0s autopkgtest [03:35:38]: starting date and time: 2026-02-03 03:35:38+0000 0s autopkgtest [03:35:38]: git checkout: 4b346b80 nova: make wait_reboot return success even when a no-op 0s autopkgtest [03:35:38]: host juju-7f2275-prod-proposed-migration-environment-20; command line: /home/ubuntu/autopkgtest/runner/autopkgtest --output-dir /tmp/autopkgtest-work.8r96dbnp/out --timeout-copy=6000 --needs-internet=try --setup-commands /home/ubuntu/autopkgtest-cloud/worker-config-production/setup-canonical.sh --apt-pocket=proposed=src:ca-certificates --apt-upgrade libreswan --timeout-short=300 --timeout-copy=20000 --timeout-build=20000 --env=ADT_TEST_TRIGGERS=ca-certificates/20250419build1 -- ssh -s /home/ubuntu/autopkgtest/ssh-setup/nova -- --flavor autopkgtest-cpu2-ram4-disk20-ppc64el --security-groups autopkgtest-juju-7f2275-prod-proposed-migration-environment-20@sto01-ppc64el-25.secgroup --name adt-resolute-ppc64el-libreswan-20260203-032001-juju-7f2275-prod-proposed-migration-environment-20-23c6b79a-6493-4ecf-b00d-3b3e7b59ad49 --image adt/ubuntu-resolute-ppc64el-server --keyname testbed-juju-7f2275-prod-proposed-migration-environment-20 --net-id=net_prod-autopkgtest-workers-ppc64el -e TERM=linux --mirror=http://ftpmaster.internal/ubuntu/ 3s Creating nova instance adt-resolute-ppc64el-libreswan-20260203-032001-juju-7f2275-prod-proposed-migration-environment-20-23c6b79a-6493-4ecf-b00d-3b3e7b59ad49 from image adt/ubuntu-resolute-ppc64el-server-20260202.img (UUID ca98045c-2f99-4634-a243-9d47350236de)... 48s autopkgtest [03:36:26]: testbed dpkg architecture: ppc64el 49s autopkgtest [03:36:27]: testbed apt version: 3.1.14 49s autopkgtest [03:36:27]: @@@@@@@@@@@@@@@@@@@@ test bed setup 49s autopkgtest [03:36:27]: testbed release detected to be: None 50s autopkgtest [03:36:28]: updating testbed package index (apt update) 50s Get:1 http://ftpmaster.internal/ubuntu resolute-proposed InRelease [124 kB] 50s Hit:2 http://ftpmaster.internal/ubuntu resolute InRelease 50s Hit:3 http://ftpmaster.internal/ubuntu resolute-updates InRelease 50s Hit:4 http://ftpmaster.internal/ubuntu resolute-security InRelease 50s Get:5 http://ftpmaster.internal/ubuntu resolute-proposed/main Sources [271 kB] 50s Get:6 http://ftpmaster.internal/ubuntu resolute-proposed/restricted Sources [5256 B] 50s Get:7 http://ftpmaster.internal/ubuntu resolute-proposed/universe Sources [1275 kB] 51s Get:8 http://ftpmaster.internal/ubuntu resolute-proposed/multiverse Sources [28.4 kB] 51s Get:9 http://ftpmaster.internal/ubuntu resolute-proposed/main ppc64el Packages [298 kB] 51s Get:10 http://ftpmaster.internal/ubuntu resolute-proposed/universe ppc64el Packages [1081 kB] 51s Get:11 http://ftpmaster.internal/ubuntu resolute-proposed/multiverse ppc64el Packages [18.6 kB] 51s Fetched 3101 kB in 1s (3846 kB/s) 52s Reading package lists... 52s Hit:1 http://ftpmaster.internal/ubuntu resolute-proposed InRelease 52s Hit:2 http://ftpmaster.internal/ubuntu resolute InRelease 52s Hit:3 http://ftpmaster.internal/ubuntu resolute-updates InRelease 52s Hit:4 http://ftpmaster.internal/ubuntu resolute-security InRelease 53s Reading package lists... 53s Reading package lists... 53s Building dependency tree... 53s Reading state information... 53s Calculating upgrade... 54s The following packages will be upgraded: 54s ca-certificates cloud-init cloud-init-base libexpat1 liblocale-gettext-perl 54s 5 upgraded, 0 newly installed, 0 to remove and 0 not upgraded. 54s Need to get 912 kB of archives. 54s After this operation, 1024 B of additional disk space will be used. 54s Get:1 http://ftpmaster.internal/ubuntu resolute/main ppc64el libexpat1 ppc64el 2.7.4-1 [106 kB] 54s Get:2 http://ftpmaster.internal/ubuntu resolute/main ppc64el liblocale-gettext-perl ppc64el 1.07-8 [16.3 kB] 54s Get:3 http://ftpmaster.internal/ubuntu resolute-proposed/main ppc64el ca-certificates all 20250419build1 [163 kB] 54s Get:4 http://ftpmaster.internal/ubuntu resolute/main ppc64el cloud-init-base all 25.4~4g26c7d38d-0ubuntu1 [624 kB] 54s Get:5 http://ftpmaster.internal/ubuntu resolute/main ppc64el cloud-init all 25.4~4g26c7d38d-0ubuntu1 [2120 B] 54s dpkg-preconfigure: unable to re-open stdin: No such file or directory 54s Fetched 912 kB in 0s (5957 kB/s) 54s (Reading database ... (Reading database ... 5% (Reading database ... 10% (Reading database ... 15% (Reading database ... 20% (Reading database ... 25% (Reading database ... 30% (Reading database ... 35% (Reading database ... 40% (Reading database ... 45% (Reading database ... 50% (Reading database ... 55% (Reading database ... 60% (Reading database ... 65% (Reading database ... 70% (Reading database ... 75% (Reading database ... 80% (Reading database ... 85% (Reading database ... 90% (Reading database ... 95% (Reading database ... 100% (Reading database ... 82007 files and directories currently installed.) 54s Preparing to unpack .../libexpat1_2.7.4-1_ppc64el.deb ... 54s Unpacking libexpat1:ppc64el (2.7.4-1) over (2.7.3-1) ... 54s Preparing to unpack .../liblocale-gettext-perl_1.07-8_ppc64el.deb ... 54s Unpacking liblocale-gettext-perl (1.07-8) over (1.07-7build1) ... 54s Preparing to unpack .../ca-certificates_20250419build1_all.deb ... 54s Unpacking ca-certificates (20250419build1) over (20250419) ... 54s Preparing to unpack .../cloud-init-base_25.4~4g26c7d38d-0ubuntu1_all.deb ... 55s Unpacking cloud-init-base (25.4~4g26c7d38d-0ubuntu1) over (25.4~3g78f6f15e-0ubuntu1) ... 55s Preparing to unpack .../cloud-init_25.4~4g26c7d38d-0ubuntu1_all.deb ... 55s Unpacking cloud-init (25.4~4g26c7d38d-0ubuntu1) over (25.4~3g78f6f15e-0ubuntu1) ... 55s Setting up libexpat1:ppc64el (2.7.4-1) ... 55s Setting up cloud-init-base (25.4~4g26c7d38d-0ubuntu1) ... 55s Clearing ignored debconf value cloud-init/datasources 55s Encountered debconf setting for cloud-init-base/datasources. 57s Setting up ca-certificates (20250419build1) ... 58s Updating certificates in /etc/ssl/certs... 59s 0 added, 0 removed; done. 59s Setting up liblocale-gettext-perl (1.07-8) ... 59s Setting up cloud-init (25.4~4g26c7d38d-0ubuntu1) ... 59s Processing triggers for rsyslog (8.2512.0-1ubuntu2) ... 60s Processing triggers for man-db (2.13.1-1) ... 61s Processing triggers for libc-bin (2.42-2ubuntu4) ... 61s Processing triggers for ca-certificates (20250419build1) ... 61s Updating certificates in /etc/ssl/certs... 61s 0 added, 0 removed; done. 61s Running hooks in /etc/ca-certificates/update.d... 61s done. 62s autopkgtest [03:36:40]: upgrading testbed (apt dist-upgrade and autopurge) 62s Reading package lists... 62s Building dependency tree... 62s Reading state information... 62s Calculating upgrade... 62s 0 upgraded, 0 newly installed, 0 to remove and 0 not upgraded. 62s Reading package lists... 62s Building dependency tree... 62s Reading state information... 62s Solving dependencies... 63s 0 upgraded, 0 newly installed, 0 to remove and 0 not upgraded. 63s autopkgtest [03:36:41]: rebooting testbed after setup commands that affected boot 100s autopkgtest [03:37:18]: testbed running kernel: Linux 6.18.0-9-generic #9-Ubuntu SMP PREEMPT_DYNAMIC Mon Jan 12 16:45:54 UTC 2026 102s autopkgtest [03:37:20]: @@@@@@@@@@@@@@@@@@@@ apt-source libreswan 104s Get:1 http://ftpmaster.internal/ubuntu resolute/universe libreswan 5.2-2.2ubuntu1 (dsc) [2735 B] 104s Get:2 http://ftpmaster.internal/ubuntu resolute/universe libreswan 5.2-2.2ubuntu1 (tar) [4132 kB] 104s Get:3 http://ftpmaster.internal/ubuntu resolute/universe libreswan 5.2-2.2ubuntu1 (asc) [862 B] 104s Get:4 http://ftpmaster.internal/ubuntu resolute/universe libreswan 5.2-2.2ubuntu1 (diff) [16.7 kB] 104s gpgv: Signature made Thu Jul 31 14:30:12 2025 UTC 104s gpgv: using RSA key 25E3FF2D7F469DBE7D0D4E50AFCFEC8E669CE1C2 104s gpgv: Can't check signature: No public key 104s dpkg-source: warning: cannot verify inline signature for ./libreswan_5.2-2.2ubuntu1.dsc: no acceptable signature found 105s autopkgtest [03:37:23]: testing package libreswan version 5.2-2.2ubuntu1 105s autopkgtest [03:37:23]: build not needed 107s autopkgtest [03:37:25]: test opportunistic: preparing testbed 107s Reading package lists... 107s Building dependency tree... 107s Reading state information... 107s Solving dependencies... 107s The following NEW packages will be installed: 107s dns-root-data libevent-2.1-7t64 libevent-pthreads-2.1-7t64 libldns3t64 107s libnss3-tools libreswan libunbound8 107s 0 upgraded, 7 newly installed, 0 to remove and 0 not upgraded. 107s Need to get 3283 kB of archives. 107s After this operation, 15.4 MB of additional disk space will be used. 107s Get:1 http://ftpmaster.internal/ubuntu resolute/main ppc64el dns-root-data all 2025080400 [5908 B] 107s Get:2 http://ftpmaster.internal/ubuntu resolute/main ppc64el libnss3-tools ppc64el 2:3.120-1 [744 kB] 108s Get:3 http://ftpmaster.internal/ubuntu resolute/main ppc64el libevent-pthreads-2.1-7t64 ppc64el 2.1.12-stable-10build1 [8140 B] 108s Get:4 http://ftpmaster.internal/ubuntu resolute/universe ppc64el libldns3t64 ppc64el 1.8.4-2build1 [200 kB] 108s Get:5 http://ftpmaster.internal/ubuntu resolute/main ppc64el libevent-2.1-7t64 ppc64el 2.1.12-stable-10build1 [172 kB] 108s Get:6 http://ftpmaster.internal/ubuntu resolute/main ppc64el libunbound8 ppc64el 1.24.2-1ubuntu1 [576 kB] 108s Get:7 http://ftpmaster.internal/ubuntu resolute/universe ppc64el libreswan ppc64el 5.2-2.2ubuntu1 [1577 kB] 108s Fetched 3283 kB in 0s (8019 kB/s) 108s Selecting previously unselected package dns-root-data. 108s (Reading database ... (Reading database ... 5% (Reading database ... 10% (Reading database ... 15% (Reading database ... 20% (Reading database ... 25% (Reading database ... 30% (Reading database ... 35% (Reading database ... 40% (Reading database ... 45% (Reading database ... 50% (Reading database ... 55% (Reading database ... 60% (Reading database ... 65% (Reading database ... 70% (Reading database ... 75% (Reading database ... 80% (Reading database ... 85% (Reading database ... 90% (Reading database ... 95% (Reading database ... 100% (Reading database ... 82007 files and directories currently installed.) 108s Preparing to unpack .../0-dns-root-data_2025080400_all.deb ... 108s Unpacking dns-root-data (2025080400) ... 108s Selecting previously unselected package libnss3-tools. 108s Preparing to unpack .../1-libnss3-tools_2%3a3.120-1_ppc64el.deb ... 108s Unpacking libnss3-tools (2:3.120-1) ... 108s Selecting previously unselected package libevent-pthreads-2.1-7t64:ppc64el. 108s Preparing to unpack .../2-libevent-pthreads-2.1-7t64_2.1.12-stable-10build1_ppc64el.deb ... 108s Unpacking libevent-pthreads-2.1-7t64:ppc64el (2.1.12-stable-10build1) ... 108s Selecting previously unselected package libldns3t64:ppc64el. 108s Preparing to unpack .../3-libldns3t64_1.8.4-2build1_ppc64el.deb ... 108s Unpacking libldns3t64:ppc64el (1.8.4-2build1) ... 108s Selecting previously unselected package libevent-2.1-7t64:ppc64el. 108s Preparing to unpack .../4-libevent-2.1-7t64_2.1.12-stable-10build1_ppc64el.deb ... 108s Unpacking libevent-2.1-7t64:ppc64el (2.1.12-stable-10build1) ... 108s Selecting previously unselected package libunbound8:ppc64el. 108s Preparing to unpack .../5-libunbound8_1.24.2-1ubuntu1_ppc64el.deb ... 108s Unpacking libunbound8:ppc64el (1.24.2-1ubuntu1) ... 108s Selecting previously unselected package libreswan. 108s Preparing to unpack .../6-libreswan_5.2-2.2ubuntu1_ppc64el.deb ... 108s Unpacking libreswan (5.2-2.2ubuntu1) ... 108s Setting up libldns3t64:ppc64el (1.8.4-2build1) ... 108s Setting up libevent-pthreads-2.1-7t64:ppc64el (2.1.12-stable-10build1) ... 108s Setting up libevent-2.1-7t64:ppc64el (2.1.12-stable-10build1) ... 108s Setting up dns-root-data (2025080400) ... 108s Setting up libunbound8:ppc64el (1.24.2-1ubuntu1) ... 108s Setting up libnss3-tools (2:3.120-1) ... 108s Setting up libreswan (5.2-2.2ubuntu1) ... 109s ipsec.service is a disabled or a static unit, not starting it. 109s Processing triggers for man-db (2.13.1-1) ... 110s Processing triggers for libc-bin (2.42-2ubuntu4) ... 111s autopkgtest [03:37:29]: test opportunistic: [----------------------- 111s ping: oe.libreswan.org: No address associated with hostname 112s autopkgtest [03:37:30]: test opportunistic: -----------------------] 112s opportunistic SKIP exit status 77 and marked as skippable 112s autopkgtest [03:37:30]: test opportunistic: - - - - - - - - - - results - - - - - - - - - - 112s autopkgtest [03:37:30]: test cryptocheck: preparing testbed 119s Creating nova instance adt-resolute-ppc64el-libreswan-20260203-032001-juju-7f2275-prod-proposed-migration-environment-20-23c6b79a-6493-4ecf-b00d-3b3e7b59ad49 from image adt/ubuntu-resolute-ppc64el-server-20260202.img (UUID ca98045c-2f99-4634-a243-9d47350236de)... 164s autopkgtest [03:38:22]: testbed dpkg architecture: ppc64el 164s autopkgtest [03:38:22]: testbed apt version: 3.1.14 164s autopkgtest [03:38:22]: @@@@@@@@@@@@@@@@@@@@ test bed setup 165s autopkgtest [03:38:23]: testbed release detected to be: resolute 165s autopkgtest [03:38:23]: updating testbed package index (apt update) 165s Get:1 http://ftpmaster.internal/ubuntu resolute-proposed InRelease [124 kB] 165s Hit:2 http://ftpmaster.internal/ubuntu resolute InRelease 165s Hit:3 http://ftpmaster.internal/ubuntu resolute-updates InRelease 166s Hit:4 http://ftpmaster.internal/ubuntu resolute-security InRelease 166s Get:5 http://ftpmaster.internal/ubuntu resolute-proposed/restricted Sources [5256 B] 166s Get:6 http://ftpmaster.internal/ubuntu resolute-proposed/multiverse Sources [28.4 kB] 166s Get:7 http://ftpmaster.internal/ubuntu resolute-proposed/universe Sources [1275 kB] 166s Get:8 http://ftpmaster.internal/ubuntu resolute-proposed/main Sources [271 kB] 166s Get:9 http://ftpmaster.internal/ubuntu resolute-proposed/main ppc64el Packages [298 kB] 166s Get:10 http://ftpmaster.internal/ubuntu resolute-proposed/universe ppc64el Packages [1081 kB] 166s Get:11 http://ftpmaster.internal/ubuntu resolute-proposed/multiverse ppc64el Packages [18.6 kB] 166s Fetched 3101 kB in 1s (5069 kB/s) 167s Reading package lists... 167s Hit:1 http://ftpmaster.internal/ubuntu resolute-proposed InRelease 167s Hit:2 http://ftpmaster.internal/ubuntu resolute InRelease 167s Hit:3 http://ftpmaster.internal/ubuntu resolute-updates InRelease 167s Hit:4 http://ftpmaster.internal/ubuntu resolute-security InRelease 168s Reading package lists... 168s Reading package lists... 168s Building dependency tree... 168s Reading state information... 169s Calculating upgrade... 169s The following packages will be upgraded: 169s ca-certificates cloud-init cloud-init-base libexpat1 liblocale-gettext-perl 169s 5 upgraded, 0 newly installed, 0 to remove and 0 not upgraded. 169s Need to get 912 kB of archives. 169s After this operation, 1024 B of additional disk space will be used. 169s Get:1 http://ftpmaster.internal/ubuntu resolute/main ppc64el libexpat1 ppc64el 2.7.4-1 [106 kB] 169s Get:2 http://ftpmaster.internal/ubuntu resolute/main ppc64el liblocale-gettext-perl ppc64el 1.07-8 [16.3 kB] 169s Get:3 http://ftpmaster.internal/ubuntu resolute-proposed/main ppc64el ca-certificates all 20250419build1 [163 kB] 169s Get:4 http://ftpmaster.internal/ubuntu resolute/main ppc64el cloud-init-base all 25.4~4g26c7d38d-0ubuntu1 [624 kB] 169s Get:5 http://ftpmaster.internal/ubuntu resolute/main ppc64el cloud-init all 25.4~4g26c7d38d-0ubuntu1 [2120 B] 169s dpkg-preconfigure: unable to re-open stdin: No such file or directory 169s Fetched 912 kB in 0s (16.1 MB/s) 169s (Reading database ... (Reading database ... 5% (Reading database ... 10% (Reading database ... 15% (Reading database ... 20% (Reading database ... 25% (Reading database ... 30% (Reading database ... 35% (Reading database ... 40% (Reading database ... 45% (Reading database ... 50% (Reading database ... 55% (Reading database ... 60% (Reading database ... 65% (Reading database ... 70% (Reading database ... 75% (Reading database ... 80% (Reading database ... 85% (Reading database ... 90% (Reading database ... 95% (Reading database ... 100% (Reading database ... 82007 files and directories currently installed.) 169s Preparing to unpack .../libexpat1_2.7.4-1_ppc64el.deb ... 169s Unpacking libexpat1:ppc64el (2.7.4-1) over (2.7.3-1) ... 169s Preparing to unpack .../liblocale-gettext-perl_1.07-8_ppc64el.deb ... 169s Unpacking liblocale-gettext-perl (1.07-8) over (1.07-7build1) ... 169s Preparing to unpack .../ca-certificates_20250419build1_all.deb ... 169s Unpacking ca-certificates (20250419build1) over (20250419) ... 170s Preparing to unpack .../cloud-init-base_25.4~4g26c7d38d-0ubuntu1_all.deb ... 170s Unpacking cloud-init-base (25.4~4g26c7d38d-0ubuntu1) over (25.4~3g78f6f15e-0ubuntu1) ... 170s Preparing to unpack .../cloud-init_25.4~4g26c7d38d-0ubuntu1_all.deb ... 170s Unpacking cloud-init (25.4~4g26c7d38d-0ubuntu1) over (25.4~3g78f6f15e-0ubuntu1) ... 170s Setting up libexpat1:ppc64el (2.7.4-1) ... 170s Setting up cloud-init-base (25.4~4g26c7d38d-0ubuntu1) ... 171s Clearing ignored debconf value cloud-init/datasources 171s Encountered debconf setting for cloud-init-base/datasources. 172s Setting up ca-certificates (20250419build1) ... 174s Updating certificates in /etc/ssl/certs... 175s 0 added, 0 removed; done. 175s Setting up liblocale-gettext-perl (1.07-8) ... 175s Setting up cloud-init (25.4~4g26c7d38d-0ubuntu1) ... 175s Processing triggers for rsyslog (8.2512.0-1ubuntu2) ... 175s Processing triggers for man-db (2.13.1-1) ... 177s Processing triggers for libc-bin (2.42-2ubuntu4) ... 177s Processing triggers for ca-certificates (20250419build1) ... 177s Updating certificates in /etc/ssl/certs... 178s 0 added, 0 removed; done. 178s Running hooks in /etc/ca-certificates/update.d... 178s done. 178s autopkgtest [03:38:36]: upgrading testbed (apt dist-upgrade and autopurge) 178s Reading package lists... 178s Building dependency tree... 178s Reading state information... 178s Calculating upgrade... 178s 0 upgraded, 0 newly installed, 0 to remove and 0 not upgraded. 179s Reading package lists... 179s Building dependency tree... 179s Reading state information... 179s Solving dependencies... 179s 0 upgraded, 0 newly installed, 0 to remove and 0 not upgraded. 179s autopkgtest [03:38:37]: rebooting testbed after setup commands that affected boot 220s Reading package lists... 220s Building dependency tree... 220s Reading state information... 220s Solving dependencies... 220s The following NEW packages will be installed: 220s dns-root-data libevent-2.1-7t64 libevent-pthreads-2.1-7t64 libldns3t64 220s libnss3-tools libreswan libunbound8 220s 0 upgraded, 7 newly installed, 0 to remove and 0 not upgraded. 220s Need to get 3283 kB of archives. 220s After this operation, 15.4 MB of additional disk space will be used. 220s Get:1 http://ftpmaster.internal/ubuntu resolute/main ppc64el dns-root-data all 2025080400 [5908 B] 220s Get:2 http://ftpmaster.internal/ubuntu resolute/main ppc64el libnss3-tools ppc64el 2:3.120-1 [744 kB] 220s Get:3 http://ftpmaster.internal/ubuntu resolute/main ppc64el libevent-pthreads-2.1-7t64 ppc64el 2.1.12-stable-10build1 [8140 B] 220s Get:4 http://ftpmaster.internal/ubuntu resolute/universe ppc64el libldns3t64 ppc64el 1.8.4-2build1 [200 kB] 220s Get:5 http://ftpmaster.internal/ubuntu resolute/main ppc64el libevent-2.1-7t64 ppc64el 2.1.12-stable-10build1 [172 kB] 220s Get:6 http://ftpmaster.internal/ubuntu resolute/main ppc64el libunbound8 ppc64el 1.24.2-1ubuntu1 [576 kB] 220s Get:7 http://ftpmaster.internal/ubuntu resolute/universe ppc64el libreswan ppc64el 5.2-2.2ubuntu1 [1577 kB] 221s Fetched 3283 kB in 0s (12.6 MB/s) 221s Selecting previously unselected package dns-root-data. 221s (Reading database ... (Reading database ... 5% (Reading database ... 10% (Reading database ... 15% (Reading database ... 20% (Reading database ... 25% (Reading database ... 30% (Reading database ... 35% (Reading database ... 40% (Reading database ... 45% (Reading database ... 50% (Reading database ... 55% (Reading database ... 60% (Reading database ... 65% (Reading database ... 70% (Reading database ... 75% (Reading database ... 80% (Reading database ... 85% (Reading database ... 90% (Reading database ... 95% (Reading database ... 100% (Reading database ... 82007 files and directories currently installed.) 221s Preparing to unpack .../0-dns-root-data_2025080400_all.deb ... 221s Unpacking dns-root-data (2025080400) ... 221s Selecting previously unselected package libnss3-tools. 221s Preparing to unpack .../1-libnss3-tools_2%3a3.120-1_ppc64el.deb ... 221s Unpacking libnss3-tools (2:3.120-1) ... 221s Selecting previously unselected package libevent-pthreads-2.1-7t64:ppc64el. 221s Preparing to unpack .../2-libevent-pthreads-2.1-7t64_2.1.12-stable-10build1_ppc64el.deb ... 221s Unpacking libevent-pthreads-2.1-7t64:ppc64el (2.1.12-stable-10build1) ... 221s Selecting previously unselected package libldns3t64:ppc64el. 221s Preparing to unpack .../3-libldns3t64_1.8.4-2build1_ppc64el.deb ... 221s Unpacking libldns3t64:ppc64el (1.8.4-2build1) ... 221s Selecting previously unselected package libevent-2.1-7t64:ppc64el. 221s Preparing to unpack .../4-libevent-2.1-7t64_2.1.12-stable-10build1_ppc64el.deb ... 221s Unpacking libevent-2.1-7t64:ppc64el (2.1.12-stable-10build1) ... 221s Selecting previously unselected package libunbound8:ppc64el. 221s Preparing to unpack .../5-libunbound8_1.24.2-1ubuntu1_ppc64el.deb ... 221s Unpacking libunbound8:ppc64el (1.24.2-1ubuntu1) ... 221s Selecting previously unselected package libreswan. 221s Preparing to unpack .../6-libreswan_5.2-2.2ubuntu1_ppc64el.deb ... 221s Unpacking libreswan (5.2-2.2ubuntu1) ... 221s Setting up libldns3t64:ppc64el (1.8.4-2build1) ... 221s Setting up libevent-pthreads-2.1-7t64:ppc64el (2.1.12-stable-10build1) ... 221s Setting up libevent-2.1-7t64:ppc64el (2.1.12-stable-10build1) ... 221s Setting up dns-root-data (2025080400) ... 221s Setting up libunbound8:ppc64el (1.24.2-1ubuntu1) ... 221s Setting up libnss3-tools (2:3.120-1) ... 221s Setting up libreswan (5.2-2.2ubuntu1) ... 222s ipsec.service is a disabled or a static unit, not starting it. 222s Processing triggers for man-db (2.13.1-1) ... 223s Processing triggers for libc-bin (2.42-2ubuntu4) ... 229s autopkgtest [03:39:27]: test cryptocheck: [----------------------- 229s Testing installed binary: /usr/libexec/ipsec/algparse 229s Testing installed binary: /usr/libexec/ipsec/pluto 229s testing -tp 229s ipsec algparse: Encryption algorithms: 229s ipsec algparse: AES_CCM_16 {256,192,*128} IKEv1: ESP IKEv2: ESP FIPS aes_ccm, aes_ccm_c 229s ipsec algparse: AES_CCM_12 {256,192,*128} IKEv1: ESP IKEv2: ESP FIPS aes_ccm_b 229s ipsec algparse: AES_CCM_8 {256,192,*128} IKEv1: ESP IKEv2: ESP FIPS aes_ccm_a 229s ipsec algparse: 3DES_CBC [*192] IKEv1: IKE ESP IKEv2: IKE ESP FIPS NSS(CBC) 3des 229s ipsec algparse: CAMELLIA_CTR {256,192,*128} IKEv1: ESP IKEv2: ESP 229s ipsec algparse: CAMELLIA_CBC {256,192,*128} IKEv1: IKE ESP IKEv2: IKE ESP NSS(CBC) camellia 229s ipsec algparse: AES_GCM_16 {256,192,*128} IKEv1: ESP IKEv2: IKE ESP FIPS NSS(AEAD) aes_gcm, aes_gcm_c 229s ipsec algparse: AES_GCM_12 {256,192,*128} IKEv1: ESP IKEv2: IKE ESP FIPS NSS(AEAD) aes_gcm_b 229s ipsec algparse: AES_GCM_8 {256,192,*128} IKEv1: ESP IKEv2: IKE ESP FIPS NSS(AEAD) aes_gcm_a 229s ipsec algparse: AES_CTR {256,192,*128} IKEv1: IKE ESP IKEv2: IKE ESP FIPS NSS(CTR) aesctr 229s ipsec algparse: AES_CBC {256,192,*128} IKEv1: IKE ESP IKEv2: IKE ESP FIPS NSS(CBC) aes 229s ipsec algparse: NULL_AUTH_AES_GMAC {256,192,*128} IKEv1: ESP IKEv2: ESP FIPS aes_gmac 229s ipsec algparse: NULL [] IKEv1: ESP IKEv2: ESP NULL 229s ipsec algparse: CHACHA20_POLY1305 [*256] IKEv1: IKEv2: IKE ESP NSS(AEAD) chacha20poly1305 229s ipsec algparse: Hash algorithms: 229s ipsec algparse: MD5 IKEv1: IKE IKEv2: NSS 229s ipsec algparse: SHA1 IKEv1: IKE IKEv2: IKE FIPS NSS sha 229s ipsec algparse: SHA2_256 IKEv1: IKE IKEv2: IKE FIPS NSS sha2, sha256 229s ipsec algparse: SHA2_384 IKEv1: IKE IKEv2: IKE FIPS NSS sha384 229s ipsec algparse: SHA2_512 IKEv1: IKE IKEv2: IKE FIPS NSS sha512 229s ipsec algparse: IDENTITY IKEv1: IKEv2: FIPS 229s ipsec algparse: PRF algorithms: 229s ipsec algparse: HMAC_MD5 IKEv1: IKE IKEv2: IKE NSS md5 229s ipsec algparse: HMAC_SHA1 IKEv1: IKE IKEv2: IKE FIPS NSS sha, sha1 229s ipsec algparse: HMAC_SHA2_256 IKEv1: IKE IKEv2: IKE FIPS NSS sha2, sha256, sha2_256 229s ipsec algparse: HMAC_SHA2_384 IKEv1: IKE IKEv2: IKE FIPS NSS sha384, sha2_384 229s ipsec algparse: HMAC_SHA2_512 IKEv1: IKE IKEv2: IKE FIPS NSS sha512, sha2_512 229s ipsec algparse: AES_XCBC IKEv1: IKEv2: IKE native(XCBC) aes128_xcbc 229s ipsec algparse: Integrity algorithms: 229s ipsec algparse: HMAC_MD5_96 IKEv1: IKE ESP AH IKEv2: IKE ESP AH NSS md5, hmac_md5 229s ipsec algparse: HMAC_SHA1_96 IKEv1: IKE ESP AH IKEv2: IKE ESP AH FIPS NSS sha, sha1, sha1_96, hmac_sha1 229s ipsec algparse: HMAC_SHA2_512_256 IKEv1: IKE ESP AH IKEv2: IKE ESP AH FIPS NSS sha512, sha2_512, sha2_512_256, hmac_sha2_512 229s ipsec algparse: HMAC_SHA2_384_192 IKEv1: IKE ESP AH IKEv2: IKE ESP AH FIPS NSS sha384, sha2_384, sha2_384_192, hmac_sha2_384 229s ipsec algparse: HMAC_SHA2_256_128 IKEv1: IKE ESP AH IKEv2: IKE ESP AH FIPS NSS sha2, sha256, sha2_256, sha2_256_128, hmac_sha2_256 229s ipsec algparse: HMAC_SHA2_256_TRUNCBUG IKEv1: ESP AH IKEv2: AH 229s ipsec algparse: AES_XCBC_96 IKEv1: ESP AH IKEv2: IKE ESP AH native(XCBC) aes_xcbc, aes128_xcbc, aes128_xcbc_96 229s ipsec algparse: AES_CMAC_96 IKEv1: ESP AH IKEv2: ESP AH FIPS aes_cmac 229s ipsec algparse: NONE IKEv1: ESP IKEv2: IKE ESP FIPS null 229s ipsec algparse: DH algorithms: 229s ipsec algparse: NONE IKEv1: IKEv2: IKE ESP AH FIPS NSS(MODP) null, dh0 229s ipsec algparse: MODP1536 IKEv1: IKE ESP AH IKEv2: IKE ESP AH NSS(MODP) dh5 229s ipsec algparse: MODP2048 IKEv1: IKE ESP AH IKEv2: IKE ESP AH FIPS NSS(MODP) dh14 229s ipsec algparse: MODP3072 IKEv1: IKE ESP AH IKEv2: IKE ESP AH FIPS NSS(MODP) dh15 229s ipsec algparse: MODP4096 IKEv1: IKE ESP AH IKEv2: IKE ESP AH FIPS NSS(MODP) dh16 229s ipsec algparse: MODP6144 IKEv1: IKE ESP AH IKEv2: IKE ESP AH FIPS NSS(MODP) dh17 229s ipsec algparse: MODP8192 IKEv1: IKE ESP AH IKEv2: IKE ESP AH FIPS NSS(MODP) dh18 229s ipsec algparse: DH19 IKEv1: IKE IKEv2: IKE ESP AH FIPS NSS(ECP) ecp_256, ecp256 229s ipsec algparse: DH20 IKEv1: IKE IKEv2: IKE ESP AH FIPS NSS(ECP) ecp_384, ecp384 229s ipsec algparse: DH21 IKEv1: IKE IKEv2: IKE ESP AH FIPS NSS(ECP) ecp_521, ecp521 229s ipsec algparse: DH31 IKEv1: IKE IKEv2: IKE ESP AH NSS(ECP) curve25519 229s ipsec algparse: IPCOMP algorithms: 229s ipsec algparse: DEFLATE IKEv1: ESP AH IKEv2: ESP AH FIPS 229s ipsec algparse: LZS IKEv1: IKEv2: ESP AH FIPS 229s ipsec algparse: LZJH IKEv1: IKEv2: ESP AH FIPS 229s | parsing 'AES_GCM_16_256,AES_GCM_16_128,CHACHA20_POLY1305,AES_CBC_256,AES_CBC_128' for ESP 229s | proposal: 'AES_GCM_16_256' 229s | token: '' '' "AES_GCM_16_256" '' 229s | token: '' "AES_GCM_16_256" '' '' 229s | ike_alg_byname() failed: ESP encryption algorithm 'AES_GCM_16_256' is not recognized 229s | token: '' '' '' 229s | appending ESP encryption algorithm AES_GCM_16[_256] 229s | appending ESP integrity algorithm NONE[_0] 229s | proposal: 'AES_GCM_16_128' 229s | token: '' '' "AES_GCM_16_128" '' 229s | token: '' "AES_GCM_16_128" '' '' 229s | ike_alg_byname() failed: ESP encryption algorithm 'AES_GCM_16_128' is not recognized 229s | token: '' '' '' 229s | appending ESP encryption algorithm AES_GCM_16[_128] 229s | appending ESP integrity algorithm NONE[_0] 229s | proposal: 'CHACHA20_POLY1305' 229s | token: '' '' "CHACHA20_POLY1305" '' 229s | token: '' "CHACHA20_POLY1305" '' '' 229s | token: '' '' '' 229s | appending ESP encryption algorithm CHACHA20_POLY1305[_0] 229s | appending ESP integrity algorithm NONE[_0] 229s | proposal: 'AES_CBC_256' 229s | token: '' '' "AES_CBC_256" '' 229s | token: '' "AES_CBC_256" '' '' 229s | ike_alg_byname() failed: ESP encryption algorithm 'AES_CBC_256' is not recognized 229s | token: '' '' '' 229s | appending ESP encryption algorithm AES_CBC[_256] 229s | appending ESP integrity algorithm HMAC_SHA2_512_256[_0] 229s | appending ESP integrity algorithm HMAC_SHA2_256_128[_0] 229s | proposal: 'AES_CBC_128' 229s | token: '' '' "AES_CBC_128" '' 229s | token: '' "AES_CBC_128" '' '' 229s | ike_alg_byname() failed: ESP encryption algorithm 'AES_CBC_128' is not recognized 229s | token: '' '' '' 229s | appending ESP encryption algorithm AES_CBC[_128] 229s | appending ESP integrity algorithm HMAC_SHA2_512_256[_0] 229s | appending ESP integrity algorithm HMAC_SHA2_256_128[_0] 229s | parsing '' for ESP 229s | parsing 'aes' for ESP 229s | proposal: 'aes' 229s | token: '' '' "aes" '' 229s | token: '' "aes" '' '' 229s | token: '' '' '' 229s | appending ESP encryption algorithm AES_CBC[_0] 229s | appending ESP integrity algorithm HMAC_SHA2_512_256[_0] 229s | appending ESP integrity algorithm HMAC_SHA2_256_128[_0] 229s | parsing 'aes;modp2048' for ESP 229s | proposal: 'aes;modp2048' 229s | token: '' '' "aes" ';' 229s | token: '' "aes" ';' "modp2048" '' 229s | token: ';' "modp2048" '' '' 229s | appending ESP encryption algorithm AES_CBC[_0] 229s | parsing dh: 229s | appending ESP DH algorithm MODP2048[_0] 229s | token: '' '' '' 229s | appending ESP integrity algorithm HMAC_SHA2_512_256[_0] 229s | appending ESP integrity algorithm HMAC_SHA2_256_128[_0] 229s ipsec algparse: ignoring ESP DH algorithm MODP2048 as PFS policy is disabled 229s | parsing 'aes-sha1' for ESP 229s | proposal: 'aes-sha1' 229s | token: '' '' "aes" '-' 229s | token: '' "aes" '-' "sha1" '' 229s | token: '-' "sha1" '' '' 229s | appending ESP encryption algorithm AES_CBC[_0] 229s | parsing integ: 229s | appending ESP integrity algorithm HMAC_SHA1_96[_0] 229s | token: '' '' '' 229s | parsing 'aes-sha1' for ESP 229s | proposal: 'aes-sha1' 229s | token: '' '' "aes" '-' 229s | token: '' "aes" '-' "sha1" '' 229s | token: '-' "sha1" '' '' 229s | appending ESP encryption algorithm AES_CBC[_0] 229s | parsing integ: 229s | appending ESP integrity algorithm HMAC_SHA1_96[_0] 229s | token: '' '' '' 229s | parsing 'aes-sha1-modp2048' for ESP 229s | proposal: 'aes-sha1-modp2048' 229s | token: '' '' "aes" '-' 229s | token: '' "aes" '-' "sha1" '-' 229s | token: '-' "sha1" '-' "modp2048" '' 229s | appending ESP encryption algorithm AES_CBC[_0] 229s | parsing integ: 229s | appending ESP integrity algorithm HMAC_SHA1_96[_0] 229s | token: '-' "modp2048" '' '' 229s | parsing dh: 229s | appending ESP DH algorithm MODP2048[_0] 229s | token: '' '' '' 229s ipsec algparse: ignoring ESP DH algorithm MODP2048 as PFS policy is disabled 229s | parsing 'aes-128-sha1' for ESP 229s | proposal: 'aes-128-sha1' 229s | token: '' '' "aes" '-' 229s | token: '' "aes" '-' "128" '-' 229s | token: '-' "128" '-' "sha1" '' 229s | token: '-' "sha1" '' '' 229s | appending ESP encryption algorithm AES_CBC[_128] 229s | parsing integ: 229s | appending ESP integrity algorithm HMAC_SHA1_96[_0] 229s | token: '' '' '' 229s | parsing 'aes-128-sha1' for ESP 229s | proposal: 'aes-128-sha1' 229s | token: '' '' "aes" '-' 229s | token: '' "aes" '-' "128" '-' 229s | token: '-' "128" '-' "sha1" '' 229s | token: '-' "sha1" '' '' 229s | appending ESP encryption algorithm AES_CBC[_128] 229s | parsing integ: 229s | appending ESP integrity algorithm HMAC_SHA1_96[_0] 229s | token: '' '' '' 229s | parsing 'aes-128-sha1-modp2048' for ESP 229s | proposal: 'aes-128-sha1-modp2048' 229s | token: '' '' "aes" '-' 229s | token: '' "aes" '-' "128" '-' 229s | token: '-' "128" '-' "sha1" '-' 229s | token: '-' "sha1" '-' "modp2048" '' 229s | appending ESP encryption algorithm AES_CBC[_128] 229s | parsing integ: 229s | appending ESP integrity algorithm HMAC_SHA1_96[_0] 229s | token: '-' "modp2048" '' '' 229s | parsing dh: 229s | appending ESP DH algorithm MODP2048[_0] 229s | token: '' '' '' 229s ipsec algparse: ignoring ESP DH algorithm MODP2048 as PFS policy is disabled 229s | parsing 'aes-128' for ESP 229s | proposal: 'aes-128' 229s | token: '' '' "aes" '-' 229s | token: '' "aes" '-' "128" '' 229s | token: '-' "128" '' '' 229s | token: '' '' '' 229s | appending ESP encryption algorithm AES_CBC[_128] 229s | appending ESP integrity algorithm HMAC_SHA2_512_256[_0] 229s | appending ESP integrity algorithm HMAC_SHA2_256_128[_0] 229s | parsing 'aes_gcm_a-128-null' for ESP 229s | proposal: 'aes_gcm_a-128-null' 229s | token: '' '' "aes_gcm_a" '-' 229s | token: '' "aes_gcm_a" '-' "128" '-' 229s | token: '-' "128" '-' "null" '' 229s | token: '-' "null" '' '' 229s | appending ESP encryption algorithm AES_GCM_8[_128] 229s | parsing integ: 229s | appending ESP integrity algorithm NONE[_0] 229s | token: '' '' '' 229s | parsing '3des-sha1;modp1024' for ESP 229s | proposal: '3des-sha1;modp1024' 229s | token: '' '' "3des" '-' 229s | token: '' "3des" '-' "sha1" ';' 229s | token: '-' "sha1" ';' "modp1024" '' 229s | appending ESP encryption algorithm 3DES_CBC[_0] 229s | parsing integ: 229s | appending ESP integrity algorithm HMAC_SHA1_96[_0] 229s | token: ';' "modp1024" '' '' 229s | parsing dh: 229s | ike_alg_byname() failed: ESP DH algorithm 'modp1024' is not supported 229s | lookup for DH algorithm 'modp1024' failed 229s | ... failed 'ESP DH algorithm 'modp1024' is not supported' 229s | parsing '3des-sha1;modp1536' for ESP 229s | proposal: '3des-sha1;modp1536' 229s | token: '' '' "3des" '-' 229s | token: '' "3des" '-' "sha1" ';' 229s | token: '-' "sha1" ';' "modp1536" '' 229s | appending ESP encryption algorithm 3DES_CBC[_0] 229s | parsing integ: 229s | appending ESP integrity algorithm HMAC_SHA1_96[_0] 229s | token: ';' "modp1536" '' '' 229s | parsing dh: 229s | appending ESP DH algorithm MODP1536[_0] 229s | token: '' '' '' 229s ipsec algparse: ignoring ESP DH algorithm MODP1536 as PFS policy is disabled 229s | parsing '3des-sha1;modp2048' for ESP 229s | proposal: '3des-sha1;modp2048' 229s | token: '' '' "3des" '-' 229s | token: '' "3des" '-' "sha1" ';' 229s | token: '-' "sha1" ';' "modp2048" '' 229s | appending ESP encryption algorithm 3DES_CBC[_0] 229s | parsing integ: 229s | appending ESP integrity algorithm HMAC_SHA1_96[_0] 229s | token: ';' "modp2048" '' '' 229s | parsing dh: 229s | appending ESP DH algorithm MODP2048[_0] 229s | token: '' '' '' 229s ipsec algparse: ignoring ESP DH algorithm MODP2048 as PFS policy is disabled 229s | parsing '3des-sha1;dh21' for ESP 229s | proposal: '3des-sha1;dh21' 229s | token: '' '' "3des" '-' 229s | token: '' "3des" '-' "sha1" ';' 229s | token: '-' "sha1" ';' "dh21" '' 229s | appending ESP encryption algorithm 3DES_CBC[_0] 229s | parsing integ: 229s | appending ESP integrity algorithm HMAC_SHA1_96[_0] 229s | token: ';' "dh21" '' '' 229s | parsing dh: 229s | appending ESP DH algorithm DH21[_0] 229s | token: '' '' '' 229s ipsec algparse: ignoring ESP DH algorithm DH21 as PFS policy is disabled 229s | parsing '3des-sha1;ecp_521' for ESP 229s | proposal: '3des-sha1;ecp_521' 229s | token: '' '' "3des" '-' 229s | token: '' "3des" '-' "sha1" ';' 229s | token: '-' "sha1" ';' "ecp_521" '' 229s | appending ESP encryption algorithm 3DES_CBC[_0] 229s | parsing integ: 229s | appending ESP integrity algorithm HMAC_SHA1_96[_0] 229s | token: ';' "ecp_521" '' '' 229s | parsing dh: 229s | appending ESP DH algorithm DH21[_0] 229s | token: '' '' '' 229s ipsec algparse: ignoring ESP DH algorithm DH21 as PFS policy is disabled 229s | parsing '3des-sha1;dh23' for ESP 229s | proposal: '3des-sha1;dh23' 229s | token: '' '' "3des" '-' 229s | token: '' "3des" '-' "sha1" ';' 229s | token: '-' "sha1" ';' "dh23" '' 229s | appending ESP encryption algorithm 3DES_CBC[_0] 229s | parsing integ: 229s | appending ESP integrity algorithm HMAC_SHA1_96[_0] 229s | token: ';' "dh23" '' '' 229s | parsing dh: 229s | ike_alg_byname() failed: ESP DH algorithm 'dh23' is not supported 229s | lookup for DH algorithm 'dh23' failed 229s | ... failed 'ESP DH algorithm 'dh23' is not supported' 229s | parsing '3des-sha1;dh24' for ESP 229s | proposal: '3des-sha1;dh24' 229s | token: '' '' "3des" '-' 229s | token: '' "3des" '-' "sha1" ';' 229s | token: '-' "sha1" ';' "dh24" '' 229s | appending ESP encryption algorithm 3DES_CBC[_0] 229s | parsing integ: 229s | appending ESP integrity algorithm HMAC_SHA1_96[_0] 229s | token: ';' "dh24" '' '' 229s | parsing dh: 229s | ike_alg_byname() failed: ESP DH algorithm 'dh24' is not supported 229s | lookup for DH algorithm 'dh24' failed 229s | ... failed 'ESP DH algorithm 'dh24' is not supported' 229s | parsing '3des-sha1' for ESP 229s | proposal: '3des-sha1' 229s | token: '' '' "3des" '-' 229s | token: '' "3des" '-' "sha1" '' 229s | token: '-' "sha1" '' '' 229s | appending ESP encryption algorithm 3DES_CBC[_0] 229s | parsing integ: 229s | appending ESP integrity algorithm HMAC_SHA1_96[_0] 229s | token: '' '' '' 229s | parsing 'null-sha1' for ESP 229s | proposal: 'null-sha1' 229s | token: '' '' "null" '-' 229s | token: '' "null" '-' "sha1" '' 229s | token: '-' "sha1" '' '' 229s | appending ESP encryption algorithm NULL[_0] 229s | parsing integ: 229s | appending ESP integrity algorithm HMAC_SHA1_96[_0] 229s | token: '' '' '' 229s | parsing 'aes_cbc' for ESP 229s | proposal: 'aes_cbc' 229s | token: '' '' "aes_cbc" '' 229s | token: '' "aes_cbc" '' '' 229s | token: '' '' '' 229s | appending ESP encryption algorithm AES_CBC[_0] 229s | appending ESP integrity algorithm HMAC_SHA2_512_256[_0] 229s | appending ESP integrity algorithm HMAC_SHA2_256_128[_0] 229s | parsing 'aes-sha' for ESP 229s | proposal: 'aes-sha' 229s | token: '' '' "aes" '-' 229s | token: '' "aes" '-' "sha" '' 229s | token: '-' "sha" '' '' 229s | appending ESP encryption algorithm AES_CBC[_0] 229s | parsing integ: 229s | appending ESP integrity algorithm HMAC_SHA1_96[_0] 229s | token: '' '' '' 229s | parsing 'aes-sha1' for ESP 229s | proposal: 'aes-sha1' 229s | token: '' '' "aes" '-' 229s | token: '' "aes" '-' "sha1" '' 229s | token: '-' "sha1" '' '' 229s | appending ESP encryption algorithm AES_CBC[_0] 229s | parsing integ: 229s | appending ESP integrity algorithm HMAC_SHA1_96[_0] 229s | token: '' '' '' 229s | parsing 'aes128-sha1' for ESP 229s | proposal: 'aes128-sha1' 229s | token: '' '' "aes128" '-' 229s | token: '' "aes128" '-' "sha1" '' 229s | ike_alg_byname() failed: ESP encryption algorithm 'aes128' is not recognized 229s | token: '-' "sha1" '' '' 229s | appending ESP encryption algorithm AES_CBC[_128] 229s | parsing integ: 229s | appending ESP integrity algorithm HMAC_SHA1_96[_0] 229s | token: '' '' '' 229s | parsing 'aes-sha2' for ESP 229s | proposal: 'aes-sha2' 229s | token: '' '' "aes" '-' 229s | token: '' "aes" '-' "sha2" '' 229s | token: '-' "sha2" '' '' 229s | appending ESP encryption algorithm AES_CBC[_0] 229s | parsing integ: 229s | appending ESP integrity algorithm HMAC_SHA2_256_128[_0] 229s | token: '' '' '' 229s | parsing 'aes-sha256' for ESP 229s | proposal: 'aes-sha256' 229s | token: '' '' "aes" '-' 229s | token: '' "aes" '-' "sha256" '' 229s | token: '-' "sha256" '' '' 229s | appending ESP encryption algorithm AES_CBC[_0] 229s | parsing integ: 229s | appending ESP integrity algorithm HMAC_SHA2_256_128[_0] 229s | token: '' '' '' 229s | parsing 'aes-sha384' for ESP 229s | proposal: 'aes-sha384' 229s | token: '' '' "aes" '-' 229s | token: '' "aes" '-' "sha384" '' 229s | token: '-' "sha384" '' '' 229s | appending ESP encryption algorithm AES_CBC[_0] 229s | parsing integ: 229s | appending ESP integrity algorithm HMAC_SHA2_384_192[_0] 229s | token: '' '' '' 229s | parsing 'aes-sha512' for ESP 229s | proposal: 'aes-sha512' 229s | token: '' '' "aes" '-' 229s | token: '' "aes" '-' "sha512" '' 229s | token: '-' "sha512" '' '' 229s | appending ESP encryption algorithm AES_CBC[_0] 229s | parsing integ: 229s | appending ESP integrity algorithm HMAC_SHA2_512_256[_0] 229s | token: '' '' '' 229s | parsing 'aes128-aes_xcbc' for ESP 229s | proposal: 'aes128-aes_xcbc' 229s | token: '' '' "aes128" '-' 229s | token: '' "aes128" '-' "aes_xcbc" '' 229s | ike_alg_byname() failed: ESP encryption algorithm 'aes128' is not recognized 229s | token: '-' "aes_xcbc" '' '' 229s | appending ESP encryption algorithm AES_CBC[_128] 229s | parsing integ: 229s | appending ESP integrity algorithm AES_XCBC_96[_0] 229s | token: '' '' '' 229s | parsing 'aes192-sha1' for ESP 229s | proposal: 'aes192-sha1' 229s | token: '' '' "aes192" '-' 229s | token: '' "aes192" '-' "sha1" '' 229s | ike_alg_byname() failed: ESP encryption algorithm 'aes192' is not recognized 229s | token: '-' "sha1" '' '' 229s | appending ESP encryption algorithm AES_CBC[_192] 229s | parsing integ: 229s | appending ESP integrity algorithm HMAC_SHA1_96[_0] 229s | token: '' '' '' 229s | parsing 'aes256-sha1' for ESP 229s | proposal: 'aes256-sha1' 229s | token: '' '' "aes256" '-' 229s | token: '' "aes256" '-' "sha1" '' 229s | ike_alg_byname() failed: ESP encryption algorithm 'aes256' is not recognized 229s | token: '-' "sha1" '' '' 229s | appending ESP encryption algorithm AES_CBC[_256] 229s | parsing integ: 229s | appending ESP integrity algorithm HMAC_SHA1_96[_0] 229s | token: '' '' '' 229s | parsing 'aes256-sha' for ESP 229s | proposal: 'aes256-sha' 229s | token: '' '' "aes256" '-' 229s | token: '' "aes256" '-' "sha" '' 229s | ike_alg_byname() failed: ESP encryption algorithm 'aes256' is not recognized 229s | token: '-' "sha" '' '' 229s | appending ESP encryption algorithm AES_CBC[_256] 229s | parsing integ: 229s | appending ESP integrity algorithm HMAC_SHA1_96[_0] 229s | token: '' '' '' 229s | parsing 'aes256-sha2' for ESP 229s | proposal: 'aes256-sha2' 229s | token: '' '' "aes256" '-' 229s | token: '' "aes256" '-' "sha2" '' 229s | ike_alg_byname() failed: ESP encryption algorithm 'aes256' is not recognized 229s | token: '-' "sha2" '' '' 229s | appending ESP encryption algorithm AES_CBC[_256] 229s | parsing integ: 229s | appending ESP integrity algorithm HMAC_SHA2_256_128[_0] 229s | token: '' '' '' 229s | parsing 'aes256-sha2_256' for ESP 229s | proposal: 'aes256-sha2_256' 229s | token: '' '' "aes256" '-' 229s | token: '' "aes256" '-' "sha2_256" '' 229s | ike_alg_byname() failed: ESP encryption algorithm 'aes256' is not recognized 229s | token: '-' "sha2_256" '' '' 229s | appending ESP encryption algorithm AES_CBC[_256] 229s | parsing integ: 229s | appending ESP integrity algorithm HMAC_SHA2_256_128[_0] 229s algparse -v2 'esp' (expect SUCCESS) 229s AES_GCM_16_256-NONE 229s AES_GCM_16_128-NONE 229s CHACHA20_POLY1305-NONE 229s AES_CBC_256-HMAC_SHA2_512_256+HMAC_SHA2_256_128 229s AES_CBC_128-HMAC_SHA2_512_256+HMAC_SHA2_256_128 229s algparse -v2 'esp=' (expect ERROR) 229s ERROR: ESP proposal is empty 229s algparse -v2 'esp=aes' (expect SUCCESS) 229s AES_CBC-HMAC_SHA2_512_256+HMAC_SHA2_256_128 229s algparse -v2 'esp=aes;modp2048' (expect SUCCESS) 229s AES_CBC-HMAC_SHA2_512_256+HMAC_SHA2_256_128 229s algparse -v2 'esp=aes-sha1' (expect SUCCESS) 229s AES_CBC-HMAC_SHA1_96 229s algparse -v2 'esp=aes-sha1' (expect SUCCESS) 229s AES_CBC-HMAC_SHA1_96 229s algparse -v2 'esp=aes-sha1-modp2048' (expect SUCCESS) 229s AES_CBC-HMAC_SHA1_96 229s algparse -v2 'esp=aes-128-sha1' (expect SUCCESS) 229s AES_CBC_128-HMAC_SHA1_96 229s algparse -v2 'esp=aes-128-sha1' (expect SUCCESS) 229s AES_CBC_128-HMAC_SHA1_96 229s algparse -v2 'esp=aes-128-sha1-modp2048' (expect SUCCESS) 229s AES_CBC_128-HMAC_SHA1_96 229s algparse -v2 'esp=aes-128' (expect SUCCESS) 229s AES_CBC_128-HMAC_SHA2_512_256+HMAC_SHA2_256_128 229s algparse -v2 'esp=aes_gcm_a-128-null' (expect SUCCESS) 229s AES_GCM_8_128-NONE 229s algparse -v2 'esp=3des-sha1;modp1024' (expect ERROR) 229s ERROR: ESP DH algorithm 'modp1024' is not supported 229s algparse -v2 'esp=3des-sha1;modp1536' (expect SUCCESS) 229s 3DES_CBC-HMAC_SHA1_96 229s algparse -v2 'esp=3des-sha1;modp2048' (expect SUCCESS) 229s 3DES_CBC-HMAC_SHA1_96 229s algparse -v2 'esp=3des-sha1;dh21' (expect SUCCESS) 229s 3DES_CBC-HMAC_SHA1_96 229s algparse -v2 'esp=3des-sha1;ecp_521' (expect SUCCESS) 229s 3DES_CBC-HMAC_SHA1_96 229s algparse -v2 'esp=3des-sha1;dh23' (expect ERROR) 229s ERROR: ESP DH algorithm 'dh23' is not supported 229s algparse -v2 'esp=3des-sha1;dh24' (expect ERROR) 229s ERROR: ESP DH algorithm 'dh24' is not supported 229s algparse -v2 'esp=3des-sha1' (expect SUCCESS) 229s 3DES_CBC-HMAC_SHA1_96 229s algparse -v2 'esp=null-sha1' (expect SUCCESS) 229s NULL-HMAC_SHA1_96 229s algparse -v2 'esp=aes_cbc' (expect SUCCESS) 229s AES_CBC-HMAC_SHA2_512_256+HMAC_SHA2_256_128 229s algparse -v2 'esp=aes-sha' (expect SUCCESS) 229s AES_CBC-HMAC_SHA1_96 229s algparse -v2 'esp=aes-sha1' (expect SUCCESS) 229s AES_CBC-HMAC_SHA1_96 229s algparse -v2 'esp=aes128-sha1' (expect SUCCESS) 229s AES_CBC_128-HMAC_SHA1_96 229s algparse -v2 'esp=aes-sha2' (expect SUCCESS) 229s AES_CBC-HMAC_SHA2_256_128 229s algparse -v2 'esp=aes-sha256' (expect SUCCESS) 229s AES_CBC-HMAC_SHA2_256_128 229s algparse -v2 'esp=aes-sha384' (expect SUCCESS) 229s AES_CBC-HMAC_SHA2_384_192 229s algparse -v2 'esp=aes-sha512' (expect SUCCESS) 229s AES_CBC-HMAC_SHA2_512_256 229s algparse -v2 'esp=aes128-aes_xcbc' (expect SUCCESS) 229s AES_CBC_128-AES_XCBC_96 229s algparse -v2 'esp=aes192-sha1' (expect SUCCESS) 229s AES_CBC_192-HMAC_SHA1_96 229s algparse -v2 'esp=aes256-sha1' (expect SUCCESS) 229s AES_CBC_256-HMAC_SHA1_96 229s algparse -v2 'esp=aes256-sha' (expect SUCCESS) 229s AES_CBC_256-HMAC_SHA1_96 229s algparse -v2 'esp=aes256-sha2' (expect SUCCESS) 229s AES_CBC_256-HMAC_SHA2_256_128 229s algparse -v2 'esp=aes256-sha2_256' (expect SUCCESS) 229s AES_CBC_256-HMAC_SHA2_256_128 229s algparse -v2 'esp=aes256-sha2_384' (expect SUCCESS) 229s AES_CBC_256-HMAC_SHA2_384_192 229s algparse -v2 'esp=aes256-sha2_512' (expect SUCCESS) 229s AES_CBC_256-HMAC_SHA2_512_256 229s algparse -v2 'esp=camellia' (expect SUCCESS) 229s CAMELLIA_CBC-HMAC_SHA2_512_256+HMAC_SHA2_256_128 229s algparse -v2 'esp=camellia128' (expect SUCCESS) 229s CAMELLIA_CBC_128-HMAC_SHA2_512_256+HMAC_SHA2_256_128 229s algparse -v2 'esp=camellia192' (expect SUCCESS) 229s CAMELLIA_CBC_192-HMAC_SHA2_512_256+HMAC_SHA2_256_128 229s algparse -v2 'esp=camellia256' (expect SUCCESS) 229s CAMELLIA_CBC_256-HMAC_SHA2_512_256+HMAC_SHA2_256_128 229s algparse -v2 'esp=aes_ccm' (expect SUCCESS) 229s AES_CCM_16-NONE 229s algparse -v2 'esp=aes_ccm_a-128-null' (expect SUCCESS) 229s AES_CCM_8_128-NONE 229s algparse -v2 'esp=aes_ccm_a-192-null' (expect SUCCESS) 229s AES_CCM_8_192-NONE 229s algparse -v2 'esp=aes_ccm_a-256-null' (expect SUCCESS) 229s AES_CCM_8_256-NONE 229s algparse -v2 'esp=aes_ccm_b-128-null' (expect SUCCESS) 229s AES_CCM_12_128-NONE 229s algparse -v2 'esp=aes_ccm_b-192-null' (expect SUCCESS) 229s AES_CCM_12_192-NONE 229s algparse -v2 'esp=aes_ccm_b-256-null' (expect SUCCESS) 229s AES_CCM_12_256-NONE 229s algparse -v2 'esp=aes_ccm_c-128-null' (expect SUCCESS) 229s AES_CCM_16_128-NONE 229s algparse -v2 'esp=aes_ccm_c-192-null' (expect SUCCESS) 229s AES_CCM_16_192-NONE 229s algparse -v2 'esp=aes_ccm_c-256-null' (expect SUCCESS) 229s AES_CCM_16_256-NONE 229s algparse -v2 'esp=aes_gcm' (expect SUCCESS) 229s AES_GCM_16-NONE 229s algparse -v2 'esp=aes_gcm_a-128-null' (expect SUCCESS) 229s AES_GCM_8_128-NONE 229s algparse -v2 'esp=aes_gcm_a-192-null' (expect SUCCESS) 229s AES_GCM_8_192-NONE 229s algparse -v2 'esp=aes_gcm_a-256-null' (expect SUCCESS) 229s AES_GCM_8_256-NONE 229s algparse -v2 'esp=aes_gcm_b-128-null' (expect SUCCESS) 229s AES_GCM_12_128-NONE 229s algparse -v2 'esp=aes_gcm_b-192-null' (expect SUCCESS) 229s AES_GCM_12_192-NONE 229s algparse -v2 'esp=aes_gcm_b-256-null' (expect SUCCESS) 229s AES_GCM_12_256-NONE 229s algparse -v2 'esp=aes_gcm_c-128-null' (expect SUCCESS) 229s AES_GCM_16_128-NONE 229s algparse -v2 'esp=aes_gcm_c-192-null' (expect SUCCESS) 229s AES_GCM_16_192-NONE 229s algparse -v2 'esp=aes_gcm_c-256-null' (expect SUCCESS) 229s AES_GCM_16_256-NONE 229s algparse -v2 'esp=aes_ccm_a-null' (expect SUCCESS) 229s AES_CCM_8-NONE 229s algparse -v2 'esp=aes_ccm_b-null' (expect SUCCESS) 229s AES_CCM_12-NONE 229s algparse -v2 'esp=aes_ccm_c-null' (expect SUCCESS) 229s AES_CCM_16-NONE 229s algparse -v2 'esp=aes_gcm_a-null' (expect SUCCESS) 229s AES_GCM_8-NONE 229s algparse -v2 'esp=aes_gcm_b-null' (expect SUCCESS) 229s AES_GCM_12-NONE 229s algparse -v2 'esp=aes_gcm_c-null' (expect SUCCESS) 229s AES_GCM_16-NONE 229s algparse -v2 'esp=aes_ccm-null' (expect SUCCESS) 229s AES_CCM_16-NONE 229s algparse -v2 'esp=aes_gcm-null' (expect SUCCESS) 229s AES_GCM_16-NONE 229s algparse -v2 'esp=aes_ccm-256-null' (expect SUCCESS) 229s AES_CCM_16_256-NONE 229s algparse -v2 'esp=aes_gcm-192-null' (expect SUCCESS) 229s AES_GCM_16_192-NONE 229s algparse -v2 'esp=aes_ccm_256-null' (expect SUCCESS) 229s AES_CCM_16_256-NONE 229s algparse -v2 'esp=aes_gcm_192-null' (expect SUCCESS) 229s AES_GCM_16_192-NONE 229s algparse -v2 'esp=aes_ccm_8-null' (expect SUCCESS) 229s AES_CCM_8-NONE 229s algparse -v2 'esp=aes_ccm_12-null' (expect SUCCESS) 229s AES_CCM_12-NONE 229s algparse -v2 'esp=aes_ccm_16-null' (expect SUCCESS) 229s AES_CCM_16-NONE 229s algparse -v2 'esp=aes_gcm_8-null' (expect SUCCESS) 229s AES_GCM_8-NONE 229s algparse -v2 'esp=aes_gcm_12-null' (expect SUCCESS) 229s AES_GCM_12-NONE 229s algparse -v2 'esp=aes_gcm_16-null' (expect SUCCESS) 229s AES_GCM_16-NONE 229s algparse -v2 'esp=aes_ccm_8-128-null' (expect SUCCESS) 229s AES_CCM_8_128-NONE 229s algparse -v2 'esp=aes_ccm_12-192-null' (expect SUCCESS) 229s AES_CCM_12_192-NONE 229s algparse -v2 'esp=aes_ccm_16-256-null' (expect SUCCESS) 229s AES_CCM_16_256-NONE 229s algparse -v2 'esp=aes_gcm_8-128-null' (expect SUCCESS) 229s AES_GCM_8_128-NONE 229s algparse -v2 'esp=aes_gcm_12-192-null' (expect SUCCESS) 229s AES_GCM_12_192-NONE 229s algparse -v2 'esp=aes_gcm_16-256-null' (expect SUCCESS) 229s AES_GCM_16_256-NONE 229s algparse -v2 'esp=aes_ccm_8_128-null' (expect SUCCESS) 229s AES_CCM_8_128-NONE 229s algparse -v2 'esp=aes_ccm_12_192-null' (expect SUCCESS) 229s AES_CCM_12_192-NONE 229s algparse -v2 'esp=aes_ccm_16_256-null' (expect SUCCESS) 229s AES_CCM_16_256-NONE 229s algparse -v2 'esp=aes_gcm_8_128-null' (expect SUCCESS) 229s AES_GCM_8_128-NONE 229s algparse -v2 'esp=aes_gcm_12_192-null' (expect SUCCESS) 229s AES_GCM_12_192-NONE 229s algparse -v2 'esp=aes_gcm_16_256-null' (expect SUCCESS) 229s AES_GCM_16_256-NONE 229s algparse -v2 'esp=aes_ctr' (expect SUCCESS) 229s AES_CTR-HMAC_SHA2_512_256+HMAC_SHA2_256_128 229s algparse -v2 'esp=aesctr' (expect SUCCESS) 229s AES_CTR-HMAC_SHA2_512_256+HMAC_SHA2_256_128 229s algparse -v2 'esp=aes_ctr128' (expect SUCCESS) 229s AES_CTR_128-HMAC_SHA2_512_256+HMAC_SHA2_256_128 229s algparse -v2 'esp=aes_ctr192' (expect SUCCESS) 229s AES_CTR_192-HMAC_SHA2_512_256+HMAC_SHA2_256_128 229s algparse -v2 'esp=aes_ctr256' (expect SUCCESS) 229s AES_CTR_256-HMAC_SHA2_512_256+HMAC_SHA2_256_128 229s algparse -v2 'esp=camellia_cbc_256-hmac_sha2_512_256;modp8192' (expect SUCCESS) 229s CAMELLIA_CBC_256-HMAC_SHA2_512_256 229s algparse -v2 'esp=null_auth_aes_gmac_256-null;modp8192' (expect SUCCESS) 229s NULL_AUTH_AES_GMAC_256-NONE 229s algparse -v2 'esp=3des-sha1;modp8192' (expect SUCCESS) 229s 3DES_CBC-HMAC_SHA1_96 229s algparse -v2 'esp=3des-sha1-modp8192' (expect SUCCESS) 229s 3DES_CBC-HMAC_SHA1_96 229s algparse -v2 'esp=aes-sha1,3des-sha1;modp8192' (expect SUCCESS) 229s AES_CBC-HMAC_SHA1_96 229s 3DES_CBC-HMAC_SHA1_96 229s algparse -v2 'esp=aes-sha1-modp8192,3des-sha1-modp8192' (expect SUCCESS) 229s AES_CBC-HMAC_SHA1_96 229s 3DES_CBC-HMAC_SHA1_96 229s algparse -v2 'esp=aes-sha1-modp8192,aes-sha1-modp8192,aes-sha1-modp8192' (expect SUCCESS) 229s AES_CBC-HMAC_SHA1_96 229s algparse -v2 'esp=aes;none' (expect SUCCESS) 229s AES_CBC-HMAC_SHA2_512_256+HMAC_SHA2_256_128 229s algparse -v2 'esp=aes;none,aes' (expect SUCCESS) 229s AES_CBC-HMAC_SHA2_512_256+HMAC_SHA2_256_128 229s AES_CBC-HMAC_SHA2_512_256+HMAC_SHA2_256_128 229s algparse -v2 'esp=aes;none,aes;modp2048' (expect SUCCESS) 229s AES_CBC-HMAC_SHA2_512_256+HMAC_SHA2_256_128 229s AES_CBC-HMAC_SHA2_512_256+HMAC_SHA2_256_128 229s algparse -v2 'esp=aes-sha1-none' (expect SUCCESS) 229s AES_CBC-HMAC_SHA1_96 229s algparse -v2 'esp=aes-sha1;none' (expect SUCCESS) 229s AES_CBC-HMAC_SHA1_96 229s algparse -v2 'esp=3des168-sha1' (expect ERROR) 229s ERROR: ESP encryption algorithm 3DES_CBC does not allow a key lengths 229s algparse -v2 'esp=3des-null' (expect ERROR) 229s ERROR: non-AEAD ESP encryption algorithm 3DES_CBC cannot have 'NONE' as the integrity algorithm 229s algparse -v2 'esp=aes128-null' (expect ERROR) 229s ERROR: non-AEAD ESP encryption algorithm AES_CBC cannot have 'NONE' as the integrity algorithm 229s algparse -v2 'esp=aes224-sha1' (expect ERROR) 229s ERROR: ESP encryption algorithm AES_CBC with key length 224 invalid; valid key lengths: 128, 192, 256 229s algparse -v2 'esp=aes-224-sha1' (expect ERROR) 229s ERROR: ESP encryption algorithm AES_CBC with key length 224 invalid; valid key lengths: 128, 192, 256 229s algparse -v2 'esp=aes0-sha1' (expect ERROR) 229s ERROR: ESP encryption key length is zero 229s algparse -v2 'esp=aes-0-sha1' (expect ERROR) 229s ERROR: ESP encryption key length is zero 229s algparse -v2 'esp=aes512-sha1' (expect ERROR) 229s ERROR: ESP encryption algorithm AES_CBC with key length 512 invalid; valid key lengths: 128, 192, 256 229s algparse -v2 'esp=aes-sha1555' (expect ERROR) 229s | token: '' '' '' 229s | parsing 'aes256-sha2_384' for ESP 229s | proposal: 'aes256-sha2_384' 229s | token: '' '' "aes256" '-' 229s | token: '' "aes256" '-' "sha2_384" '' 229s | ike_alg_byname() failed: ESP encryption algorithm 'aes256' is not recognized 229s | token: '-' "sha2_384" '' '' 229s | appending ESP encryption algorithm AES_CBC[_256] 229s | parsing integ: 229s | appending ESP integrity algorithm HMAC_SHA2_384_192[_0] 229s | token: '' '' '' 229s | parsing 'aes256-sha2_512' for ESP 229s | proposal: 'aes256-sha2_512' 229s | token: '' '' "aes256" '-' 229s | token: '' "aes256" '-' "sha2_512" '' 229s | ike_alg_byname() failed: ESP encryption algorithm 'aes256' is not recognized 229s | token: '-' "sha2_512" '' '' 229s | appending ESP encryption algorithm AES_CBC[_256] 229s | parsing integ: 229s | appending ESP integrity algorithm HMAC_SHA2_512_256[_0] 229s | token: '' '' '' 229s | parsing 'camellia' for ESP 229s | proposal: 'camellia' 229s | token: '' '' "camellia" '' 229s | token: '' "camellia" '' '' 229s | token: '' '' '' 229s | appending ESP encryption algorithm CAMELLIA_CBC[_0] 229s | appending ESP integrity algorithm HMAC_SHA2_512_256[_0] 229s | appending ESP integrity algorithm HMAC_SHA2_256_128[_0] 229s | parsing 'camellia128' for ESP 229s | proposal: 'camellia128' 229s | token: '' '' "camellia128" '' 229s | token: '' "camellia128" '' '' 229s | ike_alg_byname() failed: ESP encryption algorithm 'camellia128' is not recognized 229s | token: '' '' '' 229s | appending ESP encryption algorithm CAMELLIA_CBC[_128] 229s | appending ESP integrity algorithm HMAC_SHA2_512_256[_0] 229s | appending ESP integrity algorithm HMAC_SHA2_256_128[_0] 229s | parsing 'camellia192' for ESP 229s | proposal: 'camellia192' 229s | token: '' '' "camellia192" '' 229s | token: '' "camellia192" '' '' 229s | ike_alg_byname() failed: ESP encryption algorithm 'camellia192' is not recognized 229s | token: '' '' '' 229s | appending ESP encryption algorithm CAMELLIA_CBC[_192] 229s | appending ESP integrity algorithm HMAC_SHA2_512_256[_0] 229s | appending ESP integrity algorithm HMAC_SHA2_256_128[_0] 229s | parsing 'camellia256' for ESP 229s | proposal: 'camellia256' 229s | token: '' '' "camellia256" '' 229s | token: '' "camellia256" '' '' 229s | ike_alg_byname() failed: ESP encryption algorithm 'camellia256' is not recognized 229s | token: '' '' '' 229s | appending ESP encryption algorithm CAMELLIA_CBC[_256] 229s | appending ESP integrity algorithm HMAC_SHA2_512_256[_0] 229s | appending ESP integrity algorithm HMAC_SHA2_256_128[_0] 229s | parsing 'aes_ccm' for ESP 229s | proposal: 'aes_ccm' 229s | token: '' '' "aes_ccm" '' 229s | token: '' "aes_ccm" '' '' 229s | token: '' '' '' 229s | appending ESP encryption algorithm AES_CCM_16[_0] 229s | appending ESP integrity algorithm NONE[_0] 229s | parsing 'aes_ccm_a-128-null' for ESP 229s | proposal: 'aes_ccm_a-128-null' 229s | token: '' '' "aes_ccm_a" '-' 229s | token: '' "aes_ccm_a" '-' "128" '-' 229s | token: '-' "128" '-' "null" '' 229s | token: '-' "null" '' '' 229s | appending ESP encryption algorithm AES_CCM_8[_128] 229s | parsing integ: 229s | appending ESP integrity algorithm NONE[_0] 229s | token: '' '' '' 229s | parsing 'aes_ccm_a-192-null' for ESP 229s | proposal: 'aes_ccm_a-192-null' 229s | token: '' '' "aes_ccm_a" '-' 229s | token: '' "aes_ccm_a" '-' "192" '-' 229s | token: '-' "192" '-' "null" '' 229s | token: '-' "null" '' '' 229s | appending ESP encryption algorithm AES_CCM_8[_192] 229s | parsing integ: 229s | appending ESP integrity algorithm NONE[_0] 229s | token: '' '' '' 229s | parsing 'aes_ccm_a-256-null' for ESP 229s | proposal: 'aes_ccm_a-256-null' 229s | token: '' '' "aes_ccm_a" '-' 229s | token: '' "aes_ccm_a" '-' "256" '-' 229s | token: '-' "256" '-' "null" '' 229s | token: '-' "null" '' '' 229s | appending ESP encryption algorithm AES_CCM_8[_256] 229s | parsing integ: 229s | appending ESP integrity algorithm NONE[_0] 229s | token: '' '' '' 229s | parsing 'aes_ccm_b-128-null' for ESP 229s | proposal: 'aes_ccm_b-128-null' 229s | token: '' '' "aes_ccm_b" '-' 229s | token: '' "aes_ccm_b" '-' "128" '-' 229s | token: '-' "128" '-' "null" '' 229s | token: '-' "null" '' '' 229s | appending ESP encryption algorithm AES_CCM_12[_128] 229s | parsing integ: 229s | appending ESP integrity algorithm NONE[_0] 229s | token: '' '' '' 229s | parsing 'aes_ccm_b-192-null' for ESP 229s | proposal: 'aes_ccm_b-192-null' 229s | token: '' '' "aes_ccm_b" '-' 229s | token: '' "aes_ccm_b" '-' "192" '-' 229s | token: '-' "192" '-' "null" '' 229s | token: '-' "null" '' '' 229s | appending ESP encryption algorithm AES_CCM_12[_192] 229s | parsing integ: 229s | appending ESP integrity algorithm NONE[_0] 229s | token: '' '' '' 229s | parsing 'aes_ccm_b-256-null' for ESP 229s | proposal: 'aes_ccm_b-256-null' 229s | token: '' '' "aes_ccm_b" '-' 229s | token: '' "aes_ccm_b" '-' "256" '-' 229s | token: '-' "256" '-' "null" '' 229s | token: '-' "null" '' '' 229s | appending ESP encryption algorithm AES_CCM_12[_256] 229s | parsing integ: 229s | appending ESP integrity algorithm NONE[_0] 229s | token: '' '' '' 229s | parsing 'aes_ccm_c-128-null' for ESP 229s | proposal: 'aes_ccm_c-128-null' 229s | token: '' '' "aes_ccm_c" '-' 229s | token: '' "aes_ccm_c" '-' "128" '-' 229s | token: '-' "128" '-' "null" '' 229s | token: '-' "null" '' '' 229s | appending ESP encryption algorithm AES_CCM_16[_128] 229s | parsing integ: 229s | appending ESP integrity algorithm NONE[_0] 229s | token: '' '' '' 229s | parsing 'aes_ccm_c-192-null' for ESP 229s | proposal: 'aes_ccm_c-192-null' 229s | token: '' '' "aes_ccm_c" '-' 229s | token: '' "aes_ccm_c" '-' "192" '-' 229s | token: '-' "192" '-' "null" '' 229s | token: '-' "null" '' '' 229s | appending ESP encryption algorithm AES_CCM_16[_192] 229s | parsing integ: 229s | appending ESP integrity algorithm NONE[_0] 229s | token: '' '' '' 229s | parsing 'aes_ccm_c-256-null' for ESP 229s | proposal: 'aes_ccm_c-256-null' 229s | token: '' '' "aes_ccm_c" '-' 229s | token: '' "aes_ccm_c" '-' "256" '-' 229s | token: '-' "256" '-' "null" '' 229s | token: '-' "null" '' '' 229s | appending ESP encryption algorithm AES_CCM_16[_256] 229s | parsing integ: 229s | appending ESP integrity algorithm NONE[_0] 229s | token: '' '' '' 229s | parsing 'aes_gcm' for ESP 229s | proposal: 'aes_gcm' 229s | token: '' '' "aes_gcm" '' 229s | token: '' "aes_gcm" '' '' 229s | token: '' '' '' 229s | appending ESP encryption algorithm AES_GCM_16[_0] 229s | appending ESP integrity algorithm NONE[_0] 229s | parsing 'aes_gcm_a-128-null' for ESP 229s | proposal: 'aes_gcm_a-128-null' 229s | token: '' '' "aes_gcm_a" '-' 229s | token: '' "aes_gcm_a" '-' "128" '-' 229s | token: '-' "128" '-' "null" '' 229s | token: '-' "null" '' '' 229s | appending ESP encryption algorithm AES_GCM_8[_128] 229s | parsing integ: 229s | appending ESP integrity algorithm NONE[_0] 229s | token: '' '' '' 229s | parsing 'aes_gcm_a-192-null' for ESP 229s | proposal: 'aes_gcm_a-192-null' 229s | token: '' '' "aes_gcm_a" '-' 229s | token: '' "aes_gcm_a" '-' "192" '-' 229s | token: '-' "192" '-' "null" '' 229s | token: '-' "null" '' '' 229s | appending ESP encryption algorithm AES_GCM_8[_192] 229s | parsing integ: 229s | appending ESP integrity algorithm NONE[_0] 229s | token: '' '' '' 229s | parsing 'aes_gcm_a-256-null' for ESP 229s | proposal: 'aes_gcm_a-256-null' 229s | token: '' '' "aes_gcm_a" '-' 229s | token: '' "aes_gcm_a" '-' "256" '-' 229s | token: '-' "256" '-' "null" '' 229s | token: '-' "null" '' '' 229s | appending ESP encryption algorithm AES_GCM_8[_256] 229s | parsing integ: 229s | appending ESP integrity algorithm NONE[_0] 229s | token: '' '' '' 229s | parsing 'aes_gcm_b-128-null' for ESP 229s | proposal: 'aes_gcm_b-128-null' 229s | token: '' '' "aes_gcm_b" '-' 229s | token: '' "aes_gcm_b" '-' "128" '-' 229s | token: '-' "128" '-' "null" '' 229s | token: '-' "null" '' '' 229s | appending ESP encryption algorithm AES_GCM_12[_128] 229s | parsing integ: 229s | appending ESP integrity algorithm NONE[_0] 229s | token: '' '' '' 229s | parsing 'aes_gcm_b-192-null' for ESP 229s | proposal: 'aes_gcm_b-192-null' 229s | token: '' '' "aes_gcm_b" '-' 229s | token: '' "aes_gcm_b" '-' "192" '-' 229s | token: '-' "192" '-' "null" '' 229s | token: '-' "null" '' '' 229s | appending ESP encryption algorithm AES_GCM_12[_192] 229s | parsing integ: 229s | appending ESP integrity algorithm NONE[_0] 229s | token: '' '' '' 229s | parsing 'aes_gcm_b-256-null' for ESP 229s | proposal: 'aes_gcm_b-256-null' 229s | token: '' '' "aes_gcm_b" '-' 229s | token: '' "aes_gcm_b" '-' "256" '-' 229s | token: '-' "256" '-' "null" '' 229s | token: '-' "null" '' '' 229s | appending ESP encryption algorithm AES_GCM_12[_256] 229s | parsing integ: 229s | appending ESP integrity algorithm NONE[_0] 229s | token: '' '' '' 229s | parsing 'aes_gcm_c-128-null' for ESP 229s | proposal: 'aes_gcm_c-128-null' 229s | token: '' '' "aes_gcm_c" '-' 229s | token: '' "aes_gcm_c" '-' "128" '-' 229s | token: '-' "128" '-' "null" '' 229s | token: '-' "null" '' '' 229s | appending ESP encryption algorithm AES_GCM_16[_128] 229s | parsing integ: 229s | appending ESP integrity algorithm NONE[_0] 229s | token: '' '' '' 229s | parsing 'aes_gcm_c-192-null' for ESP 229s | proposal: 'aes_gcm_c-192-null' 229s | token: '' '' "aes_gcm_c" '-' 229s | token: '' "aes_gcm_c" '-' "192" '-' 229s | token: '-' "192" '-' "null" '' 229s | token: '-' "null" '' '' 229s | appending ESP encryption algorithm AES_GCM_16[_192] 229s | parsing integ: 229s | appending ESP integrity algorithm NONE[_0] 229s | token: '' '' '' 229s | parsing 'aes_gcm_c-256-null' for ESP 229s | proposal: 'aes_gcm_c-256-null' 229s | token: '' '' "aes_gcm_c" '-' 229s | token: '' "aes_gcm_c" '-' "256" '-' 229s | token: '-' "256" '-' "null" '' 229s | token: '-' "null" '' '' 229s | appending ESP encryption algorithm AES_GCM_16[_256] 229s | parsing integ: 229s | appending ESP integrity algorithm NONE[_0] 229s | token: '' '' '' 229s | parsing 'aes_ccm_a-null' for ESP 229s | proposal: 'aes_ccm_a-null' 229s | token: '' '' "aes_ccm_a" '-' 229s | token: '' "aes_ccm_a" '-' "null" '' 229s | token: '-' "null" '' '' 229s | appending ESP encryption algorithm AES_CCM_8[_0] 229s | parsing integ: 229s | appending ESP integrity algorithm NONE[_0] 229s | token: '' '' '' 229s | parsing 'aes_ccm_b-null' for ESP 229s | proposal: 'aes_ccm_b-null' 229s | token: '' '' "aes_ccm_b" '-' 229s | token: '' "aes_ccm_b" '-' "null" '' 229s | token: '-' "null" '' '' 229s | appending ESP encryption algorithm AES_CCM_12[_0] 229s | parsing integ: 229s | appending ESP integrity algorithm NONE[_0] 229s | token: '' '' '' 229s | parsing 'aes_ccm_c-null' for ESP 229s | proposal: 'aes_ccm_c-null' 229s | token: '' '' "aes_ccm_c" '-' 229s | token: '' "aes_ccm_c" '-' "null" '' 229s | token: '-' "null" '' '' 229s | appending ESP encryption algorithm AES_CCM_16[_0] 229s | parsing integ: 229s | appending ESP integrity algorithm NONE[_0] 229s | token: '' '' '' 229s | parsing 'aes_gcm_a-null' for ESP 229s | proposal: 'aes_gcm_a-null' 229s | token: '' '' "aes_gcm_a" '-' 229s | token: '' "aes_gcm_a" '-' "null" '' 229s | token: '-' "null" '' '' 229s | appending ESP encryption algorithm AES_GCM_8[_0] 229s | parsing integ: 229s | appending ESP integrity algorithm NONE[_0] 229s | token: '' '' '' 229s | parsing 'aes_gcm_b-null' for ESP 229s | proposal: 'aes_gcm_b-null' 229s | token: '' '' "aes_gcm_b" '-' 229s | token: '' "aes_gcm_b" '-' "null" '' 229s | token: '-' "null" '' '' 229s | appending ESP encryption algorithm AES_GCM_12[_0] 229s | parsing integ: 229s | appending ESP integrity algorithm NONE[_0] 229s | token: '' '' '' 229s | parsing 'aes_gcm_c-null' for ESP 229s | proposal: 'aes_gcm_c-null' 229s | token: '' '' "aes_gcm_c" '-' 229s | token: '' "aes_gcm_c" '-' "null" '' 229s | token: '-' "null" '' '' 229s | appending ESP encryption algorithm AES_GCM_16[_0] 229s | parsing integ: 229s | appending ESP integrity algorithm NONE[_0] 229s | token: '' '' '' 229s | parsing 'aes_ccm-null' for ESP 229s | proposal: 'aes_ccm-null' 229s | token: '' '' "aes_ccm" '-' 229s | token: '' "aes_ccm" '-' "null" '' 229s | token: '-' "null" '' '' 229s | appending ESP encryption algorithm AES_CCM_16[_0] 229s | parsing integ: 229s | appending ESP integrity algorithm NONE[_0] 229s | token: '' '' '' 229s | parsing 'aes_gcm-null' for ESP 229s | proposal: 'aes_gcm-null' 229s | token: '' '' "aes_gcm" '-' 229s | token: '' "aes_gcm" '-' "null" '' 229s | token: '-' "null" '' '' 229s | appending ESP encryption algorithm AES_GCM_16[_0] 229s | parsing integ: 229s | appending ESP integrity algorithm NONE[_0] 229s | token: '' '' '' 229s | parsing 'aes_ccm-256-null' for ESP 229s | proposal: 'aes_ccm-256-null' 229s | token: '' '' "aes_ccm" '-' 229s | token: '' "aes_ccm" '-' "256" '-' 229s | token: '-' "256" '-' "null" '' 229s | token: '-' "null" '' '' 229s | appending ESP encryption algorithm AES_CCM_16[_256] 229s | parsing integ: 229s | appending ESP integrity algorithm NONE[_0] 229s | token: '' '' '' 229s | parsing 'aes_gcm-192-null' for ESP 229s | proposal: 'aes_gcm-192-null' 229s | token: '' '' "aes_gcm" '-' 229s | token: '' "aes_gcm" '-' "192" '-' 229s | token: '-' "192" '-' "null" '' 229s | token: '-' "null" '' '' 229s | appending ESP encryption algorithm AES_GCM_16[_192] 229s | parsing integ: 229s | appending ESP integrity algorithm NONE[_0] 229s | token: '' '' '' 229s | parsing 'aes_ccm_256-null' for ESP 229s | proposal: 'aes_ccm_256-null' 229s | token: '' '' "aes_ccm_256" '-' 229s | token: '' "aes_ccm_256" '-' "null" '' 229s | ike_alg_byname() failed: ESP encryption algorithm 'aes_ccm_256' is not recognized 229s | token: '-' "null" '' '' 229s | appending ESP encryption algorithm AES_CCM_16[_256] 229s | parsing integ: 229s | appending ESP integrity algorithm NONE[_0] 229s | token: '' '' '' 229s | parsing 'aes_gcm_192-null' for ESP 229s | proposal: 'aes_gcm_192-null' 229s | token: '' '' "aes_gcm_192" '-' 229s | token: '' "aes_gcm_192" '-' "null" '' 229s | ike_alg_byname() failed: ESP encryption algorithm 'aes_gcm_192' is not recognized 229s | token: '-' "null" '' '' 229s | appending ESP encryption algorithm AES_GCM_16[_192] 229s | parsing integ: 229s | appending ESP integrity algorithm NONE[_0] 229s | token: '' '' '' 229s | parsing 'aes_ccm_8-null' for ESP 229s | proposal: 'aes_ccm_8-null' 229s | token: '' '' "aes_ccm_8" '-' 229s | token: '' "aes_ccm_8" '-' "null" '' 229s | token: '-' "null" '' '' 229s | appending ESP encryption algorithm AES_CCM_8[_0] 229s | parsing integ: 229s | appending ESP integrity algorithm NONE[_0] 229s | token: '' '' '' 229s | parsing 'aes_ccm_12-null' for ESP 229s | proposal: 'aes_ccm_12-null' 229s | token: '' '' "aes_ccm_12" '-' 229s | token: '' "aes_ccm_12" '-' "null" '' 229s | token: '-' "null" '' '' 229s | appending ESP encryption algorithm AES_CCM_12[_0] 229s | parsing integ: 229s | appending ESP integrity algorithm NONE[_0] 229s | token: '' '' '' 229s | parsing 'aes_ccm_16-null' for ESP 229s | proposal: 'aes_ccm_16-null' 229s | token: '' '' "aes_ccm_16" '-' 229s | token: '' "aes_ccm_16" '-' "null" '' 229s | token: '-' "null" '' '' 229s | appending ESP encryption algorithm AES_CCM_16[_0] 229s | parsing integ: 229s | appending ESP integrity algorithm NONE[_0] 229s | token: '' '' '' 229s | parsing 'aes_gcm_8-null' for ESP 229s | proposal: 'aes_gcm_8-null' 229s | token: '' '' "aes_gcm_8" '-' 229s | token: '' "aes_gcm_8" '-' "null" '' 229s | token: '-' "null" '' '' 229s | appending ESP encryption algorithm AES_GCM_8[_0] 229s | parsing integ: 229s | appending ESP integrity algorithm NONE[_0] 229s | token: '' '' '' 229s | parsing 'aes_gcm_12-null' for ESP 229s | proposal: 'aes_gcm_12-null' 229s | token: '' '' "aes_gcm_12" '-' 229s | token: '' "aes_gcm_12" '-' "null" '' 229s | token: '-' "null" '' '' 229s | appending ESP encryption algorithm AES_GCM_12[_0] 229s | parsing integ: 229s | appending ESP integrity algorithm NONE[_0] 229s | token: '' '' '' 229s | parsing 'aes_gcm_16-null' for ESP 229s | proposal: 'aes_gcm_16-null' 229s | token: '' '' "aes_gcm_16" '-' 229s | token: '' "aes_gcm_16" '-' "null" '' 229s | token: '-' "null" '' '' 229s | appending ESP encryption algorithm AES_GCM_16[_0] 229s | parsing integ: 229s | appending ESP integrity algorithm NONE[_0] 229s | token: '' '' '' 229s | parsing 'aes_ccm_8-128-null' for ESP 229s | proposal: 'aes_ccm_8-128-null' 229s | token: '' '' "aes_ccm_8" '-' 229s | token: '' "aes_ccm_8" '-' "128" '-' 229s | token: '-' "128" '-' "null" '' 229s | token: '-' "null" '' '' 229s | appending ESP encryption algorithm AES_CCM_8[_128] 229s | parsing integ: 229s | appending ESP integrity algorithm NONE[_0] 229s | token: '' '' '' 229s | parsing 'aes_ccm_12-192-null' for ESP 229s | proposal: 'aes_ccm_12-192-null' 229s | token: '' '' "aes_ccm_12" '-' 229s | token: '' "aes_ccm_12" '-' "192" '-' 229s | token: '-' "192" '-' "null" '' 229s | token: '-' "null" '' '' 229s | appending ESP encryption algorithm AES_CCM_12[_192] 229s | parsing integ: 229s | appending ESP integrity algorithm NONE[_0] 229s | token: '' '' '' 229s | parsing 'aes_ccm_16-256-null' for ESP 229s | proposal: 'aes_ccm_16-256-null' 229s | token: '' '' "aes_ccm_16" '-' 229s | token: '' "aes_ccm_16" '-' "256" '-' 229s | token: '-' "256" '-' "null" '' 229s | token: '-' "null" '' '' 229s | appending ESP encryption algorithm AES_CCM_16[_256] 229s | parsing integ: 229s | appending ESP integrity algorithm NONE[_0] 229s | token: '' '' '' 229s | parsing 'aes_gcm_8-128-null' for ESP 229s | proposal: 'aes_gcm_8-128-null' 229s | token: '' '' "aes_gcm_8" '-' 229s | token: '' "aes_gcm_8" '-' "128" '-' 229s | token: '-' "128" '-' "null" '' 229s | token: '-' "null" '' '' 229s | appending ESP encryption algorithm AES_GCM_8[_128] 229s | parsing integ: 229s | appending ESP integrity algorithm NONE[_0] 229s | token: '' '' '' 229s | parsing 'aes_gcm_12-192-null' for ESP 229s | proposal: 'aes_gcm_12-192-null' 229s | token: '' '' "aes_gcm_12" '-' 229s | token: '' "aes_gcm_12" '-' "192" '-' 229s | token: '-' "192" '-' "null" '' 229s | token: '-' "null" '' '' 229s | appending ESP encryption algorithm AES_GCM_12[_192] 229s | parsing integ: 229s | appending ESP integrity algorithm NONE[_0] 229s | token: '' '' '' 229s | parsing 'aes_gcm_16-256-null' for ESP 229s | proposal: 'aes_gcm_16-256-null' 229s | token: '' '' "aes_gcm_16" '-' 229s | token: '' "aes_gcm_16" '-' "256" '-' 229s | token: '-' "256" '-' "null" '' 229s | token: '-' "null" '' '' 229s | appending ESP encryption algorithm AES_GCM_16[_256] 229s | parsing integ: 229s | appending ESP integrity algorithm NONE[_0] 229s | token: '' '' '' 229s | parsing 'aes_ccm_8_128-null' for ESP 229s | proposal: 'aes_ccm_8_128-null' 229s | token: '' '' "aes_ccm_8_128" '-' 229s | token: '' "aes_ccm_8_128" '-' "null" '' 229s | ike_alg_byname() failed: ESP encryption algorithm 'aes_ccm_8_128' is not recognized 229s | token: '-' "null" '' '' 229s | appending ESP encryption algorithm AES_CCM_8[_128] 229s | parsing integ: 229s | appending ESP integrity algorithm NONE[_0] 229s | token: '' '' '' 229s | parsing 'aes_ccm_12_192-null' for ESP 229s | proposal: 'aes_ccm_12_192-null' 229s | token: '' '' "aes_ccm_12_192" '-' 229s | token: '' "aes_ccm_12_192" '-' "null" '' 229s | ike_alg_byname() failed: ESP encryption algorithm 'aes_ccm_12_192' is not recognized 229s | token: '-' "null" '' '' 229s | appending ESP encryption algorithm AES_CCM_12[_192] 229s | parsing integ: 229s | appending ESP integrity algorithm NONE[_0] 229s | token: '' '' '' 229s | parsing 'aes_ccm_16_256-null' for ESP 229s | proposal: 'aes_ccm_16_256-null' 229s | token: '' '' "aes_ccm_16_256" '-' 229s | token: '' "aes_ccm_16_256" '-' "null" '' 229s | ike_alg_byname() failed: ESP encryption algorithm 'aes_ccm_16_256' is not recognized 229s | token: '-' "null" '' '' 229s | appending ESP encryption algorithm AES_CCM_16[_256] 229s | parsing integ: 229s | appending ESP integrity algorithm NONE[_0] 229s | token: '' '' '' 229s | parsing 'aes_gcm_8_128-null' for ESP 229s | proposal: 'aes_gcm_8_128-null' 229s | token: '' '' "aes_gcm_8_128" '-' 229s | token: '' "aes_gcm_8_128" '-' "null" '' 229s | ike_alg_byname() failed: ESP encryption algorithm 'aes_gcm_8_128' is not recognized 229s | token: '-' "null" '' '' 229s | appending ESP encryption algorithm AES_GCM_8[_128] 229s | parsing integ: 229s | appending ESP integrity algorithm NONE[_0] 229s | token: '' '' '' 229s | parsing 'aes_gcm_12_192-null' for ESP 229s | proposal: 'aes_gcm_12_192-null' 229s | token: '' '' "aes_gcm_12_192" '-' 229s | token: '' "aes_gcm_12_192" '-' "null" '' 229s | ike_alg_byname() failed: ESP encryption algorithm 'aes_gcm_12_192' is not recognized 229s | token: '-' "null" '' '' 229s | appending ESP encryption algorithm AES_GCM_12[_192] 229s | parsing integ: 229s | appending ESP integrity algorithm NONE[_0] 229s | token: '' '' '' 229s | parsing 'aes_gcm_16_256-null' for ESP 229s | proposal: 'aes_gcm_16_256-null' 229s | token: '' '' "aes_gcm_16_256" '-' 229s | token: '' "aes_gcm_16_256" '-' "null" '' 229s | ike_alg_byname() failed: ESP encryption algorithm 'aes_gcm_16_256' is not recognized 229s | token: '-' "null" '' '' 229s | appending ESP encryption algorithm AES_GCM_16[_256] 229s | parsing integ: 229s | appending ESP integrity algorithm NONE[_0] 229s | token: '' '' '' 229s | parsing 'aes_ctr' for ESP 229s | proposal: 'aes_ctr' 229s | token: '' '' "aes_ctr" '' 229s | token: '' "aes_ctr" '' '' 229s | token: '' '' '' 229s | appending ESP encryption algorithm AES_CTR[_0] 229s | appending ESP integrity algorithm HMAC_SHA2_512_256[_0] 229s | appending ESP integrity algorithm HMAC_SHA2_256_128[_0] 229s | parsing 'aesctr' for ESP 229s | proposal: 'aesctr' 229s | token: '' '' "aesctr" '' 229s | token: '' "aesctr" '' '' 229s | token: '' '' '' 229s | appending ESP encryption algorithm AES_CTR[_0] 229s | appending ESP integrity algorithm HMAC_SHA2_512_256[_0] 229s | appending ESP integrity algorithm HMAC_SHA2_256_128[_0] 229s | parsing 'aes_ctr128' for ESP 229s | proposal: 'aes_ctr128' 229s | token: '' '' "aes_ctr128" '' 229s | token: '' "aes_ctr128" '' '' 229s | ike_alg_byname() failed: ESP encryption algorithm 'aes_ctr128' is not recognized 229s | token: '' '' '' 229s | appending ESP encryption algorithm AES_CTR[_128] 229s | appending ESP integrity algorithm HMAC_SHA2_512_256[_0] 229s | appending ESP integrity algorithm HMAC_SHA2_256_128[_0] 229s | parsing 'aes_ctr192' for ESP 229s | proposal: 'aes_ctr192' 229s | token: '' '' "aes_ctr192" '' 229s | token: '' "aes_ctr192" '' '' 229s | ike_alg_byname() failed: ESP encryption algorithm 'aes_ctr192' is not recognized 229s | token: '' '' '' 229s | appending ESP encryption algorithm AES_CTR[_192] 229s | appending ESP integrity algorithm HMAC_SHA2_512_256[_0] 229s | appending ESP integrity algorithm HMAC_SHA2_256_128[_0] 229s | parsing 'aes_ctr256' for ESP 229s | proposal: 'aes_ctr256' 229s | token: '' '' "aes_ctr256" '' 229s | token: '' "aes_ctr256" '' '' 229s | ike_alg_byname() failed: ESP encryption algorithm 'aes_ctr256' is not recognized 229s | token: '' '' '' 229s | appending ESP encryption algorithm AES_CTR[_256] 229s | appending ESP integrity algorithm HMAC_SHA2_512_256[_0] 229s | appending ESP integrity algorithm HMAC_SHA2_256_128[_0] 229s | parsing 'camellia_cbc_256-hmac_sha2_512_256;modp8192' for ESP 229s | proposal: 'camellia_cbc_256-hmac_sha2_512_256;modp8192' 229s | token: '' '' "camellia_cbc_256" '-' 229s | token: '' "camellia_cbc_256" '-' "hmac_sha2_512_256" ';' 229s | ike_alg_byname() failed: ESP encryption algorithm 'camellia_cbc_256' is not recognized 229s | token: '-' "hmac_sha2_512_256" ';' "modp8192" '' 229s | appending ESP encryption algorithm CAMELLIA_CBC[_256] 229s | parsing integ: 229s | appending ESP integrity algorithm HMAC_SHA2_512_256[_0] 229s | token: ';' "modp8192" '' '' 229s | parsing dh: 229s | appending ESP DH algorithm MODP8192[_0] 229s | token: '' '' '' 229s ipsec algparse: ignoring ESP DH algorithm MODP8192 as PFS policy is disabled 229s | parsing 'null_auth_aes_gmac_256-null;modp8192' for ESP 229s | proposal: 'null_auth_aes_gmac_256-null;modp8192' 229s | token: '' '' "null_auth_aes_gmac_256" '-' 229s | token: '' "null_auth_aes_gmac_256" '-' "null" ';' 229s | ike_alg_byname() failed: ESP encryption algorithm 'null_auth_aes_gmac_256' is not recognized 229s | token: '-' "null" ';' "modp8192" '' 229s | appending ESP encryption algorithm NULL_AUTH_AES_GMAC[_256] 229s | parsing integ: 229s | appending ESP integrity algorithm NONE[_0] 229s | token: ';' "modp8192" '' '' 229s | parsing dh: 229s | appending ESP DH algorithm MODP8192[_0] 229s | token: '' '' '' 229s ipsec algparse: ignoring ESP DH algorithm MODP8192 as PFS policy is disabled 229s | parsing '3des-sha1;modp8192' for ESP 229s | proposal: '3des-sha1;modp8192' 229s | token: '' '' "3des" '-' 229s | token: '' "3des" '-' "sha1" ';' 229s | token: '-' "sha1" ';' "modp8192" '' 229s | appending ESP encryption algorithm 3DES_CBC[_0] 229s | parsing integ: 229s | appending ESP integrity algorithm HMAC_SHA1_96[_0] 229s | token: ';' "modp8192" '' '' 229s | parsing dh: 229s | appending ESP DH algorithm MODP8192[_0] 229s | token: '' '' '' 229s ipsec algparse: ignoring ESP DH algorithm MODP8192 as PFS policy is disabled 229s | parsing '3des-sha1-modp8192' for ESP 229s | proposal: '3des-sha1-modp8192' 229s | token: '' '' "3des" '-' 229s | token: '' "3des" '-' "sha1" '-' 229s | token: '-' "sha1" '-' "modp8192" '' 229s | appending ESP encryption algorithm 3DES_CBC[_0] 229s | parsing integ: 229s | appending ESP integrity algorithm HMAC_SHA1_96[_0] 229s | token: '-' "modp8192" '' '' 229s | parsing dh: 229s | appending ESP DH algorithm MODP8192[_0] 229s | token: '' '' '' 229s ipsec algparse: ignoring ESP DH algorithm MODP8192 as PFS policy is disabled 229s | parsing 'aes-sha1,3des-sha1;modp8192' for ESP 229s | proposal: 'aes-sha1' 229s | token: '' '' "aes" '-' 229s | token: '' "aes" '-' "sha1" '' 229s | token: '-' "sha1" '' '' 229s | appending ESP encryption algorithm AES_CBC[_0] 229s | parsing integ: 229s | appending ESP integrity algorithm HMAC_SHA1_96[_0] 229s | token: '' '' '' 229s | proposal: '3des-sha1;modp8192' 229s | token: '' '' "3des" '-' 229s | token: '' "3des" '-' "sha1" ';' 229s | token: '-' "sha1" ';' "modp8192" '' 229s | appending ESP encryption algorithm 3DES_CBC[_0] 229s | parsing integ: 229s | appending ESP integrity algorithm HMAC_SHA1_96[_0] 229s | token: ';' "modp8192" '' '' 229s | parsing dh: 229s | appending ESP DH algorithm MODP8192[_0] 229s | token: '' '' '' 229s ipsec algparse: ignoring ESP DH algorithm MODP8192 as PFS policy is disabled 229s | parsing 'aes-sha1-modp8192,3des-sha1-modp8192' for ESP 229s | proposal: 'aes-sha1-modp8192' 229s | token: '' '' "aes" '-' 229s | token: '' "aes" '-' "sha1" '-' 229s | token: '-' "sha1" '-' "modp8192" '' 229s | appending ESP encryption algorithm AES_CBC[_0] 229s | parsing integ: 229s | appending ESP integrity algorithm HMAC_SHA1_96[_0] 229s | token: '-' "modp8192" '' '' 229s | parsing dh: 229s | appending ESP DH algorithm MODP8192[_0] 229s | token: '' '' '' 229s | proposal: '3des-sha1-modp8192' 229s | token: '' '' "3des" '-' 229s | token: '' "3des" '-' "sha1" '-' 229s | token: '-' "sha1" '-' "modp8192" '' 229s | appending ESP encryption algorithm 3DES_CBC[_0] 229s | parsing integ: 229s | appending ESP integrity algorithm HMAC_SHA1_96[_0] 229s | token: '-' "modp8192" '' '' 229s | parsing dh: 229s | appending ESP DH algorithm MODP8192[_0] 229s | token: '' '' '' 229s ipsec algparse: ignoring ESP DH algorithm MODP8192 as PFS policy is disabled 229s ipsec algparse: ignoring ESP DH algorithm MODP8192 as PFS policy is disabled 229s | parsing 'aes-sha1-modp8192,aes-sha1-modp8192,aes-sha1-modp8192' for ESP 229s | proposal: 'aes-sha1-modp8192' 229s | token: '' '' "aes" '-' 229s | token: '' "aes" '-' "sha1" '-' 229s | token: '-' "sha1" '-' "modp8192" '' 229s | appending ESP encryption algorithm AES_CBC[_0] 229s | parsing integ: 229s | appending ESP integrity algorithm HMAC_SHA1_96[_0] 229s | token: '-' "modp8192" '' '' 229s | parsing dh: 229s | appending ESP DH algorithm MODP8192[_0] 229s | token: '' '' '' 229s | proposal: 'aes-sha1-modp8192' 229s | token: '' '' "aes" '-' 229s | token: '' "aes" '-' "sha1" '-' 229s | token: '-' "sha1" '-' "modp8192" '' 229s | appending ESP encryption algorithm AES_CBC[_0] 229s | parsing integ: 229s | appending ESP integrity algorithm HMAC_SHA1_96[_0] 229s | token: '-' "modp8192" '' '' 229s | parsing dh: 229s | appending ESP DH algorithm MODP8192[_0] 229s | token: '' '' '' 229s | proposal: 'aes-sha1-modp8192' 229s | token: '' '' "aes" '-' 229s | token: '' "aes" '-' "sha1" '-' 229s | token: '-' "sha1" '-' "modp8192" '' 229s | appending ESP encryption algorithm AES_CBC[_0] 229s | parsing integ: 229s | appending ESP integrity algorithm HMAC_SHA1_96[_0] 229s | token: '-' "modp8192" '' '' 229s | parsing dh: 229s | appending ESP DH algorithm MODP8192[_0] 229s | token: '' '' '' 229s ipsec algparse: ignoring ESP DH algorithm MODP8192 as PFS policy is disabled 229s | parsing 'aes;none' for ESP 229s | proposal: 'aes;none' 229s | token: '' '' "aes" ';' 229s | token: '' "aes" ';' "none" '' 229s | token: ';' "none" '' '' 229s | appending ESP encryption algorithm AES_CBC[_0] 229s | parsing dh: 229s | appending ESP DH algorithm NONE[_0] 229s | token: '' '' '' 229s | appending ESP integrity algorithm HMAC_SHA2_512_256[_0] 229s | appending ESP integrity algorithm HMAC_SHA2_256_128[_0] 229s ipsec algparse: ignoring redundant ESP DH algorithm NONE as PFS policy is disabled 229s | parsing 'aes;none,aes' for ESP 229s | proposal: 'aes;none' 229s | token: '' '' "aes" ';' 229s | token: '' "aes" ';' "none" '' 229s | token: ';' "none" '' '' 229s | appending ESP encryption algorithm AES_CBC[_0] 229s | parsing dh: 229s | appending ESP DH algorithm NONE[_0] 229s | token: '' '' '' 229s | appending ESP integrity algorithm HMAC_SHA2_512_256[_0] 229s | appending ESP integrity algorithm HMAC_SHA2_256_128[_0] 229s | proposal: 'aes' 229s | token: '' '' "aes" '' 229s | token: '' "aes" '' '' 229s | token: '' '' '' 229s | appending ESP encryption algorithm AES_CBC[_0] 229s | appending ESP integrity algorithm HMAC_SHA2_512_256[_0] 229s | appending ESP integrity algorithm HMAC_SHA2_256_128[_0] 229s ipsec algparse: ignoring redundant ESP DH algorithm NONE as PFS policy is disabled 229s | parsing 'aes;none,aes;modp2048' for ESP 229s | proposal: 'aes;none' 229s | token: '' '' "aes" ';' 229s | token: '' "aes" ';' "none" '' 229s | token: ';' "none" '' '' 229s | appending ESP encryption algorithm AES_CBC[_0] 229s | parsing dh: 229s | appending ESP DH algorithm NONE[_0] 229s | token: '' '' '' 229s | appending ESP integrity algorithm HMAC_SHA2_512_256[_0] 229s | appending ESP integrity algorithm HMAC_SHA2_256_128[_0] 229s | proposal: 'aes;modp2048' 229s | token: '' '' "aes" ';' 229s | token: '' "aes" ';' "modp2048" '' 229s | token: ';' "modp2048" '' '' 229s | appending ESP encryption algorithm AES_CBC[_0] 229s | parsing dh: 229s | appending ESP DH algorithm MODP2048[_0] 229s | token: '' '' '' 229s | appending ESP integrity algorithm HMAC_SHA2_512_256[_0] 229s | appending ESP integrity algorithm HMAC_SHA2_256_128[_0] 229s ipsec algparse: ignoring redundant ESP DH algorithm NONE as PFS policy is disabled 229s ipsec algparse: ignoring ESP DH algorithm MODP2048 as PFS policy is disabled 229s | parsing 'aes-sha1-none' for ESP 229s | proposal: 'aes-sha1-none' 229s | token: '' '' "aes" '-' 229s | token: '' "aes" '-' "sha1" '-' 229s | token: '-' "sha1" '-' "none" '' 229s | appending ESP encryption algorithm AES_CBC[_0] 229s | parsing integ: 229s | appending ESP integrity algorithm HMAC_SHA1_96[_0] 229s | token: '-' "none" '' '' 229s | parsing dh: 229s | appending ESP DH algorithm NONE[_0] 229s | token: '' '' '' 229s ipsec algparse: ignoring redundant ESP DH algorithm NONE as PFS policy is disabled 229s | parsing 'aes-sha1;none' for ESP 229s | proposal: 'aes-sha1;none' 229s | token: '' '' "aes" '-' 229s | token: '' "aes" '-' "sha1" ';' 229s | token: '-' "sha1" ';' "none" '' 229s | appending ESP encryption algorithm AES_CBC[_0] 229s | parsing integ: 229s | appending ESP integrity algorithm HMAC_SHA1_96[_0] 229s | token: ';' "none" '' '' 229s | parsing dh: 229s | appending ESP DH algorithm NONE[_0] 229s | token: '' '' '' 229s ipsec algparse: ignoring redundant ESP DH algorithm NONE as PFS policy is disabled 229s | parsing '3des168-sha1' for ESP 229s | proposal: '3des168-sha1' 229s | token: '' '' "3des168" '-' 229s | token: '' "3des168" '-' "sha1" '' 229s | ike_alg_byname() failed: ESP encryption algorithm '3des168' is not recognized 229s | parsing '3des-null' for ESP 229s | proposal: '3des-null' 229s | token: '' '' "3des" '-' 229s | token: '' "3des" '-' "null" '' 229s | token: '-' "null" '' '' 229s | appending ESP encryption algorithm 3DES_CBC[_0] 229s | parsing integ: 229s | appending ESP integrity algorithm NONE[_0] 229s | token: '' '' '' 229s | parsing 'aes128-null' for ESP 229s | proposal: 'aes128-null' 229s | token: '' '' "aes128" '-' 229s | token: '' "aes128" '-' "null" '' 229s | ike_alg_byname() failed: ESP encryption algorithm 'aes128' is not recognized 229s | token: '-' "null" '' '' 229s | appending ESP encryption algorithm AES_CBC[_128] 229s | parsing integ: 229s | appending ESP integrity algorithm NONE[_0] 229s | token: '' '' '' 229s | parsing 'aes224-sha1' for ESP 229s | proposal: 'aes224-sha1' 229s | token: '' '' "aes224" '-' 229s | token: '' "aes224" '-' "sha1" '' 229s | ike_alg_byname() failed: ESP encryption algorithm 'aes224' is not recognized 229s | parsing 'aes-224-sha1' for ESP 229s | proposal: 'aes-224-sha1' 229s | token: '' '' "aes" '-' 229s | token: '' "aes" '-' "224" '-' 229s | byname('aes') with ='224' failed: ESP encryption algorithm AES_CBC with key length 224 invalid; valid key lengths: 128, 192, 256 229s | parsing 'aes0-sha1' for ESP 229s | proposal: 'aes0-sha1' 229s | token: '' '' "aes0" '-' 229s | token: '' "aes0" '-' "sha1" '' 229s | ike_alg_byname() failed: ESP encryption algorithm 'aes0' is not recognized 229s | parsing 'aes-0-sha1' for ESP 229s | proposal: 'aes-0-sha1' 229s | token: '' '' "aes" '-' 229s | token: '' "aes" '-' "0" '-' 229s | parsing 'aes512-sha1' for ESP 229s | proposal: 'aes512-sha1' 229s | token: '' '' "aes512" '-' 229s | token: '' "aes512" '-' "sha1" '' 229s | ike_alg_byname() failed: ESP encryption algorithm 'aes512' is not recognized 229s | parsing 'aes-sha1555' for ESP 229s | proposal: 'aes-sha1555' 229s | token: '' '' "aes" '-' 229s | token: '' "aes" '-' "sha1555" '' 229s | token: '-' "sha1555" '' '' 229s | appending ESP encryption algorithm AES_CBC[_0] 229s | parsing integ: 229s | ike_alg_byname() failed: ESP integrity algorithm 'sha1555' is not recognized 229s | lookup for integrity algorithm 'sha1555' failed 229s | or - failed 'ESP integrity algorithm 'sha1555' is not recognized') 229s | parsing 'camellia666-sha1' for ESP 229s | proposal: 'camellia666-sha1' 229s | token: '' '' "camellia666" '-' 229s | token: '' "camellia666" '-' "sha1" '' 229s ERROR: ESP integrity algorithm 'sha1555' is not recognized 229s algparse -v2 'esp=camellia666-sha1' (expect ERROR) 229s ERROR: ESP encryption algorithm CAMELLIA_CBC with key length 666 invalid; valid key lengths: 128, 192, 256 229s algparse -v2 'esp=blowfish' (expect ERROR) 229s ERROR: ESP encryption algorithm 'blowfish' is not supported 229s algparse -v2 'esp=des-sha1' (expect ERROR) 229s ERROR: ESP encryption algorithm 'des' is not supported 229s algparse -v2 'esp=aes_ctr666' (expect ERROR) 229s ERROR: ESP encryption algorithm AES_CTR with key length 666 invalid; valid key lengths: 128, 192, 256 229s algparse -v2 'esp=aes128-sha2_128' (expect ERROR) 229s ERROR: ESP integrity algorithm 'sha2_128' is not recognized 229s algparse -v2 'esp=aes256-sha2_256-4096' (expect ERROR) 229s ERROR: ESP DH algorithm '4096' is not recognized 229s algparse -v2 'esp=aes256-sha2_256-128' (expect ERROR) 229s ERROR: ESP DH algorithm '128' is not recognized 229s algparse -v2 'esp=vanitycipher' (expect ERROR) 229s ERROR: ESP encryption algorithm 'vanitycipher' is not recognized 229s algparse -v2 'esp=ase-sah' (expect ERROR) 229s ERROR: ESP encryption algorithm 'ase' is not recognized 229s algparse -v2 'esp=aes-sah1' (expect ERROR) 229s ERROR: ESP integrity algorithm 'sah1' is not recognized 229s algparse -v2 'esp=id3' (expect ERROR) 229s ERROR: ESP encryption algorithm 'id3' is not recognized 229s algparse -v2 'esp=aes-id3' (expect ERROR) 229s ERROR: ESP integrity algorithm 'id3' is not recognized 229s algparse -v2 'esp=aes_gcm-md5' (expect ERROR) 229s ERROR: AEAD ESP encryption algorithm AES_GCM_16 must have 'NONE' as the integrity algorithm 229s algparse -v2 'esp=mars' (expect ERROR) 229s ERROR: ESP encryption algorithm 'mars' is not supported 229s algparse -v2 'esp=aes_gcm-16' (expect ERROR) 229s ERROR: ESP encryption algorithm AES_GCM_16 with key length 16 invalid; valid key lengths: 128, 192, 256 229s algparse -v2 'esp=aes_gcm-0' (expect ERROR) 229s ERROR: ESP encryption key length is zero 229s algparse -v2 'esp=aes_gcm-123456789012345' (expect ERROR) 229s ERROR: ESP encryption algorithm 'aes_gcm-123456789012345' key length WAY too big 229s algparse -v2 'esp=3des-sha1;dh22' (expect ERROR) 229s ERROR: ESP DH algorithm 'dh22' is not supported 229s algparse -v2 'esp=3des-sha1;modp8192,3des-sha2' (expect SUCCESS) 229s | ike_alg_byname() failed: ESP encryption algorithm 'camellia666' is not recognized 229s | parsing 'blowfish' for ESP 229s | proposal: 'blowfish' 229s | token: '' '' "blowfish" '' 229s | token: '' "blowfish" '' '' 229s | ike_alg_byname() failed: ESP encryption algorithm 'blowfish' is not supported 229s | parsing 'des-sha1' for ESP 229s | proposal: 'des-sha1' 229s | token: '' '' "des" '-' 229s | token: '' "des" '-' "sha1" '' 229s | ike_alg_byname() failed: ESP encryption algorithm 'des' is not supported 229s | parsing 'aes_ctr666' for ESP 229s | proposal: 'aes_ctr666' 229s | token: '' '' "aes_ctr666" '' 229s | token: '' "aes_ctr666" '' '' 229s | ike_alg_byname() failed: ESP encryption algorithm 'aes_ctr666' is not recognized 229s | parsing 'aes128-sha2_128' for ESP 229s | proposal: 'aes128-sha2_128' 229s | token: '' '' "aes128" '-' 229s | token: '' "aes128" '-' "sha2_128" '' 229s | ike_alg_byname() failed: ESP encryption algorithm 'aes128' is not recognized 229s | token: '-' "sha2_128" '' '' 229s | appending ESP encryption algorithm AES_CBC[_128] 229s | parsing integ: 229s | ike_alg_byname() failed: ESP integrity algorithm 'sha2_128' is not recognized 229s | lookup for integrity algorithm 'sha2_128' failed 229s | or - failed 'ESP integrity algorithm 'sha2_128' is not recognized') 229s | parsing 'aes256-sha2_256-4096' for ESP 229s | proposal: 'aes256-sha2_256-4096' 229s | token: '' '' "aes256" '-' 229s | token: '' "aes256" '-' "sha2_256" '-' 229s | ike_alg_byname() failed: ESP encryption algorithm 'aes256' is not recognized 229s | token: '-' "sha2_256" '-' "4096" '' 229s | appending ESP encryption algorithm AES_CBC[_256] 229s | parsing integ: 229s | appending ESP integrity algorithm HMAC_SHA2_256_128[_0] 229s | token: '-' "4096" '' '' 229s | parsing dh: 229s | ike_alg_byname() failed: ESP DH algorithm '4096' is not recognized 229s | lookup for DH algorithm '4096' failed 229s | ... failed 'ESP DH algorithm '4096' is not recognized' 229s | parsing 'aes256-sha2_256-128' for ESP 229s | proposal: 'aes256-sha2_256-128' 229s | token: '' '' "aes256" '-' 229s | token: '' "aes256" '-' "sha2_256" '-' 229s | ike_alg_byname() failed: ESP encryption algorithm 'aes256' is not recognized 229s | token: '-' "sha2_256" '-' "128" '' 229s | appending ESP encryption algorithm AES_CBC[_256] 229s | parsing integ: 229s | appending ESP integrity algorithm HMAC_SHA2_256_128[_0] 229s | token: '-' "128" '' '' 229s | parsing dh: 229s | ike_alg_byname() failed: ESP DH algorithm '128' is not recognized 229s | lookup for DH algorithm '128' failed 229s | ... failed 'ESP DH algorithm '128' is not recognized' 229s | parsing 'vanitycipher' for ESP 229s | proposal: 'vanitycipher' 229s | token: '' '' "vanitycipher" '' 229s | token: '' "vanitycipher" '' '' 229s | ike_alg_byname() failed: ESP encryption algorithm 'vanitycipher' is not recognized 229s | parsing 'ase-sah' for ESP 229s | proposal: 'ase-sah' 229s | token: '' '' "ase" '-' 229s | token: '' "ase" '-' "sah" '' 229s | ike_alg_byname() failed: ESP encryption algorithm 'ase' is not recognized 229s | parsing 'aes-sah1' for ESP 229s | proposal: 'aes-sah1' 229s | token: '' '' "aes" '-' 229s | token: '' "aes" '-' "sah1" '' 229s | token: '-' "sah1" '' '' 229s | appending ESP encryption algorithm AES_CBC[_0] 229s | parsing integ: 229s | ike_alg_byname() failed: ESP integrity algorithm 'sah1' is not recognized 229s | lookup for integrity algorithm 'sah1' failed 229s | or - failed 'ESP integrity algorithm 'sah1' is not recognized') 229s | parsing 'id3' for ESP 229s | proposal: 'id3' 229s | token: '' '' "id3" '' 229s | token: '' "id3" '' '' 229s | ike_alg_byname() failed: ESP encryption algorithm 'id3' is not recognized 229s | ike_alg_byname() failed: ESP encryption algorithm 'id3' is not recognized 229s | parsing 'aes-id3' for ESP 229s | proposal: 'aes-id3' 229s | token: '' '' "aes" '-' 229s | token: '' "aes" '-' "id3" '' 229s | token: '-' "id3" '' '' 229s | appending ESP encryption algorithm AES_CBC[_0] 229s | parsing integ: 229s | ike_alg_byname() failed: ESP integrity algorithm 'id3' is not recognized 229s | lookup for integrity algorithm 'id3' failed 229s | or - failed 'ESP integrity algorithm 'id3' is not recognized') 229s | parsing 'aes_gcm-md5' for ESP 229s | proposal: 'aes_gcm-md5' 229s | token: '' '' "aes_gcm" '-' 229s | token: '' "aes_gcm" '-' "md5" '' 229s | token: '-' "md5" '' '' 229s | appending ESP encryption algorithm AES_GCM_16[_0] 229s | parsing integ: 229s | appending ESP integrity algorithm HMAC_MD5_96[_0] 229s | token: '' '' '' 229s | parsing 'mars' for ESP 229s | proposal: 'mars' 229s | token: '' '' "mars" '' 229s | token: '' "mars" '' '' 229s | ike_alg_byname() failed: ESP encryption algorithm 'mars' is not supported 229s | parsing 'aes_gcm-16' for ESP 229s | proposal: 'aes_gcm-16' 229s | token: '' '' "aes_gcm" '-' 229s | token: '' "aes_gcm" '-' "16" '' 229s | byname('aes_gcm') with ='16' failed: ESP encryption algorithm AES_GCM_16 with key length 16 invalid; valid key lengths: 128, 192, 256 229s | parsing 'aes_gcm-0' for ESP 229s | proposal: 'aes_gcm-0' 229s | token: '' '' "aes_gcm" '-' 229s | token: '' "aes_gcm" '-' "0" '' 229s | parsing 'aes_gcm-123456789012345' for ESP 229s | proposal: 'aes_gcm-123456789012345' 229s | token: '' '' "aes_gcm" '-' 229s | token: '' "aes_gcm" '-' "123456789012345" '' 229s | parsing '3des-sha1;dh22' for ESP 229s | proposal: '3des-sha1;dh22' 229s | token: '' '' "3des" '-' 229s | token: '' "3des" '-' "sha1" ';' 229s | token: '-' "sha1" ';' "dh22" '' 229s | appending ESP encryption algorithm 3DES_CBC[_0] 229s | parsing integ: 229s | appending ESP integrity algorithm HMAC_SHA1_96[_0] 229s | token: ';' "dh22" '' '' 229s | parsing dh: 229s | ike_alg_byname() failed: ESP DH algorithm 'dh22' is not supported 229s | lookup for DH algorithm 'dh22' failed 229s | ... failed 'ESP DH algorithm 'dh22' is not supported' 229s | parsing '3des-sha1;modp8192,3des-sha2' for ESP 229s | proposal: '3des-sha1;modp8192' 229s | token: '' '' "3des" '-' 229s | token: '' "3des" '-' "sha1" ';' 229s | token: '-' "sha1" ';' "modp8192" '' 229s | appending ESP encryption algorithm 3DES_CBC[_0] 229s | parsing integ: 229s | appending ESP integrity algorithm HMAC_SHA1_96[_0] 229s | token: ';' "modp8192" '' '' 229s | parsing dh: 229s | appending ESP DH algorithm MODP8192[_0] 229s | token: '' '' '' 229s | proposal: '3des-sha2' 229s | token: '' '' "3des" '-' 229s | token: '' "3des" '-' "sha2" '' 229s | token: '-' "sha2" '' '' 229s | appending ESP encryption algorithm 3DES_CBC[_0] 229s | parsing integ: 229s | appending ESP integrity algorithm HMAC_SHA2_256_128[_0] 229s | token: '' '' '' 229s ipsec algparse: ignoring ESP DH algorithm MODP8192 as PFS policy is disabled 229s | parsing '3des-sha1-modp8192,3des-sha2' for ESP 229s | proposal: '3des-sha1-modp8192' 229s | token: '' '' "3des" '-' 229s | token: '' "3des" '-' "sha1" '-' 229s | token: '-' "sha1" '-' "modp8192" '' 229s | appending ESP encryption algorithm 3DES_CBC[_0] 229s | parsing integ: 229s | appending ESP integrity algorithm HMAC_SHA1_96[_0] 229s | token: '-' "modp8192" '' '' 229s | parsing dh: 229s | appending ESP DH algorithm MODP8192[_0] 229s | token: '' '' '' 229s | proposal: '3des-sha2' 229s | token: '' '' "3des" '-' 229s | token: '' "3des" '-' "sha2" '' 229s | token: '-' "sha2" '' '' 229s | appending ESP encryption algorithm 3DES_CBC[_0] 229s | parsing integ: 229s | appending ESP integrity algorithm HMAC_SHA2_256_128[_0] 229s | token: '' '' '' 229s ipsec algparse: ignoring ESP DH algorithm MODP8192 as PFS policy is disabled 229s | parsing '3des-sha1-modp8192,3des-sha2-modp8192' for ESP 229s | proposal: '3des-sha1-modp8192' 229s | token: '' '' "3des" '-' 229s | token: '' "3des" '-' "sha1" '-' 229s | token: '-' "sha1" '-' "modp8192" '' 229s | appending ESP encryption algorithm 3DES_CBC[_0] 229s | parsing integ: 229s | appending ESP integrity algorithm HMAC_SHA1_96[_0] 229s | token: '-' "modp8192" '' '' 229s | parsing dh: 229s | appending ESP DH algorithm MODP8192[_0] 229s | token: '' '' '' 229s | proposal: '3des-sha2-modp8192' 229s | token: '' '' "3des" '-' 229s | token: '' "3des" '-' "sha2" '-' 229s | token: '-' "sha2" '-' "modp8192" '' 229s | appending ESP encryption algorithm 3DES_CBC[_0] 229s | parsing integ: 229s | appending ESP integrity algorithm HMAC_SHA2_256_128[_0] 229s | token: '-' "modp8192" '' '' 229s | parsing dh: 229s | appending ESP DH algorithm MODP8192[_0] 229s | token: '' '' '' 229s ipsec algparse: ignoring ESP DH algorithm MODP8192 as PFS policy is disabled 229s ipsec algparse: ignoring ESP DH algorithm MODP8192 as PFS policy is disabled 229s | parsing '3des-sha1-modp8192,3des-sha2;modp8192' for ESP 229s | proposal: '3des-sha1-modp8192' 229s | token: '' '' "3des" '-' 229s | token: '' "3des" '-' "sha1" '-' 229s | token: '-' "sha1" '-' "modp8192" '' 229s | appending ESP encryption algorithm 3DES_CBC[_0] 229s | parsing integ: 229s | appending ESP integrity algorithm HMAC_SHA1_96[_0] 229s | token: '-' "modp8192" '' '' 229s | parsing dh: 229s | appending ESP DH algorithm MODP8192[_0] 229s | token: '' '' '' 229s | proposal: '3des-sha2;modp8192' 229s | token: '' '' "3des" '-' 229s | token: '' "3des" '-' "sha2" ';' 229s | token: '-' "sha2" ';' "modp8192" '' 229s | appending ESP encryption algorithm 3DES_CBC[_0] 229s | parsing integ: 229s | appending ESP integrity algorithm HMAC_SHA2_256_128[_0] 229s | token: ';' "modp8192" '' '' 229s | parsing dh: 229s | appending ESP DH algorithm MODP8192[_0] 229s | token: '' '' '' 229s ipsec algparse: ignoring ESP DH algorithm MODP8192 as PFS policy is disabled 229s ipsec algparse: ignoring ESP DH algorithm MODP8192 as PFS policy is disabled 229s | parsing '3des-sha1;modp8192,3des-sha2-modp8192' for ESP 229s | proposal: '3des-sha1;modp8192' 229s | token: '' '' "3des" '-' 229s | token: '' "3des" '-' "sha1" ';' 229s | token: '-' "sha1" ';' "modp8192" '' 229s | appending ESP encryption algorithm 3DES_CBC[_0] 229s | parsing integ: 229s | appending ESP integrity algorithm HMAC_SHA1_96[_0] 229s | token: ';' "modp8192" '' '' 229s | parsing dh: 229s | appending ESP DH algorithm MODP8192[_0] 229s | token: '' '' '' 229s | proposal: '3des-sha2-modp8192' 229s | token: '' '' "3des" '-' 229s | token: '' "3des" '-' "sha2" '-' 229s | token: '-' "sha2" '-' "modp8192" '' 229s | appending ESP encryption algorithm 3DES_CBC[_0] 229s | parsing integ: 229s | appending ESP integrity algorithm HMAC_SHA2_256_128[_0] 229s | token: '-' "modp8192" '' '' 229s | parsing dh: 229s | appending ESP DH algorithm MODP8192[_0] 229s | token: '' '' '' 229s ipsec algparse: ignoring ESP DH algorithm MODP8192 as PFS policy is disabled 229s ipsec algparse: ignoring ESP DH algorithm MODP8192 as PFS policy is disabled 229s | parsing '3des-sha1;modp8192,3des-sha2;modp8192' for ESP 229s | proposal: '3des-sha1;modp8192' 229s | token: '' '' "3des" '-' 229s | token: '' "3des" '-' "sha1" ';' 229s | token: '-' "sha1" ';' "modp8192" '' 229s | appending ESP encryption algorithm 3DES_CBC[_0] 229s | parsing integ: 229s | appending ESP integrity algorithm HMAC_SHA1_96[_0] 229s | token: ';' "modp8192" '' '' 229s | parsing dh: 229s | appending ESP DH algorithm MODP8192[_0] 229s | token: '' '' '' 229s | proposal: '3des-sha2;modp8192' 229s | token: '' '' "3des" '-' 229s | token: '' "3des" '-' "sha2" ';' 229s | token: '-' "sha2" ';' "modp8192" '' 229s | appending ESP encryption algorithm 3DES_CBC[_0] 229s | parsing integ: 229s | appending ESP integrity algorithm HMAC_SHA2_256_128[_0] 229s | token: ';' "modp8192" '' '' 229s | parsing dh: 229s | appending ESP DH algorithm MODP8192[_0] 229s | token: '' '' '' 229s ipsec algparse: ignoring ESP DH algorithm MODP8192 as PFS policy is disabled 229s ipsec algparse: ignoring ESP DH algorithm MODP8192 as PFS policy is disabled 229s | parsing '3des-sha1-modp8192,3des-sha2-modp2048' for ESP 229s | proposal: '3des-sha1-modp8192' 229s | token: '' '' "3des" '-' 229s | token: '' "3des" '-' "sha1" '-' 229s | token: '-' "sha1" '-' "modp8192" '' 229s | appending ESP encryption algorithm 3DES_CBC[_0] 229s | parsing integ: 229s | appending ESP integrity algorithm HMAC_SHA1_96[_0] 229s | token: '-' "modp8192" '' '' 229s | parsing dh: 229s | appending ESP DH algorithm MODP8192[_0] 229s | token: '' '' '' 229s | proposal: '3des-sha2-modp2048' 229s | token: '' '' "3des" '-' 229s | token: '' "3des" '-' "sha2" '-' 229s | token: '-' "sha2" '-' "modp2048" '' 229s | appending ESP encryption algorithm 3DES_CBC[_0] 229s | parsing integ: 229s | appending ESP integrity algorithm HMAC_SHA2_256_128[_0] 229s | token: '-' "modp2048" '' '' 229s | parsing dh: 229s | appending ESP DH algorithm MODP2048[_0] 229s | token: '' '' '' 229s ipsec algparse: ignoring ESP DH algorithm MODP8192 as PFS policy is disabled 229s ipsec algparse: ignoring ESP DH algorithm MODP2048 as PFS policy is disabled 229s | parsing 'SHA2_512_256,SHA2_256_128' for AH 229s | proposal: 'SHA2_512_256' 229s | token: '' '' "SHA2_512_256" '' 229s | token: '' "SHA2_512_256" '' '' 229s | parsing integ: 229s | appending AH integrity algorithm HMAC_SHA2_512_256[_0] 229s | token: '' '' '' 229s | proposal: 'SHA2_256_128' 229s | token: '' '' "SHA2_256_128" '' 229s | token: '' "SHA2_256_128" '' '' 229s | parsing integ: 229s | appending AH integrity algorithm HMAC_SHA2_256_128[_0] 229s | token: '' '' '' 229s | parsing '' for AH 229s | parsing 'md5' for AH 229s | proposal: 'md5' 229s | token: '' '' "md5" '' 229s | token: '' "md5" '' '' 229s | parsing integ: 229s | appending AH integrity algorithm HMAC_MD5_96[_0] 229s | token: '' '' '' 229s | parsing 'sha' for AH 229s | proposal: 'sha' 229s | token: '' '' "sha" '' 229s | token: '' "sha" '' '' 229s | parsing integ: 229s | appending AH integrity algorithm HMAC_SHA1_96[_0] 229s | token: '' '' '' 229s | parsing 'sha;modp2048' for AH 229s | proposal: 'sha;modp2048' 229s | token: '' '' "sha" ';' 229s | token: '' "sha" ';' "modp2048" '' 229s | parsing integ: 229s | appending AH integrity algorithm HMAC_SHA1_96[_0] 229s | token: ';' "modp2048" '' '' 229s | parsing dh: 229s | appending AH DH algorithm MODP2048[_0] 229s | token: '' '' '' 229s ipsec algparse: ignoring AH DH algorithm MODP2048 as PFS policy is disabled 229s | parsing 'sha1' for AH 229s | proposal: 'sha1' 229s | token: '' '' "sha1" '' 229s | token: '' "sha1" '' '' 229s | parsing integ: 229s | appending AH integrity algorithm HMAC_SHA1_96[_0] 229s | token: '' '' '' 229s | parsing 'sha2' for AH 229s | proposal: 'sha2' 229s | token: '' '' "sha2" '' 229s | token: '' "sha2" '' '' 229s | parsing integ: 229s | appending AH integrity algorithm HMAC_SHA2_256_128[_0] 229s | token: '' '' '' 229s | parsing 'sha256' for AH 229s | proposal: 'sha256' 229s | token: '' '' "sha256" '' 229s | token: '' "sha256" '' '' 229s | parsing integ: 229s | appending AH integrity algorithm HMAC_SHA2_256_128[_0] 229s | token: '' '' '' 229s | parsing 'sha384' for AH 229s | proposal: 'sha384' 229s | token: '' '' "sha384" '' 229s | token: '' "sha384" '' '' 229s | parsing integ: 229s | appending AH integrity algorithm HMAC_SHA2_384_192[_0] 229s | token: '' '' '' 229s | parsing 'sha512' for AH 229s | proposal: 'sha512' 229s | token: '' '' "sha512" '' 229s | token: '' "sha512" '' '' 229s | parsing integ: 229s | appending AH integrity algorithm HMAC_SHA2_512_256[_0] 229s | token: '' '' '' 229s | parsing 'sha2_256' for AH 229s | proposal: 'sha2_256' 229s | token: '' '' "sha2_256" '' 229s | token: '' "sha2_256" '' '' 229s | parsing integ: 229s | appending AH integrity algorithm HMAC_SHA2_256_128[_0] 229s | token: '' '' '' 229s | parsing 'sha2_384' for AH 229s | proposal: 'sha2_384' 229s | token: '' '' "sha2_384" '' 229s | token: '' "sha2_384" '' '' 229s | parsing integ: 229s | appending AH integrity algorithm HMAC_SHA2_384_192[_0] 229s | token: '' '' '' 229s | parsing 'sha2_512' for AH 229s | proposal: 'sha2_512' 229s | token: '' '' "sha2_512" '' 229s | token: '' "sha2_512" '' '' 229s | parsing integ: 229s | appending AH integrity algorithm HMAC_SHA2_512_256[_0] 229s | token: '' '' '' 229s | parsing 'aes_xcbc' for AH 229s | proposal: 'aes_xcbc' 229s | token: '' '' "aes_xcbc" '' 229s | token: '' "aes_xcbc" '' '' 229s | parsing integ: 229s | appending AH integrity algorithm AES_XCBC_96[_0] 229s | token: '' '' '' 229s | parsing 'sha2-none' for AH 229s | proposal: 'sha2-none' 229s | token: '' '' "sha2" '-' 229s | token: '' "sha2" '-' "none" '' 229s | parsing integ: 229s | appending AH integrity algorithm HMAC_SHA2_256_128[_0] 229s | token: '-' "none" '' '' 229s | parsing dh: 229s | appending AH DH algorithm NONE[_0] 229s | token: '' '' '' 229s ipsec algparse: ignoring redundant AH DH algorithm NONE as PFS policy is disabled 229s 3DES_CBC-HMAC_SHA1_96 229s 3DES_CBC-HMAC_SHA2_256_128 229s algparse -v2 'esp=3des-sha1-modp8192,3des-sha2' (expect SUCCESS) 229s 3DES_CBC-HMAC_SHA1_96 229s 3DES_CBC-HMAC_SHA2_256_128 229s algparse -v2 'esp=3des-sha1-modp8192,3des-sha2-modp8192' (expect SUCCESS) 229s 3DES_CBC-HMAC_SHA1_96 229s 3DES_CBC-HMAC_SHA2_256_128 229s algparse -v2 'esp=3des-sha1-modp8192,3des-sha2;modp8192' (expect SUCCESS) 229s 3DES_CBC-HMAC_SHA1_96 229s 3DES_CBC-HMAC_SHA2_256_128 229s algparse -v2 'esp=3des-sha1;modp8192,3des-sha2-modp8192' (expect SUCCESS) 229s 3DES_CBC-HMAC_SHA1_96 229s 3DES_CBC-HMAC_SHA2_256_128 229s algparse -v2 'esp=3des-sha1;modp8192,3des-sha2;modp8192' (expect SUCCESS) 229s 3DES_CBC-HMAC_SHA1_96 229s 3DES_CBC-HMAC_SHA2_256_128 229s algparse -v2 'esp=3des-sha1-modp8192,3des-sha2-modp2048' (expect SUCCESS) 229s 3DES_CBC-HMAC_SHA1_96 229s 3DES_CBC-HMAC_SHA2_256_128 229s algparse -v2 'ah' (expect SUCCESS) 229s HMAC_SHA2_512_256 229s HMAC_SHA2_256_128 229s algparse -v2 'ah=' (expect ERROR) 229s ERROR: AH proposal is empty 229s algparse -v2 'ah=md5' (expect SUCCESS) 229s HMAC_MD5_96 229s algparse -v2 'ah=sha' (expect SUCCESS) 229s HMAC_SHA1_96 229s algparse -v2 'ah=sha;modp2048' (expect SUCCESS) 229s HMAC_SHA1_96 229s algparse -v2 'ah=sha1' (expect SUCCESS) 229s HMAC_SHA1_96 229s algparse -v2 'ah=sha2' (expect SUCCESS) 229s HMAC_SHA2_256_128 229s algparse -v2 'ah=sha256' (expect SUCCESS) 229s HMAC_SHA2_256_128 229s algparse -v2 'ah=sha384' (expect SUCCESS) 229s HMAC_SHA2_384_192 229s algparse -v2 'ah=sha512' (expect SUCCESS) 229s HMAC_SHA2_512_256 229s algparse -v2 'ah=sha2_256' (expect SUCCESS) 229s HMAC_SHA2_256_128 229s algparse -v2 'ah=sha2_384' (expect SUCCESS) 229s HMAC_SHA2_384_192 229s algparse -v2 'ah=sha2_512' (expect SUCCESS) 229s HMAC_SHA2_512_256 229s algparse -v2 'ah=aes_xcbc' (expect SUCCESS) 229s AES_XCBC_96 229s algparse -v2 'ah=sha2-none' (expect SUCCESS) 229s HMAC_SHA2_256_128 229s algparse -v2 'ah=sha2;none' (expect SUCCESS) 229s | parsing 'sha2;none' for AH 229s | proposal: 'sha2;none' 229s | token: '' '' "sha2" ';' 229s | token: '' "sha2" ';' "none" '' 229s | parsing integ: 229s | appending AH integrity algorithm HMAC_SHA2_256_128[_0] 229s | token: ';' "none" '' '' 229s | parsing dh: 229s | appending AH DH algorithm NONE[_0] 229s | token: '' '' '' 229s ipsec algparse: ignoring redundant AH DH algorithm NONE as PFS policy is disabled 229s | parsing 'sha1-modp8192,sha1-modp8192,sha1-modp8192' for AH 229s | proposal: 'sha1-modp8192' 229s | token: '' '' "sha1" '-' 229s | token: '' "sha1" '-' "modp8192" '' 229s | parsing integ: 229s | appending AH integrity algorithm HMAC_SHA1_96[_0] 229s | token: '-' "modp8192" '' '' 229s | parsing dh: 229s | appending AH DH algorithm MODP8192[_0] 229s | token: '' '' '' 229s | proposal: 'sha1-modp8192' 229s | token: '' '' "sha1" '-' 229s | token: '' "sha1" '-' "modp8192" '' 229s | parsing integ: 229s | appending AH integrity algorithm HMAC_SHA1_96[_0] 229s | token: '-' "modp8192" '' '' 229s | parsing dh: 229s | appending AH DH algorithm MODP8192[_0] 229s | token: '' '' '' 229s | proposal: 'sha1-modp8192' 229s | token: '' '' "sha1" '-' 229s | token: '' "sha1" '-' "modp8192" '' 229s | parsing integ: 229s | appending AH integrity algorithm HMAC_SHA1_96[_0] 229s | token: '-' "modp8192" '' '' 229s | parsing dh: 229s | appending AH DH algorithm MODP8192[_0] 229s | token: '' '' '' 229s ipsec algparse: ignoring AH DH algorithm MODP8192 as PFS policy is disabled 229s | parsing 'aes-sha1' for AH 229s | proposal: 'aes-sha1' 229s | token: '' '' "aes" '-' 229s | token: '' "aes" '-' "sha1" '' 229s | parsing integ: 229s | ike_alg_byname() failed: AH integrity algorithm 'aes' is not recognized 229s | lookup for integrity algorithm 'aes' failed 229s | or - failed 'AH integrity algorithm 'aes' is not recognized') 229s | parsing 'vanityhash1' for AH 229s | proposal: 'vanityhash1' 229s | token: '' '' "vanityhash1" '' 229s | token: '' "vanityhash1" '' '' 229s | parsing integ: 229s | ike_alg_byname() failed: AH integrity algorithm 'vanityhash1' is not recognized 229s | lookup for integrity algorithm 'vanityhash1' failed 229s | or - failed 'AH integrity algorithm 'vanityhash1' is not recognized') 229s | parsing 'aes_gcm_c-256' for AH 229s | proposal: 'aes_gcm_c-256' 229s | token: '' '' "aes_gcm_c" '-' 229s | token: '' "aes_gcm_c" '-' "256" '' 229s | parsing integ: 229s | ike_alg_byname() failed: AH integrity algorithm 'aes_gcm_c' is not recognized 229s | lookup for integrity algorithm 'aes_gcm_c' failed 229s | or - failed 'AH integrity algorithm 'aes_gcm_c' is not recognized') 229s | parsing 'id3' for AH 229s | proposal: 'id3' 229s | token: '' '' "id3" '' 229s | token: '' "id3" '' '' 229s | parsing integ: 229s | ike_alg_byname() failed: AH integrity algorithm 'id3' is not recognized 229s | lookup for integrity algorithm 'id3' failed 229s | or - failed 'AH integrity algorithm 'id3' is not recognized') 229s | parsing '3des' for AH 229s | proposal: '3des' 229s | token: '' '' "3des" '' 229s | token: '' "3des" '' '' 229s | parsing integ: 229s | ike_alg_byname() failed: AH integrity algorithm '3des' is not recognized 229s | lookup for integrity algorithm '3des' failed 229s | or - failed 'AH integrity algorithm '3des' is not recognized') 229s | parsing 'null' for AH 229s | proposal: 'null' 229s | token: '' '' "null" '' 229s | token: '' "null" '' '' 229s | parsing integ: 229s | appending AH integrity algorithm NONE[_0] 229s | token: '' '' '' 229s | parsing 'aes_gcm' for AH 229s | proposal: 'aes_gcm' 229s | token: '' '' "aes_gcm" '' 229s | token: '' "aes_gcm" '' '' 229s | parsing integ: 229s | ike_alg_byname() failed: AH integrity algorithm 'aes_gcm' is not recognized 229s | lookup for integrity algorithm 'aes_gcm' failed 229s | or - failed 'AH integrity algorithm 'aes_gcm' is not recognized') 229s | parsing 'aes_ccm' for AH 229s | proposal: 'aes_ccm' 229s | token: '' '' "aes_ccm" '' 229s | token: '' "aes_ccm" '' '' 229s | parsing integ: 229s | ike_alg_byname() failed: AH integrity algorithm 'aes_ccm' is not recognized 229s | lookup for integrity algorithm 'aes_ccm' failed 229s | or - failed 'AH integrity algorithm 'aes_ccm' is not recognized') 229s | parsing 'ripemd' for AH 229s | proposal: 'ripemd' 229s | token: '' '' "ripemd" '' 229s | token: '' "ripemd" '' '' 229s | parsing integ: 229s | ike_alg_byname() failed: AH integrity algorithm 'ripemd' is not recognized 229s | lookup for integrity algorithm 'ripemd' failed 229s | or - failed 'AH integrity algorithm 'ripemd' is not recognized') 229s | parsing 'AES_GCM_16_256,AES_GCM_16_128,CHACHA20_POLY1305,AES_CBC_256,AES_CBC_128' for IKE 229s | proposal: 'AES_GCM_16_256' 229s | token: '' '' "AES_GCM_16_256" '' 229s | token: '' "AES_GCM_16_256" '' '' 229s | ike_alg_byname() failed: IKE encryption algorithm 'AES_GCM_16_256' is not recognized 229s | token: '' '' '' 229s | appending IKE encryption algorithm AES_GCM_16[_256] 229s | appending IKE PRF algorithm HMAC_SHA2_512[_0] 229s | appending IKE PRF algorithm HMAC_SHA2_256[_0] 229s | appending IKE integrity algorithm NONE[_0] 229s | appending IKE DH algorithm DH19[_0] 229s | appending IKE DH algorithm DH20[_0] 229s | appending IKE DH algorithm DH21[_0] 229s | appending IKE DH algorithm DH31[_0] 229s | appending IKE DH algorithm MODP4096[_0] 229s | appending IKE DH algorithm MODP3072[_0] 229s | appending IKE DH algorithm MODP2048[_0] 229s | appending IKE DH algorithm MODP8192[_0] 229s | proposal: 'AES_GCM_16_128' 229s | token: '' '' "AES_GCM_16_128" '' 229s | token: '' "AES_GCM_16_128" '' '' 229s | ike_alg_byname() failed: IKE encryption algorithm 'AES_GCM_16_128' is not recognized 229s | token: '' '' '' 229s | appending IKE encryption algorithm AES_GCM_16[_128] 229s | appending IKE PRF algorithm HMAC_SHA2_512[_0] 229s | appending IKE PRF algorithm HMAC_SHA2_256[_0] 229s | appending IKE integrity algorithm NONE[_0] 229s | appending IKE DH algorithm DH19[_0] 229s | appending IKE DH algorithm DH20[_0] 229s | appending IKE DH algorithm DH21[_0] 229s | appending IKE DH algorithm DH31[_0] 229s | appending IKE DH algorithm MODP4096[_0] 229s | appending IKE DH algorithm MODP3072[_0] 229s | appending IKE DH algorithm MODP2048[_0] 229s | appending IKE DH algorithm MODP8192[_0] 229s | proposal: 'CHACHA20_POLY1305' 229s | token: '' '' "CHACHA20_POLY1305" '' 229s | token: '' "CHACHA20_POLY1305" '' '' 229s | token: '' '' '' 229s | appending IKE encryption algorithm CHACHA20_POLY1305[_0] 229s | appending IKE PRF algorithm HMAC_SHA2_512[_0] 229s | appending IKE PRF algorithm HMAC_SHA2_256[_0] 229s | appending IKE integrity algorithm NONE[_0] 229s | appending IKE DH algorithm DH19[_0] 229s | appending IKE DH algorithm DH20[_0] 229s | appending IKE DH algorithm DH21[_0] 229s | appending IKE DH algorithm DH31[_0] 229s | appending IKE DH algorithm MODP4096[_0] 229s | appending IKE DH algorithm MODP3072[_0] 229s | appending IKE DH algorithm MODP2048[_0] 229s | appending IKE DH algorithm MODP8192[_0] 229s | proposal: 'AES_CBC_256' 229s | token: '' '' "AES_CBC_256" '' 229s | token: '' "AES_CBC_256" '' '' 229s | ike_alg_byname() failed: IKE encryption algorithm 'AES_CBC_256' is not recognized 229s | token: '' '' '' 229s | appending IKE encryption algorithm AES_CBC[_256] 229s | appending IKE PRF algorithm HMAC_SHA2_512[_0] 229s | appending IKE PRF algorithm HMAC_SHA2_256[_0] 229s | appending IKE integrity algorithm HMAC_SHA2_512_256[_0] 229s | appending IKE integrity algorithm HMAC_SHA2_256_128[_0] 229s | appending IKE DH algorithm DH19[_0] 229s | appending IKE DH algorithm DH20[_0] 229s | appending IKE DH algorithm DH21[_0] 229s | appending IKE DH algorithm DH31[_0] 229s | appending IKE DH algorithm MODP4096[_0] 229s | appending IKE DH algorithm MODP3072[_0] 229s | appending IKE DH algorithm MODP2048[_0] 229s | appending IKE DH algorithm MODP8192[_0] 229s | proposal: 'AES_CBC_128' 229s | token: '' '' "AES_CBC_128" '' 229s | token: '' "AES_CBC_128" '' '' 229s | ike_alg_byname() failed: IKE encryption algorithm 'AES_CBC_128' is not recognized 229s | token: '' '' '' 229s | appending IKE encryption algorithm AES_CBC[_128] 229s | appending IKE PRF algorithm HMAC_SHA2_512[_0] 229s | appending IKE PRF algorithm HMAC_SHA2_256[_0] 229s | appending IKE integrity algorithm HMAC_SHA2_512_256[_0] 229s | appending IKE integrity algorithm HMAC_SHA2_256_128[_0] 229s | appending IKE DH algorithm DH19[_0] 229s | appending IKE DH algorithm DH20[_0] 229s | appending IKE DH algorithm DH21[_0] 229s | appending IKE DH algorithm DH31[_0] 229s | appending IKE DH algorithm MODP4096[_0] 229s | appending IKE DH algorithm MODP3072[_0] 229s | appending IKE DH algorithm MODP2048[_0] 229s | appending IKE DH algorithm MODP8192[_0] 229s | parsing '' for IKE 229s | parsing '3des-sha1' for IKE 229s | proposal: '3des-sha1' 229s | token: '' '' "3des" '-' 229s | token: '' "3des" '-' "sha1" '' 229s | token: '-' "sha1" '' '' 229s | appending IKE encryption algorithm 3DES_CBC[_0] 229s | parsing prf: 229s | appending IKE PRF algorithm HMAC_SHA1[_0] 229s | token: '' '' '' 229s | - succeeded, advancing tokens 229s | appending IKE integrity algorithm HMAC_SHA1_96[_0] 229s | appending IKE DH algorithm DH19[_0] 229s | appending IKE DH algorithm DH20[_0] 229s | appending IKE DH algorithm DH21[_0] 229s | appending IKE DH algorithm DH31[_0] 229s | appending IKE DH algorithm MODP4096[_0] 229s | appending IKE DH algorithm MODP3072[_0] 229s | appending IKE DH algorithm MODP2048[_0] 229s | appending IKE DH algorithm MODP8192[_0] 229s | parsing '3des-sha1' for IKE 229s | proposal: '3des-sha1' 229s | token: '' '' "3des" '-' 229s | token: '' "3des" '-' "sha1" '' 229s | token: '-' "sha1" '' '' 229s | appending IKE encryption algorithm 3DES_CBC[_0] 229s | parsing prf: 229s | appending IKE PRF algorithm HMAC_SHA1[_0] 229s | token: '' '' '' 229s | - succeeded, advancing tokens 229s | appending IKE integrity algorithm HMAC_SHA1_96[_0] 229s | appending IKE DH algorithm DH19[_0] 229s | appending IKE DH algorithm DH20[_0] 229s | appending IKE DH algorithm DH21[_0] 229s | appending IKE DH algorithm DH31[_0] 229s | appending IKE DH algorithm MODP4096[_0] 229s | appending IKE DH algorithm MODP3072[_0] 229s | appending IKE DH algorithm MODP2048[_0] 229s | appending IKE DH algorithm MODP8192[_0] 229s HMAC_SHA2_256_128 229s algparse -v2 'ah=sha1-modp8192,sha1-modp8192,sha1-modp8192' (expect SUCCESS) 229s HMAC_SHA1_96 229s algparse -v2 'ah=aes-sha1' (expect ERROR) 229s ERROR: AH integrity algorithm 'aes' is not recognized 229s algparse -v2 'ah=vanityhash1' (expect ERROR) 229s ERROR: AH integrity algorithm 'vanityhash1' is not recognized 229s algparse -v2 'ah=aes_gcm_c-256' (expect ERROR) 229s ERROR: AH integrity algorithm 'aes_gcm_c' is not recognized 229s algparse -v2 'ah=id3' (expect ERROR) 229s ERROR: AH integrity algorithm 'id3' is not recognized 229s algparse -v2 'ah=3des' (expect ERROR) 229s ERROR: AH integrity algorithm '3des' is not recognized 229s algparse -v2 'ah=null' (expect ERROR) 229s ERROR: AH cannot have 'none' as the integrity algorithm 229s algparse -v2 'ah=aes_gcm' (expect ERROR) 229s ERROR: AH integrity algorithm 'aes_gcm' is not recognized 229s algparse -v2 'ah=aes_ccm' (expect ERROR) 229s ERROR: AH integrity algorithm 'aes_ccm' is not recognized 229s algparse -v2 'ah=ripemd' (expect ERROR) 229s ERROR: AH integrity algorithm 'ripemd' is not recognized 229s algparse -v2 'ike' (expect SUCCESS) 229s AES_GCM_16_256-HMAC_SHA2_512+HMAC_SHA2_256-DH19+DH20+DH21+DH31+MODP4096+MODP3072+MODP2048+MODP8192 229s AES_GCM_16_128-HMAC_SHA2_512+HMAC_SHA2_256-DH19+DH20+DH21+DH31+MODP4096+MODP3072+MODP2048+MODP8192 229s CHACHA20_POLY1305-HMAC_SHA2_512+HMAC_SHA2_256-DH19+DH20+DH21+DH31+MODP4096+MODP3072+MODP2048+MODP8192 229s AES_CBC_256-HMAC_SHA2_512+HMAC_SHA2_256-DH19+DH20+DH21+DH31+MODP4096+MODP3072+MODP2048+MODP8192 229s AES_CBC_128-HMAC_SHA2_512+HMAC_SHA2_256-DH19+DH20+DH21+DH31+MODP4096+MODP3072+MODP2048+MODP8192 229s algparse -v2 'ike=' (expect ERROR) 229s ERROR: IKE proposal is empty 229s algparse -v2 'ike=3des-sha1' (expect SUCCESS) 229s 3DES_CBC-HMAC_SHA1-DH19+DH20+DH21+DH31+MODP4096+MODP3072+MODP2048+MODP8192 229s algparse -v2 'ike=3des-sha1' (expect SUCCESS) 229s 3DES_CBC-HMAC_SHA1-DH19+DH20+DH21+DH31+MODP4096+MODP3072+MODP2048+MODP8192 229s algparse -v2 'ike=3des-sha1;modp1536' (expect SUCCESS) 229s 3DES_CBC-HMAC_SHA1-MODP1536 229s algparse -v2 'ike=3des;dh21' (expect SUCCESS) 229s 3DES_CBC-HMAC_SHA2_512+HMAC_SHA2_256-DH21 229s algparse -v2 'ike=3des-sha1;dh21' (expect SUCCESS) 229s 3DES_CBC-HMAC_SHA1-DH21 229s algparse -v2 'ike=3des-sha1-ecp_521' (expect SUCCESS) 229s 3DES_CBC-HMAC_SHA1-DH21 229s algparse -v2 'ike=3des+aes' (expect SUCCESS) 229s 3DES_CBC+AES_CBC-HMAC_SHA2_512+HMAC_SHA2_256-DH19+DH20+DH21+DH31+MODP4096+MODP3072+MODP2048+MODP8192 229s algparse -v2 'ike=aes;none' (expect ERROR) 229s ERROR: IKE DH algorithm 'none' not permitted 229s algparse -v2 'ike=id2' (expect ERROR) 229s ERROR: IKE encryption algorithm 'id2' is not recognized 229s algparse -v2 'ike=3des-id2' (expect ERROR) 229s ERROR: IKE PRF algorithm 'id2' is not recognized 229s algparse -v2 'ike=aes_ccm' (expect ERROR) 229s ERROR: IKE encryption algorithm 'aes_ccm' is not supported 229s algparse -v2 'ike=aes-sha1-sha2-ecp_521' (expect ERROR) 229s ERROR: IKE DH algorithm 'sha2' is not recognized 229s algparse -v2 'ike=aes-sha2-sha2;ecp_521' (expect ERROR) 229s ERROR: IKE DH algorithm 'sha2' is not recognized 229s algparse -v2 'ike=aes-sha1_96-sha2-ecp_521' (expect SUCCESS) 229s AES_CBC-HMAC_SHA1_96-HMAC_SHA2_256-DH21 229s algparse -v2 'ike=aes-sha1_96-sha2;ecp_521' (expect SUCCESS) 229s AES_CBC-HMAC_SHA1_96-HMAC_SHA2_256-DH21 229s algparse -v2 'ike=aes+aes-sha1+sha1-modp8192+modp8192' (expect SUCCESS) 229s AES_CBC-HMAC_SHA1-MODP8192 229s algparse -v2 'ike=3des+aes+aes-sha2+sha1+sha1-modp4096+modp8192+modp8192' (expect SUCCESS) 229s 3DES_CBC+AES_CBC-HMAC_SHA2_256+HMAC_SHA1-MODP4096+MODP8192 229s algparse -v2 'ike=aes+3des+aes-sha1+sha2+sha1-modp8192+modp4096+modp8192' (expect SUCCESS) 229s AES_CBC+3DES_CBC-HMAC_SHA1+HMAC_SHA2_256-MODP8192+MODP4096 229s algparse -v2 'ike=aes+aes+3des-sha1+sha1+sha2-modp8192+modp8192+modp4096' (expect SUCCESS) 229s AES_CBC+3DES_CBC-HMAC_SHA1+HMAC_SHA2_256-MODP8192+MODP4096 229s algparse -v2 'ike=aes+aes128+aes256' (expect SUCCESS) 229s AES_CBC-HMAC_SHA2_512+HMAC_SHA2_256-DH19+DH20+DH21+DH31+MODP4096+MODP3072+MODP2048+MODP8192 229s algparse -v2 'ike=aes128+aes+aes256' (expect SUCCESS) 229s | parsing '3des-sha1;modp1536' for IKE 229s | proposal: '3des-sha1;modp1536' 229s | token: '' '' "3des" '-' 229s | token: '' "3des" '-' "sha1" ';' 229s | token: '-' "sha1" ';' "modp1536" '' 229s | appending IKE encryption algorithm 3DES_CBC[_0] 229s | parsing prf: 229s | appending IKE PRF algorithm HMAC_SHA1[_0] 229s | token: ';' "modp1536" '' '' 229s | - succeeded, advancing tokens 229s | parsing dh: 229s | appending IKE DH algorithm MODP1536[_0] 229s | token: '' '' '' 229s | appending IKE integrity algorithm HMAC_SHA1_96[_0] 229s | parsing '3des;dh21' for IKE 229s | proposal: '3des;dh21' 229s | token: '' '' "3des" ';' 229s | token: '' "3des" ';' "dh21" '' 229s | token: ';' "dh21" '' '' 229s | appending IKE encryption algorithm 3DES_CBC[_0] 229s | parsing dh: 229s | appending IKE DH algorithm DH21[_0] 229s | token: '' '' '' 229s | appending IKE PRF algorithm HMAC_SHA2_512[_0] 229s | appending IKE PRF algorithm HMAC_SHA2_256[_0] 229s | appending IKE integrity algorithm HMAC_SHA2_512_256[_0] 229s | appending IKE integrity algorithm HMAC_SHA2_256_128[_0] 229s | parsing '3des-sha1;dh21' for IKE 229s | proposal: '3des-sha1;dh21' 229s | token: '' '' "3des" '-' 229s | token: '' "3des" '-' "sha1" ';' 229s | token: '-' "sha1" ';' "dh21" '' 229s | appending IKE encryption algorithm 3DES_CBC[_0] 229s | parsing prf: 229s | appending IKE PRF algorithm HMAC_SHA1[_0] 229s | token: ';' "dh21" '' '' 229s | - succeeded, advancing tokens 229s | parsing dh: 229s | appending IKE DH algorithm DH21[_0] 229s | token: '' '' '' 229s | appending IKE integrity algorithm HMAC_SHA1_96[_0] 229s | parsing '3des-sha1-ecp_521' for IKE 229s | proposal: '3des-sha1-ecp_521' 229s | token: '' '' "3des" '-' 229s | token: '' "3des" '-' "sha1" '-' 229s | token: '-' "sha1" '-' "ecp_521" '' 229s | appending IKE encryption algorithm 3DES_CBC[_0] 229s | parsing prf: 229s | appending IKE PRF algorithm HMAC_SHA1[_0] 229s | token: '-' "ecp_521" '' '' 229s | - succeeded, advancing tokens 229s | parsing dh: 229s | appending IKE DH algorithm DH21[_0] 229s | token: '' '' '' 229s | appending IKE integrity algorithm HMAC_SHA1_96[_0] 229s | parsing '3des+aes' for IKE 229s | proposal: '3des+aes' 229s | token: '' '' "3des" '+' 229s | token: '' "3des" '+' "aes" '' 229s | token: '+' "aes" '' '' 229s | appending IKE encryption algorithm 3DES_CBC[_0] 229s | token: '' '' '' 229s | appending IKE encryption algorithm AES_CBC[_0] 229s | appending IKE PRF algorithm HMAC_SHA2_512[_0] 229s | appending IKE PRF algorithm HMAC_SHA2_256[_0] 229s | appending IKE integrity algorithm HMAC_SHA2_512_256[_0] 229s | appending IKE integrity algorithm HMAC_SHA2_256_128[_0] 229s | appending IKE DH algorithm DH19[_0] 229s | appending IKE DH algorithm DH20[_0] 229s | appending IKE DH algorithm DH21[_0] 229s | appending IKE DH algorithm DH31[_0] 229s | appending IKE DH algorithm MODP4096[_0] 229s | appending IKE DH algorithm MODP3072[_0] 229s | appending IKE DH algorithm MODP2048[_0] 229s | appending IKE DH algorithm MODP8192[_0] 229s | parsing 'aes;none' for IKE 229s | proposal: 'aes;none' 229s | token: '' '' "aes" ';' 229s | token: '' "aes" ';' "none" '' 229s | token: ';' "none" '' '' 229s | appending IKE encryption algorithm AES_CBC[_0] 229s | parsing dh: 229s | appending IKE DH algorithm NONE[_0] 229s | token: '' '' '' 229s | appending IKE PRF algorithm HMAC_SHA2_512[_0] 229s | appending IKE PRF algorithm HMAC_SHA2_256[_0] 229s | appending IKE integrity algorithm HMAC_SHA2_512_256[_0] 229s | appending IKE integrity algorithm HMAC_SHA2_256_128[_0] 229s | parsing 'id2' for IKE 229s | proposal: 'id2' 229s | token: '' '' "id2" '' 229s | token: '' "id2" '' '' 229s | ike_alg_byname() failed: IKE encryption algorithm 'id2' is not recognized 229s | ike_alg_byname() failed: IKE encryption algorithm 'id2' is not recognized 229s | parsing '3des-id2' for IKE 229s | proposal: '3des-id2' 229s | token: '' '' "3des" '-' 229s | token: '' "3des" '-' "id2" '' 229s | token: '-' "id2" '' '' 229s | appending IKE encryption algorithm 3DES_CBC[_0] 229s | parsing prf: 229s | ike_alg_byname() failed: IKE PRF algorithm 'id2' is not recognized 229s | lookup for PRF algorithm 'id2' failed 229s | - failed, saving error 'IKE PRF algorithm 'id2' is not recognized' and tossing result 229s | parsing integ: 229s | ike_alg_byname() failed: IKE integrity algorithm 'id2' is not recognized 229s | lookup for integrity algorithm 'id2' failed 229s | - and - failed, returning earlier PRF error 'IKE PRF algorithm 'id2' is not recognized' and discarding INTEG error 'IKE integrity algorithm 'id2' is not recognized') 229s | parsing 'aes_ccm' for IKE 229s | proposal: 'aes_ccm' 229s | token: '' '' "aes_ccm" '' 229s | token: '' "aes_ccm" '' '' 229s | alg_byname_ok() failed: IKE encryption algorithm 'aes_ccm' is not supported 229s | parsing 'aes-sha1-sha2-ecp_521' for IKE 229s | proposal: 'aes-sha1-sha2-ecp_521' 229s | token: '' '' "aes" '-' 229s | token: '' "aes" '-' "sha1" '-' 229s | token: '-' "sha1" '-' "sha2" '-' 229s | appending IKE encryption algorithm AES_CBC[_0] 229s | parsing prf: 229s | appending IKE PRF algorithm HMAC_SHA1[_0] 229s | token: '-' "sha2" '-' "ecp_521" '' 229s | - succeeded, advancing tokens 229s | parsing dh: 229s | ike_alg_byname() failed: IKE DH algorithm 'sha2' is not recognized 229s | lookup for DH algorithm 'sha2' failed 229s | ... failed 'IKE DH algorithm 'sha2' is not recognized' 229s | parsing 'aes-sha2-sha2;ecp_521' for IKE 229s | proposal: 'aes-sha2-sha2;ecp_521' 229s | token: '' '' "aes" '-' 229s | token: '' "aes" '-' "sha2" '-' 229s | token: '-' "sha2" '-' "sha2" ';' 229s | appending IKE encryption algorithm AES_CBC[_0] 229s | parsing prf: 229s | appending IKE PRF algorithm HMAC_SHA2_256[_0] 229s | token: '-' "sha2" ';' "ecp_521" '' 229s | - succeeded, advancing tokens 229s | parsing dh: 229s | ike_alg_byname() failed: IKE DH algorithm 'sha2' is not recognized 229s | lookup for DH algorithm 'sha2' failed 229s | ... failed 'IKE DH algorithm 'sha2' is not recognized' 229s | parsing 'aes-sha1_96-sha2-ecp_521' for IKE 229s | proposal: 'aes-sha1_96-sha2-ecp_521' 229s | token: '' '' "aes" '-' 229s | token: '' "aes" '-' "sha1_96" '-' 229s | token: '-' "sha1_96" '-' "sha2" '-' 229s | appending IKE encryption algorithm AES_CBC[_0] 229s | parsing prf: 229s | ike_alg_byname() failed: IKE PRF algorithm 'sha1_96' is not recognized 229s | lookup for PRF algorithm 'sha1_96' failed 229s | - failed, saving error 'IKE PRF algorithm 'sha1_96' is not recognized' and tossing result 229s | parsing integ: 229s | appending IKE integrity algorithm HMAC_SHA1_96[_0] 229s | token: '-' "sha2" '-' "ecp_521" '' 229s | parsing prf: 229s | appending IKE PRF algorithm HMAC_SHA2_256[_0] 229s | token: '-' "ecp_521" '' '' 229s | parsing dh: 229s | appending IKE DH algorithm DH21[_0] 229s | token: '' '' '' 229s | parsing 'aes-sha1_96-sha2;ecp_521' for IKE 229s | proposal: 'aes-sha1_96-sha2;ecp_521' 229s | token: '' '' "aes" '-' 229s | token: '' "aes" '-' "sha1_96" '-' 229s | token: '-' "sha1_96" '-' "sha2" ';' 229s | appending IKE encryption algorithm AES_CBC[_0] 229s | parsing prf: 229s | ike_alg_byname() failed: IKE PRF algorithm 'sha1_96' is not recognized 229s | lookup for PRF algorithm 'sha1_96' failed 229s | - failed, saving error 'IKE PRF algorithm 'sha1_96' is not recognized' and tossing result 229s | parsing integ: 229s | appending IKE integrity algorithm HMAC_SHA1_96[_0] 229s | token: '-' "sha2" ';' "ecp_521" '' 229s | parsing prf: 229s | appending IKE PRF algorithm HMAC_SHA2_256[_0] 229s | token: ';' "ecp_521" '' '' 229s | parsing dh: 229s | appending IKE DH algorithm DH21[_0] 229s | token: '' '' '' 229s | parsing 'aes+aes-sha1+sha1-modp8192+modp8192' for IKE 229s | proposal: 'aes+aes-sha1+sha1-modp8192+modp8192' 229s | token: '' '' "aes" '+' 229s | token: '' "aes" '+' "aes" '-' 229s | token: '+' "aes" '-' "sha1" '+' 229s | appending IKE encryption algorithm AES_CBC[_0] 229s | token: '-' "sha1" '+' "sha1" '-' 229s | appending IKE encryption algorithm AES_CBC[_0] 229s ipsec algparse: discarding duplicate IKE encryption algorithm AES_CBC 229s | parsing prf: 229s | appending IKE PRF algorithm HMAC_SHA1[_0] 229s | token: '+' "sha1" '-' "modp8192" '+' 229s | appending IKE PRF algorithm HMAC_SHA1[_0] 229s | token: '-' "modp8192" '+' "modp8192" '' 229s ipsec algparse: discarding duplicate IKE PRF algorithm HMAC_SHA1 229s | - succeeded, advancing tokens 229s | parsing dh: 229s | appending IKE DH algorithm MODP8192[_0] 229s | token: '+' "modp8192" '' '' 229s | appending IKE DH algorithm MODP8192[_0] 229s | token: '' '' '' 229s ipsec algparse: discarding duplicate IKE DH algorithm MODP8192 229s | appending IKE integrity algorithm HMAC_SHA1_96[_0] 229s | parsing '3des+aes+aes-sha2+sha1+sha1-modp4096+modp8192+modp8192' for IKE 229s | proposal: '3des+aes+aes-sha2+sha1+sha1-modp4096+modp8192+modp8192' 229s | token: '' '' "3des" '+' 229s | token: '' "3des" '+' "aes" '+' 229s | token: '+' "aes" '+' "aes" '-' 229s | appending IKE encryption algorithm 3DES_CBC[_0] 229s | token: '+' "aes" '-' "sha2" '+' 229s | appending IKE encryption algorithm AES_CBC[_0] 229s | token: '-' "sha2" '+' "sha1" '+' 229s | appending IKE encryption algorithm AES_CBC[_0] 229s ipsec algparse: discarding duplicate IKE encryption algorithm AES_CBC 229s | parsing prf: 229s | appending IKE PRF algorithm HMAC_SHA2_256[_0] 229s | token: '+' "sha1" '+' "sha1" '-' 229s | appending IKE PRF algorithm HMAC_SHA1[_0] 229s | token: '+' "sha1" '-' "modp4096" '+' 229s | appending IKE PRF algorithm HMAC_SHA1[_0] 229s | token: '-' "modp4096" '+' "modp8192" '+' 229s ipsec algparse: discarding duplicate IKE PRF algorithm HMAC_SHA1 229s | - succeeded, advancing tokens 229s | parsing dh: 229s | appending IKE DH algorithm MODP4096[_0] 229s | token: '+' "modp8192" '+' "modp8192" '' 229s | appending IKE DH algorithm MODP8192[_0] 229s | token: '+' "modp8192" '' '' 229s | appending IKE DH algorithm MODP8192[_0] 229s | token: '' '' '' 229s ipsec algparse: discarding duplicate IKE DH algorithm MODP8192 229s | appending IKE integrity algorithm HMAC_SHA2_256_128[_0] 229s | appending IKE integrity algorithm HMAC_SHA1_96[_0] 229s | parsing 'aes+3des+aes-sha1+sha2+sha1-modp8192+modp4096+modp8192' for IKE 229s | proposal: 'aes+3des+aes-sha1+sha2+sha1-modp8192+modp4096+modp8192' 229s | token: '' '' "aes" '+' 229s | token: '' "aes" '+' "3des" '+' 229s | token: '+' "3des" '+' "aes" '-' 229s | appending IKE encryption algorithm AES_CBC[_0] 229s | token: '+' "aes" '-' "sha1" '+' 229s | appending IKE encryption algorithm 3DES_CBC[_0] 229s | token: '-' "sha1" '+' "sha2" '+' 229s | appending IKE encryption algorithm AES_CBC[_0] 229s ipsec algparse: discarding duplicate IKE encryption algorithm AES_CBC 229s | parsing prf: 229s | appending IKE PRF algorithm HMAC_SHA1[_0] 229s | token: '+' "sha2" '+' "sha1" '-' 229s | appending IKE PRF algorithm HMAC_SHA2_256[_0] 229s | token: '+' "sha1" '-' "modp8192" '+' 229s | appending IKE PRF algorithm HMAC_SHA1[_0] 229s | token: '-' "modp8192" '+' "modp4096" '+' 229s ipsec algparse: discarding duplicate IKE PRF algorithm HMAC_SHA1 229s | - succeeded, advancing tokens 229s | parsing dh: 229s | appending IKE DH algorithm MODP8192[_0] 229s | token: '+' "modp4096" '+' "modp8192" '' 229s | appending IKE DH algorithm MODP4096[_0] 229s | token: '+' "modp8192" '' '' 229s | appending IKE DH algorithm MODP8192[_0] 229s | token: '' '' '' 229s ipsec algparse: discarding duplicate IKE DH algorithm MODP8192 229s | appending IKE integrity algorithm HMAC_SHA1_96[_0] 229s | appending IKE integrity algorithm HMAC_SHA2_256_128[_0] 229s | parsing 'aes+aes+3des-sha1+sha1+sha2-modp8192+modp8192+modp4096' for IKE 229s | proposal: 'aes+aes+3des-sha1+sha1+sha2-modp8192+modp8192+modp4096' 229s | token: '' '' "aes" '+' 229s | token: '' "aes" '+' "aes" '+' 229s | token: '+' "aes" '+' "3des" '-' 229s | appending IKE encryption algorithm AES_CBC[_0] 229s | token: '+' "3des" '-' "sha1" '+' 229s | appending IKE encryption algorithm AES_CBC[_0] 229s | token: '-' "sha1" '+' "sha1" '+' 229s | appending IKE encryption algorithm 3DES_CBC[_0] 229s ipsec algparse: discarding duplicate IKE encryption algorithm AES_CBC 229s | parsing prf: 229s | appending IKE PRF algorithm HMAC_SHA1[_0] 229s | token: '+' "sha1" '+' "sha2" '-' 229s | appending IKE PRF algorithm HMAC_SHA1[_0] 229s | token: '+' "sha2" '-' "modp8192" '+' 229s | appending IKE PRF algorithm HMAC_SHA2_256[_0] 229s | token: '-' "modp8192" '+' "modp8192" '+' 229s ipsec algparse: discarding duplicate IKE PRF algorithm HMAC_SHA1 229s | - succeeded, advancing tokens 229s | parsing dh: 229s | appending IKE DH algorithm MODP8192[_0] 229s | token: '+' "modp8192" '+' "modp4096" '' 229s | appending IKE DH algorithm MODP8192[_0] 229s | token: '+' "modp4096" '' '' 229s | appending IKE DH algorithm MODP4096[_0] 229s | token: '' '' '' 229s ipsec algparse: discarding duplicate IKE DH algorithm MODP8192 229s | appending IKE integrity algorithm HMAC_SHA1_96[_0] 229s | appending IKE integrity algorithm HMAC_SHA2_256_128[_0] 229s | parsing 'aes+aes128+aes256' for IKE 229s | proposal: 'aes+aes128+aes256' 229s | token: '' '' "aes" '+' 229s | token: '' "aes" '+' "aes128" '+' 229s | token: '+' "aes128" '+' "aes256" '' 229s | appending IKE encryption algorithm AES_CBC[_0] 229s | ike_alg_byname() failed: IKE encryption algorithm 'aes128' is not recognized 229s | token: '+' "aes256" '' '' 229s | appending IKE encryption algorithm AES_CBC[_128] 229s | ike_alg_byname() failed: IKE encryption algorithm 'aes256' is not recognized 229s | token: '' '' '' 229s | appending IKE encryption algorithm AES_CBC[_256] 229s ipsec algparse: discarding duplicate IKE encryption algorithm AES_CBC_128 229s ipsec algparse: discarding duplicate IKE encryption algorithm AES_CBC_256 229s | appending IKE PRF algorithm HMAC_SHA2_512[_0] 229s | appending IKE PRF algorithm HMAC_SHA2_256[_0] 229s | appending IKE integrity algorithm HMAC_SHA2_512_256[_0] 229s | appending IKE integrity algorithm HMAC_SHA2_256_128[_0] 229s | appending IKE DH algorithm DH19[_0] 229s | appending IKE DH algorithm DH20[_0] 229s | appending IKE DH algorithm DH21[_0] 229s | appending IKE DH algorithm DH31[_0] 229s | appending IKE DH algorithm MODP4096[_0] 229s | appending IKE DH algorithm MODP3072[_0] 229s | appending IKE DH algorithm MODP2048[_0] 229s | appending IKE DH algorithm MODP8192[_0] 229s | parsing 'aes128+aes+aes256' for IKE 229s | proposal: 'aes128+aes+aes256' 229s | token: '' '' "aes128" '+' 229s | token: '' "aes128" '+' "aes" '+' 229s | ike_alg_byname() failed: IKE encryption algorithm 'aes128' is not recognized 229s | token: '+' "aes" '+' "aes256" '' 229s | appending IKE encryption algorithm AES_CBC[_128] 229s | token: '+' "aes256" '' '' 229s | appending IKE encryption algorithm AES_CBC[_0] 229s | ike_alg_byname() failed: IKE encryption algorithm 'aes256' is not recognized 229s | token: '' '' '' 229s | appending IKE encryption algorithm AES_CBC[_256] 229s ipsec algparse: discarding duplicate IKE encryption algorithm AES_CBC_256 229s | appending IKE PRF algorithm HMAC_SHA2_512[_0] 229s | appending IKE PRF algorithm HMAC_SHA2_256[_0] 229s | appending IKE integrity algorithm HMAC_SHA2_512_256[_0] 229s | appending IKE integrity algorithm HMAC_SHA2_256_128[_0] 229s | appending IKE DH algorithm DH19[_0] 229s | appending IKE DH algorithm DH20[_0] 229s | appending IKE DH algorithm DH21[_0] 229s | appending IKE DH algorithm DH31[_0] 229s | appending IKE DH algorithm MODP4096[_0] 229s | appending IKE DH algorithm MODP3072[_0] 229s | appending IKE DH algorithm MODP2048[_0] 229s | appending IKE DH algorithm MODP8192[_0] 229s | parsing 'aes128+aes256+aes' for IKE 229s | proposal: 'aes128+aes256+aes' 229s | token: '' '' "aes128" '+' 229s | token: '' "aes128" '+' "aes256" '+' 229s | ike_alg_byname() failed: IKE encryption algorithm 'aes128' is not recognized 229s | token: '+' "aes256" '+' "aes" '' 229s | appending IKE encryption algorithm AES_CBC[_128] 229s | ike_alg_byname() failed: IKE encryption algorithm 'aes256' is not recognized 229s | token: '+' "aes" '' '' 229s | appending IKE encryption algorithm AES_CBC[_256] 229s | token: '' '' '' 229s | appending IKE encryption algorithm AES_CBC[_0] 229s | appending IKE PRF algorithm HMAC_SHA2_512[_0] 229s | appending IKE PRF algorithm HMAC_SHA2_256[_0] 229s | appending IKE integrity algorithm HMAC_SHA2_512_256[_0] 229s | appending IKE integrity algorithm HMAC_SHA2_256_128[_0] 229s | appending IKE DH algorithm DH19[_0] 229s | appending IKE DH algorithm DH20[_0] 229s | appending IKE DH algorithm DH21[_0] 229s | appending IKE DH algorithm DH31[_0] 229s | appending IKE DH algorithm MODP4096[_0] 229s | appending IKE DH algorithm MODP3072[_0] 229s | appending IKE DH algorithm MODP2048[_0] 229s | appending IKE DH algorithm MODP8192[_0] 229s | parsing 'aes-sha1-modp8192,aes-sha1-modp8192,aes-sha1-modp8192' for IKE 229s | proposal: 'aes-sha1-modp8192' 229s | token: '' '' "aes" '-' 229s | token: '' "aes" '-' "sha1" '-' 229s | token: '-' "sha1" '-' "modp8192" '' 229s | appending IKE encryption algorithm AES_CBC[_0] 229s | parsing prf: 229s | appending IKE PRF algorithm HMAC_SHA1[_0] 229s | token: '-' "modp8192" '' '' 229s | - succeeded, advancing tokens 229s | parsing dh: 229s | appending IKE DH algorithm MODP8192[_0] 229s | token: '' '' '' 229s | appending IKE integrity algorithm HMAC_SHA1_96[_0] 229s | proposal: 'aes-sha1-modp8192' 229s | token: '' '' "aes" '-' 229s | token: '' "aes" '-' "sha1" '-' 229s | token: '-' "sha1" '-' "modp8192" '' 229s | appending IKE encryption algorithm AES_CBC[_0] 229s | parsing prf: 229s | appending IKE PRF algorithm HMAC_SHA1[_0] 229s | token: '-' "modp8192" '' '' 229s | - succeeded, advancing tokens 229s | parsing dh: 229s | appending IKE DH algorithm MODP8192[_0] 229s | token: '' '' '' 229s | appending IKE integrity algorithm HMAC_SHA1_96[_0] 229s | proposal: 'aes-sha1-modp8192' 229s | token: '' '' "aes" '-' 229s | token: '' "aes" '-' "sha1" '-' 229s | token: '-' "sha1" '-' "modp8192" '' 229s | appending IKE encryption algorithm AES_CBC[_0] 229s | parsing prf: 229s | appending IKE PRF algorithm HMAC_SHA1[_0] 229s | token: '-' "modp8192" '' '' 229s | - succeeded, advancing tokens 229s | parsing dh: 229s | appending IKE DH algorithm MODP8192[_0] 229s | token: '' '' '' 229s | appending IKE integrity algorithm HMAC_SHA1_96[_0] 229s | parsing 'aes-sha1-modp8192,aes-sha2-modp8192,aes-sha1-modp8192' for IKE 229s | proposal: 'aes-sha1-modp8192' 229s | token: '' '' "aes" '-' 229s | token: '' "aes" '-' "sha1" '-' 229s | token: '-' "sha1" '-' "modp8192" '' 229s | appending IKE encryption algorithm AES_CBC[_0] 229s | parsing prf: 229s | appending IKE PRF algorithm HMAC_SHA1[_0] 229s | token: '-' "modp8192" '' '' 229s | - succeeded, advancing tokens 229s | parsing dh: 229s | appending IKE DH algorithm MODP8192[_0] 229s | token: '' '' '' 229s | appending IKE integrity algorithm HMAC_SHA1_96[_0] 229s | proposal: 'aes-sha2-modp8192' 229s | token: '' '' "aes" '-' 229s | token: '' "aes" '-' "sha2" '-' 229s | token: '-' "sha2" '-' "modp8192" '' 229s | appending IKE encryption algorithm AES_CBC[_0] 229s | parsing prf: 229s | appending IKE PRF algorithm HMAC_SHA2_256[_0] 229s | token: '-' "modp8192" '' '' 229s | - succeeded, advancing tokens 229s | parsing dh: 229s | appending IKE DH algorithm MODP8192[_0] 229s | token: '' '' '' 229s | appending IKE integrity algorithm HMAC_SHA2_256_128[_0] 229s | proposal: 'aes-sha1-modp8192' 229s | token: '' '' "aes" '-' 229s | token: '' "aes" '-' "sha1" '-' 229s | token: '-' "sha1" '-' "modp8192" '' 229s | appending IKE encryption algorithm AES_CBC[_0] 229s | parsing prf: 229s | appending IKE PRF algorithm HMAC_SHA1[_0] 229s | token: '-' "modp8192" '' '' 229s | - succeeded, advancing tokens 229s | parsing dh: 229s | appending IKE DH algorithm MODP8192[_0] 229s | token: '' '' '' 229s | appending IKE integrity algorithm HMAC_SHA1_96[_0] 229s | parsing 'aes_gcm' for IKE 229s | proposal: 'aes_gcm' 229s | token: '' '' "aes_gcm" '' 229s | token: '' "aes_gcm" '' '' 229s | token: '' '' '' 229s | appending IKE encryption algorithm AES_GCM_16[_0] 229s | appending IKE PRF algorithm HMAC_SHA2_512[_0] 229s | appending IKE PRF algorithm HMAC_SHA2_256[_0] 229s | appending IKE integrity algorithm NONE[_0] 229s | appending IKE DH algorithm DH19[_0] 229s | appending IKE DH algorithm DH20[_0] 229s | appending IKE DH algorithm DH21[_0] 229s | appending IKE DH algorithm DH31[_0] 229s | appending IKE DH algorithm MODP4096[_0] 229s | appending IKE DH algorithm MODP3072[_0] 229s | appending IKE DH algorithm MODP2048[_0] 229s | appending IKE DH algorithm MODP8192[_0] 229s | parsing 'aes_gcm-sha2' for IKE 229s | proposal: 'aes_gcm-sha2' 229s | token: '' '' "aes_gcm" '-' 229s | token: '' "aes_gcm" '-' "sha2" '' 229s | token: '-' "sha2" '' '' 229s | appending IKE encryption algorithm AES_GCM_16[_0] 229s | parsing prf: 229s | appending IKE PRF algorithm HMAC_SHA2_256[_0] 229s | token: '' '' '' 229s | - succeeded, advancing tokens 229s | appending IKE integrity algorithm NONE[_0] 229s | appending IKE DH algorithm DH19[_0] 229s | appending IKE DH algorithm DH20[_0] 229s | appending IKE DH algorithm DH21[_0] 229s | appending IKE DH algorithm DH31[_0] 229s | appending IKE DH algorithm MODP4096[_0] 229s | appending IKE DH algorithm MODP3072[_0] 229s | appending IKE DH algorithm MODP2048[_0] 229s | appending IKE DH algorithm MODP8192[_0] 229s | parsing 'aes_gcm-sha2-modp2048' for IKE 229s | proposal: 'aes_gcm-sha2-modp2048' 229s | token: '' '' "aes_gcm" '-' 229s | token: '' "aes_gcm" '-' "sha2" '-' 229s | token: '-' "sha2" '-' "modp2048" '' 229s | appending IKE encryption algorithm AES_GCM_16[_0] 229s | parsing prf: 229s | appending IKE PRF algorithm HMAC_SHA2_256[_0] 229s | token: '-' "modp2048" '' '' 229s | - succeeded, advancing tokens 229s | parsing dh: 229s | appending IKE DH algorithm MODP2048[_0] 229s | token: '' '' '' 229s | appending IKE integrity algorithm NONE[_0] 229s | parsing 'aes_gcm-sha2;modp2048' for IKE 229s | proposal: 'aes_gcm-sha2;modp2048' 229s | token: '' '' "aes_gcm" '-' 229s | token: '' "aes_gcm" '-' "sha2" ';' 229s | token: '-' "sha2" ';' "modp2048" '' 229s | appending IKE encryption algorithm AES_GCM_16[_0] 229s | parsing prf: 229s | appending IKE PRF algorithm HMAC_SHA2_256[_0] 229s | token: ';' "modp2048" '' '' 229s | - succeeded, advancing tokens 229s | parsing dh: 229s | appending IKE DH algorithm MODP2048[_0] 229s | token: '' '' '' 229s | appending IKE integrity algorithm NONE[_0] 229s | parsing 'aes_gcm-modp2048' for IKE 229s | proposal: 'aes_gcm-modp2048' 229s | token: '' '' "aes_gcm" '-' 229s | token: '' "aes_gcm" '-' "modp2048" '' 229s | token: '-' "modp2048" '' '' 229s | appending IKE encryption algorithm AES_GCM_16[_0] 229s | parsing prf: 229s | ike_alg_byname() failed: IKE PRF algorithm 'modp2048' is not recognized 229s | lookup for PRF algorithm 'modp2048' failed 229s | - failed, saving error 'IKE PRF algorithm 'modp2048' is not recognized' and tossing result 229s | parsing integ: 229s | ike_alg_byname() failed: IKE integrity algorithm 'modp2048' is not recognized 229s | lookup for integrity algorithm 'modp2048' failed 229s | - and - failed, returning earlier PRF error 'IKE PRF algorithm 'modp2048' is not recognized' and discarding INTEG error 'IKE integrity algorithm 'modp2048' is not recognized') 229s | parsing 'aes_gcm;modp2048' for IKE 229s | proposal: 'aes_gcm;modp2048' 229s | token: '' '' "aes_gcm" ';' 229s | token: '' "aes_gcm" ';' "modp2048" '' 229s | token: ';' "modp2048" '' '' 229s | appending IKE encryption algorithm AES_GCM_16[_0] 229s | parsing dh: 229s | appending IKE DH algorithm MODP2048[_0] 229s | token: '' '' '' 229s | appending IKE PRF algorithm HMAC_SHA2_512[_0] 229s | appending IKE PRF algorithm HMAC_SHA2_256[_0] 229s | appending IKE integrity algorithm NONE[_0] 229s | parsing 'aes_gcm-none' for IKE 229s | proposal: 'aes_gcm-none' 229s | token: '' '' "aes_gcm" '-' 229s | token: '' "aes_gcm" '-' "none" '' 229s | token: '-' "none" '' '' 229s | appending IKE encryption algorithm AES_GCM_16[_0] 229s | parsing prf: 229s | ike_alg_byname() failed: IKE PRF algorithm 'none' is not recognized 229s | lookup for PRF algorithm 'none' failed 229s | - failed, saving error 'IKE PRF algorithm 'none' is not recognized' and tossing result 229s | parsing integ: 229s | appending IKE integrity algorithm NONE[_0] 229s | token: '' '' '' 229s | appending IKE PRF algorithm HMAC_SHA2_512[_0] 229s | appending IKE PRF algorithm HMAC_SHA2_256[_0] 229s | appending IKE DH algorithm DH19[_0] 229s | appending IKE DH algorithm DH20[_0] 229s | appending IKE DH algorithm DH21[_0] 229s | appending IKE DH algorithm DH31[_0] 229s | appending IKE DH algorithm MODP4096[_0] 229s | appending IKE DH algorithm MODP3072[_0] 229s | appending IKE DH algorithm MODP2048[_0] 229s | appending IKE DH algorithm MODP8192[_0] 229s | parsing 'aes_gcm-none-sha2' for IKE 229s | proposal: 'aes_gcm-none-sha2' 229s | token: '' '' "aes_gcm" '-' 229s | token: '' "aes_gcm" '-' "none" '-' 229s | token: '-' "none" '-' "sha2" '' 229s | appending IKE encryption algorithm AES_GCM_16[_0] 229s | parsing prf: 229s | ike_alg_byname() failed: IKE PRF algorithm 'none' is not recognized 229s | lookup for PRF algorithm 'none' failed 229s | - failed, saving error 'IKE PRF algorithm 'none' is not recognized' and tossing result 229s | parsing integ: 229s | appending IKE integrity algorithm NONE[_0] 229s | token: '-' "sha2" '' '' 229s | parsing prf: 229s | appending IKE PRF algorithm HMAC_SHA2_256[_0] 229s | token: '' '' '' 229s | appending IKE DH algorithm DH19[_0] 229s | appending IKE DH algorithm DH20[_0] 229s | appending IKE DH algorithm DH21[_0] 229s | appending IKE DH algorithm DH31[_0] 229s | appending IKE DH algorithm MODP4096[_0] 229s | appending IKE DH algorithm MODP3072[_0] 229s | appending IKE DH algorithm MODP2048[_0] 229s | appending IKE DH algorithm MODP8192[_0] 229s AES_CBC_128+AES_CBC-HMAC_SHA2_512+HMAC_SHA2_256-DH19+DH20+DH21+DH31+MODP4096+MODP3072+MODP2048+MODP8192 229s algparse -v2 'ike=aes128+aes256+aes' (expect SUCCESS) 229s AES_CBC_128+AES_CBC_256+AES_CBC-HMAC_SHA2_512+HMAC_SHA2_256-DH19+DH20+DH21+DH31+MODP4096+MODP3072+MODP2048+MODP8192 229s algparse -v2 'ike=aes-sha1-modp8192,aes-sha1-modp8192,aes-sha1-modp8192' (expect SUCCESS) 229s AES_CBC-HMAC_SHA1-MODP8192 229s algparse -v2 'ike=aes-sha1-modp8192,aes-sha2-modp8192,aes-sha1-modp8192' (expect SUCCESS) 229s AES_CBC-HMAC_SHA1-MODP8192 229s AES_CBC-HMAC_SHA2_256-MODP8192 229s algparse -v2 'ike=aes_gcm' (expect SUCCESS) 229s AES_GCM_16-HMAC_SHA2_512+HMAC_SHA2_256-DH19+DH20+DH21+DH31+MODP4096+MODP3072+MODP2048+MODP8192 229s algparse -v2 'ike=aes_gcm-sha2' (expect SUCCESS) 229s AES_GCM_16-HMAC_SHA2_256-DH19+DH20+DH21+DH31+MODP4096+MODP3072+MODP2048+MODP8192 229s algparse -v2 'ike=aes_gcm-sha2-modp2048' (expect SUCCESS) 229s AES_GCM_16-HMAC_SHA2_256-MODP2048 229s algparse -v2 'ike=aes_gcm-sha2;modp2048' (expect SUCCESS) 229s AES_GCM_16-HMAC_SHA2_256-MODP2048 229s algparse -v2 'ike=aes_gcm-modp2048' (expect ERROR) 229s ERROR: IKE PRF algorithm 'modp2048' is not recognized 229s algparse -v2 'ike=aes_gcm;modp2048' (expect SUCCESS) 229s AES_GCM_16-HMAC_SHA2_512+HMAC_SHA2_256-MODP2048 229s algparse -v2 'ike=aes_gcm-none' (expect SUCCESS) 229s AES_GCM_16-HMAC_SHA2_512+HMAC_SHA2_256-DH19+DH20+DH21+DH31+MODP4096+MODP3072+MODP2048+MODP8192 229s algparse -v2 'ike=aes_gcm-none-sha2' (expect SUCCESS) 229s AES_GCM_16-HMAC_SHA2_256-DH19+DH20+DH21+DH31+MODP4096+MODP3072+MODP2048+MODP8192 229s algparse -v2 'ike=aes_gcm-none-sha2-modp2048' (expect SUCCESS) 229s AES_GCM_16-HMAC_SHA2_256-MODP2048 229s algparse -v2 'ike=aes_gcm-none-sha2;modp2048' (expect SUCCESS) 229s AES_GCM_16-HMAC_SHA2_256-MODP2048 229s algparse -v2 'ike=aes_gcm-none-modp2048' (expect ERROR) 229s | parsing 'aes_gcm-none-sha2-modp2048' for IKE 229s | proposal: 'aes_gcm-none-sha2-modp2048' 229s | token: '' '' "aes_gcm" '-' 229s | token: '' "aes_gcm" '-' "none" '-' 229s | token: '-' "none" '-' "sha2" '-' 229s | appending IKE encryption algorithm AES_GCM_16[_0] 229s | parsing prf: 229s | ike_alg_byname() failed: IKE PRF algorithm 'none' is not recognized 229s | lookup for PRF algorithm 'none' failed 229s | - failed, saving error 'IKE PRF algorithm 'none' is not recognized' and tossing result 229s | parsing integ: 229s | appending IKE integrity algorithm NONE[_0] 229s | token: '-' "sha2" '-' "modp2048" '' 229s | parsing prf: 229s | appending IKE PRF algorithm HMAC_SHA2_256[_0] 229s | token: '-' "modp2048" '' '' 229s | parsing dh: 229s | appending IKE DH algorithm MODP2048[_0] 229s | token: '' '' '' 229s | parsing 'aes_gcm-none-sha2;modp2048' for IKE 229s | proposal: 'aes_gcm-none-sha2;modp2048' 229s | token: '' '' "aes_gcm" '-' 229s | token: '' "aes_gcm" '-' "none" '-' 229s | token: '-' "none" '-' "sha2" ';' 229s | appending IKE encryption algorithm AES_GCM_16[_0] 229s | parsing prf: 229s | ike_alg_byname() failed: IKE PRF algorithm 'none' is not recognized 229s | lookup for PRF algorithm 'none' failed 229s | - failed, saving error 'IKE PRF algorithm 'none' is not recognized' and tossing result 229s | parsing integ: 229s | appending IKE integrity algorithm NONE[_0] 229s | token: '-' "sha2" ';' "modp2048" '' 229s | parsing prf: 229s | appending IKE PRF algorithm HMAC_SHA2_256[_0] 229s | token: ';' "modp2048" '' '' 229s | parsing dh: 229s | appending IKE DH algorithm MODP2048[_0] 229s | token: '' '' '' 229s | parsing 'aes_gcm-none-modp2048' for IKE 229s | proposal: 'aes_gcm-none-modp2048' 229s | token: '' '' "aes_gcm" '-' 229s | token: '' "aes_gcm" '-' "none" '-' 229s | token: '-' "none" '-' "modp2048" '' 229s | appending IKE encryption algorithm AES_GCM_16[_0] 229s | parsing prf: 229s | ike_alg_byname() failed: IKE PRF algorithm 'none' is not recognized 229s | lookup for PRF algorithm 'none' failed 229s | - failed, saving error 'IKE PRF algorithm 'none' is not recognized' and tossing result 229s | parsing integ: 229s | appending IKE integrity algorithm NONE[_0] 229s | token: '-' "modp2048" '' '' 229s | parsing prf: 229s | ike_alg_byname() failed: IKE PRF algorithm 'modp2048' is not recognized 229s | lookup for PRF algorithm 'modp2048' failed 229s | -- failed 'IKE PRF algorithm 'modp2048' is not recognized' 229s | parsing 'aes_gcm-none;modp2048' for IKE 229s | proposal: 'aes_gcm-none;modp2048' 229s | token: '' '' "aes_gcm" '-' 229s | token: '' "aes_gcm" '-' "none" ';' 229s | token: '-' "none" ';' "modp2048" '' 229s | appending IKE encryption algorithm AES_GCM_16[_0] 229s | parsing prf: 229s | ike_alg_byname() failed: IKE PRF algorithm 'none' is not recognized 229s | lookup for PRF algorithm 'none' failed 229s | - failed, saving error 'IKE PRF algorithm 'none' is not recognized' and tossing result 229s | parsing integ: 229s | appending IKE integrity algorithm NONE[_0] 229s | token: ';' "modp2048" '' '' 229s | parsing dh: 229s | appending IKE DH algorithm MODP2048[_0] 229s | token: '' '' '' 229s | appending IKE PRF algorithm HMAC_SHA2_512[_0] 229s | appending IKE PRF algorithm HMAC_SHA2_256[_0] 229s | parsing 'aes_gcm-sha1-none-modp2048' for IKE 229s | proposal: 'aes_gcm-sha1-none-modp2048' 229s | token: '' '' "aes_gcm" '-' 229s | token: '' "aes_gcm" '-' "sha1" '-' 229s | token: '-' "sha1" '-' "none" '-' 229s | appending IKE encryption algorithm AES_GCM_16[_0] 229s | parsing prf: 229s | appending IKE PRF algorithm HMAC_SHA1[_0] 229s | token: '-' "none" '-' "modp2048" '' 229s | - succeeded, advancing tokens 229s | parsing dh: 229s | appending IKE DH algorithm NONE[_0] 229s | token: '-' "modp2048" '' '' 229s | parsing 'aes_gcm-sha1-none;modp2048' for IKE 229s | proposal: 'aes_gcm-sha1-none;modp2048' 229s | token: '' '' "aes_gcm" '-' 229s | token: '' "aes_gcm" '-' "sha1" '-' 229s | token: '-' "sha1" '-' "none" ';' 229s | appending IKE encryption algorithm AES_GCM_16[_0] 229s | parsing prf: 229s | appending IKE PRF algorithm HMAC_SHA1[_0] 229s | token: '-' "none" ';' "modp2048" '' 229s | - succeeded, advancing tokens 229s | parsing dh: 229s | appending IKE DH algorithm NONE[_0] 229s | token: ';' "modp2048" '' '' 229s | parsing 'aes+aes_gcm' for IKE 229s | proposal: 'aes+aes_gcm' 229s | token: '' '' "aes" '+' 229s | token: '' "aes" '+' "aes_gcm" '' 229s | token: '+' "aes_gcm" '' '' 229s | appending IKE encryption algorithm AES_CBC[_0] 229s | token: '' '' '' 229s | appending IKE encryption algorithm AES_GCM_16[_0] 229s | appending IKE PRF algorithm HMAC_SHA2_512[_0] 229s | appending IKE PRF algorithm HMAC_SHA2_256[_0] 229s | appending IKE DH algorithm DH19[_0] 229s | appending IKE DH algorithm DH20[_0] 229s | appending IKE DH algorithm DH21[_0] 229s | appending IKE DH algorithm DH31[_0] 229s | appending IKE DH algorithm MODP4096[_0] 229s | appending IKE DH algorithm MODP3072[_0] 229s | appending IKE DH algorithm MODP2048[_0] 229s | appending IKE DH algorithm MODP8192[_0] 229s | parsing ',' for IKE 229s | proposal: '' 229s | token: '' '' "" '' 229s | token: '' "" '' '' 229s | parsing 'aes,' for IKE 229s | proposal: 'aes' 229s | token: '' '' "aes" '' 229s | token: '' "aes" '' '' 229s | token: '' '' '' 229s | appending IKE encryption algorithm AES_CBC[_0] 229s | appending IKE PRF algorithm HMAC_SHA2_512[_0] 229s | appending IKE PRF algorithm HMAC_SHA2_256[_0] 229s | appending IKE integrity algorithm HMAC_SHA2_512_256[_0] 229s | appending IKE integrity algorithm HMAC_SHA2_256_128[_0] 229s | appending IKE DH algorithm DH19[_0] 229s | appending IKE DH algorithm DH20[_0] 229s | appending IKE DH algorithm DH21[_0] 229s | appending IKE DH algorithm DH31[_0] 229s | appending IKE DH algorithm MODP4096[_0] 229s | appending IKE DH algorithm MODP3072[_0] 229s | appending IKE DH algorithm MODP2048[_0] 229s | appending IKE DH algorithm MODP8192[_0] 229s | proposal: '' 229s | token: '' '' "" '' 229s | token: '' "" '' '' 229s | parsing 'aes,,aes' for IKE 229s | proposal: 'aes' 229s | token: '' '' "aes" '' 229s | token: '' "aes" '' '' 229s | token: '' '' '' 229s | appending IKE encryption algorithm AES_CBC[_0] 229s | appending IKE PRF algorithm HMAC_SHA2_512[_0] 229s | appending IKE PRF algorithm HMAC_SHA2_256[_0] 229s | appending IKE integrity algorithm HMAC_SHA2_512_256[_0] 229s | appending IKE integrity algorithm HMAC_SHA2_256_128[_0] 229s | appending IKE DH algorithm DH19[_0] 229s | appending IKE DH algorithm DH20[_0] 229s | appending IKE DH algorithm DH21[_0] 229s | appending IKE DH algorithm DH31[_0] 229s | appending IKE DH algorithm MODP4096[_0] 229s | appending IKE DH algorithm MODP3072[_0] 229s | appending IKE DH algorithm MODP2048[_0] 229s | appending IKE DH algorithm MODP8192[_0] 229s | proposal: '' 229s | token: '' '' "" '' 229s | token: '' "" '' '' 229s | parsing ',aes' for IKE 229s | proposal: '' 229s | token: '' '' "" '' 229s | token: '' "" '' '' 229s | parsing '-' for IKE 229s | proposal: '-' 229s | token: '' '' "" '-' 229s | token: '' "" '-' "" '' 229s | parsing '+' for IKE 229s | proposal: '+' 229s | token: '' '' "" '+' 229s | token: '' "" '+' "" '' 229s | parsing ';' for IKE 229s | proposal: ';' 229s | token: '' '' "" ';' 229s | token: '' "" ';' "" '' 229s | parsing 'aes-' for IKE 229s | proposal: 'aes-' 229s | token: '' '' "aes" '-' 229s | token: '' "aes" '-' "" '' 229s | token: '-' "" '' '' 229s | appending IKE encryption algorithm AES_CBC[_0] 229s | parsing prf: 229s | - failed, saving error 'IKE PRF algorithm is empty' and tossing result 229s | parsing integ: 229s | - and - failed, returning earlier PRF error 'IKE PRF algorithm is empty' and discarding INTEG error 'IKE integrity algorithm is empty') 229s | parsing 'aes+' for IKE 229s | proposal: 'aes+' 229s | token: '' '' "aes" '+' 229s | token: '' "aes" '+' "" '' 229s | token: '+' "" '' '' 229s | appending IKE encryption algorithm AES_CBC[_0] 229s | parsing 'aes;' for IKE 229s | proposal: 'aes;' 229s | token: '' '' "aes" ';' 229s | token: '' "aes" ';' "" '' 229s | token: ';' "" '' '' 229s | appending IKE encryption algorithm AES_CBC[_0] 229s | parsing dh: 229s | ... failed 'IKE DH algorithm is empty' 229s | parsing '-aes' for IKE 229s | proposal: '-aes' 229s | token: '' '' "" '-' 229s | token: '' "" '-' "aes" '' 229s | parsing '+aes' for IKE 229s | proposal: '+aes' 229s | token: '' '' "" '+' 229s | token: '' "" '+' "aes" '' 229s | parsing ';aes' for IKE 229s | proposal: ';aes' 229s | token: '' '' "" ';' 229s | token: '' "" ';' "aes" '' 229s | parsing 'aes+-' for IKE 229s | proposal: 'aes+-' 229s | token: '' '' "aes" '+' 229s | token: '' "aes" '+' "" '-' 229s | token: '+' "" '-' "" '' 229s | appending IKE encryption algorithm AES_CBC[_0] 229s | parsing 'aes+;' for IKE 229s | proposal: 'aes+;' 229s | token: '' '' "aes" '+' 229s | token: '' "aes" '+' "" ';' 229s | token: '+' "" ';' "" '' 229s | appending IKE encryption algorithm AES_CBC[_0] 229s | parsing 'aes++' for IKE 229s | proposal: 'aes++' 229s | token: '' '' "aes" '+' 229s | token: '' "aes" '+' "" '+' 229s | token: '+' "" '+' "" '' 229s | appending IKE encryption algorithm AES_CBC[_0] 229s ipsec algparse: leak detective found no leaks 229s ipsec algparse: Encryption algorithms: 229s ipsec algparse: AES_CCM_16 {256,192,*128} IKEv1: ESP IKEv2: ESP FIPS aes_ccm, aes_ccm_c 229s ipsec algparse: AES_CCM_12 {256,192,*128} IKEv1: ESP IKEv2: ESP FIPS aes_ccm_b 229s ipsec algparse: AES_CCM_8 {256,192,*128} IKEv1: ESP IKEv2: ESP FIPS aes_ccm_a 229s ipsec algparse: 3DES_CBC [*192] IKEv1: IKE ESP IKEv2: IKE ESP FIPS NSS(CBC) 3des 229s ipsec algparse: CAMELLIA_CTR {256,192,*128} IKEv1: ESP IKEv2: ESP 229s ipsec algparse: CAMELLIA_CBC {256,192,*128} IKEv1: IKE ESP IKEv2: IKE ESP NSS(CBC) camellia 229s ipsec algparse: AES_GCM_16 {256,192,*128} IKEv1: ESP IKEv2: IKE ESP FIPS NSS(AEAD) aes_gcm, aes_gcm_c 229s ipsec algparse: AES_GCM_12 {256,192,*128} IKEv1: ESP IKEv2: IKE ESP FIPS NSS(AEAD) aes_gcm_b 229s ipsec algparse: AES_GCM_8 {256,192,*128} IKEv1: ESP IKEv2: IKE ESP FIPS NSS(AEAD) aes_gcm_a 229s ipsec algparse: AES_CTR {256,192,*128} IKEv1: IKE ESP IKEv2: IKE ESP FIPS NSS(CTR) aesctr 229s ipsec algparse: AES_CBC {256,192,*128} IKEv1: IKE ESP IKEv2: IKE ESP FIPS NSS(CBC) aes 229s ipsec algparse: NULL_AUTH_AES_GMAC {256,192,*128} IKEv1: ESP IKEv2: ESP FIPS aes_gmac 229s ipsec algparse: NULL [] IKEv1: ESP IKEv2: ESP NULL 229s ipsec algparse: CHACHA20_POLY1305 [*256] IKEv1: IKEv2: IKE ESP NSS(AEAD) chacha20poly1305 229s ipsec algparse: Hash algorithms: 229s ipsec algparse: MD5 IKEv1: IKE IKEv2: NSS 229s ipsec algparse: SHA1 IKEv1: IKE IKEv2: IKE FIPS NSS sha 229s ipsec algparse: SHA2_256 IKEv1: IKE IKEv2: IKE FIPS NSS sha2, sha256 229s ipsec algparse: SHA2_384 IKEv1: IKE IKEv2: IKE FIPS NSS sha384 229s ipsec algparse: SHA2_512 IKEv1: IKE IKEv2: IKE FIPS NSS sha512 229s ipsec algparse: IDENTITY IKEv1: IKEv2: FIPS 229s ipsec algparse: PRF algorithms: 229s ipsec algparse: HMAC_MD5 IKEv1: IKE IKEv2: IKE NSS md5 229s ipsec algparse: HMAC_SHA1 IKEv1: IKE IKEv2: IKE FIPS NSS sha, sha1 229s ipsec algparse: HMAC_SHA2_256 IKEv1: IKE IKEv2: IKE FIPS NSS sha2, sha256, sha2_256 229s ipsec algparse: HMAC_SHA2_384 IKEv1: IKE IKEv2: IKE FIPS NSS sha384, sha2_384 229s ipsec algparse: HMAC_SHA2_512 IKEv1: IKE IKEv2: IKE FIPS NSS sha512, sha2_512 229s ipsec algparse: AES_XCBC IKEv1: IKEv2: IKE native(XCBC) aes128_xcbc 229s ipsec algparse: Integrity algorithms: 229s ipsec algparse: HMAC_MD5_96 IKEv1: IKE ESP AH IKEv2: IKE ESP AH NSS md5, hmac_md5 229s ipsec algparse: HMAC_SHA1_96 IKEv1: IKE ESP AH IKEv2: IKE ESP AH FIPS NSS sha, sha1, sha1_96, hmac_sha1 229s ipsec algparse: HMAC_SHA2_512_256 IKEv1: IKE ESP AH IKEv2: IKE ESP AH FIPS NSS sha512, sha2_512, sha2_512_256, hmac_sha2_512 229s ipsec algparse: HMAC_SHA2_384_192 IKEv1: IKE ESP AH IKEv2: IKE ESP AH FIPS NSS sha384, sha2_384, sha2_384_192, hmac_sha2_384 229s ipsec algparse: HMAC_SHA2_256_128 IKEv1: IKE ESP AH IKEv2: IKE ESP AH FIPS NSS sha2, sha256, sha2_256, sha2_256_128, hmac_sha2_256 229s ipsec algparse: HMAC_SHA2_256_TRUNCBUG IKEv1: ESP AH IKEv2: AH 229s ipsec algparse: AES_XCBC_96 IKEv1: ESP AH IKEv2: IKE ESP AH native(XCBC) aes_xcbc, aes128_xcbc, aes128_xcbc_96 229s ipsec algparse: AES_CMAC_96 IKEv1: ESP AH IKEv2: ESP AH FIPS aes_cmac 229s ipsec algparse: NONE IKEv1: ESP IKEv2: IKE ESP FIPS null 229s ipsec algparse: DH algorithms: 229s ipsec algparse: NONE IKEv1: IKEv2: IKE ESP AH FIPS NSS(MODP) null, dh0 229s ipsec algparse: MODP1536 IKEv1: IKE ESP AH IKEv2: IKE ESP AH NSS(MODP) dh5 229s ipsec algparse: MODP2048 IKEv1: IKE ESP AH IKEv2: IKE ESP AH FIPS NSS(MODP) dh14 229s ipsec algparse: MODP3072 IKEv1: IKE ESP AH IKEv2: IKE ESP AH FIPS NSS(MODP) dh15 229s ipsec algparse: MODP4096 IKEv1: IKE ESP AH IKEv2: IKE ESP AH FIPS NSS(MODP) dh16 229s ipsec algparse: MODP6144 IKEv1: IKE ESP AH IKEv2: IKE ESP AH FIPS NSS(MODP) dh17 229s ipsec algparse: MODP8192 IKEv1: IKE ESP AH IKEv2: IKE ESP AH FIPS NSS(MODP) dh18 229s ipsec algparse: DH19 IKEv1: IKE IKEv2: IKE ESP AH FIPS NSS(ECP) ecp_256, ecp256 229s ipsec algparse: DH20 IKEv1: IKE IKEv2: IKE ESP AH FIPS NSS(ECP) ecp_384, ecp384 229s ipsec algparse: DH21 IKEv1: IKE IKEv2: IKE ESP AH FIPS NSS(ECP) ecp_521, ecp521 229s ipsec algparse: DH31 IKEv1: IKE IKEv2: IKE ESP AH NSS(ECP) curve25519 229s ipsec algparse: IPCOMP algorithms: 229s ipsec algparse: DEFLATE IKEv1: ESP AH IKEv2: ESP AH FIPS 229s ipsec algparse: LZS IKEv1: IKEv2: ESP AH FIPS 229s ipsec algparse: LZJH IKEv1: IKEv2: ESP AH FIPS 229s ipsec algparse: testing CAMELLIA_CBC: 229s ipsec algparse: Camellia: 16 bytes with 128-bit key 229s | decode_to_chunk() raw_key: input "0x00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00" 229s | decode_to_chunk() output: 229s | 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................ 229s | CONCATENATE_DATA_AND_BASE: 229s | target: EXTRACT_KEY_FROM_KEY 229s | base: base-key@0x37d516aa290 (16-bytes, AES_KEY_GEN) 229s | params: 16-bytes@0x7fffe4c0b630 229s | key-offset: 0, key-size: 16 229s | EXTRACT_KEY_FROM_KEY: 229s | target: CAMELLIA_CBC 229s | flags: ENCRYPT+DECRYPT 229s | key_size: 16-bytes 229s | base: base-key@0x37d516ad2a0 (32-bytes, EXTRACT_KEY_FROM_KEY) 229s | operation: FLAGS_ONLY 229s | params: 8-bytes@0x7fffe4c0b638 229s | decode_to_mac() IV: : input "0x00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00" 229s | decode_to_mac() output: 229s | 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................ 229s | decode_to_chunk() new IV: : input "0x07 92 3A 39 EB 0A 81 7D 1C 4D 87 BD B8 2D 1F 1C" 229s | decode_to_chunk() output: 229s | 07 92 3a 39 eb 0a 81 7d 1c 4d 87 bd b8 2d 1f 1c ..:9...}.M...-.. 229s | decode_to_chunk() plaintext: : input "0x80 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00" 229s | decode_to_chunk() output: 229s | 80 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................ 229s | decode_to_chunk() ciphertext: : input "0x07 92 3A 39 EB 0A 81 7D 1C 4D 87 BD B8 2D 1F 1C" 229s | decode_to_chunk() output: 229s | 07 92 3a 39 eb 0a 81 7d 1c 4d 87 bd b8 2d 1f 1c ..:9...}.M...-.. 229s | NSS ike_alg_nss_cbc: CAMELLIA_CBC - enter (nil) 229s | using IKEv1 IV 229s | NSS ike_alg_nss_cbc: CAMELLIA_CBC - exit 229s | verify_bytes() Camellia: 16 bytes with 128-bit key: encrypt: ok 229s | verify_bytes() Camellia: 16 bytes with 128-bit key: updated CBC IV: ok 229s | decode_to_mac() IV: : input "0x00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00" 229s | decode_to_mac() output: 229s | 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................ 229s | decode_to_chunk() new IV: : input "0x07 92 3A 39 EB 0A 81 7D 1C 4D 87 BD B8 2D 1F 1C" 229s | decode_to_chunk() output: 229s | 07 92 3a 39 eb 0a 81 7d 1c 4d 87 bd b8 2d 1f 1c ..:9...}.M...-.. 229s | decode_to_chunk() ciphertext: : input "0x07 92 3A 39 EB 0A 81 7D 1C 4D 87 BD B8 2D 1F 1C" 229s | decode_to_chunk() output: 229s | 07 92 3a 39 eb 0a 81 7d 1c 4d 87 bd b8 2d 1f 1c ..:9...}.M...-.. 229s | decode_to_chunk() plaintext: : input "0x80 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00" 229s | decode_to_chunk() output: 229s | 80 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................ 229s | NSS ike_alg_nss_cbc: CAMELLIA_CBC - enter (nil) 229s | using IKEv1 IV 229s | NSS ike_alg_nss_cbc: CAMELLIA_CBC - exit 229s | verify_bytes() Camellia: 16 bytes with 128-bit key: decrypt: ok 229s | verify_bytes() Camellia: 16 bytes with 128-bit key: updated CBC IV: ok 229s ipsec algparse: Camellia: 16 bytes with 128-bit key 229s | decode_to_chunk() raw_key: input "0x00 11 22 33 44 55 66 77 88 99 AA BB CC DD EE FF" 229s | decode_to_chunk() output: 229s | 00 11 22 33 44 55 66 77 88 99 aa bb cc dd ee ff .."3DUfw........ 229s | CONCATENATE_DATA_AND_BASE: 229s | target: EXTRACT_KEY_FROM_KEY 229s | base: base-key@0x37d516aa290 (16-bytes, AES_KEY_GEN) 229s | params: 16-bytes@0x7fffe4c0b630 229s | key-offset: 0, key-size: 16 229s | EXTRACT_KEY_FROM_KEY: 229s | target: CAMELLIA_CBC 229s | flags: ENCRYPT+DECRYPT 229s | key_size: 16-bytes 229s | base: base-key@0x37d516ad2a0 (32-bytes, EXTRACT_KEY_FROM_KEY) 229s | operation: FLAGS_ONLY 229s | params: 8-bytes@0x7fffe4c0b638 229s | decode_to_mac() IV: : input "0x00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00" 229s | decode_to_mac() output: 229s | 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................ 229s | decode_to_chunk() new IV: : input "0x14 4D 2B 0F 50 0C 27 B7 EC 2C D1 2D 91 59 6F 37" 229s | decode_to_chunk() output: 229s | 14 4d 2b 0f 50 0c 27 b7 ec 2c d1 2d 91 59 6f 37 .M+.P.'..,.-.Yo7 229s | decode_to_chunk() plaintext: : input "0x00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 01 " 229s | decode_to_chunk() output: 229s | 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 01 ................ 229s | decode_to_chunk() ciphertext: : input "0x14 4D 2B 0F 50 0C 27 B7 EC 2C D1 2D 91 59 6F 37" 229s | decode_to_chunk() output: 229s | 14 4d 2b 0f 50 0c 27 b7 ec 2c d1 2d 91 59 6f 37 .M+.P.'..,.-.Yo7 229s | NSS ike_alg_nss_cbc: CAMELLIA_CBC - enter (nil) 229s | using IKEv1 IV 229s | NSS ike_alg_nss_cbc: CAMELLIA_CBC - exit 229s | verify_bytes() Camellia: 16 bytes with 128-bit key: encrypt: ok 229s | verify_bytes() Camellia: 16 bytes with 128-bit key: updated CBC IV: ok 229s | decode_to_mac() IV: : input "0x00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00" 229s | decode_to_mac() output: 229s | 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................ 229s | decode_to_chunk() new IV: : input "0x14 4D 2B 0F 50 0C 27 B7 EC 2C D1 2D 91 59 6F 37" 229s | decode_to_chunk() output: 229s | 14 4d 2b 0f 50 0c 27 b7 ec 2c d1 2d 91 59 6f 37 .M+.P.'..,.-.Yo7 229s | decode_to_chunk() ciphertext: : input "0x14 4D 2B 0F 50 0C 27 B7 EC 2C D1 2D 91 59 6F 37" 229s | decode_to_chunk() output: 229s | 14 4d 2b 0f 50 0c 27 b7 ec 2c d1 2d 91 59 6f 37 .M+.P.'..,.-.Yo7 229s | decode_to_chunk() plaintext: : input "0x00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 01 " 229s | decode_to_chunk() output: 229s | 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 01 ................ 229s | NSS ike_alg_nss_cbc: CAMELLIA_CBC - enter (nil) 229s | using IKEv1 IV 229s | NSS ike_alg_nss_cbc: CAMELLIA_CBC - exit 229s | verify_bytes() Camellia: 16 bytes with 128-bit key: decrypt: ok 229s | verify_bytes() Camellia: 16 bytes with 128-bit key: updated CBC IV: ok 229s ipsec algparse: Camellia: 16 bytes with 256-bit key 229s | decode_to_chunk() raw_key: input "0x00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00" 229s | decode_to_chunk() output: 229s | 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................ 229s | 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................ 229s | CONCATENATE_DATA_AND_BASE: 229s | target: EXTRACT_KEY_FROM_KEY 229s | base: base-key@0x37d516aa290 (16-bytes, AES_KEY_GEN) 229s | params: 16-bytes@0x7fffe4c0b630 229s | key-offset: 0, key-size: 32 229s | EXTRACT_KEY_FROM_KEY: 229s | target: CAMELLIA_CBC 229s | flags: ENCRYPT+DECRYPT 229s | key_size: 32-bytes 229s | base: base-key@0x37d516ad2a0 (48-bytes, EXTRACT_KEY_FROM_KEY) 229s | operation: FLAGS_ONLY 229s | params: 8-bytes@0x7fffe4c0b638 229s | decode_to_mac() IV: : input "0x00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00" 229s | decode_to_mac() output: 229s | 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................ 229s | decode_to_chunk() new IV: : input "0xB0 C6 B8 8A EA 51 8A B0 9E 84 72 48 E9 1B 1B 9D" 229s | decode_to_chunk() output: 229s | b0 c6 b8 8a ea 51 8a b0 9e 84 72 48 e9 1b 1b 9d .....Q....rH.... 229s | decode_to_chunk() plaintext: : input "0x80 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00" 229s | decode_to_chunk() output: 229s | 80 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................ 229s | decode_to_chunk() ciphertext: : input "0xB0 C6 B8 8A EA 51 8A B0 9E 84 72 48 E9 1B 1B 9D" 229s | decode_to_chunk() output: 229s | b0 c6 b8 8a ea 51 8a b0 9e 84 72 48 e9 1b 1b 9d .....Q....rH.... 229s | NSS ike_alg_nss_cbc: CAMELLIA_CBC - enter (nil) 229s | using IKEv1 IV 229s | NSS ike_alg_nss_cbc: CAMELLIA_CBC - exit 229s | verify_bytes() Camellia: 16 bytes with 256-bit key: encrypt: ok 229s | verify_bytes() Camellia: 16 bytes with 256-bit key: updated CBC IV: ok 229s | decode_to_mac() IV: : input "0x00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00" 229s | decode_to_mac() output: 229s | 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................ 229s | decode_to_chunk() new IV: : input "0xB0 C6 B8 8A EA 51 8A B0 9E 84 72 48 E9 1B 1B 9D" 229s | decode_to_chunk() output: 229s | b0 c6 b8 8a ea 51 8a b0 9e 84 72 48 e9 1b 1b 9d .....Q....rH.... 229s | decode_to_chunk() ciphertext: : input "0xB0 C6 B8 8A EA 51 8A B0 9E 84 72 48 E9 1B 1B 9D" 229s | decode_to_chunk() output: 229s | b0 c6 b8 8a ea 51 8a b0 9e 84 72 48 e9 1b 1b 9d .....Q....rH.... 229s | decode_to_chunk() plaintext: : input "0x80 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00" 229s | decode_to_chunk() output: 229s | 80 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................ 229s | NSS ike_alg_nss_cbc: CAMELLIA_CBC - enter (nil) 229s | using IKEv1 IV 229s | NSS ike_alg_nss_cbc: CAMELLIA_CBC - exit 229s | verify_bytes() Camellia: 16 bytes with 256-bit key: decrypt: ok 229s | verify_bytes() Camellia: 16 bytes with 256-bit key: updated CBC IV: ok 229s ipsec algparse: Camellia: 16 bytes with 256-bit key 229s | decode_to_chunk() raw_key: input "0x00 11 22 33 44 55 66 77 88 99 AA BB CC DD EE FF FF EE DD CC BB AA 99 88 77 66 55 44 33 22 11 00" 229s | decode_to_chunk() output: 229s | 00 11 22 33 44 55 66 77 88 99 aa bb cc dd ee ff .."3DUfw........ 229s | ff ee dd cc bb aa 99 88 77 66 55 44 33 22 11 00 ........wfUD3".. 229s | CONCATENATE_DATA_AND_BASE: 229s | target: EXTRACT_KEY_FROM_KEY 229s | base: base-key@0x37d516aa290 (16-bytes, AES_KEY_GEN) 229s | params: 16-bytes@0x7fffe4c0b630 229s | key-offset: 0, key-size: 32 229s | EXTRACT_KEY_FROM_KEY: 229s | target: CAMELLIA_CBC 229s | flags: ENCRYPT+DECRYPT 229s | key_size: 32-bytes 229s | base: base-key@0x37d516ad2a0 (48-bytes, EXTRACT_KEY_FROM_KEY) 229s | operation: FLAGS_ONLY 229s | params: 8-bytes@0x7fffe4c0b638 229s | decode_to_mac() IV: : input "0x00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00" 229s | decode_to_mac() output: 229s | 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................ 229s | decode_to_chunk() new IV: : input "0xCC 39 FF EE 18 56 D3 EB 61 02 5E 93 21 9B 65 23 " 229s | decode_to_chunk() output: 229s | cc 39 ff ee 18 56 d3 eb 61 02 5e 93 21 9b 65 23 .9...V..a.^.!.e# 229s | decode_to_chunk() plaintext: : input "0x00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 01" 229s | decode_to_chunk() output: 229s | 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 01 ................ 229s | decode_to_chunk() ciphertext: : input "0xCC 39 FF EE 18 56 D3 EB 61 02 5E 93 21 9B 65 23 " 229s | decode_to_chunk() output: 229s | cc 39 ff ee 18 56 d3 eb 61 02 5e 93 21 9b 65 23 .9...V..a.^.!.e# 229s | NSS ike_alg_nss_cbc: CAMELLIA_CBC - enter (nil) 229s | using IKEv1 IV 229s | NSS ike_alg_nss_cbc: CAMELLIA_CBC - exit 229s | verify_bytes() Camellia: 16 bytes with 256-bit key: encrypt: ok 229s | verify_bytes() Camellia: 16 bytes with 256-bit key: updated CBC IV: ok 229s | decode_to_mac() IV: : input "0x00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00" 229s | decode_to_mac() output: 229s | 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................ 229s | decode_to_chunk() new IV: : input "0xCC 39 FF EE 18 56 D3 EB 61 02 5E 93 21 9B 65 23 " 229s | decode_to_chunk() output: 229s | cc 39 ff ee 18 56 d3 eb 61 02 5e 93 21 9b 65 23 .9...V..a.^.!.e# 229s | decode_to_chunk() ciphertext: : input "0xCC 39 FF EE 18 56 D3 EB 61 02 5E 93 21 9B 65 23 " 229s | decode_to_chunk() output: 229s | cc 39 ff ee 18 56 d3 eb 61 02 5e 93 21 9b 65 23 .9...V..a.^.!.e# 229s | decode_to_chunk() plaintext: : input "0x00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 01" 229s | decode_to_chunk() output: 229s | 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 01 ................ 229s | NSS ike_alg_nss_cbc: CAMELLIA_CBC - enter (nil) 229s | using IKEv1 IV 229s | NSS ike_alg_nss_cbc: CAMELLIA_CBC - exit 229s | verify_bytes() Camellia: 16 bytes with 256-bit key: decrypt: ok 229s | verify_bytes() Camellia: 16 bytes with 256-bit key: updated CBC IV: ok 229s ipsec algparse: testing AES_GCM_16: 229s ipsec algparse: empty string 229s | decode_to_chunk() raw_key: input "0xcf063a34d4a9a76c2c86787d3f96db71" 229s | decode_to_chunk() output: 229s | cf 06 3a 34 d4 a9 a7 6c 2c 86 78 7d 3f 96 db 71 ..:4...l,.x}?..q 229s | CONCATENATE_DATA_AND_BASE: 229s | target: EXTRACT_KEY_FROM_KEY 229s | base: base-key@0x37d516aa290 (16-bytes, AES_KEY_GEN) 229s | params: 16-bytes@0x7fffe4c0b500 229s | key-offset: 0, key-size: 16 229s | EXTRACT_KEY_FROM_KEY: 229s | target: AES_GCM 229s | flags: ENCRYPT+DECRYPT 229s | key_size: 16-bytes 229s | base: base-key@0x37d516ad2a0 (32-bytes, EXTRACT_KEY_FROM_KEY) 229s | operation: FLAGS_ONLY 229s | params: 8-bytes@0x7fffe4c0b508 229s | decode_to_chunk() salted IV: input "0x113b9785971864c83b01c787" 229s | decode_to_chunk() output: 229s | 11 3b 97 85 97 18 64 c8 3b 01 c7 87 .;....d.;... 229s | decode_to_chunk() AAD: input "" 229s | decode_to_chunk() output: 229s | 229s | decode_to_chunk() plaintext: input "" 229s | decode_to_chunk() output: 229s | 229s | decode_to_chunk() ciphertext: input "" 229s | decode_to_chunk() output: 229s | 229s | decode_to_chunk() tag: input "0x72ac8493e3a5228b5d130a69d2510e42" 229s | decode_to_chunk() output: 229s | 72 ac 84 93 e3 a5 22 8b 5d 13 0a 69 d2 51 0e 42 r.....".]..i.Q.B 229s | test_gcm_vector() DECRYPT: aad-size=0 salt-size=4 wire-IV-size=8 text-size=0 tag-size=16 text+tag in: 229s | 72 ac 84 93 e3 a5 22 8b 5d 13 0a 69 d2 51 0e 42 r.....".]..i.Q.B 229s | verify_bytes() empty string: output ciphertext: ok 229s | verify_bytes() empty string: TAG: ok 229s | test_gcm_vector() text+tag out: 229s | 72 ac 84 93 e3 a5 22 8b 5d 13 0a 69 d2 51 0e 42 r.....".]..i.Q.B 229s | test_gcm_vector() ENCRYPT: aad-size=0 salt-size=4 wire-IV-size=8 text-size=0 tag-size=16 text+tag in: 229s | 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................ 229s | verify_bytes() empty string: output ciphertext: ok 229s | verify_bytes() empty string: TAG: ok 229s | test_gcm_vector() text+tag out: 229s | 72 ac 84 93 e3 a5 22 8b 5d 13 0a 69 d2 51 0e 42 r.....".]..i.Q.B 229s ipsec algparse: one block 229s | decode_to_chunk() raw_key: input "0xe98b72a9881a84ca6b76e0f43e68647a" 229s | decode_to_chunk() output: 229s | e9 8b 72 a9 88 1a 84 ca 6b 76 e0 f4 3e 68 64 7a ..r.....kv..>hdz 229s | CONCATENATE_DATA_AND_BASE: 229s | target: EXTRACT_KEY_FROM_KEY 229s | base: base-key@0x37d516aa290 (16-bytes, AES_KEY_GEN) 229s | params: 16-bytes@0x7fffe4c0b500 229s | key-offset: 0, key-size: 16 229s | EXTRACT_KEY_FROM_KEY: 229s | target: AES_GCM 229s | flags: ENCRYPT+DECRYPT 229s | key_size: 16-bytes 229s | base: base-key@0x37d516ad2a0 (32-bytes, EXTRACT_KEY_FROM_KEY) 229s | operation: FLAGS_ONLY 229s | params: 8-bytes@0x7fffe4c0b508 229s | decode_to_chunk() salted IV: input "0x8b23299fde174053f3d652ba" 229s | decode_to_chunk() output: 229s | 8b 23 29 9f de 17 40 53 f3 d6 52 ba .#)...@S..R. 229s | decode_to_chunk() AAD: input "" 229s | decode_to_chunk() output: 229s | 229s | decode_to_chunk() plaintext: input "0x28286a321293253c3e0aa2704a278032" 229s | decode_to_chunk() output: 229s | 28 28 6a 32 12 93 25 3c 3e 0a a2 70 4a 27 80 32 ((j2..%<>..pJ'.2 229s | decode_to_chunk() ciphertext: input "0x5a3c1cf1985dbb8bed818036fdd5ab42" 229s | decode_to_chunk() output: 229s | 5a 3c 1c f1 98 5d bb 8b ed 81 80 36 fd d5 ab 42 Z<...].....6...B 229s | decode_to_chunk() tag: input "0x23c7ab0f952b7091cd324835043b5eb5" 229s | decode_to_chunk() output: 229s | 23 c7 ab 0f 95 2b 70 91 cd 32 48 35 04 3b 5e b5 #....+p..2H5.;^. 229s | test_gcm_vector() DECRYPT: aad-size=0 salt-size=4 wire-IV-size=8 text-size=16 tag-size=16 text+tag in: 229s | 5a 3c 1c f1 98 5d bb 8b ed 81 80 36 fd d5 ab 42 Z<...].....6...B 229s | 23 c7 ab 0f 95 2b 70 91 cd 32 48 35 04 3b 5e b5 #....+p..2H5.;^. 229s | verify_bytes() one block: output ciphertext: ok 229s | verify_bytes() one block: TAG: ok 229s | test_gcm_vector() text+tag out: 229s | 28 28 6a 32 12 93 25 3c 3e 0a a2 70 4a 27 80 32 ((j2..%<>..pJ'.2 229s | 23 c7 ab 0f 95 2b 70 91 cd 32 48 35 04 3b 5e b5 #....+p..2H5.;^. 229s | test_gcm_vector() ENCRYPT: aad-size=0 salt-size=4 wire-IV-size=8 text-size=16 tag-size=16 text+tag in: 229s | 28 28 6a 32 12 93 25 3c 3e 0a a2 70 4a 27 80 32 ((j2..%<>..pJ'.2 229s | 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................ 229s | verify_bytes() one block: output ciphertext: ok 229s | verify_bytes() one block: TAG: ok 229s | test_gcm_vector() text+tag out: 229s | 5a 3c 1c f1 98 5d bb 8b ed 81 80 36 fd d5 ab 42 Z<...].....6...B 229s | 23 c7 ab 0f 95 2b 70 91 cd 32 48 35 04 3b 5e b5 #....+p..2H5.;^. 229s ipsec algparse: two blocks 229s | decode_to_chunk() raw_key: input "0xbfd414a6212958a607a0f5d3ab48471d" 229s | decode_to_chunk() output: 229s | bf d4 14 a6 21 29 58 a6 07 a0 f5 d3 ab 48 47 1d ....!)X......HG. 229s | CONCATENATE_DATA_AND_BASE: 229s | target: EXTRACT_KEY_FROM_KEY 229s | base: base-key@0x37d516aa290 (16-bytes, AES_KEY_GEN) 229s | params: 16-bytes@0x7fffe4c0b500 229s | key-offset: 0, key-size: 16 229s | EXTRACT_KEY_FROM_KEY: 229s | target: AES_GCM 229s | flags: ENCRYPT+DECRYPT 229s | key_size: 16-bytes 229s | base: base-key@0x37d516ad2a0 (32-bytes, EXTRACT_KEY_FROM_KEY) 229s | operation: FLAGS_ONLY 229s | params: 8-bytes@0x7fffe4c0b508 229s | decode_to_chunk() salted IV: input "0x86d8ea0ab8e40dcc481cd0e2" 229s | decode_to_chunk() output: 229s | 86 d8 ea 0a b8 e4 0d cc 48 1c d0 e2 ........H... 229s | decode_to_chunk() AAD: input "" 229s | decode_to_chunk() output: 229s | 229s | decode_to_chunk() plaintext: input "0xa6b76a066e63392c9443e60272ceaeb9d25c991b0f2e55e2804e168c05ea591a" 229s | decode_to_chunk() output: 229s | a6 b7 6a 06 6e 63 39 2c 94 43 e6 02 72 ce ae b9 ..j.nc9,.C..r... 229s | d2 5c 99 1b 0f 2e 55 e2 80 4e 16 8c 05 ea 59 1a .\....U..N....Y. 229s | decode_to_chunk() ciphertext: input "0x62171db33193292d930bf6647347652c1ef33316d7feca99d54f1db4fcf513f8" 229s | decode_to_chunk() output: 229s | 62 17 1d b3 31 93 29 2d 93 0b f6 64 73 47 65 2c b...1.)-...dsGe, 229s | 1e f3 33 16 d7 fe ca 99 d5 4f 1d b4 fc f5 13 f8 ..3......O...... 229s | decode_to_chunk() tag: input "0xc28280aa5c6c7a8bd366f28c1cfd1f6e" 229s | decode_to_chunk() output: 229s | c2 82 80 aa 5c 6c 7a 8b d3 66 f2 8c 1c fd 1f 6e ....\lz..f.....n 229s | test_gcm_vector() DECRYPT: aad-size=0 salt-size=4 wire-IV-size=8 text-size=32 tag-size=16 text+tag in: 229s | 62 17 1d b3 31 93 29 2d 93 0b f6 64 73 47 65 2c b...1.)-...dsGe, 229s | 1e f3 33 16 d7 fe ca 99 d5 4f 1d b4 fc f5 13 f8 ..3......O...... 229s | c2 82 80 aa 5c 6c 7a 8b d3 66 f2 8c 1c fd 1f 6e ....\lz..f.....n 229s | verify_bytes() two blocks: output ciphertext: ok 229s | verify_bytes() two blocks: TAG: ok 229s | test_gcm_vector() text+tag out: 229s | a6 b7 6a 06 6e 63 39 2c 94 43 e6 02 72 ce ae b9 ..j.nc9,.C..r... 229s | d2 5c 99 1b 0f 2e 55 e2 80 4e 16 8c 05 ea 59 1a .\....U..N....Y. 229s | c2 82 80 aa 5c 6c 7a 8b d3 66 f2 8c 1c fd 1f 6e ....\lz..f.....n 229s | test_gcm_vector() ENCRYPT: aad-size=0 salt-size=4 wire-IV-size=8 text-size=32 tag-size=16 text+tag in: 229s | a6 b7 6a 06 6e 63 39 2c 94 43 e6 02 72 ce ae b9 ..j.nc9,.C..r... 229s | d2 5c 99 1b 0f 2e 55 e2 80 4e 16 8c 05 ea 59 1a .\....U..N....Y. 229s | 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................ 229s | verify_bytes() two blocks: output ciphertext: ok 229s | verify_bytes() two blocks: TAG: ok 229s | test_gcm_vector() text+tag out: 229s | 62 17 1d b3 31 93 29 2d 93 0b f6 64 73 47 65 2c b...1.)-...dsGe, 229s | 1e f3 33 16 d7 fe ca 99 d5 4f 1d b4 fc f5 13 f8 ..3......O...... 229s | c2 82 80 aa 5c 6c 7a 8b d3 66 f2 8c 1c fd 1f 6e ....\lz..f.....n 229s ipsec algparse: two blocks with associated data 229s | decode_to_chunk() raw_key: input "0x95bcde70c094f04e3dd8259cafd88ce8" 229s | decode_to_chunk() output: 229s | 95 bc de 70 c0 94 f0 4e 3d d8 25 9c af d8 8c e8 ...p...N=.%..... 229s | CONCATENATE_DATA_AND_BASE: 229s | target: EXTRACT_KEY_FROM_KEY 229s | base: base-key@0x37d516aa290 (16-bytes, AES_KEY_GEN) 229s | params: 16-bytes@0x7fffe4c0b500 229s | key-offset: 0, key-size: 16 229s | EXTRACT_KEY_FROM_KEY: 229s | target: AES_GCM 229s | flags: ENCRYPT+DECRYPT 229s | key_size: 16-bytes 229s | base: base-key@0x37d516ad2a0 (32-bytes, EXTRACT_KEY_FROM_KEY) 229s | operation: FLAGS_ONLY 229s | params: 8-bytes@0x7fffe4c0b508 229s | decode_to_chunk() salted IV: input "0x12cf097ad22380432ff40a5c" 229s | decode_to_chunk() output: 229s | 12 cf 09 7a d2 23 80 43 2f f4 0a 5c ...z.#.C/..\ 229s | decode_to_chunk() AAD: input "0xc783a0cca10a8d9fb8d27d69659463f2" 229s | decode_to_chunk() output: 229s | c7 83 a0 cc a1 0a 8d 9f b8 d2 7d 69 65 94 63 f2 ..........}ie.c. 229s | decode_to_chunk() plaintext: input "0x32f51e837a9748838925066d69e87180f34a6437e6b396e5643b34cb2ee4f7b1" 229s | decode_to_chunk() output: 229s | 32 f5 1e 83 7a 97 48 83 89 25 06 6d 69 e8 71 80 2...z.H..%.mi.q. 229s | f3 4a 64 37 e6 b3 96 e5 64 3b 34 cb 2e e4 f7 b1 .Jd7....d;4..... 229s | decode_to_chunk() ciphertext: input "0x8a023ba477f5b809bddcda8f55e09064d6d88aaec99c1e141212ea5b08503660" 229s | decode_to_chunk() output: 229s | 8a 02 3b a4 77 f5 b8 09 bd dc da 8f 55 e0 90 64 ..;.w.......U..d 229s | d6 d8 8a ae c9 9c 1e 14 12 12 ea 5b 08 50 36 60 ...........[.P6` 229s | decode_to_chunk() tag: input "0x562f500dae635d60a769b466e15acd1e" 229s | decode_to_chunk() output: 229s | 56 2f 50 0d ae 63 5d 60 a7 69 b4 66 e1 5a cd 1e V/P..c]`.i.f.Z.. 229s | test_gcm_vector() DECRYPT: aad-size=16 salt-size=4 wire-IV-size=8 text-size=32 tag-size=16 text+tag in: 229s | 8a 02 3b a4 77 f5 b8 09 bd dc da 8f 55 e0 90 64 ..;.w.......U..d 229s | d6 d8 8a ae c9 9c 1e 14 12 12 ea 5b 08 50 36 60 ...........[.P6` 229s | 56 2f 50 0d ae 63 5d 60 a7 69 b4 66 e1 5a cd 1e V/P..c]`.i.f.Z.. 229s | verify_bytes() two blocks with associated data: output ciphertext: ok 229s | verify_bytes() two blocks with associated data: TAG: ok 229s | test_gcm_vector() text+tag out: 229s | 32 f5 1e 83 7a 97 48 83 89 25 06 6d 69 e8 71 80 2...z.H..%.mi.q. 229s | f3 4a 64 37 e6 b3 96 e5 64 3b 34 cb 2e e4 f7 b1 .Jd7....d;4..... 229s | 56 2f 50 0d ae 63 5d 60 a7 69 b4 66 e1 5a cd 1e V/P..c]`.i.f.Z.. 229s | test_gcm_vector() ENCRYPT: aad-size=16 salt-size=4 wire-IV-size=8 text-size=32 tag-size=16 text+tag in: 229s | 32 f5 1e 83 7a 97 48 83 89 25 06 6d 69 e8 71 80 2...z.H..%.mi.q. 229s | f3 4a 64 37 e6 b3 96 e5 64 3b 34 cb 2e e4 f7 b1 .Jd7....d;4..... 229s | 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................ 229s | verify_bytes() two blocks with associated data: output ciphertext: ok 229s | verify_bytes() two blocks with associated data: TAG: ok 229s | test_gcm_vector() text+tag out: 229s | 8a 02 3b a4 77 f5 b8 09 bd dc da 8f 55 e0 90 64 ..;.w.......U..d 229s | d6 d8 8a ae c9 9c 1e 14 12 12 ea 5b 08 50 36 60 ...........[.P6` 229s | 56 2f 50 0d ae 63 5d 60 a7 69 b4 66 e1 5a cd 1e V/P..c]`.i.f.Z.. 229s ipsec algparse: testing AES_CTR: 229s ipsec algparse: Encrypting 16 octets using AES-CTR with 128-bit key 229s | decode_to_chunk() raw_key: input "0x AE 68 52 F8 12 10 67 CC 4B F7 A5 76 55 77 F3 9E" 229s | decode_to_chunk() output: 229s | ae 68 52 f8 12 10 67 cc 4b f7 a5 76 55 77 f3 9e .hR...g.K..vUw.. 229s | CONCATENATE_DATA_AND_BASE: 229s | target: EXTRACT_KEY_FROM_KEY 229s | base: base-key@0x37d516aa290 (16-bytes, AES_KEY_GEN) 229s | params: 16-bytes@0x7fffe4c0b620 229s | key-offset: 0, key-size: 16 229s | EXTRACT_KEY_FROM_KEY: 229s | target: AES_CTR 229s | flags: ENCRYPT+DECRYPT 229s | key_size: 16-bytes 229s | base: base-key@0x37d516ad2a0 (32-bytes, EXTRACT_KEY_FROM_KEY) 229s | operation: FLAGS_ONLY 229s | params: 8-bytes@0x7fffe4c0b628 229s | decode_to_mac() input counter-block: : input "0x 00 00 00 30 00 00 00 00 00 00 00 00 00 00 00 01" 229s | decode_to_mac() output: 229s | 00 00 00 30 00 00 00 00 00 00 00 00 00 00 00 01 ...0............ 229s | decode_to_chunk() Plaintext: input "0x 53 69 6E 67 6C 65 20 62 6C 6F 63 6B 20 6D 73 67" 229s | decode_to_chunk() output: 229s | 53 69 6e 67 6c 65 20 62 6c 6f 63 6b 20 6d 73 67 Single block msg 229s | decode_to_chunk() Ciphertext: input "0x E4 09 5D 4F B7 A7 B3 79 2D 61 75 A3 26 13 11 B8" 229s | decode_to_chunk() output: 229s | e4 09 5d 4f b7 a7 b3 79 2d 61 75 a3 26 13 11 b8 ..]O...y-au.&... 229s | decode_to_chunk() expected counter-block: : input "0x 00 00 00 30 00 00 00 00 00 00 00 00 00 00 00 02" 229s | decode_to_chunk() output: 229s | 00 00 00 30 00 00 00 00 00 00 00 00 00 00 00 02 ...0............ 229s | cipher_op_ctr_nss() enter AES_CTR 0x37d516adc00 use IKEv1 IV wire_iv 0 count 0 229s | ctr_param: count 32 iv 00000030000000000000000000000001 229s | cipher_op_ctr_nss() counter-block updated from 0x1 to 0x2 for 16 bytes 229s | do_aes_ctr: exit 229s | cipher_op_context_destroy_ctr_nss() 229s | verify_bytes() Encrypting 16 octets using AES-CTR with 128-bit key: encrypt: ok 229s | verify_bytes() Encrypting 16 octets using AES-CTR with 128-bit key: counter-block: ok 229s | decode_to_mac() input counter-block: : input "0x 00 00 00 30 00 00 00 00 00 00 00 00 00 00 00 01" 229s | decode_to_mac() output: 229s | 00 00 00 30 00 00 00 00 00 00 00 00 00 00 00 01 ...0............ 229s | decode_to_chunk() Ciphertext: input "0x E4 09 5D 4F B7 A7 B3 79 2D 61 75 A3 26 13 11 B8" 229s | decode_to_chunk() output: 229s | e4 09 5d 4f b7 a7 b3 79 2d 61 75 a3 26 13 11 b8 ..]O...y-au.&... 229s | decode_to_chunk() Plaintext: input "0x 53 69 6E 67 6C 65 20 62 6C 6F 63 6B 20 6D 73 67" 229s | decode_to_chunk() output: 229s | 53 69 6e 67 6c 65 20 62 6c 6f 63 6b 20 6d 73 67 Single block msg 229s | decode_to_chunk() expected counter-block: : input "0x 00 00 00 30 00 00 00 00 00 00 00 00 00 00 00 02" 229s | decode_to_chunk() output: 229s | 00 00 00 30 00 00 00 00 00 00 00 00 00 00 00 02 ...0............ 229s | cipher_op_ctr_nss() enter AES_CTR 0x37d516adc00 use IKEv1 IV wire_iv 0 count 0 229s | ctr_param: count 32 iv 00000030000000000000000000000001 229s | cipher_op_ctr_nss() counter-block updated from 0x1 to 0x2 for 16 bytes 229s | do_aes_ctr: exit 229s | cipher_op_context_destroy_ctr_nss() 229s | verify_bytes() Encrypting 16 octets using AES-CTR with 128-bit key: decrypt: ok 229s | verify_bytes() Encrypting 16 octets using AES-CTR with 128-bit key: counter-block: ok 229s ipsec algparse: Encrypting 32 octets using AES-CTR with 128-bit key 229s | decode_to_chunk() raw_key: input "0x 7E 24 06 78 17 FA E0 D7 43 D6 CE 1F 32 53 91 63" 229s | decode_to_chunk() output: 229s | 7e 24 06 78 17 fa e0 d7 43 d6 ce 1f 32 53 91 63 ~$.x....C...2S.c 229s | CONCATENATE_DATA_AND_BASE: 229s | target: EXTRACT_KEY_FROM_KEY 229s | base: base-key@0x37d516aa290 (16-bytes, AES_KEY_GEN) 229s | params: 16-bytes@0x7fffe4c0b620 229s | key-offset: 0, key-size: 16 229s | EXTRACT_KEY_FROM_KEY: 229s | target: AES_CTR 229s | flags: ENCRYPT+DECRYPT 229s | key_size: 16-bytes 229s | base: base-key@0x37d516ad2a0 (32-bytes, EXTRACT_KEY_FROM_KEY) 229s | operation: FLAGS_ONLY 229s | params: 8-bytes@0x7fffe4c0b628 229s | decode_to_mac() input counter-block: : input "0x 00 6C B6 DB C0 54 3B 59 DA 48 D9 0B 00 00 00 01" 229s | decode_to_mac() output: 229s | 00 6c b6 db c0 54 3b 59 da 48 d9 0b 00 00 00 01 .l...T;Y.H...... 229s | decode_to_chunk() Plaintext: input "0x00 01 02 03 04 05 06 07 08 09 0A 0B 0C 0D 0E 0F10 11 12 13 14 15 16 17 18 19 1A 1B 1C 1D 1E 1F" 229s | decode_to_chunk() output: 229s | 00 01 02 03 04 05 06 07 08 09 0a 0b 0c 0d 0e 0f ................ 229s | 10 11 12 13 14 15 16 17 18 19 1a 1b 1c 1d 1e 1f ................ 229s | decode_to_chunk() Ciphertext: input "0x51 04 A1 06 16 8A 72 D9 79 0D 41 EE 8E DA D3 88EB 2E 1E FC 46 DA 57 C8 FC E6 30 DF 91 41 BE 28" 229s | decode_to_chunk() output: 229s | 51 04 a1 06 16 8a 72 d9 79 0d 41 ee 8e da d3 88 Q.....r.y.A..... 229s | eb 2e 1e fc 46 da 57 c8 fc e6 30 df 91 41 be 28 ....F.W...0..A.( 229s | decode_to_chunk() expected counter-block: : input "0x 00 6C B6 DB C0 54 3B 59 DA 48 D9 0B 00 00 00 03" 229s | decode_to_chunk() output: 229s | 00 6c b6 db c0 54 3b 59 da 48 d9 0b 00 ERROR: IKE PRF algorithm 'modp2048' is not recognized 229s algparse -v2 'ike=aes_gcm-none;modp2048' (expect SUCCESS) 229s AES_GCM_16-HMAC_SHA2_512+HMAC_SHA2_256-MODP2048 229s algparse -v2 'ike=aes_gcm-sha1-none-modp2048' (expect ERROR) 229s ERROR: IKE proposal contains unexpected 'modp2048' 229s algparse -v2 'ike=aes_gcm-sha1-none;modp2048' (expect ERROR) 229s ERROR: IKE proposal contains unexpected 'modp2048' 229s algparse -v2 'ike=aes+aes_gcm' (expect ERROR) 229s ERROR: AEAD and non-AEAD IKE encryption algorithm cannot be combined 229s algparse -v2 'ike=,' (expect ERROR) 229s ERROR: IKE encryption algorithm is empty 229s algparse -v2 'ike=aes,' (expect ERROR) 229s ERROR: IKE encryption algorithm is empty 229s algparse -v2 'ike=aes,,aes' (expect ERROR) 229s ERROR: IKE encryption algorithm is empty 229s algparse -v2 'ike=,aes' (expect ERROR) 229s ERROR: IKE encryption algorithm is empty 229s algparse -v2 'ike=-' (expect ERROR) 229s ERROR: IKE encryption algorithm is empty 229s algparse -v2 'ike=+' (expect ERROR) 229s ERROR: IKE encryption algorithm is empty 229s algparse -v2 'ike=;' (expect ERROR) 229s ERROR: IKE encryption algorithm is empty 229s algparse -v2 'ike=aes-' (expect ERROR) 229s ERROR: IKE PRF algorithm is empty 229s algparse -v2 'ike=aes+' (expect ERROR) 229s ERROR: IKE encryption algorithm is empty 229s algparse -v2 'ike=aes;' (expect ERROR) 229s ERROR: IKE DH algorithm is empty 229s algparse -v2 'ike=-aes' (expect ERROR) 229s ERROR: IKE encryption algorithm is empty 229s algparse -v2 'ike=+aes' (expect ERROR) 229s ERROR: IKE encryption algorithm is empty 229s algparse -v2 'ike=;aes' (expect ERROR) 229s ERROR: IKE encryption algorithm is empty 229s algparse -v2 'ike=aes+-' (expect ERROR) 229s ERROR: IKE encryption algorithm is empty 229s algparse -v2 'ike=aes+;' (expect ERROR) 229s ERROR: IKE encryption algorithm is empty 229s algparse -v2 'ike=aes++' (expect ERROR) 229s ERROR: IKE encryption algorithm is empty 229s testing -ta 229s 00 00 03 .l...T;Y.H...... 229s | cipher_op_ctr_nss() enter AES_CTR 0x37d516aa160 use IKEv1 IV wire_iv 0 count 0 229s | ctr_param: count 32 iv 006cb6dbc0543b59da48d90b00000001 229s | cipher_op_ctr_nss() counter-block updated from 0x1 to 0x3 for 32 bytes 229s | do_aes_ctr: exit 229s | cipher_op_context_destroy_ctr_nss() 229s | verify_bytes() Encrypting 32 octets using AES-CTR with 128-bit key: encrypt: ok 229s | verify_bytes() Encrypting 32 octets using AES-CTR with 128-bit key: counter-block: ok 229s | decode_to_mac() input counter-block: : input "0x 00 6C B6 DB C0 54 3B 59 DA 48 D9 0B 00 00 00 01" 229s | decode_to_mac() output: 229s | 00 6c b6 db c0 54 3b 59 da 48 d9 0b 00 00 00 01 .l...T;Y.H...... 229s | decode_to_chunk() Ciphertext: input "0x51 04 A1 06 16 8A 72 D9 79 0D 41 EE 8E DA D3 88EB 2E 1E FC 46 DA 57 C8 FC E6 30 DF 91 41 BE 28" 229s | decode_to_chunk() output: 229s | 51 04 a1 06 16 8a 72 d9 79 0d 41 ee 8e da d3 88 Q.....r.y.A..... 229s | eb 2e 1e fc 46 da 57 c8 fc e6 30 df 91 41 be 28 ....F.W...0..A.( 229s | decode_to_chunk() Plaintext: input "0x00 01 02 03 04 05 06 07 08 09 0A 0B 0C 0D 0E 0F10 11 12 13 14 15 16 17 18 19 1A 1B 1C 1D 1E 1F" 229s | decode_to_chunk() output: 229s | 00 01 02 03 04 05 06 07 08 09 0a 0b 0c 0d 0e 0f ................ 229s | 10 11 12 13 14 15 16 17 18 19 1a 1b 1c 1d 1e 1f ................ 229s | decode_to_chunk() expected counter-block: : input "0x 00 6C B6 DB C0 54 3B 59 DA 48 D9 0B 00 00 00 03" 229s | decode_to_chunk() output: 229s | 00 6c b6 db c0 54 3b 59 da 48 d9 0b 00 00 00 03 .l...T;Y.H...... 229s | cipher_op_ctr_nss() enter AES_CTR 0x37d516aa160 use IKEv1 IV wire_iv 0 count 0 229s | ctr_param: count 32 iv 006cb6dbc0543b59da48d90b00000001 229s | cipher_op_ctr_nss() counter-block updated from 0x1 to 0x3 for 32 bytes 229s | do_aes_ctr: exit 229s | cipher_op_context_destroy_ctr_nss() 229s | verify_bytes() Encrypting 32 octets using AES-CTR with 128-bit key: decrypt: ok 229s | verify_bytes() Encrypting 32 octets using AES-CTR with 128-bit key: counter-block: ok 229s ipsec algparse: Encrypting 36 octets using AES-CTR with 128-bit key 229s | decode_to_chunk() raw_key: input "0x 76 91 BE 03 5E 50 20 A8 AC 6E 61 85 29 F9 A0 DC" 229s | decode_to_chunk() output: 229s | 76 91 be 03 5e 50 20 a8 ac 6e 61 85 29 f9 a0 dc v...^P ..na.)... 229s | CONCATENATE_DATA_AND_BASE: 229s | target: EXTRACT_KEY_FROM_KEY 229s | base: base-key@0x37d516aa290 (16-bytes, AES_KEY_GEN) 229s | params: 16-bytes@0x7fffe4c0b620 229s | key-offset: 0, key-size: 16 229s | EXTRACT_KEY_FROM_KEY: 229s | target: AES_CTR 229s | flags: ENCRYPT+DECRYPT 229s | key_size: 16-bytes 229s | base: base-key@0x37d516ad2a0 (32-bytes, EXTRACT_KEY_FROM_KEY) 229s | operation: FLAGS_ONLY 229s | params: 8-bytes@0x7fffe4c0b628 229s | decode_to_mac() input counter-block: : input "0x 00 E0 01 7B 27 77 7F 3F 4A 17 86 F0 00 00 00 01" 229s | decode_to_mac() output: 229s | 00 e0 01 7b 27 77 7f 3f 4a 17 86 f0 00 00 00 01 ...{'w.?J....... 229s | decode_to_chunk() Plaintext: input "0x00 01 02 03 04 05 06 07 08 09 0A 0B 0C 0D 0E 0F10 11 12 13 14 15 16 17 18 19 1A 1B 1C 1D 1E 1F20 21 22 23" 229s | decode_to_chunk() output: 229s | 00 01 02 03 04 05 06 07 08 09 0a 0b 0c 0d 0e 0f ................ 229s | 10 11 12 13 14 15 16 17 18 19 1a 1b 1c 1d 1e 1f ................ 229s | 20 21 22 23 !"# 229s | decode_to_chunk() Ciphertext: input "0xC1 CF 48 A8 9F 2F FD D9 CF 46 52 E9 EF DB 72 D745 40 A4 2B DE 6D 78 36 D5 9A 5C EA AE F3 10 5325 B2 07 2F" 229s | decode_to_chunk() output: 229s | c1 cf 48 a8 9f 2f fd d9 cf 46 52 e9 ef db 72 d7 ..H../...FR...r. 229s | 45 40 a4 2b de 6d 78 36 d5 9a 5c ea ae f3 10 53 E@.+.mx6..\....S 229s | 25 b2 07 2f %../ 229s | decode_to_chunk() expected counter-block: : input "0x 00 E0 01 7B 27 77 7F 3F 4A 17 86 F0 00 00 00 04" 229s | decode_to_chunk() output: 229s | 00 e0 01 7b 27 77 7f 3f 4a 17 86 f0 00 00 00 04 ...{'w.?J....... 229s | cipher_op_ctr_nss() enter AES_CTR 0x37d516a9fc0 use IKEv1 IV wire_iv 0 count 0 229s | ctr_param: count 32 iv 00e0017b27777f3f4a1786f000000001 229s | cipher_op_ctr_nss() counter-block updated from 0x1 to 0x4 for 36 bytes 229s | do_aes_ctr: exit 229s | cipher_op_context_destroy_ctr_nss() 229s | verify_bytes() Encrypting 36 octets using AES-CTR with 128-bit key: encrypt: ok 229s | verify_bytes() Encrypting 36 octets using AES-CTR with 128-bit key: counter-block: ok 229s | decode_to_mac() input counter-block: : input "0x 00 E0 01 7B 27 77 7F 3F 4A 17 86 F0 00 00 00 01" 229s | decode_to_mac() output: 229s | 00 e0 01 7b 27 77 7f 3f 4a 17 86 f0 00 00 00 01 ...{'w.?J....... 229s | decode_to_chunk() Ciphertext: input "0xC1 CF 48 A8 9F 2F FD D9 CF 46 52 E9 EF DB 72 D745 40 A4 2B DE 6D 78 36 D5 9A 5C EA AE F3 10 5325 B2 07 2F" 229s | decode_to_chunk() output: 229s | c1 cf 48 a8 9f 2f fd d9 cf 46 52 e9 ef db 72 d7 ..H../...FR...r. 229s | 45 40 a4 2b de 6d 78 36 d5 9a 5c ea ae f3 10 53 E@.+.mx6..\....S 229s | 25 b2 07 2f %../ 229s | decode_to_chunk() Plaintext: input "0x00 01 02 03 04 05 06 07 08 09 0A 0B 0C 0D 0E 0F10 11 12 13 14 15 16 17 18 19 1A 1B 1C 1D 1E 1F20 21 22 23" 229s | decode_to_chunk() output: 229s | 00 01 02 03 04 05 06 07 08 09 0a 0b 0c 0d 0e 0f ................ 229s | 10 11 12 13 14 15 16 17 18 19 1a 1b 1c 1d 1e 1f ................ 229s | 20 21 22 23 !"# 229s | decode_to_chunk() expected counter-block: : input "0x 00 E0 01 7B 27 77 7F 3F 4A 17 86 F0 00 00 00 04" 229s | decode_to_chunk() output: 229s | 00 e0 01 7b 27 77 7f 3f 4a 17 86 f0 00 00 00 04 ...{'w.?J....... 229s | cipher_op_ctr_nss() enter AES_CTR 0x37d516a9fc0 use IKEv1 IV wire_iv 0 count 0 229s | ctr_param: count 32 iv 00e0017b27777f3f4a1786f000000001 229s | cipher_op_ctr_nss() counter-block updated from 0x1 to 0x4 for 36 bytes 229s | do_aes_ctr: exit 229s | cipher_op_context_destroy_ctr_nss() 229s | verify_bytes() Encrypting 36 octets using AES-CTR with 128-bit key: decrypt: ok 229s | verify_bytes() Encrypting 36 octets using AES-CTR with 128-bit key: counter-block: ok 229s ipsec algparse: Encrypting 16 octets using AES-CTR with 192-bit key 229s | decode_to_chunk() raw_key: input "0x16 AF 5B 14 5F C9 F5 79 C1 75 F9 3E 3B FB 0E ED86 3D 06 CC FD B7 85 15" 229s | decode_to_chunk() output: 229s | 16 af 5b 14 5f c9 f5 79 c1 75 f9 3e 3b fb 0e ed ..[._..y.u.>;... 229s | 86 3d 06 cc fd b7 85 15 .=...... 229s | CONCATENATE_DATA_AND_BASE: 229s | target: EXTRACT_KEY_FROM_KEY 229s | base: base-key@0x37d516aa290 (16-bytes, AES_KEY_GEN) 229s | params: 16-bytes@0x7fffe4c0b620 229s | key-offset: 0, key-size: 24 229s | EXTRACT_KEY_FROM_KEY: 229s | target: AES_CTR 229s | flags: ENCRYPT+DECRYPT 229s | key_size: 24-bytes 229s | base: base-key@0x37d516ad2a0 (40-bytes, EXTRACT_KEY_FROM_KEY) 229s | operation: FLAGS_ONLY 229s | params: 8-bytes@0x7fffe4c0b628 229s | decode_to_mac() input counter-block: : input "0x 00 00 00 48 36 73 3C 14 7D 6D 93 CB 00 00 00 01" 229s | decode_to_mac() output: 229s | 00 00 00 48 36 73 3c 14 7d 6d 93 cb 00 00 00 01 ...H6s<.}m...... 229s | decode_to_chunk() Plaintext: input "0x 53 69 6E 67 6C 65 20 62 6C 6F 63 6B 20 6D 73 67" 229s | decode_to_chunk() output: 229s | 53 69 6e 67 6c 65 20 62 6c 6f 63 6b 20 6d 73 67 Single block msg 229s | decode_to_chunk() Ciphertext: input "0x 4B 55 38 4F E2 59 C9 C8 4E 79 35 A0 03 CB E9 28" 229s | decode_to_chunk() output: 229s | 4b 55 38 4f e2 59 c9 c8 4e 79 35 a0 03 cb e9 28 KU8O.Y..Ny5....( 229s | decode_to_chunk() expected counter-block: : input "0x 00 00 00 48 36 73 3C 14 7D 6D 93 CB 00 00 00 02" 229s | decode_to_chunk() output: 229s | 00 00 00 48 36 73 3c 14 7d 6d 93 cb 00 00 00 02 ...H6s<.}m...... 229s | cipher_op_ctr_nss() enter AES_CTR 0x37d516adbe0 use IKEv1 IV wire_iv 0 count 0 229s | ctr_param: count 32 iv 0000004836733c147d6d93cb00000001 229s | cipher_op_ctr_nss() counter-block updated from 0x1 to 0x2 for 16 bytes 229s | do_aes_ctr: exit 229s | cipher_op_context_destroy_ctr_nss() 229s | verify_bytes() Encrypting 16 octets using AES-CTR with 192-bit key: encrypt: ok 229s | verify_bytes() Encrypting 16 octets using AES-CTR with 192-bit key: counter-block: ok 229s | decode_to_mac() input counter-block: : input "0x 00 00 00 48 36 73 3C 14 7D 6D 93 CB 00 00 00 01" 229s | decode_to_mac() output: 229s | 00 00 00 48 36 73 3c 14 7d 6d 93 cb 00 00 00 01 ...H6s<.}m...... 229s | decode_to_chunk() Ciphertext: input "0x 4B 55 38 4F E2 59 C9 C8 4E 79 35 A0 03 CB E9 28" 229s | decode_to_chunk() output: 229s | 4b 55 38 4f e2 59 c9 c8 4e 79 35 a0 03 cb e9 28 KU8O.Y..Ny5....( 229s | decode_to_chunk() Plaintext: input "0x 53 69 6E 67 6C 65 20 62 6C 6F 63 6B 20 6D 73 67" 229s | decode_to_chunk() output: 229s | 53 69 6e 67 6c 65 20 62 6c 6f 63 6b 20 6d 73 67 Single block msg 229s | decode_to_chunk() expected counter-block: : input "0x 00 00 00 48 36 73 3C 14 7D 6D 93 CB 00 00 00 02" 229s | decode_to_chunk() output: 229s | 00 00 00 48 36 73 3c 14 7d 6d 93 cb 00 00 00 02 ...H6s<.}m...... 229s | cipher_op_ctr_nss() enter AES_CTR 0x37d516adbe0 use IKEv1 IV wire_iv 0 count 0 229s | ctr_param: count 32 iv 0000004836733c147d6d93cb00000001 229s | cipher_op_ctr_nss() counter-block updated from 0x1 to 0x2 for 16 bytes 229s | do_aes_ctr: exit 229s | cipher_op_context_destroy_ctr_nss() 229s | verify_bytes() Encrypting 16 octets using AES-CTR with 192-bit key: decrypt: ok 229s | verify_bytes() Encrypting 16 octets using AES-CTR with 192-bit key: counter-block: ok 229s ipsec algparse: Encrypting 32 octets using AES-CTR with 192-bit key 229s | decode_to_chunk() raw_key: input "0x7C 5C B2 40 1B 3D C3 3C 19 E7 34 08 19 E0 F6 9C67 8C 3D B8 E6 F6 A9 1A" 229s | decode_to_chunk() output: 229s | 7c 5c b2 40 1b 3d c3 3c 19 e7 34 08 19 e0 f6 9c |\.@.=.<..4..... 229s | 67 8c 3d b8 e6 f6 a9 1a g.=..... 229s | CONCATENATE_DATA_AND_BASE: 229s | target: EXTRACT_KEY_FROM_KEY 229s | base: base-key@0x37d516aa290 (16-bytes, AES_KEY_GEN) 229s | params: 16-bytes@0x7fffe4c0b620 229s | key-offset: 0, key-size: 24 229s | EXTRACT_KEY_FROM_KEY: 229s | target: AES_CTR 229s | flags: ENCRYPT+DECRYPT 229s | key_size: 24-bytes 229s | base: base-key@0x37d516ad2a0 (40-bytes, EXTRACT_KEY_FROM_KEY) 229s | operation: FLAGS_ONLY 229s | params: 8-bytes@0x7fffe4c0b628 229s | decode_to_mac() input counter-block: : input "0x 00 96 B0 3B 02 0C 6E AD C2 CB 50 0D 00 00 00 01" 229s | decode_to_mac() output: 229s | 00 96 b0 3b 02 0c 6e ad c2 cb 50 0d 00 00 00 01 ...;..n...P..... 229s | decode_to_chunk() Plaintext: input "0x00 01 02 03 04 05 06 07 08 09 0A 0B 0C 0D 0E 0F10 11 12 13 14 15 16 17 18 19 1A 1B 1C 1D 1E 1F" 229s | decode_to_chunk() output: 229s | 00 01 02 03 04 05 06 07 08 09 0a 0b 0c 0d 0e 0f ................ 229s | 10 11 12 13 14 15 16 17 18 19 1a 1b 1c 1d 1e 1f ................ 229s | decode_to_chunk() Ciphertext: input "0x45 32 43 FC 60 9B 23 32 7E DF AA FA 71 31 CD 9F84 90 70 1C 5A D4 A7 9C FC 1F E0 FF 42 F4 FB 00" 229s | decode_to_chunk() output: 229s | 45 32 43 fc 60 9b 23 32 7e df aa fa 71 31 cd 9f E2C.`.#2~...q1.. 229s | 84 90 70 1c 5a d4 a7 9c fc 1f e0 ff 42 f4 fb 00 ..p.Z.......B... 229s | decode_to_chunk() expected counter-block: : input "0x 00 96 B0 3B 02 0C 6E AD C2 CB 50 0D 00 00 00 03" 229s | decode_to_chunk() output: 229s | 00 96 b0 3b 02 0c 6e ad c2 cb 50 0d 00 00 00 03 ...;..n...P..... 229s | cipher_op_ctr_nss() enter AES_CTR 0x37d516a9fc0 use IKEv1 IV wire_iv 0 count 0 229s | ctr_param: count 32 iv 0096b03b020c6eadc2cb500d00000001 229s | cipher_op_ctr_nss() counter-block updated from 0x1 to 0x3 for 32 bytes 229s | do_aes_ctr: exit 229s | cipher_op_context_destroy_ctr_nss() 229s | verify_bytes() Encrypting 32 octets using AES-CTR with 192-bit key: encrypt: ok 229s | verify_bytes() Encrypting 32 octets using AES-CTR with 192-bit key: counter-block: ok 229s | decode_to_mac() input counter-block: : input "0x 00 96 B0 3B 02 0C 6E AD C2 CB 50 0D 00 00 00 01" 229s | decode_to_mac() output: 229s | 00 96 b0 3b 02 0c 6e ad c2 cb 50 0d 00 00 00 01 ...;..n...P..... 229s | decode_to_chunk() Ciphertext: input "0x45 32 43 FC 60 9B 23 32 7E DF AA FA 71 31 CD 9F84 90 70 1C 5A D4 A7 9C FC 1F E0 FF 42 F4 FB 00" 229s | decode_to_chunk() output: 229s | 45 32 43 fc 60 9b 23 32 7e df aa fa 71 31 cd 9f E2C.`.#2~...q1.. 229s | 84 90 70 1c 5a d4 a7 9c fc 1f e0 ff 42 f4 fb 00 ..p.Z.......B... 229s | decode_to_chunk() Plaintext: input "0x00 01 02 03 04 05 06 07 08 09 0A 0B 0C 0D 0E 0F10 11 12 13 14 15 16 17 18 19 1A 1B 1C 1D 1E 1F" 229s | decode_to_chunk() output: 229s | 00 01 02 03 04 05 06 07 08 09 0a 0b 0c 0d 0e 0f ................ 229s | 10 11 12 13 14 15 16 17 18 19 1a 1b 1c 1d 1e 1f ................ 229s | decode_to_chunk() expected counter-block: : input "0x 00 96 B0 3B 02 0C 6E AD C2 CB 50 0D 00 00 00 03" 229s | decode_to_chunk() output: 229s | 00 96 b0 3b 02 0c 6e ad c2 cb 50 0d 00 00 00 03 ...;..n...P..... 229s | cipher_op_ctr_nss() enter AES_CTR 0x37d516a9fc0 use IKEv1 IV wire_iv 0 count 0 229s | ctr_param: count 32 iv 0096b03b020c6eadc2cb500d00000001 229s | cipher_op_ctr_nss() counter-block updated from 0x1 to 0x3 for 32 bytes 229s | do_aes_ctr: exit 229s | cipher_op_context_destroy_ctr_nss() 229s | verify_bytes() Encrypting 32 octets using AES-CTR with 192-bit key: decrypt: ok 229s | verify_bytes() Encrypting 32 octets using AES-CTR with 192-bit key: counter-block: ok 229s ipsec algparse: Encrypting 36 octets using AES-CTR with 192-bit key 229s | decode_to_chunk() raw_key: input "0x02 BF 39 1E E8 EC B1 59 B9 59 61 7B 09 65 27 9BF5 9B 60 A7 86 D3 E0 FE" 229s | decode_to_chunk() output: 229s | 02 bf 39 1e e8 ec b1 59 b9 59 61 7b 09 65 27 9b ..9....Y.Ya{.e'. 229s | f5 9b 60 a7 86 d3 e0 fe ..`..... 229s | CONCATENATE_DATA_AND_BASE: 229s | target: EXTRACT_KEY_FROM_KEY 229s | base: base-key@0x37d516aa290 (16-bytes, AES_KEY_GEN) 229s | params: 16-bytes@0x7fffe4c0b620 229s | key-offset: 0, key-size: 24 229s | EXTRACT_KEY_FROM_KEY: 229s | target: AES_CTR 229s | flags: ENCRYPT+DECRYPT 229s | key_size: 24-bytes 229s | base: base-key@0x37d516ad2a0 (40-bytes, EXTRACT_KEY_FROM_KEY) 229s | operation: FLAGS_ONLY 229s | params: 8-bytes@0x7fffe4c0b628 229s | decode_to_mac() input counter-block: : input "0x 00 07 BD FD 5C BD 60 27 8D CC 09 12 00 00 00 01" 229s | decode_to_mac() output: 229s | 00 07 bd fd 5c bd 60 27 8d cc 09 12 00 00 00 01 ....\.`'........ 229s | decode_to_chunk() Plaintext: input "0x00 01 02 03 04 05 06 07 08 09 0A 0B 0C 0D 0E 0F10 11 12 13 14 15 16 17 18 19 1A 1B 1C 1D 1E 1F20 21 22 23" 229s | decode_to_chunk() output: 229s | 00 01 02 03 04 05 06 07 08 09 0a 0b 0c 0d 0e 0f ................ 229s | 10 11 12 13 14 15 16 17 18 19 1a 1b 1c 1d 1e 1f ................ 229s | 20 21 22 23 !"# 229s | decode_to_chunk() Ciphertext: input "0x96 89 3F C5 5E 5C 72 2F 54 0B 7D D1 DD F7 E7 58D2 88 BC 95 C6 91 65 88 45 36 C8 11 66 2F 21 88AB EE 09 35" 229s | decode_to_chunk() output: 229s | 96 89 3f c5 5e 5c 72 2f 54 0b 7d d1 dd f7 e7 58 ..?.^\r/T.}....X 229s | d2 88 bc 95 c6 91 65 88 45 36 c8 11 66 2f 21 88 ......e.E6..f/!. 229s | ab ee 09 35 ...5 229s | decode_to_chunk() expected counter-block: : input "0x 00 07 BD FD 5C BD 60 27 8D CC 09 12 00 00 00 04" 229s | decode_to_chunk() output: 229s | 00 07 bd fd 5c bd 60 27 8d cc 09 12 00 00 00 04 ....\.`'........ 229s | cipher_op_ctr_nss() enter AES_CTR 0x37d516a9fc0 use IKEv1 IV wire_iv 0 count 0 229s | ctr_param: count 32 iv 0007bdfd5cbd60278dcc091200000001 229s | cipher_op_ctr_nss() counter-block updated from 0x1 to 0x4 for 36 bytes 229s | do_aes_ctr: exit 229s | cipher_op_context_destroy_ctr_nss() 229s | verify_bytes() Encrypting 36 octets using AES-CTR with 192-bit key: encrypt: ok 229s | verify_bytes() Encrypting 36 octets using AES-CTR with 192-bit key: counter-block: ok 229s | decode_to_mac() input counter-block: : input "0x 00 07 BD FD 5C BD 60 27 8D CC 09 12 00 00 00 01" 229s | decode_to_mac() output: 229s | 00 07 bd fd 5c bd 60 27 8d cc 09 12 00 00 00 01 ....\.`'........ 229s | decode_to_chunk() Ciphertext: input "0x96 89 3F C5 5E 5C 72 2F 54 0B 7D D1 DD F7 E7 58D2 88 BC 95 C6 91 65 88 45 36 C8 11 66 2F 21 88AB EE 09 35" 229s | decode_to_chunk() output: 229s | 96 89 3f c5 5e 5c 72 2f 54 0b 7d d1 dd f7 e7 58 ..?.^\r/T.}....X 229s | d2 88 bc 95 c6 91 65 88 45 36 c8 11 66 2f 21 88 ......e.E6..f/!. 229s | ab ee 09 35 ...5 229s | decode_to_chunk() Plaintext: input "0x00 01 02 03 04 05 06 07 08 09 0A 0B 0C 0D 0E 0F10 11 12 13 14 15 16 17 18 19 1A 1B 1C 1D 1E 1F20 21 22 23" 229s | decode_to_chunk() output: 229s | 00 01 02 03 04 05 06 07 08 09 0a 0b 0c 0d 0e 0f ................ 229s | 10 11 12 13 14 15 16 17 18 19 1a 1b 1c 1d 1e 1f ................ 229s | 20 21 22 23 !"# 229s | decode_to_chunk() expected counter-block: : input "0x 00 07 BD FD 5C BD 60 27 8D CC 09 12 00 00 00 04" 229s | decode_to_chunk() output: 229s | 00 07 bd fd 5c bd 60 27 8d cc 09 12 00 00 00 04 ....\.`'........ 229s | cipher_op_ctr_nss() enter AES_CTR 0x37d516a9fc0 use IKEv1 IV wire_iv 0 count 0 229s | ctr_param: count 32 iv 0007bdfd5cbd60278dcc091200000001 229s | cipher_op_ctr_nss() counter-block updated from 0x1 to 0x4 for 36 bytes 229s | do_aes_ctr: exit 229s | cipher_op_context_destroy_ctr_nss() 229s | verify_bytes() Encrypting 36 octets using AES-CTR with 192-bit key: decrypt: ok 229s | verify_bytes() Encrypting 36 octets using AES-CTR with 192-bit key: counter-block: ok 229s ipsec algparse: Encrypting 16 octets using AES-CTR with 256-bit key 229s | decode_to_chunk() raw_key: input "0x77 6B EF F2 85 1D B0 6F 4C 8A 05 42 C8 69 6F 6C6A 81 AF 1E EC 96 B4 D3 7F C1 D6 89 E6 C1 C1 04" 229s | decode_to_chunk() output: 229s | 77 6b ef f2 85 1d b0 6f 4c 8a 05 42 c8 69 6f 6c wk.....oL..B.iol 229s | 6a 81 af 1e ec 96 b4 d3 7f c1 d6 89 e6 c1 c1 04 j............... 229s | CONCATENATE_DATA_AND_BASE: 229s | target: EXTRACT_KEY_FROM_KEY 229s | base: base-key@0x37d516aa290 (16-bytes, AES_KEY_GEN) 229s | params: 16-bytes@0x7fffe4c0b620 229s | key-offset: 0, key-size: 32 229s | EXTRACT_KEY_FROM_KEY: 229s | target: AES_CTR 229s | flags: ENCRYPT+DECRYPT 229s | key_size: 32-bytes 229s | base: base-key@0x37d516ad2a0 (48-bytes, EXTRACT_KEY_FROM_KEY) 229s | operation: FLAGS_ONLY 229s | params: 8-bytes@0x7fffe4c0b628 229s | decode_to_mac() input counter-block: : input "0x 00 00 00 60 DB 56 72 C9 7A A8 F0 B2 00 00 00 01" 229s | decode_to_mac() output: 229s | 00 00 00 60 db 56 72 c9 7a a8 f0 b2 00 00 00 01 ...`.Vr.z....... 229s | decode_to_chunk() Plaintext: input "0x 53 69 6E 67 6C 65 20 62 6C 6F 63 6B 20 6D 73 67" 229s | decode_to_chunk() output: 229s | 53 69 6e 67 6c 65 20 62 6c 6f 63 6b 20 6d 73 67 Single block msg 229s | decode_to_chunk() Ciphertext: input "0x 14 5A D0 1D BF 82 4E C7 56 08 63 DC 71 E3 E0 C0" 229s | decode_to_chunk() output: 229s | 14 5a d0 1d bf 82 4e c7 56 08 63 dc 71 e3 e0 c0 .Z....N.V.c.q... 229s | decode_to_chunk() expected counter-block: : input "0x 00 00 00 60 DB 56 72 C9 7A A8 F0 B2 00 00 00 02" 229s | decode_to_chunk() output: 229s | 00 00 00 60 db 56 72 c9 7a a8 f0 b2 00 00 00 02 ...`.Vr.z....... 229s | cipher_op_ctr_nss() enter AES_CTR 0x37d516adbe0 use IKEv1 IV wire_iv 0 count 0 229s | ctr_param: count 32 iv 00000060db5672c97aa8f0b200000001 229s | cipher_op_ctr_nss() counter-block updated from 0x1 to 0x2 for 16 bytes 229s | do_aes_ctr: exit 229s | cipher_op_context_destroy_ctr_nss() 229s | verify_bytes() Encrypting 16 octets using AES-CTR with 256-bit key: encrypt: ok 229s | verify_bytes() Encrypting 16 octets using AES-CTR with 256-bit key: counter-block: ok 229s | decode_to_mac() input counter-block: : input "0x 00 00 00 60 DB 56 72 C9 7A A8 F0 B2 00 00 00 01" 229s | decode_to_mac() output: 229s | 00 00 00 60 db 56 72 c9 7a a8 f0 b2 00 00 00 01 ...`.Vr.z....... 229s | decode_to_chunk() Ciphertext: input "0x 14 5A D0 1D BF 82 4E C7 56 08 63 DC 71 E3 E0 C0" 229s | decode_to_chunk() output: 229s | 14 5a d0 1d bf 82 4e c7 56 08 63 dc 71 e3 e0 c0 .Z....N.V.c.q... 229s | decode_to_chunk() Plaintext: input "0x 53 69 6E 67 6C 65 20 62 6C 6F 63 6B 20 6D 73 67" 229s | decode_to_chunk() output: 229s | 53 69 6e 67 6c 65 20 62 6c 6f 63 6b 20 6d 73 67 Single block msg 229s | decode_to_chunk() expected counter-block: : input "0x 00 00 00 60 DB 56 72 C9 7A A8 F0 B2 00 00 00 02" 229s | decode_to_chunk() output: 229s | 00 00 00 60 db 56 72 c9 7a a8 f0 b2 00 00 00 02 ...`.Vr.z....... 229s | cipher_op_ctr_nss() enter AES_CTR 0x37d516adbe0 use IKEv1 IV wire_iv 0 count 0 229s | ctr_param: count 32 iv 00000060db5672c97aa8f0b200000001 229s | cipher_op_ctr_nss() counter-block updated from 0x1 to 0x2 for 16 bytes 229s | do_aes_ctr: exit 229s | cipher_op_context_destroy_ctr_nss() 229s | verify_bytes() Encrypting 16 octets using AES-CTR with 256-bit key: decrypt: ok 229s | verify_bytes() Encrypting 16 octets using AES-CTR with 256-bit key: counter-block: ok 229s ipsec algparse: Encrypting 32 octets using AES-CTR with 256-bit key 229s | decode_to_chunk() raw_key: input "0xF6 D6 6D 6B D5 2D 59 BB 07 96 36 58 79 EF F8 86C6 6D D5 1A 5B 6A 99 74 4B 50 59 0C 87 A2 38 84" 229s | decode_to_chunk() output: 229s | f6 d6 6d 6b d5 2d 59 bb 07 96 36 58 79 ef f8 86 ..mk.-Y...6Xy... 229s | c6 6d d5 1a 5b 6a 99 74 4b 50 59 0c 87 a2 38 84 .m..[j.tKPY...8. 229s | CONCATENATE_DATA_AND_BASE: 229s | target: EXTRACT_KEY_FROM_KEY 229s | base: base-key@0x37d516aa290 (16-bytes, AES_KEY_GEN) 229s | params: 16-bytes@0x7fffe4c0b620 229s | key-offset: 0, key-size: 32 229s | EXTRACT_KEY_FROM_KEY: 229s | target: AES_CTR 229s | flags: ENCRYPT+DECRYPT 229s | key_size: 32-bytes 229s | base: base-key@0x37d516ad2a0 (48-bytes, EXTRACT_KEY_FROM_KEY) 229s | operation: FLAGS_ONLY 229s | params: 8-bytes@0x7fffe4c0b628 229s | decode_to_mac() input counter-block: : input "0x 00 FA AC 24 C1 58 5E F1 5A 43 D8 75 00 00 00 01" 229s | decode_to_mac() output: 229s | 00 fa ac 24 c1 58 5e f1 5a 43 d8 75 00 00 00 01 ...$.X^.ZC.u.... 229s | decode_to_chunk() Plaintext: input "0x00 01 02 03 04 05 06 07 08 09 0A 0B 0C 0D 0E 0F10 11 12 13 14 15 16 17 18 19 1A 1B 1C 1D 1E 1F" 229s | decode_to_chunk() output: 229s | 00 01 02 03 04 05 06 07 08 09 0a 0b 0c 0d 0e 0f ................ 229s | 10 11 12 13 14 15 16 17 18 19 1a 1b 1c 1d 1e 1f ................ 229s | decode_to_chunk() Ciphertext: input "0xF0 5E 23 1B 38 94 61 2C 49 EE 00 0B 80 4E B2 A9B8 30 6B 50 8F 83 9D 6A 55 30 83 1D 93 44 AF 1C" 229s | decode_to_chunk() output: 229s | f0 5e 23 1b 38 94 61 2c 49 ee 00 0b 80 4e b2 a9 .^#.8.a,I....N.. 229s | b8 30 6b 50 8f 83 9d 6a 55 30 83 1d 93 44 af 1c .0kP...jU0...D.. 229s | decode_to_chunk() expected counter-block: : input "0x 00 FA AC 24 C1 58 5E F1 5A 43 D8 75 00 00 00 03" 229s | decode_to_chunk() output: 229s | 00 fa ac 24 c1 58 5e f1 5a 43 d8 75 00 00 00 03 ...$.X^.ZC.u.... 229s | cipher_op_ctr_nss() enter AES_CTR 0x37d516a9fc0 use IKEv1 IV wire_iv 0 count 0 229s | ctr_param: count 32 iv 00faac24c1585ef15a43d87500000001 229s | cipher_op_ctr_nss() counter-block updated from 0x1 to 0x3 for 32 bytes 229s | do_aes_ctr: exit 229s | cipher_op_context_destroy_ctr_nss() 229s | verify_bytes() Encrypting 32 octets using AES-CTR with 256-bit key: encrypt: ok 229s | verify_bytes() Encrypting 32 octets using AES-CTR with 256-bit key: counter-block: ok 229s | decode_to_mac() input counter-block: : input "0x 00 FA AC 24 C1 58 5E F1 5A 43 D8 75 00 00 00 01" 229s | decode_to_mac() output: 229s | 00 fa ac 24 c1 58 5e f1 5a 43 d8 75 00 00 00 01 ...$.X^.ZC.u.... 229s | decode_to_chunk() Ciphertext: input "0xF0 5E 23 1B 38 94 61 2C 49 EE 00 0B 80 4E B2 A9B8 30 6B 50 8F 83 9D 6A 55 30 83 1D 93 44 AF 1C" 229s | decode_to_chunk() output: 229s | f0 5e 23 1b 38 94 61 2c 49 ee 00 0b 80 4e b2 a9 .^#.8.a,I....N.. 229s | b8 30 6b 50 8f 83 9d 6a 55 30 83 1d 93 44 af 1c .0kP...jU0...D.. 229s | decode_to_chunk() Plaintext: input "0x00 01 02 03 04 05 06 07 08 09 0A 0B 0C 0D 0E 0F10 11 12 13 14 15 16 17 18 19 1A 1B 1C 1D 1E 1F" 229s | decode_to_chunk() output: 229s | 00 01 02 03 04 05 06 07 08 09 0a 0b 0c 0d 0e 0f ................ 229s | 10 11 12 13 14 15 16 17 18 19 1a 1b 1c 1d 1e 1f ................ 229s | decode_to_chunk() expected counter-block: : input "0x 00 FA AC 24 C1 58 5E F1 5A 43 D8 75 00 00 00 03" 229s | decode_to_chunk() output: 229s | 00 fa ac 24 c1 58 5e f1 5a 43 d8 75 00 00 00 03 ...$.X^.ZC.u.... 229s | cipher_op_ctr_nss() enter AES_CTR 0x37d516a9fc0 use IKEv1 IV wire_iv 0 count 0 229s | ctr_param: count 32 iv 00faac24c1585ef15a43d87500000001 229s | cipher_op_ctr_nss() counter-block updated from 0x1 to 0x3 for 32 bytes 229s | do_aes_ctr: exit 229s | cipher_op_context_destroy_ctr_nss() 229s | verify_bytes() Encrypting 32 octets using AES-CTR with 256-bit key: decrypt: ok 229s | verify_bytes() Encrypting 32 octets using AES-CTR with 256-bit key: counter-block: ok 229s ipsec algparse: Encrypting 36 octets using AES-CTR with 256-bit key 229s | decode_to_chunk() raw_key: input "0xFF 7A 61 7C E6 91 48 E4 F1 72 6E 2F 43 58 1D E2AA 62 D9 F8 05 53 2E DF F1 EE D6 87 FB 54 15 3D" 229s | decode_to_chunk() output: 229s | ff 7a 61 7c e6 91 48 e4 f1 72 6e 2f 43 58 1d e2 .za|..H..rn/CX.. 229s | aa 62 d9 f8 05 53 2e df f1 ee d6 87 fb 54 15 3d .b...S.......T.= 229s | CONCATENATE_DATA_AND_BASE: 229s | target: EXTRACT_KEY_FROM_KEY 229s | base: base-key@0x37d516aa290 (16-bytes, AES_KEY_GEN) 229s | params: 16-bytes@0x7fffe4c0b620 229s | key-offset: 0, key-size: 32 229s | EXTRACT_KEY_FROM_KEY: 229s | target: AES_CTR 229s | flags: ENCRYPT+DECRYPT 229s | key_size: 32-bytes 229s | base: base-key@0x37d516ad2a0 (48-bytes, EXTRACT_KEY_FROM_KEY) 229s | operation: FLAGS_ONLY 229s | params: 8-bytes@0x7fffe4c0b628 229s | decode_to_mac() input counter-block: : input "0x 00 1C C5 B7 51 A5 1D 70 A1 C1 11 48 00 00 00 01" 229s | decode_to_mac() output: 229s | 00 1c c5 b7 51 a5 1d 70 a1 c1 11 48 00 00 00 01 ....Q..p...H.... 229s | decode_to_chunk() Plaintext: input "0x00 01 02 03 04 05 06 07 08 09 0A 0B 0C 0D 0E 0F10 11 12 13 14 15 16 17 18 19 1A 1B 1C 1D 1E 1F20 21 22 23" 229s | decode_to_chunk() output: 229s | 00 01 02 03 04 05 06 07 08 09 0a 0b 0c 0d 0e 0f ................ 229s | 10 11 12 13 14 15 16 17 18 19 1a 1b 1c 1d 1e 1f ................ 229s | 20 21 22 23 !"# 229s | decode_to_chunk() Ciphertext: input "0xEB 6C 52 82 1D 0B BB F7 CE 75 94 46 2A CA 4F AAB4 07 DF 86 65 69 FD 07 F4 8C C0 B5 83 D6 07 1F1E C0 E6 B8" 229s | decode_to_chunk() output: 229s | eb 6c 52 82 1d 0b bb f7 ce 75 94 46 2a ca 4f aa .lR......u.F*.O. 229s | b4 07 df 86 65 69 fd 07 f4 8c c0 b5 83 d6 07 1f ....ei.......... 229s | 1e c0 e6 b8 .... 229s | decode_to_chunk() expected counter-block: : input "0x 00 1C C5 B7 51 A5 1D 70 A1 C1 11 48 00 00 00 04" 229s | decode_to_chunk() output: 229s | 00 1c c5 b7 51 a5 1d 70 a1 c1 11 48 00 00 00 04 ....Q..p...H.... 229s | cipher_op_ctr_nss() enter AES_CTR 0x37d516a9fc0 use IKEv1 IV wire_iv 0 count 0 229s | ctr_param: count 32 iv 001cc5b751a51d70a1c1114800000001 229s | cipher_op_ctr_nss() counter-block updated from 0x1 to 0x4 for 36 bytes 229s | do_aes_ctr: exit 229s | cipher_op_context_destroy_ctr_nss() 229s | verify_bytes() Encrypting 36 octets using AES-CTR with 256-bit key: encrypt: ok 229s | verify_bytes() Encrypting 36 octets using AES-CTR with 256-bit key: counter-block: ok 229s | decode_to_mac() input counter-block: : input "0x 00 1C C5 B7 51 A5 1D 70 A1 C1 11 48 00 00 00 01" 229s | decode_to_mac() output: 229s | 00 1c c5 b7 51 a5 1d 70 a1 c1 11 48 00 00 00 01 ....Q..p...H.... 229s | decode_to_chunk() Ciphertext: input "0xEB 6C 52 82 1D 0B BB F7 CE 75 94 46 2A CA 4F AAB4 07 DF 86 65 69 FD 07 F4 8C C0 B5 83 D6 07 1F1E C0 E6 B8" 229s | decode_to_chunk() output: 229s | eb 6c 52 82 1d 0b bb f7 ce 75 94 46 2a ca 4f aa .lR......u.F*.O. 229s | b4 07 df 86 65 69 fd 07 f4 8c c0 b5 83 d6 07 1f ....ei.......... 229s | 1e c0 e6 b8 .... 229s | decode_to_chunk() Plaintext: input "0x00 01 02 03 04 05 06 07 08 09 0A 0B 0C 0D 0E 0F10 11 12 13 14 15 16 17 18 19 1A 1B 1C 1D 1E 1F20 21 22 23" 229s | decode_to_chunk() output: 229s | 00 01 02 03 04 05 06 07 08 09 0a 0b 0c 0d 0e 0f ................ 229s | 10 11 12 13 14 15 16 17 18 19 1a 1b 1c 1d 1e 1f ................ 229s | 20 21 22 23 !"# 229s | decode_to_chunk() expected counter-block: : input "0x 00 1C C5 B7 51 A5 1D 70 A1 C1 11 48 00 00 00 04" 229s | decode_to_chunk() output: 229s | 00 1c c5 b7 51 a5 1d 70 a1 c1 11 48 00 00 00 04 ....Q..p...H.... 229s | cipher_op_ctr_nss() enter AES_CTR 0x37d516a9fc0 use IKEv1 IV wire_iv 0 count 0 229s | ctr_param: count 32 iv 001cc5b751a51d70a1c1114800000001 229s | cipher_op_ctr_nss() counter-block updated from 0x1 to 0x4 for 36 bytes 229s | do_aes_ctr: exit 229s | cipher_op_context_destroy_ctr_nss() 229s | verify_bytes() Encrypting 36 octets using AES-CTR with 256-bit key: decrypt: ok 229s | verify_bytes() Encrypting 36 octets using AES-CTR with 256-bit key: counter-block: ok 229s ipsec algparse: testing AES_CBC: 229s ipsec algparse: Encrypting 16 bytes (1 block) using AES-CBC with 128-bit key 229s | decode_to_chunk() raw_key: input "0x06a9214036b8a15b512e03d534120006" 229s | decode_to_chunk() output: 229s | 06 a9 21 40 36 b8 a1 5b 51 2e 03 d5 34 12 00 06 ..!@6..[Q...4... 229s | CONCATENATE_DATA_AND_BASE: 229s | target: EXTRACT_KEY_FROM_KEY 229s | base: base-key@0x37d516aa290 (16-bytes, AES_KEY_GEN) 229s | params: 16-bytes@0x7fffe4c0b630 229s | key-offset: 0, key-size: 16 229s | EXTRACT_KEY_FROM_KEY: 229s | target: AES_CBC 229s | flags: ENCRYPT+DECRYPT 229s | key_size: 16-bytes 229s | base: base-key@0x37d516ad2a0 (32-bytes, EXTRACT_KEY_FROM_KEY) 229s | operation: FLAGS_ONLY 229s | params: 8-bytes@0x7fffe4c0b638 229s | decode_to_mac() IV: : input "0x3dafba429d9eb430b422da802c9fac41" 229s | decode_to_mac() output: 229s | 3d af ba 42 9d 9e b4 30 b4 22 da 80 2c 9f ac 41 =..B...0."..,..A 229s | decode_to_chunk() new IV: : input "0xe353779c1079aeb82708942dbe77181a" 229s | decode_to_chunk() output: 229s | e3 53 77 9c 10 79 ae b8 27 08 94 2d be 77 18 1a .Sw..y..'..-.w.. 229s | decode_to_chunk() plaintext: : input "Single block msg" 229s | decode_to_chunk() output: 229s | 53 69 6e 67 6c 65 20 62 6c 6f 63 6b 20 6d 73 67 Single block msg 229s | decode_to_chunk() ciphertext: : input "0xe353779c1079aeb82708942dbe77181a" 229s | decode_to_chunk() output: 229s | e3 53 77 9c 10 79 ae b8 27 08 94 2d be 77 18 1a .Sw..y..'..-.w.. 229s | NSS ike_alg_nss_cbc: AES_CBC - enter (nil) 229s | using IKEv1 IV 229s | NSS ike_alg_nss_cbc: AES_CBC - exit 229s | verify_bytes() Encrypting 16 bytes (1 block) using AES-CBC with 128-bit key: encrypt: ok 229s | verify_bytes() Encrypting 16 bytes (1 block) using AES-CBC with 128-bit key: updated CBC IV: ok 229s | decode_to_mac() IV: : input "0x3dafba429d9eb430b422da802c9fac41" 229s | decode_to_mac() output: 229s | 3d af ba 42 9d 9e b4 30 b4 22 da 80 2c 9f ac 41 =..B...0."..,..A 229s | decode_to_chunk() new IV: : input "0xe353779c1079aeb82708942dbe77181a" 229s | decode_to_chunk() output: 229s | e3 53 77 9c 10 79 ae b8 27 08 94 2d be 77 18 1a .Sw..y..'..-.w.. 229s | decode_to_chunk() ciphertext: : input "0xe353779c1079aeb82708942dbe77181a" 229s | decode_to_chunk() output: 229s | e3 53 77 9c 10 79 ae b8 27 08 94 2d be 77 18 1a .Sw..y..'..-.w.. 229s | decode_to_chunk() plaintext: : input "Single block msg" 229s | decode_to_chunk() output: 229s | 53 69 6e 67 6c 65 20 62 6c 6f 63 6b 20 6d 73 67 Single block msg 229s | NSS ike_alg_nss_cbc: AES_CBC - enter (nil) 229s | using IKEv1 IV 229s | NSS ike_alg_nss_cbc: AES_CBC - exit 229s | verify_bytes() Encrypting 16 bytes (1 block) using AES-CBC with 128-bit key: decrypt: ok 229s | verify_bytes() Encrypting 16 bytes (1 block) using AES-CBC with 128-bit key: updated CBC IV: ok 229s ipsec algparse: Encrypting 32 bytes (2 blocks) using AES-CBC with 128-bit key 229s | decode_to_chunk() raw_key: input "0xc286696d887c9aa0611bbb3e2025a45a" 229s | decode_to_chunk() output: 229s | c2 86 69 6d 88 7c 9a a0 61 1b bb 3e 20 25 a4 5a ..im.|..a..> %.Z 229s | CONCATENATE_DATA_AND_BASE: 229s | target: EXTRACT_KEY_FROM_KEY 229s | base: base-key@0x37d516aa290 (16-bytes, AES_KEY_GEN) 229s | params: 16-bytes@0x7fffe4c0b630 229s | key-offset: 0, key-size: 16 229s | EXTRACT_KEY_FROM_KEY: 229s | target: AES_CBC 229s | flags: ENCRYPT+DECRYPT 229s | key_size: 16-bytes 229s | base: base-key@0x37d516ad2a0 (32-bytes, EXTRACT_KEY_FROM_KEY) 229s | operation: FLAGS_ONLY 229s | params: 8-bytes@0x7fffe4c0b638 229s | decode_to_mac() IV: : input "0x562e17996d093d28ddb3ba695a2e6f58" 229s | decode_to_mac() output: 229s | 56 2e 17 99 6d 09 3d 28 dd b3 ba 69 5a 2e 6f 58 V...m.=(...iZ.oX 229s | decode_to_chunk() new IV: : input "0xd296cd94c2cccf8a3a863028b5e1dc0a7586602d253cfff91b8266bea6d61ab1" 229s | decode_to_chunk() output: 229s | d2 96 cd 94 c2 cc cf 8a 3a 86 30 28 b5 e1 dc 0a ........:.0(.... 229s | 75 86 60 2d 25 3c ff f9 1b 82 66 be a6 d6 1a b1 u.`-%<....f..... 229s | decode_to_chunk() plaintext: : input "0x000102030405060708090a0b0c0d0e0f101112131415161718191a1b1c1d1e1f" 229s | decode_to_chunk() output: 229s | 00 01 02 03 04 05 06 07 08 09 0a 0b 0c 0d 0e 0f ................ 229s | 10 11 12 13 14 15 16 17 18 19 1a 1b 1c 1d 1e 1f ................ 229s | decode_to_chunk() ciphertext: : input "0xd296cd94c2cccf8a3a863028b5e1dc0a7586602d253cfff91b8266bea6d61ab1" 229s | decode_to_chunk() output: 229s | d2 96 cd 94 c2 cc cf 8a 3a 86 30 28 b5 e1 dc 0a ........:.0(.... 229s | 75 86 60 2d 25 3c ff f9 1b 82 66 be a6 d6 1a b1 u.`-%<....f..... 229s | NSS ike_alg_nss_cbc: AES_CBC - enter (nil) 229s | using IKEv1 IV 229s | NSS ike_alg_nss_cbc: AES_CBC - exit 229s | verify_bytes() Encrypting 32 bytes (2 blocks) using AES-CBC with 128-bit key: encrypt: ok 229s | verify_bytes() Encrypting 32 bytes (2 blocks) using AES-CBC with 128-bit key: updated CBC IV: ok 229s | decode_to_mac() IV: : input "0x562e17996d093d28ddb3ba695a2e6f58" 229s | decode_to_mac() output: 229s | 56 2e 17 99 6d 09 3d 28 dd b3 ba 69 5a 2e 6f 58 V...m.=(...iZ.oX 230s | decode_to_chunk() new IV: : input "0xd296cd94c2cccf8a3a863028b5e1dc0a7586602d253cfff91b8266bea6d61ab1" 230s | decode_to_chunk() output: 230s | d2 96 cd 94 c2 cc cf 8a 3a 86 30 28 b5 e1 dc 0a ........:.0(.... 230s | 75 86 60 2d 25 3c ff f9 1b 82 66 be a6 d6 1a b1 u.`-%<....f..... 230s | decode_to_chunk() ciphertext: : input "0xd296cd94c2cccf8a3a863028b5e1dc0a7586602d253cfff91b8266bea6d61ab1" 230s | decode_to_chunk() output: 230s | d2 96 cd 94 c2 cc cf 8a 3a 86 30 28 b5 e1 dc 0a ........:.0(.... 230s | 75 86 60 2d 25 3c ff f9 1b 82 66 be a6 d6 1a b1 u.`-%<....f..... 230s | decode_to_chunk() plaintext: : input "0x000102030405060708090a0b0c0d0e0f101112131415161718191a1b1c1d1e1f" 230s | decode_to_chunk() output: 230s | 00 01 02 03 04 05 06 07 08 09 0a 0b 0c 0d 0e 0f ................ 230s | 10 11 12 13 14 15 16 17 18 19 1a 1b 1c 1d 1e 1f ................ 230s | NSS ike_alg_nss_cbc: AES_CBC - enter (nil) 230s | using IKEv1 IV 230s | NSS ike_alg_nss_cbc: AES_CBC - exit 230s | verify_bytes() Encrypting 32 bytes (2 blocks) using AES-CBC with 128-bit key: decrypt: ok 230s | verify_bytes() Encrypting 32 bytes (2 blocks) using AES-CBC with 128-bit key: updated CBC IV: ok 230s ipsec algparse: Encrypting 48 bytes (3 blocks) using AES-CBC with 128-bit key 230s | decode_to_chunk() raw_key: input "0x6c3ea0477630ce21a2ce334aa746c2cd" 230s | decode_to_chunk() output: 230s | 6c 3e a0 47 76 30 ce 21 a2 ce 33 4a a7 46 c2 cd l>.Gv0.!..3J.F.. 230s | CONCATENATE_DATA_AND_BASE: 230s | target: EXTRACT_KEY_FROM_KEY 230s | base: base-key@0x37d516aa290 (16-bytes, AES_KEY_GEN) 230s | params: 16-bytes@0x7fffe4c0b630 230s | key-offset: 0, key-size: 16 230s | EXTRACT_KEY_FROM_KEY: 230s | target: AES_CBC 230s | flags: ENCRYPT+DECRYPT 230s | key_size: 16-bytes 230s | base: base-key@0x37d516ad2a0 (32-bytes, EXTRACT_KEY_FROM_KEY) 230s | operation: FLAGS_ONLY 230s | params: 8-bytes@0x7fffe4c0b638 230s | decode_to_mac() IV: : input "0xc782dc4c098c66cbd9cd27d825682c81" 230s | decode_to_mac() output: 230s | c7 82 dc 4c 09 8c 66 cb d9 cd 27 d8 25 68 2c 81 ...L..f...'.%h,. 230s | decode_to_chunk() new IV: : input "0xd0a02b3836451753d493665d33f0e8862dea54cdb293abc7506939276772f8d5021c19216bad525c8579695d83ba2684" 230s | decode_to_chunk() output: 230s | d0 a0 2b 38 36 45 17 53 d4 93 66 5d 33 f0 e8 86 ..+86E.S..f]3... 230s | 2d ea 54 cd b2 93 ab c7 50 69 39 27 67 72 f8 d5 -.T.....Pi9'gr.. 230s | 02 1c 19 21 6b ad 52 5c 85 79 69 5d 83 ba 26 84 ...!k.R\.yi]..&. 230s | decode_to_chunk() plaintext: : input "This is a 48-byte message (exactly 3 AES blocks)" 230s | decode_to_chunk() output: 230s | 54 68 69 73 20 69 73 20 61 20 34 38 2d 62 79 74 This is a 48-byt 230s | 65 20 6d 65 73 73 61 67 65 20 28 65 78 61 63 74 e message (exact 230s | 6c 79 20 33 20 41 45 53 20 62 6c 6f 63 6b 73 29 ly 3 AES blocks) 230s | decode_to_chunk() ciphertext: : input "0xd0a02b3836451753d493665d33f0e8862dea54cdb293abc7506939276772f8d5021c19216bad525c8579695d83ba2684" 230s | decode_to_chunk() output: 230s | d0 a0 2b 38 36 45 17 53 d4 93 66 5d 33 f0 e8 86 ..+86E.S..f]3... 230s | 2d ea 54 cd b2 93 ab c7 50 69 39 27 67 72 f8 d5 -.T.....Pi9'gr.. 230s | 02 1c 19 21 6b ad 52 5c 85 79 69 5d 83 ba 26 84 ...!k.R\.yi]..&. 230s | NSS ike_alg_nss_cbc: AES_CBC - enter (nil) 230s | using IKEv1 IV 230s | NSS ike_alg_nss_cbc: AES_CBC - exit 230s | verify_bytes() Encrypting 48 bytes (3 blocks) using AES-CBC with 128-bit key: encrypt: ok 230s | verify_bytes() Encrypting 48 bytes (3 blocks) using AES-CBC with 128-bit key: updated CBC IV: ok 230s | decode_to_mac() IV: : input "0xc782dc4c098c66cbd9cd27d825682c81" 230s | decode_to_mac() output: 230s | c7 82 dc 4c 09 8c 66 cb d9 cd 27 d8 25 68 2c 81 ...L..f...'.%h,. 230s | decode_to_chunk() new IV: : input "0xd0a02b3836451753d493665d33f0e8862dea54cdb293abc7506939276772f8d5021c19216bad525c8579695d83ba2684" 230s | decode_to_chunk() output: 230s | d0 a0 2b 38 36 45 17 53 d4 93 66 5d 33 f0 e8 86 ..+86E.S..f]3... 230s | 2d ea 54 cd b2 93 ab c7 50 69 39 27 67 72 f8 d5 -.T.....Pi9'gr.. 230s | 02 1c 19 21 6b ad 52 5c 85 79 69 5d 83 ba 26 84 ...!k.R\.yi]..&. 230s | decode_to_chunk() ciphertext: : input "0xd0a02b3836451753d493665d33f0e8862dea54cdb293abc7506939276772f8d5021c19216bad525c8579695d83ba2684" 230s | decode_to_chunk() output: 230s | d0 a0 2b 38 36 45 17 53 d4 93 66 5d 33 f0 e8 86 ..+86E.S..f]3... 230s | 2d ea 54 cd b2 93 ab c7 50 69 39 27 67 72 f8 d5 -.T.....Pi9'gr.. 230s | 02 1c 19 21 6b ad 52 5c 85 79 69 5d 83 ba 26 84 ...!k.R\.yi]..&. 230s | decode_to_chunk() plaintext: : input "This is a 48-byte message (exactly 3 AES blocks)" 230s | decode_to_chunk() output: 230s | 54 68 69 73 20 69 73 20 61 20 34 38 2d 62 79 74 This is a 48-byt 230s | 65 20 6d 65 73 73 61 67 65 20 28 65 78 61 63 74 e message (exact 230s | 6c 79 20 33 20 41 45 53 20 62 6c 6f 63 6b 73 29 ly 3 AES blocks) 230s | NSS ike_alg_nss_cbc: AES_CBC - enter (nil) 230s | using IKEv1 IV 230s | NSS ike_alg_nss_cbc: AES_CBC - exit 230s | verify_bytes() Encrypting 48 bytes (3 blocks) using AES-CBC with 128-bit key: decrypt: ok 230s | verify_bytes() Encrypting 48 bytes (3 blocks) using AES-CBC with 128-bit key: updated CBC IV: ok 230s ipsec algparse: Encrypting 64 bytes (4 blocks) using AES-CBC with 128-bit key 230s | decode_to_chunk() raw_key: input "0x56e47a38c5598974bc46903dba290349" 230s | decode_to_chunk() output: 230s | 56 e4 7a 38 c5 59 89 74 bc 46 90 3d ba 29 03 49 V.z8.Y.t.F.=.).I 230s | CONCATENATE_DATA_AND_BASE: 230s | target: EXTRACT_KEY_FROM_KEY 230s | base: base-key@0x37d516aa290 (16-bytes, AES_KEY_GEN) 230s | params: 16-bytes@0x7fffe4c0b630 230s | key-offset: 0, key-size: 16 230s | EXTRACT_KEY_FROM_KEY: 230s | target: AES_CBC 230s | flags: ENCRYPT+DECRYPT 230s | key_size: 16-bytes 230s | base: base-key@0x37d516ad2a0 (32-bytes, EXTRACT_KEY_FROM_KEY) 230s | operation: FLAGS_ONLY 230s | params: 8-bytes@0x7fffe4c0b638 230s | decode_to_mac() IV: : input "0x8ce82eefbea0da3c44699ed7db51b7d9" 230s | decode_to_mac() output: 230s | 8c e8 2e ef be a0 da 3c 44 69 9e d7 db 51 b7 d9 ...........U 230s | decode_to_chunk() plaintext: : input "0xa0a1a2a3a4a5a6a7a8a9aaabacadaeafb0b1b2b3b4b5b6b7b8b9babbbcbdbebfc0c1c2c3c4c5c6c7c8c9cacbcccdcecfd0d1d2d3d4d5d6d7d8d9dadbdcdddedf" 230s | decode_to_chunk() output: 230s | a0 a1 a2 a3 a4 a5 a6 a7 a8 a9 aa ab ac ad ae af ................ 230s | b0 b1 b2 b3 b4 b5 b6 b7 b8 b9 ba bb bc bd be bf ................ 230s | c0 c1 c2 c3 c4 c5 c6 c7 c8 c9 ca cb cc cd ce cf ................ 230s | d0 d1 d2 d3 d4 d5 d6 d7 d8 d9 da db dc dd de df ................ 230s | decode_to_chunk() ciphertext: : input "0xc30e32ffedc0774e6aff6af0869f71aa0f3af07a9a31a9c684db207eb0ef8e4e35907aa632c3ffdf868bb7b29d3d46ad83ce9f9a102ee99d49a53e87f4c3da55" 230s | decode_to_chunk() output: 230s | c3 0e 32 ff ed c0 77 4e 6a ff 6a f0 86 9f 71 aa ..2...wNj.j...q. 230s | 0f 3a f0 7a 9a 31 a9 c6 84 db 20 7e b0 ef 8e 4e .:.z.1.... ~...N 230s | 35 90 7a a6 32 c3 ff df 86 8b b7 b2 9d 3d 46 ad 5.z.2........=F. 230s | 83 ce 9f 9a 10 2e e9 9d 49 a5 3e 87 f4 c3 da 55 ........I.>....U 230s | NSS ike_alg_nss_cbc: AES_CBC - enter (nil) 230s | using IKEv1 IV 230s | NSS ike_alg_nss_cbc: AES_CBC - exit 230s | verify_bytes() Encrypting 64 bytes (4 blocks) using AES-CBC with 128-bit key: encrypt: ok 230s | verify_bytes() Encrypting 64 bytes (4 blocks) using AES-CBC with 128-bit key: updated CBC IV: ok 230s | decode_to_mac() IV: : input "0x8ce82eefbea0da3c44699ed7db51b7d9" 230s | decode_to_mac() output: 230s | 8c e8 2e ef be a0 da 3c 44 69 9e d7 db 51 b7 d9 ...........U 230s | decode_to_chunk() ciphertext: : input "0xc30e32ffedc0774e6aff6af0869f71aa0f3af07a9a31a9c684db207eb0ef8e4e35907aa632c3ffdf868bb7b29d3d46ad83ce9f9a102ee99d49a53e87f4c3da55" 230s | decode_to_chunk() output: 230s | c3 0e 32 ff ed c0 77 4e 6a ff 6a f0 86 9f 71 aa ..2...wNj.j...q. 230s | 0f 3a f0 7a 9a 31 a9 c6 84 db 20 7e b0 ef 8e 4e .:.z.1.... ~...N 230s | 35 90 7a a6 32 c3 ff df 86 8b b7 b2 9d 3d 46 ad 5.z.2........=F. 230s | 83 ce 9f 9a 10 2e e9 9d 49 a5 3e 87 f4 c3 da 55 ........I.>....U 230s | decode_to_chunk() plaintext: : input "0xa0a1a2a3a4a5a6a7a8a9aaabacadaeafb0b1b2b3b4b5b6b7b8b9babbbcbdbebfc0c1c2c3c4c5c6c7c8c9cacbcccdcecfd0d1d2d3d4d5d6d7d8d9dadbdcdddedf" 230s | decode_to_chunk() output: 230s | a0 a1 a2 a3 a4 a5 a6 a7 a8 a9 aa ab ac ad ae af ................ 230s | b0 b1 b2 b3 b4 b5 b6 b7 b8 b9 ba bb bc bd be bf ................ 230s | c0 c1 c2 c3 c4 c5 c6 c7 c8 c9 ca cb cc cd ce cf ................ 230s | d0 d1 d2 d3 d4 d5 d6 d7 d8 d9 da db dc dd de df ................ 230s | NSS ike_alg_nss_cbc: AES_CBC - enter (nil) 230s | using IKEv1 IV 230s | NSS ike_alg_nss_cbc: AES_CBC - exit 230s | verify_bytes() Encrypting 64 bytes (4 blocks) using AES-CBC with 128-bit key: decrypt: ok 230s | verify_bytes() Encrypting 64 bytes (4 blocks) using AES-CBC with 128-bit key: updated CBC IV: ok 230s ipsec algparse: testing AES_XCBC: 230s ipsec algparse: RFC 3566 Test Case 1: AES-XCBC-MAC-96 with 0-byte input 230s | decode_to_chunk() test_prf_vector: input "0x000102030405060708090a0b0c0d0e0f" 230s | decode_to_chunk() output: 230s | 00 01 02 03 04 05 06 07 08 09 0a 0b 0c 0d 0e 0f ................ 230s | decode_to_chunk() test_prf_vector: input "" 230s | decode_to_chunk() output: 230s | 230s | decode_to_chunk() test_prf_vector: input "0x75f0251d528ac01c4573dfd584d79f29" 230s | decode_to_chunk() output: 230s | 75 f0 25 1d 52 8a c0 1c 45 73 df d5 84 d7 9f 29 u.%.R...Es.....) 230s | PRF chunk interface PRF AES_XCBC init key hunk 0x37d516ad5d0 (length 16) 230s | 00 01 02 03 04 05 06 07 08 09 0a 0b 0c 0d 0e 0f ................ 230s | CONCATENATE_DATA_AND_BASE: 230s | target: EXTRACT_KEY_FROM_KEY 230s | base: base-key@0x37d516aa290 (16-bytes, AES_KEY_GEN) 230s | params: 16-bytes@0x7fffe4c0b510 230s | key-offset: 0, key-size: 16 230s | EXTRACT_KEY_FROM_KEY: 230s | target: EXTRACT_KEY_FROM_KEY 230s | key_size: 16-bytes 230s | base: base-key@0x37d516ad2a0 (32-bytes, EXTRACT_KEY_FROM_KEY) 230s | operation: FLAGS_ONLY 230s | params: 8-bytes@0x7fffe4c0b448 230s | XCBC: Key 16=16 just right 230s | key-offset: 0, key-size: 16 230s | EXTRACT_KEY_FROM_KEY: 230s | target: AES_ECB 230s | flags: SIGN 230s | key_size: 16-bytes 230s | base: base-key@0x37d516abbb0 (16-bytes, EXTRACT_KEY_FROM_KEY) 230s | operation: FLAGS_ONLY 230s | params: 8-bytes@0x7fffe4c0b418 230s | PRF chunk interface PRF AES_XCBC 0x37d516aa230 230s | PRF chunk interface PRF AES_XCBC update message (0x37d516abae0 length 0) 230s | 230s | XCBC: data 230s | 230s | K extracting all 16 bytes of key@0x37d516ad2a0 230s | K: symkey-key@0x37d516ad2a0 (16-bytes, AES_ECB) 230s | sizeof bytes 16 230s | wrapper: (SECItemType)-457133016: 66 51 02 58 c1 93 9d 55 1b 09 03 bb 5e 3c b1 07 230s | K extracted len 16 bytes at 0x37d516adeb0 230s | unwrapped: 230s | 00 01 02 03 04 05 06 07 08 09 0a 0b 0c 0d 0e 0f ................ 230s | XCBC: K: 230s | 00 01 02 03 04 05 06 07 08 09 0a 0b 0c 0d 0e 0f ................ 230s | XCBC: K1 230s | c3 52 80 57 54 23 7f 31 1a c0 ff f4 e3 e0 3e 78 .R.WT#.1......>x 230s | CONCATENATE_DATA_AND_BASE: 230s | target: EXTRACT_KEY_FROM_KEY 230s | base: base-key@0x37d516aa290 (16-bytes, AES_KEY_GEN) 230s | params: 16-bytes@0x7fffe4c0b300 230s | key-offset: 0, key-size: 16 230s | EXTRACT_KEY_FROM_KEY: 230s | target: AES_ECB 230s | flags: SIGN 230s | key_size: 16-bytes 230s | base: base-key@0x37d516ae040 (32-bytes, EXTRACT_KEY_FROM_KEY) 230s | operation: FLAGS_ONLY 230s | params: 8-bytes@0x7fffe4c0b308 230s | Computing E[0] using K3 230s | XCBC: K3 230s | c1 a7 ab a1 a2 3a 94 06 58 07 a0 8c c8 ee d0 6e .....:..X......n 230s | XCBC: E[n-1] 230s | 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................ 230s | XCBC: M[n] 230s | 230s | XCBC: M[n] 230s | 230s | XCBC: M[n]:80...^E[n-1]^K3 230s | 41 a7 ab a1 a2 3a 94 06 58 07 a0 8c c8 ee d0 6e A....:..X......n 230s | XCBC: MAC 230s | 75 f0 25 1d 52 8a c0 1c 45 73 df d5 84 d7 9f 29 u.%.R...Es.....) 230s | PRF chunk interface PRF AES_XCBC final length 16 230s | 75 f0 25 1d 52 8a c0 1c 45 73 df d5 84 d7 9f 29 u.%.R...Es.....) 230s | chunk output 230s | 75 f0 25 1d 52 8a c0 1c 45 73 df d5 84 d7 9f 29 u.%.R...Es.....) 230s | verify_bytes() RFC 3566 Test Case 1: AES-XCBC-MAC-96 with 0-byte input: prf OUT: ok 230s | CONCATENATE_DATA_AND_BASE: 230s | target: EXTRACT_KEY_FROM_KEY 230s | base: base-key@0x37d516aa290 (16-bytes, AES_KEY_GEN) 230s | params: 16-bytes@0x7fffe4c0b600 230s | key-offset: 0, key-size: 16 230s | EXTRACT_KEY_FROM_KEY: 230s | target: EXTRACT_KEY_FROM_KEY 230s | key_size: 16-bytes 230s | base: base-key@0x37d516abbb0 (32-bytes, EXTRACT_KEY_FROM_KEY) 230s | operation: FLAGS_ONLY 230s | params: 8-bytes@0x7fffe4c0b538 230s | PRF symkey interface PRF AES_XCBC init key symkey-key@0x37d516ad2a0 (size 16) 230s | PRF symkey interface: key symkey-key@0x37d516ad2a0 (16-bytes, EXTRACT_KEY_FROM_KEY) 230s | XCBC: Key 16=16 just right 230s | key-offset: 0, key-size: 16 230s | EXTRACT_KEY_FROM_KEY: 230s | target: AES_ECB 230s | flags: SIGN 230s | key_size: 16-bytes 230s | base: base-key@0x37d516ad2a0 (16-bytes, EXTRACT_KEY_FROM_KEY) 230s | operation: FLAGS_ONLY 230s | params: 8-bytes@0x7fffe4c0b468 230s | PRF symkey interface PRF AES_XCBC 0x37d516aa230 230s | PRF symkey interface PRF AES_XCBC update symkey message-key@(nil) (size 0) 230s | PRF symkey interface: symkey message-key@NULL 230s | symkey message NULL key has no bytes 230s | XCBC: data 230s | 230s | K extracting all 16 bytes of key@0x37d516abbb0 230s | K: symkey-key@0x37d516abbb0 (16-bytes, AES_ECB) 230s | sizeof bytes 16 230s | wrapper: (SECItemType)-457134096: 66 51 02 58 c1 93 9d 55 1b 09 03 bb 5e 3c b1 07 230s | K extracted len 16 bytes at 0x37d516adeb0 230s | unwrapped: 230s | 00 01 02 03 04 05 06 07 08 09 0a 0b 0c 0d 0e 0f ................ 230s | XCBC: K: 230s | 00 01 02 03 04 05 06 07 08 09 0a 0b 0c 0d 0e 0f ................ 230s | XCBC: K1 230s | c3 52 80 57 54 23 7f 31 1a c0 ff f4 e3 e0 3e 78 .R.WT#.1......>x 230s | CONCATENATE_DATA_AND_BASE: 230s | target: EXTRACT_KEY_FROM_KEY 230s | base: base-key@0x37d516aa290 (16-bytes, AES_KEY_GEN) 230s | params: 16-bytes@0x7fffe4c0b350 230s | key-offset: 0, key-size: 16 230s | EXTRACT_KEY_FROM_KEY: 230s | target: AES_ECB 230s | flags: SIGN 230s | key_size: 16-bytes 230s | base: base-key@0x37d516ae380 (32-bytes, EXTRACT_KEY_FROM_KEY) 230s | operation: FLAGS_ONLY 230s | params: 8-bytes@0x7fffe4c0b358 230s | Computing E[0] using K3 230s | XCBC: K3 230s | c1 a7 ab a1 a2 3a 94 06 58 07 a0 8c c8 ee d0 6e .....:..X......n 230s | XCBC: E[n-1] 230s | 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................ 230s | XCBC: M[n] 230s | 230s | XCBC: M[n] 230s | 230s | XCBC: M[n]:80...^E[n-1]^K3 230s | 41 a7 ab a1 a2 3a 94 06 58 07 a0 8c c8 ee d0 6e A....:..X......n 230s | XCBC: MAC 230s | 75 f0 25 1d 52 8a c0 1c 45 73 df d5 84 d7 9f 29 u.%.R...Es.....) 230s | CONCATENATE_DATA_AND_BASE: 230s | target: EXTRACT_KEY_FROM_KEY 230s | base: base-key@0x37d516aa290 (16-bytes, AES_KEY_GEN) 230s | params: 16-bytes@0x7fffe4c0b520 230s | key-offset: 0, key-size: 16 230s | EXTRACT_KEY_FROM_KEY: 230s | target: EXTRACT_KEY_FROM_KEY 230s | key_size: 16-bytes 230s | base: base-key@0x37d516ae380 (32-bytes, EXTRACT_KEY_FROM_KEY) 230s | operation: FLAGS_ONLY 230s | params: 8-bytes@0x7fffe4c0b458 230s | PRF symkey interface PRF AES_XCBC final-key@0x37d516ae040 (size 16) 230s | PRF symkey interface: key-key@0x37d516ae040 (16-bytes, EXTRACT_KEY_FROM_KEY) 230s | output: symkey-key@0x37d516ae040 (16-bytes, EXTRACT_KEY_FROM_KEY) 230s | RFC 3566 Test Case 1: AES-XCBC-MAC-96 with 0-byte input extracting all 16 bytes of key@0x37d516ae040 230s | RFC 3566 Test Case 1: AES-XCBC-MAC-96 with 0-byte input: symkey-key@0x37d516ae040 (16-bytes, EXTRACT_KEY_FROM_KEY) 230s | sizeof bytes 16 230s | wrapper: (SECItemType)-457133840: cb 9c f0 05 91 57 43 d1 b8 68 26 ff 5f 1e bf c8 230s | RFC 3566 Test Case 1: AES-XCBC-MAC-96 with 0-byte input extracted len 16 bytes at 0x37d516ae020 230s | unwrapped: 230s | 75 f0 25 1d 52 8a c0 1c 45 73 df d5 84 d7 9f 29 u.%.R...Es.....) 230s | verify_bytes() RFC 3566 Test Case 1: AES-XCBC-MAC-96 with 0-byte input: symkey: ok 230s ipsec algparse: RFC 3566 Test Case 2: AES-XCBC-MAC-96 with 3-byte input 230s | decode_to_chunk() test_prf_vector: input "0x000102030405060708090a0b0c0d0e0f" 230s | decode_to_chunk() output: 230s | 00 01 02 03 04 05 06 07 08 09 0a 0b 0c 0d 0e 0f ................ 230s | decode_to_chunk() test_prf_vector: input "0x000102" 230s | decode_to_chunk() output: 230s | 00 01 02 ... 230s | decode_to_chunk() test_prf_vector: input "0x5b376580ae2f19afe7219ceef172756f" 230s | decode_to_chunk() output: 230s | 5b 37 65 80 ae 2f 19 af e7 21 9c ee f1 72 75 6f [7e../...!...ruo 230s | PRF chunk interface PRF AES_XCBC init key hunk 0x37d516ad5d0 (length 16) 230s | 00 01 02 03 04 05 06 07 08 09 0a 0b 0c 0d 0e 0f ................ 230s | CONCATENATE_DATA_AND_BASE: 230s | target: EXTRACT_KEY_FROM_KEY 230s | base: base-key@0x37d516aa290 (16-bytes, AES_KEY_GEN) 230s | params: 16-bytes@0x7fffe4c0b510 230s | key-offset: 0, key-size: 16 230s | EXTRACT_KEY_FROM_KEY: 230s | target: EXTRACT_KEY_FROM_KEY 230s | key_size: 16-bytes 230s | base: base-key@0x37d516ad2a0 (32-bytes, EXTRACT_KEY_FROM_KEY) 230s | operation: FLAGS_ONLY 230s | params: 8-bytes@0x7fffe4c0b448 230s | XCBC: Key 16=16 just right 230s | key-offset: 0, key-size: 16 230s | EXTRACT_KEY_FROM_KEY: 230s | target: AES_ECB 230s | flags: SIGN 230s | key_size: 16-bytes 230s | base: base-key@0x37d516ae040 (16-bytes, EXTRACT_KEY_FROM_KEY) 230s | operation: FLAGS_ONLY 230s | params: 8-bytes@0x7fffe4c0b418 230s | PRF chunk interface PRF AES_XCBC 0x37d516aa230 230s | PRF chunk interface PRF AES_XCBC update message (0x37d516abae0 length 3) 230s | 00 01 02 ... 230s | XCBC: data 230s | 00 01 02 ... 230s | K extracting all 16 bytes of key@0x37d516ad2a0 230s | K: symkey-key@0x37d516ad2a0 (16-bytes, AES_ECB) 230s | sizeof bytes 16 230s | wrapper: (SECItemType)-457133016: 66 51 02 58 c1 93 9d 55 1b 09 03 bb 5e 3c b1 07 230s | K extracted len 16 bytes at 0x37d516ad5f0 230s | unwrapped: 230s | 00 01 02 03 04 05 06 07 08 09 0a 0b 0c 0d 0e 0f ................ 230s | XCBC: K: 230s | 00 01 02 03 04 05 06 07 08 09 0a 0b 0c 0d 0e 0f ................ 230s | XCBC: K1 230s | c3 52 80 57 54 23 7f 31 1a c0 ff f4 e3 e0 3e 78 .R.WT#.1......>x 230s | CONCATENATE_DATA_AND_BASE: 230s | target: EXTRACT_KEY_FROM_KEY 230s | base: base-key@0x37d516aa290 (16-bytes, AES_KEY_GEN) 230s | params: 16-bytes@0x7fffe4c0b300 230s | key-offset: 0, key-size: 16 230s | EXTRACT_KEY_FROM_KEY: 230s | target: AES_ECB 230s | flags: SIGN 230s | key_size: 16-bytes 230s | base: base-key@0x37d516abbb0 (32-bytes, EXTRACT_KEY_FROM_KEY) 230s | operation: FLAGS_ONLY 230s | params: 8-bytes@0x7fffe4c0b308 230s | Computing E[1] using K3 230s | XCBC: K3 230s | c1 a7 ab a1 a2 3a 94 06 58 07 a0 8c c8 ee d0 6e .....:..X......n 230s | XCBC: E[n-1] 230s | 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................ 230s | XCBC: M[n] 230s | 00 01 02 ... 230s | XCBC: M[n] 230s | 00 01 02 ... 230s | XCBC: M[n]:80...^E[n-1]^K3 230s | c1 a6 a9 21 a2 3a 94 06 58 07 a0 8c c8 ee d0 6e ...!.:..X......n 230s | XCBC: MAC 230s | 5b 37 65 80 ae 2f 19 af e7 21 9c ee f1 72 75 6f [7e../...!...ruo 230s | PRF chunk interface PRF AES_XCBC final length 16 230s | 5b 37 65 80 ae 2f 19 af e7 21 9c ee f1 72 75 6f [7e../...!...ruo 230s | chunk output 230s | 5b 37 65 80 ae 2f 19 af e7 21 9c ee f1 72 75 6f [7e../...!...ruo 230s | verify_bytes() RFC 3566 Test Case 2: AES-XCBC-MAC-96 with 3-byte input: prf OUT: ok 230s | CONCATENATE_DATA_AND_BASE: 230s | target: EXTRACT_KEY_FROM_KEY 230s | base: base-key@0x37d516aa290 (16-bytes, AES_KEY_GEN) 230s | params: 16-bytes@0x7fffe4c0b600 230s | key-offset: 0, key-size: 16 230s | EXTRACT_KEY_FROM_KEY: 230s | target: EXTRACT_KEY_FROM_KEY 230s | key_size: 16-bytes 230s | base: base-key@0x37d516ae040 (32-bytes, EXTRACT_KEY_FROM_KEY) 230s | operation: FLAGS_ONLY 230s | params: 8-bytes@0x7fffe4c0b538 230s | PRF symkey interface PRF AES_XCBC init key symkey-key@0x37d516ad2a0 (size 16) 230s | PRF symkey interface: key symkey-key@0x37d516ad2a0 (16-bytes, EXTRACT_KEY_FROM_KEY) 230s | XCBC: Key 16=16 just right 230s | key-offset: 0, key-size: 16 230s | EXTRACT_KEY_FROM_KEY: 230s | target: AES_ECB 230s | flags: SIGN 230s | key_size: 16-bytes 230s | base: base-key@0x37d516ad2a0 (16-bytes, EXTRACT_KEY_FROM_KEY) 230s | operation: FLAGS_ONLY 230s | params: 8-bytes@0x7fffe4c0b468 230s | PRF symkey interface PRF AES_XCBC 0x37d516aa230 230s | CONCATENATE_DATA_AND_BASE: 230s | target: EXTRACT_KEY_FROM_KEY 230s | base: base-key@0x37d516aa290 (16-bytes, AES_KEY_GEN) 230s | params: 16-bytes@0x7fffe4c0b600 230s | key-offset: 0, key-size: 3 230s | EXTRACT_KEY_FROM_KEY: 230s | target: EXTRACT_KEY_FROM_KEY 230s | key_size: 3-bytes 230s | base: base-key@0x37d516ae380 (19-bytes, EXTRACT_KEY_FROM_KEY) 230s | operation: FLAGS_ONLY 230s | params: 8-bytes@0x7fffe4c0b538 230s | PRF symkey interface PRF AES_XCBC update symkey message-key@0x37d516abbb0 (size 3) 230s | PRF symkey interface: symkey message-key@0x37d516abbb0 (3-bytes, EXTRACT_KEY_FROM_KEY) 230s | symkey message extracting all 3 bytes of key@0x37d516abbb0 230s | symkey message: symkey-key@0x37d516abbb0 (3-bytes, EXTRACT_KEY_FROM_KEY) 230s | sizeof bytes 16 230s | wrapper: (SECItemType)-457133856: e9 5e 57 29 e5 08 f1 2f 52 0e bd 31 55 3a ac 26 230s | symkey message extracted len 16 bytes at 0x37d516ad5f0 230s | unwrapped: 230s | 00 01 02 00 00 00 00 00 00 00 00 00 00 00 00 00 ................ 230s | XCBC: data 230s | 00 01 02 ... 230s | K extracting all 16 bytes of key@0x37d516ae040 230s | K: symkey-key@0x37d516ae040 (16-bytes, AES_ECB) 230s | sizeof bytes 16 230s | wrapper: siDERCertBuffer: 66 51 02 58 c1 93 9d 55 1b 09 03 bb 5e 3c b1 07 230s | K extracted len 16 bytes at 0x37d516aa160 230s | unwrapped: 230s | 00 01 02 03 04 05 06 07 08 09 0a 0b 0c 0d 0e 0f ................ 230s | XCBC: K: 230s | 00 01 02 03 04 05 06 07 08 09 0a 0b 0c 0d 0e 0f ................ 230s | XCBC: K1 230s | c3 52 80 57 54 23 7f 31 1a c0 ff f4 e3 e0 3e 78 .R.WT#.1......>x 230s | CONCATENATE_DATA_AND_BASE: 230s | target: EXTRACT_KEY_FROM_KEY 230s | base: base-key@0x37d516aa290 (16-bytes, AES_KEY_GEN) 230s | params: 16-bytes@0x7fffe4c0b350 230s | key-offset: 0, key-size: 16 230s | EXTRACT_KEY_FROM_KEY: 230s | target: AES_ECB 230s | flags: SIGN 230s | key_size: 16-bytes 230s | base: base-key@0x37d516ae6e0 (32-bytes, EXTRACT_KEY_FROM_KEY) 230s | operation: FLAGS_ONLY 230s | params: 8-bytes@0x7fffe4c0b358 230s | Computing E[1] using K3 230s | XCBC: K3 230s | c1 a7 ab a1 a2 3a 94 06 58 07 a0 8c c8 ee d0 6e .....:..X......n 230s | XCBC: E[n-1] 230s | 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................ 230s | XCBC: M[n] 230s | 00 01 02 ... 230s | XCBC: M[n] 230s | 00 01 02 ... 230s | XCBC: M[n]:80...^E[n-1]^K3 230s | c1 a6 a9 21 a2 3a 94 06 58 07 a0 8c c8 ee d0 6e ...!.:..X......n 230s | XCBC: MAC 230s | 5b 37 65 80 ae 2f 19 af e7 21 9c ee f1 72 75 6f [7e../...!...ruo 230s | CONCATENATE_DATA_AND_BASE: 230s | target: EXTRACT_KEY_FROM_KEY 230s | base: base-key@0x37d516aa290 (16-bytes, AES_KEY_GEN) 230s | params: 16-bytes@0x7fffe4c0b520 230s | key-offset: 0, key-size: 16 230s | EXTRACT_KEY_FROM_KEY: 230s | target: EXTRACT_KEY_FROM_KEY 230s | key_size: 16-bytes 230s | base: base-key@0x37d516ae6e0 (32-bytes, EXTRACT_KEY_FROM_KEY) 230s | operation: FLAGS_ONLY 230s | params: 8-bytes@0x7fffe4c0b458 230s | PRF symkey interface PRF AES_XCBC final-key@0x37d516ae380 (size 16) 230s | PRF symkey interface: key-key@0x37d516ae380 (16-bytes, EXTRACT_KEY_FROM_KEY) 230s | output: symkey-key@0x37d516ae380 (16-bytes, EXTRACT_KEY_FROM_KEY) 230s | RFC 3566 Test Case 2: AES-XCBC-MAC-96 with 3-byte input extracting all 16 bytes of key@0x37d516ae380 230s | RFC 3566 Test Case 2: AES-XCBC-MAC-96 with 3-byte input: symkey-key@0x37d516ae380 (16-bytes, EXTRACT_KEY_FROM_KEY) 230s | sizeof bytes 16 230s | wrapper: (SECItemType)-457133840: 8d 97 e0 0e 5e c2 10 cc 2a 89 75 91 aa 8d b7 d1 230s | RFC 3566 Test Case 2: AES-XCBC-MAC-96 with 3-byte input extracted len 16 bytes at 0x37d516aa160 230s | unwrapped: 230s | 5b 37 65 80 ae 2f 19 af e7 21 9c ee f1 72 75 6f [7e../...!...ruo 230s | verify_bytes() RFC 3566 Test Case 2: AES-XCBC-MAC-96 with 3-byte input: symkey: ok 230s ipsec algparse: RFC 3566 Test Case 3: AES-XCBC-MAC-96 with 16-byte input 230s | decode_to_chunk() test_prf_vector: input "0x000102030405060708090a0b0c0d0e0f" 230s | decode_to_chunk() output: 230s | 00 01 02 03 04 05 06 07 08 09 0a 0b 0c 0d 0e 0f ................ 230s | decode_to_chunk() test_prf_vector: input "0x000102030405060708090a0b0c0d0e0f" 230s | decode_to_chunk() output: 230s | 00 01 02 03 04 05 06 07 08 09 0a 0b 0c 0d 0e 0f ................ 230s | decode_to_chunk() test_prf_vector: input "0xd2a246fa349b68a79998a4394ff7a263" 230s | decode_to_chunk() output: 230s | d2 a2 46 fa 34 9b 68 a7 99 98 a4 39 4f f7 a2 63 ..F.4.h....9O..c 230s | PRF chunk interface PRF AES_XCBC init key hunk 0x37d516ad5d0 (length 16) 230s | 00 01 02 03 04 05 06 07 08 09 0a 0b 0c 0d 0e 0f ................ 230s | CONCATENATE_DATA_AND_BASE: 230s | target: EXTRACT_KEY_FROM_KEY 230s | base: base-key@0x37d516aa290 (16-bytes, AES_KEY_GEN) 230s | params: 16-bytes@0x7fffe4c0b510 230s | key-offset: 0, key-size: 16 230s | EXTRACT_KEY_FROM_KEY: 230s | target: EXTRACT_KEY_FROM_KEY 230s | key_size: 16-bytes 230s | base: base-key@0x37d516ad2a0 (32-bytes, EXTRACT_KEY_FROM_KEY) 230s | operation: FLAGS_ONLY 230s | params: 8-bytes@0x7fffe4c0b448 230s | XCBC: Key 16=16 just right 230s | key-offset: 0, key-size: 16 230s | EXTRACT_KEY_FROM_KEY: 230s | target: AES_ECB 230s | flags: SIGN 230s | key_size: 16-bytes 230s | base: base-key@0x37d516ae380 (16-bytes, EXTRACT_KEY_FROM_KEY) 230s | operation: FLAGS_ONLY 230s | params: 8-bytes@0x7fffe4c0b418 230s | PRF chunk interface PRF AES_XCBC 0x37d516aa230 230s | PRF chunk interface PRF AES_XCBC update message (0x37d516abae0 length 16) 230s | 00 01 02 03 04 05 06 07 08 09 0a 0b 0c 0d 0e 0f ................ 230s | XCBC: data 230s | 00 01 02 03 04 05 06 07 08 09 0a 0b 0c 0d 0e 0f ................ 230s | K extracting all 16 bytes of key@0x37d516ad2a0 230s | K: symkey-key@0x37d516ad2a0 (16-bytes, AES_ECB) 230s | sizeof bytes 16 230s | wrapper: (SECItemType)-457133016: 66 51 02 58 c1 93 9d 55 1b 09 03 bb 5e 3c b1 07 230s | K extracted len 16 bytes at 0x37d516adeb0 230s | unwrapped: 230s | 00 01 02 03 04 05 06 07 08 09 0a 0b 0c 0d 0e 0f ................ 230s | XCBC: K: 230s | 00 01 02 03 04 05 06 07 08 09 0a 0b 0c 0d 0e 0f ................ 230s | XCBC: K1 230s | c3 52 80 57 54 23 7f 31 1a c0 ff f4 e3 e0 3e 78 .R.WT#.1......>x 230s | CONCATENATE_DATA_AND_BASE: 230s | target: EXTRACT_KEY_FROM_KEY 230s | base: base-key@0x37d516aa290 (16-bytes, AES_KEY_GEN) 230s | params: 16-bytes@0x7fffe4c0b300 230s | key-offset: 0, key-size: 16 230s | EXTRACT_KEY_FROM_KEY: 230s | target: AES_ECB 230s | flags: SIGN 230s | key_size: 16-bytes 230s | base: base-key@0x37d516abbb0 (32-bytes, EXTRACT_KEY_FROM_KEY) 230s | operation: FLAGS_ONLY 230s | params: 8-bytes@0x7fffe4c0b308 230s | XCBC: Computing E[1] using K2 230s | XCBC: K2 230s | bd 86 2f fb 97 ad 2f b8 f8 b8 91 f6 03 2f 36 cb ../.../....../6. 230s | XCBC: E[n-1] 230s | 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................ 230s | XCBC: M[n] 230s | 00 01 02 03 04 05 06 07 08 09 0a 0b 0c 0d 0e 0f ................ 230s | XCBC: M[n]^E[n-1]^K2 230s | bd 87 2d f8 93 a8 29 bf f0 b1 9b fd 0f 22 38 c4 ..-...)......"8. 230s | XCBC: MAC 230s | d2 a2 46 fa 34 9b 68 a7 99 98 a4 39 4f f7 a2 63 ..F.4.h....9O..c 230s | PRF chunk interface PRF AES_XCBC final length 16 230s | d2 a2 46 fa 34 9b 68 a7 99 98 a4 39 4f f7 a2 63 ..F.4.h....9O..c 230s | chunk output 230s | d2 a2 46 fa 34 9b 68 a7 99 98 a4 39 4f f7 a2 63 ..F.4.h....9O..c 230s | verify_bytes() RFC 3566 Test Case 3: AES-XCBC-MAC-96 with 16-byte input: prf OUT: ok 230s | CONCATENATE_DATA_AND_BASE: 230s | target: EXTRACT_KEY_FROM_KEY 230s | base: base-key@0x37d516aa290 (16-bytes, AES_KEY_GEN) 230s | params: 16-bytes@0x7fffe4c0b600 230s | key-offset: 0, key-size: 16 230s | EXTRACT_KEY_FROM_KEY: 230s | target: EXTRACT_KEY_FROM_KEY 230s | key_size: 16-bytes 230s | base: base-key@0x37d516ae380 (32-bytes, EXTRACT_KEY_FROM_KEY) 230s | operation: FLAGS_ONLY 230s | params: 8-bytes@0x7fffe4c0b538 230s | PRF symkey interface PRF AES_XCBC init key symkey-key@0x37d516ad2a0 (size 16) 230s | PRF symkey interface: key symkey-key@0x37d516ad2a0 (16-bytes, EXTRACT_KEY_FROM_KEY) 230s | XCBC: Key 16=16 just right 230s | key-offset: 0, key-size: 16 230s | EXTRACT_KEY_FROM_KEY: 230s | target: AES_ECB 230s | flags: SIGN 230s | key_size: 16-bytes 230s | base: base-key@0x37d516ad2a0 (16-bytes, EXTRACT_KEY_FROM_KEY) 230s | operation: FLAGS_ONLY 230s | params: 8-bytes@0x7fffe4c0b468 230s | PRF symkey interface PRF AES_XCBC 0x37d516aa230 230s | CONCATENATE_DATA_AND_BASE: 230s | target: EXTRACT_KEY_FROM_KEY 230s | base: base-key@0x37d516aa290 (16-bytes, AES_KEY_GEN) 230s | params: 16-bytes@0x7fffe4c0b600 230s | key-offset: 0, key-size: 16 230s | EXTRACT_KEY_FROM_KEY: 230s | target: EXTRACT_KEY_FROM_KEY 230s | key_size: 16-bytes 230s | base: base-key@0x37d516ae040 (32-bytes, EXTRACT_KEY_FROM_KEY) 230s | operation: FLAGS_ONLY 230s | params: 8-bytes@0x7fffe4c0b538 230s | PRF symkey interface PRF AES_XCBC update symkey message-key@0x37d516abbb0 (size 16) 230s | PRF symkey interface: symkey message-key@0x37d516abbb0 (16-bytes, EXTRACT_KEY_FROM_KEY) 230s | symkey message extracting all 16 bytes of key@0x37d516abbb0 230s | symkey message: symkey-key@0x37d516abbb0 (16-bytes, EXTRACT_KEY_FROM_KEY) 230s | sizeof bytes 16 230s | wrapper: (SECItemType)-457133856: 66 51 02 58 c1 93 9d 55 1b 09 03 bb 5e 3c b1 07 230s | symkey message extracted len 16 bytes at 0x37d516adeb0 230s | unwrapped: 230s | 00 01 02 03 04 05 06 07 08 09 0a 0b 0c 0d 0e 0f ................ 230s | XCBC: data 230s | 00 01 02 03 04 05 06 07 08 09 0a 0b 0c 0d 0e 0f ................ 230s | K extracting all 16 bytes of key@0x37d516ae380 230s | K: symkey-key@0x37d516ae380 (16-bytes, AES_ECB) 230s | sizeof bytes 16 230s | wrapper: (SECItemType)16: 66 51 02 58 c1 93 9d 55 1b 09 03 bb 5e 3c b1 07 230s | K extracted len 16 bytes at 0x37d516a9fc0 230s | unwrapped: 230s | 00 01 02 03 04 05 06 07 08 09 0a 0b 0c 0d 0e 0f ................ 230s | XCBC: K: 230s | 00 01 02 03 04 05 06 07 08 09 0a 0b 0c 0d 0e 0f ................ 230s | XCBC: K1 230s | c3 52 80 57 54 23 7f 31 1a c0 ff f4 e3 e0 3e 78 .R.WT#.1......>x 230s | CONCATENATE_DATA_AND_BASE: 230s | target: EXTRACT_KEY_FROM_KEY 230s | base: base-key@0x37d516aa290 (16-bytes, AES_KEY_GEN) 230s | params: 16-bytes@0x7fffe4c0b350 230s | key-offset: 0, key-size: 16 230s | EXTRACT_KEY_FROM_KEY: 230s | target: AES_ECB 230s | flags: SIGN 230s | key_size: 16-bytes 230s | base: base-key@0x37d516ae6e0 (32-bytes, EXTRACT_KEY_FROM_KEY) 230s | operation: FLAGS_ONLY 230s | params: 8-bytes@0x7fffe4c0b358 230s | XCBC: Computing E[1] using K2 230s | XCBC: K2 230s | bd 86 2f fb 97 ad 2f b8 f8 b8 91 f6 03 2f 36 cb ../.../....../6. 230s | XCBC: E[n-1] 230s | 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................ 230s | XCBC: M[n] 230s | 00 01 02 03 04 05 06 07 08 09 0a 0b 0c 0d 0e 0f ................ 230s | XCBC: M[n]^E[n-1]^K2 230s | bd 87 2d f8 93 a8 29 bf f0 b1 9b fd 0f 22 38 c4 ..-...)......"8. 230s | XCBC: MAC 230s | d2 a2 46 fa 34 9b 68 a7 99 98 a4 39 4f f7 a2 63 ..F.4.h....9O..c 230s | CONCATENATE_DATA_AND_BASE: 230s | target: EXTRACT_KEY_FROM_KEY 230s | base: base-key@0x37d516aa290 (16-bytes, AES_KEY_GEN) 230s | params: 16-bytes@0x7fffe4c0b520 230s | key-offset: 0, key-size: 16 230s | EXTRACT_KEY_FROM_KEY: 230s | target: EXTRACT_KEY_FROM_KEY 230s | key_size: 16-bytes 230s | base: base-key@0x37d516ae6e0 (32-bytes, EXTRACT_KEY_FROM_KEY) 230s | operation: FLAGS_ONLY 230s | params: 8-bytes@0x7fffe4c0b458 230s | PRF symkey interface PRF AES_XCBC final-key@0x37d516ae040 (size 16) 230s | PRF symkey interface: key-key@0x37d516ae040 (16-bytes, EXTRACT_KEY_FROM_KEY) 230s | output: symkey-key@0x37d516ae040 (16-bytes, EXTRACT_KEY_FROM_KEY) 230s | RFC 3566 Test Case 3: AES-XCBC-MAC-96 with 16-byte input extracting all 16 bytes of key@0x37d516ae040 230s | RFC 3566 Test Case 3: AES-XCBC-MAC-96 with 16-byte input: symkey-key@0x37d516ae040 (16-bytes, EXTRACT_KEY_FROM_KEY) 230s | sizeof bytes 16 230s | wrapper: (SECItemType)-457133840: 00 b4 98 b3 2e c3 ac 2d 71 d0 ca 2b 7a a8 d4 59 230s | RFC 3566 Test Case 3: AES-XCBC-MAC-96 with 16-byte input extracted len 16 bytes at 0x37d516a9fc0 230s | unwrapped: 230s | d2 a2 46 fa 34 9b 68 a7 99 98 a4 39 4f f7 a2 63 ..F.4.h....9O..c 230s | verify_bytes() RFC 3566 Test Case 3: AES-XCBC-MAC-96 with 16-byte input: symkey: ok 230s ipsec algparse: RFC 3566 Test Case 4: AES-XCBC-MAC-96 with 20-byte input 230s | decode_to_chunk() test_prf_vector: input "0x000102030405060708090a0b0c0d0e0f" 230s | decode_to_chunk() output: 230s | 00 01 02 03 04 05 06 07 08 09 0a 0b 0c 0d 0e 0f ................ 230s | decode_to_chunk() test_prf_vector: input "0x000102030405060708090a0b0c0d0e0f10111213" 230s | decode_to_chunk() output: 230s | 00 01 02 03 04 05 06 07 08 09 0a 0b 0c 0d 0e 0f ................ 230s | 10 11 12 13 .... 230s | decode_to_chunk() test_prf_vector: input "0x47f51b4564966215b8985c63055ed308" 230s | decode_to_chunk() output: 230s | 47 f5 1b 45 64 96 62 15 b8 98 5c 63 05 5e d3 08 G..Ed.b...\c.^.. 230s | PRF chunk interface PRF AES_XCBC init key hunk 0x37d516ad5d0 (length 16) 230s | 00 01 02 03 04 05 06 07 08 09 0a 0b 0c 0d 0e 0f ................ 230s | CONCATENATE_DATA_AND_BASE: 230s | target: EXTRACT_KEY_FROM_KEY 230s | base: base-key@0x37d516aa290 (16-bytes, AES_KEY_GEN) 230s | params: 16-bytes@0x7fffe4c0b510 230s | key-offset: 0, key-size: 16 230s | EXTRACT_KEY_FROM_KEY: 230s | target: EXTRACT_KEY_FROM_KEY 230s | key_size: 16-bytes 230s | base: base-key@0x37d516ad2a0 (32-bytes, EXTRACT_KEY_FROM_KEY) 230s | operation: FLAGS_ONLY 230s | params: 8-bytes@0x7fffe4c0b448 230s | XCBC: Key 16=16 just right 230s | key-offset: 0, key-size: 16 230s | EXTRACT_KEY_FROM_KEY: 230s | target: AES_ECB 230s | flags: SIGN 230s | key_size: 16-bytes 230s | base: base-key@0x37d516ae040 (16-bytes, EXTRACT_KEY_FROM_KEY) 230s | operation: FLAGS_ONLY 230s | params: 8-bytes@0x7fffe4c0b418 230s | PRF chunk interface PRF AES_XCBC 0x37d516aa230 230s | PRF chunk interface PRF AES_XCBC update message (0x37d516abae0 length 20) 230s | 00 01 02 03 04 05 06 07 08 09 0a 0b 0c 0d 0e 0f ................ 230s | 10 11 12 13 .... 230s | XCBC: data 230s | 00 01 02 03 04 05 06 07 08 09 0a 0b 0c 0d 0e 0f ................ 230s | 10 11 12 13 .... 230s | K extracting all 16 bytes of key@0x37d516ad2a0 230s | K: symkey-key@0x37d516ad2a0 (16-bytes, AES_ECB) 230s | sizeof bytes 16 230s | wrapper: (SECItemType)-457133016: 66 51 02 58 c1 93 9d 55 1b 09 03 bb 5e 3c b1 07 230s | K extracted len 16 bytes at 0x37d516aea20 230s | unwrapped: 230s | 00 01 02 03 04 05 06 07 08 09 0a 0b 0c 0d 0e 0f ................ 230s | XCBC: K: 230s | 00 01 02 03 04 05 06 07 08 09 0a 0b 0c 0d 0e 0f ................ 230s | XCBC: K1 230s | c3 52 80 57 54 23 7f 31 1a c0 ff f4 e3 e0 3e 78 .R.WT#.1......>x 230s | CONCATENATE_DATA_AND_BASE: 230s | target: EXTRACT_KEY_FROM_KEY 230s | base: base-key@0x37d516aa290 (16-bytes, AES_KEY_GEN) 230s | params: 16-bytes@0x7fffe4c0b300 230s | key-offset: 0, key-size: 16 230s | EXTRACT_KEY_FROM_KEY: 230s | target: AES_ECB 230s | flags: SIGN 230s | key_size: 16-bytes 230s | base: base-key@0x37d516abbb0 (32-bytes, EXTRACT_KEY_FROM_KEY) 230s | operation: FLAGS_ONLY 230s | params: 8-bytes@0x7fffe4c0b308 230s | Computing E[2] using K3 230s | XCBC: K3 230s | c1 a7 ab a1 a2 3a 94 06 58 07 a0 8c c8 ee d0 6e .....:..X......n 230s | XCBC: E[n-1] 230s | 1d 04 48 fa cf 4d 9c 6f 55 b9 93 da 09 80 3d b3 ..H..M.oU.....=. 230s | XCBC: M[n] 230s | 10 11 12 13 .... 230s | XCBC: M[n] 230s | 10 11 12 13 .... 230s | XCBC: M[n]:80...^E[n-1]^K3 230s | cc b2 f1 48 ed 77 08 69 0d be 33 56 c1 6e ed dd ...H.w.i..3V.n.. 230s | XCBC: MAC 230s | 47 f5 1b 45 64 96 62 15 b8 98 5c 63 05 5e d3 08 G..Ed.b...\c.^.. 230s | PRF chunk interface PRF AES_XCBC final length 16 230s | 47 f5 1b 45 64 96 62 15 b8 98 5c 63 05 5e d3 08 G..Ed.b...\c.^.. 230s | chunk output 230s | 47 f5 1b 45 64 96 62 15 b8 98 5c 63 05 5e d3 08 G..Ed.b...\c.^.. 230s | verify_bytes() RFC 3566 Test Case 4: AES-XCBC-MAC-96 with 20-byte input: prf OUT: ok 230s | CONCATENATE_DATA_AND_BASE: 230s | target: EXTRACT_KEY_FROM_KEY 230s | base: base-key@0x37d516aa290 (16-bytes, AES_KEY_GEN) 230s | params: 16-bytes@0x7fffe4c0b600 230s | key-offset: 0, key-size: 16 230s | EXTRACT_KEY_FROM_KEY: 230s | target: EXTRACT_KEY_FROM_KEY 230s | key_size: 16-bytes 230s | base: base-key@0x37d516ae040 (32-bytes, EXTRACT_KEY_FROM_KEY) 230s | operation: FLAGS_ONLY 230s | params: 8-bytes@0x7fffe4c0b538 230s | PRF symkey interface PRF AES_XCBC init key symkey-key@0x37d516ad2a0 (size 16) 230s | PRF symkey interface: key symkey-key@0x37d516ad2a0 (16-bytes, EXTRACT_KEY_FROM_KEY) 230s | XCBC: Key 16=16 just right 230s | key-offset: 0, key-size: 16 230s | EXTRACT_KEY_FROM_KEY: 230s | target: AES_ECB 230s | flags: SIGN 230s | key_size: 16-bytes 230s | base: base-key@0x37d516ad2a0 (16-bytes, EXTRACT_KEY_FROM_KEY) 230s | operation: FLAGS_ONLY 230s | params: 8-bytes@0x7fffe4c0b468 230s | PRF symkey interface PRF AES_XCBC 0x37d516aa230 230s | CONCATENATE_DATA_AND_BASE: 230s | target: EXTRACT_KEY_FROM_KEY 230s | base: base-key@0x37d516aa290 (16-bytes, AES_KEY_GEN) 230s | params: 16-bytes@0x7fffe4c0b600 230s | key-offset: 0, key-size: 20 230s | EXTRACT_KEY_FROM_KEY: 230s | target: EXTRACT_KEY_FROM_KEY 230s | key_size: 20-bytes 230s | base: base-key@0x37d516ae380 (36-bytes, EXTRACT_KEY_FROM_KEY) 230s | operation: FLAGS_ONLY 230s | params: 8-bytes@0x7fffe4c0b538 230s | PRF symkey interface PRF AES_XCBC update symkey message-key@0x37d516abbb0 (size 20) 230s | PRF symkey interface: symkey message-key@0x37d516abbb0 (20-bytes, EXTRACT_KEY_FROM_KEY) 230s | symkey message extracting all 20 bytes of key@0x37d516abbb0 230s | symkey message: symkey-key@0x37d516abbb0 (20-bytes, EXTRACT_KEY_FROM_KEY) 230s | sizeof bytes 32 230s | wrapper: (SECItemType)-457133856: 66 51 02 58 c1 93 9d 55 1b 09 03 bb 5e 3c b1 07 72 c1 ca a3 e9 f0 3c f8 58 74 33 2b 95 41 1d af 230s | symkey message extracted len 32 bytes at 0x37d516adc20 230s | unwrapped: 230s | 00 01 02 03 04 05 06 07 08 09 0a 0b 0c 0d 0e 0f ................ 230s | 10 11 12 13 00 00 00 00 00 00 00 00 00 00 00 00 ................ 230s | XCBC: data 230s | 00 01 02 03 04 05 06 07 08 09 0a 0b 0c 0d 0e 0f ................ 230s | 10 11 12 13 .... 230s | K extracting all 16 bytes of key@0x37d516ae040 230s | K: symkey-key@0x37d516ae040 (16-bytes, AES_ECB) 230s | sizeof bytes 16 230s | wrapper: (SECItemType)20: 66 51 02 58 c1 93 9d 55 1b 09 03 bb 5e 3c b1 07 230s | K extracted len 16 bytes at 0x37d516aa160 230s | unwrapped: 230s | 00 01 02 03 04 05 06 07 08 09 0a 0b 0c 0d 0e 0f ................ 230s | XCBC: K: 230s | 00 01 02 03 04 05 06 07 08 09 0a 0b 0c 0d 0e 0f ................ 230s | XCBC: K1 230s | c3 52 80 57 54 23 7f 31 1a c0 ff f4 e3 e0 3e 78 .R.WT#.1......>x 230s | CONCATENATE_DATA_AND_BASE: 230s | target: EXTRACT_KEY_FROM_KEY 230s | base: base-key@0x37d516aa290 (16-bytes, AES_KEY_GEN) 230s | params: 16-bytes@0x7fffe4c0b350 230s | key-offset: 0, key-size: 16 230s | EXTRACT_KEY_FROM_KEY: 230s | target: AES_ECB 230s | flags: SIGN 230s | key_size: 16-bytes 230s | base: base-key@0x37d516ae6e0 (32-bytes, EXTRACT_KEY_FROM_KEY) 230s | operation: FLAGS_ONLY 230s | params: 8-bytes@0x7fffe4c0b358 230s | Computing E[2] using K3 230s | XCBC: K3 230s | c1 a7 ab a1 a2 3a 94 06 58 07 a0 8c c8 ee d0 6e .....:..X......n 230s | XCBC: E[n-1] 230s | 1d 04 48 fa cf 4d 9c 6f 55 b9 93 da 09 80 3d b3 ..H..M.oU.....=. 230s | XCBC: M[n] 230s | 10 11 12 13 .... 230s | XCBC: M[n] 230s | 10 11 12 13 .... 230s | XCBC: M[n]:80...^E[n-1]^K3 230s | cc b2 f1 48 ed 77 08 69 0d be 33 56 c1 6e ed dd ...H.w.i..3V.n.. 230s | XCBC: MAC 230s | 47 f5 1b 45 64 96 62 15 b8 98 5c 63 05 5e d3 08 G..Ed.b...\c.^.. 230s | CONCATENATE_DATA_AND_BASE: 230s | target: EXTRACT_KEY_FROM_KEY 230s | base: base-key@0x37d516aa290 (16-bytes, AES_KEY_GEN) 230s | params: 16-bytes@0x7fffe4c0b520 230s | key-offset: 0, key-size: 16 230s | EXTRACT_KEY_FROM_KEY: 230s | target: EXTRACT_KEY_FROM_KEY 230s | key_size: 16-bytes 230s | base: base-key@0x37d516ae6e0 (32-bytes, EXTRACT_KEY_FROM_KEY) 230s | operation: FLAGS_ONLY 230s | params: 8-bytes@0x7fffe4c0b458 230s | PRF symkey interface PRF AES_XCBC final-key@0x37d516ae380 (size 16) 230s | PRF symkey interface: key-key@0x37d516ae380 (16-bytes, EXTRACT_KEY_FROM_KEY) 230s | output: symkey-key@0x37d516ae380 (16-bytes, EXTRACT_KEY_FROM_KEY) 230s | RFC 3566 Test Case 4: AES-XCBC-MAC-96 with 20-byte input extracting all 16 bytes of key@0x37d516ae380 230s | RFC 3566 Test Case 4: AES-XCBC-MAC-96 with 20-byte input: symkey-key@0x37d516ae380 (16-bytes, EXTRACT_KEY_FROM_KEY) 230s | sizeof bytes 16 230s | wrapper: (SECItemType)-457133840: 4b 6f 0d f9 36 d3 0b 33 95 4f 85 eb e3 1c 54 70 230s | RFC 3566 Test Case 4: AES-XCBC-MAC-96 with 20-byte input extracted len 16 bytes at 0x37d516aa160 230s | unwrapped: 230s | 47 f5 1b 45 64 96 62 15 b8 98 5c 63 05 5e d3 08 G..Ed.b...\c.^.. 230s | verify_bytes() RFC 3566 Test Case 4: AES-XCBC-MAC-96 with 20-byte input: symkey: ok 230s ipsec algparse: RFC 3566 Test Case 5: AES-XCBC-MAC-96 with 32-byte input 230s | decode_to_chunk() test_prf_vector: input "0x000102030405060708090a0b0c0d0e0f" 230s | decode_to_chunk() output: 230s | 00 01 02 03 04 05 06 07 08 09 0a 0b 0c 0d 0e 0f ................ 230s | decode_to_chunk() test_prf_vector: input "0x000102030405060708090a0b0c0d0e0f101112131415161718191a1b1c1d1e1f" 230s | decode_to_chunk() output: 230s | 00 01 02 03 04 05 06 07 08 09 0a 0b 0c 0d 0e 0f ................ 230s | 10 11 12 13 14 15 16 17 18 19 1a 1b 1c 1d 1e 1f ................ 230s | decode_to_chunk() test_prf_vector: input "0xf54f0ec8d2b9f3d36807734bd5283fd4" 230s | decode_to_chunk() output: 230s | f5 4f 0e c8 d2 b9 f3 d3 68 07 73 4b d5 28 3f d4 .O......h.sK.(?. 230s | PRF chunk interface PRF AES_XCBC init key hunk 0x37d516ad5d0 (length 16) 230s | 00 01 02 03 04 05 06 07 08 09 0a 0b 0c 0d 0e 0f ................ 230s | CONCATENATE_DATA_AND_BASE: 230s | target: EXTRACT_KEY_FROM_KEY 230s | base: base-key@0x37d516aa290 (16-bytes, AES_KEY_GEN) 230s | params: 16-bytes@0x7fffe4c0b510 230s | key-offset: 0, key-size: 16 230s | EXTRACT_KEY_FROM_KEY: 230s | target: EXTRACT_KEY_FROM_KEY 230s | key_size: 16-bytes 230s | base: base-key@0x37d516ad2a0 (32-bytes, EXTRACT_KEY_FROM_KEY) 230s | operation: FLAGS_ONLY 230s | params: 8-bytes@0x7fffe4c0b448 230s | XCBC: Key 16=16 just right 230s | key-offset: 0, key-size: 16 230s | EXTRACT_KEY_FROM_KEY: 230s | target: AES_ECB 230s | flags: SIGN 230s | key_size: 16-bytes 230s | base: base-key@0x37d516ae380 (16-bytes, EXTRACT_KEY_FROM_KEY) 230s | operation: FLAGS_ONLY 230s | params: 8-bytes@0x7fffe4c0b418 230s | PRF chunk interface PRF AES_XCBC 0x37d516adc20 230s | PRF chunk interface PRF AES_XCBC update message (0x37d516aa230 length 32) 230s | 00 01 02 03 04 05 06 07 08 09 0a 0b 0c 0d 0e 0f ................ 230s | 10 11 12 13 14 15 16 17 18 19 1a 1b 1c 1d 1e 1f ................ 230s | XCBC: data 230s | 00 01 02 03 04 05 06 07 08 09 0a 0b 0c 0d 0e 0f ................ 230s | 10 11 12 13 14 15 16 17 18 19 1a 1b 1c 1d 1e 1f ................ 230s | K extracting all 16 bytes of key@0x37d516ad2a0 230s | K: symkey-key@0x37d516ad2a0 (16-bytes, AES_ECB) 230s | sizeof bytes 16 230s | wrapper: (SECItemType)-457133016: 66 51 02 58 c1 93 9d 55 1b 09 03 bb 5e 3c b1 07 230s | K extracted len 16 bytes at 0x37d516ad8e0 230s | unwrapped: 230s | 00 01 02 03 04 05 06 07 08 09 0a 0b 0c 0d 0e 0f ................ 230s | XCBC: K: 230s | 00 01 02 03 04 05 06 07 08 09 0a 0b 0c 0d 0e 0f ................ 230s | XCBC: K1 230s | c3 52 80 57 54 23 7f 31 1a c0 ff f4 e3 e0 3e 78 .R.WT#.1......>x 230s | CONCATENATE_DATA_AND_BASE: 230s | target: EXTRACT_KEY_FROM_KEY 230s | base: base-key@0x37d516aa290 (16-bytes, AES_KEY_GEN) 230s | params: 16-bytes@0x7fffe4c0b300 230s | key-offset: 0, key-size: 16 230s | EXTRACT_KEY_FROM_KEY: 230s | target: AES_ECB 230s | flags: SIGN 230s | key_size: 16-bytes 230s | base: base-key@0x37d516abbb0 (32-bytes, EXTRACT_KEY_FROM_KEY) 230s | operation: FLAGS_ONLY 230s | params: 8-bytes@0x7fffe4c0b308 230s | XCBC: Computing E[2] using K2 230s | XCBC: K2 230s | bd 86 2f fb 97 ad 2f b8 f8 b8 91 f6 03 2f 36 cb ../.../....../6. 230s | XCBC: E[n-1] 230s | 1d 04 48 fa cf 4d 9c 6f 55 b9 93 da 09 80 3d b3 ..H..M.oU.....=. 230s | XCBC: M[n] 230s | 10 11 12 13 14 15 16 17 18 19 1a 1b 1c 1d 1e 1f ................ 230s | XCBC: M[n]^E[n-1]^K2 230s | b0 93 75 12 4c f5 a5 c0 b5 18 18 37 16 b2 15 67 ..u.L......7...g 230s | XCBC: MAC 230s | f5 4f 0e c8 d2 b9 f3 d3 68 07 73 4b d5 28 3f d4 .O......h.sK.(?. 230s | PRF chunk interface PRF AES_XCBC final length 16 230s | f5 4f 0e c8 d2 b9 f3 d3 68 07 73 4b d5 28 3f d4 .O......h.sK.(?. 230s | chunk output 230s | f5 4f 0e c8 d2 b9 f3 d3 68 07 73 4b d5 28 3f d4 .O......h.sK.(?. 230s | verify_bytes() RFC 3566 Test Case 5: AES-XCBC-MAC-96 with 32-byte input: prf OUT: ok 230s | CONCATENATE_DATA_AND_BASE: 230s | target: EXTRACT_KEY_FROM_KEY 230s | base: base-key@0x37d516aa290 (16-bytes, AES_KEY_GEN) 230s | params: 16-bytes@0x7fffe4c0b600 230s | key-offset: 0, key-size: 16 230s | EXTRACT_KEY_FROM_KEY: 230s | target: EXTRACT_KEY_FROM_KEY 230s | key_size: 16-bytes 230s | base: base-key@0x37d516ae380 (32-bytes, EXTRACT_KEY_FROM_KEY) 230s | operation: FLAGS_ONLY 230s | params: 8-bytes@0x7fffe4c0b538 230s | PRF symkey interface PRF AES_XCBC init key symkey-key@0x37d516ad2a0 (size 16) 230s | PRF symkey interface: key symkey-key@0x37d516ad2a0 (16-bytes, EXTRACT_KEY_FROM_KEY) 230s | XCBC: Key 16=16 just right 230s | key-offset: 0, key-size: 16 230s | EXTRACT_KEY_FROM_KEY: 230s | target: AES_ECB 230s | flags: SIGN 230s | key_size: 16-bytes 230s | base: base-key@0x37d516ad2a0 (16-bytes, EXTRACT_KEY_FROM_KEY) 230s | operation: FLAGS_ONLY 230s | params: 8-bytes@0x7fffe4c0b468 230s | PRF symkey interface PRF AES_XCBC 0x37d516adc20 230s | CONCATENATE_DATA_AND_BASE: 230s | target: EXTRACT_KEY_FROM_KEY 230s | base: base-key@0x37d516aa290 (16-bytes, AES_KEY_GEN) 230s | params: 16-bytes@0x7fffe4c0b600 230s | key-offset: 0, key-size: 32 230s | EXTRACT_KEY_FROM_KEY: 230s | target: EXTRACT_KEY_FROM_KEY 230s | key_size: 32-bytes 230s | base: base-key@0x37d516ae040 (48-bytes, EXTRACT_KEY_FROM_KEY) 230s | operation: FLAGS_ONLY 230s | params: 8-bytes@0x7fffe4c0b538 230s | PRF symkey interface PRF AES_XCBC update symkey message-key@0x37d516abbb0 (size 32) 230s | PRF symkey interface: symkey message-key@0x37d516abbb0 (32-bytes, EXTRACT_KEY_FROM_KEY) 230s | symkey message extracting all 32 bytes of key@0x37d516abbb0 230s | symkey message: symkey-key@0x37d516abbb0 (32-bytes, EXTRACT_KEY_FROM_KEY) 230s | sizeof bytes 32 230s | wrapper: (SECItemType)-457133856: 66 51 02 58 c1 93 9d 55 1b 09 03 bb 5e 3c b1 07 ab f5 ad 8e 6b 1c 24 c2 a7 08 60 20 1d 6a a4 fe 230s | symkey message extracted len 32 bytes at 0x37d516ae9a0 230s | unwrapped: 230s | 00 01 02 03 04 05 06 07 08 09 0a 0b 0c 0d 0e 0f ................ 230s | 10 11 12 13 14 15 16 17 18 19 1a 1b 1c 1d 1e 1f ................ 230s | XCBC: data 230s | 00 01 02 03 04 05 06 07 08 09 0a 0b 0c 0d 0e 0f ................ 230s | 10 11 12 13 14 15 16 17 18 19 1a 1b 1c 1d 1e 1f ................ 230s | K extracting all 16 bytes of key@0x37d516ae380 230s | K: symkey-key@0x37d516ae380 (16-bytes, AES_ECB) 230s | sizeof bytes 16 230s | wrapper: (SECItemType)32: 66 51 02 58 c1 93 9d 55 1b 09 03 bb 5e 3c b1 07 230s | K extracted len 16 bytes at 0x37d516ad5f0 230s | unwrapped: 230s | 00 01 02 03 04 05 06 07 08 09 0a 0b 0c 0d 0e 0f ................ 230s | XCBC: K: 230s | 00 01 02 03 04 05 06 07 08 09 0a 0b 0c 0d 0e 0f ................ 230s | XCBC: K1 230s | c3 52 80 57 54 23 7f 31 1a c0 ff f4 e3 e0 3e 78 .R.WT#.1......>x 230s | CONCATENATE_DATA_AND_BASE: 230s | target: EXTRACT_KEY_FROM_KEY 230s | base: base-key@0x37d516aa290 (16-bytes, AES_KEY_GEN) 230s | params: 16-bytes@0x7fffe4c0b350 230s | key-offset: 0, key-size: 16 230s | EXTRACT_KEY_FROM_KEY: 230s | target: AES_ECB 230s | flags: SIGN 230s | key_size: 16-bytes 230s | base: base-key@0x37d516ae6e0 (32-bytes, EXTRACT_KEY_FROM_KEY) 230s | operation: FLAGS_ONLY 230s | params: 8-bytes@0x7fffe4c0b358 230s | XCBC: Computing E[2] using K2 230s | XCBC: K2 230s | bd 86 2f fb 97 ad 2f b8 f8 b8 91 f6 03 2f 36 cb ../.../....../6. 230s | XCBC: E[n-1] 230s | 1d 04 48 fa cf 4d 9c 6f 55 b9 93 da 09 80 3d b3 ..H..M.oU.....=. 230s | XCBC: M[n] 230s | 10 11 12 13 14 15 16 17 18 19 1a 1b 1c 1d 1e 1f ................ 230s | XCBC: M[n]^E[n-1]^K2 230s | b0 93 75 12 4c f5 a5 c0 b5 18 18 37 16 b2 15 67 ..u.L......7...g 230s | XCBC: MAC 230s | f5 4f 0e c8 d2 b9 f3 d3 68 07 73 4b d5 28 3f d4 .O......h.sK.(?. 230s | CONCATENATE_DATA_AND_BASE: 230s | target: EXTRACT_KEY_FROM_KEY 230s | base: base-key@0x37d516aa290 (16-bytes, AES_KEY_GEN) 230s | params: 16-bytes@0x7fffe4c0b520 230s | key-offset: 0, key-size: 16 230s | EXTRACT_KEY_FROM_KEY: 230s | target: EXTRACT_KEY_FROM_KEY 230s | key_size: 16-bytes 230s | base: base-key@0x37d516ae6e0 (32-bytes, EXTRACT_KEY_FROM_KEY) 230s | operation: FLAGS_ONLY 230s | params: 8-bytes@0x7fffe4c0b458 230s | PRF symkey interface PRF AES_XCBC final-key@0x37d516ae040 (size 16) 230s | PRF symkey interface: key-key@0x37d516ae040 (16-bytes, EXTRACT_KEY_FROM_KEY) 230s | output: symkey-key@0x37d516ae040 (16-bytes, EXTRACT_KEY_FROM_KEY) 230s | RFC 3566 Test Case 5: AES-XCBC-MAC-96 with 32-byte input extracting all 16 bytes of key@0x37d516ae040 230s | RFC 3566 Test Case 5: AES-XCBC-MAC-96 with 32-byte input: symkey-key@0x37d516ae040 (16-bytes, EXTRACT_KEY_FROM_KEY) 230s | sizeof bytes 16 230s | wrapper: (SECItemType)-457133840: ad 6f cb d5 4f 0b 93 18 b8 76 0c 86 2c 20 49 16 230s | RFC 3566 Test Case 5: AES-XCBC-MAC-96 with 32-byte input extracted len 16 bytes at 0x37d516adeb0 230s | unwrapped: 230s | f5 4f 0e c8 d2 b9 f3 d3 68 07 73 4b d5 28 3f d4 .O......h.sK.(?. 230s | verify_bytes() RFC 3566 Test Case 5: AES-XCBC-MAC-96 with 32-byte input: symkey: ok 230s ipsec algparse: RFC 3566 Test Case 6: AES-XCBC-MAC-96 with 34-byte input 230s | decode_to_chunk() test_prf_vector: input "0x000102030405060708090a0b0c0d0e0f" 230s | decode_to_chunk() output: 230s | 00 01 02 03 04 05 06 07 08 09 0a 0b 0c 0d 0e 0f ................ 230s | decode_to_chunk() test_prf_vector: input "0x000102030405060708090a0b0c0d0e0f101112131415161718191a1b1c1d1e1f2021" 230s | decode_to_chunk() output: 230s | 00 01 02 03 04 05 06 07 08 09 0a 0b 0c 0d 0e 0f ................ 230s | 10 11 12 13 14 15 16 17 18 19 1a 1b 1c 1d 1e 1f ................ 230s | 20 21 ! 230s | decode_to_chunk() test_prf_vector: input "0xbecbb3bccdb518a30677d5481fb6b4d8" 230s | decode_to_chunk() output: 230s | be cb b3 bc cd b5 18 a3 06 77 d5 48 1f b6 b4 d8 .........w.H.... 230s | PRF chunk interface PRF AES_XCBC init key hunk 0x37d516abae0 (length 16) 230s | 00 01 02 03 04 05 06 07 08 09 0a 0b 0c 0d 0e 0f ................ 230s | CONCATENATE_DATA_AND_BASE: 230s | target: EXTRACT_KEY_FROM_KEY 230s | base: base-key@0x37d516aa290 (16-bytes, AES_KEY_GEN) 230s | params: 16-bytes@0x7fffe4c0b510 230s | key-offset: 0, key-size: 16 230s | EXTRACT_KEY_FROM_KEY: 230s | target: EXTRACT_KEY_FROM_KEY 230s | key_size: 16-bytes 230s | base: base-key@0x37d516ad2a0 (32-bytes, EXTRACT_KEY_FROM_KEY) 230s | operation: FLAGS_ONLY 230s | params: 8-bytes@0x7fffe4c0b448 230s | XCBC: Key 16=16 just right 230s | key-offset: 0, key-size: 16 230s | EXTRACT_KEY_FROM_KEY: 230s | target: AES_ECB 230s | flags: SIGN 230s | key_size: 16-bytes 230s | base: base-key@0x37d516ae040 (16-bytes, EXTRACT_KEY_FROM_KEY) 230s | operation: FLAGS_ONLY 230s | params: 8-bytes@0x7fffe4c0b418 230s | PRF chunk interface PRF AES_XCBC 0x37d516aa230 230s | PRF chunk interface PRF AES_XCBC update message (0x37d516aa260 length 34) 230s | 00 01 02 03 04 05 06 07 08 09 0a 0b 0c 0d 0e 0f ................ 230s | 10 11 12 13 14 15 16 17 18 19 1a 1b 1c 1d 1e 1f ................ 230s | 20 21 ! 230s | XCBC: data 230s | 00 01 02 03 04 05 06 07 08 09 0a 0b 0c 0d 0e 0f ................ 230s | 10 11 12 13 14 15 16 17 18 19 1a 1b 1c 1d 1e 1f ................ 230s | 20 21 ! 230s | K extracting all 16 bytes of key@0x37d516ad2a0 230s | K: symkey-key@0x37d516ad2a0 (16-bytes, AES_ECB) 230s | sizeof bytes 16 230s | wrapper: (SECItemType)-457133016: 66 51 02 58 c1 93 9d 55 1b 09 03 bb 5e 3c b1 07 230s | K extracted len 16 bytes at 0x37d516ad5f0 230s | unwrapped: 230s | 00 01 02 03 04 05 06 07 08 09 0a 0b 0c 0d 0e 0f ................ 230s | XCBC: K: 230s | 00 01 02 03 04 05 06 07 08 09 0a 0b 0c 0d 0e 0f ................ 230s | XCBC: K1 230s | c3 52 80 57 54 23 7f 31 1a c0 ff f4 e3 e0 3e 78 .R.WT#.1......>x 230s | CONCATENATE_DATA_AND_BASE: 230s | target: EXTRACT_KEY_FROM_KEY 230s | base: base-key@0x37d516aa290 (16-bytes, AES_KEY_GEN) 230s | params: 16-bytes@0x7fffe4c0b300 230s | key-offset: 0, key-size: 16 230s | EXTRACT_KEY_FROM_KEY: 230s | target: AES_ECB 230s | flags: SIGN 230s | key_size: 16-bytes 230s | base: base-key@0x37d516abbb0 (32-bytes, EXTRACT_KEY_FROM_KEY) 230s | operation: FLAGS_ONLY 230s | params: 8-bytes@0x7fffe4c0b308 230s | Computing E[3] using K3 230s | XCBC: K3 230s | c1 a7 ab a1 a2 3a 94 06 58 07 a0 8c c8 ee d0 6e .....:..X......n 230s | XCBC: E[n-1] 230s | 09 02 5e 5a 67 25 20 72 44 14 5c 6b 80 66 85 79 ..^Zg% rD.\k.f.y 230s | XCBC: M[n] 230s | 20 21 ! 230s | XCBC: M[n] 230s | 20 21 ! 230s | XCBC: M[n]:80...^E[n-1]^K3 230s | e8 84 75 fb c5 1f b4 74 1c 13 fc e7 48 88 55 17 ..u....t....H.U. 230s | XCBC: MAC 230s | be cb b3 bc cd b5 18 a3 06 77 d5 48 1f b6 b4 d8 .........w.H.... 230s | PRF chunk interface PRF AES_XCBC final length 16 230s | be cb b3 bc cd b5 18 a3 06 77 d5 48 1f b6 b4 d8 .........w.H.... 230s | chunk output 230s | be cb b3 bc cd b5 18 a3 06 77 d5 48 1f b6 b4 d8 .........w.H.... 230s | verify_bytes() RFC 3566 Test Case 6: AES-XCBC-MAC-96 with 34-byte input: prf OUT: ok 230s | CONCATENATE_DATA_AND_BASE: 230s | target: EXTRACT_KEY_FROM_KEY 230s | base: base-key@0x37d516aa290 (16-bytes, AES_KEY_GEN) 230s | params: 16-bytes@0x7fffe4c0b600 230s | key-offset: 0, key-size: 16 230s | EXTRACT_KEY_FROM_KEY: 230s | target: EXTRACT_KEY_FROM_KEY 230s | key_size: 16-bytes 230s | base: base-key@0x37d516ae040 (32-bytes, EXTRACT_KEY_FROM_KEY) 230s | operation: FLAGS_ONLY 230s | params: 8-bytes@0x7fffe4c0b538 230s | PRF symkey interface PRF AES_XCBC init key symkey-key@0x37d516ad2a0 (size 16) 230s | PRF symkey interface: key symkey-key@0x37d516ad2a0 (16-bytes, EXTRACT_KEY_FROM_KEY) 230s | XCBC: Key 16=16 just right 230s | key-offset: 0, key-size: 16 230s | EXTRACT_KEY_FROM_KEY: 230s | target: AES_ECB 230s | flags: SIGN 230s | key_size: 16-bytes 230s | base: base-key@0x37d516ad2a0 (16-bytes, EXTRACT_KEY_FROM_KEY) 230s | operation: FLAGS_ONLY 230s | params: 8-bytes@0x7fffe4c0b468 230s | PRF symkey interface PRF AES_XCBC 0x37d516aa230 230s | CONCATENATE_DATA_AND_BASE: 230s | target: EXTRACT_KEY_FROM_KEY 230s | base: base-key@0x37d516aa290 (16-bytes, AES_KEY_GEN) 230s | params: 16-bytes@0x7fffe4c0b600 230s | key-offset: 0, key-size: 34 230s | EXTRACT_KEY_FROM_KEY: 230s | target: EXTRACT_KEY_FROM_KEY 230s | key_size: 34-bytes 230s | base: base-key@0x37d516ae380 (50-bytes, EXTRACT_KEY_FROM_KEY) 230s | operation: FLAGS_ONLY 230s | params: 8-bytes@0x7fffe4c0b538 230s | PRF symkey interface PRF AES_XCBC update symkey message-key@0x37d516abbb0 (size 34) 230s | PRF symkey interface: symkey message-key@0x37d516abbb0 (34-bytes, EXTRACT_KEY_FROM_KEY) 230s | symkey message extracting all 34 bytes of key@0x37d516abbb0 230s | symkey message: symkey-key@0x37d516abbb0 (34-bytes, EXTRACT_KEY_FROM_KEY) 230s | sizeof bytes 48 230s | wrapper: (SECItemType)-457133856: 66 51 02 58 c1 93 9d 55 1b 09 03 bb 5e 3c b1 07 ab f5 ad 8e 6b 1c 24 c2 a7 08 60 20 1d 6a a4 fe bf 35 f1 9e 1c cf 3d 2c 31 9d 13 6e af e0 5d 06 230s | symkey message extracted len 48 bytes at 0x37d516ad900 230s | unwrapped: 230s | 00 01 02 03 04 05 06 07 08 09 0a 0b 0c 0d 0e 0f ................ 230s | 10 11 12 13 14 15 16 17 18 19 1a 1b 1c 1d 1e 1f ................ 230s | 20 21 00 00 00 00 00 00 00 00 00 00 00 00 00 00 !.............. 230s | XCBC: data 230s | 00 01 02 03 04 05 06 07 08 09 0a 0b 0c 0d 0e 0f ................ 230s | 10 11 12 13 14 15 16 17 18 19 1a 1b 1c 1d 1e 1f ................ 230s | 20 21 ! 230s | K extracting all 16 bytes of key@0x37d516ae040 230s | K: symkey-key@0x37d516ae040 (16-bytes, AES_ECB) 230s | sizeof bytes 16 230s | wrapper: (SECItemType)34: 66 51 02 58 c1 93 9d 55 1b 09 03 bb 5e 3c b1 07 230s | K extracted len 16 bytes at 0x37d516ad8e0 230s | unwrapped: 230s | 00 01 02 03 04 05 06 07 08 09 0a 0b 0c 0d 0e 0f ................ 230s | XCBC: K: 230s | 00 01 02 03 04 05 06 07 08 09 0a 0b 0c 0d 0e 0f ................ 230s | XCBC: K1 230s | c3 52 80 57 54 23 7f 31 1a c0 ff f4 e3 e0 3e 78 .R.WT#.1......>x 230s | CONCATENATE_DATA_AND_BASE: 230s | target: EXTRACT_KEY_FROM_KEY 230s | base: base-key@0x37d516aa290 (16-bytes, AES_KEY_GEN) 230s | params: 16-bytes@0x7fffe4c0b350 230s | key-offset: 0, key-size: 16 230s | EXTRACT_KEY_FROM_KEY: 230s | target: AES_ECB 230s | flags: SIGN 230s | key_size: 16-bytes 230s | base: base-key@0x37d516ae6e0 (32-bytes, EXTRACT_KEY_FROM_KEY) 230s | operation: FLAGS_ONLY 230s | params: 8-bytes@0x7fffe4c0b358 230s | Computing E[3] using K3 230s | XCBC: K3 230s | c1 a7 ab a1 a2 3a 94 06 58 07 a0 8c c8 ee d0 6e .....:..X......n 230s | XCBC: E[n-1] 230s | 09 02 5e 5a 67 25 20 72 44 14 5c 6b 80 66 85 79 ..^Zg% rD.\k.f.y 230s | XCBC: M[n] 230s | 20 21 ! 230s | XCBC: M[n] 230s | 20 21 ! 230s | XCBC: M[n]:80...^E[n-1]^K3 230s | e8 84 75 fb c5 1f b4 74 1c 13 fc e7 48 88 55 17 ..u....t....H.U. 230s | XCBC: MAC 230s | be cb b3 bc cd b5 18 a3 06 77 d5 48 1f b6 b4 d8 .........w.H.... 230s | CONCATENATE_DATA_AND_BASE: 230s | target: EXTRACT_KEY_FROM_KEY 230s | base: base-key@0x37d516aa290 (16-bytes, AES_KEY_GEN) 230s | params: 16-bytes@0x7fffe4c0b520 230s | key-offset: 0, key-size: 16 230s | EXTRACT_KEY_FROM_KEY: 230s | target: EXTRACT_KEY_FROM_KEY 230s | key_size: 16-bytes 230s | base: base-key@0x37d516ae6e0 (32-bytes, EXTRACT_KEY_FROM_KEY) 230s | operation: FLAGS_ONLY 230s | params: 8-bytes@0x7fffe4c0b458 230s | PRF symkey interface PRF AES_XCBC final-key@0x37d516ae380 (size 16) 230s | PRF symkey interface: key-key@0x37d516ae380 (16-bytes, EXTRACT_KEY_FROM_KEY) 230s | output: symkey-key@0x37d516ae380 (16-bytes, EXTRACT_KEY_FROM_KEY) 230s | RFC 3566 Test Case 6: AES-XCBC-MAC-96 with 34-byte input extracting all 16 bytes of key@0x37d516ae380 230s | RFC 3566 Test Case 6: AES-XCBC-MAC-96 with 34-byte input: symkey-key@0x37d516ae380 (16-bytes, EXTRACT_KEY_FROM_KEY) 230s | sizeof bytes 16 230s | wrapper: (SECItemType)-457133840: 8e cf e6 22 55 72 87 7f d3 0a e7 ef ea a2 f2 3a 230s | RFC 3566 Test Case 6: AES-XCBC-MAC-96 with 34-byte input extracted len 16 bytes at 0x37d516ae020 230s | unwrapped: 230s | be cb b3 bc cd b5 18 a3 06 77 d5 48 1f b6 b4 d8 .........w.H.... 230s | verify_bytes() RFC 3566 Test Case 6: AES-XCBC-MAC-96 with 34-byte input: symkey: ok 230s ipsec algparse: RFC 3566 Test Case 7: AES-XCBC-MAC-96 with 1000-byte input 230s | decode_to_chunk() test_prf_vector: input "0x000102030405060708090a0b0c0d0e0f" 230s | decode_to_chunk() output: 230s | 00 01 02 03 04 05 06 07 08 09 0a 0b 0c 0d 0e 0f ................ 230s | decode_to_chunk() test_prf_vector: input "0xf0dafee895db30253761103b5d84528f" 230s | decode_to_chunk() output: 230s | f0 da fe e8 95 db 30 25 37 61 10 3b 5d 84 52 8f ......0%7a.;].R. 230s | PRF chunk interface PRF AES_XCBC init key hunk 0x37d516aa160 (length 16) 230s | 00 01 02 03 04 05 06 07 08 09 0a 0b 0c 0d 0e 0f ................ 230s | CONCATENATE_DATA_AND_BASE: 230s | target: EXTRACT_KEY_FROM_KEY 230s | base: base-key@0x37d516aa290 (16-bytes, AES_KEY_GEN) 230s | params: 16-bytes@0x7fffe4c0b510 230s | key-offset: 0, key-size: 16 230s | EXTRACT_KEY_FROM_KEY: 230s | target: EXTRACT_KEY_FROM_KEY 230s | key_size: 16-bytes 230s | base: base-key@0x37d516ad2a0 (32-bytes, EXTRACT_KEY_FROM_KEY) 230s | operation: FLAGS_ONLY 230s | params: 8-bytes@0x7fffe4c0b448 230s | XCBC: Key 16=16 just right 230s | key-offset: 0, key-size: 16 230s | EXTRACT_KEY_FROM_KEY: 230s | target: AES_ECB 230s | flags: SIGN 230s | key_size: 16-bytes 230s | base: base-key@0x37d516ae380 (16-bytes, EXTRACT_KEY_FROM_KEY) 230s | operation: FLAGS_ONLY 230s | params: 8-bytes@0x7fffe4c0b418 230s | PRF chunk interface PRF AES_XCBC 0x37d516adc20 230s | PRF chunk interface PRF AES_XCBC update message (0x37d516abce0 length 1000) 230s | 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................ 230s | 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................ 230s | 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................ 230s | 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................ 230s | 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................ 230s | 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................ 230s | 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................ 230s | 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................ 230s | 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................ 230s | 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................ 230s | 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................ 230s | 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................ 230s | 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................ 230s | 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................ 230s | 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................ 230s | 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................ 230s | 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................ 230s | 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................ 230s | 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................ 230s | 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................ 230s | 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................ 230s | 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................ 230s | 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................ 230s | 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................ 230s | 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................ 230s | 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................ 230s | 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................ 230s | 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................ 230s | 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................ 230s | 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................ 230s | 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................ 230s | 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................ 230s | 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................ 230s | 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................ 230s | 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................ 230s | 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................ 230s | 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................ 230s | 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................ 230s | 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................ 230s | 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................ 230s | 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................ 230s | 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................ 230s | 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................ 230s | 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................ 230s | 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................ 230s | 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................ 230s | 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................ 230s | 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................ 230s | 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................ 230s | 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................ 230s | 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................ 230s | 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................ 230s | 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................ 230s | 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................ 230s | 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................ 230s | 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................ 230s | 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................ 230s | 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................ 230s | 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................ 230s | 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................ 230s | 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................ 230s | 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................ 230s | 00 00 00 00 00 00 00 00 ........ 230s | XCBC: data 230s | 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................ 230s | 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................ 230s | 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................ 230s | 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................ 230s | 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................ 230s | 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................ 230s | 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................ 230s | 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................ 230s | 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................ 230s | 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................ 230s | 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................ 230s | 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................ 230s | 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................ 230s | 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................ 230s | 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................ 230s | 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................ 230s | 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................ 230s | 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................ 230s | 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................ 230s | 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................ 230s | 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................ 230s | 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................ 230s | 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................ 230s | 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................ 230s | 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................ 230s | 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................ 230s | 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................ 230s | 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................ 230s | 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................ 230s | 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................ 230s | 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................ 230s | 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................ 230s | 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................ 230s | 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................ 230s | 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................ 230s | 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................ 230s | 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................ 230s | 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................ 230s | 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................ 230s | 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................ 230s | 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................ 230s | 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................ 230s | 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................ 230s | 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................ 230s | 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................ 230s | 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................ 230s | 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................ 230s | 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................ 230s | 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................ 230s | 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................ 230s | 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................ 230s | 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................ 230s | 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................ 230s | 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................ 230s | 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................ 230s | 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................ 230s | 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................ 230s | 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................ 230s | 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................ 230s | 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................ 230s | 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................ 230s | 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................ 230s | 00 00 00 00 00 00 00 00 ........ 230s | K extracting all 16 bytes of key@0x37d516ad2a0 230s | K: symkey-key@0x37d516ad2a0 (16-bytes, AES_ECB) 230s | sizeof bytes 16 230s | wrapper: (SECItemType)-457133016: 66 51 02 58 c1 93 9d 55 1b 09 03 bb 5e 3c b1 07 230s | K extracted len 16 bytes at 0x37d516ad8e0 230s | unwrapped: 230s | 00 01 02 03 04 05 06 07 08 09 0a 0b 0c 0d 0e 0f ................ 230s | XCBC: K: 230s | 00 01 02 03 04 05 06 07 08 09 0a 0b 0c 0d 0e 0f ................ 230s | XCBC: K1 230s | c3 52 80 57 54 23 7f 31 1a c0 ff f4 e3 e0 3e 78 .R.WT#.1......>x 230s | CONCATENATE_DATA_AND_BASE: 230s | target: EXTRACT_KEY_FROM_KEY 230s | base: base-key@0x37d516aa290 (16-bytes, AES_KEY_GEN) 230s | params: 16-bytes@0x7fffe4c0b300 230s | key-offset: 0, key-size: 16 230s | EXTRACT_KEY_FROM_KEY: 230s | target: AES_ECB 230s | flags: SIGN 230s | key_size: 16-bytes 230s | base: base-key@0x37d516abbb0 (32-bytes, EXTRACT_KEY_FROM_KEY) 230s | operation: FLAGS_ONLY 230s | params: 8-bytes@0x7fffe4c0b308 230s | Computing E[63] using K3 230s | XCBC: K3 230s | c1 a7 ab a1 a2 3a 94 06 58 07 a0 8c c8 ee d0 6e .....:..X......n 230s | XCBC: E[n-1] 230s | 5c 88 af cc 1e 1e 83 fc c4 2c 0c e4 12 12 f5 17 \........,...... 230s | XCBC: M[n] 230s | 00 00 00 00 00 00 00 00 ........ 230s | XCBC: M[n] 230s | 00 00 00 00 00 00 00 00 ........ 230s | XCBC: M[n]:80...^E[n-1]^K3 230s | 9d 2f 04 6d bc 24 17 fa 1c 2b ac 68 da fc 25 79 ./.m.$...+.h..%y 230s | XCBC: MAC 230s | f0 da fe e8 95 db 30 25 37 61 10 3b 5d 84 52 8f ......0%7a.;].R. 230s | PRF chunk interface PRF AES_XCBC final length 16 230s | f0 da fe e8 95 db 30 25 37 61 10 3b 5d 84 52 8f ......0%7a.;].R. 230s | chunk output 230s | f0 da fe e8 95 db 30 25 37 61 10 3b 5d 84 52 8f ......0%7a.;].R. 230s | verify_bytes() RFC 3566 Test Case 7: AES-XCBC-MAC-96 with 1000-byte input: prf OUT: ok 230s | CONCATENATE_DATA_AND_BASE: 230s | target: EXTRACT_KEY_FROM_KEY 230s | base: base-key@0x37d516aa290 (16-bytes, AES_KEY_GEN) 230s | params: 16-bytes@0x7fffe4c0b600 230s | key-offset: 0, key-size: 16 230s | EXTRACT_KEY_FROM_KEY: 230s | target: EXTRACT_KEY_FROM_KEY 230s | key_size: 16-bytes 230s | base: base-key@0x37d516ae380 (32-bytes, EXTRACT_KEY_FROM_KEY) 230s | operation: FLAGS_ONLY 230s | params: 8-bytes@0x7fffe4c0b538 230s | PRF symkey interface PRF AES_XCBC init key symkey-key@0x37d516ad2a0 (size 16) 230s | PRF symkey interface: key symkey-key@0x37d516ad2a0 (16-bytes, EXTRACT_KEY_FROM_KEY) 230s | XCBC: Key 16=16 just right 230s | key-offset: 0, key-size: 16 230s | EXTRACT_KEY_FROM_KEY: 230s | target: AES_ECB 230s | flags: SIGN 230s | key_size: 16-bytes 230s | base: base-key@0x37d516ad2a0 (16-bytes, EXTRACT_KEY_FROM_KEY) 230s | operation: FLAGS_ONLY 230s | params: 8-bytes@0x7fffe4c0b468 230s | PRF symkey interface PRF AES_XCBC 0x37d516adc20 230s | CONCATENATE_DATA_AND_BASE: 230s | target: EXTRACT_KEY_FROM_KEY 230s | base: base-key@0x37d516aa290 (16-bytes, AES_KEY_GEN) 230s | params: 16-bytes@0x7fffe4c0b600 230s | key-offset: 0, key-size: 1000 230s | EXTRACT_KEY_FROM_KEY: 230s | target: EXTRACT_KEY_FROM_KEY 230s | key_size: 1000-bytes 230s | base: base-key@0x37d516ae040 (1016-bytes, EXTRACT_KEY_FROM_KEY) 230s | operation: FLAGS_ONLY 230s | params: 8-bytes@0x7fffe4c0b538 230s | PRF symkey interface PRF AES_XCBC update symkey message-key@0x37d516abbb0 (size 1000) 230s | PRF symkey interface: symkey message-key@0x37d516abbb0 (1000-bytes, EXTRACT_KEY_FROM_KEY) 230s | symkey message extracting all 1000 bytes of key@0x37d516abbb0 230s | symkey message: symkey-key@0x37d516abbb0 (1000-bytes, EXTRACT_KEY_FROM_KEY) 230s | sizeof bytes 1008 230s | wrapper: (SECItemType)-457133856: ff b3 66 60 ff 98 7f 43 69 08 59 fa e7 81 48 2c ff b3 66 60 ff 98 7f 43 69 08 59 fa e7 81 48 2c ff b3 66 60 ff 98 7f 43 69 08 59 fa e7 81 48 2c ff b3 66 60 ff 98 7f 43 69 08 59 fa e7 81 48 2c ff b3 66 60 ff 98 7f 43 69 08 59 fa e7 81 48 2c ff b3 66 60 ff 98 7f 43 69 08 59 fa e7 81 48 2c ff b3 66 60 ff 98 7f 43 69 08 59 fa e7 81 48 2c ff b3 66 60 ff 98 7f 43 69 08 59 fa e7 81 48 2c ff b3 66 60 ff 98 7f 43 69 08 59 fa e7 81 48 2c ff b3 66 60 ff 98 7f 43 69 08 59 fa e7 81 48 2c ff b3 66 60 ff 98 7f 43 69 08 59 fa e7 81 48 2c ff b3 66 60 ff 98 7f 43 69 08 59 fa e7 81 48 2c ff b3 66 60 ff 98 7f 43 69 08 59 fa e7 81 48 2c ff b3 66 60 ff 98 7f 43 69 08 59 fa e7 81 48 2c ff b3 66 60 ff 98 7f 43 69 08 59 fa e7 81 48 2c ff b3 66 60 ff 98 7f 43 69 08 59 fa e7 81 48 2c ff b3 66 60 ff 98 7f 43 69 08 59 fa e7 81 48 2c ff b3 66 60 ff 98 7f 43 69 08 59 fa e7 81 48 2c ff b3 66 60 ff 98 7f 43 69 08 59 fa e7 81 48... 230s | symkey message extracted len 1008 bytes at 0x37d516ac8c0 230s | unwrapped: 230s | 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................ 230s | 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................ 230s | 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................ 230s | 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................ 230s | 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................ 230s | 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................ 230s | 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................ 230s | 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................ 230s | 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................ 230s | 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................ 230s | 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................ 230s | 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................ 230s | 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................ 230s | 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................ 230s | 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................ 230s | 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................ 230s | 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................ 230s | 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................ 230s | 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................ 230s | 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................ 230s | 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................ 230s | 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................ 230s | 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................ 230s | 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................ 230s | 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................ 230s | 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................ 230s | 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................ 230s | 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................ 230s | 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................ 230s | 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................ 230s | 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................ 230s | 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................ 230s | 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................ 230s | 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................ 230s | 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................ 230s | 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................ 230s | 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................ 230s | 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................ 230s | 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................ 230s | 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................ 230s | 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................ 230s | 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................ 230s | 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................ 230s | 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................ 230s | 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................ 230s | 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................ 230s | 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................ 230s | 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................ 230s | 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................ 230s | 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................ 230s | 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................ 230s | 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................ 230s | 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................ 230s | 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................ 230s | 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................ 230s | 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................ 230s | 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................ 230s | 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................ 230s | 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................ 230s | 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................ 230s | 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................ 230s | 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................ 230s | 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................ 230s | XCBC: data 230s | 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................ 230s | 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................ 230s | 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................ 230s | 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................ 230s | 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................ 230s | 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................ 230s | 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................ 230s | 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................ 230s | 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................ 230s | 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................ 230s | 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................ 230s | 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................ 230s | 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................ 230s | 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................ 230s | 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................ 230s | 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................ 230s | 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................ 230s | 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................ 230s | 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................ 230s | 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................ 230s | 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................ 230s | 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................ 230s | 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................ 230s | 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................ 230s | 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................ 230s | 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................ 230s | 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................ 230s | 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................ 230s | 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................ 230s | 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................ 230s | 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................ 230s | 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................ 230s | 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................ 230s | 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................ 230s | 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................ 230s | 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................ 230s | 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................ 230s | 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................ 230s | 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................ 230s | 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................ 230s | 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................ 230s | 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................ 230s | 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................ 230s | 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................ 230s | 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................ 230s | 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................ 230s | 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................ 230s | 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................ 230s | 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................ 230s | 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................ 230s | 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................ 230s | 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................ 230s | 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................ 230s | 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................ 230s | 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................ 230s | 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................ 230s | 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................ 230s | 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................ 230s | 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................ 230s | 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................ 230s | 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................ 230s | 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................ 230s | 00 00 00 00 00 00 00 00 ........ 230s | K extracting all 16 bytes of key@0x37d516ae380 230s | K: symkey-key@0x37d516ae380 (16-bytes, AES_ECB) 230s | sizeof bytes 16 230s | wrapper: (SECItemType)1000: 66 51 02 58 c1 93 9d 55 1b 09 03 bb 5e 3c b1 07 230s | K extracted len 16 bytes at 0x37d516ad5f0 230s | unwrapped: 230s | 00 01 02 03 04 05 06 07 08 09 0a 0b 0c 0d 0e 0f ................ 230s | XCBC: K: 230s | 00 01 02 03 04 05 06 07 08 09 0a 0b 0c 0d 0e 0f ................ 230s | XCBC: K1 230s | c3 52 80 57 54 23 7f 31 1a c0 ff f4 e3 e0 3e 78 .R.WT#.1......>x 230s | CONCATENATE_DATA_AND_BASE: 230s | target: EXTRACT_KEY_FROM_KEY 230s | base: base-key@0x37d516aa290 (16-bytes, AES_KEY_GEN) 230s | params: 16-bytes@0x7fffe4c0b350 230s | key-offset: 0, key-size: 16 230s | EXTRACT_KEY_FROM_KEY: 230s | target: AES_ECB 230s | flags: SIGN 230s | key_size: 16-bytes 230s | base: base-key@0x37d516ae6e0 (32-bytes, EXTRACT_KEY_FROM_KEY) 230s | operation: FLAGS_ONLY 230s | params: 8-bytes@0x7fffe4c0b358 230s | Computing E[63] using K3 230s | XCBC: K3 230s | c1 a7 ab a1 a2 3a 94 06 58 07 a0 8c c8 ee d0 6e .....:..X......n 230s | XCBC: E[n-1] 230s | 5c 88 af cc 1e 1e 83 fc c4 2c 0c e4 12 12 f5 17 \........,...... 230s | XCBC: M[n] 230s | 00 00 00 00 00 00 00 00 ........ 230s | XCBC: M[n] 230s | 00 00 00 00 00 00 00 00 ........ 230s | XCBC: M[n]:80...^E[n-1]^K3 230s | 9d 2f 04 6d bc 24 17 fa 1c 2b ac 68 da fc 25 79 ./.m.$...+.h..%y 230s | XCBC: MAC 230s | f0 da fe e8 95 db 30 25 37 61 10 3b 5d 84 52 8f ......0%7a.;].R. 230s | CONCATENATE_DATA_AND_BASE: 230s | target: EXTRACT_KEY_FROM_KEY 230s | base: base-key@0x37d516aa290 (16-bytes, AES_KEY_GEN) 230s | params: 16-bytes@0x7fffe4c0b520 230s | key-offset: 0, key-size: 16 230s | EXTRACT_KEY_FROM_KEY: 230s | target: EXTRACT_KEY_FROM_KEY 230s | key_size: 16-bytes 230s | base: base-key@0x37d516ae6e0 (32-bytes, EXTRACT_KEY_FROM_KEY) 230s | operation: FLAGS_ONLY 230s | params: 8-bytes@0x7fffe4c0b458 230s | PRF symkey interface PRF AES_XCBC final-key@0x37d516ae040 (size 16) 230s | PRF symkey interface: key-key@0x37d516ae040 (16-bytes, EXTRACT_KEY_FROM_KEY) 230s | output: symkey-key@0x37d516ae040 (16-bytes, EXTRACT_KEY_FROM_KEY) 230s | RFC 3566 Test Case 7: AES-XCBC-MAC-96 with 1000-byte input extracting all 16 bytes of key@0x37d516ae040 230s | RFC 3566 Test Case 7: AES-XCBC-MAC-96 with 1000-byte input: symkey-key@0x37d516ae040 (16-bytes, EXTRACT_KEY_FROM_KEY) 230s | sizeof bytes 16 230s | wrapper: (SECItemType)-457133840: 39 19 8d 75 c6 25 de cd d2 da d0 0e b9 16 bd fa 230s | RFC 3566 Test Case 7: AES-XCBC-MAC-96 with 1000-byte input extracted len 16 bytes at 0x37d516adeb0 230s | unwrapped: 230s | f0 da fe e8 95 db 30 25 37 61 10 3b 5d 84 52 8f ......0%7a.;].R. 230s | verify_bytes() RFC 3566 Test Case 7: AES-XCBC-MAC-96 with 1000-byte input: symkey: ok 230s ipsec algparse: RFC 4434 Test Case AES-XCBC-PRF-128 with 20-byte input (key length 16) 230s | decode_to_chunk() test_prf_vector: input "0x000102030405060708090a0b0c0d0e0f" 230s | decode_to_chunk() output: 230s | 00 01 02 03 04 05 06 07 08 09 0a 0b 0c 0d 0e 0f ................ 230s | decode_to_chunk() test_prf_vector: input "0x000102030405060708090a0b0c0d0e0f10111213" 230s | decode_to_chunk() output: 230s | 00 01 02 03 04 05 06 07 08 09 0a 0b 0c 0d 0e 0f ................ 230s | 10 11 12 13 .... 230s | decode_to_chunk() test_prf_vector: input "0x47f51b4564966215b8985c63055ed308" 230s | decode_to_chunk() output: 230s | 47 f5 1b 45 64 96 62 15 b8 98 5c 63 05 5e d3 08 G..Ed.b...\c.^.. 230s | PRF chunk interface PRF AES_XCBC init key hunk 0x37d516ad5d0 (length 16) 230s | 00 01 02 03 04 05 06 07 08 09 0a 0b 0c 0d 0e 0f ................ 230s | CONCATENATE_DATA_AND_BASE: 230s | target: EXTRACT_KEY_FROM_KEY 230s | base: base-key@0x37d516aa290 (16-bytes, AES_KEY_GEN) 230s | params: 16-bytes@0x7fffe4c0b510 230s | key-offset: 0, key-size: 16 230s | EXTRACT_KEY_FROM_KEY: 230s | target: EXTRACT_KEY_FROM_KEY 230s | key_size: 16-bytes 230s | base: base-key@0x37d516ad2a0 (32-bytes, EXTRACT_KEY_FROM_KEY) 230s | operation: FLAGS_ONLY 230s | params: 8-bytes@0x7fffe4c0b448 230s | XCBC: Key 16=16 just right 230s | key-offset: 0, key-size: 16 230s | EXTRACT_KEY_FROM_KEY: 230s | target: AES_ECB 230s | flags: SIGN 230s | key_size: 16-bytes 230s | base: base-key@0x37d516ae040 (16-bytes, EXTRACT_KEY_FROM_KEY) 230s | operation: FLAGS_ONLY 230s | params: 8-bytes@0x7fffe4c0b418 230s | PRF chunk interface PRF AES_XCBC 0x37d516adc20 230s | PRF chunk interface PRF AES_XCBC update message (0x37d516abae0 length 20) 230s | 00 01 02 03 04 05 06 07 08 09 0a 0b 0c 0d 0e 0f ................ 230s | 10 11 12 13 .... 230s | XCBC: data 230s | 00 01 02 03 04 05 06 07 08 09 0a 0b 0c 0d 0e 0f ................ 230s | 10 11 12 13 .... 230s | K extracting all 16 bytes of key@0x37d516ad2a0 230s | K: symkey-key@0x37d516ad2a0 (16-bytes, AES_ECB) 230s | sizeof bytes 16 230s | wrapper: (SECItemType)-457133016: 66 51 02 58 c1 93 9d 55 1b 09 03 bb 5e 3c b1 07 230s | K extracted len 16 bytes at 0x37d516ae6c0 230s | unwrapped: 230s | 00 01 02 03 04 05 06 07 08 09 0a 0b 0c 0d 0e 0f ................ 230s | XCBC: K: 230s | 00 01 02 03 04 05 06 07 08 09 0a 0b 0c 0d 0e 0f ................ 230s | XCBC: K1 230s | c3 52 80 57 54 23 7f 31 1a c0 ff f4 e3 e0 3e 78 .R.WT#.1......>x 230s | CONCATENATE_DATA_AND_BASE: 230s | target: EXTRACT_KEY_FROM_KEY 230s | base: base-key@0x37d516aa290 (16-bytes, AES_KEY_GEN) 230s | params: 16-bytes@0x7fffe4c0b300 230s | key-offset: 0, key-size: 16 230s | EXTRACT_KEY_FROM_KEY: 230s | target: AES_ECB 230s | flags: SIGN 230s | key_size: 16-bytes 230s | base: base-key@0x37d516abbb0 (32-bytes, EXTRACT_KEY_FROM_KEY) 230s | operation: FLAGS_ONLY 230s | params: 8-bytes@0x7fffe4c0b308 230s | Computing E[2] using K3 230s | XCBC: K3 230s | c1 a7 ab a1 a2 3a 94 06 58 07 a0 8c c8 ee d0 6e .....:..X......n 230s | XCBC: E[n-1] 230s | 1d 04 48 fa cf 4d 9c 6f 55 b9 93 da 09 80 3d b3 ..H..M.oU.....=. 230s | XCBC: M[n] 230s | 10 11 12 13 .... 230s | XCBC: M[n] 230s | 10 11 12 13 .... 230s | XCBC: M[n]:80...^E[n-1]^K3 230s | cc b2 f1 48 ed 77 08 69 0d be 33 56 c1 6e ed dd ...H.w.i..3V.n.. 230s | XCBC: MAC 230s | 47 f5 1b 45 64 96 62 15 b8 98 5c 63 05 5e d3 08 G..Ed.b...\c.^.. 230s | PRF chunk interface PRF AES_XCBC final length 16 230s | 47 f5 1b 45 64 96 62 15 b8 98 5c 63 05 5e d3 08 G..Ed.b...\c.^.. 230s | chunk output 230s | 47 f5 1b 45 64 96 62 15 b8 98 5c 63 05 5e d3 08 G..Ed.b...\c.^.. 230s | verify_bytes() RFC 4434 Test Case AES-XCBC-PRF-128 with 20-byte input (key length 16): prf OUT: ok 230s | CONCATENATE_DATA_AND_BASE: 230s | target: EXTRACT_KEY_FROM_KEY 230s | base: base-key@0x37d516aa290 (16-bytes, AES_KEY_GEN) 230s | params: 16-bytes@0x7fffe4c0b600 230s | key-offset: 0, key-size: 16 230s | EXTRACT_KEY_FROM_KEY: 230s | target: EXTRACT_KEY_FROM_KEY 230s | key_size: 16-bytes 230s | base: base-key@0x37d516ae040 (32-bytes, EXTRACT_KEY_FROM_KEY) 230s | operation: FLAGS_ONLY 230s | params: 8-bytes@0x7fffe4c0b538 230s | PRF symkey interface PRF AES_XCBC init key symkey-key@0x37d516ad2a0 (size 16) 230s | PRF symkey interface: key symkey-key@0x37d516ad2a0 (16-bytes, EXTRACT_KEY_FROM_KEY) 230s | XCBC: Key 16=16 just right 230s | key-offset: 0, key-size: 16 230s | EXTRACT_KEY_FROM_KEY: 230s | target: AES_ECB 230s | flags: SIGN 230s | key_size: 16-bytes 230s | base: base-key@0x37d516ad2a0 (16-bytes, EXTRACT_KEY_FROM_KEY) 230s | operation: FLAGS_ONLY 230s | params: 8-bytes@0x7fffe4c0b468 230s | PRF symkey interface PRF AES_XCBC 0x37d516adc20 230s | CONCATENATE_DATA_AND_BASE: 230s | target: EXTRACT_KEY_FROM_KEY 230s | base: base-key@0x37d516aa290 (16-bytes, AES_KEY_GEN) 230s | params: 16-bytes@0x7fffe4c0b600 230s | key-offset: 0, key-size: 20 230s | EXTRACT_KEY_FROM_KEY: 230s | target: EXTRACT_KEY_FROM_KEY 230s | key_size: 20-bytes 230s | base: base-key@0x37d516ae380 (36-bytes, EXTRACT_KEY_FROM_KEY) 230s | operation: FLAGS_ONLY 230s | params: 8-bytes@0x7fffe4c0b538 230s | PRF symkey interface PRF AES_XCBC update symkey message-key@0x37d516abbb0 (size 20) 230s | PRF symkey interface: symkey message-key@0x37d516abbb0 (20-bytes, EXTRACT_KEY_FROM_KEY) 230s | symkey message extracting all 20 bytes of key@0x37d516abbb0 230s | symkey message: symkey-key@0x37d516abbb0 (20-bytes, EXTRACT_KEY_FROM_KEY) 230s | sizeof bytes 32 230s | wrapper: (SECItemType)-457133856: 66 51 02 58 c1 93 9d 55 1b 09 03 bb 5e 3c b1 07 72 c1 ca a3 e9 f0 3c f8 58 74 33 2b 95 41 1d af 230s | symkey message extracted len 32 bytes at 0x37d516aa230 230s | unwrapped: 230s | 00 01 02 03 04 05 06 07 08 09 0a 0b 0c 0d 0e 0f ................ 230s | 10 11 12 13 00 00 00 00 00 00 00 00 00 00 00 00 ................ 230s | XCBC: data 230s | 00 01 02 03 04 05 06 07 08 09 0a 0b 0c 0d 0e 0f ................ 230s | 10 11 12 13 .... 230s | K extracting all 16 bytes of key@0x37d516ae040 230s | K: symkey-key@0x37d516ae040 (16-bytes, AES_ECB) 230s | sizeof bytes 16 230s | wrapper: (SECItemType)20: 66 51 02 58 c1 93 9d 55 1b 09 03 bb 5e 3c b1 07 230s | K extracted len 16 bytes at 0x37d516ad8e0 230s | unwrapped: 230s | 00 01 02 03 04 05 06 07 08 09 0a 0b 0c 0d 0e 0f ................ 230s | XCBC: K: 230s | 00 01 02 03 04 05 06 07 08 09 0a 0b 0c 0d 0e 0f ................ 230s | XCBC: K1 230s | c3 52 80 57 54 23 7f 31 1a c0 ff f4 e3 e0 3e 78 .R.WT#.1......>x 230s | CONCATENATE_DATA_AND_BASE: 230s | target: EXTRACT_KEY_FROM_KEY 230s | base: base-key@0x37d516aa290 (16-bytes, AES_KEY_GEN) 230s | params: 16-bytes@0x7fffe4c0b350 230s | key-offset: 0, key-size: 16 230s | EXTRACT_KEY_FROM_KEY: 230s | target: AES_ECB 230s | flags: SIGN 230s | key_size: 16-bytes 230s | base: base-key@0x37d516ae6e0 (32-bytes, EXTRACT_KEY_FROM_KEY) 230s | operation: FLAGS_ONLY 230s | params: 8-bytes@0x7fffe4c0b358 230s | Computing E[2] using K3 230s | XCBC: K3 230s | c1 a7 ab a1 a2 3a 94 06 58 07 a0 8c c8 ee d0 6e .....:..X......n 230s | XCBC: E[n-1] 230s | 1d 04 48 fa cf 4d 9c 6f 55 b9 93 da 09 80 3d b3 ..H..M.oU.....=. 230s | XCBC: M[n] 230s | 10 11 12 13 .... 230s | XCBC: M[n] 230s | 10 11 12 13 .... 230s | XCBC: M[n]:80...^E[n-1]^K3 230s | cc b2 f1 48 ed 77 08 69 0d be 33 56 c1 6e ed dd ...H.w.i..3V.n.. 230s | XCBC: MAC 230s | 47 f5 1b 45 64 96 62 15 b8 98 5c 63 05 5e d3 08 G..Ed.b...\c.^.. 230s | CONCATENATE_DATA_AND_BASE: 230s | target: EXTRACT_KEY_FROM_KEY 230s | base: base-key@0x37d516aa290 (16-bytes, AES_KEY_GEN) 230s | params: 16-bytes@0x7fffe4c0b520 230s | key-offset: 0, key-size: 16 230s | EXTRACT_KEY_FROM_KEY: 230s | target: EXTRACT_KEY_FROM_KEY 230s | key_size: 16-bytes 230s | base: base-key@0x37d516ae6e0 (32-bytes, EXTRACT_KEY_FROM_KEY) 230s | operation: FLAGS_ONLY 230s | params: 8-bytes@0x7fffe4c0b458 230s | PRF symkey interface PRF AES_XCBC final-key@0x37d516ae380 (size 16) 230s | PRF symkey interface: key-key@0x37d516ae380 (16-bytes, EXTRACT_KEY_FROM_KEY) 230s | output: symkey-key@0x37d516ae380 (16-bytes, EXTRACT_KEY_FROM_KEY) 230s | RFC 4434 Test Case AES-XCBC-PRF-128 with 20-byte input (key length 16) extracting all 16 bytes of key@0x37d516ae380 230s | RFC 4434 Test Case AES-XCBC-PRF-128 with 20-byte input (key length 16): symkey-key@0x37d516ae380 (16-bytes, EXTRACT_KEY_FROM_KEY) 230s | sizeof bytes 16 230s | wrapper: (SECItemType)-457133840: 4b 6f 0d f9 36 d3 0b 33 95 4f 85 eb e3 1c 54 70 230s | RFC 4434 Test Case AES-XCBC-PRF-128 with 20-byte input (key length 16) extracted len 16 bytes at 0x37d516ad8e0 230s | unwrapped: 230s | 47 f5 1b 45 64 96 62 15 b8 98 5c 63 05 5e d3 08 G..Ed.b...\c.^.. 230s | verify_bytes() RFC 4434 Test Case AES-XCBC-PRF-128 with 20-byte input (key length 16): symkey: ok 230s ipsec algparse: RFC 4434 Test Case AES-XCBC-PRF-128 with 20-byte input (key length 10) 230s | decode_to_chunk() test_prf_vector: input "0x00010203040506070809" 230s | decode_to_chunk() output: 230s | 00 01 02 03 04 05 06 07 08 09 .......... 230s | decode_to_chunk() test_prf_vector: input "0x000102030405060708090a0b0c0d0e0f10111213" 230s | decode_to_chunk() output: 230s | 00 01 02 03 04 05 06 07 08 09 0a 0b 0c 0d 0e 0f ................ 230s | 10 11 12 13 .... 230s | decode_to_chunk() test_prf_vector: input "0x0fa087af7d866e7653434e602fdde835" 230s | decode_to_chunk() output: 230s | 0f a0 87 af 7d 86 6e 76 53 43 4e 60 2f dd e8 35 ....}.nvSCN`/..5 230s | PRF chunk interface PRF AES_XCBC init key hunk 0x37d516ad5d0 (length 10) 230s | 00 01 02 03 04 05 06 07 08 09 .......... 230s | CONCATENATE_DATA_AND_BASE: 230s | target: EXTRACT_KEY_FROM_KEY 230s | base: base-key@0x37d516aa290 (16-bytes, AES_KEY_GEN) 230s | params: 16-bytes@0x7fffe4c0b510 230s | key-offset: 0, key-size: 10 230s | EXTRACT_KEY_FROM_KEY: 230s | target: EXTRACT_KEY_FROM_KEY 230s | key_size: 10-bytes 230s | base: base-key@0x37d516ad2a0 (26-bytes, EXTRACT_KEY_FROM_KEY) 230s | operation: FLAGS_ONLY 230s | params: 8-bytes@0x7fffe4c0b448 230s | XCBC: Key 10<16 too small, padding with zeros 230s | CONCATENATE_BASE_AND_DATA: 230s | target: EXTRACT_KEY_FROM_KEY 230s | base: base-key@0x37d516ae380 (10-bytes, EXTRACT_KEY_FROM_KEY) 230s | params: 16-bytes@0x7fffe4c0b400 230s | key-offset: 0, key-size: 16 230s | EXTRACT_KEY_FROM_KEY: 230s | target: AES_ECB 230s | flags: SIGN 230s | key_size: 16-bytes 230s | base: base-key@0x37d516ad2a0 (16-bytes, EXTRACT_KEY_FROM_KEY) 230s | operation: FLAGS_ONLY 230s | params: 8-bytes@0x7fffe4c0b418 230s | PRF chunk interface PRF AES_XCBC 0x37d516adc20 230s | PRF chunk interface PRF AES_XCBC update message (0x37d516abae0 length 20) 230s | 00 01 02 03 04 05 06 07 08 09 0a 0b 0c 0d 0e 0f ................ 230s | 10 11 12 13 .... 230s | XCBC: data 230s | 00 01 02 03 04 05 06 07 08 09 0a 0b 0c 0d 0e 0f ................ 230s | 10 11 12 13 .... 230s | K extracting all 16 bytes of key@0x37d516abbb0 230s | K: symkey-key@0x37d516abbb0 (16-bytes, AES_ECB) 230s | sizeof bytes 16 230s | wrapper: (SECItemType)-457133016: e6 54 95 70 e8 dc 73 2c f9 c8 28 97 15 8b 8c 38 230s | K extracted len 16 bytes at 0x37d516aa160 230s | unwrapped: 230s | 00 01 02 03 04 05 06 07 08 09 00 00 00 00 00 00 ................ 230s | XCBC: K: 230s | 00 01 02 03 04 05 06 07 08 09 00 00 00 00 00 00 ................ 230s | XCBC: K1 230s | 50 ca b2 4d 03 34 45 5e 40 7b 25 0f dd 7c f8 d5 P..M.4E^@{%..|.. 230s | CONCATENATE_DATA_AND_BASE: 230s | target: EXTRACT_KEY_FROM_KEY 230s | base: base-key@0x37d516aa290 (16-bytes, AES_KEY_GEN) 230s | params: 16-bytes@0x7fffe4c0b300 230s | key-offset: 0, key-size: 16 230s | EXTRACT_KEY_FROM_KEY: 230s | target: AES_ECB 230s | flags: SIGN 230s | key_size: 16-bytes 230s | base: base-key@0x37d516ad2a0 (32-bytes, EXTRACT_KEY_FROM_KEY) 230s | operation: FLAGS_ONLY 230s | params: 8-bytes@0x7fffe4c0b308 230s | Computing E[2] using K3 230s | XCBC: K3 230s | 8e f7 48 db 56 f1 f7 26 24 72 f2 c5 63 b0 3f 88 ..H.V..&$r..c.?. 230s | XCBC: E[n-1] 230s | fe 1f 63 e9 65 1a 4b bb 3c cc cd 0d cc 83 e4 30 ..c.e.K.<......0 230s | XCBC: M[n] 230s | 10 11 12 13 .... 230s | XCBC: M[n] 230s | 10 11 12 13 .... 230s | XCBC: M[n]:80...^E[n-1]^K3 230s | 60 f9 39 21 b3 eb bc 9d 18 be 3f c8 af 33 db b8 `.9!......?..3.. 230s | XCBC: MAC 230s | 0f a0 87 af 7d 86 6e 76 53 43 4e 60 2f dd e8 35 ....}.nvSCN`/..5 230s | PRF chunk interface PRF AES_XCBC final length 16 230s | 0f a0 87 af 7d 86 6e 76 53 43 4e 60 2f dd e8 35 ....}.nvSCN`/..5 230s | chunk output 230s | 0f a0 87 af 7d 86 6e 76 53 43 4e 60 2f dd e8 35 ....}.nvSCN`/..5 230s | verify_bytes() RFC 4434 Test Case AES-XCBC-PRF-128 with 20-byte input (key length 10): prf OUT: ok 230s | CONCATENATE_DATA_AND_BASE: 230s | target: EXTRACT_KEY_FROM_KEY 230s | base: base-key@0x37d516aa290 (16-bytes, AES_KEY_GEN) 230s | params: 16-bytes@0x7fffe4c0b600 230s | key-offset: 0, key-size: 10 230s | EXTRACT_KEY_FROM_KEY: 230s | target: EXTRACT_KEY_FROM_KEY 230s | key_size: 10-bytes 230s | base: base-key@0x37d516ae380 (26-bytes, EXTRACT_KEY_FROM_KEY) 230s | operation: FLAGS_ONLY 230s | params: 8-bytes@0x7fffe4c0b538 230s | PRF symkey interface PRF AES_XCBC init key symkey-key@0x37d516abbb0 (size 10) 230s | PRF symkey interface: key symkey-key@0x37d516abbb0 (10-bytes, EXTRACT_KEY_FROM_KEY) 230s | XCBC: Key 10<16 too small, padding with zeros 230s | CONCATENATE_BASE_AND_DATA: 230s | target: EXTRACT_KEY_FROM_KEY 230s | base: base-key@0x37d516abbb0 (10-bytes, EXTRACT_KEY_FROM_KEY) 230s | params: 16-bytes@0x7fffe4c0b450 230s | key-offset: 0, key-size: 16 230s | EXTRACT_KEY_FROM_KEY: 230s | target: AES_ECB 230s | flags: SIGN 230s | key_size: 16-bytes 230s | base: base-key@0x37d516ae380 (16-bytes, EXTRACT_KEY_FROM_KEY) 230s | operation: FLAGS_ONLY 230s | params: 8-bytes@0x7fffe4c0b468 230s | PRF symkey interface PRF AES_XCBC 0x37d516adc20 230s | CONCATENATE_DATA_AND_BASE: 230s | target: EXTRACT_KEY_FROM_KEY 230s | base: base-key@0x37d516aa290 (16-bytes, AES_KEY_GEN) 230s | params: 16-bytes@0x7fffe4c0b600 230s | key-offset: 0, key-size: 20 230s | EXTRACT_KEY_FROM_KEY: 230s | target: EXTRACT_KEY_FROM_KEY 230s | key_size: 20-bytes 230s | base: base-key@0x37d516ae040 (36-bytes, EXTRACT_KEY_FROM_KEY) 230s | operation: FLAGS_ONLY 230s | params: 8-bytes@0x7fffe4c0b538 230s | PRF symkey interface PRF AES_XCBC update symkey message-key@0x37d516ae380 (size 20) 230s | PRF symkey interface: symkey message-key@0x37d516ae380 (20-bytes, EXTRACT_KEY_FROM_KEY) 230s | symkey message extracting all 20 bytes of key@0x37d516ae380 230s | symkey message: symkey-key@0x37d516ae380 (20-bytes, EXTRACT_KEY_FROM_KEY) 230s | sizeof bytes 32 230s | wrapper: (SECItemType)-457133856: 66 51 02 58 c1 93 9d 55 1b 09 03 bb 5e 3c b1 07 72 c1 ca a3 e9 f0 3c f8 58 74 33 2b 95 41 1d af 230s | symkey message extracted len 32 bytes at 0x37d516aa260 230s | unwrapped: 230s | 00 01 02 03 04 05 06 07 08 09 0a 0b 0c 0d 0e 0f ................ 230s | 10 11 12 13 00 00 00 00 00 00 00 00 00 00 00 00 ................ 230s | XCBC: data 230s | 00 01 02 03 04 05 06 07 08 09 0a 0b 0c 0d 0e 0f ................ 230s | 10 11 12 13 .... 230s | K extracting all 16 bytes of key@0x37d516ad2a0 230s | K: symkey-key@0x37d516ad2a0 (16-bytes, AES_ECB) 230s | sizeof bytes 16 230s | wrapper: (SECItemType)20: e6 54 95 70 e8 dc 73 2c f9 c8 28 97 15 8b 8c 38 230s | K extracted len 16 bytes at 0x37d516a9fc0 230s | unwrapped: 230s | 00 01 02 03 04 05 06 07 08 09 00 00 00 00 00 00 ................ 230s | XCBC: K: 230s | 00 01 02 03 04 05 06 07 08 09 00 00 00 00 00 00 ................ 230s | XCBC: K1 230s | 50 ca b2 4d 03 34 45 5e 40 7b 25 0f dd 7c f8 d5 P..M.4E^@{%..|.. 230s | CONCATENATE_DATA_AND_BASE: 230s | target: EXTRACT_KEY_FROM_KEY 230s | base: base-key@0x37d516aa290 (16-bytes, AES_KEY_GEN) 230s | params: 16-bytes@0x7fffe4c0b350 230s | key-offset: 0, key-size: 16 230s | EXTRACT_KEY_FROM_KEY: 230s | target: AES_ECB 230s | flags: SIGN 230s | key_size: 16-bytes 230s | base: base-key@0x37d516ae6e0 (32-bytes, EXTRACT_KEY_FROM_KEY) 230s | operation: FLAGS_ONLY 230s | params: 8-bytes@0x7fffe4c0b358 230s | Computing E[2] using K3 230s | XCBC: K3 230s | 8e f7 48 db 56 f1 f7 26 24 72 f2 c5 63 b0 3f 88 ..H.V..&$r..c.?. 230s | XCBC: E[n-1] 230s | fe 1f 63 e9 65 1a 4b bb 3c cc cd 0d cc 83 e4 30 ..c.e.K.<......0 230s | XCBC: M[n] 230s | 10 11 12 13 .... 230s | XCBC: M[n] 230s | 10 11 12 13 .... 230s | XCBC: M[n]:80...^E[n-1]^K3 230s | 60 f9 39 21 b3 eb bc 9d 18 be 3f c8 af 33 db b8 `.9!......?..3.. 230s | XCBC: MAC 230s | 0f a0 87 af 7d 86 6e 76 53 43 4e 60 2f dd e8 35 ....}.nvSCN`/..5 230s | CONCATENATE_DATA_AND_BASE: 230s | target: EXTRACT_KEY_FROM_KEY 230s | base: base-key@0x37d516aa290 (16-bytes, AES_KEY_GEN) 230s | params: 16-bytes@0x7fffe4c0b520 230s | key-offset: 0, key-size: 16 230s | EXTRACT_KEY_FROM_KEY: 230s | target: EXTRACT_KEY_FROM_KEY 230s | key_size: 16-bytes 230s | base: base-key@0x37d516ae6e0 (32-bytes, EXTRACT_KEY_FROM_KEY) 230s | operation: FLAGS_ONLY 230s | params: 8-bytes@0x7fffe4c0b458 230s | PRF symkey interface PRF AES_XCBC final-key@0x37d516ae040 (size 16) 230s | PRF symkey interface: key-key@0x37d516ae040 (16-bytes, EXTRACT_KEY_FROM_KEY) 230s | output: symkey-key@0x37d516ae040 (16-bytes, EXTRACT_KEY_FROM_KEY) 230s | RFC 4434 Test Case AES-XCBC-PRF-128 with 20-byte input (key length 10) extracting all 16 bytes of key@0x37d516ae040 230s | RFC 4434 Test Case AES-XCBC-PRF-128 with 20-byte input (key length 10): symkey-key@0x37d516ae040 (16-bytes, EXTRACT_KEY_FROM_KEY) 230s | sizeof bytes 16 230s | wrapper: (SECItemType)-457133840: 04 70 48 f9 b8 70 55 00 54 28 1c de fd 33 4e a7 230s | RFC 4434 Test Case AES-XCBC-PRF-128 with 20-byte input (key length 10) extracted len 16 bytes at 0x37d516a9fc0 230s | unwrapped: 230s | 0f a0 87 af 7d 86 6e 76 53 43 4e 60 2f dd e8 35 ....}.nvSCN`/..5 230s | verify_bytes() RFC 4434 Test Case AES-XCBC-PRF-128 with 20-byte input (key length 10): symkey: ok 230s ipsec algparse: RFC 4434 Test Case AES-XCBC-PRF-128 with 20-byte input (key length 18) 230s | decode_to_chunk() test_prf_vector: input "0x000102030405060708090a0b0c0d0e0fedcb" 230s | decode_to_chunk() output: 230s | 00 01 02 03 04 05 06 07 08 09 0a 0b 0c 0d 0e 0f ................ 230s | ed cb .. 230s | decode_to_chunk() test_prf_vector: input "0x000102030405060708090a0b0c0d0e0f10111213" 230s | decode_to_chunk() output: 230s | 00 01 02 03 04 05 06 07 08 09 0a 0b 0c 0d 0e 0f ................ 230s | 10 11 12 13 .... 230s | decode_to_chunk() test_prf_vector: input "0x8cd3c93ae598a9803006ffb67c40e9e4" 230s | decode_to_chunk() output: 230s | 8c d3 c9 3a e5 98 a9 80 30 06 ff b6 7c 40 e9 e4 ...:....0...|@.. 230s | PRF chunk interface PRF AES_XCBC init key hunk 0x37d516ad5d0 (length 18) 230s | 00 01 02 03 04 05 06 07 08 09 0a 0b 0c 0d 0e 0f ................ 230s | ed cb .. 230s | CONCATENATE_DATA_AND_BASE: 230s | target: EXTRACT_KEY_FROM_KEY 230s | base: base-key@0x37d516aa290 (16-bytes, AES_KEY_GEN) 230s | params: 16-bytes@0x7fffe4c0b510 230s | key-offset: 0, key-size: 18 230s | EXTRACT_KEY_FROM_KEY: 230s | target: EXTRACT_KEY_FROM_KEY 230s | key_size: 18-bytes 230s | base: base-key@0x37d516abbb0 (34-bytes, EXTRACT_KEY_FROM_KEY) 230s | operation: FLAGS_ONLY 230s | params: 8-bytes@0x7fffe4c0b448 230s | XCBC: Key 18>16 too big, rehashing to size 230s | CONCATENATE_DATA_AND_BASE: 230s | target: EXTRACT_KEY_FROM_KEY 230s | base: base-key@0x37d516aa290 (16-bytes, AES_KEY_GEN) 230s | params: 16-bytes@0x7fffe4c0b370 230s | key-offset: 0, key-size: 16 230s | EXTRACT_KEY_FROM_KEY: 230s | target: AES_ECB 230s | flags: SIGN 230s | key_size: 16-bytes 230s | base: base-key@0x37d516ae380 (32-bytes, EXTRACT_KEY_FROM_KEY) 230s | operation: FLAGS_ONLY 230s | params: 8-bytes@0x7fffe4c0b378 230s | draft_chunk extracting all 18 bytes of key@0x37d516ae040 230s | draft_chunk: symkey-key@0x37d516ae040 (18-bytes, EXTRACT_KEY_FROM_KEY) 230s | sizeof bytes 32 230s | wrapper: (SECItemType)-457133008: 66 51 02 58 c1 93 9d 55 1b 09 03 bb 5e 3c b1 07 b6 12 54 44 98 cf 5b d4 10 58 c4 21 54 bb 65 57 230s | draft_chunk extracted len 32 bytes at 0x37d516aa260 230s | unwrapped: 230s | 00 01 02 03 04 05 06 07 08 09 0a 0b 0c 0d 0e 0f ................ 230s | ed cb 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................ 230s | XCBC: data 230s | 00 01 02 03 04 05 06 07 08 09 0a 0b 0c 0d 0e 0f ................ 230s | ed cb .. 230s | K extracting all 16 bytes of key@0x37d516abbb0 230s | K: symkey-key@0x37d516abbb0 (16-bytes, AES_ECB) 230s | sizeof bytes 16 230s | wrapper: (SECItemType)18: ff b3 66 60 ff 98 7f 43 69 08 59 fa e7 81 48 2c 230s | K extracted len 16 bytes at 0x37d516ae6c0 230s | unwrapped: 230s | 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................ 230s | XCBC: K: 230s | 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................ 230s | XCBC: K1 230s | e1 4d 5d 0e e2 77 15 df 08 b4 15 2b a2 3d a8 e0 .M]..w.....+.=.. 230s | CONCATENATE_DATA_AND_BASE: 230s | target: EXTRACT_KEY_FROM_KEY 230s | base: base-key@0x37d516aa290 (16-bytes, AES_KEY_GEN) 230s | params: 16-bytes@0x7fffe4c0b230 230s | key-offset: 0, key-size: 16 230s | EXTRACT_KEY_FROM_KEY: 230s | target: AES_ECB 230s | flags: SIGN 230s | key_size: 16-bytes 230s | base: base-key@0x37d516ad2a0 (32-bytes, EXTRACT_KEY_FROM_KEY) 230s | operation: FLAGS_ONLY 230s | params: 8-bytes@0x7fffe4c0b238 230s | Computing E[2] using K3 230s | XCBC: K3 230s | 8d 34 ef cb 3b d5 45 ca 06 2a ec df ef 7c 0b fa .4..;.E..*...|.. 230s | XCBC: E[n-1] 230s | 0b 72 b2 ae 0a 37 79 81 75 6a d5 9c 79 c0 e6 96 .r...7y.uj..y... 230s | XCBC: M[n] 230s | ed cb .. 230s | XCBC: M[n] 230s | ed cb .. 230s | XCBC: M[n]:80...^E[n-1]^K3 230s | 6b 8d dd 65 31 e2 3c 4b 73 40 39 43 96 bc ed 6c k..e1.16 too big, rehashing to size 230s | CONCATENATE_DATA_AND_BASE: 230s | target: EXTRACT_KEY_FROM_KEY 230s | base: base-key@0x37d516aa290 (16-bytes, AES_KEY_GEN) 230s | params: 16-bytes@0x7fffe4c0b3c0 230s | key-offset: 0, key-size: 16 230s | EXTRACT_KEY_FROM_KEY: 230s | target: AES_ECB 230s | flags: SIGN 230s | key_size: 16-bytes 230s | base: base-key@0x37d516abbb0 (32-bytes, EXTRACT_KEY_FROM_KEY) 230s | operation: FLAGS_ONLY 230s | params: 8-bytes@0x7fffe4c0b3c8 230s | draft_chunk extracting all 18 bytes of key@0x37d516ae380 230s | draft_chunk: symkey-key@0x37d516ae380 (18-bytes, EXTRACT_KEY_FROM_KEY) 230s | sizeof bytes 32 230s | wrapper: (SECItemType)-457132928: 66 51 02 58 c1 93 9d 55 1b 09 03 bb 5e 3c b1 07 b6 12 54 44 98 cf 5b d4 10 58 c4 21 54 bb 65 57 230s | draft_chunk extracted len 32 bytes at 0x37d516adc20 230s | unwrapped: 230s | 00 01 02 03 04 05 06 07 08 09 0a 0b 0c 0d 0e 0f ................ 230s | ed cb 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................ 230s | XCBC: data 230s | 00 01 02 03 04 05 06 07 08 09 0a 0b 0c 0d 0e 0f ................ 230s | ed cb .. 230s | K extracting all 16 bytes of key@0x37d516ae040 230s | K: symkey-key@0x37d516ae040 (16-bytes, AES_ECB) 230s | sizeof bytes 16 230s | wrapper: (SECItemType)18: ff b3 66 60 ff 98 7f 43 69 08 59 fa e7 81 48 2c 230s | K extracted len 16 bytes at 0x37d516ae020 230s | unwrapped: 230s | 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................ 230s | XCBC: K: 230s | 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................ 230s | XCBC: K1 230s | e1 4d 5d 0e e2 77 15 df 08 b4 15 2b a2 3d a8 e0 .M]..w.....+.=.. 230s | CONCATENATE_DATA_AND_BASE: 230s | target: EXTRACT_KEY_FROM_KEY 230s | base: base-key@0x37d516aa290 (16-bytes, AES_KEY_GEN) 230s | params: 16-bytes@0x7fffe4c0b280 230s | key-offset: 0, key-size: 16 230s | EXTRACT_KEY_FROM_KEY: 230s | target: AES_ECB 230s | flags: SIGN 230s | key_size: 16-bytes 230s | base: base-key@0x37d516ad2a0 (32-bytes, EXTRACT_KEY_FROM_KEY) 230s | operation: FLAGS_ONLY 230s | params: 8-bytes@0x7fffe4c0b288 230s | Computing E[2] using K3 230s | XCBC: K3 230s | 8d 34 ef cb 3b d5 45 ca 06 2a ec df ef 7c 0b fa .4..;.E..*...|.. 230s | XCBC: E[n-1] 230s | 0b 72 b2 ae 0a 37 79 81 75 6a d5 9c 79 c0 e6 96 .r...7y.uj..y... 230s | XCBC: M[n] 230s | ed cb .. 230s | XCBC: M[n] 230s | ed cb .. 230s | XCBC: M[n]:80...^E[n-1]^K3 230s | 6b 8d dd 65 31 e2 3c 4b 73 40 39 43 96 bc ed 6c k..e1.j.....n1.].8 230s | PRF chunk interface PRF HMAC_MD5 init key hunk 0x37d516abae0 (length 4) 230s | 4a 65 66 65 Jefe 230s | CONCATENATE_DATA_AND_BASE: 230s | target: EXTRACT_KEY_FROM_KEY 230s | base: base-key@0x37d516aa290 (16-bytes, AES_KEY_GEN) 230s | params: 16-bytes@0x7fffe4c0b470 230s | key-offset: 0, key-size: 4 230s | EXTRACT_KEY_FROM_KEY: 230s | target: MD5_HMAC 230s | flags: SIGN 230s | key_size: 4-bytes 230s | base: base-key@0x37d516ad2a0 (20-bytes, EXTRACT_KEY_FROM_KEY) 230s | operation: FLAGS_ONLY 230s | params: 8-bytes@0x7fffe4c0b478 230s | PRF chunk interface prf: created HMAC_MD5 context 0x37d516ad610 from key-key@0x37d516ae380 230s | PRF chunk interface prf: begin HMAC_MD5 with context 0x37d516ad610 from key-key@0x37d516ae380 230s | PRF chunk interface PRF HMAC_MD5 0x37d516adcb0 230s | PRF chunk interface PRF HMAC_MD5 update message (0x37d516adc20 length 28) 230s | 77 68 61 74 20 64 6f 20 79 61 20 77 61 6e 74 20 what do ya want 230s | 66 6f 72 20 6e 6f 74 68 69 6e 67 3f for nothing? 230s | PRF chunk interface PRF HMAC_MD5 final length 16 230s | 75 0c 78 3e 6a b0 b5 03 ea a8 6e 31 0a 5d b7 38 u.x>j.....n1.].8 230s | chunk output 230s | 75 0c 78 3e 6a b0 b5 03 ea a8 6e 31 0a 5d b7 38 u.x>j.....n1.].8 230s | verify_bytes() RFC 2104: MD5_HMAC test 2: prf OUT: ok 230s | CONCATENATE_DATA_AND_BASE: 230s | target: EXTRACT_KEY_FROM_KEY 230s | base: base-key@0x37d516aa290 (16-bytes, AES_KEY_GEN) 230s | params: 16-bytes@0x7fffe4c0b600 230s | key-offset: 0, key-size: 4 230s | EXTRACT_KEY_FROM_KEY: 230s | target: EXTRACT_KEY_FROM_KEY 230s | key_size: 4-bytes 230s | base: base-key@0x37d516ad2a0 (20-bytes, EXTRACT_KEY_FROM_KEY) 230s | operation: FLAGS_ONLY 230s | params: 8-bytes@0x7fffe4c0b538 230s | PRF symkey interface PRF HMAC_MD5 init key symkey-key@0x37d516ae380 (size 4) 230s | PRF symkey interface: key symkey-key@0x37d516ae380 (4-bytes, EXTRACT_KEY_FROM_KEY) 230s | key-offset: 0, key-size: 4 230s | EXTRACT_KEY_FROM_KEY: 230s | target: MD5_HMAC 230s | flags: SIGN 230s | key_size: 4-bytes 230s | base: base-key@0x37d516ae380 (4-bytes, EXTRACT_KEY_FROM_KEY) 230s | operation: FLAGS_ONLY 230s | params: 8-bytes@0x7fffe4c0b518 230s | PRF symkey interface prf: created HMAC_MD5 context 0x37d516ae820 from key symkey-key@0x37d516ad2a0 230s | PRF symkey interface prf: begin HMAC_MD5 with context 0x37d516ae820 from key symkey-key@0x37d516ad2a0 230s | PRF symkey interface PRF HMAC_MD5 0x37d516aa230 230s | CONCATENATE_DATA_AND_BASE: 230s | target: EXTRACT_KEY_FROM_KEY 230s | base: base-key@0x37d516aa290 (16-bytes, AES_KEY_GEN) 230s | params: 16-bytes@0x7fffe4c0b600 230s | key-offset: 0, key-size: 28 230s | EXTRACT_KEY_FROM_KEY: 230s | target: EXTRACT_KEY_FROM_KEY 230s | key_size: 28-bytes 230s | base: base-key@0x37d516abbb0 (44-bytes, EXTRACT_KEY_FROM_KEY) 230s | operation: FLAGS_ONLY 230s | params: 8-bytes@0x7fffe4c0b538 230s | PRF symkey interface PRF HMAC_MD5 update symkey message-key@0x37d516ae040 (size 28) 230s | PRF symkey interface: symkey message-key@0x37d516ae040 (28-bytes, EXTRACT_KEY_FROM_KEY) 230s | nss hmac digest hack extracting all 28 bytes of key@0x37d516ae040 230s | nss hmac digest hack: symkey-key@0x37d516ae040 (28-bytes, EXTRACT_KEY_FROM_KEY) 230s | sizeof bytes 32 230s | wrapper: (SECItemType)1362539688: 35 e9 1a 3a 4b b2 d2 0a f2 c1 c3 12 01 be 06 ef ca 83 9b ba 73 cb ba 06 af 11 b8 91 d0 c0 62 fd 230s | nss hmac digest hack extracted len 32 bytes at 0x37d516ad210 230s | unwrapped: 230s | 77 68 61 74 20 64 6f 20 79 61 20 77 61 6e 74 20 what do ya want 230s | 66 6f 72 20 6e 6f 74 68 69 6e 67 3f 00 00 00 00 for nothing?.... 230s | CONCATENATE_DATA_AND_BASE: 230s | target: EXTRACT_KEY_FROM_KEY 230s | base: base-key@0x37d516aa290 (16-bytes, AES_KEY_GEN) 230s | params: 16-bytes@0x7fffe4c0b530 230s | key-offset: 0, key-size: 16 230s | EXTRACT_KEY_FROM_KEY: 230s | target: EXTRACT_KEY_FROM_KEY 230s | key_size: 16-bytes 230s | base: base-key@0x37d516abbb0 (32-bytes, EXTRACT_KEY_FROM_KEY) 230s | operation: FLAGS_ONLY 230s | params: 8-bytes@0x7fffe4c0b468 230s | PRF symkey interface PRF HMAC_MD5 final-key@0x37d516ad2a0 (size 16) 230s | PRF symkey interface: key-key@0x37d516ad2a0 (16-bytes, EXTRACT_KEY_FROM_KEY) 230s | output: symkey-key@0x37d516ad2a0 (16-bytes, EXTRACT_KEY_FROM_KEY) 230s | RFC 2104: MD5_HMAC test 2 extracting all 16 bytes of key@0x37d516ad2a0 230s | RFC 2104: MD5_HMAC test 2: symkey-key@0x37d516ad2a0 (16-bytes, EXTRACT_KEY_FROM_KEY) 230s | sizeof bytes 16 230s | wrapper: (SECItemType)-457133840: 08 88 b0 dd ac 13 73 18 f7 0d 04 77 f3 a2 ba 09 230s | RFC 2104: MD5_HMAC test 2 extracted len 16 bytes at 0x37d516aa160 230s | unwrapped: 230s | 75 0c 78 3e 6a b0 b5 03 ea a8 6e 31 0a 5d b7 38 u.x>j.....n1.].8 230s | verify_bytes() RFC 2104: MD5_HMAC test 2: symkey: ok 230s ipsec algparse: RFC 2104: MD5_HMAC test 3 230s | decode_to_chunk() test_prf_vector: input "0xAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAA" 230s | decode_to_chunk() output: 230s | aa aa aa aa aa aa aa aa aa aa aa aa aa aa aa aa ................ 230s | decode_to_chunk() test_prf_vector: input "0xDDDDDDDDDDDDDDDDDDDDDDDDDDDDDDDDDDDDDDDDDDDDDDDDDDDDDDDDDDDDDDDDDDDDDDDDDDDDDDDDDDDDDDDDDDDDDDDDDDDD" 230s | decode_to_chunk() output: 230s | dd dd dd dd dd dd dd dd dd dd dd dd dd dd dd dd ................ 230s | dd dd dd dd dd dd dd dd dd dd dd dd dd dd dd dd ................ 230s | dd dd dd dd dd dd dd dd dd dd dd dd dd dd dd dd ................ 230s | dd dd .. 230s | decode_to_chunk() test_prf_vector: input "0x56be34521d144c88dbb8c733f0e8b3f6" 230s | decode_to_chunk() output: 230s | 56 be 34 52 1d 14 4c 88 db b8 c7 33 f0 e8 b3 f6 V.4R..L....3.... 230s | PRF chunk interface PRF HMAC_MD5 init key hunk 0x37d516ad8e0 (length 16) 230s | aa aa aa aa aa aa aa aa aa aa aa aa aa aa aa aa ................ 230s | CONCATENATE_DATA_AND_BASE: 230s | target: EXTRACT_KEY_FROM_KEY 230s | base: base-key@0x37d516aa290 (16-bytes, AES_KEY_GEN) 230s | params: 16-bytes@0x7fffe4c0b470 230s | key-offset: 0, key-size: 16 230s | EXTRACT_KEY_FROM_KEY: 230s | target: MD5_HMAC 230s | flags: SIGN 230s | key_size: 16-bytes 230s | base: base-key@0x37d516ae380 (32-bytes, EXTRACT_KEY_FROM_KEY) 230s | operation: FLAGS_ONLY 230s | params: 8-bytes@0x7fffe4c0b478 230s | PRF chunk interface prf: created HMAC_MD5 context 0x37d516ae770 from key-key@0x37d516ad2a0 230s | PRF chunk interface prf: begin HMAC_MD5 with context 0x37d516ae770 from key-key@0x37d516ad2a0 230s | PRF chunk interface PRF HMAC_MD5 0x37d516aa260 230s | PRF chunk interface PRF HMAC_MD5 update message (0x37d516adbe0 length 50) 230s | dd dd dd dd dd dd dd dd dd dd dd dd dd dd dd dd ................ 230s | dd dd dd dd dd dd dd dd dd dd dd dd dd dd dd dd ................ 230s | dd dd dd dd dd dd dd dd dd dd dd dd dd dd dd dd ................ 230s | dd dd .. 230s | PRF chunk interface PRF HMAC_MD5 final length 16 230s | 56 be 34 52 1d 14 4c 88 db b8 c7 33 f0 e8 b3 f6 V.4R..L....3.... 230s | chunk output 230s | 56 be 34 52 1d 14 4c 88 db b8 c7 33 f0 e8 b3 f6 V.4R..L....3.... 230s | verify_bytes() RFC 2104: MD5_HMAC test 3: prf OUT: ok 230s | CONCATENATE_DATA_AND_BASE: 230s | target: EXTRACT_KEY_FROM_KEY 230s | base: base-key@0x37d516aa290 (16-bytes, AES_KEY_GEN) 230s | params: 16-bytes@0x7fffe4c0b600 230s | key-offset: 0, key-size: 16 230s | EXTRACT_KEY_FROM_KEY: 230s | target: EXTRACT_KEY_FROM_KEY 230s | key_size: 16-bytes 230s | base: base-key@0x37d516ae380 (32-bytes, EXTRACT_KEY_FROM_KEY) 230s | operation: FLAGS_ONLY 230s | params: 8-bytes@0x7fffe4c0b538 230s | PRF symkey interface PRF HMAC_MD5 init key symkey-key@0x37d516ad2a0 (size 16) 230s | PRF symkey interface: key symkey-key@0x37d516ad2a0 (16-bytes, EXTRACT_KEY_FROM_KEY) 230s | key-offset: 0, key-size: 16 230s | EXTRACT_KEY_FROM_KEY: 230s | target: MD5_HMAC 230s | flags: SIGN 230s | key_size: 16-bytes 230s | base: base-key@0x37d516ad2a0 (16-bytes, EXTRACT_KEY_FROM_KEY) 230s | operation: FLAGS_ONLY 230s | params: 8-bytes@0x7fffe4c0b518 230s | PRF symkey interface prf: created HMAC_MD5 context 0x37d516b2b10 from key symkey-key@0x37d516ae380 230s | PRF symkey interface prf: begin HMAC_MD5 with context 0x37d516b2b10 from key symkey-key@0x37d516ae380 230s | PRF symkey interface PRF HMAC_MD5 0x37d516adc20 230s | CONCATENATE_DATA_AND_BASE: 230s | target: EXTRACT_KEY_FROM_KEY 230s | base: base-key@0x37d516aa290 (16-bytes, AES_KEY_GEN) 230s | params: 16-bytes@0x7fffe4c0b600 230s | key-offset: 0, key-size: 50 230s | EXTRACT_KEY_FROM_KEY: 230s | target: EXTRACT_KEY_FROM_KEY 230s | key_size: 50-bytes 230s | base: base-key@0x37d516abbb0 (66-bytes, EXTRACT_KEY_FROM_KEY) 230s | operation: FLAGS_ONLY 230s | params: 8-bytes@0x7fffe4c0b538 230s | PRF symkey interface PRF HMAC_MD5 update symkey message-key@0x37d516ae040 (size 50) 230s | PRF symkey interface: symkey message-key@0x37d516ae040 (50-bytes, EXTRACT_KEY_FROM_KEY) 230s | nss hmac digest hack extracting all 50 bytes of key@0x37d516ae040 230s | nss hmac digest hack: symkey-key@0x37d516ae040 (50-bytes, EXTRACT_KEY_FROM_KEY) 230s | sizeof bytes 64 230s | wrapper: (SECItemType)1362539688: e1 da 8d d2 4e f7 b9 b0 9d 5d 36 6f 79 35 60 fa e1 da 8d d2 4e f7 b9 b0 9d 5d 36 6f 79 35 60 fa e1 da 8d d2 4e f7 b9 b0 9d 5d 36 6f 79 35 60 fa 40 f1 5a 5e d6 ee 12 71 2e 02 22 6f a6 81 3a 0c 230s | nss hmac digest hack extracted len 64 bytes at 0x37d516adce0 230s | unwrapped: 230s | dd dd dd dd dd dd dd dd dd dd dd dd dd dd dd dd ................ 230s | dd dd dd dd dd dd dd dd dd dd dd dd dd dd dd dd ................ 230s | dd dd dd dd dd dd dd dd dd dd dd dd dd dd dd dd ................ 230s | dd dd 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................ 230s | CONCATENATE_DATA_AND_BASE: 230s | target: EXTRACT_KEY_FROM_KEY 230s | base: base-key@0x37d516aa290 (16-bytes, AES_KEY_GEN) 230s | params: 16-bytes@0x7fffe4c0b530 230s | key-offset: 0, key-size: 16 230s | EXTRACT_KEY_FROM_KEY: 230s | target: EXTRACT_KEY_FROM_KEY 230s | key_size: 16-bytes 230s | base: base-key@0x37d516abbb0 (32-bytes, EXTRACT_KEY_FROM_KEY) 230s | operation: FLAGS_ONLY 230s | params: 8-bytes@0x7fffe4c0b468 230s | PRF symkey interface PRF HMAC_MD5 final-key@0x37d516ae380 (size 16) 230s | PRF symkey interface: key-key@0x37d516ae380 (16-bytes, EXTRACT_KEY_FROM_KEY) 230s | output: symkey-key@0x37d516ae380 (16-bytes, EXTRACT_KEY_FROM_KEY) 230s | RFC 2104: MD5_HMAC test 3 extracting all 16 bytes of key@0x37d516ae380 230s | RFC 2104: MD5_HMAC test 3: symkey-key@0x37d516ae380 (16-bytes, EXTRACT_KEY_FROM_KEY) 230s | sizeof bytes 16 230s | wrapper: (SECItemType)-457133840: 97 5a 23 18 a6 65 b2 a4 dd d2 e8 1e 99 21 31 9d 230s | RFC 2104: MD5_HMAC test 3 extracted len 16 bytes at 0x37d516adeb0 230s | unwrapped: 230s | 56 be 34 52 1d 14 4c 88 db b8 c7 33 f0 e8 b3 f6 V.4R..L....3.... 230s | verify_bytes() RFC 2104: MD5_HMAC test 3: symkey: ok 230s ipsec algparse: testing HMAC_SHA1: 230s ipsec algparse: CAVP: IKEv2 key derivation with HMAC-SHA1 230s | decode_to_chunk() test_kdf_vector: input "0x32b50d5f4a3763f3" 230s | decode_to_chunk() output: 230s | 32 b5 0d 5f 4a 37 63 f3 2.._J7c. 230s | decode_to_chunk() test_kdf_vector: input "0x9206a04b26564cb1" 230s | decode_to_chunk() output: 230s | 92 06 a0 4b 26 56 4c b1 ...K&VL. 230s | decode_to_chunk() test_kdf_vector: input "0x34c9e7c188868785" 230s | decode_to_chunk() output: 230s | 34 c9 e7 c1 88 86 87 85 4....... 230s | decode_to_chunk() test_kdf_vector: input "0x3ff77d760d2b2199" 230s | decode_to_chunk() output: 230s | 3f f7 7d 76 0d 2b 21 99 ?.}v.+!. 230s | decode_to_chunk() test_kdf_vector: input "0x4b2c1f971981a8ad8d0abeafabf38cf75fc8349c148142465ed9c8b516b8be52" 230s | decode_to_chunk() output: 230s | 4b 2c 1f 97 19 81 a8 ad 8d 0a be af ab f3 8c f7 K,.............. 230s | 5f c8 34 9c 14 81 42 46 5e d9 c8 b5 16 b8 be 52 _.4...BF^......R 230s | decode_to_chunk() test_kdf_vector: input "0x863f3c9d06efd39d2b907b97f8699e5dd5251ef64a2a176f36ee40c87d4f9330" 230s | decode_to_chunk() output: 230s | 86 3f 3c 9d 06 ef d3 9d 2b 90 7b 97 f8 69 9e 5d .?<.....+.{..i.] 230s | d5 25 1e f6 4a 2a 17 6f 36 ee 40 c8 7d 4f 93 30 .%..J*.o6.@.}O.0 230s | decode_to_chunk() test_kdf_vector: input "0xa9a7b222b59f8f48645f28a1db5b5f5d7479cba7" 230s | decode_to_chunk() output: 230s | a9 a7 b2 22 b5 9f 8f 48 64 5f 28 a1 db 5b 5f 5d ..."...Hd_(..[_] 230s | 74 79 cb a7 ty.. 230s | decode_to_chunk() test_kdf_vector: input "0x63e81194946ebd05df7df5ebf5d8750056bf1f1d" 230s | decode_to_chunk() output: 230s | 63 e8 11 94 94 6e bd 05 df 7d f5 eb f5 d8 75 00 c....n...}....u. 230s | 56 bf 1f 1d V... 230s | decode_to_chunk() test_kdf_vector: input "0xa14293677cc80ff8f9cc0eee30d895da9d8f405666e30ef0dfcb63c634a46002a2a63080e514a062768b76606f9fa5e992204fc5a670bde3f10d6b027113936a5c55b648a194ae587b0088d52204b702c979fa280870d2ed41efa9c549fd11198af1670b143d384bd275c5f594cf266b05ebadca855e4249520a441a81157435a7a56cc4" 230s | decode_to_chunk() output: 230s | a1 42 93 67 7c c8 0f f8 f9 cc 0e ee 30 d8 95 da .B.g|.......0... 230s | 9d 8f 40 56 66 e3 0e f0 df cb 63 c6 34 a4 60 02 ..@Vf.....c.4.`. 230s | a2 a6 30 80 e5 14 a0 62 76 8b 76 60 6f 9f a5 e9 ..0....bv.v`o... 230s | 92 20 4f c5 a6 70 bd e3 f1 0d 6b 02 71 13 93 6a . O..p....k.q..j 230s | 5c 55 b6 48 a1 94 ae 58 7b 00 88 d5 22 04 b7 02 \U.H...X{..."... 230s | c9 79 fa 28 08 70 d2 ed 41 ef a9 c5 49 fd 11 19 .y.(.p..A...I... 230s | 8a f1 67 0b 14 3d 38 4b d2 75 c5 f5 94 cf 26 6b ..g..=8K.u....&k 230s | 05 eb ad ca 85 5e 42 49 52 0a 44 1a 81 15 74 35 .....^BIR.D...t5 230s | a7 a5 6c c4 ..l. 230s | CONCATENATE_DATA_AND_BASE: 230s | target: EXTRACT_KEY_FROM_KEY 230s | base: base-key@0x37d516aa290 (16-bytes, AES_KEY_GEN) 230s | params: 16-bytes@0x7fffe4c0b5d0 230s | key-offset: 0, key-size: 32 230s | EXTRACT_KEY_FROM_KEY: 230s | target: EXTRACT_KEY_FROM_KEY 230s | key_size: 32-bytes 230s | base: base-key@0x37d516ad2a0 (48-bytes, EXTRACT_KEY_FROM_KEY) 230s | operation: FLAGS_ONLY 230s | params: 8-bytes@0x7fffe4c0b508 230s | NSS_IKE_PRF_DERIVE: 230s | target: NSS_IKE_PRF_PLUS_DERIVE 230s | base: base-key@0x37d516ae380 (32-bytes, EXTRACT_KEY_FROM_KEY) 230s | params: 56-bytes@0x7fffe4c0b5a0 230s | CAVP: IKEv2 key derivation with HMAC-SHA1 extracting all 20 bytes of key@0x37d516ad2a0 230s | CAVP: IKEv2 key derivation with HMAC-SHA1: symkey-key@0x37d516ad2a0 (20-bytes, NSS_IKE_PRF_PLUS_DERIVE) 230s | sizeof bytes 32 230s | wrapper: (SECItemType)1936548210: be 3f d9 eb f5 b9 e0 d4 6e 17 27 a2 7d 0c 76 37 aa 74 37 27 7d 3d 6e 8a 2d ab 67 18 b1 1e fe f3 230s | CAVP: IKEv2 key derivation with HMAC-SHA1 extracted len 32 bytes at 0x37d516adcb0 230s | unwrapped: 230s | a9 a7 b2 22 b5 9f 8f 48 64 5f 28 a1 db 5b 5f 5d ..."...Hd_(..[_] 230s | 74 79 cb a7 00 00 00 00 00 00 00 00 00 00 00 00 ty.............. 230s | verify_bytes() CAVP: IKEv2 key derivation with HMAC-SHA1: skeyseed: ok 230s | NSS_IKE_PRF_PLUS_DERIVE: 230s | target: EXTRACT_KEY_FROM_KEY 230s | key_size: 132-bytes 230s | base: base-key@0x37d516ad2a0 (20-bytes, NSS_IKE_PRF_PLUS_DERIVE) 230s | params: 40-bytes@0x7fffe4c0b4f0 230s | CAVP: IKEv2 key derivation with HMAC-SHA1 extracting all 132 bytes of key@0x37d516ae040 230s | CAVP: IKEv2 key derivation with HMAC-SHA1: symkey-key@0x37d516ae040 (132-bytes, EXTRACT_KEY_FROM_KEY) 230s | sizeof bytes 144 230s | wrapper: (SECItemType)540684609: c7 9d 79 25 2f 85 ad 26 c6 be 1a 64 f4 74 ac 3d 67 b7 4b 61 f1 45 8a 88 3e d6 9e 04 3a 25 2c dc c9 e2 15 d2 bd 7b 0a 01 9f 0e 44 9b ed 5e 95 b8 13 18 f5 75 ea 80 2d 82 c7 3f 83 6d ec ed 18 b5 b5 8d 98 fc ea 70 3a 57 6f b9 08 73 2a 5c 0a 46 31 74 3d 61 be 14 fc 6a d0 47 db a8 33 33 cb ea 48 3c cf 77 e8 3d ed 34 bb c0 29 b9 04 8c 20 0d be 4c 22 27 b9 dd 15 82 00 2a 59 55 70 1e ea f5 b4 3d bd 8f ad 6f 4c 8e 56 ac 73 83 d2 09 1d 4f 230s | CAVP: IKEv2 key derivation with HMAC-SHA1 extracted len 144 bytes at 0x37d516b49d0 230s | unwrapped: 230s | a1 42 93 67 7c c8 0f f8 f9 cc 0e ee 30 d8 95 da .B.g|.......0... 230s | 9d 8f 40 56 66 e3 0e f0 df cb 63 c6 34 a4 60 02 ..@Vf.....c.4.`. 230s | a2 a6 30 80 e5 14 a0 62 76 8b 76 60 6f 9f a5 e9 ..0....bv.v`o... 230s | 92 20 4f c5 a6 70 bd e3 f1 0d 6b 02 71 13 93 6a . O..p....k.q..j 230s | 5c 55 b6 48 a1 94 ae 58 7b 00 88 d5 22 04 b7 02 \U.H...X{..."... 230s | c9 79 fa 28 08 70 d2 ed 41 ef a9 c5 49 fd 11 19 .y.(.p..A...I... 230s | 8a f1 67 0b 14 3d 38 4b d2 75 c5 f5 94 cf 26 6b ..g..=8K.u....&k 230s | 05 eb ad ca 85 5e 42 49 52 0a 44 1a 81 15 74 35 .....^BIR.D...t5 230s | a7 a5 6c c4 00 00 00 00 00 00 00 00 00 00 00 00 ..l............. 230s | verify_bytes() CAVP: IKEv2 key derivation with HMAC-SHA1: DKM: ok 230s | key-offset: 0, key-size: 20 230s | EXTRACT_KEY_FROM_KEY: 230s | target: EXTRACT_KEY_FROM_KEY 230s | key_size: 20-bytes 230s | base: base-key@0x37d516ae040 (132-bytes, EXTRACT_KEY_FROM_KEY) 230s | operation: FLAGS_ONLY 230s | params: 8-bytes@0x7fffe4c0b5f8 230s | CONCATENATE_DATA_AND_BASE: 230s | target: EXTRACT_KEY_FROM_KEY 230s | base: base-key@0x37d516aa290 (16-bytes, AES_KEY_GEN) 230s | params: 16-bytes@0x7fffe4c0b5d0 230s | key-offset: 0, key-size: 32 230s | EXTRACT_KEY_FROM_KEY: 230s | target: EXTRACT_KEY_FROM_KEY 230s | key_size: 32-bytes 230s | base: base-key@0x37d516ae180 (48-bytes, EXTRACT_KEY_FROM_KEY) 230s | operation: FLAGS_ONLY 230s | params: 8-bytes@0x7fffe4c0b508 230s | NSS_IKE_PRF_DERIVE: 230s | target: NSS_IKE_PRF_PLUS_DERIVE 230s | base: base-key@0x37d516abbb0 (20-bytes, EXTRACT_KEY_FROM_KEY) 230s | params: 56-bytes@0x7fffe4c0b5b0 230s | CAVP: IKEv2 key derivation with HMAC-SHA1 extracting all 20 bytes of key@0x37d516ae180 230s | CAVP: IKEv2 key derivation with HMAC-SHA1: symkey-key@0x37d516ae180 (20-bytes, NSS_IKE_PRF_PLUS_DERIVE) 230s | sizeof bytes 32 230s | wrapper: (SECItemType)1936548210: 5c 96 0e b4 ee d1 09 37 58 f3 b5 f4 47 f7 56 16 dc b2 9b 84 fe f0 d5 93 29 11 b3 ad 42 3d fa 92 230s | CAVP: IKEv2 key derivation with HMAC-SHA1 extracted len 32 bytes at 0x37d516aa260 230s | unwrapped: 230s | 63 e8 11 94 94 6e bd 05 df 7d f5 eb f5 d8 75 00 c....n...}....u. 230s | 56 bf 1f 1d 00 00 00 00 00 00 00 00 00 00 00 00 V............... 230s | verify_bytes() CAVP: IKEv2 key derivation with HMAC-SHA1: skeyseed_rekey: ok 230s ipsec algparse: leak detective found no leaks 230s /usr/libexec/ipsec/pluto: adjusting nssdir to /tmp/tmp.ki2XHKnHYp 230s /usr/libexec/ipsec/pluto: selftest: skipping lock 230s /usr/libexec/ipsec/pluto: selftest: skipping control socket 230s /usr/libexec/ipsec/pluto: selftest: skipping fork 230s Starting Pluto (Libreswan Version 5.2 IKEv2 IKEv1 XFRM XFRMI esp-hw-offload FORK PTHREAD_SETSCHEDPRIO NSS (IPsec profile) (NSS-KDF) DNSSEC SYSTEMD_WATCHDOG LABELED_IPSEC (SELINUX) LIBCAP_NG LINUX_AUDIT AUTH_PAM NETWORKMANAGER CURL(non-NSS) LDAP(non-NSS) NFTABLES CAT NFLOG) pid:1644 230s operating system: Linux 6.18.0 [Linux 6.18.0-9-generic #9-Ubuntu SMP PREEMPT_DYNAMIC Mon Jan 12 16:45:54 UTC 2026 ppc64le] 230s core dump dir: /run/pluto 230s secrets file: /etc/ipsec.secrets 230s Initializing NSS using read-only database "sql:/tmp/tmp.ki2XHKnHYp" 230s FIPS Mode: OFF 230s NSS crypto library initialized 230s FIPS mode disabled for pluto daemon 230s FIPS HMAC integrity support [not required] 230s libcap-ng capng_apply failed to apply changes, err=-5. see: man capng_apply 230s libcap-ng support [enabled] 230s Linux audit support [enabled] 230s leak-detective disabled 230s NSS crypto [enabled] 230s XAUTH PAM support [enabled] 230s initializing libevent in pthreads mode: headers: 2.1.12-stable (2010c00); library: 2.1.12-stable (2010c00) 230s NAT-Traversal: keep-alive period 20s 230s ERROR: xfrmi is not supported, failed to create ipsec-interface ipsec1 bound to lo 230s ipsec-interface is not working: xfrmi is not supported 230s IPsec Interface [disabled] 230s refreshed session resume keys, issuing key 1 230s Encryption algorithms: 230s AES_CCM_16 {256,192,*128} IKEv1: ESP IKEv2: ESP FIPS aes_ccm, aes_ccm_c 230s AES_CCM_12 {256,192,*128} IKEv1: ESP IKEv2: ESP FIPS aes_ccm_b 230s AES_CCM_8 {256,192,*128} IKEv1: ESP IKEv2: ESP FIPS aes_ccm_a 230s 3DES_CBC [*192] IKEv1: IKE ESP IKEv2: IKE ESP FIPS NSS(CBC) 3des 230s CAMELLIA_CTR {256,192,*128} IKEv1: ESP IKEv2: ESP 230s CAMELLIA_CBC {256,192,*128} IKEv1: IKE ESP IKEv2: IKE ESP NSS(CBC) camellia 230s AES_GCM_16 {256,192,*128} IKEv1: ESP IKEv2: IKE ESP FIPS NSS(AEAD) aes_gcm, aes_gcm_c 230s AES_GCM_12 {256,192,*128} IKEv1: ESP IKEv2: IKE ESP FIPS NSS(AEAD) aes_gcm_b 230s AES_GCM_8 {256,192,*128} IKEv1: ESP IKEv2: IKE ESP FIPS NSS(AEAD) aes_gcm_a 230s AES_CTR {256,192,*128} IKEv1: IKE ESP IKEv2: IKE ESP FIPS NSS(CTR) aesctr 230s AES_CBC {256,192,*128} IKEv1: IKE ESP IKEv2: IKE ESP FIPS NSS(CBC) aes 230s NULL_AUTH_AES_GMAC {256,192,*128} IKEv1: ESP IKEv2: ESP FIPS aes_gmac 230s NULL [] IKEv1: ESP IKEv2: ESP NULL 230s CHACHA20_POLY1305 [*256] IKEv1: IKEv2: IKE ESP NSS(AEAD) chacha20poly1305 230s Hash algorithms: 230s MD5 IKEv1: IKE IKEv2: NSS 230s SHA1 IKEv1: IKE IKEv2: IKE FIPS NSS sha 230s SHA2_256 IKEv1: IKE IKEv2: IKE FIPS NSS sha2, sha256 230s SHA2_384 IKEv1: IKE IKEv2: IKE FIPS NSS sha384 230s SHA2_512 IKEv1: IKE IKEv2: IKE FIPS NSS sha512 230s IDENTITY IKEv1: IKEv2: FIPS 230s PRF algorithms: 230s HMAC_MD5 IKEv1: IKE IKEv2: IKE NSS md5 230s HMAC_SHA1 IKEv1: IKE IKEv2: IKE FIPS NSS sha, sha1 230s HMAC_SHA2_256 IKEv1: IKE IKEv2: IKE FIPS NSS sha2, sha256, sha2_256 230s HMAC_SHA2_384 IKEv1: IKE IKEv2: IKE FIPS NSS sha384, sha2_384 230s HMAC_SHA2_512 IKEv1: IKE IKEv2: IKE FIPS NSS sha512, sha2_512 230s AES_XCBC IKEv1: IKEv2: IKE native(XCBC) aes128_xcbc 230s Integrity algorithms: 230s HMAC_MD5_96 IKEv1: IKE ESP AH IKEv2: IKE ESP AH NSS md5, hmac_md5 230s HMAC_SHA1_96 IKEv1: IKE ESP AH IKEv2: IKE ESP AH FIPS NSS sha, sha1, sha1_96, hmac_sha1 230s HMAC_SHA2_512_256 IKEv1: IKE ESP AH IKEv2: IKE ESP AH FIPS NSS sha512, sha2_512, sha2_512_256, hmac_sha2_512 230s HMAC_SHA2_384_192 IKEv1: IKE ESP AH IKEv2: IKE ESP AH FIPS NSS sha384, sha2_384, sha2_384_192, hmac_sha2_384 230s HMAC_SHA2_256_128 IKEv1: IKE ESP AH IKEv2: IKE ESP AH FIPS NSS sha2, sha256, sha2_256, sha2_256_128, hmac_sha2_256 230s HMAC_SHA2_256_TRUNCBUG IKEv1: ESP AH IKEv2: AH 230s AES_XCBC_96 IKEv1: ESP AH IKEv2: IKE ESP AH native(XCBC) aes_xcbc, aes128_xcbc, aes128_xcbc_96 230s AES_CMAC_96 IKEv1: ESP AH IKEv2: ESP AH FIPS aes_cmac 230s NONE IKEv1: ESP IKEv2: IKE ESP FIPS null 230s DH algorithms: 230s NONE IKEv1: IKEv2: IKE ESP AH FIPS NSS(MODP) null, dh0 230s MODP1536 IKEv1: IKE ESP AH IKEv2: IKE ESP AH NSS(MODP) dh5 230s MODP2048 IKEv1: IKE ESP AH IKEv2: IKE ESP AH FIPS NSS(MODP) dh14 230s MODP3072 IKEv1: IKE ESP AH IKEv2: IKE ESP AH FIPS NSS(MODP) dh15 230s MODP4096 IKEv1: IKE ESP AH IKEv2: IKE ESP AH FIPS NSS(MODP) dh16 230s MODP6144 IKEv1: IKE ESP AH IKEv2: IKE ESP AH FIPS NSS(MODP) dh17 230s MODP8192 IKEv1: IKE ESP AH IKEv2: IKE ESP AH FIPS NSS(MODP) dh18 230s DH19 IKEv1: IKE IKEv2: IKE ESP AH FIPS NSS(ECP) ecp_256, ecp256 230s DH20 IKEv1: IKE IKEv2: IKE ESP AH FIPS NSS(ECP) ecp_384, ecp384 230s DH21 IKEv1: IKE IKEv2: IKE ESP AH FIPS NSS(ECP) ecp_521, ecp521 230s DH31 IKEv1: IKE IKEv2: IKE ESP AH NSS(ECP) curve25519 230s IPCOMP algorithms: 230s DEFLATE IKEv1: ESP AH IKEv2: ESP AH FIPS 230s LZS IKEv1: IKEv2: ESP AH FIPS 230s LZJH IKEv1: IKEv2: ESP AH FIPS 230s testing CAMELLIA_CBC: 230s Camellia: 16 bytes with 128-bit key 230s Camellia: 16 bytes with 128-bit key 230s Camellia: 16 bytes with 256-bit key 230s Camellia: 16 bytes with 256-bit key 230s testing AES_GCM_16: 230s empty string 230s one block 230s two blocks 230s two blocks with associated data 230s testing AES_CTR: 230s Encrypting 16 octets using AES-CTR with 128-bit key 230s Encrypting 32 octets using AES-CTR with 128-bit key 230s Encrypting 36 octets using AES-CTR with 128-bit key 230s Encrypting 16 octets using AES-CTR with 192-bit key 230s Encrypting 32 octets using AES-CTR with 192-bit key 230s Encrypting 36 octets using AES-CTR with 192-bit key 230s Encrypting 16 octets using AES-CTR with 256-bit key 230s Encrypting 32 octets using AES-CTR with 256-bit key 230s Encrypting 36 octets using AES-CTR with 256-bit key 230s testing AES_CBC: 230s Encrypting 16 bytes (1 block) using AES-CBC with 128-bit key 230s Encrypting 32 bytes (2 blocks) using AES-CBC with 128-bit key 230s Encrypting 48 bytes (3 blocks) using AES-CBC with 128-bit key 230s Encrypting 64 bytes (4 blocks) using AES-CBC with 128-bit key 230s testing AES_XCBC: 230s RFC 3566 Test Case 1: AES-XCBC-MAC-96 with 0-byte input 230s RFC 3566 Test Case 2: AES-XCBC-MAC-96 with 3-byte input 230s RFC 3566 Test Case 3: AES-XCBC-MAC-96 with 16-byte input 230s RFC 3566 Test Case 4: AES-XCBC-MAC-96 with 20-byte input 230s RFC 3566 Test Case 5: AES-XCBC-MAC-96 with 32-byte input 230s RFC 3566 Test Case 6: AES-XCBC-MAC-96 with 34-byte input 230s RFC 3566 Test Case 7: AES-XCBC-MAC-96 with 1000-byte input 230s RFC 4434 Test Case AES-XCBC-PRF-128 with 20-byte input (key length 16) 230s RFC 4434 Test Case AES-XCBC-PRF-128 with 20-byte input (key length 10) 230s RFC 4434 Test Case AES-XCBC-PRF-128 with 20-byte input (key length 18) 230s testing HMAC_MD5: 230s RFC 2104: MD5_HMAC test 1 230s RFC 2104: MD5_HMAC test 2 230s RFC 2104: MD5_HMAC test 3 230s testing HMAC_SHA1: 230s CAVP: IKEv2 key derivation with HMAC-SHA1 230s selftest: exiting pluto 230s initializing NSS db 230s running pluto selftest 230s autopkgtest [03:39:28]: test cryptocheck: -----------------------] 231s autopkgtest [03:39:29]: test cryptocheck: - - - - - - - - - - results - - - - - - - - - - 231s cryptocheck PASS 231s autopkgtest [03:39:29]: test cavp: preparing testbed 250s Creating nova instance adt-resolute-ppc64el-libreswan-20260203-032001-juju-7f2275-prod-proposed-migration-environment-20-23c6b79a-6493-4ecf-b00d-3b3e7b59ad49 from image adt/ubuntu-resolute-ppc64el-server-20260202.img (UUID ca98045c-2f99-4634-a243-9d47350236de)... 260s nova [E] nova boot failed (attempt #0): 260s nova [E] DEBUG (extension:189) found extension EntryPoint.parse('v1password = swiftclient.authv1:PasswordLoader') 260s DEBUG (extension:189) found extension EntryPoint.parse('noauth = cinderclient.contrib.noauth:CinderNoAuthLoader') 260s DEBUG (extension:189) found extension EntryPoint.parse('admin_token = keystoneauth1.loading._plugins.admin_token:AdminToken') 260s DEBUG (extension:189) found extension EntryPoint.parse('none = keystoneauth1.loading._plugins.noauth:NoAuth') 260s DEBUG (extension:189) found extension EntryPoint.parse('password = keystoneauth1.loading._plugins.identity.generic:Password') 260s DEBUG (extension:189) found extension EntryPoint.parse('token = keystoneauth1.loading._plugins.identity.generic:Token') 260s DEBUG (extension:189) found extension EntryPoint.parse('v2password = keystoneauth1.loading._plugins.identity.v2:Password') 260s DEBUG (extension:189) found extension EntryPoint.parse('v2token = keystoneauth1.loading._plugins.identity.v2:Token') 260s DEBUG (extension:189) found extension EntryPoint.parse('v3adfspassword = keystoneauth1.extras._saml2._loading:ADFSPassword') 260s DEBUG (extension:189) found extension EntryPoint.parse('v3applicationcredential = keystoneauth1.loading._plugins.identity.v3:ApplicationCredential') 260s DEBUG (extension:189) found extension EntryPoint.parse('v3fedkerb = keystoneauth1.extras.kerberos._loading:MappedKerberos') 260s DEBUG (extension:189) found extension EntryPoint.parse('v3kerberos = keystoneauth1.extras.kerberos._loading:Kerberos') 260s DEBUG (extension:189) found extension EntryPoint.parse('v3multifactor = keystoneauth1.loading._plugins.identity.v3:MultiFactor') 260s DEBUG (extension:189) found extension EntryPoint.parse('v3oauth1 = keystoneauth1.extras.oauth1._loading:V3OAuth1') 260s DEBUG (extension:189) found extension EntryPoint.parse('v3oidcaccesstoken = keystoneauth1.loading._plugins.identity.v3:OpenIDConnectAccessToken') 260s DEBUG (extension:189) found extension EntryPoint.parse('v3oidcauthcode = keystoneauth1.loading._plugins.identity.v3:OpenIDConnectAuthorizationCode') 260s DEBUG (extension:189) found extension EntryPoint.parse('v3oidcclientcredentials = keystoneauth1.loading._plugins.identity.v3:OpenIDConnectClientCredentials') 260s DEBUG (extension:189) found extension EntryPoint.parse('v3oidcpassword = keystoneauth1.loading._plugins.identity.v3:OpenIDConnectPassword') 260s DEBUG (extension:189) found extension EntryPoint.parse('v3password = keystoneauth1.loading._plugins.identity.v3:Password') 260s DEBUG (extension:189) found extension EntryPoint.parse('v3samlpassword = keystoneauth1.extras._saml2._loading:Saml2Password') 260s DEBUG (extension:189) found extension EntryPoint.parse('v3token = keystoneauth1.loading._plugins.identity.v3:Token') 260s DEBUG (extension:189) found extension EntryPoint.parse('v3tokenlessauth = keystoneauth1.loading._plugins.identity.v3:TokenlessAuth') 260s DEBUG (extension:189) found extension EntryPoint.parse('v3totp = keystoneauth1.loading._plugins.identity.v3:TOTP') 260s DEBUG (session:517) REQ: curl -g -i -X GET https://keystone.ps7.canonical.com:5000/v3 -H "Accept: application/json" -H "User-Agent: nova keystoneauth1/4.0.0 python-requests/2.22.0 CPython/3.8.10" 260s DEBUG (connectionpool:939) Starting new HTTPS connection (1): keystone.ps7.canonical.com:5000 260s DEBUG (connectionpool:429) https://keystone.ps7.canonical.com:5000 "GET /v3 HTTP/1.1" 200 267 260s DEBUG (session:548) RESP: [200] Connection: Keep-Alive Content-Length: 267 Content-Type: application/json Date: Tue, 03 Feb 2026 03:39:51 GMT Keep-Alive: timeout=75, max=1000 Server: Apache/2.4.52 (Ubuntu) Vary: X-Auth-Token x-openstack-request-id: req-6e6ef31a-6e32-4c6c-97d1-57419a0d4d8d 260s DEBUG (session:580) RESP BODY: {"version": {"id": "v3.14", "status": "stable", "updated": "2020-04-07T00:00:00Z", "links": [{"rel": "self", "href": "https://keystone.ps7.canonical.com:5000/v3/"}], "media-types": [{"base": "application/json", "type": "application/vnd.openstack.identity-v3+json"}]}} 260s DEBUG (session:946) GET call to https://keystone.ps7.canonical.com:5000/v3 used request id req-6e6ef31a-6e32-4c6c-97d1-57419a0d4d8d 260s DEBUG (base:182) Making authentication request to https://keystone.ps7.canonical.com:5000/v3/auth/tokens 260s DEBUG (connectionpool:429) https://keystone.ps7.canonical.com:5000 "POST /v3/auth/tokens HTTP/1.1" 201 12966 260s DEBUG (base:187) {"token": {"methods": ["password"], "user": {"domain": {"id": "default", "name": "Default"}, "id": "20f4f30c2cfd4bfe806cd0db10c0e446", "name": "prod-autopkgtest-workers-ppc64el", "password_expires_at": null}, "audit_ids": ["tYP6rKTKTuyZlykhQeJhTQ"], "expires_at": "2026-02-04T03:39:51.000000Z", "issued_at": "2026-02-03T03:39:51.000000Z", "project": {"domain": {"id": "default", "name": "Default"}, "id": "9bf77f46fd6c4d3da81ee79a717acf43", "name": "prod-autopkgtest-workers-ppc64el_project"}, "is_domain": false, "roles": [{"id": "c4de4cd4a6e842c48c193225243b4507", "name": "reader"}, {"id": "a31fb543f37543d3b12c7fcb6e29636f", "name": "load-balancer_member"}, {"id": "9531825e299647e9b8713fcf36566f08", "name": "member"}], "is_admin_project": false, "catalog": [{"endpoints": [{"id": "09e03191c89d4421aebaa8dcff0e22e3", "interface": "admin", "region_id": "prodstack7", "url": "https://heat-admin.ps7.canonical.com:8004/v1/9bf77f46fd6c4d3da81ee79a717acf43", "region": "prodstack7"}, {"id": "0b44af32db1b408da5b67a834350711b", "interface": "internal", "region_id": "prodstack7", "url": "https://heat-internal.ps7.canonical.com:8004/v1/9bf77f46fd6c4d3da81ee79a717acf43", "region": "prodstack7"}, {"id": "325f3c044aa54591be49e39f7260483d", "interface": "public", "region_id": "prodstack7", "url": "https://heat.ps7.canonical.com:8004/v1/9bf77f46fd6c4d3da81ee79a717acf43", "region": "prodstack7"}], "id": "07902f28d63c4792bef57723f11a597e", "type": "orchestration", "name": "heat"}, {"endpoints": [{"id": "296a5126b56949f8abc8663ba48d7c69", "interface": "admin", "region_id": "prodstack7", "url": "https://nova-admin.ps7.canonical.com:8774/v2.1", "region": "prodstack7"}, {"id": "4ed46fd286814be9ad5f53c713db2b21", "interface": "public", "region_id": "prodstack7", "url": "https://nova.ps7.canonical.com:8774/v2.1", "region": "prodstack7"}, {"id": "f920fb8274c74c72b50e57ac95f88f51", "interface": "internal", "region_id": "prodstack7", "url": "https://nova-internal.ps7.canonical.com:8774/v2.1", "region": "prodstack7"}], "id": "0f4ee03d0c134dceb7ed6b2fa51eb189", "type": "compute", "name": "nova"}, {"endpoints": [{"id": "074ea936d15d47e8ba1b8f1347fdaeec", "interface": "admin", "region_id": "prodstack7", "url": "https://neutron-admin.ps7.canonical.com:9696", "region": "prodstack7"}, {"id": "4d5667208af943eab425bb1952f67d2f", "interface": "public", "region_id": "prodstack7", "url": "https://neutron.ps7.canonical.com:9696", "region": "prodstack7"}, {"id": "ae71a7dd75fc495fa3dd207ac977346d", "interface": "internal", "region_id": "prodstack7", "url": "https://neutron-internal.ps7.canonical.com:9696", "region": "prodstack7"}], "id": "1fde991012bf4a91a97b5b02cd662e5d", "type": "network", "name": "neutron"}, {"endpoints": [{"id": "5f3171f69df346c9a40ff13f8a9f3feb", "interface": "public", "region_id": "prodstack7", "url": "https://heat.ps7.canonical.com:8000/v1", "region": "prodstack7"}, {"id": "951c2c04417d456eb29a4cbd2675f1bc", "interface": "internal", "region_id": "prodstack7", "url": "https://heat-internal.ps7.canonical.com:8000/v1", "region": "prodstack7"}, {"id": "e4062e144ad243cbb53c8ce87aefee44", "interface": "admin", "region_id": "prodstack7", "url": "https://heat-admin.ps7.canonical.com:8000/v1", "region": "prodstack7"}], "id": "2c59c0123c304ef3824d75e9779ac5a3", "type": "cloudformation", "name": "heat-cfn"}, {"endpoints": [{"id": "4a95fbf112804721b96a3578858faf45", "interface": "internal", "region_id": "prodstack7", "url": "https://octavia-internal.ps7.canonical.com:9876", "region": "prodstack7"}, {"id": "56bed7c3efd54a57bae11cc93844edc5", "interface": "public", "region_id": "prodstack7", "url": "https://octavia.ps7.canonical.com:9876", "region": "prodstack7"}, {"id": "e9c2ec6bc0e94e1e8ca6b15aa24b9294", "interface": "admin", "region_id": "prodstack7", "url": "https://octavia-admin.ps7.canonical.com:9876", "region": "prodstack7"}], "id": "4e42217a7f46428b87e7458a8a73942c", "type": "load-balancer", "name": "octavia"}, {"endpoints": [{"id": "29929a56ac7944d8867150f9d9a51ffe", "interface": "public", "region_id": "prodstack7", "url": "https://gnocchi.ps7.canonical.com:8041", "region": "prodstack7"}, {"id": "d1146fdec43e4c339f3c0766fda1923d", "interface": "internal", "region_id": "prodstack7", "url": "https://gnocchi-internal.ps7.canonical.com:8041", "region": "prodstack7"}, {"id": "ff5d256a28064e13b52758d6206687eb", "interface": "admin", "region_id": "prodstack7", "url": "https://gnocchi-admin.ps7.canonical.com:8041", "region": "prodstack7"}], "id": "50872dac84974216b104c7eef043dfe6", "type": "metric", "name": "gnocchi"}, {"endpoints": [{"id": "3901a2889b584fe5baf1325da2d5571c", "interface": "internal", "region_id": "prodstack7", "url": "https://aodh-internal.ps7.canonical.com:8042", "region": "prodstack7"}, {"id": "94f9e723537a4d0ab35ab53fe1af6f01", "interface": "public", "region_id": "prodstack7", "url": "https://aodh.ps7.canonical.com:8042", "region": "prodstack7"}, {"id": "f3fc8781a98149c680bd7f34c6893410", "interface": "admin", "region_id": "prodstack7", "url": "https://aodh-admin.ps7.canonical.com:8042", "region": "prodstack7"}], "id": "6f7af5495c2447c9bf258f72605a99b1", "type": "alarming", "name": "aodh"}, {"endpoints": [{"id": "0592d4bf15d54ba8aac00dfc34292295", "interface": "admin", "region_id": "prodstack7", "url": "https://keystone-admin.ps7.canonical.com:35357/v3", "region": "prodstack7"}, {"id": "1f5df236ded54026af4f5e947a599b2f", "interface": "internal", "region_id": "prodstack7", "url": "https://keystone-internal.ps7.canonical.com:5000/v3", "region": "prodstack7"}, {"id": "cd17fef7e3d246b3974b2ffe55b7889c", "interface": "public", "region_id": "prodstack7", "url": "https://keystone.ps7.canonical.com:5000/v3", "region": "prodstack7"}], "id": "7ad024307b634ea989f1e03d73d7737b", "type": "identity", "name": "keystone"}, {"endpoints": [{"id": "001dac935b6c44b1ad62c90175538578", "interface": "admin", "region_id": "prodstack7", "url": "https://cinder-admin.ps7.canonical.com:8776/v3/9bf77f46fd6c4d3da81ee79a717acf43", "region": "prodstack7"}, {"id": "90abac2983a34488bb6ada4e5004bb99", "interface": "public", "region_id": "prodstack7", "url": "https://cinder.ps7.canonical.com:8776/v3/9bf77f46fd6c4d3da81ee79a717acf43", "region": "prodstack7"}, {"id": "e49add7152684a8e9e1e3ea9502b5dc6", "interface": "internal", "region_id": "prodstack7", "url": "https://cinder-internal.ps7.canonical.com:8776/v3/9bf77f46fd6c4d3da81ee79a717acf43", "region": "prodstack7"}], "id": "7bea8b97c0304a62afd8325515928cc0", "type": "volumev3", "name": "cinderv3"}, {"endpoints": [{"id": "2450babeee5e4fe49947cbe7bcc0f3c3", "interface": "public", "region_id": "prodstack7", "url": "https://designate.ps7.canonical.com:9001", "region": "prodstack7"}, {"id": "c2e77ece29cd4dc7bf518bb51c619cce", "interface": "internal", "region_id": "prodstack7", "url": "https://designate-internal.ps7.canonical.com:9001", "region": "prodstack7"}, {"id": "fc292615aa2d43ff943da365870944ce", "interface": "admin", "region_id": "prodstack7", "url": "https://designate-admin.ps7.canonical.com:9001", "region": "prodstack7"}], "id": "8d13654c658644c4a375ce8428638f3d", "type": "dns", "name": "designate"}, {"endpoints": [{"id": "604f1f7088c54ec4a558d1747b0e7396", "interface": "public", "region_id": "prodstack7", "url": "https://barbican.ps7.canonical.com:9311", "region": "prodstack7"}, {"id": "81268c6bd3524a4d85af3d6faa426863", "interface": "admin", "region_id": "prodstack7", "url": "https://barbican-admin.ps7.canonical.com:9312", "region": "prodstack7"}, {"id": "becc73f676f34e66ab1daf0fbcb42366", "interface": "internal", "region_id": "prodstack7", "url": "https://barbican-internal.ps7.canonical.com:9311", "region": "prodstack7"}], "id": "8df4ed7c02d44fe28ec72b1e19e3f66f", "type": "key-manager", "name": "barbican"}, {"endpoints": [{"id": "38557e1243014f1abaa578a61bb0a387", "interface": "public", "region_id": "prodstack7", "url": "https://manila.ps7.canonical.com:8786/v1/9bf77f46fd6c4d3da81ee79a717acf43", "region": "prodstack7"}, {"id": "b12d5a4329f94a1fa6dbd2cd38ebcd52", "interface": "internal", "region_id": "prodstack7", "url": "https://manila-internal.ps7.canonical.com:8786/v1/9bf77f46fd6c4d3da81ee79a717acf43", "region": "prodstack7"}, {"id": "bc081c0d5d954446b7ee77886f5d68a3", "interface": "admin", "region_id": "prodstack7", "url": "https://manila-admin.ps7.canonical.com:8786/v1/9bf77f46fd6c4d3da81ee79a717acf43", "region": "prodstack7"}], "id": "8e7967c2620d49448787e035e8f21af0", "type": "share", "name": "manila"}, {"endpoints": [{"id": "03802d072c514ae484a2d26be0c906af", "interface": "public", "region_id": "prodstack7", "url": "https://radosgw.ps7.canonical.com:443/", "region": "prodstack7"}, {"id": "c07a315e261f430d94542a872596d654", "interface": "admin", "region_id": "prodstack7", "url": "https://radosgw-admin.ps7.canonical.com:443/", "region": "prodstack7"}, {"id": "d62fcd20c1e34d64930fbec97503a40a", "interface": "internal", "region_id": "prodstack7", "url": "https://radosgw-internal.ps7.canonical.com:443/", "region": "prodstack7"}], "id": "9569f1b0b4714254a3d116760dc3968d", "type": "s3", "name": "s3"}, {"endpoints": [{"id": "0e64627804e741e5948b4d35e1914624", "interface": "internal", "region_id": "RegionOne", "url": "http://10.150.13.75", "region": "RegionOne"}, {"id": "12d47bbd1cc64dbf8d4e442b821c64f2", "interface": "admin", "region_id": "prodstack7", "url": "https://radosgw-admin.ps7.canonical.com:443/swift/simplestreams/data", "region": "prodstack7"}, {"id": "35aba6c3a1fc4041b30963e8b6c7b929", "interface": "public", "region_id": "prodstack7", "url": "https://radosgw.ps7.canonical.com:443/swift/v1/AUTH_588a6b5285ea4ed38ae122d264c01490/simplestreams/data", "region": "prodstack7"}, {"id": "35bc5168fcc2414a9d89313cdef8bca9", "interface": "admin", "region_id": "RegionOne", "url": "http://10.150.13.75", "region": "RegionOne"}, {"id": "5f7980b3f8e746e6bbd66c9cef81714e", "interface": "public", "region_id": "RegionOne", "url": "http://10.150.13.75", "region": "RegionOne"}, {"id": "739ab5131dff4cdbb3151f6de36b36f6", "interface": "internal", "region_id": "prodstack7", "url": "https://radosgw-internal.ps7.canonical.com:443/swift/v1/AUTH_588a6b5285ea4ed38ae122d264c01490/simplestreams/data", "region": "prodstack7"}], "id": "b28a039721b147af8e77d77242d4297f", "type": "product-streams", "name": "image-stream"}, {"endpoints": [{"id": "9321fba4588641dbb1c9f89508f1bf23", "interface": "internal", "region_id": "prodstack7", "url": "https://placement-internal.ps7.canonical.com:8778", "region": "prodstack7"}, {"id": "9a75eebf33e7409d9b69dc7e650f756c", "interface": "admin", "region_id": "prodstack7", "url": "https://placement-admin.ps7.canonical.com:8778", "region": "prodstack7"}, {"id": "c03942ddacb94fe39c1529aa74bd31c1", "interface": "public", "region_id": "prodstack7", "url": "https://placement.ps7.canonical.com:8778", "region": "prodstack7"}], "id": "bc5c019477934e89bab2a097e8df84b6", "type": "placement", "name": "placement"}, {"endpoints": [{"id": "b8152f5e649d4603ac092897639d38c9", "interface": "admin", "region_id": "prodstack7", "url": "https://radosgw-admin.ps7.canonical.com:443/swift", "region": "prodstack7"}, {"id": "baa313d85b904c308b7a5c98505fc32c", "interface": "internal", "region_id": "prodstack7", "url": "https://radosgw-internal.ps7.canonical.com:443/swift/v1/AUTH_9bf77f46fd6c4d3da81ee79a717acf43", "region": "prodstack7"}, {"id": "c17c3db416224561b5e045562bbe76bf", "interface": "public", "region_id": "prodstack7", "url": "https://radosgw.ps7.canonical.com:443/swift/v1/AUTH_9bf77f46fd6c4d3da81ee79a717acf43", "region": "prodstack7"}], "id": "c6dd2bcf96bf44c2a99e39d1302563f1", "type": "object-store", "name": "swift"}, {"endpoints": [{"id": "526da263451648898c9187c65f441a1c", "interface": "public", "region_id": "prodstack7", "url": "https://glance.ps7.canonical.com:9292", "region": "prodstack7"}, {"id": "61b55755ca9e4e2ab04a144f92cb6e97", "interface": "admin", "region_id": "prodstack7", "url": "https://glance-admin.ps7.canonical.com:9292", "region": "prodstack7"}, {"id": "9080969b2cde4926b647f63b9591233c", "interface": "internal", "region_id": "prodstack7", "url": "https://glance-internal.ps7.canonical.com:9292", "region": "prodstack7"}], "id": "dd3a22e287464998be0514a67dafb7e4", "type": "image", "name": "glance"}, {"endpoints": [{"id": "2f4dcba2a4ce46b2a2e3cf103fd929f4", "interface": "admin", "region_id": "prodstack7", "url": "https://manila-admin.ps7.canonical.com:8786/v2/9bf77f46fd6c4d3da81ee79a717acf43", "region": "prodstack7"}, {"id": "789faa303fb54473b9449fa2f52866b3", "interface": "internal", "region_id": "prodstack7", "url": "https://manila-internal.ps7.canonical.com:8786/v2/9bf77f46fd6c4d3da81ee79a717acf43", "region": "prodstack7"}, {"id": "fa7fa08da5e147df8dbc9528f3d7135b", "interface": "public", "region_id": "prodstack7", "url": "https://manila.ps7.canonical.com:8786/v2/9bf77f46fd6c4d3da81ee79a717acf43", "region": "prodstack7"}], "id": "f6880aea736446b8a4232e0cf3528a12", "type": "sharev2", "name": "manilav2"}]}} 260s REQ: curl -g -i -X GET https://nova.ps7.canonical.com:8774/v2.1 -H "Accept: application/json" -H "User-Agent: python-novaclient" -H "X-Auth-Token: {SHA256}83c35c7f8f4f20ae4077386fb8352ed7f3d3458eee92e925858f468bd16d4a85" 260s DEBUG (session:517) REQ: curl -g -i -X GET https://nova.ps7.canonical.com:8774/v2.1 -H "Accept: application/json" -H "User-Agent: python-novaclient" -H "X-Auth-Token: {SHA256}83c35c7f8f4f20ae4077386fb8352ed7f3d3458eee92e925858f468bd16d4a85" 260s DEBUG (connectionpool:939) Starting new HTTPS connection (1): nova.ps7.canonical.com:8774 260s DEBUG (connectionpool:429) https://nova.ps7.canonical.com:8774 "GET /v2.1 HTTP/1.1" 302 0 260s RESP: [302] Connection: Keep-Alive Content-Length: 0 Content-Type: text/plain; charset=utf8 Date: Tue, 03 Feb 2026 03:39:52 GMT Keep-Alive: timeout=75, max=1000 Location: https://nova.ps7.canonical.com:8774/v2.1/ Server: Apache/2.4.52 (Ubuntu) x-compute-request-id: req-807c00f2-2a8b-4564-ba80-4c2e532b8dc2 x-openstack-request-id: req-807c00f2-2a8b-4564-ba80-4c2e532b8dc2 260s DEBUG (session:548) RESP: [302] Connection: Keep-Alive Content-Length: 0 Content-Type: text/plain; charset=utf8 Date: Tue, 03 Feb 2026 03:39:52 GMT Keep-Alive: timeout=75, max=1000 Location: https://nova.ps7.canonical.com:8774/v2.1/ Server: Apache/2.4.52 (Ubuntu) x-compute-request-id: req-807c00f2-2a8b-4564-ba80-4c2e532b8dc2 x-openstack-request-id: req-807c00f2-2a8b-4564-ba80-4c2e532b8dc2 260s RESP BODY: Omitted, Content-Type is set to text/plain; charset=utf8. Only application/json responses have their bodies logged. 260s DEBUG (session:580) RESP BODY: Omitted, Content-Type is set to text/plain; charset=utf8. Only application/json responses have their bodies logged. 260s DEBUG (connectionpool:429) https://nova.ps7.canonical.com:8774 "GET /v2.1/ HTTP/1.1" 200 397 260s RESP: [200] Connection: Keep-Alive Content-Length: 397 Content-Type: application/json Date: Tue, 03 Feb 2026 03:39:52 GMT Keep-Alive: timeout=75, max=999 OpenStack-API-Version: compute 2.1 Server: Apache/2.4.52 (Ubuntu) Vary: OpenStack-API-Version,X-OpenStack-Nova-API-Version X-OpenStack-Nova-API-Version: 2.1 x-compute-request-id: req-64d01210-cba7-4e7e-925c-1c58ba233997 x-openstack-request-id: req-64d01210-cba7-4e7e-925c-1c58ba233997 260s DEBUG (session:548) RESP: [200] Connection: Keep-Alive Content-Length: 397 Content-Type: application/json Date: Tue, 03 Feb 2026 03:39:52 GMT Keep-Alive: timeout=75, max=999 OpenStack-API-Version: compute 2.1 Server: Apache/2.4.52 (Ubuntu) Vary: OpenStack-API-Version,X-OpenStack-Nova-API-Version X-OpenStack-Nova-API-Version: 2.1 x-compute-request-id: req-64d01210-cba7-4e7e-925c-1c58ba233997 x-openstack-request-id: req-64d01210-cba7-4e7e-925c-1c58ba233997 260s RESP BODY: {"version": {"id": "v2.1", "status": "CURRENT", "version": "2.96", "min_version": "2.1", "updated": "2013-07-23T11:33:21Z", "links": [{"rel": "self", "href": "https://nova.ps7.canonical.com:8774/v2.1/"}, {"rel": "describedby", "type": "text/html", "href": "http://docs.openstack.org/"}], "media-types": [{"base": "application/json", "type": "application/vnd.openstack.compute+json;version=2.1"}]}} 260s DEBUG (session:580) RESP BODY: {"version": {"id": "v2.1", "status": "CURRENT", "version": "2.96", "min_version": "2.1", "updated": "2013-07-23T11:33:21Z", "links": [{"rel": "self", "href": "https://nova.ps7.canonical.com:8774/v2.1/"}, {"rel": "describedby", "type": "text/html", "href": "http://docs.openstack.org/"}], "media-types": [{"base": "application/json", "type": "application/vnd.openstack.compute+json;version=2.1"}]}} 260s GET call to compute for https://nova.ps7.canonical.com:8774/v2.1/ used request id req-64d01210-cba7-4e7e-925c-1c58ba233997 260s DEBUG (session:936) GET call to compute for https://nova.ps7.canonical.com:8774/v2.1/ used request id req-64d01210-cba7-4e7e-925c-1c58ba233997 260s DEBUG (extension:189) found extension EntryPoint.parse('v1password = swiftclient.authv1:PasswordLoader') 260s DEBUG (extension:189) found extension EntryPoint.parse('noauth = cinderclient.contrib.noauth:CinderNoAuthLoader') 260s DEBUG (extension:189) found extension EntryPoint.parse('admin_token = keystoneauth1.loading._plugins.admin_token:AdminToken') 260s DEBUG (extension:189) found extension EntryPoint.parse('none = keystoneauth1.loading._plugins.noauth:NoAuth') 260s DEBUG (extension:189) found extension EntryPoint.parse('password = keystoneauth1.loading._plugins.identity.generic:Password') 260s DEBUG (extension:189) found extension EntryPoint.parse('token = keystoneauth1.loading._plugins.identity.generic:Token') 260s DEBUG (extension:189) found extension EntryPoint.parse('v2password = keystoneauth1.loading._plugins.identity.v2:Password') 260s DEBUG (extension:189) found extension EntryPoint.parse('v2token = keystoneauth1.loading._plugins.identity.v2:Token') 260s DEBUG (extension:189) found extension EntryPoint.parse('v3adfspassword = keystoneauth1.extras._saml2._loading:ADFSPassword') 260s DEBUG (extension:189) found extension EntryPoint.parse('v3applicationcredential = keystoneauth1.loading._plugins.identity.v3:ApplicationCredential') 260s DEBUG (extension:189) found extension EntryPoint.parse('v3fedkerb = keystoneauth1.extras.kerberos._loading:MappedKerberos') 260s DEBUG (extension:189) found extension EntryPoint.parse('v3kerberos = keystoneauth1.extras.kerberos._loading:Kerberos') 260s DEBUG (extension:189) found extension EntryPoint.parse('v3multifactor = keystoneauth1.loading._plugins.identity.v3:MultiFactor') 260s DEBUG (extension:189) found extension EntryPoint.parse('v3oauth1 = keystoneauth1.extras.oauth1._loading:V3OAuth1') 260s DEBUG (extension:189) found extension EntryPoint.parse('v3oidcaccesstoken = keystoneauth1.loading._plugins.identity.v3:OpenIDConnectAccessToken') 260s DEBUG (extension:189) found extension EntryPoint.parse('v3oidcauthcode = keystoneauth1.loading._plugins.identity.v3:OpenIDConnectAuthorizationCode') 260s DEBUG (extension:189) found extension EntryPoint.parse('v3oidcclientcredentials = keystoneauth1.loading._plugins.identity.v3:OpenIDConnectClientCredentials') 260s DEBUG (extension:189) found extension EntryPoint.parse('v3oidcpassword = keystoneauth1.loading._plugins.identity.v3:OpenIDConnectPassword') 260s DEBUG (extension:189) found extension EntryPoint.parse('v3password = keystoneauth1.loading._plugins.identity.v3:Password') 260s DEBUG (extension:189) found extension EntryPoint.parse('v3samlpassword = keystoneauth1.extras._saml2._loading:Saml2Password') 260s DEBUG (extension:189) found extension EntryPoint.parse('v3token = keystoneauth1.loading._plugins.identity.v3:Token') 260s DEBUG (extension:189) found extension EntryPoint.parse('v3tokenlessauth = keystoneauth1.loading._plugins.identity.v3:TokenlessAuth') 260s DEBUG (extension:189) found extension EntryPoint.parse('v3totp = keystoneauth1.loading._plugins.identity.v3:TOTP') 260s DEBUG (session:517) REQ: curl -g -i -X GET https://glance.ps7.canonical.com:9292/v2/images/ca98045c-2f99-4634-a243-9d47350236de -H "Accept: application/json" -H "OpenStack-API-Version: compute 2.87" -H "User-Agent: python-novaclient" -H "X-Auth-Token: {SHA256}83c35c7f8f4f20ae4077386fb8352ed7f3d3458eee92e925858f468bd16d4a85" -H "X-OpenStack-Nova-API-Version: 2.87" 260s DEBUG (connectionpool:939) Starting new HTTPS connection (1): glance.ps7.canonical.com:9292 260s DEBUG (connectionpool:429) https://glance.ps7.canonical.com:9292 "GET /v2/images/ca98045c-2f99-4634-a243-9d47350236de HTTP/1.1" 200 2267 260s DEBUG (session:548) RESP: [200] Connection: Keep-Alive Content-Length: 2267 Content-Type: application/json Date: Tue, 03 Feb 2026 03:39:52 GMT Keep-Alive: timeout=75, max=1000 Server: Apache/2.4.52 (Ubuntu) X-Openstack-Request-Id: req-200f3aed-08dd-41c9-9f50-511e8a1e248c 260s DEBUG (session:580) RESP BODY: {"architecture": "ppc64le", "base_image_ref": "1817ca74-e109-4221-8791-3fc9207e3533", "boot_roles": "member,load-balancer_member,reader", "content_id": "auto.sync", "hw_cdrom_bus": "scsi", "hw_disk_bus": "virtio", "hw_machine_type": "pseries", "hw_video_model": "vga", "hw_vif_model": "virtio", "image_location": "snapshot", "image_state": "available", "image_type": "snapshot", "img_config_drive": "mandatory", "instance_uuid": "28a15a23-fb43-4067-a907-286858b50c0e", "item_name": "disk1.img", "os_distro": "ubuntu", "os_version": "26.04", "owner_id": "9bf77f46fd6c4d3da81ee79a717acf43", "owner_project_name": "prod-autopkgtest-workers-ppc64el_project", "owner_user_name": "prod-autopkgtest-workers-ppc64el", "product_name": "com.ubuntu.cloud.daily:server:26.04:ppc64el", "simplestreams_metadata": "{\"aliases\": \"26.04,r,resolute,devel\", \"arch\": \"ppc64el\", \"ftype\": \"disk1.img\", \"label\": \"daily\", \"os\": \"ubuntu\", \"pubname\": \"ubuntu-resolute-daily-ppc64el-server-20260127\", \"release\": \"resolute\", \"release_codename\": \"Resolute Raccoon\", \"release_title\": \"2", "source_content_id": "com.ubuntu.cloud:daily:download", "user_id": "20f4f30c2cfd4bfe806cd0db10c0e446", "version_name": "20260127", "name": "adt/ubuntu-resolute-ppc64el-server-20260202.img", "disk_format": "qcow2", "container_format": "bare", "visibility": "private", "size": 2865954816, "virtual_size": 21474836480, "status": "active", "checksum": "6ad93313de25c3518f40dea44f47e332", "protected": false, "min_ram": 0, "min_disk": 20, "owner": "9bf77f46fd6c4d3da81ee79a717acf43", "os_hidden": false, "os_hash_algo": "sha256", "os_hash_value": "31d17570a370d1150f702fd59f3f37a5350f6c7d1a1bebbb79e93f4749c1e42c", "id": "ca98045c-2f99-4634-a243-9d47350236de", "created_at": "2026-02-02T14:51:13Z", "updated_at": "2026-02-02T14:52:43Z", "locations": [{"url": "rbd://d8b83d88-b70a-11ef-be0b-2390f458e7bc/glance/ca98045c-2f99-4634-a243-9d47350236de/snap", "metadata": {"store": "ceph"}}], "direct_url": "rbd://d8b83d88-b70a-11ef-be0b-2390f458e7bc/glance/ca98045c-2f99-4634-a243-9d47350236de/snap", "tags": [], "self": "/v2/images/ca98045c-2f99-4634-a243-9d47350236de", "file": "/v2/images/ca98045c-2f99-4634-a243-9d47350236de/file", "schema": "/v2/schemas/image", "stores": "ceph"} 260s DEBUG (session:936) GET call to image for https://glance.ps7.canonical.com:9292/v2/images/ca98045c-2f99-4634-a243-9d47350236de used request id req-200f3aed-08dd-41c9-9f50-511e8a1e248c 260s DEBUG (session:517) REQ: curl -g -i -X GET https://nova.ps7.canonical.com:8774/v2.1/flavors/autopkgtest-cpu2-ram4-disk20-ppc64el -H "Accept: application/json" -H "OpenStack-API-Version: compute 2.87" -H "User-Agent: python-novaclient" -H "X-Auth-Token: {SHA256}83c35c7f8f4f20ae4077386fb8352ed7f3d3458eee92e925858f468bd16d4a85" -H "X-OpenStack-Nova-API-Version: 2.87" 260s DEBUG (connectionpool:429) https://nova.ps7.canonical.com:8774 "GET /v2.1/flavors/autopkgtest-cpu2-ram4-disk20-ppc64el HTTP/1.1" 404 109 260s DEBUG (session:548) RESP: [404] Connection: Keep-Alive Content-Length: 109 Content-Type: application/json; charset=UTF-8 Date: Tue, 03 Feb 2026 03:39:52 GMT Keep-Alive: timeout=75, max=998 OpenStack-API-Version: compute 2.87 Server: Apache/2.4.52 (Ubuntu) Vary: OpenStack-API-Version,X-OpenStack-Nova-API-Version X-OpenStack-Nova-API-Version: 2.87 x-compute-request-id: req-37a54df1-f3b0-4785-8794-77e9fa319d0b x-openstack-request-id: req-37a54df1-f3b0-4785-8794-77e9fa319d0b 260s DEBUG (session:580) RESP BODY: {"itemNotFound": {"code": 404, "message": "Flavor autopkgtest-cpu2-ram4-disk20-ppc64el could not be found."}} 260s DEBUG (session:936) GET call to compute for https://nova.ps7.canonical.com:8774/v2.1/flavors/autopkgtest-cpu2-ram4-disk20-ppc64el used request id req-37a54df1-f3b0-4785-8794-77e9fa319d0b 260s DEBUG (session:517) REQ: curl -g -i -X GET https://nova.ps7.canonical.com:8774/v2.1/flavors?is_public=None -H "Accept: application/json" -H "OpenStack-API-Version: compute 2.87" -H "User-Agent: python-novaclient" -H "X-Auth-Token: {SHA256}83c35c7f8f4f20ae4077386fb8352ed7f3d3458eee92e925858f468bd16d4a85" -H "X-OpenStack-Nova-API-Version: 2.87" 260s DEBUG (connectionpool:429) https://nova.ps7.canonical.com:8774 "GET /v2.1/flavors?is_public=None HTTP/1.1" 200 2423 260s DEBUG (session:548) RESP: [200] Connection: Keep-Alive Content-Length: 2423 Content-Type: application/json Date: Tue, 03 Feb 2026 03:39:52 GMT Keep-Alive: timeout=75, max=997 OpenStack-API-Version: compute 2.87 Server: Apache/2.4.52 (Ubuntu) Vary: OpenStack-API-Version,X-OpenStack-Nova-API-Version X-OpenStack-Nova-API-Version: 2.87 x-compute-request-id: req-bb669952-e5cb-4b01-960f-aba876ddc238 x-openstack-request-id: req-bb669952-e5cb-4b01-960f-aba876ddc238 260s DEBUG (session:580) RESP BODY: {"flavors": [{"id": "53d845ba-20b6-47b0-8d36-14129b383b2c", "name": "shared.large.ppc64el", "links": [{"rel": "self", "href": "https://nova.ps7.canonical.com:8774/v2.1/flavors/53d845ba-20b6-47b0-8d36-14129b383b2c"}, {"rel": "bookmark", "href": "https://nova.ps7.canonical.com:8774/flavors/53d845ba-20b6-47b0-8d36-14129b383b2c"}], "description": null}, {"id": "6d15d6b4-4956-4aab-940e-fc2f21abb355", "name": "shared.xlarge.ppc64el", "links": [{"rel": "self", "href": "https://nova.ps7.canonical.com:8774/v2.1/flavors/6d15d6b4-4956-4aab-940e-fc2f21abb355"}, {"rel": "bookmark", "href": "https://nova.ps7.canonical.com:8774/flavors/6d15d6b4-4956-4aab-940e-fc2f21abb355"}], "description": null}, {"id": "84d9214c-6238-49ad-bcd4-68651b0fff84", "name": "shared.medium.ppc64el", "links": [{"rel": "self", "href": "https://nova.ps7.canonical.com:8774/v2.1/flavors/84d9214c-6238-49ad-bcd4-68651b0fff84"}, {"rel": "bookmark", "href": "https://nova.ps7.canonical.com:8774/flavors/84d9214c-6238-49ad-bcd4-68651b0fff84"}], "description": null}, {"id": "af3a4807-1a67-45b0-a4ec-851f7f915480", "name": "autopkgtest-cpu4-ram16-disk100-ppc64el", "links": [{"rel": "self", "href": "https://nova.ps7.canonical.com:8774/v2.1/flavors/af3a4807-1a67-45b0-a4ec-851f7f915480"}, {"rel": "bookmark", "href": "https://nova.ps7.canonical.com:8774/flavors/af3a4807-1a67-45b0-a4ec-851f7f915480"}], "description": null}, {"id": "cdd26b7a-512f-4e40-a56b-a8628e74c273", "name": "autopkgtest-cpu2-ram4-disk20-ppc64el", "links": [{"rel": "self", "href": "https://nova.ps7.canonical.com:8774/v2.1/flavors/cdd26b7a-512f-4e40-a56b-a8628e74c273"}, {"rel": "bookmark", "href": "https://nova.ps7.canonical.com:8774/flavors/cdd26b7a-512f-4e40-a56b-a8628e74c273"}], "description": null}, {"id": "d2b33018-ef27-42d3-9878-e3b4816cec50", "name": "shared.xsmall.ppc64el", "links": [{"rel": "self", "href": "https://nova.ps7.canonical.com:8774/v2.1/flavors/d2b33018-ef27-42d3-9878-e3b4816cec50"}, {"rel": "bookmark", "href": "https://nova.ps7.canonical.com:8774/flavors/d2b33018-ef27-42d3-9878-e3b4816cec50"}], "description": null}, {"id": "e9e0185b-b47d-42ce-bd30-0892a3bf026a", "name": "shared.small.ppc64el", "links": [{"rel": "self", "href": "https://nova.ps7.canonical.com:8774/v2.1/flavors/e9e0185b-b47d-42ce-bd30-0892a3bf026a"}, {"rel": "bookmark", "href": "https://nova.ps7.canonical.com:8774/flavors/e9e0185b-b47d-42ce-bd30-0892a3bf026a"}], "description": null}]} 260s DEBUG (session:936) GET call to compute for https://nova.ps7.canonical.com:8774/v2.1/flavors?is_public=None used request id req-bb669952-e5cb-4b01-960f-aba876ddc238 260s DEBUG (session:517) REQ: curl -g -i -X GET https://nova.ps7.canonical.com:8774/v2.1/flavors/cdd26b7a-512f-4e40-a56b-a8628e74c273 -H "Accept: application/json" -H "OpenStack-API-Version: compute 2.87" -H "User-Agent: python-novaclient" -H "X-Auth-Token: {SHA256}83c35c7f8f4f20ae4077386fb8352ed7f3d3458eee92e925858f468bd16d4a85" -H "X-OpenStack-Nova-API-Version: 2.87" 260s DEBUG (connectionpool:429) https://nova.ps7.canonical.com:8774 "GET /v2.1/flavors/cdd26b7a-512f-4e40-a56b-a8628e74c273 HTTP/1.1" 200 706 260s DEBUG (session:548) RESP: [200] Connection: Keep-Alive Content-Length: 706 Content-Type: application/json Date: Tue, 03 Feb 2026 03:39:52 GMT Keep-Alive: timeout=75, max=996 OpenStack-API-Version: compute 2.87 Server: Apache/2.4.52 (Ubuntu) Vary: OpenStack-API-Version,X-OpenStack-Nova-API-Version X-OpenStack-Nova-API-Version: 2.87 x-compute-request-id: req-da782a0d-a16d-4ae5-961b-508cea907a0b x-openstack-request-id: req-da782a0d-a16d-4ae5-961b-508cea907a0b 260s DEBUG (session:580) RESP BODY: {"flavor": {"id": "cdd26b7a-512f-4e40-a56b-a8628e74c273", "name": "autopkgtest-cpu2-ram4-disk20-ppc64el", "ram": 4096, "disk": 20, "swap": 0, "OS-FLV-EXT-DATA:ephemeral": 0, "OS-FLV-DISABLED:disabled": false, "vcpus": 2, "os-flavor-access:is_public": false, "rxtx_factor": 1.0, "links": [{"rel": "self", "href": "https://nova.ps7.canonical.com:8774/v2.1/flavors/cdd26b7a-512f-4e40-a56b-a8628e74c273"}, {"rel": "bookmark", "href": "https://nova.ps7.canonical.com:8774/flavors/cdd26b7a-512f-4e40-a56b-a8628e74c273"}], "description": null, "extra_specs": {"aggregate_instance_extra_specs:commit": "ppc64el", "hw:cpu_policy": "shared", "hw:mem_page_size": "large", "hw:pci_numa_affinity_policy": "preferred"}}} 260s DEBUG (session:936) GET call to compute for https://nova.ps7.canonical.com:8774/v2.1/flavors/cdd26b7a-512f-4e40-a56b-a8628e74c273 used request id req-da782a0d-a16d-4ae5-961b-508cea907a0b 260s DEBUG (session:517) REQ: curl -g -i -X POST https://nova.ps7.canonical.com:8774/v2.1/servers -H "Accept: application/json" -H "Content-Type: application/json" -H "OpenStack-API-Version: compute 2.87" -H "User-Agent: python-novaclient" -H "X-Auth-Token: {SHA256}83c35c7f8f4f20ae4077386fb8352ed7f3d3458eee92e925858f468bd16d4a85" -H "X-OpenStack-Nova-API-Version: 2.87" -d '{"server": {"name": "adt-resolute-ppc64el-libreswan-20260203-032001-juju-7f2275-prod-proposed-migration-environment-20-23c6b79a-6493-4ecf-b00d-3b3e7b59ad49", "imageRef": "ca98045c-2f99-4634-a243-9d47350236de", "flavorRef": "cdd26b7a-512f-4e40-a56b-a8628e74c273", "user_data": "I2Nsb3VkLWNvbmZpZwpob3N0bmFtZTogYXV0b3BrZ3Rlc3QKZnFkbjogYXV0b3BrZ3Rlc3QubG9jYWwKbWFuYWdlX2V0Y19ob3N0czogdHJ1ZQphcHRfdXBkYXRlOiB0cnVlCmFwdF91cGdyYWRlOiBmYWxzZQphcHRfbWlycm9yOiBodHRwOi8vZnRwbWFzdGVyLmludGVybmFsL3VidW50dS8KCnJ1bmNtZDoKIC0gZWNobyAnQWNxdWlyZTo6TGFuZ3VhZ2VzICJub25lIjsnID4gL2V0Yy9hcHQvYXB0LmNvbmYuZC85MG5vbGFuZ3VhZ2VzCiAtIGVjaG8gJ2ZvcmNlLXVuc2FmZS1pbycgPiAvZXRjL2Rwa2cvZHBrZy5jZmcuZC9hdXRvcGtndGVzdAogLSBwcmludGYgJ1xuVEVSTT1saW51eFxuJyA+PiAvZXRjL2Vudmlyb25tZW50CiAtIHNlZCAtaSAtciAnL14xMjcuMC4xLjEvIHMvYXV0b3BrZ3Rlc3QtW14gXStcLi9hdXRvcGtndGVzdFwuLycgL2V0Yy9ob3N0cwo=", "key_name": "testbed-juju-7f2275-prod-proposed-migration-environment-20", "min_count": 1, "max_count": 1, "security_groups": [{"name": "autopkgtest-juju-7f2275-prod-proposed-migration-environment-20@sto01-ppc64el-25.secgroup"}], "networks": [{"uuid": "c4c76c34-f8c1-479e-a79a-8c9382a6ed25"}]}}' 260s DEBUG (connectionpool:429) https://nova.ps7.canonical.com:8774 "POST /v2.1/servers HTTP/1.1" 202 479 260s DEBUG (session:548) RESP: [202] Connection: Keep-Alive Content-Length: 479 Content-Type: application/json Date: Tue, 03 Feb 2026 03:39:52 GMT Keep-Alive: timeout=75, max=995 OpenStack-API-Version: compute 2.87 Server: Apache/2.4.52 (Ubuntu) Vary: OpenStack-API-Version,X-OpenStack-Nova-API-Version X-OpenStack-Nova-API-Version: 2.87 location: https://nova.ps7.canonical.com:8774/v2.1/servers/75caf045-737f-48e7-aa62-c34eb6eef875 x-compute-request-id: req-7b90c614-7c04-4263-9df5-c09ed37c137e x-openstack-request-id: req-7b90c614-7c04-4263-9df5-c09ed37c137e 260s DEBUG (session:580) RESP BODY: {"server": {"id": "75caf045-737f-48e7-aa62-c34eb6eef875", "links": [{"rel": "self", "href": "https://nova.ps7.canonical.com:8774/v2.1/servers/75caf045-737f-48e7-aa62-c34eb6eef875"}, {"rel": "bookmark", "href": "https://nova.ps7.canonical.com:8774/servers/75caf045-737f-48e7-aa62-c34eb6eef875"}], "OS-DCF:diskConfig": "MANUAL", "security_groups": [{"name": "autopkgtest-juju-7f2275-prod-proposed-migration-environment-20@sto01-ppc64el-25.secgroup"}], "adminPass": "U2fGcrQSqfJu"}} 260s DEBUG (session:936) POST call to compute for https://nova.ps7.canonical.com:8774/v2.1/servers used request id req-7b90c614-7c04-4263-9df5-c09ed37c137e 260s DEBUG (session:517) REQ: curl -g -i -X GET https://nova.ps7.canonical.com:8774/v2.1/servers/75caf045-737f-48e7-aa62-c34eb6eef875 -H "Accept: application/json" -H "OpenStack-API-Version: compute 2.87" -H "User-Agent: python-novaclient" -H "X-Auth-Token: {SHA256}83c35c7f8f4f20ae4077386fb8352ed7f3d3458eee92e925858f468bd16d4a85" -H "X-OpenStack-Nova-API-Version: 2.87" 260s DEBUG (connectionpool:429) https://nova.ps7.canonical.com:8774 "GET /v2.1/servers/75caf045-737f-48e7-aa62-c34eb6eef875 HTTP/1.1" 200 2718 260s DEBUG (session:548) RESP: [200] Connection: Keep-Alive Content-Length: 2718 Content-Type: application/json Date: Tue, 03 Feb 2026 03:39:53 GMT Keep-Alive: timeout=75, max=994 OpenStack-API-Version: compute 2.87 Server: Apache/2.4.52 (Ubuntu) Vary: OpenStack-API-Version,X-OpenStack-Nova-API-Version X-OpenStack-Nova-API-Version: 2.87 x-compute-request-id: req-9fe86771-e085-421c-a9eb-ec8a9e40dd5a x-openstack-request-id: req-9fe86771-e085-421c-a9eb-ec8a9e40dd5a 260s DEBUG (session:580) RESP BODY: {"server": {"id": "75caf045-737f-48e7-aa62-c34eb6eef875", "name": "adt-resolute-ppc64el-libreswan-20260203-032001-juju-7f2275-prod-proposed-migration-environment-20-23c6b79a-6493-4ecf-b00d-3b3e7b59ad49", "status": "BUILD", "tenant_id": "9bf77f46fd6c4d3da81ee79a717acf43", "user_id": "20f4f30c2cfd4bfe806cd0db10c0e446", "metadata": {}, "hostId": "", "image": {"id": "ca98045c-2f99-4634-a243-9d47350236de", "links": [{"rel": "bookmark", "href": "https://nova.ps7.canonical.com:8774/images/ca98045c-2f99-4634-a243-9d47350236de"}]}, "flavor": {"vcpus": 2, "ram": 4096, "disk": 20, "ephemeral": 0, "swap": 0, "original_name": "autopkgtest-cpu2-ram4-disk20-ppc64el", "extra_specs": {"aggregate_instance_extra_specs:commit": "ppc64el", "hw:cpu_policy": "shared", "hw:mem_page_size": "large", "hw:pci_numa_affinity_policy": "preferred"}}, "created": "2026-02-03T03:39:53Z", "updated": "2026-02-03T03:39:53Z", "addresses": {}, "accessIPv4": "", "accessIPv6": "", "links": [{"rel": "self", "href": "https://nova.ps7.canonical.com:8774/v2.1/servers/75caf045-737f-48e7-aa62-c34eb6eef875"}, {"rel": "bookmark", "href": "https://nova.ps7.canonical.com:8774/servers/75caf045-737f-48e7-aa62-c34eb6eef875"}], "OS-DCF:diskConfig": "MANUAL", "progress": 0, "OS-EXT-AZ:availability_zone": "", "config_drive": "", "key_name": "testbed-juju-7f2275-prod-proposed-migration-environment-20", "OS-SRV-USG:launched_at": null, "OS-SRV-USG:terminated_at": null, "OS-EXT-SRV-ATTR:host": null, "OS-EXT-SRV-ATTR:instance_name": "", "OS-EXT-SRV-ATTR:hypervisor_hostname": null, "OS-EXT-SRV-ATTR:reservation_id": "r-57vs9e2b", "OS-EXT-SRV-ATTR:launch_index": 0, "OS-EXT-SRV-ATTR:hostname": "adt-resolute-ppc64el-libreswan-20260203-032001-juju-7f2275-prod", "OS-EXT-SRV-ATTR:kernel_id": "", "OS-EXT-SRV-ATTR:ramdisk_id": "", "OS-EXT-SRV-ATTR:root_device_name": null, "OS-EXT-SRV-ATTR:user_data": "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", "OS-EXT-STS:task_state": "scheduling", "OS-EXT-STS:vm_state": "building", "OS-EXT-STS:power_state": 0, "os-extended-volumes:volumes_attached": [], "locked": false, "locked_reason": null, "description": null, "tags": [], "trusted_image_certificates": null, "server_groups": []}} 260s DEBUG (session:936) GET call to compute for https://nova.ps7.canonical.com:8774/v2.1/servers/75caf045-737f-48e7-aa62-c34eb6eef875 used request id req-9fe86771-e085-421c-a9eb-ec8a9e40dd5a 260s DEBUG (session:517) REQ: curl -g -i -X GET https://glance.ps7.canonical.com:9292/v2/images/ca98045c-2f99-4634-a243-9d47350236de -H "Accept: application/json" -H "OpenStack-API-Version: compute 2.87" -H "User-Agent: python-novaclient" -H "X-Auth-Token: {SHA256}83c35c7f8f4f20ae4077386fb8352ed7f3d3458eee92e925858f468bd16d4a85" -H "X-OpenStack-Nova-API-Version: 2.87" 260s DEBUG (connectionpool:429) https://glance.ps7.canonical.com:9292 "GET /v2/images/ca98045c-2f99-4634-a243-9d47350236de HTTP/1.1" 200 2267 260s DEBUG (session:548) RESP: [200] Connection: Keep-Alive Content-Length: 2267 Content-Type: application/json Date: Tue, 03 Feb 2026 03:39:53 GMT Keep-Alive: timeout=75, max=999 Server: Apache/2.4.52 (Ubuntu) X-Openstack-Request-Id: req-f71d24dc-ca30-4d95-96f9-12f8cecc8848 260s DEBUG (session:580) RESP BODY: {"architecture": "ppc64le", "base_image_ref": "1817ca74-e109-4221-8791-3fc9207e3533", "boot_roles": "member,load-balancer_member,reader", "content_id": "auto.sync", "hw_cdrom_bus": "scsi", "hw_disk_bus": "virtio", "hw_machine_type": "pseries", "hw_video_model": "vga", "hw_vif_model": "virtio", "image_location": "snapshot", "image_state": "available", "image_type": "snapshot", "img_config_drive": "mandatory", "instance_uuid": "28a15a23-fb43-4067-a907-286858b50c0e", "item_name": "disk1.img", "os_distro": "ubuntu", "os_version": "26.04", "owner_id": "9bf77f46fd6c4d3da81ee79a717acf43", "owner_project_name": "prod-autopkgtest-workers-ppc64el_project", "owner_user_name": "prod-autopkgtest-workers-ppc64el", "product_name": "com.ubuntu.cloud.daily:server:26.04:ppc64el", "simplestreams_metadata": "{\"aliases\": \"26.04,r,resolute,devel\", \"arch\": \"ppc64el\", \"ftype\": \"disk1.img\", \"label\": \"daily\", \"os\": \"ubuntu\", \"pubname\": \"ubuntu-resolute-daily-ppc64el-server-20260127\", \"release\": \"resolute\", \"release_codename\": \"Resolute Raccoon\", \"release_title\": \"2", "source_content_id": "com.ubuntu.cloud:daily:download", "user_id": "20f4f30c2cfd4bfe806cd0db10c0e446", "version_name": "20260127", "name": "adt/ubuntu-resolute-ppc64el-server-20260202.img", "disk_format": "qcow2", "container_format": "bare", "visibility": "private", "size": 2865954816, "virtual_size": 21474836480, "status": "active", "checksum": "6ad93313de25c3518f40dea44f47e332", "protected": false, "min_ram": 0, "min_disk": 20, "owner": "9bf77f46fd6c4d3da81ee79a717acf43", "os_hidden": false, "os_hash_algo": "sha256", "os_hash_value": "31d17570a370d1150f702fd59f3f37a5350f6c7d1a1bebbb79e93f4749c1e42c", "id": "ca98045c-2f99-4634-a243-9d47350236de", "created_at": "2026-02-02T14:51:13Z", "updated_at": "2026-02-02T14:52:43Z", "locations": [{"url": "rbd://d8b83d88-b70a-11ef-be0b-2390f458e7bc/glance/ca98045c-2f99-4634-a243-9d47350236de/snap", "metadata": {"store": "ceph"}}], "direct_url": "rbd://d8b83d88-b70a-11ef-be0b-2390f458e7bc/glance/ca98045c-2f99-4634-a243-9d47350236de/snap", "tags": [], "self": "/v2/images/ca98045c-2f99-4634-a243-9d47350236de", "file": "/v2/images/ca98045c-2f99-4634-a243-9d47350236de/file", "schema": "/v2/schemas/image", "stores": "ceph"} 260s DEBUG (session:936) GET call to image for https://glance.ps7.canonical.com:9292/v2/images/ca98045c-2f99-4634-a243-9d47350236de used request id req-f71d24dc-ca30-4d95-96f9-12f8cecc8848 260s +--------------------------------------+----------------------------------------------------------------------------------------------------------------------------------------------------------+ 260s | Property | Value | 260s +--------------------------------------+----------------------------------------------------------------------------------------------------------------------------------------------------------+ 260s | OS-DCF:diskConfig | MANUAL | 260s | OS-EXT-AZ:availability_zone | | 260s | OS-EXT-SRV-ATTR:host | - | 260s | OS-EXT-SRV-ATTR:hostname | adt-resolute-ppc64el-libreswan-20260203-032001-juju-7f2275-prod | 260s | OS-EXT-SRV-ATTR:hypervisor_hostname | - | 260s | OS-EXT-SRV-ATTR:instance_name | | 260s | OS-EXT-SRV-ATTR:kernel_id | | 260s | OS-EXT-SRV-ATTR:launch_index | 0 | 260s | OS-EXT-SRV-ATTR:ramdisk_id | | 260s | OS-EXT-SRV-ATTR:reservation_id | r-57vs9e2b | 260s | OS-EXT-SRV-ATTR:root_device_name | - | 260s | OS-EXT-STS:power_state | 0 | 260s | OS-EXT-STS:task_state | scheduling | 260s | OS-EXT-STS:vm_state | building | 260s | OS-SRV-USG:launched_at | - | 260s | OS-SRV-USG:terminated_at | - | 260s | accessIPv4 | | 260s | accessIPv6 | | 260s | adminPass | U2fGcrQSqfJu | 260s | config_drive | | 260s | created | 2026-02-03T03:39:53Z | 260s | description | - | 260s | flavor:disk | 20 | 260s | flavor:ephemeral | 0 | 260s | flavor:extra_specs | {"aggregate_instance_extra_specs:commit": "ppc64el", "hw:cpu_policy": "shared", "hw:mem_page_size": "large", "hw:pci_numa_affinity_policy": "preferred"} | 260s | flavor:original_name | autopkgtest-cpu2-ram4-disk20-ppc64el | 260s | flavor:ram | 4096 | 260s | flavor:swap | 0 | 260s | flavor:vcpus | 2 | 260s | hostId | | 260s | id | 75caf045-737f-48e7-aa62-c34eb6eef875 | 260s | image | adt/ubuntu-resolute-ppc64el-server-20260202.img (ca98045c-2f99-4634-a243-9d47350236de) | 260s | key_name | testbed-juju-7f2275-prod-proposed-migration-environment-20 | 260s | locked | False | 260s | locked_reason | - | 260s | metadata | {} | 260s | name | adt-resolute-ppc64el-libreswan-20260203-032001-juju-7f2275-prod-proposed-migration-environment-20-23c6b79a-6493-4ecf-b00d-3b3e7b59ad49 | 260s | os-extended-volumes:volumes_attached | [] | 260s | progress | 0 | 260s | security_groups | autopkgtest-juju-7f2275-prod-proposed-migration-environment-20@sto01-ppc64el-25.secgroup | 260s | server_groups | [] | 260s | status | BUILD | 260s | tags | [] | 260s | tenant_id | 9bf77f46fd6c4d3da81ee79a717acf43 | 260s | trusted_image_certificates | - | 260s | updated | 2026-02-03T03:39:53Z | 260s | user_id | 20f4f30c2cfd4bfe806cd0db10c0e446 | 260s +--------------------------------------+----------------------------------------------------------------------------------------------------------------------------------------------------------+DEBUG (session:517) REQ: curl -g -i -X GET https://nova.ps7.canonical.com:8774/v2.1/servers/75caf045-737f-48e7-aa62-c34eb6eef875 -H "Accept: application/json" -H "OpenStack-API-Version: compute 2.87" -H "User-Agent: python-novaclient" -H "X-Auth-Token: {SHA256}83c35c7f8f4f20ae4077386fb8352ed7f3d3458eee92e925858f468bd16d4a85" -H "X-OpenStack-Nova-API-Version: 2.87" 260s DEBUG (connectionpool:429) https://nova.ps7.canonical.com:8774 "GET /v2.1/servers/75caf045-737f-48e7-aa62-c34eb6eef875 HTTP/1.1" 200 2735 260s DEBUG (session:548) RESP: [200] Connection: Keep-Alive Content-Length: 2735 Content-Type: application/json Date: Tue, 03 Feb 2026 03:39:53 GMT Keep-Alive: timeout=75, max=993 OpenStack-API-Version: compute 2.87 Server: Apache/2.4.52 (Ubuntu) Vary: OpenStack-API-Version,X-OpenStack-Nova-API-Version X-OpenStack-Nova-API-Version: 2.87 x-compute-request-id: req-287ecc6b-79a8-4825-bb4d-d994e66268cd x-openstack-request-id: req-287ecc6b-79a8-4825-bb4d-d994e66268cd 260s DEBUG (session:580) RESP BODY: {"server": {"id": "75caf045-737f-48e7-aa62-c34eb6eef875", "name": "adt-resolute-ppc64el-libreswan-20260203-032001-juju-7f2275-prod-proposed-migration-environment-20-23c6b79a-6493-4ecf-b00d-3b3e7b59ad49", "status": "BUILD", "tenant_id": "9bf77f46fd6c4d3da81ee79a717acf43", "user_id": "20f4f30c2cfd4bfe806cd0db10c0e446", "metadata": {}, "hostId": "", "image": {"id": "ca98045c-2f99-4634-a243-9d47350236de", "links": [{"rel": "bookmark", "href": "https://nova.ps7.canonical.com:8774/images/ca98045c-2f99-4634-a243-9d47350236de"}]}, "flavor": {"vcpus": 2, "ram": 4096, "disk": 20, "ephemeral": 0, "swap": 0, "original_name": "autopkgtest-cpu2-ram4-disk20-ppc64el", "extra_specs": {"aggregate_instance_extra_specs:commit": "ppc64el", "hw:cpu_policy": "shared", "hw:mem_page_size": "large", "hw:pci_numa_affinity_policy": "preferred"}}, "created": "2026-02-03T03:39:52Z", "updated": "2026-02-03T03:39:53Z", "addresses": {}, "accessIPv4": "", "accessIPv6": "", "links": [{"rel": "self", "href": "https://nova.ps7.canonical.com:8774/v2.1/servers/75caf045-737f-48e7-aa62-c34eb6eef875"}, {"rel": "bookmark", "href": "https://nova.ps7.canonical.com:8774/servers/75caf045-737f-48e7-aa62-c34eb6eef875"}], "OS-DCF:diskConfig": "MANUAL", "progress": 0, "OS-EXT-AZ:availability_zone": "", "config_drive": "", "key_name": "testbed-juju-7f2275-prod-proposed-migration-environment-20", "OS-SRV-USG:launched_at": null, "OS-SRV-USG:terminated_at": null, "OS-EXT-SRV-ATTR:host": null, "OS-EXT-SRV-ATTR:instance_name": "instance-00023acb", "OS-EXT-SRV-ATTR:hypervisor_hostname": null, "OS-EXT-SRV-ATTR:reservation_id": "r-57vs9e2b", "OS-EXT-SRV-ATTR:launch_index": 0, "OS-EXT-SRV-ATTR:hostname": "adt-resolute-ppc64el-libreswan-20260203-032001-juju-7f2275-prod", "OS-EXT-SRV-ATTR:kernel_id": "", "OS-EXT-SRV-ATTR:ramdisk_id": "", "OS-EXT-SRV-ATTR:root_device_name": null, "OS-EXT-SRV-ATTR:user_data": "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", "OS-EXT-STS:task_state": "scheduling", "OS-EXT-STS:vm_state": "building", "OS-EXT-STS:power_state": 0, "os-extended-volumes:volumes_attached": [], "locked": false, "locked_reason": null, "description": null, "tags": [], "trusted_image_certificates": null, "server_groups": []}} 260s DEBUG (session:936) GET call to compute for https://nova.ps7.canonical.com:8774/v2.1/servers/75caf045-737f-48e7-aa62-c34eb6eef875 used request id req-287ecc6b-79a8-4825-bb4d-d994e66268cd 260s 260s 260s Server building... 0% completeDEBUG (session:517) REQ: curl -g -i -X GET https://nova.ps7.canonical.com:8774/v2.1/servers/75caf045-737f-48e7-aa62-c34eb6eef875 -H "Accept: application/json" -H "OpenStack-API-Version: compute 2.87" -H "User-Agent: python-novaclient" -H "X-Auth-Token: {SHA256}83c35c7f8f4f20ae4077386fb8352ed7f3d3458eee92e925858f468bd16d4a85" -H "X-OpenStack-Nova-API-Version: 2.87" 260s DEBUG (connectionpool:429) https://nova.ps7.canonical.com:8774 "GET /v2.1/servers/75caf045-737f-48e7-aa62-c34eb6eef875 HTTP/1.1" 200 2845 260s DEBUG (session:548) RESP: [200] Connection: Keep-Alive Content-Length: 2845 Content-Type: application/json Date: Tue, 03 Feb 2026 03:39:58 GMT Keep-Alive: timeout=75, max=992 OpenStack-API-Version: compute 2.87 Server: Apache/2.4.52 (Ubuntu) Vary: OpenStack-API-Version,X-OpenStack-Nova-API-Version X-OpenStack-Nova-API-Version: 2.87 x-compute-request-id: req-5978f16e-b32c-4d09-bbfc-5f6777242c98 x-openstack-request-id: req-5978f16e-b32c-4d09-bbfc-5f6777242c98 260s DEBUG (session:580) RESP BODY: {"server": {"id": "75caf045-737f-48e7-aa62-c34eb6eef875", "name": "adt-resolute-ppc64el-libreswan-20260203-032001-juju-7f2275-prod-proposed-migration-environment-20-23c6b79a-6493-4ecf-b00d-3b3e7b59ad49", "status": "ERROR", "tenant_id": "9bf77f46fd6c4d3da81ee79a717acf43", "user_id": "20f4f30c2cfd4bfe806cd0db10c0e446", "metadata": {}, "hostId": "", "image": {"id": "ca98045c-2f99-4634-a243-9d47350236de", "links": [{"rel": "bookmark", "href": "https://nova.ps7.canonical.com:8774/images/ca98045c-2f99-4634-a243-9d47350236de"}]}, "flavor": {"vcpus": 2, "ram": 4096, "disk": 20, "ephemeral": 0, "swap": 0, "original_name": "autopkgtest-cpu2-ram4-disk20-ppc64el", "extra_specs": {"aggregate_instance_extra_specs:commit": "ppc64el", "hw:cpu_policy": "shared", "hw:mem_page_size": "large", "hw:pci_numa_affinity_policy": "preferred"}}, "created": "2026-02-03T03:39:52Z", "updated": "2026-02-03T03:39:53Z", "addresses": {}, "accessIPv4": "", "accessIPv6": "", "links": [{"rel": "self", "href": "https://nova.ps7.canonical.com:8774/v2.1/servers/75caf045-737f-48e7-aa62-c34eb6eef875"}, {"rel": "bookmark", "href": "https://nova.ps7.canonical.com:8774/servers/75caf045-737f-48e7-aa62-c34eb6eef875"}], "OS-DCF:diskConfig": "MANUAL", "fault": {"code": 500, "created": "2026-02-03T03:39:53Z", "message": "No valid host was found. There are not enough hosts available."}, "OS-EXT-AZ:availability_zone": "", "config_drive": "", "key_name": "testbed-juju-7f2275-prod-proposed-migration-environment-20", "OS-SRV-USG:launched_at": null, "OS-SRV-USG:terminated_at": null, "OS-EXT-SRV-ATTR:host": null, "OS-EXT-SRV-ATTR:instance_name": "instance-00023acb", "OS-EXT-SRV-ATTR:hypervisor_hostname": null, "OS-EXT-SRV-ATTR:reservation_id": "r-57vs9e2b", "OS-EXT-SRV-ATTR:launch_index": 0, "OS-EXT-SRV-ATTR:hostname": "adt-resolute-ppc64el-libreswan-20260203-032001-juju-7f2275-prod", "OS-EXT-SRV-ATTR:kernel_id": "", "OS-EXT-SRV-ATTR:ramdisk_id": "", "OS-EXT-SRV-ATTR:root_device_name": null, "OS-EXT-SRV-ATTR:user_data": "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", "OS-EXT-STS:task_state": null, "OS-EXT-STS:vm_state": "error", "OS-EXT-STS:power_state": 0, "os-extended-volumes:volumes_attached": [], "locked": false, "locked_reason": null, "description": null, "tags": [], "trusted_image_certificates": null, "server_groups": []}} 260s DEBUG (session:936) GET call to compute for https://nova.ps7.canonical.com:8774/v2.1/servers/75caf045-737f-48e7-aa62-c34eb6eef875 used request id req-5978f16e-b32c-4d09-bbfc-5f6777242c98 260s DEBUG (shell:822) 260s Traceback (most recent call last): 260s File "/usr/lib/python3/dist-packages/novaclient/shell.py", line 820, in main 260s OpenStackComputeShell().main(argv) 260s File "/usr/lib/python3/dist-packages/novaclient/shell.py", line 742, in main 260s args.func(self.cs, args) 260s File "/usr/lib/python3/dist-packages/novaclient/v2/shell.py", line 980, in do_boot 260s _poll_for_status(cs.servers.get, server.id, 'building', ['active']) 260s File "/usr/lib/python3/dist-packages/novaclient/v2/shell.py", line 1019, in _poll_for_status 260s raise exceptions.ResourceInErrorState(obj) 260s novaclient.exceptions.ResourceInErrorState: 260s ERROR (ResourceInErrorState): 260s 260s Error building server 606s autopkgtest [03:45:44]: testbed dpkg architecture: ppc64el 606s autopkgtest [03:45:44]: testbed apt version: 3.1.14 606s autopkgtest [03:45:44]: @@@@@@@@@@@@@@@@@@@@ test bed setup 606s autopkgtest [03:45:44]: testbed release detected to be: resolute 607s autopkgtest [03:45:45]: updating testbed package index (apt update) 607s Get:1 http://ftpmaster.internal/ubuntu resolute-proposed InRelease [124 kB] 607s Hit:2 http://ftpmaster.internal/ubuntu resolute InRelease 607s Hit:3 http://ftpmaster.internal/ubuntu resolute-updates InRelease 607s Hit:4 http://ftpmaster.internal/ubuntu resolute-security InRelease 607s Get:5 http://ftpmaster.internal/ubuntu resolute-proposed/restricted Sources [5256 B] 607s Get:6 http://ftpmaster.internal/ubuntu resolute-proposed/multiverse Sources [28.4 kB] 607s Get:7 http://ftpmaster.internal/ubuntu resolute-proposed/universe Sources [1275 kB] 608s Get:8 http://ftpmaster.internal/ubuntu resolute-proposed/main Sources [271 kB] 608s Get:9 http://ftpmaster.internal/ubuntu resolute-proposed/main ppc64el Packages [298 kB] 608s Get:10 http://ftpmaster.internal/ubuntu resolute-proposed/universe ppc64el Packages [1081 kB] 608s Get:11 http://ftpmaster.internal/ubuntu resolute-proposed/multiverse ppc64el Packages [18.6 kB] 608s Fetched 3101 kB in 1s (3468 kB/s) 609s Reading package lists... 609s Hit:1 http://ftpmaster.internal/ubuntu resolute-proposed InRelease 609s Hit:2 http://ftpmaster.internal/ubuntu resolute InRelease 609s Hit:3 http://ftpmaster.internal/ubuntu resolute-updates InRelease 609s Hit:4 http://ftpmaster.internal/ubuntu resolute-security InRelease 610s Reading package lists... 610s Reading package lists... 610s Building dependency tree... 610s Reading state information... 610s Calculating upgrade... 611s The following packages will be upgraded: 611s ca-certificates cloud-init cloud-init-base libexpat1 liblocale-gettext-perl 611s 5 upgraded, 0 newly installed, 0 to remove and 0 not upgraded. 611s Need to get 912 kB of archives. 611s After this operation, 1024 B of additional disk space will be used. 611s Get:1 http://ftpmaster.internal/ubuntu resolute/main ppc64el libexpat1 ppc64el 2.7.4-1 [106 kB] 611s Get:2 http://ftpmaster.internal/ubuntu resolute/main ppc64el liblocale-gettext-perl ppc64el 1.07-8 [16.3 kB] 611s Get:3 http://ftpmaster.internal/ubuntu resolute-proposed/main ppc64el ca-certificates all 20250419build1 [163 kB] 611s Get:4 http://ftpmaster.internal/ubuntu resolute/main ppc64el cloud-init-base all 25.4~4g26c7d38d-0ubuntu1 [624 kB] 611s Get:5 http://ftpmaster.internal/ubuntu resolute/main ppc64el cloud-init all 25.4~4g26c7d38d-0ubuntu1 [2120 B] 611s dpkg-preconfigure: unable to re-open stdin: No such file or directory 611s Fetched 912 kB in 0s (16.3 MB/s) 611s (Reading database ... (Reading database ... 5% (Reading database ... 10% (Reading database ... 15% (Reading database ... 20% (Reading database ... 25% (Reading database ... 30% (Reading database ... 35% (Reading database ... 40% (Reading database ... 45% (Reading database ... 50% (Reading database ... 55% (Reading database ... 60% (Reading database ... 65% (Reading database ... 70% (Reading database ... 75% (Reading database ... 80% (Reading database ... 85% (Reading database ... 90% (Reading database ... 95% (Reading database ... 100% (Reading database ... 82007 files and directories currently installed.) 611s Preparing to unpack .../libexpat1_2.7.4-1_ppc64el.deb ... 611s Unpacking libexpat1:ppc64el (2.7.4-1) over (2.7.3-1) ... 611s Preparing to unpack .../liblocale-gettext-perl_1.07-8_ppc64el.deb ... 611s Unpacking liblocale-gettext-perl (1.07-8) over (1.07-7build1) ... 611s Preparing to unpack .../ca-certificates_20250419build1_all.deb ... 611s Unpacking ca-certificates (20250419build1) over (20250419) ... 611s Preparing to unpack .../cloud-init-base_25.4~4g26c7d38d-0ubuntu1_all.deb ... 612s Unpacking cloud-init-base (25.4~4g26c7d38d-0ubuntu1) over (25.4~3g78f6f15e-0ubuntu1) ... 612s Preparing to unpack .../cloud-init_25.4~4g26c7d38d-0ubuntu1_all.deb ... 612s Unpacking cloud-init (25.4~4g26c7d38d-0ubuntu1) over (25.4~3g78f6f15e-0ubuntu1) ... 612s Setting up libexpat1:ppc64el (2.7.4-1) ... 612s Setting up cloud-init-base (25.4~4g26c7d38d-0ubuntu1) ... 612s Clearing ignored debconf value cloud-init/datasources 612s Encountered debconf setting for cloud-init-base/datasources. 614s Setting up ca-certificates (20250419build1) ... 615s Updating certificates in /etc/ssl/certs... 616s 0 added, 0 removed; done. 616s Setting up liblocale-gettext-perl (1.07-8) ... 616s Setting up cloud-init (25.4~4g26c7d38d-0ubuntu1) ... 616s Processing triggers for rsyslog (8.2512.0-1ubuntu2) ... 616s Processing triggers for man-db (2.13.1-1) ... 618s Processing triggers for libc-bin (2.42-2ubuntu4) ... 618s Processing triggers for ca-certificates (20250419build1) ... 618s Updating certificates in /etc/ssl/certs... 618s 0 added, 0 removed; done. 618s Running hooks in /etc/ca-certificates/update.d... 618s done. 618s autopkgtest [03:45:56]: upgrading testbed (apt dist-upgrade and autopurge) 618s Reading package lists... 619s Building dependency tree... 619s Reading state information... 619s Calculating upgrade... 619s 0 upgraded, 0 newly installed, 0 to remove and 0 not upgraded. 619s Reading package lists... 619s Building dependency tree... 619s Reading state information... 619s Solving dependencies... 619s 0 upgraded, 0 newly installed, 0 to remove and 0 not upgraded. 619s autopkgtest [03:45:57]: rebooting testbed after setup commands that affected boot 660s Reading package lists... 660s Building dependency tree... 660s Reading state information... 660s Solving dependencies... 660s The following NEW packages will be installed: 660s dns-root-data libevent-2.1-7t64 libevent-pthreads-2.1-7t64 libldns3t64 660s libnss3-tools libreswan libunbound8 660s 0 upgraded, 7 newly installed, 0 to remove and 0 not upgraded. 660s Need to get 3283 kB of archives. 660s After this operation, 15.4 MB of additional disk space will be used. 660s Get:1 http://ftpmaster.internal/ubuntu resolute/main ppc64el dns-root-data all 2025080400 [5908 B] 660s Get:2 http://ftpmaster.internal/ubuntu resolute/main ppc64el libnss3-tools ppc64el 2:3.120-1 [744 kB] 660s Get:3 http://ftpmaster.internal/ubuntu resolute/main ppc64el libevent-pthreads-2.1-7t64 ppc64el 2.1.12-stable-10build1 [8140 B] 660s Get:4 http://ftpmaster.internal/ubuntu resolute/universe ppc64el libldns3t64 ppc64el 1.8.4-2build1 [200 kB] 660s Get:5 http://ftpmaster.internal/ubuntu resolute/main ppc64el libevent-2.1-7t64 ppc64el 2.1.12-stable-10build1 [172 kB] 660s Get:6 http://ftpmaster.internal/ubuntu resolute/main ppc64el libunbound8 ppc64el 1.24.2-1ubuntu1 [576 kB] 660s Get:7 http://ftpmaster.internal/ubuntu resolute/universe ppc64el libreswan ppc64el 5.2-2.2ubuntu1 [1577 kB] 661s Fetched 3283 kB in 0s (7174 kB/s) 661s Selecting previously unselected package dns-root-data. 661s (Reading database ... (Reading database ... 5% (Reading database ... 10% (Reading database ... 15% (Reading database ... 20% (Reading database ... 25% (Reading database ... 30% (Reading database ... 35% (Reading database ... 40% (Reading database ... 45% (Reading database ... 50% (Reading database ... 55% (Reading database ... 60% (Reading database ... 65% (Reading database ... 70% (Reading database ... 75% (Reading database ... 80% (Reading database ... 85% (Reading database ... 90% (Reading database ... 95% (Reading database ... 100% (Reading database ... 82007 files and directories currently installed.) 661s Preparing to unpack .../0-dns-root-data_2025080400_all.deb ... 661s Unpacking dns-root-data (2025080400) ... 661s Selecting previously unselected package libnss3-tools. 661s Preparing to unpack .../1-libnss3-tools_2%3a3.120-1_ppc64el.deb ... 661s Unpacking libnss3-tools (2:3.120-1) ... 661s Selecting previously unselected package libevent-pthreads-2.1-7t64:ppc64el. 661s Preparing to unpack .../2-libevent-pthreads-2.1-7t64_2.1.12-stable-10build1_ppc64el.deb ... 661s Unpacking libevent-pthreads-2.1-7t64:ppc64el (2.1.12-stable-10build1) ... 661s Selecting previously unselected package libldns3t64:ppc64el. 661s Preparing to unpack .../3-libldns3t64_1.8.4-2build1_ppc64el.deb ... 661s Unpacking libldns3t64:ppc64el (1.8.4-2build1) ... 661s Selecting previously unselected package libevent-2.1-7t64:ppc64el. 661s Preparing to unpack .../4-libevent-2.1-7t64_2.1.12-stable-10build1_ppc64el.deb ... 661s Unpacking libevent-2.1-7t64:ppc64el (2.1.12-stable-10build1) ... 661s Selecting previously unselected package libunbound8:ppc64el. 661s Preparing to unpack .../5-libunbound8_1.24.2-1ubuntu1_ppc64el.deb ... 661s Unpacking libunbound8:ppc64el (1.24.2-1ubuntu1) ... 661s Selecting previously unselected package libreswan. 661s Preparing to unpack .../6-libreswan_5.2-2.2ubuntu1_ppc64el.deb ... 661s Unpacking libreswan (5.2-2.2ubuntu1) ... 661s Setting up libldns3t64:ppc64el (1.8.4-2build1) ... 661s Setting up libevent-pthreads-2.1-7t64:ppc64el (2.1.12-stable-10build1) ... 661s Setting up libevent-2.1-7t64:ppc64el (2.1.12-stable-10build1) ... 661s Setting up dns-root-data (2025080400) ... 661s Setting up libunbound8:ppc64el (1.24.2-1ubuntu1) ... 661s Setting up libnss3-tools (2:3.120-1) ... 661s Setting up libreswan (5.2-2.2ubuntu1) ... 662s ipsec.service is a disabled or a static unit, not starting it. 662s Processing triggers for man-db (2.13.1-1) ... 663s Processing triggers for libc-bin (2.42-2ubuntu4) ... 676s autopkgtest [03:46:54]: test cavp: [----------------------- 676s Testing installed CAVP binary: /usr/libexec/ipsec/cavp 677s test: IKE v2 677s Reading from ikev2.fax 681s test: IKE v1 Digital Signature Authentication 681s Reading from ikev1_dsa.fax 684s test: IKE v1 Pre-shared Key Authentication 684s Reading from ikev1_psk.fax 687s /tmp/autopkgtest.IrEs07/build.6iV/src 687s autopkgtest [03:47:05]: test cavp: -----------------------] 687s autopkgtest [03:47:05]: test cavp: - - - - - - - - - - results - - - - - - - - - - 687s cavp PASS 688s autopkgtest [03:47:06]: @@@@@@@@@@@@@@@@@@@@ summary 688s opportunistic SKIP exit status 77 and marked as skippable 688s cryptocheck PASS 688s cavp PASS