0s autopkgtest [04:27:41]: starting date and time: 2026-02-03 04:27:41+0000 0s autopkgtest [04:27:41]: git checkout: 508d4a25 a-v-ssh wait_for_ssh: demote "ssh connection failed" to a debug message 0s autopkgtest [04:27:41]: host juju-7f2275-prod-proposed-migration-environment-9; command line: /home/ubuntu/autopkgtest/runner/autopkgtest --output-dir /tmp/autopkgtest-work.f4peyi4k/out --timeout-copy=6000 --setup-commands 'ln -s /dev/null /etc/systemd/system/bluetooth.service; printf "http_proxy=http://squid.internal:3128\nhttps_proxy=http://squid.internal:3128\nno_proxy=127.0.0.1,127.0.1.1,localhost,localdomain,internal,login.ubuntu.com,archive.ubuntu.com,ports.ubuntu.com,security.ubuntu.com,ddebs.ubuntu.com,changelogs.ubuntu.com,keyserver.ubuntu.com,launchpadlibrarian.net,launchpadcontent.net,launchpad.net,keystone.ps5.canonical.com,objectstorage.prodstack5.canonical.com,radosgw.ps5.canonical.com\n" >> /etc/environment' --apt-pocket=proposed=src:debconf --apt-upgrade libreswan --timeout-short=300 --timeout-copy=20000 --timeout-build=20000 --env=ADT_TEST_TRIGGERS=debconf/1.5.91build1 -- lxd -r lxd-armhf-10.145.243.28 lxd-armhf-10.145.243.28:autopkgtest/ubuntu/resolute/armhf 29s autopkgtest [04:28:10]: testbed dpkg architecture: armhf 33s autopkgtest [04:28:14]: testbed apt version: 3.1.14 37s autopkgtest [04:28:18]: @@@@@@@@@@@@@@@@@@@@ test bed setup 39s autopkgtest [04:28:20]: testbed release detected to be: None 47s autopkgtest [04:28:28]: updating testbed package index (apt update) 55s Get:1 http://ftpmaster.internal/ubuntu resolute-proposed InRelease [124 kB] 55s Get:2 http://ftpmaster.internal/ubuntu resolute InRelease [124 kB] 55s Hit:3 http://ftpmaster.internal/ubuntu resolute-updates InRelease 56s Hit:4 http://ftpmaster.internal/ubuntu resolute-security InRelease 56s Get:5 http://ftpmaster.internal/ubuntu resolute-proposed/main Sources [269 kB] 56s Get:6 http://ftpmaster.internal/ubuntu resolute-proposed/universe Sources [1270 kB] 58s Get:7 http://ftpmaster.internal/ubuntu resolute-proposed/multiverse Sources [27.8 kB] 59s Get:8 http://ftpmaster.internal/ubuntu resolute-proposed/restricted Sources [5260 B] 59s Get:9 http://ftpmaster.internal/ubuntu resolute-proposed/main armhf Packages [299 kB] 59s Get:10 http://ftpmaster.internal/ubuntu resolute-proposed/universe armhf Packages [1001 kB] 60s Get:11 http://ftpmaster.internal/ubuntu resolute-proposed/multiverse armhf Packages [6868 B] 60s Get:12 http://ftpmaster.internal/ubuntu resolute/universe Sources [21.3 MB] 67s Get:13 http://ftpmaster.internal/ubuntu resolute/multiverse Sources [310 kB] 67s Get:14 http://ftpmaster.internal/ubuntu resolute/main Sources [1404 kB] 67s Get:15 http://ftpmaster.internal/ubuntu resolute/main armhf Packages [1373 kB] 68s Get:16 http://ftpmaster.internal/ubuntu resolute/universe armhf Packages [15.0 MB] 69s Get:17 http://ftpmaster.internal/ubuntu resolute/multiverse armhf Packages [176 kB] 71s Fetched 42.7 MB in 22s (1937 kB/s) 72s Reading package lists... 79s autopkgtest [04:29:00]: upgrading testbed (apt dist-upgrade and autopurge) 81s Reading package lists... 81s Building dependency tree... 81s Reading state information... 81s Calculating upgrade... 82s The following packages will be upgraded: 82s debconf debconf-i18n python3-debconf systemd-hwe-hwdb 89s 4 upgraded, 0 newly installed, 0 to remove and 0 not upgraded. 89s Need to get 360 kB of archives. 89s After this operation, 1024 B of additional disk space will be used. 89s Get:1 http://ftpmaster.internal/ubuntu resolute-proposed/main armhf python3-debconf all 1.5.91build1 [4174 B] 89s Get:2 http://ftpmaster.internal/ubuntu resolute-proposed/main armhf debconf-i18n all 1.5.91build1 [227 kB] 89s Get:3 http://ftpmaster.internal/ubuntu resolute-proposed/main armhf debconf all 1.5.91build1 [126 kB] 89s Get:4 http://ftpmaster.internal/ubuntu resolute/main armhf systemd-hwe-hwdb all 259.0.1 [3152 B] 90s Preconfiguring packages ... 90s Fetched 360 kB in 7s (52.4 kB/s) 90s (Reading database ... (Reading database ... 5% (Reading database ... 10% (Reading database ... 15% (Reading database ... 20% (Reading database ... 25% (Reading database ... 30% (Reading database ... 35% (Reading database ... 40% (Reading database ... 45% (Reading database ... 50% (Reading database ... 55% (Reading database ... 60% (Reading database ... 65% (Reading database ... 70% (Reading database ... 75% (Reading database ... 80% (Reading database ... 85% (Reading database ... 90% (Reading database ... 95% (Reading database ... 100% (Reading database ... 68394 files and directories currently installed.) 90s Preparing to unpack .../python3-debconf_1.5.91build1_all.deb ... 90s Unpacking python3-debconf (1.5.91build1) over (1.5.91) ... 90s Preparing to unpack .../debconf-i18n_1.5.91build1_all.deb ... 90s Unpacking debconf-i18n (1.5.91build1) over (1.5.91) ... 90s Preparing to unpack .../debconf_1.5.91build1_all.deb ... 90s Unpacking debconf (1.5.91build1) over (1.5.91) ... 90s Setting up debconf (1.5.91build1) ... 90s (Reading database ... (Reading database ... 5% (Reading database ... 10% (Reading database ... 15% (Reading database ... 20% (Reading database ... 25% (Reading database ... 30% (Reading database ... 35% (Reading database ... 40% (Reading database ... 45% (Reading database ... 50% (Reading database ... 55% (Reading database ... 60% (Reading database ... 65% (Reading database ... 70% (Reading database ... 75% (Reading database ... 80% (Reading database ... 85% (Reading database ... 90% (Reading database ... 95% (Reading database ... 100% (Reading database ... 68394 files and directories currently installed.) 90s Preparing to unpack .../systemd-hwe-hwdb_259.0.1_all.deb ... 90s Unpacking systemd-hwe-hwdb (259.0.1) over (257.7.1) ... 90s Setting up python3-debconf (1.5.91build1) ... 91s Setting up debconf-i18n (1.5.91build1) ... 91s Setting up systemd-hwe-hwdb (259.0.1) ... 91s Processing triggers for udev (259-1ubuntu3) ... 92s Processing triggers for man-db (2.13.1-1) ... 95s Reading package lists... 96s Building dependency tree... 96s Reading state information... 96s Solving dependencies... 97s 0 upgraded, 0 newly installed, 0 to remove and 0 not upgraded. 100s autopkgtest [04:29:21]: rebooting testbed after setup commands that affected boot 155s autopkgtest [04:30:16]: testbed running kernel: Linux 6.8.0-87-generic #88~22.04.1-Ubuntu SMP PREEMPT_DYNAMIC Tue Oct 14 14:00:09 UTC 2 188s autopkgtest [04:30:49]: @@@@@@@@@@@@@@@@@@@@ apt-source libreswan 201s Get:1 http://ftpmaster.internal/ubuntu resolute/universe libreswan 5.2-2.2ubuntu1 (dsc) [2735 B] 201s Get:2 http://ftpmaster.internal/ubuntu resolute/universe libreswan 5.2-2.2ubuntu1 (tar) [4132 kB] 201s Get:3 http://ftpmaster.internal/ubuntu resolute/universe libreswan 5.2-2.2ubuntu1 (asc) [862 B] 201s Get:4 http://ftpmaster.internal/ubuntu resolute/universe libreswan 5.2-2.2ubuntu1 (diff) [16.7 kB] 201s gpgv: Signature made Thu Jul 31 14:30:12 2025 UTC 201s gpgv: using RSA key 25E3FF2D7F469DBE7D0D4E50AFCFEC8E669CE1C2 201s gpgv: Can't check signature: No public key 201s dpkg-source: warning: cannot verify inline signature for ./libreswan_5.2-2.2ubuntu1.dsc: no acceptable signature found 205s autopkgtest [04:31:06]: testing package libreswan version 5.2-2.2ubuntu1 207s opportunistic SKIP Test restriction "isolation-machine" requires testbed capability "isolation-machine" 207s autopkgtest [04:31:08]: build not needed 213s opportunistic SKIP Test restriction "isolation-machine" requires testbed capability "isolation-machine" 213s autopkgtest [04:31:14]: test cryptocheck: preparing testbed 217s Reading package lists... 218s Building dependency tree... 218s Reading state information... 218s Solving dependencies... 218s The following NEW packages will be installed: 218s dns-root-data libevent-2.1-7t64 libevent-pthreads-2.1-7t64 libldns3t64 218s libnss3-tools libreswan libunbound8 219s 0 upgraded, 7 newly installed, 0 to remove and 0 not upgraded. 219s Need to get 3106 kB of archives. 219s After this operation, 11.3 MB of additional disk space will be used. 219s Get:1 http://ftpmaster.internal/ubuntu resolute/main armhf dns-root-data all 2025080400 [5908 B] 219s Get:2 http://ftpmaster.internal/ubuntu resolute/main armhf libnss3-tools armhf 2:3.120-1 [1041 kB] 219s Get:3 http://ftpmaster.internal/ubuntu resolute/main armhf libevent-pthreads-2.1-7t64 armhf 2.1.12-stable-10build1 [7662 B] 219s Get:4 http://ftpmaster.internal/ubuntu resolute/universe armhf libldns3t64 armhf 1.8.4-2build1 [137 kB] 219s Get:5 http://ftpmaster.internal/ubuntu resolute/main armhf libevent-2.1-7t64 armhf 2.1.12-stable-10build1 [130 kB] 219s Get:6 http://ftpmaster.internal/ubuntu resolute/main armhf libunbound8 armhf 1.24.2-1ubuntu1 [433 kB] 219s Get:7 http://ftpmaster.internal/ubuntu resolute/universe armhf libreswan armhf 5.2-2.2ubuntu1 [1352 kB] 220s Fetched 3106 kB in 1s (2362 kB/s) 220s Selecting previously unselected package dns-root-data. 220s (Reading database ... (Reading database ... 5% (Reading database ... 10% (Reading database ... 15% (Reading database ... 20% (Reading database ... 25% (Reading database ... 30% (Reading database ... 35% (Reading database ... 40% (Reading database ... 45% (Reading database ... 50% (Reading database ... 55% (Reading database ... 60% (Reading database ... 65% (Reading database ... 70% (Reading database ... 75% (Reading database ... 80% (Reading database ... 85% (Reading database ... 90% (Reading database ... 95% (Reading database ... 100% (Reading database ... 68395 files and directories currently installed.) 220s Preparing to unpack .../0-dns-root-data_2025080400_all.deb ... 220s Unpacking dns-root-data (2025080400) ... 220s Selecting previously unselected package libnss3-tools. 220s Preparing to unpack .../1-libnss3-tools_2%3a3.120-1_armhf.deb ... 220s Unpacking libnss3-tools (2:3.120-1) ... 220s Selecting previously unselected package libevent-pthreads-2.1-7t64:armhf. 220s Preparing to unpack .../2-libevent-pthreads-2.1-7t64_2.1.12-stable-10build1_armhf.deb ... 220s Unpacking libevent-pthreads-2.1-7t64:armhf (2.1.12-stable-10build1) ... 220s Selecting previously unselected package libldns3t64:armhf. 221s Preparing to unpack .../3-libldns3t64_1.8.4-2build1_armhf.deb ... 221s Unpacking libldns3t64:armhf (1.8.4-2build1) ... 221s Selecting previously unselected package libevent-2.1-7t64:armhf. 221s Preparing to unpack .../4-libevent-2.1-7t64_2.1.12-stable-10build1_armhf.deb ... 221s Unpacking libevent-2.1-7t64:armhf (2.1.12-stable-10build1) ... 221s Selecting previously unselected package libunbound8:armhf. 221s Preparing to unpack .../5-libunbound8_1.24.2-1ubuntu1_armhf.deb ... 221s Unpacking libunbound8:armhf (1.24.2-1ubuntu1) ... 221s Selecting previously unselected package libreswan. 221s Preparing to unpack .../6-libreswan_5.2-2.2ubuntu1_armhf.deb ... 221s Unpacking libreswan (5.2-2.2ubuntu1) ... 221s Setting up libldns3t64:armhf (1.8.4-2build1) ... 221s Setting up libevent-pthreads-2.1-7t64:armhf (2.1.12-stable-10build1) ... 221s Setting up libevent-2.1-7t64:armhf (2.1.12-stable-10build1) ... 221s Setting up dns-root-data (2025080400) ... 221s Setting up libunbound8:armhf (1.24.2-1ubuntu1) ... 221s Setting up libnss3-tools (2:3.120-1) ... 221s Setting up libreswan (5.2-2.2ubuntu1) ... 221s ipsec.service is a disabled or a static unit, not starting it. 221s Processing triggers for man-db (2.13.1-1) ... 222s Processing triggers for libc-bin (2.42-2ubuntu4) ... 233s autopkgtest [04:31:34]: test cryptocheck: [----------------------- 235s Testing installed binary: /usr/libexec/ipsec/algparse 235s Testing installed binary: /usr/libexec/ipsec/pluto 235s testing -tp 235s ipsec algparse: Encryption algorithms: 235s ipsec algparse: AES_CCM_16 {256,192,*128} IKEv1: ESP IKEv2: ESP FIPS aes_ccm, aes_ccm_c 235s ipsec algparse: AES_CCM_12 {256,192,*128} IKEv1: ESP IKEv2: ESP FIPS aes_ccm_b 235s ipsec algparse: AES_CCM_8 {256,192,*128} IKEv1: ESP IKEv2: ESP FIPS aes_ccm_a 235s ipsec algparse: 3DES_CBC [*192] IKEv1: IKE ESP IKEv2: IKE ESP FIPS NSS(CBC) 3des 235s ipsec algparse: CAMELLIA_CTR {256,192,*128} IKEv1: ESP IKEv2: ESP 235s ipsec algparse: CAMELLIA_CBC {256,192,*128} IKEv1: IKE ESP IKEv2: IKE ESP NSS(CBC) camellia 235s ipsec algparse: AES_GCM_16 {256,192,*128} IKEv1: ESP IKEv2: IKE ESP FIPS NSS(AEAD) aes_gcm, aes_gcm_c 235s ipsec algparse: AES_GCM_12 {256,192,*128} IKEv1: ESP IKEv2: IKE ESP FIPS NSS(AEAD) aes_gcm_b 235s ipsec algparse: AES_GCM_8 {256,192,*128} IKEv1: ESP IKEv2: IKE ESP FIPS NSS(AEAD) aes_gcm_a 235s ipsec algparse: AES_CTR {256,192,*128} IKEv1: IKE ESP IKEv2: IKE ESP FIPS NSS(CTR) aesctr 235s ipsec algparse: AES_CBC {256,192,*128} IKEv1: IKE ESP IKEv2: IKE ESP FIPS NSS(CBC) aes 235s ipsec algparse: NULL_AUTH_AES_GMAC {256,192,*128} IKEv1: ESP IKEv2: ESP FIPS aes_gmac 235s ipsec algparse: NULL [] IKEv1: ESP IKEv2: ESP NULL 235s ipsec algparse: CHACHA20_POLY1305 [*256] IKEv1: IKEv2: IKE ESP NSS(AEAD) chacha20poly1305 235s ipsec algparse: Hash algorithms: 235s ipsec algparse: MD5 IKEv1: IKE IKEv2: NSS 235s ipsec algparse: SHA1 IKEv1: IKE IKEv2: IKE FIPS NSS sha 235s ipsec algparse: SHA2_256 IKEv1: IKE IKEv2: IKE FIPS NSS sha2, sha256 235s ipsec algparse: SHA2_384 IKEv1: IKE IKEv2: IKE FIPS NSS sha384 235s ipsec algparse: SHA2_512 IKEv1: IKE IKEv2: IKE FIPS NSS sha512 235s ipsec algparse: IDENTITY IKEv1: IKEv2: FIPS 235s ipsec algparse: PRF algorithms: 235s ipsec algparse: HMAC_MD5 IKEv1: IKE IKEv2: IKE NSS md5 235s ipsec algparse: HMAC_SHA1 IKEv1: IKE IKEv2: IKE FIPS NSS sha, sha1 235s ipsec algparse: HMAC_SHA2_256 IKEv1: IKE IKEv2: IKE FIPS NSS sha2, sha256, sha2_256 235s ipsec algparse: HMAC_SHA2_384 IKEv1: IKE IKEv2: IKE FIPS NSS sha384, sha2_384 235s ipsec algparse: HMAC_SHA2_512 IKEv1: IKE IKEv2: IKE FIPS NSS sha512, sha2_512 235s ipsec algparse: AES_XCBC IKEv1: IKEv2: IKE native(XCBC) aes128_xcbc 235s ipsec algparse: Integrity algorithms: 235s ipsec algparse: HMAC_MD5_96 IKEv1: IKE ESP AH IKEv2: IKE ESP AH NSS md5, hmac_md5 235s ipsec algparse: HMAC_SHA1_96 IKEv1: IKE ESP AH IKEv2: IKE ESP AH FIPS NSS sha, sha1, sha1_96, hmac_sha1 235s ipsec algparse: HMAC_SHA2_512_256 IKEv1: IKE ESP AH IKEv2: IKE ESP AH FIPS NSS sha512, sha2_512, sha2_512_256, hmac_sha2_512 235s ipsec algparse: HMAC_SHA2_384_192 IKEv1: IKE ESP AH IKEv2: IKE ESP AH FIPS NSS sha384, sha2_384, sha2_384_192, hmac_sha2_384 235s ipsec algparse: HMAC_SHA2_256_128 IKEv1: IKE ESP AH IKEv2: IKE ESP AH FIPS NSS sha2, sha256, sha2_256, sha2_256_128, hmac_sha2_256 235s ipsec algparse: HMAC_SHA2_256_TRUNCBUG IKEv1: ESP AH IKEv2: AH 235s ipsec algparse: AES_XCBC_96 IKEv1: ESP AH IKEv2: IKE ESP AH native(XCBC) aes_xcbc, aes128_xcbc, aes128_xcbc_96 235s ipsec algparse: AES_CMAC_96 IKEv1: ESP AH IKEv2: ESP AH FIPS aes_cmac 235s ipsec algparse: NONE IKEv1: ESP IKEv2: IKE ESP FIPS null 235s ipsec algparse: DH algorithms: 235s ipsec algparse: NONE IKEv1: IKEv2: IKE ESP AH FIPS NSS(MODP) null, dh0 235s ipsec algparse: MODP1536 IKEv1: IKE ESP AH IKEv2: IKE ESP AH NSS(MODP) dh5 235s ipsec algparse: MODP2048 IKEv1: IKE ESP AH IKEv2: IKE ESP AH FIPS NSS(MODP) dh14 235s ipsec algparse: MODP3072 IKEv1: IKE ESP AH IKEv2: IKE ESP AH FIPS NSS(MODP) dh15 235s ipsec algparse: MODP4096 IKEv1: IKE ESP AH IKEv2: IKE ESP AH FIPS NSS(MODP) dh16 235s ipsec algparse: MODP6144 IKEv1: IKE ESP AH IKEv2: IKE ESP AH FIPS NSS(MODP) dh17 235s ipsec algparse: MODP8192 IKEv1: IKE ESP AH IKEv2: IKE ESP AH FIPS NSS(MODP) dh18 235s ipsec algparse: DH19 IKEv1: IKE IKEv2: IKE ESP AH FIPS NSS(ECP) ecp_256, ecp256 235s ipsec algparse: DH20 IKEv1: IKE IKEv2: IKE ESP AH FIPS NSS(ECP) ecp_384, ecp384 235s ipsec algparse: DH21 IKEv1: IKE IKEv2: IKE ESP AH FIPS NSS(ECP) ecp_521, ecp521 235s ipsec algparse: DH31 IKEv1: IKE IKEv2: IKE ESP AH NSS(ECP) curve25519 235s ipsec algparse: IPCOMP algorithms: 235s ipsec algparse: DEFLATE IKEv1: ESP AH IKEv2: ESP AH FIPS 235s ipsec algparse: LZS IKEv1: IKEv2: ESP AH FIPS 235s ipsec algparse: LZJH IKEv1: IKEv2: ESP AH FIPS 235s | parsing 'AES_GCM_16_256,AES_GCM_16_128,CHACHA20_POLY1305,AES_CBC_256,AES_CBC_128' for ESP 235s | proposal: 'AES_GCM_16_256' 235s | token: '' '' "AES_GCM_16_256" '' 235s | token: '' "AES_GCM_16_256" '' '' 235s | ike_alg_byname() failed: ESP encryption algorithm 'AES_GCM_16_256' is not recognized 235s | token: '' '' '' 235s | appending ESP encryption algorithm AES_GCM_16[_256] 235s | appending ESP integrity algorithm NONE[_0] 235s | proposal: 'AES_GCM_16_128' 235s | token: '' '' "AES_GCM_16_128" '' 235s | token: '' "AES_GCM_16_128" '' '' 235s | ike_alg_byname() failed: ESP encryption algorithm 'AES_GCM_16_128' is not recognized 235s | token: '' '' '' 235s | appending ESP encryption algorithm AES_GCM_16[_128] 235s | appending ESP integrity algorithm NONE[_0] 235s | proposal: 'CHACHA20_POLY1305' 235s | token: '' '' "CHACHA20_POLY1305" '' 235s | token: '' "CHACHA20_POLY1305" '' '' 235s | token: '' '' '' 235s | appending ESP encryption algorithm CHACHA20_POLY1305[_0] 235s | appending ESP integrity algorithm NONE[_0] 235s | proposal: 'AES_CBC_256' 235s | token: '' '' "AES_CBC_256" '' 235s | token: '' "AES_CBC_256" '' '' 235s | ike_alg_byname() failed: ESP encryption algorithm 'AES_CBC_256' is not recognized 235s | token: '' '' '' 235s | appending ESP encryption algorithm AES_CBC[_256] 235s | appending ESP integrity algorithm HMAC_SHA2_512_256[_0] 235s | appending ESP integrity algorithm HMAC_SHA2_256_128[_0] 235s | proposal: 'AES_CBC_128' 235s | token: '' '' "AES_CBC_128" '' 235s | token: '' "AES_CBC_128" '' '' 235s | ike_alg_byname() failed: ESP encryption algorithm 'AES_CBC_128' is not recognized 235s | token: '' '' '' 235s | appending ESP encryption algorithm AES_CBC[_128] 235s | appending ESP integrity algorithm HMAC_SHA2_512_256[_0] 235s | appending ESP integrity algorithm HMAC_SHA2_256_128[_0] 235s | parsing '' for ESP 235s | parsing 'aes' for ESP 235s | proposal: 'aes' 235s | token: '' '' "aes" '' 235s | token: '' "aes" '' '' 235s | token: '' '' '' 235s | appending ESP encryption algorithm AES_CBC[_0] 235s | appending ESP integrity algorithm HMAC_SHA2_512_256[_0] 235s | appending ESP integrity algorithm HMAC_SHA2_256_128[_0] 235s | parsing 'aes;modp2048' for ESP 235s | proposal: 'aes;modp2048' 235s | token: '' '' "aes" ';' 235s | token: '' "aes" ';' "modp2048" '' 235s | token: ';' "modp2048" '' '' 235s | appending ESP encryption algorithm AES_CBC[_0] 235s | parsing dh: 235s | appending ESP DH algorithm MODP2048[_0] 235s | token: '' '' '' 235s | appending ESP integrity algorithm HMAC_SHA2_512_256[_0] 235s | appending ESP integrity algorithm HMAC_SHA2_256_128[_0] 235s ipsec algparse: ignoring ESP DH algorithm MODP2048 as PFS policy is disabled 235s | parsing 'aes-sha1' for ESP 235s | proposal: 'aes-sha1' 235s | token: '' '' "aes" '-' 235s | token: '' "aes" '-' "sha1" '' 235s | token: '-' "sha1" '' '' 235s | appending ESP encryption algorithm AES_CBC[_0] 235s | parsing integ: 235s | appending ESP integrity algorithm HMAC_SHA1_96[_0] 235s | token: '' '' '' 235s | parsing 'aes-sha1' for ESP 235s | proposal: 'aes-sha1' 235s | token: '' '' "aes" '-' 235s | token: '' "aes" '-' "sha1" '' 235s | token: '-' "sha1" '' '' 235s | appending ESP encryption algorithm AES_CBC[_0] 235s | parsing integ: 235s | appending ESP integrity algorithm HMAC_SHA1_96[_0] 235s | token: '' '' '' 235s | parsing 'aes-sha1-modp2048' for ESP 235s | proposal: 'aes-sha1-modp2048' 235s | token: '' '' "aes" '-' 235s | token: '' "aes" '-' "sha1" '-' 235s | token: '-' "sha1" '-' "modp2048" '' 235s | appending ESP encryption algorithm AES_CBC[_0] 235s | parsing integ: 235s | appending ESP integrity algorithm HMAC_SHA1_96[_0] 235s | token: '-' "modp2048" '' '' 235s | parsing dh: 235s | appending ESP DH algorithm MODP2048[_0] 235s | token: '' '' '' 235s ipsec algparse: ignoring ESP DH algorithm MODP2048 as PFS policy is disabled 235s | parsing 'aes-128-sha1' for ESP 235s | proposal: 'aes-128-sha1' 235s | token: '' '' "aes" '-' 235s | token: '' "aes" '-' "128" '-' 235s | token: '-' "128" '-' "sha1" '' 235s | token: '-' "sha1" '' '' 235s | appending ESP encryption algorithm AES_CBC[_128] 235s | parsing integ: 235s | appending ESP integrity algorithm HMAC_SHA1_96[_0] 235s | token: '' '' '' 235s | parsing 'aes-128-sha1' for ESP 235s | proposal: 'aes-128-sha1' 235s | token: '' '' "aes" '-' 235s | token: '' "aes" '-' "128" '-' 235s | token: '-' "128" '-' "sha1" '' 235s | token: '-' "sha1" '' '' 235s | appending ESP encryption algorithm AES_CBC[_128] 235s | parsalgparse -v2 'esp' (expect SUCCESS) 235s AES_GCM_16_256-NONE 235s AES_GCM_16_128-NONE 235s CHACHA20_POLY1305-NONE 235s AES_CBC_256-HMAC_SHA2_512_256+HMAC_SHA2_256_128 235s AES_CBC_128-HMAC_SHA2_512_256+HMAC_SHA2_256_128 235s algparse -v2 'esp=' (expect ERROR) 235s ERROR: ESP proposal is empty 235s algparse -v2 'esp=aes' (expect SUCCESS) 235s AES_CBC-HMAC_SHA2_512_256+HMAC_SHA2_256_128 235s algparse -v2 'esp=aes;modp2048' (expect SUCCESS) 235s AES_CBC-HMAC_SHA2_512_256+HMAC_SHA2_256_128 235s algparse -v2 'esp=aes-sha1' (expect SUCCESS) 235s AES_CBC-HMAC_SHA1_96 235s algparse -v2 'esp=aes-sha1' (expect SUCCESS) 235s AES_CBC-HMAC_SHA1_96 235s algparse -v2 'esp=aes-sha1-modp2048' (expect SUCCESS) 235s AES_CBC-HMAC_SHA1_96 235s algparse -v2 'esp=aes-128-sha1' (expect SUCCESS) 235s AES_CBC_128-HMAC_SHA1_96 235s algparse -v2 'esp=aes-128-sha1' (expect SUCCESS) 235s AES_CBC_128-HMAC_SHA1_96 235s algparse -v2 'esp=aes-128-sha1-modp2048' (expect SUCCESS) 235s AES_CBC_128-HMAC_SHA1_96 235s algparse -v2 'esp=aes-128' (expect SUCCESS) 235s AES_CBC_128-HMAC_SHA2_512_256+HMAC_SHA2_256_128 235s algparse -v2 'esp=aes_gcm_a-128-null' (expect SUCCESS) 235s AES_GCM_8_128-NONE 235s algparse -v2 'esp=3des-sha1;modp1024' (expect ERROR) 235s ERROR: ESP DH algorithm 'modp1024' is not supported 235s algparse -v2 'esp=3des-sha1;modp1536' (expect SUCCESS) 235s 3DES_CBC-HMAC_SHA1_96 235s algparse -v2 'esp=3des-sha1;modp2048' (expect SUCCESS) 235s 3DES_CBC-HMAC_SHA1_96 235s algparse -v2 'esp=3des-sha1;dh21' (expect SUCCESS) 235s 3DES_CBC-HMAC_SHA1_96 235s algparse -v2 'esp=3des-sha1;ecp_521' (expect SUCCESS) 235s 3DES_CBC-HMAC_SHA1_96 235s algparse -v2 'esp=3des-sha1;dh23' (expect ERROR) 235s ERROR: ESP DH algorithm 'dh23' is not supported 235s algparse -v2 'esp=3des-sha1;dh24' (expect ERROR) 235s ERROR: ESP DH algorithm 'dh24' is not supported 235s algparse -v2 'esp=3des-sha1' (expect SUCCESS) 235s 3DES_CBC-HMAC_SHA1_96 235s algparse -v2 'esp=null-sha1' (expect SUCCESS) 235s NULL-HMAC_SHA1_96 235s algparse -v2 'esp=aes_cbc' (expect SUCCESS) 235s AES_CBC-HMAC_SHA2_512_256+HMAC_SHA2_256_128 235s algparse -v2 'esp=aes-sha' (expect SUCCESS) 235s AES_CBC-HMAC_SHA1_96 235s algparse -v2 'esp=aes-sha1' (expect SUCCESS) 235s AES_CBC-HMAC_SHA1_96 235s algparse -v2 'esp=aes128-sha1' (expect SUCCESS) 235s AES_CBC_128-HMAC_SHA1_96 235s algparse -v2 'esp=aes-sha2' (expect SUCCESS) 235s AES_CBC-HMAC_SHA2_256_128 235s algparse -v2 'esp=aes-sha256' (expect SUCCESS) 235s AES_CBC-HMAC_SHA2_256_128 235s algparse -v2 'esp=aes-sha384' (expect SUCCESS) 235s AES_CBC-HMAC_SHA2_384_192 235s algparse -v2 'esp=aes-sha512' (expect SUCCESS) 235s AES_CBC-HMAC_SHA2_512_256 235s algparse -v2 'esp=aes128-aes_xcbc' (expect SUCCESS) 235s AES_CBC_128-AES_XCBC_96 235s algparse -v2 'esp=aes192-sha1' (expect SUCCESS) 235s AES_CBC_192-HMAC_SHA1_96 235s algparse -v2 'esp=aes256-sha1' (expect SUCCESS) 235s AES_CBC_256-HMAC_SHA1_96 235s algparse -v2 'esp=aes256-sha' (expect SUCCESS) 235s AES_CBC_256-HMAC_SHA1_96 235s algparse -v2 'esp=aes256-sha2' (expect SUCCESS) 235s AES_CBC_256-HMAC_SHA2_256_128 235s algparse -v2 'esp=aes256-sha2_256' (expect SUCCESS) 235s AES_CBC_256-HMAC_SHA2_256_128 235s algparse -v2 'esp=aes256-sha2_384' (expect SUCCESS) 235s AES_CBC_256-HMAC_SHA2_384_192 235s algparse -v2 'esp=aes256-sha2_512' (expect SUCCESS) 235s AES_CBC_256-HMAC_SHA2_512_256 235s algparse -v2 'esp=camellia' (expect SUCCESS) 235s CAMELLIA_CBC-HMAC_SHA2_512_256+HMAC_SHA2_256_128 235s algparse -v2 'esp=camellia128' (expect SUCCESS) 235s CAMELLIA_CBC_128-HMAC_SHA2_512_256+HMAC_SHA2_256_128 235s algparse -v2 'esp=camellia192' (expect SUCCESS) 235s CAMELLIA_CBC_192-HMAC_SHA2_512_256+HMAC_SHA2_256_128 235s algparse -v2 'esp=camellia256' (expect SUCCESS) 235s CAMELLIA_CBC_256-HMAC_SHA2_512_256+HMAC_SHA2_256_128 235s algparse -v2 'esp=aes_ccm' (expect SUCCESS) 235s AES_CCM_16-NONE 235s algparse -v2 'esp=aes_ccm_a-128-null' (expect SUCCESS) 235s AES_CCM_8_128-NONE 235s algparse -v2 'esp=aes_ccm_a-192-null' (expect SUCCESS) 235s AES_CCM_8_192-NONE 235s algparse -v2 'esp=aes_ccm_a-256-null' (expect SUCCESS) 235s AES_CCM_8_256-NONE 235s algparse -v2 'esp=aes_ccm_b-128-null' (expect SUCCESS) 235s AES_CCM_12_128-NONE 235s algparse -v2 'esp=aes_ccm_b-192-null' (expect SUCCESS) 235s AES_CCM_12_192-NONE 235s algparse -v2 'esp=aes_ccm_b-256-null' (expect SUCCESS) 235s AES_CCM_12_256-NONE 235s algparse -v2 'esp=aes_ccm_c-128-null' (expect SUCCESS) 235s AES_CCM_16_128-NONE 235s algparse -v2 'esp=aes_ccm_c-192-null' (expect SUCCESS) 235s AES_CCM_16_192-NONE 235s algparse -v2 'esp=aes_ccm_c-256-null' (expect SUCCESS) 235s AES_CCM_16_256-NONE 235s algparse -v2 'esp=aes_gcm' (expect SUCCESS) 235s AES_GCM_16-NONE 235s algparse -v2 'esp=aes_gcm_a-128-null' (expect SUCCESS) 235s AES_GCM_8_128-NONE 235s algparse -v2 'esp=aes_gcm_a-192-null' (expect SUCCESS) 235s AES_GCM_8_192-NONE 235s algparse -v2 'esp=aes_gcm_a-256-null' (expect SUCCESS) 235s AES_GCM_8_256-NONE 235s algparse -v2 'esp=aes_gcm_b-128-null' (expect SUCCESS) 235s AES_GCM_12_128-NONE 235s algparse -v2 'esp=aes_gcm_b-192-null' (expect SUCCESS) 235s AES_GCM_12_192-NONE 235s algparse -v2 'esp=aes_gcm_b-256-null' (expect SUCCESS) 235s AES_GCM_12_256-NONE 235s algparse -v2 'esp=aes_gcm_c-128-null' (expect SUCCESS) 235s AES_GCM_16_128-NONE 235s algparse -v2 'esp=aes_gcm_c-192-null' (expect SUCCESS) 235s AES_GCM_16_192-NONE 235s algparse -v2 'esp=aes_gcm_c-256-null' (expect SUCCESS) 235s AES_GCM_16_256-NONE 235s algparse -v2 'esp=aes_ccm_a-null' (expect SUCCESS) 235s AES_CCM_8-NONE 235s algparse -v2 'esp=aes_ccm_b-null' (expect SUCCESS) 235s AES_CCM_12-NONE 235s algparse -v2 'esp=aes_ccm_c-null' (expect SUCCESS) 235s AES_CCM_16-NONE 235s algparse -v2 'esp=aes_gcm_a-null' (expect SUCCESS) 235s AES_GCM_8-NONE 235s algparse -v2 'esp=aes_gcm_b-null' (expect SUCCESS) 235s AES_GCM_12-NONE 235s algparse -v2 'esp=aes_gcm_c-null' (expect SUCCESS) 235s AES_GCM_16-NONE 235s algparse -v2 'esp=aes_ccm-null' (expect SUCCESS) 235s AES_CCM_16-NONE 235s algparse -v2 'esp=aes_gcm-null' (expect SUCCESS) 235s AES_GCM_16-NONE 235s algparse -v2 'esp=aes_ccm-256-null' (expect SUCCESS) 235s AES_CCM_16_256-NONE 235s algparse -v2 'esp=aes_gcm-192-null' (expect SUCCESS) 235s AES_GCM_16_192-NONE 235s algparse -v2 'esp=aes_ccm_256-null' (expect SUCCESS) 235s AES_CCM_16_256-NONE 235s algparse -v2 'esp=aes_gcm_192-null' (expect SUCCESS) 235s AES_GCM_16_192-NONE 235s algparse -v2 'esp=aes_ccm_8-null' (expect SUCCESS) 235s AES_CCM_8-NONE 235s algparse -v2 'esp=aes_ccm_12-null' (expect SUCCESS) 235s AES_CCM_12-NONE 235s algparse -v2 'esp=aes_ccm_16-null' (expect SUCCESS) 235s AES_CCM_16-NONE 235s algparse -v2 'esp=aes_gcm_8-null' (expect SUCCESS) 235s AES_GCM_8-NONE 235s algparse -v2 'esp=aes_gcm_12-null' (expect SUCCESS) 235s ing integ: 235s | appending ESP integrity algorithm HMAC_SHA1_96[_0] 235s | token: '' '' '' 235s | parsing 'aes-128-sha1-modp2048' for ESP 235s | proposal: 'aes-128-sha1-modp2048' 235s | token: '' '' "aes" '-' 235s | token: '' "aes" '-' "128" '-' 235s | token: '-' "128" '-' "sha1" '-' 235s | token: '-' "sha1" '-' "modp2048" '' 235s | appending ESP encryption algorithm AES_CBC[_128] 235s | parsing integ: 235s | appending ESP integrity algorithm HMAC_SHA1_96[_0] 235s | token: '-' "modp2048" '' '' 235s | parsing dh: 235s | appending ESP DH algorithm MODP2048[_0] 235s | token: '' '' '' 235s ipsec algparse: ignoring ESP DH algorithm MODP2048 as PFS policy is disabled 235s | parsing 'aes-128' for ESP 235s | proposal: 'aes-128' 235s | token: '' '' "aes" '-' 235s | token: '' "aes" '-' "128" '' 235s | token: '-' "128" '' '' 235s | token: '' '' '' 235s | appending ESP encryption algorithm AES_CBC[_128] 235s | appending ESP integrity algorithm HMAC_SHA2_512_256[_0] 235s | appending ESP integrity algorithm HMAC_SHA2_256_128[_0] 235s | parsing 'aes_gcm_a-128-null' for ESP 235s | proposal: 'aes_gcm_a-128-null' 235s | token: '' '' "aes_gcm_a" '-' 235s | token: '' "aes_gcm_a" '-' "128" '-' 235s | token: '-' "128" '-' "null" '' 235s | token: '-' "null" '' '' 235s | appending ESP encryption algorithm AES_GCM_8[_128] 235s | parsing integ: 235s | appending ESP integrity algorithm NONE[_0] 235s | token: '' '' '' 235s | parsing '3des-sha1;modp1024' for ESP 235s | proposal: '3des-sha1;modp1024' 235s | token: '' '' "3des" '-' 235s | token: '' "3des" '-' "sha1" ';' 235s | token: '-' "sha1" ';' "modp1024" '' 235s | appending ESP encryption algorithm 3DES_CBC[_0] 235s | parsing integ: 235s | appending ESP integrity algorithm HMAC_SHA1_96[_0] 235s | token: ';' "modp1024" '' '' 235s | parsing dh: 235s | ike_alg_byname() failed: ESP DH algorithm 'modp1024' is not supported 235s | lookup for DH algorithm 'modp1024' failed 235s | ... failed 'ESP DH algorithm 'modp1024' is not supported' 235s | parsing '3des-sha1;modp1536' for ESP 235s | proposal: '3des-sha1;modp1536' 235s | token: '' '' "3des" '-' 235s | token: '' "3des" '-' "sha1" ';' 235s | token: '-' "sha1" ';' "modp1536" '' 235s | appending ESP encryption algorithm 3DES_CBC[_0] 235s | parsing integ: 235s | appending ESP integrity algorithm HMAC_SHA1_96[_0] 235s | token: ';' "modp1536" '' '' 235s | parsing dh: 235s | appending ESP DH algorithm MODP1536[_0] 235s | token: '' '' '' 235s ipsec algparse: ignoring ESP DH algorithm MODP1536 as PFS policy is disabled 235s | parsing '3des-sha1;modp2048' for ESP 235s | proposal: '3des-sha1;modp2048' 235s | token: '' '' "3des" '-' 235s | token: '' "3des" '-' "sha1" ';' 235s | token: '-' "sha1" ';' "modp2048" '' 235s | appending ESP encryption algorithm 3DES_CBC[_0] 235s | parsing integ: 235s | appending ESP integrity algorithm HMAC_SHA1_96[_0] 235s | token: ';' "modp2048" '' '' 235s | parsing dh: 235s | appending ESP DH algorithm MODP2048[_0] 235s | token: '' '' '' 235s ipsec algparse: ignoring ESP DH algorithm MODP2048 as PFS policy is disabled 235s | parsing '3des-sha1;dh21' for ESP 235s | proposal: '3des-sha1;dh21' 235s | token: '' '' "3des" '-' 235s | token: '' "3des" '-' "sha1" ';' 235s | token: '-' "sha1" ';' "dh21" '' 235s | appending ESP encryption algorithm 3DES_CBC[_0] 235s | parsing integ: 235s | appending ESP integrity algorithm HMAC_SHA1_96[_0] 235s | token: ';' "dh21" '' '' 235s | parsing dh: 235s | appending ESP DH algorithm DH21[_0] 235s | token: '' '' '' 235s ipsec algparse: ignoring ESP DH algorithm DH21 as PFS policy is disabled 235s | parsing '3des-sha1;ecp_521' for ESP 235s | proposal: '3des-sha1;ecp_521' 235s | token: '' '' "3des" '-' 235s | token: '' "3des" '-' "sha1" ';' 235s | token: '-' "sha1" ';' "ecp_521" '' 235s | appending ESP encryption algorithm 3DES_CBC[_0] 235s | parsing integ: 235s | appending ESP integrity algorithm HMAC_SHA1_96[_0] 235s | token: ';' "ecp_521" '' '' 235s | parsing dh: 235s | appending ESP DH algorithm DH21[_0] 235s | token: '' '' '' 235s ipsec algparse: ignoring ESP DH algorithm DH21 as PFS policy is disabled 235s | parsing '3des-sha1;dh23' for ESP 235s | proposal: '3des-sha1;dh23' 235s | token: '' '' "3des" '-' 235s | token: '' "3des" '-' "sha1" ';' 235s | token: '-' "sha1" ';' "dh23" '' 235s | appending ESP encryption algorithm 3DES_CBC[_0] 235s | parsing integ: 235s | appending ESP integrity algorithm HMAC_SHA1_96[_0] 235s | token: ';' "dh23" '' '' 235s | parsing dh: 235s | ike_alg_byname() failed: ESP DH algorithm 'dh23' is not supported 235s | lookup for DH algorithm 'dh23' failed 235s | ... failed 'ESP DH algorithm 'dh23' is not supported' 235s | parsing '3des-sha1;dh24' for ESP 235s | proposal: '3des-sha1;dh24' 235s | token: '' '' "3des" '-' 235s | token: '' "3des" '-' "sha1" ';' 235s | token: '-' "sha1" ';' "dh24" '' 235s | appending ESP encryption algorithm 3DES_CBC[_0] 235s | parsing integ: 235s | appending ESP integrity algorithm HMAC_SHA1_96[_0] 235s | token: ';' "dh24" '' '' 235s | parsing dh: 235s | ike_alg_byname() failed: ESP DH algorithm 'dh24' is not supported 235s | lookup for DH algorithm 'dh24' failed 235s | ... failed 'ESP DH algorithm 'dh24' is not supported' 235s | parsing '3des-sha1' for ESP 235s | proposal: '3des-sha1' 235s | token: '' '' "3des" '-' 235s | token: '' "3des" '-' "sha1" '' 235s | token: '-' "sha1" '' '' 235s | appending ESP encryption algorithm 3DES_CBC[_0] 235s | parsing integ: 235s | appending ESP integrity algorithm HMAC_SHA1_96[_0] 235s | token: '' '' '' 235s | parsing 'null-sha1' for ESP 235s | proposal: 'null-sha1' 235s | token: '' '' "null" '-' 235s | token: '' "null" '-' "sha1" '' 235s | token: '-' "sha1" '' '' 235s | appending ESP encryption algorithm NULL[_0] 235s | parsing integ: 235s | appending ESP integrity algorithm HMAC_SHA1_96[_0] 235s | token: '' '' '' 235s | parsing 'aes_cbc' for ESP 235s | proposal: 'aes_cbc' 235s | token: '' '' "aes_cbc" '' 235s | token: '' "aes_cbc" '' '' 235s | token: '' '' '' 235s | appending ESP encryption algorithm AES_CBC[_0] 235s | appending ESP integrity algorithm HMAC_SHA2_512_256[_0] 235s | appending ESP integrity algorithm HMAC_SHA2_256_128[_0] 235s | parsing 'aes-sha' for ESP 235s | proposal: 'aes-sha' 235s | token: '' '' "aes" '-' 235s | token: '' "aes" '-' "sha" '' 235s | token: '-' "sha" '' '' 235s | appending ESP encryption algorithm AES_CBC[_0] 235s | parsing integ: 235s | appending ESP integrity algorithm HMAC_SHA1_96[_0] 235s | token: '' '' '' 235s | parsing 'aes-sha1' for ESP 235s | proposal: 'aes-sha1' 235s | token: '' '' "aes" '-' 235s | token: '' "aes" '-' "sha1" '' 235s | token: '-' "sha1" '' '' 235s | appending ESP encryption algorithm AES_CBC[_0] 235s | parsing integ: 235s | appending ESP integrity algorithm HMAC_SHA1_96[_0] 235s | token: '' '' '' 235s | parsing 'aes128-sha1' for ESP 235s | proposal: 'aes128-sha1' 235s | token: '' '' "aes128" '-' 235s | token: '' "aes128" '-' "sha1" '' 235s | ike_alg_byname() failed: ESP encryption algorithm 'aes128' is not recognized 235s | token: '-' "sha1" '' '' 235s | appending ESP encryption algorithm AES_CBC[_128] 235s | parsing integ: 235s | appending ESP integrity algorithm HMAC_SHA1_96[_0] 235s | token: '' '' '' 235s | parsing 'aes-sha2' for ESP 235s | proposal: 'aes-sha2' 235s | token: '' '' "aes" '-' 235s | token: '' "aes" '-' "sha2" '' 235s | token: '-' "sha2" '' '' 235s | appending ESP encryption algorithm AES_CBC[_0] 235s | parsing integ: 235s | appending ESP integrity algorithm HMAC_SHA2_256_128[_0] 235s | token: '' '' '' 235s | parsing 'aes-sha256' for ESP 235s | proposal: 'aes-sha256' 235s | token: '' '' "aes" '-' 235s | token: '' "aes" '-' "sha256" '' 235s | token: '-' "sha256" '' '' 235s | appending ESP encryption algorithm AES_CBC[_0] 235s | parsing integ: 235s | appending ESP integrity algorithm HMAC_SHA2_256_128[_0] 235s | token: '' '' '' 235s | parsing 'aes-sha384' for ESP 235s | proposal: 'aes-sha384' 235s | token: '' '' "aes" '-' 235s | token: '' "aes" '-' "sha384" '' 235s | token: '-' "sha384" '' '' 235s | appending ESP encryption algorithm AES_CBC[_0] 235s | parsing integ: 235s | appending ESP integrity algorithm HMAC_SHA2_384_192[_0] 235s | token: '' '' '' 235s | parsing 'aes-sha512' for ESP 235s | proposal: 'aes-sha512' 235s | token: '' '' "aes" '-' 235s | token: '' "aes" '-' "sha512" '' 235s | token: '-' "sha512" '' '' 235s | appending ESP encryption algorithm AES_CBC[_0] 235s | parsing integ: 235s | appending ESP integrity algorithm HMAC_SHA2_512_256[_0] 235s | token: '' '' '' 235s | parsing 'aes128-aes_xcbc' for ESP 235s | proposal: 'aes128-aes_xcbc' 235s | token: '' '' "aes128" '-' 235s | token: '' "aes128" '-' "aes_xcbc" '' 235s | ike_alg_byname() failed: ESP encryption algorithm 'aes128' is not recognized 235s | token: '-' "aes_xcbc" '' '' 235s | appending ESP encryption algorithm AES_CBC[_128] 235s | parsing integ: 235s | appending ESP integrity algorithm AES_XCBC_96[_0] 235s | token: '' '' '' 235s | parsing 'aes192-sha1' for ESP 235s | proposal: 'aes192-sha1' 235s | token: '' '' "aes192" '-' 235s | token: '' "aes192" '-' "sha1" '' 235s | ike_alg_byname() failed: ESP encryption algorithm 'aes192' is not recognized 235s | token: '-' "sha1" '' '' 235s | appending ESP encryption algorithm AES_CBC[_192] 235s | parsing integ: 235s | appending ESP integrity algorithm HMAC_SHA1_96[_0] 235s | token: '' '' '' 235s | parsing 'aes256-sha1' for ESP 235s | proposal: 'aes256-sha1' 235s | token: '' '' "aes256" '-' 235s | token: '' "aes256" '-' "sha1" '' 235s | ike_alg_byname() failed: ESP encryption algorithm 'aes256' is not recognized 235s | token: '-' "sha1" '' '' 235s | appending ESP encryption algorithm AES_CBC[_256] 235s | parsing integ: 235s | appending ESP integrity algorithm HMAC_SHA1_96[_0] 235s | token: '' '' '' 235s | parsing 'aes256-sha' for ESP 235s | proposal: 'aes256-sha' 235s | token: '' '' "aes256" '-' 235s | token: '' "aes256" '-' "sha" '' 235s | ike_alg_byname() failed: ESP encryption algorithm 'aes256' is not recognized 235s | token: '-' "sha" '' '' 235s | appending ESP encryption algorithm AES_CBC[_256] 235s | parsing integ: 235s | appending ESP integrity algorithm HMAC_SHA1_96[_0] 235s | token: '' '' '' 235s | parsing 'aes256-sha2' for ESP 235s | proposal: 'aes256-sha2' 235s | token: '' '' "aes256" '-' 235s | token: '' "aes256" '-' "sha2" '' 235s | ike_alg_byname() failed: ESP encryption algorithm 'aes256' is not recognized 235s | token: '-' "sha2" '' '' 235s | appending ESP encryption algorithm AES_CBC[_256] 235s | parsing integ: 235s | appending ESP integrity algorithm HMAC_SHA2_256_128[_0] 235s | token: '' '' '' 235s | parsing 'aes256-sha2_256' for ESP 235s | proposal: 'aes256-sha2_256' 235s | token: '' '' "aes256" '-' 235s | token: '' "aes256" '-' "sha2_256" '' 235s | ike_alg_byname() failed: ESP encryption algorithm 'aes256' is not recognized 235s | token: '-' "sha2_256" '' '' 235s | appending ESP encryption algorithm AES_CBC[_256] 235s | parsing integ: 235s | appending ESP integrity algorithm HMAC_SHA2_256_128[_0] 235s | token: '' '' '' 235s | parsing 'aes256-sha2_384' for ESP 235s | proposal: 'aes256-sha2_384' 235s | token: '' '' "aes256" '-' 235s | token: '' "aes256" '-' "sha2_384" '' 235s | ike_alg_byname() failed: ESP encryption algorithm 'aes256' is not recognized 235s | token: '-' "sha2_384" '' '' 235s | appending ESP encryption algorithm AES_CBC[_256] 235s | parsing integ: 235s | appending ESP integrity algorithm HMAC_SHA2_384_192[_0] 235s | token: '' '' '' 235s | parsing 'aes256-sha2_512' for ESP 235s | proposal: 'aes256-sha2_512' 235s | token: '' '' "aes256" '-' 235s | token: '' "aes256" '-' "sha2_512" '' 235s | ike_alg_byname() failed: ESP encryption algorithm 'aes256' is not recognized 235s | token: '-' "sha2_512" '' '' 235s | appending ESP encryption algorithm AES_CBC[_256] 235s | parsing integ: 235s | appending ESP integrity algorithm HMAC_SHA2_512_256[_0] 235s | token: '' '' '' 235s | parsing 'camellia' for ESP 235s | proposal: 'camellia' 235s | token: '' '' "camellia" '' 235s | token: '' "camellia" '' '' 235s | token: '' '' '' 235s | appending ESP encryption algorithm CAMELLIA_CBC[_0] 235s | appending ESP integrity algorithm HMAC_SHA2_512_256[_0] 235s | appending ESP integrity algorithm HMAC_SHA2_256_128[_0] 235s | parsing 'camellia128' for ESP 235s | proposal: 'camellia128' 235s | token: '' '' "camellia128" '' 235s | token: '' "camellia128" '' '' 235s | ike_alg_byname() failed: ESP encryption algorithm 'camellia128' is not recognized 235s | token: '' '' '' 235s | appending ESP encryption algorithm CAMELLIA_CBC[_128] 235s | appending ESP integrity algorithm HMAC_SHA2_512_256[_0] 235s | appending ESP integrity algorithm HMAC_SHA2_256_128[_0] 235s | parsing 'camellia192' for ESP 235s | proposal: 'camellia192' 235s | token: '' '' "camellia192" '' 235s | token: '' "camellia192" '' '' 235s | ike_alg_byname() failed: ESP encryption algorithm 'camellia192' is not recognized 235s | token: '' '' '' 235s | appending ESP encryption algorithm CAMELLIA_CBC[_192] 235s | appending ESP integrity algorithm HMAC_SHA2_512_256[_0] 235s | appending ESP integrity algorithm HMAC_SHA2_256_128[_0] 235s | parsing 'camellia256' for ESP 235s | proposal: 'camellia256' 235s | token: '' '' "camellia256" '' 235s | token: '' "camellia256" '' '' 235s | ike_alg_byname() failed: ESP encryption algorithm 'camellia256' is not recognized 235s | token: '' '' '' 235s | appending ESP encryption algorithm CAMELLIA_CBC[_256] 235s | appending ESP integrity algorithm HMAC_SHA2_512_256[_0] 235s | appending ESP integrity algorithm HMAC_SHA2_256_128[_0] 235s | parsing 'aes_ccm' for ESP 235s | proposal: 'aes_ccm' 235s | token: '' '' "aes_ccm" '' 235s | token: '' "aes_ccm" '' '' 235s | token: '' '' '' 235s | appending ESP encryption algorithm AES_CCM_16[_0] 235s | appending ESP integrity algorithm NONE[_0] 235s | parsing 'aes_ccm_a-128-null' for ESP 235s | proposal: 'aes_ccm_a-128-null' 235s | token: '' '' "aes_ccm_a" '-' 235s | token: '' "aes_ccm_a" '-' "128" '-' 235s | token: '-' "128" '-' "null" '' 235s | token: '-' "null" '' '' 235s | appending ESP encryption algorithm AES_CCM_8[_128] 235s | parsing integ: 235s | appending ESP integrity algorithm NONE[_0] 235s | token: '' '' '' 235s | parsing 'aes_ccm_a-192-null' for ESP 235s | proposal: 'aes_ccm_a-192-null' 235s | token: '' '' "aes_ccm_a" '-' 235s | token: '' "aes_ccm_a" '-' "192" '-' 235s | token: '-' "192" '-' "null" '' 235s | token: '-' "null" '' '' 235s | appending ESP encryption algorithm AES_CCM_8[_192] 235s | parsing integ: 235s | appending ESP integrity algorithm NONE[_0] 235s | token: '' '' '' 235s | parsing 'aes_ccm_a-256-null' for ESP 235s | proposal: 'aes_ccm_a-256-null' 235s | token: '' '' "aes_ccm_a" '-' 235s | token: '' "aes_ccm_a" '-' "256" '-' 235s | token: '-' "256" '-' "null" '' 235s | token: '-' "null" '' '' 235s | appending ESP encryption algorithm AES_CCM_8[_256] 235s | parsing integ: 235s | appending ESP integrity algorithm NONE[_0] 235s | token: '' '' '' 235s | parsing 'aes_ccm_b-128-null' for ESP 235s | proposal: 'aes_ccm_b-128-null' 235s | token: '' '' "aes_ccm_b" '-' 235s | token: '' "aes_ccm_b" '-' "128" '-' 235s | token: '-' "128" '-' "null" '' 235s | token: '-' "null" '' '' 235s | appending ESP encryption algorithm AES_CCM_12[_128] 235s | parsing integ: 235s | appending ESP integrity algorithm NONE[_0] 235s | token: '' '' '' 235s | parsing 'aes_ccm_b-192-null' for ESP 235s | proposal: 'aes_ccm_b-192-null' 235s | token: '' '' "aes_ccm_b" '-' 235s | token: '' "aes_ccm_b" '-' "192" '-' 235s | token: '-' "192" '-' "null" '' 235s | token: '-' "null" '' '' 235s | appending ESP encryption algorithm AES_CCM_12[_192] 235s | parsing integ: 235s | appending ESP integrity algorithm NONE[_0] 235s | token: '' '' '' 235s | parsing 'aes_ccm_b-256-null' for ESP 235s | proposal: 'aes_ccm_b-256-null' 235s | token: '' '' "aes_ccm_b" '-' 235s | token: '' "aes_ccm_b" '-' "256" '-' 235s | token: '-' "256" '-' "null" '' 235s | token: '-' "null" '' '' 235s | appending ESP encryption algorithm AES_CCM_12[_256] 235s | parsing integ: 235s | appending ESP integrity algorithm NONE[_0] 235s | token: '' '' '' 235s | parsing 'aes_ccm_c-128-null' for ESP 235s | proposal: 'aes_ccm_c-128-null' 235s | token: '' '' "aes_ccm_c" '-' 235s | token: '' "aes_ccm_c" '-' "128" '-' 235s | token: '-' "128" '-' "null" '' 235s | token: '-' "null" '' '' 235s | appending ESP encryption algorithm AES_CCM_16[_128] 235s | parsing integ: 235s | appending ESP integrity algorithm NONE[_0] 235s | token: '' '' '' 235s | parsing 'aes_ccm_c-192-null' for ESP 235s | proposal: 'aes_ccm_c-192-null' 235s | token: '' '' "aes_ccm_c" '-' 235s | token: '' "aes_ccm_c" '-' "192" '-' 235s | token: '-' "192" '-' "null" '' 235s | token: '-' "null" '' '' 235s | appending ESP encryption algorithm AES_CCM_16[_192] 235s | parsing integ: 235s | appending ESP integrity algorithm NONE[_0] 235s | token: '' '' '' 235s | parsing 'aes_ccm_c-256-null' for ESP 235s | proposal: 'aes_ccm_c-256-null' 235s | token: '' '' "aes_ccm_c" '-' 235s | token: '' "aes_ccm_c" '-' "256" '-' 235s | token: '-' "256" '-' "null" '' 235s | token: '-' "null" '' '' 235s | appending ESP encryption algorithm AES_CCM_16[_256] 235s | parsing integ: 235s | appending ESP integrity algorithm NONE[_0] 235s | token: '' '' '' 235s | parsing 'aes_gcm' for ESP 235s | proposal: 'aes_gcm' 235s | token: '' '' "aes_gcm" '' 235s | token: '' "aes_gcm" '' '' 235s | token: '' '' '' 235s | appending ESP encryption algorithm AES_GCM_16[_0] 235s | appending ESP integrity algorithm NONE[_0] 235s | parsing 'aes_gcm_a-128-null' for ESP 235s | proposal: 'aes_gcm_a-128-null' 235s | token: '' '' "aes_gcm_a" '-' 235s | token: '' "aes_gcm_a" '-' "128" '-' 235s | token: '-' "128" '-' "null" '' 235s | token: '-' "null" '' '' 235s | appending ESP encryption algorithm AES_GCM_8[_128] 235s | parsing integ: 235s | appending ESP integrity algorithm NONE[_0] 235s | token: '' '' '' 235s | parsing 'aes_gcm_a-192-null' for ESP 235s | proposal: 'aes_gcm_a-192-null' 235s | token: '' '' "aes_gcm_a" '-' 235s | token: '' "aes_gcm_a" '-' "192" '-' 235s | token: '-' "192" '-' "null" '' 235s | token: '-' "null" '' '' 235s | appending ESP encryption algorithm AES_GCM_8[_192] 235s | parsing integ: 235s | appending ESP integrity algorithm NONE[_0] 235s | token: '' '' '' 235s | parsing 'aes_gcm_a-256-null' for ESP 235s | proposal: 'aes_gcm_a-256-null' 235s | token: '' '' "aes_gcm_a" '-' 235s | token: '' "aes_gcm_a" '-' "256" '-' 235s | token: '-' "256" '-' "null" '' 235s | token: '-' "null" '' '' 235s | appending ESP encryption algorithm AES_GCM_8[_256] 235s | parsing integ: 235s | appending ESP integrity algorithm NONE[_0] 235s | token: '' '' '' 235s | parsing 'aes_gcm_b-128-null' for ESP 235s | proposal: 'aes_gcm_b-128-null' 235s | token: '' '' "aes_gcm_b" '-' 235s | token: '' "aes_gcm_b" '-' "128" '-' 235s | token: '-' "128" '-' "null" '' 235s | token: '-' "null" '' '' 235s | appending ESP encryption algorithm AES_GCM_12[_128] 235s | parsing integ: 235s | appending ESP integrity algorithm NONE[_0] 235s | token: '' '' '' 235s | parsing 'aes_gcm_b-192-null' for ESP 235s | proposal: 'aes_gcm_b-192-null' 235s | token: '' '' "aes_gcm_b" '-' 235s | token: '' "aes_gcm_b" '-' "192" '-' 235s | token: '-' "192" '-' "null" '' 235s | token: '-' "null" '' '' 235s | appending ESP encryption algorithm AES_GCM_12[_192] 235s | parsing integ: 235s | appending ESP integrity algorithm NONE[_0] 235s | token: '' '' '' 235s | parsing 'aes_gcm_b-256-null' for ESP 235s | proposal: 'aes_gcm_b-256-null' 235s | token: '' '' "aes_gcm_b" '-' 235s | token: '' "aes_gcm_b" '-' "256" '-' 235s | token: '-' "256" '-' "null" '' 235s | token: '-' "null" '' '' 235s | appending ESP encryption algorithm AES_GCM_12[_256] 235s | parsing integ: 235s | appending ESP integrity algorithm NONE[_0] 235s | token: '' '' '' 235s | parsing 'aes_gcm_c-128-null' for ESP 235s | proposal: 'aes_gcm_c-128-null' 235s | token: '' '' "aes_gcm_c" '-' 235s | token: '' "aes_gcm_c" '-' "128" '-' 235s | token: '-' "128" '-' "null" '' 235s | token: '-' "null" '' '' 235s | appending ESP encryption algorithm AES_GCM_16[_128] 235s | parsing integ: 235s | appending ESP integrity algorithm NONE[_0] 235s | token: '' '' '' 235s | parsing 'aes_gcm_c-192-null' for ESP 235s | proposal: 'aes_gcm_c-192-null' 235s | token: '' '' "aes_gcm_c" '-' 235s | token: '' "aes_gcm_c" '-' "192" '-' 235s | token: '-' "192" '-' "null" '' 235s | token: '-' "null" '' '' 235s | appending ESP encryption algorithm AES_GCM_16[_192] 235s | parsing integ: 235s | appending ESP integrity algorithm NONE[_0] 235s | token: '' '' '' 235s | parsing 'aes_gcm_c-256-null' for ESP 235s | proposal: 'aes_gcm_c-256-null' 235s | token: '' '' "aes_gcm_c" '-' 235s | token: '' "aes_gcm_c" '-' "256" '-' 235s | token: '-' "256" '-' "null" '' 235s | token: '-' "null" '' '' 235s | appending ESP encryption algorithm AES_GCM_16[_256] 235s | parsing integ: 235s | appending ESP integrity algorithm NONE[_0] 235s | token: '' '' '' 235s | parsing 'aes_ccm_a-null' for ESP 235s | proposal: 'aes_ccm_a-null' 235s | token: '' '' "aes_ccm_a" '-' 235s | token: '' "aes_ccm_a" '-' "null" '' 235s | token: '-' "null" '' '' 235s | appending ESP encryption algorithm AES_CCM_8[_0] 235s | parsing integ: 235s | appending E AES_GCM_12-NONE 235s algparse -v2 'esp=aes_gcm_16-null' (expect SUCCESS) 235s AES_GCM_16-NONE 235s algparse -v2 'esp=aes_ccm_8-128-null' (expect SUCCESS) 235s AES_CCM_8_128-NONE 235s algparse -v2 'esp=aes_ccm_12-192-null' (expect SUCCESS) 235s AES_CCM_12_192-NONE 235s algparse -v2 'esp=aes_ccm_16-256-null' (expect SUCCESS) 235s AES_CCM_16_256-NONE 235s algparse -v2 'esp=aes_gcm_8-128-null' (expect SUCCESS) 235s AES_GCM_8_128-NONE 235s algparse -v2 'esp=aes_gcm_12-192-null' (expect SUCCESS) 235s AES_GCM_12_192-NONE 235s algparse -v2 'esp=aes_gcm_16-256-null' (expect SUCCESS) 235s AES_GCM_16_256-NONE 235s algparse -v2 'esp=aes_ccm_8_128-null' (expect SUCCESS) 235s AES_CCM_8_128-NONE 235s algparse -v2 'esp=aes_ccm_12_192-null' (expect SUCCESS) 235s AES_CCM_12_192-NONE 235s algparse -v2 'esp=aes_ccm_16_256-null' (expect SUCCESS) 235s AES_CCM_16_256-NONE 235s algparse -v2 'esp=aes_gcm_8_128-null' (expect SUCCESS) 235s AES_GCM_8_128-NONE 235s algparse -v2 'esp=aes_gcm_12_192-null' (expect SUCCESS) 235s AES_GCM_12_192-NONE 235s algparse -v2 'esp=aes_gcm_16_256-null' (expect SUCCESS) 235s AES_GCM_16_256-NONE 235s algparse -v2 'esp=aes_ctr' (expect SUCCESS) 235s AES_CTR-HMAC_SHA2_512_256+HMAC_SHA2_256_128 235s algparse -v2 'esp=aesctr' (expect SUCCESS) 235s AES_CTR-HMAC_SHA2_512_256+HMAC_SHA2_256_128 235s algparse -v2 'esp=aes_ctr128' (expect SUCCESS) 235s AES_CTR_128-HMAC_SHA2_512_256+HMAC_SHA2_256_128 235s algparse -v2 'esp=aes_ctr192' (expect SUCCESS) 235s AES_CTR_192-HMAC_SHA2_512_256+HMAC_SHA2_256_128 235s algparse -v2 'esp=aes_ctr256' (expect SUCCESS) 235s AES_CTR_256-HMAC_SHA2_512_256+HMAC_SHA2_256_128 235s algparse -v2 'esp=camellia_cbc_256-hmac_sha2_512_256;modp8192' (expect SUCCESS) 235s CAMELLIA_CBC_256-HMAC_SHA2_512_256 235s algparse -v2 'esp=null_auth_aes_gmac_256-null;modp8192' (expect SUCCESS) 235s NULL_AUTH_AES_GMAC_256-NONE 235s algparse -v2 'esp=3des-sha1;modp8192' (expect SUCCESS) 235s 3DES_CBC-HMAC_SHA1_96 235s algparse -v2 'esp=3des-sha1-modp8192' (expect SUCCESS) 235s 3DES_CBC-HMAC_SHA1_96 235s algparse -v2 'esp=aes-sha1,3des-sha1;modp8192' (expect SUCCESS) 235s AES_CBC-HMAC_SHA1_96 235s 3DES_CBC-HMAC_SHA1_96 235s algparse -v2 'esp=aes-sha1-modp8192,3des-sha1-modp8192' (expect SUCCESS) 235s AES_CBC-HMAC_SHA1_96 235s 3DES_CBC-HMAC_SHA1_96 235s algparse -v2 'esp=aes-sha1-modp8192,aes-sha1-modp8192,aes-sha1-modp8192' (expect SUCCESS) 235s AES_CBC-HMAC_SHA1_96 235s algparse -v2 'esp=aes;none' (expect SUCCESS) 235s AES_CBC-HMAC_SHA2_512_256+HMAC_SHA2_256_128 235s algparse -v2 'esp=aes;none,aes' (expect SUCCESS) 235s AES_CBC-HMAC_SHA2_512_256+HMAC_SHA2_256_128 235s AES_CBC-HMAC_SHA2_512_256+HMAC_SHA2_256_128 235s algparse -v2 'esp=aes;none,aes;modp2048' (expect SUCCESS) 235s AES_CBC-HMAC_SHA2_512_256+HMAC_SHA2_256_128 235s AES_CBC-HMAC_SHA2_512_256+HMAC_SHA2_256_128 235s algparse -v2 'esp=aes-sha1-none' (expect SUCCESS) 235s AES_CBC-HMAC_SHA1_96 235s algparse -v2 'esp=aes-sha1;none' (expect SUCCESS) 235s AES_CBC-HMAC_SHA1_96 235s algparse -v2 'esp=3des168-sha1' (expect ERROR) 235s ERROR: ESP encryption algorithm 3DES_CBC does not allow a key lengths 235s algparse -v2 'esp=3des-null' (expect ERROR) 235s ERROR: non-AEAD ESP encryption algorithm 3DES_CBC cannot have 'NONE' as the integrity algorithm 235s algparse -v2 'esp=aes128-null' (expect ERROR) 235s ERROR: non-AEAD ESP encryption algorithm AES_CBC cannot have 'NONE' as the integrity algorithm 235s algparse -v2 'esp=aes224-sha1' (expect ERROR) 235s ERROR: ESP encryption algorithm AES_CBC with key length 224 invalid; valid key lengths: 128, 192, 256 235s algparse -v2 'esp=aes-224-sha1' (expect ERROR) 235s ERROR: ESP encryption algorithm AES_CBC with key length 224 invalid; valid key lengths: 128, 192, 256 235s algparse -v2 'esp=aes0-sha1' (expect ERROR) 235s ERROR: ESP encryption key length is zero 235s algparse -v2 'esp=aes-0-sha1' (expect ERROR) 235s ERROR: ESP encryption key length is zero 235s algparse -v2 'esp=aes512-sha1' (expect ERROR) 235s ERROR: ESP encryption algorithm AES_CBC with key length 512 invalid; valid key lengths: 128, 192, 256 235s algparse -v2 'esp=aes-sha1555' (expect ERROR) 235s ERROR: ESP integrity algorithm 'sha1555' is not recognized 235s algparse -v2 'esp=camellia666-sha1' (expect ERROR) 235s ERROR: ESP encryption algorithm CAMELLIA_CBC with key length 666 invalid; valid key lengths: 128, 192, 256 235s algparse -v2 'esp=blowfish' (expect ERROR) 235s ERROR: ESP encryption algorithm 'blowfish' is not supported 235s algparse -v2 'esp=des-sha1' (expect ERROR) 235s ERROR: ESP encryption algorithm 'des' is not supported 235s algparse -v2 'esp=aes_ctr666' (expect ERROR) 235s ERROR: ESP encryption algorithm AES_CTR with key length 666 invalid; valid key lengths: 128, 192, 256 235s algparse -v2 'esp=aes128-sha2_128' (expect ERROR) 235s ERROR: ESP integrity algorithm 'sha2_128' is not recognized 235s algparse -v2 'esp=aes256-sha2_256-4096' (expect ERROR) 235s ERROR: ESP DH algorithm '4096' is not recognized 235s algparse -v2 'esp=aes256-sha2_256-128' (expect ERROR) 235s ERROR: ESP DH algorithm '128' is not recognized 235s algparse -v2 'esp=vanitycipher' (expect ERROR) 235s ERROR: ESP encryption algorithm 'vanitycipher' is not recognized 235s algparse -v2 'esp=ase-sah' (expect ERROR) 235s ERROR: ESP encryption algorithm 'ase' is not recognized 235s algparse -v2 'esp=aes-sah1' (expect ERROR) 235s ERROR: ESP integrity algorithm 'sah1' is not recognized 235s algparse -v2 'esp=id3' (expect ERROR) 235s ERROR: ESP encryption algorithm 'id3' is not recognized 235s algparse -v2 'esp=aes-id3' (expect ERROR) 235s ERROR: ESP integrity algorithm 'id3' is not recognized 235s algparse -v2 'esp=aes_gcm-md5' (expect ERROR) 235s ERROR: AEAD ESP encryption algorithm AES_GCM_16 must have 'NONE' as the integrity algorithm 235s algparse -v2 'esp=mars' (expect ERROR) 235s ERROR: ESP encryption algorithm 'mars' is not supported 235s algparse -v2 'esp=aes_gcm-16' (expect ERROR) 235s ERROR: ESP encryption algorithm AES_GCM_16 with key length 16 invalid; valid key lengths: 128, 192, 256 235s algparse -v2 'esp=aes_gcm-0' (expect ERROR) 235s ERROR: ESP encryption key length is zero 235s algparse -v2 'esp=aes_gcm-123456789012345' (expect ERROR) 235s ERROR: ESP encryption algorithm 'aes_gcm-123456789012345' key length WAY too big 235s algparse -v2 'esp=3des-sha1;dh22' (expect ERROR) 235s ERROR: ESP DH algorithm 'dh22' is not supported 235s algparse -v2 'esp=3des-sha1;modp8192,3des-sha2' (expect SUCCESS) 235s 3DES_CBC-HMAC_SHA1_96 235s 3DES_CBC-HMAC_SHA2_256_128 235s algparse -v2 'esp=3des-sha1-modp8192,3des-sha2' (expect SUCCESS) 235s 3DES_CBC-HMAC_SHA1_96 235s 3DES_CBC-HMAC_SHA2_256_128 235s algparse -v2 'esp=3des-sha1-modp8192,3des-sha2-modp8192' (expect SUCCESS) 235s 3DES_CBC-HMAC_SHA1_96 235s 3DES_CBC-HMAC_SHA2_256_128 235s algparse -v2 'esp=3des-sha1-modp8192,3des-sha2;modp8192' (expect SUCCESS) 235s 3DES_CBC-HMAC_SHA1_96 235s 3DES_CBC-HMAC_SHA2_256_128 235s algparse -v2 'esp=3des-sha1;modp8192,3des-sha2-modp8192' (expect SUCCESS) 235s 3DES_CBC-HMAC_SHA1_96 235s 3DES_CBC-HMAC_SHA2_256_128 235s algparse -v2 'esp=3des-sha1;modp8192,3des-sha2;modp8192' (expect SUCCESS) 235s 3DES_CBC-HMAC_SHA1_96 235s 3DES_CBC-HMAC_SHA2_256_128 235s algparse -v2 'esp=3des-sha1-modp8192,3des-sha2-modp2048' (expect SUCCESS) 235s 3DES_CBC-HMAC_SHA1_96 235s 3DES_CBC-HMAC_SHA2_256_128 235s algparse -v2 'ah' (expect SUCCESS) 235s HMAC_SHA2_512_256 235s HMAC_SHA2_256_128 235s algparse -v2 'ah=' (expect ERROR) 235s ERROR: AH proposal is empty 235s algparse -v2 'ah=md5' (expect SUCCESS) 235s HMAC_MD5_96 235s algparse -v2 'ah=sha' (expect SUCCESS) 235s HMAC_SHA1_96 235s algparse -v2 'ah=sha;modp2048' (expect SUCCESS) 235s HMAC_SHA1_96 235s algparse -v2 'ah=sha1' (expect SUCCESS) 235s HMAC_SHA1_96 235s algparse -v2 'ah=sha2' (expect SUCCESS) 235s HMAC_SHA2_256_128 235s algparse -v2 'ah=sha256' (expect SUCCESS) 235s HMAC_SHA2_256_128 235s algparse -v2 'ah=sha384' (expect SUCCESS) 235s HMAC_SHA2_384_192 235s algparse -v2 'ah=sha512' (expect SUCCESS) 235s HMAC_SHA2_512_256 235s algparse -v2 'ah=sha2_256' (expect SUCCESS) 235s HMAC_SHA2_256_128 235s algparse -v2 'ah=sha2_384' (expect SUCCESS) 235s HMAC_SHA2_384_192 235s algparse -v2 'ah=sha2_512' (expect SUCCESS) 235s HMAC_SHA2_512_256 235s algparse -v2 'ah=aes_xcbc' (expect SUCCESS) 235s AES_XCBC_96 235s algparse -v2 'ah=sha2-none' (expect SUCCESS) 235s HMAC_SHA2_256_128 235s algparse -v2 'ah=sha2;none' (expect SUCCESS) 235s HMAC_SHA2_256_128 235s algparse -v2 'ah=sha1-modp8192,sha1-modp8192,sha1-modp8192' (expect SUCCESS) 235s HMAC_SHA1_96 235s algparse -v2 'ah=aes-sha1' (expect ERROR) 235s ERROR: AH integrity algorithm 'aes' is not recognized 235s algparse -v2 'ah=vanityhash1' (expect ERROR) 235s ERROR: AH integrity algorithm 'vanityhash1' is not recognized 235s algparse -v2 'ah=aes_gcm_c-256' (expect ERROR) 235s ERROR: AH integrity algorithm 'aes_gcm_c' is not recognized 235s algparse -v2 'ah=id3' (expect ERROR) 235s ERROR: AH integrity algorithm 'id3' is not recognized 235s algparse -v2 'ah=3des' (expect ERROR) 235s ERROR: AH integrity algorithm '3des' is not recognized 235s algparse -v2 'ah=null' (expect ERROR) 235s ERROR: AH cannot have 'none' as the integrity algorithm 235s algparse -v2 'ah=aes_gcm' (expect ERROR) 235s ERROR: AH integrity algorithm 'aes_gcm' is not recognized 235s algparse -v2 'ah=aes_ccm' (expect ERROR) 235s ERROR: AH integrity algorithm 'aes_ccm' is not recognized 235s algparse -v2 'ah=ripemd' (expect ERROR) 235s ERROR: AH integrity algorithm 'ripemd' is not recognized 235s algparse -v2 'ike' (expect SUCCESS) 235s AES_GCM_16_256-HMAC_SHA2_512+HMAC_SHA2_256-DH19+DH20+DH21+DH31+MODP4096+MODP3072+MODP2048+MODP8192 235s AES_GCM_16_128-HMAC_SHA2_512+HMAC_SHA2_256-DH19+DH20+DH21+DH31+MODP4096+MODP3072+MODP2048+MODP8192 235s CHACHA20_POLY1305-HMAC_SHA2_512+HMAC_SHA2_256-DH19+DH20+DH21+DH31+MODP4096+MODP3072+MODP2048+MODP8192 235s AES_CBC_256-HMAC_SHA2_512+HMAC_SHA2_256-DH19+DH20+DH21+DH31+MODP4096+MODP3072+MODP2048+MODP8192 235s AES_CBC_128-HMAC_SHA2_512+HMAC_SHA2_256-DH19+DH20+DH21+DH31+MODP4096+MODP3072+MODP2048+MODP8192 235s algparse -v2 'ike=' (expect ERROR) 235s ERROR: IKE proposal is empty 235s algparse -v2 'ike=3des-sha1' (expect SUCCESS) 235s 3DES_CBC-HMAC_SHA1-DH19+DH20+DH21+DH31+MODP4096+MODP3072+MODP2048+MODP8192 235s algparse -v2 'ike=3des-sha1' (expect SUCCESS) 235s 3DES_CBC-HMAC_SHA1-DH19+DH20+DH21+DH31+MODP4096+MODP3072+MODP2048+MODP8192 235s algparse -v2 'ike=3des-sha1;modp1536' (expect SUCCESS) 235s 3DES_CBC-HMAC_SHA1-MODP1536 235s algparse -v2 'ike=3des;dh21' (expect SUCCESS) 235s 3DES_CBC-HMAC_SHA2_512+HMAC_SHA2_256-DH21 235s algparse -v2 'ike=3des-sha1;dh21' (expect SUCCESS) 235s 3DES_CBC-HMAC_SHA1-DH21 235s algparse -v2 'ike=3des-sha1-ecp_521' (expect SUCCESS) 235s 3DES_CBC-HMAC_SHA1-DH21 235s algparse -v2 'ike=3des+aes' (expect SUCCESS) 235s 3DES_CBC+AES_CBC-HMAC_SHA2_512+HMAC_SHA2_256-DH19+DH20+DH21+DH31+MODP4096+MODP3072+MODP2048+MODP8192 235s algparse -v2 'ike=aes;none' (expect ERROR) 235s ERROR: IKE DH algorithm 'none' not permitted 235s algparse -v2 'ike=id2' (expect ERROR) 235s ERROR: IKE encryption algorithm 'id2' is not recognized 235s algparse -v2 'ike=3des-id2' (expect ERROR) 235s ERROR: IKE PRF algorithm 'id2' is not recognized 235s algparse -v2 'ike=aes_ccm' (expect ERROR) 235s ERROR: IKE encryption algorithm 'aes_ccm' is not supported 235s algparse -v2 'ike=aes-sha1-sha2-ecp_521' (expect ERROR) 235s ERROR: IKE DH algorithm 'sha2' is not recognized 235s algparse -v2 'ike=aes-sha2-sha2;ecp_521' (expect ERROR) 235s ERROR: IKE DH algorithm 'sha2' is not recognized 235s algparse -v2 'ike=aes-sha1_96-sha2-ecp_521' (expect SUCCESS) 235s AES_CBC-HMAC_SHA1_96-HMAC_SHA2_256-DH21 235s algparse -v2 'ike=aes-sha1_96-sha2;ecp_521' (expect SUCCESS) 235s AES_CBC-HMAC_SHA1_96-HMAC_SHA2_256-DH21 235s algparse -v2 'ike=aes+aes-sha1+sha1-modp8192+modp8192' (expect SUCCESS) 235s AES_CBC-HMAC_SHA1-MODP8192 235s algparse -v2 'ike=3des+aes+aes-sha2+sha1+sha1-modp4096+modp8192+modp8192' (expect SUCCESS) 235s 3DES_CBC+AES_CBC-HMAC_SHA2_256+HMAC_SHA1-MODP4096+MODP8192 235s algparse -v2 'ike=aes+3des+aes-sha1+sha2+sha1-modp8192+modp4096+modp8192' (expect SUCCESS) 235s AES_CBC+3DES_CBC-HMAC_SHA1+HMAC_SHA2_256-MODP8192+MODP4096 235s algparse -v2 'ike=aes+aes+3des-sha1+sha1+sha2-modp8192+modp8192+modp4096' (expect SUCCESS) 235s AES_CBC+3DES_CBC-HMAC_SHA1+HMAC_SHA2_256-MODP8192+MODP4096 235s algparse -v2 'ike=aes+aes128+aes256' (expect SUCCESS) 235s AES_CBC-HMAC_SHA2_512+HMAC_SHA2_256-DH19+DH20+DH21+DH31+MODP4096+MODP3072+MODP2048+MODP8192 235s algparse -v2 'ike=aes128+aes+aes256' (expect SUCCESS) 235s AES_CBC_128+AES_CBC-HMAC_SHA2_512+HMAC_SHA2_256-DH19+DH20+DH21+DH31+MODP4096+MODP3072+MODP2048+MODP8192 235s algparse -v2 'ike=aes128+aes256+aes' (expect SUCCESS) 235s AES_CBC_128+AES_CBC_256+AES_CBC-HMAC_SHA2_512+HMAC_SHA2_256-DH19+DH20+DH21+DH31+MODP4096+MODP3072+MODP2048+MODP8192 235s algparse -v2 'ike=aes-sha1-modp8192,aes-sha1-modp8192,aes-sha1-modp8192' (expect SUCCESS) 235s AES_CBC-HMAC_SHA1-MODP8192 235s algparse -v2 'ike=aes-sha1-modp8192,aes-sha2-modp8192,aes-sha1-modp8192' (expect SUCCESS) 235s AES_CBC-HMAC_SHA1-MODP8192 235s AES_CBC-HMAC_SHA2_256-MODP8192 235s algparse -v2 'ike=aes_gcm' (expect SUCCESS) 235s AES_GCM_16-HMAC_SHA2_512+HMAC_SHA2_256-DH19+DH20+DH21+DH31+MODP4096+MODP3072+MODP2048+MODP8192 235s algparse -v2 'ike=aes_gcm-sha2' (expect SUCCESS) 235s AES_GCM_16-HMAC_SHA2_256-DH19+DH20+DH21+DH31+MODP4096+MODP3072+MODP2048+MODP8192 235s algparse -v2 'ike=aes_gcm-sha2-modp2048' (expect SUCCESS) 235s AES_GCM_16-HMAC_SHA2_256-MODP2048 235s algparse -v2 'ike=aes_gcm-sha2;modp2048' (expect SUCCESS) 235s AES_GCM_16-HMAC_SHA2_256-MODP2048 235s algparse -v2 'ike=aes_gcm-modp2048' (expect ERROR) 235s ERROR: IKE PRF algorithm 'modp2048' is not recognized 235s algparse -v2 'ike=aes_gcm;modp2048' (expect SUCCESS) 235s AES_GCM_16-HMAC_SHA2_512+HMAC_SHA2_256-MODP2048 235s algparse -v2 'ike=aes_gcm-none' (expect SUCCESS) 235s AES_GCM_16-HMAC_SHA2_512+HMAC_SHA2_256-DH19+DH20+DH21+DH31+MODP4096+MODP3072+MODP2048+MODP8192 235s algparse -v2 'ike=aes_gcm-none-sha2' (expect SUCCESS) 235s AES_GCM_16-HMAC_SHA2_256-DH19+DH20+DH21+DH31+MODP4096+MODP3072+MODP2048+MODP8192 235s algparse -v2 'ike=aes_gcm-none-sha2-modp2048' (expect SUCCESS) 235s AES_GCM_16-HMAC_SHA2_256-MODP2048 235s algparse -v2 'ike=aes_gcm-none-sha2;modp2048' (expect SUCCESS) 235s AES_GCM_16-HMAC_SHA2_256-MODP2048 235s algparse -v2 'ike=aes_gcm-none-modp2048' (expect ERROR) 235s ERROR: IKE PRF algorithm 'modp2048' is not recognized 235s algparse -v2 'ike=aes_gcm-none;modp2048' (expect SUCCESS) 235s AES_GCM_16-HMAC_SHA2_512+HMAC_SHA2_256-MODP2048 235s algparse -v2 'ike=aes_gcm-sha1-none-modp2048' (expect ERROR) 235s ERROR: IKE proposal contains unexpected 'modp2048' 235s algparse -v2 'ike=aes_gcm-sha1-none;modp2048' (expect ERROR) 235s ERROR: IKE proposal contains unexpected 'modp2048' 235s algparse -v2 'ike=aes+aes_gcm' (expect ERROR) 235s ERROR: AEAD and non-AEAD IKE encryption algorithm cannot be combined 235s algparse -v2 'ike=,' (expect ERROR) 235s ERROR: IKE encryption algorithm is empty 235s algparse -v2 'ike=aes,' (expect ERROR) 235s ERROR: IKE encryption algorithm is empty 235s algparse -v2 'ike=aes,,aes' (expect ERROR) 235s ERROR: IKE encryption algorithm is empty 235s algparse -v2 'ike=,aes' (expect ERROR) 235s ERROR: IKE encryption algorithm is empty 235s algparse -v2 'ike=-' (expect ERROR) 235s ERROR: IKE encryption algorithm is empty 235s algparse -v2 'ike=+' (expect ERROR) 235s ERROR: IKE encryption algorithm is empty 235s algparse -v2 'ike=;' (expect ERROR) 235s ERROR: IKE encryption algorithm is empty 235s algparse -v2 'ike=aes-' (expect ERROR) 235s ERROR: IKE PRF algorithm is empty 235s algparse -v2 'ike=aes+' (expect ERROR) 235s ERROR: IKE encryption algorithm is empty 235s algparse -v2 'ike=aes;' (expect ERROR) 235s ERROR: IKE DH algorithm is empty 235s algparse -v2 'ike=-aes' (expect ERROR) 235s ERROR: IKE encryption algorithm is empty 235s algparse -v2 'ike=+aes' (expect ERROR) 235s ERROR: IKE encryption algorithm is empty 235s algparse -v2 'ike=;aes' (expect ERROR) 235s ERROR: IKE encryption algorithm is empty 235s algparse -v2 'ike=aes+-' (expect ERROR) 235s ERROR: IKE encryption algorithm is empty 235s algparse -v2 'ike=aes+;' (expect ERROR) 235s ERROR: IKE encryption algorithm is empty 235s algparse -v2 'ike=aes++' (expect ERROR) 235s ERROR: IKE encryption algorithm is empty 235s testing -ta 235s initializing NSS db 235s running pluto selftest 236s SP integrity algorithm NONE[_0] 236s | token: '' '' '' 236s | parsing 'aes_ccm_b-null' for ESP 236s | proposal: 'aes_ccm_b-null' 236s | token: '' '' "aes_ccm_b" '-' 236s | token: '' "aes_ccm_b" '-' "null" '' 236s | token: '-' "null" '' '' 236s | appending ESP encryption algorithm AES_CCM_12[_0] 236s | parsing integ: 236s | appending ESP integrity algorithm NONE[_0] 236s | token: '' '' '' 236s | parsing 'aes_ccm_c-null' for ESP 236s | proposal: 'aes_ccm_c-null' 236s | token: '' '' "aes_ccm_c" '-' 236s | token: '' "aes_ccm_c" '-' "null" '' 236s | token: '-' "null" '' '' 236s | appending ESP encryption algorithm AES_CCM_16[_0] 236s | parsing integ: 236s | appending ESP integrity algorithm NONE[_0] 236s | token: '' '' '' 236s | parsing 'aes_gcm_a-null' for ESP 236s | proposal: 'aes_gcm_a-null' 236s | token: '' '' "aes_gcm_a" '-' 236s | token: '' "aes_gcm_a" '-' "null" '' 236s | token: '-' "null" '' '' 236s | appending ESP encryption algorithm AES_GCM_8[_0] 236s | parsing integ: 236s | appending ESP integrity algorithm NONE[_0] 236s | token: '' '' '' 236s | parsing 'aes_gcm_b-null' for ESP 236s | proposal: 'aes_gcm_b-null' 236s | token: '' '' "aes_gcm_b" '-' 236s | token: '' "aes_gcm_b" '-' "null" '' 236s | token: '-' "null" '' '' 236s | appending ESP encryption algorithm AES_GCM_12[_0] 236s | parsing integ: 236s | appending ESP integrity algorithm NONE[_0] 236s | token: '' '' '' 236s | parsing 'aes_gcm_c-null' for ESP 236s | proposal: 'aes_gcm_c-null' 236s | token: '' '' "aes_gcm_c" '-' 236s | token: '' "aes_gcm_c" '-' "null" '' 236s | token: '-' "null" '' '' 236s | appending ESP encryption algorithm AES_GCM_16[_0] 236s | parsing integ: 236s | appending ESP integrity algorithm NONE[_0] 236s | token: '' '' '' 236s | parsing 'aes_ccm-null' for ESP 236s | proposal: 'aes_ccm-null' 236s | token: '' '' "aes_ccm" '-' 236s | token: '' "aes_ccm" '-' "null" '' 236s | token: '-' "null" '' '' 236s | appending ESP encryption algorithm AES_CCM_16[_0] 236s | parsing integ: 236s | appending ESP integrity algorithm NONE[_0] 236s | token: '' '' '' 236s | parsing 'aes_gcm-null' for ESP 236s | proposal: 'aes_gcm-null' 236s | token: '' '' "aes_gcm" '-' 236s | token: '' "aes_gcm" '-' "null" '' 236s | token: '-' "null" '' '' 236s | appending ESP encryption algorithm AES_GCM_16[_0] 236s | parsing integ: 236s | appending ESP integrity algorithm NONE[_0] 236s | token: '' '' '' 236s | parsing 'aes_ccm-256-null' for ESP 236s | proposal: 'aes_ccm-256-null' 236s | token: '' '' "aes_ccm" '-' 236s | token: '' "aes_ccm" '-' "256" '-' 236s | token: '-' "256" '-' "null" '' 236s | token: '-' "null" '' '' 236s | appending ESP encryption algorithm AES_CCM_16[_256] 236s | parsing integ: 236s | appending ESP integrity algorithm NONE[_0] 236s | token: '' '' '' 236s | parsing 'aes_gcm-192-null' for ESP 236s | proposal: 'aes_gcm-192-null' 236s | token: '' '' "aes_gcm" '-' 236s | token: '' "aes_gcm" '-' "192" '-' 236s | token: '-' "192" '-' "null" '' 236s | token: '-' "null" '' '' 236s | appending ESP encryption algorithm AES_GCM_16[_192] 236s | parsing integ: 236s | appending ESP integrity algorithm NONE[_0] 236s | token: '' '' '' 236s | parsing 'aes_ccm_256-null' for ESP 236s | proposal: 'aes_ccm_256-null' 236s | token: '' '' "aes_ccm_256" '-' 236s | token: '' "aes_ccm_256" '-' "null" '' 236s | ike_alg_byname() failed: ESP encryption algorithm 'aes_ccm_256' is not recognized 236s | token: '-' "null" '' '' 236s | appending ESP encryption algorithm AES_CCM_16[_256] 236s | parsing integ: 236s | appending ESP integrity algorithm NONE[_0] 236s | token: '' '' '' 236s | parsing 'aes_gcm_192-null' for ESP 236s | proposal: 'aes_gcm_192-null' 236s | token: '' '' "aes_gcm_192" '-' 236s | token: '' "aes_gcm_192" '-' "null" '' 236s | ike_alg_byname() failed: ESP encryption algorithm 'aes_gcm_192' is not recognized 236s | token: '-' "null" '' '' 236s | appending ESP encryption algorithm AES_GCM_16[_192] 236s | parsing integ: 236s | appending ESP integrity algorithm NONE[_0] 236s | token: '' '' '' 236s | parsing 'aes_ccm_8-null' for ESP 236s | proposal: 'aes_ccm_8-null' 236s | token: '' '' "aes_ccm_8" '-' 236s | token: '' "aes_ccm_8" '-' "null" '' 236s | token: '-' "null" '' '' 236s | appending ESP encryption algorithm AES_CCM_8[_0] 236s | parsing integ: 236s | appending ESP integrity algorithm NONE[_0] 236s | token: '' '' '' 236s | parsing 'aes_ccm_12-null' for ESP 236s | proposal: 'aes_ccm_12-null' 236s | token: '' '' "aes_ccm_12" '-' 236s | token: '' "aes_ccm_12" '-' "null" '' 236s | token: '-' "null" '' '' 236s | appending ESP encryption algorithm AES_CCM_12[_0] 236s | parsing integ: 236s | appending ESP integrity algorithm NONE[_0] 236s | token: '' '' '' 236s | parsing 'aes_ccm_16-null' for ESP 236s | proposal: 'aes_ccm_16-null' 236s | token: '' '' "aes_ccm_16" '-' 236s | token: '' "aes_ccm_16" '-' "null" '' 236s | token: '-' "null" '' '' 236s | appending ESP encryption algorithm AES_CCM_16[_0] 236s | parsing integ: 236s | appending ESP integrity algorithm NONE[_0] 236s | token: '' '' '' 236s | parsing 'aes_gcm_8-null' for ESP 236s | proposal: 'aes_gcm_8-null' 236s | token: '' '' "aes_gcm_8" '-' 236s | token: '' "aes_gcm_8" '-' "null" '' 236s | token: '-' "null" '' '' 236s | appending ESP encryption algorithm AES_GCM_8[_0] 236s | parsing integ: 236s | appending ESP integrity algorithm NONE[_0] 236s | token: '' '' '' 236s | parsing 'aes_gcm_12-null' for ESP 236s | proposal: 'aes_gcm_12-null' 236s | token: '' '' "aes_gcm_12" '-' 236s | token: '' "aes_gcm_12" '-' "null" '' 236s | token: '-' "null" '' '' 236s | appending ESP encryption algorithm AES_GCM_12[_0] 236s | parsing integ: 236s | appending ESP integrity algorithm NONE[_0] 236s | token: '' '' '' 236s | parsing 'aes_gcm_16-null' for ESP 236s | proposal: 'aes_gcm_16-null' 236s | token: '' '' "aes_gcm_16" '-' 236s | token: '' "aes_gcm_16" '-' "null" '' 236s | token: '-' "null" '' '' 236s | appending ESP encryption algorithm AES_GCM_16[_0] 236s | parsing integ: 236s | appending ESP integrity algorithm NONE[_0] 236s | token: '' '' '' 236s | parsing 'aes_ccm_8-128-null' for ESP 236s | proposal: 'aes_ccm_8-128-null' 236s | token: '' '' "aes_ccm_8" '-' 236s | token: '' "aes_ccm_8" '-' "128" '-' 236s | token: '-' "128" '-' "null" '' 236s | token: '-' "null" '' '' 236s | appending ESP encryption algorithm AES_CCM_8[_128] 236s | parsing integ: 236s | appending ESP integrity algorithm NONE[_0] 236s | token: '' '' '' 236s | parsing 'aes_ccm_12-192-null' for ESP 236s | proposal: 'aes_ccm_12-192-null' 236s | token: '' '' "aes_ccm_12" '-' 236s | token: '' "aes_ccm_12" '-' "192" '-' 236s | token: '-' "192" '-' "null" '' 236s | token: '-' "null" '' '' 236s | appending ESP encryption algorithm AES_CCM_12[_192] 236s | parsing integ: 236s | appending ESP integrity algorithm NONE[_0] 236s | token: '' '' '' 236s | parsing 'aes_ccm_16-256-null' for ESP 236s | proposal: 'aes_ccm_16-256-null' 236s | token: '' '' "aes_ccm_16" '-' 236s | token: '' "aes_ccm_16" '-' "256" '-' 236s | token: '-' "256" '-' "null" '' 236s | token: '-' "null" '' '' 236s | appending ESP encryption algorithm AES_CCM_16[_256] 236s | parsing integ: 236s | appending ESP integrity algorithm NONE[_0] 236s | token: '' '' '' 236s | parsing 'aes_gcm_8-128-null' for ESP 236s | proposal: 'aes_gcm_8-128-null' 236s | token: '' '' "aes_gcm_8" '-' 236s | token: '' "aes_gcm_8" '-' "128" '-' 236s | token: '-' "128" '-' "null" '' 236s | token: '-' "null" '' '' 236s | appending ESP encryption algorithm AES_GCM_8[_128] 236s | parsing integ: 236s | appending ESP integrity algorithm NONE[_0] 236s | token: '' '' '' 236s | parsing 'aes_gcm_12-192-null' for ESP 236s | proposal: 'aes_gcm_12-192-null' 236s | token: '' '' "aes_gcm_12" '-' 236s | token: '' "aes_gcm_12" '-' "192" '-' 236s | token: '-' "192" '-' "null" '' 236s | token: '-' "null" '' '' 236s | appending ESP encryption algorithm AES_GCM_12[_192] 236s | parsing integ: 236s | appending ESP integrity algorithm NONE[_0] 236s | token: '' '' '' 236s | parsing 'aes_gcm_16-256-null' for ESP 236s | proposal: 'aes_gcm_16-256-null' 236s | token: '' '' "aes_gcm_16" '-' 236s | token: '' "aes_gcm_16" '-' "256" '-' 236s | token: '-' "256" '-' "null" '' 236s | token: '-' "null" '' '' 236s | appending ESP encryption algorithm AES_GCM_16[_256] 236s | parsing integ: 236s | appending ESP integrity algorithm NONE[_0] 236s | token: '' '' '' 236s | parsing 'aes_ccm_8_128-null' for ESP 236s | proposal: 'aes_ccm_8_128-null' 236s | token: '' '' "aes_ccm_8_128" '-' 236s | token: '' "aes_ccm_8_128" '-' "null" '' 236s | ike_alg_byname() failed: ESP encryption algorithm 'aes_ccm_8_128' is not recognized 236s | token: '-' "null" '' '' 236s | appending ESP encryption algorithm AES_CCM_8[_128] 236s | parsing integ: 236s | appending ESP integrity algorithm NONE[_0] 236s | token: '' '' '' 236s | parsing 'aes_ccm_12_192-null' for ESP 236s | proposal: 'aes_ccm_12_192-null' 236s | token: '' '' "aes_ccm_12_192" '-' 236s | token: '' "aes_ccm_12_192" '-' "null" '' 236s | ike_alg_byname() failed: ESP encryption algorithm 'aes_ccm_12_192' is not recognized 236s | token: '-' "null" '' '' 236s | appending ESP encryption algorithm AES_CCM_12[_192] 236s | parsing integ: 236s | appending ESP integrity algorithm NONE[_0] 236s | token: '' '' '' 236s | parsing 'aes_ccm_16_256-null' for ESP 236s | proposal: 'aes_ccm_16_256-null' 236s | token: '' '' "aes_ccm_16_256" '-' 236s | token: '' "aes_ccm_16_256" '-' "null" '' 236s | ike_alg_byname() failed: ESP encryption algorithm 'aes_ccm_16_256' is not recognized 236s | token: '-' "null" '' '' 236s | appending ESP encryption algorithm AES_CCM_16[_256] 236s | parsing integ: 236s | appending ESP integrity algorithm NONE[_0] 236s | token: '' '' '' 236s | parsing 'aes_gcm_8_128-null' for ESP 236s | proposal: 'aes_gcm_8_128-null' 236s | token: '' '' "aes_gcm_8_128" '-' 236s | token: '' "aes_gcm_8_128" '-' "null" '' 236s | ike_alg_byname() failed: ESP encryption algorithm 'aes_gcm_8_128' is not recognized 236s | token: '-' "null" '' '' 236s | appending ESP encryption algorithm AES_GCM_8[_128] 236s | parsing integ: 236s | appending ESP integrity algorithm NONE[_0] 236s | token: '' '' '' 236s | parsing 'aes_gcm_12_192-null' for ESP 236s | proposal: 'aes_gcm_12_192-null' 236s | token: '' '' "aes_gcm_12_192" '-' 236s | token: '' "aes_gcm_12_192" '-' "null" '' 236s | ike_alg_byname() failed: ESP encryption algorithm 'aes_gcm_12_192' is not recognized 236s | token: '-' "null" '' '' 236s | appending ESP encryption algorithm AES_GCM_12[_192] 236s | parsing integ: 236s | appending ESP integrity algorithm NONE[_0] 236s | token: '' '' '' 236s | parsing 'aes_gcm_16_256-null' for ESP 236s | proposal: 'aes_gcm_16_256-null' 236s | token: '' '' "aes_gcm_16_256" '-' 236s | token: '' "aes_gcm_16_256" '-' "null" '' 236s | ike_alg_byname() failed: ESP encryption algorithm 'aes_gcm_16_256' is not recognized 236s | token: '-' "null" '' '' 236s | appending ESP encryption algorithm AES_GCM_16[_256] 236s | parsing integ: 236s | appending ESP integrity algorithm NONE[_0] 236s | token: '' '' '' 236s | parsing 'aes_ctr' for ESP 236s | proposal: 'aes_ctr' 236s | token: '' '' "aes_ctr" '' 236s | token: '' "aes_ctr" '' '' 236s | token: '' '' '' 236s | appending ESP encryption algorithm AES_CTR[_0] 236s | appending ESP integrity algorithm HMAC_SHA2_512_256[_0] 236s | appending ESP integrity algorithm HMAC_SHA2_256_128[_0] 236s | parsing 'aesctr' for ESP 236s | proposal: 'aesctr' 236s | token: '' '' "aesctr" '' 236s | token: '' "aesctr" '' '' 236s | token: '' '' '' 236s | appending ESP encryption algorithm AES_CTR[_0] 236s | appending ESP integrity algorithm HMAC_SHA2_512_256[_0] 236s | appending ESP integrity algorithm HMAC_SHA2_256_128[_0] 236s | parsing 'aes_ctr128' for ESP 236s | proposal: 'aes_ctr128' 236s | token: '' '' "aes_ctr128" '' 236s | token: '' "aes_ctr128" '' '' 236s | ike_alg_byname() failed: ESP encryption algorithm 'aes_ctr128' is not recognized 236s | token: '' '' '' 236s | appending ESP encryption algorithm AES_CTR[_128] 236s | appending ESP integrity algorithm HMAC_SHA2_512_256[_0] 236s | appending ESP integrity algorithm HMAC_SHA2_256_128[_0] 236s | parsing 'aes_ctr192' for ESP 236s | proposal: 'aes_ctr192' 236s | token: '' '' "aes_ctr192" '' 236s | token: '' "aes_ctr192" '' '' 236s | ike_alg_byname() failed: ESP encryption algorithm 'aes_ctr192' is not recognized 236s | token: '' '' '' 236s | appending ESP encryption algorithm AES_CTR[_192] 236s | appending ESP integrity algorithm HMAC_SHA2_512_256[_0] 236s | appending ESP integrity algorithm HMAC_SHA2_256_128[_0] 236s | parsing 'aes_ctr256' for ESP 236s | proposal: 'aes_ctr256' 236s | token: '' '' "aes_ctr256" '' 236s | token: '' "aes_ctr256" '' '' 236s | ike_alg_byname() failed: ESP encryption algorithm 'aes_ctr256' is not recognized 236s | token: '' '' '' 236s | appending ESP encryption algorithm AES_CTR[_256] 236s | appending ESP integrity algorithm HMAC_SHA2_512_256[_0] 236s | appending ESP integrity algorithm HMAC_SHA2_256_128[_0] 236s | parsing 'camellia_cbc_256-hmac_sha2_512_256;modp8192' for ESP 236s | proposal: 'camellia_cbc_256-hmac_sha2_512_256;modp8192' 236s | token: '' '' "camellia_cbc_256" '-' 236s | token: '' "camellia_cbc_256" '-' "hmac_sha2_512_256" ';' 236s | ike_alg_byname() failed: ESP encryption algorithm 'camellia_cbc_256' is not recognized 236s | token: '-' "hmac_sha2_512_256" ';' "modp8192" '' 236s | appending ESP encryption algorithm CAMELLIA_CBC[_256] 236s | parsing integ: 236s | appending ESP integrity algorithm HMAC_SHA2_512_256[_0] 236s | token: ';' "modp8192" '' '' 236s | parsing dh: 236s | appending ESP DH algorithm MODP8192[_0] 236s | token: '' '' '' 236s ipsec algparse: ignoring ESP DH algorithm MODP8192 as PFS policy is disabled 236s | parsing 'null_auth_aes_gmac_256-null;modp8192' for ESP 236s | proposal: 'null_auth_aes_gmac_256-null;modp8192' 236s | token: '' '' "null_auth_aes_gmac_256" '-' 236s | token: '' "null_auth_aes_gmac_256" '-' "null" ';' 236s | ike_alg_byname() failed: ESP encryption algorithm 'null_auth_aes_gmac_256' is not recognized 236s | token: '-' "null" ';' "modp8192" '' 236s | appending ESP encryption algorithm NULL_AUTH_AES_GMAC[_256] 236s | parsing integ: 236s | appending ESP integrity algorithm NONE[_0] 236s | token: ';' "modp8192" '' '' 236s | parsing dh: 236s | appending ESP DH algorithm MODP8192[_0] 236s | token: '' '' '' 236s ipsec algparse: ignoring ESP DH algorithm MODP8192 as PFS policy is disabled 236s | parsing '3des-sha1;modp8192' for ESP 236s | proposal: '3des-sha1;modp8192' 236s | token: '' '' "3des" '-' 236s | token: '' "3des" '-' "sha1" ';' 236s | token: '-' "sha1" ';' "modp8192" '' 236s | appending ESP encryption algorithm 3DES_CBC[_0] 236s | parsing integ: 236s | appending ESP integrity algorithm HMAC_SHA1_96[_0] 236s | token: ';' "modp8192" '' '' 236s | parsing dh: 236s | appending ESP DH algorithm MODP8192[_0] 236s | token: '' '' '' 236s ipsec algparse: ignoring ESP DH algorithm MODP8192 as PFS policy is disabled 236s | parsing '3des-sha1-modp8192' for ESP 236s | proposal: '3des-sha1-modp8192' 236s | token: '' '' "3des" '-' 236s | token: '' "3des" '-' "sha1" '-' 236s | token: '-' "sha1" '-' "modp8192" '' 236s | appending ESP encryption algorithm 3DES_CBC[_0] 236s | parsing integ: 236s | appending ESP integrity algorithm HMAC_SHA1_96[_0] 236s | token: '-' "modp8192" '' '' 236s | parsing dh: 236s | appending ESP DH algorithm MODP8192[_0] 236s | token: '' '' '' 236s ipsec algparse: ignoring ESP DH algorithm MODP8192 as PFS policy is disabled 236s | parsing 'aes-sha1,3des-sha1;modp8192' for ESP 236s | proposal: 'aes-sha1' 236s | token: '' '' "aes" '-' 236s | token: '' "aes" '-' "sha1" '' 236s | token: '-' "sha1" '' '' 236s | appending ESP encryption algorithm AES_CBC[_0] 236s | parsing integ: 236s | appending ESP integrity algorithm HMAC_SHA1_96[_0] 236s | token: '' '' '' 236s | proposal: '3des-sha1;modp8192' 236s | token: '' '' "3des" '-' 236s | token: '' "3des" '-' "sha1" ';' 236s | token: '-' "sha1" ';' "modp8192" '' 236s | appending ESP encryption algorithm 3DES_CBC[_0] 236s | parsing integ: 236s | appending ESP integrity algorithm HMAC_SHA1_96[_0] 236s | token: ';' "modp8192" '' '' 236s | parsing dh: 236s | appending ESP DH algorithm MODP8192[_0] 236s | token: '' '' '' 236s ipsec algparse: ignoring ESP DH algorithm MODP8192 as PFS policy is disabled 236s | parsing 'aes-sha1-modp8192,3des-sha1-modp8192' for ESP 236s | proposal: 'aes-sha1-modp8192' 236s | token: '' '' "aes" '-' 236s | token: '' "aes" '-' "sha1" '-' 236s | token: '-' "sha1" '-' "modp8192" '' 236s | appending ESP encryption algorithm AES_CBC[_0] 236s | parsing integ: 236s | appending ESP integrity algorithm HMAC_SHA1_96[_0] 236s | token: '-' "modp8192" '' '' 236s | parsing dh: 236s | appending ESP DH algorithm MODP8192[_0] 236s | token: '' '' '' 236s | proposal: '3des-sha1-modp8192' 236s | token: '' '' "3des" '-' 236s | token: '' "3des" '-' "sha1" '-' 236s | token: '-' "sha1" '-' "modp8192" '' 236s | appending ESP encryption algorithm 3DES_CBC[_0] 236s | parsing integ: 236s | appending ESP integrity algorithm HMAC_SHA1_96[_0] 236s | token: '-' "modp8192" '' '' 236s | parsing dh: 236s | appending ESP DH algorithm MODP8192[_0] 236s | token: '' '' '' 236s ipsec algparse: ignoring ESP DH algorithm MODP8192 as PFS policy is disabled 236s ipsec algparse: ignoring ESP DH algorithm MODP8192 as PFS policy is disabled 236s | parsing 'aes-sha1-modp8192,aes-sha1-modp8192,aes-sha1-modp8192' for ESP 236s | proposal: 'aes-sha1-modp8192' 236s | token: '' '' "aes" '-' 236s | token: '' "aes" '-' "sha1" '-' 236s | token: '-' "sha1" '-' "modp8192" '' 236s | appending ESP encryption algorithm AES_CBC[_0] 236s | parsing integ: 236s | appending ESP integrity algorithm HMAC_SHA1_96[_0] 236s | token: '-' "modp8192" '' '' 236s | parsing dh: 236s | appending ESP DH algorithm MODP8192[_0] 236s | token: '' '' '' 236s | proposal: 'aes-sha1-modp8192' 236s | token: '' '' "aes" '-' 236s | token: '' "aes" '-' "sha1" '-' 236s | token: '-' "sha1" '-' "modp8192" '' 236s | appending ESP encryption algorithm AES_CBC[_0] 236s | parsing integ: 236s | appending ESP integrity algorithm HMAC_SHA1_96[_0] 236s | token: '-' "modp8192" '' '' 236s | parsing dh: 236s | appending ESP DH algorithm MODP8192[_0] 236s | token: '' '' '' 236s | proposal: 'aes-sha1-modp8192' 236s | token: '' '' "aes" '-' 236s | token: '' "aes" '-' "sha1" '-' 236s | token: '-' "sha1" '-' "modp8192" '' 236s | appending ESP encryption algorithm AES_CBC[_0] 236s | parsing integ: 236s | appending ESP integrity algorithm HMAC_SHA1_96[_0] 236s | token: '-' "modp8192" '' '' 236s | parsing dh: 236s | appending ESP DH algorithm MODP8192[_0] 236s | token: '' '' '' 236s ipsec algparse: ignoring ESP DH algorithm MODP8192 as PFS policy is disabled 236s | parsing 'aes;none' for ESP 236s | proposal: 'aes;none' 236s | token: '' '' "aes" ';' 236s | token: '' "aes" ';' "none" '' 236s | token: ';' "none" '' '' 236s | appending ESP encryption algorithm AES_CBC[_0] 236s | parsing dh: 236s | appending ESP DH algorithm NONE[_0] 236s | token: '' '' '' 236s | appending ESP integrity algorithm HMAC_SHA2_512_256[_0] 236s | appending ESP integrity algorithm HMAC_SHA2_256_128[_0] 236s ipsec algparse: ignoring redundant ESP DH algorithm NONE as PFS policy is disabled 236s | parsing 'aes;none,aes' for ESP 236s | proposal: 'aes;none' 236s | token: '' '' "aes" ';' 236s | token: '' "aes" ';' "none" '' 236s | token: ';' "none" '' '' 236s | appending ESP encryption algorithm AES_CBC[_0] 236s | parsing dh: 236s | appending ESP DH algorithm NONE[_0] 236s | token: '' '' '' 236s | appending ESP integrity algorithm HMAC_SHA2_512_256[_0] 236s | appending ESP integrity algorithm HMAC_SHA2_256_128[_0] 236s | proposal: 'aes' 236s | token: '' '' "aes" '' 236s | token: '' "aes" '' '' 236s | token: '' '' '' 236s | appending ESP encryption algorithm AES_CBC[_0] 236s | appending ESP integrity algorithm HMAC_SHA2_512_256[_0] 236s | appending ESP integrity algorithm HMAC_SHA2_256_128[_0] 236s ipsec algparse: ignoring redundant ESP DH algorithm NONE as PFS policy is disabled 236s | parsing 'aes;none,aes;modp2048' for ESP 236s | proposal: 'aes;none' 236s | token: '' '' "aes" ';' 236s | token: '' "aes" ';' "none" '' 236s | token: ';' "none" '' '' 236s | appending ESP encryption algorithm AES_CBC[_0] 236s | parsing dh: 236s | appending ESP DH algorithm NONE[_0] 236s | token: '' '' '' 236s | appending ESP integrity algorithm HMAC_SHA2_512_256[_0] 236s | appending ESP integrity algorithm HMAC_SHA2_256_128[_0] 236s | proposal: 'aes;modp2048' 236s | token: '' '' "aes" ';' 236s | token: '' "aes" ';' "modp2048" '' 236s | token: ';' "modp2048" '' '' 236s | appending ESP encryption algorithm AES_CBC[_0] 236s | parsing dh: 236s | appending ESP DH algorithm MODP2048[_0] 236s | token: '' '' '' 236s | appending ESP integrity algorithm HMAC_SHA2_512_256[_0] 236s | appending ESP integrity algorithm HMAC_SHA2_256_128[_0] 236s ipsec algparse: ignoring redundant ESP DH algorithm NONE as PFS policy is disabled 236s ipsec algparse: ignoring ESP DH algorithm MODP2048 as PFS policy is disabled 236s | parsing 'aes-sha1-none' for ESP 236s | proposal: 'aes-sha1-none' 236s | token: '' '' "aes" '-' 236s | token: '' "aes" '-' "sha1" '-' 236s | token: '-' "sha1" '-' "none" '' 236s | appending ESP encryption algorithm AES_CBC[_0] 236s | parsing integ: 236s | appending ESP integrity algorithm HMAC_SHA1_96[_0] 236s | token: '-' "none" '' '' 236s | parsing dh: 236s | appending ESP DH algorithm NONE[_0] 236s | token: '' '' '' 236s ipsec algparse: ignoring redundant ESP DH algorithm NONE as PFS policy is disabled 236s | parsing 'aes-sha1;none' for ESP 236s | proposal: 'aes-sha1;none' 236s | token: '' '' "aes" '-' 236s | token: '' "aes" '-' "sha1" ';' 236s | token: '-' "sha1" ';' "none" '' 236s | appending ESP encryption algorithm AES_CBC[_0] 236s | parsing integ: 236s | appending ESP integrity algorithm HMAC_SHA1_96[_0] 236s | token: ';' "none" '' '' 236s | parsing dh: 236s | appending ESP DH algorithm NONE[_0] 236s | token: '' '' '' 236s ipsec algparse: ignoring redundant ESP DH algorithm NONE as PFS policy is disabled 236s | parsing '3des168-sha1' for ESP 236s | proposal: '3des168-sha1' 236s | token: '' '' "3des168" '-' 236s | token: '' "3des168" '-' "sha1" '' 236s | ike_alg_byname() failed: ESP encryption algorithm '3des168' is not recognized 236s | parsing '3des-null' for ESP 236s | proposal: '3des-null' 236s | token: '' '' "3des" '-' 236s | token: '' "3des" '-' "null" '' 236s | token: '-' "null" '' '' 236s | appending ESP encryption algorithm 3DES_CBC[_0] 236s | parsing integ: 236s | appending ESP integrity algorithm NONE[_0] 236s | token: '' '' '' 236s | parsing 'aes128-null' for ESP 236s | proposal: 'aes128-null' 236s | token: '' '' "aes128" '-' 236s | token: '' "aes128" '-' "null" '' 236s | ike_alg_byname() failed: ESP encryption algorithm 'aes128' is not recognized 236s | token: '-' "null" '' '' 236s | appending ESP encryption algorithm AES_CBC[_128] 236s | parsing integ: 236s | appending ESP integrity algorithm NONE[_0] 236s | token: '' '' '' 236s | parsing 'aes224-sha1' for ESP 236s | proposal: 'aes224-sha1' 236s | token: '' '' "aes224" '-' 236s | token: '' "aes224" '-' "sha1" '' 236s | ike_alg_byname() failed: ESP encryption algorithm 'aes224' is not recognized 236s | parsing 'aes-224-sha1' for ESP 236s | proposal: 'aes-224-sha1' 236s | token: '' '' "aes" '-' 236s | token: '' "aes" '-' "224" '-' 236s | byname('aes') with ='224' failed: ESP encryption algorithm AES_CBC with key length 224 invalid; valid key lengths: 128, 192, 256 236s | parsing 'aes0-sha1' for ESP 236s | proposal: 'aes0-sha1' 236s | token: '' '' "aes0" '-' 236s | token: '' "aes0" '-' "sha1" '' 236s | ike_alg_byname() failed: ESP encryption algorithm 'aes0' is not recognized 236s | parsing 'aes-0-sha1' for ESP 236s | proposal: 'aes-0-sha1' 236s | token: '' '' "aes" '-' 236s | token: '' "aes" '-' "0" '-' 236s | parsing 'aes512-sha1' for ESP 236s | proposal: 'aes512-sha1' 236s | token: '' '' "aes512" '-' 236s | token: '' "aes512" '-' "sha1" '' 236s | ike_alg_byname() failed: ESP encryption algorithm 'aes512' is not recognized 236s | parsing 'aes-sha1555' for ESP 236s | proposal: 'aes-sha1555' 236s | token: '' '' "aes" '-' 236s | token: '' "aes" '-' "sha1555" '' 236s | token: '-' "sha1555" '' '' 236s | appending ESP encryption algorithm AES_CBC[_0] 236s | parsing integ: 236s | ike_alg_byname() failed: ESP integrity algorithm 'sha1555' is not recognized 236s | lookup for integrity algorithm 'sha1555' failed 236s | or - failed 'ESP integrity algorithm 'sha1555' is not recognized') 236s | parsing 'camellia666-sha1' for ESP 236s | proposal: 'camellia666-sha1' 236s | token: '' '' "camellia666" '-' 236s | token: '' "camellia666" '-' "sha1" '' 236s | ike_alg_byname() failed: ESP encryption algorithm 'camellia666' is not recognized 236s | parsing 'blowfish' for ESP 236s | proposal: 'blowfish' 236s | token: '' '' "blowfish" '' 236s | token: '' "blowfish" '' '' 236s | ike_alg_byname() failed: ESP encryption algorithm 'blowfish' is not supported 236s | parsing 'des-sha1' for ESP 236s | proposal: 'des-sha1' 236s | token: '' '' "des" '-' 236s | token: '' "des" '-' "sha1" '' 236s | ike_alg_byname() failed: ESP encryption algorithm 'des' is not supported 236s | parsing 'aes_ctr666' for ESP 236s | proposal: 'aes_ctr666' 236s | token: '' '' "aes_ctr666" '' 236s | token: '' "aes_ctr666" '' '' 236s | ike_alg_byname() failed: ESP encryption algorithm 'aes_ctr666' is not recognized 236s | parsing 'aes128-sha2_128' for ESP 236s | proposal: 'aes128-sha2_128' 236s | token: '' '' "aes128" '-' 236s | token: '' "aes128" '-' "sha2_128" '' 236s | ike_alg_byname() failed: ESP encryption algorithm 'aes128' is not recognized 236s | token: '-' "sha2_128" '' '' 236s | appending ESP encryption algorithm AES_CBC[_128] 236s | parsing integ: 236s | ike_alg_byname() failed: ESP integrity algorithm 'sha2_128' is not recognized 236s | lookup for integrity algorithm 'sha2_128' failed 236s | or - failed 'ESP integrity algorithm 'sha2_128' is not recognized') 236s | parsing 'aes256-sha2_256-4096' for ESP 236s | proposal: 'aes256-sha2_256-4096' 236s | token: '' '' "aes256" '-' 236s | token: '' "aes256" '-' "sha2_256" '-' 236s | ike_alg_byname() failed: ESP encryption algorithm 'aes256' is not recognized 236s | token: '-' "sha2_256" '-' "4096" '' 236s | appending ESP encryption algorithm AES_CBC[_256] 236s | parsing integ: 236s | appending ESP integrity algorithm HMAC_SHA2_256_128[_0] 236s | token: '-' "4096" '' '' 236s | parsing dh: 236s | ike_alg_byname() failed: ESP DH algorithm '4096' is not recognized 236s | lookup for DH algorithm '4096' failed 236s | ... failed 'ESP DH algorithm '4096' is not recognized' 236s | parsing 'aes256-sha2_256-128' for ESP 236s | proposal: 'aes256-sha2_256-128' 236s | token: '' '' "aes256" '-' 236s | token: '' "aes256" '-' "sha2_256" '-' 236s | ike_alg_byname() failed: ESP encryption algorithm 'aes256' is not recognized 236s | token: '-' "sha2_256" '-' "128" '' 236s | appending ESP encryption algorithm AES_CBC[_256] 236s | parsing integ: 236s | appending ESP integrity algorithm HMAC_SHA2_256_128[_0] 236s | token: '-' "128" '' '' 236s | parsing dh: 236s | ike_alg_byname() failed: ESP DH algorithm '128' is not recognized 236s | lookup for DH algorithm '128' failed 236s | ... failed 'ESP DH algorithm '128' is not recognized' 236s | parsing 'vanitycipher' for ESP 236s | proposal: 'vanitycipher' 236s | token: '' '' "vanitycipher" '' 236s | token: '' "vanitycipher" '' '' 236s | ike_alg_byname() failed: ESP encryption algorithm 'vanitycipher' is not recognized 236s | parsing 'ase-sah' for ESP 236s | proposal: 'ase-sah' 236s | token: '' '' "ase" '-' 236s | token: '' "ase" '-' "sah" '' 236s | ike_alg_byname() failed: ESP encryption algorithm 'ase' is not recognized 236s | parsing 'aes-sah1' for ESP 236s | proposal: 'aes-sah1' 236s | token: '' '' "aes" '-' 236s | token: '' "aes" '-' "sah1" '' 236s | token: '-' "sah1" '' '' 236s | appending ESP encryption algorithm AES_CBC[_0] 236s | parsing integ: 236s | ike_alg_byname() failed: ESP integrity algorithm 'sah1' is not recognized 236s | lookup for integrity algorithm 'sah1' failed 236s | or - failed 'ESP integrity algorithm 'sah1' is not recognized') 236s | parsing 'id3' for ESP 236s | proposal: 'id3' 236s | token: '' '' "id3" '' 236s | token: '' "id3" '' '' 236s | ike_alg_byname() failed: ESP encryption algorithm 'id3' is not recognized 236s | ike_alg_byname() failed: ESP encryption algorithm 'id3' is not recognized 236s | parsing 'aes-id3' for ESP 236s | proposal: 'aes-id3' 236s | token: '' '' "aes" '-' 236s | token: '' "aes" '-' "id3" '' 236s | token: '-' "id3" '' '' 236s | appending ESP encryption algorithm AES_CBC[_0] 236s | parsing integ: 236s | ike_alg_byname() failed: ESP integrity algorithm 'id3' is not recognized 236s | lookup for integrity algorithm 'id3' failed 236s | or - failed 'ESP integrity algorithm 'id3' is not recognized') 236s | parsing 'aes_gcm-md5' for ESP 236s | proposal: 'aes_gcm-md5' 236s | token: '' '' "aes_gcm" '-' 236s | token: '' "aes_gcm" '-' "md5" '' 236s | token: '-' "md5" '' '' 236s | appending ESP encryption algorithm AES_GCM_16[_0] 236s | parsing integ: 236s | appending ESP integrity algorithm HMAC_MD5_96[_0] 236s | token: '' '' '' 236s | parsing 'mars' for ESP 236s | proposal: 'mars' 236s | token: '' '' "mars" '' 236s | token: '' "mars" '' '' 236s | ike_alg_byname() failed: ESP encryption algorithm 'mars' is not supported 236s | parsing 'aes_gcm-16' for ESP 236s | proposal: 'aes_gcm-16' 236s | token: '' '' "aes_gcm" '-' 236s | token: '' "aes_gcm" '-' "16" '' 236s | byname('aes_gcm') with ='16' failed: ESP encryption algorithm AES_GCM_16 with key length 16 invalid; valid key lengths: 128, 192, 256 236s | parsing 'aes_gcm-0' for ESP 236s | proposal: 'aes_gcm-0' 236s | token: '' '' "aes_gcm" '-' 236s | token: '' "aes_gcm" '-' "0" '' 236s | parsing 'aes_gcm-123456789012345' for ESP 236s | proposal: 'aes_gcm-123456789012345' 236s | token: '' '' "aes_gcm" '-' 236s | token: '' "aes_gcm" '-' "123456789012345" '' 236s | parsing '3des-sha1;dh22' for ESP 236s | proposal: '3des-sha1;dh22' 236s | token: '' '' "3des" '-' 236s | token: '' "3des" '-' "sha1" ';' 236s | token: '-' "sha1" ';' "dh22" '' 236s | appending ESP encryption algorithm 3DES_CBC[_0] 236s | parsing integ: 236s | appending ESP integrity algorithm HMAC_SHA1_96[_0] 236s | token: ';' "dh22" '' '' 236s | parsing dh: 236s | ike_alg_byname() failed: ESP DH algorithm 'dh22' is not supported 236s | lookup for DH algorithm 'dh22' failed 236s | ... failed 'ESP DH algorithm 'dh22' is not supported' 236s | parsing '3des-sha1;modp8192,3des-sha2' for ESP 236s | proposal: '3des-sha1;modp8192' 236s | token: '' '' "3des" '-' 236s | token: '' "3des" '-' "sha1" ';' 236s | token: '-' "sha1" ';' "modp8192" '' 236s | appending ESP encryption algorithm 3DES_CBC[_0] 236s | parsing integ: 236s | appending ESP integrity algorithm HMAC_SHA1_96[_0] 236s | token: ';' "modp8192" '' '' 236s | parsing dh: 236s | appending ESP DH algorithm MODP8192[_0] 236s | token: '' '' '' 236s | proposal: '3des-sha2' 236s | token: '' '' "3des" '-' 236s | token: '' "3des" '-' "sha2" '' 236s | token: '-' "sha2" '' '' 236s | appending ESP encryption algorithm 3DES_CBC[_0] 236s | parsing integ: 236s | appending ESP integrity algorithm HMAC_SHA2_256_128[_0] 236s | token: '' '' '' 236s ipsec algparse: ignoring ESP DH algorithm MODP8192 as PFS policy is disabled 236s | parsing '3des-sha1-modp8192,3des-sha2' for ESP 236s | proposal: '3des-sha1-modp8192' 236s | token: '' '' "3des" '-' 236s | token: '' "3des" '-' "sha1" '-' 236s | token: '-' "sha1" '-' "modp8192" '' 236s | appending ESP encryption algorithm 3DES_CBC[_0] 236s | parsing integ: 236s | appending ESP integrity algorithm HMAC_SHA1_96[_0] 236s | token: '-' "modp8192" '' '' 236s | parsing dh: 236s | appending ESP DH algorithm MODP8192[_0] 236s | token: '' '' '' 236s | proposal: '3des-sha2' 236s | token: '' '' "3des" '-' 236s | token: '' "3des" '-' "sha2" '' 236s | token: '-' "sha2" '' '' 236s | appending ESP encryption algorithm 3DES_CBC[_0] 236s | parsing integ: 236s | appending ESP integrity algorithm HMAC_SHA2_256_128[_0] 236s | token: '' '' '' 236s ipsec algparse: ignoring ESP DH algorithm MODP8192 as PFS policy is disabled 236s | parsing '3des-sha1-modp8192,3des-sha2-modp8192' for ESP 236s | proposal: '3des-sha1-modp8192' 236s | token: '' '' "3des" '-' 236s | token: '' "3des" '-' "sha1" '-' 236s | token: '-' "sha1" '-' "modp8192" '' 236s | appending ESP encryption algorithm 3DES_CBC[_0] 236s | parsing integ: 236s | appending ESP integrity algorithm HMAC_SHA1_96[_0] 236s | token: '-' "modp8192" '' '' 236s | parsing dh: 236s | appending ESP DH algorithm MODP8192[_0] 236s | token: '' '' '' 236s | proposal: '3des-sha2-modp8192' 236s | token: '' '' "3des" '-' 236s | token: '' "3des" '-' "sha2" '-' 236s | token: '-' "sha2" '-' "modp8192" '' 236s | appending ESP encryption algorithm 3DES_CBC[_0] 236s | parsing integ: 236s | appending ESP integrity algorithm HMAC_SHA2_256_128[_0] 236s | token: '-' "modp8192" '' '' 236s | parsing dh: 236s | appending ESP DH algorithm MODP8192[_0] 236s | token: '' '' '' 236s ipsec algparse: ignoring ESP DH algorithm MODP8192 as PFS policy is disabled 236s ipsec algparse: ignoring ESP DH algorithm MODP8192 as PFS policy is disabled 236s | parsing '3des-sha1-modp8192,3des-sha2;modp8192' for ESP 236s | proposal: '3des-sha1-modp8192' 236s | token: '' '' "3des" '-' 236s | token: '' "3des" '-' "sha1" '-' 236s | token: '-' "sha1" '-' "modp8192" '' 236s | appending ESP encryption algorithm 3DES_CBC[_0] 236s | parsing integ: 236s | appending ESP integrity algorithm HMAC_SHA1_96[_0] 236s | token: '-' "modp8192" '' '' 236s | parsing dh: 236s | appending ESP DH algorithm MODP8192[_0] 236s | token: '' '' '' 236s | proposal: '3des-sha2;modp8192' 236s | token: '' '' "3des" '-' 236s | token: '' "3des" '-' "sha2" ';' 236s | token: '-' "sha2" ';' "modp8192" '' 236s | appending ESP encryption algorithm 3DES_CBC[_0] 236s | parsing integ: 236s | appending ESP integrity algorithm HMAC_SHA2_256_128[_0] 236s | token: ';' "modp8192" '' '' 236s | parsing dh: 236s | appending ESP DH algorithm MODP8192[_0] 236s | token: '' '' '' 236s ipsec algparse: ignoring ESP DH algorithm MODP8192 as PFS policy is disabled 236s ipsec algparse: ignoring ESP DH algorithm MODP8192 as PFS policy is disabled 236s | parsing '3des-sha1;modp8192,3des-sha2-modp8192' for ESP 236s | proposal: '3des-sha1;modp8192' 236s | token: '' '' "3des" '-' 236s | token: '' "3des" '-' "sha1" ';' 236s | token: '-' "sha1" ';' "modp8192" '' 236s | appending ESP encryption algorithm 3DES_CBC[_0] 236s | parsing integ: 236s | appending ESP integrity algorithm HMAC_SHA1_96[_0] 236s | token: ';' "modp8192" '' '' 236s | parsing dh: 236s | appending ESP DH algorithm MODP8192[_0] 236s | token: '' '' '' 236s | proposal: '3des-sha2-modp8192' 236s | token: '' '' "3des" '-' 236s | token: '' "3des" '-' "sha2" '-' 236s | token: '-' "sha2" '-' "modp8192" '' 236s | appending ESP encryption algorithm 3DES_CBC[_0] 236s | parsing integ: 236s | appending ESP integrity algorithm HMAC_SHA2_256_128[_0] 236s | token: '-' "modp8192" '' '' 236s | parsing dh: 236s | appending ESP DH algorithm MODP8192[_0] 236s | token: '' '' '' 236s ipsec algparse: ignoring ESP DH algorithm MODP8192 as PFS policy is disabled 236s ipsec algparse: ignoring ESP DH algorithm MODP8192 as PFS policy is disabled 236s | parsing '3des-sha1;modp8192,3des-sha2;modp8192' for ESP 236s | proposal: '3des-sha1;modp8192' 236s | token: '' '' "3des" '-' 236s | token: '' "3des" '-' "sha1" ';' 236s | token: '-' "sha1" ';' "modp8192" '' 236s | appending ESP encryption algorithm 3DES_CBC[_0] 236s | parsing integ: 236s | appending ESP integrity algorithm HMAC_SHA1_96[_0] 236s | token: ';' "modp8192" '' '' 236s | parsing dh: 236s | appending ESP DH algorithm MODP8192[_0] 236s | token: '' '' '' 236s | proposal: '3des-sha2;modp8192' 236s | token: '' '' "3des" '-' 236s | token: '' "3des" '-' "sha2" ';' 236s | token: '-' "sha2" ';' "modp8192" '' 236s | appending ESP encryption algorithm 3DES_CBC[_0] 236s | parsing integ: 236s | appending ESP integrity algorithm HMAC_SHA2_256_128[_0] 236s | token: ';' "modp8192" '' '' 236s | parsing dh: 236s | appending ESP DH algorithm MODP8192[_0] 236s | token: '' '' '' 236s ipsec algparse: ignoring ESP DH algorithm MODP8192 as PFS policy is disabled 236s ipsec algparse: ignoring ESP DH algorithm MODP8192 as PFS policy is disabled 236s | parsing '3des-sha1-modp8192,3des-sha2-modp2048' for ESP 236s | proposal: '3des-sha1-modp8192' 236s | token: '' '' "3des" '-' 236s | token: '' "3des" '-' "sha1" '-' 236s | token: '-' "sha1" '-' "modp8192" '' 236s | appending ESP encryption algorithm 3DES_CBC[_0] 236s | parsing integ: 236s | appending ESP integrity algorithm HMAC_SHA1_96[_0] 236s | token: '-' "modp8192" '' '' 236s | parsing dh: 236s | appending ESP DH algorithm MODP8192[_0] 236s | token: '' '' '' 236s | proposal: '3des-sha2-modp2048' 236s | token: '' '' "3des" '-' 236s | token: '' "3des" '-' "sha2" '-' 236s | token: '-' "sha2" '-' "modp2048" '' 236s | appending ESP encryption algorithm 3DES_CBC[_0] 236s | parsing integ: 236s | appending ESP integrity algorithm HMAC_SHA2_256_128[_0] 236s | token: '-' "modp2048" '' '' 236s | parsing dh: 236s | appending ESP DH algorithm MODP2048[_0] 236s | token: '' '' '' 236s ipsec algparse: ignoring ESP DH algorithm MODP8192 as PFS policy is disabled 236s ipsec algparse: ignoring ESP DH algorithm MODP2048 as PFS policy is disabled 236s | parsing 'SHA2_512_256,SHA2_256_128' for AH 236s | proposal: 'SHA2_512_256' 236s | token: '' '' "SHA2_512_256" '' 236s | token: '' "SHA2_512_256" '' '' 236s | parsing integ: 236s | appending AH integrity algorithm HMAC_SHA2_512_256[_0] 236s | token: '' '' '' 236s | proposal: 'SHA2_256_128' 236s | token: '' '' "SHA2_256_128" '' 236s | token: '' "SHA2_256_128" '' '' 236s | parsing integ: 236s | appending AH integrity algorithm HMAC_SHA2_256_128[_0] 236s | token: '' '' '' 236s | parsing '' for AH 236s | parsing 'md5' for AH 236s | proposal: 'md5' 236s | token: '' '' "md5" '' 236s | token: '' "md5" '' '' 236s | parsing integ: 236s | appending AH integrity algorithm HMAC_MD5_96[_0] 236s | token: '' '' '' 236s | parsing 'sha' for AH 236s | proposal: 'sha' 236s | token: '' '' "sha" '' 236s | token: '' "sha" '' '' 236s | parsing integ: 236s | appending AH integrity algorithm HMAC_SHA1_96[_0] 236s | token: '' '' '' 236s | parsing 'sha;modp2048' for AH 236s | proposal: 'sha;modp2048' 236s | token: '' '' "sha" ';' 236s | token: '' "sha" ';' "modp2048" '' 236s | parsing integ: 236s | appending AH integrity algorithm HMAC_SHA1_96[_0] 236s | token: ';' "modp2048" '' '' 236s | parsing dh: 236s | appending AH DH algorithm MODP2048[_0] 236s | token: '' '' '' 236s ipsec algparse: ignoring AH DH algorithm MODP2048 as PFS policy is disabled 236s | parsing 'sha1' for AH 236s | proposal: 'sha1' 236s | token: '' '' "sha1" '' 236s | token: '' "sha1" '' '' 236s | parsing integ: 236s | appending AH integrity algorithm HMAC_SHA1_96[_0] 236s | token: '' '' '' 236s | parsing 'sha2' for AH 236s | proposal: 'sha2' 236s | token: '' '' "sha2" '' 236s | token: '' "sha2" '' '' 236s | parsing integ: 236s | appending AH integrity algorithm HMAC_SHA2_256_128[_0] 236s | token: '' '' '' 236s | parsing 'sha256' for AH 236s | proposal: 'sha256' 236s | token: '' '' "sha256" '' 236s | token: '' "sha256" '' '' 236s | parsing integ: 236s | appending AH integrity algorithm HMAC_SHA2_256_128[_0] 236s | token: '' '' '' 236s | parsing 'sha384' for AH 236s | proposal: 'sha384' 236s | token: '' '' "sha384" '' 236s | token: '' "sha384" '' '' 236s | parsing integ: 236s | appending AH integrity algorithm HMAC_SHA2_384_192[_0] 236s | token: '' '' '' 236s | parsing 'sha512' for AH 236s | proposal: 'sha512' 236s | token: '' '' "sha512" '' 236s | token: '' "sha512" '' '' 236s | parsing integ: 236s | appending AH integrity algorithm HMAC_SHA2_512_256[_0] 236s | token: '' '' '' 236s | parsing 'sha2_256' for AH 236s | proposal: 'sha2_256' 236s | token: '' '' "sha2_256" '' 236s | token: '' "sha2_256" '' '' 236s | parsing integ: 236s | appending AH integrity algorithm HMAC_SHA2_256_128[_0] 236s | token: '' '' '' 236s | parsing 'sha2_384' for AH 236s | proposal: 'sha2_384' 236s | token: '' '' "sha2_384" '' 236s | token: '' "sha2_384" '' '' 236s | parsing integ: 236s | appending AH integrity algorithm HMAC_SHA2_384_192[_0] 236s | token: '' '' '' 236s | parsing 'sha2_512' for AH 236s | proposal: 'sha2_512' 236s | token: '' '' "sha2_512" '' 236s | token: '' "sha2_512" '' '' 236s | parsing integ: 236s | appending AH integrity algorithm HMAC_SHA2_512_256[_0] 236s | token: '' '' '' 236s | parsing 'aes_xcbc' for AH 236s | proposal: 'aes_xcbc' 236s | token: '' '' "aes_xcbc" '' 236s | token: '' "aes_xcbc" '' '' 236s | parsing integ: 236s | appending AH integrity algorithm AES_XCBC_96[_0] 236s | token: '' '' '' 236s | parsing 'sha2-none' for AH 236s | proposal: 'sha2-none' 236s | token: '' '' "sha2" '-' 236s | token: '' "sha2" '-' "none" '' 236s | parsing integ: 236s | appending AH integrity algorithm HMAC_SHA2_256_128[_0] 236s | token: '-' "none" '' '' 236s | parsing dh: 236s | appending AH DH algorithm NONE[_0] 236s | token: '' '' '' 236s ipsec algparse: ignoring redundant AH DH algorithm NONE as PFS policy is disabled 236s | parsing 'sha2;none' for AH 236s | proposal: 'sha2;none' 236s | token: '' '' "sha2" ';' 236s | token: '' "sha2" ';' "none" '' 236s | parsing integ: 236s | appending AH integrity algorithm HMAC_SHA2_256_128[_0] 236s | token: ';' "none" '' '' 236s | parsing dh: 236s | appending AH DH algorithm NONE[_0] 236s | token: '' '' '' 236s ipsec algparse: ignoring redundant AH DH algorithm NONE as PFS policy is disabled 236s | parsing 'sha1-modp8192,sha1-modp8192,sha1-modp8192' for AH 236s | proposal: 'sha1-modp8192' 236s | token: '' '' "sha1" '-' 236s | token: '' "sha1" '-' "modp8192" '' 236s | parsing integ: 236s | appending AH integrity algorithm HMAC_SHA1_96[_0] 236s | token: '-' "modp8192" '' '' 236s | parsing dh: 236s | appending AH DH algorithm MODP8192[_0] 236s | token: '' '' '' 236s | proposal: 'sha1-modp8192' 236s | token: '' '' "sha1" '-' 236s | token: '' "sha1" '-' "modp8192" '' 236s | parsing integ: 236s | appending AH integrity algorithm HMAC_SHA1_96[_0] 236s | token: '-' "modp8192" '' '' 236s | parsing dh: 236s | appending AH DH algorithm MODP8192[_0] 236s | token: '' '' '' 236s | proposal: 'sha1-modp8192' 236s | token: '' '' "sha1" '-' 236s | token: '' "sha1" '-' "modp8192" '' 236s | parsing integ: 236s | appending AH integrity algorithm HMAC_SHA1_96[_0] 236s | token: '-' "modp8192" '' '' 236s | parsing dh: 236s | appending AH DH algorithm MODP8192[_0] 236s | token: '' '' '' 236s ipsec algparse: ignoring AH DH algorithm MODP8192 as PFS policy is disabled 236s | parsing 'aes-sha1' for AH 236s | proposal: 'aes-sha1' 236s | token: '' '' "aes" '-' 236s | token: '' "aes" '-' "sha1" '' 236s | parsing integ: 236s | ike_alg_byname() failed: AH integrity algorithm 'aes' is not recognized 236s | lookup for integrity algorithm 'aes' failed 236s | or - failed 'AH integrity algorithm 'aes' is not recognized') 236s | parsing 'vanityhash1' for AH 236s | proposal: 'vanityhash1' 236s | token: '' '' "vanityhash1" '' 236s | token: '' "vanityhash1" '' '' 236s | parsing integ: 236s | ike_alg_byname() failed: AH integrity algorithm 'vanityhash1' is not recognized 236s | lookup for integrity algorithm 'vanityhash1' failed 236s | or - failed 'AH integrity algorithm 'vanityhash1' is not recognized') 236s | parsing 'aes_gcm_c-256' for AH 236s | proposal: 'aes_gcm_c-256' 236s | token: '' '' "aes_gcm_c" '-' 236s | token: '' "aes_gcm_c" '-' "256" '' 236s | parsing integ: 236s | ike_alg_byname() failed: AH integrity algorithm 'aes_gcm_c' is not recognized 236s | lookup for integrity algorithm 'aes_gcm_c' failed 236s | or - failed 'AH integrity algorithm 'aes_gcm_c' is not recognized') 236s | parsing 'id3' for AH 236s | proposal: 'id3' 236s | token: '' '' "id3" '' 236s | token: '' "id3" '' '' 236s | parsing integ: 236s | ike_alg_byname() failed: AH integrity algorithm 'id3' is not recognized 236s | lookup for integrity algorithm 'id3' failed 236s | or - failed 'AH integrity algorithm 'id3' is not recognized') 236s | parsing '3des' for AH 236s | proposal: '3des' 236s | token: '' '' "3des" '' 236s | token: '' "3des" '' '' 236s | parsing integ: 236s | ike_alg_byname() failed: AH integrity algorithm '3des' is not recognized 236s | lookup for integrity algorithm '3des' failed 236s | or - failed 'AH integrity algorithm '3des' is not recognized') 236s | parsing 'null' for AH 236s | proposal: 'null' 236s | token: '' '' "null" '' 236s | token: '' "null" '' '' 236s | parsing integ: 236s | appending AH integrity algorithm NONE[_0] 236s | token: '' '' '' 236s | parsing 'aes_gcm' for AH 236s | proposal: 'aes_gcm' 236s | token: '' '' "aes_gcm" '' 236s | token: '' "aes_gcm" '' '' 236s | parsing integ: 236s | ike_alg_byname() failed: AH integrity algorithm 'aes_gcm' is not recognized 236s | lookup for integrity algorithm 'aes_gcm' failed 236s | or - failed 'AH integrity algorithm 'aes_gcm' is not recognized') 236s | parsing 'aes_ccm' for AH 236s | proposal: 'aes_ccm' 236s | token: '' '' "aes_ccm" '' 236s | token: '' "aes_ccm" '' '' 236s | parsing integ: 236s | ike_alg_byname() failed: AH integrity algorithm 'aes_ccm' is not recognized 236s | lookup for integrity algorithm 'aes_ccm' failed 236s | or - failed 'AH integrity algorithm 'aes_ccm' is not recognized') 236s | parsing 'ripemd' for AH 236s | proposal: 'ripemd' 236s | token: '' '' "ripemd" '' 236s | token: '' "ripemd" '' '' 236s | parsing integ: 236s | ike_alg_byname() failed: AH integrity algorithm 'ripemd' is not recognized 236s | lookup for integrity algorithm 'ripemd' failed 236s | or - failed 'AH integrity algorithm 'ripemd' is not recognized') 236s | parsing 'AES_GCM_16_256,AES_GCM_16_128,CHACHA20_POLY1305,AES_CBC_256,AES_CBC_128' for IKE 236s | proposal: 'AES_GCM_16_256' 236s | token: '' '' "AES_GCM_16_256" '' 236s | token: '' "AES_GCM_16_256" '' '' 236s | ike_alg_byname() failed: IKE encryption algorithm 'AES_GCM_16_256' is not recognized 236s | token: '' '' '' 236s | appending IKE encryption algorithm AES_GCM_16[_256] 236s | appending IKE PRF algorithm HMAC_SHA2_512[_0] 236s | appending IKE PRF algorithm HMAC_SHA2_256[_0] 236s | appending IKE integrity algorithm NONE[_0] 236s | appending IKE DH algorithm DH19[_0] 236s | appending IKE DH algorithm DH20[_0] 236s | appending IKE DH algorithm DH21[_0] 236s | appending IKE DH algorithm DH31[_0] 236s | appending IKE DH algorithm MODP4096[_0] 236s | appending IKE DH algorithm MODP3072[_0] 236s | appending IKE DH algorithm MODP2048[_0] 236s | appending IKE DH algorithm MODP8192[_0] 236s | proposal: 'AES_GCM_16_128' 236s | token: '' '' "AES_GCM_16_128" '' 236s | token: '' "AES_GCM_16_128" '' '' 236s | ike_alg_byname() failed: IKE encryption algorithm 'AES_GCM_16_128' is not recognized 236s | token: '' '' '' 236s | appending IKE encryption algorithm AES_GCM_16[_128] 236s | appending IKE PRF algorithm HMAC_SHA2_512[_0] 236s | appending IKE PRF algorithm HMAC_SHA2_256[_0] 236s | appending IKE integrity algorithm NONE[_0] 236s | appending IKE DH algorithm DH19[_0] 236s | appending IKE DH algorithm DH20[_0] 236s | appending IKE DH algorithm DH21[_0] 236s | appending IKE DH algorithm DH31[_0] 236s | appending IKE DH algorithm MODP4096[_0] 236s | appending IKE DH algorithm MODP3072[_0] 236s | appending IKE DH algorithm MODP2048[_0] 236s | appending IKE DH algorithm MODP8192[_0] 236s | proposal: 'CHACHA20_POLY1305' 236s | token: '' '' "CHACHA20_POLY1305" '' 236s | token: '' "CHACHA20_POLY1305" '' '' 236s | token: '' '' '' 236s | appending IKE encryption algorithm CHACHA20_POLY1305[_0] 236s | appending IKE PRF algorithm HMAC_SHA2_512[_0] 236s | appending IKE PRF algorithm HMAC_SHA2_256[_0] 236s | appending IKE integrity algorithm NONE[_0] 236s | appending IKE DH algorithm DH19[_0] 236s | appending IKE DH algorithm DH20[_0] 236s | appending IKE DH algorithm DH21[_0] 236s | appending IKE DH algorithm DH31[_0] 236s | appending IKE DH algorithm MODP4096[_0] 236s | appending IKE DH algorithm MODP3072[_0] 236s | appending IKE DH algorithm MODP2048[_0] 236s | appending IKE DH algorithm MODP8192[_0] 236s | proposal: 'AES_CBC_256' 236s | token: '' '' "AES_CBC_256" '' 236s | token: '' "AES_CBC_256" '' '' 236s | ike_alg_byname() failed: IKE encryption algorithm 'AES_CBC_256' is not recognized 236s | token: '' '' '' 236s | appending IKE encryption algorithm AES_CBC[_256] 236s | appending IKE PRF algorithm HMAC_SHA2_512[_0] 236s | appending IKE PRF algorithm HMAC_SHA2_256[_0] 236s | appending IKE integrity algorithm HMAC_SHA2_512_256[_0] 236s | appending IKE integrity algorithm HMAC_SHA2_256_128[_0] 236s | appending IKE DH algorithm DH19[_0] 236s | appending IKE DH algorithm DH20[_0] 236s | appending IKE DH algorithm DH21[_0] 236s | appending IKE DH algorithm DH31[_0] 236s | appending IKE DH algorithm MODP4096[_0] 236s | appending IKE DH algorithm MODP3072[_0] 236s | appending IKE DH algorithm MODP2048[_0] 236s | appending IKE DH algorithm MODP8192[_0] 236s | proposal: 'AES_CBC_128' 236s | token: '' '' "AES_CBC_128" '' 236s | token: '' "AES_CBC_128" '' '' 236s | ike_alg_byname() failed: IKE encryption algorithm 'AES_CBC_128' is not recognized 236s | token: '' '' '' 236s | appending IKE encryption algorithm AES_CBC[_128] 236s | appending IKE PRF algorithm HMAC_SHA2_512[_0] 236s | appending IKE PRF algorithm HMAC_SHA2_256[_0] 236s | appending IKE integrity algorithm HMAC_SHA2_512_256[_0] 236s | appending IKE integrity algorithm HMAC_SHA2_256_128[_0] 236s | appending IKE DH algorithm DH19[_0] 236s | appending IKE DH algorithm DH20[_0] 236s | appending IKE DH algorithm DH21[_0] 236s | appending IKE DH algorithm DH31[_0] 236s | appending IKE DH algorithm MODP4096[_0] 236s | appending IKE DH algorithm MODP3072[_0] 236s | appending IKE DH algorithm MODP2048[_0] 236s | appending IKE DH algorithm MODP8192[_0] 236s | parsing '' for IKE 236s | parsing '3des-sha1' for IKE 236s | proposal: '3des-sha1' 236s | token: '' '' "3des" '-' 236s | token: '' "3des" '-' "sha1" '' 236s | token: '-' "sha1" '' '' 236s | appending IKE encryption algorithm 3DES_CBC[_0] 236s | parsing prf: 236s | appending IKE PRF algorithm HMAC_SHA1[_0] 236s | token: '' '' '' 236s | - succeeded, advancing tokens 236s | appending IKE integrity algorithm HMAC_SHA1_96[_0] 236s | appending IKE DH algorithm DH19[_0] 236s | appending IKE DH algorithm DH20[_0] 236s | appending IKE DH algorithm DH21[_0] 236s | appending IKE DH algorithm DH31[_0] 236s | appending IKE DH algorithm MODP4096[_0] 236s | appending IKE DH algorithm MODP3072[_0] 236s | appending IKE DH algorithm MODP2048[_0] 236s | appending IKE DH algorithm MODP8192[_0] 236s | parsing '3des-sha1' for IKE 236s | proposal: '3des-sha1' 236s | token: '' '' "3des" '-' 236s | token: '' "3des" '-' "sha1" '' 236s | token: '-' "sha1" '' '' 236s | appending IKE encryption algorithm 3DES_CBC[_0] 236s | parsing prf: 236s | appending IKE PRF algorithm HMAC_SHA1[_0] 236s | token: '' '' '' 236s | - succeeded, advancing tokens 236s | appending IKE integrity algorithm HMAC_SHA1_96[_0] 236s | appending IKE DH algorithm DH19[_0] 236s | appending IKE DH algorithm DH20[_0] 236s | appending IKE DH algorithm DH21[_0] 236s | appending IKE DH algorithm DH31[_0] 236s | appending IKE DH algorithm MODP4096[_0] 236s | appending IKE DH algorithm MODP3072[_0] 236s | appending IKE DH algorithm MODP2048[_0] 236s | appending IKE DH algorithm MODP8192[_0] 236s | parsing '3des-sha1;modp1536' for IKE 236s | proposal: '3des-sha1;modp1536' 236s | token: '' '' "3des" '-' 236s | token: '' "3des" '-' "sha1" ';' 236s | token: '-' "sha1" ';' "modp1536" '' 236s | appending IKE encryption algorithm 3DES_CBC[_0] 236s | parsing prf: 236s | appending IKE PRF algorithm HMAC_SHA1[_0] 236s | token: ';' "modp1536" '' '' 236s | - succeeded, advancing tokens 236s | parsing dh: 236s | appending IKE DH algorithm MODP1536[_0] 236s | token: '' '' '' 236s | appending IKE integrity algorithm HMAC_SHA1_96[_0] 236s | parsing '3des;dh21' for IKE 236s | proposal: '3des;dh21' 236s | token: '' '' "3des" ';' 236s | token: '' "3des" ';' "dh21" '' 236s | token: ';' "dh21" '' '' 236s | appending IKE encryption algorithm 3DES_CBC[_0] 236s | parsing dh: 236s | appending IKE DH algorithm DH21[_0] 236s | token: '' '' '' 236s | appending IKE PRF algorithm HMAC_SHA2_512[_0] 236s | appending IKE PRF algorithm HMAC_SHA2_256[_0] 236s | appending IKE integrity algorithm HMAC_SHA2_512_256[_0] 236s | appending IKE integrity algorithm HMAC_SHA2_256_128[_0] 236s | parsing '3des-sha1;dh21' for IKE 236s | proposal: '3des-sha1;dh21' 236s | token: '' '' "3des" '-' 236s | token: '' "3des" '-' "sha1" ';' 236s | token: '-' "sha1" ';' "dh21" '' 236s | appending IKE encryption algorithm 3DES_CBC[_0] 236s | parsing prf: 236s | appending IKE PRF algorithm HMAC_SHA1[_0] 236s | token: ';' "dh21" '' '' 236s | - succeeded, advancing tokens 236s | parsing dh: 236s | appending IKE DH algorithm DH21[_0] 236s | token: '' '' '' 236s | appending IKE integrity algorithm HMAC_SHA1_96[_0] 236s | parsing '3des-sha1-ecp_521' for IKE 236s | proposal: '3des-sha1-ecp_521' 236s | token: '' '' "3des" '-' 236s | token: '' "3des" '-' "sha1" '-' 236s | token: '-' "sha1" '-' "ecp_521" '' 236s | appending IKE encryption algorithm 3DES_CBC[_0] 236s | parsing prf: 236s | appending IKE PRF algorithm HMAC_SHA1[_0] 236s | token: '-' "ecp_521" '' '' 236s | - succeeded, advancing tokens 236s | parsing dh: 236s | appending IKE DH algorithm DH21[_0] 236s | token: '' '' '' 236s | appending IKE integrity algorithm HMAC_SHA1_96[_0] 236s | parsing '3des+aes' for IKE 236s | proposal: '3des+aes' 236s | token: '' '' "3des" '+' 236s | token: '' "3des" '+' "aes" '' 236s | token: '+' "aes" '' '' 236s | appending IKE encryption algorithm 3DES_CBC[_0] 236s | token: '' '' '' 236s | appending IKE encryption algorithm AES_CBC[_0] 236s | appending IKE PRF algorithm HMAC_SHA2_512[_0] 236s | appending IKE PRF algorithm HMAC_SHA2_256[_0] 236s | appending IKE integrity algorithm HMAC_SHA2_512_256[_0] 236s | appending IKE integrity algorithm HMAC_SHA2_256_128[_0] 236s | appending IKE DH algorithm DH19[_0] 236s | appending IKE DH algorithm DH20[_0] 236s | appending IKE DH algorithm DH21[_0] 236s | appending IKE DH algorithm DH31[_0] 236s | appending IKE DH algorithm MODP4096[_0] 236s | appending IKE DH algorithm MODP3072[_0] 236s | appending IKE DH algorithm MODP2048[_0] 236s | appending IKE DH algorithm MODP8192[_0] 236s | parsing 'aes;none' for IKE 236s | proposal: 'aes;none' 236s | token: '' '' "aes" ';' 236s | token: '' "aes" ';' "none" '' 236s | token: ';' "none" '' '' 236s | appending IKE encryption algorithm AES_CBC[_0] 236s | parsing dh: 236s | appending IKE DH algorithm NONE[_0] 236s | token: '' '' '' 236s | appending IKE PRF algorithm HMAC_SHA2_512[_0] 236s | appending IKE PRF algorithm HMAC_SHA2_256[_0] 236s | appending IKE integrity algorithm HMAC_SHA2_512_256[_0] 236s | appending IKE integrity algorithm HMAC_SHA2_256_128[_0] 236s | parsing 'id2' for IKE 236s | proposal: 'id2' 236s | token: '' '' "id2" '' 236s | token: '' "id2" '' '' 236s | ike_alg_byname() failed: IKE encryption algorithm 'id2' is not recognized 236s | ike_alg_byname() failed: IKE encryption algorithm 'id2' is not recognized 236s | parsing '3des-id2' for IKE 236s | proposal: '3des-id2' 236s | token: '' '' "3des" '-' 236s | token: '' "3des" '-' "id2" '' 236s | token: '-' "id2" '' '' 236s | appending IKE encryption algorithm 3DES_CBC[_0] 236s | parsing prf: 236s | ike_alg_byname() failed: IKE PRF algorithm 'id2' is not recognized 236s | lookup for PRF algorithm 'id2' failed 236s | - failed, saving error 'IKE PRF algorithm 'id2' is not recognized' and tossing result 236s | parsing integ: 236s | ike_alg_byname() failed: IKE integrity algorithm 'id2' is not recognized 236s | lookup for integrity algorithm 'id2' failed 236s | - and - failed, returning earlier PRF error 'IKE PRF algorithm 'id2' is not recognized' and discarding INTEG error 'IKE integrity algorithm 'id2' is not recognized') 236s | parsing 'aes_ccm' for IKE 236s | proposal: 'aes_ccm' 236s | token: '' '' "aes_ccm" '' 236s | token: '' "aes_ccm" '' '' 236s | alg_byname_ok() failed: IKE encryption algorithm 'aes_ccm' is not supported 236s | parsing 'aes-sha1-sha2-ecp_521' for IKE 236s | proposal: 'aes-sha1-sha2-ecp_521' 236s | token: '' '' "aes" '-' 236s | token: '' "aes" '-' "sha1" '-' 236s | token: '-' "sha1" '-' "sha2" '-' 236s | appending IKE encryption algorithm AES_CBC[_0] 236s | parsing prf: 236s | appending IKE PRF algorithm HMAC_SHA1[_0] 236s | token: '-' "sha2" '-' "ecp_521" '' 236s | - succeeded, advancing tokens 236s | parsing dh: 236s | ike_alg_byname() failed: IKE DH algorithm 'sha2' is not recognized 236s | lookup for DH algorithm 'sha2' failed 236s | ... failed 'IKE DH algorithm 'sha2' is not recognized' 236s | parsing 'aes-sha2-sha2;ecp_521' for IKE 236s | proposal: 'aes-sha2-sha2;ecp_521' 236s | token: '' '' "aes" '-' 236s | token: '' "aes" '-' "sha2" '-' 236s | token: '-' "sha2" '-' "sha2" ';' 236s | appending IKE encryption algorithm AES_CBC[_0] 236s | parsing prf: 236s | appending IKE PRF algorithm HMAC_SHA2_256[_0] 236s | token: '-' "sha2" ';' "ecp_521" '' 236s | - succeeded, advancing tokens 236s | parsing dh: 236s | ike_alg_byname() failed: IKE DH algorithm 'sha2' is not recognized 236s | lookup for DH algorithm 'sha2' failed 236s | ... failed 'IKE DH algorithm 'sha2' is not recognized' 236s | parsing 'aes-sha1_96-sha2-ecp_521' for IKE 236s | proposal: 'aes-sha1_96-sha2-ecp_521' 236s | token: '' '' "aes" '-' 236s | token: '' "aes" '-' "sha1_96" '-' 236s | token: '-' "sha1_96" '-' "sha2" '-' 236s | appending IKE encryption algorithm AES_CBC[_0] 236s | parsing prf: 236s | ike_alg_byname() failed: IKE PRF algorithm 'sha1_96' is not recognized 236s | lookup for PRF algorithm 'sha1_96' failed 236s | - failed, saving error 'IKE PRF algorithm 'sha1_96' is not recognized' and tossing result 236s | parsing integ: 236s | appending IKE integrity algorithm HMAC_SHA1_96[_0] 236s | token: '-' "sha2" '-' "ecp_521" '' 236s | parsing prf: 236s | appending IKE PRF algorithm HMAC_SHA2_256[_0] 236s | token: '-' "ecp_521" '' '' 236s | parsing dh: 236s | appending IKE DH algorithm DH21[_0] 236s | token: '' '' '' 236s | parsing 'aes-sha1_96-sha2;ecp_521' for IKE 236s | proposal: 'aes-sha1_96-sha2;ecp_521' 236s | token: '' '' "aes" '-' 236s | token: '' "aes" '-' "sha1_96" '-' 236s | token: '-' "sha1_96" '-' "sha2" ';' 236s | appending IKE encryption algorithm AES_CBC[_0] 236s | parsing prf: 236s | ike_alg_byname() failed: IKE PRF algorithm 'sha1_96' is not recognized 236s | lookup for PRF algorithm 'sha1_96' failed 236s | - failed, saving error 'IKE PRF algorithm 'sha1_96' is not recognized' and tossing result 236s | parsing integ: 236s | appending IKE integrity algorithm HMAC_SHA1_96[_0] 236s | token: '-' "sha2" ';' "ecp_521" '' 236s | parsing prf: 236s | appending IKE PRF algorithm HMAC_SHA2_256[_0] 236s | token: ';' "ecp_521" '' '' 236s | parsing dh: 236s | appending IKE DH algorithm DH21[_0] 236s | token: '' '' '' 236s | parsing 'aes+aes-sha1+sha1-modp8192+modp8192' for IKE 236s | proposal: 'aes+aes-sha1+sha1-modp8192+modp8192' 236s | token: '' '' "aes" '+' 236s | token: '' "aes" '+' "aes" '-' 236s | token: '+' "aes" '-' "sha1" '+' 236s | appending IKE encryption algorithm AES_CBC[_0] 236s | token: '-' "sha1" '+' "sha1" '-' 236s | appending IKE encryption algorithm AES_CBC[_0] 236s ipsec algparse: discarding duplicate IKE encryption algorithm AES_CBC 236s | parsing prf: 236s | appending IKE PRF algorithm HMAC_SHA1[_0] 236s | token: '+' "sha1" '-' "modp8192" '+' 236s | appending IKE PRF algorithm HMAC_SHA1[_0] 236s | token: '-' "modp8192" '+' "modp8192" '' 236s ipsec algparse: discarding duplicate IKE PRF algorithm HMAC_SHA1 236s | - succeeded, advancing tokens 236s | parsing dh: 236s | appending IKE DH algorithm MODP8192[_0] 236s | token: '+' "modp8192" '' '' 236s | appending IKE DH algorithm MODP8192[_0] 236s | token: '' '' '' 236s ipsec algparse: discarding duplicate IKE DH algorithm MODP8192 236s | appending IKE integrity algorithm HMAC_SHA1_96[_0] 236s | parsing '3des+aes+aes-sha2+sha1+sha1-modp4096+modp8192+modp8192' for IKE 236s | proposal: '3des+aes+aes-sha2+sha1+sha1-modp4096+modp8192+modp8192' 236s | token: '' '' "3des" '+' 236s | token: '' "3des" '+' "aes" '+' 236s | token: '+' "aes" '+' "aes" '-' 236s | appending IKE encryption algorithm 3DES_CBC[_0] 236s | token: '+' "aes" '-' "sha2" '+' 236s | appending IKE encryption algorithm AES_CBC[_0] 236s | token: '-' "sha2" '+' "sha1" '+' 236s | appending IKE encryption algorithm AES_CBC[_0] 236s ipsec algparse: discarding duplicate IKE encryption algorithm AES_CBC 236s | parsing prf: 236s | appending IKE PRF algorithm HMAC_SHA2_256[_0] 236s | token: '+' "sha1" '+' "sha1" '-' 236s | appending IKE PRF algorithm HMAC_SHA1[_0] 236s | token: '+' "sha1" '-' "modp4096" '+' 236s | appending IKE PRF algorithm HMAC_SHA1[_0] 236s | token: '-' "modp4096" '+' "modp8192" '+' 236s ipsec algparse: discarding duplicate IKE PRF algorithm HMAC_SHA1 236s | - succeeded, advancing tokens 236s | parsing dh: 236s | appending IKE DH algorithm MODP4096[_0] 236s | token: '+' "modp8192" '+' "modp8192" '' 236s | appending IKE DH algorithm MODP8192[_0] 236s | token: '+' "modp8192" '' '' 236s | appending IKE DH algorithm MODP8192[_0] 236s | token: '' '' '' 236s ipsec algparse: discarding duplicate IKE DH algorithm MODP8192 236s | appending IKE integrity algorithm HMAC_SHA2_256_128[_0] 236s | appending IKE integrity algorithm HMAC_SHA1_96[_0] 236s | parsing 'aes+3des+aes-sha1+sha2+sha1-modp8192+modp4096+modp8192' for IKE 236s | proposal: 'aes+3des+aes-sha1+sha2+sha1-modp8192+modp4096+modp8192' 236s | token: '' '' "aes" '+' 236s | token: '' "aes" '+' "3des" '+' 236s | token: '+' "3des" '+' "aes" '-' 236s | appending IKE encryption algorithm AES_CBC[_0] 236s | token: '+' "aes" '-' "sha1" '+' 236s | appending IKE encryption algorithm 3DES_CBC[_0] 236s | token: '-' "sha1" '+' "sha2" '+' 236s | appending IKE encryption algorithm AES_CBC[_0] 236s ipsec algparse: discarding duplicate IKE encryption algorithm AES_CBC 236s | parsing prf: 236s | appending IKE PRF algorithm HMAC_SHA1[_0] 236s | token: '+' "sha2" '+' "sha1" '-' 236s | appending IKE PRF algorithm HMAC_SHA2_256[_0] 236s | token: '+' "sha1" '-' "modp8192" '+' 236s | appending IKE PRF algorithm HMAC_SHA1[_0] 236s | token: '-' "modp8192" '+' "modp4096" '+' 236s ipsec algparse: discarding duplicate IKE PRF algorithm HMAC_SHA1 236s | - succeeded, advancing tokens 236s | parsing dh: 236s | appending IKE DH algorithm MODP8192[_0] 236s | token: '+' "modp4096" '+' "modp8192" '' 236s | appending IKE DH algorithm MODP4096[_0] 236s | token: '+' "modp8192" '' '' 236s | appending IKE DH algorithm MODP8192[_0] 236s | token: '' '' '' 236s ipsec algparse: discarding duplicate IKE DH algorithm MODP8192 236s | appending IKE integrity algorithm HMAC_SHA1_96[_0] 236s | appending IKE integrity algorithm HMAC_SHA2_256_128[_0] 236s | parsing 'aes+aes+3des-sha1+sha1+sha2-modp8192+modp8192+modp4096' for IKE 236s | proposal: 'aes+aes+3des-sha1+sha1+sha2-modp8192+modp8192+modp4096' 236s | token: '' '' "aes" '+' 236s | token: '' "aes" '+' "aes" '+' 236s | token: '+' "aes" '+' "3des" '-' 236s | appending IKE encryption algorithm AES_CBC[_0] 236s | token: '+' "3des" '-' "sha1" '+' 236s | appending IKE encryption algorithm AES_CBC[_0] 236s | token: '-' "sha1" '+' "sha1" '+' 236s | appending IKE encryption algorithm 3DES_CBC[_0] 236s ipsec algparse: discarding duplicate IKE encryption algorithm AES_CBC 236s | parsing prf: 236s | appending IKE PRF algorithm HMAC_SHA1[_0] 236s | token: '+' "sha1" '+' "sha2" '-' 236s | appending IKE PRF algorithm HMAC_SHA1[_0] 236s | token: '+' "sha2" '-' "modp8192" '+' 236s | appending IKE PRF algorithm HMAC_SHA2_256[_0] 236s | token: '-' "modp8192" '+' "modp8192" '+' 236s ipsec algparse: discarding duplicate IKE PRF algorithm HMAC_SHA1 236s | - succeeded, advancing tokens 236s | parsing dh: 236s | appending IKE DH algorithm MODP8192[_0] 236s | token: '+' "modp8192" '+' "modp4096" '' 236s | appending IKE DH algorithm MODP8192[_0] 236s | token: '+' "modp4096" '' '' 236s | appending IKE DH algorithm MODP4096[_0] 236s | token: '' '' '' 236s ipsec algparse: discarding duplicate IKE DH algorithm MODP8192 236s | appending IKE integrity algorithm HMAC_SHA1_96[_0] 236s | appending IKE integrity algorithm HMAC_SHA2_256_128[_0] 236s | parsing 'aes+aes128+aes256' for IKE 236s | proposal: 'aes+aes128+aes256' 236s | token: '' '' "aes" '+' 236s | token: '' "aes" '+' "aes128" '+' 236s | token: '+' "aes128" '+' "aes256" '' 236s | appending IKE encryption algorithm AES_CBC[_0] 236s | ike_alg_byname() failed: IKE encryption algorithm 'aes128' is not recognized 236s | token: '+' "aes256" '' '' 236s | appending IKE encryption algorithm AES_CBC[_128] 236s | ike_alg_byname() failed: IKE encryption algorithm 'aes256' is not recognized 236s | token: '' '' '' 236s | appending IKE encryption algorithm AES_CBC[_256] 236s ipsec algparse: discarding duplicate IKE encryption algorithm AES_CBC_128 236s ipsec algparse: discarding duplicate IKE encryption algorithm AES_CBC_256 236s | appending IKE PRF algorithm HMAC_SHA2_512[_0] 236s | appending IKE PRF algorithm HMAC_SHA2_256[_0] 236s | appending IKE integrity algorithm HMAC_SHA2_512_256[_0] 236s | appending IKE integrity algorithm HMAC_SHA2_256_128[_0] 236s | appending IKE DH algorithm DH19[_0] 236s | appending IKE DH algorithm DH20[_0] 236s | appending IKE DH algorithm DH21[_0] 236s | appending IKE DH algorithm DH31[_0] 236s | appending IKE DH algorithm MODP4096[_0] 236s | appending IKE DH algorithm MODP3072[_0] 236s | appending IKE DH algorithm MODP2048[_0] 236s | appending IKE DH algorithm MODP8192[_0] 236s | parsing 'aes128+aes+aes256' for IKE 236s | proposal: 'aes128+aes+aes256' 236s | token: '' '' "aes128" '+' 236s | token: '' "aes128" '+' "aes" '+' 236s | ike_alg_byname() failed: IKE encryption algorithm 'aes128' is not recognized 236s | token: '+' "aes" '+' "aes256" '' 236s | appending IKE encryption algorithm AES_CBC[_128] 236s | token: '+' "aes256" '' '' 236s | appending IKE encryption algorithm AES_CBC[_0] 236s | ike_alg_byname() failed: IKE encryption algorithm 'aes256' is not recognized 236s | token: '' '' '' 236s | appending IKE encryption algorithm AES_CBC[_256] 236s ipsec algparse: discarding duplicate IKE encryption algorithm AES_CBC_256 236s | appending IKE PRF algorithm HMAC_SHA2_512[_0] 236s | appending IKE PRF algorithm HMAC_SHA2_256[_0] 236s | appending IKE integrity algorithm HMAC_SHA2_512_256[_0] 236s | appending IKE integrity algorithm HMAC_SHA2_256_128[_0] 236s | appending IKE DH algorithm DH19[_0] 236s | appending IKE DH algorithm DH20[_0] 236s | appending IKE DH algorithm DH21[_0] 236s | appending IKE DH algorithm DH31[_0] 236s | appending IKE DH algorithm MODP4096[_0] 236s | appending IKE DH algorithm MODP3072[_0] 236s | appending IKE DH algorithm MODP2048[_0] 236s | appending IKE DH algorithm MODP8192[_0] 236s | parsing 'aes128+aes256+aes' for IKE 236s | proposal: 'aes128+aes256+aes' 236s | token: '' '' "aes128" '+' 236s | token: '' "aes128" '+' "aes256" '+' 236s | ike_alg_byname() failed: IKE encryption algorithm 'aes128' is not recognized 236s | token: '+' "aes256" '+' "aes" '' 236s | appending IKE encryption algorithm AES_CBC[_128] 236s | ike_alg_byname() failed: IKE encryption algorithm 'aes256' is not recognized 236s | token: '+' "aes" '' '' 236s | appending IKE encryption algorithm AES_CBC[_256] 236s | token: '' '' '' 236s | appending IKE encryption algorithm AES_CBC[_0] 236s | appending IKE PRF algorithm HMAC_SHA2_512[_0] 236s | appending IKE PRF algorithm HMAC_SHA2_256[_0] 236s | appending IKE integrity algorithm HMAC_SHA2_512_256[_0] 236s | appending IKE integrity algorithm HMAC_SHA2_256_128[_0] 236s | appending IKE DH algorithm DH19[_0] 236s | appending IKE DH algorithm DH20[_0] 236s | appending IKE DH algorithm DH21[_0] 236s | appending IKE DH algorithm DH31[_0] 236s | appending IKE DH algorithm MODP4096[_0] 236s | appending IKE DH algorithm MODP3072[_0] 236s | appending IKE DH algorithm MODP2048[_0] 236s | appending IKE DH algorithm MODP8192[_0] 236s | parsing 'aes-sha1-modp8192,aes-sha1-modp8192,aes-sha1-modp8192' for IKE 236s | proposal: 'aes-sha1-modp8192' 236s | token: '' '' "aes" '-' 236s | token: '' "aes" '-' "sha1" '-' 236s | token: '-' "sha1" '-' "modp8192" '' 236s | appending IKE encryption algorithm AES_CBC[_0] 236s | parsing prf: 236s | appending IKE PRF algorithm HMAC_SHA1[_0] 236s | token: '-' "modp8192" '' '' 236s | - succeeded, advancing tokens 236s | parsing dh: 236s | appending IKE DH algorithm MODP8192[_0] 236s | token: '' '' '' 236s | appending IKE integrity algorithm HMAC_SHA1_96[_0] 236s | proposal: 'aes-sha1-modp8192' 236s | token: '' '' "aes" '-' 236s | token: '' "aes" '-' "sha1" '-' 236s | token: '-' "sha1" '-' "modp8192" '' 236s | appending IKE encryption algorithm AES_CBC[_0] 236s | parsing prf: 236s | appending IKE PRF algorithm HMAC_SHA1[_0] 236s | token: '-' "modp8192" '' '' 236s | - succeeded, advancing tokens 236s | parsing dh: 236s | appending IKE DH algorithm MODP8192[_0] 236s | token: '' '' '' 236s | appending IKE integrity algorithm HMAC_SHA1_96[_0] 236s | proposal: 'aes-sha1-modp8192' 236s | token: '' '' "aes" '-' 236s | token: '' "aes" '-' "sha1" '-' 236s | token: '-' "sha1" '-' "modp8192" '' 236s | appending IKE encryption algorithm AES_CBC[_0] 236s | parsing prf: 236s | appending IKE PRF algorithm HMAC_SHA1[_0] 236s | token: '-' "modp8192" '' '' 236s | - succeeded, advancing tokens 236s | parsing dh: 236s | appending IKE DH algorithm MODP8192[_0] 236s | token: '' '' '' 236s | appending IKE integrity algorithm HMAC_SHA1_96[_0] 236s | parsing 'aes-sha1-modp8192,aes-sha2-modp8192,aes-sha1-modp8192' for IKE 236s | proposal: 'aes-sha1-modp8192' 236s | token: '' '' "aes" '-' 236s | token: '' "aes" '-' "sha1" '-' 236s | token: '-' "sha1" '-' "modp8192" '' 236s | appending IKE encryption algorithm AES_CBC[_0] 236s | parsing prf: 236s | appending IKE PRF algorithm HMAC_SHA1[_0] 236s | token: '-' "modp8192" '' '' 236s | - succeeded, advancing tokens 236s | parsing dh: 236s | appending IKE DH algorithm MODP8192[_0] 236s | token: '' '' '' 236s | appending IKE integrity algorithm HMAC_SHA1_96[_0] 236s | proposal: 'aes-sha2-modp8192' 236s | token: '' '' "aes" '-' 236s | token: '' "aes" '-' "sha2" '-' 236s | token: '-' "sha2" '-' "modp8192" '' 236s | appending IKE encryption algorithm AES_CBC[_0] 236s | parsing prf: 236s | appending IKE PRF algorithm HMAC_SHA2_256[_0] 236s | token: '-' "modp8192" '' '' 236s | - succeeded, advancing tokens 236s | parsing dh: 236s | appending IKE DH algorithm MODP8192[_0] 236s | token: '' '' '' 236s | appending IKE integrity algorithm HMAC_SHA2_256_128[_0] 236s | proposal: 'aes-sha1-modp8192' 236s | token: '' '' "aes" '-' 236s | token: '' "aes" '-' "sha1" '-' 236s | token: '-' "sha1" '-' "modp8192" '' 236s | appending IKE encryption algorithm AES_CBC[_0] 236s | parsing prf: 236s | appending IKE PRF algorithm HMAC_SHA1[_0] 236s | token: '-' "modp8192" '' '' 236s | - succeeded, advancing tokens 236s | parsing dh: 236s | appending IKE DH algorithm MODP8192[_0] 236s | token: '' '' '' 236s | appending IKE integrity algorithm HMAC_SHA1_96[_0] 236s | parsing 'aes_gcm' for IKE 236s | proposal: 'aes_gcm' 236s | token: '' '' "aes_gcm" '' 236s | token: '' "aes_gcm" '' '' 236s | token: '' '' '' 236s | appending IKE encryption algorithm AES_GCM_16[_0] 236s | appending IKE PRF algorithm HMAC_SHA2_512[_0] 236s | appending IKE PRF algorithm HMAC_SHA2_256[_0] 236s | appending IKE integrity algorithm NONE[_0] 236s | appending IKE DH algorithm DH19[_0] 236s | appending IKE DH algorithm DH20[_0] 236s | appending IKE DH algorithm DH21[_0] 236s | appending IKE DH algorithm DH31[_0] 236s | appending IKE DH algorithm MODP4096[_0] 236s | appending IKE DH algorithm MODP3072[_0] 236s | appending IKE DH algorithm MODP2048[_0] 236s | appending IKE DH algorithm MODP8192[_0] 236s | parsing 'aes_gcm-sha2' for IKE 236s | proposal: 'aes_gcm-sha2' 236s | token: '' '' "aes_gcm" '-' 236s | token: '' "aes_gcm" '-' "sha2" '' 236s | token: '-' "sha2" '' '' 236s | appending IKE encryption algorithm AES_GCM_16[_0] 236s | parsing prf: 236s | appending IKE PRF algorithm HMAC_SHA2_256[_0] 236s | token: '' '' '' 236s | - succeeded, advancing tokens 236s | appending IKE integrity algorithm NONE[_0] 236s | appending IKE DH algorithm DH19[_0] 236s | appending IKE DH algorithm DH20[_0] 236s | appending IKE DH algorithm DH21[_0] 236s | appending IKE DH algorithm DH31[_0] 236s | appending IKE DH algorithm MODP4096[_0] 236s | appending IKE DH algorithm MODP3072[_0] 236s | appending IKE DH algorithm MODP2048[_0] 236s | appending IKE DH algorithm MODP8192[_0] 236s | parsing 'aes_gcm-sha2-modp2048' for IKE 236s | proposal: 'aes_gcm-sha2-modp2048' 236s | token: '' '' "aes_gcm" '-' 236s | token: '' "aes_gcm" '-' "sha2" '-' 236s | token: '-' "sha2" '-' "modp2048" '' 236s | appending IKE encryption algorithm AES_GCM_16[_0] 236s | parsing prf: 236s | appending IKE PRF algorithm HMAC_SHA2_256[_0] 236s | token: '-' "modp2048" '' '' 236s | - succeeded, advancing tokens 236s | parsing dh: 236s | appending IKE DH algorithm MODP2048[_0] 236s | token: '' '' '' 236s | appending IKE integrity algorithm NONE[_0] 236s | parsing 'aes_gcm-sha2;modp2048' for IKE 236s | proposal: 'aes_gcm-sha2;modp2048' 236s | token: '' '' "aes_gcm" '-' 236s | token: '' "aes_gcm" '-' "sha2" ';' 236s | token: '-' "sha2" ';' "modp2048" '' 236s | appending IKE encryption algorithm AES_GCM_16[_0] 236s | parsing prf: 236s | appending IKE PRF algorithm HMAC_SHA2_256[_0] 236s | token: ';' "modp2048" '' '' 236s | - succeeded, advancing tokens 236s | parsing dh: 236s | appending IKE DH algorithm MODP2048[_0] 236s | token: '' '' '' 236s | appending IKE integrity algorithm NONE[_0] 236s | parsing 'aes_gcm-modp2048' for IKE 236s | proposal: 'aes_gcm-modp2048' 236s | token: '' '' "aes_gcm" '-' 236s | token: '' "aes_gcm" '-' "modp2048" '' 236s | token: '-' "modp2048" '' '' 236s | appending IKE encryption algorithm AES_GCM_16[_0] 236s | parsing prf: 236s | ike_alg_byname() failed: IKE PRF algorithm 'modp2048' is not recognized 236s | lookup for PRF algorithm 'modp2048' failed 236s | - failed, saving error 'IKE PRF algorithm 'modp2048' is not recognized' and tossing result 236s | parsing integ: 236s | ike_alg_byname() failed: IKE integrity algorithm 'modp2048' is not recognized 236s | lookup for integrity algorithm 'modp2048' failed 236s | - and - failed, returning earlier PRF error 'IKE PRF algorithm 'modp2048' is not recognized' and discarding INTEG error 'IKE integrity algorithm 'modp2048' is not recognized') 236s | parsing 'aes_gcm;modp2048' for IKE 236s | proposal: 'aes_gcm;modp2048' 236s | token: '' '' "aes_gcm" ';' 236s | token: '' "aes_gcm" ';' "modp2048" '' 236s | token: ';' "modp2048" '' '' 236s | appending IKE encryption algorithm AES_GCM_16[_0] 236s | parsing dh: 236s | appending IKE DH algorithm MODP2048[_0] 236s | token: '' '' '' 236s | appending IKE PRF algorithm HMAC_SHA2_512[_0] 236s | appending IKE PRF algorithm HMAC_SHA2_256[_0] 236s | appending IKE integrity algorithm NONE[_0] 236s | parsing 'aes_gcm-none' for IKE 236s | proposal: 'aes_gcm-none' 236s | token: '' '' "aes_gcm" '-' 236s | token: '' "aes_gcm" '-' "none" '' 236s | token: '-' "none" '' '' 236s | appending IKE encryption algorithm AES_GCM_16[_0] 236s | parsing prf: 236s | ike_alg_byname() failed: IKE PRF algorithm 'none' is not recognized 236s | lookup for PRF algorithm 'none' failed 236s | - failed, saving error 'IKE PRF algorithm 'none' is not recognized' and tossing result 236s | parsing integ: 236s | appending IKE integrity algorithm NONE[_0] 236s | token: '' '' '' 236s | appending IKE PRF algorithm HMAC_SHA2_512[_0] 236s | appending IKE PRF algorithm HMAC_SHA2_256[_0] 236s | appending IKE DH algorithm DH19[_0] 236s | appending IKE DH algorithm DH20[_0] 236s | appending IKE DH algorithm DH21[_0] 236s | appending IKE DH algorithm DH31[_0] 236s | appending IKE DH algorithm MODP4096[_0] 236s | appending IKE DH algorithm MODP3072[_0] 236s | appending IKE DH algorithm MODP2048[_0] 236s | appending IKE DH algorithm MODP8192[_0] 236s | parsing 'aes_gcm-none-sha2' for IKE 236s | proposal: 'aes_gcm-none-sha2' 236s | token: '' '' "aes_gcm" '-' 236s | token: '' "aes_gcm" '-' "none" '-' 236s | token: '-' "none" '-' "sha2" '' 236s | appending IKE encryption algorithm AES_GCM_16[_0] 236s | parsing prf: 236s | ike_alg_byname() failed: IKE PRF algorithm 'none' is not recognized 236s | lookup for PRF algorithm 'none' failed 236s | - failed, saving error 'IKE PRF algorithm 'none' is not recognized' and tossing result 236s | parsing integ: 236s | appending IKE integrity algorithm NONE[_0] 236s | token: '-' "sha2" '' '' 236s | parsing prf: 236s | appending IKE PRF algorithm HMAC_SHA2_256[_0] 236s | token: '' '' '' 236s | appending IKE DH algorithm DH19[_0] 236s | appending IKE DH algorithm DH20[_0] 236s | appending IKE DH algorithm DH21[_0] 236s | appending IKE DH algorithm DH31[_0] 236s | appending IKE DH algorithm MODP4096[_0] 236s | appending IKE DH algorithm MODP3072[_0] 236s | appending IKE DH algorithm MODP2048[_0] 236s | appending IKE DH algorithm MODP8192[_0] 236s | parsing 'aes_gcm-none-sha2-modp2048' for IKE 236s | proposal: 'aes_gcm-none-sha2-modp2048' 236s | token: '' '' "aes_gcm" '-' 236s | token: '' "aes_gcm" '-' "none" '-' 236s | token: '-' "none" '-' "sha2" '-' 236s | appending IKE encryption algorithm AES_GCM_16[_0] 236s | parsing prf: 236s | ike_alg_byname() failed: IKE PRF algorithm 'none' is not recognized 236s | lookup for PRF algorithm 'none' failed 236s | - failed, saving error 'IKE PRF algorithm 'none' is not recognized' and tossing result 236s | parsing integ: 236s | appending IKE integrity algorithm NONE[_0] 236s | token: '-' "sha2" '-' "modp2048" '' 236s | parsing prf: 236s | appending IKE PRF algorithm HMAC_SHA2_256[_0] 236s | token: '-' "modp2048" '' '' 236s | parsing dh: 236s | appending IKE DH algorithm MODP2048[_0] 236s | token: '' '' '' 236s | parsing 'aes_gcm-none-sha2;modp2048' for IKE 236s | proposal: 'aes_gcm-none-sha2;modp2048' 236s | token: '' '' "aes_gcm" '-' 236s | token: '' "aes_gcm" '-' "none" '-' 236s | token: '-' "none" '-' "sha2" ';' 236s | appending IKE encryption algorithm AES_GCM_16[_0] 236s | parsing prf: 236s | ike_alg_byname() failed: IKE PRF algorithm 'none' is not recognized 236s | lookup for PRF algorithm 'none' failed 236s | - failed, saving error 'IKE PRF algorithm 'none' is not recognized' and tossing result 236s | parsing integ: 236s | appending IKE integrity algorithm NONE[_0] 236s | token: '-' "sha2" ';' "modp2048" '' 236s | parsing prf: 236s | appending IKE PRF algorithm HMAC_SHA2_256[_0] 236s | token: ';' "modp2048" '' '' 236s | parsing dh: 236s | appending IKE DH algorithm MODP2048[_0] 236s | token: '' '' '' 236s | parsing 'aes_gcm-none-modp2048' for IKE 236s | proposal: 'aes_gcm-none-modp2048' 236s | token: '' '' "aes_gcm" '-' 236s | token: '' "aes_gcm" '-' "none" '-' 236s | token: '-' "none" '-' "modp2048" '' 236s | appending IKE encryption algorithm AES_GCM_16[_0] 236s | parsing prf: 236s | ike_alg_byname() failed: IKE PRF algorithm 'none' is not recognized 236s | lookup for PRF algorithm 'none' failed 236s | - failed, saving error 'IKE PRF algorithm 'none' is not recognized' and tossing result 236s | parsing integ: 236s | appending IKE integrity algorithm NONE[_0] 236s | token: '-' "modp2048" '' '' 236s | parsing prf: 236s | ike_alg_byname() failed: IKE PRF algorithm 'modp2048' is not recognized 236s | lookup for PRF algorithm 'modp2048' failed 236s | -- failed 'IKE PRF algorithm 'modp2048' is not recognized' 236s | parsing 'aes_gcm-none;modp2048' for IKE 236s | proposal: 'aes_gcm-none;modp2048' 236s | token: '' '' "aes_gcm" '-' 236s | token: '' "aes_gcm" '-' "none" ';' 236s | token: '-' "none" ';' "modp2048" '' 236s | appending IKE encryption algorithm AES_GCM_16[_0] 236s | parsing prf: 236s | ike_alg_byname() failed: IKE PRF algorithm 'none' is not recognized 236s | lookup for PRF algorithm 'none' failed 236s | - failed, saving error 'IKE PRF algorithm 'none' is not recognized' and tossing result 236s | parsing integ: 236s | appending IKE integrity algorithm NONE[_0] 236s | token: ';' "modp2048" '' '' 236s | parsing dh: 236s | appending IKE DH algorithm MODP2048[_0] 236s | token: '' '' '' 236s | appending IKE PRF algorithm HMAC_SHA2_512[_0] 236s | appending IKE PRF algorithm HMAC_SHA2_256[_0] 236s | parsing 'aes_gcm-sha1-none-modp2048' for IKE 236s | proposal: 'aes_gcm-sha1-none-modp2048' 236s | token: '' '' "aes_gcm" '-' 236s | token: '' "aes_gcm" '-' "sha1" '-' 236s | token: '-' "sha1" '-' "none" '-' 236s | appending IKE encryption algorithm AES_GCM_16[_0] 236s | parsing prf: 236s | appending IKE PRF algorithm HMAC_SHA1[_0] 236s | token: '-' "none" '-' "modp2048" '' 236s | - succeeded, advancing tokens 236s | parsing dh: 236s | appending IKE DH algorithm NONE[_0] 236s | token: '-' "modp2048" '' '' 236s | parsing 'aes_gcm-sha1-none;modp2048' for IKE 236s | proposal: 'aes_gcm-sha1-none;modp2048' 236s | token: '' '' "aes_gcm" '-' 236s | token: '' "aes_gcm" '-' "sha1" '-' 236s | token: '-' "sha1" '-' "none" ';' 236s | appending IKE encryption algorithm AES_GCM_16[_0] 236s | parsing prf: 236s | appending IKE PRF algorithm HMAC_SHA1[_0] 236s | token: '-' "none" ';' "modp2048" '' 236s | - succeeded, advancing tokens 236s | parsing dh: 236s | appending IKE DH algorithm NONE[_0] 236s | token: ';' "modp2048" '' '' 236s | parsing 'aes+aes_gcm' for IKE 236s | proposal: 'aes+aes_gcm' 236s | token: '' '' "aes" '+' 236s | token: '' "aes" '+' "aes_gcm" '' 236s | token: '+' "aes_gcm" '' '' 236s | appending IKE encryption algorithm AES_CBC[_0] 236s | token: '' '' '' 236s | appending IKE encryption algorithm AES_GCM_16[_0] 236s | appending IKE PRF algorithm HMAC_SHA2_512[_0] 236s | appending IKE PRF algorithm HMAC_SHA2_256[_0] 236s | appending IKE DH algorithm DH19[_0] 236s | appending IKE DH algorithm DH20[_0] 236s | appending IKE DH algorithm DH21[_0] 236s | appending IKE DH algorithm DH31[_0] 236s | appending IKE DH algorithm MODP4096[_0] 236s | appending IKE DH algorithm MODP3072[_0] 236s | appending IKE DH algorithm MODP2048[_0] 236s | appending IKE DH algorithm MODP8192[_0] 236s | parsing ',' for IKE 236s | proposal: '' 236s | token: '' '' "" '' 236s | token: '' "" '' '' 236s | parsing 'aes,' for IKE 236s | proposal: 'aes' 236s | token: '' '' "aes" '' 236s | token: '' "aes" '' '' 236s | token: '' '' '' 236s | appending IKE encryption algorithm AES_CBC[_0] 236s | appending IKE PRF algorithm HMAC_SHA2_512[_0] 236s | appending IKE PRF algorithm HMAC_SHA2_256[_0] 236s | appending IKE integrity algorithm HMAC_SHA2_512_256[_0] 236s | appending IKE integrity algorithm HMAC_SHA2_256_128[_0] 236s | appending IKE DH algorithm DH19[_0] 236s | appending IKE DH algorithm DH20[_0] 236s | appending IKE DH algorithm DH21[_0] 236s | appending IKE DH algorithm DH31[_0] 236s | appending IKE DH algorithm MODP4096[_0] 236s | appending IKE DH algorithm MODP3072[_0] 236s | appending IKE DH algorithm MODP2048[_0] 236s | appending IKE DH algorithm MODP8192[_0] 236s | proposal: '' 236s | token: '' '' "" '' 236s | token: '' "" '' '' 236s | parsing 'aes,,aes' for IKE 236s | proposal: 'aes' 236s | token: '' '' "aes" '' 236s | token: '' "aes" '' '' 236s | token: '' '' '' 236s | appending IKE encryption algorithm AES_CBC[_0] 236s | appending IKE PRF algorithm HMAC_SHA2_512[_0] 236s | appending IKE PRF algorithm HMAC_SHA2_256[_0] 236s | appending IKE integrity algorithm HMAC_SHA2_512_256[_0] 236s | appending IKE integrity algorithm HMAC_SHA2_256_128[_0] 236s | appending IKE DH algorithm DH19[_0] 236s | appending IKE DH algorithm DH20[_0] 236s | appending IKE DH algorithm DH21[_0] 236s | appending IKE DH algorithm DH31[_0] 236s | appending IKE DH algorithm MODP4096[_0] 236s | appending IKE DH algorithm MODP3072[_0] 236s | appending IKE DH algorithm MODP2048[_0] 236s | appending IKE DH algorithm MODP8192[_0] 236s | proposal: '' 236s | token: '' '' "" '' 236s | token: '' "" '' '' 236s | parsing ',aes' for IKE 236s | proposal: '' 236s | token: '' '' "" '' 236s | token: '' "" '' '' 236s | parsing '-' for IKE 236s | proposal: '-' 236s | token: '' '' "" '-' 236s | token: '' "" '-' "" '' 236s | parsing '+' for IKE 236s | proposal: '+' 236s | token: '' '' "" '+' 236s | token: '' "" '+' "" '' 236s | parsing ';' for IKE 236s | proposal: ';' 236s | token: '' '' "" ';' 236s | token: '' "" ';' "" '' 236s | parsing 'aes-' for IKE 236s | proposal: 'aes-' 236s | token: '' '' "aes" '-' 236s | token: '' "aes" '-' "" '' 236s | token: '-' "" '' '' 236s | appending IKE encryption algorithm AES_CBC[_0] 236s | parsing prf: 236s | - failed, saving error 'IKE PRF algorithm is empty' and tossing result 236s | parsing integ: 236s | - and - failed, returning earlier PRF error 'IKE PRF algorithm is empty' and discarding INTEG error 'IKE integrity algorithm is empty') 236s | parsing 'aes+' for IKE 236s | proposal: 'aes+' 236s | token: '' '' "aes" '+' 236s | token: '' "aes" '+' "" '' 236s | token: '+' "" '' '' 236s | appending IKE encryption algorithm AES_CBC[_0] 236s | parsing 'aes;' for IKE 236s | proposal: 'aes;' 236s | token: '' '' "aes" ';' 236s | token: '' "aes" ';' "" '' 236s | token: ';' "" '' '' 236s | appending IKE encryption algorithm AES_CBC[_0] 236s | parsing dh: 236s | ... failed 'IKE DH algorithm is empty' 236s | parsing '-aes' for IKE 236s | proposal: '-aes' 236s | token: '' '' "" '-' 236s | token: '' "" '-' "aes" '' 236s | parsing '+aes' for IKE 236s | proposal: '+aes' 236s | token: '' '' "" '+' 236s | token: '' "" '+' "aes" '' 236s | parsing ';aes' for IKE 236s | proposal: ';aes' 236s | token: '' '' "" ';' 236s | token: '' "" ';' "aes" '' 236s | parsing 'aes+-' for IKE 236s | proposal: 'aes+-' 236s | token: '' '' "aes" '+' 236s | token: '' "aes" '+' "" '-' 236s | token: '+' "" '-' "" '' 236s | appending IKE encryption algorithm AES_CBC[_0] 236s | parsing 'aes+;' for IKE 236s | proposal: 'aes+;' 236s | token: '' '' "aes" '+' 236s | token: '' "aes" '+' "" ';' 236s | token: '+' "" ';' "" '' 236s | appending IKE encryption algorithm AES_CBC[_0] 236s | parsing 'aes++' for IKE 236s | proposal: 'aes++' 236s | token: '' '' "aes" '+' 236s | token: '' "aes" '+' "" '+' 236s | token: '+' "" '+' "" '' 236s | appending IKE encryption algorithm AES_CBC[_0] 236s ipsec algparse: leak detective found no leaks 236s ipsec algparse: Encryption algorithms: 236s ipsec algparse: AES_CCM_16 {256,192,*128} IKEv1: ESP IKEv2: ESP FIPS aes_ccm, aes_ccm_c 236s ipsec algparse: AES_CCM_12 {256,192,*128} IKEv1: ESP IKEv2: ESP FIPS aes_ccm_b 236s ipsec algparse: AES_CCM_8 {256,192,*128} IKEv1: ESP IKEv2: ESP FIPS aes_ccm_a 236s ipsec algparse: 3DES_CBC [*192] IKEv1: IKE ESP IKEv2: IKE ESP FIPS NSS(CBC) 3des 236s ipsec algparse: CAMELLIA_CTR {256,192,*128} IKEv1: ESP IKEv2: ESP 236s ipsec algparse: CAMELLIA_CBC {256,192,*128} IKEv1: IKE ESP IKEv2: IKE ESP NSS(CBC) camellia 236s ipsec algparse: AES_GCM_16 {256,192,*128} IKEv1: ESP IKEv2: IKE ESP FIPS NSS(AEAD) aes_gcm, aes_gcm_c 236s ipsec algparse: AES_GCM_12 {256,192,*128} IKEv1: ESP IKEv2: IKE ESP FIPS NSS(AEAD) aes_gcm_b 236s ipsec algparse: AES_GCM_8 {256,192,*128} IKEv1: ESP IKEv2: IKE ESP FIPS NSS(AEAD) aes_gcm_a 236s ipsec algparse: AES_CTR {256,192,*128} IKEv1: IKE ESP IKEv2: IKE ESP FIPS NSS(CTR) aesctr 236s ipsec algparse: AES_CBC {256,192,*128} IKEv1: IKE ESP IKEv2: IKE ESP FIPS NSS(CBC) aes 236s ipsec algparse: NULL_AUTH_AES_GMAC {256,192,*128} IKEv1: ESP IKEv2: ESP FIPS aes_gmac 236s ipsec algparse: NULL [] IKEv1: ESP IKEv2: ESP NULL 236s ipsec algparse: CHACHA20_POLY1305 [*256] IKEv1: IKEv2: IKE ESP NSS(AEAD) chacha20poly1305 236s ipsec algparse: Hash algorithms: 236s ipsec algparse: MD5 IKEv1: IKE IKEv2: NSS 236s ipsec algparse: SHA1 IKEv1: IKE IKEv2: IKE FIPS NSS sha 236s ipsec algparse: SHA2_256 IKEv1: IKE IKEv2: IKE FIPS NSS sha2, sha256 236s ipsec algparse: SHA2_384 IKEv1: IKE IKEv2: IKE FIPS NSS sha384 236s ipsec algparse: SHA2_512 IKEv1: IKE IKEv2: IKE FIPS NSS sha512 236s ipsec algparse: IDENTITY IKEv1: IKEv2: FIPS 236s ipsec algparse: PRF algorithms: 236s ipsec algparse: HMAC_MD5 IKEv1: IKE IKEv2: IKE NSS md5 236s ipsec algparse: HMAC_SHA1 IKEv1: IKE IKEv2: IKE FIPS NSS sha, sha1 236s ipsec algparse: HMAC_SHA2_256 IKEv1: IKE IKEv2: IKE FIPS NSS sha2, sha256, sha2_256 236s ipsec algparse: HMAC_SHA2_384 IKEv1: IKE IKEv2: IKE FIPS NSS sha384, sha2_384 236s ipsec algparse: HMAC_SHA2_512 IKEv1: IKE IKEv2: IKE FIPS NSS sha512, sha2_512 236s ipsec algparse: AES_XCBC IKEv1: IKEv2: IKE native(XCBC) aes128_xcbc 236s ipsec algparse: Integrity algorithms: 236s ipsec algparse: HMAC_MD5_96 IKEv1: IKE ESP AH IKEv2: IKE ESP AH NSS md5, hmac_md5 236s ipsec algparse: HMAC_SHA1_96 IKEv1: IKE ESP AH IKEv2: IKE ESP AH FIPS NSS sha, sha1, sha1_96, hmac_sha1 236s ipsec algparse: HMAC_SHA2_512_256 IKEv1: IKE ESP AH IKEv2: IKE ESP AH FIPS NSS sha512, sha2_512, sha2_512_256, hmac_sha2_512 236s ipsec algparse: HMAC_SHA2_384_192 IKEv1: IKE ESP AH IKEv2: IKE ESP AH FIPS NSS sha384, sha2_384, sha2_384_192, hmac_sha2_384 236s ipsec algparse: HMAC_SHA2_256_128 IKEv1: IKE ESP AH IKEv2: IKE ESP AH FIPS NSS sha2, sha256, sha2_256, sha2_256_128, hmac_sha2_256 236s ipsec algparse: HMAC_SHA2_256_TRUNCBUG IKEv1: ESP AH IKEv2: AH 236s ipsec algparse: AES_XCBC_96 IKEv1: ESP AH IKEv2: IKE ESP AH native(XCBC) aes_xcbc, aes128_xcbc, aes128_xcbc_96 236s ipsec algparse: AES_CMAC_96 IKEv1: ESP AH IKEv2: ESP AH FIPS aes_cmac 236s ipsec algparse: NONE IKEv1: ESP IKEv2: IKE ESP FIPS null 236s ipsec algparse: DH algorithms: 236s ipsec algparse: NONE IKEv1: IKEv2: IKE ESP AH FIPS NSS(MODP) null, dh0 236s ipsec algparse: MODP1536 IKEv1: IKE ESP AH IKEv2: IKE ESP AH NSS(MODP) dh5 236s ipsec algparse: MODP2048 IKEv1: IKE ESP AH IKEv2: IKE ESP AH FIPS NSS(MODP) dh14 236s ipsec algparse: MODP3072 IKEv1: IKE ESP AH IKEv2: IKE ESP AH FIPS NSS(MODP) dh15 236s ipsec algparse: MODP4096 IKEv1: IKE ESP AH IKEv2: IKE ESP AH FIPS NSS(MODP) dh16 236s ipsec algparse: MODP6144 IKEv1: IKE ESP AH IKEv2: IKE ESP AH FIPS NSS(MODP) dh17 236s ipsec algparse: MODP8192 IKEv1: IKE ESP AH IKEv2: IKE ESP AH FIPS NSS(MODP) dh18 236s ipsec algparse: DH19 IKEv1: IKE IKEv2: IKE ESP AH FIPS NSS(ECP) ecp_256, ecp256 236s ipsec algparse: DH20 IKEv1: IKE IKEv2: IKE ESP AH FIPS NSS(ECP) ecp_384, ecp384 236s ipsec algparse: DH21 IKEv1: IKE IKEv2: IKE ESP AH FIPS NSS(ECP) ecp_521, ecp521 236s ipsec algparse: DH31 IKEv1: IKE IKEv2: IKE ESP AH NSS(ECP) curve25519 236s ipsec algparse: IPCOMP algorithms: 236s ipsec algparse: DEFLATE IKEv1: ESP AH IKEv2: ESP AH FIPS 236s ipsec algparse: LZS IKEv1: IKEv2: ESP AH FIPS 236s ipsec algparse: LZJH IKEv1: IKEv2: ESP AH FIPS 236s ipsec algparse: testing CAMELLIA_CBC: 236s ipsec algparse: Camellia: 16 bytes with 128-bit key 236s | decode_to_chunk() raw_key: input "0x00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00" 236s | decode_to_chunk() output: 236s | 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................ 236s | CONCATENATE_DATA_AND_BASE: 236s | target: EXTRACT_KEY_FROM_KEY 236s | base: base-key@0x1044d8a8 (16-bytes, AES_KEY_GEN) 236s | params: 8-bytes@0xfff1b008 236s | key-offset: 0, key-size: 16 236s | EXTRACT_KEY_FROM_KEY: 236s | target: CAMELLIA_CBC 236s | flags: ENCRYPT+DECRYPT 236s | key_size: 16-bytes 236s | base: base-key@0x1044fb08 (32-bytes, EXTRACT_KEY_FROM_KEY) 236s | operation: FLAGS_ONLY 236s | params: 4-bytes@0xfff1afe4 236s | decode_to_mac() IV: : input "0x00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00" 236s | decode_to_mac() output: 236s | 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................ 236s | decode_to_chunk() new IV: : input "0x07 92 3A 39 EB 0A 81 7D 1C 4D 87 BD B8 2D 1F 1C" 236s | decode_to_chunk() output: 236s | 07 92 3a 39 eb 0a 81 7d 1c 4d 87 bd b8 2d 1f 1c ..:9...}.M...-.. 236s | decode_to_chunk() plaintext: : input "0x80 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00" 236s | decode_to_chunk() output: 236s | 80 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................ 236s | decode_to_chunk() ciphertext: : input "0x07 92 3A 39 EB 0A 81 7D 1C 4D 87 BD B8 2D 1F 1C" 236s | decode_to_chunk() output: 236s | 07 92 3a 39 eb 0a 81 7d 1c 4d 87 bd b8 2d 1f 1c ..:9...}.M...-.. 236s | NSS ike_alg_nss_cbc: CAMELLIA_CBC - enter (nil) 236s | using IKEv1 IV 236s | NSS ike_alg_nss_cbc: CAMELLIA_CBC - exit 236s | verify_bytes() Camellia: 16 bytes with 128-bit key: encrypt: ok 236s | verify_bytes() Camellia: 16 bytes with 128-bit key: updated CBC IV: ok 236s | decode_to_mac() IV: : input "0x00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00" 236s | decode_to_mac() output: 236s | 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................ 236s | decode_to_chunk() new IV: : input "0x07 92 3A 39 EB 0A 81 7D 1C 4D 87 BD B8 2D 1F 1C" 236s | decode_to_chunk() output: 236s | 07 92 3a 39 eb 0a 81 7d 1c 4d 87 bd b8 2d 1f 1c ..:9...}.M...-.. 236s | decode_to_chunk() ciphertext: : input "0x07 92 3A 39 EB 0A 81 7D 1C 4D 87 BD B8 2D 1F 1C" 236s | decode_to_chunk() output: 236s | 07 92 3a 39 eb 0a 81 7d 1c 4d 87 bd b8 2d 1f 1c ..:9...}.M...-.. 236s | decode_to_chunk() plaintext: : input "0x80 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00" 236s | decode_to_chunk() output: 236s | 80 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................ 236s | NSS ike_alg_nss_cbc: CAMELLIA_CBC - enter (nil) 236s | using IKEv1 IV 236s | NSS ike_alg_nss_cbc: CAMELLIA_CBC - exit 236s | verify_bytes() Camellia: 16 bytes with 128-bit key: decrypt: ok 236s | verify_bytes() Camellia: 16 bytes with 128-bit key: updated CBC IV: ok 236s ipsec algparse: Camellia: 16 bytes with 128-bit key 236s | decode_to_chunk() raw_key: input "0x00 11 22 33 44 55 66 77 88 99 AA BB CC DD EE FF" 236s | decode_to_chunk() output: 236s | 00 11 22 33 44 55 66 77 88 99 aa bb cc dd ee ff .."3DUfw........ 236s | CONCATENATE_DATA_AND_BASE: 236s | target: EXTRACT_KEY_FROM_KEY 236s | base: base-key@0x1044d8a8 (16-bytes, AES_KEY_GEN) 236s | params: 8-bytes@0xfff1b008 236s | key-offset: 0, key-size: 16 236s | EXTRACT_KEY_FROM_KEY: 236s | target: CAMELLIA_CBC 236s | flags: ENCRYPT+DECRYPT 236s | key_size: 16-bytes 236s | base: base-key@0x1044fb08 (32-bytes, EXTRACT_KEY_FROM_KEY) 236s | operation: FLAGS_ONLY 236s | params: 4-bytes@0xfff1afe4 236s | decode_to_mac() IV: : input "0x00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00" 236s | decode_to_mac() output: 236s | 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................ 236s | decode_to_chunk() new IV: : input "0x14 4D 2B 0F 50 0C 27 B7 EC 2C D1 2D 91 59 6F 37" 236s | decode_to_chunk() output: 236s | 14 4d 2b 0f 50 0c 27 b7 ec 2c d1 2d 91 59 6f 37 .M+.P.'..,.-.Yo7 236s | decode_to_chunk() plaintext: : input "0x00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 01 " 236s | decode_to_chunk() output: 236s | 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 01 ................ 236s | decode_to_chunk() ciphertext: : input "0x14 4D 2B 0F 50 0C 27 B7 EC 2C D1 2D 91 59 6F 37" 236s | decode_to_chunk() output: 236s | 14 4d 2b 0f 50 0c 27 b7 ec 2c d1 2d 91 59 6f 37 .M+.P.'..,.-.Yo7 236s | NSS ike_alg_nss_cbc: CAMELLIA_CBC - enter (nil) 236s | using IKEv1 IV 236s | NSS ike_alg_nss_cbc: CAMELLIA_CBC - exit 236s | verify_bytes() Camellia: 16 bytes with 128-bit key: encrypt: ok 236s | verify_bytes() Camellia: 16 bytes with 128-bit key: updated CBC IV: ok 236s | decode_to_mac() IV: : input "0x00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00" 236s | decode_to_mac() output: 236s | 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................ 236s | decode_to_chunk() new IV: : input "0x14 4D 2B 0F 50 0C 27 B7 EC 2C D1 2D 91 59 6F 37" 236s | decode_to_chunk() output: 236s | 14 4d 2b 0f 50 0c 27 b7 ec 2c d1 2d 91 59 6f 37 .M+.P.'..,.-.Yo7 236s | decode_to_chunk() ciphertext: : input "0x14 4D 2B 0F 50 0C 27 B7 EC 2C D1 2D 91 59 6F 37" 236s | decode_to_chunk() output: 236s | 14 4d 2b 0f 50 0c 27 b7 ec 2c d1 2d 91 59 6f 37 .M+.P.'..,.-.Yo7 236s | decode_to_chunk() plaintext: : input "0x00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 01 " 236s | decode_to_chunk() output: 236s | 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 01 ................ 236s | NSS ike_alg_nss_cbc: CAMELLIA_CBC - enter (nil) 236s | using IKEv1 IV 236s | NSS ike_alg_nss_cbc: CAMELLIA_CBC - exit 236s | verify_bytes() Camellia: 16 bytes with 128-bit key: decrypt: ok 236s | verify_bytes() Camellia: 16 bytes with 128-bit key: updated CBC IV: ok 236s ipsec algparse: Camellia: 16 bytes with 256-bit key 236s | decode_to_chunk() raw_key: input "0x00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00" 236s | decode_to_chunk() output: 236s | 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................ 236s | 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................ 236s | CONCATENATE_DATA_AND_BASE: 236s | target: EXTRACT_KEY_FROM_KEY 236s | base: base-key@0x1044d8a8 (16-bytes, AES_KEY_GEN) 236s | params: 8-bytes@0xfff1b008 236s | key-offset: 0, key-size: 32 236s | EXTRACT_KEY_FROM_KEY: 236s | target: CAMELLIA_CBC 236s | flags: ENCRYPT+DECRYPT 236s | key_size: 32-bytes 236s | base: base-key@0x1044fb08 (48-bytes, EXTRACT_KEY_FROM_KEY) 236s | operation: FLAGS_ONLY 236s | params: 4-bytes@0xfff1afe4 236s | decode_to_mac() IV: : input "0x00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00" 236s | decode_to_mac() output: 236s | 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................ 236s | decode_to_chunk() new IV: : input "0xB0 C6 B8 8A EA 51 8A B0 9E 84 72 48 E9 1B 1B 9D" 236s | decode_to_chunk() output: 236s | b0 c6 b8 8a ea 51 8a b0 9e 84 72 48 e9 1b 1b 9d .....Q....rH.... 236s | decode_to_chunk() plaintext: : input "0x80 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00" 236s | decode_to_chunk() output: 236s | 80 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................ 236s | decode_to_chunk() ciphertext: : input "0xB0 C6 B8 8A EA 51 8A B0 9E 84 72 48 E9 1B 1B 9D" 236s | decode_to_chunk() output: 236s | b0 c6 b8 8a ea 51 8a b0 9e 84 72 48 e9 1b 1b 9d .....Q....rH.... 236s | NSS ike_alg_nss_cbc: CAMELLIA_CBC - enter (nil) 236s | using IKEv1 IV 236s | NSS ike_alg_nss_cbc: CAMELLIA_CBC - exit 236s | verify_bytes() Camellia: 16 bytes with 256-bit key: encrypt: ok 236s | verify_bytes() Camellia: 16 bytes with 256-bit key: updated CBC IV: ok 236s | decode_to_mac() IV: : input "0x00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00" 236s | decode_to_mac() output: 236s | 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................ 236s | decode_to_chunk() new IV: : input "0xB0 C6 B8 8A EA 51 8A B0 9E 84 72 48 E9 1B 1B 9D" 236s | decode_to_chunk() output: 236s | b0 c6 b8 8a ea 51 8a b0 9e 84 72 48 e9 1b 1b 9d .....Q....rH.... 236s | decode_to_chunk() ciphertext: : input "0xB0 C6 B8 8A EA 51 8A B0 9E 84 72 48 E9 1B 1B 9D" 236s | decode_to_chunk() output: 236s | b0 c6 b8 8a ea 51 8a b0 9e 84 72 48 e9 1b 1b 9d .....Q....rH.... 236s | decode_to_chunk() plaintext: : input "0x80 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00" 236s | decode_to_chunk() output: 236s | 80 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................ 236s | NSS ike_alg_nss_cbc: CAMELLIA_CBC - enter (nil) 236s | using IKEv1 IV 236s | NSS ike_alg_nss_cbc: CAMELLIA_CBC - exit 236s | verify_bytes() Camellia: 16 bytes with 256-bit key: decrypt: ok 236s | verify_bytes() Camellia: 16 bytes with 256-bit key: updated CBC IV: ok 236s ipsec algparse: Camellia: 16 bytes with 256-bit key 236s | decode_to_chunk() raw_key: input "0x00 11 22 33 44 55 66 77 88 99 AA BB CC DD EE FF FF EE DD CC BB AA 99 88 77 66 55 44 33 22 11 00" 236s | decode_to_chunk() output: 236s | 00 11 22 33 44 55 66 77 88 99 aa bb cc dd ee ff .."3DUfw........ 236s | ff ee dd cc bb aa 99 88 77 66 55 44 33 22 11 00 ........wfUD3".. 236s | CONCATENATE_DATA_AND_BASE: 236s | target: EXTRACT_KEY_FROM_KEY 236s | base: base-key@0x1044d8a8 (16-bytes, AES_KEY_GEN) 236s | params: 8-bytes@0xfff1b008 236s | key-offset: 0, key-size: 32 236s | EXTRACT_KEY_FROM_KEY: 236s | target: CAMELLIA_CBC 236s | flags: ENCRYPT+DECRYPT 236s | key_size: 32-bytes 236s | base: base-key@0x1044fb08 (48-bytes, EXTRACT_KEY_FROM_KEY) 236s | operation: FLAGS_ONLY 236s | params: 4-bytes@0xfff1afe4 236s | decode_to_mac() IV: : input "0x00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00" 236s | decode_to_mac() output: 236s | 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................ 236s | decode_to_chunk() new IV: : input "0xCC 39 FF EE 18 56 D3 EB 61 02 5E 93 21 9B 65 23 " 236s | decode_to_chunk() output: 236s | cc 39 ff ee 18 56 d3 eb 61 02 5e 93 21 9b 65 23 .9...V..a.^.!.e# 236s | decode_to_chunk() plaintext: : input "0x00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 01" 236s | decode_to_chunk() output: 236s | 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 01 ................ 236s | decode_to_chunk() ciphertext: : input "0xCC 39 FF EE 18 56 D3 EB 61 02 5E 93 21 9B 65 23 " 236s | decode_to_chunk() output: 236s | cc 39 ff ee 18 56 d3 eb 61 02 5e 93 21 9b 65 23 .9...V..a.^.!.e# 236s | NSS ike_alg_nss_cbc: CAMELLIA_CBC - enter (nil) 236s | using IKEv1 IV 236s | NSS ike_alg_nss_cbc: CAMELLIA_CBC - exit 236s | verify_bytes() Camellia: 16 bytes with 256-bit key: encrypt: ok 236s | verify_bytes() Camellia: 16 bytes with 256-bit key: updated CBC IV: ok 236s | decode_to_mac() IV: : input "0x00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00" 236s | decode_to_mac() output: 236s | 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................ 236s | decode_to_chunk() new IV: : input "0xCC 39 FF EE 18 56 D3 EB 61 02 5E 93 21 9B 65 23 " 236s | decode_to_chunk() output: 236s | cc 39 ff ee 18 56 d3 eb 61 02 5e 93 21 9b 65 23 .9...V..a.^.!.e# 236s | decode_to_chunk() ciphertext: : input "0xCC 39 FF EE 18 56 D3 EB 61 02 5E 93 21 9B 65 23 " 236s | decode_to_chunk() output: 236s | cc 39 ff ee 18 56 d3 eb 61 02 5e 93 21 9b 65 23 .9...V..a.^.!.e# 236s | decode_to_chunk() plaintext: : input "0x00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 01" 236s | decode_to_chunk() output: 236s | 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 01 ................ 236s | NSS ike_alg_nss_cbc: CAMELLIA_CBC - enter (nil) 236s | using IKEv1 IV 236s | NSS ike_alg_nss_cbc: CAMELLIA_CBC - exit 236s | verify_bytes() Camellia: 16 bytes with 256-bit key: decrypt: ok 236s | verify_bytes() Camellia: 16 bytes with 256-bit key: updated CBC IV: ok 236s ipsec algparse: testing AES_GCM_16: 236s ipsec algparse: empty string 236s | decode_to_chunk() raw_key: input "0xcf063a34d4a9a76c2c86787d3f96db71" 236s | decode_to_chunk() output: 236s | cf 06 3a 34 d4 a9 a7 6c 2c 86 78 7d 3f 96 db 71 ..:4...l,.x}?..q 236s | CONCATENATE_DATA_AND_BASE: 236s | target: EXTRACT_KEY_FROM_KEY 236s | base: base-key@0x1044d8a8 (16-bytes, AES_KEY_GEN) 236s | params: 8-bytes@0xfff1af58 236s | key-offset: 0, key-size: 16 236s | EXTRACT_KEY_FROM_KEY: 236s | target: AES_GCM 236s | flags: ENCRYPT+DECRYPT 236s | key_size: 16-bytes 236s | base: base-key@0x1044fb08 (32-bytes, EXTRACT_KEY_FROM_KEY) 236s | operation: FLAGS_ONLY 236s | params: 4-bytes@0xfff1af34 236s | decode_to_chunk() salted IV: input "0x113b9785971864c83b01c787" 236s | decode_to_chunk() output: 236s | 11 3b 97 85 97 18 64 c8 3b 01 c7 87 .;....d.;... 236s | decode_to_chunk() AAD: input "" 236s | decode_to_chunk() output: 236s | 236s | decode_to_chunk() plaintext: input "" 236s | decode_to_chunk() output: 236s | 236s | decode_to_chunk() ciphertext: input "" 236s | decode_to_chunk() output: 236s | 236s | decode_to_chunk() tag: input "0x72ac8493e3a5228b5d130a69d2510e42" 236s | decode_to_chunk() output: 236s | 72 ac 84 93 e3 a5 22 8b 5d 13 0a 69 d2 51 0e 42 r.....".]..i.Q.B 236s | test_gcm_vector() DECRYPT: aad-size=0 salt-size=4 wire-IV-size=8 text-size=0 tag-size=16 text+tag in: 236s | 72 ac 84 93 e3 a5 22 8b 5d 13 0a 69 d2 51 0e 42 r.....".]..i.Q.B 236s | verify_bytes() empty string: output ciphertext: ok 236s | verify_bytes() empty string: TAG: ok 236s | test_gcm_vector() text+tag out: 236s | 72 ac 84 93 e3 a5 22 8b 5d 13 0a 69 d2 51 0e 42 r.....".]..i.Q.B 236s | test_gcm_vector() ENCRYPT: aad-size=0 salt-size=4 wire-IV-size=8 text-size=0 tag-size=16 text+tag in: 236s | 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................ 236s | verify_bytes() empty string: output ciphertext: ok 236s | verify_bytes() empty string: TAG: ok 236s | test_gcm_vector() text+tag out: 236s | 72 ac 84 93 e3 a5 22 8b 5d 13 0a 69 d2 51 0e 42 r.....".]..i.Q.B 236s ipsec algparse: one block 236s | decode_to_chunk() raw_key: input "0xe98b72a9881a84ca6b76e0f43e68647a" 236s | decode_to_chunk() output: 236s | e9 8b 72 a9 88 1a 84 ca 6b 76 e0 f4 3e 68 64 7a ..r.....kv..>hdz 236s | CONCATENATE_DATA_AND_BASE: 236s | target: EXTRACT_KEY_FROM_KEY 236s | base: base-key@0x1044d8a8 (16-bytes, AES_KEY_GEN) 236s | params: 8-bytes@0xfff1af58 236s | key-offset: 0, key-size: 16 236s | EXTRACT_KEY_FROM_KEY: 236s | target: AES_GCM 236s | flags: ENCRYPT+DECRYPT 236s | key_size: 16-bytes 236s | base: base-key@0x1044fb08 (32-bytes, EXTRACT_KEY_FROM_KEY) 236s | operation: FLAGS_ONLY 236s | params: 4-bytes@0xfff1af34 236s | decode_to_chunk() salted IV: input "0x8b23299fde174053f3d652ba" 236s | decode_to_chunk() output: 236s | 8b 23 29 9f de 17 40 53 f3 d6 52 ba .#)...@S..R. 236s | decode_to_chunk() AAD: input "" 236s | decode_to_chunk() output: 236s | 236s | decode_to_chunk() plaintext: input "0x28286a321293253c3e0aa2704a278032" 236s | decode_to_chunk() output: 236s | 28 28 6a 32 12 93 25 3c 3e 0a a2 70 4a 27 80 32 ((j2..%<>..pJ'.2 236s | decode_to_chunk() ciphertext: input "0x5a3c1cf1985dbb8bed818036fdd5ab42" 236s | decode_to_chunk() output: 236s | 5a 3c 1c f1 98 5d bb 8b ed 81 80 36 fd d5 ab 42 Z<...].....6...B 236s | decode_to_chunk() tag: input "0x23c7ab0f952b7091cd324835043b5eb5" 236s | decode_to_chunk() output: 236s | 23 c7 ab 0f 95 2b 70 91 cd 32 48 35 04 3b 5e b5 #....+p..2H5.;^. 236s | test_gcm_vector() DECRYPT: aad-size=0 salt-size=4 wire-IV-size=8 text-size=16 tag-size=16 text+tag in: 236s | 5a 3c 1c f1 98 5d bb 8b ed 81 80 36 fd d5 ab 42 Z<...].....6...B 236s | 23 c7 ab 0f 95 2b 70 91 cd 32 48 35 04 3b 5e b5 #....+p..2H5.;^. 236s | verify_bytes() one block: output ciphertext: ok 236s | verify_bytes() one block: TAG: ok 236s | test_gcm_vector() text+tag out: 236s | 28 28 6a 32 12 93 25 3c 3e 0a a2 70 4a 27 80 32 ((j2..%<>..pJ'.2 236s | 23 c7 ab 0f 95 2b 70 91 cd 32 48 35 04 3b 5e b5 #....+p..2H5.;^. 236s | test_gcm_vector() ENCRYPT: aad-size=0 salt-size=4 wire-IV-size=8 text-size=16 tag-size=16 text+tag in: 236s | 28 28 6a 32 12 93 25 3c 3e 0a a2 70 4a 27 80 32 ((j2..%<>..pJ'.2 236s | 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................ 236s | verify_bytes() one block: output ciphertext: ok 236s | verify_bytes() one block: TAG: ok 236s | test_gcm_vector() text+tag out: 236s | 5a 3c 1c f1 98 5d bb 8b ed 81 80 36 fd d5 ab 42 Z<...].....6...B 236s | 23 c7 ab 0f 95 2b 70 91 cd 32 48 35 04 3b 5e b5 #....+p..2H5.;^. 236s ipsec algparse: two blocks 236s | decode_to_chunk() raw_key: input "0xbfd414a6212958a607a0f5d3ab48471d" 236s | decode_to_chunk() output: 236s | bf d4 14 a6 21 29 58 a6 07 a0 f5 d3 ab 48 47 1d ....!)X......HG. 236s | CONCATENATE_DATA_AND_BASE: 236s | target: EXTRACT_KEY_FROM_KEY 236s | base: base-key@0x1044d8a8 (16-bytes, AES_KEY_GEN) 236s | params: 8-bytes@0xfff1af58 236s | key-offset: 0, key-size: 16 236s | EXTRACT_KEY_FROM_KEY: 236s | target: AES_GCM 236s | flags: ENCRYPT+DECRYPT 236s | key_size: 16-bytes 236s | base: base-key@0x1044fb08 (32-bytes, EXTRACT_KEY_FROM_KEY) 236s | operation: FLAGS_ONLY 236s | params: 4-bytes@0xfff1af34 236s | decode_to_chunk() salted IV: input "0x86d8ea0ab8e40dcc481cd0e2" 236s | decode_to_chunk() output: 236s | 86 d8 ea 0a b8 e4 0d cc 48 1c d0 e2 ........H... 236s | decode_to_chunk() AAD: input "" 236s | decode_to_chunk() output: 236s | 236s | decode_to_chunk() plaintext: input "0xa6b76a066e63392c9443e60272ceaeb9d25c991b0f2e55e2804e168c05ea591a" 236s | decode_to_chunk() output: 236s | a6 b7 6a 06 6e 63 39 2c 94 43 e6 02 72 ce ae b9 ..j.nc9,.C..r... 236s | d2 5c 99 1b 0f 2e 55 e2 80 4e 16 8c 05 ea 59 1a .\....U..N....Y. 236s | decode_to_chunk() ciphertext: input "0x62171db33193292d930bf6647347652c1ef33316d7feca99d54f1db4fcf513f8" 236s | decode_to_chunk() output: 236s | 62 17 1d b3 31 93 29 2d 93 0b f6 64 73 47 65 2c b...1.)-...dsGe, 236s | 1e f3 33 16 d7 fe ca 99 d5 4f 1d b4 fc f5 13 f8 ..3......O...... 236s | decode_to_chunk() tag: input "0xc28280aa5c6c7a8bd366f28c1cfd1f6e" 236s | decode_to_chunk() output: 236s | c2 82 80 aa 5c 6c 7a 8b d3 66 f2 8c 1c fd 1f 6e ....\lz..f.....n 236s | test_gcm_vector() DECRYPT: aad-size=0 salt-size=4 wire-IV-size=8 text-size=32 tag-size=16 text+tag in: 236s | 62 17 1d b3 31 93 29 2d 93 0b f6 64 73 47 65 2c b...1.)-...dsGe, 236s | 1e f3 33 16 d7 fe ca 99 d5 4f 1d b4 fc f5 13 f8 ..3......O...... 236s | c2 82 80 aa 5c 6c 7a 8b d3 66 f2 8c 1c fd 1f 6e ....\lz..f.....n 236s | verify_bytes() two blocks: output ciphertext: ok 236s | verify_bytes() two blocks: TAG: ok 236s | test_gcm_vector() text+tag out: 236s | a6 b7 6a 06 6e 63 39 2c 94 43 e6 02 72 ce ae b9 ..j.nc9,.C..r... 236s | d2 5c 99 1b 0f 2e 55 e2 80 4e 16 8c 05 ea 59 1a .\....U..N....Y. 236s | c2 82 80 aa 5c 6c 7a 8b d3 66 f2 8c 1c fd 1f 6e ....\lz..f.....n 236s | test_gcm_vector() ENCRYPT: aad-size=0 salt-size=4 wire-IV-size=8 text-size=32 tag-size=16 text+tag in: 236s | a6 b7 6a 06 6e 63 39 2c 94 43 e6 02 72 ce ae b9 ..j.nc9,.C..r... 236s | d2 5c 99 1b 0f 2e 55 e2 80 4e 16 8c 05 ea 59 1a .\....U..N....Y. 236s | 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................ 236s | verify_bytes() two blocks: output ciphertext: ok 236s | verify_bytes() two blocks: TAG: ok 236s | test_gcm_vector() text+tag out: 236s | 62 17 1d b3 31 93 29 2d 93 0b f6 64 73 47 65 2c b...1.)-...dsGe, 236s | 1e f3 33 16 d7 fe ca 99 d5 4f 1d b4 fc f5 13 f8 ..3......O...... 236s | c2 82 80 aa 5c 6c 7a 8b d3 66 f2 8c 1c fd 1f 6e ....\lz..f.....n 236s ipsec algparse: two blocks with associated data 236s | decode_to_chunk() raw_key: input "0x95bcde70c094f04e3dd8259cafd88ce8" 236s | decode_to_chunk() output: 236s | 95 bc de 70 c0 94 f0 4e 3d d8 25 9c af d8 8c e8 ...p...N=.%..... 236s | CONCATENATE_DATA_AND_BASE: 236s | target: EXTRACT_KEY_FROM_KEY 236s | base: base-key@0x1044d8a8 (16-bytes, AES_KEY_GEN) 236s | params: 8-bytes@0xfff1af58 236s | key-offset: 0, key-size: 16 236s | EXTRACT_KEY_FROM_KEY: 236s | target: AES_GCM 236s | flags: ENCRYPT+DECRYPT 236s | key_size: 16-bytes 236s | base: base-key@0x1044fb08 (32-bytes, EXTRACT_KEY_FROM_KEY) 236s | operation: FLAGS_ONLY 236s | params: 4-bytes@0xfff1af34 236s | decode_to_chunk() salted IV: input "0x12cf097ad22380432ff40a5c" 236s | decode_to_chunk() output: 236s | 12 cf 09 7a d2 23 80 43 2f f4 0a 5c ...z.#.C/..\ 236s | decode_to_chunk() AAD: input "0xc783a0cca10a8d9fb8d27d69659463f2" 236s | decode_to_chunk() output: 236s | c7 83 a0 cc a1 0a 8d 9f b8 d2 7d 69 65 94 63 f2 ..........}ie.c. 236s | decode_to_chunk() plaintext: input "0x32f51e837a9748838925066d69e87180f34a6437e6b396e5643b34cb2ee4f7b1" 236s | decode_to_chunk() output: 236s | 32 f5 1e 83 7a 97 48 83 89 25 06 6d 69 e8 71 80 2...z.H..%.mi.q. 236s | f3 4a 64 37 e6 b3 96 e5 64 3b 34 cb 2e e4 f7 b1 .Jd7....d;4..... 236s | decode_to_chunk() ciphertext: input "0x8a023ba477f5b809bddcda8f55e09064d6d88aaec99c1e141212ea5b08503660" 236s | decode_to_chunk() output: 236s | 8a 02 3b a4 77 f5 b8 09 bd dc da 8f 55 e0 90 64 ..;.w.......U..d 236s | d6 d8 8a ae c9 9c 1e 14 12 12 ea 5b 08 50 36 60 ...........[.P6` 236s | decode_to_chunk() tag: input "0x562f500dae635d60a769b466e15acd1e" 236s | decode_to_chunk() output: 236s | 56 2f 50 0d ae 63 5d 60 a7 69 b4 66 e1 5a cd 1e V/P..c]`.i.f.Z.. 236s | test_gcm_vector() DECRYPT: aad-size=16 salt-size=4 wire-IV-size=8 text-size=32 tag-size=16 text+tag in: 236s | 8a 02 3b a4 77 f5 b8 09 bd dc da 8f 55 e0 90 64 ..;.w.......U..d 236s | d6 d8 8a ae c9 9c 1e 14 12 12 ea 5b 08 50 36 60 ...........[.P6` 236s | 56 2f 50 0d ae 63 5d 60 a7 69 b4 66 e1 5a cd 1e V/P..c]`.i.f.Z.. 236s | verify_bytes() two blocks with associated data: output ciphertext: ok 236s | verify_bytes() two blocks with associated data: TAG: ok 236s | test_gcm_vector() text+tag out: 236s | 32 f5 1e 83 7a 97 48 83 89 25 06 6d 69 e8 71 80 2...z.H..%.mi.q. 236s | f3 4a 64 37 e6 b3 96 e5 64 3b 34 cb 2e e4 f7 b1 .Jd7....d;4..... 236s | 56 2f 50 0d ae 63 5d 60 a7 69 b4 66 e1 5a cd 1e V/P..c]`.i.f.Z.. 236s | test_gcm_vector() ENCRYPT: aad-size=16 salt-size=4 wire-IV-size=8 text-size=32 tag-size=16 text+tag in: 236s | 32 f5 1e 83 7a 97 48 83 89 25 06 6d 69 e8 71 80 2...z.H..%.mi.q. 236s | f3 4a 64 37 e6 b3 96 e5 64 3b 34 cb 2e e4 f7 b1 .Jd7....d;4..... 236s | 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................ 236s | verify_bytes() two blocks with associated data: output ciphertext: ok 236s | verify_bytes() two blocks with associated data: TAG: ok 236s | test_gcm_vector() text+tag out: 236s | 8a 02 3b a4 77 f5 b8 09 bd dc da 8f 55 e0 90 64 ..;.w.......U..d 236s | d6 d8 8a ae c9 9c 1e 14 12 12 ea 5b 08 50 36 60 ...........[.P6` 236s | 56 2f 50 0d ae 63 5d 60 a7 69 b4 66 e1 5a cd 1e V/P..c]`.i.f.Z.. 236s ipsec algparse: testing AES_CTR: 236s ipsec algparse: Encrypting 16 octets using AES-CTR with 128-bit key 236s | decode_to_chunk() raw_key: input "0x AE 68 52 F8 12 10 67 CC 4B F7 A5 76 55 77 F3 9E" 236s | decode_to_chunk() output: 236s | ae 68 52 f8 12 10 67 cc 4b f7 a5 76 55 77 f3 9e .hR...g.K..vUw.. 236s | CONCATENATE_DATA_AND_BASE: 236s | target: EXTRACT_KEY_FROM_KEY 236s | base: base-key@0x1044d8a8 (16-bytes, AES_KEY_GEN) 236s | params: 8-bytes@0xfff1b000 236s | key-offset: 0, key-size: 16 236s | EXTRACT_KEY_FROM_KEY: 236s | target: AES_CTR 236s | flags: ENCRYPT+DECRYPT 236s | key_size: 16-bytes 236s | base: base-key@0x1044fb08 (32-bytes, EXTRACT_KEY_FROM_KEY) 236s | operation: FLAGS_ONLY 236s | params: 4-bytes@0xfff1afdc 236s | decode_to_mac() input counter-block: : input "0x 00 00 00 30 00 00 00 00 00 00 00 00 00 00 00 01" 236s | decode_to_mac() output: 236s | 00 00 00 30 00 00 00 00 00 00 00 00 00 00 00 01 ...0............ 236s | decode_to_chunk() Plaintext: input "0x 53 69 6E 67 6C 65 20 62 6C 6F 63 6B 20 6D 73 67" 236s | decode_to_chunk() output: 236s | 53 69 6e 67 6c 65 20 62 6c 6f 63 6b 20 6d 73 67 Single block msg 236s | decode_to_chunk() Ciphertext: input "0x E4 09 5D 4F B7 A7 B3 79 2D 61 75 A3 26 13 11 B8" 236s | decode_to_chunk() output: 236s | e4 09 5d 4f b7 a7 b3 79 2d 61 75 a3 26 13 11 b8 ..]O...y-au.&... 236s | decode_to_chunk() expected counter-block: : input "0x 00 00 00 30 00 00 00 00 00 00 00 00 00 00 00 02" 236s | decode_to_chunk() output: 236s | 00 00 00 30 00 00 00 00 00 00 00 00 00 00 00 02 ...0............ 236s | cipher_op_ctr_nss() enter AES_CTR 0x1044d890 use IKEv1 IV wire_iv 0 count 0 236s | ctr_param: count 32 iv 00000030000000000000000000000001 236s | cipher_op_ctr_nss() counter-block updated from 0x1 to 0x2 for 16 bytes 236s | do_aes_ctr: exit 236s | cipher_op_context_destroy_ctr_nss() 236s | verify_bytes() Encrypting 16 octets using AES-CTR with 128-bit key: encrypt: ok 236s | verify_bytes() Encrypting 16 octets using AES-CTR with 128-bit key: counter-block: ok 236s | decode_to_mac() input counter-block: : input "0x 00 00 00 30 00 00 00 00 00 00 00 00 00 00 00 01" 236s | decode_to_mac() output: 236s | 00 00 00 30 00 00 00 00 00 00 00 00 00 00 00 01 ...0............ 236s | decode_to_chunk() Ciphertext: input "0x E4 09 5D 4F B7 A7 B3 79 2D 61 75 A3 26 13 11 B8" 236s | decode_to_chunk() output: 236s | e4 09 5d 4f b7 a7 b3 79 2d 61 75 a3 26 13 11 b8 ..]O...y-au.&... 236s | decode_to_chunk() Plaintext: input "0x 53 69 6E 67 6C 65 20 62 6C 6F 63 6B 20 6D 73 67" 236s | decode_to_chunk() output: 236s | 53 69 6e 67 6c 65 20 62 6c 6f 63 6b 20 6d 73 67 Single block msg 236s | decode_to_chunk() expected counter-block: : input "0x 00 00 00 30 00 00 00 00 00 00 00 00 00 00 00 02" 236s | decode_to_chunk() output: 236s | 00 00 00 30 00 00 00 00 00 00 00 00 00 00 00 02 ...0............ 236s | cipher_op_ctr_nss() enter AES_CTR 0x1044d890 use IKEv1 IV wire_iv 0 count 0 236s | ctr_param: count 32 iv 00000030000000000000000000000001 236s | cipher_op_ctr_nss() counter-block updated from 0x1 to 0x2 for 16 bytes 236s | do_aes_ctr: exit 236s | cipher_op_context_destroy_ctr_nss() 236s | verify_bytes() Encrypting 16 octets using AES-CTR with 128-bit key: decrypt: ok 236s | verify_bytes() Encrypting 16 octets using AES-CTR with 128-bit key: counter-block: ok 236s ipsec algparse: Encrypting 32 octets using AES-CTR with 128-bit key 236s | decode_to_chunk() raw_key: input "0x 7E 24 06 78 17 FA E0 D7 43 D6 CE 1F 32 53 91 63" 236s | decode_to_chunk() output: 236s | 7e 24 06 78 17 fa e0 d7 43 d6 ce 1f 32 53 91 63 ~$.x....C...2S.c 236s | CONCATENATE_DATA_AND_BASE: 236s | target: EXTRACT_KEY_FROM_KEY 236s | base: base-key@0x1044d8a8 (16-bytes, AES_KEY_GEN) 236s | params: 8-bytes@0xfff1b000 236s | key-offset: 0, key-size: 16 236s | EXTRACT_KEY_FROM_KEY: 236s | target: AES_CTR 236s | flags: ENCRYPT+DECRYPT 236s | key_size: 16-bytes 236s | base: base-key@0x1044fb08 (32-bytes, EXTRACT_KEY_FROM_KEY) 236s | operation: FLAGS_ONLY 236s | params: 4-bytes@0xfff1afdc 236s | decode_to_mac() input counter-block: : input "0x 00 6C B6 DB C0 54 3B 59 DA 48 D9 0B 00 00 00 01" 236s | decode_to_mac() output: 236s | 00 6c b6 db c0 54 3b 59 da 48 d9 0b 00 00 00 01 .l...T;Y.H...... 236s | decode_to_chunk() Plaintext: input "0x00 01 02 03 04 05 06 07 08 09 0A 0B 0C 0D 0E 0F10 11 12 13 14 15 16 17 18 19 1A 1B 1C 1D 1E 1F" 236s | decode_to_chunk() output: 236s | 00 01 02 03 04 05 06 07 08 09 0a 0b 0c 0d 0e 0f ................ 236s | 10 11 12 13 14 15 16 17 18 19 1a 1b 1c 1d 1e 1f ................ 236s | decode_to_chunk() Ciphertext: input "0x51 04 A1 06 16 8A 72 D9 79 0D 41 EE 8E DA D3 88EB 2E 1E FC 46 DA 57 C8 FC E6 30 DF 91 41 BE 28" 236s | decode_to_chunk() output: 236s | 51 04 a1 06 16 8a 72 d9 79 0d 41 ee 8e da d3 88 Q.....r.y.A..... 236s | eb 2e 1e fc 46 da 57 c8 fc e6 30 df 91 41 be 28 ....F.W...0..A.( 236s | decode_to_chunk() expected counter-block: : input "0x 00 6C B6 DB C0 54 3B 59 DA 48 D9 0B 00 00 00 03" 236s | decode_to_chunk() output: 236s | 00 6c b6 db c0 54 3b 59 da 48 d9 0b 00 00 00 03 .l...T;Y.H...... 236s | cipher_op_ctr_nss() enter AES_CTR 0x1044d890 use IKEv1 IV wire_iv 0 count 0 236s | ctr_param: count 32 iv 006cb6dbc0543b59da48d90b00000001 236s | cipher_op_ctr_nss() counter-block updated from 0x1 to 0x3 for 32 bytes 236s | do_aes_ctr: exit 236s | cipher_op_context_destroy_ctr_nss() 236s | verify_bytes() Encrypting 32 octets using AES-CTR with 128-bit key: encrypt: ok 236s | verify_bytes() Encrypting 32 octets using AES-CTR with 128-bit key: counter-block: ok 236s | decode_to_mac() input counter-block: : input "0x 00 6C B6 DB C0 54 3B 59 DA 48 D9 0B 00 00 00 01" 236s | decode_to_mac() output: 236s | 00 6c b6 db c0 54 3b 59 da 48 d9 0b 00 00 00 01 .l...T;Y.H...... 236s | decode_to_chunk() Ciphertext: input "0x51 04 A1 06 16 8A 72 D9 79 0D 41 EE 8E DA D3 88EB 2E 1E FC 46 DA 57 C8 FC E6 30 DF 91 41 BE 28" 236s | decode_to_chunk() output: 236s | 51 04 a1 06 16 8a 72 d9 79 0d 41 ee 8e da d3 88 Q.....r.y.A..... 236s | eb 2e 1e fc 46 da 57 c8 fc e6 30 df 91 41 be 28 ....F.W...0..A.( 236s | decode_to_chunk() Plaintext: input "0x00 01 02 03 04 05 06 07 08 09 0A 0B 0C 0D 0E 0F10 11 12 13 14 15 16 17 18 19 1A 1B 1C 1D 1E 1F" 236s | decode_to_chunk() output: 236s | 00 01 02 03 04 05 06 07 08 09 0a 0b 0c 0d 0e 0f ................ 236s | 10 11 12 13 14 15 16 17 18 19 1a 1b 1c 1d 1e 1f ................ 236s | decode_to_chunk() expected counter-block: : input "0x 00 6C B6 DB C0 54 3B 59 DA 48 D9 0B 00 00 00 03" 236s | decode_to_chunk() output: 236s | 00 6c b6 db c0 54 3b 59 da 48 d9 0b 00 00 00 03 .l...T;Y.H...... 236s | cipher_op_ctr_nss() enter AES_CTR 0x1044d890 use IKEv1 IV wire_iv 0 count 0 236s | ctr_param: count 32 iv 006cb6dbc0543b59da48d90b00000001 236s | cipher_op_ctr_nss() counter-block updated from 0x1 to 0x3 for 32 bytes 236s | do_aes_ctr: exit 236s | cipher_op_context_destroy_ctr_nss() 236s | verify_bytes() Encrypting 32 octets using AES-CTR with 128-bit key: decrypt: ok 236s | verify_bytes() Encrypting 32 octets using AES-CTR with 128-bit key: counter-block: ok 236s ipsec algparse: Encrypting 36 octets using AES-CTR with 128-bit key 236s | decode_to_chunk() raw_key: input "0x 76 91 BE 03 5E 50 20 A8 AC 6E 61 85 29 F9 A0 DC" 236s | decode_to_chunk() output: 236s | 76 91 be 03 5e 50 20 a8 ac 6e 61 85 29 f9 a0 dc v...^P ..na.)... 236s | CONCATENATE_DATA_AND_BASE: 236s | target: EXTRACT_KEY_FROM_KEY 236s | base: base-key@0x1044d8a8 (16-bytes, AES_KEY_GEN) 236s | params: 8-bytes@0xfff1b000 236s | key-offset: 0, key-size: 16 236s | EXTRACT_KEY_FROM_KEY: 236s | target: AES_CTR 236s | flags: ENCRYPT+DECRYPT 236s | key_size: 16-bytes 236s | base: base-key@0x1044fb08 (32-bytes, EXTRACT_KEY_FROM_KEY) 236s | operation: FLAGS_ONLY 236s | params: 4-bytes@0xfff1afdc 236s | decode_to_mac() input counter-block: : input "0x 00 E0 01 7B 27 77 7F 3F 4A 17 86 F0 00 00 00 01" 236s | decode_to_mac() output: 236s | 00 e0 01 7b 27 77 7f 3f 4a 17 86 f0 00 00 00 01 ...{'w.?J....... 236s | decode_to_chunk() Plaintext: input "0x00 01 02 03 04 05 06 07 08 09 0A 0B 0C 0D 0E 0F10 11 12 13 14 15 16 17 18 19 1A 1B 1C 1D 1E 1F20 21 22 23" 236s | decode_to_chunk() output: 236s | 00 01 02 03 04 05 06 07 08 09 0a 0b 0c 0d 0e 0f ................ 236s | 10 11 12 13 14 15 16 17 18 19 1a 1b 1c 1d 1e 1f ................ 236s | 20 21 22 23 !"# 236s | decode_to_chunk() Ciphertext: input "0xC1 CF 48 A8 9F 2F FD D9 CF 46 52 E9 EF DB 72 D745 40 A4 2B DE 6D 78 36 D5 9A 5C EA AE F3 10 5325 B2 07 2F" 236s | decode_to_chunk() output: 236s | c1 cf 48 a8 9f 2f fd d9 cf 46 52 e9 ef db 72 d7 ..H../...FR...r. 236s | 45 40 a4 2b de 6d 78 36 d5 9a 5c ea ae f3 10 53 E@.+.mx6..\....S 236s | 25 b2 07 2f %../ 236s | decode_to_chunk() expected counter-block: : input "0x 00 E0 01 7B 27 77 7F 3F 4A 17 86 F0 00 00 00 04" 236s | decode_to_chunk() output: 236s | 00 e0 01 7b 27 77 7f 3f 4a 17 86 f0 00 00 00 04 ...{'w.?J....... 236s | cipher_op_ctr_nss() enter AES_CTR 0x1044d890 use IKEv1 IV wire_iv 0 count 0 236s | ctr_param: count 32 iv 00e0017b27777f3f4a1786f000000001 236s | cipher_op_ctr_nss() counter-block updated from 0x1 to 0x4 for 36 bytes 236s | do_aes_ctr: exit 236s | cipher_op_context_destroy_ctr_nss() 236s | verify_bytes() Encrypting 36 octets using AES-CTR with 128-bit key: encrypt: ok 236s | verify_bytes() Encrypting 36 octets using AES-CTR with 128-bit key: counter-block: ok 236s | decode_to_mac() input counter-block: : input "0x 00 E0 01 7B 27 77 7F 3F 4A 17 86 F0 00 00 00 01" 236s | decode_to_mac() output: 236s | 00 e0 01 7b 27 77 7f 3f 4a 17 86 f0 00 00 00 01 ...{'w.?J....... 236s | decode_to_chunk() Ciphertext: input "0xC1 CF 48 A8 9F 2F FD D9 CF 46 52 E9 EF DB 72 D745 40 A4 2B DE 6D 78 36 D5 9A 5C EA AE F3 10 5325 B2 07 2F" 236s | decode_to_chunk() output: 236s | c1 cf 48 a8 9f 2f fd d9 cf 46 52 e9 ef db 72 d7 ..H../...FR...r. 236s | 45 40 a4 2b de 6d 78 36 d5 9a 5c ea ae f3 10 53 E@.+.mx6..\....S 236s | 25 b2 07 2f %../ 236s | decode_to_chunk() Plaintext: input "0x00 01 02 03 04 05 06 07 08 09 0A 0B 0C 0D 0E 0F10 11 12 13 14 15 16 17 18 19 1A 1B 1C 1D 1E 1F20 21 22 23" 236s | decode_to_chunk() output: 236s | 00 01 02 03 04 05 06 07 08 09 0a 0b 0c 0d 0e 0f ................ 236s | 10 11 12 13 14 15 16 17 18 19 1a 1b 1c 1d 1e 1f ................ 236s | 20 21 22 23 !"# 236s | decode_to_chunk() expected counter-block: : input "0x 00 E0 01 7B 27 77 7F 3F 4A 17 86 F0 00 00 00 04" 236s | decode_to_chunk() output: 236s | 00 e0 01 7b 27 77 7f 3f 4a 17 86 f0 00 00 00 04 ...{'w.?J....... 236s | cipher_op_ctr_nss() enter AES_CTR 0x1044d890 use IKEv1 IV wire_iv 0 count 0 236s | ctr_param: count 32 iv 00e0017b27777f3f4a1786f000000001 236s | cipher_op_ctr_nss() counter-block updated from 0x1 to 0x4 for 36 bytes 236s | do_aes_ctr: exit 236s | cipher_op_context_destroy_ctr_nss() 236s | verify_bytes() Encrypting 36 octets using AES-CTR with 128-bit key: decrypt: ok 236s | verify_bytes() Encrypting 36 octets using AES-CTR with 128-bit key: counter-block: ok 236s ipsec algparse: Encrypting 16 octets using AES-CTR with 192-bit key 236s | decode_to_chunk() raw_key: input "0x16 AF 5B 14 5F C9 F5 79 C1 75 F9 3E 3B FB 0E ED86 3D 06 CC FD B7 85 15" 236s | decode_to_chunk() output: 236s | 16 af 5b 14 5f c9 f5 79 c1 75 f9 3e 3b fb 0e ed ..[._..y.u.>;... 236s | 86 3d 06 cc fd b7 85 15 .=...... 236s | CONCATENATE_DATA_AND_BASE: 236s | target: EXTRACT_KEY_FROM_KEY 236s | base: base-key@0x1044d8a8 (16-bytes, AES_KEY_GEN) 236s | params: 8-bytes@0xfff1b000 236s | key-offset: 0, key-size: 24 236s | EXTRACT_KEY_FROM_KEY: 236s | target: AES_CTR 236s | flags: ENCRYPT+DECRYPT 236s | key_size: 24-bytes 236s | base: base-key@0x1044fb08 (40-bytes, EXTRACT_KEY_FROM_KEY) 236s | operation: FLAGS_ONLY 236s | params: 4-bytes@0xfff1afdc 236s | decode_to_mac() input counter-block: : input "0x 00 00 00 48 36 73 3C 14 7D 6D 93 CB 00 00 00 01" 236s | decode_to_mac() output: 236s | 00 00 00 48 36 73 3c 14 7d 6d 93 cb 00 00 00 01 ...H6s<.}m...... 236s | decode_to_chunk() Plaintext: input "0x 53 69 6E 67 6C 65 20 62 6C 6F 63 6B 20 6D 73 67" 236s | decode_to_chunk() output: 236s | 53 69 6e 67 6c 65 20 62 6c 6f 63 6b 20 6d 73 67 Single block msg 236s | decode_to_chunk() Ciphertext: input "0x 4B 55 38 4F E2 59 C9 C8 4E 79 35 A0 03 CB E9 28" 236s | decode_to_chunk() output: 236s | 4b 55 38 4f e2 59 c9 c8 4e 79 35 a0 03 cb e9 28 KU8O.Y..Ny5....( 236s | decode_to_chunk() expected counter-block: : input "0x 00 00 00 48 36 73 3C 14 7D 6D 93 CB 00 00 00 02" 236s | decode_to_chunk() output: 236s | 00 00 00 48 36 73 3c 14 7d 6d 93 cb 00 00 00 02 ...H6s<.}m...... 236s | cipher_op_ctr_nss() enter AES_CTR 0x1044d890 use IKEv1 IV wire_iv 0 count 0 236s | ctr_param: count 32 iv 0000004836733c147d6d93cb00000001 236s | cipher_op_ctr_nss() counter-block updated from 0x1 to 0x2 for 16 bytes 236s | do_aes_ctr: exit 236s | cipher_op_context_destroy_ctr_nss() 236s | verify_bytes() Encrypting 16 octets using AES-CTR with 192-bit key: encrypt: ok 236s | verify_bytes() Encrypting 16 octets using AES-CTR with 192-bit key: counter-block: ok 236s | decode_to_mac() input counter-block: : input "0x 00 00 00 48 36 73 3C 14 7D 6D 93 CB 00 00 00 01" 236s | decode_to_mac() output: 236s | 00 00 00 48 36 73 3c 14 7d 6d 93 cb 00 00 00 01 ...H6s<.}m...... 236s | decode_to_chunk() Ciphertext: input "0x 4B 55 38 4F E2 59 C9 C8 4E 79 35 A0 03 CB E9 28" 236s | decode_to_chunk() output: 236s | 4b 55 38 4f e2 59 c9 c8 4e 79 35 a0 03 cb e9 28 KU8O.Y..Ny5....( 236s | decode_to_chunk() Plaintext: input "0x 53 69 6E 67 6C 65 20 62 6C 6F 63 6B 20 6D 73 67" 236s | decode_to_chunk() output: 236s | 53 69 6e 67 6c 65 20 62 6c 6f 63 6b 20 6d 73 67 Single block msg 236s | decode_to_chunk() expected counter-block: : input "0x 00 00 00 48 36 73 3C 14 7D 6D 93 CB 00 00 00 02" 236s | decode_to_chunk() output: 236s | 00 00 00 48 36 73 3c 14 7d 6d 93 cb 00 00 00 02 ...H6s<.}m...... 236s | cipher_op_ctr_nss() enter AES_CTR 0x1044d890 use IKEv1 IV wire_iv 0 count 0 236s | ctr_param: count 32 iv 0000004836733c147d6d93cb00000001 236s | cipher_op_ctr_nss() counter-block updated from 0x1 to 0x2 for 16 bytes 236s | do_aes_ctr: exit 236s | cipher_op_context_destroy_ctr_nss() 236s | verify_bytes() Encrypting 16 octets using AES-CTR with 192-bit key: decrypt: ok 236s | verify_bytes() Encrypting 16 octets using AES-CTR with 192-bit key: counter-block: ok 236s ipsec algparse: Encrypting 32 octets using AES-CTR with 192-bit key 236s | decode_to_chunk() raw_key: input "0x7C 5C B2 40 1B 3D C3 3C 19 E7 34 08 19 E0 F6 9C67 8C 3D B8 E6 F6 A9 1A" 236s | decode_to_chunk() output: 236s | 7c 5c b2 40 1b 3d c3 3c 19 e7 34 08 19 e0 f6 9c |\.@.=.<..4..... 236s | 67 8c 3d b8 e6 f6 a9 1a g.=..... 236s | CONCATENATE_DATA_AND_BASE: 236s | target: EXTRACT_KEY_FROM_KEY 236s | base: base-key@0x1044d8a8 (16-bytes, AES_KEY_GEN) 236s | params: 8-bytes@0xfff1b000 236s | key-offset: 0, key-size: 24 236s | EXTRACT_KEY_FROM_KEY: 236s | target: AES_CTR 236s | flags: ENCRYPT+DECRYPT 236s | key_size: 24-bytes 236s | base: base-key@0x1044fb08 (40-bytes, EXTRACT_KEY_FROM_KEY) 236s | operation: FLAGS_ONLY 236s | params: 4-bytes@0xfff1afdc 236s | decode_to_mac() input counter-block: : input "0x 00 96 B0 3B 02 0C 6E AD C2 CB 50 0D 00 00 00 01" 236s | decode_to_mac() output: 236s | 00 96 b0 3b 02 0c 6e ad c2 cb 50 0d 00 00 00 01 ...;..n...P..... 236s | decode_to_chunk() Plaintext: input "0x00 01 02 03 04 05 06 07 08 09 0A 0B 0C 0D 0E 0F10 11 12 13 14 15 16 17 18 19 1A 1B 1C 1D 1E 1F" 236s | decode_to_chunk() output: 236s | 00 01 02 03 04 05 06 07 08 09 0a 0b 0c 0d 0e 0f ................ 236s | 10 11 12 13 14 15 16 17 18 19 1a 1b 1c 1d 1e 1f ................ 236s | decode_to_chunk() Ciphertext: input "0x45 32 43 FC 60 9B 23 32 7E DF AA FA 71 31 CD 9F84 90 70 1C 5A D4 A7 9C FC 1F E0 FF 42 F4 FB 00" 236s | decode_to_chunk() output: 236s | 45 32 43 fc 60 9b 23 32 7e df aa fa 71 31 cd 9f E2C.`.#2~...q1.. 236s | 84 90 70 1c 5a d4 a7 9c fc 1f e0 ff 42 f4 fb 00 ..p.Z.......B... 236s | decode_to_chunk() expected counter-block: : input "0x 00 96 B0 3B 02 0C 6E AD C2 CB 50 0D 00 00 00 03" 236s | decode_to_chunk() output: 236s | 00 96 b0 3b 02 0c 6e ad c2 cb 50 0d 00 00 00 03 ...;..n...P..... 236s | cipher_op_ctr_nss() enter AES_CTR 0x1044d890 use IKEv1 IV wire_iv 0 count 0 236s | ctr_param: count 32 iv 0096b03b020c6eadc2cb500d00000001 236s | cipher_op_ctr_nss() counter-block updated from 0x1 to 0x3 for 32 bytes 236s | do_aes_ctr: exit 236s | cipher_op_context_destroy_ctr_nss() 236s | verify_bytes() Encrypting 32 octets using AES-CTR with 192-bit key: encrypt: ok 236s | verify_bytes() Encrypting 32 octets using AES-CTR with 192-bit key: counter-block: ok 236s | decode_to_mac() input counter-block: : input "0x 00 96 B0 3B 02 0C 6E AD C2 CB 50 0D 00 00 00 01" 236s | decode_to_mac() output: 236s | 00 96 b0 3b 02 0c 6e ad c2 cb 50 0d 00 00 00 01 ...;..n...P..... 236s | decode_to_chunk() Ciphertext: input "0x45 32 43 FC 60 9B 23 32 7E DF AA FA 71 31 CD 9F84 90 70 1C 5A D4 A7 9C FC 1F E0 FF 42 F4 FB 00" 236s | decode_to_chunk() output: 236s | 45 32 43 fc 60 9b 23 32 7e df aa fa 71 31 cd 9f E2C.`.#2~...q1.. 236s | 84 90 70 1c 5a d4 a7 9c fc 1f e0 ff 42 f4 fb 00 ..p.Z.......B... 236s | decode_to_chunk() Plaintext: input "0x00 01 02 03 04 05 06 07 08 09 0A 0B 0C 0D 0E 0F10 11 12 13 14 15 16 17 18 19 1A 1B 1C 1D 1E 1F" 236s | decode_to_chunk() output: 236s | 00 01 02 03 04 05 06 07 08 09 0a 0b 0c 0d 0e 0f ................ 236s | 10 11 12 13 14 15 16 17 18 19 1a 1b 1c 1d 1e 1f ................ 236s | decode_to_chunk() expected counter-block: : input "0x 00 96 B0 3B 02 0C 6E AD C2 CB 50 0D 00 00 00 03" 236s | decode_to_chunk() output: 236s | 00 96 b0 3b 02 0c 6e ad c2 cb 50 0d 00 00 00 03 ...;..n...P..... 236s | cipher_op_ctr_nss() enter AES_CTR 0x1044d890 use IKEv1 IV wire_iv 0 count 0 236s | ctr_param: count 32 iv 0096b03b020c6eadc2cb500d00000001 236s | cipher_op_ctr_nss() counter-block updated from 0x1 to 0x3 for 32 bytes 236s | do_aes_ctr: exit 236s | cipher_op_context_destroy_ctr_nss() 236s | verify_bytes() Encrypting 32 octets using AES-CTR with 192-bit key: decrypt: ok 236s | verify_bytes() Encrypting 32 octets using AES-CTR with 192-bit key: counter-block: ok 236s ipsec algparse: Encrypting 36 octets using AES-CTR with 192-bit key 236s | decode_to_chunk() raw_key: input "0x02 BF 39 1E E8 EC B1 59 B9 59 61 7B 09 65 27 9BF5 9B 60 A7 86 D3 E0 FE" 236s | decode_to_chunk() output: 236s | 02 bf 39 1e e8 ec b1 59 b9 59 61 7b 09 65 27 9b ..9....Y.Ya{.e'. 236s | f5 9b 60 a7 86 d3 e0 fe ..`..... 236s | CONCATENATE_DATA_AND_BASE: 236s | target: EXTRACT_KEY_FROM_KEY 236s | base: base-key@0x1044d8a8 (16-bytes, AES_KEY_GEN) 236s | params: 8-bytes@0xfff1b000 236s | key-offset: 0, key-size: 24 236s | EXTRACT_KEY_FROM_KEY: 236s | target: AES_CTR 236s | flags: ENCRYPT+DECRYPT 236s | key_size: 24-bytes 236s | base: base-key@0x1044fb08 (40-bytes, EXTRACT_KEY_FROM_KEY) 236s | operation: FLAGS_ONLY 236s | params: 4-bytes@0xfff1afdc 236s | decode_to_mac() input counter-block: : input "0x 00 07 BD FD 5C BD 60 27 8D CC 09 12 00 00 00 01" 236s | decode_to_mac() output: 236s | 00 07 bd fd 5c bd 60 27 8d cc 09 12 00 00 00 01 ....\.`'........ 236s | decode_to_chunk() Plaintext: input "0x00 01 02 03 04 05 06 07 08 09 0A 0B 0C 0D 0E 0F10 11 12 13 14 15 16 17 18 19 1A 1B 1C 1D 1E 1F20 21 22 23" 236s | decode_to_chunk() output: 236s | 00 01 02 03 04 05 06 07 08 09 0a 0b 0c 0d 0e 0f ................ 236s | 10 11 12 13 14 15 16 17 18 19 1a 1b 1c 1d 1e 1f ................ 236s | 20 21 22 23 !"# 236s | decode_to_chunk() Ciphertext: input "0x96 89 3F C5 5E 5C 72 2F 54 0B 7D D1 DD F7 E7 58D2 88 BC 95 C6 91 65 88 45 36 C8 11 66 2F 21 88AB EE 09 35" 236s | decode_to_chunk() output: 236s | 96 89 3f c5 5e 5c 72 2f 54 0b 7d d1 dd f7 e7 58 ..?.^\r/T.}....X 236s | d2 88 bc 95 c6 91 65 88 45 36 c8 11 66 2f 21 88 ......e.E6..f/!. 236s | ab ee 09 35 ...5 236s | decode_to_chunk() expected counter-block: : input "0x 00 07 BD FD 5C BD 60 27 8D CC 09 12 00 00 00 04" 236s | decode_to_chunk() output: 236s | 00 07 bd fd 5c bd 60 27 8d cc 09 12 00 00 00 04 ....\.`'........ 236s | cipher_op_ctr_nss() enter AES_CTR 0x1044d890 use IKEv1 IV wire_iv 0 count 0 236s | ctr_param: count 32 iv 0007bdfd5cbd60278dcc091200000001 236s | cipher_op_ctr_nss() counter-block updated from 0x1 to 0x4 for 36 bytes 236s | do_aes_ctr: exit 236s | cipher_op_context_destroy_ctr_nss() 236s | verify_bytes() Encrypting 36 octets using AES-CTR with 192-bit key: encrypt: ok 236s | verify_bytes() Encrypting 36 octets using AES-CTR with 192-bit key: counter-block: ok 236s | decode_to_mac() input counter-block: : input "0x 00 07 BD FD 5C BD 60 27 8D CC 09 12 00 00 00 01" 236s | decode_to_mac() output: 236s | 00 07 bd fd 5c bd 60 27 8d cc 09 12 00 00 00 01 ....\.`'........ 236s | decode_to_chunk() Ciphertext: input "0x96 89 3F C5 5E 5C 72 2F 54 0B 7D D1 DD F7 E7 58D2 88 BC 95 C6 91 65 88 45 36 C8 11 66 2F 21 88AB EE 09 35" 236s | decode_to_chunk() output: 236s | 96 89 3f c5 5e 5c 72 2f 54 0b 7d d1 dd f7 e7 58 ..?.^\r/T.}....X 236s | d2 88 bc 95 c6 91 65 88 45 36 c8 11 66 2f 21 88 ......e.E6..f/!. 236s | ab ee 09 35 ...5 236s | decode_to_chunk() Plaintext: input "0x00 01 02 03 04 05 06 07 08 09 0A 0B 0C 0D 0E 0F10 11 12 13 14 15 16 17 18 19 1A 1B 1C 1D 1E 1F20 21 22 23" 236s | decode_to_chunk() output: 236s | 00 01 02 03 04 05 06 07 08 09 0a 0b 0c 0d 0e 0f ................ 236s | 10 11 12 13 14 15 16 17 18 19 1a 1b 1c 1d 1e 1f ................ 236s | 20 21 22 23 !"# 236s | decode_to_chunk() expected counter-block: : input "0x 00 07 BD FD 5C BD 60 27 8D CC 09 12 00 00 00 04" 236s | decode_to_chunk() output: 236s | 00 07 bd fd 5c bd 60 27 8d cc 09 12 00 00 00 04 ....\.`'........ 236s | cipher_op_ctr_nss() enter AES_CTR 0x1044d890 use IKEv1 IV wire_iv 0 count 0 236s | ctr_param: count 32 iv 0007bdfd5cbd60278dcc091200000001 236s | cipher_op_ctr_nss() counter-block updated from 0x1 to 0x4 for 36 bytes 236s | do_aes_ctr: exit 236s | cipher_op_context_destroy_ctr_nss() 236s | verify_bytes() Encrypting 36 octets using AES-CTR with 192-bit key: decrypt: ok 236s | verify_bytes() Encrypting 36 octets using AES-CTR with 192-bit key: counter-block: ok 236s ipsec algparse: Encrypting 16 octets using AES-CTR with 256-bit key 236s | decode_to_chunk() raw_key: input "0x77 6B EF F2 85 1D B0 6F 4C 8A 05 42 C8 69 6F 6C6A 81 AF 1E EC 96 B4 D3 7F C1 D6 89 E6 C1 C1 04" 236s | decode_to_chunk() output: 236s | 77 6b ef f2 85 1d b0 6f 4c 8a 05 42 c8 69 6f 6c wk.....oL..B.iol 236s | 6a 81 af 1e ec 96 b4 d3 7f c1 d6 89 e6 c1 c1 04 j............... 236s | CONCATENATE_DATA_AND_BASE: 236s | target: EXTRACT_KEY_FROM_KEY 236s | base: base-key@0x1044d8a8 (16-bytes, AES_KEY_GEN) 236s | params: 8-bytes@0xfff1b000 236s | key-offset: 0, key-size: 32 236s | EXTRACT_KEY_FROM_KEY: 236s | target: AES_CTR 236s | flags: ENCRYPT+DECRYPT 236s | key_size: 32-bytes 236s | base: base-key@0x1044fb08 (48-bytes, EXTRACT_KEY_FROM_KEY) 236s | operation: FLAGS_ONLY 236s | params: 4-bytes@0xfff1afdc 236s | decode_to_mac() input counter-block: : input "0x 00 00 00 60 DB 56 72 C9 7A A8 F0 B2 00 00 00 01" 236s | decode_to_mac() output: 236s | 00 00 00 60 db 56 72 c9 7a a8 f0 b2 00 00 00 01 ...`.Vr.z....... 236s | decode_to_chunk() Plaintext: input "0x 53 69 6E 67 6C 65 20 62 6C 6F 63 6B 20 6D 73 67" 236s | decode_to_chunk() output: 236s | 53 69 6e 67 6c 65 20 62 6c 6f 63 6b 20 6d 73 67 Single block msg 236s | decode_to_chunk() Ciphertext: input "0x 14 5A D0 1D BF 82 4E C7 56 08 63 DC 71 E3 E0 C0" 236s | decode_to_chunk() output: 236s | 14 5a d0 1d bf 82 4e c7 56 08 63 dc 71 e3 e0 c0 .Z....N.V.c.q... 236s | decode_to_chunk() expected counter-block: : input "0x 00 00 00 60 DB 56 72 C9 7A A8 F0 B2 00 00 00 02" 236s | decode_to_chunk() output: 236s | 00 00 00 60 db 56 72 c9 7a a8 f0 b2 00 00 00 02 ...`.Vr.z....... 236s | cipher_op_ctr_nss() enter AES_CTR 0x1044d890 use IKEv1 IV wire_iv 0 count 0 236s | ctr_param: count 32 iv 00000060db5672c97aa8f0b200000001 236s | cipher_op_ctr_nss() counter-block updated from 0x1 to 0x2 for 16 bytes 236s | do_aes_ctr: exit 236s | cipher_op_context_destroy_ctr_nss() 236s | verify_bytes() Encrypting 16 octets using AES-CTR with 256-bit key: encrypt: ok 236s | verify_bytes() Encrypting 16 octets using AES-CTR with 256-bit key: counter-block: ok 236s | decode_to_mac() input counter-block: : input "0x 00 00 00 60 DB 56 72 C9 7A A8 F0 B2 00 00 00 01" 236s | decode_to_mac() output: 236s | 00 00 00 60 db 56 72 c9 7a a8 f0 b2 00 00 00 01 ...`.Vr.z....... 236s | decode_to_chunk() Ciphertext: input "0x 14 5A D0 1D BF 82 4E C7 56 08 63 DC 71 E3 E0 C0" 236s | decode_to_chunk() output: 236s | 14 5a d0 1d bf 82 4e c7 56 08 63 dc 71 e3 e0 c0 .Z....N.V.c.q... 236s | decode_to_chunk() Plaintext: input "0x 53 69 6E 67 6C 65 20 62 6C 6F 63 6B 20 6D 73 67" 236s | decode_to_chunk() output: 236s | 53 69 6e 67 6c 65 20 62 6c 6f 63 6b 20 6d 73 67 Single block msg 236s | decode_to_chunk() expected counter-block: : input "0x 00 00 00 60 DB 56 72 C9 7A A8 F0 B2 00 00 00 02" 236s | decode_to_chunk() output: 236s | 00 00 00 60 db 56 72 c9 7a a8 f0 b2 00 00 00 02 ...`.Vr.z....... 236s | cipher_op_ctr_nss() enter AES_CTR 0x1044d890 use IKEv1 IV wire_iv 0 count 0 236s | ctr_param: count 32 iv 00000060db5672c97aa8f0b200000001 236s | cipher_op_ctr_nss() counter-block updated from 0x1 to 0x2 for 16 bytes 236s | do_aes_ctr: exit 236s | cipher_op_context_destroy_ctr_nss() 236s | verify_bytes() Encrypting 16 octets using AES-CTR with 256-bit key: decrypt: ok 236s | verify_bytes() Encrypting 16 octets using AES-CTR with 256-bit key: counter-block: ok 236s ipsec algparse: Encrypting 32 octets using AES-CTR with 256-bit key 236s | decode_to_chunk() raw_key: input "0xF6 D6 6D 6B D5 2D 59 BB 07 96 36 58 79 EF F8 86C6 6D D5 1A 5B 6A 99 74 4B 50 59 0C 87 A2 38 84" 236s | decode_to_chunk() output: 236s | f6 d6 6d 6b d5 2d 59 bb 07 96 36 58 79 ef f8 86 ..mk.-Y...6Xy... 236s | c6 6d d5 1a 5b 6a 99 74 4b 50 59 0c 87 a2 38 84 .m..[j.tKPY...8. 236s | CONCATENATE_DATA_AND_BASE: 236s | target: EXTRACT_KEY_FROM_KEY 236s | base: base-key@0x1044d8a8 (16-bytes, AES_KEY_GEN) 236s | params: 8-bytes@0xfff1b000 236s | key-offset: 0, key-size: 32 236s | EXTRACT_KEY_FROM_KEY: 236s | target: AES_CTR 236s | flags: ENCRYPT+DECRYPT 236s | key_size: 32-bytes 236s | base: base-key@0x1044fb08 (48-bytes, EXTRACT_KEY_FROM_KEY) 236s | operation: FLAGS_ONLY 236s | params: 4-bytes@0xfff1afdc 236s | decode_to_mac() input counter-block: : input "0x 00 FA AC 24 C1 58 5E F1 5A 43 D8 75 00 00 00 01" 236s | decode_to_mac() output: 236s | 00 fa ac 24 c1 58 5e f1 5a 43 d8 75 00 00 00 01 ...$.X^.ZC.u.... 236s | decode_to_chunk() Plaintext: input "0x00 01 02 03 04 05 06 07 08 09 0A 0B 0C 0D 0E 0F10 11 12 13 14 15 16 17 18 19 1A 1B 1C 1D 1E 1F" 236s | decode_to_chunk() output: 236s | 00 01 02 03 04 05 06 07 08 09 0a 0b 0c 0d 0e 0f ................ 236s | 10 11 12 13 14 15 16 17 18 19 1a 1b 1c 1d 1e 1f ................ 236s | decode_to_chunk() Ciphertext: input "0xF0 5E 23 1B 38 94 61 2C 49 EE 00 0B 80 4E B2 A9B8 30 6B 50 8F 83 9D 6A 55 30 83 1D 93 44 AF 1C" 236s | decode_to_chunk() output: 236s | f0 5e 23 1b 38 94 61 2c 49 ee 00 0b 80 4e b2 a9 .^#.8.a,I....N.. 236s | b8 30 6b 50 8f 83 9d 6a 55 30 83 1d 93 44 af 1c .0kP...jU0...D.. 236s | decode_to_chunk() expected counter-block: : input "0x 00 FA AC 24 C1 58 5E F1 5A 43 D8 75 00 00 00 03" 236s | decode_to_chunk() output: 236s | 00 fa ac 24 c1 58 5e f1 5a 43 d8 75 00 00 00 03 ...$.X^.ZC.u.... 236s | cipher_op_ctr_nss() enter AES_CTR 0x1044d890 use IKEv1 IV wire_iv 0 count 0 236s | ctr_param: count 32 iv 00faac24c1585ef15a43d87500000001 236s | cipher_op_ctr_nss() counter-block updated from 0x1 to 0x3 for 32 bytes 236s | do_aes_ctr: exit 236s | cipher_op_context_destroy_ctr_nss() 236s | verify_bytes() Encrypting 32 octets using AES-CTR with 256-bit key: encrypt: ok 236s | verify_bytes() Encrypting 32 octets using AES-CTR with 256-bit key: counter-block: ok 236s | decode_to_mac() input counter-block: : input "0x 00 FA AC 24 C1 58 5E F1 5A 43 D8 75 00 00 00 01" 236s | decode_to_mac() output: 236s | 00 fa ac 24 c1 58 5e f1 5a 43 d8 75 00 00 00 01 ...$.X^.ZC.u.... 236s | decode_to_chunk() Ciphertext: input "0xF0 5E 23 1B 38 94 61 2C 49 EE 00 0B 80 4E B2 A9B8 30 6B 50 8F 83 9D 6A 55 30 83 1D 93 44 AF 1C" 236s | decode_to_chunk() output: 236s | f0 5e 23 1b 38 94 61 2c 49 ee 00 0b 80 4e b2 a9 .^#.8.a,I....N.. 236s | b8 30 6b 50 8f 83 9d 6a 55 30 83 1d 93 44 af 1c .0kP...jU0...D.. 236s | decode_to_chunk() Plaintext: input "0x00 01 02 03 04 05 06 07 08 09 0A 0B 0C 0D 0E 0F10 11 12 13 14 15 16 17 18 19 1A 1B 1C 1D 1E 1F" 236s | decode_to_chunk() output: 236s | 00 01 02 03 04 05 06 07 08 09 0a 0b 0c 0d 0e 0f ................ 236s | 10 11 12 13 14 15 16 17 18 19 1a 1b 1c 1d 1e 1f ................ 236s | decode_to_chunk() expected counter-block: : input "0x 00 FA AC 24 C1 58 5E F1 5A 43 D8 75 00 00 00 03" 236s | decode_to_chunk() output: 236s | 00 fa ac 24 c1 58 5e f1 5a 43 d8 75 00 00 00 03 ...$.X^.ZC.u.... 236s | cipher_op_ctr_nss() enter AES_CTR 0x1044d890 use IKEv1 IV wire_iv 0 count 0 236s | ctr_param: count 32 iv 00faac24c1585ef15a43d87500000001 236s | cipher_op_ctr_nss() counter-block updated from 0x1 to 0x3 for 32 bytes 236s | do_aes_ctr: exit 236s | cipher_op_context_destroy_ctr_nss() 236s | verify_bytes() Encrypting 32 octets using AES-CTR with 256-bit key: decrypt: ok 236s | verify_bytes() Encrypting 32 octets using AES-CTR with 256-bit key: counter-block: ok 236s ipsec algparse: Encrypting 36 octets using AES-CTR with 256-bit key 236s | decode_to_chunk() raw_key: input "0xFF 7A 61 7C E6 91 48 E4 F1 72 6E 2F 43 58 1D E2AA 62 D9 F8 05 53 2E DF F1 EE D6 87 FB 54 15 3D" 236s | decode_to_chunk() output: 236s | ff 7a 61 7c e6 91 48 e4 f1 72 6e 2f 43 58 1d e2 .za|..H..rn/CX.. 236s | aa 62 d9 f8 05 53 2e df f1 ee d6 87 fb 54 15 3d .b...S.......T.= 236s | CONCATENATE_DATA_AND_BASE: 236s | target: EXTRACT_KEY_FROM_KEY 236s | base: base-key@0x1044d8a8 (16-bytes, AES_KEY_GEN) 236s | params: 8-bytes@0xfff1b000 236s | key-offset: 0, key-size: 32 236s | EXTRACT_KEY_FROM_KEY: 236s | target: AES_CTR 236s | flags: ENCRYPT+DECRYPT 236s | key_size: 32-bytes 236s | base: base-key@0x1044fb08 (48-bytes, EXTRACT_KEY_FROM_KEY) 236s | operation: FLAGS_ONLY 236s | params: 4-bytes@0xfff1afdc 236s | decode_to_mac() input counter-block: : input "0x 00 1C C5 B7 51 A5 1D 70 A1 C1 11 48 00 00 00 01" 236s | decode_to_mac() output: 236s | 00 1c c5 b7 51 a5 1d 70 a1 c1 11 48 00 00 00 01 ....Q..p...H.... 236s | decode_to_chunk() Plaintext: input "0x00 01 02 03 04 05 06 07 08 09 0A 0B 0C 0D 0E 0F10 11 12 13 14 15 16 17 18 19 1A 1B 1C 1D 1E 1F20 21 22 23" 236s | decode_to_chunk() output: 236s | 00 01 02 03 04 05 06 07 08 09 0a 0b 0c 0d 0e 0f ................ 236s | 10 11 12 13 14 15 16 17 18 19 1a 1b 1c 1d 1e 1f ................ 236s | 20 21 22 23 !"# 236s | decode_to_chunk() Ciphertext: input "0xEB 6C 52 82 1D 0B BB F7 CE 75 94 46 2A CA 4F AAB4 07 DF 86 65 69 FD 07 F4 8C C0 B5 83 D6 07 1F1E C0 E6 B8" 236s | decode_to_chunk() output: 236s | eb 6c 52 82 1d 0b bb f7 ce 75 94 46 2a ca 4f aa .lR......u.F*.O. 236s | b4 07 df 86 65 69 fd 07 f4 8c c0 b5 83 d6 07 1f ....ei.......... 236s | 1e c0 e6 b8 .... 236s | decode_to_chunk() expected counter-block: : input "0x 00 1C C5 B7 51 A5 1D 70 A1 C1 11 48 00 00 00 04" 236s | decode_to_chunk() output: 236s | 00 1c c5 b7 51 a5 1d 70 a1 c1 11 48 00 00 00 04 ....Q..p...H.... 236s | cipher_op_ctr_nss() enter AES_CTR 0x1044d890 use IKEv1 IV wire_iv 0 count 0 236s | ctr_param: count 32 iv 001cc5b751a51d70a1c1114800000001 236s | cipher_op_ctr_nss() counter-block updated from 0x1 to 0x4 for 36 bytes 236s | do_aes_ctr: exit 236s | cipher_op_context_destroy_ctr_nss() 236s | verify_bytes() Encrypting 36 octets using AES-CTR with 256-bit key: encrypt: ok 236s | verify_bytes() Encrypting 36 octets using AES-CTR with 256-bit key: counter-block: ok 236s | decode_to_mac() input counter-block: : input "0x 00 1C C5 B7 51 A5 1D 70 A1 C1 11 48 00 00 00 01" 236s | decode_to_mac() output: 236s | 00 1c c5 b7 51 a5 1d 70 a1 c1 11 48 00 00 00 01 ....Q..p...H.... 236s | decode_to_chunk() Ciphertext: input "0xEB 6C 52 82 1D 0B BB F7 CE 75 94 46 2A CA 4F AAB4 07 DF 86 65 69 FD 07 F4 8C C0 B5 83 D6 07 1F1E C0 E6 B8" 236s | decode_to_chunk() output: 236s | eb 6c 52 82 1d 0b bb f7 ce 75 94 46 2a ca 4f aa .lR......u.F*.O. 236s | b4 07 df 86 65 69 fd 07 f4 8c c0 b5 83 d6 07 1f ....ei.......... 236s | 1e c0 e6 b8 .... 236s | decode_to_chunk() Plaintext: input "0x00 01 02 03 04 05 06 07 08 09 0A 0B 0C 0D 0E 0F10 11 12 13 14 15 16 17 18 19 1A 1B 1C 1D 1E 1F20 21 22 23" 236s | decode_to_chunk() output: 236s | 00 01 02 03 04 05 06 07 08 09 0a 0b 0c 0d 0e 0f ................ 236s | 10 11 12 13 14 15 16 17 18 19 1a 1b 1c 1d 1e 1f ................ 236s | 20 21 22 23 !"# 236s | decode_to_chunk() expected counter-block: : input "0x 00 1C C5 B7 51 A5 1D 70 A1 C1 11 48 00 00 00 04" 236s | decode_to_chunk() output: 236s | 00 1c c5 b7 51 a5 1d 70 a1 c1 11 48 00 00 00 04 ....Q..p...H.... 236s | cipher_op_ctr_nss() enter AES_CTR 0x1044d890 use IKEv1 IV wire_iv 0 count 0 236s | ctr_param: count 32 iv 001cc5b751a51d70a1c1114800000001 236s | cipher_op_ctr_nss() counter-block updated from 0x1 to 0x4 for 36 bytes 236s | do_aes_ctr: exit 236s | cipher_op_context_destroy_ctr_nss() 236s | verify_bytes() Encrypting 36 octets using AES-CTR with 256-bit key: decrypt: ok 236s | verify_bytes() Encrypting 36 octets using AES-CTR with 256-bit key: counter-block: ok 236s ipsec algparse: testing AES_CBC: 236s ipsec algparse: Encrypting 16 bytes (1 block) using AES-CBC with 128-bit key 236s | decode_to_chunk() raw_key: input "0x06a9214036b8a15b512e03d534120006" 236s | decode_to_chunk() output: 236s | 06 a9 21 40 36 b8 a1 5b 51 2e 03 d5 34 12 00 06 ..!@6..[Q...4... 236s | CONCATENATE_DATA_AND_BASE: 236s | target: EXTRACT_KEY_FROM_KEY 236s | base: base-key@0x1044d8a8 (16-bytes, AES_KEY_GEN) 236s | params: 8-bytes@0xfff1b008 236s | key-offset: 0, key-size: 16 236s | EXTRACT_KEY_FROM_KEY: 236s | target: AES_CBC 236s | flags: ENCRYPT+DECRYPT 236s | key_size: 16-bytes 236s | base: base-key@0x1044fb08 (32-bytes, EXTRACT_KEY_FROM_KEY) 236s | operation: FLAGS_ONLY 236s | params: 4-bytes@0xfff1afe4 236s | decode_to_mac() IV: : input "0x3dafba429d9eb430b422da802c9fac41" 236s | decode_to_mac() output: 236s | 3d af ba 42 9d 9e b4 30 b4 22 da 80 2c 9f ac 41 =..B...0."..,..A 236s | decode_to_chunk() new IV: : input "0xe353779c1079aeb82708942dbe77181a" 236s | decode_to_chunk() output: 236s | e3 53 77 9c 10 79 ae b8 27 08 94 2d be 77 18 1a .Sw..y..'..-.w.. 236s | decode_to_chunk() plaintext: : input "Single block msg" 236s | decode_to_chunk() output: 236s | 53 69 6e 67 6c 65 20 62 6c 6f 63 6b 20 6d 73 67 Single block msg 236s | decode_to_chunk() ciphertext: : input "0xe353779c1079aeb82708942dbe77181a" 236s | decode_to_chunk() output: 236s | e3 53 77 9c 10 79 ae b8 27 08 94 2d be 77 18 1a .Sw..y..'..-.w.. 236s | NSS ike_alg_nss_cbc: AES_CBC - enter (nil) 236s | using IKEv1 IV 236s | NSS ike_alg_nss_cbc: AES_CBC - exit 236s | verify_bytes() Encrypting 16 bytes (1 block) using AES-CBC with 128-bit key: encrypt: ok 236s | verify_bytes() Encrypting 16 bytes (1 block) using AES-CBC with 128-bit key: updated CBC IV: ok 236s | decode_to_mac() IV: : input "0x3dafba429d9eb430b422da802c9fac41" 236s | decode_to_mac() output: 236s | 3d af ba 42 9d 9e b4 30 b4 22 da 80 2c 9f ac 41 =..B...0."..,..A 236s | decode_to_chunk() new IV: : input "0xe353779c1079aeb82708942dbe77181a" 236s | decode_to_chunk() output: 236s | e3 53 77 9c 10 79 ae b8 27 08 94 2d be 77 18 1a .Sw..y..'..-.w.. 236s | decode_to_chunk() ciphertext: : input "0xe353779c1079aeb82708942dbe77181a" 236s | decode_to_chunk() output: 236s | e3 53 77 9c 10 79 ae b8 27 08 94 2d be 77 18 1a .Sw..y..'..-.w.. 236s | decode_to_chunk() plaintext: : input "Single block msg" 236s | decode_to_chunk() output: 236s | 53 69 6e 67 6c 65 20 62 6c 6f 63 6b 20 6d 73 67 Single block msg 236s | NSS ike_alg_nss_cbc: AES_CBC - enter (nil) 236s | using IKEv1 IV 236s | NSS ike_alg_nss_cbc: AES_CBC - exit 236s | verify_bytes() Encrypting 16 bytes (1 block) using AES-CBC with 128-bit key: decrypt: ok 236s | verify_bytes() Encrypting 16 bytes (1 block) using AES-CBC with 128-bit key: updated CBC IV: ok 236s ipsec algparse: Encrypting 32 bytes (2 blocks) using AES-CBC with 128-bit key 236s | decode_to_chunk() raw_key: input "0xc286696d887c9aa0611bbb3e2025a45a" 236s | decode_to_chunk() output: 236s | c2 86 69 6d 88 7c 9a a0 61 1b bb 3e 20 25 a4 5a ..im.|..a..> %.Z 236s | CONCATENATE_DATA_AND_BASE: 236s | target: EXTRACT_KEY_FROM_KEY 236s | base: base-key@0x1044d8a8 (16-bytes, AES_KEY_GEN) 236s | params: 8-bytes@0xfff1b008 236s | key-offset: 0, key-size: 16 236s | EXTRACT_KEY_FROM_KEY: 236s | target: AES_CBC 236s | flags: ENCRYPT+DECRYPT 236s | key_size: 16-bytes 236s | base: base-key@0x1044fb08 (32-bytes, EXTRACT_KEY_FROM_KEY) 236s | operation: FLAGS_ONLY 236s | params: 4-bytes@0xfff1afe4 236s | decode_to_mac() IV: : input "0x562e17996d093d28ddb3ba695a2e6f58" 236s | decode_to_mac() output: 236s | 56 2e 17 99 6d 09 3d 28 dd b3 ba 69 5a 2e 6f 58 V...m.=(...iZ.oX 236s | decode_to_chunk() new IV: : input "0xd296cd94c2cccf8a3a863028b5e1dc0a7586602d253cfff91b8266bea6d61ab1" 236s | decode_to_chunk() output: 236s | d2 96 cd 94 c2 cc cf 8a 3a 86 30 28 b5 e1 dc 0a ........:.0(.... 236s | 75 86 60 2d 25 3c ff f9 1b 82 66 be a6 d6 1a b1 u.`-%<....f..... 236s | decode_to_chunk() plaintext: : input "0x000102030405060708090a0b0c0d0e0f101112131415161718191a1b1c1d1e1f" 236s | decode_to_chunk() output: 236s | 00 01 02 03 04 05 06 07 08 09 0a 0b 0c 0d 0e 0f ................ 236s | 10 11 12 13 14 15 16 17 18 19 1a 1b 1c 1d 1e 1f ................ 236s | decode_to_chunk() ciphertext: : input "0xd296cd94c2cccf8a3a863028b5e1dc0a7586602d253cfff91b8266bea6d61ab1" 236s | decode_to_chunk() output: 236s | d2 96 cd 94 c2 cc cf 8a 3a 86 30 28 b5 e1 dc 0a ........:.0(.... 236s | 75 86 60 2d 25 3c ff f9 1b 82 66 be a6 d6 1a b1 u.`-%<....f..... 236s | NSS ike_alg_nss_cbc: AES_CBC - enter (nil) 236s | using IKEv1 IV 236s | NSS ike_alg_nss_cbc: AES_CBC - exit 236s | verify_bytes() Encrypting 32 bytes (2 blocks) using AES-CBC with 128-bit key: encrypt: ok 236s | verify_bytes() Encrypting 32 bytes (2 blocks) using AES-CBC with 128-bit key: updated CBC IV: ok 236s | decode_to_mac() IV: : input "0x562e17996d093d28ddb3ba695a2e6f58" 236s | decode_to_mac() output: 236s | 56 2e 17 99 6d 09 3d 28 dd b3 ba 69 5a 2e 6f 58 V...m.=(...iZ.oX 236s | decode_to_chunk() new IV: : input "0xd296cd94c2cccf8a3a863028b5e1dc0a7586602d253cfff91b8266bea6d61ab1" 236s | decode_to_chunk() output: 236s | d2 96 cd 94 c2 cc cf 8a 3a 86 30 28 b5 e1 dc 0a ........:.0(.... 236s | 75 86 60 2d 25 3c ff f9 1b 82 66 be a6 d6 1a b1 u.`-%<....f..... 236s | decode_to_chunk() ciphertext: : input "0xd296cd94c2cccf8a3a863028b5e1dc0a7586602d253cfff91b8266bea6d61ab1" 236s | decode_to_chunk() output: 236s | d2 96 cd 94 c2 cc cf 8a 3a 86 30 28 b5 e1 dc 0a ........:.0(.... 236s | 75 86 60 2d 25 3c ff f9 1b 82 66 be a6 d6 1a b1 u.`-%<....f..... 236s | decode_to_chunk() plaintext: : input "0x000102030405060708090a0b0c0d0e0f101112131415161718191a1b1c1d1e1f" 236s | decode_to_chunk() output: 236s | 00 01 02 03 04 05 06 07 08 09 0a 0b 0c 0d 0e 0f ................ 236s | 10 11 12 13 14 15 16 17 18 19 1a 1b 1c 1d 1e 1f ................ 236s | NSS ike_alg_nss_cbc: AES_CBC - enter (nil) 236s | using IKEv1 IV 236s | NSS ike_alg_nss_cbc: AES_CBC - exit 236s | verify_bytes() Encrypting 32 bytes (2 blocks) using AES-CBC with 128-bit key: decrypt: ok 236s | verify_bytes() Encrypting 32 bytes (2 blocks) using AES-CBC with 128-bit key: updated CBC IV: ok 236s ipsec algparse: Encrypting 48 bytes (3 blocks) using AES-CBC with 128-bit key 236s | decode_to_chunk() raw_key: input "0x6c3ea0477630ce21a2ce334aa746c2cd" 236s | decode_to_chunk() output: 236s | 6c 3e a0 47 76 30 ce 21 a2 ce 33 4a a7 46 c2 cd l>.Gv0.!..3J.F.. 236s | CONCATENATE_DATA_AND_BASE: 236s | target: EXTRACT_KEY_FROM_KEY 236s | base: base-key@0x1044d8a8 (16-bytes, AES_KEY_GEN) 236s | params: 8-bytes@0xfff1b008 236s | key-offset: 0, key-size: 16 236s | EXTRACT_KEY_FROM_KEY: 236s | target: AES_CBC 236s | flags: ENCRYPT+DECRYPT 236s | key_size: 16-bytes 236s | base: base-key@0x1044fb08 (32-bytes, EXTRACT_KEY_FROM_KEY) 236s | operation: FLAGS_ONLY 236s | params: 4-bytes@0xfff1afe4 236s | decode_to_mac() IV: : input "0xc782dc4c098c66cbd9cd27d825682c81" 236s | decode_to_mac() output: 236s | c7 82 dc 4c 09 8c 66 cb d9 cd 27 d8 25 68 2c 81 ...L..f...'.%h,. 236s | decode_to_chunk() new IV: : input "0xd0a02b3836451753d493665d33f0e8862dea54cdb293abc7506939276772f8d5021c19216bad525c8579695d83ba2684" 236s | decode_to_chunk() output: 236s | d0 a0 2b 38 36 45 17 53 d4 93 66 5d 33 f0 e8 86 ..+86E.S..f]3... 236s | 2d ea 54 cd b2 93 ab c7 50 69 39 27 67 72 f8 d5 -.T.....Pi9'gr.. 236s | 02 1c 19 21 6b ad 52 5c 85 79 69 5d 83 ba 26 84 ...!k.R\.yi]..&. 236s | decode_to_chunk() plaintext: : input "This is a 48-byte message (exactly 3 AES blocks)" 236s | decode_to_chunk() output: 236s | 54 68 69 73 20 69 73 20 61 20 34 38 2d 62 79 74 This is a 48-byt 236s | 65 20 6d 65 73 73 61 67 65 20 28 65 78 61 63 74 e message (exact 236s | 6c 79 20 33 20 41 45 53 20 62 6c 6f 63 6b 73 29 ly 3 AES blocks) 236s | decode_to_chunk() ciphertext: : input "0xd0a02b3836451753d493665d33f0e8862dea54cdb293abc7506939276772f8d5021c19216bad525c8579695d83ba2684" 236s | decode_to_chunk() output: 236s | d0 a0 2b 38 36 45 17 53 d4 93 66 5d 33 f0 e8 86 ..+86E.S..f]3... 236s | 2d ea 54 cd b2 93 ab c7 50 69 39 27 67 72 f8 d5 -.T.....Pi9'gr.. 236s | 02 1c 19 21 6b ad 52 5c 85 79 69 5d 83 ba 26 84 ...!k.R\.yi]..&. 236s | NSS ike_alg_nss_cbc: AES_CBC - enter (nil) 236s | using IKEv1 IV 236s | NSS ike_alg_nss_cbc: AES_CBC - exit 236s | verify_bytes() Encrypting 48 bytes (3 blocks) using AES-CBC with 128-bit key: encrypt: ok 236s | verify_bytes() Encrypting 48 bytes (3 blocks) using AES-CBC with 128-bit key: updated CBC IV: ok 236s | decode_to_mac() IV: : input "0xc782dc4c098c66cbd9cd27d825682c81" 236s | decode_to_mac() output: 236s | c7 82 dc 4c 09 8c 66 cb d9 cd 27 d8 25 68 2c 81 ...L..f...'.%h,. 236s | decode_to_chunk() new IV: : input "0xd0a02b3836451753d493665d33f0e8862dea54cdb293abc7506939276772f8d5021c19216bad525c8579695d83ba2684" 236s | decode_to_chunk() output: 236s | d0 a0 2b 38 36 45 17 53 d4 93 66 5d 33 f0 e8 86 ..+86E.S..f]3... 236s | 2d ea 54 cd b2 93 ab c7 50 69 39 27 67 72 f8 d5 -.T.....Pi9'gr.. 236s | 02 1c 19 21 6b ad 52 5c 85 79 69 5d 83 ba 26 84 ...!k.R\.yi]..&. 236s | decode_to_chunk() ciphertext: : input "0xd0a02b3836451753d493665d33f0e8862dea54cdb293abc7506939276772f8d5021c19216bad525c8579695d83ba2684" 236s | decode_to_chunk() output: 236s | d0 a0 2b 38 36 45 17 53 d4 93 66 5d 33 f0 e8 86 ..+86E.S..f]3... 236s | 2d ea 54 cd b2 93 ab c7 50 69 39 27 67 72 f8 d5 -.T.....Pi9'gr.. 236s | 02 1c 19 21 6b ad 52 5c 85 79 69 5d 83 ba 26 84 ...!k.R\.yi]..&. 236s | decode_to_chunk() plaintext: : input "This is a 48-byte message (exactly 3 AES blocks)" 236s | decode_to_chunk() output: 236s | 54 68 69 73 20 69 73 20 61 20 34 38 2d 62 79 74 This is a 48-byt 236s | 65 20 6d 65 73 73 61 67 65 20 28 65 78 61 63 74 e message (exact 236s | 6c 79 20 33 20 41 45 53 20 62 6c 6f 63 6b 73 29 ly 3 AES blocks) 236s | NSS ike_alg_nss_cbc: AES_CBC - enter (nil) 236s | using IKEv1 IV 236s | NSS ike_alg_nss_cbc: AES_CBC - exit 236s | verify_bytes() Encrypting 48 bytes (3 blocks) using AES-CBC with 128-bit key: decrypt: ok 236s | verify_bytes() Encrypting 48 bytes (3 blocks) using AES-CBC with 128-bit key: updated CBC IV: ok 236s ipsec algparse: Encrypting 64 bytes (4 blocks) using AES-CBC with 128-bit key 236s | decode_to_chunk() raw_key: input "0x56e47a38c5598974bc46903dba290349" 236s | decode_to_chunk() output: 236s | 56 e4 7a 38 c5 59 89 74 bc 46 90 3d ba 29 03 49 V.z8.Y.t.F.=.).I 236s | CONCATENATE_DATA_AND_BASE: 236s | target: EXTRACT_KEY_FROM_KEY 236s | base: base-key@0x1044d8a8 (16-bytes, AES_KEY_GEN) 236s | params: 8-bytes@0xfff1b008 236s | key-offset: 0, key-size: 16 236s | EXTRACT_KEY_FROM_KEY: 236s | target: AES_CBC 236s | flags: ENCRYPT+DECRYPT 236s | key_size: 16-bytes 236s | base: base-key@0x1044fb08 (32-bytes, EXTRACT_KEY_FROM_KEY) 236s | operation: FLAGS_ONLY 236s | params: 4-bytes@0xfff1afe4 236s | decode_to_mac() IV: : input "0x8ce82eefbea0da3c44699ed7db51b7d9" 236s | decode_to_mac() output: 236s | 8c e8 2e ef be a0 da 3c 44 69 9e d7 db 51 b7 d9 ...........U 236s | decode_to_chunk() plaintext: : input "0xa0a1a2a3a4a5a6a7a8a9aaabacadaeafb0b1b2b3b4b5b6b7b8b9babbbcbdbebfc0c1c2c3c4c5c6c7c8c9cacbcccdcecfd0d1d2d3d4d5d6d7d8d9dadbdcdddedf" 236s | decode_to_chunk() output: 236s | a0 a1 a2 a3 a4 a5 a6 a7 a8 a9 aa ab ac ad ae af ................ 236s | b0 b1 b2 b3 b4 b5 b6 b7 b8 b9 ba bb bc bd be bf ................ 236s | c0 c1 c2 c3 c4 c5 c6 c7 c8 c9 ca cb cc cd ce cf ................ 236s | d0 d1 d2 d3 d4 d5 d6 d7 d8 d9 da db dc dd de df ................ 236s | decode_to_chunk() ciphertext: : input "0xc30e32ffedc0774e6aff6af0869f71aa0f3af07a9a31a9c684db207eb0ef8e4e35907aa632c3ffdf868bb7b29d3d46ad83ce9f9a102ee99d49a53e87f4c3da55" 236s | decode_to_chunk() output: 236s | c3 0e 32 ff ed c0 77 4e 6a ff 6a f0 86 9f 71 aa ..2...wNj.j...q. 236s | 0f 3a f0 7a 9a 31 a9 c6 84 db 20 7e b0 ef 8e 4e .:.z.1.... ~...N 236s | 35 90 7a a6 32 c3 ff df 86 8b b7 b2 9d 3d 46 ad 5.z.2........=F. 236s | 83 ce 9f 9a 10 2e e9 9d 49 a5 3e 87 f4 c3 da 55 ........I.>....U 236s | NSS ike_alg_nss_cbc: AES_CBC - enter (nil) 236s | using IKEv1 IV 236s | NSS ike_alg_nss_cbc: AES_CBC - exit 236s | verify_bytes() Encrypting 64 bytes (4 blocks) using AES-CBC with 128-bit key: encrypt: ok 236s | verify_bytes() Encrypting 64 bytes (4 blocks) using AES-CBC with 128-bit key: updated CBC IV: ok 236s | decode_to_mac() IV: : input "0x8ce82eefbea0da3c44699ed7db51b7d9" 236s | decode_to_mac() output: 236s | 8c e8 2e ef be a0 da 3c 44 69 9e d7 db 51 b7 d9 ...........U 236s | decode_to_chunk() ciphertext: : input "0xc30e32ffedc0774e6aff6af0869f71aa0f3af07a9a31a9c684db207eb0ef8e4e35907aa632c3ffdf868bb7b29d3d46ad83ce9f9a102ee99d49a53e87f4c3da55" 236s | decode_to_chunk() output: 236s | c3 0e 32 ff ed c0 77 4e 6a ff 6a f0 86 9f 71 aa ..2...wNj.j...q. 236s | 0f 3a f0 7a 9a 31 a9 c6 84 db 20 7e b0 ef 8e 4e .:.z.1.... ~...N 236s | 35 90 7a a6 32 c3 ff df 86 8b b7 b2 9d 3d 46 ad 5.z.2........=F. 236s | 83 ce 9f 9a 10 2e e9 9d 49 a5 3e 87 f4 c3 da 55 ........I.>....U 236s | decode_to_chunk() plaintext: : input "0xa0a1a2a3a4a5a6a7a8a9aaabacadaeafb0b1b2b3b4b5b6b7b8b9babbbcbdbebfc0c1c2c3c4c5c6c7c8c9cacbcccdcecfd0d1d2d3d4d5d6d7d8d9dadbdcdddedf" 236s | decode_to_chunk() output: 236s | a0 a1 a2 a3 a4 a5 a6 a7 a8 a9 aa ab ac ad ae af ................ 236s | b0 b1 b2 b3 b4 b5 b6 b7 b8 b9 ba bb bc bd be bf ................ 236s | c0 c1 c2 c3 c4 c5 c6 c7 c8 c9 ca cb cc cd ce cf ................ 236s | d0 d1 d2 d3 d4 d5 d6 d7 d8 d9 da db dc dd de df ................ 236s | NSS ike_alg_nss_cbc: AES_CBC - enter (nil) 236s | using IKEv1 IV 236s | NSS ike_alg_nss_cbc: AES_CBC - exit 236s | verify_bytes() Encrypting 64 bytes (4 blocks) using AES-CBC with 128-bit key: decrypt: ok 236s | verify_bytes() Encrypting 64 bytes (4 blocks) using AES-CBC with 128-bit key: updated CBC IV: ok 236s ipsec algparse: testing AES_XCBC: 236s ipsec algparse: RFC 3566 Test Case 1: AES-XCBC-MAC-96 with 0-byte input 236s | decode_to_chunk() test_prf_vector: input "0x000102030405060708090a0b0c0d0e0f" 236s | decode_to_chunk() output: 236s | 00 01 02 03 04 05 06 07 08 09 0a 0b 0c 0d 0e 0f ................ 236s | decode_to_chunk() test_prf_vector: input "" 236s | decode_to_chunk() output: 236s | 236s | decode_to_chunk() test_prf_vector: input "0x75f0251d528ac01c4573dfd584d79f29" 236s | decode_to_chunk() output: 236s | 75 f0 25 1d 52 8a c0 1c 45 73 df d5 84 d7 9f 29 u.%.R...Es.....) 236s | PRF chunk interface PRF AES_XCBC init key hunk 0x1044d890 (length 16) 236s | 00 01 02 03 04 05 06 07 08 09 0a 0b 0c 0d 0e 0f ................ 236s | CONCATENATE_DATA_AND_BASE: 236s | target: EXTRACT_KEY_FROM_KEY 236s | base: base-key@0x1044d8a8 (16-bytes, AES_KEY_GEN) 236s | params: 8-bytes@0xfff1af30 236s | key-offset: 0, key-size: 16 236s | EXTRACT_KEY_FROM_KEY: 236s | target: EXTRACT_KEY_FROM_KEY 236s | key_size: 16-bytes 236s | base: base-key@0x1044fb08 (32-bytes, EXTRACT_KEY_FROM_KEY) 236s | operation: FLAGS_ONLY 236s | params: 4-bytes@0xfff1aee4 236s | XCBC: Key 16=16 just right 236s | key-offset: 0, key-size: 16 236s | EXTRACT_KEY_FROM_KEY: 236s | target: AES_ECB 236s | flags: SIGN 236s | key_size: 16-bytes 236s | base: base-key@0x1044ea78 (16-bytes, EXTRACT_KEY_FROM_KEY) 236s | operation: FLAGS_ONLY 236s | params: 4-bytes@0xfff1aebc 236s | PRF chunk interface PRF AES_XCBC 0x1044fc48 236s | PRF chunk interface PRF AES_XCBC update message (0x1044d808 length 0) 236s | 236s | XCBC: data 236s | 236s | K extracting all 16 bytes of key@0x1044fb08 236s | K: symkey-key@0x1044fb08 (16-bytes, AES_ECB) 236s | sizeof bytes 16 236s | wrapper: (SECItemType)245043996: d7 1f 87 55 5d d9 36 41 81 78 4a 56 b3 d0 16 63 236s | K extracted len 16 bytes at 0x10450320 236s | unwrapped: 236s | 00 01 02 03 04 05 06 07 08 09 0a 0b 0c 0d 0e 0f ................ 236s | XCBC: K: 236s | 00 01 02 03 04 05 06 07 08 09 0a 0b 0c 0d 0e 0f ................ 236s | XCBC: K1 236s | c3 52 80 57 54 23 7f 31 1a c0 ff f4 e3 e0 3e 78 .R.WT#.1......>x 236s | CONCATENATE_DATA_AND_BASE: 236s | target: EXTRACT_KEY_FROM_KEY 236s | base: base-key@0x1044d8a8 (16-bytes, AES_KEY_GEN) 236s | params: 8-bytes@0xfff1ae50 236s | key-offset: 0, key-size: 16 236s | EXTRACT_KEY_FROM_KEY: 236s | target: AES_ECB 236s | flags: SIGN 236s | key_size: 16-bytes 236s | base: base-key@0x10450580 (32-bytes, EXTRACT_KEY_FROM_KEY) 236s | operation: FLAGS_ONLY 236s | params: 4-bytes@0xfff1ae44 236s | Computing E[0] using K3 236s | XCBC: K3 236s | c1 a7 ab a1 a2 3a 94 06 58 07 a0 8c c8 ee d0 6e .....:..X......n 236s | XCBC: E[n-1] 236s | 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................ 236s | XCBC: M[n] 236s | 236s | XCBC: M[n] 236s | 236s | XCBC: M[n]:80...^E[n-1]^K3 236s | 41 a7 ab a1 a2 3a 94 06 58 07 a0 8c c8 ee d0 6e A....:..X......n 236s | XCBC: MAC 236s | 75 f0 25 1d 52 8a c0 1c 45 73 df d5 84 d7 9f 29 u.%.R...Es.....) 236s | PRF chunk interface PRF AES_XCBC final length 16 236s | 75 f0 25 1d 52 8a c0 1c 45 73 df d5 84 d7 9f 29 u.%.R...Es.....) 236s | chunk output 236s | 75 f0 25 1d 52 8a c0 1c 45 73 df d5 84 d7 9f 29 u.%.R...Es.....) 236s | verify_bytes() RFC 3566 Test Case 1: AES-XCBC-MAC-96 with 0-byte input: prf OUT: ok 236s | CONCATENATE_DATA_AND_BASE: 236s | target: EXTRACT_KEY_FROM_KEY 236s | base: base-key@0x1044d8a8 (16-bytes, AES_KEY_GEN) 236s | params: 8-bytes@0xfff1af90 236s | key-offset: 0, key-size: 16 236s | EXTRACT_KEY_FROM_KEY: 236s | target: EXTRACT_KEY_FROM_KEY 236s | key_size: 16-bytes 236s | base: base-key@0x1044ea78 (32-bytes, EXTRACT_KEY_FROM_KEY) 236s | operation: FLAGS_ONLY 236s | params: 4-bytes@0xfff1af44 236s | PRF symkey interface PRF AES_XCBC init key symkey-key@0x1044fb08 (size 16) 236s | PRF symkey interface: key symkey-key@0x1044fb08 (16-bytes, EXTRACT_KEY_FROM_KEY) 236s | XCBC: Key 16=16 just right 236s | key-offset: 0, key-size: 16 236s | EXTRACT_KEY_FROM_KEY: 236s | target: AES_ECB 236s | flags: SIGN 236s | key_size: 16-bytes 236s | base: base-key@0x1044fb08 (16-bytes, EXTRACT_KEY_FROM_KEY) 236s | operation: FLAGS_ONLY 236s | params: 4-bytes@0xfff1aeec 236s | PRF symkey interface PRF AES_XCBC 0x1044fc48 236s | PRF symkey interface PRF AES_XCBC update symkey message-key@(nil) (size 0) 236s | PRF symkey interface: symkey message-key@NULL 236s | symkey message NULL key has no bytes 236s | XCBC: data 236s | 236s | K extracting all 16 bytes of key@0x1044ea78 236s | K: symkey-key@0x1044ea78 (16-bytes, AES_ECB) 236s | sizeof bytes 16 236s | wrapper: (SECItemType)1380982908: d7 1f 87 55 5d d9 36 41 81 78 4a 56 b3 d0 16 63 236s | K extracted len 16 bytes at 0x10450740 236s | unwrapped: 236s | 00 01 02 03 04 05 06 07 08 09 0a 0b 0c 0d 0e 0f ................ 236s | XCBC: K: 236s | 00 01 02 03 04 05 06 07 08 09 0a 0b 0c 0d 0e 0f ................ 236s | XCBC: K1 236s | c3 52 80 57 54 23 7f 31 1a c0 ff f4 e3 e0 3e 78 .R.WT#.1......>x 236s | CONCATENATE_DATA_AND_BASE: 236s | target: EXTRACT_KEY_FROM_KEY 236s | base: base-key@0x1044d8a8 (16-bytes, AES_KEY_GEN) 236s | params: 8-bytes@0xfff1ae90 236s | key-offset: 0, key-size: 16 236s | EXTRACT_KEY_FROM_KEY: 236s | target: AES_ECB 236s | flags: SIGN 236s | key_size: 16-bytes 236s | base: base-key@0x10450758 (32-bytes, EXTRACT_KEY_FROM_KEY) 236s | operation: FLAGS_ONLY 236s | params: 4-bytes@0xfff1ae84 236s | Computing E[0] using K3 236s | XCBC: K3 236s | c1 a7 ab a1 a2 3a 94 06 58 07 a0 8c c8 ee d0 6e .....:..X......n 236s | XCBC: E[n-1] 236s | 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................ 236s | XCBC: M[n] 236s | 236s | XCBC: M[n] 236s | 236s | XCBC: M[n]:80...^E[n-1]^K3 236s | 41 a7 ab a1 a2 3a 94 06 58 07 a0 8c c8 ee d0 6e A....:..X......n 236s | XCBC: MAC 236s | 75 f0 25 1d 52 8a c0 1c 45 73 df d5 84 d7 9f 29 u.%.R...Es.....) 236s | CONCATENATE_DATA_AND_BASE: 236s | target: EXTRACT_KEY_FROM_KEY 236s | base: base-key@0x1044d8a8 (16-bytes, AES_KEY_GEN) 236s | params: 8-bytes@0xfff1af38 236s | key-offset: 0, key-size: 16 236s | EXTRACT_KEY_FROM_KEY: 236s | target: EXTRACT_KEY_FROM_KEY 236s | key_size: 16-bytes 236s | base: base-key@0x10450758 (32-bytes, EXTRACT_KEY_FROM_KEY) 236s | operation: FLAGS_ONLY 236s | params: 4-bytes@0xfff1aeec 236s | PRF symkey interface PRF AES_XCBC final-key@0x10450580 (size 16) 236s | PRF symkey interface: key-key@0x10450580 (16-bytes, EXTRACT_KEY_FROM_KEY) 236s | output: symkey-key@0x10450580 (16-bytes, EXTRACT_KEY_FROM_KEY) 236s | RFC 3566 Test Case 1: AES-XCBC-MAC-96 with 0-byte input extracting all 16 bytes of key@0x10450580 236s | RFC 3566 Test Case 1: AES-XCBC-MAC-96 with 0-byte input: symkey-key@0x10450580 (16-bytes, EXTRACT_KEY_FROM_KEY) 236s | sizeof bytes 16 236s | wrapper: (SECItemType)-939073: 24 20 40 3f 49 77 61 a6 4f aa d6 63 3f 64 83 9e 236s | RFC 3566 Test Case 1: AES-XCBC-MAC-96 with 0-byte input extracted len 16 bytes at 0x10450740 236s | unwrapped: 236s | 75 f0 25 1d 52 8a c0 1c 45 73 df d5 84 d7 9f 29 u.%.R...Es.....) 236s | verify_bytes() RFC 3566 Test Case 1: AES-XCBC-MAC-96 with 0-byte input: symkey: ok 236s ipsec algparse: RFC 3566 Test Case 2: AES-XCBC-MAC-96 with 3-byte input 236s | decode_to_chunk() test_prf_vector: input "0x000102030405060708090a0b0c0d0e0f" 236s | decode_to_chunk() output: 236s | 00 01 02 03 04 05 06 07 08 09 0a 0b 0c 0d 0e 0f ................ 236s | decode_to_chunk() test_prf_vector: input "0x000102" 236s | decode_to_chunk() output: 236s | 00 01 02 ... 236s | decode_to_chunk() test_prf_vector: input "0x5b376580ae2f19afe7219ceef172756f" 236s | decode_to_chunk() output: 236s | 5b 37 65 80 ae 2f 19 af e7 21 9c ee f1 72 75 6f [7e../...!...ruo 236s | PRF chunk interface PRF AES_XCBC init key hunk 0x1044fc48 (length 16) 236s | 00 01 02 03 04 05 06 07 08 09 0a 0b 0c 0d 0e 0f ................ 236s | CONCATENATE_DATA_AND_BASE: 236s | target: EXTRACT_KEY_FROM_KEY 236s | base: base-key@0x1044d8a8 (16-bytes, AES_KEY_GEN) 236s | params: 8-bytes@0xfff1af30 236s | key-offset: 0, key-size: 16 236s | EXTRACT_KEY_FROM_KEY: 236s | target: EXTRACT_KEY_FROM_KEY 236s | key_size: 16-bytes 236s | base: base-key@0x1044fb08 (32-bytes, EXTRACT_KEY_FROM_KEY) 236s | operation: FLAGS_ONLY 236s | params: 4-bytes@0xfff1aee4 236s | XCBC: Key 16=16 just right 236s | key-offset: 0, key-size: 16 236s | EXTRACT_KEY_FROM_KEY: 236s | target: AES_ECB 236s | flags: SIGN 236s | key_size: 16-bytes 236s | base: base-key@0x10450580 (16-bytes, EXTRACT_KEY_FROM_KEY) 236s | operation: FLAGS_ONLY 236s | params: 4-bytes@0xfff1aebc 236s | PRF chunk interface PRF AES_XCBC 0x10450740 236s | PRF chunk interface PRF AES_XCBC update message (0x1044d808 length 3) 236s | 00 01 02 ... 236s | XCBC: data 236s | 00 01 02 ... 236s | K extracting all 16 bytes of key@0x1044fb08 236s | K: symkey-key@0x1044fb08 (16-bytes, AES_ECB) 236s | sizeof bytes 16 236s | wrapper: siDERCertBuffer: d7 1f 87 55 5d d9 36 41 81 78 4a 56 b3 d0 16 63 236s | K extracted len 16 bytes at 0x10450320 236s | unwrapped: 236s | 00 01 02 03 04 05 06 07 08 09 0a 0b 0c 0d 0e 0f ................ 236s | XCBC: K: 236s | 00 01 02 03 04 05 06 07 08 09 0a 0b 0c 0d 0e 0f ................ 236s | XCBC: K1 236s | c3 52 80 57 54 23 7f 31 1a c0 ff f4 e3 e0 3e 78 .R.WT#.1......>x 236s | CONCATENATE_DATA_AND_BASE: 236s | target: EXTRACT_KEY_FROM_KEY 236s | base: base-key@0x1044d8a8 (16-bytes, AES_KEY_GEN) 236s | params: 8-bytes@0xfff1ae50 236s | key-offset: 0, key-size: 16 236s | EXTRACT_KEY_FROM_KEY: 236s | target: AES_ECB 236s | flags: SIGN 236s | key_size: 16-bytes 236s | base: base-key@0x1044ea78 (32-bytes, EXTRACT_KEY_FROM_KEY) 236s | operation: FLAGS_ONLY 236s | params: 4-bytes@0xfff1ae44 236s | Computing E[1] using K3 236s | XCBC: K3 236s | c1 a7 ab a1 a2 3a 94 06 58 07 a0 8c c8 ee d0 6e .....:..X......n 236s | XCBC: E[n-1] 236s | 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................ 236s | XCBC: M[n] 236s | 00 01 02 ... 236s | XCBC: M[n] 236s | 00 01 02 ... 236s | XCBC: M[n]:80...^E[n-1]^K3 236s | c1 a6 a9 21 a2 3a 94 06 58 07 a0 8c c8 ee d0 6e ...!.:..X......n 236s | XCBC: MAC 236s | 5b 37 65 80 ae 2f 19 af e7 21 9c ee f1 72 75 6f [7e../...!...ruo 236s | PRF chunk interface PRF AES_XCBC final length 16 236s | 5b 37 65 80 ae 2f 19 af e7 21 9c ee f1 72 75 6f [7e../...!...ruo 236s | chunk output 236s | 5b 37 65 80 ae 2f 19 af e7 21 9c ee f1 72 75 6f [7e../...!...ruo 236s | verify_bytes() RFC 3566 Test Case 2: AES-XCBC-MAC-96 with 3-byte input: prf OUT: ok 236s | CONCATENATE_DATA_AND_BASE: 236s | target: EXTRACT_KEY_FROM_KEY 236s | base: base-key@0x1044d8a8 (16-bytes, AES_KEY_GEN) 236s | params: 8-bytes@0xfff1af90 236s | key-offset: 0, key-size: 16 236s | EXTRACT_KEY_FROM_KEY: 236s | target: EXTRACT_KEY_FROM_KEY 236s | key_size: 16-bytes 236s | base: base-key@0x10450580 (32-bytes, EXTRACT_KEY_FROM_KEY) 236s | operation: FLAGS_ONLY 236s | params: 4-bytes@0xfff1af44 236s | PRF symkey interface PRF AES_XCBC init key symkey-key@0x1044fb08 (size 16) 236s | PRF symkey interface: key symkey-key@0x1044fb08 (16-bytes, EXTRACT_KEY_FROM_KEY) 236s | XCBC: Key 16=16 just right 236s | key-offset: 0, key-size: 16 236s | EXTRACT_KEY_FROM_KEY: 236s | target: AES_ECB 236s | flags: SIGN 236s | key_size: 16-bytes 236s | base: base-key@0x1044fb08 (16-bytes, EXTRACT_KEY_FROM_KEY) 236s | operation: FLAGS_ONLY 236s | params: 4-bytes@0xfff1aeec 236s | PRF symkey interface PRF AES_XCBC 0x10450740 236s | CONCATENATE_DATA_AND_BASE: 236s | target: EXTRACT_KEY_FROM_KEY 236s | base: base-key@0x1044d8a8 (16-bytes, AES_KEY_GEN) 236s | params: 8-bytes@0xfff1af90 236s | key-offset: 0, key-size: 3 236s | EXTRACT_KEY_FROM_KEY: 236s | target: EXTRACT_KEY_FROM_KEY 236s | key_size: 3-bytes 236s | base: base-key@0x10450758 (19-bytes, EXTRACT_KEY_FROM_KEY) 236s | operation: FLAGS_ONLY 236s | params: 4-bytes@0xfff1af44 236s | PRF symkey interface PRF AES_XCBC update symkey message-key@0x1044ea78 (size 3) 236s | PRF symkey interface: symkey message-key@0x1044ea78 (3-bytes, EXTRACT_KEY_FROM_KEY) 236s | symkey message extracting all 3 bytes of key@0x1044ea78 236s | symkey message: symkey-key@0x1044ea78 (3-bytes, EXTRACT_KEY_FROM_KEY) 236s | sizeof bytes 16 236s | wrapper: (SECItemType)1955544064: 3f 2a 95 ae 90 5c 69 5f e6 5e 8d 10 cd 79 e2 ce 236s | symkey message extracted len 16 bytes at 0x104502f0 236s | unwrapped: 236s | 00 01 02 00 00 00 00 00 00 00 00 00 00 00 00 00 ................ 236s | XCBC: data 236s | 00 01 02 ... 236s | K extracting all 16 bytes of key@0x10450580 236s | K: symkey-key@0x10450580 (16-bytes, AES_ECB) 236s | sizeof bytes 16 236s | wrapper: (SECItemType)245043304: d7 1f 87 55 5d d9 36 41 81 78 4a 56 b3 d0 16 63 236s | K extracted len 16 bytes at 0x1044fd18 236s | unwrapped: 236s | 00 01 02 03 04 05 06 07 08 09 0a 0b 0c 0d 0e 0f ................ 236s | XCBC: K: 236s | 00 01 02 03 04 05 06 07 08 09 0a 0b 0c 0d 0e 0f ................ 236s | XCBC: K1 236s | c3 52 80 57 54 23 7f 31 1a c0 ff f4 e3 e0 3e 78 .R.WT#.1......>x 236s | CONCATENATE_DATA_AND_BASE: 236s | target: EXTRACT_KEY_FROM_KEY 236s | base: base-key@0x1044d8a8 (16-bytes, AES_KEY_GEN) 236s | params: 8-bytes@0xfff1ae90 236s | key-offset: 0, key-size: 16 236s | EXTRACT_KEY_FROM_KEY: 236s | target: AES_ECB 236s | flags: SIGN 236s | key_size: 16-bytes 236s | base: base-key@0x10450918 (32-bytes, EXTRACT_KEY_FROM_KEY) 236s | operation: FLAGS_ONLY 236s | params: 4-bytes@0xfff1ae84 236s | Computing E[1] using K3 236s | XCBC: K3 236s | c1 a7 ab a1 a2 3a 94 06 58 07 a0 8c c8 ee d0 6e .....:..X......n 236s | XCBC: E[n-1] 236s | 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................ 236s | XCBC: M[n] 236s | 00 01 02 ... 236s | XCBC: M[n] 236s | 00 01 02 ... 236s | XCBC: M[n]:80...^E[n-1]^K3 236s | c1 a6 a9 21 a2 3a 94 06 58 07 a0 8c c8 ee d0 6e ...!.:..X......n 236s | XCBC: MAC 236s | 5b 37 65 80 ae 2f 19 af e7 21 9c ee f1 72 75 6f [7e../...!...ruo 236s | CONCATENATE_DATA_AND_BASE: 236s | target: EXTRACT_KEY_FROM_KEY 236s | base: base-key@0x1044d8a8 (16-bytes, AES_KEY_GEN) 236s | params: 8-bytes@0xfff1af38 236s | key-offset: 0, key-size: 16 236s | EXTRACT_KEY_FROM_KEY: 236s | target: EXTRACT_KEY_FROM_KEY 236s | key_size: 16-bytes 236s | base: base-key@0x10450918 (32-bytes, EXTRACT_KEY_FROM_KEY) 236s | operation: FLAGS_ONLY 236s | params: 4-bytes@0xfff1aeec 236s | PRF symkey interface PRF AES_XCBC final-key@0x10450758 (size 16) 236s | PRF symkey interface: key-key@0x10450758 (16-bytes, EXTRACT_KEY_FROM_KEY) 236s | output: symkey-key@0x10450758 (16-bytes, EXTRACT_KEY_FROM_KEY) 236s | RFC 3566 Test Case 2: AES-XCBC-MAC-96 with 3-byte input extracting all 16 bytes of key@0x10450758 236s | RFC 3566 Test Case 2: AES-XCBC-MAC-96 with 3-byte input: symkey-key@0x10450758 (16-bytes, EXTRACT_KEY_FROM_KEY) 236s | sizeof bytes 16 236s | wrapper: (SECItemType)-939073: 75 62 c0 23 62 0e 04 be 67 34 b0 6c d3 9e 87 b7 236s | RFC 3566 Test Case 2: AES-XCBC-MAC-96 with 3-byte input extracted len 16 bytes at 0x1044fd18 236s | unwrapped: 236s | 5b 37 65 80 ae 2f 19 af e7 21 9c ee f1 72 75 6f [7e../...!...ruo 236s | verify_bytes() RFC 3566 Test Case 2: AES-XCBC-MAC-96 with 3-byte input: symkey: ok 236s ipsec algparse: RFC 3566 Test Case 3: AES-XCBC-MAC-96 with 16-byte input 236s | decode_to_chunk() test_prf_vector: input "0x000102030405060708090a0b0c0d0e0f" 236s | decode_to_chunk() output: 236s | 00 01 02 03 04 05 06 07 08 09 0a 0b 0c 0d 0e 0f ................ 236s | decode_to_chunk() test_prf_vector: input "0x000102030405060708090a0b0c0d0e0f" 236s | decode_to_chunk() output: 236s | 00 01 02 03 04 05 06 07 08 09 0a 0b 0c 0d 0e 0f ................ 236s | decode_to_chunk() test_prf_vector: input "0xd2a246fa349b68a79998a4394ff7a263" 236s | decode_to_chunk() output: 236s | d2 a2 46 fa 34 9b 68 a7 99 98 a4 39 4f f7 a2 63 ..F.4.h....9O..c 236s | PRF chunk interface PRF AES_XCBC init key hunk 0x10450740 (length 16) 236s | 00 01 02 03 04 05 06 07 08 09 0a 0b 0c 0d 0e 0f ................ 236s | CONCATENATE_DATA_AND_BASE: 236s | target: EXTRACT_KEY_FROM_KEY 236s | base: base-key@0x1044d8a8 (16-bytes, AES_KEY_GEN) 236s | params: 8-bytes@0xfff1af30 236s | key-offset: 0, key-size: 16 236s | EXTRACT_KEY_FROM_KEY: 236s | target: EXTRACT_KEY_FROM_KEY 236s | key_size: 16-bytes 236s | base: base-key@0x1044fb08 (32-bytes, EXTRACT_KEY_FROM_KEY) 236s | operation: FLAGS_ONLY 236s | params: 4-bytes@0xfff1aee4 236s | XCBC: Key 16=16 just right 236s | key-offset: 0, key-size: 16 236s | EXTRACT_KEY_FROM_KEY: 236s | target: AES_ECB 236s | flags: SIGN 236s | key_size: 16-bytes 236s | base: base-key@0x10450758 (16-bytes, EXTRACT_KEY_FROM_KEY) 236s | operation: FLAGS_ONLY 236s | params: 4-bytes@0xfff1aebc 236s | PRF chunk interface PRF AES_XCBC 0x104502f0 236s | PRF chunk interface PRF AES_XCBC update message (0x1044fc48 length 16) 236s | 00 01 02 03 04 05 06 07 08 09 0a 0b 0c 0d 0e 0f ................ 236s | XCBC: data 236s | 00 01 02 03 04 05 06 07 08 09 0a 0b 0c 0d 0e 0f ................ 236s | K extracting all 16 bytes of key@0x1044fb08 236s | K: symkey-key@0x1044fb08 (16-bytes, AES_ECB) 236s | sizeof bytes 16 236s | wrapper: siEncodedCertBuffer: d7 1f 87 55 5d d9 36 41 81 78 4a 56 b3 d0 16 63 236s | K extracted len 16 bytes at 0x10450c58 236s | unwrapped: 236s | 00 01 02 03 04 05 06 07 08 09 0a 0b 0c 0d 0e 0f ................ 236s | XCBC: K: 236s | 00 01 02 03 04 05 06 07 08 09 0a 0b 0c 0d 0e 0f ................ 236s | XCBC: K1 236s | c3 52 80 57 54 23 7f 31 1a c0 ff f4 e3 e0 3e 78 .R.WT#.1......>x 236s | CONCATENATE_DATA_AND_BASE: 236s | target: EXTRACT_KEY_FROM_KEY 236s | base: base-key@0x1044d8a8 (16-bytes, AES_KEY_GEN) 236s | params: 8-bytes@0xfff1ae50 236s | key-offset: 0, key-size: 16 236s | EXTRACT_KEY_FROM_KEY: 236s | target: AES_ECB 236s | flags: SIGN 236s | key_size: 16-bytes 236s | base: base-key@0x1044ea78 (32-bytes, EXTRACT_KEY_FROM_KEY) 236s | operation: FLAGS_ONLY 236s | params: 4-bytes@0xfff1ae44 236s | XCBC: Computing E[1] using K2 236s | XCBC: K2 236s | bd 86 2f fb 97 ad 2f b8 f8 b8 91 f6 03 2f 36 cb ../.../....../6. 236s | XCBC: E[n-1] 236s | 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................ 236s | XCBC: M[n] 236s | 00 01 02 03 04 05 06 07 08 09 0a 0b 0c 0d 0e 0f ................ 236s | XCBC: M[n]^E[n-1]^K2 236s | bd 87 2d f8 93 a8 29 bf f0 b1 9b fd 0f 22 38 c4 ..-...)......"8. 236s | XCBC: MAC 236s | d2 a2 46 fa 34 9b 68 a7 99 98 a4 39 4f f7 a2 63 ..F.4.h....9O..c 236s | PRF chunk interface PRF AES_XCBC final length 16 236s | d2 a2 46 fa 34 9b 68 a7 99 98 a4 39 4f f7 a2 63 ..F.4.h....9O..c 236s | chunk output 236s | d2 a2 46 fa 34 9b 68 a7 99 98 a4 39 4f f7 a2 63 ..F.4.h....9O..c 236s | verify_bytes() RFC 3566 Test Case 3: AES-XCBC-MAC-96 with 16-byte input: prf OUT: ok 236s | CONCATENATE_DATA_AND_BASE: 236s | target: EXTRACT_KEY_FROM_KEY 236s | base: base-key@0x1044d8a8 (16-bytes, AES_KEY_GEN) 236s | params: 8-bytes@0xfff1af90 236s | key-offset: 0, key-size: 16 236s | EXTRACT_KEY_FROM_KEY: 236s | target: EXTRACT_KEY_FROM_KEY 236s | key_size: 16-bytes 236s | base: base-key@0x10450758 (32-bytes, EXTRACT_KEY_FROM_KEY) 236s | operation: FLAGS_ONLY 236s | params: 4-bytes@0xfff1af44 236s | PRF symkey interface PRF AES_XCBC init key symkey-key@0x1044fb08 (size 16) 236s | PRF symkey interface: key symkey-key@0x1044fb08 (16-bytes, EXTRACT_KEY_FROM_KEY) 236s | XCBC: Key 16=16 just right 236s | key-offset: 0, key-size: 16 236s | EXTRACT_KEY_FROM_KEY: 236s | target: AES_ECB 236s | flags: SIGN 236s | key_size: 16-bytes 236s | base: base-key@0x1044fb08 (16-bytes, EXTRACT_KEY_FROM_KEY) 236s | operation: FLAGS_ONLY 236s | params: 4-bytes@0xfff1aeec 236s | PRF symkey interface PRF AES_XCBC 0x104502f0 236s | CONCATENATE_DATA_AND_BASE: 236s | target: EXTRACT_KEY_FROM_KEY 236s | base: base-key@0x1044d8a8 (16-bytes, AES_KEY_GEN) 236s | params: 8-bytes@0xfff1af90 236s | key-offset: 0, key-size: 16 236s | EXTRACT_KEY_FROM_KEY: 236s | target: EXTRACT_KEY_FROM_KEY 236s | key_size: 16-bytes 236s | base: base-key@0x10450580 (32-bytes, EXTRACT_KEY_FROM_KEY) 236s | operation: FLAGS_ONLY 236s | params: 4-bytes@0xfff1af44 236s | PRF symkey interface PRF AES_XCBC update symkey message-key@0x1044ea78 (size 16) 236s | PRF symkey interface: symkey message-key@0x1044ea78 (16-bytes, EXTRACT_KEY_FROM_KEY) 236s | symkey message extracting all 16 bytes of key@0x1044ea78 236s | symkey message: symkey-key@0x1044ea78 (16-bytes, EXTRACT_KEY_FROM_KEY) 236s | sizeof bytes 16 236s | wrapper: (SECItemType)1955544064: d7 1f 87 55 5d d9 36 41 81 78 4a 56 b3 d0 16 63 236s | symkey message extracted len 16 bytes at 0x10450c58 236s | unwrapped: 236s | 00 01 02 03 04 05 06 07 08 09 0a 0b 0c 0d 0e 0f ................ 236s | XCBC: data 236s | 00 01 02 03 04 05 06 07 08 09 0a 0b 0c 0d 0e 0f ................ 236s | K extracting all 16 bytes of key@0x10450758 236s | K: symkey-key@0x10450758 (16-bytes, AES_ECB) 236s | sizeof bytes 16 236s | wrapper: (SECItemType)245043304: d7 1f 87 55 5d d9 36 41 81 78 4a 56 b3 d0 16 63 236s | K extracted len 16 bytes at 0x1044d890 236s | unwrapped: 236s | 00 01 02 03 04 05 06 07 08 09 0a 0b 0c 0d 0e 0f ................ 236s | XCBC: K: 236s | 00 01 02 03 04 05 06 07 08 09 0a 0b 0c 0d 0e 0f ................ 236s | XCBC: K1 236s | c3 52 80 57 54 23 7f 31 1a c0 ff f4 e3 e0 3e 78 .R.WT#.1......>x 236s | CONCATENATE_DATA_AND_BASE: 236s | target: EXTRACT_KEY_FROM_KEY 236s | base: base-key@0x1044d8a8 (16-bytes, AES_KEY_GEN) 236s | params: 8-bytes@0xfff1ae90 236s | key-offset: 0, key-size: 16 236s | EXTRACT_KEY_FROM_KEY: 236s | target: AES_ECB 236s | flags: SIGN 236s | key_size: 16-bytes 236s | base: base-key@0x10450918 (32-bytes, EXTRACT_KEY_FROM_KEY) 236s | operation: FLAGS_ONLY 236s | params: 4-bytes@0xfff1ae84 236s | XCBC: Computing E[1] using K2 236s | XCBC: K2 236s | bd 86 2f fb 97 ad 2f b8 f8 b8 91 f6 03 2f 36 cb ../.../....../6. 236s | XCBC: E[n-1] 236s | 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................ 236s | XCBC: M[n] 236s | 00 01 02 03 04 05 06 07 08 09 0a 0b 0c 0d 0e 0f ................ 236s | XCBC: M[n]^E[n-1]^K2 236s | bd 87 2d f8 93 a8 29 bf f0 b1 9b fd 0f 22 38 c4 ..-...)......"8. 236s | XCBC: MAC 236s | d2 a2 46 fa 34 9b 68 a7 99 98 a4 39 4f f7 a2 63 ..F.4.h....9O..c 236s | CONCATENATE_DATA_AND_BASE: 236s | target: EXTRACT_KEY_FROM_KEY 236s | base: base-key@0x1044d8a8 (16-bytes, AES_KEY_GEN) 236s | params: 8-bytes@0xfff1af38 236s | key-offset: 0, key-size: 16 236s | EXTRACT_KEY_FROM_KEY: 236s | target: EXTRACT_KEY_FROM_KEY 236s | key_size: 16-bytes 236s | base: base-key@0x10450918 (32-bytes, EXTRACT_KEY_FROM_KEY) 236s | operation: FLAGS_ONLY 236s | params: 4-bytes@0xfff1aeec 236s | PRF symkey interface PRF AES_XCBC final-key@0x10450580 (size 16) 236s | PRF symkey interface: key-key@0x10450580 (16-bytes, EXTRACT_KEY_FROM_KEY) 236s | output: symkey-key@0x10450580 (16-bytes, EXTRACT_KEY_FROM_KEY) 236s | RFC 3566 Test Case 3: AES-XCBC-MAC-96 with 16-byte input extracting all 16 bytes of key@0x10450580 236s | RFC 3566 Test Case 3: AES-XCBC-MAC-96 with 16-byte input: symkey-key@0x10450580 (16-bytes, EXTRACT_KEY_FROM_KEY) 236s | sizeof bytes 16 236s | wrapper: (SECItemType)-939073: 63 50 cf 09 be d0 21 f9 fc ec 8f 01 d8 65 00 1e 236s | RFC 3566 Test Case 3: AES-XCBC-MAC-96 with 16-byte input extracted len 16 bytes at 0x10450320 236s | unwrapped: 236s | d2 a2 46 fa 34 9b 68 a7 99 98 a4 39 4f f7 a2 63 ..F.4.h....9O..c 236s | verify_bytes() RFC 3566 Test Case 3: AES-XCBC-MAC-96 with 16-byte input: symkey: ok 236s ipsec algparse: RFC 3566 Test Case 4: AES-XCBC-MAC-96 with 20-byte input 236s | decode_to_chunk() test_prf_vector: input "0x000102030405060708090a0b0c0d0e0f" 236s | decode_to_chunk() output: 236s | 00 01 02 03 04 05 06 07 08 09 0a 0b 0c 0d 0e 0f ................ 236s | decode_to_chunk() test_prf_vector: input "0x000102030405060708090a0b0c0d0e0f10111213" 236s | decode_to_chunk() output: 236s | 00 01 02 03 04 05 06 07 08 09 0a 0b 0c 0d 0e 0f ................ 236s | 10 11 12 13 .... 236s | decode_to_chunk() test_prf_vector: input "0x47f51b4564966215b8985c63055ed308" 236s | decode_to_chunk() output: 236s | 47 f5 1b 45 64 96 62 15 b8 98 5c 63 05 5e d3 08 G..Ed.b...\c.^.. 236s | PRF chunk interface PRF AES_XCBC init key hunk 0x1044fc48 (length 16) 236s | 00 01 02 03 04 05 06 07 08 09 0a 0b 0c 0d 0e 0f ................ 236s | CONCATENATE_DATA_AND_BASE: 236s | target: EXTRACT_KEY_FROM_KEY 236s | base: base-key@0x1044d8a8 (16-bytes, AES_KEY_GEN) 236s | params: 8-bytes@0xfff1af30 236s | key-offset: 0, key-size: 16 236s | EXTRACT_KEY_FROM_KEY: 236s | target: EXTRACT_KEY_FROM_KEY 236s | key_size: 16-bytes 236s | base: base-key@0x1044fb08 (32-bytes, EXTRACT_KEY_FROM_KEY) 236s | operation: FLAGS_ONLY 236s | params: 4-bytes@0xfff1aee4 236s | XCBC: Key 16=16 just right 236s | key-offset: 0, key-size: 16 236s | EXTRACT_KEY_FROM_KEY: 236s | target: AES_ECB 236s | flags: SIGN 236s | key_size: 16-bytes 236s | base: base-key@0x10450580 (16-bytes, EXTRACT_KEY_FROM_KEY) 236s | operation: FLAGS_ONLY 236s | params: 4-bytes@0xfff1aebc 236s | PRF chunk interface PRF AES_XCBC 0x1044ff00 236s | PRF chunk interface PRF AES_XCBC update message (0x10450320 length 20) 236s | 00 01 02 03 04 05 06 07 08 09 0a 0b 0c 0d 0e 0f ................ 236s | 10 11 12 13 .... 236s | XCBC: data 236s | 00 01 02 03 04 05 06 07 08 09 0a 0b 0c 0d 0e 0f ................ 236s | 10 11 12 13 .... 236s | K extracting all 16 bytes of key@0x1044fb08 236s | K: symkey-key@0x1044fb08 (16-bytes, AES_ECB) 236s | sizeof bytes 16 236s | wrapper: siEncodedCertBuffer: d7 1f 87 55 5d d9 36 41 81 78 4a 56 b3 d0 16 63 236s | K extracted len 16 bytes at 0x10450740 236s | unwrapped: 236s | 00 01 02 03 04 05 06 07 08 09 0a 0b 0c 0d 0e 0f ................ 236s | XCBC: K: 236s | 00 01 02 03 04 05 06 07 08 09 0a 0b 0c 0d 0e 0f ................ 236s | XCBC: K1 236s | c3 52 80 57 54 23 7f 31 1a c0 ff f4 e3 e0 3e 78 .R.WT#.1......>x 236s | CONCATENATE_DATA_AND_BASE: 236s | target: EXTRACT_KEY_FROM_KEY 236s | base: base-key@0x1044d8a8 (16-bytes, AES_KEY_GEN) 236s | params: 8-bytes@0xfff1ae50 236s | key-offset: 0, key-size: 16 236s | EXTRACT_KEY_FROM_KEY: 236s | target: AES_ECB 236s | flags: SIGN 236s | key_size: 16-bytes 236s | base: base-key@0x1044ea78 (32-bytes, EXTRACT_KEY_FROM_KEY) 236s | operation: FLAGS_ONLY 236s | params: 4-bytes@0xfff1ae44 236s | Computing E[2] using K3 236s | XCBC: K3 236s | c1 a7 ab a1 a2 3a 94 06 58 07 a0 8c c8 ee d0 6e .....:..X......n 236s | XCBC: E[n-1] 236s | 1d 04 48 fa cf 4d 9c 6f 55 b9 93 da 09 80 3d b3 ..H..M.oU.....=. 236s | XCBC: M[n] 236s | 10 11 12 13 .... 236s | XCBC: M[n] 236s | 10 11 12 13 .... 236s | XCBC: M[n]:80...^E[n-1]^K3 236s | cc b2 f1 48 ed 77 08 69 0d be 33 56 c1 6e ed dd ...H.w.i..3V.n.. 236s | XCBC: MAC 236s | 47 f5 1b 45 64 96 62 15 b8 98 5c 63 05 5e d3 08 G..Ed.b...\c.^.. 236s | PRF chunk interface PRF AES_XCBC final length 16 236s | 47 f5 1b 45 64 96 62 15 b8 98 5c 63 05 5e d3 08 G..Ed.b...\c.^.. 236s | chunk output 236s | 47 f5 1b 45 64 96 62 15 b8 98 5c 63 05 5e d3 08 G..Ed.b...\c.^.. 236s | verify_bytes() RFC 3566 Test Case 4: AES-XCBC-MAC-96 with 20-byte input: prf OUT: ok 236s | CONCATENATE_DATA_AND_BASE: 236s | target: EXTRACT_KEY_FROM_KEY 236s | base: base-key@0x1044d8a8 (16-bytes, AES_KEY_GEN) 236s | params: 8-bytes@0xfff1af90 236s | key-offset: 0, key-size: 16 236s | EXTRACT_KEY_FROM_KEY: 236s | target: EXTRACT_KEY_FROM_KEY 236s | key_size: 16-bytes 236s | base: base-key@0x10450580 (32-bytes, EXTRACT_KEY_FROM_KEY) 236s | operation: FLAGS_ONLY 236s | params: 4-bytes@0xfff1af44 236s | PRF symkey interface PRF AES_XCBC init key symkey-key@0x1044fb08 (size 16) 236s | PRF symkey interface: key symkey-key@0x1044fb08 (16-bytes, EXTRACT_KEY_FROM_KEY) 236s | XCBC: Key 16=16 just right 236s | key-offset: 0, key-size: 16 236s | EXTRACT_KEY_FROM_KEY: 236s | target: AES_ECB 236s | flags: SIGN 236s | key_size: 16-bytes 236s | base: base-key@0x1044fb08 (16-bytes, EXTRACT_KEY_FROM_KEY) 236s | operation: FLAGS_ONLY 236s | params: 4-bytes@0xfff1aeec 236s | PRF symkey interface PRF AES_XCBC 0x1044ff00 236s | CONCATENATE_DATA_AND_BASE: 236s | target: EXTRACT_KEY_FROM_KEY 236s | base: base-key@0x1044d8a8 (16-bytes, AES_KEY_GEN) 236s | params: 8-bytes@0xfff1af90 236s | key-offset: 0, key-size: 20 236s | EXTRACT_KEY_FROM_KEY: 236s | target: EXTRACT_KEY_FROM_KEY 236s | key_size: 20-bytes 236s | base: base-key@0x10450758 (36-bytes, EXTRACT_KEY_FROM_KEY) 236s | operation: FLAGS_ONLY 236s | params: 4-bytes@0xfff1af44 236s | PRF symkey interface PRF AES_XCBC update symkey message-key@0x1044ea78 (size 20) 236s | PRF symkey interface: symkey message-key@0x1044ea78 (20-bytes, EXTRACT_KEY_FROM_KEY) 236s | symkey message extracting all 20 bytes of key@0x1044ea78 236s | symkey message: symkey-key@0x1044ea78 (20-bytes, EXTRACT_KEY_FROM_KEY) 236s | sizeof bytes 32 236s | wrapper: (SECItemType)1955544064: d7 1f 87 55 5d d9 36 41 81 78 4a 56 b3 d0 16 63 63 bc 6c 55 b8 ee 91 f3 11 d8 84 31 81 3b c6 6e 236s | symkey message extracted len 32 bytes at 0x104501a8 236s | unwrapped: 236s | 00 01 02 03 04 05 06 07 08 09 0a 0b 0c 0d 0e 0f ................ 236s | 10 11 12 13 00 00 00 00 00 00 00 00 00 00 00 00 ................ 236s | XCBC: data 236s | 00 01 02 03 04 05 06 07 08 09 0a 0b 0c 0d 0e 0f ................ 236s | 10 11 12 13 .... 236s | K extracting all 16 bytes of key@0x10450580 236s | K: symkey-key@0x10450580 (16-bytes, AES_ECB) 236s | sizeof bytes 16 236s | wrapper: (SECItemType)245043304: d7 1f 87 55 5d d9 36 41 81 78 4a 56 b3 d0 16 63 236s | K extracted len 16 bytes at 0x10450ca0 236s | unwrapped: 236s | 00 01 02 03 04 05 06 07 08 09 0a 0b 0c 0d 0e 0f ................ 236s | XCBC: K: 236s | 00 01 02 03 04 05 06 07 08 09 0a 0b 0c 0d 0e 0f ................ 236s | XCBC: K1 236s | c3 52 80 57 54 23 7f 31 1a c0 ff f4 e3 e0 3e 78 .R.WT#.1......>x 236s | CONCATENATE_DATA_AND_BASE: 236s | target: EXTRACT_KEY_FROM_KEY 236s | base: base-key@0x1044d8a8 (16-bytes, AES_KEY_GEN) 236s | params: 8-bytes@0xfff1ae90 236s | key-offset: 0, key-size: 16 236s | EXTRACT_KEY_FROM_KEY: 236s | target: AES_ECB 236s | flags: SIGN 236s | key_size: 16-bytes 236s | base: base-key@0x10450918 (32-bytes, EXTRACT_KEY_FROM_KEY) 236s | operation: FLAGS_ONLY 236s | params: 4-bytes@0xfff1ae84 236s | Computing E[2] using K3 236s | XCBC: K3 236s | c1 a7 ab a1 a2 3a 94 06 58 07 a0 8c c8 ee d0 6e .....:..X......n 236s | XCBC: E[n-1] 236s | 1d 04 48 fa cf 4d 9c 6f 55 b9 93 da 09 80 3d b3 ..H..M.oU.....=. 236s | XCBC: M[n] 236s | 10 11 12 13 .... 236s | XCBC: M[n] 236s | 10 11 12 13 .... 236s | XCBC: M[n]:80...^E[n-1]^K3 236s | cc b2 f1 48 ed 77 08 69 0d be 33 56 c1 6e ed dd ...H.w.i..3V.n.. 236s | XCBC: MAC 236s | 47 f5 1b 45 64 96 62 15 b8 98 5c 63 05 5e d3 08 G..Ed.b...\c.^.. 236s | CONCATENATE_DATA_AND_BASE: 236s | target: EXTRACT_KEY_FROM_KEY 236s | base: base-key@0x1044d8a8 (16-bytes, AES_KEY_GEN) 236s | params: 8-bytes@0xfff1af38 236s | key-offset: 0, key-size: 16 236s | EXTRACT_KEY_FROM_KEY: 236s | target: EXTRACT_KEY_FROM_KEY 236s | key_size: 16-bytes 236s | base: base-key@0x10450918 (32-bytes, EXTRACT_KEY_FROM_KEY) 236s | operation: FLAGS_ONLY 236s | params: 4-bytes@0xfff1aeec 236s | PRF symkey interface PRF AES_XCBC final-key@0x10450758 (size 16) 236s | PRF symkey interface: key-key@0x10450758 (16-bytes, EXTRACT_KEY_FROM_KEY) 236s | output: symkey-key@0x10450758 (16-bytes, EXTRACT_KEY_FROM_KEY) 236s | RFC 3566 Test Case 4: AES-XCBC-MAC-96 with 20-byte input extracting all 16 bytes of key@0x10450758 236s | RFC 3566 Test Case 4: AES-XCBC-MAC-96 with 20-byte input: symkey-key@0x10450758 (16-bytes, EXTRACT_KEY_FROM_KEY) 236s | sizeof bytes 16 236s | wrapper: (SECItemType)-939073: d7 ec ee 03 55 f7 be 9c 21 e1 96 50 88 37 ae a0 236s | RFC 3566 Test Case 4: AES-XCBC-MAC-96 with 20-byte input extracted len 16 bytes at 0x10450740 236s | unwrapped: 236s | 47 f5 1b 45 64 96 62 15 b8 98 5c 63 05 5e d3 08 G..Ed.b...\c.^.. 236s | verify_bytes() RFC 3566 Test Case 4: AES-XCBC-MAC-96 with 20-byte input: symkey: ok 236s ipsec algparse: RFC 3566 Test Case 5: AES-XCBC-MAC-96 with 32-byte input 236s | decode_to_chunk() test_prf_vector: input "0x000102030405060708090a0b0c0d0e0f" 236s | decode_to_chunk() output: 236s | 00 01 02 03 04 05 06 07 08 09 0a 0b 0c 0d 0e 0f ................ 236s | decode_to_chunk() test_prf_vector: input "0x000102030405060708090a0b0c0d0e0f101112131415161718191a1b1c1d1e1f" 236s | decode_to_chunk() output: 236s | 00 01 02 03 04 05 06 07 08 09 0a 0b 0c 0d 0e 0f ................ 236s | 10 11 12 13 14 15 16 17 18 19 1a 1b 1c 1d 1e 1f ................ 236s | decode_to_chunk() test_prf_vector: input "0xf54f0ec8d2b9f3d36807734bd5283fd4" 236s | decode_to_chunk() output: 236s | f5 4f 0e c8 d2 b9 f3 d3 68 07 73 4b d5 28 3f d4 .O......h.sK.(?. 236s | PRF chunk interface PRF AES_XCBC init key hunk 0x10450320 (length 16) 236s | 00 01 02 03 04 05 06 07 08 09 0a 0b 0c 0d 0e 0f ................ 236s | CONCATENATE_DATA_AND_BASE: 236s | target: EXTRACT_KEY_FROM_KEY 236s | base: base-key@0x1044d8a8 (16-bytes, AES_KEY_GEN) 236s | params: 8-bytes@0xfff1af30 236s | key-offset: 0, key-size: 16 236s | EXTRACT_KEY_FROM_KEY: 236s | target: EXTRACT_KEY_FROM_KEY 236s | key_size: 16-bytes 236s | base: base-key@0x1044fb08 (32-bytes, EXTRACT_KEY_FROM_KEY) 236s | operation: FLAGS_ONLY 236s | params: 4-bytes@0xfff1aee4 236s | XCBC: Key 16=16 just right 236s | key-offset: 0, key-size: 16 236s | EXTRACT_KEY_FROM_KEY: 236s | target: AES_ECB 236s | flags: SIGN 236s | key_size: 16-bytes 236s | base: base-key@0x10450758 (16-bytes, EXTRACT_KEY_FROM_KEY) 236s | operation: FLAGS_ONLY 236s | params: 4-bytes@0xfff1aebc 236s | PRF chunk interface PRF AES_XCBC 0x10450c70 236s | PRF chunk interface PRF AES_XCBC update message (0x104501a8 length 32) 236s | 00 01 02 03 04 05 06 07 08 09 0a 0b 0c 0d 0e 0f ................ 236s | 10 11 12 13 14 15 16 17 18 19 1a 1b 1c 1d 1e 1f ................ 236s | XCBC: data 236s | 00 01 02 03 04 05 06 07 08 09 0a 0b 0c 0d 0e 0f ................ 236s | 10 11 12 13 14 15 16 17 18 19 1a 1b 1c 1d 1e 1f ................ 236s | K extracting all 16 bytes of key@0x1044fb08 236s | K: symkey-key@0x1044fb08 (16-bytes, AES_ECB) 236s | sizeof bytes 16 236s | wrapper: siEncodedCertBuffer: d7 1f 87 55 5d d9 36 41 81 78 4a 56 b3 d0 16 63 236s | K extracted len 16 bytes at 0x1044fd18 236s | unwrapped: 236s | 00 01 02 03 04 05 06 07 08 09 0a 0b 0c 0d 0e 0f ................ 236s | XCBC: K: 236s | 00 01 02 03 04 05 06 07 08 09 0a 0b 0c 0d 0e 0f ................ 236s | XCBC: K1 236s | c3 52 80 57 54 23 7f 31 1a c0 ff f4 e3 e0 3e 78 .R.WT#.1......>x 236s | CONCATENATE_DATA_AND_BASE: 236s | target: EXTRACT_KEY_FROM_KEY 236s | base: base-key@0x1044d8a8 (16-bytes, AES_KEY_GEN) 236s | params: 8-bytes@0xfff1ae50 236s | key-offset: 0, key-size: 16 236s | EXTRACT_KEY_FROM_KEY: 236s | target: AES_ECB 236s | flags: SIGN 236s | key_size: 16-bytes 236s | base: base-key@0x1044ea78 (32-bytes, EXTRACT_KEY_FROM_KEY) 236s | operation: FLAGS_ONLY 236s | params: 4-bytes@0xfff1ae44 236s | XCBC: Computing E[2] using K2 236s | XCBC: K2 236s | bd 86 2f fb 97 ad 2f b8 f8 b8 91 f6 03 2f 36 cb ../.../....../6. 236s | XCBC: E[n-1] 236s | 1d 04 48 fa cf 4d 9c 6f 55 b9 93 da 09 80 3d b3 ..H..M.oU.....=. 236s | XCBC: M[n] 236s | 10 11 12 13 14 15 16 17 18 19 1a 1b 1c 1d 1e 1f ................ 236s | XCBC: M[n]^E[n-1]^K2 236s | b0 93 75 12 4c f5 a5 c0 b5 18 18 37 16 b2 15 67 ..u.L......7...g 236s | XCBC: MAC 236s | f5 4f 0e c8 d2 b9 f3 d3 68 07 73 4b d5 28 3f d4 .O......h.sK.(?. 236s | PRF chunk interface PRF AES_XCBC final length 16 236s | f5 4f 0e c8 d2 b9 f3 d3 68 07 73 4b d5 28 3f d4 .O......h.sK.(?. 236s | chunk output 236s | f5 4f 0e c8 d2 b9 f3 d3 68 07 73 4b d5 28 3f d4 .O......h.sK.(?. 236s | verify_bytes() RFC 3566 Test Case 5: AES-XCBC-MAC-96 with 32-byte input: prf OUT: ok 236s | CONCATENATE_DATA_AND_BASE: 236s | target: EXTRACT_KEY_FROM_KEY 236s | base: base-key@0x1044d8a8 (16-bytes, AES_KEY_GEN) 236s | params: 8-bytes@0xfff1af90 236s | key-offset: 0, key-size: 16 236s | EXTRACT_KEY_FROM_KEY: 236s | target: EXTRACT_KEY_FROM_KEY 236s | key_size: 16-bytes 236s | base: base-key@0x10450758 (32-bytes, EXTRACT_KEY_FROM_KEY) 236s | operation: FLAGS_ONLY 236s | params: 4-bytes@0xfff1af44 236s | PRF symkey interface PRF AES_XCBC init key symkey-key@0x1044fb08 (size 16) 236s | PRF symkey interface: key symkey-key@0x1044fb08 (16-bytes, EXTRACT_KEY_FROM_KEY) 236s | XCBC: Key 16=16 just right 236s | key-offset: 0, key-size: 16 236s | EXTRACT_KEY_FROM_KEY: 236s | target: AES_ECB 236s | flags: SIGN 236s | key_size: 16-bytes 236s | base: base-key@0x1044fb08 (16-bytes, EXTRACT_KEY_FROM_KEY) 236s | operation: FLAGS_ONLY 236s | params: 4-bytes@0xfff1aeec 236s | PRF symkey interface PRF AES_XCBC 0x10450ca0 236s | CONCATENATE_DATA_AND_BASE: 236s | target: EXTRACT_KEY_FROM_KEY 236s | base: base-key@0x1044d8a8 (16-bytes, AES_KEY_GEN) 236s | params: 8-bytes@0xfff1af90 236s | key-offset: 0, key-size: 32 236s | EXTRACT_KEY_FROM_KEY: 236s | target: EXTRACT_KEY_FROM_KEY 236s | key_size: 32-bytes 236s | base: base-key@0x10450580 (48-bytes, EXTRACT_KEY_FROM_KEY) 236s | operation: FLAGS_ONLY 236s | params: 4-bytes@0xfff1af44 236s | PRF symkey interface PRF AES_XCBC update symkey message-key@0x1044ea78 (size 32) 236s | PRF symkey interface: symkey message-key@0x1044ea78 (32-bytes, EXTRACT_KEY_FROM_KEY) 236s | symkey message extracting all 32 bytes of key@0x1044ea78 236s | symkey message: symkey-key@0x1044ea78 (32-bytes, EXTRACT_KEY_FROM_KEY) 236s | sizeof bytes 32 236s | wrapper: (SECItemType)1955544064: d7 1f 87 55 5d d9 36 41 81 78 4a 56 b3 d0 16 63 a2 d9 09 5c a7 04 af a0 d2 e0 ab 58 d3 02 7e 1d 236s | symkey message extracted len 32 bytes at 0x10450360 236s | unwrapped: 236s | 00 01 02 03 04 05 06 07 08 09 0a 0b 0c 0d 0e 0f ................ 236s | 10 11 12 13 14 15 16 17 18 19 1a 1b 1c 1d 1e 1f ................ 236s | XCBC: data 236s | 00 01 02 03 04 05 06 07 08 09 0a 0b 0c 0d 0e 0f ................ 236s | 10 11 12 13 14 15 16 17 18 19 1a 1b 1c 1d 1e 1f ................ 236s | K extracting all 16 bytes of key@0x10450758 236s | K: symkey-key@0x10450758 (16-bytes, AES_ECB) 236s | sizeof bytes 16 236s | wrapper: (SECItemType)245043304: d7 1f 87 55 5d d9 36 41 81 78 4a 56 b3 d0 16 63 236s | K extracted len 16 bytes at 0x1044fc48 236s | unwrapped: 236s | 00 01 02 03 04 05 06 07 08 09 0a 0b 0c 0d 0e 0f ................ 236s | XCBC: K: 236s | 00 01 02 03 04 05 06 07 08 09 0a 0b 0c 0d 0e 0f ................ 236s | XCBC: K1 236s | c3 52 80 57 54 23 7f 31 1a c0 ff f4 e3 e0 3e 78 .R.WT#.1......>x 236s | CONCATENATE_DATA_AND_BASE: 236s | target: EXTRACT_KEY_FROM_KEY 236s | base: base-key@0x1044d8a8 (16-bytes, AES_KEY_GEN) 236s | params: 8-bytes@0xfff1ae90 236s | key-offset: 0, key-size: 16 236s | EXTRACT_KEY_FROM_KEY: 236s | target: AES_ECB 236s | flags: SIGN 236s | key_size: 16-bytes 236s | base: base-key@0x10450918 (32-bytes, EXTRACT_KEY_FROM_KEY) 236s | operation: FLAGS_ONLY 236s | params: 4-bytes@0xfff1ae84 236s | XCBC: Computing E[2] using K2 236s | XCBC: K2 236s | bd 86 2f fb 97 ad 2f b8 f8 b8 91 f6 03 2f 36 cb ../.../....../6. 236s | XCBC: E[n-1] 236s | 1d 04 48 fa cf 4d 9c 6f 55 b9 93 da 09 80 3d b3 ..H..M.oU.....=. 236s | XCBC: M[n] 236s | 10 11 12 13 14 15 16 17 18 19 1a 1b 1c 1d 1e 1f ................ 236s | XCBC: M[n]^E[n-1]^K2 236s | b0 93 75 12 4c f5 a5 c0 b5 18 18 37 16 b2 15 67 ..u.L......7...g 236s | XCBC: MAC 236s | f5 4f 0e c8 d2 b9 f3 d3 68 07 73 4b d5 28 3f d4 .O......h.sK.(?. 236s | CONCATENATE_DATA_AND_BASE: 236s | target: EXTRACT_KEY_FROM_KEY 236s | base: base-key@0x1044d8a8 (16-bytes, AES_KEY_GEN) 236s | params: 8-bytes@0xfff1af38 236s | key-offset: 0, key-size: 16 236s | EXTRACT_KEY_FROM_KEY: 236s | target: EXTRACT_KEY_FROM_KEY 236s | key_size: 16-bytes 236s | base: base-key@0x10450918 (32-bytes, EXTRACT_KEY_FROM_KEY) 236s | operation: FLAGS_ONLY 236s | params: 4-bytes@0xfff1aeec 236s | PRF symkey interface PRF AES_XCBC final-key@0x10450580 (size 16) 236s | PRF symkey interface: key-key@0x10450580 (16-bytes, EXTRACT_KEY_FROM_KEY) 236s | output: symkey-key@0x10450580 (16-bytes, EXTRACT_KEY_FROM_KEY) 236s | RFC 3566 Test Case 5: AES-XCBC-MAC-96 with 32-byte input extracting all 16 bytes of key@0x10450580 236s | RFC 3566 Test Case 5: AES-XCBC-MAC-96 with 32-byte input: symkey-key@0x10450580 (16-bytes, EXTRACT_KEY_FROM_KEY) 236s | sizeof bytes 16 236s | wrapper: (SECItemType)-939073: 53 39 dd fe 09 de 03 a1 79 1f d6 9b c5 aa a1 18 236s | RFC 3566 Test Case 5: AES-XCBC-MAC-96 with 32-byte input extracted len 16 bytes at 0x1044fc48 236s | unwrapped: 236s | f5 4f 0e c8 d2 b9 f3 d3 68 07 73 4b d5 28 3f d4 .O......h.sK.(?. 236s | verify_bytes() RFC 3566 Test Case 5: AES-XCBC-MAC-96 with 32-byte input: symkey: ok 236s ipsec algparse: RFC 3566 Test Case 6: AES-XCBC-MAC-96 with 34-byte input 236s | decode_to_chunk() test_prf_vector: input "0x000102030405060708090a0b0c0d0e0f" 236s | decode_to_chunk() output: 236s | 00 01 02 03 04 05 06 07 08 09 0a 0b 0c 0d 0e 0f ................ 236s | decode_to_chunk() test_prf_vector: input "0x000102030405060708090a0b0c0d0e0f101112131415161718191a1b1c1d1e1f2021" 236s | decode_to_chunk() output: 236s | 00 01 02 03 04 05 06 07 08 09 0a 0b 0c 0d 0e 0f ................ 236s | 10 11 12 13 14 15 16 17 18 19 1a 1b 1c 1d 1e 1f ................ 236s | 20 21 ! 236s | decode_to_chunk() test_prf_vector: input "0xbecbb3bccdb518a30677d5481fb6b4d8" 236s | decode_to_chunk() output: 236s | be cb b3 bc cd b5 18 a3 06 77 d5 48 1f b6 b4 d8 .........w.H.... 236s | PRF chunk interface PRF AES_XCBC init key hunk 0x10450320 (length 16) 236s | 00 01 02 03 04 05 06 07 08 09 0a 0b 0c 0d 0e 0f ................ 236s | CONCATENATE_DATA_AND_BASE: 236s | target: EXTRACT_KEY_FROM_KEY 236s | base: base-key@0x1044d8a8 (16-bytes, AES_KEY_GEN) 236s | params: 8-bytes@0xfff1af30 236s | key-offset: 0, key-size: 16 236s | EXTRACT_KEY_FROM_KEY: 236s | target: EXTRACT_KEY_FROM_KEY 236s | key_size: 16-bytes 236s | base: base-key@0x1044fb08 (32-bytes, EXTRACT_KEY_FROM_KEY) 236s | operation: FLAGS_ONLY 236s | params: 4-bytes@0xfff1aee4 236s | XCBC: Key 16=16 just right 236s | key-offset: 0, key-size: 16 236s | EXTRACT_KEY_FROM_KEY: 236s | target: AES_ECB 236s | flags: SIGN 236s | key_size: 16-bytes 236s | base: base-key@0x10450580 (16-bytes, EXTRACT_KEY_FROM_KEY) 236s | operation: FLAGS_ONLY 236s | params: 4-bytes@0xfff1aebc 236s | PRF chunk interface PRF AES_XCBC 0x1044fd18 236s | PRF chunk interface PRF AES_XCBC update message (0x10450cb8 length 34) 236s | 00 01 02 03 04 05 06 07 08 09 0a 0b 0c 0d 0e 0f ................ 236s | 10 11 12 13 14 15 16 17 18 19 1a 1b 1c 1d 1e 1f ................ 236s | 20 21 ! 236s | XCBC: data 236s | 00 01 02 03 04 05 06 07 08 09 0a 0b 0c 0d 0e 0f ................ 236s | 10 11 12 13 14 15 16 17 18 19 1a 1b 1c 1d 1e 1f ................ 236s | 20 21 ! 236s | K extracting all 16 bytes of key@0x1044fb08 236s | K: symkey-key@0x1044fb08 (16-bytes, AES_ECB) 236s | sizeof bytes 16 236s | wrapper: siCipherDataBuffer: d7 1f 87 55 5d d9 36 41 81 78 4a 56 b3 d0 16 63 236s | K extracted len 16 bytes at 0x10450c58 236s | unwrapped: 236s | 00 01 02 03 04 05 06 07 08 09 0a 0b 0c 0d 0e 0f ................ 236s | XCBC: K: 236s | 00 01 02 03 04 05 06 07 08 09 0a 0b 0c 0d 0e 0f ................ 236s | XCBC: K1 236s | c3 52 80 57 54 23 7f 31 1a c0 ff f4 e3 e0 3e 78 .R.WT#.1......>x 236s | CONCATENATE_DATA_AND_BASE: 236s | target: EXTRACT_KEY_FROM_KEY 236s | base: base-key@0x1044d8a8 (16-bytes, AES_KEY_GEN) 236s | params: 8-bytes@0xfff1ae50 236s | key-offset: 0, key-size: 16 236s | EXTRACT_KEY_FROM_KEY: 236s | target: AES_ECB 236s | flags: SIGN 236s | key_size: 16-bytes 236s | base: base-key@0x1044ea78 (32-bytes, EXTRACT_KEY_FROM_KEY) 236s | operation: FLAGS_ONLY 236s | params: 4-bytes@0xfff1ae44 236s | Computing E[3] using K3 236s | XCBC: K3 236s | c1 a7 ab a1 a2 3a 94 06 58 07 a0 8c c8 ee d0 6e .....:..X......n 236s | XCBC: E[n-1] 236s | 09 02 5e 5a 67 25 20 72 44 14 5c 6b 80 66 85 79 ..^Zg% rD.\k.f.y 236s | XCBC: M[n] 236s | 20 21 ! 236s | XCBC: M[n] 236s | 20 21 ! 236s | XCBC: M[n]:80...^E[n-1]^K3 236s | e8 84 75 fb c5 1f b4 74 1c 13 fc e7 48 88 55 17 ..u....t....H.U. 236s | XCBC: MAC 236s | be cb b3 bc cd b5 18 a3 06 77 d5 48 1f b6 b4 d8 .........w.H.... 236s | PRF chunk interface PRF AES_XCBC final length 16 236s | be cb b3 bc cd b5 18 a3 06 77 d5 48 1f b6 b4 d8 .........w.H.... 236s | chunk output 236s | be cb b3 bc cd b5 18 a3 06 77 d5 48 1f b6 b4 d8 .........w.H.... 236s | verify_bytes() RFC 3566 Test Case 6: AES-XCBC-MAC-96 with 34-byte input: prf OUT: ok 236s | CONCATENATE_DATA_AND_BASE: 236s | target: EXTRACT_KEY_FROM_KEY 236s | base: base-key@0x1044d8a8 (16-bytes, AES_KEY_GEN) 236s | params: 8-bytes@0xfff1af90 236s | key-offset: 0, key-size: 16 236s | EXTRACT_KEY_FROM_KEY: 236s | target: EXTRACT_KEY_FROM_KEY 236s | key_size: 16-bytes 236s | base: base-key@0x10450580 (32-bytes, EXTRACT_KEY_FROM_KEY) 236s | operation: FLAGS_ONLY 236s | params: 4-bytes@0xfff1af44 236s | PRF symkey interface PRF AES_XCBC init key symkey-key@0x1044fb08 (size 16) 236s | PRF symkey interface: key symkey-key@0x1044fb08 (16-bytes, EXTRACT_KEY_FROM_KEY) 236s | XCBC: Key 16=16 just right 236s | key-offset: 0, key-size: 16 236s | EXTRACT_KEY_FROM_KEY: 236s | target: AES_ECB 236s | flags: SIGN 236s | key_size: 16-bytes 236s | base: base-key@0x1044fb08 (16-bytes, EXTRACT_KEY_FROM_KEY) 236s | operation: FLAGS_ONLY 236s | params: 4-bytes@0xfff1aeec 236s | PRF symkey interface PRF AES_XCBC 0x10450c88 236s | CONCATENATE_DATA_AND_BASE: 236s | target: EXTRACT_KEY_FROM_KEY 236s | base: base-key@0x1044d8a8 (16-bytes, AES_KEY_GEN) 236s | params: 8-bytes@0xfff1af90 236s | key-offset: 0, key-size: 34 236s | EXTRACT_KEY_FROM_KEY: 236s | target: EXTRACT_KEY_FROM_KEY 236s | key_size: 34-bytes 236s | base: base-key@0x10450758 (50-bytes, EXTRACT_KEY_FROM_KEY) 236s | operation: FLAGS_ONLY 236s | params: 4-bytes@0xfff1af44 236s | PRF symkey interface PRF AES_XCBC update symkey message-key@0x1044ea78 (size 34) 236s | PRF symkey interface: symkey message-key@0x1044ea78 (34-bytes, EXTRACT_KEY_FROM_KEY) 236s | symkey message extracting all 34 bytes of key@0x1044ea78 236s | symkey message: symkey-key@0x1044ea78 (34-bytes, EXTRACT_KEY_FROM_KEY) 236s | sizeof bytes 48 236s | wrapper: (SECItemType)1955544064: d7 1f 87 55 5d d9 36 41 81 78 4a 56 b3 d0 16 63 a2 d9 09 5c a7 04 af a0 d2 e0 ab 58 d3 02 7e 1d c5 36 a5 3f 09 a5 c5 a1 ff 70 12 2e 34 9b 82 f7 236s | symkey message extracted len 48 bytes at 0x10445778 236s | unwrapped: 236s | 00 01 02 03 04 05 06 07 08 09 0a 0b 0c 0d 0e 0f ................ 236s | 10 11 12 13 14 15 16 17 18 19 1a 1b 1c 1d 1e 1f ................ 236s | 20 21 00 00 00 00 00 00 00 00 00 00 00 00 00 00 !.............. 236s | XCBC: data 236s | 00 01 02 03 04 05 06 07 08 09 0a 0b 0c 0d 0e 0f ................ 236s | 10 11 12 13 14 15 16 17 18 19 1a 1b 1c 1d 1e 1f ................ 236s | 20 21 ! 236s | K extracting all 16 bytes of key@0x10450580 236s | K: symkey-key@0x10450580 (16-bytes, AES_ECB) 236s | sizeof bytes 16 236s | wrapper: (SECItemType)245043304: d7 1f 87 55 5d d9 36 41 81 78 4a 56 b3 d0 16 63 236s | K extracted len 16 bytes at 0x10450ca0 236s | unwrapped: 236s | 00 01 02 03 04 05 06 07 08 09 0a 0b 0c 0d 0e 0f ................ 236s | XCBC: K: 236s | 00 01 02 03 04 05 06 07 08 09 0a 0b 0c 0d 0e 0f ................ 236s | XCBC: K1 236s | c3 52 80 57 54 23 7f 31 1a c0 ff f4 e3 e0 3e 78 .R.WT#.1......>x 236s | CONCATENATE_DATA_AND_BASE: 236s | target: EXTRACT_KEY_FROM_KEY 236s | base: base-key@0x1044d8a8 (16-bytes, AES_KEY_GEN) 236s | params: 8-bytes@0xfff1ae90 236s | key-offset: 0, key-size: 16 236s | EXTRACT_KEY_FROM_KEY: 236s | target: AES_ECB 236s | flags: SIGN 236s | key_size: 16-bytes 236s | base: base-key@0x10450918 (32-bytes, EXTRACT_KEY_FROM_KEY) 236s | operation: FLAGS_ONLY 236s | params: 4-bytes@0xfff1ae84 236s | Computing E[3] using K3 236s | XCBC: K3 236s | c1 a7 ab a1 a2 3a 94 06 58 07 a0 8c c8 ee d0 6e .....:..X......n 236s | XCBC: E[n-1] 236s | 09 02 5e 5a 67 25 20 72 44 14 5c 6b 80 66 85 79 ..^Zg% rD.\k.f.y 236s | XCBC: M[n] 236s | 20 21 ! 236s | XCBC: M[n] 236s | 20 21 ! 236s | XCBC: M[n]:80...^E[n-1]^K3 236s | e8 84 75 fb c5 1f b4 74 1c 13 fc e7 48 88 55 17 ..u....t....H.U. 236s | XCBC: MAC 236s | be cb b3 bc cd b5 18 a3 06 77 d5 48 1f b6 b4 d8 .........w.H.... 236s | CONCATENATE_DATA_AND_BASE: 236s | target: EXTRACT_KEY_FROM_KEY 236s | base: base-key@0x1044d8a8 (16-bytes, AES_KEY_GEN) 236s | params: 8-bytes@0xfff1af38 236s | key-offset: 0, key-size: 16 236s | EXTRACT_KEY_FROM_KEY: 236s | target: EXTRACT_KEY_FROM_KEY 236s | key_size: 16-bytes 236s | base: base-key@0x10450918 (32-bytes, EXTRACT_KEY_FROM_KEY) 236s | operation: FLAGS_ONLY 236s | params: 4-bytes@0xfff1aeec 236s | PRF symkey interface PRF AES_XCBC final-key@0x10450758 (size 16) 236s | PRF symkey interface: key-key@0x10450758 (16-bytes, EXTRACT_KEY_FROM_KEY) 236s | output: symkey-key@0x10450758 (16-bytes, EXTRACT_KEY_FROM_KEY) 236s | RFC 3566 Test Case 6: AES-XCBC-MAC-96 with 34-byte input extracting all 16 bytes of key@0x10450758 236s | RFC 3566 Test Case 6: AES-XCBC-MAC-96 with 34-byte input: symkey-key@0x10450758 (16-bytes, EXTRACT_KEY_FROM_KEY) 236s | sizeof bytes 16 236s | wrapper: (SECItemType)-939073: 6d cc a7 85 9f ea b5 62 55 ef 6f 1c d9 a1 12 4f 236s | RFC 3566 Test Case 6: AES-XCBC-MAC-96 with 34-byte input extracted len 16 bytes at 0x10450ca0 236s | unwrapped: 236s | be cb b3 bc cd b5 18 a3 06 77 d5 48 1f b6 b4 d8 .........w.H.... 236s | verify_bytes() RFC 3566 Test Case 6: AES-XCBC-MAC-96 with 34-byte input: symkey: ok 236s ipsec algparse: RFC 3566 Test Case 7: AES-XCBC-MAC-96 with 1000-byte input 236s | decode_to_chunk() test_prf_vector: input "0x000102030405060708090a0b0c0d0e0f" 236s | decode_to_chunk() output: 236s | 00 01 02 03 04 05 06 07 08 09 0a 0b 0c 0d 0e 0f ................ 236s | decode_to_chunk() test_prf_vector: input "0xf0dafee895db30253761103b5d84528f" 236s | decode_to_chunk() output: 236s | f0 da fe e8 95 db 30 25 37 61 10 3b 5d 84 52 8f ......0%7a.;].R. 236s | PRF chunk interface PRF AES_XCBC init key hunk 0x10450320 (length 16) 236s | 00 01 02 03 04 05 06 07 08 09 0a 0b 0c 0d 0e 0f ................ 236s | CONCATENATE_DATA_AND_BASE: 236s | target: EXTRACT_KEY_FROM_KEY 236s | base: base-key@0x1044d8a8 (16-bytes, AES_KEY_GEN) 236s | params: 8-bytes@0xfff1af30 236s | key-offset: 0, key-size: 16 236s | EXTRACT_KEY_FROM_KEY: 236s | target: EXTRACT_KEY_FROM_KEY 236s | key_size: 16-bytes 236s | base: base-key@0x1044fb08 (32-bytes, EXTRACT_KEY_FROM_KEY) 236s | operation: FLAGS_ONLY 236s | params: 4-bytes@0xfff1aee4 236s | XCBC: Key 16=16 just right 236s | key-offset: 0, key-size: 16 236s | EXTRACT_KEY_FROM_KEY: 236s | target: AES_ECB 236s | flags: SIGN 236s | key_size: 16-bytes 236s | base: base-key@0x10450758 (16-bytes, EXTRACT_KEY_FROM_KEY) 236s | operation: FLAGS_ONLY 236s | params: 4-bytes@0xfff1aebc 236s | PRF chunk interface PRF AES_XCBC 0x10450c58 236s | PRF chunk interface PRF AES_XCBC update message (0x1044eb18 length 1000) 236s | 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................ 236s | 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................ 236s | 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................ 236s | 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................ 236s | 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................ 236s | 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................ 236s | 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................ 236s | 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................ 236s | 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................ 236s | 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................ 236s | 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................ 236s | 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................ 236s | 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................ 236s | 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................ 236s | 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................ 236s | 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................ 236s | 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................ 236s | 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................ 236s | 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................ 236s | 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................ 236s | 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................ 236s | 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................ 236s | 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................ 236s | 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................ 236s | 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................ 236s | 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................ 236s | 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................ 236s | 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................ 236s | 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................ 236s | 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................ 236s | 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................ 236s | 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................ 236s | 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................ 236s | 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................ 236s | 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................ 236s | 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................ 236s | 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................ 236s | 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................ 236s | 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................ 236s | 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................ 236s | 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................ 236s | 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................ 236s | 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................ 236s | 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................ 236s | 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................ 236s | 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................ 236s | 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................ 236s | 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................ 236s | 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................ 236s | 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................ 236s | 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................ 236s | 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................ 236s | 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................ 236s | 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................ 236s | 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................ 236s | 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................ 236s | 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................ 236s | 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................ 236s | 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................ 236s | 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................ 236s | 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................ 236s | 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................ 236s | 00 00 00 00 00 00 00 00 ........ 236s | XCBC: data 236s | 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................ 236s | 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................ 236s | 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................ 236s | 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................ 236s | 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................ 236s | 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................ 236s | 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................ 236s | 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................ 236s | 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................ 236s | 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................ 236s | 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................ 236s | 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................ 236s | 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................ 236s | 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................ 236s | 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................ 236s | 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................ 236s | 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................ 236s | 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................ 236s | 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................ 236s | 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................ 236s | 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................ 236s | 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................ 236s | 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................ 236s | 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................ 236s | 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................ 236s | 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................ 236s | 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................ 236s | 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................ 236s | 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................ 236s | 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................ 236s | 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................ 236s | 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................ 236s | 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................ 236s | 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................ 236s | 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................ 236s | 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................ 236s | 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................ 236s | 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................ 236s | 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................ 236s | 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................ 236s | 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................ 236s | 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................ 236s | 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................ 236s | 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................ 236s | 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................ 236s | 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................ 236s | 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................ 236s | 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................ 236s | 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................ 236s | 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................ 236s | 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................ 236s | 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................ 236s | 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................ 236s | 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................ 236s | 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................ 236s | 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................ 236s | 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................ 236s | 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................ 236s | 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................ 236s | 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................ 236s | 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................ 236s | 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................ 236s | 00 00 00 00 00 00 00 00 ........ 236s | K extracting all 16 bytes of key@0x1044fb08 236s | K: symkey-key@0x1044fb08 (16-bytes, AES_ECB) 236s | sizeof bytes 16 236s | wrapper: siEncodedCertBuffer: d7 1f 87 55 5d d9 36 41 81 78 4a 56 b3 d0 16 63 236s | K extracted len 16 bytes at 0x1044d890 236s | unwrapped: 236s | 00 01 02 03 04 05 06 07 08 09 0a 0b 0c 0d 0e 0f ................ 236s | XCBC: K: 236s | 00 01 02 03 04 05 06 07 08 09 0a 0b 0c 0d 0e 0f ................ 236s | XCBC: K1 236s | c3 52 80 57 54 23 7f 31 1a c0 ff f4 e3 e0 3e 78 .R.WT#.1......>x 236s | CONCATENATE_DATA_AND_BASE: 236s | target: EXTRACT_KEY_FROM_KEY 236s | base: base-key@0x1044d8a8 (16-bytes, AES_KEY_GEN) 236s | params: 8-bytes@0xfff1ae50 236s | key-offset: 0, key-size: 16 236s | EXTRACT_KEY_FROM_KEY: 236s | target: AES_ECB 236s | flags: SIGN 236s | key_size: 16-bytes 236s | base: base-key@0x1044ea78 (32-bytes, EXTRACT_KEY_FROM_KEY) 236s | operation: FLAGS_ONLY 236s | params: 4-bytes@0xfff1ae44 236s | Computing E[63] using K3 236s | XCBC: K3 236s | c1 a7 ab a1 a2 3a 94 06 58 07 a0 8c c8 ee d0 6e .....:..X......n 236s | XCBC: E[n-1] 236s | 5c 88 af cc 1e 1e 83 fc c4 2c 0c e4 12 12 f5 17 \........,...... 236s | XCBC: M[n] 236s | 00 00 00 00 00 00 00 00 ........ 236s | XCBC: M[n] 236s | 00 00 00 00 00 00 00 00 ........ 236s | XCBC: M[n]:80...^E[n-1]^K3 236s | 9d 2f 04 6d bc 24 17 fa 1c 2b ac 68 da fc 25 79 ./.m.$...+.h..%y 236s | XCBC: MAC 236s | f0 da fe e8 95 db 30 25 37 61 10 3b 5d 84 52 8f ......0%7a.;].R. 236s | PRF chunk interface PRF AES_XCBC final length 16 236s | f0 da fe e8 95 db 30 25 37 61 10 3b 5d 84 52 8f ......0%7a.;].R. 236s | chunk output 236s | f0 da fe e8 95 db 30 25 37 61 10 3b 5d 84 52 8f ......0%7a.;].R. 236s | verify_bytes() RFC 3566 Test Case 7: AES-XCBC-MAC-96 with 1000-byte input: prf OUT: ok 236s | CONCATENATE_DATA_AND_BASE: 236s | target: EXTRACT_KEY_FROM_KEY 236s | base: base-key@0x1044d8a8 (16-bytes, AES_KEY_GEN) 236s | params: 8-bytes@0xfff1af90 236s | key-offset: 0, key-size: 16 236s | EXTRACT_KEY_FROM_KEY: 236s | target: EXTRACT_KEY_FROM_KEY 236s | key_size: 16-bytes 236s | base: base-key@0x10450758 (32-bytes, EXTRACT_KEY_FROM_KEY) 236s | operation: FLAGS_ONLY 236s | params: 4-bytes@0xfff1af44 236s | PRF symkey interface PRF AES_XCBC init key symkey-key@0x1044fb08 (size 16) 236s | PRF symkey interface: key symkey-key@0x1044fb08 (16-bytes, EXTRACT_KEY_FROM_KEY) 236s | XCBC: Key 16=16 just right 236s | key-offset: 0, key-size: 16 236s | EXTRACT_KEY_FROM_KEY: 236s | target: AES_ECB 236s | flags: SIGN 236s | key_size: 16-bytes 236s | base: base-key@0x1044fb08 (16-bytes, EXTRACT_KEY_FROM_KEY) 236s | operation: FLAGS_ONLY 236s | params: 4-bytes@0xfff1aeec 236s | PRF symkey interface PRF AES_XCBC 0x10450740 236s | CONCATENATE_DATA_AND_BASE: 236s | target: EXTRACT_KEY_FROM_KEY 236s | base: base-key@0x1044d8a8 (16-bytes, AES_KEY_GEN) 236s | params: 8-bytes@0xfff1af90 236s | key-offset: 0, key-size: 1000 236s | EXTRACT_KEY_FROM_KEY: 236s | target: EXTRACT_KEY_FROM_KEY 236s | key_size: 1000-bytes 236s | base: base-key@0x10450580 (1016-bytes, EXTRACT_KEY_FROM_KEY) 236s | operation: FLAGS_ONLY 236s | params: 4-bytes@0xfff1af44 236s | PRF symkey interface PRF AES_XCBC update symkey message-key@0x1044ea78 (size 1000) 236s | PRF symkey interface: symkey message-key@0x1044ea78 (1000-bytes, EXTRACT_KEY_FROM_KEY) 236s | symkey message extracting all 1000 bytes of key@0x1044ea78 236s | symkey message: symkey-key@0x1044ea78 (1000-bytes, EXTRACT_KEY_FROM_KEY) 236s | sizeof bytes 1008 236s | wrapper: (SECItemType)1955544064: 4c 1f bc 45 36 e8 e0 e1 8a c7 85 fb e4 27 ec d6 4c 1f bc 45 36 e8 e0 e1 8a c7 85 fb e4 27 ec d6 4c 1f bc 45 36 e8 e0 e1 8a c7 85 fb e4 27 ec d6 4c 1f bc 45 36 e8 e0 e1 8a c7 85 fb e4 27 ec d6 4c 1f bc 45 36 e8 e0 e1 8a c7 85 fb e4 27 ec d6 4c 1f bc 45 36 e8 e0 e1 8a c7 85 fb e4 27 ec d6 4c 1f bc 45 36 e8 e0 e1 8a c7 85 fb e4 27 ec d6 4c 1f bc 45 36 e8 e0 e1 8a c7 85 fb e4 27 ec d6 4c 1f bc 45 36 e8 e0 e1 8a c7 85 fb e4 27 ec d6 4c 1f bc 45 36 e8 e0 e1 8a c7 85 fb e4 27 ec d6 4c 1f bc 45 36 e8 e0 e1 8a c7 85 fb e4 27 ec d6 4c 1f bc 45 36 e8 e0 e1 8a c7 85 fb e4 27 ec d6 4c 1f bc 45 36 e8 e0 e1 8a c7 85 fb e4 27 ec d6 4c 1f bc 45 36 e8 e0 e1 8a c7 85 fb e4 27 ec d6 4c 1f bc 45 36 e8 e0 e1 8a c7 85 fb e4 27 ec d6 4c 1f bc 45 36 e8 e0 e1 8a c7 85 fb e4 27 ec d6 4c 1f bc 45 36 e8 e0 e1 8a c7 85 fb e4 27 ec d6 4c 1f bc 45 36 e8 e0 e1 8a c7 85 fb e4 27 ec d6 4c 1f bc 45 36 e8 e0 e1 8a c7 85 fb e4 27 ec... 236s | symkey message extracted len 1008 bytes at 0x10455488 236s | unwrapped: 236s | 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................ 236s | 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................ 236s | 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................ 236s | 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................ 236s | 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................ 236s | 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................ 236s | 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................ 236s | 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................ 236s | 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................ 236s | 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................ 236s | 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................ 236s | 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................ 236s | 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................ 236s | 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................ 236s | 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................ 236s | 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................ 236s | 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................ 236s | 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................ 236s | 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................ 236s | 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................ 236s | 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................ 236s | 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................ 236s | 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................ 236s | 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................ 236s | 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................ 236s | 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................ 236s | 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................ 236s | 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................ 236s | 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................ 236s | 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................ 236s | 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................ 236s | 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................ 236s | 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................ 236s | 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................ 236s | 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................ 236s | 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................ 236s | 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................ 236s | 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................ 236s | 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................ 236s | 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................ 236s | 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................ 236s | 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................ 236s | 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................ 236s | 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................ 236s | 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................ 236s | 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................ 236s | 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................ 236s | 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................ 236s | 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................ 236s | 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................ 236s | 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................ 236s | 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................ 236s | 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................ 236s | 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................ 236s | 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................ 236s | 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................ 236s | 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................ 236s | 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................ 236s | 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................ 236s | 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................ 236s | 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................ 236s | 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................ 236s | 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................ 236s | XCBC: data 236s | 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................ 236s | 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................ 236s | 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................ 236s | 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................ 236s | 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................ 236s | 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................ 236s | 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................ 236s | 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................ 236s | 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................ 236s | 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................ 236s | 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................ 236s | 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................ 236s | 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................ 236s | 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................ 236s | 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................ 236s | 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................ 236s | 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................ 236s | 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................ 236s | 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................ 236s | 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................ 236s | 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................ 236s | 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................ 236s | 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................ 236s | 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................ 236s | 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................ 236s | 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................ 236s | 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................ 236s | 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................ 236s | 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................ 236s | 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................ 236s | 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................ 236s | 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................ 236s | 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................ 236s | 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................ 236s | 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................ 236s | 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................ 236s | 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................ 236s | 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................ 236s | 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................ 236s | 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................ 236s | 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................ 236s | 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................ 236s | 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................ 236s | 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................ 236s | 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................ 236s | 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................ 236s | 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................ 236s | 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................ 236s | 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................ 236s | 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................ 236s | 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................ 236s | 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................ 236s | 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................ 236s | 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................ 236s | 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................ 236s | 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................ 236s | 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................ 236s | 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................ 236s | 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................ 236s | 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................ 236s | 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................ 236s | 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................ 236s | 00 00 00 00 00 00 00 00 ........ 236s | K extracting all 16 bytes of key@0x10450758 236s | K: symkey-key@0x10450758 (16-bytes, AES_ECB) 236s | sizeof bytes 16 236s | wrapper: (SECItemType)245043304: d7 1f 87 55 5d d9 36 41 81 78 4a 56 b3 d0 16 63 236s | K extracted len 16 bytes at 0x10450c88 236s | unwrapped: 236s | 00 01 02 03 04 05 06 07 08 09 0a 0b 0c 0d 0e 0f ................ 236s | XCBC: K: 236s | 00 01 02 03 04 05 06 07 08 09 0a 0b 0c 0d 0e 0f ................ 236s | XCBC: K1 236s | c3 52 80 57 54 23 7f 31 1a c0 ff f4 e3 e0 3e 78 .R.WT#.1......>x 236s | CONCATENATE_DATA_AND_BASE: 236s | target: EXTRACT_KEY_FROM_KEY 236s | base: base-key@0x1044d8a8 (16-bytes, AES_KEY_GEN) 236s | params: 8-bytes@0xfff1ae90 236s | key-offset: 0, key-size: 16 236s | EXTRACT_KEY_FROM_KEY: 236s | target: AES_ECB 236s | flags: SIGN 236s | key_size: 16-bytes 236s | base: base-key@0x10450918 (32-bytes, EXTRACT_KEY_FROM_KEY) 236s | operation: FLAGS_ONLY 236s | params: 4-bytes@0xfff1ae84 236s | Computing E[63] using K3 236s | XCBC: K3 236s | c1 a7 ab a1 a2 3a 94 06 58 07 a0 8c c8 ee d0 6e .....:..X......n 236s | XCBC: E[n-1] 236s | 5c 88 af cc 1e 1e 83 fc c4 2c 0c e4 12 12 f5 17 \........,...... 236s | XCBC: M[n] 236s | 00 00 00 00 00 00 00 00 ........ 236s | XCBC: M[n] 236s | 00 00 00 00 00 00 00 00 ........ 236s | XCBC: M[n]:80...^E[n-1]^K3 236s | 9d 2f 04 6d bc 24 17 fa 1c 2b ac 68 da fc 25 79 ./.m.$...+.h..%y 236s | XCBC: MAC 236s | f0 da fe e8 95 db 30 25 37 61 10 3b 5d 84 52 8f ......0%7a.;].R. 236s | CONCATENATE_DATA_AND_BASE: 236s | target: EXTRACT_KEY_FROM_KEY 236s | base: base-key@0x1044d8a8 (16-bytes, AES_KEY_GEN) 236s | params: 8-bytes@0xfff1af38 236s | key-offset: 0, key-size: 16 236s | EXTRACT_KEY_FROM_KEY: 236s | target: EXTRACT_KEY_FROM_KEY 236s | key_size: 16-bytes 236s | base: base-key@0x10450918 (32-bytes, EXTRACT_KEY_FROM_KEY) 236s | operation: FLAGS_ONLY 236s | params: 4-bytes@0xfff1aeec 236s | PRF symkey interface PRF AES_XCBC final-key@0x10450580 (size 16) 236s | PRF symkey interface: key-key@0x10450580 (16-bytes, EXTRACT_KEY_FROM_KEY) 236s | output: symkey-key@0x10450580 (16-bytes, EXTRACT_KEY_FROM_KEY) 236s | RFC 3566 Test Case 7: AES-XCBC-MAC-96 with 1000-byte input extracting all 16 bytes of key@0x10450580 236s | RFC 3566 Test Case 7: AES-XCBC-MAC-96 with 1000-byte input: symkey-key@0x10450580 (16-bytes, EXTRACT_KEY_FROM_KEY) 236s | sizeof bytes 16 236s | wrapper: (SECItemType)-939073: 42 77 d8 c1 e9 fd 8c cc 7c fe d8 39 92 ef 50 54 236s | RFC 3566 Test Case 7: AES-XCBC-MAC-96 with 1000-byte input extracted len 16 bytes at 0x10450c88 236s | unwrapped: 236s | f0 da fe e8 95 db 30 25 37 61 10 3b 5d 84 52 8f ......0%7a.;].R. 236s | verify_bytes() RFC 3566 Test Case 7: AES-XCBC-MAC-96 with 1000-byte input: symkey: ok 236s ipsec algparse: RFC 4434 Test Case AES-XCBC-PRF-128 with 20-byte input (key length 16) 236s | decode_to_chunk() test_prf_vector: input "0x000102030405060708090a0b0c0d0e0f" 236s | decode_to_chunk() output: 236s | 00 01 02 03 04 05 06 07 08 09 0a 0b 0c 0d 0e 0f ................ 236s | decode_to_chunk() test_prf_vector: input "0x000102030405060708090a0b0c0d0e0f10111213" 236s | decode_to_chunk() output: 236s | 00 01 02 03 04 05 06 07 08 09 0a 0b 0c 0d 0e 0f ................ 236s | 10 11 12 13 .... 236s | decode_to_chunk() test_prf_vector: input "0x47f51b4564966215b8985c63055ed308" 236s | decode_to_chunk() output: 236s | 47 f5 1b 45 64 96 62 15 b8 98 5c 63 05 5e d3 08 G..Ed.b...\c.^.. 236s | PRF chunk interface PRF AES_XCBC init key hunk 0x10450320 (length 16) 236s | 00 01 02 03 04 05 06 07 08 09 0a 0b 0c 0d 0e 0f ................ 236s | CONCATENATE_DATA_AND_BASE: 236s | target: EXTRACT_KEY_FROM_KEY 236s | base: base-key@0x1044d8a8 (16-bytes, AES_KEY_GEN) 236s | params: 8-bytes@0xfff1af30 236s | key-offset: 0, key-size: 16 236s | EXTRACT_KEY_FROM_KEY: 236s | target: EXTRACT_KEY_FROM_KEY 236s | key_size: 16-bytes 236s | base: base-key@0x1044fb08 (32-bytes, EXTRACT_KEY_FROM_KEY) 236s | operation: FLAGS_ONLY 236s | params: 4-bytes@0xfff1aee4 236s | XCBC: Key 16=16 just right 236s | key-offset: 0, key-size: 16 236s | EXTRACT_KEY_FROM_KEY: 236s | target: AES_ECB 236s | flags: SIGN 236s | key_size: 16-bytes 236s | base: base-key@0x10450580 (16-bytes, EXTRACT_KEY_FROM_KEY) 236s | operation: FLAGS_ONLY 236s | params: 4-bytes@0xfff1aebc 236s | PRF chunk interface PRF AES_XCBC 0x1044fd18 236s | PRF chunk interface PRF AES_XCBC update message (0x10450c88 length 20) 236s | 00 01 02 03 04 05 06 07 08 09 0a 0b 0c 0d 0e 0f ................ 236s | 10 11 12 13 .... 236s | XCBC: data 236s | 00 01 02 03 04 05 06 07 08 09 0a 0b 0c 0d 0e 0f ................ 236s | 10 11 12 13 .... 236s | K extracting all 16 bytes of key@0x1044fb08 236s | K: symkey-key@0x1044fb08 (16-bytes, AES_ECB) 236s | sizeof bytes 16 236s | wrapper: siEncodedCertBuffer: d7 1f 87 55 5d d9 36 41 81 78 4a 56 b3 d0 16 63 236s | K extracted len 16 bytes at 0x10450740 236s | unwrapped: 236s | 00 01 02 03 04 05 06 07 08 09 0a 0b 0c 0d 0e 0f ................ 236s | XCBC: K: 236s | 00 01 02 03 04 05 06 07 08 09 0a 0b 0c 0d 0e 0f ................ 236s | XCBC: K1 236s | c3 52 80 57 54 23 7f 31 1a c0 ff f4 e3 e0 3e 78 .R.WT#.1......>x 236s | CONCATENATE_DATA_AND_BASE: 236s | target: EXTRACT_KEY_FROM_KEY 236s | base: base-key@0x1044d8a8 (16-bytes, AES_KEY_GEN) 236s | params: 8-bytes@0xfff1ae50 236s | key-offset: 0, key-size: 16 236s | EXTRACT_KEY_FROM_KEY: 236s | target: AES_ECB 236s | flags: SIGN 236s | key_size: 16-bytes 236s | base: base-key@0x1044ea78 (32-bytes, EXTRACT_KEY_FROM_KEY) 236s | operation: FLAGS_ONLY 236s | params: 4-bytes@0xfff1ae44 236s | Computing E[2] using K3 236s | XCBC: K3 236s | c1 a7 ab a1 a2 3a 94 06 58 07 a0 8c c8 ee d0 6e .....:..X......n 236s | XCBC: E[n-1] 236s | 1d 04 48 fa cf 4d 9c 6f 55 b9 93 da 09 80 3d b3 ..H..M.oU.....=. 236s | XCBC: M[n] 236s | 10 11 12 13 .... 236s | XCBC: M[n] 236s | 10 11 12 13 .... 236s | XCBC: M[n]:80...^E[n-1]^K3 236s | cc b2 f1 48 ed 77 08 69 0d be 33 56 c1 6e ed dd ...H.w.i..3V.n.. 236s | XCBC: MAC 236s | 47 f5 1b 45 64 96 62 15 b8 98 5c 63 05 5e d3 08 G..Ed.b...\c.^.. 236s | PRF chunk interface PRF AES_XCBC final length 16 236s | 47 f5 1b 45 64 96 62 15 b8 98 5c 63 05 5e d3 08 G..Ed.b...\c.^.. 236s | chunk output 236s | 47 f5 1b 45 64 96 62 15 b8 98 5c 63 05 5e d3 08 G..Ed.b...\c.^.. 236s | verify_bytes() RFC 4434 Test Case AES-XCBC-PRF-128 with 20-byte input (key length 16): prf OUT: ok 236s | CONCATENATE_DATA_AND_BASE: 236s | target: EXTRACT_KEY_FROM_KEY 236s | base: base-key@0x1044d8a8 (16-bytes, AES_KEY_GEN) 236s | params: 8-bytes@0xfff1af90 236s | key-offset: 0, key-size: 16 236s | EXTRACT_KEY_FROM_KEY: 236s | target: EXTRACT_KEY_FROM_KEY 236s | key_size: 16-bytes 236s | base: base-key@0x10450580 (32-bytes, EXTRACT_KEY_FROM_KEY) 236s | operation: FLAGS_ONLY 236s | params: 4-bytes@0xfff1af44 236s | PRF symkey interface PRF AES_XCBC init key symkey-key@0x1044fb08 (size 16) 236s | PRF symkey interface: key symkey-key@0x1044fb08 (16-bytes, EXTRACT_KEY_FROM_KEY) 236s | XCBC: Key 16=16 just right 236s | key-offset: 0, key-size: 16 236s | EXTRACT_KEY_FROM_KEY: 236s | target: AES_ECB 236s | flags: SIGN 236s | key_size: 16-bytes 236s | base: base-key@0x1044fb08 (16-bytes, EXTRACT_KEY_FROM_KEY) 236s | operation: FLAGS_ONLY 236s | params: 4-bytes@0xfff1aeec 236s | PRF symkey interface PRF AES_XCBC 0x1044fd18 236s | CONCATENATE_DATA_AND_BASE: 236s | target: EXTRACT_KEY_FROM_KEY 236s | base: base-key@0x1044d8a8 (16-bytes, AES_KEY_GEN) 236s | params: 8-bytes@0xfff1af90 236s | key-offset: 0, key-size: 20 236s | EXTRACT_KEY_FROM_KEY: 236s | target: EXTRACT_KEY_FROM_KEY 236s | key_size: 20-bytes 236s | base: base-key@0x10450758 (36-bytes, EXTRACT_KEY_FROM_KEY) 236s | operation: FLAGS_ONLY 236s | params: 4-bytes@0xfff1af44 236s | PRF symkey interface PRF AES_XCBC update symkey message-key@0x1044ea78 (size 20) 236s | PRF symkey interface: symkey message-key@0x1044ea78 (20-bytes, EXTRACT_KEY_FROM_KEY) 236s | symkey message extracting all 20 bytes of key@0x1044ea78 236s | symkey message: symkey-key@0x1044ea78 (20-bytes, EXTRACT_KEY_FROM_KEY) 236s | sizeof bytes 32 236s | wrapper: (SECItemType)1955544064: d7 1f 87 55 5d d9 36 41 81 78 4a 56 b3 d0 16 63 63 bc 6c 55 b8 ee 91 f3 11 d8 84 31 81 3b c6 6e 236s | symkey message extracted len 32 bytes at 0x10450cb8 236s | unwrapped: 236s | 00 01 02 03 04 05 06 07 08 09 0a 0b 0c 0d 0e 0f ................ 236s | 10 11 12 13 00 00 00 00 00 00 00 00 00 00 00 00 ................ 236s | XCBC: data 236s | 00 01 02 03 04 05 06 07 08 09 0a 0b 0c 0d 0e 0f ................ 236s | 10 11 12 13 .... 236s | K extracting all 16 bytes of key@0x10450580 236s | K: symkey-key@0x10450580 (16-bytes, AES_ECB) 236s | sizeof bytes 16 236s | wrapper: (SECItemType)245043304: d7 1f 87 55 5d d9 36 41 81 78 4a 56 b3 d0 16 63 236s | K extracted len 16 bytes at 0x10450ca0 236s | unwrapped: 236s | 00 01 02 03 04 05 06 07 08 09 0a 0b 0c 0d 0e 0f ................ 236s | XCBC: K: 236s | 00 01 02 03 04 05 06 07 08 09 0a 0b 0c 0d 0e 0f ................ 236s | XCBC: K1 236s | c3 52 80 57 54 23 7f 31 1a c0 ff f4 e3 e0 3e 78 .R.WT#.1......>x 236s | CONCATENATE_DATA_AND_BASE: 236s | target: EXTRACT_KEY_FROM_KEY 236s | base: base-key@0x1044d8a8 (16-bytes, AES_KEY_GEN) 236s | params: 8-bytes@0xfff1ae90 236s | key-offset: 0, key-size: 16 236s | EXTRACT_KEY_FROM_KEY: 236s | target: AES_ECB 236s | flags: SIGN 236s | key_size: 16-bytes 236s | base: base-key@0x10450918 (32-bytes, EXTRACT_KEY_FROM_KEY) 236s | operation: FLAGS_ONLY 236s | params: 4-bytes@0xfff1ae84 236s | Computing E[2] using K3 236s | XCBC: K3 236s | c1 a7 ab a1 a2 3a 94 06 58 07 a0 8c c8 ee d0 6e .....:..X......n 236s | XCBC: E[n-1] 236s | 1d 04 48 fa cf 4d 9c 6f 55 b9 93 da 09 80 3d b3 ..H..M.oU.....=. 236s | XCBC: M[n] 236s | 10 11 12 13 .... 236s | XCBC: M[n] 236s | 10 11 12 13 .... 236s | XCBC: M[n]:80...^E[n-1]^K3 236s | cc b2 f1 48 ed 77 08 69 0d be 33 56 c1 6e ed dd ...H.w.i..3V.n.. 236s | XCBC: MAC 236s | 47 f5 1b 45 64 96 62 15 b8 98 5c 63 05 5e d3 08 G..Ed.b...\c.^.. 236s | CONCATENATE_DATA_AND_BASE: 236s | target: EXTRACT_KEY_FROM_KEY 236s | base: base-key@0x1044d8a8 (16-bytes, AES_KEY_GEN) 236s | params: 8-bytes@0xfff1af38 236s | key-offset: 0, key-size: 16 236s | EXTRACT_KEY_FROM_KEY: 236s | target: EXTRACT_KEY_FROM_KEY 236s | key_size: 16-bytes 236s | base: base-key@0x10450918 (32-bytes, EXTRACT_KEY_FROM_KEY) 236s | operation: FLAGS_ONLY 236s | params: 4-bytes@0xfff1aeec 236s | PRF symkey interface PRF AES_XCBC final-key@0x10450758 (size 16) 236s | PRF symkey interface: key-key@0x10450758 (16-bytes, EXTRACT_KEY_FROM_KEY) 236s | output: symkey-key@0x10450758 (16-bytes, EXTRACT_KEY_FROM_KEY) 236s | RFC 4434 Test Case AES-XCBC-PRF-128 with 20-byte input (key length 16) extracting all 16 bytes of key@0x10450758 236s | RFC 4434 Test Case AES-XCBC-PRF-128 with 20-byte input (key length 16): symkey-key@0x10450758 (16-bytes, EXTRACT_KEY_FROM_KEY) 236s | sizeof bytes 16 236s | wrapper: (SECItemType)-939073: d7 ec ee 03 55 f7 be 9c 21 e1 96 50 88 37 ae a0 236s | RFC 4434 Test Case AES-XCBC-PRF-128 with 20-byte input (key length 16) extracted len 16 bytes at 0x10450740 236s | unwrapped: 236s | 47 f5 1b 45 64 96 62 15 b8 98 5c 63 05 5e d3 08 G..Ed.b...\c.^.. 236s | verify_bytes() RFC 4434 Test Case AES-XCBC-PRF-128 with 20-byte input (key length 16): symkey: ok 236s ipsec algparse: RFC 4434 Test Case AES-XCBC-PRF-128 with 20-byte input (key length 10) 236s | decode_to_chunk() test_prf_vector: input "0x00010203040506070809" 236s | decode_to_chunk() output: 236s | 00 01 02 03 04 05 06 07 08 09 .......... 236s | decode_to_chunk() test_prf_vector: input "0x000102030405060708090a0b0c0d0e0f10111213" 236s | decode_to_chunk() output: 236s | 00 01 02 03 04 05 06 07 08 09 0a 0b 0c 0d 0e 0f ................ 236s | 10 11 12 13 .... 236s | decode_to_chunk() test_prf_vector: input "0x0fa087af7d866e7653434e602fdde835" 236s | decode_to_chunk() output: 236s | 0f a0 87 af 7d 86 6e 76 53 43 4e 60 2f dd e8 35 ....}.nvSCN`/..5 236s | PRF chunk interface PRF AES_XCBC init key hunk 0x1044d798 (length 10) 236s | 00 01 02 03 04 05 06 07 08 09 .......... 236s | CONCATENATE_DATA_AND_BASE: 236s | target: EXTRACT_KEY_FROM_KEY 236s | base: base-key@0x1044d8a8 (16-bytes, AES_KEY_GEN) 236s | params: 8-bytes@0xfff1af30 236s | key-offset: 0, key-size: 10 236s | EXTRACT_KEY_FROM_KEY: 236s | target: EXTRACT_KEY_FROM_KEY 236s | key_size: 10-bytes 236s | base: base-key@0x1044fb08 (26-bytes, EXTRACT_KEY_FROM_KEY) 236s | operation: FLAGS_ONLY 236s | params: 4-bytes@0xfff1aee4 236s | XCBC: Key 10<16 too small, padding with zeros 236s | CONCATENATE_BASE_AND_DATA: 236s | target: EXTRACT_KEY_FROM_KEY 236s | base: base-key@0x10450758 (10-bytes, EXTRACT_KEY_FROM_KEY) 236s | params: 8-bytes@0xfff1aec0 236s | key-offset: 0, key-size: 16 236s | EXTRACT_KEY_FROM_KEY: 236s | target: AES_ECB 236s | flags: SIGN 236s | key_size: 16-bytes 236s | base: base-key@0x1044fb08 (16-bytes, EXTRACT_KEY_FROM_KEY) 236s | operation: FLAGS_ONLY 236s | params: 4-bytes@0xfff1aebc 236s | PRF chunk interface PRF AES_XCBC 0x10450308 236s | PRF chunk interface PRF AES_XCBC update message (0x10450c88 length 20) 236s | 00 01 02 03 04 05 06 07 08 09 0a 0b 0c 0d 0e 0f ................ 236s | 10 11 12 13 .... 236s | XCBC: data 236s | 00 01 02 03 04 05 06 07 08 09 0a 0b 0c 0d 0e 0f ................ 236s | 10 11 12 13 .... 236s | K extracting all 16 bytes of key@0x1044ea78 236s | K: symkey-key@0x1044ea78 (16-bytes, AES_ECB) 236s | sizeof bytes 16 236s | wrapper: siEncodedCertBuffer: 34 57 9c 87 33 2c b2 91 5e fd 39 b6 8e cc 75 15 236s | K extracted len 16 bytes at 0x10450c70 236s | unwrapped: 236s | 00 01 02 03 04 05 06 07 08 09 00 00 00 00 00 00 ................ 236s | XCBC: K: 236s | 00 01 02 03 04 05 06 07 08 09 00 00 00 00 00 00 ................ 236s | XCBC: K1 236s | 50 ca b2 4d 03 34 45 5e 40 7b 25 0f dd 7c f8 d5 P..M.4E^@{%..|.. 236s | CONCATENATE_DATA_AND_BASE: 236s | target: EXTRACT_KEY_FROM_KEY 236s | base: base-key@0x1044d8a8 (16-bytes, AES_KEY_GEN) 236s | params: 8-bytes@0xfff1ae50 236s | key-offset: 0, key-size: 16 236s | EXTRACT_KEY_FROM_KEY: 236s | target: AES_ECB 236s | flags: SIGN 236s | key_size: 16-bytes 236s | base: base-key@0x1044fb08 (32-bytes, EXTRACT_KEY_FROM_KEY) 236s | operation: FLAGS_ONLY 236s | params: 4-bytes@0xfff1ae44 236s | Computing E[2] using K3 236s | XCBC: K3 236s | 8e f7 48 db 56 f1 f7 26 24 72 f2 c5 63 b0 3f 88 ..H.V..&$r..c.?. 236s | XCBC: E[n-1] 236s | fe 1f 63 e9 65 1a 4b bb 3c cc cd 0d cc 83 e4 30 ..c.e.K.<......0 236s | XCBC: M[n] 236s | 10 11 12 13 .... 236s | XCBC: M[n] 236s | 10 11 12 13 .... 236s | XCBC: M[n]:80...^E[n-1]^K3 236s | 60 f9 39 21 b3 eb bc 9d 18 be 3f c8 af 33 db b8 `.9!......?..3.. 236s | XCBC: MAC 236s | 0f a0 87 af 7d 86 6e 76 53 43 4e 60 2f dd e8 35 ....}.nvSCN`/..5 236s | PRF chunk interface PRF AES_XCBC final length 16 236s | 0f a0 87 af 7d 86 6e 76 53 43 4e 60 2f dd e8 35 ....}.nvSCN`/..5 236s | chunk output 236s | 0f a0 87 af 7d 86 6e 76 53 43 4e 60 2f dd e8 35 ....}.nvSCN`/..5 236s | verify_bytes() RFC 4434 Test Case AES-XCBC-PRF-128 with 20-byte input (key length 10): prf OUT: ok 236s | CONCATENATE_DATA_AND_BASE: 236s | target: EXTRACT_KEY_FROM_KEY 236s | base: base-key@0x1044d8a8 (16-bytes, AES_KEY_GEN) 236s | params: 8-bytes@0xfff1af90 236s | key-offset: 0, key-size: 10 236s | EXTRACT_KEY_FROM_KEY: 236s | target: EXTRACT_KEY_FROM_KEY 236s | key_size: 10-bytes 236s | base: base-key@0x10450758 (26-bytes, EXTRACT_KEY_FROM_KEY) 236s | operation: FLAGS_ONLY 236s | params: 4-bytes@0xfff1af44 236s | PRF symkey interface PRF AES_XCBC init key symkey-key@0x1044ea78 (size 10) 236s | PRF symkey interface: key symkey-key@0x1044ea78 (10-bytes, EXTRACT_KEY_FROM_KEY) 236s | XCBC: Key 10<16 too small, padding with zeros 236s | CONCATENATE_BASE_AND_DATA: 236s | target: EXTRACT_KEY_FROM_KEY 236s | base: base-key@0x1044ea78 (10-bytes, EXTRACT_KEY_FROM_KEY) 236s | params: 8-bytes@0xfff1aef0 236s | key-offset: 0, key-size: 16 236s | EXTRACT_KEY_FROM_KEY: 236s | target: AES_ECB 236s | flags: SIGN 236s | key_size: 16-bytes 236s | base: base-key@0x10450758 (16-bytes, EXTRACT_KEY_FROM_KEY) 236s | operation: FLAGS_ONLY 236s | params: 4-bytes@0xfff1aeec 236s | PRF symkey interface PRF AES_XCBC 0x10450c58 236s | CONCATENATE_DATA_AND_BASE: 236s | target: EXTRACT_KEY_FROM_KEY 236s | base: base-key@0x1044d8a8 (16-bytes, AES_KEY_GEN) 236s | params: 8-bytes@0xfff1af90 236s | key-offset: 0, key-size: 20 236s | EXTRACT_KEY_FROM_KEY: 236s | target: EXTRACT_KEY_FROM_KEY 236s | key_size: 20-bytes 236s | base: base-key@0x10450580 (36-bytes, EXTRACT_KEY_FROM_KEY) 236s | operation: FLAGS_ONLY 236s | params: 4-bytes@0xfff1af44 236s | PRF symkey interface PRF AES_XCBC update symkey message-key@0x10450758 (size 20) 236s | PRF symkey interface: symkey message-key@0x10450758 (20-bytes, EXTRACT_KEY_FROM_KEY) 236s | symkey message extracting all 20 bytes of key@0x10450758 236s | symkey message: symkey-key@0x10450758 (20-bytes, EXTRACT_KEY_FROM_KEY) 236s | sizeof bytes 32 236s | wrapper: (SECItemType)1955544064: d7 1f 87 55 5d d9 36 41 81 78 4a 56 b3 d0 16 63 63 bc 6c 55 b8 ee 91 f3 11 d8 84 31 81 3b c6 6e 236s | symkey message extracted len 32 bytes at 0x104501a8 236s | unwrapped: 236s | 00 01 02 03 04 05 06 07 08 09 0a 0b 0c 0d 0e 0f ................ 236s | 10 11 12 13 00 00 00 00 00 00 00 00 00 00 00 00 ................ 236s | XCBC: data 236s | 00 01 02 03 04 05 06 07 08 09 0a 0b 0c 0d 0e 0f ................ 236s | 10 11 12 13 .... 236s | K extracting all 16 bytes of key@0x1044fb08 236s | K: symkey-key@0x1044fb08 (16-bytes, AES_ECB) 236s | sizeof bytes 16 236s | wrapper: (SECItemType)245043304: 34 57 9c 87 33 2c b2 91 5e fd 39 b6 8e cc 75 15 236s | K extracted len 16 bytes at 0x1044d890 236s | unwrapped: 236s | 00 01 02 03 04 05 06 07 08 09 00 00 00 00 00 00 ................ 236s | XCBC: K: 236s | 00 01 02 03 04 05 06 07 08 09 00 00 00 00 00 00 ................ 236s | XCBC: K1 236s | 50 ca b2 4d 03 34 45 5e 40 7b 25 0f dd 7c f8 d5 P..M.4E^@{%..|.. 236s | CONCATENATE_DATA_AND_BASE: 236s | target: EXTRACT_KEY_FROM_KEY 236s | base: base-key@0x1044d8a8 (16-bytes, AES_KEY_GEN) 236s | params: 8-bytes@0xfff1ae90 236s | key-offset: 0, key-size: 16 236s | EXTRACT_KEY_FROM_KEY: 236s | target: AES_ECB 236s | flags: SIGN 236s | key_size: 16-bytes 236s | base: base-key@0x10450918 (32-bytes, EXTRACT_KEY_FROM_KEY) 236s | operation: FLAGS_ONLY 236s | params: 4-bytes@0xfff1ae84 236s | Computing E[2] using K3 236s | XCBC: K3 236s | 8e f7 48 db 56 f1 f7 26 24 72 f2 c5 63 b0 3f 88 ..H.V..&$r..c.?. 236s | XCBC: E[n-1] 236s | fe 1f 63 e9 65 1a 4b bb 3c cc cd 0d cc 83 e4 30 ..c.e.K.<......0 236s | XCBC: M[n] 236s | 10 11 12 13 .... 236s | XCBC: M[n] 236s | 10 11 12 13 .... 236s | XCBC: M[n]:80...^E[n-1]^K3 236s | 60 f9 39 21 b3 eb bc 9d 18 be 3f c8 af 33 db b8 `.9!......?..3.. 236s | XCBC: MAC 236s | 0f a0 87 af 7d 86 6e 76 53 43 4e 60 2f dd e8 35 ....}.nvSCN`/..5 236s | CONCATENATE_DATA_AND_BASE: 236s | target: EXTRACT_KEY_FROM_KEY 236s | base: base-key@0x1044d8a8 (16-bytes, AES_KEY_GEN) 236s | params: 8-bytes@0xfff1af38 236s | key-offset: 0, key-size: 16 236s | EXTRACT_KEY_FROM_KEY: 236s | target: EXTRACT_KEY_FROM_KEY 236s | key_size: 16-bytes 236s | base: base-key@0x10450918 (32-bytes, EXTRACT_KEY_FROM_KEY) 236s | operation: FLAGS_ONLY 236s | params: 4-bytes@0xfff1aeec 236s | PRF symkey interface PRF AES_XCBC final-key@0x10450580 (size 16) 236s | PRF symkey interface: key-key@0x10450580 (16-bytes, EXTRACT_KEY_FROM_KEY) 236s | output: symkey-key@0x10450580 (16-bytes, EXTRACT_KEY_FROM_KEY) 236s | RFC 4434 Test Case AES-XCBC-PRF-128 with 20-byte input (key length 10) extracting all 16 bytes of key@0x10450580 236s | RFC 4434 Test Case AES-XCBC-PRF-128 with 20-byte input (key length 10): symkey-key@0x10450580 (16-bytes, EXTRACT_KEY_FROM_KEY) 236s | sizeof bytes 16 236s | wrapper: (SECItemType)-939073: 94 f6 bd 8b 2b f6 fa 83 8d 79 96 f4 32 ad d8 ec 236s | RFC 4434 Test Case AES-XCBC-PRF-128 with 20-byte input (key length 10) extracted len 16 bytes at 0x10450308 236s | unwrapped: 236s | 0f a0 87 af 7d 86 6e 76 53 43 4e 60 2f dd e8 35 ....}.nvSCN`/..5 236s | verify_bytes() RFC 4434 Test Case AES-XCBC-PRF-128 with 20-byte input (key length 10): symkey: ok 236s ipsec algparse: RFC 4434 Test Case AES-XCBC-PRF-128 with 20-byte input (key length 18) 236s | decode_to_chunk() test_prf_vector: input "0x000102030405060708090a0b0c0d0e0fedcb" 236s | decode_to_chunk() output: 236s | 00 01 02 03 04 05 06 07 08 09 0a 0b 0c 0d 0e 0f ................ 236s | ed cb .. 236s | decode_to_chunk() test_prf_vector: input "0x000102030405060708090a0b0c0d0e0f10111213" 236s | decode_to_chunk() output: 236s | 00 01 02 03 04 05 06 07 08 09 0a 0b 0c 0d 0e 0f ................ 236s | 10 11 12 13 .... 236s | decode_to_chunk() test_prf_vector: input "0x8cd3c93ae598a9803006ffb67c40e9e4" 236s | decode_to_chunk() output: 236s | 8c d3 c9 3a e5 98 a9 80 30 06 ff b6 7c 40 e9 e4 ...:....0...|@.. 236s | PRF chunk interface PRF AES_XCBC init key hunk 0x10450c88 (length 18) 236s | 00 01 02 03 04 05 06 07 08 09 0a 0b 0c 0d 0e 0f ................ 236s | ed cb .. 236s | CONCATENATE_DATA_AND_BASE: 236s | target: EXTRACT_KEY_FROM_KEY 236s | base: base-key@0x1044d8a8 (16-bytes, AES_KEY_GEN) 236s | params: 8-bytes@0xfff1af30 236s | key-offset: 0, key-size: 18 236s | EXTRACT_KEY_FROM_KEY: 236s | target: EXTRACT_KEY_FROM_KEY 236s | key_size: 18-bytes 236s | base: base-key@0x1044ea78 (34-bytes, EXTRACT_KEY_FROM_KEY) 236s | operation: FLAGS_ONLY 236s | params: 4-bytes@0xfff1aee4 236s | XCBC: Key 18>16 too big, rehashing to size 236s | CONCATENATE_DATA_AND_BASE: 236s | target: EXTRACT_KEY_FROM_KEY 236s | base: base-key@0x1044d8a8 (16-bytes, AES_KEY_GEN) 236s | params: 8-bytes@0xfff1aea0 236s | key-offset: 0, key-size: 16 236s | EXTRACT_KEY_FROM_KEY: 236s | target: AES_ECB 236s | flags: SIGN 236s | key_size: 16-bytes 236s | base: base-key@0x10450758 (32-bytes, EXTRACT_KEY_FROM_KEY) 236s | operation: FLAGS_ONLY 236s | params: 4-bytes@0xfff1ae94 236s | draft_chunk extracting all 18 bytes of key@0x10450580 236s | draft_chunk: symkey-key@0x10450580 (18-bytes, EXTRACT_KEY_FROM_KEY) 236s | sizeof bytes 32 236s | wrapper: (SECItemType)540689218: d7 1f 87 55 5d d9 36 41 81 78 4a 56 b3 d0 16 63 ee b2 7c 02 eb 09 d5 cb 5f de 33 16 23 65 6a 66 236s | draft_chunk extracted len 32 bytes at 0x10450cb8 236s | unwrapped: 236s | 00 01 02 03 04 05 06 07 08 09 0a 0b 0c 0d 0e 0f ................ 236s | ed cb 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................ 236s | XCBC: data 236s | 00 01 02 03 04 05 06 07 08 09 0a 0b 0c 0d 0e 0f ................ 236s | ed cb .. 236s | K extracting all 16 bytes of key@0x1044ea78 236s | K: symkey-key@0x1044ea78 (16-bytes, AES_ECB) 236s | sizeof bytes 16 236s | wrapper: (SECItemType)538980400: 4c 1f bc 45 36 e8 e0 e1 8a c7 85 fb e4 27 ec d6 236s | K extracted len 16 bytes at 0x10450320 236s | unwrapped: 236s | 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................ 236s | XCBC: K: 236s | 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................ 236s | XCBC: K1 236s | e1 4d 5d 0e e2 77 15 df 08 b4 15 2b a2 3d a8 e0 .M]..w.....+.=.. 236s | CONCATENATE_DATA_AND_BASE: 236s | target: EXTRACT_KEY_FROM_KEY 236s | base: base-key@0x1044d8a8 (16-bytes, AES_KEY_GEN) 236s | params: 8-bytes@0xfff1ae10 236s | key-offset: 0, key-size: 16 236s | EXTRACT_KEY_FROM_KEY: 236s | target: AES_ECB 236s | flags: SIGN 236s | key_size: 16-bytes 236s | base: base-key@0x1044fb08 (32-bytes, EXTRACT_KEY_FROM_KEY) 236s | operation: FLAGS_ONLY 236s | params: 4-bytes@0xfff1ae04 236s | Computing E[2] using K3 236s | XCBC: K3 236s | 8d 34 ef cb 3b d5 45 ca 06 2a ec df ef 7c 0b fa .4..;.E..*...|.. 236s | XCBC: E[n-1] 236s | 0b 72 b2 ae 0a 37 79 81 75 6a d5 9c 79 c0 e6 96 .r...7y.uj..y... 236s | XCBC: M[n] 236s | ed cb .. 236s | XCBC: M[n] 236s | ed cb .. 236s | XCBC: M[n]:80...^E[n-1]^K3 236s | 6b 8d dd 65 31 e2 3c 4b 73 40 39 43 96 bc ed 6c k..e1.16 too big, rehashing to size 236s | CONCATENATE_DATA_AND_BASE: 236s | target: EXTRACT_KEY_FROM_KEY 236s | base: base-key@0x1044d8a8 (16-bytes, AES_KEY_GEN) 236s | params: 8-bytes@0xfff1aed0 236s | key-offset: 0, key-size: 16 236s | EXTRACT_KEY_FROM_KEY: 236s | target: AES_ECB 236s | flags: SIGN 236s | key_size: 16-bytes 236s | base: base-key@0x1044ea78 (32-bytes, EXTRACT_KEY_FROM_KEY) 236s | operation: FLAGS_ONLY 236s | params: 4-bytes@0xfff1aec4 236s | draft_chunk extracting all 18 bytes of key@0x10450758 236s | draft_chunk: symkey-key@0x10450758 (18-bytes, EXTRACT_KEY_FROM_KEY) 236s | sizeof bytes 32 236s | wrapper: (SECItemType)540689218: d7 1f 87 55 5d d9 36 41 81 78 4a 56 b3 d0 16 63 ee b2 7c 02 eb 09 d5 cb 5f de 33 16 23 65 6a 66 236s | draft_chunk extracted len 32 bytes at 0x104501a8 236s | unwrapped: 236s | 00 01 02 03 04 05 06 07 08 09 0a 0b 0c 0d 0e 0f ................ 236s | ed cb 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................ 236s | XCBC: data 236s | 00 01 02 03 04 05 06 07 08 09 0a 0b 0c 0d 0e 0f ................ 236s | ed cb .. 236s | K extracting all 16 bytes of key@0x10450580 236s | K: symkey-key@0x10450580 (16-bytes, AES_ECB) 236s | sizeof bytes 16 236s | wrapper: (SECItemType)538980400: 4c 1f bc 45 36 e8 e0 e1 8a c7 85 fb e4 27 ec d6 236s | K extracted len 16 bytes at 0x10450740 236s | unwrapped: 236s | 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................ 236s | XCBC: K: 236s | 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................ 236s | XCBC: K1 236s | e1 4d 5d 0e e2 77 15 df 08 b4 15 2b a2 3d a8 e0 .M]..w.....+.=.. 236s | CONCATENATE_DATA_AND_BASE: 236s | target: EXTRACT_KEY_FROM_KEY 236s | base: base-key@0x1044d8a8 (16-bytes, AES_KEY_GEN) 236s | params: 8-bytes@0xfff1ae40 236s | key-offset: 0, key-size: 16 236s | EXTRACT_KEY_FROM_KEY: 236s | target: AES_ECB 236s | flags: SIGN 236s | key_size: 16-bytes 236s | base: base-key@0x1044fb08 (32-bytes, EXTRACT_KEY_FROM_KEY) 236s | operation: FLAGS_ONLY 236s | params: 4-bytes@0xfff1ae34 236s | Computing E[2] using K3 236s | XCBC: K3 236s | 8d 34 ef cb 3b d5 45 ca 06 2a ec df ef 7c 0b fa .4..;.E..*...|.. 236s | XCBC: E[n-1] 236s | 0b 72 b2 ae 0a 37 79 81 75 6a d5 9c 79 c0 e6 96 .r...7y.uj..y... 236s | XCBC: M[n] 236s | ed cb .. 236s | XCBC: M[n] 236s | ed cb .. 236s | XCBC: M[n]:80...^E[n-1]^K3 236s | 6b 8d dd 65 31 e2 3c 4b 73 40 39 43 96 bc ed 6c k..e1.j.....n1.].8 236s | PRF chunk interface PRF HMAC_MD5 init key hunk 0x1044d728 (length 4) 236s | 4a 65 66 65 Jefe 236s | CONCATENATE_DATA_AND_BASE: 236s | target: EXTRACT_KEY_FROM_KEY 236s | base: base-key@0x1044d8a8 (16-bytes, AES_KEY_GEN) 236s | params: 8-bytes@0xfff1af18 236s | key-offset: 0, key-size: 4 236s | EXTRACT_KEY_FROM_KEY: 236s | target: MD5_HMAC 236s | flags: SIGN 236s | key_size: 4-bytes 236s | base: base-key@0x1044fb08 (20-bytes, EXTRACT_KEY_FROM_KEY) 236s | operation: FLAGS_ONLY 236s | params: 4-bytes@0xfff1af0c 236s | PRF chunk interface prf: created HMAC_MD5 context 0x1044fc60 from key-key@0x10450758 236s | PRF chunk interface prf: begin HMAC_MD5 with context 0x1044fc60 from key-key@0x10450758 236s | PRF chunk interface PRF HMAC_MD5 0x10450b88 236s | PRF chunk interface PRF HMAC_MD5 update message (0x1044e938 length 28) 236s | 77 68 61 74 20 64 6f 20 79 61 20 77 61 6e 74 20 what do ya want 236s | 66 6f 72 20 6e 6f 74 68 69 6e 67 3f for nothing? 236s | PRF chunk interface PRF HMAC_MD5 final length 16 236s | 75 0c 78 3e 6a b0 b5 03 ea a8 6e 31 0a 5d b7 38 u.x>j.....n1.].8 236s | chunk output 236s | 75 0c 78 3e 6a b0 b5 03 ea a8 6e 31 0a 5d b7 38 u.x>j.....n1.].8 236s | verify_bytes() RFC 2104: MD5_HMAC test 2: prf OUT: ok 236s | CONCATENATE_DATA_AND_BASE: 236s | target: EXTRACT_KEY_FROM_KEY 236s | base: base-key@0x1044d8a8 (16-bytes, AES_KEY_GEN) 236s | params: 8-bytes@0xfff1af90 236s | key-offset: 0, key-size: 4 236s | EXTRACT_KEY_FROM_KEY: 236s | target: EXTRACT_KEY_FROM_KEY 236s | key_size: 4-bytes 236s | base: base-key@0x1044fb08 (20-bytes, EXTRACT_KEY_FROM_KEY) 236s | operation: FLAGS_ONLY 236s | params: 4-bytes@0xfff1af44 236s | PRF symkey interface PRF HMAC_MD5 init key symkey-key@0x10450758 (size 4) 236s | PRF symkey interface: key symkey-key@0x10450758 (4-bytes, EXTRACT_KEY_FROM_KEY) 236s | key-offset: 0, key-size: 4 236s | EXTRACT_KEY_FROM_KEY: 236s | target: MD5_HMAC 236s | flags: SIGN 236s | key_size: 4-bytes 236s | base: base-key@0x10450758 (4-bytes, EXTRACT_KEY_FROM_KEY) 236s | operation: FLAGS_ONLY 236s | params: 4-bytes@0xfff1af2c 236s | PRF symkey interface prf: created HMAC_MD5 context 0x1044fc60 from key symkey-key@0x1044fb08 236s | PRF symkey interface prf: begin HMAC_MD5 with context 0x1044fc60 from key symkey-key@0x1044fb08 236s | PRF symkey interface PRF HMAC_MD5 0x10450740 236s | CONCATENATE_DATA_AND_BASE: 236s | target: EXTRACT_KEY_FROM_KEY 236s | base: base-key@0x1044d8a8 (16-bytes, AES_KEY_GEN) 236s | params: 8-bytes@0xfff1af90 236s | key-offset: 0, key-size: 28 236s | EXTRACT_KEY_FROM_KEY: 236s | target: EXTRACT_KEY_FROM_KEY 236s | key_size: 28-bytes 236s | base: base-key@0x1044ea78 (44-bytes, EXTRACT_KEY_FROM_KEY) 236s | operation: FLAGS_ONLY 236s | params: 4-bytes@0xfff1af44 236s | PRF symkey interface PRF HMAC_MD5 update symkey message-key@0x10450580 (size 28) 236s | PRF symkey interface: symkey message-key@0x10450580 (28-bytes, EXTRACT_KEY_FROM_KEY) 236s | nss hmac digest hack extracting all 28 bytes of key@0x10450580 236s | nss hmac digest hack: symkey-key@0x10450580 (28-bytes, EXTRACT_KEY_FROM_KEY) 236s | sizeof bytes 32 236s | wrapper: (SECItemType)-939168: 84 ae 13 e7 b6 c2 bf cf 91 af 31 2a b4 0c 1b 55 b9 11 0d ab 3b 85 ec c1 32 6c be 8d 63 15 58 b9 236s | nss hmac digest hack extracted len 32 bytes at 0x104501a8 236s | unwrapped: 236s | 77 68 61 74 20 64 6f 20 79 61 20 77 61 6e 74 20 what do ya want 236s | 66 6f 72 20 6e 6f 74 68 69 6e 67 3f 00 00 00 00 for nothing?.... 236s | CONCATENATE_DATA_AND_BASE: 236s | target: EXTRACT_KEY_FROM_KEY 236s | base: base-key@0x1044d8a8 (16-bytes, AES_KEY_GEN) 236s | params: 8-bytes@0xfff1af50 236s | key-offset: 0, key-size: 16 236s | EXTRACT_KEY_FROM_KEY: 236s | target: EXTRACT_KEY_FROM_KEY 236s | key_size: 16-bytes 236s | base: base-key@0x1044ea78 (32-bytes, EXTRACT_KEY_FROM_KEY) 236s | operation: FLAGS_ONLY 236s | params: 4-bytes@0xfff1af04 236s | PRF symkey interface PRF HMAC_MD5 final-key@0x1044fb08 (size 16) 236s | PRF symkey interface: key-key@0x1044fb08 (16-bytes, EXTRACT_KEY_FROM_KEY) 236s | output: symkey-key@0x1044fb08 (16-bytes, EXTRACT_KEY_FROM_KEY) 236s | RFC 2104: MD5_HMAC test 2 extracting all 16 bytes of key@0x1044fb08 236s | RFC 2104: MD5_HMAC test 2: symkey-key@0x1044fb08 (16-bytes, EXTRACT_KEY_FROM_KEY) 236s | sizeof bytes 16 236s | wrapper: (SECItemType)-939073: 08 ec dd a7 3a ba 59 12 06 0c 12 7c d0 38 63 c3 236s | RFC 2104: MD5_HMAC test 2 extracted len 16 bytes at 0x10450b88 236s | unwrapped: 236s | 75 0c 78 3e 6a b0 b5 03 ea a8 6e 31 0a 5d b7 38 u.x>j.....n1.].8 236s | verify_bytes() RFC 2104: MD5_HMAC test 2: symkey: ok 236s ipsec algparse: RFC 2104: MD5_HMAC test 3 236s | decode_to_chunk() test_prf_vector: input "0xAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAA" 236s | decode_to_chunk() output: 236s | aa aa aa aa aa aa aa aa aa aa aa aa aa aa aa aa ................ 236s | decode_to_chunk() test_prf_vector: input "0xDDDDDDDDDDDDDDDDDDDDDDDDDDDDDDDDDDDDDDDDDDDDDDDDDDDDDDDDDDDDDDDDDDDDDDDDDDDDDDDDDDDDDDDDDDDDDDDDDDDD" 236s | decode_to_chunk() output: 236s | dd dd dd dd dd dd dd dd dd dd dd dd dd dd dd dd ................ 236s | dd dd dd dd dd dd dd dd dd dd dd dd dd dd dd dd ................ 236s | dd dd dd dd dd dd dd dd dd dd dd dd dd dd dd dd ................ 236s | dd dd .. 236s | decode_to_chunk() test_prf_vector: input "0x56be34521d144c88dbb8c733f0e8b3f6" 236s | decode_to_chunk() output: 236s | 56 be 34 52 1d 14 4c 88 db b8 c7 33 f0 e8 b3 f6 V.4R..L....3.... 236s | PRF chunk interface PRF HMAC_MD5 init key hunk 0x10450320 (length 16) 236s | aa aa aa aa aa aa aa aa aa aa aa aa aa aa aa aa ................ 236s | CONCATENATE_DATA_AND_BASE: 236s | target: EXTRACT_KEY_FROM_KEY 236s | base: base-key@0x1044d8a8 (16-bytes, AES_KEY_GEN) 236s | params: 8-bytes@0xfff1af18 236s | key-offset: 0, key-size: 16 236s | EXTRACT_KEY_FROM_KEY: 236s | target: MD5_HMAC 236s | flags: SIGN 236s | key_size: 16-bytes 236s | base: base-key@0x10450758 (32-bytes, EXTRACT_KEY_FROM_KEY) 236s | operation: FLAGS_ONLY 236s | params: 4-bytes@0xfff1af0c 236s | PRF chunk interface prf: created HMAC_MD5 context 0x1044fc60 from key-key@0x1044fb08 236s | PRF chunk interface prf: begin HMAC_MD5 with context 0x1044fc60 from key-key@0x1044fb08 236s | PRF chunk interface PRF HMAC_MD5 0x10450ca0 236s | PRF chunk interface PRF HMAC_MD5 update message (0x10445778 length 50) 236s | dd dd dd dd dd dd dd dd dd dd dd dd dd dd dd dd ................ 236s | dd dd dd dd dd dd dd dd dd dd dd dd dd dd dd dd ................ 236s | dd dd dd dd dd dd dd dd dd dd dd dd dd dd dd dd ................ 236s | dd dd .. 236s | PRF chunk interface PRF HMAC_MD5 final length 16 236s | 56 be 34 52 1d 14 4c 88 db b8 c7 33 f0 e8 b3 f6 V.4R..L....3.... 236s | chunk output 236s | 56 be 34 52 1d 14 4c 88 db b8 c7 33 f0 e8 b3 f6 V.4R..L....3.... 236s | verify_bytes() RFC 2104: MD5_HMAC test 3: prf OUT: ok 236s | CONCATENATE_DATA_AND_BASE: 236s | target: EXTRACT_KEY_FROM_KEY 236s | base: base-key@0x1044d8a8 (16-bytes, AES_KEY_GEN) 236s | params: 8-bytes@0xfff1af90 236s | key-offset: 0, key-size: 16 236s | EXTRACT_KEY_FROM_KEY: 236s | target: EXTRACT_KEY_FROM_KEY 236s | key_size: 16-bytes 236s | base: base-key@0x10450758 (32-bytes, EXTRACT_KEY_FROM_KEY) 236s | operation: FLAGS_ONLY 236s | params: 4-bytes@0xfff1af44 236s | PRF symkey interface PRF HMAC_MD5 init key symkey-key@0x1044fb08 (size 16) 236s | PRF symkey interface: key symkey-key@0x1044fb08 (16-bytes, EXTRACT_KEY_FROM_KEY) 236s | key-offset: 0, key-size: 16 236s | EXTRACT_KEY_FROM_KEY: 236s | target: MD5_HMAC 236s | flags: SIGN 236s | key_size: 16-bytes 236s | base: base-key@0x1044fb08 (16-bytes, EXTRACT_KEY_FROM_KEY) 236s | operation: FLAGS_ONLY 236s | params: 4-bytes@0xfff1af2c 236s | PRF symkey interface prf: created HMAC_MD5 context 0x1044fc60 from key symkey-key@0x10450758 236s | PRF symkey interface prf: begin HMAC_MD5 with context 0x1044fc60 from key symkey-key@0x10450758 236s | PRF symkey interface PRF HMAC_MD5 0x10450b88 236s | CONCATENATE_DATA_AND_BASE: 236s | target: EXTRACT_KEY_FROM_KEY 236s | base: base-key@0x1044d8a8 (16-bytes, AES_KEY_GEN) 236s | params: 8-bytes@0xfff1af90 236s | key-offset: 0, key-size: 50 236s | EXTRACT_KEY_FROM_KEY: 236s | target: EXTRACT_KEY_FROM_KEY 236s | key_size: 50-bytes 236s | base: base-key@0x1044ea78 (66-bytes, EXTRACT_KEY_FROM_KEY) 236s | operation: FLAGS_ONLY 236s | params: 4-bytes@0xfff1af44 236s | PRF symkey interface PRF HMAC_MD5 update symkey message-key@0x10450580 (size 50) 236s | PRF symkey interface: symkey message-key@0x10450580 (50-bytes, EXTRACT_KEY_FROM_KEY) 236s | nss hmac digest hack extracting all 50 bytes of key@0x10450580 236s | nss hmac digest hack: symkey-key@0x10450580 (50-bytes, EXTRACT_KEY_FROM_KEY) 236s | sizeof bytes 64 236s | wrapper: (SECItemType)-939168: 32 a7 fa 0c 38 d5 e4 ae 5f 27 78 ad 56 94 09 0b 32 a7 fa 0c 38 d5 e4 ae 5f 27 78 ad 56 94 09 0b 32 a7 fa 0c 38 d5 e4 ae 5f 27 78 ad 56 94 09 0b ef fb 0e d1 c4 1e 96 e8 9b 93 12 3c fd 3b 16 5c 236s | nss hmac digest hack extracted len 64 bytes at 0x104503f8 236s | unwrapped: 236s | dd dd dd dd dd dd dd dd dd dd dd dd dd dd dd dd ................ 236s | dd dd dd dd dd dd dd dd dd dd dd dd dd dd dd dd ................ 236s | dd dd dd dd dd dd dd dd dd dd dd dd dd dd dd dd ................ 236s | dd dd 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................ 236s | CONCATENATE_DATA_AND_BASE: 236s | target: EXTRACT_KEY_FROM_KEY 236s | base: base-key@0x1044d8a8 (16-bytes, AES_KEY_GEN) 236s | params: 8-bytes@0xfff1af50 236s | key-offset: 0, key-size: 16 236s | EXTRACT_KEY_FROM_KEY: 236s | target: EXTRACT_KEY_FROM_KEY 236s | key_size: 16-bytes 236s | base: base-key@0x1044ea78 (32-bytes, EXTRACT_KEY_FROM_KEY) 236s | operation: FLAGS_ONLY 236s | params: 4-bytes@0xfff1af04 236s | PRF symkey interface PRF HMAC_MD5 final-key@0x10450758 (size 16) 236s | PRF symkey interface: key-key@0x10450758 (16-bytes, EXTRACT_KEY_FROM_KEY) 236s | output: symkey-key@0x10450758 (16-bytes, EXTRACT_KEY_FROM_KEY) 236s | RFC 2104: MD5_HMAC test 3 extracting all 16 bytes of key@0x10450758 236s | RFC 2104: MD5_HMAC test 3: symkey-key@0x10450758 (16-bytes, EXTRACT_KEY_FROM_KEY) 236s | sizeof bytes 16 236s | wrapper: (SECItemType)-939073: a3 1c ee b1 4c 1c 03 5c 24 20 a6 07 10 05 5f 45 236s | RFC 2104: MD5_HMAC test 3 extracted len 16 bytes at 0x10450ca0 236s | unwrapped: 236s | 56 be 34 52 1d 14 4c 88 db b8 c7 33 f0 e8 b3 f6 V.4R..L....3.... 236s | verify_bytes() RFC 2104: MD5_HMAC test 3: symkey: ok 236s ipsec algparse: testing HMAC_SHA1: 236s ipsec algparse: CAVP: IKEv2 key derivation with HMAC-SHA1 236s | decode_to_chunk() test_kdf_vector: input "0x32b50d5f4a3763f3" 236s | decode_to_chunk() output: 236s | 32 b5 0d 5f 4a 37 63 f3 2.._J7c. 236s | decode_to_chunk() test_kdf_vector: input "0x9206a04b26564cb1" 236s | decode_to_chunk() output: 236s | 92 06 a0 4b 26 56 4c b1 ...K&VL. 236s | decode_to_chunk() test_kdf_vector: input "0x34c9e7c188868785" 236s | decode_to_chunk() output: 236s | 34 c9 e7 c1 88 86 87 85 4....... 236s | decode_to_chunk() test_kdf_vector: input "0x3ff77d760d2b2199" 236s | decode_to_chunk() output: 236s | 3f f7 7d 76 0d 2b 21 99 ?.}v.+!. 236s | decode_to_chunk() test_kdf_vector: input "0x4b2c1f971981a8ad8d0abeafabf38cf75fc8349c148142465ed9c8b516b8be52" 236s | decode_to_chunk() output: 236s | 4b 2c 1f 97 19 81 a8 ad 8d 0a be af ab f3 8c f7 K,.............. 236s | 5f c8 34 9c 14 81 42 46 5e d9 c8 b5 16 b8 be 52 _.4...BF^......R 236s | decode_to_chunk() test_kdf_vector: input "0x863f3c9d06efd39d2b907b97f8699e5dd5251ef64a2a176f36ee40c87d4f9330" 236s | decode_to_chunk() output: 236s | 86 3f 3c 9d 06 ef d3 9d 2b 90 7b 97 f8 69 9e 5d .?<.....+.{..i.] 236s | d5 25 1e f6 4a 2a 17 6f 36 ee 40 c8 7d 4f 93 30 .%..J*.o6.@.}O.0 236s | decode_to_chunk() test_kdf_vector: input "0xa9a7b222b59f8f48645f28a1db5b5f5d7479cba7" 236s | decode_to_chunk() output: 236s | a9 a7 b2 22 b5 9f 8f 48 64 5f 28 a1 db 5b 5f 5d ..."...Hd_(..[_] 236s | 74 79 cb a7 ty.. 236s | decode_to_chunk() test_kdf_vector: input "0x63e81194946ebd05df7df5ebf5d8750056bf1f1d" 236s | decode_to_chunk() output: 236s | 63 e8 11 94 94 6e bd 05 df 7d f5 eb f5 d8 75 00 c....n...}....u. 236s | 56 bf 1f 1d V... 236s | decode_to_chunk() test_kdf_vector: input "0xa14293677cc80ff8f9cc0eee30d895da9d8f405666e30ef0dfcb63c634a46002a2a63080e514a062768b76606f9fa5e992204fc5a670bde3f10d6b027113936a5c55b648a194ae587b0088d52204b702c979fa280870d2ed41efa9c549fd11198af1670b143d384bd275c5f594cf266b05ebadca855e4249520a441a81157435a7a56cc4" 236s | decode_to_chunk() output: 236s | a1 42 93 67 7c c8 0f f8 f9 cc 0e ee 30 d8 95 da .B.g|.......0... 236s | 9d 8f 40 56 66 e3 0e f0 df cb 63 c6 34 a4 60 02 ..@Vf.....c.4.`. 236s | a2 a6 30 80 e5 14 a0 62 76 8b 76 60 6f 9f a5 e9 ..0....bv.v`o... 236s | 92 20 4f c5 a6 70 bd e3 f1 0d 6b 02 71 13 93 6a . O..p....k.q..j 236s | 5c 55 b6 48 a1 94 ae 58 7b 00 88 d5 22 04 b7 02 \U.H...X{..."... 236s | c9 79 fa 28 08 70 d2 ed 41 ef a9 c5 49 fd 11 19 .y.(.p..A...I... 236s | 8a f1 67 0b 14 3d 38 4b d2 75 c5 f5 94 cf 26 6b ..g..=8K.u....&k 236s | 05 eb ad ca 85 5e 42 49 52 0a 44 1a 81 15 74 35 .....^BIR.D...t5 236s | a7 a5 6c c4 ..l. 236s | CONCATENATE_DATA_AND_BASE: 236s | target: EXTRACT_KEY_FROM_KEY 236s | base: base-key@0x1044d8a8 (16-bytes, AES_KEY_GEN) 236s | params: 8-bytes@0xfff1afb0 236s | key-offset: 0, key-size: 32 236s | EXTRACT_KEY_FROM_KEY: 236s | target: EXTRACT_KEY_FROM_KEY 236s | key_size: 32-bytes 236s | base: base-key@0x1044fb08 (48-bytes, EXTRACT_KEY_FROM_KEY) 236s | operation: FLAGS_ONLY 236s | params: 4-bytes@0xfff1af64 236s | NSS_IKE_PRF_DERIVE: 236s | target: NSS_IKE_PRF_PLUS_DERIVE 236s | base: base-key@0x10450758 (32-bytes, EXTRACT_KEY_FROM_KEY) 236s | params: 28-bytes@0xfff1af80 236s | CAVP: IKEv2 key derivation with HMAC-SHA1 extracting all 20 bytes of key@0x1044fb08 236s | CAVP: IKEv2 key derivation with HMAC-SHA1: symkey-key@0x1044fb08 (20-bytes, NSS_IKE_PRF_PLUS_DERIVE) 236s | sizeof bytes 32 236s | wrapper: (SECItemType)1634738208: 0a d2 81 8b eb c0 5a fd 4d a7 5d b8 38 27 88 d0 6f 0d 61 76 6b fe 69 c8 74 87 ae 7f 1f ee 93 03 236s | CAVP: IKEv2 key derivation with HMAC-SHA1 extracted len 32 bytes at 0x10450360 236s | unwrapped: 236s | a9 a7 b2 22 b5 9f 8f 48 64 5f 28 a1 db 5b 5f 5d ..."...Hd_(..[_] 236s | 74 79 cb a7 00 00 00 00 00 00 00 00 00 00 00 00 ty.............. 236s | verify_bytes() CAVP: IKEv2 key derivation with HMAC-SHA1: skeyseed: ok 236s | NSS_IKE_PRF_PLUS_DERIVE: 236s | target: EXTRACT_KEY_FROM_KEY 236s | key_size: 132-bytes 236s | base: base-key@0x1044fb08 (20-bytes, NSS_IKE_PRF_PLUS_DERIVE) 236s | params: 20-bytes@0xfff1af58 236s | CAVP: IKEv2 key derivation with HMAC-SHA1 extracting all 132 bytes of key@0x10450580 236s | CAVP: IKEv2 key derivation with HMAC-SHA1: symkey-key@0x10450580 (132-bytes, EXTRACT_KEY_FROM_KEY) 236s | sizeof bytes 144 236s | wrapper: (SECItemType)1226848848: 3f 4e 2e 8d 3e 20 a3 2c 67 d3 0d 72 d9 30 fc 32 9a 2f 66 02 9f 8d 8e 6d 54 7c b3 39 82 2b 73 44 d3 ed 3e a5 9a 9c 08 35 72 e9 40 1c 25 14 fe 62 7c a5 18 b3 4e 56 11 26 b1 de 53 23 3a f7 57 65 d0 5d 70 23 a6 64 65 13 21 2b ee eb 48 6d d3 1a 65 19 35 53 1d 1d 06 b0 86 6e a6 67 99 a8 6a 80 ce 4f f8 ba 87 d0 05 1f 17 f7 b7 c3 04 b1 ab 2c 77 17 1e 52 a1 bb 1c 2c 5d 51 f0 98 76 ad 4f 16 76 21 54 f7 61 1e 61 8c 80 8f 79 df 8c de db 8a 236s | CAVP: IKEv2 key derivation with HMAC-SHA1 extracted len 144 bytes at 0x1044ef08 236s | unwrapped: 236s | a1 42 93 67 7c c8 0f f8 f9 cc 0e ee 30 d8 95 da .B.g|.......0... 236s | 9d 8f 40 56 66 e3 0e f0 df cb 63 c6 34 a4 60 02 ..@Vf.....c.4.`. 236s | a2 a6 30 80 e5 14 a0 62 76 8b 76 60 6f 9f a5 e9 ..0....bv.v`o... 236s | 92 20 4f c5 a6 70 bd e3 f1 0d 6b 02 71 13 93 6a . O..p....k.q..j 236s | 5c 55 b6 48 a1 94 ae 58 7b 00 88 d5 22 04 b7 02 \U.H...X{..."... 236s | c9 79 fa 28 08 70 d2 ed 41 ef a9 c5 49 fd 11 19 .y.(.p..A...I... 236s | 8a f1 67 0b 14 3d 38 4b d2 75 c5 f5 94 cf 26 6b ..g..=8K.u....&k 236s | 05 eb ad ca 85 5e 42 49 52 0a 44 1a 81 15 74 35 .....^BIR.D...t5 236s | a7 a5 6c c4 00 00 00 00 00 00 00 00 00 00 00 00 ..l............. 236s | verify_bytes() CAVP: IKEv2 key derivation with HMAC-SHA1: DKM: ok 236s | key-offset: 0, key-size: 20 236s | EXTRACT_KEY_FROM_KEY: 236s | target: EXTRACT_KEY_FROM_KEY 236s | key_size: 20-bytes 236s | base: base-key@0x10450580 (132-bytes, EXTRACT_KEY_FROM_KEY) 236s | operation: FLAGS_ONLY 236s | params: 4-bytes@0xfff1afbc 236s | CONCATENATE_DATA_AND_BASE: 236s | target: EXTRACT_KEY_FROM_KEY 236s | base: base-key@0x1044d8a8 (16-bytes, AES_KEY_GEN) 236s | params: 8-bytes@0xfff1afb0 236s | key-offset: 0, key-size: 32 236s | EXTRACT_KEY_FROM_KEY: 236s | target: EXTRACT_KEY_FROM_KEY 236s | key_size: 32-bytes 236s | base: base-key@0x10450ad8 (48-bytes, EXTRACT_KEY_FROM_KEY) 236s | operation: FLAGS_ONLY 236s | params: 4-bytes@0xfff1af64 236s | NSS_IKE_PRF_DERIVE: 236s | target: NSS_IKE_PRF_PLUS_DERIVE 236s | base: base-key@0x1044ea78 (20-bytes, EXTRACT_KEY_FROM_KEY) 236s | params: 28-bytes@0xfff1af88 236s | CAVP: IKEv2 key derivation with HMAC-SHA1 extracting all 20 bytes of key@0x10450ad8 236s | CAVP: IKEv2 key derivation with HMAC-SHA1: symkey-key@0x10450ad8 (20-bytes, NSS_IKE_PRF_PLUS_DERIVE) 236s | sizeof bytes 32 236s | wrapper: (SECItemType)1180653893: d0 9b f6 0a 42 d6 f4 d7 4b 7e 18 84 54 81 92 79 ff 52 75 f7 1c 6c b0 59 7d d7 1a f7 10 26 7c b5 236s | CAVP: IKEv2 key derivation with HMAC-SHA1 extracted len 32 bytes at 0x104501d0 236s | unwrapped: 236s | 63 e8 11 94 94 6e bd 05 df 7d f5 eb f5 d8 75 00 c....n...}....u. 236s | 56 bf 1f 1d 00 00 00 00 00 00 00 00 00 00 00 00 V............... 236s | verify_bytes() CAVP: IKEv2 key derivation with HMAC-SHA1: skeyseed_rekey: ok 236s ipsec algparse: leak detective found no leaks 236s /usr/libexec/ipsec/pluto: adjusting nssdir to /tmp/tmp.dzrpLIiHxf 236s /usr/libexec/ipsec/pluto: selftest: skipping lock 236s /usr/libexec/ipsec/pluto: selftest: skipping control socket 236s /usr/libexec/ipsec/pluto: selftest: skipping fork 236s Starting Pluto (Libreswan Version 5.2 IKEv2 IKEv1 XFRM XFRMI esp-hw-offload FORK PTHREAD_SETSCHEDPRIO NSS (IPsec profile) (NSS-KDF) DNSSEC SYSTEMD_WATCHDOG LABELED_IPSEC (SELINUX) LIBCAP_NG LINUX_AUDIT AUTH_PAM NETWORKMANAGER CURL(non-NSS) LDAP(non-NSS) NFTABLES CAT NFLOG) pid:1060 236s operating system: Linux 6.8.0 [Linux 6.8.0-87-generic #88~22.04.1-Ubuntu SMP PREEMPT_DYNAMIC Tue Oct 14 14:00:09 UTC 2 armv7l] 236s core dump dir: /run/pluto 236s secrets file: /etc/ipsec.secrets 236s Initializing NSS using read-only database "sql:/tmp/tmp.dzrpLIiHxf" 236s FIPS Mode: OFF 236s NSS crypto library initialized 236s FIPS mode disabled for pluto daemon 236s FIPS HMAC integrity support [not required] 236s libcap-ng capng_apply failed to apply changes, err=-5. see: man capng_apply 236s libcap-ng support [enabled] 236s Linux audit support [enabled] 236s leak-detective disabled 236s NSS crypto [enabled] 236s XAUTH PAM support [enabled] 236s initializing libevent in pthreads mode: headers: 2.1.12-stable (2010c00); library: 2.1.12-stable (2010c00) 236s NAT-Traversal: keep-alive period 20s 236s ERROR: xfrmi is not supported, failed to create ipsec-interface ipsec1 bound to lo 236s ipsec-interface is not working: xfrmi is not supported 236s IPsec Interface [disabled] 236s refreshed session resume keys, issuing key 1 236s Encryption algorithms: 236s AES_CCM_16 {256,192,*128} IKEv1: ESP IKEv2: ESP FIPS aes_ccm, aes_ccm_c 236s AES_CCM_12 {256,192,*128} IKEv1: ESP IKEv2: ESP FIPS aes_ccm_b 236s AES_CCM_8 {256,192,*128} IKEv1: ESP IKEv2: ESP FIPS aes_ccm_a 236s 3DES_CBC [*192] IKEv1: IKE ESP IKEv2: IKE ESP FIPS NSS(CBC) 3des 236s CAMELLIA_CTR {256,192,*128} IKEv1: ESP IKEv2: ESP 236s CAMELLIA_CBC {256,192,*128} IKEv1: IKE ESP IKEv2: IKE ESP NSS(CBC) camellia 236s AES_GCM_16 {256,192,*128} IKEv1: ESP IKEv2: IKE ESP FIPS NSS(AEAD) aes_gcm, aes_gcm_c 236s AES_GCM_12 {256,192,*128} IKEv1: ESP IKEv2: IKE ESP FIPS NSS(AEAD) aes_gcm_b 236s AES_GCM_8 {256,192,*128} IKEv1: ESP IKEv2: IKE ESP FIPS NSS(AEAD) aes_gcm_a 236s AES_CTR {256,192,*128} IKEv1: IKE ESP IKEv2: IKE ESP FIPS NSS(CTR) aesctr 236s AES_CBC {256,192,*128} IKEv1: IKE ESP IKEv2: IKE ESP FIPS NSS(CBC) aes 236s NULL_AUTH_AES_GMAC {256,192,*128} IKEv1: ESP IKEv2: ESP FIPS aes_gmac 236s NULL [] IKEv1: ESP IKEv2: ESP NULL 236s CHACHA20_POLY1305 [*256] IKEv1: IKEv2: IKE ESP NSS(AEAD) chacha20poly1305 236s Hash algorithms: 236s MD5 IKEv1: IKE IKEv2: NSS 236s SHA1 IKEv1: IKE IKEv2: IKE FIPS NSS sha 236s SHA2_256 IKEv1: IKE IKEv2: IKE FIPS NSS sha2, sha256 236s SHA2_384 IKEv1: IKE IKEv2: IKE FIPS NSS sha384 236s SHA2_512 IKEv1: IKE IKEv2: IKE FIPS NSS sha512 236s IDENTITY IKEv1: IKEv2: FIPS 236s PRF algorithms: 236s HMAC_MD5 IKEv1: IKE IKEv2: IKE NSS md5 236s HMAC_SHA1 IKEv1: IKE IKEv2: IKE FIPS NSS sha, sha1 236s HMAC_SHA2_256 IKEv1: IKE IKEv2: IKE FIPS NSS sha2, sha256, sha2_256 236s HMAC_SHA2_384 IKEv1: IKE IKEv2: IKE FIPS NSS sha384, sha2_384 236s HMAC_SHA2_512 IKEv1: IKE IKEv2: IKE FIPS NSS sha512, sha2_512 236s AES_XCBC IKEv1: IKEv2: IKE native(XCBC) aes128_xcbc 236s Integrity algorithms: 236s HMAC_MD5_96 IKEv1: IKE ESP AH IKEv2: IKE ESP AH NSS md5, hmac_md5 236s HMAC_SHA1_96 IKEv1: IKE ESP AH IKEv2: IKE ESP AH FIPS NSS sha, sha1, sha1_96, hmac_sha1 236s HMAC_SHA2_512_256 IKEv1: IKE ESP AH IKEv2: IKE ESP AH FIPS NSS sha512, sha2_512, sha2_512_256, hmac_sha2_512 236s HMAC_SHA2_384_192 IKEv1: IKE ESP AH IKEv2: IKE ESP AH FIPS NSS sha384, sha2_384, sha2_384_192, hmac_sha2_384 236s HMAC_SHA2_256_128 IKEv1: IKE ESP AH IKEv2: IKE ESP AH FIPS NSS sha2, sha256, sha2_256, sha2_256_128, hmac_sha2_256 236s HMAC_SHA2_256_TRUNCBUG IKEv1: ESP AH IKEv2: AH 236s AES_XCBC_96 IKEv1: ESP AH IKEv2: IKE ESP AH native(XCBC) aes_xcbc, aes128_xcbc, aes128_xcbc_96 236s AES_CMAC_96 IKEv1: ESP AH IKEv2: ESP AH FIPS aes_cmac 236s NONE IKEv1: ESP IKEv2: IKE ESP FIPS null 236s DH algorithms: 236s NONE IKEv1: IKEv2: IKE ESP AH FIPS NSS(MODP) null, dh0 236s MODP1536 IKEv1: IKE ESP AH IKEv2: IKE ESP AH NSS(MODP) dh5 236s MODP2048 IKEv1: IKE ESP AH IKEv2: IKE ESP AH FIPS NSS(MODP) dh14 236s MODP3072 IKEv1: IKE ESP AH IKEv2: IKE ESP AH FIPS NSS(MODP) dh15 236s MODP4096 IKEv1: IKE ESP AH IKEv2: IKE ESP AH FIPS NSS(MODP) dh16 236s MODP6144 IKEv1: IKE ESP AH IKEv2: IKE ESP AH FIPS NSS(MODP) dh17 236s MODP8192 IKEv1: IKE ESP AH IKEv2: IKE ESP AH FIPS NSS(MODP) dh18 236s DH19 IKEv1: IKE IKEv2: IKE ESP AH FIPS NSS(ECP) ecp_256, ecp256 236s DH20 IKEv1: IKE IKEv2: IKE ESP AH FIPS NSS(ECP) ecp_384, ecp384 236s DH21 IKEv1: IKE IKEv2: IKE ESP AH FIPS NSS(ECP) ecp_521, ecp521 236s DH31 IKEv1: IKE IKEv2: IKE ESP AH NSS(ECP) curve25519 236s IPCOMP algorithms: 236s DEFLATE IKEv1: ESP AH IKEv2: ESP AH FIPS 236s LZS IKEv1: IKEv2: ESP AH FIPS 236s LZJH IKEv1: IKEv2: ESP AH FIPS 236s testing CAMELLIA_CBC: 236s Camellia: 16 bytes with 128-bit key 236s Camellia: 16 bytes with 128-bit key 236s Camellia: 16 bytes with 256-bit key 236s Camellia: 16 bytes with 256-bit key 236s testing AES_GCM_16: 236s empty string 236s one block 236s two blocks 236s two blocks with associated data 236s testing AES_CTR: 236s Encrypting 16 octets using AES-CTR with 128-bit key 236s Encrypting 32 octets using AES-CTR with 128-bit key 236s Encrypting 36 octets using AES-CTR with 128-bit key 236s Encrypting 16 octets using AES-CTR with 192-bit key 236s Encrypting 32 octets using AES-CTR with 192-bit key 236s Encrypting 36 octets using AES-CTR with 192-bit key 236s Encrypting 16 octets using AES-CTR with 256-bit key 236s Encrypting 32 octets using AES-CTR with 256-bit key 236s Encrypting 36 octets using AES-CTR with 256-bit key 236s testing AES_CBC: 236s Encrypting 16 bytes (1 block) using AES-CBC with 128-bit key 236s Encrypting 32 bytes (2 blocks) using AES-CBC with 128-bit key 236s Encrypting 48 bytes (3 blocks) using AES-CBC with 128-bit key 236s Encrypting 64 bytes (4 blocks) using AES-CBC with 128-bit key 236s testing AES_XCBC: 236s RFC 3566 Test Case 1: AES-XCBC-MAC-96 with 0-byte input 236s RFC 3566 Test Case 2: AES-XCBC-MAC-96 with 3-byte input 236s RFC 3566 Test Case 3: AES-XCBC-MAC-96 with 16-byte input 236s RFC 3566 Test Case 4: AES-XCBC-MAC-96 with 20-byte input 236s RFC 3566 Test Case 5: AES-XCBC-MAC-96 with 32-byte input 236s RFC 3566 Test Case 6: AES-XCBC-MAC-96 with 34-byte input 236s RFC 3566 Test Case 7: AES-XCBC-MAC-96 with 1000-byte input 236s RFC 4434 Test Case AES-XCBC-PRF-128 with 20-byte input (key length 16) 236s RFC 4434 Test Case AES-XCBC-PRF-128 with 20-byte input (key length 10) 236s RFC 4434 Test Case AES-XCBC-PRF-128 with 20-byte input (key length 18) 236s testing HMAC_MD5: 236s RFC 2104: MD5_HMAC test 1 236s RFC 2104: MD5_HMAC test 2 236s RFC 2104: MD5_HMAC test 3 236s testing HMAC_SHA1: 236s CAVP: IKEv2 key derivation with HMAC-SHA1 236s selftest: exiting pluto 236s autopkgtest [04:31:37]: test cryptocheck: -----------------------] 244s cryptocheck PASS 244s autopkgtest [04:31:45]: test cryptocheck: - - - - - - - - - - results - - - - - - - - - - 248s autopkgtest [04:31:49]: test cavp: preparing testbed 282s autopkgtest [04:32:23]: testbed dpkg architecture: armhf 284s autopkgtest [04:32:25]: testbed apt version: 3.1.14 288s autopkgtest [04:32:29]: @@@@@@@@@@@@@@@@@@@@ test bed setup 290s autopkgtest [04:32:31]: testbed release detected to be: resolute 300s autopkgtest [04:32:41]: updating testbed package index (apt update) 309s Get:1 http://ftpmaster.internal/ubuntu resolute-proposed InRelease [124 kB] 309s Get:2 http://ftpmaster.internal/ubuntu resolute InRelease [124 kB] 309s Hit:3 http://ftpmaster.internal/ubuntu resolute-updates InRelease 309s Hit:4 http://ftpmaster.internal/ubuntu resolute-security InRelease 309s Get:5 http://ftpmaster.internal/ubuntu resolute-proposed/main Sources [269 kB] 309s Get:6 http://ftpmaster.internal/ubuntu resolute-proposed/universe Sources [1270 kB] 309s Get:7 http://ftpmaster.internal/ubuntu resolute-proposed/multiverse Sources [27.8 kB] 309s Get:8 http://ftpmaster.internal/ubuntu resolute-proposed/restricted Sources [5260 B] 309s Get:9 http://ftpmaster.internal/ubuntu resolute-proposed/main armhf Packages [299 kB] 310s Get:10 http://ftpmaster.internal/ubuntu resolute-proposed/universe armhf Packages [1001 kB] 310s Get:11 http://ftpmaster.internal/ubuntu resolute-proposed/multiverse armhf Packages [6868 B] 310s Get:12 http://ftpmaster.internal/ubuntu resolute/multiverse Sources [310 kB] 310s Get:13 http://ftpmaster.internal/ubuntu resolute/universe Sources [21.3 MB] 314s Get:14 http://ftpmaster.internal/ubuntu resolute/main Sources [1404 kB] 314s Get:15 http://ftpmaster.internal/ubuntu resolute/main armhf Packages [1373 kB] 314s Get:16 http://ftpmaster.internal/ubuntu resolute/universe armhf Packages [15.0 MB] 316s Get:17 http://ftpmaster.internal/ubuntu resolute/multiverse armhf Packages [176 kB] 318s Fetched 42.7 MB in 16s (2673 kB/s) 319s Reading package lists... 328s autopkgtest [04:33:09]: upgrading testbed (apt dist-upgrade and autopurge) 329s Reading package lists... 330s Building dependency tree... 330s Reading state information... 330s Calculating upgrade... 331s The following packages will be upgraded: 331s debconf debconf-i18n python3-debconf systemd-hwe-hwdb 331s 4 upgraded, 0 newly installed, 0 to remove and 0 not upgraded. 331s Need to get 360 kB of archives. 331s After this operation, 1024 B of additional disk space will be used. 331s Get:1 http://ftpmaster.internal/ubuntu resolute-proposed/main armhf python3-debconf all 1.5.91build1 [4174 B] 331s Get:2 http://ftpmaster.internal/ubuntu resolute-proposed/main armhf debconf-i18n all 1.5.91build1 [227 kB] 331s Get:3 http://ftpmaster.internal/ubuntu resolute-proposed/main armhf debconf all 1.5.91build1 [126 kB] 331s Get:4 http://ftpmaster.internal/ubuntu resolute/main armhf systemd-hwe-hwdb all 259.0.1 [3152 B] 332s Preconfiguring packages ... 332s Fetched 360 kB in 0s (746 kB/s) 332s (Reading database ... (Reading database ... 5% (Reading database ... 10% (Reading database ... 15% (Reading database ... 20% (Reading database ... 25% (Reading database ... 30% (Reading database ... 35% (Reading database ... 40% (Reading database ... 45% (Reading database ... 50% (Reading database ... 55% (Reading database ... 60% (Reading database ... 65% (Reading database ... 70% (Reading database ... 75% (Reading database ... 80% (Reading database ... 85% (Reading database ... 90% (Reading database ... 95% (Reading database ... 100% (Reading database ... 68394 files and directories currently installed.) 332s Preparing to unpack .../python3-debconf_1.5.91build1_all.deb ... 333s Unpacking python3-debconf (1.5.91build1) over (1.5.91) ... 333s Preparing to unpack .../debconf-i18n_1.5.91build1_all.deb ... 333s Unpacking debconf-i18n (1.5.91build1) over (1.5.91) ... 333s Preparing to unpack .../debconf_1.5.91build1_all.deb ... 333s Unpacking debconf (1.5.91build1) over (1.5.91) ... 333s Setting up debconf (1.5.91build1) ... 333s (Reading database ... (Reading database ... 5% (Reading database ... 10% (Reading database ... 15% (Reading database ... 20% (Reading database ... 25% (Reading database ... 30% (Reading database ... 35% (Reading database ... 40% (Reading database ... 45% (Reading database ... 50% (Reading database ... 55% (Reading database ... 60% (Reading database ... 65% (Reading database ... 70% (Reading database ... 75% (Reading database ... 80% (Reading database ... 85% (Reading database ... 90% (Reading database ... 95% (Reading database ... 100% (Reading database ... 68394 files and directories currently installed.) 333s Preparing to unpack .../systemd-hwe-hwdb_259.0.1_all.deb ... 333s Unpacking systemd-hwe-hwdb (259.0.1) over (257.7.1) ... 333s Setting up python3-debconf (1.5.91build1) ... 333s Setting up debconf-i18n (1.5.91build1) ... 333s Setting up systemd-hwe-hwdb (259.0.1) ... 334s Processing triggers for udev (259-1ubuntu3) ... 334s Processing triggers for man-db (2.13.1-1) ... 340s Reading package lists... 341s Building dependency tree... 341s Reading state information... 341s Solving dependencies... 342s 0 upgraded, 0 newly installed, 0 to remove and 0 not upgraded. 347s autopkgtest [04:33:28]: rebooting testbed after setup commands that affected boot 427s Reading package lists... 428s Building dependency tree... 428s Reading state information... 428s Solving dependencies... 429s The following NEW packages will be installed: 429s dns-root-data libevent-2.1-7t64 libevent-pthreads-2.1-7t64 libldns3t64 429s libnss3-tools libreswan libunbound8 435s 0 upgraded, 7 newly installed, 0 to remove and 0 not upgraded. 435s Need to get 3106 kB of archives. 435s After this operation, 11.3 MB of additional disk space will be used. 435s Get:1 http://ftpmaster.internal/ubuntu resolute/main armhf dns-root-data all 2025080400 [5908 B] 435s Get:2 http://ftpmaster.internal/ubuntu resolute/main armhf libnss3-tools armhf 2:3.120-1 [1041 kB] 436s Get:3 http://ftpmaster.internal/ubuntu resolute/main armhf libevent-pthreads-2.1-7t64 armhf 2.1.12-stable-10build1 [7662 B] 436s Get:4 http://ftpmaster.internal/ubuntu resolute/universe armhf libldns3t64 armhf 1.8.4-2build1 [137 kB] 436s Get:5 http://ftpmaster.internal/ubuntu resolute/main armhf libevent-2.1-7t64 armhf 2.1.12-stable-10build1 [130 kB] 436s Get:6 http://ftpmaster.internal/ubuntu resolute/main armhf libunbound8 armhf 1.24.2-1ubuntu1 [433 kB] 436s Get:7 http://ftpmaster.internal/ubuntu resolute/universe armhf libreswan armhf 5.2-2.2ubuntu1 [1352 kB] 437s Fetched 3106 kB in 7s (424 kB/s) 437s Selecting previously unselected package dns-root-data. 437s (Reading database ... (Reading database ... 5% (Reading database ... 10% (Reading database ... 15% (Reading database ... 20% (Reading database ... 25% (Reading database ... 30% (Reading database ... 35% (Reading database ... 40% (Reading database ... 45% (Reading database ... 50% (Reading database ... 55% (Reading database ... 60% (Reading database ... 65% (Reading database ... 70% (Reading database ... 75% (Reading database ... 80% (Reading database ... 85% (Reading database ... 90% (Reading database ... 95% (Reading database ... 100% (Reading database ... 68395 files and directories currently installed.) 437s Preparing to unpack .../0-dns-root-data_2025080400_all.deb ... 437s Unpacking dns-root-data (2025080400) ... 437s Selecting previously unselected package libnss3-tools. 437s Preparing to unpack .../1-libnss3-tools_2%3a3.120-1_armhf.deb ... 437s Unpacking libnss3-tools (2:3.120-1) ... 437s Selecting previously unselected package libevent-pthreads-2.1-7t64:armhf. 437s Preparing to unpack .../2-libevent-pthreads-2.1-7t64_2.1.12-stable-10build1_armhf.deb ... 437s Unpacking libevent-pthreads-2.1-7t64:armhf (2.1.12-stable-10build1) ... 437s Selecting previously unselected package libldns3t64:armhf. 437s Preparing to unpack .../3-libldns3t64_1.8.4-2build1_armhf.deb ... 437s Unpacking libldns3t64:armhf (1.8.4-2build1) ... 437s Selecting previously unselected package libevent-2.1-7t64:armhf. 437s Preparing to unpack .../4-libevent-2.1-7t64_2.1.12-stable-10build1_armhf.deb ... 437s Unpacking libevent-2.1-7t64:armhf (2.1.12-stable-10build1) ... 437s Selecting previously unselected package libunbound8:armhf. 437s Preparing to unpack .../5-libunbound8_1.24.2-1ubuntu1_armhf.deb ... 437s Unpacking libunbound8:armhf (1.24.2-1ubuntu1) ... 437s Selecting previously unselected package libreswan. 437s Preparing to unpack .../6-libreswan_5.2-2.2ubuntu1_armhf.deb ... 437s Unpacking libreswan (5.2-2.2ubuntu1) ... 437s Setting up libldns3t64:armhf (1.8.4-2build1) ... 437s Setting up libevent-pthreads-2.1-7t64:armhf (2.1.12-stable-10build1) ... 437s Setting up libevent-2.1-7t64:armhf (2.1.12-stable-10build1) ... 437s Setting up dns-root-data (2025080400) ... 437s Setting up libunbound8:armhf (1.24.2-1ubuntu1) ... 437s Setting up libnss3-tools (2:3.120-1) ... 437s Setting up libreswan (5.2-2.2ubuntu1) ... 438s ipsec.service is a disabled or a static unit, not starting it. 438s Processing triggers for man-db (2.13.1-1) ... 439s Processing triggers for libc-bin (2.42-2ubuntu4) ... 464s autopkgtest [04:35:25]: test cavp: [----------------------- 469s Testing installed CAVP binary: /usr/libexec/ipsec/cavp 473s test: IKE v2 473s Reading from ikev2.fax 480s test: IKE v1 Digital Signature Authentication 480s Reading from ikev1_dsa.fax 485s test: IKE v1 Pre-shared Key Authentication 485s Reading from ikev1_psk.fax 490s /tmp/autopkgtest.RnUtvb/build.vgq/src 490s autopkgtest [04:35:51]: test cavp: -----------------------] 496s autopkgtest [04:35:57]: test cavp: - - - - - - - - - - results - - - - - - - - - - 496s cavp PASS 501s autopkgtest [04:36:02]: @@@@@@@@@@@@@@@@@@@@ summary 501s opportunistic SKIP Test restriction "isolation-machine" requires testbed capability "isolation-machine" 501s opportunistic SKIP Test restriction "isolation-machine" requires testbed capability "isolation-machine" 501s cryptocheck PASS 501s cavp PASS