s | 56 2f 50 0d ae 63 5d 60 a7 69 b4 66 e1 5a cd 1e V/P..c]`.i.f.Z.. 721s | test_gcm_vector() DECRYPT: aad-size=16 salt-size=4 wire-IV-size=8 text-size=32 tag-size=16 text+tag in: 721s | 8a 02 3b a4 77 f5 b8 09 bd dc da 8f 55 e0 90 64 ..;.w.......U..d 721s | d6 d8 8a ae c9 9c 1e 14 12 12 ea 5b 08 50 36 60 ...........[.P6` 721s | 56 2f 50 0d ae 63 5d 60 a7 69 b4 66 e1 5a cd 1e V/P..c]`.i.f.Z.. 721s | verify_bytes() two blocks with associated data: output ciphertext: ok 721s | verify_bytes() two blocks with associated data: TAG: ok 721s | test_gcm_vector() text+tag out: 721s | 32 f5 1e 83 7a 97 48 83 89 25 06 6d 69 e8 71 80 2...z.H..%.mi.q. 721s | f3 4a 64 37 e6 b3 96 e5 64 3b 34 cb 2e e4 f7 b1 .Jd7....d;4..... 721s | 56 2f 50 0d ae 63 5d 60 a7 69 b4 66 e1 5a cd 1e V/P..c]`.i.f.Z.. 721s | test_gcm_vector() ENCRYPT: aad-size=16 salt-size=4 wire-IV-size=8 text-size=32 tag-size=16 text+tag in: 721s | 32 f5 1e 83 7a 97 48 83 89 25 06 6d 69 e8 71 80 2...z.H..%.mi.q. 721s | f3 4a 64 37 e6 b3 96 e5 64 3b 34 cb 2e e4 f7 b1 .Jd7....d;4..... 721s | 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................ 721s | verify_bytes() two blocks with associated data: output ciphertext: ok 721s | verify_bytes() two blocks with associated data: TAG: ok 721s | test_gcm_vector() text+tag out: 721s | 8a 02 3b a4 77 f5 b8 09 bd dc da 8f 55 e0 90 64 ..;.w.......U..d 721s | d6 d8 8a ae c9 9c 1e 14 12 12 ea 5b 08 50 36 60 ...........[.P6` 721s | 56 2f 50 0d ae 63 5d 60 a7 69 b4 66 e1 5a cd 1e V/P..c]`.i.f.Z.. 721s ipsec algparse: testing AES_CTR: 721s ipsec algparse: Encrypting 16 octets using AES-CTR with 128-bit key 721s | decode_to_chunk() raw_key: input "0x AE 68 52 F8 12 10 67 CC 4B F7 A5 76 55 77 F3 9E" 721s | decode_to_chunk() output: 721s | ae 68 52 f8 12 10 67 cc 4b f7 a5 76 55 77 f3 9e .hR...g.K..vUw.. 721s | CONCATENATE_DATA_AND_BASE: 721s | target: EXTRACT_KEY_FROM_KEY 721s | base: base-key@0xc63f95666bc0 (16-bytes, AES_KEY_GEN) 721s | params: 16-bytes@0xfffff84c1250 721s | key-offset: 0, key-size: 16 721s | EXTRACT_KEY_FROM_KEY: 721s | target: AES_CTR 721s | flags: ENCRYPT+DECRYPT 721s | key_size: 16-bytes 721s | base: base-key@0xc63f95669c00 (32-bytes, EXTRACT_KEY_FROM_KEY) 721s | operation: FLAGS_ONLY 721s | params: 8-bytes@0xfffff84c1258 721s | decode_to_mac() input counter-block: : input "0x 00 00 00 30 00 00 00 00 00 00 00 00 00 00 00 01" 721s | decode_to_mac() output: 721s | 00 00 00 30 00 00 00 00 00 00 00 00 00 00 00 01 ...0............ 721s | decode_to_chunk() Plaintext: input "0x 53 69 6E 67 6C 65 20 62 6C 6F 63 6B 20 6D 73 67" 721s | decode_to_chunk() output: 721s | 53 69 6e 67 6c 65 20 62 6c 6f 63 6b 20 6d 73 67 Single block msg 721s | decode_to_chunk() Ciphertext: input "0x E4 09 5D 4F B7 A7 B3 79 2D 61 75 A3 26 13 11 B8" 721s | decode_to_chunk() output: 721s | e4 09 5d 4f b7 a7 b3 79 2d 61 75 a3 26 13 11 b8 ..]O...y-au.&... 721s | decode_to_chunk() expected counter-block: : input "0x 00 00 00 30 00 00 00 00 00 00 00 00 00 00 00 02" 721s | decode_to_chunk() output: 721s | 00 00 00 30 00 00 00 00 00 00 00 00 00 00 00 02 ...0............ 721s | cipher_op_ctr_nss() enter AES_CTR 0xc63f9566a5d0 use IKEv1 IV wire_iv 0 count 0 721s | ctr_param: count 32 iv 00000030000000000000000000000001 721s | cipher_op_ctr_nss() counter-block updated from 0x1 to 0x2 for 16 bytes 721s | do_aes_ctr: exit 721s | cipher_op_context_destroy_ctr_nss() 721s | verify_bytes() Encrypting 16 octets using AES-CTR with 128-bit key: encrypt: ok 721s | verify_bytes() Encrypting 16 octets using AES-CTR with 128-bit key: counter-block: ok 721s | decode_to_mac() input counter-block: : input "0x 00 00 00 30 00 00 00 00 00 00 00 00 00 00 00 01" 721s | decode_to_mac() output: 721s | 00 00 00 30 00 00 00 00 00 00 00 00 00 00 00 01 ...0............ 721s | decode_to_chunk() Ciphertext: input "0x E4 09 5D 4F B7 A7 B3 79 2D 61 75 A3 26 13 11 B8" 721s | decode_to_chunk() output: 721s | e4 09 5d 4f b7 a7 b3 79 2d 61 75 a3 26 13 11 b8 ..]O...y-au.&... 721s | decode_to_chunk() Plaintext: input "0x 53 69 6E 67 6C 65 20 62 6C 6F 63 6B 20 6D 73 67" 721s | decode_to_chunk() output: 721s | 53 69 6e 67 6c 65 20 62 6c 6f 63 6b 20 6d 73 67 Single block msg 721s | decode_to_chunk() expected counter-block: : input "0x 00 00 00 30 00 00 00 00 00 00 00 00 00 00 00 02" 721s | decode_to_chunk() output: 721s | 00 00 00 30 00 00 00 00 00 00 00 00 00 00 00 02 ...0............ 721s | cipher_op_ctr_nss() enter AES_CTR 0xc63f9566a5d0 use IKEv1 IV wire_iv 0 count 0 721s | ctr_param: count 32 iv 00000030000000000000000000000001 721s | cipher_op_ctr_nss() counter-block updated from 0x1 to 0x2 for 16 bytes 721s | do_aes_ctr: exit 721s | cipher_op_context_destroy_ctr_nss() 721s | verify_bytes() Encrypting 16 octets using AES-CTR with 128-bit key: decrypt: ok 721s | verify_bytes() Encrypting 16 octets using AES-CTR with 128-bit key: counter-block: ok 721s ipsec algparse: Encrypting 32 octets using AES-CTR with 128-bit key 721s | decode_to_chunk() raw_key: input "0x 7E 24 06 78 17 FA E0 D7 43 D6 CE 1F 32 53 91 63" 721s | decode_to_chunk() output: 721s | 7e 24 06 78 17 fa e0 d7 43 d6 ce 1f 32 53 91 63 ~$.x....C...2S.c 721s | CONCATENATE_DATA_AND_BASE: 721s | target: EXTRACT_KEY_FROM_KEY 721s | base: base-key@0xc63f95666bc0 (16-bytes, AES_KEY_GEN) 721s | params: 16-bytes@0xfffff84c1250 721s | key-offset: 0, key-size: 16 721s | EXTRACT_KEY_FROM_KEY: 721s | target: AES_CTR 721s | flags: ENCRYPT+DECRYPT 721s | key_size: 16-bytes 721s | base: base-key@0xc63f95669c00 (32-bytes, EXTRACT_KEY_FROM_KEY) 721s | operation: FLAGS_ONLY 721s | params: 8-bytes@0xfffff84c1258 721s | decode_to_mac() input counter-block: : input "0x 00 6C B6 DB C0 54 3B 59 DA 48 D9 0B 00 00 00 01" 721s | decode_to_mac() output: 721s | 00 6c b6 db c0 54 3b 59 da 48 d9 0b 00 00 00 01 .l...T;Y.H...... 721s | decode_to_chunk() Plaintext: input "0x00 01 02 03 04 05 06 07 08 09 0A 0B 0C 0D 0E 0F10 11 12 13 14 15 16 17 18 19 1A 1B 1C 1D 1E 1F" 721s | decode_to_chunk() output: 721s | 00 01 02 03 04 05 06 07 08 09 0a 0b 0c 0d 0e 0f ................ 721s | 10 11 12 13 14 15 16 17 18 19 1a 1b 1c 1d 1e 1f ................ 721s | decode_to_chunk() Ciphertext: input "0x51 04 A1 06 16 8A 72 D9 79 0D 41 EE 8E DA D3 88EB 2E 1E FC 46 DA 57 C8 FC E6 30 DF 91 41 BE 28" 721s | decode_to_chunk() output: 721s | 51 04 a1 06 16 8a 72 d9 79 0d 41 ee 8e da d3 88 Q.....r.y.A..... 721s | eb 2e 1e fc 46 da 57 c8 fc e6 30 df 91 41 be 28 ....F.W...0..A.( 721s | decode_to_chunk() expected counter-block: : input "0x 00 6C B6 DB C0 54 3B 59 DA 48 D9 0B 00 00 00 03" 721s | decode_to_chunk() output: 721s | 00 6c b6 db c0 54 3b 59 da 48 d9 0b 00 00 00 03 .l...T;Y.H...... 721s | cipher_op_ctr_nss() enter AES_CTR 0xc63f95666a80 use IKEv1 IV wire_iv 0 count 0 721s | ctr_param: count 32 iv 006cb6dbc0543b59da48d90b00000001 721s | cipher_op_ctr_nss() counter-block updated from 0x1 to 0x3 for 32 bytes 721s | do_aes_ctr: exit 721s | cipher_op_context_destroy_ctr_nss() 721s | verify_bytes() Encrypting 32 octets using AES-CTR with 128-bit key: encrypt: ok 721s | verify_bytes() Encrypting 32 octets using AES-CTR with 128-bit key: counter-block: ok 721s | decode_to_mac() input counter-block: : input "0x 00 6C B6 DB C0 54 3B 59 DA 48 D9 0B 00 00 00 01" 721s | decode_to_mac() output: 721s | 00 6c b6 db c0 54 3b 59 da 48 d9 0b 00 00 00 01 .l...T;Y.H...... 721s | decode_to_chunk() Ciphertext: input "0x51 04 A1 06 16 8A 72 D9 79 0D 41 EE 8E DA D3 88EB 2E 1E FC 46 DA 57 C8 FC E6 30 DF 91 41 BE 28" 721s | decode_to_chunk() output: 721s | 51 04 a1 06 16 8a 72 d9 79 0d 41 ee 8e da d3 88 Q.....r.y.A..... 721s | eb 2e 1e fc 46 da 57 c8 fc e6 30 df 91 41 be 28 ....F.W...0..A.( 721s | decode_to_chunk() Plaintext: input "0x00 01 02 03 04 05 06 07 08 09 0A 0B 0C 0D 0E 0F10 11 12 13 14 15 16 17 18 19 1A 1B 1C 1D 1E 1F" 721s | decode_to_chunk() output: 721s | 00 01 02 03 04 05 06 07 08 09 0a 0b 0c 0d 0e 0f ................ 721s | 10 11 12 13 14 15 16 17 18 19 1a 1b 1c 1d 1e 1f ................ 721s | decode_to_chunk() expected counter-block: : input "0x 00 6C B6 DB C0 54 3B 59 DA 48 D9 0B 00 00 00 03" 721s | decode_to_chunk() output: 721s | 00 6c b6 db c0 54 3b 59 da 48 d9 0b 00 00 00 03 .l...T;Y.H...... 721s | cipher_op_ctr_nss() enter AES_CTR 0xc63f95666a80 use IKEv1 IV wire_iv 0 count 0 721s | ctr_param: count 32 iv 006cb6dbc0543b59da48d90b00000001 721s | cipher_op_ctr_nss() counter-block updated from 0x1 to 0x3 for 32 bytes 721s | do_aes_ctr: exit 721s | cipher_op_context_destroy_ctr_nss() 721s | verify_bytes() Encrypting 32 octets using AES-CTR with 128-bit key: decrypt: ok 721s | verify_bytes() Encrypting 32 octets using AES-CTR with 128-bit key: counter-block: ok 721s ipsec algparse: Encrypting 36 octets using AES-CTR with 128-bit key 721s | decode_to_chunk() raw_key: input "0x 76 91 BE 03 5E 50 20 A8 AC 6E 61 85 29 F9 A0 DC" 721s | decode_to_chunk() output: 721s | 76 91 be 03 5e 50 20 a8 ac 6e 61 85 29 f9 a0 dc v...^P ..na.)... 721s | CONCATENATE_DATA_AND_BASE: 721s | target: EXTRACT_KEY_FROM_KEY 721s | base: base-key@0xc63f95666bc0 (16-bytes, AES_KEY_GEN) 721s | params: 16-bytes@0xfffff84c1250 721s | key-offset: 0, key-size: 16 721s | EXTRACT_KEY_FROM_KEY: 721s | target: AES_CTR 721s | flags: ENCRYPT+DECRYPT 721s | key_size: 16-bytes 721s | base: base-key@0xc63f95669c00 (32-bytes, EXTRACT_KEY_FROM_KEY) 721s | operation: FLAGS_ONLY 721s | params: 8-bytes@0xfffff84c1258 721s | decode_to_mac() input counter-block: : input "0x 00 E0 01 7B 27 77 7F 3F 4A 17 86 F0 00 00 00 01" 721s | decode_to_mac() output: 721s | 00 e0 01 7b 27 77 7f 3f 4a 17 86 f0 00 00 00 01 ...{'w.?J....... 721s | decode_to_chunk() Plaintext: input "0x00 01 02 03 04 05 06 07 08 09 0A 0B 0C 0D 0E 0F10 11 12 13 14 15 16 17 18 19 1A 1B 1C 1D 1E 1F20 21 22 23" 721s | decode_to_chunk() output: 721s | 00 01 02 03 04 05 06 07 08 09 0a 0b 0c 0d 0e 0f ................ 721s | 10 11 12 13 14 15 16 17 18 19 1a 1b 1c 1d 1e 1f ................ 721s | 20 21 22 23 !"# 721s | decode_to_chunk() Ciphertext: input "0xC1 CF 48 A8 9F 2F FD D9 CF 46 52 E9 EF DB 72 D745 40 A4 2B DE 6D 78 36 D5 9A 5C EA AE F3 10 5325 B2 07 2F" 721s | decode_to_chunk() output: 721s | c1 cf 48 a8 9f 2f fd d9 cf 46 52 e9 ef db 72 d7 ..H../...FR...r. 721s | 45 40 a4 2b de 6d 78 36 d5 9a 5c ea ae f3 10 53 E@.+.mx6..\....S 721s | 25 b2 07 2f %../ 721s | decode_to_chunk() expected counter-block: : input "0x 00 E0 01 7B 27 77 7F 3F 4A 17 86 F0 00 00 00 04" 721s | decode_to_chunk() output: 721s | 00 e0 01 7b 27 77 7f 3f 4a 17 86 f0 00 00 00 04 ...{'w.?J....... 721s | cipher_op_ctr_nss() enter AES_CTR 0xc63f956668c0 use IKEv1 IV wire_iv 0 count 0 721s | ctr_param: count 32 iv 00e0017b27777f3f4a1786f000000001 721s | cipher_op_ctr_nss() counter-block updated from 0x1 to 0x4 for 36 bytes 721s | do_aes_ctr: exit 721s | cipher_op_context_destroy_ctr_nss() 721s | verify_bytes() Encrypting 36 octets using AES-CTR with 128-bit key: encrypt: ok 721s | verify_bytes() Encrypting 36 octets using AES-CTR with 128-bit key: counter-block: ok 721s | decode_to_mac() input counter-block: : input "0x 00 E0 01 7B 27 77 7F 3F 4A 17 86 F0 00 00 00 01" 721s | decode_to_mac() output: 721s | 00 e0 01 7b 27 77 7f 3f 4a 17 86 f0 00 00 00 01 ...{'w.?J....... 721s | decode_to_chunk() Ciphertext: input "0xC1 CF 48 A8 9F 2F FD D9 CF 46 52 E9 EF DB 72 D745 40 A4 2B DE 6D 78 36 D5 9A 5C EA AE F3 10 5325 B2 07 2F" 721s | decode_to_chunk() output: 721s | c1 cf 48 a8 9f 2f fd d9 cf 46 52 e9 ef db 72 d7 ..H../...FR...r. 721s | 45 40 a4 2b de 6d 78 36 d5 9a 5c ea ae f3 10 53 E@.+.mx6..\....S 721s | 25 b2 07 2f %../ 721s | decode_to_chunk() Plaintext: input "0x00 01 02 03 04 05 06 07 08 09 0A 0B 0C 0D 0E 0F10 11 12 13 14 15 16 17 18 19 1A 1B 1C 1D 1E 1F20 21 22 23" 721s | decode_to_chunk() output: 721s | 00 01 02 03 04 05 06 07 08 09 0a 0b 0c 0d 0e 0f ................ 721s | 10 11 12 13 14 15 16 17 18 19 1a 1b 1c 1d 1e 1f ................ 721s | 20 21 22 23 !"# 721s | decode_to_chunk() expected counter-block: : input "0x 00 E0 01 7B 27 77 7F 3F 4A 17 86 F0 00 00 00 04" 721s | decode_to_chunk() output: 721s | 00 e0 01 7b 27 77 7f 3f 4a 17 86 f0 00 00 00 04 ...{'w.?J....... 721s | cipher_op_ctr_nss() enter AES_CTR 0xc63f956668c0 use IKEv1 IV wire_iv 0 count 0 721s | ctr_param: count 32 iv 00e0017b27777f3f4a1786f000000001 721s | cipher_op_ctr_nss() counter-block updated from 0x1 to 0x4 for 36 bytes 721s | do_aes_ctr: exit 721s | cipher_op_context_destroy_ctr_nss() 721s | verify_bytes() Encrypting 36 octets using AES-CTR with 128-bit key: decrypt: ok 721s | verify_bytes() Encrypting 36 octets using AES-CTR with 128-bit key: counter-block: ok 721s ipsec algparse: Encrypting 16 octets using AES-CTR with 192-bit key 721s | decode_to_chunk() raw_key: input "0x16 AF 5B 14 5F C9 F5 79 C1 75 F9 3E 3B FB 0E ED86 3D 06 CC FD B7 85 15" 721s | decode_to_chunk() output: 721s | 16 af 5b 14 5f c9 f5 79 c1 75 f9 3e 3b fb 0e ed ..[._..y.u.>;... 721s | 86 3d 06 cc fd b7 85 15 .=...... 721s | CONCATENATE_DATA_AND_BASE: 721s | target: EXTRACT_KEY_FROM_KEY 721s | base: base-key@0xc63f95666bc0 (16-bytes, AES_KEY_GEN) 721s | params: 16-bytes@0xfffff84c1250 721s | key-offset: 0, key-size: 24 721s | EXTRACT_KEY_FROM_KEY: 721s | target: AES_CTR 721s | flags: ENCRYPT+DECRYPT 721s | key_size: 24-bytes 721s | base: base-key@0xc63f95669c00 (40-bytes, EXTRACT_KEY_FROM_KEY) 721s | operation: FLAGS_ONLY 721s | params: 8-bytes@0xfffff84c1258 721s | decode_to_mac() input counter-block: : input "0x 00 00 00 48 36 73 3C 14 7D 6D 93 CB 00 00 00 01" 721s | decode_to_mac() output: 721s | 00 00 00 48 36 73 3c 14 7d 6d 93 cb 00 00 00 01 ...H6s<.}m...... 721s | decode_to_chunk() Plaintext: input "0x 53 69 6E 67 6C 65 20 62 6C 6F 63 6B 20 6D 73 67" 721s | decode_to_chunk() output: 721s | 53 69 6e 67 6c 65 20 62 6c 6f 63 6b 20 6d 73 67 Single block msg 721s | decode_to_chunk() Ciphertext: input "0x 4B 55 38 4F E2 59 C9 C8 4E 79 35 A0 03 CB E9 28" 721s | decode_to_chunk() output: 721s | 4b 55 38 4f e2 59 c9 c8 4e 79 35 a0 03 cb e9 28 KU8O.Y..Ny5....( 721s | decode_to_chunk() expected counter-block: : input "0x 00 00 00 48 36 73 3C 14 7D 6D 93 CB 00 00 00 02" 721s | decode_to_chunk() output: 721s | 00 00 00 48 36 73 3c 14 7d 6d 93 cb 00 00 00 02 ...H6s<.}m...... 721s | cipher_op_ctr_nss() enter AES_CTR 0xc63f9566a5b0 use IKEv1 IV wire_iv 0 count 0 721s | ctr_param: count 32 iv 0000004836733c147d6d93cb00000001 721s | cipher_op_ctr_nss() counter-block updated from 0x1 to 0x2 for 16 bytes 721s | do_aes_ctr: exit 721s | cipher_op_context_destroy_ctr_nss() 721s | verify_bytes() Encrypting 16 octets using AES-CTR with 192-bit key: encrypt: ok 721s | verify_bytes() Encrypting 16 octets using AES-CTR with 192-bit key: counter-block: ok 721s | decode_to_mac() input counter-block: : input "0x 00 00 00 48 36 73 3C 14 7D 6D 93 CB 00 00 00 01" 721s | decode_to_mac() output: 721s | 00 00 00 48 36 73 3c 14 7d 6d 93 cb 00 00 00 01 ...H6s<.}m...... 721s | decode_to_chunk() Ciphertext: input "0x 4B 55 38 4F E2 59 C9 C8 4E 79 35 A0 03 CB E9 28" 721s | decode_to_chunk() output: 721s | 4b 55 38 4f e2 59 c9 c8 4e 79 35 a0 03 cb e9 28 KU8O.Y..Ny5....( 721s | decode_to_chunk() Plaintext: input "0x 53 69 6E 67 6C 65 20 62 6C 6F 63 6B 20 6D 73 67" 721s | decode_to_chunk() output: 721s | 53 69 6e 67 6c 65 20 62 6c 6f 63 6b 20 6d 73 67 Single block msg 721s | decode_to_chunk() expected counter-block: : input "0x 00 00 00 48 36 73 3C 14 7D 6D 93 CB 00 00 00 02" 721s | decode_to_chunk() output: 721s | 00 00 00 48 36 73 3c 14 7d 6d 93 cb 00 00 00 02 ...H6s<.}m...... 721s | cipher_op_ctr_nss() enter AES_CTR 0xc63f9566a5b0 use IKEv1 IV wire_iv 0 count 0 721s | ctr_param: count 32 iv 0000004836733c147d6d93cb00000001 721s | cipher_op_ctr_nss() counter-block updated from 0x1 to 0x2 for 16 bytes 721s | do_aes_ctr: exit 721s | cipher_op_context_destroy_ctr_nss() 721s | verify_bytes() Encrypting 16 octets using AES-CTR with 192-bit key: decrypt: ok 721s | verify_bytes() Encrypting 16 octets using AES-CTR with 192-bit key: counter-block: ok 721s ipsec algparse: Encrypting 32 octets using AES-CTR with 192-bit key 721s | decode_to_chunk() raw_key: input "0x7C 5C B2 40 1B 3D C3 3C 19 E7 34 08 19 E0 F6 9C67 8C 3D B8 E6 F6 A9 1A" 721s | decode_to_chunk() output: 721s | 7c 5c b2 40 1b 3d c3 3c 19 e7 34 08 19 e0 f6 9c |\.@.=.<..4..... 721s | 67 8c 3d b8 e6 f6 a9 1a g.=..... 721s | CONCATENATE_DATA_AND_BASE: 721s | target: EXTRACT_KEY_FROM_KEY 721s | base: base-key@0xc63f95666bc0 (16-bytes, AES_KEY_GEN) 721s | params: 16-bytes@0xfffff84c1250 721s | key-offset: 0, key-size: 24 721s | EXTRACT_KEY_FROM_KEY: 721s | target: AES_CTR 721s | flags: ENCRYPT+DECRYPT 721s | key_size: 24-bytes 721s | base: base-key@0xc63f95669c00 (40-bytes, EXTRACT_KEY_FROM_KEY) 721s | operation: FLAGS_ONLY 721s | params: 8-bytes@0xfffff84c1258 721s | decode_to_mac() input counter-block: : input "0x 00 96 B0 3B 02 0C 6E AD C2 CB 50 0D 00 00 00 01" 721s | decode_to_mac() output: 721s | 00 96 b0 3b 02 0c 6e ad c2 cb 50 0d 00 00 00 01 ...;..n...P..... 721s | decode_to_chunk() Plaintext: input "0x00 01 02 03 04 05 06 07 08 09 0A 0B 0C 0D 0E 0F10 11 12 13 14 15 16 17 18 19 1A 1B 1C 1D 1E 1F" 721s | decode_to_chunk() output: 721s | 00 01 02 03 04 05 06 07 08 09 0a 0b 0c 0d 0e 0f ................ 721s | 10 11 12 13 14 15 16 17 18 19 1a 1b 1c 1d 1e 1f ................ 721s | decode_to_chunk() Ciphertext: input "0x45 32 43 FC 60 9B 23 32 7E DF AA FA 71 31 CD 9F84 90 70 1C 5A D4 A7 9C FC 1F E0 FF 42 F4 FB 00" 721s | decode_to_chunk() output: 721s | 45 32 43 fc 60 9b 23 32 7e df aa fa 71 31 cd 9f E2C.`.#2~...q1.. 721s | 84 90 70 1c 5a d4 a7 9c fc 1f e0 ff 42 f4 fb 00 ..p.Z.......B... 721s | decode_to_chunk() expected counter-block: : input "0x 00 96 B0 3B 02 0C 6E AD C2 CB 50 0D 00 00 00 03" 721s | decode_to_chunk() output: 721s | 00 96 b0 3b 02 0c 6e ad c2 cb 50 0d 00 00 00 03 ...;..n...P..... 721s | cipher_op_ctr_nss() enter AES_CTR 0xc63f956668c0 use IKEv1 IV wire_iv 0 count 0 721s | ctr_param: count 32 iv 0096b03b020c6eadc2cb500d00000001 721s | cipher_op_ctr_nss() counter-block updated from 0x1 to 0x3 for 32 bytes 721s | do_aes_ctr: exit 721s | cipher_op_context_destroy_ctr_nss() 721s | verify_bytes() Encrypting 32 octets using AES-CTR with 192-bit key: encrypt: ok 721s | verify_bytes() Encrypting 32 octets using AES-CTR with 192-bit key: counter-block: ok 721s | decode_to_mac() input counter-block: : input "0x 00 96 B0 3B 02 0C 6E AD C2 CB 50 0D 00 00 00 01" 721s | decode_to_mac() output: 721s | 00 96 b0 3b 02 0c 6e ad c2 cb 50 0d 00 00 00 01 ...;..n...P..... 721s | decode_to_chunk() Ciphertext: input "0x45 32 43 FC 60 9B 23 32 7E DF AA FA 71 31 CD 9F84 90 70 1C 5A D4 A7 9C FC 1F E0 FF 42 F4 FB 00" 721s | decode_to_chunk() output: 721s | 45 32 43 fc 60 9b 23 32 7e df aa fa 71 31 cd 9f E2C.`.#2~...q1.. 721s | 84 90 70 1c 5a d4 a7 9c fc 1f e0 ff 42 f4 fb 00 ..p.Z.......B... 721s | decode_to_chunk() Plaintext: input "0x00 01 02 03 04 05 06 07 08 09 0A 0B 0C 0D 0E 0F10 11 12 13 14 15 16 17 18 19 1A 1B 1C 1D 1E 1F" 721s | decode_to_chunk() output: 721s | 00 01 02 03 04 05 06 07 08 09 0a 0b 0c 0d 0e 0f ................ 721s | 10 11 12 13 14 15 16 17 18 19 1a 1b 1c 1d 1e 1f ................ 721s | decode_to_chunk() expected counter-block: : input "0x 00 96 B0 3B 02 0C 6E AD C2 CB 50 0D 00 00 00 03" 721s | decode_to_chunk() output: 721s | 00 96 b0 3b 02 0c 6e ad c2 cb 50 0d 00 00 00 03 ...;..n...P..... 721s | cipher_op_ctr_nss() enter AES_CTR 0xc63f956668c0 use IKEv1 IV wire_iv 0 count 0 721s | ctr_param: count 32 iv 0096b03b020c6eadc2cb500d00000001 721s | cipher_op_ctr_nss() counter-block updated from 0x1 to 0x3 for 32 bytes 721s | do_aes_ctr: exit 721s | cipher_op_context_destroy_ctr_nss() 721s | verify_bytes() Encrypting 32 octets using AES-CTR with 192-bit key: decrypt: ok 721s | verify_bytes() Encrypting 32 octets using AES-CTR with 192-bit key: counter-block: ok 721s ipsec algparse: Encrypting 36 octets using AES-CTR with 192-bit key 721s | decode_to_chunk() raw_key: input "0x02 BF 39 1E E8 EC B1 59 B9 59 61 7B 09 65 27 9BF5 9B 60 A7 86 D3 E0 FE" 721s | decode_to_chunk() output: 721s | 02 bf 39 1e e8 ec b1 59 b9 59 61 7b 09 65 27 9b ..9....Y.Ya{.e'. 721s | f5 9b 60 a7 86 d3 e0 fe ..`..... 721s | CONCATENATE_DATA_AND_BASE: 721s | target: EXTRACT_KEY_FROM_KEY 721s | base: base-key@0xc63f95666bc0 (16-bytes, AES_KEY_GEN) 721s | params: 16-bytes@0xfffff84c1250 721s | key-offset: 0, key-size: 24 721s | EXTRACT_KEY_FROM_KEY: 721s | target: AES_CTR 721s | flags: ENCRYPT+DECRYPT 721s | key_size: 24-bytes 721s | base: base-key@0xc63f95669c00 (40-bytes, EXTRACT_KEY_FROM_KEY) 721s | operation: FLAGS_ONLY 721s | params: 8-bytes@0xfffff84c1258 721s | decode_to_mac() input counter-block: : input "0x 00 07 BD FD 5C BD 60 27 8D CC 09 12 00 00 00 01" 721s | decode_to_mac() output: 721s | 00 07 bd fd 5c bd 60 27 8d cc 09 12 00 00 00 01 ....\.`'........ 721s | decode_to_chunk() Plaintext: input "0x00 01 02 03 04 05 06 07 08 09 0A 0B 0C 0D 0E 0F10 11 12 13 14 15 16 17 18 19 1A 1B 1C 1D 1E 1F20 21 22 23" 721s | decode_to_chunk() output: 721s | 00 01 02 03 04 05 06 07 08 09 0a 0b 0c 0d 0e 0f ................ 721s | 10 11 12 13 14 15 16 17 18 19 1a 1b 1c 1d 1e 1f ................ 721s | 20 21 22 23 !"# 721s | decode_to_chunk() Ciphertext: input "0x96 89 3F C5 5E 5C 72 2F 54 0B 7D D1 DD F7 E7 58D2 88 BC 95 C6 91 65 88 45 36 C8 11 66 2F 21 88AB EE 09 35" 721s | decode_to_chunk() output: 721s | 96 89 3f c5 5e 5c 72 2f 54 0b 7d d1 dd f7 e7 58 ..?.^\r/T.}....X 721s | d2 88 bc 95 c6 91 65 88 45 36 c8 11 66 2f 21 88 ......e.E6..f/!. 721s | ab ee 09 35 ...5 721s | decode_to_chunk() expected counter-block: : input "0x 00 07 BD FD 5C BD 60 27 8D CC 09 12 00 00 00 04" 721s | decode_to_chunk() output: 721s | 00 07 bd fd 5c bd 60 27 8d cc 09 12 00 00 00 04 ....\.`'........ 721s | cipher_op_ctr_nss() enter AES_CTR 0xc63f956668c0 use IKEv1 IV wire_iv 0 count 0 721s | ctr_param: count 32 iv 0007bdfd5cbd60278dcc091200000001 721s | cipher_op_ctr_nss() counter-block updated from 0x1 to 0x4 for 36 bytes 721s | do_aes_ctr: exit 721s | cipher_op_context_destroy_ctr_nss() 721s | verify_bytes() Encrypting 36 octets using AES-CTR with 192-bit key: encrypt: ok 721s | verify_bytes() Encrypting 36 octets using AES-CTR with 192-bit key: counter-block: ok 721s | decode_to_mac() input counter-block: : input "0x 00 07 BD FD 5C BD 60 27 8D CC 09 12 00 00 00 01" 721s | decode_to_mac() output: 721s | 00 07 bd fd 5c bd 60 27 8d cc 09 12 00 00 00 01 ....\.`'........ 721s | decode_to_chunk() Ciphertext: input "0x96 89 3F C5 5E 5C 72 2F 54 0B 7D D1 DD F7 E7 58D2 88 BC 95 C6 91 65 88 45 36 C8 11 66 2F 21 88AB EE 09 35" 721s | decode_to_chunk() output: 721s | 96 89 3f c5 5e 5c 72 2f 54 0b 7d d1 dd f7 e7 58 ..?.^\r/T.}....X 721s | d2 88 bc 95 c6 91 65 88 45 36 c8 11 66 2f 21 88 ......e.E6..f/!. 721s | ab ee 09 35 ...5 721s | decode_to_chunk() Plaintext: input "0x00 01 02 03 04 05 06 07 08 09 0A 0B 0C 0D 0E 0F10 11 12 13 14 15 16 17 18 19 1A 1B 1C 1D 1E 1F20 21 22 23" 721s | decode_to_chunk() output: 721s | 00 01 02 03 04 05 06 07 08 09 0a 0b 0c 0d 0e 0f ................ 721s | 10 11 12 13 14 15 16 17 18 19 1a 1b 1c 1d 1e 1f ................ 721s | 20 21 22 23 !"# 721s | decode_to_chunk() expected counter-block: : input "0x 00 07 BD FD 5C BD 60 27 8D CC 09 12 00 00 00 04" 721s | decode_to_chunk() output: 721s | 00 07 bd fd 5c bd 60 27 8d cc 09 12 00 00 00 04 ....\.`'........ 721s | cipher_op_ctr_nss() enter AES_CTR 0xc63f956668c0 use IKEv1 IV wire_iv 0 count 0 721s | ctr_param: count 32 iv 0007bdfd5cbd60278dcc091200000001 721s | cipher_op_ctr_nss() counter-block updated from 0x1 to 0x4 for 36 bytes 721s | do_aes_ctr: exit 721s | cipher_op_context_destroy_ctr_nss() 721s | verify_bytes() Encrypting 36 octets using AES-CTR with 192-bit key: decrypt: ok 721s | verify_bytes() Encrypting 36 octets using AES-CTR with 192-bit key: counter-block: ok 721s ipsec algparse: Encrypting 16 octets using AES-CTR with 256-bit key 721s | decode_to_chunk() raw_key: input "0x77 6B EF F2 85 1D B0 6F 4C 8A 05 42 C8 69 6F 6C6A 81 AF 1E EC 96 B4 D3 7F C1 D6 89 E6 C1 C1 04" 721s | decode_to_chunk() output: 721s | 77 6b ef f2 85 1d b0 6f 4c 8a 05 42 c8 69 6f 6c wk.....oL..B.iol 721s | 6a 81 af 1e ec 96 b4 d3 7f c1 d6 89 e6 c1 c1 04 j............... 721s | CONCATENATE_DATA_AND_BASE: 721s | target: EXTRACT_KEY_FROM_KEY 721s | base: base-key@0xc63f95666bc0 (16-bytes, AES_KEY_GEN) 721s | params: 16-bytes@0xfffff84c1250 721s | key-offset: 0, key-size: 32 721s | EXTRACT_KEY_FROM_KEY: 721s | target: AES_CTR 721s | flags: ENCRYPT+DECRYPT 721s | key_size: 32-bytes 721s | base: base-key@0xc63f95669c00 (48-bytes, EXTRACT_KEY_FROM_KEY) 721s | operation: FLAGS_ONLY 721s | params: 8-bytes@0xfffff84c1258 721s | decode_to_mac() input counter-block: : input "0x 00 00 00 60 DB 56 72 C9 7A A8 F0 B2 00 00 00 01" 721s | decode_to_mac() output: 721s | 00 00 00 60 db 56 72 c9 7a a8 f0 b2 00 00 00 01 ...`.Vr.z....... 721s | decode_to_chunk() Plaintext: input "0x 53 69 6E 67 6C 65 20 62 6C 6F 63 6B 20 6D 73 67" 721s | decode_to_chunk() output: 721s | 53 69 6e 67 6c 65 20 62 6c 6f 63 6b 20 6d 73 67 Single block msg 721s | decode_to_chunk() Ciphertext: input "0x 14 5A D0 1D BF 82 4E C7 56 08 63 DC 71 E3 E0 C0" 721s | decode_to_chunk() output: 721s | 14 5a d0 1d bf 82 4e c7 56 08 63 dc 71 e3 e0 c0 .Z....N.V.c.q... 721s | decode_to_chunk() expected counter-block: : input "0x 00 00 00 60 DB 56 72 C9 7A A8 F0 B2 00 00 00 02" 721s | decode_to_chunk() output: 721s | 00 00 00 60 db 56 72 c9 7a a8 f0 b2 00 00 00 02 ...`.Vr.z....... 721s | cipher_op_ctr_nss() enter AES_CTR 0xc63f9566a5b0 use IKEv1 IV wire_iv 0 count 0 721s | ctr_param: count 32 iv 00000060db5672c97aa8f0b200000001 721s | cipher_op_ctr_nss() counter-block updated from 0x1 to 0x2 for 16 bytes 721s | do_aes_ctr: exit 721s | cipher_op_context_destroy_ctr_nss() 721s | verify_bytes() Encrypting 16 octets using AES-CTR with 256-bit key: encrypt: ok 721s | verify_bytes() Encrypting 16 octets using AES-CTR with 256-bit key: counter-block: ok 721s | decode_to_mac() input counter-block: : input "0x 00 00 00 60 DB 56 72 C9 7A A8 F0 B2 00 00 00 01" 721s | decode_to_mac() output: 721s | 00 00 00 60 db 56 72 c9 7a a8 f0 b2 00 00 00 01 ...`.Vr.z....... 721s | decode_to_chunk() Ciphertext: input "0x 14 5A D0 1D BF 82 4E C7 56 08 63 DC 71 E3 E0 C0" 721s | decode_to_chunk() output: 721s | 14 5a d0 1d bf 82 4e c7 56 08 63 dc 71 e3 e0 c0 .Z....N.V.c.q... 721s | decode_to_chunk() Plaintext: input "0x 53 69 6E 67 6C 65 20 62 6C 6F 63 6B 20 6D 73 67" 721s | decode_to_chunk() output: 721s | 53 69 6e 67 6c 65 20 62 6c 6f 63 6b 20 6d 73 67 Single block msg 721s | decode_to_chunk() expected counter-block: : input "0x 00 00 00 60 DB 56 72 C9 7A A8 F0 B2 00 00 00 02" 721s | decode_to_chunk() output: 721s | 00 00 00 60 db 56 72 c9 7a a8 f0 b2 00 00 00 02 ...`.Vr.z....... 721s | cipher_op_ctr_nss() enter AES_CTR 0xc63f9566a5b0 use IKEv1 IV wire_iv 0 count 0 721s | ctr_param: count 32 iv 00000060db5672c97aa8f0b200000001 721s | cipher_op_ctr_nss() counter-block updated from 0x1 to 0x2 for 16 bytes 721s | do_aes_ctr: exit 721s | cipher_op_context_destroy_ctr_nss() 721s | verify_bytes() Encrypting 16 octets using AES-CTR with 256-bit key: decrypt: ok 721s | verify_bytes() Encrypting 16 octets using AES-CTR with 256-bit key: counter-block: ok 721s ipsec algparse: Encrypting 32 octets using AES-CTR with 256-bit key 721s | decode_to_chunk() raw_key: input "0xF6 D6 6D 6B D5 2D 59 BB 07 96 36 58 79 EF F8 86C6 6D D5 1A 5B 6A 99 74 4B 50 59 0C 87 A2 38 84" 721s | decode_to_chunk() output: 721s | f6 d6 6d 6b d5 2d 59 bb 07 96 36 58 79 ef f8 86 ..mk.-Y...6Xy... 721s | c6 6d d5 1a 5b 6a 99 74 4b 50 59 0c 87 a2 38 84 .m..[j.tKPY...8. 721s | CONCATENATE_DATA_AND_BASE: 721s | target: EXTRACT_KEY_FROM_KEY 721s | base: base-key@0xc63f95666bc0 (16-bytes, AES_KEY_GEN) 721s | params: 16-bytes@0xfffff84c1250 721s | key-offset: 0, key-size: 32 721s | EXTRACT_KEY_FROM_KEY: 721s | target: AES_CTR 721s | flags: ENCRYPT+DECRYPT 721s | key_size: 32-bytes 721s | base: base-key@0xc63f95669c00 (48-bytes, EXTRACT_KEY_FROM_KEY) 721s | operation: FLAGS_ONLY 721s | params: 8-bytes@0xfffff84c1258 721s | decode_to_mac() input counter-block: : input "0x 00 FA AC 24 C1 58 5E F1 5A 43 D8 75 00 00 00 01" 721s | decode_to_mac() output: 721s | 00 fa ac 24 c1 58 5e f1 5a 43 d8 75 00 00 00 01 ...$.X^.ZC.u.... 721s | decode_to_chunk() Plaintext: input "0x00 01 02 03 04 05 06 07 08 09 0A 0B 0C 0D 0E 0F10 11 12 13 14 15 16 17 18 19 1A 1B 1C 1D 1E 1F" 721s | decode_to_chunk() output: 721s | 00 01 02 03 04 05 06 07 08 09 0a 0b 0c 0d 0e 0f ................ 721s | 10 11 12 13 14 15 16 17 18 19 1a 1b 1c 1d 1e 1f ................ 721s | decode_to_chunk() Ciphertext: input "0xF0 5E 23 1B 38 94 61 2C 49 EE 00 0B 80 4E B2 A9B8 30 6B 50 8F 83 9D 6A 55 30 83 1D 93 44 AF 1C" 721s | decode_to_chunk() output: 721s | f0 5e 23 1b 38 94 61 2c 49 ee 00 0b 80 4e b2 a9 .^#.8.a,I....N.. 721s | b8 30 6b 50 8f 83 9d 6a 55 30 83 1d 93 44 af 1c .0kP...jU0...D.. 721s | decode_to_chunk() expected counter-block: : input "0x 00 FA AC 24 C1 58 5E F1 5A 43 D8 75 00 00 00 03" 721s | decode_to_chunk() output: 721s | 00 fa ac 24 c1 58 5e f1 5a 43 d8 75 00 00 00 03 ...$.X^.ZC.u.... 721s | cipher_op_ctr_nss() enter AES_CTR 0xc63f956668c0 use IKEv1 IV wire_iv 0 count 0 721s | ctr_param: count 32 iv 00faac24c1585ef15a43d87500000001 721s | cipher_op_ctr_nss() counter-block updated from 0x1 to 0x3 for 32 bytes 721s | do_aes_ctr: exit 721s | cipher_op_context_destroy_ctr_nss() 721s | verify_bytes() Encrypting 32 octets using AES-CTR with 256-bit key: encrypt: ok 721s | verify_bytes() Encrypting 32 octets using AES-CTR with 256-bit key: counter-block: ok 721s | decode_to_mac() input counter-block: : input "0x 00 FA AC 24 C1 58 5E F1 5A 43 D8 75 00 00 00 01" 721s | decode_to_mac() output: 721s | 00 fa ac 24 c1 58 5e f1 5a 43 d8 75 00 00 00 01 ...$.X^.ZC.u.... 721s | decode_to_chunk() Ciphertext: input "0xF0 5E 23 1B 38 94 61 2C 49 EE 00 0B 80 4E B2 A9B8 30 6B 50 8F 83 9D 6A 55 30 83 1D 93 44 AF 1C" 721s | decode_to_chunk() output: 721s | f0 5e 23 1b 38 94 61 2c 49 ee 00 0b 80 4e b2 a9 .^#.8.a,I....N.. 721s | b8 30 6b 50 8f 83 9d 6a 55 30 83 1d 93 44 af 1c .0kP...jU0...D.. 721s | decode_to_chunk() Plaintext: input "0x00 01 02 03 04 05 06 07 08 09 0A 0B 0C 0D 0E 0F10 11 12 13 14 15 16 17 18 19 1A 1B 1C 1D 1E 1F" 721s | decode_to_chunk() output: 721s | 00 01 02 03 04 05 06 07 08 09 0a 0b 0c 0d 0e 0f ................ 721s | 10 11 12 13 14 15 16 17 18 19 1a 1b 1c 1d 1e 1f ................ 721s | decode_to_chunk() expected counter-block: : input "0x 00 FA AC 24 C1 58 5E F1 5A 43 D8 75 00 00 00 03" 721s | decode_to_chunk() output: 721s | 00 fa ac 24 c1 58 5e f1 5a 43 d8 75 00 00 00 03 ...$.X^.ZC.u.... 721s | cipher_op_ctr_nss() enter AES_CTR 0xc63f956668c0 use IKEv1 IV wire_iv 0 count 0 721s | ctr_param: count 32 iv 00faac24c1585ef15a43d87500000001 721s | cipher_op_ctr_nss() counter-block updated from 0x1 to 0x3 for 32 bytes 721s | do_aes_ctr: exit 721s | cipher_op_context_destroy_ctr_nss() 721s | verify_bytes() Encrypting 32 octets using AES-CTR with 256-bit key: decrypt: ok 721s | verify_bytes() Encrypting 32 octets using AES-CTR with 256-bit key: counter-block: ok 721s ipsec algparse: Encrypting 36 octets using AES-CTR with 256-bit key 721s | decode_to_chunk() raw_key: input "0xFF 7A 61 7C E6 91 48 E4 F1 72 6E 2F 43 58 1D E2AA 62 D9 F8 05 53 2E DF F1 EE D6 87 FB 54 15 3D" 721s | decode_to_chunk() output: 721s | ff 7a 61 7c e6 91 48 e4 f1 72 6e 2f 43 58 1d e2 .za|..H..rn/CX.. 721s | aa 62 d9 f8 05 53 2e df f1 ee d6 87 fb 54 15 3d .b...S.......T.= 721s | CONCATENATE_DATA_AND_BASE: 721s | target: EXTRACT_KEY_FROM_KEY 721s | base: base-key@0xc63f95666bc0 (16-bytes, AES_KEY_GEN) 721s | params: 16-bytes@0xfffff84c1250 721s | key-offset: 0, key-size: 32 721s | EXTRACT_KEY_FROM_KEY: 721s | target: AES_CTR 721s | flags: ENCRYPT+DECRYPT 721s | key_size: 32-bytes 721s | base: base-key@0xc63f95669c00 (48-bytes, EXTRACT_KEY_FROM_KEY) 721s | operation: FLAGS_ONLY 721s | params: 8-bytes@0xfffff84c1258 721s | decode_to_mac() input counter-block: : input "0x 00 1C C5 B7 51 A5 1D 70 A1 C1 11 48 00 00 00 01" 721s | decode_to_mac() output: 721s | 00 1c c5 b7 51 a5 1d 70 a1 c1 11 48 00 00 00 01 ....Q..p...H.... 721s | decode_to_chunk() Plaintext: input "0x00 01 02 03 04 05 06 07 08 09 0A 0B 0C 0D 0E 0F10 11 12 13 14 15 16 17 18 19 1A 1B 1C 1D 1E 1F20 21 22 23" 721s | decode_to_chunk() output: 721s | 00 01 02 03 04 05 06 07 08 09 0a 0b 0c 0d 0e 0f ................ 721s | 10 11 12 13 14 15 16 17 18 19 1a 1b 1c 1d 1e 1f ................ 721s | 20 21 22 23 !"# 721s | decode_to_chunk() Ciphertext: input "0xEB 6C 52 82 1D 0B BB F7 CE 75 94 46 2A CA 4F AAB4 07 DF 86 65 69 FD 07 F4 8C C0 B5 83 D6 07 1F1E C0 E6 B8" 721s | decode_to_chunk() output: 721s | eb 6c 52 82 1d 0b bb f7 ce 75 94 46 2a ca 4f aa .lR......u.F*.O. 721s | b4 07 df 86 65 69 fd 07 f4 8c c0 b5 83 d6 07 1f ....ei.......... 721s | 1e c0 e6 b8 .... 721s | decode_to_chunk() expected counter-block: : input "0x 00 1C C5 B7 51 A5 1D 70 A1 C1 11 48 00 00 00 04" 721s | decode_to_chunk() output: 721s | 00 1c c5 b7 51 a5 1d 70 a1 c1 11 48 00 00 00 04 ....Q..p...H.... 721s | cipher_op_ctr_nss() enter AES_CTR 0xc63f956668c0 use IKEv1 IV wire_iv 0 count 0 721s | ctr_param: count 32 iv 001cc5b751a51d70a1c1114800000001 721s | cipher_op_ctr_nss() counter-block updated from 0x1 to 0x4 for 36 bytes 721s | do_aes_ctr: exit 721s | cipher_op_context_destroy_ctr_nss() 721s | verify_bytes() Encrypting 36 octets using AES-CTR with 256-bit key: encrypt: ok 721s | verify_bytes() Encrypting 36 octets using AES-CTR with 256-bit key: counter-block: ok 721s | decode_to_mac() input counter-block: : input "0x 00 1C C5 B7 51 A5 1D 70 A1 C1 11 48 00 00 00 01" 721s | decode_to_mac() output: 721s | 00 1c c5 b7 51 a5 1d 70 a1 c1 11 48 00 00 00 01 ....Q..p...H.... 721s | decode_to_chunk() Ciphertext: input "0xEB 6C 52 82 1D 0B BB F7 CE 75 94 46 2A CA 4F AAB4 07 DF 86 65 69 FD 07 F4 8C C0 B5 83 D6 07 1F1E C0 E6 B8" 721s | decode_to_chunk() output: 721s | eb 6c 52 82 1d 0b bb f7 ce 75 94 46 2a ca 4f aa .lR......u.F*.O. 721s | b4 07 df 86 65 69 fd 07 f4 8c c0 b5 83 d6 07 1f ....ei.......... 721s | 1e c0 e6 b8 .... 721s | decode_to_chunk() Plaintext: input "0x00 01 02 03 04 05 06 07 08 09 0A 0B 0C 0D 0E 0F10 11 12 13 14 15 16 17 18 19 1A 1B 1C 1D 1E 1F20 21 22 23" 721s | decode_to_chunk() output: 721s | 00 01 02 03 04 05 06 07 08 09 0a 0b 0c 0d 0e 0f ................ 721s | 10 11 12 13 14 15 16 17 18 19 1a 1b 1c 1d 1e 1f ................ 721s | 20 21 22 23 !"# 721s | decode_to_chunk() expected counter-block: : input "0x 00 1C C5 B7 51 A5 1D 70 A1 C1 11 48 00 00 00 04" 721s | decode_to_chunk() output: 721s | 00 1c c5 b7 51 a5 1d 70 a1 c1 11 48 00 00 00 04 ....Q..p...H.... 721s | cipher_op_ctr_nss() enter AES_CTR 0xc63f956668c0 use IKEv1 IV wire_iv 0 count 0 721s | ctr_param: count 32 iv 001cc5b751a51d70a1c1114800000001 721s | cipher_op_ctr_nss() counter-block updated from 0x1 to 0x4 for 36 bytes 721s | do_aes_ctr: exit 721s | cipher_op_context_destroy_ctr_nss() 721s | verify_bytes() Encrypting 36 octets using AES-CTR with 256-bit key: decrypt: ok 721s | verify_bytes() Encrypting 36 octets using AES-CTR with 256-bit key: counter-block: ok 721s ipsec algparse: testing AES_CBC: 721s ipsec algparse: Encrypting 16 bytes (1 block) using AES-CBC with 128-bit key 721s | decode_to_chunk() raw_key: input "0x06a9214036b8a15b512e03d534120006" 721s | decode_to_chunk() output: 721s | 06 a9 21 40 36 b8 a1 5b 51 2e 03 d5 34 12 00 06 ..!@6..[Q...4... 721s | CONCATENATE_DATA_AND_BASE: 721s | target: EXTRACT_KEY_FROM_KEY 721s | base: base-key@0xc63f95666bc0 (16-bytes, AES_KEY_GEN) 721s | params: 16-bytes@0xfffff84c1260 721s | key-offset: 0, key-size: 16 721s | EXTRACT_KEY_FROM_KEY: 721s | target: AES_CBC 721s | flags: ENCRYPT+DECRYPT 721s | key_size: 16-bytes 721s | base: base-key@0xc63f95669c00 (32-bytes, EXTRACT_KEY_FROM_KEY) 721s | operation: FLAGS_ONLY 721s | params: 8-bytes@0xfffff84c1268 721s | decode_to_mac() IV: : input "0x3dafba429d9eb430b422da802c9fac41" 721s | decode_to_mac() output: 721s | 3d af ba 42 9d 9e b4 30 b4 22 da 80 2c 9f ac 41 =..B...0."..,..A 721s | decode_to_chunk() new IV: : input "0xe353779c1079aeb82708942dbe77181a" 721s | decode_to_chunk() output: 721s | e3 53 77 9c 10 79 ae b8 27 08 94 2d be 77 18 1a .Sw..y..'..-.w.. 721s | decode_to_chunk() plaintext: : input "Single block msg" 721s | decode_to_chunk() output: 721s | 53 69 6e 67 6c 65 20 62 6c 6f 63 6b 20 6d 73 67 Single block msg 721s | decode_to_chunk() ciphertext: : input "0xe353779c1079aeb82708942dbe77181a" 721s | decode_to_chunk() output: 721s | e3 53 77 9c 10 79 ae b8 27 08 94 2d be 77 18 1a .Sw..y..'..-.w.. 721s | NSS ike_alg_nss_cbc: AES_CBC - enter (nil) 721s | using IKEv1 IV 721s | NSS ike_alg_nss_cbc: AES_CBC - exit 721s | verify_bytes() Encrypting 16 bytes (1 block) using AES-CBC with 128-bit key: encrypt: ok 721s | verify_bytes() Encrypting 16 bytes (1 block) using AES-CBC with 128-bit key: updated CBC IV: ok 721s | decode_to_mac() IV: : input "0x3dafba429d9eb430b422da802c9fac41" 721s | decode_to_mac() output: 721s | 3d af ba 42 9d 9e b4 30 b4 22 da 80 2c 9f ac 41 =..B...0."..,..A 721s | decode_to_chunk() new IV: : input "0xe353779c1079aeb82708942dbe77181a" 721s | decode_to_chunk() output: 721s | e3 53 77 9c 10 79 ae b8 27 08 94 2d be 77 18 1a .Sw..y..'..-.w.. 721s | decode_to_chunk() ciphertext: : input "0xe353779c1079aeb82708942dbe77181a" 721s | decode_to_chunk() output: 721s | e3 53 77 9c 10 79 ae b8 27 08 94 2d be 77 18 1a .Sw..y..'..-.w.. 721s | decode_to_chunk() plaintext: : input "Single block msg" 721s | decode_to_chunk() output: 721s | 53 69 6e 67 6c 65 20 62 6c 6f 63 6b 20 6d 73 67 Single block msg 721s | NSS ike_alg_nss_cbc: AES_CBC - enter (nil) 721s | using IKEv1 IV 721s | NSS ike_alg_nss_cbc: AES_CBC - exit 721s | verify_bytes() Encrypting 16 bytes (1 block) using AES-CBC with 128-bit key: decrypt: ok 721s | verify_bytes() Encrypting 16 bytes (1 block) using AES-CBC with 128-bit key: updated CBC IV: ok 721s ipsec algparse: Encrypting 32 bytes (2 blocks) using AES-CBC with 128-bit key 721s | decode_to_chunk() raw_key: input "0xc286696d887c9aa0611bbb3e2025a45a" 721s | decode_to_chunk() output: 721s | c2 86 69 6d 88 7c 9a a0 61 1b bb 3e 20 25 a4 5a ..im.|..a..> %.Z 721s | CONCATENATE_DATA_AND_BASE: 721s | target: EXTRACT_KEY_FROM_KEY 721s | base: base-key@0xc63f95666bc0 (16-bytes, AES_KEY_GEN) 721s | params: 16-bytes@0xfffff84c1260 721s | key-offset: 0, key-size: 16 721s | EXTRACT_KEY_FROM_KEY: 721s | target: AES_CBC 721s | flags: ENCRYPT+DECRYPT 721s | key_size: 16-bytes 721s | base: base-key@0xc63f95669c00 (32-bytes, EXTRACT_KEY_FROM_KEY) 721s | operation: FLAGS_ONLY 721s | params: 8-bytes@0xfffff84c1268 721s | decode_to_mac() IV: : input "0x562e17996d093d28ddb3ba695a2e6f58" 721s | decode_to_mac() output: 721s | 56 2e 17 99 6d 09 3d 28 dd b3 ba 69 5a 2e 6f 58 V...m.=(...iZ.oX 721s | decode_to_chunk() new IV: : input "0xd296cd94c2cccf8a3a863028b5e1dc0a7586602d253cfff91b8266bea6d61ab1" 721s | decode_to_chunk() output: 721s | d2 96 cd 94 c2 cc cf 8a 3a 86 30 28 b5 e1 dc 0a ........:.0(.... 721s | 75 86 60 2d 25 3c ff f9 1b 82 66 be a6 d6 1a b1 u.`-%<....f..... 721s | decode_to_chunk() plaintext: : input "0x000102030405060708090a0b0c0d0e0f101112131415161718191a1b1c1d1e1f" 721s | decode_to_chunk() output: 721s | 00 01 02 03 04 05 06 07 08 09 0a 0b 0c 0d 0e 0f ................ 721s | 10 11 12 13 14 15 16 17 18 19 1a 1b 1c 1d 1e 1f ................ 721s | decode_to_chunk() ciphertext: : input "0xd296cd94c2cccf8a3a863028b5e1dc0a7586602d253cfff91b8266bea6d61ab1" 721s | decode_to_chunk() output: 721s | d2 96 cd 94 c2 cc cf 8a 3a 86 30 28 b5 e1 dc 0a ........:.0(.... 721s | 75 86 60 2d 25 3c ff f9 1b 82 66 be a6 d6 1a b1 u.`-%<....f..... 721s | NSS ike_alg_nss_cbc: AES_CBC - enter (nil) 721s | using IKEv1 IV 721s | NSS ike_alg_nss_cbc: AES_CBC - exit 721s | verify_bytes() Encrypting 32 bytes (2 blocks) using AES-CBC with 128-bit key: encrypt: ok 721s | verify_bytes() Encrypting 32 bytes (2 blocks) using AES-CBC with 128-bit key: updated CBC IV: ok 721s | decode_to_mac() IV: : input "0x562e17996d093d28ddb3ba695a2e6f58" 721s | decode_to_mac() output: 721s | 56 2e 17 99 6d 09 3d 28 dd b3 ba 69 5a 2e 6f 58 V...m.=(...iZ.oX 721s | decode_to_chunk() new IV: : input "0xd296cd94c2cccf8a3a863028b5e1dc0a7586602d253cfff91b8266bea6d61ab1" 721s | decode_to_chunk() output: 721s | d2 96 cd 94 c2 cc cf 8a 3a 86 30 28 b5 e1 dc 0a ........:.0(.... 721s | 75 86 60 2d 25 3c ff f9 1b 82 66 be a6 d6 1a b1 u.`-%<....f..... 721s | decode_to_chunk() ciphertext: : input "0xd296cd94c2cccf8a3a863028b5e1dc0a7586602d253cfff91b8266bea6d61ab1" 721s | decode_to_chunk() output: 721s | d2 96 cd 94 c2 cc cf 8a 3a 86 30 28 b5 e1 dc 0a ........:.0(.... 721s | 75 86 60 2d 25 3c ff f9 1b 82 66 be a6 d6 1a b1 u.`-%<....f..... 721s | decode_to_chunk() plaintext: : input "0x000102030405060708090a0b0c0d0e0f101112131415161718191a1b1c1d1e1f" 721s | decode_to_chunk() output: 721s | 00 01 02 03 04 05 06 07 08 09 0a 0b 0c 0d 0e 0f ................ 721s | 10 11 12 13 14 15 16 17 18 19 1a 1b 1c 1d 1e 1f ................ 721s | NSS ike_alg_nss_cbc: AES_CBC - enter (nil) 721s | using IKEv1 IV 721s | NSS ike_alg_nss_cbc: AES_CBC - exit 721s | verify_bytes() Encrypting 32 bytes (2 blocks) using AES-CBC with 128-bit key: decrypt: ok 721s | verify_bytes() Encrypting 32 bytes (2 blocks) using AES-CBC with 128-bit key: updated CBC IV: ok 721s ipsec algparse: Encrypting 48 bytes (3 blocks) using AES-CBC with 128-bit key 721s | decode_to_chunk() raw_key: input "0x6c3ea0477630ce21a2ce334aa746c2cd" 721s | decode_to_chunk() output: 721s | 6c 3e a0 47 76 30 ce 21 a2 ce 33 4a a7 46 c2 cd l>.Gv0.!..3J.F.. 721s | CONCATENATE_DATA_AND_BASE: 721s | target: EXTRACT_KEY_FROM_KEY 721s | base: base-key@0xc63f95666bc0 (16-bytes, AES_KEY_GEN) 721s | params: 16-bytes@0xfffff84c1260 721s | key-offset: 0, key-size: 16 721s | EXTRACT_KEY_FROM_KEY: 721s | target: AES_CBC 721s | flags: ENCRYPT+DECRYPT 721s | key_size: 16-bytes 721s | base: base-key@0xc63f95669c00 (32-bytes, EXTRACT_KEY_FROM_KEY) 721s | operation: FLAGS_ONLY 721s | params: 8-bytes@0xfffff84c1268 721s | decode_to_mac() IV: : input "0xc782dc4c098c66cbd9cd27d825682c81" 721s | decode_to_mac() output: 721s | c7 82 dc 4c 09 8c 66 cb d9 cd 27 d8 25 68 2c 81 ...L..f...'.%h,. 721s | decode_to_chunk() new IV: : input "0xd0a02b3836451753d493665d33f0e8862dea54cdb293abc7506939276772f8d5021c19216bad525c8579695d83ba2684" 721s | decode_to_chunk() output: 721s | d0 a0 2b 38 36 45 17 53 d4 93 66 5d 33 f0 e8 86 ..+86E.S..f]3... 721s | 2d ea 54 cd b2 93 ab c7 50 69 39 27 67 72 f8 d5 -.T.....Pi9'gr.. 721s | 02 1c 19 21 6b ad 52 5c 85 79 69 5d 83 ba 26 84 ...!k.R\.yi]..&. 721s | decode_to_chunk() plaintext: : input "This is a 48-byte message (exactly 3 AES blocks)" 721s | decode_to_chunk() output: 721s | 54 68 69 73 20 69 73 20 61 20 34 38 2d 62 79 74 This is a 48-byt 721s | 65 20 6d 65 73 73 61 67 65 20 28 65 78 61 63 74 e message (exact 721s | 6c 79 20 33 20 41 45 53 20 62 6c 6f 63 6b 73 29 ly 3 AES blocks) 721s | decode_to_chunk() ciphertext: : input "0xd0a02b3836451753d493665d33f0e8862dea54cdb293abc7506939276772f8d5021c19216bad525c8579695d83ba2684" 721s | decode_to_chunk() output: 721s | d0 a0 2b 38 36 45 17 53 d4 93 66 5d 33 f0 e8 86 ..+86E.S..f]3... 721s | 2d ea 54 cd b2 93 ab c7 50 69 39 27 67 72 f8 d5 -.T.....Pi9'gr.. 721s | 02 1c 19 21 6b ad 52 5c 85 79 69 5d 83 ba 26 84 ...!k.R\.yi]..&. 721s | NSS ike_alg_nss_cbc: AES_CBC - enter (nil) 721s | using IKEv1 IV 721s | NSS ike_alg_nss_cbc: AES_CBC - exit 721s | verify_bytes() Encrypting 48 bytes (3 blocks) using AES-CBC with 128-bit key: encrypt: ok 721s | verify_bytes() Encrypting 48 bytes (3 blocks) using AES-CBC with 128-bit key: updated CBC IV: ok 721s | decode_to_mac() IV: : input "0xc782dc4c098c66cbd9cd27d825682c81" 721s | decode_to_mac() output: 721s | c7 82 dc 4c 09 8c 66 cb d9 cd 27 d8 25 68 2c 81 ...L..f...'.%h,. 721s | decode_to_chunk() new IV: : input "0xd0a02b3836451753d493665d33f0e8862dea54cdb293abc7506939276772f8d5021c19216bad525c8579695d83ba2684" 721s | decode_to_chunk() output: 721s | d0 a0 2b 38 36 45 17 53 d4 93 66 5d 33 f0 e8 86 ..+86E.S..f]3... 721s | 2d ea 54 cd b2 93 ab c7 50 69 39 27 67 72 f8 d5 -.T.....Pi9'gr.. 721s | 02 1c 19 21 6b ad 52 5c 85 79 69 5d 83 ba 26 84 ...!k.R\.yi]..&. 721s | decode_to_chunk() ciphertext: : input "0xd0a02b3836451753d493665d33f0e8862dea54cdb293abc7506939276772f8d5021c19216bad525c8579695d83ba2684" 721s | decode_to_chunk() output: 721s | d0 a0 2b 38 36 45 17 53 d4 93 66 5d 33 f0 e8 86 ..+86E.S..f]3... 721s | 2d ea 54 cd b2 93 ab c7 50 69 39 27 67 72 f8 d5 -.T.....Pi9'gr.. 721s | 02 1c 19 21 6b ad 52 5c 85 79 69 5d 83 ba 26 84 ...!k.R\.yi]..&. 721s | decode_to_chunk() plaintext: : input "This is a 48-byte message (exactly 3 AES blocks)" 721s | decode_to_chunk() output: 721s | 54 68 69 73 20 69 73 20 61 20 34 38 2d 62 79 74 This is a 48-byt 721s | 65 20 6d 65 73 73 61 67 65 20 28 65 78 61 63 74 e message (exact 721s | 6c 79 20 33 20 41 45 53 20 62 6c 6f 63 6b 73 29 ly 3 AES blocks) 721s | NSS ike_alg_nss_cbc: AES_CBC - enter (nil) 721s | using IKEv1 IV 721s | NSS ike_alg_nss_cbc: AES_CBC - exit 721s | verify_bytes() Encrypting 48 bytes (3 blocks) using AES-CBC with 128-bit key: decrypt: ok 721s | verify_bytes() Encrypting 48 bytes (3 blocks) using AES-CBC with 128-bit key: updated CBC IV: ok 721s ipsec algparse: Encrypting 64 bytes (4 blocks) using AES-CBC with 128-bit key 721s | decode_to_chunk() raw_key: input "0x56e47a38c5598974bc46903dba290349" 721s | decode_to_chunk() output: 721s | 56 e4 7a 38 c5 59 89 74 bc 46 90 3d ba 29 03 49 V.z8.Y.t.F.=.).I 721s | CONCATENATE_DATA_AND_BASE: 721s | target: EXTRACT_KEY_FROM_KEY 721s | base: base-key@0xc63f95666bc0 (16-bytes, AES_KEY_GEN) 721s | params: 16-bytes@0xfffff84c1260 721s | key-offset: 0, key-size: 16 721s | EXTRACT_KEY_FROM_KEY: 721s | target: AES_CBC 721s | flags: ENCRYPT+DECRYPT 721s | key_size: 16-bytes 721s | base: base-key@0xc63f95669c00 (32-bytes, EXTRACT_KEY_FROM_KEY) 721s | operation: FLAGS_ONLY 721s | params: 8-bytes@0xfffff84c1268 721s | decode_to_mac() IV: : input "0x8ce82eefbea0da3c44699ed7db51b7d9" 721s | decode_to_mac() output: 721s | 8c e8 2e ef be a0 da 3c 44 69 9e d7 db 51 b7 d9 ...........U 721s | decode_to_chunk() plaintext: : input "0xa0a1a2a3a4a5a6a7a8a9aaabacadaeafb0b1b2b3b4b5b6b7b8b9babbbcbdbebfc0c1c2c3c4c5c6c7c8c9cacbcccdcecfd0d1d2d3d4d5d6d7d8d9dadbdcdddedf" 721s | decode_to_chunk() output: 721s | a0 a1 a2 a3 a4 a5 a6 a7 a8 a9 aa ab ac ad ae af ................ 721s | b0 b1 b2 b3 b4 b5 b6 b7 b8 b9 ba bb bc bd be bf ................ 721s | c0 c1 c2 c3 c4 c5 c6 c7 c8 c9 ca cb cc cd ce cf ................ 721s | d0 d1 d2 d3 d4 d5 d6 d7 d8 d9 da db dc dd de df ................ 721s | decode_to_chunk() ciphertext: : input "0xc30e32ffedc0774e6aff6af0869f71aa0f3af07a9a31a9c684db207eb0ef8e4e35907aa632c3ffdf868bb7b29d3d46ad83ce9f9a102ee99d49a53e87f4c3da55" 721s | decode_to_chunk() output: 721s | c3 0e 32 ff ed c0 77 4e 6a ff 6a f0 86 9f 71 aa ..2...wNj.j...q. 721s | 0f 3a f0 7a 9a 31 a9 c6 84 db 20 7e b0 ef 8e 4e .:.z.1.... ~...N 721s | 35 90 7a a6 32 c3 ff df 86 8b b7 b2 9d 3d 46 ad 5.z.2........=F. 721s | 83 ce 9f 9a 10 2e e9 9d 49 a5 3e 87 f4 c3 da 55 ........I.>....U 721s | NSS ike_alg_nss_cbc: AES_CBC - enter (nil) 721s | using IKEv1 IV 721s | NSS ike_alg_nss_cbc: AES_CBC - exit 721s | verify_bytes() Encrypting 64 bytes (4 blocks) using AES-CBC with 128-bit key: encrypt: ok 721s | verify_bytes() Encrypting 64 bytes (4 blocks) using AES-CBC with 128-bit key: updated CBC IV: ok 721s | decode_to_mac() IV: : input "0x8ce82eefbea0da3c44699ed7db51b7d9" 721s | decode_to_mac() output: 721s | 8c e8 2e ef be a0 da 3c 44 69 9e d7 db 51 b7 d9 ...........U 721s | decode_to_chunk() ciphertext: : input "0xc30e32ffedc0774e6aff6af0869f71aa0f3af07a9a31a9c684db207eb0ef8e4e35907aa632c3ffdf868bb7b29d3d46ad83ce9f9a102ee99d49a53e87f4c3da55" 721s | decode_to_chunk() output: 721s | c3 0e 32 ff ed c0 77 4e 6a ff 6a f0 86 9f 71 aa ..2...wNj.j...q. 721s | 0f 3a f0 7a 9a 31 a9 c6 84 db 20 7e b0 ef 8e 4e .:.z.1.... ~...N 721s | 35 90 7a a6 32 c3 ff df 86 8b b7 b2 9d 3d 46 ad 5.z.2........=F. 721s | 83 ce 9f 9a 10 2e e9 9d 49 a5 3e 87 f4 c3 da 55 ........I.>....U 721s | decode_to_chunk() plaintext: : input "0xa0a1a2a3a4a5a6a7a8a9aaabacadaeafb0b1b2b3b4b5b6b7b8b9babbbcbdbebfc0c1c2c3c4c5c6c7c8c9cacbcccdcecfd0d1d2d3d4d5d6d7d8d9dadbdcdddedf" 721s | decode_to_chunk() output: 721s | a0 a1 a2 a3 a4 a5 a6 a7 a8 a9 aa ab ac ad ae af ................ 721s | b0 b1 b2 b3 b4 b5 b6 b7 b8 b9 ba bb bc bd be bf ................ 721s | c0 c1 c2 c3 c4 c5 c6 c7 c8 c9 ca cb cc cd ce cf ................ 721s | d0 d1 d2 d3 d4 d5 d6 d7 d8 d9 da db dc dd de df ................ 721s | NSS ike_alg_nss_cbc: AES_CBC - enter (nil) 721s | using IKEv1 IV 721s | NSS ike_alg_nss_cbc: AES_CBC - exit 721s | verify_bytes() Encrypting 64 bytes (4 blocks) using AES-CBC with 128-bit key: decrypt: ok 721s | verify_bytes() Encrypting 64 bytes (4 blocks) using AES-CBC with 128-bit key: updated CBC IV: ok 721s ipsec algparse: testing AES_XCBC: 721s ipsec algparse: RFC 3566 Test Case 1: AES-XCBC-MAC-96 with 0-byte input 721s | decode_to_chunk() test_prf_vector: input "0x000102030405060708090a0b0c0d0e0f" 721s | decode_to_chunk() output: 721s | 00 01 02 03 04 05 06 07 08 09 0a 0b 0c 0d 0e 0f ................ 721s | decode_to_chunk() test_prf_vector: input "" 721s | decode_to_chunk() output: 721s | 721s | decode_to_chunk() test_prf_vector: input "0x75f0251d528ac01c4573dfd584d79f29" 721s | decode_to_chunk() output: 721s | 75 f0 25 1d 52 8a c0 1c 45 73 df d5 84 d7 9f 29 u.%.R...Es.....) 721s | PRF chunk interface PRF AES_XCBC init key hunk 0xc63f95669ff0 (length 16) 721s | 00 01 02 03 04 05 06 07 08 09 0a 0b 0c 0d 0e 0f ................ 721s | CONCATENATE_DATA_AND_BASE: 721s | target: EXTRACT_KEY_FROM_KEY 721s | base: base-key@0xc63f95666bc0 (16-bytes, AES_KEY_GEN) 721s | params: 16-bytes@0xfffff84c11b0 721s | key-offset: 0, key-size: 16 721s | EXTRACT_KEY_FROM_KEY: 721s | target: EXTRACT_KEY_FROM_KEY 721s | key_size: 16-bytes 721s | base: base-key@0xc63f95669c00 (32-bytes, EXTRACT_KEY_FROM_KEY) 721s | operation: FLAGS_ONLY 721s | params: 8-bytes@0xfffff84c1158 721s | XCBC: Key 16=16 just right 721s | key-offset: 0, key-size: 16 721s | EXTRACT_KEY_FROM_KEY: 721s | target: AES_ECB 721s | flags: SIGN 721s | key_size: 16-bytes 721s | base: base-key@0xc63f95668510 (16-bytes, EXTRACT_KEY_FROM_KEY) 721s | operation: FLAGS_ONLY 721s | params: 8-bytes@0xfffff84c1108 721s | PRF chunk interface PRF AES_XCBC 0xc63f95666b60 721s | PRF chunk interface PRF AES_XCBC update message (0xc63f95668430 length 0) 721s | 721s | XCBC: data 721s | 721s | K extracting all 16 bytes of key@0xc63f95669c00 721s | K: symkey-key@0xc63f95669c00 (16-bytes, AES_ECB) 721s | sizeof bytes 16 721s | wrapper: (SECItemType)1735288172: ec b6 97 12 25 78 ad ed d0 49 db 0f 32 7b c0 f6 721s | K extracted len 16 bytes at 0xc63f9566a880 721s | unwrapped: 721s | 00 01 02 03 04 05 06 07 08 09 0a 0b 0c 0d 0e 0f ................ 721s | XCBC: K: 721s | 00 01 02 03 04 05 06 07 08 09 0a 0b 0c 0d 0e 0f ................ 721s | XCBC: K1 721s | c3 52 80 57 54 23 7f 31 1a c0 ff f4 e3 e0 3e 78 .R.WT#.1......>x 721s | CONCATENATE_DATA_AND_BASE: 721s | target: EXTRACT_KEY_FROM_KEY 721s | base: base-key@0xc63f95666bc0 (16-bytes, AES_KEY_GEN) 721s | params: 16-bytes@0xfffff84c1070 721s | key-offset: 0, key-size: 16 721s | EXTRACT_KEY_FROM_KEY: 721s | target: AES_ECB 721s | flags: SIGN 721s | key_size: 16-bytes 721s | base: base-key@0xc63f9566aa20 (32-bytes, EXTRACT_KEY_FROM_KEY) 721s | operation: FLAGS_ONLY 721s | params: 8-bytes@0xfffff84c1078 721s | Computing E[0] using K3 721s | XCBC: K3 721s | c1 a7 ab a1 a2 3a 94 06 58 07 a0 8c c8 ee d0 6e .....:..X......n 721s | XCBC: E[n-1] 721s | 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................ 721s | XCBC: M[n] 721s | 721s | XCBC: M[n] 721s | 721s | XCBC: M[n]:80...^E[n-1]^K3 721s | 41 a7 ab a1 a2 3a 94 06 58 07 a0 8c c8 ee d0 6e A....:..X......n 721s | XCBC: MAC 721s | 75 f0 25 1d 52 8a c0 1c 45 73 df d5 84 d7 9f 29 u.%.R...Es.....) 721s | PRF chunk interface PRF AES_XCBC final length 16 721s | 75 f0 25 1d 52 8a c0 1c 45 73 df d5 84 d7 9f 29 u.%.R...Es.....) 721s | chunk output 721s | 75 f0 25 1d 52 8a c0 1c 45 73 df d5 84 d7 9f 29 u.%.R...Es.....) 721s | verify_bytes() RFC 3566 Test Case 1: AES-XCBC-MAC-96 with 0-byte input: prf OUT: ok 721s | CONCATENATE_DATA_AND_BASE: 721s | target: EXTRACT_KEY_FROM_KEY 721s | base: base-key@0xc63f95666bc0 (16-bytes, AES_KEY_GEN) 721s | params: 16-bytes@0xfffff84c1230 721s | key-offset: 0, key-size: 16 721s | EXTRACT_KEY_FROM_KEY: 721s | target: EXTRACT_KEY_FROM_KEY 721s | key_size: 16-bytes 721s | base: base-key@0xc63f95668510 (32-bytes, EXTRACT_KEY_FROM_KEY) 721s | operation: FLAGS_ONLY 721s | params: 8-bytes@0xfffff84c11d8 721s | PRF symkey interface PRF AES_XCBC init key symkey-key@0xc63f95669c00 (size 16) 721s | PRF symkey interface: key symkey-key@0xc63f95669c00 (16-bytes, EXTRACT_KEY_FROM_KEY) 721s | XCBC: Key 16=16 just right 721s | key-offset: 0, key-size: 16 721s | EXTRACT_KEY_FROM_KEY: 721s | target: AES_ECB 721s | flags: SIGN 721s | key_size: 16-bytes 721s | base: base-key@0xc63f95669c00 (16-bytes, EXTRACT_KEY_FROM_KEY) 721s | operation: FLAGS_ONLY 721s | params: 8-bytes@0xfffff84c1138 721s | PRF symkey interface PRF AES_XCBC 0xc63f95666b60 721s | PRF symkey interface PRF AES_XCBC update symkey message-key@(nil) (size 0) 721s | PRF symkey interface: symkey message-key@NULL 721s | symkey message NULL key has no bytes 721s | XCBC: data 721s | 721s | K extracting all 16 bytes of key@0xc63f95668510 721s | K: symkey-key@0xc63f95668510 (16-bytes, AES_ECB) 721s | sizeof bytes 16 721s | wrapper: (SECItemType)-129233584: ec b6 97 12 25 78 ad ed d0 49 db 0f 32 7b c0 f6 721s | K extracted len 16 bytes at 0xc63f9566a880 721s | unwrapped: 721s | 00 01 02 03 04 05 06 07 08 09 0a 0b 0c 0d 0e 0f ................ 721s | XCBC: K: 721s | 00 01 02 03 04 05 06 07 08 09 0a 0b 0c 0d 0e 0f ................ 721s | XCBC: K1 721s | c3 52 80 57 54 23 7f 31 1a c0 ff f4 e3 e0 3e 78 .R.WT#.1......>x 721s | CONCATENATE_DATA_AND_BASE: 721s | target: EXTRACT_KEY_FROM_KEY 721s | base: base-key@0xc63f95666bc0 (16-bytes, AES_KEY_GEN) 721s | params: 16-bytes@0xfffff84c10c0 721s | key-offset: 0, key-size: 16 721s | EXTRACT_KEY_FROM_KEY: 721s | target: AES_ECB 721s | flags: SIGN 721s | key_size: 16-bytes 721s | base: base-key@0xc63f9566ad90 (32-bytes, EXTRACT_KEY_FROM_KEY) 721s | operation: FLAGS_ONLY 721s | params: 8-bytes@0xfffff84c10c8 721s | Computing E[0] using K3 721s | XCBC: K3 721s | c1 a7 ab a1 a2 3a 94 06 58 07 a0 8c c8 ee d0 6e .....:..X......n 721s | XCBC: E[n-1] 721s | 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................ 721s | XCBC: M[n] 721s | 721s | XCBC: M[n] 721s | 721s | XCBC: M[n]:80...^E[n-1]^K3 721s | 41 a7 ab a1 a2 3a 94 06 58 07 a0 8c c8 ee d0 6e A....:..X......n 721s | XCBC: MAC 721s | 75 f0 25 1d 52 8a c0 1c 45 73 df d5 84 d7 9f 29 u.%.R...Es.....) 721s | CONCATENATE_DATA_AND_BASE: 721s | target: EXTRACT_KEY_FROM_KEY 721s | base: base-key@0xc63f95666bc0 (16-bytes, AES_KEY_GEN) 721s | params: 16-bytes@0xfffff84c11b0 721s | key-offset: 0, key-size: 16 721s | EXTRACT_KEY_FROM_KEY: 721s | target: EXTRACT_KEY_FROM_KEY 721s | key_size: 16-bytes 721s | base: base-key@0xc63f9566ad90 (32-bytes, EXTRACT_KEY_FROM_KEY) 721s | operation: FLAGS_ONLY 721s | params: 8-bytes@0xfffff84c1158 721s | PRF symkey interface PRF AES_XCBC final-key@0xc63f9566aa20 (size 16) 721s | PRF symkey interface: key-key@0xc63f9566aa20 (16-bytes, EXTRACT_KEY_FROM_KEY) 721s | output: symkey-key@0xc63f9566aa20 (16-bytes, EXTRACT_KEY_FROM_KEY) 721s | RFC 3566 Test Case 1: AES-XCBC-MAC-96 with 0-byte input extracting all 16 bytes of key@0xc63f9566aa20 721s | RFC 3566 Test Case 1: AES-XCBC-MAC-96 with 0-byte input: symkey-key@0xc63f9566aa20 (16-bytes, EXTRACT_KEY_FROM_KEY) 721s | sizeof bytes 16 721s | wrapper: siBuffer: 09 35 cf 0e c4 e0 d8 ee b4 23 f9 a7 f3 3d 8a 33 721s | RFC 3566 Test Case 1: AES-XCBC-MAC-96 with 0-byte input extracted len 16 bytes at 0xc63f9566aa00 721s | unwrapped: 721s | 75 f0 25 1d 52 8a c0 1c 45 73 df d5 84 d7 9f 29 u.%.R...Es.....) 721s | verify_bytes() RFC 3566 Test Case 1: AES-XCBC-MAC-96 with 0-byte input: symkey: ok 721s ipsec algparse: RFC 3566 Test Case 2: AES-XCBC-MAC-96 with 3-byte input 721s | decode_to_chunk() test_prf_vector: input "0x000102030405060708090a0b0c0d0e0f" 721s | decode_to_chunk() output: 721s | 00 01 02 03 04 05 06 07 08 09 0a 0b 0c 0d 0e 0f ................ 721s | decode_to_chunk() test_prf_vector: input "0x000102" 721s | decode_to_chunk() output: 721s | 00 01 02 ... 721s | decode_to_chunk() test_prf_vector: input "0x5b376580ae2f19afe7219ceef172756f" 721s | decode_to_chunk() output: 721s | 5b 37 65 80 ae 2f 19 af e7 21 9c ee f1 72 75 6f [7e../...!...ruo 721s | PRF chunk interface PRF AES_XCBC init key hunk 0xc63f95669ff0 (length 16) 721s | 00 01 02 03 04 05 06 07 08 09 0a 0b 0c 0d 0e 0f ................ 721s | CONCATENATE_DATA_AND_BASE: 721s | target: EXTRACT_KEY_FROM_KEY 721s | base: base-key@0xc63f95666bc0 (16-bytes, AES_KEY_GEN) 721s | params: 16-bytes@0xfffff84c11b0 721s | key-offset: 0, key-size: 16 721s | EXTRACT_KEY_FROM_KEY: 721s | target: EXTRACT_KEY_FROM_KEY 721s | key_size: 16-bytes 721s | base: base-key@0xc63f95669c00 (32-bytes, EXTRACT_KEY_FROM_KEY) 721s | operation: FLAGS_ONLY 721s | params: 8-bytes@0xfffff84c1158 721s | XCBC: Key 16=16 just right 721s | key-offset: 0, key-size: 16 721s | EXTRACT_KEY_FROM_KEY: 721s | target: AES_ECB 721s | flags: SIGN 721s | key_size: 16-bytes 721s | base: base-key@0xc63f9566aa20 (16-bytes, EXTRACT_KEY_FROM_KEY) 721s | operation: FLAGS_ONLY 721s | params: 8-bytes@0xfffff84c1108 721s | PRF chunk interface PRF AES_XCBC 0xc63f95666b60 721s | PRF chunk interface PRF AES_XCBC update message (0xc63f95668430 length 3) 721s | 00 01 02 ... 721s | XCBC: data 721s | 00 01 02 ... 721s | K extracting all 16 bytes of key@0xc63f95669c00 721s | K: symkey-key@0xc63f95669c00 (16-bytes, AES_ECB) 721s | sizeof bytes 16 721s | wrapper: (SECItemType)1735288172: ec b6 97 12 25 78 ad ed d0 49 db 0f 32 7b c0 f6 721s | K extracted len 16 bytes at 0xc63f9566a010 721s | unwrapped: 721s | 00 01 02 03 04 05 06 07 08 09 0a 0b 0c 0d 0e 0f ................ 721s | XCBC: K: 721s | 00 01 02 03 04 05 06 07 08 09 0a 0b 0c 0d 0e 0f ................ 721s | XCBC: K1 721s | c3 52 80 57 54 23 7f 31 1a c0 ff f4 e3 e0 3e 78 .R.WT#.1......>x 721s | CONCATENATE_DATA_AND_BASE: 721s | target: EXTRACT_KEY_FROM_KEY 721s | base: base-key@0xc63f95666bc0 (16-bytes, AES_KEY_GEN) 721s | params: 16-bytes@0xfffff84c1070 721s | key-offset: 0, key-size: 16 721s | EXTRACT_KEY_FROM_KEY: 721s | target: AES_ECB 721s | flags: SIGN 721s | key_size: 16-bytes 721s | base: base-key@0xc63f95668510 (32-bytes, EXTRACT_KEY_FROM_KEY) 721s | operation: FLAGS_ONLY 721s | params: 8-bytes@0xfffff84c1078 721s | Computing E[1] using K3 721s | XCBC: K3 721s | c1 a7 ab a1 a2 3a 94 06 58 07 a0 8c c8 ee d0 6e .....:..X......n 721s | XCBC: E[n-1] 721s | 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................ 721s | XCBC: M[n] 721s | 00 01 02 ... 721s | XCBC: M[n] 721s | 00 01 02 ... 721s | XCBC: M[n]:80...^E[n-1]^K3 721s | c1 a6 a9 21 a2 3a 94 06 58 07 a0 8c c8 ee d0 6e ...!.:..X......n 721s | XCBC: MAC 721s | 5b 37 65 80 ae 2f 19 af e7 21 9c ee f1 72 75 6f [7e../...!...ruo 721s | PRF chunk interface PRF AES_XCBC final length 16 721s | 5b 37 65 80 ae 2f 19 af e7 21 9c ee f1 72 75 6f [7e../...!...ruo 721s | chunk output 721s | 5b 37 65 80 ae 2f 19 af e7 21 9c ee f1 72 75 6f [7e../...!...ruo 721s | verify_bytes() RFC 3566 Test Case 2: AES-XCBC-MAC-96 with 3-byte input: prf OUT: ok 721s | CONCATENATE_DATA_AND_BASE: 721s | target: EXTRACT_KEY_FROM_KEY 721s | base: base-key@0xc63f95666bc0 (16-bytes, AES_KEY_GEN) 721s | params: 16-bytes@0xfffff84c1230 721s | key-offset: 0, key-size: 16 721s | EXTRACT_KEY_FROM_KEY: 721s | target: EXTRACT_KEY_FROM_KEY 721s | key_size: 16-bytes 721s | base: base-key@0xc63f9566aa20 (32-bytes, EXTRACT_KEY_FROM_KEY) 721s | operation: FLAGS_ONLY 721s | params: 8-bytes@0xfffff84c11d8 721s | PRF symkey interface PRF AES_XCBC init key symkey-key@0xc63f95669c00 (size 16) 721s | PRF symkey interface: key symkey-key@0xc63f95669c00 (16-bytes, EXTRACT_KEY_FROM_KEY) 721s | XCBC: Key 16=16 just right 721s | key-offset: 0, key-size: 16 721s | EXTRACT_KEY_FROM_KEY: 721s | target: AES_ECB 721s | flags: SIGN 721s | key_size: 16-bytes 721s | base: base-key@0xc63f95669c00 (16-bytes, EXTRACT_KEY_FROM_KEY) 721s | operation: FLAGS_ONLY 721s | params: 8-bytes@0xfffff84c1138 721s | PRF symkey interface PRF AES_XCBC 0xc63f95666b60 721s | CONCATENATE_DATA_AND_BASE: 721s | target: EXTRACT_KEY_FROM_KEY 721s | base: base-key@0xc63f95666bc0 (16-bytes, AES_KEY_GEN) 721s | params: 16-bytes@0xfffff84c1230 721s | key-offset: 0, key-size: 3 721s | EXTRACT_KEY_FROM_KEY: 721s | target: EXTRACT_KEY_FROM_KEY 721s | key_size: 3-bytes 721s | base: base-key@0xc63f9566ad90 (19-bytes, EXTRACT_KEY_FROM_KEY) 721s | operation: FLAGS_ONLY 721s | params: 8-bytes@0xfffff84c11d8 721s | PRF symkey interface PRF AES_XCBC update symkey message-key@0xc63f95668510 (size 3) 721s | PRF symkey interface: symkey message-key@0xc63f95668510 (3-bytes, EXTRACT_KEY_FROM_KEY) 721s | symkey message extracting all 3 bytes of key@0xc63f95668510 721s | symkey message: symkey-key@0xc63f95668510 (3-bytes, EXTRACT_KEY_FROM_KEY) 721s | sizeof bytes 16 721s | wrapper: (SECItemType)41: 18 f5 8c c5 58 b4 8a 31 2b 94 99 2b 6e 7f e7 91 721s | symkey message extracted len 16 bytes at 0xc63f9566a010 721s | unwrapped: 721s | 00 01 02 00 00 00 00 00 00 00 00 00 00 00 00 00 ................ 721s | XCBC: data 721s | 00 01 02 ... 721s | K extracting all 16 bytes of key@0xc63f9566aa20 721s | K: symkey-key@0xc63f9566aa20 (16-bytes, AES_ECB) 721s | sizeof bytes 16 721s | wrapper: (SECItemType)-129235528: ec b6 97 12 25 78 ad ed d0 49 db 0f 32 7b c0 f6 721s | K extracted len 16 bytes at 0xc63f95666a80 721s | unwrapped: 721s | 00 01 02 03 04 05 06 07 08 09 0a 0b 0c 0d 0e 0f ................ 721s | XCBC: K: 721s | 00 01 02 03 04 05 06 07 08 09 0a 0b 0c 0d 0e 0f ................ 721s | XCBC: K1 721s | c3 52 80 57 54 23 7f 31 1a c0 ff f4 e3 e0 3e 78 .R.WT#.1......>x 721s | CONCATENATE_DATA_AND_BASE: 721s | target: EXTRACT_KEY_FROM_KEY 721s | base: base-key@0xc63f95666bc0 (16-bytes, AES_KEY_GEN) 721s | params: 16-bytes@0xfffff84c10c0 721s | key-offset: 0, key-size: 16 721s | EXTRACT_KEY_FROM_KEY: 721s | target: AES_ECB 721s | flags: SIGN 721s | key_size: 16-bytes 721s | base: base-key@0xc63f9566b120 (32-bytes, EXTRACT_KEY_FROM_KEY) 721s | operation: FLAGS_ONLY 721s | params: 8-bytes@0xfffff84c10c8 721s | Computing E[1] using K3 721s | XCBC: K3 721s | c1 a7 ab a1 a2 3a 94 06 58 07 a0 8c c8 ee d0 6e .....:..X......n 721s | XCBC: E[n-1] 721s | 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................ 721s | XCBC: M[n] 721s | 00 01 02 ... 721s | XCBC: M[n] 721s | 00 01 02 ... 721s | XCBC: M[n]:80...^E[n-1]^K3 721s | c1 a6 a9 21 a2 3a 94 06 58 07 a0 8c c8 ee d0 6e ...!.:..X......n 721s | XCBC: MAC 721s | 5b 37 65 80 ae 2f 19 af e7 21 9c ee f1 72 75 6f [7e../...!...ruo 721s | CONCATENATE_DATA_AND_BASE: 721s | target: EXTRACT_KEY_FROM_KEY 721s | base: base-key@0xc63f95666bc0 (16-bytes, AES_KEY_GEN) 721s | params: 16-bytes@0xfffff84c11b0 721s | key-offset: 0, key-size: 16 721s | EXTRACT_KEY_FROM_KEY: 721s | target: EXTRACT_KEY_FROM_KEY 721s | key_size: 16-bytes 721s | base: base-key@0xc63f9566b120 (32-bytes, EXTRACT_KEY_FROM_KEY) 721s | operation: FLAGS_ONLY 721s | params: 8-bytes@0xfffff84c1158 721s | PRF symkey interface PRF AES_XCBC final-key@0xc63f9566ad90 (size 16) 721s | PRF symkey interface: key-key@0xc63f9566ad90 (16-bytes, EXTRACT_KEY_FROM_KEY) 721s | output: symkey-key@0xc63f9566ad90 (16-bytes, EXTRACT_KEY_FROM_KEY) 721s | RFC 3566 Test Case 2: AES-XCBC-MAC-96 with 3-byte input extracting all 16 bytes of key@0xc63f9566ad90 721s | RFC 3566 Test Case 2: AES-XCBC-MAC-96 with 3-byte input: symkey-key@0xc63f9566ad90 (16-bytes, EXTRACT_KEY_FROM_KEY) 721s | sizeof bytes 16 721s | wrapper: siBuffer: d0 5d f9 33 f1 4c dc e8 eb 57 c7 5c 3e b4 3d f9 721s | RFC 3566 Test Case 2: AES-XCBC-MAC-96 with 3-byte input extracted len 16 bytes at 0xc63f95666a80 721s | unwrapped: 721s | 5b 37 65 80 ae 2f 19 af e7 21 9c ee f1 72 75 6f [7e../...!...ruo 721s | verify_bytes() RFC 3566 Test Case 2: AES-XCBC-MAC-96 with 3-byte input: symkey: ok 721s ipsec algparse: RFC 3566 Test Case 3: AES-XCBC-MAC-96 with 16-byte input 721s | decode_to_chunk() test_prf_vector: input "0x000102030405060708090a0b0c0d0e0f" 721s | decode_to_chunk() output: 721s | 00 01 02 03 04 05 06 07 08 09 0a 0b 0c 0d 0e 0f ................ 721s | decode_to_chunk() test_prf_vector: input "0x000102030405060708090a0b0c0d0e0f" 721s | decode_to_chunk() output: 721s | 00 01 02 03 04 05 06 07 08 09 0a 0b 0c 0d 0e 0f ................ 721s | decode_to_chunk() test_prf_vector: input "0xd2a246fa349b68a79998a4394ff7a263" 721s | decode_to_chunk() output: 721s | d2 a2 46 fa 34 9b 68 a7 99 98 a4 39 4f f7 a2 63 ..F.4.h....9O..c 721s | PRF chunk interface PRF AES_XCBC init key hunk 0xc63f95669ff0 (length 16) 721s | 00 01 02 03 04 05 06 07 08 09 0a 0b 0c 0d 0e 0f ................ 721s | CONCATENATE_DATA_AND_BASE: 721s | target: EXTRACT_KEY_FROM_KEY 721s | base: base-key@0xc63f95666bc0 (16-bytes, AES_KEY_GEN) 721s | params: 16-bytes@0xfffff84c11b0 721s | key-offset: 0, key-size: 16 721s | EXTRACT_KEY_FROM_KEY: 721s | target: EXTRACT_KEY_FROM_KEY 721s | key_size: 16-bytes 721s | base: base-key@0xc63f95669c00 (32-bytes, EXTRACT_KEY_FROM_KEY) 721s | operation: FLAGS_ONLY 721s | params: 8-bytes@0xfffff84c1158 721s | XCBC: Key 16=16 just right 721s | key-offset: 0, key-size: 16 721s | EXTRACT_KEY_FROM_KEY: 721s | target: AES_ECB 721s | flags: SIGN 721s | key_size: 16-bytes 721s | base: base-key@0xc63f9566ad90 (16-bytes, EXTRACT_KEY_FROM_KEY) 721s | operation: FLAGS_ONLY 721s | params: 8-bytes@0xfffff84c1108 721s | PRF chunk interface PRF AES_XCBC 0xc63f95666b60 721s | PRF chunk interface PRF AES_XCBC update message (0xc63f95668430 length 16) 721s | 00 01 02 03 04 05 06 07 08 09 0a 0b 0c 0d 0e 0f ................ 721s | XCBC: data 721s | 00 01 02 03 04 05 06 07 08 09 0a 0b 0c 0d 0e 0f ................ 721s | K extracting all 16 bytes of key@0xc63f95669c00 721s | K: symkey-key@0xc63f95669c00 (16-bytes, AES_ECB) 721s | sizeof bytes 16 721s | wrapper: (SECItemType)1735262254: ec b6 97 12 25 78 ad ed d0 49 db 0f 32 7b c0 f6 721s | K extracted len 16 bytes at 0xc63f9566aa00 721s | unwrapped: 721s | 00 01 02 03 04 05 06 07 08 09 0a 0b 0c 0d 0e 0f ................ 721s | XCBC: K: 721s | 00 01 02 03 04 05 06 07 08 09 0a 0b 0c 0d 0e 0f ................ 721s | XCBC: K1 721s | c3 52 80 57 54 23 7f 31 1a c0 ff f4 e3 e0 3e 78 .R.WT#.1......>x 721s | CONCATENATE_DATA_AND_BASE: 721s | target: EXTRACT_KEY_FROM_KEY 721s | base: base-key@0xc63f95666bc0 (16-bytes, AES_KEY_GEN) 721s | params: 16-bytes@0xfffff84c1070 721s | key-offset: 0, key-size: 16 721s | EXTRACT_KEY_FROM_KEY: 721s | target: AES_ECB 721s | flags: SIGN 721s | key_size: 16-bytes 721s | base: base-key@0xc63f95668510 (32-bytes, EXTRACT_KEY_FROM_KEY) 721s | operation: FLAGS_ONLY 721s | params: 8-bytes@0xfffff84c1078 721s | XCBC: Computing E[1] using K2 721s | XCBC: K2 721s | bd 86 2f fb 97 ad 2f b8 f8 b8 91 f6 03 2f 36 cb ../.../....../6. 721s | XCBC: E[n-1] 721s | 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................ 721s | XCBC: M[n] 721s | 00 01 02 03 04 05 06 07 08 09 0a 0b 0c 0d 0e 0f ................ 721s | XCBC: M[n]^E[n-1]^K2 721s | bd 87 2d f8 93 a8 29 bf f0 b1 9b fd 0f 22 38 c4 ..-...)......"8. 721s | XCBC: MAC 721s | d2 a2 46 fa 34 9b 68 a7 99 98 a4 39 4f f7 a2 63 ..F.4.h....9O..c 721s | PRF chunk interface PRF AES_XCBC final length 16 721s | d2 a2 46 fa 34 9b 68 a7 99 98 a4 39 4f f7 a2 63 ..F.4.h....9O..c 721s | chunk output 721s | d2 a2 46 fa 34 9b 68 a7 99 98 a4 39 4f f7 a2 63 ..F.4.h....9O..c 721s | verify_bytes() RFC 3566 Test Case 3: AES-XCBC-MAC-96 with 16-byte input: prf OUT: ok 721s | CONCATENATE_DATA_AND_BASE: 721s | target: EXTRACT_KEY_FROM_KEY 721s | base: base-key@0xc63f95666bc0 (16-bytes, AES_KEY_GEN) 721s | params: 16-bytes@0xfffff84c1230 721s | key-offset: 0, key-size: 16 721s | EXTRACT_KEY_FROM_KEY: 721s | target: EXTRACT_KEY_FROM_KEY 721s | key_size: 16-bytes 721s | base: base-key@0xc63f9566ad90 (32-bytes, EXTRACT_KEY_FROM_KEY) 721s | operation: FLAGS_ONLY 721s | params: 8-bytes@0xfffff84c11d8 721s | PRF symkey interface PRF AES_XCBC init key symkey-key@0xc63f95669c00 (size 16) 721s | PRF symkey interface: key symkey-key@0xc63f95669c00 (16-bytes, EXTRACT_KEY_FROM_KEY) 721s | XCBC: Key 16=16 just right 721s | key-offset: 0, key-size: 16 721s | EXTRACT_KEY_FROM_KEY: 721s | target: AES_ECB 721s | flags: SIGN 721s | key_size: 16-bytes 721s | base: base-key@0xc63f95669c00 (16-bytes, EXTRACT_KEY_FROM_KEY) 721s | operation: FLAGS_ONLY 721s | params: 8-bytes@0xfffff84c1138 721s | PRF symkey interface PRF AES_XCBC 0xc63f95666b60 721s | CONCATENATE_DATA_AND_BASE: 721s | target: EXTRACT_KEY_FROM_KEY 721s | base: base-key@0xc63f95666bc0 (16-bytes, AES_KEY_GEN) 721s | params: 16-bytes@0xfffff84c1230 721s | key-offset: 0, key-size: 16 721s | EXTRACT_KEY_FROM_KEY: 721s | target: EXTRACT_KEY_FROM_KEY 721s | key_size: 16-bytes 721s | base: base-key@0xc63f9566aa20 (32-bytes, EXTRACT_KEY_FROM_KEY) 721s | operation: FLAGS_ONLY 721s | params: 8-bytes@0xfffff84c11d8 721s | PRF symkey interface PRF AES_XCBC update symkey message-key@0xc63f95668510 (size 16) 721s | PRF symkey interface: symkey message-key@0xc63f95668510 (16-bytes, EXTRACT_KEY_FROM_KEY) 721s | symkey message extracting all 16 bytes of key@0xc63f95668510 721s | symkey message: symkey-key@0xc63f95668510 (16-bytes, EXTRACT_KEY_FROM_KEY) 721s | sizeof bytes 16 721s | wrapper: (SECItemType)41: ec b6 97 12 25 78 ad ed d0 49 db 0f 32 7b c0 f6 721s | symkey message extracted len 16 bytes at 0xc63f9566aa00 721s | unwrapped: 721s | 00 01 02 03 04 05 06 07 08 09 0a 0b 0c 0d 0e 0f ................ 721s | XCBC: data 721s | 00 01 02 03 04 05 06 07 08 09 0a 0b 0c 0d 0e 0f ................ 721s | K extracting all 16 bytes of key@0xc63f9566ad90 721s | K: symkey-key@0xc63f9566ad90 (16-bytes, AES_ECB) 721s | sizeof bytes 16 721s | wrapper: (SECItemType)-129235528: ec b6 97 12 25 78 ad ed d0 49 db 0f 32 7b c0 f6 721s | K extracted len 16 bytes at 0xc63f956668c0 721s | unwrapped: 721s | 00 01 02 03 04 05 06 07 08 09 0a 0b 0c 0d 0e 0f ................ 721s | XCBC: K: 721s | 00 01 02 03 04 05 06 07 08 09 0a 0b 0c 0d 0e 0f ................ 721s | XCBC: K1 721s | c3 52 80 57 54 23 7f 31 1a c0 ff f4 e3 e0 3e 78 .R.WT#.1......>x 721s | CONCATENATE_DATA_AND_BASE: 721s | target: EXTRACT_KEY_FROM_KEY 721s | base: base-key@0xc63f95666bc0 (16-bytes, AES_KEY_GEN) 721s | params: 16-bytes@0xfffff84c10c0 721s | key-offset: 0, key-size: 16 721s | EXTRACT_KEY_FROM_KEY: 721s | target: AES_ECB 721s | flags: SIGN 721s | key_size: 16-bytes 721s | base: base-key@0xc63f9566b120 (32-bytes, EXTRACT_KEY_FROM_KEY) 721s | operation: FLAGS_ONLY 721s | params: 8-bytes@0xfffff84c10c8 721s | XCBC: Computing E[1] using K2 721s | XCBC: K2 721s | bd 86 2f fb 97 ad 2f b8 f8 b8 91 f6 03 2f 36 cb ../.../....../6. 721s | XCBC: E[n-1] 721s | 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................ 721s | XCBC: M[n] 721s | 00 01 02 03 04 05 06 07 08 09 0a 0b 0c 0d 0e 0f ................ 721s | XCBC: M[n]^E[n-1]^K2 721s | bd 87 2d f8 93 a8 29 bf f0 b1 9b fd 0f 22 38 c4 ..-...)......"8. 721s | XCBC: MAC 721s | d2 a2 46 fa 34 9b 68 a7 99 98 a4 39 4f f7 a2 63 ..F.4.h....9O..c 721s | CONCATENATE_DATA_AND_BASE: 721s | target: EXTRACT_KEY_FROM_KEY 721s | base: base-key@0xc63f95666bc0 (16-bytes, AES_KEY_GEN) 721s | params: 16-bytes@0xfffff84c11b0 721s | key-offset: 0, key-size: 16 721s | EXTRACT_KEY_FROM_KEY: 721s | target: EXTRACT_KEY_FROM_KEY 721s | key_size: 16-bytes 721s | base: base-key@0xc63f9566b120 (32-bytes, EXTRACT_KEY_FROM_KEY) 721s | operation: FLAGS_ONLY 721s | params: 8-bytes@0xfffff84c1158 721s | PRF symkey interface PRF AES_XCBC final-key@0xc63f9566aa20 (size 16) 721s | PRF symkey interface: key-key@0xc63f9566aa20 (16-bytes, EXTRACT_KEY_FROM_KEY) 721s | output: symkey-key@0xc63f9566aa20 (16-bytes, EXTRACT_KEY_FROM_KEY) 721s | RFC 3566 Test Case 3: AES-XCBC-MAC-96 with 16-byte input extracting all 16 bytes of key@0xc63f9566aa20 721s | RFC 3566 Test Case 3: AES-XCBC-MAC-96 with 16-byte input: symkey-key@0xc63f9566aa20 (16-bytes, EXTRACT_KEY_FROM_KEY) 721s | sizeof bytes 16 721s | wrapper: siBuffer: 4c 28 92 c9 5f 21 8d b3 67 d2 80 0e 54 1e 58 a7 721s | RFC 3566 Test Case 3: AES-XCBC-MAC-96 with 16-byte input extracted len 16 bytes at 0xc63f956668c0 721s | unwrapped: 721s | d2 a2 46 fa 34 9b 68 a7 99 98 a4 39 4f f7 a2 63 ..F.4.h....9O..c 721s | verify_bytes() RFC 3566 Test Case 3: AES-XCBC-MAC-96 with 16-byte input: symkey: ok 721s ipsec algparse: RFC 3566 Test Case 4: AES-XCBC-MAC-96 with 20-byte input 721s | decode_to_chunk() test_prf_vector: input "0x000102030405060708090a0b0c0d0e0f" 721s | decode_to_chunk() output: 721s | 00 01 02 03 04 05 06 07 08 09 0a 0b 0c 0d 0e 0f ................ 721s | decode_to_chunk() test_prf_vector: input "0x000102030405060708090a0b0c0d0e0f10111213" 721s | decode_to_chunk() output: 721s | 00 01 02 03 04 05 06 07 08 09 0a 0b 0c 0d 0e 0f ................ 721s | 10 11 12 13 .... 721s | decode_to_chunk() test_prf_vector: input "0x47f51b4564966215b8985c63055ed308" 721s | decode_to_chunk() output: 721s | 47 f5 1b 45 64 96 62 15 b8 98 5c 63 05 5e d3 08 G..Ed.b...\c.^.. 721s | PRF chunk interface PRF AES_XCBC init key hunk 0xc63f95669ff0 (length 16) 721s | 00 01 02 03 04 05 06 07 08 09 0a 0b 0c 0d 0e 0f ................ 721s | CONCATENATE_DATA_AND_BASE: 721s | target: EXTRACT_KEY_FROM_KEY 721s | base: base-key@0xc63f95666bc0 (16-bytes, AES_KEY_GEN) 721s | params: 16-bytes@0xfffff84c11b0 721s | key-offset: 0, key-size: 16 721s | EXTRACT_KEY_FROM_KEY: 721s | target: EXTRACT_KEY_FROM_KEY 721s | key_size: 16-bytes 721s | base: base-key@0xc63f95669c00 (32-bytes, EXTRACT_KEY_FROM_KEY) 721s | operation: FLAGS_ONLY 721s | params: 8-bytes@0xfffff84c1158 721s | XCBC: Key 16=16 just right 721s | key-offset: 0, key-size: 16 721s | EXTRACT_KEY_FROM_KEY: 721s | target: AES_ECB 721s | flags: SIGN 721s | key_size: 16-bytes 721s | base: base-key@0xc63f9566aa20 (16-bytes, EXTRACT_KEY_FROM_KEY) 721s | operation: FLAGS_ONLY 721s | params: 8-bytes@0xfffff84c1108 721s | PRF chunk interface PRF AES_XCBC 0xc63f95666b60 721s | PRF chunk interface PRF AES_XCBC update message (0xc63f95668430 length 20) 721s | 00 01 02 03 04 05 06 07 08 09 0a 0b 0c 0d 0e 0f ................ 721s | 10 11 12 13 .... 721s | XCBC: data 721s | 00 01 02 03 04 05 06 07 08 09 0a 0b 0c 0d 0e 0f ................ 721s | 10 11 12 13 .... 721s | K extracting all 16 bytes of key@0xc63f95669c00 721s | K: symkey-key@0xc63f95669c00 (16-bytes, AES_ECB) 721s | sizeof bytes 16 721s | wrapper: (SECItemType)1735262254: ec b6 97 12 25 78 ad ed d0 49 db 0f 32 7b c0 f6 721s | K extracted len 16 bytes at 0xc63f95666a80 721s | unwrapped: 721s | 00 01 02 03 04 05 06 07 08 09 0a 0b 0c 0d 0e 0f ................ 721s | XCBC: K: 721s | 00 01 02 03 04 05 06 07 08 09 0a 0b 0c 0d 0e 0f ................ 721s | XCBC: K1 721s | c3 52 80 57 54 23 7f 31 1a c0 ff f4 e3 e0 3e 78 .R.WT#.1......>x 721s | CONCATENATE_DATA_AND_BASE: 721s | target: EXTRACT_KEY_FROM_KEY 721s | base: base-key@0xc63f95666bc0 (16-bytes, AES_KEY_GEN) 721s | params: 16-bytes@0xfffff84c1070 721s | key-offset: 0, key-size: 16 721s | EXTRACT_KEY_FROM_KEY: 721s | target: AES_ECB 721s | flags: SIGN 721s | key_size: 16-bytes 721s | base: base-key@0xc63f95668510 (32-bytes, EXTRACT_KEY_FROM_KEY) 721s | operation: FLAGS_ONLY 721s | params: 8-bytes@0xfffff84c1078 721s | Computing E[2] using K3 721s | XCBC: K3 721s | c1 a7 ab a1 a2 3a 94 06 58 07 a0 8c c8 ee d0 6e .....:..X......n 721s | XCBC: E[n-1] 721s | 1d 04 48 fa cf 4d 9c 6f 55 b9 93 da 09 80 3d b3 ..H..M.oU.....=. 721s | XCBC: M[n] 721s | 10 11 12 13 .... 721s | XCBC: M[n] 721s | 10 11 12 13 .... 721s | XCBC: M[n]:80...^E[n-1]^K3 721s | cc b2 f1 48 ed 77 08 69 0d be 33 56 c1 6e ed dd ...H.w.i..3V.n.. 721s | XCBC: MAC 721s | 47 f5 1b 45 64 96 62 15 b8 98 5c 63 05 5e d3 08 G..Ed.b...\c.^.. 721s | PRF chunk interface PRF AES_XCBC final length 16 721s | 47 f5 1b 45 64 96 62 15 b8 98 5c 63 05 5e d3 08 G..Ed.b...\c.^.. 721s | chunk output 721s | 47 f5 1b 45 64 96 62 15 b8 98 5c 63 05 5e d3 08 G..Ed.b...\c.^.. 721s | verify_bytes() RFC 3566 Test Case 4: AES-XCBC-MAC-96 with 20-byte input: prf OUT: ok 721s | CONCATENATE_DATA_AND_BASE: 721s | target: EXTRACT_KEY_FROM_KEY 721s | base: base-key@0xc63f95666bc0 (16-bytes, AES_KEY_GEN) 721s | params: 16-bytes@0xfffff84c1230 721s | key-offset: 0, key-size: 16 721s | EXTRACT_KEY_FROM_KEY: 721s | target: EXTRACT_KEY_FROM_KEY 721s | key_size: 16-bytes 721s | base: base-key@0xc63f9566aa20 (32-bytes, EXTRACT_KEY_FROM_KEY) 721s | operation: FLAGS_ONLY 721s | params: 8-bytes@0xfffff84c11d8 721s | PRF symkey interface PRF AES_XCBC init key symkey-key@0xc63f95669c00 (size 16) 721s | PRF symkey interface: key symkey-key@0xc63f95669c00 (16-bytes, EXTRACT_KEY_FROM_KEY) 721s | XCBC: Key 16=16 just right 721s | key-offset: 0, key-size: 16 721s | EXTRACT_KEY_FROM_KEY: 721s | target: AES_ECB 721s | flags: SIGN 721s | key_size: 16-bytes 721s | base: base-key@0xc63f95669c00 (16-bytes, EXTRACT_KEY_FROM_KEY) 721s | operation: FLAGS_ONLY 721s | params: 8-bytes@0xfffff84c1138 721s | PRF symkey interface PRF AES_XCBC 0xc63f95666b60 721s | CONCATENATE_DATA_AND_BASE: 721s | target: EXTRACT_KEY_FROM_KEY 721s | base: base-key@0xc63f95666bc0 (16-bytes, AES_KEY_GEN) 721s | params: 16-bytes@0xfffff84c1230 721s | key-offset: 0, key-size: 20 721s | EXTRACT_KEY_FROM_KEY: 721s | target: EXTRACT_KEY_FROM_KEY 721s | key_size: 20-bytes 721s | base: base-key@0xc63f9566ad90 (36-bytes, EXTRACT_KEY_FROM_KEY) 721s | operation: FLAGS_ONLY 721s | params: 8-bytes@0xfffff84c11d8 721s | PRF symkey interface PRF AES_XCBC update symkey message-key@0xc63f95668510 (size 20) 721s | PRF symkey interface: symkey message-key@0xc63f95668510 (20-bytes, EXTRACT_KEY_FROM_KEY) 721s | symkey message extracting all 20 bytes of key@0xc63f95668510 721s | symkey message: symkey-key@0xc63f95668510 (20-bytes, EXTRACT_KEY_FROM_KEY) 721s | sizeof bytes 32 721s | wrapper: (SECItemType)41: ec b6 97 12 25 78 ad ed d0 49 db 0f 32 7b c0 f6 f0 91 96 9c 5c c3 42 27 5e 2c 85 a7 69 70 57 db 721s | symkey message extracted len 32 bytes at 0xc63f9566a5f0 721s | unwrapped: 721s | 00 01 02 03 04 05 06 07 08 09 0a 0b 0c 0d 0e 0f ................ 721s | 10 11 12 13 00 00 00 00 00 00 00 00 00 00 00 00 ................ 721s | XCBC: data 721s | 00 01 02 03 04 05 06 07 08 09 0a 0b 0c 0d 0e 0f ................ 721s | 10 11 12 13 .... 721s | K extracting all 16 bytes of key@0xc63f9566aa20 721s | K: symkey-key@0xc63f9566aa20 (16-bytes, AES_ECB) 721s | sizeof bytes 16 721s | wrapper: (SECItemType)-129235736: ec b6 97 12 25 78 ad ed d0 49 db 0f 32 7b c0 f6 721s | K extracted len 16 bytes at 0xc63f9566a880 721s | unwrapped: 721s | 00 01 02 03 04 05 06 07 08 09 0a 0b 0c 0d 0e 0f ................ 721s | XCBC: K: 721s | 00 01 02 03 04 05 06 07 08 09 0a 0b 0c 0d 0e 0f ................ 721s | XCBC: K1 721s | c3 52 80 57 54 23 7f 31 1a c0 ff f4 e3 e0 3e 78 .R.WT#.1......>x 721s | CONCATENATE_DATA_AND_BASE: 721s | target: EXTRACT_KEY_FROM_KEY 721s | base: base-key@0xc63f95666bc0 (16-bytes, AES_KEY_GEN) 721s | params: 16-bytes@0xfffff84c10c0 721s | key-offset: 0, key-size: 16 721s | EXTRACT_KEY_FROM_KEY: 721s | target: AES_ECB 721s | flags: SIGN 721s | key_size: 16-bytes 721s | base: base-key@0xc63f9566b120 (32-bytes, EXTRACT_KEY_FROM_KEY) 721s | operation: FLAGS_ONLY 721s | params: 8-bytes@0xfffff84c10c8 721s | Computing E[2] using K3 721s | XCBC: K3 721s | c1 a7 ab a1 a2 3a 94 06 58 07 a0 8c c8 ee d0 6e .....:..X......n 721s | XCBC: E[n-1] 721s | 1d 04 48 fa cf 4d 9c 6f 55 b9 93 da 09 80 3d b3 ..H..M.oU.....=. 721s | XCBC: M[n] 721s | 10 11 12 13 .... 721s | XCBC: M[n] 721s | 10 11 12 13 .... 721s | XCBC: M[n]:80...^E[n-1]^K3 721s | cc b2 f1 48 ed 77 08 69 0d be 33 56 c1 6e ed dd ...H.w.i..3V.n.. 721s | XCBC: MAC 721s | 47 f5 1b 45 64 96 62 15 b8 98 5c 63 05 5e d3 08 G..Ed.b...\c.^.. 721s | CONCATENATE_DATA_AND_BASE: 721s | target: EXTRACT_KEY_FROM_KEY 721s | base: base-key@0xc63f95666bc0 (16-bytes, AES_KEY_GEN) 721s | params: 16-bytes@0xfffff84c11b0 721s | key-offset: 0, key-size: 16 721s | EXTRACT_KEY_FROM_KEY: 721s | target: EXTRACT_KEY_FROM_KEY 721s | key_size: 16-bytes 721s | base: base-key@0xc63f9566b120 (32-bytes, EXTRACT_KEY_FROM_KEY) 721s | operation: FLAGS_ONLY 721s | params: 8-bytes@0xfffff84c1158 721s | PRF symkey interface PRF AES_XCBC final-key@0xc63f9566ad90 (size 16) 721s | PRF symkey interface: key-key@0xc63f9566ad90 (16-bytes, EXTRACT_KEY_FROM_KEY) 721s | output: symkey-key@0xc63f9566ad90 (16-bytes, EXTRACT_KEY_FROM_KEY) 721s | RFC 3566 Test Case 4: AES-XCBC-MAC-96 with 20-byte input extracting all 16 bytes of key@0xc63f9566ad90 721s | RFC 3566 Test Case 4: AES-XCBC-MAC-96 with 20-byte input: symkey-key@0xc63f9566ad90 (16-bytes, EXTRACT_KEY_FROM_KEY) 721s | sizeof bytes 16 721s | wrapper: siBuffer: 61 43 d9 54 e1 c3 e6 d8 db 8d ac 10 b2 c8 e3 4f 721s | RFC 3566 Test Case 4: AES-XCBC-MAC-96 with 20-byte input extracted len 16 bytes at 0xc63f9566a880 721s | unwrapped: 721s | 47 f5 1b 45 64 96 62 15 b8 98 5c 63 05 5e d3 08 G..Ed.b...\c.^.. 721s | verify_bytes() RFC 3566 Test Case 4: AES-XCBC-MAC-96 with 20-byte input: symkey: ok 721s ipsec algparse: RFC 3566 Test Case 5: AES-XCBC-MAC-96 with 32-byte input 721s | decode_to_chunk() test_prf_vector: input "0x000102030405060708090a0b0c0d0e0f" 721s | decode_to_chunk() output: 721s | 00 01 02 03 04 05 06 07 08 09 0a 0b 0c 0d 0e 0f ................ 721s | decode_to_chunk() test_prf_vector: input "0x000102030405060708090a0b0c0d0e0f101112131415161718191a1b1c1d1e1f" 721s | decode_to_chunk() output: 721s | 00 01 02 03 04 05 06 07 08 09 0a 0b 0c 0d 0e 0f ................ 721s | 10 11 12 13 14 15 16 17 18 19 1a 1b 1c 1d 1e 1f ................ 721s | decode_to_chunk() test_prf_vector: input "0xf54f0ec8d2b9f3d36807734bd5283fd4" 721s | decode_to_chunk() output: 721s | f5 4f 0e c8 d2 b9 f3 d3 68 07 73 4b d5 28 3f d4 .O......h.sK.(?. 721s | PRF chunk interface PRF AES_XCBC init key hunk 0xc63f95669ff0 (length 16) 721s | 00 01 02 03 04 05 06 07 08 09 0a 0b 0c 0d 0e 0f ................ 721s | CONCATENATE_DATA_AND_BASE: 721s | target: EXTRACT_KEY_FROM_KEY 721s | base: base-key@0xc63f95666bc0 (16-bytes, AES_KEY_GEN) 721s | params: 16-bytes@0xfffff84c11b0 721s | key-offset: 0, key-size: 16 721s | EXTRACT_KEY_FROM_KEY: 721s | target: EXTRACT_KEY_FROM_KEY 721s | key_size: 16-bytes 721s | base: base-key@0xc63f95669c00 (32-bytes, EXTRACT_KEY_FROM_KEY) 721s | operation: FLAGS_ONLY 721s | params: 8-bytes@0xfffff84c1158 721s | XCBC: Key 16=16 just right 721s | key-offset: 0, key-size: 16 721s | EXTRACT_KEY_FROM_KEY: 721s | target: AES_ECB 721s | flags: SIGN 721s | key_size: 16-bytes 721s | base: base-key@0xc63f9566ad90 (16-bytes, EXTRACT_KEY_FROM_KEY) 721s | operation: FLAGS_ONLY 721s | params: 8-bytes@0xfffff84c1108 721s | PRF chunk interface PRF AES_XCBC 0xc63f9566a5f0 721s | PRF chunk interface PRF AES_XCBC update message (0xc63f95666b60 length 32) 721s | 00 01 02 03 04 05 06 07 08 09 0a 0b 0c 0d 0e 0f ................ 721s | 10 11 12 13 14 15 16 17 18 19 1a 1b 1c 1d 1e 1f ................ 721s | XCBC: data 721s | 00 01 02 03 04 05 06 07 08 09 0a 0b 0c 0d 0e 0f ................ 721s | 10 11 12 13 14 15 16 17 18 19 1a 1b 1c 1d 1e 1f ................ 721s | K extracting all 16 bytes of key@0xc63f95669c00 721s | K: symkey-key@0xc63f95669c00 (16-bytes, AES_ECB) 721s | sizeof bytes 16 721s | wrapper: (SECItemType)1735262254: ec b6 97 12 25 78 ad ed d0 49 db 0f 32 7b c0 f6 721s | K extracted len 16 bytes at 0xc63f9566aa00 721s | unwrapped: 721s | 00 01 02 03 04 05 06 07 08 09 0a 0b 0c 0d 0e 0f ................ 721s | XCBC: K: 721s | 00 01 02 03 04 05 06 07 08 09 0a 0b 0c 0d 0e 0f ................ 721s | XCBC: K1 721s | c3 52 80 57 54 23 7f 31 1a c0 ff f4 e3 e0 3e 78 .R.WT#.1......>x 721s | CONCATENATE_DATA_AND_BASE: 721s | target: EXTRACT_KEY_FROM_KEY 721s | base: base-key@0xc63f95666bc0 (16-bytes, AES_KEY_GEN) 721s | params: 16-bytes@0xfffff84c1070 721s | key-offset: 0, key-size: 16 721s | EXTRACT_KEY_FROM_KEY: 721s | target: AES_ECB 721s | flags: SIGN 721s | key_size: 16-bytes 721s | base: base-key@0xc63f95668510 (32-bytes, EXTRACT_KEY_FROM_KEY) 721s | operation: FLAGS_ONLY 721s | params: 8-bytes@0xfffff84c1078 721s | XCBC: Computing E[2] using K2 721s | XCBC: K2 721s | bd 86 2f fb 97 ad 2f b8 f8 b8 91 f6 03 2f 36 cb ../.../....../6. 721s | XCBC: E[n-1] 721s | 1d 04 48 fa cf 4d 9c 6f 55 b9 93 da 09 80 3d b3 ..H..M.oU.....=. 721s | XCBC: M[n] 721s | 10 11 12 13 14 15 16 17 18 19 1a 1b 1c 1d 1e 1f ................ 721s | XCBC: M[n]^E[n-1]^K2 721s | b0 93 75 12 4c f5 a5 c0 b5 18 18 37 16 b2 15 67 ..u.L......7...g 721s | XCBC: MAC 721s | f5 4f 0e c8 d2 b9 f3 d3 68 07 73 4b d5 28 3f d4 .O......h.sK.(?. 721s | PRF chunk interface PRF AES_XCBC final length 16 721s | f5 4f 0e c8 d2 b9 f3 d3 68 07 73 4b d5 28 3f d4 .O......h.sK.(?. 721s | chunk output 721s | f5 4f 0e c8 d2 b9 f3 d3 68 07 73 4b d5 28 3f d4 .O......h.sK.(?. 721s | verify_bytes() RFC 3566 Test Case 5: AES-XCBC-MAC-96 with 32-byte input: prf OUT: ok 721s | CONCATENATE_DATA_AND_BASE: 721s | target: EXTRACT_KEY_FROM_KEY 721s | base: base-key@0xc63f95666bc0 (16-bytes, AES_KEY_GEN) 721s | params: 16-bytes@0xfffff84c1230 721s | key-offset: 0, key-size: 16 721s | EXTRACT_KEY_FROM_KEY: 721s | target: EXTRACT_KEY_FROM_KEY 721s | key_size: 16-bytes 721s | base: base-key@0xc63f9566ad90 (32-bytes, EXTRACT_KEY_FROM_KEY) 721s | operation: FLAGS_ONLY 721s | params: 8-bytes@0xfffff84c11d8 721s | PRF symkey interface PRF AES_XCBC init key symkey-key@0xc63f95669c00 (size 16) 721s | PRF symkey interface: key symkey-key@0xc63f95669c00 (16-bytes, EXTRACT_KEY_FROM_KEY) 721s | XCBC: Key 16=16 just right 721s | key-offset: 0, key-size: 16 721s | EXTRACT_KEY_FROM_KEY: 721s | target: AES_ECB 721s | flags: SIGN 721s | key_size: 16-bytes 721s | base: base-key@0xc63f95669c00 (16-bytes, EXTRACT_KEY_FROM_KEY) 721s | operation: FLAGS_ONLY 721s | params: 8-bytes@0xfffff84c1138 721s | PRF symkey interface PRF AES_XCBC 0xc63f9566a5f0 721s | CONCATENATE_DATA_AND_BASE: 721s | target: EXTRACT_KEY_FROM_KEY 721s | base: base-key@0xc63f95666bc0 (16-bytes, AES_KEY_GEN) 721s | params: 16-bytes@0xfffff84c1230 721s | key-offset: 0, key-size: 32 721s | EXTRACT_KEY_FROM_KEY: 721s | target: EXTRACT_KEY_FROM_KEY 721s | key_size: 32-bytes 721s | base: base-key@0xc63f9566aa20 (48-bytes, EXTRACT_KEY_FROM_KEY) 721s | operation: FLAGS_ONLY 721s | params: 8-bytes@0xfffff84c11d8 721s | PRF symkey interface PRF AES_XCBC update symkey message-key@0xc63f95668510 (size 32) 721s | PRF symkey interface: symkey message-key@0xc63f95668510 (32-bytes, EXTRACT_KEY_FROM_KEY) 721s | symkey message extracting all 32 bytes of key@0xc63f95668510 721s | symkey message: symkey-key@0xc63f95668510 (32-bytes, EXTRACT_KEY_FROM_KEY) 721s | sizeof bytes 32 721s | wrapper: (SECItemType)41: ec b6 97 12 25 78 ad ed d0 49 db 0f 32 7b c0 f6 5c 41 18 c9 b5 9a 31 9d 3a 96 01 50 81 03 1a a9 721s | symkey message extracted len 32 bytes at 0xc63f9566b360 721s | unwrapped: 721s | 00 01 02 03 04 05 06 07 08 09 0a 0b 0c 0d 0e 0f ................ 721s | 10 11 12 13 14 15 16 17 18 19 1a 1b 1c 1d 1e 1f ................ 721s | XCBC: data 721s | 00 01 02 03 04 05 06 07 08 09 0a 0b 0c 0d 0e 0f ................ 721s | 10 11 12 13 14 15 16 17 18 19 1a 1b 1c 1d 1e 1f ................ 721s | K extracting all 16 bytes of key@0xc63f9566ad90 721s | K: symkey-key@0xc63f9566ad90 (16-bytes, AES_ECB) 721s | sizeof bytes 16 721s | wrapper: (SECItemType)-129235736: ec b6 97 12 25 78 ad ed d0 49 db 0f 32 7b c0 f6 721s | K extracted len 16 bytes at 0xc63f9566a250 721s | unwrapped: 721s | 00 01 02 03 04 05 06 07 08 09 0a 0b 0c 0d 0e 0f ................ 721s | XCBC: K: 721s | 00 01 02 03 04 05 06 07 08 09 0a 0b 0c 0d 0e 0f ................ 721s | XCBC: K1 721s | c3 52 80 57 54 23 7f 31 1a c0 ff f4 e3 e0 3e 78 .R.WT#.1......>x 721s | CONCATENATE_DATA_AND_BASE: 721s | target: EXTRACT_KEY_FROM_KEY 721s | base: base-key@0xc63f95666bc0 (16-bytes, AES_KEY_GEN) 721s | params: 16-bytes@0xfffff84c10c0 721s | key-offset: 0, key-size: 16 721s | EXTRACT_KEY_FROM_KEY: 721s | target: AES_ECB 721s | flags: SIGN 721s | key_size: 16-bytes 721s | base: base-key@0xc63f9566b120 (32-bytes, EXTRACT_KEY_FROM_KEY) 721s | operation: FLAGS_ONLY 721s | params: 8-bytes@0xfffff84c10c8 721s | XCBC: Computing E[2] using K2 721s | XCBC: K2 721s | bd 86 2f fb 97 ad 2f b8 f8 b8 91 f6 03 2f 36 cb ../.../....../6. 721s | XCBC: E[n-1] 721s | 1d 04 48 fa cf 4d 9c 6f 55 b9 93 da 09 80 3d b3 ..H..M.oU.....=. 721s | XCBC: M[n] 721s | 10 11 12 13 14 15 16 17 18 19 1a 1b 1c 1d 1e 1f ................ 721s | XCBC: M[n]^E[n-1]^K2 721s | b0 93 75 12 4c f5 a5 c0 b5 18 18 37 16 b2 15 67 ..u.L......7...g 721s | XCBC: MAC 721s | f5 4f 0e c8 d2 b9 f3 d3 68 07 73 4b d5 28 3f d4 .O......h.sK.(?. 721s | CONCATENATE_DATA_AND_BASE: 721s | target: EXTRACT_KEY_FROM_KEY 721s | base: base-key@0xc63f95666bc0 (16-bytes, AES_KEY_GEN) 721s | params: 16-bytes@0xfffff84c11b0 721s | key-offset: 0, key-size: 16 721s | EXTRACT_KEY_FROM_KEY: 721s | target: EXTRACT_KEY_FROM_KEY 721s | key_size: 16-bytes 721s | base: base-key@0xc63f9566b120 (32-bytes, EXTRACT_KEY_FROM_KEY) 721s | operation: FLAGS_ONLY 721s | params: 8-bytes@0xfffff84c1158 721s | PRF symkey interface PRF AES_XCBC final-key@0xc63f9566aa20 (size 16) 721s | PRF symkey interface: key-key@0xc63f9566aa20 (16-bytes, EXTRACT_KEY_FROM_KEY) 721s | output: symkey-key@0xc63f9566aa20 (16-bytes, EXTRACT_KEY_FROM_KEY) 721s | RFC 3566 Test Case 5: AES-XCBC-MAC-96 with 32-byte input extracting all 16 bytes of key@0xc63f9566aa20 721s | RFC 3566 Test Case 5: AES-XCBC-MAC-96 with 32-byte input: symkey-key@0xc63f9566aa20 (16-bytes, EXTRACT_KEY_FROM_KEY) 721s | sizeof bytes 16 721s | wrapper: siBuffer: 75 f7 ec fa a7 7a bc 9a 53 e5 d1 8f 37 38 00 6a 721s | RFC 3566 Test Case 5: AES-XCBC-MAC-96 with 32-byte input extracted len 16 bytes at 0xc63f95666a80 721s | unwrapped: 721s | f5 4f 0e c8 d2 b9 f3 d3 68 07 73 4b d5 28 3f d4 .O......h.sK.(?. 721s | verify_bytes() RFC 3566 Test Case 5: AES-XCBC-MAC-96 with 32-byte input: symkey: ok 721s ipsec algparse: RFC 3566 Test Case 6: AES-XCBC-MAC-96 with 34-byte input 721s | decode_to_chunk() test_prf_vector: input "0x000102030405060708090a0b0c0d0e0f" 721s | decode_to_chunk() output: 721s | 00 01 02 03 04 05 06 07 08 09 0a 0b 0c 0d 0e 0f ................ 721s | decode_to_chunk() test_prf_vector: input "0x000102030405060708090a0b0c0d0e0f101112131415161718191a1b1c1d1e1f2021" 721s | decode_to_chunk() output: 721s | 00 01 02 03 04 05 06 07 08 09 0a 0b 0c 0d 0e 0f ................ 721s | 10 11 12 13 14 15 16 17 18 19 1a 1b 1c 1d 1e 1f ................ 721s | 20 21 ! 721s | decode_to_chunk() test_prf_vector: input "0xbecbb3bccdb518a30677d5481fb6b4d8" 721s | decode_to_chunk() output: 721s | be cb b3 bc cd b5 18 a3 06 77 d5 48 1f b6 b4 d8 .........w.H.... 721s | PRF chunk interface PRF AES_XCBC init key hunk 0xc63f95668430 (length 16) 721s | 00 01 02 03 04 05 06 07 08 09 0a 0b 0c 0d 0e 0f ................ 721s | CONCATENATE_DATA_AND_BASE: 721s | target: EXTRACT_KEY_FROM_KEY 721s | base: base-key@0xc63f95666bc0 (16-bytes, AES_KEY_GEN) 721s | params: 16-bytes@0xfffff84c11b0 721s | key-offset: 0, key-size: 16 721s | EXTRACT_KEY_FROM_KEY: 721s | target: EXTRACT_KEY_FROM_KEY 721s | key_size: 16-bytes 721s | base: base-key@0xc63f95669c00 (32-bytes, EXTRACT_KEY_FROM_KEY) 721s | operation: FLAGS_ONLY 721s | params: 8-bytes@0xfffff84c1158 721s | XCBC: Key 16=16 just right 721s | key-offset: 0, key-size: 16 721s | EXTRACT_KEY_FROM_KEY: 721s | target: AES_ECB 721s | flags: SIGN 721s | key_size: 16-bytes 721s | base: base-key@0xc63f9566aa20 (16-bytes, EXTRACT_KEY_FROM_KEY) 721s | operation: FLAGS_ONLY 721s | params: 8-bytes@0xfffff84c1108 721s | PRF chunk interface PRF AES_XCBC 0xc63f95666b60 721s | PRF chunk interface PRF AES_XCBC update message (0xc63f95666b90 length 34) 721s | 00 01 02 03 04 05 06 07 08 09 0a 0b 0c 0d 0e 0f ................ 721s | 10 11 12 13 14 15 16 17 18 19 1a 1b 1c 1d 1e 1f ................ 721s | 20 21 ! 721s | XCBC: data 721s | 00 01 02 03 04 05 06 07 08 09 0a 0b 0c 0d 0e 0f ................ 721s | 10 11 12 13 14 15 16 17 18 19 1a 1b 1c 1d 1e 1f ................ 721s | 20 21 ! 721s | K extracting all 16 bytes of key@0xc63f95669c00 721s | K: symkey-key@0xc63f95669c00 (16-bytes, AES_ECB) 721s | sizeof bytes 16 721s | wrapper: (SECItemType)1735262254: ec b6 97 12 25 78 ad ed d0 49 db 0f 32 7b c0 f6 721s | K extracted len 16 bytes at 0xc63f9566a250 721s | unwrapped: 721s | 00 01 02 03 04 05 06 07 08 09 0a 0b 0c 0d 0e 0f ................ 721s | XCBC: K: 721s | 00 01 02 03 04 05 06 07 08 09 0a 0b 0c 0d 0e 0f ................ 721s | XCBC: K1 721s | c3 52 80 57 54 23 7f 31 1a c0 ff f4 e3 e0 3e 78 .R.WT#.1......>x 721s | CONCATENATE_DATA_AND_BASE: 721s | target: EXTRACT_KEY_FROM_KEY 721s | base: base-key@0xc63f95666bc0 (16-bytes, AES_KEY_GEN) 721s | params: 16-bytes@0xfffff84c1070 721s | key-offset: 0, key-size: 16 721s | EXTRACT_KEY_FROM_KEY: 721s | target: AES_ECB 721s | flags: SIGN 721s | key_size: 16-bytes 721s | base: base-key@0xc63f95668510 (32-bytes, EXTRACT_KEY_FROM_KEY) 721s | operation: FLAGS_ONLY 721s | params: 8-bytes@0xfffff84c1078 721s | Computing E[3] using K3 721s | XCBC: K3 721s | c1 a7 ab a1 a2 3a 94 06 58 07 a0 8c c8 ee d0 6e .....:..X......n 721s | XCBC: E[n-1] 721s | 09 02 5e 5a 67 25 20 72 44 14 5c 6b 80 66 85 79 ..^Zg% rD.\k.f.y 721s | XCBC: M[n] 721s | 20 21 ! 721s | XCBC: M[n] 721s | 20 21 ! 721s | XCBC: M[n]:80...^E[n-1]^K3 721s | e8 84 75 fb c5 1f b4 74 1c 13 fc e7 48 88 55 17 ..u....t....H.U. 721s | XCBC: MAC 721s | be cb b3 bc cd b5 18 a3 06 77 d5 48 1f b6 b4 d8 .........w.H.... 721s | PRF chunk interface PRF AES_XCBC final length 16 721s | be cb b3 bc cd b5 18 a3 06 77 d5 48 1f b6 b4 d8 .........w.H.... 721s | chunk output 721s | be cb b3 bc cd b5 18 a3 06 77 d5 48 1f b6 b4 d8 .........w.H.... 721s | verify_bytes() RFC 3566 Test Case 6: AES-XCBC-MAC-96 with 34-byte input: prf OUT: ok 721s | CONCATENATE_DATA_AND_BASE: 721s | target: EXTRACT_KEY_FROM_KEY 721s | base: base-key@0xc63f95666bc0 (16-bytes, AES_KEY_GEN) 721s | params: 16-bytes@0xfffff84c1230 721s | key-offset: 0, key-size: 16 721s | EXTRACT_KEY_FROM_KEY: 721s | target: EXTRACT_KEY_FROM_KEY 721s | key_size: 16-bytes 721s | base: base-key@0xc63f9566aa20 (32-bytes, EXTRACT_KEY_FROM_KEY) 721s | operation: FLAGS_ONLY 721s | params: 8-bytes@0xfffff84c11d8 721s | PRF symkey interface PRF AES_XCBC init key symkey-key@0xc63f95669c00 (size 16) 721s | PRF symkey interface: key symkey-key@0xc63f95669c00 (16-bytes, EXTRACT_KEY_FROM_KEY) 721s | XCBC: Key 16=16 just right 721s | key-offset: 0, key-size: 16 721s | EXTRACT_KEY_FROM_KEY: 721s | target: AES_ECB 721s | flags: SIGN 721s | key_size: 16-bytes 721s | base: base-key@0xc63f95669c00 (16-bytes, EXTRACT_KEY_FROM_KEY) 721s | operation: FLAGS_ONLY 721s | params: 8-bytes@0xfffff84c1138 721s | PRF symkey interface PRF AES_XCBC 0xc63f95666b60 721s | CONCATENATE_DATA_AND_BASE: 721s | target: EXTRACT_KEY_FROM_KEY 721s | base: base-key@0xc63f95666bc0 (16-bytes, AES_KEY_GEN) 721s | params: 16-bytes@0xfffff84c1230 721s | key-offset: 0, key-size: 34 721s | EXTRACT_KEY_FROM_KEY: 721s | target: EXTRACT_KEY_FROM_KEY 721s | key_size: 34-bytes 721s | base: base-key@0xc63f9566ad90 (50-bytes, EXTRACT_KEY_FROM_KEY) 721s | operation: FLAGS_ONLY 721s | params: 8-bytes@0xfffff84c11d8 721s | PRF symkey interface PRF AES_XCBC update symkey message-key@0xc63f95668510 (size 34) 721s | PRF symkey interface: symkey message-key@0xc63f95668510 (34-bytes, EXTRACT_KEY_FROM_KEY) 721s | symkey message extracting all 34 bytes of key@0xc63f95668510 721s | symkey message: symkey-key@0xc63f95668510 (34-bytes, EXTRACT_KEY_FROM_KEY) 721s | sizeof bytes 48 721s | wrapper: (SECItemType)41: ec b6 97 12 25 78 ad ed d0 49 db 0f 32 7b c0 f6 5c 41 18 c9 b5 9a 31 9d 3a 96 01 50 81 03 1a a9 88 5f 5f 71 7d ab dd 41 03 e9 f9 cd 7b 6f cb a6 721s | symkey message extracted len 48 bytes at 0xc63f9566a270 721s | unwrapped: 721s | 00 01 02 03 04 05 06 07 08 09 0a 0b 0c 0d 0e 0f ................ 721s | 10 11 12 13 14 15 16 17 18 19 1a 1b 1c 1d 1e 1f ................ 721s | 20 21 00 00 00 00 00 00 00 00 00 00 00 00 00 00 !.............. 721s | XCBC: data 721s | 00 01 02 03 04 05 06 07 08 09 0a 0b 0c 0d 0e 0f ................ 721s | 10 11 12 13 14 15 16 17 18 19 1a 1b 1c 1d 1e 1f ................ 721s | 20 21 ! 721s | K extracting all 16 bytes of key@0xc63f9566aa20 721s | K: symkey-key@0xc63f9566aa20 (16-bytes, AES_ECB) 721s | sizeof bytes 16 721s | wrapper: (SECItemType)-129235736: ec b6 97 12 25 78 ad ed d0 49 db 0f 32 7b c0 f6 721s | K extracted len 16 bytes at 0xc63f9566aa00 721s | unwrapped: 721s | 00 01 02 03 04 05 06 07 08 09 0a 0b 0c 0d 0e 0f ................ 721s | XCBC: K: 721s | 00 01 02 03 04 05 06 07 08 09 0a 0b 0c 0d 0e 0f ................ 721s | XCBC: K1 721s | c3 52 80 57 54 23 7f 31 1a c0 ff f4 e3 e0 3e 78 .R.WT#.1......>x 721s | CONCATENATE_DATA_AND_BASE: 721s | target: EXTRACT_KEY_FROM_KEY 721s | base: base-key@0xc63f95666bc0 (16-bytes, AES_KEY_GEN) 721s | params: 16-bytes@0xfffff84c10c0 721s | key-offset: 0, key-size: 16 721s | EXTRACT_KEY_FROM_KEY: 721s | target: AES_ECB 721s | flags: SIGN 721s | key_size: 16-bytes 721s | base: base-key@0xc63f9566b120 (32-bytes, EXTRACT_KEY_FROM_KEY) 721s | operation: FLAGS_ONLY 721s | params: 8-bytes@0xfffff84c10c8 721s | Computing E[3] using K3 721s | XCBC: K3 721s | c1 a7 ab a1 a2 3a 94 06 58 07 a0 8c c8 ee d0 6e .....:..X......n 721s | XCBC: E[n-1] 721s | 09 02 5e 5a 67 25 20 72 44 14 5c 6b 80 66 85 79 ..^Zg% rD.\k.f.y 721s | XCBC: M[n] 721s | 20 21 ! 721s | XCBC: M[n] 721s | 20 21 ! 721s | XCBC: M[n]:80...^E[n-1]^K3 721s | e8 84 75 fb c5 1f b4 74 1c 13 fc e7 48 88 55 17 ..u....t....H.U. 721s | XCBC: MAC 721s | be cb b3 bc cd b5 18 a3 06 77 d5 48 1f b6 b4 d8 .........w.H.... 721s | CONCATENATE_DATA_AND_BASE: 721s | target: EXTRACT_KEY_FROM_KEY 721s | base: base-key@0xc63f95666bc0 (16-bytes, AES_KEY_GEN) 721s | params: 16-bytes@0xfffff84c11b0 721s | key-offset: 0, key-size: 16 721s | EXTRACT_KEY_FROM_KEY: 721s | target: EXTRACT_KEY_FROM_KEY 721s | key_size: 16-bytes 721s | base: base-key@0xc63f9566b120 (32-bytes, EXTRACT_KEY_FROM_KEY) 721s | operation: FLAGS_ONLY 721s | params: 8-bytes@0xfffff84c1158 721s | PRF symkey interface PRF AES_XCBC final-key@0xc63f9566ad90 (size 16) 721s | PRF symkey interface: key-key@0xc63f9566ad90 (16-bytes, EXTRACT_KEY_FROM_KEY) 721s | output: symkey-key@0xc63f9566ad90 (16-bytes, EXTRACT_KEY_FROM_KEY) 721s | RFC 3566 Test Case 6: AES-XCBC-MAC-96 with 34-byte input extracting all 16 bytes of key@0xc63f9566ad90 721s | RFC 3566 Test Case 6: AES-XCBC-MAC-96 with 34-byte input: symkey-key@0xc63f9566ad90 (16-bytes, EXTRACT_KEY_FROM_KEY) 721s | sizeof bytes 16 721s | wrapper: siBuffer: 97 98 f5 ce eb b8 8d 34 09 79 69 29 44 b4 f4 05 721s | RFC 3566 Test Case 6: AES-XCBC-MAC-96 with 34-byte input extracted len 16 bytes at 0xc63f95669e40 721s | unwrapped: 721s | be cb b3 bc cd b5 18 a3 06 77 d5 48 1f b6 b4 d8 .........w.H.... 721s | verify_bytes() RFC 3566 Test Case 6: AES-XCBC-MAC-96 with 34-byte input: symkey: ok 721s ipsec algparse: RFC 3566 Test Case 7: AES-XCBC-MAC-96 with 1000-byte input 721s | decode_to_chunk() test_prf_vector: input "0x000102030405060708090a0b0c0d0e0f" 721s | decode_to_chunk() output: 721s | 00 01 02 03 04 05 06 07 08 09 0a 0b 0c 0d 0e 0f ................ 721s | decode_to_chunk() test_prf_vector: input "0xf0dafee895db30253761103b5d84528f" 721s | decode_to_chunk() output: 721s | f0 da fe e8 95 db 30 25 37 61 10 3b 5d 84 52 8f ......0%7a.;].R. 721s | PRF chunk interface PRF AES_XCBC init key hunk 0xc63f9566a880 (length 16) 721s | 00 01 02 03 04 05 06 07 08 09 0a 0b 0c 0d 0e 0f ................ 721s | CONCATENATE_DATA_AND_BASE: 721s | target: EXTRACT_KEY_FROM_KEY 721s | base: base-key@0xc63f95666bc0 (16-bytes, AES_KEY_GEN) 721s | params: 16-bytes@0xfffff84c11b0 721s | key-offset: 0, key-size: 16 721s | EXTRACT_KEY_FROM_KEY: 721s | target: EXTRACT_KEY_FROM_KEY 721s | key_size: 16-bytes 721s | base: base-key@0xc63f95669c00 (32-bytes, EXTRACT_KEY_FROM_KEY) 721s | operation: FLAGS_ONLY 721s | params: 8-bytes@0xfffff84c1158 721s | XCBC: Key 16=16 just right 721s | key-offset: 0, key-size: 16 721s | EXTRACT_KEY_FROM_KEY: 721s | target: AES_ECB 721s | flags: SIGN 721s | key_size: 16-bytes 721s | base: base-key@0xc63f9566ad90 (16-bytes, EXTRACT_KEY_FROM_KEY) 721s | operation: FLAGS_ONLY 721s | params: 8-bytes@0xfffff84c1108 721s | PRF chunk interface PRF AES_XCBC 0xc63f9566a5f0 721s | PRF chunk interface PRF AES_XCBC update message (0xc63f95668640 length 1000) 721s | 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................ 721s | 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................ 721s | 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................ 721s | 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................ 721s | 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................ 721s | 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................ 721s | 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................ 721s | 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................ 721s | 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................ 721s | 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................ 721s | 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................ 721s | 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................ 721s | 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................ 721s | 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................ 721s | 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................ 721s | 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................ 721s | 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................ 721s | 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................ 721s | 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................ 721s | 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................ 721s | 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................ 721s | 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................ 721s | 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................ 721s | 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................ 721s | 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................ 721s | 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................ 721s | 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................ 721s | 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................ 721s | 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................ 721s | 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................ 721s | 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................ 721s | 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................ 721s | 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................ 721s | 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................ 721s | 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................ 721s | 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................ 721s | 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................ 721s | 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................ 721s | 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................ 721s | 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................ 721s | 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................ 721s | 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................ 721s | 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................ 721s | 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................ 721s | 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................ 721s | 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................ 721s | 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................ 721s | 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................ 721s | 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................ 721s | 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................ 721s | 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................ 721s | 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................ 721s | 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................ 721s | 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................ 721s | 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................ 721s | 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................ 721s | 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................ 721s | 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................ 721s | 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................ 721s | 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................ 721s | 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................ 721s | 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................ 721s | 00 00 00 00 00 00 00 00 ........ 721s | XCBC: data 721s | 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................ 721s | 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................ 721s | 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................ 721s | 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................ 721s | 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................ 721s | 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................ 721s | 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................ 721s | 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................ 721s | 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................ 721s | 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................ 721s | 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................ 721s | 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................ 721s | 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................ 721s | 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................ 721s | 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................ 721s | 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................ 721s | 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................ 721s | 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................ 721s | 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................ 721s | 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................ 721s | 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................ 721s | 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................ 721s | 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................ 721s | 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................ 721s | 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................ 721s | 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................ 721s | 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................ 721s | 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................ 721s | 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................ 721s | 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................ 721s | 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................ 721s | 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................ 721s | 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................ 721s | 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................ 721s | 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................ 721s | 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................ 721s | 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................ 721s | 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................ 721s | 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................ 721s | 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................ 721s | 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................ 721s | 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................ 721s | 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................ 721s | 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................ 721s | 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................ 721s | 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................ 721s | 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................ 721s | 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................ 721s | 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................ 721s | 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................ 721s | 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................ 721s | 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................ 721s | 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................ 721s | 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................ 721s | 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................ 721s | 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................ 721s | 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................ 721s | 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................ 721s | 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................ 721s | 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................ 721s | 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................ 721s | 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................ 721s | 00 00 00 00 00 00 00 00 ........ 721s | K extracting all 16 bytes of key@0xc63f95669c00 721s | K: symkey-key@0xc63f95669c00 (16-bytes, AES_ECB) 721s | sizeof bytes 16 721s | wrapper: (SECItemType)1735262254: ec b6 97 12 25 78 ad ed d0 49 db 0f 32 7b c0 f6 721s | K extracted len 16 bytes at 0xc63f9566aa00 721s | unwrapped: 721s | 00 01 02 03 04 05 06 07 08 09 0a 0b 0c 0d 0e 0f ................ 721s | XCBC: K: 721s | 00 01 02 03 04 05 06 07 08 09 0a 0b 0c 0d 0e 0f ................ 721s | XCBC: K1 721s | c3 52 80 57 54 23 7f 31 1a c0 ff f4 e3 e0 3e 78 .R.WT#.1......>x 721s | CONCATENATE_DATA_AND_BASE: 721s | target: EXTRACT_KEY_FROM_KEY 721s | base: base-key@0xc63f95666bc0 (16-bytes, AES_KEY_GEN) 721s | params: 16-bytes@0xfffff84c1070 721s | key-offset: 0, key-size: 16 721s | EXTRACT_KEY_FROM_KEY: 721s | target: AES_ECB 721s | flags: SIGN 721s | key_size: 16-bytes 721s | base: base-key@0xc63f95668510 (32-bytes, EXTRACT_KEY_FROM_KEY) 721s | operation: FLAGS_ONLY 721s | params: 8-bytes@0xfffff84c1078 721s | Computing E[63] using K3 721s | XCBC: K3 721s | c1 a7 ab a1 a2 3a 94 06 58 07 a0 8c c8 ee d0 6e .....:..X......n 721s | XCBC: E[n-1] 721s | 5c 88 af cc 1e 1e 83 fc c4 2c 0c e4 12 12 f5 17 \........,...... 721s | XCBC: M[n] 721s | 00 00 00 00 00 00 00 00 ........ 721s | XCBC: M[n] 721s | 00 00 00 00 00 00 00 00 ........ 721s | XCBC: M[n]:80...^E[n-1]^K3 721s | 9d 2f 04 6d bc 24 17 fa 1c 2b ac 68 da fc 25 79 ./.m.$...+.h..%y 721s | XCBC: MAC 721s | f0 da fe e8 95 db 30 25 37 61 10 3b 5d 84 52 8f ......0%7a.;].R. 721s | PRF chunk interface PRF AES_XCBC final length 16 721s | f0 da fe e8 95 db 30 25 37 61 10 3b 5d 84 52 8f ......0%7a.;].R. 721s | chunk output 721s | f0 da fe e8 95 db 30 25 37 61 10 3b 5d 84 52 8f ......0%7a.;].R. 721s | verify_bytes() RFC 3566 Test Case 7: AES-XCBC-MAC-96 with 1000-byte input: prf OUT: ok 721s | CONCATENATE_DATA_AND_BASE: 721s | target: EXTRACT_KEY_FROM_KEY 721s | base: base-key@0xc63f95666bc0 (16-bytes, AES_KEY_GEN) 721s | params: 16-bytes@0xfffff84c1230 721s | key-offset: 0, key-size: 16 721s | EXTRACT_KEY_FROM_KEY: 721s | target: EXTRACT_KEY_FROM_KEY 721s | key_size: 16-bytes 721s | base: base-key@0xc63f9566ad90 (32-bytes, EXTRACT_KEY_FROM_KEY) 721s | operation: FLAGS_ONLY 721s | params: 8-bytes@0xfffff84c11d8 721s | PRF symkey interface PRF AES_XCBC init key symkey-key@0xc63f95669c00 (size 16) 721s | PRF symkey interface: key symkey-key@0xc63f95669c00 (16-bytes, EXTRACT_KEY_FROM_KEY) 721s | XCBC: Key 16=16 just right 721s | key-offset: 0, key-size: 16 721s | EXTRACT_KEY_FROM_KEY: 721s | target: AES_ECB 721s | flags: SIGN 721s | key_size: 16-bytes 721s | base: base-key@0xc63f95669c00 (16-bytes, EXTRACT_KEY_FROM_KEY) 721s | operation: FLAGS_ONLY 721s | params: 8-bytes@0xfffff84c1138 721s | PRF symkey interface PRF AES_XCBC 0xc63f9566a5f0 721s | CONCATENATE_DATA_AND_BASE: 721s | target: EXTRACT_KEY_FROM_KEY 721s | base: base-key@0xc63f95666bc0 (16-bytes, AES_KEY_GEN) 721s | params: 16-bytes@0xfffff84c1230 721s | key-offset: 0, key-size: 1000 721s | EXTRACT_KEY_FROM_KEY: 721s | target: EXTRACT_KEY_FROM_KEY 721s | key_size: 1000-bytes 721s | base: base-key@0xc63f9566aa20 (1016-bytes, EXTRACT_KEY_FROM_KEY) 721s | operation: FLAGS_ONLY 721s | params: 8-bytes@0xfffff84c11d8 721s | PRF symkey interface PRF AES_XCBC update symkey message-key@0xc63f95668510 (size 1000) 721s | PRF symkey interface: symkey message-key@0xc63f95668510 (1000-bytes, EXTRACT_KEY_FROM_KEY) 721s | symkey message extracting all 1000 bytes of key@0xc63f95668510 721s | symkey message: symkey-key@0xc63f95668510 (1000-bytes, EXTRACT_KEY_FROM_KEY) 721s | sizeof bytes 1008 721s | wrapper: (SECItemType)41: 72 87 7a b8 80 72 67 4f 43 8d 92 3d 44 62 e0 06 72 87 7a b8 80 72 67 4f 43 8d 92 3d 44 62 e0 06 72 87 7a b8 80 72 67 4f 43 8d 92 3d 44 62 e0 06 72 87 7a b8 80 72 67 4f 43 8d 92 3d 44 62 e0 06 72 87 7a b8 80 72 67 4f 43 8d 92 3d 44 62 e0 06 72 87 7a b8 80 72 67 4f 43 8d 92 3d 44 62 e0 06 72 87 7a b8 80 72 67 4f 43 8d 92 3d 44 62 e0 06 72 87 7a b8 80 72 67 4f 43 8d 92 3d 44 62 e0 06 72 87 7a b8 80 72 67 4f 43 8d 92 3d 44 62 e0 06 72 87 7a b8 80 72 67 4f 43 8d 92 3d 44 62 e0 06 72 87 7a b8 80 72 67 4f 43 8d 92 3d 44 62 e0 06 72 87 7a b8 80 72 67 4f 43 8d 92 3d 44 62 e0 06 72 87 7a b8 80 72 67 4f 43 8d 92 3d 44 62 e0 06 72 87 7a b8 80 72 67 4f 43 8d 92 3d 44 62 e0 06 72 87 7a b8 80 72 67 4f 43 8d 92 3d 44 62 e0 06 72 87 7a b8 80 72 67 4f 43 8d 92 3d 44 62 e0 06 72 87 7a b8 80 72 67 4f 43 8d 92 3d 44 62 e0 06 72 87 7a b8 80 72 67 4f 43 8d 92 3d 44 62 e0 06 72 87 7a b8 80 72 67 4f 43 8d 92 3d 44 62 e0 06 72 ... 721s | symkey message extracted len 1008 bytes at 0xc63f95669220 721s | unwrapped: 721s | 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................ 721s | 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................ 721s | 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................ 721s | 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................ 721s | 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................ 721s | 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................ 721s | 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................ 721s | 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................ 721s | 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................ 721s | 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................ 721s | 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................ 721s | 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................ 721s | 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................ 721s | 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................ 721s | 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................ 721s | 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................ 721s | 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................ 721s | 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................ 721s | 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................ 721s | 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................ 721s | 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................ 721s | 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................ 721s | 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................ 721s | 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................ 721s | 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................ 721s | 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................ 721s | 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................ 721s | 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................ 721s | 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................ 721s | 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................ 721s | 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................ 721s | 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................ 721s | 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................ 721s | 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................ 721s | 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................ 721s | 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................ 721s | 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................ 721s | 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................ 721s | 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................ 721s | 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................ 721s | 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................ 721s | 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................ 721s | 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................ 721s | 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................ 721s | 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................ 721s | 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................ 721s | 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................ 721s | 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................ 721s | 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................ 721s | 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................ 721s | 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................ 721s | 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................ 721s | 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................ 721s | 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................ 721s | 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................ 721s | 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................ 721s | 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................ 721s | 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................ 721s | 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................ 721s | 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................ 721s | 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................ 721s | 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................ 721s | 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................ 721s | XCBC: data 721s | 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................ 721s | 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................ 721s | 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................ 721s | 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................ 721s | 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................ 721s | 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................ 721s | 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................ 721s | 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................ 721s | 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................ 721s | 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................ 721s | 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................ 721s | 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................ 721s | 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................ 721s | 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................ 721s | 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................ 721s | 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................ 721s | 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................ 721s | 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................ 721s | 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................ 721s | 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................ 721s | 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................ 721s | 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................ 721s | 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................ 721s | 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................ 721s | 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................ 721s | 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................ 721s | 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................ 721s | 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................ 721s | 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................ 721s | 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................ 721s | 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................ 721s | 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................ 721s | 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................ 721s | 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................ 721s | 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................ 721s | 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................ 721s | 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................ 721s | 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................ 721s | 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................ 721s | 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................ 721s | 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................ 721s | 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................ 721s | 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................ 721s | 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................ 721s | 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................ 721s | 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................ 721s | 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................ 721s | 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................ 721s | 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................ 721s | 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................ 721s | 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................ 721s | 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................ 721s | 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................ 721s | 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................ 721s | 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................ 721s | 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................ 721s | 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................ 721s | 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................ 721s | 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................ 721s | 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................ 721s | 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................ 721s | 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................ 721s | 00 00 00 00 00 00 00 00 ........ 721s | K extracting all 16 bytes of key@0xc63f9566ad90 721s | K: symkey-key@0xc63f9566ad90 (16-bytes, AES_ECB) 721s | sizeof bytes 16 721s | wrapper: (SECItemType)-129235736: ec b6 97 12 25 78 ad ed d0 49 db 0f 32 7b c0 f6 721s | K extracted len 16 bytes at 0xc63f9566a250 721s | unwrapped: 721s | 00 01 02 03 04 05 06 07 08 09 0a 0b 0c 0d 0e 0f ................ 721s | XCBC: K: 721s | 00 01 02 03 04 05 06 07 08 09 0a 0b 0c 0d 0e 0f ................ 721s | XCBC: K1 721s | c3 52 80 57 54 23 7f 31 1a c0 ff f4 e3 e0 3e 78 .R.WT#.1......>x 721s | CONCATENATE_DATA_AND_BASE: 721s | target: EXTRACT_KEY_FROM_KEY 721s | base: base-key@0xc63f95666bc0 (16-bytes, AES_KEY_GEN) 721s | params: 16-bytes@0xfffff84c10c0 721s | key-offset: 0, key-size: 16 721s | EXTRACT_KEY_FROM_KEY: 721s | target: AES_ECB 721s | flags: SIGN 721s | key_size: 16-bytes 721s | base: base-key@0xc63f9566b120 (32-bytes, EXTRACT_KEY_FROM_KEY) 721s | operation: FLAGS_ONLY 721s | params: 8-bytes@0xfffff84c10c8 721s | Computing E[63] using K3 721s | XCBC: K3 721s | c1 a7 ab a1 a2 3a 94 06 58 07 a0 8c c8 ee d0 6e .....:..X......n 721s | XCBC: E[n-1] 721s | 5c 88 af cc 1e 1e 83 fc c4 2c 0c e4 12 12 f5 17 \........,...... 721s | XCBC: M[n] 721s | 00 00 00 00 00 00 00 00 ........ 721s | XCBC: M[n] 721s | 00 00 00 00 00 00 00 00 ........ 721s | XCBC: M[n]:80...^E[n-1]^K3 721s | 9d 2f 04 6d bc 24 17 fa 1c 2b ac 68 da fc 25 79 ./.m.$...+.h..%y 721s | XCBC: MAC 721s | f0 da fe e8 95 db 30 25 37 61 10 3b 5d 84 52 8f ......0%7a.;].R. 721s | CONCATENATE_DATA_AND_BASE: 721s | target: EXTRACT_KEY_FROM_KEY 721s | base: base-key@0xc63f95666bc0 (16-bytes, AES_KEY_GEN) 721s | params: 16-bytes@0xfffff84c11b0 721s | key-offset: 0, key-size: 16 721s | EXTRACT_KEY_FROM_KEY: 721s | target: EXTRACT_KEY_FROM_KEY 721s | key_size: 16-bytes 721s | base: base-key@0xc63f9566b120 (32-bytes, EXTRACT_KEY_FROM_KEY) 721s | operation: FLAGS_ONLY 721s | params: 8-bytes@0xfffff84c1158 721s | PRF symkey interface PRF AES_XCBC final-key@0xc63f9566aa20 (size 16) 721s | PRF symkey interface: key-key@0xc63f9566aa20 (16-bytes, EXTRACT_KEY_FROM_KEY) 721s | output: symkey-key@0xc63f9566aa20 (16-bytes, EXTRACT_KEY_FROM_KEY) 721s | RFC 3566 Test Case 7: AES-XCBC-MAC-96 with 1000-byte input extracting all 16 bytes of key@0xc63f9566aa20 721s | RFC 3566 Test Case 7: AES-XCBC-MAC-96 with 1000-byte input: symkey-key@0xc63f9566aa20 (16-bytes, EXTRACT_KEY_FROM_KEY) 721s | sizeof bytes 16 721s | wrapper: siBuffer: 2d 07 fa 47 7a f7 81 df 05 d9 15 2c c1 66 a1 c1 721s | RFC 3566 Test Case 7: AES-XCBC-MAC-96 with 1000-byte input extracted len 16 bytes at 0xc63f95666a80 721s | unwrapped: 721s | f0 da fe e8 95 db 30 25 37 61 10 3b 5d 84 52 8f ......0%7a.;].R. 721s | verify_bytes() RFC 3566 Test Case 7: AES-XCBC-MAC-96 with 1000-byte input: symkey: ok 721s ipsec algparse: RFC 4434 Test Case AES-XCBC-PRF-128 with 20-byte input (key length 16) 721s | decode_to_chunk() test_prf_vector: input "0x000102030405060708090a0b0c0d0e0f" 721s | decode_to_chunk() output: 721s | 00 01 02 03 04 05 06 07 08 09 0a 0b 0c 0d 0e 0f ................ 721s | decode_to_chunk() test_prf_vector: input "0x000102030405060708090a0b0c0d0e0f10111213" 721s | decode_to_chunk() output: 721s | 00 01 02 03 04 05 06 07 08 09 0a 0b 0c 0d 0e 0f ................ 721s | 10 11 12 13 .... 721s | decode_to_chunk() test_prf_vector: input "0x47f51b4564966215b8985c63055ed308" 721s | decode_to_chunk() output: 721s | 47 f5 1b 45 64 96 62 15 b8 98 5c 63 05 5e d3 08 G..Ed.b...\c.^.. 721s | PRF chunk interface PRF AES_XCBC init key hunk 0xc63f95669ff0 (length 16) 721s | 00 01 02 03 04 05 06 07 08 09 0a 0b 0c 0d 0e 0f ................ 721s | CONCATENATE_DATA_AND_BASE: 721s | target: EXTRACT_KEY_FROM_KEY 721s | base: base-key@0xc63f95666bc0 (16-bytes, AES_KEY_GEN) 721s | params: 16-bytes@0xfffff84c11b0 721s | key-offset: 0, key-size: 16 721s | EXTRACT_KEY_FROM_KEY: 721s | target: EXTRACT_KEY_FROM_KEY 721s | key_size: 16-bytes 721s | base: base-key@0xc63f95669c00 (32-bytes, EXTRACT_KEY_FROM_KEY) 721s | operation: FLAGS_ONLY 721s | params: 8-bytes@0xfffff84c1158 721s | XCBC: Key 16=16 just right 721s | key-offset: 0, key-size: 16 721s | EXTRACT_KEY_FROM_KEY: 721s | target: AES_ECB 721s | flags: SIGN 721s | key_size: 16-bytes 721s | base: base-key@0xc63f9566aa20 (16-bytes, EXTRACT_KEY_FROM_KEY) 721s | operation: FLAGS_ONLY 721s | params: 8-bytes@0xfffff84c1108 721s | PRF chunk interface PRF AES_XCBC 0xc63f9566a5f0 721s | PRF chunk interface PRF AES_XCBC update message (0xc63f95668430 length 20) 721s | 00 01 02 03 04 05 06 07 08 09 0a 0b 0c 0d 0e 0f ................ 721s | 10 11 12 13 .... 721s | XCBC: data 721s | 00 01 02 03 04 05 06 07 08 09 0a 0b 0c 0d 0e 0f ................ 721s | 10 11 12 13 .... 721s | K extracting all 16 bytes of key@0xc63f95669c00 721s | K: symkey-key@0xc63f95669c00 (16-bytes, AES_ECB) 721s | sizeof bytes 16 721s | wrapper: (SECItemType)1735262254: ec b6 97 12 25 78 ad ed d0 49 db 0f 32 7b c0 f6 721s | K extracted len 16 bytes at 0xc63f956668c0 721s | unwrapped: 721s | 00 01 02 03 04 05 06 07 08 09 0a 0b 0c 0d 0e 0f ................ 721s | XCBC: K: 721s | 00 01 02 03 04 05 06 07 08 09 0a 0b 0c 0d 0e 0f ................ 721s | XCBC: K1 721s | c3 52 80 57 54 23 7f 31 1a c0 ff f4 e3 e0 3e 78 .R.WT#.1......>x 721s | CONCATENATE_DATA_AND_BASE: 721s | target: EXTRACT_KEY_FROM_KEY 721s | base: base-key@0xc63f95666bc0 (16-bytes, AES_KEY_GEN) 721s | params: 16-bytes@0xfffff84c1070 721s | key-offset: 0, key-size: 16 721s | EXTRACT_KEY_FROM_KEY: 721s | target: AES_ECB 721s | flags: SIGN 721s | key_size: 16-bytes 721s | base: base-key@0xc63f95668510 (32-bytes, EXTRACT_KEY_FROM_KEY) 721s | operation: FLAGS_ONLY 721s | params: 8-bytes@0xfffff84c1078 721s | Computing E[2] using K3 721s | XCBC: K3 721s | c1 a7 ab a1 a2 3a 94 06 58 07 a0 8c c8 ee d0 6e .....:..X......n 721s | XCBC: E[n-1] 721s | 1d 04 48 fa cf 4d 9c 6f 55 b9 93 da 09 80 3d b3 ..H..M.oU.....=. 721s | XCBC: M[n] 721s | 10 11 12 13 .... 721s | XCBC: M[n] 721s | 10 11 12 13 .... 721s | XCBC: M[n]:80...^E[n-1]^K3 721s | cc b2 f1 48 ed 77 08 69 0d be 33 56 c1 6e ed dd ...H.w.i..3V.n.. 721s | XCBC: MAC 721s | 47 f5 1b 45 64 96 62 15 b8 98 5c 63 05 5e d3 08 G..Ed.b...\c.^.. 721s | PRF chunk interface PRF AES_XCBC final length 16 721s | 47 f5 1b 45 64 96 62 15 b8 98 5c 63 05 5e d3 08 G..Ed.b...\c.^.. 721s | chunk output 721s | 47 f5 1b 45 64 96 62 15 b8 98 5c 63 05 5e d3 08 G..Ed.b...\c.^.. 721s | verify_bytes() RFC 4434 Test Case AES-XCBC-PRF-128 with 20-byte input (key length 16): prf OUT: ok 721s | CONCATENATE_DATA_AND_BASE: 721s | target: EXTRACT_KEY_FROM_KEY 721s | base: base-key@0xc63f95666bc0 (16-bytes, AES_KEY_GEN) 721s | params: 16-bytes@0xfffff84c1230 721s | key-offset: 0, key-size: 16 721s | EXTRACT_KEY_FROM_KEY: 721s | target: EXTRACT_KEY_FROM_KEY 721s | key_size: 16-bytes 721s | base: base-key@0xc63f9566aa20 (32-bytes, EXTRACT_KEY_FROM_KEY) 721s | operation: FLAGS_ONLY 721s | params: 8-bytes@0xfffff84c11d8 721s | PRF symkey interface PRF AES_XCBC init key symkey-key@0xc63f95669c00 (size 16) 721s | PRF symkey interface: key symkey-key@0xc63f95669c00 (16-bytes, EXTRACT_KEY_FROM_KEY) 721s | XCBC: Key 16=16 just right 721s | key-offset: 0, key-size: 16 721s | EXTRACT_KEY_FROM_KEY: 721s | target: AES_ECB 721s | flags: SIGN 721s | key_size: 16-bytes 721s | base: base-key@0xc63f95669c00 (16-bytes, EXTRACT_KEY_FROM_KEY) 721s | operation: FLAGS_ONLY 721s | params: 8-bytes@0xfffff84c1138 721s | PRF symkey interface PRF AES_XCBC 0xc63f9566a5f0 721s | CONCATENATE_DATA_AND_BASE: 721s | target: EXTRACT_KEY_FROM_KEY 721s | base: base-key@0xc63f95666bc0 (16-bytes, AES_KEY_GEN) 721s | params: 16-bytes@0xfffff84c1230 721s | key-offset: 0, key-size: 20 721s | EXTRACT_KEY_FROM_KEY: 721s | target: EXTRACT_KEY_FROM_KEY 721s | key_size: 20-bytes 721s | base: base-key@0xc63f9566ad90 (36-bytes, EXTRACT_KEY_FROM_KEY) 721s | operation: FLAGS_ONLY 721s | params: 8-bytes@0xfffff84c11d8 721s | PRF symkey interface PRF AES_XCBC update symkey message-key@0xc63f95668510 (size 20) 721s | PRF symkey interface: symkey message-key@0xc63f95668510 (20-bytes, EXTRACT_KEY_FROM_KEY) 721s | symkey message extracting all 20 bytes of key@0xc63f95668510 721s | symkey message: symkey-key@0xc63f95668510 (20-bytes, EXTRACT_KEY_FROM_KEY) 721s | sizeof bytes 32 721s | wrapper: (SECItemType)41: ec b6 97 12 25 78 ad ed d0 49 db 0f 32 7b c0 f6 f0 91 96 9c 5c c3 42 27 5e 2c 85 a7 69 70 57 db 721s | symkey message extracted len 32 bytes at 0xc63f95666b60 721s | unwrapped: 721s | 00 01 02 03 04 05 06 07 08 09 0a 0b 0c 0d 0e 0f ................ 721s | 10 11 12 13 00 00 00 00 00 00 00 00 00 00 00 00 ................ 721s | XCBC: data 721s | 00 01 02 03 04 05 06 07 08 09 0a 0b 0c 0d 0e 0f ................ 721s | 10 11 12 13 .... 721s | K extracting all 16 bytes of key@0xc63f9566aa20 721s | K: symkey-key@0xc63f9566aa20 (16-bytes, AES_ECB) 721s | sizeof bytes 16 721s | wrapper: (SECItemType)-129235736: ec b6 97 12 25 78 ad ed d0 49 db 0f 32 7b c0 f6 721s | K extracted len 16 bytes at 0xc63f9566b100 721s | unwrapped: 721s | 00 01 02 03 04 05 06 07 08 09 0a 0b 0c 0d 0e 0f ................ 721s | XCBC: K: 721s | 00 01 02 03 04 05 06 07 08 09 0a 0b 0c 0d 0e 0f ................ 721s | XCBC: K1 721s | c3 52 80 57 54 23 7f 31 1a c0 ff f4 e3 e0 3e 78 .R.WT#.1......>x 721s | CONCATENATE_DATA_AND_BASE: 721s | target: EXTRACT_KEY_FROM_KEY 721s | base: base-key@0xc63f95666bc0 (16-bytes, AES_KEY_GEN) 721s | params: 16-bytes@0xfffff84c10c0 721s | key-offset: 0, key-size: 16 721s | EXTRACT_KEY_FROM_KEY: 721s | target: AES_ECB 721s | flags: SIGN 721s | key_size: 16-bytes 721s | base: base-key@0xc63f9566b120 (32-bytes, EXTRACT_KEY_FROM_KEY) 721s | operation: FLAGS_ONLY 721s | params: 8-bytes@0xfffff84c10c8 721s | Computing E[2] using K3 721s | XCBC: K3 721s | c1 a7 ab a1 a2 3a 94 06 58 07 a0 8c c8 ee d0 6e .....:..X......n 721s | XCBC: E[n-1] 721s | 1d 04 48 fa cf 4d 9c 6f 55 b9 93 da 09 80 3d b3 ..H..M.oU.....=. 721s | XCBC: M[n] 721s | 10 11 12 13 .... 721s | XCBC: M[n] 721s | 10 11 12 13 .... 721s | XCBC: M[n]:80...^E[n-1]^K3 721s | cc b2 f1 48 ed 77 08 69 0d be 33 56 c1 6e ed dd ...H.w.i..3V.n.. 721s | XCBC: MAC 721s | 47 f5 1b 45 64 96 62 15 b8 98 5c 63 05 5e d3 08 G..Ed.b...\c.^.. 721s | CONCATENATE_DATA_AND_BASE: 721s | target: EXTRACT_KEY_FROM_KEY 721s | base: base-key@0xc63f95666bc0 (16-bytes, AES_KEY_GEN) 721s | params: 16-bytes@0xfffff84c11b0 721s | key-offset: 0, key-size: 16 721s | EXTRACT_KEY_FROM_KEY: 721s | target: EXTRACT_KEY_FROM_KEY 721s | key_size: 16-bytes 721s | base: base-key@0xc63f9566b120 (32-bytes, EXTRACT_KEY_FROM_KEY) 721s | operation: FLAGS_ONLY 721s | params: 8-bytes@0xfffff84c1158 721s | PRF symkey interface PRF AES_XCBC final-key@0xc63f9566ad90 (size 16) 721s | PRF symkey interface: key-key@0xc63f9566ad90 (16-bytes, EXTRACT_KEY_FROM_KEY) 721s | output: symkey-key@0xc63f9566ad90 (16-bytes, EXTRACT_KEY_FROM_KEY) 721s | RFC 4434 Test Case AES-XCBC-PRF-128 with 20-byte input (key length 16) extracting all 16 bytes of key@0xc63f9566ad90 721s | RFC 4434 Test Case AES-XCBC-PRF-128 with 20-byte input (key length 16): symkey-key@0xc63f9566ad90 (16-bytes, EXTRACT_KEY_FROM_KEY) 721s | sizeof bytes 16 721s | wrapper: siBuffer: 61 43 d9 54 e1 c3 e6 d8 db 8d ac 10 b2 c8 e3 4f 721s | RFC 4434 Test Case AES-XCBC-PRF-128 with 20-byte input (key length 16) extracted len 16 bytes at 0xc63f9566b100 721s | unwrapped: 721s | 47 f5 1b 45 64 96 62 15 b8 98 5c 63 05 5e d3 08 G..Ed.b...\c.^.. 721s | verify_bytes() RFC 4434 Test Case AES-XCBC-PRF-128 with 20-byte input (key length 16): symkey: ok 721s ipsec algparse: RFC 4434 Test Case AES-XCBC-PRF-128 with 20-byte input (key length 10) 721s | decode_to_chunk() test_prf_vector: input "0x00010203040506070809" 721s | decode_to_chunk() output: 721s | 00 01 02 03 04 05 06 07 08 09 .......... 721s | decode_to_chunk() test_prf_vector: input "0x000102030405060708090a0b0c0d0e0f10111213" 721s | decode_to_chunk() output: 721s | 00 01 02 03 04 05 06 07 08 09 0a 0b 0c 0d 0e 0f ................ 721s | 10 11 12 13 .... 721s | decode_to_chunk() test_prf_vector: input "0x0fa087af7d866e7653434e602fdde835" 721s | decode_to_chunk() output: 721s | 0f a0 87 af 7d 86 6e 76 53 43 4e 60 2f dd e8 35 ....}.nvSCN`/..5 721s | PRF chunk interface PRF AES_XCBC init key hunk 0xc63f95669ff0 (length 10) 721s | 00 01 02 03 04 05 06 07 08 09 .......... 721s | CONCATENATE_DATA_AND_BASE: 721s | target: EXTRACT_KEY_FROM_KEY 721s | base: base-key@0xc63f95666bc0 (16-bytes, AES_KEY_GEN) 721s | params: 16-bytes@0xfffff84c11b0 721s | key-offset: 0, key-size: 10 721s | EXTRACT_KEY_FROM_KEY: 721s | target: EXTRACT_KEY_FROM_KEY 721s | key_size: 10-bytes 721s | base: base-key@0xc63f95669c00 (26-bytes, EXTRACT_KEY_FROM_KEY) 721s | operation: FLAGS_ONLY 721s | params: 8-bytes@0xfffff84c1158 721s | XCBC: Key 10<16 too small, padding with zeros 721s | CONCATENATE_BASE_AND_DATA: 721s | target: EXTRACT_KEY_FROM_KEY 721s | base: base-key@0xc63f9566ad90 (10-bytes, EXTRACT_KEY_FROM_KEY) 721s | params: 16-bytes@0xfffff84c10d0 721s | key-offset: 0, key-size: 16 721s | EXTRACT_KEY_FROM_KEY: 721s | target: AES_ECB 721s | flags: SIGN 721s | key_size: 16-bytes 721s | base: base-key@0xc63f95669c00 (16-bytes, EXTRACT_KEY_FROM_KEY) 721s | operation: FLAGS_ONLY 721s | params: 8-bytes@0xfffff84c1108 721s | PRF chunk interface PRF AES_XCBC 0xc63f9566a5f0 721s | PRF chunk interface PRF AES_XCBC update message (0xc63f95668430 length 20) 721s | 00 01 02 03 04 05 06 07 08 09 0a 0b 0c 0d 0e 0f ................ 721s | 10 11 12 13 .... 721s | XCBC: data 721s | 00 01 02 03 04 05 06 07 08 09 0a 0b 0c 0d 0e 0f ................ 721s | 10 11 12 13 .... 721s | K extracting all 16 bytes of key@0xc63f95668510 721s | K: symkey-key@0xc63f95668510 (16-bytes, AES_ECB) 721s | sizeof bytes 16 721s | wrapper: (SECItemType)1735262254: ec a3 d8 6a 3d 1c fd 6c cd 54 d3 58 2d 13 c9 c6 721s | K extracted len 16 bytes at 0xc63f95669e40 721s | unwrapped: 721s | 00 01 02 03 04 05 06 07 08 09 00 00 00 00 00 00 ................ 721s | XCBC: K: 721s | 00 01 02 03 04 05 06 07 08 09 00 00 00 00 00 00 ................ 721s | XCBC: K1 721s | 50 ca b2 4d 03 34 45 5e 40 7b 25 0f dd 7c f8 d5 P..M.4E^@{%..|.. 721s | CONCATENATE_DATA_AND_BASE: 721s | target: EXTRACT_KEY_FROM_KEY 721s | base: base-key@0xc63f95666bc0 (16-bytes, AES_KEY_GEN) 721s | params: 16-bytes@0xfffff84c1070 721s | key-offset: 0, key-size: 16 721s | EXTRACT_KEY_FROM_KEY: 721s | target: AES_ECB 721s | flags: SIGN 721s | key_size: 16-bytes 721s | base: base-key@0xc63f95669c00 (32-bytes, EXTRACT_KEY_FROM_KEY) 721s | operation: FLAGS_ONLY 721s | params: 8-bytes@0xfffff84c1078 721s | Computing E[2] using K3 721s | XCBC: K3 721s | 8e f7 48 db 56 f1 f7 26 24 72 f2 c5 63 b0 3f 88 ..H.V..&$r..c.?. 721s | XCBC: E[n-1] 721s | fe 1f 63 e9 65 1a 4b bb 3c cc cd 0d cc 83 e4 30 ..c.e.K.<......0 721s | XCBC: M[n] 721s | 10 11 12 13 .... 721s | XCBC: M[n] 721s | 10 11 12 13 .... 721s | XCBC: M[n]:80...^E[n-1]^K3 721s | 60 f9 39 21 b3 eb bc 9d 18 be 3f c8 af 33 db b8 `.9!......?..3.. 721s | XCBC: MAC 721s | 0f a0 87 af 7d 86 6e 76 53 43 4e 60 2f dd e8 35 ....}.nvSCN`/..5 721s | PRF chunk interface PRF AES_XCBC final length 16 721s | 0f a0 87 af 7d 86 6e 76 53 43 4e 60 2f dd e8 35 ....}.nvSCN`/..5 721s | chunk output 721s | 0f a0 87 af 7d 86 6e 76 53 43 4e 60 2f dd e8 35 ....}.nvSCN`/..5 721s | verify_bytes() RFC 4434 Test Case AES-XCBC-PRF-128 with 20-byte input (key length 10): prf OUT: ok 721s | CONCATENATE_DATA_AND_BASE: 721s | target: EXTRACT_KEY_FROM_KEY 721s | base: base-key@0xc63f95666bc0 (16-bytes, AES_KEY_GEN) 721s | params: 16-bytes@0xfffff84c1230 721s | key-offset: 0, key-size: 10 721s | EXTRACT_KEY_FROM_KEY: 721s | target: EXTRACT_KEY_FROM_KEY 721s | key_size: 10-bytes 721s | base: base-key@0xc63f9566ad90 (26-bytes, EXTRACT_KEY_FROM_KEY) 721s | operation: FLAGS_ONLY 721s | params: 8-bytes@0xfffff84c11d8 721s | PRF symkey interface PRF AES_XCBC init key symkey-key@0xc63f95668510 (size 10) 721s | PRF symkey interface: key symkey-key@0xc63f95668510 (10-bytes, EXTRACT_KEY_FROM_KEY) 721s | XCBC: Key 10<16 too small, padding with zeros 721s | CONCATENATE_BASE_AND_DATA: 721s | target: EXTRACT_KEY_FROM_KEY 721s | base: base-key@0xc63f95668510 (10-bytes, EXTRACT_KEY_FROM_KEY) 721s | params: 16-bytes@0xfffff84c1100 721s | key-offset: 0, key-size: 16 721s | EXTRACT_KEY_FROM_KEY: 721s | target: AES_ECB 721s | flags: SIGN 721s | key_size: 16-bytes 721s | base: base-key@0xc63f9566ad90 (16-bytes, EXTRACT_KEY_FROM_KEY) 721s | operation: FLAGS_ONLY 721s | params: 8-bytes@0xfffff84c1138 721s | PRF symkey interface PRF AES_XCBC 0xc63f9566a5f0 721s | CONCATENATE_DATA_AND_BASE: 721s | target: EXTRACT_KEY_FROM_KEY 721s | base: base-key@0xc63f95666bc0 (16-bytes, AES_KEY_GEN) 721s | params: 16-bytes@0xfffff84c1230 721s | key-offset: 0, key-size: 20 721s | EXTRACT_KEY_FROM_KEY: 721s | target: EXTRACT_KEY_FROM_KEY 721s | key_size: 20-bytes 721s | base: base-key@0xc63f9566aa20 (36-bytes, EXTRACT_KEY_FROM_KEY) 721s | operation: FLAGS_ONLY 721s | params: 8-bytes@0xfffff84c11d8 721s | PRF symkey interface PRF AES_XCBC update symkey message-key@0xc63f9566ad90 (size 20) 721s | PRF symkey interface: symkey message-key@0xc63f9566ad90 (20-bytes, EXTRACT_KEY_FROM_KEY) 721s | symkey message extracting all 20 bytes of key@0xc63f9566ad90 721s | symkey message: symkey-key@0xc63f9566ad90 (20-bytes, EXTRACT_KEY_FROM_KEY) 721s | sizeof bytes 32 721s | wrapper: (SECItemType)41: ec b6 97 12 25 78 ad ed d0 49 db 0f 32 7b c0 f6 f0 91 96 9c 5c c3 42 27 5e 2c 85 a7 69 70 57 db 721s | symkey message extracted len 32 bytes at 0xc63f95666b90 721s | unwrapped: 721s | 00 01 02 03 04 05 06 07 08 09 0a 0b 0c 0d 0e 0f ................ 721s | 10 11 12 13 00 00 00 00 00 00 00 00 00 00 00 00 ................ 721s | XCBC: data 721s | 00 01 02 03 04 05 06 07 08 09 0a 0b 0c 0d 0e 0f ................ 721s | 10 11 12 13 .... 721s | K extracting all 16 bytes of key@0xc63f95669c00 721s | K: symkey-key@0xc63f95669c00 (16-bytes, AES_ECB) 721s | sizeof bytes 16 721s | wrapper: (SECItemType)-129235736: ec a3 d8 6a 3d 1c fd 6c cd 54 d3 58 2d 13 c9 c6 721s | K extracted len 16 bytes at 0xc63f956668c0 721s | unwrapped: 721s | 00 01 02 03 04 05 06 07 08 09 00 00 00 00 00 00 ................ 721s | XCBC: K: 721s | 00 01 02 03 04 05 06 07 08 09 00 00 00 00 00 00 ................ 721s | XCBC: K1 721s | 50 ca b2 4d 03 34 45 5e 40 7b 25 0f dd 7c f8 d5 P..M.4E^@{%..|.. 721s | CONCATENATE_DATA_AND_BASE: 721s | target: EXTRACT_KEY_FROM_KEY 721s | base: base-key@0xc63f95666bc0 (16-bytes, AES_KEY_GEN) 721s | params: 16-bytes@0xfffff84c10c0 721s | key-offset: 0, key-size: 16 721s | EXTRACT_KEY_FROM_KEY: 721s | target: AES_ECB 721s | flags: SIGN 721s | key_size: 16-bytes 721s | base: base-key@0xc63f9566b120 (32-bytes, EXTRACT_KEY_FROM_KEY) 721s | operation: FLAGS_ONLY 721s | params: 8-bytes@0xfffff84c10c8 721s | Computing E[2] using K3 721s | XCBC: K3 721s | 8e f7 48 db 56 f1 f7 26 24 72 f2 c5 63 b0 3f 88 ..H.V..&$r..c.?. 721s | XCBC: E[n-1] 721s | fe 1f 63 e9 65 1a 4b bb 3c cc cd 0d cc 83 e4 30 ..c.e.K.<......0 721s | XCBC: M[n] 721s | 10 11 12 13 .... 721s | XCBC: M[n] 721s | 10 11 12 13 .... 721s | XCBC: M[n]:80...^E[n-1]^K3 721s | 60 f9 39 21 b3 eb bc 9d 18 be 3f c8 af 33 db b8 `.9!......?..3.. 721s | XCBC: MAC 721s | 0f a0 87 af 7d 86 6e 76 53 43 4e 60 2f dd e8 35 ....}.nvSCN`/..5 721s | CONCATENATE_DATA_AND_BASE: 721s | target: EXTRACT_KEY_FROM_KEY 721s | base: base-key@0xc63f95666bc0 (16-bytes, AES_KEY_GEN) 721s | params: 16-bytes@0xfffff84c11b0 721s | key-offset: 0, key-size: 16 721s | EXTRACT_KEY_FROM_KEY: 721s | target: EXTRACT_KEY_FROM_KEY 721s | key_size: 16-bytes 721s | base: base-key@0xc63f9566b120 (32-bytes, EXTRACT_KEY_FROM_KEY) 721s | operation: FLAGS_ONLY 721s | params: 8-bytes@0xfffff84c1158 721s | PRF symkey interface PRF AES_XCBC final-key@0xc63f9566aa20 (size 16) 721s | PRF symkey interface: key-key@0xc63f9566aa20 (16-bytes, EXTRACT_KEY_FROM_KEY) 721s | output: symkey-key@0xc63f9566aa20 (16-bytes, EXTRACT_KEY_FROM_KEY) 721s | RFC 4434 Test Case AES-XCBC-PRF-128 with 20-byte input (key length 10) extracting all 16 bytes of key@0xc63f9566aa20 721s | RFC 4434 Test Case AES-XCBC-PRF-128 with 20-byte input (key length 10): symkey-key@0xc63f9566aa20 (16-bytes, EXTRACT_KEY_FROM_KEY) 721s | sizeof bytes 16 721s | wrapper: siBuffer: 2b 3a c4 17 59 a1 7a b5 3a e1 ee ca 4c b6 3b c5 721s | RFC 4434 Test Case AES-XCBC-PRF-128 with 20-byte input (key length 10) extracted len 16 bytes at 0xc63f956668c0 721s | unwrapped: 721s | 0f a0 87 af 7d 86 6e 76 53 43 4e 60 2f dd e8 35 ....}.nvSCN`/..5 721s | verify_bytes() RFC 4434 Test Case AES-XCBC-PRF-128 with 20-byte input (key length 10): symkey: ok 721s ipsec algparse: RFC 4434 Test Case AES-XCBC-PRF-128 with 20-byte input (key length 18) 721s | decode_to_chunk() test_prf_vector: input "0x000102030405060708090a0b0c0d0e0fedcb" 721s | decode_to_chunk() output: 721s | 00 01 02 03 04 05 06 07 08 09 0a 0b 0c 0d 0e 0f ................ 721s | ed cb .. 721s | decode_to_chunk() test_prf_vector: input "0x000102030405060708090a0b0c0d0e0f10111213" 721s | decode_to_chunk() output: 721s | 00 01 02 03 04 05 06 07 08 09 0a 0b 0c 0d 0e 0f ................ 721s | 10 11 12 13 .... 721s | decode_to_chunk() test_prf_vector: input "0x8cd3c93ae598a9803006ffb67c40e9e4" 721s | decode_to_chunk() output: 721s | initializing NSS db 721s running pluto selftest 721s 8c d3 c9 3a e5 98 a9 80 30 06 ff b6 7c 40 e9 e4 ...:....0...|@.. 721s | PRF chunk interface PRF AES_XCBC init key hunk 0xc63f95669ff0 (length 18) 721s | 00 01 02 03 04 05 06 07 08 09 0a 0b 0c 0d 0e 0f ................ 721s | ed cb .. 721s | CONCATENATE_DATA_AND_BASE: 721s | target: EXTRACT_KEY_FROM_KEY 721s | base: base-key@0xc63f95666bc0 (16-bytes, AES_KEY_GEN) 721s | params: 16-bytes@0xfffff84c11b0 721s | key-offset: 0, key-size: 18 721s | EXTRACT_KEY_FROM_KEY: 721s | target: EXTRACT_KEY_FROM_KEY 721s | key_size: 18-bytes 721s | base: base-key@0xc63f95668510 (34-bytes, EXTRACT_KEY_FROM_KEY) 721s | operation: FLAGS_ONLY 721s | params: 8-bytes@0xfffff84c1158 721s | XCBC: Key 18>16 too big, rehashing to size 721s | CONCATENATE_DATA_AND_BASE: 721s | target: EXTRACT_KEY_FROM_KEY 721s | base: base-key@0xc63f95666bc0 (16-bytes, AES_KEY_GEN) 721s | params: 16-bytes@0xfffff84c10c0 721s | key-offset: 0, key-size: 16 721s | EXTRACT_KEY_FROM_KEY: 721s | target: AES_ECB 721s | flags: SIGN 721s | key_size: 16-bytes 721s | base: base-key@0xc63f9566ad90 (32-bytes, EXTRACT_KEY_FROM_KEY) 721s | operation: FLAGS_ONLY 721s | params: 8-bytes@0xfffff84c10c8 721s | draft_chunk extracting all 18 bytes of key@0xc63f9566aa20 721s | draft_chunk: symkey-key@0xc63f9566aa20 (18-bytes, EXTRACT_KEY_FROM_KEY) 721s | sizeof bytes 32 721s | wrapper: (SECItemType)1702132066: ec b6 97 12 25 78 ad ed d0 49 db 0f 32 7b c0 f6 49 fd f9 fd d2 c7 d0 98 c0 74 9f 1a 6b 6f a0 7c 721s | draft_chunk extracted len 32 bytes at 0xc63f95666b90 721s | unwrapped: 721s | 00 01 02 03 04 05 06 07 08 09 0a 0b 0c 0d 0e 0f ................ 721s | ed cb 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................ 721s | XCBC: data 721s | 00 01 02 03 04 05 06 07 08 09 0a 0b 0c 0d 0e 0f ................ 721s | ed cb .. 721s | K extracting all 16 bytes of key@0xc63f95668510 721s | K: symkey-key@0xc63f95668510 (16-bytes, AES_ECB) 721s | sizeof bytes 16 721s | wrapper: (SECItemType)684837: 72 87 7a b8 80 72 67 4f 43 8d 92 3d 44 62 e0 06 721s | K extracted len 16 bytes at 0xc63f9566a250 721s | unwrapped: 721s | 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................ 721s | XCBC: K: 721s | 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................ 721s | XCBC: K1 721s | e1 4d 5d 0e e2 77 15 df 08 b4 15 2b a2 3d a8 e0 .M]..w.....+.=.. 721s | CONCATENATE_DATA_AND_BASE: 721s | target: EXTRACT_KEY_FROM_KEY 721s | base: base-key@0xc63f95666bc0 (16-bytes, AES_KEY_GEN) 721s | params: 16-bytes@0xfffff84c0ff0 721s | key-offset: 0, key-size: 16 721s | EXTRACT_KEY_FROM_KEY: 721s | target: AES_ECB 721s | flags: SIGN 721s | key_size: 16-bytes 721s | base: base-key@0xc63f95669c00 (32-bytes, EXTRACT_KEY_FROM_KEY) 721s | operation: FLAGS_ONLY 721s | params: 8-bytes@0xfffff84c0ff8 721s | Computing E[2] using K3 721s | XCBC: K3 721s | 8d 34 ef cb 3b d5 45 ca 06 2a ec df ef 7c 0b fa .4..;.E..*...|.. 721s | XCBC: E[n-1] 721s | 0b 72 b2 ae 0a 37 79 81 75 6a d5 9c 79 c0 e6 96 .r...7y.uj..y... 721s | XCBC: M[n] 721s | ed cb .. 721s | XCBC: M[n] 721s | ed cb .. 721s | XCBC: M[n]:80...^E[n-1]^K3 721s | 6b 8d dd 65 31 e2 3c 4b 73 40 39 43 96 bc ed 6c k..e1.16 too big, rehashing to size 721s | CONCATENATE_DATA_AND_BASE: 721s | target: EXTRACT_KEY_FROM_KEY 721s | base: base-key@0xc63f95666bc0 (16-bytes, AES_KEY_GEN) 721s | params: 16-bytes@0xfffff84c10f0 721s | key-offset: 0, key-size: 16 721s | EXTRACT_KEY_FROM_KEY: 721s | target: AES_ECB 721s | flags: SIGN 721s | key_size: 16-bytes 721s | base: base-key@0xc63f95668510 (32-bytes, EXTRACT_KEY_FROM_KEY) 721s | operation: FLAGS_ONLY 721s | params: 8-bytes@0xfffff84c10f8 721s | draft_chunk extracting all 18 bytes of key@0xc63f9566ad90 721s | draft_chunk: symkey-key@0xc63f9566ad90 (18-bytes, EXTRACT_KEY_FROM_KEY) 721s | sizeof bytes 32 721s | wrapper: (SECItemType)-129233520: ec b6 97 12 25 78 ad ed d0 49 db 0f 32 7b c0 f6 49 fd f9 fd d2 c7 d0 98 c0 74 9f 1a 6b 6f a0 7c 721s | draft_chunk extracted len 32 bytes at 0xc63f9566a5f0 721s | unwrapped: 721s | 00 01 02 03 04 05 06 07 08 09 0a 0b 0c 0d 0e 0f ................ 721s | ed cb 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................ 721s | XCBC: data 721s | 00 01 02 03 04 05 06 07 08 09 0a 0b 0c 0d 0e 0f ................ 721s | ed cb .. 721s | K extracting all 16 bytes of key@0xc63f9566aa20 721s | K: symkey-key@0xc63f9566aa20 (16-bytes, AES_ECB) 721s | sizeof bytes 16 721s | wrapper: (SECItemType)684837: 72 87 7a b8 80 72 67 4f 43 8d 92 3d 44 62 e0 06 721s | K extracted len 16 bytes at 0xc63f9566aa00 721s | unwrapped: 721s | 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................ 721s | XCBC: K: 721s | 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................ 721s | XCBC: K1 721s | e1 4d 5d 0e e2 77 15 df 08 b4 15 2b a2 3d a8 e0 .M]..w.....+.=.. 721s | CONCATENATE_DATA_AND_BASE: 721s | target: EXTRACT_KEY_FROM_KEY 721s | base: base-key@0xc63f95666bc0 (16-bytes, AES_KEY_GEN) 721s | params: 16-bytes@0xfffff84c1020 721s | key-offset: 0, key-size: 16 721s | EXTRACT_KEY_FROM_KEY: 721s | target: AES_ECB 721s | flags: SIGN 721s | key_size: 16-bytes 721s | base: base-key@0xc63f95669c00 (32-bytes, EXTRACT_KEY_FROM_KEY) 721s | operation: FLAGS_ONLY 721s | params: 8-bytes@0xfffff84c1028 721s | Computing E[2] using K3 721s | XCBC: K3 721s | 8d 34 ef cb 3b d5 45 ca 06 2a ec df ef 7c 0b fa .4..;.E..*...|.. 721s | XCBC: E[n-1] 721s | 0b 72 b2 ae 0a 37 79 81 75 6a d5 9c 79 c0 e6 96 .r...7y.uj..y... 721s | XCBC: M[n] 721s | ed cb .. 721s | XCBC: M[n] 721s | ed cb .. 721s | XCBC: M[n]:80...^E[n-1]^K3 721s | 6b 8d dd 65 31 e2 3c 4b 73 40 39 43 96 bc ed 6c k..e1.j.....n1.].8 721s | PRF chunk interface PRF HMAC_MD5 init key hunk 0xc63f95668430 (length 4) 721s | 4a 65 66 65 Jefe 721s | CONCATENATE_DATA_AND_BASE: 721s | target: EXTRACT_KEY_FROM_KEY 721s | base: base-key@0xc63f95666bc0 (16-bytes, AES_KEY_GEN) 721s | params: 16-bytes@0xfffff84c1180 721s | key-offset: 0, key-size: 4 721s | EXTRACT_KEY_FROM_KEY: 721s | target: MD5_HMAC 721s | flags: SIGN 721s | key_size: 4-bytes 721s | base: base-key@0xc63f95669c00 (20-bytes, EXTRACT_KEY_FROM_KEY) 721s | operation: FLAGS_ONLY 721s | params: 8-bytes@0xfffff84c1188 721s | PRF chunk interface prf: created HMAC_MD5 context 0xc63f95669ea0 from key-key@0xc63f9566ad90 721s | PRF chunk interface prf: begin HMAC_MD5 with context 0xc63f95669ea0 from key-key@0xc63f9566ad90 721s | PRF chunk interface PRF HMAC_MD5 0xc63f9566a680 721s | PRF chunk interface PRF HMAC_MD5 update message (0xc63f9566a5f0 length 28) 721s | 77 68 61 74 20 64 6f 20 79 61 20 77 61 6e 74 20 what do ya want 721s | 66 6f 72 20 6e 6f 74 68 69 6e 67 3f for nothing? 721s | PRF chunk interface PRF HMAC_MD5 final length 16 721s | 75 0c 78 3e 6a b0 b5 03 ea a8 6e 31 0a 5d b7 38 u.x>j.....n1.].8 721s | chunk output 721s | 75 0c 78 3e 6a b0 b5 03 ea a8 6e 31 0a 5d b7 38 u.x>j.....n1.].8 721s | verify_bytes() RFC 2104: MD5_HMAC test 2: prf OUT: ok 721s | CONCATENATE_DATA_AND_BASE: 721s | target: EXTRACT_KEY_FROM_KEY 721s | base: base-key@0xc63f95666bc0 (16-bytes, AES_KEY_GEN) 721s | params: 16-bytes@0xfffff84c1230 721s | key-offset: 0, key-size: 4 721s | EXTRACT_KEY_FROM_KEY: 721s | target: EXTRACT_KEY_FROM_KEY 721s | key_size: 4-bytes 721s | base: base-key@0xc63f95669c00 (20-bytes, EXTRACT_KEY_FROM_KEY) 721s | operation: FLAGS_ONLY 721s | params: 8-bytes@0xfffff84c11d8 721s | PRF symkey interface PRF HMAC_MD5 init key symkey-key@0xc63f9566ad90 (size 4) 721s | PRF symkey interface: key symkey-key@0xc63f9566ad90 (4-bytes, EXTRACT_KEY_FROM_KEY) 721s | key-offset: 0, key-size: 4 721s | EXTRACT_KEY_FROM_KEY: 721s | target: MD5_HMAC 721s | flags: SIGN 721s | key_size: 4-bytes 721s | base: base-key@0xc63f9566ad90 (4-bytes, EXTRACT_KEY_FROM_KEY) 721s | operation: FLAGS_ONLY 721s | params: 8-bytes@0xfffff84c11a8 721s | PRF symkey interface prf: created HMAC_MD5 context 0xc63f95669ea0 from key symkey-key@0xc63f95669c00 721s | PRF symkey interface prf: begin HMAC_MD5 with context 0xc63f95669ea0 from key symkey-key@0xc63f95669c00 721s | PRF symkey interface PRF HMAC_MD5 0xc63f95666b60 721s | CONCATENATE_DATA_AND_BASE: 721s | target: EXTRACT_KEY_FROM_KEY 721s | base: base-key@0xc63f95666bc0 (16-bytes, AES_KEY_GEN) 721s | params: 16-bytes@0xfffff84c1230 721s | key-offset: 0, key-size: 28 721s | EXTRACT_KEY_FROM_KEY: 721s | target: EXTRACT_KEY_FROM_KEY 721s | key_size: 28-bytes 721s | base: base-key@0xc63f95668510 (44-bytes, EXTRACT_KEY_FROM_KEY) 721s | operation: FLAGS_ONLY 721s | params: 8-bytes@0xfffff84c11d8 721s | PRF symkey interface PRF HMAC_MD5 update symkey message-key@0xc63f9566aa20 (size 28) 721s | PRF symkey interface: symkey message-key@0xc63f9566aa20 (28-bytes, EXTRACT_KEY_FROM_KEY) 721s | nss hmac digest hack extracting all 28 bytes of key@0xc63f9566aa20 721s | nss hmac digest hack: symkey-key@0xc63f9566aa20 (28-bytes, EXTRACT_KEY_FROM_KEY) 721s | sizeof bytes 32 721s | wrapper: (SECItemType)41: 9c c6 8a 1f 64 36 a2 b7 b6 b9 e8 7f 30 5a eb 2b 6d 69 8b 6e f8 24 8f bd bc b9 c6 c9 80 72 98 b2 721s | nss hmac digest hack extracted len 32 bytes at 0xc63f95671590 721s | unwrapped: 721s | 77 68 61 74 20 64 6f 20 79 61 20 77 61 6e 74 20 what do ya want 721s | 66 6f 72 20 6e 6f 74 68 69 6e 67 3f 00 00 00 00 for nothing?.... 721s | CONCATENATE_DATA_AND_BASE: 721s | target: EXTRACT_KEY_FROM_KEY 721s | base: base-key@0xc63f95666bc0 (16-bytes, AES_KEY_GEN) 721s | params: 16-bytes@0xfffff84c11c0 721s | key-offset: 0, key-size: 16 721s | EXTRACT_KEY_FROM_KEY: 721s | target: EXTRACT_KEY_FROM_KEY 721s | key_size: 16-bytes 721s | base: base-key@0xc63f95668510 (32-bytes, EXTRACT_KEY_FROM_KEY) 721s | operation: FLAGS_ONLY 721s | params: 8-bytes@0xfffff84c1168 721s | PRF symkey interface PRF HMAC_MD5 final-key@0xc63f95669c00 (size 16) 721s | PRF symkey interface: key-key@0xc63f95669c00 (16-bytes, EXTRACT_KEY_FROM_KEY) 721s | output: symkey-key@0xc63f95669c00 (16-bytes, EXTRACT_KEY_FROM_KEY) 721s | RFC 2104: MD5_HMAC test 2 extracting all 16 bytes of key@0xc63f95669c00 721s | RFC 2104: MD5_HMAC test 2: symkey-key@0xc63f95669c00 (16-bytes, EXTRACT_KEY_FROM_KEY) 721s | sizeof bytes 16 721s | wrapper: siBuffer: 47 e1 23 0c a9 bc c2 8e 0f 34 98 bb 8e 99 f0 59 721s | RFC 2104: MD5_HMAC test 2 extracted len 16 bytes at 0xc63f9566a250 721s | unwrapped: 721s | 75 0c 78 3e 6a b0 b5 03 ea a8 6e 31 0a 5d b7 38 u.x>j.....n1.].8 721s | verify_bytes() RFC 2104: MD5_HMAC test 2: symkey: ok 721s ipsec algparse: RFC 2104: MD5_HMAC test 3 721s | decode_to_chunk() test_prf_vector: input "0xAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAA" 721s | decode_to_chunk() output: 721s | aa aa aa aa aa aa aa aa aa aa aa aa aa aa aa aa ................ 721s | decode_to_chunk() test_prf_vector: input "0xDDDDDDDDDDDDDDDDDDDDDDDDDDDDDDDDDDDDDDDDDDDDDDDDDDDDDDDDDDDDDDDDDDDDDDDDDDDDDDDDDDDDDDDDDDDDDDDDDDDD" 721s | decode_to_chunk() output: 721s | dd dd dd dd dd dd dd dd dd dd dd dd dd dd dd dd ................ 721s | dd dd dd dd dd dd dd dd dd dd dd dd dd dd dd dd ................ 721s | dd dd dd dd dd dd dd dd dd dd dd dd dd dd dd dd ................ 721s | dd dd .. 721s | decode_to_chunk() test_prf_vector: input "0x56be34521d144c88dbb8c733f0e8b3f6" 721s | decode_to_chunk() output: 721s | 56 be 34 52 1d 14 4c 88 db b8 c7 33 f0 e8 b3 f6 V.4R..L....3.... 721s | PRF chunk interface PRF HMAC_MD5 init key hunk 0xc63f9566a010 (length 16) 721s | aa aa aa aa aa aa aa aa aa aa aa aa aa aa aa aa ................ 721s | CONCATENATE_DATA_AND_BASE: 721s | target: EXTRACT_KEY_FROM_KEY 721s | base: base-key@0xc63f95666bc0 (16-bytes, AES_KEY_GEN) 721s | params: 16-bytes@0xfffff84c1180 721s | key-offset: 0, key-size: 16 721s | EXTRACT_KEY_FROM_KEY: 721s | target: MD5_HMAC 721s | flags: SIGN 721s | key_size: 16-bytes 721s | base: base-key@0xc63f9566ad90 (32-bytes, EXTRACT_KEY_FROM_KEY) 721s | operation: FLAGS_ONLY 721s | params: 8-bytes@0xfffff84c1188 721s | PRF chunk interface prf: created HMAC_MD5 context 0xc63f95669ea0 from key-key@0xc63f95669c00 721s | PRF chunk interface prf: begin HMAC_MD5 with context 0xc63f95669ea0 from key-key@0xc63f95669c00 721s | PRF chunk interface PRF HMAC_MD5 0xc63f95666b90 721s | PRF chunk interface PRF HMAC_MD5 update message (0xc63f95669bc0 length 50) 721s | dd dd dd dd dd dd dd dd dd dd dd dd dd dd dd dd ................ 721s | dd dd dd dd dd dd dd dd dd dd dd dd dd dd dd dd ................ 721s | dd dd dd dd dd dd dd dd dd dd dd dd dd dd dd dd ................ 721s | dd dd .. 721s | PRF chunk interface PRF HMAC_MD5 final length 16 721s | 56 be 34 52 1d 14 4c 88 db b8 c7 33 f0 e8 b3 f6 V.4R..L....3.... 721s | chunk output 721s | 56 be 34 52 1d 14 4c 88 db b8 c7 33 f0 e8 b3 f6 V.4R..L....3.... 721s | verify_bytes() RFC 2104: MD5_HMAC test 3: prf OUT: ok 721s | CONCATENATE_DATA_AND_BASE: 721s | target: EXTRACT_KEY_FROM_KEY 721s | base: base-key@0xc63f95666bc0 (16-bytes, AES_KEY_GEN) 721s | params: 16-bytes@0xfffff84c1230 721s | key-offset: 0, key-size: 16 721s | EXTRACT_KEY_FROM_KEY: 721s | target: EXTRACT_KEY_FROM_KEY 721s | key_size: 16-bytes 721s | base: base-key@0xc63f9566ad90 (32-bytes, EXTRACT_KEY_FROM_KEY) 721s | operation: FLAGS_ONLY 721s | params: 8-bytes@0xfffff84c11d8 721s | PRF symkey interface PRF HMAC_MD5 init key symkey-key@0xc63f95669c00 (size 16) 721s | PRF symkey interface: key symkey-key@0xc63f95669c00 (16-bytes, EXTRACT_KEY_FROM_KEY) 721s | key-offset: 0, key-size: 16 721s | EXTRACT_KEY_FROM_KEY: 721s | target: MD5_HMAC 721s | flags: SIGN 721s | key_size: 16-bytes 721s | base: base-key@0xc63f95669c00 (16-bytes, EXTRACT_KEY_FROM_KEY) 721s | operation: FLAGS_ONLY 721s | params: 8-bytes@0xfffff84c11a8 721s | PRF symkey interface prf: created HMAC_MD5 context 0xc63f95669ea0 from key symkey-key@0xc63f9566ad90 721s | PRF symkey interface prf: begin HMAC_MD5 with context 0xc63f95669ea0 from key symkey-key@0xc63f9566ad90 721s | PRF symkey interface PRF HMAC_MD5 0xc63f9566a5f0 721s | CONCATENATE_DATA_AND_BASE: 721s | target: EXTRACT_KEY_FROM_KEY 721s | base: base-key@0xc63f95666bc0 (16-bytes, AES_KEY_GEN) 721s | params: 16-bytes@0xfffff84c1230 721s | key-offset: 0, key-size: 50 721s | EXTRACT_KEY_FROM_KEY: 721s | target: EXTRACT_KEY_FROM_KEY 721s | key_size: 50-bytes 721s | base: base-key@0xc63f95668510 (66-bytes, EXTRACT_KEY_FROM_KEY) 721s | operation: FLAGS_ONLY 721s | params: 8-bytes@0xfffff84c11d8 721s | PRF symkey interface PRF HMAC_MD5 update symkey message-key@0xc63f9566aa20 (size 50) 721s | PRF symkey interface: symkey message-key@0xc63f9566aa20 (50-bytes, EXTRACT_KEY_FROM_KEY) 721s | nss hmac digest hack extracting all 50 bytes of key@0xc63f9566aa20 721s | nss hmac digest hack: symkey-key@0xc63f9566aa20 (50-bytes, EXTRACT_KEY_FROM_KEY) 721s | sizeof bytes 64 721s | wrapper: (SECItemType)41: 94 3f ca 06 c6 03 0f 74 a5 d2 2a 65 77 2d 31 80 94 3f ca 06 c6 03 0f 74 a5 d2 2a 65 77 2d 31 80 94 3f ca 06 c6 03 0f 74 a5 d2 2a 65 77 2d 31 80 66 ca 7d d8 6f 12 66 62 ed 25 9a 8e 53 8b 42 6f 721s | nss hmac digest hack extracted len 64 bytes at 0xc63f9566a6b0 721s | unwrapped: 721s | dd dd dd dd dd dd dd dd dd dd dd dd dd dd dd dd ................ 721s | dd dd dd dd dd dd dd dd dd dd dd dd dd dd dd dd ................ 721s | dd dd dd dd dd dd dd dd dd dd dd dd dd dd dd dd ................ 721s | dd dd 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................ 721s | CONCATENATE_DATA_AND_BASE: 721s | target: EXTRACT_KEY_FROM_KEY 721s | base: base-key@0xc63f95666bc0 (16-bytes, AES_KEY_GEN) 721s | params: 16-bytes@0xfffff84c11c0 721s | key-offset: 0, key-size: 16 721s | EXTRACT_KEY_FROM_KEY: 721s | target: EXTRACT_KEY_FROM_KEY 721s | key_size: 16-bytes 721s | base: base-key@0xc63f95668510 (32-bytes, EXTRACT_KEY_FROM_KEY) 721s | operation: FLAGS_ONLY 721s | params: 8-bytes@0xfffff84c1168 721s | PRF symkey interface PRF HMAC_MD5 final-key@0xc63f9566ad90 (size 16) 721s | PRF symkey interface: key-key@0xc63f9566ad90 (16-bytes, EXTRACT_KEY_FROM_KEY) 721s | output: symkey-key@0xc63f9566ad90 (16-bytes, EXTRACT_KEY_FROM_KEY) 721s | RFC 2104: MD5_HMAC test 3 extracting all 16 bytes of key@0xc63f9566ad90 721s | RFC 2104: MD5_HMAC test 3: symkey-key@0xc63f9566ad90 (16-bytes, EXTRACT_KEY_FROM_KEY) 721s | sizeof bytes 16 721s | wrapper: siBuffer: 65 3f 9f 69 9a 82 f7 74 84 3f 80 08 e1 aa 74 88 721s | RFC 2104: MD5_HMAC test 3 extracted len 16 bytes at 0xc63f95666a80 721s | unwrapped: 721s | 56 be 34 52 1d 14 4c 88 db b8 c7 33 f0 e8 b3 f6 V.4R..L....3.... 721s | verify_bytes() RFC 2104: MD5_HMAC test 3: symkey: ok 721s ipsec algparse: testing HMAC_SHA1: 721s ipsec algparse: CAVP: IKEv2 key derivation with HMAC-SHA1 721s | decode_to_chunk() test_kdf_vector: input "0x32b50d5f4a3763f3" 721s | decode_to_chunk() output: 721s | 32 b5 0d 5f 4a 37 63 f3 2.._J7c. 721s | decode_to_chunk() test_kdf_vector: input "0x9206a04b26564cb1" 721s | decode_to_chunk() output: 721s | 92 06 a0 4b 26 56 4c b1 ...K&VL. 721s | decode_to_chunk() test_kdf_vector: input "0x34c9e7c188868785" 721s | decode_to_chunk() output: 721s | 34 c9 e7 c1 88 86 87 85 4....... 721s | decode_to_chunk() test_kdf_vector: input "0x3ff77d760d2b2199" 721s | decode_to_chunk() output: 721s | 3f f7 7d 76 0d 2b 21 99 ?.}v.+!. 721s | decode_to_chunk() test_kdf_vector: input "0x4b2c1f971981a8ad8d0abeafabf38cf75fc8349c148142465ed9c8b516b8be52" 721s | decode_to_chunk() output: 721s | 4b 2c 1f 97 19 81 a8 ad 8d 0a be af ab f3 8c f7 K,.............. 721s | 5f c8 34 9c 14 81 42 46 5e d9 c8 b5 16 b8 be 52 _.4...BF^......R 721s | decode_to_chunk() test_kdf_vector: input "0x863f3c9d06efd39d2b907b97f8699e5dd5251ef64a2a176f36ee40c87d4f9330" 721s | decode_to_chunk() output: 721s | 86 3f 3c 9d 06 ef d3 9d 2b 90 7b 97 f8 69 9e 5d .?<.....+.{..i.] 721s | d5 25 1e f6 4a 2a 17 6f 36 ee 40 c8 7d 4f 93 30 .%..J*.o6.@.}O.0 721s | decode_to_chunk() test_kdf_vector: input "0xa9a7b222b59f8f48645f28a1db5b5f5d7479cba7" 721s | decode_to_chunk() output: 721s | a9 a7 b2 22 b5 9f 8f 48 64 5f 28 a1 db 5b 5f 5d ..."...Hd_(..[_] 721s | 74 79 cb a7 ty.. 721s | decode_to_chunk() test_kdf_vector: input "0x63e81194946ebd05df7df5ebf5d8750056bf1f1d" 721s | decode_to_chunk() output: 721s | 63 e8 11 94 94 6e bd 05 df 7d f5 eb f5 d8 75 00 c....n...}....u. 721s | 56 bf 1f 1d V... 721s | decode_to_chunk() test_kdf_vector: input "0xa14293677cc80ff8f9cc0eee30d895da9d8f405666e30ef0dfcb63c634a46002a2a63080e514a062768b76606f9fa5e992204fc5a670bde3f10d6b027113936a5c55b648a194ae587b0088d52204b702c979fa280870d2ed41efa9c549fd11198af1670b143d384bd275c5f594cf266b05ebadca855e4249520a441a81157435a7a56cc4" 721s | decode_to_chunk() output: 721s | a1 42 93 67 7c c8 0f f8 f9 cc 0e ee 30 d8 95 da .B.g|.......0... 721s | 9d 8f 40 56 66 e3 0e f0 df cb 63 c6 34 a4 60 02 ..@Vf.....c.4.`. 721s | a2 a6 30 80 e5 14 a0 62 76 8b 76 60 6f 9f a5 e9 ..0....bv.v`o... 721s | 92 20 4f c5 a6 70 bd e3 f1 0d 6b 02 71 13 93 6a . O..p....k.q..j 721s | 5c 55 b6 48 a1 94 ae 58 7b 00 88 d5 22 04 b7 02 \U.H...X{..."... 721s | c9 79 fa 28 08 70 d2 ed 41 ef a9 c5 49 fd 11 19 .y.(.p..A...I... 721s | 8a f1 67 0b 14 3d 38 4b d2 75 c5 f5 94 cf 26 6b ..g..=8K.u....&k 721s | 05 eb ad ca 85 5e 42 49 52 0a 44 1a 81 15 74 35 .....^BIR.D...t5 721s | a7 a5 6c c4 ..l. 721s | CONCATENATE_DATA_AND_BASE: 721s | target: EXTRACT_KEY_FROM_KEY 721s | base: base-key@0xc63f95666bc0 (16-bytes, AES_KEY_GEN) 721s | params: 16-bytes@0xfffff84c1230 721s | key-offset: 0, key-size: 32 721s | EXTRACT_KEY_FROM_KEY: 721s | target: EXTRACT_KEY_FROM_KEY 721s | key_size: 32-bytes 721s | base: base-key@0xc63f95669c00 (48-bytes, EXTRACT_KEY_FROM_KEY) 721s | operation: FLAGS_ONLY 721s | params: 8-bytes@0xfffff84c11d8 721s | NSS_IKE_PRF_DERIVE: 721s | target: NSS_IKE_PRF_PLUS_DERIVE 721s | base: base-key@0xc63f9566ad90 (32-bytes, EXTRACT_KEY_FROM_KEY) 721s | params: 56-bytes@0xfffff84c1240 721s | CAVP: IKEv2 key derivation with HMAC-SHA1 extracting all 20 bytes of key@0xc63f95669c00 721s | CAVP: IKEv2 key derivation with HMAC-SHA1: symkey-key@0xc63f95669c00 (20-bytes, NSS_IKE_PRF_PLUS_DERIVE) 721s | sizeof bytes 32 721s | wrapper: (SECItemType)1684156471: bc 7c 68 07 1c 43 dd 7c b8 db ce 07 8c fc 71 d4 f4 4d 6e 39 40 56 e6 b3 41 92 9c 71 38 7a 95 5c 721s | CAVP: IKEv2 key derivation with HMAC-SHA1 extracted len 32 bytes at 0xc63f9566a680 721s | unwrapped: 721s | a9 a7 b2 22 b5 9f 8f 48 64 5f 28 a1 db 5b 5f 5d ..."...Hd_(..[_] 721s | 74 79 cb a7 00 00 00 00 00 00 00 00 00 00 00 00 ty.............. 721s | verify_bytes() CAVP: IKEv2 key derivation with HMAC-SHA1: skeyseed: ok 721s | NSS_IKE_PRF_PLUS_DERIVE: 721s | target: EXTRACT_KEY_FROM_KEY 721s | key_size: 132-bytes 721s | base: base-key@0xc63f95669c00 (20-bytes, NSS_IKE_PRF_PLUS_DERIVE) 721s | params: 40-bytes@0xfffff84c1190 721s | CAVP: IKEv2 key derivation with HMAC-SHA1 extracting all 132 bytes of key@0xc63f9566aa20 721s | CAVP: IKEv2 key derivation with HMAC-SHA1: symkey-key@0xc63f9566aa20 (132-bytes, EXTRACT_KEY_FROM_KEY) 721s | sizeof bytes 144 721s | wrapper: (SECItemType)1684156471: 72 53 10 6d 1e 9b ac 58 09 22 71 2e 42 28 af 97 30 60 fd 3c 0c 46 ba e7 51 9f 78 f5 00 36 36 dc 35 e1 7b 58 e2 c0 24 b8 be a7 a0 d7 a3 de f0 9f 5c e2 4e 28 45 e8 3b 18 67 c8 5a c7 9f df 8b bc d1 5f df 5c 3c 84 90 1a e9 22 97 48 90 7b 51 60 32 e5 57 ea e7 d3 a6 7d 01 54 81 59 d0 1e 0a 3d 1d fc c1 9e 81 f8 34 58 38 7d b3 dc 67 5e fc 3e f0 8a b6 af ad d3 63 6c b8 c8 5e 84 7d 1f a1 dc ae 60 cb 92 b0 21 28 39 ad f9 80 00 04 de 05 fa 721s | CAVP: IKEv2 key derivation with HMAC-SHA1 extracted len 144 bytes at 0xc63f95669a30 721s | unwrapped: 721s | a1 42 93 67 7c c8 0f f8 f9 cc 0e ee 30 d8 95 da .B.g|.......0... 721s | 9d 8f 40 56 66 e3 0e f0 df cb 63 c6 34 a4 60 02 ..@Vf.....c.4.`. 721s | a2 a6 30 80 e5 14 a0 62 76 8b 76 60 6f 9f a5 e9 ..0....bv.v`o... 721s | 92 20 4f c5 a6 70 bd e3 f1 0d 6b 02 71 13 93 6a . O..p....k.q..j 721s | 5c 55 b6 48 a1 94 ae 58 7b 00 88 d5 22 04 b7 02 \U.H...X{..."... 721s | c9 79 fa 28 08 70 d2 ed 41 ef a9 c5 49 fd 11 19 .y.(.p..A...I... 721s | 8a f1 67 0b 14 3d 38 4b d2 75 c5 f5 94 cf 26 6b ..g..=8K.u....&k 721s | 05 eb ad ca 85 5e 42 49 52 0a 44 1a 81 15 74 35 .....^BIR.D...t5 721s | a7 a5 6c c4 00 00 00 00 00 00 00 00 00 00 00 00 ..l............. 721s | verify_bytes() CAVP: IKEv2 key derivation with HMAC-SHA1: DKM: ok 721s | key-offset: 0, key-size: 20 721s | EXTRACT_KEY_FROM_KEY: 721s | target: EXTRACT_KEY_FROM_KEY 721s | key_size: 20-bytes 721s | base: base-key@0xc63f9566aa20 (132-bytes, EXTRACT_KEY_FROM_KEY) 721s | operation: FLAGS_ONLY 721s | params: 8-bytes@0xfffff84c1258 721s | CONCATENATE_DATA_AND_BASE: 721s | target: EXTRACT_KEY_FROM_KEY 721s | base: base-key@0xc63f95666bc0 (16-bytes, AES_KEY_GEN) 721s | params: 16-bytes@0xfffff84c1230 721s | key-offset: 0, key-size: 32 721s | EXTRACT_KEY_FROM_KEY: 721s | target: EXTRACT_KEY_FROM_KEY 721s | key_size: 32-bytes 721s | base: base-key@0xc63f9566a440 (48-bytes, EXTRACT_KEY_FROM_KEY) 721s | operation: FLAGS_ONLY 721s | params: 8-bytes@0xfffff84c11d8 721s | NSS_IKE_PRF_DERIVE: 721s | target: NSS_IKE_PRF_PLUS_DERIVE 721s | base: base-key@0xc63f95668510 (20-bytes, EXTRACT_KEY_FROM_KEY) 721s | params: 56-bytes@0xfffff84c1230 721s | CAVP: IKEv2 key derivation with HMAC-SHA1 extracting all 20 bytes of key@0xc63f9566a440 721s | CAVP: IKEv2 key derivation with HMAC-SHA1: symkey-key@0xc63f9566a440 (20-bytes, NSS_IKE_PRF_PLUS_DERIVE) 721s | sizeof bytes 32 721s | wrapper: (SECItemType)1936548210: f7 ad 78 c3 71 a9 42 fa dd 36 80 6d 09 41 0e b8 17 97 79 52 d6 52 39 f8 14 61 d9 08 83 e4 81 a2 721s | CAVP: IKEv2 key derivation with HMAC-SHA1 extracted len 32 bytes at 0xc63f95666b90 721s | unwrapped: 721s | 63 e8 11 94 94 6e bd 05 df 7d f5 eb f5 d8 75 00 c....n...}....u. 721s | 56 bf 1f 1d 00 00 00 00 00 00 00 00 00 00 00 00 V............... 721s | verify_bytes() CAVP: IKEv2 key derivation with HMAC-SHA1: skeyseed_rekey: ok 721s ipsec algparse: leak detective found no leaks 721s /usr/libexec/ipsec/pluto: adjusting nssdir to /tmp/tmp.kugzlPaLIK 721s /usr/libexec/ipsec/pluto: selftest: skipping lock 721s /usr/libexec/ipsec/pluto: selftest: skipping control socket 721s /usr/libexec/ipsec/pluto: selftest: skipping fork 721s Starting Pluto (Libreswan Version 5.2 IKEv2 IKEv1 XFRM XFRMI esp-hw-offload FORK PTHREAD_SETSCHEDPRIO NSS (IPsec profile) (NSS-KDF) DNSSEC SYSTEMD_WATCHDOG LABELED_IPSEC (SELINUX) LIBCAP_NG LINUX_AUDIT AUTH_PAM NETWORKMANAGER CURL(non-NSS) LDAP(non-NSS) NFTABLES CAT NFLOG) pid:1605 721s operating system: Linux 6.18.0 [Linux 6.18.0-9-generic #9-Ubuntu SMP PREEMPT_DYNAMIC Mon Jan 12 16:41:39 UTC 2026 aarch64] 721s core dump dir: /run/pluto 721s secrets file: /etc/ipsec.secrets 721s Initializing NSS using read-only database "sql:/tmp/tmp.kugzlPaLIK" 721s FIPS Mode: OFF 721s NSS crypto library initialized 721s FIPS mode disabled for pluto daemon 721s FIPS HMAC integrity support [not required] 721s libcap-ng capng_apply failed to apply changes, err=-5. see: man capng_apply 721s libcap-ng support [enabled] 721s Linux audit support [enabled] 721s leak-detective disabled 721s NSS crypto [enabled] 721s XAUTH PAM support [enabled] 721s initializing libevent in pthreads mode: headers: 2.1.12-stable (2010c00); library: 2.1.12-stable (2010c00) 721s NAT-Traversal: keep-alive period 20s 721s ERROR: xfrmi is not supported, failed to create ipsec-interface ipsec1 bound to lo 721s ipsec-interface is not working: xfrmi is not supported 721s IPsec Interface [disabled] 721s refreshed session resume keys, issuing key 1 721s Encryption algorithms: 721s AES_CCM_16 {256,192,*128} IKEv1: ESP IKEv2: ESP FIPS aes_ccm, aes_ccm_c 721s AES_CCM_12 {256,192,*128} IKEv1: ESP IKEv2: ESP FIPS aes_ccm_b 721s AES_CCM_8 {256,192,*128} IKEv1: ESP IKEv2: ESP FIPS aes_ccm_a 721s 3DES_CBC [*192] IKEv1: IKE ESP IKEv2: IKE ESP FIPS NSS(CBC) 3des 721s CAMELLIA_CTR {256,192,*128} IKEv1: ESP IKEv2: ESP 721s CAMELLIA_CBC {256,192,*128} IKEv1: IKE ESP IKEv2: IKE ESP NSS(CBC) camellia 721s AES_GCM_16 {256,192,*128} IKEv1: ESP IKEv2: IKE ESP FIPS NSS(AEAD) aes_gcm, aes_gcm_c 721s AES_GCM_12 {256,192,*128} IKEv1: ESP IKEv2: IKE ESP FIPS NSS(AEAD) aes_gcm_b 721s AES_GCM_8 {256,192,*128} IKEv1: ESP IKEv2: IKE ESP FIPS NSS(AEAD) aes_gcm_a 721s AES_CTR {256,192,*128} IKEv1: IKE ESP IKEv2: IKE ESP FIPS NSS(CTR) aesctr 721s AES_CBC {256,192,*128} IKEv1: IKE ESP IKEv2: IKE ESP FIPS NSS(CBC) aes 721s NULL_AUTH_AES_GMAC {256,192,*128} IKEv1: ESP IKEv2: ESP FIPS aes_gmac 721s NULL [] IKEv1: ESP IKEv2: ESP NULL 721s CHACHA20_POLY1305 [*256] IKEv1: IKEv2: IKE ESP NSS(AEAD) chacha20poly1305 721s Hash algorithms: 721s MD5 IKEv1: IKE IKEv2: NSS 721s SHA1 IKEv1: IKE IKEv2: IKE FIPS NSS sha 721s SHA2_256 IKEv1: IKE IKEv2: IKE FIPS NSS sha2, sha256 721s SHA2_384 IKEv1: IKE IKEv2: IKE FIPS NSS sha384 721s SHA2_512 IKEv1: IKE IKEv2: IKE FIPS NSS sha512 721s IDENTITY IKEv1: IKEv2: FIPS 721s PRF algorithms: 721s HMAC_MD5 IKEv1: IKE IKEv2: IKE NSS md5 721s HMAC_SHA1 IKEv1: IKE IKEv2: IKE FIPS NSS sha, sha1 721s HMAC_SHA2_256 IKEv1: IKE IKEv2: IKE FIPS NSS sha2, sha256, sha2_256 721s HMAC_SHA2_384 IKEv1: IKE IKEv2: IKE FIPS NSS sha384, sha2_384 721s HMAC_SHA2_512 IKEv1: IKE IKEv2: IKE FIPS NSS sha512, sha2_512 721s AES_XCBC IKEv1: IKEv2: IKE native(XCBC) aes128_xcbc 721s Integrity algorithms: 721s HMAC_MD5_96 IKEv1: IKE ESP AH IKEv2: IKE ESP AH NSS md5, hmac_md5 721s HMAC_SHA1_96 IKEv1: IKE ESP AH IKEv2: IKE ESP AH FIPS NSS sha, sha1, sha1_96, hmac_sha1 721s HMAC_SHA2_512_256 IKEv1: IKE ESP AH IKEv2: IKE ESP AH FIPS NSS sha512, sha2_512, sha2_512_256, hmac_sha2_512 721s HMAC_SHA2_384_192 IKEv1: IKE ESP AH IKEv2: IKE ESP AH FIPS NSS sha384, sha2_384, sha2_384_192, hmac_sha2_384 721s HMAC_SHA2_256_128 IKEv1: IKE ESP AH IKEv2: IKE ESP AH FIPS NSS sha2, sha256, sha2_256, sha2_256_128, hmac_sha2_256 721s HMAC_SHA2_256_TRUNCBUG IKEv1: ESP AH IKEv2: AH 721s AES_XCBC_96 IKEv1: ESP AH IKEv2: IKE ESP AH native(XCBC) aes_xcbc, aes128_xcbc, aes128_xcbc_96 721s AES_CMAC_96 IKEv1: ESP AH IKEv2: ESP AH FIPS aes_cmac 721s NONE IKEv1: ESP IKEv2: IKE ESP FIPS null 721s DH algorithms: 721s NONE IKEv1: IKEv2: IKE ESP AH FIPS NSS(MODP) null, dh0 721s MODP1536 IKEv1: IKE ESP AH IKEv2: IKE ESP AH NSS(MODP) dh5 721s MODP2048 IKEv1: IKE ESP AH IKEv2: IKE ESP AH FIPS NSS(MODP) dh14 721s MODP3072 IKEv1: IKE ESP AH IKEv2: IKE ESP AH FIPS NSS(MODP) dh15 721s MODP4096 IKEv1: IKE ESP AH IKEv2: IKE ESP AH FIPS NSS(MODP) dh16 721s MODP6144 IKEv1: IKE ESP AH IKEv2: IKE ESP AH FIPS NSS(MODP) dh17 721s MODP8192 IKEv1: IKE ESP AH IKEv2: IKE ESP AH FIPS NSS(MODP) dh18 721s DH19 IKEv1: IKE IKEv2: IKE ESP AH FIPS NSS(ECP) ecp_256, ecp256 721s DH20 IKEv1: IKE IKEv2: IKE ESP AH FIPS NSS(ECP) ecp_384, ecp384 721s DH21 IKEv1: IKE IKEv2: IKE ESP AH FIPS NSS(ECP) ecp_521, ecp521 721s DH31 IKEv1: IKE IKEv2: IKE ESP AH NSS(ECP) curve25519 721s IPCOMP algorithms: 721s DEFLATE IKEv1: ESP AH IKEv2: ESP AH FIPS 721s LZS IKEv1: IKEv2: ESP AH FIPS 721s LZJH IKEv1: IKEv2: ESP AH FIPS 721s testing CAMELLIA_CBC: 721s Camellia: 16 bytes with 128-bit key 721s Camellia: 16 bytes with 128-bit key 721s Camellia: 16 bytes with 256-bit key 721s Camellia: 16 bytes with 256-bit key 721s testing AES_GCM_16: 721s empty string 721s one block 721s two blocks 721s two blocks with associated data 721s testing AES_CTR: 721s Encrypting 16 octets using AES-CTR with 128-bit key 721s Encrypting 32 octets using AES-CTR with 128-bit key 721s Encrypting 36 octets using AES-CTR with 128-bit key 721s Encrypting 16 octets using AES-CTR with 192-bit key 721s Encrypting 32 octets using AES-CTR with 192-bit key 721s Encrypting 36 octets using AES-CTR with 192-bit key 721s Encrypting 16 octets using AES-CTR with 256-bit key 721s Encrypting 32 octets using AES-CTR with 256-bit key 721s Encrypting 36 octets using AES-CTR with 256-bit key 721s testing AES_CBC: 721s Encrypting 16 bytes (1 block) using AES-CBC with 128-bit key 721s Encrypting 32 bytes (2 blocks) using AES-CBC with 128-bit key 721s Encrypting 48 bytes (3 blocks) using AES-CBC with 128-bit key 721s Encrypting 64 bytes (4 blocks) using AES-CBC with 128-bit key 721s testing AES_XCBC: 721s RFC 3566 Test Case 1: AES-XCBC-MAC-96 with 0-byte input 721s RFC 3566 Test Case 2: AES-XCBC-MAC-96 with 3-byte input 721s RFC 3566 Test Case 3: AES-XCBC-MAC-96 with 16-byte input 721s RFC 3566 Test Case 4: AES-XCBC-MAC-96 with 20-byte input 721s RFC 3566 Test Case 5: AES-XCBC-MAC-96 with 32-byte input 721s RFC 3566 Test Case 6: AES-XCBC-MAC-96 with 34-byte input 721s RFC 3566 Test Case 7: AES-XCBC-MAC-96 with 1000-byte input 721s RFC 4434 Test Case AES-XCBC-PRF-128 with 20-byte input (key length 16) 721s RFC 4434 Test Case AES-XCBC-PRF-128 with 20-byte input (key length 10) 721s RFC 4434 Test Case AES-XCBC-PRF-128 with 20-byte input (key length 18) 721s testing HMAC_MD5: 721s RFC 2104: MD5_HMAC test 1 721s RFC 2104: MD5_HMAC test 2 721s RFC 2104: MD5_HMAC test 3 721s testing HMAC_SHA1: 721s CAVP: IKEv2 key derivation with HMAC-SHA1 721s selftest: exiting pluto 721s autopkgtest [03:46:27]: test cryptocheck: -----------------------] 721s autopkgtest [03:46:27]: test cryptocheck: - - - - - - - - - - results - - - - - - - - - - 721s cryptocheck PASS 722s autopkgtest [03:46:28]: test cavp: preparing testbed 746s Creating nova instance adt-resolute-arm64-libreswan-20260205-033426-juju-7f2275-prod-proposed-migration-environment-2-a2accc43-5592-4bf2-a1f2-a279ee71bf3e from image adt/ubuntu-resolute-arm64-server-20260204.img (UUID f58d981d-b271-4157-b9b1-fd704695563c)... 796s autopkgtest [03:47:42]: testbed dpkg architecture: arm64 797s autopkgtest [03:47:43]: testbed apt version: 3.1.14 797s autopkgtest [03:47:43]: @@@@@@@@@@@@@@@@@@@@ test bed setup 797s autopkgtest [03:47:43]: testbed release detected to be: resolute 798s autopkgtest [03:47:44]: updating testbed package index (apt update) 799s Get:1 http://ftpmaster.internal/ubuntu resolute-proposed InRelease [124 kB] 799s Hit:2 http://ftpmaster.internal/ubuntu resolute InRelease 799s Hit:3 http://ftpmaster.internal/ubuntu resolute-updates InRelease 799s Hit:4 http://ftpmaster.internal/ubuntu resolute-security InRelease 799s Get:5 http://ftpmaster.internal/ubuntu resolute-proposed/multiverse Sources [35.4 kB] 799s Get:6 http://ftpmaster.internal/ubuntu resolute-proposed/universe Sources [1719 kB] 799s Get:7 http://ftpmaster.internal/ubuntu resolute-proposed/main Sources [227 kB] 799s Get:8 http://ftpmaster.internal/ubuntu resolute-proposed/restricted Sources [5260 B] 799s Get:9 http://ftpmaster.internal/ubuntu resolute-proposed/main arm64 Packages [265 kB] 799s Get:10 http://ftpmaster.internal/ubuntu resolute-proposed/main arm64 c-n-f Metadata [7328 B] 799s Get:11 http://ftpmaster.internal/ubuntu resolute-proposed/restricted arm64 Packages [52.9 kB] 799s Get:12 http://ftpmaster.internal/ubuntu resolute-proposed/restricted arm64 c-n-f Metadata [328 B] 799s Get:13 http://ftpmaster.internal/ubuntu resolute-proposed/universe arm64 Packages [1481 kB] 799s Get:14 http://ftpmaster.internal/ubuntu resolute-proposed/universe arm64 c-n-f Metadata [40.2 kB] 799s Get:15 http://ftpmaster.internal/ubuntu resolute-proposed/multiverse arm64 Packages [26.0 kB] 799s Get:16 http://ftpmaster.internal/ubuntu resolute-proposed/multiverse arm64 c-n-f Metadata [776 B] 803s Fetched 3984 kB in 1s (4118 kB/s) 803s Reading package lists... 805s Hit:1 http://ftpmaster.internal/ubuntu resolute-proposed InRelease 805s Hit:2 http://ftpmaster.internal/ubuntu resolute InRelease 805s Hit:3 http://ftpmaster.internal/ubuntu resolute-updates InRelease 805s Hit:4 http://ftpmaster.internal/ubuntu resolute-security InRelease 806s Reading package lists... 806s Reading package lists... 806s Building dependency tree... 806s Reading state information... 806s Calculating upgrade... 807s The following packages will be upgraded: 807s libc-bin libc-gconv-modules-extra libc6 locales pollinate python3-linkify-it 807s python3-referencing sed 807s 8 upgraded, 0 newly installed, 0 to remove and 0 not upgraded. 807s Need to get 8110 kB of archives. 807s After this operation, 0 B of additional disk space will be used. 807s Get:1 http://ftpmaster.internal/ubuntu resolute/main arm64 sed arm64 4.9-2build3 [193 kB] 807s Get:2 http://ftpmaster.internal/ubuntu resolute-proposed/main arm64 libc-gconv-modules-extra arm64 2.42-2ubuntu5 [1413 kB] 807s Get:3 http://ftpmaster.internal/ubuntu resolute-proposed/main arm64 libc6 arm64 2.42-2ubuntu5 [1594 kB] 807s Get:4 http://ftpmaster.internal/ubuntu resolute-proposed/main arm64 libc-bin arm64 2.42-2ubuntu5 [599 kB] 807s Get:5 http://ftpmaster.internal/ubuntu resolute-proposed/main arm64 locales all 2.42-2ubuntu5 [4255 kB] 808s Get:6 http://ftpmaster.internal/ubuntu resolute/main arm64 python3-linkify-it all 2.0.3-1ubuntu3 [19.4 kB] 808s Get:7 http://ftpmaster.internal/ubuntu resolute/main arm64 pollinate all 4.33-4ubuntu5 [14.0 kB] 808s Get:8 http://ftpmaster.internal/ubuntu resolute/main arm64 python3-referencing all 0.36.2-1ubuntu2 [22.2 kB] 808s dpkg-preconfigure: unable to re-open stdin: No such file or directory 808s Fetched 8110 kB in 1s (10.9 MB/s) 808s (Reading database ... (Reading database ... 5% (Reading database ... 10% (Reading database ... 15% (Reading database ... 20% (Reading database ... 25% (Reading database ... 30% (Reading database ... 35% (Reading database ... 40% (Reading database ... 45% (Reading database ... 50% (Reading database ... 55% (Reading database ... 60% (Reading database ... 65% (Reading database ... 70% (Reading database ... 75% (Reading database ... 80% (Reading database ... 85% (Reading database ... 90% (Reading database ... 95% (Reading database ... 100% (Reading database ... 89360 files and directories currently installed.) 808s Preparing to unpack .../sed_4.9-2build3_arm64.deb ... 808s Unpacking sed (4.9-2build3) over (4.9-2build2) ... 808s Setting up sed (4.9-2build3) ... 808s (Reading database ... (Reading database ... 5% (Reading database ... 10% (Reading database ... 15% (Reading database ... 20% (Reading database ... 25% (Reading database ... 30% (Reading database ... 35% (Reading database ... 40% (Reading database ... 45% (Reading database ... 50% (Reading database ... 55% (Reading database ... 60% (Reading database ... 65% (Reading database ... 70% (Reading database ... 75% (Reading database ... 80% (Reading database ... 85% (Reading database ... 90% (Reading database ... 95% (Reading database ... 100% (Reading database ... 89360 files and directories currently installed.) 808s Preparing to unpack .../libc-gconv-modules-extra_2.42-2ubuntu5_arm64.deb ... 808s Unpacking libc-gconv-modules-extra:arm64 (2.42-2ubuntu5) over (2.42-2ubuntu4) ... 808s Setting up libc-gconv-modules-extra:arm64 (2.42-2ubuntu5) ... 808s (Reading database ... (Reading database ... 5% (Reading database ... 10% (Reading database ... 15% (Reading database ... 20% (Reading database ... 25% (Reading database ... 30% (Reading database ... 35% (Reading database ... 40% (Reading database ... 45% (Reading database ... 50% (Reading database ... 55% (Reading database ... 60% (Reading database ... 65% (Reading database ... 70% (Reading database ... 75% (Reading database ... 80% (Reading database ... 85% (Reading database ... 90% (Reading database ... 95% (Reading database ... 100% (Reading database ... 89360 files and directories currently installed.) 808s Preparing to unpack .../libc6_2.42-2ubuntu5_arm64.deb ... 809s Unpacking libc6:arm64 (2.42-2ubuntu5) over (2.42-2ubuntu4) ... 809s Setting up libc6:arm64 (2.42-2ubuntu5) ... 809s (Reading database ... (Reading database ... 5% (Reading database ... 10% (Reading database ... 15% (Reading database ... 20% (Reading database ... 25% (Reading database ... 30% (Reading database ... 35% (Reading database ... 40% (Reading database ... 45% (Reading database ... 50% (Reading database ... 55% (Reading database ... 60% (Reading database ... 65% (Reading database ... 70% (Reading database ... 75% (Reading database ... 80% (Reading database ... 85% (Reading database ... 90% (Reading database ... 95% (Reading database ... 100% (Reading database ... 89360 files and directories currently installed.) 809s Preparing to unpack .../libc-bin_2.42-2ubuntu5_arm64.deb ... 809s Unpacking libc-bin (2.42-2ubuntu5) over (2.42-2ubuntu4) ... 809s Setting up libc-bin (2.42-2ubuntu5) ... 809s (Reading database ... (Reading database ... 5% (Reading database ... 10% (Reading database ... 15% (Reading database ... 20% (Reading database ... 25% (Reading database ... 30% (Reading database ... 35% (Reading database ... 40% (Reading database ... 45% (Reading database ... 50% (Reading database ... 55% (Reading database ... 60% (Reading database ... 65% (Reading database ... 70% (Reading database ... 75% (Reading database ... 80% (Reading database ... 85% (Reading database ... 90% (Reading database ... 95% (Reading database ... 100% (Reading database ... 89360 files and directories currently installed.) 809s Preparing to unpack .../locales_2.42-2ubuntu5_all.deb ... 809s Unpacking locales (2.42-2ubuntu5) over (2.42-2ubuntu4) ... 809s Preparing to unpack .../python3-linkify-it_2.0.3-1ubuntu3_all.deb ... 810s Unpacking python3-linkify-it (2.0.3-1ubuntu3) over (2.0.3-1ubuntu2) ... 810s Preparing to unpack .../pollinate_4.33-4ubuntu5_all.deb ... 810s Unpacking pollinate (4.33-4ubuntu5) over (4.33-4ubuntu4) ... 810s Preparing to unpack .../python3-referencing_0.36.2-1ubuntu2_all.deb ... 810s Unpacking python3-referencing (0.36.2-1ubuntu2) over (0.36.2-1ubuntu1) ... 810s Setting up locales (2.42-2ubuntu5) ... 810s Generating locales (this might take a while)... 812s en_US.UTF-8... done 812s Generation complete. 812s Setting up pollinate (4.33-4ubuntu5) ... 823s Setting up python3-linkify-it (2.0.3-1ubuntu3) ... 823s Setting up python3-referencing (0.36.2-1ubuntu2) ... 823s Processing triggers for man-db (2.13.1-1) ... 824s Processing triggers for install-info (7.2-5) ... 824s Processing triggers for systemd (259-1ubuntu3) ... 825s autopkgtest [03:48:11]: upgrading testbed (apt dist-upgrade and autopurge) 826s Reading package lists... 826s Building dependency tree... 826s Reading state information... 826s Calculating upgrade... 826s 0 upgraded, 0 newly installed, 0 to remove and 0 not upgraded. 827s Reading package lists... 827s Building dependency tree... 827s Reading state information... 827s Solving dependencies... 828s 0 upgraded, 0 newly installed, 0 to remove and 0 not upgraded. 828s autopkgtest [03:48:14]: rebooting testbed after setup commands that affected boot 870s Reading package lists... 870s Building dependency tree... 870s Reading state information... 870s Solving dependencies... 871s The following NEW packages will be installed: 871s dns-root-data libevent-2.1-7t64 libevent-pthreads-2.1-7t64 libldns3t64 871s libnss3-tools libreswan libunbound8 871s 0 upgraded, 7 newly installed, 0 to remove and 0 not upgraded. 871s Need to get 2870 kB of archives. 871s After this operation, 13.6 MB of additional disk space will be used. 871s Get:1 http://ftpmaster.internal/ubuntu resolute/main arm64 dns-root-data all 2025080400build1 [6022 B] 871s Get:2 http://ftpmaster.internal/ubuntu resolute/main arm64 libnss3-tools arm64 2:3.120-1 [604 kB] 871s Get:3 http://ftpmaster.internal/ubuntu resolute/main arm64 libevent-pthreads-2.1-7t64 arm64 2.1.12-stable-10build1 [8272 B] 871s Get:4 http://ftpmaster.internal/ubuntu resolute/universe arm64 libldns3t64 arm64 1.8.4-2build1 [164 kB] 871s Get:5 http://ftpmaster.internal/ubuntu resolute/main arm64 libevent-2.1-7t64 arm64 2.1.12-stable-10build1 [152 kB] 871s Get:6 http://ftpmaster.internal/ubuntu resolute/main arm64 libunbound8 arm64 1.24.2-1ubuntu1 [436 kB] 871s Get:7 http://ftpmaster.internal/ubuntu resolute/universe arm64 libreswan arm64 5.2-2.2ubuntu1 [1500 kB] 871s Fetched 2870 kB in 0s (12.2 MB/s) 871s Selecting previously unselected package dns-root-data. 871s (Reading database ... (Reading database ... 5% (Reading database ... 10% (Reading database ... 15% (Reading database ... 20% (Reading database ... 25% (Reading database ... 30% (Reading database ... 35% (Reading database ... 40% (Reading database ... 45% (Reading database ... 50% (Reading database ... 55% (Reading database ... 60% (Reading database ... 65% (Reading database ... 70% (Reading database ... 75% (Reading database ... 80% (Reading database ... 85% (Reading database ... 90% (Reading database ... 95% (Reading database ... 100% (Reading database ... 89360 files and directories currently installed.) 871s Preparing to unpack .../0-dns-root-data_2025080400build1_all.deb ... 871s Unpacking dns-root-data (2025080400build1) ... 871s Selecting previously unselected package libnss3-tools. 871s Preparing to unpack .../1-libnss3-tools_2%3a3.120-1_arm64.deb ... 871s Unpacking libnss3-tools (2:3.120-1) ... 871s Selecting previously unselected package libevent-pthreads-2.1-7t64:arm64. 871s Preparing to unpack .../2-libevent-pthreads-2.1-7t64_2.1.12-stable-10build1_arm64.deb ... 871s Unpacking libevent-pthreads-2.1-7t64:arm64 (2.1.12-stable-10build1) ... 871s Selecting previously unselected package libldns3t64:arm64. 871s Preparing to unpack .../3-libldns3t64_1.8.4-2build1_arm64.deb ... 871s Unpacking libldns3t64:arm64 (1.8.4-2build1) ... 871s Selecting previously unselected package libevent-2.1-7t64:arm64. 871s Preparing to unpack .../4-libevent-2.1-7t64_2.1.12-stable-10build1_arm64.deb ... 871s Unpacking libevent-2.1-7t64:arm64 (2.1.12-stable-10build1) ... 871s Selecting previously unselected package libunbound8:arm64. 872s Preparing to unpack .../5-libunbound8_1.24.2-1ubuntu1_arm64.deb ... 872s Unpacking libunbound8:arm64 (1.24.2-1ubuntu1) ... 872s Selecting previously unselected package libreswan. 872s Preparing to unpack .../6-libreswan_5.2-2.2ubuntu1_arm64.deb ... 872s Unpacking libreswan (5.2-2.2ubuntu1) ... 872s Setting up libldns3t64:arm64 (1.8.4-2build1) ... 872s Setting up libevent-pthreads-2.1-7t64:arm64 (2.1.12-stable-10build1) ... 872s Setting up libevent-2.1-7t64:arm64 (2.1.12-stable-10build1) ... 872s Setting up dns-root-data (2025080400build1) ... 872s Setting up libunbound8:arm64 (1.24.2-1ubuntu1) ... 872s Setting up libnss3-tools (2:3.120-1) ... 872s Setting up libreswan (5.2-2.2ubuntu1) ... 872s ipsec.service is a disabled or a static unit, not starting it. 872s Processing triggers for man-db (2.13.1-1) ... 873s Processing triggers for libc-bin (2.42-2ubuntu5) ... 1026s autopkgtest [03:51:32]: test cavp: [----------------------- 1026s Testing installed CAVP binary: /usr/libexec/ipsec/cavp 1028s test: IKE v2 1028s Reading from ikev2.fax 1031s test: IKE v1 Digital Signature Authentication 1031s Reading from ikev1_dsa.fax 1033s test: IKE v1 Pre-shared Key Authentication 1033s Reading from ikev1_psk.fax 1035s /tmp/autopkgtest.Mw2cKY/build.EmT/src 1035s autopkgtest [03:51:41]: test cavp: -----------------------] 1036s autopkgtest [03:51:42]: test cavp: - - - - - - - - - - results - - - - - - - - - - 1036s cavp PASS 1037s autopkgtest [03:51:43]: @@@@@@@@@@@@@@@@@@@@ summary 1037s opportunistic SKIP exit status 77 and marked as skippable 1037s cryptocheck PASS 1037s cavp PASS