0s autopkgtest [05:31:24]: starting date and time: 2026-02-03 05:31:24+0000 0s autopkgtest [05:31:24]: git checkout: 4b346b80 nova: make wait_reboot return success even when a no-op 0s autopkgtest [05:31:24]: host juju-7f2275-prod-proposed-migration-environment-2; command line: /home/ubuntu/autopkgtest/runner/autopkgtest --output-dir /tmp/autopkgtest-work.3o4ohdy9/out --timeout-copy=6000 --needs-internet=try --setup-commands /home/ubuntu/autopkgtest-cloud/worker-config-production/setup-canonical.sh --apt-pocket=proposed=src:debconf --apt-upgrade libreswan --timeout-short=300 --timeout-copy=20000 --timeout-build=20000 --env=ADT_TEST_TRIGGERS=debconf/1.5.91build1 -- ssh -s /home/ubuntu/autopkgtest/ssh-setup/nova -- --flavor autopkgtest-cpu2-ram4-disk20-ppc64el --security-groups autopkgtest-juju-7f2275-prod-proposed-migration-environment-2@sto01-ppc64el-5.secgroup --name adt-resolute-ppc64el-libreswan-20260203-053123-juju-7f2275-prod-proposed-migration-environment-2-7664ef73-a2ea-49fe-a1f9-58ad4081e8c2 --image adt/ubuntu-resolute-ppc64el-server --keyname testbed-juju-7f2275-prod-proposed-migration-environment-2 --net-id=net_prod-autopkgtest-workers-ppc64el -e TERM=linux --mirror=http://ftpmaster.internal/ubuntu/ 4s Creating nova instance adt-resolute-ppc64el-libreswan-20260203-053123-juju-7f2275-prod-proposed-migration-environment-2-7664ef73-a2ea-49fe-a1f9-58ad4081e8c2 from image adt/ubuntu-resolute-ppc64el-server-20260202.img (UUID ca98045c-2f99-4634-a243-9d47350236de)... 57s autopkgtest [05:32:21]: testbed dpkg architecture: ppc64el 58s autopkgtest [05:32:22]: testbed apt version: 3.1.14 58s autopkgtest [05:32:22]: @@@@@@@@@@@@@@@@@@@@ test bed setup 58s autopkgtest [05:32:22]: testbed release detected to be: None 59s autopkgtest [05:32:23]: updating testbed package index (apt update) 59s Get:1 http://ftpmaster.internal/ubuntu resolute-proposed InRelease [124 kB] 59s Hit:2 http://ftpmaster.internal/ubuntu resolute InRelease 59s Hit:3 http://ftpmaster.internal/ubuntu resolute-updates InRelease 59s Hit:4 http://ftpmaster.internal/ubuntu resolute-security InRelease 59s Get:5 http://ftpmaster.internal/ubuntu resolute-proposed/universe Sources [1270 kB] 60s Get:6 http://ftpmaster.internal/ubuntu resolute-proposed/main Sources [269 kB] 60s Get:7 http://ftpmaster.internal/ubuntu resolute-proposed/multiverse Sources [27.8 kB] 60s Get:8 http://ftpmaster.internal/ubuntu resolute-proposed/restricted Sources [5260 B] 60s Get:9 http://ftpmaster.internal/ubuntu resolute-proposed/main ppc64el Packages [297 kB] 60s Get:10 http://ftpmaster.internal/ubuntu resolute-proposed/universe ppc64el Packages [1080 kB] 60s Get:11 http://ftpmaster.internal/ubuntu resolute-proposed/multiverse ppc64el Packages [18.3 kB] 60s Fetched 3092 kB in 1s (4498 kB/s) 61s Reading package lists... 62s Hit:1 http://ftpmaster.internal/ubuntu resolute-proposed InRelease 62s Hit:2 http://ftpmaster.internal/ubuntu resolute InRelease 62s Hit:3 http://ftpmaster.internal/ubuntu resolute-updates InRelease 62s Hit:4 http://ftpmaster.internal/ubuntu resolute-security InRelease 62s Reading package lists... 62s Reading package lists... 63s Building dependency tree... 63s Reading state information... 63s Calculating upgrade... 63s The following packages will be upgraded: 63s cloud-init cloud-init-base debconf debconf-i18n libexpat1 63s liblocale-gettext-perl python3-debconf systemd-hwe-hwdb 63s 8 upgraded, 0 newly installed, 0 to remove and 0 not upgraded. 63s Need to get 1109 kB of archives. 63s After this operation, 2048 B of additional disk space will be used. 63s Get:1 http://ftpmaster.internal/ubuntu resolute/main ppc64el libexpat1 ppc64el 2.7.4-1 [106 kB] 63s Get:2 http://ftpmaster.internal/ubuntu resolute/main ppc64el liblocale-gettext-perl ppc64el 1.07-8 [16.3 kB] 63s Get:3 http://ftpmaster.internal/ubuntu resolute-proposed/main ppc64el python3-debconf all 1.5.91build1 [4174 B] 63s Get:4 http://ftpmaster.internal/ubuntu resolute-proposed/main ppc64el debconf-i18n all 1.5.91build1 [227 kB] 63s Get:5 http://ftpmaster.internal/ubuntu resolute-proposed/main ppc64el debconf all 1.5.91build1 [126 kB] 63s Get:6 http://ftpmaster.internal/ubuntu resolute/main ppc64el systemd-hwe-hwdb all 259.0.1 [3152 B] 63s Get:7 http://ftpmaster.internal/ubuntu resolute/main ppc64el cloud-init-base all 25.4~4g26c7d38d-0ubuntu1 [624 kB] 63s Get:8 http://ftpmaster.internal/ubuntu resolute/main ppc64el cloud-init all 25.4~4g26c7d38d-0ubuntu1 [2120 B] 64s dpkg-preconfigure: unable to re-open stdin: No such file or directory 64s Fetched 1109 kB in 0s (3692 kB/s) 64s (Reading database ... (Reading database ... 5% (Reading database ... 10% (Reading database ... 15% (Reading database ... 20% (Reading database ... 25% (Reading database ... 30% (Reading database ... 35% (Reading database ... 40% (Reading database ... 45% (Reading database ... 50% (Reading database ... 55% (Reading database ... 60% (Reading database ... 65% (Reading database ... 70% (Reading database ... 75% (Reading database ... 80% (Reading database ... 85% (Reading database ... 90% (Reading database ... 95% (Reading database ... 100% (Reading database ... 82007 files and directories currently installed.) 64s Preparing to unpack .../libexpat1_2.7.4-1_ppc64el.deb ... 64s Unpacking libexpat1:ppc64el (2.7.4-1) over (2.7.3-1) ... 64s Preparing to unpack .../liblocale-gettext-perl_1.07-8_ppc64el.deb ... 64s Unpacking liblocale-gettext-perl (1.07-8) over (1.07-7build1) ... 64s Preparing to unpack .../python3-debconf_1.5.91build1_all.deb ... 65s Unpacking python3-debconf (1.5.91build1) over (1.5.91) ... 65s Preparing to unpack .../debconf-i18n_1.5.91build1_all.deb ... 65s Unpacking debconf-i18n (1.5.91build1) over (1.5.91) ... 65s Preparing to unpack .../debconf_1.5.91build1_all.deb ... 65s Unpacking debconf (1.5.91build1) over (1.5.91) ... 66s Setting up debconf (1.5.91build1) ... 67s (Reading database ... (Reading database ... 5% (Reading database ... 10% (Reading database ... 15% (Reading database ... 20% (Reading database ... 25% (Reading database ... 30% (Reading database ... 35% (Reading database ... 40% (Reading database ... 45% (Reading database ... 50% (Reading database ... 55% (Reading database ... 60% (Reading database ... 65% (Reading database ... 70% (Reading database ... 75% (Reading database ... 80% (Reading database ... 85% (Reading database ... 90% (Reading database ... 95% (Reading database ... 100% (Reading database ... 82007 files and directories currently installed.) 67s Preparing to unpack .../systemd-hwe-hwdb_259.0.1_all.deb ... 67s Unpacking systemd-hwe-hwdb (259.0.1) over (257.7.1) ... 67s Preparing to unpack .../cloud-init-base_25.4~4g26c7d38d-0ubuntu1_all.deb ... 68s Unpacking cloud-init-base (25.4~4g26c7d38d-0ubuntu1) over (25.4~3g78f6f15e-0ubuntu1) ... 68s Preparing to unpack .../cloud-init_25.4~4g26c7d38d-0ubuntu1_all.deb ... 68s Unpacking cloud-init (25.4~4g26c7d38d-0ubuntu1) over (25.4~3g78f6f15e-0ubuntu1) ... 68s Setting up libexpat1:ppc64el (2.7.4-1) ... 68s Setting up python3-debconf (1.5.91build1) ... 68s Setting up cloud-init-base (25.4~4g26c7d38d-0ubuntu1) ... 69s Clearing ignored debconf value cloud-init/datasources 69s Encountered debconf setting for cloud-init-base/datasources. 70s Setting up systemd-hwe-hwdb (259.0.1) ... 71s Setting up liblocale-gettext-perl (1.07-8) ... 71s Setting up cloud-init (25.4~4g26c7d38d-0ubuntu1) ... 71s Setting up debconf-i18n (1.5.91build1) ... 72s Processing triggers for udev (259-1ubuntu3) ... 72s Processing triggers for libc-bin (2.42-2ubuntu4) ... 72s Processing triggers for rsyslog (8.2512.0-1ubuntu2) ... 73s Processing triggers for man-db (2.13.1-1) ... 76s autopkgtest [05:32:40]: upgrading testbed (apt dist-upgrade and autopurge) 76s Reading package lists... 76s Building dependency tree... 76s Reading state information... 76s Calculating upgrade... 76s 0 upgraded, 0 newly installed, 0 to remove and 0 not upgraded. 77s Reading package lists... 77s Building dependency tree... 77s Reading state information... 77s Solving dependencies... 77s 0 upgraded, 0 newly installed, 0 to remove and 0 not upgraded. 77s autopkgtest [05:32:41]: rebooting testbed after setup commands that affected boot 119s autopkgtest [05:33:23]: testbed running kernel: Linux 6.18.0-9-generic #9-Ubuntu SMP PREEMPT_DYNAMIC Mon Jan 12 16:45:54 UTC 2026 121s autopkgtest [05:33:25]: @@@@@@@@@@@@@@@@@@@@ apt-source libreswan 124s Get:1 http://ftpmaster.internal/ubuntu resolute/universe libreswan 5.2-2.2ubuntu1 (dsc) [2735 B] 124s Get:2 http://ftpmaster.internal/ubuntu resolute/universe libreswan 5.2-2.2ubuntu1 (tar) [4132 kB] 124s Get:3 http://ftpmaster.internal/ubuntu resolute/universe libreswan 5.2-2.2ubuntu1 (asc) [862 B] 124s Get:4 http://ftpmaster.internal/ubuntu resolute/universe libreswan 5.2-2.2ubuntu1 (diff) [16.7 kB] 124s gpgv: Signature made Thu Jul 31 14:30:12 2025 UTC 124s gpgv: using RSA key 25E3FF2D7F469DBE7D0D4E50AFCFEC8E669CE1C2 124s gpgv: Can't check signature: No public key 124s dpkg-source: warning: cannot verify inline signature for ./libreswan_5.2-2.2ubuntu1.dsc: no acceptable signature found 126s autopkgtest [05:33:30]: testing package libreswan version 5.2-2.2ubuntu1 126s autopkgtest [05:33:30]: build not needed 128s autopkgtest [05:33:32]: test opportunistic: preparing testbed 128s Reading package lists... 128s Building dependency tree... 128s Reading state information... 128s Solving dependencies... 128s The following NEW packages will be installed: 128s dns-root-data libevent-2.1-7t64 libevent-pthreads-2.1-7t64 libldns3t64 128s libnss3-tools libreswan libunbound8 128s 0 upgraded, 7 newly installed, 0 to remove and 0 not upgraded. 128s Need to get 3283 kB of archives. 128s After this operation, 15.4 MB of additional disk space will be used. 128s Get:1 http://ftpmaster.internal/ubuntu resolute/main ppc64el dns-root-data all 2025080400 [5908 B] 128s Get:2 http://ftpmaster.internal/ubuntu resolute/main ppc64el libnss3-tools ppc64el 2:3.120-1 [744 kB] 128s Get:3 http://ftpmaster.internal/ubuntu resolute/main ppc64el libevent-pthreads-2.1-7t64 ppc64el 2.1.12-stable-10build1 [8140 B] 128s Get:4 http://ftpmaster.internal/ubuntu resolute/universe ppc64el libldns3t64 ppc64el 1.8.4-2build1 [200 kB] 128s Get:5 http://ftpmaster.internal/ubuntu resolute/main ppc64el libevent-2.1-7t64 ppc64el 2.1.12-stable-10build1 [172 kB] 128s Get:6 http://ftpmaster.internal/ubuntu resolute/main ppc64el libunbound8 ppc64el 1.24.2-1ubuntu1 [576 kB] 129s Get:7 http://ftpmaster.internal/ubuntu resolute/universe ppc64el libreswan ppc64el 5.2-2.2ubuntu1 [1577 kB] 129s Fetched 3283 kB in 1s (4691 kB/s) 129s Selecting previously unselected package dns-root-data. 130s (Reading database ... (Reading database ... 5% (Reading database ... 10% (Reading database ... 15% (Reading database ... 20% (Reading database ... 25% (Reading database ... 30% (Reading database ... 35% (Reading database ... 40% (Reading database ... 45% (Reading database ... 50% (Reading database ... 55% (Reading database ... 60% (Reading database ... 65% (Reading database ... 70% (Reading database ... 75% (Reading database ... 80% (Reading database ... 85% (Reading database ... 90% (Reading database ... 95% (Reading database ... 100% (Reading database ... 82008 files and directories currently installed.) 130s Preparing to unpack .../0-dns-root-data_2025080400_all.deb ... 130s Unpacking dns-root-data (2025080400) ... 130s Selecting previously unselected package libnss3-tools. 130s Preparing to unpack .../1-libnss3-tools_2%3a3.120-1_ppc64el.deb ... 130s Unpacking libnss3-tools (2:3.120-1) ... 130s Selecting previously unselected package libevent-pthreads-2.1-7t64:ppc64el. 130s Preparing to unpack .../2-libevent-pthreads-2.1-7t64_2.1.12-stable-10build1_ppc64el.deb ... 130s Unpacking libevent-pthreads-2.1-7t64:ppc64el (2.1.12-stable-10build1) ... 130s Selecting previously unselected package libldns3t64:ppc64el. 130s Preparing to unpack .../3-libldns3t64_1.8.4-2build1_ppc64el.deb ... 130s Unpacking libldns3t64:ppc64el (1.8.4-2build1) ... 130s Selecting previously unselected package libevent-2.1-7t64:ppc64el. 130s Preparing to unpack .../4-libevent-2.1-7t64_2.1.12-stable-10build1_ppc64el.deb ... 130s Unpacking libevent-2.1-7t64:ppc64el (2.1.12-stable-10build1) ... 130s Selecting previously unselected package libunbound8:ppc64el. 130s Preparing to unpack .../5-libunbound8_1.24.2-1ubuntu1_ppc64el.deb ... 130s Unpacking libunbound8:ppc64el (1.24.2-1ubuntu1) ... 130s Selecting previously unselected package libreswan. 130s Preparing to unpack .../6-libreswan_5.2-2.2ubuntu1_ppc64el.deb ... 130s Unpacking libreswan (5.2-2.2ubuntu1) ... 130s Setting up libldns3t64:ppc64el (1.8.4-2build1) ... 130s Setting up libevent-pthreads-2.1-7t64:ppc64el (2.1.12-stable-10build1) ... 130s Setting up libevent-2.1-7t64:ppc64el (2.1.12-stable-10build1) ... 130s Setting up dns-root-data (2025080400) ... 130s Setting up libunbound8:ppc64el (1.24.2-1ubuntu1) ... 130s Setting up libnss3-tools (2:3.120-1) ... 130s Setting up libreswan (5.2-2.2ubuntu1) ... 131s ipsec.service is a disabled or a static unit, not starting it. 131s Processing triggers for man-db (2.13.1-1) ... 135s Processing triggers for libc-bin (2.42-2ubuntu4) ... 137s autopkgtest [05:33:40]: test opportunistic: [----------------------- 137s ping: oe.libreswan.org: No address associated with hostname 137s autopkgtest [05:33:41]: test opportunistic: -----------------------] 138s autopkgtest [05:33:42]: test opportunistic: - - - - - - - - - - results - - - - - - - - - - 138s opportunistic SKIP exit status 77 and marked as skippable 138s autopkgtest [05:33:42]: test cryptocheck: preparing testbed 157s Creating nova instance adt-resolute-ppc64el-libreswan-20260203-053123-juju-7f2275-prod-proposed-migration-environment-2-7664ef73-a2ea-49fe-a1f9-58ad4081e8c2 from image adt/ubuntu-resolute-ppc64el-server-20260202.img (UUID ca98045c-2f99-4634-a243-9d47350236de)... 205s autopkgtest [05:34:49]: testbed dpkg architecture: ppc64el 205s autopkgtest [05:34:49]: testbed apt version: 3.1.14 206s autopkgtest [05:34:50]: @@@@@@@@@@@@@@@@@@@@ test bed setup 206s autopkgtest [05:34:50]: testbed release detected to be: resolute 207s autopkgtest [05:34:51]: updating testbed package index (apt update) 207s Get:1 http://ftpmaster.internal/ubuntu resolute-proposed InRelease [124 kB] 207s Hit:2 http://ftpmaster.internal/ubuntu resolute InRelease 207s Hit:3 http://ftpmaster.internal/ubuntu resolute-updates InRelease 207s Hit:4 http://ftpmaster.internal/ubuntu resolute-security InRelease 207s Get:5 http://ftpmaster.internal/ubuntu resolute-proposed/universe Sources [1270 kB] 207s Get:6 http://ftpmaster.internal/ubuntu resolute-proposed/multiverse Sources [27.8 kB] 207s Get:7 http://ftpmaster.internal/ubuntu resolute-proposed/restricted Sources [5260 B] 207s Get:8 http://ftpmaster.internal/ubuntu resolute-proposed/main Sources [269 kB] 207s Get:9 http://ftpmaster.internal/ubuntu resolute-proposed/main ppc64el Packages [297 kB] 207s Get:10 http://ftpmaster.internal/ubuntu resolute-proposed/universe ppc64el Packages [1080 kB] 208s Get:11 http://ftpmaster.internal/ubuntu resolute-proposed/multiverse ppc64el Packages [18.3 kB] 208s Fetched 3092 kB in 1s (4117 kB/s) 208s Reading package lists... 209s Hit:1 http://ftpmaster.internal/ubuntu resolute-proposed InRelease 209s Hit:2 http://ftpmaster.internal/ubuntu resolute InRelease 209s Hit:3 http://ftpmaster.internal/ubuntu resolute-updates InRelease 209s Hit:4 http://ftpmaster.internal/ubuntu resolute-security InRelease 210s Reading package lists... 210s Reading package lists... 210s Building dependency tree... 210s Reading state information... 210s Calculating upgrade... 210s The following packages will be upgraded: 210s cloud-init cloud-init-base debconf debconf-i18n libexpat1 210s liblocale-gettext-perl python3-debconf systemd-hwe-hwdb 210s 8 upgraded, 0 newly installed, 0 to remove and 0 not upgraded. 210s Need to get 1109 kB of archives. 210s After this operation, 2048 B of additional disk space will be used. 210s Get:1 http://ftpmaster.internal/ubuntu resolute/main ppc64el libexpat1 ppc64el 2.7.4-1 [106 kB] 210s Get:2 http://ftpmaster.internal/ubuntu resolute/main ppc64el liblocale-gettext-perl ppc64el 1.07-8 [16.3 kB] 210s Get:3 http://ftpmaster.internal/ubuntu resolute-proposed/main ppc64el python3-debconf all 1.5.91build1 [4174 B] 210s Get:4 http://ftpmaster.internal/ubuntu resolute-proposed/main ppc64el debconf-i18n all 1.5.91build1 [227 kB] 210s Get:5 http://ftpmaster.internal/ubuntu resolute-proposed/main ppc64el debconf all 1.5.91build1 [126 kB] 210s Get:6 http://ftpmaster.internal/ubuntu resolute/main ppc64el systemd-hwe-hwdb all 259.0.1 [3152 B] 211s Get:7 http://ftpmaster.internal/ubuntu resolute/main ppc64el cloud-init-base all 25.4~4g26c7d38d-0ubuntu1 [624 kB] 211s Get:8 http://ftpmaster.internal/ubuntu resolute/main ppc64el cloud-init all 25.4~4g26c7d38d-0ubuntu1 [2120 B] 211s dpkg-preconfigure: unable to re-open stdin: No such file or directory 211s Fetched 1109 kB in 0s (3272 kB/s) 212s (Reading database ... (Reading database ... 5% (Reading database ... 10% (Reading database ... 15% (Reading database ... 20% (Reading database ... 25% (Reading database ... 30% (Reading database ... 35% (Reading database ... 40% (Reading database ... 45% (Reading database ... 50% (Reading database ... 55% (Reading database ... 60% (Reading database ... 65% (Reading database ... 70% (Reading database ... 75% (Reading database ... 80% (Reading database ... 85% (Reading database ... 90% (Reading database ... 95% (Reading database ... 100% (Reading database ... 82007 files and directories currently installed.) 212s Preparing to unpack .../libexpat1_2.7.4-1_ppc64el.deb ... 212s Unpacking libexpat1:ppc64el (2.7.4-1) over (2.7.3-1) ... 212s Preparing to unpack .../liblocale-gettext-perl_1.07-8_ppc64el.deb ... 212s Unpacking liblocale-gettext-perl (1.07-8) over (1.07-7build1) ... 212s Preparing to unpack .../python3-debconf_1.5.91build1_all.deb ... 213s Unpacking python3-debconf (1.5.91build1) over (1.5.91) ... 213s Preparing to unpack .../debconf-i18n_1.5.91build1_all.deb ... 213s Unpacking debconf-i18n (1.5.91build1) over (1.5.91) ... 213s Preparing to unpack .../debconf_1.5.91build1_all.deb ... 213s Unpacking debconf (1.5.91build1) over (1.5.91) ... 213s Setting up debconf (1.5.91build1) ... 214s (Reading database ... (Reading database ... 5% (Reading database ... 10% (Reading database ... 15% (Reading database ... 20% (Reading database ... 25% (Reading database ... 30% (Reading database ... 35% (Reading database ... 40% (Reading database ... 45% (Reading database ... 50% (Reading database ... 55% (Reading database ... 60% (Reading database ... 65% (Reading database ... 70% (Reading database ... 75% (Reading database ... 80% (Reading database ... 85% (Reading database ... 90% (Reading database ... 95% (Reading database ... 100% (Reading database ... 82007 files and directories currently installed.) 214s Preparing to unpack .../systemd-hwe-hwdb_259.0.1_all.deb ... 214s Unpacking systemd-hwe-hwdb (259.0.1) over (257.7.1) ... 214s Preparing to unpack .../cloud-init-base_25.4~4g26c7d38d-0ubuntu1_all.deb ... 214s Unpacking cloud-init-base (25.4~4g26c7d38d-0ubuntu1) over (25.4~3g78f6f15e-0ubuntu1) ... 215s Preparing to unpack .../cloud-init_25.4~4g26c7d38d-0ubuntu1_all.deb ... 215s Unpacking cloud-init (25.4~4g26c7d38d-0ubuntu1) over (25.4~3g78f6f15e-0ubuntu1) ... 215s Setting up libexpat1:ppc64el (2.7.4-1) ... 215s Setting up python3-debconf (1.5.91build1) ... 215s Setting up cloud-init-base (25.4~4g26c7d38d-0ubuntu1) ... 216s Clearing ignored debconf value cloud-init/datasources 216s Encountered debconf setting for cloud-init-base/datasources. 217s Setting up systemd-hwe-hwdb (259.0.1) ... 218s Setting up liblocale-gettext-perl (1.07-8) ... 218s Setting up cloud-init (25.4~4g26c7d38d-0ubuntu1) ... 218s Setting up debconf-i18n (1.5.91build1) ... 218s Processing triggers for udev (259-1ubuntu3) ... 219s Processing triggers for libc-bin (2.42-2ubuntu4) ... 219s Processing triggers for rsyslog (8.2512.0-1ubuntu2) ... 219s Processing triggers for man-db (2.13.1-1) ... 222s autopkgtest [05:35:06]: upgrading testbed (apt dist-upgrade and autopurge) 222s Reading package lists... 222s Building dependency tree... 222s Reading state information... 223s Calculating upgrade... 223s 0 upgraded, 0 newly installed, 0 to remove and 0 not upgraded. 223s Reading package lists... 223s Building dependency tree... 223s Reading state information... 223s Solving dependencies... 223s 0 upgraded, 0 newly installed, 0 to remove and 0 not upgraded. 223s autopkgtest [05:35:07]: rebooting testbed after setup commands that affected boot 265s Reading package lists... 265s Building dependency tree... 265s Reading state information... 265s Solving dependencies... 265s The following NEW packages will be installed: 265s dns-root-data libevent-2.1-7t64 libevent-pthreads-2.1-7t64 libldns3t64 265s libnss3-tools libreswan libunbound8 265s 0 upgraded, 7 newly installed, 0 to remove and 0 not upgraded. 265s Need to get 3283 kB of archives. 265s After this operation, 15.4 MB of additional disk space will be used. 265s Get:1 http://ftpmaster.internal/ubuntu resolute/main ppc64el dns-root-data all 2025080400 [5908 B] 265s Get:2 http://ftpmaster.internal/ubuntu resolute/main ppc64el libnss3-tools ppc64el 2:3.120-1 [744 kB] 265s Get:3 http://ftpmaster.internal/ubuntu resolute/main ppc64el libevent-pthreads-2.1-7t64 ppc64el 2.1.12-stable-10build1 [8140 B] 265s Get:4 http://ftpmaster.internal/ubuntu resolute/universe ppc64el libldns3t64 ppc64el 1.8.4-2build1 [200 kB] 265s Get:5 http://ftpmaster.internal/ubuntu resolute/main ppc64el libevent-2.1-7t64 ppc64el 2.1.12-stable-10build1 [172 kB] 265s Get:6 http://ftpmaster.internal/ubuntu resolute/main ppc64el libunbound8 ppc64el 1.24.2-1ubuntu1 [576 kB] 265s Get:7 http://ftpmaster.internal/ubuntu resolute/universe ppc64el libreswan ppc64el 5.2-2.2ubuntu1 [1577 kB] 266s Fetched 3283 kB in 0s (13.7 MB/s) 266s Selecting previously unselected package dns-root-data. 266s (Reading database ... (Reading database ... 5% (Reading database ... 10% (Reading database ... 15% (Reading database ... 20% (Reading database ... 25% (Reading database ... 30% (Reading database ... 35% (Reading database ... 40% (Reading database ... 45% (Reading database ... 50% (Reading database ... 55% (Reading database ... 60% (Reading database ... 65% (Reading database ... 70% (Reading database ... 75% (Reading database ... 80% (Reading database ... 85% (Reading database ... 90% (Reading database ... 95% (Reading database ... 100% (Reading database ... 82008 files and directories currently installed.) 266s Preparing to unpack .../0-dns-root-data_2025080400_all.deb ... 266s Unpacking dns-root-data (2025080400) ... 266s Selecting previously unselected package libnss3-tools. 266s Preparing to unpack .../1-libnss3-tools_2%3a3.120-1_ppc64el.deb ... 266s Unpacking libnss3-tools (2:3.120-1) ... 266s Selecting previously unselected package libevent-pthreads-2.1-7t64:ppc64el. 266s Preparing to unpack .../2-libevent-pthreads-2.1-7t64_2.1.12-stable-10build1_ppc64el.deb ... 266s Unpacking libevent-pthreads-2.1-7t64:ppc64el (2.1.12-stable-10build1) ... 266s Selecting previously unselected package libldns3t64:ppc64el. 266s Preparing to unpack .../3-libldns3t64_1.8.4-2build1_ppc64el.deb ... 266s Unpacking libldns3t64:ppc64el (1.8.4-2build1) ... 266s Selecting previously unselected package libevent-2.1-7t64:ppc64el. 266s Preparing to unpack .../4-libevent-2.1-7t64_2.1.12-stable-10build1_ppc64el.deb ... 266s Unpacking libevent-2.1-7t64:ppc64el (2.1.12-stable-10build1) ... 266s Selecting previously unselected package libunbound8:ppc64el. 266s Preparing to unpack .../5-libunbound8_1.24.2-1ubuntu1_ppc64el.deb ... 266s Unpacking libunbound8:ppc64el (1.24.2-1ubuntu1) ... 266s Selecting previously unselected package libreswan. 266s Preparing to unpack .../6-libreswan_5.2-2.2ubuntu1_ppc64el.deb ... 266s Unpacking libreswan (5.2-2.2ubuntu1) ... 267s Setting up libldns3t64:ppc64el (1.8.4-2build1) ... 267s Setting up libevent-pthreads-2.1-7t64:ppc64el (2.1.12-stable-10build1) ... 267s Setting up libevent-2.1-7t64:ppc64el (2.1.12-stable-10build1) ... 267s Setting up dns-root-data (2025080400) ... 267s Setting up libunbound8:ppc64el (1.24.2-1ubuntu1) ... 267s Setting up libnss3-tools (2:3.120-1) ... 267s Setting up libreswan (5.2-2.2ubuntu1) ... 267s ipsec.service is a disabled or a static unit, not starting it. 267s Processing triggers for man-db (2.13.1-1) ... 270s Processing triggers for libc-bin (2.42-2ubuntu4) ... 272s autopkgtest [05:35:56]: test cryptocheck: [----------------------- 273s Testing installed binary: /usr/libexec/ipsec/algparse 273s Testing installed binary: /usr/libexec/ipsec/pluto 273s testing -tp 273s algparse -v2 'esp' (expect SUCCESS) 273s AES_GCM_16_256-NONE 273s AES_GCM_16_128-NONE 273s CHACHA20_POLY1305-NONE 273s AES_CBC_256-HMAC_SHA2_512_256+HMAC_SHA2_256_128 273s AES_CBC_128-HMAC_SHA2_512_256+HMAC_SHA2_256_128 273s algparse -v2 'esp=' (expect ERROR) 273s ERROR: ESP proposal is empty 273s algparse -v2 'esp=aes' (expect SUCCESS) 273s AES_CBC-HMAC_SHA2_512_256+HMAC_SHA2_256_128 273s algparse -v2 'esp=aes;modp2048' (expect SUCCESS) 273s AES_CBC-HMAC_SHA2_512_256+HMAC_SHA2_256_128 273s algparse -v2 'esp=aes-sha1' (expect SUCCESS) 273s AES_CBC-HMAC_SHA1_96 273s algparse -v2 'esp=aes-sha1' (expect SUCCESS) 273s AES_CBC-HMAC_SHA1_96 273s algparse -v2 'esp=aes-sha1-modp2048' (expect SUCCESS) 273s AES_CBC-HMAC_SHA1_96 273s algparse -v2 'esp=aes-128-sha1' (expect SUCCESS) 273s AES_CBC_128-HMAC_SHA1_96 273s algparse -v2 'esp=aes-128-sha1' (expect SUCCESS) 273s AES_CBC_128-HMAC_SHA1_96 273s algparse -v2 'esp=aes-128-sha1-modp2048' (expect SUCCESS) 273s AES_CBC_128-HMAC_SHA1_96 273s algparse -v2 'esp=aes-128' (expect SUCCESS) 273s AES_CBC_128-HMAC_SHA2_512_256+HMAC_SHA2_256_128 273s algparse -v2 'esp=aes_gcm_a-128-null' (expect SUCCESS) 273s AES_GCM_8_128-NONE 273s algparse -v2 'esp=3des-sha1;modp1024' (expect ERROR) 273s ERROR: ESP DH algorithm 'modp1024' is not supported 273s algparse -v2 'esp=3des-sha1;modp1536' (expect SUCCESS) 273s 3DES_CBC-HMAC_SHA1_96 273s algparse -v2 'esp=3des-sha1;modp2048' (expect SUCCESS) 273s 3DES_CBC-HMAC_SHA1_96 273s algparse -v2 'esp=3des-sha1;dh21' (expect SUCCESS) 273s 3DES_CBC-HMAC_SHA1_96 273s algparse -v2 'esp=3des-sha1;ecp_521' (expect SUCCESS) 273s 3DES_CBC-HMAC_SHA1_96 273s algparse -v2 'esp=3des-sha1;dh23' (expect ERROR) 273s ERROR: ESP DH algorithm 'dh23' is not supported 273s algparse -v2 'esp=3des-sha1;dh24' (expect ERROR) 273s ERROR: ESP DH algorithm 'dh24' is not supported 273s algparse -v2 'esp=3des-sha1' (expect SUCCESS) 273s 3DES_CBC-HMAC_SHA1_96 273s algparse -v2 'esp=null-sha1' (expect SUCCESS) 273s NULL-HMAC_SHA1_96 273s ipsec algparse: Encryption algorithms: 273s ipsec algparse: AES_CCM_16 {256,192,*128} IKEv1: ESP IKEv2: ESP FIPS aes_ccm, aes_ccm_c 273s ipsec algparse: AES_CCM_12 {256,192,*128} IKEv1: ESP IKEv2: ESP FIPS aes_ccm_b 273s ipsec algparse: AES_CCM_8 {256,192,*128} IKEv1: ESP IKEv2: ESP FIPS aes_ccm_a 273s ipsec algparse: 3DES_CBC [*192] IKEv1: IKE ESP IKEv2: IKE ESP FIPS NSS(CBC) 3des 273s ipsec algparse: CAMELLIA_CTR {256,192,*128} IKEv1: ESP IKEv2: ESP 273s ipsec algparse: CAMELLIA_CBC {256,192,*128} IKEv1: IKE ESP IKEv2: IKE ESP NSS(CBC) camellia 273s ipsec algparse: AES_GCM_16 {256,192,*128} IKEv1: ESP IKEv2: IKE ESP FIPS NSS(AEAD) aes_gcm, aes_gcm_c 273s ipsec algparse: AES_GCM_12 {256,192,*128} IKEv1: ESP IKEv2: IKE ESP FIPS NSS(AEAD) aes_gcm_b 273s ipsec algparse: AES_GCM_8 {256,192,*128} IKEv1: ESP IKEv2: IKE ESP FIPS NSS(AEAD) aes_gcm_a 273s ipsec algparse: AES_CTR {256,192,*128} IKEv1: IKE ESP IKEv2: IKE ESP FIPS NSS(CTR) aesctr 273s ipsec algparse: AES_CBC {256,192,*128} IKEv1: IKE ESP IKEv2: IKE ESP FIPS NSS(CBC) aes 273s ipsec algparse: NULL_AUTH_AES_GMAC {256,192,*128} IKEv1: ESP IKEv2: ESP FIPS aes_gmac 273s ipsec algparse: NULL [] IKEv1: ESP IKEv2: ESP NULL 273s ipsec algparse: CHACHA20_POLY1305 [*256] IKEv1: IKEv2: IKE ESP NSS(AEAD) chacha20poly1305 273s ipsec algparse: Hash algorithms: 273s ipsec algparse: MD5 IKEv1: IKE IKEv2: NSS 273s ipsec algparse: SHA1 IKEv1: IKE IKEv2: IKE FIPS NSS sha 273s ipsec algparse: SHA2_256 IKEv1: IKE IKEv2: IKE FIPS NSS sha2, sha256 273s ipsec algparse: SHA2_384 IKEv1: IKE IKEv2: IKE FIPS NSS sha384 273s ipsec algparse: SHA2_512 IKEv1: IKE IKEv2: IKE FIPS NSS sha512 273s ipsec algparse: IDENTITY IKEv1: IKEv2: FIPS 273s ipsec algparse: PRF algorithms: 273s ipsec algparse: HMAC_MD5 IKEv1: IKE IKEv2: IKE NSS md5 273s ipsec algparse: HMAC_SHA1 IKEv1: IKE IKEv2: IKE FIPS NSS sha, sha1 273s ipsec algparse: HMAC_SHA2_256 IKEv1: IKE IKEv2: IKE FIPS NSS sha2, sha256, sha2_256 273s ipsec algparse: HMAC_SHA2_384 IKEv1: IKE IKEv2: IKE FIPS NSS sha384, sha2_384 273s ipsec algparse: HMAC_SHA2_512 IKEv1: IKE IKEv2: IKE FIPS NSS sha512, sha2_512 273s ipsec algparse: AES_XCBC IKEv1: IKEv2: IKE native(XCBC) aes128_xcbc 273s ipsec algparse: Integrity algorithms: 273s ipsec algparse: HMAC_MD5_96 IKEv1: IKE ESP AH IKEv2: IKE ESP AH NSS md5, hmac_md5 273s ipsec algparse: HMAC_SHA1_96 IKEv1: IKE ESP AH IKEv2: IKE ESP AH FIPS NSS sha, sha1, sha1_96, hmac_sha1 273s ipsec algparse: HMAC_SHA2_512_256 IKEv1: IKE ESP AH IKEv2: IKE ESP AH FIPS NSS sha512, sha2_512, sha2_512_256, hmac_sha2_512 273s ipsec algparse: HMAC_SHA2_384_192 IKEv1: IKE ESP AH IKEv2: IKE ESP AH FIPS NSS sha384, sha2_384, sha2_384_192, hmac_sha2_384 273s ipsec algparse: HMAC_SHA2_256_128 IKEv1: IKE ESP AH IKEv2: IKE ESP AH FIPS NSS sha2, sha256, sha2_256, sha2_256_128, hmac_sha2_256 273s ipsec algparse: HMAC_SHA2_256_TRUNCBUG IKEv1: ESP AH IKEv2: AH 273s ipsec algparse: AES_XCBC_96 IKEv1: ESP AH IKEv2: IKE ESP AH native(XCBC) aes_xcbc, aes128_xcbc, aes128_xcbc_96 273s ipsec algparse: AES_CMAC_96 IKEv1: ESP AH IKEv2: ESP AH FIPS aes_cmac 273s ipsec algparse: NONE IKEv1: ESP IKEv2: IKE ESP FIPS null 273s ipsec algparse: DH algorithms: 273s ipsec algparse: NONE IKEv1: IKEv2: IKE ESP AH FIPS NSS(MODP) null, dh0 273s ipsec algparse: MODP1536 IKEv1: IKE ESP AH IKEv2: IKE ESP AH NSS(MODP) dh5 273s ipsec algparse: MODP2048 IKEv1: IKE ESP AH IKEv2: IKE ESP AH FIPS NSS(MODP) dh14 273s ipsec algparse: MODP3072 IKEv1: IKE ESP AH IKEv2: IKE ESP AH FIPS NSS(MODP) dh15 273s ipsec algparse: MODP4096 IKEv1: IKE ESP AH IKEv2: IKE ESP AH FIPS NSS(MODP) dh16 273s ipsec algparse: MODP6144 IKEv1: IKE ESP AH IKEv2: IKE ESP AH FIPS NSS(MODP) dh17 273s ipsec algparse: MODP8192 IKEv1: IKE ESP AH IKEv2: IKE ESP AH FIPS NSS(MODP) dh18 273s ipsec algparse: DH19 IKEv1: IKE IKEv2: IKE ESP AH FIPS NSS(ECP) ecp_256, ecp256 273s ipsec algparse: DH20 IKEv1: IKE IKEv2: IKE ESP AH FIPS NSS(ECP) ecp_384, ecp384 273s ipsec algparse: DH21 IKEv1: IKE IKEv2: IKE ESP AH FIPS NSS(ECP) ecp_521, ecp521 273s ipsec algparse: DH31 IKEv1: IKE IKEv2: IKE ESP AH NSS(ECP) curve25519 273s ipsec algparse: IPCOMP algorithms: 273s ipsec algparse: DEFLATE IKEv1: ESP AH IKEv2: ESP AH FIPS 273s ipsec algparse: LZS IKEv1: IKEv2: ESP AH FIPS 273s ipsec algparse: LZJH IKEv1: IKEv2: ESP AH FIPS 273s | parsing 'AES_GCM_16_256,AES_GCM_16_128,CHACHA20_POLY1305,AES_CBC_256,AES_CBC_128' for ESP 273s | proposal: 'AES_GCM_16_256' 273s | token: '' '' "AES_GCM_16_256" '' 273s | token: '' "AES_GCM_16_256" '' '' 273s | ike_alg_byname() failed: ESP encryption algorithm 'AES_GCM_16_256' is not recognized 273s | token: '' '' '' 273s | appending ESP encryption algorithm AES_GCM_16[_256] 273s | appending ESP integrity algorithm NONE[_0] 273s | proposal: 'AES_GCM_16_128' 273s | token: '' '' "AES_GCM_16_128" '' 273s | token: '' "AES_GCM_16_128" '' '' 273s | ike_alg_byname() failed: ESP encryption algorithm 'AES_GCM_16_128' is not recognized 273s | token: '' '' '' 273s | appending ESP encryption algorithm AES_GCM_16[_128] 273s | appending ESP integrity algorithm NONE[_0] 273s | proposal: 'CHACHA20_POLY1305' 273s | token: '' '' "CHACHA20_POLY1305" '' 273s | token: '' "CHACHA20_POLY1305" '' '' 273s | token: '' '' '' 273s | appending ESP encryption algorithm CHACHA20_POLY1305[_0] 273s | appending ESP integrity algorithm NONE[_0] 273s | proposal: 'AES_CBC_256' 273s | token: '' '' "AES_CBC_256" '' 273s | token: '' "AES_CBC_256" '' '' 273s | ike_alg_byname() failed: ESP encryption algorithm 'AES_CBC_256' is not recognized 273s | token: '' '' '' 273s | appending ESP encryption algorithm AES_CBC[_256] 273s | appending ESP integrity algorithm HMAC_SHA2_512_256[_0] 273s | appending ESP integrity algorithm HMAC_SHA2_256_128[_0] 273s | proposal: 'AES_CBC_128' 273s | token: '' '' "AES_CBC_128" '' 273s | token: '' "AES_CBC_128" '' '' 273s | ike_alg_byname() failed: ESP encryption algorithm 'AES_CBC_128' is not recognized 273s | token: '' '' '' 273s | appending ESP encryption algorithm AES_CBC[_128] 273s | appending ESP integrity algorithm HMAC_SHA2_512_256[_0] 273s | appending ESP integrity algorithm HMAC_SHA2_256_128[_0] 273s | parsing '' for ESP 273s | parsing 'aes' for ESP 273s | proposal: 'aes' 273s | token: '' '' "aes" '' 273s | token: '' "aes" '' '' 273s | token: '' '' '' 273s | appending ESP encryption algorithm AES_CBC[_0] 273s | appending ESP integrity algorithm HMAC_SHA2_512_256[_0] 273s | appending ESP integrity algorithm HMAC_SHA2_256_128[_0] 273s | parsing 'aes;modp2048' for ESP 273s | proposal: 'aes;modp2048' 273s | token: '' '' "aes" ';' 273s | token: '' "aes" ';' "modp2048" '' 273s | token: ';' "modp2048" '' '' 273s | appending ESP encryption algorithm AES_CBC[_0] 273s | parsing dh: 273s | appending ESP DH algorithm MODP2048[_0] 273s | token: '' '' '' 273s | appending ESP integrity algorithm HMAC_SHA2_512_256[_0] 273s | appending ESP integrity algorithm HMAC_SHA2_256_128[_0] 273s ipsec algparse: ignoring ESP DH algorithm MODP2048 as PFS policy is disabled 273s | parsing 'aes-sha1' for ESP 273s | proposal: 'aes-sha1' 273s | token: '' '' "aes" '-' 273s | token: '' "aes" '-' "sha1" '' 273s | token: '-' "sha1" '' '' 273s | appending ESP encryption algorithm AES_CBC[_0] 273s | parsing integ: 273s | appending ESP integrity algorithm HMAC_SHA1_96[_0] 273s | token: '' '' '' 273s | parsing 'aes-sha1' for ESP 273s | proposal: 'aes-sha1' 273s | token: '' '' "aes" '-' 273s | token: '' "aes" '-' "sha1" '' 273s | token: '-' "sha1" '' '' 273s | appending ESP encryption algorithm AES_CBC[_0] 273s | parsing integ: 273s | appending ESP integrity algorithm HMAC_SHA1_96[_0] 273s | token: '' '' '' 273s | parsing 'aes-sha1-modp2048' for ESP 273s | proposal: 'aes-sha1-modp2048' 273s | token: '' '' "aes" '-' 273s | token: '' "aes" '-' "sha1" '-' 273s | token: '-' "sha1" '-' "modp2048" '' 273s | appending ESP encryption algorithm AES_CBC[_0] 273s | parsing integ: 273s | appending ESP integrity algorithm HMAC_SHA1_96[_0] 273s | token: '-' "modp2048" '' '' 273s | parsing dh: 273s | appending ESP DH algorithm MODP2048[_0] 273s | token: '' '' '' 273s ipsec algparse: ignoring ESP DH algorithm MODP2048 as PFS policy is disabled 273s | parsing 'aes-128-sha1' for ESP 273s | proposal: 'aes-128-sha1' 273s | token: '' '' "aes" '-' 273s | token: '' "aes" '-' "128" '-' 273s | token: '-' "128" '-' "sha1" '' 273s | token: '-' "sha1" '' '' 273s | appending ESP encryption algorithm AES_CBC[_128] 273s | parsing integ: 273s | appending ESP integrity algorithm HMAC_SHA1_96[_0] 273s | token: '' '' '' 273s | parsing 'aes-128-sha1' for ESP 273s | proposal: 'aes-128-sha1' 273s | token: '' '' "aes" '-' 273s | token: '' "aes" '-' "128" '-' 273s | token: '-' "128" '-' "sha1" '' 273s | token: '-' "sha1" '' '' 273s | appending ESP encryption algorithm AES_CBC[_128] 273s | parsing integ: 273s | appending ESP integrity algorithm HMAC_SHA1_96[_0] 273s | token: '' '' '' 273s | parsing 'aes-128-sha1-modp2048' for ESP 273s | proposal: 'aes-128-sha1-modp2048' 273s | token: '' '' "aes" '-' 273s | token: '' "aes" '-' "128" '-' 273s | token: '-' "128" '-' "sha1" '-' 273s | token: '-' "sha1" '-' "modp2048" '' 273s | appending ESP encryption algorithm AES_CBC[_128] 273s | parsing integ: 273s | appending ESP integrity algorithm HMAC_SHA1_96[_0] 273s | token: '-' "modp2048" '' '' 273s | parsing dh: 273s | appending ESP DH algorithm MODP2048[_0] 273s | token: '' '' '' 273s ipsec algparse: ignoring ESP DH algorithm MODP2048 as PFS policy is disabled 273s | parsing 'aes-128' for ESP 273s | proposal: 'aes-128' 273s | token: '' '' "aes" '-' 273s | token: '' "aes" '-' "128" '' 273s | token: '-' "128" '' '' 273s | token: '' '' '' 273s | appending ESP encryption algorithm AES_CBC[_128] 273s | appending ESP integrity algorithm HMAC_SHA2_512_256[_0] 273s | appending ESP integrity algorithm HMAC_SHA2_256_128[_0] 273s | parsing 'aes_gcm_a-128-null' for ESP 273s | proposal: 'aes_gcm_a-128-null' 273s | token: '' '' "aes_gcm_a" '-' 273s | token: '' "aes_gcm_a" '-' "128" '-' 273s | token: '-' "128" '-' "null" '' 273s | token: '-' "null" '' '' 273s | appending ESP encryption algorithm AES_GCM_8[_128] 273s | parsing integ: 273s | appending ESP integrity algorithm NONE[_0] 273s | token: '' '' '' 273s | parsing '3des-sha1;modp1024' for ESP 273s | proposal: '3des-sha1;modp1024' 273s | token: '' '' "3des" '-' 273s | token: '' "3des" '-' "sha1" ';' 273s | token: '-' "sha1" ';' "modp1024" '' 273s | appending ESP encryption algorithm 3DES_CBC[_0] 273s | parsing integ: 273s | appending ESP integrity algorithm HMAC_SHA1_96[_0] 273s | token: ';' "modp1024" '' '' 273s | parsing dh: 273s | ike_alg_byname() failed: ESP DH algorithm 'modp1024' is not supported 273s | lookup for DH algorithm 'modp1024' failed 273s | ... failed 'ESP DH algorithm 'modp1024' is not supported' 273s | parsing '3des-sha1;modp1536' for ESP 273s | proposal: '3des-sha1;modp1536' 273s | token: '' '' "3des" '-' 273s | token: '' "3des" '-' "sha1" ';' 273s | token: '-' "sha1" ';' "modp1536" '' 273s | appending ESP encryption algorithm 3DES_CBC[_0] 273s | parsing integ: 273s | appending ESP integrity algorithm HMAC_SHA1_96[_0] 273s | token: ';' "modp1536" '' '' 273s | parsing dh: 273s | appending ESP DH algorithm MODP1536[_0] 273s | token: '' '' '' 273s ipsec algparse: ignoring ESP DH algorithm MODP1536 as PFS policy is disabled 273s | parsing '3des-sha1;modp2048' for ESP 273s | proposal: '3des-sha1;modp2048' 273s | token: '' '' "3des" '-' 273s | token: '' "3des" '-' "sha1" ';' 273s | token: '-' "sha1" ';' "modp2048" '' 273s | appending ESP encryption algorithm 3DES_CBC[_0] 273s | parsing integ: 273s | appending ESP integrity algorithm HMAC_SHA1_96[_0] 273s | token: ';' "modp2048" '' '' 273s | parsing dh: 273s | appending ESP DH algorithm MODP2048[_0] 273s | token: '' '' '' 273s ipsec algparse: ignoring ESP DH algorithm MODP2048 as PFS policy is disabled 273s | parsing '3des-sha1;dh21' for ESP 273s | proposal: '3des-sha1;dh21' 273s | token: '' '' "3des" '-' 273s | token: '' "3des" '-' "sha1" ';' 273s | token: '-' "sha1" ';' "dh21" '' 273s | appending ESP encryption algorithm 3DES_CBC[_0] 273s | parsing integ: 273s | appending ESP integrity algorithm HMAC_SHA1_96[_0] 273s | token: ';' "dh21" '' '' 273s | parsing dh: 273s | appending ESP DH algorithm DH21[_0] 273s | token: '' '' '' 273s ipsec algparse: ignoring ESP DH algorithm DH21 as PFS policy is disabled 273s | parsing '3des-sha1;ecp_521' for ESP 273s | proposal: '3des-sha1;ecp_521' 273s | token: '' '' "3des" '-' 273s | token: '' "3des" '-' "sha1" ';' 273s | token: '-' "sha1" ';' "ecp_521" '' 273s | appending ESP encryption algorithm 3DES_CBC[_0] 273s | parsing integ: 273s | appending ESP integrity algorithm HMAC_SHA1_96[_0] 273s | token: ';' "ecp_521" '' '' 273s | parsing dh: 273s | appending ESP DH algorithm DH21[_0] 273s | token: '' '' '' 273s ipsec algparse: ignoring ESP DH algorithm DH21 as PFS policy is disabled 273s | parsing '3des-sha1;dh23' for ESP 273s | proposal: '3des-sha1;dh23' 273s | token: '' '' "3des" '-' 273s | token: '' "3des" '-' "sha1" ';' 273s | token: '-' "sha1" ';' "dh23" '' 273s | appending ESP encryption algorithm 3DES_CBC[_0] 273s | parsing integ: 273s | appending ESP integrity algorithm HMAC_SHA1_96[_0] 273s | token: ';' "dh23" '' '' 273s | parsing dh: 273s | ike_alg_byname() failed: ESP DH algorithm 'dh23' is not supported 273s | lookup for DH algorithm 'dh23' failed 273s | ... failed 'ESP DH algorithm 'dh23' is not supported' 273s | parsing '3des-sha1;dh24' for ESP 273s | proposal: '3des-sha1;dh24' 273s | token: '' '' "3des" '-' 273s | token: '' "3des" '-' "sha1" ';' 273s | token: '-' "sha1" ';' "dh24" '' 273s | appending ESP encryption algorithm 3DES_CBC[_0] 273s | parsing integ: 273s | appending ESP integrity algorithm HMAC_SHA1_96[_0] 273s | token: ';' "dh24" '' '' 273s | parsing dh: 273s | ike_alg_byname() failed: ESP DH algorithm 'dh24' is not supported 273s | lookup for DH algorithm 'dh24' failed 273s | ... failed 'ESP DH algorithm 'dh24' is not supported' 273s | parsing '3des-sha1' for ESP 273s | proposal: '3des-sha1' 273s | token: '' '' "3des" '-' 273s | token: '' "3des" '-' "sha1" '' 273s | token: '-' "sha1" '' '' 273s | appending ESP encryption algorithm 3DES_CBC[_0] 273s | parsing integ: 273s | appending ESP integrity algorithm HMAC_SHA1_96[_0] 273s | token: '' '' '' 273s | parsing 'null-sha1' for ESP 273s | proposal: 'null-sha1' 273s | token: '' '' "null" '-' 273s | token: '' "null" '-' "sha1" '' 273s | token: '-' "sha1" '' '' 273s | appending ESP encryption algorithm NULL[_0] 273s | parsing integ: 273s | appending ESP integrity algorithm HMAC_SHA1_96[_0] 273s | token: '' '' '' 273s | parsing 'aes_cbc' for ESP 273s | proposal: 'aes_cbc' 273s | token: '' '' "aes_cbc" '' 273s | token: '' "aes_cbc" '' '' 273s | token: '' '' '' 273s | appending ESP encryption algorithm AES_CBC[_0] 273s | appending ESP integrity algorithm HMAC_SHA2_512_256[_0] 273s | appending ESP integrity algorithm HMAC_SHA2_256_128[_0] 273s | parsing 'aes-sha' for ESP 273s | proposal: 'aes-sha' 273s | token: '' '' "aes" '-' 273s | token: '' "aes" '-' "sha" '' 273s | token: '-' "sha" '' '' 273s | appending ESP encryption algorithm AES_CBC[_0] 273s | parsing integ: 273s | appending ESP integrity algorithm HMAC_SHA1_96[_0] 273s | token: '' '' '' 273s | parsing 'aes-sha1' for ESP 273s | proposal: 'aes-sha1' 273s | token: '' '' "aes" '-' 273s | token: '' "aes" '-' "sha1" '' 273s | token: '-' "sha1" '' '' 273s | appending ESP encryption algorithm AES_CBC[_0] 273s | parsing integ: 273s | appending ESP integrity algorithm HMAC_SHA1_96[_0] 273s | token: '' '' '' 273s | parsing 'aes128-sha1' for ESP 273s | proposal: 'aes128-sha1' 273s | token: '' '' "aes128" '-' 273s | token: '' "aes128" '-' "sha1" '' 273s | ike_alg_byname() failed: ESP encryption algorithm 'aes128' is not recognized 273s | token: '-' "sha1" '' '' 273s | appending ESP encryption algorithm AES_CBC[_128] 273s | parsing integ: 273s | appending ESP integrity algorithm HMAC_SHA1_96[_0] 273s | token: '' '' '' 273s | parsing 'aes-sha2' for ESP 273s | proposal: 'aes-sha2' 273s | token: '' '' "aes" '-' 273s | token: '' "aes" '-' "sha2" '' 273s | token: '-' "sha2" '' '' 273s | appending ESP encryption algorithm AES_CBC[_0] 273s | parsing integ: 273s | appending ESP integrity algorithm HMAC_SHA2_256_128[_0] 273s | token: '' '' '' 273s | parsing 'aes-sha256' for ESP 273s | proposal: 'aes-sha256' 273s | token: '' '' "aes" '-' 273s | token: '' "aes" '-' "sha256" '' 273s | token: '-' "sha256" '' '' 273s | appending ESP encryption algorithm AES_CBC[_0] 273s | parsing integ: 273s | appending ESP integrity algorithm HMAC_SHA2_256_128[_0] 273s | token: '' '' '' 273s | parsing 'aes-sha384' for ESP 273s | proposal: 'aes-sha384' 273s | token: '' '' "aes" '-' 273s | token: '' "aes" '-' "sha384" '' 273s | token: '-' "sha384" '' '' 273s | appending ESP encryption algorithm AES_CBC[_0] 273s | parsing integ: 273s | appending ESP integrity algorithm HMAC_SHA2_384_192[_0] 273s | token: '' '' '' 273s | parsing 'aes-sha512' for ESP 273s | proposal: 'aes-sha512' 273s | token: '' '' "aes" '-' 273s | token: '' "aes" '-' "sha512" '' 273s | token: '-' "sha512" '' '' 273s | appending ESP encryption algorithm AES_CBC[_0] 273s | parsing integ: 273s | appending ESP integrity algorithm HMAC_SHA2_512_256[_0] 273s | token: '' '' '' 273s | parsing 'aes128-aes_xcbc' for ESP 273s | proposal: 'aes128-aes_xcbc' 273s | token: '' '' "aes128" '-' 273s | token: '' "aes128" '-' "aes_xcbc" '' 273s | ike_alg_byname() failed: ESP encryption algorithm 'aes128' is not recognized 273s | token: '-' "aes_xcbc" '' '' 273s | appending ESP encryption algorithm AES_CBC[_128] 273s | parsing integ: 273s | appending ESP integrity algorithm AES_XCBC_96[_0] 273s | token: '' '' '' 273s | parsing 'aes192-sha1' for ESP 273s | proposal: 'aes192-sha1' 273s | token: '' '' "aes192" '-' 273s | token: '' "aes192" '-' "sha1" '' 273s | ike_alg_byname() failed: ESP encryption algorithm 'aes192' is not recognized 273s | token: '-' "sha1" '' '' 273s | appending ESP encryption algorithm AES_CBC[_192] 273s | parsing integ: 273s | appending ESP integrity algorithm HMAC_SHA1_96[_0] 273s | token: '' '' '' 273s | parsing 'aes256-sha1' for ESP 273s | proposal: 'aes256-sha1' 273s | token: '' '' "aes256" '-' 273s | token: '' "aes256" '-' "sha1" '' 273s | ike_alg_byname() failed: ESP encryption algorithm 'aes256' is not recognized 273s | token: '-' "sha1" '' '' 273s | appending ESP encryption algorithm AES_CBC[_256] 273s | parsing integ: 273s | appending ESP integrity algorithm HMAC_SHA1_96[_0] 273s | token: '' '' '' 273s | parsing 'aes256-sha' for ESP 273s | proposal: 'aes256-sha' 273s | token: '' '' "aes256" '-' 273s | token: '' "aes256" '-' "sha" '' 273s | ike_alg_byname() failed: ESP encryption algorithm 'aes256' is not recognized 273s | token: '-' "sha" '' '' 273s | appending ESP encryption algorithm AES_CBC[_256] 273s | parsing integ: 273s | appending ESP integrity algorithm HMAC_SHA1_96[_0] 273s | token: '' '' '' 273s | parsing 'aes256-sha2' for ESP 273s | proposal: 'aes256-sha2' 273s | token: '' '' "aes256" '-' 273s | token: '' "aes256" '-' "sha2" '' 273s | ike_alg_byname() failed: ESP encryption algorithm 'aes256' is not recognized 273s | token: '-' "sha2" '' '' 273s | appending ESP encryption algorithm AES_CBC[_256] 273s | parsing integ: 273s | appending ESP integrity algorithm HMAC_SHA2_256_128[_0] 273s | token: '' '' '' 273s | parsing 'aes256-sha2_256' for ESP 273s | proposal: 'aes256-sha2_256' 273s | token: '' '' "aes256" '-' 273s | token: '' "aes256" '-' "sha2_256" '' 273s | ike_alg_byname() failed: ESP encryption algorithm 'aes256' is not recognized 273s | token: '-' "sha2_256" '' '' 273s | appending ESP encryption algorithm AES_CBC[_256] 273s | parsing integ: 273s | appending ESP integrity algorithm HMAC_SHA2_256_128[_0] 273s | token: '' '' '' 273s | parsing 'aes256-sha2_384' for ESP 273s | proposal: 'aes256-sha2_384' 273s | token: '' '' "aes256" '-' 273s | token: '' "aes256" '-' "sha2_384" '' 273s | ike_alg_byname() failed: ESP encryption algorithm 'aes256' is not recognized 273s | token: '-' "sha2_384" '' '' 273s | appending ESP encryption algorithm AES_CBC[_256] 273s | parsing integ: 273s | appending ESP integrity algorithm HMAC_SHA2_384_192[_0] 273s | token: '' '' '' 273s | parsing 'aes256-sha2_512' for ESP 273s | proposal: 'aes256-sha2_512' 273s | token: '' '' "aes256" '-' 273s | token: '' "aes256" '-' "sha2_512" '' 273s | ike_alg_byname() failed: ESP encryption algorithm 'aes256' is not recognized 273s | token: '-' "sha2_512" '' '' 273s | appending ESP encryption algorithm AES_CBC[_256] 273s | parsing integ: 273s | appending ESP integrity algorithm HMAC_SHA2_512_256[_0] 273s | token: '' '' '' 273s | parsing 'camellia' for ESP 273s | proposal: 'camellia' 273s | token: '' '' "camellia" '' 273s | token: '' "camellia" '' '' 273s | token: '' '' '' 273s | appending ESP encryption algorithm CAMELLIA_CBC[_0] 273s | appending ESP integrity algorithm HMAC_SHA2_512_256[_0] 273s | appending ESP integrity algorithm HMAC_SHA2_256_128[_0] 273s | parsing 'camellia128' for ESP 273s | proposal: 'camellia128' 273s | token: '' '' "camellia128" '' 273s | token: '' "camellia128" '' '' 273s | ike_alg_byname() failed: ESP encryption algorithm 'camellia128' is not recognized 273s | token: '' '' '' 273s | appending ESP encryption algorithm CAMELLIA_CBC[_128] 273s | appending ESP integrity algorithm HMAC_SHA2_512_256[_0] 273s | appending ESP integrity algorithm HMAC_SHA2_256_128[_0] 273s | parsing 'camellia192' for ESP 273s | proposal: 'camellia192' 273s | token: '' '' "camellia192" '' 273s | token: '' "camellia192" '' '' 273s | ike_alg_byname() failed: ESP encryption algorithm 'camellia192' is not recognized 273s | token: '' '' '' 273s | appending ESP encryption algorithm CAMELLIA_CBC[_192] 273s | appending ESP integrity algorithm HMAC_SHA2_512_256[_0] 273s | appending ESP integrity algorithm HMAC_SHA2_256_128[_0] 273s | parsing 'camellia256' for ESP 273s | proposal: 'camellia256' 273s | token: '' '' "camellia256" '' 273s | token: '' "camellia256" '' '' 273s | ike_alg_byname() failed: ESP encryption algorithm 'camellia256' is not recognized 273s | token: '' '' '' 273s | appending ESP encryption algorithm CAMELLIA_CBC[_256] 273s | appending ESP integrity algorithm HMAC_SHA2_512_256[_0] 273s | appending ESP integrity algorithm HMAC_SHA2_256_128[_0] 273s | parsing 'aes_ccm' for ESP 273s | proposal: 'aes_ccm' 273s | token: '' '' "aes_ccm" '' 273s | token: '' "aes_ccm" '' '' 273s | token: '' '' '' 273s | appending ESP encryption algorithm AES_CCM_16[_0] 273s | appending ESP integrity algorithm NONE[_0] 273s | parsing 'aes_ccm_a-128-null' for ESP 273s | proposal: 'aes_ccm_a-128-null' 273s | token: '' '' "aes_ccm_a" '-' 273s | token: '' "aes_ccm_a" '-' "128" '-' 273s | token: '-' "128" '-' "null" '' 273s | token: '-' "null" '' '' 273s | appending ESP encryption algorithm AES_CCM_8[_128] 273s | parsing integ: 273s | appending ESP integrity algorithm NONE[_0] 273s | token: '' '' '' 273s | parsing 'aes_ccm_a-192-null' for ESP 273s | proposal: 'aes_ccm_a-192-null' 273s | token: '' '' "aes_ccm_a" '-' 273s | token: '' "aes_ccm_a" '-' "192" '-' 273s | token: '-' "192" '-' "null" '' 273s | token: '-' "null" '' '' 273s | appending ESP encryption algorithm AES_CCM_8[_192] 273s | parsing integ: 273s | appending ESP integrity algorithm NONE[_0] 273s | token: '' '' '' 273s | parsing 'aes_ccm_a-256-null' for ESP 273s | proposal: 'aes_ccm_a-256-null' 273s | token: '' '' "aes_ccm_a" '-' 273s | token: '' "aes_ccm_a" '-' "256" '-' 273s | token: '-' "256" '-' "null" '' 273s | token: '-' "null" '' '' 273s | appending ESP encryption algorithm AES_CCM_8[_256] 273s | parsing integ: 273s | appending ESP integrity algorithm NONE[_0] 273s | token: '' '' '' 273s | parsing 'aes_ccm_b-128-null' for ESP 273s | proposal: 'aes_ccm_b-128-null' 273s | token: '' '' "aes_ccm_b" '-' 273s | token: '' "aes_ccm_b" '-' "128" '-' 273s | token: '-' "128" '-' "null" '' 273s | token: '-' "null" '' '' 273s | appending ESP encryption algorithm AES_CCM_12[_128] 273s | parsing integ: 273s | appending ESP integrity algorithm NONE[_0] 273s | token: '' '' '' 273s | parsing 'aes_ccm_b-192-null' for ESP 273s | proposal: 'aes_ccm_b-192-null' 273s | token: '' '' "aes_ccm_b" '-' 273s | token: '' "aes_ccm_b" '-' "192" '-' 273s | token: '-' "192" '-' "null" '' 273s | token: '-' "null" '' '' 273s | appending ESP encryption algorithm AES_CCM_12[_192] 273s | parsing integ: 273s | appending ESP integrity algorithm NONE[_0] 273s | token: '' '' '' 273s | parsing 'aes_ccm_b-256-null' for ESP 273s | proposal: 'aes_ccm_b-256-null' 273s | token: '' '' "aes_ccm_b" '-' 273s | token: '' "aes_ccm_b" '-' "256" '-' 273s | token: '-' "256" '-' "null" '' 273s | token: '-' "null" '' '' 273s | appending ESP encryption algorithm AES_CCM_12[_256] 273s | parsing integ: 273s | appending ESP integrity algorithm NONE[_0] 273s | token: '' '' '' 273s | parsing 'aes_ccm_c-128-null' for ESP 273s | proposal: 'aes_ccm_c-128-null' 273s | token: '' '' "aes_ccm_c" '-' 273s | token: '' "aes_ccm_c" '-' "128" '-' 273s | token: '-' "128" '-' "null" '' 273s | token: '-' "null" '' '' 273s | appending ESP encryption algorithm AES_CCM_16[_128] 273s | parsing integ: 273s | appending ESP integrity algorithm NONE[_0] 273s | token: '' '' '' 273s | parsing 'aes_ccm_c-192-null' for ESP 273s | proposal: 'aes_ccm_c-192-null' 273s | token: '' '' "aes_ccm_c" '-' 273s | token: '' "aes_ccm_c" '-' "192" '-' 273s | token: '-' "192" '-' "null" '' 273s | token: '-' "null" '' '' 273s | appending ESP encryption algorithm AES_CCM_16[_192] 273s | parsing integ: 273s | appending ESP integrity algorithm NONE[_0] 273s | token: '' '' '' 273s | parsing 'aes_ccm_c-256-null' for ESP 273s | proposal: 'aes_ccm_c-256-null' 273s | token: '' '' "aes_ccm_c" '-' 273s | token: '' "aes_ccm_c" '-' "256" '-' 273s | token: '-' "256" '-' "null" '' 273s | token: '-' "null" '' '' 273s | appending ESP encryption algorithm AES_CCM_16[_256] 273s | parsing integ: 273s | appending ESP integrity algorithm NONE[_0] 273s | token: '' '' '' 273s | parsing 'aes_gcm' for ESP 273s | proposal: 'aes_gcm' 273s | token: '' '' "aes_gcm" '' 273s | token: '' "aes_gcm" '' '' 273s | token: '' '' '' 273s | appending ESP encryption algorithm AES_GCM_16[_0] 273s | appending ESP integrity algorithm NONE[_0] 273s | parsing 'aes_gcm_a-128-null' for ESP 273s | proposal: 'aes_gcm_a-128-null' 273s | token: '' '' "aes_gcm_a" '-' 273s | token: '' "aes_gcm_a" '-' "128" '-' 273s | token: '-' "128" '-' "null" '' 273s | token: '-' "null" '' '' 273s | appending ESP encryption algorithm AES_GCM_8[_128] 273s | parsing integ: 273s | appending ESP integrity algorithm NONE[_0] 273s | token: '' '' '' 273s | parsing 'aes_gcm_a-192-null' for ESP 273s | proposal: 'aes_gcm_a-192-null' 273s | token: '' '' "aes_gcm_a" '-' 273s | token: '' "aes_gcm_a" '-' "192" '-' 273s | token: '-' "192" '-' "null" '' 273s | token: '-' "null" '' '' 273s | appending ESP encryption algorithm AES_GCM_8[_192] 273s | parsing integ: 273s | appending ESP integrity algorithm NONE[_0] 273s | token: '' '' '' 273s | parsing 'aes_gcm_a-256-null' for ESP 273s | proposal: 'aes_gcm_a-256-null' 273s | token: '' '' "aes_gcm_a" '-' 273s | token: '' "aes_gcm_a" '-' "256" '-' 273s | token: '-' "256" '-' "null" '' 273s | token: '-' "null" '' '' 273s | appending ESP encryption algorithm AES_GCM_8[_256] 273s | parsing integ: 273s | appending ESP integrity algorithm NONE[_0] 273s | token: '' '' '' 273s | parsing 'aes_gcm_b-128-null' for ESP 273s | proposal: 'aes_gcm_b-128-null' 273s | token: '' '' "aes_gcm_b" '-' 273s | token: '' "aes_gcm_b" '-' "128" '-' 273s | token: '-' "128" '-' "null" '' 273s | token: '-' "null" '' '' 273s | appending ESP encryption algorithm AES_GCM_12[_128] 273s | parsing integ: 273s | appending ESP integrity algorithm NONE[_0] 273s | token: '' '' '' 273s | parsing 'aes_gcm_b-192-null' for ESP 273s | proposal: 'aes_gcm_b-192-null' 273s | token: '' '' "aes_gcm_b" '-' 273s | token: '' "aes_gcm_b" '-' "192" '-' 273s | token: '-' "192" '-' "null" '' 273s | token: '-' "null" '' '' 273s | appending ESP encryption algorithm AES_GCM_12[_192] 273s | parsing integ: 273s | appending ESP integrity algorithm NONE[_0] 273s | token: '' '' '' 273s | parsing 'aes_gcm_b-256-null' for ESP 273s | proposal: 'aes_gcm_b-256-null' 273s | token: '' '' "aes_gcm_b" '-' 273s | token: '' "aes_gcm_b" '-' "256" '-' 273s | token: '-' "256" '-' "null" '' 273s | token: '-' "null" '' '' 273s | appending ESP encryption algorithm AES_GCM_12[_256] 273s | parsing integ: 273s | appending ESP integrity algorithm NONE[_0] 273s | token: '' '' '' 273s | parsing 'aes_gcm_c-128-null' for ESP 273s | proposal: 'aes_gcm_c-128-null' 273s | token: '' '' "aes_gcm_c" '-' 273s | token: '' "aes_gcm_c" '-' "128" '-' 273s | token: '-' "128" '-' "null" '' 273s | token: '-' "null" '' '' 273s | appending ESP encryption algorithm AES_GCM_16[_128] 273s | parsing integ: 273s | appending ESP integrity algorithm NONE[_0] 273s | token: '' '' '' 273s | parsing 'aes_gcm_c-192-null' for ESP 273s | proposal: 'aes_gcm_c-192-null' 273s | token: '' '' "aes_gcm_c" '-' 273s | token: '' "aes_gcm_c" '-' "192" '-' 273s | token: '-' "192" '-' "null" '' 273s | token: '-' "null" '' '' 273s | appending ESP encryption algorithm AES_GCM_16[_192] 273s | parsing integ: 273s | appending ESP integrity algorithm NONE[_0] 273s | token: '' '' '' 273s | parsing 'aes_gcm_c-256-null' for ESP 273s | proposal: 'aes_gcm_c-256-null' 273s | token: '' '' "aes_gcm_c" '-' 273s | token: '' "aes_gcm_c" '-' "256" '-' 273s | token: '-' "256" '-' "null" '' 273s | token: '-' "null" '' '' 273s | appending ESP encryption algorithm AES_GCM_16[_256] 273s | parsing integ: 273s | appending ESP integrity algorithm NONE[_0] 273s | token: '' '' '' 273s | parsing 'aes_ccm_a-null' for ESP 273s | proposal: 'aes_ccm_a-null' 273s | token: '' '' "aes_ccm_a" '-' 273s | token: '' "aes_ccm_a" '-' "null" '' 273s | token: '-' "null" '' '' 273s | appending ESP encryption algorithm AES_CCM_8[_0] 273s | parsing integ: 273s | appending ESP integrity algorithm NONE[_0] 273s | token: '' '' '' 273s | parsing 'aes_ccm_b-null' for ESP 273s | proposal: 'aes_ccm_b-null' 273s | token: '' '' "aes_ccm_b" '-' 273s | token: '' "aes_ccm_b" '-' "null" '' 273s | token: '-' "null" '' '' 273s | appending ESP encryption algorithm AES_CCM_12[_0] 273s | parsing integ: 273s | appending ESP integrity algorithm NONE[_0] 273s | token: '' '' '' 273s | parsing 'aes_ccm_c-null' for ESP 273s | proposal: 'aes_ccm_c-null' 273s | token: '' '' "aes_ccm_c" '-' 273s | token: '' "aes_ccm_c" '-' "null" '' 273s | token: '-' "null" '' '' 273s | appending ESP encryption algorithm AES_CCM_16[_0] 273s | parsing integ: 273s | appending ESP integrity algorithm NONE[_0] 273s | token: '' '' '' 273s | parsing 'aes_gcm_a-null' for ESP 273s | proposal: 'aes_gcm_a-null' 273s | token: '' '' "aes_gcm_a" '-' 273s | token: '' "aes_gcm_a" '-' "null" '' 273s | token: '-' "null" '' '' 273s | appending ESP encryption algorithm AES_GCM_8[_0] 273s | parsing integ: 273s | appending ESP integrity algorithm NONE[_0] 273s | token: '' '' '' 273s | parsing 'aes_gcm_b-null' for ESP 273s | proposal: 'aes_gcm_b-null' 273s | token: '' '' "aes_gcm_b" '-' 273s | token: '' "aes_gcm_b" '-' "null" '' 273s | token: '-' "null" '' '' 273s | appending ESP encryption algorithm AES_GCM_12[_0] 273s | parsing integ: 273s | appending ESP integrity algorithm NONE[_0] 273s | token: '' '' '' 273s | parsing 'aes_gcm_c-null' for ESP 273s | proposal: 'aes_gcm_c-null' 273s | token: '' '' "aes_gcm_c" '-' 273s | token: '' "aes_gcm_c" '-' "null" '' 273s | token: '-' "null" '' '' 273s | appending ESP encryption algorithm AES_GCM_16[_0] 273s | parsing integ: 273s | appending ESP integrity algorithm NONE[_0] 273s | token: '' '' '' 273s | parsing 'aes_ccm-null' for ESP 273s | proposal: 'aes_ccm-null' 273s | token: '' '' "aes_ccm" '-' 273s | token: '' "aes_ccm" '-' "null" '' 273s | token: '-' "null" '' '' 273s | appending ESP encryption algorithm AES_CCM_16[_0] 273s | parsing integ: 273s | appending ESP integrity algorithm NONE[_0] 273s | token: '' '' '' 273s | parsing 'aes_gcm-null' for ESP 273s | proposal: 'aes_gcm-null' 273s | token: '' '' "aes_gcm" '-' 273s | token: '' "aes_gcm" '-' "null" '' 273s | token: '-' "null" '' '' 273s | appending ESP encryption algorithm AES_GCM_16[_0] 273s | parsing integ: 273s | appending ESP integrity algorithm NONE[_0] 273s | token: '' '' '' 273s | parsing 'aes_ccm-256-null' for ESP 273s | proposal: 'aes_ccm-256-null' 273s | token: '' '' "aes_ccm" '-' 273s | token: '' "aes_ccm" '-' "256" '-' 273s | token: '-' "256" '-' "null" '' 273s | token: '-' "null" '' '' 273s | appending ESP encryption algorithm AES_CCM_16[_256] 273s | parsing integ: 273s | appending ESP integrity algorithm NONE[_0] 273s | token: '' '' '' 273s | parsing 'aes_gcm-192-null' for ESP 273s | proposal: 'aes_gcm-192-null' 273s | token: '' '' "aes_gcm" '-' 273s | token: '' "aes_gcm" '-' "192" '-' 273s | token: '-' "192" '-' "null" '' 273s | token: '-' "null" '' '' 273s | appending ESP encryption algorithm AES_GCM_16[_192] 273s | parsing integ: 273s | appending ESP integrity algorithm NONE[_0] 273s | token: '' '' '' 273s | parsing 'aes_ccm_256-null' for ESP 273s | proposal: 'aes_ccm_256-null' 273s | token: '' '' "aes_ccm_256" '-' 273s | token: '' "aes_ccm_256" '-' "null" '' 273s | ike_alg_byname() failed: ESP encryption algorithm 'aes_ccm_256' is not recognized 273s | token: '-' "null" '' '' 273s | appending ESP encryption algorithm AES_CCM_16[_256] 273s | parsing integ: 273s | appending ESP integrity algorithm NONE[_0] 273s | token: '' '' '' 273s | parsing 'aes_gcm_192-null' for ESP 273s | proposal: 'aes_gcm_192-null' 273s | token: '' '' "aes_gcm_192" '-' 273s | token: '' "aes_gcm_192" '-' "null" '' 273s | ike_alg_byname() failed: ESP encryption algorithm 'aes_gcm_192' is not recognized 273s | token: '-' "null" '' '' 273s | appending ESP encryption algorithm AES_GCM_16[_192] 273s | parsing integ: 273s | appending ESP integrity algorithm NONE[_0] 273s | token: '' '' '' 273s | parsing 'aes_ccm_8-null' for ESP 273s | proposal: 'aes_ccm_8-null' 273s | token: '' '' "aes_ccm_8" '-' 273s | token: '' "aes_ccm_8" '-' "null" '' 273s | token: '-' "null" '' '' 273s | appending ESP encryption algorithm AES_CCM_8[_0] 273s | parsing integ: 273s | appending ESP integrity algorithm NONE[_0] 273s | token: '' '' '' 273s | parsing 'aes_ccm_12-null' for ESP 273s | proposal: 'aes_ccm_12-null' 273s | token: '' '' "aes_ccm_12" '-' 273s | token: '' "aes_ccm_12" '-' "null" '' 273s | token: '-' "null" '' '' 273s | appending ESP encryption algorithm AES_CCM_12[_0] 273s | parsing integ: 273s | appending ESP integrity algorithm NONE[_0] 273s | token: '' '' '' 273s | parsing 'aes_ccm_16-null' for ESP 273s | proposal: 'aes_ccm_16-null' 273s | token: '' '' "aes_ccm_16" '-' 273s | token: '' "aes_ccm_16" '-' "null" '' 273s | token: '-' "null" '' '' 273s | appending ESP encryption algorithm AES_CCM_16[_0] 273s | parsing integ: 273s | appending ESP integrity algorithm NONE[_0] 273s | token: '' '' '' 273s | parsing 'aes_gcm_8-null' for ESP 273s | proposal: 'aes_gcm_8-null' 273s | token: '' '' "aes_gcm_8" '-' 273s | token: '' "aes_gcm_8" '-' "null" '' 273s | token: '-' "null" '' '' 273s | appending ESP encryption algorithm AES_GCM_8[_0] 273s | parsing integ: 273s | appending ESP integrity algorithm NONE[_0] 273s | token: '' '' '' 273s | parsing 'aes_gcm_12-null' for ESP 273s | proposal: 'aes_gcm_12-null' 273s | token: '' '' "aes_gcm_12" '-' 273s | token: '' "aes_gcm_12" '-' "null" '' 273s | token: '-' "null" '' '' 273s | appending ESP encryption algorithm AES_GCM_12[_0] 273s | parsing integ: 273s | appending ESP integrity algorithm NONE[_0] 273s | token: '' '' '' 273s | parsing 'aes_gcm_16-null' for ESP 273s | proposal: 'aes_gcm_16-null' 273s | token: '' '' "aes_gcm_16" '-' 273s | token: '' "aes_gcm_16" '-' "null" '' 273s | token: '-' "null" '' '' 273s | appending ESP encryption algorithm AES_GCM_16[_0] 273s | parsing integ: 273s | appending ESP integrity algorithm NONE[_0] 273s | token: '' '' '' 273s | parsing 'aes_ccm_8-128-null' for ESP 273s | proposal: 'aes_ccm_8-128-null' 273s | token: '' '' "aes_ccm_8" '-' 273s | token: '' "aes_ccm_8" '-' "128" '-' 273s | token: '-' "128" '-' "null" '' 273s | token: '-' "null" '' '' 273s | appending ESP encryption algorithm AES_CCM_8[_128] 273s | parsing integ: 273s | appending ESP integrity algorithm NONE[_0] 273s | token: '' '' '' 273s | parsing 'aes_ccm_12-192-null' for ESP 273s | proposal: 'aes_ccm_12-192-null' 273s | token: '' '' "aes_ccm_12" '-' 273s | token: '' "aes_ccm_12" '-' "192" '-' 273s | token: '-' "192" '-' "null" '' 273s | token: '-' "null" '' '' 273s | appending ESP encryption algorithm AES_CCM_12[_192] 273s | parsing integ: 273s | appending ESP integrity algorithm NONE[_0] 273s | token: '' '' '' 273s | parsing 'aes_ccm_16-256-null' for ESP 273s | proposal: 'aes_ccm_16-256-null' 273s | token: '' '' "aes_ccm_16" '-' 273s | token: '' "aes_ccm_16" '-' "256" '-' 273s | token: '-' "256" '-' "null" '' 273s | token: '-' "null" '' '' 273s | appending ESP encryption algorithm AES_CCM_16[_256] 273s | parsing integ: 273s | appending ESP integrity algorithm NONE[_0] 273s | token: '' '' '' 273s | parsing 'aes_gcm_8-128-null' for ESP 273s | proposal: 'aes_gcm_8-128-null' 273s | token: '' '' "aes_gcm_8" '-' 273s | token: '' "aes_gcm_8" '-' "128" '-' 273s | token: '-' "128" '-' "null" '' 273s | token: '-' "null" '' '' 273s | appending ESP encryption algorithm AES_GCM_8[_128] 273s | parsing integ: 273s | appending ESP integrity algorithm NONE[_0] 273s | token: '' '' '' 273s | parsing 'aes_gcm_12-192-null' for ESP 273s | proposal: 'aes_gcm_12-192-null' 273s | token: '' '' "aes_gcm_12" '-' 273s | token: '' "aes_gcm_12" '-' "192" '-' 273s | token: '-' "192" '-' "null" '' 273s | token: '-' "null" '' '' 273s | appending ESP encryption algorithm AES_GCM_12[_192] 273s | parsing integ: 273s | appending ESP integrity algorithm NONE[_0] 273s | token: '' '' '' 273s | parsing 'aes_gcm_16-256-null' for ESP 273s | proposal: 'aes_gcm_16-256-null' 273s | token: '' '' "aes_gcm_16" '-' 273s | token: '' "aes_gcm_16" '-' "256" '-' 273s | token: '-' "256" '-' "null" '' 273s | token: '-' "null" '' '' 273s | appending ESP encryption algorithm AES_GCM_16[_256] 273s | parsing integ: 273s | appending ESP integrity algorithm NONE[_0] 273s | token: '' '' '' 273s | parsing 'aes_ccm_8_128-null' for ESP 273s | proposal: 'aes_ccm_8_128-null' 273s | token: '' '' "aes_ccm_8_128" '-' 273s | token: '' "aes_ccm_8_128" '-' "null" '' 273s | ike_alg_byname() failed: ESP encryption algorithm 'aes_ccm_8_128' is not recognized 273s | token: '-' "null" '' '' 273s | appending ESP encryption algorithm AES_CCM_8[_128] 273s | parsing integ: 273s | appending ESP integrity algorithm NONE[_0] 273s | token: '' '' '' 273s | parsing 'aes_ccm_12_192-null' for ESP 273s | proposal: 'aes_ccm_12_192-null' 273s | token: '' '' "aes_ccm_12_192" '-' 273s | token: '' "aes_ccm_12_192" '-' "null" '' 273s | ike_alg_byname() failed: ESP encryption algorithm 'aes_ccm_12_192' is not recognized 273s | token: '-' "null" '' '' 273s | appending ESP encryption algorithm AES_CCM_12[_192] 273s | parsing integ: 273s | appending ESP integrity algorithm NONE[_0] 273s | token: '' '' '' 273s | parsing 'aes_ccm_16_256-null' for ESP 273s | proposal: 'aes_ccm_16_256-null' 273s | token: '' '' "aes_ccm_16_256" '-' 273s | token: '' "aes_ccm_16_256" '-' "null" '' 273s | ike_alg_byname() failed: ESP encryption algorithm 'aes_ccm_16_256' is not recognized 273s | token: '-' "null" '' '' 273s | appending ESP encryption algorithm AES_CCM_16[_256] 273s | parsing integ: 273s | appending ESP integrity algorithm NONE[_0] 273s | token: '' '' '' 273s | parsing 'aes_gcm_8_128-null' for ESP 273s | proposal: 'aes_gcm_8_128-null' 273s | token: '' '' "aes_gcm_8_128" '-' 273s | token: '' "aes_gcm_8_128" '-' "null" '' 273s | ike_alg_byname() failed: ESP encryption algorithm 'aes_gcm_8_128' is not recognized 273s | token: '-' "null" '' '' 273s | appending ESP encryption algorithm AES_GCM_8[_128] 273s | parsing integ: 273s | appending ESP integrity algorithm NONE[_0] 273s | token: '' '' '' 273s | parsing 'aes_gcm_12_192-null' for ESP 273s | proposal: 'aes_gcm_12_192-null' 273s | token: '' '' "aes_gcm_12_192" '-' 273s | token: '' "aes_gcm_12_192" '-' "null" '' 273s algparse -v2 'esp=aes_cbc' (expect SUCCESS) 273s AES_CBC-HMAC_SHA2_512_256+HMAC_SHA2_256_128 273s algparse -v2 'esp=aes-sha' (expect SUCCESS) 273s AES_CBC-HMAC_SHA1_96 273s algparse -v2 'esp=aes-sha1' (expect SUCCESS) 273s AES_CBC-HMAC_SHA1_96 273s algparse -v2 'esp=aes128-sha1' (expect SUCCESS) 273s AES_CBC_128-HMAC_SHA1_96 273s algparse -v2 'esp=aes-sha2' (expect SUCCESS) 273s AES_CBC-HMAC_SHA2_256_128 273s algparse -v2 'esp=aes-sha256' (expect SUCCESS) 273s AES_CBC-HMAC_SHA2_256_128 273s algparse -v2 'esp=aes-sha384' (expect SUCCESS) 273s AES_CBC-HMAC_SHA2_384_192 273s algparse -v2 'esp=aes-sha512' (expect SUCCESS) 273s AES_CBC-HMAC_SHA2_512_256 273s algparse -v2 'esp=aes128-aes_xcbc' (expect SUCCESS) 273s AES_CBC_128-AES_XCBC_96 273s algparse -v2 'esp=aes192-sha1' (expect SUCCESS) 273s AES_CBC_192-HMAC_SHA1_96 273s algparse -v2 'esp=aes256-sha1' (expect SUCCESS) 273s AES_CBC_256-HMAC_SHA1_96 273s algparse -v2 'esp=aes256-sha' (expect SUCCESS) 273s AES_CBC_256-HMAC_SHA1_96 273s algparse -v2 'esp=aes256-sha2' (expect SUCCESS) 273s AES_CBC_256-HMAC_SHA2_256_128 273s algparse -v2 'esp=aes256-sha2_256' (expect SUCCESS) 273s AES_CBC_256-HMAC_SHA2_256_128 273s algparse -v2 'esp=aes256-sha2_384' (expect SUCCESS) 273s AES_CBC_256-HMAC_SHA2_384_192 273s algparse -v2 'esp=aes256-sha2_512' (expect SUCCESS) 273s AES_CBC_256-HMAC_SHA2_512_256 273s algparse -v2 'esp=camellia' (expect SUCCESS) 273s CAMELLIA_CBC-HMAC_SHA2_512_256+HMAC_SHA2_256_128 273s algparse -v2 'esp=camellia128' (expect SUCCESS) 273s CAMELLIA_CBC_128-HMAC_SHA2_512_256+HMAC_SHA2_256_128 273s algparse -v2 'esp=camellia192' (expect SUCCESS) 273s CAMELLIA_CBC_192-HMAC_SHA2_512_256+HMAC_SHA2_256_128 273s algparse -v2 'esp=camellia256' (expect SUCCESS) 273s CAMELLIA_CBC_256-HMAC_SHA2_512_256+HMAC_SHA2_256_128 273s algparse -v2 'esp=aes_ccm' (expect SUCCESS) 273s AES_CCM_16-NONE 273s algparse -v2 'esp=aes_ccm_a-128-null' (expect SUCCESS) 273s AES_CCM_8_128-NONE 273s algparse -v2 'esp=aes_ccm_a-192-null' (expect SUCCESS) 273s AES_CCM_8_192-NONE 273s algparse -v2 'esp=aes_ccm_a-256-null' (expect SUCCESS) 273s AES_CCM_8_256-NONE 273s algparse -v2 'esp=aes_ccm_b-128-null' (expect SUCCESS) 273s AES_CCM_12_128-NONE 273s algparse -v2 'esp=aes_ccm_b-192-null' (expect SUCCESS) 273s AES_CCM_12_192-NONE 273s algparse -v2 'esp=aes_ccm_b-256-null' (expect SUCCESS) 273s AES_CCM_12_256-NONE 273s algparse -v2 'esp=aes_ccm_c-128-null' (expect SUCCESS) 273s AES_CCM_16_128-NONE 273s algparse -v2 'esp=aes_ccm_c-192-null' (expect SUCCESS) 273s AES_CCM_16_192-NONE 273s algparse -v2 'esp=aes_ccm_c-256-null' (expect SUCCESS) 273s AES_CCM_16_256-NONE 273s algparse -v2 'esp=aes_gcm' (expect SUCCESS) 273s AES_GCM_16-NONE 273s algparse -v2 'esp=aes_gcm_a-128-null' (expect SUCCESS) 273s AES_GCM_8_128-NONE 273s algparse -v2 'esp=aes_gcm_a-192-null' (expect SUCCESS) 273s AES_GCM_8_192-NONE 273s algparse -v2 'esp=aes_gcm_a-256-null' (expect SUCCESS) 273s AES_GCM_8_256-NONE 273s algparse -v2 'esp=aes_gcm_b-128-null' (expect SUCCESS) 273s AES_GCM_12_128-NONE 273s algparse -v2 'esp=aes_gcm_b-192-null' (expect SUCCESS) 273s AES_GCM_12_192-NONE 273s algparse -v2 'esp=aes_gcm_b-256-null' (expect SUCCESS) 273s AES_GCM_12_256-NONE 273s algparse -v2 'esp=aes_gcm_c-128-null' (expect SUCCESS) 273s AES_GCM_16_128-NONE 273s algparse -v2 'esp=aes_gcm_c-192-null' (expect SUCCESS) 273s AES_GCM_16_192-NONE 273s algparse -v2 'esp=aes_gcm_c-256-null' (expect SUCCESS) 273s AES_GCM_16_256-NONE 273s algparse -v2 'esp=aes_ccm_a-null' (expect SUCCESS) 273s AES_CCM_8-NONE 273s algparse -v2 'esp=aes_ccm_b-null' (expect SUCCESS) 273s AES_CCM_12-NONE 273s algparse -v2 'esp=aes_ccm_c-null' (expect SUCCESS) 273s AES_CCM_16-NONE 273s algparse -v2 'esp=aes_gcm_a-null' (expect SUCCESS) 273s AES_GCM_8-NONE 273s algparse -v2 'esp=aes_gcm_b-null' (expect SUCCESS) 273s AES_GCM_12-NONE 273s algparse -v2 'esp=aes_gcm_c-null' (expect SUCCESS) 273s AES_GCM_16-NONE 273s algparse -v2 'esp=aes_ccm-null' (expect SUCCESS) 273s AES_CCM_16-NONE 273s algparse -v2 'esp=aes_gcm-null' (expect SUCCESS) 273s AES_GCM_16-NONE 273s algparse -v2 'esp=aes_ccm-256-null' (expect SUCCESS) 273s AES_CCM_16_256-NONE 273s algparse -v2 'esp=aes_gcm-192-null' (expect SUCCESS) 273s AES_GCM_16_192-NONE 273s algparse -v2 'esp=aes_ccm_256-null' (expect SUCCESS) 273s AES_CCM_16_256-NONE 273s algparse -v2 'esp=aes_gcm_192-null' (expect SUCCESS) 273s AES_GCM_16_192-NONE 273s algparse -v2 'esp=aes_ccm_8-null' (expect SUCCESS) 273s AES_CCM_8-NONE 273s algparse -v2 'esp=aes_ccm_12-null' (expect SUCCESS) 273s AES_CCM_12-NONE 273s algparse -v2 'esp=aes_ccm_16-null' (expect SUCCESS) 273s AES_CCM_16-NONE 273s algparse -v2 'esp=aes_gcm_8-null' (expect SUCCESS) 273s AES_GCM_8-NONE 273s algparse -v2 'esp=aes_gcm_12-null' (expect SUCCESS) 273s AES_GCM_12-NONE 273s algparse -v2 'esp=aes_gcm_16-null' (expect SUCCESS) 273s AES_GCM_16-NONE 273s algparse -v2 'esp=aes_ccm_8-128-null' (expect SUCCESS) 273s AES_CCM_8_128-NONE 273s algparse -v2 'esp=aes_ccm_12-192-null' (expect SUCCESS) 273s AES_CCM_12_192-NONE 273s algparse -v2 'esp=aes_ccm_16-256-null' (expect SUCCESS) 273s AES_CCM_16_256-NONE 273s algparse -v2 'esp=aes_gcm_8-128-null' (expect SUCCESS) 273s AES_GCM_8_128-NONE 273s algparse -v2 'esp=aes_gcm_12-192-null' (expect SUCCESS) 273s AES_GCM_12_192-NONE 273s algparse -v2 'esp=aes_gcm_16-256-null' (expect SUCCESS) 273s AES_GCM_16_256-NONE 273s algparse -v2 'esp=aes_ccm_8_128-null' (expect SUCCESS) 273s AES_CCM_8_128-NONE 273s algparse -v2 'esp=aes_ccm_12_192-null' (expect SUCCESS) 273s AES_CCM_12_192-NONE 273s algparse -v2 'esp=aes_ccm_16_256-null' (expect SUCCESS) 273s AES_CCM_16_256-NONE 273s algparse -v2 'esp=aes_gcm_8_128-null' (expect SUCCESS) 273s | ike_alg_byname() failed: ESP encryption algorithm 'aes_gcm_12_192' is not recognized 273s | token: '-' "null" '' '' 273s | appending ESP encryption algorithm AES_GCM_12[_192] 273s | parsing integ: 273s | appending ESP integrity algorithm NONE[_0] 273s | token: '' '' '' 273s | parsing 'aes_gcm_16_256-null' for ESP 273s | proposal: 'aes_gcm_16_256-null' 273s | token: '' '' "aes_gcm_16_256" '-' 273s | token: '' "aes_gcm_16_256" '-' "null" '' 273s | ike_alg_byname() failed: ESP encryption algorithm 'aes_gcm_16_256' is not recognized 273s | token: '-' "null" '' '' 273s | appending ESP encryption algorithm AES_GCM_16[_256] 273s | parsing integ: 273s | appending ESP integrity algorithm NONE[_0] 273s | token: '' '' '' 273s | parsing 'aes_ctr' for ESP 273s | proposal: 'aes_ctr' 273s | token: '' '' "aes_ctr" '' 273s | token: '' "aes_ctr" '' '' 273s | token: '' '' '' 273s | appending ESP encryption algorithm AES_CTR[_0] 273s | appending ESP integrity algorithm HMAC_SHA2_512_256[_0] 273s | appending ESP integrity algorithm HMAC_SHA2_256_128[_0] 273s | parsing 'aesctr' for ESP 273s | proposal: 'aesctr' 273s | token: '' '' "aesctr" '' 273s | token: '' "aesctr" '' '' 273s | token: '' '' '' 273s | appending ESP encryption algorithm AES_CTR[_0] 273s | appending ESP integrity algorithm HMAC_SHA2_512_256[_0] 273s | appending ESP integrity algorithm HMAC_SHA2_256_128[_0] 273s | parsing 'aes_ctr128' for ESP 273s | proposal: 'aes_ctr128' 273s | token: '' '' "aes_ctr128" '' 273s | token: '' "aes_ctr128" '' '' 273s | ike_alg_byname() failed: ESP encryption algorithm 'aes_ctr128' is not recognized 273s | token: '' '' '' 273s | appending ESP encryption algorithm AES_CTR[_128] 273s | appending ESP integrity algorithm HMAC_SHA2_512_256[_0] 273s | appending ESP integrity algorithm HMAC_SHA2_256_128[_0] 273s | parsing 'aes_ctr192' for ESP 273s | proposal: 'aes_ctr192' 273s | token: '' '' "aes_ctr192" '' 273s | token: '' "aes_ctr192" '' '' 273s | ike_alg_byname() failed: ESP encryption algorithm 'aes_ctr192' is not recognized 273s | token: '' '' '' 273s | appending ESP encryption algorithm AES_CTR[_192] 273s | appending ESP integrity algorithm HMAC_SHA2_512_256[_0] 273s | appending ESP integrity algorithm HMAC_SHA2_256_128[_0] 273s | parsing 'aes_ctr256' for ESP 273s | proposal: 'aes_ctr256' 273s | token: '' '' "aes_ctr256" '' 273s | token: '' "aes_ctr256" '' '' 273s | ike_alg_byname() failed: ESP encryption algorithm 'aes_ctr256' is not recognized 273s | token: '' '' '' 273s | appending ESP encryption algorithm AES_CTR[_256] 273s | appending ESP integrity algorithm HMAC_SHA2_512_256[_0] 273s | appending ESP integrity algorithm HMAC_SHA2_256_128[_0] 273s | parsing 'camellia_cbc_256-hmac_sha2_512_256;modp8192' for ESP 273s | proposal: 'camellia_cbc_256-hmac_sha2_512_256;modp8192' 273s | token: '' '' "camellia_cbc_256" '-' 273s | token: '' "camellia_cbc_256" '-' "hmac_sha2_512_256" ';' 273s | ike_alg_byname() failed: ESP encryption algorithm 'camellia_cbc_256' is not recognized 273s | token: '-' "hmac_sha2_512_256" ';' "modp8192" '' 273s | appending ESP encryption algorithm CAMELLIA_CBC[_256] 273s | parsing integ: 273s | appending ESP integrity algorithm HMAC_SHA2_512_256[_0] 273s | token: ';' "modp8192" '' '' 273s | parsing dh: 273s | appending ESP DH algorithm MODP8192[_0] 273s | token: '' '' '' 273s ipsec algparse: ignoring ESP DH algorithm MODP8192 as PFS policy is disabled 273s | parsing 'null_auth_aes_gmac_256-null;modp8192' for ESP 273s | proposal: 'null_auth_aes_gmac_256-null;modp8192' 273s | token: '' '' "null_auth_aes_gmac_256" '-' 273s | token: '' "null_auth_aes_gmac_256" '-' "null" ';' 273s | ike_alg_byname() failed: ESP encryption algorithm 'null_auth_aes_gmac_256' is not recognized 273s | token: '-' "null" ';' "modp8192" '' 273s | appending ESP encryption algorithm NULL_AUTH_AES_GMAC[_256] 273s | parsing integ: 273s | appending ESP integrity algorithm NONE[_0] 273s | token: ';' "modp8192" '' '' 273s | parsing dh: 273s | appending ESP DH algorithm MODP8192[_0] 273s | token: '' '' '' 273s ipsec algparse: ignoring ESP DH algorithm MODP8192 as PFS policy is disabled 273s | parsing '3des-sha1;modp8192' for ESP 273s | proposal: '3des-sha1;modp8192' 273s | token: '' '' "3des" '-' 273s | token: '' "3des" '-' "sha1" ';' 273s | token: '-' "sha1" ';' "modp8192" '' 273s | appending ESP encryption algorithm 3DES_CBC[_0] 273s | parsing integ: 273s | appending ESP integrity algorithm HMAC_SHA1_96[_0] 273s | token: ';' "modp8192" '' '' 273s | parsing dh: 273s | appending ESP DH algorithm MODP8192[_0] 273s | token: '' '' '' 273s ipsec algparse: ignoring ESP DH algorithm MODP8192 as PFS policy is disabled 273s | parsing '3des-sha1-modp8192' for ESP 273s | proposal: '3des-sha1-modp8192' 273s | token: '' '' "3des" '-' 273s | token: '' "3des" '-' "sha1" '-' 273s | token: '-' "sha1" '-' "modp8192" '' 273s | appending ESP encryption algorithm 3DES_CBC[_0] 273s | parsing integ: 273s | appending ESP integrity algorithm HMAC_SHA1_96[_0] 273s | token: '-' "modp8192" '' '' 273s | parsing dh: 273s | appending ESP DH algorithm MODP8192[_0] 273s | token: '' '' '' 273s ipsec algparse: ignoring ESP DH algorithm MODP8192 as PFS policy is disabled 273s | parsing 'aes-sha1,3des-sha1;modp8192' for ESP 273s | proposal: 'aes-sha1' 273s | token: '' '' "aes" '-' 273s AES_GCM_8_128-NONE 273s algparse -v2 'esp=aes_gcm_12_192-null' (expect SUCCESS) 273s AES_GCM_12_192-NONE 273s algparse -v2 'esp=aes_gcm_16_256-null' (expect SUCCESS) 273s AES_GCM_16_256-NONE 273s algparse -v2 'esp=aes_ctr' (expect SUCCESS) 273s AES_CTR-HMAC_SHA2_512_256+HMAC_SHA2_256_128 273s algparse -v2 'esp=aesctr' (expect SUCCESS) 273s AES_CTR-HMAC_SHA2_512_256+HMAC_SHA2_256_128 273s algparse -v2 'esp=aes_ctr128' (expect SUCCESS) 273s AES_CTR_128-HMAC_SHA2_512_256+HMAC_SHA2_256_128 273s algparse -v2 'esp=aes_ctr192' (expect SUCCESS) 273s AES_CTR_192-HMAC_SHA2_512_256+HMAC_SHA2_256_128 273s algparse -v2 'esp=aes_ctr256' (expect SUCCESS) 273s AES_CTR_256-HMAC_SHA2_512_256+HMAC_SHA2_256_128 273s algparse -v2 'esp=camellia_cbc_256-hmac_sha2_512_256;modp8192' (expect SUCCESS) 273s CAMELLIA_CBC_256-HMAC_SHA2_512_256 273s algparse -v2 'esp=null_auth_aes_gmac_256-null;modp8192' (expect SUCCESS) 273s NULL_AUTH_AES_GMAC_256-NONE 273s algparse -v2 'esp=3des-sha1;modp8192' (expect SUCCESS) 273s 3DES_CBC-HMAC_SHA1_96 273s algparse -v2 'esp=3des-sha1-modp8192' (expect SUCCESS) 273s | token: '' "aes" '-' "sha1" '' 273s | token: '-' "sha1" '' '' 273s | appending ESP encryption algorithm AES_CBC[_0] 273s | parsing integ: 273s | appending ESP integrity algorithm HMAC_SHA1_96[_0] 273s | token: '' '' '' 273s | proposal: '3des-sha1;modp8192' 273s | token: '' '' "3des" '-' 273s | token: '' "3des" '-' "sha1" ';' 273s | token: '-' "sha1" ';' "modp8192" '' 273s | appending ESP encryption algorithm 3DES_CBC[_0] 273s | parsing integ: 273s | appending ESP integrity algorithm HMAC_SHA1_96[_0] 273s | token: ';' "modp8192" '' '' 273s | parsing dh: 273s | appending ESP DH algorithm MODP8192[_0] 273s | token: '' '' '' 273s ipsec algparse: ignoring ESP DH algorithm MODP8192 as PFS policy is disabled 273s | parsing 'aes-sha1-modp8192,3des-sha1-modp8192' for ESP 273s | proposal: 'aes-sha1-modp8192' 273s | token: '' '' "aes" '-' 273s | token: '' "aes" '-' "sha1" '-' 273s | token: '-' "sha1" '-' "modp8192" '' 273s | appending ESP encryption algorithm AES_CBC[_0] 273s | parsing integ: 273s | appending ESP integrity algorithm HMAC_SHA1_96[_0] 273s | token: '-' "modp8192" '' '' 273s | parsing dh: 273s | appending ESP DH algorithm MODP8192[_0] 273s | token: '' '' '' 273s | proposal: '3des-sha1-modp8192' 273s | token: '' '' "3des" '-' 273s | token: '' "3des" '-' "sha1" '-' 273s | token: '-' "sha1" '-' "modp8192" '' 273s | appending ESP encryption algorithm 3DES_CBC[_0] 273s | parsing integ: 273s | appending ESP integrity algorithm HMAC_SHA1_96[_0] 273s | token: '-' "modp8192" '' '' 273s | parsing dh: 273s | appending ESP DH algorithm MODP8192[_0] 273s | token: '' '' '' 273s ipsec algparse: ignoring ESP DH algorithm MODP8192 as PFS policy is disabled 273s ipsec algparse: ignoring ESP DH algorithm MODP8192 as PFS policy is disabled 273s | parsing 'aes-sha1-modp8192,aes-sha1-modp8192,aes-sha1-modp8192' for ESP 273s | proposal: 'aes-sha1-modp8192' 273s | token: '' '' "aes" '-' 273s | token: '' "aes" '-' "sha1" '-' 273s | token: '-' "sha1" '-' "modp8192" '' 273s | appending ESP encryption algorithm AES_CBC[_0] 273s | parsing integ: 273s | appending ESP integrity algorithm HMAC_SHA1_96[_0] 273s | token: '-' "modp8192" '' '' 273s | parsing dh: 273s | appending ESP DH algorithm MODP8192[_0] 273s | token: '' '' '' 273s | proposal: 'aes-sha1-modp8192' 273s | token: '' '' "aes" '-' 273s | token: '' "aes" '-' "sha1" '-' 273s | token: '-' "sha1" '-' "modp8192" '' 273s | appending ESP encryption algorithm AES_CBC[_0] 273s | parsing integ: 273s | appending ESP integrity algorithm HMAC_SHA1_96[_0] 273s | token: '-' "modp8192" '' '' 273s | parsing dh: 273s | appending ESP DH algorithm MODP8192[_0] 273s | token: '' '' '' 273s | proposal: 'aes-sha1-modp8192' 273s | token: '' '' "aes" '-' 273s | token: '' "aes" '-' "sha1" '-' 273s | token: '-' "sha1" '-' "modp8192" '' 273s | appending ESP encryption algorithm AES_CBC[_0] 273s | parsing integ: 273s | appending ESP integrity algorithm HMAC_SHA1_96[_0] 273s | token: '-' "modp8192" '' '' 273s | parsing dh: 273s | appending ESP DH algorithm MODP8192[_0] 273s | token: '' '' '' 273s ipsec algparse: ignoring ESP DH algorithm MODP8192 as PFS policy is disabled 273s | parsing 'aes;none' for ESP 273s | proposal: 'aes;none' 273s | token: '' '' "aes" ';' 273s | token: '' "aes" ';' "none" '' 273s | token: ';' "none" '' '' 273s | appending ESP encryption algorithm AES_CBC[_0] 273s | parsing dh: 273s | appending ESP DH algorithm NONE[_0] 273s | token: '' '' '' 273s | appending ESP integrity algorithm HMAC_SHA2_512_256[_0] 273s | appending ESP integrity algorithm HMAC_SHA2_256_128[_0] 273s ipsec algparse: ignoring redundant ESP DH algorithm NONE as PFS policy is disabled 273s | parsing 'aes;none,aes' for ESP 273s | proposal: 'aes;none' 273s | token: '' '' "aes" ';' 273s | token: '' "aes" ';' "none" '' 273s | token: ';' "none" '' '' 273s | appending ESP encryption algorithm AES_CBC[_0] 273s | parsing dh: 273s | appending ESP DH algorithm NONE[_0] 273s | token: '' '' '' 273s | appending ESP integrity algorithm HMAC_SHA2_512_256[_0] 273s | appending ESP integrity algorithm HMAC_SHA2_256_128[_0] 273s | proposal: 'aes' 273s | token: '' '' "aes" '' 273s | token: '' "aes" '' '' 273s | token: '' '' '' 273s | appending ESP encryption algorithm AES_CBC[_0] 273s | appending ESP integrity algorithm HMAC_SHA2_512_256[_0] 273s | appending ESP integrity algorithm HMAC_SHA2_256_128[_0] 273s ipsec algparse: ignoring redundant ESP DH algorithm NONE as PFS policy is disabled 273s | parsing 'aes;none,aes;modp2048' for ESP 273s | proposal: 'aes;none' 273s | token: '' '' "aes" ';' 273s | token: '' "aes" ';' "none" '' 273s | token: ';' "none" '' '' 273s | appending ESP encryption algorithm AES_CBC[_0] 273s | parsing dh: 273s | appending ESP DH algorithm NONE[_0] 273s | token: '' '' '' 273s | appending ESP integrity algorithm HMAC_SHA2_512_256[_0] 273s | appending ESP integrity algorithm HMAC_SHA2_256_128[_0] 273s | proposal: 'aes;modp2048' 273s | token: '' '' "aes" ';' 273s | token: '' "aes" ';' "modp2048" '' 273s | token: ';' "modp2048" '' '' 273s | appending ESP encryption algorithm AES_CBC[_0] 273s | parsing dh: 273s | appending ESP DH algorithm MODP2048[_0] 273s | token: '' '' '' 273s | appending ESP integrity algorithm HMAC_SHA2_512_256[_0] 273s | appending ESP integrity algorithm HMAC_SHA2_256_128[_0] 273s ipsec algparse: ignoring redundant ESP DH algorithm NONE as PFS policy is disabled 273s ipsec algparse: ignoring ESP DH algorithm MODP2048 as PFS policy is disabled 273s | parsing 'aes-sha1-none' for ESP 273s | proposal: 'aes-sha1-none' 273s | token: '' '' "aes" '-' 273s | token: '' "aes" '-' "sha1" '-' 273s | token: '-' "sha1" '-' "none" '' 273s | appending ESP encryption algorithm AES_CBC[_0] 273s | parsing integ: 273s | appending ESP integrity algorithm HMAC_SHA1_96[_0] 273s | token: '-' "none" '' '' 273s | parsing dh: 273s | appending ESP DH algorithm NONE[_0] 273s | token: '' '' '' 273s ipsec algparse: ignoring redundant ESP DH algorithm NONE as PFS policy is disabled 273s | parsing 'aes-sha1;none' for ESP 273s | proposal: 'aes-sha1;none' 273s | token: '' '' "aes" '-' 273s | token: '' "aes" '-' "sha1" ';' 273s | token: '-' "sha1" ';' "none" '' 273s | appending ESP encryption algorithm AES_CBC[_0] 273s | parsing integ: 273s | appending ESP integrity algorithm HMAC_SHA1_96[_0] 273s | token: ';' "none" '' '' 273s | parsing dh: 273s | appending ESP DH algorithm NONE[_0] 273s | token: '' '' '' 273s ipsec algparse: ignoring redundant ESP DH algorithm NONE as PFS policy is disabled 273s | parsing '3des168-sha1' for ESP 273s | proposal: '3des168-sha1' 273s | token: '' '' "3des168" '-' 273s | token: '' "3des168" '-' "sha1" '' 273s | ike_alg_byname() failed: ESP encryption algorithm '3des168' is not recognized 273s 3DES_CBC-HMAC_SHA1_96 273s algparse -v2 'esp=aes-sha1,3des-sha1;modp8192' (expect SUCCESS) 273s AES_CBC-HMAC_SHA1_96 273s 3DES_CBC-HMAC_SHA1_96 273s algparse -v2 'esp=aes-sha1-modp8192,3des-sha1-modp8192' (expect SUCCESS) 273s AES_CBC-HMAC_SHA1_96 273s 3DES_CBC-HMAC_SHA1_96 273s algparse -v2 'esp=aes-sha1-modp8192,aes-sha1-modp8192,aes-sha1-modp8192' (expect SUCCESS) 273s AES_CBC-HMAC_SHA1_96 273s algparse -v2 'esp=aes;none' (expect SUCCESS) 273s AES_CBC-HMAC_SHA2_512_256+HMAC_SHA2_256_128 273s algparse -v2 'esp=aes;none,aes' (expect SUCCESS) 273s AES_CBC-HMAC_SHA2_512_256+HMAC_SHA2_256_128 273s AES_CBC-HMAC_SHA2_512_256+HMAC_SHA2_256_128 273s algparse -v2 'esp=aes;none,aes;modp2048' (expect SUCCESS) 273s AES_CBC-HMAC_SHA2_512_256+HMAC_SHA2_256_128 273s AES_CBC-HMAC_SHA2_512_256+HMAC_SHA2_256_128 273s algparse -v2 'esp=aes-sha1-none' (expect SUCCESS) 273s AES_CBC-HMAC_SHA1_96 273s algparse -v2 'esp=aes-sha1;none' (expect SUCCESS) 273s AES_CBC-HMAC_SHA1_96 273s algparse -v2 'esp=3des168-sha1' (expect ERROR) 273s ERROR: ESP encryption algorithm 3DES_CBC does not allow a key lengths 273s algparse -v2 'esp=3des-null' (expect ERROR) 273s ERROR: non-AEAD ESP encryption algorithm 3DES_CBC cannot have 'NONE' as the integrity algorithm 273s algparse -v2 'esp=aes128-null' (expect ERROR) 273s ERROR: non-AEAD ESP encryption algorithm AES_CBC cannot have 'NONE' as the integrity algorithm 273s algparse -v2 'esp=aes224-sha1' (expect ERROR) 273s ERROR: ESP encryption algorithm AES_CBC with key length 224 invalid; valid key lengths: 128, 192, 256 273s algparse -v2 'esp=aes-224-sha1' (expect ERROR) 273s ERROR: ESP encryption algorithm AES_CBC with key length 224 invalid; valid key lengths: 128, 192, 256 273s algparse -v2 'esp=aes0-sha1' (expect ERROR) 273s ERROR: ESP encryption key length is zero 273s algparse -v2 'esp=aes-0-sha1' (expect ERROR) 273s ERROR: ESP encryption key length is zero 273s algparse -v2 'esp=aes512-sha1' (expect ERROR) 273s ERROR: ESP encryption algorithm AES_CBC with key length 512 invalid; valid key lengths: 128, 192, 256 273s algparse -v2 'esp=aes-sha1555' (expect ERROR) 273s ERROR: ESP integrity algorithm 'sha1555' is not recognized 273s algparse -v2 'esp=camellia666-sha1' (expect ERROR) 273s ERROR: ESP encryption algorithm CAMELLIA_CBC with key length 666 invalid; valid key lengths: 128, 192, 256 273s algparse -v2 'esp=blowfish' (expect ERROR) 273s ERROR: ESP encryption algorithm 'blowfish' is not supported 273s algparse -v2 'esp=des-sha1' (expect ERROR) 273s ERROR: ESP encryption algorithm 'des' is not supported 273s algparse -v2 'esp=aes_ctr666' (expect ERROR) 273s ERROR: ESP encryption algorithm AES_CTR with key length 666 invalid; valid key lengths: 128, 192, 256 273s algparse -v2 'esp=aes128-sha2_128' (expect ERROR) 273s ERROR: ESP integrity algorithm 'sha2_128' is not recognized 273s algparse -v2 'esp=aes256-sha2_256-4096' (expect ERROR) 273s ERROR: ESP DH algorithm '4096' is not recognized 273s algparse -v2 'esp=aes256-sha2_256-128' (expect ERROR) 273s ERROR: ESP DH algorithm '128' is not recognized 273s algparse -v2 'esp=vanitycipher' (expect ERROR) 273s ERROR: ESP encryption algorithm 'vanitycipher' is not recognized 273s algparse -v2 'esp=ase-sah' (expect ERROR) 273s ERROR: ESP encryption algorithm 'ase' is not recognized 273s algparse -v2 'esp=aes-sah1' (expect ERROR) 273s ERROR: ESP integrity algorithm 'sah1' is not recognized 273s algparse -v2 'esp=id3' (expect ERROR) 273s ERROR: ESP encryption algorithm 'id3' is not recognized 273s algparse -v2 'esp=aes-id3' (expect ERROR) 273s ERROR: ESP integrity algorithm 'id3' is not recognized 273s algparse -v2 'esp=aes_gcm-md5' (expect ERROR) 273s ERROR: AEAD ESP encryption algorithm AES_GCM_16 must have 'NONE' as the integrity algorithm 273s algparse -v2 'esp=mars' (expect ERROR) 273s ERROR: ESP encryption algorithm 'mars' is not supported 273s algparse -v2 'esp=aes_gcm-16' (expect ERROR) 273s ERROR: ESP encryption algorithm AES_GCM_16 with key length 16 invalid; valid key lengths: 128, 192, 256 273s algparse -v2 'esp=aes_gcm-0' (expect ERROR) 273s ERROR: ESP encryption key length is zero 273s algparse -v2 'esp=aes_gcm-123456789012345' (expect ERROR) 273s ERROR: ESP encryption algorithm 'aes_gcm-123456789012345' key length WAY too big 273s algparse -v2 'esp=3des-sha1;dh22' (expect ERROR) 273s ERROR: ESP DH algorithm 'dh22' is not supported 273s algparse -v2 'esp=3des-sha1;modp8192,3des-sha2' (expect SUCCESS) 273s 3DES_CBC-HMAC_SHA1_96 273s 3DES_CBC-HMAC_SHA2_256_128 273s algparse -v2 'esp=3des-sha1-modp8192,3des-sha2' (expect SUCCESS) 273s 3DES_CBC-HMAC_SHA1_96 273s 3DES_CBC-HMAC_SHA2_256_128 273s algparse -v2 'esp=3des-sha1-modp8192,3des-sha2-modp8192' (expect SUCCESS) 273s 3DES_CBC-HMAC_SHA1_96 273s 3DES_CBC-HMAC_SHA2_256_128 273s algparse -v2 'esp=3des-sha1-modp8192,3des-sha2;modp8192' (expect SUCCESS) 273s 3DES_CBC-HMAC_SHA1_96 273s 3DES_CBC-HMAC_SHA2_256_128 273s algparse -v2 'esp=3des-sha1;modp8192,3des-sha2-modp8192' (expect SUCCESS) 273s 3DES_CBC-HMAC_SHA1_96 273s 3DES_CBC-HMAC_SHA2_256_128 273s algparse -v2 'esp=3des-sha1;modp8192,3des-sha2;modp8192' (expect SUCCESS) 273s 3DES_CBC-HMAC_SHA1_96 273s 3DES_CBC-HMAC_SHA2_256_128 273s algparse -v2 'esp=3des-sha1-modp8192,3des-sha2-modp2048' (expect SUCCESS) 273s 3DES_CBC-HMAC_SHA1_96 273s 3DES_CBC-HMAC_SHA2_256_128 273s algparse -v2 'ah' (expect SUCCESS) 273s HMAC_SHA2_512_256 273s HMAC_SHA2_256_128 273s algparse -v2 'ah=' (expect ERROR) 273s ERROR: AH proposal is empty 273s algparse -v2 'ah=md5' (expect SUCCESS) 273s HMAC_MD5_96 273s algparse -v2 'ah=sha' (expect SUCCESS) 273s HMAC_SHA1_96 273s algparse -v2 'ah=sha;modp2048' (expect SUCCESS) 273s HMAC_SHA1_96 273s algparse -v2 'ah=sha1' (expect SUCCESS) 273s HMAC_SHA1_96 273s algparse -v2 'ah=sha2' (expect SUCCESS) 273s HMAC_SHA2_256_128 273s algparse -v2 'ah=sha256' (expect SUCCESS) 273s HMAC_SHA2_256_128 273s algparse -v2 'ah=sha384' (expect SUCCESS) 273s HMAC_SHA2_384_192 273s algparse -v2 'ah=sha512' (expect SUCCESS) 273s HMAC_SHA2_512_256 273s algparse -v2 'ah=sha2_256' (expect SUCCESS) 273s HMAC_SHA2_256_128 273s algparse -v2 'ah=sha2_384' (expect SUCCESS) 273s HMAC_SHA2_384_192 273s algparse -v2 'ah=sha2_512' (expect SUCCESS) 273s HMAC_SHA2_512_256 273s algparse -v2 'ah=aes_xcbc' (expect SUCCESS) 273s AES_XCBC_96 273s algparse -v2 'ah=sha2-none' (expect SUCCESS) 273s HMAC_SHA2_256_128 273s algparse -v2 'ah=sha2;none' (expect SUCCESS) 273s HMAC_SHA2_256_128 273s algparse -v2 'ah=sha1-modp8192,sha1-modp8192,sha1-modp8192' (expect SUCCESS) 273s HMAC_SHA1_96 273s algparse -v2 'ah=aes-sha1' (expect ERROR) 273s ERROR: AH integrity algorithm 'aes' is not recognized 273s algparse -v2 'ah=vanityhash1' (expect ERROR) 273s ERROR: AH integrity algorithm 'vanityhash1' is not recognized 273s algparse -v2 'ah=aes_gcm_c-256' (expect ERROR) 273s ERROR: AH integrity algorithm 'aes_gcm_c' is not recognized 273s algparse -v2 'ah=id3' (expect ERROR) 273s ERROR: AH integrity algorithm 'id3' is not recognized 273s algparse -v2 'ah=3des' (expect ERROR) 273s ERROR: AH integrity algorithm '3des' is not recognized 273s algparse -v2 'ah=null' (expect ERROR) 273s ERROR: AH cannot have 'none' as the integrity algorithm 273s algparse -v2 'ah=aes_gcm' (expect ERROR) 273s ERROR: AH integrity algorithm 'aes_gcm' is not recognized 273s algparse -v2 'ah=aes_ccm' (expect ERROR) 273s ERROR: AH integrity algorithm 'aes_ccm' is not recognized 273s algparse -v2 'ah=ripemd' (expect ERROR) 273s ERROR: AH integrity algorithm 'ripemd' is not recognized 273s algparse -v2 'ike' (expect SUCCESS) 273s AES_GCM_16_256-HMAC_SHA2_512+HMAC_SHA2_256-DH19+DH20+DH21+DH31+MODP4096+MODP3072+MODP2048+MODP8192 273s AES_GCM_16_128-HMAC_SHA2_512+HMAC_SHA2_256-DH19+DH20+DH21+DH31+MODP4096+MODP3072+MODP2048+MODP8192 273s CHACHA20_POLY1305-HMAC_SHA2_512+HMAC_SHA2_256-DH19+DH20+DH21+DH31+MODP4096+MODP3072+MODP2048+MODP8192 273s AES_CBC_256-HMAC_SHA2_512+HMAC_SHA2_256-DH19+DH20+DH21+DH31+MODP4096+MODP3072+MODP2048+MODP8192 273s AES_CBC_128-HMAC_SHA2_512+HMAC_SHA2_256-DH19+DH20+DH21+DH31+MODP4096+MODP3072+MODP2048+MODP8192 273s algparse -v2 'ike=' (expect ERROR) 273s ERROR: IKE proposal is empty 273s algparse -v2 'ike=3des-sha1' (expect SUCCESS) 273s 3DES_CBC-HMAC_SHA1-DH19+DH20+DH21+DH31+MODP4096+MODP3072+MODP2048+MODP8192 273s algparse -v2 'ike=3des-sha1' (expect SUCCESS) 273s 3DES_CBC-HMAC_SHA1-DH19+DH20+DH21+DH31+MODP4096+MODP3072+MODP2048+MODP8192 273s algparse -v2 'ike=3des-sha1;modp1536' (expect SUCCESS) 273s 3DES_CBC-HMAC_SHA1-MODP1536 273s algparse -v2 'ike=3des;dh21' (expect SUCCESS) 273s 3DES_CBC-HMAC_SHA2_512+HMAC_SHA2_256-DH21 273s algparse -v2 'ike=3des-sha1;dh21' (expect SUCCESS) 273s 3DES_CBC-HMAC_SHA1-DH21 273s algparse -v2 'ike=3des-sha1-ecp_521' (expect SUCCESS) 273s 3DES_CBC-HMAC_SHA1-DH21 273s algparse -v2 'ike=3des+aes' (expect SUCCESS) 273s 3DES_CBC+AES_CBC-HMAC_SHA2_512+HMAC_SHA2_256-DH19+DH20+DH21+DH31+MODP4096+MODP3072+MODP2048+MODP8192 273s algparse -v2 'ike=aes;none' (expect ERROR) 273s ERROR: IKE DH algorithm 'none' not permitted 273s algparse -v2 'ike=id2' (expect ERROR) 273s ERROR: IKE encryption algorithm 'id2' is not recognized 273s algparse -v2 'ike=3des-id2' (expect ERROR) 273s ERROR: IKE PRF algorithm 'id2' is not recognized 273s algparse -v2 'ike=aes_ccm' (expect ERROR) 273s ERROR: IKE encryption algorithm 'aes_ccm' is not supported 273s algparse -v2 'ike=aes-sha1-sha2-ecp_521' (expect ERROR) 273s | parsing '3des-null' for ESP 273s | proposal: '3des-null' 273s | token: '' '' "3des" '-' 273s | token: '' "3des" '-' "null" '' 273s | token: '-' "null" '' '' 273s | appending ESP encryption algorithm 3DES_CBC[_0] 273s | parsing integ: 273s | appending ESP integrity algorithm NONE[_0] 273s | token: '' '' '' 273s | parsing 'aes128-null' for ESP 273s | proposal: 'aes128-null' 273s | token: '' '' "aes128" '-' 273s | token: '' "aes128" '-' "null" '' 273s | ike_alg_byname() failed: ESP encryption algorithm 'aes128' is not recognized 273s | token: '-' "null" '' '' 273s | appending ESP encryption algorithm AES_CBC[_128] 273s | parsing integ: 273s | appending ESP integrity algorithm NONE[_0] 273s | token: '' '' '' 273s | parsing 'aes224-sha1' for ESP 273s | proposal: 'aes224-sha1' 273s | token: '' '' "aes224" '-' 273s | token: '' "aes224" '-' "sha1" '' 273s | ike_alg_byname() failed: ESP encryption algorithm 'aes224' is not recognized 273s | parsing 'aes-224-sha1' for ESP 273s | proposal: 'aes-224-sha1' 273s | token: '' '' "aes" '-' 273s | token: '' "aes" '-' "224" '-' 273s | byname('aes') with ='224' failed: ESP encryption algorithm AES_CBC with key length 224 invalid; valid key lengths: 128, 192, 256 273s | parsing 'aes0-sha1' for ESP 273s | proposal: 'aes0-sha1' 273s | token: '' '' "aes0" '-' 273s | token: '' "aes0" '-' "sha1" '' 273s | ike_alg_byname() failed: ESP encryption algorithm 'aes0' is not recognized 273s | parsing 'aes-0-sha1' for ESP 273s | proposal: 'aes-0-sha1' 273s | token: '' '' "aes" '-' 273s | token: '' "aes" '-' "0" '-' 273s | parsing 'aes512-sha1' for ESP 273s | proposal: 'aes512-sha1' 273s | token: '' '' "aes512" '-' 273s | token: '' "aes512" '-' "sha1" '' 273s | ike_alg_byname() failed: ESP encryption algorithm 'aes512' is not recognized 273s | parsing 'aes-sha1555' for ESP 273s | proposal: 'aes-sha1555' 273s | token: '' '' "aes" '-' 273s | token: '' "aes" '-' "sha1555" '' 273s | token: '-' "sha1555" '' '' 273s | appending ESP encryption algorithm AES_CBC[_0] 273s | parsing integ: 273s | ike_alg_byname() failed: ESP integrity algorithm 'sha1555' is not recognized 273s | lookup for integrity algorithm 'sha1555' failed 273s | or - failed 'ESP integrity algorithm 'sha1555' is not recognized') 273s | parsing 'camellia666-sha1' for ESP 273s | proposal: 'camellia666-sha1' 273s | token: '' '' "camellia666" '-' 273s | token: '' "camellia666" '-' "sha1" '' 273s | ike_alg_byname() failed: ESP encryption algorithm 'camellia666' is not recognized 273s | parsing 'blowfish' for ESP 273s | proposal: 'blowfish' 273s | token: '' '' "blowfish" '' 273s | token: '' "blowfish" '' '' 273s | ike_alg_byname() failed: ESP encryption algorithm 'blowfish' is not supported 273s | parsing 'des-sha1' for ESP 273s | proposal: 'des-sha1' 273s | token: '' '' "des" '-' 273s | token: '' "des" '-' "sha1" '' 273s | ike_alg_byname() failed: ESP encryption algorithm 'des' is not supported 273s | parsing 'aes_ctr666' for ESP 273s | proposal: 'aes_ctr666' 273s | token: '' '' "aes_ctr666" '' 273s | token: '' "aes_ctr666" '' '' 273s | ike_alg_byname() failed: ESP encryption algorithm 'aes_ctr666' is not recognized 273s | parsing 'aes128-sha2_128' for ESP 273s | proposal: 'aes128-sha2_128' 273s | token: '' '' "aes128" '-' 273s | token: '' "aes128" '-' "sha2_128" '' 273s | ike_alg_byname() failed: ESP encryption algorithm 'aes128' is not recognized 273s | token: '-' "sha2_128" '' '' 273s | appending ESP encryption algorithm AES_CBC[_128] 273s | parsing integ: 273s | ike_alg_byname() failed: ESP integrity algorithm 'sha2_128' is not recognized 273s | lookup for integrity algorithm 'sha2_128' failed 273s | or - failed 'ESP integrity algorithm 'sha2_128' is not recognized') 273s | parsing 'aes256-sha2_256-4096' for ESP 273s | proposal: 'aes256-sha2_256-4096' 273s | token: '' '' "aes256" '-' 273s | token: '' "aes256" '-' "sha2_256" '-' 273s | ike_alg_byname() failed: ESP encryption algorithm 'aes256' is not recognized 273s | token: '-' "sha2_256" '-' "4096" '' 273s | appending ESP encryption algorithm AES_CBC[_256] 273s | parsing integ: 273s | appending ESP integrity algorithm HMAC_SHA2_256_128[_0] 273s | token: '-' "4096" '' '' 273s | parsing dh: 273s | ike_alg_byname() failed: ESP DH algorithm '4096' is not recognized 273s | lookup for DH algorithm '4096' failed 273s | ... failed 'ESP DH algorithm '4096' is not recognized' 273s | parsing 'aes256-sha2_256-128' for ESP 273s | proposal: 'aes256-sha2_256-128' 273s | token: '' '' "aes256" '-' 273s | token: '' "aes256" '-' "sha2_256" '-' 273s | ike_alg_byname() failed: ESP encryption algorithm 'aes256' is not recognized 273s | token: '-' "sha2_256" '-' "128" '' 273s | appending ESP encryption algorithm AES_CBC[_256] 273s | parsing integ: 273s | appending ESP integrity algorithm HMAC_SHA2_256_128[_0] 273s | token: '-' "128" '' '' 273s | parsing dh: 273s | ike_alg_byname() failed: ESP DH algorithm '128' is not recognized 273s | lookup for DH algorithm '128' failed 273s | ... failed 'ESP DH algorithm '128' is not recognized' 273s | parsing 'vanitycipher' for ESP 273s | proposal: 'vanitycipher' 273s | token: '' '' "vanitycipher" '' 273s | token: '' "vanitycipher" '' '' 273s | ike_alg_byname() failed: ESP encryption algorithm 'vanitycipher' is not recognized 273s | parsing 'ase-sah' for ESP 273s | proposal: 'ase-sah' 273s | token: '' '' "ase" '-' 273s | token: '' "ase" '-' "sah" '' 273s | ike_alg_byname() failed: ESP encryption algorithm 'ase' is not recognized 273s | parsing 'aes-sah1' for ESP 273s | proposal: 'aes-sah1' 273s | token: '' '' "aes" '-' 273s | token: '' "aes" '-' "sah1" '' 273s | token: '-' "sah1" '' '' 273s | appending ESP encryption algorithm AES_CBC[_0] 273s | parsing integ: 273s | ike_alg_byname() failed: ESP integrity algorithm 'sah1' is not recognized 273s | lookup for integrity algorithm 'sah1' failed 273s | or - failed 'ESP integrity algorithm 'sah1' is not recognized') 273s | parsing 'id3' for ESP 273s | proposal: 'id3' 273s | token: '' '' "id3" '' 273s | token: '' "id3" '' '' 273s | ike_alg_byname() failed: ESP encryption algorithm 'id3' is not recognized 273s | ike_alg_byname() failed: ESP encryption algorithm 'id3' is not recognized 273s | parsing 'aes-id3' for ESP 273s | proposal: 'aes-id3' 273s | token: '' '' "aes" '-' 273s | token: '' "aes" '-' "id3" '' 273s | token: '-' "id3" '' '' 273s | appending ESP encryption algorithm AES_CBC[_0] 273s | parsing integ: 273s | ike_alg_byname() failed: ESP integrity algorithm 'id3' is not recognized 273s | lookup for integrity algorithm 'id3' failed 273s | or - failed 'ESP integrity algorithm 'id3' is not recognized') 273s | parsing 'aes_gcm-md5' for ESP 273s | proposal: 'aes_gcm-md5' 273s | token: '' '' "aes_gcm" '-' 273s | token: '' "aes_gcm" '-' "md5" '' 273s | token: '-' "md5" '' '' 273s | appending ESP encryption algorithm AES_GCM_16[_0] 273s | parsing integ: 273s | appending ESP integrity algorithm HMAC_MD5_96[_0] 273s | token: '' '' '' 273s | parsing 'mars' for ESP 273s | proposal: 'mars' 273s | token: '' '' "mars" '' 273s | token: '' "mars" '' '' 273s | ike_alg_byname() failed: ESP encryption algorithm 'mars' is not supported 273s | parsing 'aes_gcm-16' for ESP 273s | proposal: 'aes_gcm-16' 273s | token: '' '' "aes_gcm" '-' 273s | token: '' "aes_gcm" '-' "16" '' 273s | byname('aes_gcm') with ='16' failed: ESP encryption algorithm AES_GCM_16 with key length 16 invalid; valid key lengths: 128, 192, 256 273s | parsing 'aes_gcm-0' for ESP 273s | proposal: 'aes_gcm-0' 273s | token: '' '' "aes_gcm" '-' 273s | token: '' "aes_gcm" '-' "0" '' 273s | parsing 'aes_gcm-123456789012345' for ESP 273s | proposal: 'aes_gcm-123456789012345' 273s | token: '' '' "aes_gcm" '-' 273s | token: '' "aes_gcm" '-' "123456789012345" '' 273s | parsing '3des-sha1;dh22' for ESP 273s | proposal: '3des-sha1;dh22' 273s | token: '' '' "3des" '-' 273s | token: '' "3des" '-' "sha1" ';' 273s | token: '-' "sha1" ';' "dh22" '' 273s | appending ESP encryption algorithm 3DES_CBC[_0] 273s | parsing integ: 273s | appending ESP integrity algorithm HMAC_SHA1_96[_0] 273s | token: ';' "dh22" '' '' 273s | parsing dh: 273s | ike_alg_byname() failed: ESP DH algorithm 'dh22' is not supported 273s | lookup for DH algorithm 'dh22' failed 273s | ... failed 'ESP DH algorithm 'dh22' is not supported' 273s | parsing '3des-sha1;modp8192,3des-sha2' for ESP 273s | proposal: '3des-sha1;modp8192' 273s | token: '' '' "3des" '-' 273s | token: '' "3des" '-' "sha1" ';' 273s | token: '-' "sha1" ';' "modp8192" '' 273s | appending ESP encryption algorithm 3DES_CBC[_0] 273s | parsing integ: 273s | appending ESP integrity algorithm HMAC_SHA1_96[_0] 273s | token: ';' "modp8192" '' '' 273s | parsing dh: 273s | appending ESP DH algorithm MODP8192[_0] 273s | token: '' '' '' 273s | proposal: '3des-sha2' 273s | token: '' '' "3des" '-' 273s | token: '' "3des" '-' "sha2" '' 273s | token: '-' "sha2" '' '' 273s | appending ESP encryption algorithm 3DES_CBC[_0] 273s | parsing integ: 273s | appending ESP integrity algorithm HMAC_SHA2_256_128[_0] 273s | token: '' '' '' 273s ipsec algparse: ignoring ESP DH algorithm MODP8192 as PFS policy is disabled 273s | parsing '3des-sha1-modp8192,3des-sha2' for ESP 273s | proposal: '3des-sha1-modp8192' 273s | token: '' '' "3des" '-' 273s | token: '' "3des" '-' "sha1" '-' 273s | token: '-' "sha1" '-' "modp8192" '' 273s | appending ESP encryption algorithm 3DES_CBC[_0] 273s | parsing integ: 273s | appending ESP integrity algorithm HMAC_SHA1_96[_0] 273s | token: '-' "modp8192" '' '' 273s | parsing dh: 273s | appending ESP DH algorithm MODP8192[_0] 273s | token: '' '' '' 273s | proposal: '3des-sha2' 273s | token: '' '' "3des" '-' 273s | token: '' "3des" '-' "sha2" '' 273s | token: '-' "sha2" '' '' 273s | appending ESP encryption algorithm 3DES_CBC[_0] 273s | parsing integ: 273s | appending ESP integrity algorithm HMAC_SHA2_256_128[_0] 273s | token: '' '' '' 273s ipsec algparse: ignoring ESP DH algorithm MODP8192 as PFS policy is disabled 273s | parsing '3des-sha1-modp8192,3des-sha2-modp8192' for ESP 273s | proposal: '3des-sha1-modp8192' 273s | token: '' '' "3des" '-' 273s | token: '' "3des" '-' "sha1" '-' 273s | token: '-' "sha1" '-' "modp8192" '' 273s | appending ESP encryption algorithm 3DES_CBC[_0] 273s | parsing integ: 273s | appending ESP integrity algorithm HMAC_SHA1_96[_0] 273s | token: '-' "modp8192" '' '' 273s | parsing dh: 273s | appending ESP DH algorithm MODP8192[_0] 273s | token: '' '' '' 273s | proposal: '3des-sha2-modp8192' 273s | token: '' '' "3des" '-' 273s | token: '' "3des" '-' "sha2" '-' 273s | token: '-' "sha2" '-' "modp8192" '' 273s | appending ESP encryption algorithm 3DES_CBC[_0] 273s | parsing integ: 273s | appending ESP integrity algorithm HMAC_SHA2_256_128[_0] 273s | token: '-' "modp8192" '' '' 273s | parsing dh: 273s | appending ESP DH algorithm MODP8192[_0] 273s | token: '' '' '' 273s ipsec algparse: ignoring ESP DH algorithm MODP8192 as PFS policy is disabled 273s ipsec algparse: ignoring ESP DH algorithm MODP8192 as PFS policy is disabled 273s | parsing '3des-sha1-modp8192,3des-sha2;modp8192' for ESP 273s | proposal: '3des-sha1-modp8192' 273s | token: '' '' "3des" '-' 273s | token: '' "3des" '-' "sha1" '-' 273s | token: '-' "sha1" '-' "modp8192" '' 273s | appending ESP encryption algorithm 3DES_CBC[_0] 273s | parsing integ: 273s | appending ESP integrity algorithm HMAC_SHA1_96[_0] 273s | token: '-' "modp8192" '' '' 273s | parsing dh: 273s | appending ESP DH algorithm MODP8192[_0] 273s | token: '' '' '' 273s | proposal: '3des-sha2;modp8192' 273s | token: '' '' "3des" '-' 273s | token: '' "3des" '-' "sha2" ';' 273s | token: '-' "sha2" ';' "modp8192" '' 273s | appending ESP encryption algorithm 3DES_CBC[_0] 273s | parsing integ: 273s | appending ESP integrity algorithm HMAC_SHA2_256_128[_0] 273s | token: ';' "modp8192" '' '' 273s | parsing dh: 273s | appending ESP DH algorithm MODP8192[_0] 273s | token: '' '' '' 273s ipsec algparse: ignoring ESP DH algorithm MODP8192 as PFS policy is disabled 273s ipsec algparse: ignoring ESP DH algorithm MODP8192 as PFS policy is disabled 273s | parsing '3des-sha1;modp8192,3des-sha2-modp8192' for ESP 273s | proposal: '3des-sha1;modp8192' 273s | token: '' '' "3des" '-' 273s | token: '' "3des" '-' "sha1" ';' 273s | token: '-' "sha1" ';' "modp8192" '' 273s | appending ESP encryption algorithm 3DES_CBC[_0] 273s | parsing integ: 273s | appending ESP integrity algorithm HMAC_SHA1_96[_0] 273s | token: ';' "modp8192" '' '' 273s | parsing dh: 273s | appending ESP DH algorithm MODP8192[_0] 273s | token: '' '' '' 273s | proposal: '3des-sha2-modp8192' 273s | token: '' '' "3des" '-' 273s | token: '' "3des" '-' "sha2" '-' 273s | token: '-' "sha2" '-' "modp8192" '' 273s | appending ESP encryption algorithm 3DES_CBC[_0] 273s | parsing integ: 273s | appending ESP integrity algorithm HMAC_SHA2_256_128[_0] 273s | token: '-' "modp8192" '' '' 273s | parsing dh: 273s | appending ESP DH algorithm MODP8192[_0] 273s | token: '' '' '' 273s ipsec algparse: ignoring ESP DH algorithm MODP8192 as PFS policy is disabled 273s ipsec algparse: ignoring ESP DH algorithm MODP8192 as PFS policy is disabled 273s | parsing '3des-sha1;modp8192,3des-sha2;modp8192' for ESP 273s | proposal: '3des-sha1;modp8192' 273s | token: '' '' "3des" '-' 273s | token: '' "3des" '-' "sha1" ';' 273s | token: '-' "sha1" ';' "modp8192" '' 273s | appending ESP encryption algorithm 3DES_CBC[_0] 273s | parsing integ: 273s | appending ESP integrity algorithm HMAC_SHA1_96[_0] 273s | token: ';' "modp8192" '' '' 273s | parsing dh: 273s | appending ESP DH algorithm MODP8192[_0] 273s | token: '' '' '' 273s | proposal: '3des-sha2;modp8192' 273s | token: '' '' "3des" '-' 273s | token: '' "3des" '-' "sha2" ';' 273s | token: '-' "sha2" ';' "modp8192" '' 273s | appending ESP encryption algorithm 3DES_CBC[_0] 273s | parsing integ: 273s | appending ESP integrity algorithm HMAC_SHA2_256_128[_0] 273s | token: ';' "modp8192" '' '' 273s | parsing dh: 273s | appending ESP DH algorithm MODP8192[_0] 273s | token: '' '' '' 273s ipsec algparse: ignoring ESP DH algorithm MODP8192 as PFS policy is disabled 273s ipsec algparse: ignoring ESP DH algorithm MODP8192 as PFS policy is disabled 273s | parsing '3des-sha1-modp8192,3des-sha2-modp2048' for ESP 273s | proposal: '3des-sha1-modp8192' 273s | token: '' '' "3des" '-' 273s | token: '' "3des" '-' "sha1" '-' 273s | token: '-' "sha1" '-' "modp8192" '' 273s | appending ESP encryption algorithm 3DES_CBC[_0] 273s | parsing integ: 273s | appending ESP integrity algorithm HMAC_SHA1_96[_0] 273s | token: '-' "modp8192" '' '' 273s | parsing dh: 273s | appending ESP DH algorithm MODP8192[_0] 273s | token: '' '' '' 273s | proposal: '3des-sha2-modp2048' 273s | token: '' '' "3des" '-' 273s | token: '' "3des" '-' "sha2" '-' 273s | token: '-' "sha2" '-' "modp2048" '' 273s | appending ESP encryption algorithm 3DES_CBC[_0] 273s | parsing integ: 273s | appending ESP integrity algorithm HMAC_SHA2_256_128[_0] 273s | token: '-' "modp2048" '' '' 273s | parsing dh: 273s | appending ESP DH algorithm MODP2048[_0] 273s | token: '' '' '' 273s ipsec algparse: ignoring ESP DH algorithm MODP8192 as PFS policy is disabled 273s ipsec algparse: ignoring ESP DH algorithm MODP2048 as PFS policy is disabled 273s | parsing 'SHA2_512_256,SHA2_256_128' for AH 273s | proposal: 'SHA2_512_256' 273s | token: '' '' "SHA2_512_256" '' 273s | token: '' "SHA2_512_256" '' '' 273s | parsing integ: 273s | appending AH integrity algorithm HMAC_SHA2_512_256[_0] 273s | token: '' '' '' 273s | proposal: 'SHA2_256_128' 273s | token: '' '' "SHA2_256_128" '' 273s | token: '' "SHA2_256_128" '' '' 273s | parsing integ: 273s | appending AH integrity algorithm HMAC_SHA2_256_128[_0] 273s | token: '' '' '' 273s | parsing '' for AH 273s | parsing 'md5' for AH 273s | proposal: 'md5' 273s | token: '' '' "md5" '' 273s | token: '' "md5" '' '' 273s | parsing integ: 273s | appending AH integrity algorithm HMAC_MD5_96[_0] 273s | token: '' '' '' 273s | parsing 'sha' for AH 273s | proposal: 'sha' 273s | token: '' '' "sha" '' 273s | token: '' "sha" '' '' 273s | parsing integ: 273s | appending AH integrity algorithm HMAC_SHA1_96[_0] 273s | token: '' '' '' 273s | parsing 'sha;modp2048' for AH 273s | proposal: 'sha;modp2048' 273s | token: '' '' "sha" ';' 273s | token: '' "sha" ';' "modp2048" '' 273s | parsing integ: 273s | appending AH integrity algorithm HMAC_SHA1_96[_0] 273s | token: ';' "modp2048" '' '' 273s | parsing dh: 273s | appending AH DH algorithm MODP2048[_0] 273s | token: '' '' '' 273s ipsec algparse: ignoring AH DH algorithm MODP2048 as PFS policy is disabled 273s | parsing 'sha1' for AH 273s | proposal: 'sha1' 273s | token: '' '' "sha1" '' 273s | token: '' "sha1" '' '' 273s | parsing integ: 273s | appending AH integrity algorithm HMAC_SHA1_96[_0] 273s | token: '' '' '' 273s | parsing 'sha2' for AH 273s | proposal: 'sha2' 273s | token: '' '' "sha2" '' 273s | token: '' "sha2" '' '' 273s | parsing integ: 273s | appending AH integrity algorithm HMAC_SHA2_256_128[_0] 273s | token: '' '' '' 273s | parsing 'sha256' for AH 273s | proposal: 'sha256' 273s | token: '' '' "sha256" '' 273s | token: '' "sha256" '' '' 273s | parsing integ: 273s | appending AH integrity algorithm HMAC_SHA2_256_128[_0] 273s | token: '' '' '' 273s | parsing 'sha384' for AH 273s | proposal: 'sha384' 273s | token: '' '' "sha384" '' 273s | token: '' "sha384" '' '' 273s | parsing integ: 273s | appending AH integrity algorithm HMAC_SHA2_384_192[_0] 273s | token: '' '' '' 273s | parsing 'sha512' for AH 273s | proposal: 'sha512' 273s | token: '' '' "sha512" '' 273s | token: '' "sha512" '' '' 273s | parsing integ: 273s | appending AH integrity algorithm HMAC_SHA2_512_256[_0] 273s | token: '' '' '' 273s | parsing 'sha2_256' for AH 273s | proposal: 'sha2_256' 273s | token: '' '' "sha2_256" '' 273s | token: '' "sha2_256" '' '' 273s | parsing integ: 273s | appending AH integrity algorithm HMAC_SHA2_256_128[_0] 273s | token: '' '' '' 273s | parsing 'sha2_384' for AH 273s | proposal: 'sha2_384' 273s | token: '' '' "sha2_384" '' 273s | token: '' "sha2_384" '' '' 273s | parsing integ: 273s | appending AH integrity algorithm HMAC_SHA2_384_192[_0] 273s | token: '' '' '' 273s | parsing 'sha2_512' for AH 273s | proposal: 'sha2_512' 273s | token: '' '' "sha2_512" '' 273s | token: '' "sha2_512" '' '' 273s | parsing integ: 273s | appending AH integrity algorithm HMAC_SHA2_512_256[_0] 273s | token: '' '' '' 273s | parsing 'aes_xcbc' for AH 273s | proposal: 'aes_xcbc' 273s | token: '' '' "aes_xcbc" '' 273s | token: '' "aes_xcbc" '' '' 273s | parsing integ: 273s | appending AH integrity algorithm AES_XCBC_96[_0] 273s | token: '' '' '' 273s | parsing 'sha2-none' for AH 273s | proposal: 'sha2-none' 273s | token: '' '' "sha2" '-' 273s | token: '' "sha2" '-' "none" '' 273s | parsing integ: 273s | appending AH integrity algorithm HMAC_SHA2_256_128[_0] 273s | token: '-' "none" '' '' 273s | parsing dh: 273s | appending AH DH algorithm NONE[_0] 273s | token: '' '' '' 273s ipsec algparse: ignoring redundant AH DH algorithm NONE as PFS policy is disabled 273s | parsing 'sha2;none' for AH 273s | proposal: 'sha2;none' 273s | token: '' '' "sha2" ';' 273s | token: '' "sha2" ';' "none" '' 273s | parsing integ: 273s | appending AH integrity algorithm HMAC_SHA2_256_128[_0] 273s | token: ';' "none" '' '' 273s | parsing dh: 273s | appending AH DH algorithm NONE[_0] 273s | token: '' '' '' 273s ipsec algparse: ignoring redundant AH DH algorithm NONE as PFS policy is disabled 273s | parsing 'sha1-modp8192,sha1-modp8192,sha1-modp8192' for AH 273s | proposal: 'sha1-modp8192' 273s | token: '' '' "sha1" '-' 273s | token: '' "sha1" '-' "modp8192" '' 273s | parsing integ: 273s | appending AH integrity algorithm HMAC_SHA1_96[_0] 273s | token: '-' "modp8192" '' '' 273s | parsing dh: 273s | appending AH DH algorithm MODP8192[_0] 273s | token: '' '' '' 273s | proposal: 'sha1-modp8192' 273s | token: '' '' "sha1" '-' 273s | token: '' "sha1" '-' "modp8192" '' 273s | parsing integ: 273s | appending AH integrity algorithm HMAC_SHA1_96[_0] 273s | token: '-' "modp8192" '' '' 273s | parsing dh: 273s | appending AH DH algorithm MODP8192[_0] 273s | token: '' '' '' 273s | proposal: 'sha1-modp8192' 273s | token: '' '' "sha1" '-' 273s | token: '' "sha1" '-' "modp8192" '' 273s | parsing integ: 273s | appending AH integrity algorithm HMAC_SHA1_96[_0] 273s | token: '-' "modp8192" '' '' 273s | parsing dh: 273s | appending AH DH algorithm MODP8192[_0] 273s | token: '' '' '' 273s ipsec algparse: ignoring AH DH algorithm MODP8192 as PFS policy is disabled 273s | parsing 'aes-sha1' for AH 273s | proposal: 'aes-sha1' 273s | token: '' '' "aes" '-' 273s | token: '' "aes" '-' "sha1" '' 273s | parsing integ: 273s | ike_alg_byname() failed: AH integrity algorithm 'aes' is not recognized 273s | lookup for integrity algorithm 'aes' failed 273s | or - failed 'AH integrity algorithm 'aes' is not recognized') 273s | parsing 'vanityhash1' for AH 273s | proposal: 'vanityhash1' 273s | token: '' '' "vanityhash1" '' 273s | token: '' "vanityhash1" '' '' 273s | parsing integ: 273s | ike_alg_byname() failed: AH integrity algorithm 'vanityhash1' is not recognized 273s | lookup for integrity algorithm 'vanityhash1' failed 273s | or - failed 'AH integrity algorithm 'vanityhash1' is not recognized') 273s | parsing 'aes_gcm_c-256' for AH 273s | proposal: 'aes_gcm_c-256' 273s | token: '' '' "aes_gcm_c" '-' 273s | token: '' "aes_gcm_c" '-' "256" '' 273s | parsing integ: 273s | ike_alg_byname() failed: AH integrity algorithm 'aes_gcm_c' is not recognized 273s | lookup for integrity algorithm 'aes_gcm_c' failed 273s | or - failed 'AH integrity algorithm 'aes_gcm_c' is not recognized') 273s | parsing 'id3' for AH 273s | proposal: 'id3' 273s | token: '' '' "id3" '' 273s | token: '' "id3" '' '' 273s | parsing integ: 273s | ike_alg_byname() failed: AH integrity algorithm 'id3' is not recognized 273s | lookup for integrity algorithm 'id3' failed 273s | or - failed 'AH integrity algorithm 'id3' is not recognized') 273s | parsing '3des' for AH 273s | proposal: '3des' 273s | token: '' '' "3des" '' 273s | token: '' "3des" '' '' 273s | parsing integ: 273s | ike_alg_byname() failed: AH integrity algorithm '3des' is not recognized 273s | lookup for integrity algorithm '3des' failed 273s | or - failed 'AH integrity algorithm '3des' is not recognized') 273s | parsing 'null' for AH 273s | proposal: 'null' 273s | token: '' '' "null" '' 273s | token: '' "null" '' '' 273s | parsing integ: 273s | appending AH integrity algorithm NONE[_0] 273s | token: '' '' '' 273s | parsing 'aes_gcm' for AH 273s | proposal: 'aes_gcm' 273s | token: '' '' "aes_gcm" '' 273s | token: '' "aes_gcm" '' '' 273s | parsing integ: 273s | ike_alg_byname() failed: AH integrity algorithm 'aes_gcm' is not recognized 273s | lookup for integrity algorithm 'aes_gcm' failed 273s | or - failed 'AH integrity algorithm 'aes_gcm' is not recognized') 273s | parsing 'aes_ccm' for AH 273s | proposal: 'aes_ccm' 273s | token: '' '' "aes_ccm" '' 273s | token: '' "aes_ccm" '' '' 273s | parsing integ: 273s | ike_alg_byname() failed: AH integrity algorithm 'aes_ccm' is not recognized 273s | lookup for integrity algorithm 'aes_ccm' failed 273s | or - failed 'AH integrity algorithm 'aes_ccm' is not recognized') 273s | parsing 'ripemd' for AH 273s | proposal: 'ripemd' 273s | token: '' '' "ripemd" '' 273s | token: '' "ripemd" '' '' 273s | parsing integ: 273s | ike_alg_byname() failed: AH integrity algorithm 'ripemd' is not recognized 273s | lookup for integrity algorithm 'ripemd' failed 273s | or - failed 'AH integrity algorithm 'ripemd' is not recognized') 273s | parsing 'AES_GCM_16_256,AES_GCM_16_128,CHACHA20_POLY1305,AES_CBC_256,AES_CBC_128' for IKE 273s | proposal: 'AES_GCM_16_256' 273s | token: '' '' "AES_GCM_16_256" '' 273s | token: '' "AES_GCM_16_256" '' '' 273s | ike_alg_byname() failed: IKE encryption algorithm 'AES_GCM_16_256' is not recognized 273s | token: '' '' '' 273s | appending IKE encryption algorithm AES_GCM_16[_256] 273s | appending IKE PRF algorithm HMAC_SHA2_512[_0] 273s | appending IKE PRF algorithm HMAC_SHA2_256[_0] 273s | appending IKE integrity algorithm NONE[_0] 273s | appending IKE DH algorithm DH19[_0] 273s | appending IKE DH algorithm DH20[_0] 273s | appending IKE DH algorithm DH21[_0] 273s | appending IKE DH algorithm DH31[_0] 273s | appending IKE DH algorithm MODP4096[_0] 273s | appending IKE DH algorithm MODP3072[_0] 273s | appending IKE DH algorithm MODP2048[_0] 273s | appending IKE DH algorithm MODP8192[_0] 273s | proposal: 'AES_GCM_16_128' 273s | token: '' '' "AES_GCM_16_128" '' 273s | token: '' "AES_GCM_16_128" '' '' 273s | ike_alg_byname() failed: IKE encryption algorithm 'AES_GCM_16_128' is not recognized 273s | token: '' '' '' 273s | appending IKE encryption algorithm AES_GCM_16[_128] 273s | appending IKE PRF algorithm HMAC_SHA2_512[_0] 273s | appending IKE PRF algorithm HMAC_SHA2_256[_0] 273s | appending IKE integrity algorithm NONE[_0] 273s | appending IKE DH algorithm DH19[_0] 273s | appending IKE DH algorithm DH20[_0] 273s | appending IKE DH algorithm DH21[_0] 273s | appending IKE DH algorithm DH31[_0] 273s | appending IKE DH algorithm MODP4096[_0] 273s | appending IKE DH algorithm MODP3072[_0] 273s | appending IKE DH algorithm MODP2048[_0] 273s | appending IKE DH algorithm MODP8192[_0] 273s | proposal: 'CHACHA20_POLY1305' 273s | token: '' '' "CHACHA20_POLY1305" '' 273s | token: '' "CHACHA20_POLY1305" '' '' 273s | token: '' '' '' 273s | appending IKE encryption algorithm CHACHA20_POLY1305[_0] 273s | appending IKE PRF algorithm HMAC_SHA2_512[_0] 273s | appending IKE PRF algorithm HMAC_SHA2_256[_0] 273s | appending IKE integrity algorithm NONE[_0] 273s | appending IKE DH algorithm DH19[_0] 273s | appending IKE DH algorithm DH20[_0] 273s | appending IKE DH algorithm DH21[_0] 273s | appending IKE DH algorithm DH31[_0] 273s | appending IKE DH algorithm MODP4096[_0] 273s | appending IKE DH algorithm MODP3072[_0] 273s | appending IKE DH alg ERROR: IKE DH algorithm 'sha2' is not recognized 273s algparse -v2 'ike=aes-sha2-sha2;ecp_521' (expect ERROR) 273s ERROR: IKE DH algorithm 'sha2' is not recognized 273s algparse -v2 'ike=aes-sha1_96-sha2-ecp_521' (expect SUCCESS) 273s AES_CBC-HMAC_SHA1_96-HMAC_SHA2_256-DH21 273s algparse -v2 'ike=aes-sha1_96-sha2;ecp_521' (expect SUCCESS) 273s AES_CBC-HMAC_SHA1_96-HMAC_SHA2_256-DH21 273s algparse -v2 'ike=aes+aes-sha1+sha1-modp8192+modp8192' (expect SUCCESS) 273s AES_CBC-HMAC_SHA1-MODP8192 273s algparse -v2 'ike=3des+aes+aes-sha2+sha1+sha1-modp4096+modp8192+modp8192' (expect SUCCESS) 273s 3DES_CBC+AES_CBC-HMAC_SHA2_256+HMAC_SHA1-MODP4096+MODP8192 273s algparse -v2 'ike=aes+3des+aes-sha1+sha2+sha1-modp8192+modp4096+modp8192' (expect SUCCESS) 273s orithm MODP2048[_0] 273s | appending IKE DH algorithm MODP8192[_0] 273s | proposal: 'AES_CBC_256' 273s | token: '' '' "AES_CBC_256" '' 273s | token: '' "AES_CBC_256" '' '' 273s | ike_alg_byname() failed: IKE encryption algorithm 'AES_CBC_256' is not recognized 273s | token: '' '' '' 273s | appending IKE encryption algorithm AES_CBC[_256] 273s | appending IKE PRF algorithm HMAC_SHA2_512[_0] 273s | appending IKE PRF algorithm HMAC_SHA2_256[_0] 273s | appending IKE integrity algorithm HMAC_SHA2_512_256[_0] 273s | appending IKE integrity algorithm HMAC_SHA2_256_128[_0] 273s | appending IKE DH algorithm DH19[_0] 273s | appending IKE DH algorithm DH20[_0] 273s | appending IKE DH algorithm DH21[_0] 273s | appending IKE DH algorithm DH31[_0] 273s | appending IKE DH algorithm MODP4096[_0] 273s | appending IKE DH algorithm MODP3072[_0] 273s | appending IKE DH algorithm MODP2048[_0] 273s | appending IKE DH algorithm MODP8192[_0] 273s | proposal: 'AES_CBC_128' 273s | token: '' '' "AES_CBC_128" '' 273s | token: '' "AES_CBC_128" '' '' 273s | ike_alg_byname() failed: IKE encryption algorithm 'AES_CBC_128' is not recognized 273s | token: '' '' '' 273s | appending IKE encryption algorithm AES_CBC[_128] 273s | appending IKE PRF algorithm HMAC_SHA2_512[_0] 273s | appending IKE PRF algorithm HMAC_SHA2_256[_0] 273s | appending IKE integrity algorithm HMAC_SHA2_512_256[_0] 273s | appending IKE integrity algorithm HMAC_SHA2_256_128[_0] 273s | appending IKE DH algorithm DH19[_0] 273s | appending IKE DH algorithm DH20[_0] 273s | appending IKE DH algorithm DH21[_0] 273s | appending IKE DH algorithm DH31[_0] 273s | appending IKE DH algorithm MODP4096[_0] 273s | appending IKE DH algorithm MODP3072[_0] 273s | appending IKE DH algorithm MODP2048[_0] 273s | appending IKE DH algorithm MODP8192[_0] 273s | parsing '' for IKE 273s | parsing '3des-sha1' for IKE 273s | proposal: '3des-sha1' 273s | token: '' '' "3des" '-' 273s | token: '' "3des" '-' "sha1" '' 273s | token: '-' "sha1" '' '' 273s | appending IKE encryption algorithm 3DES_CBC[_0] 273s | parsing prf: 273s | appending IKE PRF algorithm HMAC_SHA1[_0] 273s | token: '' '' '' 273s | - succeeded, advancing tokens 273s | appending IKE integrity algorithm HMAC_SHA1_96[_0] 273s | appending IKE DH algorithm DH19[_0] 273s | appending IKE DH algorithm DH20[_0] 273s | appending IKE DH algorithm DH21[_0] 273s | appending IKE DH algorithm DH31[_0] 273s | appending IKE DH algorithm MODP4096[_0] 273s | appending IKE DH algorithm MODP3072[_0] 273s | appending IKE DH algorithm MODP2048[_0] 273s | appending IKE DH algorithm MODP8192[_0] 273s | parsing '3des-sha1' for IKE 273s | proposal: '3des-sha1' 273s | token: '' '' "3des" '-' 273s | token: '' "3des" '-' "sha1" '' 273s | token: '-' "sha1" '' '' 273s | appending IKE encryption algorithm 3DES_CBC[_0] 273s | parsing prf: 273s | appending IKE PRF algorithm HMAC_SHA1[_0] 273s | token: '' '' '' 273s | - succeeded, advancing tokens 273s | appending IKE integrity algorithm HMAC_SHA1_96[_0] 273s | appending IKE DH algorithm DH19[_0] 273s | appending IKE DH algorithm DH20[_0] 273s | appending IKE DH algorithm DH21[_0] 273s | appending IKE DH algorithm DH31[_0] 273s | appending IKE DH algorithm MODP4096[_0] 273s | appending IKE DH algorithm MODP3072[_0] 273s | appending IKE DH algorithm MODP2048[_0] 273s | appending IKE DH algorithm MODP8192[_0] 273s | parsing '3des-sha1;modp1536' for IKE 273s | proposal: '3des-sha1;modp1536' 273s | token: '' '' "3des" '-' 273s | token: '' "3des" '-' "sha1" ';' 273s | token: '-' "sha1" ';' "modp1536" '' 273s | appending IKE encryption algorithm 3DES_CBC[_0] 273s | parsing prf: 273s | appending IKE PRF algorithm HMAC_SHA1[_0] 273s | token: ';' "modp1536" '' '' 273s | - succeeded, advancing tokens 273s | parsing dh: 273s | appending IKE DH algorithm MODP1536[_0] 273s | token: '' '' '' 273s | appending IKE integrity algorithm HMAC_SHA1_96[_0] 273s | parsing '3des;dh21' for IKE 273s | proposal: '3des;dh21' 273s | token: '' '' "3des" ';' 273s | token: '' "3des" ';' "dh21" '' 273s | token: ';' "dh21" '' '' 273s | appending IKE encryption algorithm 3DES_CBC[_0] 273s | parsing dh: 273s | appending IKE DH algorithm DH21[_0] 273s | token: '' '' '' 273s | appending IKE PRF algorithm HMAC_SHA2_512[_0] 273s | appending IKE PRF algorithm HMAC_SHA2_256[_0] 273s | appending IKE integrity algorithm HMAC_SHA2_512_256[_0] 273s | appending IKE integrity algorithm HMAC_SHA2_256_128[_0] 273s | parsing '3des-sha1;dh21' for IKE 273s | proposal: '3des-sha1;dh21' 273s | token: '' '' "3des" '-' 273s | token: '' "3des" '-' "sha1" ';' 273s | token: '-' "sha1" ';' "dh21" '' 273s | appending IKE encryption algorithm 3DES_CBC[_0] 273s | parsing prf: 273s | appending IKE PRF algorithm HMAC_SHA1[_0] 273s | token: ';' "dh21" '' '' 273s | - succeeded, advancing tokens 273s | parsing dh: 273s | appending IKE DH algorithm DH21[_0] 273s | token: '' '' '' 273s | appending IKE integrity algorithm HMAC_SHA1_96[_0] 273s | parsing '3des-sha1-ecp_521' for IKE 273s | proposal: '3des-sha1-ecp_521' 273s | token: '' '' "3des" '-' 273s | token: '' "3des" '-' "sha1" '-' 273s | token: '-' "sha1" '-' "ecp_521" '' 273s | appending IKE encryption algorithm 3DES_CBC[_0] 273s | parsing prf: 273s | appending IKE PRF algorithm HMAC_SHA1[_0] 273s | token: '-' "ecp_521" '' '' 273s | - succeeded, advancing tokens 273s | parsing dh: 273s | appending IKE DH algorithm DH21[_0] 273s | token: '' '' '' 273s | appending IKE integrity algorithm HMAC_SHA1_96[_0] 273s | parsing '3des+aes' for IKE 273s | proposal: '3des+aes' 273s | token: '' '' "3des" '+' 273s | token: '' "3des" '+' "aes" '' 273s | token: '+' "aes" '' '' 273s | appending IKE encryption algorithm 3DES_CBC[_0] 273s | token: '' '' '' 273s | appending IKE encryption algorithm AES_CBC[_0] 273s | appending IKE PRF algorithm HMAC_SHA2_512[_0] 273s | appending IKE PRF algorithm HMAC_SHA2_256[_0] 273s | appending IKE integrity algorithm HMAC_SHA2_512_256[_0] 273s | appending IKE integrity algorithm HMAC_SHA2_256_128[_0] 273s | appending IKE DH algorithm DH19[_0] 273s | appending IKE DH algorithm DH20[_0] 273s | appending IKE DH algorithm DH21[_0] 273s | appending IKE DH algorithm DH31[_0] 273s | appending IKE DH algorithm MODP4096[_0] 273s | appending IKE DH algorithm MODP3072[_0] 273s | appending IKE DH algorithm MODP2048[_0] 273s | appending IKE DH algorithm MODP8192[_0] 273s | parsing 'aes;none' for IKE 273s | proposal: 'aes;none' 273s | token: '' '' "aes" ';' 273s | token: '' "aes" ';' "none" '' 273s | token: ';' "none" '' '' 273s | appending IKE encryption algorithm AES_CBC[_0] 273s | parsing dh: 273s | appending IKE DH algorithm NONE[_0] 273s | token: '' '' '' 273s | appending IKE PRF algorithm HMAC_SHA2_512[_0] 273s | appending IKE PRF algorithm HMAC_SHA2_256[_0] 273s | appending IKE integrity algorithm HMAC_SHA2_512_256[_0] 273s | appending IKE integrity algorithm HMAC_SHA2_256_128[_0] 273s | parsing 'id2' for IKE 273s | proposal: 'id2' 273s | token: '' '' "id2" '' 273s | token: '' "id2" '' '' 273s | ike_alg_byname() failed: IKE encryption algorithm 'id2' is not recognized 273s | ike_alg_byname() failed: IKE encryption algorithm 'id2' is not recognized 273s | parsing '3des-id2' for IKE 273s | proposal: '3des-id2' 273s | token: '' '' "3des" '-' 273s | token: '' "3des" '-' "id2" '' 273s | token: '-' "id2" '' '' 273s | appending IKE encryption algorithm 3DES_CBC[_0] 273s | parsing prf: 273s | ike_alg_byname() failed: IKE PRF algorithm 'id2' is not recognized 273s | lookup for PRF algorithm 'id2' failed 273s | - failed, saving error 'IKE PRF algorithm 'id2' is not recognized' and tossing result 273s | parsing integ: 273s | ike_alg_byname() failed: IKE integrity algorithm 'id2' is not recognized 273s | lookup for integrity algorithm 'id2' failed 273s | - and - failed, returning earlier PRF error 'IKE PRF algorithm 'id2' is not recognized' and discarding INTEG error 'IKE integrity algorithm 'id2' is not recognized') 273s | parsing 'aes_ccm' for IKE 273s | proposal: 'aes_ccm' 273s | token: '' '' "aes_ccm" '' 273s | token: '' "aes_ccm" '' '' 273s | alg_byname_ok() failed: IKE encryption algorithm 'aes_ccm' is not supported 273s | parsing 'aes-sha1-sha2-ecp_521' for IKE 273s | proposal: 'aes-sha1-sha2-ecp_521' 273s | token: '' '' "aes" '-' 273s | token: '' "aes" '-' "sha1" '-' 273s | token: '-' "sha1" '-' "sha2" '-' 273s | appending IKE encryption algorithm AES_CBC[_0] 273s | parsing prf: 273s | appending IKE PRF algorithm HMAC_SHA1[_0] 273s | token: '-' "sha2" '-' "ecp_521" '' 273s | - succeeded, advancing tokens 273s | parsing dh: 273s | ike_alg_byname() failed: IKE DH algorithm 'sha2' is not recognized 273s | lookup for DH algorithm 'sha2' failed 273s | ... failed 'IKE DH algorithm 'sha2' is not recognized' 273s | parsing 'aes-sha2-sha2;ecp_521' for IKE 273s | proposal: 'aes-sha2-sha2;ecp_521' 273s | token: '' '' "aes" '-' 273s | token: '' "aes" '-' "sha2" '-' 273s | token: '-' "sha2" '-' "sha2" ';' 273s | appending IKE encryption algorithm AES_CBC[_0] 273s | parsing prf: 273s | appending IKE PRF algorithm HMAC_SHA2_256[_0] 273s | token: '-' "sha2" ';' "ecp_521" '' 273s | - succeeded, advancing tokens 273s | parsing dh: 273s | ike_alg_byname() failed: IKE DH algorithm 'sha2' is not recognized 273s | lookup for DH algorithm 'sha2' failed 273s | ... failed 'IKE DH algorithm 'sha2' is not recognized' 273s | parsing 'aes-sha1_96-sha2-ecp_521' for IKE 273s | proposal: 'aes-sha1_96-sha2-ecp_521' 273s | token: '' '' "aes" '-' 273s | token: '' "aes" '-' "sha1_96" '-' 273s | token: '-' "sha1_96" '-' "sha2" '-' 273s | appending IKE encryption algorithm AES_CBC[_0] 273s | parsing prf: 273s | ike_alg_byname() failed: IKE PRF algorithm 'sha1_96' is not recognized 273s | lookup for PRF algorithm 'sha1_96' failed 273s | - failed, saving error 'IKE PRF algorithm 'sha1_96' is not recognized' and tossing result 273s | parsing integ: 273s | appending IKE integrity algorithm HMAC_SHA1_96[_0] 273s | token: '-' "sha2" '-' "ecp_521" '' 273s | parsing prf: 273s | appending IKE PRF algorithm HMAC_SHA2_256[_0] 273s | token: '-' "ecp_521" '' '' 273s | parsing dh: 273s | appending IKE DH algorithm DH21[_0] 273s | token: '' '' '' 273s | parsing 'aes-sha1_96-sha2;ecp_521' for IKE 273s | proposal: 'aes-sha1_96-sha2;ecp_521' 273s | token: '' '' "aes" '-' 273s | token: '' "aes" '-' "sha1_96" '-' 273s | token: '-' "sha1_96" '-' "sha2" ';' 273s | appending IKE encryption algorithm AES_CBC[_0] 273s | parsing prf: 273s | ike_alg_byname() failed: IKE PRF algorithm 'sha1_96' is not recognized 273s | lookup for PRF algorithm 'sha1_96' failed 273s | - failed, saving error 'IKE PRF algorithm 'sha1_96' is not recognized' and tossing result 273s | parsing integ: 273s | appending IKE integrity algorithm HMAC_SHA1_96[_0] 273s | token: '-' "sha2" ';' "ecp_521" '' 273s | parsing prf: 273s | appending IKE PRF algorithm HMAC_SHA2_256[_0] 273s | token: ';' "ecp_521" '' '' 273s | parsing dh: 273s | appending IKE DH algorithm DH21[_0] 273s | token: '' '' '' 273s | parsing 'aes+aes-sha1+sha1-modp8192+modp8192' for IKE 273s | proposal: 'aes+aes-sha1+sha1-modp8192+modp8192' 273s | token: '' '' "aes" '+' 273s | token: '' "aes" '+' "aes" '-' 273s | token: '+' "aes" '-' "sha1" '+' 273s | appending IKE encryption algorithm AES_CBC[_0] 273s | token: '-' "sha1" '+' "sha1" '-' 273s | appending IKE encryption algorithm AES_CBC[_0] 273s ipsec algparse: discarding duplicate IKE encryption algorithm AES_CBC 273s | parsing prf: 273s | appending IKE PRF algorithm HMAC_SHA1[_0] 273s | token: '+' "sha1" '-' "modp8192" '+' 273s | appending IKE PRF algorithm HMAC_SHA1[_0] 273s | token: '-' "modp8192" '+' "modp8192" '' 273s ipsec algparse: discarding duplicate IKE PRF algorithm HMAC_SHA1 273s | - succeeded, advancing tokens 273s | parsing dh: 273s | appending IKE DH algorithm MODP8192[_0] 273s | token: '+' "modp8192" '' '' 273s | appending IKE DH algorithm MODP8192[_0] 273s | token: '' '' '' 273s ipsec algparse: discarding duplicate IKE DH algorithm MODP8192 273s | appending IKE integrity algorithm HMAC_SHA1_96[_0] 273s | parsing '3des+aes+aes-sha2+sha1+sha1-modp4096+modp8192+modp8192' for IKE 273s | proposal: '3des+aes+aes-sha2+sha1+sha1-modp4096+modp8192+modp8192' 273s | token: '' '' "3des" '+' 273s | token: '' "3des" '+' "aes" '+' 273s | token: '+' "aes" '+' "aes" '-' 273s | appending IKE encryption algorithm 3DES_CBC[_0] 273s | token: '+' "aes" '-' "sha2" '+' 273s | appending IKE encryption algorithm AES_CBC[_0] 273s | token: '-' "sha2" '+' "sha1" '+' 273s | appending IKE encryption algorithm AES_CBC[_0] 273s ipsec algparse: discarding duplicate IKE encryption algorithm AES_CBC 273s | parsing prf: 273s | appending IKE PRF algorithm HMAC_SHA2_256[_0] 273s | token: '+' "sha1" '+' "sha1" '-' 273s | appending IKE PRF algorithm HMAC_SHA1[_0] 273s | token: '+' "sha1" '-' "modp4096" '+' 273s | appending IKE PRF algorithm HMAC_SHA1[_0] 273s | token: '-' "modp4096" '+' "modp8192" '+' 273s ipsec algparse: discarding duplicate IKE PRF algorithm HMAC_SHA1 273s | - succeeded, advancing tokens 273s | parsing dh: 273s | appending IKE DH algorithm MODP4096[_0] 273s | token: '+' "modp8192" '+' "modp8192" '' 273s | appending IKE DH algorithm MODP8192[_0] 273s | token: '+' "modp8192" '' '' 273s | appending IKE DH algorithm MODP8192[_0] 273s | token: '' '' '' 273s ipsec algparse: discarding duplicate IKE DH algorithm MODP8192 273s | appending IKE integrity algorithm HMAC_SHA2_256_128[_0] 273s | appending IKE integrity algorithm HMAC_SHA1_96[_0] 273s | parsing 'aes+3des+aes-sha1+sha2+sha1-modp8192+modp4096+modp8192' for IKE 273s | proposal: 'aes+3des+aes-sha1+sha2+sha1-modp8192+modp4096+modp8192' 273s | token: '' '' "aes" '+' 273s | token: '' "aes" '+' "3des" '+' 273s | token: '+' "3des" '+' "aes" '-' 273s | appending IKE encryption algorithm AES_CBC[_0] 273s | token: '+' "aes" '-' "sha1" '+' 273s | appending IKE encryption algorithm 3DES_CBC[_0] 273s | token: '-' "sha1" '+' "sha2" '+' 273s | appending IKE encryption algorithm AES_CBC[_0] 273s ipsec algparse: discarding duplicate IKE encryption algorithm AES_CBC 273s | parsing prf: 273s | appending IKE PRF algorithm HMAC_SHA1[_0] 273s | token: '+' "sha2" '+' "sha1" '-' 273s | appending IKE PRF algorithm HMAC_SHA2_256[_0] 273s | token: '+' "sha1" '-' "modp8192" '+' 273s | appending IKE PRF algorithm HMAC_SHA1[_0] 273s | token: '-' "modp8192" '+' "modp4096" '+' 273s ipsec algparse: discarding duplicate IKE PRF algorithm HMAC_SHA1 273s | - succeeded, advancing tokens 273s | parsing dh: 273s | appending IKE DH algorithm MODP8192[_0] 273s | token: '+' "modp4096" '+' "modp8192" '' 273s | appending IKE DH algorithm MODP4096[_0] 273s | token: '+' "modp8192" '' '' 273s | appending IKE DH algorithm MODP8192[_0] 273s | token: '' '' '' 273s ipsec algparse: discarding duplicate IKE DH algorithm MODP8192 273s | appending IKE integrity algorithm HMAC_SHA1_96[_0] 273s | appending IKE integrity algorithm HMAC_SHA2_256_128[_0] 273s | parsing 'aes+aes+3des-sha1+sha1+sha2-modp8192+modp8192+modp4096' for IKE 273s | proposal: 'aes+aes+3des-sha1+sha1+sha2-modp8192+modp8192+modp4096' 273s | token: '' '' "aes" '+' 273s | token: '' "aes" '+' "aes" '+' 273s | token: '+' "aes" '+' "3des" '-' 273s | appending IKE encryption algorithm AES_CBC[_0] 273s | token: '+' "3des" '-' "sha1" '+' 273s | appending IKE encryption algorithm AES_CBC[_0] 273s | token: '-' "sha1" '+' "sha1" '+' 273s | appending IKE encryption algorithm 3DES_CBC[_0] 273s ipsec algparse: discarding duplicate IKE encryption algorithm AES_CBC 273s | parsing prf: 273s | appending IKE PRF algorithm HMAC_SHA1[_0] 273s | token: '+' "sha1" '+' "sha2" '-' 273s | appending IKE PRF algorithm HMAC_SHA1[_0] 273s | token: '+' "sha2" '-' "modp8192" '+' 273s | appending IKE PRF algorithm HMAC_SHA2_256[_0] 273s | token: '-' "modp8192" '+' "modp8192" '+' 273s ipsec algparse: discarding duplicate IKE PRF algorithm HMAC_SHA1 273s | - succeeded, advancing tokens 273s | parsing dh: 273s | appending IKE DH algorithm MODP8192[_0] 273s | token: '+' "modp8192" '+' "modp4096" '' 273s | appending IKE DH algorithm MODP8192[_0] 273s | token: '+' "modp4096" '' '' 273s | appending IKE DH algorithm MODP4096[_0] 273s | token: '' '' '' 273s ipsec algparse: discarding duplicate IKE DH algorithm MODP8192 273s | appending IKE integrity algorithm HMAC_SHA1_96[_0] 273s | appending IKE integrity algorithm HMAC_SHA2_256_128[_0] 273s | parsing 'aes+aes128+aes256' for IKE 273s | proposal: 'aes+aes128+aes256' 273s | token: '' '' "aes" '+' 273s | token: '' "aes" '+' "aes128" '+' 273s | token: '+' "aes128" '+' "aes256" '' 273s | appending IKE encryption algorithm AES_CBC[_0] 273s | ike_alg_byname() failed: IKE encryption algorithm 'aes128' is not recognized 273s | token: '+' "aes256" '' '' 273s | appending IKE encryption algorithm AES_CBC[_128] 273s | ike_alg_byname() failed: IKE encryption algorithm 'aes256' is not recognized 273s | token: '' '' '' 273s | appending IKE encryption algorithm AES_CBC[_256] 273s ipsec algparse: discarding duplicate IKE encryption algorithm AES_CBC_128 273s ipsec algparse: discarding duplicate IKE encryption algorithm AES_CBC_256 273s | appending IKE PRF algorithm HMAC_SHA2_512[_0] 273s | appending IKE PRF algorithm HMAC_SHA2_256[_0] 273s | appending IKE integrity algorithm HMAC_SHA2_512_256[_0] 273s | appending IKE integrity algorithm HMAC_SHA2_256_128[_0] 273s | appending IKE DH algorithm DH19[_0] 273s | appending IKE DH algorithm DH20[_0] 273s | appending IKE DH algorithm DH21[_0] 273s | appending IKE DH algorithm DH31[_0] 273s | appending IKE DH algorithm MODP4096[_0] 273s | appending IKE DH algorithm MODP3072[_0] 273s | appending IKE DH algorithm MODP2048[_0] 273s | appending IKE DH algorithm MODP8192[_0] 273s | parsing 'aes128+aes+aes256' for IKE 273s | proposal: 'aes128+aes+aes256' 273s | token: '' '' "aes128" '+' 273s | token: '' "aes128" '+' "aes" '+' 273s | ike_alg_byname() failed: IKE encryption algorithm 'aes128' is not recognized 273s | token: '+' "aes" '+' "aes256" '' 273s | appending IKE encryption algorithm AES_CBC[_128] 273s | token: '+' "aes256" '' '' 273s | appending IKE encryption algorithm AES_CBC[_0] 273s | ike_alg_byname() failed: IKE encryption algorithm 'aes256' is not recognized 273s | token: '' '' '' 273s | appending IKE encryption algorithm AES_CBC[_256] 273s ipsec algparse: discarding duplicate IKE encryption algorithm AES_CBC_256 273s | appending IKE PRF algorithm HMAC_SHA2_512[_0] 273s | appending IKE PRF algorithm HMAC_SHA2_256[_0] 273s | appending IKE integrity algorithm HMAC_SHA2_512_256[_0] 273s | appending IKE integrity algorithm HMAC_SHA2_256_128[_0] 273s | appending IKE DH algorithm DH19[_0] 273s | appending IKE DH algorithm DH20[_0] 273s | appending IKE DH algorithm DH21[_0] 273s | appending IKE DH algorithm DH31[_0] 273s | appending IKE DH algorithm MODP4096[_0] 273s | appending IKE DH algorithm MODP3072[_0] 273s | appending IKE DH algorithm MODP2048[_0] 273s | appending IKE DH algorithm MODP8192[_0] 273s | parsing 'aes128+aes256+aes' for IKE 273s | proposal: 'aes128+aes256+aes' 273s | token: '' '' "aes128" '+' 273s | token: '' "aes128" '+' "aes256" '+' 273s | ike_alg_byname() failed: IKE encryption algorithm 'aes128' is not recognized 273s | token: '+' "aes256" '+' "aes" '' 273s | appending IKE encryption algorithm AES_CBC[_128] 273s | ike_alg_byname() failed: IKE encryption algorithm 'aes256' is not recognized 273s | token: '+' "aes" '' '' 273s | appending IKE encryption algorithm AES_CBC[_256] 273s | token: '' '' '' 273s | appending IKE encryption algorithm AES_CBC[_0] 273s | appending IKE PRF algorithm HMAC_SHA2_512[_0] 273s | appending IKE PRF algorithm HMAC_SHA2_256[_0] 273s | appending IKE integrity algorithm HMAC_SHA2_512_256[_0] 273s | appending IKE integrity algorithm HMAC_SHA2_256_128[_0] 273s | appending IKE DH algorithm DH19[_0] 273s | appending IKE DH algorithm DH20[_0] 273s | appending IKE DH algorithm DH21[_0] 273s | appending IKE DH algorithm DH31[_0] 273s | appending IKE DH algorithm MODP4096[_0] 273s | appending IKE DH algorithm MODP3072[_0] 273s | appending IKE DH algorithm MODP2048[_0] 273s | appending IKE DH algorithm MODP8192[_0] 273s | parsing 'aes-sha1-modp8192,aes-sha1-modp8192,aes-sha1-modp8192' for IKE 273s | proposal: 'aes-sha1-modp8192' 273s | token: '' '' "aes" '-' 273s | token: '' "aes" '-' "sha1" '-' 273s | token: '-' "sha1" '-' "modp8192" '' 273s | appending IKE encryption algorithm AES_CBC[_0] 273s | parsing prf: 273s | appending IKE PRF algorithm HMAC_SHA1[_0] 273s | token: '-' "modp8192" '' '' 273s | - succeeded, advancing tokens 273s | parsing dh: 273s | appending IKE DH algorithm MODP8192[_0] 273s | token: '' '' '' 273s | appending IKE integrity algorithm HMAC_SHA1_96[_0] 273s | proposal: 'aes-sha1-modp8192' 273s | token: '' '' "aes" '-' 273s | token: '' "aes" '-' "sha1" '-' 273s | token: '-' "sha1" '-' "modp8192" '' 273s | appending IKE encryption algorithm AES_CBC[_0] 273s | parsing prf: 273s | appending IKE PRF algorithm HMAC_SHA1[_0] 273s | token: '-' "modp8192" '' '' 273s | - succeeded, advancing tokens 273s | parsing dh: 273s | appending IKE DH algorithm MODP8192[_0] 273s | token: '' '' '' 273s | appending IKE integrity algorithm HMAC_SHA1_96[_0] 273s | proposal: 'aes-sha1-modp8192' 273s | token: '' '' "aes" '-' 273s | token: '' "aes" '-' "sha1" '-' 273s | token: '-' "sha1" '-' "modp8192" '' 273s | appending IKE encryption algorithm AES_CBC[_0] 273s | parsing prf: 273s | appending IKE PRF algorithm HMAC_SHA1[_0] 273s | token: '-' "modp8192" '' '' 273s | - succeeded, advancing tokens 273s | parsing dh: 273s | appending IKE DH algorithm MODP8192[_0] 273s | token: '' '' '' 273s | appending IKE integrity algorithm HMAC_SHA1_96[_0] 273s | parsing 'aes-sha1-modp8192,aes-sha2-modp8192,aes-sha1-modp8192' for IKE 273s | proposal: 'aes-sha1-modp8192' 273s | token: '' '' "aes" '-' 273s | token: '' "aes" '-' "sha1" '-' 273s | token: '-' "sha1" '-' "modp8192" '' 273s | appending IKE encryption algorithm AES_CBC[_0] 273s | parsing prf: 273s | appending IKE PRF algorithm HMAC_SHA1[_0] 273s | token: '-' "modp8192" '' '' 273s | - succeeded, advancing tokens 273s | parsing dh: 273s | appending IKE DH algorithm MODP8192[_0] 273s | token: '' '' '' 273s | appending IKE integrity algorithm HMAC_SHA1_96[_0] 273s | proposal: 'aes-sha2-modp8192' 273s | token: '' '' "aes" '-' 273s | token: '' "aes" '-' "sha2" '-' 273s | token: '-' "sha2" '-' "modp8192" '' 273s | appending IKE encryption algorithm AES_CBC[_0] 273s | parsing prf: 273s | appending IKE PRF algorithm HMAC_SHA2_256[_0] 273s | token: '-' "modp8192" '' '' 273s | - succeeded, advancing tokens 273s | parsing dh: 273s | appending IKE DH algorithm MODP8192[_0] 273s | token: '' '' '' 273s | appending IKE integrity algorithm HMAC_SHA2_256_128[_0] 273s | proposal: 'aes-sha1-modp8192' 273s | token: '' '' "aes" '-' 273s | token: '' "aes" '-' "sha1" '-' 273s | token: '-' "sha1" '-' "modp8192" '' 273s | appending IKE encryption algorithm AES_CBC[_0] 273s | parsing prf: 273s | appending IKE PRF algorithm HMAC_SHA1[_0] 273s | token: '-' "modp8192" '' '' 273s | - succeeded, advancing tokens 273s | parsing dh: 273s | appending IKE DH algorithm MODP8192[_0] 273s | token: '' '' '' 273s | appending IKE integrity algorithm HMAC_SHA1_96[_0] 273s | parsing 'aes_gcm' for IKE 273s | proposal: 'aes_gcm' 273s | token: '' '' "aes_gcm" '' 273s | token: '' "aes_gcm" '' '' 273s | token: '' '' '' 273s | appending IKE encryption algorithm AES_GCM_16[_0] 273s | appending IKE PRF algorithm HMAC_SHA2_512[_0] 273s | appending IKE PRF algorithm HMAC_SHA2_256[_0] 273s | appending IKE integrity algorithm NONE[_0] 273s | appending IKE DH algorithm DH19[_0] 273s | appending IKE DH algorithm DH20[_0] 273s | appending IKE DH algorithm DH21[_0] 273s | appending IKE DH algorithm DH31[_0] 273s | appending IKE DH algorithm MODP4096[_0] 273s | appending IKE DH algorithm MODP3072[_0] 273s | appending IKE DH algorithm MODP2048[_0] 273s | appending IKE DH algorithm MODP8192[_0] 273s | parsing 'aes_gcm-sha2' for IKE 273s | proposal: 'aes_gcm-sha2' 273s | token: '' '' "aes_gcm" '-' 273s | token: '' "aes_gcm" '-' "sha2" '' 273s | token: '-' "sha2" '' '' 273s | appending IKE encryption algorithm AES_GCM_16[_0] 273s | parsing prf: 273s | appending IKE PRF algorithm HMAC_SHA2_256[_0] 273s | token: '' '' '' 273s | - succeeded, advancing tokens 273s | appending IKE integrity algorithm NONE[_0] 273s | appending IKE DH algorithm DH19[_0] 273s | appending IKE DH algorithm DH20[_0] 273s | appending IKE DH algorithm DH21[_0] 273s | appending IKE DH algorithm DH31[_0] 273s | appending IKE DH algorithm MODP4096[_0] 273s | appending IKE DH algorithm MODP3072[_0] 273s | appending IKE DH algorithm MODP2048[_0] 273s | appending IKE DH algorithm MODP8192[_0] 273s | parsing 'aes_gcm-sha2-modp2048' for IKE 273s | proposal: 'aes_gcm-sha2-modp2048' 273s | token: '' '' "aes_gcm" '-' 273s | token: '' "aes_gcm" '-' "sha2" '-' 273s | token: '-' "sha2" '-' "modp2048" '' 273s | appending IKE encryption algorithm AES_GCM_16[_0] 273s | parsing prf: 273s | appending IKE PRF algorithm HMAC_SHA2_256[_0] 273s | token: '-' "modp2048" '' '' 273s | - succeeded, advancing tokens 273s | parsing dh: 273s | appending IKE DH algorithm MODP2048[_0] 273s | token: '' '' '' 273s | appending IKE integrity algorithm NONE[_0] 273s | parsing 'aes_gcm-sha2;modp2048' for IKE 273s | proposal: 'aes_gcm-sha2;modp2048' 273s | token: '' '' "aes_gcm" '-' 273s | token: '' "aes_gcm" '-' "sha2" ';' 273s | token: '-' "sha2" ';' "modp2048" '' 273s | appending IKE encryption algorithm AES_GCM_16[_0] 273s | parsing prf: 273s | appending IKE PRF algorithm HMAC_SHA2_256[_0] 273s | token: ';' "modp2048" '' '' 273s | - succeeded, advancing tokens 273s | parsing dh: 273s | appending IKE DH algorithm MODP2048[_0] 273s | token: '' '' '' 273s | appending IKE integrity algorithm NONE[_0] 273s | parsing 'aes_gcm-modp2048' for IKE 273s | proposal: 'aes_gcm-modp2048' 273s | token: '' '' "aes_gcm" '-' 273s | token: '' "aes_gcm" '-' "modp2048" '' 273s | token: '-' "modp2048" '' '' 273s | appending IKE encryption algorithm AES_GCM_16[_0] 273s | parsing prf: 273s | ike_alg_byname() failed: IKE PRF algorithm 'modp2048' is not recognized 273s | lookup for PRF algorithm 'modp2048' failed 273s | - failed, saving error 'IKE PRF algorithm 'modp2048' is not recognized' and tossing result 273s | parsing integ: 273s AES_CBC+3DES_CBC-HMAC_SHA1+HMAC_SHA2_256-MODP8192+MODP4096 273s algparse -v2 'ike=aes+aes+3des-sha1+sha1+sha2-modp8192+modp8192+modp4096' (expect SUCCESS) 273s AES_CBC+3DES_CBC-HMAC_SHA1+HMAC_SHA2_256-MODP8192+MODP4096 273s algparse -v2 'ike=aes+aes128+aes256' (expect SUCCESS) 273s AES_CBC-HMAC_SHA2_512+HMAC_SHA2_256-DH19+DH20+DH21+DH31+MODP4096+MODP3072+MODP2048+MODP8192 273s algparse -v2 'ike=aes128+aes+aes256' (expect SUCCESS) 273s AES_CBC_128+AES_CBC-HMAC_SHA2_512+HMAC_SHA2_256-DH19+DH20+DH21+DH31+MODP4096+MODP3072+MODP2048+MODP8192 273s algparse -v2 'ike=aes128+aes256+aes' (expect SUCCESS) 273s AES_CBC_128+AES_CBC_256+AES_CBC-HMAC_SHA2_512+HMAC_SHA2_256-DH19+DH20+DH21+DH31+MODP4096+MODP3072+MODP2048+MODP8192 273s algparse -v2 'ike=aes-sha1-modp8192,aes-sha1-modp8192,aes-sha1-modp8192' (expect SUCCESS) 273s AES_CBC-HMAC_SHA1-MODP8192 273s algparse -v2 'ike=aes-sha1-modp8192,aes-sha2-modp8192,aes-sha1-modp8192' (expect SUCCESS) 273s AES_CBC-HMAC_SHA1-MODP8192 273s AES_CBC-HMAC_SHA2_256-MODP8192 273s algparse -v2 'ike=aes_gcm' (expect SUCCESS) 273s AES_GCM_16-HMAC_SHA2_512+HMAC_SHA2_256-DH19+DH20+DH21+DH31+MODP4096+MODP3072+MODP2048+MODP8192 273s algparse -v2 'ike=aes_gcm-sha2' (expect SUCCESS) 273s AES_GCM_16-HMAC_SHA2_256-DH19+DH20+DH21+DH31+MODP4096+MODP3072+MODP2048+MODP8192 273s algparse -v2 'ike=aes_gcm-sha2-modp2048' (expect SUCCESS) 273s AES_GCM_16-HMAC_SHA2_256-MODP2048 273s algparse -v2 'ike=aes_gcm-sha2;modp2048' (expect SUCCESS) 273s AES_GCM_16-HMAC_SHA2_256-MODP2048 273s algparse -v2 'ike=aes_gcm-modp2048' (expect ERROR) 273s ERROR: IKE PRF algorithm 'modp2048' is not recognized 273s algparse -v2 'ike=aes_gcm;modp2048' (expect SUCCESS) 273s AES_GCM_16-HMAC_SHA2_512+HMAC_SHA2_256-MODP2048 273s algparse -v2 'ike=aes_gcm-none' (expect SUCCESS) 273s AES_GCM_16-HMAC_SHA2_512+HMAC_SHA2_256-DH19+DH20+DH21+DH31+MODP4096+MODP3072+MODP2048+MODP8192 273s algparse -v2 'ike=aes_gcm-none-sha2' (expect SUCCESS) 273s AES_GCM_16-HMAC_SHA2_256-DH19+DH20+DH21+DH31+MODP4096+MODP3072+MODP2048+MODP8192 273s algparse -v2 'ike=aes_gcm-none-sha2-modp2048' (expect SUCCESS) 273s AES_GCM_16-HMAC_SHA2_256-MODP2048 273s algparse -v2 'ike=aes_gcm-none-sha2;modp2048' (expect SUCCESS) 273s AES_GCM_16-HMAC_SHA2_256-MODP2048 273s algparse -v2 'ike=aes_gcm-none-modp2048' (expect ERROR) 273s ERROR: IKE PRF algorithm 'modp2048' is not recognized 273s algparse -v2 'ike=aes_gcm-none;modp2048' (expect SUCCESS) 273s AES_GCM_16-HMAC_SHA2_512+HMAC_SHA2_256-MODP2048 273s algparse -v2 'ike=aes_gcm-sha1-none-modp2048' (expect ERROR) 273s ERROR: IKE proposal contains unexpected 'modp2048' 273s algparse -v2 'ike=aes_gcm-sha1-none;modp2048' (expect ERROR) 273s ERROR: IKE proposal contains unexpected 'modp2048' 273s algparse -v2 'ike=aes+aes_gcm' (expect ERROR) 273s ERROR: AEAD and non-AEAD IKE encryption algorithm cannot be combined 273s algparse -v2 'ike=,' (expect ERROR) 273s ERROR: IKE encryption algorithm is empty 273s algparse -v2 'ike=aes,' (expect ERROR) 273s ERROR: IKE encryption algorithm is empty 273s algparse -v2 'ike=aes,,aes' (expect ERROR) 273s ERROR: IKE encryption algorithm is empty 273s algparse -v2 'ike=,aes' (expect ERROR) 273s ERROR: IKE encryption algorithm is empty 273s algparse -v2 'ike=-' (expect ERROR) 273s ERROR: IKE encryption algorithm is empty 273s algparse -v2 'ike=+' (expect ERROR) 273s ERROR: IKE encryption algorithm is empty 273s algparse -v2 'ike=;' (expect ERROR) 273s ERROR: IKE encryption algorithm is empty 273s algparse -v2 'ike=aes-' (expect ERROR) 273s ERROR: IKE PRF algorithm is empty 273s algparse -v2 'ike=aes+' (expect ERROR) 273s ERROR: IKE encryption algorithm is empty 273s algparse -v2 'ike=aes;' (expect ERROR) 273s ERROR: IKE DH algorithm is empty 273s algparse -v2 'ike=-aes' (expect ERROR) 273s ERROR: IKE encryption algorithm is empty 273s algparse -v2 'ike=+aes' (expect ERROR) 273s ERROR: IKE encryption algorithm is empty 273s algparse -v2 'ike=;aes' (expect ERROR) 273s ERROR: IKE encryption algorithm is empty 273s algparse -v2 'ike=aes+-' (expect ERROR) 273s ERROR: IKE encryption algorithm is empty 273s algparse -v2 'ike=aes+;' (expect ERROR) 273s ERROR: IKE encryption algorithm is empty 273s algparse -v2 'ike=aes++' (expect ERROR) 273s ERROR: IKE encryption algorithm is empty 273s testing -ta 273s | ike_alg_byname() failed: IKE integrity algorithm 'modp2048' is not recognized 273s | lookup for integrity algorithm 'modp2048' failed 273s | - and - failed, returning earlier PRF error 'IKE PRF algorithm 'modp2048' is not recognized' and discarding INTEG error 'IKE integrity algorithm 'modp2048' is not recognized') 273s | parsing 'aes_gcm;modp2048' for IKE 273s | proposal: 'aes_gcm;modp2048' 273s | token: '' '' "aes_gcm" ';' 273s | token: '' "aes_gcm" ';' "modp2048" '' 273s | token: ';' "modp2048" '' '' 273s | appending IKE encryption algorithm AES_GCM_16[_0] 273s | parsing dh: 273s | appending IKE DH algorithm MODP2048[_0] 273s | token: '' '' '' 273s | appending IKE PRF algorithm HMAC_SHA2_512[_0] 273s | appending IKE PRF algorithm HMAC_SHA2_256[_0] 273s | appending IKE integrity algorithm NONE[_0] 273s | parsing 'aes_gcm-none' for IKE 273s | proposal: 'aes_gcm-none' 273s | token: '' '' "aes_gcm" '-' 273s | token: '' "aes_gcm" '-' "none" '' 273s | token: '-' "none" '' '' 273s | appending IKE encryption algorithm AES_GCM_16[_0] 273s | parsing prf: 273s | ike_alg_byname() failed: IKE PRF algorithm 'none' is not recognized 273s | lookup for PRF algorithm 'none' failed 273s | - failed, saving error 'IKE PRF algorithm 'none' is not recognized' and tossing result 273s | parsing integ: 273s | appending IKE integrity algorithm NONE[_0] 273s | token: '' '' '' 273s | appending IKE PRF algorithm HMAC_SHA2_512[_0] 273s | appending IKE PRF algorithm HMAC_SHA2_256[_0] 273s | appending IKE DH algorithm DH19[_0] 273s | appending IKE DH algorithm DH20[_0] 273s | appending IKE DH algorithm DH21[_0] 273s | appending IKE DH algorithm DH31[_0] 273s | appending IKE DH algorithm MODP4096[_0] 273s | appending IKE DH algorithm MODP3072[_0] 273s | appending IKE DH algorithm MODP2048[_0] 273s | appending IKE DH algorithm MODP8192[_0] 273s | parsing 'aes_gcm-none-sha2' for IKE 273s | proposal: 'aes_gcm-none-sha2' 273s | token: '' '' "aes_gcm" '-' 273s | token: '' "aes_gcm" '-' "none" '-' 273s | token: '-' "none" '-' "sha2" '' 273s | appending IKE encryption algorithm AES_GCM_16[_0] 273s | parsing prf: 273s | ike_alg_byname() failed: IKE PRF algorithm 'none' is not recognized 273s | lookup for PRF algorithm 'none' failed 273s | - failed, saving error 'IKE PRF algorithm 'none' is not recognized' and tossing result 273s | parsing integ: 273s | appending IKE integrity algorithm NONE[_0] 273s | token: '-' "sha2" '' '' 273s | parsing prf: 273s | appending IKE PRF algorithm HMAC_SHA2_256[_0] 273s | token: '' '' '' 273s | appending IKE DH algorithm DH19[_0] 273s | appending IKE DH algorithm DH20[_0] 273s | appending IKE DH algorithm DH21[_0] 273s | appending IKE DH algorithm DH31[_0] 273s | appending IKE DH algorithm MODP4096[_0] 273s | appending IKE DH algorithm MODP3072[_0] 273s | appending IKE DH algorithm MODP2048[_0] 273s | appending IKE DH algorithm MODP8192[_0] 273s | parsing 'aes_gcm-none-sha2-modp2048' for IKE 273s | proposal: 'aes_gcm-none-sha2-modp2048' 273s | token: '' '' "aes_gcm" '-' 273s | token: '' "aes_gcm" '-' "none" '-' 273s | token: '-' "none" '-' "sha2" '-' 273s | appending IKE encryption algorithm AES_GCM_16[_0] 273s | parsing prf: 273s | ike_alg_byname() failed: IKE PRF algorithm 'none' is not recognized 273s | lookup for PRF algorithm 'none' failed 273s | - failed, saving error 'IKE PRF algorithm 'none' is not recognized' and tossing result 273s | parsing integ: 273s | appending IKE integrity algorithm NONE[_0] 273s | token: '-' "sha2" '-' "modp2048" '' 273s | parsing prf: 273s | appending IKE PRF algorithm HMAC_SHA2_256[_0] 273s | token: '-' "modp2048" '' '' 273s | parsing dh: 273s | appending IKE DH algorithm MODP2048[_0] 273s | token: '' '' '' 273s | parsing 'aes_gcm-none-sha2;modp2048' for IKE 273s | proposal: 'aes_gcm-none-sha2;modp2048' 273s | token: '' '' "aes_gcm" '-' 273s | token: '' "aes_gcm" '-' "none" '-' 273s | token: '-' "none" '-' "sha2" ';' 273s | appending IKE encryption algorithm AES_GCM_16[_0] 273s | parsing prf: 273s | ike_alg_byname() failed: IKE PRF algorithm 'none' is not recognized 273s | lookup for PRF algorithm 'none' failed 273s | - failed, saving error 'IKE PRF algorithm 'none' is not recognized' and tossing result 273s | parsing integ: 273s | appending IKE integrity algorithm NONE[_0] 273s | token: '-' "sha2" ';' "modp2048" '' 273s | parsing prf: 273s | appending IKE PRF algorithm HMAC_SHA2_256[_0] 273s | token: ';' "modp2048" '' '' 273s | parsing dh: 273s | appending IKE DH algorithm MODP2048[_0] 273s | token: '' '' '' 273s | parsing 'aes_gcm-none-modp2048' for IKE 273s | proposal: 'aes_gcm-none-modp2048' 273s | token: '' '' "aes_gcm" '-' 273s | token: '' "aes_gcm" '-' "none" '-' 273s | token: '-' "none" '-' "modp2048" '' 273s | appending IKE encryption algorithm AES_GCM_16[_0] 273s | parsing prf: 273s | ike_alg_byname() failed: IKE PRF algorithm 'none' is not recognized 273s | lookup for PRF algorithm 'none' failed 273s | - failed, saving error 'IKE PRF algorithm 'none' is not recognized' and tossing result 273s | parsing integ: 273s | appending IKE integrity algorithm NONE[_0] 273s | token: '-' "modp2048" '' '' 273s | parsing prf: 273s | ike_alg_byname() failed: IKE PRF algorithm 'modp2048' is not recognized 273s | lookup for PRF algorithm 'modp2048' failed 273s | -- failed 'IKE PRF algorithm 'modp2048' is not recognized' 273s | parsing 'aes_gcm-none;modp2048' for IKE 273s | proposal: 'aes_gcm-none;modp2048' 273s | token: '' '' "aes_gcm" '-' 273s | token: '' "aes_gcm" '-' "none" ';' 273s | token: '-' "none" ';' "modp2048" '' 273s | appending IKE encryption algorithm AES_GCM_16[_0] 273s | parsing prf: 273s | ike_alg_byname() failed: IKE PRF algorithm 'none' is not recognized 273s | lookup for PRF algorithm 'none' failed 273s | - failed, saving error 'IKE PRF algorithm 'none' is not recognized' and tossing result 273s | parsing integ: 273s | appending IKE integrity algorithm NONE[_0] 273s | token: ';' "modp2048" '' '' 273s | parsing dh: 273s | appending IKE DH algorithm MODP2048[_0] 273s | token: '' '' '' 273s | appending IKE PRF algorithm HMAC_SHA2_512[_0] 273s | appending IKE PRF algorithm HMAC_SHA2_256[_0] 273s | parsing 'aes_gcm-sha1-none-modp2048' for IKE 273s | proposal: 'aes_gcm-sha1-none-modp2048' 273s | token: '' '' "aes_gcm" '-' 273s | token: '' "aes_gcm" '-' "sha1" '-' 273s | token: '-' "sha1" '-' "none" '-' 273s | appending IKE encryption algorithm AES_GCM_16[_0] 273s | parsing prf: 273s | appending IKE PRF algorithm HMAC_SHA1[_0] 273s | token: '-' "none" '-' "modp2048" '' 273s | - succeeded, advancing tokens 273s | parsing dh: 273s | appending IKE DH algorithm NONE[_0] 273s | token: '-' "modp2048" '' '' 273s | parsing 'aes_gcm-sha1-none;modp2048' for IKE 273s | proposal: 'aes_gcm-sha1-none;modp2048' 273s | token: '' '' "aes_gcm" '-' 273s | token: '' "aes_gcm" '-' "sha1" '-' 273s | token: '-' "sha1" '-' "none" ';' 273s | appending IKE encryption algorithm AES_GCM_16[_0] 273s | parsing prf: 273s | appending IKE PRF algorithm HMAC_SHA1[_0] 273s | token: '-' "none" ';' "modp2048" '' 273s | - succeeded, advancing tokens 273s | parsing dh: 273s | appending IKE DH algorithm NONE[_0] 273s | token: ';' "modp2048" '' '' 273s | parsing 'aes+aes_gcm' for IKE 273s | proposal: 'aes+aes_gcm' 273s | token: '' '' "aes" '+' 273s | token: '' "aes" '+' "aes_gcm" '' 273s | token: '+' "aes_gcm" '' '' 273s | appending IKE encryption algorithm AES_CBC[_0] 273s | token: '' '' '' 273s | appending IKE encryption algorithm AES_GCM_16[_0] 273s | appending IKE PRF algorithm HMAC_SHA2_512[_0] 273s | appending IKE PRF algorithm HMAC_SHA2_256[_0] 273s | appending IKE DH algorithm DH19[_0] 273s | appending IKE DH algorithm DH20[_0] 273s | appending IKE DH algorithm DH21[_0] 273s | appending IKE DH algorithm DH31[_0] 273s | appending IKE DH algorithm MODP4096[_0] 273s | appending IKE DH algorithm MODP3072[_0] 273s | appending IKE DH algorithm MODP2048[_0] 273s | appending IKE DH algorithm MODP8192[_0] 273s | parsing ',' for IKE 273s | proposal: '' 273s | token: '' '' "" '' 273s | token: '' "" '' '' 273s | parsing 'aes,' for IKE 273s | proposal: 'aes' 273s | token: '' '' "aes" '' 273s | token: '' "aes" '' '' 273s | token: '' '' '' 273s | appending IKE encryption algorithm AES_CBC[_0] 273s | appending IKE PRF algorithm HMAC_SHA2_512[_0] 273s | appending IKE PRF algorithm HMAC_SHA2_256[_0] 273s | appending IKE integrity algorithm HMAC_SHA2_512_256[_0] 273s | appending IKE integrity algorithm HMAC_SHA2_256_128[_0] 273s | appending IKE DH algorithm DH19[_0] 273s | appending IKE DH algorithm DH20[_0] 273s | appending IKE DH algorithm DH21[_0] 273s | appending IKE DH algorithm DH31[_0] 273s | appending IKE DH algorithm MODP4096[_0] 273s | appending IKE DH algorithm MODP3072[_0] 273s | appending IKE DH algorithm MODP2048[_0] 273s | appending IKE DH algorithm MODP8192[_0] 273s | proposal: '' 273s | token: '' '' "" '' 273s | token: '' "" '' '' 273s | parsing 'aes,,aes' for IKE 273s | proposal: 'aes' 273s | token: '' '' "aes" '' 273s | token: '' "aes" '' '' 273s | token: '' '' '' 273s | appending IKE encryption algorithm AES_CBC[_0] 273s | appending IKE PRF algorithm HMAC_SHA2_512[_0] 273s | appending IKE PRF algorithm HMAC_SHA2_256[_0] 273s | appending IKE integrity algorithm HMAC_SHA2_512_256[_0] 273s | appending IKE integrity algorithm HMAC_SHA2_256_128[_0] 273s | appending IKE DH algorithm DH19[_0] 273s | appending IKE DH algorithm DH20[_0] 273s | appending IKE DH algorithm DH21[_0] 273s | appending IKE DH algorithm DH31[_0] 273s | appending IKE DH algorithm MODP4096[_0] 273s | appending IKE DH algorithm MODP3072[_0] 273s | appending IKE DH algorithm MODP2048[_0] 273s | appending IKE DH algorithm MODP8192[_0] 273s | proposal: '' 273s | token: '' '' "" '' 273s | token: '' "" '' '' 273s | parsing ',aes' for IKE 273s | proposal: '' 273s | token: '' '' "" '' 273s | token: '' "" '' '' 273s | parsing '-' for IKE 273s | proposal: '-' 273s | token: '' '' "" '-' 273s | token: '' "" '-' "" '' 273s | parsing '+' for IKE 273s | proposal: '+' 273s | token: '' '' "" '+' 273s | token: '' "" '+' "" '' 273s | parsing ';' for IKE 273s | proposal: ';' 273s | token: '' '' "" ';' 273s | token: '' "" ';' "" '' 273s | parsing 'aes-' for IKE 273s | proposal: 'aes-' 273s | token: '' '' "aes" '-' 273s | token: '' "aes" '-' "" '' 273s | token: '-' "" '' '' 273s | appending IKE encryption algorithm AES_CBC[_0] 273s | parsing prf: 273s | - failed, saving error 'IKE PRF algorithm is empty' and tossing result 273s | parsing integ: 273s | - and - failed, returning earlier PRF error 'IKE PRF algorithm is empty' and discarding INTEG error 'IKE integrity algorithm is empty') 273s | parsing 'aes+' for IKE 273s | proposal: 'aes+' 273s | token: '' '' "aes" '+' 273s | token: '' "aes" '+' "" '' 273s | token: '+' "" '' '' 273s | appending IKE encryption algorithm AES_CBC[_0] 273s | parsing 'aes;' for IKE 273s | proposal: 'aes;' 273s | token: '' '' "aes" ';' 273s | token: '' "aes" ';' "" '' 273s | token: ';' "" '' '' 273s | appending IKE encryption algorithm AES_CBC[_0] 273s | parsing dh: 273s | ... failed 'IKE DH algorithm is empty' 273s | parsing '-aes' for IKE 273s | proposal: '-aes' 273s | token: '' '' "" '-' 273s | token: '' "" '-' "aes" '' 273s | parsing '+aes' for IKE 273s | proposal: '+aes' 273s | token: '' '' "" '+' 273s | token: '' "" '+' "aes" '' 273s | parsing ';aes' for IKE 273s | proposal: ';aes' 273s | token: '' '' "" ';' 273s | token: '' "" ';' "aes" '' 273s | parsing 'aes+-' for IKE 273s | proposal: 'aes+-' 273s | token: '' '' "aes" '+' 273s | token: '' "aes" '+' "" '-' 273s | token: '+' "" '-' "" '' 273s | appending IKE encryption algorithm AES_CBC[_0] 273s | parsing 'aes+;' for IKE 273s | proposal: 'aes+;' 273s | token: '' '' "aes" '+' 273s | token: '' "aes" '+' "" ';' 273s | token: '+' "" ';' "" '' 273s | appending IKE encryption algorithm AES_CBC[_0] 273s | parsing 'aes++' for IKE 273s | proposal: 'aes++' 273s | token: '' '' "aes" '+' 273s | token: '' "aes" '+' "" '+' 273s | token: '+' "" '+' "" '' 273s | appending IKE encryption algorithm AES_CBC[_0] 273s ipsec algparse: leak detective found no leaks 273s ipsec algparse: Encryption algorithms: 273s ipsec algparse: AES_CCM_16 {256,192,*128} IKEv1: ESP IKEv2: ESP FIPS aes_ccm, aes_ccm_c 273s ipsec algparse: AES_CCM_12 {256,192,*128} IKEv1: ESP IKEv2: ESP FIPS aes_ccm_b 273s ipsec algparse: AES_CCM_8 {256,192,*128} IKEv1: ESP IKEv2: ESP FIPS aes_ccm_a 273s ipsec algparse: 3DES_CBC [*192] IKEv1: IKE ESP IKEv2: IKE ESP FIPS NSS(CBC) 3des 273s ipsec algparse: CAMELLIA_CTR {256,192,*128} IKEv1: ESP IKEv2: ESP 273s ipsec algparse: CAMELLIA_CBC {256,192,*128} IKEv1: IKE ESP IKEv2: IKE ESP NSS(CBC) camellia 273s ipsec algparse: AES_GCM_16 {256,192,*128} IKEv1: ESP IKEv2: IKE ESP FIPS NSS(AEAD) aes_gcm, aes_gcm_c 273s ipsec algparse: AES_GCM_12 {256,192,*128} IKEv1: ESP IKEv2: IKE ESP FIPS NSS(AEAD) aes_gcm_b 273s ipsec algparse: AES_GCM_8 {256,192,*128} IKEv1: ESP IKEv2: IKE ESP FIPS NSS(AEAD) aes_gcm_a 273s ipsec algparse: AES_CTR {256,192,*128} IKEv1: IKE ESP IKEv2: IKE ESP FIPS NSS(CTR) aesctr 273s ipsec algparse: AES_CBC {256,192,*128} IKEv1: IKE ESP IKEv2: IKE ESP FIPS NSS(CBC) aes 273s ipsec algparse: NULL_AUTH_AES_GMAC {256,192,*128} IKEv1: ESP IKEv2: ESP FIPS aes_gmac 273s ipsec algparse: NULL [] IKEv1: ESP IKEv2: ESP NULL 273s ipsec algparse: CHACHA20_POLY1305 [*256] IKEv1: IKEv2: IKE ESP NSS(AEAD) chacha20poly1305 273s ipsec algparse: Hash algorithms: 273s ipsec algparse: MD5 IKEv1: IKE IKEv2: NSS 273s ipsec algparse: SHA1 IKEv1: IKE IKEv2: IKE FIPS NSS sha 273s ipsec algparse: SHA2_256 IKEv1: IKE IKEv2: IKE FIPS NSS sha2, sha256 273s ipsec algparse: SHA2_384 IKEv1: IKE IKEv2: IKE FIPS NSS sha384 273s ipsec algparse: SHA2_512 IKEv1: IKE IKEv2: IKE FIPS NSS sha512 273s ipsec algparse: IDENTITY IKEv1: IKEv2: FIPS 273s ipsec algparse: PRF algorithms: 273s ipsec algparse: HMAC_MD5 IKEv1: IKE IKEv2: IKE NSS md5 273s ipsec algparse: HMAC_SHA1 IKEv1: IKE IKEv2: IKE FIPS NSS sha, sha1 273s ipsec algparse: HMAC_SHA2_256 IKEv1: IKE IKEv2: IKE FIPS NSS sha2, sha256, sha2_256 273s ipsec algparse: HMAC_SHA2_384 IKEv1: IKE IKEv2: IKE FIPS NSS sha384, sha2_384 273s ipsec algparse: HMAC_SHA2_512 IKEv1: IKE IKEv2: IKE FIPS NSS sha512, sha2_512 273s ipsec algparse: AES_XCBC IKEv1: IKEv2: IKE native(XCBC) aes128_xcbc 273s ipsec algparse: Integrity algorithms: 273s ipsec algparse: HMAC_MD5_96 IKEv1: IKE ESP AH IKEv2: IKE ESP AH NSS md5, hmac_md5 273s ipsec algparse: HMAC_SHA1_96 IKEv1: IKE ESP AH IKEv2: IKE ESP AH FIPS NSS sha, sha1, sha1_96, hmac_sha1 273s ipsec algparse: HMAC_SHA2_512_256 IKEv1: IKE ESP AH IKEv2: IKE ESP AH FIPS NSS sha512, sha2_512, sha2_512_256, hmac_sha2_512 273s ipsec algparse: HMAC_SHA2_384_192 IKEv1: IKE ESP AH IKEv2: IKE ESP AH FIPS NSS sha384, sha2_384, sha2_384_192, hmac_sha2_384 273s ipsec algparse: HMAC_SHA2_256_128 IKEv1: IKE ESP AH IKEv2: IKE ESP AH FIPS NSS sha2, sha256, sha2_256, sha2_256_128, hmac_sha2_256 273s ipsec algparse: HMAC_SHA2_256_TRUNCBUG IKEv1: ESP AH IKEv2: AH 273s ipsec algparse: AES_XCBC_96 IKEv1: ESP AH IKEv2: IKE ESP AH native(XCBC) aes_xcbc, aes128_xcbc, aes128_xcbc_96 273s ipsec algparse: AES_CMAC_96 IKEv1: ESP AH IKEv2: ESP AH FIPS aes_cmac 273s ipsec algparse: NONE IKEv1: ESP IKEv2: IKE ESP FIPS null 273s ipsec algparse: DH algorithms: 273s ipsec algparse: NONE IKEv1: IKEv2: IKE ESP AH FIPS NSS(MODP) null, dh0 273s ipsec algparse: MODP1536 IKEv1: IKE ESP AH IKEv2: IKE ESP AH NSS(MODP) dh5 273s ipsec algparse: MODP2048 IKEv1: IKE ESP AH IKEv2: IKE ESP AH FIPS NSS(MODP) dh14 273s ipsec algparse: MODP3072 IKEv1: IKE ESP AH IKEv2: IKE ESP AH FIPS NSS(MODP) dh15 273s ipsec algparse: MODP4096 IKEv1: IKE ESP AH IKEv2: IKE ESP AH FIPS NSS(MODP) dh16 273s ipsec algparse: MODP6144 IKEv1: IKE ESP AH IKEv2: IKE ESP AH FIPS NSS(MODP) dh17 273s ipsec algparse: MODP8192 IKEv1: IKE ESP AH IKEv2: IKE ESP AH FIPS NSS(MODP) dh18 273s ipsec algparse: DH19 IKEv1: IKE IKEv2: IKE ESP AH FIPS NSS(ECP) ecp_256, ecp256 273s ipsec algparse: DH20 IKEv1: IKE IKEv2: IKE ESP AH FIPS NSS(ECP) ecp_384, ecp384 273s ipsec algparse: DH21 IKEv1: IKE IKEv2: IKE ESP AH FIPS NSS(ECP) ecp_521, ecp521 273s ipsec algparse: DH31 IKEv1: IKE IKEv2: IKE ESP AH NSS(ECP) curve25519 273s ipsec algparse: IPCOMP algorithms: 273s ipsec algparse: DEFLATE IKEv1: ESP AH IKEv2: ESP AH FIPS 273s ipsec algparse: LZS IKEv1: IKEv2: ESP AH FIPS 273s ipsec algparse: LZJH IKEv1: IKEv2: ESP AH FIPS 273s ipsec algparse: testing CAMELLIA_CBC: 273s ipsec algparse: Camellia: 16 bytes with 128-bit key 273s | decode_to_chunk() raw_key: input "0x00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00" 273s | decode_to_chunk() output: 273s | 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................ 273s | CONCATENATE_DATA_AND_BASE: 273s | target: EXTRACT_KEY_FROM_KEY 273s | base: base-key@0x8a273bba290 (16-bytes, AES_KEY_GEN) 273s | params: 16-bytes@0x7fffdd836130 273s | key-offset: 0, key-size: 16 273s | EXTRACT_KEY_FROM_KEY: 273s | target: CAMELLIA_CBC 273s | flags: ENCRYPT+DECRYPT 273s | key_size: 16-bytes 273s | base: base-key@0x8a273bbd2a0 (32-bytes, EXTRACT_KEY_FROM_KEY) 273s | operation: FLAGS_ONLY 273s | params: 8-bytes@0x7fffdd836138 273s | decode_to_mac() IV: : input "0x00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00" 273s | decode_to_mac() output: 273s | 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................ 273s | decode_to_chunk() new IV: : input "0x07 92 3A 39 EB 0A 81 7D 1C 4D 87 BD B8 2D 1F 1C" 273s | decode_to_chunk() output: 273s | 07 92 3a 39 eb 0a 81 7d 1c 4d 87 bd b8 2d 1f 1c ..:9...}.M...-.. 273s | decode_to_chunk() plaintext: : input "0x80 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00" 273s | decode_to_chunk() output: 273s | 80 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................ 273s | decode_to_chunk() ciphertext: : input "0x07 92 3A 39 EB 0A 81 7D 1C 4D 87 BD B8 2D 1F 1C" 273s | decode_to_chunk() output: 273s | 07 92 3a 39 eb 0a 81 7d 1c 4d 87 bd b8 2d 1f 1c ..:9...}.M...-.. 273s | NSS ike_alg_nss_cbc: CAMELLIA_CBC - enter (nil) 273s | using IKEv1 IV 273s | NSS ike_alg_nss_cbc: CAMELLIA_CBC - exit 273s | verify_bytes() Camellia: 16 bytes with 128-bit key: encrypt: ok 273s | verify_bytes() Camellia: 16 bytes with 128-bit key: updated CBC IV: ok 273s | decode_to_mac() IV: : input "0x00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00" 273s | decode_to_mac() output: 273s | 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................ 273s | decode_to_chunk() new IV: : input "0x07 92 3A 39 EB 0A 81 7D 1C 4D 87 BD B8 2D 1F 1C" 273s | decode_to_chunk() output: 273s | 07 92 3a 39 eb 0a 81 7d 1c 4d 87 bd b8 2d 1f 1c ..:9...}.M...-.. 273s | decode_to_chunk() ciphertext: : input "0x07 92 3A 39 EB 0A 81 7D 1C 4D 87 BD B8 2D 1F 1C" 273s | decode_to_chunk() output: 273s | 07 92 3a 39 eb 0a 81 7d 1c 4d 87 bd b8 2d 1f 1c ..:9...}.M...-.. 273s | decode_to_chunk() plaintext: : input "0x80 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00" 273s | decode_to_chunk() output: 273s | 80 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................ 273s | NSS ike_alg_nss_cbc: CAMELLIA_CBC - enter (nil) 273s | using IKEv1 IV 273s | NSS ike_alg_nss_cbc: CAMELLIA_CBC - exit 273s | verify_bytes() Camellia: 16 bytes with 128-bit key: decrypt: ok 273s | verify_bytes() Camellia: 16 bytes with 128-bit key: updated CBC IV: ok 273s ipsec algparse: Camellia: 16 bytes with 128-bit key 273s | decode_to_chunk() raw_key: input "0x00 11 22 33 44 55 66 77 88 99 AA BB CC DD EE FF" 273s | decode_to_chunk() output: 273s | 00 11 22 33 44 55 66 77 88 99 aa bb cc dd ee ff .."3DUfw........ 273s | CONCATENATE_DATA_AND_BASE: 273s | target: EXTRACT_KEY_FROM_KEY 273s | base: base-key@0x8a273bba290 (16-bytes, AES_KEY_GEN) 273s | params: 16-bytes@0x7fffdd836130 273s | key-offset: 0, key-size: 16 273s | EXTRACT_KEY_FROM_KEY: 273s | target: CAMELLIA_CBC 273s | flags: ENCRYPT+DECRYPT 273s | key_size: 16-bytes 273s | base: base-key@0x8a273bbd2a0 (32-bytes, EXTRACT_KEY_FROM_KEY) 273s | operation: FLAGS_ONLY 273s | params: 8-bytes@0x7fffdd836138 273s | decode_to_mac() IV: : input "0x00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00" 273s | decode_to_mac() output: 273s | 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................ 273s | decode_to_chunk() new IV: : input "0x14 4D 2B 0F 50 0C 27 B7 EC 2C D1 2D 91 59 6F 37" 273s | decode_to_chunk() output: 273s | 14 4d 2b 0f 50 0c 27 b7 ec 2c d1 2d 91 59 6f 37 .M+.P.'..,.-.Yo7 273s | decode_to_chunk() plaintext: : input "0x00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 01 " 273s | decode_to_chunk() output: 273s | 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 01 ................ 273s | decode_to_chunk() ciphertext: : input "0x14 4D 2B 0F 50 0C 27 B7 EC 2C D1 2D 91 59 6F 37" 273s | decode_to_chunk() output: 273s | 14 4d 2b 0f 50 0c 27 b7 ec 2c d1 2d 91 59 6f 37 .M+.P.'..,.-.Yo7 273s | NSS ike_alg_nss_cbc: CAMELLIA_CBC - enter (nil) 273s | using IKEv1 IV 273s | NSS ike_alg_nss_cbc: CAMELLIA_CBC - exit 273s | verify_bytes() Camellia: 16 bytes with 128-bit key: encrypt: ok 273s | verify_bytes() Camellia: 16 bytes with 128-bit key: updated CBC IV: ok 273s | decode_to_mac() IV: : input "0x00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00" 273s | decode_to_mac() output: 273s | 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................ 273s | decode_to_chunk() new IV: : input "0x14 4D 2B 0F 50 0C 27 B7 EC 2C D1 2D 91 59 6F 37" 273s | decode_to_chunk() output: 273s | 14 4d 2b 0f 50 0c 27 b7 ec 2c d1 2d 91 59 6f 37 .M+.P.'..,.-.Yo7 273s | decode_to_chunk() ciphertext: : input "0x14 4D 2B 0F 50 0C 27 B7 EC 2C D1 2D 91 59 6F 37" 273s | decode_to_chunk() output: 273s | 14 4d 2b 0f 50 0c 27 b7 ec 2c d1 2d 91 59 6f 37 .M+.P.'..,.-.Yo7 273s | decode_to_chunk() plaintext: : input "0x00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 01 " 273s | decode_to_chunk() output: 273s | 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 01 ................ 273s | NSS ike_alg_nss_cbc: CAMELLIA_CBC - enter (nil) 273s | using IKEv1 IV 273s | NSS ike_alg_nss_cbc: CAMELLIA_CBC - exit 273s | verify_bytes() Camellia: 16 bytes with 128-bit key: decrypt: ok 273s | verify_bytes() Camellia: 16 bytes with 128-bit key: updated CBC IV: ok 273s ipsec algparse: Camellia: 16 bytes with 256-bit key 273s | decode_to_chunk() raw_key: input "0x00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00" 273s | decode_to_chunk() output: 273s | 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................ 273s | 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................ 273s | CONCATENATE_DATA_AND_BASE: 273s | target: EXTRACT_KEY_FROM_KEY 273s | base: base-key@0x8a273bba290 (16-bytes, AES_KEY_GEN) 273s | params: 16-bytes@0x7fffdd836130 273s | key-offset: 0, key-size: 32 273s | EXTRACT_KEY_FROM_KEY: 273s | target: CAMELLIA_CBC 273s | flags: ENCRYPT+DECRYPT 273s | key_size: 32-bytes 273s | base: base-key@0x8a273bbd2a0 (48-bytes, EXTRACT_KEY_FROM_KEY) 273s | operation: FLAGS_ONLY 273s | params: 8-bytes@0x7fffdd836138 273s | decode_to_mac() IV: : input "0x00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00" 273s | decode_to_mac() output: 273s | 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................ 273s | decode_to_chunk() new IV: : input "0xB0 C6 B8 8A EA 51 8A B0 9E 84 72 48 E9 1B 1B 9D" 273s | decode_to_chunk() output: 273s | b0 c6 b8 8a ea 51 8a b0 9e 84 72 48 e9 1b 1b 9d .....Q....rH.... 273s | decode_to_chunk() plaintext: : input "0x80 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00" 273s | decode_to_chunk() output: 273s | 80 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................ 273s | decode_to_chunk() ciphertext: : input "0xB0 C6 B8 8A EA 51 8A B0 9E 84 72 48 E9 1B 1B 9D" 273s | decode_to_chunk() output: 273s | b0 c6 b8 8a ea 51 8a b0 9e 84 72 48 e9 1b 1b 9d .....Q....rH.... 273s | NSS ike_alg_nss_cbc: CAMELLIA_CBC - enter (nil) 273s | using IKEv1 IV 273s | NSS ike_alg_nss_cbc: CAMELLIA_CBC - exit 273s | verify_bytes() Camellia: 16 bytes with 256-bit key: encrypt: ok 273s | verify_bytes() Camellia: 16 bytes with 256-bit key: updated CBC IV: ok 273s | decode_to_mac() IV: : input "0x00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00" 273s | decode_to_mac() output: 273s | 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................ 273s | decode_to_chunk() new IV: : input "0xB0 C6 B8 8A EA 51 8A B0 9E 84 72 48 E9 1B 1B 9D" 273s | decode_to_chunk() output: 273s | b0 c6 b8 8a ea 51 8a b0 9e 84 72 48 e9 1b 1b 9d .....Q....rH.... 273s | decode_to_chunk() ciphertext: : input "0xB0 C6 B8 8A EA 51 8A B0 9E 84 72 48 E9 1B 1B 9D" 273s | decode_to_chunk() output: 273s | b0 c6 b8 8a ea 51 8a b0 9e 84 72 48 e9 1b 1b 9d .....Q....rH.... 273s | decode_to_chunk() plaintext: : input "0x80 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00" 273s | decode_to_chunk() output: 273s | 80 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................ 273s | NSS ike_alg_nss_cbc: CAMELLIA_CBC - enter (nil) 273s | using IKEv1 IV 273s | NSS ike_alg_nss_cbc: CAMELLIA_CBC - exit 273s | verify_bytes() Camellia: 16 bytes with 256-bit key: decrypt: ok 273s | verify_bytes() Camellia: 16 bytes with 256-bit key: updated CBC IV: ok 273s ipsec algparse: Camellia: 16 bytes with 256-bit key 273s | decode_to_chunk() raw_key: input "0x00 11 22 33 44 55 66 77 88 99 AA BB CC DD EE FF FF EE DD CC BB AA 99 88 77 66 55 44 33 22 11 00" 273s | decode_to_chunk() output: 273s | 00 11 22 33 44 55 66 77 88 99 aa bb cc dd ee ff .."3DUfw........ 273s | ff ee dd cc bb aa 99 88 77 66 55 44 33 22 11 00 ........wfUD3".. 273s | CONCATENATE_DATA_AND_BASE: 273s | target: EXTRACT_KEY_FROM_KEY 273s | base: base-key@0x8a273bba290 (16-bytes, AES_KEY_GEN) 273s | params: 16-bytes@0x7fffdd836130 273s | key-offset: 0, key-size: 32 273s | EXTRACT_KEY_FROM_KEY: 273s | target: CAMELLIA_CBC 273s | flags: ENCRYPT+DECRYPT 273s | key_size: 32-bytes 273s | base: base-key@0x8a273bbd2a0 (48-bytes, EXTRACT_KEY_FROM_KEY) 273s | operation: FLAGS_ONLY 273s | params: 8-bytes@0x7fffdd836138 273s | decode_to_mac() IV: : input "0x00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00" 273s | decode_to_mac() output: 273s | 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................ 273s | decode_to_chunk() new IV: : input "0xCC 39 FF EE 18 56 D3 EB 61 02 5E 93 21 9B 65 23 " 273s | decode_to_chunk() output: 273s | cc 39 ff ee 18 56 d3 eb 61 02 5e 93 21 9b 65 23 .9...V..a.^.!.e# 273s | decode_to_chunk() plaintext: : input "0x00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 01" 273s | decode_to_chunk() output: 273s | 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 01 ................ 273s | decode_to_chunk() ciphertext: : input "0xCC 39 FF EE 18 56 D3 EB 61 02 5E 93 21 9B 65 23 " 273s | decode_to_chunk() output: 273s | cc 39 ff ee 18 56 d3 eb 61 02 5e 93 21 9b 65 23 .9...V..a.^.!.e# 273s | NSS ike_alg_nss_cbc: CAMELLIA_CBC - enter (nil) 273s | using IKEv1 IV 273s | NSS ike_alg_nss_cbc: CAMELLIA_CBC - exit 273s | verify_bytes() Camellia: 16 bytes with 256-bit key: encrypt: ok 273s | verify_bytes() Camellia: 16 bytes with 256-bit key: updated CBC IV: ok 273s | decode_to_mac() IV: : input "0x00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00" 273s | decode_to_mac() output: 273s | 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................ 273s | decode_to_chunk() new IV: : input "0xCC 39 FF EE 18 56 D3 EB 61 02 5E 93 21 9B 65 23 " 273s | decode_to_chunk() output: 273s | cc 39 ff ee 18 56 d3 eb 61 02 5e 93 21 9b 65 23 .9...V..a.^.!.e# 273s | decode_to_chunk() ciphertext: : input "0xCC 39 FF EE 18 56 D3 EB 61 02 5E 93 21 9B 65 23 " 273s | decode_to_chunk() output: 273s | cc 39 ff ee 18 56 d3 eb 61 02 5e 93 21 9b 65 23 .9...V..a.^.!.e# 273s | decode_to_chunk() plaintext: : input "0x00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 01" 273s | decode_to_chunk() output: 273s | 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 01 ................ 273s | NSS ike_alg_nss_cbc: CAMELLIA_CBC - enter (nil) 273s | using IKEv1 IV 273s | NSS ike_alg_nss_cbc: CAMELLIA_CBC - exit 273s | verify_bytes() Camellia: 16 bytes with 256-bit key: decrypt: ok 273s | verify_bytes() Camellia: 16 bytes with 256-bit key: updated CBC IV: ok 273s ipsec algparse: testing AES_GCM_16: 273s ipsec algparse: empty string 273s | decode_to_chunk() raw_key: input "0xcf063a34d4a9a76c2c86787d3f96db71" 273s | decode_to_chunk() output: 273s | cf 06 3a 34 d4 a9 a7 6c 2c 86 78 7d 3f 96 db 71 ..:4...l,.x}?..q 273s | CONCATENATE_DATA_AND_BASE: 273s | target: EXTRACT_KEY_FROM_KEY 273s | base: base-key@0x8a273bba290 (16-bytes, AES_KEY_GEN) 273s | params: 16-bytes@0x7fffdd836000 273s | key-offset: 0, key-size: 16 273s | EXTRACT_KEY_FROM_KEY: 273s | target: AES_GCM 273s | flags: ENCRYPT+DECRYPT 273s | key_size: 16-bytes 273s | base: base-key@0x8a273bbd2a0 (32-bytes, EXTRACT_KEY_FROM_KEY) 273s | operation: FLAGS_ONLY 273s | params: 8-bytes@0x7fffdd836008 273s | decode_to_chunk() salted IV: input "0x113b9785971864c83b01c787" 273s | decode_to_chunk() output: 273s | 11 3b 97 85 97 18 64 c8 3b 01 c7 87 .;....d.;... 273s | decode_to_chunk() AAD: input "" 273s | decode_to_chunk() output: 273s | 273s | decode_to_chunk() plaintext: input "" 273s | decode_to_chunk() output: 273s | 273s | decode_to_chunk() ciphertext: input "" 273s | decode_to_chunk() output: 273s | 273s | decode_to_chunk() tag: input "0x72ac8493e3a5228b5d130a69d2510e42" 273s | decode_to_chunk() output: 273s | 72 ac 84 93 e3 a5 22 8b 5d 13 0a 69 d2 51 0e 42 r.....".]..i.Q.B 273s | test_gcm_vector() DECRYPT: aad-size=0 salt-size=4 wire-IV-size=8 text-size=0 tag-size=16 text+tag in: 273s | 72 ac 84 93 e3 a5 22 8b 5d 13 0a 69 d2 51 0e 42 r.....".]..i.Q.B 273s | verify_bytes() empty string: output ciphertext: ok 273s | verify_bytes() empty string: TAG: ok 273s | test_gcm_vector() text+tag out: 273s | 72 ac 84 93 e3 a5 22 8b 5d 13 0a 69 d2 51 0e 42 r.....".]..i.Q.B 273s | test_gcm_vector() ENCRYPT: aad-size=0 salt-size=4 wire-IV-size=8 text-size=0 tag-size=16 text+tag in: 273s | 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................ 273s | verify_bytes() empty string: output ciphertext: ok 273s | verify_bytes() empty string: TAG: ok 273s | test_gcm_vector() text+tag out: 273s | 72 ac 84 93 e3 a5 22 8b 5d 13 0a 69 d2 51 0e 42 r.....".]..i.Q.B 273s ipsec algparse: one block 273s | decode_to_chunk() raw_key: input "0xe98b72a9881a84ca6b76e0f43e68647a" 273s | decode_to_chunk() output: 273s | e9 8b 72 a9 88 1a 84 ca 6b 76 e0 f4 3e 68 64 7a ..r.....kv..>hdz 273s | CONCATENATE_DATA_AND_BASE: 273s | target: EXTRACT_KEY_FROM_KEY 273s | base: base-key@0x8a273bba290 (16-bytes, AES_KEY_GEN) 273s | params: 16-bytes@0x7fffdd836000 273s | key-offset: 0, key-size: 16 273s | EXTRACT_KEY_FROM_KEY: 273s | target: AES_GCM 273s | flags: ENCRYPT+DECRYPT 273s | key_size: 16-bytes 273s | base: base-key@0x8a273bbd2a0 (32-bytes, EXTRACT_KEY_FROM_KEY) 273s | operation: FLAGS_ONLY 273s | params: 8-bytes@0x7fffdd836008 273s | decode_to_chunk() salted IV: input "0x8b23299fde174053f3d652ba" 273s | decode_to_chunk() output: 273s | 8b 23 29 9f de 17 40 53 f3 d6 52 ba .#)...@S..R. 273s | decode_to_chunk() AAD: input "" 273s | decode_to_chunk() output: 273s | 273s | decode_to_chunk() plaintext: input "0x28286a321293253c3e0aa2704a278032" 273s | decode_to_chunk() output: 273s | 28 28 6a 32 12 93 25 3c 3e 0a a2 70 4a 27 80 32 ((j2..%<>..pJ'.2 273s | decode_to_chunk() ciphertext: input "0x5a3c1cf1985dbb8bed818036fdd5ab42" 273s | decode_to_chunk() output: 273s | 5a 3c 1c f1 98 5d bb 8b ed 81 80 36 fd d5 ab 42 Z<...].....6...B 273s | decode_to_chunk() tag: input "0x23c7ab0f952b7091cd324835043b5eb5" 273s | decode_to_chunk() output: 273s | 23 c7 ab 0f 95 2b 70 91 cd 32 48 35 04 3b 5e b5 #....+p..2H5.;^. 273s | test_gcm_vector() DECRYPT: aad-size=0 salt-size=4 wire-IV-size=8 text-size=16 tag-size=16 text+tag in: 273s | 5a 3c 1c f1 98 5d bb 8b ed 81 80 36 fd d5 ab 42 Z<...].....6...B 273s | 23 c7 ab 0f 95 2b 70 91 cd 32 48 35 04 3b 5e b5 #....+p..2H5.;^. 273s | verify_bytes() one block: output ciphertext: ok 273s | verify_bytes() one block: TAG: ok 273s | test_gcm_vector() text+tag out: 273s | 28 28 6a 32 12 93 25 3c 3e 0a a2 70 4a 27 80 32 ((j2..%<>..pJ'.2 273s | 23 c7 ab 0f 95 2b 70 91 cd 32 48 35 04 3b 5e b5 #....+p..2H5.;^. 273s | test_gcm_vector() ENCRYPT: aad-size=0 salt-size=4 wire-IV-size=8 text-size=16 tag-size=16 text+tag in: 273s | 28 28 6a 32 12 93 25 3c 3e 0a a2 70 4a 27 80 32 ((j2..%<>..pJ'.2 273s | 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................ 273s | verify_bytes() one block: output ciphertext: ok 273s | verify_bytes() one block: TAG: ok 273s | test_gcm_vector() text+tag out: 273s | 5a 3c 1c f1 98 5d bb 8b ed 81 80 36 fd d5 ab 42 Z<...].....6...B 273s | 23 c7 ab 0f 95 2b 70 91 cd 32 48 35 04 3b 5e b5 #....+p..2H5.;^. 273s ipsec algparse: two blocks 273s | decode_to_chunk() raw_key: input "0xbfd414a6212958a607a0f5d3ab48471d" 273s | decode_to_chunk() output: 273s | bf d4 14 a6 21 29 58 a6 07 a0 f5 d3 ab 48 47 1d ....!)X......HG. 273s | CONCATENATE_DATA_AND_BASE: 273s | target: EXTRACT_KEY_FROM_KEY 273s | base: base-key@0x8a273bba290 (16-bytes, AES_KEY_GEN) 273s | params: 16-bytes@0x7fffdd836000 273s | key-offset: 0, key-size: 16 273s | EXTRACT_KEY_FROM_KEY: 273s | target: AES_GCM 273s | flags: ENCRYPT+DECRYPT 273s | key_size: 16-bytes 273s | base: base-key@0x8a273bbd2a0 (32-bytes, EXTRACT_KEY_FROM_KEY) 273s | operation: FLAGS_ONLY 273s | params: 8-bytes@0x7fffdd836008 273s | decode_to_chunk() salted IV: input "0x86d8ea0ab8e40dcc481cd0e2" 273s | decode_to_chunk() output: 273s | 86 d8 ea 0a b8 e4 0d cc 48 1c d0 e2 ........H... 273s | decode_to_chunk() AAD: input "" 273s | decode_to_chunk() output: 273s | 273s | decode_to_chunk() plaintext: input "0xa6b76a066e63392c9443e60272ceaeb9d25c991b0f2e55e2804e168c05ea591a" 273s | decode_to_chunk() output: 273s | a6 b7 6a 06 6e 63 39 2c 94 43 e6 02 72 ce ae b9 ..j.nc9,.C..r... 273s | d2 5c 99 1b 0f 2e 55 e2 80 4e 16 8c 05 ea 59 1a .\....U..N....Y. 273s | decode_to_chunk() ciphertext: input "0x62171db33193292d930bf6647347652c1ef33316d7feca99d54f1db4fcf513f8" 273s | decode_to_chunk() output: 273s | 62 17 1d b3 31 93 29 2d 93 0b f6 64 73 47 65 2c b...1.)-...dsGe, 273s | 1e f3 33 16 d7 fe ca 99 d5 4f 1d b4 fc f5 13 f8 ..3......O...... 273s | decode_to_chunk() tag: input "0xc28280aa5c6c7a8bd366f28c1cfd1f6e" 273s | decode_to_chunk() output: 273s | c2 82 80 aa 5c 6c 7a 8b d3 66 f2 8c 1c fd 1f 6e ....\lz..f.....n 273s | test_gcm_vector() DECRYPT: aad-size=0 salt-size=4 wire-IV-size=8 text-size=32 tag-size=16 text+tag in: 273s | 62 17 1d b3 31 93 29 2d 93 0b f6 64 73 47 65 2c b...1.)-...dsGe, 273s | 1e f3 33 16 d7 fe ca 99 d5 4f 1d b4 fc f5 13 f8 ..3......O...... 273s | c2 82 80 aa 5c 6c 7a 8b d3 66 f2 8c 1c fd 1f 6e ....\lz..f.....n 273s | verify_bytes() two blocks: output ciphertext: ok 273s | verify_bytes() two blocks: TAG: ok 273s | test_gcm_vector() text+tag out: 273s | a6 b7 6a 06 6e 63 39 2c 94 43 e6 02 72 ce ae b9 ..j.nc9,.C..r... 273s | d2 5c 99 1b 0f 2e 55 e2 80 4e 16 8c 05 ea 59 1a .\....U..N....Y. 273s | c2 82 80 aa 5c 6c 7a 8b d3 66 f2 8c 1c fd 1f 6e ....\lz..f.....n 273s | test_gcm_vector() ENCRYPT: aad-size=0 salt-size=4 wire-IV-size=8 text-size=32 tag-size=16 text+tag in: 273s | a6 b7 6a 06 6e 63 39 2c 94 43 e6 02 72 ce ae b9 ..j.nc9,.C..r... 273s | d2 5c 99 1b 0f 2e 55 e2 80 4e 16 8c 05 ea 59 1a .\....U..N....Y. 273s | 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................ 273s | verify_bytes() two blocks: output ciphertext: ok 273s | verify_bytes() two blocks: TAG: ok 273s | test_gcm_vector() text+tag out: 273s | 62 17 1d b3 31 93 29 2d 93 0b f6 64 73 47 65 2c b...1.)-...dsGe, 273s | 1e f3 33 16 d7 fe ca 99 d5 4f 1d b4 fc f5 13 f8 ..3......O...... 273s | c2 82 80 aa 5c 6c 7a 8b d3 66 f2 8c 1c fd 1f 6e ....\lz..f.....n 273s ipsec algparse: two blocks with associated data 273s | decode_to_chunk() raw_key: input "0x95bcde70c094f04e3dd8259cafd88ce8" 273s | decode_to_chunk() output: 273s | 95 bc de 70 c0 94 f0 4e 3d d8 25 9c af d8 8c e8 ...p...N=.%..... 273s | CONCATENATE_DATA_AND_BASE: 273s | target: EXTRACT_KEY_FROM_KEY 273s | base: base-key@0x8a273bba290 (16-bytes, AES_KEY_GEN) 273s | params: 16-bytes@0x7fffdd836000 273s | key-offset: 0, key-size: 16 273s | EXTRACT_KEY_FROM_KEY: 273s | target: AES_GCM 273s | flags: ENCRYPT+DECRYPT 273s | key_size: 16-bytes 273s | base: base-key@0x8a273bbd2a0 (32-bytes, EXTRACT_KEY_FROM_KEY) 273s | operation: FLAGS_ONLY 273s | params: 8-bytes@0x7fffdd836008 273s | decode_to_chunk() salted IV: input "0x12cf097ad22380432ff40a5c" 273s | decode_to_chunk() output: 273s | 12 cf 09 7a d2 23 80 43 2f f4 0a 5c ...z.#.C/..\ 273s | decode_to_chunk() AAD: input "0xc783a0cca10a8d9fb8d27d69659463f2" 273s | decode_to_chunk() output: 273s | c7 83 a0 cc a1 0a 8d 9f b8 d2 7d 69 65 94 63 f2 ..........}ie.c. 273s | decode_to_chunk() plaintext: input "0x32f51e837a9748838925066d69e87180f34a6437e6b396e5643b34cb2ee4f7b1" 273s | decode_to_chunk() output: 273s | 32 f5 1e 83 7a 97 48 83 89 25 06 6d 69 e8 71 80 2...z.H..%.mi.q. 273s | f3 4a 64 37 e6 b3 96 e5 64 3b 34 cb 2e e4 f7 b1 .Jd7....d;4..... 273s | decode_to_chunk() ciphertext: input "0x8a023ba477f5b809bddcda8f55e09064d6d88aaec99c1e141212ea5b08503660" 273s | decode_to_chunk() output: 273s | 8a 02 3b a4 77 f5 b8 09 bd dc da 8f 55 e0 90 64 ..;.w.......U..d 273s | d6 d8 8a ae c9 9c 1e 14 12 12 ea 5b 08 50 36 60 ...........[.P6` 273s | decode_to_chunk() tag: input "0x562f500dae635d60a769b466e15acd1e" 273s | decode_to_chunk() output: 273s | 56 2f 50 0d ae 63 5d 60 a7 69 b4 66 e1 5a cd 1e V/P..c]`.i.f.Z.. 273s | test_gcm_vector() DECRYPT: aad-size=16 salt-size=4 wire-IV-size=8 text-size=32 tag-size=16 text+tag in: 273s | 8a 02 3b a4 77 f5 b8 09 bd dc da 8f 55 e0 90 64 ..;.w.......U..d 273s | d6 d8 8a ae c9 9c 1e 14 12 12 ea 5b 08 50 36 60 ...........[.P6` 273s | 56 2f 50 0d ae 63 5d 60 a7 69 b4 66 e1 5a cd 1e V/P..c]`.i.f.Z.. 273s | verify_bytes() two blocks with associated data: output ciphertext: ok 273s | verify_bytes() two blocks with associated data: TAG: ok 273s | test_gcm_vector() text+tag out: 273s | 32 f5 1e 83 7a 97 48 83 89 25 06 6d 69 e8 71 80 2...z.H..%.mi.q. 273s | f3 4a 64 37 e6 b3 96 e5 64 3b 34 cb 2e e4 f7 b1 .Jd7....d;4..... 273s | 56 2f 50 0d ae 63 5d 60 a7 69 b4 66 e1 5a cd 1e V/P..c]`.i.f.Z.. 273s | test_gcm_vector() ENCRYPT: aad-size=16 salt-size=4 wire-IV-size=8 text-size=32 tag-size=16 text+tag in: 273s | 32 f5 1e 83 7a 97 48 83 89 25 06 6d 69 e8 71 80 2...z.H..%.mi.q. 273s | f3 4a 64 37 e6 b3 96 e5 64 3b 34 cb 2e e4 f7 b1 .Jd7....d;4..... 273s | 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................ 273s | verify_bytes() two blocks with associated data: output ciphertext: ok 273s | verify_bytes() two blocks with associated data: TAG: ok 273s | test_gcm_vector() text+tag out: 273s | 8a 02 3b a4 77 f5 b8 09 bd dc da 8f 55 e0 90 64 ..;.w.......U..d 273s | d6 d8 8a ae c9 9c 1e 14 12 12 ea 5b 08 50 36 60 ...........[.P6` 273s | 56 2f 50 0d ae 63 5d 60 a7 69 b4 66 e1 5a cd 1e V/P..c]`.i.f.Z.. 273s ipsec algparse: testing AES_CTR: 273s ipsec algparse: Encrypting 16 octets using AES-CTR with 128-bit key 273s | decode_to_chunk() raw_key: input "0x AE 68 52 F8 12 10 67 CC 4B F7 A5 76 55 77 F3 9E" 273s | decode_to_chunk() output: 273s | ae 68 52 f8 12 10 67 cc 4b f7 a5 76 55 77 f3 9e .hR...g.K..vUw.. 273s | CONCATENATE_DATA_AND_BASE: 273s | target: EXTRACT_KEY_FROM_KEY 273s | base: base-key@0x8a273bba290 (16-bytes, AES_KEY_GEN) 273s | params: 16-bytes@0x7fffdd836120 273s | key-offset: 0, key-size: 16 273s | EXTRACT_KEY_FROM_KEY: 273s | target: AES_CTR 273s | flags: ENCRYPT+DECRYPT 273s | key_size: 16-bytes 273s | base: base-key@0x8a273bbd2a0 (32-bytes, EXTRACT_KEY_FROM_KEY) 273s | operation: FLAGS_ONLY 273s | params: 8-bytes@0x7fffdd836128 273s | decode_to_mac() input counter-block: : input "0x 00 00 00 30 00 00 00 00 00 00 00 00 00 00 00 01" 273s | decode_to_mac() output: 273s | 00 00 00 30 00 00 00 00 00 00 00 00 00 00 00 01 ...0............ 273s | decode_to_chunk() Plaintext: input "0x 53 69 6E 67 6C 65 20 62 6C 6F 63 6B 20 6D 73 67" 273s | decode_to_chunk() output: 273s | 53 69 6e 67 6c 65 20 62 6c 6f 63 6b 20 6d 73 67 Single block msg 273s | decode_to_chunk() Ciphertext: input "0x E4 09 5D 4F B7 A7 B3 79 2D 61 75 A3 26 13 11 B8" 273s | decode_to_chunk() output: 273s | e4 09 5d 4f b7 a7 b3 79 2d 61 75 a3 26 13 11 b8 ..]O...y-au.&... 273s | decode_to_chunk() expected counter-block: : input "0x 00 00 00 30 00 00 00 00 00 00 00 00 00 00 00 02" 273s | decode_to_chunk() output: 273s | 00 00 00 30 00 00 00 00 00 00 00 00 00 00 00 02 ...0............ 273s | cipher_op_ctr_nss() enter AES_CTR 0x8a273bbdc00 use IKEv1 IV wire_iv 0 count 0 273s | ctr_param: count 32 iv 00000030000000000000000000000001 273s | cipher_op_ctr_nss() counter-block updated from 0x1 to 0x2 for 16 bytes 273s | do_aes_ctr: exit 273s | cipher_op_context_destroy_ctr_nss() 273s | verify_bytes() Encrypting 16 octets using AES-CTR with 128-bit key: encrypt: ok 273s | verify_bytes() Encrypting 16 octets using AES-CTR with 128-bit key: counter-block: ok 273s | decode_to_mac() input counter-block: : input "0x 00 00 00 30 00 00 00 00 00 00 00 00 00 00 00 01" 273s | decode_to_mac() output: 273s | 00 00 00 30 00 00 00 00 00 00 00 00 00 00 00 01 ...0............ 273s | decode_to_chunk() Ciphertext: input "0x E4 09 5D 4F B7 A7 B3 79 2D 61 75 A3 26 13 11 B8" 273s | decode_to_chunk() output: 273s | e4 09 5d 4f b7 a7 b3 79 2d 61 75 a3 26 13 11 b8 ..]O...y-au.&... 273s | decode_to_chunk() Plaintext: input "0x 53 69 6E 67 6C 65 20 62 6C 6F 63 6B 20 6D 73 67" 273s | decode_to_chunk() output: 273s | 53 69 6e 67 6c 65 20 62 6c 6f 63 6b 20 6d 73 67 Single block msg 273s | decode_to_chunk() expected counter-block: : input "0x 00 00 00 30 00 00 00 00 00 00 00 00 00 00 00 02" 273s | decode_to_chunk() output: 273s | 00 00 00 30 00 00 00 00 00 00 00 00 00 00 00 02 ...0............ 273s | cipher_op_ctr_nss() enter AES_CTR 0x8a273bbdc00 use IKEv1 IV wire_iv 0 count 0 273s | ctr_param: count 32 iv 00000030000000000000000000000001 273s | cipher_op_ctr_nss() counter-block updated from 0x1 to 0x2 for 16 bytes 273s | do_aes_ctr: exit 273s | cipher_op_context_destroy_ctr_nss() 273s | verify_bytes() Encrypting 16 octets using AES-CTR with 128-bit key: decrypt: ok 273s | verify_bytes() Encrypting 16 octets using AES-CTR with 128-bit key: counter-block: ok 273s ipsec algparse: Encrypting 32 octets using AES-CTR with 128-bit key 273s | decode_to_chunk() raw_key: input "0x 7E 24 06 78 17 FA E0 D7 43 D6 CE 1F 32 53 91 63" 273s | decode_to_chunk() output: 273s | 7e 24 06 78 17 fa e0 d7 43 d6 ce 1f 32 53 91 63 ~$.x....C...2S.c 273s | CONCATENATE_DATA_AND_BASE: 273s | target: EXTRACT_KEY_FROM_KEY 273s | base: base-key@0x8a273bba290 (16-bytes, AES_KEY_GEN) 273s | params: 16-bytes@0x7fffdd836120 273s | key-offset: 0, key-size: 16 273s | EXTRACT_KEY_FROM_KEY: 273s | target: AES_CTR 273s | flags: ENCRYPT+DECRYPT 273s | key_size: 16-bytes 273s | base: base-key@0x8a273bbd2a0 (32-bytes, EXTRACT_KEY_FROM_KEY) 273s | operation: FLAGS_ONLY 273s | params: 8-bytes@0x7fffdd836128 273s | decode_to_mac() input counter-block: : input "0x 00 6C B6 DB C0 54 3B 59 DA 48 D9 0B 00 00 00 01" 273s | decode_to_mac() output: 273s | 00 6c b6 db c0 54 3b 59 da 48 d9 0b 00 00 00 01 .l...T;Y.H...... 273s | decode_to_chunk() Plaintext: input "0x00 01 02 03 04 05 06 07 08 09 0A 0B 0C 0D 0E 0F10 11 12 13 14 15 16 17 18 19 1A 1B 1C 1D 1E 1F" 273s | decode_to_chunk() output: 273s | 00 01 02 03 04 05 06 07 08 09 0a 0b 0c 0d 0e 0f ................ 273s | 10 11 12 13 14 15 16 17 18 19 1a 1b 1c 1d 1e 1f ................ 273s | decode_to_chunk() Ciphertext: input "0x51 04 A1 06 16 8A 72 D9 79 0D 41 EE 8E DA D3 88EB 2E 1E FC 46 DA 57 C8 FC E6 30 DF 91 41 BE 28" 273s | decode_to_chunk() output: 273s | 51 04 a1 06 16 8a 72 d9 79 0d 41 ee 8e da d3 88 Q.....r.y.A..... 273s | eb 2e 1e fc 46 da 57 c8 fc e6 30 df 91 41 be 28 ....F.W...0..A.( 273s | decode_to_chunk() expected counter-block: : input "0x 00 6C B6 DB C0 54 3B 59 DA 48 D9 0B 00 00 00 03" 273s | decode_to_chunk() output: 273s | 00 6c b6 db c0 54 3b 59 da 48 d9 0b 00 00 00 03 .l...T;Y.H...... 273s | cipher_op_ctr_nss() enter AES_CTR 0x8a273bba160 use IKEv1 IV wire_iv 0 count 0 273s | ctr_param: count 32 iv 006cb6dbc0543b59da48d90b00000001 273s | cipher_op_ctr_nss() counter-block updated from 0x1 to 0x3 for 32 bytes 273s | do_aes_ctr: exit 273s | cipher_op_context_destroy_ctr_nss() 273s | verify_bytes() Encrypting 32 octets using AES-CTR with 128-bit key: encrypt: ok 273s | verify_bytes() Encrypting 32 octets using AES-CTR with 128-bit key: counter-block: ok 273s | decode_to_mac() input counter-block: : input "0x 00 6C B6 DB C0 54 3B 59 DA 48 D9 0B 00 00 00 01" 273s | decode_to_mac() output: 273s | 00 6c b6 db c0 54 3b 59 da 48 d9 0b 00 00 00 01 .l...T;Y.H...... 273s | decode_to_chunk() Ciphertext: input "0x51 04 A1 06 16 8A 72 D9 79 0D 41 EE 8E DA D3 88EB 2E 1E FC 46 DA 57 C8 FC E6 30 DF 91 41 BE 28" 273s | decode_to_chunk() output: 273s | 51 04 a1 06 16 8a 72 d9 79 0d 41 ee 8e da d3 88 Q.....r.y.A..... 273s | eb 2e 1e fc 46 da 57 c8 fc e6 30 df 91 41 be 28 ....F.W...0..A.( 273s | decode_to_chunk() Plaintext: input "0x00 01 02 03 04 05 06 07 08 09 0A 0B 0C 0D 0E 0F10 11 12 13 14 15 16 17 18 19 1A 1B 1C 1D 1E 1F" 273s | decode_to_chunk() output: 273s | 00 01 02 03 04 05 06 07 08 09 0a 0b 0c 0d 0e 0f ................ 273s | 10 11 12 13 14 15 16 17 18 19 1a 1b 1c 1d 1e 1f ................ 273s | decode_to_chunk() expected counter-block: : input "0x 00 6C B6 DB C0 54 3B 59 DA 48 D9 0B 00 00 00 03" 273s | decode_to_chunk() output: 273s | 00 6c b6 db c0 54 3b 59 da 48 d9 0b 00 00 00 03 .l...T;Y.H...... 273s | cipher_op_ctr_nss() enter AES_CTR 0x8a273bba160 use IKEv1 IV wire_iv 0 count 0 273s | ctr_param: count 32 iv 006cb6dbc0543b59da48d90b00000001 273s | cipher_op_ctr_nss() counter-block updated from 0x1 to 0x3 for 32 bytes 273s | do_aes_ctr: exit 273s | cipher_op_context_destroy_ctr_nss() 273s | verify_bytes() Encrypting 32 octets using AES-CTR with 128-bit key: decrypt: ok 273s | verify_bytes() Encrypting 32 octets using AES-CTR with 128-bit key: counter-block: ok 273s ipsec algparse: Encrypting 36 octets using AES-CTR with 128-bit key 273s | decode_to_chunk() raw_key: input "0x 76 91 BE 03 5E 50 20 A8 AC 6E 61 85 29 F9 A0 DC" 273s | decode_to_chunk() output: 273s | 76 91 be 03 5e 50 20 a8 ac 6e 61 85 29 f9 a0 dc v...^P ..na.)... 273s | CONCATENATE_DATA_AND_BASE: 273s | target: EXTRACT_KEY_FROM_KEY 273s | base: base-key@0x8a273bba290 (16-bytes, AES_KEY_GEN) 273s | params: 16-bytes@0x7fffdd836120 273s | key-offset: 0, key-size: 16 273s | EXTRACT_KEY_FROM_KEY: 273s | target: AES_CTR 273s | flags: ENCRYPT+DECRYPT 273s | key_size: 16-bytes 273s | base: base-key@0x8a273bbd2a0 (32-bytes, EXTRACT_KEY_FROM_KEY) 273s | operation: FLAGS_ONLY 273s | params: 8-bytes@0x7fffdd836128 273s | decode_to_mac() input counter-block: : input "0x 00 E0 01 7B 27 77 7F 3F 4A 17 86 F0 00 00 00 01" 273s | decode_to_mac() output: 273s | 00 e0 01 7b 27 77 7f 3f 4a 17 86 f0 00 00 00 01 ...{'w.?J....... 273s | decode_to_chunk() Plaintext: input "0x00 01 02 03 04 05 06 07 08 09 0A 0B 0C 0D 0E 0F10 11 12 13 14 15 16 17 18 19 1A 1B 1C 1D 1E 1F20 21 22 23" 273s | decode_to_chunk() output: 273s | 00 01 02 03 04 05 06 07 08 09 0a 0b 0c 0d 0e 0f ................ 273s | 10 11 12 13 14 15 16 17 18 19 1a 1b 1c 1d 1e 1f ................ 273s | 20 21 22 23 !"# 273s | decode_to_chunk() Ciphertext: input "0xC1 CF 48 A8 9F 2F FD D9 CF 46 52 E9 EF DB 72 D745 40 A4 2B DE 6D 78 36 D5 9A 5C EA AE F3 10 5325 B2 07 2F" 273s | decode_to_chunk() output: 273s | c1 cf 48 a8 9f 2f fd d9 cf 46 52 e9 ef db 72 d7 ..H../...FR...r. 273s | 45 40 a4 2b de 6d 78 36 d5 9a 5c ea ae f3 10 53 E@.+.mx6..\....S 273s | 25 b2 07 2f %../ 273s | decode_to_chunk() expected counter-block: : input "0x 00 E0 01 7B 27 77 7F 3F 4A 17 86 F0 00 00 00 04" 273s | decode_to_chunk() output: 273s | 00 e0 01 7b 27 77 7f 3f 4a 17 86 f0 00 00 00 04 ...{'w.?J....... 273s | cipher_op_ctr_nss() enter AES_CTR 0x8a273bb9fc0 use IKEv1 IV wire_iv 0 count 0 273s | ctr_param: count 32 iv 00e0017b27777f3f4a1786f000000001 273s | cipher_op_ctr_nss() counter-block updated from 0x1 to 0x4 for 36 bytes 273s | do_aes_ctr: exit 273s | cipher_op_context_destroy_ctr_nss() 273s | verify_bytes() Encrypting 36 octets using AES-CTR with 128-bit key: encrypt: ok 273s | verify_bytes() Encrypting 36 octets using AES-CTR with 128-bit key: counter-block: ok 273s | decode_to_mac() input counter-block: : input "0x 00 E0 01 7B 27 77 7F 3F 4A 17 86 F0 00 00 00 01" 273s | decode_to_mac() output: 273s | 00 e0 01 7b 27 77 7f 3f 4a 17 86 f0 00 00 00 01 ...{'w.?J....... 273s | decode_to_chunk() Ciphertext: input "0xC1 CF 48 A8 9F 2F FD D9 CF 46 52 E9 EF DB 72 D745 40 A4 2B DE 6D 78 36 D5 9A 5C EA AE F3 10 5325 B2 07 2F" 273s | decode_to_chunk() output: 273s | c1 cf 48 a8 9f 2f fd d9 cf 46 52 e9 ef db 72 d7 ..H../...FR...r. 273s | 45 40 a4 2b de 6d 78 36 d5 9a 5c ea ae f3 10 53 E@.+.mx6..\....S 273s | 25 b2 07 2f %../ 273s | decode_to_chunk() Plaintext: input "0x00 01 02 03 04 05 06 07 08 09 0A 0B 0C 0D 0E 0F10 11 12 13 14 15 16 17 18 19 1A 1B 1C 1D 1E 1F20 21 22 23" 273s | decode_to_chunk() output: 273s | 00 01 02 03 04 05 06 07 08 09 0a 0b 0c 0d 0e 0f ................ 273s | 10 11 12 13 14 15 16 17 18 19 1a 1b 1c 1d 1e 1f ................ 273s | 20 21 22 23 !"# 273s | decode_to_chunk() expected counter-block: : input "0x 00 E0 01 7B 27 77 7F 3F 4A 17 86 F0 00 00 00 04" 273s | decode_to_chunk() output: 273s | 00 e0 01 7b 27 77 7f 3f 4a 17 86 f0 00 00 00 04 ...{'w.?J....... 273s | cipher_op_ctr_nss() enter AES_CTR 0x8a273bb9fc0 use IKEv1 IV wire_iv 0 count 0 273s | ctr_param: count 32 iv 00e0017b27777f3f4a1786f000000001 273s | cipher_op_ctr_nss() counter-block updated from 0x1 to 0x4 for 36 bytes 273s | do_aes_ctr: exit 273s | cipher_op_context_destroy_ctr_nss() 273s | verify_bytes() Encrypting 36 octets using AES-CTR with 128-bit key: decrypt: ok 273s | verify_bytes() Encrypting 36 octets using AES-CTR with 128-bit key: counter-block: ok 273s ipsec algparse: Encrypting 16 octets using AES-CTR with 192-bit key 273s | decode_to_chunk() raw_key: input "0x16 AF 5B 14 5F C9 F5 79 C1 75 F9 3E 3B FB 0E ED86 3D 06 CC FD B7 85 15" 273s | decode_to_chunk() output: 273s | 16 af 5b 14 5f c9 f5 79 c1 75 f9 3e 3b fb 0e ed ..[._..y.u.>;... 273s | 86 3d 06 cc fd b7 85 15 .=...... 273s | CONCATENATE_DATA_AND_BASE: 273s | target: EXTRACT_KEY_FROM_KEY 273s | base: base-key@0x8a273bba290 (16-bytes, AES_KEY_GEN) 273s | params: 16-bytes@0x7fffdd836120 273s | key-offset: 0, key-size: 24 273s | EXTRACT_KEY_FROM_KEY: 273s | target: AES_CTR 273s | flags: ENCRYPT+DECRYPT 273s | key_size: 24-bytes 273s | base: base-key@0x8a273bbd2a0 (40-bytes, EXTRACT_KEY_FROM_KEY) 273s | operation: FLAGS_ONLY 273s | params: 8-bytes@0x7fffdd836128 273s | decode_to_mac() input counter-block: : input "0x 00 00 00 48 36 73 3C 14 7D 6D 93 CB 00 00 00 01" 273s | decode_to_mac() output: 273s | 00 00 00 48 36 73 3c 14 7d 6d 93 cb 00 00 00 01 ...H6s<.}m...... 273s | decode_to_chunk() Plaintext: input "0x 53 69 6E 67 6C 65 20 62 6C 6F 63 6B 20 6D 73 67" 273s | decode_to_chunk() output: 273s | 53 69 6e 67 6c 65 20 62 6c 6f 63 6b 20 6d 73 67 Single block msg 273s | decode_to_chunk() Ciphertext: input "0x 4B 55 38 4F E2 59 C9 C8 4E 79 35 A0 03 CB E9 28" 273s | decode_to_chunk() output: 273s | 4b 55 38 4f e2 59 c9 c8 4e 79 35 a0 03 cb e9 28 KU8O.Y..Ny5....( 273s | decode_to_chunk() expected counter-block: : input "0x 00 00 00 48 36 73 3C 14 7D 6D 93 CB 00 00 00 02" 273s | decode_to_chunk() output: 273s | 00 00 00 48 36 73 3c 14 7d 6d 93 cb 00 00 00 02 ...H6s<.}m...... 273s | cipher_op_ctr_nss() enter AES_CTR 0x8a273bbdbe0 use IKEv1 IV wire_iv 0 count 0 273s | ctr_param: count 32 iv 0000004836733c147d6d93cb00000001 273s | cipher_op_ctr_nss() counter-block updated from 0x1 to 0x2 for 16 bytes 273s | do_aes_ctr: exit 273s | cipher_op_context_destroy_ctr_nss() 273s | verify_bytes() Encrypting 16 octets using AES-CTR with 192-bit key: encrypt: ok 273s | verify_bytes() Encrypting 16 octets using AES-CTR with 192-bit key: counter-block: ok 273s | decode_to_mac() input counter-block: : input "0x 00 00 00 48 36 73 3C 14 7D 6D 93 CB 00 00 00 01" 273s | decode_to_mac() output: 273s | 00 00 00 48 36 73 3c 14 7d 6d 93 cb 00 00 00 01 ...H6s<.}m...... 273s | decode_to_chunk() Ciphertext: input "0x 4B 55 38 4F E2 59 C9 C8 4E 79 35 A0 03 CB E9 28" 273s | decode_to_chunk() output: 273s | 4b 55 38 4f e2 59 c9 c8 4e 79 35 a0 03 cb e9 28 KU8O.Y..Ny5....( 273s | decode_to_chunk() Plaintext: input "0x 53 69 6E 67 6C 65 20 62 6C 6F 63 6B 20 6D 73 67" 273s | decode_to_chunk() output: 273s | 53 69 6e 67 6c 65 20 62 6c 6f 63 6b 20 6d 73 67 Single block msg 273s | decode_to_chunk() expected counter-block: : input "0x 00 00 00 48 36 73 3C 14 7D 6D 93 CB 00 00 00 02" 273s | decode_to_chunk() output: 273s | 00 00 00 48 36 73 3c 14 7d 6d 93 cb 00 00 00 02 ...H6s<.}m...... 273s | cipher_op_ctr_nss() enter AES_CTR 0x8a273bbdbe0 use IKEv1 IV wire_iv 0 count 0 273s | ctr_param: count 32 iv 0000004836733c147d6d93cb00000001 273s | cipher_op_ctr_nss() counter-block updated from 0x1 to 0x2 for 16 bytes 273s | do_aes_ctr: exit 273s | cipher_op_context_destroy_ctr_nss() 273s | verify_bytes() Encrypting 16 octets using AES-CTR with 192-bit key: decrypt: ok 273s | verify_bytes() Encrypting 16 octets using AES-CTR with 192-bit key: counter-block: ok 273s ipsec algparse: Encrypting 32 octets using AES-CTR with 192-bit key 273s | decode_to_chunk() raw_key: input "0x7C 5C B2 40 1B 3D C3 3C 19 E7 34 08 19 E0 F6 9C67 8C 3D B8 E6 F6 A9 1A" 273s | decode_to_chunk() output: 273s | 7c 5c b2 40 1b 3d c3 3c 19 e7 34 08 19 e0 f6 9c |\.@.=.<..4..... 273s | 67 8c 3d b8 e6 f6 a9 1a g.=..... 273s | CONCATENATE_DATA_AND_BASE: 273s | target: EXTRACT_KEY_FROM_KEY 273s | base: base-key@0x8a273bba290 (16-bytes, AES_KEY_GEN) 273s | params: 16-bytes@0x7fffdd836120 273s | key-offset: 0, key-size: 24 273s | EXTRACT_KEY_FROM_KEY: 273s | target: AES_CTR 273s | flags: ENCRYPT+DECRYPT 273s | key_size: 24-bytes 273s | base: base-key@0x8a273bbd2a0 (40-bytes, EXTRACT_KEY_FROM_KEY) 273s | operation: FLAGS_ONLY 273s | params: 8-bytes@0x7fffdd836128 273s | decode_to_mac() input counter-block: : input "0x 00 96 B0 3B 02 0C 6E AD C2 CB 50 0D 00 00 00 01" 273s | decode_to_mac() output: 273s | 00 96 b0 3b 02 0c 6e ad c2 cb 50 0d 00 00 00 01 ...;..n...P..... 273s | decode_to_chunk() Plaintext: input "0x00 01 02 03 04 05 06 07 08 09 0A 0B 0C 0D 0E 0F10 11 12 13 14 15 16 17 18 19 1A 1B 1C 1D 1E 1F" 273s | decode_to_chunk() output: 273s | 00 01 02 03 04 05 06 07 08 09 0a 0b 0c 0d 0e 0f ................ 273s | 10 11 12 13 14 15 16 17 18 19 1a 1b 1c 1d 1e 1f ................ 273s | decode_to_chunk() Ciphertext: input "0x45 32 43 FC 60 9B 23 32 7E DF AA FA 71 31 CD 9F84 90 70 1C 5A D4 A7 9C FC 1F E0 FF 42 F4 FB 00" 273s | decode_to_chunk() output: 273s | 45 32 43 fc 60 9b 23 32 7e df aa fa 71 31 cd 9f E2C.`.#2~...q1.. 273s | 84 90 70 1c 5a d4 a7 9c fc 1f e0 ff 42 f4 fb 00 ..p.Z.......B... 273s | decode_to_chunk() expected counter-block: : input "0x 00 96 B0 3B 02 0C 6E AD C2 CB 50 0D 00 00 00 03" 273s | decode_to_chunk() output: 273s | 00 96 b0 3b 02 0c 6e ad c2 cb 50 0d 00 00 00 03 ...;..n...P..... 273s | cipher_op_ctr_nss() enter AES_CTR 0x8a273bb9fc0 use IKEv1 IV wire_iv 0 count 0 273s | ctr_param: count 32 iv 0096b03b020c6eadc2cb500d00000001 273s | cipher_op_ctr_nss() counter-block updated from 0x1 to 0x3 for 32 bytes 273s | do_aes_ctr: exit 273s | cipher_op_context_destroy_ctr_nss() 273s | verify_bytes() Encrypting 32 octets using AES-CTR with 192-bit key: encrypt: ok 273s | verify_bytes() Encrypting 32 octets using AES-CTR with 192-bit key: counter-block: ok 273s | decode_to_mac() input counter-block: : input "0x 00 96 B0 3B 02 0C 6E AD C2 CB 50 0D 00 00 00 01" 273s | decode_to_mac() output: 273s | 00 96 b0 3b 02 0c 6e ad c2 cb 50 0d 00 00 00 01 ...;..n...P..... 273s | decode_to_chunk() Ciphertext: input "0x45 32 43 FC 60 9B 23 32 7E DF AA FA 71 31 CD 9F84 90 70 1C 5A D4 A7 9C FC 1F E0 FF 42 F4 FB 00" 273s | decode_to_chunk() output: 273s | 45 32 43 fc 60 9b 23 32 7e df aa fa 71 31 cd 9f E2C.`.#2~...q1.. 273s | 84 90 70 1c 5a d4 a7 9c fc 1f e0 ff 42 f4 fb 00 ..p.Z.......B... 273s | decode_to_chunk() Plaintext: input "0x00 01 02 03 04 05 06 07 08 09 0A 0B 0C 0D 0E 0F10 11 12 13 14 15 16 17 18 19 1A 1B 1C 1D 1E 1F" 273s | decode_to_chunk() output: 273s | 00 01 02 03 04 05 06 07 08 09 0a 0b 0c 0d 0e 0f ................ 273s | 10 11 12 13 14 15 16 17 18 19 1a 1b 1c 1d 1e 1f ................ 273s | decode_to_chunk() expected counter-block: : input "0x 00 96 B0 3B 02 0C 6E AD C2 CB 50 0D 00 00 00 03" 273s | decode_to_chunk() output: 273s | 00 96 b0 3b 02 0c 6e ad c2 cb 50 0d 00 00 00 03 ...;..n...P..... 273s | cipher_op_ctr_nss() enter AES_CTR 0x8a273bb9fc0 use IKEv1 IV wire_iv 0 count 0 273s | ctr_param: count 32 iv 0096b03b020c6eadc2cb500d00000001 273s | cipher_op_ctr_nss() counter-block updated from 0x1 to 0x3 for 32 bytes 273s | do_aes_ctr: exit 273s | cipher_op_context_destroy_ctr_nss() 273s | verify_bytes() Encrypting 32 octets using AES-CTR with 192-bit key: decrypt: ok 273s | verify_bytes() Encrypting 32 octets using AES-CTR with 192-bit key: counter-block: ok 273s ipsec algparse: Encrypting 36 octets using AES-CTR with 192-bit key 273s | decode_to_chunk() raw_key: input "0x02 BF 39 1E E8 EC B1 59 B9 59 61 7B 09 65 27 9BF5 9B 60 A7 86 D3 E0 FE" 273s | decode_to_chunk() output: 273s | 02 bf 39 1e e8 ec b1 59 b9 59 61 7b 09 65 27 9b ..9....Y.Ya{.e'. 273s | f5 9b 60 a7 86 d3 e0 fe ..`..... 273s | CONCATENATE_DATA_AND_BASE: 273s | target: EXTRACT_KEY_FROM_KEY 273s | base: base-key@0x8a273bba290 (16-bytes, AES_KEY_GEN) 273s | params: 16-bytes@0x7fffdd836120 273s | key-offset: 0, key-size: 24 273s | EXTRACT_KEY_FROM_KEY: 273s | target: AES_CTR 273s | flags: ENCRYPT+DECRYPT 273s | key_size: 24-bytes 273s | base: base-key@0x8a273bbd2a0 (40-bytes, EXTRACT_KEY_FROM_KEY) 273s | operation: FLAGS_ONLY 273s | params: 8-bytes@0x7fffdd836128 273s | decode_to_mac() input counter-block: : input "0x 00 07 BD FD 5C BD 60 27 8D CC 09 12 00 00 00 01" 273s | decode_to_mac() output: 273s | 00 07 bd fd 5c bd 60 27 8d cc 09 12 00 00 00 01 ....\.`'........ 273s | decode_to_chunk() Plaintext: input "0x00 01 02 03 04 05 06 07 08 09 0A 0B 0C 0D 0E 0F10 11 12 13 14 15 16 17 18 19 1A 1B 1C 1D 1E 1F20 21 22 23" 273s | decode_to_chunk() output: 273s | 00 01 02 03 04 05 06 07 08 09 0a 0b 0c 0d 0e 0f ................ 273s | 10 11 12 13 14 15 16 17 18 19 1a 1b 1c 1d 1e 1f ................ 273s | 20 21 22 23 !"# 273s | decode_to_chunk() Ciphertext: input "0x96 89 3F C5 5E 5C 72 2F 54 0B 7D D1 DD F7 E7 58D2 88 BC 95 C6 91 65 88 45 36 C8 11 66 2F 21 88AB EE 09 35" 273s | decode_to_chunk() output: 273s | 96 89 3f c5 5e 5c 72 2f 54 0b 7d d1 dd f7 e7 58 ..?.^\r/T.}....X 273s | d2 88 bc 95 c6 91 65 88 45 36 c8 11 66 2f 21 88 ......e.E6..f/!. 273s | ab ee 09 35 ...5 273s | decode_to_chunk() expected counter-block: : input "0x 00 07 BD FD 5C BD 60 27 8D CC 09 12 00 00 00 04" 273s | decode_to_chunk() output: 273s | 00 07 bd fd 5c bd 60 27 8d cc 09 12 00 00 00 04 ....\.`'........ 273s | cipher_op_ctr_nss() enter AES_CTR 0x8a273bb9fc0 use IKEv1 IV wire_iv 0 count 0 273s | ctr_param: count 32 iv 0007bdfd5cbd60278dcc091200000001 273s | cipher_op_ctr_nss() counter-block updated from 0x1 to 0x4 for 36 bytes 273s | do_aes_ctr: exit 273s | cipher_op_context_destroy_ctr_nss() 273s | verify_bytes() Encrypting 36 octets using AES-CTR with 192-bit key: encrypt: ok 273s | verify_bytes() Encrypting 36 octets using AES-CTR with 192-bit key: counter-block: ok 273s | decode_to_mac() input counter-block: : input "0x 00 07 BD FD 5C BD 60 27 8D CC 09 12 00 00 00 01" 273s | decode_to_mac() output: 273s | 00 07 bd fd 5c bd 60 27 8d cc 09 12 00 00 00 01 ....\.`'........ 273s | decode_to_chunk() Ciphertext: input "0x96 89 3F C5 5E 5C 72 2F 54 0B 7D D1 DD F7 E7 58D2 88 BC 95 C6 91 65 88 45 36 C8 11 66 2F 21 88AB EE 09 35" 273s | decode_to_chunk() output: 273s | 96 89 3f c5 5e 5c 72 2f 54 0b 7d d1 dd f7 e7 58 ..?.^\r/T.}....X 273s | d2 88 bc 95 c6 91 65 88 45 36 c8 11 66 2f 21 88 ......e.E6..f/!. 273s | ab ee 09 35 ...5 273s | decode_to_chunk() Plaintext: input "0x00 01 02 03 04 05 06 07 08 09 0A 0B 0C 0D 0E 0F10 11 12 13 14 15 16 17 18 19 1A 1B 1C 1D 1E 1F20 21 22 23" 273s | decode_to_chunk() output: 273s | 00 01 02 03 04 05 06 07 08 09 0a 0b 0c 0d 0e 0f ................ 273s | 10 11 12 13 14 15 16 17 18 19 1a 1b 1c 1d 1e 1f ................ 273s | 20 21 22 23 !"# 273s | decode_to_chunk() expected counter-block: : input "0x 00 07 BD FD 5C BD 60 27 8D CC 09 12 00 00 00 04" 273s | decode_to_chunk() output: 273s | 00 07 bd fd 5c bd 60 27 8d cc 09 12 00 00 00 04 ....\.`'........ 273s | cipher_op_ctr_nss() enter AES_CTR 0x8a273bb9fc0 use IKEv1 IV wire_iv 0 count 0 273s | ctr_param: count 32 iv 0007bdfd5cbd60278dcc091200000001 273s | cipher_op_ctr_nss() counter-block updated from 0x1 to 0x4 for 36 bytes 273s | do_aes_ctr: exit 273s | cipher_op_context_destroy_ctr_nss() 273s | verify_bytes() Encrypting 36 octets using AES-CTR with 192-bit key: decrypt: ok 273s | verify_bytes() Encrypting 36 octets using AES-CTR with 192-bit key: counter-block: ok 273s ipsec algparse: Encrypting 16 octets using AES-CTR with 256-bit key 273s | decode_to_chunk() raw_key: input "0x77 6B EF F2 85 1D B0 6F 4C 8A 05 42 C8 69 6F 6C6A 81 AF 1E EC 96 B4 D3 7F C1 D6 89 E6 C1 C1 04" 273s | decode_to_chunk() output: 273s | 77 6b ef f2 85 1d b0 6f 4c 8a 05 42 c8 69 6f 6c wk.....oL..B.iol 273s | 6a 81 af 1e ec 96 b4 d3 7f c1 d6 89 e6 c1 c1 04 j............... 273s | CONCATENATE_DATA_AND_BASE: 273s | target: EXTRACT_KEY_FROM_KEY 273s | base: base-key@0x8a273bba290 (16-bytes, AES_KEY_GEN) 273s | params: 16-bytes@0x7fffdd836120 273s | key-offset: 0, key-size: 32 273s | EXTRACT_KEY_FROM_KEY: 273s | target: AES_CTR 273s | flags: ENCRYPT+DECRYPT 273s | key_size: 32-bytes 273s | base: base-key@0x8a273bbd2a0 (48-bytes, EXTRACT_KEY_FROM_KEY) 273s | operation: FLAGS_ONLY 273s | params: 8-bytes@0x7fffdd836128 273s | decode_to_mac() input counter-block: : input "0x 00 00 00 60 DB 56 72 C9 7A A8 F0 B2 00 00 00 01" 273s | decode_to_mac() output: 273s | 00 00 00 60 db 56 72 c9 7a a8 f0 b2 00 00 00 01 ...`.Vr.z....... 273s | decode_to_chunk() Plaintext: input "0x 53 69 6E 67 6C 65 20 62 6C 6F 63 6B 20 6D 73 67" 273s | decode_to_chunk() output: 273s | 53 69 6e 67 6c 65 20 62 6c 6f 63 6b 20 6d 73 67 Single block msg 273s | decode_to_chunk() Ciphertext: input "0x 14 5A D0 1D BF 82 4E C7 56 08 63 DC 71 E3 E0 C0" 273s | decode_to_chunk() output: 273s | 14 5a d0 1d bf 82 4e c7 56 08 63 dc 71 e3 e0 c0 .Z....N.V.c.q... 273s | decode_to_chunk() expected counter-block: : input "0x 00 00 00 60 DB 56 72 C9 7A A8 F0 B2 00 00 00 02" 273s | decode_to_chunk() output: 273s | 00 00 00 60 db 56 72 c9 7a a8 f0 b2 00 00 00 02 ...`.Vr.z....... 273s | cipher_op_ctr_nss() enter AES_CTR 0x8a273bbdbe0 use IKEv1 IV wire_iv 0 count 0 273s | ctr_param: count 32 iv 00000060db5672c97aa8f0b200000001 273s | cipher_op_ctr_nss() counter-block updated from 0x1 to 0x2 for 16 bytes 273s | do_aes_ctr: exit 273s | cipher_op_context_destroy_ctr_nss() 273s | verify_bytes() Encrypting 16 octets using AES-CTR with 256-bit key: encrypt: ok 273s | verify_bytes() Encrypting 16 octets using AES-CTR with 256-bit key: counter-block: ok 273s | decode_to_mac() input counter-block: : input "0x 00 00 00 60 DB 56 72 C9 7A A8 F0 B2 00 00 00 01" 273s | decode_to_mac() output: 273s | 00 00 00 60 db 56 72 c9 7a a8 f0 b2 00 00 00 01 ...`.Vr.z....... 273s | decode_to_chunk() Ciphertext: input "0x 14 5A D0 1D BF 82 4E C7 56 08 63 DC 71 E3 E0 C0" 273s | decode_to_chunk() output: 273s | 14 5a d0 1d bf 82 4e c7 56 08 63 dc 71 e3 e0 c0 .Z....N.V.c.q... 273s | decode_to_chunk() Plaintext: input "0x 53 69 6E 67 6C 65 20 62 6C 6F 63 6B 20 6D 73 67" 273s | decode_to_chunk() output: 273s | 53 69 6e 67 6c 65 20 62 6c 6f 63 6b 20 6d 73 67 Single block msg 273s | decode_to_chunk() expected counter-block: : input "0x 00 00 00 60 DB 56 72 C9 7A A8 F0 B2 00 00 00 02" 273s | decode_to_chunk() output: 273s | 00 00 00 60 db 56 72 c9 7a a8 f0 b2 00 00 00 02 ...`.Vr.z....... 273s | cipher_op_ctr_nss() enter AES_CTR 0x8a273bbdbe0 use IKEv1 IV wire_iv 0 count 0 273s | ctr_param: count 32 iv 00000060db5672c97aa8f0b200000001 273s | cipher_op_ctr_nss() counter-block updated from 0x1 to 0x2 for 16 bytes 273s | do_aes_ctr: exit 273s | cipher_op_context_destroy_ctr_nss() 273s | verify_bytes() Encrypting 16 octets using AES-CTR with 256-bit key: decrypt: ok 273s | verify_bytes() Encrypting 16 octets using AES-CTR with 256-bit key: counter-block: ok 273s ipsec algparse: Encrypting 32 octets using AES-CTR with 256-bit key 273s | decode_to_chunk() raw_key: input "0xF6 D6 6D 6B D5 2D 59 BB 07 96 36 58 79 EF F8 86C6 6D D5 1A 5B 6A 99 74 4B 50 59 0C 87 A2 38 84" 273s | decode_to_chunk() output: 273s | f6 d6 6d 6b d5 2d 59 bb 07 96 36 58 79 ef f8 86 ..mk.-Y...6Xy... 273s | c6 6d d5 1a 5b 6a 99 74 4b 50 59 0c 87 a2 38 84 .m..[j.tKPY...8. 273s | CONCATENATE_DATA_AND_BASE: 273s | target: EXTRACT_KEY_FROM_KEY 273s | base: base-key@0x8a273bba290 (16-bytes, AES_KEY_GEN) 273s | params: 16-bytes@0x7fffdd836120 273s | key-offset: 0, key-size: 32 273s | EXTRACT_KEY_FROM_KEY: 273s | target: AES_CTR 273s | flags: ENCRYPT+DECRYPT 273s | key_size: 32-bytes 273s | base: base-key@0x8a273bbd2a0 (48-bytes, EXTRACT_KEY_FROM_KEY) 273s | operation: FLAGS_ONLY 273s | params: 8-bytes@0x7fffdd836128 273s | decode_to_mac() input counter-block: : input "0x 00 FA AC 24 C1 58 5E F1 5A 43 D8 75 00 00 00 01" 273s | decode_to_mac() output: 273s | 00 fa ac 24 c1 58 5e f1 5a 43 d8 75 00 00 00 01 ...$.X^.ZC.u.... 273s | decode_to_chunk() Plaintext: input "0x00 01 02 03 04 05 06 07 08 09 0A 0B 0C 0D 0E 0F10 11 12 13 14 15 16 17 18 19 1A 1B 1C 1D 1E 1F" 273s | decode_to_chunk() output: 273s | 00 01 02 03 04 05 06 07 08 09 0a 0b 0c 0d 0e 0f ................ 273s | 10 11 12 13 14 15 16 17 18 19 1a 1b 1c 1d 1e 1f ................ 273s | decode_to_chunk() Ciphertext: input "0xF0 5E 23 1B 38 94 61 2C 49 EE 00 0B 80 4E B2 A9B8 30 6B 50 8F 83 9D 6A 55 30 83 1D 93 44 AF 1C" 273s | decode_to_chunk() output: 273s | f0 5e 23 1b 38 94 61 2c 49 ee 00 0b 80 4e b2 a9 .^#.8.a,I....N.. 273s | b8 30 6b 50 8f 83 9d 6a 55 30 83 1d 93 44 af 1c .0kP...jU0...D.. 273s | decode_to_chunk() expected counter-block: : input "0x 00 FA AC 24 C1 58 5E F1 5A 43 D8 75 00 00 00 03" 273s | decode_to_chunk() output: 273s | 00 fa ac 24 c1 58 5e f1 5a 43 d8 75 00 00 00 03 ...$.X^.ZC.u.... 273s | cipher_op_ctr_nss() enter AES_CTR 0x8a273bb9fc0 use IKEv1 IV wire_iv 0 count 0 273s | ctr_param: count 32 iv 00faac24c1585ef15a43d87500000001 273s | cipher_op_ctr_nss() counter-block updated from 0x1 to 0x3 for 32 bytes 273s | do_aes_ctr: exit 273s | cipher_op_context_destroy_ctr_nss() 273s | verify_bytes() Encrypting 32 octets using AES-CTR with 256-bit key: encrypt: ok 273s | verify_bytes() Encrypting 32 octets using AES-CTR with 256-bit key: counter-block: ok 273s | decode_to_mac() input counter-block: : input "0x 00 FA AC 24 C1 58 5E F1 5A 43 D8 75 00 00 00 01" 273s | decode_to_mac() output: 273s | 00 fa ac 24 c1 58 5e f1 5a 43 d8 75 00 00 00 01 ...$.X^.ZC.u.... 273s | decode_to_chunk() Ciphertext: input "0xF0 5E 23 1B 38 94 61 2C 49 EE 00 0B 80 4E B2 A9B8 30 6B 50 8F 83 9D 6A 55 30 83 1D 93 44 AF 1C" 273s | decode_to_chunk() output: 273s | f0 5e 23 1b 38 94 61 2c 49 ee 00 0b 80 4e b2 a9 .^#.8.a,I....N.. 273s | b8 30 6b 50 8f 83 9d 6a 55 30 83 1d 93 44 af 1c .0kP...jU0...D.. 273s | decode_to_chunk() Plaintext: input "0x00 01 02 03 04 05 06 07 08 09 0A 0B 0C 0D 0E 0F10 11 12 13 14 15 16 17 18 19 1A 1B 1C 1D 1E 1F" 273s | decode_to_chunk() output: 273s | 00 01 02 03 04 05 06 07 08 09 0a 0b 0c 0d 0e 0f ................ 273s | 10 11 12 13 14 15 16 17 18 19 1a 1b 1c 1d 1e 1f ................ 273s | decode_to_chunk() expected counter-block: : input "0x 00 FA AC 24 C1 58 5E F1 5A 43 D8 75 00 00 00 03" 273s | decode_to_chunk() output: 273s | 00 fa ac 24 c1 58 5e f1 5a 43 d8 75 00 00 00 03 ...$.X^.ZC.u.... 273s | cipher_op_ctr_nss() enter AES_CTR 0x8a273bb9fc0 use IKEv1 IV wire_iv 0 count 0 273s | ctr_param: count 32 iv 00faac24c1585ef15a43d87500000001 273s | cipher_op_ctr_nss() counter-block updated from 0x1 to 0x3 for 32 bytes 273s | do_aes_ctr: exit 273s | cipher_op_context_destroy_ctr_nss() 273s | verify_bytes() Encrypting 32 octets using AES-CTR with 256-bit key: decrypt: ok 273s | verify_bytes() Encrypting 32 octets using AES-CTR with 256-bit key: counter-block: ok 273s ipsec algparse: Encrypting 36 octets using AES-CTR with 256-bit key 273s | decode_to_chunk() raw_key: input "0xFF 7A 61 7C E6 91 48 E4 F1 72 6E 2F 43 58 1D E2AA 62 D9 F8 05 53 2E DF F1 EE D6 87 FB 54 15 3D" 273s | decode_to_chunk() output: 273s | ff 7a 61 7c e6 91 48 e4 f1 72 6e 2f 43 58 1d e2 .za|..H..rn/CX.. 273s | aa 62 d9 f8 05 53 2e df f1 ee d6 87 fb 54 15 3d .b...S.......T.= 273s | CONCATENATE_DATA_AND_BASE: 273s | target: EXTRACT_KEY_FROM_KEY 273s | base: base-key@0x8a273bba290 (16-bytes, AES_KEY_GEN) 273s | params: 16-bytes@0x7fffdd836120 273s | key-offset: 0, key-size: 32 273s | EXTRACT_KEY_FROM_KEY: 273s | target: AES_CTR 273s | flags: ENCRYPT+DECRYPT 273s | key_size: 32-bytes 273s | base: base-key@0x8a273bbd2a0 (48-bytes, EXTRACT_KEY_FROM_KEY) 273s | operation: FLAGS_ONLY 273s | params: 8-bytes@0x7fffdd836128 273s | decode_to_mac() input counter-block: : input "0x 00 1C C5 B7 51 A5 1D 70 A1 C1 11 48 00 00 00 01" 273s | decode_to_mac() output: 273s | 00 1c c5 b7 51 a5 1d 70 a1 c1 11 48 00 00 00 01 ....Q..p...H.... 273s | decode_to_chunk() Plaintext: input "0x00 01 02 03 04 05 06 07 08 09 0A 0B 0C 0D 0E 0F10 11 12 13 14 15 16 17 18 19 1A 1B 1C 1D 1E 1F20 21 22 23" 273s | decode_to_chunk() output: 273s | 00 01 02 03 04 05 06 07 08 09 0a 0b 0c 0d 0e 0f ................ 273s | 10 11 12 13 14 15 16 17 18 19 1a 1b 1c 1d 1e 1f ................ 273s | 20 21 22 23 !"# 273s | decode_to_chunk() Ciphertext: input "0xEB 6C 52 82 1D 0B BB F7 CE 75 94 46 2A CA 4F AAB4 07 DF 86 65 69 FD 07 F4 8C C0 B5 83 D6 07 1F1E C0 E6 B8" 273s | decode_to_chunk() output: 273s | eb 6c 52 82 1d 0b bb f7 ce 75 94 46 2a ca 4f aa .lR......u.F*.O. 273s | b4 07 df 86 65 69 fd 07 f4 8c c0 b5 83 d6 07 1f ....ei.......... 273s | 1e c0 e6 b8 .... 273s | decode_to_chunk() expected counter-block: : input "0x 00 1C C5 B7 51 A5 1D 70 A1 C1 11 48 00 00 00 04" 273s | decode_to_chunk() output: 273s | 00 1c c5 b7 51 a5 1d 70 a1 c1 11 48 00 00 00 04 ....Q..p...H.... 273s | cipher_op_ctr_nss() enter AES_CTR 0x8a273bb9fc0 use IKEv1 IV wire_iv 0 count 0 273s | ctr_param: count 32 iv 001cc5b751a51d70a1c1114800000001 273s | cipher_op_ctr_nss() counter-block updated from 0x1 to 0x4 for 36 bytes 273s | do_aes_ctr: exit 273s | cipher_op_context_destroy_ctr_nss() 273s | verify_bytes() Encrypting 36 octets using AES-CTR with 256-bit key: encrypt: ok 273s | verify_bytes() Encrypting 36 octets using AES-CTR with 256-bit key: counter-block: ok 273s | decode_to_mac() input counter-block: : input "0x 00 1C C5 B7 51 A5 1D 70 A1 C1 11 48 00 00 00 01" 273s | decode_to_mac() output: 273s | 00 1c c5 b7 51 a5 1d 70 a1 c1 11 48 00 00 00 01 ....Q..p...H.... 273s | decode_to_chunk() Ciphertext: input "0xEB 6C 52 82 1D 0B BB F7 CE 75 94 46 2A CA 4F AAB4 07 DF 86 65 69 FD 07 F4 8C C0 B5 83 D6 07 1F1E C0 E6 B8" 273s | decode_to_chunk() output: 273s | eb 6c 52 82 1d 0b bb f7 ce 75 94 46 2a ca 4f aa .lR......u.F*.O. 273s | b4 07 df 86 65 69 fd 07 f4 8c c0 b5 83 d6 07 1f ....ei.......... 273s | 1e c0 e6 b8 .... 273s | decode_to_chunk() Plaintext: input "0x00 01 02 03 04 05 06 07 08 09 0A 0B 0C 0D 0E 0F10 11 12 13 14 15 16 17 18 19 1A 1B 1C 1D 1E 1F20 21 22 23" 273s | decode_to_chunk() output: 273s | 00 01 02 03 04 05 06 07 08 09 0a 0b 0c 0d 0e 0f ................ 273s | 10 11 12 13 14 15 16 17 18 19 1a 1b 1c 1d 1e 1f ................ 273s | 20 21 22 23 !"# 273s | decode_to_chunk() expected counter-block: : input "0x 00 1C C5 B7 51 A5 1D 70 A1 C1 11 48 00 00 00 04" 273s | decode_to_chunk() output: 273s | 00 1c c5 b7 51 a5 1d 70 a1 c1 11 48 00 00 00 04 ....Q..p...H.... 273s | cipher_op_ctr_nss() enter AES_CTR 0x8a273bb9fc0 use IKEv1 IV wire_iv 0 count 0 273s | ctr_param: count 32 iv 001cc5b751a51d70a1c1114800000001 273s | cipher_op_ctr_nss() counter-block updated from 0x1 to 0x4 for 36 bytes 273s | do_aes_ctr: exit 273s | cipher_op_context_destroy_ctr_nss() 273s | verify_bytes() Encrypting 36 octets using AES-CTR with 256-bit key: decrypt: ok 273s | verify_bytes() Encrypting 36 octets using AES-CTR with 256-bit key: counter-block: ok 273s ipsec algparse: testing AES_CBC: 273s ipsec algparse: Encrypting 16 bytes (1 block) using AES-CBC with 128-bit key 273s | decode_to_chunk() raw_key: input "0x06a9214036b8a15b512e03d534120006" 273s | decode_to_chunk() output: 273s | 06 a9 21 40 36 b8 a1 5b 51 2e 03 d5 34 12 00 06 ..!@6..[Q...4... 273s | CONCATENATE_DATA_AND_BASE: 273s | target: EXTRACT_KEY_FROM_KEY 273s | base: base-key@0x8a273bba290 (16-bytes, AES_KEY_GEN) 273s | params: 16-bytes@0x7fffdd836130 273s | key-offset: 0, key-size: 16 273s | EXTRACT_KEY_FROM_KEY: 273s | target: AES_CBC 273s | flags: ENCRYPT+DECRYPT 273s | key_size: 16-bytes 273s | base: base-key@0x8a273bbd2a0 (32-bytes, EXTRACT_KEY_FROM_KEY) 273s | operation: FLAGS_ONLY 273s | params: 8-bytes@0x7fffdd836138 273s | decode_to_mac() IV: : input "0x3dafba429d9eb430b422da802c9fac41" 273s | decode_to_mac() output: 273s | 3d af ba 42 9d 9e b4 30 b4 22 da 80 2c 9f ac 41 =..B...0."..,..A 273s | decode_to_chunk() new IV: : input "0xe353779c1079aeb82708942dbe77181a" 273s | decode_to_chunk() output: 273s | e3 53 77 9c 10 79 ae b8 27 08 94 2d be 77 18 1a .Sw..y..'..-.w.. 273s | decode_to_chunk() plaintext: : input "Single block msg" 273s | decode_to_chunk() output: 273s | 53 69 6e 67 6c 65 20 62 6c 6f 63 6b 20 6d 73 67 Single block msg 273s | decode_to_chunk() ciphertext: : input "0xe353779c1079aeb82708942dbe77181a" 273s | decode_to_chunk() output: 273s | e3 53 77 9c 10 79 ae b8 27 08 94 2d be 77 18 1a .Sw..y..'..-.w.. 273s | NSS ike_alg_nss_cbc: AES_CBC - enter (nil) 273s | using IKEv1 IV 273s | NSS ike_alg_nss_cbc: AES_CBC - exit 273s | verify_bytes() Encrypting 16 bytes (1 block) using AES-CBC with 128-bit key: encrypt: ok 273s | verify_bytes() Encrypting 16 bytes (1 block) using AES-CBC with 128-bit key: updated CBC IV: ok 273s | decode_to_mac() IV: : input "0x3dafba429d9eb430b422da802c9fac41" 273s | decode_to_mac() output: 273s | 3d af ba 42 9d 9e b4 30 b4 22 da 80 2c 9f ac 41 =..B...0."..,..A 273s | decode_to_chunk() new IV: : input "0xe353779c1079aeb82708942dbe77181a" 273s | decode_to_chunk() output: 273s | e3 53 77 9c 10 79 ae b8 27 08 94 2d be 77 18 1a .Sw..y..'..-.w.. 273s | decode_to_chunk() ciphertext: : input "0xe353779c1079aeb82708942dbe77181a" 273s | decode_to_chunk() output: 273s | e3 53 77 9c 10 79 ae b8 27 08 94 2d be 77 18 1a .Sw..y..'..-.w.. 273s | decode_to_chunk() plaintext: : input "Single block msg" 273s | decode_to_chunk() output: 273s | 53 69 6e 67 6c 65 20 62 6c 6f 63 6b 20 6d 73 67 Single block msg 273s | NSS ike_alg_nss_cbc: AES_CBC - enter (nil) 273s | using IKEv1 IV 273s | NSS ike_alg_nss_cbc: AES_CBC - exit 273s | verify_bytes() Encrypting 16 bytes (1 block) using AES-CBC with 128-bit key: decrypt: ok 273s | verify_bytes() Encrypting 16 bytes (1 block) using AES-CBC with 128-bit key: updated CBC IV: ok 273s ipsec algparse: Encrypting 32 bytes (2 blocks) using AES-CBC with 128-bit key 273s | decode_to_chunk() raw_key: input "0xc286696d887c9aa0611bbb3e2025a45a" 273s | decode_to_chunk() output: 273s | c2 86 69 6d 88 7c 9a a0 61 1b bb 3e 20 25 a4 5a ..im.|..a..> %.Z 273s | CONCATENATE_DATA_AND_BASE: 273s | target: EXTRACT_KEY_FROM_KEY 273s | base: base-key@0x8a273bba290 (16-bytes, AES_KEY_GEN) 273s | params: 16-bytes@0x7fffdd836130 273s | key-offset: 0, key-size: 16 273s | EXTRACT_KEY_FROM_KEY: 273s | target: AES_CBC 273s | flags: ENCRYPT+DECRYPT 273s | key_size: 16-bytes 273s | base: base-key@0x8a273bbd2a0 (32-bytes, EXTRACT_KEY_FROM_KEY) 273s | operation: FLAGS_ONLY 273s | params: 8-bytes@0x7fffdd836138 273s | decode_to_mac() IV: : input "0x562e17996d093d28ddb3ba695a2e6f58" 273s | decode_to_mac() output: 273s | 56 2e 17 99 6d 09 3d 28 dd b3 ba 69 5a 2e 6f 58 V...m.=(...iZ.oX 273s | decode_to_chunk() new IV: : input "0xd296cd94c2cccf8a3a863028b5e1dc0a7586602d253cfff91b8266bea6d61ab1" 273s | decode_to_chunk() output: 273s | d2 96 cd 94 c2 cc cf 8a 3a 86 30 28 b5 e1 dc 0a ........:.0(.... 273s | 75 86 60 2d 25 3c ff f9 1b 82 66 be a6 d6 1a b1 u.`-%<....f..... 273s | decode_to_chunk() plaintext: : input "0x000102030405060708090a0b0c0d0e0f101112131415161718191a1b1c1d1e1f" 273s | decode_to_chunk() output: 273s | 00 01 02 03 04 05 06 07 08 09 0a 0b 0c 0d 0e 0f ................ 273s | 10 11 12 13 14 15 16 17 18 19 1a 1b 1c 1d 1e 1f ................ 273s | decode_to_chunk() ciphertext: : input "0xd296cd94c2cccf8a3a863028b5e1dc0a7586602d253cfff91b8266bea6d61ab1" 273s | decode_to_chunk() output: 273s | d2 96 cd 94 c2 cc cf 8a 3a 86 30 28 b5 e1 dc 0a ........:.0(.... 273s | 75 86 60 2d 25 3c ff f9 1b 82 66 be a6 d6 1a b1 u.`-%<....f..... 273s | NSS ike_alg_nss_cbc: AES_CBC - enter (nil) 273s | using IKEv1 IV 273s | NSS ike_alg_nss_cbc: AES_CBC - exit 273s | verify_bytes() Encrypting 32 bytes (2 blocks) using AES-CBC with 128-bit key: encrypt: ok 273s | verify_bytes() Encrypting 32 bytes (2 blocks) using AES-CBC with 128-bit key: updated CBC IV: ok 273s | decode_to_mac() IV: : input "0x562e17996d093d28ddb3ba695a2e6f58" 273s | decode_to_mac() output: 273s | 56 2e 17 99 6d 09 3d 28 dd b3 ba 69 5a 2e 6f 58 V...m.=(...iZ.oX 273s | decode_to_chunk() new IV: : input "0xd296cd94c2cccf8a3a863028b5e1dc0a7586602d253cfff91b8266bea6d61ab1" 273s | decode_to_chunk() output: 273s | d2 96 cd 94 c2 cc cf 8a 3a 86 30 28 b5 e1 dc 0a ........:.0(.... 273s | 75 86 60 2d 25 3c ff f9 1b 82 66 be a6 d6 1a b1 u.`-%<....f..... 273s | decode_to_chunk() ciphertext: : input "0xd296cd94c2cccf8a3a863028b5e1dc0a7586602d253cfff91b8266bea6d61ab1" 273s | decode_to_chunk() output: 273s | d2 96 cd 94 c2 cc cf 8a 3a 86 30 28 b5 e1 dc 0a ........:.0(.... 273s | 75 86 60 2d 25 3c ff f9 1b 82 66 be a6 d6 1a b1 u.`-%<....f..... 273s | decode_to_chunk() plaintext: : input "0x000102030405060708090a0b0c0d0e0f101112131415161718191a1b1c1d1e1f" 273s | decode_to_chunk() output: 273s | 00 01 02 03 04 05 06 07 08 09 0a 0b 0c 0d 0e 0f ................ 273s | 10 11 12 13 14 15 16 17 18 19 1a 1b 1c 1d 1e 1f ................ 273s | NSS ike_alg_nss_cbc: AES_CBC - enter (nil) 273s | using IKEv1 IV 273s | NSS ike_alg_nss_cbc: AES_CBC - exit 273s | verify_bytes() Encrypting 32 bytes (2 blocks) using AES-CBC with 128-bit key: decrypt: ok 273s | verify_bytes() Encrypting 32 bytes (2 blocks) using AES-CBC with 128-bit key: updated CBC IV: ok 273s ipsec algparse: Encrypting 48 bytes (3 blocks) using AES-CBC with 128-bit key 273s | decode_to_chunk() raw_key: input "0x6c3ea0477630ce21a2ce334aa746c2cd" 273s | decode_to_chunk() output: 273s | 6c 3e a0 47 76 30 ce 21 a2 ce 33 4a a7 46 c2 cd l>.Gv0.!..3J.F.. 273s | CONCATENATE_DATA_AND_BASE: 273s | target: EXTRACT_KEY_FROM_KEY 273s | base: base-key@0x8a273bba290 (16-bytes, AES_KEY_GEN) 273s | params: 16-bytes@0x7fffdd836130 273s | key-offset: 0, key-size: 16 273s | EXTRACT_KEY_FROM_KEY: 273s | target: AES_CBC 273s | flags: ENCRYPT+DECRYPT 273s | key_size: 16-bytes 273s | base: base-key@0x8a273bbd2a0 (32-bytes, EXTRACT_KEY_FROM_KEY) 273s | operation: FLAGS_ONLY 273s | params: 8-bytes@0x7fffdd836138 273s | decode_to_mac() IV: : input "0xc782dc4c098c66cbd9cd27d825682c81" 273s | decode_to_mac() output: 273s | c7 82 dc 4c 09 8c 66 cb d9 cd 27 d8 25 68 2c 81 ...L..f...'.%h,. 273s | decode_to_chunk() new IV: : input "0xd0a02b3836451753d493665d33f0e8862dea54cdb293abc7506939276772f8d5021c19216bad525c8579695d83ba2684" 273s | decode_to_chunk() output: 273s | d0 a0 2b 38 36 45 17 53 d4 93 66 5d 33 f0 e8 86 ..+86E.S..f]3... 273s | 2d ea 54 cd b2 93 ab c7 50 69 39 27 67 72 f8 d5 -.T.....Pi9'gr.. 273s | 02 1c 19 21 6b ad 52 5c 85 79 69 5d 83 ba 26 84 ...!k.R\.yi]..&. 273s | decode_to_chunk() plaintext: : input "This is a 48-byte message (exactly 3 AES blocks)" 273s | decode_to_chunk() output: 273s | 54 68 69 73 20 69 73 20 61 20 34 38 2d 62 79 74 This is a 48-byt 273s | 65 20 6d 65 73 73 61 67 65 20 28 65 78 61 63 74 e message (exact 273s | 6c 79 20 33 20 41 45 53 20 62 6c 6f 63 6b 73 29 ly 3 AES blocks) 273s | decode_to_chunk() ciphertext: : input "0xd0a02b3836451753d493665d33f0e8862dea54cdb293abc7506939276772f8d5021c19216bad525c8579695d83ba2684" 273s | decode_to_chunk() output: 273s | d0 a0 2b 38 36 45 17 53 d4 93 66 5d 33 f0 e8 86 ..+86E.S..f]3... 273s | 2d ea 54 cd b2 93 ab c7 50 69 39 27 67 72 f8 d5 -.T.....Pi9'gr.. 273s | 02 1c 19 21 6b ad 52 5c 85 79 69 5d 83 ba 26 84 ...!k.R\.yi]..&. 273s | NSS ike_alg_nss_cbc: AES_CBC - enter (nil) 273s | using IKEv1 IV 273s | NSS ike_alg_nss_cbc: AES_CBC - exit 273s | verify_bytes() Encrypting 48 bytes (3 blocks) using AES-CBC with 128-bit key: encrypt: ok 273s | verify_bytes() Encrypting 48 bytes (3 blocks) using AES-CBC with 128-bit key: updated CBC IV: ok 273s | decode_to_mac() IV: : input "0xc782dc4c098c66cbd9cd27d825682c81" 273s | decode_to_mac() output: 273s | c7 82 dc 4c 09 8c 66 cb d9 cd 27 d8 25 68 2c 81 ...L..f...'.%h,. 273s | decode_to_chunk() new IV: : input "0xd0a02b3836451753d493665d33f0e8862dea54cdb293abc7506939276772f8d5021c19216bad525c8579695d83ba2684" 273s | decode_to_chunk() output: 273s | d0 a0 2b 38 36 45 17 53 d4 93 66 5d 33 f0 e8 86 ..+86E.S..f]3... 273s | 2d ea 54 cd b2 93 ab c7 50 69 39 27 67 72 f8 d5 -.T.....Pi9'gr.. 273s | 02 1c 19 21 6b ad 52 5c 85 79 69 5d 83 ba 26 84 ...!k.R\.yi]..&. 273s | decode_to_chunk() ciphertext: : input "0xd0a02b3836451753d493665d33f0e8862dea54cdb293abc7506939276772f8d5021c19216bad525c8579695d83ba2684" 273s | decode_to_chunk() output: 273s | d0 a0 2b 38 36 45 17 53 d4 93 66 5d 33 f0 e8 86 ..+86E.S..f]3... 273s | 2d ea 54 cd b2 93 ab c7 50 69 39 27 67 72 f8 d5 -.T.....Pi9'gr.. 273s | 02 1c 19 21 6b ad 52 5c 85 79 69 5d 83 ba 26 84 ...!k.R\.yi]..&. 273s | decode_to_chunk() plaintext: : input "This is a 48-byte message (exactly 3 AES blocks)" 273s | decode_to_chunk() output: 273s | 54 68 69 73 20 69 73 20 61 20 34 38 2d 62 79 74 This is a 48-byt 273s | 65 20 6d 65 73 73 61 67 65 20 28 65 78 61 63 74 e message (exact 273s | 6c 79 20 33 20 41 45 53 20 62 6c 6f 63 6b 73 29 ly 3 AES blocks) 273s | NSS ike_alg_nss_cbc: AES_CBC - enter (nil) 273s | using IKEv1 IV 273s | NSS ike_alg_nss_cbc: AES_CBC - exit 273s | verify_bytes() Encrypting 48 bytes (3 blocks) using AES-CBC with 128-bit key: decrypt: ok 273s | verify_bytes() Encrypting 48 bytes (3 blocks) using AES-CBC with 128-bit key: updated CBC IV: ok 273s ipsec algparse: Encrypting 64 bytes (4 blocks) using AES-CBC with 128-bit key 273s | decode_to_chunk() raw_key: input "0x56e47a38c5598974bc46903dba290349" 273s | decode_to_chunk() output: 273s | 56 e4 7a 38 c5 59 89 74 bc 46 90 3d ba 29 03 49 V.z8.Y.t.F.=.).I 273s | CONCATENATE_DATA_AND_BASE: 273s | target: EXTRACT_KEY_FROM_KEY 273s | base: base-key@0x8a273bba290 (16-bytes, AES_KEY_GEN) 273s | params: 16-bytes@0x7fffdd836130 273s | key-offset: 0, key-size: 16 273s | EXTRACT_KEY_FROM_KEY: 273s | target: AES_CBC 273s | flags: ENCRYPT+DECRYPT 273s | key_size: 16-bytes 273s | base: base-key@0x8a273bbd2a0 (32-bytes, EXTRACT_KEY_FROM_KEY) 273s | operation: FLAGS_ONLY 273s | params: 8-bytes@0x7fffdd836138 273s | decode_to_mac() IV: : input "0x8ce82eefbea0da3c44699ed7db51b7d9" 273s | decode_to_mac() output: 273s | 8c e8 2e ef be a0 da 3c 44 69 9e d7 db 51 b7 d9 ...........U 273s | decode_to_chunk() plaintext: : input "0xa0a1a2a3a4a5a6a7a8a9aaabacadaeafb0b1b2b3b4b5b6b7b8b9babbbcbdbebfc0c1c2c3c4c5c6c7c8c9cacbcccdcecfd0d1d2d3d4d5d6d7d8d9dadbdcdddedf" 273s | decode_to_chunk() output: 273s | a0 a1 a2 a3 a4 a5 a6 a7 a8 a9 aa ab ac ad ae af ................ 273s | b0 b1 b2 b3 b4 b5 b6 b7 b8 b9 ba bb bc bd be bf ................ 273s | c0 c1 c2 c3 c4 c5 c6 c7 c8 c9 ca cb cc cd ce cf ................ 273s | d0 d1 d2 d3 d4 d5 d6 d7 d8 d9 da db dc dd de df ................ 273s | decode_to_chunk() ciphertext: : input "0xc30e32ffedc0774e6aff6af0869f71aa0f3af07a9a31a9c684db207eb0ef8e4e35907aa632c3ffdf868bb7b29d3d46ad83ce9f9a102ee99d49a53e87f4c3da55" 273s | decode_to_chunk() output: 273s | c3 0e 32 ff ed c0 77 4e 6a ff 6a f0 86 9f 71 aa ..2...wNj.j...q. 273s | 0f 3a f0 7a 9a 31 a9 c6 84 db 20 7e b0 ef 8e 4e .:.z.1.... ~...N 273s | 35 90 7a a6 32 c3 ff df 86 8b b7 b2 9d 3d 46 ad 5.z.2........=F. 273s | 83 ce 9f 9a 10 2e e9 9d 49 a5 3e 87 f4 c3 da 55 ........I.>....U 273s | NSS ike_alg_nss_cbc: AES_CBC - enter (nil) 273s | using IKEv1 IV 273s | NSS ike_alg_nss_cbc: AES_CBC - exit 273s | verify_bytes() Encrypting 64 bytes (4 blocks) using AES-CBC with 128-bit key: encrypt: ok 273s | verify_bytes() Encrypting 64 bytes (4 blocks) using AES-CBC with 128-bit key: updated CBC IV: ok 273s | decode_to_mac() IV: : input "0x8ce82eefbea0da3c44699ed7db51b7d9" 273s | decode_to_mac() output: 273s | 8c e8 2e ef be a0 da 3c 44 69 9e d7 db 51 b7 d9 ...........U 273s | decode_to_chunk() ciphertext: : input "0xc30e32ffedc0774e6aff6af0869f71aa0f3af07a9a31a9c684db207eb0ef8e4e35907aa632c3ffdf868bb7b29d3d46ad83ce9f9a102ee99d49a53e87f4c3da55" 273s | decode_to_chunk() output: 273s | c3 0e 32 ff ed c0 77 4e 6a ff 6a f0 86 9f 71 aa ..2...wNj.j...q. 273s | 0f 3a f0 7a 9a 31 a9 c6 84 db 20 7e b0 ef 8e 4e .:.z.1.... ~...N 273s | 35 90 7a a6 32 c3 ff df 86 8b b7 b2 9d 3d 46 ad 5.z.2........=F. 273s | 83 ce 9f 9a 10 2e e9 9d 49 a5 3e 87 f4 c3 da 55 ........I.>....U 273s | decode_to_chunk() plaintext: : input "0xa0a1a2a3a4a5a6a7a8a9aaabacadaeafb0b1b2b3b4b5b6b7b8b9babbbcbdbebfc0c1c2c3c4c5c6c7c8c9cacbcccdcecfd0d1d2d3d4d5d6d7d8d9dadbdcdddedf" 273s | decode_to_chunk() output: 273s | a0 a1 a2 a3 a4 a5 a6 a7 a8 a9 aa ab ac ad ae af ................ 273s | b0 b1 b2 b3 b4 b5 b6 b7 b8 b9 ba bb bc bd be bf ................ 273s | c0 c1 c2 c3 c4 c5 c6 c7 c8 c9 ca cb cc cd ce cf ................ 273s | d0 d1 d2 d3 d4 d5 d6 d7 d8 d9 da db dc dd de df ................ 273s | NSS ike_alg_nss_cbc: AES_CBC - enter (nil) 273s | using IKEv1 IV 273s | NSS ike_alg_nss_cbc: AES_CBC - exit 273s | verify_bytes() Encrypting 64 bytes (4 blocks) using AES-CBC with 128-bit key: decrypt: ok 273s | verify_bytes() Encrypting 64 bytes (4 blocks) using AES-CBC with 128-bit key: updated CBC IV: ok 273s ipsec algparse: testing AES_XCBC: 273s ipsec algparse: RFC 3566 Test Case 1: AES-XCBC-MAC-96 with 0-byte input 273s | decode_to_chunk() test_prf_vector: input "0x000102030405060708090a0b0c0d0e0f" 273s | decode_to_chunk() output: 273s | 00 01 02 03 04 05 06 07 08 09 0a 0b 0c 0d 0e 0f ................ 273s | decode_to_chunk() test_prf_vector: input "" 273s | decode_to_chunk() output: 273s | 273s | decode_to_chunk() test_prf_vector: input "0x75f0251d528ac01c4573dfd584d79f29" 273s | decode_to_chunk() output: 273s | 75 f0 25 1d 52 8a c0 1c 45 73 df d5 84 d7 9f 29 u.%.R...Es.....) 273s | PRF chunk interface PRF AES_XCBC init key hunk 0x8a273bbd5d0 (length 16) 273s | 00 01 02 03 04 05 06 07 08 09 0a 0b 0c 0d 0e 0f ................ 273s | CONCATENATE_DATA_AND_BASE: 273s | target: EXTRACT_KEY_FROM_KEY 273s | base: base-key@0x8a273bba290 (16-bytes, AES_KEY_GEN) 273s | params: 16-bytes@0x7fffdd836010 273s | key-offset: 0, key-size: 16 273s | EXTRACT_KEY_FROM_KEY: 273s | target: EXTRACT_KEY_FROM_KEY 273s | key_size: 16-bytes 273s | base: base-key@0x8a273bbd2a0 (32-bytes, EXTRACT_KEY_FROM_KEY) 273s | operation: FLAGS_ONLY 273s | params: 8-bytes@0x7fffdd835f48 273s | XCBC: Key 16=16 just right 273s | key-offset: 0, key-size: 16 273s | EXTRACT_KEY_FROM_KEY: 273s | target: AES_ECB 273s | flags: SIGN 273s | key_size: 16-bytes 273s | base: base-key@0x8a273bbbbb0 (16-bytes, EXTRACT_KEY_FROM_KEY) 273s | operation: FLAGS_ONLY 273s | params: 8-bytes@0x7fffdd835f18 273s | PRF chunk interface PRF AES_XCBC 0x8a273bba230 273s | PRF chunk interface PRF AES_XCBC update message (0x8a273bbbae0 length 0) 273s | 273s | XCBC: data 273s | 273s | K extracting all 16 bytes of key@0x8a273bbd2a0 273s | K: symkey-key@0x8a273bbd2a0 (16-bytes, AES_ECB) 273s | sizeof bytes 16 273s | wrapper: (SECItemType)-578592984: 13 a6 f5 2c 45 66 07 05 98 bb e4 84 57 90 b4 46 273s | K extracted len 16 bytes at 0x8a273bbdeb0 273s | unwrapped: 273s | 00 01 02 03 04 05 06 07 08 09 0a 0b 0c 0d 0e 0f ................ 273s | XCBC: K: 273s | 00 01 02 03 04 05 06 07 08 09 0a 0b 0c 0d 0e 0f ................ 273s | XCBC: K1 273s | c3 52 80 57 54 23 7f 31 1a c0 ff f4 e3 e0 3e 78 .R.WT#.1......>x 273s | CONCATENATE_DATA_AND_BASE: 273s | target: EXTRACT_KEY_FROM_KEY 273s | base: base-key@0x8a273bba290 (16-bytes, AES_KEY_GEN) 273s | params: 16-bytes@0x7fffdd835e00 273s | key-offset: 0, key-size: 16 273s | EXTRACT_KEY_FROM_KEY: 273s | target: AES_ECB 273s | flags: SIGN 273s | key_size: 16-bytes 273s | base: base-key@0x8a273bbe040 (32-bytes, EXTRACT_KEY_FROM_KEY) 273s | operation: FLAGS_ONLY 273s | params: 8-bytes@0x7fffdd835e08 273s | Computing E[0] using K3 273s | XCBC: K3 273s | c1 a7 ab a1 a2 3a 94 06 58 07 a0 8c c8 ee d0 6e .....:..X......n 273s | XCBC: E[n-1] 273s | 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................ 273s | XCBC: M[n] 273s | 273s | XCBC: M[n] 273s | 273s | XCBC: M[n]:80...^E[n-1]^K3 273s | 41 a7 ab a1 a2 3a 94 06 58 07 a0 8c c8 ee d0 6e A....:..X......n 273s | XCBC: MAC 273s | 75 f0 25 1d 52 8a c0 1c 45 73 df d5 84 d7 9f 29 u.%.R...Es.....) 273s | PRF chunk interface PRF AES_XCBC final length 16 273s | 75 f0 25 1d 52 8a c0 1c 45 73 df d5 84 d7 9f 29 u.%.R...Es.....) 273s | chunk output 273s | 75 f0 25 1d 52 8a c0 1c 45 73 df d5 84 d7 9f 29 u.%.R...Es.....) 273s | verify_bytes() RFC 3566 Test Case 1: AES-XCBC-MAC-96 with 0-byte input: prf OUT: ok 273s | CONCATENATE_DATA_AND_BASE: 273s | target: EXTRACT_KEY_FROM_KEY 273s | base: base-key@0x8a273bba290 (16-bytes, AES_KEY_GEN) 273s | params: 16-bytes@0x7fffdd836100 273s | key-offset: 0, key-size: 16 273s | EXTRACT_KEY_FROM_KEY: 273s | target: EXTRACT_KEY_FROM_KEY 273s | key_size: 16-bytes 273s | base: base-key@0x8a273bbbbb0 (32-bytes, EXTRACT_KEY_FROM_KEY) 273s | operation: FLAGS_ONLY 273s | params: 8-bytes@0x7fffdd836038 273s | PRF symkey interface PRF AES_XCBC init key symkey-key@0x8a273bbd2a0 (size 16) 273s | PRF symkey interface: key symkey-key@0x8a273bbd2a0 (16-bytes, EXTRACT_KEY_FROM_KEY) 273s | XCBC: Key 16=16 just right 273s | key-offset: 0, key-size: 16 273s | EXTRACT_KEY_FROM_KEY: 273s | target: AES_ECB 273s | flags: SIGN 273s | key_size: 16-bytes 273s | base: base-key@0x8a273bbd2a0 (16-bytes, EXTRACT_KEY_FROM_KEY) 273s | operation: FLAGS_ONLY 273s | params: 8-bytes@0x7fffdd835f68 273s | PRF symkey interface PRF AES_XCBC 0x8a273bba230 273s | PRF symkey interface PRF AES_XCBC update symkey message-key@(nil) (size 0) 273s | PRF symkey interface: symkey message-key@NULL 273s | symkey message NULL key has no bytes 273s | XCBC: data 273s | 273s | K extracting all 16 bytes of key@0x8a273bbbbb0 273s | K: symkey-key@0x8a273bbbbb0 (16-bytes, AES_ECB) 273s | sizeof bytes 16 273s | wrapper: (SECItemType)-578594064: 13 a6 f5 2c 45 66 07 05 98 bb e4 84 57 90 b4 46 273s | K extracted len 16 bytes at 0x8a273bbdeb0 273s | unwrapped: 273s | 00 01 02 03 04 05 06 07 08 09 0a 0b 0c 0d 0e 0f ................ 273s | XCBC: K: 273s | 00 01 02 03 04 05 06 07 08 09 0a 0b 0c 0d 0e 0f ................ 273s | XCBC: K1 273s | c3 52 80 57 54 23 7f 31 1a c0 ff f4 e3 e0 3e 78 .R.WT#.1......>x 273s | CONCATENATE_DATA_AND_BASE: 273s | target: EXTRACT_KEY_FROM_KEY 273s | base: base-key@0x8a273bba290 (16-bytes, AES_KEY_GEN) 273s | params: 16-bytes@0x7fffdd835e50 273s | key-offset: 0, key-size: 16 273s | EXTRACT_KEY_FROM_KEY: 273s | target: AES_ECB 273s | flags: SIGN 273s | key_size: 16-bytes 273s | base: base-key@0x8a273bbe380 (32-bytes, EXTRACT_KEY_FROM_KEY) 273s | operation: FLAGS_ONLY 273s | params: 8-bytes@0x7fffdd835e58 273s | Computing E[0] using K3 273s | XCBC: K3 273s | c1 a7 ab a1 a2 3a 94 06 58 07 a0 8c c8 ee d0 6e .....:..X......n 273s | XCBC: E[n-1] 273s | 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................ 273s | XCBC: M[n] 273s | 273s | XCBC: M[n] 273s | 273s | XCBC: M[n]:80...^E[n-1]^K3 273s | 41 a7 ab a1 a2 3a 94 06 58 07 a0 8c c8 ee d0 6e A....:..X......n 273s | XCBC: MAC 273s | 75 f0 25 1d 52 8a c0 1c 45 73 df d5 84 d7 9f 29 u.%.R...Es.....) 273s | CONCATENATE_DATA_AND_BASE: 273s | target: EXTRACT_KEY_FROM_KEY 273s | base: base-key@0x8a273bba290 (16-bytes, AES_KEY_GEN) 273s | params: 16-bytes@0x7fffdd836020 273s | key-offset: 0, key-size: 16 273s | EXTRACT_KEY_FROM_KEY: 273s | target: EXTRACT_KEY_FROM_KEY 273s | key_size: 16-bytes 273s | base: base-key@0x8a273bbe380 (32-bytes, EXTRACT_KEY_FROM_KEY) 273s | operation: FLAGS_ONLY 273s | params: 8-bytes@0x7fffdd835f58 273s | PRF symkey interface PRF AES_XCBC final-key@0x8a273bbe040 (size 16) 273s | PRF symkey interface: key-key@0x8a273bbe040 (16-bytes, EXTRACT_KEY_FROM_KEY) 273s | output: symkey-key@0x8a273bbe040 (16-bytes, EXTRACT_KEY_FROM_KEY) 273s | RFC 3566 Test Case 1: AES-XCBC-MAC-96 with 0-byte input extracting all 16 bytes of key@0x8a273bbe040 273s | RFC 3566 Test Case 1: AES-XCBC-MAC-96 with 0-byte input: symkey-key@0x8a273bbe040 (16-bytes, EXTRACT_KEY_FROM_KEY) 273s | sizeof bytes 16 273s | wrapper: (SECItemType)-578593808: 18 77 b1 b9 9a 77 59 0d eb 33 a8 2c 0f 34 42 6d 273s | RFC 3566 Test Case 1: AES-XCBC-MAC-96 with 0-byte input extracted len 16 bytes at 0x8a273bbe020 273s | unwrapped: 273s | 75 f0 25 1d 52 8a c0 1c 45 73 df d5 84 d7 9f 29 u.%.R...Es.....) 273s | verify_bytes() RFC 3566 Test Case 1: AES-XCBC-MAC-96 with 0-byte input: symkey: ok 273s ipsec algparse: RFC 3566 Test Case 2: AES-XCBC-MAC-96 with 3-byte input 273s | decode_to_chunk() test_prf_vector: input "0x000102030405060708090a0b0c0d0e0f" 273s | decode_to_chunk() output: 273s | 00 01 02 03 04 05 06 07 08 09 0a 0b 0c 0d 0e 0f ................ 273s | decode_to_chunk() test_prf_vector: input "0x000102" 273s | decode_to_chunk() output: 273s | 00 01 02 ... 273s | decode_to_chunk() test_prf_vector: input "0x5b376580ae2f19afe7219ceef172756f" 273s | decode_to_chunk() output: 273s | 5b 37 65 80 ae 2f 19 af e7 21 9c ee f1 72 75 6f [7e../...!...ruo 273s | PRF chunk interface PRF AES_XCBC init key hunk 0x8a273bbd5d0 (length 16) 273s | 00 01 02 03 04 05 06 07 08 09 0a 0b 0c 0d 0e 0f ................ 273s | CONCATENATE_DATA_AND_BASE: 273s | target: EXTRACT_KEY_FROM_KEY 273s | base: base-key@0x8a273bba290 (16-bytes, AES_KEY_GEN) 273s | params: 16-bytes@0x7fffdd836010 273s | key-offset: 0, key-size: 16 273s | EXTRACT_KEY_FROM_KEY: 273s | target: EXTRACT_KEY_FROM_KEY 273s | key_size: 16-bytes 273s | base: base-key@0x8a273bbd2a0 (32-bytes, EXTRACT_KEY_FROM_KEY) 273s | operation: FLAGS_ONLY 273s | params: 8-bytes@0x7fffdd835f48 273s | XCBC: Key 16=16 just right 273s | key-offset: 0, key-size: 16 273s | EXTRACT_KEY_FROM_KEY: 273s | target: AES_ECB 273s | flags: SIGN 273s | key_size: 16-bytes 273s | base: base-key@0x8a273bbe040 (16-bytes, EXTRACT_KEY_FROM_KEY) 273s | operation: FLAGS_ONLY 273s | params: 8-bytes@0x7fffdd835f18 273s | PRF chunk interface PRF AES_XCBC 0x8a273bba230 273s | PRF chunk interface PRF AES_XCBC update message (0x8a273bbbae0 length 3) 273s | 00 01 02 ... 273s | XCBC: data 273s | 00 01 02 ... 273s | K extracting all 16 bytes of key@0x8a273bbd2a0 273s | K: symkey-key@0x8a273bbd2a0 (16-bytes, AES_ECB) 273s | sizeof bytes 16 273s | wrapper: (SECItemType)-578592984: 13 a6 f5 2c 45 66 07 05 98 bb e4 84 57 90 b4 46 273s | K extracted len 16 bytes at 0x8a273bbd5f0 273s | unwrapped: 273s | 00 01 02 03 04 05 06 07 08 09 0a 0b 0c 0d 0e 0f ................ 273s | XCBC: K: 273s | 00 01 02 03 04 05 06 07 08 09 0a 0b 0c 0d 0e 0f ................ 273s | XCBC: K1 273s | c3 52 80 57 54 23 7f 31 1a c0 ff f4 e3 e0 3e 78 .R.WT#.1......>x 273s | CONCATENATE_DATA_AND_BASE: 273s | target: EXTRACT_KEY_FROM_KEY 273s | base: base-key@0x8a273bba290 (16-bytes, AES_KEY_GEN) 273s | params: 16-bytes@0x7fffdd835e00 273s | key-offset: 0, key-size: 16 273s | EXTRACT_KEY_FROM_KEY: 273s | target: AES_ECB 273s | flags: SIGN 273s | key_size: 16-bytes 273s | base: base-key@0x8a273bbbbb0 (32-bytes, EXTRACT_KEY_FROM_KEY) 273s | operation: FLAGS_ONLY 273s | params: 8-bytes@0x7fffdd835e08 273s | Computing E[1] using K3 273s | XCBC: K3 273s | c1 a7 ab a1 a2 3a 94 06 58 07 a0 8c c8 ee d0 6e .....:..X......n 273s | XCBC: E[n-1] 273s | 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................ 273s | XCBC: M[n] 273s | 00 01 02 ... 273s | XCBC: M[n] 273s | 00 01 02 ... 273s | XCBC: M[n]:80...^E[n-1]^K3 273s | c1 a6 a9 21 a2 3a 94 06 58 07 a0 8c c8 ee d0 6e ...!.:..X......n 273s | XCBC: MAC 273s | 5b 37 65 80 ae 2f 19 af e7 21 9c ee f1 72 75 6f [7e../...!...ruo 273s | PRF chunk interface PRF AES_XCBC final length 16 273s | 5b 37 65 80 ae 2f 19 af e7 21 9c ee f1 72 75 6f [7e../...!...ruo 273s | chunk output 273s | 5b 37 65 80 ae 2f 19 af e7 21 9c ee f1 72 75 6f [7e../...!...ruo 273s | verify_bytes() RFC 3566 Test Case 2: AES-XCBC-MAC-96 with 3-byte input: prf OUT: ok 273s | CONCATENATE_DATA_AND_BASE: 273s | target: EXTRACT_KEY_FROM_KEY 273s | base: base-key@0x8a273bba290 (16-bytes, AES_KEY_GEN) 273s | params: 16-bytes@0x7fffdd836100 273s | key-offset: 0, key-size: 16 273s | EXTRACT_KEY_FROM_KEY: 273s | target: EXTRACT_KEY_FROM_KEY 273s | key_size: 16-bytes 273s | base: base-key@0x8a273bbe040 (32-bytes, EXTRACT_KEY_FROM_KEY) 273s | operation: FLAGS_ONLY 273s | params: 8-bytes@0x7fffdd836038 273s | PRF symkey interface PRF AES_XCBC init key symkey-key@0x8a273bbd2a0 (size 16) 273s | PRF symkey interface: key symkey-key@0x8a273bbd2a0 (16-bytes, EXTRACT_KEY_FROM_KEY) 273s | XCBC: Key 16=16 just right 273s | key-offset: 0, key-size: 16 273s | EXTRACT_KEY_FROM_KEY: 273s | target: AES_ECB 273s | flags: SIGN 273s | key_size: 16-bytes 273s | base: base-key@0x8a273bbd2a0 (16-bytes, EXTRACT_KEY_FROM_KEY) 273s | operation: FLAGS_ONLY 273s | params: 8-bytes@0x7fffdd835f68 273s | PRF symkey interface PRF AES_XCBC 0x8a273bba230 273s | CONCATENATE_DATA_AND_BASE: 273s | target: EXTRACT_KEY_FROM_KEY 273s | base: base-key@0x8a273bba290 (16-bytes, AES_KEY_GEN) 273s | params: 16-bytes@0x7fffdd836100 273s | key-offset: 0, key-size: 3 273s | EXTRACT_KEY_FROM_KEY: 273s | target: EXTRACT_KEY_FROM_KEY 273s | key_size: 3-bytes 273s | base: base-key@0x8a273bbe380 (19-bytes, EXTRACT_KEY_FROM_KEY) 273s | operation: FLAGS_ONLY 273s | params: 8-bytes@0x7fffdd836038 273s | PRF symkey interface PRF AES_XCBC update symkey message-key@0x8a273bbbbb0 (size 3) 273s | PRF symkey interface: symkey message-key@0x8a273bbbbb0 (3-bytes, EXTRACT_KEY_FROM_KEY) 273s | symkey message extracting all 3 bytes of key@0x8a273bbbbb0 273s | symkey message: symkey-key@0x8a273bbbbb0 (3-bytes, EXTRACT_KEY_FROM_KEY) 273s | sizeof bytes 16 273s | wrapper: (SECItemType)-578593824: a2 94 48 8c f1 67 4c 27 2c 26 51 52 3d 2f 70 f8 273s | symkey message extracted len 16 bytes at 0x8a273bbd5f0 273s | unwrapped: 273s | 00 01 02 00 00 00 00 00 00 00 00 00 00 00 00 00 ................ 273s | XCBC: data 273s | 00 01 02 ... 273s | K extracting all 16 bytes of key@0x8a273bbe040 273s | K: symkey-key@0x8a273bbe040 (16-bytes, AES_ECB) 273s | sizeof bytes 16 273s | wrapper: siDERCertBuffer: 13 a6 f5 2c 45 66 07 05 98 bb e4 84 57 90 b4 46 273s | K extracted len 16 bytes at 0x8a273bba160 273s | unwrapped: 273s | 00 01 02 03 04 05 06 07 08 09 0a 0b 0c 0d 0e 0f ................ 273s | XCBC: K: 273s | 00 01 02 03 04 05 06 07 08 09 0a 0b 0c 0d 0e 0f ................ 273s | XCBC: K1 273s | c3 52 80 57 54 23 7f 31 1a c0 ff f4 e3 e0 3e 78 .R.WT#.1......>x 273s | CONCATENATE_DATA_AND_BASE: 273s | target: EXTRACT_KEY_FROM_KEY 273s | base: base-key@0x8a273bba290 (16-bytes, AES_KEY_GEN) 273s | params: 16-bytes@0x7fffdd835e50 273s | key-offset: 0, key-size: 16 273s | EXTRACT_KEY_FROM_KEY: 273s | target: AES_ECB 273s | flags: SIGN 273s | key_size: 16-bytes 273s | base: base-key@0x8a273bbe6e0 (32-bytes, EXTRACT_KEY_FROM_KEY) 273s | operation: FLAGS_ONLY 273s | params: 8-bytes@0x7fffdd835e58 273s | Computing E[1] using K3 273s | XCBC: K3 273s | c1 a7 ab a1 a2 3a 94 06 58 07 a0 8c c8 ee d0 6e .....:..X......n 273s | XCBC: E[n-1] 273s | 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................ 273s | XCBC: M[n] 273s | 00 01 02 ... 273s | XCBC: M[n] 273s | 00 01 02 ... 273s | XCBC: M[n]:80...^E[n-1]^K3 273s | c1 a6 a9 21 a2 3a 94 06 58 07 a0 8c c8 ee d0 6e ...!.:..X......n 273s | XCBC: MAC 273s | 5b 37 65 80 ae 2f 19 af e7 21 9c ee f1 72 75 6f [7e../...!...ruo 273s | CONCATENATE_DATA_AND_BASE: 273s | target: EXTRACT_KEY_FROM_KEY 273s | base: base-key@0x8a273bba290 (16-bytes, AES_KEY_GEN) 273s | params: 16-bytes@0x7fffdd836020 273s | key-offset: 0, key-size: 16 273s | EXTRACT_KEY_FROM_KEY: 273s | target: EXTRACT_KEY_FROM_KEY 273s | key_size: 16-bytes 273s | base: base-key@0x8a273bbe6e0 (32-bytes, EXTRACT_KEY_FROM_KEY) 273s | operation: FLAGS_ONLY 273s | params: 8-bytes@0x7fffdd835f58 273s | PRF symkey interface PRF AES_XCBC final-key@0x8a273bbe380 (size 16) 273s | PRF symkey interface: key-key@0x8a273bbe380 (16-bytes, EXTRACT_KEY_FROM_KEY) 273s | output: symkey-key@0x8a273bbe380 (16-bytes, EXTRACT_KEY_FROM_KEY) 273s | RFC 3566 Test Case 2: AES-XCBC-MAC-96 with 3-byte input extracting all 16 bytes of key@0x8a273bbe380 273s | RFC 3566 Test Case 2: AES-XCBC-MAC-96 with 3-byte input: symkey-key@0x8a273bbe380 (16-bytes, EXTRACT_KEY_FROM_KEY) 273s | sizeof bytes 16 273s | wrapper: (SECItemType)-578593808: 47 69 18 95 87 98 e0 d6 5e f6 d0 93 7d 52 e8 e5 273s | RFC 3566 Test Case 2: AES-XCBC-MAC-96 with 3-byte input extracted len 16 bytes at 0x8a273bba160 273s | unwrapped: 273s | 5b 37 65 80 ae 2f 19 af e7 21 9c ee f1 72 75 6f [7e../...!...ruo 273s | verify_bytes() RFC 3566 Test Case 2: AES-XCBC-MAC-96 with 3-byte input: symkey: ok 273s ipsec algparse: RFC 3566 Test Case 3: AES-XCBC-MAC-96 with 16-byte input 273s | decode_to_chunk() test_prf_vector: input "0x000102030405060708090a0b0c0d0e0f" 273s | decode_to_chunk() output: 273s | 00 01 02 03 04 05 06 07 08 09 0a 0b 0c 0d 0e 0f ................ 273s | decode_to_chunk() test_prf_vector: input "0x000102030405060708090a0b0c0d0e0f" 273s | decode_to_chunk() output: 273s | 00 01 02 03 04 05 06 07 08 09 0a 0b 0c 0d 0e 0f ................ 273s | decode_to_chunk() test_prf_vector: input "0xd2a246fa349b68a79998a4394ff7a263" 273s | decode_to_chunk() output: 273s | d2 a2 46 fa 34 9b 68 a7 99 98 a4 39 4f f7 a2 63 ..F.4.h....9O..c 273s | PRF chunk interface PRF AES_XCBC init key hunk 0x8a273bbd5d0 (length 16) 273s | 00 01 02 03 04 05 06 07 08 09 0a 0b 0c 0d 0e 0f ................ 273s | CONCATENATE_DATA_AND_BASE: 273s | target: EXTRACT_KEY_FROM_KEY 273s | base: base-key@0x8a273bba290 (16-bytes, AES_KEY_GEN) 273s | params: 16-bytes@0x7fffdd836010 273s | key-offset: 0, key-size: 16 273s | EXTRACT_KEY_FROM_KEY: 273s | target: EXTRACT_KEY_FROM_KEY 273s | key_size: 16-bytes 273s | base: base-key@0x8a273bbd2a0 (32-bytes, EXTRACT_KEY_FROM_KEY) 273s | operation: FLAGS_ONLY 273s | params: 8-bytes@0x7fffdd835f48 273s | XCBC: Key 16=16 just right 273s | key-offset: 0, key-size: 16 273s | EXTRACT_KEY_FROM_KEY: 273s | target: AES_ECB 273s | flags: SIGN 273s | key_size: 16-bytes 273s | base: base-key@0x8a273bbe380 (16-bytes, EXTRACT_KEY_FROM_KEY) 273s | operation: FLAGS_ONLY 273s | params: 8-bytes@0x7fffdd835f18 273s | PRF chunk interface PRF AES_XCBC 0x8a273bba230 273s | PRF chunk interface PRF AES_XCBC update message (0x8a273bbbae0 length 16) 273s | 00 01 02 03 04 05 06 07 08 09 0a 0b 0c 0d 0e 0f ................ 273s | XCBC: data 273s | 00 01 02 03 04 05 06 07 08 09 0a 0b 0c 0d 0e 0f ................ 273s | K extracting all 16 bytes of key@0x8a273bbd2a0 273s | K: symkey-key@0x8a273bbd2a0 (16-bytes, AES_ECB) 273s | sizeof bytes 16 273s | wrapper: (SECItemType)-578592984: 13 a6 f5 2c 45 66 07 05 98 bb e4 84 57 90 b4 46 273s | K extracted len 16 bytes at 0x8a273bbdeb0 273s | unwrapped: 273s | 00 01 02 03 04 05 06 07 08 09 0a 0b 0c 0d 0e 0f ................ 273s | XCBC: K: 273s | 00 01 02 03 04 05 06 07 08 09 0a 0b 0c 0d 0e 0f ................ 273s | XCBC: K1 273s | c3 52 80 57 54 23 7f 31 1a c0 ff f4 e3 e0 3e 78 .R.WT#.1......>x 273s | CONCATENATE_DATA_AND_BASE: 273s | target: EXTRACT_KEY_FROM_KEY 273s | base: base-key@0x8a273bba290 (16-bytes, AES_KEY_GEN) 273s | params: 16-bytes@0x7fffdd835e00 273s | key-offset: 0, key-size: 16 273s | EXTRACT_KEY_FROM_KEY: 273s | target: AES_ECB 273s | flags: SIGN 273s | key_size: 16-bytes 273s | base: base-key@0x8a273bbbbb0 (32-bytes, EXTRACT_KEY_FROM_KEY) 273s | operation: FLAGS_ONLY 273s | params: 8-bytes@0x7fffdd835e08 273s | XCBC: Computing E[1] using K2 273s | XCBC: K2 273s | bd 86 2f fb 97 ad 2f b8 f8 b8 91 f6 03 2f 36 cb ../.../....../6. 273s | XCBC: E[n-1] 273s | 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................ 273s | XCBC: M[n] 273s | 00 01 02 03 04 05 06 07 08 09 0a 0b 0c 0d 0e 0f ................ 273s | XCBC: M[n]^E[n-1]^K2 273s | bd 87 2d f8 93 a8 29 bf f0 b1 9b fd 0f 22 38 c4 ..-...)......"8. 273s | XCBC: MAC 273s | d2 a2 46 fa 34 9b 68 a7 99 98 a4 39 4f f7 a2 63 ..F.4.h....9O..c 273s | PRF chunk interface PRF AES_XCBC final length 16 273s | d2 a2 46 fa 34 9b 68 a7 99 98 a4 39 4f f7 a2 63 ..F.4.h....9O..c 273s | chunk output 273s | d2 a2 46 fa 34 9b 68 a7 99 98 a4 39 4f f7 a2 63 ..F.4.h....9O..c 273s | verify_bytes() RFC 3566 Test Case 3: AES-XCBC-MAC-96 with 16-byte input: prf OUT: ok 273s | CONCATENATE_DATA_AND_BASE: 273s | target: EXTRACT_KEY_FROM_KEY 273s | base: base-key@0x8a273bba290 (16-bytes, AES_KEY_GEN) 273s | params: 16-bytes@0x7fffdd836100 273s | key-offset: 0, key-size: 16 273s | EXTRACT_KEY_FROM_KEY: 273s | target: EXTRACT_KEY_FROM_KEY 273s | key_size: 16-bytes 273s | base: base-key@0x8a273bbe380 (32-bytes, EXTRACT_KEY_FROM_KEY) 273s | operation: FLAGS_ONLY 273s | params: 8-bytes@0x7fffdd836038 273s | PRF symkey interface PRF AES_XCBC init key symkey-key@0x8a273bbd2a0 (size 16) 273s | PRF symkey interface: key symkey-key@0x8a273bbd2a0 (16-bytes, EXTRACT_KEY_FROM_KEY) 273s | XCBC: Key 16=16 just right 273s | key-offset: 0, key-size: 16 273s | EXTRACT_KEY_FROM_KEY: 273s | target: AES_ECB 273s | flags: SIGN 273s | key_size: 16-bytes 273s | base: base-key@0x8a273bbd2a0 (16-bytes, EXTRACT_KEY_FROM_KEY) 273s | operation: FLAGS_ONLY 273s | params: 8-bytes@0x7fffdd835f68 273s | PRF symkey interface PRF AES_XCBC 0x8a273bba230 273s | CONCATENATE_DATA_AND_BASE: 273s | target: EXTRACT_KEY_FROM_KEY 273s | base: base-key@0x8a273bba290 (16-bytes, AES_KEY_GEN) 273s | params: 16-bytes@0x7fffdd836100 273s | key-offset: 0, key-size: 16 273s | EXTRACT_KEY_FROM_KEY: 273s | target: EXTRACT_KEY_FROM_KEY 273s | key_size: 16-bytes 273s | base: base-key@0x8a273bbe040 (32-bytes, EXTRACT_KEY_FROM_KEY) 273s | operation: FLAGS_ONLY 273s | params: 8-bytes@0x7fffdd836038 273s | PRF symkey interface PRF AES_XCBC update symkey message-key@0x8a273bbbbb0 (size 16) 273s | PRF symkey interface: symkey message-key@0x8a273bbbbb0 (16-bytes, EXTRACT_KEY_FROM_KEY) 273s | symkey message extracting all 16 bytes of key@0x8a273bbbbb0 273s | symkey message: symkey-key@0x8a273bbbbb0 (16-bytes, EXTRACT_KEY_FROM_KEY) 273s | sizeof bytes 16 273s | wrapper: (SECItemType)-578593824: 13 a6 f5 2c 45 66 07 05 98 bb e4 84 57 90 b4 46 273s | symkey message extracted len 16 bytes at 0x8a273bbdeb0 273s | unwrapped: 273s | 00 01 02 03 04 05 06 07 08 09 0a 0b 0c 0d 0e 0f ................ 273s | XCBC: data 273s | 00 01 02 03 04 05 06 07 08 09 0a 0b 0c 0d 0e 0f ................ 273s | K extracting all 16 bytes of key@0x8a273bbe380 273s | K: symkey-key@0x8a273bbe380 (16-bytes, AES_ECB) 273s | sizeof bytes 16 273s | wrapper: (SECItemType)16: 13 a6 f5 2c 45 66 07 05 98 bb e4 84 57 90 b4 46 273s | K extracted len 16 bytes at 0x8a273bb9fc0 273s | unwrapped: 273s | 00 01 02 03 04 05 06 07 08 09 0a 0b 0c 0d 0e 0f ................ 273s | XCBC: K: 273s | 00 01 02 03 04 05 06 07 08 09 0a 0b 0c 0d 0e 0f ................ 273s | XCBC: K1 273s | c3 52 80 57 54 23 7f 31 1a c0 ff f4 e3 e0 3e 78 .R.WT#.1......>x 273s | CONCATENATE_DATA_AND_BASE: 273s | target: EXTRACT_KEY_FROM_KEY 273s | base: base-key@0x8a273bba290 (16-bytes, AES_KEY_GEN) 273s | params: 16-bytes@0x7fffdd835e50 273s | key-offset: 0, key-size: 16 273s | EXTRACT_KEY_FROM_KEY: 273s | target: AES_ECB 273s | flags: SIGN 273s | key_size: 16-bytes 273s | base: base-key@0x8a273bbe6e0 (32-bytes, EXTRACT_KEY_FROM_KEY) 273s | operation: FLAGS_ONLY 273s | params: 8-bytes@0x7fffdd835e58 273s | XCBC: Computing E[1] using K2 273s | XCBC: K2 273s | bd 86 2f fb 97 ad 2f b8 f8 b8 91 f6 03 2f 36 cb ../.../....../6. 273s | XCBC: E[n-1] 273s | 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................ 273s | XCBC: M[n] 273s | 00 01 02 03 04 05 06 07 08 09 0a 0b 0c 0d 0e 0f ................ 273s | XCBC: M[n]^E[n-1]^K2 273s | bd 87 2d f8 93 a8 29 bf f0 b1 9b fd 0f 22 38 c4 ..-...)......"8. 273s | XCBC: MAC 273s | d2 a2 46 fa 34 9b 68 a7 99 98 a4 39 4f f7 a2 63 ..F.4.h....9O..c 273s | CONCATENATE_DATA_AND_BASE: 273s | target: EXTRACT_KEY_FROM_KEY 273s | base: base-key@0x8a273bba290 (16-bytes, AES_KEY_GEN) 273s | params: 16-bytes@0x7fffdd836020 273s | key-offset: 0, key-size: 16 273s | EXTRACT_KEY_FROM_KEY: 273s | target: EXTRACT_KEY_FROM_KEY 273s | key_size: 16-bytes 273s | base: base-key@0x8a273bbe6e0 (32-bytes, EXTRACT_KEY_FROM_KEY) 273s | operation: FLAGS_ONLY 273s | params: 8-bytes@0x7fffdd835f58 273s | PRF symkey interface PRF AES_XCBC final-key@0x8a273bbe040 (size 16) 273s | PRF symkey interface: key-key@0x8a273bbe040 (16-bytes, EXTRACT_KEY_FROM_KEY) 273s | output: symkey-key@0x8a273bbe040 (16-bytes, EXTRACT_KEY_FROM_KEY) 273s | RFC 3566 Test Case 3: AES-XCBC-MAC-96 with 16-byte input extracting all 16 bytes of key@0x8a273bbe040 273s | RFC 3566 Test Case 3: AES-XCBC-MAC-96 with 16-byte input: symkey-key@0x8a273bbe040 (16-bytes, EXTRACT_KEY_FROM_KEY) 273s | sizeof bytes 16 273s | wrapper: (SECItemType)-578593808: 37 77 20 d1 75 db 04 67 9d 37 2d 39 1d 25 6f ec 273s | RFC 3566 Test Case 3: AES-XCBC-MAC-96 with 16-byte input extracted len 16 bytes at 0x8a273bb9fc0 273s | unwrapped: 273s | d2 a2 46 fa 34 9b 68 a7 99 98 a4 39 4f f7 a2 63 ..F.4.h....9O..c 273s | verify_bytes() RFC 3566 Test Case 3: AES-XCBC-MAC-96 with 16-byte input: symkey: ok 273s ipsec algparse: RFC 3566 Test Case 4: AES-XCBC-MAC-96 with 20-byte input 273s | decode_to_chunk() test_prf_vector: input "0x000102030405060708090a0b0c0d0e0f" 273s | decode_to_chunk() output: 273s | 00 01 02 03 04 05 06 07 08 09 0a 0b 0c 0d 0e 0f ................ 273s | decode_to_chunk() test_prf_vector: input "0x000102030405060708090a0b0c0d0e0f10111213" 273s | decode_to_chunk() output: 273s | 00 01 02 03 04 05 06 07 08 09 0a 0b 0c 0d 0e 0f ................ 273s | 10 11 12 13 .... 273s | decode_to_chunk() test_prf_vector: input "0x47f51b4564966215b8985c63055ed308" 273s | decode_to_chunk() output: 273s | 47 f5 1b 45 64 96 62 15 b8 98 5c 63 05 5e d3 08 G..Ed.b...\c.^.. 273s | PRF chunk interface PRF AES_XCBC init key hunk 0x8a273bbd5d0 (length 16) 273s | 00 01 02 03 04 05 06 07 08 09 0a 0b 0c 0d 0e 0f ................ 273s | CONCATENATE_DATA_AND_BASE: 273s | target: EXTRACT_KEY_FROM_KEY 273s | base: base-key@0x8a273bba290 (16-bytes, AES_KEY_GEN) 273s | params: 16-bytes@0x7fffdd836010 273s | key-offset: 0, key-size: 16 273s | EXTRACT_KEY_FROM_KEY: 273s | target: EXTRACT_KEY_FROM_KEY 273s | key_size: 16-bytes 273s | base: base-key@0x8a273bbd2a0 (32-bytes, EXTRACT_KEY_FROM_KEY) 273s | operation: FLAGS_ONLY 273s | params: 8-bytes@0x7fffdd835f48 273s | XCBC: Key 16=16 just right 273s | key-offset: 0, key-size: 16 273s | EXTRACT_KEY_FROM_KEY: 273s | target: AES_ECB 273s | flags: SIGN 273s | key_size: 16-bytes 273s | base: base-key@0x8a273bbe040 (16-bytes, EXTRACT_KEY_FROM_KEY) 273s | operation: FLAGS_ONLY 273s | params: 8-bytes@0x7fffdd835f18 273s | PRF chunk interface PRF AES_XCBC 0x8a273bba230 273s | PRF chunk interface PRF AES_XCBC update message (0x8a273bbbae0 length 20) 273s | 00 01 02 03 04 05 06 07 08 09 0a 0b 0c 0d 0e 0f ................ 273s | 10 11 12 13 .... 273s | XCBC: data 273s | 00 01 02 03 04 05 06 07 08 09 0a 0b 0c 0d 0e 0f ................ 273s | 10 11 12 13 .... 273s | K extracting all 16 bytes of key@0x8a273bbd2a0 273s | K: symkey-key@0x8a273bbd2a0 (16-bytes, AES_ECB) 273s | sizeof bytes 16 273s | wrapper: (SECItemType)-578592984: 13 a6 f5 2c 45 66 07 05 98 bb e4 84 57 90 b4 46 273s | K extracted len 16 bytes at 0x8a273bbea20 273s | unwrapped: 273s | 00 01 02 03 04 05 06 07 08 09 0a 0b 0c 0d 0e 0f ................ 273s | XCBC: K: 273s | 00 01 02 03 04 05 06 07 08 09 0a 0b 0c 0d 0e 0f ................ 273s | XCBC: K1 273s | c3 52 80 57 54 23 7f 31 1a c0 ff f4 e3 e0 3e 78 .R.WT#.1......>x 273s | CONCATENATE_DATA_AND_BASE: 273s | target: EXTRACT_KEY_FROM_KEY 273s | base: base-key@0x8a273bba290 (16-bytes, AES_KEY_GEN) 273s | params: 16-bytes@0x7fffdd835e00 273s | key-offset: 0, key-size: 16 273s | EXTRACT_KEY_FROM_KEY: 273s | target: AES_ECB 273s | flags: SIGN 273s | key_size: 16-bytes 273s | base: base-key@0x8a273bbbbb0 (32-bytes, EXTRACT_KEY_FROM_KEY) 273s | operation: FLAGS_ONLY 273s | params: 8-bytes@0x7fffdd835e08 273s | Computing E[2] using K3 273s | XCBC: K3 273s | c1 a7 ab a1 a2 3a 94 06 58 07 a0 8c c8 ee d0 6e .....:..X......n 273s | XCBC: E[n-1] 273s | 1d 04 48 fa cf 4d 9c 6f 55 b9 93 da 09 80 3d b3 ..H..M.oU.....=. 273s | XCBC: M[n] 273s | 10 11 12 13 .... 273s | XCBC: M[n] 273s | 10 11 12 13 .... 273s | XCBC: M[n]:80...^E[n-1]^K3 273s | cc b2 f1 48 ed 77 08 69 0d be 33 56 c1 6e ed dd ...H.w.i..3V.n.. 273s | XCBC: MAC 273s | 47 f5 1b 45 64 96 62 15 b8 98 5c 63 05 5e d3 08 G..Ed.b...\c.^.. 273s | PRF chunk interface PRF AES_XCBC final length 16 273s | 47 f5 1b 45 64 96 62 15 b8 98 5c 63 05 5e d3 08 G..Ed.b...\c.^.. 273s | chunk output 273s | 47 f5 1b 45 64 96 62 15 b8 98 5c 63 05 5e d3 08 G..Ed.b...\c.^.. 273s | verify_bytes() RFC 3566 Test Case 4: AES-XCBC-MAC-96 with 20-byte input: prf OUT: ok 273s | CONCATENATE_DATA_AND_BASE: 273s | target: EXTRACT_KEY_FROM_KEY 273s | base: base-key@0x8a273bba290 (16-bytes, AES_KEY_GEN) 273s | params: 16-bytes@0x7fffdd836100 273s | key-offset: 0, key-size: 16 273s | EXTRACT_KEY_FROM_KEY: 273s | target: EXTRACT_KEY_FROM_KEY 273s | key_size: 16-bytes 273s | base: base-key@0x8a273bbe040 (32-bytes, EXTRACT_KEY_FROM_KEY) 273s | operation: FLAGS_ONLY 273s | params: 8-bytes@0x7fffdd836038 273s | PRF symkey interface PRF AES_XCBC init key symkey-key@0x8a273bbd2a0 (size 16) 273s | PRF symkey interface: key symkey-key@0x8a273bbd2a0 (16-bytes, EXTRACT_KEY_FROM_KEY) 273s | XCBC: Key 16=16 just right 273s | key-offset: 0, key-size: 16 273s | EXTRACT_KEY_FROM_KEY: 273s | target: AES_ECB 273s | flags: SIGN 273s | key_size: 16-bytes 273s | base: base-key@0x8a273bbd2a0 (16-bytes, EXTRACT_KEY_FROM_KEY) 273s | operation: FLAGS_ONLY 273s | params: 8-bytes@0x7fffdd835f68 273s | PRF symkey interface PRF AES_XCBC 0x8a273bba230 273s | CONCATENATE_DATA_AND_BASE: 273s | target: EXTRACT_KEY_FROM_KEY 273s | base: base-key@0x8a273bba290 (16-bytes, AES_KEY_GEN) 273s | params: 16-bytes@0x7fffdd836100 273s | key-offset: 0, key-size: 20 273s | EXTRACT_KEY_FROM_KEY: 273s | target: EXTRACT_KEY_FROM_KEY 273s | key_size: 20-bytes 273s | base: base-key@0x8a273bbe380 (36-bytes, EXTRACT_KEY_FROM_KEY) 273s | operation: FLAGS_ONLY 273s | params: 8-bytes@0x7fffdd836038 273s | PRF symkey interface PRF AES_XCBC update symkey message-key@0x8a273bbbbb0 (size 20) 273s | PRF symkey interface: symkey message-key@0x8a273bbbbb0 (20-bytes, EXTRACT_KEY_FROM_KEY) 273s | symkey message extracting all 20 bytes of key@0x8a273bbbbb0 273s | symkey message: symkey-key@0x8a273bbbbb0 (20-bytes, EXTRACT_KEY_FROM_KEY) 273s | sizeof bytes 32 273s | wrapper: (SECItemType)-578593824: 13 a6 f5 2c 45 66 07 05 98 bb e4 84 57 90 b4 46 ee b7 65 d9 26 b2 fe 1e 50 56 29 1e f0 8b d5 a6 273s | symkey message extracted len 32 bytes at 0x8a273bbdc20 273s | unwrapped: 273s | 00 01 02 03 04 05 06 07 08 09 0a 0b 0c 0d 0e 0f ................ 273s | 10 11 12 13 00 00 00 00 00 00 00 00 00 00 00 00 ................ 273s | XCBC: data 273s | 00 01 02 03 04 05 06 07 08 09 0a 0b 0c 0d 0e 0f ................ 273s | 10 11 12 13 .... 273s | K extracting all 16 bytes of key@0x8a273bbe040 273s | K: symkey-key@0x8a273bbe040 (16-bytes, AES_ECB) 273s | sizeof bytes 16 273s | wrapper: (SECItemType)20: 13 a6 f5 2c 45 66 07 05 98 bb e4 84 57 90 b4 46 273s | K extracted len 16 bytes at 0x8a273bba160 273s | unwrapped: 273s | 00 01 02 03 04 05 06 07 08 09 0a 0b 0c 0d 0e 0f ................ 273s | XCBC: K: 273s | 00 01 02 03 04 05 06 07 08 09 0a 0b 0c 0d 0e 0f ................ 273s | XCBC: K1 273s | c3 52 80 57 54 23 7f 31 1a c0 ff f4 e3 e0 3e 78 .R.WT#.1......>x 273s | CONCATENATE_DATA_AND_BASE: 273s | target: EXTRACT_KEY_FROM_KEY 273s | base: base-key@0x8a273bba290 (16-bytes, AES_KEY_GEN) 273s | params: 16-bytes@0x7fffdd835e50 273s | key-offset: 0, key-size: 16 273s | EXTRACT_KEY_FROM_KEY: 273s | target: AES_ECB 273s | flags: SIGN 273s | key_size: 16-bytes 273s | base: base-key@0x8a273bbe6e0 (32-bytes, EXTRACT_KEY_FROM_KEY) 273s | operation: FLAGS_ONLY 273s | params: 8-bytes@0x7fffdd835e58 273s | Computing E[2] using K3 273s | XCBC: K3 273s | c1 a7 ab a1 a2 3a 94 06 58 07 a0 8c c8 ee d0 6e .....:..X......n 273s | XCBC: E[n-1] 273s | 1d 04 48 fa cf 4d 9c 6f 55 b9 93 da 09 80 3d b3 ..H..M.oU.....=. 273s | XCBC: M[n] 273s | 10 11 12 13 .... 273s | XCBC: M[n] 273s | 10 11 12 13 .... 273s | XCBC: M[n]:80...^E[n-1]^K3 273s | cc b2 f1 48 ed 77 08 69 0d be 33 56 c1 6e ed dd ...H.w.i..3V.n.. 273s | XCBC: MAC 273s | 47 f5 1b 45 64 96 62 15 b8 98 5c 63 05 5e d3 08 G..Ed.b...\c.^.. 273s | CONCATENATE_DATA_AND_BASE: 273s | target: EXTRACT_KEY_FROM_KEY 273s | base: base-key@0x8a273bba290 (16-bytes, AES_KEY_GEN) 273s | params: 16-bytes@0x7fffdd836020 273s | key-offset: 0, key-size: 16 273s | EXTRACT_KEY_FROM_KEY: 273s | target: EXTRACT_KEY_FROM_KEY 273s | key_size: 16-bytes 273s | base: base-key@0x8a273bbe6e0 (32-bytes, EXTRACT_KEY_FROM_KEY) 273s | operation: FLAGS_ONLY 273s | params: 8-bytes@0x7fffdd835f58 273s | PRF symkey interface PRF AES_XCBC final-key@0x8a273bbe380 (size 16) 273s | PRF symkey interface: key-key@0x8a273bbe380 (16-bytes, EXTRACT_KEY_FROM_KEY) 273s | output: symkey-key@0x8a273bbe380 (16-bytes, EXTRACT_KEY_FROM_KEY) 273s | RFC 3566 Test Case 4: AES-XCBC-MAC-96 with 20-byte input extracting all 16 bytes of key@0x8a273bbe380 273s | RFC 3566 Test Case 4: AES-XCBC-MAC-96 with 20-byte input: symkey-key@0x8a273bbe380 (16-bytes, EXTRACT_KEY_FROM_KEY) 273s | sizeof bytes 16 273s | wrapper: (SECItemType)-578593808: dc b7 04 1f 35 e6 60 e4 2a e1 96 9c 69 bf b4 01 273s | RFC 3566 Test Case 4: AES-XCBC-MAC-96 with 20-byte input extracted len 16 bytes at 0x8a273bba160 273s | unwrapped: 273s | 47 f5 1b 45 64 96 62 15 b8 98 5c 63 05 5e d3 08 G..Ed.b...\c.^.. 273s | verify_bytes() RFC 3566 Test Case 4: AES-XCBC-MAC-96 with 20-byte input: symkey: ok 273s ipsec algparse: RFC 3566 Test Case 5: AES-XCBC-MAC-96 with 32-byte input 273s | decode_to_chunk() test_prf_vector: input "0x000102030405060708090a0b0c0d0e0f" 273s | decode_to_chunk() output: 273s | 00 01 02 03 04 05 06 07 08 09 0a 0b 0c 0d 0e 0f ................ 273s | decode_to_chunk() test_prf_vector: input "0x000102030405060708090a0b0c0d0e0f101112131415161718191a1b1c1d1e1f" 273s | decode_to_chunk() output: 273s | 00 01 02 03 04 05 06 07 08 09 0a 0b 0c 0d 0e 0f ................ 273s | 10 11 12 13 14 15 16 17 18 19 1a 1b 1c 1d 1e 1f ................ 273s | decode_to_chunk() test_prf_vector: input "0xf54f0ec8d2b9f3d36807734bd5283fd4" 273s | decode_to_chunk() output: 273s | f5 4f 0e c8 d2 b9 f3 d3 68 07 73 4b d5 28 3f d4 .O......h.sK.(?. 273s | PRF chunk interface PRF AES_XCBC init key hunk 0x8a273bbd5d0 (length 16) 273s | 00 01 02 03 04 05 06 07 08 09 0a 0b 0c 0d 0e 0f ................ 273s | CONCATENATE_DATA_AND_BASE: 273s | target: EXTRACT_KEY_FROM_KEY 273s | base: base-key@0x8a273bba290 (16-bytes, AES_KEY_GEN) 273s | params: 16-bytes@0x7fffdd836010 273s | key-offset: 0, key-size: 16 273s | EXTRACT_KEY_FROM_KEY: 273s | target: EXTRACT_KEY_FROM_KEY 273s | key_size: 16-bytes 273s | base: base-key@0x8a273bbd2a0 (32-bytes, EXTRACT_KEY_FROM_KEY) 273s | operation: FLAGS_ONLY 273s | params: 8-bytes@0x7fffdd835f48 273s | XCBC: Key 16=16 just right 273s | key-offset: 0, key-size: 16 273s | EXTRACT_KEY_FROM_KEY: 273s | target: AES_ECB 273s | flags: SIGN 273s | key_size: 16-bytes 273s | base: base-key@0x8a273bbe380 (16-bytes, EXTRACT_KEY_FROM_KEY) 273s | operation: FLAGS_ONLY 273s | params: 8-bytes@0x7fffdd835f18 273s | PRF chunk interface PRF AES_XCBC 0x8a273bbdc20 273s | PRF chunk interface PRF AES_XCBC update message (0x8a273bba230 length 32) 273s | 00 01 02 03 04 05 06 07 08 09 0a 0b 0c 0d 0e 0f ................ 273s | 10 11 12 13 14 15 16 17 18 19 1a 1b 1c 1d 1e 1f ................ 273s | XCBC: data 273s | 00 01 02 03 04 05 06 07 08 09 0a 0b 0c 0d 0e 0f ................ 273s | 10 11 12 13 14 15 16 17 18 19 1a 1b 1c 1d 1e 1f ................ 273s | K extracting all 16 bytes of key@0x8a273bbd2a0 273s | K: symkey-key@0x8a273bbd2a0 (16-bytes, AES_ECB) 273s | sizeof bytes 16 273s | wrapper: (SECItemType)-578592984: 13 a6 f5 2c 45 66 07 05 98 bb e4 84 57 90 b4 46 273s | K extracted len 16 bytes at 0x8a273bbd8e0 273s | unwrapped: 273s | 00 01 02 03 04 05 06 07 08 09 0a 0b 0c 0d 0e 0f ................ 273s | XCBC: K: 273s | 00 01 02 03 04 05 06 07 08 09 0a 0b 0c 0d 0e 0f ................ 273s | XCBC: K1 273s | c3 52 80 57 54 23 7f 31 1a c0 ff f4 e3 e0 3e 78 .R.WT#.1......>x 273s | CONCATENATE_DATA_AND_BASE: 273s | target: EXTRACT_KEY_FROM_KEY 273s | base: base-key@0x8a273bba290 (16-bytes, AES_KEY_GEN) 273s | params: 16-bytes@0x7fffdd835e00 273s | key-offset: 0, key-size: 16 273s | EXTRACT_KEY_FROM_KEY: 273s | target: AES_ECB 273s | flags: SIGN 273s | key_size: 16-bytes 273s | base: base-key@0x8a273bbbbb0 (32-bytes, EXTRACT_KEY_FROM_KEY) 273s | operation: FLAGS_ONLY 273s | params: 8-bytes@0x7fffdd835e08 273s | XCBC: Computing E[2] using K2 273s | XCBC: K2 273s | bd 86 2f fb 97 ad 2f b8 f8 b8 91 f6 03 2f 36 cb ../.../....../6. 273s | XCBC: E[n-1] 273s | 1d 04 48 fa cf 4d 9c 6f 55 b9 93 da 09 80 3d b3 ..H..M.oU.....=. 273s | XCBC: M[n] 273s | 10 11 12 13 14 15 16 17 18 19 1a 1b 1c 1d 1e 1f ................ 273s | XCBC: M[n]^E[n-1]^K2 273s | b0 93 75 12 4c f5 a5 c0 b5 18 18 37 16 b2 15 67 ..u.L......7...g 273s | XCBC: MAC 273s | f5 4f 0e c8 d2 b9 f3 d3 68 07 73 4b d5 28 3f d4 .O......h.sK.(?. 273s | PRF chunk interface PRF AES_XCBC final length 16 273s | f5 4f 0e c8 d2 b9 f3 d3 68 07 73 4b d5 28 3f d4 .O......h.sK.(?. 273s | chunk output 273s | f5 4f 0e c8 d2 b9 f3 d3 68 07 73 4b d5 28 3f d4 .O......h.sK.(?. 273s | verify_bytes() RFC 3566 Test Case 5: AES-XCBC-MAC-96 with 32-byte input: prf OUT: ok 273s | CONCATENATE_DATA_AND_BASE: 273s | target: EXTRACT_KEY_FROM_KEY 273s | base: base-key@0x8a273bba290 (16-bytes, AES_KEY_GEN) 273s | params: 16-bytes@0x7fffdd836100 273s | key-offset: 0, key-size: 16 273s | EXTRACT_KEY_FROM_KEY: 273s | target: EXTRACT_KEY_FROM_KEY 273s | key_size: 16-bytes 273s | base: base-key@0x8a273bbe380 (32-bytes, EXTRACT_KEY_FROM_KEY) 273s | operation: FLAGS_ONLY 273s | params: 8-bytes@0x7fffdd836038 273s | PRF symkey interface PRF AES_XCBC init key symkey-key@0x8a273bbd2a0 (size 16) 273s | PRF symkey interface: key symkey-key@0x8a273bbd2a0 (16-bytes, EXTRACT_KEY_FROM_KEY) 273s | XCBC: Key 16=16 just right 273s | key-offset: 0, key-size: 16 273s | EXTRACT_KEY_FROM_KEY: 273s | target: AES_ECB 273s | flags: SIGN 273s | key_size: 16-bytes 273s | base: base-key@0x8a273bbd2a0 (16-bytes, EXTRACT_KEY_FROM_KEY) 273s | operation: FLAGS_ONLY 273s | params: 8-bytes@0x7fffdd835f68 273s | PRF symkey interface PRF AES_XCBC 0x8a273bbdc20 273s | CONCATENATE_DATA_AND_BASE: 273s | target: EXTRACT_KEY_FROM_KEY 273s | base: base-key@0x8a273bba290 (16-bytes, AES_KEY_GEN) 273s | params: 16-bytes@0x7fffdd836100 273s | key-offset: 0, key-size: 32 273s | EXTRACT_KEY_FROM_KEY: 273s | target: EXTRACT_KEY_FROM_KEY 273s | key_size: 32-bytes 273s | base: base-key@0x8a273bbe040 (48-bytes, EXTRACT_KEY_FROM_KEY) 273s | operation: FLAGS_ONLY 273s | params: 8-bytes@0x7fffdd836038 273s | PRF symkey interface PRF AES_XCBC update symkey message-key@0x8a273bbbbb0 (size 32) 273s | PRF symkey interface: symkey message-key@0x8a273bbbbb0 (32-bytes, EXTRACT_KEY_FROM_KEY) 273s | symkey message extracting all 32 bytes of key@0x8a273bbbbb0 273s | symkey message: symkey-key@0x8a273bbbbb0 (32-bytes, EXTRACT_KEY_FROM_KEY) 273s | sizeof bytes 32 273s | wrapper: (SECItemType)-578593824: 13 a6 f5 2c 45 66 07 05 98 bb e4 84 57 90 b4 46 a9 7d 91 58 7b e3 70 4a db 14 7a 8b 12 2b a4 d6 273s | symkey message extracted len 32 bytes at 0x8a273bbe9a0 273s | unwrapped: 273s | 00 01 02 03 04 05 06 07 08 09 0a 0b 0c 0d 0e 0f ................ 273s | 10 11 12 13 14 15 16 17 18 19 1a 1b 1c 1d 1e 1f ................ 273s | XCBC: data 273s | 00 01 02 03 04 05 06 07 08 09 0a 0b 0c 0d 0e 0f ................ 273s | 10 11 12 13 14 15 16 17 18 19 1a 1b 1c 1d 1e 1f ................ 273s | K extracting all 16 bytes of key@0x8a273bbe380 273s | K: symkey-key@0x8a273bbe380 (16-bytes, AES_ECB) 273s | sizeof bytes 16 273s | wrapper: (SECItemType)32: 13 a6 f5 2c 45 66 07 05 98 bb e4 84 57 90 b4 46 273s | K extracted len 16 bytes at 0x8a273bbd5f0 273s | unwrapped: 273s | 00 01 02 03 04 05 06 07 08 09 0a 0b 0c 0d 0e 0f ................ 273s | XCBC: K: 273s | 00 01 02 03 04 05 06 07 08 09 0a 0b 0c 0d 0e 0f ................ 273s | XCBC: K1 273s | c3 52 80 57 54 23 7f 31 1a c0 ff f4 e3 e0 3e 78 .R.WT#.1......>x 273s | CONCATENATE_DATA_AND_BASE: 273s | target: EXTRACT_KEY_FROM_KEY 273s | base: base-key@0x8a273bba290 (16-bytes, AES_KEY_GEN) 273s | params: 16-bytes@0x7fffdd835e50 273s | key-offset: 0, key-size: 16 273s | EXTRACT_KEY_FROM_KEY: 273s | target: AES_ECB 273s | flags: SIGN 273s | key_size: 16-bytes 273s | base: base-key@0x8a273bbe6e0 (32-bytes, EXTRACT_KEY_FROM_KEY) 273s | operation: FLAGS_ONLY 273s | params: 8-bytes@0x7fffdd835e58 273s | XCBC: Computing E[2] using K2 273s | XCBC: K2 273s | bd 86 2f fb 97 ad 2f b8 f8 b8 91 f6 03 2f 36 cb ../.../....../6. 273s | XCBC: E[n-1] 273s | 1d 04 48 fa cf 4d 9c 6f 55 b9 93 da 09 80 3d b3 ..H..M.oU.....=. 273s | XCBC: M[n] 273s | 10 11 12 13 14 15 16 17 18 19 1a 1b 1c 1d 1e 1f ................ 273s | XCBC: M[n]^E[n-1]^K2 273s | b0 93 75 12 4c f5 a5 c0 b5 18 18 37 16 b2 15 67 ..u.L......7...g 273s | XCBC: MAC 273s | f5 4f 0e c8 d2 b9 f3 d3 68 07 73 4b d5 28 3f d4 .O......h.sK.(?. 273s | CONCATENATE_DATA_AND_BASE: 273s | target: EXTRACT_KEY_FROM_KEY 273s | base: base-key@0x8a273bba290 (16-bytes, AES_KEY_GEN) 273s | params: 16-bytes@0x7fffdd836020 273s | key-offset: 0, key-size: 16 273s | EXTRACT_KEY_FROM_KEY: 273s | target: EXTRACT_KEY_FROM_KEY 273s | key_size: 16-bytes 273s | base: base-key@0x8a273bbe6e0 (32-bytes, EXTRACT_KEY_FROM_KEY) 273s | operation: FLAGS_ONLY 273s | params: 8-bytes@0x7fffdd835f58 273s | PRF symkey interface PRF AES_XCBC final-key@0x8a273bbe040 (size 16) 273s | PRF symkey interface: key-key@0x8a273bbe040 (16-bytes, EXTRACT_KEY_FROM_KEY) 273s | output: symkey-key@0x8a273bbe040 (16-bytes, EXTRACT_KEY_FROM_KEY) 273s | RFC 3566 Test Case 5: AES-XCBC-MAC-96 with 32-byte input extracting all 16 bytes of key@0x8a273bbe040 273s | RFC 3566 Test Case 5: AES-XCBC-MAC-96 with 32-byte input: symkey-key@0x8a273bbe040 (16-bytes, EXTRACT_KEY_FROM_KEY) 273s | sizeof bytes 16 273s | wrapper: (SECItemType)-578593808: 18 76 c9 75 d9 12 6c 60 4f 9e 0d da 02 9b 00 e3 273s | RFC 3566 Test Case 5: AES-XCBC-MAC-96 with 32-byte input extracted len 16 bytes at 0x8a273bbdeb0 273s | unwrapped: 273s | f5 4f 0e c8 d2 b9 f3 d3 68 07 73 4b d5 28 3f d4 .O......h.sK.(?. 273s | verify_bytes() RFC 3566 Test Case 5: AES-XCBC-MAC-96 with 32-byte input: symkey: ok 273s ipsec algparse: RFC 3566 Test Case 6: AES-XCBC-MAC-96 with 34-byte input 273s | decode_to_chunk() test_prf_vector: input "0x000102030405060708090a0b0c0d0e0f" 273s | decode_to_chunk() output: 273s | 00 01 02 03 04 05 06 07 08 09 0a 0b 0c 0d 0e 0f ................ 273s | decode_to_chunk() test_prf_vector: input "0x000102030405060708090a0b0c0d0e0f101112131415161718191a1b1c1d1e1f2021" 273s | decode_to_chunk() output: 273s | 00 01 02 03 04 05 06 07 08 09 0a 0b 0c 0d 0e 0f ................ 273s | 10 11 12 13 14 15 16 17 18 19 1a 1b 1c 1d 1e 1f ................ 273s | 20 21 ! 273s | decode_to_chunk() test_prf_vector: input "0xbecbb3bccdb518a30677d5481fb6b4d8" 273s | decode_to_chunk() output: 273s | be cb b3 bc cd b5 18 a3 06 77 d5 48 1f b6 b4 d8 .........w.H.... 273s | PRF chunk interface PRF AES_XCBC init key hunk 0x8a273bbbae0 (length 16) 273s | 00 01 02 03 04 05 06 07 08 09 0a 0b 0c 0d 0e 0f ................ 273s | CONCATENATE_DATA_AND_BASE: 273s | target: EXTRACT_KEY_FROM_KEY 273s | base: base-key@0x8a273bba290 (16-bytes, AES_KEY_GEN) 273s | params: 16-bytes@0x7fffdd836010 273s | key-offset: 0, key-size: 16 273s | EXTRACT_KEY_FROM_KEY: 273s | target: EXTRACT_KEY_FROM_KEY 273s | key_size: 16-bytes 273s | base: base-key@0x8a273bbd2a0 (32-bytes, EXTRACT_KEY_FROM_KEY) 273s | operation: FLAGS_ONLY 273s | params: 8-bytes@0x7fffdd835f48 273s | XCBC: Key 16=16 just right 273s | key-offset: 0, key-size: 16 273s | EXTRACT_KEY_FROM_KEY: 273s | target: AES_ECB 273s | flags: SIGN 273s | key_size: 16-bytes 273s | base: base-key@0x8a273bbe040 (16-bytes, EXTRACT_KEY_FROM_KEY) 273s | operation: FLAGS_ONLY 273s | params: 8-bytes@0x7fffdd835f18 273s | PRF chunk interface PRF AES_XCBC 0x8a273bba230 273s | PRF chunk interface PRF AES_XCBC update message (0x8a273bba260 length 34) 273s | 00 01 02 03 04 05 06 07 08 09 0a 0b 0c 0d 0e 0f ................ 273s | 10 11 12 13 14 15 16 17 18 19 1a 1b 1c 1d 1e 1f ................ 273s | 20 21 ! 273s | XCBC: data 273s | 00 01 02 03 04 05 06 07 08 09 0a 0b 0c 0d 0e 0f ................ 273s | 10 11 12 13 14 15 16 17 18 19 1a 1b 1c 1d 1e 1f ................ 273s | 20 21 ! 273s | K extracting all 16 bytes of key@0x8a273bbd2a0 273s | K: symkey-key@0x8a273bbd2a0 (16-bytes, AES_ECB) 273s | sizeof bytes 16 273s | wrapper: (SECItemType)-578592984: 13 a6 f5 2c 45 66 07 05 98 bb e4 84 57 90 b4 46 273s | K extracted len 16 bytes at 0x8a273bbd5f0 273s | unwrapped: 273s | 00 01 02 03 04 05 06 07 08 09 0a 0b 0c 0d 0e 0f ................ 273s | XCBC: K: 273s | 00 01 02 03 04 05 06 07 08 09 0a 0b 0c 0d 0e 0f ................ 273s | XCBC: K1 273s | c3 52 80 57 54 23 7f 31 1a c0 ff f4 e3 e0 3e 78 .R.WT#.1......>x 273s | CONCATENATE_DATA_AND_BASE: 273s | target: EXTRACT_KEY_FROM_KEY 273s | base: base-key@0x8a273bba290 (16-bytes, AES_KEY_GEN) 273s | params: 16-bytes@0x7fffdd835e00 273s | key-offset: 0, key-size: 16 273s | EXTRACT_KEY_FROM_KEY: 273s | target: AES_ECB 273s | flags: SIGN 273s | key_size: 16-bytes 273s | base: base-key@0x8a273bbbbb0 (32-bytes, EXTRACT_KEY_FROM_KEY) 273s | operation: FLAGS_ONLY 273s | params: 8-bytes@0x7fffdd835e08 273s | Computing E[3] using K3 273s | XCBC: K3 273s | c1 a7 ab a1 a2 3a 94 06 58 07 a0 8c c8 ee d0 6e .....:..X......n 273s | XCBC: E[n-1] 273s | 09 02 5e 5a 67 25 20 72 44 14 5c 6b 80 66 85 79 ..^Zg% rD.\k.f.y 273s | XCBC: M[n] 273s | 20 21 ! 273s | XCBC: M[n] 273s | 20 21 ! 273s | XCBC: M[n]:80...^E[n-1]^K3 273s | e8 84 75 fb c5 1f b4 74 1c 13 fc e7 48 88 55 17 ..u....t....H.U. 273s | XCBC: MAC 273s | be cb b3 bc cd b5 18 a3 06 77 d5 48 1f b6 b4 d8 .........w.H.... 273s | PRF chunk interface PRF AES_XCBC final length 16 273s | be cb b3 bc cd b5 18 a3 06 77 d5 48 1f b6 b4 d8 .........w.H.... 273s | chunk output 273s | be cb b3 bc cd b5 18 a3 06 77 d5 48 1f b6 b4 d8 .........w.H.... 273s | verify_bytes() RFC 3566 Test Case 6: AES-XCBC-MAC-96 with 34-byte input: prf OUT: ok 273s | CONCATENATE_DATA_AND_BASE: 273s | target: EXTRACT_KEY_FROM_KEY 273s | base: base-key@0x8a273bba290 (16-bytes, AES_KEY_GEN) 273s | params: 16-bytes@0x7fffdd836100 273s | key-offset: 0, key-size: 16 273s | EXTRACT_KEY_FROM_KEY: 273s | target: EXTRACT_KEY_FROM_KEY 273s | key_size: 16-bytes 273s | base: base-key@0x8a273bbe040 (32-bytes, EXTRACT_KEY_FROM_KEY) 273s | operation: FLAGS_ONLY 273s | params: 8-bytes@0x7fffdd836038 273s | PRF symkey interface PRF AES_XCBC init key symkey-key@0x8a273bbd2a0 (size 16) 273s | PRF symkey interface: key symkey-key@0x8a273bbd2a0 (16-bytes, EXTRACT_KEY_FROM_KEY) 273s | XCBC: Key 16=16 just right 273s | key-offset: 0, key-size: 16 273s | EXTRACT_KEY_FROM_KEY: 273s | target: AES_ECB 273s | flags: SIGN 273s | key_size: 16-bytes 273s | base: base-key@0x8a273bbd2a0 (16-bytes, EXTRACT_KEY_FROM_KEY) 273s | operation: FLAGS_ONLY 273s | params: 8-bytes@0x7fffdd835f68 273s | PRF symkey interface PRF AES_XCBC 0x8a273bba230 273s | CONCATENATE_DATA_AND_BASE: 273s | target: EXTRACT_KEY_FROM_KEY 273s | base: base-key@0x8a273bba290 (16-bytes, AES_KEY_GEN) 273s | params: 16-bytes@0x7fffdd836100 273s | key-offset: 0, key-size: 34 273s | EXTRACT_KEY_FROM_KEY: 273s | target: EXTRACT_KEY_FROM_KEY 273s | key_size: 34-bytes 273s | base: base-key@0x8a273bbe380 (50-bytes, EXTRACT_KEY_FROM_KEY) 273s | operation: FLAGS_ONLY 273s | params: 8-bytes@0x7fffdd836038 273s | PRF symkey interface PRF AES_XCBC update symkey message-key@0x8a273bbbbb0 (size 34) 273s | PRF symkey interface: symkey message-key@0x8a273bbbbb0 (34-bytes, EXTRACT_KEY_FROM_KEY) 273s | symkey message extracting all 34 bytes of key@0x8a273bbbbb0 273s | symkey message: symkey-key@0x8a273bbbbb0 (34-bytes, EXTRACT_KEY_FROM_KEY) 273s | sizeof bytes 48 273s | wrapper: (SECItemType)-578593824: 13 a6 f5 2c 45 66 07 05 98 bb e4 84 57 90 b4 46 a9 7d 91 58 7b e3 70 4a db 14 7a 8b 12 2b a4 d6 ce 7c 05 73 c2 a4 74 36 92 52 a9 a5 30 ae 47 9e 273s | symkey message extracted len 48 bytes at 0x8a273bbd900 273s | unwrapped: 273s | 00 01 02 03 04 05 06 07 08 09 0a 0b 0c 0d 0e 0f ................ 273s | 10 11 12 13 14 15 16 17 18 19 1a 1b 1c 1d 1e 1f ................ 273s | 20 21 00 00 00 00 00 00 00 00 00 00 00 00 00 00 !.............. 273s | XCBC: data 273s | 00 01 02 03 04 05 06 07 08 09 0a 0b 0c 0d 0e 0f ................ 273s | 10 11 12 13 14 15 16 17 18 19 1a 1b 1c 1d 1e 1f ................ 273s | 20 21 ! 273s | K extracting all 16 bytes of key@0x8a273bbe040 273s | K: symkey-key@0x8a273bbe040 (16-bytes, AES_ECB) 273s | sizeof bytes 16 273s | wrapper: (SECItemType)34: 13 a6 f5 2c 45 66 07 05 98 bb e4 84 57 90 b4 46 273s | K extracted len 16 bytes at 0x8a273bbd8e0 273s | unwrapped: 273s | 00 01 02 03 04 05 06 07 08 09 0a 0b 0c 0d 0e 0f ................ 273s | XCBC: K: 273s | 00 01 02 03 04 05 06 07 08 09 0a 0b 0c 0d 0e 0f ................ 273s | XCBC: K1 273s | c3 52 80 57 54 23 7f 31 1a c0 ff f4 e3 e0 3e 78 .R.WT#.1......>x 273s | CONCATENATE_DATA_AND_BASE: 273s | target: EXTRACT_KEY_FROM_KEY 273s | base: base-key@0x8a273bba290 (16-bytes, AES_KEY_GEN) 273s | params: 16-bytes@0x7fffdd835e50 273s | key-offset: 0, key-size: 16 273s | EXTRACT_KEY_FROM_KEY: 273s | target: AES_ECB 273s | flags: SIGN 273s | key_size: 16-bytes 273s | base: base-key@0x8a273bbe6e0 (32-bytes, EXTRACT_KEY_FROM_KEY) 273s | operation: FLAGS_ONLY 273s | params: 8-bytes@0x7fffdd835e58 273s | Computing E[3] using K3 273s | XCBC: K3 273s | c1 a7 ab a1 a2 3a 94 06 58 07 a0 8c c8 ee d0 6e .....:..X......n 273s | XCBC: E[n-1] 273s | 09 02 5e 5a 67 25 20 72 44 14 5c 6b 80 66 85 79 ..^Zg% rD.\k.f.y 273s | XCBC: M[n] 273s | 20 21 ! 273s | XCBC: M[n] 273s | 20 21 ! 273s | XCBC: M[n]:80...^E[n-1]^K3 273s | e8 84 75 fb c5 1f b4 74 1c 13 fc e7 48 88 55 17 ..u....t....H.U. 273s | XCBC: MAC 273s | be cb b3 bc cd b5 18 a3 06 77 d5 48 1f b6 b4 d8 .........w.H.... 273s | CONCATENATE_DATA_AND_BASE: 273s | target: EXTRACT_KEY_FROM_KEY 273s | base: base-key@0x8a273bba290 (16-bytes, AES_KEY_GEN) 273s | params: 16-bytes@0x7fffdd836020 273s | key-offset: 0, key-size: 16 273s | EXTRACT_KEY_FROM_KEY: 273s | target: EXTRACT_KEY_FROM_KEY 273s | key_size: 16-bytes 273s | base: base-key@0x8a273bbe6e0 (32-bytes, EXTRACT_KEY_FROM_KEY) 273s | operation: FLAGS_ONLY 273s | params: 8-bytes@0x7fffdd835f58 273s | PRF symkey interface PRF AES_XCBC final-key@0x8a273bbe380 (size 16) 273s | PRF symkey interface: key-key@0x8a273bbe380 (16-bytes, EXTRACT_KEY_FROM_KEY) 273s | output: symkey-key@0x8a273bbe380 (16-bytes, EXTRACT_KEY_FROM_KEY) 273s | RFC 3566 Test Case 6: AES-XCBC-MAC-96 with 34-byte input extracting all 16 bytes of key@0x8a273bbe380 273s | RFC 3566 Test Case 6: AES-XCBC-MAC-96 with 34-byte input: symkey-key@0x8a273bbe380 (16-bytes, EXTRACT_KEY_FROM_KEY) 273s | sizeof bytes 16 273s | wrapper: (SECItemType)-578593808: d7 8a 2c 1b 9d 44 78 20 5d fa 58 ea 03 08 b6 50 273s | RFC 3566 Test Case 6: AES-XCBC-MAC-96 with 34-byte input extracted len 16 bytes at 0x8a273bbe020 273s | unwrapped: 273s | be cb b3 bc cd b5 18 a3 06 77 d5 48 1f b6 b4 d8 .........w.H.... 273s | verify_bytes() RFC 3566 Test Case 6: AES-XCBC-MAC-96 with 34-byte input: symkey: ok 273s ipsec algparse: RFC 3566 Test Case 7: AES-XCBC-MAC-96 with 1000-byte input 273s | decode_to_chunk() test_prf_vector: input "0x000102030405060708090a0b0c0d0e0f" 273s | decode_to_chunk() output: 273s | 00 01 02 03 04 05 06 07 08 09 0a 0b 0c 0d 0e 0f ................ 273s | decode_to_chunk() test_prf_vector: input "0xf0dafee895db30253761103b5d84528f" 273s | decode_to_chunk() output: 273s | f0 da fe e8 95 db 30 25 37 61 10 3b 5d 84 52 8f ......0%7a.;].R. 273s | PRF chunk interface PRF AES_XCBC init key hunk 0x8a273bba160 (length 16) 273s | 00 01 02 03 04 05 06 07 08 09 0a 0b 0c 0d 0e 0f ................ 273s | CONCATENATE_DATA_AND_BASE: 273s | target: EXTRACT_KEY_FROM_KEY 273s | base: base-key@0x8a273bba290 (16-bytes, AES_KEY_GEN) 273s | params: 16-bytes@0x7fffdd836010 273s | key-offset: 0, key-size: 16 273s | EXTRACT_KEY_FROM_KEY: 273s | target: EXTRACT_KEY_FROM_KEY 273s | key_size: 16-bytes 273s | base: base-key@0x8a273bbd2a0 (32-bytes, EXTRACT_KEY_FROM_KEY) 273s | operation: FLAGS_ONLY 273s | params: 8-bytes@0x7fffdd835f48 273s | XCBC: Key 16=16 just right 273s | key-offset: 0, key-size: 16 273s | EXTRACT_KEY_FROM_KEY: 273s | target: AES_ECB 273s | flags: SIGN 273s | key_size: 16-bytes 273s | base: base-key@0x8a273bbe380 (16-bytes, EXTRACT_KEY_FROM_KEY) 273s | operation: FLAGS_ONLY 273s | params: 8-bytes@0x7fffdd835f18 273s | PRF chunk interface PRF AES_XCBC 0x8a273bbdc20 273s | PRF chunk interface PRF AES_XCBC update message (0x8a273bbbce0 length 1000) 273s | 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................ 273s | 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................ 273s | 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................ 273s | 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................ 273s | 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................ 273s | 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................ 273s | 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................ 273s | 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................ 273s | 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................ 273s | 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................ 273s | 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................ 273s | 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................ 273s | 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................ 273s | 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................ 273s | 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................ 273s | 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................ 273s | 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................ 273s | 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................ 273s | 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................ 273s | 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................ 273s | 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................ 273s | 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................ 273s | 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................ 273s | 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................ 273s | 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................ 273s | 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................ 273s | 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................ 273s | 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................ 273s | 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................ 273s | 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................ 273s | 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................ 273s | 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................ 273s | 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................ 273s | 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................ 273s | 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................ 273s | 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................ 273s | 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................ 273s | 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................ 273s | 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................ 273s | 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................ 273s | 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................ 273s | 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................ 273s | 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................ 273s | 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................ 273s | 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................ 273s | 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................ 273s | 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................ 273s | 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................ 273s | 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................ 273s | 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................ 273s | 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................ 273s | 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................ 273s | 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................ 273s | 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................ 273s | 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................ 273s | 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................ 273s | 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................ 273s | 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................ 273s | 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................ 273s | 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................ 273s | 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................ 273s | 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................ 273s | 00 00 00 00 00 00 00 00 ........ 273s | XCBC: data 273s | 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................ 273s | 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................ 273s | 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................ 273s | 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................ 273s | 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................ 273s | 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................ 273s | 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................ 273s | 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................ 273s | 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................ 273s | 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................ 273s | 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................ 273s | 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................ 273s | 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................ 273s | 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................ 273s | 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................ 273s | 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................ 273s | 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................ 273s | 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................ 273s | 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................ 273s | 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................ 273s | 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................ 273s | 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................ 273s | 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................ 273s | 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................ 273s | 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................ 273s | 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................ 273s | 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................ 273s | 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................ 273s | 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................ 273s | 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................ 273s | 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................ 273s | 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................ 273s | 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................ 273s | 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................ 273s | 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................ 273s | 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................ 273s | 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................ 273s | 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................ 273s | 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................ 273s | 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................ 273s | 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................ 273s | 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................ 273s | 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................ 273s | 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................ 273s | 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................ 273s | 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................ 273s | 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................ 273s | 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................ 273s | 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................ 273s | 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................ 273s | 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................ 273s | 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................ 273s | 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................ 273s | 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................ 273s | 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................ 273s | 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................ 273s | 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................ 273s | 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................ 273s | 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................ 273s | 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................ 273s | 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................ 273s | 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................ 273s | 00 00 00 00 00 00 00 00 ........ 273s | K extracting all 16 bytes of key@0x8a273bbd2a0 273s | K: symkey-key@0x8a273bbd2a0 (16-bytes, AES_ECB) 273s | sizeof bytes 16 273s | wrapper: (SECItemType)-578592984: 13 a6 f5 2c 45 66 07 05 98 bb e4 84 57 90 b4 46 273s | K extracted len 16 bytes at 0x8a273bbd8e0 273s | unwrapped: 273s | 00 01 02 03 04 05 06 07 08 09 0a 0b 0c 0d 0e 0f ................ 273s | XCBC: K: 273s | 00 01 02 03 04 05 06 07 08 09 0a 0b 0c 0d 0e 0f ................ 273s | XCBC: K1 273s | c3 52 80 57 54 23 7f 31 1a c0 ff f4 e3 e0 3e 78 .R.WT#.1......>x 273s | CONCATENATE_DATA_AND_BASE: 273s | target: EXTRACT_KEY_FROM_KEY 273s | base: base-key@0x8a273bba290 (16-bytes, AES_KEY_GEN) 273s | params: 16-bytes@0x7fffdd835e00 273s | key-offset: 0, key-size: 16 273s | EXTRACT_KEY_FROM_KEY: 273s | target: AES_ECB 273s | flags: SIGN 273s | key_size: 16-bytes 273s | base: base-key@0x8a273bbbbb0 (32-bytes, EXTRACT_KEY_FROM_KEY) 273s | operation: FLAGS_ONLY 273s | params: 8-bytes@0x7fffdd835e08 273s | Computing E[63] using K3 273s | XCBC: K3 273s | c1 a7 ab a1 a2 3a 94 06 58 07 a0 8c c8 ee d0 6e .....:..X......n 273s | XCBC: E[n-1] 273s | 5c 88 af cc 1e 1e 83 fc c4 2c 0c e4 12 12 f5 17 \........,...... 273s | XCBC: M[n] 273s | 00 00 00 00 00 00 00 00 ........ 273s | XCBC: M[n] 273s | 00 00 00 00 00 00 00 00 ........ 273s | XCBC: M[n]:80...^E[n-1]^K3 273s | 9d 2f 04 6d bc 24 17 fa 1c 2b ac 68 da fc 25 79 ./.m.$...+.h..%y 273s | XCBC: MAC 273s | f0 da fe e8 95 db 30 25 37 61 10 3b 5d 84 52 8f ......0%7a.;].R. 273s | PRF chunk interface PRF AES_XCBC final length 16 273s | f0 da fe e8 95 db 30 25 37 61 10 3b 5d 84 52 8f ......0%7a.;].R. 273s | chunk output 273s | f0 da fe e8 95 db 30 25 37 61 10 3b 5d 84 52 8f ......0%7a.;].R. 273s | verify_bytes() RFC 3566 Test Case 7: AES-XCBC-MAC-96 with 1000-byte input: prf OUT: ok 273s | CONCATENATE_DATA_AND_BASE: 273s | target: EXTRACT_KEY_FROM_KEY 273s | base: base-key@0x8a273bba290 (16-bytes, AES_KEY_GEN) 273s | params: 16-bytes@0x7fffdd836100 273s | key-offset: 0, key-size: 16 273s | EXTRACT_KEY_FROM_KEY: 273s | target: EXTRACT_KEY_FROM_KEY 273s | key_size: 16-bytes 273s | base: base-key@0x8a273bbe380 (32-bytes, EXTRACT_KEY_FROM_KEY) 273s | operation: FLAGS_ONLY 273s | params: 8-bytes@0x7fffdd836038 273s | PRF symkey interface PRF AES_XCBC init key symkey-key@0x8a273bbd2a0 (size 16) 273s | PRF symkey interface: key symkey-key@0x8a273bbd2a0 (16-bytes, EXTRACT_KEY_FROM_KEY) 273s | XCBC: Key 16=16 just right 273s | key-offset: 0, key-size: 16 273s | EXTRACT_KEY_FROM_KEY: 273s | target: AES_ECB 273s | flags: SIGN 273s | key_size: 16-bytes 273s | base: base-key@0x8a273bbd2a0 (16-bytes, EXTRACT_KEY_FROM_KEY) 273s | operation: FLAGS_ONLY 273s | params: 8-bytes@0x7fffdd835f68 273s | PRF symkey interface PRF AES_XCBC 0x8a273bbdc20 273s | CONCATENATE_DATA_AND_BASE: 273s | target: EXTRACT_KEY_FROM_KEY 273s | base: base-key@0x8a273bba290 (16-bytes, AES_KEY_GEN) 273s | params: 16-bytes@0x7fffdd836100 273s | key-offset: 0, key-size: 1000 273s | EXTRACT_KEY_FROM_KEY: 273s | target: EXTRACT_KEY_FROM_KEY 273s | key_size: 1000-bytes 273s | base: base-key@0x8a273bbe040 (1016-bytes, EXTRACT_KEY_FROM_KEY) 273s | operation: FLAGS_ONLY 273s | params: 8-bytes@0x7fffdd836038 273s | PRF symkey interface PRF AES_XCBC update symkey message-key@0x8a273bbbbb0 (size 1000) 273s | PRF symkey interface: symkey message-key@0x8a273bbbbb0 (1000-bytes, EXTRACT_KEY_FROM_KEY) 273s | symkey message extracting all 1000 bytes of key@0x8a273bbbbb0 273s | symkey message: symkey-key@0x8a273bbbbb0 (1000-bytes, EXTRACT_KEY_FROM_KEY) 273s | sizeof bytes 1008 273s | wrapper: (SECItemType)-578593824: 05 11 ab 18 5f bc d5 b8 f4 42 5a 78 4a 88 7d dc 05 11 ab 18 5f bc d5 b8 f4 42 5a 78 4a 88 7d dc 05 11 ab 18 5f bc d5 b8 f4 42 5a 78 4a 88 7d dc 05 11 ab 18 5f bc d5 b8 f4 42 5a 78 4a 88 7d dc 05 11 ab 18 5f bc d5 b8 f4 42 5a 78 4a 88 7d dc 05 11 ab 18 5f bc d5 b8 f4 42 5a 78 4a 88 7d dc 05 11 ab 18 5f bc d5 b8 f4 42 5a 78 4a 88 7d dc 05 11 ab 18 5f bc d5 b8 f4 42 5a 78 4a 88 7d dc 05 11 ab 18 5f bc d5 b8 f4 42 5a 78 4a 88 7d dc 05 11 ab 18 5f bc d5 b8 f4 42 5a 78 4a 88 7d dc 05 11 ab 18 5f bc d5 b8 f4 42 5a 78 4a 88 7d dc 05 11 ab 18 5f bc d5 b8 f4 42 5a 78 4a 88 7d dc 05 11 ab 18 5f bc d5 b8 f4 42 5a 78 4a 88 7d dc 05 11 ab 18 5f bc d5 b8 f4 42 5a 78 4a 88 7d dc 05 11 ab 18 5f bc d5 b8 f4 42 5a 78 4a 88 7d dc 05 11 ab 18 5f bc d5 b8 f4 42 5a 78 4a 88 7d dc 05 11 ab 18 5f bc d5 b8 f4 42 5a 78 4a 88 7d dc 05 11 ab 18 5f bc d5 b8 f4 42 5a 78 4a 88 7d dc 05 11 ab 18 5f bc d5 b8 f4 42 5a 78 4a 88 7d... 273s | symkey message extracted len 1008 bytes at 0x8a273bbc8c0 273s | unwrapped: 273s | 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................ 273s | 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................ 273s | 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................ 273s | 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................ 273s | 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................ 273s | 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................ 273s | 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................ 273s | 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................ 273s | 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................ 273s | 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................ 273s | 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................ 273s | 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................ 273s | 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................ 273s | 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................ 273s | 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................ 273s | 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................ 273s | 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................ 273s | 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................ 273s | 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................ 273s | 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................ 273s | 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................ 273s | 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................ 273s | 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................ 273s | 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................ 273s | 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................ 273s | 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................ 273s | 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................ 273s | 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................ 273s | 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................ 273s | 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................ 273s | 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................ 273s | 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................ 273s | 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................ 273s | 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................ 273s | 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................ 273s | 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................ 273s | 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................ 273s | 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................ 273s | 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................ 273s | 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................ 273s | 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................ 273s | 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................ 273s | 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................ 273s | 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................ 273s | 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................ 273s | 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................ 273s | 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................ 273s | 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................ 273s | 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................ 273s | 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................ 273s | 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................ 273s | 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................ 273s | 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................ 273s | 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................ 273s | 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................ 273s | 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................ 273s | 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................ 273s | 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................ 273s | 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................ 273s | 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................ 273s | 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................ 273s | 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................ 273s | 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................ 273s | XCBC: data 273s | 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................ 273s | 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................ 273s | 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................ 273s | 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................ 273s | 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................ 273s | 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................ 273s | 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................ 273s | 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................ 273s | 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................ 273s | 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................ 273s | 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................ 273s | 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................ 273s | 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................ 273s | 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................ 273s | 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................ 273s | 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................ 273s | 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................ 273s | 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................ 273s | 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................ 273s | 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................ 273s | 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................ 273s | 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................ 273s | 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................ 273s | 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................ 273s | 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................ 273s | 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................ 273s | 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................ 273s | 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................ 273s | 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................ 273s | 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................ 273s | 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................ 273s | 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................ 273s | 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................ 273s | 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................ 273s | 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................ 273s | 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................ 273s | 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................ 273s | 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................ 273s | 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................ 273s | 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................ 273s | 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................ 273s | 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................ 273s | 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................ 273s | 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................ 273s | 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................ 273s | 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................ 273s | 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................ 273s | 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................ 273s | 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................ 273s | 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................ 273s | 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................ 273s | 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................ 273s | 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................ 273s | 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................ 273s | 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................ 273s | 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................ 273s | 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................ 273s | 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................ 273s | 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................ 273s | 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................ 273s | 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................ 273s | 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................ 273s | 00 00 00 00 00 00 00 00 ........ 273s | K extracting all 16 bytes of key@0x8a273bbe380 273s | K: symkey-key@0x8a273bbe380 (16-bytes, AES_ECB) 273s | sizeof bytes 16 273s | wrapper: (SECItemType)1000: 13 a6 f5 2c 45 66 07 05 98 bb e4 84 57 90 b4 46 273s | K extracted len 16 bytes at 0x8a273bbd5f0 273s | unwrapped: 273s | 00 01 02 03 04 05 06 07 08 09 0a 0b 0c 0d 0e 0f ................ 273s | XCBC: K: 273s | 00 01 02 03 04 05 06 07 08 09 0a 0b 0c 0d 0e 0f ................ 273s | XCBC: K1 273s | c3 52 80 57 54 23 7f 31 1a c0 ff f4 e3 e0 3e 78 .R.WT#.1......>x 273s | CONCATENATE_DATA_AND_BASE: 273s | target: EXTRACT_KEY_FROM_KEY 273s | base: base-key@0x8a273bba290 (16-bytes, AES_KEY_GEN) 273s | params: 16-bytes@0x7fffdd835e50 273s | key-offset: 0, key-size: 16 273s | EXTRACT_KEY_FROM_KEY: 273s | target: AES_ECB 273s | flags: SIGN 273s | key_size: 16-bytes 273s | base: base-key@0x8a273bbe6e0 (32-bytes, EXTRACT_KEY_FROM_KEY) 273s | operation: FLAGS_ONLY 273s | params: 8-bytes@0x7fffdd835e58 273s | Computing E[63] using K3 273s | XCBC: K3 273s | c1 a7 ab a1 a2 3a 94 06 58 07 a0 8c c8 ee d0 6e .....:..X......n 273s | XCBC: E[n-1] 273s | 5c 88 af cc 1e 1e 83 fc c4 2c 0c e4 12 12 f5 17 \........,...... 273s | XCBC: M[n] 273s | 00 00 00 00 00 00 00 00 ........ 273s | XCBC: M[n] 273s | 00 00 00 00 00 00 00 00 ........ 273s | XCBC: M[n]:80...^E[n-1]^K3 273s | 9d 2f 04 6d bc 24 17 fa 1c 2b ac 68 da fc 25 79 ./.m.$...+.h..%y 273s | XCBC: MAC 273s | f0 da fe e8 95 db 30 25 37 61 10 3b 5d 84 52 8f ......0%7a.;].R. 273s | CONCATENATE_DATA_AND_BASE: 273s | target: EXTRACT_KEY_FROM_KEY 273s | base: base-key@0x8a273bba290 (16-bytes, AES_KEY_GEN) 273s | params: 16-bytes@0x7fffdd836020 273s | key-offset: 0, key-size: 16 273s | EXTRACT_KEY_FROM_KEY: 273s | target: EXTRACT_KEY_FROM_KEY 273s | key_size: 16-bytes 273s | base: base-key@0x8a273bbe6e0 (32-bytes, EXTRACT_KEY_FROM_KEY) 273s | operation: FLAGS_ONLY 273s | params: 8-bytes@0x7fffdd835f58 273s | PRF symkey interface PRF AES_XCBC final-key@0x8a273bbe040 (size 16) 273s | PRF symkey interface: key-key@0x8a273bbe040 (16-bytes, EXTRACT_KEY_FROM_KEY) 273s | output: symkey-key@0x8a273bbe040 (16-bytes, EXTRACT_KEY_FROM_KEY) 273s | RFC 3566 Test Case 7: AES-XCBC-MAC-96 with 1000-byte input extracting all 16 bytes of key@0x8a273bbe040 273s | RFC 3566 Test Case 7: AES-XCBC-MAC-96 with 1000-byte input: symkey-key@0x8a273bbe040 (16-bytes, EXTRACT_KEY_FROM_KEY) 273s | sizeof bytes 16 273s | wrapper: (SECItemType)-578593808: e0 18 f1 d5 fb bc 32 a9 dd be 5f 38 13 78 d6 29 273s | RFC 3566 Test Case 7: AES-XCBC-MAC-96 with 1000-byte input extracted len 16 bytes at 0x8a273bbdeb0 273s | unwrapped: 273s | f0 da fe e8 95 db 30 25 37 61 10 3b 5d 84 52 8f ......0%7a.;].R. 273s | verify_bytes() RFC 3566 Test Case 7: AES-XCBC-MAC-96 with 1000-byte input: symkey: ok 273s ipsec algparse: RFC 4434 Test Case AES-XCBC-PRF-128 with 20-byte input (key length 16) 273s | decode_to_chunk() test_prf_vector: input "0x000102030405060708090a0b0c0d0e0f" 273s | decode_to_chunk() output: 273s | 00 01 02 03 04 05 06 07 08 09 0a 0b 0c 0d 0e 0f ................ 273s | decode_to_chunk() test_prf_vector: input "0x000102030405060708090a0b0c0d0e0f10111213" 273s | decode_to_chunk() output: 273s | 00 01 02 03 04 05 06 07 08 09 0a 0b 0c 0d 0e 0f ................ 273s | 10 11 12 13 .... 273s | decode_to_chunk() test_prf_vector: input "0x47f51b4564966215b8985c63055ed308" 273s | decode_to_chunk() output: 273s | 47 f5 1b 45 64 96 62 15 b8 98 5c 63 05 5e d3 08 G..Ed.b...\c.^.. 273s | PRF chunk interface PRF AES_XCBC init key hunk 0x8a273bbd5d0 (length 16) 273s | 00 01 02 03 04 05 06 07 08 09 0a 0b 0c 0d 0e 0f ................ 273s | CONCATENATE_DATA_AND_BASE: 273s | target: EXTRACT_KEY_FROM_KEY 273s | base: base-key@0x8a273bba290 (16-bytes, AES_KEY_GEN) 273s | params: 16-bytes@0x7fffdd836010 273s | key-offset: 0, key-size: 16 273s | EXTRACT_KEY_FROM_KEY: 273s | target: EXTRACT_KEY_FROM_KEY 273s | key_size: 16-bytes 273s | base: base-key@0x8a273bbd2a0 (32-bytes, EXTRACT_KEY_FROM_KEY) 273s | operation: FLAGS_ONLY 273s | params: 8-bytes@0x7fffdd835f48 273s | XCBC: Key 16=16 just right 273s | key-offset: 0, key-size: 16 273s | EXTRACT_KEY_FROM_KEY: 273s | target: AES_ECB 273s | flags: SIGN 273s | key_size: 16-bytes 273s | base: base-key@0x8a273bbe040 (16-bytes, EXTRACT_KEY_FROM_KEY) 273s | operation: FLAGS_ONLY 273s | params: 8-bytes@0x7fffdd835f18 273s | PRF chunk interface PRF AES_XCBC 0x8a273bbdc20 273s | PRF chunk interface PRF AES_XCBC update message (0x8a273bbbae0 length 20) 273s | 00 01 02 03 04 05 06 07 08 09 0a 0b 0c 0d 0e 0f ................ 273s | 10 11 12 13 .... 273s | XCBC: data 273s | 00 01 02 03 04 05 06 07 08 09 0a 0b 0c 0d 0e 0f ................ 273s | 10 11 12 13 .... 273s | K extracting all 16 bytes of key@0x8a273bbd2a0 273s | K: symkey-key@0x8a273bbd2a0 (16-bytes, AES_ECB) 273s | sizeof bytes 16 273s | wrapper: (SECItemType)-578592984: 13 a6 f5 2c 45 66 07 05 98 bb e4 84 57 90 b4 46 273s | K extracted len 16 bytes at 0x8a273bbe6c0 273s | unwrapped: 273s | 00 01 02 03 04 05 06 07 08 09 0a 0b 0c 0d 0e 0f ................ 273s | XCBC: K: 273s | 00 01 02 03 04 05 06 07 08 09 0a 0b 0c 0d 0e 0f ................ 273s | XCBC: K1 273s | c3 52 80 57 54 23 7f 31 1a c0 ff f4 e3 e0 3e 78 .R.WT#.1......>x 273s | CONCATENATE_DATA_AND_BASE: 273s | target: EXTRACT_KEY_FROM_KEY 273s | base: base-key@0x8a273bba290 (16-bytes, AES_KEY_GEN) 273s | params: 16-bytes@0x7fffdd835e00 273s | key-offset: 0, key-size: 16 273s | EXTRACT_KEY_FROM_KEY: 273s | target: AES_ECB 273s | flags: SIGN 273s | key_size: 16-bytes 273s | base: base-key@0x8a273bbbbb0 (32-bytes, EXTRACT_KEY_FROM_KEY) 273s | operation: FLAGS_ONLY 273s | params: 8-bytes@0x7fffdd835e08 273s | Computing E[2] using K3 273s | XCBC: K3 273s | c1 a7 ab a1 a2 3a 94 06 58 07 a0 8c c8 ee d0 6e .....:..X......n 273s | XCBC: E[n-1] 273s | 1d 04 48 fa cf 4d 9c 6f 55 b9 93 da 09 80 3d b3 ..H..M.oU.....=. 273s | XCBC: M[n] 273s | 10 11 12 13 .... 273s | XCBC: M[n] 273s | 10 11 12 13 .... 273s | XCBC: M[n]:80...^E[n-1]^K3 273s | cc b2 f1 48 ed 77 08 69 0d be 33 56 c1 6e ed dd ...H.w.i..3V.n.. 273s | XCBC: MAC 273s | 47 f5 1b 45 64 96 62 15 b8 98 5c 63 05 5e d3 08 G..Ed.b...\c.^.. 273s | PRF chunk interface PRF AES_XCBC final length 16 273s | 47 f5 1b 45 64 96 62 15 b8 98 5c 63 05 5e d3 08 G..Ed.b...\c.^.. 273s | chunk output 273s | 47 f5 1b 45 64 96 62 15 b8 98 5c 63 05 5e d3 08 G..Ed.b...\c.^.. 273s | verify_bytes() RFC 4434 Test Case AES-XCBC-PRF-128 with 20-byte input (key length 16): prf OUT: ok 273s | CONCATENATE_DATA_AND_BASE: 273s | target: EXTRACT_KEY_FROM_KEY 273s | base: base-key@0x8a273bba290 (16-bytes, AES_KEY_GEN) 273s | params: 16-bytes@0x7fffdd836100 273s | key-offset: 0, key-size: 16 273s | EXTRACT_KEY_FROM_KEY: 273s | target: EXTRACT_KEY_FROM_KEY 273s | key_size: 16-bytes 273s | base: base-key@0x8a273bbe040 (32-bytes, EXTRACT_KEY_FROM_KEY) 273s | operation: FLAGS_ONLY 273s | params: 8-bytes@0x7fffdd836038 273s | PRF symkey interface PRF AES_XCBC init key symkey-key@0x8a273bbd2a0 (size 16) 273s | PRF symkey interface: key symkey-key@0x8a273bbd2a0 (16-bytes, EXTRACT_KEY_FROM_KEY) 273s | XCBC: Key 16=16 just right 273s | key-offset: 0, key-size: 16 273s | EXTRACT_KEY_FROM_KEY: 273s | target: AES_ECB 273s | flags: SIGN 273s | key_size: 16-bytes 273s | base: base-key@0x8a273bbd2a0 (16-bytes, EXTRACT_KEY_FROM_KEY) 273s | operation: FLAGS_ONLY 273s | params: 8-bytes@0x7fffdd835f68 273s | PRF symkey interface PRF AES_XCBC 0x8a273bbdc20 273s | CONCATENATE_DATA_AND_BASE: 273s | target: EXTRACT_KEY_FROM_KEY 273s | base: base-key@0x8a273bba290 (16-bytes, AES_KEY_GEN) 273s | params: 16-bytes@0x7fffdd836100 273s | key-offset: 0, key-size: 20 273s | EXTRACT_KEY_FROM_KEY: 273s | target: EXTRACT_KEY_FROM_KEY 273s | key_size: 20-bytes 273s | base: base-key@0x8a273bbe380 (36-bytes, EXTRACT_KEY_FROM_KEY) 273s | operation: FLAGS_ONLY 273s | params: 8-bytes@0x7fffdd836038 273s | PRF symkey interface PRF AES_XCBC update symkey message-key@0x8a273bbbbb0 (size 20) 273s | PRF symkey interface: symkey message-key@0x8a273bbbbb0 (20-bytes, EXTRACT_KEY_FROM_KEY) 273s | symkey message extracting all 20 bytes of key@0x8a273bbbbb0 273s | symkey message: symkey-key@0x8a273bbbbb0 (20-bytes, EXTRACT_KEY_FROM_KEY) 273s | sizeof bytes 32 273s | wrapper: (SECItemType)-578593824: 13 a6 f5 2c 45 66 07 05 98 bb e4 84 57 90 b4 46 ee b7 65 d9 26 b2 fe 1e 50 56 29 1e f0 8b d5 a6 273s | symkey message extracted len 32 bytes at 0x8a273bba230 273s | unwrapped: 273s | 00 01 02 03 04 05 06 07 08 09 0a 0b 0c 0d 0e 0f ................ 273s | 10 11 12 13 00 00 00 00 00 00 00 00 00 00 00 00 ................ 273s | XCBC: data 273s | 00 01 02 03 04 05 06 07 08 09 0a 0b 0c 0d 0e 0f ................ 273s | 10 11 12 13 .... 273s | K extracting all 16 bytes of key@0x8a273bbe040 273s | K: symkey-key@0x8a273bbe040 (16-bytes, AES_ECB) 273s | sizeof bytes 16 273s | wrapper: (SECItemType)20: 13 a6 f5 2c 45 66 07 05 98 bb e4 84 57 90 b4 46 273s | K extracted len 16 bytes at 0x8a273bbd8e0 273s | unwrapped: 273s | 00 01 02 03 04 05 06 07 08 09 0a 0b 0c 0d 0e 0f ................ 273s | XCBC: K: 273s | 00 01 02 03 04 05 06 07 08 09 0a 0b 0c 0d 0e 0f ................ 273s | XCBC: K1 273s | c3 52 80 57 54 23 7f 31 1a c0 ff f4 e3 e0 3e 78 .R.WT#.1......>x 273s | CONCATENATE_DATA_AND_BASE: 273s | target: EXTRACT_KEY_FROM_KEY 273s | base: base-key@0x8a273bba290 (16-bytes, AES_KEY_GEN) 273s | params: 16-bytes@0x7fffdd835e50 273s | key-offset: 0, key-size: 16 273s | EXTRACT_KEY_FROM_KEY: 273s | target: AES_ECB 273s | flags: SIGN 273s | key_size: 16-bytes 273s | base: base-key@0x8a273bbe6e0 (32-bytes, EXTRACT_KEY_FROM_KEY) 273s | operation: FLAGS_ONLY 273s | params: 8-bytes@0x7fffdd835e58 273s | Computing E[2] using K3 273s | XCBC: K3 273s | c1 a7 ab a1 a2 3a 94 06 58 07 a0 8c c8 ee d0 6e .....:..X......n 273s | XCBC: E[n-1] 273s | 1d 04 48 fa cf 4d 9c 6f 55 b9 93 da 09 80 3d b3 ..H..M.oU.....=. 273s | XCBC: M[n] 273s | 10 11 12 13 .... 273s | XCBC: M[n] 273s | 10 11 12 13 .... 273s | XCBC: M[n]:80...^E[n-1]^K3 273s | cc b2 f1 48 ed 77 08 69 0d be 33 56 c1 6e ed dd ...H.w.i..3V.n.. 273s | XCBC: MAC 273s | 47 f5 1b 45 64 96 62 15 b8 98 5c 63 05 5e d3 08 G..Ed.b...\c.^.. 273s | CONCATENATE_DATA_AND_BASE: 273s | target: EXTRACT_KEY_FROM_KEY 273s | base: base-key@0x8a273bba290 (16-bytes, AES_KEY_GEN) 273s | params: 16-bytes@0x7fffdd836020 273s | key-offset: 0, key-size: 16 273s | EXTRACT_KEY_FROM_KEY: 273s | target: EXTRACT_KEY_FROM_KEY 273s | key_size: 16-bytes 273s | base: base-key@0x8a273bbe6e0 (32-bytes, EXTRACT_KEY_FROM_KEY) 273s | operation: FLAGS_ONLY 273s | params: 8-bytes@0x7fffdd835f58 273s | PRF symkey interface PRF AES_XCBC final-key@0x8a273bbe380 (size 16) 273s | PRF symkey interface: key-key@0x8a273bbe380 (16-bytes, EXTRACT_KEY_FROM_KEY) 273s | output: symkey-key@0x8a273bbe380 (16-bytes, EXTRACT_KEY_FROM_KEY) 273s | RFC 4434 Test Case AES-XCBC-PRF-128 with 20-byte input (key length 16) extracting all 16 bytes of key@0x8a273bbe380 273s | RFC 4434 Test Case AES-XCBC-PRF-128 with 20-byte input (key length 16): symkey-key@0x8a273bbe380 (16-bytes, EXTRACT_KEY_FROM_KEY) 273s | sizeof bytes 16 273s | wrapper: (SECItemType)-578593808: dc b7 04 1f 35 e6 60 e4 2a e1 96 9c 69 bf b4 01 273s | RFC 4434 Test Case AES-XCBC-PRF-128 with 20-byte input (key length 16) extracted len 16 bytes at 0x8a273bbd8e0 273s | unwrapped: 273s | 47 f5 1b 45 64 96 62 15 b8 98 5c 63 05 5e d3 08 G..Ed.b...\c.^.. 273s | verify_bytes() RFC 4434 Test Case AES-XCBC-PRF-128 with 20-byte input (key length 16): symkey: ok 273s ipsec algparse: RFC 4434 Test Case AES-XCBC-PRF-128 with 20-byte input (key length 10) 273s | decode_to_chunk() test_prf_vector: input "0x00010203040506070809" 273s | decode_to_chunk() output: 273s | 00 01 02 03 04 05 06 07 08 09 .......... 273s | decode_to_chunk() test_prf_vector: input "0x000102030405060708090a0b0c0d0e0f10111213" 273s | decode_to_chunk() output: 273s | 00 01 02 03 04 05 06 07 08 09 0a 0b 0c 0d 0e 0f ................ 273s | 10 11 12 13 .... 273s | decode_to_chunk() test_prf_vector: input "0x0fa087af7d866e7653434e602fdde835" 273s | decode_to_chunk() output: 273s | 0f a0 87 af 7d 86 6e 76 53 43 4e 60 2f dd e8 35 ....}.nvSCN`/..5 273s | PRF chunk interface PRF AES_XCBC init key hunk 0x8a273bbd5d0 (length 10) 273s | 00 01 02 03 04 05 06 07 08 09 .......... 273s | CONCATENATE_DATA_AND_BASE: 273s | target: EXTRACT_KEY_FROM_KEY 273s | base: base-key@0x8a273bba290 (16-bytes, AES_KEY_GEN) 273s | params: 16-bytes@0x7fffdd836010 273s | key-offset: 0, key-size: 10 273s | EXTRACT_KEY_FROM_KEY: 273s | target: EXTRACT_KEY_FROM_KEY 273s | key_size: 10-bytes 273s | base: base-key@0x8a273bbd2a0 (26-bytes, EXTRACT_KEY_FROM_KEY) 273s | operation: FLAGS_ONLY 273s | params: 8-bytes@0x7fffdd835f48 273s | XCBC: Key 10<16 too small, padding with zeros 273s | CONCATENATE_BASE_AND_DATA: 273s | target: EXTRACT_KEY_FROM_KEY 273s | base: base-key@0x8a273bbe380 (10-bytes, EXTRACT_KEY_FROM_KEY) 273s | params: 16-bytes@0x7fffdd835f00 273s | key-offset: 0, key-size: 16 273s | EXTRACT_KEY_FROM_KEY: 273s | target: AES_ECB 273s | flags: SIGN 273s | key_size: 16-bytes 273s | base: base-key@0x8a273bbd2a0 (16-bytes, EXTRACT_KEY_FROM_KEY) 273s | operation: FLAGS_ONLY 273s | params: 8-bytes@0x7fffdd835f18 273s | PRF chunk interface PRF AES_XCBC 0x8a273bbdc20 273s | PRF chunk interface PRF AES_XCBC update message (0x8a273bbbae0 length 20) 273s | 00 01 02 03 04 05 06 07 08 09 0a 0b 0c 0d 0e 0f ................ 273s | 10 11 12 13 .... 273s | XCBC: data 273s | 00 01 02 03 04 05 06 07 08 09 0a 0b 0c 0d 0e 0f ................ 273s | 10 11 12 13 .... 273s | K extracting all 16 bytes of key@0x8a273bbbbb0 273s | K: symkey-key@0x8a273bbbbb0 (16-bytes, AES_ECB) 273s | sizeof bytes 16 273s | wrapper: (SECItemType)-578592984: 7b b3 db 7b a9 26 89 c8 48 59 1e b1 d0 4d 83 72 273s | K extracted len 16 bytes at 0x8a273bba160 273s | unwrapped: 273s | 00 01 02 03 04 05 06 07 08 09 00 00 00 00 00 00 ................ 273s | XCBC: K: 273s | 00 01 02 03 04 05 06 07 08 09 00 00 00 00 00 00 ................ 273s | XCBC: K1 273s | 50 ca b2 4d 03 34 45 5e 40 7b 25 0f dd 7c f8 d5 P..M.4E^@{%..|.. 273s | CONCATENATE_DATA_AND_BASE: 273s | target: EXTRACT_KEY_FROM_KEY 273s | base: base-key@0x8a273bba290 (16-bytes, AES_KEY_GEN) 273s | params: 16-bytes@0x7fffdd835e00 273s | key-offset: 0, key-size: 16 273s | EXTRACT_KEY_FROM_KEY: 273s | target: AES_ECB 273s | flags: SIGN 273s | key_size: 16-bytes 273s | base: base-key@0x8a273bbd2a0 (32-bytes, EXTRACT_KEY_FROM_KEY) 273s | operation: FLAGS_ONLY 273s | params: 8-bytes@0x7fffdd835e08 273s | Computing E[2] using K3 273s | XCBC: K3 273s | 8e f7 48 db 56 f1 f7 26 24 72 f2 c5 63 b0 3f 88 ..H.V..&$r..c.?. 273s | XCBC: E[n-1] 273s | fe 1f 63 e9 65 1a 4b bb 3c cc cd 0d cc 83 e4 30 ..c.e.K.<......0 273s | XCBC: M[n] 273s | 10 11 12 13 .... 273s | XCBC: M[n] 273s | 10 11 12 13 .... 273s | XCBC: M[n]:80...^E[n-1]^K3 273s | 60 f9 39 21 b3 eb bc 9d 18 be 3f c8 af 33 db b8 `.9!......?..3.. 273s | XCBC: MAC 273s | 0f a0 87 af 7d 86 6e 76 53 43 4e 60 2f dd e8 35 ....}.nvSCN`/..5 273s | PRF chunk interface PRF AES_XCBC final length 16 273s | 0f a0 87 af 7d 86 6e 76 53 43 4e 60 2f dd e8 35 ....}.nvSCN`/..5 273s | chunk output 273s | 0f a0 87 af 7d 86 6e 76 53 43 4e 60 2f dd e8 35 ....}.nvSCN`/..5 273s | verify_bytes() RFC 4434 Test Case AES-XCBC-PRF-128 with 20-byte input (key length 10): prf OUT: ok 273s | CONCATENATE_DATA_AND_BASE: 273s | target: EXTRACT_KEY_FROM_KEY 273s | base: base-key@0x8a273bba290 (16-bytes, AES_KEY_GEN) 273s | params: 16-bytes@0x7fffdd836100 273s | key-offset: 0, key-size: 10 273s | EXTRACT_KEY_FROM_KEY: 273s | target: EXTRACT_KEY_FROM_KEY 273s | key_size: 10-bytes 273s | base: base-key@0x8a273bbe380 (26-bytes, EXTRACT_KEY_FROM_KEY) 273s | operation: FLAGS_ONLY 273s | params: 8-bytes@0x7fffdd836038 273s | PRF symkey interface PRF AES_XCBC init key symkey-key@0x8a273bbbbb0 (size 10) 273s | PRF symkey interface: key symkey-key@0x8a273bbbbb0 (10-bytes, EXTRACT_KEY_FROM_KEY) 273s | XCBC: Key 10<16 too small, padding with zeros 273s | CONCATENATE_BASE_AND_DATA: 273s | target: EXTRACT_KEY_FROM_KEY 273s | base: base-key@0x8a273bbbbb0 (10-bytes, EXTRACT_KEY_FROM_KEY) 273s | params: 16-bytes@0x7fffdd835f50 273s | key-offset: 0, key-size: 16 273s | EXTRACT_KEY_FROM_KEY: 273s | target: AES_ECB 273s | flags: SIGN 273s | key_size: 16-bytes 273s | base: base-key@0x8a273bbe380 (16-bytes, EXTRACT_KEY_FROM_KEY) 273s | operation: FLAGS_ONLY 273s | params: 8-bytes@0x7fffdd835f68 273s | PRF symkey interface PRF AES_XCBC 0x8a273bbdc20 273s | CONCATENATE_DATA_AND_BASE: 273s | target: EXTRACT_KEY_FROM_KEY 273s | base: base-key@0x8a273bba290 (16-bytes, AES_KEY_GEN) 273s | params: 16-bytes@0x7fffdd836100 273s | key-offset: 0, key-size: 20 273s | EXTRACT_KEY_FROM_KEY: 273s | target: EXTRACT_KEY_FROM_KEY 273s | key_size: 20-bytes 273s | base: base-key@0x8a273bbe040 (36-bytes, EXTRACT_KEY_FROM_KEY) 273s | operation: FLAGS_ONLY 273s | params: 8-bytes@0x7fffdd836038 273s | PRF symkey interface PRF AES_XCBC update symkey message-key@0x8a273bbe380 (size 20) 273s | PRF symkey interface: symkey message-key@0x8a273bbe380 (20-bytes, EXTRACT_KEY_FROM_KEY) 273s | symkey message extracting all 20 bytes of key@0x8a273bbe380 273s | symkey message: symkey-key@0x8a273bbe380 (20-bytes, EXTRACT_KEY_FROM_KEY) 273s | sizeof bytes 32 273s | wrapper: (SECItemType)-578593824: 13 a6 f5 2c 45 66 07 05 98 bb e4 84 57 90 b4 46 ee b7 65 d9 26 b2 fe 1e 50 56 29 1e f0 8b d5 a6 273s | symkey message extracted len 32 bytes at 0x8a273bba260 273s | unwrapped: 273s | 00 01 02 03 04 05 06 07 08 09 0a 0b 0c 0d 0e 0f ................ 273s | 10 11 12 13 00 00 00 00 00 00 00 00 00 00 00 00 ................ 273s | XCBC: data 273s | 00 01 02 03 04 05 06 07 08 09 0a 0b 0c 0d 0e 0f ................ 273s | 10 11 12 13 .... 273s | K extracting all 16 bytes of key@0x8a273bbd2a0 273s | K: symkey-key@0x8a273bbd2a0 (16-bytes, AES_ECB) 273s | sizeof bytes 16 273s | wrapper: (SECItemType)20: 7b b3 db 7b a9 26 89 c8 48 59 1e b1 d0 4d 83 72 273s | K extracted len 16 bytes at 0x8a273bb9fc0 273s | unwrapped: 273s | 00 01 02 03 04 05 06 07 08 09 00 00 00 00 00 00 ................ 273s | XCBC: K: 273s | 00 01 02 03 04 05 06 07 08 09 00 00 00 00 00 00 ................ 273s | XCBC: K1 273s | 50 ca b2 4d 03 34 45 5e 40 7b 25 0f dd 7c f8 d5 P..M.4E^@{%..|.. 273s | CONCATENATE_DATA_AND_BASE: 273s | target: EXTRACT_KEY_FROM_KEY 273s | base: base-key@0x8a273bba290 (16-bytes, AES_KEY_GEN) 273s | params: 16-bytes@0x7fffdd835e50 273s | key-offset: 0, key-size: 16 273s | EXTRACT_KEY_FROM_KEY: 273s | target: AES_ECB 273s | flags: SIGN 273s | key_size: 16-bytes 273s | base: base-key@0x8a273bbe6e0 (32-bytes, EXTRACT_KEY_FROM_KEY) 273s | operation: FLAGS_ONLY 273s | params: 8-bytes@0x7fffdd835e58 273s | Computing E[2] using K3 273s | XCBC: K3 273s | 8e f7 48 db 56 f1 f7 26 24 72 f2 c5 63 b0 3f 88 ..H.V..&$r..c.?. 273s | XCBC: E[n-1] 273s | fe 1f 63 e9 65 1a 4b bb 3c cc cd 0d cc 83 e4 30 ..c.e.K.<......0 273s | XCBC: M[n] 273s | 10 11 12 13 .... 273s | XCBC: M[n] 273s | 10 11 12 13 .... 273s | XCBC: M[n]:80...^E[n-1]^K3 273s | 60 f9 39 21 b3 eb bc 9d 18 be 3f c8 af 33 db b8 `.9!......?..3.. 273s | XCBC: MAC 273s | 0f a0 87 af 7d 86 6e 76 53 43 4e 60 2f dd e8 35 ....}.nvSCN`/..5 273s | CONCATENATE_DATA_AND_BASE: 273s | target: EXTRACT_KEY_FROM_KEY 273s | base: base-key@0x8a273bba290 (16-bytes, AES_KEY_GEN) 273s | params: 16-bytes@0x7fffdd836020 273s | key-offset: 0, key-size: 16 273s | EXTRACT_KEY_FROM_KEY: 273s | target: EXTRACT_KEY_FROM_KEY 273s | key_size: 16-bytes 273s | base: base-key@0x8a273bbe6e0 (32-bytes, EXTRACT_KEY_FROM_KEY) 273s | operation: FLAGS_ONLY 273s | params: 8-bytes@0x7fffdd835f58 273s | PRF symkey interface PRF AES_XCBC final-key@0x8a273bbe040 (size 16) 273s | PRF symkey interface: key-key@0x8a273bbe040 (16-bytes, EXTRACT_KEY_FROM_KEY) 273s | output: symkey-key@0x8a273bbe040 (16-bytes, EXTRACT_KEY_FROM_KEY) 273s | RFC 4434 Test Case AES-XCBC-PRF-128 with 20-byte input (key length 10) extracting all 16 bytes of key@0x8a273bbe040 273s | RFC 4434 Test Case AES-XCBC-PRF-128 with 20-byte input (key length 10): symkey-key@0x8a273bbe040 (16-bytes, EXTRACT_KEY_FROM_KEY) 273s | sizeof bytes 16 273s | wrapper: (SECItemType)-578593808: be 1f 2a 6e e0 5f 05 83 02 81 e2 87 95 9f 88 a0 273s | RFC 4434 Test Case AES-XCBC-PRF-128 with 20-byte input (key length 10) extracted len 16 bytes at 0x8a273bb9fc0 273s | unwrapped: 273s | 0f a0 87 af 7d 86 6e 76 53 43 4e 60 2f dd e8 35 ....}.nvSCN`/..5 273s | verify_bytes() RFC 4434 Test Case AES-XCBC-PRF-128 with 20-byte input (key length 10): symkey: ok 273s ipsec algparse: RFC 4434 Test Case AES-XCBC-PRF-128 with 20-byte input (key length 18) 273s | decode_to_chunk() test_prf_vector: input "0x000102030405060708090a0b0c0d0e0fedcb" 273s | decode_to_chunk() output: 273s | 00 01 02 03 04 05 06 07 08 09 0a 0b 0c 0d 0e 0f ................ 273s | ed cb .. 273s | decode_to_chunk() test_prf_vector: input "0x000102030405060708090a0b0c0d0e0f10111213" 273s | decode_to_chunk() output: 273s | 00 01 02 03 04 05 06 07 08 09 0a 0b 0c 0d 0e 0f ................ 273s | 10 11 12 13 .... 273s | decode_to_chunk() test_prf_vector: input "0x8cd3c93ae598a9803006ffb67c40e9e4" 273s | decode_to_chunk() output: 273s | 8c d3 c9 3a e5 98 a9 80 30 06 ff b6 7c 40 e9 e4 ...:....0...|@.. 273s | PRF chunk interface PRF AES_XCBC init key hunk 0x8a273bbd5d0 (length 18) 273s | 00 01 02 03 04 05 06 07 08 09 0a 0b 0c 0d 0e 0f ................ 273s | ed cb .. 273s | CONCATENATE_DATA_AND_BASE: 273s | target: EXTRACT_KEY_FROM_KEY 273s | base: base-key@0x8a273bba290 (16-bytes, AES_KEY_GEN) 273s | params: 16-bytes@0x7fffdd836010 273s | key-offset: 0, key-size: 18 273s | EXTRACT_KEY_FROM_KEY: 273s | target: EXTRACT_KEY_FROM_KEY 273s | key_size: 18-bytes 273s | base: base-key@0x8a273bbbbb0 (34-bytes, EXTRACT_KEY_FROM_KEY) 273s | operation: FLAGS_ONLY 273s | params: 8-bytes@0x7fffdd835f48 273s | XCBC: Key 18>16 too big, rehashing to size 273s | CONCATENATE_DATA_AND_BASE: 273s | target: EXTRACT_KEY_FROM_KEY 273s | base: base-key@0x8a273bba290 (16-bytes, AES_KEY_GEN) 273s | params: 16-bytes@0x7fffdd835e70 273s | key-offset: 0, key-size: 16 273s | EXTRACT_KEY_FROM_KEY: 273s | target: AES_ECB 273s | flags: SIGN 273s | key_size: 16-bytes 273s | base: base-key@0x8a273bbe380 (32-bytes, EXTRACT_KEY_FROM_KEY) 273s | operation: FLAGS_ONLY 273s | params: 8-bytes@0x7fffdd835e78 273s | draft_chunk extracting all 18 bytes of key@0x8a273bbe040 273s | draft_chunk: symkey-key@0x8a273bbe040 (18-bytes, EXTRACT_KEY_FROM_KEY) 273s | sizeof bytes 32 273s | wrapper: (SECItemType)-578592976: 13 a6 f5 2c 45 66 07 05 98 bb e4 84 57 90 b4 46 29 0c 59 d4 76 3f d1 36 cb 2d 1c 6c 36 06 47 af 273s | draft_chunk extracted len 32 bytes at 0x8a273bba260 273s | unwrapped: 273s | 00 01 02 03 04 05 06 07 08 09 0a 0b 0c 0d 0e 0f ................ 273s | ed cb 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................ 273s | XCBC: data 273s | 00 01 02 03 04 05 06 07 08 09 0a 0b 0c 0d 0e 0f ................ 273s | ed cb .. 273s | K extracting all 16 bytes of key@0x8a273bbbbb0 273s | K: symkey-key@0x8a273bbbbb0 (16-bytes, AES_ECB) 273s | sizeof bytes 16 273s | wrapper: (SECItemType)18: 05 11 ab 18 5f bc d5 b8 f4 42 5a 78 4a 88 7d dc 273s | K extracted len 16 bytes at 0x8a273bbe6c0 273s | unwrapped: 273s | 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................ 273s | XCBC: K: 273s | 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................ 273s | XCBC: K1 273s | e1 4d 5d 0e e2 77 15 df 08 b4 15 2b a2 3d a8 e0 .M]..w.....+.=.. 273s | CONCATENATE_DATA_AND_BASE: 273s | target: EXTRACT_KEY_FROM_KEY 273s | base: base-key@0x8a273bba290 (16-bytes, AES_KEY_GEN) 273s | params: 16-bytes@0x7fffdd835d30 273s | key-offset: 0, key-size: 16 273s | EXTRACT_KEY_FROM_KEY: 273s | target: AES_ECB 273s | flags: SIGN 273s | key_size: 16-bytes 273s | base: base-key@0x8a273bbd2a0 (32-bytes, EXTRACT_KEY_FROM_KEY) 273s | operation: FLAGS_ONLY 273s | params: 8-bytes@0x7fffdd835d38 273s | Computing E[2] using K3 273s | XCBC: K3 273s | 8d 34 ef cb 3b d5 45 ca 06 2a ec df ef 7c 0b fa .4..;.E..*...|.. 273s | XCBC: E[n-1] 273s | 0b 72 b2 ae 0a 37 79 81 75 6a d5 9c 79 c0 e6 96 .r...7y.uj..y... 273s | XCBC: M[n] 273s | ed cb .. 273s | XCBC: M[n] 273s | ed cb .. 273s | XCBC: M[n]:80...^E[n-1]^K3 273s | 6b 8d dd 65 31 e2 3c 4b 73 40 39 43 96 bc ed 6c k..e1.16 too big, rehashing to size 273s | CONCATENATE_DATA_AND_BASE: 273s | target: EXTRACT_KEY_FROM_KEY 273s | base: base-key@0x8a273bba290 (16-bytes, AES_KEY_GEN) 273s | params: 16-bytes@0x7fffdd835ec0 273s | key-offset: 0, key-size: 16 273s | EXTRACT_KEY_FROM_KEY: 273s | target: AES_ECB 273s | flags: SIGN 273s | key_size: 16-bytes 273s | base: base-key@0x8a273bbbbb0 (32-bytes, EXTRACT_KEY_FROM_KEY) 273s | operation: FLAGS_ONLY 273s | params: 8-bytes@0x7fffdd835ec8 273s | draft_chunk extracting all 18 bytes of key@0x8a273bbe380 273s | draft_chunk: symkey-key@0x8a273bbe380 (18-bytes, EXTRACT_KEY_FROM_KEY) 273s | sizeof bytes 32 273s | wrapper: (SECItemType)-578592896: 13 a6 f5 2c 45 66 07 05 98 bb e4 84 57 90 b4 46 29 0c 59 d4 76 3f d1 36 cb 2d 1c 6c 36 06 47 af 273s | draft_chunk extracted len 32 bytes at 0x8a273bbdc20 273s | unwrapped: 273s | 00 01 02 03 04 05 06 07 08 09 0a 0b 0c 0d 0e 0f ................ 273s | ed cb 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................ 273s | XCBC: data 273s | 00 01 02 03 04 05 06 07 08 09 0a 0b 0c 0d 0e 0f ................ 273s | ed cb .. 273s | K extracting all 16 bytes of key@0x8a273bbe040 273s | K: symkey-key@0x8a273bbe040 (16-bytes, AES_ECB) 273s | sizeof bytes 16 273s | wrapper: (SECItemType)18: 05 11 ab 18 5f bc d5 b8 f4 42 5a 78 4a 88 7d dc 273s | K extracted len 16 bytes at 0x8a273bbe020 273s | unwrapped: 273s | 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................ 273s | XCBC: K: 273s | 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................ 273s | XCBC: K1 273s | e1 4d 5d 0e e2 77 15 df 08 b4 15 2b a2 3d a8 e0 .M]..w.....+.=.. 273s | CONCATENATE_DATA_AND_BASE: 273s | target: EXTRACT_KEY_FROM_KEY 273s | base: base-key@0x8a273bba290 (16-bytes, AES_KEY_GEN) 273s | params: 16-bytes@0x7fffdd835d80 273s | key-offset: 0, key-size: 16 273s | EXTRACT_KEY_FROM_KEY: 273s | target: AES_ECB 273s | flags: SIGN 273s | key_size: 16-bytes 273s | base: base-key@0x8a273bbd2a0 (32-bytes, EXTRACT_KEY_FROM_KEY) 273s | operation: FLAGS_ONLY 273s | params: 8-bytes@0x7fffdd835d88 273s | Computing E[2] using K3 273s | XCBC: K3 273s | 8d 34 ef cb 3b d5 45 ca 06 2a ec df ef 7c 0b fa .4..;.E..*...|.. 273s | XCBC: E[n-1] 273s | 0b 72 b2 ae 0a 37 79 81 75 6a d5 9c 79 c0 e6 96 .r...7y.uj..y... 273s | XCBC: M[n] 273s | ed cb .. 273s | XCBC: M[n] 273s | ed cb .. 273s | XCBC: M[n]:80...^E[n-1]^K3 273s | 6b 8d dd 65 31 e2 3c 4b 73 40 39 43 96 bc ed 6c k..e1.j.....n1.].8 273s | PRF chunk interface PRF HMAC_MD5 init key hunk 0x8a273bbbae0 (length 4) 273s | 4a 65 66 65 Jefe 273s | CONCATENATE_DATA_AND_BASE: 273s | target: EXTRACT_KEY_FROM_KEY 273s | base: base-key@0x8a273bba290 (16-bytes, AES_KEY_GEN) 273s | params: 16-bytes@0x7fffdd835f70 273s | key-offset: 0, key-size: 4 273s | EXTRACT_KEY_FROM_KEY: 273s | target: MD5_HMAC 273s | flags: SIGN 273s | key_size: 4-bytes 273s | base: base-key@0x8a273bbd2a0 (20-bytes, EXTRACT_KEY_FROM_KEY) 273s | operation: FLAGS_ONLY 273s | params: 8-bytes@0x7fffdd835f78 273s | PRF chunk interface prf: created HMAC_MD5 context 0x8a273bbd610 from key-key@0x8a273bbe380 273s | PRF chunk interface prf: begin HMAC_MD5 with context 0x8a273bbd610 from key-key@0x8a273bbe380 273s | PRF chunk interface PRF HMAC_MD5 0x8a273bbdcb0 273s | PRF chunk interface PRF HMAC_MD5 update message (0x8a273bbdc20 length 28) 273s | 77 68 61 74 20 64 6f 20 79 61 20 77 61 6e 74 20 what do ya want 273s | 66 6f 72 20 6e 6f 74 68 69 6e 67 3f for nothing? 273s | PRF chunk interface PRF HMAC_MD5 final length 16 273s | 75 0c 78 3e 6a b0 b5 03 ea a8 6e 31 0a 5d b7 38 u.x>j.....n1.].8 273s | chunk output 273s | 75 0c 78 3e 6a b0 b5 03 ea a8 6e 31 0a 5d b7 38 u.x>j.....n1.].8 273s | verify_bytes() RFC 2104: MD5_HMAC test 2: prf OUT: ok 273s | CONCATENATE_DATA_AND_BASE: 273s | target: EXTRACT_KEY_FROM_KEY 273s | base: base-key@0x8a273bba290 (16-bytes, AES_KEY_GEN) 273s | params: 16-bytes@0x7fffdd836100 273s | key-offset: 0, key-size: 4 273s | EXTRACT_KEY_FROM_KEY: 273s | target: EXTRACT_KEY_FROM_KEY 273s | key_size: 4-bytes 273s | base: base-key@0x8a273bbd2a0 (20-bytes, EXTRACT_KEY_FROM_KEY) 273s | operation: FLAGS_ONLY 273s | params: 8-bytes@0x7fffdd836038 273s | PRF symkey interface PRF HMAC_MD5 init key symkey-key@0x8a273bbe380 (size 4) 273s | PRF symkey interface: key symkey-key@0x8a273bbe380 (4-bytes, EXTRACT_KEY_FROM_KEY) 273s | key-offset: 0, key-size: 4 273s | EXTRACT_KEY_FROM_KEY: 273s | target: MD5_HMAC 273s | flags: SIGN 273s | key_size: 4-bytes 273s | base: base-key@0x8a273bbe380 (4-bytes, EXTRACT_KEY_FROM_KEY) 273s | operation: FLAGS_ONLY 273s | params: 8-bytes@0x7fffdd836018 273s | PRF symkey interface prf: created HMAC_MD5 context 0x8a273bbe820 from key symkey-key@0x8a273bbd2a0 273s | PRF symkey interface prf: begin HMAC_MD5 with context 0x8a273bbe820 from key symkey-key@0x8a273bbd2a0 273s | PRF symkey interface PRF HMAC_MD5 0x8a273bba230 273s | CONCATENATE_DATA_AND_BASE: 273s | target: EXTRACT_KEY_FROM_KEY 273s | base: base-key@0x8a273bba290 (16-bytes, AES_KEY_GEN) 273s | params: 16-bytes@0x7fffdd836100 273s | key-offset: 0, key-size: 28 273s | EXTRACT_KEY_FROM_KEY: 273s | target: EXTRACT_KEY_FROM_KEY 273s | key_size: 28-bytes 273s | base: base-key@0x8a273bbbbb0 (44-bytes, EXTRACT_KEY_FROM_KEY) 273s | operation: FLAGS_ONLY 273s | params: 8-bytes@0x7fffdd836038 273s | PRF symkey interface PRF HMAC_MD5 update symkey message-key@0x8a273bbe040 (size 28) 273s | PRF symkey interface: symkey message-key@0x8a273bbe040 (28-bytes, EXTRACT_KEY_FROM_KEY) 273s | nss hmac digest hack extracting all 28 bytes of key@0x8a273bbe040 273s | nss hmac digest hack: symkey-key@0x8a273bbe040 (28-bytes, EXTRACT_KEY_FROM_KEY) 273s | sizeof bytes 32 273s | wrapper: (SECItemType)895464616: 59 22 f2 30 a9 7c 76 83 2b d5 28 24 69 ae 01 7f 28 6e e6 f2 52 87 0a 6b 5e ce 16 f9 98 3b 7c 0d 273s | nss hmac digest hack extracted len 32 bytes at 0x8a273bbd210 273s | unwrapped: 273s | 77 68 61 74 20 64 6f 20 79 61 20 77 61 6e 74 20 what do ya want 273s | 66 6f 72 20 6e 6f 74 68 69 6e 67 3f 00 00 00 00 for nothing?.... 273s | CONCATENATE_DATA_AND_BASE: 273s | target: EXTRACT_KEY_FROM_KEY 273s | base: base-key@0x8a273bba290 (16-bytes, AES_KEY_GEN) 273s | params: 16-bytes@0x7fffdd836030 273s | key-offset: 0, key-size: 16 273s | EXTRACT_KEY_FROM_KEY: 273s | target: EXTRACT_KEY_FROM_KEY 273s | key_size: 16-bytes 273s | base: base-key@0x8a273bbbbb0 (32-bytes, EXTRACT_KEY_FROM_KEY) 273s | operation: FLAGS_ONLY 273s | params: 8-bytes@0x7fffdd835f68 273s | PRF symkey interface PRF HMAC_MD5 final-key@0x8a273bbd2a0 (size 16) 273s | PRF symkey interface: key-key@0x8a273bbd2a0 (16-bytes, EXTRACT_KEY_FROM_KEY) 273s | output: symkey-key@0x8a273bbd2a0 (16-bytes, EXTRACT_KEY_FROM_KEY) 273s | RFC 2104: MD5_HMAC test 2 extracting all 16 bytes of key@0x8a273bbd2a0 273s | RFC 2104: MD5_HMAC test 2: symkey-key@0x8a273bbd2a0 (16-bytes, EXTRACT_KEY_FROM_KEY) 273s | sizeof bytes 16 273s | wrapper: (SECItemType)-578593808: f2 9d 45 cb 74 3a e2 21 4d 6f 78 5d 92 d2 7d 41 273s | RFC 2104: MD5_HMAC test 2 extracted len 16 bytes at 0x8a273bba160 273s | unwrapped: 273s | 75 0c 78 3e 6a b0 b5 03 ea a8 6e 31 0a 5d b7 38 u.x>j.....n1.].8 273s | verify_bytes() RFC 2104: MD5_HMAC test 2: symkey: ok 273s ipsec algparse: RFC 2104: MD5_HMAC test 3 273s | decode_to_chunk() test_prf_vector: input "0xAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAA" 273s | decode_to_chunk() output: 273s | aa aa aa aa aa aa aa aa aa aa aa aa aa aa aa aa ................ 273s | decode_to_chunk() test_prf_vector: input "0xDDDDDDDDDDDDDDDDDDDDDDDDDDDDDDDDDDDDDDDDDDDDDDDDDDDDDDDDDDDDDDDDDDDDDDDDDDDDDDDDDDDDDDDDDDDDDDDDDDDD" 273s | decode_to_chunk() output: 273s | dd dd dd dd dd dd dd dd dd dd dd dd dd dd dd dd ................ 273s | dd dd dd dd dd dd dd dd dd dd dd dd dd dd dd dd ................ 273s | dd dd dd dd dd dd dd dd dd dd dd dd dd dd dd dd ................ 273s | dd dd .. 273s | decode_to_chunk() test_prf_vector: input "0x56be34521d144c88dbb8c733f0e8b3f6" 273s | decode_to_chunk() output: 273s | 56 be 34 52 1d 14 4c 88 db b8 c7 33 f0 e8 b3 f6 V.4R..L....3.... 273s | PRF chunk interface PRF HMAC_MD5 init key hunk 0x8a273bbd8e0 (length 16) 273s | aa aa aa aa aa aa aa aa aa aa aa aa aa aa aa aa ................ 273s | CONCATENATE_DATA_AND_BASE: 273s | target: EXTRACT_KEY_FROM_KEY 273s | base: base-key@0x8a273bba290 (16-bytes, AES_KEY_GEN) 273s | params: 16-bytes@0x7fffdd835f70 273s | key-offset: 0, key-size: 16 273s | EXTRACT_KEY_FROM_KEY: 273s | target: MD5_HMAC 273s | flags: SIGN 273s | key_size: 16-bytes 273s | base: base-key@0x8a273bbe380 (32-bytes, EXTRACT_KEY_FROM_KEY) 273s | operation: FLAGS_ONLY 273s | params: 8-bytes@0x7fffdd835f78 273s | PRF chunk interface prf: created HMAC_MD5 context 0x8a273bbe770 from key-key@0x8a273bbd2a0 273s | PRF chunk interface prf: begin HMAC_MD5 with context 0x8a273bbe770 from key-key@0x8a273bbd2a0 273s | PRF chunk interface PRF HMAC_MD5 0x8a273bba260 273s | PRF chunk interface PRF HMAC_MD5 update message (0x8a273bbdbe0 length 50) 273s | dd dd dd dd dd dd dd dd dd dd dd dd dd dd dd dd ................ 273s | dd dd dd dd dd dd dd dd dd dd dd dd dd dd dd dd ................ 273s | dd dd dd dd dd dd dd dd dd dd dd dd dd dd dd dd ................ 273s | dd dd .. 273s | PRF chunk interface PRF HMAC_MD5 final length 16 273s | 56 be 34 52 1d 14 4c 88 db b8 c7 33 f0 e8 b3 f6 V.4R..L....3.... 273s | chunk output 273s | 56 be 34 52 1d 14 4c 88 db b8 c7 33 f0 e8 b3 f6 V.4R..L....3.... 273s | verify_bytes() RFC 2104: MD5_HMAC test 3: prf OUT: ok 273s | CONCATENATE_DATA_AND_BASE: 273s | target: EXTRACT_KEY_FROM_KEY 273s | base: base-key@0x8a273bba290 (16-bytes, AES_KEY_GEN) 273s | params: 16-bytes@0x7fffdd836100 273s | key-offset: 0, key-size: 16 273s | EXTRACT_KEY_FROM_KEY: 273s | target: EXTRACT_KEY_FROM_KEY 273s | key_size: 16-bytes 273s | base: base-key@0x8a273bbe380 (32-bytes, EXTRACT_KEY_FROM_KEY) 273s | operation: FLAGS_ONLY 273s | params: 8-bytes@0x7fffdd836038 273s | PRF symkey interface PRF HMAC_MD5 init key symkey-key@0x8a273bbd2a0 (size 16) 273s | PRF symkey interface: key symkey-key@0x8a273bbd2a0 (16-bytes, EXTRACT_KEY_FROM_KEY) 273s | key-offset: 0, key-size: 16 273s | EXTRACT_KEY_FROM_KEY: 273s | target: MD5_HMAC 273s | flags: SIGN 273s | key_size: 16-bytes 273s | base: base-key@0x8a273bbd2a0 (16-bytes, EXTRACT_KEY_FROM_KEY) 273s | operation: FLAGS_ONLY 273s | params: 8-bytes@0x7fffdd836018 273s | PRF symkey interface prf: created HMAC_MD5 context 0x8a273bc2b10 from key symkey-key@0x8a273bbe380 273s | PRF symkey interface prf: begin HMAC_MD5 with context 0x8a273bc2b10 from key symkey-key@0x8a273bbe380 273s | PRF symkey interface PRF HMAC_MD5 0x8a273bbdc20 273s | CONCATENATE_DATA_AND_BASE: 273s | target: EXTRACT_KEY_FROM_KEY 273s | base: base-key@0x8a273bba290 (16-bytes, AES_KEY_GEN) 273s | params: 16-bytes@0x7fffdd836100 273s | key-offset: 0, key-size: 50 273s | EXTRACT_KEY_FROM_KEY: 273s | target: EXTRACT_KEY_FROM_KEY 273s | key_size: 50-bytes 273s | base: base-key@0x8a273bbbbb0 (66-bytes, EXTRACT_KEY_FROM_KEY) 273s | operation: FLAGS_ONLY 273s | params: 8-bytes@0x7fffdd836038 273s | PRF symkey interface PRF HMAC_MD5 update symkey message-key@0x8a273bbe040 (size 50) 273s | PRF symkey interface: symkey message-key@0x8a273bbe040 (50-bytes, EXTRACT_KEY_FROM_KEY) 273s | nss hmac digest hack extracting all 50 bytes of key@0x8a273bbe040 273s | nss hmac digest hack: symkey-key@0x8a273bbe040 (50-bytes, EXTRACT_KEY_FROM_KEY) 273s | sizeof bytes 64 273s | wrapper: (SECItemType)895464616: f5 86 c0 66 76 b1 e6 2a 4f 8d 79 ba 9d ea bd 48 f5 86 c0 66 76 b1 e6 2a 4f 8d 79 ba 9d ea bd 48 f5 86 c0 66 76 b1 e6 2a 4f 8d 79 ba 9d ea bd 48 b8 e0 7d 9f 7a d1 8b 18 69 44 c3 10 21 a0 ad 84 273s | nss hmac digest hack extracted len 64 bytes at 0x8a273bbdce0 273s | unwrapped: 273s | dd dd dd dd dd dd dd dd dd dd dd dd dd dd dd dd ................ 273s | dd dd dd dd dd dd dd dd dd dd dd dd dd dd dd dd ................ 273s | dd dd dd dd dd dd dd dd dd dd dd dd dd dd dd dd ................ 273s | dd dd 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................ 273s | CONCATENATE_DATA_AND_BASE: 273s | target: EXTRACT_KEY_FROM_KEY 273s | base: base-key@0x8a273bba290 (16-bytes, AES_KEY_GEN) 273s | params: 16-bytes@0x7fffdd836030 273s | key-offset: 0, key-size: 16 273s | EXTRACT_KEY_FROM_KEY: 273s | target: EXTRACT_KEY_FROM_KEY 273s | key_size: 16-bytes 273s | base: base-key@0x8a273bbbbb0 (32-bytes, EXTRACT_KEY_FROM_KEY) 273s | operation: FLAGS_ONLY 273s | params: 8-bytes@0x7fffdd835f68 273s | PRF symkey interface PRF HMAC_MD5 final-key@0x8a273bbe380 (size 16) 273s | PRF symkey interface: key-key@0x8a273bbe380 (16-bytes, EXTRACT_KEY_FROM_KEY) 273s | output: symkey-key@0x8a273bbe380 (16-bytes, EXTRACT_KEY_FROM_KEY) 273s | RFC 2104: MD5_HMAC test 3 extracting all 16 bytes of key@0x8a273bbe380 273s | RFC 2104: MD5_HMAC test 3: symkey-key@0x8a273bbe380 (16-bytes, EXTRACT_KEY_FROM_KEY) 273s | sizeof bytes 16 273s | wrapper: (SECItemType)-578593808: 53 46 ab e6 16 d7 ce f3 1e 7c ef 76 c4 16 0f cd 273s | RFC 2104: MD5_HMAC test 3 extracted len 16 bytes at 0x8a273bbdeb0 273s | unwrapped: 273s | 56 be 34 52 1d 14 4c 88 db b8 c7 33 f0 e8 b3 f6 V.4R..L....3.... 273s | verify_bytes() RFC 2104: MD5_HMAC test 3: symkey: ok 273s ipsec algparse: testing HMAC_SHA1: 273s ipsec algparse: CAVP: IKEv2 key derivation with HMAC-SHA1 273s | decode_to_chunk() test_kdf_vector: input "0x32b50d5f4a3763f3" 273s | decode_to_chunk() output: 273s | 32 b5 0d 5f 4a 37 63 f3 2.._J7c. 273s | decode_to_chunk() test_kdf_vector: input "0x9206a04b26564cb1" 273s | decode_to_chunk() output: 273s | 92 06 a0 4b 26 56 4c b1 ...K&VL. 273s | decode_to_chunk() test_kdf_vector: input "0x34c9e7c188868785" 273s | decode_to_chunk() output: 273s | 34 c9 e7 c1 88 86 87 85 4....... 273s | decode_to_chunk() test_kdf_vector: input "0x3ff77d760d2b2199" 273s | decode_to_chunk() output: 273s | 3f f7 7d 76 0d 2b 21 99 ?.}v.+!. 273s | decode_to_chunk() test_kdf_vector: input "0x4b2c1f971981a8ad8d0abeafabf38cf75fc8349c148142465ed9c8b516b8be52" 273s | decode_to_chunk() output: 273s | 4b 2c 1f 97 19 81 a8 ad 8d 0a be af ab f3 8c f7 K,.............. 273s | 5f c8 34 9c 14 81 42 46 5e d9 c8 b5 16 b8 be 52 _.4...BF^......R 273s | decode_to_chunk() test_kdf_vector: input "0x863f3c9d06efd39d2b907b97f8699e5dd5251ef64a2a176f36ee40c87d4f9330" 273s | decode_to_chunk() output: 273s | 86 3f 3c 9d 06 ef d3 9d 2b 90 7b 97 f8 69 9e 5d .?<.....+.{..i.] 273s | d5 25 1e f6 4a 2a 17 6f 36 ee 40 c8 7d 4f 93 30 .%..J*.o6.@.}O.0 273s | decode_to_chunk() test_kdf_vector: input "0xa9a7b222b59f8f48645f28a1db5b5f5d7479cba7" 273s | decode_to_chunk() output: 273s | a9 a7 b2 22 b5 9f 8f 48 64 5f 28 a1 db 5b 5f 5d ..."...Hd_(..[_] 273s | 74 79 cb a7 ty.. 273s | decode_to_chunk() test_kdf_vector: input "0x63e81194946ebd05df7df5ebf5d8750056bf1f1d" 273s | decode_to_chunk() output: 273s | 63 e8 11 94 94 6e bd 05 df 7d f5 eb f5 d8 75 00 c....n...}....u. 273s | 56 bf 1f 1d V... 273s | decode_to_chunk() test_kdf_vector: input "0xa14293677cc80ff8f9cc0eee30d895da9d8f405666e30ef0dfcb63c634a46002a2a63080e514a062768b76606f9fa5e992204fc5a670bde3f10d6b027113936a5c55b648a194ae587b0088d52204b702c979fa280870d2ed41efa9c549fd11198af1670b143d384bd275c5f594cf266b05ebadca855e4249520a441a81157435a7a56cc4" 273s | decode_to_chunk() output: 273s | a1 42 93 67 7c c8 0f f8 f9 cc 0e ee 30 d8 95 da .B.g|.......0... 273s | 9d 8f 40 56 66 e3 0e f0 df cb 63 c6 34 a4 60 02 ..@Vf.....c.4.`. 273s | a2 a6 30 80 e5 14 a0 62 76 8b 76 60 6f 9f a5 e9 ..0....bv.v`o... 273s | 92 20 4f c5 a6 70 bd e3 f1 0d 6b 02 71 13 93 6a . O..p....k.q..j 273s | 5c 55 b6 48 a1 94 ae 58 7b 00 88 d5 22 04 b7 02 \U.H...X{..."... 273s | c9 79 fa 28 08 70 d2 ed 41 ef a9 c5 49 fd 11 19 .y.(.p..A...I... 273s | 8a f1 67 0b 14 3d 38 4b d2 75 c5 f5 94 cf 26 6b ..g..=8K.u....&k 273s | 05 eb ad ca 85 5e 42 49 52 0a 44 1a 81 15 74 35 .....^BIR.D...t5 273s | a7 a5 6c c4 ..l. 273s | CONCATENATE_DATA_AND_BASE: 273s | target: EXTRACT_KEY_FROM_KEY 273s | base: base-key@0x8a273bba290 (16-bytes, AES_KEY_GEN) 273s | params: 16-bytes@0x7fffdd8360d0 273s | key-offset: 0, key-size: 32 273s | EXTRACT_KEY_FROM_KEY: 273s | target: EXTRACT_KEY_FROM_KEY 273s | key_size: 32-bytes 273s | base: base-key@0x8a273bbd2a0 (48-bytes, EXTRACT_KEY_FROM_KEY) 273s | operation: FLAGS_ONLY 273s | params: 8-bytes@0x7fffdd836008 273s | NSS_IKE_PRF_DERIVE: 273s | target: NSS_IKE_PRF_PLUS_DERIVE 273s | base: base-key@0x8a273bbe380 (32-bytes, EXTRACT_KEY_FROM_KEY) 273s | params: 56-bytes@0x7fffdd8360a0 273s | CAVP: IKEv2 key derivation with HMAC-SHA1 extracting all 20 bytes of key@0x8a273bbd2a0 273s | CAVP: IKEv2 key derivation with HMAC-SHA1: symkey-key@0x8a273bbd2a0 (20-bytes, NSS_IKE_PRF_PLUS_DERIVE) 273s | sizeof bytes 32 273s | wrapper: (SECItemType)1936548210: e4 c3 03 ba 08 c3 70 89 b9 2b fd 41 fd 5a 5c fb 93 1b 1b a8 8e f7 92 e2 15 39 43 6b 31 86 d0 12 273s | CAVP: IKEv2 key derivation with HMAC-SHA1 extracted len 32 bytes at 0x8a273bbdcb0 273s | unwrapped: 273s | a9 a7 b2 22 b5 9f 8f 48 64 5f 28 a1 db 5b 5f 5d ..."...Hd_(..[_] 273s | 74 79 cb a7 00 00 00 00 00 00 00 00 00 00 00 00 ty.............. 273s | verify_bytes() CAVP: IKEv2 key derivation with HMAC-SHA1: skeyseed: ok 273s | NSS_IKE_PRF_PLUS_DERIVE: 273s | target: EXTRACT_KEY_FROM_KEY 273s | key_size: 132-bytes 273s | base: base-key@0x8a273bbd2a0 (20-bytes, NSS_IKE_PRF_PLUS_DERIVE) 273s | params: 40-bytes@0x7fffdd835ff0 273s | CAVP: IKEv2 key derivation with HMAC-SHA1 extracting all 132 bytes of key@0x8a273bbe040 273s | CAVP: IKEv2 key derivation with HMAC-SHA1: symkey-key@0x8a273bbe040 (132-bytes, EXTRACT_KEY_FROM_KEY) 273s | sizeof bytes 144 273s | wrapper: (SECItemType)540684609: db a3 a4 6d af 4e ab bc 03 6d 54 49 d1 cb 9b 1f a1 0c c6 0a 2e 49 49 c6 d0 3c a7 08 c0 f6 61 dc 63 15 e9 a0 ab 96 cd a2 c0 df 24 6d 50 52 fe e0 00 7e 49 bb 54 8a 4b cc c2 77 ab db 36 30 1e 46 12 9a 1f 73 97 e4 2d 73 25 9d d4 5e 52 9a a5 e9 b8 ab 04 a0 34 12 d4 4b 12 5e fc 4f ff e1 c5 fe 29 e0 b1 d3 97 52 08 29 d6 1d df 36 65 81 b9 f6 63 f0 a8 91 08 56 79 5f 23 c9 30 9d 7b 43 3a 62 8e be 33 ee ab 6e f7 9f 70 ed 15 ff 81 5a 1d 4e 273s | CAVP: IKEv2 key derivation with HMAC-SHA1 extracted len 144 bytes at 0x8a273bc49d0 273s | unwrapped: 273s | a1 42 93 67 7c c8 0f f8 f9 cc 0e ee 30 d8 95 da .B.g|.......0... 273s | 9d 8f 40 56 66 e3 0e f0 df cb 63 c6 34 a4 60 02 ..@Vf.....c.4.`. 273s | a2 a6 30 80 e5 14 a0 62 76 8b 76 60 6f 9f a5 e9 ..0....bv.v`o... 273s | 92 20 4f c5 a6 70 bd e3 f1 0d 6b 02 71 13 93 6a . O..p....k.q..j 273s | 5c 55 b6 48 a1 94 ae 58 7b 00 88 d5 22 04 b7 02 \U.H...X{..."... 273s | c9 79 fa 28 08 70 d2 ed 41 ef a9 c5 49 fd 11 19 .y.(.p..A...I... 273s | 8a f1 67 0b 14 3d 38 4b d2 75 c5 f5 94 cf 26 6b ..g..=8K.u....&k 273s | 05 eb ad ca 85 5e 42 49 52 0a 44 1a 81 15 74 35 .....^BIR.D...t5 273s | a7 a5 6c c4 00 00 00 00 00 00 00 00 00 00 00 00 ..l............. 273s | verify_bytes() CAVP: IKEv2 key derivation with HMAC-SHA1: DKM: ok 273s | key-offset: 0, key-size: 20 273s | EXTRACT_KEY_FROM_KEY: 273s | target: EXTRACT_KEY_FROM_KEY 273s | key_size: 20-bytes 273s | base: base-key@0x8a273bbe040 (132-bytes, EXTRACT_KEY_FROM_KEY) 273s | operation: FLAGS_ONLY 273s | params: 8-bytes@0x7fffdd8360f8 273s | CONCATENATE_DATA_AND_BASE: 273s | target: EXTRACT_KEY_FROM_KEY 273s | base: base-key@0x8a273bba290 (16-bytes, AES_KEY_GEN) 273s | params: 16-bytes@0x7fffdd8360d0 273s | key-offset: 0, key-size: 32 273s | EXTRACT_KEY_FROM_KEY: 273s | target: EXTRACT_KEY_FROM_KEY 273s | key_size: 32-bytes 273s | base: base-key@0x8a273bbe180 (48-bytes, EXTRACT_KEY_FROM_KEY) 273s | operation: FLAGS_ONLY 273s | params: 8-bytes@0x7fffdd836008 273s | NSS_IKE_PRF_DERIVE: 273s | target: NSS_IKE_PRF_PLUS_DERIVE 273s | base: base-key@0x8a273bbbbb0 (20-bytes, EXTRACT_KEY_FROM_KEY) 273s | params: 56-bytes@0x7fffdd8360b0 273s | CAVP: IKEv2 key derivation with HMAC-SHA1 extracting all 20 bytes of key@0x8a273bbe180 273s | CAVP: IKEv2 key derivation with HMAC-SHA1: symkey-key@0x8a273bbe180 (20-bytes, NSS_IKE_PRF_PLUS_DERIVE) 273s | sizeof bytes 32 273s | wrapper: (SECItemType)1936548210: 64 39 3a dc fb 37 f9 21 a8 1b 1b 53 39 64 06 3f fb 2a 02 3b 38 5e 4d 9c e5 65 9c e2 4a 41 64 4a 273s | CAVP: IKEv2 key derivation with HMAC-SHA1 extracted len 32 bytes at 0x8a273bba260 273s | unwrapped: 273s | 63 e8 11 94 94 6e bd 05 df 7d f5 eb f5 d8 75 00 c....n...}....u. 273s | 56 bf 1f 1d 00 00 00 00 00 00 00 00 00 00 00 00 V............... 273s | verify_bytes() CAVP: IKEv2 key derivation with HMAC-SHA1: skeyseed_rekey: ok 273s ipsec algparse: leak detective found no leaks 273s initializing NSS db 273s running pluto selftest 273s /usr/libexec/ipsec/pluto: adjusting nssdir to /tmp/tmp.3iMnyULCA7 273s /usr/libexec/ipsec/pluto: selftest: skipping lock 273s /usr/libexec/ipsec/pluto: selftest: skipping control socket 273s /usr/libexec/ipsec/pluto: selftest: skipping fork 273s Starting Pluto (Libreswan Version 5.2 IKEv2 IKEv1 XFRM XFRMI esp-hw-offload FORK PTHREAD_SETSCHEDPRIO NSS (IPsec profile) (NSS-KDF) DNSSEC SYSTEMD_WATCHDOG LABELED_IPSEC (SELINUX) LIBCAP_NG LINUX_AUDIT AUTH_PAM NETWORKMANAGER CURL(non-NSS) LDAP(non-NSS) NFTABLES CAT NFLOG) pid:1645 273s operating system: Linux 6.18.0 [Linux 6.18.0-9-generic #9-Ubuntu SMP PREEMPT_DYNAMIC Mon Jan 12 16:45:54 UTC 2026 ppc64le] 273s core dump dir: /run/pluto 273s secrets file: /etc/ipsec.secrets 273s Initializing NSS using read-only database "sql:/tmp/tmp.3iMnyULCA7" 273s FIPS Mode: OFF 273s NSS crypto library initialized 273s FIPS mode disabled for pluto daemon 273s FIPS HMAC integrity support [not required] 273s libcap-ng capng_apply failed to apply changes, err=-5. see: man capng_apply 273s libcap-ng support [enabled] 273s Linux audit support [enabled] 273s leak-detective disabled 273s NSS crypto [enabled] 273s XAUTH PAM support [enabled] 273s initializing libevent in pthreads mode: headers: 2.1.12-stable (2010c00); library: 2.1.12-stable (2010c00) 273s NAT-Traversal: keep-alive period 20s 273s ERROR: xfrmi is not supported, failed to create ipsec-interface ipsec1 bound to lo 273s ipsec-interface is not working: xfrmi is not supported 273s IPsec Interface [disabled] 273s refreshed session resume keys, issuing key 1 273s Encryption algorithms: 273s AES_CCM_16 {256,192,*128} IKEv1: ESP IKEv2: ESP FIPS aes_ccm, aes_ccm_c 273s AES_CCM_12 {256,192,*128} IKEv1: ESP IKEv2: ESP FIPS aes_ccm_b 273s AES_CCM_8 {256,192,*128} IKEv1: ESP IKEv2: ESP FIPS aes_ccm_a 273s 3DES_CBC [*192] IKEv1: IKE ESP IKEv2: IKE ESP FIPS NSS(CBC) 3des 273s CAMELLIA_CTR {256,192,*128} IKEv1: ESP IKEv2: ESP 273s CAMELLIA_CBC {256,192,*128} IKEv1: IKE ESP IKEv2: IKE ESP NSS(CBC) camellia 273s AES_GCM_16 {256,192,*128} IKEv1: ESP IKEv2: IKE ESP FIPS NSS(AEAD) aes_gcm, aes_gcm_c 273s AES_GCM_12 {256,192,*128} IKEv1: ESP IKEv2: IKE ESP FIPS NSS(AEAD) aes_gcm_b 273s AES_GCM_8 {256,192,*128} IKEv1: ESP IKEv2: IKE ESP FIPS NSS(AEAD) aes_gcm_a 273s AES_CTR {256,192,*128} IKEv1: IKE ESP IKEv2: IKE ESP FIPS NSS(CTR) aesctr 273s AES_CBC {256,192,*128} IKEv1: IKE ESP IKEv2: IKE ESP FIPS NSS(CBC) aes 273s NULL_AUTH_AES_GMAC {256,192,*128} IKEv1: ESP IKEv2: ESP FIPS aes_gmac 273s NULL [] IKEv1: ESP IKEv2: ESP NULL 273s CHACHA20_POLY1305 [*256] IKEv1: IKEv2: IKE ESP NSS(AEAD) chacha20poly1305 273s Hash algorithms: 273s MD5 IKEv1: IKE IKEv2: NSS 273s SHA1 IKEv1: IKE IKEv2: IKE FIPS NSS sha 273s SHA2_256 IKEv1: IKE IKEv2: IKE FIPS NSS sha2, sha256 273s SHA2_384 IKEv1: IKE IKEv2: IKE FIPS NSS sha384 273s SHA2_512 IKEv1: IKE IKEv2: IKE FIPS NSS sha512 273s IDENTITY IKEv1: IKEv2: FIPS 273s PRF algorithms: 273s HMAC_MD5 IKEv1: IKE IKEv2: IKE NSS md5 273s HMAC_SHA1 IKEv1: IKE IKEv2: IKE FIPS NSS sha, sha1 273s HMAC_SHA2_256 IKEv1: IKE IKEv2: IKE FIPS NSS sha2, sha256, sha2_256 273s HMAC_SHA2_384 IKEv1: IKE IKEv2: IKE FIPS NSS sha384, sha2_384 273s HMAC_SHA2_512 IKEv1: IKE IKEv2: IKE FIPS NSS sha512, sha2_512 273s AES_XCBC IKEv1: IKEv2: IKE native(XCBC) aes128_xcbc 273s Integrity algorithms: 273s HMAC_MD5_96 IKEv1: IKE ESP AH IKEv2: IKE ESP AH NSS md5, hmac_md5 273s HMAC_SHA1_96 IKEv1: IKE ESP AH IKEv2: IKE ESP AH FIPS NSS sha, sha1, sha1_96, hmac_sha1 273s HMAC_SHA2_512_256 IKEv1: IKE ESP AH IKEv2: IKE ESP AH FIPS NSS sha512, sha2_512, sha2_512_256, hmac_sha2_512 273s HMAC_SHA2_384_192 IKEv1: IKE ESP AH IKEv2: IKE ESP AH FIPS NSS sha384, sha2_384, sha2_384_192, hmac_sha2_384 273s HMAC_SHA2_256_128 IKEv1: IKE ESP AH IKEv2: IKE ESP AH FIPS NSS sha2, sha256, sha2_256, sha2_256_128, hmac_sha2_256 273s HMAC_SHA2_256_TRUNCBUG IKEv1: ESP AH IKEv2: AH 273s AES_XCBC_96 IKEv1: ESP AH IKEv2: IKE ESP AH native(XCBC) aes_xcbc, aes128_xcbc, aes128_xcbc_96 273s AES_CMAC_96 IKEv1: ESP AH IKEv2: ESP AH FIPS aes_cmac 273s NONE IKEv1: ESP IKEv2: IKE ESP FIPS null 273s DH algorithms: 273s NONE IKEv1: IKEv2: IKE ESP AH FIPS NSS(MODP) null, dh0 273s MODP1536 IKEv1: IKE ESP AH IKEv2: IKE ESP AH NSS(MODP) dh5 273s MODP2048 IKEv1: IKE ESP AH IKEv2: IKE ESP AH FIPS NSS(MODP) dh14 273s MODP3072 IKEv1: IKE ESP AH IKEv2: IKE ESP AH FIPS NSS(MODP) dh15 273s MODP4096 IKEv1: IKE ESP AH IKEv2: IKE ESP AH FIPS NSS(MODP) dh16 273s MODP6144 IKEv1: IKE ESP AH IKEv2: IKE ESP AH FIPS NSS(MODP) dh17 273s MODP8192 IKEv1: IKE ESP AH IKEv2: IKE ESP AH FIPS NSS(MODP) dh18 273s DH19 IKEv1: IKE IKEv2: IKE ESP AH FIPS NSS(ECP) ecp_256, ecp256 273s DH20 IKEv1: IKE IKEv2: IKE ESP AH FIPS NSS(ECP) ecp_384, ecp384 273s DH21 IKEv1: IKE IKEv2: IKE ESP AH FIPS NSS(ECP) ecp_521, ecp521 273s DH31 IKEv1: IKE IKEv2: IKE ESP AH NSS(ECP) curve25519 273s IPCOMP algorithms: 273s DEFLATE IKEv1: ESP AH IKEv2: ESP AH FIPS 273s LZS IKEv1: IKEv2: ESP AH FIPS 273s LZJH IKEv1: IKEv2: ESP AH FIPS 273s testing CAMELLIA_CBC: 273s Camellia: 16 bytes with 128-bit key 273s Camellia: 16 bytes with 128-bit key 273s Camellia: 16 bytes with 256-bit key 273s Camellia: 16 bytes with 256-bit key 273s testing AES_GCM_16: 273s empty string 273s one block 273s two blocks 273s two blocks with associated data 273s testing AES_CTR: 273s Encrypting 16 octets using AES-CTR with 128-bit key 273s Encrypting 32 octets using AES-CTR with 128-bit key 273s Encrypting 36 octets using AES-CTR with 128-bit key 273s Encrypting 16 octets using AES-CTR with 192-bit key 273s Encrypting 32 octets using AES-CTR with 192-bit key 273s Encrypting 36 octets using AES-CTR with 192-bit key 273s Encrypting 16 octets using AES-CTR with 256-bit key 273s Encrypting 32 octets using AES-CTR with 256-bit key 273s Encrypting 36 octets using AES-CTR with 256-bit key 273s testing AES_CBC: 273s Encrypting 16 bytes (1 block) using AES-CBC with 128-bit key 273s Encrypting 32 bytes (2 blocks) using AES-CBC with 128-bit key 273s Encrypting 48 bytes (3 blocks) using AES-CBC with 128-bit key 273s Encrypting 64 bytes (4 blocks) using AES-CBC with 128-bit key 273s testing AES_XCBC: 273s RFC 3566 Test Case 1: AES-XCBC-MAC-96 with 0-byte input 273s RFC 3566 Test Case 2: AES-XCBC-MAC-96 with 3-byte input 273s RFC 3566 Test Case 3: AES-XCBC-MAC-96 with 16-byte input 273s RFC 3566 Test Case 4: AES-XCBC-MAC-96 with 20-byte input 273s RFC 3566 Test Case 5: AES-XCBC-MAC-96 with 32-byte input 273s RFC 3566 Test Case 6: AES-XCBC-MAC-96 with 34-byte input 273s RFC 3566 Test Case 7: AES-XCBC-MAC-96 with 1000-byte input 273s RFC 4434 Test Case AES-XCBC-PRF-128 with 20-byte input (key length 16) 273s RFC 4434 Test Case AES-XCBC-PRF-128 with 20-byte input (key length 10) 273s RFC 4434 Test Case AES-XCBC-PRF-128 with 20-byte input (key length 18) 273s testing HMAC_MD5: 273s RFC 2104: MD5_HMAC test 1 273s RFC 2104: MD5_HMAC test 2 273s RFC 2104: MD5_HMAC test 3 273s testing HMAC_SHA1: 273s CAVP: IKEv2 key derivation with HMAC-SHA1 273s selftest: exiting pluto 273s autopkgtest [05:35:57]: test cryptocheck: -----------------------] 274s autopkgtest [05:35:58]: test cryptocheck: - - - - - - - - - - results - - - - - - - - - - 274s cryptocheck PASS 274s autopkgtest [05:35:58]: test cavp: preparing testbed 295s Creating nova instance adt-resolute-ppc64el-libreswan-20260203-053123-juju-7f2275-prod-proposed-migration-environment-2-7664ef73-a2ea-49fe-a1f9-58ad4081e8c2 from image adt/ubuntu-resolute-ppc64el-server-20260202.img (UUID ca98045c-2f99-4634-a243-9d47350236de)... 342s autopkgtest [05:37:06]: testbed dpkg architecture: ppc64el 342s autopkgtest [05:37:06]: testbed apt version: 3.1.14 342s autopkgtest [05:37:06]: @@@@@@@@@@@@@@@@@@@@ test bed setup 342s autopkgtest [05:37:06]: testbed release detected to be: resolute 343s autopkgtest [05:37:07]: updating testbed package index (apt update) 343s Get:1 http://ftpmaster.internal/ubuntu resolute-proposed InRelease [124 kB] 343s Hit:2 http://ftpmaster.internal/ubuntu resolute InRelease 343s Hit:3 http://ftpmaster.internal/ubuntu resolute-updates InRelease 343s Hit:4 http://ftpmaster.internal/ubuntu resolute-security InRelease 343s Get:5 http://ftpmaster.internal/ubuntu resolute-proposed/multiverse Sources [27.8 kB] 343s Get:6 http://ftpmaster.internal/ubuntu resolute-proposed/restricted Sources [5260 B] 343s Get:7 http://ftpmaster.internal/ubuntu resolute-proposed/main Sources [269 kB] 343s Get:8 http://ftpmaster.internal/ubuntu resolute-proposed/universe Sources [1270 kB] 344s Get:9 http://ftpmaster.internal/ubuntu resolute-proposed/main ppc64el Packages [297 kB] 344s Get:10 http://ftpmaster.internal/ubuntu resolute-proposed/universe ppc64el Packages [1080 kB] 344s Get:11 http://ftpmaster.internal/ubuntu resolute-proposed/multiverse ppc64el Packages [18.3 kB] 344s Fetched 3092 kB in 1s (3446 kB/s) 345s Reading package lists... 345s Hit:1 http://ftpmaster.internal/ubuntu resolute-proposed InRelease 345s Hit:2 http://ftpmaster.internal/ubuntu resolute InRelease 345s Hit:3 http://ftpmaster.internal/ubuntu resolute-updates InRelease 346s Hit:4 http://ftpmaster.internal/ubuntu resolute-security InRelease 346s Reading package lists... 346s Reading package lists... 347s Building dependency tree... 347s Reading state information... 347s Calculating upgrade... 347s The following packages will be upgraded: 347s cloud-init cloud-init-base debconf debconf-i18n libexpat1 347s liblocale-gettext-perl python3-debconf systemd-hwe-hwdb 347s 8 upgraded, 0 newly installed, 0 to remove and 0 not upgraded. 347s Need to get 1109 kB of archives. 347s After this operation, 2048 B of additional disk space will be used. 347s Get:1 http://ftpmaster.internal/ubuntu resolute/main ppc64el libexpat1 ppc64el 2.7.4-1 [106 kB] 347s Get:2 http://ftpmaster.internal/ubuntu resolute/main ppc64el liblocale-gettext-perl ppc64el 1.07-8 [16.3 kB] 347s Get:3 http://ftpmaster.internal/ubuntu resolute-proposed/main ppc64el python3-debconf all 1.5.91build1 [4174 B] 347s Get:4 http://ftpmaster.internal/ubuntu resolute-proposed/main ppc64el debconf-i18n all 1.5.91build1 [227 kB] 347s Get:5 http://ftpmaster.internal/ubuntu resolute-proposed/main ppc64el debconf all 1.5.91build1 [126 kB] 347s Get:6 http://ftpmaster.internal/ubuntu resolute/main ppc64el systemd-hwe-hwdb all 259.0.1 [3152 B] 347s Get:7 http://ftpmaster.internal/ubuntu resolute/main ppc64el cloud-init-base all 25.4~4g26c7d38d-0ubuntu1 [624 kB] 347s Get:8 http://ftpmaster.internal/ubuntu resolute/main ppc64el cloud-init all 25.4~4g26c7d38d-0ubuntu1 [2120 B] 347s dpkg-preconfigure: unable to re-open stdin: No such file or directory 347s Fetched 1109 kB in 0s (4675 kB/s) 348s (Reading database ... (Reading database ... 5% (Reading database ... 10% (Reading database ... 15% (Reading database ... 20% (Reading database ... 25% (Reading database ... 30% (Reading database ... 35% (Reading database ... 40% (Reading database ... 45% (Reading database ... 50% (Reading database ... 55% (Reading database ... 60% (Reading database ... 65% (Reading database ... 70% (Reading database ... 75% (Reading database ... 80% (Reading database ... 85% (Reading database ... 90% (Reading database ... 95% (Reading database ... 100% (Reading database ... 82007 files and directories currently installed.) 348s Preparing to unpack .../libexpat1_2.7.4-1_ppc64el.deb ... 348s Unpacking libexpat1:ppc64el (2.7.4-1) over (2.7.3-1) ... 348s Preparing to unpack .../liblocale-gettext-perl_1.07-8_ppc64el.deb ... 348s Unpacking liblocale-gettext-perl (1.07-8) over (1.07-7build1) ... 348s Preparing to unpack .../python3-debconf_1.5.91build1_all.deb ... 348s Unpacking python3-debconf (1.5.91build1) over (1.5.91) ... 348s Preparing to unpack .../debconf-i18n_1.5.91build1_all.deb ... 348s Unpacking debconf-i18n (1.5.91build1) over (1.5.91) ... 348s Preparing to unpack .../debconf_1.5.91build1_all.deb ... 348s Unpacking debconf (1.5.91build1) over (1.5.91) ... 348s Setting up debconf (1.5.91build1) ... 349s (Reading database ... (Reading database ... 5% (Reading database ... 10% (Reading database ... 15% (Reading database ... 20% (Reading database ... 25% (Reading database ... 30% (Reading database ... 35% (Reading database ... 40% (Reading database ... 45% (Reading database ... 50% (Reading database ... 55% (Reading database ... 60% (Reading database ... 65% (Reading database ... 70% (Reading database ... 75% (Reading database ... 80% (Reading database ... 85% (Reading database ... 90% (Reading database ... 95% (Reading database ... 100% (Reading database ... 82007 files and directories currently installed.) 349s Preparing to unpack .../systemd-hwe-hwdb_259.0.1_all.deb ... 349s Unpacking systemd-hwe-hwdb (259.0.1) over (257.7.1) ... 349s Preparing to unpack .../cloud-init-base_25.4~4g26c7d38d-0ubuntu1_all.deb ... 349s Unpacking cloud-init-base (25.4~4g26c7d38d-0ubuntu1) over (25.4~3g78f6f15e-0ubuntu1) ... 349s Preparing to unpack .../cloud-init_25.4~4g26c7d38d-0ubuntu1_all.deb ... 349s Unpacking cloud-init (25.4~4g26c7d38d-0ubuntu1) over (25.4~3g78f6f15e-0ubuntu1) ... 349s Setting up libexpat1:ppc64el (2.7.4-1) ... 349s Setting up python3-debconf (1.5.91build1) ... 350s Setting up cloud-init-base (25.4~4g26c7d38d-0ubuntu1) ... 350s Clearing ignored debconf value cloud-init/datasources 350s Encountered debconf setting for cloud-init-base/datasources. 351s Setting up systemd-hwe-hwdb (259.0.1) ... 352s Setting up liblocale-gettext-perl (1.07-8) ... 352s Setting up cloud-init (25.4~4g26c7d38d-0ubuntu1) ... 352s Setting up debconf-i18n (1.5.91build1) ... 352s Processing triggers for udev (259-1ubuntu3) ... 353s Processing triggers for libc-bin (2.42-2ubuntu4) ... 353s Processing triggers for rsyslog (8.2512.0-1ubuntu2) ... 353s Processing triggers for man-db (2.13.1-1) ... 357s autopkgtest [05:37:21]: upgrading testbed (apt dist-upgrade and autopurge) 357s Reading package lists... 357s Building dependency tree... 357s Reading state information... 357s Calculating upgrade... 357s 0 upgraded, 0 newly installed, 0 to remove and 0 not upgraded. 357s Reading package lists... 357s Building dependency tree... 357s Reading state information... 357s Solving dependencies... 357s 0 upgraded, 0 newly installed, 0 to remove and 0 not upgraded. 358s autopkgtest [05:37:22]: rebooting testbed after setup commands that affected boot 399s Reading package lists... 399s Building dependency tree... 399s Reading state information... 399s Solving dependencies... 399s The following NEW packages will be installed: 399s dns-root-data libevent-2.1-7t64 libevent-pthreads-2.1-7t64 libldns3t64 399s libnss3-tools libreswan libunbound8 399s 0 upgraded, 7 newly installed, 0 to remove and 0 not upgraded. 399s Need to get 3283 kB of archives. 399s After this operation, 15.4 MB of additional disk space will be used. 399s Get:1 http://ftpmaster.internal/ubuntu resolute/main ppc64el dns-root-data all 2025080400 [5908 B] 399s Get:2 http://ftpmaster.internal/ubuntu resolute/main ppc64el libnss3-tools ppc64el 2:3.120-1 [744 kB] 399s Get:3 http://ftpmaster.internal/ubuntu resolute/main ppc64el libevent-pthreads-2.1-7t64 ppc64el 2.1.12-stable-10build1 [8140 B] 399s Get:4 http://ftpmaster.internal/ubuntu resolute/universe ppc64el libldns3t64 ppc64el 1.8.4-2build1 [200 kB] 399s Get:5 http://ftpmaster.internal/ubuntu resolute/main ppc64el libevent-2.1-7t64 ppc64el 2.1.12-stable-10build1 [172 kB] 399s Get:6 http://ftpmaster.internal/ubuntu resolute/main ppc64el libunbound8 ppc64el 1.24.2-1ubuntu1 [576 kB] 399s Get:7 http://ftpmaster.internal/ubuntu resolute/universe ppc64el libreswan ppc64el 5.2-2.2ubuntu1 [1577 kB] 400s Fetched 3283 kB in 0s (7107 kB/s) 400s Selecting previously unselected package dns-root-data. 401s (Reading database ... (Reading database ... 5% (Reading database ... 10% (Reading database ... 15% (Reading database ... 20% (Reading database ... 25% (Reading database ... 30% (Reading database ... 35% (Reading database ... 40% (Reading database ... 45% (Reading database ... 50% (Reading database ... 55% (Reading database ... 60% (Reading database ... 65% (Reading database ... 70% (Reading database ... 75% (Reading database ... 80% (Reading database ... 85% (Reading database ... 90% (Reading database ... 95% (Reading database ... 100% (Reading database ... 82008 files and directories currently installed.) 401s Preparing to unpack .../0-dns-root-data_2025080400_all.deb ... 401s Unpacking dns-root-data (2025080400) ... 401s Selecting previously unselected package libnss3-tools. 401s Preparing to unpack .../1-libnss3-tools_2%3a3.120-1_ppc64el.deb ... 401s Unpacking libnss3-tools (2:3.120-1) ... 401s Selecting previously unselected package libevent-pthreads-2.1-7t64:ppc64el. 401s Preparing to unpack .../2-libevent-pthreads-2.1-7t64_2.1.12-stable-10build1_ppc64el.deb ... 401s Unpacking libevent-pthreads-2.1-7t64:ppc64el (2.1.12-stable-10build1) ... 401s Selecting previously unselected package libldns3t64:ppc64el. 401s Preparing to unpack .../3-libldns3t64_1.8.4-2build1_ppc64el.deb ... 401s Unpacking libldns3t64:ppc64el (1.8.4-2build1) ... 401s Selecting previously unselected package libevent-2.1-7t64:ppc64el. 401s Preparing to unpack .../4-libevent-2.1-7t64_2.1.12-stable-10build1_ppc64el.deb ... 401s Unpacking libevent-2.1-7t64:ppc64el (2.1.12-stable-10build1) ... 401s Selecting previously unselected package libunbound8:ppc64el. 401s Preparing to unpack .../5-libunbound8_1.24.2-1ubuntu1_ppc64el.deb ... 401s Unpacking libunbound8:ppc64el (1.24.2-1ubuntu1) ... 401s Selecting previously unselected package libreswan. 401s Preparing to unpack .../6-libreswan_5.2-2.2ubuntu1_ppc64el.deb ... 401s Unpacking libreswan (5.2-2.2ubuntu1) ... 401s Setting up libldns3t64:ppc64el (1.8.4-2build1) ... 401s Setting up libevent-pthreads-2.1-7t64:ppc64el (2.1.12-stable-10build1) ... 401s Setting up libevent-2.1-7t64:ppc64el (2.1.12-stable-10build1) ... 401s Setting up dns-root-data (2025080400) ... 401s Setting up libunbound8:ppc64el (1.24.2-1ubuntu1) ... 401s Setting up libnss3-tools (2:3.120-1) ... 401s Setting up libreswan (5.2-2.2ubuntu1) ... 401s ipsec.service is a disabled or a static unit, not starting it. 401s Processing triggers for man-db (2.13.1-1) ... 404s Processing triggers for libc-bin (2.42-2ubuntu4) ... 409s autopkgtest [05:38:13]: test cavp: [----------------------- 409s Testing installed CAVP binary: /usr/libexec/ipsec/cavp 410s test: IKE v2 410s Reading from ikev2.fax 414s test: IKE v1 Digital Signature Authentication 414s Reading from ikev1_dsa.fax 416s test: IKE v1 Pre-shared Key Authentication 416s Reading from ikev1_psk.fax 418s /tmp/autopkgtest.RaOuKs/build.UKs/src 418s autopkgtest [05:38:22]: test cavp: -----------------------] 418s cavp PASS 418s autopkgtest [05:38:22]: test cavp: - - - - - - - - - - results - - - - - - - - - - 419s autopkgtest [05:38:23]: @@@@@@@@@@@@@@@@@@@@ summary 419s opportunistic SKIP exit status 77 and marked as skippable 419s cryptocheck PASS 419s cavp PASS