0s autopkgtest [12:36:39]: starting date and time: 2026-02-03 12:36:39+0000 0s autopkgtest [12:36:39]: git checkout: 4b346b80 nova: make wait_reboot return success even when a no-op 0s autopkgtest [12:36:39]: host juju-7f2275-prod-proposed-migration-environment-2; command line: /home/ubuntu/autopkgtest/runner/autopkgtest --output-dir /tmp/autopkgtest-work.pkyso3by/out --timeout-copy=6000 --needs-internet=try --setup-commands /home/ubuntu/autopkgtest-cloud/worker-config-production/setup-canonical.sh --apt-pocket=proposed=src:pam --apt-upgrade libreswan --timeout-short=300 --timeout-copy=20000 --timeout-build=20000 --env=ADT_TEST_TRIGGERS=pam/1.7.0-5ubuntu3 -- ssh -s /home/ubuntu/autopkgtest/ssh-setup/nova -- --flavor autopkgtest-cpu2-ram4-disk20-s390x --security-groups autopkgtest-juju-7f2275-prod-proposed-migration-environment-2@sto01-s390x-5.secgroup --name adt-resolute-s390x-libreswan-20260203-123639-juju-7f2275-prod-proposed-migration-environment-2-a8335684-d09f-4816-8051-40c2e5222aae --image adt/ubuntu-resolute-s390x-server --keyname testbed-juju-7f2275-prod-proposed-migration-environment-2 --net-id=net_prod-autopkgtest-workers-s390x -e TERM=linux --mirror=http://ftpmaster.internal/ubuntu/ 3s Creating nova instance adt-resolute-s390x-libreswan-20260203-123639-juju-7f2275-prod-proposed-migration-environment-2-a8335684-d09f-4816-8051-40c2e5222aae from image adt/ubuntu-resolute-s390x-server-20260203.img (UUID 733879ca-10c9-4d0b-9d4a-492c78d47079)... 82s autopkgtest [12:38:01]: testbed dpkg architecture: s390x 83s autopkgtest [12:38:02]: testbed apt version: 3.1.14 83s autopkgtest [12:38:02]: @@@@@@@@@@@@@@@@@@@@ test bed setup 83s autopkgtest [12:38:02]: testbed release detected to be: None 85s autopkgtest [12:38:04]: updating testbed package index (apt update) 85s Get:1 http://ftpmaster.internal/ubuntu resolute-proposed InRelease [124 kB] 86s Hit:2 http://ftpmaster.internal/ubuntu resolute InRelease 86s Hit:3 http://ftpmaster.internal/ubuntu resolute-updates InRelease 86s Hit:4 http://ftpmaster.internal/ubuntu resolute-security InRelease 86s Get:5 http://ftpmaster.internal/ubuntu resolute-proposed/restricted Sources [5260 B] 86s Get:6 http://ftpmaster.internal/ubuntu resolute-proposed/main Sources [243 kB] 86s Get:7 http://ftpmaster.internal/ubuntu resolute-proposed/universe Sources [1317 kB] 86s Get:8 http://ftpmaster.internal/ubuntu resolute-proposed/multiverse Sources [27.9 kB] 86s Get:9 http://ftpmaster.internal/ubuntu resolute-proposed/main s390x Packages [278 kB] 86s Get:10 http://ftpmaster.internal/ubuntu resolute-proposed/universe s390x Packages [1063 kB] 86s Get:11 http://ftpmaster.internal/ubuntu resolute-proposed/multiverse s390x Packages [7048 B] 89s Fetched 3066 kB in 3s (1087 kB/s) 93s Reading package lists... 95s Hit:1 http://ftpmaster.internal/ubuntu resolute-proposed InRelease 95s Hit:2 http://ftpmaster.internal/ubuntu resolute InRelease 95s Hit:3 http://ftpmaster.internal/ubuntu resolute-updates InRelease 95s Hit:4 http://ftpmaster.internal/ubuntu resolute-security InRelease 100s Reading package lists... 100s Reading package lists... 102s Building dependency tree... 102s Reading state information... 103s Calculating upgrade... 103s The following packages will be upgraded: 103s libpam-modules libpam-modules-bin libpam-runtime libpam0g powermgmt-base 103s systemd-hwe-hwdb 104s 6 upgraded, 0 newly installed, 0 to remove and 0 not upgraded. 104s Need to get 480 kB of archives. 104s After this operation, 1024 B of additional disk space will be used. 104s Get:1 http://ftpmaster.internal/ubuntu resolute-proposed/main s390x libpam-runtime all 1.7.0-5ubuntu3 [149 kB] 104s Get:2 http://ftpmaster.internal/ubuntu resolute-proposed/main s390x libpam0g s390x 1.7.0-5ubuntu3 [71.0 kB] 104s Get:3 http://ftpmaster.internal/ubuntu resolute-proposed/main s390x libpam-modules-bin s390x 1.7.0-5ubuntu3 [49.1 kB] 104s Get:4 http://ftpmaster.internal/ubuntu resolute-proposed/main s390x libpam-modules s390x 1.7.0-5ubuntu3 [200 kB] 104s Get:5 http://ftpmaster.internal/ubuntu resolute/main s390x systemd-hwe-hwdb all 259.0.1 [3152 B] 104s Get:6 http://ftpmaster.internal/ubuntu resolute/main s390x powermgmt-base all 1.38ubuntu2 [7878 B] 105s dpkg-preconfigure: unable to re-open stdin: No such file or directory 105s Fetched 480 kB in 0s (1279 kB/s) 106s (Reading database ... (Reading database ... 5% (Reading database ... 10% (Reading database ... 15% (Reading database ... 20% (Reading database ... 25% (Reading database ... 30% (Reading database ... 35% (Reading database ... 40% (Reading database ... 45% (Reading database ... 50% (Reading database ... 55% (Reading database ... 60% (Reading database ... 65% (Reading database ... 70% (Reading database ... 75% (Reading database ... 80% (Reading database ... 85% (Reading database ... 90% (Reading database ... 95% (Reading database ... 100% (Reading database ... 61953 files and directories currently installed.) 106s Preparing to unpack .../libpam-runtime_1.7.0-5ubuntu3_all.deb ... 106s Unpacking libpam-runtime (1.7.0-5ubuntu3) over (1.7.0-5ubuntu2) ... 106s Setting up libpam-runtime (1.7.0-5ubuntu3) ... 107s (Reading database ... (Reading database ... 5% (Reading database ... 10% (Reading database ... 15% (Reading database ... 20% (Reading database ... 25% (Reading database ... 30% (Reading database ... 35% (Reading database ... 40% (Reading database ... 45% (Reading database ... 50% (Reading database ... 55% (Reading database ... 60% (Reading database ... 65% (Reading database ... 70% (Reading database ... 75% (Reading database ... 80% (Reading database ... 85% (Reading database ... 90% (Reading database ... 95% (Reading database ... 100% (Reading database ... 61953 files and directories currently installed.) 107s Preparing to unpack .../libpam0g_1.7.0-5ubuntu3_s390x.deb ... 108s Unpacking libpam0g:s390x (1.7.0-5ubuntu3) over (1.7.0-5ubuntu2) ... 108s Setting up libpam0g:s390x (1.7.0-5ubuntu3) ... 110s (Reading database ... (Reading database ... 5% (Reading database ... 10% (Reading database ... 15% (Reading database ... 20% (Reading database ... 25% (Reading database ... 30% (Reading database ... 35% (Reading database ... 40% (Reading database ... 45% (Reading database ... 50% (Reading database ... 55% (Reading database ... 60% (Reading database ... 65% (Reading database ... 70% (Reading database ... 75% (Reading database ... 80% (Reading database ... 85% (Reading database ... 90% (Reading database ... 95% (Reading database ... 100% (Reading database ... 61953 files and directories currently installed.) 110s Preparing to unpack .../libpam-modules-bin_1.7.0-5ubuntu3_s390x.deb ... 110s Unpacking libpam-modules-bin (1.7.0-5ubuntu3) over (1.7.0-5ubuntu2) ... 111s Setting up libpam-modules-bin (1.7.0-5ubuntu3) ... 112s pam_namespace.service is a disabled or a static unit not running, not starting it. 112s (Reading database ... (Reading database ... 5% (Reading database ... 10% (Reading database ... 15% (Reading database ... 20% (Reading database ... 25% (Reading database ... 30% (Reading database ... 35% (Reading database ... 40% (Reading database ... 45% (Reading database ... 50% (Reading database ... 55% (Reading database ... 60% (Reading database ... 65% (Reading database ... 70% (Reading database ... 75% (Reading database ... 80% (Reading database ... 85% (Reading database ... 90% (Reading database ... 95% (Reading database ... 100% (Reading database ... 61953 files and directories currently installed.) 112s Preparing to unpack .../libpam-modules_1.7.0-5ubuntu3_s390x.deb ... 113s Unpacking libpam-modules:s390x (1.7.0-5ubuntu3) over (1.7.0-5ubuntu2) ... 114s Setting up libpam-modules:s390x (1.7.0-5ubuntu3) ... 114s (Reading database ... (Reading database ... 5% (Reading database ... 10% (Reading database ... 15% (Reading database ... 20% (Reading database ... 25% (Reading database ... 30% (Reading database ... 35% (Reading database ... 40% (Reading database ... 45% (Reading database ... 50% (Reading database ... 55% (Reading database ... 60% (Reading database ... 65% (Reading database ... 70% (Reading database ... 75% (Reading database ... 80% (Reading database ... 85% (Reading database ... 90% (Reading database ... 95% (Reading database ... 100% (Reading database ... 61953 files and directories currently installed.) 114s Preparing to unpack .../systemd-hwe-hwdb_259.0.1_all.deb ... 114s Unpacking systemd-hwe-hwdb (259.0.1) over (257.7.1) ... 114s Preparing to unpack .../powermgmt-base_1.38ubuntu2_all.deb ... 114s Unpacking powermgmt-base (1.38ubuntu2) over (1.38ubuntu1) ... 115s Setting up powermgmt-base (1.38ubuntu2) ... 115s Setting up systemd-hwe-hwdb (259.0.1) ... 118s Processing triggers for man-db (2.13.1-1) ... 123s Processing triggers for udev (259-1ubuntu3) ... 126s Processing triggers for libc-bin (2.42-2ubuntu4) ... 127s autopkgtest [12:38:46]: upgrading testbed (apt dist-upgrade and autopurge) 128s Reading package lists... 129s Building dependency tree... 129s Reading state information... 129s Calculating upgrade... 130s 0 upgraded, 0 newly installed, 0 to remove and 0 not upgraded. 131s Reading package lists... 132s Building dependency tree... 132s Reading state information... 132s Solving dependencies... 133s 0 upgraded, 0 newly installed, 0 to remove and 0 not upgraded. 133s autopkgtest [12:38:52]: rebooting testbed after setup commands that affected boot 172s autopkgtest [12:39:31]: testbed running kernel: Linux 6.18.0-9-generic #9-Ubuntu SMP Mon Jan 12 15:39:23 UTC 2026 175s autopkgtest [12:39:34]: @@@@@@@@@@@@@@@@@@@@ apt-source libreswan 178s Get:1 http://ftpmaster.internal/ubuntu resolute/universe libreswan 5.2-2.2ubuntu1 (dsc) [2735 B] 178s Get:2 http://ftpmaster.internal/ubuntu resolute/universe libreswan 5.2-2.2ubuntu1 (tar) [4132 kB] 178s Get:3 http://ftpmaster.internal/ubuntu resolute/universe libreswan 5.2-2.2ubuntu1 (asc) [862 B] 178s Get:4 http://ftpmaster.internal/ubuntu resolute/universe libreswan 5.2-2.2ubuntu1 (diff) [16.7 kB] 178s gpgv: Signature made Thu Jul 31 14:30:12 2025 UTC 178s gpgv: using RSA key 25E3FF2D7F469DBE7D0D4E50AFCFEC8E669CE1C2 178s gpgv: Can't check signature: No public key 178s dpkg-source: warning: cannot verify inline signature for ./libreswan_5.2-2.2ubuntu1.dsc: no acceptable signature found 180s autopkgtest [12:39:39]: testing package libreswan version 5.2-2.2ubuntu1 180s autopkgtest [12:39:39]: build not needed 183s autopkgtest [12:39:42]: test opportunistic: preparing testbed 184s Reading package lists... 185s Building dependency tree... 185s Reading state information... 185s Solving dependencies... 185s The following NEW packages will be installed: 185s dns-root-data libevent-2.1-7t64 libevent-pthreads-2.1-7t64 libldns3t64 185s libnss3-tools libreswan libunbound8 185s 0 upgraded, 7 newly installed, 0 to remove and 0 not upgraded. 185s Need to get 2943 kB of archives. 185s After this operation, 11.8 MB of additional disk space will be used. 185s Get:1 http://ftpmaster.internal/ubuntu resolute/main s390x dns-root-data all 2025080400 [5908 B] 185s Get:2 http://ftpmaster.internal/ubuntu resolute/main s390x libnss3-tools s390x 2:3.120-1 [637 kB] 185s Get:3 http://ftpmaster.internal/ubuntu resolute/main s390x libevent-pthreads-2.1-7t64 s390x 2.1.12-stable-10build1 [8060 B] 185s Get:4 http://ftpmaster.internal/ubuntu resolute/universe s390x libldns3t64 s390x 1.8.4-2build1 [170 kB] 185s Get:5 http://ftpmaster.internal/ubuntu resolute/main s390x libevent-2.1-7t64 s390x 2.1.12-stable-10build1 [144 kB] 185s Get:6 http://ftpmaster.internal/ubuntu resolute/main s390x libunbound8 s390x 1.24.2-1ubuntu1 [464 kB] 185s Get:7 http://ftpmaster.internal/ubuntu resolute/universe s390x libreswan s390x 5.2-2.2ubuntu1 [1515 kB] 186s Fetched 2943 kB in 0s (11.1 MB/s) 186s Selecting previously unselected package dns-root-data. 188s (Reading database ... (Reading database ... 5% (Reading database ... 10% (Reading database ... 15% (Reading database ... 20% (Reading database ... 25% (Reading database ... 30% (Reading database ... 35% (Reading database ... 40% (Reading database ... 45% (Reading database ... 50% (Reading database ... 55% (Reading database ... 60% (Reading database ... 65% (Reading database ... 70% (Reading database ... 75% (Reading database ... 80% (Reading database ... 85% (Reading database ... 90% (Reading database ... 95% (Reading database ... 100% (Reading database ... 61954 files and directories currently installed.) 188s Preparing to unpack .../0-dns-root-data_2025080400_all.deb ... 188s Unpacking dns-root-data (2025080400) ... 188s Selecting previously unselected package libnss3-tools. 188s Preparing to unpack .../1-libnss3-tools_2%3a3.120-1_s390x.deb ... 188s Unpacking libnss3-tools (2:3.120-1) ... 188s Selecting previously unselected package libevent-pthreads-2.1-7t64:s390x. 188s Preparing to unpack .../2-libevent-pthreads-2.1-7t64_2.1.12-stable-10build1_s390x.deb ... 188s Unpacking libevent-pthreads-2.1-7t64:s390x (2.1.12-stable-10build1) ... 188s Selecting previously unselected package libldns3t64:s390x. 188s Preparing to unpack .../3-libldns3t64_1.8.4-2build1_s390x.deb ... 188s Unpacking libldns3t64:s390x (1.8.4-2build1) ... 188s Selecting previously unselected package libevent-2.1-7t64:s390x. 188s Preparing to unpack .../4-libevent-2.1-7t64_2.1.12-stable-10build1_s390x.deb ... 188s Unpacking libevent-2.1-7t64:s390x (2.1.12-stable-10build1) ... 188s Selecting previously unselected package libunbound8:s390x. 188s Preparing to unpack .../5-libunbound8_1.24.2-1ubuntu1_s390x.deb ... 188s Unpacking libunbound8:s390x (1.24.2-1ubuntu1) ... 188s Selecting previously unselected package libreswan. 188s Preparing to unpack .../6-libreswan_5.2-2.2ubuntu1_s390x.deb ... 188s Unpacking libreswan (5.2-2.2ubuntu1) ... 188s Setting up libldns3t64:s390x (1.8.4-2build1) ... 188s Setting up libevent-pthreads-2.1-7t64:s390x (2.1.12-stable-10build1) ... 188s Setting up libevent-2.1-7t64:s390x (2.1.12-stable-10build1) ... 188s Setting up dns-root-data (2025080400) ... 188s Setting up libunbound8:s390x (1.24.2-1ubuntu1) ... 188s Setting up libnss3-tools (2:3.120-1) ... 188s Setting up libreswan (5.2-2.2ubuntu1) ... 190s ipsec.service is a disabled or a static unit, not starting it. 190s Processing triggers for man-db (2.13.1-1) ... 195s Processing triggers for libc-bin (2.42-2ubuntu4) ... 196s autopkgtest [12:39:55]: test opportunistic: [----------------------- 196s ping: oe.libreswan.org: No address associated with hostname 196s autopkgtest [12:39:55]: test opportunistic: -----------------------] 197s opportunistic SKIP exit status 77 and marked as skippable 197s autopkgtest [12:39:56]: test opportunistic: - - - - - - - - - - results - - - - - - - - - - 197s autopkgtest [12:39:56]: test cryptocheck: preparing testbed 216s Creating nova instance adt-resolute-s390x-libreswan-20260203-123639-juju-7f2275-prod-proposed-migration-environment-2-a8335684-d09f-4816-8051-40c2e5222aae from image adt/ubuntu-resolute-s390x-server-20260203.img (UUID 733879ca-10c9-4d0b-9d4a-492c78d47079)... 256s autopkgtest [12:40:55]: testbed dpkg architecture: s390x 256s autopkgtest [12:40:55]: testbed apt version: 3.1.14 257s autopkgtest [12:40:56]: @@@@@@@@@@@@@@@@@@@@ test bed setup 257s autopkgtest [12:40:56]: testbed release detected to be: resolute 257s autopkgtest [12:40:56]: updating testbed package index (apt update) 257s Get:1 http://ftpmaster.internal/ubuntu resolute-proposed InRelease [124 kB] 258s Hit:2 http://ftpmaster.internal/ubuntu resolute InRelease 258s Hit:3 http://ftpmaster.internal/ubuntu resolute-updates InRelease 258s Hit:4 http://ftpmaster.internal/ubuntu resolute-security InRelease 258s Get:5 http://ftpmaster.internal/ubuntu resolute-proposed/multiverse Sources [27.9 kB] 258s Get:6 http://ftpmaster.internal/ubuntu resolute-proposed/main Sources [243 kB] 258s Get:7 http://ftpmaster.internal/ubuntu resolute-proposed/universe Sources [1317 kB] 258s Get:8 http://ftpmaster.internal/ubuntu resolute-proposed/restricted Sources [5260 B] 258s Get:9 http://ftpmaster.internal/ubuntu resolute-proposed/main s390x Packages [278 kB] 258s Get:10 http://ftpmaster.internal/ubuntu resolute-proposed/universe s390x Packages [1063 kB] 258s Get:11 http://ftpmaster.internal/ubuntu resolute-proposed/multiverse s390x Packages [7048 B] 258s Fetched 3066 kB in 1s (4165 kB/s) 259s Reading package lists... 260s Hit:1 http://ftpmaster.internal/ubuntu resolute-proposed InRelease 260s Hit:2 http://ftpmaster.internal/ubuntu resolute InRelease 260s Hit:3 http://ftpmaster.internal/ubuntu resolute-updates InRelease 260s Hit:4 http://ftpmaster.internal/ubuntu resolute-security InRelease 261s Reading package lists... 261s Reading package lists... 261s Building dependency tree... 261s Reading state information... 261s Calculating upgrade... 262s The following packages will be upgraded: 262s libpam-modules libpam-modules-bin libpam-runtime libpam0g powermgmt-base 262s systemd-hwe-hwdb 262s 6 upgraded, 0 newly installed, 0 to remove and 0 not upgraded. 262s Need to get 480 kB of archives. 262s After this operation, 1024 B of additional disk space will be used. 262s Get:1 http://ftpmaster.internal/ubuntu resolute-proposed/main s390x libpam-runtime all 1.7.0-5ubuntu3 [149 kB] 262s Get:2 http://ftpmaster.internal/ubuntu resolute-proposed/main s390x libpam0g s390x 1.7.0-5ubuntu3 [71.0 kB] 262s Get:3 http://ftpmaster.internal/ubuntu resolute-proposed/main s390x libpam-modules-bin s390x 1.7.0-5ubuntu3 [49.1 kB] 262s Get:4 http://ftpmaster.internal/ubuntu resolute-proposed/main s390x libpam-modules s390x 1.7.0-5ubuntu3 [200 kB] 262s Get:5 http://ftpmaster.internal/ubuntu resolute/main s390x systemd-hwe-hwdb all 259.0.1 [3152 B] 262s Get:6 http://ftpmaster.internal/ubuntu resolute/main s390x powermgmt-base all 1.38ubuntu2 [7878 B] 262s dpkg-preconfigure: unable to re-open stdin: No such file or directory 262s Fetched 480 kB in 0s (1507 kB/s) 262s (Reading database ... (Reading database ... 5% (Reading database ... 10% (Reading database ... 15% (Reading database ... 20% (Reading database ... 25% (Reading database ... 30% (Reading database ... 35% (Reading database ... 40% (Reading database ... 45% (Reading database ... 50% (Reading database ... 55% (Reading database ... 60% (Reading database ... 65% (Reading database ... 70% (Reading database ... 75% (Reading database ... 80% (Reading database ... 85% (Reading database ... 90% (Reading database ... 95% (Reading database ... 100% (Reading database ... 61953 files and directories currently installed.) 262s Preparing to unpack .../libpam-runtime_1.7.0-5ubuntu3_all.deb ... 262s Unpacking libpam-runtime (1.7.0-5ubuntu3) over (1.7.0-5ubuntu2) ... 262s Setting up libpam-runtime (1.7.0-5ubuntu3) ... 263s (Reading database ... (Reading database ... 5% (Reading database ... 10% (Reading database ... 15% (Reading database ... 20% (Reading database ... 25% (Reading database ... 30% (Reading database ... 35% (Reading database ... 40% (Reading database ... 45% (Reading database ... 50% (Reading database ... 55% (Reading database ... 60% (Reading database ... 65% (Reading database ... 70% (Reading database ... 75% (Reading database ... 80% (Reading database ... 85% (Reading database ... 90% (Reading database ... 95% (Reading database ... 100% (Reading database ... 61953 files and directories currently installed.) 263s Preparing to unpack .../libpam0g_1.7.0-5ubuntu3_s390x.deb ... 263s Unpacking libpam0g:s390x (1.7.0-5ubuntu3) over (1.7.0-5ubuntu2) ... 263s Setting up libpam0g:s390x (1.7.0-5ubuntu3) ... 263s (Reading database ... (Reading database ... 5% (Reading database ... 10% (Reading database ... 15% (Reading database ... 20% (Reading database ... 25% (Reading database ... 30% (Reading database ... 35% (Reading database ... 40% (Reading database ... 45% (Reading database ... 50% (Reading database ... 55% (Reading database ... 60% (Reading database ... 65% (Reading database ... 70% (Reading database ... 75% (Reading database ... 80% (Reading database ... 85% (Reading database ... 90% (Reading database ... 95% (Reading database ... 100% (Reading database ... 61953 files and directories currently installed.) 263s Preparing to unpack .../libpam-modules-bin_1.7.0-5ubuntu3_s390x.deb ... 263s Unpacking libpam-modules-bin (1.7.0-5ubuntu3) over (1.7.0-5ubuntu2) ... 263s Setting up libpam-modules-bin (1.7.0-5ubuntu3) ... 263s pam_namespace.service is a disabled or a static unit not running, not starting it. 263s (Reading database ... (Reading database ... 5% (Reading database ... 10% (Reading database ... 15% (Reading database ... 20% (Reading database ... 25% (Reading database ... 30% (Reading database ... 35% (Reading database ... 40% (Reading database ... 45% (Reading database ... 50% (Reading database ... 55% (Reading database ... 60% (Reading database ... 65% (Reading database ... 70% (Reading database ... 75% (Reading database ... 80% (Reading database ... 85% (Reading database ... 90% (Reading database ... 95% (Reading database ... 100% (Reading database ... 61953 files and directories currently installed.) 263s Preparing to unpack .../libpam-modules_1.7.0-5ubuntu3_s390x.deb ... 263s Unpacking libpam-modules:s390x (1.7.0-5ubuntu3) over (1.7.0-5ubuntu2) ... 263s Setting up libpam-modules:s390x (1.7.0-5ubuntu3) ... 263s (Reading database ... (Reading database ... 5% (Reading database ... 10% (Reading database ... 15% (Reading database ... 20% (Reading database ... 25% (Reading database ... 30% (Reading database ... 35% (Reading database ... 40% (Reading database ... 45% (Reading database ... 50% (Reading database ... 55% (Reading database ... 60% (Reading database ... 65% (Reading database ... 70% (Reading database ... 75% (Reading database ... 80% (Reading database ... 85% (Reading database ... 90% (Reading database ... 95% (Reading database ... 100% (Reading database ... 61953 files and directories currently installed.) 263s Preparing to unpack .../systemd-hwe-hwdb_259.0.1_all.deb ... 263s Unpacking systemd-hwe-hwdb (259.0.1) over (257.7.1) ... 263s Preparing to unpack .../powermgmt-base_1.38ubuntu2_all.deb ... 263s Unpacking powermgmt-base (1.38ubuntu2) over (1.38ubuntu1) ... 263s Setting up powermgmt-base (1.38ubuntu2) ... 263s Setting up systemd-hwe-hwdb (259.0.1) ... 265s Processing triggers for man-db (2.13.1-1) ... 267s Processing triggers for udev (259-1ubuntu3) ... 267s Processing triggers for libc-bin (2.42-2ubuntu4) ... 268s autopkgtest [12:41:07]: upgrading testbed (apt dist-upgrade and autopurge) 268s Reading package lists... 268s Building dependency tree... 268s Reading state information... 268s Calculating upgrade... 269s 0 upgraded, 0 newly installed, 0 to remove and 0 not upgraded. 269s Reading package lists... 269s Building dependency tree... 269s Reading state information... 269s Solving dependencies... 270s 0 upgraded, 0 newly installed, 0 to remove and 0 not upgraded. 270s autopkgtest [12:41:09]: rebooting testbed after setup commands that affected boot 298s Reading package lists... 298s Building dependency tree... 298s Reading state information... 298s Solving dependencies... 299s The following NEW packages will be installed: 299s dns-root-data libevent-2.1-7t64 libevent-pthreads-2.1-7t64 libldns3t64 299s libnss3-tools libreswan libunbound8 299s 0 upgraded, 7 newly installed, 0 to remove and 0 not upgraded. 299s Need to get 2943 kB of archives. 299s After this operation, 11.8 MB of additional disk space will be used. 299s Get:1 http://ftpmaster.internal/ubuntu resolute/main s390x dns-root-data all 2025080400 [5908 B] 299s Get:2 http://ftpmaster.internal/ubuntu resolute/main s390x libnss3-tools s390x 2:3.120-1 [637 kB] 299s Get:3 http://ftpmaster.internal/ubuntu resolute/main s390x libevent-pthreads-2.1-7t64 s390x 2.1.12-stable-10build1 [8060 B] 299s Get:4 http://ftpmaster.internal/ubuntu resolute/universe s390x libldns3t64 s390x 1.8.4-2build1 [170 kB] 299s Get:5 http://ftpmaster.internal/ubuntu resolute/main s390x libevent-2.1-7t64 s390x 2.1.12-stable-10build1 [144 kB] 299s Get:6 http://ftpmaster.internal/ubuntu resolute/main s390x libunbound8 s390x 1.24.2-1ubuntu1 [464 kB] 299s Get:7 http://ftpmaster.internal/ubuntu resolute/universe s390x libreswan s390x 5.2-2.2ubuntu1 [1515 kB] 299s Fetched 2943 kB in 0s (6898 kB/s) 299s Selecting previously unselected package dns-root-data. 299s (Reading database ... (Reading database ... 5% (Reading database ... 10% (Reading database ... 15% (Reading database ... 20% (Reading database ... 25% (Reading database ... 30% (Reading database ... 35% (Reading database ... 40% (Reading database ... 45% (Reading database ... 50% (Reading database ... 55% (Reading database ... 60% (Reading database ... 65% (Reading database ... 70% (Reading database ... 75% (Reading database ... 80% (Reading database ... 85% (Reading database ... 90% (Reading database ... 95% (Reading database ... 100% (Reading database ... 61954 files and directories currently installed.) 299s Preparing to unpack .../0-dns-root-data_2025080400_all.deb ... 299s Unpacking dns-root-data (2025080400) ... 299s Selecting previously unselected package libnss3-tools. 299s Preparing to unpack .../1-libnss3-tools_2%3a3.120-1_s390x.deb ... 299s Unpacking libnss3-tools (2:3.120-1) ... 299s Selecting previously unselected package libevent-pthreads-2.1-7t64:s390x. 299s Preparing to unpack .../2-libevent-pthreads-2.1-7t64_2.1.12-stable-10build1_s390x.deb ... 299s Unpacking libevent-pthreads-2.1-7t64:s390x (2.1.12-stable-10build1) ... 299s Selecting previously unselected package libldns3t64:s390x. 299s Preparing to unpack .../3-libldns3t64_1.8.4-2build1_s390x.deb ... 299s Unpacking libldns3t64:s390x (1.8.4-2build1) ... 299s Selecting previously unselected package libevent-2.1-7t64:s390x. 299s Preparing to unpack .../4-libevent-2.1-7t64_2.1.12-stable-10build1_s390x.deb ... 299s Unpacking libevent-2.1-7t64:s390x (2.1.12-stable-10build1) ... 299s Selecting previously unselected package libunbound8:s390x. 299s Preparing to unpack .../5-libunbound8_1.24.2-1ubuntu1_s390x.deb ... 299s Unpacking libunbound8:s390x (1.24.2-1ubuntu1) ... 299s Selecting previously unselected package libreswan. 299s Preparing to unpack .../6-libreswan_5.2-2.2ubuntu1_s390x.deb ... 299s Unpacking libreswan (5.2-2.2ubuntu1) ... 300s Setting up libldns3t64:s390x (1.8.4-2build1) ... 300s Setting up libevent-pthreads-2.1-7t64:s390x (2.1.12-stable-10build1) ... 300s Setting up libevent-2.1-7t64:s390x (2.1.12-stable-10build1) ... 300s Setting up dns-root-data (2025080400) ... 300s Setting up libunbound8:s390x (1.24.2-1ubuntu1) ... 300s Setting up libnss3-tools (2:3.120-1) ... 300s Setting up libreswan (5.2-2.2ubuntu1) ... 300s ipsec.service is a disabled or a static unit, not starting it. 300s Processing triggers for man-db (2.13.1-1) ... 301s Processing triggers for libc-bin (2.42-2ubuntu4) ... 311s autopkgtest [12:41:50]: test cryptocheck: [----------------------- 311s Testing installed binary: /usr/libexec/ipsec/algparse 311s Testing installed binary: /usr/libexec/ipsec/pluto 311s testing -tp 311s ipsec algparse: Encryption algorithms: 311s ipsec algparse: AES_CCM_16 {256,192,*128} IKEv1: ESP IKEv2: ESP FIPS aes_ccm, aes_ccm_c 311s ipsec algparse: AES_CCM_12 {256,192,*128} IKEv1: ESP IKEv2: ESP FIPS aes_ccm_b 311s ipsec algparse: AES_CCM_8 {256,192,*128} IKEv1: ESP IKEv2: ESP FIPS aes_ccm_a 311s ipsec algparse: 3DES_CBC [*192] IKEv1: IKE ESP IKEv2: IKE ESP FIPS NSS(CBC) 3des 311s ipsec algparse: CAMELLIA_CTR {256,192,*128} IKEv1: ESP IKEv2: ESP 311s ipsec algparse: CAMELLIA_CBC {256,192,*128} IKEv1: IKE ESP IKEv2: IKE ESP NSS(CBC) camellia 311s ipsec algparse: AES_GCM_16 {256,192,*128} IKEv1: ESP IKEv2: IKE ESP FIPS NSS(AEAD) aes_gcm, aes_gcm_c 311s ipsec algparse: AES_GCM_12 {256,192,*128} IKEv1: ESP IKEv2: IKE ESP FIPS NSS(AEAD) aes_gcm_b 311s ipsec algparse: AES_GCM_8 {256,192,*128} IKEv1: ESP IKEv2: IKE ESP FIPS NSS(AEAD) aes_gcm_a 311s ipsec algparse: AES_CTR {256,192,*128} IKEv1: IKE ESP IKEv2: IKE ESP FIPS NSS(CTR) aesctr 311s ipsec algparse: AES_CBC {256,192,*128} IKEv1: IKE ESP IKEv2: IKE ESP FIPS NSS(CBC) aes 311s ipsec algparse: NULL_AUTH_AES_GMAC {256,192,*128} IKEv1: ESP IKEv2: ESP FIPS aes_gmac 311s ipsec algparse: NULL [] IKEv1: ESP IKEv2: ESP NULL 311s ipsec algparse: CHACHA20_POLY1305 [*256] IKEv1: IKEv2: IKE ESP NSS(AEAD) chacha20poly1305 311s ipsec algparse: Hash algorithms: 311s ipsec algparse: MD5 IKEv1: IKE IKEv2: NSS 311s ipsec algparse: SHA1 IKEv1: IKE IKEv2: IKE FIPS NSS sha 311s ipsec algparse: SHA2_256 IKEv1: IKE IKEv2: IKE FIPS NSS sha2, sha256 311s ipsec algparse: SHA2_384 IKEv1: IKE IKEv2: IKE FIPS NSS sha384 311s ipsec algparse: SHA2_512 IKEv1: IKE IKEv2: IKE FIPS NSS sha512 311s ipsec algparse: IDENTITY IKEv1: IKEv2: FIPS 311s ipsec algparse: PRF algorithms: 311s ipsec algparse: HMAC_MD5 IKEv1: IKE IKEv2: IKE NSS md5 311s ipsec algparse: HMAC_SHA1 IKEv1: IKE IKEv2: IKE FIPS NSS sha, sha1 311s ipsec algparse: HMAC_SHA2_256 IKEv1: IKE IKEv2: IKE FIPS NSS sha2, sha256, sha2_256 311s ipsec algparse: HMAC_SHA2_384 IKEv1: IKE IKEv2: IKE FIPS NSS sha384, sha2_384 311s ipsec algparse: HMAC_SHA2_512 IKEv1: IKE IKEv2: IKE FIPS NSS sha512, sha2_512 311s ipsec algparse: AES_XCBC IKEv1: IKEv2: IKE native(XCBC) aes128_xcbc 311s ipsec algparse: Integrity algorithms: 311s ipsec algparse: HMAC_MD5_96 IKEv1: IKE ESP AH IKEv2: IKE ESP AH NSS md5, hmac_md5 311s ipsec algparse: HMAC_SHA1_96 IKEv1: IKE ESP AH IKEv2: IKE ESP AH FIPS NSS sha, sha1, sha1_96, hmac_sha1 311s ipsec algparse: HMAC_SHA2_512_256 IKEv1: IKE ESP AH IKEv2: IKE ESP AH FIPS NSS sha512, sha2_512, sha2_512_256, hmac_sha2_512 311s ipsec algparse: HMAC_SHA2_384_192 IKEv1: IKE ESP AH IKEv2: IKE ESP AH FIPS NSS sha384, sha2_384, sha2_384_192, hmac_sha2_384 311s ipsec algparse: HMAC_SHA2_256_128 IKEv1: IKE ESP AH IKEv2: IKE ESP AH FIPS NSS sha2, sha256, sha2_256, sha2_256_128, hmac_sha2_256 311s ipsec algparse: HMAC_SHA2_256_TRUNCBUG IKEv1: ESP AH IKEv2: AH 311s ipsec algparse: AES_XCBC_96 IKEv1: ESP AH IKEv2: IKE ESP AH native(XCBC) aes_xcbc, aes128_xcbc, aes128_xcbc_96 311s ipsec algparse: AES_CMAC_96 IKEv1: ESP AH IKEv2: ESP AH FIPS aes_cmac 311s ipsec algparse: NONE IKEv1: ESP IKEv2: IKE ESP FIPS null 311s ipsec algparse: DH algorithms: 311s ipsec algparse: NONE IKEv1: IKEv2: IKE ESP AH FIPS NSS(MODP) null, dh0 311s ipsec algparse: MODP1536 IKEv1: IKE ESP AH IKEv2: IKE ESP AH NSS(MODP) dh5 311s ipsec algparse: MODP2048 IKEv1: IKE ESP AH IKEv2: IKE ESP AH FIPS NSS(MODP) dh14 311s ipsec algparse: MODP3072 IKEv1: IKE ESP AH IKEv2: IKE ESP AH FIPS NSS(MODP) dh15 311s ipsec algparse: MODP4096 IKEv1: IKE ESP AH IKEv2: IKE ESP AH FIPS NSS(MODP) dh16 311s ipsec algparse: MODP6144 IKEv1: IKE ESP AH IKEv2: IKE ESP AH FIPS NSS(MODP) dh17 311s ipsec algparse: MODP8192 IKEv1: IKE ESP AH IKEv2: IKE ESP AH FIPS NSS(MODP) dh18 311s ipsec algparse: DH19 IKEv1: IKE IKEv2: IKE ESP AH FIPS NSS(ECP) ecp_256, ecp256 311s ipsec algparse: DH20 IKEv1: IKE IKEv2: IKE ESP AH FIPS NSS(ECP) ecp_384, ecp384 311s ipsec algparse: DH21 IKEv1: IKE IKEv2: IKE ESP AH FIPS NSS(ECP) ecp_521, ecp521 311s ipsec algparse: DH31 IKEv1: IKE IKEv2: IKE ESP AH NSS(ECP) curve25519 311s ipsec algparse: IPCOMP algorithms: 311s ipsec algparse: DEFLATE IKEv1: ESP AH IKEv2: ESP AH FIPS 311s ipsec algparse: LZS IKEv1: IKEv2: ESP AH FIPS 311s ipsec algparse: LZJH IKEv1: IKEv2: ESP AH FIPS 311s | parsing 'AES_GCM_16_256,AES_GCM_16_128,CHACHA20_POLY1305,AES_CBC_256,AES_CBC_128' for ESP 311s | proposal: 'AES_GCM_16_256' 311s | token: '' '' "AES_GCM_16_256" '' 311s | token: '' "AES_GCM_16_256" '' '' 311s | ike_alg_byname() failed: ESP encryption algorithm 'AES_GCM_16_256' is not recognized 311s | token: '' '' '' 311s | appending ESP encryption algorithm AES_GCM_16[_256] 311s | appending ESP integrity algorithm NONE[_0] 311s | proposal: 'AES_GCM_16_128' 311s | token: '' '' "AES_GCM_16_128" '' 311s | token: '' "AES_GCM_16_128" '' '' 311s | ike_alg_byname() failed: ESP encryption algorithm 'AES_GCM_16_128' is not recognized 311s | token: '' '' '' 311s | appending ESP encryption algorithm AES_GCM_16[_128] 311s | appending ESP integrity algorithm NONE[_0] 311s | proposal: 'CHACHA20_POLY1305' 311s | token: '' '' "CHACHA20_POLY1305" '' 311s | token: '' "CHACHA20_POLY1305" '' '' 311s | token: '' '' '' 311s | appending ESP encryption algorithm CHACHA20_POLY1305[_0] 311s | appending ESP integrity algorithm NONE[_0] 311s | proposal: 'AES_CBC_256' 311s | token: '' '' "AES_CBC_256" '' 311s | token: '' "AES_CBC_256" '' '' 311s | ike_alg_byname() failed: ESP encryption algorithm 'AES_CBC_256' is not recognized 311s | token: '' '' '' 311s | appending ESP encryption algorithm AES_CBC[_256] 311s | appending ESP integrity algorithm HMAC_SHA2_512_256[_0] 311s | appending ESP integrity algorithm HMAC_SHA2_256_128[_0] 311s | proposal: 'AES_CBC_128' 311s | token: '' '' "AES_CBC_128" '' 311s | token: '' "AES_CBC_128" '' '' 311s | ike_alg_byname() failed: ESP encryption algorithm 'AES_CBC_128' is not recognized 311s | token: '' '' '' 311s | appending ESP encryption algorithm AES_CBC[_128] 311s | appending ESP integrity algorithm HMAC_SHA2_512_256[_0] 311s | appending ESP integrity algorithm HMAC_SHA2_256_128[_0] 311s | parsing '' for ESP 311s | parsing 'aes' for ESP 311s | proposal: 'aes' 311s | token: '' '' "aes" '' 311s | token: '' "aes" '' '' 311s | token: '' '' '' 311s | appending ESP encryption algorithm AES_CBC[_0] 311s | appending ESP integrity algorithm HMAC_SHA2_512_256[_0] 311s | appending ESP integrity algorithm HMAC_SHA2_256_128[_0] 311s | parsing 'aes;modp2048' for ESP 311s | proposal: 'aes;modp2048' 311s | token: '' '' "aes" ';' 311s | token: '' "aes" ';' "modp2048" '' 311s | token: ';' "modp2048" '' '' 311s | appending ESP encryption algorithm AES_CBC[_0] 311s | parsing dh: 311s | appending ESP DH algorithm MODP2048[_0] 311s | token: '' '' '' 311s | appending ESP integrity algorithm HMAC_SHA2_512_256[_0] 311s | appending ESP integrity algorithm HMAC_SHA2_256_128[_0] 311s ipsec algparse: ignoring ESP DH algorithm MODP2048 as PFS policy is disabled 311s | parsing 'aes-sha1' for ESP 311s | proposal: 'aes-sha1' 311s | token: '' '' "aes" '-' 311s | token: '' "aes" '-' "sha1" '' 311s | token: '-' "sha1" '' '' 311s | appending ESP encryption algorithm AES_CBC[_0] 311s | parsing integ: 311s | appending ESP integrity algorithm HMAC_SHA1_96[_0] 311s | token: '' '' '' 311s | parsing 'aes-sha1' for ESP 311s | proposal: 'aes-sha1' 311s | token: '' '' "aes" '-' 311s | token: '' "aes" '-' "sha1" '' 311s | token: '-' "sha1" '' '' 311s | appending ESP encryption algorithm AES_CBC[_0] 311s | parsing integ: 311s | appending ESP integrity algorithm HMAC_SHA1_96[_0] 311s | token: '' '' '' 311s | parsing 'aes-sha1-modp2048' for ESP 311s | proposal: 'aes-sha1-modp2048' 311s | token: '' '' "aes" '-' 311s | token: '' "aes" '-' "sha1" '-' 311s | token: '-' "sha1" '-' "modp2048" '' 311s | appending ESP encryption algorithm AES_CBC[_0] 311s | parsing integ: 311s | appending ESP integrity algorithm HMAC_SHA1_96[_0] 311s | token: '-' "modp2048" '' '' 311s | parsing dh: 311s | appending ESP DH algorithm MODP2048[_0] 311s | token: '' '' '' 311s ipsec algparse: ignoring ESP DH algorithm MODP2048 as PFS policy is disabled 311s | parsing 'aes-128-sha1' for ESP 311s | proposal: 'aes-128-sha1' 311s | token: '' '' "aes" '-' 311s | token: '' "aes" '-' "128" '-' 311s | token: '-' "128" '-' "sha1" '' 311s | token: '-' "sha1" '' '' 311s | appending ESP encryption algorithm AES_CBC[_128] 311s | parsing integ: 311s | appending ESP integrity algorithm HMAC_SHA1_96[_0] 311s | token: '' '' '' 311s | parsing 'aes-128-sha1' for ESP 311s | proposal: 'aes-128-sha1' 311s | token: '' '' "aes" '-' 311s | token: '' "aes" '-' "128" '-' 311s | token: '-' "128" '-' "sha1" '' 311s | token: '-' "sha1" '' '' 311s | appending ESP encryption algorithm AES_CBC[_128] 311s | parsing integ: 311s | appending ESP integrity algorithm HMAC_SHA1_96[_0] 311s | token: '' '' '' 311s | parsing 'aes-128-sha1-modp2048' for ESP 311s | proposal: 'aes-128-sha1-modp2048' 311s | token: '' '' "aes" '-' 311s | token: '' "aes" '-' "128" '-' 311s | token: '-' "128" '-' "sha1" '-' 311s | token: '-' "sha1" '-' "modp2048" '' 311s | appending ESP encryption algorithm AES_CBC[_128] 311s | parsing integ: 311s | appending ESP integrity algorithm HMAC_SHA1_96[_0] 311s | token: '-' "modp2048" '' '' 311s | parsing dh: 311s | appending ESP DH algorithm MODP2048[_0] 311s | token: '' '' '' 311s ipsec algparse: ignoring ESP DH algorithm MODP2048 as PFS policy is disabled 311s | parsing 'aes-128' for ESP 311s | proposal: 'aes-128' 311s | token: '' '' "aes" '-' 311s | token: '' "aes" '-' "128" '' 311s | token: '-' "128" '' '' 311s | token: '' '' '' 311s | appending ESP encryption algorithm AES_CBC[_128] 311s | appending ESP integrity algorithm HMAC_SHA2_512_256[_0] 311s | appending ESP integrity algorithm HMAC_SHA2_256_128[_0] 311s | parsing 'aes_gcm_a-128-null' for ESP 311s | proposal: 'aes_gcm_a-128-null' 311s | token: '' '' "aes_gcm_a" '-' 311s | token: '' "aes_gcm_a" '-' "128" '-' 311s | token: '-' "128" '-' "null" '' 311s | token: '-' "null" '' '' 311s | appending ESP encryption algorithm AES_GCM_8[_128] 311s | parsing integ: 311s | appending ESP integrity algorithm NONE[_0] 311s | token: '' '' '' 311s | parsing '3des-sha1;modp1024' for ESP 311s | proposal: '3des-sha1;modp1024' 311s | token: '' '' "3des" '-' 311s | token: '' "3des" '-' "sha1" ';' 311s | token: '-' "sha1" ';' "modp1024" '' 311s | appending ESP encryption algorithm 3DES_CBC[_0] 311s | parsing integ: 311s | appending ESP integrity algorithm HMAC_SHA1_96[_0] 311s | token: ';' "modp1024" '' '' 311s | parsing dh: 311s | ike_alg_byname() failed: ESP DH algorithm 'modp1024' is not supported 311s | lookup for DH algorithm 'modp1024' failed 311s | ... failed 'ESP DH algorithm 'modp1024' is not supported' 311s | parsing '3des-sha1;modp1536' for ESP 311s | proposal: '3des-sha1;modp1536' 311s | token: '' '' "3des" '-' 311s | token: '' "3des" '-' "sha1" ';' 311s | token: '-' "sha1" ';' "modp1536" '' 311s | appending ESP encryption algorithm 3DES_CBC[_0] 311s | parsing integ: 311s | appending ESP integrity algorithm HMAC_SHA1_96[_0] 311s | token: ';' "modp1536" '' '' 311s | parsing dh: 311s | appending ESP DH algorithm MODP1536[_0] 311s | token: '' '' '' 311s ipsec algparse: ignoring ESP DH algorithm MODP1536 as PFS policy is disabled 311s | parsing '3des-sha1;modp2048' for ESP 311s | proposal: '3des-sha1;modp2048' 311s | token: '' '' "3des" '-' 311s | token: '' "3des" '-' "sha1" ';' 311s | token: '-' "sha1" ';' "modp2048" '' 311s | appending ESP encryption algorithm 3DES_CBC[_0] 311s | parsing integ: 311s | appending ESP integrity algorithm HMAC_SHA1_96[_0] 311s | token: ';' "modp2048" '' '' 311s | parsing dh: 311s | appending ESP DH algorithm MODP2048[_0] 311s | token: '' '' '' 311s ipsec algparse: ignoring ESP DH algorithm MODP2048 as PFS policy is disabled 311s | parsing '3des-sha1;dh21' for ESP 311s | proposal: '3des-sha1;dh21' 311s | token: '' '' "3des" '-' 311s | token: '' "3des" '-' "sha1" ';' 311s | token: '-' "sha1" ';' "dh21" '' 311s | appending ESP encryption algorithm 3DES_CBC[_0] 311s | parsing integ: 311s | appending ESP integrity algorithm HMAC_SHA1_96[_0] 311s | token: ';' "dh21" '' '' 311s | parsing dh: 311s | appending ESP DH algorithm DH21[_0] 311s | token: '' '' '' 311s ipsec algparse: ignoring ESP DH algorithm DH21 as PFS policy is disabled 311s | parsing '3des-sha1;ecp_521' for ESP 311s | proposal: '3des-sha1;ecp_521' 311s | token: '' '' "3des" '-' 311s | token: '' "3des" '-' "sha1" ';' 311s | token: '-' "sha1" ';' "ecp_521" '' 311s | appending ESP encryption algorithm 3DES_CBC[_0] 311s | parsing integ: 311s | appending ESP integrity algorithm HMAC_SHA1_96[_0] 311s | token: ';' "ecp_521" '' '' 311s | parsing dh: 311s | appending ESP DH algorithm DH21[_0] 311s | token: '' '' '' 311s ipsec algparse: ignoring ESP DH algorithm DH21 as PFS policy is disabled 311s | parsing '3des-sha1;dh23' for ESP 311s | proposal: '3des-sha1;dh23' 311s | token: '' '' "3des" '-' 311s | token: '' "3des" '-' "sha1" ';' 311s | token: '-' "sha1" ';' "dh23" '' 311s | appending ESP encryption algorithm 3DES_CBC[_0] 311s | parsing integ: 311s | appending ESP integrity algorithm HMAC_SHA1_96[_0] 311s | token: ';' "dh23" '' '' 311s | parsing dh: 311s | ike_alg_byname() failed: ESP DH algorithm 'dh23' is not supported 311s | lookup for DH algorithm 'dh23' failed 311s | ... failed 'ESP DH algorithm 'dh23' is not supported' 311s | parsing '3des-sha1;dh24' for ESP 311s | proposal: '3des-sha1;dh24' 311s | token: '' '' "3des" '-' 311s | token: '' "3des" '-' "sha1" ';' 311s | token: '-' "sha1" ';' "dh24" '' 311s | appending ESP encryption algorithm 3DES_CBC[_0] 311s | parsing integ: 311s | appending ESP integrity algorithm HMAC_SHA1_96[_0] 311s | token: ';' "dh24" '' '' 311s | parsing dh: 311s | ike_alg_byname() failed: ESP DH algorithm 'dh24' is not supported 311s | lookup for DH algorithm 'dh24' failed 311s | ... failed 'ESP DH algorithm 'dh24' is not supported' 311s | parsing '3des-sha1' for ESP 311s | proposal: '3des-sha1' 311s | token: '' '' "3des" '-' 311s | token: '' "3des" '-' "sha1" '' 311s | token: '-' "sha1" '' '' 311s | appending ESP encryption algorithm 3DES_CBC[_0] 311s | parsing integ: 311s | appending ESP integrity algorithm HMAC_SHA1_96[_0] 311s | token: '' '' '' 311s | parsing 'null-sha1' for ESP 311s | proposal: 'null-sha1' 311s | token: '' '' "null" '-' 311s | token: '' "null" '-' "sha1" '' 311s | token: '-' "sha1" '' '' 311s | appending ESP encryption algorithm NULL[_0] 311s | parsing integ: 311s | appending ESP integrity algorithm HMAC_SHA1_96[_0] 311s | token: '' '' '' 311s | parsing 'aes_cbc' for ESP 311s | proposal: 'aes_cbc' 311s | token: '' '' "aes_cbc" '' 311s | token: '' "aes_cbc" '' '' 311s | token: '' '' '' 311s | appending ESP encryption algorithm AES_CBC[_0] 311s | appending ESP integrity algorithm HMAC_SHA2_512_256[_0] 311s | appending ESP integrity algorithm HMAC_SHA2_256_128[_0] 311s | parsing 'aes-sha' for ESP 311s | proposal: 'aes-sha' 311s | token: '' '' "aes" '-' 311s | token: '' "aes" '-' "sha" '' 311s | token: '-' "sha" '' '' 311s | appending ESP encryption algorithm AES_CBC[_0] 311s | parsing integ: 311s | appending ESP integrity algorithm HMAC_SHA1_96[_0] 311s | token: '' '' '' 311s | parsing 'aes-sha1' for ESP 311s | proposal: 'aes-sha1' 311s | token: '' '' "aes" '-' 311s | token: '' "aes" '-' "sha1" '' 311s | token: '-' "sha1" '' '' 311s | appending ESP encryption algorithm AES_CBC[_0] 311s | parsing integ: 311s | appending ESP integrity algorithm HMAC_SHA1_96[_0] 311s | token: '' '' '' 311s | parsing 'aes128-sha1' for ESP 311s | proposal: 'aes128-sha1' 311s | token: '' '' "aes128" '-' 311s | token: '' "aes128" '-' "sha1" '' 311s | ike_alg_byname() failed: ESP encryption algorithm 'aes128' is not recognized 311s | token: '-' "sha1" '' '' 311s | appending ESP encryption algorithm AES_CBC[_128] 311s | parsing integ: 311s | appending ESP integrity algorithm HMAC_SHA1_96[_0] 311s | token: '' '' '' 311s | parsing 'aes-sha2' for ESP 311s | proposal: 'aes-sha2' 311s | token: '' '' "aes" '-' 311s | token: '' "aes" '-' "sha2" '' 311s | token: '-' "sha2" '' '' 311s | appending ESP encryption algorithm AES_CBC[_0] 311s | parsing integ: 311s | appending ESP integrity algorithm HMAC_SHA2_256_128[_0] 311s | token: '' '' '' 311s | parsing 'aes-sha256' for ESP 311s | proposal: 'aes-sha256' 311s | token: '' '' "aes" '-' 311s | token: '' "aes" '-' "sha256" '' 311s | token: '-' "sha256" '' '' 311s | appending ESP encryption algorithm AES_CBC[_0] 311s | parsing integ: 311s | appending ESP integrity algorithm HMAC_SHA2_256_128[_0] 311s | token: '' '' '' 311s | parsing 'aes-sha384' for ESP 311s | proposal: 'aes-sha384' 311s | token: '' '' "aes" '-' 311s | token: '' "aes" '-' "sha384" '' 311s | token: '-' "sha384" '' '' 311s | appending ESP encryption algorithm AES_CBC[_0] 311s | parsing integ: 311s | appending ESP integrity algorithm HMAC_SHA2_384_192[_0] 311s | token: '' '' '' 311s | parsing 'aes-sha512' for ESP 311s | proposal: 'aes-sha512' 311s | token: '' '' "aes" '-' 311s | token: '' "aes" '-' "sha512" '' 311s | token: '-' "sha512" '' '' 311s | appending ESP encryption algorithm AES_CBC[_0] 311s | parsing integ: 311s | appending ESP integrity algorithm HMAC_SHA2_512_256[_0] 311s | token: '' '' '' 311s | parsing 'aes128-aes_xcbc' for ESP 311s | proposal: 'aes128-aes_xcbc' 311s | token: '' '' "aes128" '-' 311s | token: '' "aes128" '-' "aes_xcbc" '' 311s | ike_alg_byname() failed: ESP encryption algorithm 'aes128' is not recognized 311s | token: '-' "aes_xcbc" '' '' 311s | appending ESP encryption algorithm AES_CBC[_128] 311s | parsing integ: 311s | appending ESP integrity algorithm AES_XCBC_96[_0] 311s | token: '' '' '' 311s | parsing 'aes192-sha1' for ESP 311s | proposal: 'aes192-sha1' 311s | token: '' '' "aes192" '-' 311s | token: '' "aes192" '-' "sha1" '' 311s | ike_alg_byname() failed: ESP encryption algorithm 'aes192' is not recognized 311s | token: '-' "sha1" '' '' 311s | appending ESP encryption algorithm AES_CBC[_192] 311s | parsing integ: 311s | appending ESP integrity algorithm HMAC_SHA1_96[_0] 311s | token: '' '' '' 311s | parsing 'aes256-sha1' for ESP 311s | proposal: 'aes256-sha1' 311s | token: '' '' "aes256" '-' 311s | token: '' "aes256" '-' "sha1" '' 311s | ike_alg_byname() failed: ESP encryption algorithm 'aes256' is not recognized 311s | token: '-' "sha1" '' '' 311s | appending ESP encryption algorithm AES_CBC[_256] 311s | parsing integ: 311s | appending ESP integrity algorithm HMAC_SHA1_96[_0] 311s | token: '' '' '' 311s | parsing 'aes256-sha' for ESP 311s | proposal: 'aes256-sha' 311s | token: '' '' "aes256" '-' 311s | token: '' "aes256" '-' "sha" '' 311s | ike_alg_byname() failed: ESP encryption algorithm 'aes256' is not recognized 311s | token: '-' "sha" '' '' 311s | appending ESP encryption algorithm AES_CBC[_256] 311s | parsing integ: 311s | appending ESP integrity algorithm HMAC_SHA1_96[_0] 311s | token: '' '' '' 311s | parsing 'aes256-sha2' for ESP 311s | proposal: 'aes256-sha2' 311s | token: '' '' "aes256" '-' 311s | token: '' "aes256" '-' "sha2" '' 311s | ike_alg_byname() failed: ESP encryption algorithm 'aes256' is not recognized 311s | token: '-' "sha2" '' '' 311s | appending ESP encryption algorithm AES_CBC[_256] 311s | parsing integ: 311s | appending ESP integrity algorithm HMAC_SHA2_256_128[_0] 311s | token: '' '' '' 311s | parsing 'aes256-sha2_256' for ESP 311s | proposal: 'aes256-sha2_256' 311s | token: '' '' "aes256" '-' 311s | token: '' "aes256" '-' "sha2_256" '' 311s | ike_alg_byname() failed: ESP encryption algorithm 'aes256' is not recognized 311s | token: '-' "sha2_256" '' '' 311s | appending ESP encryption algorithm AES_CBC[_256] 311s | parsing integ: 311s | appending ESP integrity algorithm HMAC_SHA2_256_128[_0] 311s | token: '' '' '' 311s | parsing 'aes256-sha2_384' for ESP 311s | proposal: 'aes256-sha2_384' 311s | token: '' '' "aes256" '-' 311s | token: '' "aes256" '-' "sha2_384" '' 311s | ike_alg_byname() failed: ESP encryption algorithm 'aes256' is not recognized 311s | token: '-' "sha2_384" '' '' 311s | appending ESP encryption algorithm AES_CBC[_256] 311s | parsing integ: 311s | appending ESP integrity algorithm HMAC_SHA2_384_192[_0] 311s | token: '' '' '' 311s | parsing 'aes256-sha2_512' for ESP 311s | proposal: 'aes256-sha2_512' 311s | token: '' '' "aes256" '-' 311s | token: '' "aes256" '-' "sha2_512" '' 311s | ike_alg_byname() failed: ESP encryption algorithm 'aes256' is not recognized 311s | token: '-' "sha2_512" '' '' 311s | appending ESP encryption algorithm AES_CBC[_256] 311s | parsing integ: 311s | appending ESP integrity algorithm HMAC_SHA2_512_256[_0] 311s | token: '' '' '' 311s | parsing 'camellia' for ESP 311s | proposal: 'camellia' 311s | token: '' '' "camellia" '' 311s | token: '' "camellia" '' '' 311s | token: '' '' '' 311s | appending ESP encryption algorithm CAMELLIA_CBC[_0] 311s | appending ESP integrity algorithm HMAC_SHA2_512_256[_0] 311s | appending ESP integrity algorithm HMAC_SHA2_256_128[_0] 311s | parsing 'camellia128' for ESP 311s | proposal: 'camellia128' 311s | token: '' '' "camellia128" '' 311s | token: '' "camellia128" '' '' 311s | ike_alg_byname() failed: ESP encryption algorithm 'camellia128' is not recognized 311s | token: '' '' '' 311s | appending ESP encryption algorithm CAMELLIA_CBC[_128] 311s | appending ESP integrity algorithm HMAC_SHA2_512_256[_0] 311s | appending ESP integrity algorithm HMAC_SHA2_256_128[_0] 311s | parsing 'camellia192' for ESP 311s | proposal: 'camellia192' 311s | token: '' '' "camellia192" '' 311s | token: '' "camellia192" '' '' 311s | ike_alg_byname() failed: ESP encryption algorithm 'camellia192' is not recognized 311s | token: '' '' '' 311s | appending ESP encryption algorithm CAMELLIA_CBC[_192] 311s | appending ESP integrity algorithm HMAC_SHA2_512_256[_0] 311s | appending ESP integrity algorithm HMAC_SHA2_256_128[_0] 311s | parsing 'camellia256' for ESP 311s | proposal: 'camellia256' 311s | token: '' '' "camellia256" '' 311s | token: '' "camellia256" '' '' 311s | ike_alg_byname() failed: ESP encryption algorithm 'camellia256' is not recognized 311s | token: '' '' '' 311s | appending ESP encryption algorithm CAMELLIA_CBC[_256] 311s | appending ESP integrity algorithm HMAC_SHA2_512_256[_0] 311s | appending ESP integrity algorithm HMAC_SHA2_256_128[_0] 311s | parsing 'aes_ccm' for ESP 311s | proposal: 'aes_ccm' 311s | token: '' '' "aes_ccm" '' 311s | token: '' "aes_ccm" '' '' 311s | token: '' '' '' 311s | appending ESP encryption algorithm AES_CCM_16[_0] 311s | appending ESP integrity algorithm NONE[_0] 311s | parsing 'aes_ccm_a-128-null' for ESP 311s | proposal: 'aes_ccm_a-128-null' 311s | token: '' '' "aes_ccm_a" '-' 311s | token: '' "aes_ccm_a" '-' "128" '-' 311s | token: '-' "128" '-' "null" '' 311s | token: '-' "null" '' '' 311s | appending ESP encryption algorithm AES_CCM_8[_128] 311s | parsing integ: 311s | appending ESP integrity algorithm NONE[_0] 311s | token: '' '' '' 311s | parsing 'aes_ccm_a-192-null' for ESP 311s | proposal: 'aes_ccm_a-192-null' 311s | token: '' '' "aes_ccm_a" '-' 311s | token: '' "aes_ccm_a" '-' "192" '-' 311s | token: '-' "192" '-' "null" '' 311s | token: '-' "null" '' '' 311s | appending ESP encryption algorithm AES_CCM_8[_192] 311s | parsing integ: 311s | appending ESP integrity algorithm NONE[_0] 311s | token: '' '' '' 311s | parsing 'aes_ccm_a-256-null' for ESP 311s | proposal: 'aes_ccm_a-256-null' 311s | token: '' '' "aes_ccm_a" '-' 311s | token: '' "aes_ccm_a" '-' "256" '-' 311s | token: '-' "256" '-' "null" '' 311s | token: '-' "null" '' '' 311s | appending ESP encryption algorithm AES_CCM_8[_256] 311s | parsing integ: 311s | appending ESP integrity algorithm NONE[_0] 311s | token: '' '' '' 311s | parsing 'aes_ccm_b-128-null' for ESP 311s | proposal: 'aes_ccm_b-128-null' 311s | token: '' '' "aes_ccm_b" '-' 311s | token: '' "aes_ccm_b" '-' "128" '-' 311s | token: '-' "128" '-' "null" '' 311s | token: '-' "null" '' '' 311s | appending ESP encryption algorithm AES_CCM_12[_128] 311s | parsing integ: 311s | appending ESP integrity algorithm NONE[_0] 311s | token: '' '' '' 311s | parsing 'aes_ccm_b-192-null' for ESP 311s | proposal: 'aes_ccm_b-192-null' 311s | token: '' '' "aes_ccm_b" '-' 311s | token: '' "aes_ccm_b" '-' "192" '-' 311s | token: '-' "192" '-' "null" '' 311s | token: '-' "null" '' '' 311s | appending ESP encryption algorithm AES_CCM_12[_192] 311s | parsing integ: 311s | appending ESP integrity algorithm NONE[_0] 311s | token: '' '' '' 311s | parsing 'aes_ccm_b-256-null' for ESP 311s | proposal: 'aes_ccm_b-256-null' 311s | token: '' '' "aes_ccm_b" '-' 311s | token: '' "aes_ccm_b" '-' "256" '-' 311s | token: '-' "256" '-' "null" '' 311s | token: '-' "null" '' '' 311s | appending ESP encryption algorithm AES_CCM_12[_256] 311s | parsing integ: 311s | appending ESP integrity algorithm NONE[_0] 311s | token: '' '' '' 311s | parsing 'aes_ccm_c-128-null' for ESP 311s | proposal: 'aes_ccm_c-128-null' 311s | token: '' '' "aes_ccm_c" '-' 311s | token: '' "aes_ccm_c" '-' "128" '-' 311s | token: '-' "128" '-' "null" '' 311s | token: '-' "null" '' '' 311s | appending ESP encryption algorithm AES_CCM_16[_128] 311s | parsing integ: 311s | appending ESP integrity algorithm NONE[_0] 311s | token: '' '' '' 311s | parsing 'aes_ccm_c-192-null' for ESP 311s | proposal: 'aes_ccm_c-192-null' 311s | token: '' '' "aes_ccm_c" '-' 311s | token: '' "aes_ccm_c" '-' "192" '-' 311s | token: '-' "192" '-' "null" '' 311s | token: '-' "null" '' '' 311s | appending ESP encryption algorithm AES_CCM_16[_192] 311s | parsing integ: 311s | appending ESP integrity algorithm NONE[_0] 311s | token: '' '' '' 311s | parsing 'aes_ccm_c-256-null' for ESP 311s | proposal: 'aes_ccm_c-256-null' 311s | token: '' '' "aes_ccm_c" '-' 311s | token: '' "aes_ccm_c" '-' "256" '-' 311s | token: '-' "256" '-' "null" '' 311s | token: '-' "null" '' '' 311s | appending ESP encryption algorithm AES_CCM_16[_256] 311s | parsing integ: 311s | appending ESP integrity algorithm NONE[_0] 311s | token: '' '' '' 311s | parsing 'aes_gcm' for ESP 311s | proposal: 'aes_gcm' 311s | token: '' '' "aes_gcm" '' 311s | token: '' "aes_gcm" '' '' 311s | token: '' '' '' 311s | appending ESP encryption algorithm AES_GCM_16[_0] 311s | appending ESP integrity algorithm NONE[_0] 311s | parsing 'aes_gcm_a-128-null' for ESP 311s | proposal: 'aes_gcm_a-128-null' 311s | token: '' '' "aes_gcm_a" '-' 311s | token: '' "aes_gcm_a" '-' "128" '-' 311s | token: '-' "128" '-' "null" '' 311s | token: '-' "null" '' '' 311s | appending ESP encryption algorithm AES_GCM_8[_128] 311s | parsing integ: 311s | appending ESP integrity algorithm NONE[_0] 311s | token: '' '' '' 311s | parsing 'aes_gcm_a-192-null' for ESP 311s | proposal: 'aes_gcm_a-192-null' 311s | token: '' '' "aes_gcm_a" '-' 311s | token: '' "aes_gcm_a" '-' "192" '-' 311s | token: '-' "192" '-' "null" '' 311s | token: '-' "null" '' '' 311s | appending ESP encryption algorithm AES_GCM_8[_192] 311s | parsing integ: 311s | appending ESP integrity algorithm NONE[_0] 311s | token: '' '' '' 311s | parsing 'aes_gcm_a-256-null' for ESP 311s | proposal: 'aes_gcm_a-256-null' 311s | token: '' '' "aes_gcm_a" '-' 311s | token: '' "aes_gcm_a" '-' "256" '-' 311s | token: '-' "256" '-' "null" '' 311s | token: '-' "null" '' '' 311s | appending ESP encryption algorithm AES_GCM_8[_256] 311s | parsing integ: 311s | appending ESP integrity algorithm NONE[_0] 311s | token: '' '' '' 311s | parsing 'aes_gcm_b-128-null' for ESP 311s | proposal: 'aes_gcm_b-128-null' 311s | token: '' '' "aes_gcm_b" '-' 311s | token: '' "aes_gcm_b" '-' "128" '-' 311s | token: '-' "128" '-' "null" '' 311s | token: '-' "null" '' '' 311s | appending ESP encryption algorithm AES_GCM_12[_128] 311s | parsing integ: 311s | appending ESP integrity algorithm NONE[_0] 311s | token: '' '' '' 311s | parsing 'aes_gcm_b-192-null' for ESP 311s | proposal: 'aes_gcm_b-192-null' 311s | token: '' '' "aes_gcm_b" '-' 311s | token: '' "aes_gcm_b" '-' "192" '-' 311s | token: '-' "192" '-' "null" '' 311s | token: '-' "null" '' '' 311s | appending ESP encryption algorithm AES_GCM_12[_192] 311s | parsing integ: 311s | appending ESP integrity algorithm NONE[_0] 311s | token: '' '' '' 311s | parsing 'aes_gcm_b-256-null' for ESP 311s | proposal: 'aes_gcm_b-256-null' 311s | token: '' '' "aes_gcm_b" '-' 311s | token: '' "aes_gcm_b" '-' "256" '-' 311s | token: '-' "256" '-' "null" '' 311s | token: '-' "null" '' '' 311s | appending ESP encryption algorithm AES_GCM_12[_256] 311s | parsing integ: 311s | appending ESP integrity algorithm NONE[_0] 311s | token: '' '' '' 311s | parsing 'aes_gcm_c-128-null' for ESP 311s | proposal: 'aes_gcm_c-128-null' 311s | token: '' '' "aes_gcm_c" '-' 311s | token: '' "aes_gcm_c" '-' "128" '-' 311s | token: '-' "128" '-' "null" '' 311s | token: '-' "null" '' '' 311s | appending ESP encryption algorithm AES_GCM_16[_128] 311s | parsing integ: 311s | appending ESP integrity algorithm NONE[_0] 311s | token: '' '' '' 311s | parsing 'aes_gcm_c-192-null' for ESP 311s | proposal: 'aes_gcm_c-192-null' 311s | token: '' '' "aes_gcm_c" '-' 311s | token: '' "aes_gcm_c" '-' "192" '-' 311s | token: '-' "192" '-' "null" '' 311s | token: '-' "null" '' '' 311s | appending ESP encryption algorithm AES_GCM_16[_192] 311s | parsing integ: 311s | appending ESP integrity algorithm NONE[_0] 311s | token: '' '' '' 311s | parsing 'aes_gcm_c-256-null' for ESP 311s | proposal: 'aes_gcm_c-256-null' 311s | token: '' '' "aes_gcm_c" '-' 311s | token: '' "aes_gcm_c" '-' "256" '-' 311s | token: '-' "256" '-' "null" '' 311s | token: '-' "null" '' '' 311s | appending ESP encryption algorithm AES_GCM_16[_256] 311s | parsing integ: 311s | appending ESP integrity algorithm NONE[_0] 311s | token: '' '' '' 311s | parsing 'aes_ccm_a-null' for ESP 311s | proposal: 'aes_ccm_a-null' 311s | token: '' '' "aes_ccm_a" '-' 311s | token: '' "aes_ccm_a" '-' "null" '' 311s | token: '-' "null" '' '' 311s | appending ESP encryption algorithm AES_CCM_8[_0] 311s | parsing integ: 311s | appending ESP integrity algorithm NONE[_0] 311s | token: '' '' '' 311s | parsing 'aes_ccm_b-null' for ESP 311s | proposal: 'aes_ccm_b-null' 311s | token: '' '' "aes_ccm_b" '-' 311s | token: '' "aes_ccm_b" '-' "null" '' 311s | token: '-' "null" '' '' 311s | appending ESP encryption algorithm AES_CCM_12[_0] 311s | parsing integ: 311s | appending ESP integrity algorithm NONE[_0] 311s | token: '' '' '' 311s | parsing 'aes_ccm_c-null' for ESP 311s | proposal: 'aes_ccm_c-null' 311s | token: '' '' "aes_ccm_c" '-' 311s | token: '' "aes_ccm_c" '-' "null" '' 311s | token: '-' "null" '' '' 311s | appending ESP encryption algorithm AES_CCM_16[_0] 311s | parsing integ: 311s | appending ESP integrity algorithm NONE[_0] 311s | token: '' '' '' 311s | parsing 'aes_gcm_a-null' for ESP 311s | proposal: 'aes_gcm_a-null' 311s | token: '' '' "aes_gcm_a" '-' 311s | token: '' "aes_gcm_a" '-' "null" '' 311s | token: '-' "null" '' '' 311s | appending ESP encryption algorithm AES_GCM_8[_0] 311s | parsing integ: 311s | appending ESP integrity algorithm NONE[_0] 311s | token: '' '' '' 311s | parsing 'aes_gcm_b-null' for ESP 311s | proposal: 'aes_gcm_b-null' 311s | token: '' '' "aes_gcm_b" '-' 311s | token: '' "aes_gcm_b" '-' "null" '' 311s | token: '-' "null" '' '' 311s | appending ESP encryption algorithm AES_GCM_12[_0] 311s | parsing integ: 311s | appending ESP integrity algorithm NONE[_0] 311s | token: '' '' '' 311s | parsing 'aes_gcm_c-null' for ESP 311s | proposal: 'aes_gcm_c-null' 311s | token: '' '' "aes_gcm_c" '-' 311s | token: '' "aes_gcm_c" '-' "null" '' 311s | token: '-' "null" '' '' 311s | appending ESP encryption algorithm AES_GCM_16[_0] 311s | parsing integ: 311s | appending ESP integrity algorithm NONE[_0] 311s | token: '' '' '' 311s | parsing 'aes_ccm-null' for ESP 311s | proposal: 'aes_ccm-null' 311s | token: '' '' "aes_ccm" '-' 311s | token: '' "aes_ccm" '-' "null" '' 311s | token: '-' "null" '' '' 311s | appending ESP encryption algorithm AES_CCM_16[_0] 311s | parsing integ: 311s | appending ESP integrity algorithm NONE[_0] 311s | token: '' '' '' 311s | parsing 'aes_gcm-null' for ESP 311s | proposal: 'aes_gcm-null' 311s | token: '' '' "aes_gcm" '-' 311s | token: '' "aes_gcm" '-' "null" '' 311s | token: '-' "null" '' '' 311s | appending ESP encryption algorithm AES_GCM_16[_0] 311s | parsing integ: 311s | appending ESP integrity algorithm NONE[_0] 311s | token: '' '' '' 311s | parsing 'aes_ccm-256-null' for ESP 311s | proposal: 'aes_ccm-256-null' 311s | token: '' '' "aes_ccm" '-' 311s algparse -v2 'esp' (expect SUCCESS) 311s AES_GCM_16_256-NONE 311s AES_GCM_16_128-NONE 311s CHACHA20_POLY1305-NONE 311s AES_CBC_256-HMAC_SHA2_512_256+HMAC_SHA2_256_128 311s AES_CBC_128-HMAC_SHA2_512_256+HMAC_SHA2_256_128 311s algparse -v2 'esp=' (expect ERROR) 311s ERROR: ESP proposal is empty 311s algparse -v2 'esp=aes' (expect SUCCESS) 311s AES_CBC-HMAC_SHA2_512_256+HMAC_SHA2_256_128 311s algparse -v2 'esp=aes;modp2048' (expect SUCCESS) 311s AES_CBC-HMAC_SHA2_512_256+HMAC_SHA2_256_128 311s algparse -v2 'esp=aes-sha1' (expect SUCCESS) 311s AES_CBC-HMAC_SHA1_96 311s algparse -v2 'esp=aes-sha1' (expect SUCCESS) 311s AES_CBC-HMAC_SHA1_96 311s algparse -v2 'esp=aes-sha1-modp2048' (expect SUCCESS) 311s AES_CBC-HMAC_SHA1_96 311s algparse -v2 'esp=aes-128-sha1' (expect SUCCESS) 311s AES_CBC_128-HMAC_SHA1_96 311s algparse -v2 'esp=aes-128-sha1' (expect SUCCESS) 311s AES_CBC_128-HMAC_SHA1_96 311s algparse -v2 'esp=aes-128-sha1-modp2048' (expect SUCCESS) 311s AES_CBC_128-HMAC_SHA1_96 311s algparse -v2 'esp=aes-128' (expect SUCCESS) 311s AES_CBC_128-HMAC_SHA2_512_256+HMAC_SHA2_256_128 311s algparse -v2 'esp=aes_gcm_a-128-null' (expect SUCCESS) 311s AES_GCM_8_128-NONE 311s algparse -v2 'esp=3des-sha1;modp1024' (expect ERROR) 311s ERROR: ESP DH algorithm 'modp1024' is not supported 311s algparse -v2 'esp=3des-sha1;modp1536' (expect SUCCESS) 311s 3DES_CBC-HMAC_SHA1_96 311s algparse -v2 'esp=3des-sha1;modp2048' (expect SUCCESS) 311s 3DES_CBC-HMAC_SHA1_96 311s algparse -v2 'esp=3des-sha1;dh21' (expect SUCCESS) 311s 3DES_CBC-HMAC_SHA1_96 311s algparse -v2 'esp=3des-sha1;ecp_521' (expect SUCCESS) 311s 3DES_CBC-HMAC_SHA1_96 311s algparse -v2 'esp=3des-sha1;dh23' (expect ERROR) 311s ERROR: ESP DH algorithm 'dh23' is not supported 311s algparse -v2 'esp=3des-sha1;dh24' (expect ERROR) 311s ERROR: ESP DH algorithm 'dh24' is not supported 311s algparse -v2 'esp=3des-sha1' (expect SUCCESS) 311s 3DES_CBC-HMAC_SHA1_96 311s algparse -v2 'esp=null-sha1' (expect SUCCESS) 311s NULL-HMAC_SHA1_96 311s algparse -v2 'esp=aes_cbc' (expect SUCCESS) 311s AES_CBC-HMAC_SHA2_512_256+HMAC_SHA2_256_128 311s algparse -v2 'esp=aes-sha' (expect SUCCESS) 311s AES_CBC-HMAC_SHA1_96 311s algparse -v2 'esp=aes-sha1' (expect SUCCESS) 311s AES_CBC-HMAC_SHA1_96 311s algparse -v2 'esp=aes128-sha1' (expect SUCCESS) 311s AES_CBC_128-HMAC_SHA1_96 311s algparse -v2 'esp=aes-sha2' (expect SUCCESS) 311s AES_CBC-HMAC_SHA2_256_128 311s algparse -v2 'esp=aes-sha256' (expect SUCCESS) 311s AES_CBC-HMAC_SHA2_256_128 311s algparse -v2 'esp=aes-sha384' (expect SUCCESS) 311s AES_CBC-HMAC_SHA2_384_192 311s algparse -v2 'esp=aes-sha512' (expect SUCCESS) 311s AES_CBC-HMAC_SHA2_512_256 311s algparse -v2 'esp=aes128-aes_xcbc' (expect SUCCESS) 311s AES_CBC_128-AES_XCBC_96 311s algparse -v2 'esp=aes192-sha1' (expect SUCCESS) 311s AES_CBC_192-HMAC_SHA1_96 311s algparse -v2 'esp=aes256-sha1' (expect SUCCESS) 311s AES_CBC_256-HMAC_SHA1_96 311s algparse -v2 'esp=aes256-sha' (expect SUCCESS) 311s AES_CBC_256-HMAC_SHA1_96 311s algparse -v2 'esp=aes256-sha2' (expect SUCCESS) 311s AES_CBC_256-HMAC_SHA2_256_128 311s algparse -v2 'esp=aes256-sha2_256' (expect SUCCESS) 311s AES_CBC_256-HMAC_SHA2_256_128 311s algparse -v2 'esp=aes256-sha2_384' (expect SUCCESS) 311s AES_CBC_256-HMAC_SHA2_384_192 311s algparse -v2 'esp=aes256-sha2_512' (expect SUCCESS) 311s AES_CBC_256-HMAC_SHA2_512_256 311s algparse -v2 'esp=camellia' (expect SUCCESS) 311s CAMELLIA_CBC-HMAC_SHA2_512_256+HMAC_SHA2_256_128 311s algparse -v2 'esp=camellia128' (expect SUCCESS) 311s CAMELLIA_CBC_128-HMAC_SHA2_512_256+HMAC_SHA2_256_128 311s algparse -v2 'esp=camellia192' (expect SUCCESS) 311s CAMELLIA_CBC_192-HMAC_SHA2_512_256+HMAC_SHA2_256_128 311s algparse -v2 'esp=camellia256' (expect SUCCESS) 311s CAMELLIA_CBC_256-HMAC_SHA2_512_256+HMAC_SHA2_256_128 311s algparse -v2 'esp=aes_ccm' (expect SUCCESS) 311s AES_CCM_16-NONE 311s algparse -v2 'esp=aes_ccm_a-128-null' (expect SUCCESS) 311s AES_CCM_8_128-NONE 311s algparse -v2 'esp=aes_ccm_a-192-null' (expect SUCCESS) 311s AES_CCM_8_192-NONE 311s algparse -v2 'esp=aes_ccm_a-256-null' (expect SUCCESS) 311s AES_CCM_8_256-NONE 311s algparse -v2 'esp=aes_ccm_b-128-null' (expect SUCCESS) 311s AES_CCM_12_128-NONE 311s algparse -v2 'esp=aes_ccm_b-192-null' (expect SUCCESS) 311s AES_CCM_12_192-NONE 311s algparse -v2 'esp=aes_ccm_b-256-null' (expect SUCCESS) 311s AES_CCM_12_256-NONE 311s algparse -v2 'esp=aes_ccm_c-128-null' (expect SUCCESS) 311s AES_CCM_16_128-NONE 311s algparse -v2 'esp=aes_ccm_c-192-null' (expect SUCCESS) 311s AES_CCM_16_192-NONE 311s algparse -v2 'esp=aes_ccm_c-256-null' (expect SUCCESS) 311s AES_CCM_16_256-NONE 311s algparse -v2 'esp=aes_gcm' (expect SUCCESS) 311s AES_GCM_16-NONE 311s algparse -v2 'esp=aes_gcm_a-128-null' (expect SUCCESS) 311s AES_GCM_8_128-NONE 311s algparse -v2 'esp=aes_gcm_a-192-null' (expect SUCCESS) 311s AES_GCM_8_192-NONE 311s algparse -v2 'esp=aes_gcm_a-256-null' (expect SUCCESS) 311s AES_GCM_8_256-NONE 311s algparse -v2 'esp=aes_gcm_b-128-null' (expect SUCCESS) 311s AES_GCM_12_128-NONE 311s algparse -v2 'esp=aes_gcm_b-192-null' (expect SUCCESS) 311s AES_GCM_12_192-NONE 311s algparse -v2 'esp=aes_gcm_b-256-null' (expect SUCCESS) 311s AES_GCM_12_256-NONE 311s algparse -v2 'esp=aes_gcm_c-128-null' (expect SUCCESS) 311s AES_GCM_16_128-NONE 311s algparse -v2 'esp=aes_gcm_c-192-null' (expect SUCCESS) 311s AES_GCM_16_192-NONE 311s algparse -v2 'esp=aes_gcm_c-256-null' (expect SUCCESS) 311s AES_GCM_16_256-NONE 311s algparse -v2 'esp=aes_ccm_a-null' (expect SUCCESS) 311s AES_CCM_8-NONE 311s algparse -v2 'esp=aes_ccm_b-null' (expect SUCCESS) 311s AES_CCM_12-NONE 311s algparse -v2 'esp=aes_ccm_c-null' (expect SUCCESS) 311s AES_CCM_16-NONE 311s algparse -v2 'esp=aes_gcm_a-null' (expect SUCCESS) 311s AES_GCM_8-NONE 311s algparse -v2 'esp=aes_gcm_b-null' (expect SUCCESS) 311s AES_GCM_12-NONE 311s algparse -v2 'esp=aes_gcm_c-null' (expect SUCCESS) 311s AES_GCM_16-NONE 311s algparse -v2 'esp=aes_ccm-null' (expect SUCCESS) 311s AES_CCM_16-NONE 311s algparse -v2 'esp=aes_gcm-null' (expect SUCCESS) 311s AES_GCM_16-NONE 311s algparse -v2 'esp=aes_ccm-256-null' (expect SUCCESS) 311s AES_CCM_16_256-NONE 311s algparse -v2 'esp=aes_gcm-192-null' (expect SUCCESS) 311s AES_GCM_16_192-NONE 311s algparse -v2 'esp=aes_ccm_256-null' (expect SUCCESS) 311s AES_CCM_16_256-NONE 311s algparse -v2 'esp=aes_gcm_192-null' (expect SUCCESS) 311s AES_GCM_16_192-NONE 311s algparse -v2 'esp=aes_ccm_8-null' (expect SUCCESS) 311s AES_CCM_8-NONE 311s algparse -v2 'esp=aes_ccm_12-null' (expect SUCCESS) 311s AES_CCM_12-NONE 311s algparse -v2 'esp=aes_ccm_16-null' (expect SUCCESS) 311s AES_CCM_16-NONE 311s algparse -v2 'esp=aes_gcm_8-null' (expect SUCCESS) 311s AES_GCM_8-NONE 311s algparse -v2 'esp=aes_gcm_12-null' (expect SUCCESS) 311s AES_GCM_12-NONE 311s algparse -v2 'esp=aes_gcm_16-null' (expect SUCCESS) 311s AES_GCM_16-NONE 311s algparse -v2 'esp=aes_ccm_8-128-null' (expect SUCCESS) 311s AES_CCM_8_128-NONE 311s algparse -v2 'esp=aes_ccm_12-192-null' (expect SUCCESS) 311s AES_CCM_12_192-NONE 311s algparse -v2 'esp=aes_ccm_16-256-null' (expect SUCCESS) 311s AES_CCM_16_256-NONE 311s algparse -v2 'esp=aes_gcm_8-128-null' (expect SUCCESS) 311s AES_GCM_8_128-NONE 311s algparse -v2 'esp=aes_gcm_12-192-null' (expect SUCCESS) 311s AES_GCM_12_192-NONE 311s algparse -v2 'esp=aes_gcm_16-256-null' (expect SUCCESS) 311s AES_GCM_16_256-NONE 311s algparse -v2 'esp=aes_ccm_8_128-null' (expect SUCCESS) 311s AES_CCM_8_128-NONE 311s algparse -v2 'esp=aes_ccm_12_192-null' (expect SUCCESS) 311s AES_CCM_12_192-NONE 311s algparse -v2 'esp=aes_ccm_16_256-null' (expect SUCCESS) 311s AES_CCM_16_256-NONE 311s algparse -v2 'esp=aes_gcm_8_128-null' (expect SUCCESS) 311s AES_GCM_8_128-NONE 311s algparse -v2 'esp=aes_gcm_12_192-null' (expect SUCCESS) 311s AES_GCM_12_192-NONE 311s algparse -v2 'esp=aes_gcm_16_256-null' (expect SUCCESS) 311s AES_GCM_16_256-NONE 311s algparse -v2 'esp=aes_ctr' (expect SUCCESS) 311s AES_CTR-HMAC_SHA2_512_256+HMAC_SHA2_256_128 311s algparse -v2 'esp=aesctr' (expect SUCCESS) 311s AES_CTR-HMAC_SHA2_512_256+HMAC_SHA2_256_128 311s algparse -v2 'esp=aes_ctr128' (expect SUCCESS) 311s AES_CTR_128-HMAC_SHA2_512_256+HMAC_SHA2_256_128 311s algparse -v2 'esp=aes_ctr192' (expect SUCCESS) 311s AES_CTR_192-HMAC_SHA2_512_256+HMAC_SHA2_256_128 311s algparse -v2 'esp=aes_ctr256' (expect SUCCESS) 311s AES_CTR_256-HMAC_SHA2_512_256+HMAC_SHA2_256_128 311s algparse -v2 'esp=camellia_cbc_256-hmac_sha2_512_256;modp8192' (expect SUCCESS) 311s CAMELLIA_CBC_256-HMAC_SHA2_512_256 311s algparse -v2 'esp=null_auth_aes_gmac_256-null;modp8192' (expect SUCCESS) 311s NULL_AUTH_AES_GMAC_256-NONE 311s algparse -v2 'esp=3des-sha1;modp8192' (expect SUCCESS) 311s 3DES_CBC-HMAC_SHA1_96 311s algparse -v2 'esp=3des-sha1-modp8192' (expect SUCCESS) 311s 3DES_CBC-HMAC_SHA1_96 311s algparse -v2 'esp=aes-sha1,3des-sha1;modp8192' (expect SUCCESS) 311s AES_CBC-HMAC_SHA1_96 311s 3DES_CBC-HMAC_SHA1_96 311s algparse -v2 'esp=aes-sha1-modp8192,3des-sha1-modp8192' (expect SUCCESS) 311s AES_CBC-HMAC_SHA1_96 311s 3DES_CBC-HMAC_SHA1_96 311s algparse -v2 'esp=aes-sha1-modp8192,aes-sha1-modp8192,aes-sha1-modp8192' (expect SUCCESS) 311s AES_CBC-HMAC_SHA1_96 311s algparse -v2 'esp=aes;none' (expect SUCCESS) 311s AES_CBC-HMAC_SHA2_512_256+HMAC_SHA2_256_128 311s algparse -v2 'esp=aes;none,aes' (expect SUCCESS) 311s AES_CBC-HMAC_SHA2_512_256+HMAC_SHA2_256_128 311s AES_CBC-HMAC_SHA2_512_256+HMAC_SHA2_256_128 311s algparse -v2 'esp=aes;none,aes;modp2048' (expect SUCCESS) 311s AES_CBC-HMAC_SHA2_512_256+HMAC_SHA2_256_128 311s AES_CBC-HMAC_SHA2_512_256+HMAC_SHA2_256_128 311s algparse -v2 'esp=aes-sha1-none' (expect SUCCESS) 311s AES_CBC-HMAC_SHA1_96 311s algparse -v2 'esp=aes-sha1;none' (expect SUCCESS) 311s AES_CBC-HMAC_SHA1_96 311s algparse -v2 'esp=3des168-sha1' (expect ERROR) 311s ERROR: ESP encryption algorithm 3DES_CBC does not allow a key lengths 311s algparse -v2 'esp=3des-null' (expect ERROR) 311s ERROR: non-AEAD ESP encryption algorithm 3DES_CBC cannot have 'NONE' as the integrity algorithm 311s algparse -v2 'esp=aes128-null' (expect ERROR) 311s ERROR: non-AEAD ESP encryption algorithm AES_CBC cannot have 'NONE' as the integrity algorithm 311s algparse -v2 'esp=aes224-sha1' (expect ERROR) 311s ERROR: ESP encryption algorithm AES_CBC with key length 224 invalid; valid key lengths: 128, 192, 256 311s algparse -v2 'esp=aes-224-sha1' (expect ERROR) 311s ERROR: ESP encryption algorithm AES_CBC with key length 224 invalid; valid key lengths: 128, 192, 256 311s algparse -v2 'esp=aes0-sha1' (expect ERROR) 311s ERROR: ESP encryption key length is zero 311s algparse -v2 'esp=aes-0-sha1' (expect ERROR) 311s ERROR: ESP encryption key length is zero 311s algparse -v2 'esp=aes512-sha1' (expect ERROR) 311s ERROR: ESP encryption algorithm AES_CBC with key length 512 invalid; valid key lengths: 128, 192, 256 311s algparse -v2 'esp=aes-sha1555' (expect ERROR) 311s ERROR: ESP integrity algorithm 'sha1555' is not recognized 311s algparse -v2 'esp=camellia666-sha1' (expect ERROR) 311s ERROR: ESP encryption algorithm CAMELLIA_CBC with key length 666 invalid; valid key lengths: 128, 192, 256 311s algparse -v2 'esp=blowfish' (expect ERROR) 311s ERROR: ESP encryption algorithm 'blowfish' is not supported 311s algparse -v2 'esp=des-sha1' (expect ERROR) 311s ERROR: ESP encryption algorithm 'des' is not supported 311s algparse -v2 'esp=aes_ctr666' (expect ERROR) 311s ERROR: ESP encryption algorithm AES_CTR with key length 666 invalid; valid key lengths: 128, 192, 256 311s algparse -v2 'esp=aes128-sha2_128' (expect ERROR) 311s ERROR: ESP integrity algorithm 'sha2_128' is not recognized 311s algparse -v2 'esp=aes256-sha2_256-4096' (expect ERROR) 311s ERROR: ESP DH algorithm '4096' is not recognized 311s algparse -v2 'esp=aes256-sha2_256-128' (expect ERROR) 311s ERROR: ESP DH algorithm '128' is not recognized 311s algparse -v2 'esp=vanitycipher' (expect ERROR) 311s ERROR: ESP encryption algorithm 'vanitycipher' is not recognized 311s algparse -v2 'esp=ase-sah' (expect ERROR) 311s ERROR: ESP encryption algorithm 'ase' is not recognized 311s algparse -v2 'esp=aes-sah1' (expect ERROR) 311s | token: '' "aes_ccm" '-' "256" '-' 311s | token: '-' "256" '-' "null" '' 311s | token: '-' "null" '' '' 311s | appending ESP encryption algorithm AES_CCM_16[_256] 311s | parsing integ: 311s | appending ESP integrity algorithm NONE[_0] 311s | token: '' '' '' 311s | parsing 'aes_gcm-192-null' for ESP 311s | proposal: 'aes_gcm-192-null' 311s | token: '' '' "aes_gcm" '-' 311s | token: '' "aes_gcm" '-' "192" '-' 311s | token: '-' "192" '-' "null" '' 311s | token: '-' "null" '' '' 311s | appending ESP encryption algorithm AES_GCM_16[_192] 311s | parsing integ: 311s | appending ESP integrity algorithm NONE[_0] 311s | token: '' '' '' 311s | parsing 'aes_ccm_256-null' for ESP 311s | proposal: 'aes_ccm_256-null' 311s | token: '' '' "aes_ccm_256" '-' 311s | token: '' "aes_ccm_256" '-' "null" '' 311s | ike_alg_byname() failed: ESP encryption algorithm 'aes_ccm_256' is not recognized 311s | token: '-' "null" '' '' 311s | appending ESP encryption algorithm AES_CCM_16[_256] 311s | parsing integ: 311s | appending ESP integrity algorithm NONE[_0] 311s | token: '' '' '' 311s | parsing 'aes_gcm_192-null' for ESP 311s | proposal: 'aes_gcm_192-null' 311s | token: '' '' "aes_gcm_192" '-' 311s | token: '' "aes_gcm_192" '-' "null" '' 311s | ike_alg_byname() failed: ESP encryption algorithm 'aes_gcm_192' is not recognized 311s | token: '-' "null" '' '' 311s | appending ESP encryption algorithm AES_GCM_16[_192] 311s | parsing integ: 311s | appending ESP integrity algorithm NONE[_0] 311s | token: '' '' '' 311s | parsing 'aes_ccm_8-null' for ESP 311s | proposal: 'aes_ccm_8-null' 311s | token: '' '' "aes_ccm_8" '-' 311s | token: '' "aes_ccm_8" '-' "null" '' 311s | token: '-' "null" '' '' 311s | appending ESP encryption algorithm AES_CCM_8[_0] 311s | parsing integ: 311s | appending ESP integrity algorithm NONE[_0] 311s | token: '' '' '' 311s | parsing 'aes_ccm_12-null' for ESP 311s | proposal: 'aes_ccm_12-null' 311s | token: '' '' "aes_ccm_12" '-' 311s | token: '' "aes_ccm_12" '-' "null" '' 311s | token: '-' "null" '' '' 311s | appending ESP encryption algorithm AES_CCM_12[_0] 311s | parsing integ: 311s | appending ESP integrity algorithm NONE[_0] 311s | token: '' '' '' 311s | parsing 'aes_ccm_16-null' for ESP 311s | proposal: 'aes_ccm_16-null' 311s | token: '' '' "aes_ccm_16" '-' 311s | token: '' "aes_ccm_16" '-' "null" '' 311s | token: '-' "null" '' '' 311s | appending ESP encryption algorithm AES_CCM_16[_0] 311s | parsing integ: 311s | appending ESP integrity algorithm NONE[_0] 311s | token: '' '' '' 311s | parsing 'aes_gcm_8-null' for ESP 311s | proposal: 'aes_gcm_8-null' 311s | token: '' '' "aes_gcm_8" '-' 311s | token: '' "aes_gcm_8" '-' "null" '' 311s | token: '-' "null" '' '' 311s | appending ESP encryption algorithm AES_GCM_8[_0] 311s | parsing integ: 311s | appending ESP integrity algorithm NONE[_0] 311s | token: '' '' '' 311s | parsing 'aes_gcm_12-null' for ESP 311s | proposal: 'aes_gcm_12-null' 311s | token: '' '' "aes_gcm_12" '-' 311s | token: '' "aes_gcm_12" '-' "null" '' 311s | token: '-' "null" '' '' 311s | appending ESP encryption algorithm AES_GCM_12[_0] 311s | parsing integ: 311s | appending ESP integrity algorithm NONE[_0] 311s | token: '' '' '' 311s | parsing 'aes_gcm_16-null' for ESP 311s | proposal: 'aes_gcm_16-null' 311s | token: '' '' "aes_gcm_16" '-' 311s | token: '' "aes_gcm_16" '-' "null" '' 311s | token: '-' "null" '' '' 311s | appending ESP encryption algorithm AES_GCM_16[_0] 311s | parsing integ: 311s | appending ESP integrity algorithm NONE[_0] 311s | token: '' '' '' 311s | parsing 'aes_ccm_8-128-null' for ESP 311s | proposal: 'aes_ccm_8-128-null' 311s | token: '' '' "aes_ccm_8" '-' 311s | token: '' "aes_ccm_8" '-' "128" '-' 311s | token: '-' "128" '-' "null" '' 311s | token: '-' "null" '' '' 311s | appending ESP encryption algorithm AES_CCM_8[_128] 311s | parsing integ: 311s | appending ESP integrity algorithm NONE[_0] 311s | token: '' '' '' 311s | parsing 'aes_ccm_12-192-null' for ESP 311s | proposal: 'aes_ccm_12-192-null' 311s | token: '' '' "aes_ccm_12" '-' 311s | token: '' "aes_ccm_12" '-' "192" '-' 311s | token: '-' "192" '-' "null" '' 311s | token: '-' "null" '' '' 311s | appending ESP encryption algorithm AES_CCM_12[_192] 311s | parsing integ: 311s | appending ESP integrity algorithm NONE[_0] 311s | token: '' '' '' 311s | parsing 'aes_ccm_16-256-null' for ESP 311s | proposal: 'aes_ccm_16-256-null' 311s | token: '' '' "aes_ccm_16" '-' 311s | token: '' "aes_ccm_16" '-' "256" '-' 311s | token: '-' "256" '-' "null" '' 311s | token: '-' "null" '' '' 311s | appending ESP encryption algorithm AES_CCM_16[_256] 311s | parsing integ: 311s | appending ESP integrity algorithm NONE[_0] 311s | token: '' '' '' 311s | parsing 'aes_gcm_8-128-null' for ESP 311s | proposal: 'aes_gcm_8-128-null' 311s | token: '' '' "aes_gcm_8" '-' 311s | token: '' "aes_gcm_8" '-' "128" '-' 311s | token: '-' "128" '-' "null" '' 311s | token: '-' "null" '' '' 311s | appending ESP encryption algorithm AES_GCM_8[_128] 311s | parsing integ: 311s | appending ESP integrity algorithm NONE[_0] 311s | token: '' '' '' 311s | parsing 'aes_gcm_12-192-null' for ESP 311s | proposal: 'aes_gcm_12-192-null' 311s | token: '' '' "aes_gcm_12" '-' 311s | token: '' "aes_gcm_12" '-' "192" '-' 311s | token: '-' "192" '-' "null" '' 311s | token: '-' "null" '' '' 311s | appending ESP encryption algorithm AES_GCM_12[_192] 311s | parsing integ: 311s | appending ESP integrity algorithm NONE[_0] 311s | token: '' '' '' 311s | parsing 'aes_gcm_16-256-null' for ESP 311s | proposal: 'aes_gcm_16-256-null' 311s | token: '' '' "aes_gcm_16" '-' 311s | token: '' "aes_gcm_16" '-' "256" '-' 311s | token: '-' "256" '-' "null" '' 311s | token: '-' "null" '' '' 311s | appending ESP encryption algorithm AES_GCM_16[_256] 311s | parsing integ: 311s | appending ESP integrity algorithm NONE[_0] 311s | token: '' '' '' 311s | parsing 'aes_ccm_8_128-null' for ESP 311s | proposal: 'aes_ccm_8_128-null' 311s | token: '' '' "aes_ccm_8_128" '-' 311s | token: '' "aes_ccm_8_128" '-' "null" '' 311s | ike_alg_byname() failed: ESP encryption algorithm 'aes_ccm_8_128' is not recognized 311s | token: '-' "null" '' '' 311s | appending ESP encryption algorithm AES_CCM_8[_128] 311s | parsing integ: 311s | appending ESP integrity algorithm NONE[_0] 311s | token: '' '' '' 311s | parsing 'aes_ccm_12_192-null' for ESP 311s | proposal: 'aes_ccm_12_192-null' 311s | token: '' '' "aes_ccm_12_192" '-' 311s | token: '' "aes_ccm_12_192" '-' "null" '' 311s | ike_alg_byname() failed: ESP encryption algorithm 'aes_ccm_12_192' is not recognized 311s | token: '-' "null" '' '' 311s | appending ESP encryption algorithm AES_CCM_12[_192] 311s | parsing integ: 311s | appending ESP integrity algorithm NONE[_0] 311s | token: '' '' '' 311s | parsing 'aes_ccm_16_256-null' for ESP 311s | proposal: 'aes_ccm_16_256-null' 311s | token: '' '' "aes_ccm_16_256" '-' 311s | token: '' "aes_ccm_16_256" '-' "null" '' 311s | ike_alg_byname() failed: ESP encryption algorithm 'aes_ccm_16_256' is not recognized 311s | token: '-' "null" '' '' 311s | appending ESP encryption algorithm AES_CCM_16[_256] 311s | parsing integ: 311s | appending ESP integrity algorithm NONE[_0] 311s | token: '' '' '' 311s | parsing 'aes_gcm_8_128-null' for ESP 311s | proposal: 'aes_gcm_8_128-null' 311s | token: '' '' "aes_gcm_8_128" '-' 311s | token: '' "aes_gcm_8_128" '-' "null" '' 311s | ike_alg_byname() failed: ESP encryption algorithm 'aes_gcm_8_128' is not recognized 311s | token: '-' "null" '' '' 311s | appending ESP encryption algorithm AES_GCM_8[_128] 311s | parsing integ: 311s | appending ESP integrity algorithm NONE[_0] 311s | token: '' '' '' 311s | parsing 'aes_gcm_12_192-null' for ESP 311s | proposal: 'aes_gcm_12_192-null' 311s | token: '' '' "aes_gcm_12_192" '-' 311s | token: '' "aes_gcm_12_192" '-' "null" '' 311s | ike_alg_byname() failed: ESP encryption algorithm 'aes_gcm_12_192' is not recognized 311s | token: '-' "null" '' '' 311s | appending ESP encryption algorithm AES_GCM_12[_192] 311s | parsing integ: 311s | appending ESP integrity algorithm NONE[_0] 311s | token: '' '' '' 311s | parsing 'aes_gcm_16_256-null' for ESP 311s | proposal: 'aes_gcm_16_256-null' 311s | token: '' '' "aes_gcm_16_256" '-' 311s | token: '' "aes_gcm_16_256" '-' "null" '' 311s | ike_alg_byname() failed: ESP encryption algorithm 'aes_gcm_16_256' is not recognized 311s | token: '-' "null" '' '' 311s | appending ESP encryption algorithm AES_GCM_16[_256] 311s | parsing integ: 311s | appending ESP integrity algorithm NONE[_0] 311s | token: '' '' '' 311s | parsing 'aes_ctr' for ESP 311s | proposal: 'aes_ctr' 311s | token: '' '' "aes_ctr" '' 311s | token: '' "aes_ctr" '' '' 311s | token: '' '' '' 311s | appending ESP encryption algorithm AES_CTR[_0] 311s | appending ESP integrity algorithm HMAC_SHA2_512_256[_0] 311s | appending ESP integrity algorithm HMAC_SHA2_256_128[_0] 311s | parsing 'aesctr' for ESP 311s | proposal: 'aesctr' 311s | token: '' '' "aesctr" '' 311s | token: '' "aesctr" '' '' 311s | token: '' '' '' 311s | appending ESP encryption algorithm AES_CTR[_0] 311s | appending ESP integrity algorithm HMAC_SHA2_512_256[_0] 311s | appending ESP integrity algorithm HMAC_SHA2_256_128[_0] 311s | parsing 'aes_ctr128' for ESP 311s | proposal: 'aes_ctr128' 311s | token: '' '' "aes_ctr128" '' 311s | token: '' "aes_ctr128" '' '' 311s | ike_alg_byname() failed: ESP encryption algorithm 'aes_ctr128' is not recognized 311s | token: '' '' '' 311s | appending ESP encryption algorithm AES_CTR[_128] 311s | appending ESP integrity algorithm HMAC_SHA2_512_256[_0] 311s | appending ESP integrity algorithm HMAC_SHA2_256_128[_0] 311s | parsing 'aes_ctr192' for ESP 311s | proposal: 'aes_ctr192' 311s | token: '' '' "aes_ctr192" '' 311s | token: '' "aes_ctr192" '' '' 311s | ike_alg_byname() failed: ESP encryption algorithm 'aes_ctr192' is not recognized 311s | token: '' '' '' 311s | appending ESP encryption algorithm AES_CTR[_192] 311s | appending ESP integrity algorithm HMAC_SHA2_512_256[_0] 311s | appending ESP integrity algorithm HMAC_SHA2_256_128[_0] 311s | parsing 'aes_ctr256' for ESP 311s | proposal: 'aes_ctr256' 311s | token: '' '' "aes_ctr256" '' 311s | token: '' "aes_ctr256" '' '' 311s | ike_alg_byname() failed: ESP encryption algorithm 'aes_ctr256' is not recognized 311s | token: '' '' '' 311s | appending ESP encryption algorithm AES_CTR[_256] 311s | appending ESP integrity algorithm HMAC_SHA2_512_256[_0] 311s | appending ESP integrity algorithm HMAC_SHA2_256_128[_0] 311s | parsing 'camellia_cbc_256-hmac_sha2_512_256;modp8192' for ESP 311s | proposal: 'camellia_cbc_256-hmac_sha2_512_256;modp8192' 311s | token: '' '' "camellia_cbc_256" '-' 311s | token: '' "camellia_cbc_256" '-' "hmac_sha2_512_256" ';' 311s | ike_alg_byname() failed: ESP encryption algorithm 'camellia_cbc_256' is not recognized 311s | token: '-' "hmac_sha2_512_256" ';' "modp8192" '' 311s | appending ESP encryption algorithm CAMELLIA_CBC[_256] 311s | parsing integ: 311s | appending ESP integrity algorithm HMAC_SHA2_512_256[_0] 311s | token: ';' "modp8192" '' '' 311s | parsing dh: 311s | appending ESP DH algorithm MODP8192[_0] 311s | token: '' '' '' 311s ipsec algparse: ignoring ESP DH algorithm MODP8192 as PFS policy is disabled 311s | parsing 'null_auth_aes_gmac_256-null;modp8192' for ESP 311s | proposal: 'null_auth_aes_gmac_256-null;modp8192' 311s | token: '' '' "null_auth_aes_gmac_256" '-' 311s | token: '' "null_auth_aes_gmac_256" '-' "null" ';' 311s | ike_alg_byname() failed: ESP encryption algorithm 'null_auth_aes_gmac_256' is not recognized 311s | token: '-' "null" ';' "modp8192" '' 311s | appending ESP encryption algorithm NULL_AUTH_AES_GMAC[_256] 311s | parsing integ: 311s | appending ESP integrity algorithm NONE[_0] 311s | token: ';' "modp8192" '' '' 311s | parsing dh: 311s | appending ESP DH algorithm MODP8192[_0] 311s | token: '' '' '' 311s ipsec algparse: ignoring ESP DH algorithm MODP8192 as PFS policy is disabled 311s | parsing '3des-sha1;modp8192' for ESP 311s | proposal: '3des-sha1;modp8192' 311s | token: '' '' "3des" '-' 311s | token: '' "3des" '-' "sha1" ';' 311s | token: '-' "sha1" ';' "modp8192" '' 311s | appending ESP encryption algorithm 3DES_CBC[_0] 311s | parsing integ: 311s | appending ESP integrity algorithm HMAC_SHA1_96[_0] 311s | token: ';' "modp8192" '' '' 311s | parsing dh: 311s | appending ESP DH algorithm MODP8192[_0] 311s | token: '' '' '' 311s ipsec algparse: ignoring ESP DH algorithm MODP8192 as PFS policy is disabled 311s | parsing '3des-sha1-modp8192' for ESP 311s | proposal: '3des-sha1-modp8192' 311s | token: '' '' "3des" '-' 311s | token: '' "3des" '-' "sha1" '-' 311s | token: '-' "sha1" '-' "modp8192" '' 311s | appending ESP encryption algorithm 3DES_CBC[_0] 311s | parsing integ: 311s | appending ESP integrity algorithm HMAC_SHA1_96[_0] 311s | token: '-' "modp8192" '' '' 311s | parsing dh: 311s | appending ESP DH algorithm MODP8192[_0] 311s | token: '' '' '' 311s ipsec algparse: ignoring ESP DH algorithm MODP8192 as PFS policy is disabled 311s | parsing 'aes-sha1,3des-sha1;modp8192' for ESP 311s | proposal: 'aes-sha1' 311s | token: '' '' "aes" '-' 311s | token: '' "aes" '-' "sha1" '' 311s | token: '-' "sha1" '' '' 311s | appending ESP encryption algorithm AES_CBC[_0] 311s | parsing integ: 311s | appending ESP integrity algorithm HMAC_SHA1_96[_0] 311s | token: '' '' '' 311s | proposal: '3des-sha1;modp8192' 311s | token: '' '' "3des" '-' 311s | token: '' "3des" '-' "sha1" ';' 311s | token: '-' "sha1" ';' "modp8192" '' 311s | appending ESP encryption algorithm 3DES_CBC[_0] 311s | parsing integ: 311s | appending ESP integrity algorithm HMAC_SHA1_96[_0] 311s | token: ';' "modp8192" '' '' 311s | parsing dh: 311s | appending ESP DH algorithm MODP8192[_0] 311s | token: '' '' '' 311s ipsec algparse: ignoring ESP DH algorithm MODP8192 as PFS policy is disabled 311s | parsing 'aes-sha1-modp8192,3des-sha1-modp8192' for ESP 311s | proposal: 'aes-sha1-modp8192' 311s | token: '' '' "aes" '-' 311s | token: '' "aes" '-' "sha1" '-' 311s | token: '-' "sha1" '-' "modp8192" '' 311s | appending ESP encryption algorithm AES_CBC[_0] 311s | parsing integ: 311s | appending ESP integrity algorithm HMAC_SHA1_96[_0] 311s | token: '-' "modp8192" '' '' 311s | parsing dh: 311s | appending ESP DH algorithm MODP8192[_0] 311s | token: '' '' '' 311s | proposal: '3des-sha1-modp8192' 311s | token: '' '' "3des" '-' 311s | token: '' "3des" '-' "sha1" '-' 311s | token: '-' "sha1" '-' "modp8192" '' 311s | appending ESP encryption algorithm 3DES_CBC[_0] 311s | parsing integ: 311s | appending ESP integrity algorithm HMAC_SHA1_96[_0] 311s | token: '-' "modp8192" '' '' 311s | parsing dh: 311s | appending ESP DH algorithm MODP8192[_0] 311s | token: '' '' '' 311s ipsec algparse: ignoring ESP DH algorithm MODP8192 as PFS policy is disabled 311s ipsec algparse: ignoring ESP DH algorithm MODP8192 as PFS policy is disabled 311s | parsing 'aes-sha1-modp8192,aes-sha1-modp8192,aes-sha1-modp8192' for ESP 311s | proposal: 'aes-sha1-modp8192' 311s | token: '' '' "aes" '-' 311s | token: '' "aes" '-' "sha1" '-' 311s | token: '-' "sha1" '-' "modp8192" '' 311s | appending ESP encryption algorithm AES_CBC[_0] 311s | parsing integ: 311s | appending ESP integrity algorithm HMAC_SHA1_96[_0] 311s | token: '-' "modp8192" '' '' 311s | parsing dh: 311s | appending ESP DH algorithm MODP8192[_0] 311s | token: '' '' '' 311s | proposal: 'aes-sha1-modp8192' 311s | token: '' '' "aes" '-' 311s | token: '' "aes" '-' "sha1" '-' 311s | token: '-' "sha1" '-' "modp8192" '' 311s | appending ESP encryption algorithm AES_CBC[_0] 311s | parsing integ: 311s | appending ESP integrity algorithm HMAC_SHA1_96[_0] 311s | token: '-' "modp8192" '' '' 311s | parsing dh: 311s | appending ESP DH algorithm MODP8192[_0] 311s | token: '' '' '' 311s | proposal: 'aes-sha1-modp8192' 311s | token: '' '' "aes" '-' 311s | token: '' "aes" '-' "sha1" '-' 311s | token: '-' "sha1" '-' "modp8192" '' 311s | appending ESP encryption algorithm AES_CBC[_0] 311s | parsing integ: 311s | appending ESP integrity algorithm HMAC_SHA1_96[_0] 311s | token: '-' "modp8192" '' '' 311s | parsing dh: 311s | appending ESP DH algorithm MODP8192[_0] 311s | token: '' '' '' 311s ipsec algparse: ignoring ESP DH algorithm MODP8192 as PFS policy is disabled 311s | parsing 'aes;none' for ESP 311s | proposal: 'aes;none' 311s | token: '' '' "aes" ';' 311s | token: '' "aes" ';' "none" '' 311s | token: ';' "none" '' '' 311s | appending ESP encryption algorithm AES_CBC[_0] 311s | parsing dh: 311s | appending ESP DH algorithm NONE[_0] 311s | token: '' '' '' 311s | appending ESP integrity algorithm HMAC_SHA2_512_256[_0] 311s | appending ESP integrity algorithm HMAC_SHA2_256_128[_0] 311s ipsec algparse: ignoring redundant ESP DH algorithm NONE as PFS policy is disabled 311s | parsing 'aes;none,aes' for ESP 311s | proposal: 'aes;none' 311s | token: '' '' "aes" ';' 311s | token: '' "aes" ';' "none" '' 311s | token: ';' "none" '' '' 311s | appending ESP encryption algorithm AES_CBC[_0] 311s | parsing dh: 311s | appending ESP DH algorithm NONE[_0] 311s | token: '' '' '' 311s | appending ESP integrity algorithm HMAC_SHA2_512_256[_0] 311s | appending ESP integrity algorithm HMAC_SHA2_256_128[_0] 311s | proposal: 'aes' 311s | token: '' '' "aes" '' 311s | token: '' "aes" '' '' 311s | token: '' '' '' 311s | appending ESP encryption algorithm AES_CBC[_0] 311s | appending ESP integrity algorithm HMAC_SHA2_512_256[_0] 311s | appending ESP integrity algorithm HMAC_SHA2_256_128[_0] 311s ipsec algparse: ignoring redundant ESP DH algorithm NONE as PFS policy is disabled 311s | parsing 'aes;none,aes;modp2048' for ESP 311s | proposal: 'aes;none' 311s | token: '' '' "aes" ';' 311s | token: '' "aes" ';' "none" '' 311s | token: ';' "none" '' '' 311s | appending ESP encryption algorithm AES_CBC[_0] 311s | parsing dh: 311s | appending ESP DH algorithm NONE[_0] 311s | token: '' '' '' 311s | appending ESP integrity algorithm HMAC_SHA2_512_256[_0] 311s | appending ESP integrity algorithm HMAC_SHA2_256_128[_0] 311s | proposal: 'aes;modp2048' 311s | token: '' '' "aes" ';' 311s | token: '' "aes" ';' "modp2048" '' 311s | token: ';' "modp2048" '' '' 311s | appending ESP encryption algorithm AES_CBC[_0] 311s | parsing dh: 311s | appending ESP DH algorithm MODP2048[_0] 311s | token: '' '' '' 311s | appending ESP integrity algorithm HMAC_SHA2_512_256[_0] 311s | appending ESP integrity algorithm HMAC_SHA2_256_128[_0] 311s ipsec algparse: ignoring redundant ESP DH algorithm NONE as PFS policy is disabled 311s ipsec algparse: ignoring ESP DH algorithm MODP2048 as PFS policy is disabled 311s | parsing 'aes-sha1-none' for ESP 311s | proposal: 'aes-sha1-none' 311s | token: '' '' "aes" '-' 311s | token: '' "aes" '-' "sha1" '-' 311s | token: '-' "sha1" '-' "none" '' 311s | appending ESP encryption algorithm AES_CBC[_0] 311s | parsing integ: 311s | appending ESP integrity algorithm HMAC_SHA1_96[_0] 311s | token: '-' "none" '' '' 311s | parsing dh: 311s | appending ESP DH algorithm NONE[_0] 311s | token: '' '' '' 311s ipsec algparse: ignoring redundant ESP DH algorithm NONE as PFS policy is disabled 311s | parsing 'aes-sha1;none' for ESP 311s | proposal: 'aes-sha1;none' 311s | token: '' '' "aes" '-' 311s | token: '' "aes" '-' "sha1" ';' 311s | token: '-' "sha1" ';' "none" '' 311s | appending ESP encryption algorithm AES_CBC[_0] 311s | parsing integ: 311s | appending ESP integrity algorithm HMAC_SHA1_96[_0] 311s | token: ';' "none" '' '' 311s | parsing dh: 311s | appending ESP DH algorithm NONE[_0] 311s | token: '' '' '' 311s ipsec algparse: ignoring redundant ESP DH algorithm NONE as PFS policy is disabled 311s | parsing '3des168-sha1' for ESP 311s | proposal: '3des168-sha1' 311s | token: '' '' "3des168" '-' 311s | token: '' "3des168" '-' "sha1" '' 311s | ike_alg_byname() failed: ESP encryption algorithm '3des168' is not recognized 311s | parsing '3des-null' for ESP 311s | proposal: '3des-null' 311s | token: '' '' "3des" '-' 311s | token: '' "3des" '-' "null" '' 311s | token: '-' "null" '' '' 311s | appending ESP encryption algorithm 3DES_CBC[_0] 311s | parsing integ: 311s | appending ESP integrity algorithm NONE[_0] 311s | token: '' '' '' 311s | parsing 'aes128-null' for ESP 311s | proposal: 'aes128-null' 311s | token: '' '' "aes128" '-' 311s | token: '' "aes128" '-' "null" '' 311s | ike_alg_byname() failed: ESP encryption algorithm 'aes128' is not recognized 311s | token: '-' "null" '' '' 311s | appending ESP encryption algorithm AES_CBC[_128] 311s | parsing integ: 311s | appending ESP integrity algorithm NONE[_0] 311s | token: '' '' '' 311s | parsing 'aes224-sha1' for ESP 311s | proposal: 'aes224-sha1' 311s | token: '' '' "aes224" '-' 311s | token: '' "aes224" '-' "sha1" '' 311s | ike_alg_byname() failed: ESP encryption algorithm 'aes224' is not recognized 311s | parsing 'aes-224-sha1' for ESP 311s | proposal: 'aes-224-sha1' 311s | token: '' '' "aes" '-' 311s | token: '' "aes" '-' "224" '-' 311s | byname('aes') with ='224' failed: ESP encryption algorithm AES_CBC with key length 224 invalid; valid key lengths: 128, 192, 256 311s | parsing 'aes0-sha1' for ESP 311s | proposal: 'aes0-sha1' 311s | token: '' '' "aes0" '-' 311s | token: '' "aes0" '-' "sha1" '' 311s | ike_alg_byname() failed: ESP encryption algorithm 'aes0' is not recognized 311s | parsing 'aes-0-sha1' for ESP 311s | proposal: 'aes-0-sha1' 311s | token: '' '' "aes" '-' 311s | token: '' "aes" '-' "0" '-' 311s | parsing 'aes512-sha1' for ESP 311s | proposal: 'aes512-sha1' 311s | token: '' '' "aes512" '-' 311s | token: '' "aes512" '-' "sha1" '' 311s | ike_alg_byname() failed: ESP encryption algorithm 'aes512' is not recognized 311s | parsing 'aes-sha1555' for ESP 311s | proposal: 'aes-sha1555' 311s | token: '' '' "aes" '-' 311s | token: '' "aes" '-' "sha1555" '' 311s | token: '-' "sha1555" '' '' 311s | appending ESP encryption algorithm AES_CBC[_0] 311s | parsing integ: 311s | ike_alg_byname() failed: ESP integrity algorithm 'sha1555' is not recognized 311s | lookup for integrity algorithm 'sha1555' failed 311s | or - failed 'ESP integrity algorithm 'sha1555' is not recognized') 311s | parsing 'camellia666-sha1' for ESP 311s | proposal: 'camellia666-sha1' 311s | token: '' '' "camellia666" '-' 311s | token: '' "camellia666" '-' "sha1" '' 311s | ike_alg_byname() failed: ESP encryption algorithm 'camellia666' is not recognized 311s | parsing 'blowfish' for ESP 311s | proposal: 'blowfish' 311s | token: '' '' "blowfish" '' 311s | token: '' "blowfish" '' '' 311s | ike_alg_byname() failed: ESP encryption algorithm 'blowfish' is not supported 311s | parsing 'des-sha1' for ESP 311s | proposal: 'des-sha1' 311s | token: '' '' "des" '-' 311s | token: '' "des" '-' "sha1" '' 311s | ike_alg_byname() failed: ESP encryption algorithm 'des' is not supported 311s | parsing 'aes_ctr666' for ESP 311s | proposal: 'aes_ctr666' 311s | token: '' '' "aes_ctr666" '' 311s | token: '' "aes_ctr666" '' '' 311s | ike_alg_byname() failed: ESP encryption algorithm 'aes_ctr666' is not recognized 311s | parsing 'aes128-sha2_128' for ESP 311s | proposal: 'aes128-sha2_128' 311s | token: '' '' "aes128" '-' 311s | token: '' "aes128" '-' "sha2_128" '' 311s | ike_alg_byname() failed: ESP encryption algorithm 'aes128' is not recognized 311s | token: '-' "sha2_128" '' '' 311s | appending ESP encryption algorithm AES_CBC[_128] 311s | parsing integ: 311s | ike_alg_byname() failed: ESP integrity algorithm 'sha2_128' is not recognized 311s | lookup for integrity algorithm 'sha2_128' failed 311s | or - failed 'ESP integrity algorithm 'sha2_128' is not recognized') 311s | parsing 'aes256-sha2_256-4096' for ESP 311s | proposal: 'aes256-sha2_256-4096' 311s | token: '' '' "aes256" '-' 311s | token: '' "aes256" '-' "sha2_256" '-' 311s | ike_alg_byname() failed: ESP encryption algorithm 'aes256' is not recognized 311s | token: '-' "sha2_256" '-' "4096" '' 311s | appending ESP encryption algorithm AES_CBC[_256] 311s | parsing integ: 311s | appending ESP integrity algorithm HMAC_SHA2_256_128[_0] 311s | token: '-' "4096" '' '' 311s | parsing dh: 311s | ike_alg_byname() failed: ESP DH algorithm '4096' is not recognized 311s | lookup for DH algorithm '4096' failed 311s | ... failed 'ESP DH algorithm '4096' is not recognized' 311s | parsing 'aes256-sha2_256-128' for ESP 311s | proposal: 'aes256-sha2_256-128' 311s | token: '' '' "aes256" '-' 311s | token: '' "aes256" '-' "sha2_256" '-' 311s | ike_alg_byname() failed: ESP encryption algorithm 'aes256' is not recognized 311s | token: '-' "sha2_256" '-' "128" '' 311s | appending ESP encryption algorithm AES_CBC[_256] 311s | parsing integ: 311s | appending ESP integrity algorithm HMAC_SHA2_256_128[_0] 311s | token: '-' "128" '' '' 311s | parsing dh: 311s | ike_alg_byname() failed: ESP DH algorithm '128' is not recognized 311s | lookup for DH algorithm '128' failed 311s | ... failed 'ESP DH algorithm '128' is not recognized' 311s | parsing 'vanitycipher' for ESP 311s | proposal: 'vanitycipher' 311s | token: '' '' "vanitycipher" '' 311s | token: '' "vanitycipher" '' '' 311s | ike_alg_byname() failed: ESP encryption algorithm 'vanitycipher' is not recognized 311s | parsing 'ase-sah' for ESP 311s | proposal: 'ase-sah' 311s | token: '' '' "ase" '-' 311s | token: '' "ase" '-' "sah" '' 311s | ike_alg_byname() failed: ESP encryption algorithm 'ase' is not recognized 311s | parsing 'aes-sah1' for ESP 311s | proposal: 'aes-sah1' 311s | token: '' '' "aes" '-' 311s | token: '' "aes" '-' "sah1" '' 311s ERROR: ESP integrity algorithm 'sah1' is not recognized 311s algparse -v2 'esp=id3' (expect ERROR) 311s ERROR: ESP encryption algorithm 'id3' is not recognized 311s algparse -v2 'esp=aes-id3' (expect ERROR) 311s ERROR: ESP integrity algorithm 'id3' is not recognized 311s algparse -v2 'esp=aes_gcm-md5' (expect ERROR) 311s ERROR: AEAD ESP encryption algorithm AES_GCM_16 must have 'NONE' as the integrity algorithm 311s algparse -v2 'esp=mars' (expect ERROR) 311s ERROR: ESP encryption algorithm 'mars' is not supported 311s algparse -v2 'esp=aes_gcm-16' (expect ERROR) 311s ERROR: ESP encryption algorithm AES_GCM_16 with key length 16 invalid; valid key lengths: 128, 192, 256 311s algparse -v2 'esp=aes_gcm-0' (expect ERROR) 311s ERROR: ESP encryption key length is zero 311s algparse -v2 'esp=aes_gcm-123456789012345' (expect ERROR) 311s ERROR: ESP encryption algorithm 'aes_gcm-123456789012345' key length WAY too big 311s algparse -v2 'esp=3des-sha1;dh22' (expect ERROR) 311s ERROR: ESP DH algorithm 'dh22' is not supported 311s algparse -v2 'esp=3des-sha1;modp8192,3des-sha2' (expect SUCCESS) 311s 3DES_CBC-HMAC_SHA1_96 311s 3DES_CBC-HMAC_SHA2_256_128 311s algparse -v2 'esp=3des-sha1-modp8192,3des-sha2' (expect SUCCESS) 311s 3DES_CBC-HMAC_SHA1_96 311s 3DES_CBC-HMAC_SHA2_256_128 311s algparse -v2 'esp=3des-sha1-modp8192,3des-sha2-modp8192' (expect SUCCESS) 311s 3DES_CBC-HMAC_SHA1_96 311s 3DES_CBC-HMAC_SHA2_256_128 311s algparse -v2 'esp=3des-sha1-modp8192,3des-sha2;modp8192' (expect SUCCESS) 311s 3DES_CBC-HMAC_SHA1_96 311s 3DES_CBC-HMAC_SHA2_256_128 311s algparse -v2 'esp=3des-sha1;modp8192,3des-sha2-modp8192' (expect SUCCESS) 311s 3DES_CBC-HMAC_SHA1_96 311s 3DES_CBC-HMAC_SHA2_256_128 311s algparse -v2 'esp=3des-sha1;modp8192,3des-sha2;modp8192' (expect SUCCESS) 311s 3DES_CBC-HMAC_SHA1_96 311s 3DES_CBC-HMAC_SHA2_256_128 311s algparse -v2 'esp=3des-sha1-modp8192,3des-sha2-modp2048' (expect SUCCESS) 311s 3DES_CBC-HMAC_SHA1_96 311s 3DES_CBC-HMAC_SHA2_256_128 311s algparse -v2 'ah' (expect SUCCESS) 311s HMAC_SHA2_512_256 311s HMAC_SHA2_256_128 311s algparse -v2 'ah=' (expect ERROR) 311s ERROR: AH proposal is empty 311s algparse -v2 'ah=md5' (expect SUCCESS) 311s HMAC_MD5_96 311s algparse -v2 'ah=sha' (expect SUCCESS) 311s HMAC_SHA1_96 311s algparse -v2 'ah=sha;modp2048' (expect SUCCESS) 311s HMAC_SHA1_96 311s algparse -v2 'ah=sha1' (expect SUCCESS) 311s HMAC_SHA1_96 311s algparse -v2 'ah=sha2' (expect SUCCESS) 311s HMAC_SHA2_256_128 311s algparse -v2 'ah=sha256' (expect SUCCESS) 311s HMAC_SHA2_256_128 311s algparse -v2 'ah=sha384' (expect SUCCESS) 311s HMAC_SHA2_384_192 311s algparse -v2 'ah=sha512' (expect SUCCESS) 311s HMAC_SHA2_512_256 311s algparse -v2 'ah=sha2_256' (expect SUCCESS) 311s HMAC_SHA2_256_128 311s algparse -v2 'ah=sha2_384' (expect SUCCESS) 311s HMAC_SHA2_384_192 311s algparse -v2 'ah=sha2_512' (expect SUCCESS) 311s HMAC_SHA2_512_256 311s algparse -v2 'ah=aes_xcbc' (expect SUCCESS) 311s AES_XCBC_96 311s algparse -v2 'ah=sha2-none' (expect SUCCESS) 311s HMAC_SHA2_256_128 311s algparse -v2 'ah=sha2;none' (expect SUCCESS) 311s HMAC_SHA2_256_128 311s algparse -v2 'ah=sha1-modp8192,sha1-modp8192,sha1-modp8192' (expect SUCCESS) 311s HMAC_SHA1_96 311s algparse -v2 'ah=aes-sha1' (expect ERROR) 311s ERROR: AH integrity algorithm 'aes' is not recognized 311s algparse -v2 'ah=vanityhash1' (expect ERROR) 311s ERROR: AH integrity algorithm 'vanityhash1' is not recognized 311s algparse -v2 'ah=aes_gcm_c-256' (expect ERROR) 311s ERROR: AH integrity algorithm 'aes_gcm_c' is not recognized 311s algparse -v2 'ah=id3' (expect ERROR) 311s ERROR: AH integrity algorithm 'id3' is not recognized 311s algparse -v2 'ah=3des' (expect ERROR) 311s ERROR: AH integrity algorithm '3des' is not recognized 311s algparse -v2 'ah=null' (expect ERROR) 311s ERROR: AH cannot have 'none' as the integrity algorithm 311s algparse -v2 'ah=aes_gcm' (expect ERROR) 311s ERROR: AH integrity algorithm 'aes_gcm' is not recognized 311s algparse -v2 'ah=aes_ccm' (expect ERROR) 311s ERROR: AH integrity algorithm 'aes_ccm' is not recognized 311s algparse -v2 'ah=ripemd' (expect ERROR) 311s ERROR: AH integrity algorithm 'ripemd' is not recognized 311s algparse -v2 'ike' (expect SUCCESS) 311s AES_GCM_16_256-HMAC_SHA2_512+HMAC_SHA2_256-DH19+DH20+DH21+DH31+MODP4096+MODP3072+MODP2048+MODP8192 311s AES_GCM_16_128-HMAC_SHA2_512+HMAC_SHA2_256-DH19+DH20+DH21+DH31+MODP4096+MODP3072+MODP2048+MODP8192 311s CHACHA20_POLY1305-HMAC_SHA2_512+HMAC_SHA2_256-DH19+DH20+DH21+DH31+MODP4096+MODP3072+MODP2048+MODP8192 311s AES_CBC_256-HMAC_SHA2_512+HMAC_SHA2_256-DH19+DH20+DH21+DH31+MODP4096+MODP3072+MODP2048+MODP8192 311s AES_CBC_128-HMAC_SHA2_512+HMAC_SHA2_256-DH19+DH20+DH21+DH31+MODP4096+MODP3072+MODP2048+MODP8192 311s algparse -v2 'ike=' (expect ERROR) 311s ERROR: IKE proposal is empty 311s algparse -v2 'ike=3des-sha1' (expect SUCCESS) 311s 3DES_CBC-HMAC_SHA1-DH19+DH20+DH21+DH31+MODP4096+MODP3072+MODP2048+MODP8192 311s algparse -v2 'ike=3des-sha1' (expect SUCCESS) 311s 3DES_CBC-HMAC_SHA1-DH19+DH20+DH21+DH31+MODP4096+MODP3072+MODP2048+MODP8192 311s algparse -v2 'ike=3des-sha1;modp1536' (expect SUCCESS) 311s 3DES_CBC-HMAC_SHA1-MODP1536 311s algparse -v2 'ike=3des;dh21' (expect SUCCESS) 311s 3DES_CBC-HMAC_SHA2_512+HMAC_SHA2_256-DH21 311s algparse -v2 'ike=3des-sha1;dh21' (expect SUCCESS) 311s 3DES_CBC-HMAC_SHA1-DH21 311s algparse -v2 'ike=3des-sha1-ecp_521' (expect SUCCESS) 311s 3DES_CBC-HMAC_SHA1-DH21 311s algparse -v2 'ike=3des+aes' (expect SUCCESS) 311s 3DES_CBC+AES_CBC-HMAC_SHA2_512+HMAC_SHA2_256-DH19+DH20+DH21+DH31+MODP4096+MODP3072+MODP2048+MODP8192 311s algparse -v2 'ike=aes;none' (expect ERROR) 311s ERROR: IKE DH algorithm 'none' not permitted 311s algparse -v2 'ike=id2' (expect ERROR) 311s ERROR: IKE encryption algorithm 'id2' is not recognized 311s algparse -v2 'ike=3des-id2' (expect ERROR) 311s ERROR: IKE PRF algorithm 'id2' is not recognized 311s algparse -v2 'ike=aes_ccm' (expect ERROR) 311s ERROR: IKE encryption algorithm 'aes_ccm' is not supported 311s algparse -v2 'ike=aes-sha1-sha2-ecp_521' (expect ERROR) 311s ERROR: IKE DH algorithm 'sha2' is not recognized 311s algparse -v2 'ike=aes-sha2-sha2;ecp_521' (expect ERROR) 311s ERROR: IKE DH algorithm 'sha2' is not recognized 311s algparse -v2 'ike=aes-sha1_96-sha2-ecp_521' (expect SUCCESS) 311s AES_CBC-HMAC_SHA1_96-HMAC_SHA2_256-DH21 311s algparse -v2 'ike=aes-sha1_96-sha2;ecp_521' (expect SUCCESS) 311s AES_CBC-HMAC_SHA1_96-HMAC_SHA2_256-DH21 311s algparse -v2 'ike=aes+aes-sha1+sha1-modp8192+modp8192' (expect SUCCESS) 311s AES_CBC-HMAC_SHA1-MODP8192 311s algparse -v2 'ike=3des+aes+aes-sha2+sha1+sha1-modp4096+modp8192+modp8192' (expect SUCCESS) 311s 3DES_CBC+AES_CBC-HMAC_SHA2_256+HMAC_SHA1-MODP4096+MODP8192 311s algparse -v2 'ike=aes+3des+aes-sha1+sha2+sha1-modp8192+modp4096+modp8192' (expect SUCCESS) 311s AES_CBC+3DES_CBC-HMAC_SHA1+HMAC_SHA2_256-MODP8192+MODP4096 311s algparse -v2 'ike=aes+aes+3des-sha1+sha1+sha2-modp8192+modp8192+modp4096' (expect SUCCESS) 311s AES_CBC+3DES_CBC-HMAC_SHA1+HMAC_SHA2_256-MODP8192+MODP4096 311s algparse -v2 'ike=aes+aes128+aes256' (expect SUCCESS) 311s AES_CBC-HMAC_SHA2_512+HMAC_SHA2_256-DH19+DH20+DH21+DH31+MODP4096+MODP3072+MODP2048+MODP8192 311s algparse -v2 'ike=aes128+aes+aes256' (expect SUCCESS) 311s AES_CBC_128+AES_CBC-HMAC_SHA2_512+HMAC_SHA2_256-DH19+DH20+DH21+DH31+MODP4096+MODP3072+MODP2048+MODP8192 311s algparse -v2 'ike=aes128+aes256+aes' (expect SUCCESS) 311s | token: '-' "sah1" '' '' 311s | appending ESP encryption algorithm AES_CBC[_0] 311s | parsing integ: 311s | ike_alg_byname() failed: ESP integrity algorithm 'sah1' is not recognized 311s | lookup for integrity algorithm 'sah1' failed 311s | or - failed 'ESP integrity algorithm 'sah1' is not recognized') 311s | parsing 'id3' for ESP 311s | proposal: 'id3' 311s | token: '' '' "id3" '' 311s | token: '' "id3" '' '' 311s | ike_alg_byname() failed: ESP encryption algorithm 'id3' is not recognized 311s | ike_alg_byname() failed: ESP encryption algorithm 'id3' is not recognized 311s | parsing 'aes-id3' for ESP 311s | proposal: 'aes-id3' 311s | token: '' '' "aes" '-' 311s | token: '' "aes" '-' "id3" '' 311s | token: '-' "id3" '' '' 311s | appending ESP encryption algorithm AES_CBC[_0] 311s | parsing integ: 311s | ike_alg_byname() failed: ESP integrity algorithm 'id3' is not recognized 311s | lookup for integrity algorithm 'id3' failed 311s | or - failed 'ESP integrity algorithm 'id3' is not recognized') 311s | parsing 'aes_gcm-md5' for ESP 311s | proposal: 'aes_gcm-md5' 311s | token: '' '' "aes_gcm" '-' 311s | token: '' "aes_gcm" '-' "md5" '' 311s | token: '-' "md5" '' '' 311s | appending ESP encryption algorithm AES_GCM_16[_0] 311s | parsing integ: 311s | appending ESP integrity algorithm HMAC_MD5_96[_0] 311s | token: '' '' '' 311s | parsing 'mars' for ESP 311s | proposal: 'mars' 311s | token: '' '' "mars" '' 311s | token: '' "mars" '' '' 311s | ike_alg_byname() failed: ESP encryption algorithm 'mars' is not supported 311s | parsing 'aes_gcm-16' for ESP 311s | proposal: 'aes_gcm-16' 311s | token: '' '' "aes_gcm" '-' 311s | token: '' "aes_gcm" '-' "16" '' 311s | byname('aes_gcm') with ='16' failed: ESP encryption algorithm AES_GCM_16 with key length 16 invalid; valid key lengths: 128, 192, 256 311s | parsing 'aes_gcm-0' for ESP 311s | proposal: 'aes_gcm-0' 311s | token: '' '' "aes_gcm" '-' 311s | token: '' "aes_gcm" '-' "0" '' 311s | parsing 'aes_gcm-123456789012345' for ESP 311s | proposal: 'aes_gcm-123456789012345' 311s | token: '' '' "aes_gcm" '-' 311s | token: '' "aes_gcm" '-' "123456789012345" '' 311s | parsing '3des-sha1;dh22' for ESP 311s | proposal: '3des-sha1;dh22' 311s | token: '' '' "3des" '-' 311s | token: '' "3des" '-' "sha1" ';' 311s | token: '-' "sha1" ';' "dh22" '' 311s | appending ESP encryption algorithm 3DES_CBC[_0] 311s | parsing integ: 311s | appending ESP integrity algorithm HMAC_SHA1_96[_0] 311s | token: ';' "dh22" '' '' 311s | parsing dh: 311s | ike_alg_byname() failed: ESP DH algorithm 'dh22' is not supported 311s | lookup for DH algorithm 'dh22' failed 311s | ... failed 'ESP DH algorithm 'dh22' is not supported' 311s | parsing '3des-sha1;modp8192,3des-sha2' for ESP 311s | proposal: '3des-sha1;modp8192' 311s | token: '' '' "3des" '-' 311s | token: '' "3des" '-' "sha1" ';' 311s | token: '-' "sha1" ';' "modp8192" '' 311s | appending ESP encryption algorithm 3DES_CBC[_0] 311s | parsing integ: 311s | appending ESP integrity algorithm HMAC_SHA1_96[_0] 311s | token: ';' "modp8192" '' '' 311s | parsing dh: 311s | appending ESP DH algorithm MODP8192[_0] 311s | token: '' '' '' 311s | proposal: '3des-sha2' 311s | token: '' '' "3des" '-' 311s | token: '' "3des" '-' "sha2" '' 311s | token: '-' "sha2" '' '' 311s | appending ESP encryption algorithm 3DES_CBC[_0] 311s | parsing integ: 311s | appending ESP integrity algorithm HMAC_SHA2_256_128[_0] 311s | token: '' '' '' 311s ipsec algparse: ignoring ESP DH algorithm MODP8192 as PFS policy is disabled 311s | parsing '3des-sha1-modp8192,3des-sha2' for ESP 311s | proposal: '3des-sha1-modp8192' 311s | token: '' '' "3des" '-' 311s | token: '' "3des" '-' "sha1" '-' 311s | token: '-' "sha1" '-' "modp8192" '' 311s | appending ESP encryption algorithm 3DES_CBC[_0] 311s | parsing integ: 311s | appending ESP integrity algorithm HMAC_SHA1_96[_0] 311s | token: '-' "modp8192" '' '' 311s | parsing dh: 311s | appending ESP DH algorithm MODP8192[_0] 311s | token: '' '' '' 311s | proposal: '3des-sha2' 311s | token: '' '' "3des" '-' 311s | token: '' "3des" '-' "sha2" '' 311s | token: '-' "sha2" '' '' 311s | appending ESP encryption algorithm 3DES_CBC[_0] 311s | parsing integ: 311s | appending ESP integrity algorithm HMAC_SHA2_256_128[_0] 311s | token: '' '' '' 311s ipsec algparse: ignoring ESP DH algorithm MODP8192 as PFS policy is disabled 311s | parsing '3des-sha1-modp8192,3des-sha2-modp8192' for ESP 311s | proposal: '3des-sha1-modp8192' 311s | token: '' '' "3des" '-' 311s | token: '' "3des" '-' "sha1" '-' 311s | token: '-' "sha1" '-' "modp8192" '' 311s | appending ESP encryption algorithm 3DES_CBC[_0] 311s | parsing integ: 311s | appending ESP integrity algorithm HMAC_SHA1_96[_0] 311s | token: '-' "modp8192" '' '' 311s | parsing dh: 311s | appending ESP DH algorithm MODP8192[_0] 311s | token: '' '' '' 311s | proposal: '3des-sha2-modp8192' 311s | token: '' '' "3des" '-' 311s | token: '' "3des" '-' "sha2" '-' 311s | token: '-' "sha2" '-' "modp8192" '' 311s | appending ESP encryption algorithm 3DES_CBC[_0] 311s | parsing integ: 311s | appending ESP integrity algorithm HMAC_SHA2_256_128[_0] 311s | token: '-' "modp8192" '' '' 311s | parsing dh: 311s | appending ESP DH algorithm MODP8192[_0] 311s | token: '' '' '' 311s ipsec algparse: ignoring ESP DH algorithm MODP8192 as PFS policy is disabled 311s ipsec algparse: ignoring ESP DH algorithm MODP8192 as PFS policy is disabled 311s | parsing '3des-sha1-modp8192,3des-sha2;modp8192' for ESP 311s | proposal: '3des-sha1-modp8192' 311s | token: '' '' "3des" '-' 311s | token: '' "3des" '-' "sha1" '-' 311s | token: '-' "sha1" '-' "modp8192" '' 311s | appending ESP encryption algorithm 3DES_CBC[_0] 311s | parsing integ: 311s | appending ESP integrity algorithm HMAC_SHA1_96[_0] 311s | token: '-' "modp8192" '' '' 311s | parsing dh: 311s | appending ESP DH algorithm MODP8192[_0] 311s | token: '' '' '' 311s | proposal: '3des-sha2;modp8192' 311s | token: '' '' "3des" '-' 311s | token: '' "3des" '-' "sha2" ';' 311s | token: '-' "sha2" ';' "modp8192" '' 311s | appending ESP encryption algorithm 3DES_CBC[_0] 311s | parsing integ: 311s | appending ESP integrity algorithm HMAC_SHA2_256_128[_0] 311s | token: ';' "modp8192" '' '' 311s | parsing dh: 311s | appending ESP DH algorithm MODP8192[_0] 311s | token: '' '' '' 311s ipsec algparse: ignoring ESP DH algorithm MODP8192 as PFS policy is disabled 311s ipsec algparse: ignoring ESP DH algorithm MODP8192 as PFS policy is disabled 311s | parsing '3des-sha1;modp8192,3des-sha2-modp8192' for ESP 311s | proposal: '3des-sha1;modp8192' 311s | token: '' '' "3des" '-' 311s | token: '' "3des" '-' "sha1" ';' 311s | token: '-' "sha1" ';' "modp8192" '' 311s | appending ESP encryption algorithm 3DES_CBC[_0] 311s | parsing integ: 311s | appending ESP integrity algorithm HMAC_SHA1_96[_0] 311s | token: ';' "modp8192" '' '' 311s | parsing dh: 311s | appending ESP DH algorithm MODP8192[_0] 311s | token: '' '' '' 311s | proposal: '3des-sha2-modp8192' 311s | token: '' '' "3des" '-' 311s | token: '' "3des" '-' "sha2" '-' 311s | token: '-' "sha2" '-' "modp8192" '' 311s | appending ESP encryption algorithm 3DES_CBC[_0] 311s | parsing integ: 311s | appending ESP integrity algorithm HMAC_SHA2_256_128[_0] 311s | token: '-' "modp8192" '' '' 311s | parsing dh: 311s | appending ESP DH algorithm MODP8192[_0] 311s | token: '' '' '' 311s ipsec algparse: ignoring ESP DH algorithm MODP8192 as PFS policy is disabled 311s ipsec algparse: ignoring ESP DH algorithm MODP8192 as PFS policy is disabled 311s | parsing '3des-sha1;modp8192,3des-sha2;modp8192' for ESP 311s | proposal: '3des-sha1;modp8192' 311s | token: '' '' "3des" '-' 311s | token: '' "3des" '-' "sha1" ';' 311s | token: '-' "sha1" ';' "modp8192" '' 311s | appending ESP encryption algorithm 3DES_CBC[_0] 311s | parsing integ: 311s | appending ESP integrity algorithm HMAC_SHA1_96[_0] 311s | token: ';' "modp8192" '' '' 311s | parsing dh: 311s | appending ESP DH algorithm MODP8192[_0] 311s | token: '' '' '' 311s | proposal: '3des-sha2;modp8192' 311s | token: '' '' "3des" '-' 311s | token: '' "3des" '-' "sha2" ';' 311s | token: '-' "sha2" ';' "modp8192" '' 311s | appending ESP encryption algorithm 3DES_CBC[_0] 311s | parsing integ: 311s | appending ESP integrity algorithm HMAC_SHA2_256_128[_0] 311s | token: ';' "modp8192" '' '' 311s | parsing dh: 311s | appending ESP DH algorithm MODP8192[_0] 311s | token: '' '' '' 311s ipsec algparse: ignoring ESP DH algorithm MODP8192 as PFS policy is disabled 311s ipsec algparse: ignoring ESP DH algorithm MODP8192 as PFS policy is disabled 311s | parsing '3des-sha1-modp8192,3des-sha2-modp2048' for ESP 311s | proposal: '3des-sha1-modp8192' 311s | token: '' '' "3des" '-' 311s | token: '' "3des" '-' "sha1" '-' 311s | token: '-' "sha1" '-' "modp8192" '' 311s | appending ESP encryption algorithm 3DES_CBC[_0] 311s | parsing integ: 311s | appending ESP integrity algorithm HMAC_SHA1_96[_0] 311s | token: '-' "modp8192" '' '' 311s | parsing dh: 311s | appending ESP DH algorithm MODP8192[_0] 311s | token: '' '' '' 311s | proposal: '3des-sha2-modp2048' 311s | token: '' '' "3des" '-' 311s | token: '' "3des" '-' "sha2" '-' 311s | token: '-' "sha2" '-' "modp2048" '' 311s | appending ESP encryption algorithm 3DES_CBC[_0] 311s | parsing integ: 311s | appending ESP integrity algorithm HMAC_SHA2_256_128[_0] 311s | token: '-' "modp2048" '' '' 311s | parsing dh: 311s | appending ESP DH algorithm MODP2048[_0] 311s | token: '' '' '' 311s ipsec algparse: ignoring ESP DH algorithm MODP8192 as PFS policy is disabled 311s ipsec algparse: ignoring ESP DH algorithm MODP2048 as PFS policy is disabled 311s | parsing 'SHA2_512_256,SHA2_256_128' for AH 311s | proposal: 'SHA2_512_256' 311s | token: '' '' "SHA2_512_256" '' 311s | token: '' "SHA2_512_256" '' '' 311s | parsing integ: 311s | appending AH integrity algorithm HMAC_SHA2_512_256[_0] 311s | token: '' '' '' 311s | proposal: 'SHA2_256_128' 311s | token: '' '' "SHA2_256_128" '' 311s | token: '' "SHA2_256_128" '' '' 311s | parsing integ: 311s | appending AH integrity algorithm HMAC_SHA2_256_128[_0] 311s | token: '' '' '' 311s | parsing '' for AH 311s | parsing 'md5' for AH 311s | proposal: 'md5' 311s | token: '' '' "md5" '' 311s | token: '' "md5" '' '' 311s | parsing integ: 311s | appending AH integrity algorithm HMAC_MD5_96[_0] 311s | token: '' '' '' 311s | parsing 'sha' for AH 311s | proposal: 'sha' 311s | token: '' '' "sha" '' 311s | token: '' "sha" '' '' 311s | parsing integ: 311s | appending AH integrity algorithm HMAC_SHA1_96[_0] 311s | token: '' '' '' 311s | parsing 'sha;modp2048' for AH 311s | proposal: 'sha;modp2048' 311s | token: '' '' "sha" ';' 311s | token: '' "sha" ';' "modp2048" '' 311s | parsing integ: 311s | appending AH integrity algorithm HMAC_SHA1_96[_0] 311s | token: ';' "modp2048" '' '' 311s | parsing dh: 311s | appending AH DH algorithm MODP2048[_0] 311s | token: '' '' '' 311s ipsec algparse: ignoring AH DH algorithm MODP2048 as PFS policy is disabled 311s | parsing 'sha1' for AH 311s | proposal: 'sha1' 311s | token: '' '' "sha1" '' 311s | token: '' "sha1" '' '' 311s | parsing integ: 311s | appending AH integrity algorithm HMAC_SHA1_96[_0] 311s | token: '' '' '' 311s | parsing 'sha2' for AH 311s | proposal: 'sha2' 311s | token: '' '' "sha2" '' 311s | token: '' "sha2" '' '' 311s | parsing integ: 311s | appending AH integrity algorithm HMAC_SHA2_256_128[_0] 311s | token: '' '' '' 311s | parsing 'sha256' for AH 311s | proposal: 'sha256' 311s | token: '' '' "sha256" '' 311s | token: '' "sha256" '' '' 311s | parsing integ: 311s | appending AH integrity algorithm HMAC_SHA2_256_128[_0] 311s | token: '' '' '' 311s | parsing 'sha384' for AH 311s | proposal: 'sha384' 311s | token: '' '' "sha384" '' 311s | token: '' "sha384" '' '' 311s | parsing integ: 311s | appending AH integrity algorithm HMAC_SHA2_384_192[_0] 311s | token: '' '' '' 311s | parsing 'sha512' for AH 311s | proposal: 'sha512' 311s | token: '' '' "sha512" '' 311s | token: '' "sha512" '' '' 311s | parsing integ: 311s | appending AH integrity algorithm HMAC_SHA2_512_256[_0] 311s | token: '' '' '' 311s | parsing 'sha2_256' for AH 311s | proposal: 'sha2_256' 311s | token: '' '' "sha2_256" '' 311s | token: '' "sha2_256" '' '' 311s | parsing integ: 311s | appending AH integrity algorithm HMAC_SHA2_256_128[_0] 311s | token: '' '' '' 311s | parsing 'sha2_384' for AH 311s | proposal: 'sha2_384' 311s | token: '' '' "sha2_384" '' 311s | token: '' "sha2_384" '' '' 311s | parsing integ: 311s | appending AH integrity algorithm HMAC_SHA2_384_192[_0] 311s | token: '' '' '' 311s | parsing 'sha2_512' for AH 311s | proposal: 'sha2_512' 311s | token: '' '' "sha2_512" '' 311s | token: '' "sha2_512" '' '' 311s | parsing integ: 311s | appending AH integrity algorithm HMAC_SHA2_512_256[_0] 311s | token: '' '' '' 311s | parsing 'aes_xcbc' for AH 311s | proposal: 'aes_xcbc' 311s | token: '' '' "aes_xcbc" '' 311s | token: '' "aes_xcbc" '' '' 311s | parsing integ: 311s | appending AH integrity algorithm AES_XCBC_96[_0] 311s | token: '' '' '' 311s | parsing 'sha2-none' for AH 311s | proposal: 'sha2-none' 311s | token: '' '' "sha2" '-' 311s | token: '' "sha2" '-' "none" '' 311s | parsing integ: 311s | appending AH integrity algorithm HMAC_SHA2_256_128[_0] 311s | token: '-' "none" '' '' 311s | parsing dh: 311s | appending AH DH algorithm NONE[_0] 311s | token: '' '' '' 311s ipsec algparse: ignoring redundant AH DH algorithm NONE as PFS policy is disabled 311s | parsing 'sha2;none' for AH 311s | proposal: 'sha2;none' 311s | token: '' '' "sha2" ';' 311s | token: '' "sha2" ';' "none" '' 311s | parsing integ: 311s | appending AH integrity algorithm HMAC_SHA2_256_128[_0] 311s | token: ';' "none" '' '' 311s | parsing dh: 311s | appending AH DH algorithm NONE[_0] 311s | token: '' '' '' 311s ipsec algparse: ignoring redundant AH DH algorithm NONE as PFS policy is disabled 311s | parsing 'sha1-modp8192,sha1-modp8192,sha1-modp8192' for AH 311s | proposal: 'sha1-modp8192' 311s | token: '' '' "sha1" '-' 311s | token: '' "sha1" '-' "modp8192" '' 311s | parsing integ: 311s | appending AH integrity algorithm HMAC_SHA1_96[_0] 311s | token: '-' "modp8192" '' '' 311s | parsing dh: 311s | appending AH DH algorithm MODP8192[_0] 311s | token: '' '' '' 311s | proposal: 'sha1-modp8192' 311s | token: '' '' "sha1" '-' 311s | token: '' "sha1" '-' "modp8192" '' 311s | parsing integ: 311s | appending AH integrity algorithm HMAC_SHA1_96[_0] 311s | token: '-' "modp8192" '' '' 311s | parsing dh: 311s | appending AH DH algorithm MODP8192[_0] 311s | token: '' '' '' 311s | proposal: 'sha1-modp8192' 311s | token: '' '' "sha1" '-' 311s | token: '' "sha1" '-' "modp8192" '' 311s | parsing integ: 311s | appending AH integrity algorithm HMAC_SHA1_96[_0] 311s | token: '-' "modp8192" '' '' 311s | parsing dh: 311s | appending AH DH algorithm MODP8192[_0] 311s | token: '' '' '' 311s ipsec algparse: ignoring AH DH algorithm MODP8192 as PFS policy is disabled 311s | parsing 'aes-sha1' for AH 311s | proposal: 'aes-sha1' 311s | token: '' '' "aes" '-' 311s | token: '' "aes" '-' "sha1" '' 311s | parsing integ: 311s | ike_alg_byname() failed: AH integrity algorithm 'aes' is not recognized 311s | lookup for integrity algorithm 'aes' failed 311s | or - failed 'AH integrity algorithm 'aes' is not recognized') 311s | parsing 'vanityhash1' for AH 311s | proposal: 'vanityhash1' 311s | token: '' '' "vanityhash1" '' 311s | token: '' "vanityhash1" '' '' 311s | parsing integ: 311s | ike_alg_byname() failed: AH integrity algorithm 'vanityhash1' is not recognized 311s | lookup for integrity algorithm 'vanityhash1' failed 311s | or - failed 'AH integrity algorithm 'vanityhash1' is not recognized') 311s | parsing 'aes_gcm_c-256' for AH 311s | proposal: 'aes_gcm_c-256' 311s | token: '' '' "aes_gcm_c" '-' 311s | token: '' "aes_gcm_c" '-' "256" '' 311s | parsing integ: 311s | ike_alg_byname() failed: AH integrity algorithm 'aes_gcm_c' is not recognized 311s | lookup for integrity algorithm 'aes_gcm_c' failed 311s | or - failed 'AH integrity algorithm 'aes_gcm_c' is not recognized') 311s | parsing 'id3' for AH 311s | proposal: 'id3' 311s | token: '' '' "id3" '' 311s | token: '' "id3" '' '' 311s | parsing integ: 311s | ike_alg_byname() failed: AH integrity algorithm 'id3' is not recognized 311s | lookup for integrity algorithm 'id3' failed 311s | or - failed 'AH integrity algorithm 'id3' is not recognized') 311s | parsing '3des' for AH 311s | proposal: '3des' 311s | token: '' '' "3des" '' 311s | token: '' "3des" '' '' 311s | parsing integ: 311s | ike_alg_byname() failed: AH integrity algorithm '3des' is not recognized 311s | lookup for integrity algorithm '3des' failed 311s | or - failed 'AH integrity algorithm '3des' is not recognized') 311s | parsing 'null' for AH 311s | proposal: 'null' 311s | token: '' '' "null" '' 311s | token: '' "null" '' '' 311s | parsing integ: 311s | appending AH integrity algorithm NONE[_0] 311s | token: '' '' '' 311s | parsing 'aes_gcm' for AH 311s | proposal: 'aes_gcm' 311s | token: '' '' "aes_gcm" '' 311s | token: '' "aes_gcm" '' '' 311s | parsing integ: 311s | ike_alg_byname() failed: AH integrity algorithm 'aes_gcm' is not recognized 311s | lookup for integrity algorithm 'aes_gcm' failed 311s | or - failed 'AH integrity algorithm 'aes_gcm' is not recognized') 311s | parsing 'aes_ccm' for AH 311s | proposal: 'aes_ccm' 311s | token: '' '' "aes_ccm" '' 311s | token: '' "aes_ccm" '' '' 311s | parsing integ: 311s | ike_alg_byname() failed: AH integrity algorithm 'aes_ccm' is not recognized 311s | lookup for integrity algorithm 'aes_ccm' failed 311s | or - failed 'AH integrity algorithm 'aes_ccm' is not recognized') 311s | parsing 'ripemd' for AH 311s | proposal: 'ripemd' 311s | token: '' '' "ripemd" '' 311s | token: '' "ripemd" '' '' 311s | parsing integ: 311s | ike_alg_byname() failed: AH integrity algorithm 'ripemd' is not recognized 311s | lookup for integrity algorithm 'ripemd' failed 311s | or - failed 'AH integrity algorithm 'ripemd' is not recognized') 311s | parsing 'AES_GCM_16_256,AES_GCM_16_128,CHACHA20_POLY1305,AES_CBC_256,AES_CBC_128' for IKE 311s | proposal: 'AES_GCM_16_256' 311s | token: '' '' "AES_GCM_16_256" '' 311s | token: '' "AES_GCM_16_256" '' '' 311s | ike_alg_byname() failed: IKE encryption algorithm 'AES_GCM_16_256' is not recognized 311s | token: '' '' '' 311s | appending IKE encryption algorithm AES_GCM_16[_256] 311s | appending IKE PRF algorithm HMAC_SHA2_512[_0] 311s | appending IKE PRF algorithm HMAC_SHA2_256[_0] 311s | appending IKE integrity algorithm NONE[_0] 311s | appending IKE DH algorithm DH19[_0] 311s | appending IKE DH algorithm DH20[_0] 311s | appending IKE DH algorithm DH21[_0] 311s | appending IKE DH algorithm DH31[_0] 311s | appending IKE DH algorithm MODP4096[_0] 311s | appending IKE DH algorithm MODP3072[_0] 311s | appending IKE DH algorithm MODP2048[_0] 311s | appending IKE DH algorithm MODP8192[_0] 311s | proposal: 'AES_GCM_16_128' 311s | token: '' '' "AES_GCM_16_128" '' 311s | token: '' "AES_GCM_16_128" '' '' 311s | ike_alg_byname() failed: IKE encryption algorithm 'AES_GCM_16_128' is not recognized 311s | token: '' '' '' 311s | appending IKE encryption algorithm AES_GCM_16[_128] 311s | appending IKE PRF algorithm HMAC_SHA2_512[_0] 311s | appending IKE PRF algorithm HMAC_SHA2_256[_0] 311s | appending IKE integrity algorithm NONE[_0] 311s | appending IKE DH algorithm DH19[_0] 311s | appending IKE DH algorithm DH20[_0] 311s | appending IKE DH algorithm DH21[_0] 311s | appending IKE DH algorithm DH31[_0] 311s | appending IKE DH algorithm MODP4096[_0] 311s | appending IKE DH algorithm MODP3072[_0] 311s | appending IKE DH algorithm MODP2048[_0] 311s | appending IKE DH algorithm MODP8192[_0] 311s | proposal: 'CHACHA20_POLY1305' 311s | token: '' '' "CHACHA20_POLY1305" '' 311s | token: '' "CHACHA20_POLY1305" '' '' 311s | token: '' '' '' 311s | appending IKE encryption algorithm CHACHA20_POLY1305[_0] 311s | appending IKE PRF algorithm HMAC_SHA2_512[_0] 311s | appending IKE PRF algorithm HMAC_SHA2_256[_0] 311s | appending IKE integrity algorithm NONE[_0] 311s | appending IKE DH algorithm DH19[_0] 311s | appending IKE DH algorithm DH20[_0] 311s | appending IKE DH algorithm DH21[_0] 311s | appending IKE DH algorithm DH31[_0] 311s | appending IKE DH algorithm MODP4096[_0] 311s | appending IKE DH algorithm MODP3072[_0] 311s | appending IKE DH algorithm MODP2048[_0] 311s | appending IKE DH algorithm MODP8192[_0] 311s | proposal: 'AES_CBC_256' 311s | token: '' '' "AES_CBC_256" '' 311s | token: '' "AES_CBC_256" '' '' 311s | ike_alg_byname() failed: IKE encryption algorithm 'AES_CBC_256' is not recognized 311s | token: '' '' '' 311s | appending IKE encryption algorithm AES_CBC[_256] 311s | appending IKE PRF algorithm HMAC_SHA2_512[_0] 311s | appending IKE PRF algorithm HMAC_SHA2_256[_0] 311s | appending IKE integrity algorithm HMAC_SHA2_512_256[_0] 311s | appending IKE integrity algorithm HMAC_SHA2_256_128[_0] 311s | appending IKE DH algorithm DH19[_0] 311s | appending IKE DH algorithm DH20[_0] 311s | appending IKE DH algorithm DH21[_0] 311s | appending IKE DH algorithm DH31[_0] 311s | appending IKE DH algorithm MODP4096[_0] 311s | appending IKE DH algorithm MODP3072[_0] 311s | appending IKE DH algorithm MODP2048[_0] 311s | appending IKE DH algorithm MODP8192[_0] 311s | proposal: 'AES_CBC_128' 311s | token: '' '' "AES_CBC_128" '' 311s | token: '' "AES_CBC_128" '' '' 311s | ike_alg_byname() failed: IKE encryption algorithm 'AES_CBC_128' is not recognized 311s | token: '' '' '' 311s | appending IKE encryption algorithm AES_CBC[_128] 311s | appending IKE PRF algorithm HMAC_SHA2_512[_0] 311s | appending IKE PRF algorithm HMAC_SHA2_256[_0] 311s | appending IKE integrity algorithm HMAC_SHA2_512_256[_0] 311s | appending IKE integrity algorithm HMAC_SHA2_256_128[_0] 311s | appending IKE DH algorithm DH19[_0] 311s | appending IKE DH algorithm DH20[_0] 311s | appending IKE DH algorithm DH21[_0] 311s | appending IKE DH algorithm DH31[_0] 311s | appending IKE DH algorithm MODP4096[_0] 311s | appending IKE DH algorithm MODP3072[_0] 311s | appending IKE DH algorithm MODP2048[_0] 311s | appending IKE DH algorithm MODP8192[_0] 311s | parsing '' for IKE 311s | parsing '3des-sha1' for IKE 311s | proposal: '3des-sha1' 311s | token: '' '' "3des" '-' 311s | token: '' "3des" '-' "sha1" '' 311s | token: '-' "sha1" '' '' 311s | appending IKE encryption algorithm 3DES_CBC[_0] 311s | parsing prf: 311s | appending IKE PRF algorithm HMAC_SHA1[_0] 311s | token: '' '' '' 311s | - succeeded, advancing tokens 311s | appending IKE integrity algorithm HMAC_SHA1_96[_0] 311s | appending IKE DH algorithm DH19[_0] 311s | appending IKE DH algorithm DH20[_0] 311s | appending IKE DH algorithm DH21[_0] 311s | appending IKE DH algorithm DH31[_0] 311s | appending IKE DH algorithm MODP4096[_0] 311s | appending IKE DH algorithm MODP3072[_0] 311s | appending IKE DH algorithm MODP2048[_0] 311s | appending IKE DH algorithm MODP8192[_0] 311s | parsing '3des-sha1' for IKE 311s | proposal: '3des-sha1' 311s | token: '' '' "3des" '-' 311s | token: '' "3des" '-' "sha1" '' 311s | token: '-' "sha1" '' '' 311s | appending IKE encryption algorithm 3DES_CBC[_0] 311s | parsing prf: 311s | appending IKE PRF algorithm HMAC_SHA1[_0] 311s | token: '' '' '' 311s | - succeeded, advancing tokens 311s | appending IKE integrity algorithm HMAC_SHA1_96[_0] 311s | appending IKE DH algorithm DH19[_0] 311s | appending IKE DH algorithm DH20[_0] 311s | appending IKE DH algorithm DH21[_0] 311s | appending IKE DH algorithm DH31[_0] 311s | appending IKE DH algorithm MODP4096[_0] 311s | appending IKE DH algorithm MODP3072[_0] 311s | appending IKE DH algorithm MODP2048[_0] 311s | appending IKE DH algorithm MODP8192[_0] 311s | parsing '3des-sha1;modp1536' for IKE 311s | proposal: '3des-sha1;modp1536' 311s | token: '' '' "3des" '-' 311s | token: '' "3des" '-' "sha1" ';' 311s | token: '-' "sha1" ';' "modp1536" '' 311s | appending IKE encryption algorithm 3DES_CBC[_0] 311s | parsing prf: 311s | appending IKE PRF algorithm HMAC_SHA1[_0] 311s | token: ';' "modp1536" '' '' 311s | - succeeded, advancing tokens 311s | parsing dh: 311s | appending IKE DH algorithm MODP1536[_0] 311s | token: '' '' '' 311s | appending IKE integrity algorithm HMAC_SHA1_96[_0] 311s | parsing '3des;dh21' for IKE 311s | proposal: '3des;dh21' 311s | token: '' '' "3des" ';' 311s | token: '' "3des" ';' "dh21" '' 311s | token: ';' "dh21" '' '' 311s | appending IKE encryption algorithm 3DES_CBC[_0] 311s | parsing dh: 311s | appending IKE DH algorithm DH21[_0] 311s | token: '' '' '' 311s | appending IKE PRF algorithm HMAC_SHA2_512[_0] 311s | appending IKE PRF algorithm HMAC_SHA2_256[_0] 311s | appending IKE integrity algorithm HMAC_SHA2_512_256[_0] 311s | appending IKE integrity algorithm HMAC_SHA2_256_128[_0] 311s | parsing '3des-sha1;dh21' for IKE 311s | proposal: '3des-sha1;dh21' 311s | token: '' '' "3des" '-' 311s | token: '' "3des" '-' "sha1" ';' 311s | token: '-' "sha1" ';' "dh21" '' 311s | appending IKE encryption algorithm 3DES_CBC[_0] 311s | parsing prf: 311s | appending IKE PRF algorithm HMAC_SHA1[_0] 311s | token: ';' "dh21" '' '' 311s | - succeeded, advancing tokens 311s | parsing dh: 311s | appending IKE DH algorithm DH21[_0] 311s | token: '' '' '' 311s | appending IKE integrity algorithm HMAC_SHA1_96[_0] 311s | parsing '3des-sha1-ecp_521' for IKE 311s | proposal: '3des-sha1-ecp_521' 311s | token: '' '' "3des" '-' 311s | token: '' "3des" '-' "sha1" '-' 311s | token: '-' "sha1" '-' "ecp_521" '' 311s | appending IKE encryption algorithm 3DES_CBC[_0] 311s | parsing prf: 311s | appending IKE PRF algorithm HMAC_SHA1[_0] 311s | token: '-' "ecp_521" '' '' 311s | - succeeded, advancing tokens 311s | parsing dh: 311s | appending IKE DH algorithm DH21[_0] 311s | token: '' '' '' 311s | appending IKE integrity algorithm HMAC_SHA1_96[_0] 311s | parsing '3des+aes' for IKE 311s | proposal: '3des+aes' 311s | token: '' '' "3des" '+' 311s | token: '' "3des" '+' "aes" '' 311s | token: '+' "aes" '' '' 311s | appending IKE encryption algorithm 3DES_CBC[_0] 311s | token: '' '' '' 311s | appending IKE encryption algorithm AES_CBC[_0] 311s | appending IKE PRF algorithm HMAC_SHA2_512[_0] 311s | appending IKE PRF algorithm HMAC_SHA2_256[_0] 311s | appending IKE integrity algorithm HMAC_SHA2_512_256[_0] 311s | appending IKE integrity algorithm HMAC_SHA2_256_128[_0] 311s | appending IKE DH algorithm DH19[_0] 311s | appending IKE DH algorithm DH20[_0] 311s | appending IKE DH algorithm DH21[_0] 311s | appending IKE DH algorithm DH31[_0] 311s | appending IKE DH algorithm MODP4096[_0] 311s | appending IKE DH algorithm MODP3072[_0] 311s | appending IKE DH algorithm MODP2048[_0] 311s | appending IKE DH algorithm MODP8192[_0] 311s | parsing 'aes;none' for IKE 311s | proposal: 'aes;none' 311s | token: '' '' "aes" ';' 311s | token: '' "aes" ';' "none" '' 311s | token: ';' "none" '' '' 311s | appending IKE encryption algorithm AES_CBC[_0] 311s | parsing dh: 311s | appending IKE DH algorithm NONE[_0] 311s | token: '' '' '' 311s | appending IKE PRF algorithm HMAC_SHA2_512[_0] 311s | appending IKE PRF algorithm HMAC_SHA2_256[_0] 311s | appending IKE integrity algorithm HMAC_SHA2_512_256[_0] 311s | appending IKE integrity algorithm HMAC_SHA2_256_128[_0] 311s | parsing 'id2' for IKE 311s | proposal: 'id2' 311s | token: '' '' "id2" '' 311s | token: '' "id2" '' '' 311s | ike_alg_byname() failed: IKE encryption algorithm 'id2' is not recognized 311s | ike_alg_byname() failed: IKE encryption algorithm 'id2' is not recognized 311s | parsing '3des-id2' for IKE 311s | proposal: '3des-id2' 311s | token: '' '' "3des" '-' 311s | token: '' "3des" '-' "id2" '' 311s | token: '-' "id2" '' '' 311s | appending IKE encryption algorithm 3DES_CBC[_0] 311s | parsing prf: 311s | ike_alg_byname() failed: IKE PRF algorithm 'id2' is not recognized 311s | lookup for PRF algorithm 'id2' failed 311s | - failed, saving error 'IKE PRF algorithm 'id2' is not recognized' and tossing result 311s | parsing integ: 311s | ike_alg_byname() failed: IKE integrity algorithm 'id2' is not recognized 311s | lookup for integrity algorithm 'id2' failed 311s | - and - failed, returning earlier PRF error 'IKE PRF algorithm 'id2' is not recognized' and discarding INTEG error 'IKE integrity algorithm 'id2' is not recognized') 311s | parsing 'aes_ccm' for IKE 311s | proposal: 'aes_ccm' 311s | token: '' '' "aes_ccm" '' 311s | token: '' "aes_ccm" '' '' 311s | alg_byname_ok() failed: IKE encryption algorithm 'aes_ccm' is not supported 311s | parsing 'aes-sha1-sha2-ecp_521' for IKE 311s | proposal: 'aes-sha1-sha2-ecp_521' 311s | token: '' '' "aes" '-' 311s | token: '' "aes" '-' "sha1" '-' 311s | token: '-' "sha1" '-' "sha2" '-' 311s | appending IKE encryption algorithm AES_CBC[_0] 311s | parsing prf: 311s | appending IKE PRF algorithm HMAC_SHA1[_0] 311s | token: '-' "sha2" '-' "ecp_521" '' 311s | - succeeded, advancing tokens 311s | parsing dh: 311s | ike_alg_byname() failed: IKE DH algorithm 'sha2' is not recognized 311s | lookup for DH algorithm 'sha2' failed 311s | ... failed 'IKE DH algorithm 'sha2' is not recognized' 311s | parsing 'aes-sha2-sha2;ecp_521' for IKE 311s | proposal: 'aes-sha2-sha2;ecp_521' 311s | token: '' '' "aes" '-' 311s | token: '' "aes" '-' "sha2" '-' 311s | token: '-' "sha2" '-' "sha2" ';' 311s | appending IKE encryption algorithm AES_CBC[_0] 311s | parsing prf: 311s | appending IKE PRF algorithm HMAC_SHA2_256[_0] 311s | token: '-' "sha2" ';' "ecp_521" '' 311s | - succeeded, advancing tokens 311s | parsing dh: 311s | ike_alg_byname() failed: IKE DH algorithm 'sha2' is not recognized 311s | lookup for DH algorithm 'sha2' failed 311s | ... failed 'IKE DH algorithm 'sha2' is not recognized' 311s | parsing 'aes-sha1_96-sha2-ecp_521' for IKE 311s | proposal: 'aes-sha1_96-sha2-ecp_521' 311s | token: '' '' "aes" '-' 311s | token: '' "aes" '-' "sha1_96" '-' 311s | token: '-' "sha1_96" '-' "sha2" '-' 311s | appending IKE encryption algorithm AES_CBC[_0] 311s | parsing prf: 311s | ike_alg_byname() failed: IKE PRF algorithm 'sha1_96' is not recognized 311s | lookup for PRF algorithm 'sha1_96' failed 311s | - failed, saving error 'IKE PRF algorithm 'sha1_96' is not recognized' and tossing result 311s | parsing integ: 311s | appending IKE integrity algorithm HMAC_SHA1_96[_0] 311s | token: '-' "sha2" '-' "ecp_521" '' 311s | parsing prf: 311s | appending IKE PRF algorithm HMAC_SHA2_256[_0] 311s | token: '-' "ecp_521" '' '' 311s | parsing dh: 311s | appending IKE DH algorithm DH21[_0] 311s | token: '' '' '' 311s | parsing 'aes-sha1_96-sha2;ecp_521' for IKE 311s | proposal: 'aes-sha1_96-sha2;ecp_521' 311s | token: '' '' "aes" '-' 311s | token: '' "aes" '-' "sha1_96" '-' 311s | token: '-' "sha1_96" '-' "sha2" ';' 311s | appending IKE encryption algorithm AES_CBC[_0] 311s | parsing prf: 311s | ike_alg_byname() failed: IKE PRF algorithm 'sha1_96' is not recognized 311s | lookup for PRF algorithm 'sha1_96' failed 311s | - failed, saving error 'IKE PRF algorithm 'sha1_96' is not recognized' and tossing result 311s | parsing integ: 311s | appending IKE integrity algorithm HMAC_SHA1_96[_0] 311s | token: '-' "sha2" ';' "ecp_521" '' 311s | parsing prf: 311s | appending IKE PRF algorithm HMAC_SHA2_256[_0] 311s | token: ';' "ecp_521" '' '' 311s | parsing dh: 311s | appending IKE DH algorithm DH21[_0] 311s | token: '' '' '' 311s | parsing 'aes+aes-sha1+sha1-modp8192+modp8192' for IKE 311s | proposal: 'aes+aes-sha1+sha1-modp8192+modp8192' 311s | token: '' '' "aes" '+' 311s | token: '' "aes" '+' "aes" '-' 311s | token: '+' "aes" '-' "sha1" '+' 311s | appending IKE encryption algorithm AES_CBC[_0] 311s | token: '-' "sha1" '+' "sha1" '-' 311s | appending IKE encryption algorithm AES_CBC[_0] 311s ipsec algparse: discarding duplicate IKE encryption algorithm AES_CBC 311s | parsing prf: 311s | appending IKE PRF algorithm HMAC_SHA1[_0] 311s | token: '+' "sha1" '-' "modp8192" '+' 311s | appending IKE PRF algorithm HMAC_SHA1[_0] 311s | token: '-' "modp8192" '+' "modp8192" '' 311s ipsec algparse: discarding duplicate IKE PRF algorithm HMAC_SHA1 311s | - succeeded, advancing tokens 311s | parsing dh: 311s | appending IKE DH algorithm MODP8192[_0] 311s | token: '+' "modp8192" '' '' 311s | appending IKE DH algorithm MODP8192[_0] 311s | token: '' '' '' 311s ipsec algparse: discarding duplicate IKE DH algorithm MODP8192 311s | appending IKE integrity algorithm HMAC_SHA1_96[_0] 311s | parsing '3des+aes+aes-sha2+sha1+sha1-modp4096+modp8192+modp8192' for IKE 311s | proposal: '3des+aes+aes-sha2+sha1+sha1-modp4096+modp8192+modp8192' 311s | token: '' '' "3des" '+' 311s | token: '' "3des" '+' "aes" '+' 311s | token: '+' "aes" '+' "aes" '-' 311s | appending IKE encryption algorithm 3DES_CBC[_0] 311s | token: '+' "aes" '-' "sha2" '+' 311s | appending IKE encryption algorithm AES_CBC[_0] 311s | token: '-' "sha2" '+' "sha1" '+' 311s | appending IKE encryption algorithm AES_CBC[_0] 311s ipsec algparse: discarding duplicate IKE encryption algorithm AES_CBC 311s | parsing prf: 311s | appending IKE PRF algorithm HMAC_SHA2_256[_0] 311s | token: '+' "sha1" '+' "sha1" '-' 311s | appending IKE PRF algorithm HMAC_SHA1[_0] 311s | token: '+' "sha1" '-' "modp4096" '+' 311s | appending IKE PRF algorithm HMAC_SHA1[_0] 311s | token: '-' "modp4096" '+' "modp8192" '+' 311s ipsec algparse: discarding duplicate IKE PRF algorithm HMAC_SHA1 311s | - succeeded, advancing tokens 311s | parsing dh: 311s | appending IKE DH algorithm MODP4096[_0] 311s | token: '+' "modp8192" '+' "modp8192" '' 311s | appending IKE DH algorithm MODP8192[_0] 311s | token: '+' "modp8192" '' '' 311s | appending IKE DH algorithm MODP8192[_0] 311s | token: '' '' '' 311s ipsec algparse: discarding duplicate IKE DH algorithm MODP8192 311s | appending IKE integrity algorithm HMAC_SHA2_256_128[_0] 311s | appending IKE integrity algorithm HMAC_SHA1_96[_0] 311s | parsing 'aes+3des+aes-sha1+sha2+sha1-modp8192+modp4096+modp8192' for IKE 311s | proposal: 'aes+3des+aes-sha1+sha2+sha1-modp8192+modp4096+modp8192' 311s | token: '' '' "aes" '+' 311s | token: '' "aes" '+' "3des" '+' 311s | token: '+' "3des" '+' "aes" '-' 311s | appending IKE encryption algorithm AES_CBC[_0] 311s | token: '+' "aes" '-' "sha1" '+' 311s | appending IKE encryption algorithm 3DES_CBC[_0] 311s | token: '-' "sha1" '+' "sha2" '+' 311s | appending IKE encryption algorithm AES_CBC[_0] 311s ipsec algparse: discarding duplicate IKE encryption algorithm AES_CBC 311s | parsing prf: 311s | appending IKE PRF algorithm HMAC_SHA1[_0] 311s | token: '+' "sha2" '+' "sha1" '-' 311s | appending IKE PRF algorithm HMAC_SHA2_256[_0] 311s | token: '+' "sha1" '-' "modp8192" '+' 311s | appending IKE PRF algorithm HMAC_SHA1[_0] 311s | token: '-' "modp8192" '+' "modp4096" '+' 311s ipsec algparse: discarding duplicate IKE PRF algorithm HMAC_SHA1 311s | - succeeded, advancing tokens 311s | parsing dh: 311s | appending IKE DH algorithm MODP8192[_0] 311s | token: '+' "modp4096" '+' "modp8192" '' 311s | appending IKE DH algorithm MODP4096[_0] 311s | token: '+' "modp8192" '' '' 311s | appending IKE DH algorithm MODP8192[_0] 311s | token: '' '' '' 311s ipsec algparse: discarding duplicate IKE DH algorithm MODP8192 311s | appending IKE integrity algorithm HMAC_SHA1_96[_0] 311s | appending IKE integrity algorithm HMAC_SHA2_256_128[_0] 311s | parsing 'aes+aes+3des-sha1+sha1+sha2-modp8192+modp8192+modp4096' for IKE 311s | proposal: 'aes+aes+3des-sha1+sha1+sha2-modp8192+modp8192+modp4096' 311s | token: '' '' "aes" '+' 311s | token: '' "aes" '+' "aes" '+' 311s | token: '+' "aes" '+' "3des" '-' 311s | appending IKE encryption algorithm AES_CBC[_0] 311s | token: '+' "3des" '-' "sha1" '+' 311s | appending IKE encryption algorithm AES_CBC[_0] 311s | token: '-' "sha1" '+' "sha1" '+' 311s | appending IKE encryption algorithm 3DES_CBC[_0] 311s ipsec algparse: discarding duplicate IKE encryption algorithm AES_CBC 311s | parsing prf: 311s | appending IKE PRF algorithm HMAC_SHA1[_0] 311s | token: '+' "sha1" '+' "sha2" '-' 311s | appending IKE PRF algorithm HMAC_SHA1[_0] 311s | token: '+' "sha2" '-' "modp8192" '+' 311s | appending IKE PRF algorithm HMAC_SHA2_256[_0] 311s | token: '-' "modp8192" '+' "modp8192" '+' 311s ipsec algparse: discarding duplicate IKE PRF algorithm HMAC_SHA1 311s | - succeeded, advancing tokens 311s | parsing dh: 311s | appending IKE DH algorithm MODP8192[_0] 311s | token: '+' "modp8192" '+' "modp4096" '' 311s | appending IKE DH algorithm MODP8192[_0] 311s | token: '+' "modp4096" '' '' 311s | appending IKE DH algorithm MODP4096[_0] 311s | token: '' '' '' 311s ipsec algparse: discarding duplicate IKE DH algorithm MODP8192 311s | appending IKE integrity algorithm HMAC_SHA1_96[_0] 311s | appending IKE integrity algorithm HMAC_SHA2_256_128[_0] 311s | parsing 'aes+aes128+aes256' for IKE 311s | proposal: 'aes+aes128+aes256' 311s | token: '' '' "aes" '+' 311s | token: '' "aes" '+' "aes128" '+' 311s | token: '+' "aes128" '+' "aes256" '' 311s | appending IKE encryption algorithm AES_CBC[_0] 311s | ike_alg_byname() failed: IKE encryption algorithm 'aes128' is not recognized 311s | token: '+' "aes256" '' '' 311s | appending IKE encryption algorithm AES_CBC[_128] 311s | ike_alg_byname() failed: IKE encryption algorithm 'aes256' is not recognized 311s | token: '' '' '' 311s | appending IKE encryption algorithm AES_CBC[_256] 311s ipsec algparse: discarding duplicate IKE encryption algorithm AES_CBC_128 311s ipsec algparse: discarding duplicate IKE encryption algorithm AES_CBC_256 311s | appending IKE PRF algorithm HMAC_SHA2_512[_0] 311s | appending IKE PRF algorithm HMAC_SHA2_256[_0] 311s | appending IKE integrity algorithm HMAC_SHA2_512_256[_0] 311s | appending IKE integrity algorithm HMAC_SHA2_256_128[_0] 311s | appending IKE DH algorithm DH19[_0] 311s | appending IKE DH algorithm DH20[_0] 311s | appending IKE DH algorithm DH21[_0] 311s | appending IKE DH algorithm DH31[_0] 311s | appending IKE DH algorithm MODP4096[_0] 311s | appending IKE DH algorithm MODP3072[_0] 311s | appending IKE DH algorithm MODP2048[_0] 311s | appending IKE DH algorithm MODP8192[_0] 311s | parsing 'aes128+aes+aes256' for IKE 311s | proposal: 'aes128+aes+aes256' 311s | token: '' '' "aes128" '+' 311s | token: '' "aes128" '+' "aes" '+' 311s | ike_alg_byname() failed: IKE encryption algorithm 'aes128' is not recognized 311s | token: '+' "aes" '+' "aes256" '' 311s | appending IKE encryption algorithm AES_CBC[_128] 311s | token: '+' "aes256" '' '' 311s | appending IKE encryption algorithm AES_CBC[_0] 311s | ike_alg_byname() failed: IKE encryption algorithm 'aes256' is not recognized 311s | token: '' '' '' 311s | appending IKE encryption algorithm AES_CBC[_256] 311s ipsec algparse: discarding duplicate IKE encryption algorithm AES_CBC_256 311s | appending IKE PRF algorithm HMAC_SHA2_512[_0] 311s | appending IKE PRF algorithm HMAC_SHA2_256[_0] 311s | appending IKE integrity algorithm HMAC_SHA2_512_256[_0] 311s | appending IKE integrity algorithm HMAC_SHA2_256_128[_0] 311s | appending IKE DH algorithm DH19[_0] 311s | appending IKE DH algorithm DH20[_0] 311s | appending IKE DH algorithm DH21[_0] 311s | appending IKE DH algorithm DH31[_0] 311s | appending IKE DH algorithm MODP4096[_0] 311s | appending IKE DH algorithm MODP3072[_0] 311s | appending IKE DH algorithm MODP2048[_0] 311s | appending IKE DH algorithm MODP8192[_0] 311s | parsing 'aes128+aes256+aes' for IKE 311s | proposal: 'aes128+aes256+aes' 311s | token: '' '' "aes128" '+' 311s | token: '' "aes128" '+' "aes256" '+' 311s | ike_alg_byname() failed: IKE encryption algorithm 'aes128' is not recognized 311s | token: '+' "aes256" '+' "aes" '' 311s | appending IKE encryption algorithm AES_CBC[_128] 311s AES_CBC_128+AES_CBC_256+AES_CBC-HMAC_SHA2_512+HMAC_SHA2_256-DH19+DH20+DH21+DH31+MODP4096+MODP3072+MODP2048+MODP8192 311s algparse -v2 'ike=aes-sha1-modp8192,aes-sha1-modp8192,aes-sha1-modp8192' (expect SUCCESS) 311s AES_CBC-HMAC_SHA1-MODP8192 311s algparse -v2 'ike=aes-sha1-modp8192,aes-sha2-modp8192,aes-sha1-modp8192' (expect SUCCESS) 311s AES_CBC-HMAC_SHA1-MODP8192 311s AES_CBC-HMAC_SHA2_256-MODP8192 311s algparse -v2 'ike=aes_gcm' (expect SUCCESS) 311s AES_GCM_16-HMAC_SHA2_512+HMAC_SHA2_256-DH19+DH20+DH21+DH31+MODP4096+MODP3072+MODP2048+MODP8192 311s algparse -v2 'ike=aes_gcm-sha2' (expect SUCCESS) 311s AES_GCM_16-HMAC_SHA2_256-DH19+DH20+DH21+DH31+MODP4096+MODP3072+MODP2048+MODP8192 311s algparse -v2 'ike=aes_gcm-sha2-modp2048' (expect SUCCESS) 311s AES_GCM_16-HMAC_SHA2_256-MODP2048 311s algparse -v2 'ike=aes_gcm-sha2;modp2048' (expect SUCCESS) 311s AES_GCM_16-HMAC_SHA2_256-MODP2048 311s algparse -v2 'ike=aes_gcm-modp2048' (expect ERROR) 311s ERROR: IKE PRF algorithm 'modp2048' is not recognized 311s algparse -v2 'ike=aes_gcm;modp2048' (expect SUCCESS) 311s AES_GCM_16-HMAC_SHA2_512+HMAC_SHA2_256-MODP2048 311s algparse -v2 'ike=aes_gcm-none' (expect SUCCESS) 311s AES_GCM_16-HMAC_SHA2_512+HMAC_SHA2_256-DH19+DH20+DH21+DH31+MODP4096+MODP3072+MODP2048+MODP8192 311s algparse -v2 'ike=aes_gcm-none-sha2' (expect SUCCESS) 311s AES_GCM_16-HMAC_SHA2_256-DH19+DH20+DH21+DH31+MODP4096+MODP3072+MODP2048+MODP8192 311s algparse -v2 'ike=aes_gcm-none-sha2-modp2048' (expect SUCCESS) 311s AES_GCM_16-HMAC_SHA2_256-MODP2048 311s algparse -v2 'ike=aes_gcm-none-sha2;modp2048' (expect SUCCESS) 311s AES_GCM_16-HMAC_SHA2_256-MODP2048 311s algparse -v2 'ike=aes_gcm-none-modp2048' (expect ERROR) 311s ERROR: IKE PRF algorithm 'modp2048' is not recognized 311s algparse -v2 'ike=aes_gcm-none;modp2048' (expect SUCCESS) 311s AES_GCM_16-HMAC_SHA2_512+HMAC_SHA2_256-MODP2048 311s algparse -v2 'ike=aes_gcm-sha1-none-modp2048' (expect ERROR) 311s ERROR: IKE proposal contains unexpected 'modp2048' 311s algparse -v2 'ike=aes_gcm-sha1-none;modp2048' (expect ERROR) 311s ERROR: IKE proposal contains unexpected 'modp2048' 311s algparse -v2 'ike=aes+aes_gcm' (expect ERROR) 311s ERROR: AEAD and non-AEAD IKE encryption algorithm cannot be combined 311s algparse -v2 'ike=,' (expect ERROR) 311s ERROR: IKE encryption algorithm is empty 311s algparse -v2 'ike=aes,' (expect ERROR) 311s ERROR: IKE encryption algorithm is empty 311s algparse -v2 'ike=aes,,aes' (expect ERROR) 311s ERROR: IKE encryption algorithm is empty 311s algparse -v2 'ike=,aes' (expect ERROR) 311s ERROR: IKE encryption algorithm is empty 311s algparse -v2 'ike=-' (expect ERROR) 311s ERROR: IKE encryption algorithm is empty 311s algparse -v2 'ike=+' (expect ERROR) 311s ERROR: IKE encryption algorithm is empty 311s algparse -v2 'ike=;' (expect ERROR) 311s ERROR: IKE encryption algorithm is empty 311s algparse -v2 'ike=aes-' (expect ERROR) 311s ERROR: IKE PRF algorithm is empty 311s algparse -v2 'ike=aes+' (expect ERROR) 311s ERROR: IKE encryption algorithm is empty 311s algparse -v2 'ike=aes;' (expect ERROR) 311s ERROR: IKE DH algorithm is empty 311s algparse -v2 'ike=-aes' (expect ERROR) 311s ERROR: IKE encryption algorithm is empty 311s algparse -v2 'ike=+aes' (expect ERROR) 311s ERROR: IKE encryption algorithm is empty 311s algparse -v2 'ike=;aes' (expect ERROR) 311s ERROR: IKE encryption algorithm is empty 311s algparse -v2 'ike=aes+-' (expect ERROR) 311s ERROR: IKE encryption algorithm is empty 311s algparse -v2 'ike=aes+;' (expect ERROR) 311s ERROR: IKE encryption algorithm is empty 311s algparse -v2 'ike=aes++' (expect ERROR) 311s ERROR: IKE encryption algorithm is empty 311s testing -ta 311s | ike_alg_byname() failed: IKE encryption algorithm 'aes256' is not recognized 311s | token: '+' "aes" '' '' 311s | appending IKE encryption algorithm AES_CBC[_256] 311s | token: '' '' '' 311s | appending IKE encryption algorithm AES_CBC[_0] 311s | appending IKE PRF algorithm HMAC_SHA2_512[_0] 311s | appending IKE PRF algorithm HMAC_SHA2_256[_0] 311s | appending IKE integrity algorithm HMAC_SHA2_512_256[_0] 311s | appending IKE integrity algorithm HMAC_SHA2_256_128[_0] 311s | appending IKE DH algorithm DH19[_0] 311s | appending IKE DH algorithm DH20[_0] 311s | appending IKE DH algorithm DH21[_0] 311s | appending IKE DH algorithm DH31[_0] 311s | appending IKE DH algorithm MODP4096[_0] 311s | appending IKE DH algorithm MODP3072[_0] 311s | appending IKE DH algorithm MODP2048[_0] 311s | appending IKE DH algorithm MODP8192[_0] 311s | parsing 'aes-sha1-modp8192,aes-sha1-modp8192,aes-sha1-modp8192' for IKE 311s | proposal: 'aes-sha1-modp8192' 311s | token: '' '' "aes" '-' 311s | token: '' "aes" '-' "sha1" '-' 311s | token: '-' "sha1" '-' "modp8192" '' 311s | appending IKE encryption algorithm AES_CBC[_0] 311s | parsing prf: 311s | appending IKE PRF algorithm HMAC_SHA1[_0] 311s | token: '-' "modp8192" '' '' 311s | - succeeded, advancing tokens 311s | parsing dh: 311s | appending IKE DH algorithm MODP8192[_0] 311s | token: '' '' '' 311s | appending IKE integrity algorithm HMAC_SHA1_96[_0] 311s | proposal: 'aes-sha1-modp8192' 311s | token: '' '' "aes" '-' 311s | token: '' "aes" '-' "sha1" '-' 311s | token: '-' "sha1" '-' "modp8192" '' 311s | appending IKE encryption algorithm AES_CBC[_0] 311s | parsing prf: 311s | appending IKE PRF algorithm HMAC_SHA1[_0] 311s | token: '-' "modp8192" '' '' 311s | - succeeded, advancing tokens 311s | parsing dh: 311s | appending IKE DH algorithm MODP8192[_0] 311s | token: '' '' '' 311s | appending IKE integrity algorithm HMAC_SHA1_96[_0] 311s | proposal: 'aes-sha1-modp8192' 311s | token: '' '' "aes" '-' 311s | token: '' "aes" '-' "sha1" '-' 311s | token: '-' "sha1" '-' "modp8192" '' 311s | appending IKE encryption algorithm AES_CBC[_0] 311s | parsing prf: 311s | appending IKE PRF algorithm HMAC_SHA1[_0] 311s | token: '-' "modp8192" '' '' 311s | - succeeded, advancing tokens 311s | parsing dh: 311s | appending IKE DH algorithm MODP8192[_0] 311s | token: '' '' '' 311s | appending IKE integrity algorithm HMAC_SHA1_96[_0] 311s | parsing 'aes-sha1-modp8192,aes-sha2-modp8192,aes-sha1-modp8192' for IKE 311s | proposal: 'aes-sha1-modp8192' 311s | token: '' '' "aes" '-' 311s | token: '' "aes" '-' "sha1" '-' 311s | token: '-' "sha1" '-' "modp8192" '' 311s | appending IKE encryption algorithm AES_CBC[_0] 311s | parsing prf: 311s | appending IKE PRF algorithm HMAC_SHA1[_0] 311s | token: '-' "modp8192" '' '' 311s | - succeeded, advancing tokens 311s | parsing dh: 311s | appending IKE DH algorithm MODP8192[_0] 311s | token: '' '' '' 311s | appending IKE integrity algorithm HMAC_SHA1_96[_0] 311s | proposal: 'aes-sha2-modp8192' 311s | token: '' '' "aes" '-' 311s | token: '' "aes" '-' "sha2" '-' 311s | token: '-' "sha2" '-' "modp8192" '' 311s | appending IKE encryption algorithm AES_CBC[_0] 311s | parsing prf: 311s | appending IKE PRF algorithm HMAC_SHA2_256[_0] 311s | token: '-' "modp8192" '' '' 311s | - succeeded, advancing tokens 311s | parsing dh: 311s | appending IKE DH algorithm MODP8192[_0] 311s | token: '' '' '' 311s | appending IKE integrity algorithm HMAC_SHA2_256_128[_0] 311s | proposal: 'aes-sha1-modp8192' 311s | token: '' '' "aes" '-' 311s | token: '' "aes" '-' "sha1" '-' 311s | token: '-' "sha1" '-' "modp8192" '' 311s | appending IKE encryption algorithm AES_CBC[_0] 311s | parsing prf: 311s | appending IKE PRF algorithm HMAC_SHA1[_0] 311s | token: '-' "modp8192" '' '' 311s | - succeeded, advancing tokens 311s | parsing dh: 311s | appending IKE DH algorithm MODP8192[_0] 311s | token: '' '' '' 311s | appending IKE integrity algorithm HMAC_SHA1_96[_0] 311s | parsing 'aes_gcm' for IKE 311s | proposal: 'aes_gcm' 311s | token: '' '' "aes_gcm" '' 311s | token: '' "aes_gcm" '' '' 311s | token: '' '' '' 311s | appending IKE encryption algorithm AES_GCM_16[_0] 311s | appending IKE PRF algorithm HMAC_SHA2_512[_0] 311s | appending IKE PRF algorithm HMAC_SHA2_256[_0] 311s | appending IKE integrity algorithm NONE[_0] 311s | appending IKE DH algorithm DH19[_0] 311s | appending IKE DH algorithm DH20[_0] 311s | appending IKE DH algorithm DH21[_0] 311s | appending IKE DH algorithm DH31[_0] 311s | appending IKE DH algorithm MODP4096[_0] 311s | appending IKE DH algorithm MODP3072[_0] 311s | appending IKE DH algorithm MODP2048[_0] 311s | appending IKE DH algorithm MODP8192[_0] 311s | parsing 'aes_gcm-sha2' for IKE 311s | proposal: 'aes_gcm-sha2' 311s | token: '' '' "aes_gcm" '-' 311s | token: '' "aes_gcm" '-' "sha2" '' 311s | token: '-' "sha2" '' '' 311s | appending IKE encryption algorithm AES_GCM_16[_0] 311s | parsing prf: 311s | appending IKE PRF algorithm HMAC_SHA2_256[_0] 311s | token: '' '' '' 311s | - succeeded, advancing tokens 311s | appending IKE integrity algorithm NONE[_0] 311s | appending IKE DH algorithm DH19[_0] 311s | appending IKE DH algorithm DH20[_0] 311s | appending IKE DH algorithm DH21[_0] 311s | appending IKE DH algorithm DH31[_0] 311s | appending IKE DH algorithm MODP4096[_0] 311s | appending IKE DH algorithm MODP3072[_0] 311s | appending IKE DH algorithm MODP2048[_0] 311s | appending IKE DH algorithm MODP8192[_0] 311s | parsing 'aes_gcm-sha2-modp2048' for IKE 311s | proposal: 'aes_gcm-sha2-modp2048' 311s | token: '' '' "aes_gcm" '-' 311s | token: '' "aes_gcm" '-' "sha2" '-' 311s | token: '-' "sha2" '-' "modp2048" '' 311s | appending IKE encryption algorithm AES_GCM_16[_0] 311s | parsing prf: 311s | appending IKE PRF algorithm HMAC_SHA2_256[_0] 311s | token: '-' "modp2048" '' '' 311s | - succeeded, advancing tokens 311s | parsing dh: 311s | appending IKE DH algorithm MODP2048[_0] 311s | token: '' '' '' 311s | appending IKE integrity algorithm NONE[_0] 311s | parsing 'aes_gcm-sha2;modp2048' for IKE 311s | proposal: 'aes_gcm-sha2;modp2048' 311s | token: '' '' "aes_gcm" '-' 311s | token: '' "aes_gcm" '-' "sha2" ';' 311s | token: '-' "sha2" ';' "modp2048" '' 311s | appending IKE encryption algorithm AES_GCM_16[_0] 311s | parsing prf: 311s | appending IKE PRF algorithm HMAC_SHA2_256[_0] 311s | token: ';' "modp2048" '' '' 311s | - succeeded, advancing tokens 311s | parsing dh: 311s | appending IKE DH algorithm MODP2048[_0] 311s | token: '' '' '' 311s | appending IKE integrity algorithm NONE[_0] 311s | parsing 'aes_gcm-modp2048' for IKE 311s | proposal: 'aes_gcm-modp2048' 311s | token: '' '' "aes_gcm" '-' 311s | token: '' "aes_gcm" '-' "modp2048" '' 311s | token: '-' "modp2048" '' '' 311s | appending IKE encryption algorithm AES_GCM_16[_0] 311s | parsing prf: 311s | ike_alg_byname() failed: IKE PRF algorithm 'modp2048' is not recognized 311s | lookup for PRF algorithm 'modp2048' failed 311s | - failed, saving error 'IKE PRF algorithm 'modp2048' is not recognized' and tossing result 311s | parsing integ: 311s | ike_alg_byname() failed: IKE integrity algorithm 'modp2048' is not recognized 311s | lookup for integrity algorithm 'modp2048' failed 311s | - and - failed, returning earlier PRF error 'IKE PRF algorithm 'modp2048' is not recognized' and discarding INTEG error 'IKE integrity algorithm 'modp2048' is not recognized') 311s | parsing 'aes_gcm;modp2048' for IKE 311s | proposal: 'aes_gcm;modp2048' 311s | token: '' '' "aes_gcm" ';' 311s | token: '' "aes_gcm" ';' "modp2048" '' 311s | token: ';' "modp2048" '' '' 311s | appending IKE encryption algorithm AES_GCM_16[_0] 311s | parsing dh: 311s | appending IKE DH algorithm MODP2048[_0] 311s | token: '' '' '' 311s | appending IKE PRF algorithm HMAC_SHA2_512[_0] 311s | appending IKE PRF algorithm HMAC_SHA2_256[_0] 311s | appending IKE integrity algorithm NONE[_0] 311s | parsing 'aes_gcm-none' for IKE 311s | proposal: 'aes_gcm-none' 311s | token: '' '' "aes_gcm" '-' 311s | token: '' "aes_gcm" '-' "none" '' 311s | token: '-' "none" '' '' 311s | appending IKE encryption algorithm AES_GCM_16[_0] 311s | parsing prf: 311s | ike_alg_byname() failed: IKE PRF algorithm 'none' is not recognized 311s | lookup for PRF algorithm 'none' failed 311s | - failed, saving error 'IKE PRF algorithm 'none' is not recognized' and tossing result 311s | parsing integ: 311s | appending IKE integrity algorithm NONE[_0] 311s | token: '' '' '' 311s | appending IKE PRF algorithm HMAC_SHA2_512[_0] 311s | appending IKE PRF algorithm HMAC_SHA2_256[_0] 311s | appending IKE DH algorithm DH19[_0] 311s | appending IKE DH algorithm DH20[_0] 311s | appending IKE DH algorithm DH21[_0] 311s | appending IKE DH algorithm DH31[_0] 311s | appending IKE DH algorithm MODP4096[_0] 311s | appending IKE DH algorithm MODP3072[_0] 311s | appending IKE DH algorithm MODP2048[_0] 311s | appending IKE DH algorithm MODP8192[_0] 311s | parsing 'aes_gcm-none-sha2' for IKE 311s | proposal: 'aes_gcm-none-sha2' 311s | token: '' '' "aes_gcm" '-' 311s | token: '' "aes_gcm" '-' "none" '-' 311s | token: '-' "none" '-' "sha2" '' 311s | appending IKE encryption algorithm AES_GCM_16[_0] 311s | parsing prf: 311s | ike_alg_byname() failed: IKE PRF algorithm 'none' is not recognized 311s | lookup for PRF algorithm 'none' failed 311s | - failed, saving error 'IKE PRF algorithm 'none' is not recognized' and tossing result 311s | parsing integ: 311s | appending IKE integrity algorithm NONE[_0] 311s | token: '-' "sha2" '' '' 311s | parsing prf: 311s | appending IKE PRF algorithm HMAC_SHA2_256[_0] 311s | token: '' '' '' 311s | appending IKE DH algorithm DH19[_0] 311s | appending IKE DH algorithm DH20[_0] 311s | appending IKE DH algorithm DH21[_0] 311s | appending IKE DH algorithm DH31[_0] 311s | appending IKE DH algorithm MODP4096[_0] 311s | appending IKE DH algorithm MODP3072[_0] 311s | appending IKE DH algorithm MODP2048[_0] 311s | appending IKE DH algorithm MODP8192[_0] 311s | parsing 'aes_gcm-none-sha2-modp2048' for IKE 311s | proposal: 'aes_gcm-none-sha2-modp2048' 311s | token: '' '' "aes_gcm" '-' 311s | token: '' "aes_gcm" '-' "none" '-' 311s | token: '-' "none" '-' "sha2" '-' 311s | appending IKE encryption algorithm AES_GCM_16[_0] 311s | parsing prf: 311s | ike_alg_byname() failed: IKE PRF algorithm 'none' is not recognized 311s | lookup for PRF algorithm 'none' failed 311s | - failed, saving error 'IKE PRF algorithm 'none' is not recognized' and tossing result 311s | parsing integ: 311s | appending IKE integrity algorithm NONE[_0] 311s | token: '-' "sha2" '-' "modp2048" '' 311s | parsing prf: 311s | appending IKE PRF algorithm HMAC_SHA2_256[_0] 311s | token: '-' "modp2048" '' '' 311s | parsing dh: 311s | appending IKE DH algorithm MODP2048[_0] 311s | token: '' '' '' 311s | parsing 'aes_gcm-none-sha2;modp2048' for IKE 311s | proposal: 'aes_gcm-none-sha2;modp2048' 311s | token: '' '' "aes_gcm" '-' 311s | token: '' "aes_gcm" '-' "none" '-' 311s | token: '-' "none" '-' "sha2" ';' 311s | appending IKE encryption algorithm AES_GCM_16[_0] 311s | parsing prf: 311s | ike_alg_byname() failed: IKE PRF algorithm 'none' is not recognized 311s | lookup for PRF algorithm 'none' failed 311s | - failed, saving error 'IKE PRF algorithm 'none' is not recognized' and tossing result 311s | parsing integ: 311s | appending IKE integrity algorithm NONE[_0] 311s | token: '-' "sha2" ';' "modp2048" '' 311s | parsing prf: 311s | appending IKE PRF algorithm HMAC_SHA2_256[_0] 311s | token: ';' "modp2048" '' '' 311s | parsing dh: 311s | appending IKE DH algorithm MODP2048[_0] 311s | token: '' '' '' 311s | parsing 'aes_gcm-none-modp2048' for IKE 311s | proposal: 'aes_gcm-none-modp2048' 311s | token: '' '' "aes_gcm" '-' 311s | token: '' "aes_gcm" '-' "none" '-' 311s | token: '-' "none" '-' "modp2048" '' 311s | appending IKE encryption algorithm AES_GCM_16[_0] 311s | parsing prf: 311s | ike_alg_byname() failed: IKE PRF algorithm 'none' is not recognized 311s | lookup for PRF algorithm 'none' failed 311s | - failed, saving error 'IKE PRF algorithm 'none' is not recognized' and tossing result 311s | parsing integ: 311s | appending IKE integrity algorithm NONE[_0] 311s | token: '-' "modp2048" '' '' 311s | parsing prf: 311s | ike_alg_byname() failed: IKE PRF algorithm 'modp2048' is not recognized 311s | lookup for PRF algorithm 'modp2048' failed 311s | -- failed 'IKE PRF algorithm 'modp2048' is not recognized' 311s | parsing 'aes_gcm-none;modp2048' for IKE 311s | proposal: 'aes_gcm-none;modp2048' 311s | token: '' '' "aes_gcm" '-' 311s | token: '' "aes_gcm" '-' "none" ';' 311s | token: '-' "none" ';' "modp2048" '' 311s | appending IKE encryption algorithm AES_GCM_16[_0] 311s | parsing prf: 311s | ike_alg_byname() failed: IKE PRF algorithm 'none' is not recognized 311s | lookup for PRF algorithm 'none' failed 311s | - failed, saving error 'IKE PRF algorithm 'none' is not recognized' and tossing result 311s | parsing integ: 311s | appending IKE integrity algorithm NONE[_0] 311s | token: ';' "modp2048" '' '' 311s | parsing dh: 311s | appending IKE DH algorithm MODP2048[_0] 311s | token: '' '' '' 311s | appending IKE PRF algorithm HMAC_SHA2_512[_0] 311s | appending IKE PRF algorithm HMAC_SHA2_256[_0] 311s | parsing 'aes_gcm-sha1-none-modp2048' for IKE 311s | proposal: 'aes_gcm-sha1-none-modp2048' 311s | token: '' '' "aes_gcm" '-' 311s | token: '' "aes_gcm" '-' "sha1" '-' 311s | token: '-' "sha1" '-' "none" '-' 311s | appending IKE encryption algorithm AES_GCM_16[_0] 311s | parsing prf: 311s | appending IKE PRF algorithm HMAC_SHA1[_0] 311s | token: '-' "none" '-' "modp2048" '' 311s | - succeeded, advancing tokens 311s | parsing dh: 311s | appending IKE DH algorithm NONE[_0] 311s | token: '-' "modp2048" '' '' 311s | parsing 'aes_gcm-sha1-none;modp2048' for IKE 311s | proposal: 'aes_gcm-sha1-none;modp2048' 311s | token: '' '' "aes_gcm" '-' 311s | token: '' "aes_gcm" '-' "sha1" '-' 311s | token: '-' "sha1" '-' "none" ';' 311s | appending IKE encryption algorithm AES_GCM_16[_0] 311s | parsing prf: 311s | appending IKE PRF algorithm HMAC_SHA1[_0] 311s | token: '-' "none" ';' "modp2048" '' 311s | - succeeded, advancing tokens 311s | parsing dh: 311s | appending IKE DH algorithm NONE[_0] 311s | token: ';' "modp2048" '' '' 311s | parsing 'aes+aes_gcm' for IKE 311s | proposal: 'aes+aes_gcm' 311s | token: '' '' "aes" '+' 311s | token: '' "aes" '+' "aes_gcm" '' 311s | token: '+' "aes_gcm" '' '' 311s | appending IKE encryption algorithm AES_CBC[_0] 311s | token: '' '' '' 311s | appending IKE encryption algorithm AES_GCM_16[_0] 311s | appending IKE PRF algorithm HMAC_SHA2_512[_0] 311s | appending IKE PRF algorithm HMAC_SHA2_256[_0] 311s | appending IKE DH algorithm DH19[_0] 311s | appending IKE DH algorithm DH20[_0] 311s | appending IKE DH algorithm DH21[_0] 311s | appending IKE DH algorithm DH31[_0] 311s | appending IKE DH algorithm MODP4096[_0] 311s | appending IKE DH algorithm MODP3072[_0] 311s | appending IKE DH algorithm MODP2048[_0] 311s | appending IKE DH algorithm MODP8192[_0] 311s | parsing ',' for IKE 311s | proposal: '' 311s | token: '' '' "" '' 311s | token: '' "" '' '' 311s | parsing 'aes,' for IKE 311s | proposal: 'aes' 311s | token: '' '' "aes" '' 311s | token: '' "aes" '' '' 311s | token: '' '' '' 311s | appending IKE encryption algorithm AES_CBC[_0] 311s | appending IKE PRF algorithm HMAC_SHA2_512[_0] 311s | appending IKE PRF algorithm HMAC_SHA2_256[_0] 311s | appending IKE integrity algorithm HMAC_SHA2_512_256[_0] 311s | appending IKE integrity algorithm HMAC_SHA2_256_128[_0] 311s | appending IKE DH algorithm DH19[_0] 311s | appending IKE DH algorithm DH20[_0] 311s | appending IKE DH algorithm DH21[_0] 311s | appending IKE DH algorithm DH31[_0] 311s | appending IKE DH algorithm MODP4096[_0] 311s | appending IKE DH algorithm MODP3072[_0] 311s | appending IKE DH algorithm MODP2048[_0] 311s | appending IKE DH algorithm MODP8192[_0] 311s | proposal: '' 311s | token: '' '' "" '' 311s | token: '' "" '' '' 311s | parsing 'aes,,aes' for IKE 311s | proposal: 'aes' 311s | token: '' '' "aes" '' 311s | token: '' "aes" '' '' 311s | token: '' '' '' 311s | appending IKE encryption algorithm AES_CBC[_0] 311s | appending IKE PRF algorithm HMAC_SHA2_512[_0] 311s | appending IKE PRF algorithm HMAC_SHA2_256[_0] 311s | appending IKE integrity algorithm HMAC_SHA2_512_256[_0] 311s | appending IKE integrity algorithm HMAC_SHA2_256_128[_0] 311s | appending IKE DH algorithm DH19[_0] 311s | appending IKE DH algorithm DH20[_0] 311s | appending IKE DH algorithm DH21[_0] 311s | appending IKE DH algorithm DH31[_0] 311s | appending IKE DH algorithm MODP4096[_0] 311s | appending IKE DH algorithm MODP3072[_0] 311s | appending IKE DH algorithm MODP2048[_0] 311s | appending IKE DH algorithm MODP8192[_0] 311s | proposal: '' 311s | token: '' '' "" '' 311s | token: '' "" '' '' 311s | parsing ',aes' for IKE 311s | proposal: '' 311s | token: '' '' "" '' 311s | token: '' "" '' '' 311s | parsing '-' for IKE 311s | proposal: '-' 311s | token: '' '' "" '-' 311s | token: '' "" '-' "" '' 311s | parsing '+' for IKE 311s | proposal: '+' 311s | token: '' '' "" '+' 311s | token: '' "" '+' "" '' 311s | parsing ';' for IKE 311s | proposal: ';' 311s | token: '' '' "" ';' 311s | token: '' "" ';' "" '' 311s | parsing 'aes-' for IKE 311s | proposal: 'aes-' 311s | token: '' '' "aes" '-' 311s | token: '' "aes" '-' "" '' 311s | token: '-' "" '' '' 311s | appending IKE encryption algorithm AES_CBC[_0] 311s | parsing prf: 311s | - failed, saving error 'IKE PRF algorithm is empty' and tossing result 311s | parsing integ: 311s | - and - failed, returning earlier PRF error 'IKE PRF algorithm is empty' and discarding INTEG error 'IKE integrity algorithm is empty') 311s | parsing 'aes+' for IKE 311s | proposal: 'aes+' 311s | token: '' '' "aes" '+' 311s | token: '' "aes" '+' "" '' 311s | token: '+' "" '' '' 311s | appending IKE encryption algorithm AES_CBC[_0] 311s | parsing 'aes;' for IKE 311s | proposal: 'aes;' 311s | token: '' '' "aes" ';' 311s | token: '' "aes" ';' "" '' 311s | token: ';' "" '' '' 311s | appending IKE encryption algorithm AES_CBC[_0] 311s | parsing dh: 311s | ... failed 'IKE DH algorithm is empty' 311s | parsing '-aes' for IKE 311s | proposal: '-aes' 311s | token: '' '' "" '-' 311s | token: '' "" '-' "aes" '' 311s | parsing '+aes' for IKE 311s | proposal: '+aes' 311s | token: '' '' "" '+' 311s | token: '' "" '+' "aes" '' 311s | parsing ';aes' for IKE 311s | proposal: ';aes' 311s | token: '' '' "" ';' 311s | token: '' "" ';' "aes" '' 311s | parsing 'aes+-' for IKE 311s | proposal: 'aes+-' 311s | token: '' '' "aes" '+' 311s | token: '' "aes" '+' "" '-' 311s | token: '+' "" '-' "" '' 311s | appending IKE encryption algorithm AES_CBC[_0] 311s | parsing 'aes+;' for IKE 311s | proposal: 'aes+;' 311s | token: '' '' "aes" '+' 311s | token: '' "aes" '+' "" ';' 311s | token: '+' "" ';' "" '' 311s | appending IKE encryption algorithm AES_CBC[_0] 311s | parsing 'aes++' for IKE 311s | proposal: 'aes++' 311s | token: '' '' "aes" '+' 311s | token: '' "aes" '+' "" '+' 311s | token: '+' "" '+' "" '' 311s | appending IKE encryption algorithm AES_CBC[_0] 311s ipsec algparse: leak detective found no leaks 311s ipsec algparse: Encryption algorithms: 311s ipsec algparse: AES_CCM_16 {256,192,*128} IKEv1: ESP IKEv2: ESP FIPS aes_ccm, aes_ccm_c 311s ipsec algparse: AES_CCM_12 {256,192,*128} IKEv1: ESP IKEv2: ESP FIPS aes_ccm_b 311s ipsec algparse: AES_CCM_8 {256,192,*128} IKEv1: ESP IKEv2: ESP FIPS aes_ccm_a 311s ipsec algparse: 3DES_CBC [*192] IKEv1: IKE ESP IKEv2: IKE ESP FIPS NSS(CBC) 3des 311s ipsec algparse: CAMELLIA_CTR {256,192,*128} IKEv1: ESP IKEv2: ESP 311s ipsec algparse: CAMELLIA_CBC {256,192,*128} IKEv1: IKE ESP IKEv2: IKE ESP NSS(CBC) camellia 311s ipsec algparse: AES_GCM_16 {256,192,*128} IKEv1: ESP IKEv2: IKE ESP FIPS NSS(AEAD) aes_gcm, aes_gcm_c 311s ipsec algparse: AES_GCM_12 {256,192,*128} IKEv1: ESP IKEv2: IKE ESP FIPS NSS(AEAD) aes_gcm_b 311s ipsec algparse: AES_GCM_8 {256,192,*128} IKEv1: ESP IKEv2: IKE ESP FIPS NSS(AEAD) aes_gcm_a 311s ipsec algparse: AES_CTR {256,192,*128} IKEv1: IKE ESP IKEv2: IKE ESP FIPS NSS(CTR) aesctr 311s ipsec algparse: AES_CBC {256,192,*128} IKEv1: IKE ESP IKEv2: IKE ESP FIPS NSS(CBC) aes 311s ipsec algparse: NULL_AUTH_AES_GMAC {256,192,*128} IKEv1: ESP IKEv2: ESP FIPS aes_gmac 311s ipsec algparse: NULL [] IKEv1: ESP IKEv2: ESP NULL 311s ipsec algparse: CHACHA20_POLY1305 [*256] IKEv1: IKEv2: IKE ESP NSS(AEAD) chacha20poly1305 311s ipsec algparse: Hash algorithms: 311s ipsec algparse: MD5 IKEv1: IKE IKEv2: NSS 311s ipsec algparse: SHA1 IKEv1: IKE IKEv2: IKE FIPS NSS sha 311s ipsec algparse: SHA2_256 IKEv1: IKE IKEv2: IKE FIPS NSS sha2, sha256 311s ipsec algparse: SHA2_384 IKEv1: IKE IKEv2: IKE FIPS NSS sha384 311s ipsec algparse: SHA2_512 IKEv1: IKE IKEv2: IKE FIPS NSS sha512 311s ipsec algparse: IDENTITY IKEv1: IKEv2: FIPS 311s ipsec algparse: PRF algorithms: 311s ipsec algparse: HMAC_MD5 IKEv1: IKE IKEv2: IKE NSS md5 311s ipsec algparse: HMAC_SHA1 IKEv1: IKE IKEv2: IKE FIPS NSS sha, sha1 311s ipsec algparse: HMAC_SHA2_256 IKEv1: IKE IKEv2: IKE FIPS NSS sha2, sha256, sha2_256 311s ipsec algparse: HMAC_SHA2_384 IKEv1: IKE IKEv2: IKE FIPS NSS sha384, sha2_384 311s ipsec algparse: HMAC_SHA2_512 IKEv1: IKE IKEv2: IKE FIPS NSS sha512, sha2_512 311s ipsec algparse: AES_XCBC IKEv1: IKEv2: IKE native(XCBC) aes128_xcbc 311s ipsec algparse: Integrity algorithms: 311s ipsec algparse: HMAC_MD5_96 IKEv1: IKE ESP AH IKEv2: IKE ESP AH NSS md5, hmac_md5 311s ipsec algparse: HMAC_SHA1_96 IKEv1: IKE ESP AH IKEv2: IKE ESP AH FIPS NSS sha, sha1, sha1_96, hmac_sha1 311s ipsec algparse: HMAC_SHA2_512_256 IKEv1: IKE ESP AH IKEv2: IKE ESP AH FIPS NSS sha512, sha2_512, sha2_512_256, hmac_sha2_512 311s ipsec algparse: HMAC_SHA2_384_192 IKEv1: IKE ESP AH IKEv2: IKE ESP AH FIPS NSS sha384, sha2_384, sha2_384_192, hmac_sha2_384 311s ipsec algparse: HMAC_SHA2_256_128 IKEv1: IKE ESP AH IKEv2: IKE ESP AH FIPS NSS sha2, sha256, sha2_256, sha2_256_128, hmac_sha2_256 311s ipsec algparse: HMAC_SHA2_256_TRUNCBUG IKEv1: ESP AH IKEv2: AH 311s ipsec algparse: AES_XCBC_96 IKEv1: ESP AH IKEv2: IKE ESP AH native(XCBC) aes_xcbc, aes128_xcbc, aes128_xcbc_96 311s ipsec algparse: AES_CMAC_96 IKEv1: ESP AH IKEv2: ESP AH FIPS aes_cmac 311s ipsec algparse: NONE IKEv1: ESP IKEv2: IKE ESP FIPS null 311s ipsec algparse: DH algorithms: 311s ipsec algparse: NONE IKEv1: IKEv2: IKE ESP AH FIPS NSS(MODP) null, dh0 311s ipsec algparse: MODP1536 IKEv1: IKE ESP AH IKEv2: IKE ESP AH NSS(MODP) dh5 311s ipsec algparse: MODP2048 IKEv1: IKE ESP AH IKEv2: IKE ESP AH FIPS NSS(MODP) dh14 311s ipsec algparse: MODP3072 IKEv1: IKE ESP AH IKEv2: IKE ESP AH FIPS NSS(MODP) dh15 311s ipsec algparse: MODP4096 IKEv1: IKE ESP AH IKEv2: IKE ESP AH FIPS NSS(MODP) dh16 311s ipsec algparse: MODP6144 IKEv1: IKE ESP AH IKEv2: IKE ESP AH FIPS NSS(MODP) dh17 311s ipsec algparse: MODP8192 IKEv1: IKE ESP AH IKEv2: IKE ESP AH FIPS NSS(MODP) dh18 311s ipsec algparse: DH19 IKEv1: IKE IKEv2: IKE ESP AH FIPS NSS(ECP) ecp_256, ecp256 311s ipsec algparse: DH20 IKEv1: IKE IKEv2: IKE ESP AH FIPS NSS(ECP) ecp_384, ecp384 311s ipsec algparse: DH21 IKEv1: IKE IKEv2: IKE ESP AH FIPS NSS(ECP) ecp_521, ecp521 311s ipsec algparse: DH31 IKEv1: IKE IKEv2: IKE ESP AH NSS(ECP) curve25519 311s ipsec algparse: IPCOMP algorithms: 311s ipsec algparse: DEFLATE IKEv1: ESP AH IKEv2: ESP AH FIPS 311s ipsec algparse: LZS IKEv1: IKEv2: ESP AH FIPS 311s ipsec algparse: LZJH IKEv1: IKEv2: ESP AH FIPS 311s ipsec algparse: testing CAMELLIA_CBC: 311s ipsec algparse: Camellia: 16 bytes with 128-bit key 311s | decode_to_chunk() raw_key: input "0x00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00" 311s | decode_to_chunk() output: 311s | 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................ 311s | CONCATENATE_DATA_AND_BASE: 311s | target: EXTRACT_KEY_FROM_KEY 311s | base: base-key@0x2aa37d10350 (16-bytes, AES_KEY_GEN) 311s | params: 16-bytes@0x3ffde276f28 311s | key-offset: 0, key-size: 16 311s | EXTRACT_KEY_FROM_KEY: 311s | target: CAMELLIA_CBC 311s | flags: ENCRYPT+DECRYPT 311s | key_size: 16-bytes 311s | base: base-key@0x2aa37d13360 (32-bytes, EXTRACT_KEY_FROM_KEY) 311s | operation: FLAGS_ONLY 311s | params: 8-bytes@0x3ffde276e78 311s | decode_to_mac() IV: : input "0x00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00" 311s | decode_to_mac() output: 311s | 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................ 311s | decode_to_chunk() new IV: : input "0x07 92 3A 39 EB 0A 81 7D 1C 4D 87 BD B8 2D 1F 1C" 311s | decode_to_chunk() output: 311s | 07 92 3a 39 eb 0a 81 7d 1c 4d 87 bd b8 2d 1f 1c ..:9...}.M...-.. 311s | decode_to_chunk() plaintext: : input "0x80 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00" 311s | decode_to_chunk() output: 311s | 80 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................ 311s | decode_to_chunk() ciphertext: : input "0x07 92 3A 39 EB 0A 81 7D 1C 4D 87 BD B8 2D 1F 1C" 311s | decode_to_chunk() output: 311s | 07 92 3a 39 eb 0a 81 7d 1c 4d 87 bd b8 2d 1f 1c ..:9...}.M...-.. 311s | NSS ike_alg_nss_cbc: CAMELLIA_CBC - enter (nil) 311s | using IKEv1 IV 311s | NSS ike_alg_nss_cbc: CAMELLIA_CBC - exit 311s | verify_bytes() Camellia: 16 bytes with 128-bit key: encrypt: ok 311s | verify_bytes() Camellia: 16 bytes with 128-bit key: updated CBC IV: ok 311s | decode_to_mac() IV: : input "0x00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00" 311s | decode_to_mac() output: 311s | 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................ 311s | decode_to_chunk() new IV: : input "0x07 92 3A 39 EB 0A 81 7D 1C 4D 87 BD B8 2D 1F 1C" 311s | decode_to_chunk() output: 311s | 07 92 3a 39 eb 0a 81 7d 1c 4d 87 bd b8 2d 1f 1c ..:9...}.M...-.. 311s | decode_to_chunk() ciphertext: : input "0x07 92 3A 39 EB 0A 81 7D 1C 4D 87 BD B8 2D 1F 1C" 311s | decode_to_chunk() output: 311s | 07 92 3a 39 eb 0a 81 7d 1c 4d 87 bd b8 2d 1f 1c ..:9...}.M...-.. 311s | decode_to_chunk() plaintext: : input "0x80 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00" 311s | decode_to_chunk() output: 311s | 80 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................ 311s | NSS ike_alg_nss_cbc: CAMELLIA_CBC - enter (nil) 311s | using IKEv1 IV 311s | NSS ike_alg_nss_cbc: CAMELLIA_CBC - exit 311s | verify_bytes() Camellia: 16 bytes with 128-bit key: decrypt: ok 311s | verify_bytes() Camellia: 16 bytes with 128-bit key: updated CBC IV: ok 311s ipsec algparse: Camellia: 16 bytes with 128-bit key 311s | decode_to_chunk() raw_key: input "0x00 11 22 33 44 55 66 77 88 99 AA BB CC DD EE FF" 311s | decode_to_chunk() output: 311s | 00 11 22 33 44 55 66 77 88 99 aa bb cc dd ee ff .."3DUfw........ 311s | CONCATENATE_DATA_AND_BASE: 311s | target: EXTRACT_KEY_FROM_KEY 311s | base: base-key@0x2aa37d10350 (16-bytes, AES_KEY_GEN) 311s | params: 16-bytes@0x3ffde276f28 311s | key-offset: 0, key-size: 16 311s | EXTRACT_KEY_FROM_KEY: 311s | target: CAMELLIA_CBC 311s | flags: ENCRYPT+DECRYPT 311s | key_size: 16-bytes 311s | base: base-key@0x2aa37d13360 (32-bytes, EXTRACT_KEY_FROM_KEY) 311s | operation: FLAGS_ONLY 311s | params: 8-bytes@0x3ffde276e78 311s | decode_to_mac() IV: : input "0x00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00" 311s | decode_to_mac() output: 311s | 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................ 311s | decode_to_chunk() new IV: : input "0x14 4D 2B 0F 50 0C 27 B7 EC 2C D1 2D 91 59 6F 37" 311s | decode_to_chunk() output: 311s | 14 4d 2b 0f 50 0c 27 b7 ec 2c d1 2d 91 59 6f 37 .M+.P.'..,.-.Yo7 311s | decode_to_chunk() plaintext: : input "0x00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 01 " 311s | decode_to_chunk() output: 311s | 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 01 ................ 311s | decode_to_chunk() ciphertext: : input "0x14 4D 2B 0F 50 0C 27 B7 EC 2C D1 2D 91 59 6F 37" 311s | decode_to_chunk() output: 311s | 14 4d 2b 0f 50 0c 27 b7 ec 2c d1 2d 91 59 6f 37 .M+.P.'..,.-.Yo7 311s | NSS ike_alg_nss_cbc: CAMELLIA_CBC - enter (nil) 311s | using IKEv1 IV 311s | NSS ike_alg_nss_cbc: CAMELLIA_CBC - exit 311s | verify_bytes() Camellia: 16 bytes with 128-bit key: encrypt: ok 311s | verify_bytes() Camellia: 16 bytes with 128-bit key: updated CBC IV: ok 311s | decode_to_mac() IV: : input "0x00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00" 311s | decode_to_mac() output: 311s | 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................ 311s | decode_to_chunk() new IV: : input "0x14 4D 2B 0F 50 0C 27 B7 EC 2C D1 2D 91 59 6F 37" 311s | decode_to_chunk() output: 311s | 14 4d 2b 0f 50 0c 27 b7 ec 2c d1 2d 91 59 6f 37 .M+.P.'..,.-.Yo7 311s | decode_to_chunk() ciphertext: : input "0x14 4D 2B 0F 50 0C 27 B7 EC 2C D1 2D 91 59 6F 37" 311s | decode_to_chunk() output: 311s | 14 4d 2b 0f 50 0c 27 b7 ec 2c d1 2d 91 59 6f 37 .M+.P.'..,.-.Yo7 311s | decode_to_chunk() plaintext: : input "0x00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 01 " 311s | decode_to_chunk() output: 311s | 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 01 ................ 311s | NSS ike_alg_nss_cbc: CAMELLIA_CBC - enter (nil) 311s | using IKEv1 IV 311s | NSS ike_alg_nss_cbc: CAMELLIA_CBC - exit 311s | verify_bytes() Camellia: 16 bytes with 128-bit key: decrypt: ok 311s | verify_bytes() Camellia: 16 bytes with 128-bit key: updated CBC IV: ok 311s ipsec algparse: Camellia: 16 bytes with 256-bit key 311s | decode_to_chunk() raw_key: input "0x00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00" 311s | decode_to_chunk() output: 311s | 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................ 311s | 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................ 311s | CONCATENATE_DATA_AND_BASE: 311s | target: EXTRACT_KEY_FROM_KEY 311s | base: base-key@0x2aa37d10350 (16-bytes, AES_KEY_GEN) 311s | params: 16-bytes@0x3ffde276f28 311s | key-offset: 0, key-size: 32 311s | EXTRACT_KEY_FROM_KEY: 311s | target: CAMELLIA_CBC 311s | flags: ENCRYPT+DECRYPT 311s | key_size: 32-bytes 311s | base: base-key@0x2aa37d13360 (48-bytes, EXTRACT_KEY_FROM_KEY) 311s | operation: FLAGS_ONLY 311s | params: 8-bytes@0x3ffde276e78 311s | decode_to_mac() IV: : input "0x00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00" 311s | decode_to_mac() output: 311s | 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................ 311s | decode_to_chunk() new IV: : input "0xB0 C6 B8 8A EA 51 8A B0 9E 84 72 48 E9 1B 1B 9D" 311s | decode_to_chunk() output: 311s | b0 c6 b8 8a ea 51 8a b0 9e 84 72 48 e9 1b 1b 9d .....Q....rH.... 311s | decode_to_chunk() plaintext: : input "0x80 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00" 311s | decode_to_chunk() output: 311s | 80 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................ 311s | decode_to_chunk() ciphertext: : input "0xB0 C6 B8 8A EA 51 8A B0 9E 84 72 48 E9 1B 1B 9D" 311s | decode_to_chunk() output: 311s | b0 c6 b8 8a ea 51 8a b0 9e 84 72 48 e9 1b 1b 9d .....Q....rH.... 311s | NSS ike_alg_nss_cbc: CAMELLIA_CBC - enter (nil) 311s | using IKEv1 IV 311s | NSS ike_alg_nss_cbc: CAMELLIA_CBC - exit 311s | verify_bytes() Camellia: 16 bytes with 256-bit key: encrypt: ok 311s | verify_bytes() Camellia: 16 bytes with 256-bit key: updated CBC IV: ok 311s | decode_to_mac() IV: : input "0x00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00" 311s | decode_to_mac() output: 311s | 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................ 311s | decode_to_chunk() new IV: : input "0xB0 C6 B8 8A EA 51 8A B0 9E 84 72 48 E9 1B 1B 9D" 311s | decode_to_chunk() output: 311s | b0 c6 b8 8a ea 51 8a b0 9e 84 72 48 e9 1b 1b 9d .....Q....rH.... 311s | decode_to_chunk() ciphertext: : input "0xB0 C6 B8 8A EA 51 8A B0 9E 84 72 48 E9 1B 1B 9D" 311s | decode_to_chunk() output: 311s | b0 c6 b8 8a ea 51 8a b0 9e 84 72 48 e9 1b 1b 9d .....Q....rH.... 311s | decode_to_chunk() plaintext: : input "0x80 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00" 311s | decode_to_chunk() output: 311s | 80 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................ 311s | NSS ike_alg_nss_cbc: CAMELLIA_CBC - enter (nil) 311s | using IKEv1 IV 311s | NSS ike_alg_nss_cbc: CAMELLIA_CBC - exit 311s | verify_bytes() Camellia: 16 bytes with 256-bit key: decrypt: ok 311s | verify_bytes() Camellia: 16 bytes with 256-bit key: updated CBC IV: ok 311s ipsec algparse: Camellia: 16 bytes with 256-bit key 311s | decode_to_chunk() raw_key: input "0x00 11 22 33 44 55 66 77 88 99 AA BB CC DD EE FF FF EE DD CC BB AA 99 88 77 66 55 44 33 22 11 00" 311s | decode_to_chunk() output: 311s | 00 11 22 33 44 55 66 77 88 99 aa bb cc dd ee ff .."3DUfw........ 311s | ff ee dd cc bb aa 99 88 77 66 55 44 33 22 11 00 ........wfUD3".. 311s | CONCATENATE_DATA_AND_BASE: 311s | target: EXTRACT_KEY_FROM_KEY 311s | base: base-key@0x2aa37d10350 (16-bytes, AES_KEY_GEN) 311s | params: 16-bytes@0x3ffde276f28 311s | key-offset: 0, key-size: 32 311s | EXTRACT_KEY_FROM_KEY: 311s | target: CAMELLIA_CBC 311s | flags: ENCRYPT+DECRYPT 311s | key_size: 32-bytes 311s | base: base-key@0x2aa37d13360 (48-bytes, EXTRACT_KEY_FROM_KEY) 311s | operation: FLAGS_ONLY 311s | params: 8-bytes@0x3ffde276e78 311s | decode_to_mac() IV: : input "0x00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00" 311s | decode_to_mac() output: 311s | 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................ 311s | decode_to_chunk() new IV: : input "0xCC 39 FF EE 18 56 D3 EB 61 02 5E 93 21 9B 65 23 " 311s | decode_to_chunk() output: 311s | cc 39 ff ee 18 56 d3 eb 61 02 5e 93 21 9b 65 23 .9...V..a.^.!.e# 311s | decode_to_chunk() plaintext: : input "0x00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 01" 311s | decode_to_chunk() output: 311s | 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 01 ................ 311s | decode_to_chunk() ciphertext: : input "0xCC 39 FF EE 18 56 D3 EB 61 02 5E 93 21 9B 65 23 " 311s | decode_to_chunk() output: 311s | cc 39 ff ee 18 56 d3 eb 61 02 5e 93 21 9b 65 23 .9...V..a.^.!.e# 311s | NSS ike_alg_nss_cbc: CAMELLIA_CBC - enter (nil) 311s | using IKEv1 IV 311s | NSS ike_alg_nss_cbc: CAMELLIA_CBC - exit 311s | verify_bytes() Camellia: 16 bytes with 256-bit key: encrypt: ok 311s | verify_bytes() Camellia: 16 bytes with 256-bit key: updated CBC IV: ok 311s | decode_to_mac() IV: : input "0x00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00" 311s | decode_to_mac() output: 311s | 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................ 311s | decode_to_chunk() new IV: : input "0xCC 39 FF EE 18 56 D3 EB 61 02 5E 93 21 9B 65 23 " 311s | decode_to_chunk() output: 311s | cc 39 ff ee 18 56 d3 eb 61 02 5e 93 21 9b 65 23 .9...V..a.^.!.e# 311s | decode_to_chunk() ciphertext: : input "0xCC 39 FF EE 18 56 D3 EB 61 02 5E 93 21 9B 65 23 " 311s | decode_to_chunk() output: 311s | cc 39 ff ee 18 56 d3 eb 61 02 5e 93 21 9b 65 23 .9...V..a.^.!.e# 311s | decode_to_chunk() plaintext: : input "0x00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 01" 311s | decode_to_chunk() output: 311s | 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 01 ................ 311s | NSS ike_alg_nss_cbc: CAMELLIA_CBC - enter (nil) 311s | using IKEv1 IV 311s | NSS ike_alg_nss_cbc: CAMELLIA_CBC - exit 311s | verify_bytes() Camellia: 16 bytes with 256-bit key: decrypt: ok 311s | verify_bytes() Camellia: 16 bytes with 256-bit key: updated CBC IV: ok 311s ipsec algparse: testing AES_GCM_16: 311s ipsec algparse: empty string 311s | decode_to_chunk() raw_key: input "0xcf063a34d4a9a76c2c86787d3f96db71" 311s | decode_to_chunk() output: 311s | cf 06 3a 34 d4 a9 a7 6c 2c 86 78 7d 3f 96 db 71 ..:4...l,.x}?..q 311s | CONCATENATE_DATA_AND_BASE: 311s | target: EXTRACT_KEY_FROM_KEY 311s | base: base-key@0x2aa37d10350 (16-bytes, AES_KEY_GEN) 311s | params: 16-bytes@0x3ffde276e10 311s | key-offset: 0, key-size: 16 311s | EXTRACT_KEY_FROM_KEY: 311s | target: AES_GCM 311s | flags: ENCRYPT+DECRYPT 311s | key_size: 16-bytes 311s | base: base-key@0x2aa37d13360 (32-bytes, EXTRACT_KEY_FROM_KEY) 311s | operation: FLAGS_ONLY 311s | params: 8-bytes@0x3ffde276d60 311s | decode_to_chunk() salted IV: input "0x113b9785971864c83b01c787" 311s | decode_to_chunk() output: 311s | 11 3b 97 85 97 18 64 c8 3b 01 c7 87 .;....d.;... 311s | decode_to_chunk() AAD: input "" 311s | decode_to_chunk() output: 311s | 311s | decode_to_chunk() plaintext: input "" 311s | decode_to_chunk() output: 311s | 311s | decode_to_chunk() ciphertext: input "" 311s | decode_to_chunk() output: 311s | 311s | decode_to_chunk() tag: input "0x72ac8493e3a5228b5d130a69d2510e42" 311s | decode_to_chunk() output: 311s | 72 ac 84 93 e3 a5 22 8b 5d 13 0a 69 d2 51 0e 42 r.....".]..i.Q.B 311s | test_gcm_vector() DECRYPT: aad-size=0 salt-size=4 wire-IV-size=8 text-size=0 tag-size=16 text+tag in: 311s | 72 ac 84 93 e3 a5 22 8b 5d 13 0a 69 d2 51 0e 42 r.....".]..i.Q.B 311s | verify_bytes() empty string: output ciphertext: ok 311s | verify_bytes() empty string: TAG: ok 311s | test_gcm_vector() text+tag out: 311s | 72 ac 84 93 e3 a5 22 8b 5d 13 0a 69 d2 51 0e 42 r.....".]..i.Q.B 311s | test_gcm_vector() ENCRYPT: aad-size=0 salt-size=4 wire-IV-size=8 text-size=0 tag-size=16 text+tag in: 311s | 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................ 311s | verify_bytes() empty string: output ciphertext: ok 311s | verify_bytes() empty string: TAG: ok 311s | test_gcm_vector() text+tag out: 311s | 72 ac 84 93 e3 a5 22 8b 5d 13 0a 69 d2 51 0e 42 r.....".]..i.Q.B 311s ipsec algparse: one block 311s | decode_to_chunk() raw_key: input "0xe98b72a9881a84ca6b76e0f43e68647a" 311s | decode_to_chunk() output: 311s | e9 8b 72 a9 88 1a 84 ca 6b 76 e0 f4 3e 68 64 7a ..r.....kv..>hdz 311s | CONCATENATE_DATA_AND_BASE: 311s | target: EXTRACT_KEY_FROM_KEY 311s | base: base-key@0x2aa37d10350 (16-bytes, AES_KEY_GEN) 311s | params: 16-bytes@0x3ffde276e10 311s | key-offset: 0, key-size: 16 311s | EXTRACT_KEY_FROM_KEY: 311s | target: AES_GCM 311s | flags: ENCRYPT+DECRYPT 311s | key_size: 16-bytes 311s | base: base-key@0x2aa37d13360 (32-bytes, EXTRACT_KEY_FROM_KEY) 311s | operation: FLAGS_ONLY 311s | params: 8-bytes@0x3ffde276d60 311s | decode_to_chunk() salted IV: input "0x8b23299fde174053f3d652ba" 311s | decode_to_chunk() output: 311s | 8b 23 29 9f de 17 40 53 f3 d6 52 ba .#)...@S..R. 311s | decode_to_chunk() AAD: input "" 311s | decode_to_chunk() output: 311s | 311s | decode_to_chunk() plaintext: input "0x28286a321293253c3e0aa2704a278032" 311s | decode_to_chunk() output: 311s | 28 28 6a 32 12 93 25 3c 3e 0a a2 70 4a 27 80 32 ((j2..%<>..pJ'.2 311s | decode_to_chunk() ciphertext: input "0x5a3c1cf1985dbb8bed818036fdd5ab42" 311s | decode_to_chunk() output: 311s | 5a 3c 1c f1 98 5d bb 8b ed 81 80 36 fd d5 ab 42 Z<...].....6...B 311s | decode_to_chunk() tag: input "0x23c7ab0f952b7091cd324835043b5eb5" 311s | decode_to_chunk() output: 311s | 23 c7 ab 0f 95 2b 70 91 cd 32 48 35 04 3b 5e b5 #....+p..2H5.;^. 311s | test_gcm_vector() DECRYPT: aad-size=0 salt-size=4 wire-IV-size=8 text-size=16 tag-size=16 text+tag in: 311s | 5a 3c 1c f1 98 5d bb 8b ed 81 80 36 fd d5 ab 42 Z<...].....6...B 311s | 23 c7 ab 0f 95 2b 70 91 cd 32 48 35 04 3b 5e b5 #....+p..2H5.;^. 311s | verify_bytes() one block: output ciphertext: ok 311s | verify_bytes() one block: TAG: ok 311s | test_gcm_vector() text+tag out: 311s | 28 28 6a 32 12 93 25 3c 3e 0a a2 70 4a 27 80 32 ((j2..%<>..pJ'.2 311s | 23 c7 ab 0f 95 2b 70 91 cd 32 48 35 04 3b 5e b5 #....+p..2H5.;^. 311s | test_gcm_vector() ENCRYPT: aad-size=0 salt-size=4 wire-IV-size=8 text-size=16 tag-size=16 text+tag in: 311s | 28 28 6a 32 12 93 25 3c 3e 0a a2 70 4a 27 80 32 ((j2..%<>..pJ'.2 311s | 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................ 311s | verify_bytes() one block: output ciphertext: ok 311s | verify_bytes() one block: TAG: ok 311s | test_gcm_vector() text+tag out: 311s | 5a 3c 1c f1 98 5d bb 8b ed 81 80 36 fd d5 ab 42 Z<...].....6...B 311s | 23 c7 ab 0f 95 2b 70 91 cd 32 48 35 04 3b 5e b5 #....+p..2H5.;^. 311s ipsec algparse: two blocks 311s | decode_to_chunk() raw_key: input "0xbfd414a6212958a607a0f5d3ab48471d" 311s | decode_to_chunk() output: 311s | bf d4 14 a6 21 29 58 a6 07 a0 f5 d3 ab 48 47 1d ....!)X......HG. 311s | CONCATENATE_DATA_AND_BASE: 311s | target: EXTRACT_KEY_FROM_KEY 311s | base: base-key@0x2aa37d10350 (16-bytes, AES_KEY_GEN) 311s | params: 16-bytes@0x3ffde276e10 311s | key-offset: 0, key-size: 16 311s | EXTRACT_KEY_FROM_KEY: 311s | target: AES_GCM 311s | flags: ENCRYPT+DECRYPT 311s | key_size: 16-bytes 311s | base: base-key@0x2aa37d13360 (32-bytes, EXTRACT_KEY_FROM_KEY) 311s | operation: FLAGS_ONLY 311s | params: 8-bytes@0x3ffde276d60 311s | decode_to_chunk() salted IV: input "0x86d8ea0ab8e40dcc481cd0e2" 311s | decode_to_chunk() output: 311s | 86 d8 ea 0a b8 e4 0d cc 48 1c d0 e2 ........H... 311s | decode_to_chunk() AAD: input "" 311s | decode_to_chunk() output: 311s | 311s | decode_to_chunk() plaintext: input "0xa6b76a066e63392c9443e60272ceaeb9d25c991b0f2e55e2804e168c05ea591a" 311s | decode_to_chunk() output: 311s | a6 b7 6a 06 6e 63 39 2c 94 43 e6 02 72 ce ae b9 ..j.nc9,.C..r... 311s | d2 5c 99 1b 0f 2e 55 e2 80 4e 16 8c 05 ea 59 1a .\....U..N....Y. 311s | decode_to_chunk() ciphertext: input "0x62171db33193292d930bf6647347652c1ef33316d7feca99d54f1db4fcf513f8" 311s | decode_to_chunk() output: 311s | 62 17 1d b3 31 93 29 2d 93 0b f6 64 73 47 65 2c b...1.)-...dsGe, 311s | 1e f3 33 16 d7 fe ca 99 d5 4f 1d b4 fc f5 13 f8 ..3......O...... 311s | decode_to_chunk() tag: input "0xc28280aa5c6c7a8bd366f28c1cfd1f6e" 311s | decode_to_chunk() output: 311s | c2 82 80 aa 5c 6c 7a 8b d3 66 f2 8c 1c fd 1f 6e ....\lz..f.....n 311s | test_gcm_vector() DECRYPT: aad-size=0 salt-size=4 wire-IV-size=8 text-size=32 tag-size=16 text+tag in: 311s | 62 17 1d b3 31 93 29 2d 93 0b f6 64 73 47 65 2c b...1.)-...dsGe, 311s | 1e f3 33 16 d7 fe ca 99 d5 4f 1d b4 fc f5 13 f8 ..3......O...... 311s | c2 82 80 aa 5c 6c 7a 8b d3 66 f2 8c 1c fd 1f 6e ....\lz..f.....n 311s | verify_bytes() two blocks: output ciphertext: ok 311s | verify_bytes() two blocks: TAG: ok 311s | test_gcm_vector() text+tag out: 311s | a6 b7 6a 06 6e 63 39 2c 94 43 e6 02 72 ce ae b9 ..j.nc9,.C..r... 311s | d2 5c 99 1b 0f 2e 55 e2 80 4e 16 8c 05 ea 59 1a .\....U..N....Y. 311s | c2 82 80 aa 5c 6c 7a 8b d3 66 f2 8c 1c fd 1f 6e ....\lz..f.....n 311s | test_gcm_vector() ENCRYPT: aad-size=0 salt-size=4 wire-IV-size=8 text-size=32 tag-size=16 text+tag in: 311s | a6 b7 6a 06 6e 63 39 2c 94 43 e6 02 72 ce ae b9 ..j.nc9,.C..r... 311s | d2 5c 99 1b 0f 2e 55 e2 80 4e 16 8c 05 ea 59 1a .\....U..N....Y. 311s | 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................ 311s | verify_bytes() two blocks: output ciphertext: ok 311s | verify_bytes() two blocks: TAG: ok 311s | test_gcm_vector() text+tag out: 311s | 62 17 1d b3 31 93 29 2d 93 0b f6 64 73 47 65 2c b...1.)-...dsGe, 311s | 1e f3 33 16 d7 fe ca 99 d5 4f 1d b4 fc f5 13 f8 ..3......O...... 311s | c2 82 80 aa 5c 6c 7a 8b d3 66 f2 8c 1c fd 1f 6e ....\lz..f.....n 311s ipsec algparse: two blocks with associated data 311s | decode_to_chunk() raw_key: input "0x95bcde70c094f04e3dd8259cafd88ce8" 311s | decode_to_chunk() output: 311s | 95 bc de 70 c0 94 f0 4e 3d d8 25 9c af d8 8c e8 ...p...N=.%..... 311s | CONCATENATE_DATA_AND_BASE: 311s | target: EXTRACT_KEY_FROM_KEY 311s | base: base-key@0x2aa37d10350 (16-bytes, AES_KEY_GEN) 311s | params: 16-bytes@0x3ffde276e10 311s | key-offset: 0, key-size: 16 311s | EXTRACT_KEY_FROM_KEY: 311s | target: AES_GCM 311s | flags: ENCRYPT+DECRYPT 311s | key_size: 16-bytes 311s | base: base-key@0x2aa37d13360 (32-bytes, EXTRACT_KEY_FROM_KEY) 311s | operation: FLAGS_ONLY 311s | params: 8-bytes@0x3ffde276d60 311s | decode_to_chunk() salted IV: input "0x12cf097ad22380432ff40a5c" 311s | decode_to_chunk() output: 311s | 12 cf 09 7a d2 23 80 43 2f f4 0a 5c ...z.#.C/..\ 311s | decode_to_chunk() AAD: input "0xc783a0cca10a8d9fb8d27d69659463f2" 311s | decode_to_chunk() output: 311s | c7 83 a0 cc a1 0a 8d 9f b8 d2 7d 69 65 94 63 f2 ..........}ie.c. 311s | decode_to_chunk() plaintext: input "0x32f51e837a9748838925066d69e87180f34a6437e6b396e5643b34cb2ee4f7b1" 311s | decode_to_chunk() output: 311s | 32 f5 1e 83 7a 97 48 83 89 25 06 6d 69 e8 71 80 2...z.H..%.mi.q. 311s | f3 4a 64 37 e6 b3 96 e5 64 3b 34 cb 2e e4 f7 b1 .Jd7....d;4..... 311s | decode_to_chunk() ciphertext: input "0x8a023ba477f5b809bddcda8f55e09064d6d88aaec99c1e141212ea5b08503660" 311s | decode_to_chunk() output: 311s | 8a 02 3b a4 77 f5 b8 09 bd dc da 8f 55 e0 90 64 ..;.w.......U..d 311s | d6 d8 8a ae c9 9c 1e 14 12 12 ea 5b 08 50 36 60 ...........[.P6` 311s | decode_to_chunk() tag: input "0x562f500dae635d60a769b466e15acd1e" 311s | decode_to_chunk() output: 311s | 56 2f 50 0d ae 63 5d 60 a7 69 b4 66 e1 5a cd 1e V/P..c]`.i.f.Z.. 311s | test_gcm_vector() DECRYPT: aad-size=16 salt-size=4 wire-IV-size=8 text-size=32 tag-size=16 text+tag in: 311s | 8a 02 3b a4 77 f5 b8 09 bd dc da 8f 55 e0 90 64 ..;.w.......U..d 311s | d6 d8 8a ae c9 9c 1e 14 12 12 ea 5b 08 50 36 60 ...........[.P6` 311s | 56 2f 50 0d ae 63 5d 60 a7 69 b4 66 e1 5a cd 1e V/P..c]`.i.f.Z.. 311s | verify_bytes() two blocks with associated data: output ciphertext: ok 311s | verify_bytes() two blocks with associated data: TAG: ok 311s | test_gcm_vector() text+tag out: 311s | 32 f5 1e 83 7a 97 48 83 89 25 06 6d 69 e8 71 80 2...z.H..%.mi.q. 311s | f3 4a 64 37 e6 b3 96 e5 64 3b 34 cb 2e e4 f7 b1 .Jd7....d;4..... 311s | 56 2f 50 0d ae 63 5d 60 a7 69 b4 66 e1 5a cd 1e V/P..c]`.i.f.Z.. 311s | test_gcm_vector() ENCRYPT: aad-size=16 salt-size=4 wire-IV-size=8 text-size=32 tag-size=16 text+tag in: 311s | 32 f5 1e 83 7a 97 48 83 89 25 06 6d 69 e8 71 80 2...z.H..%.mi.q. 311s | f3 4a 64 37 e6 b3 96 e5 64 3b 34 cb 2e e4 f7 b1 .Jd7....d;4..... 311s | 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................ 311s | verify_bytes() two blocks with associated data: output ciphertext: ok 311s | verify_bytes() two blocks with associated data: TAG: ok 311s | test_gcm_vector() text+tag out: 311s | 8a 02 3b a4 77 f5 b8 09 bd dc da 8f 55 e0 90 64 ..;.w.......U..d 311s | d6 d8 8a ae c9 9c 1e 14 12 12 ea 5b 08 50 36 60 ...........[.P6` 311s | 56 2f 50 0d ae 63 5d 60 a7 69 b4 66 e1 5a cd 1e V/P..c]`.i.f.Z.. 311s ipsec algparse: testing AES_CTR: 311s ipsec algparse: Encrypting 16 octets using AES-CTR with 128-bit key 311s | decode_to_chunk() raw_key: input "0x AE 68 52 F8 12 10 67 CC 4B F7 A5 76 55 77 F3 9E" 311s | decode_to_chunk() output: 311s | ae 68 52 f8 12 10 67 cc 4b f7 a5 76 55 77 f3 9e .hR...g.K..vUw.. 311s | CONCATENATE_DATA_AND_BASE: 311s | target: EXTRACT_KEY_FROM_KEY 311s | base: base-key@0x2aa37d10350 (16-bytes, AES_KEY_GEN) 311s | params: 16-bytes@0x3ffde276f20 311s | key-offset: 0, key-size: 16 311s | EXTRACT_KEY_FROM_KEY: 311s | target: AES_CTR 311s | flags: ENCRYPT+DECRYPT 311s | key_size: 16-bytes 311s | base: base-key@0x2aa37d13360 (32-bytes, EXTRACT_KEY_FROM_KEY) 311s | operation: FLAGS_ONLY 311s | params: 8-bytes@0x3ffde276e70 311s | decode_to_mac() input counter-block: : input "0x 00 00 00 30 00 00 00 00 00 00 00 00 00 00 00 01" 311s | decode_to_mac() output: 311s | 00 00 00 30 00 00 00 00 00 00 00 00 00 00 00 01 ...0............ 311s | decode_to_chunk() Plaintext: input "0x 53 69 6E 67 6C 65 20 62 6C 6F 63 6B 20 6D 73 67" 311s | decode_to_chunk() output: 311s | 53 69 6e 67 6c 65 20 62 6c 6f 63 6b 20 6d 73 67 Single block msg 311s | decode_to_chunk() Ciphertext: input "0x E4 09 5D 4F B7 A7 B3 79 2D 61 75 A3 26 13 11 B8" 311s | decode_to_chunk() output: 311s | e4 09 5d 4f b7 a7 b3 79 2d 61 75 a3 26 13 11 b8 ..]O...y-au.&... 311s | decode_to_chunk() expected counter-block: : input "0x 00 00 00 30 00 00 00 00 00 00 00 00 00 00 00 02" 311s | decode_to_chunk() output: 311s | 00 00 00 30 00 00 00 00 00 00 00 00 00 00 00 02 ...0............ 311s | cipher_op_ctr_nss() enter AES_CTR 0x2aa37d13d00 use IKEv1 IV wire_iv 0 count 0 311s | ctr_param: count 32 iv 00000030000000000000000000000001 311s | cipher_op_ctr_nss() counter-block updated from 0x1 to 0x2 for 16 bytes 311s | do_aes_ctr: exit 311s | cipher_op_context_destroy_ctr_nss() 311s | verify_bytes() Encrypting 16 octets using AES-CTR with 128-bit key: encrypt: ok 311s | verify_bytes() Encrypting 16 octets using AES-CTR with 128-bit key: counter-block: ok 311s | decode_to_mac() input counter-block: : input "0x 00 00 00 30 00 00 00 00 00 00 00 00 00 00 00 01" 311s | decode_to_mac() output: 311s | 00 00 00 30 00 00 00 00 00 00 00 00 00 00 00 01 ...0............ 311s | decode_to_chunk() Ciphertext: input "0x E4 09 5D 4F B7 A7 B3 79 2D 61 75 A3 26 13 11 B8" 311s | decode_to_chunk() output: 311s | e4 09 5d 4f b7 a7 b3 79 2d 61 75 a3 26 13 11 b8 ..]O...y-au.&... 311s | decode_to_chunk() Plaintext: input "0x 53 69 6E 67 6C 65 20 62 6C 6F 63 6B 20 6D 73 67" 311s | decode_to_chunk() output: 311s | 53 69 6e 67 6c 65 20 62 6c 6f 63 6b 20 6d 73 67 Single block msg 311s | decode_to_chunk() expected counter-block: : input "0x 00 00 00 30 00 00 00 00 00 00 00 00 00 00 00 02" 311s | decode_to_chunk() output: 311s | 00 00 00 30 00 00 00 00 00 00 00 00 00 00 00 02 ...0............ 311s | cipher_op_ctr_nss() enter AES_CTR 0x2aa37d13d00 use IKEv1 IV wire_iv 0 count 0 311s | ctr_param: count 32 iv 00000030000000000000000000000001 311s | cipher_op_ctr_nss() counter-block updated from 0x1 to 0x2 for 16 bytes 311s | do_aes_ctr: exit 311s | cipher_op_context_destroy_ctr_nss() 311s | verify_bytes() Encrypting 16 octets using AES-CTR with 128-bit key: decrypt: ok 311s | verify_bytes() Encrypting 16 octets using AES-CTR with 128-bit key: counter-block: ok 311s ipsec algparse: Encrypting 32 octets using AES-CTR with 128-bit key 311s | decode_to_chunk() raw_key: input "0x 7E 24 06 78 17 FA E0 D7 43 D6 CE 1F 32 53 91 63" 311s | decode_to_chunk() output: 311s | 7e 24 06 78 17 fa e0 d7 43 d6 ce 1f 32 53 91 63 ~$.x....C...2S.c 311s | CONCATENATE_DATA_AND_BASE: 311s | target: EXTRACT_KEY_FROM_KEY 311s | base: base-key@0x2aa37d10350 (16-bytes, AES_KEY_GEN) 311s | params: 16-bytes@0x3ffde276f20 311s | key-offset: 0, key-size: 16 311s | EXTRACT_KEY_FROM_KEY: 311s | target: AES_CTR 311s | flags: ENCRYPT+DECRYPT 311s | key_size: 16-bytes 311s | base: base-key@0x2aa37d13360 (32-bytes, EXTRACT_KEY_FROM_KEY) 311s | operation: FLAGS_ONLY 311s | params: 8-bytes@0x3ffde276e70 311s | decode_to_mac() input counter-block: : input "0x 00 6C B6 DB C0 54 3B 59 DA 48 D9 0B 00 00 00 01" 311s | decode_to_mac() output: 311s | 00 6c b6 db c0 54 3b 59 da 48 d9 0b 00 00 00 01 .l...T;Y.H...... 311s | decode_to_chunk() Plaintext: input "0x00 01 02 03 04 05 06 07 08 09 0A 0B 0C 0D 0E 0F10 11 12 13 14 15 16 17 18 19 1A 1B 1C 1D 1E 1F" 311s | decode_to_chunk() output: 311s | 00 01 02 03 04 05 06 07 08 09 0a 0b 0c 0d 0e 0f ................ 311s | 10 11 12 13 14 15 16 17 18 19 1a 1b 1c 1d 1e 1f ................ 311s | decode_to_chunk() Ciphertext: input "0x51 04 A1 06 16 8A 72 D9 79 0D 41 EE 8E DA D3 88EB 2E 1E FC 46 DA 57 C8 FC E6 30 DF 91 41 BE 28" 311s | decode_to_chunk() output: 311s | 51 04 a1 06 16 8a 72 d9 79 0d 41 ee 8e da d3 88 Q.....r.y.A..... 311s | eb 2e 1e fc 46 da 57 c8 fc e6 30 df 91 41 be 28 ....F.W...0..A.( 311s | decode_to_chunk() expected counter-block: : input "0x 00 6C B6 DB C0 54 3B 59 DA 48 D9 0B 00 00 00 03" 311s | decode_to_chunk() output: 311s | 00 6c b6 db c0 54 3b 59 da 48 d9 0b 00 00 00 03 .l...T;Y.H...... 311s | cipher_op_ctr_nss() enter AES_CTR 0x2aa37d10220 use IKEv1 IV wire_iv 0 count 0 311s | ctr_param: count 32 iv 006cb6dbc0543b59da48d90b00000001 311s | cipher_op_ctr_nss() counter-block updated from 0x1 to 0x3 for 32 bytes 311s | do_aes_ctr: exit 311s | cipher_op_context_destroy_ctr_nss() 311s | verify_bytes() Encrypting 32 octets using AES-CTR with 128-bit key: encrypt: ok 311s | verify_bytes() Encrypting 32 octets using AES-CTR with 128-bit key: counter-block: ok 311s | decode_to_mac() input counter-block: : input "0x 00 6C B6 DB C0 54 3B 59 DA 48 D9 0B 00 00 00 01" 311s | decode_to_mac() output: 311s | 00 6c b6 db c0 54 3b 59 da 48 d9 0b 00 00 00 01 .l...T;Y.H...... 311s | decode_to_chunk() Ciphertext: input "0x51 04 A1 06 16 8A 72 D9 79 0D 41 EE 8E DA D3 88EB 2E 1E FC 46 DA 57 C8 FC E6 30 DF 91 41 BE 28" 311s | decode_to_chunk() output: 311s | 51 04 a1 06 16 8a 72 d9 79 0d 41 ee 8e da d3 88 Q.....r.y.A..... 311s | eb 2e 1e fc 46 da 57 c8 fc e6 30 df 91 41 be 28 ....F.W...0..A.( 311s | decode_to_chunk() Plaintext: input "0x00 01 02 03 04 05 06 07 08 09 0A 0B 0C 0D 0E 0F10 11 12 13 14 15 16 17 18 19 1A 1B 1C 1D 1E 1F" 311s | decode_to_chunk() output: 311s | 00 01 02 03 04 05 06 07 08 09 0a 0b 0c 0d 0e 0f ................ 311s | 10 11 12 13 14 15 16 17 18 19 1a 1b 1c 1d 1e 1f ................ 311s | decode_to_chunk() expected counter-block: : input "0x 00 6C B6 DB C0 54 3B 59 DA 48 D9 0B 00 00 00 03" 311s | decode_to_chunk() output: 311s | 00 6c b6 db c0 54 3b 59 da 48 d9 0b 00 00 00 03 .l...T;Y.H...... 311s | cipher_op_ctr_nss() enter AES_CTR 0x2aa37d10220 use IKEv1 IV wire_iv 0 count 0 311s | ctr_param: count 32 iv 006cb6dbc0543b59da48d90b00000001 311s | cipher_op_ctr_nss() counter-block updated from 0x1 to 0x3 for 32 bytes 311s | do_aes_ctr: exit 311s | cipher_op_context_destroy_ctr_nss() 311s | verify_bytes() Encrypting 32 octets using AES-CTR with 128-bit key: decrypt: ok 311s | verify_bytes() Encrypting 32 octets using AES-CTR with 128-bit key: counter-block: ok 311s ipsec algparse: Encrypting 36 octets using AES-CTR with 128-bit key 311s | decode_to_chunk() raw_key: input "0x 76 91 BE 03 5E 50 20 A8 AC 6E 61 85 29 F9 A0 DC" 311s | decode_to_chunk() output: 311s | 76 91 be 03 5e 50 20 a8 ac 6e 61 85 29 f9 a0 dc v...^P ..na.)... 311s | CONCATENATE_DATA_AND_BASE: 311s | target: EXTRACT_KEY_FROM_KEY 311s | base: base-key@0x2aa37d10350 (16-bytes, AES_KEY_GEN) 311s | params: 16-bytes@0x3ffde276f20 311s | key-offset: 0, key-size: 16 311s | EXTRACT_KEY_FROM_KEY: 311s | target: AES_CTR 311s | flags: ENCRYPT+DECRYPT 311s | key_size: 16-bytes 311s | base: base-key@0x2aa37d13360 (32-bytes, EXTRACT_KEY_FROM_KEY) 311s | operation: FLAGS_ONLY 311s | params: 8-bytes@0x3ffde276e70 311s | decode_to_mac() input counter-block: : input "0x 00 E0 01 7B 27 77 7F 3F 4A 17 86 F0 00 00 00 01" 311s | decode_to_mac() output: 311s | 00 e0 01 7b 27 77 7f 3f 4a 17 86 f0 00 00 00 01 ...{'w.?J....... 311s | decode_to_chunk() Plaintext: input "0x00 01 02 03 04 05 06 07 08 09 0A 0B 0C 0D 0E 0F10 11 12 13 14 15 16 17 18 19 1A 1B 1C 1D 1E 1F20 21 22 23" 311s | decode_to_chunk() output: 311s | 00 01 02 03 04 05 06 07 08 09 0a 0b 0c 0d 0e 0f ................ 311s | 10 11 12 13 14 15 16 17 18 19 1a 1b 1c 1d 1e 1f ................ 311s | 20 21 22 23 !"# 311s | decode_to_chunk() Ciphertext: input "0xC1 CF 48 A8 9F 2F FD D9 CF 46 52 E9 EF DB 72 D745 40 A4 2B DE 6D 78 36 D5 9A 5C EA AE F3 10 5325 B2 07 2F" 311s | decode_to_chunk() output: 311s | c1 cf 48 a8 9f 2f fd d9 cf 46 52 e9 ef db 72 d7 ..H../...FR...r. 311s | 45 40 a4 2b de 6d 78 36 d5 9a 5c ea ae f3 10 53 E@.+.mx6..\....S 311s | 25 b2 07 2f %../ 311s | decode_to_chunk() expected counter-block: : input "0x 00 E0 01 7B 27 77 7F 3F 4A 17 86 F0 00 00 00 04" 311s | decode_to_chunk() output: 311s | 00 e0 01 7b 27 77 7f 3f 4a 17 86 f0 00 00 00 04 ...{'w.?J....... 311s | cipher_op_ctr_nss() enter AES_CTR 0x2aa37d10080 use IKEv1 IV wire_iv 0 count 0 311s | ctr_param: count 32 iv 00e0017b27777f3f4a1786f000000001 311s | cipher_op_ctr_nss() counter-block updated from 0x1 to 0x4 for 36 bytes 311s | do_aes_ctr: exit 311s | cipher_op_context_destroy_ctr_nss() 311s | verify_bytes() Encrypting 36 octets using AES-CTR with 128-bit key: encrypt: ok 311s | verify_bytes() Encrypting 36 octets using AES-CTR with 128-bit key: counter-block: ok 311s | decode_to_mac() input counter-block: : input "0x 00 E0 01 7B 27 77 7F 3F 4A 17 86 F0 00 00 00 01" 311s | decode_to_mac() output: 311s | 00 e0 01 7b 27 77 7f 3f 4a 17 86 f0 00 00 00 01 ...{'w.?J....... 311s | decode_to_chunk() Ciphertext: input "0xC1 CF 48 A8 9F 2F FD D9 CF 46 52 E9 EF DB 72 D745 40 A4 2B DE 6D 78 36 D5 9A 5C EA AE F3 10 5325 B2 07 2F" 311s | decode_to_chunk() output: 311s | c1 cf 48 a8 9f 2f fd d9 cf 46 52 e9 ef db 72 d7 ..H../...FR...r. 311s | 45 40 a4 2b de 6d 78 36 d5 9a 5c ea ae f3 10 53 E@.+.mx6..\....S 311s | 25 b2 07 2f %../ 311s | decode_to_chunk() Plaintext: input "0x00 01 02 03 04 05 06 07 08 09 0A 0B 0C 0D 0E 0F10 11 12 13 14 15 16 17 18 19 1A 1B 1C 1D 1E 1F20 21 22 23" 311s | decode_to_chunk() output: 311s | 00 01 02 03 04 05 06 07 08 09 0a 0b 0c 0d 0e 0f ................ 311s | 10 11 12 13 14 15 16 17 18 19 1a 1b 1c 1d 1e 1f ................ 311s | 20 21 22 23 !"# 311s | decode_to_chunk() expected counter-block: : input "0x 00 E0 01 7B 27 77 7F 3F 4A 17 86 F0 00 00 00 04" 311s | decode_to_chunk() output: 311s | 00 e0 01 7b 27 77 7f 3f 4a 17 86 f0 00 00 00 04 ...{'w.?J....... 311s | cipher_op_ctr_nss() enter AES_CTR 0x2aa37d10080 use IKEv1 IV wire_iv 0 count 0 311s | ctr_param: count 32 iv 00e0017b27777f3f4a1786f000000001 311s | cipher_op_ctr_nss() counter-block updated from 0x1 to 0x4 for 36 bytes 311s | do_aes_ctr: exit 311s | cipher_op_context_destroy_ctr_nss() 311s | verify_bytes() Encrypting 36 octets using AES-CTR with 128-bit key: decrypt: ok 311s | verify_bytes() Encrypting 36 octets using AES-CTR with 128-bit key: counter-block: ok 311s ipsec algparse: Encrypting 16 octets using AES-CTR with 192-bit key 311s | decode_to_chunk() raw_key: input "0x16 AF 5B 14 5F C9 F5 79 C1 75 F9 3E 3B FB 0E ED86 3D 06 CC FD B7 85 15" 311s | decode_to_chunk() output: 311s | 16 af 5b 14 5f c9 f5 79 c1 75 f9 3e 3b fb 0e ed ..[._..y.u.>;... 311s | 86 3d 06 cc fd b7 85 15 .=...... 311s | CONCATENATE_DATA_AND_BASE: 311s | target: EXTRACT_KEY_FROM_KEY 311s | base: base-key@0x2aa37d10350 (16-bytes, AES_KEY_GEN) 311s | params: 16-bytes@0x3ffde276f20 311s | key-offset: 0, key-size: 24 311s | EXTRACT_KEY_FROM_KEY: 311s | target: AES_CTR 311s | flags: ENCRYPT+DECRYPT 311s | key_size: 24-bytes 311s | base: base-key@0x2aa37d13360 (40-bytes, EXTRACT_KEY_FROM_KEY) 311s | operation: FLAGS_ONLY 311s | params: 8-bytes@0x3ffde276e70 311s | decode_to_mac() input counter-block: : input "0x 00 00 00 48 36 73 3C 14 7D 6D 93 CB 00 00 00 01" 311s | decode_to_mac() output: 311s | 00 00 00 48 36 73 3c 14 7d 6d 93 cb 00 00 00 01 ...H6s<.}m...... 311s | decode_to_chunk() Plaintext: input "0x 53 69 6E 67 6C 65 20 62 6C 6F 63 6B 20 6D 73 67" 311s | decode_to_chunk() output: 311s | 53 69 6e 67 6c 65 20 62 6c 6f 63 6b 20 6d 73 67 Single block msg 311s | decode_to_chunk() Ciphertext: input "0x 4B 55 38 4F E2 59 C9 C8 4E 79 35 A0 03 CB E9 28" 311s | decode_to_chunk() output: 311s | 4b 55 38 4f e2 59 c9 c8 4e 79 35 a0 03 cb e9 28 KU8O.Y..Ny5....( 311s | decode_to_chunk() expected counter-block: : input "0x 00 00 00 48 36 73 3C 14 7D 6D 93 CB 00 00 00 02" 311s | decode_to_chunk() output: 311s | 00 00 00 48 36 73 3c 14 7d 6d 93 cb 00 00 00 02 ...H6s<.}m...... 311s | cipher_op_ctr_nss() enter AES_CTR 0x2aa37d13ce0 use IKEv1 IV wire_iv 0 count 0 311s | ctr_param: count 32 iv 0000004836733c147d6d93cb00000001 311s | cipher_op_ctr_nss() counter-block updated from 0x1 to 0x2 for 16 bytes 311s | do_aes_ctr: exit 311s | cipher_op_context_destroy_ctr_nss() 311s | verify_bytes() Encrypting 16 octets using AES-CTR with 192-bit key: encrypt: ok 311s | verify_bytes() Encrypting 16 octets using AES-CTR with 192-bit key: counter-block: ok 311s | decode_to_mac() input counter-block: : input "0x 00 00 00 48 36 73 3C 14 7D 6D 93 CB 00 00 00 01" 311s | decode_to_mac() output: 311s | 00 00 00 48 36 73 3c 14 7d 6d 93 cb 00 00 00 01 ...H6s<.}m...... 311s | decode_to_chunk() Ciphertext: input "0x 4B 55 38 4F E2 59 C9 C8 4E 79 35 A0 03 CB E9 28" 311s | decode_to_chunk() output: 311s | 4b 55 38 4f e2 59 c9 c8 4e 79 35 a0 03 cb e9 28 KU8O.Y..Ny5....( 311s | decode_to_chunk() Plaintext: input "0x 53 69 6E 67 6C 65 20 62 6C 6F 63 6B 20 6D 73 67" 311s | decode_to_chunk() output: 311s | 53 69 6e 67 6c 65 20 62 6c 6f 63 6b 20 6d 73 67 Single block msg 311s | decode_to_chunk() expected counter-block: : input "0x 00 00 00 48 36 73 3C 14 7D 6D 93 CB 00 00 00 02" 311s | decode_to_chunk() output: 311s | 00 00 00 48 36 73 3c 14 7d 6d 93 cb 00 00 00 02 ...H6s<.}m...... 311s | cipher_op_ctr_nss() enter AES_CTR 0x2aa37d13ce0 use IKEv1 IV wire_iv 0 count 0 311s | ctr_param: count 32 iv 0000004836733c147d6d93cb00000001 311s | cipher_op_ctr_nss() counter-block updated from 0x1 to 0x2 for 16 bytes 311s | do_aes_ctr: exit 311s | cipher_op_context_destroy_ctr_nss() 311s | verify_bytes() Encrypting 16 octets using AES-CTR with 192-bit key: decrypt: ok 311s | verify_bytes() Encrypting 16 octets using AES-CTR with 192-bit key: counter-block: ok 311s ipsec algparse: Encrypting 32 octets using AES-CTR with 192-bit key 311s | decode_to_chunk() raw_key: input "0x7C 5C B2 40 1B 3D C3 3C 19 E7 34 08 19 E0 F6 9C67 8C 3D B8 E6 F6 A9 1A" 311s | decode_to_chunk() output: 311s | 7c 5c b2 40 1b 3d c3 3c 19 e7 34 08 19 e0 f6 9c |\.@.=.<..4..... 311s | 67 8c 3d b8 e6 f6 a9 1a g.=..... 311s | CONCATENATE_DATA_AND_BASE: 311s | target: EXTRACT_KEY_FROM_KEY 311s | base: base-key@0x2aa37d10350 (16-bytes, AES_KEY_GEN) 311s | params: 16-bytes@0x3ffde276f20 311s | key-offset: 0, key-size: 24 311s | EXTRACT_KEY_FROM_KEY: 311s | target: AES_CTR 311s | flags: ENCRYPT+DECRYPT 311s | key_size: 24-bytes 311s | base: base-key@0x2aa37d13360 (40-bytes, EXTRACT_KEY_FROM_KEY) 311s | operation: FLAGS_ONLY 311s | params: 8-bytes@0x3ffde276e70 311s | decode_to_mac() input counter-block: : input "0x 00 96 B0 3B 02 0C 6E AD C2 CB 50 0D 00 00 00 01" 311s | decode_to_mac() output: 311s | 00 96 b0 3b 02 0c 6e ad c2 cb 50 0d 00 00 00 01 ...;..n...P..... 311s | decode_to_chunk() Plaintext: input "0x00 01 02 03 04 05 06 07 08 09 0A 0B 0C 0D 0E 0F10 11 12 13 14 15 16 17 18 19 1A 1B 1C 1D 1E 1F" 311s | decode_to_chunk() output: 311s | 00 01 02 03 04 05 06 07 08 09 0a 0b 0c 0d 0e 0f ................ 311s | 10 11 12 13 14 15 16 17 18 19 1a 1b 1c 1d 1e 1f ................ 311s | decode_to_chunk() Ciphertext: input "0x45 32 43 FC 60 9B 23 32 7E DF AA FA 71 31 CD 9F84 90 70 1C 5A D4 A7 9C FC 1F E0 FF 42 F4 FB 00" 311s | decode_to_chunk() output: 311s | 45 32 43 fc 60 9b 23 32 7e df aa fa 71 31 cd 9f E2C.`.#2~...q1.. 311s | 84 90 70 1c 5a d4 a7 9c fc 1f e0 ff 42 f4 fb 00 ..p.Z.......B... 311s | decode_to_chunk() expected counter-block: : input "0x 00 96 B0 3B 02 0C 6E AD C2 CB 50 0D 00 00 00 03" 311s | decode_to_chunk() output: 311s | 00 96 b0 3b 02 0c 6e ad c2 cb 50 0d 00 00 00 03 ...;..n...P..... 311s | cipher_op_ctr_nss() enter AES_CTR 0x2aa37d10080 use IKEv1 IV wire_iv 0 count 0 311s | ctr_param: count 32 iv 0096b03b020c6eadc2cb500d00000001 311s | cipher_op_ctr_nss() counter-block updated from 0x1 to 0x3 for 32 bytes 311s | do_aes_ctr: exit 311s | cipher_op_context_destroy_ctr_nss() 311s | verify_bytes() Encrypting 32 octets using AES-CTR with 192-bit key: encrypt: ok 311s | verify_bytes() Encrypting 32 octets using AES-CTR with 192-bit key: counter-block: ok 311s | decode_to_mac() input counter-block: : input "0x 00 96 B0 3B 02 0C 6E AD C2 CB 50 0D 00 00 00 01" 311s | decode_to_mac() output: 311s | 00 96 b0 3b 02 0c 6e ad c2 cb 50 0d 00 00 00 01 ...;..n...P..... 311s | decode_to_chunk() Ciphertext: input "0x45 32 43 FC 60 9B 23 32 7E DF AA FA 71 31 CD 9F84 90 70 1C 5A D4 A7 9C FC 1F E0 FF 42 F4 FB 00" 311s | decode_to_chunk() output: 311s | 45 32 43 fc 60 9b 23 32 7e df aa fa 71 31 cd 9f E2C.`.#2~...q1.. 311s | 84 90 70 1c 5a d4 a7 9c fc 1f e0 ff 42 f4 fb 00 ..p.Z.......B... 311s | decode_to_chunk() Plaintext: input "0x00 01 02 03 04 05 06 07 08 09 0A 0B 0C 0D 0E 0F10 11 12 13 14 15 16 17 18 19 1A 1B 1C 1D 1E 1F" 311s | decode_to_chunk() output: 311s | 00 01 02 03 04 05 06 07 08 09 0a 0b 0c 0d 0e 0f ................ 311s | 10 11 12 13 14 15 16 17 18 19 1a 1b 1c 1d 1e 1f ................ 311s | decode_to_chunk() expected counter-block: : input "0x 00 96 B0 3B 02 0C 6E AD C2 CB 50 0D 00 00 00 03" 311s | decode_to_chunk() output: 311s | 00 96 b0 3b 02 0c 6e ad c2 cb 50 0d 00 00 00 03 ...;..n...P..... 311s | cipher_op_ctr_nss() enter AES_CTR 0x2aa37d10080 use IKEv1 IV wire_iv 0 count 0 311s | ctr_param: count 32 iv 0096b03b020c6eadc2cb500d00000001 311s | cipher_op_ctr_nss() counter-block updated from 0x1 to 0x3 for 32 bytes 311s | do_aes_ctr: exit 311s | cipher_op_context_destroy_ctr_nss() 311s | verify_bytes() Encrypting 32 octets using AES-CTR with 192-bit key: decrypt: ok 311s | verify_bytes() Encrypting 32 octets using AES-CTR with 192-bit key: counter-block: ok 311s ipsec algparse: Encrypting 36 octets using AES-CTR with 192-bit key 311s | decode_to_chunk() raw_key: input "0x02 BF 39 1E E8 EC B1 59 B9 59 61 7B 09 65 27 9BF5 9B 60 A7 86 D3 E0 FE" 311s | decode_to_chunk() output: 311s | 02 bf 39 1e e8 ec b1 59 b9 59 61 7b 09 65 27 9b ..9....Y.Ya{.e'. 311s | f5 9b 60 a7 86 d3 e0 fe ..`..... 311s | CONCATENATE_DATA_AND_BASE: 311s | target: EXTRACT_KEY_FROM_KEY 311s | base: base-key@0x2aa37d10350 (16-bytes, AES_KEY_GEN) 311s | params: 16-bytes@0x3ffde276f20 311s | key-offset: 0, key-size: 24 311s | EXTRACT_KEY_FROM_KEY: 311s | target: AES_CTR 311s | flags: ENCRYPT+DECRYPT 311s | key_size: 24-bytes 311s | base: base-key@0x2aa37d13360 (40-bytes, EXTRACT_KEY_FROM_KEY) 311s | operation: FLAGS_ONLY 311s | params: 8-bytes@0x3ffde276e70 311s | decode_to_mac() input counter-block: : input "0x 00 07 BD FD 5C BD 60 27 8D CC 09 12 00 00 00 01" 311s | decode_to_mac() output: 311s | 00 07 bd fd 5c bd 60 27 8d cc 09 12 00 00 00 01 ....\.`'........ 311s | decode_to_chunk() Plaintext: input "0x00 01 02 03 04 05 06 07 08 09 0A 0B 0C 0D 0E 0F10 11 12 13 14 15 16 17 18 19 1A 1B 1C 1D 1E 1F20 21 22 23" 311s | decode_to_chunk() output: 311s | 00 01 02 03 04 05 06 07 08 09 0a 0b 0c 0d 0e 0f ................ 311s | 10 11 12 13 14 15 16 17 18 19 1a 1b 1c 1d 1e 1f ................ 311s | 20 21 22 23 !"# 311s | decode_to_chunk() Ciphertext: input "0x96 89 3F C5 5E 5C 72 2F 54 0B 7D D1 DD F7 E7 58D2 88 BC 95 C6 91 65 88 45 36 C8 11 66 2F 21 88AB EE 09 35" 311s | decode_to_chunk() output: 311s | 96 89 3f c5 5e 5c 72 2f 54 0b 7d d1 dd f7 e7 58 ..?.^\r/T.}....X 311s | d2 88 bc 95 c6 91 65 88 45 36 c8 11 66 2f 21 88 ......e.E6..f/!. 311s | ab ee 09 35 ...5 311s | decode_to_chunk() expected counter-block: : input "0x 00 07 BD FD 5C BD 60 27 8D CC 09 12 00 00 00 04" 311s | decode_to_chunk() output: 311s | 00 07 bd fd 5c bd 60 27 8d cc 09 12 00 00 00 04 ....\.`'........ 311s | cipher_op_ctr_nss() enter AES_CTR 0x2aa37d10080 use IKEv1 IV wire_iv 0 count 0 311s | ctr_param: count 32 iv 0007bdfd5cbd60278dcc091200000001 311s | cipher_op_ctr_nss() counter-block updated from 0x1 to 0x4 for 36 bytes 311s | do_aes_ctr: exit 311s | cipher_op_context_destroy_ctr_nss() 311s | verify_bytes() Encrypting 36 octets using AES-CTR with 192-bit key: encrypt: ok 311s | verify_bytes() Encrypting 36 octets using AES-CTR with 192-bit key: counter-block: ok 311s | decode_to_mac() input counter-block: : input "0x 00 07 BD FD 5C BD 60 27 8D CC 09 12 00 00 00 01" 311s | decode_to_mac() output: 311s | 00 07 bd fd 5c bd 60 27 8d cc 09 12 00 00 00 01 ....\.`'........ 311s | decode_to_chunk() Ciphertext: input "0x96 89 3F C5 5E 5C 72 2F 54 0B 7D D1 DD F7 E7 58D2 88 BC 95 C6 91 65 88 45 36 C8 11 66 2F 21 88AB EE 09 35" 311s | decode_to_chunk() output: 311s | 96 89 3f c5 5e 5c 72 2f 54 0b 7d d1 dd f7 e7 58 ..?.^\r/T.}....X 311s | d2 88 bc 95 c6 91 65 88 45 36 c8 11 66 2f 21 88 ......e.E6..f/!. 311s | ab ee 09 35 ...5 311s | decode_to_chunk() Plaintext: input "0x00 01 02 03 04 05 06 07 08 09 0A 0B 0C 0D 0E 0F10 11 12 13 14 15 16 17 18 19 1A 1B 1C 1D 1E 1F20 21 22 23" 311s | decode_to_chunk() output: 311s | 00 01 02 03 04 05 06 07 08 09 0a 0b 0c 0d 0e 0f ................ 311s | 10 11 12 13 14 15 16 17 18 19 1a 1b 1c 1d 1e 1f ................ 311s | 20 21 22 23 !"# 311s | decode_to_chunk() expected counter-block: : input "0x 00 07 BD FD 5C BD 60 27 8D CC 09 12 00 00 00 04" 311s | decode_to_chunk() output: 311s | 00 07 bd fd 5c bd 60 27 8d cc 09 12 00 00 00 04 ....\.`'........ 311s | cipher_op_ctr_nss() enter AES_CTR 0x2aa37d10080 use IKEv1 IV wire_iv 0 count 0 311s | ctr_param: count 32 iv 0007bdfd5cbd60278dcc091200000001 311s | cipher_op_ctr_nss() counter-block updated from 0x1 to 0x4 for 36 bytes 311s | do_aes_ctr: exit 311s | cipher_op_context_destroy_ctr_nss() 311s | verify_bytes() Encrypting 36 octets using AES-CTR with 192-bit key: decrypt: ok 311s | verify_bytes() Encrypting 36 octets using AES-CTR with 192-bit key: counter-block: ok 311s ipsec algparse: Encrypting 16 octets using AES-CTR with 256-bit key 311s | decode_to_chunk() raw_key: input "0x77 6B EF F2 85 1D B0 6F 4C 8A 05 42 C8 69 6F 6C6A 81 AF 1E EC 96 B4 D3 7F C1 D6 89 E6 C1 C1 04" 311s | decode_to_chunk() output: 311s | 77 6b ef f2 85 1d b0 6f 4c 8a 05 42 c8 69 6f 6c wk.....oL..B.iol 311s | 6a 81 af 1e ec 96 b4 d3 7f c1 d6 89 e6 c1 c1 04 j............... 311s | CONCATENATE_DATA_AND_BASE: 311s | target: EXTRACT_KEY_FROM_KEY 311s | base: base-key@0x2aa37d10350 (16-bytes, AES_KEY_GEN) 311s | params: 16-bytes@0x3ffde276f20 311s | key-offset: 0, key-size: 32 311s | EXTRACT_KEY_FROM_KEY: 311s | target: AES_CTR 311s | flags: ENCRYPT+DECRYPT 311s | key_size: 32-bytes 311s | base: base-key@0x2aa37d13360 (48-bytes, EXTRACT_KEY_FROM_KEY) 311s | operation: FLAGS_ONLY 311s | params: 8-bytes@0x3ffde276e70 311s | decode_to_mac() input counter-block: : input "0x 00 00 00 60 DB 56 72 C9 7A A8 F0 B2 00 00 00 01" 311s | decode_to_mac() output: 311s | 00 00 00 60 db 56 72 c9 7a a8 f0 b2 00 00 00 01 ...`.Vr.z....... 311s | decode_to_chunk() Plaintext: input "0x 53 69 6E 67 6C 65 20 62 6C 6F 63 6B 20 6D 73 67" 311s | decode_to_chunk() output: 311s | 53 69 6e 67 6c 65 20 62 6c 6f 63 6b 20 6d 73 67 Single block msg 311s | decode_to_chunk() Ciphertext: input "0x 14 5A D0 1D BF 82 4E C7 56 08 63 DC 71 E3 E0 C0" 311s | decode_to_chunk() output: 311s | 14 5a d0 1d bf 82 4e c7 56 08 63 dc 71 e3 e0 c0 .Z....N.V.c.q... 311s | decode_to_chunk() expected counter-block: : input "0x 00 00 00 60 DB 56 72 C9 7A A8 F0 B2 00 00 00 02" 311s | decode_to_chunk() output: 311s | 00 00 00 60 db 56 72 c9 7a a8 f0 b2 00 00 00 02 ...`.Vr.z....... 311s | cipher_op_ctr_nss() enter AES_CTR 0x2aa37d13ce0 use IKEv1 IV wire_iv 0 count 0 311s | ctr_param: count 32 iv 00000060db5672c97aa8f0b200000001 311s | cipher_op_ctr_nss() counter-block updated from 0x1 to 0x2 for 16 bytes 311s | do_aes_ctr: exit 311s | cipher_op_context_destroy_ctr_nss() 311s | verify_bytes() Encrypting 16 octets using AES-CTR with 256-bit key: encrypt: ok 311s | verify_bytes() Encrypting 16 octets using AES-CTR with 256-bit key: counter-block: ok 311s | decode_to_mac() input counter-block: : input "0x 00 00 00 60 DB 56 72 C9 7A A8 F0 B2 00 00 00 01" 311s | decode_to_mac() output: 311s | 00 00 00 60 db 56 72 c9 7a a8 f0 b2 00 00 00 01 ...`.Vr.z....... 311s | decode_to_chunk() Ciphertext: input "0x 14 5A D0 1D BF 82 4E C7 56 08 63 DC 71 E3 E0 C0" 311s | decode_to_chunk() output: 311s | 14 5a d0 1d bf 82 4e c7 56 08 63 dc 71 e3 e0 c0 .Z....N.V.c.q... 311s | decode_to_chunk() Plaintext: input "0x 53 69 6E 67 6C 65 20 62 6C 6F 63 6B 20 6D 73 67" 311s | decode_to_chunk() output: 311s | 53 69 6e 67 6c 65 20 62 6c 6f 63 6b 20 6d 73 67 Single block msg 311s | decode_to_chunk() expected counter-block: : input "0x 00 00 00 60 DB 56 72 C9 7A A8 F0 B2 00 00 00 02" 311s | decode_to_chunk() output: 311s | 00 00 00 60 db 56 72 c9 7a a8 f0 b2 00 00 00 02 ...`.Vr.z....... 311s | cipher_op_ctr_nss() enter AES_CTR 0x2aa37d13ce0 use IKEv1 IV wire_iv 0 count 0 311s | ctr_param: count 32 iv 00000060db5672c97aa8f0b200000001 311s | cipher_op_ctr_nss() counter-block updated from 0x1 to 0x2 for 16 bytes 311s | do_aes_ctr: exit 311s | cipher_op_context_destroy_ctr_nss() 311s | verify_bytes() Encrypting 16 octets using AES-CTR with 256-bit key: decrypt: ok 311s | verify_bytes() Encrypting 16 octets using AES-CTR with 256-bit key: counter-block: ok 311s ipsec algparse: Encrypting 32 octets using AES-CTR with 256-bit key 311s | decode_to_chunk() raw_key: input "0xF6 D6 6D 6B D5 2D 59 BB 07 96 36 58 79 EF F8 86C6 6D D5 1A 5B 6A 99 74 4B 50 59 0C 87 A2 38 84" 311s | decode_to_chunk() output: 311s | f6 d6 6d 6b d5 2d 59 bb 07 96 36 58 79 ef f8 86 ..mk.-Y...6Xy... 311s | c6 6d d5 1a 5b 6a 99 74 4b 50 59 0c 87 a2 38 84 .m..[j.tKPY...8. 311s | CONCATENATE_DATA_AND_BASE: 311s | target: EXTRACT_KEY_FROM_KEY 311s | base: base-key@0x2aa37d10350 (16-bytes, AES_KEY_GEN) 311s | params: 16-bytes@0x3ffde276f20 311s | key-offset: 0, key-size: 32 311s | EXTRACT_KEY_FROM_KEY: 311s | target: AES_CTR 311s | flags: ENCRYPT+DECRYPT 311s | key_size: 32-bytes 311s | base: base-key@0x2aa37d13360 (48-bytes, EXTRACT_KEY_FROM_KEY) 311s | operation: FLAGS_ONLY 311s | params: 8-bytes@0x3ffde276e70 311s | decode_to_mac() input counter-block: : input "0x 00 FA AC 24 C1 58 5E F1 5A 43 D8 75 00 00 00 01" 311s | decode_to_mac() output: 311s | 00 fa ac 24 c1 58 5e f1 5a 43 d8 75 00 00 00 01 ...$.X^.ZC.u.... 311s | decode_to_chunk() Plaintext: input "0x00 01 02 03 04 05 06 07 08 09 0A 0B 0C 0D 0E 0F10 11 12 13 14 15 16 17 18 19 1A 1B 1C 1D 1E 1F" 311s | decode_to_chunk() output: 311s | 00 01 02 03 04 05 06 07 08 09 0a 0b 0c 0d 0e 0f ................ 311s | 10 11 12 13 14 15 16 17 18 19 1a 1b 1c 1d 1e 1f ................ 311s | decode_to_chunk() Ciphertext: input "0xF0 5E 23 1B 38 94 61 2C 49 EE 00 0B 80 4E B2 A9B8 30 6B 50 8F 83 9D 6A 55 30 83 1D 93 44 AF 1C" 311s | decode_to_chunk() output: 311s | f0 5e 23 1b 38 94 61 2c 49 ee 00 0b 80 4e b2 a9 .^#.8.a,I....N.. 311s | b8 30 6b 50 8f 83 9d 6a 55 30 83 1d 93 44 af 1c .0kP...jU0...D.. 311s | decode_to_chunk() expected counter-block: : input "0x 00 FA AC 24 C1 58 5E F1 5A 43 D8 75 00 00 00 03" 311s | decode_to_chunk() output: 311s | 00 fa ac 24 c1 58 5e f1 5a 43 d8 75 00 00 00 03 ...$.X^.ZC.u.... 311s | cipher_op_ctr_nss() enter AES_CTR 0x2aa37d10080 use IKEv1 IV wire_iv 0 count 0 311s | ctr_param: count 32 iv 00faac24c1585ef15a43d87500000001 311s | cipher_op_ctr_nss() counter-block updated from 0x1 to 0x3 for 32 bytes 311s | do_aes_ctr: exit 311s | cipher_op_context_destroy_ctr_nss() 311s | verify_bytes() Encrypting 32 octets using AES-CTR with 256-bit key: encrypt: ok 311s | verify_bytes() Encrypting 32 octets using AES-CTR with 256-bit key: counter-block: ok 311s | decode_to_mac() input counter-block: : input "0x 00 FA AC 24 C1 58 5E F1 5A 43 D8 75 00 00 00 01" 311s | decode_to_mac() output: 311s | 00 fa ac 24 c1 58 5e f1 5a 43 d8 75 00 00 00 01 ...$.X^.ZC.u.... 311s | decode_to_chunk() Ciphertext: input "0xF0 5E 23 1B 38 94 61 2C 49 EE 00 0B 80 4E B2 A9B8 30 6B 50 8F 83 9D 6A 55 30 83 1D 93 44 AF 1C" 311s | decode_to_chunk() output: 311s | f0 5e 23 1b 38 94 61 2c 49 ee 00 0b 80 4e b2 a9 .^#.8.a,I....N.. 311s | b8 30 6b 50 8f 83 9d 6a 55 30 83 1d 93 44 af 1c .0kP...jU0...D.. 311s | decode_to_chunk() Plaintext: input "0x00 01 02 03 04 05 06 07 08 09 0A 0B 0C 0D 0E 0F10 11 12 13 14 15 16 17 18 19 1A 1B 1C 1D 1E 1F" 311s | decode_to_chunk() output: 311s | 00 01 02 03 04 05 06 07 08 09 0a 0b 0c 0d 0e 0f ................ 311s | 10 11 12 13 14 15 16 17 18 19 1a 1b 1c 1d 1e 1f ................ 311s | decode_to_chunk() expected counter-block: : input "0x 00 FA AC 24 C1 58 5E F1 5A 43 D8 75 00 00 00 03" 311s | decode_to_chunk() output: 311s | 00 fa ac 24 c1 58 5e f1 5a 43 d8 75 00 00 00 03 ...$.X^.ZC.u.... 311s | cipher_op_ctr_nss() enter AES_CTR 0x2aa37d10080 use IKEv1 IV wire_iv 0 count 0 311s | ctr_param: count 32 iv 00faac24c1585ef15a43d87500000001 311s | cipher_op_ctr_nss() counter-block updated from 0x1 to 0x3 for 32 bytes 311s | do_aes_ctr: exit 311s | cipher_op_context_destroy_ctr_nss() 311s | verify_bytes() Encrypting 32 octets using AES-CTR with 256-bit key: decrypt: ok 311s | verify_bytes() Encrypting 32 octets using AES-CTR with 256-bit key: counter-block: ok 311s ipsec algparse: Encrypting 36 octets using AES-CTR with 256-bit key 311s | decode_to_chunk() raw_key: input "0xFF 7A 61 7C E6 91 48 E4 F1 72 6E 2F 43 58 1D E2AA 62 D9 F8 05 53 2E DF F1 EE D6 87 FB 54 15 3D" 311s | decode_to_chunk() output: 311s | ff 7a 61 7c e6 91 48 e4 f1 72 6e 2f 43 58 1d e2 .za|..H..rn/CX.. 311s | aa 62 d9 f8 05 53 2e df f1 ee d6 87 fb 54 15 3d .b...S.......T.= 311s | CONCATENATE_DATA_AND_BASE: 311s | target: EXTRACT_KEY_FROM_KEY 311s | base: base-key@0x2aa37d10350 (16-bytes, AES_KEY_GEN) 311s | params: 16-bytes@0x3ffde276f20 311s | key-offset: 0, key-size: 32 311s | EXTRACT_KEY_FROM_KEY: 311s | target: AES_CTR 311s | flags: ENCRYPT+DECRYPT 311s | key_size: 32-bytes 311s | base: base-key@0x2aa37d13360 (48-bytes, EXTRACT_KEY_FROM_KEY) 311s | operation: FLAGS_ONLY 311s | params: 8-bytes@0x3ffde276e70 311s | decode_to_mac() input counter-block: : input "0x 00 1C C5 B7 51 A5 1D 70 A1 C1 11 48 00 00 00 01" 311s | decode_to_mac() output: 311s | 00 1c c5 b7 51 a5 1d 70 a1 c1 11 48 00 00 00 01 ....Q..p...H.... 311s | decode_to_chunk() Plaintext: input "0x00 01 02 03 04 05 06 07 08 09 0A 0B 0C 0D 0E 0F10 11 12 13 14 15 16 17 18 19 1A 1B 1C 1D 1E 1F20 21 22 23" 311s | decode_to_chunk() output: 311s | 00 01 02 03 04 05 06 07 08 09 0a 0b 0c 0d 0e 0f ................ 311s | 10 11 12 13 14 15 16 17 18 19 1a 1b 1c 1d 1e 1f ................ 311s | 20 21 22 23 !"# 311s | decode_to_chunk() Ciphertext: input "0xEB 6C 52 82 1D 0B BB F7 CE 75 94 46 2A CA 4F AAB4 07 DF 86 65 69 FD 07 F4 8C C0 B5 83 D6 07 1F1E C0 E6 B8" 311s | decode_to_chunk() output: 311s | eb 6c 52 82 1d 0b bb f7 ce 75 94 46 2a ca 4f aa .lR......u.F*.O. 311s | b4 07 df 86 65 69 fd 07 f4 8c c0 b5 83 d6 07 1f ....ei.......... 311s | 1e c0 e6 b8 .... 311s | decode_to_chunk() expected counter-block: : input "0x 00 1C C5 B7 51 A5 1D 70 A1 C1 11 48 00 00 00 04" 311s | decode_to_chunk() output: 311s | 00 1c c5 b7 51 a5 1d 70 a1 c1 11 48 00 00 00 04 ....Q..p...H.... 311s | cipher_op_ctr_nss() enter AES_CTR 0x2aa37d10080 use IKEv1 IV wire_iv 0 count 0 311s | ctr_param: count 32 iv 001cc5b751a51d70a1c1114800000001 311s | cipher_op_ctr_nss() counter-block updated from 0x1 to 0x4 for 36 bytes 311s | do_aes_ctr: exit 311s | cipher_op_context_destroy_ctr_nss() 311s | verify_bytes() Encrypting 36 octets using AES-CTR with 256-bit key: encrypt: ok 311s | verify_bytes() Encrypting 36 octets using AES-CTR with 256-bit key: counter-block: ok 311s | decode_to_mac() input counter-block: : input "0x 00 1C C5 B7 51 A5 1D 70 A1 C1 11 48 00 00 00 01" 311s | decode_to_mac() output: 311s | 00 1c c5 b7 51 a5 1d 70 a1 c1 11 48 00 00 00 01 ....Q..p...H.... 311s | decode_to_chunk() Ciphertext: input "0xEB 6C 52 82 1D 0B BB F7 CE 75 94 46 2A CA 4F AAB4 07 DF 86 65 69 FD 07 F4 8C C0 B5 83 D6 07 1F1E C0 E6 B8" 311s | decode_to_chunk() output: 311s | eb 6c 52 82 1d 0b bb f7 ce 75 94 46 2a ca 4f aa .lR......u.F*.O. 311s | b4 07 df 86 65 69 fd 07 f4 8c c0 b5 83 d6 07 1f ....ei.......... 311s | 1e c0 e6 b8 .... 311s | decode_to_chunk() Plaintext: input "0x00 01 02 03 04 05 06 07 08 09 0A 0B 0C 0D 0E 0F10 11 12 13 14 15 16 17 18 19 1A 1B 1C 1D 1E 1F20 21 22 23" 311s | decode_to_chunk() output: 311s | 00 01 02 03 04 05 06 07 08 09 0a 0b 0c 0d 0e 0f ................ 311s | 10 11 12 13 14 15 16 17 18 19 1a 1b 1c 1d 1e 1f ................ 311s | 20 21 22 23 !"# 311s | decode_to_chunk() expected counter-block: : input "0x 00 1C C5 B7 51 A5 1D 70 A1 C1 11 48 00 00 00 04" 311s | decode_to_chunk() output: 311s | 00 1c c5 b7 51 a5 1d 70 a1 c1 11 48 00 00 00 04 ....Q..p...H.... 311s | cipher_op_ctr_nss() enter AES_CTR 0x2aa37d10080 use IKEv1 IV wire_iv 0 count 0 311s | ctr_param: count 32 iv 001cc5b751a51d70a1c1114800000001 311s | cipher_op_ctr_nss() counter-block updated from 0x1 to 0x4 for 36 bytes 311s | do_aes_ctr: exit 311s | cipher_op_context_destroy_ctr_nss() 311s | verify_bytes() Encrypting 36 octets using AES-CTR with 256-bit key: decrypt: ok 311s | verify_bytes() Encrypting 36 octets using AES-CTR with 256-bit key: counter-block: ok 311s ipsec algparse: testing AES_CBC: 311s ipsec algparse: Encrypting 16 bytes (1 block) using AES-CBC with 128-bit key 311s | decode_to_chunk() raw_key: input "0x06a9214036b8a15b512e03d534120006" 311s | decode_to_chunk() output: 311s | 06 a9 21 40 36 b8 a1 5b 51 2e 03 d5 34 12 00 06 ..!@6..[Q...4... 311s | CONCATENATE_DATA_AND_BASE: 311s | target: EXTRACT_KEY_FROM_KEY 311s | base: base-key@0x2aa37d10350 (16-bytes, AES_KEY_GEN) 311s | params: 16-bytes@0x3ffde276f28 311s | key-offset: 0, key-size: 16 311s | EXTRACT_KEY_FROM_KEY: 311s | target: AES_CBC 311s | flags: ENCRYPT+DECRYPT 311s | key_size: 16-bytes 311s | base: base-key@0x2aa37d13360 (32-bytes, EXTRACT_KEY_FROM_KEY) 311s | operation: FLAGS_ONLY 311s | params: 8-bytes@0x3ffde276e78 311s | decode_to_mac() IV: : input "0x3dafba429d9eb430b422da802c9fac41" 311s | decode_to_mac() output: 311s | 3d af ba 42 9d 9e b4 30 b4 22 da 80 2c 9f ac 41 =..B...0."..,..A 311s | decode_to_chunk() new IV: : input "0xe353779c1079aeb82708942dbe77181a" 311s | decode_to_chunk() output: 311s | e3 53 77 9c 10 79 ae b8 27 08 94 2d be 77 18 1a .Sw..y..'..-.w.. 311s | decode_to_chunk() plaintext: : input "Single block msg" 311s | decode_to_chunk() output: 311s | 53 69 6e 67 6c 65 20 62 6c 6f 63 6b 20 6d 73 67 Single block msg 311s | decode_to_chunk() ciphertext: : input "0xe353779c1079aeb82708942dbe77181a" 311s | decode_to_chunk() output: 311s | e3 53 77 9c 10 79 ae b8 27 08 94 2d be 77 18 1a .Sw..y..'..-.w.. 311s | NSS ike_alg_nss_cbc: AES_CBC - enter (nil) 311s | using IKEv1 IV 311s | NSS ike_alg_nss_cbc: AES_CBC - exit 311s | verify_bytes() Encrypting 16 bytes (1 block) using AES-CBC with 128-bit key: encrypt: ok 311s | verify_bytes() Encrypting 16 bytes (1 block) using AES-CBC with 128-bit key: updated CBC IV: ok 311s | decode_to_mac() IV: : input "0x3dafba429d9eb430b422da802c9fac41" 311s | decode_to_mac() output: 311s | 3d af ba 42 9d 9e b4 30 b4 22 da 80 2c 9f ac 41 =..B...0."..,..A 311s | decode_to_chunk() new IV: : input "0xe353779c1079aeb82708942dbe77181a" 311s | decode_to_chunk() output: 311s | e3 53 77 9c 10 79 ae b8 27 08 94 2d be 77 18 1a .Sw..y..'..-.w.. 311s | decode_to_chunk() ciphertext: : input "0xe353779c1079aeb82708942dbe77181a" 311s | decode_to_chunk() output: 311s | e3 53 77 9c 10 79 ae b8 27 08 94 2d be 77 18 1a .Sw..y..'..-.w.. 311s | decode_to_chunk() plaintext: : input "Single block msg" 311s | decode_to_chunk() output: 311s | 53 69 6e 67 6c 65 20 62 6c 6f 63 6b 20 6d 73 67 Single block msg 311s | NSS ike_alg_nss_cbc: AES_CBC - enter (nil) 311s | using IKEv1 IV 311s | NSS ike_alg_nss_cbc: AES_CBC - exit 311s | verify_bytes() Encrypting 16 bytes (1 block) using AES-CBC with 128-bit key: decrypt: ok 311s | verify_bytes() Encrypting 16 bytes (1 block) using AES-CBC with 128-bit key: updated CBC IV: ok 311s ipsec algparse: Encrypting 32 bytes (2 blocks) using AES-CBC with 128-bit key 311s | decode_to_chunk() raw_key: input "0xc286696d887c9aa0611bbb3e2025a45a" 311s | decode_to_chunk() output: 311s | c2 86 69 6d 88 7c 9a a0 61 1b bb 3e 20 25 a4 5a ..im.|..a..> %.Z 311s | CONCATENATE_DATA_AND_BASE: 311s | target: EXTRACT_KEY_FROM_KEY 311s | base: base-key@0x2aa37d10350 (16-bytes, AES_KEY_GEN) 311s | params: 16-bytes@0x3ffde276f28 311s | key-offset: 0, key-size: 16 311s | EXTRACT_KEY_FROM_KEY: 311s | target: AES_CBC 311s | flags: ENCRYPT+DECRYPT 311s | key_size: 16-bytes 311s | base: base-key@0x2aa37d13360 (32-bytes, EXTRACT_KEY_FROM_KEY) 311s | operation: FLAGS_ONLY 311s | params: 8-bytes@0x3ffde276e78 311s | decode_to_mac() IV: : input "0x562e17996d093d28ddb3ba695a2e6f58" 311s | decode_to_mac() output: 311s | 56 2e 17 99 6d 09 3d 28 dd b3 ba 69 5a 2e 6f 58 V...m.=(...iZ.oX 311s | decode_to_chunk() new IV: : input "0xd296cd94c2cccf8a3a863028b5e1dc0a7586602d253cfff91b8266bea6d61ab1" 311s | decode_to_chunk() output: 311s | d2 96 cd 94 c2 cc cf 8a 3a 86 30 28 b5 e1 dc 0a ........:.0(.... 311s | 75 86 60 2d 25 3c ff f9 1b 82 66 be a6 d6 1a b1 u.`-%<....f..... 311s | decode_to_chunk() plaintext: : input "0x000102030405060708090a0b0c0d0e0f101112131415161718191a1b1c1d1e1f" 311s | decode_to_chunk() output: 311s | 00 01 02 03 04 05 06 07 08 09 0a 0b 0c 0d 0e 0f ................ 311s | 10 11 12 13 14 15 16 17 18 19 1a 1b 1c 1d 1e 1f ................ 311s | decode_to_chunk() ciphertext: : input "0xd296cd94c2cccf8a3a863028b5e1dc0a7586602d253cfff91b8266bea6d61ab1" 311s | decode_to_chunk() output: 311s | d2 96 cd 94 c2 cc cf 8a 3a 86 30 28 b5 e1 dc 0a ........:.0(.... 311s | 75 86 60 2d 25 3c ff f9 1b 82 66 be a6 d6 1a b1 u.`-%<....f..... 311s | NSS ike_alg_nss_cbc: AES_CBC - enter (nil) 311s | using IKEv1 IV 311s | NSS ike_alg_nss_cbc: AES_CBC - exit 311s | verify_bytes() Encrypting 32 bytes (2 blocks) using AES-CBC with 128-bit key: encrypt: ok 311s | verify_bytes() Encrypting 32 bytes (2 blocks) using AES-CBC with 128-bit key: updated CBC IV: ok 311s | decode_to_mac() IV: : input "0x562e17996d093d28ddb3ba695a2e6f58" 311s | decode_to_mac() output: 311s | 56 2e 17 99 6d 09 3d 28 dd b3 ba 69 5a 2e 6f 58 V...m.=(...iZ.oX 311s | decode_to_chunk() new IV: : input "0xd296cd94c2cccf8a3a863028b5e1dc0a7586602d253cfff91b8266bea6d61ab1" 311s | decode_to_chunk() output: 311s | d2 96 cd 94 c2 cc cf 8a 3a 86 30 28 b5 e1 dc 0a ........:.0(.... 311s | 75 86 60 2d 25 3c ff f9 1b 82 66 be a6 d6 1a b1 u.`-%<....f..... 311s | decode_to_chunk() ciphertext: : input "0xd296cd94c2cccf8a3a863028b5e1dc0a7586602d253cfff91b8266bea6d61ab1" 311s | decode_to_chunk() output: 311s | d2 96 cd 94 c2 cc cf 8a 3a 86 30 28 b5 e1 dc 0a ........:.0(.... 311s | 75 86 60 2d 25 3c ff f9 1b 82 66 be a6 d6 1a b1 u.`-%<....f..... 311s | decode_to_chunk() plaintext: : input "0x000102030405060708090a0b0c0d0e0f101112131415161718191a1b1c1d1e1f" 311s | decode_to_chunk() output: 311s | 00 01 02 03 04 05 06 07 08 09 0a 0b 0c 0d 0e 0f ................ 311s | 10 11 12 13 14 15 16 17 18 19 1a 1b 1c 1d 1e 1f ................ 311s | NSS ike_alg_nss_cbc: AES_CBC - enter (nil) 311s | using IKEv1 IV 311s | NSS ike_alg_nss_cbc: AES_CBC - exit 311s | verify_bytes() Encrypting 32 bytes (2 blocks) using AES-CBC with 128-bit key: decrypt: ok 311s | verify_bytes() Encrypting 32 bytes (2 blocks) using AES-CBC with 128-bit key: updated CBC IV: ok 311s ipsec algparse: Encrypting 48 bytes (3 blocks) using AES-CBC with 128-bit key 311s | decode_to_chunk() raw_key: input "0x6c3ea0477630ce21a2ce334aa746c2cd" 311s | decode_to_chunk() output: 311s | 6c 3e a0 47 76 30 ce 21 a2 ce 33 4a a7 46 c2 cd l>.Gv0.!..3J.F.. 311s | CONCATENATE_DATA_AND_BASE: 311s | target: EXTRACT_KEY_FROM_KEY 311s | base: base-key@0x2aa37d10350 (16-bytes, AES_KEY_GEN) 311s | params: 16-bytes@0x3ffde276f28 311s | key-offset: 0, key-size: 16 311s | EXTRACT_KEY_FROM_KEY: 311s | target: AES_CBC 311s | flags: ENCRYPT+DECRYPT 311s | key_size: 16-bytes 311s | base: base-key@0x2aa37d13360 (32-bytes, EXTRACT_KEY_FROM_KEY) 311s | operation: FLAGS_ONLY 311s | params: 8-bytes@0x3ffde276e78 311s | decode_to_mac() IV: : input "0xc782dc4c098c66cbd9cd27d825682c81" 311s | decode_to_mac() output: 311s | c7 82 dc 4c 09 8c 66 cb d9 cd 27 d8 25 68 2c 81 ...L..f...'.%h,. 311s | decode_to_chunk() new IV: : input "0xd0a02b3836451753d493665d33f0e8862dea54cdb293abc7506939276772f8d5021c19216bad525c8579695d83ba2684" 311s | decode_to_chunk() output: 311s | d0 a0 2b 38 36 45 17 53 d4 93 66 5d 33 f0 e8 86 ..+86E.S..f]3... 311s | 2d ea 54 cd b2 93 ab c7 50 69 39 27 67 72 f8 d5 -.T.....Pi9'gr.. 311s | 02 1c 19 21 6b ad 52 5c 85 79 69 5d 83 ba 26 84 ...!k.R\.yi]..&. 311s | decode_to_chunk() plaintext: : input "This is a 48-byte message (exactly 3 AES blocks)" 311s | decode_to_chunk() output: 311s | 54 68 69 73 20 69 73 20 61 20 34 38 2d 62 79 74 This is a 48-byt 311s | 65 20 6d 65 73 73 61 67 65 20 28 65 78 61 63 74 e message (exact 311s | 6c 79 20 33 20 41 45 53 20 62 6c 6f 63 6b 73 29 ly 3 AES blocks) 311s | decode_to_chunk() ciphertext: : input "0xd0a02b3836451753d493665d33f0e8862dea54cdb293abc7506939276772f8d5021c19216bad525c8579695d83ba2684" 311s | decode_to_chunk() output: 311s | d0 a0 2b 38 36 45 17 53 d4 93 66 5d 33 f0 e8 86 ..+86E.S..f]3... 311s | 2d ea 54 cd b2 93 ab c7 50 69 39 27 67 72 f8 d5 -.T.....Pi9'gr.. 311s | 02 1c 19 21 6b ad 52 5c 85 79 69 5d 83 ba 26 84 ...!k.R\.yi]..&. 311s | NSS ike_alg_nss_cbc: AES_CBC - enter (nil) 311s | using IKEv1 IV 311s | NSS ike_alg_nss_cbc: AES_CBC - exit 311s | verify_bytes() Encrypting 48 bytes (3 blocks) using AES-CBC with 128-bit key: encrypt: ok 311s | verify_bytes() Encrypting 48 bytes (3 blocks) using AES-CBC with 128-bit key: updated CBC IV: ok 311s | decode_to_mac() IV: : input "0xc782dc4c098c66cbd9cd27d825682c81" 311s | decode_to_mac() output: 311s | c7 82 dc 4c 09 8c 66 cb d9 cd 27 d8 25 68 2c 81 ...L..f...'.%h,. 311s | decode_to_chunk() new IV: : input "0xd0a02b3836451753d493665d33f0e8862dea54cdb293abc7506939276772f8d5021c19216bad525c8579695d83ba2684" 311s | decode_to_chunk() output: 311s | d0 a0 2b 38 36 45 17 53 d4 93 66 5d 33 f0 e8 86 ..+86E.S..f]3... 311s | 2d ea 54 cd b2 93 ab c7 50 69 39 27 67 72 f8 d5 -.T.....Pi9'gr.. 311s | 02 1c 19 21 6b ad 52 5c 85 79 69 5d 83 ba 26 84 ...!k.R\.yi]..&. 311s | decode_to_chunk() ciphertext: : input "0xd0a02b3836451753d493665d33f0e8862dea54cdb293abc7506939276772f8d5021c19216bad525c8579695d83ba2684" 311s | decode_to_chunk() output: 311s | d0 a0 2b 38 36 45 17 53 d4 93 66 5d 33 f0 e8 86 ..+86E.S..f]3... 311s | 2d ea 54 cd b2 93 ab c7 50 69 39 27 67 72 f8 d5 -.T.....Pi9'gr.. 311s | 02 1c 19 21 6b ad 52 5c 85 79 69 5d 83 ba 26 84 ...!k.R\.yi]..&. 311s | decode_to_chunk() plaintext: : input "This is a 48-byte message (exactly 3 AES blocks)" 311s | decode_to_chunk() output: 311s | 54 68 69 73 20 69 73 20 61 20 34 38 2d 62 79 74 This is a 48-byt 311s | 65 20 6d 65 73 73 61 67 65 20 28 65 78 61 63 74 e message (exact 311s | 6c 79 20 33 20 41 45 53 20 62 6c 6f 63 6b 73 29 ly 3 AES blocks) 311s | NSS ike_alg_nss_cbc: AES_CBC - enter (nil) 311s | using IKEv1 IV 311s | NSS ike_alg_nss_cbc: AES_CBC - exit 311s | verify_bytes() Encrypting 48 bytes (3 blocks) using AES-CBC with 128-bit key: decrypt: ok 311s | verify_bytes() Encrypting 48 bytes (3 blocks) using AES-CBC with 128-bit key: updated CBC IV: ok 311s ipsec algparse: Encrypting 64 bytes (4 blocks) using AES-CBC with 128-bit key 311s | decode_to_chunk() raw_key: input "0x56e47a38c5598974bc46903dba290349" 311s | decode_to_chunk() output: 311s | 56 e4 7a 38 c5 59 89 74 bc 46 90 3d ba 29 03 49 V.z8.Y.t.F.=.).I 311s | CONCATENATE_DATA_AND_BASE: 311s | target: EXTRACT_KEY_FROM_KEY 311s | base: base-key@0x2aa37d10350 (16-bytes, AES_KEY_GEN) 311s | params: 16-bytes@0x3ffde276f28 311s | key-offset: 0, key-size: 16 311s | EXTRACT_KEY_FROM_KEY: 311s | target: AES_CBC 311s | flags: ENCRYPT+DECRYPT 311s | key_size: 16-bytes 311s | base: base-key@0x2aa37d13360 (32-bytes, EXTRACT_KEY_FROM_KEY) 311s | operation: FLAGS_ONLY 311s | params: 8-bytes@0x3ffde276e78 311s | decode_to_mac() IV: : input "0x8ce82eefbea0da3c44699ed7db51b7d9" 311s | decode_to_mac() output: 311s | 8c e8 2e ef be a0 da 3c 44 69 9e d7 db 51 b7 d9 ...........U 311s | decode_to_chunk() plaintext: : input "0xa0a1a2a3a4a5a6a7a8a9aaabacadaeafb0b1b2b3b4b5b6b7b8b9babbbcbdbebfc0c1c2c3c4c5c6c7c8c9cacbcccdcecfd0d1d2d3d4d5d6d7d8d9dadbdcdddedf" 311s | decode_to_chunk() output: 311s | a0 a1 a2 a3 a4 a5 a6 a7 a8 a9 aa ab ac ad ae af ................ 311s | b0 b1 b2 b3 b4 b5 b6 b7 b8 b9 ba bb bc bd be bf ................ 311s | c0 c1 c2 c3 c4 c5 c6 c7 c8 c9 ca cb cc cd ce cf ................ 311s | d0 d1 d2 d3 d4 d5 d6 d7 d8 d9 da db dc dd de df ................ 311s | decode_to_chunk() ciphertext: : input "0xc30e32ffedc0774e6aff6af0869f71aa0f3af07a9a31a9c684db207eb0ef8e4e35907aa632c3ffdf868bb7b29d3d46ad83ce9f9a102ee99d49a53e87f4c3da55" 311s | decode_to_chunk() output: 311s | c3 0e 32 ff ed c0 77 4e 6a ff 6a f0 86 9f 71 aa ..2...wNj.j...q. 311s | 0f 3a f0 7a 9a 31 a9 c6 84 db 20 7e b0 ef 8e 4e .:.z.1.... ~...N 311s | 35 90 7a a6 32 c3 ff df 86 8b b7 b2 9d 3d 46 ad 5.z.2........=F. 311s | 83 ce 9f 9a 10 2e e9 9d 49 a5 3e 87 f4 c3 da 55 ........I.>....U 311s | NSS ike_alg_nss_cbc: AES_CBC - enter (nil) 311s | using IKEv1 IV 311s | NSS ike_alg_nss_cbc: AES_CBC - exit 311s | verify_bytes() Encrypting 64 bytes (4 blocks) using AES-CBC with 128-bit key: encrypt: ok 311s | verify_bytes() Encrypting 64 bytes (4 blocks) using AES-CBC with 128-bit key: updated CBC IV: ok 311s | decode_to_mac() IV: : input "0x8ce82eefbea0da3c44699ed7db51b7d9" 311s | decode_to_mac() output: 311s | 8c e8 2e ef be a0 da 3c 44 69 9e d7 db 51 b7 d9 ...........U 311s | decode_to_chunk() ciphertext: : input "0xc30e32ffedc0774e6aff6af0869f71aa0f3af07a9a31a9c684db207eb0ef8e4e35907aa632c3ffdf868bb7b29d3d46ad83ce9f9a102ee99d49a53e87f4c3da55" 311s | decode_to_chunk() output: 311s | c3 0e 32 ff ed c0 77 4e 6a ff 6a f0 86 9f 71 aa ..2...wNj.j...q. 311s | 0f 3a f0 7a 9a 31 a9 c6 84 db 20 7e b0 ef 8e 4e .:.z.1.... ~...N 311s | 35 90 7a a6 32 c3 ff df 86 8b b7 b2 9d 3d 46 ad 5.z.2........=F. 311s | 83 ce 9f 9a 10 2e e9 9d 49 a5 3e 87 f4 c3 da 55 ........I.>....U 311s | decode_to_chunk() plaintext: : input "0xa0a1a2a3a4a5a6a7a8a9aaabacadaeafb0b1b2b3b4b5b6b7b8b9babbbcbdbebfc0c1c2c3c4c5c6c7c8c9cacbcccdcecfd0d1d2d3d4d5d6d7d8d9dadbdcdddedf" 311s | decode_to_chunk() output: 311s | a0 a1 a2 a3 a4 a5 a6 a7 a8 a9 aa ab ac ad ae af ................ 311s | b0 b1 b2 b3 b4 b5 b6 b7 b8 b9 ba bb bc bd be bf ................ 311s | c0 c1 c2 c3 c4 c5 c6 c7 c8 c9 ca cb cc cd ce cf ................ 311s | d0 d1 d2 d3 d4 d5 d6 d7 d8 d9 da db dc dd de df ................ 311s | NSS ike_alg_nss_cbc: AES_CBC - enter (nil) 311s | using IKEv1 IV 311s | NSS ike_alg_nss_cbc: AES_CBC - exit 311s | verify_bytes() Encrypting 64 bytes (4 blocks) using AES-CBC with 128-bit key: decrypt: ok 311s | verify_bytes() Encrypting 64 bytes (4 blocks) using AES-CBC with 128-bit key: updated CBC IV: ok 311s ipsec algparse: testing AES_XCBC: 311s ipsec algparse: RFC 3566 Test Case 1: AES-XCBC-MAC-96 with 0-byte input 311s | decode_to_chunk() test_prf_vector: input "0x000102030405060708090a0b0c0d0e0f" 311s | decode_to_chunk() output: 311s | 00 01 02 03 04 05 06 07 08 09 0a 0b 0c 0d 0e 0f ................ 311s | decode_to_chunk() test_prf_vector: input "" 311s | decode_to_chunk() output: 311s | 311s | decode_to_chunk() test_prf_vector: input "0x75f0251d528ac01c4573dfd584d79f29" 311s | decode_to_chunk() output: 311s | 75 f0 25 1d 52 8a c0 1c 45 73 df d5 84 d7 9f 29 u.%.R...Es.....) 311s | PRF chunk interface PRF AES_XCBC init key hunk 0x2aa37d13690 (length 16) 311s | 00 01 02 03 04 05 06 07 08 09 0a 0b 0c 0d 0e 0f ................ 311s | CONCATENATE_DATA_AND_BASE: 311s | target: EXTRACT_KEY_FROM_KEY 311s | base: base-key@0x2aa37d10350 (16-bytes, AES_KEY_GEN) 311s | params: 16-bytes@0x3ffde276e30 311s | key-offset: 0, key-size: 16 311s | EXTRACT_KEY_FROM_KEY: 311s | target: EXTRACT_KEY_FROM_KEY 311s | key_size: 16-bytes 311s | base: base-key@0x2aa37d13360 (32-bytes, EXTRACT_KEY_FROM_KEY) 311s | operation: FLAGS_ONLY 311s | params: 8-bytes@0x3ffde276d40 311s | XCBC: Key 16=16 just right 311s | key-offset: 0, key-size: 16 311s | EXTRACT_KEY_FROM_KEY: 311s | target: AES_ECB 311s | flags: SIGN 311s | key_size: 16-bytes 311s | base: base-key@0x2aa37d11c70 (16-bytes, EXTRACT_KEY_FROM_KEY) 311s | operation: FLAGS_ONLY 311s | params: 8-bytes@0x3ffde276cf0 311s | PRF chunk interface PRF AES_XCBC 0x2aa37d102f0 311s | PRF chunk interface PRF AES_XCBC update message (0x2aa37d11ba0 length 0) 311s | 311s | XCBC: data 311s | 311s | K extracting all 16 bytes of key@0x2aa37d13360 311s | K: symkey-key@0x2aa37d13360 (16-bytes, AES_ECB) 311s | sizeof bytes 16 311s | wrapper: (SECItemType)1111695477: c1 d0 66 d7 06 cc e4 ce 8d f0 d0 b5 40 dd b6 e7 311s | K extracted len 16 bytes at 0x2aa37d13f20 311s | unwrapped: 311s | 00 01 02 03 04 05 06 07 08 09 0a 0b 0c 0d 0e 0f ................ 311s | XCBC: K: 311s | 00 01 02 03 04 05 06 07 08 09 0a 0b 0c 0d 0e 0f ................ 311s | XCBC: K1 311s | c3 52 80 57 54 23 7f 31 1a c0 ff f4 e3 e0 3e 78 .R.WT#.1......>x 311s | CONCATENATE_DATA_AND_BASE: 311s | target: EXTRACT_KEY_FROM_KEY 311s | base: base-key@0x2aa37d10350 (16-bytes, AES_KEY_GEN) 311s | params: 16-bytes@0x3ffde276bc8 311s | key-offset: 0, key-size: 16 311s | EXTRACT_KEY_FROM_KEY: 311s | target: AES_ECB 311s | flags: SIGN 311s | key_size: 16-bytes 311s | base: base-key@0x2aa37d140b0 (32-bytes, EXTRACT_KEY_FROM_KEY) 311s | operation: FLAGS_ONLY 311s | params: 8-bytes@0x3ffde276bd0 311s | Computing E[0] using K3 311s | XCBC: K3 311s | c1 a7 ab a1 a2 3a 94 06 58 07 a0 8c c8 ee d0 6e .....:..X......n 311s | XCBC: E[n-1] 311s | 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................ 311s | XCBC: M[n] 311s | 311s | XCBC: M[n] 311s | 311s | XCBC: M[n]:80...^E[n-1]^K3 311s | 41 a7 ab a1 a2 3a 94 06 58 07 a0 8c c8 ee d0 6e A....:..X......n 311s | XCBC: MAC 311s | 75 f0 25 1d 52 8a c0 1c 45 73 df d5 84 d7 9f 29 u.%.R...Es.....) 311s | PRF chunk interface PRF AES_XCBC final length 16 311s | 75 f0 25 1d 52 8a c0 1c 45 73 df d5 84 d7 9f 29 u.%.R...Es.....) 311s | chunk output 311s | 75 f0 25 1d 52 8a c0 1c 45 73 df d5 84 d7 9f 29 u.%.R...Es.....) 311s | verify_bytes() RFC 3566 Test Case 1: AES-XCBC-MAC-96 with 0-byte input: prf OUT: ok 311s | CONCATENATE_DATA_AND_BASE: 311s | target: EXTRACT_KEY_FROM_KEY 311s | base: base-key@0x2aa37d10350 (16-bytes, AES_KEY_GEN) 311s | params: 16-bytes@0x3ffde276f98 311s | key-offset: 0, key-size: 16 311s | EXTRACT_KEY_FROM_KEY: 311s | target: EXTRACT_KEY_FROM_KEY 311s | key_size: 16-bytes 311s | base: base-key@0x2aa37d11c70 (32-bytes, EXTRACT_KEY_FROM_KEY) 311s | operation: FLAGS_ONLY 311s | params: 8-bytes@0x3ffde276ea8 311s | PRF symkey interface PRF AES_XCBC init key symkey-key@0x2aa37d13360 (size 16) 311s | PRF symkey interface: key symkey-key@0x2aa37d13360 (16-bytes, EXTRACT_KEY_FROM_KEY) 311s | XCBC: Key 16=16 just right 311s | key-offset: 0, key-size: 16 311s | EXTRACT_KEY_FROM_KEY: 311s | target: AES_ECB 311s | flags: SIGN 311s | key_size: 16-bytes 311s | base: base-key@0x2aa37d13360 (16-bytes, EXTRACT_KEY_FROM_KEY) 311s | operation: FLAGS_ONLY 311s | params: 8-bytes@0x3ffde276db0 311s | PRF symkey interface PRF AES_XCBC 0x2aa37d102f0 311s | PRF symkey interface PRF AES_XCBC update symkey message-key@(nil) (size 0) 311s | PRF symkey interface: symkey message-key@NULL 311s | symkey message NULL key has no bytes 311s | XCBC: data 311s | 311s | K extracting all 16 bytes of key@0x2aa37d11c70 311s | K: symkey-key@0x2aa37d11c70 (16-bytes, AES_ECB) 311s | sizeof bytes 16 311s | wrapper: (SECItemType)1023: c1 d0 66 d7 06 cc e4 ce 8d f0 d0 b5 40 dd b6 e7 311s | K extracted len 16 bytes at 0x2aa37d13f20 311s | unwrapped: 311s | 00 01 02 03 04 05 06 07 08 09 0a 0b 0c 0d 0e 0f ................ 311s | XCBC: K: 311s | 00 01 02 03 04 05 06 07 08 09 0a 0b 0c 0d 0e 0f ................ 311s | XCBC: K1 311s | c3 52 80 57 54 23 7f 31 1a c0 ff f4 e3 e0 3e 78 .R.WT#.1......>x 311s | CONCATENATE_DATA_AND_BASE: 311s | target: EXTRACT_KEY_FROM_KEY 311s | base: base-key@0x2aa37d10350 (16-bytes, AES_KEY_GEN) 311s | params: 16-bytes@0x3ffde276c08 311s | key-offset: 0, key-size: 16 311s | EXTRACT_KEY_FROM_KEY: 311s | target: AES_ECB 311s | flags: SIGN 311s | key_size: 16-bytes 311s | base: base-key@0x2aa37d143f0 (32-bytes, EXTRACT_KEY_FROM_KEY) 311s | operation: FLAGS_ONLY 311s | params: 8-bytes@0x3ffde276c10 311s | Computing E[0] using K3 311s | XCBC: K3 311s | c1 a7 ab a1 a2 3a 94 06 58 07 a0 8c c8 ee d0 6e .....:..X......n 311s | XCBC: E[n-1] 311s | 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................ 311s | XCBC: M[n] 311s | 311s | XCBC: M[n] 311s | 311s | XCBC: M[n]:80...^E[n-1]^K3 311s | 41 a7 ab a1 a2 3a 94 06 58 07 a0 8c c8 ee d0 6e A....:..X......n 311s | XCBC: MAC 311s | 75 f0 25 1d 52 8a c0 1c 45 73 df d5 84 d7 9f 29 u.%.R...Es.....) 311s | CONCATENATE_DATA_AND_BASE: 311s | target: EXTRACT_KEY_FROM_KEY 311s | base: base-key@0x2aa37d10350 (16-bytes, AES_KEY_GEN) 311s | params: 16-bytes@0x3ffde276e20 311s | key-offset: 0, key-size: 16 311s | EXTRACT_KEY_FROM_KEY: 311s | target: EXTRACT_KEY_FROM_KEY 311s | key_size: 16-bytes 311s | base: base-key@0x2aa37d143f0 (32-bytes, EXTRACT_KEY_FROM_KEY) 311s | operation: FLAGS_ONLY 311s | params: 8-bytes@0x3ffde276d30 311s | PRF symkey interface PRF AES_XCBC final-key@0x2aa37d140b0 (size 16) 311s | PRF symkey interface: key-key@0x2aa37d140b0 (16-bytes, EXTRACT_KEY_FROM_KEY) 311s | output: symkey-key@0x2aa37d140b0 (16-bytes, EXTRACT_KEY_FROM_KEY) 311s | RFC 3566 Test Case 1: AES-XCBC-MAC-96 with 0-byte input extracting all 16 bytes of key@0x2aa37d140b0 311s | RFC 3566 Test Case 1: AES-XCBC-MAC-96 with 0-byte input: symkey-key@0x2aa37d140b0 (16-bytes, EXTRACT_KEY_FROM_KEY) 311s | sizeof bytes 16 311s | wrapper: (SECItemType)682: 5c a4 c2 8d a5 a3 78 c4 db 1b 5b 43 32 e6 48 a9 311s | RFC 3566 Test Case 1: AES-XCBC-MAC-96 with 0-byte input extracted len 16 bytes at 0x2aa37d14090 311s | unwrapped: 311s | 75 f0 25 1d 52 8a c0 1c 45 73 df d5 84 d7 9f 29 u.%.R...Es.....) 311s | verify_bytes() RFC 3566 Test Case 1: AES-XCBC-MAC-96 with 0-byte input: symkey: ok 311s ipsec algparse: RFC 3566 Test Case 2: AES-XCBC-MAC-96 with 3-byte input 311s | decode_to_chunk() test_prf_vector: input "0x000102030405060708090a0b0c0d0e0f" 311s | decode_to_chunk() output: 311s | 00 01 02 03 04 05 06 07 08 09 0a 0b 0c 0d 0e 0f ................ 311s | decode_to_chunk() test_prf_vector: input "0x000102" 311s | decode_to_chunk() output: 311s | 00 01 02 ... 311s | decode_to_chunk() test_prf_vector: input "0x5b376580ae2f19afe7219ceef172756f" 311s | decode_to_chunk() output: 311s | 5b 37 65 80 ae 2f 19 af e7 21 9c ee f1 72 75 6f [7e../...!...ruo 311s | PRF chunk interface PRF AES_XCBC init key hunk 0x2aa37d13690 (length 16) 311s | 00 01 02 03 04 05 06 07 08 09 0a 0b 0c 0d 0e 0f ................ 311s | CONCATENATE_DATA_AND_BASE: 311s | target: EXTRACT_KEY_FROM_KEY 311s | base: base-key@0x2aa37d10350 (16-bytes, AES_KEY_GEN) 311s | params: 16-bytes@0x3ffde276e30 311s | key-offset: 0, key-size: 16 311s | EXTRACT_KEY_FROM_KEY: 311s | target: EXTRACT_KEY_FROM_KEY 311s | key_size: 16-bytes 311s | base: base-key@0x2aa37d13360 (32-bytes, EXTRACT_KEY_FROM_KEY) 311s | operation: FLAGS_ONLY 311s | params: 8-bytes@0x3ffde276d40 311s | XCBC: Key 16=16 just right 311s | key-offset: 0, key-size: 16 311s | EXTRACT_KEY_FROM_KEY: 311s | target: AES_ECB 311s | flags: SIGN 311s | key_size: 16-bytes 311s | base: base-key@0x2aa37d140b0 (16-bytes, EXTRACT_KEY_FROM_KEY) 311s | operation: FLAGS_ONLY 311s | params: 8-bytes@0x3ffde276cf0 311s | PRF chunk interface PRF AES_XCBC 0x2aa37d102f0 311s | PRF chunk interface PRF AES_XCBC update message (0x2aa37d11ba0 length 3) 311s | 00 01 02 ... 311s | XCBC: data 311s | 00 01 02 ... 311s | K extracting all 16 bytes of key@0x2aa37d13360 311s | K: symkey-key@0x2aa37d13360 (16-bytes, AES_ECB) 311s | sizeof bytes 16 311s | wrapper: (SECItemType)1111695477: c1 d0 66 d7 06 cc e4 ce 8d f0 d0 b5 40 dd b6 e7 311s | K extracted len 16 bytes at 0x2aa37d136b0 311s | unwrapped: 311s | 00 01 02 03 04 05 06 07 08 09 0a 0b 0c 0d 0e 0f ................ 311s | XCBC: K: 311s | 00 01 02 03 04 05 06 07 08 09 0a 0b 0c 0d 0e 0f ................ 311s | XCBC: K1 311s | c3 52 80 57 54 23 7f 31 1a c0 ff f4 e3 e0 3e 78 .R.WT#.1......>x 311s | CONCATENATE_DATA_AND_BASE: 311s | target: EXTRACT_KEY_FROM_KEY 311s | base: base-key@0x2aa37d10350 (16-bytes, AES_KEY_GEN) 311s | params: 16-bytes@0x3ffde276bc8 311s | key-offset: 0, key-size: 16 311s | EXTRACT_KEY_FROM_KEY: 311s | target: AES_ECB 311s | flags: SIGN 311s | key_size: 16-bytes 311s | base: base-key@0x2aa37d11c70 (32-bytes, EXTRACT_KEY_FROM_KEY) 311s | operation: FLAGS_ONLY 311s | params: 8-bytes@0x3ffde276bd0 311s | Computing E[1] using K3 311s | XCBC: K3 311s | c1 a7 ab a1 a2 3a 94 06 58 07 a0 8c c8 ee d0 6e .....:..X......n 311s | XCBC: E[n-1] 311s | 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................ 311s | XCBC: M[n] 311s | 00 01 02 ... 311s | XCBC: M[n] 311s | 00 01 02 ... 311s | XCBC: M[n]:80...^E[n-1]^K3 311s | c1 a6 a9 21 a2 3a 94 06 58 07 a0 8c c8 ee d0 6e ...!.:..X......n 311s | XCBC: MAC 311s | 5b 37 65 80 ae 2f 19 af e7 21 9c ee f1 72 75 6f [7e../...!...ruo 311s | PRF chunk interface PRF AES_XCBC final length 16 311s | 5b 37 65 80 ae 2f 19 af e7 21 9c ee f1 72 75 6f [7e../...!...ruo 311s | chunk output 311s | 5b 37 65 80 ae 2f 19 af e7 21 9c ee f1 72 75 6f [7e../...!...ruo 311s | verify_bytes() RFC 3566 Test Case 2: AES-XCBC-MAC-96 with 3-byte input: prf OUT: ok 311s | CONCATENATE_DATA_AND_BASE: 311s | target: EXTRACT_KEY_FROM_KEY 311s | base: base-key@0x2aa37d10350 (16-bytes, AES_KEY_GEN) 311s | params: 16-bytes@0x3ffde276f98 311s | key-offset: 0, key-size: 16 311s | EXTRACT_KEY_FROM_KEY: 311s | target: EXTRACT_KEY_FROM_KEY 311s | key_size: 16-bytes 311s | base: base-key@0x2aa37d140b0 (32-bytes, EXTRACT_KEY_FROM_KEY) 311s | operation: FLAGS_ONLY 311s | params: 8-bytes@0x3ffde276ea8 311s | PRF symkey interface PRF AES_XCBC init key symkey-key@0x2aa37d13360 (size 16) 311s | PRF symkey interface: key symkey-key@0x2aa37d13360 (16-bytes, EXTRACT_KEY_FROM_KEY) 311s | XCBC: Key 16=16 just right 311s | key-offset: 0, key-size: 16 311s | EXTRACT_KEY_FROM_KEY: 311s | target: AES_ECB 311s | flags: SIGN 311s | key_size: 16-bytes 311s | base: base-key@0x2aa37d13360 (16-bytes, EXTRACT_KEY_FROM_KEY) 311s | operation: FLAGS_ONLY 311s | params: 8-bytes@0x3ffde276db0 311s | PRF symkey interface PRF AES_XCBC 0x2aa37d102f0 311s | CONCATENATE_DATA_AND_BASE: 311s | target: EXTRACT_KEY_FROM_KEY 311s | base: base-key@0x2aa37d10350 (16-bytes, AES_KEY_GEN) 311s | params: 16-bytes@0x3ffde276f98 311s | key-offset: 0, key-size: 3 311s | EXTRACT_KEY_FROM_KEY: 311s | target: EXTRACT_KEY_FROM_KEY 311s | key_size: 3-bytes 311s | base: base-key@0x2aa37d143f0 (19-bytes, EXTRACT_KEY_FROM_KEY) 311s | operation: FLAGS_ONLY 311s | params: 8-bytes@0x3ffde276ea8 311s | PRF symkey interface PRF AES_XCBC update symkey message-key@0x2aa37d11c70 (size 3) 311s | PRF symkey interface: symkey message-key@0x2aa37d11c70 (3-bytes, EXTRACT_KEY_FROM_KEY) 311s | symkey message extracting all 3 bytes of key@0x2aa37d11c70 311s | symkey message: symkey-key@0x2aa37d11c70 (3-bytes, EXTRACT_KEY_FROM_KEY) 311s | sizeof bytes 16 311s | wrapper: (SECItemType)682: 8e bd 27 fe 11 9b 7b d3 4d 70 b9 9f 36 98 f8 4a 311s | symkey message extracted len 16 bytes at 0x2aa37d136b0 311s | unwrapped: 311s | 00 01 02 00 00 00 00 00 00 00 00 00 00 00 00 00 ................ 311s | XCBC: data 311s | 00 01 02 ... 311s | K extracting all 16 bytes of key@0x2aa37d140b0 311s | K: symkey-key@0x2aa37d140b0 (16-bytes, AES_ECB) 311s | sizeof bytes 16 311s | wrapper: (SECItemType)1023: c1 d0 66 d7 06 cc e4 ce 8d f0 d0 b5 40 dd b6 e7 311s | K extracted len 16 bytes at 0x2aa37d10220 311s | unwrapped: 311s | 00 01 02 03 04 05 06 07 08 09 0a 0b 0c 0d 0e 0f ................ 311s | XCBC: K: 311s | 00 01 02 03 04 05 06 07 08 09 0a 0b 0c 0d 0e 0f ................ 311s | XCBC: K1 311s | c3 52 80 57 54 23 7f 31 1a c0 ff f4 e3 e0 3e 78 .R.WT#.1......>x 311s | CONCATENATE_DATA_AND_BASE: 311s | target: EXTRACT_KEY_FROM_KEY 311s | base: base-key@0x2aa37d10350 (16-bytes, AES_KEY_GEN) 311s | params: 16-bytes@0x3ffde276c08 311s | key-offset: 0, key-size: 16 311s | EXTRACT_KEY_FROM_KEY: 311s | target: AES_ECB 311s | flags: SIGN 311s | key_size: 16-bytes 311s | base: base-key@0x2aa37d14750 (32-bytes, EXTRACT_KEY_FROM_KEY) 311s | operation: FLAGS_ONLY 311s | params: 8-bytes@0x3ffde276c10 311s | Computing E[1] using K3 311s | XCBC: K3 311s | c1 a7 ab a1 a2 3a 94 06 58 07 a0 8c c8 ee d0 6e .....:..X......n 311s | XCBC: E[n-1] 311s | 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................ 311s | XCBC: M[n] 311s | 00 01 02 ... 311s | XCBC: M[n] 311s | 00 01 02 ... 311s | XCBC: M[n]:80...^E[n-1]^K3 311s | c1 a6 a9 21 a2 3a 94 06 58 07 a0 8c c8 ee d0 6e ...!.:..X......n 311s | XCBC: MAC 311s | 5b 37 65 80 ae 2f 19 af e7 21 9c ee f1 72 75 6f [7e../...!...ruo 311s | CONCATENATE_DATA_AND_BASE: 311s | target: EXTRACT_KEY_FROM_KEY 311s | base: base-key@0x2aa37d10350 (16-bytes, AES_KEY_GEN) 311s | params: 16-bytes@0x3ffde276e20 311s | key-offset: 0, key-size: 16 311s | EXTRACT_KEY_FROM_KEY: 311s | target: EXTRACT_KEY_FROM_KEY 311s | key_size: 16-bytes 311s | base: base-key@0x2aa37d14750 (32-bytes, EXTRACT_KEY_FROM_KEY) 311s | operation: FLAGS_ONLY 311s | params: 8-bytes@0x3ffde276d30 311s | PRF symkey interface PRF AES_XCBC final-key@0x2aa37d143f0 (size 16) 311s | PRF symkey interface: key-key@0x2aa37d143f0 (16-bytes, EXTRACT_KEY_FROM_KEY) 311s | output: symkey-key@0x2aa37d143f0 (16-bytes, EXTRACT_KEY_FROM_KEY) 311s | RFC 3566 Test Case 2: AES-XCBC-MAC-96 with 3-byte input extracting all 16 bytes of key@0x2aa37d143f0 311s | RFC 3566 Test Case 2: AES-XCBC-MAC-96 with 3-byte input: symkey-key@0x2aa37d143f0 (16-bytes, EXTRACT_KEY_FROM_KEY) 311s | sizeof bytes 16 311s | wrapper: (SECItemType)682: 6d 8b ba f3 4c cd b0 c9 d4 47 18 4d 6b 4d 5f a7 311s | RFC 3566 Test Case 2: AES-XCBC-MAC-96 with 3-byte input extracted len 16 bytes at 0x2aa37d10220 311s | unwrapped: 311s | 5b 37 65 80 ae 2f 19 af e7 21 9c ee f1 72 75 6f [7e../...!...ruo 311s | verify_bytes() RFC 3566 Test Case 2: AES-XCBC-MAC-96 with 3-byte input: symkey: ok 311s ipsec algparse: RFC 3566 Test Case 3: AES-XCBC-MAC-96 with 16-byte input 311s | decode_to_chunk() test_prf_vector: input "0x000102030405060708090a0b0c0d0e0f" 311s | decode_to_chunk() output: 311s | 00 01 02 03 04 05 06 07 08 09 0a 0b 0c 0d 0e 0f ................ 311s | decode_to_chunk() test_prf_vector: input "0x000102030405060708090a0b0c0d0e0f" 311s | decode_to_chunk() output: 311s | 00 01 02 03 04 05 06 07 08 09 0a 0b 0c 0d 0e 0f ................ 311s | decode_to_chunk() test_prf_vector: input "0xd2a246fa349b68a79998a4394ff7a263" 311s | decode_to_chunk() output: 311s | d2 a2 46 fa 34 9b 68 a7 99 98 a4 39 4f f7 a2 63 ..F.4.h....9O..c 311s | PRF chunk interface PRF AES_XCBC init key hunk 0x2aa37d13690 (length 16) 311s | 00 01 02 03 04 05 06 07 08 09 0a 0b 0c 0d 0e 0f ................ 311s | CONCATENATE_DATA_AND_BASE: 311s | target: EXTRACT_KEY_FROM_KEY 311s | base: base-key@0x2aa37d10350 (16-bytes, AES_KEY_GEN) 311s | params: 16-bytes@0x3ffde276e30 311s | key-offset: 0, key-size: 16 311s | EXTRACT_KEY_FROM_KEY: 311s | target: EXTRACT_KEY_FROM_KEY 311s | key_size: 16-bytes 311s | base: base-key@0x2aa37d13360 (32-bytes, EXTRACT_KEY_FROM_KEY) 311s | operation: FLAGS_ONLY 311s | params: 8-bytes@0x3ffde276d40 311s | XCBC: Key 16=16 just right 311s | key-offset: 0, key-size: 16 311s | EXTRACT_KEY_FROM_KEY: 311s | target: AES_ECB 311s | flags: SIGN 311s | key_size: 16-bytes 311s | base: base-key@0x2aa37d143f0 (16-bytes, EXTRACT_KEY_FROM_KEY) 311s | operation: FLAGS_ONLY 311s | params: 8-bytes@0x3ffde276cf0 311s | PRF chunk interface PRF AES_XCBC 0x2aa37d102f0 311s | PRF chunk interface PRF AES_XCBC update message (0x2aa37d11ba0 length 16) 311s | 00 01 02 03 04 05 06 07 08 09 0a 0b 0c 0d 0e 0f ................ 311s | XCBC: data 311s | 00 01 02 03 04 05 06 07 08 09 0a 0b 0c 0d 0e 0f ................ 311s | K extracting all 16 bytes of key@0x2aa37d13360 311s | K: symkey-key@0x2aa37d13360 (16-bytes, AES_ECB) 311s | sizeof bytes 16 311s | wrapper: (SECItemType)1111695477: c1 d0 66 d7 06 cc e4 ce 8d f0 d0 b5 40 dd b6 e7 311s | K extracted len 16 bytes at 0x2aa37d13f20 311s | unwrapped: 311s | 00 01 02 03 04 05 06 07 08 09 0a 0b 0c 0d 0e 0f ................ 311s | XCBC: K: 311s | 00 01 02 03 04 05 06 07 08 09 0a 0b 0c 0d 0e 0f ................ 311s | XCBC: K1 311s | c3 52 80 57 54 23 7f 31 1a c0 ff f4 e3 e0 3e 78 .R.WT#.1......>x 311s | CONCATENATE_DATA_AND_BASE: 311s | target: EXTRACT_KEY_FROM_KEY 311s | base: base-key@0x2aa37d10350 (16-bytes, AES_KEY_GEN) 311s | params: 16-bytes@0x3ffde276bc8 311s | key-offset: 0, key-size: 16 311s | EXTRACT_KEY_FROM_KEY: 311s | target: AES_ECB 311s | flags: SIGN 311s | key_size: 16-bytes 311s | base: base-key@0x2aa37d11c70 (32-bytes, EXTRACT_KEY_FROM_KEY) 311s | operation: FLAGS_ONLY 311s | params: 8-bytes@0x3ffde276bd0 311s | XCBC: Computing E[1] using K2 311s | XCBC: K2 311s | bd 86 2f fb 97 ad 2f b8 f8 b8 91 f6 03 2f 36 cb ../.../....../6. 311s | XCBC: E[n-1] 311s | 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................ 311s | XCBC: M[n] 311s | 00 01 02 03 04 05 06 07 08 09 0a 0b 0c 0d 0e 0f ................ 311s | XCBC: M[n]^E[n-1]^K2 311s | bd 87 2d f8 93 a8 29 bf f0 b1 9b fd 0f 22 38 c4 ..-...)......"8. 311s | XCBC: MAC 311s | d2 a2 46 fa 34 9b 68 a7 99 98 a4 39 4f f7 a2 63 ..F.4.h....9O..c 311s | PRF chunk interface PRF AES_XCBC final length 16 311s | d2 a2 46 fa 34 9b 68 a7 99 98 a4 39 4f f7 a2 63 ..F.4.h....9O..c 311s | chunk output 311s | d2 a2 46 fa 34 9b 68 a7 99 98 a4 39 4f f7 a2 63 ..F.4.h....9O..c 311s | verify_bytes() RFC 3566 Test Case 3: AES-XCBC-MAC-96 with 16-byte input: prf OUT: ok 311s | CONCATENATE_DATA_AND_BASE: 311s | target: EXTRACT_KEY_FROM_KEY 311s | base: base-key@0x2aa37d10350 (16-bytes, AES_KEY_GEN) 311s | params: 16-bytes@0x3ffde276f98 311s | key-offset: 0, key-size: 16 311s | EXTRACT_KEY_FROM_KEY: 311s | target: EXTRACT_KEY_FROM_KEY 311s | key_size: 16-bytes 311s | base: base-key@0x2aa37d143f0 (32-bytes, EXTRACT_KEY_FROM_KEY) 311s | operation: FLAGS_ONLY 311s | params: 8-bytes@0x3ffde276ea8 311s | PRF symkey interface PRF AES_XCBC init key symkey-key@0x2aa37d13360 (size 16) 311s | PRF symkey interface: key symkey-key@0x2aa37d13360 (16-bytes, EXTRACT_KEY_FROM_KEY) 311s | XCBC: Key 16=16 just right 311s | key-offset: 0, key-size: 16 311s | EXTRACT_KEY_FROM_KEY: 311s | target: AES_ECB 311s | flags: SIGN 311s | key_size: 16-bytes 311s | base: base-key@0x2aa37d13360 (16-bytes, EXTRACT_KEY_FROM_KEY) 311s | operation: FLAGS_ONLY 311s | params: 8-bytes@0x3ffde276db0 311s | PRF symkey interface PRF AES_XCBC 0x2aa37d102f0 311s | CONCATENATE_DATA_AND_BASE: 311s | target: EXTRACT_KEY_FROM_KEY 311s | base: base-key@0x2aa37d10350 (16-bytes, AES_KEY_GEN) 311s | params: 16-bytes@0x3ffde276f98 311s | key-offset: 0, key-size: 16 311s | EXTRACT_KEY_FROM_KEY: 311s | target: EXTRACT_KEY_FROM_KEY 311s | key_size: 16-bytes 311s | base: base-key@0x2aa37d140b0 (32-bytes, EXTRACT_KEY_FROM_KEY) 311s | operation: FLAGS_ONLY 311s | params: 8-bytes@0x3ffde276ea8 311s | PRF symkey interface PRF AES_XCBC update symkey message-key@0x2aa37d11c70 (size 16) 311s | PRF symkey interface: symkey message-key@0x2aa37d11c70 (16-bytes, EXTRACT_KEY_FROM_KEY) 311s | symkey message extracting all 16 bytes of key@0x2aa37d11c70 311s | symkey message: symkey-key@0x2aa37d11c70 (16-bytes, EXTRACT_KEY_FROM_KEY) 311s | sizeof bytes 16 311s | wrapper: (SECItemType)682: c1 d0 66 d7 06 cc e4 ce 8d f0 d0 b5 40 dd b6 e7 311s | symkey message extracted len 16 bytes at 0x2aa37d13f20 311s | unwrapped: 311s | 00 01 02 03 04 05 06 07 08 09 0a 0b 0c 0d 0e 0f ................ 311s | XCBC: data 311s | 00 01 02 03 04 05 06 07 08 09 0a 0b 0c 0d 0e 0f ................ 311s | K extracting all 16 bytes of key@0x2aa37d143f0 311s | K: symkey-key@0x2aa37d143f0 (16-bytes, AES_ECB) 311s | sizeof bytes 16 311s | wrapper: (SECItemType)1023: c1 d0 66 d7 06 cc e4 ce 8d f0 d0 b5 40 dd b6 e7 311s | K extracted len 16 bytes at 0x2aa37d10080 311s | unwrapped: 311s | 00 01 02 03 04 05 06 07 08 09 0a 0b 0c 0d 0e 0f ................ 311s | XCBC: K: 311s | 00 01 02 03 04 05 06 07 08 09 0a 0b 0c 0d 0e 0f ................ 311s | XCBC: K1 311s | c3 52 80 57 54 23 7f 31 1a c0 ff f4 e3 e0 3e 78 .R.WT#.1......>x 311s | CONCATENATE_DATA_AND_BASE: 311s | target: EXTRACT_KEY_FROM_KEY 311s | base: base-key@0x2aa37d10350 (16-bytes, AES_KEY_GEN) 311s | params: 16-bytes@0x3ffde276c08 311s | key-offset: 0, key-size: 16 311s | EXTRACT_KEY_FROM_KEY: 311s | target: AES_ECB 311s | flags: SIGN 311s | key_size: 16-bytes 311s | base: base-key@0x2aa37d14750 (32-bytes, EXTRACT_KEY_FROM_KEY) 311s | operation: FLAGS_ONLY 311s | params: 8-bytes@0x3ffde276c10 311s | XCBC: Computing E[1] using K2 311s | XCBC: K2 311s | bd 86 2f fb 97 ad 2f b8 f8 b8 91 f6 03 2f 36 cb ../.../....../6. 311s | XCBC: E[n-1] 311s | 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................ 311s | XCBC: M[n] 311s | 00 01 02 03 04 05 06 07 08 09 0a 0b 0c 0d 0e 0f ................ 311s | XCBC: M[n]^E[n-1]^K2 311s | bd 87 2d f8 93 a8 29 bf f0 b1 9b fd 0f 22 38 c4 ..-...)......"8. 311s | XCBC: MAC 311s | d2 a2 46 fa 34 9b 68 a7 99 98 a4 39 4f f7 a2 63 ..F.4.h....9O..c 311s | CONCATENATE_DATA_AND_BASE: 311s | target: EXTRACT_KEY_FROM_KEY 311s | base: base-key@0x2aa37d10350 (16-bytes, AES_KEY_GEN) 311s | params: 16-bytes@0x3ffde276e20 311s | key-offset: 0, key-size: 16 311s | EXTRACT_KEY_FROM_KEY: 311s | target: EXTRACT_KEY_FROM_KEY 311s | key_size: 16-bytes 311s | base: base-key@0x2aa37d14750 (32-bytes, EXTRACT_KEY_FROM_KEY) 311s | operation: FLAGS_ONLY 311s | params: 8-bytes@0x3ffde276d30 311s | PRF symkey interface PRF AES_XCBC final-key@0x2aa37d140b0 (size 16) 311s | PRF symkey interface: key-key@0x2aa37d140b0 (16-bytes, EXTRACT_KEY_FROM_KEY) 311s | output: symkey-key@0x2aa37d140b0 (16-bytes, EXTRACT_KEY_FROM_KEY) 311s | RFC 3566 Test Case 3: AES-XCBC-MAC-96 with 16-byte input extracting all 16 bytes of key@0x2aa37d140b0 311s | RFC 3566 Test Case 3: AES-XCBC-MAC-96 with 16-byte input: symkey-key@0x2aa37d140b0 (16-bytes, EXTRACT_KEY_FROM_KEY) 311s | sizeof bytes 16 311s | wrapper: (SECItemType)682: e1 06 c6 d9 a2 af 4a 79 bf 46 92 d4 33 da 0d 1e 311s | RFC 3566 Test Case 3: AES-XCBC-MAC-96 with 16-byte input extracted len 16 bytes at 0x2aa37d10080 311s | unwrapped: 311s | d2 a2 46 fa 34 9b 68 a7 99 98 a4 39 4f f7 a2 63 ..F.4.h....9O..c 311s | verify_bytes() RFC 3566 Test Case 3: AES-XCBC-MAC-96 with 16-byte input: symkey: ok 311s ipsec algparse: RFC 3566 Test Case 4: AES-XCBC-MAC-96 with 20-byte input 311s | decode_to_chunk() test_prf_vector: input "0x000102030405060708090a0b0c0d0e0f" 311s | decode_to_chunk() output: 311s | 00 01 02 03 04 05 06 07 08 09 0a 0b 0c 0d 0e 0f ................ 311s | decode_to_chunk() test_prf_vector: input "0x000102030405060708090a0b0c0d0e0f10111213" 311s | decode_to_chunk() output: 311s | 00 01 02 03 04 05 06 07 08 09 0a 0b 0c 0d 0e 0f ................ 311s | 10 11 12 13 .... 311s | decode_to_chunk() test_prf_vector: input "0x47f51b4564966215b8985c63055ed308" 311s | decode_to_chunk() output: 311s | 47 f5 1b 45 64 96 62 15 b8 98 5c 63 05 5e d3 08 G..Ed.b...\c.^.. 311s | PRF chunk interface PRF AES_XCBC init key hunk 0x2aa37d13690 (length 16) 311s | 00 01 02 03 04 05 06 07 08 09 0a 0b 0c 0d 0e 0f ................ 311s | CONCATENATE_DATA_AND_BASE: 311s | target: EXTRACT_KEY_FROM_KEY 311s | base: base-key@0x2aa37d10350 (16-bytes, AES_KEY_GEN) 311s | params: 16-bytes@0x3ffde276e30 311s | key-offset: 0, key-size: 16 311s | EXTRACT_KEY_FROM_KEY: 311s | target: EXTRACT_KEY_FROM_KEY 311s | key_size: 16-bytes 311s | base: base-key@0x2aa37d13360 (32-bytes, EXTRACT_KEY_FROM_KEY) 311s | operation: FLAGS_ONLY 311s | params: 8-bytes@0x3ffde276d40 311s | XCBC: Key 16=16 just right 311s | key-offset: 0, key-size: 16 311s | EXTRACT_KEY_FROM_KEY: 311s | target: AES_ECB 311s | flags: SIGN 311s | key_size: 16-bytes 311s | base: base-key@0x2aa37d140b0 (16-bytes, EXTRACT_KEY_FROM_KEY) 311s | operation: FLAGS_ONLY 311s | params: 8-bytes@0x3ffde276cf0 311s | PRF chunk interface PRF AES_XCBC 0x2aa37d102f0 311s | PRF chunk interface PRF AES_XCBC update message (0x2aa37d11ba0 length 20) 311s | 00 01 02 03 04 05 06 07 08 09 0a 0b 0c 0d 0e 0f ................ 311s | 10 11 12 13 .... 311s | XCBC: data 311s | 00 01 02 03 04 05 06 07 08 09 0a 0b 0c 0d 0e 0f ................ 311s | 10 11 12 13 .... 311s | K extracting all 16 bytes of key@0x2aa37d13360 311s | K: symkey-key@0x2aa37d13360 (16-bytes, AES_ECB) 311s | sizeof bytes 16 311s | wrapper: (SECItemType)1111695477: c1 d0 66 d7 06 cc e4 ce 8d f0 d0 b5 40 dd b6 e7 311s | K extracted len 16 bytes at 0x2aa37d139a0 311s | unwrapped: 311s | 00 01 02 03 04 05 06 07 08 09 0a 0b 0c 0d 0e 0f ................ 311s | XCBC: K: 311s | 00 01 02 03 04 05 06 07 08 09 0a 0b 0c 0d 0e 0f ................ 311s | XCBC: K1 311s | c3 52 80 57 54 23 7f 31 1a c0 ff f4 e3 e0 3e 78 .R.WT#.1......>x 311s | CONCATENATE_DATA_AND_BASE: 311s | target: EXTRACT_KEY_FROM_KEY 311s | base: base-key@0x2aa37d10350 (16-bytes, AES_KEY_GEN) 311s | params: 16-bytes@0x3ffde276bc8 311s | key-offset: 0, key-size: 16 311s | EXTRACT_KEY_FROM_KEY: 311s | target: AES_ECB 311s | flags: SIGN 311s | key_size: 16-bytes 311s | base: base-key@0x2aa37d11c70 (32-bytes, EXTRACT_KEY_FROM_KEY) 311s | operation: FLAGS_ONLY 311s | params: 8-bytes@0x3ffde276bd0 311s | Computing E[2] using K3 311s | XCBC: K3 311s | c1 a7 ab a1 a2 3a 94 06 58 07 a0 8c c8 ee d0 6e .....:..X......n 311s | XCBC: E[n-1] 311s | 1d 04 48 fa cf 4d 9c 6f 55 b9 93 da 09 80 3d b3 ..H..M.oU.....=. 311s | XCBC: M[n] 311s | 10 11 12 13 .... 311s | XCBC: M[n] 311s | 10 11 12 13 .... 311s | XCBC: M[n]:80...^E[n-1]^K3 311s | cc b2 f1 48 ed 77 08 69 0d be 33 56 c1 6e ed dd ...H.w.i..3V.n.. 311s | XCBC: MAC 311s | 47 f5 1b 45 64 96 62 15 b8 98 5c 63 05 5e d3 08 G..Ed.b...\c.^.. 311s | PRF chunk interface PRF AES_XCBC final length 16 311s | 47 f5 1b 45 64 96 62 15 b8 98 5c 63 05 5e d3 08 G..Ed.b...\c.^.. 311s | chunk output 311s | 47 f5 1b 45 64 96 62 15 b8 98 5c 63 05 5e d3 08 G..Ed.b...\c.^.. 311s | verify_bytes() RFC 3566 Test Case 4: AES-XCBC-MAC-96 with 20-byte input: prf OUT: ok 311s | CONCATENATE_DATA_AND_BASE: 311s | target: EXTRACT_KEY_FROM_KEY 311s | base: base-key@0x2aa37d10350 (16-bytes, AES_KEY_GEN) 311s | params: 16-bytes@0x3ffde276f98 311s | key-offset: 0, key-size: 16 311s | EXTRACT_KEY_FROM_KEY: 311s | target: EXTRACT_KEY_FROM_KEY 311s | key_size: 16-bytes 311s | base: base-key@0x2aa37d140b0 (32-bytes, EXTRACT_KEY_FROM_KEY) 311s | operation: FLAGS_ONLY 311s | params: 8-bytes@0x3ffde276ea8 311s | PRF symkey interface PRF AES_XCBC init key symkey-key@0x2aa37d13360 (size 16) 311s | PRF symkey interface: key symkey-key@0x2aa37d13360 (16-bytes, EXTRACT_KEY_FROM_KEY) 311s | XCBC: Key 16=16 just right 311s | key-offset: 0, key-size: 16 311s | EXTRACT_KEY_FROM_KEY: 311s | target: AES_ECB 311s | flags: SIGN 311s | key_size: 16-bytes 311s | base: base-key@0x2aa37d13360 (16-bytes, EXTRACT_KEY_FROM_KEY) 311s | operation: FLAGS_ONLY 311s | params: 8-bytes@0x3ffde276db0 311s | PRF symkey interface PRF AES_XCBC 0x2aa37d102f0 311s | CONCATENATE_DATA_AND_BASE: 311s | target: EXTRACT_KEY_FROM_KEY 311s | base: base-key@0x2aa37d10350 (16-bytes, AES_KEY_GEN) 311s | params: 16-bytes@0x3ffde276f98 311s | key-offset: 0, key-size: 20 311s | EXTRACT_KEY_FROM_KEY: 311s | target: EXTRACT_KEY_FROM_KEY 311s | key_size: 20-bytes 311s | base: base-key@0x2aa37d143f0 (36-bytes, EXTRACT_KEY_FROM_KEY) 311s | operation: FLAGS_ONLY 311s | params: 8-bytes@0x3ffde276ea8 311s | PRF symkey interface PRF AES_XCBC update symkey message-key@0x2aa37d11c70 (size 20) 311s | PRF symkey interface: symkey message-key@0x2aa37d11c70 (20-bytes, EXTRACT_KEY_FROM_KEY) 311s | symkey message extracting all 20 bytes of key@0x2aa37d11c70 311s | symkey message: symkey-key@0x2aa37d11c70 (20-bytes, EXTRACT_KEY_FROM_KEY) 311s | sizeof bytes 32 311s | wrapper: (SECItemType)682: c1 d0 66 d7 06 cc e4 ce 8d f0 d0 b5 40 dd b6 e7 9e 2b a1 19 a7 d7 d8 30 d7 a6 4e 34 73 b5 6b 9b 311s | symkey message extracted len 32 bytes at 0x2aa37d13d20 311s | unwrapped: 311s | 00 01 02 03 04 05 06 07 08 09 0a 0b 0c 0d 0e 0f ................ 311s | 10 11 12 13 00 00 00 00 00 00 00 00 00 00 00 00 ................ 311s | XCBC: data 311s | 00 01 02 03 04 05 06 07 08 09 0a 0b 0c 0d 0e 0f ................ 311s | 10 11 12 13 .... 311s | K extracting all 16 bytes of key@0x2aa37d140b0 311s | K: symkey-key@0x2aa37d140b0 (16-bytes, AES_ECB) 311s | sizeof bytes 16 311s | wrapper: (SECItemType)1023: c1 d0 66 d7 06 cc e4 ce 8d f0 d0 b5 40 dd b6 e7 311s | K extracted len 16 bytes at 0x2aa37d136b0 311s | unwrapped: 311s | 00 01 02 03 04 05 06 07 08 09 0a 0b 0c 0d 0e 0f ................ 311s | XCBC: K: 311s | 00 01 02 03 04 05 06 07 08 09 0a 0b 0c 0d 0e 0f ................ 311s | XCBC: K1 311s | c3 52 80 57 54 23 7f 31 1a c0 ff f4 e3 e0 3e 78 .R.WT#.1......>x 311s | CONCATENATE_DATA_AND_BASE: 311s | target: EXTRACT_KEY_FROM_KEY 311s | base: base-key@0x2aa37d10350 (16-bytes, AES_KEY_GEN) 311s | params: 16-bytes@0x3ffde276c08 311s | key-offset: 0, key-size: 16 311s | EXTRACT_KEY_FROM_KEY: 311s | target: AES_ECB 311s | flags: SIGN 311s | key_size: 16-bytes 311s | base: base-key@0x2aa37d14750 (32-bytes, EXTRACT_KEY_FROM_KEY) 311s | operation: FLAGS_ONLY 311s | params: 8-bytes@0x3ffde276c10 311s | Computing E[2] using K3 311s | XCBC: K3 311s | c1 a7 ab a1 a2 3a 94 06 58 07 a0 8c c8 ee d0 6e .....:..X......n 311s | XCBC: E[n-1] 311s | 1d 04 48 fa cf 4d 9c 6f 55 b9 93 da 09 80 3d b3 ..H..M.oU.....=. 311s | XCBC: M[n] 311s | 10 11 12 13 .... 311s | XCBC: M[n] 311s | 10 11 12 13 .... 311s | XCBC: M[n]:80...^E[n-1]^K3 311s | cc b2 f1 48 ed 77 08 69 0d be 33 56 c1 6e ed dd ...H.w.i..3V.n.. 311s | XCBC: MAC 311s | 47 f5 1b 45 64 96 62 15 b8 98 5c 63 05 5e d3 08 G..Ed.b...\c.^.. 311s | CONCATENATE_DATA_AND_BASE: 311s | target: EXTRACT_KEY_FROM_KEY 311s | base: base-key@0x2aa37d10350 (16-bytes, AES_KEY_GEN) 311s | params: 16-bytes@0x3ffde276e20 311s | key-offset: 0, key-size: 16 311s | EXTRACT_KEY_FROM_KEY: 311s | target: EXTRACT_KEY_FROM_KEY 311s | key_size: 16-bytes 311s | base: base-key@0x2aa37d14750 (32-bytes, EXTRACT_KEY_FROM_KEY) 311s | operation: FLAGS_ONLY 311s | params: 8-bytes@0x3ffde276d30 311s | PRF symkey interface PRF AES_XCBC final-key@0x2aa37d143f0 (size 16) 311s | PRF symkey interface: key-key@0x2aa37d143f0 (16-bytes, EXTRACT_KEY_FROM_KEY) 311s | output: symkey-key@0x2aa37d143f0 (16-bytes, EXTRACT_KEY_FROM_KEY) 311s | RFC 3566 Test Case 4: AES-XCBC-MAC-96 with 20-byte input extracting all 16 bytes of key@0x2aa37d143f0 311s | RFC 3566 Test Case 4: AES-XCBC-MAC-96 with 20-byte input: symkey-key@0x2aa37d143f0 (16-bytes, EXTRACT_KEY_FROM_KEY) 311s | sizeof bytes 16 311s | wrapper: (SECItemType)682: e1 0b 48 f7 89 33 5f 3b fc 2a 1e 1b 36 af d1 30 311s | RFC 3566 Test Case 4: AES-XCBC-MAC-96 with 20-byte input extracted len 16 bytes at 0x2aa37d136b0 311s | unwrapped: 311s | 47 f5 1b 45 64 96 62 15 b8 98 5c 63 05 5e d3 08 G..Ed.b...\c.^.. 311s | verify_bytes() RFC 3566 Test Case 4: AES-XCBC-MAC-96 with 20-byte input: symkey: ok 311s ipsec algparse: RFC 3566 Test Case 5: AES-XCBC-MAC-96 with 32-byte input 311s | decode_to_chunk() test_prf_vector: input "0x000102030405060708090a0b0c0d0e0f" 311s | decode_to_chunk() output: 311s | 00 01 02 03 04 05 06 07 08 09 0a 0b 0c 0d 0e 0f ................ 311s | decode_to_chunk() test_prf_vector: input "0x000102030405060708090a0b0c0d0e0f101112131415161718191a1b1c1d1e1f" 311s | decode_to_chunk() output: 311s | 00 01 02 03 04 05 06 07 08 09 0a 0b 0c 0d 0e 0f ................ 311s | 10 11 12 13 14 15 16 17 18 19 1a 1b 1c 1d 1e 1f ................ 311s | decode_to_chunk() test_prf_vector: input "0xf54f0ec8d2b9f3d36807734bd5283fd4" 311s | decode_to_chunk() output: 311s | f5 4f 0e c8 d2 b9 f3 d3 68 07 73 4b d5 28 3f d4 .O......h.sK.(?. 311s | PRF chunk interface PRF AES_XCBC init key hunk 0x2aa37d13690 (length 16) 311s | 00 01 02 03 04 05 06 07 08 09 0a 0b 0c 0d 0e 0f ................ 311s | CONCATENATE_DATA_AND_BASE: 311s | target: EXTRACT_KEY_FROM_KEY 311s | base: base-key@0x2aa37d10350 (16-bytes, AES_KEY_GEN) 311s | params: 16-bytes@0x3ffde276e30 311s | key-offset: 0, key-size: 16 311s | EXTRACT_KEY_FROM_KEY: 311s | target: EXTRACT_KEY_FROM_KEY 311s | key_size: 16-bytes 311s | base: base-key@0x2aa37d13360 (32-bytes, EXTRACT_KEY_FROM_KEY) 311s | operation: FLAGS_ONLY 311s | params: 8-bytes@0x3ffde276d40 311s | XCBC: Key 16=16 just right 311s | key-offset: 0, key-size: 16 311s | EXTRACT_KEY_FROM_KEY: 311s | target: AES_ECB 311s | flags: SIGN 311s | key_size: 16-bytes 311s | base: base-key@0x2aa37d143f0 (16-bytes, EXTRACT_KEY_FROM_KEY) 311s | operation: FLAGS_ONLY 311s | params: 8-bytes@0x3ffde276cf0 311s | PRF chunk interface PRF AES_XCBC 0x2aa37d13d20 311s | PRF chunk interface PRF AES_XCBC update message (0x2aa37d102f0 length 32) 311s | 00 01 02 03 04 05 06 07 08 09 0a 0b 0c 0d 0e 0f ................ 311s | 10 11 12 13 14 15 16 17 18 19 1a 1b 1c 1d 1e 1f ................ 311s | XCBC: data 311s | 00 01 02 03 04 05 06 07 08 09 0a 0b 0c 0d 0e 0f ................ 311s | 10 11 12 13 14 15 16 17 18 19 1a 1b 1c 1d 1e 1f ................ 311s | K extracting all 16 bytes of key@0x2aa37d13360 311s | K: symkey-key@0x2aa37d13360 (16-bytes, AES_ECB) 311s | sizeof bytes 16 311s | wrapper: (SECItemType)1111695477: c1 d0 66 d7 06 cc e4 ce 8d f0 d0 b5 40 dd b6 e7 311s | K extracted len 16 bytes at 0x2aa37d10220 311s | unwrapped: 311s | 00 01 02 03 04 05 06 07 08 09 0a 0b 0c 0d 0e 0f ................ 311s | XCBC: K: 311s | 00 01 02 03 04 05 06 07 08 09 0a 0b 0c 0d 0e 0f ................ 311s | XCBC: K1 311s | c3 52 80 57 54 23 7f 31 1a c0 ff f4 e3 e0 3e 78 .R.WT#.1......>x 311s | CONCATENATE_DATA_AND_BASE: 311s | target: EXTRACT_KEY_FROM_KEY 311s | base: base-key@0x2aa37d10350 (16-bytes, AES_KEY_GEN) 311s | params: 16-bytes@0x3ffde276bc8 311s | key-offset: 0, key-size: 16 311s | EXTRACT_KEY_FROM_KEY: 311s | target: AES_ECB 311s | flags: SIGN 311s | key_size: 16-bytes 311s | base: base-key@0x2aa37d11c70 (32-bytes, EXTRACT_KEY_FROM_KEY) 311s | operation: FLAGS_ONLY 311s | params: 8-bytes@0x3ffde276bd0 311s | XCBC: Computing E[2] using K2 311s | XCBC: K2 311s | bd 86 2f fb 97 ad 2f b8 f8 b8 91 f6 03 2f 36 cb ../.../....../6. 311s | XCBC: E[n-1] 311s | 1d 04 48 fa cf 4d 9c 6f 55 b9 93 da 09 80 3d b3 ..H..M.oU.....=. 311s | XCBC: M[n] 311s | 10 11 12 13 14 15 16 17 18 19 1a 1b 1c 1d 1e 1f ................ 311s | XCBC: M[n]^E[n-1]^K2 311s | b0 93 75 12 4c f5 a5 c0 b5 18 18 37 16 b2 15 67 ..u.L......7...g 311s | XCBC: MAC 311s | f5 4f 0e c8 d2 b9 f3 d3 68 07 73 4b d5 28 3f d4 .O......h.sK.(?. 311s | PRF chunk interface PRF AES_XCBC final length 16 311s | f5 4f 0e c8 d2 b9 f3 d3 68 07 73 4b d5 28 3f d4 .O......h.sK.(?. 311s | chunk output 311s | f5 4f 0e c8 d2 b9 f3 d3 68 07 73 4b d5 28 3f d4 .O......h.sK.(?. 311s | verify_bytes() RFC 3566 Test Case 5: AES-XCBC-MAC-96 with 32-byte input: prf OUT: ok 311s | CONCATENATE_DATA_AND_BASE: 311s | target: EXTRACT_KEY_FROM_KEY 311s | base: base-key@0x2aa37d10350 (16-bytes, AES_KEY_GEN) 311s | params: 16-bytes@0x3ffde276f98 311s | key-offset: 0, key-size: 16 311s | EXTRACT_KEY_FROM_KEY: 311s | target: EXTRACT_KEY_FROM_KEY 311s | key_size: 16-bytes 311s | base: base-key@0x2aa37d143f0 (32-bytes, EXTRACT_KEY_FROM_KEY) 311s | operation: FLAGS_ONLY 311s | params: 8-bytes@0x3ffde276ea8 311s | PRF symkey interface PRF AES_XCBC init key symkey-key@0x2aa37d13360 (size 16) 311s | PRF symkey interface: key symkey-key@0x2aa37d13360 (16-bytes, EXTRACT_KEY_FROM_KEY) 311s | XCBC: Key 16=16 just right 311s | key-offset: 0, key-size: 16 311s | EXTRACT_KEY_FROM_KEY: 311s | target: AES_ECB 311s | flags: SIGN 311s | key_size: 16-bytes 311s | base: base-key@0x2aa37d13360 (16-bytes, EXTRACT_KEY_FROM_KEY) 311s | operation: FLAGS_ONLY 311s | params: 8-bytes@0x3ffde276db0 311s | PRF symkey interface PRF AES_XCBC 0x2aa37d13d20 311s | CONCATENATE_DATA_AND_BASE: 311s | target: EXTRACT_KEY_FROM_KEY 311s | base: base-key@0x2aa37d10350 (16-bytes, AES_KEY_GEN) 311s | params: 16-bytes@0x3ffde276f98 311s | key-offset: 0, key-size: 32 311s | EXTRACT_KEY_FROM_KEY: 311s | target: EXTRACT_KEY_FROM_KEY 311s | key_size: 32-bytes 311s | base: base-key@0x2aa37d140b0 (48-bytes, EXTRACT_KEY_FROM_KEY) 311s | operation: FLAGS_ONLY 311s | params: 8-bytes@0x3ffde276ea8 311s | PRF symkey interface PRF AES_XCBC update symkey message-key@0x2aa37d11c70 (size 32) 311s | PRF symkey interface: symkey message-key@0x2aa37d11c70 (32-bytes, EXTRACT_KEY_FROM_KEY) 311s | symkey message extracting all 32 bytes of key@0x2aa37d11c70 311s | symkey message: symkey-key@0x2aa37d11c70 (32-bytes, EXTRACT_KEY_FROM_KEY) 311s | sizeof bytes 32 311s | wrapper: (SECItemType)682: c1 d0 66 d7 06 cc e4 ce 8d f0 d0 b5 40 dd b6 e7 3b 6e 2a 12 6a b3 ee 57 d6 1b db c6 ea 03 e2 ab 311s | symkey message extracted len 32 bytes at 0x2aa37d14a10 311s | unwrapped: 311s | 00 01 02 03 04 05 06 07 08 09 0a 0b 0c 0d 0e 0f ................ 311s | 10 11 12 13 14 15 16 17 18 19 1a 1b 1c 1d 1e 1f ................ 311s | XCBC: data 311s | 00 01 02 03 04 05 06 07 08 09 0a 0b 0c 0d 0e 0f ................ 311s | 10 11 12 13 14 15 16 17 18 19 1a 1b 1c 1d 1e 1f ................ 311s | K extracting all 16 bytes of key@0x2aa37d143f0 311s | K: symkey-key@0x2aa37d143f0 (16-bytes, AES_ECB) 311s | sizeof bytes 16 311s | wrapper: (SECItemType)1023: c1 d0 66 d7 06 cc e4 ce 8d f0 d0 b5 40 dd b6 e7 311s | K extracted len 16 bytes at 0x2aa37d13f20 311s | unwrapped: 311s | 00 01 02 03 04 05 06 07 08 09 0a 0b 0c 0d 0e 0f ................ 311s | XCBC: K: 311s | 00 01 02 03 04 05 06 07 08 09 0a 0b 0c 0d 0e 0f ................ 311s | XCBC: K1 311s | c3 52 80 57 54 23 7f 31 1a c0 ff f4 e3 e0 3e 78 .R.WT#.1......>x 311s | CONCATENATE_DATA_AND_BASE: 311s | target: EXTRACT_KEY_FROM_KEY 311s | base: base-key@0x2aa37d10350 (16-bytes, AES_KEY_GEN) 311s | params: 16-bytes@0x3ffde276c08 311s | key-offset: 0, key-size: 16 311s | EXTRACT_KEY_FROM_KEY: 311s | target: AES_ECB 311s | flags: SIGN 311s | key_size: 16-bytes 311s | base: base-key@0x2aa37d14750 (32-bytes, EXTRACT_KEY_FROM_KEY) 311s | operation: FLAGS_ONLY 311s | params: 8-bytes@0x3ffde276c10 311s | XCBC: Computing E[2] using K2 311s | XCBC: K2 311s | bd 86 2f fb 97 ad 2f b8 f8 b8 91 f6 03 2f 36 cb ../.../....../6. 311s | XCBC: E[n-1] 311s | 1d 04 48 fa cf 4d 9c 6f 55 b9 93 da 09 80 3d b3 ..H..M.oU.....=. 311s | XCBC: M[n] 311s | 10 11 12 13 14 15 16 17 18 19 1a 1b 1c 1d 1e 1f ................ 311s | XCBC: M[n]^E[n-1]^K2 311s | b0 93 75 12 4c f5 a5 c0 b5 18 18 37 16 b2 15 67 ..u.L......7...g 311s | XCBC: MAC 311s | f5 4f 0e c8 d2 b9 f3 d3 68 07 73 4b d5 28 3f d4 .O......h.sK.(?. 311s | CONCATENATE_DATA_AND_BASE: 311s | target: EXTRACT_KEY_FROM_KEY 311s | base: base-key@0x2aa37d10350 (16-bytes, AES_KEY_GEN) 311s | params: 16-bytes@0x3ffde276e20 311s | key-offset: 0, key-size: 16 311s | EXTRACT_KEY_FROM_KEY: 311s | target: EXTRACT_KEY_FROM_KEY 311s | key_size: 16-bytes 311s | base: base-key@0x2aa37d14750 (32-bytes, EXTRACT_KEY_FROM_KEY) 311s | operation: FLAGS_ONLY 311s | params: 8-bytes@0x3ffde276d30 311s | PRF symkey interface PRF AES_XCBC final-key@0x2aa37d140b0 (size 16) 311s | PRF symkey interface: key-key@0x2aa37d140b0 (16-bytes, EXTRACT_KEY_FROM_KEY) 311s | output: symkey-key@0x2aa37d140b0 (16-bytes, EXTRACT_KEY_FROM_KEY) 311s | RFC 3566 Test Case 5: AES-XCBC-MAC-96 with 32-byte input extracting all 16 bytes of key@0x2aa37d140b0 311s | RFC 3566 Test Case 5: AES-XCBC-MAC-96 with 32-byte input: symkey-key@0x2aa37d140b0 (16-bytes, EXTRACT_KEY_FROM_KEY) 311s | sizeof bytes 16 311s | wrapper: (SECItemType)682: a0 74 66 d3 de e4 f1 23 7c 70 b0 9d 47 28 21 e0 311s | RFC 3566 Test Case 5: AES-XCBC-MAC-96 with 32-byte input extracted len 16 bytes at 0x2aa37d139a0 311s | unwrapped: 311s | f5 4f 0e c8 d2 b9 f3 d3 68 07 73 4b d5 28 3f d4 .O......h.sK.(?. 311s | verify_bytes() RFC 3566 Test Case 5: AES-XCBC-MAC-96 with 32-byte input: symkey: ok 311s ipsec algparse: RFC 3566 Test Case 6: AES-XCBC-MAC-96 with 34-byte input 311s | decode_to_chunk() test_prf_vector: input "0x000102030405060708090a0b0c0d0e0f" 311s | decode_to_chunk() output: 311s | 00 01 02 03 04 05 06 07 08 09 0a 0b 0c 0d 0e 0f ................ 311s | decode_to_chunk() test_prf_vector: input "0x000102030405060708090a0b0c0d0e0f101112131415161718191a1b1c1d1e1f2021" 311s | decode_to_chunk() output: 311s | 00 01 02 03 04 05 06 07 08 09 0a 0b 0c 0d 0e 0f ................ 311s | 10 11 12 13 14 15 16 17 18 19 1a 1b 1c 1d 1e 1f ................ 311s | 20 21 ! 311s | decode_to_chunk() test_prf_vector: input "0xbecbb3bccdb518a30677d5481fb6b4d8" 311s | decode_to_chunk() output: 311s | be cb b3 bc cd b5 18 a3 06 77 d5 48 1f b6 b4 d8 .........w.H.... 311s | PRF chunk interface PRF AES_XCBC init key hunk 0x2aa37d11ba0 (length 16) 311s | 00 01 02 03 04 05 06 07 08 09 0a 0b 0c 0d 0e 0f ................ 311s | CONCATENATE_DATA_AND_BASE: 311s | target: EXTRACT_KEY_FROM_KEY 311s | base: base-key@0x2aa37d10350 (16-bytes, AES_KEY_GEN) 311s | params: 16-bytes@0x3ffde276e30 311s | key-offset: 0, key-size: 16 311s | EXTRACT_KEY_FROM_KEY: 311s | target: EXTRACT_KEY_FROM_KEY 311s | key_size: 16-bytes 311s | base: base-key@0x2aa37d13360 (32-bytes, EXTRACT_KEY_FROM_KEY) 311s | operation: FLAGS_ONLY 311s | params: 8-bytes@0x3ffde276d40 311s | XCBC: Key 16=16 just right 311s | key-offset: 0, key-size: 16 311s | EXTRACT_KEY_FROM_KEY: 311s | target: AES_ECB 311s | flags: SIGN 311s | key_size: 16-bytes 311s | base: base-key@0x2aa37d140b0 (16-bytes, EXTRACT_KEY_FROM_KEY) 311s | operation: FLAGS_ONLY 311s | params: 8-bytes@0x3ffde276cf0 311s | PRF chunk interface PRF AES_XCBC 0x2aa37d102f0 311s | PRF chunk interface PRF AES_XCBC update message (0x2aa37d10320 length 34) 311s | 00 01 02 03 04 05 06 07 08 09 0a 0b 0c 0d 0e 0f ................ 311s | 10 11 12 13 14 15 16 17 18 19 1a 1b 1c 1d 1e 1f ................ 311s | 20 21 ! 311s | XCBC: data 311s | 00 01 02 03 04 05 06 07 08 09 0a 0b 0c 0d 0e 0f ................ 311s | 10 11 12 13 14 15 16 17 18 19 1a 1b 1c 1d 1e 1f ................ 311s | 20 21 ! 311s | K extracting all 16 bytes of key@0x2aa37d13360 311s | K: symkey-key@0x2aa37d13360 (16-bytes, AES_ECB) 311s | sizeof bytes 16 311s | wrapper: (SECItemType)1111695477: c1 d0 66 d7 06 cc e4 ce 8d f0 d0 b5 40 dd b6 e7 311s | K extracted len 16 bytes at 0x2aa37d13f20 311s | unwrapped: 311s | 00 01 02 03 04 05 06 07 08 09 0a 0b 0c 0d 0e 0f ................ 311s | XCBC: K: 311s | 00 01 02 03 04 05 06 07 08 09 0a 0b 0c 0d 0e 0f ................ 311s | XCBC: K1 311s | c3 52 80 57 54 23 7f 31 1a c0 ff f4 e3 e0 3e 78 .R.WT#.1......>x 311s | CONCATENATE_DATA_AND_BASE: 311s | target: EXTRACT_KEY_FROM_KEY 311s | base: base-key@0x2aa37d10350 (16-bytes, AES_KEY_GEN) 311s | params: 16-bytes@0x3ffde276bc8 311s | key-offset: 0, key-size: 16 311s | EXTRACT_KEY_FROM_KEY: 311s | target: AES_ECB 311s | flags: SIGN 311s | key_size: 16-bytes 311s | base: base-key@0x2aa37d11c70 (32-bytes, EXTRACT_KEY_FROM_KEY) 311s | operation: FLAGS_ONLY 311s | params: 8-bytes@0x3ffde276bd0 311s | Computing E[3] using K3 311s | XCBC: K3 311s | c1 a7 ab a1 a2 3a 94 06 58 07 a0 8c c8 ee d0 6e .....:..X......n 311s | XCBC: E[n-1] 311s | 09 02 5e 5a 67 25 20 72 44 14 5c 6b 80 66 85 79 ..^Zg% rD.\k.f.y 311s | XCBC: M[n] 311s | 20 21 ! 311s | XCBC: M[n] 311s | 20 21 ! 311s | XCBC: M[n]:80...^E[n-1]^K3 311s | e8 84 75 fb c5 1f b4 74 1c 13 fc e7 48 88 55 17 ..u....t....H.U. 311s | XCBC: MAC 311s | be cb b3 bc cd b5 18 a3 06 77 d5 48 1f b6 b4 d8 .........w.H.... 311s | PRF chunk interface PRF AES_XCBC final length 16 311s | be cb b3 bc cd b5 18 a3 06 77 d5 48 1f b6 b4 d8 .........w.H.... 311s | chunk output 311s | be cb b3 bc cd b5 18 a3 06 77 d5 48 1f b6 b4 d8 .........w.H.... 311s | verify_bytes() RFC 3566 Test Case 6: AES-XCBC-MAC-96 with 34-byte input: prf OUT: ok 311s | CONCATENATE_DATA_AND_BASE: 311s | target: EXTRACT_KEY_FROM_KEY 311s | base: base-key@0x2aa37d10350 (16-bytes, AES_KEY_GEN) 311s | params: 16-bytes@0x3ffde276f98 311s | key-offset: 0, key-size: 16 311s | EXTRACT_KEY_FROM_KEY: 311s | target: EXTRACT_KEY_FROM_KEY 311s | key_size: 16-bytes 311s | base: base-key@0x2aa37d140b0 (32-bytes, EXTRACT_KEY_FROM_KEY) 311s | operation: FLAGS_ONLY 311s | params: 8-bytes@0x3ffde276ea8 311s | PRF symkey interface PRF AES_XCBC init key symkey-key@0x2aa37d13360 (size 16) 311s | PRF symkey interface: key symkey-key@0x2aa37d13360 (16-bytes, EXTRACT_KEY_FROM_KEY) 311s | XCBC: Key 16=16 just right 311s | key-offset: 0, key-size: 16 311s | EXTRACT_KEY_FROM_KEY: 311s | target: AES_ECB 311s | flags: SIGN 311s | key_size: 16-bytes 311s | base: base-key@0x2aa37d13360 (16-bytes, EXTRACT_KEY_FROM_KEY) 311s | operation: FLAGS_ONLY 311s | params: 8-bytes@0x3ffde276db0 311s | PRF symkey interface PRF AES_XCBC 0x2aa37d102f0 311s | CONCATENATE_DATA_AND_BASE: 311s | target: EXTRACT_KEY_FROM_KEY 311s | base: base-key@0x2aa37d10350 (16-bytes, AES_KEY_GEN) 311s | params: 16-bytes@0x3ffde276f98 311s | key-offset: 0, key-size: 34 311s | EXTRACT_KEY_FROM_KEY: 311s | target: EXTRACT_KEY_FROM_KEY 311s | key_size: 34-bytes 311s | base: base-key@0x2aa37d143f0 (50-bytes, EXTRACT_KEY_FROM_KEY) 311s | operation: FLAGS_ONLY 311s | params: 8-bytes@0x3ffde276ea8 311s | PRF symkey interface PRF AES_XCBC update symkey message-key@0x2aa37d11c70 (size 34) 311s | PRF symkey interface: symkey message-key@0x2aa37d11c70 (34-bytes, EXTRACT_KEY_FROM_KEY) 311s | symkey message extracting all 34 bytes of key@0x2aa37d11c70 311s | symkey message: symkey-key@0x2aa37d11c70 (34-bytes, EXTRACT_KEY_FROM_KEY) 311s | sizeof bytes 48 311s | wrapper: (SECItemType)682: c1 d0 66 d7 06 cc e4 ce 8d f0 d0 b5 40 dd b6 e7 3b 6e 2a 12 6a b3 ee 57 d6 1b db c6 ea 03 e2 ab 49 29 73 9b 16 bc 0c 02 84 f8 4f d7 51 7f fc 12 311s | symkey message extracted len 48 bytes at 0x2aa37d139c0 311s | unwrapped: 311s | 00 01 02 03 04 05 06 07 08 09 0a 0b 0c 0d 0e 0f ................ 311s | 10 11 12 13 14 15 16 17 18 19 1a 1b 1c 1d 1e 1f ................ 311s | 20 21 00 00 00 00 00 00 00 00 00 00 00 00 00 00 !.............. 311s | XCBC: data 311s | 00 01 02 03 04 05 06 07 08 09 0a 0b 0c 0d 0e 0f ................ 311s | 10 11 12 13 14 15 16 17 18 19 1a 1b 1c 1d 1e 1f ................ 311s | 20 21 ! 311s | K extracting all 16 bytes of key@0x2aa37d140b0 311s | K: symkey-key@0x2aa37d140b0 (16-bytes, AES_ECB) 311s | sizeof bytes 16 311s | wrapper: (SECItemType)1023: c1 d0 66 d7 06 cc e4 ce 8d f0 d0 b5 40 dd b6 e7 311s | K extracted len 16 bytes at 0x2aa37d10220 311s | unwrapped: 311s | 00 01 02 03 04 05 06 07 08 09 0a 0b 0c 0d 0e 0f ................ 311s | XCBC: K: 311s | 00 01 02 03 04 05 06 07 08 09 0a 0b 0c 0d 0e 0f ................ 311s | XCBC: K1 311s | c3 52 80 57 54 23 7f 31 1a c0 ff f4 e3 e0 3e 78 .R.WT#.1......>x 311s | CONCATENATE_DATA_AND_BASE: 311s | target: EXTRACT_KEY_FROM_KEY 311s | base: base-key@0x2aa37d10350 (16-bytes, AES_KEY_GEN) 311s | params: 16-bytes@0x3ffde276c08 311s | key-offset: 0, key-size: 16 311s | EXTRACT_KEY_FROM_KEY: 311s | target: AES_ECB 311s | flags: SIGN 311s | key_size: 16-bytes 311s | base: base-key@0x2aa37d14750 (32-bytes, EXTRACT_KEY_FROM_KEY) 311s | operation: FLAGS_ONLY 311s | params: 8-bytes@0x3ffde276c10 311s | Computing E[3] using K3 311s | XCBC: K3 311s | c1 a7 ab a1 a2 3a 94 06 58 07 a0 8c c8 ee d0 6e .....:..X......n 311s | XCBC: E[n-1] 311s | 09 02 5e 5a 67 25 20 72 44 14 5c 6b 80 66 85 79 ..^Zg% rD.\k.f.y 311s | XCBC: M[n] 311s | 20 21 ! 311s | XCBC: M[n] 311s | 20 21 ! 311s | XCBC: M[n]:80...^E[n-1]^K3 311s | e8 84 75 fb c5 1f b4 74 1c 13 fc e7 48 88 55 17 ..u....t....H.U. 311s | XCBC: MAC 311s | be cb b3 bc cd b5 18 a3 06 77 d5 48 1f b6 b4 d8 .........w.H.... 311s | CONCATENATE_DATA_AND_BASE: 311s | target: EXTRACT_KEY_FROM_KEY 311s | base: base-key@0x2aa37d10350 (16-bytes, AES_KEY_GEN) 311s | params: 16-bytes@0x3ffde276e20 311s | key-offset: 0, key-size: 16 311s | EXTRACT_KEY_FROM_KEY: 311s | target: EXTRACT_KEY_FROM_KEY 311s | key_size: 16-bytes 311s | base: base-key@0x2aa37d14750 (32-bytes, EXTRACT_KEY_FROM_KEY) 311s | operation: FLAGS_ONLY 311s | params: 8-bytes@0x3ffde276d30 311s | PRF symkey interface PRF AES_XCBC final-key@0x2aa37d143f0 (size 16) 311s | PRF symkey interface: key-key@0x2aa37d143f0 (16-bytes, EXTRACT_KEY_FROM_KEY) 311s | output: symkey-key@0x2aa37d143f0 (16-bytes, EXTRACT_KEY_FROM_KEY) 311s | RFC 3566 Test Case 6: AES-XCBC-MAC-96 with 34-byte input extracting all 16 bytes of key@0x2aa37d143f0 311s | RFC 3566 Test Case 6: AES-XCBC-MAC-96 with 34-byte input: symkey-key@0x2aa37d143f0 (16-bytes, EXTRACT_KEY_FROM_KEY) 311s | sizeof bytes 16 311s | wrapper: (SECItemType)682: e6 eb cc 94 32 77 4a 55 5d c9 21 0e 6b c3 01 26 311s | RFC 3566 Test Case 6: AES-XCBC-MAC-96 with 34-byte input extracted len 16 bytes at 0x2aa37d13590 311s | unwrapped: 311s | be cb b3 bc cd b5 18 a3 06 77 d5 48 1f b6 b4 d8 .........w.H.... 311s | verify_bytes() RFC 3566 Test Case 6: AES-XCBC-MAC-96 with 34-byte input: symkey: ok 311s ipsec algparse: RFC 3566 Test Case 7: AES-XCBC-MAC-96 with 1000-byte input 311s | decode_to_chunk() test_prf_vector: input "0x000102030405060708090a0b0c0d0e0f" 311s | decode_to_chunk() output: 311s | 00 01 02 03 04 05 06 07 08 09 0a 0b 0c 0d 0e 0f ................ 311s | decode_to_chunk() test_prf_vector: input "0xf0dafee895db30253761103b5d84528f" 311s | decode_to_chunk() output: 311s | f0 da fe e8 95 db 30 25 37 61 10 3b 5d 84 52 8f ......0%7a.;].R. 311s | PRF chunk interface PRF AES_XCBC init key hunk 0x2aa37d136b0 (length 16) 311s | 00 01 02 03 04 05 06 07 08 09 0a 0b 0c 0d 0e 0f ................ 311s | CONCATENATE_DATA_AND_BASE: 311s | target: EXTRACT_KEY_FROM_KEY 311s | base: base-key@0x2aa37d10350 (16-bytes, AES_KEY_GEN) 311s | params: 16-bytes@0x3ffde276e30 311s | key-offset: 0, key-size: 16 311s | EXTRACT_KEY_FROM_KEY: 311s | target: EXTRACT_KEY_FROM_KEY 311s | key_size: 16-bytes 311s | base: base-key@0x2aa37d13360 (32-bytes, EXTRACT_KEY_FROM_KEY) 311s | operation: FLAGS_ONLY 311s | params: 8-bytes@0x3ffde276d40 311s | XCBC: Key 16=16 just right 311s | key-offset: 0, key-size: 16 311s | EXTRACT_KEY_FROM_KEY: 311s | target: AES_ECB 311s | flags: SIGN 311s | key_size: 16-bytes 311s | base: base-key@0x2aa37d143f0 (16-bytes, EXTRACT_KEY_FROM_KEY) 311s | operation: FLAGS_ONLY 311s | params: 8-bytes@0x3ffde276cf0 311s | PRF chunk interface PRF AES_XCBC 0x2aa37d13d20 311s | PRF chunk interface PRF AES_XCBC update message (0x2aa37d11da0 length 1000) 311s | 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................ 311s | 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................ 311s | 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................ 311s | 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................ 311s | 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................ 311s | 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................ 311s | 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................ 311s | 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................ 311s | 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................ 311s | 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................ 311s | 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................ 311s | 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................ 311s | 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................ 311s | 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................ 311s | 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................ 311s | 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................ 311s | 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................ 311s | 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................ 311s | 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................ 311s | 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................ 311s | 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................ 311s | 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................ 311s | 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................ 311s | 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................ 311s | 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................ 311s | 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................ 311s | 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................ 311s | 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................ 311s | 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................ 311s | 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................ 311s | 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................ 311s | 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................ 311s | 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................ 311s | 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................ 311s | 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................ 311s | 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................ 311s | 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................ 311s | 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................ 311s | 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................ 311s | 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................ 311s | 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................ 311s | 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................ 311s | 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................ 311s | 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................ 311s | 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................ 311s | 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................ 311s | 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................ 311s | 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................ 311s | 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................ 311s | 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................ 311s | 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................ 311s | 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................ 311s | 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................ 311s | 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................ 311s | 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................ 311s | 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................ 311s | 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................ 311s | 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................ 311s | 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................ 311s | 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................ 311s | 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................ 311s | 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................ 311s | 00 00 00 00 00 00 00 00 ........ 311s | XCBC: data 311s | 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................ 311s | 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................ 311s | 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................ 311s | 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................ 311s | 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................ 311s | 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................ 311s | 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................ 311s | 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................ 311s | 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................ 311s | 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................ 311s | 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................ 311s | 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................ 311s | 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................ 311s | 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................ 311s | 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................ 311s | 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................ 311s | 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................ 311s | 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................ 311s | 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................ 311s | 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................ 311s | 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................ 311s | 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................ 311s | 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................ 311s | 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................ 311s | 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................ 311s | 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................ 311s | 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................ 311s | 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................ 311s | 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................ 311s | 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................ 311s | 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................ 311s | 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................ 311s | 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................ 311s | 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................ 311s | 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................ 311s | 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................ 311s | 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................ 311s | 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................ 311s | 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................ 311s | 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................ 311s | 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................ 311s | 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................ 311s | 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................ 311s | 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................ 311s | 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................ 311s | 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................ 311s | 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................ 311s | 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................ 311s | 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................ 311s | 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................ 311s | 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................ 311s | 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................ 311s | 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................ 311s | 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................ 311s | 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................ 311s | 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................ 311s | 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................ 311s | 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................ 311s | 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................ 311s | 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................ 311s | 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................ 311s | 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................ 311s | 00 00 00 00 00 00 00 00 ........ 311s | K extracting all 16 bytes of key@0x2aa37d13360 311s | K: symkey-key@0x2aa37d13360 (16-bytes, AES_ECB) 311s | sizeof bytes 16 311s | wrapper: (SECItemType)1111695477: c1 d0 66 d7 06 cc e4 ce 8d f0 d0 b5 40 dd b6 e7 311s | K extracted len 16 bytes at 0x2aa37d10220 311s | unwrapped: 311s | 00 01 02 03 04 05 06 07 08 09 0a 0b 0c 0d 0e 0f ................ 311s | XCBC: K: 311s | 00 01 02 03 04 05 06 07 08 09 0a 0b 0c 0d 0e 0f ................ 311s | XCBC: K1 311s | c3 52 80 57 54 23 7f 31 1a c0 ff f4 e3 e0 3e 78 .R.WT#.1......>x 311s | CONCATENATE_DATA_AND_BASE: 311s | target: EXTRACT_KEY_FROM_KEY 311s | base: base-key@0x2aa37d10350 (16-bytes, AES_KEY_GEN) 311s | params: 16-bytes@0x3ffde276bc8 311s | key-offset: 0, key-size: 16 311s | EXTRACT_KEY_FROM_KEY: 311s | target: AES_ECB 311s | flags: SIGN 311s | key_size: 16-bytes 311s | base: base-key@0x2aa37d11c70 (32-bytes, EXTRACT_KEY_FROM_KEY) 311s | operation: FLAGS_ONLY 311s | params: 8-bytes@0x3ffde276bd0 311s | Computing E[63] using K3 311s | XCBC: K3 311s | c1 a7 ab a1 a2 3a 94 06 58 07 a0 8c c8 ee d0 6e .....:..X......n 311s | XCBC: E[n-1] 311s | 5c 88 af cc 1e 1e 83 fc c4 2c 0c e4 12 12 f5 17 \........,...... 311s | XCBC: M[n] 311s | 00 00 00 00 00 00 00 00 ........ 311s | XCBC: M[n] 311s | 00 00 00 00 00 00 00 00 ........ 311s | XCBC: M[n]:80...^E[n-1]^K3 311s | 9d 2f 04 6d bc 24 17 fa 1c 2b ac 68 da fc 25 79 ./.m.$...+.h..%y 311s | XCBC: MAC 311s | f0 da fe e8 95 db 30 25 37 61 10 3b 5d 84 52 8f ......0%7a.;].R. 311s | PRF chunk interface PRF AES_XCBC final length 16 311s | f0 da fe e8 95 db 30 25 37 61 10 3b 5d 84 52 8f ......0%7a.;].R. 311s | chunk output 311s | f0 da fe e8 95 db 30 25 37 61 10 3b 5d 84 52 8f ......0%7a.;].R. 311s | verify_bytes() RFC 3566 Test Case 7: AES-XCBC-MAC-96 with 1000-byte input: prf OUT: ok 311s | CONCATENATE_DATA_AND_BASE: 311s | target: EXTRACT_KEY_FROM_KEY 311s | base: base-key@0x2aa37d10350 (16-bytes, AES_KEY_GEN) 311s | params: 16-bytes@0x3ffde276f98 311s | key-offset: 0, key-size: 16 311s | EXTRACT_KEY_FROM_KEY: 311s | target: EXTRACT_KEY_FROM_KEY 311s | key_size: 16-bytes 311s | base: base-key@0x2aa37d143f0 (32-bytes, EXTRACT_KEY_FROM_KEY) 311s | operation: FLAGS_ONLY 311s | params: 8-bytes@0x3ffde276ea8 311s | PRF symkey interface PRF AES_XCBC init key symkey-key@0x2aa37d13360 (size 16) 311s | PRF symkey interface: key symkey-key@0x2aa37d13360 (16-bytes, EXTRACT_KEY_FROM_KEY) 311s | XCBC: Key 16=16 just right 311s | key-offset: 0, key-size: 16 311s | EXTRACT_KEY_FROM_KEY: 311s | target: AES_ECB 311s | flags: SIGN 311s | key_size: 16-bytes 311s | base: base-key@0x2aa37d13360 (16-bytes, EXTRACT_KEY_FROM_KEY) 311s | operation: FLAGS_ONLY 311s | params: 8-bytes@0x3ffde276db0 311s | PRF symkey interface PRF AES_XCBC 0x2aa37d13d20 311s | CONCATENATE_DATA_AND_BASE: 311s | target: EXTRACT_KEY_FROM_KEY 311s | base: base-key@0x2aa37d10350 (16-bytes, AES_KEY_GEN) 311s | params: 16-bytes@0x3ffde276f98 311s | key-offset: 0, key-size: 1000 311s | EXTRACT_KEY_FROM_KEY: 311s | target: EXTRACT_KEY_FROM_KEY 311s | key_size: 1000-bytes 311s | base: base-key@0x2aa37d140b0 (1016-bytes, EXTRACT_KEY_FROM_KEY) 311s | operation: FLAGS_ONLY 311s | params: 8-bytes@0x3ffde276ea8 311s | PRF symkey interface PRF AES_XCBC update symkey message-key@0x2aa37d11c70 (size 1000) 311s | PRF symkey interface: symkey message-key@0x2aa37d11c70 (1000-bytes, EXTRACT_KEY_FROM_KEY) 311s | symkey message extracting all 1000 bytes of key@0x2aa37d11c70 311s | symkey message: symkey-key@0x2aa37d11c70 (1000-bytes, EXTRACT_KEY_FROM_KEY) 311s | sizeof bytes 1008 311s | wrapper: (SECItemType)682: df ac 69 7d 3d 17 79 0e f9 70 cf fb 91 fc bb c2 df ac 69 7d 3d 17 79 0e f9 70 cf fb 91 fc bb c2 df ac 69 7d 3d 17 79 0e f9 70 cf fb 91 fc bb c2 df ac 69 7d 3d 17 79 0e f9 70 cf fb 91 fc bb c2 df ac 69 7d 3d 17 79 0e f9 70 cf fb 91 fc bb c2 df ac 69 7d 3d 17 79 0e f9 70 cf fb 91 fc bb c2 df ac 69 7d 3d 17 79 0e f9 70 cf fb 91 fc bb c2 df ac 69 7d 3d 17 79 0e f9 70 cf fb 91 fc bb c2 df ac 69 7d 3d 17 79 0e f9 70 cf fb 91 fc bb c2 df ac 69 7d 3d 17 79 0e f9 70 cf fb 91 fc bb c2 df ac 69 7d 3d 17 79 0e f9 70 cf fb 91 fc bb c2 df ac 69 7d 3d 17 79 0e f9 70 cf fb 91 fc bb c2 df ac 69 7d 3d 17 79 0e f9 70 cf fb 91 fc bb c2 df ac 69 7d 3d 17 79 0e f9 70 cf fb 91 fc bb c2 df ac 69 7d 3d 17 79 0e f9 70 cf fb 91 fc bb c2 df ac 69 7d 3d 17 79 0e f9 70 cf fb 91 fc bb c2 df ac 69 7d 3d 17 79 0e f9 70 cf fb 91 fc bb c2 df ac 69 7d 3d 17 79 0e f9 70 cf fb 91 fc bb c2 df ac 69 7d 3d 17 79 0e f9 70 cf fb 91 fc bb c2 df... 311s | symkey message extracted len 1008 bytes at 0x2aa37d12980 311s | unwrapped: 311s | 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................ 311s | 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................ 311s | 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................ 311s | 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................ 311s | 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................ 311s | 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................ 311s | 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................ 311s | 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................ 311s | 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................ 311s | 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................ 311s | 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................ 311s | 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................ 311s | 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................ 311s | 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................ 311s | 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................ 311s | 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................ 311s | 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................ 311s | 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................ 311s | 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................ 311s | 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................ 311s | 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................ 311s | 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................ 311s | 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................ 311s | 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................ 311s | 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................ 311s | 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................ 311s | 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................ 311s | 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................ 311s | 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................ 311s | 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................ 311s | 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................ 311s | 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................ 311s | 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................ 311s | 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................ 311s | 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................ 311s | 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................ 311s | 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................ 311s | 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................ 311s | 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................ 311s | 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................ 311s | 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................ 311s | 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................ 311s | 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................ 311s | 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................ 311s | 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................ 311s | 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................ 311s | 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................ 311s | 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................ 311s | 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................ 311s | 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................ 311s | 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................ 311s | 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................ 311s | 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................ 311s | 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................ 311s | 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................ 311s | 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................ 311s | 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................ 311s | 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................ 311s | 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................ 311s | 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................ 311s | 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................ 311s | 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................ 311s | 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................ 311s | XCBC: data 311s | 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................ 311s | 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................ 311s | 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................ 311s | 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................ 311s | 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................ 311s | 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................ 311s | 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................ 311s | 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................ 311s | 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................ 311s | 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................ 311s | 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................ 311s | 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................ 311s | 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................ 311s | 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................ 311s | 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................ 311s | 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................ 311s | 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................ 311s | 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................ 311s | 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................ 311s | 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................ 311s | 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................ 311s | 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................ 311s | 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................ 311s | 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................ 311s | 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................ 311s | 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................ 311s | 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................ 311s | 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................ 311s | 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................ 311s | 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................ 311s | 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................ 311s | 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................ 311s | 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................ 311s | 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................ 311s | 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................ 311s | 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................ 311s | 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................ 311s | 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................ 311s | 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................ 311s | 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................ 311s | 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................ 311s | 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................ 311s | 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................ 311s | 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................ 311s | 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................ 311s | 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................ 311s | 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................ 311s | 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................ 311s | 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................ 311s | 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................ 311s | 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................ 311s | 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................ 311s | 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................ 311s | 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................ 311s | 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................ 311s | 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................ 311s | 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................ 311s | 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................ 311s | 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................ 311s | 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................ 311s | 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................ 311s | 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................ 311s | 00 00 00 00 00 00 00 00 ........ 311s | K extracting all 16 bytes of key@0x2aa37d143f0 311s | K: symkey-key@0x2aa37d143f0 (16-bytes, AES_ECB) 311s | sizeof bytes 16 311s | wrapper: (SECItemType)1023: c1 d0 66 d7 06 cc e4 ce 8d f0 d0 b5 40 dd b6 e7 311s | K extracted len 16 bytes at 0x2aa37d13f20 311s | unwrapped: 311s | 00 01 02 03 04 05 06 07 08 09 0a 0b 0c 0d 0e 0f ................ 311s | XCBC: K: 311s | 00 01 02 03 04 05 06 07 08 09 0a 0b 0c 0d 0e 0f ................ 311s | XCBC: K1 311s | c3 52 80 57 54 23 7f 31 1a c0 ff f4 e3 e0 3e 78 .R.WT#.1......>x 311s | CONCATENATE_DATA_AND_BASE: 311s | target: EXTRACT_KEY_FROM_KEY 311s | base: base-key@0x2aa37d10350 (16-bytes, AES_KEY_GEN) 311s | params: 16-bytes@0x3ffde276c08 311s | key-offset: 0, key-size: 16 311s | EXTRACT_KEY_FROM_KEY: 311s | target: AES_ECB 311s | flags: SIGN 311s | key_size: 16-bytes 311s | base: base-key@0x2aa37d14750 (32-bytes, EXTRACT_KEY_FROM_KEY) 311s | operation: FLAGS_ONLY 311s | params: 8-bytes@0x3ffde276c10 311s | Computing E[63] using K3 311s | XCBC: K3 311s | c1 a7 ab a1 a2 3a 94 06 58 07 a0 8c c8 ee d0 6e .....:..X......n 311s | XCBC: E[n-1] 311s | 5c 88 af cc 1e 1e 83 fc c4 2c 0c e4 12 12 f5 17 \........,...... 311s | XCBC: M[n] 311s | 00 00 00 00 00 00 00 00 ........ 311s | XCBC: M[n] 311s | 00 00 00 00 00 00 00 00 ........ 311s | XCBC: M[n]:80...^E[n-1]^K3 311s | 9d 2f 04 6d bc 24 17 fa 1c 2b ac 68 da fc 25 79 ./.m.$...+.h..%y 311s | XCBC: MAC 311s | f0 da fe e8 95 db 30 25 37 61 10 3b 5d 84 52 8f ......0%7a.;].R. 311s | CONCATENATE_DATA_AND_BASE: 311s | target: EXTRACT_KEY_FROM_KEY 311s | base: base-key@0x2aa37d10350 (16-bytes, AES_KEY_GEN) 311s | params: 16-bytes@0x3ffde276e20 311s | key-offset: 0, key-size: 16 311s | EXTRACT_KEY_FROM_KEY: 311s | target: EXTRACT_KEY_FROM_KEY 311s | key_size: 16-bytes 311s | base: base-key@0x2aa37d14750 (32-bytes, EXTRACT_KEY_FROM_KEY) 311s | operation: FLAGS_ONLY 311s | params: 8-bytes@0x3ffde276d30 311s | PRF symkey interface PRF AES_XCBC final-key@0x2aa37d140b0 (size 16) 311s | PRF symkey interface: key-key@0x2aa37d140b0 (16-bytes, EXTRACT_KEY_FROM_KEY) 311s | output: symkey-key@0x2aa37d140b0 (16-bytes, EXTRACT_KEY_FROM_KEY) 311s | RFC 3566 Test Case 7: AES-XCBC-MAC-96 with 1000-byte input extracting all 16 bytes of key@0x2aa37d140b0 311s | RFC 3566 Test Case 7: AES-XCBC-MAC-96 with 1000-byte input: symkey-key@0x2aa37d140b0 (16-bytes, EXTRACT_KEY_FROM_KEY) 311s | sizeof bytes 16 311s | wrapper: (SECItemType)682: dd 32 3e fd 26 46 f8 c9 fc d3 51 69 1c 0d 3e eb 311s | RFC 3566 Test Case 7: AES-XCBC-MAC-96 with 1000-byte input extracted len 16 bytes at 0x2aa37d139a0 311s | unwrapped: 311s | f0 da fe e8 95 db 30 25 37 61 10 3b 5d 84 52 8f ......0%7a.;].R. 311s | verify_bytes() RFC 3566 Test Case 7: AES-XCBC-MAC-96 with 1000-byte input: symkey: ok 311s ipsec algparse: RFC 4434 Test Case AES-XCBC-PRF-128 with 20-byte input (key length 16) 311s | decode_to_chunk() test_prf_vector: input "0x000102030405060708090a0b0c0d0e0f" 311s | decode_to_chunk() output: 311s | 00 01 02 03 04 05 06 07 08 09 0a 0b 0c 0d 0e 0f ................ 311s | decode_to_chunk() test_prf_vector: input "0x000102030405060708090a0b0c0d0e0f10111213" 311s | decode_to_chunk() output: 311s | 00 01 02 03 04 05 06 07 08 09 0a 0b 0c 0d 0e 0f ................ 311s | 10 11 12 13 .... 311s | decode_to_chunk() test_prf_vector: input "0x47f51b4564966215b8985c63055ed308" 311s | decode_to_chunk() output: 311s | 47 f5 1b 45 64 96 62 15 b8 98 5c 63 05 5e d3 08 G..Ed.b...\c.^.. 311s | PRF chunk interface PRF AES_XCBC init key hunk 0x2aa37d13690 (length 16) 311s | 00 01 02 03 04 05 06 07 08 09 0a 0b 0c 0d 0e 0f ................ 311s | CONCATENATE_DATA_AND_BASE: 311s | target: EXTRACT_KEY_FROM_KEY 311s | base: base-key@0x2aa37d10350 (16-bytes, AES_KEY_GEN) 311s | params: 16-bytes@0x3ffde276e30 311s | key-offset: 0, key-size: 16 311s | EXTRACT_KEY_FROM_KEY: 311s | target: EXTRACT_KEY_FROM_KEY 311s | key_size: 16-bytes 311s | base: base-key@0x2aa37d13360 (32-bytes, EXTRACT_KEY_FROM_KEY) 311s | operation: FLAGS_ONLY 311s | params: 8-bytes@0x3ffde276d40 311s | XCBC: Key 16=16 just right 311s | key-offset: 0, key-size: 16 311s | EXTRACT_KEY_FROM_KEY: 311s | target: AES_ECB 311s | flags: SIGN 311s | key_size: 16-bytes 311s | base: base-key@0x2aa37d140b0 (16-bytes, EXTRACT_KEY_FROM_KEY) 311s | operation: FLAGS_ONLY 311s | params: 8-bytes@0x3ffde276cf0 311s | PRF chunk interface PRF AES_XCBC 0x2aa37d13d20 311s | PRF chunk interface PRF AES_XCBC update message (0x2aa37d11ba0 length 20) 311s | 00 01 02 03 04 05 06 07 08 09 0a 0b 0c 0d 0e 0f ................ 311s | 10 11 12 13 .... 311s | XCBC: data 311s | 00 01 02 03 04 05 06 07 08 09 0a 0b 0c 0d 0e 0f ................ 311s | 10 11 12 13 .... 311s | K extracting all 16 bytes of key@0x2aa37d13360 311s | K: symkey-key@0x2aa37d13360 (16-bytes, AES_ECB) 311s | sizeof bytes 16 311s | wrapper: (SECItemType)1111695477: c1 d0 66 d7 06 cc e4 ce 8d f0 d0 b5 40 dd b6 e7 311s | K extracted len 16 bytes at 0x2aa37d14730 311s | unwrapped: 311s | 00 01 02 03 04 05 06 07 08 09 0a 0b 0c 0d 0e 0f ................ 311s | XCBC: K: 311s | 00 01 02 03 04 05 06 07 08 09 0a 0b 0c 0d 0e 0f ................ 311s | XCBC: K1 311s | c3 52 80 57 54 23 7f 31 1a c0 ff f4 e3 e0 3e 78 .R.WT#.1......>x 311s | CONCATENATE_DATA_AND_BASE: 311s | target: EXTRACT_KEY_FROM_KEY 311s | base: base-key@0x2aa37d10350 (16-bytes, AES_KEY_GEN) 311s | params: 16-bytes@0x3ffde276bc8 311s | key-offset: 0, key-size: 16 311s | EXTRACT_KEY_FROM_KEY: 311s | target: AES_ECB 311s | flags: SIGN 311s | key_size: 16-bytes 311s | base: base-key@0x2aa37d11c70 (32-bytes, EXTRACT_KEY_FROM_KEY) 311s | operation: FLAGS_ONLY 311s | params: 8-bytes@0x3ffde276bd0 311s | Computing E[2] using K3 311s | XCBC: K3 311s | c1 a7 ab a1 a2 3a 94 06 58 07 a0 8c c8 ee d0 6e .....:..X......n 311s | XCBC: E[n-1] 311s | 1d 04 48 fa cf 4d 9c 6f 55 b9 93 da 09 80 3d b3 ..H..M.oU.....=. 311s | XCBC: M[n] 311s | 10 11 12 13 .... 311s | XCBC: M[n] 311s | 10 11 12 13 .... 311s | XCBC: M[n]:80...^E[n-1]^K3 311s | cc b2 f1 48 ed 77 08 69 0d be 33 56 c1 6e ed dd ...H.w.i..3V.n.. 311s | XCBC: MAC 311s | 47 f5 1b 45 64 96 62 15 b8 98 5c 63 05 5e d3 08 G..Ed.b...\c.^.. 311s | PRF chunk interface PRF AES_XCBC final length 16 311s | 47 f5 1b 45 64 96 62 15 b8 98 5c 63 05 5e d3 08 G..Ed.b...\c.^.. 311s | chunk output 311s | 47 f5 1b 45 64 96 62 15 b8 98 5c 63 05 5e d3 08 G..Ed.b...\c.^.. 311s | verify_bytes() RFC 4434 Test Case AES-XCBC-PRF-128 with 20-byte input (key length 16): prf OUT: ok 311s | CONCATENATE_DATA_AND_BASE: 311s | target: EXTRACT_KEY_FROM_KEY 311s | base: base-key@0x2aa37d10350 (16-bytes, AES_KEY_GEN) 311s | params: 16-bytes@0x3ffde276f98 311s | key-offset: 0, key-size: 16 311s | EXTRACT_KEY_FROM_KEY: 311s | target: EXTRACT_KEY_FROM_KEY 311s | key_size: 16-bytes 311s | base: base-key@0x2aa37d140b0 (32-bytes, EXTRACT_KEY_FROM_KEY) 311s | operation: FLAGS_ONLY 311s | params: 8-bytes@0x3ffde276ea8 311s | PRF symkey interface PRF AES_XCBC init key symkey-key@0x2aa37d13360 (size 16) 311s | PRF symkey interface: key symkey-key@0x2aa37d13360 (16-bytes, EXTRACT_KEY_FROM_KEY) 311s | XCBC: Key 16=16 just right 311s | key-offset: 0, key-size: 16 311s | EXTRACT_KEY_FROM_KEY: 311s | target: AES_ECB 311s | flags: SIGN 311s | key_size: 16-bytes 311s | base: base-key@0x2aa37d13360 (16-bytes, EXTRACT_KEY_FROM_KEY) 311s | operation: FLAGS_ONLY 311s | params: 8-bytes@0x3ffde276db0 311s | PRF symkey interface PRF AES_XCBC 0x2aa37d13d20 311s | CONCATENATE_DATA_AND_BASE: 311s | target: EXTRACT_KEY_FROM_KEY 311s | base: base-key@0x2aa37d10350 (16-bytes, AES_KEY_GEN) 311s | params: 16-bytes@0x3ffde276f98 311s | key-offset: 0, key-size: 20 311s | EXTRACT_KEY_FROM_KEY: 311s | target: EXTRACT_KEY_FROM_KEY 311s | key_size: 20-bytes 311s | base: base-key@0x2aa37d143f0 (36-bytes, EXTRACT_KEY_FROM_KEY) 311s | operation: FLAGS_ONLY 311s | params: 8-bytes@0x3ffde276ea8 311s | PRF symkey interface PRF AES_XCBC update symkey message-key@0x2aa37d11c70 (size 20) 311s | PRF symkey interface: symkey message-key@0x2aa37d11c70 (20-bytes, EXTRACT_KEY_FROM_KEY) 311s | symkey message extracting all 20 bytes of key@0x2aa37d11c70 311s | symkey message: symkey-key@0x2aa37d11c70 (20-bytes, EXTRACT_KEY_FROM_KEY) 311s | sizeof bytes 32 311s | wrapper: (SECItemType)682: c1 d0 66 d7 06 cc e4 ce 8d f0 d0 b5 40 dd b6 e7 9e 2b a1 19 a7 d7 d8 30 d7 a6 4e 34 73 b5 6b 9b 311s | symkey message extracted len 32 bytes at 0x2aa37d102f0 311s | unwrapped: 311s | 00 01 02 03 04 05 06 07 08 09 0a 0b 0c 0d 0e 0f ................ 311s | 10 11 12 13 00 00 00 00 00 00 00 00 00 00 00 00 ................ 311s | XCBC: data 311s | 00 01 02 03 04 05 06 07 08 09 0a 0b 0c 0d 0e 0f ................ 311s | 10 11 12 13 .... 311s | K extracting all 16 bytes of key@0x2aa37d140b0 311s | K: symkey-key@0x2aa37d140b0 (16-bytes, AES_ECB) 311s | sizeof bytes 16 311s | wrapper: (SECItemType)1023: c1 d0 66 d7 06 cc e4 ce 8d f0 d0 b5 40 dd b6 e7 311s | K extracted len 16 bytes at 0x2aa37d10220 311s | unwrapped: 311s | 00 01 02 03 04 05 06 07 08 09 0a 0b 0c 0d 0e 0f ................ 311s | XCBC: K: 311s | 00 01 02 03 04 05 06 07 08 09 0a 0b 0c 0d 0e 0f ................ 311s | XCBC: K1 311s | c3 52 80 57 54 23 7f 31 1a c0 ff f4 e3 e0 3e 78 .R.WT#.1......>x 311s | CONCATENATE_DATA_AND_BASE: 311s | target: EXTRACT_KEY_FROM_KEY 311s | base: base-key@0x2aa37d10350 (16-bytes, AES_KEY_GEN) 311s | params: 16-bytes@0x3ffde276c08 311s | key-offset: 0, key-size: 16 311s | EXTRACT_KEY_FROM_KEY: 311s | target: AES_ECB 311s | flags: SIGN 311s | key_size: 16-bytes 311s | base: base-key@0x2aa37d14750 (32-bytes, EXTRACT_KEY_FROM_KEY) 311s | operation: FLAGS_ONLY 311s | params: 8-bytes@0x3ffde276c10 311s | Computing E[2] using K3 311s | XCBC: K3 311s | c1 a7 ab a1 a2 3a 94 06 58 07 a0 8c c8 ee d0 6e .....:..X......n 311s | XCBC: E[n-1] 311s | 1d 04 48 fa cf 4d 9c 6f 55 b9 93 da 09 80 3d b3 ..H..M.oU.....=. 311s | XCBC: M[n] 311s | 10 11 12 13 .... 311s | XCBC: M[n] 311s | 10 11 12 13 .... 311s | XCBC: M[n]:80...^E[n-1]^K3 311s | cc b2 f1 48 ed 77 08 69 0d be 33 56 c1 6e ed dd ...H.w.i..3V.n.. 311s | XCBC: MAC 311s | 47 f5 1b 45 64 96 62 15 b8 98 5c 63 05 5e d3 08 G..Ed.b...\c.^.. 311s | CONCATENATE_DATA_AND_BASE: 311s | target: EXTRACT_KEY_FROM_KEY 311s | base: base-key@0x2aa37d10350 (16-bytes, AES_KEY_GEN) 311s | params: 16-bytes@0x3ffde276e20 311s | key-offset: 0, key-size: 16 311s | EXTRACT_KEY_FROM_KEY: 311s | target: EXTRACT_KEY_FROM_KEY 311s | key_size: 16-bytes 311s | base: base-key@0x2aa37d14750 (32-bytes, EXTRACT_KEY_FROM_KEY) 311s | operation: FLAGS_ONLY 311s | params: 8-bytes@0x3ffde276d30 311s | PRF symkey interface PRF AES_XCBC final-key@0x2aa37d143f0 (size 16) 311s | PRF symkey interface: key-key@0x2aa37d143f0 (16-bytes, EXTRACT_KEY_FROM_KEY) 311s | output: symkey-key@0x2aa37d143f0 (16-bytes, EXTRACT_KEY_FROM_KEY) 311s | RFC 4434 Test Case AES-XCBC-PRF-128 with 20-byte input (key length 16) extracting all 16 bytes of key@0x2aa37d143f0 311s | RFC 4434 Test Case AES-XCBC-PRF-128 with 20-byte input (key length 16): symkey-key@0x2aa37d143f0 (16-bytes, EXTRACT_KEY_FROM_KEY) 311s | sizeof bytes 16 311s | wrapper: (SECItemType)682: e1 0b 48 f7 89 33 5f 3b fc 2a 1e 1b 36 af d1 30 311s | RFC 4434 Test Case AES-XCBC-PRF-128 with 20-byte input (key length 16) extracted len 16 bytes at 0x2aa37d10220 311s | unwrapped: 311s | 47 f5 1b 45 64 96 62 15 b8 98 5c 63 05 5e d3 08 G..Ed.b...\c.^.. 311s | verify_bytes() RFC 4434 Test Case AES-XCBC-PRF-128 with 20-byte input (key length 16): symkey: ok 311s ipsec algparse: RFC 4434 Test Case AES-XCBC-PRF-128 with 20-byte input (key length 10) 311s | decode_to_chunk() test_prf_vector: input "0x00010203040506070809" 311s | decode_to_chunk() output: 311s | 00 01 02 03 04 05 06 07 08 09 .......... 311s | decode_to_chunk() test_prf_vector: input "0x000102030405060708090a0b0c0d0e0f10111213" 311s | decode_to_chunk() output: 311s | 00 01 02 03 04 05 06 07 08 09 0a 0b 0c 0d 0e 0f ................ 311s | 10 11 12 13 .... 311s | decode_to_chunk() test_prf_vector: input "0x0fa087af7d866e7653434e602fdde835" 311s | decode_to_chunk() output: 311s | 0f a0 87 af 7d 86 6e 76 53 43 4e 60 2f dd e8 35 ....}.nvSCN`/..5 311s | PRF chunk interface PRF AES_XCBC init key hunk 0x2aa37d13690 (length 10) 311s | 00 01 02 03 04 05 06 07 08 09 .......... 311s | CONCATENATE_DATA_AND_BASE: 311s | target: EXTRACT_KEY_FROM_KEY 311s | base: base-key@0x2aa37d10350 (16-bytes, AES_KEY_GEN) 311s | params: 16-bytes@0x3ffde276e30 311s | key-offset: 0, key-size: 10 311s | EXTRACT_KEY_FROM_KEY: 311s | target: EXTRACT_KEY_FROM_KEY 311s | key_size: 10-bytes 311s | base: base-key@0x2aa37d13360 (26-bytes, EXTRACT_KEY_FROM_KEY) 311s | operation: FLAGS_ONLY 311s | params: 8-bytes@0x3ffde276d40 311s | XCBC: Key 10<16 too small, padding with zeros 311s | CONCATENATE_BASE_AND_DATA: 311s | target: EXTRACT_KEY_FROM_KEY 311s | base: base-key@0x2aa37d143f0 (10-bytes, EXTRACT_KEY_FROM_KEY) 311s | params: 16-bytes@0x3ffde276cf0 311s | key-offset: 0, key-size: 16 311s | EXTRACT_KEY_FROM_KEY: 311s | target: AES_ECB 311s | flags: SIGN 311s | key_size: 16-bytes 311s | base: base-key@0x2aa37d13360 (16-bytes, EXTRACT_KEY_FROM_KEY) 311s | operation: FLAGS_ONLY 311s | params: 8-bytes@0x3ffde276cf0 311s | PRF chunk interface PRF AES_XCBC 0x2aa37d13d20 311s | PRF chunk interface PRF AES_XCBC update message (0x2aa37d11ba0 length 20) 311s | 00 01 02 03 04 05 06 07 08 09 0a 0b 0c 0d 0e 0f ................ 311s | 10 11 12 13 .... 311s | XCBC: data 311s | 00 01 02 03 04 05 06 07 08 09 0a 0b 0c 0d 0e 0f ................ 311s | 10 11 12 13 .... 311s | K extracting all 16 bytes of key@0x2aa37d11c70 311s | K: symkey-key@0x2aa37d11c70 (16-bytes, AES_ECB) 311s | sizeof bytes 16 311s | wrapper: (SECItemType)1111695477: 8f 61 b3 6e 65 70 b1 73 c8 84 b7 f5 1f 0e 45 98 311s | K extracted len 16 bytes at 0x2aa37d136b0 311s | unwrapped: 311s | 00 01 02 03 04 05 06 07 08 09 00 00 00 00 00 00 ................ 311s | XCBC: K: 311s | 00 01 02 03 04 05 06 07 08 09 00 00 00 00 00 00 ................ 311s | XCBC: K1 311s | 50 ca b2 4d 03 34 45 5e 40 7b 25 0f dd 7c f8 d5 P..M.4E^@{%..|.. 311s | CONCATENATE_DATA_AND_BASE: 311s | target: EXTRACT_KEY_FROM_KEY 311s | base: base-key@0x2aa37d10350 (16-bytes, AES_KEY_GEN) 311s | params: 16-bytes@0x3ffde276bc8 311s | key-offset: 0, key-size: 16 311s | EXTRACT_KEY_FROM_KEY: 311s | target: AES_ECB 311s | flags: SIGN 311s | key_size: 16-bytes 311s | base: base-key@0x2aa37d13360 (32-bytes, EXTRACT_KEY_FROM_KEY) 311s | operation: FLAGS_ONLY 311s | params: 8-bytes@0x3ffde276bd0 311s | Computing E[2] using K3 311s | XCBC: K3 311s | 8e f7 48 db 56 f1 f7 26 24 72 f2 c5 63 b0 3f 88 ..H.V..&$r..c.?. 311s | XCBC: E[n-1] 311s | fe 1f 63 e9 65 1a 4b bb 3c cc cd 0d cc 83 e4 30 ..c.e.K.<......0 311s | XCBC: M[n] 311s | 10 11 12 13 .... 311s | XCBC: M[n] 311s | 10 11 12 13 .... 311s | XCBC: M[n]:80...^E[n-1]^K3 311s | 60 f9 39 21 b3 eb bc 9d 18 be 3f c8 af 33 db b8 `.9!......?..3.. 311s | XCBC: MAC 311s | 0f a0 87 af 7d 86 6e 76 53 43 4e 60 2f dd e8 35 ....}.nvSCN`/..5 311s | PRF chunk interface PRF AES_XCBC final length 16 311s | 0f a0 87 af 7d 86 6e 76 53 43 4e 60 2f dd e8 35 ....}.nvSCN`/..5 311s | chunk output 311s | 0f a0 87 af 7d 86 6e 76 53 43 4e 60 2f dd e8 35 ....}.nvSCN`/..5 311s | verify_bytes() RFC 4434 Test Case AES-XCBC-PRF-128 with 20-byte input (key length 10): prf OUT: ok 311s | CONCATENATE_DATA_AND_BASE: 311s | target: EXTRACT_KEY_FROM_KEY 311s | base: base-key@0x2aa37d10350 (16-bytes, AES_KEY_GEN) 311s | params: 16-bytes@0x3ffde276f98 311s | key-offset: 0, key-size: 10 311s | EXTRACT_KEY_FROM_KEY: 311s | target: EXTRACT_KEY_FROM_KEY 311s | key_size: 10-bytes 311s | base: base-key@0x2aa37d143f0 (26-bytes, EXTRACT_KEY_FROM_KEY) 311s | operation: FLAGS_ONLY 311s | params: 8-bytes@0x3ffde276ea8 311s | PRF symkey interface PRF AES_XCBC init key symkey-key@0x2aa37d11c70 (size 10) 311s | PRF symkey interface: key symkey-key@0x2aa37d11c70 (10-bytes, EXTRACT_KEY_FROM_KEY) 311s | XCBC: Key 10<16 too small, padding with zeros 311s | CONCATENATE_BASE_AND_DATA: 311s | target: EXTRACT_KEY_FROM_KEY 311s | base: base-key@0x2aa37d11c70 (10-bytes, EXTRACT_KEY_FROM_KEY) 311s | params: 16-bytes@0x3ffde276db0 311s | key-offset: 0, key-size: 16 311s | EXTRACT_KEY_FROM_KEY: 311s | target: AES_ECB 311s | flags: SIGN 311s | key_size: 16-bytes 311s | base: base-key@0x2aa37d143f0 (16-bytes, EXTRACT_KEY_FROM_KEY) 311s | operation: FLAGS_ONLY 311s | params: 8-bytes@0x3ffde276db0 311s | PRF symkey interface PRF AES_XCBC 0x2aa37d13d20 311s | CONCATENATE_DATA_AND_BASE: 311s | target: EXTRACT_KEY_FROM_KEY 311s | base: base-key@0x2aa37d10350 (16-bytes, AES_KEY_GEN) 311s | params: 16-bytes@0x3ffde276f98 311s | key-offset: 0, key-size: 20 311s | EXTRACT_KEY_FROM_KEY: 311s | target: EXTRACT_KEY_FROM_KEY 311s | key_size: 20-bytes 311s | base: base-key@0x2aa37d140b0 (36-bytes, EXTRACT_KEY_FROM_KEY) 311s | operation: FLAGS_ONLY 311s | params: 8-bytes@0x3ffde276ea8 311s | PRF symkey interface PRF AES_XCBC update symkey message-key@0x2aa37d143f0 (size 20) 311s | PRF symkey interface: symkey message-key@0x2aa37d143f0 (20-bytes, EXTRACT_KEY_FROM_KEY) 311s | symkey message extracting all 20 bytes of key@0x2aa37d143f0 311s | symkey message: symkey-key@0x2aa37d143f0 (20-bytes, EXTRACT_KEY_FROM_KEY) 311s | sizeof bytes 32 311s | wrapper: (SECItemType)682: c1 d0 66 d7 06 cc e4 ce 8d f0 d0 b5 40 dd b6 e7 9e 2b a1 19 a7 d7 d8 30 d7 a6 4e 34 73 b5 6b 9b 311s | symkey message extracted len 32 bytes at 0x2aa37d10320 311s | unwrapped: 311s | 00 01 02 03 04 05 06 07 08 09 0a 0b 0c 0d 0e 0f ................ 311s | 10 11 12 13 00 00 00 00 00 00 00 00 00 00 00 00 ................ 311s | XCBC: data 311s | 00 01 02 03 04 05 06 07 08 09 0a 0b 0c 0d 0e 0f ................ 311s | 10 11 12 13 .... 311s | K extracting all 16 bytes of key@0x2aa37d13360 311s | K: symkey-key@0x2aa37d13360 (16-bytes, AES_ECB) 311s | sizeof bytes 16 311s | wrapper: (SECItemType)1023: 8f 61 b3 6e 65 70 b1 73 c8 84 b7 f5 1f 0e 45 98 311s | K extracted len 16 bytes at 0x2aa37d14090 311s | unwrapped: 311s | 00 01 02 03 04 05 06 07 08 09 00 00 00 00 00 00 ................ 311s | XCBC: K: 311s | 00 01 02 03 04 05 06 07 08 09 00 00 00 00 00 00 ................ 311s | XCBC: K1 311s | 50 ca b2 4d 03 34 45 5e 40 7b 25 0f dd 7c f8 d5 P..M.4E^@{%..|.. 311s | CONCATENATE_DATA_AND_BASE: 311s | target: EXTRACT_KEY_FROM_KEY 311s | base: base-key@0x2aa37d10350 (16-bytes, AES_KEY_GEN) 311s | params: 16-bytes@0x3ffde276c08 311s | key-offset: 0, key-size: 16 311s | EXTRACT_KEY_FROM_KEY: 311s | target: AES_ECB 311s | flags: SIGN 311s | key_size: 16-bytes 311s | base: base-key@0x2aa37d14750 (32-bytes, EXTRACT_KEY_FROM_KEY) 311s | operation: FLAGS_ONLY 311s | params: 8-bytes@0x3ffde276c10 311s | Computing E[2] using K3 311s | XCBC: K3 311s | 8e f7 48 db 56 f1 f7 26 24 72 f2 c5 63 b0 3f 88 ..H.V..&$r..c.?. 311s | XCBC: E[n-1] 311s | fe 1f 63 e9 65 1a 4b bb 3c cc cd 0d cc 83 e4 30 ..c.e.K.<......0 311s | XCBC: M[n] 311s | 10 11 12 13 .... 311s | XCBC: M[n] 311s | 10 11 12 13 .... 311s | XCBC: M[n]:80...^E[n-1]^K3 311s | 60 f9 39 21 b3 eb bc 9d 18 be 3f c8 af 33 db b8 `.9!......?..3.. 311s | XCBC: MAC 311s | 0f a0 87 af 7d 86 6e 76 53 43 4e 60 2f dd e8 35 ....}.nvSCN`/..5 311s | CONCATENATE_DATA_AND_BASE: 311s | target: EXTRACT_KEY_FROM_KEY 311s | base: base-key@0x2aa37d10350 (16-bytes, AES_KEY_GEN) 311s | params: 16-bytes@0x3ffde276e20 311s | key-offset: 0, key-size: 16 311s | EXTRACT_KEY_FROM_KEY: 311s | target: EXTRACT_KEY_FROM_KEY 311s | key_size: 16-bytes 311s | base: base-key@0x2aa37d14750 (32-bytes, EXTRACT_KEY_FROM_KEY) 311s | operation: FLAGS_ONLY 311s | params: 8-bytes@0x3ffde276d30 311s | PRF symkey interface PRF AES_XCBC final-key@0x2aa37d140b0 (size 16) 311s | PRF symkey interface: key-key@0x2aa37d140b0 (16-bytes, EXTRACT_KEY_FROM_KEY) 311s | output: symkey-key@0x2aa37d140b0 (16-bytes, EXTRACT_KEY_FROM_KEY) 311s | RFC 4434 Test Case AES-XCBC-PRF-128 with 20-byte input (key length 10) extracting all 16 bytes of key@0x2aa37d140b0 311s | RFC 4434 Test Case AES-XCBC-PRF-128 with 20-byte input (key length 10): symkey-key@0x2aa37d140b0 (16-bytes, EXTRACT_KEY_FROM_KEY) 311s | sizeof bytes 16 311s | wrapper: (SECItemType)682: 36 a4 6f 7c 75 be 3e 60 a4 b0 c8 25 08 d7 47 3e 311s | RFC 4434 Test Case AES-XCBC-PRF-128 with 20-byte input (key length 10) extracted len 16 bytes at 0x2aa37d14090 311s | unwrapped: 311s | 0f a0 87 af 7d 86 6e 76 53 43 4e 60 2f dd e8 35 ....}.nvSCN`/..5 311s | verify_bytes() RFC 4434 Test Case AES-XCBC-PRF-128 with 20-byte input (key length 10): symkey: ok 311s ipsec algparse: RFC 4434 Test Case AES-XCBC-PRF-128 with 20-byte input (key length 18) 311s | decode_to_chunk() test_prf_vector: input "0x000102030405060708090a0b0c0d0e0fedcb" 311s | decode_to_chunk() output: 311s | 00 01 02 03 04 05 06 07 08 09 0a 0b 0c 0d 0e 0f ................ 311s | ed cb .. 311s | decode_to_chunk() test_prf_vector: input "0x000102030405060708090a0b0c0d0e0f10111213" 311s | decode_to_chunk() output: 311s | 00 01 02 03 04 05 06 07 08 09 0a 0b 0c 0d 0e 0f ................ 311s | 10 11 12 13 .... 311s | decode_to_chunk() test_prf_vector: input "0x8cd3c93ae598a9803006ffb67c40e9e4" 311s | decode_to_chunk() output: 311s | 8c d3 c9 3a e5 98 a9 80 30 06 ff b6 7c 40 e9 e4 ...:....0...|@.. 311s | PRF chunk interface PRF AES_XCBC init key hunk 0x2aa37d13690 (length 18) 311s | 00 01 02 03 04 05 06 07 08 09 0a 0b 0c 0d 0e 0f ................ 311s | ed cb .. 311s | CONCATENATE_DATA_AND_BASE: 311s | target: EXTRACT_KEY_FROM_KEY 311s | base: base-key@0x2aa37d10350 (16-bytes, AES_KEY_GEN) 311s | params: 16-bytes@0x3ffde276e30 311s | key-offset: 0, key-size: 18 311s | EXTRACT_KEY_FROM_KEY: 311s | target: EXTRACT_KEY_FROM_KEY 311s | key_size: 18-bytes 311s | base: base-key@0x2aa37d11c70 (34-bytes, EXTRACT_KEY_FROM_KEY) 311s | operation: FLAGS_ONLY 311s | params: 8-bytes@0x3ffde276d40 311s | XCBC: Key 18>16 too big, rehashing to size 311s | CONCATENATE_DATA_AND_BASE: 311s | target: EXTRACT_KEY_FROM_KEY 311s | base: base-key@0x2aa37d10350 (16-bytes, AES_KEY_GEN) 311s | params: 16-bytes@0x3ffde276c38 311s | key-offset: 0, key-size: 16 311s | EXTRACT_KEY_FROM_KEY: 311s | target: AES_ECB 311s | flags: SIGN 311s | key_size: 16-bytes 311s | base: base-key@0x2aa37d143f0 (32-bytes, EXTRACT_KEY_FROM_KEY) 311s | operation: FLAGS_ONLY 311s | params: 8-bytes@0x3ffde276c40 311s | draft_chunk extracting all 18 bytes of key@0x2aa37d140b0 311s | draft_chunk: symkey-key@0x2aa37d140b0 (18-bytes, EXTRACT_KEY_FROM_KEY) 311s | sizeof bytes 32 311s | wrapper: (SECItemType)682: c1 d0 66 d7 06 cc e4 ce 8d f0 d0 b5 40 dd b6 e7 4c 8c 27 cd 79 8f 98 74 0d 4c b1 57 36 47 a4 50 311s | draft_chunk extracted len 32 bytes at 0x2aa37d10320 311s | unwrapped: 311s | 00 01 02 03 04 05 06 07 08 09 0a 0b 0c 0d 0e 0f ................ 311s | ed cb 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................ 311s | XCBC: data 311s | 00 01 02 03 04 05 06 07 08 09 0a 0b 0c 0d 0e 0f ................ 311s | ed cb .. 311s | K extracting all 16 bytes of key@0x2aa37d11c70 311s | K: symkey-key@0x2aa37d11c70 (16-bytes, AES_ECB) 311s | sizeof bytes 16 311s | wrapper: (SECItemType)1023: df ac 69 7d 3d 17 79 0e f9 70 cf fb 91 fc bb c2 311s | K extracted len 16 bytes at 0x2aa37d14730 311s | unwrapped: 311s | 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................ 311s | XCBC: K: 311s | 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................ 311s | XCBC: K1 311s | e1 4d 5d 0e e2 77 15 df 08 b4 15 2b a2 3d a8 e0 .M]..w.....+.=.. 311s | CONCATENATE_DATA_AND_BASE: 311s | target: EXTRACT_KEY_FROM_KEY 311s | base: base-key@0x2aa37d10350 (16-bytes, AES_KEY_GEN) 311s | params: 16-bytes@0x3ffde276ad8 311s | key-offset: 0, key-size: 16 311s | EXTRACT_KEY_FROM_KEY: 311s | target: AES_ECB 311s | flags: SIGN 311s | key_size: 16-bytes 311s | base: base-key@0x2aa37d13360 (32-bytes, EXTRACT_KEY_FROM_KEY) 311s | operation: FLAGS_ONLY 311s | params: 8-bytes@0x3ffde276ae0 311s | Computing E[2] using K3 311s | XCBC: K3 311s | 8d 34 ef cb 3b d5 45 ca 06 2a ec df ef 7c 0b fa .4..;.E..*...|.. 311s | XCBC: E[n-1] 311s | 0b 72 b2 ae 0a 37 79 81 75 6a d5 9c 79 c0 e6 96 .r...7y.uj..y... 311s | XCBC: M[n] 311s | ed cb .. 311s | XCBC: M[n] 311s | ed cb .. 311s | XCBC: M[n]:80...^E[n-1]^K3 311s | 6b 8d dd 65 31 e2 3c 4b 73 40 39 43 96 bc ed 6c k..e1.16 too big, rehashing to size 311s | CONCATENATE_DATA_AND_BASE: 311s | target: EXTRACT_KEY_FROM_KEY 311s | base: base-key@0x2aa37d10350 (16-bytes, AES_KEY_GEN) 311s | params: 16-bytes@0x3ffde276cf8 311s | key-offset: 0, key-size: 16 311s | EXTRACT_KEY_FROM_KEY: 311s | target: AES_ECB 311s | flags: SIGN 311s | key_size: 16-bytes 311s | base: base-key@0x2aa37d11c70 (32-bytes, EXTRACT_KEY_FROM_KEY) 311s | operation: FLAGS_ONLY 311s | params: 8-bytes@0x3ffde276d00 311s | draft_chunk extracting all 18 bytes of key@0x2aa37d143f0 311s | draft_chunk: symkey-key@0x2aa37d143f0 (18-bytes, EXTRACT_KEY_FROM_KEY) 311s | sizeof bytes 32 311s | wrapper: siBuffer: c1 d0 66 d7 06 cc e4 ce 8d f0 d0 b5 40 dd b6 e7 4c 8c 27 cd 79 8f 98 74 0d 4c b1 57 36 47 a4 50 311s | draft_chunk extracted len 32 bytes at 0x2aa37d13d20 311s | unwrapped: 311s | 00 01 02 03 04 05 06 07 08 09 0a 0b 0c 0d 0e 0f ................ 311s | ed cb 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................ 311s | XCBC: data 311s | 00 01 02 03 04 05 06 07 08 09 0a 0b 0c 0d 0e 0f ................ 311s | ed cb .. 311s | K extracting all 16 bytes of key@0x2aa37d140b0 311s | K: symkey-key@0x2aa37d140b0 (16-bytes, AES_ECB) 311s | sizeof bytes 16 311s | wrapper: (SECItemType)1023: df ac 69 7d 3d 17 79 0e f9 70 cf fb 91 fc bb c2 311s | K extracted len 16 bytes at 0x2aa37d13590 311s | unwrapped: 311s | 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................ 311s | XCBC: K: 311s | 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................ 311s | XCBC: K1 311s | e1 4d 5d 0e e2 77 15 df 08 b4 15 2b a2 3d a8 e0 .M]..w.....+.=.. 311s | CONCATENATE_DATA_AND_BASE: 311s | target: EXTRACT_KEY_FROM_KEY 311s | base: base-key@0x2aa37d10350 (16-bytes, AES_KEY_GEN) 311s | params: 16-bytes@0x3ffde276b98 311s | key-offset: 0, key-size: 16 311s | EXTRACT_KEY_FROM_KEY: 311s | target: AES_ECB 311s | flags: SIGN 311s | key_size: 16-bytes 311s | base: base-key@0x2aa37d13360 (32-bytes, EXTRACT_KEY_FROM_KEY) 311s | operation: FLAGS_ONLY 311s | params: 8-bytes@0x3ffde276ba0 311s | Computing E[2] using K3 311s | XCBC: K3 311s | 8d 34 ef cb 3b d5 45 ca 06 2a ec df ef 7c 0b fa .4..;.E..*...|.. 311s | XCBC: E[n-1] 311s | 0b 72 b2 ae 0a 37 79 81 75 6a d5 9c 79 c0 e6 96 .r...7y.uj..y... 311s | XCBC: M[n] 311s | ed cb .. 311s | XCBC: M[n] 311s | ed cb .. 311s | XCBC: M[n]:80...^E[n-1]^K3 311s | 6b 8d dd 65 31 e2 3c 4b 73 40 39 43 96 bc ed 6c k..e1.j.....n1.].8 311s | PRF chunk interface PRF HMAC_MD5 init key hunk 0x2aa37d11ba0 (length 4) 311s | 4a 65 66 65 Jefe 311s | CONCATENATE_DATA_AND_BASE: 311s | target: EXTRACT_KEY_FROM_KEY 311s | base: base-key@0x2aa37d10350 (16-bytes, AES_KEY_GEN) 311s | params: 16-bytes@0x3ffde276d70 311s | key-offset: 0, key-size: 4 311s | EXTRACT_KEY_FROM_KEY: 311s | target: MD5_HMAC 311s | flags: SIGN 311s | key_size: 4-bytes 311s | base: base-key@0x2aa37d13360 (20-bytes, EXTRACT_KEY_FROM_KEY) 311s | operation: FLAGS_ONLY 311s | params: 8-bytes@0x3ffde276d78 311s | PRF chunk interface prf: created HMAC_MD5 context 0x2aa37d136d0 from key-key@0x2aa37d143f0 311s | PRF chunk interface prf: begin HMAC_MD5 with context 0x2aa37d136d0 from key-key@0x2aa37d143f0 311s | PRF chunk interface PRF HMAC_MD5 0x2aa37d13db0 311s | PRF chunk interface PRF HMAC_MD5 update message (0x2aa37d13d20 length 28) 311s | 77 68 61 74 20 64 6f 20 79 61 20 77 61 6e 74 20 what do ya want 311s | 66 6f 72 20 6e 6f 74 68 69 6e 67 3f for nothing? 311s | PRF chunk interface PRF HMAC_MD5 final length 16 311s | 75 0c 78 3e 6a b0 b5 03 ea a8 6e 31 0a 5d b7 38 u.x>j.....n1.].8 311s | chunk output 311s | 75 0c 78 3e 6a b0 b5 03 ea a8 6e 31 0a 5d b7 38 u.x>j.....n1.].8 311s | verify_bytes() RFC 2104: MD5_HMAC test 2: prf OUT: ok 311s | CONCATENATE_DATA_AND_BASE: 311s | target: EXTRACT_KEY_FROM_KEY 311s | base: base-key@0x2aa37d10350 (16-bytes, AES_KEY_GEN) 311s | params: 16-bytes@0x3ffde276f98 311s | key-offset: 0, key-size: 4 311s | EXTRACT_KEY_FROM_KEY: 311s | target: EXTRACT_KEY_FROM_KEY 311s | key_size: 4-bytes 311s | base: base-key@0x2aa37d13360 (20-bytes, EXTRACT_KEY_FROM_KEY) 311s | operation: FLAGS_ONLY 311s | params: 8-bytes@0x3ffde276ea8 311s | PRF symkey interface PRF HMAC_MD5 init key symkey-key@0x2aa37d143f0 (size 4) 311s | PRF symkey interface: key symkey-key@0x2aa37d143f0 (4-bytes, EXTRACT_KEY_FROM_KEY) 311s | key-offset: 0, key-size: 4 311s | EXTRACT_KEY_FROM_KEY: 311s | target: MD5_HMAC 311s | flags: SIGN 311s | key_size: 4-bytes 311s | base: base-key@0x2aa37d143f0 (4-bytes, EXTRACT_KEY_FROM_KEY) 311s | operation: FLAGS_ONLY 311s | params: 8-bytes@0x3ffde276e30 311s | PRF symkey interface prf: created HMAC_MD5 context 0x2aa37d14890 from key symkey-key@0x2aa37d13360 311s | PRF symkey interface prf: begin HMAC_MD5 with context 0x2aa37d14890 from key symkey-key@0x2aa37d13360 311s | PRF symkey interface PRF HMAC_MD5 0x2aa37d102f0 311s | CONCATENATE_DATA_AND_BASE: 311s | target: EXTRACT_KEY_FROM_KEY 311s | base: base-key@0x2aa37d10350 (16-bytes, AES_KEY_GEN) 311s | params: 16-bytes@0x3ffde276f98 311s | key-offset: 0, key-size: 28 311s | EXTRACT_KEY_FROM_KEY: 311s | target: EXTRACT_KEY_FROM_KEY 311s | key_size: 28-bytes 311s | base: base-key@0x2aa37d11c70 (44-bytes, EXTRACT_KEY_FROM_KEY) 311s | operation: FLAGS_ONLY 311s | params: 8-bytes@0x3ffde276ea8 311s | PRF symkey interface PRF HMAC_MD5 update symkey message-key@0x2aa37d140b0 (size 28) 311s | PRF symkey interface: symkey message-key@0x2aa37d140b0 (28-bytes, EXTRACT_KEY_FROM_KEY) 311s | nss hmac digest hack extracting all 28 bytes of key@0x2aa37d140b0 311s | nss hmac digest hack: symkey-key@0x2aa37d140b0 (28-bytes, EXTRACT_KEY_FROM_KEY) 311s | sizeof bytes 32 311s | wrapper: (SECItemType)682: 63 9c d3 6c 60 ea 10 d9 e4 f4 bf 7b 24 a4 86 02 ab 98 3b f6 5e ca 8e f0 ff d8 75 59 13 e1 df 88 311s | nss hmac digest hack extracted len 32 bytes at 0x2aa37d1acc0 311s | unwrapped: 311s | 77 68 61 74 20 64 6f 20 79 61 20 77 61 6e 74 20 what do ya want 311s | 66 6f 72 20 6e 6f 74 68 69 6e 67 3f 00 00 00 00 for nothing?.... 311s | CONCATENATE_DATA_AND_BASE: 311s | target: EXTRACT_KEY_FROM_KEY 311s | base: base-key@0x2aa37d10350 (16-bytes, AES_KEY_GEN) 311s | params: 16-bytes@0x3ffde276e48 311s | key-offset: 0, key-size: 16 311s | EXTRACT_KEY_FROM_KEY: 311s | target: EXTRACT_KEY_FROM_KEY 311s | key_size: 16-bytes 311s | base: base-key@0x2aa37d11c70 (32-bytes, EXTRACT_KEY_FROM_KEY) 311s | operation: FLAGS_ONLY 311s | params: 8-bytes@0x3ffde276d58 311s | PRF symkey interface PRF HMAC_MD5 final-key@0x2aa37d13360 (size 16) 311s | PRF symkey interface: key-key@0x2aa37d13360 (16-bytes, EXTRACT_KEY_FROM_KEY) 311s | output: symkey-key@0x2aa37d13360 (16-bytes, EXTRACT_KEY_FROM_KEY) 311s | RFC 2104: MD5_HMAC test 2 extracting all 16 bytes of key@0x2aa37d13360 311s | RFC 2104: MD5_HMAC test 2: symkey-key@0x2aa37d13360 (16-bytes, EXTRACT_KEY_FROM_KEY) 311s | sizeof bytes 16 311s | wrapper: (SECItemType)682: 97 f9 b4 66 76 e7 76 57 7a e5 46 89 4e 6a 07 14 311s | RFC 2104: MD5_HMAC test 2 extracted len 16 bytes at 0x2aa37d136b0 311s | unwrapped: 311s | 75 0c 78 3e 6a b0 b5 03 ea a8 6e 31 0a 5d b7 38 u.x>j.....n1.].8 311s | verify_bytes() RFC 2104: MD5_HMAC test 2: symkey: ok 311s ipsec algparse: RFC 2104: MD5_HMAC test 3 311s | decode_to_chunk() test_prf_vector: input "0xAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAA" 311s | decode_to_chunk() output: 311s | aa aa aa aa aa aa aa aa aa aa aa aa aa aa aa aa ................ 311s | decode_to_chunk() test_prf_vector: input "0xDDDDDDDDDDDDDDDDDDDDDDDDDDDDDDDDDDDDDDDDDDDDDDDDDDDDDDDDDDDDDDDDDDDDDDDDDDDDDDDDDDDDDDDDDDDDDDDDDDDD" 311s | decode_to_chunk() output: 311s | dd dd dd dd dd dd dd dd dd dd dd dd dd dd dd dd ................ 311s | dd dd dd dd dd dd dd dd dd dd dd dd dd dd dd dd ................ 311s | dd dd dd dd dd dd dd dd dd dd dd dd dd dd dd dd ................ 311s | dd dd .. 311s | decode_to_chunk() test_prf_vector: input "0x56be34521d144c88dbb8c733f0e8b3f6" 311s | decode_to_chunk() output: 311s | 56 be 34 52 1d 14 4c 88 db b8 c7 33 f0 e8 b3 f6 V.4R..L....3.... 311s | PRF chunk interface PRF HMAC_MD5 init key hunk 0x2aa37d10220 (length 16) 311s | aa aa aa aa aa aa aa aa aa aa aa aa aa aa aa aa ................ 311s | CONCATENATE_DATA_AND_BASE: 311s | target: EXTRACT_KEY_FROM_KEY 311s | base: base-key@0x2aa37d10350 (16-bytes, AES_KEY_GEN) 311s | params: 16-bytes@0x3ffde276d70 311s | key-offset: 0, key-size: 16 311s | EXTRACT_KEY_FROM_KEY: 311s | target: MD5_HMAC 311s | flags: SIGN 311s | key_size: 16-bytes 311s | base: base-key@0x2aa37d143f0 (32-bytes, EXTRACT_KEY_FROM_KEY) 311s | operation: FLAGS_ONLY 311s | params: 8-bytes@0x3ffde276d78 311s | PRF chunk interface prf: created HMAC_MD5 context 0x2aa37d147e0 from key-key@0x2aa37d13360 311s | PRF chunk interface prf: begin HMAC_MD5 with context 0x2aa37d147e0 from key-key@0x2aa37d13360 311s | PRF chunk interface PRF HMAC_MD5 0x2aa37d10320 311s | PRF chunk interface PRF HMAC_MD5 update message (0x2aa37d13320 length 50) 311s | dd dd dd dd dd dd dd dd dd dd dd dd dd dd dd dd ................ 311s | dd dd dd dd dd dd dd dd dd dd dd dd dd dd dd dd ................ 311s | dd dd dd dd dd dd dd dd dd dd dd dd dd dd dd dd ................ 311s | dd dd .. 311s | PRF chunk interface PRF HMAC_MD5 final length 16 311s | 56 be 34 52 1d 14 4c 88 db b8 c7 33 f0 e8 b3 f6 V.4R..L....3.... 311s | chunk output 311s | 56 be 34 52 1d 14 4c 88 db b8 c7 33 f0 e8 b3 f6 V.4R..L....3.... 311s | verify_bytes() RFC 2104: MD5_HMAC test 3: prf OUT: ok 311s | CONCATENATE_DATA_AND_BASE: 311s | target: EXTRACT_KEY_FROM_KEY 311s | base: base-key@0x2aa37d10350 (16-bytes, AES_KEY_GEN) 311s | params: 16-bytes@0x3ffde276f98 311s | key-offset: 0, key-size: 16 311s | EXTRACT_KEY_FROM_KEY: 311s | target: EXTRACT_KEY_FROM_KEY 311s | key_size: 16-bytes 311s | base: base-key@0x2aa37d143f0 (32-bytes, EXTRACT_KEY_FROM_KEY) 311s | operation: FLAGS_ONLY 311s | params: 8-bytes@0x3ffde276ea8 311s | PRF symkey interface PRF HMAC_MD5 init key symkey-key@0x2aa37d13360 (size 16) 311s | PRF symkey interface: key symkey-key@0x2aa37d13360 (16-bytes, EXTRACT_KEY_FROM_KEY) 311s | key-offset: 0, key-size: 16 311s | EXTRACT_KEY_FROM_KEY: 311s | target: MD5_HMAC 311s | flags: SIGN 311s | key_size: 16-bytes 311s | base: base-key@0x2aa37d13360 (16-bytes, EXTRACT_KEY_FROM_KEY) 311s | operation: FLAGS_ONLY 311s | params: 8-bytes@0x3ffde276e30 311s | PRF symkey interface prf: created HMAC_MD5 context 0x2aa37d18c40 from key symkey-key@0x2aa37d143f0 311s | PRF symkey interface prf: begin HMAC_MD5 with context 0x2aa37d18c40 from key symkey-key@0x2aa37d143f0 311s | PRF symkey interface PRF HMAC_MD5 0x2aa37d13d20 311s | CONCATENATE_DATA_AND_BASE: 311s | target: EXTRACT_KEY_FROM_KEY 311s | base: base-key@0x2aa37d10350 (16-bytes, AES_KEY_GEN) 311s | params: 16-bytes@0x3ffde276f98 311s | key-offset: 0, key-size: 50 311s | EXTRACT_KEY_FROM_KEY: 311s | target: EXTRACT_KEY_FROM_KEY 311s | key_size: 50-bytes 311s | base: base-key@0x2aa37d11c70 (66-bytes, EXTRACT_KEY_FROM_KEY) 311s | operation: FLAGS_ONLY 311s | params: 8-bytes@0x3ffde276ea8 311s | PRF symkey interface PRF HMAC_MD5 update symkey message-key@0x2aa37d140b0 (size 50) 311s | PRF symkey interface: symkey message-key@0x2aa37d140b0 (50-bytes, EXTRACT_KEY_FROM_KEY) 311s | nss hmac digest hack extracting all 50 bytes of key@0x2aa37d140b0 311s | nss hmac digest hack: symkey-key@0x2aa37d140b0 (50-bytes, EXTRACT_KEY_FROM_KEY) 311s | sizeof bytes 64 311s | wrapper: (SECItemType)682: 4c e9 8b db b6 2a 25 10 c2 4e 69 37 40 95 4d 1e 4c e9 8b db b6 2a 25 10 c2 4e 69 37 40 95 4d 1e 4c e9 8b db b6 2a 25 10 c2 4e 69 37 40 95 4d 1e 9b c6 17 95 ec 9a e2 b0 db 92 29 78 f6 3c d0 3c 311s | nss hmac digest hack extracted len 64 bytes at 0x2aa37d13de0 311s | unwrapped: 311s | dd dd dd dd dd dd dd dd dd dd dd dd dd dd dd dd ................ 311s | dd dd dd dd dd dd dd dd dd dd dd dd dd dd dd dd ................ 311s | dd dd dd dd dd dd dd dd dd dd dd dd dd dd dd dd ................ 311s | dd dd 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................ 311s | CONCATENATE_DATA_AND_BASE: 311s | target: EXTRACT_KEY_FROM_KEY 311s | base: base-key@0x2aa37d10350 (16-bytes, AES_KEY_GEN) 311s | params: 16-bytes@0x3ffde276e48 311s | key-offset: 0, key-size: 16 311s | EXTRACT_KEY_FROM_KEY: 311s | target: EXTRACT_KEY_FROM_KEY 311s | key_size: 16-bytes 311s | base: base-key@0x2aa37d11c70 (32-bytes, EXTRACT_KEY_FROM_KEY) 311s | operation: FLAGS_ONLY 311s | params: 8-bytes@0x3ffde276d58 311s | PRF symkey interface PRF HMAC_MD5 final-key@0x2aa37d143f0 (size 16) 311s | PRF symkey interface: key-key@0x2aa37d143f0 (16-bytes, EXTRACT_KEY_FROM_KEY) 311s | output: symkey-key@0x2aa37d143f0 (16-bytes, EXTRACT_KEY_FROM_KEY) 311s | RFC 2104: MD5_HMAC test 3 extracting all 16 bytes of key@0x2aa37d143f0 311s | RFC 2104: MD5_HMAC test 3: symkey-key@0x2aa37d143f0 (16-bytes, EXTRACT_KEY_FROM_KEY) 311s | sizeof bytes 16 311s | wrapper: (SECItemType)682: 2e a4 0d 8e 55 e9 97 eb 3e f9 e0 1d ff f4 d3 f6 311s | RFC 2104: MD5_HMAC test 3 extracted len 16 bytes at 0x2aa37d139a0 311s | unwrapped: 311s | 56 be 34 52 1d 14 4c 88 db b8 c7 33 f0 e8 b3 f6 V.4R..L....3.... 311s | verify_bytes() RFC 2104: MD5_HMAC test 3: symkey: ok 311s ipsec algparse: testing HMAC_SHA1: 311s ipsec algparse: CAVP: IKEv2 key derivation with HMAC-SHA1 311s | decode_to_chunk() test_kdf_vector: input "0x32b50d5f4a3763f3" 311s | decode_to_chunk() output: 311s | 32 b5 0d 5f 4a 37 63 f3 2.._J7c. 311s | decode_to_chunk() test_kdf_vector: input "0x9206a04b26564cb1" 311s | decode_to_chunk() output: 311s | 92 06 a0 4b 26 56 4c b1 ...K&VL. 311s | decode_to_chunk() test_kdf_vector: input "0x34c9e7c188868785" 311s | decode_to_chunk() output: 311s | 34 c9 e7 c1 88 86 87 85 4....... 311s | decode_to_chunk() test_kdf_vector: input "0x3ff77d760d2b2199" 311s | decode_to_chunk() output: 311s | 3f f7 7d 76 0d 2b 21 99 ?.}v.+!. 311s | decode_to_chunk() test_kdf_vector: input "0x4b2c1f971981a8ad8d0abeafabf38cf75fc8349c148142465ed9c8b516b8be52" 311s | decode_to_chunk() output: 311s | 4b 2c 1f 97 19 81 a8 ad 8d 0a be af ab f3 8c f7 K,.............. 311s | 5f c8 34 9c 14 81 42 46 5e d9 c8 b5 16 b8 be 52 _.4...BF^......R 311s | decode_to_chunk() test_kdf_vector: input "0x863f3c9d06efd39d2b907b97f8699e5dd5251ef64a2a176f36ee40c87d4f9330" 311s | decode_to_chunk() output: 311s | 86 3f 3c 9d 06 ef d3 9d 2b 90 7b 97 f8 69 9e 5d .?<.....+.{..i.] 311s | d5 25 1e f6 4a 2a 17 6f 36 ee 40 c8 7d 4f 93 30 .%..J*.o6.@.}O.0 311s | decode_to_chunk() test_kdf_vector: input "0xa9a7b222b59f8f48645f28a1db5b5f5d7479cba7" 311s | decode_to_chunk() output: 311s | a9 a7 b2 22 b5 9f 8f 48 64 5f 28 a1 db 5b 5f 5d ..."...Hd_(..[_] 311s | 74 79 cb a7 ty.. 311s | decode_to_chunk() test_kdf_vector: input "0x63e81194946ebd05df7df5ebf5d8750056bf1f1d" 311s | decode_to_chunk() output: 311s | 63 e8 11 94 94 6e bd 05 df 7d f5 eb f5 d8 75 00 c....n...}....u. 311s | 56 bf 1f 1d V... 311s | decode_to_chunk() test_kdf_vector: input "0xa14293677cc80ff8f9cc0eee30d895da9d8f405666e30ef0dfcb63c634a46002a2a63080e514a062768b76606f9fa5e992204fc5a670bde3f10d6b027113936a5c55b648a194ae587b0088d52204b702c979fa280870d2ed41efa9c549fd11198af1670b143d384bd275c5f594cf266b05ebadca855e4249520a441a81157435a7a56cc4" 311s | decode_to_chunk() output: 311s | a1 42 93 67 7c c8 0f f8 f9 cc 0e ee 30 d8 95 da .B.g|.......0... 311s | 9d 8f 40 56 66 e3 0e f0 df cb 63 c6 34 a4 60 02 ..@Vf.....c.4.`. 311s | a2 a6 30 80 e5 14 a0 62 76 8b 76 60 6f 9f a5 e9 ..0....bv.v`o... 311s | 92 20 4f c5 a6 70 bd e3 f1 0d 6b 02 71 13 93 6a . O..p....k.q..j 311s | 5c 55 b6 48 a1 94 ae 58 7b 00 88 d5 22 04 b7 02 \U.H...X{..."... 311s | c9 79 fa 28 08 70 d2 ed 41 ef a9 c5 49 fd 11 19 .y.(.p..A...I... 311s | 8a f1 67 0b 14 3d 38 4b d2 75 c5 f5 94 cf 26 6b ..g..=8K.u....&k 311s | 05 eb ad ca 85 5e 42 49 52 0a 44 1a 81 15 74 35 .....^BIR.D...t5 311s | a7 a5 6c c4 ..l. 311s | CONCATENATE_DATA_AND_BASE: 311s | target: EXTRACT_KEY_FROM_KEY 311s | base: base-key@0x2aa37d10350 (16-bytes, AES_KEY_GEN) 311s | params: 16-bytes@0x3ffde276f70 311s | key-offset: 0, key-size: 32 311s | EXTRACT_KEY_FROM_KEY: 311s | target: EXTRACT_KEY_FROM_KEY 311s | key_size: 32-bytes 311s | base: base-key@0x2aa37d13360 (48-bytes, EXTRACT_KEY_FROM_KEY) 311s | operation: FLAGS_ONLY 311s | params: 8-bytes@0x3ffde276e80 311s | NSS_IKE_PRF_DERIVE: 311s | target: NSS_IKE_PRF_PLUS_DERIVE 311s | base: base-key@0x2aa37d143f0 (32-bytes, EXTRACT_KEY_FROM_KEY) 311s | params: 56-bytes@0x3ffde276ea0 311s | CAVP: IKEv2 key derivation with HMAC-SHA1 extracting all 20 bytes of key@0x2aa37d13360 311s | CAVP: IKEv2 key derivation with HMAC-SHA1: symkey-key@0x2aa37d13360 (20-bytes, NSS_IKE_PRF_PLUS_DERIVE) 311s | sizeof bytes 32 311s | wrapper: (SECItemType)682: ff 31 f8 d3 dd ca f4 5c 7c 9e 93 87 fe 00 50 92 75 9f 09 d9 fb 99 ee 91 8b 08 82 78 00 a8 63 9d 311s | CAVP: IKEv2 key derivation with HMAC-SHA1 extracted len 32 bytes at 0x2aa37d13db0 311s | unwrapped: 311s | a9 a7 b2 22 b5 9f 8f 48 64 5f 28 a1 db 5b 5f 5d ..."...Hd_(..[_] 311s | 74 79 cb a7 00 00 00 00 00 00 00 00 00 00 00 00 ty.............. 311s | verify_bytes() CAVP: IKEv2 key derivation with HMAC-SHA1: skeyseed: ok 311s | NSS_IKE_PRF_PLUS_DERIVE: 311s | target: EXTRACT_KEY_FROM_KEY 311s | key_size: 132-bytes 311s | base: base-key@0x2aa37d13360 (20-bytes, NSS_IKE_PRF_PLUS_DERIVE) 311s | params: 40-bytes@0x3ffde276e40 311s | CAVP: IKEv2 key derivation with HMAC-SHA1 extracting all 132 bytes of key@0x2aa37d140b0 311s | CAVP: IKEv2 key derivation with HMAC-SHA1: symkey-key@0x2aa37d140b0 (132-bytes, EXTRACT_KEY_FROM_KEY) 311s | sizeof bytes 144 311s initializing NSS db 311s running pluto selftest 311s | wrapper: (SECItemType)682: 2f 7f f5 b7 80 3f bc e1 1c 7b da c7 72 8e 5b f6 33 3e 35 18 df 11 f8 00 ca 85 6a 93 cd bb 14 f2 f0 c5 83 7b 17 aa ac 28 03 67 10 9e 55 c0 55 96 9c c6 aa 5d 2a 63 f2 3c b3 7c 11 f6 ca d5 fd 12 aa 2b 7d dd 44 7f e7 10 14 f6 c9 ef 75 95 11 96 09 f9 3a 39 a1 7b 32 e9 54 f1 4f 91 b7 92 18 66 38 da 6d 0c 1d 16 e4 7e 8b 5d 6c 07 2c 0b 5a cf 3e 0b 67 2f 26 60 a5 85 2c 94 c9 24 ac 14 ed 04 dd 91 80 68 13 d9 e5 b1 d5 1e d0 b7 5d 35 18 bb 311s | CAVP: IKEv2 key derivation with HMAC-SHA1 extracted len 144 bytes at 0x2aa37d1aa90 311s | unwrapped: 311s | a1 42 93 67 7c c8 0f f8 f9 cc 0e ee 30 d8 95 da .B.g|.......0... 311s | 9d 8f 40 56 66 e3 0e f0 df cb 63 c6 34 a4 60 02 ..@Vf.....c.4.`. 311s | a2 a6 30 80 e5 14 a0 62 76 8b 76 60 6f 9f a5 e9 ..0....bv.v`o... 311s | 92 20 4f c5 a6 70 bd e3 f1 0d 6b 02 71 13 93 6a . O..p....k.q..j 311s | 5c 55 b6 48 a1 94 ae 58 7b 00 88 d5 22 04 b7 02 \U.H...X{..."... 311s | c9 79 fa 28 08 70 d2 ed 41 ef a9 c5 49 fd 11 19 .y.(.p..A...I... 311s | 8a f1 67 0b 14 3d 38 4b d2 75 c5 f5 94 cf 26 6b ..g..=8K.u....&k 311s | 05 eb ad ca 85 5e 42 49 52 0a 44 1a 81 15 74 35 .....^BIR.D...t5 311s | a7 a5 6c c4 00 00 00 00 00 00 00 00 00 00 00 00 ..l............. 311s | verify_bytes() CAVP: IKEv2 key derivation with HMAC-SHA1: DKM: ok 311s | key-offset: 0, key-size: 20 311s | EXTRACT_KEY_FROM_KEY: 311s | target: EXTRACT_KEY_FROM_KEY 311s | key_size: 20-bytes 311s | base: base-key@0x2aa37d140b0 (132-bytes, EXTRACT_KEY_FROM_KEY) 311s | operation: FLAGS_ONLY 311s | params: 8-bytes@0x3ffde276f78 311s | CONCATENATE_DATA_AND_BASE: 311s | target: EXTRACT_KEY_FROM_KEY 311s | base: base-key@0x2aa37d10350 (16-bytes, AES_KEY_GEN) 311s | params: 16-bytes@0x3ffde276f70 311s | key-offset: 0, key-size: 32 311s | EXTRACT_KEY_FROM_KEY: 311s | target: EXTRACT_KEY_FROM_KEY 311s | key_size: 32-bytes 311s | base: base-key@0x2aa37d141f0 (48-bytes, EXTRACT_KEY_FROM_KEY) 311s | operation: FLAGS_ONLY 311s | params: 8-bytes@0x3ffde276e80 311s | NSS_IKE_PRF_DERIVE: 311s | target: NSS_IKE_PRF_PLUS_DERIVE 311s | base: base-key@0x2aa37d11c70 (20-bytes, EXTRACT_KEY_FROM_KEY) 311s | params: 56-bytes@0x3ffde276e98 311s | CAVP: IKEv2 key derivation with HMAC-SHA1 extracting all 20 bytes of key@0x2aa37d141f0 311s | CAVP: IKEv2 key derivation with HMAC-SHA1: symkey-key@0x2aa37d141f0 (20-bytes, NSS_IKE_PRF_PLUS_DERIVE) 311s | sizeof bytes 32 311s | wrapper: (SECItemType)682: fc ae 6c f4 28 9c 29 d3 1a 86 db 9e d8 97 2c a5 1d db 58 bd b3 fe f2 7c 59 49 cb 97 cf cc 0d 23 311s | CAVP: IKEv2 key derivation with HMAC-SHA1 extracted len 32 bytes at 0x2aa37d10320 311s | unwrapped: 311s | 63 e8 11 94 94 6e bd 05 df 7d f5 eb f5 d8 75 00 c....n...}....u. 311s | 56 bf 1f 1d 00 00 00 00 00 00 00 00 00 00 00 00 V............... 311s | verify_bytes() CAVP: IKEv2 key derivation with HMAC-SHA1: skeyseed_rekey: ok 311s ipsec algparse: leak detective found no leaks 311s /usr/libexec/ipsec/pluto: adjusting nssdir to /tmp/tmp.Xze2nFvMsx 311s /usr/libexec/ipsec/pluto: selftest: skipping lock 311s /usr/libexec/ipsec/pluto: selftest: skipping control socket 311s /usr/libexec/ipsec/pluto: selftest: skipping fork 311s Starting Pluto (Libreswan Version 5.2 IKEv2 IKEv1 XFRM XFRMI esp-hw-offload FORK PTHREAD_SETSCHEDPRIO NSS (IPsec profile) (NSS-KDF) DNSSEC SYSTEMD_WATCHDOG LABELED_IPSEC (SELINUX) LIBCAP_NG LINUX_AUDIT AUTH_PAM NETWORKMANAGER CURL(non-NSS) LDAP(non-NSS) NFTABLES CAT NFLOG) pid:1505 311s operating system: Linux 6.18.0 [Linux 6.18.0-9-generic #9-Ubuntu SMP Mon Jan 12 15:39:23 UTC 2026 s390x] 311s core dump dir: /run/pluto 311s secrets file: /etc/ipsec.secrets 311s Initializing NSS using read-only database "sql:/tmp/tmp.Xze2nFvMsx" 311s FIPS Mode: OFF 311s NSS crypto library initialized 311s FIPS mode disabled for pluto daemon 311s FIPS HMAC integrity support [not required] 311s libcap-ng capng_apply failed to apply changes, err=-5. see: man capng_apply 311s libcap-ng support [enabled] 311s Linux audit support [enabled] 311s leak-detective disabled 311s NSS crypto [enabled] 311s XAUTH PAM support [enabled] 311s initializing libevent in pthreads mode: headers: 2.1.12-stable (2010c00); library: 2.1.12-stable (2010c00) 311s NAT-Traversal: keep-alive period 20s 311s ERROR: xfrmi is not supported, failed to create ipsec-interface ipsec1 bound to lo 311s ipsec-interface is not working: xfrmi is not supported 311s IPsec Interface [disabled] 311s refreshed session resume keys, issuing key 1 311s Encryption algorithms: 311s AES_CCM_16 {256,192,*128} IKEv1: ESP IKEv2: ESP FIPS aes_ccm, aes_ccm_c 311s AES_CCM_12 {256,192,*128} IKEv1: ESP IKEv2: ESP FIPS aes_ccm_b 311s AES_CCM_8 {256,192,*128} IKEv1: ESP IKEv2: ESP FIPS aes_ccm_a 311s 3DES_CBC [*192] IKEv1: IKE ESP IKEv2: IKE ESP FIPS NSS(CBC) 3des 311s CAMELLIA_CTR {256,192,*128} IKEv1: ESP IKEv2: ESP 311s CAMELLIA_CBC {256,192,*128} IKEv1: IKE ESP IKEv2: IKE ESP NSS(CBC) camellia 311s AES_GCM_16 {256,192,*128} IKEv1: ESP IKEv2: IKE ESP FIPS NSS(AEAD) aes_gcm, aes_gcm_c 311s AES_GCM_12 {256,192,*128} IKEv1: ESP IKEv2: IKE ESP FIPS NSS(AEAD) aes_gcm_b 311s AES_GCM_8 {256,192,*128} IKEv1: ESP IKEv2: IKE ESP FIPS NSS(AEAD) aes_gcm_a 311s AES_CTR {256,192,*128} IKEv1: IKE ESP IKEv2: IKE ESP FIPS NSS(CTR) aesctr 311s AES_CBC {256,192,*128} IKEv1: IKE ESP IKEv2: IKE ESP FIPS NSS(CBC) aes 311s NULL_AUTH_AES_GMAC {256,192,*128} IKEv1: ESP IKEv2: ESP FIPS aes_gmac 311s NULL [] IKEv1: ESP IKEv2: ESP NULL 311s CHACHA20_POLY1305 [*256] IKEv1: IKEv2: IKE ESP NSS(AEAD) chacha20poly1305 311s Hash algorithms: 311s MD5 IKEv1: IKE IKEv2: NSS 311s SHA1 IKEv1: IKE IKEv2: IKE FIPS NSS sha 311s SHA2_256 IKEv1: IKE IKEv2: IKE FIPS NSS sha2, sha256 311s SHA2_384 IKEv1: IKE IKEv2: IKE FIPS NSS sha384 311s SHA2_512 IKEv1: IKE IKEv2: IKE FIPS NSS sha512 311s IDENTITY IKEv1: IKEv2: FIPS 311s PRF algorithms: 311s HMAC_MD5 IKEv1: IKE IKEv2: IKE NSS md5 311s HMAC_SHA1 IKEv1: IKE IKEv2: IKE FIPS NSS sha, sha1 311s HMAC_SHA2_256 IKEv1: IKE IKEv2: IKE FIPS NSS sha2, sha256, sha2_256 311s HMAC_SHA2_384 IKEv1: IKE IKEv2: IKE FIPS NSS sha384, sha2_384 311s HMAC_SHA2_512 IKEv1: IKE IKEv2: IKE FIPS NSS sha512, sha2_512 311s AES_XCBC IKEv1: IKEv2: IKE native(XCBC) aes128_xcbc 311s Integrity algorithms: 311s HMAC_MD5_96 IKEv1: IKE ESP AH IKEv2: IKE ESP AH NSS md5, hmac_md5 311s HMAC_SHA1_96 IKEv1: IKE ESP AH IKEv2: IKE ESP AH FIPS NSS sha, sha1, sha1_96, hmac_sha1 311s HMAC_SHA2_512_256 IKEv1: IKE ESP AH IKEv2: IKE ESP AH FIPS NSS sha512, sha2_512, sha2_512_256, hmac_sha2_512 311s HMAC_SHA2_384_192 IKEv1: IKE ESP AH IKEv2: IKE ESP AH FIPS NSS sha384, sha2_384, sha2_384_192, hmac_sha2_384 311s HMAC_SHA2_256_128 IKEv1: IKE ESP AH IKEv2: IKE ESP AH FIPS NSS sha2, sha256, sha2_256, sha2_256_128, hmac_sha2_256 311s HMAC_SHA2_256_TRUNCBUG IKEv1: ESP AH IKEv2: AH 311s AES_XCBC_96 IKEv1: ESP AH IKEv2: IKE ESP AH native(XCBC) aes_xcbc, aes128_xcbc, aes128_xcbc_96 311s AES_CMAC_96 IKEv1: ESP AH IKEv2: ESP AH FIPS aes_cmac 311s NONE IKEv1: ESP IKEv2: IKE ESP FIPS null 311s DH algorithms: 311s NONE IKEv1: IKEv2: IKE ESP AH FIPS NSS(MODP) null, dh0 311s MODP1536 IKEv1: IKE ESP AH IKEv2: IKE ESP AH NSS(MODP) dh5 311s MODP2048 IKEv1: IKE ESP AH IKEv2: IKE ESP AH FIPS NSS(MODP) dh14 311s MODP3072 IKEv1: IKE ESP AH IKEv2: IKE ESP AH FIPS NSS(MODP) dh15 311s MODP4096 IKEv1: IKE ESP AH IKEv2: IKE ESP AH FIPS NSS(MODP) dh16 311s MODP6144 IKEv1: IKE ESP AH IKEv2: IKE ESP AH FIPS NSS(MODP) dh17 311s MODP8192 IKEv1: IKE ESP AH IKEv2: IKE ESP AH FIPS NSS(MODP) dh18 311s DH19 IKEv1: IKE IKEv2: IKE ESP AH FIPS NSS(ECP) ecp_256, ecp256 311s DH20 IKEv1: IKE IKEv2: IKE ESP AH FIPS NSS(ECP) ecp_384, ecp384 311s DH21 IKEv1: IKE IKEv2: IKE ESP AH FIPS NSS(ECP) ecp_521, ecp521 311s DH31 IKEv1: IKE IKEv2: IKE ESP AH NSS(ECP) curve25519 311s IPCOMP algorithms: 311s DEFLATE IKEv1: ESP AH IKEv2: ESP AH FIPS 311s LZS IKEv1: IKEv2: ESP AH FIPS 311s LZJH IKEv1: IKEv2: ESP AH FIPS 311s testing CAMELLIA_CBC: 311s Camellia: 16 bytes with 128-bit key 311s Camellia: 16 bytes with 128-bit key 311s Camellia: 16 bytes with 256-bit key 311s Camellia: 16 bytes with 256-bit key 311s testing AES_GCM_16: 311s empty string 311s one block 311s two blocks 311s two blocks with associated data 311s testing AES_CTR: 311s Encrypting 16 octets using AES-CTR with 128-bit key 311s Encrypting 32 octets using AES-CTR with 128-bit key 311s Encrypting 36 octets using AES-CTR with 128-bit key 311s Encrypting 16 octets using AES-CTR with 192-bit key 311s Encrypting 32 octets using AES-CTR with 192-bit key 311s Encrypting 36 octets using AES-CTR with 192-bit key 311s Encrypting 16 octets using AES-CTR with 256-bit key 311s Encrypting 32 octets using AES-CTR with 256-bit key 311s Encrypting 36 octets using AES-CTR with 256-bit key 311s testing AES_CBC: 311s Encrypting 16 bytes (1 block) using AES-CBC with 128-bit key 311s Encrypting 32 bytes (2 blocks) using AES-CBC with 128-bit key 311s Encrypting 48 bytes (3 blocks) using AES-CBC with 128-bit key 311s Encrypting 64 bytes (4 blocks) using AES-CBC with 128-bit key 311s testing AES_XCBC: 311s RFC 3566 Test Case 1: AES-XCBC-MAC-96 with 0-byte input 311s RFC 3566 Test Case 2: AES-XCBC-MAC-96 with 3-byte input 311s RFC 3566 Test Case 3: AES-XCBC-MAC-96 with 16-byte input 311s RFC 3566 Test Case 4: AES-XCBC-MAC-96 with 20-byte input 311s RFC 3566 Test Case 5: AES-XCBC-MAC-96 with 32-byte input 311s RFC 3566 Test Case 6: AES-XCBC-MAC-96 with 34-byte input 311s RFC 3566 Test Case 7: AES-XCBC-MAC-96 with 1000-byte input 311s RFC 4434 Test Case AES-XCBC-PRF-128 with 20-byte input (key length 16) 311s RFC 4434 Test Case AES-XCBC-PRF-128 with 20-byte input (key length 10) 311s RFC 4434 Test Case AES-XCBC-PRF-128 with 20-byte input (key length 18) 311s testing HMAC_MD5: 311s RFC 2104: MD5_HMAC test 1 311s RFC 2104: MD5_HMAC test 2 311s RFC 2104: MD5_HMAC test 3 311s testing HMAC_SHA1: 311s CAVP: IKEv2 key derivation with HMAC-SHA1 311s selftest: exiting pluto 312s autopkgtest [12:41:51]: test cryptocheck: -----------------------] 312s cryptocheck PASS 312s autopkgtest [12:41:51]: test cryptocheck: - - - - - - - - - - results - - - - - - - - - - 313s autopkgtest [12:41:52]: test cavp: preparing testbed 331s Creating nova instance adt-resolute-s390x-libreswan-20260203-123639-juju-7f2275-prod-proposed-migration-environment-2-a8335684-d09f-4816-8051-40c2e5222aae from image adt/ubuntu-resolute-s390x-server-20260203.img (UUID 733879ca-10c9-4d0b-9d4a-492c78d47079)... 400s autopkgtest [12:43:19]: testbed dpkg architecture: s390x 400s autopkgtest [12:43:19]: testbed apt version: 3.1.14 400s autopkgtest [12:43:19]: @@@@@@@@@@@@@@@@@@@@ test bed setup 400s autopkgtest [12:43:19]: testbed release detected to be: resolute 401s autopkgtest [12:43:20]: updating testbed package index (apt update) 401s Get:1 http://ftpmaster.internal/ubuntu resolute-proposed InRelease [124 kB] 402s Hit:2 http://ftpmaster.internal/ubuntu resolute InRelease 402s Hit:3 http://ftpmaster.internal/ubuntu resolute-updates InRelease 402s Hit:4 http://ftpmaster.internal/ubuntu resolute-security InRelease 402s Get:5 http://ftpmaster.internal/ubuntu resolute-proposed/restricted Sources [5260 B] 402s Get:6 http://ftpmaster.internal/ubuntu resolute-proposed/universe Sources [1317 kB] 402s Get:7 http://ftpmaster.internal/ubuntu resolute-proposed/multiverse Sources [27.9 kB] 402s Get:8 http://ftpmaster.internal/ubuntu resolute-proposed/main Sources [243 kB] 402s Get:9 http://ftpmaster.internal/ubuntu resolute-proposed/main s390x Packages [278 kB] 402s Get:10 http://ftpmaster.internal/ubuntu resolute-proposed/universe s390x Packages [1063 kB] 402s Get:11 http://ftpmaster.internal/ubuntu resolute-proposed/multiverse s390x Packages [7048 B] 402s Fetched 3066 kB in 1s (3916 kB/s) 405s Reading package lists... 406s Hit:1 http://ftpmaster.internal/ubuntu resolute-proposed InRelease 406s Hit:2 http://ftpmaster.internal/ubuntu resolute InRelease 406s Hit:3 http://ftpmaster.internal/ubuntu resolute-updates InRelease 406s Hit:4 http://ftpmaster.internal/ubuntu resolute-security InRelease 408s Reading package lists... 408s Reading package lists... 408s Building dependency tree... 408s Reading state information... 408s Calculating upgrade... 409s The following packages will be upgraded: 409s libpam-modules libpam-modules-bin libpam-runtime libpam0g powermgmt-base 409s systemd-hwe-hwdb 409s 6 upgraded, 0 newly installed, 0 to remove and 0 not upgraded. 409s Need to get 480 kB of archives. 409s After this operation, 1024 B of additional disk space will be used. 409s Get:1 http://ftpmaster.internal/ubuntu resolute-proposed/main s390x libpam-runtime all 1.7.0-5ubuntu3 [149 kB] 409s Get:2 http://ftpmaster.internal/ubuntu resolute-proposed/main s390x libpam0g s390x 1.7.0-5ubuntu3 [71.0 kB] 409s Get:3 http://ftpmaster.internal/ubuntu resolute-proposed/main s390x libpam-modules-bin s390x 1.7.0-5ubuntu3 [49.1 kB] 409s Get:4 http://ftpmaster.internal/ubuntu resolute-proposed/main s390x libpam-modules s390x 1.7.0-5ubuntu3 [200 kB] 409s Get:5 http://ftpmaster.internal/ubuntu resolute/main s390x systemd-hwe-hwdb all 259.0.1 [3152 B] 409s Get:6 http://ftpmaster.internal/ubuntu resolute/main s390x powermgmt-base all 1.38ubuntu2 [7878 B] 410s dpkg-preconfigure: unable to re-open stdin: No such file or directory 410s Fetched 480 kB in 0s (1484 kB/s) 410s (Reading database ... (Reading database ... 5% (Reading database ... 10% (Reading database ... 15% (Reading database ... 20% (Reading database ... 25% (Reading database ... 30% (Reading database ... 35% (Reading database ... 40% (Reading database ... 45% (Reading database ... 50% (Reading database ... 55% (Reading database ... 60% (Reading database ... 65% (Reading database ... 70% (Reading database ... 75% (Reading database ... 80% (Reading database ... 85% (Reading database ... 90% (Reading database ... 95% (Reading database ... 100% (Reading database ... 61953 files and directories currently installed.) 410s Preparing to unpack .../libpam-runtime_1.7.0-5ubuntu3_all.deb ... 410s Unpacking libpam-runtime (1.7.0-5ubuntu3) over (1.7.0-5ubuntu2) ... 410s Setting up libpam-runtime (1.7.0-5ubuntu3) ... 411s (Reading database ... (Reading database ... 5% (Reading database ... 10% (Reading database ... 15% (Reading database ... 20% (Reading database ... 25% (Reading database ... 30% (Reading database ... 35% (Reading database ... 40% (Reading database ... 45% (Reading database ... 50% (Reading database ... 55% (Reading database ... 60% (Reading database ... 65% (Reading database ... 70% (Reading database ... 75% (Reading database ... 80% (Reading database ... 85% (Reading database ... 90% (Reading database ... 95% (Reading database ... 100% (Reading database ... 61953 files and directories currently installed.) 411s Preparing to unpack .../libpam0g_1.7.0-5ubuntu3_s390x.deb ... 411s Unpacking libpam0g:s390x (1.7.0-5ubuntu3) over (1.7.0-5ubuntu2) ... 411s Setting up libpam0g:s390x (1.7.0-5ubuntu3) ... 411s (Reading database ... (Reading database ... 5% (Reading database ... 10% (Reading database ... 15% (Reading database ... 20% (Reading database ... 25% (Reading database ... 30% (Reading database ... 35% (Reading database ... 40% (Reading database ... 45% (Reading database ... 50% (Reading database ... 55% (Reading database ... 60% (Reading database ... 65% (Reading database ... 70% (Reading database ... 75% (Reading database ... 80% (Reading database ... 85% (Reading database ... 90% (Reading database ... 95% (Reading database ... 100% (Reading database ... 61953 files and directories currently installed.) 411s Preparing to unpack .../libpam-modules-bin_1.7.0-5ubuntu3_s390x.deb ... 411s Unpacking libpam-modules-bin (1.7.0-5ubuntu3) over (1.7.0-5ubuntu2) ... 411s Setting up libpam-modules-bin (1.7.0-5ubuntu3) ... 412s pam_namespace.service is a disabled or a static unit not running, not starting it. 412s (Reading database ... (Reading database ... 5% (Reading database ... 10% (Reading database ... 15% (Reading database ... 20% (Reading database ... 25% (Reading database ... 30% (Reading database ... 35% (Reading database ... 40% (Reading database ... 45% (Reading database ... 50% (Reading database ... 55% (Reading database ... 60% (Reading database ... 65% (Reading database ... 70% (Reading database ... 75% (Reading database ... 80% (Reading database ... 85% (Reading database ... 90% (Reading database ... 95% (Reading database ... 100% (Reading database ... 61953 files and directories currently installed.) 412s Preparing to unpack .../libpam-modules_1.7.0-5ubuntu3_s390x.deb ... 413s Unpacking libpam-modules:s390x (1.7.0-5ubuntu3) over (1.7.0-5ubuntu2) ... 413s Setting up libpam-modules:s390x (1.7.0-5ubuntu3) ... 413s (Reading database ... (Reading database ... 5% (Reading database ... 10% (Reading database ... 15% (Reading database ... 20% (Reading database ... 25% (Reading database ... 30% (Reading database ... 35% (Reading database ... 40% (Reading database ... 45% (Reading database ... 50% (Reading database ... 55% (Reading database ... 60% (Reading database ... 65% (Reading database ... 70% (Reading database ... 75% (Reading database ... 80% (Reading database ... 85% (Reading database ... 90% (Reading database ... 95% (Reading database ... 100% (Reading database ... 61953 files and directories currently installed.) 413s Preparing to unpack .../systemd-hwe-hwdb_259.0.1_all.deb ... 413s Unpacking systemd-hwe-hwdb (259.0.1) over (257.7.1) ... 413s Preparing to unpack .../powermgmt-base_1.38ubuntu2_all.deb ... 413s Unpacking powermgmt-base (1.38ubuntu2) over (1.38ubuntu1) ... 413s Setting up powermgmt-base (1.38ubuntu2) ... 413s Setting up systemd-hwe-hwdb (259.0.1) ... 416s Processing triggers for man-db (2.13.1-1) ... 420s Processing triggers for udev (259-1ubuntu3) ... 422s Processing triggers for libc-bin (2.42-2ubuntu4) ... 424s autopkgtest [12:43:43]: upgrading testbed (apt dist-upgrade and autopurge) 424s Reading package lists... 425s Building dependency tree... 425s Reading state information... 425s Calculating upgrade... 426s 0 upgraded, 0 newly installed, 0 to remove and 0 not upgraded. 426s Reading package lists... 427s Building dependency tree... 427s Reading state information... 427s Solving dependencies... 428s 0 upgraded, 0 newly installed, 0 to remove and 0 not upgraded. 428s autopkgtest [12:43:47]: rebooting testbed after setup commands that affected boot 471s Reading package lists... 472s Building dependency tree... 472s Reading state information... 472s Solving dependencies... 473s The following NEW packages will be installed: 473s dns-root-data libevent-2.1-7t64 libevent-pthreads-2.1-7t64 libldns3t64 473s libnss3-tools libreswan libunbound8 473s 0 upgraded, 7 newly installed, 0 to remove and 0 not upgraded. 473s Need to get 2943 kB of archives. 473s After this operation, 11.8 MB of additional disk space will be used. 473s Get:1 http://ftpmaster.internal/ubuntu resolute/main s390x dns-root-data all 2025080400 [5908 B] 473s Get:2 http://ftpmaster.internal/ubuntu resolute/main s390x libnss3-tools s390x 2:3.120-1 [637 kB] 474s Get:3 http://ftpmaster.internal/ubuntu resolute/main s390x libevent-pthreads-2.1-7t64 s390x 2.1.12-stable-10build1 [8060 B] 474s Get:4 http://ftpmaster.internal/ubuntu resolute/universe s390x libldns3t64 s390x 1.8.4-2build1 [170 kB] 474s Get:5 http://ftpmaster.internal/ubuntu resolute/main s390x libevent-2.1-7t64 s390x 2.1.12-stable-10build1 [144 kB] 474s Get:6 http://ftpmaster.internal/ubuntu resolute/main s390x libunbound8 s390x 1.24.2-1ubuntu1 [464 kB] 474s Get:7 http://ftpmaster.internal/ubuntu resolute/universe s390x libreswan s390x 5.2-2.2ubuntu1 [1515 kB] 475s Fetched 2943 kB in 1s (4519 kB/s) 475s Selecting previously unselected package dns-root-data. 476s (Reading database ... (Reading database ... 5% (Reading database ... 10% (Reading database ... 15% (Reading database ... 20% (Reading database ... 25% (Reading database ... 30% (Reading database ... 35% (Reading database ... 40% (Reading database ... 45% (Reading database ... 50% (Reading database ... 55% (Reading database ... 60% (Reading database ... 65% (Reading database ... 70% (Reading database ... 75% (Reading database ... 80% (Reading database ... 85% (Reading database ... 90% (Reading database ... 95% (Reading database ... 100% (Reading database ... 61954 files and directories currently installed.) 476s Preparing to unpack .../0-dns-root-data_2025080400_all.deb ... 476s Unpacking dns-root-data (2025080400) ... 476s Selecting previously unselected package libnss3-tools. 476s Preparing to unpack .../1-libnss3-tools_2%3a3.120-1_s390x.deb ... 476s Unpacking libnss3-tools (2:3.120-1) ... 476s Selecting previously unselected package libevent-pthreads-2.1-7t64:s390x. 476s Preparing to unpack .../2-libevent-pthreads-2.1-7t64_2.1.12-stable-10build1_s390x.deb ... 476s Unpacking libevent-pthreads-2.1-7t64:s390x (2.1.12-stable-10build1) ... 476s Selecting previously unselected package libldns3t64:s390x. 476s Preparing to unpack .../3-libldns3t64_1.8.4-2build1_s390x.deb ... 476s Unpacking libldns3t64:s390x (1.8.4-2build1) ... 476s Selecting previously unselected package libevent-2.1-7t64:s390x. 476s Preparing to unpack .../4-libevent-2.1-7t64_2.1.12-stable-10build1_s390x.deb ... 476s Unpacking libevent-2.1-7t64:s390x (2.1.12-stable-10build1) ... 476s Selecting previously unselected package libunbound8:s390x. 476s Preparing to unpack .../5-libunbound8_1.24.2-1ubuntu1_s390x.deb ... 476s Unpacking libunbound8:s390x (1.24.2-1ubuntu1) ... 476s Selecting previously unselected package libreswan. 476s Preparing to unpack .../6-libreswan_5.2-2.2ubuntu1_s390x.deb ... 476s Unpacking libreswan (5.2-2.2ubuntu1) ... 476s Setting up libldns3t64:s390x (1.8.4-2build1) ... 476s Setting up libevent-pthreads-2.1-7t64:s390x (2.1.12-stable-10build1) ... 476s Setting up libevent-2.1-7t64:s390x (2.1.12-stable-10build1) ... 476s Setting up dns-root-data (2025080400) ... 476s Setting up libunbound8:s390x (1.24.2-1ubuntu1) ... 476s Setting up libnss3-tools (2:3.120-1) ... 476s Setting up libreswan (5.2-2.2ubuntu1) ... 478s ipsec.service is a disabled or a static unit, not starting it. 478s Processing triggers for man-db (2.13.1-1) ... 479s Processing triggers for libc-bin (2.42-2ubuntu4) ... 489s autopkgtest [12:44:48]: test cavp: [----------------------- 489s Testing installed CAVP binary: /usr/libexec/ipsec/cavp 493s test: IKE v2 493s Reading from ikev2.fax 502s test: IKE v1 Digital Signature Authentication 502s Reading from ikev1_dsa.fax 508s test: IKE v1 Pre-shared Key Authentication 508s Reading from ikev1_psk.fax 515s /tmp/autopkgtest.J4IDeo/build.zJk/src 516s autopkgtest [12:45:15]: test cavp: -----------------------] 517s cavp PASS 517s autopkgtest [12:45:16]: test cavp: - - - - - - - - - - results - - - - - - - - - - 518s autopkgtest [12:45:17]: @@@@@@@@@@@@@@@@@@@@ summary 518s opportunistic SKIP exit status 77 and marked as skippable 518s cryptocheck PASS 518s cavp PASS