0s autopkgtest [21:16:32]: starting date and time: 2026-02-03 21:16:32+0000 0s autopkgtest [21:16:32]: git checkout: 4b346b80 nova: make wait_reboot return success even when a no-op 0s autopkgtest [21:16:32]: host juju-7f2275-prod-proposed-migration-environment-2; command line: /home/ubuntu/autopkgtest/runner/autopkgtest --output-dir /tmp/autopkgtest-work.1fnnw15r/out --timeout-copy=6000 --needs-internet=try --setup-commands /home/ubuntu/autopkgtest-cloud/worker-config-production/setup-canonical.sh --apt-pocket=proposed=src:pam --apt-upgrade libreswan --timeout-short=300 --timeout-copy=20000 --timeout-build=20000 --env=ADT_TEST_TRIGGERS=pam/1.7.0-5ubuntu3 -- ssh -s /home/ubuntu/autopkgtest/ssh-setup/nova -- --flavor autopkgtest-cpu2-ram4-disk20-ppc64el --security-groups autopkgtest-juju-7f2275-prod-proposed-migration-environment-2@sto01-ppc64el-2.secgroup --name adt-resolute-ppc64el-libreswan-20260203-211632-juju-7f2275-prod-proposed-migration-environment-2-cc7d42c3-f2ab-45fe-ab07-b8fea38e5ed2 --image adt/ubuntu-resolute-ppc64el-server --keyname testbed-juju-7f2275-prod-proposed-migration-environment-2 --net-id=net_prod-autopkgtest-workers-ppc64el -e TERM=linux --mirror=http://ftpmaster.internal/ubuntu/ 3s Creating nova instance adt-resolute-ppc64el-libreswan-20260203-211632-juju-7f2275-prod-proposed-migration-environment-2-cc7d42c3-f2ab-45fe-ab07-b8fea38e5ed2 from image adt/ubuntu-resolute-ppc64el-server-20260203.img (UUID 36e1410e-0a72-4cd6-affd-580c415d80cb)... 44s autopkgtest [21:17:16]: testbed dpkg architecture: ppc64el 44s autopkgtest [21:17:16]: testbed apt version: 3.1.14 45s autopkgtest [21:17:17]: @@@@@@@@@@@@@@@@@@@@ test bed setup 45s autopkgtest [21:17:17]: testbed release detected to be: None 46s autopkgtest [21:17:18]: updating testbed package index (apt update) 46s Get:1 http://ftpmaster.internal/ubuntu resolute-proposed InRelease [124 kB] 46s Hit:2 http://ftpmaster.internal/ubuntu resolute InRelease 46s Hit:3 http://ftpmaster.internal/ubuntu resolute-updates InRelease 46s Hit:4 http://ftpmaster.internal/ubuntu resolute-security InRelease 46s Get:5 http://ftpmaster.internal/ubuntu resolute-proposed/main Sources [242 kB] 46s Get:6 http://ftpmaster.internal/ubuntu resolute-proposed/restricted Sources [5260 B] 46s Get:7 http://ftpmaster.internal/ubuntu resolute-proposed/multiverse Sources [27.9 kB] 46s Get:8 http://ftpmaster.internal/ubuntu resolute-proposed/universe Sources [1343 kB] 46s Get:9 http://ftpmaster.internal/ubuntu resolute-proposed/main ppc64el Packages [289 kB] 47s Get:10 http://ftpmaster.internal/ubuntu resolute-proposed/universe ppc64el Packages [1151 kB] 47s Get:11 http://ftpmaster.internal/ubuntu resolute-proposed/multiverse ppc64el Packages [17.8 kB] 47s Fetched 3201 kB in 1s (2923 kB/s) 48s Reading package lists... 48s Hit:1 http://ftpmaster.internal/ubuntu resolute-proposed InRelease 48s Hit:2 http://ftpmaster.internal/ubuntu resolute InRelease 48s Hit:3 http://ftpmaster.internal/ubuntu resolute-updates InRelease 48s Hit:4 http://ftpmaster.internal/ubuntu resolute-security InRelease 49s Reading package lists... 49s Reading package lists... 49s Building dependency tree... 49s Reading state information... 50s Calculating upgrade... 50s The following packages will be upgraded: 50s libpam-modules libpam-modules-bin libpam-runtime libpam0g 50s 4 upgraded, 0 newly installed, 0 to remove and 0 not upgraded. 50s Need to get 523 kB of archives. 50s After this operation, 0 B of additional disk space will be used. 50s Get:1 http://ftpmaster.internal/ubuntu resolute-proposed/main ppc64el libpam-runtime all 1.7.0-5ubuntu3 [149 kB] 50s Get:2 http://ftpmaster.internal/ubuntu resolute-proposed/main ppc64el libpam0g ppc64el 1.7.0-5ubuntu3 [77.3 kB] 50s Get:3 http://ftpmaster.internal/ubuntu resolute-proposed/main ppc64el libpam-modules-bin ppc64el 1.7.0-5ubuntu3 [53.2 kB] 50s Get:4 http://ftpmaster.internal/ubuntu resolute-proposed/main ppc64el libpam-modules ppc64el 1.7.0-5ubuntu3 [244 kB] 50s dpkg-preconfigure: unable to re-open stdin: No such file or directory 50s Fetched 523 kB in 0s (22.7 MB/s) 51s (Reading database ... (Reading database ... 5% (Reading database ... 10% (Reading database ... 15% (Reading database ... 20% (Reading database ... 25% (Reading database ... 30% (Reading database ... 35% (Reading database ... 40% (Reading database ... 45% (Reading database ... 50% (Reading database ... 55% (Reading database ... 60% (Reading database ... 65% (Reading database ... 70% (Reading database ... 75% (Reading database ... 80% (Reading database ... 85% (Reading database ... 90% (Reading database ... 95% (Reading database ... 100% (Reading database ... 82008 files and directories currently installed.) 51s Preparing to unpack .../libpam-runtime_1.7.0-5ubuntu3_all.deb ... 51s Unpacking libpam-runtime (1.7.0-5ubuntu3) over (1.7.0-5ubuntu2) ... 51s Setting up libpam-runtime (1.7.0-5ubuntu3) ... 51s (Reading database ... (Reading database ... 5% (Reading database ... 10% (Reading database ... 15% (Reading database ... 20% (Reading database ... 25% (Reading database ... 30% (Reading database ... 35% (Reading database ... 40% (Reading database ... 45% (Reading database ... 50% (Reading database ... 55% (Reading database ... 60% (Reading database ... 65% (Reading database ... 70% (Reading database ... 75% (Reading database ... 80% (Reading database ... 85% (Reading database ... 90% (Reading database ... 95% (Reading database ... 100% (Reading database ... 82008 files and directories currently installed.) 51s Preparing to unpack .../libpam0g_1.7.0-5ubuntu3_ppc64el.deb ... 51s Unpacking libpam0g:ppc64el (1.7.0-5ubuntu3) over (1.7.0-5ubuntu2) ... 51s Setting up libpam0g:ppc64el (1.7.0-5ubuntu3) ... 52s (Reading database ... (Reading database ... 5% (Reading database ... 10% (Reading database ... 15% (Reading database ... 20% (Reading database ... 25% (Reading database ... 30% (Reading database ... 35% (Reading database ... 40% (Reading database ... 45% (Reading database ... 50% (Reading database ... 55% (Reading database ... 60% (Reading database ... 65% (Reading database ... 70% (Reading database ... 75% (Reading database ... 80% (Reading database ... 85% (Reading database ... 90% (Reading database ... 95% (Reading database ... 100% (Reading database ... 82008 files and directories currently installed.) 52s Preparing to unpack .../libpam-modules-bin_1.7.0-5ubuntu3_ppc64el.deb ... 52s Unpacking libpam-modules-bin (1.7.0-5ubuntu3) over (1.7.0-5ubuntu2) ... 52s Setting up libpam-modules-bin (1.7.0-5ubuntu3) ... 52s pam_namespace.service is a disabled or a static unit not running, not starting it. 52s (Reading database ... (Reading database ... 5% (Reading database ... 10% (Reading database ... 15% (Reading database ... 20% (Reading database ... 25% (Reading database ... 30% (Reading database ... 35% (Reading database ... 40% (Reading database ... 45% (Reading database ... 50% (Reading database ... 55% (Reading database ... 60% (Reading database ... 65% (Reading database ... 70% (Reading database ... 75% (Reading database ... 80% (Reading database ... 85% (Reading database ... 90% (Reading database ... 95% (Reading database ... 100% (Reading database ... 82008 files and directories currently installed.) 52s Preparing to unpack .../libpam-modules_1.7.0-5ubuntu3_ppc64el.deb ... 52s Unpacking libpam-modules:ppc64el (1.7.0-5ubuntu3) over (1.7.0-5ubuntu2) ... 53s Setting up libpam-modules:ppc64el (1.7.0-5ubuntu3) ... 53s Processing triggers for man-db (2.13.1-1) ... 54s Processing triggers for libc-bin (2.42-2ubuntu4) ... 54s autopkgtest [21:17:26]: upgrading testbed (apt dist-upgrade and autopurge) 54s Reading package lists... 55s Building dependency tree... 55s Reading state information... 55s Calculating upgrade... 55s 0 upgraded, 0 newly installed, 0 to remove and 0 not upgraded. 55s Reading package lists... 55s Building dependency tree... 55s Reading state information... 55s Solving dependencies... 55s 0 upgraded, 0 newly installed, 0 to remove and 0 not upgraded. 56s autopkgtest [21:17:28]: rebooting testbed after setup commands that affected boot 94s autopkgtest [21:18:06]: testbed running kernel: Linux 6.18.0-9-generic #9-Ubuntu SMP PREEMPT_DYNAMIC Mon Jan 12 16:45:54 UTC 2026 97s autopkgtest [21:18:09]: @@@@@@@@@@@@@@@@@@@@ apt-source libreswan 99s Get:1 http://ftpmaster.internal/ubuntu resolute/universe libreswan 5.2-2.2ubuntu1 (dsc) [2735 B] 99s Get:2 http://ftpmaster.internal/ubuntu resolute/universe libreswan 5.2-2.2ubuntu1 (tar) [4132 kB] 99s Get:3 http://ftpmaster.internal/ubuntu resolute/universe libreswan 5.2-2.2ubuntu1 (asc) [862 B] 99s Get:4 http://ftpmaster.internal/ubuntu resolute/universe libreswan 5.2-2.2ubuntu1 (diff) [16.7 kB] 99s gpgv: Signature made Thu Jul 31 14:30:12 2025 UTC 99s gpgv: using RSA key 25E3FF2D7F469DBE7D0D4E50AFCFEC8E669CE1C2 99s gpgv: Can't check signature: No public key 99s dpkg-source: warning: cannot verify inline signature for ./libreswan_5.2-2.2ubuntu1.dsc: no acceptable signature found 100s autopkgtest [21:18:12]: testing package libreswan version 5.2-2.2ubuntu1 101s autopkgtest [21:18:13]: build not needed 102s autopkgtest [21:18:14]: test opportunistic: preparing testbed 103s Reading package lists... 103s Building dependency tree... 103s Reading state information... 103s Solving dependencies... 103s The following NEW packages will be installed: 103s dns-root-data libevent-2.1-7t64 libevent-pthreads-2.1-7t64 libldns3t64 103s libnss3-tools libreswan libunbound8 103s 0 upgraded, 7 newly installed, 0 to remove and 0 not upgraded. 103s Need to get 3283 kB of archives. 103s After this operation, 15.4 MB of additional disk space will be used. 103s Get:1 http://ftpmaster.internal/ubuntu resolute/main ppc64el dns-root-data all 2025080400build1 [6022 B] 103s Get:2 http://ftpmaster.internal/ubuntu resolute/main ppc64el libnss3-tools ppc64el 2:3.120-1 [744 kB] 103s Get:3 http://ftpmaster.internal/ubuntu resolute/main ppc64el libevent-pthreads-2.1-7t64 ppc64el 2.1.12-stable-10build1 [8140 B] 103s Get:4 http://ftpmaster.internal/ubuntu resolute/universe ppc64el libldns3t64 ppc64el 1.8.4-2build1 [200 kB] 103s Get:5 http://ftpmaster.internal/ubuntu resolute/main ppc64el libevent-2.1-7t64 ppc64el 2.1.12-stable-10build1 [172 kB] 103s Get:6 http://ftpmaster.internal/ubuntu resolute/main ppc64el libunbound8 ppc64el 1.24.2-1ubuntu1 [576 kB] 104s Get:7 http://ftpmaster.internal/ubuntu resolute/universe ppc64el libreswan ppc64el 5.2-2.2ubuntu1 [1577 kB] 104s Fetched 3283 kB in 1s (3159 kB/s) 104s Selecting previously unselected package dns-root-data. 105s (Reading database ... (Reading database ... 5% (Reading database ... 10% (Reading database ... 15% (Reading database ... 20% (Reading database ... 25% (Reading database ... 30% (Reading database ... 35% (Reading database ... 40% (Reading database ... 45% (Reading database ... 50% (Reading database ... 55% (Reading database ... 60% (Reading database ... 65% (Reading database ... 70% (Reading database ... 75% (Reading database ... 80% (Reading database ... 85% (Reading database ... 90% (Reading database ... 95% (Reading database ... 100% (Reading database ... 82008 files and directories currently installed.) 105s Preparing to unpack .../0-dns-root-data_2025080400build1_all.deb ... 105s Unpacking dns-root-data (2025080400build1) ... 105s Selecting previously unselected package libnss3-tools. 105s Preparing to unpack .../1-libnss3-tools_2%3a3.120-1_ppc64el.deb ... 105s Unpacking libnss3-tools (2:3.120-1) ... 105s Selecting previously unselected package libevent-pthreads-2.1-7t64:ppc64el. 105s Preparing to unpack .../2-libevent-pthreads-2.1-7t64_2.1.12-stable-10build1_ppc64el.deb ... 105s Unpacking libevent-pthreads-2.1-7t64:ppc64el (2.1.12-stable-10build1) ... 105s Selecting previously unselected package libldns3t64:ppc64el. 105s Preparing to unpack .../3-libldns3t64_1.8.4-2build1_ppc64el.deb ... 105s Unpacking libldns3t64:ppc64el (1.8.4-2build1) ... 105s Selecting previously unselected package libevent-2.1-7t64:ppc64el. 105s Preparing to unpack .../4-libevent-2.1-7t64_2.1.12-stable-10build1_ppc64el.deb ... 105s Unpacking libevent-2.1-7t64:ppc64el (2.1.12-stable-10build1) ... 105s Selecting previously unselected package libunbound8:ppc64el. 105s Preparing to unpack .../5-libunbound8_1.24.2-1ubuntu1_ppc64el.deb ... 105s Unpacking libunbound8:ppc64el (1.24.2-1ubuntu1) ... 105s Selecting previously unselected package libreswan. 105s Preparing to unpack .../6-libreswan_5.2-2.2ubuntu1_ppc64el.deb ... 105s Unpacking libreswan (5.2-2.2ubuntu1) ... 105s Setting up libldns3t64:ppc64el (1.8.4-2build1) ... 105s Setting up libevent-pthreads-2.1-7t64:ppc64el (2.1.12-stable-10build1) ... 105s Setting up libevent-2.1-7t64:ppc64el (2.1.12-stable-10build1) ... 105s Setting up dns-root-data (2025080400build1) ... 105s Setting up libunbound8:ppc64el (1.24.2-1ubuntu1) ... 105s Setting up libnss3-tools (2:3.120-1) ... 105s Setting up libreswan (5.2-2.2ubuntu1) ... 105s ipsec.service is a disabled or a static unit, not starting it. 105s Processing triggers for man-db (2.13.1-1) ... 106s Processing triggers for libc-bin (2.42-2ubuntu4) ... 107s autopkgtest [21:18:19]: test opportunistic: [----------------------- 108s ping: oe.libreswan.org: No address associated with hostname 108s autopkgtest [21:18:20]: test opportunistic: -----------------------] 108s autopkgtest [21:18:20]: test opportunistic: - - - - - - - - - - results - - - - - - - - - - 108s opportunistic SKIP exit status 77 and marked as skippable 109s autopkgtest [21:18:21]: test cryptocheck: preparing testbed 117s Creating nova instance adt-resolute-ppc64el-libreswan-20260203-211632-juju-7f2275-prod-proposed-migration-environment-2-cc7d42c3-f2ab-45fe-ab07-b8fea38e5ed2 from image adt/ubuntu-resolute-ppc64el-server-20260203.img (UUID 36e1410e-0a72-4cd6-affd-580c415d80cb)... 165s autopkgtest [21:19:17]: testbed dpkg architecture: ppc64el 165s autopkgtest [21:19:17]: testbed apt version: 3.1.14 165s autopkgtest [21:19:17]: @@@@@@@@@@@@@@@@@@@@ test bed setup 165s autopkgtest [21:19:17]: testbed release detected to be: resolute 166s autopkgtest [21:19:18]: updating testbed package index (apt update) 166s Get:1 http://ftpmaster.internal/ubuntu resolute-proposed InRelease [124 kB] 166s Hit:2 http://ftpmaster.internal/ubuntu resolute InRelease 166s Hit:3 http://ftpmaster.internal/ubuntu resolute-updates InRelease 166s Hit:4 http://ftpmaster.internal/ubuntu resolute-security InRelease 166s Get:5 http://ftpmaster.internal/ubuntu resolute-proposed/main Sources [242 kB] 166s Get:6 http://ftpmaster.internal/ubuntu resolute-proposed/universe Sources [1343 kB] 167s Get:7 http://ftpmaster.internal/ubuntu resolute-proposed/multiverse Sources [27.9 kB] 167s Get:8 http://ftpmaster.internal/ubuntu resolute-proposed/restricted Sources [5260 B] 167s Get:9 http://ftpmaster.internal/ubuntu resolute-proposed/main ppc64el Packages [289 kB] 167s Get:10 http://ftpmaster.internal/ubuntu resolute-proposed/universe ppc64el Packages [1151 kB] 167s Get:11 http://ftpmaster.internal/ubuntu resolute-proposed/multiverse ppc64el Packages [17.8 kB] 167s Fetched 3201 kB in 1s (3747 kB/s) 168s Reading package lists... 169s Hit:1 http://ftpmaster.internal/ubuntu resolute-proposed InRelease 169s Hit:2 http://ftpmaster.internal/ubuntu resolute InRelease 169s Hit:3 http://ftpmaster.internal/ubuntu resolute-updates InRelease 169s Hit:4 http://ftpmaster.internal/ubuntu resolute-security InRelease 170s Reading package lists... 170s Reading package lists... 170s Building dependency tree... 170s Reading state information... 170s Calculating upgrade... 170s The following packages will be upgraded: 170s libpam-modules libpam-modules-bin libpam-runtime libpam0g 171s 4 upgraded, 0 newly installed, 0 to remove and 0 not upgraded. 171s Need to get 523 kB of archives. 171s After this operation, 0 B of additional disk space will be used. 171s Get:1 http://ftpmaster.internal/ubuntu resolute-proposed/main ppc64el libpam-runtime all 1.7.0-5ubuntu3 [149 kB] 171s Get:2 http://ftpmaster.internal/ubuntu resolute-proposed/main ppc64el libpam0g ppc64el 1.7.0-5ubuntu3 [77.3 kB] 171s Get:3 http://ftpmaster.internal/ubuntu resolute-proposed/main ppc64el libpam-modules-bin ppc64el 1.7.0-5ubuntu3 [53.2 kB] 171s Get:4 http://ftpmaster.internal/ubuntu resolute-proposed/main ppc64el libpam-modules ppc64el 1.7.0-5ubuntu3 [244 kB] 171s dpkg-preconfigure: unable to re-open stdin: No such file or directory 171s Fetched 523 kB in 0s (1936 kB/s) 171s (Reading database ... (Reading database ... 5% (Reading database ... 10% (Reading database ... 15% (Reading database ... 20% (Reading database ... 25% (Reading database ... 30% (Reading database ... 35% (Reading database ... 40% (Reading database ... 45% (Reading database ... 50% (Reading database ... 55% (Reading database ... 60% (Reading database ... 65% (Reading database ... 70% (Reading database ... 75% (Reading database ... 80% (Reading database ... 85% (Reading database ... 90% (Reading database ... 95% (Reading database ... 100% (Reading database ... 82008 files and directories currently installed.) 171s Preparing to unpack .../libpam-runtime_1.7.0-5ubuntu3_all.deb ... 171s Unpacking libpam-runtime (1.7.0-5ubuntu3) over (1.7.0-5ubuntu2) ... 171s Setting up libpam-runtime (1.7.0-5ubuntu3) ... 172s (Reading database ... (Reading database ... 5% (Reading database ... 10% (Reading database ... 15% (Reading database ... 20% (Reading database ... 25% (Reading database ... 30% (Reading database ... 35% (Reading database ... 40% (Reading database ... 45% (Reading database ... 50% (Reading database ... 55% (Reading database ... 60% (Reading database ... 65% (Reading database ... 70% (Reading database ... 75% (Reading database ... 80% (Reading database ... 85% (Reading database ... 90% (Reading database ... 95% (Reading database ... 100% (Reading database ... 82008 files and directories currently installed.) 172s Preparing to unpack .../libpam0g_1.7.0-5ubuntu3_ppc64el.deb ... 172s Unpacking libpam0g:ppc64el (1.7.0-5ubuntu3) over (1.7.0-5ubuntu2) ... 172s Setting up libpam0g:ppc64el (1.7.0-5ubuntu3) ... 172s (Reading database ... (Reading database ... 5% (Reading database ... 10% (Reading database ... 15% (Reading database ... 20% (Reading database ... 25% (Reading database ... 30% (Reading database ... 35% (Reading database ... 40% (Reading database ... 45% (Reading database ... 50% (Reading database ... 55% (Reading database ... 60% (Reading database ... 65% (Reading database ... 70% (Reading database ... 75% (Reading database ... 80% (Reading database ... 85% (Reading database ... 90% (Reading database ... 95% (Reading database ... 100% (Reading database ... 82008 files and directories currently installed.) 172s Preparing to unpack .../libpam-modules-bin_1.7.0-5ubuntu3_ppc64el.deb ... 172s Unpacking libpam-modules-bin (1.7.0-5ubuntu3) over (1.7.0-5ubuntu2) ... 173s Setting up libpam-modules-bin (1.7.0-5ubuntu3) ... 173s pam_namespace.service is a disabled or a static unit not running, not starting it. 173s (Reading database ... (Reading database ... 5% (Reading database ... 10% (Reading database ... 15% (Reading database ... 20% (Reading database ... 25% (Reading database ... 30% (Reading database ... 35% (Reading database ... 40% (Reading database ... 45% (Reading database ... 50% (Reading database ... 55% (Reading database ... 60% (Reading database ... 65% (Reading database ... 70% (Reading database ... 75% (Reading database ... 80% (Reading database ... 85% (Reading database ... 90% (Reading database ... 95% (Reading database ... 100% (Reading database ... 82008 files and directories currently installed.) 173s Preparing to unpack .../libpam-modules_1.7.0-5ubuntu3_ppc64el.deb ... 173s Unpacking libpam-modules:ppc64el (1.7.0-5ubuntu3) over (1.7.0-5ubuntu2) ... 173s Setting up libpam-modules:ppc64el (1.7.0-5ubuntu3) ... 173s Processing triggers for man-db (2.13.1-1) ... 174s Processing triggers for libc-bin (2.42-2ubuntu4) ... 175s autopkgtest [21:19:27]: upgrading testbed (apt dist-upgrade and autopurge) 175s Reading package lists... 175s Building dependency tree... 175s Reading state information... 175s Calculating upgrade... 175s 0 upgraded, 0 newly installed, 0 to remove and 0 not upgraded. 175s Reading package lists... 175s Building dependency tree... 175s Reading state information... 175s Solving dependencies... 176s 0 upgraded, 0 newly installed, 0 to remove and 0 not upgraded. 176s autopkgtest [21:19:28]: rebooting testbed after setup commands that affected boot 215s Reading package lists... 215s Building dependency tree... 215s Reading state information... 215s Solving dependencies... 215s The following NEW packages will be installed: 215s dns-root-data libevent-2.1-7t64 libevent-pthreads-2.1-7t64 libldns3t64 215s libnss3-tools libreswan libunbound8 215s 0 upgraded, 7 newly installed, 0 to remove and 0 not upgraded. 215s Need to get 3283 kB of archives. 215s After this operation, 15.4 MB of additional disk space will be used. 215s Get:1 http://ftpmaster.internal/ubuntu resolute/main ppc64el dns-root-data all 2025080400build1 [6022 B] 215s Get:2 http://ftpmaster.internal/ubuntu resolute/main ppc64el libnss3-tools ppc64el 2:3.120-1 [744 kB] 216s Get:3 http://ftpmaster.internal/ubuntu resolute/main ppc64el libevent-pthreads-2.1-7t64 ppc64el 2.1.12-stable-10build1 [8140 B] 216s Get:4 http://ftpmaster.internal/ubuntu resolute/universe ppc64el libldns3t64 ppc64el 1.8.4-2build1 [200 kB] 216s Get:5 http://ftpmaster.internal/ubuntu resolute/main ppc64el libevent-2.1-7t64 ppc64el 2.1.12-stable-10build1 [172 kB] 216s Get:6 http://ftpmaster.internal/ubuntu resolute/main ppc64el libunbound8 ppc64el 1.24.2-1ubuntu1 [576 kB] 216s Get:7 http://ftpmaster.internal/ubuntu resolute/universe ppc64el libreswan ppc64el 5.2-2.2ubuntu1 [1577 kB] 217s Fetched 3283 kB in 0s (8486 kB/s) 217s Selecting previously unselected package dns-root-data. 217s (Reading database ... (Reading database ... 5% (Reading database ... 10% (Reading database ... 15% (Reading database ... 20% (Reading database ... 25% (Reading database ... 30% (Reading database ... 35% (Reading database ... 40% (Reading database ... 45% (Reading database ... 50% (Reading database ... 55% (Reading database ... 60% (Reading database ... 65% (Reading database ... 70% (Reading database ... 75% (Reading database ... 80% (Reading database ... 85% (Reading database ... 90% (Reading database ... 95% (Reading database ... 100% (Reading database ... 82008 files and directories currently installed.) 217s Preparing to unpack .../0-dns-root-data_2025080400build1_all.deb ... 217s Unpacking dns-root-data (2025080400build1) ... 217s Selecting previously unselected package libnss3-tools. 217s Preparing to unpack .../1-libnss3-tools_2%3a3.120-1_ppc64el.deb ... 217s Unpacking libnss3-tools (2:3.120-1) ... 217s Selecting previously unselected package libevent-pthreads-2.1-7t64:ppc64el. 217s Preparing to unpack .../2-libevent-pthreads-2.1-7t64_2.1.12-stable-10build1_ppc64el.deb ... 217s Unpacking libevent-pthreads-2.1-7t64:ppc64el (2.1.12-stable-10build1) ... 217s Selecting previously unselected package libldns3t64:ppc64el. 217s Preparing to unpack .../3-libldns3t64_1.8.4-2build1_ppc64el.deb ... 217s Unpacking libldns3t64:ppc64el (1.8.4-2build1) ... 217s Selecting previously unselected package libevent-2.1-7t64:ppc64el. 217s Preparing to unpack .../4-libevent-2.1-7t64_2.1.12-stable-10build1_ppc64el.deb ... 217s Unpacking libevent-2.1-7t64:ppc64el (2.1.12-stable-10build1) ... 217s Selecting previously unselected package libunbound8:ppc64el. 217s Preparing to unpack .../5-libunbound8_1.24.2-1ubuntu1_ppc64el.deb ... 217s Unpacking libunbound8:ppc64el (1.24.2-1ubuntu1) ... 217s Selecting previously unselected package libreswan. 217s Preparing to unpack .../6-libreswan_5.2-2.2ubuntu1_ppc64el.deb ... 217s Unpacking libreswan (5.2-2.2ubuntu1) ... 217s Setting up libldns3t64:ppc64el (1.8.4-2build1) ... 217s Setting up libevent-pthreads-2.1-7t64:ppc64el (2.1.12-stable-10build1) ... 217s Setting up libevent-2.1-7t64:ppc64el (2.1.12-stable-10build1) ... 217s Setting up dns-root-data (2025080400build1) ... 217s Setting up libunbound8:ppc64el (1.24.2-1ubuntu1) ... 217s Setting up libnss3-tools (2:3.120-1) ... 217s Setting up libreswan (5.2-2.2ubuntu1) ... 218s ipsec.service is a disabled or a static unit, not starting it. 218s Processing triggers for man-db (2.13.1-1) ... 219s Processing triggers for libc-bin (2.42-2ubuntu4) ... 254s autopkgtest [21:20:46]: test cryptocheck: [----------------------- 254s Testing installed binary: /usr/libexec/ipsec/algparse 254s Testing installed binary: /usr/libexec/ipsec/pluto 254s testing -tp 254s ipsec algparse: Encryption algorithms: 254s ipsec algparse: AES_CCM_16 {256,192,*128} IKEv1: ESP IKEv2: ESP FIPS aes_ccm, aes_ccm_c 254s ipsec algparse: AES_CCM_12 {256,192,*128} IKEv1: ESP IKEv2: ESP FIPS aes_ccm_b 254s ipsec algparse: AES_CCM_8 {256,192,*128} IKEv1: ESP IKEv2: ESP FIPS aes_ccm_a 254s ipsec algparse: 3DES_CBC [*192] IKEv1: IKE ESP IKEv2: IKE ESP FIPS NSS(CBC) 3des 254s ipsec algparse: CAMELLIA_CTR {256,192,*128} IKEv1: ESP IKEv2: ESP 254s ipsec algparse: CAMELLIA_CBC {256,192,*128} IKEv1: IKE ESP IKEv2: IKE ESP NSS(CBC) camellia 254s ipsec algparse: AES_GCM_16 {256,192,*128} IKEv1: ESP IKEv2: IKE ESP FIPS NSS(AEAD) aes_gcm, aes_gcm_c 254s ipsec algparse: AES_GCM_12 {256,192,*128} IKEv1: ESP IKEv2: IKE ESP FIPS NSS(AEAD) aes_gcm_b 254s ipsec algparse: AES_GCM_8 {256,192,*128} IKEv1: ESP IKEv2: IKE ESP FIPS NSS(AEAD) aes_gcm_a 254s ipsec algparse: AES_CTR {256,192,*128} IKEv1: IKE ESP IKEv2: IKE ESP FIPS NSS(CTR) aesctr 254s ipsec algparse: AES_CBC {256,192,*128} IKEv1: IKE ESP IKEv2: IKE ESP FIPS NSS(CBC) aes 254s ipsec algparse: NULL_AUTH_AES_GMAC {256,192,*128} IKEv1: ESP IKEv2: ESP FIPS aes_gmac 254s ipsec algparse: NULL [] IKEv1: ESP IKEv2: ESP NULL 254s ipsec algparse: CHACHA20_POLY1305 [*256] IKEv1: IKEv2: IKE ESP NSS(AEAD) chacha20poly1305 254s ipsec algparse: Hash algorithms: 254s ipsec algparse: MD5 IKEv1: IKE IKEv2: NSS 254s ipsec algparse: SHA1 IKEv1: IKE IKEv2: IKE FIPS NSS sha 254s ipsec algparse: SHA2_256 IKEv1: IKE IKEv2: IKE FIPS NSS sha2, sha256 254s ipsec algparse: SHA2_384 IKEv1: IKE IKEv2: IKE FIPS NSS sha384 254s ipsec algparse: SHA2_512 IKEv1: IKE IKEv2: IKE FIPS NSS sha512 254s ipsec algparse: IDENTITY IKEv1: IKEv2: FIPS 254s ipsec algparse: PRF algorithms: 254s ipsec algparse: HMAC_MD5 IKEv1: IKE IKEv2: IKE NSS md5 254s ipsec algparse: HMAC_SHA1 IKEv1: IKE IKEv2: IKE FIPS NSS sha, sha1 254s ipsec algparse: HMAC_SHA2_256 IKEv1: IKE IKEv2: IKE FIPS NSS sha2, sha256, sha2_256 254s ipsec algparse: HMAC_SHA2_384 IKEv1: IKE IKEv2: IKE FIPS NSS sha384, sha2_384 254s ipsec algparse: HMAC_SHA2_512 IKEv1: IKE IKEv2: IKE FIPS NSS sha512, sha2_512 254s ipsec algparse: AES_XCBC IKEv1: IKEv2: IKE native(XCBC) aes128_xcbc 254s ipsec algparse: Integrity algorithms: 254s ipsec algparse: HMAC_MD5_96 IKEv1: IKE ESP AH IKEv2: IKE ESP AH NSS md5, hmac_md5 254s ipsec algparse: HMAC_SHA1_96 IKEv1: IKE ESP AH IKEv2: IKE ESP AH FIPS NSS sha, sha1, sha1_96, hmac_sha1 254s ipsec algparse: HMAC_SHA2_512_256 IKEv1: IKE ESP AH IKEv2: IKE ESP AH FIPS NSS sha512, sha2_512, sha2_512_256, hmac_sha2_512 254s ipsec algparse: HMAC_SHA2_384_192 IKEv1: IKE ESP AH IKEv2: IKE ESP AH FIPS NSS sha384, sha2_384, sha2_384_192, hmac_sha2_384 254s ipsec algparse: HMAC_SHA2_256_128 IKEv1: IKE ESP AH IKEv2: IKE ESP AH FIPS NSS sha2, sha256, sha2_256, sha2_256_128, hmac_sha2_256 254s ipsec algparse: HMAC_SHA2_256_TRUNCBUG IKEv1: ESP AH IKEv2: AH 254s ipsec algparse: AES_XCBC_96 IKEv1: ESP AH IKEv2: IKE ESP AH native(XCBC) aes_xcbc, aes128_xcbc, aes128_xcbc_96 254s ipsec algparse: AES_CMAC_96 IKEv1: ESP AH IKEv2: ESP AH FIPS aes_cmac 254s ipsec algparse: NONE IKEv1: ESP IKEv2: IKE ESP FIPS null 254s ipsec algparse: DH algorithms: 254s ipsec algparse: NONE IKEv1: IKEv2: IKE ESP AH FIPS NSS(MODP) null, dh0 254s ipsec algparse: MODP1536 IKEv1: IKE ESP AH IKEv2: IKE ESP AH NSS(MODP) dh5 254s ipsec algparse: MODP2048 IKEv1: IKE ESP AH IKEv2: IKE ESP AH FIPS NSS(MODP) dh14 254s ipsec algparse: MODP3072 IKEv1: IKE ESP AH IKEv2: IKE ESP AH FIPS NSS(MODP) dh15 254s ipsec algparse: MODP4096 IKEv1: IKE ESP AH IKEv2: IKE ESP AH FIPS NSS(MODP) dh16 254s ipsec algparse: MODP6144 IKEv1: IKE ESP AH IKEv2: IKE ESP AH FIPS NSS(MODP) dh17 254s ipsec algparse: MODP8192 IKEv1: IKE ESP AH IKEv2: IKE ESP AH FIPS NSS(MODP) dh18 254s ipsec algparse: DH19 IKEv1: IKE IKEv2: IKE ESP AH FIPS NSS(ECP) ecp_256, ecp256 254s ipsec algparse: DH20 IKEv1: IKE IKEv2: IKE ESP AH FIPS NSS(ECP) ecp_384, ecp384 254s ipsec algparse: DH21 IKEv1: IKE IKEv2: IKE ESP AH FIPS NSS(ECP) ecp_521, ecp521 254s ipsec algparse: DH31 IKEv1: IKE IKEv2: IKE ESP AH NSS(ECP) curve25519 254s ipsec algparse: IPCOMP algorithms: 254s ipsec algparse: DEFLATE IKEv1: ESP AH IKEv2: ESP AH FIPS 254s ipsec algparse: LZS IKEv1: IKEv2: ESP AH FIPS 254s ipsec algparse: LZJH IKEv1: IKEv2: ESP AH FIPS 254s | parsing 'AES_GCM_16_256,AES_GCM_16_128,CHACHA20_POLY1305,AES_CBC_256,AES_CBC_128' for ESP 254s | proposal: 'AES_GCM_16_256' 254s | token: '' '' "AES_GCM_16_256" '' 254s | token: '' "AES_GCM_16_256" '' '' 254s | ike_alg_byname() failed: ESP encryption algorithm 'AES_GCM_16_256' is not recognized 254s | token: '' '' '' 254s | appending ESP encryption algorithm AES_GCM_16[_256] 254s | appending ESP integrity algorithm NONE[_0] 254s | proposal: 'AES_GCM_16_128' 254s | token: '' '' "AES_GCM_16_128" '' 254s | token: '' "AES_GCM_16_128" '' '' 254s | ike_alg_byname() failed: ESP encryption algorithm 'AES_GCM_16_128' is not recognized 254s | token: '' '' '' 254s | appending ESP encryption algorithm AES_GCM_16[_128] 254s | appending ESP integrity algorithm NONE[_0] 254s | proposal: 'CHACHA20_POLY1305' 254s | token: '' '' "CHACHA20_POLY1305" '' 254s | token: '' "CHACHA20_POLY1305" '' '' 254s | token: '' '' '' 254s | appending ESP encryption algorithm CHACHA20_POLY1305[_0] 254s | appending ESP integrity algorithm NONE[_0] 254s | proposal: 'AES_CBC_256' 254s | token: '' '' "AES_CBC_256" '' 254s | token: '' "AES_CBC_256" '' '' 254s | ike_alg_byname() failed: ESP encryption algorithm 'AES_CBC_256' is not recognized 254s | token: '' '' '' 254s | appending ESP encryption algorithm AES_CBC[_256] 254s | appending ESP integrity algorithm HMAC_SHA2_512_256[_0] 254s | appending ESP integrity algorithm HMAC_SHA2_256_128[_0] 254s | proposal: 'AES_CBC_128' 254s | token: '' '' "AES_CBC_128" '' 254s | token: '' "AES_CBC_128" '' '' 254s algparse -v2 'esp' (expect SUCCESS) 254s AES_GCM_16_256-NONE 254s AES_GCM_16_128-NONE 254s CHACHA20_POLY1305-NONE 254s AES_CBC_256-HMAC_SHA2_512_256+HMAC_SHA2_256_128 254s AES_CBC_128-HMAC_SHA2_512_256+HMAC_SHA2_256_128 254s algparse -v2 'esp=' (expect ERROR) 254s ERROR: ESP proposal is empty 254s algparse -v2 'esp=aes' (expect SUCCESS) 254s AES_CBC-HMAC_SHA2_512_256+HMAC_SHA2_256_128 254s algparse -v2 'esp=aes;modp2048' (expect SUCCESS) 254s AES_CBC-HMAC_SHA2_512_256+HMAC_SHA2_256_128 254s algparse -v2 'esp=aes-sha1' (expect SUCCESS) 254s AES_CBC-HMAC_SHA1_96 254s algparse -v2 'esp=aes-sha1' (expect SUCCESS) 254s AES_CBC-HMAC_SHA1_96 254s algparse -v2 'esp=aes-sha1-modp2048' (expect SUCCESS) 254s | ike_alg_byname() failed: ESP encryption algorithm 'AES_CBC_128' is not recognized 254s | token: '' '' '' 254s | appending ESP encryption algorithm AES_CBC[_128] 254s | appending ESP integrity algorithm HMAC_SHA2_512_256[_0] 254s | appending ESP integrity algorithm HMAC_SHA2_256_128[_0] 254s | parsing '' for ESP 254s | parsing 'aes' for ESP 254s | proposal: 'aes' 254s | token: '' '' "aes" '' 254s | token: '' "aes" '' '' 254s | token: '' '' '' 254s | appending ESP encryption algorithm AES_CBC[_0] 254s | appending ESP integrity algorithm HMAC_SHA2_512_256[_0] 254s | appending ESP integrity algorithm HMAC_SHA2_256_128[_0] 254s | parsing 'aes;modp2048' for ESP 254s | proposal: 'aes;modp2048' 254s | token: '' '' "aes" ';' 254s | token: '' "aes" ';' "modp2048" '' 254s | token: ';' "modp2048" '' '' 254s | appending ESP encryption algorithm AES_CBC[_0] 254s | parsing dh: 254s | appending ESP DH algorithm MODP2048[_0] 254s | token: '' '' '' 254s | appending ESP integrity algorithm HMAC_SHA2_512_256[_0] 254s | appending ESP integrity algorithm HMAC_SHA2_256_128[_0] 254s ipsec algparse: ignoring ESP DH algorithm MODP2048 as PFS policy is disabled 254s | parsing 'aes-sha1' for ESP 254s | proposal: 'aes-sha1' 254s | token: '' '' "aes" '-' 254s | token: '' "aes" '-' "sha1" '' 254s | token: '-' "sha1" '' '' 254s | appending ESP encryption algorithm AES_CBC[_0] 254s | parsing integ: 254s | appending ESP integrity algorithm HMAC_SHA1_96[_0] 254s | token: '' '' '' 254s | parsing 'aes-sha1' for ESP 254s | proposal: 'aes-sha1' 254s | token: '' '' "aes" '-' 254s | token: '' "aes" '-' "sha1" '' 254s | token: '-' "sha1" '' '' 254s | appending ESP encryption algorithm AES_CBC[_0] 254s | parsing integ: 254s | appending ESP integrity algorithm HMAC_SHA1_96[_0] 254s | token: '' '' '' 254s | parsing 'aes-sha1-modp2048' for ESP 254s | proposal: 'aes-sha1-modp2048' 254s | token: '' '' "aes" '-' 254s | token: '' "aes" '-' "sha1" '-' 254s | token: '-' "sha1" '-' "modp2048" '' 254s | appending ESP encryption algorithm AES_CBC[_0] 254s | parsing integ: 254s | appending ESP integrity algorithm HMAC_SHA1_96[_0] 254s | token: '-' "modp2048" '' '' 254s | parsing dh: 254s | appending ESP DH algorithm MODP2048[_0] 254s | token: '' '' '' 254s AES_CBC-HMAC_SHA1_96 254s algparse -v2 'esp=aes-128-sha1' (expect SUCCESS) 254s AES_CBC_128-HMAC_SHA1_96 254s algparse -v2 'esp=aes-128-sha1' (expect SUCCESS) 254s ipsec algparse: ignoring ESP DH algorithm MODP2048 as PFS policy is disabled 254s | parsing 'aes-128-sha1' for ESP 254s | proposal: 'aes-128-sha1' 254s | token: '' '' "aes" '-' 254s | token: '' "aes" '-' "128" '-' 254s | token: '-' "128" '-' "sha1" '' 254s | token: '-' "sha1" '' '' 254s | appending ESP encryption algorithm AES_CBC[_128] 254s | parsing integ: 254s | appending ESP integrity algorithm HMAC_SHA1_96[_0] 254s | token: '' '' '' 254s | parsing 'aes-128-sha1' for ESP 254s | proposal: 'aes-128-sha1' 254s AES_CBC_128-HMAC_SHA1_96 254s algparse -v2 'esp=aes-128-sha1-modp2048' (expect SUCCESS) 254s AES_CBC_128-HMAC_SHA1_96 254s algparse -v2 'esp=aes-128' (expect SUCCESS) 254s AES_CBC_128-HMAC_SHA2_512_256+HMAC_SHA2_256_128 254s algparse -v2 'esp=aes_gcm_a-128-null' (expect SUCCESS) 254s AES_GCM_8_128-NONE 254s algparse -v2 'esp=3des-sha1;modp1024' (expect ERROR) 254s ERROR: ESP DH algorithm 'modp1024' is not supported 254s algparse -v2 'esp=3des-sha1;modp1536' (expect SUCCESS) 254s 3DES_CBC-HMAC_SHA1_96 254s algparse -v2 'esp=3des-sha1;modp2048' (expect SUCCESS) 254s 3DES_CBC-HMAC_SHA1_96 254s algparse -v2 'esp=3des-sha1;dh21' (expect SUCCESS) 254s 3DES_CBC-HMAC_SHA1_96 254s algparse -v2 'esp=3des-sha1;ecp_521' (expect SUCCESS) 254s 3DES_CBC-HMAC_SHA1_96 254s algparse -v2 'esp=3des-sha1;dh23' (expect ERROR) 254s ERROR: ESP DH algorithm 'dh23' is not supported 254s algparse -v2 'esp=3des-sha1;dh24' (expect ERROR) 254s ERROR: ESP DH algorithm 'dh24' is not supported 254s algparse -v2 'esp=3des-sha1' (expect SUCCESS) 254s 3DES_CBC-HMAC_SHA1_96 254s algparse -v2 'esp=null-sha1' (expect SUCCESS) 254s NULL-HMAC_SHA1_96 254s algparse -v2 'esp=aes_cbc' (expect SUCCESS) 254s AES_CBC-HMAC_SHA2_512_256+HMAC_SHA2_256_128 254s algparse -v2 'esp=aes-sha' (expect SUCCESS) 254s AES_CBC-HMAC_SHA1_96 254s algparse -v2 'esp=aes-sha1' (expect SUCCESS) 254s AES_CBC-HMAC_SHA1_96 254s algparse -v2 'esp=aes128-sha1' (expect SUCCESS) 254s AES_CBC_128-HMAC_SHA1_96 254s algparse -v2 'esp=aes-sha2' (expect SUCCESS) 254s AES_CBC-HMAC_SHA2_256_128 254s algparse -v2 'esp=aes-sha256' (expect SUCCESS) 254s AES_CBC-HMAC_SHA2_256_128 254s algparse -v2 'esp=aes-sha384' (expect SUCCESS) 254s AES_CBC-HMAC_SHA2_384_192 254s algparse -v2 'esp=aes-sha512' (expect SUCCESS) 254s AES_CBC-HMAC_SHA2_512_256 254s algparse -v2 'esp=aes128-aes_xcbc' (expect SUCCESS) 254s AES_CBC_128-AES_XCBC_96 254s algparse -v2 'esp=aes192-sha1' (expect SUCCESS) 254s AES_CBC_192-HMAC_SHA1_96 254s algparse -v2 'esp=aes256-sha1' (expect SUCCESS) 254s AES_CBC_256-HMAC_SHA1_96 254s algparse -v2 'esp=aes256-sha' (expect SUCCESS) 254s AES_CBC_256-HMAC_SHA1_96 254s algparse -v2 'esp=aes256-sha2' (expect SUCCESS) 254s AES_CBC_256-HMAC_SHA2_256_128 254s algparse -v2 'esp=aes256-sha2_256' (expect SUCCESS) 254s AES_CBC_256-HMAC_SHA2_256_128 254s algparse -v2 'esp=aes256-sha2_384' (expect SUCCESS) 254s AES_CBC_256-HMAC_SHA2_384_192 254s algparse -v2 'esp=aes256-sha2_512' (expect SUCCESS) 254s AES_CBC_256-HMAC_SHA2_512_256 254s algparse -v2 'esp=camellia' (expect SUCCESS) 254s CAMELLIA_CBC-HMAC_SHA2_512_256+HMAC_SHA2_256_128 254s algparse -v2 'esp=camellia128' (expect SUCCESS) 254s CAMELLIA_CBC_128-HMAC_SHA2_512_256+HMAC_SHA2_256_128 254s algparse -v2 'esp=camellia192' (expect SUCCESS) 254s CAMELLIA_CBC_192-HMAC_SHA2_512_256+HMAC_SHA2_256_128 254s algparse -v2 'esp=camellia256' (expect SUCCESS) 254s CAMELLIA_CBC_256-HMAC_SHA2_512_256+HMAC_SHA2_256_128 254s algparse -v2 'esp=aes_ccm' (expect SUCCESS) 254s AES_CCM_16-NONE 254s algparse -v2 'esp=aes_ccm_a-128-null' (expect SUCCESS) 254s AES_CCM_8_128-NONE 254s algparse -v2 'esp=aes_ccm_a-192-null' (expect SUCCESS) 254s AES_CCM_8_192-NONE 254s algparse -v2 'esp=aes_ccm_a-256-null' (expect SUCCESS) 254s AES_CCM_8_256-NONE 254s algparse -v2 'esp=aes_ccm_b-128-null' (expect SUCCESS) 254s AES_CCM_12_128-NONE 254s algparse -v2 'esp=aes_ccm_b-192-null' (expect SUCCESS) 254s AES_CCM_12_192-NONE 254s algparse -v2 'esp=aes_ccm_b-256-null' (expect SUCCESS) 254s AES_CCM_12_256-NONE 254s algparse -v2 'esp=aes_ccm_c-128-null' (expect SUCCESS) 254s AES_CCM_16_128-NONE 254s algparse -v2 'esp=aes_ccm_c-192-null' (expect SUCCESS) 254s AES_CCM_16_192-NONE 254s algparse -v2 'esp=aes_ccm_c-256-null' (expect SUCCESS) 254s AES_CCM_16_256-NONE 254s algparse -v2 'esp=aes_gcm' (expect SUCCESS) 254s AES_GCM_16-NONE 254s algparse -v2 'esp=aes_gcm_a-128-null' (expect SUCCESS) 254s AES_GCM_8_128-NONE 254s algparse -v2 'esp=aes_gcm_a-192-null' (expect SUCCESS) 254s AES_GCM_8_192-NONE 254s algparse -v2 'esp=aes_gcm_a-256-null' (expect SUCCESS) 254s AES_GCM_8_256-NONE 254s algparse -v2 'esp=aes_gcm_b-128-null' (expect SUCCESS) 254s AES_GCM_12_128-NONE 254s algparse -v2 'esp=aes_gcm_b-192-null' (expect SUCCESS) 254s AES_GCM_12_192-NONE 254s algparse -v2 'esp=aes_gcm_b-256-null' (expect SUCCESS) 254s | token: '' '' "aes" '-' 254s | token: '' "aes" '-' "128" '-' 254s | token: '-' "128" '-' "sha1" '' 254s | token: '-' "sha1" '' '' 254s | appending ESP encryption algorithm AES_CBC[_128] 254s | parsing integ: 254s | appending ESP integrity algorithm HMAC_SHA1_96[_0] 254s | token: '' '' '' 254s | parsing 'aes-128-sha1-modp2048' for ESP 254s | proposal: 'aes-128-sha1-modp2048' 254s | token: '' '' "aes" '-' 254s | token: '' "aes" '-' "128" '-' 254s | token: '-' "128" '-' "sha1" '-' 254s | token: '-' "sha1" '-' "modp2048" '' 254s | appending ESP encryption algorithm AES_CBC[_128] 254s | parsing integ: 254s | appending ESP integrity algorithm HMAC_SHA1_96[_0] 254s | token: '-' "modp2048" '' '' 254s | parsing dh: 254s | appending ESP DH algorithm MODP2048[_0] 254s | token: '' '' '' 254s ipsec algparse: ignoring ESP DH algorithm MODP2048 as PFS policy is disabled 254s | parsing 'aes-128' for ESP 254s | proposal: 'aes-128' 254s | token: '' '' "aes" '-' 254s | token: '' "aes" '-' "128" '' 254s | token: '-' "128" '' '' 254s | token: '' '' '' 254s | appending ESP encryption algorithm AES_CBC[_128] 254s | appending ESP integrity algorithm HMAC_SHA2_512_256[_0] 254s | appending ESP integrity algorithm HMAC_SHA2_256_128[_0] 254s | parsing 'aes_gcm_a-128-null' for ESP 254s | proposal: 'aes_gcm_a-128-null' 254s | token: '' '' "aes_gcm_a" '-' 254s | token: '' "aes_gcm_a" '-' "128" '-' 254s | token: '-' "128" '-' "null" '' 254s | token: '-' "null" '' '' 254s | appending ESP encryption algorithm AES_GCM_8[_128] 254s | parsing integ: 254s | appending ESP integrity algorithm NONE[_0] 254s | token: '' '' '' 254s | parsing '3des-sha1;modp1024' for ESP 254s | proposal: '3des-sha1;modp1024' 254s | token: '' '' "3des" '-' 254s | token: '' "3des" '-' "sha1" ';' 254s | token: '-' "sha1" ';' "modp1024" '' 254s | appending ESP encryption algorithm 3DES_CBC[_0] 254s | parsing integ: 254s | appending ESP integrity algorithm HMAC_SHA1_96[_0] 254s | token: ';' "modp1024" '' '' 254s | parsing dh: 254s | ike_alg_byname() failed: ESP DH algorithm 'modp1024' is not supported 254s | lookup for DH algorithm 'modp1024' failed 254s | ... failed 'ESP DH algorithm 'modp1024' is not supported' 254s | parsing '3des-sha1;modp1536' for ESP 254s | proposal: '3des-sha1;modp1536' 254s | token: '' '' "3des" '-' 254s | token: '' "3des" '-' "sha1" ';' 254s | token: '-' "sha1" ';' "modp1536" '' 254s | appending ESP encryption algorithm 3DES_CBC[_0] 254s | parsing integ: 254s | appending ESP integrity algorithm HMAC_SHA1_96[_0] 254s | token: ';' "modp1536" '' '' 254s | parsing dh: 254s | appending ESP DH algorithm MODP1536[_0] 254s | token: '' '' '' 254s ipsec algparse: ignoring ESP DH algorithm MODP1536 as PFS policy is disabled 254s | parsing '3des-sha1;modp2048' for ESP 254s | proposal: '3des-sha1;modp2048' 254s | token: '' '' "3des" '-' 254s | token: '' "3des" '-' "sha1" ';' 254s | token: '-' "sha1" ';' "modp2048" '' 254s | appending ESP encryption algorithm 3DES_CBC[_0] 254s | parsing integ: 254s | appending ESP integrity algorithm HMAC_SHA1_96[_0] 254s | token: ';' "modp2048" '' '' 254s | parsing dh: 254s | appending ESP DH algorithm MODP2048[_0] 254s | token: '' '' '' 254s ipsec algparse: ignoring ESP DH algorithm MODP2048 as PFS policy is disabled 254s | parsing '3des-sha1;dh21' for ESP 254s | proposal: '3des-sha1;dh21' 254s | token: '' '' "3des" '-' 254s | token: '' "3des" '-' "sha1" ';' 254s | token: '-' "sha1" ';' "dh21" '' 254s | appending ESP encryption algorithm 3DES_CBC[_0] 254s | parsing integ: 254s | appending ESP integrity algorithm HMAC_SHA1_96[_0] 254s | token: ';' "dh21" '' '' 254s | parsing dh: 254s | appending ESP DH algorithm DH21[_0] 254s | token: '' '' '' 254s ipsec algparse: ignoring ESP DH algorithm DH21 as PFS policy is disabled 254s | parsing '3des-sha1;ecp_521' for ESP 254s | proposal: '3des-sha1;ecp_521' 254s | token: '' '' "3des" '-' 254s | token: '' "3des" '-' "sha1" ';' 254s | token: '-' "sha1" ';' "ecp_521" '' 254s | appending ESP encryption algorithm 3DES_CBC[_0] 254s | parsing integ: 254s | appending ESP integrity algorithm HMAC_SHA1_96[_0] 254s | token: ';' "ecp_521" '' '' 254s | parsing dh: 254s | appending ESP DH algorithm DH21[_0] 254s | token: '' '' '' 254s ipsec algparse: ignoring ESP DH algorithm DH21 as PFS policy is disabled 254s | parsing '3des-sha1;dh23' for ESP 254s | proposal: '3des-sha1;dh23' 254s | token: '' '' "3des" '-' 254s | token: '' "3des" '-' "sha1" ';' 254s | token: '-' "sha1" ';' "dh23" '' 254s | appending ESP encryption algorithm 3DES_CBC[_0] 254s | parsing integ: 254s | appending ESP integrity algorithm HMAC_SHA1_96[_0] 254s | token: ';' "dh23" '' '' 254s | parsing dh: 254s | ike_alg_byname() failed: ESP DH algorithm 'dh23' is not supported 254s | lookup for DH algorithm 'dh23' failed 254s | ... failed 'ESP DH algorithm 'dh23' is not supported' 254s | parsing '3des-sha1;dh24' for ESP 254s | proposal: '3des-sha1;dh24' 254s | token: '' '' "3des" '-' 254s | token: '' "3des" '-' "sha1" ';' 254s | token: '-' "sha1" ';' "dh24" '' 254s | appending ESP encryption algorithm 3DES_CBC[_0] 254s | parsing integ: 254s | appending ESP integrity algorithm HMAC_SHA1_96[_0] 254s | token: ';' "dh24" '' '' 254s | parsing dh: 254s | ike_alg_byname() failed: ESP DH algorithm 'dh24' is not supported 254s | lookup for DH algorithm 'dh24' failed 254s | ... failed 'ESP DH algorithm 'dh24' is not supported' 254s | parsing '3des-sha1' for ESP 254s | proposal: '3des-sha1' 254s | token: '' '' "3des" '-' 254s | token: '' "3des" '-' "sha1" '' 254s | token: '-' "sha1" '' '' 254s | appending ESP encryption algorithm 3DES_CBC[_0] 254s | parsing integ: 254s | appending ESP integrity algorithm HMAC_SHA1_96[_0] 254s | token: '' '' '' 254s | parsing 'null-sha1' for ESP 254s | proposal: 'null-sha1' 254s | token: '' '' "null" '-' 254s | token: '' "null" '-' "sha1" '' 254s | token: '-' "sha1" '' '' 254s | appending ESP encryption algorithm NULL[_0] 254s | parsing integ: 254s | appending ESP integrity algorithm HMAC_SHA1_96[_0] 254s | token: '' '' '' 254s | parsing 'aes_cbc' for ESP 254s | proposal: 'aes_cbc' 254s | token: '' '' "aes_cbc" '' 254s | token: '' "aes_cbc" '' '' 254s | token: '' '' '' 254s | appending ESP encryption algorithm AES_CBC[_0] 254s | appending ESP integrity algorithm HMAC_SHA2_512_256[_0] 254s | appending ESP integrity algorithm HMAC_SHA2_256_128[_0] 254s | parsing 'aes-sha' for ESP 254s | proposal: 'aes-sha' 254s | token: '' '' "aes" '-' 254s | token: '' "aes" '-' "sha" '' 254s | token: '-' "sha" '' '' 254s | appending ESP encryption algorithm AES_CBC[_0] 254s | parsing integ: 254s | appending ESP integrity algorithm HMAC_SHA1_96[_0] 254s | token: '' '' '' 254s | parsing 'aes-sha1' for ESP 254s | proposal: 'aes-sha1' 254s | token: '' '' "aes" '-' 254s | token: '' "aes" '-' "sha1" '' 254s | token: '-' "sha1" '' '' 254s | appending ESP encryption algorithm AES_CBC[_0] 254s | parsing integ: 254s | appending ESP integrity algorithm HMAC_SHA1_96[_0] 254s | token: '' '' '' 254s | parsing 'aes128-sha1' for ESP 254s | proposal: 'aes128-sha1' 254s | token: '' '' "aes128" '-' 254s | token: '' "aes128" '-' "sha1" '' 254s | ike_alg_byname() failed: ESP encryption algorithm 'aes128' is not recognized 254s | token: '-' "sha1" '' '' 254s | appending ESP encryption algorithm AES_CBC[_128] 254s | parsing integ: 254s | appending ESP integrity algorithm HMAC_SHA1_96[_0] 254s | token: '' '' '' 254s | parsing 'aes-sha2' for ESP 254s | proposal: 'aes-sha2' 254s | token: '' '' "aes" '-' 254s | token: '' "aes" '-' "sha2" '' 254s | token: '-' "sha2" '' '' 254s | appending ESP encryption algorithm AES_CBC[_0] 254s | parsing integ: 254s | appending ESP integrity algorithm HMAC_SHA2_256_128[_0] 254s | token: '' '' '' 254s | parsing 'aes-sha256' for ESP 254s | proposal: 'aes-sha256' 254s | token: '' '' "aes" '-' 254s | token: '' "aes" '-' "sha256" '' 254s | token: '-' "sha256" '' '' 254s | appending ESP encryption algorithm AES_CBC[_0] 254s | parsing integ: 254s | appending ESP integrity algorithm HMAC_SHA2_256_128[_0] 254s | token: '' '' '' 254s | parsing 'aes-sha384' for ESP 254s | proposal: 'aes-sha384' 254s | token: '' '' "aes" '-' 254s | token: '' "aes" '-' "sha384" '' 254s | token: '-' "sha384" '' '' 254s | appending ESP encryption algorithm AES_CBC[_0] 254s | parsing integ: 254s | appending ESP integrity algorithm HMAC_SHA2_384_192[_0] 254s | token: '' '' '' 254s | parsing 'aes-sha512' for ESP 254s | proposal: 'aes-sha512' 254s | token: '' '' "aes" '-' 254s | token: '' "aes" '-' "sha512" '' 254s | token: '-' "sha512" '' '' 254s | appending ESP encryption algorithm AES_CBC[_0] 254s | parsing integ: 254s | appending ESP integrity algorithm HMAC_SHA2_512_256[_0] 254s | token: '' '' '' 254s | parsing 'aes128-aes_xcbc' for ESP 254s | proposal: 'aes128-aes_xcbc' 254s | token: '' '' "aes128" '-' 254s | token: '' "aes128" '-' "aes_xcbc" '' 254s | ike_alg_byname() failed: ESP encryption algorithm 'aes128' is not recognized 254s | token: '-' "aes_xcbc" '' '' 254s | appending ESP encryption algorithm AES_CBC[_128] 254s | parsing integ: 254s | appending ESP integrity algorithm AES_XCBC_96[_0] 254s | token: '' '' '' 254s | parsing 'aes192-sha1' for ESP 254s | proposal: 'aes192-sha1' 254s | token: '' '' "aes192" '-' 254s | token: '' "aes192" '-' "sha1" '' 254s | ike_alg_byname() failed: ESP encryption algorithm 'aes192' is not recognized 254s | token: '-' "sha1" '' '' 254s | appending ESP encryption algorithm AES_CBC[_192] 254s | parsing integ: 254s | appending ESP integrity algorithm HMAC_SHA1_96[_0] 254s | token: '' '' '' 254s | parsing 'aes256-sha1' for ESP 254s | proposal: 'aes256-sha1' 254s | token: '' '' "aes256" '-' 254s | token: '' "aes256" '-' "sha1" '' 254s | ike_alg_byname() failed: ESP encryption algorithm 'aes256' is not recognized 254s | token: '-' "sha1" '' '' 254s | appending ESP encryption algorithm AES_CBC[_256] 254s | parsing integ: 254s | appending ESP integrity algorithm HMAC_SHA1_96[_0] 254s | token: '' '' '' 254s | parsing 'aes256-sha' for ESP 254s | proposal: 'aes256-sha' 254s | token: '' '' "aes256" '-' 254s | token: '' "aes256" '-' "sha" '' 254s | ike_alg_byname() failed: ESP encryption algorithm 'aes256' is not recognized 254s | token: '-' "sha" '' '' 254s | appending ESP encryption algorithm AES_CBC[_256] 254s | parsing integ: 254s | appending ESP integrity algorithm HMAC_SHA1_96[_0] 254s | token: '' '' '' 254s | parsing 'aes256-sha2' for ESP 254s | proposal: 'aes256-sha2' 254s | token: '' '' "aes256" '-' 254s | token: '' "aes256" '-' "sha2" '' 254s | ike_alg_byname() failed: ESP encryption algorithm 'aes256' is not recognized 254s | token: '-' "sha2" '' '' 254s | appending ESP encryption algorithm AES_CBC[_256] 254s | parsing integ: 254s | appending ESP integrity algorithm HMAC_SHA2_256_128[_0] 254s | token: '' '' '' 254s | parsing 'aes256-sha2_256' for ESP 254s | proposal: 'aes256-sha2_256' 254s | token: '' '' "aes256" '-' 254s | token: '' "aes256" '-' "sha2_256" '' 254s | ike_alg_byname() failed: ESP encryption algorithm 'aes256' is not recognized 254s | token: '-' "sha2_256" '' '' 254s | appending ESP encryption algorithm AES_CBC[_256] 254s | parsing integ: 254s | appending ESP integrity algorithm HMAC_SHA2_256_128[_0] 254s | token: '' '' '' 254s | parsing 'aes256-sha2_384' for ESP 254s | proposal: 'aes256-sha2_384' 254s | token: '' '' "aes256" '-' 254s | token: '' "aes256" '-' "sha2_384" '' 254s | ike_alg_byname() failed: ESP encryption algorithm 'aes256' is not recognized 254s | token: '-' "sha2_384" '' '' 254s | appending ESP encryption algorithm AES_CBC[_256] 254s | parsing integ: 254s | appending ESP integrity algorithm HMAC_SHA2_384_192[_0] 254s | token: '' '' '' 254s | parsing 'aes256-sha2_512' for ESP 254s | proposal: 'aes256-sha2_512' 254s | token: '' '' "aes256" '-' 254s | token: '' "aes256" '-' "sha2_512" '' 254s | ike_alg_byname() failed: ESP encryption algorithm 'aes256' is not recognized 254s | token: '-' "sha2_512" '' '' 254s | appending ESP encryption algorithm AES_CBC[_256] 254s | parsing integ: 254s | appending ESP integrity algorithm HMAC_SHA2_512_256[_0] 254s | token: '' '' '' 254s | parsing 'camellia' for ESP 254s | proposal: 'camellia' 254s | token: '' '' "camellia" '' 254s | token: '' "camellia" '' '' 254s | token: '' '' '' 254s | appending ESP encryption algorithm CAMELLIA_CBC[_0] 254s | appending ESP integrity algorithm HMAC_SHA2_512_256[_0] 254s | appending ESP integrity algorithm HMAC_SHA2_256_128[_0] 254s | parsing 'camellia128' for ESP 254s | proposal: 'camellia128' 254s | token: '' '' "camellia128" '' 254s | token: '' "camellia128" '' '' 254s | ike_alg_byname() failed: ESP encryption algorithm 'camellia128' is not recognized 254s | token: '' '' '' 254s | appending ESP encryption algorithm CAMELLIA_CBC[_128] 254s | appending ESP integrity algorithm HMAC_SHA2_512_256[_0] 254s | appending ESP integrity algorithm HMAC_SHA2_256_128[_0] 254s | parsing 'camellia192' for ESP 254s | proposal: 'camellia192' 254s | token: '' '' "camellia192" '' 254s | token: '' "camellia192" '' '' 254s | ike_alg_byname() failed: ESP encryption algorithm 'camellia192' is not recognized 254s | token: '' '' '' 254s | appending ESP encryption algorithm CAMELLIA_CBC[_192] 254s | appending ESP integrity algorithm HMAC_SHA2_512_256[_0] 254s | appending ESP integrity algorithm HMAC_SHA2_256_128[_0] 254s | parsing 'camellia256' for ESP 254s | proposal: 'camellia256' 254s | token: '' '' "camellia256" '' 254s | token: '' "camellia256" '' '' 254s | ike_alg_byname() failed: ESP encryption algorithm 'camellia256' is not recognized 254s | token: '' '' '' 254s | appending ESP encryption algorithm CAMELLIA_CBC[_256] 254s | appending ESP integrity algorithm HMAC_SHA2_512_256[_0] 254s | appending ESP integrity algorithm HMAC_SHA2_256_128[_0] 254s | parsing 'aes_ccm' for ESP 254s | proposal: 'aes_ccm' 254s | token: '' '' "aes_ccm" '' 254s | token: '' "aes_ccm" '' '' 254s | token: '' '' '' 254s | appending ESP encryption algorithm AES_CCM_16[_0] 254s | appending ESP integrity algorithm NONE[_0] 254s | parsing 'aes_ccm_a-128-null' for ESP 254s | proposal: 'aes_ccm_a-128-null' 254s | token: '' '' "aes_ccm_a" '-' 254s | token: '' "aes_ccm_a" '-' "128" '-' 254s | token: '-' "128" '-' "null" '' 254s | token: '-' "null" '' '' 254s | appending ESP encryption algorithm AES_CCM_8[_128] 254s | parsing integ: 254s | appending ESP integrity algorithm NONE[_0] 254s | token: '' '' '' 254s | parsing 'aes_ccm_a-192-null' for ESP 254s | proposal: 'aes_ccm_a-192-null' 254s | token: '' '' "aes_ccm_a" '-' 254s | token: '' "aes_ccm_a" '-' "192" '-' 254s | token: '-' "192" '-' "null" '' 254s | token: '-' "null" '' '' 254s | appending ESP encryption algorithm AES_CCM_8[_192] 254s | parsing integ: 254s | appending ESP integrity algorithm NONE[_0] 254s | token: '' '' '' 254s | parsing 'aes_ccm_a-256-null' for ESP 254s | proposal: 'aes_ccm_a-256-null' 254s | token: '' '' "aes_ccm_a" '-' 254s | token: '' "aes_ccm_a" '-' "256" '-' 254s | token: '-' "256" '-' "null" '' 254s | token: '-' "null" '' '' 254s | appending ESP encryption algorithm AES_CCM_8[_256] 254s | parsing integ: 254s | appending ESP integrity algorithm NONE[_0] 254s | token: '' '' '' 254s | parsing 'aes_ccm_b-128-null' for ESP 254s | proposal: 'aes_ccm_b-128-null' 254s | token: '' '' "aes_ccm_b" '-' 254s | token: '' "aes_ccm_b" '-' "128" '-' 254s | token: '-' "128" '-' "null" '' 254s | token: '-' "null" '' '' 254s | appending ESP encryption algorithm AES_CCM_12[_128] 254s | parsing integ: 254s | appending ESP integrity algorithm NONE[_0] 254s | token: '' '' '' 254s | parsing 'aes_ccm_b-192-null' for ESP 254s | proposal: 'aes_ccm_b-192-null' 254s | token: '' '' "aes_ccm_b" '-' 254s | token: '' "aes_ccm_b" '-' "192" '-' 254s | token: '-' "192" '-' "null" '' 254s | token: '-' "null" '' '' 254s | appending ESP encryption algorithm AES_CCM_12[_192] 254s | parsing integ: 254s | appending ESP integrity algorithm NONE[_0] 254s | token: '' '' '' 254s | parsing 'aes_ccm_b-256-null' for ESP 254s | proposal: 'aes_ccm_b-256-null' 254s | token: '' '' "aes_ccm_b" '-' 254s | token: '' "aes_ccm_b" '-' "256" '-' 254s | token: '-' "256" '-' "null" '' 254s | token: '-' "null" '' '' 254s | appending ESP encryption algorithm AES_CCM_12[_256] 254s | parsing integ: 254s | appending ESP integrity algorithm NONE[_0] 254s | token: '' '' '' 254s | parsing 'aes_ccm_c-128-null' for ESP 254s | proposal: 'aes_ccm_c-128-null' 254s | token: '' '' "aes_ccm_c" '-' 254s | token: '' "aes_ccm_c" '-' "128" '-' 254s | token: '-' "128" '-' "null" '' 254s | token: '-' "null" '' '' 254s | appending ESP encryption algorithm AES_CCM_16[_128] 254s | parsing integ: 254s | appending ESP integrity algorithm NONE[_0] 254s | token: '' '' '' 254s | parsing 'aes_ccm_c-192-null' for ESP 254s | proposal: 'aes_ccm_c-192-null' 254s | token: '' '' "aes_ccm_c" '-' 254s | token: '' "aes_ccm_c" '-' "192" '-' 254s | token: '-' "192" '-' "null" '' 254s | token: '-' "null" '' '' 254s | appending ESP encryption algorithm AES_CCM_16[_192] 254s | parsing integ: 254s | appending ESP integrity algorithm NONE[_0] 254s | token: '' '' '' 254s | parsing 'aes_ccm_c-256-null' for ESP 254s | proposal: 'aes_ccm_c-256-null' 254s | token: '' '' "aes_ccm_c" '-' 254s | token: '' "aes_ccm_c" '-' "256" '-' 254s | token: '-' "256" '-' "null" '' 254s | token: '-' "null" '' '' 254s | appending ESP encryption algorithm AES_CCM_16[_256] 254s | parsing integ: 254s | appending ESP integrity algorithm NONE[_0] 254s | token: '' '' '' 254s | parsing 'aes_gcm' for ESP 254s | proposal: 'aes_gcm' 254s | token: '' '' "aes_gcm" '' 254s | token: '' "aes_gcm" '' '' 254s | token: '' '' '' 254s | appending ESP encryption algorithm AES_GCM_16[_0] 254s | appending ESP integrity algorithm NONE[_0] 254s | parsing 'aes_gcm_a-128-null' for ESP 254s | proposal: 'aes_gcm_a-128-null' 254s | token: '' '' "aes_gcm_a" '-' 254s | token: '' "aes_gcm_a" '-' "128" '-' 254s | token: '-' "128" '-' "null" '' 254s | token: '-' "null" '' '' 254s | appending ESP encryption algorithm AES_GCM_8[_128] 254s | parsing integ: 254s | appending ESP integrity algorithm NONE[_0] 254s | token: '' '' '' 254s | parsing 'aes_gcm_a-192-null' for ESP 254s | proposal: 'aes_gcm_a-192-null' 254s | token: '' '' "aes_gcm_a" '-' 254s | token: '' "aes_gcm_a" '-' "192" '-' 254s | token: '-' "192" '-' "null" '' 254s | token: '-' "null" '' '' 254s | appending ESP encryption algorithm AES_GCM_8[_192] 254s | parsing integ: 254s | appending ESP integrity algorithm NONE[_0] 254s | token: '' '' '' 254s | parsing 'aes_gcm_a-256-null' for ESP 254s | proposal: 'aes_gcm_a-256-null' 254s | token: '' '' "aes_gcm_a" '-' 254s | token: '' "aes_gcm_a" '-' "256" '-' 254s | token: '-' "256" '-' "null" '' 254s | token: '-' "null" '' '' 254s | appending ESP encryption algorithm AES_GCM_8[_256] 254s | parsing integ: 254s | appending ESP integrity algorithm NONE[_0] 254s | token: '' '' '' 254s | parsing 'aes_gcm_b-128-null' for ESP 254s | proposal: 'aes_gcm_b-128-null' 254s | token: '' '' "aes_gcm_b" '-' 254s | token: '' "aes_gcm_b" '-' "128" '-' 254s | token: '-' "128" '-' "null" '' 254s | token: '-' "null" '' '' 254s | appending ESP encryption algorithm AES_GCM_12[_128] 254s | parsing integ: 254s | appending ESP integrity algorithm NONE[_0] 254s | token: '' '' '' 254s | parsing 'aes_gcm_b-192-null' for ESP 254s | proposal: 'aes_gcm_b-192-null' 254s | token: '' '' "aes_gcm_b" '-' 254s | token: '' "aes_gcm_b" '-' "192" '-' 254s | token: '-' "192" '-' "null" '' 254s | token: '-' "null" '' '' 254s | appending ESP encryption algorithm AES_GCM_12[_192] 254s | parsing integ: 254s | appending ESP integrity algorithm NONE[_0] 254s | token: '' '' '' 254s | parsing 'aes_gcm_b-256-null' for ESP 254s | proposal: 'aes_gcm_b-256-null' 254s | token: '' '' "aes_gcm_b" '-' 254s | token: '' "aes_gcm_b" '-' "256" '-' 254s | token: '-' "256" '-' "null" '' 254s | token: '-' "null" '' '' 254s | appending ESP encryption algorithm AES_GCM_12[_256] 254s | parsing integ: 254s | appending ESP integrity algorithm NONE[_0] 254s | token: '' '' '' 254s | parsing 'aes_gcm_c-128-null' for ESP 254s | proposal: 'aes_gcm_c-128-null' 254s | token: '' '' "aes_gcm_c" '-' 254s | token: '' "aes_gcm_c" '-' "128" '-' 254s | token: '-' "128" '-' "null" '' 254s | token: '-' "null" '' '' 254s | appending ESP encryption algorithm AES_GCM_16[_128] 254s | parsing integ: 254s | appending ESP integrity algorithm NONE[_0] 254s | token: '' '' '' 254s | parsing 'aes_gcm_c-192-null' for ESP 254s | proposal: 'aes_gcm_c-192-null' 254s | token: '' '' "aes_gcm_c" '-' 254s | token: '' "aes_gcm_c" '-' "192" '-' 254s | token: '-' "192" '-' "null" '' 254s | token: '-' "null" '' '' 254s | appending ESP encryption algorithm AES_GCM_16[_192] 254s | parsing integ: 254s | appending ESP integrity algorithm NONE[_0] 254s | token: '' '' '' 254s | parsing 'aes_gcm_c-256-null' for ESP 254s | proposal: 'aes_gcm_c-256-null' 254s | token: '' '' "aes_gcm_c" '-' 254s | token: '' "aes_gcm_c" '-' "256" '-' 254s | token: '-' "256" '-' "null" '' 254s | token: '-' "null" '' '' 254s | appending ESP encryption algorithm AES_GCM_16[_256] 254s | parsing integ: 254s | appending ESP integrity algorithm NONE[_0] 254s | token: '' '' '' 254s | parsing 'aes_ccm_a-null' for ESP 254s | proposal: 'aes_ccm_a-null' 254s | token: '' '' "aes_ccm_a" '-' 254s | token: '' "aes_ccm_a" '-' "null" '' 254s | token: '-' "null" '' '' 254s | appending ESP encryption algorithm AES_CCM_8[_0] 254s | parsing integ: 254s | appending ESP integrity algorithm NONE[_0] 254s | token: '' '' '' 254s | parsing 'aes_ccm_b-null' for ESP 254s | proposal: 'aes_ccm_b-null' 254s | token: '' '' "aes_ccm_b" '-' 254s | token: '' "aes_ccm_b" '-' "null" '' 254s | token: '-' "null" '' '' 254s | appending ESP encryption algorithm AES_CCM_12[_0] 254s | parsing integ: 254s | appending ESP integrity algorithm NONE[_0] 254s | token: '' '' '' 254s | parsing 'aes_ccm_c-null' for ESP 254s | proposal: 'aes_ccm_c-null' 254s | token: '' '' "aes_ccm_c" '-' 254s | token: '' "aes_ccm_c" '-' "null" '' 254s | token: '-' "null" '' '' 254s | appending ESP encryption algorithm AES_CCM_16[_0] 254s | parsing integ: 254s | appending ESP integrity algorithm NONE[_0] 254s | token: '' '' '' 254s | parsing 'aes_gcm_a-null' for ESP 254s | proposal: 'aes_gcm_a-null' 254s | token: '' '' "aes_gcm_a" '-' 254s | token: '' "aes_gcm_a" '-' "null" '' 254s | token: '-' "null" '' '' 254s | appending ESP encryption algorithm AES_GCM_8[_0] 254s | parsing integ: 254s | appending ESP integrity algorithm NONE[_0] 254s | token: '' '' '' 254s | parsing 'aes_gcm_b-null' for ESP 254s | proposal: 'aes_gcm_b-null' 254s | token: '' '' "aes_gcm_b" '-' 254s | token: '' "aes_gcm_b" '-' "null" '' 254s | token: '-' "null" '' '' 254s | appending ESP encryption algorithm AES_GCM_12[_0] 254s | parsing integ: 254s | appending ESP integrity algorithm NONE[_0] 254s | token: '' '' '' 254s | parsing 'aes_gcm_c-null' for ESP 254s | proposal: 'aes_gcm_c-null' 254s | token: '' '' "aes_gcm_c" '-' 254s | token: '' "aes_gcm_c" '-' "null" '' 254s | token: '-' "null" '' '' 254s | appending ESP encryption algorithm AES_GCM_16[_0] 254s | parsing integ: 254s | appending ESP integrity algorithm NONE[_0] 254s | token: '' '' '' 254s | parsing 'aes_ccm-null' for ESP 254s | proposal: 'aes_ccm-null' 254s | token: '' '' "aes_ccm" '-' 254s | token: '' "aes_ccm" '-' "null" '' 254s | token: '-' "null" '' '' 254s | appending ESP encryption algorithm AES_CCM_16[_0] 254s | parsing integ: 254s | appending ESP integrity algorithm NONE[_0] 254s | token: '' '' '' 254s | parsing 'aes_gcm-null' for ESP 254s | proposal: 'aes_gcm-null' 254s | token: '' '' "aes_gcm" '-' 254s | token: '' "aes_gcm" '-' "null" '' 254s | token: '-' "null" '' '' 254s | appending ESP encryption algorithm AES_GCM_16[_0] 254s | parsing integ: 254s | appending ESP integrity algorithm NONE[_0] 254s | token: '' '' '' 254s | parsing 'aes_ccm-256-null' for ESP 254s | proposal: 'aes_ccm-256-null' 254s | token: '' '' "aes_ccm" '-' 254s | token: '' "aes_ccm" '-' "256" '-' 254s | token: '-' "256" '-' "null" '' 254s | token: '-' "null" '' '' 254s | appending ESP encryption algorithm AES_CCM_16[_256] 254s | parsing integ: 254s | appending ESP integrity algorithm NONE[_0] 254s | token: '' '' '' 254s | parsing 'aes_gcm-192-null' for ESP 254s | proposal: 'aes_gcm-192-null' 254s | token: '' '' "aes_gcm" '-' 254s | token: '' "aes_gcm" '-' "192" '-' 254s | token: '-' "192" '-' "null" '' 254s | token: '-' "null" '' '' 254s | appending ESP encryption algorithm AES_GCM_16[_192] 254s | parsing integ: 254s | appending ESP integrity algorithm NONE[_0] 254s | token: '' '' '' 254s | parsing 'aes_ccm_256-null' for ESP 254s | proposal: 'aes_ccm_256-null' 254s | token: '' '' "aes_ccm_256" '-' 254s | token: '' "aes_ccm_256" '-' "null" '' 254s | ike_alg_byname() failed: ESP encryption algorithm 'aes_ccm_256' is not recognized 254s | token: '-' "null" '' '' 254s | appending ESP encryption algorithm AES_CCM_16[_256] 254s | parsing integ: 254s | appending ESP integrity algorithm NONE[_0] 254s | token: '' '' '' 254s | parsing 'aes_gcm_192-null' for ESP 254s | proposal: 'aes_gcm_192-null' 254s | token: '' '' "aes_gcm_192" '-' 254s | token: '' "aes_gcm_192" '-' "null" '' 254s | ike_alg_byname() failed: ESP encryption algorithm 'aes_gcm_192' is not recognized 254s | token: '-' "null" '' '' 254s | appending ESP encryption algorithm AES_GCM_16[_192] 254s | parsing integ: 254s | appending ESP integrity algorithm NONE[_0] 254s | token: '' '' '' 254s | parsing 'aes_ccm_8-null' for ESP 254s | proposal: 'aes_ccm_8-null' 254s | token: '' '' "aes_ccm_8" '-' 254s | token: '' "aes_ccm_8" '-' "null" '' 254s | token: '-' "null" '' '' 254s | appending ESP encryption algorithm AES_CCM_8[_0] 254s | parsing integ: 254s | appending ESP integrity algorithm NONE[_0] 254s | token: '' '' '' 254s | parsing 'aes_ccm_12-null' for ESP 254s | proposal: 'aes_ccm_12-null' 254s | token: '' '' "aes_ccm_12" '-' 254s | token: '' "aes_ccm_12" '-' "null" '' 254s | token: '-' "null" '' '' 254s | appending ESP encryption algorithm AES_CCM_12[_0] 254s | parsing integ: 254s | appending ESP integrity algorithm NONE[_0] 254s | token: '' '' '' 254s | parsing 'aes_ccm_16-null' for ESP 254s | proposal: 'aes_ccm_16-null' 254s | token: '' '' "aes_ccm_16" '-' 254s | token: '' "aes_ccm_16" '-' "null" '' 254s | token: '-' "null" '' '' 254s | appending ESP encryption algorithm AES_CCM_16[_0] 254s | parsing integ: 254s | appending ESP integrity algorithm NONE[_0] 254s | token: '' '' '' 254s AES_GCM_12_256-NONE 254s algparse -v2 'esp=aes_gcm_c-128-null' (expect SUCCESS) 254s AES_GCM_16_128-NONE 254s algparse -v2 'esp=aes_gcm_c-192-null' (expect SUCCESS) 254s AES_GCM_16_192-NONE 254s algparse -v2 'esp=aes_gcm_c-256-null' (expect SUCCESS) 254s AES_GCM_16_256-NONE 254s algparse -v2 'esp=aes_ccm_a-null' (expect SUCCESS) 254s AES_CCM_8-NONE 254s algparse -v2 'esp=aes_ccm_b-null' (expect SUCCESS) 254s AES_CCM_12-NONE 254s algparse -v2 'esp=aes_ccm_c-null' (expect SUCCESS) 254s AES_CCM_16-NONE 254s algparse -v2 'esp=aes_gcm_a-null' (expect SUCCESS) 254s AES_GCM_8-NONE 254s algparse -v2 'esp=aes_gcm_b-null' (expect SUCCESS) 254s AES_GCM_12-NONE 254s algparse -v2 'esp=aes_gcm_c-null' (expect SUCCESS) 254s AES_GCM_16-NONE 254s algparse -v2 'esp=aes_ccm-null' (expect SUCCESS) 254s AES_CCM_16-NONE 254s algparse -v2 'esp=aes_gcm-null' (expect SUCCESS) 254s AES_GCM_16-NONE 254s algparse -v2 'esp=aes_ccm-256-null' (expect SUCCESS) 254s AES_CCM_16_256-NONE 254s algparse -v2 'esp=aes_gcm-192-null' (expect SUCCESS) 254s AES_GCM_16_192-NONE 254s algparse -v2 'esp=aes_ccm_256-null' (expect SUCCESS) 254s AES_CCM_16_256-NONE 254s algparse -v2 'esp=aes_gcm_192-null' (expect SUCCESS) 254s AES_GCM_16_192-NONE 254s algparse -v2 'esp=aes_ccm_8-null' (expect SUCCESS) 254s AES_CCM_8-NONE 254s algparse -v2 'esp=aes_ccm_12-null' (expect SUCCESS) 254s AES_CCM_12-NONE 254s algparse -v2 'esp=aes_ccm_16-null' (expect SUCCESS) 254s | parsing 'aes_gcm_8-null' for ESP 254s | proposal: 'aes_gcm_8-null' 254s | token: '' '' "aes_gcm_8" '-' 254s | token: '' "aes_gcm_8" '-' "null" '' 254s | token: '-' "null" '' '' 254s | appending ESP encryption algorithm AES_GCM_8[_0] 254s | parsing integ: 254s | appending ESP integrity algorithm NONE[_0] 254s | token: '' '' '' 254s | parsing 'aes_gcm_12-null' for ESP 254s | proposal: 'aes_gcm_12-null' 254s | token: '' '' "aes_gcm_12" '-' 254s | token: '' "aes_gcm_12" '-' "null" '' 254s | token: '-' "null" '' '' 254s | appending ESP encryption algorithm AES_GCM_12[_0] 254s | parsing integ: 254s | appending ESP integrity algorithm NONE[_0] 254s | token: '' '' '' 254s | parsing 'aes_gcm_16-null' for ESP 254s | proposal: 'aes_gcm_16-null' 254s | token: '' '' "aes_gcm_16" '-' 254s | token: '' "aes_gcm_16" '-' "null" '' 254s | token: '-' "null" '' '' 254s | appending ESP encryption algorithm AES_GCM_16[_0] 254s | parsing integ: 254s | appending ESP integrity algorithm NONE[_0] 254s | token: '' '' '' 254s | parsing 'aes_ccm_8-128-null' for ESP 254s | proposal: 'aes_ccm_8-128-null' 254s | token: '' '' "aes_ccm_8" '-' 254s | token: '' "aes_ccm_8" '-' "128" '-' 254s | token: '-' "128" '-' "null" '' 254s | token: '-' "null" '' '' 254s | appending ESP encryption algorithm AES_CCM_8[_128] 254s | parsing integ: 254s | appending ESP integrity algorithm NONE[_0] 254s | token: '' '' '' 254s | parsing 'aes_ccm_12-192-null' for ESP 254s | proposal: 'aes_ccm_12-192-null' 254s | token: '' '' "aes_ccm_12" '-' 254s | token: '' "aes_ccm_12" '-' "192" '-' 254s | token: '-' "192" '-' "null" '' 254s | token: '-' "null" '' '' 254s | appending ESP encryption algorithm AES_CCM_12[_192] 254s | parsing integ: 254s | appending ESP integrity algorithm NONE[_0] 254s | token: '' '' '' 254s | parsing 'aes_ccm_16-256-null' for ESP 254s | proposal: 'aes_ccm_16-256-null' 254s | token: '' '' "aes_ccm_16" '-' 254s | token: '' "aes_ccm_16" '-' "256" '-' 254s | token: '-' "256" '-' "null" '' 254s | token: '-' "null" '' '' 254s | appending ESP encryption algorithm AES_CCM_16[_256] 254s | parsing integ: 254s | appending ESP integrity algorithm NONE[_0] 254s | token: '' '' '' 254s | parsing 'aes_gcm_8-128-null' for ESP 254s | proposal: 'aes_gcm_8-128-null' 254s | token: '' '' "aes_gcm_8" '-' 254s | token: '' "aes_gcm_8" '-' "128" '-' 254s | token: '-' "128" '-' "null" '' 254s | token: '-' "null" '' '' 254s | appending ESP encryption algorithm AES_GCM_8[_128] 254s | parsing integ: 254s | appending ESP integrity algorithm NONE[_0] 254s | token: '' '' '' 254s | parsing 'aes_gcm_12-192-null' for ESP 254s | proposal: 'aes_gcm_12-192-null' 254s | token: '' '' "aes_gcm_12" '-' 254s | token: '' "aes_gcm_12" '-' "192" '-' 254s | token: '-' "192" '-' "null" '' 254s | token: '-' "null" '' '' 254s | appending ESP encryption algorithm AES_GCM_12[_192] 254s | parsing integ: 254s | appending ESP integrity algorithm NONE[_0] 254s | token: '' '' '' 254s | parsing 'aes_gcm_16-256-null' for ESP 254s | proposal: 'aes_gcm_16-256-null' 254s | token: '' '' "aes_gcm_16" '-' 254s | token: '' "aes_gcm_16" '-' "256" '-' 254s | token: '-' "256" '-' "null" '' 254s | token: '-' "null" '' '' 254s | appending ESP encryption algorithm AES_GCM_16[_256] 254s | parsing integ: 254s | appending ESP integrity algorithm NONE[_0] 254s | token: '' '' '' 254s | parsing 'aes_ccm_8_128-null' for ESP 254s | proposal: 'aes_ccm_8_128-null' 254s | token: '' '' "aes_ccm_8_128" '-' 254s | token: '' "aes_ccm_8_128" '-' "null" '' 254s | ike_alg_byname() failed: ESP encryption algorithm 'aes_ccm_8_128' is not recognized 254s | token: '-' "null" '' '' 254s | appending ESP encryption algorithm AES_CCM_8[_128] 254s | parsing integ: 254s | appending ESP integrity algorithm NONE[_0] 254s | token: '' '' '' 254s | parsing 'aes_ccm_12_192-null' for ESP 254s | proposal: 'aes_ccm_12_192-null' 254s | token: '' '' "aes_ccm_12_192" '-' 254s | token: '' "aes_ccm_12_192" '-' "null" '' 254s | ike_alg_byname() failed: ESP encryption algorithm 'aes_ccm_12_192' is not recognized 254s | token: '-' "null" '' '' 254s | appending ESP encryption algorithm AES_CCM_12[_192] 254s | parsing integ: 254s | appending ESP integrity algorithm NONE[_0] 254s | token: '' '' '' 254s | parsing 'aes_ccm_16_256-null' for ESP 254s | proposal: 'aes_ccm_16_256-null' 254s | token: '' '' "aes_ccm_16_256" '-' 254s | token: '' "aes_ccm_16_256" '-' "null" '' 254s | ike_alg_byname() failed: ESP encryption algorithm 'aes_ccm_16_256' is not recognized 254s | token: '-' "null" '' '' 254s | appending ESP encryption algorithm AES_CCM_16[_256] 254s | parsing integ: 254s | appending ESP integrity algorithm NONE[_0] 254s | token: '' '' '' 254s | parsing 'aes_gcm_8_128-null' for ESP 254s | proposal: 'aes_gcm_8_128-null' 254s | token: '' '' "aes_gcm_8_128" '-' 254s | token: '' "aes_gcm_8_128" '-' "null" '' 254s | ike_alg_byname() failed: ESP encryption algorithm 'aes_gcm_8_128' is not recognized 254s | token: '-' "null" '' '' 254s | appending ESP encryption algorithm AES_GCM_8[_128] 254s | parsing integ: 254s | appending ESP integrity algorithm NONE[_0] 254s | token: '' '' '' 254s | parsing 'aes_gcm_12_192-null' for ESP 254s | proposal: 'aes_gcm_12_192-null' 254s | token: '' '' "aes_gcm_12_192" '-' 254s | token: '' "aes_gcm_12_192" '-' "null" '' 254s | ike_alg_byname() failed: ESP encryption algorithm 'aes_gcm_12_192' is not recognized 254s | token: '-' "null" '' '' 254s | appending ESP encryption algorithm AES_GCM_12[_192] 254s | parsing integ: 254s | appending ESP integrity algorithm NONE[_0] 254s | token: '' '' '' 254s | parsing 'aes_gcm_16_256-null' for ESP 254s | proposal: 'aes_gcm_16_256-null' 254s | token: '' '' "aes_gcm_16_256" '-' 254s | token: '' "aes_gcm_16_256" '-' "null" '' 254s | ike_alg_byname() failed: ESP encryption algorithm 'aes_gcm_16_256' is not recognized 254s | token: '-' "null" '' '' 254s | appending ESP encryption algorithm AES_GCM_16[_256] 254s | parsing integ: 254s | appending ESP integrity algorithm NONE[_0] 254s | token: '' '' '' 254s | parsing 'aes_ctr' for ESP 254s | proposal: 'aes_ctr' 254s | token: '' '' "aes_ctr" '' 254s | token: '' "aes_ctr" '' '' 254s | token: '' '' '' 254s | appending ESP encryption algorithm AES_CTR[_0] 254s | appending ESP integrity algorithm HMAC_SHA2_512_256[_0] 254s | appending ESP integrity algorithm HMAC_SHA2_256_128[_0] 254s | parsing 'aesctr' for ESP 254s | proposal: 'aesctr' 254s | token: '' '' "aesctr" '' 254s | token: '' "aesctr" '' '' 254s | token: '' '' '' 254s | appending ESP encryption algorithm AES_CTR[_0] 254s | appending ESP integrity algorithm HMAC_SHA2_512_256[_0] 254s | appending ESP integrity algorithm HMAC_SHA2_256_128[_0] 254s | parsing 'aes_ctr128' for ESP 254s | proposal: 'aes_ctr128' 254s | token: '' '' "aes_ctr128" '' 254s | token: '' "aes_ctr128" '' '' 254s | ike_alg_byname() failed: ESP encryption algorithm 'aes_ctr128' is not recognized 254s | token: '' '' '' 254s | appending ESP encryption algorithm AES_CTR[_128] 254s | appending ESP integrity algorithm HMAC_SHA2_512_256[_0] 254s | appending ESP integrity algorithm HMAC_SHA2_256_128[_0] 254s | parsing 'aes_ctr192' for ESP 254s | proposal: 'aes_ctr192' 254s | token: '' '' "aes_ctr192" '' 254s | token: '' "aes_ctr192" '' '' 254s | ike_alg_byname() failed: ESP encryption algorithm 'aes_ctr192' is not recognized 254s | token: '' '' '' 254s | appending ESP encryption algorithm AES_CTR[_192] 254s | appending ESP integrity algorithm HMAC_SHA2_512_256[_0] 254s | appending ESP integrity algorithm HMAC_SHA2_256_128[_0] 254s | parsing 'aes_ctr256' for ESP 254s | proposal: 'aes_ctr256' 254s | token: '' '' "aes_ctr256" '' 254s | token: '' "aes_ctr256" '' '' 254s | ike_alg_byname() failed: ESP encryption algorithm 'aes_ctr256' is not recognized 254s | token: '' '' '' 254s | appending ESP encryption algorithm AES_CTR[_256] 254s | appending ESP integrity algorithm HMAC_SHA2_512_256[_0] 254s | appending ESP integrity algorithm HMAC_SHA2_256_128[_0] 254s | parsing 'camellia_cbc_256-hmac_sha2_512_256;modp8192' for ESP 254s | proposal: 'camellia_cbc_256-hmac_sha2_512_256;modp8192' 254s | token: '' '' "camellia_cbc_256" '-' 254s | token: '' "camellia_cbc_256" '-' "hmac_sha2_512_256" ';' 254s | ike_alg_byname() failed: ESP encryption algorithm 'camellia_cbc_256' is not recognized 254s | token: '-' "hmac_sha2_512_256" ';' "modp8192" '' 254s | appending ESP encryption algorithm CAMELLIA_CBC[_256] 254s | parsing integ: 254s | appending ESP integrity algorithm HMAC_SHA2_512_256[_0] 254s | token: ';' "modp8192" '' '' 254s | parsing dh: 254s | appending ESP DH algorithm MODP8192[_0] 254s | token: '' '' '' 254s ipsec algparse: ignoring ESP DH algorithm MODP8192 as PFS policy is disabled 254s | parsing 'null_auth_aes_gmac_256-null;modp8192' for ESP 254s | proposal: 'null_auth_aes_gmac_256-null;modp8192' 254s | token: '' '' "null_auth_aes_gmac_256" '-' 254s | token: '' "null_auth_aes_gmac_256" '-' "null" ';' 254s | ike_alg_byname() failed: ESP encryption algorithm 'null_auth_aes_gmac_256' is not recognized 254s | token: '-' "null" ';' "modp8192" '' 254s | appending ESP encryption algorithm NULL_AUTH_AES_GMAC[_256] 254s | parsing integ: 254s | appending ESP integrity algorithm NONE[_0] 254s | token: ';' "modp8192" '' '' 254s | parsing dh: 254s | appending ESP DH algorithm MODP8192[_0] 254s | token: '' '' '' 254s ipsec algparse: ignoring ESP DH algorithm MODP8192 as PFS policy is disabled 254s | parsing '3des-sha1;modp8192' for ESP 254s | proposal: '3des-sha1;modp8192' 254s | token: '' '' "3des" '-' 254s | token: '' "3des" '-' "sha1" ';' 254s | token: '-' "sha1" ';' "modp8192" '' 254s | appending ESP encryption algorithm 3DES_CBC[_0] 254s | parsing integ: 254s | appending ESP integrity algorithm HMAC_SHA1_96[_0] 254s | token: ';' "modp8192" '' '' 254s | parsing dh: 254s | appending ESP DH algorithm MODP8192[_0] 254s | token: '' '' '' 254s ipsec algparse: ignoring ESP DH algorithm MODP8192 as PFS policy is disabled 254s | parsing '3des-sha1-modp8192' for ESP 254s | proposal: '3des-sha1-modp8192' 254s | token: '' '' "3des" '-' 254s | token: '' "3des" '-' "sha1" '-' 254s | token: '-' "sha1" '-' "modp8192" '' 254s | appending ESP encryption algorithm 3DES_CBC[_0] 254s | parsing integ: 254s | appending ESP integrity algorithm HMAC_SHA1_96[_0] 254s | token: '-' "modp8192" '' '' 254s | parsing dh: 254s | appending ESP DH algorithm MODP8192[_0] 254s | token: '' '' '' 254s ipsec algparse: ignoring ESP DH algorithm MODP8192 as PFS policy is disabled 254s | parsing 'aes-sha1,3des-sha1;modp8192' for ESP 254s | proposal: 'aes-sha1' 254s | token: '' '' "aes" '-' 254s | token: '' "aes" '-' "sha1" '' 254s | token: '-' "sha1" '' '' 254s | appending ESP encryption algorithm AES_CBC[_0] 254s | parsing integ: 254s | appending ESP integrity algorithm HMAC_SHA1_96[_0] 254s | token: '' '' '' 254s | proposal: '3des-sha1;modp8192' 254s | token: '' '' "3des" '-' 254s | token: '' "3des" '-' "sha1" ';' 254s | token: '-' "sha1" ';' "modp8192" '' 254s | appending ESP encryption algorithm 3DES_CBC[_0] 254s | parsing integ: 254s | appending ESP integrity algorithm HMAC_SHA1_96[_0] 254s | token: ';' "modp8192" '' '' 254s | parsing dh: 254s | appending ESP DH algorithm MODP8192[_0] 254s | token: '' '' '' 254s ipsec algparse: ignoring ESP DH algorithm MODP8192 as PFS policy is disabled 254s | parsing 'aes-sha1-modp8192,3des-sha1-modp8192' for ESP 254s | proposal: 'aes-sha1-modp8192' 254s | token: '' '' "aes" '-' 254s | token: '' "aes" '-' "sha1" '-' 254s | token: '-' "sha1" '-' "modp8192" '' 254s | appending ESP encryption algorithm AES_CBC[_0] 254s | parsing integ: 254s | appending ESP integrity algorithm HMAC_SHA1_96[_0] 254s | token: '-' "modp8192" '' '' 254s | parsing dh: 254s | appending ESP DH algorithm MODP8192[_0] 254s | token: '' '' '' 254s | proposal: '3des-sha1-modp8192' 254s | token: '' '' "3des" '-' 254s | token: '' "3des" '-' "sha1" '-' 254s | token: '-' "sha1" '-' "modp8192" '' 254s | appending ESP encryption algorithm 3DES_CBC[_0] 254s | parsing integ: 254s | appending ESP integrity algorithm HMAC_SHA1_96[_0] 254s | token: '-' "modp8192" '' '' 254s | parsing dh: 254s | appending ESP DH algorithm MODP8192[_0] 254s | token: '' '' '' 254s ipsec algparse: ignoring ESP DH algorithm MODP8192 as PFS policy is disabled 254s ipsec algparse: ignoring ESP DH algorithm MODP8192 as PFS policy is disabled 254s | parsing 'aes-sha1-modp8192,aes-sha1-modp8192,aes-sha1-modp8192' for ESP 254s | proposal: 'aes-sha1-modp8192' 254s | token: '' '' "aes" '-' 254s | token: '' "aes" '-' "sha1" '-' 254s | token: '-' "sha1" '-' "modp8192" '' 254s | appending ESP encryption algorithm AES_CBC[_0] 254s | parsing integ: 254s | appending ESP integrity algorithm HMAC_SHA1_96[_0] 254s | token: '-' "modp8192" '' '' 254s | parsing dh: 254s | appending ESP DH algorithm MODP8192[_0] 254s | token: '' '' '' 254s | proposal: 'aes-sha1-modp8192' 254s | token: '' '' "aes" '-' 254s | token: '' "aes" '-' "sha1" '-' 254s | token: '-' "sha1" '-' "modp8192" '' 254s | appending ESP encryption algorithm AES_CBC[_0] 254s | parsing integ: 254s | appending ESP integrity algorithm HMAC_SHA1_96[_0] 254s | token: '-' "modp8192" '' '' 254s | parsing dh: 254s | appending ESP DH algorithm MODP8192[_0] 254s | token: '' '' '' 254s | proposal: 'aes-sha1-modp8192' 254s | token: '' '' "aes" '-' 254s | token: '' "aes" '-' "sha1" '-' 254s | token: '-' "sha1" '-' "modp8192" '' 254s | appending ESP encryption algorithm AES_CBC[_0] 254s | parsing integ: 254s | appending ESP integrity algorithm HMAC_SHA1_96[_0] 254s | token: '-' "modp8192" '' '' 254s | parsing dh: 254s | appending ESP DH algorithm MODP8192[_0] 254s | token: '' '' '' 254s ipsec algparse: ignoring ESP DH algorithm MODP8192 as PFS policy is disabled 254s | parsing 'aes;none' for ESP 254s | proposal: 'aes;none' 254s | token: '' '' "aes" ';' 254s | token: '' "aes" ';' "none" '' 254s | token: ';' "none" '' '' 254s | appending ESP encryption algorithm AES_CBC[_0] 254s | parsing dh: 254s | appending ESP DH algorithm NONE[_0] 254s | token: '' '' '' 254s | appending ESP integrity algorithm HMAC_SHA2_512_256[_0] 254s | appending ESP integrity algorithm HMAC_SHA2_256_128[_0] 254s ipsec algparse: ignoring redundant ESP DH algorithm NONE as PFS policy is disabled 254s | parsing 'aes;none,aes' for ESP 254s | proposal: 'aes;none' 254s | token: '' '' "aes" ';' 254s | token: '' "aes" ';' "none" '' 254s | token: ';' "none" '' '' 254s | appending ESP encryption algorithm AES_CBC[_0] 254s | parsing dh: 254s | appending ESP DH algorithm NONE[_0] 254s | token: '' '' '' 254s | appending ESP integrity algorithm HMAC_SHA2_512_256[_0] 254s | appending ESP integrity algorithm HMAC_SHA2_256_128[_0] 254s | proposal: 'aes' 254s | token: '' '' "aes" '' 254s | token: '' "aes" '' '' 254s | token: '' '' '' 254s | appending ESP encryption algorithm AES_CBC[_0] 254s | appending ESP integrity algorithm HMAC_SHA2_512_256[_0] 254s | appending ESP integrity algorithm HMAC_SHA2_256_128[_0] 254s ipsec algparse: ignoring redundant ESP DH algorithm NONE as PFS policy is disabled 254s | parsing 'aes;none,aes;modp2048' for ESP 254s | proposal: 'aes;none' 254s | token: '' '' "aes" ';' 254s | token: '' "aes" ';' "none" '' 254s | token: ';' "none" '' '' 254s | appending ESP encryption algorithm AES_CBC[_0] 254s | parsing dh: 254s | appending ESP DH algorithm NONE[_0] 254s | token: '' '' '' 254s | appending ESP integrity algorithm HMAC_SHA2_512_256[_0] 254s | appending ESP integrity algorithm HMAC_SHA2_256_128[_0] 254s | proposal: 'aes;modp2048' 254s | token: '' '' "aes" ';' 254s | token: '' "aes" ';' "modp2048" '' 254s | token: ';' "modp2048" '' '' 254s | appending ESP encryption algorithm AES_CBC[_0] 254s | parsing dh: 254s | appending ESP DH algorithm MODP2048[_0] 254s | token: '' '' '' 254s | appending ESP integrity algorithm HMAC_SHA2_512_256[_0] 254s | appending ESP integrity algorithm HMAC_SHA2_256_128[_0] 254s ipsec algparse: ignoring redundant ESP DH algorithm NONE as PFS policy is disabled 254s ipsec algparse: ignoring ESP DH algorithm MODP2048 as PFS policy is disabled 254s | parsing 'aes-sha1-none' for ESP 254s | proposal: 'aes-sha1-none' 254s | token: '' '' "aes" '-' 254s | token: '' "aes" '-' "sha1" '-' 254s | token: '-' "sha1" '-' "none" '' 254s | appending ESP encryption algorithm AES_CBC[_0] 254s | parsing integ: 254s | appending ESP integrity algorithm HMAC_SHA1_96[_0] 254s | token: '-' "none" '' '' 254s | parsing dh: 254s | appending ESP DH algorithm NONE[_0] 254s | token: '' '' '' 254s ipsec algparse: ignoring redundant ESP DH algorithm NONE as PFS policy is disabled 254s | parsing 'aes-sha1;none' for ESP 254s | proposal: 'aes-sha1;none' 254s | token: '' '' "aes" '-' 254s | token: '' "aes" '-' "sha1" ';' 254s | token: '-' "sha1" ';' "none" '' 254s | appending ESP encryption algorithm AES_CBC[_0] 254s | parsing integ: 254s | appending ESP integrity algorithm HMAC_SHA1_96[_0] 254s | token: ';' "none" '' '' 254s | parsing dh: 254s | appending ESP DH algorithm NONE[_0] 254s | token: '' '' '' 254s ipsec algparse: ignoring redundant ESP DH algorithm NONE as PFS policy is disabled 254s | parsing '3des168-sha1' for ESP 254s | proposal: '3des168-sha1' 254s | token: '' '' "3des168" '-' 254s | token: '' "3des168" '-' "sha1" '' 254s | ike_alg_byname() failed: ESP encryption algorithm '3des168' is not recognized 254s | parsing '3des-null' for ESP 254s | proposal: '3des-null' 254s | token: '' '' "3des" '-' 254s | token: '' "3des" '-' "null" '' 254s | token: '-' "null" '' '' 254s | appending ESP encryption algorithm 3DES_CBC[_0] 254s | parsing integ: 254s | appending ESP integrity algorithm NONE[_0] 254s | token: '' '' '' 254s | parsing 'aes128-null' for ESP 254s | proposal: 'aes128-null' 254s | token: '' '' "aes128" '-' 254s | token: '' "aes128" '-' "null" '' 254s | ike_alg_byname() failed: ESP encryption algorithm 'aes128' is not recognized 254s | token: '-' "null" '' '' 254s | appending ESP encryption algorithm AES_CBC[_128] 254s | parsing integ: 254s | appending ESP integrity algori AES_CCM_16-NONE 254s algparse -v2 'esp=aes_gcm_8-null' (expect SUCCESS) 254s AES_GCM_8-NONE 254s algparse -v2 'esp=aes_gcm_12-null' (expect SUCCESS) 254s AES_GCM_12-NONE 254s algparse -v2 'esp=aes_gcm_16-null' (expect SUCCESS) 254s AES_GCM_16-NONE 254s algparse -v2 'esp=aes_ccm_8-128-null' (expect SUCCESS) 254s AES_CCM_8_128-NONE 254s algparse -v2 'esp=aes_ccm_12-192-null' (expect SUCCESS) 254s AES_CCM_12_192-NONE 254s algparse -v2 'esp=aes_ccm_16-256-null' (expect SUCCESS) 254s AES_CCM_16_256-NONE 254s algparse -v2 'esp=aes_gcm_8-128-null' (expect SUCCESS) 254s AES_GCM_8_128-NONE 254s algparse -v2 'esp=aes_gcm_12-192-null' (expect SUCCESS) 254s AES_GCM_12_192-NONE 254s algparse -v2 'esp=aes_gcm_16-256-null' (expect SUCCESS) 254s AES_GCM_16_256-NONE 254s algparse -v2 'esp=aes_ccm_8_128-null' (expect SUCCESS) 254s AES_CCM_8_128-NONE 254s algparse -v2 'esp=aes_ccm_12_192-null' (expect SUCCESS) 254s AES_CCM_12_192-NONE 254s algparse -v2 'esp=aes_ccm_16_256-null' (expect SUCCESS) 254s AES_CCM_16_256-NONE 254s algparse -v2 'esp=aes_gcm_8_128-null' (expect SUCCESS) 254s AES_GCM_8_128-NONE 254s algparse -v2 'esp=aes_gcm_12_192-null' (expect SUCCESS) 254s AES_GCM_12_192-NONE 254s algparse -v2 'esp=aes_gcm_16_256-null' (expect SUCCESS) 254s AES_GCM_16_256-NONE 254s algparse -v2 'esp=aes_ctr' (expect SUCCESS) 254s AES_CTR-HMAC_SHA2_512_256+HMAC_SHA2_256_128 254s algparse -v2 'esp=aesctr' (expect SUCCESS) 254s AES_CTR-HMAC_SHA2_512_256+HMAC_SHA2_256_128 254s algparse -v2 'esp=aes_ctr128' (expect SUCCESS) 254s AES_CTR_128-HMAC_SHA2_512_256+HMAC_SHA2_256_128 254s algparse -v2 'esp=aes_ctr192' (expect SUCCESS) 254s AES_CTR_192-HMAC_SHA2_512_256+HMAC_SHA2_256_128 254s algparse -v2 'esp=aes_ctr256' (expect SUCCESS) 254s AES_CTR_256-HMAC_SHA2_512_256+HMAC_SHA2_256_128 254s algparse -v2 'esp=camellia_cbc_256-hmac_sha2_512_256;modp8192' (expect SUCCESS) 254s CAMELLIA_CBC_256-HMAC_SHA2_512_256 254s algparse -v2 'esp=null_auth_aes_gmac_256-null;modp8192' (expect SUCCESS) 254s NULL_AUTH_AES_GMAC_256-NONE 254s algparse -v2 'esp=3des-sha1;modp8192' (expect SUCCESS) 254s 3DES_CBC-HMAC_SHA1_96 254s algparse -v2 'esp=3des-sha1-modp8192' (expect SUCCESS) 254s 3DES_CBC-HMAC_SHA1_96 254s algparse -v2 'esp=aes-sha1,3des-sha1;modp8192' (expect SUCCESS) 254s AES_CBC-HMAC_SHA1_96 254s 3DES_CBC-HMAC_SHA1_96 254s algparse -v2 'esp=aes-sha1-modp8192,3des-sha1-modp8192' (expect SUCCESS) 254s AES_CBC-HMAC_SHA1_96 254s 3DES_CBC-HMAC_SHA1_96 254s algparse -v2 'esp=aes-sha1-modp8192,aes-sha1-modp8192,aes-sha1-modp8192' (expect SUCCESS) 254s AES_CBC-HMAC_SHA1_96 254s algparse -v2 'esp=aes;none' (expect SUCCESS) 254s AES_CBC-HMAC_SHA2_512_256+HMAC_SHA2_256_128 254s algparse -v2 'esp=aes;none,aes' (expect SUCCESS) 254s AES_CBC-HMAC_SHA2_512_256+HMAC_SHA2_256_128 254s AES_CBC-HMAC_SHA2_512_256+HMAC_SHA2_256_128 254s algparse -v2 'esp=aes;none,aes;modp2048' (expect SUCCESS) 254s AES_CBC-HMAC_SHA2_512_256+HMAC_SHA2_256_128 254s AES_CBC-HMAC_SHA2_512_256+HMAC_SHA2_256_128 254s algparse -v2 'esp=aes-sha1-none' (expect SUCCESS) 254s AES_CBC-HMAC_SHA1_96 254s algparse -v2 'esp=aes-sha1;none' (expect SUCCESS) 254s AES_CBC-HMAC_SHA1_96 254s algparse -v2 'esp=3des168-sha1' (expect ERROR) 254s ERROR: ESP encryption algorithm 3DES_CBC does not allow a key lengths 254s algparse -v2 'esp=3des-null' (expect ERROR) 254s ERROR: non-AEAD ESP encryption algorithm 3DES_CBC cannot have 'NONE' as the integrity algorithm 254s algparse -v2 'esp=aes128-null' (expect ERROR) 254s ERROR: non-AEAD ESP encryption algorithm AES_CBC cannot have 'NONE' as the integrity algorithm 254s algparse -v2 'esp=aes224-sha1' (expect ERROR) 254s ERROR: ESP encryption algorithm AES_CBC with key length 224 invalid; valid key lengths: 128, 192, 256 254s algparse -v2 'esp=aes-224-sha1' (expect ERROR) 254s ERROR: ESP encryption algorithm AES_CBC with key length 224 invalid; valid key lengths: 128, 192, 256 254s algparse -v2 'esp=aes0-sha1' (expect ERROR) 254s ERROR: ESP encryption key length is zero 254s algparse -v2 'esp=aes-0-sha1' (expect ERROR) 254s ERROR: ESP encryption key length is zero 254s algparse -v2 'esp=aes512-sha1' (expect ERROR) 254s ERROR: ESP encryption algorithm AES_CBC with key length 512 invalid; valid key lengths: 128, 192, 256 254s algparse -v2 'esp=aes-sha1555' (expect ERROR) 254s ERROR: ESP integrity algorithm 'sha1555' is not recognized 254s algparse -v2 'esp=camellia666-sha1' (expect ERROR) 254s ERROR: ESP encryption algorithm CAMELLIA_CBC with key length 666 invalid; valid key lengths: 128, 192, 256 254s algparse -v2 'esp=blowfish' (expect ERROR) 254s ERROR: ESP encryption algorithm 'blowfish' is not supported 254s algparse -v2 'esp=des-sha1' (expect ERROR) 254s ERROR: ESP encryption algorithm 'des' is not supported 254s algparse -v2 'esp=aes_ctr666' (expect ERROR) 254s ERROR: ESP encryption algorithm AES_CTR with key length 666 invalid; valid key lengths: 128, 192, 256 254s algparse -v2 'esp=aes128-sha2_128' (expect ERROR) 254s ERROR: ESP integrity algorithm 'sha2_128' is not recognized 254s algparse -v2 'esp=aes256-sha2_256-4096' (expect ERROR) 254s ERROR: ESP DH algorithm '4096' is not recognized 254s algparse -v2 'esp=aes256-sha2_256-128' (expect ERROR) 254s ERROR: ESP DH algorithm '128' is not recognized 254s algparse -v2 'esp=vanitycipher' (expect ERROR) 254s ERROR: ESP encryption algorithm 'vanitycipher' is not recognized 254s algparse -v2 'esp=ase-sah' (expect ERROR) 254s ERROR: ESP encryption algorithm 'ase' is not recognized 254s algparse -v2 'esp=aes-sah1' (expect ERROR) 254s ERROR: ESP integrity algorithm 'sah1' is not recognized 254s algparse -v2 'esp=id3' (expect ERROR) 254s ERROR: ESP encryption algorithm 'id3' is not recognized 254s algparse -v2 'esp=aes-id3' (expect ERROR) 254s ERROR: ESP integrity algorithm 'id3' is not recognized 254s algparse -v2 'esp=aes_gcm-md5' (expect ERROR) 254s ERROR: AEAD ESP encryption algorithm AES_GCM_16 must have 'NONE' as the integrity algorithm 254s algparse -v2 'esp=mars' (expect ERROR) 254s ERROR: ESP encryption algorithm 'mars' is not supported 254s algparse -v2 'esp=aes_gcm-16' (expect ERROR) 254s ERROR: ESP encryption algorithm AES_GCM_16 with key length 16 invalid; valid key lengths: 128, 192, 256 254s algparse -v2 'esp=aes_gcm-0' (expect ERROR) 254s ERROR: ESP encryption key length is zero 254s algparse -v2 'esp=aes_gcm-123456789012345' (expect ERROR) 254s ERROR: ESP encryption algorithm 'aes_gcm-123456789012345' key length WAY too big 254s algparse -v2 'esp=3des-sha1;dh22' (expect ERROR) 254s ERROR: ESP DH algorithm 'dh22' is not supported 254s algparse -v2 'esp=3des-sha1;modp8192,3des-sha2' (expect SUCCESS) 254s 3DES_CBC-HMAC_SHA1_96 254s 3DES_CBC-HMAC_SHA2_256_128 254s algparse -v2 'esp=3des-sha1-modp8192,3des-sha2' (expect SUCCESS) 254s 3DES_CBC-HMAC_SHA1_96 254s 3DES_CBC-HMAC_SHA2_256_128 254s algparse -v2 'esp=3des-sha1-modp8192,3des-sha2-modp8192' (expect SUCCESS) 254s 3DES_CBC-HMAC_SHA1_96 254s 3DES_CBC-HMAC_SHA2_256_128 254s algparse -v2 'esp=3des-sha1-modp8192,3des-sha2;modp8192' (expect SUCCESS) 254s 3DES_CBC-HMAC_SHA1_96 254s 3DES_CBC-HMAC_SHA2_256_128 254s algparse -v2 'esp=3des-sha1;modp8192,3des-sha2-modp8192' (expect SUCCESS) 254s 3DES_CBC-HMAC_SHA1_96 254s 3DES_CBC-HMAC_SHA2_256_128 254s algparse -v2 'esp=3des-sha1;modp8192,3des-sha2;modp8192' (expect SUCCESS) 254s 3DES_CBC-HMAC_SHA1_96 254s 3DES_CBC-HMAC_SHA2_256_128 254s algparse -v2 'esp=3des-sha1-modp8192,3des-sha2-modp2048' (expect SUCCESS) 254s 3DES_CBC-HMAC_SHA1_96 254s 3DES_CBC-HMAC_SHA2_256_128 254s algparse -v2 'ah' (expect SUCCESS) 254s HMAC_SHA2_512_256 254s HMAC_SHA2_256_128 254s algparse -v2 'ah=' (expect ERROR) 254s ERROR: AH proposal is empty 254s algparse -v2 'ah=md5' (expect SUCCESS) 254s HMAC_MD5_96 254s algparse -v2 'ah=sha' (expect SUCCESS) 254s HMAC_SHA1_96 254s algparse -v2 'ah=sha;modp2048' (expect SUCCESS) 254s HMAC_SHA1_96 254s algparse -v2 'ah=sha1' (expect SUCCESS) 254s HMAC_SHA1_96 254s algparse -v2 'ah=sha2' (expect SUCCESS) 254s HMAC_SHA2_256_128 254s algparse -v2 'ah=sha256' (expect SUCCESS) 254s HMAC_SHA2_256_128 254s algparse -v2 'ah=sha384' (expect SUCCESS) 254s HMAC_SHA2_384_192 254s algparse -v2 'ah=sha512' (expect SUCCESS) 254s HMAC_SHA2_512_256 254s algparse -v2 'ah=sha2_256' (expect SUCCESS) 254s thm NONE[_0] 254s | token: '' '' '' 254s | parsing 'aes224-sha1' for ESP 254s | proposal: 'aes224-sha1' 254s | token: '' '' "aes224" '-' 254s | token: '' "aes224" '-' "sha1" '' 254s | ike_alg_byname() failed: ESP encryption algorithm 'aes224' is not recognized 254s | parsing 'aes-224-sha1' for ESP 254s | proposal: 'aes-224-sha1' 254s | token: '' '' "aes" '-' 254s | token: '' "aes" '-' "224" '-' 254s | byname('aes') with ='224' failed: ESP encryption algorithm AES_CBC with key length 224 invalid; valid key lengths: 128, 192, 256 254s | parsing 'aes0-sha1' for ESP 254s | proposal: 'aes0-sha1' 254s | token: '' '' "aes0" '-' 254s | token: '' "aes0" '-' "sha1" '' 254s | ike_alg_byname() failed: ESP encryption algorithm 'aes0' is not recognized 254s | parsing 'aes-0-sha1' for ESP 254s | proposal: 'aes-0-sha1' 254s | token: '' '' "aes" '-' 254s | token: '' "aes" '-' "0" '-' 254s | parsing 'aes512-sha1' for ESP 254s | proposal: 'aes512-sha1' 254s | token: '' '' "aes512" '-' 254s | token: '' "aes512" '-' "sha1" '' 254s | ike_alg_byname() failed: ESP encryption algorithm 'aes512' is not recognized 254s | parsing 'aes-sha1555' for ESP 254s | proposal: 'aes-sha1555' 254s | token: '' '' "aes" '-' 254s | token: '' "aes" '-' "sha1555" '' 254s | token: '-' "sha1555" '' '' 254s | appending ESP encryption algorithm AES_CBC[_0] 254s | parsing integ: 254s | ike_alg_byname() failed: ESP integrity algorithm 'sha1555' is not recognized 254s | lookup for integrity algorithm 'sha1555' failed 254s | or - failed 'ESP integrity algorithm 'sha1555' is not recognized') 254s | parsing 'camellia666-sha1' for ESP 254s | proposal: 'camellia666-sha1' 254s | token: '' '' "camellia666" '-' 254s | token: '' "camellia666" '-' "sha1" '' 254s | ike_alg_byname() failed: ESP encryption algorithm 'camellia666' is not recognized 254s | parsing 'blowfish' for ESP 254s | proposal: 'blowfish' 254s | token: '' '' "blowfish" '' 254s | token: '' "blowfish" '' '' 254s | ike_alg_byname() failed: ESP encryption algorithm 'blowfish' is not supported 254s | parsing 'des-sha1' for ESP 254s | proposal: 'des-sha1' 254s | token: '' '' "des" '-' 254s | token: '' "des" '-' "sha1" '' 254s | ike_alg_byname() failed: ESP encryption algorithm 'des' is not supported 254s | parsing 'aes_ctr666' for ESP 254s | proposal: 'aes_ctr666' 254s | token: '' '' "aes_ctr666" '' 254s | token: '' "aes_ctr666" '' '' 254s | ike_alg_byname() failed: ESP encryption algorithm 'aes_ctr666' is not recognized 254s | parsing 'aes128-sha2_128' for ESP 254s | proposal: 'aes128-sha2_128' 254s | token: '' '' "aes128" '-' 254s | token: '' "aes128" '-' "sha2_128" '' 254s | ike_alg_byname() failed: ESP encryption algorithm 'aes128' is not recognized 254s | token: '-' "sha2_128" '' '' 254s | appending ESP encryption algorithm AES_CBC[_128] 254s | parsing integ: 254s | ike_alg_byname() failed: ESP integrity algorithm 'sha2_128' is not recognized 254s | lookup for integrity algorithm 'sha2_128' failed 254s | or - failed 'ESP integrity algorithm 'sha2_128' is not recognized') 254s | parsing 'aes256-sha2_256-4096' for ESP 254s | proposal: 'aes256-sha2_256-4096' 254s | token: '' '' "aes256" '-' 254s | token: '' "aes256" '-' "sha2_256" '-' 254s | ike_alg_byname() failed: ESP encryption algorithm 'aes256' is not recognized 254s | token: '-' "sha2_256" '-' "4096" '' 254s | appending ESP encryption algorithm AES_CBC[_256] 254s | parsing integ: 254s | appending ESP integrity algorithm HMAC_SHA2_256_128[_0] 254s | token: '-' "4096" '' '' 254s | parsing dh: 254s | ike_alg_byname() failed: ESP DH algorithm '4096' is not recognized 254s | lookup for DH algorithm '4096' failed 254s | ... failed 'ESP DH algorithm '4096' is not recognized' 254s | parsing 'aes256-sha2_256-128' for ESP 254s | proposal: 'aes256-sha2_256-128' 254s | token: '' '' "aes256" '-' 254s | token: '' "aes256" '-' "sha2_256" '-' 254s | ike_alg_byname() failed: ESP encryption algorithm 'aes256' is not recognized 254s | token: '-' "sha2_256" '-' "128" '' 254s | appending ESP encryption algorithm AES_CBC[_256] 254s | parsing integ: 254s | appending ESP integrity algorithm HMAC_SHA2_256_128[_0] 254s | token: '-' "128" '' '' 254s | parsing dh: 254s | ike_alg_byname() failed: ESP DH algorithm '128' is not recognized 254s | lookup for DH algorithm '128' failed 254s | ... failed 'ESP DH algorithm '128' is not recognized' 254s | parsing 'vanitycipher' for ESP 254s | proposal: 'vanitycipher' 254s | token: '' '' "vanitycipher" '' 254s | token: '' "vanitycipher" '' '' 254s | ike_alg_byname() failed: ESP encryption algorithm 'vanitycipher' is not recognized 254s | parsing 'ase-sah' for ESP 254s | proposal: 'ase-sah' 254s | token: '' '' "ase" '-' 254s | token: '' "ase" '-' "sah" '' 254s | ike_alg_byname() failed: ESP encryption algorithm 'ase' is not recognized 254s | parsing 'aes-sah1' for ESP 254s | proposal: 'aes-sah1' 254s | token: '' '' "aes" '-' 254s | token: '' "aes" '-' "sah1" '' 254s | token: '-' "sah1" '' '' 254s | appending ESP encryption algorithm AES_CBC[_0] 254s | parsing integ: 254s | ike_alg_byname() failed: ESP integrity algorithm 'sah1' is not recognized 254s | lookup for integrity algorithm 'sah1' failed 254s | or - failed 'ESP integrity algorithm 'sah1' is not recognized') 254s | parsing 'id3' for ESP 254s | proposal: 'id3' 254s | token: '' '' "id3" '' 254s | token: '' "id3" '' '' 254s | ike_alg_byname() failed: ESP encryption algorithm 'id3' is not recognized 254s | ike_alg_byname() failed: ESP encryption algorithm 'id3' is not recognized 254s | parsing 'aes-id3' for ESP 254s | proposal: 'aes-id3' 254s | token: '' '' "aes" '-' 254s | token: '' "aes" '-' "id3" '' 254s | token: '-' "id3" '' '' 254s | appending ESP encryption algorithm AES_CBC[_0] 254s | parsing integ: 254s | ike_alg_byname() failed: ESP integrity algorithm 'id3' is not recognized 254s | lookup for integrity algorithm 'id3' failed 254s | or - failed 'ESP integrity algorithm 'id3' is not recognized') 254s | parsing 'aes_gcm-md5' for ESP 254s | proposal: 'aes_gcm-md5' 254s | token: '' '' "aes_gcm" '-' 254s | token: '' "aes_gcm" '-' "md5" '' 254s | token: '-' "md5" '' '' 254s | appending ESP encryption algorithm AES_GCM_16[_0] 254s | parsing integ: 254s | appending ESP integrity algorithm HMAC_MD5_96[_0] 254s | token: '' '' '' 254s | parsing 'mars' for ESP 254s | proposal: 'mars' 254s | token: '' '' "mars" '' 254s | token: '' "mars" '' '' 254s | ike_alg_byname() failed: ESP encryption algorithm 'mars' is not supported 254s | parsing 'aes_gcm-16' for ESP 254s | proposal: 'aes_gcm-16' 254s | token: '' '' "aes_gcm" '-' 254s | token: '' "aes_gcm" '-' "16" '' 254s | byname('aes_gcm') with ='16' failed: ESP encryption algorithm AES_GCM_16 with key length 16 invalid; valid key lengths: 128, 192, 256 254s | parsing 'aes_gcm-0' for ESP 254s | proposal: 'aes_gcm-0' 254s | token: '' '' "aes_gcm" '-' 254s | token: '' "aes_gcm" '-' "0" '' 254s | parsing 'aes_gcm-123456789012345' for ESP 254s | proposal: 'aes_gcm-123456789012345' 254s | token: '' '' "aes_gcm" '-' 254s | token: '' "aes_gcm" '-' "123456789012345" '' 254s | parsing '3des-sha1;dh22' for ESP 254s | proposal: '3des-sha1;dh22' 254s | token: '' '' "3des" '-' 254s | token: '' "3des" '-' "sha1" ';' 254s | token: '-' "sha1" ';' "dh22" '' 254s | appending ESP encryption algorithm 3DES_CBC[_0] 254s | parsing integ: 254s | appending ESP integrity algorithm HMAC_SHA1_96[_0] 254s | token: ';' "dh22" '' '' 254s | parsing dh: 254s | ike_alg_byname() failed: ESP DH algorithm 'dh22' is not supported 254s | lookup for DH algorithm 'dh22' failed 254s | ... failed 'ESP DH algorithm 'dh22' is not supported' 254s | parsing '3des-sha1;modp8192,3des-sha2' for ESP 254s | proposal: '3des-sha1;modp8192' 254s | token: '' '' "3des" '-' 254s | token: '' "3des" '-' "sha1" ';' 254s | token: '-' "sha1" ';' "modp8192" '' 254s | appending ESP encryption algorithm 3DES_CBC[_0] 254s | parsing integ: 254s | appending ESP integrity algorithm HMAC_SHA1_96[_0] 254s | token: ';' "modp8192" '' '' 254s | parsing dh: 254s | appending ESP DH algorithm MODP8192[_0] 254s | token: '' '' '' 254s | proposal: '3des-sha2' 254s | token: '' '' "3des" '-' 254s | token: '' "3des" '-' "sha2" '' 254s | token: '-' "sha2" '' '' 254s | appending ESP encryption algorithm 3DES_CBC[_0] 254s | parsing integ: 254s | appending ESP integrity algorithm HMAC_SHA2_256_128[_0] 254s | token: '' '' '' 254s ipsec algparse: ignoring ESP DH algorithm MODP8192 as PFS policy is disabled 254s | parsing '3des-sha1-modp8192,3des-sha2' for ESP 254s | proposal: '3des-sha1-modp8192' 254s | token: '' '' "3des" '-' 254s | token: '' "3des" '-' "sha1" '-' 254s | token: '-' "sha1" '-' "modp8192" '' 254s | appending ESP encryption algorithm 3DES_CBC[_0] 254s | parsing integ: 254s | appending ESP integrity algorithm HMAC_SHA1_96[_0] 254s | token: '-' "modp8192" '' '' 254s | parsing dh: 254s | appending ESP DH algorithm MODP8192[_0] 254s | token: '' '' '' 254s | proposal: '3des-sha2' 254s | token: '' '' "3des" '-' 254s | token: '' "3des" '-' "sha2" '' 254s | token: '-' "sha2" '' '' 254s | appending ESP encryption algorithm 3DES_CBC[_0] 254s | parsing integ: 254s | appending ESP integrity algorithm HMAC_SHA2_256_128[_0] 254s | token: '' '' '' 254s ipsec algparse: ignoring ESP DH algorithm MODP8192 as PFS policy is disabled 254s | parsing '3des-sha1-modp8192,3des-sha2-modp8192' for ESP 254s | proposal: '3des-sha1-modp8192' 254s | token: '' '' "3des" '-' 254s | token: '' "3des" '-' "sha1" '-' 254s | token: '-' "sha1" '-' "modp8192" '' 254s | appending ESP encryption algorithm 3DES_CBC[_0] 254s | parsing integ: 254s | appending ESP integrity algorithm HMAC_SHA1_96[_0] 254s | token: '-' "modp8192" '' '' 254s | parsing dh: 254s | appending ESP DH algorithm MODP8192[_0] 254s | token: '' '' '' 254s | proposal: '3des-sha2-modp8192' 254s | token: '' '' "3des" '-' 254s | token: '' "3des" '-' "sha2" '-' 254s | token: '-' "sha2" '-' "modp8192" '' 254s | appending ESP encryption algorithm 3DES_CBC[_0] 254s | parsing integ: 254s | appending ESP integrity algorithm HMAC_SHA2_256_128[_0] 254s | token: '-' "modp8192" '' '' 254s | parsing dh: 254s | appending ESP DH algorithm MODP8192[_0] 254s | token: '' '' '' 254s ipsec algparse: ignoring ESP DH algorithm MODP8192 as PFS policy is disabled 254s ipsec algparse: ignoring ESP DH algorithm MODP8192 as PFS policy is disabled 254s | parsing '3des-sha1-modp8192,3des-sha2;modp8192' for ESP 254s | proposal: '3des-sha1-modp8192' 254s | token: '' '' "3des" '-' 254s | token: '' "3des" '-' "sha1" '-' 254s | token: '-' "sha1" '-' "modp8192" '' 254s | appending ESP encryption algorithm 3DES_CBC[_0] 254s | parsing integ: 254s | appending ESP integrity algorithm HMAC_SHA1_96[_0] 254s | token: '-' "modp8192" '' '' 254s | parsing dh: 254s | appending ESP DH algorithm MODP8192[_0] 254s | token: '' '' '' 254s | proposal: '3des-sha2;modp8192' 254s | token: '' '' "3des" '-' 254s | token: '' "3des" '-' "sha2" ';' 254s | token: '-' "sha2" ';' "modp8192" '' 254s | appending ESP encryption algorithm 3DES_CBC[_0] 254s | parsing integ: 254s | appending ESP integrity algorithm HMAC_SHA2_256_128[_0] 254s | token: ';' "modp8192" '' '' 254s | parsing dh: 254s | appending ESP DH algorithm MODP8192[_0] 254s | token: '' '' '' 254s ipsec algparse: ignoring ESP DH algorithm MODP8192 as PFS policy is disabled 254s ipsec algparse: ignoring ESP DH algorithm MODP8192 as PFS policy is disabled 254s | parsing '3des-sha1;modp8192,3des-sha2-modp8192' for ESP 254s | proposal: '3des-sha1;modp8192' 254s | token: '' '' "3des" '-' 254s | token: '' "3des" '-' "sha1" ';' 254s | token: '-' "sha1" ';' "modp8192" '' 254s | appending ESP encryption algorithm 3DES_CBC[_0] 254s | parsing integ: 254s | appending ESP integrity algorithm HMAC_SHA1_96[_0] 254s | token: ';' "modp8192" '' '' 254s | parsing dh: 254s | appending ESP DH algorithm MODP8192[_0] 254s | token: '' '' '' 254s | proposal: '3des-sha2-modp8192' 254s | token: '' '' "3des" '-' 254s | token: '' "3des" '-' "sha2" '-' 254s | token: '-' "sha2" '-' "modp8192" '' 254s | appending ESP encryption algorithm 3DES_CBC[_0] 254s | parsing integ: 254s | appending ESP integrity algorithm HMAC_SHA2_256_128[_0] 254s | token: '-' "modp8192" '' '' 254s | parsing dh: 254s | appending ESP DH algorithm MODP8192[_0] 254s | token: '' '' '' 254s ipsec algparse: ignoring ESP DH algorithm MODP8192 as PFS policy is disabled 254s ipsec algparse: ignoring ESP DH algorithm MODP8192 as PFS policy is disabled 254s | parsing '3des-sha1;modp8192,3des-sha2;modp8192' for ESP 254s | proposal: '3des-sha1;modp8192' 254s | token: '' '' "3des" '-' 254s | token: '' "3des" '-' "sha1" ';' 254s | token: '-' "sha1" ';' "modp8192" '' 254s | appending ESP encryption algorithm 3DES_CBC[_0] 254s | parsing integ: 254s | appending ESP integrity algorithm HMAC_SHA1_96[_0] 254s | token: ';' "modp8192" '' '' 254s | parsing dh: 254s | appending ESP DH algorithm MODP8192[_0] 254s | token: '' '' '' 254s | proposal: '3des-sha2;modp8192' 254s | token: '' '' "3des" '-' 254s | token: '' "3des" '-' "sha2" ';' 254s | token: '-' "sha2" ';' "modp8192" '' 254s | appending ESP encryption algorithm 3DES_CBC[_0] 254s | parsing integ: 254s | appending ESP integrity algorithm HMAC_SHA2_256_128[_0] 254s | token: ';' "modp8192" '' '' 254s | parsing dh: 254s | appending ESP DH algorithm MODP8192[_0] 254s | token: '' '' '' 254s ipsec algparse: ignoring ESP DH algorithm MODP8192 as PFS policy is disabled 254s ipsec algparse: ignoring ESP DH algorithm MODP8192 as PFS policy is disabled 254s | parsing '3des-sha1-modp8192,3des-sha2-modp2048' for ESP 254s | proposal: '3des-sha1-modp8192' 254s | token: '' '' "3des" '-' 254s | token: '' "3des" '-' "sha1" '-' 254s | token: '-' "sha1" '-' "modp8192" '' 254s | appending ESP encryption algorithm 3DES_CBC[_0] 254s | parsing integ: 254s | appending ESP integrity algorithm HMAC_SHA1_96[_0] 254s | token: '-' "modp8192" '' '' 254s | parsing dh: 254s | appending ESP DH algorithm MODP8192[_0] 254s | token: '' '' '' 254s | proposal: '3des-sha2-modp2048' 254s | token: '' '' "3des" '-' 254s | token: '' "3des" '-' "sha2" '-' 254s | token: '-' "sha2" '-' "modp2048" '' 254s | appending ESP encryption algorithm 3DES_CBC[_0] 254s | parsing integ: 254s | appending ESP integrity algorithm HMAC_SHA2_256_128[_0] 254s | token: '-' "modp2048" '' '' 254s | parsing dh: 254s | appending ESP DH algorithm MODP2048[_0] 254s | token: '' '' '' 254s ipsec algparse: ignoring ESP DH algorithm MODP8192 as PFS policy is disabled 254s ipsec algparse: ignoring ESP DH algorithm MODP2048 as PFS policy is disabled 254s | parsing 'SHA2_512_256,SHA2_256_128' for AH 254s | proposal: 'SHA2_512_256' 254s | token: '' '' "SHA2_512_256" '' 254s | token: '' "SHA2_512_256" '' '' 254s | parsing integ: 254s | appending AH integrity algorithm HMAC_SHA2_512_256[_0] 254s | token: '' '' '' 254s | proposal: 'SHA2_256_128' 254s | token: '' '' "SHA2_256_128" '' 254s | token: '' "SHA2_256_128" '' '' 254s | parsing integ: 254s | appending AH integrity algorithm HMAC_SHA2_256_128[_0] 254s | token: '' '' '' 254s | parsing '' for AH 254s | parsing 'md5' for AH 254s | proposal: 'md5' 254s | token: '' '' "md5" '' 254s | token: '' "md5" '' '' 254s | parsing integ: 254s | appending AH integrity algorithm HMAC_MD5_96[_0] 254s | token: '' '' '' 254s | parsing 'sha' for AH 254s | proposal: 'sha' 254s | token: '' '' "sha" '' 254s | token: '' "sha" '' '' 254s | parsing integ: 254s | appending AH integrity algorithm HMAC_SHA1_96[_0] 254s | token: '' '' '' 254s | parsing 'sha;modp2048' for AH 254s | proposal: 'sha;modp2048' 254s | token: '' '' "sha" ';' 254s | token: '' "sha" ';' "modp2048" '' 254s | parsing integ: 254s | appending AH integrity algorithm HMAC_SHA1_96[_0] 254s | token: ';' "modp2048" '' '' 254s | parsing dh: 254s | appending AH DH algorithm MODP2048[_0] 254s | token: '' '' '' 254s ipsec algparse: ignoring AH DH algorithm MODP2048 as PFS policy is disabled 254s | parsing 'sha1' for AH 254s | proposal: 'sha1' 254s | token: '' '' "sha1" '' 254s | token: '' "sha1" '' '' 254s | parsing integ: 254s | appending AH integrity algorithm HMAC_SHA1_96[_0] 254s | token: '' '' '' 254s | parsing 'sha2' for AH 254s | proposal: 'sha2' 254s | token: '' '' "sha2" '' 254s | token: '' "sha2" '' '' 254s | parsing integ: 254s | appending AH integrity algorithm HMAC_SHA2_256_128[_0] 254s | token: '' '' '' 254s | parsing 'sha256' for AH 254s | proposal: 'sha256' 254s | token: '' '' "sha256" '' 254s | token: '' "sha256" '' '' 254s | parsing integ: 254s | appending AH integrity algorithm HMAC_SHA2_256_128[_0] 254s | token: '' '' '' 254s | parsing 'sha384' for AH 254s | proposal: 'sha384' 254s | token: '' '' "sha384" '' 254s | token: '' "sha384" '' '' 254s | parsing integ: 254s | appending AH integrity algorithm HMAC_SHA2_384_192[_0] 254s | token: '' '' '' 254s | parsing 'sha512' for AH 254s | proposal: 'sha512' 254s | token: '' '' "sha512" '' 254s | token: '' "sha512" '' '' 254s | parsing integ: 254s | appending AH integrity algorithm HMAC_SHA2_512_256[_0] 254s | token: '' '' '' 254s HMAC_SHA2_256_128 254s algparse -v2 'ah=sha2_384' (expect SUCCESS) 254s | parsing 'sha2_256' for AH 254s | proposal: 'sha2_256' 254s | token: '' '' "sha2_256" '' 254s | token: '' "sha2_256" '' '' 254s | parsing integ: 254s | appending AH integrity algorithm HMAC_SHA2_256_128[_0] 254s | token: '' '' '' 254s | parsing 'sha2_384' for AH 254s | proposal: 'sha2_384' 254s | token: '' '' "sha2_384" '' 254s | token: '' "sha2_384" '' '' 254s | parsing integ: 254s | appending AH integrity algorithm HMAC_SHA2_384_192[_0] 254s HMAC_SHA2_384_192 254s algparse -v2 'ah=sha2_512' (expect SUCCESS) 254s HMAC_SHA2_512_256 254s algparse -v2 'ah=aes_xcbc' (expect SUCCESS) 254s AES_XCBC_96 254s algparse -v2 'ah=sha2-none' (expect SUCCESS) 254s HMAC_SHA2_256_128 254s algparse -v2 'ah=sha2;none' (expect SUCCESS) 254s HMAC_SHA2_256_128 254s algparse -v2 'ah=sha1-modp8192,sha1-modp8192,sha1-modp8192' (expect SUCCESS) 254s HMAC_SHA1_96 254s algparse -v2 'ah=aes-sha1' (expect ERROR) 254s ERROR: AH integrity algorithm 'aes' is not recognized 254s algparse -v2 'ah=vanityhash1' (expect ERROR) 254s ERROR: AH integrity algorithm 'vanityhash1' is not recognized 254s algparse -v2 'ah=aes_gcm_c-256' (expect ERROR) 254s ERROR: AH integrity algorithm 'aes_gcm_c' is not recognized 254s algparse -v2 'ah=id3' (expect ERROR) 254s ERROR: AH integrity algorithm 'id3' is not recognized 254s algparse -v2 'ah=3des' (expect ERROR) 254s ERROR: AH integrity algorithm '3des' is not recognized 254s algparse -v2 'ah=null' (expect ERROR) 254s | token: '' '' '' 254s | parsing 'sha2_512' for AH 254s | proposal: 'sha2_512' 254s | token: '' '' "sha2_512" '' 254s | token: '' "sha2_512" '' '' 254s | parsing integ: 254s | appending AH integrity algorithm HMAC_SHA2_512_256[_0] 254s | token: '' '' '' 254s | parsing 'aes_xcbc' for AH 254s | proposal: 'aes_xcbc' 254s | token: '' '' "aes_xcbc" '' 254s | token: '' "aes_xcbc" '' '' 254s | parsing integ: 254s | appending AH integrity algorithm AES_XCBC_96[_0] 254s | token: '' '' '' 254s | parsing 'sha2-none' for AH 254s | proposal: 'sha2-none' 254s | token: '' '' "sha2" '-' 254s | token: '' "sha2" '-' "none" '' 254s | parsing integ: 254s | appending AH integrity algorithm HMAC_SHA2_256_128[_0] 254s | token: '-' "none" '' '' 254s | parsing dh: 254s | appending AH DH algorithm NONE[_0] 254s | token: '' '' '' 254s ipsec algparse: ignoring redundant AH DH algorithm NONE as PFS policy is disabled 254s | parsing 'sha2;none' for AH 254s | proposal: 'sha2;none' 254s | token: '' '' "sha2" ';' 254s | token: '' "sha2" ';' "none" '' 254s | parsing integ: 254s | appending AH integrity algorithm HMAC_SHA2_256_128[_0] 254s | token: ';' "none" '' '' 254s | parsing dh: 254s | appending AH DH algorithm NONE[_0] 254s | token: '' '' '' 254s ipsec algparse: ignoring redundant AH DH algorithm NONE as PFS policy is disabled 254s | parsing 'sha1-modp8192,sha1-modp8192,sha1-modp8192' for AH 254s | proposal: 'sha1-modp8192' 254s | token: '' '' "sha1" '-' 254s | token: '' "sha1" '-' "modp8192" '' 254s | parsing integ: 254s | appending AH integrity algorithm HMAC_SHA1_96[_0] 254s | token: '-' "modp8192" '' '' 254s | parsing dh: 254s | appending AH DH algorithm MODP8192[_0] 254s | token: '' '' '' 254s | proposal: 'sha1-modp8192' 254s | token: '' '' "sha1" '-' 254s | token: '' "sha1" '-' "modp8192" '' 254s | parsing integ: 254s | appending AH integrity algorithm HMAC_SHA1_96[_0] 254s | token: '-' "modp8192" '' '' 254s | parsing dh: 254s | appending AH DH algorithm MODP8192[_0] 254s | token: '' '' '' 254s | proposal: 'sha1-modp8192' 254s | token: '' '' "sha1" '-' 254s | token: '' "sha1" '-' "modp8192" '' 254s | parsing integ: 254s | appending AH integrity algorithm HMAC_SHA1_96[_0] 254s | token: '-' "modp8192" '' '' 254s | parsing dh: 254s | appending AH DH algorithm MODP8192[_0] 254s | token: '' '' '' 254s ipsec algparse: ignoring AH DH algorithm MODP8192 as PFS policy is disabled 254s | parsing 'aes-sha1' for AH 254s | proposal: 'aes-sha1' 254s | token: '' '' "aes" '-' 254s | token: '' "aes" '-' "sha1" '' 254s | parsing integ: 254s | ike_alg_byname() failed: AH integrity algorithm 'aes' is not recognized 254s | lookup for integrity algorithm 'aes' failed 254s | or - failed 'AH integrity algorithm 'aes' is not recognized') 254s | parsing 'vanityhash1' for AH 254s | proposal: 'vanityhash1' 254s | token: '' '' "vanityhash1" '' 254s | token: '' "vanityhash1" '' '' 254s | parsing integ: 254s | ike_alg_byname() failed: AH integrity algorithm 'vanityhash1' is not recognized 254s | lookup for integrity algorithm 'vanityhash1' failed 254s | or - failed 'AH integrity algorithm 'vanityhash1' is not recognized') 254s | parsing 'aes_gcm_c-256' for AH 254s | proposal: 'aes_gcm_c-256' 254s | token: '' '' "aes_gcm_c" '-' 254s | token: '' "aes_gcm_c" '-' "256" '' 254s | parsing integ: 254s | ike_alg_byname() failed: AH integrity algorithm 'aes_gcm_c' is not recognized 254s | lookup for integrity algorithm 'aes_gcm_c' failed 254s | or - failed 'AH integrity algorithm 'aes_gcm_c' is not recognized') 254s | parsing 'id3' for AH 254s | proposal: 'id3' 254s | token: '' '' "id3" '' 254s | token: '' "id3" '' '' 254s | parsing integ: 254s | ike_alg_byname() failed: AH integrity algorithm 'id3' is not recognized 254s | lookup for integrity algorithm 'id3' failed 254s | or - failed 'AH integrity algorithm 'id3' is not recognized') 254s | parsing '3des' for AH 254s | proposal: '3des' 254s | token: '' '' "3des" '' 254s | token: '' "3des" '' '' 254s | parsing integ: 254s | ike_alg_byname() failed: AH integrity algorithm '3des' is not recognized 254s | lookup for integrity algorithm '3des' failed 254s | or - failed 'AH integrity algorithm '3des' is not recognized') 254s | parsing 'null' for AH 254s | proposal: 'null' 254s ERROR: AH cannot have 'none' as the integrity algorithm 254s algparse -v2 'ah=aes_gcm' (expect ERROR) 254s ERROR: AH integrity algorithm 'aes_gcm' is not recognized 254s algparse -v2 'ah=aes_ccm' (expect ERROR) 254s ERROR: AH integrity algorithm 'aes_ccm' is not recognized 254s algparse -v2 'ah=ripemd' (expect ERROR) 254s ERROR: AH integrity algorithm 'ripemd' is not recognized 254s algparse -v2 'ike' (expect SUCCESS) 254s | token: '' '' "null" '' 254s | token: '' "null" '' '' 254s | parsing integ: 254s | appending AH integrity algorithm NONE[_0] 254s | token: '' '' '' 254s | parsing 'aes_gcm' for AH 254s | proposal: 'aes_gcm' 254s | token: '' '' "aes_gcm" '' 254s | token: '' "aes_gcm" '' '' 254s | parsing integ: 254s | ike_alg_byname() failed: AH integrity algorithm 'aes_gcm' is not recognized 254s | lookup for integrity algorithm 'aes_gcm' failed 254s | or - failed 'AH integrity algorithm 'aes_gcm' is not recognized') 254s | parsing 'aes_ccm' for AH 254s | proposal: 'aes_ccm' 254s | token: '' '' "aes_ccm" '' 254s | token: '' "aes_ccm" '' '' 254s | parsing integ: 254s | ike_alg_byname() failed: AH integrity algorithm 'aes_ccm' is not recognized 254s | lookup for integrity algorithm 'aes_ccm' failed 254s | or - failed 'AH integrity algorithm 'aes_ccm' is not recognized') 254s | parsing 'ripemd' for AH 254s | proposal: 'ripemd' 254s | token: '' '' "ripemd" '' 254s | token: '' "ripemd" '' '' 254s | parsing integ: 254s | ike_alg_byname() failed: AH integrity algorithm 'ripemd' is not recognized 254s | lookup for integrity algorithm 'ripemd' failed 254s | or - failed 'AH integrity algorithm 'ripemd' is not recognized') 254s | parsing 'AES_GCM_16_256,AES_GCM_16_128,CHACHA20_POLY1305,AES_CBC_256,AES_CBC_128' for IKE 254s | proposal: 'AES_GCM_16_256' 254s | token: '' '' "AES_GCM_16_256" '' 254s | token: '' "AES_GCM_16_256" '' '' 254s | ike_alg_byname() failed: IKE encryption algorithm 'AES_GCM_16_256' is not recognized 254s | token: '' '' '' 254s | appending IKE encryption algorithm AES_GCM_16[_256] 254s | appending IKE PRF algorithm HMAC_SHA2_512[_0] 254s | appending IKE PRF algorithm HMAC_SHA2_256[_0] 254s | appending IKE integrity algorithm NONE[_0] 254s | appending IKE DH algorithm DH19[_0] 254s | appending IKE DH algorithm DH20[_0] 254s | appending IKE DH algorithm DH21[_0] 254s | appending IKE DH algorithm DH31[_0] 254s | appending IKE DH algorithm MODP4096[_0] 254s | appending IKE DH algorithm MODP3072[_0] 254s | appending IKE DH algorithm MODP2048[_0] 254s | appending IKE DH algorithm MODP8192[_0] 254s | proposal: 'AES_GCM_16_128' 254s | token: '' '' "AES_GCM_16_128" '' 254s | token: '' "AES_GCM_16_128" '' '' 254s | ike_alg_byname() failed: IKE encryption algorithm 'AES_GCM_16_128' is not recognized 254s | token: '' '' '' 254s | appending IKE encryption algorithm AES_GCM_16[_128] 254s | appending IKE PRF algorithm HMAC_SHA2_512[_0] 254s | appending IKE PRF algorithm HMAC_SHA2_256[_0] 254s | appending IKE integrity algorithm NONE[_0] 254s | appending IKE DH algorithm DH19[_0] 254s | appending IKE DH algorithm DH20[_0] 254s | appending IKE DH algorithm DH21[_0] 254s | appending IKE DH algorithm DH31[_0] 254s | appending IKE DH algorithm MODP4096[_0] 254s | appending IKE DH algorithm MODP3072[_0] 254s | appending IKE DH algorithm MODP2048[_0] 254s | appending IKE DH algorithm MODP8192[_0] 254s | proposal: 'CHACHA20_POLY1305' 254s | token: '' '' "CHACHA20_POLY1305" '' 254s | token: '' "CHACHA20_POLY1305" '' '' 254s | token: '' '' '' 254s | appending IKE encryption algorithm CHACHA20_POLY1305[_0] 254s | appending IKE PRF algorithm HMAC_SHA2_512[_0] 254s | appending IKE PRF algorithm HMAC_SHA2_256[_0] 254s | appending IKE integrity algorithm NONE[_0] 254s | appending IKE DH algorithm DH19[_0] 254s | appending IKE DH algorithm DH20[_0] 254s | appending IKE DH algorithm DH21[_0] 254s | appending IKE DH algorithm DH31[_0] 254s | appending IKE DH algorithm MODP4096[_0] 254s | appending IKE DH algorithm MODP3072[_0] 254s | appending IKE DH algorithm MODP2048[_0] 254s | appending IKE DH algorithm MODP8192[_0] 254s | proposal: 'AES_CBC_256' 254s | token: '' '' "AES_CBC_256" '' 254s | token: '' "AES_CBC_256" '' '' 254s | ike_alg_byname() failed: IKE encryption algorithm 'AES_CBC_256' is not recognized 254s | token: '' '' '' 254s | appending IKE encryption algorithm AES_CBC[_256] 254s | appending IKE PRF algorithm HMAC_SHA2_512[_0] 254s | appending IKE PRF algorithm HMAC_SHA2_256[_0] 254s | appending IKE integrity algorithm HMAC_SHA2_512_256[_0] 254s | appending IKE integrity algorithm HMAC_SHA2_256_128[_0] 254s | appending IKE DH algorithm DH19[_0] 254s | appending IKE DH algorithm DH20[_0] 254s | appending IKE DH algorithm DH21[_0] 254s | appending IKE DH algorithm DH31[_0] 254s | appending IKE DH algorithm MODP4096[_0] 254s | appending IKE DH algorithm MODP3072[_0] 254s | appending IKE DH algorithm MODP2048[_0] 254s | appending IKE DH algorithm MODP8192[_0] 254s | proposal: 'AES_CBC_128' 254s | token: '' '' "AES_CBC_128" '' 254s | token: '' "AES_CBC_128" '' '' 254s | ike_alg_byname() failed: IKE encryption algorithm 'AES_CBC_128' is not recognized 254s | token: '' '' '' 254s | appending IKE encryption algorithm AES_CBC[_128] 254s | appending IKE PRF algorithm HMAC_SHA2_512[_0] 254s | appending IKE PRF algorithm HMAC_SHA2_256[_0] 254s | appending IKE integrity algorithm HMAC_SHA2_512_256[_0] 254s | appending IKE integrity algorithm HMAC_SHA2_256_128[_0] 254s | appending IKE DH algorithm DH19[_0] 254s | appending IKE DH algorithm DH20[_0] 254s | appending IKE DH algorithm DH21[_0] 254s | appending IKE DH algorithm DH31[_0] 254s | appending IKE DH algorithm MODP4096[_0] 254s | appending IKE DH algorithm MODP3072[_0] 254s | appending IKE DH algorithm MODP2048[_0] 254s | appending IKE DH algorithm MODP8192[_0] 254s | parsing '' for IKE 254s AES_GCM_16_256-HMAC_SHA2_512+HMAC_SHA2_256-DH19+DH20+DH21+DH31+MODP4096+MODP3072+MODP2048+MODP8192 254s AES_GCM_16_128-HMAC_SHA2_512+HMAC_SHA2_256-DH19+DH20+DH21+DH31+MODP4096+MODP3072+MODP2048+MODP8192 254s CHACHA20_POLY1305-HMAC_SHA2_512+HMAC_SHA2_256-DH19+DH20+DH21+DH31+MODP4096+MODP3072+MODP2048+MODP8192 254s AES_CBC_256-HMAC_SHA2_512+HMAC_SHA2_256-DH19+DH20+DH21+DH31+MODP4096+MODP3072+MODP2048+MODP8192 254s AES_CBC_128-HMAC_SHA2_512+HMAC_SHA2_256-DH19+DH20+DH21+DH31+MODP4096+MODP3072+MODP2048+MODP8192 254s algparse -v2 'ike=' (expect ERROR) 254s ERROR: IKE proposal is empty 254s algparse -v2 'ike=3des-sha1' (expect SUCCESS) 254s 3DES_CBC-HMAC_SHA1-DH19+DH20+DH21+DH31+MODP4096+MODP3072+MODP2048+MODP8192 254s algparse -v2 'ike=3des-sha1' (expect SUCCESS) 254s 3DES_CBC-HMAC_SHA1-DH19+DH20+DH21+DH31+MODP4096+MODP3072+MODP2048+MODP8192 254s algparse -v2 'ike=3des-sha1;modp1536' (expect SUCCESS) 254s 3DES_CBC-HMAC_SHA1-MODP1536 254s algparse -v2 'ike=3des;dh21' (expect SUCCESS) 254s 3DES_CBC-HMAC_SHA2_512+HMAC_SHA2_256-DH21 254s algparse -v2 'ike=3des-sha1;dh21' (expect SUCCESS) 254s 3DES_CBC-HMAC_SHA1-DH21 254s algparse -v2 'ike=3des-sha1-ecp_521' (expect SUCCESS) 254s 3DES_CBC-HMAC_SHA1-DH21 254s algparse -v2 'ike=3des+aes' (expect SUCCESS) 254s 3DES_CBC+AES_CBC-HMAC_SHA2_512+HMAC_SHA2_256-DH19+DH20+DH21+DH31+MODP4096+MODP3072+MODP2048+MODP8192 254s algparse -v2 'ike=aes;none' (expect ERROR) 254s ERROR: IKE DH algorithm 'none' not permitted 254s algparse -v2 'ike=id2' (expect ERROR) 254s ERROR: IKE encryption algorithm 'id2' is not recognized 254s algparse -v2 'ike=3des-id2' (expect ERROR) 254s ERROR: IKE PRF algorithm 'id2' is not recognized 254s algparse -v2 'ike=aes_ccm' (expect ERROR) 254s ERROR: IKE encryption algorithm 'aes_ccm' is not supported 254s algparse -v2 'ike=aes-sha1-sha2-ecp_521' (expect ERROR) 254s ERROR: IKE DH algorithm 'sha2' is not recognized 254s algparse -v2 'ike=aes-sha2-sha2;ecp_521' (expect ERROR) 254s ERROR: IKE DH algorithm 'sha2' is not recognized 254s algparse -v2 'ike=aes-sha1_96-sha2-ecp_521' (expect SUCCESS) 254s AES_CBC-HMAC_SHA1_96-HMAC_SHA2_256-DH21 254s algparse -v2 'ike=aes-sha1_96-sha2;ecp_521' (expect SUCCESS) 254s AES_CBC-HMAC_SHA1_96-HMAC_SHA2_256-DH21 254s algparse -v2 'ike=aes+aes-sha1+sha1-modp8192+modp8192' (expect SUCCESS) 254s AES_CBC-HMAC_SHA1-MODP8192 254s algparse -v2 'ike=3des+aes+aes-sha2+sha1+sha1-modp4096+modp8192+modp8192' (expect SUCCESS) 254s 3DES_CBC+AES_CBC-HMAC_SHA2_256+HMAC_SHA1-MODP4096+MODP8192 254s algparse -v2 'ike=aes+3des+aes-sha1+sha2+sha1-modp8192+modp4096+modp8192' (expect SUCCESS) 254s AES_CBC+3DES_CBC-HMAC_SHA1+HMAC_SHA2_256-MODP8192+MODP4096 254s algparse -v2 'ike=aes+aes+3des-sha1+sha1+sha2-modp8192+modp8192+modp4096' (expect SUCCESS) 254s AES_CBC+3DES_CBC-HMAC_SHA1+HMAC_SHA2_256-MODP8192+MODP4096 254s algparse -v2 'ike=aes+aes128+aes256' (expect SUCCESS) 254s AES_CBC-HMAC_SHA2_512+HMAC_SHA2_256-DH19+DH20+DH21+DH31+MODP4096+MODP3072+MODP2048+MODP8192 254s algparse -v2 'ike=aes128+aes+aes256' (expect SUCCESS) 254s AES_CBC_128+AES_CBC-HMAC_SHA2_512+HMAC_SHA2_256-DH19+DH20+DH21+DH31+MODP4096+MODP3072+MODP2048+MODP8192 254s algparse -v2 'ike=aes128+aes256+aes' (expect SUCCESS) 254s AES_CBC_128+AES_CBC_256+AES_CBC-HMAC_SHA2_512+HMAC_SHA2_256-DH19+DH20+DH21+DH31+MODP4096+MODP3072+MODP2048+MODP8192 254s algparse -v2 'ike=aes-sha1-modp8192,aes-sha1-modp8192,aes-sha1-modp8192' (expect SUCCESS) 254s AES_CBC-HMAC_SHA1-MODP8192 254s algparse -v2 'ike=aes-sha1-modp8192,aes-sha2-modp8192,aes-sha1-modp8192' (expect SUCCESS) 254s AES_CBC-HMAC_SHA1-MODP8192 254s AES_CBC-HMAC_SHA2_256-MODP8192 254s algparse -v2 'ike=aes_gcm' (expect SUCCESS) 254s AES_GCM_16-HMAC_SHA2_512+HMAC_SHA2_256-DH19+DH20+DH21+DH31+MODP4096+MODP3072+MODP2048+MODP8192 254s algparse -v2 'ike=aes_gcm-sha2' (expect SUCCESS) 254s AES_GCM_16-HMAC_SHA2_256-DH19+DH20+DH21+DH31+MODP4096+MODP3072+MODP2048+MODP8192 254s algparse -v2 'ike=aes_gcm-sha2-modp2048' (expect SUCCESS) 254s AES_GCM_16-HMAC_SHA2_256-MODP2048 254s algparse -v2 'ike=aes_gcm-sha2;modp2048' (expect SUCCESS) 254s AES_GCM_16-HMAC_SHA2_256-MODP2048 254s algparse -v2 'ike=aes_gcm-modp2048' (expect ERROR) 254s | parsing '3des-sha1' for IKE 254s | proposal: '3des-sha1' 254s | token: '' '' "3des" '-' 254s | token: '' "3des" '-' "sha1" '' 254s | token: '-' "sha1" '' '' 254s | appending IKE encryption algorithm 3DES_CBC[_0] 254s | parsing prf: 254s | appending IKE PRF algorithm HMAC_SHA1[_0] 254s | token: '' '' '' 254s | - succeeded, advancing tokens 254s | appending IKE integrity algorithm HMAC_SHA1_96[_0] 254s | appending IKE DH algorithm DH19[_0] 254s | appending IKE DH algorithm DH20[_0] 254s | appending IKE DH algorithm DH21[_0] 254s | appending IKE DH algorithm DH31[_0] 254s | appending IKE DH algorithm MODP4096[_0] 254s | appending IKE DH algorithm MODP3072[_0] 254s | appending IKE DH algorithm MODP2048[_0] 254s | appending IKE DH algorithm MODP8192[_0] 254s | parsing '3des-sha1' for IKE 254s | proposal: '3des-sha1' 254s | token: '' '' "3des" '-' 254s | token: '' "3des" '-' "sha1" '' 254s | token: '-' "sha1" '' '' 254s | appending IKE encryption algorithm 3DES_CBC[_0] 254s | parsing prf: 254s | appending IKE PRF algorithm HMAC_SHA1[_0] 254s | token: '' '' '' 254s | - succeeded, advancing tokens 254s | appending IKE integrity algorithm HMAC_SHA1_96[_0] 254s | appending IKE DH algorithm DH19[_0] 254s | appending IKE DH algorithm DH20[_0] 254s | appending IKE DH algorithm DH21[_0] 254s | appending IKE DH algorithm DH31[_0] 254s | appending IKE DH algorithm MODP4096[_0] 254s | appending IKE DH algorithm MODP3072[_0] 254s | appending IKE DH algorithm MODP2048[_0] 254s | appending IKE DH algorithm MODP8192[_0] 254s | parsing '3des-sha1;modp1536' for IKE 254s | proposal: '3des-sha1;modp1536' 254s | token: '' '' "3des" '-' 254s | token: '' "3des" '-' "sha1" ';' 254s | token: '-' "sha1" ';' "modp1536" '' 254s | appending IKE encryption algorithm 3DES_CBC[_0] 254s | parsing prf: 254s | appending IKE PRF algorithm HMAC_SHA1[_0] 254s | token: ';' "modp1536" '' '' 254s | - succeeded, advancing tokens 254s | parsing dh: 254s | appending IKE DH algorithm MODP1536[_0] 254s | token: '' '' '' 254s | appending IKE integrity algorithm HMAC_SHA1_96[_0] 254s | parsing '3des;dh21' for IKE 254s | proposal: '3des;dh21' 254s | token: '' '' "3des" ';' 254s | token: '' "3des" ';' "dh21" '' 254s | token: ';' "dh21" '' '' 254s | appending IKE encryption algorithm 3DES_CBC[_0] 254s | parsing dh: 254s | appending IKE DH algorithm DH21[_0] 254s | token: '' '' '' 254s | appending IKE PRF algorithm HMAC_SHA2_512[_0] 254s | appending IKE PRF algorithm HMAC_SHA2_256[_0] 254s | appending IKE integrity algorithm HMAC_SHA2_512_256[_0] 254s | appending IKE integrity algorithm HMAC_SHA2_256_128[_0] 254s | parsing '3des-sha1;dh21' for IKE 254s | proposal: '3des-sha1;dh21' 254s | token: '' '' "3des" '-' 254s | token: '' "3des" '-' "sha1" ';' 254s | token: '-' "sha1" ';' "dh21" '' 254s | appending IKE encryption algorithm 3DES_CBC[_0] 254s | parsing prf: 254s | appending IKE PRF algorithm HMAC_SHA1[_0] 254s | token: ';' "dh21" '' '' 254s | - succeeded, advancing tokens 254s | parsing dh: 254s | appending IKE DH algorithm DH21[_0] 254s | token: '' '' '' 254s | appending IKE integrity algorithm HMAC_SHA1_96[_0] 254s | parsing '3des-sha1-ecp_521' for IKE 254s | proposal: '3des-sha1-ecp_521' 254s | token: '' '' "3des" '-' 254s | token: '' "3des" '-' "sha1" '-' 254s | token: '-' "sha1" '-' "ecp_521" '' 254s | appending IKE encryption algorithm 3DES_CBC[_0] 254s | parsing prf: 254s | appending IKE PRF algorithm HMAC_SHA1[_0] 254s | token: '-' "ecp_521" '' '' 254s | - succeeded, advancing tokens 254s | parsing dh: 254s | appending IKE DH algorithm DH21[_0] 254s | token: '' '' '' 254s | appending IKE integrity algorithm HMAC_SHA1_96[_0] 254s | parsing '3des+aes' for IKE 254s | proposal: '3des+aes' 254s | token: '' '' "3des" '+' 254s | token: '' "3des" '+' "aes" '' 254s | token: '+' "aes" '' '' 254s | appending IKE encryption algorithm 3DES_CBC[_0] 254s | token: '' '' '' 254s | appending IKE encryption algorithm AES_CBC[_0] 254s | appending IKE PRF algorithm HMAC_SHA2_512[_0] 254s | appending IKE PRF algorithm HMAC_SHA2_256[_0] 254s | appending IKE integrity algorithm HMAC_SHA2_512_256[_0] 254s | appending IKE integrity algorithm HMAC_SHA2_256_128[_0] 254s | appending IKE DH algorithm DH19[_0] 254s | appending IKE DH algorithm DH20[_0] 254s | appending IKE DH algorithm DH21[_0] 254s | appending IKE DH algorithm DH31[_0] 254s | appending IKE DH algorithm MODP4096[_0] 254s | appending IKE DH algorithm MODP3072[_0] 254s | appending IKE DH algorithm MODP2048[_0] 254s | appending IKE DH algorithm MODP8192[_0] 254s | parsing 'aes;none' for IKE 254s | proposal: 'aes;none' 254s | token: '' '' "aes" ';' 254s | token: '' "aes" ';' "none" '' 254s | token: ';' "none" '' '' 254s | appending IKE encryption algorithm AES_CBC[_0] 254s | parsing dh: 254s | appending IKE DH algorithm NONE[_0] 254s | token: '' '' '' 254s | appending IKE PRF algorithm HMAC_SHA2_512[_0] 254s | appending IKE PRF algorithm HMAC_SHA2_256[_0] 254s | appending IKE integrity algorithm HMAC_SHA2_512_256[_0] 254s | appending IKE integrity algorithm HMAC_SHA2_256_128[_0] 254s | parsing 'id2' for IKE 254s | proposal: 'id2' 254s | token: '' '' "id2" '' 254s | token: '' "id2" '' '' 254s | ike_alg_byname() failed: IKE encryption algorithm 'id2' is not recognized 254s | ike_alg_byname() failed: IKE encryption algorithm 'id2' is not recognized 254s | parsing '3des-id2' for IKE 254s | proposal: '3des-id2' 254s | token: '' '' "3des" '-' 254s | token: '' "3des" '-' "id2" '' 254s | token: '-' "id2" '' '' 254s | appending IKE encryption algorithm 3DES_CBC[_0] 254s | parsing prf: 254s | ike_alg_byname() failed: IKE PRF algorithm 'id2' is not recognized 254s | lookup for PRF algorithm 'id2' failed 254s | - failed, saving error 'IKE PRF algorithm 'id2' is not recognized' and tossing result 254s | parsing integ: 254s | ike_alg_byname() failed: IKE integrity algorithm 'id2' is not recognized 254s | lookup for integrity algorithm 'id2' failed 254s | - and - failed, returning earlier PRF error 'IKE PRF algorithm 'id2' is not recognized' and discarding INTEG error 'IKE integrity algorithm 'id2' is not recognized') 254s | parsing 'aes_ccm' for IKE 254s | proposal: 'aes_ccm' 254s | token: '' '' "aes_ccm" '' 254s | token: '' "aes_ccm" '' '' 254s | alg_byname_ok() failed: IKE encryption algorithm 'aes_ccm' is not supported 254s | parsing 'aes-sha1-sha2-ecp_521' for IKE 254s | proposal: 'aes-sha1-sha2-ecp_521' 254s | token: '' '' "aes" '-' 254s | token: '' "aes" '-' "sha1" '-' 254s | token: '-' "sha1" '-' "sha2" '-' 254s | appending IKE encryption algorithm AES_CBC[_0] 254s | parsing prf: 254s | appending IKE PRF algorithm HMAC_SHA1[_0] 254s | token: '-' "sha2" '-' "ecp_521" '' 254s | - succeeded, advancing tokens 254s | parsing dh: 254s | ike_alg_byname() failed: IKE DH algorithm 'sha2' is not recognized 254s | lookup for DH algorithm 'sha2' failed 254s | ... failed 'IKE DH algorithm 'sha2' is not recognized' 254s | parsing 'aes-sha2-sha2;ecp_521' for IKE 254s | proposal: 'aes-sha2-sha2;ecp_521' 254s | token: '' '' "aes" '-' 254s | token: '' "aes" '-' "sha2" '-' 254s | token: '-' "sha2" '-' "sha2" ';' 254s | appending IKE encryption algorithm AES_CBC[_0] 254s | parsing prf: 254s | appending IKE PRF algorithm HMAC_SHA2_256[_0] 254s | token: '-' "sha2" ';' "ecp_521" '' 254s | - succeeded, advancing tokens 254s | parsing dh: 254s | ike_alg_byname() failed: IKE DH algorithm 'sha2' is not recognized 254s | lookup for DH algorithm 'sha2' failed 254s | ... failed 'IKE DH algorithm 'sha2' is not recognized' 254s | parsing 'aes-sha1_96-sha2-ecp_521' for IKE 254s | proposal: 'aes-sha1_96-sha2-ecp_521' 254s | token: '' '' "aes" '-' 254s | token: '' "aes" '-' "sha1_96" '-' 254s | token: '-' "sha1_96" '-' "sha2" '-' 254s | appending IKE encryption algorithm AES_CBC[_0] 254s | parsing prf: 254s | ike_alg_byname() failed: IKE PRF algorithm 'sha1_96' is not recognized 254s | lookup for PRF algorithm 'sha1_96' failed 254s | - failed, saving error 'IKE PRF algorithm 'sha1_96' is not recognized' and tossing result 254s | parsing integ: 254s | appending IKE integrity algorithm HMAC_SHA1_96[_0] 254s | token: '-' "sha2" '-' "ecp_521" '' 254s | parsing prf: 254s | appending IKE PRF algorithm HMAC_SHA2_256[_0] 254s | token: '-' "ecp_521" '' '' 254s | parsing dh: 254s | appending IKE DH algorithm DH21[_0] 254s | token: '' '' '' 254s | parsing 'aes-sha1_96-sha2;ecp_521' for IKE 254s | proposal: 'aes-sha1_96-sha2;ecp_521' 254s | token: '' '' "aes" '-' 254s | token: '' "aes" '-' "sha1_96" '-' 254s | token: '-' "sha1_96" '-' "sha2" ';' 254s | appending IKE encryption algorithm AES_CBC[_0] 254s | parsing prf: 254s | ike_alg_byname() failed: IKE PRF algorithm 'sha1_96' is not recognized 254s | lookup for PRF algorithm 'sha1_96' failed 254s | - failed, saving error 'IKE PRF algorithm 'sha1_96' is not recognized' and tossing result 254s | parsing integ: 254s | appending IKE integrity algorithm HMAC_SHA1_96[_0] 254s | token: '-' "sha2" ';' "ecp_521" '' 254s | parsing prf: 254s | appending IKE PRF algorithm HMAC_SHA2_256[_0] 254s | token: ';' "ecp_521" '' '' 254s | parsing dh: 254s | appending IKE DH algorithm DH21[_0] 254s | token: '' '' '' 254s | parsing 'aes+aes-sha1+sha1-modp8192+modp8192' for IKE 254s | proposal: 'aes+aes-sha1+sha1-modp8192+modp8192' 254s | token: '' '' "aes" '+' 254s | token: '' "aes" '+' "aes" '-' 254s | token: '+' "aes" '-' "sha1" '+' 254s | appending IKE encryption algorithm AES_CBC[_0] 254s | token: '-' "sha1" '+' "sha1" '-' 254s | appending IKE encryption algorithm AES_CBC[_0] 254s ipsec algparse: discarding duplicate IKE encryption algorithm AES_CBC 254s | parsing prf: 254s | appending IKE PRF algorithm HMAC_SHA1[_0] 254s | token: '+' "sha1" '-' "modp8192" '+' 254s | appending IKE PRF algorithm HMAC_SHA1[_0] 254s | token: '-' "modp8192" '+' "modp8192" '' 254s ipsec algparse: discarding duplicate IKE PRF algorithm HMAC_SHA1 254s | - succeeded, advancing tokens 254s | parsing dh: 254s | appending IKE DH algorithm MODP8192[_0] 254s | token: '+' "modp8192" '' '' 254s | appending IKE DH algorithm MODP8192[_0] 254s | token: '' '' '' 254s ipsec algparse: discarding duplicate IKE DH algorithm MODP8192 254s | appending IKE integrity algorithm HMAC_SHA1_96[_0] 254s | parsing '3des+aes+aes-sha2+sha1+sha1-modp4096+modp8192+modp8192' for IKE 254s | proposal: '3des+aes+aes-sha2+sha1+sha1-modp4096+modp8192+modp8192' 254s | token: '' '' "3des" '+' 254s | token: '' "3des" '+' "aes" '+' 254s | token: '+' "aes" '+' "aes" '-' 254s | appending IKE encryption algorithm 3DES_CBC[_0] 254s | token: '+' "aes" '-' "sha2" '+' 254s | appending IKE encryption algorithm AES_CBC[_0] 254s | token: '-' "sha2" '+' "sha1" '+' 254s | appending IKE encryption algorithm AES_CBC[_0] 254s ipsec algparse: discarding duplicate IKE encryption algorithm AES_CBC 254s | parsing prf: 254s | appending IKE PRF algorithm HMAC_SHA2_256[_0] 254s | token: '+' "sha1" '+' "sha1" '-' 254s | appending IKE PRF algorithm HMAC_SHA1[_0] 254s | token: '+' "sha1" '-' "modp4096" '+' 254s | appending IKE PRF algorithm HMAC_SHA1[_0] 254s | token: '-' "modp4096" '+' "modp8192" '+' 254s ipsec algparse: discarding duplicate IKE PRF algorithm HMAC_SHA1 254s | - succeeded, advancing tokens 254s | parsing dh: 254s | appending IKE DH algorithm MODP4096[_0] 254s | token: '+' "modp8192" '+' "modp8192" '' 254s | appending IKE DH algorithm MODP8192[_0] 254s | token: '+' "modp8192" '' '' 254s | appending IKE DH algorithm MODP8192[_0] 254s | token: '' '' '' 254s ipsec algparse: discarding duplicate IKE DH algorithm MODP8192 254s | appending IKE integrity algorithm HMAC_SHA2_256_128[_0] 254s | appending IKE integrity algorithm HMAC_SHA1_96[_0] 254s | parsing 'aes+3des+aes-sha1+sha2+sha1-modp8192+modp4096+modp8192' for IKE 254s | proposal: 'aes+3des+aes-sha1+sha2+sha1-modp8192+modp4096+modp8192' 254s | token: '' '' "aes" '+' 254s | token: '' "aes" '+' "3des" '+' 254s | token: '+' "3des" '+' "aes" '-' 254s | appending IKE encryption algorithm AES_CBC[_0] 254s | token: '+' "aes" '-' "sha1" '+' 254s | appending IKE encryption algorithm 3DES_CBC[_0] 254s | token: '-' "sha1" '+' "sha2" '+' 254s | appending IKE encryption algorithm AES_CBC[_0] 254s ipsec algparse: discarding duplicate IKE encryption algorithm AES_CBC 254s | parsing prf: 254s | appending IKE PRF algorithm HMAC_SHA1[_0] 254s | token: '+' "sha2" '+' "sha1" '-' 254s | appending IKE PRF algorithm HMAC_SHA2_256[_0] 254s | token: '+' "sha1" '-' "modp8192" '+' 254s | appending IKE PRF algorithm HMAC_SHA1[_0] 254s | token: '-' "modp8192" '+' "modp4096" '+' 254s ipsec algparse: discarding duplicate IKE PRF algorithm HMAC_SHA1 254s | - succeeded, advancing tokens 254s | parsing dh: 254s | appending IKE DH algorithm MODP8192[_0] 254s | token: '+' "modp4096" '+' "modp8192" '' 254s | appending IKE DH algorithm MODP4096[_0] 254s | token: '+' "modp8192" '' '' 254s | appending IKE DH algorithm MODP8192[_0] 254s | token: '' '' '' 254s ipsec algparse: discarding duplicate IKE DH algorithm MODP8192 254s | appending IKE integrity algorithm HMAC_SHA1_96[_0] 254s | appending IKE integrity algorithm HMAC_SHA2_256_128[_0] 254s | parsing 'aes+aes+3des-sha1+sha1+sha2-modp8192+modp8192+modp4096' for IKE 254s | proposal: 'aes+aes+3des-sha1+sha1+sha2-modp8192+modp8192+modp4096' 254s | token: '' '' "aes" '+' 254s | token: '' "aes" '+' "aes" '+' 254s | token: '+' "aes" '+' "3des" '-' 254s | appending IKE encryption algorithm AES_CBC[_0] 254s | token: '+' "3des" '-' "sha1" '+' 254s | appending IKE encryption algorithm AES_CBC[_0] 254s | token: '-' "sha1" '+' "sha1" '+' 254s | appending IKE encryption algorithm 3DES_CBC[_0] 254s ipsec algparse: discarding duplicate IKE encryption algorithm AES_CBC 254s | parsing prf: 254s | appending IKE PRF algorithm HMAC_SHA1[_0] 254s | token: '+' "sha1" '+' "sha2" '-' 254s | appending IKE PRF algorithm HMAC_SHA1[_0] 254s | token: '+' "sha2" '-' "modp8192" '+' 254s | appending IKE PRF algorithm HMAC_SHA2_256[_0] 254s | token: '-' "modp8192" '+' "modp8192" '+' 254s ipsec algparse: discarding duplicate IKE PRF algorithm HMAC_SHA1 254s | - succeeded, advancing tokens 254s | parsing dh: 254s | appending IKE DH algorithm MODP8192[_0] 254s | token: '+' "modp8192" '+' "modp4096" '' 254s | appending IKE DH algorithm MODP8192[_0] 254s | token: '+' "modp4096" '' '' 254s | appending IKE DH algorithm MODP4096[_0] 254s | token: '' '' '' 254s ipsec algparse: discarding duplicate IKE DH algorithm MODP8192 254s | appending IKE integrity algorithm HMAC_SHA1_96[_0] 254s | appending IKE integrity algorithm HMAC_SHA2_256_128[_0] 254s | parsing 'aes+aes128+aes256' for IKE 254s | proposal: 'aes+aes128+aes256' 254s | token: '' '' "aes" '+' 254s | token: '' "aes" '+' "aes128" '+' 254s | token: '+' "aes128" '+' "aes256" '' 254s | appending IKE encryption algorithm AES_CBC[_0] 254s | ike_alg_byname() failed: IKE encryption algorithm 'aes128' is not recognized 254s | token: '+' "aes256" '' '' 254s | appending IKE encryption algorithm AES_CBC[_128] 254s | ike_alg_byname() failed: IKE encryption algorithm 'aes256' is not recognized 254s | token: '' '' '' 254s | appending IKE encryption algorithm AES_CBC[_256] 254s ipsec algparse: discarding duplicate IKE encryption algorithm AES_CBC_128 254s ipsec algparse: discarding duplicate IKE encryption algorithm AES_CBC_256 254s | appending IKE PRF algorithm HMAC_SHA2_512[_0] 254s | appending IKE PRF algorithm HMAC_SHA2_256[_0] 254s | appending IKE integrity algorithm HMAC_SHA2_512_256[_0] 254s | appending IKE integrity algorithm HMAC_SHA2_256_128[_0] 254s | appending IKE DH algorithm DH19[_0] 254s | appending IKE DH algorithm DH20[_0] 254s | appending IKE DH algorithm DH21[_0] 254s | appending IKE DH algorithm DH31[_0] 254s | appending IKE DH algorithm MODP4096[_0] 254s | appending IKE DH algorithm MODP3072[_0] 254s | appending IKE DH algorithm MODP2048[_0] 254s | appending IKE DH algorithm MODP8192[_0] 254s | parsing 'aes128+aes+aes256' for IKE 254s | proposal: 'aes128+aes+aes256' 254s | token: '' '' "aes128" '+' 254s | token: '' "aes128" '+' "aes" '+' 254s | ike_alg_byname() failed: IKE encryption algorithm 'aes128' is not recognized 254s | token: '+' "aes" '+' "aes256" '' 254s | appending IKE encryption algorithm AES_CBC[_128] 254s | token: '+' "aes256" '' '' 254s | appending IKE encryption algorithm AES_CBC[_0] 254s | ike_alg_byname() failed: IKE encryption algorithm 'aes256' is not recognized 254s | token: '' '' '' 254s | appending IKE encryption algorithm AES_CBC[_256] 254s ipsec algparse: discarding duplicate IKE encryption algorithm AES_CBC_256 254s | appending IKE PRF algorithm HMAC_SHA2_512[_0] 254s | appending IKE PRF algorithm HMAC_SHA2_256[_0] 254s | appending IKE integrity algorithm HMAC_SHA2_512_256[_0] 254s | appending IKE integrity algorithm HMAC_SHA2_256_128[_0] 254s | appending IKE DH algorithm DH19[_0] 254s | appending IKE DH algorithm DH20[_0] 254s | appending IKE DH algorithm DH21[_0] 254s | appending IKE DH algorithm DH31[_0] 254s | appending IKE DH algorithm MODP4096[_0] 254s | appending IKE DH algorithm MODP3072[_0] 254s | appending IKE DH algorithm MODP2048[_0] 254s | appending IKE DH algorithm MODP8192[_0] 254s | parsing 'aes128+aes256+aes' for IKE 254s | proposal: 'aes128+aes256+aes' 254s | token: '' '' "aes128" '+' 254s | token: '' "aes128" '+' "aes256" '+' 254s | ike_alg_byname() failed: IKE encryption algorithm 'aes128' is not recognized 254s | token: '+' "aes256" '+' "aes" '' 254s | appending IKE encryption algorithm AES_CBC[_128] 254s | ike_alg_byname() failed: IKE encryption algorithm 'aes256' is not recognized 254s | token: '+' "aes" '' '' 254s | appending IKE encryption algorithm AES_CBC[_256] 254s | token: '' '' '' 254s | appending IKE encryption algorithm AES_CBC[_0] 254s | appending IKE PRF algorithm HMAC_SHA2_512[_0] 254s | appending IKE PRF algorithm HMAC_SHA2_256[_0] 254s | appending IKE integrity algorithm HMAC_SHA2_512_256[_0] 254s | appending IKE integrity algorithm HMAC_SHA2_256_128[_0] 254s | appending IKE DH algorithm DH19[_0] 254s | appending IKE DH algorithm DH20[_0] 254s | appending IKE DH algorithm DH21[_0] 254s | appending IKE DH algorithm DH31[_0] 254s | appending IKE DH algorithm MODP4096[_0] 254s | appending IKE DH algorithm MODP3072[_0] 254s | appending IKE DH algorithm MODP2048[_0] 254s | appending IKE DH algorithm MODP8192[_0] 254s | parsing 'aes-sha1-modp8192,aes-sha1-modp8192,aes-sha1-modp8192' for IKE 254s | proposal: 'aes-sha1-modp8192' 254s | token: '' '' "aes" '-' 254s | token: '' "aes" '-' "sha1" '-' 254s | token: '-' "sha1" '-' "modp8192" '' 254s | appending IKE encryption algorithm AES_CBC[_0] 254s | parsing prf: 254s | appending IKE PRF algorithm HMAC_SHA1[_0] 254s | token: '-' "modp8192" '' '' 254s | - succeeded, advancing tokens 254s | parsing dh: 254s | appending IKE DH algorithm MODP8192[_0] 254s | token: '' '' '' 254s | appending IKE integrity algorithm HMAC_SHA1_96[_0] 254s | proposal: 'aes-sha1-modp8192' 254s | token: '' '' "aes" '-' 254s | token: '' "aes" '-' "sha1" '-' 254s | token: '-' "sha1" '-' "modp8192" '' 254s | appending IKE encryption algorithm AES_CBC[_0] 254s | parsing prf: 254s | appending IKE PRF algorithm HMAC_SHA1[_0] 254s | token: '-' "modp8192" '' '' 254s | - succeeded, advancing tokens 254s | parsing dh: 254s | appending IKE DH algorithm MODP8192[_0] 254s | token: '' '' '' 254s | appending IKE integrity algorithm HMAC_SHA1_96[_0] 254s | proposal: 'aes-sha1-modp8192' 254s | token: '' '' "aes" '-' 254s | token: '' "aes" '-' "sha1" '-' 254s | token: '-' "sha1" '-' "modp8192" '' 254s | appending IKE encryption algorithm AES_CBC[_0] 254s | parsing prf: 254s | appending IKE PRF algorithm HMAC_SHA1[_0] 254s | token: '-' "modp8192" '' '' 254s | - succeeded, advancing tokens 254s | parsing dh: 254s | appending IKE DH algorithm MODP8192[_0] 254s | token: '' '' '' 254s | appending IKE integrity algorithm HMAC_SHA1_96[_0] 254s | parsing 'aes-sha1-modp8192,aes-sha2-modp8192,aes-sha1-modp8192' for IKE 254s | proposal: 'aes-sha1-modp8192' 254s | token: '' '' "aes" '-' 254s | token: '' "aes" '-' "sha1" '-' 254s | token: '-' "sha1" '-' "modp8192" '' 254s | appending IKE encryption algorithm AES_CBC[_0] 254s | parsing prf: 254s | appending IKE PRF algorithm HMAC_SHA1[_0] 254s | token: '-' "modp8192" '' '' 254s | - succeeded, advancing tokens 254s | parsing dh: 254s | appending IKE DH algorithm MODP8192[_0] 254s | token: '' '' '' 254s | appending IKE integrity algorithm HMAC_SHA1_96[_0] 254s | proposal: 'aes-sha2-modp8192' 254s | token: '' '' "aes" '-' 254s | token: '' "aes" '-' "sha2" '-' 254s | token: '-' "sha2" '-' "modp8192" '' 254s | appending IKE encryption algorithm AES_CBC[_0] 254s | parsing prf: 254s | appending IKE PRF algorithm HMAC_SHA2_256[_0] 254s | token: '-' "modp8192" '' '' 254s | - succeeded, advancing tokens 254s | parsing dh: 254s | appending IKE DH algorithm MODP8192[_0] 254s | token: '' '' '' 254s | appending IKE integrity algorithm HMAC_SHA2_256_128[_0] 254s | proposal: 'aes-sha1-modp8192' 254s | token: '' '' "aes" '-' 254s | token: '' "aes" '-' "sha1" '-' 254s | token: '-' "sha1" '-' "modp8192" '' 254s | appending IKE encryption algorithm AES_CBC[_0] 254s | parsing prf: 254s | appending IKE PRF algorithm HMAC_SHA1[_0] 254s | token: '-' "modp8192" '' '' 254s | - succeeded, advancing tokens 254s | parsing dh: 254s | appending IKE DH algorithm MODP8192[_0] 254s | token: '' '' '' 254s | appending IKE integrity algorithm HMAC_SHA1_96[_0] 254s | parsing 'aes_gcm' for IKE 254s | proposal: 'aes_gcm' 254s | token: '' '' "aes_gcm" '' 254s | token: '' "aes_gcm" '' '' 254s | token: '' '' '' 254s | appending IKE encryption algorithm AES_GCM_16[_0] 254s | appending IKE PRF algorithm HMAC_SHA2_512[_0] 254s | appending IKE PRF algorithm HMAC_SHA2_256[_0] 254s | appending IKE integrity algorithm NONE[_0] 254s | appending IKE DH algorithm DH19[_0] 254s | appending IKE DH algorithm DH20[_0] 254s | appending IKE DH algorithm DH21[_0] 254s | appending IKE DH algorithm DH31[_0] 254s | appending IKE DH algorithm MODP4096[_0] 254s | appending IKE DH algorithm MODP3072[_0] 254s | appending IKE DH algorithm MODP2048[_0] 254s | appending IKE DH algorithm MODP8192[_0] 254s | parsing 'aes_gcm-sha2' for IKE 254s | proposal: 'aes_gcm-sha2' 254s | token: '' '' "aes_gcm" '-' 254s | token: '' "aes_gcm" '-' "sha2" '' 254s | token: '-' "sha2" '' '' 254s | appending IKE encryption algorithm AES_GCM_16[_0] 254s | parsing prf: 254s | appending IKE PRF algorithm HMAC_SHA2_256[_0] 254s | token: '' '' '' 254s | - succeeded, advancing tokens 254s | appending IKE integrity algorithm NONE[_0] 254s | appending IKE DH algorithm DH19[_0] 254s | appending IKE DH algorithm DH20[_0] 254s | appending IKE DH algorithm DH21[_0] 254s | appending IKE DH algorithm DH31[_0] 254s | appending IKE DH algorithm MODP4096[_0] 254s | appending IKE DH algorithm MODP3072[_0] 254s | appending IKE DH algorithm MODP2048[_0] 254s | appending IKE DH algorithm MODP8192[_0] 254s | parsing 'aes_gcm-sha2-modp2048' for IKE 254s | proposal: 'aes_gcm-sha2-modp2048' 254s | token: '' '' "aes_gcm" '-' 254s | token: '' "aes_gcm" '-' "sha2" '-' 254s | token: '-' "sha2" '-' "modp2048" '' 254s | appending IKE encryption algorithm AES_GCM_16[_0] 254s | parsing prf: 254s | appending IKE PRF algorithm HMAC_SHA2_256[_0] 254s | token: '-' "modp2048" '' '' 254s | - succeeded, advancing tokens 254s | parsing dh: 254s | appending IKE DH algorithm MODP2048[_0] 254s | token: '' '' '' 254s | appending IKE integrity algorithm NONE[_0] 254s | parsing 'aes_gcm-sha2;modp2048' for IKE 254s | proposal: 'aes_gcm-sha2;modp2048' 254s | token: '' '' "aes_gcm" '-' 254s | token: '' "aes_gcm" '-' "sha2" ';' 254s | token: '-' "sha2" ';' "modp2048" '' 254s | appending IKE encryption algorithm AES_GCM_16[_0] 254s | parsing prf: 254s | appending IKE PRF algorithm HMAC_SHA2_256[_0] 254s | token: ';' "modp2048" '' '' 254s | - succeeded, advancing tokens 254s | parsing dh: 254s | appending IKE DH algorithm MODP2048[_0] 254s | token: '' '' '' 254s | appending IKE integrity algorithm NONE[_0] 254s | parsing 'aes_gcm-modp2048' for IKE 254s | proposal: 'aes_gcm-modp2048' 254s | token: '' '' "aes_gcm" '-' 254s | token: '' "aes_gcm" '-' "modp2048" '' 254s | token: '-' "modp2048" '' '' 254s | appending IKE encryption algorithm AES_GCM_16[_0] 254s | parsing prf: 254s ERROR: IKE PRF algorithm 'modp2048' is not recognized 254s algparse -v2 'ike=aes_gcm;modp2048' (expect SUCCESS) 254s | ike_alg_byname() failed: IKE PRF algorithm 'modp2048' is not recognized 254s | lookup for PRF algorithm 'modp2048' failed 254s | - failed, saving error 'IKE PRF algorithm 'modp2048' is not recognized' and tossing result 254s | parsing integ: 254s | ike_alg_byname() failed: IKE integrity algorithm 'modp2048' is not recognized 254s | lookup for integrity algorithm 'modp2048' failed 254s | - and - failed, returning earlier PRF error 'IKE PRF algorithm 'modp2048' is not recognized' and discarding INTEG error 'IKE integrity algorithm 'modp2048' is not recognized') 254s | parsing 'aes_gcm;modp2048' for IKE 254s | proposal: 'aes_gcm;modp2048' 254s | token: '' '' "aes_gcm" ';' 254s | token: '' "aes_gcm" ';' "modp2048" '' 254s | token: ';' "modp2048" '' '' 254s | appending IKE encryption algorithm AES_GCM_16[_0] 254s | parsing dh: 254s | appending IKE DH algorithm MODP2048[_0] 254s | token: '' '' '' 254s AES_GCM_16-HMAC_SHA2_512+HMAC_SHA2_256-MODP2048 254s algparse -v2 'ike=aes_gcm-none' (expect SUCCESS) 254s AES_GCM_16-HMAC_SHA2_512+HMAC_SHA2_256-DH19+DH20+DH21+DH31+MODP4096+MODP3072+MODP2048+MODP8192 254s algparse -v2 'ike=aes_gcm-none-sha2' (expect SUCCESS) 254s | appending IKE PRF algorithm HMAC_SHA2_512[_0] 254s | appending IKE PRF algorithm HMAC_SHA2_256[_0] 254s | appending IKE integrity algorithm NONE[_0] 254s | parsing 'aes_gcm-none' for IKE 254s | proposal: 'aes_gcm-none' 254s | token: '' '' "aes_gcm" '-' 254s | token: '' "aes_gcm" '-' "none" '' 254s | token: '-' "none" '' '' 254s | appending IKE encryption algorithm AES_GCM_16[_0] 254s | parsing prf: 254s | ike_alg_byname() failed: IKE PRF algorithm 'none' is not recognized 254s | lookup for PRF algorithm 'none' failed 254s | - failed, saving error 'IKE PRF algorithm 'none' is not recognized' and tossing result 254s | parsing integ: 254s | appending IKE integrity algorithm NONE[_0] 254s | token: '' '' '' 254s | appending IKE PRF algorithm HMAC_SHA2_512[_0] 254s | appending IKE PRF algorithm HMAC_SHA2_256[_0] 254s | appending IKE DH algorithm DH19[_0] 254s | appending IKE DH algorithm DH20[_0] 254s | appending IKE DH algorithm DH21[_0] 254s | appending IKE DH algorithm DH31[_0] 254s | appending IKE DH algorithm MODP4096[_0] 254s | appending IKE DH algorithm MODP3072[_0] 254s | appending IKE DH algorithm MODP2048[_0] 254s | appending IKE DH algorithm MODP8192[_0] 254s | parsing 'aes_gcm-none-sha2' for IKE 254s | proposal: 'aes_gcm-none-sha2' 254s | token: '' '' "aes_gcm" '-' 254s | token: '' "aes_gcm" '-' "none" '-' 254s | token: '-' "none" '-' "sha2" '' 254s | appending IKE encryption algorithm AES_GCM_16[_0] 254s | parsing prf: 254s | ike_alg_byname() failed: IKE PRF algorithm 'none' is not recognized 254s | lookup for PRF algorithm 'none' failed 254s | - failed, saving error 'IKE PRF algorithm 'none' is not recognized' and tossing result 254s | parsing integ: 254s | appending IKE integrity algorithm NONE[_0] 254s | token: '-' "sha2" '' '' 254s | parsing prf: 254s | appending IKE PRF algorithm HMAC_SHA2_256[_0] 254s | token: '' '' '' 254s | appending IKE DH algorithm DH19[_0] 254s | appending IKE DH algorithm DH20[_0] 254s | appending IKE DH algorithm DH21[_0] 254s | appending IKE DH algorithm DH31[_0] 254s | appending IKE DH algorithm MODP4096[_0] 254s | appending IKE DH algorithm MODP3072[_0] 254s | appending IKE DH algorithm MODP2048[_0] 254s AES_GCM_16-HMAC_SHA2_256-DH19+DH20+DH21+DH31+MODP4096+MODP3072+MODP2048+MODP8192 254s algparse -v2 'ike=aes_gcm-none-sha2-modp2048' (expect SUCCESS) 254s AES_GCM_16-HMAC_SHA2_256-MODP2048 254s algparse -v2 'ike=aes_gcm-none-sha2;modp2048' (expect SUCCESS) 254s AES_GCM_16-HMAC_SHA2_256-MODP2048 254s algparse -v2 'ike=aes_gcm-none-modp2048' (expect ERROR) 254s ERROR: IKE PRF algorithm 'modp2048' is not recognized 254s algparse -v2 'ike=aes_gcm-none;modp2048' (expect SUCCESS) 254s AES_GCM_16-HMAC_SHA2_512+HMAC_SHA2_256-MODP2048 254s algparse -v2 'ike=aes_gcm-sha1-none-modp2048' (expect ERROR) 254s ERROR: IKE proposal contains unexpected 'modp2048' 254s algparse -v2 'ike=aes_gcm-sha1-none;modp2048' (expect ERROR) 254s ERROR: IKE proposal contains unexpected 'modp2048' 254s algparse -v2 'ike=aes+aes_gcm' (expect ERROR) 254s ERROR: AEAD and non-AEAD IKE encryption algorithm cannot be combined 254s algparse -v2 'ike=,' (expect ERROR) 254s ERROR: IKE encryption algorithm is empty 254s algparse -v2 'ike=aes,' (expect ERROR) 254s ERROR: IKE encryption algorithm is empty 254s algparse -v2 'ike=aes,,aes' (expect ERROR) 254s ERROR: IKE encryption algorithm is empty 254s algparse -v2 'ike=,aes' (expect ERROR) 254s ERROR: IKE encryption algorithm is empty 254s algparse -v2 'ike=-' (expect ERROR) 254s ERROR: IKE encryption algorithm is empty 254s algparse -v2 'ike=+' (expect ERROR) 254s ERROR: IKE encryption algorithm is empty 254s algparse -v2 'ike=;' (expect ERROR) 254s ERROR: IKE encryption algorithm is empty 254s algparse -v2 'ike=aes-' (expect ERROR) 254s ERROR: IKE PRF algorithm is empty 254s algparse -v2 'ike=aes+' (expect ERROR) 254s ERROR: IKE encryption algorithm is empty 254s algparse -v2 'ike=aes;' (expect ERROR) 254s ERROR: IKE DH algorithm is empty 254s algparse -v2 'ike=-aes' (expect ERROR) 254s ERROR: IKE encryption algorithm is empty 254s algparse -v2 'ike=+aes' (expect ERROR) 254s ERROR: IKE encryption algorithm is empty 254s algparse -v2 'ike=;aes' (expect ERROR) 254s ERROR: IKE encryption algorithm is empty 254s algparse -v2 'ike=aes+-' (expect ERROR) 254s ERROR: IKE encryption algorithm is empty 254s algparse -v2 'ike=aes+;' (expect ERROR) 254s ERROR: IKE encryption algorithm is empty 254s algparse -v2 'ike=aes++' (expect ERROR) 254s ERROR: IKE encryption algorithm is empty 254s testing -ta 254s | appending IKE DH algorithm MODP8192[_0] 254s | parsing 'aes_gcm-none-sha2-modp2048' for IKE 254s | proposal: 'aes_gcm-none-sha2-modp2048' 254s | token: '' '' "aes_gcm" '-' 254s | token: '' "aes_gcm" '-' "none" '-' 254s | token: '-' "none" '-' "sha2" '-' 254s | appending IKE encryption algorithm AES_GCM_16[_0] 254s | parsing prf: 254s | ike_alg_byname() failed: IKE PRF algorithm 'none' is not recognized 254s | lookup for PRF algorithm 'none' failed 254s | - failed, saving error 'IKE PRF algorithm 'none' is not recognized' and tossing result 254s | parsing integ: 254s | appending IKE integrity algorithm NONE[_0] 254s | token: '-' "sha2" '-' "modp2048" '' 254s | parsing prf: 254s | appending IKE PRF algorithm HMAC_SHA2_256[_0] 254s | token: '-' "modp2048" '' '' 254s | parsing dh: 254s | appending IKE DH algorithm MODP2048[_0] 254s | token: '' '' '' 254s | parsing 'aes_gcm-none-sha2;modp2048' for IKE 254s | proposal: 'aes_gcm-none-sha2;modp2048' 254s | token: '' '' "aes_gcm" '-' 254s | token: '' "aes_gcm" '-' "none" '-' 254s | token: '-' "none" '-' "sha2" ';' 254s | appending IKE encryption algorithm AES_GCM_16[_0] 254s | parsing prf: 254s | ike_alg_byname() failed: IKE PRF algorithm 'none' is not recognized 254s | lookup for PRF algorithm 'none' failed 254s | - failed, saving error 'IKE PRF algorithm 'none' is not recognized' and tossing result 254s | parsing integ: 254s | appending IKE integrity algorithm NONE[_0] 254s | token: '-' "sha2" ';' "modp2048" '' 254s | parsing prf: 254s | appending IKE PRF algorithm HMAC_SHA2_256[_0] 254s | token: ';' "modp2048" '' '' 254s | parsing dh: 254s | appending IKE DH algorithm MODP2048[_0] 254s | token: '' '' '' 254s | parsing 'aes_gcm-none-modp2048' for IKE 254s | proposal: 'aes_gcm-none-modp2048' 254s | token: '' '' "aes_gcm" '-' 254s | token: '' "aes_gcm" '-' "none" '-' 254s | token: '-' "none" '-' "modp2048" '' 254s | appending IKE encryption algorithm AES_GCM_16[_0] 254s | parsing prf: 254s | ike_alg_byname() failed: IKE PRF algorithm 'none' is not recognized 254s | lookup for PRF algorithm 'none' failed 254s | - failed, saving error 'IKE PRF algorithm 'none' is not recognized' and tossing result 254s | parsing integ: 254s | appending IKE integrity algorithm NONE[_0] 254s | token: '-' "modp2048" '' '' 254s | parsing prf: 254s | ike_alg_byname() failed: IKE PRF algorithm 'modp2048' is not recognized 254s | lookup for PRF algorithm 'modp2048' failed 254s | -- failed 'IKE PRF algorithm 'modp2048' is not recognized' 254s | parsing 'aes_gcm-none;modp2048' for IKE 254s | proposal: 'aes_gcm-none;modp2048' 254s | token: '' '' "aes_gcm" '-' 254s | token: '' "aes_gcm" '-' "none" ';' 254s | token: '-' "none" ';' "modp2048" '' 254s | appending IKE encryption algorithm AES_GCM_16[_0] 254s | parsing prf: 254s | ike_alg_byname() failed: IKE PRF algorithm 'none' is not recognized 254s | lookup for PRF algorithm 'none' failed 254s | - failed, saving error 'IKE PRF algorithm 'none' is not recognized' and tossing result 254s | parsing integ: 254s | appending IKE integrity algorithm NONE[_0] 254s | token: ';' "modp2048" '' '' 254s | parsing dh: 254s | appending IKE DH algorithm MODP2048[_0] 254s | token: '' '' '' 254s | appending IKE PRF algorithm HMAC_SHA2_512[_0] 254s | appending IKE PRF algorithm HMAC_SHA2_256[_0] 254s | parsing 'aes_gcm-sha1-none-modp2048' for IKE 254s | proposal: 'aes_gcm-sha1-none-modp2048' 254s | token: '' '' "aes_gcm" '-' 254s | token: '' "aes_gcm" '-' "sha1" '-' 254s | token: '-' "sha1" '-' "none" '-' 254s | appending IKE encryption algorithm AES_GCM_16[_0] 254s | parsing prf: 254s | appending IKE PRF algorithm HMAC_SHA1[_0] 254s | token: '-' "none" '-' "modp2048" '' 254s | - succeeded, advancing tokens 254s | parsing dh: 254s | appending IKE DH algorithm NONE[_0] 254s | token: '-' "modp2048" '' '' 254s | parsing 'aes_gcm-sha1-none;modp2048' for IKE 254s | proposal: 'aes_gcm-sha1-none;modp2048' 254s | token: '' '' "aes_gcm" '-' 254s | token: '' "aes_gcm" '-' "sha1" '-' 254s | token: '-' "sha1" '-' "none" ';' 254s | appending IKE encryption algorithm AES_GCM_16[_0] 254s | parsing prf: 254s | appending IKE PRF algorithm HMAC_SHA1[_0] 254s | token: '-' "none" ';' "modp2048" '' 254s | - succeeded, advancing tokens 254s | parsing dh: 254s | appending IKE DH algorithm NONE[_0] 254s | token: ';' "modp2048" '' '' 254s | parsing 'aes+aes_gcm' for IKE 254s | proposal: 'aes+aes_gcm' 254s | token: '' '' "aes" '+' 254s | token: '' "aes" '+' "aes_gcm" '' 254s | token: '+' "aes_gcm" '' '' 254s | appending IKE encryption algorithm AES_CBC[_0] 254s | token: '' '' '' 254s | appending IKE encryption algorithm AES_GCM_16[_0] 254s | appending IKE PRF algorithm HMAC_SHA2_512[_0] 254s | appending IKE PRF algorithm HMAC_SHA2_256[_0] 254s | appending IKE DH algorithm DH19[_0] 254s | appending IKE DH algorithm DH20[_0] 254s | appending IKE DH algorithm DH21[_0] 254s | appending IKE DH algorithm DH31[_0] 254s | appending IKE DH algorithm MODP4096[_0] 254s | appending IKE DH algorithm MODP3072[_0] 254s | appending IKE DH algorithm MODP2048[_0] 254s | appending IKE DH algorithm MODP8192[_0] 254s | parsing ',' for IKE 254s | proposal: '' 254s | token: '' '' "" '' 254s | token: '' "" '' '' 254s | parsing 'aes,' for IKE 254s | proposal: 'aes' 254s | token: '' '' "aes" '' 254s | token: '' "aes" '' '' 254s | token: '' '' '' 254s | appending IKE encryption algorithm AES_CBC[_0] 254s | appending IKE PRF algorithm HMAC_SHA2_512[_0] 254s | appending IKE PRF algorithm HMAC_SHA2_256[_0] 254s | appending IKE integrity algorithm HMAC_SHA2_512_256[_0] 254s | appending IKE integrity algorithm HMAC_SHA2_256_128[_0] 254s | appending IKE DH algorithm DH19[_0] 254s | appending IKE DH algorithm DH20[_0] 254s | appending IKE DH algorithm DH21[_0] 254s | appending IKE DH algorithm DH31[_0] 254s | appending IKE DH algorithm MODP4096[_0] 254s | appending IKE DH algorithm MODP3072[_0] 254s | appending IKE DH algorithm MODP2048[_0] 254s | appending IKE DH algorithm MODP8192[_0] 254s | proposal: '' 254s | token: '' '' "" '' 254s | token: '' "" '' '' 254s | parsing 'aes,,aes' for IKE 254s | proposal: 'aes' 254s | token: '' '' "aes" '' 254s | token: '' "aes" '' '' 254s | token: '' '' '' 254s | appending IKE encryption algorithm AES_CBC[_0] 254s | appending IKE PRF algorithm HMAC_SHA2_512[_0] 254s | appending IKE PRF algorithm HMAC_SHA2_256[_0] 254s | appending IKE integrity algorithm HMAC_SHA2_512_256[_0] 254s | appending IKE integrity algorithm HMAC_SHA2_256_128[_0] 254s | appending IKE DH algorithm DH19[_0] 254s | appending IKE DH algorithm DH20[_0] 254s | appending IKE DH algorithm DH21[_0] 254s | appending IKE DH algorithm DH31[_0] 254s | appending IKE DH algorithm MODP4096[_0] 254s | appending IKE DH algorithm MODP3072[_0] 254s | appending IKE DH algorithm MODP2048[_0] 254s | appending IKE DH algorithm MODP8192[_0] 254s | proposal: '' 254s | token: '' '' "" '' 254s | token: '' "" '' '' 254s | parsing ',aes' for IKE 254s | proposal: '' 254s | token: '' '' "" '' 254s | token: '' "" '' '' 254s | parsing '-' for IKE 254s | proposal: '-' 254s | token: '' '' "" '-' 254s | token: '' "" '-' "" '' 254s | parsing '+' for IKE 254s | proposal: '+' 254s | token: '' '' "" '+' 254s | token: '' "" '+' "" '' 254s | parsing ';' for IKE 254s | proposal: ';' 254s | token: '' '' "" ';' 254s | token: '' "" ';' "" '' 254s | parsing 'aes-' for IKE 254s | proposal: 'aes-' 254s | token: '' '' "aes" '-' 254s | token: '' "aes" '-' "" '' 254s | token: '-' "" '' '' 254s | appending IKE encryption algorithm AES_CBC[_0] 254s | parsing prf: 254s | - failed, saving error 'IKE PRF algorithm is empty' and tossing result 254s | parsing integ: 254s | - and - failed, returning earlier PRF error 'IKE PRF algorithm is empty' and discarding INTEG error 'IKE integrity algorithm is empty') 254s | parsing 'aes+' for IKE 254s | proposal: 'aes+' 254s | token: '' '' "aes" '+' 254s | token: '' "aes" '+' "" '' 254s | token: '+' "" '' '' 254s | appending IKE encryption algorithm AES_CBC[_0] 254s | parsing 'aes;' for IKE 254s | proposal: 'aes;' 254s | token: '' '' "aes" ';' 254s | token: '' "aes" ';' "" '' 254s | token: ';' "" '' '' 254s | appending IKE encryption algorithm AES_CBC[_0] 254s | parsing dh: 254s | ... failed 'IKE DH algorithm is empty' 254s | parsing '-aes' for IKE 254s | proposal: '-aes' 254s | token: '' '' "" '-' 254s | token: '' "" '-' "aes" '' 254s | parsing '+aes' for IKE 254s | proposal: '+aes' 254s | token: '' '' "" '+' 254s | token: '' "" '+' "aes" '' 254s | parsing ';aes' for IKE 254s | proposal: ';aes' 254s | token: '' '' "" ';' 254s | token: '' "" ';' "aes" '' 254s | parsing 'aes+-' for IKE 254s | proposal: 'aes+-' 254s | token: '' '' "aes" '+' 254s | token: '' "aes" '+' "" '-' 254s | token: '+' "" '-' "" '' 254s | appending IKE encryption algorithm AES_CBC[_0] 254s | parsing 'aes+;' for IKE 254s | proposal: 'aes+;' 254s | token: '' '' "aes" '+' 254s | token: '' "aes" '+' "" ';' 254s | token: '+' "" ';' "" '' 254s | appending IKE encryption algorithm AES_CBC[_0] 254s | parsing 'aes++' for IKE 254s | proposal: 'aes++' 254s | token: '' '' "aes" '+' 254s | token: '' "aes" '+' "" '+' 254s | token: '+' "" '+' "" '' 254s | appending IKE encryption algorithm AES_CBC[_0] 254s ipsec algparse: leak detective found no leaks 254s ipsec algparse: Encryption algorithms: 254s ipsec algparse: AES_CCM_16 {256,192,*128} IKEv1: ESP IKEv2: ESP FIPS aes_ccm, aes_ccm_c 254s ipsec algparse: AES_CCM_12 {256,192,*128} IKEv1: ESP IKEv2: ESP FIPS aes_ccm_b 254s ipsec algparse: AES_CCM_8 {256,192,*128} IKEv1: ESP IKEv2: ESP FIPS aes_ccm_a 254s ipsec algparse: 3DES_CBC [*192] IKEv1: IKE ESP IKEv2: IKE ESP FIPS NSS(CBC) 3des 254s ipsec algparse: CAMELLIA_CTR {256,192,*128} IKEv1: ESP IKEv2: ESP 254s ipsec algparse: CAMELLIA_CBC {256,192,*128} IKEv1: IKE ESP IKEv2: IKE ESP NSS(CBC) camellia 254s ipsec algparse: AES_GCM_16 {256,192,*128} IKEv1: ESP IKEv2: IKE ESP FIPS NSS(AEAD) aes_gcm, aes_gcm_c 254s ipsec algparse: AES_GCM_12 {256,192,*128} IKEv1: ESP IKEv2: IKE ESP FIPS NSS(AEAD) aes_gcm_b 254s ipsec algparse: AES_GCM_8 {256,192,*128} IKEv1: ESP IKEv2: IKE ESP FIPS NSS(AEAD) aes_gcm_a 254s ipsec algparse: AES_CTR {256,192,*128} IKEv1: IKE ESP IKEv2: IKE ESP FIPS NSS(CTR) aesctr 254s ipsec algparse: AES_CBC {256,192,*128} IKEv1: IKE ESP IKEv2: IKE ESP FIPS NSS(CBC) aes 254s ipsec algparse: NULL_AUTH_AES_GMAC {256,192,*128} IKEv1: ESP IKEv2: ESP FIPS aes_gmac 254s ipsec algparse: NULL [] IKEv1: ESP IKEv2: ESP NULL 254s ipsec algparse: CHACHA20_POLY1305 [*256] IKEv1: IKEv2: IKE ESP NSS(AEAD) chacha20poly1305 254s ipsec algparse: Hash algorithms: 254s ipsec algparse: MD5 IKEv1: IKE IKEv2: NSS 254s ipsec algparse: SHA1 IKEv1: IKE IKEv2: IKE FIPS NSS sha 254s ipsec algparse: SHA2_256 IKEv1: IKE IKEv2: IKE FIPS NSS sha2, sha256 254s ipsec algparse: SHA2_384 IKEv1: IKE IKEv2: IKE FIPS NSS sha384 254s ipsec algparse: SHA2_512 IKEv1: IKE IKEv2: IKE FIPS NSS sha512 254s ipsec algparse: IDENTITY IKEv1: IKEv2: FIPS 254s ipsec algparse: PRF algorithms: 254s ipsec algparse: HMAC_MD5 IKEv1: IKE IKEv2: IKE NSS md5 254s ipsec algparse: HMAC_SHA1 IKEv1: IKE IKEv2: IKE FIPS NSS sha, sha1 254s ipsec algparse: HMAC_SHA2_256 IKEv1: IKE IKEv2: IKE FIPS NSS sha2, sha256, sha2_256 254s ipsec algparse: HMAC_SHA2_384 IKEv1: IKE IKEv2: IKE FIPS NSS sha384, sha2_384 254s ipsec algparse: HMAC_SHA2_512 IKEv1: IKE IKEv2: IKE FIPS NSS sha512, sha2_512 254s ipsec algparse: AES_XCBC IKEv1: IKEv2: IKE native(XCBC) aes128_xcbc 254s ipsec algparse: Integrity algorithms: 254s ipsec algparse: HMAC_MD5_96 IKEv1: IKE ESP AH IKEv2: IKE ESP AH NSS md5, hmac_md5 254s ipsec algparse: HMAC_SHA1_96 IKEv1: IKE ESP AH IKEv2: IKE ESP AH FIPS NSS sha, sha1, sha1_96, hmac_sha1 254s ipsec algparse: HMAC_SHA2_512_256 IKEv1: IKE ESP AH IKEv2: IKE ESP AH FIPS NSS sha512, sha2_512, sha2_512_256, hmac_sha2_512 254s ipsec algparse: HMAC_SHA2_384_192 IKEv1: IKE ESP AH IKEv2: IKE ESP AH FIPS NSS sha384, sha2_384, sha2_384_192, hmac_sha2_384 254s ipsec algparse: HMAC_SHA2_256_128 IKEv1: IKE ESP AH IKEv2: IKE ESP AH FIPS NSS sha2, sha256, sha2_256, sha2_256_128, hmac_sha2_256 254s ipsec algparse: HMAC_SHA2_256_TRUNCBUG IKEv1: ESP AH IKEv2: AH 254s ipsec algparse: AES_XCBC_96 IKEv1: ESP AH IKEv2: IKE ESP AH native(XCBC) aes_xcbc, aes128_xcbc, aes128_xcbc_96 254s ipsec algparse: AES_CMAC_96 IKEv1: ESP AH IKEv2: ESP AH FIPS aes_cmac 254s ipsec algparse: NONE IKEv1: ESP IKEv2: IKE ESP FIPS null 254s ipsec algparse: DH algorithms: 254s ipsec algparse: NONE IKEv1: IKEv2: IKE ESP AH FIPS NSS(MODP) null, dh0 254s ipsec algparse: MODP1536 IKEv1: IKE ESP AH IKEv2: IKE ESP AH NSS(MODP) dh5 254s ipsec algparse: MODP2048 IKEv1: IKE ESP AH IKEv2: IKE ESP AH FIPS NSS(MODP) dh14 254s ipsec algparse: MODP3072 IKEv1: IKE ESP AH IKEv2: IKE ESP AH FIPS NSS(MODP) dh15 254s ipsec algparse: MODP4096 IKEv1: IKE ESP AH IKEv2: IKE ESP AH FIPS NSS(MODP) dh16 254s ipsec algparse: MODP6144 IKEv1: IKE ESP AH IKEv2: IKE ESP AH FIPS NSS(MODP) dh17 254s ipsec algparse: MODP8192 IKEv1: IKE ESP AH IKEv2: IKE ESP AH FIPS NSS(MODP) dh18 254s ipsec algparse: DH19 IKEv1: IKE IKEv2: IKE ESP AH FIPS NSS(ECP) ecp_256, ecp256 254s ipsec algparse: DH20 IKEv1: IKE IKEv2: IKE ESP AH FIPS NSS(ECP) ecp_384, ecp384 254s ipsec algparse: DH21 IKEv1: IKE IKEv2: IKE ESP AH FIPS NSS(ECP) ecp_521, ecp521 254s ipsec algparse: DH31 IKEv1: IKE IKEv2: IKE ESP AH NSS(ECP) curve25519 254s ipsec algparse: IPCOMP algorithms: 254s ipsec algparse: DEFLATE IKEv1: ESP AH IKEv2: ESP AH FIPS 254s ipsec algparse: LZS IKEv1: IKEv2: ESP AH FIPS 254s ipsec algparse: LZJH IKEv1: IKEv2: ESP AH FIPS 254s ipsec algparse: testing CAMELLIA_CBC: 254s ipsec algparse: Camellia: 16 bytes with 128-bit key 254s | decode_to_chunk() raw_key: input "0x00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00" 254s | decode_to_chunk() output: 254s | 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................ 254s | CONCATENATE_DATA_AND_BASE: 254s | target: EXTRACT_KEY_FROM_KEY 254s | base: base-key@0x14b173b8a290 (16-bytes, AES_KEY_GEN) 254s | params: 16-bytes@0x7fffc0f80830 254s | key-offset: 0, key-size: 16 254s | EXTRACT_KEY_FROM_KEY: 254s | target: CAMELLIA_CBC 254s | flags: ENCRYPT+DECRYPT 254s | key_size: 16-bytes 254s | base: base-key@0x14b173b8d2a0 (32-bytes, EXTRACT_KEY_FROM_KEY) 254s | operation: FLAGS_ONLY 254s | params: 8-bytes@0x7fffc0f80838 254s | decode_to_mac() IV: : input "0x00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00" 254s | decode_to_mac() output: 254s | 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................ 254s | decode_to_chunk() new IV: : input "0x07 92 3A 39 EB 0A 81 7D 1C 4D 87 BD B8 2D 1F 1C" 254s | decode_to_chunk() output: 254s | 07 92 3a 39 eb 0a 81 7d 1c 4d 87 bd b8 2d 1f 1c ..:9...}.M...-.. 254s | decode_to_chunk() plaintext: : input "0x80 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00" 254s | decode_to_chunk() output: 254s | 80 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................ 254s | decode_to_chunk() ciphertext: : input "0x07 92 3A 39 EB 0A 81 7D 1C 4D 87 BD B8 2D 1F 1C" 254s | decode_to_chunk() output: 254s | 07 92 3a 39 eb 0a 81 7d 1c 4d 87 bd b8 2d 1f 1c ..:9...}.M...-.. 254s | NSS ike_alg_nss_cbc: CAMELLIA_CBC - enter (nil) 254s | using IKEv1 IV 254s | NSS ike_alg_nss_cbc: CAMELLIA_CBC - exit 254s | verify_bytes() Camellia: 16 bytes with 128-bit key: encrypt: ok 254s | verify_bytes() Camellia: 16 bytes with 128-bit key: updated CBC IV: ok 254s | decode_to_mac() IV: : input "0x00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00" 254s | decode_to_mac() output: 254s | 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................ 254s | decode_to_chunk() new IV: : input "0x07 92 3A 39 EB 0A 81 7D 1C 4D 87 BD B8 2D 1F 1C" 254s | decode_to_chunk() output: 254s | 07 92 3a 39 eb 0a 81 7d 1c 4d 87 bd b8 2d 1f 1c ..:9...}.M...-.. 254s | decode_to_chunk() ciphertext: : input "0x07 92 3A 39 EB 0A 81 7D 1C 4D 87 BD B8 2D 1F 1C" 254s | decode_to_chunk() output: 254s | 07 92 3a 39 eb 0a 81 7d 1c 4d 87 bd b8 2d 1f 1c ..:9...}.M...-.. 254s | decode_to_chunk() plaintext: : input "0x80 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00" 254s | decode_to_chunk() output: 254s | 80 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................ 254s | NSS ike_alg_nss_cbc: CAMELLIA_CBC - enter (nil) 254s | using IKEv1 IV 254s | NSS ike_alg_nss_cbc: CAMELLIA_CBC - exit 254s | verify_bytes() Camellia: 16 bytes with 128-bit key: decrypt: ok 254s | verify_bytes() Camellia: 16 bytes with 128-bit key: updated CBC IV: ok 254s ipsec algparse: Camellia: 16 bytes with 128-bit key 254s | decode_to_chunk() raw_key: input "0x00 11 22 33 44 55 66 77 88 99 AA BB CC DD EE FF" 254s | decode_to_chunk() output: 254s | 00 11 22 33 44 55 66 77 88 99 aa bb cc dd ee ff .."3DUfw........ 254s | CONCATENATE_DATA_AND_BASE: 254s | target: EXTRACT_KEY_FROM_KEY 254s | base: base-key@0x14b173b8a290 (16-bytes, AES_KEY_GEN) 254s | params: 16-bytes@0x7fffc0f80830 254s | key-offset: 0, key-size: 16 254s | EXTRACT_KEY_FROM_KEY: 254s | target: CAMELLIA_CBC 254s | flags: ENCRYPT+DECRYPT 254s | key_size: 16-bytes 254s | base: base-key@0x14b173b8d2a0 (32-bytes, EXTRACT_KEY_FROM_KEY) 254s | operation: FLAGS_ONLY 254s | params: 8-bytes@0x7fffc0f80838 254s | decode_to_mac() IV: : input "0x00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00" 254s | decode_to_mac() output: 254s | 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................ 254s | decode_to_chunk() new IV: : input "0x14 4D 2B 0F 50 0C 27 B7 EC 2C D1 2D 91 59 6F 37" 254s | decode_to_chunk() output: 254s | 14 4d 2b 0f 50 0c 27 b7 ec 2c d1 2d 91 59 6f 37 .M+.P.'..,.-.Yo7 254s | decode_to_chunk() plaintext: : input "0x00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 01 " 254s | decode_to_chunk() output: 254s | 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 01 ................ 254s | decode_to_chunk() ciphertext: : input "0x14 4D 2B 0F 50 0C 27 B7 EC 2C D1 2D 91 59 6F 37" 254s | decode_to_chunk() output: 254s | 14 4d 2b 0f 50 0c 27 b7 ec 2c d1 2d 91 59 6f 37 .M+.P.'..,.-.Yo7 254s | NSS ike_alg_nss_cbc: CAMELLIA_CBC - enter (nil) 254s | using IKEv1 IV 254s | NSS ike_alg_nss_cbc: CAMELLIA_CBC - exit 254s | verify_bytes() Camellia: 16 bytes with 128-bit key: encrypt: ok 254s | verify_bytes() Camellia: 16 bytes with 128-bit key: updated CBC IV: ok 254s | decode_to_mac() IV: : input "0x00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00" 254s | decode_to_mac() output: 254s | 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................ 254s | decode_to_chunk() new IV: : input "0x14 4D 2B 0F 50 0C 27 B7 EC 2C D1 2D 91 59 6F 37" 254s | decode_to_chunk() output: 254s | 14 4d 2b 0f 50 0c 27 b7 ec 2c d1 2d 91 59 6f 37 .M+.P.'..,.-.Yo7 254s | decode_to_chunk() ciphertext: : input "0x14 4D 2B 0F 50 0C 27 B7 EC 2C D1 2D 91 59 6F 37" 254s | decode_to_chunk() output: 254s | 14 4d 2b 0f 50 0c 27 b7 ec 2c d1 2d 91 59 6f 37 .M+.P.'..,.-.Yo7 254s | decode_to_chunk() plaintext: : input "0x00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 01 " 254s | decode_to_chunk() output: 254s | 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 01 ................ 254s | NSS ike_alg_nss_cbc: CAMELLIA_CBC - enter (nil) 254s | using IKEv1 IV 254s | NSS ike_alg_nss_cbc: CAMELLIA_CBC - exit 254s | verify_bytes() Camellia: 16 bytes with 128-bit key: decrypt: ok 254s | verify_bytes() Camellia: 16 bytes with 128-bit key: updated CBC IV: ok 254s ipsec algparse: Camellia: 16 bytes with 256-bit key 254s | decode_to_chunk() raw_key: input "0x00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00" 254s | decode_to_chunk() output: 254s | 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................ 254s | 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................ 254s | CONCATENATE_DATA_AND_BASE: 254s | target: EXTRACT_KEY_FROM_KEY 254s | base: base-key@0x14b173b8a290 (16-bytes, AES_KEY_GEN) 254s | params: 16-bytes@0x7fffc0f80830 254s | key-offset: 0, key-size: 32 254s | EXTRACT_KEY_FROM_KEY: 254s | target: CAMELLIA_CBC 254s | flags: ENCRYPT+DECRYPT 254s | key_size: 32-bytes 254s | base: base-key@0x14b173b8d2a0 (48-bytes, EXTRACT_KEY_FROM_KEY) 254s | operation: FLAGS_ONLY 254s | params: 8-bytes@0x7fffc0f80838 254s | decode_to_mac() IV: : input "0x00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00" 254s | decode_to_mac() output: 254s | 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................ 254s | decode_to_chunk() new IV: : input "0xB0 C6 B8 8A EA 51 8A B0 9E 84 72 48 E9 1B 1B 9D" 254s | decode_to_chunk() output: 254s | b0 c6 b8 8a ea 51 8a b0 9e 84 72 48 e9 1b 1b 9d .....Q....rH.... 254s | decode_to_chunk() plaintext: : input "0x80 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00" 254s | decode_to_chunk() output: 254s | 80 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................ 254s | decode_to_chunk() ciphertext: : input "0xB0 C6 B8 8A EA 51 8A B0 9E 84 72 48 E9 1B 1B 9D" 254s | decode_to_chunk() output: 254s | b0 c6 b8 8a ea 51 8a b0 9e 84 72 48 e9 1b 1b 9d .....Q....rH.... 254s | NSS ike_alg_nss_cbc: CAMELLIA_CBC - enter (nil) 254s | using IKEv1 IV 254s | NSS ike_alg_nss_cbc: CAMELLIA_CBC - exit 254s | verify_bytes() Camellia: 16 bytes with 256-bit key: encrypt: ok 254s | verify_bytes() Camellia: 16 bytes with 256-bit key: updated CBC IV: ok 254s | decode_to_mac() IV: : input "0x00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00" 254s | decode_to_mac() output: 254s | 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................ 254s | decode_to_chunk() new IV: : input "0xB0 C6 B8 8A EA 51 8A B0 9E 84 72 48 E9 1B 1B 9D" 254s | decode_to_chunk() output: 254s | b0 c6 b8 8a ea 51 8a b0 9e 84 72 48 e9 1b 1b 9d .....Q....rH.... 254s | decode_to_chunk() ciphertext: : input "0xB0 C6 B8 8A EA 51 8A B0 9E 84 72 48 E9 1B 1B 9D" 254s | decode_to_chunk() output: 254s | b0 c6 b8 8a ea 51 8a b0 9e 84 72 48 e9 1b 1b 9d .....Q....rH.... 254s | decode_to_chunk() plaintext: : input "0x80 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00" 254s | decode_to_chunk() output: 254s | 80 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................ 254s | NSS ike_alg_nss_cbc: CAMELLIA_CBC - enter (nil) 254s | using IKEv1 IV 254s | NSS ike_alg_nss_cbc: CAMELLIA_CBC - exit 254s | verify_bytes() Camellia: 16 bytes with 256-bit key: decrypt: ok 254s | verify_bytes() Camellia: 16 bytes with 256-bit key: updated CBC IV: ok 254s ipsec algparse: Camellia: 16 bytes with 256-bit key 254s | decode_to_chunk() raw_key: input "0x00 11 22 33 44 55 66 77 88 99 AA BB CC DD EE FF FF EE DD CC BB AA 99 88 77 66 55 44 33 22 11 00" 254s | decode_to_chunk() output: 254s | 00 11 22 33 44 55 66 77 88 99 aa bb cc dd ee ff .."3DUfw........ 254s | ff ee dd cc bb aa 99 88 77 66 55 44 33 22 11 00 ........wfUD3".. 254s | CONCATENATE_DATA_AND_BASE: 254s | target: EXTRACT_KEY_FROM_KEY 254s | base: base-key@0x14b173b8a290 (16-bytes, AES_KEY_GEN) 254s | params: 16-bytes@0x7fffc0f80830 254s | key-offset: 0, key-size: 32 254s | EXTRACT_KEY_FROM_KEY: 254s | target: CAMELLIA_CBC 254s | flags: ENCRYPT+DECRYPT 254s | key_size: 32-bytes 254s | base: base-key@0x14b173b8d2a0 (48-bytes, EXTRACT_KEY_FROM_KEY) 254s | operation: FLAGS_ONLY 254s | params: 8-bytes@0x7fffc0f80838 254s | decode_to_mac() IV: : input "0x00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00" 254s | decode_to_mac() output: 254s | 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................ 254s | decode_to_chunk() new IV: : input "0xCC 39 FF EE 18 56 D3 EB 61 02 5E 93 21 9B 65 23 " 254s | decode_to_chunk() output: 254s | cc 39 ff ee 18 56 d3 eb 61 02 5e 93 21 9b 65 23 .9...V..a.^.!.e# 254s | decode_to_chunk() plaintext: : input "0x00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 01" 254s | decode_to_chunk() output: 254s | 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 01 ................ 254s | decode_to_chunk() ciphertext: : input "0xCC 39 FF EE 18 56 D3 EB 61 02 5E 93 21 9B 65 23 " 254s | decode_to_chunk() output: 254s | cc 39 ff ee 18 56 d3 eb 61 02 5e 93 21 9b 65 23 .9...V..a.^.!.e# 254s | NSS ike_alg_nss_cbc: CAMELLIA_CBC - enter (nil) 254s | using IKEv1 IV 254s | NSS ike_alg_nss_cbc: CAMELLIA_CBC - exit 254s | verify_bytes() Camellia: 16 bytes with 256-bit key: encrypt: ok 254s | verify_bytes() Camellia: 16 bytes with 256-bit key: updated CBC IV: ok 254s | decode_to_mac() IV: : input "0x00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00" 254s | decode_to_mac() output: 254s | 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................ 254s | decode_to_chunk() new IV: : input "0xCC 39 FF EE 18 56 D3 EB 61 02 5E 93 21 9B 65 23 " 254s | decode_to_chunk() output: 254s | cc 39 ff ee 18 56 d3 eb 61 02 5e 93 21 9b 65 23 .9...V..a.^.!.e# 254s | decode_to_chunk() ciphertext: : input "0xCC 39 FF EE 18 56 D3 EB 61 02 5E 93 21 9B 65 23 " 254s | decode_to_chunk() output: 254s | cc 39 ff ee 18 56 d3 eb 61 02 5e 93 21 9b 65 23 .9...V..a.^.!.e# 254s | decode_to_chunk() plaintext: : input "0x00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 01" 254s | decode_to_chunk() output: 254s | 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 01 ................ 254s | NSS ike_alg_nss_cbc: CAMELLIA_CBC - enter (nil) 254s | using IKEv1 IV 254s | NSS ike_alg_nss_cbc: CAMELLIA_CBC - exit 254s | verify_bytes() Camellia: 16 bytes with 256-bit key: decrypt: ok 254s | verify_bytes() Camellia: 16 bytes with 256-bit key: updated CBC IV: ok 254s ipsec algparse: testing AES_GCM_16: 254s ipsec algparse: empty string 254s | decode_to_chunk() raw_key: input "0xcf063a34d4a9a76c2c86787d3f96db71" 254s | decode_to_chunk() output: 254s | cf 06 3a 34 d4 a9 a7 6c 2c 86 78 7d 3f 96 db 71 ..:4...l,.x}?..q 254s | CONCATENATE_DATA_AND_BASE: 254s | target: EXTRACT_KEY_FROM_KEY 254s | base: base-key@0x14b173b8a290 (16-bytes, AES_KEY_GEN) 254s | params: 16-bytes@0x7fffc0f80700 254s | key-offset: 0, key-size: 16 254s | EXTRACT_KEY_FROM_KEY: 254s | target: AES_GCM 254s | flags: ENCRYPT+DECRYPT 254s | key_size: 16-bytes 254s | base: base-key@0x14b173b8d2a0 (32-bytes, EXTRACT_KEY_FROM_KEY) 254s | operation: FLAGS_ONLY 254s | params: 8-bytes@0x7fffc0f80708 254s | decode_to_chunk() salted IV: input "0x113b9785971864c83b01c787" 254s | decode_to_chunk() output: 254s | 11 3b 97 85 97 18 64 c8 3b 01 c7 87 .;....d.;... 254s | decode_to_chunk() AAD: input "" 254s | decode_to_chunk() output: 254s | 254s | decode_to_chunk() plaintext: input "" 254s | decode_to_chunk() output: 254s | 254s | decode_to_chunk() ciphertext: input "" 254s | decode_to_chunk() output: 254s | 254s | decode_to_chunk() tag: input "0x72ac8493e3a5228b5d130a69d2510e42" 254s | decode_to_chunk() output: 254s | 72 ac 84 93 e3 a5 22 8b 5d 13 0a 69 d2 51 0e 42 r.....".]..i.Q.B 254s | test_gcm_vector() DECRYPT: aad-size=0 salt-size=4 wire-IV-size=8 text-size=0 tag-size=16 text+tag in: 254s | 72 ac 84 93 e3 a5 22 8b 5d 13 0a 69 d2 51 0e 42 r.....".]..i.Q.B 254s | verify_bytes() empty string: output ciphertext: ok 254s | verify_bytes() empty string: TAG: ok 254s | test_gcm_vector() text+tag out: 254s | 72 ac 84 93 e3 a5 22 8b 5d 13 0a 69 d2 51 0e 42 r.....".]..i.Q.B 254s | test_gcm_vector() ENCRYPT: aad-size=0 salt-size=4 wire-IV-size=8 text-size=0 tag-size=16 text+tag in: 254s | 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................ 254s | verify_bytes() empty string: output ciphertext: ok 254s | verify_bytes() empty string: TAG: ok 254s | test_gcm_vector() text+tag out: 254s | 72 ac 84 93 e3 a5 22 8b 5d 13 0a 69 d2 51 0e 42 r.....".]..i.Q.B 254s ipsec algparse: one block 254s | decode_to_chunk() raw_key: input "0xe98b72a9881a84ca6b76e0f43e68647a" 254s | decode_to_chunk() output: 254s | e9 8b 72 a9 88 1a 84 ca 6b 76 e0 f4 3e 68 64 7a ..r.....kv..>hdz 254s | CONCATENATE_DATA_AND_BASE: 254s | target: EXTRACT_KEY_FROM_KEY 254s | base: base-key@0x14b173b8a290 (16-bytes, AES_KEY_GEN) 254s | params: 16-bytes@0x7fffc0f80700 254s | key-offset: 0, key-size: 16 254s | EXTRACT_KEY_FROM_KEY: 254s | target: AES_GCM 254s | flags: ENCRYPT+DECRYPT 254s | key_size: 16-bytes 254s | base: base-key@0x14b173b8d2a0 (32-bytes, EXTRACT_KEY_FROM_KEY) 254s | operation: FLAGS_ONLY 254s | params: 8-bytes@0x7fffc0f80708 254s | decode_to_chunk() salted IV: input "0x8b23299fde174053f3d652ba" 254s | decode_to_chunk() output: 254s | 8b 23 29 9f de 17 40 53 f3 d6 52 ba .#)...@S..R. 254s | decode_to_chunk() AAD: input "" 254s | decode_to_chunk() output: 254s | 254s | decode_to_chunk() plaintext: input "0x28286a321293253c3e0aa2704a278032" 254s | decode_to_chunk() output: 254s | 28 28 6a 32 12 93 25 3c 3e 0a a2 70 4a 27 80 32 ((j2..%<>..pJ'.2 254s | decode_to_chunk() ciphertext: input "0x5a3c1cf1985dbb8bed818036fdd5ab42" 254s | decode_to_chunk() output: 254s | 5a 3c 1c f1 98 5d bb 8b ed 81 80 36 fd d5 ab 42 Z<...].....6...B 254s | decode_to_chunk() tag: input "0x23c7ab0f952b7091cd324835043b5eb5" 254s | decode_to_chunk() output: 254s | 23 c7 ab 0f 95 2b 70 91 cd 32 48 35 04 3b 5e b5 #....+p..2H5.;^. 254s | test_gcm_vector() DECRYPT: aad-size=0 salt-size=4 wire-IV-size=8 text-size=16 tag-size=16 text+tag in: 254s | 5a 3c 1c f1 98 5d bb 8b ed 81 80 36 fd d5 ab 42 Z<...].....6...B 254s | 23 c7 ab 0f 95 2b 70 91 cd 32 48 35 04 3b 5e b5 #....+p..2H5.;^. 254s | verify_bytes() one block: output ciphertext: ok 254s | verify_bytes() one block: TAG: ok 254s | test_gcm_vector() text+tag out: 254s | 28 28 6a 32 12 93 25 3c 3e 0a a2 70 4a 27 80 32 ((j2..%<>..pJ'.2 254s | 23 c7 ab 0f 95 2b 70 91 cd 32 48 35 04 3b 5e b5 #....+p..2H5.;^. 254s | test_gcm_vector() ENCRYPT: aad-size=0 salt-size=4 wire-IV-size=8 text-size=16 tag-size=16 text+tag in: 254s | 28 28 6a 32 12 93 25 3c 3e 0a a2 70 4a 27 80 32 ((j2..%<>..pJ'.2 254s | 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................ 254s | verify_bytes() one block: output ciphertext: ok 254s | verify_bytes() one block: TAG: ok 254s | test_gcm_vector() text+tag out: 254s | 5a 3c 1c f1 98 5d bb 8b ed 81 80 36 fd d5 ab 42 Z<...].....6...B 254s | 23 c7 ab 0f 95 2b 70 91 cd 32 48 35 04 3b 5e b5 #....+p..2H5.;^. 254s ipsec algparse: two blocks 254s | decode_to_chunk() raw_key: input "0xbfd414a6212958a607a0f5d3ab48471d" 254s | decode_to_chunk() output: 254s | bf d4 14 a6 21 29 58 a6 07 a0 f5 d3 ab 48 47 1d ....!)X......HG. 254s | CONCATENATE_DATA_AND_BASE: 254s | target: EXTRACT_KEY_FROM_KEY 254s | base: base-key@0x14b173b8a290 (16-bytes, AES_KEY_GEN) 254s | params: 16-bytes@0x7fffc0f80700 254s | key-offset: 0, key-size: 16 254s | EXTRACT_KEY_FROM_KEY: 254s | target: AES_GCM 254s | flags: ENCRYPT+DECRYPT 254s | key_size: 16-bytes 254s | base: base-key@0x14b173b8d2a0 (32-bytes, EXTRACT_KEY_FROM_KEY) 254s | operation: FLAGS_ONLY 254s | params: 8-bytes@0x7fffc0f80708 254s | decode_to_chunk() salted IV: input "0x86d8ea0ab8e40dcc481cd0e2" 254s | decode_to_chunk() output: 254s | 86 d8 ea 0a b8 e4 0d cc 48 1c d0 e2 ........H... 254s | decode_to_chunk() AAD: input "" 254s | decode_to_chunk() output: 254s | 254s | decode_to_chunk() plaintext: input "0xa6b76a066e63392c9443e60272ceaeb9d25c991b0f2e55e2804e168c05ea591a" 254s | decode_to_chunk() output: 254s | a6 b7 6a 06 6e 63 39 2c 94 43 e6 02 72 ce ae b9 ..j.nc9,.C..r... 254s | d2 5c 99 1b 0f 2e 55 e2 80 4e 16 8c 05 ea 59 1a .\....U..N....Y. 254s | decode_to_chunk() ciphertext: input "0x62171db33193292d930bf6647347652c1ef33316d7feca99d54f1db4fcf513f8" 254s | decode_to_chunk() output: 254s | 62 17 1d b3 31 93 29 2d 93 0b f6 64 73 47 65 2c b...1.)-...dsGe, 254s | 1e f3 33 16 d7 fe ca 99 d5 4f 1d b4 fc f5 13 f8 ..3......O...... 254s | decode_to_chunk() tag: input "0xc28280aa5c6c7a8bd366f28c1cfd1f6e" 254s | decode_to_chunk() output: 254s | c2 82 80 aa 5c 6c 7a 8b d3 66 f2 8c 1c fd 1f 6e ....\lz..f.....n 254s | test_gcm_vector() DECRYPT: aad-size=0 salt-size=4 wire-IV-size=8 text-size=32 tag-size=16 text+tag in: 254s | 62 17 1d b3 31 93 29 2d 93 0b f6 64 73 47 65 2c b...1.)-...dsGe, 254s | 1e f3 33 16 d7 fe ca 99 d5 4f 1d b4 fc f5 13 f8 ..3......O...... 254s | c2 82 80 aa 5c 6c 7a 8b d3 66 f2 8c 1c fd 1f 6e ....\lz..f.....n 254s | verify_bytes() two blocks: output ciphertext: ok 254s | verify_bytes() two blocks: TAG: ok 254s | test_gcm_vector() text+tag out: 254s | a6 b7 6a 06 6e 63 39 2c 94 43 e6 02 72 ce ae b9 ..j.nc9,.C..r... 254s | d2 5c 99 1b 0f 2e 55 e2 80 4e 16 8c 05 ea 59 1a .\....U..N....Y. 254s | c2 82 80 aa 5c 6c 7a 8b d3 66 f2 8c 1c fd 1f 6e ....\lz..f.....n 254s | test_gcm_vector() ENCRYPT: aad-size=0 salt-size=4 wire-IV-size=8 text-size=32 tag-size=16 text+tag in: 254s | a6 b7 6a 06 6e 63 39 2c 94 43 e6 02 72 ce ae b9 ..j.nc9,.C..r... 254s | d2 5c 99 1b 0f 2e 55 e2 80 4e 16 8c 05 ea 59 1a .\....U..N....Y. 254s | 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................ 254s | verify_bytes() two blocks: output ciphertext: ok 254s | verify_bytes() two blocks: TAG: ok 254s | test_gcm_vector() text+tag out: 254s | 62 17 1d b3 31 93 29 2d 93 0b f6 64 73 47 65 2c b...1.)-...dsGe, 254s | 1e f3 33 16 d7 fe ca 99 d5 4f 1d b4 fc f5 13 f8 ..3......O...... 254s | c2 82 80 aa 5c 6c 7a 8b d3 66 f2 8c 1c fd 1f 6e ....\lz..f.....n 254s ipsec algparse: two blocks with associated data 254s | decode_to_chunk() raw_key: input "0x95bcde70c094f04e3dd8259cafd88ce8" 254s | decode_to_chunk() output: 254s | 95 bc de 70 c0 94 f0 4e 3d d8 25 9c af d8 8c e8 ...p...N=.%..... 254s | CONCATENATE_DATA_AND_BASE: 254s | target: EXTRACT_KEY_FROM_KEY 254s | base: base-key@0x14b173b8a290 (16-bytes, AES_KEY_GEN) 254s | params: 16-bytes@0x7fffc0f80700 254s | key-offset: 0, key-size: 16 254s | EXTRACT_KEY_FROM_KEY: 254s | target: AES_GCM 254s | flags: ENCRYPT+DECRYPT 254s | key_size: 16-bytes 254s | base: base-key@0x14b173b8d2a0 (32-bytes, EXTRACT_KEY_FROM_KEY) 254s | operation: FLAGS_ONLY 254s | params: 8-bytes@0x7fffc0f80708 254s | decode_to_chunk() salted IV: input "0x12cf097ad22380432ff40a5c" 254s | decode_to_chunk() output: 254s | 12 cf 09 7a d2 23 80 43 2f f4 0a 5c ...z.#.C/..\ 254s | decode_to_chunk() AAD: input "0xc783a0cca10a8d9fb8d27d69659463f2" 254s | decode_to_chunk() output: 254s | c7 83 a0 cc a1 0a 8d 9f b8 d2 7d 69 65 94 63 f2 ..........}ie.c. 254s | decode_to_chunk() plaintext: input "0x32f51e837a9748838925066d69e87180f34a6437e6b396e5643b34cb2ee4f7b1" 254s | decode_to_chunk() output: 254s | 32 f5 1e 83 7a 97 48 83 89 25 06 6d 69 e8 71 80 2...z.H..%.mi.q. 254s | f3 4a 64 37 e6 b3 96 e5 64 3b 34 cb 2e e4 f7 b1 .Jd7....d;4..... 254s | decode_to_chunk() ciphertext: input "0x8a023ba477f5b809bddcda8f55e09064d6d88aaec99c1e141212ea5b08503660" 254s | decode_to_chunk() output: 254s | 8a 02 3b a4 77 f5 b8 09 bd dc da 8f 55 e0 90 64 ..;.w.......U..d 254s | d6 d8 8a ae c9 9c 1e 14 12 12 ea 5b 08 50 36 60 ...........[.P6` 254s | decode_to_chunk() tag: input "0x562f500dae635d60a769b466e15acd1e" 254s | decode_to_chunk() output: 254s | 56 2f 50 0d ae 63 5d 60 a7 69 b4 66 e1 5a cd 1e V/P..c]`.i.f.Z.. 254s | test_gcm_vector() DECRYPT: aad-size=16 salt-size=4 wire-IV-size=8 text-size=32 tag-size=16 text+tag in: 254s | 8a 02 3b a4 77 f5 b8 09 bd dc da 8f 55 e0 90 64 ..;.w.......U..d 254s | d6 d8 8a ae c9 9c 1e 14 12 12 ea 5b 08 50 36 60 ...........[.P6` 254s | 56 2f 50 0d ae 63 5d 60 a7 69 b4 66 e1 5a cd 1e V/P..c]`.i.f.Z.. 254s | verify_bytes() two blocks with associated data: output ciphertext: ok 254s | verify_bytes() two blocks with associated data: TAG: ok 254s | test_gcm_vector() text+tag out: 254s | 32 f5 1e 83 7a 97 48 83 89 25 06 6d 69 e8 71 80 2...z.H..%.mi.q. 254s | f3 4a 64 37 e6 b3 96 e5 64 3b 34 cb 2e e4 f7 b1 .Jd7....d;4..... 254s | 56 2f 50 0d ae 63 5d 60 a7 69 b4 66 e1 5a cd 1e V/P..c]`.i.f.Z.. 254s | test_gcm_vector() ENCRYPT: aad-size=16 salt-size=4 wire-IV-size=8 text-size=32 tag-size=16 text+tag in: 254s | 32 f5 1e 83 7a 97 48 83 89 25 06 6d 69 e8 71 80 2...z.H..%.mi.q. 254s | f3 4a 64 37 e6 b3 96 e5 64 3b 34 cb 2e e4 f7 b1 .Jd7....d;4..... 254s | 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................ 254s | verify_bytes() two blocks with associated data: output ciphertext: ok 254s | verify_bytes() two blocks with associated data: TAG: ok 254s | test_gcm_vector() text+tag out: 254s | 8a 02 3b a4 77 f5 b8 09 bd dc da 8f 55 e0 90 64 ..;.w.......U..d 254s | d6 d8 8a ae c9 9c 1e 14 12 12 ea 5b 08 50 36 60 ...........[.P6` 254s | 56 2f 50 0d ae 63 5d 60 a7 69 b4 66 e1 5a cd 1e V/P..c]`.i.f.Z.. 254s ipsec algparse: testing AES_CTR: 254s ipsec algparse: Encrypting 16 octets using AES-CTR with 128-bit key 254s | decode_to_chunk() raw_key: input "0x AE 68 52 F8 12 10 67 CC 4B F7 A5 76 55 77 F3 9E" 254s | decode_to_chunk() output: 254s | ae 68 52 f8 12 10 67 cc 4b f7 a5 76 55 77 f3 9e .hR...g.K..vUw.. 254s | CONCATENATE_DATA_AND_BASE: 254s | target: EXTRACT_KEY_FROM_KEY 254s | base: base-key@0x14b173b8a290 (16-bytes, AES_KEY_GEN) 254s | params: 16-bytes@0x7fffc0f80820 254s | key-offset: 0, key-size: 16 254s | EXTRACT_KEY_FROM_KEY: 254s | target: AES_CTR 254s | flags: ENCRYPT+DECRYPT 254s | key_size: 16-bytes 254s | base: base-key@0x14b173b8d2a0 (32-bytes, EXTRACT_KEY_FROM_KEY) 254s | operation: FLAGS_ONLY 254s | params: 8-bytes@0x7fffc0f80828 254s | decode_to_mac() input counter-block: : input "0x 00 00 00 30 00 00 00 00 00 00 00 00 00 00 00 01" 254s | decode_to_mac() output: 254s | 00 00 00 30 00 00 00 00 00 00 00 00 00 00 00 01 ...0............ 254s | decode_to_chunk() Plaintext: input "0x 53 69 6E 67 6C 65 20 62 6C 6F 63 6B 20 6D 73 67" 254s | decode_to_chunk() output: 254s | 53 69 6e 67 6c 65 20 62 6c 6f 63 6b 20 6d 73 67 Single block msg 254s | decode_to_chunk() Ciphertext: input "0x E4 09 5D 4F B7 A7 B3 79 2D 61 75 A3 26 13 11 B8" 254s | decode_to_chunk() output: 254s | e4 09 5d 4f b7 a7 b3 79 2d 61 75 a3 26 13 11 b8 ..]O...y-au.&... 254s | decode_to_chunk() expected counter-block: : input "0x 00 00 00 30 00 00 00 00 00 00 00 00 00 00 00 02" 254s | decode_to_chunk() output: 254s | 00 00 00 30 00 00 00 00 00 00 00 00 00 00 00 02 ...0............ 254s | cipher_op_ctr_nss() enter AES_CTR 0x14b173b8dc00 use IKEv1 IV wire_iv 0 count 0 254s | ctr_param: count 32 iv 00000030000000000000000000000001 254s | cipher_op_ctr_nss() counter-block updated from 0x1 to 0x2 for 16 bytes 254s | do_aes_ctr: exit 254s | cipher_op_context_destroy_ctr_nss() 254s | verify_bytes() Encrypting 16 octets using AES-CTR with 128-bit key: encrypt: ok 254s | verify_bytes() Encrypting 16 octets using AES-CTR with 128-bit key: counter-block: ok 254s | decode_to_mac() input counter-block: : input "0x 00 00 00 30 00 00 00 00 00 00 00 00 00 00 00 01" 254s | decode_to_mac() output: 254s | 00 00 00 30 00 00 00 00 00 00 00 00 00 00 00 01 ...0............ 254s | decode_to_chunk() Ciphertext: input "0x E4 09 5D 4F B7 A7 B3 79 2D 61 75 A3 26 13 11 B8" 254s | decode_to_chunk() output: 254s | e4 09 5d 4f b7 a7 b3 79 2d 61 75 a3 26 13 11 b8 ..]O...y-au.&... 254s | decode_to_chunk() Plaintext: input "0x 53 69 6E 67 6C 65 20 62 6C 6F 63 6B 20 6D 73 67" 254s | decode_to_chunk() output: 254s | 53 69 6e 67 6c 65 20 62 6c 6f 63 6b 20 6d 73 67 Single block msg 254s | decode_to_chunk() expected counter-block: : input "0x 00 00 00 30 00 00 00 00 00 00 00 00 00 00 00 02" 254s | decode_to_chunk() output: 254s | 00 00 00 30 00 00 00 00 00 00 00 00 00 00 00 02 ...0............ 254s | cipher_op_ctr_nss() enter AES_CTR 0x14b173b8dc00 use IKEv1 IV wire_iv 0 count 0 254s | ctr_param: count 32 iv 00000030000000000000000000000001 254s | cipher_op_ctr_nss() counter-block updated from 0x1 to 0x2 for 16 bytes 254s | do_aes_ctr: exit 254s | cipher_op_context_destroy_ctr_nss() 254s | verify_bytes() Encrypting 16 octets using AES-CTR with 128-bit key: decrypt: ok 254s | verify_bytes() Encrypting 16 octets using AES-CTR with 128-bit key: counter-block: ok 254s ipsec algparse: Encrypting 32 octets using AES-CTR with 128-bit key 254s | decode_to_chunk() raw_key: input "0x 7E 24 06 78 17 FA E0 D7 43 D6 CE 1F 32 53 91 63" 254s | decode_to_chunk() output: 254s | 7e 24 06 78 17 fa e0 d7 43 d6 ce 1f 32 53 91 63 ~$.x....C...2S.c 254s | CONCATENATE_DATA_AND_BASE: 254s | target: EXTRACT_KEY_FROM_KEY 254s | base: base-key@0x14b173b8a290 (16-bytes, AES_KEY_GEN) 254s | params: 16-bytes@0x7fffc0f80820 254s | key-offset: 0, key-size: 16 254s | EXTRACT_KEY_FROM_KEY: 254s | target: AES_CTR 254s | flags: ENCRYPT+DECRYPT 254s | key_size: 16-bytes 254s | base: base-key@0x14b173b8d2a0 (32-bytes, EXTRACT_KEY_FROM_KEY) 254s | operation: FLAGS_ONLY 254s | params: 8-bytes@0x7fffc0f80828 254s | decode_to_mac() input counter-block: : input "0x 00 6C B6 DB C0 54 3B 59 DA 48 D9 0B 00 00 00 01" 254s | decode_to_mac() output: 254s | 00 6c b6 db c0 54 3b 59 da 48 d9 0b 00 00 00 01 .l...T;Y.H...... 254s | decode_to_chunk() Plaintext: input "0x00 01 02 03 04 05 06 07 08 09 0A 0B 0C 0D 0E 0F10 11 12 13 14 15 16 17 18 19 1A 1B 1C 1D 1E 1F" 254s | decode_to_chunk() output: 254s | 00 01 02 03 04 05 06 07 08 09 0a 0b 0c 0d 0e 0f ................ 254s | 10 11 12 13 14 15 16 17 18 19 1a 1b 1c 1d 1e 1f ................ 254s | decode_to_chunk() Ciphertext: input "0x51 04 A1 06 16 8A 72 D9 79 0D 41 EE 8E DA D3 88EB 2E 1E FC 46 DA 57 C8 FC E6 30 DF 91 41 BE 28" 254s | decode_to_chunk() output: 254s | 51 04 a1 06 16 8a 72 d9 79 0d 41 ee 8e da d3 88 Q.....r.y.A..... 254s | eb 2e 1e fc 46 da 57 c8 fc e6 30 df 91 41 be 28 ....F.W...0..A.( 254s | decode_to_chunk() expected counter-block: : input "0x 00 6C B6 DB C0 54 3B 59 DA 48 D9 0B 00 00 00 03" 254s | decode_to_chunk() output: 254s | 00 6c b6 db c0 54 3b 59 da 48 d9 0b 00 00 00 03 .l...T;Y.H...... 254s | cipher_op_ctr_nss() enter AES_CTR 0x14b173b8a160 use IKEv1 IV wire_iv 0 count 0 254s | ctr_param: count 32 iv 006cb6dbc0543b59da48d90b00000001 254s | cipher_op_ctr_nss() counter-block updated from 0x1 to 0x3 for 32 bytes 254s | do_aes_ctr: exit 254s | cipher_op_context_destroy_ctr_nss() 254s | verify_bytes() Encrypting 32 octets using AES-CTR with 128-bit key: encrypt: ok 254s | verify_bytes() Encrypting 32 octets using AES-CTR with 128-bit key: counter-block: ok 254s | decode_to_mac() input counter-block: : input "0x 00 6C B6 DB C0 54 3B 59 DA 48 D9 0B 00 00 00 01" 254s | decode_to_mac() output: 254s | 00 6c b6 db c0 54 3b 59 da 48 d9 0b 00 00 00 01 .l...T;Y.H...... 254s | decode_to_chunk() Ciphertext: input "0x51 04 A1 06 16 8A 72 D9 79 0D 41 EE 8E DA D3 88EB 2E 1E FC 46 DA 57 C8 FC E6 30 DF 91 41 BE 28" 254s | decode_to_chunk() output: 254s | 51 04 a1 06 16 8a 72 d9 79 0d 41 ee 8e da d3 88 Q.....r.y.A..... 254s | eb 2e 1e fc 46 da 57 c8 fc e6 30 df 91 41 be 28 ....F.W...0..A.( 254s | decode_to_chunk() Plaintext: input "0x00 01 02 03 04 05 06 07 08 09 0A 0B 0C 0D 0E 0F10 11 12 13 14 15 16 17 18 19 1A 1B 1C 1D 1E 1F" 254s | decode_to_chunk() output: 254s | 00 01 02 03 04 05 06 07 08 09 0a 0b 0c 0d 0e 0f ................ 254s | 10 11 12 13 14 15 16 17 18 19 1a 1b 1c 1d 1e 1f ................ 254s | decode_to_chunk() expected counter-block: : input "0x 00 6C B6 DB C0 54 3B 59 DA 48 D9 0B 00 00 00 03" 254s | decode_to_chunk() output: 254s | 00 6c b6 db c0 54 3b 59 da 48 d9 0b 00 00 00 03 .l...T;Y.H...... 254s | cipher_op_ctr_nss() enter AES_CTR 0x14b173b8a160 use IKEv1 IV wire_iv 0 count 0 254s | ctr_param: count 32 iv 006cb6dbc0543b59da48d90b00000001 254s | cipher_op_ctr_nss() counter-block updated from 0x1 to 0x3 for 32 bytes 254s | do_aes_ctr: exit 254s | cipher_op_context_destroy_ctr_nss() 254s | verify_bytes() Encrypting 32 octets using AES-CTR with 128-bit key: decrypt: ok 254s | verify_bytes() Encrypting 32 octets using AES-CTR with 128-bit key: counter-block: ok 254s ipsec algparse: Encrypting 36 octets using AES-CTR with 128-bit key 254s | decode_to_chunk() raw_key: input "0x 76 91 BE 03 5E 50 20 A8 AC 6E 61 85 29 F9 A0 DC" 254s | decode_to_chunk() output: 254s | 76 91 be 03 5e 50 20 a8 ac 6e 61 85 29 f9 a0 dc v...^P ..na.)... 254s | CONCATENATE_DATA_AND_BASE: 254s | target: EXTRACT_KEY_FROM_KEY 254s | base: base-key@0x14b173b8a290 (16-bytes, AES_KEY_GEN) 254s | params: 16-bytes@0x7fffc0f80820 254s | key-offset: 0, key-size: 16 254s | EXTRACT_KEY_FROM_KEY: 254s | target: AES_CTR 254s | flags: ENCRYPT+DECRYPT 254s | key_size: 16-bytes 254s | base: base-key@0x14b173b8d2a0 (32-bytes, EXTRACT_KEY_FROM_KEY) 254s | operation: FLAGS_ONLY 254s | params: 8-bytes@0x7fffc0f80828 254s | decode_to_mac() input counter-block: : input "0x 00 E0 01 7B 27 77 7F 3F 4A 17 86 F0 00 00 00 01" 254s | decode_to_mac() output: 254s | 00 e0 01 7b 27 77 7f 3f 4a 17 86 f0 00 00 00 01 ...{'w.?J....... 254s | decode_to_chunk() Plaintext: input "0x00 01 02 03 04 05 06 07 08 09 0A 0B 0C 0D 0E 0F10 11 12 13 14 15 16 17 18 19 1A 1B 1C 1D 1E 1F20 21 22 23" 254s | decode_to_chunk() output: 254s | 00 01 02 03 04 05 06 07 08 09 0a 0b 0c 0d 0e 0f ................ 254s | 10 11 12 13 14 15 16 17 18 19 1a 1b 1c 1d 1e 1f ................ 254s | 20 21 22 23 !"# 254s | decode_to_chunk() Ciphertext: input "0xC1 CF 48 A8 9F 2F FD D9 CF 46 52 E9 EF DB 72 D745 40 A4 2B DE 6D 78 36 D5 9A 5C EA AE F3 10 5325 B2 07 2F" 254s | decode_to_chunk() output: 254s | c1 cf 48 a8 9f 2f fd d9 cf 46 52 e9 ef db 72 d7 ..H../...FR...r. 254s | 45 40 a4 2b de 6d 78 36 d5 9a 5c ea ae f3 10 53 E@.+.mx6..\....S 254s | 25 b2 07 2f %../ 254s | decode_to_chunk() expected counter-block: : input "0x 00 E0 01 7B 27 77 7F 3F 4A 17 86 F0 00 00 00 04" 254s | decode_to_chunk() output: 254s | 00 e0 01 7b 27 77 7f 3f 4a 17 86 f0 00 00 00 04 ...{'w.?J....... 254s | cipher_op_ctr_nss() enter AES_CTR 0x14b173b89fc0 use IKEv1 IV wire_iv 0 count 0 254s | ctr_param: count 32 iv 00e0017b27777f3f4a1786f000000001 254s | cipher_op_ctr_nss() counter-block updated from 0x1 to 0x4 for 36 bytes 254s | do_aes_ctr: exit 254s | cipher_op_context_destroy_ctr_nss() 254s | verify_bytes() Encrypting 36 octets using AES-CTR with 128-bit key: encrypt: ok 254s | verify_bytes() Encrypting 36 octets using AES-CTR with 128-bit key: counter-block: ok 254s | decode_to_mac() input counter-block: : input "0x 00 E0 01 7B 27 77 7F 3F 4A 17 86 F0 00 00 00 01" 254s | decode_to_mac() output: 254s | 00 e0 01 7b 27 77 7f 3f 4a 17 86 f0 00 00 00 01 ...{'w.?J....... 254s | decode_to_chunk() Ciphertext: input "0xC1 CF 48 A8 9F 2F FD D9 CF 46 52 E9 EF DB 72 D745 40 A4 2B DE 6D 78 36 D5 9A 5C EA AE F3 10 5325 B2 07 2F" 254s | decode_to_chunk() output: 254s | c1 cf 48 a8 9f 2f fd d9 cf 46 52 e9 ef db 72 d7 ..H../...FR...r. 254s | 45 40 a4 2b de 6d 78 36 d5 9a 5c ea ae f3 10 53 E@.+.mx6..\....S 254s | 25 b2 07 2f %../ 254s | decode_to_chunk() Plaintext: input "0x00 01 02 03 04 05 06 07 08 09 0A 0B 0C 0D 0E 0F10 11 12 13 14 15 16 17 18 19 1A 1B 1C 1D 1E 1F20 21 22 23" 254s | decode_to_chunk() output: 254s | 00 01 02 03 04 05 06 07 08 09 0a 0b 0c 0d 0e 0f ................ 254s | 10 11 12 13 14 15 16 17 18 19 1a 1b 1c 1d 1e 1f ................ 254s | 20 21 22 23 !"# 254s | decode_to_chunk() expected counter-block: : input "0x 00 E0 01 7B 27 77 7F 3F 4A 17 86 F0 00 00 00 04" 254s | decode_to_chunk() output: 254s | 00 e0 01 7b 27 77 7f 3f 4a 17 86 f0 00 00 00 04 ...{'w.?J....... 254s | cipher_op_ctr_nss() enter AES_CTR 0x14b173b89fc0 use IKEv1 IV wire_iv 0 count 0 254s | ctr_param: count 32 iv 00e0017b27777f3f4a1786f000000001 254s | cipher_op_ctr_nss() counter-block updated from 0x1 to 0x4 for 36 bytes 254s | do_aes_ctr: exit 254s | cipher_op_context_destroy_ctr_nss() 254s | verify_bytes() Encrypting 36 octets using AES-CTR with 128-bit key: decrypt: ok 254s | verify_bytes() Encrypting 36 octets using AES-CTR with 128-bit key: counter-block: ok 254s ipsec algparse: Encrypting 16 octets using AES-CTR with 192-bit key 254s | decode_to_chunk() raw_key: input "0x16 AF 5B 14 5F C9 F5 79 C1 75 F9 3E 3B FB 0E ED86 3D 06 CC FD B7 85 15" 254s | decode_to_chunk() output: 254s | 16 af 5b 14 5f c9 f5 79 c1 75 f9 3e 3b fb 0e ed ..[._..y.u.>;... 254s | 86 3d 06 cc fd b7 85 15 .=...... 254s | CONCATENATE_DATA_AND_BASE: 254s | target: EXTRACT_KEY_FROM_KEY 254s | base: base-key@0x14b173b8a290 (16-bytes, AES_KEY_GEN) 254s | params: 16-bytes@0x7fffc0f80820 254s | key-offset: 0, key-size: 24 254s | EXTRACT_KEY_FROM_KEY: 254s | target: AES_CTR 254s | flags: ENCRYPT+DECRYPT 254s | key_size: 24-bytes 254s | base: base-key@0x14b173b8d2a0 (40-bytes, EXTRACT_KEY_FROM_KEY) 254s | operation: FLAGS_ONLY 254s | params: 8-bytes@0x7fffc0f80828 254s | decode_to_mac() input counter-block: : input "0x 00 00 00 48 36 73 3C 14 7D 6D 93 CB 00 00 00 01" 254s | decode_to_mac() output: 254s | 00 00 00 48 36 73 3c 14 7d 6d 93 cb 00 00 00 01 ...H6s<.}m...... 254s | decode_to_chunk() Plaintext: input "0x 53 69 6E 67 6C 65 20 62 6C 6F 63 6B 20 6D 73 67" 254s | decode_to_chunk() output: 254s | 53 69 6e 67 6c 65 20 62 6c 6f 63 6b 20 6d 73 67 Single block msg 254s | decode_to_chunk() Ciphertext: input "0x 4B 55 38 4F E2 59 C9 C8 4E 79 35 A0 03 CB E9 28" 254s | decode_to_chunk() output: 254s | 4b 55 38 4f e2 59 c9 c8 4e 79 35 a0 03 cb e9 28 KU8O.Y..Ny5....( 254s | decode_to_chunk() expected counter-block: : input "0x 00 00 00 48 36 73 3C 14 7D 6D 93 CB 00 00 00 02" 254s | decode_to_chunk() output: 254s | 00 00 00 48 36 73 3c 14 7d 6d 93 cb 00 00 00 02 ...H6s<.}m...... 254s | cipher_op_ctr_nss() enter AES_CTR 0x14b173b8dbe0 use IKEv1 IV wire_iv 0 count 0 254s | ctr_param: count 32 iv 0000004836733c147d6d93cb00000001 254s | cipher_op_ctr_nss() counter-block updated from 0x1 to 0x2 for 16 bytes 254s | do_aes_ctr: exit 254s | cipher_op_context_destroy_ctr_nss() 254s | verify_bytes() Encrypting 16 octets using AES-CTR with 192-bit key: encrypt: ok 254s | verify_bytes() Encrypting 16 octets using AES-CTR with 192-bit key: counter-block: ok 254s | decode_to_mac() input counter-block: : input "0x 00 00 00 48 36 73 3C 14 7D 6D 93 CB 00 00 00 01" 254s | decode_to_mac() output: 254s | 00 00 00 48 36 73 3c 14 7d 6d 93 cb 00 00 00 01 ...H6s<.}m...... 254s | decode_to_chunk() Ciphertext: input "0x 4B 55 38 4F E2 59 C9 C8 4E 79 35 A0 03 CB E9 28" 254s | decode_to_chunk() output: 254s | 4b 55 38 4f e2 59 c9 c8 4e 79 35 a0 03 cb e9 28 KU8O.Y..Ny5....( 254s | decode_to_chunk() Plaintext: input "0x 53 69 6E 67 6C 65 20 62 6C 6F 63 6B 20 6D 73 67" 254s | decode_to_chunk() output: 254s | 53 69 6e 67 6c 65 20 62 6c 6f 63 6b 20 6d 73 67 Single block msg 254s | decode_to_chunk() expected counter-block: : input "0x 00 00 00 48 36 73 3C 14 7D 6D 93 CB 00 00 00 02" 254s | decode_to_chunk() output: 254s | 00 00 00 48 36 73 3c 14 7d 6d 93 cb 00 00 00 02 ...H6s<.}m...... 254s | cipher_op_ctr_nss() enter AES_CTR 0x14b173b8dbe0 use IKEv1 IV wire_iv 0 count 0 254s | ctr_param: count 32 iv 0000004836733c147d6d93cb00000001 254s | cipher_op_ctr_nss() counter-block updated from 0x1 to 0x2 for 16 bytes 254s | do_aes_ctr: exit 254s | cipher_op_context_destroy_ctr_nss() 254s | verify_bytes() Encrypting 16 octets using AES-CTR with 192-bit key: decrypt: ok 254s | verify_bytes() Encrypting 16 octets using AES-CTR with 192-bit key: counter-block: ok 254s ipsec algparse: Encrypting 32 octets using AES-CTR with 192-bit key 254s | decode_to_chunk() raw_key: input "0x7C 5C B2 40 1B 3D C3 3C 19 E7 34 08 19 E0 F6 9C67 8C 3D B8 E6 F6 A9 1A" 254s | decode_to_chunk() output: 254s | 7c 5c b2 40 1b 3d c3 3c 19 e7 34 08 19 e0 f6 9c |\.@.=.<..4..... 254s | 67 8c 3d b8 e6 f6 a9 1a g.=..... 254s | CONCATENATE_DATA_AND_BASE: 254s | target: EXTRACT_KEY_FROM_KEY 254s | base: base-key@0x14b173b8a290 (16-bytes, AES_KEY_GEN) 254s | params: 16-bytes@0x7fffc0f80820 254s | key-offset: 0, key-size: 24 254s | EXTRACT_KEY_FROM_KEY: 254s | target: AES_CTR 254s | flags: ENCRYPT+DECRYPT 254s | key_size: 24-bytes 254s | base: base-key@0x14b173b8d2a0 (40-bytes, EXTRACT_KEY_FROM_KEY) 254s | operation: FLAGS_ONLY 254s | params: 8-bytes@0x7fffc0f80828 254s | decode_to_mac() input counter-block: : input "0x 00 96 B0 3B 02 0C 6E AD C2 CB 50 0D 00 00 00 01" 254s | decode_to_mac() output: 254s | 00 96 b0 3b 02 0c 6e ad c2 cb 50 0d 00 00 00 01 ...;..n...P..... 254s | decode_to_chunk() Plaintext: input "0x00 01 02 03 04 05 06 07 08 09 0A 0B 0C 0D 0E 0F10 11 12 13 14 15 16 17 18 19 1A 1B 1C 1D 1E 1F" 254s | decode_to_chunk() output: 254s | 00 01 02 03 04 05 06 07 08 09 0a 0b 0c 0d 0e 0f ................ 254s | 10 11 12 13 14 15 16 17 18 19 1a 1b 1c 1d 1e 1f ................ 254s | decode_to_chunk() Ciphertext: input "0x45 32 43 FC 60 9B 23 32 7E DF AA FA 71 31 CD 9F84 90 70 1C 5A D4 A7 9C FC 1F E0 FF 42 F4 FB 00" 254s | decode_to_chunk() output: 254s | 45 32 43 fc 60 9b 23 32 7e df aa fa 71 31 cd 9f E2C.`.#2~...q1.. 254s | 84 90 70 1c 5a d4 a7 9c fc 1f e0 ff 42 f4 fb 00 ..p.Z.......B... 254s | decode_to_chunk() expected counter-block: : input "0x 00 96 B0 3B 02 0C 6E AD C2 CB 50 0D 00 00 00 03" 254s | decode_to_chunk() output: 254s | 00 96 b0 3b 02 0c 6e ad c2 cb 50 0d 00 00 00 03 ...;..n...P..... 254s | cipher_op_ctr_nss() enter AES_CTR 0x14b173b89fc0 use IKEv1 IV wire_iv 0 count 0 254s | ctr_param: count 32 iv 0096b03b020c6eadc2cb500d00000001 254s | cipher_op_ctr_nss() counter-block updated from 0x1 to 0x3 for 32 bytes 254s | do_aes_ctr: exit 254s | cipher_op_context_destroy_ctr_nss() 254s | verify_bytes() Encrypting 32 octets using AES-CTR with 192-bit key: encrypt: ok 254s | verify_bytes() Encrypting 32 octets using AES-CTR with 192-bit key: counter-block: ok 254s | decode_to_mac() input counter-block: : input "0x 00 96 B0 3B 02 0C 6E AD C2 CB 50 0D 00 00 00 01" 254s | decode_to_mac() output: 254s | 00 96 b0 3b 02 0c 6e ad c2 cb 50 0d 00 00 00 01 ...;..n...P..... 254s | decode_to_chunk() Ciphertext: input "0x45 32 43 FC 60 9B 23 32 7E DF AA FA 71 31 CD 9F84 90 70 1C 5A D4 A7 9C FC 1F E0 FF 42 F4 FB 00" 254s | decode_to_chunk() output: 254s | 45 32 43 fc 60 9b 23 32 7e df aa fa 71 31 cd 9f E2C.`.#2~...q1.. 254s | 84 90 70 1c 5a d4 a7 9c fc 1f e0 ff 42 f4 fb 00 ..p.Z.......B... 254s | decode_to_chunk() Plaintext: input "0x00 01 02 03 04 05 06 07 08 09 0A 0B 0C 0D 0E 0F10 11 12 13 14 15 16 17 18 19 1A 1B 1C 1D 1E 1F" 254s | decode_to_chunk() output: 254s | 00 01 02 03 04 05 06 07 08 09 0a 0b 0c 0d 0e 0f ................ 254s | 10 11 12 13 14 15 16 17 18 19 1a 1b 1c 1d 1e 1f ................ 254s | decode_to_chunk() expected counter-block: : input "0x 00 96 B0 3B 02 0C 6E AD C2 CB 50 0D 00 00 00 03" 254s | decode_to_chunk() output: 254s | 00 96 b0 3b 02 0c 6e ad c2 cb 50 0d 00 00 00 03 ...;..n...P..... 254s | cipher_op_ctr_nss() enter AES_CTR 0x14b173b89fc0 use IKEv1 IV wire_iv 0 count 0 254s | ctr_param: count 32 iv 0096b03b020c6eadc2cb500d00000001 254s | cipher_op_ctr_nss() counter-block updated from 0x1 to 0x3 for 32 bytes 254s | do_aes_ctr: exit 254s | cipher_op_context_destroy_ctr_nss() 254s | verify_bytes() Encrypting 32 octets using AES-CTR with 192-bit key: decrypt: ok 254s | verify_bytes() Encrypting 32 octets using AES-CTR with 192-bit key: counter-block: ok 254s ipsec algparse: Encrypting 36 octets using AES-CTR with 192-bit key 254s | decode_to_chunk() raw_key: input "0x02 BF 39 1E E8 EC B1 59 B9 59 61 7B 09 65 27 9BF5 9B 60 A7 86 D3 E0 FE" 254s | decode_to_chunk() output: 254s | 02 bf 39 1e e8 ec b1 59 b9 59 61 7b 09 65 27 9b ..9....Y.Ya{.e'. 254s | f5 9b 60 a7 86 d3 e0 fe ..`..... 254s | CONCATENATE_DATA_AND_BASE: 254s | target: EXTRACT_KEY_FROM_KEY 254s | base: base-key@0x14b173b8a290 (16-bytes, AES_KEY_GEN) 254s | params: 16-bytes@0x7fffc0f80820 254s | key-offset: 0, key-size: 24 254s | EXTRACT_KEY_FROM_KEY: 254s | target: AES_CTR 254s | flags: ENCRYPT+DECRYPT 254s | key_size: 24-bytes 254s | base: base-key@0x14b173b8d2a0 (40-bytes, EXTRACT_KEY_FROM_KEY) 254s | operation: FLAGS_ONLY 254s | params: 8-bytes@0x7fffc0f80828 254s | decode_to_mac() input counter-block: : input "0x 00 07 BD FD 5C BD 60 27 8D CC 09 12 00 00 00 01" 254s | decode_to_mac() output: 254s | 00 07 bd fd 5c bd 60 27 8d cc 09 12 00 00 00 01 ....\.`'........ 254s | decode_to_chunk() Plaintext: input "0x00 01 02 03 04 05 06 07 08 09 0A 0B 0C 0D 0E 0F10 11 12 13 14 15 16 17 18 19 1A 1B 1C 1D 1E 1F20 21 22 23" 254s | decode_to_chunk() output: 254s | 00 01 02 03 04 05 06 07 08 09 0a 0b 0c 0d 0e 0f ................ 254s | 10 11 12 13 14 15 16 17 18 19 1a 1b 1c 1d 1e 1f ................ 254s | 20 21 22 23 !"# 254s | decode_to_chunk() Ciphertext: input "0x96 89 3F C5 5E 5C 72 2F 54 0B 7D D1 DD F7 E7 58D2 88 BC 95 C6 91 65 88 45 36 C8 11 66 2F 21 88AB EE 09 35" 254s | decode_to_chunk() output: 254s | 96 89 3f c5 5e 5c 72 2f 54 0b 7d d1 dd f7 e7 58 ..?.^\r/T.}....X 254s | d2 88 bc 95 c6 91 65 88 45 36 c8 11 66 2f 21 88 ......e.E6..f/!. 254s | ab ee 09 35 ...5 254s | decode_to_chunk() expected counter-block: : input "0x 00 07 BD FD 5C BD 60 27 8D CC 09 12 00 00 00 04" 254s | decode_to_chunk() output: 254s | 00 07 bd fd 5c bd 60 27 8d cc 09 12 00 00 00 04 ....\.`'........ 254s | cipher_op_ctr_nss() enter AES_CTR 0x14b173b89fc0 use IKEv1 IV wire_iv 0 count 0 254s | ctr_param: count 32 iv 0007bdfd5cbd60278dcc091200000001 254s | cipher_op_ctr_nss() counter-block updated from 0x1 to 0x4 for 36 bytes 254s | do_aes_ctr: exit 254s | cipher_op_context_destroy_ctr_nss() 254s | verify_bytes() Encrypting 36 octets using AES-CTR with 192-bit key: encrypt: ok 254s | verify_bytes() Encrypting 36 octets using AES-CTR with 192-bit key: counter-block: ok 254s | decode_to_mac() input counter-block: : input "0x 00 07 BD FD 5C BD 60 27 8D CC 09 12 00 00 00 01" 254s | decode_to_mac() output: 254s | 00 07 bd fd 5c bd 60 27 8d cc 09 12 00 00 00 01 ....\.`'........ 254s | decode_to_chunk() Ciphertext: input "0x96 89 3F C5 5E 5C 72 2F 54 0B 7D D1 DD F7 E7 58D2 88 BC 95 C6 91 65 88 45 36 C8 11 66 2F 21 88AB EE 09 35" 254s | decode_to_chunk() output: 254s | 96 89 3f c5 5e 5c 72 2f 54 0b 7d d1 dd f7 e7 58 ..?.^\r/T.}....X 254s | d2 88 bc 95 c6 91 65 88 45 36 c8 11 66 2f 21 88 ......e.E6..f/!. 254s | ab ee 09 35 ...5 254s | decode_to_chunk() Plaintext: input "0x00 01 02 03 04 05 06 07 08 09 0A 0B 0C 0D 0E 0F10 11 12 13 14 15 16 17 18 19 1A 1B 1C 1D 1E 1F20 21 22 23" 254s | decode_to_chunk() output: 254s | 00 01 02 03 04 05 06 07 08 09 0a 0b 0c 0d 0e 0f ................ 254s | 10 11 12 13 14 15 16 17 18 19 1a 1b 1c 1d 1e 1f ................ 254s | 20 21 22 23 !"# 254s | decode_to_chunk() expected counter-block: : input "0x 00 07 BD FD 5C BD 60 27 8D CC 09 12 00 00 00 04" 254s | decode_to_chunk() output: 254s | 00 07 bd fd 5c bd 60 27 8d cc 09 12 00 00 00 04 ....\.`'........ 254s | cipher_op_ctr_nss() enter AES_CTR 0x14b173b89fc0 use IKEv1 IV wire_iv 0 count 0 254s | ctr_param: count 32 iv 0007bdfd5cbd60278dcc091200000001 254s | cipher_op_ctr_nss() counter-block updated from 0x1 to 0x4 for 36 bytes 254s | do_aes_ctr: exit 254s | cipher_op_context_destroy_ctr_nss() 254s | verify_bytes() Encrypting 36 octets using AES-CTR with 192-bit key: decrypt: ok 254s | verify_bytes() Encrypting 36 octets using AES-CTR with 192-bit key: counter-block: ok 254s ipsec algparse: Encrypting 16 octets using AES-CTR with 256-bit key 254s | decode_to_chunk() raw_key: input "0x77 6B EF F2 85 1D B0 6F 4C 8A 05 42 C8 69 6F 6C6A 81 AF 1E EC 96 B4 D3 7F C1 D6 89 E6 C1 C1 04" 254s | decode_to_chunk() output: 254s | 77 6b ef f2 85 1d b0 6f 4c 8a 05 42 c8 69 6f 6c wk.....oL..B.iol 254s | 6a 81 af 1e ec 96 b4 d3 7f c1 d6 89 e6 c1 c1 04 j............... 254s | CONCATENATE_DATA_AND_BASE: 254s | target: EXTRACT_KEY_FROM_KEY 254s | base: base-key@0x14b173b8a290 (16-bytes, AES_KEY_GEN) 254s | params: 16-bytes@0x7fffc0f80820 254s | key-offset: 0, key-size: 32 254s | EXTRACT_KEY_FROM_KEY: 254s | target: AES_CTR 254s | flags: ENCRYPT+DECRYPT 254s | key_size: 32-bytes 254s | base: base-key@0x14b173b8d2a0 (48-bytes, EXTRACT_KEY_FROM_KEY) 254s | operation: FLAGS_ONLY 254s | params: 8-bytes@0x7fffc0f80828 254s | decode_to_mac() input counter-block: : input "0x 00 00 00 60 DB 56 72 C9 7A A8 F0 B2 00 00 00 01" 254s | decode_to_mac() output: 254s | 00 00 00 60 db 56 72 c9 7a a8 f0 b2 00 00 00 01 ...`.Vr.z....... 254s | decode_to_chunk() Plaintext: input "0x 53 69 6E 67 6C 65 20 62 6C 6F 63 6B 20 6D 73 67" 254s | decode_to_chunk() output: 254s | 53 69 6e 67 6c 65 20 62 6c 6f 63 6b 20 6d 73 67 Single block msg 254s | decode_to_chunk() Ciphertext: input "0x 14 5A D0 1D BF 82 4E C7 56 08 63 DC 71 E3 E0 C0" 254s | decode_to_chunk() output: 254s | 14 5a d0 1d bf 82 4e c7 56 08 63 dc 71 e3 e0 c0 .Z....N.V.c.q... 254s | decode_to_chunk() expected counter-block: : input "0x 00 00 00 60 DB 56 72 C9 7A A8 F0 B2 00 00 00 02" 254s | decode_to_chunk() output: 254s | 00 00 00 60 db 56 72 c9 7a a8 f0 b2 00 00 00 02 ...`.Vr.z....... 254s | cipher_op_ctr_nss() enter AES_CTR 0x14b173b8dbe0 use IKEv1 IV wire_iv 0 count 0 254s | ctr_param: count 32 iv 00000060db5672c97aa8f0b200000001 254s | cipher_op_ctr_nss() counter-block updated from 0x1 to 0x2 for 16 bytes 254s | do_aes_ctr: exit 254s | cipher_op_context_destroy_ctr_nss() 254s | verify_bytes() Encrypting 16 octets using AES-CTR with 256-bit key: encrypt: ok 254s | verify_bytes() Encrypting 16 octets using AES-CTR with 256-bit key: counter-block: ok 254s | decode_to_mac() input counter-block: : input "0x 00 00 00 60 DB 56 72 C9 7A A8 F0 B2 00 00 00 01" 254s | decode_to_mac() output: 254s | 00 00 00 60 db 56 72 c9 7a a8 f0 b2 00 00 00 01 ...`.Vr.z....... 254s | decode_to_chunk() Ciphertext: input "0x 14 5A D0 1D BF 82 4E C7 56 08 63 DC 71 E3 E0 C0" 254s | decode_to_chunk() output: 254s | 14 5a d0 1d bf 82 4e c7 56 08 63 dc 71 e3 e0 c0 .Z....N.V.c.q... 254s | decode_to_chunk() Plaintext: input "0x 53 69 6E 67 6C 65 20 62 6C 6F 63 6B 20 6D 73 67" 254s | decode_to_chunk() output: 254s | 53 69 6e 67 6c 65 20 62 6c 6f 63 6b 20 6d 73 67 Single block msg 254s | decode_to_chunk() expected counter-block: : input "0x 00 00 00 60 DB 56 72 C9 7A A8 F0 B2 00 00 00 02" 254s | decode_to_chunk() output: 254s | 00 00 00 60 db 56 72 c9 7a a8 f0 b2 00 00 00 02 ...`.Vr.z....... 254s | cipher_op_ctr_nss() enter AES_CTR 0x14b173b8dbe0 use IKEv1 IV wire_iv 0 count 0 254s | ctr_param: count 32 iv 00000060db5672c97aa8f0b200000001 254s | cipher_op_ctr_nss() counter-block updated from 0x1 to 0x2 for 16 bytes 254s | do_aes_ctr: exit 254s | cipher_op_context_destroy_ctr_nss() 254s | verify_bytes() Encrypting 16 octets using AES-CTR with 256-bit key: decrypt: ok 254s | verify_bytes() Encrypting 16 octets using AES-CTR with 256-bit key: counter-block: ok 254s ipsec algparse: Encrypting 32 octets using AES-CTR with 256-bit key 254s | decode_to_chunk() raw_key: input "0xF6 D6 6D 6B D5 2D 59 BB 07 96 36 58 79 EF F8 86C6 6D D5 1A 5B 6A 99 74 4B 50 59 0C 87 A2 38 84" 254s | decode_to_chunk() output: 254s | f6 d6 6d 6b d5 2d 59 bb 07 96 36 58 79 ef f8 86 ..mk.-Y...6Xy... 254s | c6 6d d5 1a 5b 6a 99 74 4b 50 59 0c 87 a2 38 84 .m..[j.tKPY...8. 254s | CONCATENATE_DATA_AND_BASE: 254s | target: EXTRACT_KEY_FROM_KEY 254s | base: base-key@0x14b173b8a290 (16-bytes, AES_KEY_GEN) 254s | params: 16-bytes@0x7fffc0f80820 254s | key-offset: 0, key-size: 32 254s | EXTRACT_KEY_FROM_KEY: 254s | target: AES_CTR 254s | flags: ENCRYPT+DECRYPT 254s | key_size: 32-bytes 254s | base: base-key@0x14b173b8d2a0 (48-bytes, EXTRACT_KEY_FROM_KEY) 254s | operation: FLAGS_ONLY 254s | params: 8-bytes@0x7fffc0f80828 254s | decode_to_mac() input counter-block: : input "0x 00 FA AC 24 C1 58 5E F1 5A 43 D8 75 00 00 00 01" 254s | decode_to_mac() output: 254s | 00 fa ac 24 c1 58 5e f1 5a 43 d8 75 00 00 00 01 ...$.X^.ZC.u.... 254s | decode_to_chunk() Plaintext: input "0x00 01 02 03 04 05 06 07 08 09 0A 0B 0C 0D 0E 0F10 11 12 13 14 15 16 17 18 19 1A 1B 1C 1D 1E 1F" 254s | decode_to_chunk() output: 254s | 00 01 02 03 04 05 06 07 08 09 0a 0b 0c 0d 0e 0f ................ 254s | 10 11 12 13 14 15 16 17 18 19 1a 1b 1c 1d 1e 1f ................ 254s | decode_to_chunk() Ciphertext: input "0xF0 5E 23 1B 38 94 61 2C 49 EE 00 0B 80 4E B2 A9B8 30 6B 50 8F 83 9D 6A 55 30 83 1D 93 44 AF 1C" 254s | decode_to_chunk() output: 254s | f0 5e 23 1b 38 94 61 2c 49 ee 00 0b 80 4e b2 a9 .^#.8.a,I....N.. 254s | b8 30 6b 50 8f 83 9d 6a 55 30 83 1d 93 44 af 1c .0kP...jU0...D.. 254s | decode_to_chunk() expected counter-block: : input "0x 00 FA AC 24 C1 58 5E F1 5A 43 D8 75 00 00 00 03" 254s | decode_to_chunk() output: 254s | 00 fa ac 24 c1 58 5e f1 5a 43 d8 75 00 00 00 03 ...$.X^.ZC.u.... 254s | cipher_op_ctr_nss() enter AES_CTR 0x14b173b89fc0 use IKEv1 IV wire_iv 0 count 0 254s | ctr_param: count 32 iv 00faac24c1585ef15a43d87500000001 254s | cipher_op_ctr_nss() counter-block updated from 0x1 to 0x3 for 32 bytes 254s | do_aes_ctr: exit 254s | cipher_op_context_destroy_ctr_nss() 254s | verify_bytes() Encrypting 32 octets using AES-CTR with 256-bit key: encrypt: ok 254s | verify_bytes() Encrypting 32 octets using AES-CTR with 256-bit key: counter-block: ok 254s | decode_to_mac() input counter-block: : input "0x 00 FA AC 24 C1 58 5E F1 5A 43 D8 75 00 00 00 01" 254s | decode_to_mac() output: 254s | 00 fa ac 24 c1 58 5e f1 5a 43 d8 75 00 00 00 01 ...$.X^.ZC.u.... 254s | decode_to_chunk() Ciphertext: input "0xF0 5E 23 1B 38 94 61 2C 49 EE 00 0B 80 4E B2 A9B8 30 6B 50 8F 83 9D 6A 55 30 83 1D 93 44 AF 1C" 254s | decode_to_chunk() output: 254s | f0 5e 23 1b 38 94 61 2c 49 ee 00 0b 80 4e b2 a9 .^#.8.a,I....N.. 254s | b8 30 6b 50 8f 83 9d 6a 55 30 83 1d 93 44 af 1c .0kP...jU0...D.. 254s | decode_to_chunk() Plaintext: input "0x00 01 02 03 04 05 06 07 08 09 0A 0B 0C 0D 0E 0F10 11 12 13 14 15 16 17 18 19 1A 1B 1C 1D 1E 1F" 254s | decode_to_chunk() output: 254s | 00 01 02 03 04 05 06 07 08 09 0a 0b 0c 0d 0e 0f ................ 254s | 10 11 12 13 14 15 16 17 18 19 1a 1b 1c 1d 1e 1f ................ 254s | decode_to_chunk() expected counter-block: : input "0x 00 FA AC 24 C1 58 5E F1 5A 43 D8 75 00 00 00 03" 254s | decode_to_chunk() output: 254s | 00 fa ac 24 c1 58 5e f1 5a 43 d8 75 00 00 00 03 ...$.X^.ZC.u.... 254s | cipher_op_ctr_nss() enter AES_CTR 0x14b173b89fc0 use IKEv1 IV wire_iv 0 count 0 254s | ctr_param: count 32 iv 00faac24c1585ef15a43d87500000001 254s | cipher_op_ctr_nss() counter-block updated from 0x1 to 0x3 for 32 bytes 254s | do_aes_ctr: exit 254s | cipher_op_context_destroy_ctr_nss() 254s | verify_bytes() Encrypting 32 octets using AES-CTR with 256-bit key: decrypt: ok 254s | verify_bytes() Encrypting 32 octets using AES-CTR with 256-bit key: counter-block: ok 254s ipsec algparse: Encrypting 36 octets using AES-CTR with 256-bit key 254s | decode_to_chunk() raw_key: input "0xFF 7A 61 7C E6 91 48 E4 F1 72 6E 2F 43 58 1D E2AA 62 D9 F8 05 53 2E DF F1 EE D6 87 FB 54 15 3D" 254s | decode_to_chunk() output: 254s | ff 7a 61 7c e6 91 48 e4 f1 72 6e 2f 43 58 1d e2 .za|..H..rn/CX.. 254s | aa 62 d9 f8 05 53 2e df f1 ee d6 87 fb 54 15 3d .b...S.......T.= 254s | CONCATENATE_DATA_AND_BASE: 254s | target: EXTRACT_KEY_FROM_KEY 254s | base: base-key@0x14b173b8a290 (16-bytes, AES_KEY_GEN) 254s | params: 16-bytes@0x7fffc0f80820 254s | key-offset: 0, key-size: 32 254s | EXTRACT_KEY_FROM_KEY: 254s | target: AES_CTR 254s | flags: ENCRYPT+DECRYPT 254s | key_size: 32-bytes 254s | base: base-key@0x14b173b8d2a0 (48-bytes, EXTRACT_KEY_FROM_KEY) 254s | operation: FLAGS_ONLY 254s | params: 8-bytes@0x7fffc0f80828 254s | decode_to_mac() input counter-block: : input "0x 00 1C C5 B7 51 A5 1D 70 A1 C1 11 48 00 00 00 01" 254s | decode_to_mac() output: 254s | 00 1c c5 b7 51 a5 1d 70 a1 c1 11 48 00 00 00 01 ....Q..p...H.... 254s | decode_to_chunk() Plaintext: input "0x00 01 02 03 04 05 06 07 08 09 0A 0B 0C 0D 0E 0F10 11 12 13 14 15 16 17 18 19 1A 1B 1C 1D 1E 1F20 21 22 23" 254s | decode_to_chunk() output: 254s | 00 01 02 03 04 05 06 07 08 09 0a 0b 0c 0d 0e 0f ................ 254s | 10 11 12 13 14 15 16 17 18 19 1a 1b 1c 1d 1e 1f ................ 254s | 20 21 22 23 !"# 254s | decode_to_chunk() Ciphertext: input "0xEB 6C 52 82 1D 0B BB F7 CE 75 94 46 2A CA 4F AAB4 07 DF 86 65 69 FD 07 F4 8C C0 B5 83 D6 07 1F1E C0 E6 B8" 254s | decode_to_chunk() output: 254s | eb 6c 52 82 1d 0b bb f7 ce 75 94 46 2a ca 4f aa .lR......u.F*.O. 254s | b4 07 df 86 65 69 fd 07 f4 8c c0 b5 83 d6 07 1f ....ei.......... 254s | 1e c0 e6 b8 .... 254s | decode_to_chunk() expected counter-block: : input "0x 00 1C C5 B7 51 A5 1D 70 A1 C1 11 48 00 00 00 04" 254s | decode_to_chunk() output: 254s | 00 1c c5 b7 51 a5 1d 70 a1 c1 11 48 00 00 00 04 ....Q..p...H.... 254s | cipher_op_ctr_nss() enter AES_CTR 0x14b173b89fc0 use IKEv1 IV wire_iv 0 count 0 254s | ctr_param: count 32 iv 001cc5b751a51d70a1c1114800000001 254s | cipher_op_ctr_nss() counter-block updated from 0x1 to 0x4 for 36 bytes 254s | do_aes_ctr: exit 254s | cipher_op_context_destroy_ctr_nss() 254s | verify_bytes() Encrypting 36 octets using AES-CTR with 256-bit key: encrypt: ok 254s | verify_bytes() Encrypting 36 octets using AES-CTR with 256-bit key: counter-block: ok 254s | decode_to_mac() input counter-block: : input "0x 00 1C C5 B7 51 A5 1D 70 A1 C1 11 48 00 00 00 01" 254s | decode_to_mac() output: 254s | 00 1c c5 b7 51 a5 1d 70 a1 c1 11 48 00 00 00 01 ....Q..p...H.... 254s | decode_to_chunk() Ciphertext: input "0xEB 6C 52 82 1D 0B BB F7 CE 75 94 46 2A CA 4F AAB4 07 DF 86 65 69 FD 07 F4 8C C0 B5 83 D6 07 1F1E C0 E6 B8" 254s | decode_to_chunk() output: 254s | eb 6c 52 82 1d 0b bb f7 ce 75 94 46 2a ca 4f aa .lR......u.F*.O. 254s | b4 07 df 86 65 69 fd 07 f4 8c c0 b5 83 d6 07 1f ....ei.......... 254s | 1e c0 e6 b8 .... 254s | decode_to_chunk() Plaintext: input "0x00 01 02 03 04 05 06 07 08 09 0A 0B 0C 0D 0E 0F10 11 12 13 14 15 16 17 18 19 1A 1B 1C 1D 1E 1F20 21 22 23" 254s | decode_to_chunk() output: 254s | 00 01 02 03 04 05 06 07 08 09 0a 0b 0c 0d 0e 0f ................ 254s | 10 11 12 13 14 15 16 17 18 19 1a 1b 1c 1d 1e 1f ................ 254s | 20 21 22 23 !"# 254s | decode_to_chunk() expected counter-block: : input "0x 00 1C C5 B7 51 A5 1D 70 A1 C1 11 48 00 00 00 04" 254s | decode_to_chunk() output: 254s | 00 1c c5 b7 51 a5 1d 70 a1 c1 11 48 00 00 00 04 ....Q..p...H.... 254s | cipher_op_ctr_nss() enter AES_CTR 0x14b173b89fc0 use IKEv1 IV wire_iv 0 count 0 254s | ctr_param: count 32 iv 001cc5b751a51d70a1c1114800000001 254s | cipher_op_ctr_nss() counter-block updated from 0x1 to 0x4 for 36 bytes 254s | do_aes_ctr: exit 254s | cipher_op_context_destroy_ctr_nss() 254s | verify_bytes() Encrypting 36 octets using AES-CTR with 256-bit key: decrypt: ok 254s | verify_bytes() Encrypting 36 octets using AES-CTR with 256-bit key: counter-block: ok 254s ipsec algparse: testing AES_CBC: 254s ipsec algparse: Encrypting 16 bytes (1 block) using AES-CBC with 128-bit key 254s | decode_to_chunk() raw_key: input "0x06a9214036b8a15b512e03d534120006" 254s | decode_to_chunk() output: 254s | 06 a9 21 40 36 b8 a1 5b 51 2e 03 d5 34 12 00 06 ..!@6..[Q...4... 254s | CONCATENATE_DATA_AND_BASE: 254s | target: EXTRACT_KEY_FROM_KEY 254s | base: base-key@0x14b173b8a290 (16-bytes, AES_KEY_GEN) 254s | params: 16-bytes@0x7fffc0f80830 254s | key-offset: 0, key-size: 16 254s | EXTRACT_KEY_FROM_KEY: 254s | target: AES_CBC 254s | flags: ENCRYPT+DECRYPT 254s | key_size: 16-bytes 254s | base: base-key@0x14b173b8d2a0 (32-bytes, EXTRACT_KEY_FROM_KEY) 254s | operation: FLAGS_ONLY 254s | params: 8-bytes@0x7fffc0f80838 254s | decode_to_mac() IV: : input "0x3dafba429d9eb430b422da802c9fac41" 254s | decode_to_mac() output: 254s | 3d af ba 42 9d 9e b4 30 b4 22 da 80 2c 9f ac 41 =..B...0."..,..A 254s | decode_to_chunk() new IV: : input "0xe353779c1079aeb82708942dbe77181a" 254s | decode_to_chunk() output: 254s | e3 53 77 9c 10 79 ae b8 27 08 94 2d be 77 18 1a .Sw..y..'..-.w.. 254s | decode_to_chunk() plaintext: : input "Single block msg" 254s | decode_to_chunk() output: 254s | 53 69 6e 67 6c 65 20 62 6c 6f 63 6b 20 6d 73 67 Single block msg 254s | decode_to_chunk() ciphertext: : input "0xe353779c1079aeb82708942dbe77181a" 254s | decode_to_chunk() output: 254s | e3 53 77 9c 10 79 ae b8 27 08 94 2d be 77 18 1a .Sw..y..'..-.w.. 254s | NSS ike_alg_nss_cbc: AES_CBC - enter (nil) 254s | using IKEv1 IV 254s | NSS ike_alg_nss_cbc: AES_CBC - exit 254s | verify_bytes() Encrypting 16 bytes (1 block) using AES-CBC with 128-bit key: encrypt: ok 254s | verify_bytes() Encrypting 16 bytes (1 block) using AES-CBC with 128-bit key: updated CBC IV: ok 254s | decode_to_mac() IV: : input "0x3dafba429d9eb430b422da802c9fac41" 254s | decode_to_mac() output: 254s | 3d af ba 42 9d 9e b4 30 b4 22 da 80 2c 9f ac 41 =..B...0."..,..A 254s | decode_to_chunk() new IV: : input "0xe353779c1079aeb82708942dbe77181a" 254s | decode_to_chunk() output: 254s | e3 53 77 9c 10 79 ae b8 27 08 94 2d be 77 18 1a .Sw..y..'..-.w.. 254s | decode_to_chunk() ciphertext: : input "0xe353779c1079aeb82708942dbe77181a" 254s | decode_to_chunk() output: 254s | e3 53 77 9c 10 79 ae b8 27 08 94 2d be 77 18 1a .Sw..y..'..-.w.. 254s | decode_to_chunk() plaintext: : input "Single block msg" 254s | decode_to_chunk() output: 254s | 53 69 6e 67 6c 65 20 62 6c 6f 63 6b 20 6d 73 67 Single block msg 254s | NSS ike_alg_nss_cbc: AES_CBC - enter (nil) 254s | using IKEv1 IV 254s | NSS ike_alg_nss_cbc: AES_CBC - exit 254s | verify_bytes() Encrypting 16 bytes (1 block) using AES-CBC with 128-bit key: decrypt: ok 254s | verify_bytes() Encrypting 16 bytes (1 block) using AES-CBC with 128-bit key: updated CBC IV: ok 254s ipsec algparse: Encrypting 32 bytes (2 blocks) using AES-CBC with 128-bit key 254s | decode_to_chunk() raw_key: input "0xc286696d887c9aa0611bbb3e2025a45a" 254s | decode_to_chunk() output: 254s | c2 86 69 6d 88 7c 9a a0 61 1b bb 3e 20 25 a4 5a ..im.|..a..> %.Z 254s | CONCATENATE_DATA_AND_BASE: 254s | target: EXTRACT_KEY_FROM_KEY 254s | base: base-key@0x14b173b8a290 (16-bytes, AES_KEY_GEN) 254s | params: 16-bytes@0x7fffc0f80830 254s | key-offset: 0, key-size: 16 254s | EXTRACT_KEY_FROM_KEY: 254s | target: AES_CBC 254s | flags: ENCRYPT+DECRYPT 254s | key_size: 16-bytes 254s | base: base-key@0x14b173b8d2a0 (32-bytes, EXTRACT_KEY_FROM_KEY) 254s | operation: FLAGS_ONLY 254s | params: 8-bytes@0x7fffc0f80838 254s | decode_to_mac() IV: : input "0x562e17996d093d28ddb3ba695a2e6f58" 254s | decode_to_mac() output: 254s | 56 2e 17 99 6d 09 3d 28 dd b3 ba 69 5a 2e 6f 58 V...m.=(...iZ.oX 254s | decode_to_chunk() new IV: : input "0xd296cd94c2cccf8a3a863028b5e1dc0a7586602d253cfff91b8266bea6d61ab1" 254s | decode_to_chunk() output: 254s | d2 96 cd 94 c2 cc cf 8a 3a 86 30 28 b5 e1 dc 0a ........:.0(.... 254s | 75 86 60 2d 25 3c ff f9 1b 82 66 be a6 d6 1a b1 u.`-%<....f..... 254s | decode_to_chunk() plaintext: : input "0x000102030405060708090a0b0c0d0e0f101112131415161718191a1b1c1d1e1f" 254s | decode_to_chunk() output: 254s | 00 01 02 03 04 05 06 07 08 09 0a 0b 0c 0d 0e 0f ................ 254s | 10 11 12 13 14 15 16 17 18 19 1a 1b 1c 1d 1e 1f ................ 254s | decode_to_chunk() ciphertext: : input "0xd296cd94c2cccf8a3a863028b5e1dc0a7586602d253cfff91b8266bea6d61ab1" 254s | decode_to_chunk() output: 254s | d2 96 cd 94 c2 cc cf 8a 3a 86 30 28 b5 e1 dc 0a ........:.0(.... 254s | 75 86 60 2d 25 3c ff f9 1b 82 66 be a6 d6 1a b1 u.`-%<....f..... 254s | NSS ike_alg_nss_cbc: AES_CBC - enter (nil) 254s | using IKEv1 IV 254s | NSS ike_alg_nss_cbc: AES_CBC - exit 254s | verify_bytes() Encrypting 32 bytes (2 blocks) using AES-CBC with 128-bit key: encrypt: ok 254s | verify_bytes() Encrypting 32 bytes (2 blocks) using AES-CBC with 128-bit key: updated CBC IV: ok 254s | decode_to_mac() IV: : input "0x562e17996d093d28ddb3ba695a2e6f58" 254s | decode_to_mac() output: 254s | 56 2e 17 99 6d 09 3d 28 dd b3 ba 69 5a 2e 6f 58 V...m.=(...iZ.oX 254s | decode_to_chunk() new IV: : input "0xd296cd94c2cccf8a3a863028b5e1dc0a7586602d253cfff91b8266bea6d61ab1" 254s | decode_to_chunk() output: 254s | d2 96 cd 94 c2 cc cf 8a 3a 86 30 28 b5 e1 dc 0a ........:.0(.... 254s | 75 86 60 2d 25 3c ff f9 1b 82 66 be a6 d6 1a b1 u.`-%<....f..... 254s | decode_to_chunk() ciphertext: : input "0xd296cd94c2cccf8a3a863028b5e1dc0a7586602d253cfff91b8266bea6d61ab1" 254s | decode_to_chunk() output: 254s | d2 96 cd 94 c2 cc cf 8a 3a 86 30 28 b5 e1 dc 0a ........:.0(.... 254s | 75 86 60 2d 25 3c ff f9 1b 82 66 be a6 d6 1a b1 u.`-%<....f..... 254s | decode_to_chunk() plaintext: : input "0x000102030405060708090a0b0c0d0e0f101112131415161718191a1b1c1d1e1f" 254s | decode_to_chunk() output: 254s | 00 01 02 03 04 05 06 07 08 09 0a 0b 0c 0d 0e 0f ................ 254s | 10 11 12 13 14 15 16 17 18 19 1a 1b 1c 1d 1e 1f ................ 254s | NSS ike_alg_nss_cbc: AES_CBC - enter (nil) 254s | using IKEv1 IV 254s | NSS ike_alg_nss_cbc: AES_CBC - exit 254s | verify_bytes() Encrypting 32 bytes (2 blocks) using AES-CBC with 128-bit key: decrypt: ok 254s | verify_bytes() Encrypting 32 bytes (2 blocks) using AES-CBC with 128-bit key: updated CBC IV: ok 254s ipsec algparse: Encrypting 48 bytes (3 blocks) using AES-CBC with 128-bit key 254s | decode_to_chunk() raw_key: input "0x6c3ea0477630ce21a2ce334aa746c2cd" 254s | decode_to_chunk() output: 254s | 6c 3e a0 47 76 30 ce 21 a2 ce 33 4a a7 46 c2 cd l>.Gv0.!..3J.F.. 254s | CONCATENATE_DATA_AND_BASE: 254s | target: EXTRACT_KEY_FROM_KEY 254s | base: base-key@0x14b173b8a290 (16-bytes, AES_KEY_GEN) 254s | params: 16-bytes@0x7fffc0f80830 254s | key-offset: 0, key-size: 16 254s | EXTRACT_KEY_FROM_KEY: 254s | target: AES_CBC 254s | flags: ENCRYPT+DECRYPT 254s | key_size: 16-bytes 254s | base: base-key@0x14b173b8d2a0 (32-bytes, EXTRACT_KEY_FROM_KEY) 254s | operation: FLAGS_ONLY 254s | params: 8-bytes@0x7fffc0f80838 254s | decode_to_mac() IV: : input "0xc782dc4c098c66cbd9cd27d825682c81" 254s | decode_to_mac() output: 254s | c7 82 dc 4c 09 8c 66 cb d9 cd 27 d8 25 68 2c 81 ...L..f...'.%h,. 254s | decode_to_chunk() new IV: : input "0xd0a02b3836451753d493665d33f0e8862dea54cdb293abc7506939276772f8d5021c19216bad525c8579695d83ba2684" 254s | decode_to_chunk() output: 254s | d0 a0 2b 38 36 45 17 53 d4 93 66 5d 33 f0 e8 86 ..+86E.S..f]3... 254s | 2d ea 54 cd b2 93 ab c7 50 69 39 27 67 72 f8 d5 -.T.....Pi9'gr.. 254s | 02 1c 19 21 6b ad 52 5c 85 79 69 5d 83 ba 26 84 ...!k.R\.yi]..&. 254s | decode_to_chunk() plaintext: : input "This is a 48-byte message (exactly 3 AES blocks)" 254s | decode_to_chunk() output: 254s | 54 68 69 73 20 69 73 20 61 20 34 38 2d 62 79 74 This is a 48-byt 254s | 65 20 6d 65 73 73 61 67 65 20 28 65 78 61 63 74 e message (exact 254s | 6c 79 20 33 20 41 45 53 20 62 6c 6f 63 6b 73 29 ly 3 AES blocks) 254s | decode_to_chunk() ciphertext: : input "0xd0a02b3836451753d493665d33f0e8862dea54cdb293abc7506939276772f8d5021c19216bad525c8579695d83ba2684" 254s | decode_to_chunk() output: 254s | d0 a0 2b 38 36 45 17 53 d4 93 66 5d 33 f0 e8 86 ..+86E.S..f]3... 254s | 2d ea 54 cd b2 93 ab c7 50 69 39 27 67 72 f8 d5 -.T.....Pi9'gr.. 254s | 02 1c 19 21 6b ad 52 5c 85 79 69 5d 83 ba 26 84 ...!k.R\.yi]..&. 254s | NSS ike_alg_nss_cbc: AES_CBC - enter (nil) 254s | using IKEv1 IV 254s | NSS ike_alg_nss_cbc: AES_CBC - exit 254s | verify_bytes() Encrypting 48 bytes (3 blocks) using AES-CBC with 128-bit key: encrypt: ok 254s | verify_bytes() Encrypting 48 bytes (3 blocks) using AES-CBC with 128-bit key: updated CBC IV: ok 254s | decode_to_mac() IV: : input "0xc782dc4c098c66cbd9cd27d825682c81" 254s | decode_to_mac() output: 254s | c7 82 dc 4c 09 8c 66 cb d9 cd 27 d8 25 68 2c 81 ...L..f...'.%h,. 254s | decode_to_chunk() new IV: : input "0xd0a02b3836451753d493665d33f0e8862dea54cdb293abc7506939276772f8d5021c19216bad525c8579695d83ba2684" 254s | decode_to_chunk() output: 254s | d0 a0 2b 38 36 45 17 53 d4 93 66 5d 33 f0 e8 86 ..+86E.S..f]3... 254s | 2d ea 54 cd b2 93 ab c7 50 69 39 27 67 72 f8 d5 -.T.....Pi9'gr.. 254s | 02 1c 19 21 6b ad 52 5c 85 79 69 5d 83 ba 26 84 ...!k.R\.yi]..&. 254s | decode_to_chunk() ciphertext: : input "0xd0a02b3836451753d493665d33f0e8862dea54cdb293abc7506939276772f8d5021c19216bad525c8579695d83ba2684" 254s | decode_to_chunk() output: 254s | d0 a0 2b 38 36 45 17 53 d4 93 66 5d 33 f0 e8 86 ..+86E.S..f]3... 254s | 2d ea 54 cd b2 93 ab c7 50 69 39 27 67 72 f8 d5 -.T.....Pi9'gr.. 254s | 02 1c 19 21 6b ad 52 5c 85 79 69 5d 83 ba 26 84 ...!k.R\.yi]..&. 254s | decode_to_chunk() plaintext: : input "This is a 48-byte message (exactly 3 AES blocks)" 254s | decode_to_chunk() output: 254s | 54 68 69 73 20 69 73 20 61 20 34 38 2d 62 79 74 This is a 48-byt 254s | 65 20 6d 65 73 73 61 67 65 20 28 65 78 61 63 74 e message (exact 254s | 6c 79 20 33 20 41 45 53 20 62 6c 6f 63 6b 73 29 ly 3 AES blocks) 254s | NSS ike_alg_nss_cbc: AES_CBC - enter (nil) 254s | using IKEv1 IV 254s | NSS ike_alg_nss_cbc: AES_CBC - exit 254s | verify_bytes() Encrypting 48 bytes (3 blocks) using AES-CBC with 128-bit key: decrypt: ok 254s | verify_bytes() Encrypting 48 bytes (3 blocks) using AES-CBC with 128-bit key: updated CBC IV: ok 254s ipsec algparse: Encrypting 64 bytes (4 blocks) using AES-CBC with 128-bit key 254s | decode_to_chunk() raw_key: input "0x56e47a38c5598974bc46903dba290349" 254s | decode_to_chunk() output: 254s | 56 e4 7a 38 c5 59 89 74 bc 46 90 3d ba 29 03 49 V.z8.Y.t.F.=.).I 254s | CONCATENATE_DATA_AND_BASE: 254s | target: EXTRACT_KEY_FROM_KEY 254s | base: base-key@0x14b173b8a290 (16-bytes, AES_KEY_GEN) 254s | params: 16-bytes@0x7fffc0f80830 254s | key-offset: 0, key-size: 16 254s | EXTRACT_KEY_FROM_KEY: 254s | target: AES_CBC 254s | flags: ENCRYPT+DECRYPT 254s | key_size: 16-bytes 254s | base: base-key@0x14b173b8d2a0 (32-bytes, EXTRACT_KEY_FROM_KEY) 254s | operation: FLAGS_ONLY 254s | params: 8-bytes@0x7fffc0f80838 254s | decode_to_mac() IV: : input "0x8ce82eefbea0da3c44699ed7db51b7d9" 254s | decode_to_mac() output: 254s | 8c e8 2e ef be a0 da 3c 44 69 9e d7 db 51 b7 d9 ...........U 254s | decode_to_chunk() plaintext: : input "0xa0a1a2a3a4a5a6a7a8a9aaabacadaeafb0b1b2b3b4b5b6b7b8b9babbbcbdbebfc0c1c2c3c4c5c6c7c8c9cacbcccdcecfd0d1d2d3d4d5d6d7d8d9dadbdcdddedf" 254s | decode_to_chunk() output: 254s | a0 a1 a2 a3 a4 a5 a6 a7 a8 a9 aa ab ac ad ae af ................ 254s | b0 b1 b2 b3 b4 b5 b6 b7 b8 b9 ba bb bc bd be bf ................ 254s | c0 c1 c2 c3 c4 c5 c6 c7 c8 c9 ca cb cc cd ce cf ................ 254s | d0 d1 d2 d3 d4 d5 d6 d7 d8 d9 da db dc dd de df ................ 254s | decode_to_chunk() ciphertext: : input "0xc30e32ffedc0774e6aff6af0869f71aa0f3af07a9a31a9c684db207eb0ef8e4e35907aa632c3ffdf868bb7b29d3d46ad83ce9f9a102ee99d49a53e87f4c3da55" 254s | decode_to_chunk() output: 254s | c3 0e 32 ff ed c0 77 4e 6a ff 6a f0 86 9f 71 aa ..2...wNj.j...q. 254s | 0f 3a f0 7a 9a 31 a9 c6 84 db 20 7e b0 ef 8e 4e .:.z.1.... ~...N 254s | 35 90 7a a6 32 c3 ff df 86 8b b7 b2 9d 3d 46 ad 5.z.2........=F. 254s | 83 ce 9f 9a 10 2e e9 9d 49 a5 3e 87 f4 c3 da 55 ........I.>....U 254s | NSS ike_alg_nss_cbc: AES_CBC - enter (nil) 254s | using IKEv1 IV 254s | NSS ike_alg_nss_cbc: AES_CBC - exit 254s | verify_bytes() Encrypting 64 bytes (4 blocks) using AES-CBC with 128-bit key: encrypt: ok 254s | verify_bytes() Encrypting 64 bytes (4 blocks) using AES-CBC with 128-bit key: updated CBC IV: ok 254s | decode_to_mac() IV: : input "0x8ce82eefbea0da3c44699ed7db51b7d9" 254s | decode_to_mac() output: 254s | 8c e8 2e ef be a0 da 3c 44 69 9e d7 db 51 b7 d9 ...........U 254s | decode_to_chunk() ciphertext: : input "0xc30e32ffedc0774e6aff6af0869f71aa0f3af07a9a31a9c684db207eb0ef8e4e35907aa632c3ffdf868bb7b29d3d46ad83ce9f9a102ee99d49a53e87f4c3da55" 254s | decode_to_chunk() output: 254s | c3 0e 32 ff ed c0 77 4e 6a ff 6a f0 86 9f 71 aa ..2...wNj.j...q. 254s | 0f 3a f0 7a 9a 31 a9 c6 84 db 20 7e b0 ef 8e 4e .:.z.1.... ~...N 254s | 35 90 7a a6 32 c3 ff df 86 8b b7 b2 9d 3d 46 ad 5.z.2........=F. 254s | 83 ce 9f 9a 10 2e e9 9d 49 a5 3e 87 f4 c3 da 55 ........I.>....U 254s | decode_to_chunk() plaintext: : input "0xa0a1a2a3a4a5a6a7a8a9aaabacadaeafb0b1b2b3b4b5b6b7b8b9babbbcbdbebfc0c1c2c3c4c5c6c7c8c9cacbcccdcecfd0d1d2d3d4d5d6d7d8d9dadbdcdddedf" 254s | decode_to_chunk() output: 254s | a0 a1 a2 a3 a4 a5 a6 a7 a8 a9 aa ab ac ad ae af ................ 254s | b0 b1 b2 b3 b4 b5 b6 b7 b8 b9 ba bb bc bd be bf ................ 254s | c0 c1 c2 c3 c4 c5 c6 c7 c8 c9 ca cb cc cd ce cf ................ 254s | d0 d1 d2 d3 d4 d5 d6 d7 d8 d9 da db dc dd de df ................ 254s | NSS ike_alg_nss_cbc: AES_CBC - enter (nil) 254s | using IKEv1 IV 254s | NSS ike_alg_nss_cbc: AES_CBC - exit 254s | verify_bytes() Encrypting 64 bytes (4 blocks) using AES-CBC with 128-bit key: decrypt: ok 254s | verify_bytes() Encrypting 64 bytes (4 blocks) using AES-CBC with 128-bit key: updated CBC IV: ok 254s ipsec algparse: testing AES_XCBC: 254s ipsec algparse: RFC 3566 Test Case 1: AES-XCBC-MAC-96 with 0-byte input 254s | decode_to_chunk() test_prf_vector: input "0x000102030405060708090a0b0c0d0e0f" 254s | decode_to_chunk() output: 254s | 00 01 02 03 04 05 06 07 08 09 0a 0b 0c 0d 0e 0f ................ 254s | decode_to_chunk() test_prf_vector: input "" 254s | decode_to_chunk() output: 254s | 254s | decode_to_chunk() test_prf_vector: input "0x75f0251d528ac01c4573dfd584d79f29" 254s | decode_to_chunk() output: 254s | 75 f0 25 1d 52 8a c0 1c 45 73 df d5 84 d7 9f 29 u.%.R...Es.....) 254s | PRF chunk interface PRF AES_XCBC init key hunk 0x14b173b8d5d0 (length 16) 254s | 00 01 02 03 04 05 06 07 08 09 0a 0b 0c 0d 0e 0f ................ 254s | CONCATENATE_DATA_AND_BASE: 254s | target: EXTRACT_KEY_FROM_KEY 254s | base: base-key@0x14b173b8a290 (16-bytes, AES_KEY_GEN) 254s | params: 16-bytes@0x7fffc0f80710 254s | key-offset: 0, key-size: 16 254s | EXTRACT_KEY_FROM_KEY: 254s | target: EXTRACT_KEY_FROM_KEY 254s | key_size: 16-bytes 254s | base: base-key@0x14b173b8d2a0 (32-bytes, EXTRACT_KEY_FROM_KEY) 254s | operation: FLAGS_ONLY 254s | params: 8-bytes@0x7fffc0f80648 254s | XCBC: Key 16=16 just right 254s | key-offset: 0, key-size: 16 254s | EXTRACT_KEY_FROM_KEY: 254s | target: AES_ECB 254s | flags: SIGN 254s | key_size: 16-bytes 254s | base: base-key@0x14b173b8bbb0 (16-bytes, EXTRACT_KEY_FROM_KEY) 254s | operation: FLAGS_ONLY 254s | params: 8-bytes@0x7fffc0f80618 254s | PRF chunk interface PRF AES_XCBC 0x14b173b8a230 254s | PRF chunk interface PRF AES_XCBC update message (0x14b173b8bae0 length 0) 254s | 254s | XCBC: data 254s | 254s | K extracting all 16 bytes of key@0x14b173b8d2a0 254s | K: symkey-key@0x14b173b8d2a0 (16-bytes, AES_ECB) 254s | sizeof bytes 16 254s | wrapper: (SECItemType)-1057487320: 07 de a2 6b a1 39 64 a4 53 5e 31 e4 70 ab 6f bb 254s | K extracted len 16 bytes at 0x14b173b8deb0 254s | unwrapped: 254s | 00 01 02 03 04 05 06 07 08 09 0a 0b 0c 0d 0e 0f ................ 254s | XCBC: K: 254s | 00 01 02 03 04 05 06 07 08 09 0a 0b 0c 0d 0e 0f ................ 254s | XCBC: K1 254s | c3 52 80 57 54 23 7f 31 1a c0 ff f4 e3 e0 3e 78 .R.WT#.1......>x 254s | CONCATENATE_DATA_AND_BASE: 254s | target: EXTRACT_KEY_FROM_KEY 254s | base: base-key@0x14b173b8a290 (16-bytes, AES_KEY_GEN) 254s | params: 16-bytes@0x7fffc0f80500 254s | key-offset: 0, key-size: 16 254s | EXTRACT_KEY_FROM_KEY: 254s | target: AES_ECB 254s | flags: SIGN 254s | key_size: 16-bytes 254s | base: base-key@0x14b173b8e040 (32-bytes, EXTRACT_KEY_FROM_KEY) 254s | operation: FLAGS_ONLY 254s | params: 8-bytes@0x7fffc0f80508 254s | Computing E[0] using K3 254s | XCBC: K3 254s | c1 a7 ab a1 a2 3a 94 06 58 07 a0 8c c8 ee d0 6e .....:..X......n 254s | XCBC: E[n-1] 254s | 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................ 254s | XCBC: M[n] 254s | 254s | XCBC: M[n] 254s | 254s | XCBC: M[n]:80...^E[n-1]^K3 254s | 41 a7 ab a1 a2 3a 94 06 58 07 a0 8c c8 ee d0 6e A....:..X......n 254s | XCBC: MAC 254s | 75 f0 25 1d 52 8a c0 1c 45 73 df d5 84 d7 9f 29 u.%.R...Es.....) 254s | PRF chunk interface PRF AES_XCBC final length 16 254s | 75 f0 25 1d 52 8a c0 1c 45 73 df d5 84 d7 9f 29 u.%.R...Es.....) 254s | chunk output 254s | 75 f0 25 1d 52 8a c0 1c 45 73 df d5 84 d7 9f 29 u.%.R...Es.....) 254s | verify_bytes() RFC 3566 Test Case 1: AES-XCBC-MAC-96 with 0-byte input: prf OUT: ok 254s | CONCATENATE_DATA_AND_BASE: 254s | target: EXTRACT_KEY_FROM_KEY 254s | base: base-key@0x14b173b8a290 (16-bytes, AES_KEY_GEN) 254s | params: 16-bytes@0x7fffc0f80800 254s | key-offset: 0, key-size: 16 254s | EXTRACT_KEY_FROM_KEY: 254s | target: EXTRACT_KEY_FROM_KEY 254s | key_size: 16-bytes 254s | base: base-key@0x14b173b8bbb0 (32-bytes, EXTRACT_KEY_FROM_KEY) 254s | operation: FLAGS_ONLY 254s | params: 8-bytes@0x7fffc0f80738 254s | PRF symkey interface PRF AES_XCBC init key symkey-key@0x14b173b8d2a0 (size 16) 254s | PRF symkey interface: key symkey-key@0x14b173b8d2a0 (16-bytes, EXTRACT_KEY_FROM_KEY) 254s | XCBC: Key 16=16 just right 254s | key-offset: 0, key-size: 16 254s | EXTRACT_KEY_FROM_KEY: 254s | target: AES_ECB 254s | flags: SIGN 254s | key_size: 16-bytes 254s | base: base-key@0x14b173b8d2a0 (16-bytes, EXTRACT_KEY_FROM_KEY) 254s | operation: FLAGS_ONLY 254s | params: 8-bytes@0x7fffc0f80668 254s | PRF symkey interface PRF AES_XCBC 0x14b173b8a230 254s | PRF symkey interface PRF AES_XCBC update symkey message-key@(nil) (size 0) 254s | PRF symkey interface: symkey message-key@NULL 254s | symkey message NULL key has no bytes 254s | XCBC: data 254s | 254s | K extracting all 16 bytes of key@0x14b173b8bbb0 254s | K: symkey-key@0x14b173b8bbb0 (16-bytes, AES_ECB) 254s | sizeof bytes 16 254s | wrapper: (SECItemType)-1057488400: 07 de a2 6b a1 39 64 a4 53 5e 31 e4 70 ab 6f bb 254s | K extracted len 16 bytes at 0x14b173b8deb0 254s | unwrapped: 254s | 00 01 02 03 04 05 06 07 08 09 0a 0b 0c 0d 0e 0f ................ 254s | XCBC: K: 254s | 00 01 02 03 04 05 06 07 08 09 0a 0b 0c 0d 0e 0f ................ 254s | XCBC: K1 254s | c3 52 80 57 54 23 7f 31 1a c0 ff f4 e3 e0 3e 78 .R.WT#.1......>x 254s | CONCATENATE_DATA_AND_BASE: 254s | target: EXTRACT_KEY_FROM_KEY 254s | base: base-key@0x14b173b8a290 (16-bytes, AES_KEY_GEN) 254s | params: 16-bytes@0x7fffc0f80550 254s | key-offset: 0, key-size: 16 254s | EXTRACT_KEY_FROM_KEY: 254s | target: AES_ECB 254s | flags: SIGN 254s | key_size: 16-bytes 254s | base: base-key@0x14b173b8e380 (32-bytes, EXTRACT_KEY_FROM_KEY) 254s | operation: FLAGS_ONLY 254s | params: 8-bytes@0x7fffc0f80558 254s | Computing E[0] using K3 254s | XCBC: K3 254s | c1 a7 ab a1 a2 3a 94 06 58 07 a0 8c c8 ee d0 6e .....:..X......n 254s | XCBC: E[n-1] 254s | 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................ 254s | XCBC: M[n] 254s | 254s | XCBC: M[n] 254s | 254s | XCBC: M[n]:80...^E[n-1]^K3 254s | 41 a7 ab a1 a2 3a 94 06 58 07 a0 8c c8 ee d0 6e A....:..X......n 254s | XCBC: MAC 254s | 75 f0 25 1d 52 8a c0 1c 45 73 df d5 84 d7 9f 29 u.%.R...Es.....) 254s | CONCATENATE_DATA_AND_BASE: 254s | target: EXTRACT_KEY_FROM_KEY 254s | base: base-key@0x14b173b8a290 (16-bytes, AES_KEY_GEN) 254s | params: 16-bytes@0x7fffc0f80720 254s | key-offset: 0, key-size: 16 254s | EXTRACT_KEY_FROM_KEY: 254s | target: EXTRACT_KEY_FROM_KEY 254s | key_size: 16-bytes 254s | base: base-key@0x14b173b8e380 (32-bytes, EXTRACT_KEY_FROM_KEY) 254s | operation: FLAGS_ONLY 254s | params: 8-bytes@0x7fffc0f80658 254s | PRF symkey interface PRF AES_XCBC final-key@0x14b173b8e040 (size 16) 254s | PRF symkey interface: key-key@0x14b173b8e040 (16-bytes, EXTRACT_KEY_FROM_KEY) 254s | output: symkey-key@0x14b173b8e040 (16-bytes, EXTRACT_KEY_FROM_KEY) 254s | RFC 3566 Test Case 1: AES-XCBC-MAC-96 with 0-byte input extracting all 16 bytes of key@0x14b173b8e040 254s | RFC 3566 Test Case 1: AES-XCBC-MAC-96 with 0-byte input: symkey-key@0x14b173b8e040 (16-bytes, EXTRACT_KEY_FROM_KEY) 254s | sizeof bytes 16 254s | wrapper: (SECItemType)-1057488144: 8b 40 6c f7 77 7b 1d 04 d3 b0 b2 2e 45 07 4d 66 254s | RFC 3566 Test Case 1: AES-XCBC-MAC-96 with 0-byte input extracted len 16 bytes at 0x14b173b8e020 254s | unwrapped: 254s | 75 f0 25 1d 52 8a c0 1c 45 73 df d5 84 d7 9f 29 u.%.R...Es.....) 254s | verify_bytes() RFC 3566 Test Case 1: AES-XCBC-MAC-96 with 0-byte input: symkey: ok 254s ipsec algparse: RFC 3566 Test Case 2: AES-XCBC-MAC-96 with 3-byte input 254s | decode_to_chunk() test_prf_vector: input "0x000102030405060708090a0b0c0d0e0f" 254s | decode_to_chunk() output: 254s | 00 01 02 03 04 05 06 07 08 09 0a 0b 0c 0d 0e 0f ................ 254s | decode_to_chunk() test_prf_vector: input "0x000102" 254s | decode_to_chunk() output: 254s | 00 01 02 ... 254s | decode_to_chunk() test_prf_vector: input "0x5b376580ae2f19afe7219ceef172756f" 254s | decode_to_chunk() output: 254s | 5b 37 65 80 ae 2f 19 af e7 21 9c ee f1 72 75 6f [7e../...!...ruo 254s | PRF chunk interface PRF AES_XCBC init key hunk 0x14b173b8d5d0 (length 16) 254s | 00 01 02 03 04 05 06 07 08 09 0a 0b 0c 0d 0e 0f ................ 254s | CONCATENATE_DATA_AND_BASE: 254s | target: EXTRACT_KEY_FROM_KEY 254s | base: base-key@0x14b173b8a290 (16-bytes, AES_KEY_GEN) 254s | params: 16-bytes@0x7fffc0f80710 254s | key-offset: 0, key-size: 16 254s | EXTRACT_KEY_FROM_KEY: 254s | target: EXTRACT_KEY_FROM_KEY 254s | key_size: 16-bytes 254s | base: base-key@0x14b173b8d2a0 (32-bytes, EXTRACT_KEY_FROM_KEY) 254s | operation: FLAGS_ONLY 254s | params: 8-bytes@0x7fffc0f80648 254s | XCBC: Key 16=16 just right 254s | key-offset: 0, key-size: 16 254s | EXTRACT_KEY_FROM_KEY: 254s | target: AES_ECB 254s | flags: SIGN 254s | key_size: 16-bytes 254s | base: base-key@0x14b173b8e040 (16-bytes, EXTRACT_KEY_FROM_KEY) 254s | operation: FLAGS_ONLY 254s | params: 8-bytes@0x7fffc0f80618 254s | PRF chunk interface PRF AES_XCBC 0x14b173b8a230 254s | PRF chunk interface PRF AES_XCBC update message (0x14b173b8bae0 length 3) 254s | 00 01 02 ... 254s | XCBC: data 254s | 00 01 02 ... 254s | K extracting all 16 bytes of key@0x14b173b8d2a0 254s | K: symkey-key@0x14b173b8d2a0 (16-bytes, AES_ECB) 254s | sizeof bytes 16 254s | wrapper: (SECItemType)-1057487320: 07 de a2 6b a1 39 64 a4 53 5e 31 e4 70 ab 6f bb 254s | K extracted len 16 bytes at 0x14b173b8d5f0 254s | unwrapped: 254s | 00 01 02 03 04 05 06 07 08 09 0a 0b 0c 0d 0e 0f ................ 254s | XCBC: K: 254s | 00 01 02 03 04 05 06 07 08 09 0a 0b 0c 0d 0e 0f ................ 254s | XCBC: K1 254s | c3 52 80 57 54 23 7f 31 1a c0 ff f4 e3 e0 3e 78 .R.WT#.1......>x 254s | CONCATENATE_DATA_AND_BASE: 254s | target: EXTRACT_KEY_FROM_KEY 254s | base: base-key@0x14b173b8a290 (16-bytes, AES_KEY_GEN) 254s | params: 16-bytes@0x7fffc0f80500 254s | key-offset: 0, key-size: 16 254s | EXTRACT_KEY_FROM_KEY: 254s | target: AES_ECB 254s | flags: SIGN 254s | key_size: 16-bytes 254s | base: base-key@0x14b173b8bbb0 (32-bytes, EXTRACT_KEY_FROM_KEY) 254s | operation: FLAGS_ONLY 254s | params: 8-bytes@0x7fffc0f80508 254s | Computing E[1] using K3 254s | XCBC: K3 254s | c1 a7 ab a1 a2 3a 94 06 58 07 a0 8c c8 ee d0 6e .....:..X......n 254s | XCBC: E[n-1] 254s | 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................ 254s | XCBC: M[n] 254s | 00 01 02 ... 254s | XCBC: M[n] 254s | 00 01 02 ... 254s | XCBC: M[n]:80...^E[n-1]^K3 254s | c1 a6 a9 21 a2 3a 94 06 58 07 a0 8c c8 ee d0 6e ...!.:..X......n 254s | XCBC: MAC 254s | 5b 37 65 80 ae 2f 19 af e7 21 9c ee f1 72 75 6f [7e../...!...ruo 254s | PRF chunk interface PRF AES_XCBC final length 16 254s | 5b 37 65 80 ae 2f 19 af e7 21 9c ee f1 72 75 6f [7e../...!...ruo 254s | chunk output 254s | 5b 37 65 80 ae 2f 19 af e7 21 9c ee f1 72 75 6f [7e../...!...ruo 254s | verify_bytes() RFC 3566 Test Case 2: AES-XCBC-MAC-96 with 3-byte input: prf OUT: ok 254s | CONCATENATE_DATA_AND_BASE: 254s | target: EXTRACT_KEY_FROM_KEY 254s | base: base-key@0x14b173b8a290 (16-bytes, AES_KEY_GEN) 254s | params: 16-bytes@0x7fffc0f80800 254s | key-offset: 0, key-size: 16 254s | EXTRACT_KEY_FROM_KEY: 254s | target: EXTRACT_KEY_FROM_KEY 254s | key_size: 16-bytes 254s | base: base-key@0x14b173b8e040 (32-bytes, EXTRACT_KEY_FROM_KEY) 254s | operation: FLAGS_ONLY 254s | params: 8-bytes@0x7fffc0f80738 254s | PRF symkey interface PRF AES_XCBC init key symkey-key@0x14b173b8d2a0 (size 16) 254s | PRF symkey interface: key symkey-key@0x14b173b8d2a0 (16-bytes, EXTRACT_KEY_FROM_KEY) 254s | XCBC: Key 16=16 just right 254s | key-offset: 0, key-size: 16 254s | EXTRACT_KEY_FROM_KEY: 254s | target: AES_ECB 254s | flags: SIGN 254s | key_size: 16-bytes 254s | base: base-key@0x14b173b8d2a0 (16-bytes, EXTRACT_KEY_FROM_KEY) 254s | operation: FLAGS_ONLY 254s | params: 8-bytes@0x7fffc0f80668 254s | PRF symkey interface PRF AES_XCBC 0x14b173b8a230 254s | CONCATENATE_DATA_AND_BASE: 254s | target: EXTRACT_KEY_FROM_KEY 254s | base: base-key@0x14b173b8a290 (16-bytes, AES_KEY_GEN) 254s | params: 16-bytes@0x7fffc0f80800 254s | key-offset: 0, key-size: 3 254s | EXTRACT_KEY_FROM_KEY: 254s | target: EXTRACT_KEY_FROM_KEY 254s | key_size: 3-bytes 254s | base: base-key@0x14b173b8e380 (19-bytes, EXTRACT_KEY_FROM_KEY) 254s | operation: FLAGS_ONLY 254s | params: 8-bytes@0x7fffc0f80738 254s | PRF symkey interface PRF AES_XCBC update symkey message-key@0x14b173b8bbb0 (size 3) 254s | PRF symkey interface: symkey message-key@0x14b173b8bbb0 (3-bytes, EXTRACT_KEY_FROM_KEY) 254s | symkey message extracting all 3 bytes of key@0x14b173b8bbb0 254s | symkey message: symkey-key@0x14b173b8bbb0 (3-bytes, EXTRACT_KEY_FROM_KEY) 254s | sizeof bytes 16 254s | wrapper: (SECItemType)-1057488160: 2e 0c aa 97 ad f2 4b 7f 7e c6 0f 10 45 3b 01 15 254s | symkey message extracted len 16 bytes at 0x14b173b8d5f0 254s | unwrapped: 254s | 00 01 02 00 00 00 00 00 00 00 00 00 00 00 00 00 ................ 254s | XCBC: data 254s | 00 01 02 ... 254s | K extracting all 16 bytes of key@0x14b173b8e040 254s | K: symkey-key@0x14b173b8e040 (16-bytes, AES_ECB) 254s | sizeof bytes 16 254s | wrapper: siDERCertBuffer: 07 de a2 6b a1 39 64 a4 53 5e 31 e4 70 ab 6f bb 254s | K extracted len 16 bytes at 0x14b173b8a160 254s | unwrapped: 254s | 00 01 02 03 04 05 06 07 08 09 0a 0b 0c 0d 0e 0f ................ 254s | XCBC: K: 254s | 00 01 02 03 04 05 06 07 08 09 0a 0b 0c 0d 0e 0f ................ 254s | XCBC: K1 254s | c3 52 80 57 54 23 7f 31 1a c0 ff f4 e3 e0 3e 78 .R.WT#.1......>x 254s | CONCATENATE_DATA_AND_BASE: 254s | target: EXTRACT_KEY_FROM_KEY 254s | base: base-key@0x14b173b8a290 (16-bytes, AES_KEY_GEN) 254s | params: 16-bytes@0x7fffc0f80550 254s | key-offset: 0, key-size: 16 254s | EXTRACT_KEY_FROM_KEY: 254s | target: AES_ECB 254s | flags: SIGN 254s | key_size: 16-bytes 254s | base: base-key@0x14b173b8e6e0 (32-bytes, EXTRACT_KEY_FROM_KEY) 254s | operation: FLAGS_ONLY 254s | params: 8-bytes@0x7fffc0f80558 254s | Computing E[1] using K3 254s | XCBC: K3 254s | c1 a7 ab a1 a2 3a 94 06 58 07 a0 8c c8 ee d0 6e .....:..X......n 254s | XCBC: E[n-1] 254s | 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................ 254s | XCBC: M[n] 254s | 00 01 02 ... 254s | XCBC: M[n] 254s | 00 01 02 ... 254s | XCBC: M[n]:80...^E[n-1]^K3 254s | c1 a6 a9 21 a2 3a 94 06 58 07 a0 8c c8 ee d0 6e ...!.:..X......n 254s | XCBC: MAC 254s | 5b 37 65 80 ae 2f 19 af e7 21 9c ee f1 72 75 6f [7e../...!...ruo 254s | CONCATENATE_DATA_AND_BASE: 254s | target: EXTRACT_KEY_FROM_KEY 254s | base: base-key@0x14b173b8a290 (16-bytes, AES_KEY_GEN) 254s | params: 16-bytes@0x7fffc0f80720 254s | key-offset: 0, key-size: 16 254s | EXTRACT_KEY_FROM_KEY: 254s | target: EXTRACT_KEY_FROM_KEY 254s | key_size: 16-bytes 254s | base: base-key@0x14b173b8e6e0 (32-bytes, EXTRACT_KEY_FROM_KEY) 254s | operation: FLAGS_ONLY 254s | params: 8-bytes@0x7fffc0f80658 254s | PRF symkey interface PRF AES_XCBC final-key@0x14b173b8e380 (size 16) 254s | PRF symkey interface: key-key@0x14b173b8e380 (16-bytes, EXTRACT_KEY_FROM_KEY) 254s | output: symkey-key@0x14b173b8e380 (16-bytes, EXTRACT_KEY_FROM_KEY) 254s | RFC 3566 Test Case 2: AES-XCBC-MAC-96 with 3-byte input extracting all 16 bytes of key@0x14b173b8e380 254s | RFC 3566 Test Case 2: AES-XCBC-MAC-96 with 3-byte input: symkey-key@0x14b173b8e380 (16-bytes, EXTRACT_KEY_FROM_KEY) 254s | sizeof bytes 16 254s | wrapper: (SECItemType)-1057488144: 09 b7 b6 71 4e ce 28 46 20 24 f9 6e 68 f9 d5 e9 254s | RFC 3566 Test Case 2: AES-XCBC-MAC-96 with 3-byte input extracted len 16 bytes at 0x14b173b8a160 254s | unwrapped: 254s | 5b 37 65 80 ae 2f 19 af e7 21 9c ee f1 72 75 6f [7e../...!...ruo 254s | verify_bytes() RFC 3566 Test Case 2: AES-XCBC-MAC-96 with 3-byte input: symkey: ok 254s ipsec algparse: RFC 3566 Test Case 3: AES-XCBC-MAC-96 with 16-byte input 254s | decode_to_chunk() test_prf_vector: input "0x000102030405060708090a0b0c0d0e0f" 254s | decode_to_chunk() output: 254s | 00 01 02 03 04 05 06 07 08 09 0a 0b 0c 0d 0e 0f ................ 254s | decode_to_chunk() test_prf_vector: input "0x000102030405060708090a0b0c0d0e0f" 254s | decode_to_chunk() output: 254s | 00 01 02 03 04 05 06 07 08 09 0a 0b 0c 0d 0e 0f ................ 254s | decode_to_chunk() test_prf_vector: input "0xd2a246fa349b68a79998a4394ff7a263" 254s | decode_to_chunk() output: 254s | d2 a2 46 fa 34 9b 68 a7 99 98 a4 39 4f f7 a2 63 ..F.4.h....9O..c 254s | PRF chunk interface PRF AES_XCBC init key hunk 0x14b173b8d5d0 (length 16) 254s | 00 01 02 03 04 05 06 07 08 09 0a 0b 0c 0d 0e 0f ................ 254s | CONCATENATE_DATA_AND_BASE: 254s | target: EXTRACT_KEY_FROM_KEY 254s | base: base-key@0x14b173b8a290 (16-bytes, AES_KEY_GEN) 254s | params: 16-bytes@0x7fffc0f80710 254s | key-offset: 0, key-size: 16 254s | EXTRACT_KEY_FROM_KEY: 254s | target: EXTRACT_KEY_FROM_KEY 254s | key_size: 16-bytes 254s | base: base-key@0x14b173b8d2a0 (32-bytes, EXTRACT_KEY_FROM_KEY) 254s | operation: FLAGS_ONLY 254s | params: 8-bytes@0x7fffc0f80648 254s | XCBC: Key 16=16 just right 254s | key-offset: 0, key-size: 16 254s | EXTRACT_KEY_FROM_KEY: 254s | target: AES_ECB 254s | flags: SIGN 254s | key_size: 16-bytes 254s | base: base-key@0x14b173b8e380 (16-bytes, EXTRACT_KEY_FROM_KEY) 254s | operation: FLAGS_ONLY 254s | params: 8-bytes@0x7fffc0f80618 254s | PRF chunk interface PRF AES_XCBC 0x14b173b8a230 254s | PRF chunk interface PRF AES_XCBC update message (0x14b173b8bae0 length 16) 254s | 00 01 02 03 04 05 06 07 08 09 0a 0b 0c 0d 0e 0f ................ 254s | XCBC: data 254s | 00 01 02 03 04 05 06 07 08 09 0a 0b 0c 0d 0e 0f ................ 254s | K extracting all 16 bytes of key@0x14b173b8d2a0 254s | K: symkey-key@0x14b173b8d2a0 (16-bytes, AES_ECB) 254s | sizeof bytes 16 254s | wrapper: (SECItemType)-1057487320: 07 de a2 6b a1 39 64 a4 53 5e 31 e4 70 ab 6f bb 254s | K extracted len 16 bytes at 0x14b173b8deb0 254s | unwrapped: 254s | 00 01 02 03 04 05 06 07 08 09 0a 0b 0c 0d 0e 0f ................ 254s | XCBC: K: 254s | 00 01 02 03 04 05 06 07 08 09 0a 0b 0c 0d 0e 0f ................ 254s | XCBC: K1 254s | c3 52 80 57 54 23 7f 31 1a c0 ff f4 e3 e0 3e 78 .R.WT#.1......>x 254s | CONCATENATE_DATA_AND_BASE: 254s | target: EXTRACT_KEY_FROM_KEY 254s | base: base-key@0x14b173b8a290 (16-bytes, AES_KEY_GEN) 254s | params: 16-bytes@0x7fffc0f80500 254s | key-offset: 0, key-size: 16 254s | EXTRACT_KEY_FROM_KEY: 254s | target: AES_ECB 254s | flags: SIGN 254s | key_size: 16-bytes 254s | base: base-key@0x14b173b8bbb0 (32-bytes, EXTRACT_KEY_FROM_KEY) 254s | operation: FLAGS_ONLY 254s | params: 8-bytes@0x7fffc0f80508 254s | XCBC: Computing E[1] using K2 254s | XCBC: K2 254s | bd 86 2f fb 97 ad 2f b8 f8 b8 91 f6 03 2f 36 cb ../.../....../6. 254s | XCBC: E[n-1] 254s | 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................ 254s | XCBC: M[n] 254s | 00 01 02 03 04 05 06 07 08 09 0a 0b 0c 0d 0e 0f ................ 254s | XCBC: M[n]^E[n-1]^K2 254s | bd 87 2d f8 93 a8 29 bf f0 b1 9b fd 0f 22 38 c4 ..-...)......"8. 254s | XCBC: MAC 254s | d2 a2 46 fa 34 9b 68 a7 99 98 a4 39 4f f7 a2 63 ..F.4.h....9O..c 254s | PRF chunk interface PRF AES_XCBC final length 16 254s | d2 a2 46 fa 34 9b 68 a7 99 98 a4 39 4f f7 a2 63 ..F.4.h....9O..c 254s | chunk output 254s | d2 a2 46 fa 34 9b 68 a7 99 98 a4 39 4f f7 a2 63 ..F.4.h....9O..c 254s | verify_bytes() RFC 3566 Test Case 3: AES-XCBC-MAC-96 with 16-byte input: prf OUT: ok 254s | CONCATENATE_DATA_AND_BASE: 254s | target: EXTRACT_KEY_FROM_KEY 254s | base: base-key@0x14b173b8a290 (16-bytes, AES_KEY_GEN) 254s | params: 16-bytes@0x7fffc0f80800 254s | key-offset: 0, key-size: 16 254s | EXTRACT_KEY_FROM_KEY: 254s | target: EXTRACT_KEY_FROM_KEY 254s | key_size: 16-bytes 254s | base: base-key@0x14b173b8e380 (32-bytes, EXTRACT_KEY_FROM_KEY) 254s | operation: FLAGS_ONLY 254s | params: 8-bytes@0x7fffc0f80738 254s | PRF symkey interface PRF AES_XCBC init key symkey-key@0x14b173b8d2a0 (size 16) 254s | PRF symkey interface: key symkey-key@0x14b173b8d2a0 (16-bytes, EXTRACT_KEY_FROM_KEY) 254s | XCBC: Key 16=16 just right 254s | key-offset: 0, key-size: 16 254s | EXTRACT_KEY_FROM_KEY: 254s | target: AES_ECB 254s | flags: SIGN 254s | key_size: 16-bytes 254s | base: base-key@0x14b173b8d2a0 (16-bytes, EXTRACT_KEY_FROM_KEY) 254s | operation: FLAGS_ONLY 254s | params: 8-bytes@0x7fffc0f80668 254s | PRF symkey interface PRF AES_XCBC 0x14b173b8a230 254s | CONCATENATE_DATA_AND_BASE: 254s | target: EXTRACT_KEY_FROM_KEY 254s | base: base-key@0x14b173b8a290 (16-bytes, AES_KEY_GEN) 254s | params: 16-bytes@0x7fffc0f80800 254s | key-offset: 0, key-size: 16 254s | EXTRACT_KEY_FROM_KEY: 254s | target: EXTRACT_KEY_FROM_KEY 254s | key_size: 16-bytes 254s | base: base-key@0x14b173b8e040 (32-bytes, EXTRACT_KEY_FROM_KEY) 254s | operation: FLAGS_ONLY 254s | params: 8-bytes@0x7fffc0f80738 254s | PRF symkey interface PRF AES_XCBC update symkey message-key@0x14b173b8bbb0 (size 16) 254s | PRF symkey interface: symkey message-key@0x14b173b8bbb0 (16-bytes, EXTRACT_KEY_FROM_KEY) 254s | symkey message extracting all 16 bytes of key@0x14b173b8bbb0 254s | symkey message: symkey-key@0x14b173b8bbb0 (16-bytes, EXTRACT_KEY_FROM_KEY) 254s | sizeof bytes 16 254s | wrapper: (SECItemType)-1057488160: 07 de a2 6b a1 39 64 a4 53 5e 31 e4 70 ab 6f bb 254s | symkey message extracted len 16 bytes at 0x14b173b8deb0 254s | unwrapped: 254s | 00 01 02 03 04 05 06 07 08 09 0a 0b 0c 0d 0e 0f ................ 254s | XCBC: data 254s | 00 01 02 03 04 05 06 07 08 09 0a 0b 0c 0d 0e 0f ................ 254s | K extracting all 16 bytes of key@0x14b173b8e380 254s | K: symkey-key@0x14b173b8e380 (16-bytes, AES_ECB) 254s | sizeof bytes 16 254s | wrapper: (SECItemType)16: 07 de a2 6b a1 39 64 a4 53 5e 31 e4 70 ab 6f bb 254s | K extracted len 16 bytes at 0x14b173b89fc0 254s | unwrapped: 254s | 00 01 02 03 04 05 06 07 08 09 0a 0b 0c 0d 0e 0f ................ 254s | XCBC: K: 254s | 00 01 02 03 04 05 06 07 08 09 0a 0b 0c 0d 0e 0f ................ 254s | XCBC: K1 254s | c3 52 80 57 54 23 7f 31 1a c0 ff f4 e3 e0 3e 78 .R.WT#.1......>x 254s | CONCATENATE_DATA_AND_BASE: 254s | target: EXTRACT_KEY_FROM_KEY 254s | base: base-key@0x14b173b8a290 (16-bytes, AES_KEY_GEN) 254s | params: 16-bytes@0x7fffc0f80550 254s | key-offset: 0, key-size: 16 254s | EXTRACT_KEY_FROM_KEY: 254s | target: AES_ECB 254s | flags: SIGN 254s | key_size: 16-bytes 254s | base: base-key@0x14b173b8e6e0 (32-bytes, EXTRACT_KEY_FROM_KEY) 254s | operation: FLAGS_ONLY 254s | params: 8-bytes@0x7fffc0f80558 254s | XCBC: Computing E[1] using K2 254s | XCBC: K2 254s | bd 86 2f fb 97 ad 2f b8 f8 b8 91 f6 03 2f 36 cb ../.../....../6. 254s | XCBC: E[n-1] 254s | 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................ 254s | XCBC: M[n] 254s | 00 01 02 03 04 05 06 07 08 09 0a 0b 0c 0d 0e 0f ................ 254s | XCBC: M[n]^E[n-1]^K2 254s | bd 87 2d f8 93 a8 29 bf f0 b1 9b fd 0f 22 38 c4 ..-...)......"8. 254s | XCBC: MAC 254s | d2 a2 46 fa 34 9b 68 a7 99 98 a4 39 4f f7 a2 63 ..F.4.h....9O..c 254s | CONCATENATE_DATA_AND_BASE: 254s | target: EXTRACT_KEY_FROM_KEY 254s | base: base-key@0x14b173b8a290 (16-bytes, AES_KEY_GEN) 254s | params: 16-bytes@0x7fffc0f80720 254s | key-offset: 0, key-size: 16 254s | EXTRACT_KEY_FROM_KEY: 254s | target: EXTRACT_KEY_FROM_KEY 254s | key_size: 16-bytes 254s | base: base-key@0x14b173b8e6e0 (32-bytes, EXTRACT_KEY_FROM_KEY) 254s | operation: FLAGS_ONLY 254s | params: 8-bytes@0x7fffc0f80658 254s | PRF symkey interface PRF AES_XCBC final-key@0x14b173b8e040 (size 16) 254s | PRF symkey interface: key-key@0x14b173b8e040 (16-bytes, EXTRACT_KEY_FROM_KEY) 254s | output: symkey-key@0x14b173b8e040 (16-bytes, EXTRACT_KEY_FROM_KEY) 254s | RFC 3566 Test Case 3: AES-XCBC-MAC-96 with 16-byte input extracting all 16 bytes of key@0x14b173b8e040 254s | RFC 3566 Test Case 3: AES-XCBC-MAC-96 with 16-byte input: symkey-key@0x14b173b8e040 (16-bytes, EXTRACT_KEY_FROM_KEY) 254s | sizeof bytes 16 254s | wrapper: (SECItemType)-1057488144: 81 9d 43 60 1a 1a d7 c9 d1 8e b4 ea ea 05 76 9d 254s | RFC 3566 Test Case 3: AES-XCBC-MAC-96 with 16-byte input extracted len 16 bytes at 0x14b173b89fc0 254s | unwrapped: 254s | d2 a2 46 fa 34 9b 68 a7 99 98 a4 39 4f f7 a2 63 ..F.4.h....9O..c 254s | verify_bytes() RFC 3566 Test Case 3: AES-XCBC-MAC-96 with 16-byte input: symkey: ok 254s ipsec algparse: RFC 3566 Test Case 4: AES-XCBC-MAC-96 with 20-byte input 254s | decode_to_chunk() test_prf_vector: input "0x000102030405060708090a0b0c0d0e0f" 254s | decode_to_chunk() output: 254s | 00 01 02 03 04 05 06 07 08 09 0a 0b 0c 0d 0e 0f ................ 254s | decode_to_chunk() test_prf_vector: input "0x000102030405060708090a0b0c0d0e0f10111213" 254s | decode_to_chunk() output: 254s | 00 01 02 03 04 05 06 07 08 09 0a 0b 0c 0d 0e 0f ................ 254s | 10 11 12 13 .... 254s | decode_to_chunk() test_prf_vector: input "0x47f51b4564966215b8985c63055ed308" 254s | decode_to_chunk() output: 254s | 47 f5 1b 45 64 96 62 15 b8 98 5c 63 05 5e d3 08 G..Ed.b...\c.^.. 254s | PRF chunk interface PRF AES_XCBC init key hunk 0x14b173b8d5d0 (length 16) 254s | 00 01 02 03 04 05 06 07 08 09 0a 0b 0c 0d 0e 0f ................ 254s | CONCATENATE_DATA_AND_BASE: 254s | target: EXTRACT_KEY_FROM_KEY 254s | base: base-key@0x14b173b8a290 (16-bytes, AES_KEY_GEN) 254s | params: 16-bytes@0x7fffc0f80710 254s | key-offset: 0, key-size: 16 254s | EXTRACT_KEY_FROM_KEY: 254s | target: EXTRACT_KEY_FROM_KEY 254s | key_size: 16-bytes 254s | base: base-key@0x14b173b8d2a0 (32-bytes, EXTRACT_KEY_FROM_KEY) 254s | operation: FLAGS_ONLY 254s | params: 8-bytes@0x7fffc0f80648 254s | XCBC: Key 16=16 just right 254s | key-offset: 0, key-size: 16 254s | EXTRACT_KEY_FROM_KEY: 254s | target: AES_ECB 254s | flags: SIGN 254s | key_size: 16-bytes 254s | base: base-key@0x14b173b8e040 (16-bytes, EXTRACT_KEY_FROM_KEY) 254s | operation: FLAGS_ONLY 254s | params: 8-bytes@0x7fffc0f80618 254s | PRF chunk interface PRF AES_XCBC 0x14b173b8a230 254s | PRF chunk interface PRF AES_XCBC update message (0x14b173b8bae0 length 20) 254s | 00 01 02 03 04 05 06 07 08 09 0a 0b 0c 0d 0e 0f ................ 254s | 10 11 12 13 .... 254s | XCBC: data 254s | 00 01 02 03 04 05 06 07 08 09 0a 0b 0c 0d 0e 0f ................ 254s | 10 11 12 13 .... 254s | K extracting all 16 bytes of key@0x14b173b8d2a0 254s | K: symkey-key@0x14b173b8d2a0 (16-bytes, AES_ECB) 254s | sizeof bytes 16 254s | wrapper: (SECItemType)-1057487320: 07 de a2 6b a1 39 64 a4 53 5e 31 e4 70 ab 6f bb 254s | K extracted len 16 bytes at 0x14b173b8ea20 254s | unwrapped: 254s | 00 01 02 03 04 05 06 07 08 09 0a 0b 0c 0d 0e 0f ................ 254s | XCBC: K: 254s | 00 01 02 03 04 05 06 07 08 09 0a 0b 0c 0d 0e 0f ................ 254s | XCBC: K1 254s | c3 52 80 57 54 23 7f 31 1a c0 ff f4 e3 e0 3e 78 .R.WT#.1......>x 254s | CONCATENATE_DATA_AND_BASE: 254s | target: EXTRACT_KEY_FROM_KEY 254s | base: base-key@0x14b173b8a290 (16-bytes, AES_KEY_GEN) 254s | params: 16-bytes@0x7fffc0f80500 254s | key-offset: 0, key-size: 16 254s | EXTRACT_KEY_FROM_KEY: 254s | target: AES_ECB 254s | flags: SIGN 254s | key_size: 16-bytes 254s | base: base-key@0x14b173b8bbb0 (32-bytes, EXTRACT_KEY_FROM_KEY) 254s | operation: FLAGS_ONLY 254s | params: 8-bytes@0x7fffc0f80508 254s | Computing E[2] using K3 254s | XCBC: K3 254s | c1 a7 ab a1 a2 3a 94 06 58 07 a0 8c c8 ee d0 6e .....:..X......n 254s | XCBC: E[n-1] 254s | 1d 04 48 fa cf 4d 9c 6f 55 b9 93 da 09 80 3d b3 ..H..M.oU.....=. 254s | XCBC: M[n] 254s | 10 11 12 13 .... 254s | XCBC: M[n] 254s | 10 11 12 13 .... 254s | XCBC: M[n]:80...^E[n-1]^K3 254s | cc b2 f1 48 ed 77 08 69 0d be 33 56 c1 6e ed dd ...H.w.i..3V.n.. 254s | XCBC: MAC 254s | 47 f5 1b 45 64 96 62 15 b8 98 5c 63 05 5e d3 08 G..Ed.b...\c.^.. 254s | PRF chunk interface PRF AES_XCBC final length 16 254s | 47 f5 1b 45 64 96 62 15 b8 98 5c 63 05 5e d3 08 G..Ed.b...\c.^.. 254s | chunk output 254s | 47 f5 1b 45 64 96 62 15 b8 98 5c 63 05 5e d3 08 G..Ed.b...\c.^.. 254s | verify_bytes() RFC 3566 Test Case 4: AES-XCBC-MAC-96 with 20-byte input: prf OUT: ok 254s | CONCATENATE_DATA_AND_BASE: 254s | target: EXTRACT_KEY_FROM_KEY 254s | base: base-key@0x14b173b8a290 (16-bytes, AES_KEY_GEN) 254s | params: 16-bytes@0x7fffc0f80800 254s | key-offset: 0, key-size: 16 254s | EXTRACT_KEY_FROM_KEY: 254s | target: EXTRACT_KEY_FROM_KEY 254s | key_size: 16-bytes 254s | base: base-key@0x14b173b8e040 (32-bytes, EXTRACT_KEY_FROM_KEY) 254s | operation: FLAGS_ONLY 254s | params: 8-bytes@0x7fffc0f80738 254s | PRF symkey interface PRF AES_XCBC init key symkey-key@0x14b173b8d2a0 (size 16) 254s | PRF symkey interface: key symkey-key@0x14b173b8d2a0 (16-bytes, EXTRACT_KEY_FROM_KEY) 254s | XCBC: Key 16=16 just right 254s | key-offset: 0, key-size: 16 254s | EXTRACT_KEY_FROM_KEY: 254s | target: AES_ECB 254s | flags: SIGN 254s | key_size: 16-bytes 254s | base: base-key@0x14b173b8d2a0 (16-bytes, EXTRACT_KEY_FROM_KEY) 254s | operation: FLAGS_ONLY 254s | params: 8-bytes@0x7fffc0f80668 254s | PRF symkey interface PRF AES_XCBC 0x14b173b8a230 254s | CONCATENATE_DATA_AND_BASE: 254s | target: EXTRACT_KEY_FROM_KEY 254s | base: base-key@0x14b173b8a290 (16-bytes, AES_KEY_GEN) 254s | params: 16-bytes@0x7fffc0f80800 254s | key-offset: 0, key-size: 20 254s | EXTRACT_KEY_FROM_KEY: 254s | target: EXTRACT_KEY_FROM_KEY 254s | key_size: 20-bytes 254s | base: base-key@0x14b173b8e380 (36-bytes, EXTRACT_KEY_FROM_KEY) 254s | operation: FLAGS_ONLY 254s | params: 8-bytes@0x7fffc0f80738 254s | PRF symkey interface PRF AES_XCBC update symkey message-key@0x14b173b8bbb0 (size 20) 254s | PRF symkey interface: symkey message-key@0x14b173b8bbb0 (20-bytes, EXTRACT_KEY_FROM_KEY) 254s | symkey message extracting all 20 bytes of key@0x14b173b8bbb0 254s | symkey message: symkey-key@0x14b173b8bbb0 (20-bytes, EXTRACT_KEY_FROM_KEY) 254s | sizeof bytes 32 254s | wrapper: (SECItemType)-1057488160: 07 de a2 6b a1 39 64 a4 53 5e 31 e4 70 ab 6f bb c8 4e 08 3f af 24 d6 be 17 3f 80 03 eb 79 cc 4d 254s | symkey message extracted len 32 bytes at 0x14b173b8dc20 254s | unwrapped: 254s | 00 01 02 03 04 05 06 07 08 09 0a 0b 0c 0d 0e 0f ................ 254s | 10 11 12 13 00 00 00 00 00 00 00 00 00 00 00 00 ................ 254s | XCBC: data 254s | 00 01 02 03 04 05 06 07 08 09 0a 0b 0c 0d 0e 0f ................ 254s | 10 11 12 13 .... 254s | K extracting all 16 bytes of key@0x14b173b8e040 254s | K: symkey-key@0x14b173b8e040 (16-bytes, AES_ECB) 254s | sizeof bytes 16 254s | wrapper: (SECItemType)20: 07 de a2 6b a1 39 64 a4 53 5e 31 e4 70 ab 6f bb 254s | K extracted len 16 bytes at 0x14b173b8a160 254s | unwrapped: 254s | 00 01 02 03 04 05 06 07 08 09 0a 0b 0c 0d 0e 0f ................ 254s | XCBC: K: 254s | 00 01 02 03 04 05 06 07 08 09 0a 0b 0c 0d 0e 0f ................ 254s | XCBC: K1 254s | c3 52 80 57 54 23 7f 31 1a c0 ff f4 e3 e0 3e 78 .R.WT#.1......>x 254s | CONCATENATE_DATA_AND_BASE: 254s | target: EXTRACT_KEY_FROM_KEY 254s | base: base-key@0x14b173b8a290 (16-bytes, AES_KEY_GEN) 254s | params: 16-bytes@0x7fffc0f80550 254s | key-offset: 0, key-size: 16 254s | EXTRACT_KEY_FROM_KEY: 254s | target: AES_ECB 254s | flags: SIGN 254s | key_size: 16-bytes 254s | base: base-key@0x14b173b8e6e0 (32-bytes, EXTRACT_KEY_FROM_KEY) 254s | operation: FLAGS_ONLY 254s | params: 8-bytes@0x7fffc0f80558 254s | Computing E[2] using K3 254s | XCBC: K3 254s | c1 a7 ab a1 a2 3a 94 06 58 07 a0 8c c8 ee d0 6e .....:..X......n 254s | XCBC: E[n-1] 254s | 1d 04 48 fa cf 4d 9c 6f 55 b9 93 da 09 80 3d b3 ..H..M.oU.....=. 254s | XCBC: M[n] 254s | 10 11 12 13 .... 254s | XCBC: M[n] 254s | 10 11 12 13 .... 254s | XCBC: M[n]:80...^E[n-1]^K3 254s | cc b2 f1 48 ed 77 08 69 0d be 33 56 c1 6e ed dd ...H.w.i..3V.n.. 254s | XCBC: MAC 254s | 47 f5 1b 45 64 96 62 15 b8 98 5c 63 05 5e d3 08 G..Ed.b...\c.^.. 254s | CONCATENATE_DATA_AND_BASE: 254s | target: EXTRACT_KEY_FROM_KEY 254s | base: base-key@0x14b173b8a290 (16-bytes, AES_KEY_GEN) 254s | params: 16-bytes@0x7fffc0f80720 254s | key-offset: 0, key-size: 16 254s | EXTRACT_KEY_FROM_KEY: 254s | target: EXTRACT_KEY_FROM_KEY 254s | key_size: 16-bytes 254s | base: base-key@0x14b173b8e6e0 (32-bytes, EXTRACT_KEY_FROM_KEY) 254s | operation: FLAGS_ONLY 254s | params: 8-bytes@0x7fffc0f80658 254s | PRF symkey interface PRF AES_XCBC final-key@0x14b173b8e380 (size 16) 254s | PRF symkey interface: key-key@0x14b173b8e380 (16-bytes, EXTRACT_KEY_FROM_KEY) 254s | output: symkey-key@0x14b173b8e380 (16-bytes, EXTRACT_KEY_FROM_KEY) 254s | RFC 3566 Test Case 4: AES-XCBC-MAC-96 with 20-byte input extracting all 16 bytes of key@0x14b173b8e380 254s | RFC 3566 Test Case 4: AES-XCBC-MAC-96 with 20-byte input: symkey-key@0x14b173b8e380 (16-bytes, EXTRACT_KEY_FROM_KEY) 254s | sizeof bytes 16 254s | wrapper: (SECItemType)-1057488144: 51 37 db 88 f3 6c 0e c9 5a c1 7a f5 be 81 7f 1b 254s | RFC 3566 Test Case 4: AES-XCBC-MAC-96 with 20-byte input extracted len 16 bytes at 0x14b173b8a160 254s | unwrapped: 254s | 47 f5 1b 45 64 96 62 15 b8 98 5c 63 05 5e d3 08 G..Ed.b...\c.^.. 254s | verify_bytes() RFC 3566 Test Case 4: AES-XCBC-MAC-96 with 20-byte input: symkey: ok 254s ipsec algparse: RFC 3566 Test Case 5: AES-XCBC-MAC-96 with 32-byte input 254s | decode_to_chunk() test_prf_vector: input "0x000102030405060708090a0b0c0d0e0f" 254s | decode_to_chunk() output: 254s | 00 01 02 03 04 05 06 07 08 09 0a 0b 0c 0d 0e 0f ................ 254s | decode_to_chunk() test_prf_vector: input "0x000102030405060708090a0b0c0d0e0f101112131415161718191a1b1c1d1e1f" 254s | decode_to_chunk() output: 254s | 00 01 02 03 04 05 06 07 08 09 0a 0b 0c 0d 0e 0f ................ 254s | 10 11 12 13 14 15 16 17 18 19 1a 1b 1c 1d 1e 1f ................ 254s | decode_to_chunk() test_prf_vector: input "0xf54f0ec8d2b9f3d36807734bd5283fd4" 254s | decode_to_chunk() output: 254s | f5 4f 0e c8 d2 b9 f3 d3 68 07 73 4b d5 28 3f d4 .O......h.sK.(?. 254s | PRF chunk interface PRF AES_XCBC init key hunk 0x14b173b8d5d0 (length 16) 254s | 00 01 02 03 04 05 06 07 08 09 0a 0b 0c 0d 0e 0f ................ 254s | CONCATENATE_DATA_AND_BASE: 254s | target: EXTRACT_KEY_FROM_KEY 255s | base: base-key@0x14b173b8a290 (16-bytes, AES_KEY_GEN) 255s | params: 16-bytes@0x7fffc0f80710 255s | key-offset: 0, key-size: 16 255s | EXTRACT_KEY_FROM_KEY: 255s | target: EXTRACT_KEY_FROM_KEY 255s | key_size: 16-bytes 255s | base: base-key@0x14b173b8d2a0 (32-bytes, EXTRACT_KEY_FROM_KEY) 255s | operation: FLAGS_ONLY 255s | params: 8-bytes@0x7fffc0f80648 255s | XCBC: Key 16=16 just right 255s | key-offset: 0, key-size: 16 255s | EXTRACT_KEY_FROM_KEY: 255s | target: AES_ECB 255s | flags: SIGN 255s | key_size: 16-bytes 255s | base: base-key@0x14b173b8e380 (16-bytes, EXTRACT_KEY_FROM_KEY) 255s | operation: FLAGS_ONLY 255s | params: 8-bytes@0x7fffc0f80618 255s | PRF chunk interface PRF AES_XCBC 0x14b173b8dc20 255s | PRF chunk interface PRF AES_XCBC update message (0x14b173b8a230 length 32) 255s | 00 01 02 03 04 05 06 07 08 09 0a 0b 0c 0d 0e 0f ................ 255s | 10 11 12 13 14 15 16 17 18 19 1a 1b 1c 1d 1e 1f ................ 255s | XCBC: data 255s | 00 01 02 03 04 05 06 07 08 09 0a 0b 0c 0d 0e 0f ................ 255s | 10 11 12 13 14 15 16 17 18 19 1a 1b 1c 1d 1e 1f ................ 255s | K extracting all 16 bytes of key@0x14b173b8d2a0 255s | K: symkey-key@0x14b173b8d2a0 (16-bytes, AES_ECB) 255s | sizeof bytes 16 255s | wrapper: (SECItemType)-1057487320: 07 de a2 6b a1 39 64 a4 53 5e 31 e4 70 ab 6f bb 255s | K extracted len 16 bytes at 0x14b173b8d8e0 255s | unwrapped: 255s | 00 01 02 03 04 05 06 07 08 09 0a 0b 0c 0d 0e 0f ................ 255s | XCBC: K: 255s | 00 01 02 03 04 05 06 07 08 09 0a 0b 0c 0d 0e 0f ................ 255s | XCBC: K1 255s | c3 52 80 57 54 23 7f 31 1a c0 ff f4 e3 e0 3e 78 .R.WT#.1......>x 255s | CONCATENATE_DATA_AND_BASE: 255s | target: EXTRACT_KEY_FROM_KEY 255s | base: base-key@0x14b173b8a290 (16-bytes, AES_KEY_GEN) 255s | params: 16-bytes@0x7fffc0f80500 255s | key-offset: 0, key-size: 16 255s | EXTRACT_KEY_FROM_KEY: 255s | target: AES_ECB 255s | flags: SIGN 255s | key_size: 16-bytes 255s | base: base-key@0x14b173b8bbb0 (32-bytes, EXTRACT_KEY_FROM_KEY) 255s | operation: FLAGS_ONLY 255s | params: 8-bytes@0x7fffc0f80508 255s | XCBC: Computing E[2] using K2 255s | XCBC: K2 255s | bd 86 2f fb 97 ad 2f b8 f8 b8 91 f6 03 2f 36 cb ../.../....../6. 255s | XCBC: E[n-1] 255s | 1d 04 48 fa cf 4d 9c 6f 55 b9 93 da 09 80 3d b3 ..H..M.oU.....=. 255s | XCBC: M[n] 255s | 10 11 12 13 14 15 16 17 18 19 1a 1b 1c 1d 1e 1f ................ 255s | XCBC: M[n]^E[n-1]^K2 255s | b0 93 75 12 4c f5 a5 c0 b5 18 18 37 16 b2 15 67 ..u.L......7...g 255s | XCBC: MAC 255s | f5 4f 0e c8 d2 b9 f3 d3 68 07 73 4b d5 28 3f d4 .O......h.sK.(?. 255s | PRF chunk interface PRF AES_XCBC final length 16 255s | f5 4f 0e c8 d2 b9 f3 d3 68 07 73 4b d5 28 3f d4 .O......h.sK.(?. 255s | chunk output 255s | f5 4f 0e c8 d2 b9 f3 d3 68 07 73 4b d5 28 3f d4 .O......h.sK.(?. 255s | verify_bytes() RFC 3566 Test Case 5: AES-XCBC-MAC-96 with 32-byte input: prf OUT: ok 255s | CONCATENATE_DATA_AND_BASE: 255s | target: EXTRACT_KEY_FROM_KEY 255s | base: base-key@0x14b173b8a290 (16-bytes, AES_KEY_GEN) 255s | params: 16-bytes@0x7fffc0f80800 255s | key-offset: 0, key-size: 16 255s | EXTRACT_KEY_FROM_KEY: 255s | target: EXTRACT_KEY_FROM_KEY 255s | key_size: 16-bytes 255s | base: base-key@0x14b173b8e380 (32-bytes, EXTRACT_KEY_FROM_KEY) 255s | operation: FLAGS_ONLY 255s | params: 8-bytes@0x7fffc0f80738 255s | PRF symkey interface PRF AES_XCBC init key symkey-key@0x14b173b8d2a0 (size 16) 255s | PRF symkey interface: key symkey-key@0x14b173b8d2a0 (16-bytes, EXTRACT_KEY_FROM_KEY) 255s | XCBC: Key 16=16 just right 255s | key-offset: 0, key-size: 16 255s | EXTRACT_KEY_FROM_KEY: 255s | target: AES_ECB 255s | flags: SIGN 255s | key_size: 16-bytes 255s | base: base-key@0x14b173b8d2a0 (16-bytes, EXTRACT_KEY_FROM_KEY) 255s | operation: FLAGS_ONLY 255s | params: 8-bytes@0x7fffc0f80668 255s | PRF symkey interface PRF AES_XCBC 0x14b173b8dc20 255s | CONCATENATE_DATA_AND_BASE: 255s | target: EXTRACT_KEY_FROM_KEY 255s | base: base-key@0x14b173b8a290 (16-bytes, AES_KEY_GEN) 255s | params: 16-bytes@0x7fffc0f80800 255s | key-offset: 0, key-size: 32 255s | EXTRACT_KEY_FROM_KEY: 255s | target: EXTRACT_KEY_FROM_KEY 255s | key_size: 32-bytes 255s | base: base-key@0x14b173b8e040 (48-bytes, EXTRACT_KEY_FROM_KEY) 255s | operation: FLAGS_ONLY 255s | params: 8-bytes@0x7fffc0f80738 255s | PRF symkey interface PRF AES_XCBC update symkey message-key@0x14b173b8bbb0 (size 32) 255s | PRF symkey interface: symkey message-key@0x14b173b8bbb0 (32-bytes, EXTRACT_KEY_FROM_KEY) 255s | symkey message extracting all 32 bytes of key@0x14b173b8bbb0 255s | symkey message: symkey-key@0x14b173b8bbb0 (32-bytes, EXTRACT_KEY_FROM_KEY) 255s | sizeof bytes 32 255s | wrapper: (SECItemType)-1057488160: 07 de a2 6b a1 39 64 a4 53 5e 31 e4 70 ab 6f bb f3 e3 a3 2b 3b c1 a6 70 5a 96 c7 f7 0f 1d f7 dd 255s | symkey message extracted len 32 bytes at 0x14b173b8e9a0 255s | unwrapped: 255s | 00 01 02 03 04 05 06 07 08 09 0a 0b 0c 0d 0e 0f ................ 255s | 10 11 12 13 14 15 16 17 18 19 1a 1b 1c 1d 1e 1f ................ 255s | XCBC: data 255s | 00 01 02 03 04 05 06 07 08 09 0a 0b 0c 0d 0e 0f ................ 255s | 10 11 12 13 14 15 16 17 18 19 1a 1b 1c 1d 1e 1f ................ 255s | K extracting all 16 bytes of key@0x14b173b8e380 255s | K: symkey-key@0x14b173b8e380 (16-bytes, AES_ECB) 255s | sizeof bytes 16 255s | wrapper: (SECItemType)32: 07 de a2 6b a1 39 64 a4 53 5e 31 e4 70 ab 6f bb 255s | K extracted len 16 bytes at 0x14b173b8d5f0 255s | unwrapped: 255s | 00 01 02 03 04 05 06 07 08 09 0a 0b 0c 0d 0e 0f ................ 255s | XCBC: K: 255s | 00 01 02 03 04 05 06 07 08 09 0a 0b 0c 0d 0e 0f ................ 255s | XCBC: K1 255s | c3 52 80 57 54 23 7f 31 1a c0 ff f4 e3 e0 3e 78 .R.WT#.1......>x 255s | CONCATENATE_DATA_AND_BASE: 255s | target: EXTRACT_KEY_FROM_KEY 255s | base: base-key@0x14b173b8a290 (16-bytes, AES_KEY_GEN) 255s | params: 16-bytes@0x7fffc0f80550 255s | key-offset: 0, key-size: 16 255s | EXTRACT_KEY_FROM_KEY: 255s | target: AES_ECB 255s | flags: SIGN 255s | key_size: 16-bytes 255s | base: base-key@0x14b173b8e6e0 (32-bytes, EXTRACT_KEY_FROM_KEY) 255s | operation: FLAGS_ONLY 255s | params: 8-bytes@0x7fffc0f80558 255s | XCBC: Computing E[2] using K2 255s | XCBC: K2 255s | bd 86 2f fb 97 ad 2f b8 f8 b8 91 f6 03 2f 36 cb ../.../....../6. 255s | XCBC: E[n-1] 255s | 1d 04 48 fa cf 4d 9c 6f 55 b9 93 da 09 80 3d b3 ..H..M.oU.....=. 255s | XCBC: M[n] 255s | 10 11 12 13 14 15 16 17 18 19 1a 1b 1c 1d 1e 1f ................ 255s | XCBC: M[n]^E[n-1]^K2 255s | b0 93 75 12 4c f5 a5 c0 b5 18 18 37 16 b2 15 67 ..u.L......7...g 255s | XCBC: MAC 255s | f5 4f 0e c8 d2 b9 f3 d3 68 07 73 4b d5 28 3f d4 .O......h.sK.(?. 255s | CONCATENATE_DATA_AND_BASE: 255s | target: EXTRACT_KEY_FROM_KEY 255s | base: base-key@0x14b173b8a290 (16-bytes, AES_KEY_GEN) 255s | params: 16-bytes@0x7fffc0f80720 255s | key-offset: 0, key-size: 16 255s | EXTRACT_KEY_FROM_KEY: 255s | target: EXTRACT_KEY_FROM_KEY 255s | key_size: 16-bytes 255s | base: base-key@0x14b173b8e6e0 (32-bytes, EXTRACT_KEY_FROM_KEY) 255s | operation: FLAGS_ONLY 255s | params: 8-bytes@0x7fffc0f80658 255s | PRF symkey interface PRF AES_XCBC final-key@0x14b173b8e040 (size 16) 255s | PRF symkey interface: key-key@0x14b173b8e040 (16-bytes, EXTRACT_KEY_FROM_KEY) 255s | output: symkey-key@0x14b173b8e040 (16-bytes, EXTRACT_KEY_FROM_KEY) 255s | RFC 3566 Test Case 5: AES-XCBC-MAC-96 with 32-byte input extracting all 16 bytes of key@0x14b173b8e040 255s | RFC 3566 Test Case 5: AES-XCBC-MAC-96 with 32-byte input: symkey-key@0x14b173b8e040 (16-bytes, EXTRACT_KEY_FROM_KEY) 255s | sizeof bytes 16 255s | wrapper: (SECItemType)-1057488144: 42 cc 0e b4 a0 a8 38 15 7b c9 43 05 29 c9 ea ba 255s | RFC 3566 Test Case 5: AES-XCBC-MAC-96 with 32-byte input extracted len 16 bytes at 0x14b173b8deb0 255s | unwrapped: 255s | f5 4f 0e c8 d2 b9 f3 d3 68 07 73 4b d5 28 3f d4 .O......h.sK.(?. 255s | verify_bytes() RFC 3566 Test Case 5: AES-XCBC-MAC-96 with 32-byte input: symkey: ok 255s ipsec algparse: RFC 3566 Test Case 6: AES-XCBC-MAC-96 with 34-byte input 255s | decode_to_chunk() test_prf_vector: input "0x000102030405060708090a0b0c0d0e0f" 255s | decode_to_chunk() output: 255s | 00 01 02 03 04 05 06 07 08 09 0a 0b 0c 0d 0e 0f ................ 255s | decode_to_chunk() test_prf_vector: input "0x000102030405060708090a0b0c0d0e0f101112131415161718191a1b1c1d1e1f2021" 255s | decode_to_chunk() output: 255s | 00 01 02 03 04 05 06 07 08 09 0a 0b 0c 0d 0e 0f ................ 255s | 10 11 12 13 14 15 16 17 18 19 1a 1b 1c 1d 1e 1f ................ 255s | 20 21 ! 255s | decode_to_chunk() test_prf_vector: input "0xbecbb3bccdb518a30677d5481fb6b4d8" 255s | decode_to_chunk() output: 255s | be cb b3 bc cd b5 18 a3 06 77 d5 48 1f b6 b4 d8 .........w.H.... 255s | PRF chunk interface PRF AES_XCBC init key hunk 0x14b173b8bae0 (length 16) 255s | 00 01 02 03 04 05 06 07 08 09 0a 0b 0c 0d 0e 0f ................ 255s | CONCATENATE_DATA_AND_BASE: 255s | target: EXTRACT_KEY_FROM_KEY 255s | base: base-key@0x14b173b8a290 (16-bytes, AES_KEY_GEN) 255s | params: 16-bytes@0x7fffc0f80710 255s | key-offset: 0, key-size: 16 255s | EXTRACT_KEY_FROM_KEY: 255s | target: EXTRACT_KEY_FROM_KEY 255s | key_size: 16-bytes 255s | base: base-key@0x14b173b8d2a0 (32-bytes, EXTRACT_KEY_FROM_KEY) 255s | operation: FLAGS_ONLY 255s | params: 8-bytes@0x7fffc0f80648 255s | XCBC: Key 16=16 just right 255s | key-offset: 0, key-size: 16 255s | EXTRACT_KEY_FROM_KEY: 255s | target: AES_ECB 255s | flags: SIGN 255s | key_size: 16-bytes 255s | base: base-key@0x14b173b8e040 (16-bytes, EXTRACT_KEY_FROM_KEY) 255s | operation: FLAGS_ONLY 255s | params: 8-bytes@0x7fffc0f80618 255s | PRF chunk interface PRF AES_XCBC 0x14b173b8a230 255s | PRF chunk interface PRF AES_XCBC update message (0x14b173b8a260 length 34) 255s | 00 01 02 03 04 05 06 07 08 09 0a 0b 0c 0d 0e 0f ................ 255s | 10 11 12 13 14 15 16 17 18 19 1a 1b 1c 1d 1e 1f ................ 255s | 20 21 ! 255s | XCBC: data 255s | 00 01 02 03 04 05 06 07 08 09 0a 0b 0c 0d 0e 0f ................ 255s | 10 11 12 13 14 15 16 17 18 19 1a 1b 1c 1d 1e 1f ................ 255s | 20 21 ! 255s | K extracting all 16 bytes of key@0x14b173b8d2a0 255s | K: symkey-key@0x14b173b8d2a0 (16-bytes, AES_ECB) 255s | sizeof bytes 16 255s | wrapper: (SECItemType)-1057487320: 07 de a2 6b a1 39 64 a4 53 5e 31 e4 70 ab 6f bb 255s | K extracted len 16 bytes at 0x14b173b8d5f0 255s | unwrapped: 255s | 00 01 02 03 04 05 06 07 08 09 0a 0b 0c 0d 0e 0f ................ 255s | XCBC: K: 255s | 00 01 02 03 04 05 06 07 08 09 0a 0b 0c 0d 0e 0f ................ 255s | XCBC: K1 255s | c3 52 80 57 54 23 7f 31 1a c0 ff f4 e3 e0 3e 78 .R.WT#.1......>x 255s | CONCATENATE_DATA_AND_BASE: 255s | target: EXTRACT_KEY_FROM_KEY 255s | base: base-key@0x14b173b8a290 (16-bytes, AES_KEY_GEN) 255s | params: 16-bytes@0x7fffc0f80500 255s | key-offset: 0, key-size: 16 255s | EXTRACT_KEY_FROM_KEY: 255s | target: AES_ECB 255s | flags: SIGN 255s | key_size: 16-bytes 255s | base: base-key@0x14b173b8bbb0 (32-bytes, EXTRACT_KEY_FROM_KEY) 255s | operation: FLAGS_ONLY 255s | params: 8-bytes@0x7fffc0f80508 255s | Computing E[3] using K3 255s | XCBC: K3 255s | c1 a7 ab a1 a2 3a 94 06 58 07 a0 8c c8 ee d0 6e .....:..X......n 255s | XCBC: E[n-1] 255s | 09 02 5e 5a 67 25 20 72 44 14 5c 6b 80 66 85 79 ..^Zg% rD.\k.f.y 255s | XCBC: M[n] 255s | 20 21 ! 255s | XCBC: M[n] 255s | 20 21 ! 255s | XCBC: M[n]:80...^E[n-1]^K3 255s | e8 84 75 fb c5 1f b4 74 1c 13 fc e7 48 88 55 17 ..u....t....H.U. 255s | XCBC: MAC 255s | be cb b3 bc cd b5 18 a3 06 77 d5 48 1f b6 b4 d8 .........w.H.... 255s | PRF chunk interface PRF AES_XCBC final length 16 255s | be cb b3 bc cd b5 18 a3 06 77 d5 48 1f b6 b4 d8 .........w.H.... 255s | chunk output 255s | be cb b3 bc cd b5 18 a3 06 77 d5 48 1f b6 b4 d8 .........w.H.... 255s | verify_bytes() RFC 3566 Test Case 6: AES-XCBC-MAC-96 with 34-byte input: prf OUT: ok 255s | CONCATENATE_DATA_AND_BASE: 255s | target: EXTRACT_KEY_FROM_KEY 255s | base: base-key@0x14b173b8a290 (16-bytes, AES_KEY_GEN) 255s | params: 16-bytes@0x7fffc0f80800 255s | key-offset: 0, key-size: 16 255s | EXTRACT_KEY_FROM_KEY: 255s | target: EXTRACT_KEY_FROM_KEY 255s | key_size: 16-bytes 255s | base: base-key@0x14b173b8e040 (32-bytes, EXTRACT_KEY_FROM_KEY) 255s | operation: FLAGS_ONLY 255s | params: 8-bytes@0x7fffc0f80738 255s | PRF symkey interface PRF AES_XCBC init key symkey-key@0x14b173b8d2a0 (size 16) 255s | PRF symkey interface: key symkey-key@0x14b173b8d2a0 (16-bytes, EXTRACT_KEY_FROM_KEY) 255s | XCBC: Key 16=16 just right 255s | key-offset: 0, key-size: 16 255s | EXTRACT_KEY_FROM_KEY: 255s | target: AES_ECB 255s | flags: SIGN 255s | key_size: 16-bytes 255s | base: base-key@0x14b173b8d2a0 (16-bytes, EXTRACT_KEY_FROM_KEY) 255s | operation: FLAGS_ONLY 255s | params: 8-bytes@0x7fffc0f80668 255s | PRF symkey interface PRF AES_XCBC 0x14b173b8a230 255s | CONCATENATE_DATA_AND_BASE: 255s | target: EXTRACT_KEY_FROM_KEY 255s | base: base-key@0x14b173b8a290 (16-bytes, AES_KEY_GEN) 255s | params: 16-bytes@0x7fffc0f80800 255s | key-offset: 0, key-size: 34 255s | EXTRACT_KEY_FROM_KEY: 255s | target: EXTRACT_KEY_FROM_KEY 255s | key_size: 34-bytes 255s | base: base-key@0x14b173b8e380 (50-bytes, EXTRACT_KEY_FROM_KEY) 255s | operation: FLAGS_ONLY 255s | params: 8-bytes@0x7fffc0f80738 255s | PRF symkey interface PRF AES_XCBC update symkey message-key@0x14b173b8bbb0 (size 34) 255s | PRF symkey interface: symkey message-key@0x14b173b8bbb0 (34-bytes, EXTRACT_KEY_FROM_KEY) 255s | symkey message extracting all 34 bytes of key@0x14b173b8bbb0 255s | symkey message: symkey-key@0x14b173b8bbb0 (34-bytes, EXTRACT_KEY_FROM_KEY) 255s | sizeof bytes 48 255s | wrapper: (SECItemType)-1057488160: 07 de a2 6b a1 39 64 a4 53 5e 31 e4 70 ab 6f bb f3 e3 a3 2b 3b c1 a6 70 5a 96 c7 f7 0f 1d f7 dd 72 90 db 26 1f 74 ef 73 1e 4d 01 05 4f 36 cc 8c 255s | symkey message extracted len 48 bytes at 0x14b173b8d900 255s | unwrapped: 255s | 00 01 02 03 04 05 06 07 08 09 0a 0b 0c 0d 0e 0f ................ 255s | 10 11 12 13 14 15 16 17 18 19 1a 1b 1c 1d 1e 1f ................ 255s | 20 21 00 00 00 00 00 00 00 00 00 00 00 00 00 00 !.............. 255s | XCBC: data 255s | 00 01 02 03 04 05 06 07 08 09 0a 0b 0c 0d 0e 0f ................ 255s | 10 11 12 13 14 15 16 17 18 19 1a 1b 1c 1d 1e 1f ................ 255s | 20 21 ! 255s | K extracting all 16 bytes of key@0x14b173b8e040 255s | K: symkey-key@0x14b173b8e040 (16-bytes, AES_ECB) 255s | sizeof bytes 16 255s | wrapper: (SECItemType)34: 07 de a2 6b a1 39 64 a4 53 5e 31 e4 70 ab 6f bb 255s | K extracted len 16 bytes at 0x14b173b8d8e0 255s | unwrapped: 255s | 00 01 02 03 04 05 06 07 08 09 0a 0b 0c 0d 0e 0f ................ 255s | XCBC: K: 255s | 00 01 02 03 04 05 06 07 08 09 0a 0b 0c 0d 0e 0f ................ 255s | XCBC: K1 255s | c3 52 80 57 54 23 7f 31 1a c0 ff f4 e3 e0 3e 78 .R.WT#.1......>x 255s | CONCATENATE_DATA_AND_BASE: 255s | target: EXTRACT_KEY_FROM_KEY 255s | base: base-key@0x14b173b8a290 (16-bytes, AES_KEY_GEN) 255s | params: 16-bytes@0x7fffc0f80550 255s | key-offset: 0, key-size: 16 255s | EXTRACT_KEY_FROM_KEY: 255s | target: AES_ECB 255s | flags: SIGN 255s | key_size: 16-bytes 255s | base: base-key@0x14b173b8e6e0 (32-bytes, EXTRACT_KEY_FROM_KEY) 255s | operation: FLAGS_ONLY 255s | params: 8-bytes@0x7fffc0f80558 255s | Computing E[3] using K3 255s | XCBC: K3 255s | c1 a7 ab a1 a2 3a 94 06 58 07 a0 8c c8 ee d0 6e .....:..X......n 255s | XCBC: E[n-1] 255s | 09 02 5e 5a 67 25 20 72 44 14 5c 6b 80 66 85 79 ..^Zg% rD.\k.f.y 255s | XCBC: M[n] 255s | 20 21 ! 255s | XCBC: M[n] 255s | 20 21 ! 255s | XCBC: M[n]:80...^E[n-1]^K3 255s | e8 84 75 fb c5 1f b4 74 1c 13 fc e7 48 88 55 17 ..u....t....H.U. 255s | XCBC: MAC 255s | be cb b3 bc cd b5 18 a3 06 77 d5 48 1f b6 b4 d8 .........w.H.... 255s | CONCATENATE_DATA_AND_BASE: 255s | target: EXTRACT_KEY_FROM_KEY 255s | base: base-key@0x14b173b8a290 (16-bytes, AES_KEY_GEN) 255s | params: 16-bytes@0x7fffc0f80720 255s | key-offset: 0, key-size: 16 255s | EXTRACT_KEY_FROM_KEY: 255s | target: EXTRACT_KEY_FROM_KEY 255s | key_size: 16-bytes 255s | base: base-key@0x14b173b8e6e0 (32-bytes, EXTRACT_KEY_FROM_KEY) 255s | operation: FLAGS_ONLY 255s | params: 8-bytes@0x7fffc0f80658 255s | PRF symkey interface PRF AES_XCBC final-key@0x14b173b8e380 (size 16) 255s | PRF symkey interface: key-key@0x14b173b8e380 (16-bytes, EXTRACT_KEY_FROM_KEY) 255s | output: symkey-key@0x14b173b8e380 (16-bytes, EXTRACT_KEY_FROM_KEY) 255s | RFC 3566 Test Case 6: AES-XCBC-MAC-96 with 34-byte input extracting all 16 bytes of key@0x14b173b8e380 255s | RFC 3566 Test Case 6: AES-XCBC-MAC-96 with 34-byte input: symkey-key@0x14b173b8e380 (16-bytes, EXTRACT_KEY_FROM_KEY) 255s | sizeof bytes 16 255s | wrapper: (SECItemType)-1057488144: 56 2c 6f 7d f0 62 a8 32 25 c9 2e 1a f5 7f b6 23 255s | RFC 3566 Test Case 6: AES-XCBC-MAC-96 with 34-byte input extracted len 16 bytes at 0x14b173b8e020 255s | unwrapped: 255s | be cb b3 bc cd b5 18 a3 06 77 d5 48 1f b6 b4 d8 .........w.H.... 255s | verify_bytes() RFC 3566 Test Case 6: AES-XCBC-MAC-96 with 34-byte input: symkey: ok 255s ipsec algparse: RFC 3566 Test Case 7: AES-XCBC-MAC-96 with 1000-byte input 255s | decode_to_chunk() test_prf_vector: input "0x000102030405060708090a0b0c0d0e0f" 255s | decode_to_chunk() output: 255s | 00 01 02 03 04 05 06 07 08 09 0a 0b 0c 0d 0e 0f ................ 255s | decode_to_chunk() test_prf_vector: input "0xf0dafee895db30253761103b5d84528f" 255s | decode_to_chunk() output: 255s | f0 da fe e8 95 db 30 25 37 61 10 3b 5d 84 52 8f ......0%7a.;].R. 255s | PRF chunk interface PRF AES_XCBC init key hunk 0x14b173b8a160 (length 16) 255s | 00 01 02 03 04 05 06 07 08 09 0a 0b 0c 0d 0e 0f ................ 255s | CONCATENATE_DATA_AND_BASE: 255s | target: EXTRACT_KEY_FROM_KEY 255s | base: base-key@0x14b173b8a290 (16-bytes, AES_KEY_GEN) 255s | params: 16-bytes@0x7fffc0f80710 255s | key-offset: 0, key-size: 16 255s | EXTRACT_KEY_FROM_KEY: 255s | target: EXTRACT_KEY_FROM_KEY 255s | key_size: 16-bytes 255s | base: base-key@0x14b173b8d2a0 (32-bytes, EXTRACT_KEY_FROM_KEY) 255s | operation: FLAGS_ONLY 255s | params: 8-bytes@0x7fffc0f80648 255s | XCBC: Key 16=16 just right 255s | key-offset: 0, key-size: 16 255s | EXTRACT_KEY_FROM_KEY: 255s | target: AES_ECB 255s | flags: SIGN 255s | key_size: 16-bytes 255s | base: base-key@0x14b173b8e380 (16-bytes, EXTRACT_KEY_FROM_KEY) 255s | operation: FLAGS_ONLY 255s | params: 8-bytes@0x7fffc0f80618 255s | PRF chunk interface PRF AES_XCBC 0x14b173b8dc20 255s | PRF chunk interface PRF AES_XCBC update message (0x14b173b8bce0 length 1000) 255s | 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................ 255s | 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................ 255s | 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................ 255s | 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................ 255s | 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................ 255s | 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................ 255s | 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................ 255s | 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................ 255s | 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................ 255s | 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................ 255s | 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................ 255s | 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................ 255s | 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................ 255s | 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................ 255s | 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................ 255s | 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................ 255s | 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................ 255s | 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................ 255s | 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................ 255s | 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................ 255s | 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................ 255s | 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................ 255s | 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................ 255s | 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................ 255s | 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................ 255s | 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................ 255s | 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................ 255s | 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................ 255s | 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................ 255s | 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................ 255s | 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................ 255s | 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................ 255s | 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................ 255s | 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................ 255s | 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................ 255s | 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................ 255s | 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................ 255s | 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................ 255s | 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................ 255s | 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................ 255s | 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................ 255s | 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................ 255s | 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................ 255s | 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................ 255s | 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................ 255s | 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................ 255s | 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................ 255s | 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................ 255s | 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................ 255s | 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................ 255s | 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................ 255s | 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................ 255s | 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................ 255s | 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................ 255s | 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................ 255s | 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................ 255s | 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................ 255s | 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................ 255s | 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................ 255s | 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................ 255s | 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................ 255s | 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................ 255s | 00 00 00 00 00 00 00 00 ........ 255s | XCBC: data 255s | 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................ 255s | 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................ 255s | 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................ 255s | 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................ 255s | 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................ 255s | 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................ 255s | 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................ 255s | 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................ 255s | 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................ 255s | 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................ 255s | 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................ 255s | 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................ 255s | 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................ 255s | 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................ 255s | 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................ 255s | 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................ 255s | 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................ 255s | 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................ 255s | 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................ 255s | 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................ 255s | 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................ 255s | 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................ 255s | 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................ 255s | 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................ 255s | 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................ 255s | 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................ 255s | 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................ 255s | 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................ 255s | 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................ 255s | 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................ 255s | 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................ 255s | 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................ 255s | 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................ 255s | 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................ 255s | 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................ 255s | 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................ 255s | 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................ 255s | 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................ 255s | 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................ 255s | 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................ 255s | 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................ 255s | 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................ 255s | 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................ 255s | 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................ 255s | 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................ 255s | 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................ 255s | 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................ 255s | 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................ 255s | 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................ 255s | 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................ 255s | 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................ 255s | 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................ 255s | 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................ 255s | 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................ 255s | 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................ 255s | 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................ 255s | 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................ 255s | 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................ 255s | 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................ 255s | 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................ 255s | 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................ 255s | 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................ 255s | 00 00 00 00 00 00 00 00 ........ 255s | K extracting all 16 bytes of key@0x14b173b8d2a0 255s | K: symkey-key@0x14b173b8d2a0 (16-bytes, AES_ECB) 255s | sizeof bytes 16 255s | wrapper: (SECItemType)-1057487320: 07 de a2 6b a1 39 64 a4 53 5e 31 e4 70 ab 6f bb 255s | K extracted len 16 bytes at 0x14b173b8d8e0 255s | unwrapped: 255s | 00 01 02 03 04 05 06 07 08 09 0a 0b 0c 0d 0e 0f ................ 255s | XCBC: K: 255s | 00 01 02 03 04 05 06 07 08 09 0a 0b 0c 0d 0e 0f ................ 255s | XCBC: K1 255s | c3 52 80 57 54 23 7f 31 1a c0 ff f4 e3 e0 3e 78 .R.WT#.1......>x 255s | CONCATENATE_DATA_AND_BASE: 255s | target: EXTRACT_KEY_FROM_KEY 255s | base: base-key@0x14b173b8a290 (16-bytes, AES_KEY_GEN) 255s | params: 16-bytes@0x7fffc0f80500 255s | key-offset: 0, key-size: 16 255s | EXTRACT_KEY_FROM_KEY: 255s | target: AES_ECB 255s | flags: SIGN 255s | key_size: 16-bytes 255s | base: base-key@0x14b173b8bbb0 (32-bytes, EXTRACT_KEY_FROM_KEY) 255s | operation: FLAGS_ONLY 255s | params: 8-bytes@0x7fffc0f80508 255s | Computing E[63] using K3 255s | XCBC: K3 255s | c1 a7 ab a1 a2 3a 94 06 58 07 a0 8c c8 ee d0 6e .....:..X......n 255s | XCBC: E[n-1] 255s | 5c 88 af cc 1e 1e 83 fc c4 2c 0c e4 12 12 f5 17 \........,...... 255s | XCBC: M[n] 255s | 00 00 00 00 00 00 00 00 ........ 255s | XCBC: M[n] 255s | 00 00 00 00 00 00 00 00 ........ 255s | XCBC: M[n]:80...^E[n-1]^K3 255s | 9d 2f 04 6d bc 24 17 fa 1c 2b ac 68 da fc 25 79 ./.m.$...+.h..%y 255s | XCBC: MAC 255s | f0 da fe e8 95 db 30 25 37 61 10 3b 5d 84 52 8f ......0%7a.;].R. 255s | PRF chunk interface PRF AES_XCBC final length 16 255s | f0 da fe e8 95 db 30 25 37 61 10 3b 5d 84 52 8f ......0%7a.;].R. 255s | chunk output 255s | f0 da fe e8 95 db 30 25 37 61 10 3b 5d 84 52 8f ......0%7a.;].R. 255s | verify_bytes() RFC 3566 Test Case 7: AES-XCBC-MAC-96 with 1000-byte input: prf OUT: ok 255s | CONCATENATE_DATA_AND_BASE: 255s | target: EXTRACT_KEY_FROM_KEY 255s | base: base-key@0x14b173b8a290 (16-bytes, AES_KEY_GEN) 255s | params: 16-bytes@0x7fffc0f80800 255s | key-offset: 0, key-size: 16 255s | EXTRACT_KEY_FROM_KEY: 255s | target: EXTRACT_KEY_FROM_KEY 255s | key_size: 16-bytes 255s | base: base-key@0x14b173b8e380 (32-bytes, EXTRACT_KEY_FROM_KEY) 255s | operation: FLAGS_ONLY 255s | params: 8-bytes@0x7fffc0f80738 255s | PRF symkey interface PRF AES_XCBC init key symkey-key@0x14b173b8d2a0 (size 16) 255s | PRF symkey interface: key symkey-key@0x14b173b8d2a0 (16-bytes, EXTRACT_KEY_FROM_KEY) 255s | XCBC: Key 16=16 just right 255s | key-offset: 0, key-size: 16 255s | EXTRACT_KEY_FROM_KEY: 255s | target: AES_ECB 255s | flags: SIGN 255s | key_size: 16-bytes 255s | base: base-key@0x14b173b8d2a0 (16-bytes, EXTRACT_KEY_FROM_KEY) 255s | operation: FLAGS_ONLY 255s | params: 8-bytes@0x7fffc0f80668 255s | PRF symkey interface PRF AES_XCBC 0x14b173b8dc20 255s | CONCATENATE_DATA_AND_BASE: 255s | target: EXTRACT_KEY_FROM_KEY 255s | base: base-key@0x14b173b8a290 (16-bytes, AES_KEY_GEN) 255s | params: 16-bytes@0x7fffc0f80800 255s | key-offset: 0, key-size: 1000 255s | EXTRACT_KEY_FROM_KEY: 255s | target: EXTRACT_KEY_FROM_KEY 255s | key_size: 1000-bytes 255s | base: base-key@0x14b173b8e040 (1016-bytes, EXTRACT_KEY_FROM_KEY) 255s | operation: FLAGS_ONLY 255s | params: 8-bytes@0x7fffc0f80738 255s | PRF symkey interface PRF AES_XCBC update symkey message-key@0x14b173b8bbb0 (size 1000) 255s | PRF symkey interface: symkey message-key@0x14b173b8bbb0 (1000-bytes, EXTRACT_KEY_FROM_KEY) 255s | symkey message extracting all 1000 bytes of key@0x14b173b8bbb0 255s | symkey message: symkey-key@0x14b173b8bbb0 (1000-bytes, EXTRACT_KEY_FROM_KEY) 255s | sizeof bytes 1008 255s | wrapper: (SECItemType)-1057488160: ee 5a cb 90 97 45 e8 17 03 10 c5 05 a5 00 37 28 ee 5a cb 90 97 45 e8 17 03 10 c5 05 a5 00 37 28 ee 5a cb 90 97 45 e8 17 03 10 c5 05 a5 00 37 28 ee 5a cb 90 97 45 e8 17 03 10 c5 05 a5 00 37 28 ee 5a cb 90 97 45 e8 17 03 10 c5 05 a5 00 37 28 ee 5a cb 90 97 45 e8 17 03 10 c5 05 a5 00 37 28 ee 5a cb 90 97 45 e8 17 03 10 c5 05 a5 00 37 28 ee 5a cb 90 97 45 e8 17 03 10 c5 05 a5 00 37 28 ee 5a cb 90 97 45 e8 17 03 10 c5 05 a5 00 37 28 ee 5a cb 90 97 45 e8 17 03 10 c5 05 a5 00 37 28 ee 5a cb 90 97 45 e8 17 03 10 c5 05 a5 00 37 28 ee 5a cb 90 97 45 e8 17 03 10 c5 05 a5 00 37 28 ee 5a cb 90 97 45 e8 17 03 10 c5 05 a5 00 37 28 ee 5a cb 90 97 45 e8 17 03 10 c5 05 a5 00 37 28 ee 5a cb 90 97 45 e8 17 03 10 c5 05 a5 00 37 28 ee 5a cb 90 97 45 e8 17 03 10 c5 05 a5 00 37 28 ee 5a cb 90 97 45 e8 17 03 10 c5 05 a5 00 37 28 ee 5a cb 90 97 45 e8 17 03 10 c5 05 a5 00 37 28 ee 5a cb 90 97 45 e8 17 03 10 c5 05 a5 00 3... 255s | symkey message extracted len 1008 bytes at 0x14b173b8c8c0 255s | unwrapped: 255s | 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................ 255s | 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................ 255s | 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................ 255s | 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................ 255s | 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................ 255s | 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................ 255s | 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................ 255s | 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................ 255s | 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................ 255s | 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................ 255s | 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................ 255s | 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................ 255s | 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................ 255s | 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................ 255s | 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................ 255s | 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................ 255s | 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................ 255s | 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................ 255s | 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................ 255s | 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................ 255s | 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................ 255s | 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................ 255s | 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................ 255s | 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................ 255s | 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................ 255s | 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................ 255s | 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................ 255s | 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................ 255s | 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................ 255s | 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................ 255s | 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................ 255s | 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................ 255s | 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................ 255s | 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................ 255s | 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................ 255s | 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................ 255s | 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................ 255s | 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................ 255s | 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................ 255s | 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................ 255s | 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................ 255s | 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................ 255s | 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................ 255s | 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................ 255s | 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................ 255s | 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................ 255s | 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................ 255s | 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................ 255s | 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................ 255s | 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................ 255s | 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................ 255s | 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................ 255s | 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................ 255s | 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................ 255s | 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................ 255s | 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................ 255s | 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................ 255s | 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................ 255s | 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................ 255s | 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................ 255s | 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................ 255s | 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................ 255s | 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................ 255s | XCBC: data 255s | 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................ 255s | 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................ 255s | 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................ 255s | 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................ 255s | 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................ 255s | 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................ 255s | 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................ 255s | 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................ 255s | 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................ 255s | 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................ 255s | 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................ 255s | 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................ 255s | 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................ 255s | 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................ 255s | 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................ 255s | 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................ 255s | 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................ 255s | 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................ 255s | 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................ 255s | 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................ 255s | 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................ 255s | 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................ 255s | 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................ 255s | 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................ 255s | 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................ 255s | 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................ 255s | 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................ 255s | 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................ 255s | 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................ 255s | 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................ 255s | 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................ 255s | 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................ 255s | 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................ 255s | 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................ 255s | 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................ 255s | 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................ 255s | 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................ 255s | 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................ 255s | 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................ 255s | 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................ 255s | 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................ 255s | 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................ 255s | 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................ 255s | 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................ 255s | 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................ 255s | 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................ 255s | 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................ 255s | 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................ 255s | 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................ 255s | 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................ 255s | 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................ 255s | 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................ 255s | 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................ 255s | 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................ 255s | 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................ 255s | 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................ 255s | 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................ 255s | 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................ 255s | 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................ 255s | 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................ 255s | 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................ 255s | 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................ 255s | 00 00 00 00 00 00 00 00 ........ 255s | K extracting all 16 bytes of key@0x14b173b8e380 255s | K: symkey-key@0x14b173b8e380 (16-bytes, AES_ECB) 255s | sizeof bytes 16 255s | wrapper: (SECItemType)1000: 07 de a2 6b a1 39 64 a4 53 5e 31 e4 70 ab 6f bb 255s | K extracted len 16 bytes at 0x14b173b8d5f0 255s | unwrapped: 255s | 00 01 02 03 04 05 06 07 08 09 0a 0b 0c 0d 0e 0f ................ 255s | XCBC: K: 255s | 00 01 02 03 04 05 06 07 08 09 0a 0b 0c 0d 0e 0f ................ 255s | XCBC: K1 255s | c3 52 80 57 54 23 7f 31 1a c0 ff f4 e3 e0 3e 78 .R.WT#.1......>x 255s | CONCATENATE_DATA_AND_BASE: 255s | target: EXTRACT_KEY_FROM_KEY 255s | base: base-key@0x14b173b8a290 (16-bytes, AES_KEY_GEN) 255s | params: 16-bytes@0x7fffc0f80550 255s | key-offset: 0, key-size: 16 255s | EXTRACT_KEY_FROM_KEY: 255s | target: AES_ECB 255s | flags: SIGN 255s | key_size: 16-bytes 255s | base: base-key@0x14b173b8e6e0 (32-bytes, EXTRACT_KEY_FROM_KEY) 255s | operation: FLAGS_ONLY 255s | params: 8-bytes@0x7fffc0f80558 255s | Computing E[63] using K3 255s | XCBC: K3 255s | c1 a7 ab a1 a2 3a 94 06 58 07 a0 8c c8 ee d0 6e .....:..X......n 255s | XCBC: E[n-1] 255s | 5c 88 af cc 1e 1e 83 fc c4 2c 0c e4 12 12 f5 17 \........,...... 255s | XCBC: M[n] 255s | 00 00 00 00 00 00 00 00 ........ 255s | XCBC: M[n] 255s | 00 00 00 00 00 00 00 00 ........ 255s | XCBC: M[n]:80...^E[n-1]^K3 255s | 9d 2f 04 6d bc 24 17 fa 1c 2b ac 68 da fc 25 79 ./.m.$...+.h..%y 255s | XCBC: MAC 255s | f0 da fe e8 95 db 30 25 37 61 10 3b 5d 84 52 8f ......0%7a.;].R. 255s | CONCATENATE_DATA_AND_BASE: 255s | target: EXTRACT_KEY_FROM_KEY 255s | base: base-key@0x14b173b8a290 (16-bytes, AES_KEY_GEN) 255s | params: 16-bytes@0x7fffc0f80720 255s | key-offset: 0, key-size: 16 255s | EXTRACT_KEY_FROM_KEY: 255s | target: EXTRACT_KEY_FROM_KEY 255s | key_size: 16-bytes 255s | base: base-key@0x14b173b8e6e0 (32-bytes, EXTRACT_KEY_FROM_KEY) 255s | operation: FLAGS_ONLY 255s | params: 8-bytes@0x7fffc0f80658 255s | PRF symkey interface PRF AES_XCBC final-key@0x14b173b8e040 (size 16) 255s | PRF symkey interface: key-key@0x14b173b8e040 (16-bytes, EXTRACT_KEY_FROM_KEY) 255s | output: symkey-key@0x14b173b8e040 (16-bytes, EXTRACT_KEY_FROM_KEY) 255s | RFC 3566 Test Case 7: AES-XCBC-MAC-96 with 1000-byte input extracting all 16 bytes of key@0x14b173b8e040 255s | RFC 3566 Test Case 7: AES-XCBC-MAC-96 with 1000-byte input: symkey-key@0x14b173b8e040 (16-bytes, EXTRACT_KEY_FROM_KEY) 255s | sizeof bytes 16 255s | wrapper: (SECItemType)-1057488144: a6 91 67 d0 cb 6b b6 cc 9f 7b f5 dc 9e d6 21 b6 255s | RFC 3566 Test Case 7: AES-XCBC-MAC-96 with 1000-byte input extracted len 16 bytes at 0x14b173b8deb0 255s | unwrapped: 255s | f0 da fe e8 95 db 30 25 37 61 10 3b 5d 84 52 8f ......0%7a.;].R. 255s | verify_bytes() RFC 3566 Test Case 7: AES-XCBC-MAC-96 with 1000-byte input: symkey: ok 255s ipsec algparse: RFC 4434 Test Case AES-XCBC-PRF-128 with 20-byte input (key length 16) 255s | decode_to_chunk() test_prf_vector: input "0x000102030405060708090a0b0c0d0e0f" 255s | decode_to_chunk() output: 255s | 00 01 02 03 04 05 06 07 08 09 0a 0b 0c 0d 0e 0f ................ 255s | decode_to_chunk() test_prf_vector: input "0x000102030405060708090a0b0c0d0e0f10111213" 255s | decode_to_chunk() output: 255s | 00 01 02 03 04 05 06 07 08 09 0a 0b 0c 0d 0e 0f ................ 255s | 10 11 12 13 .... 255s | decode_to_chunk() test_prf_vector: input "0x47f51b4564966215b8985c63055ed308" 255s | decode_to_chunk() output: 255s | 47 f5 1b 45 64 96 62 15 b8 98 5c 63 05 5e d3 08 G..Ed.b...\c.^.. 255s | PRF chunk interface PRF AES_XCBC init key hunk 0x14b173b8d5d0 (length 16) 255s | 00 01 02 03 04 05 06 07 08 09 0a 0b 0c 0d 0e 0f ................ 255s | CONCATENATE_DATA_AND_BASE: 255s | target: EXTRACT_KEY_FROM_KEY 255s | base: base-key@0x14b173b8a290 (16-bytes, AES_KEY_GEN) 255s | params: 16-bytes@0x7fffc0f80710 255s | key-offset: 0, key-size: 16 255s | EXTRACT_KEY_FROM_KEY: 255s | target: EXTRACT_KEY_FROM_KEY 255s | key_size: 16-bytes 255s | base: base-key@0x14b173b8d2a0 (32-bytes, EXTRACT_KEY_FROM_KEY) 255s | operation: FLAGS_ONLY 255s | params: 8-bytes@0x7fffc0f80648 255s | XCBC: Key 16=16 just right 255s | key-offset: 0, key-size: 16 255s | EXTRACT_KEY_FROM_KEY: 255s | target: AES_ECB 255s | flags: SIGN 255s | key_size: 16-bytes 255s | base: base-key@0x14b173b8e040 (16-bytes, EXTRACT_KEY_FROM_KEY) 255s | operation: FLAGS_ONLY 255s | params: 8-bytes@0x7fffc0f80618 255s | PRF chunk interface PRF AES_XCBC 0x14b173b8dc20 255s | PRF chunk interface PRF AES_XCBC update message (0x14b173b8bae0 length 20) 255s | 00 01 02 03 04 05 06 07 08 09 0a 0b 0c 0d 0e 0f ................ 255s | 10 11 12 13 .... 255s | XCBC: data 255s | 00 01 02 03 04 05 06 07 08 09 0a 0b 0c 0d 0e 0f ................ 255s | 10 11 12 13 .... 255s | K extracting all 16 bytes of key@0x14b173b8d2a0 255s | K: symkey-key@0x14b173b8d2a0 (16-bytes, AES_ECB) 255s | sizeof bytes 16 255s | wrapper: (SECItemType)-1057487320: 07 de a2 6b a1 39 64 a4 53 5e 31 e4 70 ab 6f bb 255s | K extracted len 16 bytes at 0x14b173b8e6c0 255s | unwrapped: 255s | 00 01 02 03 04 05 06 07 08 09 0a 0b 0c 0d 0e 0f ................ 255s | XCBC: K: 255s | 00 01 02 03 04 05 06 07 08 09 0a 0b 0c 0d 0e 0f ................ 255s | XCBC: K1 255s | c3 52 80 57 54 23 7f 31 1a c0 ff f4 e3 e0 3e 78 .R.WT#.1......>x 255s | CONCATENATE_DATA_AND_BASE: 255s | target: EXTRACT_KEY_FROM_KEY 255s | base: base-key@0x14b173b8a290 (16-bytes, AES_KEY_GEN) 255s | params: 16-bytes@0x7fffc0f80500 255s | key-offset: 0, key-size: 16 255s | EXTRACT_KEY_FROM_KEY: 255s | target: AES_ECB 255s | flags: SIGN 255s | key_size: 16-bytes 255s | base: base-key@0x14b173b8bbb0 (32-bytes, EXTRACT_KEY_FROM_KEY) 255s | operation: FLAGS_ONLY 255s | params: 8-bytes@0x7fffc0f80508 255s | Computing E[2] using K3 255s | XCBC: K3 255s | c1 a7 ab a1 a2 3a 94 06 58 07 a0 8c c8 ee d0 6e .....:..X......n 255s | XCBC: E[n-1] 255s | 1d 04 48 fa cf 4d 9c 6f 55 b9 93 da 09 80 3d b3 ..H..M.oU.....=. 255s | XCBC: M[n] 255s | 10 11 12 13 .... 255s | XCBC: M[n] 255s | 10 11 12 13 .... 255s | XCBC: M[n]:80...^E[n-1]^K3 255s | cc b2 f1 48 ed 77 08 69 0d be 33 56 c1 6e ed dd ...H.w.i..3V.n.. 255s | XCBC: MAC 255s | 47 f5 1b 45 64 96 62 15 b8 98 5c 63 05 5e d3 08 G..Ed.b...\c.^.. 255s | PRF chunk interface PRF AES_XCBC final length 16 255s | 47 f5 1b 45 64 96 62 15 b8 98 5c 63 05 5e d3 08 G..Ed.b...\c.^.. 255s | chunk output 255s | 47 f5 1b 45 64 96 62 15 b8 98 5c 63 05 5e d3 08 G..Ed.b...\c.^.. 255s | verify_bytes() RFC 4434 Test Case AES-XCBC-PRF-128 with 20-byte input (key length 16): prf OUT: ok 255s | CONCATENATE_DATA_AND_BASE: 255s | target: EXTRACT_KEY_FROM_KEY 255s | base: base-key@0x14b173b8a290 (16-bytes, AES_KEY_GEN) 255s | params: 16-bytes@0x7fffc0f80800 255s | key-offset: 0, key-size: 16 255s | EXTRACT_KEY_FROM_KEY: 255s | target: EXTRACT_KEY_FROM_KEY 255s | key_size: 16-bytes 255s | base: base-key@0x14b173b8e040 (32-bytes, EXTRACT_KEY_FROM_KEY) 255s | operation: FLAGS_ONLY 255s | params: 8-bytes@0x7fffc0f80738 255s | PRF symkey interface PRF AES_XCBC init key symkey-key@0x14b173b8d2a0 (size 16) 255s | PRF symkey interface: key symkey-key@0x14b173b8d2a0 (16-bytes, EXTRACT_KEY_FROM_KEY) 255s | XCBC: Key 16=16 just right 255s | key-offset: 0, key-size: 16 255s | EXTRACT_KEY_FROM_KEY: 255s | target: AES_ECB 255s | flags: SIGN 255s | key_size: 16-bytes 255s | base: base-key@0x14b173b8d2a0 (16-bytes, EXTRACT_KEY_FROM_KEY) 255s | operation: FLAGS_ONLY 255s | params: 8-bytes@0x7fffc0f80668 255s | PRF symkey interface PRF AES_XCBC 0x14b173b8dc20 255s | CONCATENATE_DATA_AND_BASE: 255s | target: EXTRACT_KEY_FROM_KEY 255s | base: base-key@0x14b173b8a290 (16-bytes, AES_KEY_GEN) 255s | params: 16-bytes@0x7fffc0f80800 255s | key-offset: 0, key-size: 20 255s | EXTRACT_KEY_FROM_KEY: 255s | target: EXTRACT_KEY_FROM_KEY 255s | key_size: 20-bytes 255s | base: base-key@0x14b173b8e380 (36-bytes, EXTRACT_KEY_FROM_KEY) 255s | operation: FLAGS_ONLY 255s | params: 8-bytes@0x7fffc0f80738 255s | PRF symkey interface PRF AES_XCBC update symkey message-key@0x14b173b8bbb0 (size 20) 255s | PRF symkey interface: symkey message-key@0x14b173b8bbb0 (20-bytes, EXTRACT_KEY_FROM_KEY) 255s | symkey message extracting all 20 bytes of key@0x14b173b8bbb0 255s | symkey message: symkey-key@0x14b173b8bbb0 (20-bytes, EXTRACT_KEY_FROM_KEY) 255s | sizeof bytes 32 255s | wrapper: (SECItemType)-1057488160: 07 de a2 6b a1 39 64 a4 53 5e 31 e4 70 ab 6f bb c8 4e 08 3f af 24 d6 be 17 3f 80 03 eb 79 cc 4d 255s | symkey message extracted len 32 bytes at 0x14b173b8a230 255s | unwrapped: 255s | 00 01 02 03 04 05 06 07 08 09 0a 0b 0c 0d 0e 0f ................ 255s | 10 11 12 13 00 00 00 00 00 00 00 00 00 00 00 00 ................ 255s | XCBC: data 255s | 00 01 02 03 04 05 06 07 08 09 0a 0b 0c 0d 0e 0f ................ 255s | 10 11 12 13 .... 255s | K extracting all 16 bytes of key@0x14b173b8e040 255s | K: symkey-key@0x14b173b8e040 (16-bytes, AES_ECB) 255s | sizeof bytes 16 255s | wrapper: (SECItemType)20: 07 de a2 6b a1 39 64 a4 53 5e 31 e4 70 ab 6f bb 255s | K extracted len 16 bytes at 0x14b173b8d8e0 255s | unwrapped: 255s | 00 01 02 03 04 05 06 07 08 09 0a 0b 0c 0d 0e 0f ................ 255s | XCBC: K: 255s | 00 01 02 03 04 05 06 07 08 09 0a 0b 0c 0d 0e 0f ................ 255s | XCBC: K1 255s | c3 52 80 57 54 23 7f 31 1a c0 ff f4 e3 e0 3e 78 .R.WT#.1......>x 255s | CONCATENATE_DATA_AND_BASE: 255s | target: EXTRACT_KEY_FROM_KEY 255s | base: base-key@0x14b173b8a290 (16-bytes, AES_KEY_GEN) 255s | params: 16-bytes@0x7fffc0f80550 255s | key-offset: 0, key-size: 16 255s | EXTRACT_KEY_FROM_KEY: 255s | target: AES_ECB 255s | flags: SIGN 255s | key_size: 16-bytes 255s | base: base-key@0x14b173b8e6e0 (32-bytes, EXTRACT_KEY_FROM_KEY) 255s | operation: FLAGS_ONLY 255s | params: 8-bytes@0x7fffc0f80558 255s | Computing E[2] using K3 255s | XCBC: K3 255s | c1 a7 ab a1 a2 3a 94 06 58 07 a0 8c c8 ee d0 6e .....:..X......n 255s | XCBC: E[n-1] 255s | 1d 04 48 fa cf 4d 9c 6f 55 b9 93 da 09 80 3d b3 ..H..M.oU.....=. 255s | XCBC: M[n] 255s | 10 11 12 13 .... 255s | XCBC: M[n] 255s | 10 11 12 13 .... 255s | XCBC: M[n]:80...^E[n-1]^K3 255s | cc b2 f1 48 ed 77 08 69 0d be 33 56 c1 6e ed dd ...H.w.i..3V.n.. 255s | XCBC: MAC 255s | 47 f5 1b 45 64 96 62 15 b8 98 5c 63 05 5e d3 08 G..Ed.b...\c.^.. 255s | CONCATENATE_DATA_AND_BASE: 255s | target: EXTRACT_KEY_FROM_KEY 255s | base: base-key@0x14b173b8a290 (16-bytes, AES_KEY_GEN) 255s | params: 16-bytes@0x7fffc0f80720 255s | key-offset: 0, key-size: 16 255s | EXTRACT_KEY_FROM_KEY: 255s | target: EXTRACT_KEY_FROM_KEY 255s | key_size: 16-bytes 255s | base: base-key@0x14b173b8e6e0 (32-bytes, EXTRACT_KEY_FROM_KEY) 255s | operation: FLAGS_ONLY 255s | params: 8-bytes@0x7fffc0f80658 255s | PRF symkey interface PRF AES_XCBC final-key@0x14b173b8e380 (size 16) 255s | PRF symkey interface: key-key@0x14b173b8e380 (16-bytes, EXTRACT_KEY_FROM_KEY) 255s | output: symkey-key@0x14b173b8e380 (16-bytes, EXTRACT_KEY_FROM_KEY) 255s | RFC 4434 Test Case AES-XCBC-PRF-128 with 20-byte input (key length 16) extracting all 16 bytes of key@0x14b173b8e380 255s | RFC 4434 Test Case AES-XCBC-PRF-128 with 20-byte input (key length 16): symkey-key@0x14b173b8e380 (16-bytes, EXTRACT_KEY_FROM_KEY) 255s | sizeof bytes 16 255s | wrapper: (SECItemType)-1057488144: 51 37 db 88 f3 6c 0e c9 5a c1 7a f5 be 81 7f 1b 255s | RFC 4434 Test Case AES-XCBC-PRF-128 with 20-byte input (key length 16) extracted len 16 bytes at 0x14b173b8d8e0 255s | unwrapped: 255s | 47 f5 1b 45 64 96 62 15 b8 98 5c 63 05 5e d3 08 G..Ed.b...\c.^.. 255s | verify_bytes() RFC 4434 Test Case AES-XCBC-PRF-128 with 20-byte input (key length 16): symkey: ok 255s ipsec algparse: RFC 4434 Test Case AES-XCBC-PRF-128 with 20-byte input (key length 10) 255s | decode_to_chunk() test_prf_vector: input "0x00010203040506070809" 255s | decode_to_chunk() output: 255s | 00 01 02 03 04 05 06 07 08 09 .......... 255s | decode_to_chunk() test_prf_vector: input "0x000102030405060708090a0b0c0d0e0f10111213" 255s | decode_to_chunk() output: 255s | 00 01 02 03 04 05 06 07 08 09 0a 0b 0c 0d 0e 0f ................ 255s | 10 11 12 13 .... 255s | decode_to_chunk() test_prf_vector: input "0x0fa087af7d866e7653434e602fdde835" 255s | decode_to_chunk() output: 255s | 0f a0 87 af 7d 86 6e 76 53 43 4e 60 2f dd e8 35 ....}.nvSCN`/..5 255s | PRF chunk interface PRF AES_XCBC init key hunk 0x14b173b8d5d0 (length 10) 255s | 00 01 02 03 04 05 06 07 08 09 .......... 255s | CONCATENATE_DATA_AND_BASE: 255s | target: EXTRACT_KEY_FROM_KEY 255s | base: base-key@0x14b173b8a290 (16-bytes, AES_KEY_GEN) 255s | params: 16-bytes@0x7fffc0f80710 255s | key-offset: 0, key-size: 10 255s | EXTRACT_KEY_FROM_KEY: 255s | target: EXTRACT_KEY_FROM_KEY 255s | key_size: 10-bytes 255s | base: base-key@0x14b173b8d2a0 (26-bytes, EXTRACT_KEY_FROM_KEY) 255s | operation: FLAGS_ONLY 255s | params: 8-bytes@0x7fffc0f80648 255s | XCBC: Key 10<16 too small, padding with zeros 255s | CONCATENATE_BASE_AND_DATA: 255s | target: EXTRACT_KEY_FROM_KEY 255s | base: base-key@0x14b173b8e380 (10-bytes, EXTRACT_KEY_FROM_KEY) 255s | params: 16-bytes@0x7fffc0f80600 255s | key-offset: 0, key-size: 16 255s | EXTRACT_KEY_FROM_KEY: 255s | target: AES_ECB 255s | flags: SIGN 255s | key_size: 16-bytes 255s | base: base-key@0x14b173b8d2a0 (16-bytes, EXTRACT_KEY_FROM_KEY) 255s | operation: FLAGS_ONLY 255s | params: 8-bytes@0x7fffc0f80618 255s | PRF chunk interface PRF AES_XCBC 0x14b173b8dc20 255s | PRF chunk interface PRF AES_XCBC update message (0x14b173b8bae0 length 20) 255s | 00 01 02 03 04 05 06 07 08 09 0a 0b 0c 0d 0e 0f ................ 255s | 10 11 12 13 .... 255s | XCBC: data 255s | 00 01 02 03 04 05 06 07 08 09 0a 0b 0c 0d 0e 0f ................ 255s | 10 11 12 13 .... 255s | K extracting all 16 bytes of key@0x14b173b8bbb0 255s | K: symkey-key@0x14b173b8bbb0 (16-bytes, AES_ECB) 255s | sizeof bytes 16 255s | wrapper: (SECItemType)-1057487320: 4e e8 06 59 ce ef 5b 55 3e 03 22 45 14 a3 7f a6 255s | K extracted len 16 bytes at 0x14b173b8a160 255s | unwrapped: 255s | 00 01 02 03 04 05 06 07 08 09 00 00 00 00 00 00 ................ 255s | XCBC: K: 255s | 00 01 02 03 04 05 06 07 08 09 00 00 00 00 00 00 ................ 255s | XCBC: K1 255s | 50 ca b2 4d 03 34 45 5e 40 7b 25 0f dd 7c f8 d5 P..M.4E^@{%..|.. 255s | CONCATENATE_DATA_AND_BASE: 255s | target: EXTRACT_KEY_FROM_KEY 255s | base: base-key@0x14b173b8a290 (16-bytes, AES_KEY_GEN) 255s | params: 16-bytes@0x7fffc0f80500 255s | key-offset: 0, key-size: 16 255s | EXTRACT_KEY_FROM_KEY: 255s | target: AES_ECB 255s | flags: SIGN 255s | key_size: 16-bytes 255s | base: base-key@0x14b173b8d2a0 (32-bytes, EXTRACT_KEY_FROM_KEY) 255s | operation: FLAGS_ONLY 255s | params: 8-bytes@0x7fffc0f80508 255s | Computing E[2] using K3 255s | XCBC: K3 255s | 8e f7 48 db 56 f1 f7 26 24 72 f2 c5 63 b0 3f 88 ..H.V..&$r..c.?. 255s | XCBC: E[n-1] 255s | fe 1f 63 e9 65 1a 4b bb 3c cc cd 0d cc 83 e4 30 ..c.e.K.<......0 255s | XCBC: M[n] 255s | 10 11 12 13 .... 255s | XCBC: M[n] 255s | 10 11 12 13 .... 255s | XCBC: M[n]:80...^E[n-1]^K3 255s | 60 f9 39 21 b3 eb bc 9d 18 be 3f c8 af 33 db b8 `.9!......?..3.. 255s | XCBC: MAC 255s | 0f a0 87 af 7d 86 6e 76 53 43 4e 60 2f dd e8 35 ....}.nvSCN`/..5 255s | PRF chunk interface PRF AES_XCBC final length 16 255s | 0f a0 87 af 7d 86 6e 76 53 43 4e 60 2f dd e8 35 ....}.nvSCN`/..5 255s | chunk output 255s | 0f a0 87 af 7d 86 6e 76 53 43 4e 60 2f dd e8 35 ....}.nvSCN`/..5 255s | verify_bytes() RFC 4434 Test Case AES-XCBC-PRF-128 with 20-byte input (key length 10): prf OUT: ok 255s | CONCATENATE_DATA_AND_BASE: 255s | target: EXTRACT_KEY_FROM_KEY 255s | base: base-key@0x14b173b8a290 (16-bytes, AES_KEY_GEN) 255s | params: 16-bytes@0x7fffc0f80800 255s | key-offset: 0, key-size: 10 255s | EXTRACT_KEY_FROM_KEY: 255s | target: EXTRACT_KEY_FROM_KEY 255s | key_size: 10-bytes 255s | base: base-key@0x14b173b8e380 (26-bytes, EXTRACT_KEY_FROM_KEY) 255s | operation: FLAGS_ONLY 255s | params: 8-bytes@0x7fffc0f80738 255s | PRF symkey interface PRF AES_XCBC init key symkey-key@0x14b173b8bbb0 (size 10) 255s | PRF symkey interface: key symkey-key@0x14b173b8bbb0 (10-bytes, EXTRACT_KEY_FROM_KEY) 255s | XCBC: Key 10<16 too small, padding with zeros 255s | CONCATENATE_BASE_AND_DATA: 255s | target: EXTRACT_KEY_FROM_KEY 255s | base: base-key@0x14b173b8bbb0 (10-bytes, EXTRACT_KEY_FROM_KEY) 255s | params: 16-bytes@0x7fffc0f80650 255s | key-offset: 0, key-size: 16 255s | EXTRACT_KEY_FROM_KEY: 255s | target: AES_ECB 255s | flags: SIGN 255s | key_size: 16-bytes 255s | base: base-key@0x14b173b8e380 (16-bytes, EXTRACT_KEY_FROM_KEY) 255s | operation: FLAGS_ONLY 255s | params: 8-bytes@0x7fffc0f80668 255s | PRF symkey interface PRF AES_XCBC 0x14b173b8dc20 255s | CONCATENATE_DATA_AND_BASE: 255s | target: EXTRACT_KEY_FROM_KEY 255s | base: base-key@0x14b173b8a290 (16-bytes, AES_KEY_GEN) 255s | params: 16-bytes@0x7fffc0f80800 255s | key-offset: 0, key-size: 20 255s | EXTRACT_KEY_FROM_KEY: 255s | target: EXTRACT_KEY_FROM_KEY 255s | key_size: 20-bytes 255s | base: base-key@0x14b173b8e040 (36-bytes, EXTRACT_KEY_FROM_KEY) 255s | operation: FLAGS_ONLY 255s | params: 8-bytes@0x7fffc0f80738 255s | PRF symkey interface PRF AES_XCBC update symkey message-key@0x14b173b8e380 (size 20) 255s | PRF symkey interface: symkey message-key@0x14b173b8e380 (20-bytes, EXTRACT_KEY_FROM_KEY) 255s | symkey message extracting all 20 bytes of key@0x14b173b8e380 255s | symkey message: symkey-key@0x14b173b8e380 (20-bytes, EXTRACT_KEY_FROM_KEY) 255s | sizeof bytes 32 255s | wrapper: (SECItemType)-1057488160: 07 de a2 6b a1 39 64 a4 53 5e 31 e4 70 ab 6f bb c8 4e 08 3f af 24 d6 be 17 3f 80 03 eb 79 cc 4d 255s | symkey message extracted len 32 bytes at 0x14b173b8a260 255s | unwrapped: 255s | 00 01 02 03 04 05 06 07 08 09 0a 0b 0c 0d 0e 0f ................ 255s | 10 11 12 13 00 00 00 00 00 00 00 00 00 00 00 00 ................ 255s | XCBC: data 255s | 00 01 02 03 04 05 06 07 08 09 0a 0b 0c 0d 0e 0f ................ 255s | 10 11 12 13 .... 255s | K extracting all 16 bytes of key@0x14b173b8d2a0 255s | K: symkey-key@0x14b173b8d2a0 (16-bytes, AES_ECB) 255s | sizeof bytes 16 255s | wrapper: (SECItemType)20: 4e e8 06 59 ce ef 5b 55 3e 03 22 45 14 a3 7f a6 255s | K extracted len 16 bytes at 0x14b173b89fc0 255s | unwrapped: 255s | 00 01 02 03 04 05 06 07 08 09 00 00 00 00 00 00 ................ 255s | XCBC: K: 255s | 00 01 02 03 04 05 06 07 08 09 00 00 00 00 00 00 ................ 255s | XCBC: K1 255s | 50 ca b2 4d 03 34 45 5e 40 7b 25 0f dd 7c f8 d5 P..M.4E^@{%..|.. 255s | CONCATENATE_DATA_AND_BASE: 255s | target: EXTRACT_KEY_FROM_KEY 255s | base: base-key@0x14b173b8a290 (16-bytes, AES_KEY_GEN) 255s | params: 16-bytes@0x7fffc0f80550 255s | key-offset: 0, key-size: 16 255s | EXTRACT_KEY_FROM_KEY: 255s | target: AES_ECB 255s | flags: SIGN 255s | key_size: 16-bytes 255s | base: base-key@0x14b173b8e6e0 (32-bytes, EXTRACT_KEY_FROM_KEY) 255s | operation: FLAGS_ONLY 255s | params: 8-bytes@0x7fffc0f80558 255s | Computing E[2] using K3 255s | XCBC: K3 255s | 8e f7 48 db 56 f1 f7 26 24 72 f2 c5 63 b0 3f 88 ..H.V..&$r..c.?. 255s | XCBC: E[n-1] 255s | fe 1f 63 e9 65 1a 4b bb 3c cc cd 0d cc 83 e4 30 ..c.e.K.<......0 255s | XCBC: M[n] 255s | 10 11 12 13 .... 255s | XCBC: M[n] 255s | 10 11 12 13 .... 255s | XCBC: M[n]:80...^E[n-1]^K3 255s | 60 f9 39 21 b3 eb bc 9d 18 be 3f c8 af 33 db b8 `.9!......?..3.. 255s | XCBC: MAC 255s | 0f a0 87 af 7d 86 6e 76 53 43 4e 60 2f dd e8 35 ....}.nvSCN`/..5 255s | CONCATENATE_DATA_AND_BASE: 255s | target: EXTRACT_KEY_FROM_KEY 255s | base: base-key@0x14b173b8a290 (16-bytes, AES_KEY_GEN) 255s | params: 16-bytes@0x7fffc0f80720 255s | key-offset: 0, key-size: 16 255s | EXTRACT_KEY_FROM_KEY: 255s | target: EXTRACT_KEY_FROM_KEY 255s | key_size: 16-bytes 255s | base: base-key@0x14b173b8e6e0 (32-bytes, EXTRACT_KEY_FROM_KEY) 255s | operation: FLAGS_ONLY 255s | params: 8-bytes@0x7fffc0f80658 255s | PRF symkey interface PRF AES_XCBC final-key@0x14b173b8e040 (size 16) 255s | PRF symkey interface: key-key@0x14b173b8e040 (16-bytes, EXTRACT_KEY_FROM_KEY) 255s | output: symkey-key@0x14b173b8e040 (16-bytes, EXTRACT_KEY_FROM_KEY) 255s | RFC 4434 Test Case AES-XCBC-PRF-128 with 20-byte input (key length 10) extracting all 16 bytes of key@0x14b173b8e040 255s | RFC 4434 Test Case AES-XCBC-PRF-128 with 20-byte input (key length 10): symkey-key@0x14b173b8e040 (16-bytes, EXTRACT_KEY_FROM_KEY) 255s | sizeof bytes 16 255s | wrapper: (SECItemType)-1057488144: e2 a9 59 d7 81 7f 52 20 65 e9 25 69 23 34 25 23 255s | RFC 4434 Test Case AES-XCBC-PRF-128 with 20-byte input (key length 10) extracted len 16 bytes at 0x14b173b89fc0 255s | unwrapped: 255s | 0f a0 87 af 7d 86 6e 76 53 43 4e 60 2f dd e8 35 ....}.nvSCN`/..5 255s | verify_bytes() RFC 4434 Test Case AES-XCBC-PRF-128 with 20-byte input (key length 10): symkey: ok 255s ipsec algparse: RFC 4434 Test Case AES-XCBC-PRF-128 with 20-byte input (key length 18) 255s | decode_to_chunk() test_prf_vector: input "0x000102030405060708090a0b0c0d0e0fedcb" 255s | decode_to_chunk() output: 255s | 00 01 02 03 04 05 06 07 08 09 0a 0b 0c 0d 0e 0f ................ 255s | ed cb .. 255s | decode_to_chunk() test_prf_vector: input "0x000102030405060708090a0b0c0d0e0f10111213" 255s | decode_to_chunk() output: 255s | 00 01 02 03 04 05 06 07 08 09 0a 0b 0c 0d 0e 0f ................ 255s | 10 11 12 13 .... 255s | decode_to_chunk() test_prf_vector: input "0x8cd3c93ae598a9803006ffb67c40e9e4" 255s | decode_to_chunk() output: 255s | 8c d3 c9 3a e5 98 a9 80 30 06 ff b6 7c 40 e9 e4 ...:....0...|@.. 255s | PRF chunk interface PRF AES_XCBC init key hunk 0x14b173b8d5d0 (length 18) 255s | 00 01 02 03 04 05 06 07 08 09 0a 0b 0c 0d 0e 0f ................ 255s | ed cb .. 255s | CONCATENATE_DATA_AND_BASE: 255s | target: EXTRACT_KEY_FROM_KEY 255s | base: base-key@0x14b173b8a290 (16-bytes, AES_KEY_GEN) 255s | params: 16-bytes@0x7fffc0f80710 255s | key-offset: 0, key-size: 18 255s | EXTRACT_KEY_FROM_KEY: 255s | target: EXTRACT_KEY_FROM_KEY 255s | key_size: 18-bytes 255s | base: base-key@0x14b173b8bbb0 (34-bytes, EXTRACT_KEY_FROM_KEY) 255s | operation: FLAGS_ONLY 255s | params: 8-bytes@0x7fffc0f80648 255s | XCBC: Key 18>16 too big, rehashing to size 255s | CONCATENATE_DATA_AND_BASE: 255s | target: EXTRACT_KEY_FROM_KEY 255s | base: base-key@0x14b173b8a290 (16-bytes, AES_KEY_GEN) 255s | params: 16-bytes@0x7fffc0f80570 255s | key-offset: 0, key-size: 16 255s | EXTRACT_KEY_FROM_KEY: 255s | target: AES_ECB 255s | flags: SIGN 255s | key_size: 16-bytes 255s | base: base-key@0x14b173b8e380 (32-bytes, EXTRACT_KEY_FROM_KEY) 255s | operation: FLAGS_ONLY 255s | params: 8-bytes@0x7fffc0f80578 255s | draft_chunk extracting all 18 bytes of key@0x14b173b8e040 255s | draft_chunk: symkey-key@0x14b173b8e040 (18-bytes, EXTRACT_KEY_FROM_KEY) 255s | sizeof bytes 32 255s | wrapper: (SECItemType)-1057487312: 07 de a2 6b a1 39 64 a4 53 5e 31 e4 70 ab 6f bb ca 7f c8 58 53 b6 d9 85 01 81 23 4c 28 11 47 5e 255s | draft_chunk extracted len 32 bytes at 0x14b173b8a260 255s | unwrapped: 255s | 00 01 02 03 04 05 06 07 08 09 0a 0b 0c 0d 0e 0f ................ 255s | ed cb 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................ 255s | XCBC: data 255s | 00 01 02 03 04 05 06 07 08 09 0a 0b 0c 0d 0e 0f ................ 255s | ed cb .. 255s | K extracting all 16 bytes of key@0x14b173b8bbb0 255s | K: symkey-key@0x14b173b8bbb0 (16-bytes, AES_ECB) 255s | sizeof bytes 16 255s | wrapper: (SECItemType)18: ee 5a cb 90 97 45 e8 17 03 10 c5 05 a5 00 37 28 255s | K extracted len 16 bytes at 0x14b173b8e6c0 255s | unwrapped: 255s | 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................ 255s | XCBC: K: 255s | 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................ 255s | XCBC: K1 255s | e1 4d 5d 0e e2 77 15 df 08 b4 15 2b a2 3d a8 e0 .M]..w.....+.=.. 255s | CONCATENATE_DATA_AND_BASE: 255s | target: EXTRACT_KEY_FROM_KEY 255s | base: base-key@0x14b173b8a290 (16-bytes, AES_KEY_GEN) 255s | params: 16-bytes@0x7fffc0f80430 255s | key-offset: 0, key-size: 16 255s | EXTRACT_KEY_FROM_KEY: 255s | target: AES_ECB 255s | flags: SIGN 255s | key_size: 16-bytes 255s | base: base-key@0x14b173b8d2a0 (32-bytes, EXTRACT_KEY_FROM_KEY) 255s | operation: FLAGS_ONLY 255s | params: 8-bytes@0x7fffc0f80438 255s | Computing E[2] using K3 255s | XCBC: K3 255s | 8d 34 ef cb 3b d5 45 ca 06 2a ec df ef 7c 0b fa .4..;.E..*...|.. 255s | XCBC: E[n-1] 255s | 0b 72 b2 ae 0a 37 79 81 75 6a d5 9c 79 c0 e6 96 .r...7y.uj..y... 255s | XCBC: M[n] 255s | ed cb .. 255s | XCBC: M[n] 255s | ed cb .. 255s | XCBC: M[n]:80...^E[n-1]^K3 255s | 6b 8d dd 65 31 e2 3c 4b 73 40 39 43 96 bc ed 6c k..e1.16 too big, rehashing to size 255s | CONCATENATE_DATA_AND_BASE: 255s | target: EXTRACT_KEY_FROM_KEY 255s | base: base-key@0x14b173b8a290 (16-bytes, AES_KEY_GEN) 255s | params: 16-bytes@0x7fffc0f805c0 255s | key-offset: 0, key-size: 16 255s | EXTRACT_KEY_FROM_KEY: 255s | target: AES_ECB 255s | flags: SIGN 255s | key_size: 16-bytes 255s | base: base-key@0x14b173b8bbb0 (32-bytes, EXTRACT_KEY_FROM_KEY) 255s | operation: FLAGS_ONLY 255s | params: 8-bytes@0x7fffc0f805c8 255s | draft_chunk extracting all 18 bytes of key@0x14b173b8e380 255s | draft_chunk: symkey-key@0x14b173b8e380 (18-bytes, EXTRACT_KEY_FROM_KEY) 255s | sizeof bytes 32 255s | wrapper: (SECItemType)-1057487232: 07 de a2 6b a1 39 64 a4 53 5e 31 e4 70 ab 6f bb ca 7f c8 58 53 b6 d9 85 01 81 23 4c 28 11 47 5e 255s | draft_chunk extracted len 32 bytes at 0x14b173b8dc20 255s | unwrapped: 255s | 00 01 02 03 04 05 06 07 08 09 0a 0b 0c 0d 0e 0f ................ 255s | ed cb 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................ 255s | XCBC: data 255s | 00 01 02 03 04 05 06 07 08 09 0a 0b 0c 0d 0e 0f ................ 255s | ed cb .. 255s | K extracting all 16 bytes of key@0x14b173b8e040 255s | K: symkey-key@0x14b173b8e040 (16-bytes, AES_ECB) 255s | sizeof bytes 16 255s | wrapper: (SECItemType)18: ee 5a cb 90 97 45 e8 17 03 10 c5 05 a5 00 37 28 255s | K extracted len 16 bytes at 0x14b173b8e020 255s | unwrapped: 255s | 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................ 255s | XCBC: K: 255s | 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................ 255s | XCBC: K1 255s | e1 4d 5d 0e e2 77 15 df 08 b4 15 2b a2 3d a8 e0 .M]..w.....+.=.. 255s | CONCATENATE_DATA_AND_BASE: 255s | target: EXTRACT_KEY_FROM_KEY 255s | base: base-key@0x14b173b8a290 (16-bytes, AES_KEY_GEN) 255s | params: 16-bytes@0x7fffc0f80480 255s | key-offset: 0, key-size: 16 255s | EXTRACT_KEY_FROM_KEY: 255s | target: AES_ECB 255s | flags: SIGN 255s | key_size: 16-bytes 255s | base: base-key@0x14b173b8d2a0 (32-bytes, EXTRACT_KEY_FROM_KEY) 255s | operation: FLAGS_ONLY 255s | params: 8-bytes@0x7fffc0f80488 255s | Computing E[2] using K3 255s | XCBC: K3 255s | 8d 34 ef cb 3b d5 45 ca 06 2a ec df ef 7c 0b fa .4..;.E..*...|.. 255s | XCBC: E[n-1] 255s | 0b 72 b2 ae 0a 37 79 81 75 6a d5 9c 79 c0 e6 96 .r...7y.uj..y... 255s | XCBC: M[n] 255s | ed cb .. 255s | XCBC: M[n] 255s | ed cb .. 255s | XCBC: M[n]:80...^E[n-1]^K3 255s | 6b 8d dd 65 31 e2 3c 4b 73 40 39 43 96 bc ed 6c k..e1.j.....n1.].8 255s | PRF chunk interface PRF HMAC_MD5 init key hunk 0x14b173b8bae0 (length 4) 255s | 4a 65 66 65 Jefe 255s | CONCATENATE_DATA_AND_BASE: 255s | target: EXTRACT_KEY_FROM_KEY 255s | base: base-key@0x14b173b8a290 (16-bytes, AES_KEY_GEN) 255s | params: 16-bytes@0x7fffc0f80670 255s | key-offset: 0, key-size: 4 255s | EXTRACT_KEY_FROM_KEY: 255s | target: MD5_HMAC 255s | flags: SIGN 255s | key_size: 4-bytes 255s | base: base-key@0x14b173b8d2a0 (20-bytes, EXTRACT_KEY_FROM_KEY) 255s | operation: FLAGS_ONLY 255s | params: 8-bytes@0x7fffc0f80678 255s | PRF chunk interface prf: created HMAC_MD5 context 0x14b173b8d610 from key-key@0x14b173b8e380 255s | PRF chunk interface prf: begin HMAC_MD5 with context 0x14b173b8d610 from key-key@0x14b173b8e380 255s | PRF chunk interface PRF HMAC_MD5 0x14b173b8dcb0 255s | PRF chunk interface PRF HMAC_MD5 update message (0x14b173b8dc20 length 28) 255s | 77 68 61 74 20 64 6f 20 79 61 20 77 61 6e 74 20 what do ya want 255s | 66 6f 72 20 6e 6f 74 68 69 6e 67 3f for nothing? 255s | PRF chunk interface PRF HMAC_MD5 final length 16 255s | 75 0c 78 3e 6a b0 b5 03 ea a8 6e 31 0a 5d b7 38 u.x>j.....n1.].8 255s | chunk output 255s | 75 0c 78 3e 6a b0 b5 03 ea a8 6e 31 0a 5d b7 38 u.x>j.....n1.].8 255s | verify_bytes() RFC 2104: MD5_HMAC test 2: prf OUT: ok 255s | CONCATENATE_DATA_AND_BASE: 255s | target: EXTRACT_KEY_FROM_KEY 255s | base: base-key@0x14b173b8a290 (16-bytes, AES_KEY_GEN) 255s | params: 16-bytes@0x7fffc0f80800 255s | key-offset: 0, key-size: 4 255s | EXTRACT_KEY_FROM_KEY: 255s | target: EXTRACT_KEY_FROM_KEY 255s | key_size: 4-bytes 255s | base: base-key@0x14b173b8d2a0 (20-bytes, EXTRACT_KEY_FROM_KEY) 255s | operation: FLAGS_ONLY 255s | params: 8-bytes@0x7fffc0f80738 255s | PRF symkey interface PRF HMAC_MD5 init key symkey-key@0x14b173b8e380 (size 4) 255s | PRF symkey interface: key symkey-key@0x14b173b8e380 (4-bytes, EXTRACT_KEY_FROM_KEY) 255s | key-offset: 0, key-size: 4 255s | EXTRACT_KEY_FROM_KEY: 255s | target: MD5_HMAC 255s | flags: SIGN 255s | key_size: 4-bytes 255s | base: base-key@0x14b173b8e380 (4-bytes, EXTRACT_KEY_FROM_KEY) 255s | operation: FLAGS_ONLY 255s | params: 8-bytes@0x7fffc0f80718 255s | PRF symkey interface prf: created HMAC_MD5 context 0x14b173b8e820 from key symkey-key@0x14b173b8d2a0 255s | PRF symkey interface prf: begin HMAC_MD5 with context 0x14b173b8e820 from key symkey-key@0x14b173b8d2a0 255s | PRF symkey interface PRF HMAC_MD5 0x14b173b8a230 255s | CONCATENATE_DATA_AND_BASE: 255s | target: EXTRACT_KEY_FROM_KEY 255s | base: base-key@0x14b173b8a290 (16-bytes, AES_KEY_GEN) 255s | params: 16-bytes@0x7fffc0f80800 255s | key-offset: 0, key-size: 28 255s | EXTRACT_KEY_FROM_KEY: 255s | target: EXTRACT_KEY_FROM_KEY 255s | key_size: 28-bytes 255s | base: base-key@0x14b173b8bbb0 (44-bytes, EXTRACT_KEY_FROM_KEY) 255s | operation: FLAGS_ONLY 255s | params: 8-bytes@0x7fffc0f80738 255s | PRF symkey interface PRF HMAC_MD5 update symkey message-key@0x14b173b8e040 (size 28) 255s | PRF symkey interface: symkey message-key@0x14b173b8e040 (28-bytes, EXTRACT_KEY_FROM_KEY) 255s | nss hmac digest hack extracting all 28 bytes of key@0x14b173b8e040 255s | nss hmac digest hack: symkey-key@0x14b173b8e040 (28-bytes, EXTRACT_KEY_FROM_KEY) 255s | sizeof bytes 32 255s | wrapper: (SECItemType)1674294440: b1 83 37 8d b3 b1 2a a6 99 6d 30 44 31 21 77 95 f3 d3 fb 6c 5a 27 a2 7c 2c 2c 61 54 ff 0c 48 c9 255s | nss hmac digest hack extracted len 32 bytes at 0x14b173b8d210 255s | unwrapped: 255s | 77 68 61 74 20 64 6f 20 79 61 20 77 61 6e 74 20 what do ya want 255s | 66 6f 72 20 6e 6f 74 68 69 6e 67 3f 00 00 00 00 for nothing?.... 255s | CONCATENATE_DATA_AND_BASE: 255s | target: EXTRACT_KEY_FROM_KEY 255s | base: base-key@0x14b173b8a290 (16-bytes, AES_KEY_GEN) 255s | params: 16-bytes@0x7fffc0f80730 255s | key-offset: 0, key-size: 16 255s | EXTRACT_KEY_FROM_KEY: 255s | target: EXTRACT_KEY_FROM_KEY 255s | key_size: 16-bytes 255s | base: base-key@0x14b173b8bbb0 (32-bytes, EXTRACT_KEY_FROM_KEY) 255s | operation: FLAGS_ONLY 255s | params: 8-bytes@0x7fffc0f80668 255s | PRF symkey interface PRF HMAC_MD5 final-key@0x14b173b8d2a0 (size 16) 255s | PRF symkey interface: key-key@0x14b173b8d2a0 (16-bytes, EXTRACT_KEY_FROM_KEY) 255s | output: symkey-key@0x14b173b8d2a0 (16-bytes, EXTRACT_KEY_FROM_KEY) 255s | RFC 2104: MD5_HMAC test 2 extracting all 16 bytes of key@0x14b173b8d2a0 255s | RFC 2104: MD5_HMAC test 2: symkey-key@0x14b173b8d2a0 (16-bytes, EXTRACT_KEY_FROM_KEY) 255s | sizeof bytes 16 255s | wrapper: (SECItemType)-1057488144: e1 8e 64 c7 e9 17 5e 29 5b 35 e0 d6 07 67 d7 7c 255s | RFC 2104: MD5_HMAC test 2 extracted len 16 bytes at 0x14b173b8a160 255s | unwrapped: 255s | 75 0c 78 3e 6a b0 b5 03 ea a8 6e 31 0a 5d b7 38 u.x>j.....n1.].8 255s | verify_bytes() RFC 2104: MD5_HMAC test 2: symkey: ok 255s ipsec algparse: RFC 2104: MD5_HMAC test 3 255s | decode_to_chunk() test_prf_vector: input "0xAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAA" 255s | decode_to_chunk() output: 255s | aa aa aa aa aa aa aa aa aa aa aa aa aa aa aa aa ................ 255s | decode_to_chunk() test_prf_vector: input "0xDDDDDDDDDDDDDDDDDDDDDDDDDDDDDDDDDDDDDDDDDDDDDDDDDDDDDDDDDDDDDDDDDDDDDDDDDDDDDDDDDDDDDDDDDDDDDDDDDDDD" 255s | decode_to_chunk() output: 255s | dd dd dd dd dd dd dd dd dd dd dd dd dd dd dd dd ................ 255s | dd dd dd dd dd dd dd dd dd dd dd dd dd dd dd dd ................ 255s | dd dd dd dd dd dd dd dd dd dd dd dd dd dd dd dd ................ 255s | dd dd .. 255s | decode_to_chunk() test_prf_vector: input "0x56be34521d144c88dbb8c733f0e8b3f6" 255s | decode_to_chunk() output: 255s | 56 be 34 52 1d 14 4c 88 db b8 c7 33 f0 e8 b3 f6 V.4R..L....3.... 255s | PRF chunk interface PRF HMAC_MD5 init key hunk 0x14b173b8d8e0 (length 16) 255s | aa aa aa aa aa aa aa aa aa aa aa aa aa aa aa aa ................ 255s | CONCATENATE_DATA_AND_BASE: 255s | target: EXTRACT_KEY_FROM_KEY 255s | base: base-key@0x14b173b8a290 (16-bytes, AES_KEY_GEN) 255s | params: 16-bytes@0x7fffc0f80670 255s | key-offset: 0, key-size: 16 255s | EXTRACT_KEY_FROM_KEY: 255s | target: MD5_HMAC 255s | flags: SIGN 255s | key_size: 16-bytes 255s | base: base-key@0x14b173b8e380 (32-bytes, EXTRACT_KEY_FROM_KEY) 255s | operation: FLAGS_ONLY 255s | params: 8-bytes@0x7fffc0f80678 255s | PRF chunk interface prf: created HMAC_MD5 context 0x14b173b8e770 from key-key@0x14b173b8d2a0 255s | PRF chunk interface prf: begin HMAC_MD5 with context 0x14b173b8e770 from key-key@0x14b173b8d2a0 255s | PRF chunk interface PRF HMAC_MD5 0x14b173b8a260 255s | PRF chunk interface PRF HMAC_MD5 update message (0x14b173b8dbe0 length 50) 255s | dd dd dd dd dd dd dd dd dd dd dd dd dd dd dd dd ................ 255s | dd dd dd dd dd dd dd dd dd dd dd dd dd dd dd dd ................ 255s | dd dd dd dd dd dd dd dd dd dd dd dd dd dd dd dd ................ 255s | dd dd .. 255s | PRF chunk interface PRF HMAC_MD5 final length 16 255s | 56 be 34 52 1d 14 4c 88 db b8 c7 33 f0 e8 b3 f6 V.4R..L....3.... 255s | chunk output 255s | 56 be 34 52 1d 14 4c 88 db b8 c7 33 f0 e8 b3 f6 V.4R..L....3.... 255s | verify_bytes() RFC 2104: MD5_HMAC test 3: prf OUT: ok 255s | CONCATENATE_DATA_AND_BASE: 255s | target: EXTRACT_KEY_FROM_KEY 255s | base: base-key@0x14b173b8a290 (16-bytes, AES_KEY_GEN) 255s | params: 16-bytes@0x7fffc0f80800 255s | key-offset: 0, key-size: 16 255s | EXTRACT_KEY_FROM_KEY: 255s | target: EXTRACT_KEY_FROM_KEY 255s | key_size: 16-bytes 255s | base: base-key@0x14b173b8e380 (32-bytes, EXTRACT_KEY_FROM_KEY) 255s | operation: FLAGS_ONLY 255s | params: 8-bytes@0x7fffc0f80738 255s | PRF symkey interface PRF HMAC_MD5 init key symkey-key@0x14b173b8d2a0 (size 16) 255s | PRF symkey interface: key symkey-key@0x14b173b8d2a0 (16-bytes, EXTRACT_KEY_FROM_KEY) 255s | key-offset: 0, key-size: 16 255s | EXTRACT_KEY_FROM_KEY: 255s | target: MD5_HMAC 255s | flags: SIGN 255s | key_size: 16-bytes 255s | base: base-key@0x14b173b8d2a0 (16-bytes, EXTRACT_KEY_FROM_KEY) 255s | operation: FLAGS_ONLY 255s | params: 8-bytes@0x7fffc0f80718 255s | PRF symkey interface prf: created HMAC_MD5 context 0x14b173b92b10 from key symkey-key@0x14b173b8e380 255s | PRF symkey interface prf: begin HMAC_MD5 with context 0x14b173b92b10 from key symkey-key@0x14b173b8e380 255s | PRF symkey interface PRF HMAC_MD5 0x14b173b8dc20 255s | CONCATENATE_DATA_AND_BASE: 255s | target: EXTRACT_KEY_FROM_KEY 255s | base: base-key@0x14b173b8a290 (16-bytes, AES_KEY_GEN) 255s | params: 16-bytes@0x7fffc0f80800 255s | key-offset: 0, key-size: 50 255s | EXTRACT_KEY_FROM_KEY: 255s | target: EXTRACT_KEY_FROM_KEY 255s | key_size: 50-bytes 255s | base: base-key@0x14b173b8bbb0 (66-bytes, EXTRACT_KEY_FROM_KEY) 255s | operation: FLAGS_ONLY 255s | params: 8-bytes@0x7fffc0f80738 255s | PRF symkey interface PRF HMAC_MD5 update symkey message-key@0x14b173b8e040 (size 50) 255s | PRF symkey interface: symkey message-key@0x14b173b8e040 (50-bytes, EXTRACT_KEY_FROM_KEY) 255s | nss hmac digest hack extracting all 50 bytes of key@0x14b173b8e040 255s | nss hmac digest hack: symkey-key@0x14b173b8e040 (50-bytes, EXTRACT_KEY_FROM_KEY) 255s | sizeof bytes 64 255s | wrapper: (SECItemType)1674294440: 63 88 08 e7 8e 47 26 f4 b7 b8 8f 90 ee 45 be 04 63 88 08 e7 8e 47 26 f4 b7 b8 8f 90 ee 45 be 04 63 88 08 e7 8e 47 26 f4 b7 b8 8f 90 ee 45 be 04 45 bc b6 93 25 08 bb 5c 90 2a 13 d5 22 27 00 3f 255s | nss hmac digest hack extracted len 64 bytes at 0x14b173b8dce0 255s | unwrapped: 255s | dd dd dd dd dd dd dd dd dd dd dd dd dd dd dd dd ................ 255s | dd dd dd dd dd dd dd dd dd dd dd dd dd dd dd dd ................ 255s | dd dd dd dd dd dd dd dd dd dd dd dd dd dd dd dd ................ 255s | dd dd 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................ 255s | CONCATENATE_DATA_AND_BASE: 255s | target: EXTRACT_KEY_FROM_KEY 255s | base: base-key@0x14b173b8a290 (16-bytes, AES_KEY_GEN) 255s | params: 16-bytes@0x7fffc0f80730 255s | key-offset: 0, key-size: 16 255s | EXTRACT_KEY_FROM_KEY: 255s | target: EXTRACT_KEY_FROM_KEY 255s | key_size: 16-bytes 255s | base: base-key@0x14b173b8bbb0 (32-bytes, EXTRACT_KEY_FROM_KEY) 255s | operation: FLAGS_ONLY 255s | params: 8-bytes@0x7fffc0f80668 255s | PRF symkey interface PRF HMAC_MD5 final-key@0x14b173b8e380 (size 16) 255s | PRF symkey interface: key-key@0x14b173b8e380 (16-bytes, EXTRACT_KEY_FROM_KEY) 255s | output: symkey-key@0x14b173b8e380 (16-bytes, EXTRACT_KEY_FROM_KEY) 255s | RFC 2104: MD5_HMAC test 3 extracting all 16 bytes of key@0x14b173b8e380 255s | RFC 2104: MD5_HMAC test 3: symkey-key@0x14b173b8e380 (16-bytes, EXTRACT_KEY_FROM_KEY) 255s | sizeof bytes 16 255s | wrapper: (SECItemType)-1057488144: c7 e4 a5 dd ee f4 c0 28 29 ff ac 87 87 6e 79 c3 255s | RFC 2104: MD5_HMAC test 3 extracted len 16 bytes at 0x14b173b8deb0 255s | unwrapped: 255s | 56 be 34 52 1d 14 4c 88 db b8 c7 33 f0 e8 b3 f6 V.4R..L....3.... 255s | verify_bytes() RFC 2104: MD5_HMAC test 3: symkey: ok 255s ipsec algparse: testing HMAC_SHA1: 255s ipsec algparse: CAVP: IKEv2 key derivation with HMAC-SHA1 255s | decode_to_chunk() test_kdf_vector: input "0x32b50d5f4a3763f3" 255s | decode_to_chunk() output: 255s | 32 b5 0d 5f 4a 37 63 f3 2.._J7c. 255s | decode_to_chunk() test_kdf_vector: input "0x9206a04b26564cb1" 255s | decode_to_chunk() output: 255s | 92 06 a0 4b 26 56 4c b1 ...K&VL. 255s | decode_to_chunk() test_kdf_vector: input "0x34c9e7c188868785" 255s | decode_to_chunk() output: 255s | 34 c9 e7 c1 88 86 87 85 4....... 255s | decode_to_chunk() test_kdf_vector: input "0x3ff77d760d2b2199" 255s | decode_to_chunk() output: 255s | 3f f7 7d 76 0d 2b 21 99 ?.}v.+!. 255s | decode_to_chunk() test_kdf_vector: input "0x4b2c1f971981a8ad8d0abeafabf38cf75fc8349c148142465ed9c8b516b8be52" 255s | decode_to_chunk() output: 255s | 4b 2c 1f 97 19 81 a8 ad 8d 0a be af ab f3 8c f7 K,.............. 255s | 5f c8 34 9c 14 81 42 46 5e d9 c8 b5 16 b8 be 52 _.4...BF^......R 255s | decode_to_chunk() test_kdf_vector: input "0x863f3c9d06efd39d2b907b97f8699e5dd5251ef64a2a176f36ee40c87d4f9330" 255s | decode_to_chunk() output: 255s | 86 3f 3c 9d 06 ef d3 9d 2b 90 7b 97 f8 69 9e 5d .?<.....+.{..i.] 255s | d5 25 1e f6 4a 2a 17 6f 36 ee 40 c8 7d 4f 93 30 .%..J*.o6.@.}O.0 255s | decode_to_chunk() test_kdf_vector: input "0xa9a7b222b59f8f48645f28a1db5b5f5d7479cba7" 255s | decode_to_chunk() output: 255s | a9 a7 b2 22 b5 9f 8f 48 64 5f 28 a1 db 5b 5f 5d ..."...Hd_(..[_] 255s | 74 79 cb a7 ty.. 255s | decode_to_chunk() test_kdf_vector: input "0x63e81194946ebd05df7df5ebf5d8750056bf1f1d" 255s | decode_to_chunk() output: 255s | 63 e8 11 94 94 6e bd 05 df 7d f5 eb f5 d8 75 00 c....n...}....u. 255s | 56 bf 1f 1d V... 255s | decode_to_chunk() test_kdf_vector: input "0xa14293677cc80ff8f9cc0eee30d895da9d8f405666e30ef0dfcb63c634a46002a2a63080e514a062768b76606f9fa5e992204fc5a670bde3f10d6b027113936a5c55b648a194ae587b0088d52204b702c979fa280870d2ed41efa9c549fd11198af1670b143d384bd275c5f594cf266b05ebadca855e4249520a441a81157435a7a56cc4" 255s | decode_to_chunk() output: 255s | a1 42 93 67 7c c8 0f f8 f9 cc 0e ee 30 d8 95 da .B.g|.......0... 255s | 9d 8f 40 56 66 e3 0e f0 df cb 63 c6 34 a4 60 02 ..@Vf.....c.4.`. 255s | a2 a6 30 80 e5 14 a0 62 76 8b 76 60 6f 9f a5 e9 ..0....bv.v`o... 255s | 92 20 4f c5 a6 70 bd e3 f1 0d 6b 02 71 13 93 6a . O..p....k.q..j 255s | 5c 55 b6 48 a1 94 ae 58 7b 00 88 d5 22 04 b7 02 \U.H...X{..."... 255s | c9 79 fa 28 08 70 d2 ed 41 ef a9 c5 49 fd 11 19 .y.(.p..A...I... 255s | 8a f1 67 0b 14 3d 38 4b d2 75 c5 f5 94 cf 26 6b ..g..=8K.u....&k 255s | 05 eb ad ca 85 5e 42 49 52 0a 44 1a 81 15 74 35 .....^BIR.D...t5 255s | a7 a5 6c c4 ..l. 255s | CONCATENATE_DATA_AND_BASE: 255s | target: EXTRACT_KEY_FROM_KEY 255s | base: base-key@0x14b173b8a290 (16-bytes, AES_KEY_GEN) 255s | params: 16-bytes@0x7fffc0f807d0 255s | key-offset: 0, key-size: 32 255s | EXTRACT_KEY_FROM_KEY: 255s | target: EXTRACT_KEY_FROM_KEY 255s | key_size: 32-bytes 255s | base: base-key@0x14b173b8d2a0 (48-bytes, EXTRACT_KEY_FROM_KEY) 255s | operation: FLAGS_ONLY 255s | params: 8-bytes@0x7fffc0f80708 255s | NSS_IKE_PRF_DERIVE: 255s | target: NSS_IKE_PRF_PLUS_DERIVE 255s | base: base-key@0x14b173b8e380 (32-bytes, EXTRACT_KEY_FROM_KEY) 255s | params: 56-bytes@0x7fffc0f807a0 255s | CAVP: IKEv2 key derivation with HMAC-SHA1 extracting all 20 bytes of key@0x14b173b8d2a0 255s | CAVP: IKEv2 key derivation with HMAC-SHA1: symkey-key@0x14b173b8d2a0 (20-bytes, NSS_IKE_PRF_PLUS_DERIVE) 255s | sizeof bytes 32 255s | wrapper: (SECItemType)1936548210: 5c 47 30 f5 ba 09 e9 d0 95 8f df b3 f0 a2 7b 79 41 16 cb dd aa 3a 6d 9a ab 89 15 51 5d a6 d6 ca 255s | CAVP: IKEv2 key derivation with HMAC-SHA1 extracted len 32 bytes at 0x14b173b8dcb0 255s | unwrapped: 255s | a9 a7 b2 22 b5 9f 8f 48 64 5f 28 a1 db 5b 5f 5d ..."...Hd_(..[_] 255s | 74 79 cb a7 00 00 00 00 00 00 00 00 00 00 00 00 ty.............. 255s | verify_bytes() CAVP: IKEv2 key derivation with HMAC-SHA1: skeyseed: ok 255s | NSS_IKE_PRF_PLUS_DERIVE: 255s | target: EXTRACT_KEY_FROM_KEY 255s | key_size: 132-bytes 255s | base: base-key@0x14b173b8d2a0 (20-bytes, NSS_IKE_PRF_PLUS_DERIVE) 255s | params: 40-bytes@0x7fffc0f806f0 255s | CAVP: IKEv2 key derivation with HMAC-SHA1 extracting all 132 bytes of key@0x14b173b8e040 255s | CAVP: IKEv2 key derivation with HMAC-SHA1: symkey-key@0x14b173b8e040 (132-bytes, EXTRACT_KEY_FROM_KEY) 255s | sizeof bytes 144 255s | wrapper: (SECItemType)540684609: 00 a3 8d 4b bd d6 f1 9f 25 9c d9 c1 29 92 55 7f e2 09 f6 2e 9c 5a c3 57 75 c8 79 cd aa cf 41 13 d0 a8 64 96 e4 0d e1 93 99 01 bc ff bb 51 78 43 cc 51 13 1f 26 88 7b 98 ad 7a be af d6 52 91 91 aa 8c 67 d5 65 47 69 41 73 0b 65 d6 b5 e2 c5 2c 8a ef 51 75 6a 8c 6b 9e 0a c0 51 5e 76 f3 7b 33 57 56 5c de 25 9c 87 7d b5 4b 99 0f b1 69 68 7b 92 7d 4c f6 04 fa 28 e5 f2 3d 40 cd ef 47 7b 83 7f fd 4b 0c b2 71 a5 81 56 79 4c a8 b2 91 f9 2c 255s | CAVP: IKEv2 key derivation with HMAC-SHA1 extracted len 144 bytes at 0x14b173b949d0 255s | unwrapped: 255s | a1 42 93 67 7c c8 0f f8 f9 cc 0e ee 30 d8 95 da .B.g|.......0... 255s | 9d 8f 40 56 66 e3 0e f0 df cb 63 c6 34 a4 60 02 ..@Vf.....c.4.`. 255s | a2 a6 30 80 e5 14 a0 62 76 8b 76 60 6f 9f a5 e9 ..0....bv.v`o... 255s | 92 20 4f c5 a6 70 bd e3 f1 0d 6b 02 71 13 93 6a . O..p....k.q..j 255s | 5c 55 b6 48 a1 94 ae 58 7b 00 88 d5 22 04 b7 02 \U.H...X{..."... 255s | c9 79 fa 28 08 70 d2 ed 41 ef a9 c5 49 fd 11 19 .y.(.p..A...I... 255s | 8a f1 67 0b 14 3d 38 4b d2 75 c5 f5 94 cf 26 6b ..g..=8K.u....&k 255s | 05 eb ad ca 85 5e 42 49 52 0a 44 1a 81 15 74 35 .....^BIR.D...t5 255s | a7 a5 6c c4 00 00 00 00 00 00 00 00 00 00 00 00 ..l............. 255s | verify_bytes() CAVP: IKEv2 key derivation with HMAC-SHA1: DKM: ok 255s | key-offset: 0, key-size: 20 255s | EXTRACT_KEY_FROM_KEY: 255s | target: EXTRACT_KEY_FROM_KEY 255s | key_size: 20-bytes 255s | base: base-key@0x14b173b8e040 (132-bytes, EXTRACT_KEY_FROM_KEY) 255s | operation: FLAGS_ONLY 255s | params: 8-bytes@0x7fffc0f807f8 255s | CONCATENATE_DATA_AND_BASE: 255s | target: EXTRACT_KEY_FROM_KEY 255s | base: base-key@0x14b173b8a290 (16-bytes, AES_KEY_GEN) 255s | params: 16-bytes@0x7fffc0f807d0 255s | key-offset: 0, key-size: 32 255s | EXTRACT_KEY_FROM_KEY: 255s | target: EXTRACT_KEY_FROM_KEY 255s | key_size: 32-bytes 255s | base: base-key@0x14b173b8e180 (48-bytes, EXTRACT_KEY_FROM_KEY) 255s | operation: FLAGS_ONLY 255s | params: 8-bytes@0x7fffc0f80708 255s | NSS_IKE_PRF_DERIVE: 255s | target: NSS_IKE_PRF_PLUS_DERIVE 255s | base: base-key@0x14b173b8bbb0 (20-bytes, EXTRACT_KEY_FROM_KEY) 255s | params: 56-bytes@0x7fffc0f807b0 255s | CAVP: IKEv2 key derivation with HMAC-SHA1 extracting all 20 bytes of key@0x14b173b8e180 255s | CAVP: IKEv2 key derivation with HMAC-SHA1: symkey-key@0x14b173b8e180 (20-bytes, NSS_IKE_PRF_PLUS_DERIVE) 255s | sizeof bytes 32 255s | wrapper: (SECItemType)1936548210: ea 14 08 30 73 63 7a 8d 9f 5f 0b a8 03 60 f7 bd c7 7e 76 3a e7 f1 56 43 da 3e 45 b5 a2 dc 5a 1f 255s | CAVP: IKEv2 key derivation with HMAC-SHA1 extracted len 32 bytes at 0x14b173b8a260 255s | unwrapped: 255s | 63 e8 11 94 94 6e bd 05 df 7d f5 eb f5 d8 75 00 c....n...}....u. 255s | 56 bf 1f 1d 00 00 00 00 00 00 00 00 00 00 00 00 V............... 255s | verify_bytes() CAVP: IKEv2 key derivation with HMAC-SHA1: skeyseed_rekey: ok 255s ipsec algparse: leak detective found no leaks 255s /usr/libexec/ipsec/pluto: adjusting nssdir to /tmp/tmp.2dzIVxW6dY 255s /usr/libexec/ipsec/pluto: selftest: skipping lock 255s /usr/libexec/ipsec/pluto: selftest: skipping control socket 255s /usr/libexec/ipsec/pluto: selftest: skipping fork 255s Starting Pluto (Libreswan Version 5.2 IKEv2 IKEv1 XFRM XFRMI esp-hw-offload FORK PTHREAD_SETSCHEDPRIO NSS (IPsec profile) (NSS-KDF) DNSSEC SYSTEMD_WATCHDOG LABELED_IPSEC (SELINUX) LIBCAP_NG LINUX_AUDIT AUTH_PAM NETWORKMANAGER CURL(non-NSS) LDAP(non-NSS) NFTABLES CAT NFLOG) pid:1652 255s operating system: Linux 6.18.0 [Linux 6.18.0-9-generic #9-Ubuntu SMP PREEMPT_DYNAMIC Mon Jan 12 16:45:54 UTC 2026 ppc64le] 255s core dump dir: /run/pluto 255s secrets file: /etc/ipsec.secrets 255s Initializing NSS using read-only database "sql:/tmp/tmp.2dzIVxW6dY" 255s FIPS Mode: OFF 255s NSS crypto library initialized 255s FIPS mode disabled for pluto daemon 255s FIPS HMAC integrity support [not required] 255s libcap-ng capng_apply failed to apply changes, err=-5. see: man capng_apply 255s libcap-ng support [enabled] 255s Linux audit support [enabled] 255s leak-detective disabled 255s NSS crypto [enabled] 255s XAUTH PAM support [enabled] 255s initializing libevent in pthreads mode: headers: 2.1.12-stable (2010c00); library: 2.1.12-stable (2010c00) 255s NAT-Traversal: keep-alive period 20s 255s ERROR: xfrmi is not supported, failed to create ipsec-interface ipsec1 bound to lo 255s ipsec-interface is not working: xfrmi is not supported 255s IPsec Interface [disabled] 255s refreshed session resume keys, issuing key 1 255s initializing NSS db 255s running pluto selftest 255s Encryption algorithms: 255s AES_CCM_16 {256,192,*128} IKEv1: ESP IKEv2: ESP FIPS aes_ccm, aes_ccm_c 255s AES_CCM_12 {256,192,*128} IKEv1: ESP IKEv2: ESP FIPS aes_ccm_b 255s AES_CCM_8 {256,192,*128} IKEv1: ESP IKEv2: ESP FIPS aes_ccm_a 255s 3DES_CBC [*192] IKEv1: IKE ESP IKEv2: IKE ESP FIPS NSS(CBC) 3des 255s CAMELLIA_CTR {256,192,*128} IKEv1: ESP IKEv2: ESP 255s CAMELLIA_CBC {256,192,*128} IKEv1: IKE ESP IKEv2: IKE ESP NSS(CBC) camellia 255s AES_GCM_16 {256,192,*128} IKEv1: ESP IKEv2: IKE ESP FIPS NSS(AEAD) aes_gcm, aes_gcm_c 255s AES_GCM_12 {256,192,*128} IKEv1: ESP IKEv2: IKE ESP FIPS NSS(AEAD) aes_gcm_b 255s AES_GCM_8 {256,192,*128} IKEv1: ESP IKEv2: IKE ESP FIPS NSS(AEAD) aes_gcm_a 255s AES_CTR {256,192,*128} IKEv1: IKE ESP IKEv2: IKE ESP FIPS NSS(CTR) aesctr 255s AES_CBC {256,192,*128} IKEv1: IKE ESP IKEv2: IKE ESP FIPS NSS(CBC) aes 255s NULL_AUTH_AES_GMAC {256,192,*128} IKEv1: ESP IKEv2: ESP FIPS aes_gmac 255s NULL [] IKEv1: ESP IKEv2: ESP NULL 255s CHACHA20_POLY1305 [*256] IKEv1: IKEv2: IKE ESP NSS(AEAD) chacha20poly1305 255s Hash algorithms: 255s MD5 IKEv1: IKE IKEv2: NSS 255s SHA1 IKEv1: IKE IKEv2: IKE FIPS NSS sha 255s SHA2_256 IKEv1: IKE IKEv2: IKE FIPS NSS sha2, sha256 255s SHA2_384 IKEv1: IKE IKEv2: IKE FIPS NSS sha384 255s SHA2_512 IKEv1: IKE IKEv2: IKE FIPS NSS sha512 255s IDENTITY IKEv1: IKEv2: FIPS 255s PRF algorithms: 255s HMAC_MD5 IKEv1: IKE IKEv2: IKE NSS md5 255s HMAC_SHA1 IKEv1: IKE IKEv2: IKE FIPS NSS sha, sha1 255s HMAC_SHA2_256 IKEv1: IKE IKEv2: IKE FIPS NSS sha2, sha256, sha2_256 255s HMAC_SHA2_384 IKEv1: IKE IKEv2: IKE FIPS NSS sha384, sha2_384 255s HMAC_SHA2_512 IKEv1: IKE IKEv2: IKE FIPS NSS sha512, sha2_512 255s AES_XCBC IKEv1: IKEv2: IKE native(XCBC) aes128_xcbc 255s Integrity algorithms: 255s HMAC_MD5_96 IKEv1: IKE ESP AH IKEv2: IKE ESP AH NSS md5, hmac_md5 255s HMAC_SHA1_96 IKEv1: IKE ESP AH IKEv2: IKE ESP AH FIPS NSS sha, sha1, sha1_96, hmac_sha1 255s HMAC_SHA2_512_256 IKEv1: IKE ESP AH IKEv2: IKE ESP AH FIPS NSS sha512, sha2_512, sha2_512_256, hmac_sha2_512 255s HMAC_SHA2_384_192 IKEv1: IKE ESP AH IKEv2: IKE ESP AH FIPS NSS sha384, sha2_384, sha2_384_192, hmac_sha2_384 255s HMAC_SHA2_256_128 IKEv1: IKE ESP AH IKEv2: IKE ESP AH FIPS NSS sha2, sha256, sha2_256, sha2_256_128, hmac_sha2_256 255s HMAC_SHA2_256_TRUNCBUG IKEv1: ESP AH IKEv2: AH 255s AES_XCBC_96 IKEv1: ESP AH IKEv2: IKE ESP AH native(XCBC) aes_xcbc, aes128_xcbc, aes128_xcbc_96 255s AES_CMAC_96 IKEv1: ESP AH IKEv2: ESP AH FIPS aes_cmac 255s NONE IKEv1: ESP IKEv2: IKE ESP FIPS null 255s DH algorithms: 255s NONE IKEv1: IKEv2: IKE ESP AH FIPS NSS(MODP) null, dh0 255s MODP1536 IKEv1: IKE ESP AH IKEv2: IKE ESP AH NSS(MODP) dh5 255s MODP2048 IKEv1: IKE ESP AH IKEv2: IKE ESP AH FIPS NSS(MODP) dh14 255s MODP3072 IKEv1: IKE ESP AH IKEv2: IKE ESP AH FIPS NSS(MODP) dh15 255s MODP4096 IKEv1: IKE ESP AH IKEv2: IKE ESP AH FIPS NSS(MODP) dh16 255s MODP6144 IKEv1: IKE ESP AH IKEv2: IKE ESP AH FIPS NSS(MODP) dh17 255s MODP8192 IKEv1: IKE ESP AH IKEv2: IKE ESP AH FIPS NSS(MODP) dh18 255s DH19 IKEv1: IKE IKEv2: IKE ESP AH FIPS NSS(ECP) ecp_256, ecp256 255s DH20 IKEv1: IKE IKEv2: IKE ESP AH FIPS NSS(ECP) ecp_384, ecp384 255s DH21 IKEv1: IKE IKEv2: IKE ESP AH FIPS NSS(ECP) ecp_521, ecp521 255s DH31 IKEv1: IKE IKEv2: IKE ESP AH NSS(ECP) curve25519 255s IPCOMP algorithms: 255s DEFLATE IKEv1: ESP AH IKEv2: ESP AH FIPS 255s LZS IKEv1: IKEv2: ESP AH FIPS 255s LZJH IKEv1: IKEv2: ESP AH FIPS 255s testing CAMELLIA_CBC: 255s Camellia: 16 bytes with 128-bit key 255s Camellia: 16 bytes with 128-bit key 255s Camellia: 16 bytes with 256-bit key 255s Camellia: 16 bytes with 256-bit key 255s testing AES_GCM_16: 255s empty string 255s one block 255s two blocks 255s two blocks with associated data 255s testing AES_CTR: 255s Encrypting 16 octets using AES-CTR with 128-bit key 255s Encrypting 32 octets using AES-CTR with 128-bit key 255s Encrypting 36 octets using AES-CTR with 128-bit key 255s Encrypting 16 octets using AES-CTR with 192-bit key 255s Encrypting 32 octets using AES-CTR with 192-bit key 255s Encrypting 36 octets using AES-CTR with 192-bit key 255s Encrypting 16 octets using AES-CTR with 256-bit key 255s Encrypting 32 octets using AES-CTR with 256-bit key 255s Encrypting 36 octets using AES-CTR with 256-bit key 255s testing AES_CBC: 255s Encrypting 16 bytes (1 block) using AES-CBC with 128-bit key 255s Encrypting 32 bytes (2 blocks) using AES-CBC with 128-bit key 255s Encrypting 48 bytes (3 blocks) using AES-CBC with 128-bit key 255s Encrypting 64 bytes (4 blocks) using AES-CBC with 128-bit key 255s testing AES_XCBC: 255s RFC 3566 Test Case 1: AES-XCBC-MAC-96 with 0-byte input 255s RFC 3566 Test Case 2: AES-XCBC-MAC-96 with 3-byte input 255s RFC 3566 Test Case 3: AES-XCBC-MAC-96 with 16-byte input 255s RFC 3566 Test Case 4: AES-XCBC-MAC-96 with 20-byte input 255s RFC 3566 Test Case 5: AES-XCBC-MAC-96 with 32-byte input 255s RFC 3566 Test Case 6: AES-XCBC-MAC-96 with 34-byte input 255s RFC 3566 Test Case 7: AES-XCBC-MAC-96 with 1000-byte input 255s RFC 4434 Test Case AES-XCBC-PRF-128 with 20-byte input (key length 16) 255s RFC 4434 Test Case AES-XCBC-PRF-128 with 20-byte input (key length 10) 255s RFC 4434 Test Case AES-XCBC-PRF-128 with 20-byte input (key length 18) 255s testing HMAC_MD5: 255s RFC 2104: MD5_HMAC test 1 255s RFC 2104: MD5_HMAC test 2 255s RFC 2104: MD5_HMAC test 3 255s testing HMAC_SHA1: 255s CAVP: IKEv2 key derivation with HMAC-SHA1 255s selftest: exiting pluto 255s autopkgtest [21:20:47]: test cryptocheck: -----------------------] 255s cryptocheck PASS 255s autopkgtest [21:20:47]: test cryptocheck: - - - - - - - - - - results - - - - - - - - - - 256s autopkgtest [21:20:48]: test cavp: preparing testbed 263s Creating nova instance adt-resolute-ppc64el-libreswan-20260203-211632-juju-7f2275-prod-proposed-migration-environment-2-cc7d42c3-f2ab-45fe-ab07-b8fea38e5ed2 from image adt/ubuntu-resolute-ppc64el-server-20260203.img (UUID 36e1410e-0a72-4cd6-affd-580c415d80cb)... 304s autopkgtest [21:21:36]: testbed dpkg architecture: ppc64el 304s autopkgtest [21:21:36]: testbed apt version: 3.1.14 305s autopkgtest [21:21:37]: @@@@@@@@@@@@@@@@@@@@ test bed setup 305s autopkgtest [21:21:37]: testbed release detected to be: resolute 306s autopkgtest [21:21:38]: updating testbed package index (apt update) 306s Get:1 http://ftpmaster.internal/ubuntu resolute-proposed InRelease [124 kB] 306s Hit:2 http://ftpmaster.internal/ubuntu resolute InRelease 306s Hit:3 http://ftpmaster.internal/ubuntu resolute-updates InRelease 306s Hit:4 http://ftpmaster.internal/ubuntu resolute-security InRelease 306s Get:5 http://ftpmaster.internal/ubuntu resolute-proposed/universe Sources [1343 kB] 306s Get:6 http://ftpmaster.internal/ubuntu resolute-proposed/multiverse Sources [27.9 kB] 306s Get:7 http://ftpmaster.internal/ubuntu resolute-proposed/restricted Sources [5260 B] 306s Get:8 http://ftpmaster.internal/ubuntu resolute-proposed/main Sources [242 kB] 306s Get:9 http://ftpmaster.internal/ubuntu resolute-proposed/main ppc64el Packages [289 kB] 306s Get:10 http://ftpmaster.internal/ubuntu resolute-proposed/universe ppc64el Packages [1151 kB] 306s Get:11 http://ftpmaster.internal/ubuntu resolute-proposed/multiverse ppc64el Packages [17.8 kB] 307s Fetched 3201 kB in 1s (3844 kB/s) 307s Reading package lists... 308s Hit:1 http://ftpmaster.internal/ubuntu resolute-proposed InRelease 308s Hit:2 http://ftpmaster.internal/ubuntu resolute InRelease 308s Hit:3 http://ftpmaster.internal/ubuntu resolute-updates InRelease 308s Hit:4 http://ftpmaster.internal/ubuntu resolute-security InRelease 309s Reading package lists... 309s Reading package lists... 310s Building dependency tree... 310s Reading state information... 310s Calculating upgrade... 310s The following packages will be upgraded: 310s libpam-modules libpam-modules-bin libpam-runtime libpam0g 310s 4 upgraded, 0 newly installed, 0 to remove and 0 not upgraded. 310s Need to get 523 kB of archives. 310s After this operation, 0 B of additional disk space will be used. 310s Get:1 http://ftpmaster.internal/ubuntu resolute-proposed/main ppc64el libpam-runtime all 1.7.0-5ubuntu3 [149 kB] 310s Get:2 http://ftpmaster.internal/ubuntu resolute-proposed/main ppc64el libpam0g ppc64el 1.7.0-5ubuntu3 [77.3 kB] 310s Get:3 http://ftpmaster.internal/ubuntu resolute-proposed/main ppc64el libpam-modules-bin ppc64el 1.7.0-5ubuntu3 [53.2 kB] 310s Get:4 http://ftpmaster.internal/ubuntu resolute-proposed/main ppc64el libpam-modules ppc64el 1.7.0-5ubuntu3 [244 kB] 310s Fetched 523 kB in 0s (2269 kB/s) 310s dpkg-preconfigure: unable to re-open stdin: No such file or directory 311s (Reading database ... (Reading database ... 5% (Reading database ... 10% (Reading database ... 15% (Reading database ... 20% (Reading database ... 25% (Reading database ... 30% (Reading database ... 35% (Reading database ... 40% (Reading database ... 45% (Reading database ... 50% (Reading database ... 55% (Reading database ... 60% (Reading database ... 65% (Reading database ... 70% (Reading database ... 75% (Reading database ... 80% (Reading database ... 85% (Reading database ... 90% (Reading database ... 95% (Reading database ... 100% (Reading database ... 82008 files and directories currently installed.) 311s Preparing to unpack .../libpam-runtime_1.7.0-5ubuntu3_all.deb ... 311s Unpacking libpam-runtime (1.7.0-5ubuntu3) over (1.7.0-5ubuntu2) ... 311s Setting up libpam-runtime (1.7.0-5ubuntu3) ... 311s (Reading database ... (Reading database ... 5% (Reading database ... 10% (Reading database ... 15% (Reading database ... 20% (Reading database ... 25% (Reading database ... 30% (Reading database ... 35% (Reading database ... 40% (Reading database ... 45% (Reading database ... 50% (Reading database ... 55% (Reading database ... 60% (Reading database ... 65% (Reading database ... 70% (Reading database ... 75% (Reading database ... 80% (Reading database ... 85% (Reading database ... 90% (Reading database ... 95% (Reading database ... 100% (Reading database ... 82008 files and directories currently installed.) 311s Preparing to unpack .../libpam0g_1.7.0-5ubuntu3_ppc64el.deb ... 311s Unpacking libpam0g:ppc64el (1.7.0-5ubuntu3) over (1.7.0-5ubuntu2) ... 311s Setting up libpam0g:ppc64el (1.7.0-5ubuntu3) ... 312s (Reading database ... (Reading database ... 5% (Reading database ... 10% (Reading database ... 15% (Reading database ... 20% (Reading database ... 25% (Reading database ... 30% (Reading database ... 35% (Reading database ... 40% (Reading database ... 45% (Reading database ... 50% (Reading database ... 55% (Reading database ... 60% (Reading database ... 65% (Reading database ... 70% (Reading database ... 75% (Reading database ... 80% (Reading database ... 85% (Reading database ... 90% (Reading database ... 95% (Reading database ... 100% (Reading database ... 82008 files and directories currently installed.) 312s Preparing to unpack .../libpam-modules-bin_1.7.0-5ubuntu3_ppc64el.deb ... 312s Unpacking libpam-modules-bin (1.7.0-5ubuntu3) over (1.7.0-5ubuntu2) ... 312s Setting up libpam-modules-bin (1.7.0-5ubuntu3) ... 312s pam_namespace.service is a disabled or a static unit not running, not starting it. 312s (Reading database ... (Reading database ... 5% (Reading database ... 10% (Reading database ... 15% (Reading database ... 20% (Reading database ... 25% (Reading database ... 30% (Reading database ... 35% (Reading database ... 40% (Reading database ... 45% (Reading database ... 50% (Reading database ... 55% (Reading database ... 60% (Reading database ... 65% (Reading database ... 70% (Reading database ... 75% (Reading database ... 80% (Reading database ... 85% (Reading database ... 90% (Reading database ... 95% (Reading database ... 100% (Reading database ... 82008 files and directories currently installed.) 312s Preparing to unpack .../libpam-modules_1.7.0-5ubuntu3_ppc64el.deb ... 312s Unpacking libpam-modules:ppc64el (1.7.0-5ubuntu3) over (1.7.0-5ubuntu2) ... 312s Setting up libpam-modules:ppc64el (1.7.0-5ubuntu3) ... 313s Processing triggers for man-db (2.13.1-1) ... 314s Processing triggers for libc-bin (2.42-2ubuntu4) ... 314s autopkgtest [21:21:46]: upgrading testbed (apt dist-upgrade and autopurge) 314s Reading package lists... 314s Building dependency tree... 314s Reading state information... 314s Calculating upgrade... 314s 0 upgraded, 0 newly installed, 0 to remove and 0 not upgraded. 315s Reading package lists... 315s Building dependency tree... 315s Reading state information... 315s Solving dependencies... 315s 0 upgraded, 0 newly installed, 0 to remove and 0 not upgraded. 315s autopkgtest [21:21:47]: rebooting testbed after setup commands that affected boot 360s Reading package lists... 361s Building dependency tree... 361s Reading state information... 361s Solving dependencies... 361s The following NEW packages will be installed: 361s dns-root-data libevent-2.1-7t64 libevent-pthreads-2.1-7t64 libldns3t64 361s libnss3-tools libreswan libunbound8 361s 0 upgraded, 7 newly installed, 0 to remove and 0 not upgraded. 361s Need to get 3283 kB of archives. 361s After this operation, 15.4 MB of additional disk space will be used. 361s Get:1 http://ftpmaster.internal/ubuntu resolute/main ppc64el dns-root-data all 2025080400build1 [6022 B] 361s Get:2 http://ftpmaster.internal/ubuntu resolute/main ppc64el libnss3-tools ppc64el 2:3.120-1 [744 kB] 362s Get:3 http://ftpmaster.internal/ubuntu resolute/main ppc64el libevent-pthreads-2.1-7t64 ppc64el 2.1.12-stable-10build1 [8140 B] 362s Get:4 http://ftpmaster.internal/ubuntu resolute/universe ppc64el libldns3t64 ppc64el 1.8.4-2build1 [200 kB] 362s Get:5 http://ftpmaster.internal/ubuntu resolute/main ppc64el libevent-2.1-7t64 ppc64el 2.1.12-stable-10build1 [172 kB] 362s Get:6 http://ftpmaster.internal/ubuntu resolute/main ppc64el libunbound8 ppc64el 1.24.2-1ubuntu1 [576 kB] 362s Get:7 http://ftpmaster.internal/ubuntu resolute/universe ppc64el libreswan ppc64el 5.2-2.2ubuntu1 [1577 kB] 363s Fetched 3283 kB in 2s (1451 kB/s) 363s Selecting previously unselected package dns-root-data. 364s (Reading database ... (Reading database ... 5% (Reading database ... 10% (Reading database ... 15% (Reading database ... 20% (Reading database ... 25% (Reading database ... 30% (Reading database ... 35% (Reading database ... 40% (Reading database ... 45% (Reading database ... 50% (Reading database ... 55% (Reading database ... 60% (Reading database ... 65% (Reading database ... 70% (Reading database ... 75% (Reading database ... 80% (Reading database ... 85% (Reading database ... 90% (Reading database ... 95% (Reading database ... 100% (Reading database ... 82008 files and directories currently installed.) 364s Preparing to unpack .../0-dns-root-data_2025080400build1_all.deb ... 364s Unpacking dns-root-data (2025080400build1) ... 364s Selecting previously unselected package libnss3-tools. 364s Preparing to unpack .../1-libnss3-tools_2%3a3.120-1_ppc64el.deb ... 364s Unpacking libnss3-tools (2:3.120-1) ... 364s Selecting previously unselected package libevent-pthreads-2.1-7t64:ppc64el. 364s Preparing to unpack .../2-libevent-pthreads-2.1-7t64_2.1.12-stable-10build1_ppc64el.deb ... 364s Unpacking libevent-pthreads-2.1-7t64:ppc64el (2.1.12-stable-10build1) ... 364s Selecting previously unselected package libldns3t64:ppc64el. 364s Preparing to unpack .../3-libldns3t64_1.8.4-2build1_ppc64el.deb ... 364s Unpacking libldns3t64:ppc64el (1.8.4-2build1) ... 364s Selecting previously unselected package libevent-2.1-7t64:ppc64el. 364s Preparing to unpack .../4-libevent-2.1-7t64_2.1.12-stable-10build1_ppc64el.deb ... 364s Unpacking libevent-2.1-7t64:ppc64el (2.1.12-stable-10build1) ... 364s Selecting previously unselected package libunbound8:ppc64el. 364s Preparing to unpack .../5-libunbound8_1.24.2-1ubuntu1_ppc64el.deb ... 364s Unpacking libunbound8:ppc64el (1.24.2-1ubuntu1) ... 364s Selecting previously unselected package libreswan. 364s Preparing to unpack .../6-libreswan_5.2-2.2ubuntu1_ppc64el.deb ... 364s Unpacking libreswan (5.2-2.2ubuntu1) ... 364s Setting up libldns3t64:ppc64el (1.8.4-2build1) ... 364s Setting up libevent-pthreads-2.1-7t64:ppc64el (2.1.12-stable-10build1) ... 364s Setting up libevent-2.1-7t64:ppc64el (2.1.12-stable-10build1) ... 364s Setting up dns-root-data (2025080400build1) ... 364s Setting up libunbound8:ppc64el (1.24.2-1ubuntu1) ... 364s Setting up libnss3-tools (2:3.120-1) ... 364s Setting up libreswan (5.2-2.2ubuntu1) ... 364s ipsec.service is a disabled or a static unit, not starting it. 364s Processing triggers for man-db (2.13.1-1) ... 366s Processing triggers for libc-bin (2.42-2ubuntu4) ... 388s autopkgtest [21:23:00]: test cavp: [----------------------- 388s Testing installed CAVP binary: /usr/libexec/ipsec/cavp 389s test: IKE v2 389s Reading from ikev2.fax 394s test: IKE v1 Digital Signature Authentication 394s Reading from ikev1_dsa.fax 396s test: IKE v1 Pre-shared Key Authentication 396s Reading from ikev1_psk.fax 399s /tmp/autopkgtest.Yb58EW/build.JII/src 399s autopkgtest [21:23:11]: test cavp: -----------------------] 400s cavp PASS 400s autopkgtest [21:23:12]: test cavp: - - - - - - - - - - results - - - - - - - - - - 401s autopkgtest [21:23:13]: @@@@@@@@@@@@@@@@@@@@ summary 401s opportunistic SKIP exit status 77 and marked as skippable 401s cryptocheck PASS 401s cavp PASS