0s autopkgtest [09:19:08]: starting date and time: 2026-02-04 09:19:08+0000 0s autopkgtest [09:19:08]: git checkout: 4b346b80 nova: make wait_reboot return success even when a no-op 0s autopkgtest [09:19:08]: host juju-7f2275-prod-proposed-migration-environment-20; command line: /home/ubuntu/autopkgtest/runner/autopkgtest --output-dir /tmp/autopkgtest-work.afxlcqio/out --timeout-copy=6000 --needs-internet=try --setup-commands /home/ubuntu/autopkgtest-cloud/worker-config-production/setup-canonical.sh --apt-pocket=proposed=src:debconf --apt-upgrade libreswan --timeout-short=300 --timeout-copy=20000 --timeout-build=20000 --env=ADT_TEST_TRIGGERS=debconf/1.5.91build1 -- ssh -s /home/ubuntu/autopkgtest/ssh-setup/nova -- --flavor autopkgtest-cpu2-ram4-disk20-s390x --security-groups autopkgtest-juju-7f2275-prod-proposed-migration-environment-20@sto01-s390x-8.secgroup --name adt-resolute-s390x-libreswan-20260204-091908-juju-7f2275-prod-proposed-migration-environment-20-1a5ee991-f772-4f21-8781-b29e8f104431 --image adt/ubuntu-resolute-s390x-server --keyname testbed-juju-7f2275-prod-proposed-migration-environment-20 --net-id=net_prod-autopkgtest-workers-s390x -e TERM=linux --mirror=http://ftpmaster.internal/ubuntu/ 4s Creating nova instance adt-resolute-s390x-libreswan-20260204-091908-juju-7f2275-prod-proposed-migration-environment-20-1a5ee991-f772-4f21-8781-b29e8f104431 from image adt/ubuntu-resolute-s390x-server-20260203.img (UUID 733879ca-10c9-4d0b-9d4a-492c78d47079)... 138s autopkgtest [09:21:26]: testbed dpkg architecture: s390x 138s autopkgtest [09:21:26]: testbed apt version: 3.1.14 138s autopkgtest [09:21:26]: @@@@@@@@@@@@@@@@@@@@ test bed setup 139s autopkgtest [09:21:27]: testbed release detected to be: None 141s autopkgtest [09:21:29]: updating testbed package index (apt update) 142s Get:1 http://ftpmaster.internal/ubuntu resolute-proposed InRelease [124 kB] 142s Hit:2 http://ftpmaster.internal/ubuntu resolute InRelease 142s Hit:3 http://ftpmaster.internal/ubuntu resolute-updates InRelease 142s Hit:4 http://ftpmaster.internal/ubuntu resolute-security InRelease 143s Get:5 http://ftpmaster.internal/ubuntu resolute-proposed/universe Sources [1695 kB] 143s Get:6 http://ftpmaster.internal/ubuntu resolute-proposed/multiverse Sources [35.1 kB] 143s Get:7 http://ftpmaster.internal/ubuntu resolute-proposed/main Sources [228 kB] 143s Get:8 http://ftpmaster.internal/ubuntu resolute-proposed/restricted Sources [5260 B] 143s Get:9 http://ftpmaster.internal/ubuntu resolute-proposed/main s390x Packages [257 kB] 143s Get:10 http://ftpmaster.internal/ubuntu resolute-proposed/universe s390x Packages [1448 kB] 143s Get:11 http://ftpmaster.internal/ubuntu resolute-proposed/multiverse s390x Packages [9648 B] 146s Fetched 3802 kB in 4s (1034 kB/s) 152s Reading package lists... 154s Hit:1 http://ftpmaster.internal/ubuntu resolute-proposed InRelease 154s Hit:2 http://ftpmaster.internal/ubuntu resolute InRelease 154s Hit:3 http://ftpmaster.internal/ubuntu resolute-updates InRelease 154s Hit:4 http://ftpmaster.internal/ubuntu resolute-security InRelease 160s Reading package lists... 160s Reading package lists... 161s Building dependency tree... 161s Reading state information... 162s Calculating upgrade... 163s The following packages will be upgraded: 163s debconf debconf-i18n htop libmd0 libzstd1 powermgmt-base python3-debconf 163s python3-lazr.restfulclient systemd-hwe-hwdb zstd 163s 10 upgraded, 0 newly installed, 0 to remove and 0 not upgraded. 163s Need to get 1700 kB of archives. 163s After this operation, 1024 B of additional disk space will be used. 163s Get:1 http://ftpmaster.internal/ubuntu resolute-proposed/main s390x python3-debconf all 1.5.91build1 [4174 B] 164s Get:2 http://ftpmaster.internal/ubuntu resolute-proposed/main s390x debconf-i18n all 1.5.91build1 [227 kB] 164s Get:3 http://ftpmaster.internal/ubuntu resolute-proposed/main s390x debconf all 1.5.91build1 [126 kB] 164s Get:4 http://ftpmaster.internal/ubuntu resolute/main s390x libmd0 s390x 1.1.0-2build4 [23.7 kB] 164s Get:5 http://ftpmaster.internal/ubuntu resolute/main s390x libzstd1 s390x 1.5.7+dfsg-3 [346 kB] 164s Get:6 http://ftpmaster.internal/ubuntu resolute/main s390x systemd-hwe-hwdb all 259.0.1 [3152 B] 164s Get:7 http://ftpmaster.internal/ubuntu resolute/main s390x powermgmt-base all 1.38ubuntu2 [7878 B] 164s Get:8 http://ftpmaster.internal/ubuntu resolute/main s390x htop s390x 3.4.1-5build2 [188 kB] 164s Get:9 http://ftpmaster.internal/ubuntu resolute/main s390x python3-lazr.restfulclient all 0.14.6-3build1 [51.1 kB] 164s Get:10 http://ftpmaster.internal/ubuntu resolute/main s390x zstd s390x 1.5.7+dfsg-3 [724 kB] 170s dpkg-preconfigure: unable to re-open stdin: No such file or directory 170s Fetched 1700 kB in 1s (1534 kB/s) 183s (Reading database ... (Reading database ... 5% (Reading database ... 10% (Reading database ... 15% (Reading database ... 20% (Reading database ... 25% (Reading database ... 30% (Reading database ... 35% (Reading database ... 40% (Reading database ... 45% (Reading database ... 50% (Reading database ... 55% (Reading database ... 60% (Reading database ... 65% (Reading database ... 70% (Reading database ... 75% (Reading database ... 80% (Reading database ... 85% (Reading database ... 90% (Reading database ... 95% (Reading database ... 100% (Reading database ... 61953 files and directories currently installed.) 183s Preparing to unpack .../python3-debconf_1.5.91build1_all.deb ... 184s Unpacking python3-debconf (1.5.91build1) over (1.5.91) ... 187s Preparing to unpack .../debconf-i18n_1.5.91build1_all.deb ... 189s Unpacking debconf-i18n (1.5.91build1) over (1.5.91) ... 197s Preparing to unpack .../debconf_1.5.91build1_all.deb ... 198s Unpacking debconf (1.5.91build1) over (1.5.91) ... 198s Setting up debconf (1.5.91build1) ... 201s (Reading database ... (Reading database ... 5% (Reading database ... 10% (Reading database ... 15% (Reading database ... 20% (Reading database ... 25% (Reading database ... 30% (Reading database ... 35% (Reading database ... 40% (Reading database ... 45% (Reading database ... 50% (Reading database ... 55% (Reading database ... 60% (Reading database ... 65% (Reading database ... 70% (Reading database ... 75% (Reading database ... 80% (Reading database ... 85% (Reading database ... 90% (Reading database ... 95% (Reading database ... 100% (Reading database ... 61953 files and directories currently installed.) 201s Preparing to unpack .../libmd0_1.1.0-2build4_s390x.deb ... 203s Unpacking libmd0:s390x (1.1.0-2build4) over (1.1.0-2build3) ... 203s Setting up libmd0:s390x (1.1.0-2build4) ... 206s (Reading database ... (Reading database ... 5% (Reading database ... 10% (Reading database ... 15% (Reading database ... 20% (Reading database ... 25% (Reading database ... 30% (Reading database ... 35% (Reading database ... 40% (Reading database ... 45% (Reading database ... 50% (Reading database ... 55% (Reading database ... 60% (Reading database ... 65% (Reading database ... 70% (Reading database ... 75% (Reading database ... 80% (Reading database ... 85% (Reading database ... 90% (Reading database ... 95% (Reading database ... 100% (Reading database ... 61953 files and directories currently installed.) 206s Preparing to unpack .../libzstd1_1.5.7+dfsg-3_s390x.deb ... 207s Unpacking libzstd1:s390x (1.5.7+dfsg-3) over (1.5.7+dfsg-2) ... 209s Setting up libzstd1:s390x (1.5.7+dfsg-3) ... 210s (Reading database ... (Reading database ... 5% (Reading database ... 10% (Reading database ... 15% (Reading database ... 20% (Reading database ... 25% (Reading database ... 30% (Reading database ... 35% (Reading database ... 40% (Reading database ... 45% (Reading database ... 50% (Reading database ... 55% (Reading database ... 60% (Reading database ... 65% (Reading database ... 70% (Reading database ... 75% (Reading database ... 80% (Reading database ... 85% (Reading database ... 90% (Reading database ... 95% (Reading database ... 100% (Reading database ... 61953 files and directories currently installed.) 210s Preparing to unpack .../systemd-hwe-hwdb_259.0.1_all.deb ... 211s Unpacking systemd-hwe-hwdb (259.0.1) over (257.7.1) ... 212s Preparing to unpack .../powermgmt-base_1.38ubuntu2_all.deb ... 212s Unpacking powermgmt-base (1.38ubuntu2) over (1.38ubuntu1) ... 215s Preparing to unpack .../htop_3.4.1-5build2_s390x.deb ... 215s Unpacking htop (3.4.1-5build2) over (3.4.1-5build1) ... 218s Preparing to unpack .../python3-lazr.restfulclient_0.14.6-3build1_all.deb ... 220s Unpacking python3-lazr.restfulclient (0.14.6-3build1) over (0.14.6-3) ... 222s Preparing to unpack .../zstd_1.5.7+dfsg-3_s390x.deb ... 222s Unpacking zstd (1.5.7+dfsg-3) over (1.5.7+dfsg-2) ... 223s Setting up powermgmt-base (1.38ubuntu2) ... 223s Setting up htop (3.4.1-5build2) ... 223s Setting up python3-debconf (1.5.91build1) ... 223s Setting up debconf-i18n (1.5.91build1) ... 224s Setting up systemd-hwe-hwdb (259.0.1) ... 229s Setting up python3-lazr.restfulclient (0.14.6-3build1) ... 230s Setting up zstd (1.5.7+dfsg-3) ... 231s Processing triggers for man-db (2.13.1-1) ... 270s Processing triggers for udev (259-1ubuntu3) ... 280s Processing triggers for libc-bin (2.42-2ubuntu4) ... 280s autopkgtest [09:23:48]: upgrading testbed (apt dist-upgrade and autopurge) 281s Reading package lists... 283s Building dependency tree... 283s Reading state information... 283s Calculating upgrade... 284s 0 upgraded, 0 newly installed, 0 to remove and 0 not upgraded. 285s Reading package lists... 286s Building dependency tree... 286s Reading state information... 287s Solving dependencies... 288s 0 upgraded, 0 newly installed, 0 to remove and 0 not upgraded. 295s autopkgtest [09:24:03]: testbed running kernel: Linux 6.18.0-9-generic #9-Ubuntu SMP Mon Jan 12 15:39:23 UTC 2026 295s autopkgtest [09:24:03]: @@@@@@@@@@@@@@@@@@@@ apt-source libreswan 303s Get:1 http://ftpmaster.internal/ubuntu resolute/universe libreswan 5.2-2.2ubuntu1 (dsc) [2735 B] 303s Get:2 http://ftpmaster.internal/ubuntu resolute/universe libreswan 5.2-2.2ubuntu1 (tar) [4132 kB] 303s Get:3 http://ftpmaster.internal/ubuntu resolute/universe libreswan 5.2-2.2ubuntu1 (asc) [862 B] 303s Get:4 http://ftpmaster.internal/ubuntu resolute/universe libreswan 5.2-2.2ubuntu1 (diff) [16.7 kB] 306s gpgv: Signature made Thu Jul 31 14:30:12 2025 UTC 306s gpgv: using RSA key 25E3FF2D7F469DBE7D0D4E50AFCFEC8E669CE1C2 306s gpgv: Can't check signature: No public key 306s dpkg-source: warning: cannot verify inline signature for ./libreswan_5.2-2.2ubuntu1.dsc: no acceptable signature found 312s autopkgtest [09:24:20]: testing package libreswan version 5.2-2.2ubuntu1 312s autopkgtest [09:24:20]: build not needed 319s autopkgtest [09:24:27]: test opportunistic: preparing testbed 321s Reading package lists... 322s Building dependency tree... 322s Reading state information... 323s Solving dependencies... 324s The following NEW packages will be installed: 324s dns-root-data libevent-2.1-7t64 libevent-pthreads-2.1-7t64 libldns3t64 324s libnss3-tools libreswan libunbound8 324s 0 upgraded, 7 newly installed, 0 to remove and 0 not upgraded. 324s Need to get 2943 kB of archives. 324s After this operation, 11.8 MB of additional disk space will be used. 324s Get:1 http://ftpmaster.internal/ubuntu resolute/main s390x dns-root-data all 2025080400build1 [6022 B] 324s Get:2 http://ftpmaster.internal/ubuntu resolute/main s390x libnss3-tools s390x 2:3.120-1 [637 kB] 325s Get:3 http://ftpmaster.internal/ubuntu resolute/main s390x libevent-pthreads-2.1-7t64 s390x 2.1.12-stable-10build1 [8060 B] 325s Get:4 http://ftpmaster.internal/ubuntu resolute/universe s390x libldns3t64 s390x 1.8.4-2build1 [170 kB] 325s Get:5 http://ftpmaster.internal/ubuntu resolute/main s390x libevent-2.1-7t64 s390x 2.1.12-stable-10build1 [144 kB] 325s Get:6 http://ftpmaster.internal/ubuntu resolute/main s390x libunbound8 s390x 1.24.2-1ubuntu1 [464 kB] 325s Get:7 http://ftpmaster.internal/ubuntu resolute/universe s390x libreswan s390x 5.2-2.2ubuntu1 [1515 kB] 327s Fetched 2943 kB in 1s (4551 kB/s) 327s Selecting previously unselected package dns-root-data. 327s (Reading database ... (Reading database ... 5% (Reading database ... 10% (Reading database ... 15% (Reading database ... 20% (Reading database ... 25% (Reading database ... 30% (Reading database ... 35% (Reading database ... 40% (Reading database ... 45% (Reading database ... 50% (Reading database ... 55% (Reading database ... 60% (Reading database ... 65% (Reading database ... 70% (Reading database ... 75% (Reading database ... 80% (Reading database ... 85% (Reading database ... 90% (Reading database ... 95% (Reading database ... 100% (Reading database ... 61954 files and directories currently installed.) 327s Preparing to unpack .../0-dns-root-data_2025080400build1_all.deb ... 327s Unpacking dns-root-data (2025080400build1) ... 327s Selecting previously unselected package libnss3-tools. 327s Preparing to unpack .../1-libnss3-tools_2%3a3.120-1_s390x.deb ... 327s Unpacking libnss3-tools (2:3.120-1) ... 328s Selecting previously unselected package libevent-pthreads-2.1-7t64:s390x. 328s Preparing to unpack .../2-libevent-pthreads-2.1-7t64_2.1.12-stable-10build1_s390x.deb ... 328s Unpacking libevent-pthreads-2.1-7t64:s390x (2.1.12-stable-10build1) ... 328s Selecting previously unselected package libldns3t64:s390x. 328s Preparing to unpack .../3-libldns3t64_1.8.4-2build1_s390x.deb ... 328s Unpacking libldns3t64:s390x (1.8.4-2build1) ... 329s Selecting previously unselected package libevent-2.1-7t64:s390x. 329s Preparing to unpack .../4-libevent-2.1-7t64_2.1.12-stable-10build1_s390x.deb ... 329s Unpacking libevent-2.1-7t64:s390x (2.1.12-stable-10build1) ... 329s Selecting previously unselected package libunbound8:s390x. 329s Preparing to unpack .../5-libunbound8_1.24.2-1ubuntu1_s390x.deb ... 329s Unpacking libunbound8:s390x (1.24.2-1ubuntu1) ... 329s Selecting previously unselected package libreswan. 329s Preparing to unpack .../6-libreswan_5.2-2.2ubuntu1_s390x.deb ... 329s Unpacking libreswan (5.2-2.2ubuntu1) ... 331s Setting up libldns3t64:s390x (1.8.4-2build1) ... 331s Setting up libevent-pthreads-2.1-7t64:s390x (2.1.12-stable-10build1) ... 331s Setting up libevent-2.1-7t64:s390x (2.1.12-stable-10build1) ... 331s Setting up dns-root-data (2025080400build1) ... 331s Setting up libunbound8:s390x (1.24.2-1ubuntu1) ... 331s Setting up libnss3-tools (2:3.120-1) ... 331s Setting up libreswan (5.2-2.2ubuntu1) ... 335s ipsec.service is a disabled or a static unit, not starting it. 335s Processing triggers for man-db (2.13.1-1) ... 358s Processing triggers for libc-bin (2.42-2ubuntu4) ... 362s autopkgtest [09:25:10]: test opportunistic: [----------------------- 365s ping: oe.libreswan.org: No address associated with hostname 367s autopkgtest [09:25:15]: test opportunistic: -----------------------] 368s opportunistic SKIP exit status 77 and marked as skippable 368s autopkgtest [09:25:16]: test opportunistic: - - - - - - - - - - results - - - - - - - - - - 369s autopkgtest [09:25:17]: test cryptocheck: preparing testbed 400s Creating nova instance adt-resolute-s390x-libreswan-20260204-091908-juju-7f2275-prod-proposed-migration-environment-20-1a5ee991-f772-4f21-8781-b29e8f104431 from image adt/ubuntu-resolute-s390x-server-20260203.img (UUID 733879ca-10c9-4d0b-9d4a-492c78d47079)... 500s autopkgtest [09:27:28]: testbed dpkg architecture: s390x 500s autopkgtest [09:27:28]: testbed apt version: 3.1.14 501s autopkgtest [09:27:29]: @@@@@@@@@@@@@@@@@@@@ test bed setup 501s autopkgtest [09:27:29]: testbed release detected to be: resolute 503s autopkgtest [09:27:31]: updating testbed package index (apt update) 503s Get:1 http://ftpmaster.internal/ubuntu resolute-proposed InRelease [124 kB] 504s Hit:2 http://ftpmaster.internal/ubuntu resolute InRelease 504s Hit:3 http://ftpmaster.internal/ubuntu resolute-updates InRelease 504s Hit:4 http://ftpmaster.internal/ubuntu resolute-security InRelease 504s Get:5 http://ftpmaster.internal/ubuntu resolute-proposed/main Sources [229 kB] 504s Get:6 http://ftpmaster.internal/ubuntu resolute-proposed/restricted Sources [5260 B] 504s Get:7 http://ftpmaster.internal/ubuntu resolute-proposed/multiverse Sources [35.1 kB] 504s Get:8 http://ftpmaster.internal/ubuntu resolute-proposed/universe Sources [1720 kB] 504s Get:9 http://ftpmaster.internal/ubuntu resolute-proposed/main s390x Packages [257 kB] 505s Get:10 http://ftpmaster.internal/ubuntu resolute-proposed/universe s390x Packages [1449 kB] 505s Get:11 http://ftpmaster.internal/ubuntu resolute-proposed/multiverse s390x Packages [9648 B] 507s Fetched 3830 kB in 3s (1270 kB/s) 511s Reading package lists... 512s Hit:1 http://ftpmaster.internal/ubuntu resolute-proposed InRelease 512s Hit:2 http://ftpmaster.internal/ubuntu resolute InRelease 512s Hit:3 http://ftpmaster.internal/ubuntu resolute-updates InRelease 512s Hit:4 http://ftpmaster.internal/ubuntu resolute-security InRelease 517s Reading package lists... 518s Reading package lists... 520s Building dependency tree... 520s Reading state information... 520s Calculating upgrade... 520s The following packages will be upgraded: 520s debconf debconf-i18n htop libmd0 libzstd1 powermgmt-base python3-debconf 520s python3-lazr.restfulclient systemd-hwe-hwdb zstd 521s 10 upgraded, 0 newly installed, 0 to remove and 0 not upgraded. 521s Need to get 1700 kB of archives. 521s After this operation, 1024 B of additional disk space will be used. 521s Get:1 http://ftpmaster.internal/ubuntu resolute-proposed/main s390x python3-debconf all 1.5.91build1 [4174 B] 521s Get:2 http://ftpmaster.internal/ubuntu resolute-proposed/main s390x debconf-i18n all 1.5.91build1 [227 kB] 521s Get:3 http://ftpmaster.internal/ubuntu resolute-proposed/main s390x debconf all 1.5.91build1 [126 kB] 521s Get:4 http://ftpmaster.internal/ubuntu resolute/main s390x libmd0 s390x 1.1.0-2build4 [23.7 kB] 521s Get:5 http://ftpmaster.internal/ubuntu resolute/main s390x libzstd1 s390x 1.5.7+dfsg-3 [346 kB] 521s Get:6 http://ftpmaster.internal/ubuntu resolute/main s390x systemd-hwe-hwdb all 259.0.1 [3152 B] 521s Get:7 http://ftpmaster.internal/ubuntu resolute/main s390x powermgmt-base all 1.38ubuntu2 [7878 B] 521s Get:8 http://ftpmaster.internal/ubuntu resolute/main s390x htop s390x 3.4.1-5build2 [188 kB] 521s Get:9 http://ftpmaster.internal/ubuntu resolute/main s390x python3-lazr.restfulclient all 0.14.6-3build1 [51.1 kB] 521s Get:10 http://ftpmaster.internal/ubuntu resolute/main s390x zstd s390x 1.5.7+dfsg-3 [724 kB] 523s dpkg-preconfigure: unable to re-open stdin: No such file or directory 524s Fetched 1700 kB in 1s (2950 kB/s) 525s (Reading database ... (Reading database ... 5% (Reading database ... 10% (Reading database ... 15% (Reading database ... 20% (Reading database ... 25% (Reading database ... 30% (Reading database ... 35% (Reading database ... 40% (Reading database ... 45% (Reading database ... 50% (Reading database ... 55% (Reading database ... 60% (Reading database ... 65% (Reading database ... 70% (Reading database ... 75% (Reading database ... 80% (Reading database ... 85% (Reading database ... 90% (Reading database ... 95% (Reading database ... 100% (Reading database ... 61953 files and directories currently installed.) 525s Preparing to unpack .../python3-debconf_1.5.91build1_all.deb ... 525s Unpacking python3-debconf (1.5.91build1) over (1.5.91) ... 525s Preparing to unpack .../debconf-i18n_1.5.91build1_all.deb ... 526s Unpacking debconf-i18n (1.5.91build1) over (1.5.91) ... 528s Preparing to unpack .../debconf_1.5.91build1_all.deb ... 528s Unpacking debconf (1.5.91build1) over (1.5.91) ... 528s Setting up debconf (1.5.91build1) ... 530s (Reading database ... (Reading database ... 5% (Reading database ... 10% (Reading database ... 15% (Reading database ... 20% (Reading database ... 25% (Reading database ... 30% (Reading database ... 35% (Reading database ... 40% (Reading database ... 45% (Reading database ... 50% (Reading database ... 55% (Reading database ... 60% (Reading database ... 65% (Reading database ... 70% (Reading database ... 75% (Reading database ... 80% (Reading database ... 85% (Reading database ... 90% (Reading database ... 95% (Reading database ... 100% (Reading database ... 61953 files and directories currently installed.) 530s Preparing to unpack .../libmd0_1.1.0-2build4_s390x.deb ... 531s Unpacking libmd0:s390x (1.1.0-2build4) over (1.1.0-2build3) ... 531s Setting up libmd0:s390x (1.1.0-2build4) ... 531s (Reading database ... (Reading database ... 5% (Reading database ... 10% (Reading database ... 15% (Reading database ... 20% (Reading database ... 25% (Reading database ... 30% (Reading database ... 35% (Reading database ... 40% (Reading database ... 45% (Reading database ... 50% (Reading database ... 55% (Reading database ... 60% (Reading database ... 65% (Reading database ... 70% (Reading database ... 75% (Reading database ... 80% (Reading database ... 85% (Reading database ... 90% (Reading database ... 95% (Reading database ... 100% (Reading database ... 61953 files and directories currently installed.) 531s Preparing to unpack .../libzstd1_1.5.7+dfsg-3_s390x.deb ... 531s Unpacking libzstd1:s390x (1.5.7+dfsg-3) over (1.5.7+dfsg-2) ... 531s Setting up libzstd1:s390x (1.5.7+dfsg-3) ... 532s (Reading database ... (Reading database ... 5% (Reading database ... 10% (Reading database ... 15% (Reading database ... 20% (Reading database ... 25% (Reading database ... 30% (Reading database ... 35% (Reading database ... 40% (Reading database ... 45% (Reading database ... 50% (Reading database ... 55% (Reading database ... 60% (Reading database ... 65% (Reading database ... 70% (Reading database ... 75% (Reading database ... 80% (Reading database ... 85% (Reading database ... 90% (Reading database ... 95% (Reading database ... 100% (Reading database ... 61953 files and directories currently installed.) 532s Preparing to unpack .../systemd-hwe-hwdb_259.0.1_all.deb ... 532s Unpacking systemd-hwe-hwdb (259.0.1) over (257.7.1) ... 535s Preparing to unpack .../powermgmt-base_1.38ubuntu2_all.deb ... 535s Unpacking powermgmt-base (1.38ubuntu2) over (1.38ubuntu1) ... 536s Preparing to unpack .../htop_3.4.1-5build2_s390x.deb ... 536s Unpacking htop (3.4.1-5build2) over (3.4.1-5build1) ... 537s Preparing to unpack .../python3-lazr.restfulclient_0.14.6-3build1_all.deb ... 538s Unpacking python3-lazr.restfulclient (0.14.6-3build1) over (0.14.6-3) ... 539s Preparing to unpack .../zstd_1.5.7+dfsg-3_s390x.deb ... 540s Unpacking zstd (1.5.7+dfsg-3) over (1.5.7+dfsg-2) ... 541s Setting up powermgmt-base (1.38ubuntu2) ... 541s Setting up htop (3.4.1-5build2) ... 541s Setting up python3-debconf (1.5.91build1) ... 542s Setting up debconf-i18n (1.5.91build1) ... 542s Setting up systemd-hwe-hwdb (259.0.1) ... 546s Setting up python3-lazr.restfulclient (0.14.6-3build1) ... 547s Setting up zstd (1.5.7+dfsg-3) ... 548s Processing triggers for man-db (2.13.1-1) ... 564s Processing triggers for udev (259-1ubuntu3) ... 567s Processing triggers for libc-bin (2.42-2ubuntu4) ... 568s autopkgtest [09:28:36]: upgrading testbed (apt dist-upgrade and autopurge) 568s Reading package lists... 569s Building dependency tree... 569s Reading state information... 570s Calculating upgrade... 571s 0 upgraded, 0 newly installed, 0 to remove and 0 not upgraded. 572s Reading package lists... 574s Building dependency tree... 574s Reading state information... 574s Solving dependencies... 575s 0 upgraded, 0 newly installed, 0 to remove and 0 not upgraded. 582s Reading package lists... 583s Building dependency tree... 583s Reading state information... 584s Solving dependencies... 585s The following NEW packages will be installed: 585s dns-root-data libevent-2.1-7t64 libevent-pthreads-2.1-7t64 libldns3t64 585s libnss3-tools libreswan libunbound8 585s 0 upgraded, 7 newly installed, 0 to remove and 0 not upgraded. 585s Need to get 2943 kB of archives. 585s After this operation, 11.8 MB of additional disk space will be used. 585s Get:1 http://ftpmaster.internal/ubuntu resolute/main s390x dns-root-data all 2025080400build1 [6022 B] 586s Get:2 http://ftpmaster.internal/ubuntu resolute/main s390x libnss3-tools s390x 2:3.120-1 [637 kB] 586s Get:3 http://ftpmaster.internal/ubuntu resolute/main s390x libevent-pthreads-2.1-7t64 s390x 2.1.12-stable-10build1 [8060 B] 586s Get:4 http://ftpmaster.internal/ubuntu resolute/universe s390x libldns3t64 s390x 1.8.4-2build1 [170 kB] 586s Get:5 http://ftpmaster.internal/ubuntu resolute/main s390x libevent-2.1-7t64 s390x 2.1.12-stable-10build1 [144 kB] 586s Get:6 http://ftpmaster.internal/ubuntu resolute/main s390x libunbound8 s390x 1.24.2-1ubuntu1 [464 kB] 586s Get:7 http://ftpmaster.internal/ubuntu resolute/universe s390x libreswan s390x 5.2-2.2ubuntu1 [1515 kB] 589s Fetched 2943 kB in 1s (3291 kB/s) 589s Selecting previously unselected package dns-root-data. 589s (Reading database ... (Reading database ... 5% (Reading database ... 10% (Reading database ... 15% (Reading database ... 20% (Reading database ... 25% (Reading database ... 30% (Reading database ... 35% (Reading database ... 40% (Reading database ... 45% (Reading database ... 50% (Reading database ... 55% (Reading database ... 60% (Reading database ... 65% (Reading database ... 70% (Reading database ... 75% (Reading database ... 80% (Reading database ... 85% (Reading database ... 90% (Reading database ... 95% (Reading database ... 100% (Reading database ... 61954 files and directories currently installed.) 589s Preparing to unpack .../0-dns-root-data_2025080400build1_all.deb ... 589s Unpacking dns-root-data (2025080400build1) ... 589s Selecting previously unselected package libnss3-tools. 589s Preparing to unpack .../1-libnss3-tools_2%3a3.120-1_s390x.deb ... 589s Unpacking libnss3-tools (2:3.120-1) ... 589s Selecting previously unselected package libevent-pthreads-2.1-7t64:s390x. 589s Preparing to unpack .../2-libevent-pthreads-2.1-7t64_2.1.12-stable-10build1_s390x.deb ... 589s Unpacking libevent-pthreads-2.1-7t64:s390x (2.1.12-stable-10build1) ... 589s Selecting previously unselected package libldns3t64:s390x. 589s Preparing to unpack .../3-libldns3t64_1.8.4-2build1_s390x.deb ... 589s Unpacking libldns3t64:s390x (1.8.4-2build1) ... 589s Selecting previously unselected package libevent-2.1-7t64:s390x. 589s Preparing to unpack .../4-libevent-2.1-7t64_2.1.12-stable-10build1_s390x.deb ... 589s Unpacking libevent-2.1-7t64:s390x (2.1.12-stable-10build1) ... 589s Selecting previously unselected package libunbound8:s390x. 589s Preparing to unpack .../5-libunbound8_1.24.2-1ubuntu1_s390x.deb ... 589s Unpacking libunbound8:s390x (1.24.2-1ubuntu1) ... 589s Selecting previously unselected package libreswan. 589s Preparing to unpack .../6-libreswan_5.2-2.2ubuntu1_s390x.deb ... 589s Unpacking libreswan (5.2-2.2ubuntu1) ... 590s Setting up libldns3t64:s390x (1.8.4-2build1) ... 590s Setting up libevent-pthreads-2.1-7t64:s390x (2.1.12-stable-10build1) ... 590s Setting up libevent-2.1-7t64:s390x (2.1.12-stable-10build1) ... 590s Setting up dns-root-data (2025080400build1) ... 590s Setting up libunbound8:s390x (1.24.2-1ubuntu1) ... 590s Setting up libnss3-tools (2:3.120-1) ... 590s Setting up libreswan (5.2-2.2ubuntu1) ... 591s ipsec.service is a disabled or a static unit, not starting it. 591s Processing triggers for man-db (2.13.1-1) ... 599s Processing triggers for libc-bin (2.42-2ubuntu4) ... 633s autopkgtest [09:29:41]: test cryptocheck: [----------------------- 634s Testing installed binary: /usr/libexec/ipsec/algparse 634s Testing installed binary: /usr/libexec/ipsec/pluto 634s testing -tp 634s algparse -v2 'esp' (expect SUCCESS) 634s AES_GCM_16_256-NONE 634s AES_GCM_16_128-NONE 634s CHACHA20_POLY1305-NONE 634s AES_CBC_256-HMAC_SHA2_512_256+HMAC_SHA2_256_128 634s AES_CBC_128-HMAC_SHA2_512_256+HMAC_SHA2_256_128 634s algparse -v2 'esp=' (expect ERROR) 634s ERROR: ESP proposal is empty 634s algparse -v2 'esp=aes' (expect SUCCESS) 634s AES_CBC-HMAC_SHA2_512_256+HMAC_SHA2_256_128 634s algparse -v2 'esp=aes;modp2048' (expect SUCCESS) 634s AES_CBC-HMAC_SHA2_512_256+HMAC_SHA2_256_128 634s algparse -v2 'esp=aes-sha1' (expect SUCCESS) 634s AES_CBC-HMAC_SHA1_96 634s algparse -v2 'esp=aes-sha1' (expect SUCCESS) 634s AES_CBC-HMAC_SHA1_96 634s algparse -v2 'esp=aes-sha1-modp2048' (expect SUCCESS) 634s AES_CBC-HMAC_SHA1_96 634s algparse -v2 'esp=aes-128-sha1' (expect SUCCESS) 634s AES_CBC_128-HMAC_SHA1_96 634s algparse -v2 'esp=aes-128-sha1' (expect SUCCESS) 634s AES_CBC_128-HMAC_SHA1_96 634s algparse -v2 'esp=aes-128-sha1-modp2048' (expect SUCCESS) 634s AES_CBC_128-HMAC_SHA1_96 634s algparse -v2 'esp=aes-128' (expect SUCCESS) 634s AES_CBC_128-HMAC_SHA2_512_256+HMAC_SHA2_256_128 634s algparse -v2 'esp=aes_gcm_a-128-null' (expect SUCCESS) 634s AES_GCM_8_128-NONE 634s algparse -v2 'esp=3des-sha1;modp1024' (expect ERROR) 634s ERROR: ESP DH algorithm 'modp1024' is not supported 634s algparse -v2 'esp=3des-sha1;modp1536' (expect SUCCESS) 634s 3DES_CBC-HMAC_SHA1_96 634s algparse -v2 'esp=3des-sha1;modp2048' (expect SUCCESS) 634s 3DES_CBC-HMAC_SHA1_96 634s algparse -v2 'esp=3des-sha1;dh21' (expect SUCCESS) 634s 3DES_CBC-HMAC_SHA1_96 634s algparse -v2 'esp=3des-sha1;ecp_521' (expect SUCCESS) 634s 3DES_CBC-HMAC_SHA1_96 634s algparse -v2 'esp=3des-sha1;dh23' (expect ERROR) 634s ERROR: ESP DH algorithm 'dh23' is not supported 634s algparse -v2 'esp=3des-sha1;dh24' (expect ERROR) 634s ERROR: ESP DH algorithm 'dh24' is not supported 634s algparse -v2 'esp=3des-sha1' (expect SUCCESS) 634s 3DES_CBC-HMAC_SHA1_96 634s algparse -v2 'esp=null-sha1' (expect SUCCESS) 634s NULL-HMAC_SHA1_96 634s algparse -v2 'esp=aes_cbc' (expect SUCCESS) 634s AES_CBC-HMAC_SHA2_512_256+HMAC_SHA2_256_128 634s algparse -v2 'esp=aes-sha' (expect SUCCESS) 634s AES_CBC-HMAC_SHA1_96 634s algparse -v2 'esp=aes-sha1' (expect SUCCESS) 634s AES_CBC-HMAC_SHA1_96 634s algparse -v2 'esp=aes128-sha1' (expect SUCCESS) 634s AES_CBC_128-HMAC_SHA1_96 634s algparse -v2 'esp=aes-sha2' (expect SUCCESS) 634s AES_CBC-HMAC_SHA2_256_128 634s algparse -v2 'esp=aes-sha256' (expect SUCCESS) 634s AES_CBC-HMAC_SHA2_256_128 634s algparse -v2 'esp=aes-sha384' (expect SUCCESS) 634s AES_CBC-HMAC_SHA2_384_192 634s algparse -v2 'esp=aes-sha512' (expect SUCCESS) 634s AES_CBC-HMAC_SHA2_512_256 634s algparse -v2 'esp=aes128-aes_xcbc' (expect SUCCESS) 634s AES_CBC_128-AES_XCBC_96 634s algparse -v2 'esp=aes192-sha1' (expect SUCCESS) 634s AES_CBC_192-HMAC_SHA1_96 634s algparse -v2 'esp=aes256-sha1' (expect SUCCESS) 634s AES_CBC_256-HMAC_SHA1_96 634s algparse -v2 'esp=aes256-sha' (expect SUCCESS) 634s AES_CBC_256-HMAC_SHA1_96 634s algparse -v2 'esp=aes256-sha2' (expect SUCCESS) 634s AES_CBC_256-HMAC_SHA2_256_128 634s algparse -v2 'esp=aes256-sha2_256' (expect SUCCESS) 634s AES_CBC_256-HMAC_SHA2_256_128 634s algparse -v2 'esp=aes256-sha2_384' (expect SUCCESS) 634s AES_CBC_256-HMAC_SHA2_384_192 634s algparse -v2 'esp=aes256-sha2_512' (expect SUCCESS) 634s AES_CBC_256-HMAC_SHA2_512_256 634s algparse -v2 'esp=camellia' (expect SUCCESS) 634s CAMELLIA_CBC-HMAC_SHA2_512_256+HMAC_SHA2_256_128 634s algparse -v2 'esp=camellia128' (expect SUCCESS) 634s CAMELLIA_CBC_128-HMAC_SHA2_512_256+HMAC_SHA2_256_128 634s algparse -v2 'esp=camellia192' (expect SUCCESS) 634s CAMELLIA_CBC_192-HMAC_SHA2_512_256+HMAC_SHA2_256_128 634s algparse -v2 'esp=camellia256' (expect SUCCESS) 634s CAMELLIA_CBC_256-HMAC_SHA2_512_256+HMAC_SHA2_256_128 634s algparse -v2 'esp=aes_ccm' (expect SUCCESS) 634s AES_CCM_16-NONE 634s algparse -v2 'esp=aes_ccm_a-128-null' (expect SUCCESS) 634s AES_CCM_8_128-NONE 634s algparse -v2 'esp=aes_ccm_a-192-null' (expect SUCCESS) 634s AES_CCM_8_192-NONE 634s algparse -v2 'esp=aes_ccm_a-256-null' (expect SUCCESS) 634s AES_CCM_8_256-NONE 634s algparse -v2 'esp=aes_ccm_b-128-null' (expect SUCCESS) 634s AES_CCM_12_128-NONE 634s algparse -v2 'esp=aes_ccm_b-192-null' (expect SUCCESS) 634s AES_CCM_12_192-NONE 634s algparse -v2 'esp=aes_ccm_b-256-null' (expect SUCCESS) 634s AES_CCM_12_256-NONE 634s algparse -v2 'esp=aes_ccm_c-128-null' (expect SUCCESS) 634s ipsec algparse: Encryption algorithms: 634s ipsec algparse: AES_CCM_16 {256,192,*128} IKEv1: ESP IKEv2: ESP FIPS aes_ccm, aes_ccm_c 634s ipsec algparse: AES_CCM_12 {256,192,*128} IKEv1: ESP IKEv2: ESP FIPS aes_ccm_b 634s ipsec algparse: AES_CCM_8 {256,192,*128} IKEv1: ESP IKEv2: ESP FIPS aes_ccm_a 634s ipsec algparse: 3DES_CBC [*192] IKEv1: IKE ESP IKEv2: IKE ESP FIPS NSS(CBC) 3des 634s ipsec algparse: CAMELLIA_CTR {256,192,*128} IKEv1: ESP IKEv2: ESP 634s ipsec algparse: CAMELLIA_CBC {256,192,*128} IKEv1: IKE ESP IKEv2: IKE ESP NSS(CBC) camellia 634s ipsec algparse: AES_GCM_16 {256,192,*128} IKEv1: ESP IKEv2: IKE ESP FIPS NSS(AEAD) aes_gcm, aes_gcm_c 634s ipsec algparse: AES_GCM_12 {256,192,*128} IKEv1: ESP IKEv2: IKE ESP FIPS NSS(AEAD) aes_gcm_b 634s ipsec algparse: AES_GCM_8 {256,192,*128} IKEv1: ESP IKEv2: IKE ESP FIPS NSS(AEAD) aes_gcm_a 634s ipsec algparse: AES_CTR {256,192,*128} IKEv1: IKE ESP IKEv2: IKE ESP FIPS NSS(CTR) aesctr 634s ipsec algparse: AES_CBC {256,192,*128} IKEv1: IKE ESP IKEv2: IKE ESP FIPS NSS(CBC) aes 634s ipsec algparse: NULL_AUTH_AES_GMAC {256,192,*128} IKEv1: ESP IKEv2: ESP FIPS aes_gmac 634s ipsec algparse: NULL [] IKEv1: ESP IKEv2: ESP NULL 634s ipsec algparse: CHACHA20_POLY1305 [*256] IKEv1: IKEv2: IKE ESP NSS(AEAD) chacha20poly1305 634s ipsec algparse: Hash algorithms: 634s ipsec algparse: MD5 IKEv1: IKE IKEv2: NSS 634s ipsec algparse: SHA1 IKEv1: IKE IKEv2: IKE FIPS NSS sha 634s ipsec algparse: SHA2_256 IKEv1: IKE IKEv2: IKE FIPS NSS sha2, sha256 634s ipsec algparse: SHA2_384 IKEv1: IKE IKEv2: IKE FIPS NSS sha384 634s ipsec algparse: SHA2_512 IKEv1: IKE IKEv2: IKE FIPS NSS sha512 634s ipsec algparse: IDENTITY IKEv1: IKEv2: FIPS 634s ipsec algparse: PRF algorithms: 634s ipsec algparse: HMAC_MD5 IKEv1: IKE IKEv2: IKE NSS md5 634s ipsec algparse: HMAC_SHA1 IKEv1: IKE IKEv2: IKE FIPS NSS sha, sha1 634s ipsec algparse: HMAC_SHA2_256 IKEv1: IKE IKEv2: IKE FIPS NSS sha2, sha256, sha2_256 634s ipsec algparse: HMAC_SHA2_384 IKEv1: IKE IKEv2: IKE FIPS NSS sha384, sha2_384 634s ipsec algparse: HMAC_SHA2_512 IKEv1: IKE IKEv2: IKE FIPS NSS sha512, sha2_512 634s ipsec algparse: AES_XCBC IKEv1: IKEv2: IKE native(XCBC) aes128_xcbc 634s ipsec algparse: Integrity algorithms: 634s ipsec algparse: HMAC_MD5_96 IKEv1: IKE ESP AH IKEv2: IKE ESP AH NSS md5, hmac_md5 634s ipsec algparse: HMAC_SHA1_96 IKEv1: IKE ESP AH IKEv2: IKE ESP AH FIPS NSS sha, sha1, sha1_96, hmac_sha1 634s ipsec algparse: HMAC_SHA2_512_256 IKEv1: IKE ESP AH IKEv2: IKE ESP AH FIPS NSS sha512, sha2_512, sha2_512_256, hmac_sha2_512 634s ipsec algparse: HMAC_SHA2_384_192 IKEv1: IKE ESP AH IKEv2: IKE ESP AH FIPS NSS sha384, sha2_384, sha2_384_192, hmac_sha2_384 634s ipsec algparse: HMAC_SHA2_256_128 IKEv1: IKE ESP AH IKEv2: IKE ESP AH FIPS NSS sha2, sha256, sha2_256, sha2_256_128, hmac_sha2_256 634s ipsec algparse: HMAC_SHA2_256_TRUNCBUG IKEv1: ESP AH IKEv2: AH 634s ipsec algparse: AES_XCBC_96 IKEv1: ESP AH IKEv2: IKE ESP AH native(XCBC) aes_xcbc, aes128_xcbc, aes128_xcbc_96 634s ipsec algparse: AES_CMAC_96 IKEv1: ESP AH IKEv2: ESP AH FIPS aes_cmac 634s ipsec algparse: NONE IKEv1: ESP IKEv2: IKE ESP FIPS null 634s ipsec algparse: DH algorithms: 634s ipsec algparse: NONE IKEv1: IKEv2: IKE ESP AH FIPS NSS(MODP) null, dh0 634s ipsec algparse: MODP1536 IKEv1: IKE ESP AH IKEv2: IKE ESP AH NSS(MODP) dh5 634s ipsec algparse: MODP2048 IKEv1: IKE ESP AH IKEv2: IKE ESP AH FIPS NSS(MODP) dh14 634s ipsec algparse: MODP3072 IKEv1: IKE ESP AH IKEv2: IKE ESP AH FIPS NSS(MODP) dh15 634s ipsec algparse: MODP4096 IKEv1: IKE ESP AH IKEv2: IKE ESP AH FIPS NSS(MODP) dh16 634s ipsec algparse: MODP6144 IKEv1: IKE ESP AH IKEv2: IKE ESP AH FIPS NSS(MODP) dh17 634s ipsec algparse: MODP8192 IKEv1: IKE ESP AH IKEv2: IKE ESP AH FIPS NSS(MODP) dh18 634s ipsec algparse: DH19 IKEv1: IKE IKEv2: IKE ESP AH FIPS NSS(ECP) ecp_256, ecp256 634s ipsec algparse: DH20 IKEv1: IKE IKEv2: IKE ESP AH FIPS NSS(ECP) ecp_384, ecp384 634s ipsec algparse: DH21 IKEv1: IKE IKEv2: IKE ESP AH FIPS NSS(ECP) ecp_521, ecp521 634s ipsec algparse: DH31 IKEv1: IKE IKEv2: IKE ESP AH NSS(ECP) curve25519 634s ipsec algparse: IPCOMP algorithms: 634s ipsec algparse: DEFLATE IKEv1: ESP AH IKEv2: ESP AH FIPS 634s ipsec algparse: LZS IKEv1: IKEv2: ESP AH FIPS 634s ipsec algparse: LZJH IKEv1: IKEv2: ESP AH FIPS 634s | parsing 'AES_GCM_16_256,AES_GCM_16_128,CHACHA20_POLY1305,AES_CBC_256,AES_CBC_128' for ESP 634s | proposal: 'AES_GCM_16_256' 634s | token: '' '' "AES_GCM_16_256" '' 634s | token: '' "AES_GCM_16_256" '' '' 634s | ike_alg_byname() failed: ESP encryption algorithm 'AES_GCM_16_256' is not recognized 634s | token: '' '' '' 634s | appending ESP encryption algorithm AES_GCM_16[_256] 634s | appending ESP integrity algorithm NONE[_0] 634s | proposal: 'AES_GCM_16_128' 634s | token: '' '' "AES_GCM_16_128" '' 634s | token: '' "AES_GCM_16_128" '' '' 634s | ike_alg_byname() failed: ESP encryption algorithm 'AES_GCM_16_128' is not recognized 634s | token: '' '' '' 634s | appending ESP encryption algorithm AES_GCM_16[_128] 634s | appending ESP integrity algorithm NONE[_0] 634s | proposal: 'CHACHA20_POLY1305' 634s | token: '' '' "CHACHA20_POLY1305" '' 634s | token: '' "CHACHA20_POLY1305" '' '' 634s | token: '' '' '' 634s | appending ESP encryption algorithm CHACHA20_POLY1305[_0] 634s | appending ESP integrity algorithm NONE[_0] 634s | proposal: 'AES_CBC_256' 634s | token: '' '' "AES_CBC_256" '' 634s | token: '' "AES_CBC_256" '' '' 634s | ike_alg_byname() failed: ESP encryption algorithm 'AES_CBC_256' is not recognized 634s | token: '' '' '' 634s | appending ESP encryption algorithm AES_CBC[_256] 634s | appending ESP integrity algorithm HMAC_SHA2_512_256[_0] 634s | appending ESP integrity algorithm HMAC_SHA2_256_128[_0] 634s | proposal: 'AES_CBC_128' 634s | token: '' '' "AES_CBC_128" '' 634s | token: '' "AES_CBC_128" '' '' 634s | ike_alg_byname() failed: ESP encryption algorithm 'AES_CBC_128' is not recognized 634s | token: '' '' '' 634s | appending ESP encryption algorithm AES_CBC[_128] 634s | appending ESP integrity algorithm HMAC_SHA2_512_256[_0] 634s | appending ESP integrity algorithm HMAC_SHA2_256_128[_0] 634s | parsing '' for ESP 634s | parsing 'aes' for ESP 634s | proposal: 'aes' 634s | token: '' '' "aes" '' 634s | token: '' "aes" '' '' 634s | token: '' '' '' 634s | appending ESP encryption algorithm AES_CBC[_0] 634s | appending ESP integrity algorithm HMAC_SHA2_512_256[_0] 634s | appending ESP integrity algorithm HMAC_SHA2_256_128[_0] 634s | parsing 'aes;modp2048' for ESP 634s | proposal: 'aes;modp2048' 634s | token: '' '' "aes" ';' 634s | token: '' "aes" ';' "modp2048" '' 634s | token: ';' "modp2048" '' '' 634s | appending ESP encryption algorithm AES_CBC[_0] 634s | parsing dh: 634s | appending ESP DH algorithm MODP2048[_0] 634s | token: '' '' '' 634s | appending ESP integrity algorithm HMAC_SHA2_512_256[_0] 634s | appending ESP integrity algorithm HMAC_SHA2_256_128[_0] 634s ipsec algparse: ignoring ESP DH algorithm MODP2048 as PFS policy is disabled 634s | parsing 'aes-sha1' for ESP 634s | proposal: 'aes-sha1' 634s | token: '' '' "aes" '-' 634s | token: '' "aes" '-' "sha1" '' 634s | token: '-' "sha1" '' '' 634s | appending ESP encryption algorithm AES_CBC[_0] 634s | parsing integ: 634s | appending ESP integrity algorithm HMAC_SHA1_96[_0] 634s | token: '' '' '' 634s | parsing 'aes-sha1' for ESP 634s | proposal: 'aes-sha1' 634s | token: '' '' "aes" '-' 634s | token: '' "aes" '-' "sha1" '' 634s | token: '-' "sha1" '' '' 634s | appending ESP encryption algorithm AES_CBC[_0] 634s | parsing integ: 634s | appending ESP integrity algorithm HMAC_SHA1_96[_0] 634s | token: '' '' '' 634s | parsing 'aes-sha1-modp2048' for ESP 634s | proposal: 'aes-sha1-modp2048' 634s | token: '' '' "aes" '-' 634s | token: '' "aes" '-' "sha1" '-' 634s | token: '-' "sha1" '-' "modp2048" '' 634s | appending ESP encryption algorithm AES_CBC[_0] 634s | parsing integ: 634s | appending ESP integrity algorithm HMAC_SHA1_96[_0] 634s | token: '-' "modp2048" '' '' 634s | parsing dh: 634s | appending ESP DH algorithm MODP2048[_0] 634s | token: '' '' '' 634s ipsec algparse: ignoring ESP DH algorithm MODP2048 as PFS policy is disabled 634s | parsing 'aes-128-sha1' for ESP 634s | proposal: 'aes-128-sha1' 634s | token: '' '' "aes" '-' 634s | token: '' "aes" '-' "128" '-' 634s | token: '-' "128" '-' "sha1" '' 634s | token: '-' "sha1" '' '' 634s | appending ESP encryption algorithm AES_CBC[_128] 634s | parsing integ: 634s | appending ESP integrity algorithm HMAC_SHA1_96[_0] 634s | token: '' '' '' 634s | parsing 'aes-128-sha1' for ESP 634s | proposal: 'aes-128-sha1' 634s | token: '' '' "aes" '-' 634s | token: '' "aes" '-' "128" '-' 634s | token: '-' "128" '-' "sha1" '' 634s | token: '-' "sha1" '' '' 634s | appending ESP encryption algorithm AES_CBC[_128] 634s | parsing integ: 634s | appending ESP integrity algorithm HMAC_SHA1_96[_0] 634s | token: '' '' '' 634s | parsing 'aes-128-sha1-modp2048' for ESP 634s | proposal: 'aes-128-sha1-modp2048' 634s | token: '' '' "aes" '-' 634s | token: '' "aes" '-' "128" '-' 634s | token: '-' "128" '-' "sha1" '-' 634s | token: '-' "sha1" '-' "modp2048" '' 634s | appending ESP encryption algorithm AES_CBC[_128] 634s | parsing integ: 634s | appending ESP integrity algorithm HMAC_SHA1_96[_0] 634s | token: '-' "modp2048" '' '' 634s | parsing dh: 634s | appending ESP DH algorithm MODP2048[_0] 634s | token: '' '' '' 634s ipsec algparse: ignoring ESP DH algorithm MODP2048 as PFS policy is disabled 634s | parsing 'aes-128' for ESP 634s | proposal: 'aes-128' 634s | token: '' '' "aes" '-' 634s | token: '' "aes" '-' "128" '' 634s | token: '-' "128" '' '' 634s | token: '' '' '' 634s | appending ESP encryption algorithm AES_CBC[_128] 634s | appending ESP integrity algorithm HMAC_SHA2_512_256[_0] 634s | appending ESP integrity algorithm HMAC_SHA2_256_128[_0] 634s | parsing 'aes_gcm_a-128-null' for ESP 634s | proposal: 'aes_gcm_a-128-null' 634s | token: '' '' "aes_gcm_a" '-' 634s | token: '' "aes_gcm_a" '-' "128" '-' 634s | token: '-' "128" '-' "null" '' 634s | token: '-' "null" '' '' 634s | appending ESP encryption algorithm AES_GCM_8[_128] 634s | parsing integ: 634s | appending ESP integrity algorithm NONE[_0] 634s | token: '' '' '' 634s | parsing '3des-sha1;modp1024' for ESP 634s | proposal: '3des-sha1;modp1024' 634s | token: '' '' "3des" '-' 634s | token: '' "3des" '-' "sha1" ';' 634s | token: '-' "sha1" ';' "modp1024" '' 634s | appending ESP encryption algorithm 3DES_CBC[_0] 634s | parsing integ: 634s | appending ESP integrity algorithm HMAC_SHA1_96[_0] 634s | token: ';' "modp1024" '' '' 634s | parsing dh: 634s | ike_alg_byname() failed: ESP DH algorithm 'modp1024' is not supported 634s | lookup for DH algorithm 'modp1024' failed 634s | ... failed 'ESP DH algorithm 'modp1024' is not supported' 634s | parsing '3des-sha1;modp1536' for ESP 634s | proposal: '3des-sha1;modp1536' 634s | token: '' '' "3des" '-' 634s | token: '' "3des" '-' "sha1" ';' 634s | token: '-' "sha1" ';' "modp1536" '' 634s | appending ESP encryption algorithm 3DES_CBC[_0] 634s | parsing integ: 634s | appending ESP integrity algorithm HMAC_SHA1_96[_0] 634s | token: ';' "modp1536" '' '' 634s | parsing dh: 634s | appending ESP DH algorithm MODP1536[_0] 634s | token: '' '' '' 634s ipsec algparse: ignoring ESP DH algorithm MODP1536 as PFS policy is disabled 634s | parsing '3des-sha1;modp2048' for ESP 634s | proposal: '3des-sha1;modp2048' 634s | token: '' '' "3des" '-' 634s | token: '' "3des" '-' "sha1" ';' 634s | token: '-' "sha1" ';' "modp2048" '' 634s | appending ESP encryption algorithm 3DES_CBC[_0] 634s | parsing integ: 634s | appending ESP integrity algorithm HMAC_SHA1_96[_0] 634s | token: ';' "modp2048" '' '' 634s | parsing dh: 634s | appending ESP DH algorithm MODP2048[_0] 634s | token: '' '' '' 634s ipsec algparse: ignoring ESP DH algorithm MODP2048 as PFS policy is disabled 634s | parsing '3des-sha1;dh21' for ESP 634s | proposal: '3des-sha1;dh21' 634s | token: '' '' "3des" '-' 634s | token: '' "3des" '-' "sha1" ';' 634s | token: '-' "sha1" ';' "dh21" '' 634s | appending ESP encryption algorithm 3DES_CBC[_0] 634s | parsing integ: 634s | appending ESP integrity algorithm HMAC_SHA1_96[_0] 634s | token: ';' "dh21" '' '' 634s | parsing dh: 634s | appending ESP DH algorithm DH21[_0] 634s | token: '' '' '' 634s ipsec algparse: ignoring ESP DH algorithm DH21 as PFS policy is disabled 634s | parsing '3des-sha1;ecp_521' for ESP 634s | proposal: '3des-sha1;ecp_521' 634s | token: '' '' "3des" '-' 634s | token: '' "3des" '-' "sha1" ';' 634s | token: '-' "sha1" ';' "ecp_521" '' 634s | appending ESP encryption algorithm 3DES_CBC[_0] 634s | parsing integ: 634s | appending ESP integrity algorithm HMAC_SHA1_96[_0] 634s | token: ';' "ecp_521" '' '' 634s | parsing dh: 634s | appending ESP DH algorithm DH21[_0] 634s | token: '' '' '' 634s ipsec algparse: ignoring ESP DH algorithm DH21 as PFS policy is disabled 634s | parsing '3des-sha1;dh23' for ESP 634s | proposal: '3des-sha1;dh23' 634s | token: '' '' "3des" '-' 634s | token: '' "3des" '-' "sha1" ';' 634s | token: '-' "sha1" ';' "dh23" '' 634s | appending ESP encryption algorithm 3DES_CBC[_0] 634s | parsing integ: 634s | appending ESP integrity algorithm HMAC_SHA1_96[_0] 634s | token: ';' "dh23" '' '' 634s | parsing dh: 634s | ike_alg_byname() failed: ESP DH algorithm 'dh23' is not supported 634s | lookup for DH algorithm 'dh23' failed 634s | ... failed 'ESP DH algorithm 'dh23' is not supported' 634s | parsing '3des-sha1;dh24' for ESP 634s | proposal: '3des-sha1;dh24' 634s | token: '' '' "3des" '-' 634s | token: '' "3des" '-' "sha1" ';' 634s | token: '-' "sha1" ';' "dh24" '' 634s | appending ESP encryption algorithm 3DES_CBC[_0] 634s | parsing integ: 634s | appending ESP integrity algorithm HMAC_SHA1_96[_0] 634s | token: ';' "dh24" '' '' 634s | parsing dh: 634s | ike_alg_byname() failed: ESP DH algorithm 'dh24' is not supported 634s | lookup for DH algorithm 'dh24' failed 634s | ... failed 'ESP DH algorithm 'dh24' is not supported' 634s | parsing '3des-sha1' for ESP 634s | proposal: '3des-sha1' 634s | token: '' '' "3des" '-' 634s | token: '' "3des" '-' "sha1" '' 634s | token: '-' "sha1" '' '' 634s | appending ESP encryption algorithm 3DES_CBC[_0] 634s | parsing integ: 634s | appending ESP integrity algorithm HMAC_SHA1_96[_0] 634s | token: '' '' '' 634s | parsing 'null-sha1' for ESP 634s | proposal: 'null-sha1' 634s | token: '' '' "null" '-' 634s | token: '' "null" '-' "sha1" '' 634s | token: '-' "sha1" '' '' 634s | appending ESP encryption algorithm NULL[_0] 634s | parsing integ: 634s | appending ESP integrity algorithm HMAC_SHA1_96[_0] 634s | token: '' '' '' 634s | parsing 'aes_cbc' for ESP 634s | proposal: 'aes_cbc' 634s | token: '' '' "aes_cbc" '' 634s | token: '' "aes_cbc" '' '' 634s | token: '' '' '' 634s | appending ESP encryption algorithm AES_CBC[_0] 634s | appending ESP integrity algorithm HMAC_SHA2_512_256[_0] 634s | appending ESP integrity algorithm HMAC_SHA2_256_128[_0] 634s | parsing 'aes-sha' for ESP 634s | proposal: 'aes-sha' 634s | token: '' '' "aes" '-' 634s | token: '' "aes" '-' "sha" '' 634s | token: '-' "sha" '' '' 634s | appending ESP encryption algorithm AES_CBC[_0] 634s | parsing integ: 634s | appending ESP integrity algorithm HMAC_SHA1_96[_0] 634s | token: '' '' '' 634s | parsing 'aes-sha1' for ESP 634s | proposal: 'aes-sha1' 634s | token: '' '' "aes" '-' 634s | token: '' "aes" '-' "sha1" '' 634s | token: '-' "sha1" '' '' 634s | appending ESP encryption algorithm AES_CBC[_0] 634s | parsing integ: 634s | appending ESP integrity algorithm HMAC_SHA1_96[_0] 634s | token: '' '' '' 634s | parsing 'aes128-sha1' for ESP 634s | proposal: 'aes128-sha1' 634s | token: '' '' "aes128" '-' 634s | token: '' "aes128" '-' "sha1" '' 634s | ike_alg_byname() failed: ESP encryption algorithm 'aes128' is not recognized 634s | token: '-' "sha1" '' '' 634s | appending ESP encryption algorithm AES_CBC[_128] 634s | parsing integ: 634s | appending ESP integrity algorithm HMAC_SHA1_96[_0] 634s | token: '' '' '' 634s | parsing 'aes-sha2' for ESP 634s | proposal: 'aes-sha2' 634s | token: '' '' "aes" '-' 634s | token: '' "aes" '-' "sha2" '' 634s | token: '-' "sha2" '' '' 634s | appending ESP encryption algorithm AES_CBC[_0] 634s | parsing integ: 634s | appending ESP integrity algorithm HMAC_SHA2_256_128[_0] 634s | token: '' '' '' 634s | parsing 'aes-sha256' for ESP 634s | proposal: 'aes-sha256' 634s | token: '' '' "aes" '-' 634s | token: '' "aes" '-' "sha256" '' 634s | token: '-' "sha256" '' '' 634s | appending ESP encryption algorithm AES_CBC[_0] 634s | parsing integ: 634s | appending ESP integrity algorithm HMAC_SHA2_256_128[_0] 634s | token: '' '' '' 634s | parsing 'aes-sha384' for ESP 634s | proposal: 'aes-sha384' 634s | token: '' '' "aes" '-' 634s | token: '' "aes" '-' "sha384" '' 634s | token: '-' "sha384" '' '' 634s | appending ESP encryption algorithm AES_CBC[_0] 634s | parsing integ: 634s | appending ESP integrity algorithm HMAC_SHA2_384_192[_0] 634s | token: '' '' '' 634s | parsing 'aes-sha512' for ESP 634s | proposal: 'aes-sha512' 634s | token: '' '' "aes" '-' 634s | token: '' "aes" '-' "sha512" '' 634s | token: '-' "sha512" '' '' 634s | appending ESP encryption algorithm AES_CBC[_0] 634s | parsing integ: 634s | appending ESP integrity algorithm HMAC_SHA2_512_256[_0] 634s | token: '' '' '' 634s | parsing 'aes128-aes_xcbc' for ESP 634s | proposal: 'aes128-aes_xcbc' 634s | token: '' '' "aes128" '-' 634s | token: '' "aes128" '-' "aes_xcbc" '' 634s | ike_alg_byname() failed: ESP encryption algorithm 'aes128' is not recognized 634s | token: '-' "aes_xcbc" '' '' 634s | appending ESP encryption algorithm AES_CBC[_128] 634s | parsing integ: 634s | appending ESP integrity algorithm AES_XCBC_96[_0] 634s | token: '' '' '' 634s | parsing 'aes192-sha1' for ESP 634s | proposal: 'aes192-sha1' 634s | token: '' '' "aes192" '-' 634s | token: '' "aes192" '-' "sha1" '' 634s | ike_alg_byname() failed: ESP encryption algorithm 'aes192' is not recognized 634s | token: '-' "sha1" '' '' 634s | appending ESP encryption algorithm AES_CBC[_192] 634s | parsing integ: 634s | appending ESP integrity algorithm HMAC_SHA1_96[_0] 634s | token: '' '' '' 634s | parsing 'aes256-sha1' for ESP 634s | proposal: 'aes256-sha1' 634s | token: '' '' "aes256" '-' 634s | token: '' "aes256" '-' "sha1" '' 634s | ike_alg_byname() failed: ESP encryption algorithm 'aes256' is not recognized 634s | token: '-' "sha1" '' '' 634s | appending ESP encryption algorithm AES_CBC[_256] 634s | parsing integ: 634s | appending ESP integrity algorithm HMAC_SHA1_96[_0] 634s | token: '' '' '' 634s | parsing 'aes256-sha' for ESP 634s | proposal: 'aes256-sha' 634s | token: '' '' "aes256" '-' 634s | token: '' "aes256" '-' "sha" '' 634s | ike_alg_byname() failed: ESP encryption algorithm 'aes256' is not recognized 634s | token: '-' "sha" '' '' 634s | appending ESP encryption algorithm AES_CBC[_256] 634s | parsing integ: 634s | appending ESP integrity algorithm HMAC_SHA1_96[_0] 634s | token: '' '' '' 634s | parsing 'aes256-sha2' for ESP 634s | proposal: 'aes256-sha2' 634s | token: '' '' "aes256" '-' 634s | token: '' "aes256" '-' "sha2" '' 634s | ike_alg_byname() failed: ESP encryption algorithm 'aes256' is not recognized 634s | token: '-' "sha2" '' '' 634s | appending ESP encryption algorithm AES_CBC[_256] 634s | parsing integ: 634s | appending ESP integrity algorithm HMAC_SHA2_256_128[_0] 634s | token: '' '' '' 634s | parsing 'aes256-sha2_256' for ESP 634s | proposal: 'aes256-sha2_256' 634s | token: '' '' "aes256" '-' 634s | token: '' "aes256" '-' "sha2_256" '' 634s | ike_alg_byname() failed: ESP encryption algorithm 'aes256' is not recognized 634s | token: '-' "sha2_256" '' '' 634s | appending ESP encryption algorithm AES_CBC[_256] 634s | parsing integ: 634s | appending ESP integrity algorithm HMAC_SHA2_256_128[_0] 634s | token: '' '' '' 634s | parsing 'aes256-sha2_384' for ESP 634s | proposal: 'aes256-sha2_384' 634s | token: '' '' "aes256" '-' 634s | token: '' "aes256" '-' "sha2_384" '' 634s | ike_alg_byname() failed: ESP encryption algorithm 'aes256' is not recognized 634s | token: '-' "sha2_384" '' '' 634s | appending ESP encryption algorithm AES_CBC[_256] 634s | parsing integ: 634s | appending ESP integrity algorithm HMAC_SHA2_384_192[_0] 634s | token: '' '' '' 634s | parsing 'aes256-sha2_512' for ESP 634s | proposal: 'aes256-sha2_512' 634s | token: '' '' "aes256" '-' 634s | token: '' "aes256" '-' "sha2_512" '' 634s | ike_alg_byname() failed: ESP encryption algorithm 'aes256' is not recognized 634s | token: '-' "sha2_512" '' '' 634s | appending ESP encryption algorithm AES_CBC[_256] 634s | parsing integ: 634s | appending ESP integrity algorithm HMAC_SHA2_512_256[_0] 634s | token: '' '' '' 634s | parsing 'camellia' for ESP 634s | proposal: 'camellia' 634s | token: '' '' "camellia" '' 634s | token: '' "camellia" '' '' 634s | token: '' '' '' 634s | appending ESP encryption algorithm CAMELLIA_CBC[_0] 634s | appending ESP integrity algorithm HMAC_SHA2_512_256[_0] 634s | appending ESP integrity algorithm HMAC_SHA2_256_128[_0] 634s | parsing 'camellia128' for ESP 634s | proposal: 'camellia128' 634s | token: '' '' "camellia128" '' 634s | token: '' "camellia128" '' '' 634s | ike_alg_byname() failed: ESP encryption algorithm 'camellia128' is not recognized 634s | token: '' '' '' 634s | appending ESP encryption algorithm CAMELLIA_CBC[_128] 634s | appending ESP integrity algorithm HMAC_SHA2_512_256[_0] 634s | appending ESP integrity algorithm HMAC_SHA2_256_128[_0] 634s | parsing 'camellia192' for ESP 634s | proposal: 'camellia192' 634s | token: '' '' "camellia192" '' 634s | token: '' "camellia192" '' '' 634s | ike_alg_byname() failed: ESP encryption algorithm 'camellia192' is not recognized 634s | token: '' '' '' 634s | appending ESP encryption algorithm CAMELLIA_CBC[_192] 634s | appending ESP integrity algorithm HMAC_SHA2_512_256[_0] 634s | appending ESP integrity algorithm HMAC_SHA2_256_128[_0] 634s | parsing 'camellia256' for ESP 634s | proposal: 'camellia256' 634s | token: '' '' "camellia256" '' 634s | token: '' "camellia256" '' '' 634s | ike_alg_byname() failed: ESP encryption algorithm 'camellia256' is not recognized 634s | token: '' '' '' 634s | appending ESP encryption algorithm CAMELLIA_CBC[_256] 634s | appending ESP integrity algorithm HMAC_SHA2_512_256[_0] 634s | appending ESP integrity algorithm HMAC_SHA2_256_128[_0] 634s | parsing 'aes_ccm' for ESP 634s | proposal: 'aes_ccm' 634s | token: '' '' "aes_ccm" '' 634s | token: '' "aes_ccm" '' '' 634s | token: '' '' '' 634s | appending ESP encryption algorithm AES_CCM_16[_0] 634s | appending ESP integrity algorithm NONE[_0] 634s | parsing 'aes_ccm_a-128-null' for ESP 634s | proposal: 'aes_ccm_a-128-null' 634s | token: '' '' "aes_ccm_a" '-' 634s | token: '' "aes_ccm_a" '-' "128" '-' 634s | token: '-' "128" '-' "null" '' 634s | token: '-' "null" '' '' 634s | appending ESP encryption algorithm AES_CCM_8[_128] 634s | parsing integ: 634s | appending ESP integrity algorithm NONE[_0] 634s | token: '' '' '' 634s | parsing 'aes_ccm_a-192-null' for ESP 634s | proposal: 'aes_ccm_a-192-null' 634s | token: '' '' "aes_ccm_a" '-' 634s | token: '' "aes_ccm_a" '-' "192" '-' 634s | token: '-' "192" '-' "null" '' 634s | token: '-' "null" '' '' 634s | appending ESP encryption algorithm AES_CCM_8[_192] 634s | parsing integ: 634s | appending ESP integrity algorithm NONE[_0] 634s | token: '' '' '' 634s | parsing 'aes_ccm_a-256-null' for ESP 634s | proposal: 'aes_ccm_a-256-null' 634s | token: '' '' "aes_ccm_a" '-' 634s | token: '' "aes_ccm_a" '-' "256" '-' 634s | token: '-' "256" '-' "null" '' 634s | token: '-' "null" '' '' 634s | appending ESP encryption algorithm AES_CCM_8[_256] 634s | parsing integ: 634s | appending ESP integrity algorithm NONE[_0] 634s | token: '' '' '' 634s | parsing 'aes_ccm_b-128-null' for ESP 634s | proposal: 'aes_ccm_b-128-null' 634s | token: '' '' "aes_ccm_b" '-' 634s | token: '' "aes_ccm_b" '-' "128" '-' 634s | token: '-' "128" '-' "null" '' 634s | token: '-' "null" '' '' 634s | appending ESP encryption algorithm AES_CCM_12[_128] 634s | parsing integ: 634s | appending ESP integrity algorithm NONE[_0] 634s | token: '' '' '' 634s | parsing 'aes_ccm_b-192-null' for ESP 634s | proposal: 'aes_ccm_b-192-null' 634s | token: '' '' "aes_ccm_b" '-' 634s | token: '' "aes_ccm_b" '-' "192" '-' 634s | token: '-' "192" '-' "null" '' 634s | token: '-' "null" '' '' 634s | appending ESP encryption algorithm AES_CCM_12[_192] 634s | parsing integ: 634s | appending ESP integrity algorithm NONE[_0] 634s | token: '' '' '' 634s | parsing 'aes_ccm_b-256-null' for ESP 634s | proposal: 'aes_ccm_b-256-null' 634s | token: '' '' "aes_ccm_b" '-' 634s | token: '' "aes_ccm_b" '-' "256" '-' 634s | token: '-' "256" '-' "null" '' 634s | token: '-' "null" '' '' 634s | appending ESP encryption algorithm AES_CCM_12[_256] 634s | parsing integ: 634s | appending ESP integrity algorithm NONE[_0] 634s | token: '' '' '' 634s | parsing 'aes_ccm_c-128-null' for ESP 634s | proposal: 'aes_ccm_c-128-null' 634s | token: '' '' "aes_ccm_c" '-' 634s | token: '' "aes_ccm_c" '-' "128" '-' 634s | token: '-' "128" '-' "null" '' 634s | token: '-' "null" '' '' 634s | appending ESP encryption algorithm AES_CCM_16[_128] 634s | parsing integ: 634s AES_CCM_16_128-NONE 634s algparse -v2 'esp=aes_ccm_c-192-null' (expect SUCCESS) 634s AES_CCM_16_192-NONE 634s algparse -v2 'esp=aes_ccm_c-256-null' (expect SUCCESS) 634s AES_CCM_16_256-NONE 634s algparse -v2 'esp=aes_gcm' (expect SUCCESS) 634s AES_GCM_16-NONE 634s algparse -v2 'esp=aes_gcm_a-128-null' (expect SUCCESS) 634s AES_GCM_8_128-NONE 634s algparse -v2 'esp=aes_gcm_a-192-null' (expect SUCCESS) 634s AES_GCM_8_192-NONE 634s algparse -v2 'esp=aes_gcm_a-256-null' (expect SUCCESS) 634s AES_GCM_8_256-NONE 634s algparse -v2 'esp=aes_gcm_b-128-null' (expect SUCCESS) 634s AES_GCM_12_128-NONE 634s algparse -v2 'esp=aes_gcm_b-192-null' (expect SUCCESS) 634s AES_GCM_12_192-NONE 634s algparse -v2 'esp=aes_gcm_b-256-null' (expect SUCCESS) 634s AES_GCM_12_256-NONE 634s algparse -v2 'esp=aes_gcm_c-128-null' (expect SUCCESS) 634s AES_GCM_16_128-NONE 634s algparse -v2 'esp=aes_gcm_c-192-null' (expect SUCCESS) 634s AES_GCM_16_192-NONE 634s algparse -v2 'esp=aes_gcm_c-256-null' (expect SUCCESS) 634s AES_GCM_16_256-NONE 634s algparse -v2 'esp=aes_ccm_a-null' (expect SUCCESS) 634s AES_CCM_8-NONE 634s algparse -v2 'esp=aes_ccm_b-null' (expect SUCCESS) 634s AES_CCM_12-NONE 634s algparse -v2 'esp=aes_ccm_c-null' (expect SUCCESS) 634s AES_CCM_16-NONE 634s algparse -v2 'esp=aes_gcm_a-null' (expect SUCCESS) 634s AES_GCM_8-NONE 634s algparse -v2 'esp=aes_gcm_b-null' (expect SUCCESS) 634s AES_GCM_12-NONE 634s algparse -v2 'esp=aes_gcm_c-null' (expect SUCCESS) 634s AES_GCM_16-NONE 634s algparse -v2 'esp=aes_ccm-null' (expect SUCCESS) 634s AES_CCM_16-NONE 634s algparse -v2 'esp=aes_gcm-null' (expect SUCCESS) 634s AES_GCM_16-NONE 634s algparse -v2 'esp=aes_ccm-256-null' (expect SUCCESS) 634s AES_CCM_16_256-NONE 634s algparse -v2 'esp=aes_gcm-192-null' (expect SUCCESS) 634s AES_GCM_16_192-NONE 634s algparse -v2 'esp=aes_ccm_256-null' (expect SUCCESS) 634s AES_CCM_16_256-NONE 634s algparse -v2 'esp=aes_gcm_192-null' (expect SUCCESS) 634s AES_GCM_16_192-NONE 634s algparse -v2 'esp=aes_ccm_8-null' (expect SUCCESS) 634s AES_CCM_8-NONE 634s algparse -v2 'esp=aes_ccm_12-null' (expect SUCCESS) 634s AES_CCM_12-NONE 634s algparse -v2 'esp=aes_ccm_16-null' (expect SUCCESS) 634s AES_CCM_16-NONE 634s algparse -v2 'esp=aes_gcm_8-null' (expect SUCCESS) 634s AES_GCM_8-NONE 634s algparse -v2 'esp=aes_gcm_12-null' (expect SUCCESS) 634s AES_GCM_12-NONE 634s algparse -v2 'esp=aes_gcm_16-null' (expect SUCCESS) 634s AES_GCM_16-NONE 634s algparse -v2 'esp=aes_ccm_8-128-null' (expect SUCCESS) 634s AES_CCM_8_128-NONE 634s algparse -v2 'esp=aes_ccm_12-192-null' (expect SUCCESS) 634s AES_CCM_12_192-NONE 634s algparse -v2 'esp=aes_ccm_16-256-null' (expect SUCCESS) 634s AES_CCM_16_256-NONE 634s algparse -v2 'esp=aes_gcm_8-128-null' (expect SUCCESS) 634s AES_GCM_8_128-NONE 634s algparse -v2 'esp=aes_gcm_12-192-null' (expect SUCCESS) 634s AES_GCM_12_192-NONE 634s algparse -v2 'esp=aes_gcm_16-256-null' (expect SUCCESS) 634s AES_GCM_16_256-NONE 634s algparse -v2 'esp=aes_ccm_8_128-null' (expect SUCCESS) 634s AES_CCM_8_128-NONE 634s algparse -v2 'esp=aes_ccm_12_192-null' (expect SUCCESS) 634s AES_CCM_12_192-NONE 634s algparse -v2 'esp=aes_ccm_16_256-null' (expect SUCCESS) 634s AES_CCM_16_256-NONE 634s algparse -v2 'esp=aes_gcm_8_128-null' (expect SUCCESS) 634s AES_GCM_8_128-NONE 634s algparse -v2 'esp=aes_gcm_12_192-null' (expect SUCCESS) 634s AES_GCM_12_192-NONE 634s algparse -v2 'esp=aes_gcm_16_256-null' (expect SUCCESS) 634s AES_GCM_16_256-NONE 634s algparse -v2 'esp=aes_ctr' (expect SUCCESS) 634s AES_CTR-HMAC_SHA2_512_256+HMAC_SHA2_256_128 634s algparse -v2 'esp=aesctr' (expect SUCCESS) 634s AES_CTR-HMAC_SHA2_512_256+HMAC_SHA2_256_128 634s algparse -v2 'esp=aes_ctr128' (expect SUCCESS) 634s AES_CTR_128-HMAC_SHA2_512_256+HMAC_SHA2_256_128 634s algparse -v2 'esp=aes_ctr192' (expect SUCCESS) 634s AES_CTR_192-HMAC_SHA2_512_256+HMAC_SHA2_256_128 634s algparse -v2 'esp=aes_ctr256' (expect SUCCESS) 634s AES_CTR_256-HMAC_SHA2_512_256+HMAC_SHA2_256_128 634s algparse -v2 'esp=camellia_cbc_256-hmac_sha2_512_256;modp8192' (expect SUCCESS) 634s CAMELLIA_CBC_256-HMAC_SHA2_512_256 634s algparse -v2 'esp=null_auth_aes_gmac_256-null;modp8192' (expect SUCCESS) 634s NULL_AUTH_AES_GMAC_256-NONE 634s algparse -v2 'esp=3des-sha1;modp8192' (expect SUCCESS) 634s 3DES_CBC-HMAC_SHA1_96 634s algparse -v2 'esp=3des-sha1-modp8192' (expect SUCCESS) 634s 3DES_CBC-HMAC_SHA1_96 634s algparse -v2 'esp=aes-sha1,3des-sha1;modp8192' (expect SUCCESS) 634s AES_CBC-HMAC_SHA1_96 634s 3DES_CBC-HMAC_SHA1_96 634s algparse -v2 'esp=aes-sha1-modp8192,3des-sha1-modp8192' (expect SUCCESS) 634s AES_CBC-HMAC_SHA1_96 634s 3DES_CBC-HMAC_SHA1_96 634s algparse -v2 'esp=aes-sha1-modp8192,aes-sha1-modp8192,aes-sha1-modp8192' (expect SUCCESS) 634s AES_CBC-HMAC_SHA1_96 634s algparse -v2 'esp=aes;none' (expect SUCCESS) 634s AES_CBC-HMAC_SHA2_512_256+HMAC_SHA2_256_128 634s algparse -v2 'esp=aes;none,aes' (expect SUCCESS) 634s AES_CBC-HMAC_SHA2_512_256+HMAC_SHA2_256_128 634s AES_CBC-HMAC_SHA2_512_256+HMAC_SHA2_256_128 634s algparse -v2 'esp=aes;none,aes;modp2048' (expect SUCCESS) 634s AES_CBC-HMAC_SHA2_512_256+HMAC_SHA2_256_128 634s AES_CBC-HMAC_SHA2_512_256+HMAC_SHA2_256_128 634s algparse -v2 'esp=aes-sha1-none' (expect SUCCESS) 634s AES_CBC-HMAC_SHA1_96 634s algparse -v2 'esp=aes-sha1;none' (expect SUCCESS) 634s AES_CBC-HMAC_SHA1_96 634s algparse -v2 'esp=3des168-sha1' (expect ERROR) 634s ERROR: ESP encryption algorithm 3DES_CBC does not allow a key lengths 634s algparse -v2 'esp=3des-null' (expect ERROR) 634s ERROR: non-AEAD ESP encryption algorithm 3DES_CBC cannot have 'NONE' as the integrity algorithm 634s algparse -v2 'esp=aes128-null' (expect ERROR) 634s ERROR: non-AEAD ESP encryption algorithm AES_CBC cannot have 'NONE' as the integrity algorithm 634s algparse -v2 'esp=aes224-sha1' (expect ERROR) 634s ERROR: ESP encryption algorithm AES_CBC with key length 224 invalid; valid key lengths: 128, 192, 256 634s algparse -v2 'esp=aes-224-sha1' (expect ERROR) 634s ERROR: ESP encryption algorithm AES_CBC with key length 224 invalid; valid key lengths: 128, 192, 256 634s algparse -v2 'esp=aes0-sha1' (expect ERROR) 634s ERROR: ESP encryption key length is zero 634s algparse -v2 'esp=aes-0-sha1' (expect ERROR) 634s | appending ESP integrity algorithm NONE[_0] 634s | token: '' '' '' 634s | parsing 'aes_ccm_c-192-null' for ESP 634s | proposal: 'aes_ccm_c-192-null' 634s | token: '' '' "aes_ccm_c" '-' 634s | token: '' "aes_ccm_c" '-' "192" '-' 634s | token: '-' "192" '-' "null" '' 634s | token: '-' "null" '' '' 634s | appending ESP encryption algorithm AES_CCM_16[_192] 634s | parsing integ: 634s | appending ESP integrity algorithm NONE[_0] 634s | token: '' '' '' 634s | parsing 'aes_ccm_c-256-null' for ESP 634s | proposal: 'aes_ccm_c-256-null' 634s | token: '' '' "aes_ccm_c" '-' 634s | token: '' "aes_ccm_c" '-' "256" '-' 634s | token: '-' "256" '-' "null" '' 634s | token: '-' "null" '' '' 634s | appending ESP encryption algorithm AES_CCM_16[_256] 634s | parsing integ: 634s | appending ESP integrity algorithm NONE[_0] 634s | token: '' '' '' 634s | parsing 'aes_gcm' for ESP 634s | proposal: 'aes_gcm' 634s | token: '' '' "aes_gcm" '' 634s | token: '' "aes_gcm" '' '' 634s | token: '' '' '' 634s | appending ESP encryption algorithm AES_GCM_16[_0] 634s | appending ESP integrity algorithm NONE[_0] 634s | parsing 'aes_gcm_a-128-null' for ESP 634s | proposal: 'aes_gcm_a-128-null' 634s | token: '' '' "aes_gcm_a" '-' 634s | token: '' "aes_gcm_a" '-' "128" '-' 634s | token: '-' "128" '-' "null" '' 634s | token: '-' "null" '' '' 634s | appending ESP encryption algorithm AES_GCM_8[_128] 634s | parsing integ: 634s | appending ESP integrity algorithm NONE[_0] 634s | token: '' '' '' 634s | parsing 'aes_gcm_a-192-null' for ESP 634s | proposal: 'aes_gcm_a-192-null' 634s | token: '' '' "aes_gcm_a" '-' 634s | token: '' "aes_gcm_a" '-' "192" '-' 634s | token: '-' "192" '-' "null" '' 634s | token: '-' "null" '' '' 634s | appending ESP encryption algorithm AES_GCM_8[_192] 634s | parsing integ: 634s | appending ESP integrity algorithm NONE[_0] 634s | token: '' '' '' 634s | parsing 'aes_gcm_a-256-null' for ESP 634s | proposal: 'aes_gcm_a-256-null' 634s | token: '' '' "aes_gcm_a" '-' 634s | token: '' "aes_gcm_a" '-' "256" '-' 634s | token: '-' "256" '-' "null" '' 634s | token: '-' "null" '' '' 634s | appending ESP encryption algorithm AES_GCM_8[_256] 634s | parsing integ: 634s | appending ESP integrity algorithm NONE[_0] 634s | token: '' '' '' 634s | parsing 'aes_gcm_b-128-null' for ESP 634s | proposal: 'aes_gcm_b-128-null' 634s | token: '' '' "aes_gcm_b" '-' 634s | token: '' "aes_gcm_b" '-' "128" '-' 634s | token: '-' "128" '-' "null" '' 634s | token: '-' "null" '' '' 634s | appending ESP encryption algorithm AES_GCM_12[_128] 634s | parsing integ: 634s | appending ESP integrity algorithm NONE[_0] 634s | token: '' '' '' 634s | parsing 'aes_gcm_b-192-null' for ESP 634s | proposal: 'aes_gcm_b-192-null' 634s | token: '' '' "aes_gcm_b" '-' 634s | token: '' "aes_gcm_b" '-' "192" '-' 634s | token: '-' "192" '-' "null" '' 634s | token: '-' "null" '' '' 634s | appending ESP encryption algorithm AES_GCM_12[_192] 634s | parsing integ: 634s | appending ESP integrity algorithm NONE[_0] 634s | token: '' '' '' 634s | parsing 'aes_gcm_b-256-null' for ESP 634s | proposal: 'aes_gcm_b-256-null' 634s | token: '' '' "aes_gcm_b" '-' 634s | token: '' "aes_gcm_b" '-' "256" '-' 634s | token: '-' "256" '-' "null" '' 634s | token: '-' "null" '' '' 634s | appending ESP encryption algorithm AES_GCM_12[_256] 634s | parsing integ: 634s | appending ESP integrity algorithm NONE[_0] 634s | token: '' '' '' 634s | parsing 'aes_gcm_c-128-null' for ESP 634s | proposal: 'aes_gcm_c-128-null' 634s | token: '' '' "aes_gcm_c" '-' 634s | token: '' "aes_gcm_c" '-' "128" '-' 634s | token: '-' "128" '-' "null" '' 634s | token: '-' "null" '' '' 634s | appending ESP encryption algorithm AES_GCM_16[_128] 634s | parsing integ: 634s | appending ESP integrity algorithm NONE[_0] 634s | token: '' '' '' 634s | parsing 'aes_gcm_c-192-null' for ESP 634s | proposal: 'aes_gcm_c-192-null' 634s | token: '' '' "aes_gcm_c" '-' 634s | token: '' "aes_gcm_c" '-' "192" '-' 634s | token: '-' "192" '-' "null" '' 634s | token: '-' "null" '' '' 634s | appending ESP encryption algorithm AES_GCM_16[_192] 634s | parsing integ: 634s | appending ESP integrity algorithm NONE[_0] 634s | token: '' '' '' 634s | parsing 'aes_gcm_c-256-null' for ESP 634s | proposal: 'aes_gcm_c-256-null' 634s | token: '' '' "aes_gcm_c" '-' 634s | token: '' "aes_gcm_c" '-' "256" '-' 634s | token: '-' "256" '-' "null" '' 634s | token: '-' "null" '' '' 634s | appending ESP encryption algorithm AES_GCM_16[_256] 634s | parsing integ: 634s | appending ESP integrity algorithm NONE[_0] 634s | token: '' '' '' 634s | parsing 'aes_ccm_a-null' for ESP 634s | proposal: 'aes_ccm_a-null' 634s | token: '' '' "aes_ccm_a" '-' 634s | token: '' "aes_ccm_a" '-' "null" '' 634s | token: '-' "null" '' '' 634s | appending ESP encryption algorithm AES_CCM_8[_0] 634s | parsing integ: 634s | appending ESP integrity algorithm NONE[_0] 634s | token: '' '' '' 634s | parsing 'aes_ccm_b-null' for ESP 634s | proposal: 'aes_ccm_b-null' 634s | token: '' '' "aes_ccm_b" '-' 634s | token: '' "aes_ccm_b" '-' "null" '' 634s | token: '-' "null" '' '' 634s | appending ESP encryption algorithm AES_CCM_12[_0] 634s | parsing integ: 634s | appending ESP integrity algorithm NONE[_0] 634s | token: '' '' '' 634s | parsing 'aes_ccm_c-null' for ESP 634s | proposal: 'aes_ccm_c-null' 634s | token: '' '' "aes_ccm_c" '-' 634s | token: '' "aes_ccm_c" '-' "null" '' 634s | token: '-' "null" '' '' 634s | appending ESP encryption algorithm AES_CCM_16[_0] 634s | parsing integ: 634s | appending ESP integrity algorithm NONE[_0] 634s | token: '' '' '' 634s | parsing 'aes_gcm_a-null' for ESP 634s | proposal: 'aes_gcm_a-null' 634s | token: '' '' "aes_gcm_a" '-' 634s | token: '' "aes_gcm_a" '-' "null" '' 634s | token: '-' "null" '' '' 634s | appending ESP encryption algorithm AES_GCM_8[_0] 634s | parsing integ: 634s | appending ESP integrity algorithm NONE[_0] 634s | token: '' '' '' 634s | parsing 'aes_gcm_b-null' for ESP 634s | proposal: 'aes_gcm_b-null' 634s | token: '' '' "aes_gcm_b" '-' 634s | token: '' "aes_gcm_b" '-' "null" '' 634s | token: '-' "null" '' '' 634s | appending ESP encryption algorithm AES_GCM_12[_0] 634s | parsing integ: 634s | appending ESP integrity algorithm NONE[_0] 634s | token: '' '' '' 634s | parsing 'aes_gcm_c-null' for ESP 634s | proposal: 'aes_gcm_c-null' 634s | token: '' '' "aes_gcm_c" '-' 634s | token: '' "aes_gcm_c" '-' "null" '' 634s | token: '-' "null" '' '' 634s | appending ESP encryption algorithm AES_GCM_16[_0] 634s | parsing integ: 634s | appending ESP integrity algorithm NONE[_0] 634s | token: '' '' '' 634s | parsing 'aes_ccm-null' for ESP 634s | proposal: 'aes_ccm-null' 634s | token: '' '' "aes_ccm" '-' 634s | token: '' "aes_ccm" '-' "null" '' 634s | token: '-' "null" '' '' 634s | appending ESP encryption algorithm AES_CCM_16[_0] 634s | parsing integ: 634s | appending ESP integrity algorithm NONE[_0] 634s | token: '' '' '' 634s | parsing 'aes_gcm-null' for ESP 634s | proposal: 'aes_gcm-null' 634s | token: '' '' "aes_gcm" '-' 634s | token: '' "aes_gcm" '-' "null" '' 634s | token: '-' "null" '' '' 634s | appending ESP encryption algorithm AES_GCM_16[_0] 634s | parsing integ: 634s | appending ESP integrity algorithm NONE[_0] 634s | token: '' '' '' 634s | parsing 'aes_ccm-256-null' for ESP 634s | proposal: 'aes_ccm-256-null' 634s | token: '' '' "aes_ccm" '-' 634s | token: '' "aes_ccm" '-' "256" '-' 634s | token: '-' "256" '-' "null" '' 634s | token: '-' "null" '' '' 634s | appending ESP encryption algorithm AES_CCM_16[_256] 634s | parsing integ: 634s | appending ESP integrity algorithm NONE[_0] 634s | token: '' '' '' 634s | parsing 'aes_gcm-192-null' for ESP 634s | proposal: 'aes_gcm-192-null' 634s | token: '' '' "aes_gcm" '-' 634s | token: '' "aes_gcm" '-' "192" '-' 634s | token: '-' "192" '-' "null" '' 634s | token: '-' "null" '' '' 634s | appending ESP encryption algorithm AES_GCM_16[_192] 634s | parsing integ: 634s | appending ESP integrity algorithm NONE[_0] 634s | token: '' '' '' 634s | parsing 'aes_ccm_256-null' for ESP 634s | proposal: 'aes_ccm_256-null' 634s | token: '' '' "aes_ccm_256" '-' 634s | token: '' "aes_ccm_256" '-' "null" '' 634s | ike_alg_byname() failed: ESP encryption algorithm 'aes_ccm_256' is not recognized 634s | token: '-' "null" '' '' 634s | appending ESP encryption algorithm AES_CCM_16[_256] 634s | parsing integ: 634s | appending ESP integrity algorithm NONE[_0] 634s | token: '' '' '' 634s | parsing 'aes_gcm_192-null' for ESP 634s | proposal: 'aes_gcm_192-null' 634s | token: '' '' "aes_gcm_192" '-' 634s | token: '' "aes_gcm_192" '-' "null" '' 634s | ike_alg_byname() failed: ESP encryption algorithm 'aes_gcm_192' is not recognized 634s | token: '-' "null" '' '' 634s | appending ESP encryption algorithm AES_GCM_16[_192] 634s | parsing integ: 634s | appending ESP integrity algorithm NONE[_0] 634s | token: '' '' '' 634s | parsing 'aes_ccm_8-null' for ESP 634s | proposal: 'aes_ccm_8-null' 634s | token: '' '' "aes_ccm_8" '-' 634s | token: '' "aes_ccm_8" '-' "null" '' 634s | token: '-' "null" '' '' 634s | appending ESP encryption algorithm AES_CCM_8[_0] 634s | parsing integ: 634s | appending ESP integrity algorithm NONE[_0] 634s | token: '' '' '' 634s | parsing 'aes_ccm_12-null' for ESP 634s | proposal: 'aes_ccm_12-null' 634s | token: '' '' "aes_ccm_12" '-' 634s | token: '' "aes_ccm_12" '-' "null" '' 634s | token: '-' "null" '' '' 634s | appending ESP encryption algorithm AES_CCM_12[_0] 634s | parsing integ: 634s | appending ESP integrity algorithm NONE[_0] 634s | token: '' '' '' 634s | parsing 'aes_ccm_16-null' for ESP 634s | proposal: 'aes_ccm_16-null' 634s | token: '' '' "aes_ccm_16" '-' 634s | token: '' "aes_ccm_16" '-' "null" '' 634s | token: '-' "null" '' '' 634s | appending ESP encryption algorithm AES_CCM_16[_0] 634s | parsing integ: 634s | appending ESP integrity algorithm NONE[_0] 634s | token: '' '' '' 634s | parsing 'aes_gcm_8-null' for ESP 634s | proposal: 'aes_gcm_8-null' 634s | token: '' '' "aes_gcm_8" '-' 634s | token: '' "aes_gcm_8" '-' "null" '' 634s | token: '-' "null" '' '' 634s | appending ESP encryption algorithm AES_GCM_8[_0] 634s | parsing integ: 634s | appending ESP integrity algorithm NONE[_0] 634s | token: '' '' '' 634s | parsing 'aes_gcm_12-null' for ESP 634s | proposal: 'aes_gcm_12-null' 634s | token: '' '' "aes_gcm_12" '-' 634s | token: '' "aes_gcm_12" '-' "null" '' 634s | token: '-' "null" '' '' 634s | appending ESP encryption algorithm AES_GCM_12[_0] 634s | parsing integ: 634s | appending ESP integrity algorithm NONE[_0] 634s | token: '' '' '' 634s | parsing 'aes_gcm_16-null' for ESP 634s | proposal: 'aes_gcm_16-null' 634s | token: '' '' "aes_gcm_16" '-' 634s | token: '' "aes_gcm_16" '-' "null" '' 634s | token: '-' "null" '' '' 634s | appending ESP encryption algorithm AES_GCM_16[_0] 634s | parsing integ: 634s | appending ESP integrity algorithm NONE[_0] 634s | token: '' '' '' 634s | parsing 'aes_ccm_8-128-null' for ESP 634s | proposal: 'aes_ccm_8-128-null' 634s | token: '' '' "aes_ccm_8" '-' 634s | token: '' "aes_ccm_8" '-' "128" '-' 634s | token: '-' "128" '-' "null" '' 634s | token: '-' "null" '' '' 634s | appending ESP encryption algorithm AES_CCM_8[_128] 634s | parsing integ: 634s | appending ESP integrity algorithm NONE[_0] 634s | token: '' '' '' 634s | parsing 'aes_ccm_12-192-null' for ESP 634s | proposal: 'aes_ccm_12-192-null' 634s | token: '' '' "aes_ccm_12" '-' 634s | token: '' "aes_ccm_12" '-' "192" '-' 634s | token: '-' "192" '-' "null" '' 634s | token: '-' "null" '' '' 634s | appending ESP encryption algorithm AES_CCM_12[_192] 634s | parsing integ: 634s | appending ESP integrity algorithm NONE[_0] 634s | token: '' '' '' 634s | parsing 'aes_ccm_16-256-null' for ESP 634s | proposal: 'aes_ccm_16-256-null' 634s | token: '' '' "aes_ccm_16" '-' 634s | token: '' "aes_ccm_16" '-' "256" '-' 634s | token: '-' "256" '-' "null" '' 634s | token: '-' "null" '' '' 634s | appending ESP encryption algorithm AES_CCM_16[_256] 634s | parsing integ: 634s | appending ESP integrity algorithm NONE[_0] 634s | token: '' '' '' 634s | parsing 'aes_gcm_8-128-null' for ESP 634s | proposal: 'aes_gcm_8-128-null' 634s | token: '' '' "aes_gcm_8" '-' 634s | token: '' "aes_gcm_8" '-' "128" '-' 634s | token: '-' "128" '-' "null" '' 634s | token: '-' "null" '' '' 634s | appending ESP encryption algorithm AES_GCM_8[_128] 634s | parsing integ: 634s | appending ESP integrity algorithm NONE[_0] 634s | token: '' '' '' 634s | parsing 'aes_gcm_12-192-null' for ESP 634s | proposal: 'aes_gcm_12-192-null' 634s | token: '' '' "aes_gcm_12" '-' 634s | token: '' "aes_gcm_12" '-' "192" '-' 634s | token: '-' "192" '-' "null" '' 634s | token: '-' "null" '' '' 634s | appending ESP encryption algorithm AES_GCM_12[_192] 634s | parsing integ: 634s | appending ESP integrity algorithm NONE[_0] 634s | token: '' '' '' 634s | parsing 'aes_gcm_16-256-null' for ESP 634s | proposal: 'aes_gcm_16-256-null' 634s | token: '' '' "aes_gcm_16" '-' 634s | token: '' "aes_gcm_16" '-' "256" '-' 634s | token: '-' "256" '-' "null" '' 634s | token: '-' "null" '' '' 634s | appending ESP encryption algorithm AES_GCM_16[_256] 634s | parsing integ: 634s | appending ESP integrity algorithm NONE[_0] 634s | token: '' '' '' 634s | parsing 'aes_ccm_8_128-null' for ESP 634s | proposal: 'aes_ccm_8_128-null' 634s | token: '' '' "aes_ccm_8_128" '-' 634s | token: '' "aes_ccm_8_128" '-' "null" '' 634s | ike_alg_byname() failed: ESP encryption algorithm 'aes_ccm_8_128' is not recognized 634s | token: '-' "null" '' '' 634s | appending ESP encryption algorithm AES_CCM_8[_128] 634s | parsing integ: 634s | appending ESP integrity algorithm NONE[_0] 634s | token: '' '' '' 634s | parsing 'aes_ccm_12_192-null' for ESP 634s | proposal: 'aes_ccm_12_192-null' 634s | token: '' '' "aes_ccm_12_192" '-' 634s | token: '' "aes_ccm_12_192" '-' "null" '' 634s | ike_alg_byname() failed: ESP encryption algorithm 'aes_ccm_12_192' is not recognized 634s | token: '-' "null" '' '' 634s | appending ESP encryption algorithm AES_CCM_12[_192] 634s | parsing integ: 634s | appending ESP integrity algorithm NONE[_0] 634s | token: '' '' '' 634s | parsing 'aes_ccm_16_256-null' for ESP 634s | proposal: 'aes_ccm_16_256-null' 634s | token: '' '' "aes_ccm_16_256" '-' 634s | token: '' "aes_ccm_16_256" '-' "null" '' 634s | ike_alg_byname() failed: ESP encryption algorithm 'aes_ccm_16_256' is not recognized 634s | token: '-' "null" '' '' 634s | appending ESP encryption algorithm AES_CCM_16[_256] 634s | parsing integ: 634s | appending ESP integrity algorithm NONE[_0] 634s | token: '' '' '' 634s | parsing 'aes_gcm_8_128-null' for ESP 634s | proposal: 'aes_gcm_8_128-null' 634s | token: '' '' "aes_gcm_8_128" '-' 634s | token: '' "aes_gcm_8_128" '-' "null" '' 634s | ike_alg_byname() failed: ESP encryption algorithm 'aes_gcm_8_128' is not recognized 634s | token: '-' "null" '' '' 634s | appending ESP encryption algorithm AES_GCM_8[_128] 634s | parsing integ: 634s | appending ESP integrity algorithm NONE[_0] 634s | token: '' '' '' 634s | parsing 'aes_gcm_12_192-null' for ESP 634s | proposal: 'aes_gcm_12_192-null' 634s | token: '' '' "aes_gcm_12_192" '-' 634s | token: '' "aes_gcm_12_192" '-' "null" '' 634s | ike_alg_byname() failed: ESP encryption algorithm 'aes_gcm_12_192' is not recognized 634s | token: '-' "null" '' '' 634s | appending ESP encryption algorithm AES_GCM_12[_192] 634s | parsing integ: 634s | appending ESP integrity algorithm NONE[_0] 634s | token: '' '' '' 634s | parsing 'aes_gcm_16_256-null' for ESP 634s | proposal: 'aes_gcm_16_256-null' 634s | token: '' '' "aes_gcm_16_256" '-' 634s | token: '' "aes_gcm_16_256" '-' "null" '' 634s | ike_alg_byname() failed: ESP encryption algorithm 'aes_gcm_16_256' is not recognized 634s | token: '-' "null" '' '' 634s | appending ESP encryption algorithm AES_GCM_16[_256] 634s | parsing integ: 634s | appending ESP integrity algorithm NONE[_0] 634s | token: '' '' '' 634s | parsing 'aes_ctr' for ESP 634s | proposal: 'aes_ctr' 634s | token: '' '' "aes_ctr" '' 634s | token: '' "aes_ctr" '' '' 634s | token: '' '' '' 634s | appending ESP encryption algorithm AES_CTR[_0] 634s | appending ESP integrity algorithm HMAC_SHA2_512_256[_0] 634s | appending ESP integrity algorithm HMAC_SHA2_256_128[_0] 634s | parsing 'aesctr' for ESP 634s | proposal: 'aesctr' 634s | token: '' '' "aesctr" '' 634s | token: '' "aesctr" '' '' 634s | token: '' '' '' 634s | appending ESP encryption algorithm AES_CTR[_0] 634s | appending ESP integrity algorithm HMAC_SHA2_512_256[_0] 634s | appending ESP integrity algorithm HMAC_SHA2_256_128[_0] 634s | parsing 'aes_ctr128' for ESP 634s | proposal: 'aes_ctr128' 634s | token: '' '' "aes_ctr128" '' 634s | token: '' "aes_ctr128" '' '' 634s | ike_alg_byname() failed: ESP encryption algorithm 'aes_ctr128' is not recognized 634s | token: '' '' '' 634s | appending ESP encryption algorithm AES_CTR[_128] 634s | appending ESP integrity algorithm HMAC_SHA2_512_256[_0] 634s | appending ESP integrity algorithm HMAC_SHA2_256_128[_0] 634s | parsing 'aes_ctr192' for ESP 634s | proposal: 'aes_ctr192' 634s | token: '' '' "aes_ctr192" '' 634s | token: '' "aes_ctr192" '' '' 634s | ike_alg_byname() failed: ESP encryption algorithm 'aes_ctr192' is not recognized 634s | token: '' '' '' 634s | appending ESP encryption algorithm AES_CTR[_192] 634s | appending ESP integrity algorithm HMAC_SHA2_512_256[_0] 634s | appending ESP integrity algorithm HMAC_SHA2_256_128[_0] 634s | parsing 'aes_ctr256' for ESP 634s | proposal: 'aes_ctr256' 634s | token: '' '' "aes_ctr256" '' 634s | token: '' "aes_ctr256" '' '' 634s | ike_alg_byname() failed: ESP encryption algorithm 'aes_ctr256' is not recognized 634s | token: '' '' '' 634s | appending ESP encryption algorithm AES_CTR[_256] 634s | appending ESP integrity algorithm HMAC_SHA2_512_256[_0] 634s | appending ESP integrity algorithm HMAC_SHA2_256_128[_0] 634s | parsing 'camellia_cbc_256-hmac_sha2_512_256;modp8192' for ESP 634s | proposal: 'camellia_cbc_256-hmac_sha2_512_256;modp8192' 634s | token: '' '' "camellia_cbc_256" '-' 634s | token: '' "camellia_cbc_256" '-' "hmac_sha2_512_256" ';' 634s | ike_alg_byname() failed: ESP encryption algorithm 'camellia_cbc_256' is not recognized 634s | token: '-' "hmac_sha2_512_256" ';' "modp8192" '' 634s | appending ESP encryption algorithm CAMELLIA_CBC[_256] 634s | parsing integ: 634s | appending ESP integrity algorithm HMAC_SHA2_512_256[_0] 634s | token: ';' "modp8192" '' '' 634s | parsing dh: 634s | appending ESP DH algorithm MODP8192[_0] 634s | token: '' '' '' 634s ipsec algparse: ignoring ESP DH algorithm MODP8192 as PFS policy is disabled 634s | parsing 'null_auth_aes_gmac_256-null;modp8192' for ESP 634s | proposal: 'null_auth_aes_gmac_256-null;modp8192' 634s | token: '' '' "null_auth_aes_gmac_256" '-' 634s | token: '' "null_auth_aes_gmac_256" '-' "null" ';' 634s | ike_alg_byname() failed: ESP encryption algorithm 'null_auth_aes_gmac_256' is not recognized 634s | token: '-' "null" ';' "modp8192" '' 634s | appending ESP encryption algorithm NULL_AUTH_AES_GMAC[_256] 634s | parsing integ: 634s | appending ESP integrity algorithm NONE[_0] 634s | token: ';' "modp8192" '' '' 634s | parsing dh: 634s | appending ESP DH algorithm MODP8192[_0] 634s | token: '' '' '' 634s ipsec algparse: ignoring ESP DH algorithm MODP8192 as PFS policy is disabled 634s | parsing '3des-sha1;modp8192' for ESP 634s | proposal: '3des-sha1;modp8192' 634s | token: '' '' "3des" '-' 634s | token: '' "3des" '-' "sha1" ';' 634s | token: '-' "sha1" ';' "modp8192" '' 634s | appending ESP encryption algorithm 3DES_CBC[_0] 634s | parsing integ: 634s | appending ESP integrity algorithm HMAC_SHA1_96[_0] 634s | token: ';' "modp8192" '' '' 634s | parsing dh: 634s | appending ESP DH algorithm MODP8192[_0] 634s | token: '' '' '' 634s ipsec algparse: ignoring ESP DH algorithm MODP8192 as PFS policy is disabled 634s | parsing '3des-sha1-modp8192' for ESP 634s | proposal: '3des-sha1-modp8192' 634s | token: '' '' "3des" '-' 634s | token: '' "3des" '-' "sha1" '-' 634s | token: '-' "sha1" '-' "modp8192" '' 634s | appending ESP encryption algorithm 3DES_CBC[_0] 634s | parsing integ: 634s | appending ESP integrity algorithm HMAC_SHA1_96[_0] 634s | token: '-' "modp8192" '' '' 634s | parsing dh: 634s | appending ESP DH algorithm MODP8192[_0] 634s | token: '' '' '' 634s ipsec algparse: ignoring ESP DH algorithm MODP8192 as PFS policy is disabled 634s | parsing 'aes-sha1,3des-sha1;modp8192' for ESP 634s | proposal: 'aes-sha1' 634s | token: '' '' "aes" '-' 634s | token: '' "aes" '-' "sha1" '' 634s | token: '-' "sha1" '' '' 634s | appending ESP encryption algorithm AES_CBC[_0] 634s | parsing integ: 634s | appending ESP integrity algorithm HMAC_SHA1_96[_0] 634s | token: '' '' '' 634s | proposal: '3des-sha1;modp8192' 634s | token: '' '' "3des" '-' 634s | token: '' "3des" '-' "sha1" ';' 634s | token: '-' "sha1" ';' "modp8192" '' 634s | appending ESP encryption algorithm 3DES_CBC[_0] 634s | parsing integ: 634s | appending ESP integrity algorithm HMAC_SHA1_96[_0] 634s | token: ';' "modp8192" '' '' 634s | parsing dh: 634s | appending ESP DH algorithm MODP8192[_0] 634s | token: '' '' '' 634s ipsec algparse: ignoring ESP DH algorithm MODP8192 as PFS policy is disabled 634s | parsing 'aes-sha1-modp8192,3des-sha1-modp8192' for ESP 634s | proposal: 'aes-sha1-modp8192' 634s | token: '' '' "aes" '-' 634s | token: '' "aes" '-' "sha1" '-' 634s | token: '-' "sha1" '-' "modp8192" '' 634s | appending ESP encryption algorithm AES_CBC[_0] 634s | parsing integ: 634s | appending ESP integrity algorithm HMAC_SHA1_96[_0] 634s | token: '-' "modp8192" '' '' 634s | parsing dh: 634s | appending ESP DH algorithm MODP8192[_0] 634s | token: '' '' '' 634s | proposal: '3des-sha1-modp8192' 634s | token: '' '' "3des" '-' 634s | token: '' "3des" '-' "sha1" '-' 634s | token: '-' "sha1" '-' "modp8192" '' 634s | appending ESP encryption algorithm 3DES_CBC[_0] 634s | parsing integ: 634s | appending ESP integrity algorithm HMAC_SHA1_96[_0] 634s | token: '-' "modp8192" '' '' 634s | parsing dh: 634s | appending ESP DH algorithm MODP8192[_0] 634s | token: '' '' '' 634s ipsec algparse: ignoring ESP DH algorithm MODP8192 as PFS policy is disabled 634s ipsec algparse: ignoring ESP DH algorithm MODP8192 as PFS policy is disabled 634s | parsing 'aes-sha1-modp8192,aes-sha1-modp8192,aes-sha1-modp8192' for ESP 634s | proposal: 'aes-sha1-modp8192' 634s | token: '' '' "aes" '-' 634s | token: '' "aes" '-' "sha1" '-' 634s | token: '-' "sha1" '-' "modp8192" '' 634s | appending ESP encryption algorithm AES_CBC[_0] 634s | parsing integ: 634s | appending ESP integrity algorithm HMAC_SHA1_96[_0] 634s | token: '-' "modp8192" '' '' 634s | parsing dh: 634s | appending ESP DH algorithm MODP8192[_0] 634s | token: '' '' '' 634s | proposal: 'aes-sha1-modp8192' 634s | token: '' '' "aes" '-' 634s | token: '' "aes" '-' "sha1" '-' 634s | token: '-' "sha1" '-' "modp8192" '' 634s | appending ESP encryption algorithm AES_CBC[_0] 634s | parsing integ: 634s | appending ESP integrity algorithm HMAC_SHA1_96[_0] 634s | token: '-' "modp8192" '' '' 634s | parsing dh: 634s | appending ESP DH algorithm MODP8192[_0] 634s | token: '' '' '' 634s | proposal: 'aes-sha1-modp8192' 634s | token: '' '' "aes" '-' 634s | token: '' "aes" '-' "sha1" '-' 634s | token: '-' "sha1" '-' "modp8192" '' 634s | appending ESP encryption algorithm AES_CBC[_0] 634s | parsing integ: 634s | appending ESP integrity algorithm HMAC_SHA1_96[_0] 634s | token: '-' "modp8192" '' '' 634s | parsing dh: 634s | appending ESP DH algorithm MODP8192[_0] 634s | token: '' '' '' 634s ipsec algparse: ignoring ESP DH algorithm MODP8192 as PFS policy is disabled 634s | parsing 'aes;none' for ESP 634s | proposal: 'aes;none' 634s | token: '' '' "aes" ';' 634s | token: '' "aes" ';' "none" '' 634s | token: ';' "none" '' '' 634s | appending ESP encryption algorithm AES_CBC[_0] 634s | parsing dh: 634s | appending ESP DH algorithm NONE[_0] 634s | token: '' '' '' 634s | appending ESP integrity algorithm HMAC_SHA2_512_256[_0] 634s | appending ESP integrity algorithm HMAC_SHA2_256_128[_0] 634s ipsec algparse: ignoring redundant ESP DH algorithm NONE as PFS policy is disabled 634s | parsing 'aes;none,aes' for ESP 634s | proposal: 'aes;none' 634s | token: '' '' "aes" ';' 634s | token: '' "aes" ';' "none" '' 634s | token: ';' "none" '' '' 634s | appending ESP encryption algorithm AES_CBC[_0] 634s | parsing dh: 634s | appending ESP DH algorithm NONE[_0] 634s | token: '' '' '' 634s | appending ESP integrity algorithm HMAC_SHA2_512_256[_0] 634s | appending ESP integrity algorithm HMAC_SHA2_256_128[_0] 634s | proposal: 'aes' 634s | token: '' '' "aes" '' 634s | token: '' "aes" '' '' 634s | token: '' '' '' 634s | appending ESP encryption algorithm AES_CBC[_0] 634s | appending ESP integrity algorithm HMAC_SHA2_512_256[_0] 634s | appending ESP integrity algorithm HMAC_SHA2_256_128[_0] 634s ipsec algparse: ignoring redundant ESP DH algorithm NONE as PFS policy is disabled 634s | parsing 'aes;none,aes;modp2048' for ESP 634s | proposal: 'aes;none' 634s | token: '' '' "aes" ';' 634s | token: '' "aes" ';' "none" '' 634s | token: ';' "none" '' '' 634s | appending ESP encryption algorithm AES_CBC[_0] 634s | parsing dh: 634s | appending ESP DH algorithm NONE[_0] 634s | token: '' '' '' 634s | appending ESP integrity algorithm HMAC_SHA2_512_256[_0] 634s | appending ESP integrity algorithm HMAC_SHA2_256_128[_0] 634s | proposal: 'aes;modp2048' 634s | token: '' '' "aes" ';' 634s | token: '' "aes" ';' "modp2048" '' 634s | token: ';' "modp2048" '' '' 634s | appending ESP encryption algorithm AES_CBC[_0] 634s | parsing dh: 634s | appending ESP DH algorithm MODP2048[_0] 634s | token: '' '' '' 634s | appending ESP integrity algorithm HMAC_SHA2_512_256[_0] 634s | appending ESP integrity algorithm HMAC_SHA2_256_128[_0] 634s ipsec algparse: ignoring redundant ESP DH algorithm NONE as PFS policy is disabled 634s ipsec algparse: ignoring ESP DH algorithm MODP2048 as PFS policy is disabled 634s | parsing 'aes-sha1-none' for ESP 634s | proposal: 'aes-sha1-none' 634s | token: '' '' "aes" '-' 634s | token: '' "aes" '-' "sha1" '-' 634s | token: '-' "sha1" '-' "none" '' 634s | appending ESP encryption algorithm AES_CBC[_0] 634s | parsing integ: 634s | appending ESP integrity algorithm HMAC_SHA1_96[_0] 634s | token: '-' "none" '' '' 634s | parsing dh: 634s | appending ESP DH algorithm NONE[_0] 634s | token: '' '' '' 634s ipsec algparse: ignoring redundant ESP DH algorithm NONE as PFS policy is disabled 634s | parsing 'aes-sha1;none' for ESP 634s | proposal: 'aes-sha1;none' 634s | token: '' '' "aes" '-' 634s | token: '' "aes" '-' "sha1" ';' 634s | token: '-' "sha1" ';' "none" '' 634s | appending ESP encryption algorithm AES_CBC[_0] 634s | parsing integ: 634s | appending ESP integrity algorithm HMAC_SHA1_96[_0] 634s | token: ';' "none" '' '' 634s | parsing dh: 634s | appending ESP DH algorithm NONE[_0] 634s | token: '' '' '' 634s ipsec algparse: ignoring redundant ESP DH algorithm NONE as PFS policy is disabled 634s | parsing '3des168-sha1' for ESP 634s | proposal: '3des168-sha1' 634s | token: '' '' "3des168" '-' 634s | token: '' "3des168" '-' "sha1" '' 634s | ike_alg_byname() failed: ESP encryption algorithm '3des168' is not recognized 634s | parsing '3des-null' for ESP 634s | proposal: '3des-null' 634s | token: '' '' "3des" '-' 634s | token: '' "3des" '-' "null" '' 634s | token: '-' "null" '' '' 634s | appending ESP encryption algorithm 3DES_CBC[_0] 634s | parsing integ: 634s | appending ESP integrity algorithm NONE[_0] 634s | token: '' '' '' 634s | parsing 'aes128-null' for ESP 634s | proposal: 'aes128-null' 634s | token: '' '' "aes128" '-' 634s | token: '' "aes128" '-' "null" '' 634s | ike_alg_byname() failed: ESP encryption algorithm 'aes128' is not recognized 634s | token: '-' "null" '' '' 634s | appending ESP encryption algorithm AES_CBC[_128] 634s | parsing integ: 634s | appending ESP integrity algorithm NONE[_0] 634s | token: '' '' '' 634s | parsing 'aes224-sha1' for ESP 634s | proposal: 'aes224-sha1' 634s | token: '' '' "aes224" '-' 634s | token: '' "aes224" '-' "sha1" '' 634s | ike_alg_byname() failed: ESP encryption algorithm 'aes224' is not recognized 634s | parsing 'aes-224-sha1' for ESP 634s | proposal: 'aes-224-sha1' 634s | token: '' '' "aes" '-' 634s | token: '' "aes" '-' "224" '-' 634s | byname('aes') with ='224' failed: ESP encryption algorithm AES_CBC with key length 224 invalid; valid key lengths: 128, 192, 256 634s | parsing 'aes0-sha1' for ESP 634s | proposal: 'aes0-sha1' 634s | token: '' '' "aes0" '-' 634s | token: '' "aes0" '-' "sha1" '' 634s | ike_alg_byname() failed: ESP encryption algorithm 'aes0' is not recognized 634s | parsing 'aes-0-sha1' for ESP 634s | proposal: 'aes-0-sha1' 634s | token: '' '' "aes" '-' 634s | token: '' "aes" '-' "0" '-' 634s | parsing 'aes512-sha1' for ESP 634s | proposal: 'aes512-sha1' 634s | token: '' '' "aes512" '-' 634s | token: '' "aes512" '-' "sha1" '' 634s | ike_alg_byname() failed: ESP encryption algorithm 'aes512' is not recognized 634s | parsing 'aes-sha1555' for ESP 634s | proposal: 'aes-sha1555' 634s | token: '' '' "aes" '-' 634s | token: '' "aes" '-' "sha1555" '' 634s | token: '-' "sha1555" '' '' 634s | appending ESP encryption algorithm AES_CBC[_0] 634s | parsing integ: 634s | ike_alg_byname() failed: ESP integrity algorithm 'sha1555' is not recognized 634s | lookup for integrity algorithm 'sha1555' failed 634s | or - failed 'ESP integrity algorithm 'sha1555' is not recognized') 634s | parsing 'camellia666-sha1' for ESP 634s | proposal: 'camellia666-sha1' 634s | token: '' '' "camellia666" '-' 634s | token: '' "camellia666" '-' "sha1" '' 634s | ike_alg_byname() failed: ESP encryption algorithm 'camellia666' is not recognized 634s | parsing 'blowfish' for ESP 634s | proposal: 'blowfish' 634s | token: '' '' "blowfish" '' 634s | token: '' "blowfish" '' '' 634s | ike_alg_byname() failed: ESP encryption algorithm 'blowfish' is not supported 634s | parsing 'des-sha1' for ESP 634s | proposal: 'des-sha1' 634s | token: '' '' "des" '-' 634s | token: '' "des" '-' "sha1" '' 634s | ike_alg_byname() failed: ESP encryption algorithm 'des' is not supported 634s | parsing 'aes_ctr666' for ESP 634s | proposal: 'aes_ctr666' 634s | token: '' '' "aes_ctr666" '' 634s | token: '' "aes_ctr666" '' '' 634s | ike_alg_byname() failed: ESP encryption algorithm 'aes_ctr666' is not recognized 634s | parsing 'aes128-sha2_128' for ESP 634s | proposal: 'aes128-sha2_128' 634s | token: '' '' "aes128" '-' 634s | token: '' "aes128" '-' "sha2_128" '' 634s | ike_alg_byname() failed: ESP encryption algorithm 'aes128' is not recognized 634s | token: '-' "sha2_128" '' '' 634s | appending ESP encryption algorithm AES_CBC[_128] 634s | parsing integ: 634s | ike_alg_byname() failed: ESP integrity algorithm 'sha2_128' is not recognized 634s | lookup for integrity algorithm 'sha2_128' failed 634s | or - failed 'ESP integrity algorithm 'sha2_128' is not recognized') 634s | parsing 'aes256-sha2_256-4096' for ESP 634s | proposal: 'aes256-sha2_256-4096' 634s | token: '' '' "aes256" '-' 634s | token: '' "aes256" '-' "sha2_256" '-' 634s | ike_alg_byname() failed: ESP encryption algorithm 'aes256' is not recognized 634s | token: '-' "sha2_256" '-' "4096" '' 634s | appending ESP encryption algorithm AES_CBC[_256] 634s | parsing integ: 634s | appending ESP integrity algorithm HMAC_SHA2_256_128[_0] 634s | token: '-' "4096" '' '' 634s | parsing dh: 634s | ike_alg_byname() failed: ESP DH algorithm '4096' is not recognized 634s | lookup for DH algorithm '4096' failed 634s | ... failed 'ESP DH algorithm '4096' is not recognized' 634s | parsing 'aes256-sha2_256-128' for ESP 634s | proposal: 'aes256-sha2_256-128' 634s | token: '' '' "aes256" '-' 634s | token: '' "aes256" '-' "sha2_256" '-' 634s | ike_alg_byname() failed: ESP encryption algorithm 'aes256' is not recognized 634s | token: '-' "sha2_256" '-' "128" '' 634s | appending ESP encryption algorithm AES_CBC[_256] 634s | parsing integ: 634s | appending ESP integrity algorithm HMAC_SHA2_256_128[_0] 634s | token: '-' "128" '' '' 634s | parsing dh: 634s | ike_alg_byname() failed: ESP DH algorithm '128' is not recognized 634s | lookup for DH algorithm '128' failed 634s | ... failed 'ESP DH algorithm '128' is not recognized' 634s | parsing 'vanitycipher' for ESP 634s | proposal: 'vanitycipher' 634s | token: '' '' "vanitycipher" '' 634s | token: '' "vanitycipher" '' '' 634s | ike_alg_byname() failed: ESP encryption algorithm 'vanitycipher' is not recognized 634s | parsing 'ase-sah' for ESP 634s | proposal: 'ase-sah' 634s | token: '' '' "ase" '-' 634s | token: '' "ase" '-' "sah" '' 634s | ike_alg_byname() failed: ESP encryption algorithm 'ase' is not recognized 634s | parsing 'aes-sah1' for ESP 634s | proposal: 'aes-sah1' 634s | token: '' '' "aes" '-' 634s | token: '' "aes" '-' "sah1" '' 634s | token: '-' "sah1" '' '' 634s | appending ESP encryption algorithm AES_CBC[_0] 634s | parsing integ: 634s | ike_alg_byname() failed: ESP integrity algorithm 'sah1' is not recognized 634s | lookup for integrity algorithm 'sah1' failed 634s | or - failed 'ESP integrity algorithm 'sah1' is not recognized') 634s | parsing 'id3' for ESP 634s | proposal: 'id3' 634s | token: '' '' "id3" '' 634s | token: '' "id3" '' '' 634s | ike_alg_byname() failed: ESP encryption algorithm 'id3' is not recognized 634s | ike_alg_byname() failed: ESP encryption algorithm 'id3' is not recognized 634s | parsing 'aes-id3' for ESP 634s | proposal: 'aes-id3' 634s | token: '' '' "aes" '-' 634s | token: '' "aes" '-' "id3" '' 634s | token: '-' "id3" '' '' 634s | appending ESP encryption algorithm AES_CBC[_0] 634s | parsing integ: 634s | ike_alg_byname() failed: ESP integrity algorithm 'id3' is not recognized 634s | lookup for integrity algorithm 'id3' failed 634s | or - failed 'ESP integrity algorithm 'id3' is not recognized') 634s | parsing 'aes_gcm-md5' for ESP 634s | proposal: 'aes_gcm-md5' 634s | token: '' '' "aes_gcm" '-' 634s | token: '' "aes_gcm" '-' "md5" '' 634s | token: '-' "md5" '' '' 634s | appending ESP encryption algorithm AES_GCM_16[_0] 634s | parsing integ: 634s | appending ESP integrity algorithm HMAC_MD5_96[_0] 634s | token: '' '' '' 634s | parsing 'mars' for ESP 634s | proposal: 'mars' 634s | token: '' '' "mars" '' 634s | token: '' "mars" '' '' 634s | ike_alg_byname() failed: ESP encryption algorithm 'mars' is not supported 634s | parsing 'aes_gcm-16' for ESP 634s | proposal: 'aes_gcm-16' 634s | token: '' '' "aes_gcm" '-' 634s | token: '' "aes_gcm" '-' "16" '' 634s | byname('aes_gcm') with ='16' failed: ESP encryption algorithm AES_GCM_16 with key length 16 invalid; valid key lengths: 128, 192, 256 634s | parsing 'aes_gcm-0' for ESP 634s | proposal: 'aes_gcm-0' 634s | token: '' '' "aes_gcm" '-' 634s | token: '' "aes_gcm" '-' "0" '' 634s | parsing 'aes_gcm-123456789012345' for ESP 634s | proposal: 'aes_gcm-123456789012345' 634s | token: '' '' "aes_gcm" '-' 634s | token: '' "aes_gcm" '-' "123456789012345" '' 634s | parsing '3des-sha1;dh22' for ESP 634s | proposal: '3des-sha1;dh22' 634s | token: '' '' "3des" '-' 634s | token: '' "3des" '-' "sha1" ';' 634s | token: '-' "sha1" ';' "dh22" '' 634s | appending ESP encryption algorithm 3DES_CBC[_0] 634s | parsing integ: 634s | appending ESP integrity algorithm HMAC_SHA1_96[_0] 634s | token: ';' "dh22" '' '' 634s | parsing dh: 634s | ike_alg_byname() failed: ESP DH algorithm 'dh22' is not supported 634s | lookup for DH algorithm 'dh22' failed 634s | ... failed 'ESP DH algorithm 'dh22' is not supported' 634s | parsing '3des-sha1;modp8192,3des-sha2' for ESP 634s | proposal: '3des-sha1;modp8192' 634s | token: '' '' "3des" '-' 634s | token: '' "3des" '-' "sha1" ';' 634s | token: '-' "sha1" ';' "modp8192" '' 634s | appending ESP encryption algorithm 3DES_CBC[_0] 634s | parsing integ: 634s | appending ESP integrity algorithm HMAC_SHA1_96[_0] 634s | token: ';' "modp8192" '' '' 634s | parsing dh: 634s | appending ESP DH algorithm MODP8192[_0] 634s | token: '' '' '' 634s | proposal: '3des-sha2' 634s | token: '' '' "3des" '-' 634s | token: '' "3des" '-' "sha2" '' 634s | token: '-' "sha2" '' '' 634s | appending ESP encryption algorithm 3DES_CBC[_0] 634s | parsing integ: 634s | appending ESP integrity algorithm HMAC_SHA2_256_128[_0] 634s | token: '' '' '' 634s ipsec algparse: ignoring ESP DH algorithm MODP8192 as PFS policy is disabled 634s | parsing '3des-sha1-modp8192,3des-sha2' for ESP 634s | proposal: '3des-sha1-modp8192' 634s | token: '' '' "3des" '-' 634s | token: '' "3des" '-' "sha1" '-' 634s | token: '-' "sha1" '-' "modp8192" '' 634s | appending ESP encryption algorithm 3DES_CBC[_0] 634s | parsing integ: 634s | appending ESP integrity algorithm HMAC_SHA1_96[_0] 634s | token: '-' "modp8192" '' '' 634s | parsing dh: 634s | appending ESP DH algorithm MODP8192[_0] 634s | token: '' '' '' 634s | proposal: '3des-sha2' 634s | token: '' '' "3des" '-' 634s | token: '' "3des" '-' "sha2" '' 634s | token: '-' "sha2" '' '' 634s | appending ESP encryption algorithm 3DES_CBC[_0] 634s | parsing integ: 634s | appending ESP integrity algorithm HMAC_SHA2_256_128[_0] 634s | token: '' '' '' 634s ipsec algparse: ignoring ESP DH algorithm MODP8192 as PFS policy is disabled 634s | parsing '3des-sha1-modp8192,3des-sha2-modp8192' for ESP 634s | proposal: '3des-sha1-modp8192' 634s | token: '' '' "3des" '-' 634s | token: '' "3des" '-' "sha1" '-' 634s | token: '-' "sha1" '-' "modp8192" '' 634s | appending ESP encryption algorithm 3DES_CBC[_0] 634s | parsing integ: 634s | appending ESP integrity algorithm HMAC_SHA1_96[_0] 634s | token: '-' "modp8192" '' '' 634s | parsing dh: 634s | appending ESP DH algorithm MODP8192[_0] 634s | token: '' '' '' 634s | proposal: '3des-sha2-modp8192' 634s | token: '' '' "3des" '-' 634s | token: '' "3des" '-' "sha2" '-' 634s | token: '-' "sha2" '-' "modp8192" '' 634s | appending ESP encryption algorithm 3DES_CBC[_0] 634s | parsing integ: 634s | appending ESP integrity algorithm HMAC_SHA2_256_128[_0] 634s | token: '-' "modp8192" '' '' 634s | parsing dh: 634s | appending ESP DH algorithm MODP8192[_0] 634s | token: '' '' '' 634s ipsec algparse: ignoring ESP DH algorithm MODP8192 as PFS policy is disabled 634s ipsec algparse: ignoring ESP DH algorithm MODP8192 as PFS policy is disabled 634s | parsing '3des-sha1-modp8192,3des-sha2;modp8192' for ESP 634s | proposal: '3des-sha1-modp8192' 634s | token: '' '' "3des" '-' 634s | token: '' "3des" '-' "sha1" '-' 634s | token: '-' "sha1" '-' "modp8192" '' 634s | appending ESP encryption algorithm 3DES_CBC[_0] 634s | parsing integ: 634s | appending ESP integrity algorithm HMAC_SHA1_96[_0] 634s | token: '-' "modp8192" '' '' 634s | parsing dh: 634s | appending ESP DH algorithm MODP8192[_0] 634s | token: '' '' '' 634s | proposal: '3des-sha2;modp8192' 634s | token: '' '' "3des" '-' 634s | token: '' "3des" '-' "sha2" ';' 634s | token: '-' "sha2" ';' "modp8192" '' 634s | appending ESP encryption algorithm 3DES_CBC[_0] 634s | parsing integ: 634s | appending ESP integrity algorithm HMAC_SHA2_256_128[_0] 634s | token: ';' "modp8192" '' '' 634s | parsing dh: 634s | appending ESP DH algorithm MODP8192[_0] 634s | token: '' '' '' 634s ipsec algparse: ignoring ESP DH algorithm MODP8192 as PFS policy is disabled 634s ipsec algparse: ignoring ESP DH algorithm MODP8192 as PFS policy is disabled 634s | parsing '3des-sha1;modp8192,3des-sha2-modp8192' for ESP 634s | proposal: '3des-sha1;modp8192' 634s | token: '' '' "3des" '-' 634s | token: '' "3des" '-' "sha1" ';' 634s | token: '-' "sha1" ';' "modp8192" '' 634s | appending ESP encryption algorithm 3DES_CBC[_0] 634s | parsing integ: 634s | appending ESP integrity algorithm HMAC_SHA1_96[_0] 634s | token: ';' "modp8192" '' '' 634s | parsing dh: 634s | appending ESP DH algorithm MODP8192[_0] 634s | token: '' '' '' 634s | proposal: '3des-sha2-modp8192' 634s | token: '' '' "3des" '-' 634s | token: '' "3des" '-' "sha2" '-' 634s | token: '-' "sha2" '-' "modp8192" '' 634s | appending ESP encryption algorithm 3DES_CBC[_0] 634s | parsing integ: 634s | appending ESP integrity algorithm HMAC_SHA2_256_128[_0] 634s | token: '-' "modp8192" '' '' 634s | parsing dh: 634s | appending ESP DH algorithm MODP8192[_0] 634s | token: '' '' '' 634s ipsec algparse: ignoring ESP DH algorithm MODP8192 as PFS policy is disabled 634s ipsec algparse: ignoring ESP DH algorithm MODP8192 as PFS policy is disabled 634s | parsing '3des-sha1;modp8192,3des-sha2;modp8192' for ESP 634s | proposal: '3des-sha1;modp8192' 634s | token: '' '' "3des" '-' 634s | token: '' "3des" '-' "sha1" ';' 634s | token: '-' "sha1" ';' "modp8192" '' 634s | appending ESP encryption algorithm 3DES_CBC[_0] 634s | parsing integ: 634s | appending ESP integrity algorithm HMAC_SHA1_96[_0] 634s | token: ';' "modp8192" '' '' 634s | parsing dh: 634s | appending ESP DH algorithm MODP8192[_0] 634s | token: '' '' '' 634s | proposal: '3des-sha2;modp8192' 634s | token: '' '' "3des" '-' 634s | token: '' "3des" '-' "sha2" ';' 634s | token: '-' "sha2" ';' "modp8192" '' 634s | appending ESP encryption algorithm 3DES_CBC[_0] 634s | parsing integ: 634s | appending ESP integrity algorithm HMAC_SHA2_256_128[_0] 634s | token: ';' "modp8192" '' '' 634s | parsing dh: 634s | appending ESP DH algorithm MODP8192[_0] 634s | token: '' '' '' 634s ipsec algparse: ignoring ESP DH algorithm MODP8192 as PFS policy is disabled 634s ipsec algparse: ignoring ESP DH algorithm MODP8192 as PFS policy is disabled 634s | parsing '3des-sha1-modp8192,3des-sha2-modp2048' for ESP 634s | proposal: '3des-sha1-modp8192' 634s | token: '' '' "3des" '-' 634s | token: '' "3des" '-' "sha1" '-' 634s | token: '-' "sha1" '-' "modp8192" '' 634s | appending ESP encryption algorithm 3DES_CBC[_0] 634s | parsing integ: 634s | appending ESP integrity algorithm HMAC_SHA1_96[_0] 634s | token: '-' "modp8192" '' '' 634s | parsing dh: 634s | appending ESP DH algorithm MODP8192[_0] 634s | token: '' '' '' 634s | proposal: '3des-sha2-modp2048' 634s | token: '' '' "3des" '-' 634s | token: '' "3des" '-' "sha2" '-' 634s | token: '-' "sha2" '-' "modp2048" '' 634s | appending ESP encryption algorithm 3DES_CBC[_0] 634s | parsing integ: 634s | appending ESP integrity algorithm HMAC_SHA2_256_128[_0] 634s | token: '-' "modp2048" '' '' 634s | parsing dh: 634s | appending ESP DH algorithm MODP2048[_0] 634s | token: '' '' '' 634s ipsec algparse: ignoring ESP DH algorithm MODP8192 as PFS policy is disabled 634s ipsec algparse: ignoring ESP DH algorithm MODP2048 as PFS policy is disabled 634s | parsing 'SHA2_512_256,SHA2_256_128' for AH 634s | proposal: 'SHA2_512_256' 634s | token: '' '' "SHA2_512_256" '' 634s | token: '' "SHA2_512_256" '' '' 634s | parsing integ: 634s | appending AH integrity algorithm HMAC_SHA2_512_256[_0] 634s | token: '' '' '' 634s | proposal: 'SHA2_256_128' 634s | token: '' '' "SHA2_256_128" '' 634s | token: '' "SHA2_256_128" '' '' 634s | parsing integ: 634s | appending AH integrity algorithm HMAC_SHA2_256_128[_0] 634s | token: '' '' '' 634s | parsing '' for AH 634s | parsing 'md5' for AH 634s | proposal: 'md5' 634s | token: '' '' "md5" '' 634s | token: '' "md5" '' '' 634s | parsing integ: 634s | appending AH integrity algorithm HMAC_MD5_96[_0] 634s | token: '' '' '' 634s | parsing 'sha' for AH 634s | proposal: 'sha' 634s | token: '' '' "sha" '' 634s | token: '' "sha" '' '' 634s | parsing integ: 634s | appending AH integrity algorithm HMAC_SHA1_96[_0] 634s | token: '' '' '' 634s | parsing 'sha;modp2048' for AH 634s | proposal: 'sha;modp2048' 634s | token: '' '' "sha" ';' 634s | token: '' "sha" ';' "modp2048" '' 634s | parsing integ: 634s | appending AH integrity algorithm HMAC_SHA1_96[_0] 634s | token: ';' "modp2048" '' '' 634s | parsing dh: 634s | appending AH DH algorithm MODP2048[_0] 634s | token: '' '' '' 634s ipsec algparse: ignoring AH DH algorithm MODP2048 as PFS policy is disabled 634s | parsing 'sha1' for AH 634s | proposal: 'sha1' 634s | token: '' '' "sha1" '' 634s | token: '' "sha1" '' '' 634s | parsing integ: 634s | appending AH integrity algorithm HMAC_SHA1_96[_0] 634s | token: '' '' '' 634s | parsing 'sha2' for AH 634s | proposal: 'sha2' 634s | token: '' '' "sha2" '' 634s | token: '' "sha2" '' '' 634s | parsing integ: 634s | appending AH integrity algorithm HMAC_SHA2_256_128[_0] 634s | token: '' '' '' 634s | parsing 'sha256' for AH 634s | proposal: 'sha256' 634s | token: '' '' "sha256" '' 634s | token: '' "sha256" '' '' 634s | parsing integ: 634s | appending AH integrity algorithm HMAC_SHA2_256_128[_0] 634s | token: '' '' '' 634s | parsing 'sha384' for AH 634s | proposal: 'sha384' 634s | token: '' '' "sha384" '' 634s | token: '' "sha384" '' '' 634s | parsing integ: 634s | appending AH integrity algorithm HMAC_SHA2_384_192[_0] 634s | token: '' '' '' 634s | parsing 'sha512' for AH 634s | proposal: 'sha512' 634s | token: '' '' "sha512" '' 634s | token: '' "sha512" '' '' 634s | parsing integ: 634s | appending AH integrity algorithm HMAC_SHA2_512_256[_0] 634s | token: '' '' '' 634s | parsing 'sha2_256' for AH 634s | proposal: 'sha2_256' 634s | token: '' '' "sha2_256" '' 634s | token: '' "sha2_256" '' '' 634s | parsing integ: 634s | appending AH integrity algorithm HMAC_SHA2_256_128[_0] 634s | token: '' '' '' 634s | parsing 'sha2_384' for AH 634s | proposal: 'sha2_384' 634s | token: '' '' "sha2_384" '' 634s | token: '' "sha2_384" '' '' 634s | parsing integ: 634s | appending AH integrity algorithm HMAC_SHA2_384_192[_0] 634s | token: '' '' '' 634s | parsing 'sha2_512' for AH 634s | proposal: 'sha2_512' 634s | token: '' '' "sha2_512" '' 634s | token: '' "sha2_512" '' '' 634s | parsing integ: 634s | appending AH integrity algorithm HMAC_SHA2_512_256[_0] 634s | token: '' '' '' 634s | parsing 'aes_xcbc' for AH 634s | proposal: 'aes_xcbc' 634s | token: '' '' "aes_xcbc" '' 634s | token: '' "aes_xcbc" '' '' 634s | parsing integ: 634s | appending AH integrity algorithm AES_XCBC_96[_0] 634s | token: '' '' '' 634s | parsing 'sha2-none' for AH 634s | proposal: 'sha2-none' 634s | token: '' '' "sha2" '-' 634s | token: '' "sha2" '-' "none" '' 634s | parsing integ: 634s | appending AH inte ERROR: ESP encryption key length is zero 634s algparse -v2 'esp=aes512-sha1' (expect ERROR) 634s ERROR: ESP encryption algorithm AES_CBC with key length 512 invalid; valid key lengths: 128, 192, 256 634s algparse -v2 'esp=aes-sha1555' (expect ERROR) 634s ERROR: ESP integrity algorithm 'sha1555' is not recognized 634s algparse -v2 'esp=camellia666-sha1' (expect ERROR) 634s ERROR: ESP encryption algorithm CAMELLIA_CBC with key length 666 invalid; valid key lengths: 128, 192, 256 634s algparse -v2 'esp=blowfish' (expect ERROR) 634s ERROR: ESP encryption algorithm 'blowfish' is not supported 634s algparse -v2 'esp=des-sha1' (expect ERROR) 634s ERROR: ESP encryption algorithm 'des' is not supported 634s algparse -v2 'esp=aes_ctr666' (expect ERROR) 634s ERROR: ESP encryption algorithm AES_CTR with key length 666 invalid; valid key lengths: 128, 192, 256 634s algparse -v2 'esp=aes128-sha2_128' (expect ERROR) 634s ERROR: ESP integrity algorithm 'sha2_128' is not recognized 634s algparse -v2 'esp=aes256-sha2_256-4096' (expect ERROR) 634s ERROR: ESP DH algorithm '4096' is not recognized 634s algparse -v2 'esp=aes256-sha2_256-128' (expect ERROR) 634s ERROR: ESP DH algorithm '128' is not recognized 634s algparse -v2 'esp=vanitycipher' (expect ERROR) 634s ERROR: ESP encryption algorithm 'vanitycipher' is not recognized 634s algparse -v2 'esp=ase-sah' (expect ERROR) 634s ERROR: ESP encryption algorithm 'ase' is not recognized 634s algparse -v2 'esp=aes-sah1' (expect ERROR) 634s ERROR: ESP integrity algorithm 'sah1' is not recognized 634s algparse -v2 'esp=id3' (expect ERROR) 634s ERROR: ESP encryption algorithm 'id3' is not recognized 634s algparse -v2 'esp=aes-id3' (expect ERROR) 634s ERROR: ESP integrity algorithm 'id3' is not recognized 634s algparse -v2 'esp=aes_gcm-md5' (expect ERROR) 634s ERROR: AEAD ESP encryption algorithm AES_GCM_16 must have 'NONE' as the integrity algorithm 634s algparse -v2 'esp=mars' (expect ERROR) 634s ERROR: ESP encryption algorithm 'mars' is not supported 634s algparse -v2 'esp=aes_gcm-16' (expect ERROR) 634s ERROR: ESP encryption algorithm AES_GCM_16 with key length 16 invalid; valid key lengths: 128, 192, 256 634s algparse -v2 'esp=aes_gcm-0' (expect ERROR) 634s ERROR: ESP encryption key length is zero 634s algparse -v2 'esp=aes_gcm-123456789012345' (expect ERROR) 634s ERROR: ESP encryption algorithm 'aes_gcm-123456789012345' key length WAY too big 634s algparse -v2 'esp=3des-sha1;dh22' (expect ERROR) 634s ERROR: ESP DH algorithm 'dh22' is not supported 634s algparse -v2 'esp=3des-sha1;modp8192,3des-sha2' (expect SUCCESS) 634s 3DES_CBC-HMAC_SHA1_96 634s 3DES_CBC-HMAC_SHA2_256_128 634s algparse -v2 'esp=3des-sha1-modp8192,3des-sha2' (expect SUCCESS) 634s 3DES_CBC-HMAC_SHA1_96 634s 3DES_CBC-HMAC_SHA2_256_128 634s algparse -v2 'esp=3des-sha1-modp8192,3des-sha2-modp8192' (expect SUCCESS) 634s 3DES_CBC-HMAC_SHA1_96 634s 3DES_CBC-HMAC_SHA2_256_128 634s algparse -v2 'esp=3des-sha1-modp8192,3des-sha2;modp8192' (expect SUCCESS) 634s 3DES_CBC-HMAC_SHA1_96 634s 3DES_CBC-HMAC_SHA2_256_128 634s algparse -v2 'esp=3des-sha1;modp8192,3des-sha2-modp8192' (expect SUCCESS) 634s 3DES_CBC-HMAC_SHA1_96 634s 3DES_CBC-HMAC_SHA2_256_128 634s algparse -v2 'esp=3des-sha1;modp8192,3des-sha2;modp8192' (expect SUCCESS) 634s 3DES_CBC-HMAC_SHA1_96 634s 3DES_CBC-HMAC_SHA2_256_128 634s algparse -v2 'esp=3des-sha1-modp8192,3des-sha2-modp2048' (expect SUCCESS) 634s 3DES_CBC-HMAC_SHA1_96 634s 3DES_CBC-HMAC_SHA2_256_128 634s algparse -v2 'ah' (expect SUCCESS) 634s HMAC_SHA2_512_256 634s HMAC_SHA2_256_128 634s algparse -v2 'ah=' (expect ERROR) 634s ERROR: AH proposal is empty 634s algparse -v2 'ah=md5' (expect SUCCESS) 634s HMAC_MD5_96 634s algparse -v2 'ah=sha' (expect SUCCESS) 634s HMAC_SHA1_96 634s algparse -v2 'ah=sha;modp2048' (expect SUCCESS) 634s HMAC_SHA1_96 634s algparse -v2 'ah=sha1' (expect SUCCESS) 634s HMAC_SHA1_96 634s algparse -v2 'ah=sha2' (expect SUCCESS) 634s HMAC_SHA2_256_128 634s algparse -v2 'ah=sha256' (expect SUCCESS) 634s HMAC_SHA2_256_128 634s algparse -v2 'ah=sha384' (expect SUCCESS) 634s HMAC_SHA2_384_192 634s algparse -v2 'ah=sha512' (expect SUCCESS) 634s HMAC_SHA2_512_256 634s algparse -v2 'ah=sha2_256' (expect SUCCESS) 634s HMAC_SHA2_256_128 634s algparse -v2 'ah=sha2_384' (expect SUCCESS) 634s HMAC_SHA2_384_192 634s algparse -v2 'ah=sha2_512' (expect SUCCESS) 634s HMAC_SHA2_512_256 634s algparse -v2 'ah=aes_xcbc' (expect SUCCESS) 634s AES_XCBC_96 634s algparse -v2 'ah=sha2-none' (expect SUCCESS) 634s HMAC_SHA2_256_128 634s algparse -v2 'ah=sha2;none' (expect SUCCESS) 634s HMAC_SHA2_256_128 634s algparse -v2 'ah=sha1-modp8192,sha1-modp8192,sha1-modp8192' (expect SUCCESS) 634s HMAC_SHA1_96 634s algparse -v2 'ah=aes-sha1' (expect ERROR) 634s ERROR: AH integrity algorithm 'aes' is not recognized 634s algparse -v2 'ah=vanityhash1' (expect ERROR) 634s ERROR: AH integrity algorithm 'vanityhash1' is not recognized 634s algparse -v2 'ah=aes_gcm_c-256' (expect ERROR) 634s ERROR: AH integrity algorithm 'aes_gcm_c' is not recognized 634s algparse -v2 'ah=id3' (expect ERROR) 634s ERROR: AH integrity algorithm 'id3' is not recognized 634s algparse -v2 'ah=3des' (expect ERROR) 634s ERROR: AH integrity algorithm '3des' is not recognized 634s algparse -v2 'ah=null' (expect ERROR) 634s ERROR: AH cannot have 'none' as the integrity algorithm 634s algparse -v2 'ah=aes_gcm' (expect ERROR) 634s ERROR: AH integrity algorithm 'aes_gcm' is not recognized 634s algparse -v2 'ah=aes_ccm' (expect ERROR) 634s ERROR: AH integrity algorithm 'aes_ccm' is not recognized 634s algparse -v2 'ah=ripemd' (expect ERROR) 634s ERROR: AH integrity algorithm 'ripemd' is not recognized 634s algparse -v2 'ike' (expect SUCCESS) 634s AES_GCM_16_256-HMAC_SHA2_512+HMAC_SHA2_256-DH19+DH20+DH21+DH31+MODP4096+MODP3072+MODP2048+MODP8192 634s AES_GCM_16_128-HMAC_SHA2_512+HMAC_SHA2_256-DH19+DH20+DH21+DH31+MODP4096+MODP3072+MODP2048+MODP8192 634s CHACHA20_POLY1305-HMAC_SHA2_512+HMAC_SHA2_256-DH19+DH20+DH21+DH31+MODP4096+MODP3072+MODP2048+MODP8192 634s AES_CBC_256-HMAC_SHA2_512+HMAC_SHA2_256-DH19+DH20+DH21+DH31+MODP4096+MODP3072+MODP2048+MODP8192 634s AES_CBC_128-HMAC_SHA2_512+HMAC_SHA2_256-DH19+DH20+DH21+DH31+MODP4096+MODP3072+MODP2048+MODP8192 634s algparse -v2 'ike=' (expect ERROR) 634s ERROR: IKE proposal is empty 634s algparse -v2 'ike=3des-sha1' (expect SUCCESS) 634s 3DES_CBC-HMAC_SHA1-DH19+DH20+DH21+DH31+MODP4096+MODP3072+MODP2048+MODP8192 634s algparse -v2 'ike=3des-sha1' (expect SUCCESS) 634s 3DES_CBC-HMAC_SHA1-DH19+DH20+DH21+DH31+MODP4096+MODP3072+MODP2048+MODP8192 634s algparse -v2 'ike=3des-sha1;modp1536' (expect SUCCESS) 634s 3DES_CBC-HMAC_SHA1-MODP1536 634s algparse -v2 'ike=3des;dh21' (expect SUCCESS) 634s 3DES_CBC-HMAC_SHA2_512+HMAC_SHA2_256-DH21 634s algparse -v2 'ike=3des-sha1;dh21' (expect SUCCESS) 634s 3DES_CBC-HMAC_SHA1-DH21 634s algparse -v2 'ike=3des-sha1-ecp_521' (expect SUCCESS) 634s 3DES_CBC-HMAC_SHA1-DH21 634s algparse -v2 'ike=3des+aes' (expect SUCCESS) 634s 3DES_CBC+AES_CBC-HMAC_SHA2_512+HMAC_SHA2_256-DH19+DH20+DH21+DH31+MODP4096+MODP3072+MODP2048+MODP8192 634s algparse -v2 'ike=aes;none' (expect ERROR) 634s ERROR: IKE DH algorithm 'none' not permitted 634s algparse -v2 'ike=id2' (expect ERROR) 634s ERROR: IKE encryption algorithm 'id2' is not recognized 634s algparse -v2 'ike=3des-id2' (expect ERROR) 634s ERROR: IKE PRF algorithm 'id2' is not recognized 634s algparse -v2 'ike=aes_ccm' (expect ERROR) 634s ERROR: IKE encryption algorithm 'aes_ccm' is not supported 634s algparse -v2 'ike=aes-sha1-sha2-ecp_521' (expect ERROR) 634s ERROR: IKE DH algorithm 'sha2' is not recognized 634s algparse -v2 'ike=aes-sha2-sha2;ecp_521' (expect ERROR) 634s ERROR: IKE DH algorithm 'sha2' is not recognized 634s algparse -v2 'ike=aes-sha1_96-sha2-ecp_521' (expect SUCCESS) 634s AES_CBC-HMAC_SHA1_96-HMAC_SHA2_256-DH21 634s algparse -v2 'ike=aes-sha1_96-sha2;ecp_521' (expect SUCCESS) 634s AES_CBC-HMAC_SHA1_96-HMAC_SHA2_256-DH21 634s algparse -v2 'ike=aes+aes-sha1+sha1-modp8192+modp8192' (expect SUCCESS) 634s AES_CBC-HMAC_SHA1-MODP8192 634s algparse -v2 'ike=3des+aes+aes-sha2+sha1+sha1-modp4096+modp8192+modp8192' (expect SUCCESS) 634s 3DES_CBC+AES_CBC-HMAC_SHA2_256+HMAC_SHA1-MODP4096+MODP8192 634s algparse -v2 'ike=aes+3des+aes-sha1+sha2+sha1-modp8192+modp4096+modp8192' (expect SUCCESS) 634s AES_CBC+3DES_CBC-HMAC_SHA1+HMAC_SHA2_256-MODP8192+MODP4096 634s algparse -v2 'ike=aes+aes+3des-sha1+sha1+sha2-modp8192+modp8192+modp4096' (expect SUCCESS) 634s AES_CBC+3DES_CBC-HMAC_SHA1+HMAC_SHA2_256-MODP8192+MODP4096 634s algparse -v2 'ike=aes+aes128+aes256' (expect SUCCESS) 634s AES_CBC-HMAC_SHA2_512+HMAC_SHA2_256-DH19+DH20+DH21+DH31+MODP4096+MODP3072+MODP2048+MODP8192 634s algparse -v2 'ike=aes128+aes+aes256' (expect SUCCESS) 634s AES_CBC_128+AES_CBC-HMAC_SHA2_512+HMAC_SHA2_256-DH19+DH20+DH21+DH31+MODP4096+MODP3072+MODP2048+MODP8192 634s algparse -v2 'ike=aes128+aes256+aes' (expect SUCCESS) 634s AES_CBC_128+AES_CBC_256+AES_CBC-HMAC_SHA2_512+HMAC_SHA2_256-DH19+DH20+DH21+DH31+MODP4096+MODP3072+MODP2048+MODP8192 634s algparse -v2 'ike=aes-sha1-modp8192,aes-sha1-modp8192,aes-sha1-modp8192' (expect SUCCESS) 634s AES_CBC-HMAC_SHA1-MODP8192 634s algparse -v2 'ike=aes-sha1-modp8192,aes-sha2-modp8192,aes-sha1-modp8192' (expect SUCCESS) 634s AES_CBC-HMAC_SHA1-MODP8192 634s AES_CBC-HMAC_SHA2_256-MODP8192 634s algparse -v2 'ike=aes_gcm' (expect SUCCESS) 634s AES_GCM_16-HMAC_SHA2_512+HMAC_SHA2_256-DH19+DH20+DH21+DH31+MODP4096+MODP3072+MODP2048+MODP8192 634s algparse -v2 'ike=aes_gcm-sha2' (expect SUCCESS) 634s AES_GCM_16-HMAC_SHA2_256-DH19+DH20+DH21+DH31+MODP4096+MODP3072+MODP2048+MODP8192 634s algparse -v2 'ike=aes_gcm-sha2-modp2048' (expect SUCCESS) 634s AES_GCM_16-HMAC_SHA2_256-MODP2048 634s algparse -v2 'ike=aes_gcm-sha2;modp2048' (expect SUCCESS) 634s AES_GCM_16-HMAC_SHA2_256-MODP2048 634s algparse -v2 'ike=aes_gcm-modp2048' (expect ERROR) 634s ERROR: IKE PRF algorithm 'modp2048' is not recognized 634s algparse -v2 'ike=aes_gcm;modp2048' (expect SUCCESS) 634s AES_GCM_16-HMAC_SHA2_512+HMAC_SHA2_256-MODP2048 634s algparse -v2 'ike=aes_gcm-none' (expect SUCCESS) 634s AES_GCM_16-HMAC_SHA2_512+HMAC_SHA2_256-DH19+DH20+DH21+DH31+MODP4096+MODP3072+MODP2048+MODP8192 634s algparse -v2 'ike=aes_gcm-none-sha2' (expect SUCCESS) 634s AES_GCM_16-HMAC_SHA2_256-DH19+DH20+DH21+DH31+MODP4096+MODP3072+MODP2048+MODP8192 634s algparse -v2 'ike=aes_gcm-none-sha2-modp2048' (expect SUCCESS) 634s AES_GCM_16-HMAC_SHA2_256-MODP2048 634s algparse -v2 'ike=aes_gcm-none-sha2;modp2048' (expect SUCCESS) 634s AES_GCM_16-HMAC_SHA2_256-MODP2048 634s algparse -v2 'ike=aes_gcm-none-modp2048' (expect ERROR) 634s ERROR: IKE PRF algorithm 'modp2048' is not recognized 634s algparse -v2 'ike=aes_gcm-none;modp2048' (expect SUCCESS) 634s AES_GCM_16-HMAC_SHA2_512+HMAC_SHA2_256-MODP2048 634s algparse -v2 'ike=aes_gcm-sha1-none-modp2048' (expect ERROR) 634s ERROR: IKE proposal contains unexpected 'modp2048' 634s algparse -v2 'ike=aes_gcm-sha1-none;modp2048' (expect ERROR) 634s ERROR: IKE proposal contains unexpected 'modp2048' 634s algparse -v2 'ike=aes+aes_gcm' (expect ERROR) 634s ERROR: AEAD and non-AEAD IKE encryption algorithm cannot be combined 634s algparse -v2 'ike=,' (expect ERROR) 634s ERROR: IKE encryption algorithm is empty 634s algparse -v2 'ike=aes,' (expect ERROR) 634s ERROR: IKE encryption algorithm is empty 634s algparse -v2 'ike=aes,,aes' (expect ERROR) 634s ERROR: IKE encryption algorithm is empty 634s algparse -v2 'ike=,aes' (expect ERROR) 634s ERROR: IKE encryption algorithm is empty 634s algparse -v2 'ike=-' (expect ERROR) 634s ERROR: IKE encryption algorithm is empty 634s algparse -v2 'ike=+' (expect ERROR) 634s ERROR: IKE encryption algorithm is empty 634s algparse -v2 'ike=;' (expect ERROR) 634s ERROR: IKE encryption algorithm is empty 634s algparse -v2 'ike=aes-' (expect ERROR) 634s ERROR: IKE PRF algorithm is empty 634s algparse -v2 'ike=aes+' (expect ERROR) 634s ERROR: IKE encryption algorithm is empty 634s algparse -v2 'ike=aes;' (expect ERROR) 634s ERROR: IKE DH algorithm is empty 634s algparse -v2 'ike=-aes' (expect ERROR) 634s ERROR: IKE encryption algorithm is empty 634s algparse -v2 'ike=+aes' (expect ERROR) 634s ERROR: IKE encryption algorithm is empty 634s algparse -v2 'ike=;aes' (expect ERROR) 634s ERROR: IKE encryption algorithm is empty 634s algparse -v2 'ike=aes+-' (expect ERROR) 634s ERROR: IKE encryption algorithm is empty 634s algparse -v2 'ike=aes+;' (expect ERROR) 634s ERROR: IKE encryption algorithm is empty 634s algparse -v2 'ike=aes++' (expect ERROR) 634s ERROR: IKE encryption algorithm is empty 634s testing -ta 635s grity algorithm HMAC_SHA2_256_128[_0] 635s | token: '-' "none" '' '' 635s | parsing dh: 635s | appending AH DH algorithm NONE[_0] 635s | token: '' '' '' 635s ipsec algparse: ignoring redundant AH DH algorithm NONE as PFS policy is disabled 635s | parsing 'sha2;none' for AH 635s | proposal: 'sha2;none' 635s | token: '' '' "sha2" ';' 635s | token: '' "sha2" ';' "none" '' 635s | parsing integ: 635s | appending AH integrity algorithm HMAC_SHA2_256_128[_0] 635s | token: ';' "none" '' '' 635s | parsing dh: 635s | appending AH DH algorithm NONE[_0] 635s | token: '' '' '' 635s ipsec algparse: ignoring redundant AH DH algorithm NONE as PFS policy is disabled 635s | parsing 'sha1-modp8192,sha1-modp8192,sha1-modp8192' for AH 635s | proposal: 'sha1-modp8192' 635s | token: '' '' "sha1" '-' 635s | token: '' "sha1" '-' "modp8192" '' 635s | parsing integ: 635s | appending AH integrity algorithm HMAC_SHA1_96[_0] 635s | token: '-' "modp8192" '' '' 635s | parsing dh: 635s | appending AH DH algorithm MODP8192[_0] 635s | token: '' '' '' 635s | proposal: 'sha1-modp8192' 635s | token: '' '' "sha1" '-' 635s | token: '' "sha1" '-' "modp8192" '' 635s | parsing integ: 635s | appending AH integrity algorithm HMAC_SHA1_96[_0] 635s | token: '-' "modp8192" '' '' 635s | parsing dh: 635s | appending AH DH algorithm MODP8192[_0] 635s | token: '' '' '' 635s | proposal: 'sha1-modp8192' 635s | token: '' '' "sha1" '-' 635s | token: '' "sha1" '-' "modp8192" '' 635s | parsing integ: 635s | appending AH integrity algorithm HMAC_SHA1_96[_0] 635s | token: '-' "modp8192" '' '' 635s | parsing dh: 635s | appending AH DH algorithm MODP8192[_0] 635s | token: '' '' '' 635s ipsec algparse: ignoring AH DH algorithm MODP8192 as PFS policy is disabled 635s | parsing 'aes-sha1' for AH 635s | proposal: 'aes-sha1' 635s | token: '' '' "aes" '-' 635s | token: '' "aes" '-' "sha1" '' 635s | parsing integ: 635s | ike_alg_byname() failed: AH integrity algorithm 'aes' is not recognized 635s | lookup for integrity algorithm 'aes' failed 635s | or - failed 'AH integrity algorithm 'aes' is not recognized') 635s | parsing 'vanityhash1' for AH 635s | proposal: 'vanityhash1' 635s | token: '' '' "vanityhash1" '' 635s | token: '' "vanityhash1" '' '' 635s | parsing integ: 635s | ike_alg_byname() failed: AH integrity algorithm 'vanityhash1' is not recognized 635s | lookup for integrity algorithm 'vanityhash1' failed 635s | or - failed 'AH integrity algorithm 'vanityhash1' is not recognized') 635s | parsing 'aes_gcm_c-256' for AH 635s | proposal: 'aes_gcm_c-256' 635s | token: '' '' "aes_gcm_c" '-' 635s | token: '' "aes_gcm_c" '-' "256" '' 635s | parsing integ: 635s | ike_alg_byname() failed: AH integrity algorithm 'aes_gcm_c' is not recognized 635s | lookup for integrity algorithm 'aes_gcm_c' failed 635s | or - failed 'AH integrity algorithm 'aes_gcm_c' is not recognized') 635s | parsing 'id3' for AH 635s | proposal: 'id3' 635s | token: '' '' "id3" '' 635s | token: '' "id3" '' '' 635s | parsing integ: 635s | ike_alg_byname() failed: AH integrity algorithm 'id3' is not recognized 635s | lookup for integrity algorithm 'id3' failed 635s | or - failed 'AH integrity algorithm 'id3' is not recognized') 635s | parsing '3des' for AH 635s | proposal: '3des' 635s | token: '' '' "3des" '' 635s | token: '' "3des" '' '' 635s | parsing integ: 635s | ike_alg_byname() failed: AH integrity algorithm '3des' is not recognized 635s | lookup for integrity algorithm '3des' failed 635s | or - failed 'AH integrity algorithm '3des' is not recognized') 635s | parsing 'null' for AH 635s | proposal: 'null' 635s | token: '' '' "null" '' 635s | token: '' "null" '' '' 635s | parsing integ: 635s | appending AH integrity algorithm NONE[_0] 635s | token: '' '' '' 635s | parsing 'aes_gcm' for AH 635s | proposal: 'aes_gcm' 635s | token: '' '' "aes_gcm" '' 635s | token: '' "aes_gcm" '' '' 635s | parsing integ: 635s | ike_alg_byname() failed: AH integrity algorithm 'aes_gcm' is not recognized 635s | lookup for integrity algorithm 'aes_gcm' failed 635s | or - failed 'AH integrity algorithm 'aes_gcm' is not recognized') 635s | parsing 'aes_ccm' for AH 635s | proposal: 'aes_ccm' 635s | token: '' '' "aes_ccm" '' 635s | token: '' "aes_ccm" '' '' 635s | parsing integ: 635s | ike_alg_byname() failed: AH integrity algorithm 'aes_ccm' is not recognized 635s | lookup for integrity algorithm 'aes_ccm' failed 635s | or - failed 'AH integrity algorithm 'aes_ccm' is not recognized') 635s | parsing 'ripemd' for AH 635s | proposal: 'ripemd' 635s | token: '' '' "ripemd" '' 635s | token: '' "ripemd" '' '' 635s | parsing integ: 635s | ike_alg_byname() failed: AH integrity algorithm 'ripemd' is not recognized 635s | lookup for integrity algorithm 'ripemd' failed 635s | or - failed 'AH integrity algorithm 'ripemd' is not recognized') 635s | parsing 'AES_GCM_16_256,AES_GCM_16_128,CHACHA20_POLY1305,AES_CBC_256,AES_CBC_128' for IKE 635s | proposal: 'AES_GCM_16_256' 635s | token: '' '' "AES_GCM_16_256" '' 635s | token: '' "AES_GCM_16_256" '' '' 635s | ike_alg_byname() failed: IKE encryption algorithm 'AES_GCM_16_256' is not recognized 635s | token: '' '' '' 635s | appending IKE encryption algorithm AES_GCM_16[_256] 635s | appending IKE PRF algorithm HMAC_SHA2_512[_0] 635s | appending IKE PRF algorithm HMAC_SHA2_256[_0] 635s | appending IKE integrity algorithm NONE[_0] 635s | appending IKE DH algorithm DH19[_0] 635s | appending IKE DH algorithm DH20[_0] 635s | appending IKE DH algorithm DH21[_0] 635s | appending IKE DH algorithm DH31[_0] 635s | appending IKE DH algorithm MODP4096[_0] 635s | appending IKE DH algorithm MODP3072[_0] 635s | appending IKE DH algorithm MODP2048[_0] 635s | appending IKE DH algorithm MODP8192[_0] 635s | proposal: 'AES_GCM_16_128' 635s | token: '' '' "AES_GCM_16_128" '' 635s | token: '' "AES_GCM_16_128" '' '' 635s | ike_alg_byname() failed: IKE encryption algorithm 'AES_GCM_16_128' is not recognized 635s | token: '' '' '' 635s | appending IKE encryption algorithm AES_GCM_16[_128] 635s | appending IKE PRF algorithm HMAC_SHA2_512[_0] 635s | appending IKE PRF algorithm HMAC_SHA2_256[_0] 635s | appending IKE integrity algorithm NONE[_0] 635s | appending IKE DH algorithm DH19[_0] 635s | appending IKE DH algorithm DH20[_0] 635s | appending IKE DH algorithm DH21[_0] 635s | appending IKE DH algorithm DH31[_0] 635s | appending IKE DH algorithm MODP4096[_0] 635s | appending IKE DH algorithm MODP3072[_0] 635s | appending IKE DH algorithm MODP2048[_0] 635s | appending IKE DH algorithm MODP8192[_0] 635s | proposal: 'CHACHA20_POLY1305' 635s | token: '' '' "CHACHA20_POLY1305" '' 635s | token: '' "CHACHA20_POLY1305" '' '' 635s | token: '' '' '' 635s | appending IKE encryption algorithm CHACHA20_POLY1305[_0] 635s | appending IKE PRF algorithm HMAC_SHA2_512[_0] 635s | appending IKE PRF algorithm HMAC_SHA2_256[_0] 635s | appending IKE integrity algorithm NONE[_0] 635s | appending IKE DH algorithm DH19[_0] 635s | appending IKE DH algorithm DH20[_0] 635s | appending IKE DH algorithm DH21[_0] 635s | appending IKE DH algorithm DH31[_0] 635s | appending IKE DH algorithm MODP4096[_0] 635s | appending IKE DH algorithm MODP3072[_0] 635s | appending IKE DH algorithm MODP2048[_0] 635s | appending IKE DH algorithm MODP8192[_0] 635s | proposal: 'AES_CBC_256' 635s | token: '' '' "AES_CBC_256" '' 635s | token: '' "AES_CBC_256" '' '' 635s | ike_alg_byname() failed: IKE encryption algorithm 'AES_CBC_256' is not recognized 635s | token: '' '' '' 635s | appending IKE encryption algorithm AES_CBC[_256] 635s | appending IKE PRF algorithm HMAC_SHA2_512[_0] 635s | appending IKE PRF algorithm HMAC_SHA2_256[_0] 635s | appending IKE integrity algorithm HMAC_SHA2_512_256[_0] 635s | appending IKE integrity algorithm HMAC_SHA2_256_128[_0] 635s | appending IKE DH algorithm DH19[_0] 635s | appending IKE DH algorithm DH20[_0] 635s | appending IKE DH algorithm DH21[_0] 635s | appending IKE DH algorithm DH31[_0] 635s | appending IKE DH algorithm MODP4096[_0] 635s | appending IKE DH algorithm MODP3072[_0] 635s | appending IKE DH algorithm MODP2048[_0] 635s | appending IKE DH algorithm MODP8192[_0] 635s | proposal: 'AES_CBC_128' 635s | token: '' '' "AES_CBC_128" '' 635s | token: '' "AES_CBC_128" '' '' 635s | ike_alg_byname() failed: IKE encryption algorithm 'AES_CBC_128' is not recognized 635s | token: '' '' '' 635s | appending IKE encryption algorithm AES_CBC[_128] 635s | appending IKE PRF algorithm HMAC_SHA2_512[_0] 635s | appending IKE PRF algorithm HMAC_SHA2_256[_0] 635s | appending IKE integrity algorithm HMAC_SHA2_512_256[_0] 635s | appending IKE integrity algorithm HMAC_SHA2_256_128[_0] 635s | appending IKE DH algorithm DH19[_0] 635s | appending IKE DH algorithm DH20[_0] 635s | appending IKE DH algorithm DH21[_0] 635s | appending IKE DH algorithm DH31[_0] 635s | appending IKE DH algorithm MODP4096[_0] 635s | appending IKE DH algorithm MODP3072[_0] 635s | appending IKE DH algorithm MODP2048[_0] 635s | appending IKE DH algorithm MODP8192[_0] 635s | parsing '' for IKE 635s | parsing '3des-sha1' for IKE 635s | proposal: '3des-sha1' 635s | token: '' '' "3des" '-' 635s | token: '' "3des" '-' "sha1" '' 635s | token: '-' "sha1" '' '' 635s | appending IKE encryption algorithm 3DES_CBC[_0] 635s | parsing prf: 635s | appending IKE PRF algorithm HMAC_SHA1[_0] 635s | token: '' '' '' 635s | - succeeded, advancing tokens 635s | appending IKE integrity algorithm HMAC_SHA1_96[_0] 635s | appending IKE DH algorithm DH19[_0] 635s | appending IKE DH algorithm DH20[_0] 635s | appending IKE DH algorithm DH21[_0] 635s | appending IKE DH algorithm DH31[_0] 635s | appending IKE DH algorithm MODP4096[_0] 635s | appending IKE DH algorithm MODP3072[_0] 635s | appending IKE DH algorithm MODP2048[_0] 635s | appending IKE DH algorithm MODP8192[_0] 635s | parsing '3des-sha1' for IKE 635s | proposal: '3des-sha1' 635s | token: '' '' "3des" '-' 635s | token: '' "3des" '-' "sha1" '' 635s | token: '-' "sha1" '' '' 635s | appending IKE encryption algorithm 3DES_CBC[_0] 635s | parsing prf: 635s | appending IKE PRF algorithm HMAC_SHA1[_0] 635s | token: '' '' '' 635s | - succeeded, advancing tokens 635s | appending IKE integrity algorithm HMAC_SHA1_96[_0] 635s | appending IKE DH algorithm DH19[_0] 635s | appending IKE DH algorithm DH20[_0] 635s | appending IKE DH algorithm DH21[_0] 635s | appending IKE DH algorithm DH31[_0] 635s | appending IKE DH algorithm MODP4096[_0] 635s | appending IKE DH algorithm MODP3072[_0] 635s | appending IKE DH algorithm MODP2048[_0] 635s | appending IKE DH algorithm MODP8192[_0] 635s | parsing '3des-sha1;modp1536' for IKE 635s | proposal: '3des-sha1;modp1536' 635s | token: '' '' "3des" '-' 635s | token: '' "3des" '-' "sha1" ';' 635s | token: '-' "sha1" ';' "modp1536" '' 635s | appending IKE encryption algorithm 3DES_CBC[_0] 635s | parsing prf: 635s | appending IKE PRF algorithm HMAC_SHA1[_0] 635s | token: ';' "modp1536" '' '' 635s | - succeeded, advancing tokens 635s | parsing dh: 635s | appending IKE DH algorithm MODP1536[_0] 635s | token: '' '' '' 635s | appending IKE integrity algorithm HMAC_SHA1_96[_0] 635s | parsing '3des;dh21' for IKE 635s | proposal: '3des;dh21' 635s | token: '' '' "3des" ';' 635s | token: '' "3des" ';' "dh21" '' 635s | token: ';' "dh21" '' '' 635s | appending IKE encryption algorithm 3DES_CBC[_0] 635s | parsing dh: 635s | appending IKE DH algorithm DH21[_0] 635s | token: '' '' '' 635s | appending IKE PRF algorithm HMAC_SHA2_512[_0] 635s | appending IKE PRF algorithm HMAC_SHA2_256[_0] 635s | appending IKE integrity algorithm HMAC_SHA2_512_256[_0] 635s | appending IKE integrity algorithm HMAC_SHA2_256_128[_0] 635s | parsing '3des-sha1;dh21' for IKE 635s | proposal: '3des-sha1;dh21' 635s | token: '' '' "3des" '-' 635s | token: '' "3des" '-' "sha1" ';' 635s | token: '-' "sha1" ';' "dh21" '' 635s | appending IKE encryption algorithm 3DES_CBC[_0] 635s | parsing prf: 635s | appending IKE PRF algorithm HMAC_SHA1[_0] 635s | token: ';' "dh21" '' '' 635s | - succeeded, advancing tokens 635s | parsing dh: 635s | appending IKE DH algorithm DH21[_0] 635s | token: '' '' '' 635s | appending IKE integrity algorithm HMAC_SHA1_96[_0] 635s | parsing '3des-sha1-ecp_521' for IKE 635s | proposal: '3des-sha1-ecp_521' 635s | token: '' '' "3des" '-' 635s | token: '' "3des" '-' "sha1" '-' 635s | token: '-' "sha1" '-' "ecp_521" '' 635s | appending IKE encryption algorithm 3DES_CBC[_0] 635s | parsing prf: 635s | appending IKE PRF algorithm HMAC_SHA1[_0] 635s | token: '-' "ecp_521" '' '' 635s | - succeeded, advancing tokens 635s | parsing dh: 635s | appending IKE DH algorithm DH21[_0] 635s | token: '' '' '' 635s | appending IKE integrity algorithm HMAC_SHA1_96[_0] 635s | parsing '3des+aes' for IKE 635s | proposal: '3des+aes' 635s | token: '' '' "3des" '+' 635s | token: '' "3des" '+' "aes" '' 635s | token: '+' "aes" '' '' 635s | appending IKE encryption algorithm 3DES_CBC[_0] 635s | token: '' '' '' 635s | appending IKE encryption algorithm AES_CBC[_0] 635s | appending IKE PRF algorithm HMAC_SHA2_512[_0] 635s | appending IKE PRF algorithm HMAC_SHA2_256[_0] 635s | appending IKE integrity algorithm HMAC_SHA2_512_256[_0] 635s | appending IKE integrity algorithm HMAC_SHA2_256_128[_0] 635s | appending IKE DH algorithm DH19[_0] 635s | appending IKE DH algorithm DH20[_0] 635s | appending IKE DH algorithm DH21[_0] 635s | appending IKE DH algorithm DH31[_0] 635s | appending IKE DH algorithm MODP4096[_0] 635s | appending IKE DH algorithm MODP3072[_0] 635s | appending IKE DH algorithm MODP2048[_0] 635s | appending IKE DH algorithm MODP8192[_0] 635s | parsing 'aes;none' for IKE 635s | proposal: 'aes;none' 635s | token: '' '' "aes" ';' 635s | token: '' "aes" ';' "none" '' 635s | token: ';' "none" '' '' 635s | appending IKE encryption algorithm AES_CBC[_0] 635s | parsing dh: 635s | appending IKE DH algorithm NONE[_0] 635s | token: '' '' '' 635s | appending IKE PRF algorithm HMAC_SHA2_512[_0] 635s | appending IKE PRF algorithm HMAC_SHA2_256[_0] 635s | appending IKE integrity algorithm HMAC_SHA2_512_256[_0] 635s | appending IKE integrity algorithm HMAC_SHA2_256_128[_0] 635s | parsing 'id2' for IKE 635s | proposal: 'id2' 635s | token: '' '' "id2" '' 635s | token: '' "id2" '' '' 635s | ike_alg_byname() failed: IKE encryption algorithm 'id2' is not recognized 635s | ike_alg_byname() failed: IKE encryption algorithm 'id2' is not recognized 635s | parsing '3des-id2' for IKE 635s | proposal: '3des-id2' 635s | token: '' '' "3des" '-' 635s | token: '' "3des" '-' "id2" '' 635s | token: '-' "id2" '' '' 635s | appending IKE encryption algorithm 3DES_CBC[_0] 635s | parsing prf: 635s | ike_alg_byname() failed: IKE PRF algorithm 'id2' is not recognized 635s | lookup for PRF algorithm 'id2' failed 635s | - failed, saving error 'IKE PRF algorithm 'id2' is not recognized' and tossing result 635s | parsing integ: 635s | ike_alg_byname() failed: IKE integrity algorithm 'id2' is not recognized 635s | lookup for integrity algorithm 'id2' failed 635s | - and - failed, returning earlier PRF error 'IKE PRF algorithm 'id2' is not recognized' and discarding INTEG error 'IKE integrity algorithm 'id2' is not recognized') 635s | parsing 'aes_ccm' for IKE 635s | proposal: 'aes_ccm' 635s | token: '' '' "aes_ccm" '' 635s | token: '' "aes_ccm" '' '' 635s | alg_byname_ok() failed: IKE encryption algorithm 'aes_ccm' is not supported 635s | parsing 'aes-sha1-sha2-ecp_521' for IKE 635s | proposal: 'aes-sha1-sha2-ecp_521' 635s | token: '' '' "aes" '-' 635s | token: '' "aes" '-' "sha1" '-' 635s | token: '-' "sha1" '-' "sha2" '-' 635s | appending IKE encryption algorithm AES_CBC[_0] 635s | parsing prf: 635s | appending IKE PRF algorithm HMAC_SHA1[_0] 635s | token: '-' "sha2" '-' "ecp_521" '' 635s | - succeeded, advancing tokens 635s | parsing dh: 635s | ike_alg_byname() failed: IKE DH algorithm 'sha2' is not recognized 635s | lookup for DH algorithm 'sha2' failed 635s | ... failed 'IKE DH algorithm 'sha2' is not recognized' 635s | parsing 'aes-sha2-sha2;ecp_521' for IKE 635s | proposal: 'aes-sha2-sha2;ecp_521' 635s | token: '' '' "aes" '-' 635s | token: '' "aes" '-' "sha2" '-' 635s | token: '-' "sha2" '-' "sha2" ';' 635s | appending IKE encryption algorithm AES_CBC[_0] 635s | parsing prf: 635s | appending IKE PRF algorithm HMAC_SHA2_256[_0] 635s | token: '-' "sha2" ';' "ecp_521" '' 635s | - succeeded, advancing tokens 635s | parsing dh: 635s | ike_alg_byname() failed: IKE DH algorithm 'sha2' is not recognized 635s | lookup for DH algorithm 'sha2' failed 635s | ... failed 'IKE DH algorithm 'sha2' is not recognized' 635s | parsing 'aes-sha1_96-sha2-ecp_521' for IKE 635s | proposal: 'aes-sha1_96-sha2-ecp_521' 635s | token: '' '' "aes" '-' 635s | token: '' "aes" '-' "sha1_96" '-' 635s | token: '-' "sha1_96" '-' "sha2" '-' 635s | appending IKE encryption algorithm AES_CBC[_0] 635s | parsing prf: 635s | ike_alg_byname() failed: IKE PRF algorithm 'sha1_96' is not recognized 635s | lookup for PRF algorithm 'sha1_96' failed 635s | - failed, saving error 'IKE PRF algorithm 'sha1_96' is not recognized' and tossing result 635s | parsing integ: 635s | appending IKE integrity algorithm HMAC_SHA1_96[_0] 635s | token: '-' "sha2" '-' "ecp_521" '' 635s | parsing prf: 635s | appending IKE PRF algorithm HMAC_SHA2_256[_0] 635s | token: '-' "ecp_521" '' '' 635s | parsing dh: 635s | appending IKE DH algorithm DH21[_0] 635s | token: '' '' '' 635s | parsing 'aes-sha1_96-sha2;ecp_521' for IKE 635s | proposal: 'aes-sha1_96-sha2;ecp_521' 635s | token: '' '' "aes" '-' 635s | token: '' "aes" '-' "sha1_96" '-' 635s | token: '-' "sha1_96" '-' "sha2" ';' 635s | appending IKE encryption algorithm AES_CBC[_0] 635s | parsing prf: 635s | ike_alg_byname() failed: IKE PRF algorithm 'sha1_96' is not recognized 635s | lookup for PRF algorithm 'sha1_96' failed 635s | - failed, saving error 'IKE PRF algorithm 'sha1_96' is not recognized' and tossing result 635s | parsing integ: 635s | appending IKE integrity algorithm HMAC_SHA1_96[_0] 635s | token: '-' "sha2" ';' "ecp_521" '' 635s | parsing prf: 635s | appending IKE PRF algorithm HMAC_SHA2_256[_0] 635s | token: ';' "ecp_521" '' '' 635s | parsing dh: 635s | appending IKE DH algorithm DH21[_0] 635s | token: '' '' '' 635s | parsing 'aes+aes-sha1+sha1-modp8192+modp8192' for IKE 635s | proposal: 'aes+aes-sha1+sha1-modp8192+modp8192' 635s | token: '' '' "aes" '+' 635s | token: '' "aes" '+' "aes" '-' 635s | token: '+' "aes" '-' "sha1" '+' 635s | appending IKE encryption algorithm AES_CBC[_0] 635s | token: '-' "sha1" '+' "sha1" '-' 635s | appending IKE encryption algorithm AES_CBC[_0] 635s ipsec algparse: discarding duplicate IKE encryption algorithm AES_CBC 635s | parsing prf: 635s | appending IKE PRF algorithm HMAC_SHA1[_0] 635s | token: '+' "sha1" '-' "modp8192" '+' 635s | appending IKE PRF algorithm HMAC_SHA1[_0] 635s | token: '-' "modp8192" '+' "modp8192" '' 635s ipsec algparse: discarding duplicate IKE PRF algorithm HMAC_SHA1 635s | - succeeded, advancing tokens 635s | parsing dh: 635s | appending IKE DH algorithm MODP8192[_0] 635s | token: '+' "modp8192" '' '' 635s | appending IKE DH algorithm MODP8192[_0] 635s | token: '' '' '' 635s ipsec algparse: discarding duplicate IKE DH algorithm MODP8192 635s | appending IKE integrity algorithm HMAC_SHA1_96[_0] 635s | parsing '3des+aes+aes-sha2+sha1+sha1-modp4096+modp8192+modp8192' for IKE 635s | proposal: '3des+aes+aes-sha2+sha1+sha1-modp4096+modp8192+modp8192' 635s | token: '' '' "3des" '+' 635s | token: '' "3des" '+' "aes" '+' 635s | token: '+' "aes" '+' "aes" '-' 635s | appending IKE encryption algorithm 3DES_CBC[_0] 635s | token: '+' "aes" '-' "sha2" '+' 635s | appending IKE encryption algorithm AES_CBC[_0] 635s | token: '-' "sha2" '+' "sha1" '+' 635s | appending IKE encryption algorithm AES_CBC[_0] 635s ipsec algparse: discarding duplicate IKE encryption algorithm AES_CBC 635s | parsing prf: 635s | appending IKE PRF algorithm HMAC_SHA2_256[_0] 635s | token: '+' "sha1" '+' "sha1" '-' 635s | appending IKE PRF algorithm HMAC_SHA1[_0] 635s | token: '+' "sha1" '-' "modp4096" '+' 635s | appending IKE PRF algorithm HMAC_SHA1[_0] 635s | token: '-' "modp4096" '+' "modp8192" '+' 635s ipsec algparse: discarding duplicate IKE PRF algorithm HMAC_SHA1 635s | - succeeded, advancing tokens 635s | parsing dh: 635s | appending IKE DH algorithm MODP4096[_0] 635s | token: '+' "modp8192" '+' "modp8192" '' 635s | appending IKE DH algorithm MODP8192[_0] 635s | token: '+' "modp8192" '' '' 635s | appending IKE DH algorithm MODP8192[_0] 635s | token: '' '' '' 635s ipsec algparse: discarding duplicate IKE DH algorithm MODP8192 635s | appending IKE integrity algorithm HMAC_SHA2_256_128[_0] 635s | appending IKE integrity algorithm HMAC_SHA1_96[_0] 635s | parsing 'aes+3des+aes-sha1+sha2+sha1-modp8192+modp4096+modp8192' for IKE 635s | proposal: 'aes+3des+aes-sha1+sha2+sha1-modp8192+modp4096+modp8192' 635s | token: '' '' "aes" '+' 635s | token: '' "aes" '+' "3des" '+' 635s | token: '+' "3des" '+' "aes" '-' 635s | appending IKE encryption algorithm AES_CBC[_0] 635s | token: '+' "aes" '-' "sha1" '+' 635s | appending IKE encryption algorithm 3DES_CBC[_0] 635s | token: '-' "sha1" '+' "sha2" '+' 635s | appending IKE encryption algorithm AES_CBC[_0] 635s ipsec algparse: discarding duplicate IKE encryption algorithm AES_CBC 635s | parsing prf: 635s | appending IKE PRF algorithm HMAC_SHA1[_0] 635s | token: '+' "sha2" '+' "sha1" '-' 635s | appending IKE PRF algorithm HMAC_SHA2_256[_0] 635s | token: '+' "sha1" '-' "modp8192" '+' 635s | appending IKE PRF algorithm HMAC_SHA1[_0] 635s | token: '-' "modp8192" '+' "modp4096" '+' 635s ipsec algparse: discarding duplicate IKE PRF algorithm HMAC_SHA1 635s | - succeeded, advancing tokens 635s | parsing dh: 635s | appending IKE DH algorithm MODP8192[_0] 635s | token: '+' "modp4096" '+' "modp8192" '' 635s | appending IKE DH algorithm MODP4096[_0] 635s | token: '+' "modp8192" '' '' 635s | appending IKE DH algorithm MODP8192[_0] 635s | token: '' '' '' 635s ipsec algparse: discarding duplicate IKE DH algorithm MODP8192 635s | appending IKE integrity algorithm HMAC_SHA1_96[_0] 635s | appending IKE integrity algorithm HMAC_SHA2_256_128[_0] 635s | parsing 'aes+aes+3des-sha1+sha1+sha2-modp8192+modp8192+modp4096' for IKE 635s | proposal: 'aes+aes+3des-sha1+sha1+sha2-modp8192+modp8192+modp4096' 635s | token: '' '' "aes" '+' 635s | token: '' "aes" '+' "aes" '+' 635s | token: '+' "aes" '+' "3des" '-' 635s | appending IKE encryption algorithm AES_CBC[_0] 635s | token: '+' "3des" '-' "sha1" '+' 635s | appending IKE encryption algorithm AES_CBC[_0] 635s | token: '-' "sha1" '+' "sha1" '+' 635s | appending IKE encryption algorithm 3DES_CBC[_0] 635s ipsec algparse: discarding duplicate IKE encryption algorithm AES_CBC 635s | parsing prf: 635s | appending IKE PRF algorithm HMAC_SHA1[_0] 635s | token: '+' "sha1" '+' "sha2" '-' 635s | appending IKE PRF algorithm HMAC_SHA1[_0] 635s | token: '+' "sha2" '-' "modp8192" '+' 635s | appending IKE PRF algorithm HMAC_SHA2_256[_0] 635s | token: '-' "modp8192" '+' "modp8192" '+' 635s ipsec algparse: discarding duplicate IKE PRF algorithm HMAC_SHA1 635s | - succeeded, advancing tokens 635s | parsing dh: 635s | appending IKE DH algorithm MODP8192[_0] 635s | token: '+' "modp8192" '+' "modp4096" '' 635s | appending IKE DH algorithm MODP8192[_0] 635s | token: '+' "modp4096" '' '' 635s | appending IKE DH algorithm MODP4096[_0] 635s | token: '' '' '' 635s ipsec algparse: discarding duplicate IKE DH algorithm MODP8192 635s | appending IKE integrity algorithm HMAC_SHA1_96[_0] 635s | appending IKE integrity algorithm HMAC_SHA2_256_128[_0] 635s | parsing 'aes+aes128+aes256' for IKE 635s | proposal: 'aes+aes128+aes256' 635s | token: '' '' "aes" '+' 635s | token: '' "aes" '+' "aes128" '+' 635s | token: '+' "aes128" '+' "aes256" '' 635s | appending IKE encryption algorithm AES_CBC[_0] 635s | ike_alg_byname() failed: IKE encryption algorithm 'aes128' is not recognized 635s | token: '+' "aes256" '' '' 635s | appending IKE encryption algorithm AES_CBC[_128] 635s | ike_alg_byname() failed: IKE encryption algorithm 'aes256' is not recognized 635s | token: '' '' '' 635s | appending IKE encryption algorithm AES_CBC[_256] 635s ipsec algparse: discarding duplicate IKE encryption algorithm AES_CBC_128 635s ipsec algparse: discarding duplicate IKE encryption algorithm AES_CBC_256 635s | appending IKE PRF algorithm HMAC_SHA2_512[_0] 635s | appending IKE PRF algorithm HMAC_SHA2_256[_0] 635s | appending IKE integrity algorithm HMAC_SHA2_512_256[_0] 635s | appending IKE integrity algorithm HMAC_SHA2_256_128[_0] 635s | appending IKE DH algorithm DH19[_0] 635s | appending IKE DH algorithm DH20[_0] 635s | appending IKE DH algorithm DH21[_0] 635s | appending IKE DH algorithm DH31[_0] 635s | appending IKE DH algorithm MODP4096[_0] 635s | appending IKE DH algorithm MODP3072[_0] 635s | appending IKE DH algorithm MODP2048[_0] 635s | appending IKE DH algorithm MODP8192[_0] 635s | parsing 'aes128+aes+aes256' for IKE 635s | proposal: 'aes128+aes+aes256' 635s | token: '' '' "aes128" '+' 635s | token: '' "aes128" '+' "aes" '+' 635s | ike_alg_byname() failed: IKE encryption algorithm 'aes128' is not recognized 635s | token: '+' "aes" '+' "aes256" '' 635s | appending IKE encryption algorithm AES_CBC[_128] 635s | token: '+' "aes256" '' '' 635s | appending IKE encryption algorithm AES_CBC[_0] 635s | ike_alg_byname() failed: IKE encryption algorithm 'aes256' is not recognized 635s | token: '' '' '' 635s | appending IKE encryption algorithm AES_CBC[_256] 635s ipsec algparse: discarding duplicate IKE encryption algorithm AES_CBC_256 635s | appending IKE PRF algorithm HMAC_SHA2_512[_0] 635s | appending IKE PRF algorithm HMAC_SHA2_256[_0] 635s | appending IKE integrity algorithm HMAC_SHA2_512_256[_0] 635s | appending IKE integrity algorithm HMAC_SHA2_256_128[_0] 635s | appending IKE DH algorithm DH19[_0] 635s | appending IKE DH algorithm DH20[_0] 635s | appending IKE DH algorithm DH21[_0] 635s | appending IKE DH algorithm DH31[_0] 635s | appending IKE DH algorithm MODP4096[_0] 635s | appending IKE DH algorithm MODP3072[_0] 635s | appending IKE DH algorithm MODP2048[_0] 635s | appending IKE DH algorithm MODP8192[_0] 635s | parsing 'aes128+aes256+aes' for IKE 635s | proposal: 'aes128+aes256+aes' 635s | token: '' '' "aes128" '+' 635s | token: '' "aes128" '+' "aes256" '+' 635s | ike_alg_byname() failed: IKE encryption algorithm 'aes128' is not recognized 635s | token: '+' "aes256" '+' "aes" '' 635s | appending IKE encryption algorithm AES_CBC[_128] 635s | ike_alg_byname() failed: IKE encryption algorithm 'aes256' is not recognized 635s | token: '+' "aes" '' '' 635s | appending IKE encryption algorithm AES_CBC[_256] 635s | token: '' '' '' 635s | appending IKE encryption algorithm AES_CBC[_0] 635s | appending IKE PRF algorithm HMAC_SHA2_512[_0] 635s | appending IKE PRF algorithm HMAC_SHA2_256[_0] 635s | appending IKE integrity algorithm HMAC_SHA2_512_256[_0] 635s | appending IKE integrity algorithm HMAC_SHA2_256_128[_0] 635s | appending IKE DH algorithm DH19[_0] 635s | appending IKE DH algorithm DH20[_0] 635s | appending IKE DH algorithm DH21[_0] 635s | appending IKE DH algorithm DH31[_0] 635s | appending IKE DH algorithm MODP4096[_0] 635s | appending IKE DH algorithm MODP3072[_0] 635s | appending IKE DH algorithm MODP2048[_0] 635s | appending IKE DH algorithm MODP8192[_0] 635s | parsing 'aes-sha1-modp8192,aes-sha1-modp8192,aes-sha1-modp8192' for IKE 635s | proposal: 'aes-sha1-modp8192' 635s | token: '' '' "aes" '-' 635s | token: '' "aes" '-' "sha1" '-' 635s | token: '-' "sha1" '-' "modp8192" '' 635s | appending IKE encryption algorithm AES_CBC[_0] 635s | parsing prf: 635s | appending IKE PRF algorithm HMAC_SHA1[_0] 635s | token: '-' "modp8192" '' '' 635s | - succeeded, advancing tokens 635s | parsing dh: 635s | appending IKE DH algorithm MODP8192[_0] 635s | token: '' '' '' 635s | appending IKE integrity algorithm HMAC_SHA1_96[_0] 635s | proposal: 'aes-sha1-modp8192' 635s | token: '' '' "aes" '-' 635s | token: '' "aes" '-' "sha1" '-' 635s | token: '-' "sha1" '-' "modp8192" '' 635s | appending IKE encryption algorithm AES_CBC[_0] 635s | parsing prf: 635s | appending IKE PRF algorithm HMAC_SHA1[_0] 635s | token: '-' "modp8192" '' '' 635s | - succeeded, advancing tokens 635s | parsing dh: 635s | appending IKE DH algorithm MODP8192[_0] 635s | token: '' '' '' 635s | appending IKE integrity algorithm HMAC_SHA1_96[_0] 635s | proposal: 'aes-sha1-modp8192' 635s | token: '' '' "aes" '-' 635s | token: '' "aes" '-' "sha1" '-' 635s | token: '-' "sha1" '-' "modp8192" '' 635s | appending IKE encryption algorithm AES_CBC[_0] 635s | parsing prf: 635s | appending IKE PRF algorithm HMAC_SHA1[_0] 635s | token: '-' "modp8192" '' '' 635s | - succeeded, advancing tokens 635s | parsing dh: 635s | appending IKE DH algorithm MODP8192[_0] 635s | token: '' '' '' 635s | appending IKE integrity algorithm HMAC_SHA1_96[_0] 635s | parsing 'aes-sha1-modp8192,aes-sha2-modp8192,aes-sha1-modp8192' for IKE 635s | proposal: 'aes-sha1-modp8192' 635s | token: '' '' "aes" '-' 635s | token: '' "aes" '-' "sha1" '-' 635s | token: '-' "sha1" '-' "modp8192" '' 635s | appending IKE encryption algorithm AES_CBC[_0] 635s | parsing prf: 635s | appending IKE PRF algorithm HMAC_SHA1[_0] 635s | token: '-' "modp8192" '' '' 635s | - succeeded, advancing tokens 635s | parsing dh: 635s | appending IKE DH algorithm MODP8192[_0] 635s | token: '' '' '' 635s | appending IKE integrity algorithm HMAC_SHA1_96[_0] 635s | proposal: 'aes-sha2-modp8192' 635s | token: '' '' "aes" '-' 635s | token: '' "aes" '-' "sha2" '-' 635s | token: '-' "sha2" '-' "modp8192" '' 635s | appending IKE encryption algorithm AES_CBC[_0] 635s | parsing prf: 635s | appending IKE PRF algorithm HMAC_SHA2_256[_0] 635s | token: '-' "modp8192" '' '' 635s | - succeeded, advancing tokens 635s | parsing dh: 635s | appending IKE DH algorithm MODP8192[_0] 635s | token: '' '' '' 635s | appending IKE integrity algorithm HMAC_SHA2_256_128[_0] 635s | proposal: 'aes-sha1-modp8192' 635s | token: '' '' "aes" '-' 635s | token: '' "aes" '-' "sha1" '-' 635s | token: '-' "sha1" '-' "modp8192" '' 635s | appending IKE encryption algorithm AES_CBC[_0] 635s | parsing prf: 635s | appending IKE PRF algorithm HMAC_SHA1[_0] 635s | token: '-' "modp8192" '' '' 635s | - succeeded, advancing tokens 635s | parsing dh: 635s | appending IKE DH algorithm MODP8192[_0] 635s | token: '' '' '' 635s | appending IKE integrity algorithm HMAC_SHA1_96[_0] 635s | parsing 'aes_gcm' for IKE 635s | proposal: 'aes_gcm' 635s | token: '' '' "aes_gcm" '' 635s | token: '' "aes_gcm" '' '' 635s | token: '' '' '' 635s | appending IKE encryption algorithm AES_GCM_16[_0] 635s | appending IKE PRF algorithm HMAC_SHA2_512[_0] 635s | appending IKE PRF algorithm HMAC_SHA2_256[_0] 635s | appending IKE integrity algorithm NONE[_0] 635s | appending IKE DH algorithm DH19[_0] 635s | appending IKE DH algorithm DH20[_0] 635s | appending IKE DH algorithm DH21[_0] 635s | appending IKE DH algorithm DH31[_0] 635s | appending IKE DH algorithm MODP4096[_0] 635s | appending IKE DH algorithm MODP3072[_0] 635s | appending IKE DH algorithm MODP2048[_0] 635s | appending IKE DH algorithm MODP8192[_0] 635s | parsing 'aes_gcm-sha2' for IKE 635s | proposal: 'aes_gcm-sha2' 635s | token: '' '' "aes_gcm" '-' 635s | token: '' "aes_gcm" '-' "sha2" '' 635s | token: '-' "sha2" '' '' 635s | appending IKE encryption algorithm AES_GCM_16[_0] 635s | parsing prf: 635s | appending IKE PRF algorithm HMAC_SHA2_256[_0] 635s | token: '' '' '' 635s | - succeeded, advancing tokens 635s | appending IKE integrity algorithm NONE[_0] 635s | appending IKE DH algorithm DH19[_0] 635s | appending IKE DH algorithm DH20[_0] 635s | appending IKE DH algorithm DH21[_0] 635s | appending IKE DH algorithm DH31[_0] 635s | appending IKE DH algorithm MODP4096[_0] 635s | appending IKE DH algorithm MODP3072[_0] 635s | appending IKE DH algorithm MODP2048[_0] 635s | appending IKE DH algorithm MODP8192[_0] 635s | parsing 'aes_gcm-sha2-modp2048' for IKE 635s | proposal: 'aes_gcm-sha2-modp2048' 635s | token: '' '' "aes_gcm" '-' 635s | token: '' "aes_gcm" '-' "sha2" '-' 635s | token: '-' "sha2" '-' "modp2048" '' 635s | appending IKE encryption algorithm AES_GCM_16[_0] 635s | parsing prf: 635s | appending IKE PRF algorithm HMAC_SHA2_256[_0] 635s | token: '-' "modp2048" '' '' 635s | - succeeded, advancing tokens 635s | parsing dh: 635s | appending IKE DH algorithm MODP2048[_0] 635s | token: '' '' '' 635s | appending IKE integrity algorithm NONE[_0] 635s | parsing 'aes_gcm-sha2;modp2048' for IKE 635s | proposal: 'aes_gcm-sha2;modp2048' 635s | token: '' '' "aes_gcm" '-' 635s | token: '' "aes_gcm" '-' "sha2" ';' 635s | token: '-' "sha2" ';' "modp2048" '' 635s | appending IKE encryption algorithm AES_GCM_16[_0] 635s | parsing prf: 635s | appending IKE PRF algorithm HMAC_SHA2_256[_0] 635s | token: ';' "modp2048" '' '' 635s | - succeeded, advancing tokens 635s | parsing dh: 635s | appending IKE DH algorithm MODP2048[_0] 635s | token: '' '' '' 635s | appending IKE integrity algorithm NONE[_0] 635s | parsing 'aes_gcm-modp2048' for IKE 635s | proposal: 'aes_gcm-modp2048' 635s | token: '' '' "aes_gcm" '-' 635s | token: '' "aes_gcm" '-' "modp2048" '' 635s | token: '-' "modp2048" '' '' 635s | appending IKE encryption algorithm AES_GCM_16[_0] 635s | parsing prf: 635s | ike_alg_byname() failed: IKE PRF algorithm 'modp2048' is not recognized 635s | lookup for PRF algorithm 'modp2048' failed 635s | - failed, saving error 'IKE PRF algorithm 'modp2048' is not recognized' and tossing result 635s | parsing integ: 635s | ike_alg_byname() failed: IKE integrity algorithm 'modp2048' is not recognized 635s | lookup for integrity algorithm 'modp2048' failed 635s | - and - failed, returning earlier PRF error 'IKE PRF algorithm 'modp2048' is not recognized' and discarding INTEG error 'IKE integrity algorithm 'modp2048' is not recognized') 635s | parsing 'aes_gcm;modp2048' for IKE 635s | proposal: 'aes_gcm;modp2048' 635s | token: '' '' "aes_gcm" ';' 635s | token: '' "aes_gcm" ';' "modp2048" '' 635s | token: ';' "modp2048" '' '' 635s | appending IKE encryption algorithm AES_GCM_16[_0] 635s | parsing dh: 635s | appending IKE DH algorithm MODP2048[_0] 635s | token: '' '' '' 635s | appending IKE PRF algorithm HMAC_SHA2_512[_0] 635s | appending IKE PRF algorithm HMAC_SHA2_256[_0] 635s | appending IKE integrity algorithm NONE[_0] 635s | parsing 'aes_gcm-none' for IKE 635s | proposal: 'aes_gcm-none' 635s | token: '' '' "aes_gcm" '-' 635s | token: '' "aes_gcm" '-' "none" '' 635s | token: '-' "none" '' '' 635s | appending IKE encryption algorithm AES_GCM_16[_0] 635s | parsing prf: 635s | ike_alg_byname() failed: IKE PRF algorithm 'none' is not recognized 635s | lookup for PRF algorithm 'none' failed 635s | - failed, saving error 'IKE PRF algorithm 'none' is not recognized' and tossing result 635s | parsing integ: 635s | appending IKE integrity algorithm NONE[_0] 635s | token: '' '' '' 635s | appending IKE PRF algorithm HMAC_SHA2_512[_0] 635s | appending IKE PRF algorithm HMAC_SHA2_256[_0] 635s | appending IKE DH algorithm DH19[_0] 635s | appending IKE DH algorithm DH20[_0] 635s | appending IKE DH algorithm DH21[_0] 635s | appending IKE DH algorithm DH31[_0] 635s | appending IKE DH algorithm MODP4096[_0] 635s | appending IKE DH algorithm MODP3072[_0] 635s | appending IKE DH algorithm MODP2048[_0] 635s | appending IKE DH algorithm MODP8192[_0] 635s | parsing 'aes_gcm-none-sha2' for IKE 635s | proposal: 'aes_gcm-none-sha2' 635s | token: '' '' "aes_gcm" '-' 635s | token: '' "aes_gcm" '-' "none" '-' 635s | token: '-' "none" '-' "sha2" '' 635s | appending IKE encryption algorithm AES_GCM_16[_0] 635s | parsing prf: 635s | ike_alg_byname() failed: IKE PRF algorithm 'none' is not recognized 635s | lookup for PRF algorithm 'none' failed 635s | - failed, saving error 'IKE PRF algorithm 'none' is not recognized' and tossing result 635s | parsing integ: 635s | appending IKE integrity algorithm NONE[_0] 635s | token: '-' "sha2" '' '' 635s | parsing prf: 635s | appending IKE PRF algorithm HMAC_SHA2_256[_0] 635s | token: '' '' '' 635s | appending IKE DH algorithm DH19[_0] 635s | appending IKE DH algorithm DH20[_0] 635s | appending IKE DH algorithm DH21[_0] 635s | appending IKE DH algorithm DH31[_0] 635s | appending IKE DH algorithm MODP4096[_0] 635s | appending IKE DH algorithm MODP3072[_0] 635s | appending IKE DH algorithm MODP2048[_0] 635s | appending IKE DH algorithm MODP8192[_0] 635s | parsing 'aes_gcm-none-sha2-modp2048' for IKE 635s | proposal: 'aes_gcm-none-sha2-modp2048' 635s | token: '' '' "aes_gcm" '-' 635s | token: '' "aes_gcm" '-' "none" '-' 635s | token: '-' "none" '-' "sha2" '-' 635s | appending IKE encryption algorithm AES_GCM_16[_0] 635s | parsing prf: 635s | ike_alg_byname() failed: IKE PRF algorithm 'none' is not recognized 635s | lookup for PRF algorithm 'none' failed 635s | - failed, saving error 'IKE PRF algorithm 'none' is not recognized' and tossing result 635s | parsing integ: 635s | appending IKE integrity algorithm NONE[_0] 635s | token: '-' "sha2" '-' "modp2048" '' 635s | parsing prf: 635s | appending IKE PRF algorithm HMAC_SHA2_256[_0] 635s | token: '-' "modp2048" '' '' 635s | parsing dh: 635s | appending IKE DH algorithm MODP2048[_0] 635s | token: '' '' '' 635s | parsing 'aes_gcm-none-sha2;modp2048' for IKE 635s | proposal: 'aes_gcm-none-sha2;modp2048' 635s | token: '' '' "aes_gcm" '-' 635s | token: '' "aes_gcm" '-' "none" '-' 635s | token: '-' "none" '-' "sha2" ';' 635s | appending IKE encryption algorithm AES_GCM_16[_0] 635s | parsing prf: 635s | ike_alg_byname() failed: IKE PRF algorithm 'none' is not recognized 635s | lookup for PRF algorithm 'none' failed 635s | - failed, saving error 'IKE PRF algorithm 'none' is not recognized' and tossing result 635s | parsing integ: 635s | appending IKE integrity algorithm NONE[_0] 635s | token: '-' "sha2" ';' "modp2048" '' 635s | parsing prf: 635s | appending IKE PRF algorithm HMAC_SHA2_256[_0] 635s | token: ';' "modp2048" '' '' 635s | parsing dh: 635s | appending IKE DH algorithm MODP2048[_0] 635s | token: '' '' '' 635s | parsing 'aes_gcm-none-modp2048' for IKE 635s | proposal: 'aes_gcm-none-modp2048' 635s | token: '' '' "aes_gcm" '-' 635s | token: '' "aes_gcm" '-' "none" '-' 635s | token: '-' "none" '-' "modp2048" '' 635s | appending IKE encryption algorithm AES_GCM_16[_0] 635s | parsing prf: 635s | ike_alg_byname() failed: IKE PRF algorithm 'none' is not recognized 635s | lookup for PRF algorithm 'none' failed 635s | - failed, saving error 'IKE PRF algorithm 'none' is not recognized' and tossing result 635s | parsing integ: 635s | appending IKE integrity algorithm NONE[_0] 635s | token: '-' "modp2048" '' '' 635s | parsing prf: 635s | ike_alg_byname() failed: IKE PRF algorithm 'modp2048' is not recognized 635s | lookup for PRF algorithm 'modp2048' failed 635s | -- failed 'IKE PRF algorithm 'modp2048' is not recognized' 635s | parsing 'aes_gcm-none;modp2048' for IKE 635s | proposal: 'aes_gcm-none;modp2048' 635s | token: '' '' "aes_gcm" '-' 635s | token: '' "aes_gcm" '-' "none" ';' 635s | token: '-' "none" ';' "modp2048" '' 635s | appending IKE encryption algorithm AES_GCM_16[_0] 635s | parsing prf: 635s | ike_alg_byname() failed: IKE PRF algorithm 'none' is not recognized 635s | lookup for PRF algorithm 'none' failed 635s | - failed, saving error 'IKE PRF algorithm 'none' is not recognized' and tossing result 635s | parsing integ: 635s | appending IKE integrity algorithm NONE[_0] 635s | token: ';' "modp2048" '' '' 635s | parsing dh: 635s | appending IKE DH algorithm MODP2048[_0] 635s | token: '' '' '' 635s | appending IKE PRF algorithm HMAC_SHA2_512[_0] 635s | appending IKE PRF algorithm HMAC_SHA2_256[_0] 635s | parsing 'aes_gcm-sha1-none-modp2048' for IKE 635s | proposal: 'aes_gcm-sha1-none-modp2048' 635s | token: '' '' "aes_gcm" '-' 635s | token: '' "aes_gcm" '-' "sha1" '-' 635s | token: '-' "sha1" '-' "none" '-' 635s | appending IKE encryption algorithm AES_GCM_16[_0] 635s | parsing prf: 635s | appending IKE PRF algorithm HMAC_SHA1[_0] 635s | token: '-' "none" '-' "modp2048" '' 635s | - succeeded, advancing tokens 635s | parsing dh: 635s | appending IKE DH algorithm NONE[_0] 635s | token: '-' "modp2048" '' '' 635s | parsing 'aes_gcm-sha1-none;modp2048' for IKE 635s | proposal: 'aes_gcm-sha1-none;modp2048' 635s | token: '' '' "aes_gcm" '-' 635s | token: '' "aes_gcm" '-' "sha1" '-' 635s | token: '-' "sha1" '-' "none" ';' 635s | appending IKE encryption algorithm AES_GCM_16[_0] 635s | parsing prf: 635s | appending IKE PRF algorithm HMAC_SHA1[_0] 635s | token: '-' "none" ';' "modp2048" '' 635s | - succeeded, advancing tokens 635s | parsing dh: 635s | appending IKE DH algorithm NONE[_0] 635s | token: ';' "modp2048" '' '' 635s | parsing 'aes+aes_gcm' for IKE 635s | proposal: 'aes+aes_gcm' 635s | token: '' '' "aes" '+' 635s | token: '' "aes" '+' "aes_gcm" '' 635s | token: '+' "aes_gcm" '' '' 635s | appending IKE encryption algorithm AES_CBC[_0] 635s | token: '' '' '' 635s | appending IKE encryption algorithm AES_GCM_16[_0] 635s | appending IKE PRF algorithm HMAC_SHA2_512[_0] 635s | appending IKE PRF algorithm HMAC_SHA2_256[_0] 635s | appending IKE DH algorithm DH19[_0] 635s | appending IKE DH algorithm DH20[_0] 635s | appending IKE DH algorithm DH21[_0] 635s | appending IKE DH algorithm DH31[_0] 635s | appending IKE DH algorithm MODP4096[_0] 635s | appending IKE DH algorithm MODP3072[_0] 635s | appending IKE DH algorithm MODP2048[_0] 635s | appending IKE DH algorithm MODP8192[_0] 635s | parsing ',' for IKE 635s | proposal: '' 635s | token: '' '' "" '' 635s | token: '' "" '' '' 635s | parsing 'aes,' for IKE 635s | proposal: 'aes' 635s | token: '' '' "aes" '' 635s | token: '' "aes" '' '' 635s | token: '' '' '' 635s | appending IKE encryption algorithm AES_CBC[_0] 635s | appending IKE PRF algorithm HMAC_SHA2_512[_0] 635s | appending IKE PRF algorithm HMAC_SHA2_256[_0] 635s | appending IKE integrity algorithm HMAC_SHA2_512_256[_0] 635s | appending IKE integrity algorithm HMAC_SHA2_256_128[_0] 635s | appending IKE DH algorithm DH19[_0] 635s | appending IKE DH algorithm DH20[_0] 635s | appending IKE DH algorithm DH21[_0] 635s | appending IKE DH algorithm DH31[_0] 635s | appending IKE DH algorithm MODP4096[_0] 635s | appending IKE DH algorithm MODP3072[_0] 635s | appending IKE DH algorithm MODP2048[_0] 635s | appending IKE DH algorithm MODP8192[_0] 635s | proposal: '' 635s | token: '' '' "" '' 635s | token: '' "" '' '' 635s | parsing 'aes,,aes' for IKE 635s | proposal: 'aes' 635s | token: '' '' "aes" '' 635s | token: '' "aes" '' '' 635s | token: '' '' '' 635s | appending IKE encryption algorithm AES_CBC[_0] 635s | appending IKE PRF algorithm HMAC_SHA2_512[_0] 635s | appending IKE PRF algorithm HMAC_SHA2_256[_0] 635s | appending IKE integrity algorithm HMAC_SHA2_512_256[_0] 635s | appending IKE integrity algorithm HMAC_SHA2_256_128[_0] 635s | appending IKE DH algorithm DH19[_0] 635s | appending IKE DH algorithm DH20[_0] 635s | appending IKE DH algorithm DH21[_0] 635s | appending IKE DH algorithm DH31[_0] 635s | appending IKE DH algorithm MODP4096[_0] 635s | appending IKE DH algorithm MODP3072[_0] 635s | appending IKE DH algorithm MODP2048[_0] 635s | appending IKE DH algorithm MODP8192[_0] 635s | proposal: '' 635s | token: '' '' "" '' 635s | token: '' "" '' '' 635s | parsing ',aes' for IKE 635s | proposal: '' 635s | token: '' '' "" '' 635s | token: '' "" '' '' 635s | parsing '-' for IKE 635s | proposal: '-' 635s | token: '' '' "" '-' 635s | token: '' "" '-' "" '' 635s | parsing '+' for IKE 635s | proposal: '+' 635s | token: '' '' "" '+' 635s | token: '' "" '+' "" '' 635s | parsing ';' for IKE 635s | proposal: ';' 635s | token: '' '' "" ';' 635s | token: '' "" ';' "" '' 635s | parsing 'aes-' for IKE 635s | proposal: 'aes-' 635s | token: '' '' "aes" '-' 635s | token: '' "aes" '-' "" '' 635s | token: '-' "" '' '' 635s | appending IKE encryption algorithm AES_CBC[_0] 635s | parsing prf: 635s | - failed, saving error 'IKE PRF algorithm is empty' and tossing result 635s | parsing integ: 635s | - and - failed, returning earlier PRF error 'IKE PRF algorithm is empty' and discarding INTEG error 'IKE integrity algorithm is empty') 635s | parsing 'aes+' for IKE 635s | proposal: 'aes+' 635s | token: '' '' "aes" '+' 635s | token: '' "aes" '+' "" '' 635s | token: '+' "" '' '' 635s | appending IKE encryption algorithm AES_CBC[_0] 635s | parsing 'aes;' for IKE 635s | proposal: 'aes;' 635s | token: '' '' "aes" ';' 635s | token: '' "aes" ';' "" '' 635s | token: ';' "" '' '' 635s | appending IKE encryption algorithm AES_CBC[_0] 635s | parsing dh: 635s | ... failed 'IKE DH algorithm is empty' 635s | parsing '-aes' for IKE 635s | proposal: '-aes' 635s | token: '' '' "" '-' 635s | token: '' "" '-' "aes" '' 635s | parsing '+aes' for IKE 635s | proposal: '+aes' 635s | token: '' '' "" '+' 635s | token: '' "" '+' "aes" '' 635s | parsing ';aes' for IKE 635s | proposal: ';aes' 635s | token: '' '' "" ';' 635s | token: '' "" ';' "aes" '' 635s | parsing 'aes+-' for IKE 635s | proposal: 'aes+-' 635s | token: '' '' "aes" '+' 635s | token: '' "aes" '+' "" '-' 635s | token: '+' "" '-' "" '' 635s | appending IKE encryption algorithm AES_CBC[_0] 635s | parsing 'aes+;' for IKE 635s | proposal: 'aes+;' 635s | token: '' '' "aes" '+' 635s | token: '' "aes" '+' "" ';' 635s | token: '+' "" ';' "" '' 635s | appending IKE encryption algorithm AES_CBC[_0] 635s | parsing 'aes++' for IKE 635s | proposal: 'aes++' 635s | token: '' '' "aes" '+' 635s | token: '' "aes" '+' "" '+' 635s | token: '+' "" '+' "" '' 635s | appending IKE encryption algorithm AES_CBC[_0] 635s ipsec algparse: leak detective found no leaks 635s ipsec algparse: Encryption algorithms: 635s ipsec algparse: AES_CCM_16 {256,192,*128} IKEv1: ESP IKEv2: ESP FIPS aes_ccm, aes_ccm_c 635s ipsec algparse: AES_CCM_12 {256,192,*128} IKEv1: ESP IKEv2: ESP FIPS aes_ccm_b 635s ipsec algparse: AES_CCM_8 {256,192,*128} IKEv1: ESP IKEv2: ESP FIPS aes_ccm_a 635s ipsec algparse: 3DES_CBC [*192] IKEv1: IKE ESP IKEv2: IKE ESP FIPS NSS(CBC) 3des 635s ipsec algparse: CAMELLIA_CTR {256,192,*128} IKEv1: ESP IKEv2: ESP 635s ipsec algparse: CAMELLIA_CBC {256,192,*128} IKEv1: IKE ESP IKEv2: IKE ESP NSS(CBC) camellia 635s ipsec algparse: AES_GCM_16 {256,192,*128} IKEv1: ESP IKEv2: IKE ESP FIPS NSS(AEAD) aes_gcm, aes_gcm_c 635s ipsec algparse: AES_GCM_12 {256,192,*128} IKEv1: ESP IKEv2: IKE ESP FIPS NSS(AEAD) aes_gcm_b 635s ipsec algparse: AES_GCM_8 {256,192,*128} IKEv1: ESP IKEv2: IKE ESP FIPS NSS(AEAD) aes_gcm_a 635s ipsec algparse: AES_CTR {256,192,*128} IKEv1: IKE ESP IKEv2: IKE ESP FIPS NSS(CTR) aesctr 635s ipsec algparse: AES_CBC {256,192,*128} IKEv1: IKE ESP IKEv2: IKE ESP FIPS NSS(CBC) aes 635s ipsec algparse: NULL_AUTH_AES_GMAC {256,192,*128} IKEv1: ESP IKEv2: ESP FIPS aes_gmac 635s ipsec algparse: NULL [] IKEv1: ESP IKEv2: ESP NULL 635s ipsec algparse: CHACHA20_POLY1305 [*256] IKEv1: IKEv2: IKE ESP NSS(AEAD) chacha20poly1305 635s ipsec algparse: Hash algorithms: 635s ipsec algparse: MD5 IKEv1: IKE IKEv2: NSS 635s ipsec algparse: SHA1 IKEv1: IKE IKEv2: IKE FIPS NSS sha 635s ipsec algparse: SHA2_256 IKEv1: IKE IKEv2: IKE FIPS NSS sha2, sha256 635s ipsec algparse: SHA2_384 IKEv1: IKE IKEv2: IKE FIPS NSS sha384 635s ipsec algparse: SHA2_512 IKEv1: IKE IKEv2: IKE FIPS NSS sha512 635s ipsec algparse: IDENTITY IKEv1: IKEv2: FIPS 635s ipsec algparse: PRF algorithms: 635s ipsec algparse: HMAC_MD5 IKEv1: IKE IKEv2: IKE NSS md5 635s ipsec algparse: HMAC_SHA1 IKEv1: IKE IKEv2: IKE FIPS NSS sha, sha1 635s ipsec algparse: HMAC_SHA2_256 IKEv1: IKE IKEv2: IKE FIPS NSS sha2, sha256, sha2_256 635s ipsec algparse: HMAC_SHA2_384 IKEv1: IKE IKEv2: IKE FIPS NSS sha384, sha2_384 635s ipsec algparse: HMAC_SHA2_512 IKEv1: IKE IKEv2: IKE FIPS NSS sha512, sha2_512 635s ipsec algparse: AES_XCBC IKEv1: IKEv2: IKE native(XCBC) aes128_xcbc 635s ipsec algparse: Integrity algorithms: 635s ipsec algparse: HMAC_MD5_96 IKEv1: IKE ESP AH IKEv2: IKE ESP AH NSS md5, hmac_md5 635s ipsec algparse: HMAC_SHA1_96 IKEv1: IKE ESP AH IKEv2: IKE ESP AH FIPS NSS sha, sha1, sha1_96, hmac_sha1 635s ipsec algparse: HMAC_SHA2_512_256 IKEv1: IKE ESP AH IKEv2: IKE ESP AH FIPS NSS sha512, sha2_512, sha2_512_256, hmac_sha2_512 635s ipsec algparse: HMAC_SHA2_384_192 IKEv1: IKE ESP AH IKEv2: IKE ESP AH FIPS NSS sha384, sha2_384, sha2_384_192, hmac_sha2_384 635s ipsec algparse: HMAC_SHA2_256_128 IKEv1: IKE ESP AH IKEv2: IKE ESP AH FIPS NSS sha2, sha256, sha2_256, sha2_256_128, hmac_sha2_256 635s ipsec algparse: HMAC_SHA2_256_TRUNCBUG IKEv1: ESP AH IKEv2: AH 635s ipsec algparse: AES_XCBC_96 IKEv1: ESP AH IKEv2: IKE ESP AH native(XCBC) aes_xcbc, aes128_xcbc, aes128_xcbc_96 635s ipsec algparse: AES_CMAC_96 IKEv1: ESP AH IKEv2: ESP AH FIPS aes_cmac 635s ipsec algparse: NONE IKEv1: ESP IKEv2: IKE ESP FIPS null 635s ipsec algparse: DH algorithms: 635s ipsec algparse: NONE IKEv1: IKEv2: IKE ESP AH FIPS NSS(MODP) null, dh0 635s ipsec algparse: MODP1536 IKEv1: IKE ESP AH IKEv2: IKE ESP AH NSS(MODP) dh5 635s ipsec algparse: MODP2048 IKEv1: IKE ESP AH IKEv2: IKE ESP AH FIPS NSS(MODP) dh14 635s ipsec algparse: MODP3072 IKEv1: IKE ESP AH IKEv2: IKE ESP AH FIPS NSS(MODP) dh15 635s ipsec algparse: MODP4096 IKEv1: IKE ESP AH IKEv2: IKE ESP AH FIPS NSS(MODP) dh16 635s ipsec algparse: MODP6144 IKEv1: IKE ESP AH IKEv2: IKE ESP AH FIPS NSS(MODP) dh17 635s ipsec algparse: MODP8192 IKEv1: IKE ESP AH IKEv2: IKE ESP AH FIPS NSS(MODP) dh18 635s ipsec algparse: DH19 IKEv1: IKE IKEv2: IKE ESP AH FIPS NSS(ECP) ecp_256, ecp256 635s ipsec algparse: DH20 IKEv1: IKE IKEv2: IKE ESP AH FIPS NSS(ECP) ecp_384, ecp384 635s ipsec algparse: DH21 IKEv1: IKE IKEv2: IKE ESP AH FIPS NSS(ECP) ecp_521, ecp521 635s ipsec algparse: DH31 IKEv1: IKE IKEv2: IKE ESP AH NSS(ECP) curve25519 635s ipsec algparse: IPCOMP algorithms: 635s ipsec algparse: DEFLATE IKEv1: ESP AH IKEv2: ESP AH FIPS 635s ipsec algparse: LZS IKEv1: IKEv2: ESP AH FIPS 635s ipsec algparse: LZJH IKEv1: IKEv2: ESP AH FIPS 635s ipsec algparse: testing CAMELLIA_CBC: 635s ipsec algparse: Camellia: 16 bytes with 128-bit key 635s | decode_to_chunk() raw_key: input "0x00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00" 635s | decode_to_chunk() output: 635s | 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................ 635s | CONCATENATE_DATA_AND_BASE: 635s | target: EXTRACT_KEY_FROM_KEY 635s | base: base-key@0x2aa3f90f350 (16-bytes, AES_KEY_GEN) 635s | params: 16-bytes@0x3ffeeff7088 635s | key-offset: 0, key-size: 16 635s | EXTRACT_KEY_FROM_KEY: 635s | target: CAMELLIA_CBC 635s | flags: ENCRYPT+DECRYPT 635s | key_size: 16-bytes 635s | base: base-key@0x2aa3f912360 (32-bytes, EXTRACT_KEY_FROM_KEY) 635s | operation: FLAGS_ONLY 635s | params: 8-bytes@0x3ffeeff6fd8 635s | decode_to_mac() IV: : input "0x00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00" 635s | decode_to_mac() output: 635s | 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................ 635s | decode_to_chunk() new IV: : input "0x07 92 3A 39 EB 0A 81 7D 1C 4D 87 BD B8 2D 1F 1C" 635s | decode_to_chunk() output: 635s | 07 92 3a 39 eb 0a 81 7d 1c 4d 87 bd b8 2d 1f 1c ..:9...}.M...-.. 635s | decode_to_chunk() plaintext: : input "0x80 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00" 635s | decode_to_chunk() output: 635s | 80 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................ 635s | decode_to_chunk() ciphertext: : input "0x07 92 3A 39 EB 0A 81 7D 1C 4D 87 BD B8 2D 1F 1C" 635s | decode_to_chunk() output: 635s | 07 92 3a 39 eb 0a 81 7d 1c 4d 87 bd b8 2d 1f 1c ..:9...}.M...-.. 635s | NSS ike_alg_nss_cbc: CAMELLIA_CBC - enter (nil) 635s | using IKEv1 IV 635s | NSS ike_alg_nss_cbc: CAMELLIA_CBC - exit 635s | verify_bytes() Camellia: 16 bytes with 128-bit key: encrypt: ok 635s | verify_bytes() Camellia: 16 bytes with 128-bit key: updated CBC IV: ok 635s | decode_to_mac() IV: : input "0x00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00" 635s | decode_to_mac() output: 635s | 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................ 635s | decode_to_chunk() new IV: : input "0x07 92 3A 39 EB 0A 81 7D 1C 4D 87 BD B8 2D 1F 1C" 635s | decode_to_chunk() output: 635s | 07 92 3a 39 eb 0a 81 7d 1c 4d 87 bd b8 2d 1f 1c ..:9...}.M...-.. 635s | decode_to_chunk() ciphertext: : input "0x07 92 3A 39 EB 0A 81 7D 1C 4D 87 BD B8 2D 1F 1C" 635s | decode_to_chunk() output: 635s | 07 92 3a 39 eb 0a 81 7d 1c 4d 87 bd b8 2d 1f 1c ..:9...}.M...-.. 635s | decode_to_chunk() plaintext: : input "0x80 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00" 635s | decode_to_chunk() output: 635s | 80 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................ 635s | NSS ike_alg_nss_cbc: CAMELLIA_CBC - enter (nil) 635s | using IKEv1 IV 635s | NSS ike_alg_nss_cbc: CAMELLIA_CBC - exit 635s | verify_bytes() Camellia: 16 bytes with 128-bit key: decrypt: ok 635s | verify_bytes() Camellia: 16 bytes with 128-bit key: updated CBC IV: ok 635s ipsec algparse: Camellia: 16 bytes with 128-bit key 635s | decode_to_chunk() raw_key: input "0x00 11 22 33 44 55 66 77 88 99 AA BB CC DD EE FF" 635s | decode_to_chunk() output: 635s | 00 11 22 33 44 55 66 77 88 99 aa bb cc dd ee ff .."3DUfw........ 635s | CONCATENATE_DATA_AND_BASE: 635s | target: EXTRACT_KEY_FROM_KEY 635s | base: base-key@0x2aa3f90f350 (16-bytes, AES_KEY_GEN) 635s | params: 16-bytes@0x3ffeeff7088 635s | key-offset: 0, key-size: 16 635s | EXTRACT_KEY_FROM_KEY: 635s | target: CAMELLIA_CBC 635s | flags: ENCRYPT+DECRYPT 635s | key_size: 16-bytes 635s | base: base-key@0x2aa3f912360 (32-bytes, EXTRACT_KEY_FROM_KEY) 635s | operation: FLAGS_ONLY 635s | params: 8-bytes@0x3ffeeff6fd8 635s | decode_to_mac() IV: : input "0x00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00" 635s | decode_to_mac() output: 635s | 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................ 635s | decode_to_chunk() new IV: : input "0x14 4D 2B 0F 50 0C 27 B7 EC 2C D1 2D 91 59 6F 37" 635s | decode_to_chunk() output: 635s | 14 4d 2b 0f 50 0c 27 b7 ec 2c d1 2d 91 59 6f 37 .M+.P.'..,.-.Yo7 635s | decode_to_chunk() plaintext: : input "0x00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 01 " 635s | decode_to_chunk() output: 635s | 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 01 ................ 635s | decode_to_chunk() ciphertext: : input "0x14 4D 2B 0F 50 0C 27 B7 EC 2C D1 2D 91 59 6F 37" 635s | decode_to_chunk() output: 635s | 14 4d 2b 0f 50 0c 27 b7 ec 2c d1 2d 91 59 6f 37 .M+.P.'..,.-.Yo7 635s | NSS ike_alg_nss_cbc: CAMELLIA_CBC - enter (nil) 635s | using IKEv1 IV 635s | NSS ike_alg_nss_cbc: CAMELLIA_CBC - exit 635s | verify_bytes() Camellia: 16 bytes with 128-bit key: encrypt: ok 635s | verify_bytes() Camellia: 16 bytes with 128-bit key: updated CBC IV: ok 635s | decode_to_mac() IV: : input "0x00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00" 635s | decode_to_mac() output: 635s | 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................ 635s | decode_to_chunk() new IV: : input "0x14 4D 2B 0F 50 0C 27 B7 EC 2C D1 2D 91 59 6F 37" 635s | decode_to_chunk() output: 635s | 14 4d 2b 0f 50 0c 27 b7 ec 2c d1 2d 91 59 6f 37 .M+.P.'..,.-.Yo7 635s | decode_to_chunk() ciphertext: : input "0x14 4D 2B 0F 50 0C 27 B7 EC 2C D1 2D 91 59 6F 37" 635s | decode_to_chunk() output: 635s | 14 4d 2b 0f 50 0c 27 b7 ec 2c d1 2d 91 59 6f 37 .M+.P.'..,.-.Yo7 635s | decode_to_chunk() plaintext: : input "0x00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 01 " 635s | decode_to_chunk() output: 635s | 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 01 ................ 635s | NSS ike_alg_nss_cbc: CAMELLIA_CBC - enter (nil) 635s | using IKEv1 IV 635s | NSS ike_alg_nss_cbc: CAMELLIA_CBC - exit 635s | verify_bytes() Camellia: 16 bytes with 128-bit key: decrypt: ok 635s | verify_bytes() Camellia: 16 bytes with 128-bit key: updated CBC IV: ok 635s ipsec algparse: Camellia: 16 bytes with 256-bit key 635s | decode_to_chunk() raw_key: input "0x00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00" 635s | decode_to_chunk() output: 635s | 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................ 635s | 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................ 635s | CONCATENATE_DATA_AND_BASE: 635s | target: EXTRACT_KEY_FROM_KEY 635s | base: base-key@0x2aa3f90f350 (16-bytes, AES_KEY_GEN) 635s | params: 16-bytes@0x3ffeeff7088 635s | key-offset: 0, key-size: 32 635s | EXTRACT_KEY_FROM_KEY: 635s | target: CAMELLIA_CBC 635s | flags: ENCRYPT+DECRYPT 635s | key_size: 32-bytes 635s | base: base-key@0x2aa3f912360 (48-bytes, EXTRACT_KEY_FROM_KEY) 635s | operation: FLAGS_ONLY 635s | params: 8-bytes@0x3ffeeff6fd8 635s | decode_to_mac() IV: : input "0x00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00" 635s | decode_to_mac() output: 635s | 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................ 635s | decode_to_chunk() new IV: : input "0xB0 C6 B8 8A EA 51 8A B0 9E 84 72 48 E9 1B 1B 9D" 635s | decode_to_chunk() output: 635s | b0 c6 b8 8a ea 51 8a b0 9e 84 72 48 e9 1b 1b 9d .....Q....rH.... 635s | decode_to_chunk() plaintext: : input "0x80 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00" 635s | decode_to_chunk() output: 635s | 80 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................ 635s | decode_to_chunk() ciphertext: : input "0xB0 C6 B8 8A EA 51 8A B0 9E 84 72 48 E9 1B 1B 9D" 635s | decode_to_chunk() output: 635s | b0 c6 b8 8a ea 51 8a b0 9e 84 72 48 e9 1b 1b 9d .....Q....rH.... 635s | NSS ike_alg_nss_cbc: CAMELLIA_CBC - enter (nil) 635s | using IKEv1 IV 635s | NSS ike_alg_nss_cbc: CAMELLIA_CBC - exit 635s | verify_bytes() Camellia: 16 bytes with 256-bit key: encrypt: ok 635s | verify_bytes() Camellia: 16 bytes with 256-bit key: updated CBC IV: ok 635s | decode_to_mac() IV: : input "0x00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00" 635s | decode_to_mac() output: 635s | 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................ 635s | decode_to_chunk() new IV: : input "0xB0 C6 B8 8A EA 51 8A B0 9E 84 72 48 E9 1B 1B 9D" 635s | decode_to_chunk() output: 635s | b0 c6 b8 8a ea 51 8a b0 9e 84 72 48 e9 1b 1b 9d .....Q....rH.... 635s | decode_to_chunk() ciphertext: : input "0xB0 C6 B8 8A EA 51 8A B0 9E 84 72 48 E9 1B 1B 9D" 635s | decode_to_chunk() output: 635s | b0 c6 b8 8a ea 51 8a b0 9e 84 72 48 e9 1b 1b 9d .....Q....rH.... 635s | decode_to_chunk() plaintext: : input "0x80 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00" 635s | decode_to_chunk() output: 635s | 80 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................ 635s | NSS ike_alg_nss_cbc: CAMELLIA_CBC - enter (nil) 635s | using IKEv1 IV 635s | NSS ike_alg_nss_cbc: CAMELLIA_CBC - exit 635s | verify_bytes() Camellia: 16 bytes with 256-bit key: decrypt: ok 635s | verify_bytes() Camellia: 16 bytes with 256-bit key: updated CBC IV: ok 635s ipsec algparse: Camellia: 16 bytes with 256-bit key 635s | decode_to_chunk() raw_key: input "0x00 11 22 33 44 55 66 77 88 99 AA BB CC DD EE FF FF EE DD CC BB AA 99 88 77 66 55 44 33 22 11 00" 635s | decode_to_chunk() output: 635s | 00 11 22 33 44 55 66 77 88 99 aa bb cc dd ee ff .."3DUfw........ 635s | ff ee dd cc bb aa 99 88 77 66 55 44 33 22 11 00 ........wfUD3".. 635s | CONCATENATE_DATA_AND_BASE: 635s | target: EXTRACT_KEY_FROM_KEY 635s | base: base-key@0x2aa3f90f350 (16-bytes, AES_KEY_GEN) 635s | params: 16-bytes@0x3ffeeff7088 635s | key-offset: 0, key-size: 32 635s | EXTRACT_KEY_FROM_KEY: 635s | target: CAMELLIA_CBC 635s | flags: ENCRYPT+DECRYPT 635s | key_size: 32-bytes 635s | base: base-key@0x2aa3f912360 (48-bytes, EXTRACT_KEY_FROM_KEY) 635s | operation: FLAGS_ONLY 635s | params: 8-bytes@0x3ffeeff6fd8 635s | decode_to_mac() IV: : input "0x00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00" 635s | decode_to_mac() output: 635s | 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................ 635s | decode_to_chunk() new IV: : input "0xCC 39 FF EE 18 56 D3 EB 61 02 5E 93 21 9B 65 23 " 635s | decode_to_chunk() output: 635s | cc 39 ff ee 18 56 d3 eb 61 02 5e 93 21 9b 65 23 .9...V..a.^.!.e# 635s | decode_to_chunk() plaintext: : input "0x00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 01" 635s | decode_to_chunk() output: 635s | 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 01 ................ 635s | decode_to_chunk() ciphertext: : input "0xCC 39 FF EE 18 56 D3 EB 61 02 5E 93 21 9B 65 23 " 635s | decode_to_chunk() output: 635s | cc 39 ff ee 18 56 d3 eb 61 02 5e 93 21 9b 65 23 .9...V..a.^.!.e# 635s | NSS ike_alg_nss_cbc: CAMELLIA_CBC - enter (nil) 635s | using IKEv1 IV 635s | NSS ike_alg_nss_cbc: CAMELLIA_CBC - exit 635s | verify_bytes() Camellia: 16 bytes with 256-bit key: encrypt: ok 635s | verify_bytes() Camellia: 16 bytes with 256-bit key: updated CBC IV: ok 635s | decode_to_mac() IV: : input "0x00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00" 635s | decode_to_mac() output: 635s | 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................ 635s | decode_to_chunk() new IV: : input "0xCC 39 FF EE 18 56 D3 EB 61 02 5E 93 21 9B 65 23 " 635s | decode_to_chunk() output: 635s | cc 39 ff ee 18 56 d3 eb 61 02 5e 93 21 9b 65 23 .9...V..a.^.!.e# 635s | decode_to_chunk() ciphertext: : input "0xCC 39 FF EE 18 56 D3 EB 61 02 5E 93 21 9B 65 23 " 635s | decode_to_chunk() output: 635s | cc 39 ff ee 18 56 d3 eb 61 02 5e 93 21 9b 65 23 .9...V..a.^.!.e# 635s | decode_to_chunk() plaintext: : input "0x00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 01" 635s | decode_to_chunk() output: 635s | 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 01 ................ 635s | NSS ike_alg_nss_cbc: CAMELLIA_CBC - enter (nil) 635s | using IKEv1 IV 635s | NSS ike_alg_nss_cbc: CAMELLIA_CBC - exit 635s | verify_bytes() Camellia: 16 bytes with 256-bit key: decrypt: ok 635s | verify_bytes() Camellia: 16 bytes with 256-bit key: updated CBC IV: ok 635s ipsec algparse: testing AES_GCM_16: 635s ipsec algparse: empty string 635s | decode_to_chunk() raw_key: input "0xcf063a34d4a9a76c2c86787d3f96db71" 635s | decode_to_chunk() output: 635s | cf 06 3a 34 d4 a9 a7 6c 2c 86 78 7d 3f 96 db 71 ..:4...l,.x}?..q 635s | CONCATENATE_DATA_AND_BASE: 635s | target: EXTRACT_KEY_FROM_KEY 635s | base: base-key@0x2aa3f90f350 (16-bytes, AES_KEY_GEN) 635s | params: 16-bytes@0x3ffeeff6f70 635s | key-offset: 0, key-size: 16 635s | EXTRACT_KEY_FROM_KEY: 635s | target: AES_GCM 635s | flags: ENCRYPT+DECRYPT 635s | key_size: 16-bytes 635s | base: base-key@0x2aa3f912360 (32-bytes, EXTRACT_KEY_FROM_KEY) 635s | operation: FLAGS_ONLY 635s | params: 8-bytes@0x3ffeeff6ec0 635s | decode_to_chunk() salted IV: input "0x113b9785971864c83b01c787" 635s | decode_to_chunk() output: 635s | 11 3b 97 85 97 18 64 c8 3b 01 c7 87 .;....d.;... 635s | decode_to_chunk() AAD: input "" 635s | decode_to_chunk() output: 635s | 635s | decode_to_chunk() plaintext: input "" 635s | decode_to_chunk() output: 635s | 635s | decode_to_chunk() ciphertext: input "" 635s | decode_to_chunk() output: 635s | 635s | decode_to_chunk() tag: input "0x72ac8493e3a5228b5d130a69d2510e42" 635s | decode_to_chunk() output: 635s | 72 ac 84 93 e3 a5 22 8b 5d 13 0a 69 d2 51 0e 42 r.....".]..i.Q.B 635s | test_gcm_vector() DECRYPT: aad-size=0 salt-size=4 wire-IV-size=8 text-size=0 tag-size=16 text+tag in: 635s | 72 ac 84 93 e3 a5 22 8b 5d 13 0a 69 d2 51 0e 42 r.....".]..i.Q.B 635s | verify_bytes() empty string: output ciphertext: ok 635s | verify_bytes() empty string: TAG: ok 635s | test_gcm_vector() text+tag out: 635s | 72 ac 84 93 e3 a5 22 8b 5d 13 0a 69 d2 51 0e 42 r.....".]..i.Q.B 635s | test_gcm_vector() ENCRYPT: aad-size=0 salt-size=4 wire-IV-size=8 text-size=0 tag-size=16 text+tag in: 635s | 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................ 635s | verify_bytes() empty string: output ciphertext: ok 635s | verify_bytes() empty string: TAG: ok 635s | test_gcm_vector() text+tag out: 635s | 72 ac 84 93 e3 a5 22 8b 5d 13 0a 69 d2 51 0e 42 r.....".]..i.Q.B 635s ipsec algparse: one block 635s | decode_to_chunk() raw_key: input "0xe98b72a9881a84ca6b76e0f43e68647a" 635s | decode_to_chunk() output: 635s | e9 8b 72 a9 88 1a 84 ca 6b 76 e0 f4 3e 68 64 7a ..r.....kv..>hdz 635s | CONCATENATE_DATA_AND_BASE: 635s | target: EXTRACT_KEY_FROM_KEY 635s | base: base-key@0x2aa3f90f350 (16-bytes, AES_KEY_GEN) 635s | params: 16-bytes@0x3ffeeff6f70 635s | key-offset: 0, key-size: 16 635s | EXTRACT_KEY_FROM_KEY: 635s | target: AES_GCM 635s | flags: ENCRYPT+DECRYPT 635s | key_size: 16-bytes 635s | base: base-key@0x2aa3f912360 (32-bytes, EXTRACT_KEY_FROM_KEY) 635s | operation: FLAGS_ONLY 635s | params: 8-bytes@0x3ffeeff6ec0 635s | decode_to_chunk() salted IV: input "0x8b23299fde174053f3d652ba" 635s | decode_to_chunk() output: 635s | 8b 23 29 9f de 17 40 53 f3 d6 52 ba .#)...@S..R. 635s | decode_to_chunk() AAD: input "" 635s | decode_to_chunk() output: 635s | 635s | decode_to_chunk() plaintext: input "0x28286a321293253c3e0aa2704a278032" 635s | decode_to_chunk() output: 635s | 28 28 6a 32 12 93 25 3c 3e 0a a2 70 4a 27 80 32 ((j2..%<>..pJ'.2 635s | decode_to_chunk() ciphertext: input "0x5a3c1cf1985dbb8bed818036fdd5ab42" 635s | decode_to_chunk() output: 635s | 5a 3c 1c f1 98 5d bb 8b ed 81 80 36 fd d5 ab 42 Z<...].....6...B 635s | decode_to_chunk() tag: input "0x23c7ab0f952b7091cd324835043b5eb5" 635s | decode_to_chunk() output: 635s | 23 c7 ab 0f 95 2b 70 91 cd 32 48 35 04 3b 5e b5 #....+p..2H5.;^. 635s | test_gcm_vector() DECRYPT: aad-size=0 salt-size=4 wire-IV-size=8 text-size=16 tag-size=16 text+tag in: 635s | 5a 3c 1c f1 98 5d bb 8b ed 81 80 36 fd d5 ab 42 Z<...].....6...B 635s | 23 c7 ab 0f 95 2b 70 91 cd 32 48 35 04 3b 5e b5 #....+p..2H5.;^. 635s | verify_bytes() one block: output ciphertext: ok 635s | verify_bytes() one block: TAG: ok 635s | test_gcm_vector() text+tag out: 635s | 28 28 6a 32 12 93 25 3c 3e 0a a2 70 4a 27 80 32 ((j2..%<>..pJ'.2 635s | 23 c7 ab 0f 95 2b 70 91 cd 32 48 35 04 3b 5e b5 #....+p..2H5.;^. 635s | test_gcm_vector() ENCRYPT: aad-size=0 salt-size=4 wire-IV-size=8 text-size=16 tag-size=16 text+tag in: 635s | 28 28 6a 32 12 93 25 3c 3e 0a a2 70 4a 27 80 32 ((j2..%<>..pJ'.2 635s | 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................ 635s | verify_bytes() one block: output ciphertext: ok 635s | verify_bytes() one block: TAG: ok 635s | test_gcm_vector() text+tag out: 635s | 5a 3c 1c f1 98 5d bb 8b ed 81 80 36 fd d5 ab 42 Z<...].....6...B 635s | 23 c7 ab 0f 95 2b 70 91 cd 32 48 35 04 3b 5e b5 #....+p..2H5.;^. 635s ipsec algparse: two blocks 635s | decode_to_chunk() raw_key: input "0xbfd414a6212958a607a0f5d3ab48471d" 635s | decode_to_chunk() output: 635s | bf d4 14 a6 21 29 58 a6 07 a0 f5 d3 ab 48 47 1d ....!)X......HG. 635s | CONCATENATE_DATA_AND_BASE: 635s | target: EXTRACT_KEY_FROM_KEY 635s | base: base-key@0x2aa3f90f350 (16-bytes, AES_KEY_GEN) 635s | params: 16-bytes@0x3ffeeff6f70 635s | key-offset: 0, key-size: 16 635s | EXTRACT_KEY_FROM_KEY: 635s | target: AES_GCM 635s | flags: ENCRYPT+DECRYPT 635s | key_size: 16-bytes 635s | base: base-key@0x2aa3f912360 (32-bytes, EXTRACT_KEY_FROM_KEY) 635s | operation: FLAGS_ONLY 635s | params: 8-bytes@0x3ffeeff6ec0 635s | decode_to_chunk() salted IV: input "0x86d8ea0ab8e40dcc481cd0e2" 635s | decode_to_chunk() output: 635s | 86 d8 ea 0a b8 e4 0d cc 48 1c d0 e2 ........H... 635s | decode_to_chunk() AAD: input "" 635s | decode_to_chunk() output: 635s | 635s | decode_to_chunk() plaintext: input "0xa6b76a066e63392c9443e60272ceaeb9d25c991b0f2e55e2804e168c05ea591a" 635s | decode_to_chunk() output: 635s | a6 b7 6a 06 6e 63 39 2c 94 43 e6 02 72 ce ae b9 ..j.nc9,.C..r... 635s | d2 5c 99 1b 0f 2e 55 e2 80 4e 16 8c 05 ea 59 1a .\....U..N....Y. 635s | decode_to_chunk() ciphertext: input "0x62171db33193292d930bf6647347652c1ef33316d7feca99d54f1db4fcf513f8" 635s | decode_to_chunk() output: 635s | 62 17 1d b3 31 93 29 2d 93 0b f6 64 73 47 65 2c b...1.)-...dsGe, 635s | 1e f3 33 16 d7 fe ca 99 d5 4f 1d b4 fc f5 13 f8 ..3......O...... 635s | decode_to_chunk() tag: input "0xc28280aa5c6c7a8bd366f28c1cfd1f6e" 635s | decode_to_chunk() output: 635s | c2 82 80 aa 5c 6c 7a 8b d3 66 f2 8c 1c fd 1f 6e ....\lz..f.....n 635s | test_gcm_vector() DECRYPT: aad-size=0 salt-size=4 wire-IV-size=8 text-size=32 tag-size=16 text+tag in: 635s | 62 17 1d b3 31 93 29 2d 93 0b f6 64 73 47 65 2c b...1.)-...dsGe, 635s | 1e f3 33 16 d7 fe ca 99 d5 4f 1d b4 fc f5 13 f8 ..3......O...... 635s | c2 82 80 aa 5c 6c 7a 8b d3 66 f2 8c 1c fd 1f 6e ....\lz..f.....n 635s | verify_bytes() two blocks: output ciphertext: ok 635s | verify_bytes() two blocks: TAG: ok 635s | test_gcm_vector() text+tag out: 635s | a6 b7 6a 06 6e 63 39 2c 94 43 e6 02 72 ce ae b9 ..j.nc9,.C..r... 635s | d2 5c 99 1b 0f 2e 55 e2 80 4e 16 8c 05 ea 59 1a .\....U..N....Y. 635s | c2 82 80 aa 5c 6c 7a 8b d3 66 f2 8c 1c fd 1f 6e ....\lz..f.....n 635s | test_gcm_vector() ENCRYPT: aad-size=0 salt-size=4 wire-IV-size=8 text-size=32 tag-size=16 text+tag in: 635s | a6 b7 6a 06 6e 63 39 2c 94 43 e6 02 72 ce ae b9 ..j.nc9,.C..r... 635s | d2 5c 99 1b 0f 2e 55 e2 80 4e 16 8c 05 ea 59 1a .\....U..N....Y. 635s | 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................ 635s | verify_bytes() two blocks: output ciphertext: ok 635s | verify_bytes() two blocks: TAG: ok 635s | test_gcm_vector() text+tag out: 635s | 62 17 1d b3 31 93 29 2d 93 0b f6 64 73 47 65 2c b...1.)-...dsGe, 635s | 1e f3 33 16 d7 fe ca 99 d5 4f 1d b4 fc f5 13 f8 ..3......O...... 635s | c2 82 80 aa 5c 6c 7a 8b d3 66 f2 8c 1c fd 1f 6e ....\lz..f.....n 635s ipsec algparse: two blocks with associated data 635s | decode_to_chunk() raw_key: input "0x95bcde70c094f04e3dd8259cafd88ce8" 635s | decode_to_chunk() output: 635s | 95 bc de 70 c0 94 f0 4e 3d d8 25 9c af d8 8c e8 ...p...N=.%..... 635s | CONCATENATE_DATA_AND_BASE: 635s | target: EXTRACT_KEY_FROM_KEY 635s | base: base-key@0x2aa3f90f350 (16-bytes, AES_KEY_GEN) 635s | params: 16-bytes@0x3ffeeff6f70 635s | key-offset: 0, key-size: 16 635s | EXTRACT_KEY_FROM_KEY: 635s | target: AES_GCM 635s | flags: ENCRYPT+DECRYPT 635s | key_size: 16-bytes 635s | base: base-key@0x2aa3f912360 (32-bytes, EXTRACT_KEY_FROM_KEY) 635s | operation: FLAGS_ONLY 635s | params: 8-bytes@0x3ffeeff6ec0 635s | decode_to_chunk() salted IV: input "0x12cf097ad22380432ff40a5c" 635s | decode_to_chunk() output: 635s | 12 cf 09 7a d2 23 80 43 2f f4 0a 5c ...z.#.C/..\ 635s | decode_to_chunk() AAD: input "0xc783a0cca10a8d9fb8d27d69659463f2" 635s | decode_to_chunk() output: 635s | c7 83 a0 cc a1 0a 8d 9f b8 d2 7d 69 65 94 63 f2 ..........}ie.c. 635s | decode_to_chunk() plaintext: input "0x32f51e837a9748838925066d69e87180f34a6437e6b396e5643b34cb2ee4f7b1" 635s | decode_to_chunk() output: 635s | 32 f5 1e 83 7a 97 48 83 89 25 06 6d 69 e8 71 80 2...z.H..%.mi.q. 635s | f3 4a 64 37 e6 b3 96 e5 64 3b 34 cb 2e e4 f7 b1 .Jd7....d;4..... 635s | decode_to_chunk() ciphertext: input "0x8a023ba477f5b809bddcda8f55e09064d6d88aaec99c1e141212ea5b08503660" 635s | decode_to_chunk() output: 635s | 8a 02 3b a4 77 f5 b8 09 bd dc da 8f 55 e0 90 64 ..;.w.......U..d 635s | d6 d8 8a ae c9 9c 1e 14 12 12 ea 5b 08 50 36 60 ...........[.P6` 635s | decode_to_chunk() tag: input "0x562f500dae635d60a769b466e15acd1e" 635s | decode_to_chunk() output: 635s | 56 2f 50 0d ae 63 5d 60 a7 69 b4 66 e1 5a cd 1e V/P..c]`.i.f.Z.. 635s | test_gcm_vector() DECRYPT: aad-size=16 salt-size=4 wire-IV-size=8 text-size=32 tag-size=16 text+tag in: 635s | 8a 02 3b a4 77 f5 b8 09 bd dc da 8f 55 e0 90 64 ..;.w.......U..d 635s | d6 d8 8a ae c9 9c 1e 14 12 12 ea 5b 08 50 36 60 ...........[.P6` 635s | 56 2f 50 0d ae 63 5d 60 a7 69 b4 66 e1 5a cd 1e V/P..c]`.i.f.Z.. 635s | verify_bytes() two blocks with associated data: output ciphertext: ok 635s | verify_bytes() two blocks with associated data: TAG: ok 635s | test_gcm_vector() text+tag out: 635s | 32 f5 1e 83 7a 97 48 83 89 25 06 6d 69 e8 71 80 2...z.H..%.mi.q. 635s | f3 4a 64 37 e6 b3 96 e5 64 3b 34 cb 2e e4 f7 b1 .Jd7....d;4..... 635s | 56 2f 50 0d ae 63 5d 60 a7 69 b4 66 e1 5a cd 1e V/P..c]`.i.f.Z.. 635s | test_gcm_vector() ENCRYPT: aad-size=16 salt-size=4 wire-IV-size=8 text-size=32 tag-size=16 text+tag in: 635s | 32 f5 1e 83 7a 97 48 83 89 25 06 6d 69 e8 71 80 2...z.H..%.mi.q. 635s | f3 4a 64 37 e6 b3 96 e5 64 3b 34 cb 2e e4 f7 b1 .Jd7....d;4..... 635s | 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................ 635s | verify_bytes() two blocks with associated data: output ciphertext: ok 635s | verify_bytes() two blocks with associated data: TAG: ok 635s | test_gcm_vector() text+tag out: 635s | 8a 02 3b a4 77 f5 b8 09 bd dc da 8f 55 e0 90 64 ..;.w.......U..d 635s | d6 d8 8a ae c9 9c 1e 14 12 12 ea 5b 08 50 36 60 ...........[.P6` 635s | 56 2f 50 0d ae 63 5d 60 a7 69 b4 66 e1 5a cd 1e V/P..c]`.i.f.Z.. 635s ipsec algparse: testing AES_CTR: 635s ipsec algparse: Encrypting 16 octets using AES-CTR with 128-bit key 635s | decode_to_chunk() raw_key: input "0x AE 68 52 F8 12 10 67 CC 4B F7 A5 76 55 77 F3 9E" 635s | decode_to_chunk() output: 635s | ae 68 52 f8 12 10 67 cc 4b f7 a5 76 55 77 f3 9e .hR...g.K..vUw.. 635s | CONCATENATE_DATA_AND_BASE: 635s | target: EXTRACT_KEY_FROM_KEY 635s | base: base-key@0x2aa3f90f350 (16-bytes, AES_KEY_GEN) 635s | params: 16-bytes@0x3ffeeff7080 635s | key-offset: 0, key-size: 16 635s | EXTRACT_KEY_FROM_KEY: 635s | target: AES_CTR 635s | flags: ENCRYPT+DECRYPT 635s | key_size: 16-bytes 635s | base: base-key@0x2aa3f912360 (32-bytes, EXTRACT_KEY_FROM_KEY) 635s | operation: FLAGS_ONLY 635s | params: 8-bytes@0x3ffeeff6fd0 635s | decode_to_mac() input counter-block: : input "0x 00 00 00 30 00 00 00 00 00 00 00 00 00 00 00 01" 635s | decode_to_mac() output: 635s | 00 00 00 30 00 00 00 00 00 00 00 00 00 00 00 01 ...0............ 635s | decode_to_chunk() Plaintext: input "0x 53 69 6E 67 6C 65 20 62 6C 6F 63 6B 20 6D 73 67" 635s | decode_to_chunk() output: 635s | 53 69 6e 67 6c 65 20 62 6c 6f 63 6b 20 6d 73 67 Single block msg 635s | decode_to_chunk() Ciphertext: input "0x E4 09 5D 4F B7 A7 B3 79 2D 61 75 A3 26 13 11 B8" 635s | decode_to_chunk() output: 635s | e4 09 5d 4f b7 a7 b3 79 2d 61 75 a3 26 13 11 b8 ..]O...y-au.&... 635s | decode_to_chunk() expected counter-block: : input "0x 00 00 00 30 00 00 00 00 00 00 00 00 00 00 00 02" 635s | decode_to_chunk() output: 635s | 00 00 00 30 00 00 00 00 00 00 00 00 00 00 00 02 ...0............ 635s | cipher_op_ctr_nss() enter AES_CTR 0x2aa3f912d00 use IKEv1 IV wire_iv 0 count 0 635s | ctr_param: count 32 iv 00000030000000000000000000000001 635s | cipher_op_ctr_nss() counter-block updated from 0x1 to 0x2 for 16 bytes 635s | do_aes_ctr: exit 635s | cipher_op_context_destroy_ctr_nss() 635s | verify_bytes() Encrypting 16 octets using AES-CTR with 128-bit key: encrypt: ok 635s | verify_bytes() Encrypting 16 octets using AES-CTR with 128-bit key: counter-block: ok 635s | decode_to_mac() input counter-block: : input "0x 00 00 00 30 00 00 00 00 00 00 00 00 00 00 00 01" 635s | decode_to_mac() output: 635s | 00 00 00 30 00 00 00 00 00 00 00 00 00 00 00 01 ...0............ 635s | decode_to_chunk() Ciphertext: input "0x E4 09 5D 4F B7 A7 B3 79 2D 61 75 A3 26 13 11 B8" 635s | decode_to_chunk() output: 635s | e4 09 5d 4f b7 a7 b3 79 2d 61 75 a3 26 13 11 b8 ..]O...y-au.&... 635s | decode_to_chunk() Plaintext: input "0x 53 69 6E 67 6C 65 20 62 6C 6F 63 6B 20 6D 73 67" 635s | decode_to_chunk() output: 635s | 53 69 6e 67 6c 65 20 62 6c 6f 63 6b 20 6d 73 67 Single block msg 635s | decode_to_chunk() expected counter-block: : input "0x 00 00 00 30 00 00 00 00 00 00 00 00 00 00 00 02" 635s | decode_to_chunk() output: 635s | 00 00 00 30 00 00 00 00 00 00 00 00 00 00 00 02 ...0............ 635s | cipher_op_ctr_nss() enter AES_CTR 0x2aa3f912d00 use IKEv1 IV wire_iv 0 count 0 635s | ctr_param: count 32 iv 00000030000000000000000000000001 635s | cipher_op_ctr_nss() counter-block updated from 0x1 to 0x2 for 16 bytes 635s | do_aes_ctr: exit 635s | cipher_op_context_destroy_ctr_nss() 635s | verify_bytes() Encrypting 16 octets using AES-CTR with 128-bit key: decrypt: ok 635s | verify_bytes() Encrypting 16 octets using AES-CTR with 128-bit key: counter-block: ok 635s ipsec algparse: Encrypting 32 octets using AES-CTR with 128-bit key 635s | decode_to_chunk() raw_key: input "0x 7E 24 06 78 17 FA E0 D7 43 D6 CE 1F 32 53 91 63" 635s | decode_to_chunk() output: 635s | 7e 24 06 78 17 fa e0 d7 43 d6 ce 1f 32 53 91 63 ~$.x....C...2S.c 635s | CONCATENATE_DATA_AND_BASE: 635s | target: EXTRACT_KEY_FROM_KEY 635s | base: base-key@0x2aa3f90f350 (16-bytes, AES_KEY_GEN) 635s | params: 16-bytes@0x3ffeeff7080 635s | key-offset: 0, key-size: 16 635s | EXTRACT_KEY_FROM_KEY: 635s | target: AES_CTR 635s | flags: ENCRYPT+DECRYPT 635s | key_size: 16-bytes 635s | base: base-key@0x2aa3f912360 (32-bytes, EXTRACT_KEY_FROM_KEY) 635s | operation: FLAGS_ONLY 635s | params: 8-bytes@0x3ffeeff6fd0 635s | decode_to_mac() input counter-block: : input "0x 00 6C B6 DB C0 54 3B 59 DA 48 D9 0B 00 00 00 01" 635s | decode_to_mac() output: 635s | 00 6c b6 db c0 54 3b 59 da 48 d9 0b 00 00 00 01 .l...T;Y.H...... 635s | decode_to_chunk() Plaintext: input "0x00 01 02 03 04 05 06 07 08 09 0A 0B 0C 0D 0E 0F10 11 12 13 14 15 16 17 18 19 1A 1B 1C 1D 1E 1F" 635s | decode_to_chunk() output: 635s | 00 01 02 03 04 05 06 07 08 09 0a 0b 0c 0d 0e 0f ................ 635s | 10 11 12 13 14 15 16 17 18 19 1a 1b 1c 1d 1e 1f ................ 635s | decode_to_chunk() Ciphertext: input "0x51 04 A1 06 16 8A 72 D9 79 0D 41 EE 8E DA D3 88EB 2E 1E FC 46 DA 57 C8 FC E6 30 DF 91 41 BE 28" 635s | decode_to_chunk() output: 635s | 51 04 a1 06 16 8a 72 d9 79 0d 41 ee 8e da d3 88 Q.....r.y.A..... 635s | eb 2e 1e fc 46 da 57 c8 fc e6 30 df 91 41 be 28 ....F.W...0..A.( 635s | decode_to_chunk() expected counter-block: : input "0x 00 6C B6 DB C0 54 3B 59 DA 48 D9 0B 00 00 00 03" 635s | decode_to_chunk() output: 635s | 00 6c b6 db c0 54 3b 59 da 48 d9 0b 00 00 00 03 .l...T;Y.H...... 635s | cipher_op_ctr_nss() enter AES_CTR 0x2aa3f90f220 use IKEv1 IV wire_iv 0 count 0 635s | ctr_param: count 32 iv 006cb6dbc0543b59da48d90b00000001 635s | cipher_op_ctr_nss() counter-block updated from 0x1 to 0x3 for 32 bytes 635s | do_aes_ctr: exit 635s | cipher_op_context_destroy_ctr_nss() 635s | verify_bytes() Encrypting 32 octets using AES-CTR with 128-bit key: encrypt: ok 635s | verify_bytes() Encrypting 32 octets using AES-CTR with 128-bit key: counter-block: ok 635s | decode_to_mac() input counter-block: : input "0x 00 6C B6 DB C0 54 3B 59 DA 48 D9 0B 00 00 00 01" 635s | decode_to_mac() output: 635s | 00 6c b6 db c0 54 3b 59 da 48 d9 0b 00 00 00 01 .l...T;Y.H...... 635s | decode_to_chunk() Ciphertext: input "0x51 04 A1 06 16 8A 72 D9 79 0D 41 EE 8E DA D3 88EB 2E 1E FC 46 DA 57 C8 FC E6 30 DF 91 41 BE 28" 635s | decode_to_chunk() output: 635s | 51 04 a1 06 16 8a 72 d9 79 0d 41 ee 8e da d3 88 Q.....r.y.A..... 635s | eb 2e 1e fc 46 da 57 c8 fc e6 30 df 91 41 be 28 ....F.W...0..A.( 635s | decode_to_chunk() Plaintext: input "0x00 01 02 03 04 05 06 07 08 09 0A 0B 0C 0D 0E 0F10 11 12 13 14 15 16 17 18 19 1A 1B 1C 1D 1E 1F" 635s | decode_to_chunk() output: 635s | 00 01 02 03 04 05 06 07 08 09 0a 0b 0c 0d 0e 0f ................ 635s | 10 11 12 13 14 15 16 17 18 19 1a 1b 1c 1d 1e 1f ................ 635s | decode_to_chunk() expected counter-block: : input "0x 00 6C B6 DB C0 54 3B 59 DA 48 D9 0B 00 00 00 03" 635s | decode_to_chunk() output: 635s | 00 6c b6 db c0 54 3b 59 da 48 d9 0b 00 00 00 03 .l...T;Y.H...... 635s | cipher_op_ctr_nss() enter AES_CTR 0x2aa3f90f220 use IKEv1 IV wire_iv 0 count 0 635s | ctr_param: count 32 iv 006cb6dbc0543b59da48d90b00000001 635s | cipher_op_ctr_nss() counter-block updated from 0x1 to 0x3 for 32 bytes 635s | do_aes_ctr: exit 635s | cipher_op_context_destroy_ctr_nss() 635s | verify_bytes() Encrypting 32 octets using AES-CTR with 128-bit key: decrypt: ok 635s | verify_bytes() Encrypting 32 octets using AES-CTR with 128-bit key: counter-block: ok 635s ipsec algparse: Encrypting 36 octets using AES-CTR with 128-bit key 635s | decode_to_chunk() raw_key: input "0x 76 91 BE 03 5E 50 20 A8 AC 6E 61 85 29 F9 A0 DC" 635s | decode_to_chunk() output: 635s | 76 91 be 03 5e 50 20 a8 ac 6e 61 85 29 f9 a0 dc v...^P ..na.)... 635s | CONCATENATE_DATA_AND_BASE: 635s | target: EXTRACT_KEY_FROM_KEY 635s | base: base-key@0x2aa3f90f350 (16-bytes, AES_KEY_GEN) 635s | params: 16-bytes@0x3ffeeff7080 635s | key-offset: 0, key-size: 16 635s | EXTRACT_KEY_FROM_KEY: 635s | target: AES_CTR 635s | flags: ENCRYPT+DECRYPT 635s | key_size: 16-bytes 635s | base: base-key@0x2aa3f912360 (32-bytes, EXTRACT_KEY_FROM_KEY) 635s | operation: FLAGS_ONLY 635s | params: 8-bytes@0x3ffeeff6fd0 635s | decode_to_mac() input counter-block: : input "0x 00 E0 01 7B 27 77 7F 3F 4A 17 86 F0 00 00 00 01" 635s | decode_to_mac() output: 635s | 00 e0 01 7b 27 77 7f 3f 4a 17 86 f0 00 00 00 01 ...{'w.?J....... 635s | decode_to_chunk() Plaintext: input "0x00 01 02 03 04 05 06 07 08 09 0A 0B 0C 0D 0E 0F10 11 12 13 14 15 16 17 18 19 1A 1B 1C 1D 1E 1F20 21 22 23" 635s | decode_to_chunk() output: 635s | 00 01 02 03 04 05 06 07 08 09 0a 0b 0c 0d 0e 0f ................ 635s | 10 11 12 13 14 15 16 17 18 19 1a 1b 1c 1d 1e 1f ................ 635s | 20 21 22 23 !"# 635s | decode_to_chunk() Ciphertext: input "0xC1 CF 48 A8 9F 2F FD D9 CF 46 52 E9 EF DB 72 D745 40 A4 2B DE 6D 78 36 D5 9A 5C EA AE F3 10 5325 B2 07 2F" 635s | decode_to_chunk() output: 635s | c1 cf 48 a8 9f 2f fd d9 cf 46 52 e9 ef db 72 d7 ..H../...FR...r. 635s | 45 40 a4 2b de 6d 78 36 d5 9a 5c ea ae f3 10 53 E@.+.mx6..\....S 635s | 25 b2 07 2f %../ 635s | decode_to_chunk() expected counter-block: : input "0x 00 E0 01 7B 27 77 7F 3F 4A 17 86 F0 00 00 00 04" 635s | decode_to_chunk() output: 635s | 00 e0 01 7b 27 77 7f 3f 4a 17 86 f0 00 00 00 04 ...{'w.?J....... 635s | cipher_op_ctr_nss() enter AES_CTR 0x2aa3f90f080 use IKEv1 IV wire_iv 0 count 0 635s | ctr_param: count 32 iv 00e0017b27777f3f4a1786f000000001 635s | cipher_op_ctr_nss() counter-block updated from 0x1 to 0x4 for 36 bytes 635s | do_aes_ctr: exit 635s | cipher_op_context_destroy_ctr_nss() 635s | verify_bytes() Encrypting 36 octets using AES-CTR with 128-bit key: encrypt: ok 635s | verify_bytes() Encrypting 36 octets using AES-CTR with 128-bit key: counter-block: ok 635s | decode_to_mac() input counter-block: : input "0x 00 E0 01 7B 27 77 7F 3F 4A 17 86 F0 00 00 00 01" 635s | decode_to_mac() output: 635s | 00 e0 01 7b 27 77 7f 3f 4a 17 86 f0 00 00 00 01 ...{'w.?J....... 635s | decode_to_chunk() Ciphertext: input "0xC1 CF 48 A8 9F 2F FD D9 CF 46 52 E9 EF DB 72 D745 40 A4 2B DE 6D 78 36 D5 9A 5C EA AE F3 10 5325 B2 07 2F" 635s | decode_to_chunk() output: 635s | c1 cf 48 a8 9f 2f fd d9 cf 46 52 e9 ef db 72 d7 ..H../...FR...r. 635s | 45 40 a4 2b de 6d 78 36 d5 9a 5c ea ae f3 10 53 E@.+.mx6..\....S 635s | 25 b2 07 2f %../ 635s | decode_to_chunk() Plaintext: input "0x00 01 02 03 04 05 06 07 08 09 0A 0B 0C 0D 0E 0F10 11 12 13 14 15 16 17 18 19 1A 1B 1C 1D 1E 1F20 21 22 23" 635s | decode_to_chunk() output: 635s | 00 01 02 03 04 05 06 07 08 09 0a 0b 0c 0d 0e 0f ................ 635s | 10 11 12 13 14 15 16 17 18 19 1a 1b 1c 1d 1e 1f ................ 635s | 20 21 22 23 !"# 635s | decode_to_chunk() expected counter-block: : input "0x 00 E0 01 7B 27 77 7F 3F 4A 17 86 F0 00 00 00 04" 635s | decode_to_chunk() output: 635s | 00 e0 01 7b 27 77 7f 3f 4a 17 86 f0 00 00 00 04 ...{'w.?J....... 635s | cipher_op_ctr_nss() enter AES_CTR 0x2aa3f90f080 use IKEv1 IV wire_iv 0 count 0 635s | ctr_param: count 32 iv 00e0017b27777f3f4a1786f000000001 635s | cipher_op_ctr_nss() counter-block updated from 0x1 to 0x4 for 36 bytes 635s | do_aes_ctr: exit 635s | cipher_op_context_destroy_ctr_nss() 635s | verify_bytes() Encrypting 36 octets using AES-CTR with 128-bit key: decrypt: ok 635s | verify_bytes() Encrypting 36 octets using AES-CTR with 128-bit key: counter-block: ok 635s ipsec algparse: Encrypting 16 octets using AES-CTR with 192-bit key 635s | decode_to_chunk() raw_key: input "0x16 AF 5B 14 5F C9 F5 79 C1 75 F9 3E 3B FB 0E ED86 3D 06 CC FD B7 85 15" 635s | decode_to_chunk() output: 635s | 16 af 5b 14 5f c9 f5 79 c1 75 f9 3e 3b fb 0e ed ..[._..y.u.>;... 635s | 86 3d 06 cc fd b7 85 15 .=...... 635s | CONCATENATE_DATA_AND_BASE: 635s | target: EXTRACT_KEY_FROM_KEY 635s | base: base-key@0x2aa3f90f350 (16-bytes, AES_KEY_GEN) 635s | params: 16-bytes@0x3ffeeff7080 635s | key-offset: 0, key-size: 24 635s | EXTRACT_KEY_FROM_KEY: 635s | target: AES_CTR 635s | flags: ENCRYPT+DECRYPT 635s | key_size: 24-bytes 635s | base: base-key@0x2aa3f912360 (40-bytes, EXTRACT_KEY_FROM_KEY) 635s | operation: FLAGS_ONLY 635s | params: 8-bytes@0x3ffeeff6fd0 635s | decode_to_mac() input counter-block: : input "0x 00 00 00 48 36 73 3C 14 7D 6D 93 CB 00 00 00 01" 635s | decode_to_mac() output: 635s | 00 00 00 48 36 73 3c 14 7d 6d 93 cb 00 00 00 01 ...H6s<.}m...... 635s | decode_to_chunk() Plaintext: input "0x 53 69 6E 67 6C 65 20 62 6C 6F 63 6B 20 6D 73 67" 635s | decode_to_chunk() output: 635s | 53 69 6e 67 6c 65 20 62 6c 6f 63 6b 20 6d 73 67 Single block msg 635s | decode_to_chunk() Ciphertext: input "0x 4B 55 38 4F E2 59 C9 C8 4E 79 35 A0 03 CB E9 28" 635s | decode_to_chunk() output: 635s | 4b 55 38 4f e2 59 c9 c8 4e 79 35 a0 03 cb e9 28 KU8O.Y..Ny5....( 635s | decode_to_chunk() expected counter-block: : input "0x 00 00 00 48 36 73 3C 14 7D 6D 93 CB 00 00 00 02" 635s | decode_to_chunk() output: 635s | 00 00 00 48 36 73 3c 14 7d 6d 93 cb 00 00 00 02 ...H6s<.}m...... 635s | cipher_op_ctr_nss() enter AES_CTR 0x2aa3f912ce0 use IKEv1 IV wire_iv 0 count 0 635s | ctr_param: count 32 iv 0000004836733c147d6d93cb00000001 635s | cipher_op_ctr_nss() counter-block updated from 0x1 to 0x2 for 16 bytes 635s | do_aes_ctr: exit 635s | cipher_op_context_destroy_ctr_nss() 635s | verify_bytes() Encrypting 16 octets using AES-CTR with 192-bit key: encrypt: ok 635s | verify_bytes() Encrypting 16 octets using AES-CTR with 192-bit key: counter-block: ok 635s | decode_to_mac() input counter-block: : input "0x 00 00 00 48 36 73 3C 14 7D 6D 93 CB 00 00 00 01" 635s | decode_to_mac() output: 635s | 00 00 00 48 36 73 3c 14 7d 6d 93 cb 00 00 00 01 ...H6s<.}m...... 635s | decode_to_chunk() Ciphertext: input "0x 4B 55 38 4F E2 59 C9 C8 4E 79 35 A0 03 CB E9 28" 635s | decode_to_chunk() output: 635s | 4b 55 38 4f e2 59 c9 c8 4e 79 35 a0 03 cb e9 28 KU8O.Y..Ny5....( 635s | decode_to_chunk() Plaintext: input "0x 53 69 6E 67 6C 65 20 62 6C 6F 63 6B 20 6D 73 67" 635s | decode_to_chunk() output: 635s | 53 69 6e 67 6c 65 20 62 6c 6f 63 6b 20 6d 73 67 Single block msg 635s | decode_to_chunk() expected counter-block: : input "0x 00 00 00 48 36 73 3C 14 7D 6D 93 CB 00 00 00 02" 635s | decode_to_chunk() output: 635s | 00 00 00 48 36 73 3c 14 7d 6d 93 cb 00 00 00 02 ...H6s<.}m...... 635s | cipher_op_ctr_nss() enter AES_CTR 0x2aa3f912ce0 use IKEv1 IV wire_iv 0 count 0 635s | ctr_param: count 32 iv 0000004836733c147d6d93cb00000001 635s | cipher_op_ctr_nss() counter-block updated from 0x1 to 0x2 for 16 bytes 635s | do_aes_ctr: exit 635s | cipher_op_context_destroy_ctr_nss() 635s | verify_bytes() Encrypting 16 octets using AES-CTR with 192-bit key: decrypt: ok 635s | verify_bytes() Encrypting 16 octets using AES-CTR with 192-bit key: counter-block: ok 635s ipsec algparse: Encrypting 32 octets using AES-CTR with 192-bit key 635s | decode_to_chunk() raw_key: input "0x7C 5C B2 40 1B 3D C3 3C 19 E7 34 08 19 E0 F6 9C67 8C 3D B8 E6 F6 A9 1A" 635s | decode_to_chunk() output: 635s | 7c 5c b2 40 1b 3d c3 3c 19 e7 34 08 19 e0 f6 9c |\.@.=.<..4..... 635s | 67 8c 3d b8 e6 f6 a9 1a g.=..... 635s | CONCATENATE_DATA_AND_BASE: 635s | target: EXTRACT_KEY_FROM_KEY 635s | base: base-key@0x2aa3f90f350 (16-bytes, AES_KEY_GEN) 635s | params: 16-bytes@0x3ffeeff7080 635s | key-offset: 0, key-size: 24 635s | EXTRACT_KEY_FROM_KEY: 635s | target: AES_CTR 635s | flags: ENCRYPT+DECRYPT 635s | key_size: 24-bytes 635s | base: base-key@0x2aa3f912360 (40-bytes, EXTRACT_KEY_FROM_KEY) 635s | operation: FLAGS_ONLY 635s | params: 8-bytes@0x3ffeeff6fd0 635s | decode_to_mac() input counter-block: : input "0x 00 96 B0 3B 02 0C 6E AD C2 CB 50 0D 00 00 00 01" 635s | decode_to_mac() output: 635s | 00 96 b0 3b 02 0c 6e ad c2 cb 50 0d 00 00 00 01 ...;..n...P..... 635s | decode_to_chunk() Plaintext: input "0x00 01 02 03 04 05 06 07 08 09 0A 0B 0C 0D 0E 0F10 11 12 13 14 15 16 17 18 19 1A 1B 1C 1D 1E 1F" 635s | decode_to_chunk() output: 635s | 00 01 02 03 04 05 06 07 08 09 0a 0b 0c 0d 0e 0f ................ 635s | 10 11 12 13 14 15 16 17 18 19 1a 1b 1c 1d 1e 1f ................ 635s | decode_to_chunk() Ciphertext: input "0x45 32 43 FC 60 9B 23 32 7E DF AA FA 71 31 CD 9F84 90 70 1C 5A D4 A7 9C FC 1F E0 FF 42 F4 FB 00" 635s | decode_to_chunk() output: 635s | 45 32 43 fc 60 9b 23 32 7e df aa fa 71 31 cd 9f E2C.`.#2~...q1.. 635s | 84 90 70 1c 5a d4 a7 9c fc 1f e0 ff 42 f4 fb 00 ..p.Z.......B... 635s | decode_to_chunk() expected counter-block: : input "0x 00 96 B0 3B 02 0C 6E AD C2 CB 50 0D 00 00 00 03" 635s | decode_to_chunk() output: 635s | 00 96 b0 3b 02 0c 6e ad c2 cb 50 0d 00 00 00 03 ...;..n...P..... 635s | cipher_op_ctr_nss() enter AES_CTR 0x2aa3f90f080 use IKEv1 IV wire_iv 0 count 0 635s | ctr_param: count 32 iv 0096b03b020c6eadc2cb500d00000001 635s | cipher_op_ctr_nss() counter-block updated from 0x1 to 0x3 for 32 bytes 635s | do_aes_ctr: exit 635s | cipher_op_context_destroy_ctr_nss() 635s | verify_bytes() Encrypting 32 octets using AES-CTR with 192-bit key: encrypt: ok 635s | verify_bytes() Encrypting 32 octets using AES-CTR with 192-bit key: counter-block: ok 635s | decode_to_mac() input counter-block: : input "0x 00 96 B0 3B 02 0C 6E AD C2 CB 50 0D 00 00 00 01" 635s | decode_to_mac() output: 635s | 00 96 b0 3b 02 0c 6e ad c2 cb 50 0d 00 00 00 01 ...;..n...P..... 635s | decode_to_chunk() Ciphertext: input "0x45 32 43 FC 60 9B 23 32 7E DF AA FA 71 31 CD 9F84 90 70 1C 5A D4 A7 9C FC 1F E0 FF 42 F4 FB 00" 635s | decode_to_chunk() output: 635s | 45 32 43 fc 60 9b 23 32 7e df aa fa 71 31 cd 9f E2C.`.#2~...q1.. 635s | 84 90 70 1c 5a d4 a7 9c fc 1f e0 ff 42 f4 fb 00 ..p.Z.......B... 635s | decode_to_chunk() Plaintext: input "0x00 01 02 03 04 05 06 07 08 09 0A 0B 0C 0D 0E 0F10 11 12 13 14 15 16 17 18 19 1A 1B 1C 1D 1E 1F" 635s | decode_to_chunk() output: 635s | 00 01 02 03 04 05 06 07 08 09 0a 0b 0c 0d 0e 0f ................ 635s | 10 11 12 13 14 15 16 17 18 19 1a 1b 1c 1d 1e 1f ................ 635s | decode_to_chunk() expected counter-block: : input "0x 00 96 B0 3B 02 0C 6E AD C2 CB 50 0D 00 00 00 03" 635s | decode_to_chunk() output: 635s | 00 96 b0 3b 02 0c 6e ad c2 cb 50 0d 00 00 00 03 ...;..n...P..... 635s | cipher_op_ctr_nss() enter AES_CTR 0x2aa3f90f080 use IKEv1 IV wire_iv 0 count 0 635s | ctr_param: count 32 iv 0096b03b020c6eadc2cb500d00000001 635s | cipher_op_ctr_nss() counter-block updated from 0x1 to 0x3 for 32 bytes 635s | do_aes_ctr: exit 635s | cipher_op_context_destroy_ctr_nss() 635s | verify_bytes() Encrypting 32 octets using AES-CTR with 192-bit key: decrypt: ok 635s | verify_bytes() Encrypting 32 octets using AES-CTR with 192-bit key: counter-block: ok 635s ipsec algparse: Encrypting 36 octets using AES-CTR with 192-bit key 635s | decode_to_chunk() raw_key: input "0x02 BF 39 1E E8 EC B1 59 B9 59 61 7B 09 65 27 9BF5 9B 60 A7 86 D3 E0 FE" 635s | decode_to_chunk() output: 635s | 02 bf 39 1e e8 ec b1 59 b9 59 61 7b 09 65 27 9b ..9....Y.Ya{.e'. 635s | f5 9b 60 a7 86 d3 e0 fe ..`..... 635s | CONCATENATE_DATA_AND_BASE: 635s | target: EXTRACT_KEY_FROM_KEY 635s | base: base-key@0x2aa3f90f350 (16-bytes, AES_KEY_GEN) 635s | params: 16-bytes@0x3ffeeff7080 635s | key-offset: 0, key-size: 24 635s | EXTRACT_KEY_FROM_KEY: 635s | target: AES_CTR 635s | flags: ENCRYPT+DECRYPT 635s | key_size: 24-bytes 635s | base: base-key@0x2aa3f912360 (40-bytes, EXTRACT_KEY_FROM_KEY) 635s | operation: FLAGS_ONLY 635s | params: 8-bytes@0x3ffeeff6fd0 635s | decode_to_mac() input counter-block: : input "0x 00 07 BD FD 5C BD 60 27 8D CC 09 12 00 00 00 01" 635s | decode_to_mac() output: 635s | 00 07 bd fd 5c bd 60 27 8d cc 09 12 00 00 00 01 ....\.`'........ 635s | decode_to_chunk() Plaintext: input "0x00 01 02 03 04 05 06 07 08 09 0A 0B 0C 0D 0E 0F10 11 12 13 14 15 16 17 18 19 1A 1B 1C 1D 1E 1F20 21 22 23" 635s | decode_to_chunk() output: 635s | 00 01 02 03 04 05 06 07 08 09 0a 0b 0c 0d 0e 0f ................ 635s | 10 11 12 13 14 15 16 17 18 19 1a 1b 1c 1d 1e 1f ................ 635s | 20 21 22 23 !"# 635s | decode_to_chunk() Ciphertext: input "0x96 89 3F C5 5E 5C 72 2F 54 0B 7D D1 DD F7 E7 58D2 88 BC 95 C6 91 65 88 45 36 C8 11 66 2F 21 88AB EE 09 35" 635s | decode_to_chunk() output: 635s | 96 89 3f c5 5e 5c 72 2f 54 0b 7d d1 dd f7 e7 58 ..?.^\r/T.}....X 635s | d2 88 bc 95 c6 91 65 88 45 36 c8 11 66 2f 21 88 ......e.E6..f/!. 635s | ab ee 09 35 ...5 635s | decode_to_chunk() expected counter-block: : input "0x 00 07 BD FD 5C BD 60 27 8D CC 09 12 00 00 00 04" 635s | decode_to_chunk() output: 635s | 00 07 bd fd 5c bd 60 27 8d cc 09 12 00 00 00 04 ....\.`'........ 635s | cipher_op_ctr_nss() enter AES_CTR 0x2aa3f90f080 use IKEv1 IV wire_iv 0 count 0 635s | ctr_param: count 32 iv 0007bdfd5cbd60278dcc091200000001 635s | cipher_op_ctr_nss() counter-block updated from 0x1 to 0x4 for 36 bytes 635s | do_aes_ctr: exit 635s | cipher_op_context_destroy_ctr_nss() 635s | verify_bytes() Encrypting 36 octets using AES-CTR with 192-bit key: encrypt: ok 635s | verify_bytes() Encrypting 36 octets using AES-CTR with 192-bit key: counter-block: ok 635s | decode_to_mac() input counter-block: : input "0x 00 07 BD FD 5C BD 60 27 8D CC 09 12 00 00 00 01" 635s | decode_to_mac() output: 635s | 00 07 bd fd 5c bd 60 27 8d cc 09 12 00 00 00 01 ....\.`'........ 635s | decode_to_chunk() Ciphertext: input "0x96 89 3F C5 5E 5C 72 2F 54 0B 7D D1 DD F7 E7 58D2 88 BC 95 C6 91 65 88 45 36 C8 11 66 2F 21 88AB EE 09 35" 635s | decode_to_chunk() output: 635s | 96 89 3f c5 5e 5c 72 2f 54 0b 7d d1 dd f7 e7 58 ..?.^\r/T.}....X 635s | d2 88 bc 95 c6 91 65 88 45 36 c8 11 66 2f 21 88 ......e.E6..f/!. 635s | ab ee 09 35 ...5 635s | decode_to_chunk() Plaintext: input "0x00 01 02 03 04 05 06 07 08 09 0A 0B 0C 0D 0E 0F10 11 12 13 14 15 16 17 18 19 1A 1B 1C 1D 1E 1F20 21 22 23" 635s | decode_to_chunk() output: 635s | 00 01 02 03 04 05 06 07 08 09 0a 0b 0c 0d 0e 0f ................ 635s | 10 11 12 13 14 15 16 17 18 19 1a 1b 1c 1d 1e 1f ................ 635s | 20 21 22 23 !"# 635s | decode_to_chunk() expected counter-block: : input "0x 00 07 BD FD 5C BD 60 27 8D CC 09 12 00 00 00 04" 635s | decode_to_chunk() output: 635s | 00 07 bd fd 5c bd 60 27 8d cc 09 12 00 00 00 04 ....\.`'........ 635s | cipher_op_ctr_nss() enter AES_CTR 0x2aa3f90f080 use IKEv1 IV wire_iv 0 count 0 635s | ctr_param: count 32 iv 0007bdfd5cbd60278dcc091200000001 635s | cipher_op_ctr_nss() counter-block updated from 0x1 to 0x4 for 36 bytes 635s | do_aes_ctr: exit 635s | cipher_op_context_destroy_ctr_nss() 635s | verify_bytes() Encrypting 36 octets using AES-CTR with 192-bit key: decrypt: ok 635s | verify_bytes() Encrypting 36 octets using AES-CTR with 192-bit key: counter-block: ok 635s ipsec algparse: Encrypting 16 octets using AES-CTR with 256-bit key 635s | decode_to_chunk() raw_key: input "0x77 6B EF F2 85 1D B0 6F 4C 8A 05 42 C8 69 6F 6C6A 81 AF 1E EC 96 B4 D3 7F C1 D6 89 E6 C1 C1 04" 635s | decode_to_chunk() output: 635s | 77 6b ef f2 85 1d b0 6f 4c 8a 05 42 c8 69 6f 6c wk.....oL..B.iol 635s | 6a 81 af 1e ec 96 b4 d3 7f c1 d6 89 e6 c1 c1 04 j............... 635s | CONCATENATE_DATA_AND_BASE: 635s | target: EXTRACT_KEY_FROM_KEY 635s | base: base-key@0x2aa3f90f350 (16-bytes, AES_KEY_GEN) 635s | params: 16-bytes@0x3ffeeff7080 635s | key-offset: 0, key-size: 32 635s | EXTRACT_KEY_FROM_KEY: 635s | target: AES_CTR 635s | flags: ENCRYPT+DECRYPT 635s | key_size: 32-bytes 635s | base: base-key@0x2aa3f912360 (48-bytes, EXTRACT_KEY_FROM_KEY) 635s | operation: FLAGS_ONLY 635s | params: 8-bytes@0x3ffeeff6fd0 635s | decode_to_mac() input counter-block: : input "0x 00 00 00 60 DB 56 72 C9 7A A8 F0 B2 00 00 00 01" 635s | decode_to_mac() output: 635s | 00 00 00 60 db 56 72 c9 7a a8 f0 b2 00 00 00 01 ...`.Vr.z....... 635s | decode_to_chunk() Plaintext: input "0x 53 69 6E 67 6C 65 20 62 6C 6F 63 6B 20 6D 73 67" 635s | decode_to_chunk() output: 635s | 53 69 6e 67 6c 65 20 62 6c 6f 63 6b 20 6d 73 67 Single block msg 635s | decode_to_chunk() Ciphertext: input "0x 14 5A D0 1D BF 82 4E C7 56 08 63 DC 71 E3 E0 C0" 635s | decode_to_chunk() output: 635s | 14 5a d0 1d bf 82 4e c7 56 08 63 dc 71 e3 e0 c0 .Z....N.V.c.q... 635s | decode_to_chunk() expected counter-block: : input "0x 00 00 00 60 DB 56 72 C9 7A A8 F0 B2 00 00 00 02" 635s | decode_to_chunk() output: 635s | 00 00 00 60 db 56 72 c9 7a a8 f0 b2 00 00 00 02 ...`.Vr.z....... 635s | cipher_op_ctr_nss() enter AES_CTR 0x2aa3f912ce0 use IKEv1 IV wire_iv 0 count 0 635s | ctr_param: count 32 iv 00000060db5672c97aa8f0b200000001 635s | cipher_op_ctr_nss() counter-block updated from 0x1 to 0x2 for 16 bytes 635s | do_aes_ctr: exit 635s | cipher_op_context_destroy_ctr_nss() 635s | verify_bytes() Encrypting 16 octets using AES-CTR with 256-bit key: encrypt: ok 635s | verify_bytes() Encrypting 16 octets using AES-CTR with 256-bit key: counter-block: ok 635s | decode_to_mac() input counter-block: : input "0x 00 00 00 60 DB 56 72 C9 7A A8 F0 B2 00 00 00 01" 635s | decode_to_mac() output: 635s | 00 00 00 60 db 56 72 c9 7a a8 f0 b2 00 00 00 01 ...`.Vr.z....... 635s | decode_to_chunk() Ciphertext: input "0x 14 5A D0 1D BF 82 4E C7 56 08 63 DC 71 E3 E0 C0" 635s | decode_to_chunk() output: 635s | 14 5a d0 1d bf 82 4e c7 56 08 63 dc 71 e3 e0 c0 .Z....N.V.c.q... 635s | decode_to_chunk() Plaintext: input "0x 53 69 6E 67 6C 65 20 62 6C 6F 63 6B 20 6D 73 67" 635s | decode_to_chunk() output: 635s | 53 69 6e 67 6c 65 20 62 6c 6f 63 6b 20 6d 73 67 Single block msg 635s | decode_to_chunk() expected counter-block: : input "0x 00 00 00 60 DB 56 72 C9 7A A8 F0 B2 00 00 00 02" 635s | decode_to_chunk() output: 635s | 00 00 00 60 db 56 72 c9 7a a8 f0 b2 00 00 00 02 ...`.Vr.z....... 635s | cipher_op_ctr_nss() enter AES_CTR 0x2aa3f912ce0 use IKEv1 IV wire_iv 0 count 0 635s | ctr_param: count 32 iv 00000060db5672c97aa8f0b200000001 635s | cipher_op_ctr_nss() counter-block updated from 0x1 to 0x2 for 16 bytes 635s | do_aes_ctr: exit 635s | cipher_op_context_destroy_ctr_nss() 635s | verify_bytes() Encrypting 16 octets using AES-CTR with 256-bit key: decrypt: ok 635s | verify_bytes() Encrypting 16 octets using AES-CTR with 256-bit key: counter-block: ok 635s ipsec algparse: Encrypting 32 octets using AES-CTR with 256-bit key 635s | decode_to_chunk() raw_key: input "0xF6 D6 6D 6B D5 2D 59 BB 07 96 36 58 79 EF F8 86C6 6D D5 1A 5B 6A 99 74 4B 50 59 0C 87 A2 38 84" 635s | decode_to_chunk() output: 635s | f6 d6 6d 6b d5 2d 59 bb 07 96 36 58 79 ef f8 86 ..mk.-Y...6Xy... 635s | c6 6d d5 1a 5b 6a 99 74 4b 50 59 0c 87 a2 38 84 .m..[j.tKPY...8. 635s | CONCATENATE_DATA_AND_BASE: 635s | target: EXTRACT_KEY_FROM_KEY 635s | base: base-key@0x2aa3f90f350 (16-bytes, AES_KEY_GEN) 635s | params: 16-bytes@0x3ffeeff7080 635s | key-offset: 0, key-size: 32 635s | EXTRACT_KEY_FROM_KEY: 635s | target: AES_CTR 635s | flags: ENCRYPT+DECRYPT 635s | key_size: 32-bytes 635s | base: base-key@0x2aa3f912360 (48-bytes, EXTRACT_KEY_FROM_KEY) 635s | operation: FLAGS_ONLY 635s | params: 8-bytes@0x3ffeeff6fd0 635s | decode_to_mac() input counter-block: : input "0x 00 FA AC 24 C1 58 5E F1 5A 43 D8 75 00 00 00 01" 635s | decode_to_mac() output: 635s | 00 fa ac 24 c1 58 5e f1 5a 43 d8 75 00 00 00 01 ...$.X^.ZC.u.... 635s | decode_to_chunk() Plaintext: input "0x00 01 02 03 04 05 06 07 08 09 0A 0B 0C 0D 0E 0F10 11 12 13 14 15 16 17 18 19 1A 1B 1C 1D 1E 1F" 635s | decode_to_chunk() output: 635s | 00 01 02 03 04 05 06 07 08 09 0a 0b 0c 0d 0e 0f ................ 635s | 10 11 12 13 14 15 16 17 18 19 1a 1b 1c 1d 1e 1f ................ 635s | decode_to_chunk() Ciphertext: input "0xF0 5E 23 1B 38 94 61 2C 49 EE 00 0B 80 4E B2 A9B8 30 6B 50 8F 83 9D 6A 55 30 83 1D 93 44 AF 1C" 635s | decode_to_chunk() output: 635s | f0 5e 23 1b 38 94 61 2c 49 ee 00 0b 80 4e b2 a9 .^#.8.a,I....N.. 635s | b8 30 6b 50 8f 83 9d 6a 55 30 83 1d 93 44 af 1c .0kP...jU0...D.. 635s | decode_to_chunk() expected counter-block: : input "0x 00 FA AC 24 C1 58 5E F1 5A 43 D8 75 00 00 00 03" 635s | decode_to_chunk() output: 635s | 00 fa ac 24 c1 58 5e f1 5a 43 d8 75 00 00 00 03 ...$.X^.ZC.u.... 635s | cipher_op_ctr_nss() enter AES_CTR 0x2aa3f90f080 use IKEv1 IV wire_iv 0 count 0 635s | ctr_param: count 32 iv 00faac24c1585ef15a43d87500000001 635s | cipher_op_ctr_nss() counter-block updated from 0x1 to 0x3 for 32 bytes 635s | do_aes_ctr: exit 635s | cipher_op_context_destroy_ctr_nss() 635s | verify_bytes() Encrypting 32 octets using AES-CTR with 256-bit key: encrypt: ok 635s | verify_bytes() Encrypting 32 octets using AES-CTR with 256-bit key: counter-block: ok 635s | decode_to_mac() input counter-block: : input "0x 00 FA AC 24 C1 58 5E F1 5A 43 D8 75 00 00 00 01" 635s | decode_to_mac() output: 635s | 00 fa ac 24 c1 58 5e f1 5a 43 d8 75 00 00 00 01 ...$.X^.ZC.u.... 635s | decode_to_chunk() Ciphertext: input "0xF0 5E 23 1B 38 94 61 2C 49 EE 00 0B 80 4E B2 A9B8 30 6B 50 8F 83 9D 6A 55 30 83 1D 93 44 AF 1C" 635s | decode_to_chunk() output: 635s | f0 5e 23 1b 38 94 61 2c 49 ee 00 0b 80 4e b2 a9 .^#.8.a,I....N.. 635s | b8 30 6b 50 8f 83 9d 6a 55 30 83 1d 93 44 af 1c .0kP...jU0...D.. 635s | decode_to_chunk() Plaintext: input "0x00 01 02 03 04 05 06 07 08 09 0A 0B 0C 0D 0E 0F10 11 12 13 14 15 16 17 18 19 1A 1B 1C 1D 1E 1F" 635s | decode_to_chunk() output: 635s | 00 01 02 03 04 05 06 07 08 09 0a 0b 0c 0d 0e 0f ................ 635s | 10 11 12 13 14 15 16 17 18 19 1a 1b 1c 1d 1e 1f ................ 635s | decode_to_chunk() expected counter-block: : input "0x 00 FA AC 24 C1 58 5E F1 5A 43 D8 75 00 00 00 03" 635s | decode_to_chunk() output: 635s | 00 fa ac 24 c1 58 5e f1 5a 43 d8 75 00 00 00 03 ...$.X^.ZC.u.... 635s | cipher_op_ctr_nss() enter AES_CTR 0x2aa3f90f080 use IKEv1 IV wire_iv 0 count 0 635s | ctr_param: count 32 iv 00faac24c1585ef15a43d87500000001 635s | cipher_op_ctr_nss() counter-block updated from 0x1 to 0x3 for 32 bytes 635s | do_aes_ctr: exit 635s | cipher_op_context_destroy_ctr_nss() 635s | verify_bytes() Encrypting 32 octets using AES-CTR with 256-bit key: decrypt: ok 635s | verify_bytes() Encrypting 32 octets using AES-CTR with 256-bit key: counter-block: ok 635s ipsec algparse: Encrypting 36 octets using AES-CTR with 256-bit key 635s | decode_to_chunk() raw_key: input "0xFF 7A 61 7C E6 91 48 E4 F1 72 6E 2F 43 58 1D E2AA 62 D9 F8 05 53 2E DF F1 EE D6 87 FB 54 15 3D" 635s | decode_to_chunk() output: 635s | ff 7a 61 7c e6 91 48 e4 f1 72 6e 2f 43 58 1d e2 .za|..H..rn/CX.. 635s | aa 62 d9 f8 05 53 2e df f1 ee d6 87 fb 54 15 3d .b...S.......T.= 635s | CONCATENATE_DATA_AND_BASE: 635s | target: EXTRACT_KEY_FROM_KEY 635s | base: base-key@0x2aa3f90f350 (16-bytes, AES_KEY_GEN) 635s | params: 16-bytes@0x3ffeeff7080 635s | key-offset: 0, key-size: 32 635s | EXTRACT_KEY_FROM_KEY: 635s | target: AES_CTR 635s | flags: ENCRYPT+DECRYPT 635s | key_size: 32-bytes 635s | base: base-key@0x2aa3f912360 (48-bytes, EXTRACT_KEY_FROM_KEY) 635s | operation: FLAGS_ONLY 635s | params: 8-bytes@0x3ffeeff6fd0 635s | decode_to_mac() input counter-block: : input "0x 00 1C C5 B7 51 A5 1D 70 A1 C1 11 48 00 00 00 01" 635s | decode_to_mac() output: 635s | 00 1c c5 b7 51 a5 1d 70 a1 c1 11 48 00 00 00 01 ....Q..p...H.... 635s | decode_to_chunk() Plaintext: input "0x00 01 02 03 04 05 06 07 08 09 0A 0B 0C 0D 0E 0F10 11 12 13 14 15 16 17 18 19 1A 1B 1C 1D 1E 1F20 21 22 23" 635s | decode_to_chunk() output: 635s | 00 01 02 03 04 05 06 07 08 09 0a 0b 0c 0d 0e 0f ................ 635s | 10 11 12 13 14 15 16 17 18 19 1a 1b 1c 1d 1e 1f ................ 635s | 20 21 22 23 !"# 635s | decode_to_chunk() Ciphertext: input "0xEB 6C 52 82 1D 0B BB F7 CE 75 94 46 2A CA 4F AAB4 07 DF 86 65 69 FD 07 F4 8C C0 B5 83 D6 07 1F1E C0 E6 B8" 635s | decode_to_chunk() output: 635s | eb 6c 52 82 1d 0b bb f7 ce 75 94 46 2a ca 4f aa .lR......u.F*.O. 635s | b4 07 df 86 65 69 fd 07 f4 8c c0 b5 83 d6 07 1f ....ei.......... 635s | 1e c0 e6 b8 .... 635s | decode_to_chunk() expected counter-block: : input "0x 00 1C C5 B7 51 A5 1D 70 A1 C1 11 48 00 00 00 04" 635s | decode_to_chunk() output: 635s | 00 1c c5 b7 51 a5 1d 70 a1 c1 11 48 00 00 00 04 ....Q..p...H.... 635s | cipher_op_ctr_nss() enter AES_CTR 0x2aa3f90f080 use IKEv1 IV wire_iv 0 count 0 635s | ctr_param: count 32 iv 001cc5b751a51d70a1c1114800000001 635s | cipher_op_ctr_nss() counter-block updated from 0x1 to 0x4 for 36 bytes 635s | do_aes_ctr: exit 635s | cipher_op_context_destroy_ctr_nss() 635s | verify_bytes() Encrypting 36 octets using AES-CTR with 256-bit key: encrypt: ok 635s | verify_bytes() Encrypting 36 octets using AES-CTR with 256-bit key: counter-block: ok 635s | decode_to_mac() input counter-block: : input "0x 00 1C C5 B7 51 A5 1D 70 A1 C1 11 48 00 00 00 01" 635s | decode_to_mac() output: 635s | 00 1c c5 b7 51 a5 1d 70 a1 c1 11 48 00 00 00 01 ....Q..p...H.... 635s | decode_to_chunk() Ciphertext: input "0xEB 6C 52 82 1D 0B BB F7 CE 75 94 46 2A CA 4F AAB4 07 DF 86 65 69 FD 07 F4 8C C0 B5 83 D6 07 1F1E C0 E6 B8" 635s | decode_to_chunk() output: 635s | eb 6c 52 82 1d 0b bb f7 ce 75 94 46 2a ca 4f aa .lR......u.F*.O. 635s | b4 07 df 86 65 69 fd 07 f4 8c c0 b5 83 d6 07 1f ....ei.......... 635s | 1e c0 e6 b8 .... 635s | decode_to_chunk() Plaintext: input "0x00 01 02 03 04 05 06 07 08 09 0A 0B 0C 0D 0E 0F10 11 12 13 14 15 16 17 18 19 1A 1B 1C 1D 1E 1F20 21 22 23" 635s | decode_to_chunk() output: 635s | 00 01 02 03 04 05 06 07 08 09 0a 0b 0c 0d 0e 0f ................ 635s | 10 11 12 13 14 15 16 17 18 19 1a 1b 1c 1d 1e 1f ................ 635s | 20 21 22 23 !"# 635s | decode_to_chunk() expected counter-block: : input "0x 00 1C C5 B7 51 A5 1D 70 A1 C1 11 48 00 00 00 04" 635s | decode_to_chunk() output: 635s | 00 1c c5 b7 51 a5 1d 70 a1 c1 11 48 00 00 00 04 ....Q..p...H.... 635s | cipher_op_ctr_nss() enter AES_CTR 0x2aa3f90f080 use IKEv1 IV wire_iv 0 count 0 635s | ctr_param: count 32 iv 001cc5b751a51d70a1c1114800000001 635s | cipher_op_ctr_nss() counter-block updated from 0x1 to 0x4 for 36 bytes 635s | do_aes_ctr: exit 635s | cipher_op_context_destroy_ctr_nss() 635s | verify_bytes() Encrypting 36 octets using AES-CTR with 256-bit key: decrypt: ok 635s | verify_bytes() Encrypting 36 octets using AES-CTR with 256-bit key: counter-block: ok 635s ipsec algparse: testing AES_CBC: 635s ipsec algparse: Encrypting 16 bytes (1 block) using AES-CBC with 128-bit key 635s | decode_to_chunk() raw_key: input "0x06a9214036b8a15b512e03d534120006" 635s | decode_to_chunk() output: 635s | 06 a9 21 40 36 b8 a1 5b 51 2e 03 d5 34 12 00 06 ..!@6..[Q...4... 635s | CONCATENATE_DATA_AND_BASE: 635s | target: EXTRACT_KEY_FROM_KEY 635s | base: base-key@0x2aa3f90f350 (16-bytes, AES_KEY_GEN) 635s | params: 16-bytes@0x3ffeeff7088 635s | key-offset: 0, key-size: 16 635s | EXTRACT_KEY_FROM_KEY: 635s | target: AES_CBC 635s | flags: ENCRYPT+DECRYPT 635s | key_size: 16-bytes 635s | base: base-key@0x2aa3f912360 (32-bytes, EXTRACT_KEY_FROM_KEY) 635s | operation: FLAGS_ONLY 635s | params: 8-bytes@0x3ffeeff6fd8 635s | decode_to_mac() IV: : input "0x3dafba429d9eb430b422da802c9fac41" 635s | decode_to_mac() output: 635s | 3d af ba 42 9d 9e b4 30 b4 22 da 80 2c 9f ac 41 =..B...0."..,..A 635s | decode_to_chunk() new IV: : input "0xe353779c1079aeb82708942dbe77181a" 635s | decode_to_chunk() output: 635s | e3 53 77 9c 10 79 ae b8 27 08 94 2d be 77 18 1a .Sw..y..'..-.w.. 635s | decode_to_chunk() plaintext: : input "Single block msg" 635s | decode_to_chunk() output: 635s | 53 69 6e 67 6c 65 20 62 6c 6f 63 6b 20 6d 73 67 Single block msg 635s | decode_to_chunk() ciphertext: : input "0xe353779c1079aeb82708942dbe77181a" 635s | decode_to_chunk() output: 635s | e3 53 77 9c 10 79 ae b8 27 08 94 2d be 77 18 1a .Sw..y..'..-.w.. 635s | NSS ike_alg_nss_cbc: AES_CBC - enter (nil) 635s | using IKEv1 IV 635s | NSS ike_alg_nss_cbc: AES_CBC - exit 635s | verify_bytes() Encrypting 16 bytes (1 block) using AES-CBC with 128-bit key: encrypt: ok 635s | verify_bytes() Encrypting 16 bytes (1 block) using AES-CBC with 128-bit key: updated CBC IV: ok 635s | decode_to_mac() IV: : input "0x3dafba429d9eb430b422da802c9fac41" 635s | decode_to_mac() output: 635s | 3d af ba 42 9d 9e b4 30 b4 22 da 80 2c 9f ac 41 =..B...0."..,..A 635s | decode_to_chunk() new IV: : input "0xe353779c1079aeb82708942dbe77181a" 635s | decode_to_chunk() output: 635s | e3 53 77 9c 10 79 ae b8 27 08 94 2d be 77 18 1a .Sw..y..'..-.w.. 635s | decode_to_chunk() ciphertext: : input "0xe353779c1079aeb82708942dbe77181a" 635s | decode_to_chunk() output: 635s | e3 53 77 9c 10 79 ae b8 27 08 94 2d be 77 18 1a .Sw..y..'..-.w.. 635s | decode_to_chunk() plaintext: : input "Single block msg" 635s | decode_to_chunk() output: 635s | 53 69 6e 67 6c 65 20 62 6c 6f 63 6b 20 6d 73 67 Single block msg 635s | NSS ike_alg_nss_cbc: AES_CBC - enter (nil) 635s | using IKEv1 IV 635s | NSS ike_alg_nss_cbc: AES_CBC - exit 635s | verify_bytes() Encrypting 16 bytes (1 block) using AES-CBC with 128-bit key: decrypt: ok 635s | verify_bytes() Encrypting 16 bytes (1 block) using AES-CBC with 128-bit key: updated CBC IV: ok 635s ipsec algparse: Encrypting 32 bytes (2 blocks) using AES-CBC with 128-bit key 635s | decode_to_chunk() raw_key: input "0xc286696d887c9aa0611bbb3e2025a45a" 635s | decode_to_chunk() output: 635s | c2 86 69 6d 88 7c 9a a0 61 1b bb 3e 20 25 a4 5a ..im.|..a..> %.Z 635s | CONCATENATE_DATA_AND_BASE: 635s | target: EXTRACT_KEY_FROM_KEY 635s | base: base-key@0x2aa3f90f350 (16-bytes, AES_KEY_GEN) 635s | params: 16-bytes@0x3ffeeff7088 635s | key-offset: 0, key-size: 16 635s | EXTRACT_KEY_FROM_KEY: 635s | target: AES_CBC 635s | flags: ENCRYPT+DECRYPT 635s | key_size: 16-bytes 635s | base: base-key@0x2aa3f912360 (32-bytes, EXTRACT_KEY_FROM_KEY) 635s | operation: FLAGS_ONLY 635s | params: 8-bytes@0x3ffeeff6fd8 635s | decode_to_mac() IV: : input "0x562e17996d093d28ddb3ba695a2e6f58" 635s | decode_to_mac() output: 635s | 56 2e 17 99 6d 09 3d 28 dd b3 ba 69 5a 2e 6f 58 V...m.=(...iZ.oX 635s | decode_to_chunk() new IV: : input "0xd296cd94c2cccf8a3a863028b5e1dc0a7586602d253cfff91b8266bea6d61ab1" 635s | decode_to_chunk() output: 635s | d2 96 cd 94 c2 cc cf 8a 3a 86 30 28 b5 e1 dc 0a ........:.0(.... 635s | 75 86 60 2d 25 3c ff f9 1b 82 66 be a6 d6 1a b1 u.`-%<....f..... 635s | decode_to_chunk() plaintext: : input "0x000102030405060708090a0b0c0d0e0f101112131415161718191a1b1c1d1e1f" 635s | decode_to_chunk() output: 635s | 00 01 02 03 04 05 06 07 08 09 0a 0b 0c 0d 0e 0f ................ 635s | 10 11 12 13 14 15 16 17 18 19 1a 1b 1c 1d 1e 1f ................ 635s | decode_to_chunk() ciphertext: : input "0xd296cd94c2cccf8a3a863028b5e1dc0a7586602d253cfff91b8266bea6d61ab1" 635s | decode_to_chunk() output: 635s | d2 96 cd 94 c2 cc cf 8a 3a 86 30 28 b5 e1 dc 0a ........:.0(.... 635s | 75 86 60 2d 25 3c ff f9 1b 82 66 be a6 d6 1a b1 u.`-%<....f..... 635s | NSS ike_alg_nss_cbc: AES_CBC - enter (nil) 635s | using IKEv1 IV 635s | NSS ike_alg_nss_cbc: AES_CBC - exit 635s | verify_bytes() Encrypting 32 bytes (2 blocks) using AES-CBC with 128-bit key: encrypt: ok 635s | verify_bytes() Encrypting 32 bytes (2 blocks) using AES-CBC with 128-bit key: updated CBC IV: ok 635s | decode_to_mac() IV: : input "0x562e17996d093d28ddb3ba695a2e6f58" 635s | decode_to_mac() output: 635s | 56 2e 17 99 6d 09 3d 28 dd b3 ba 69 5a 2e 6f 58 V...m.=(...iZ.oX 635s | decode_to_chunk() new IV: : input "0xd296cd94c2cccf8a3a863028b5e1dc0a7586602d253cfff91b8266bea6d61ab1" 635s | decode_to_chunk() output: 635s | d2 96 cd 94 c2 cc cf 8a 3a 86 30 28 b5 e1 dc 0a ........:.0(.... 635s | 75 86 60 2d 25 3c ff f9 1b 82 66 be a6 d6 1a b1 u.`-%<....f..... 635s | decode_to_chunk() ciphertext: : input "0xd296cd94c2cccf8a3a863028b5e1dc0a7586602d253cfff91b8266bea6d61ab1" 635s | decode_to_chunk() output: 635s | d2 96 cd 94 c2 cc cf 8a 3a 86 30 28 b5 e1 dc 0a ........:.0(.... 635s | 75 86 60 2d 25 3c ff f9 1b 82 66 be a6 d6 1a b1 u.`-%<....f..... 635s | decode_to_chunk() plaintext: : input "0x000102030405060708090a0b0c0d0e0f101112131415161718191a1b1c1d1e1f" 635s | decode_to_chunk() output: 635s | 00 01 02 03 04 05 06 07 08 09 0a 0b 0c 0d 0e 0f ................ 635s | 10 11 12 13 14 15 16 17 18 19 1a 1b 1c 1d 1e 1f ................ 635s | NSS ike_alg_nss_cbc: AES_CBC - enter (nil) 635s | using IKEv1 IV 635s | NSS ike_alg_nss_cbc: AES_CBC - exit 635s | verify_bytes() Encrypting 32 bytes (2 blocks) using AES-CBC with 128-bit key: decrypt: ok 635s | verify_bytes() Encrypting 32 bytes (2 blocks) using AES-CBC with 128-bit key: updated CBC IV: ok 635s ipsec algparse: Encrypting 48 bytes (3 blocks) using AES-CBC with 128-bit key 635s | decode_to_chunk() raw_key: input "0x6c3ea0477630ce21a2ce334aa746c2cd" 635s | decode_to_chunk() output: 635s | 6c 3e a0 47 76 30 ce 21 a2 ce 33 4a a7 46 c2 cd l>.Gv0.!..3J.F.. 635s | CONCATENATE_DATA_AND_BASE: 635s | target: EXTRACT_KEY_FROM_KEY 635s | base: base-key@0x2aa3f90f350 (16-bytes, AES_KEY_GEN) 635s | params: 16-bytes@0x3ffeeff7088 635s | key-offset: 0, key-size: 16 635s | EXTRACT_KEY_FROM_KEY: 635s | target: AES_CBC 635s | flags: ENCRYPT+DECRYPT 635s | key_size: 16-bytes 635s | base: base-key@0x2aa3f912360 (32-bytes, EXTRACT_KEY_FROM_KEY) 635s | operation: FLAGS_ONLY 635s | params: 8-bytes@0x3ffeeff6fd8 635s | decode_to_mac() IV: : input "0xc782dc4c098c66cbd9cd27d825682c81" 635s | decode_to_mac() output: 635s | c7 82 dc 4c 09 8c 66 cb d9 cd 27 d8 25 68 2c 81 ...L..f...'.%h,. 635s | decode_to_chunk() new IV: : input "0xd0a02b3836451753d493665d33f0e8862dea54cdb293abc7506939276772f8d5021c19216bad525c8579695d83ba2684" 635s | decode_to_chunk() output: 635s | d0 a0 2b 38 36 45 17 53 d4 93 66 5d 33 f0 e8 86 ..+86E.S..f]3... 635s | 2d ea 54 cd b2 93 ab c7 50 69 39 27 67 72 f8 d5 -.T.....Pi9'gr.. 635s | 02 1c 19 21 6b ad 52 5c 85 79 69 5d 83 ba 26 84 ...!k.R\.yi]..&. 635s | decode_to_chunk() plaintext: : input "This is a 48-byte message (exactly 3 AES blocks)" 635s | decode_to_chunk() output: 635s | 54 68 69 73 20 69 73 20 61 20 34 38 2d 62 79 74 This is a 48-byt 635s | 65 20 6d 65 73 73 61 67 65 20 28 65 78 61 63 74 e message (exact 635s | 6c 79 20 33 20 41 45 53 20 62 6c 6f 63 6b 73 29 ly 3 AES blocks) 635s | decode_to_chunk() ciphertext: : input "0xd0a02b3836451753d493665d33f0e8862dea54cdb293abc7506939276772f8d5021c19216bad525c8579695d83ba2684" 635s | decode_to_chunk() output: 635s | d0 a0 2b 38 36 45 17 53 d4 93 66 5d 33 f0 e8 86 ..+86E.S..f]3... 635s | 2d ea 54 cd b2 93 ab c7 50 69 39 27 67 72 f8 d5 -.T.....Pi9'gr.. 635s | 02 1c 19 21 6b ad 52 5c 85 79 69 5d 83 ba 26 84 ...!k.R\.yi]..&. 635s | NSS ike_alg_nss_cbc: AES_CBC - enter (nil) 635s | using IKEv1 IV 635s | NSS ike_alg_nss_cbc: AES_CBC - exit 635s | verify_bytes() Encrypting 48 bytes (3 blocks) using AES-CBC with 128-bit key: encrypt: ok 635s | verify_bytes() Encrypting 48 bytes (3 blocks) using AES-CBC with 128-bit key: updated CBC IV: ok 635s | decode_to_mac() IV: : input "0xc782dc4c098c66cbd9cd27d825682c81" 635s | decode_to_mac() output: 635s | c7 82 dc 4c 09 8c 66 cb d9 cd 27 d8 25 68 2c 81 ...L..f...'.%h,. 635s | decode_to_chunk() new IV: : input "0xd0a02b3836451753d493665d33f0e8862dea54cdb293abc7506939276772f8d5021c19216bad525c8579695d83ba2684" 635s | decode_to_chunk() output: 635s | d0 a0 2b 38 36 45 17 53 d4 93 66 5d 33 f0 e8 86 ..+86E.S..f]3... 635s | 2d ea 54 cd b2 93 ab c7 50 69 39 27 67 72 f8 d5 -.T.....Pi9'gr.. 635s | 02 1c 19 21 6b ad 52 5c 85 79 69 5d 83 ba 26 84 ...!k.R\.yi]..&. 635s | decode_to_chunk() ciphertext: : input "0xd0a02b3836451753d493665d33f0e8862dea54cdb293abc7506939276772f8d5021c19216bad525c8579695d83ba2684" 635s | decode_to_chunk() output: 635s | d0 a0 2b 38 36 45 17 53 d4 93 66 5d 33 f0 e8 86 ..+86E.S..f]3... 635s | 2d ea 54 cd b2 93 ab c7 50 69 39 27 67 72 f8 d5 -.T.....Pi9'gr.. 635s | 02 1c 19 21 6b ad 52 5c 85 79 69 5d 83 ba 26 84 ...!k.R\.yi]..&. 635s | decode_to_chunk() plaintext: : input "This is a 48-byte message (exactly 3 AES blocks)" 635s | decode_to_chunk() output: 635s | 54 68 69 73 20 69 73 20 61 20 34 38 2d 62 79 74 This is a 48-byt 635s | 65 20 6d 65 73 73 61 67 65 20 28 65 78 61 63 74 e message (exact 635s | 6c 79 20 33 20 41 45 53 20 62 6c 6f 63 6b 73 29 ly 3 AES blocks) 635s | NSS ike_alg_nss_cbc: AES_CBC - enter (nil) 635s | using IKEv1 IV 635s | NSS ike_alg_nss_cbc: AES_CBC - exit 635s | verify_bytes() Encrypting 48 bytes (3 blocks) using AES-CBC with 128-bit key: decrypt: ok 635s | verify_bytes() Encrypting 48 bytes (3 blocks) using AES-CBC with 128-bit key: updated CBC IV: ok 635s ipsec algparse: Encrypting 64 bytes (4 blocks) using AES-CBC with 128-bit key 635s | decode_to_chunk() raw_key: input "0x56e47a38c5598974bc46903dba290349" 635s | decode_to_chunk() output: 635s | 56 e4 7a 38 c5 59 89 74 bc 46 90 3d ba 29 03 49 V.z8.Y.t.F.=.).I 635s | CONCATENATE_DATA_AND_BASE: 635s | target: EXTRACT_KEY_FROM_KEY 635s | base: base-key@0x2aa3f90f350 (16-bytes, AES_KEY_GEN) 635s | params: 16-bytes@0x3ffeeff7088 635s | key-offset: 0, key-size: 16 635s | EXTRACT_KEY_FROM_KEY: 635s | target: AES_CBC 635s | flags: ENCRYPT+DECRYPT 635s | key_size: 16-bytes 635s | base: base-key@0x2aa3f912360 (32-bytes, EXTRACT_KEY_FROM_KEY) 635s | operation: FLAGS_ONLY 635s | params: 8-bytes@0x3ffeeff6fd8 635s | decode_to_mac() IV: : input "0x8ce82eefbea0da3c44699ed7db51b7d9" 635s | decode_to_mac() output: 635s | 8c e8 2e ef be a0 da 3c 44 69 9e d7 db 51 b7 d9 ...........U 635s | decode_to_chunk() plaintext: : input "0xa0a1a2a3a4a5a6a7a8a9aaabacadaeafb0b1b2b3b4b5b6b7b8b9babbbcbdbebfc0c1c2c3c4c5c6c7c8c9cacbcccdcecfd0d1d2d3d4d5d6d7d8d9dadbdcdddedf" 635s | decode_to_chunk() output: 635s | a0 a1 a2 a3 a4 a5 a6 a7 a8 a9 aa ab ac ad ae af ................ 635s | b0 b1 b2 b3 b4 b5 b6 b7 b8 b9 ba bb bc bd be bf ................ 635s | c0 c1 c2 c3 c4 c5 c6 c7 c8 c9 ca cb cc cd ce cf ................ 635s | d0 d1 d2 d3 d4 d5 d6 d7 d8 d9 da db dc dd de df ................ 635s | decode_to_chunk() ciphertext: : input "0xc30e32ffedc0774e6aff6af0869f71aa0f3af07a9a31a9c684db207eb0ef8e4e35907aa632c3ffdf868bb7b29d3d46ad83ce9f9a102ee99d49a53e87f4c3da55" 635s | decode_to_chunk() output: 635s | c3 0e 32 ff ed c0 77 4e 6a ff 6a f0 86 9f 71 aa ..2...wNj.j...q. 635s | 0f 3a f0 7a 9a 31 a9 c6 84 db 20 7e b0 ef 8e 4e .:.z.1.... ~...N 635s | 35 90 7a a6 32 c3 ff df 86 8b b7 b2 9d 3d 46 ad 5.z.2........=F. 635s | 83 ce 9f 9a 10 2e e9 9d 49 a5 3e 87 f4 c3 da 55 ........I.>....U 635s | NSS ike_alg_nss_cbc: AES_CBC - enter (nil) 635s | using IKEv1 IV 635s | NSS ike_alg_nss_cbc: AES_CBC - exit 635s | verify_bytes() Encrypting 64 bytes (4 blocks) using AES-CBC with 128-bit key: encrypt: ok 635s | verify_bytes() Encrypting 64 bytes (4 blocks) using AES-CBC with 128-bit key: updated CBC IV: ok 635s | decode_to_mac() IV: : input "0x8ce82eefbea0da3c44699ed7db51b7d9" 635s | decode_to_mac() output: 635s | 8c e8 2e ef be a0 da 3c 44 69 9e d7 db 51 b7 d9 ...........U 635s | decode_to_chunk() ciphertext: : input "0xc30e32ffedc0774e6aff6af0869f71aa0f3af07a9a31a9c684db207eb0ef8e4e35907aa632c3ffdf868bb7b29d3d46ad83ce9f9a102ee99d49a53e87f4c3da55" 635s | decode_to_chunk() output: 635s | c3 0e 32 ff ed c0 77 4e 6a ff 6a f0 86 9f 71 aa ..2...wNj.j...q. 635s | 0f 3a f0 7a 9a 31 a9 c6 84 db 20 7e b0 ef 8e 4e .:.z.1.... ~...N 635s | 35 90 7a a6 32 c3 ff df 86 8b b7 b2 9d 3d 46 ad 5.z.2........=F. 635s | 83 ce 9f 9a 10 2e e9 9d 49 a5 3e 87 f4 c3 da 55 ........I.>....U 635s | decode_to_chunk() plaintext: : input "0xa0a1a2a3a4a5a6a7a8a9aaabacadaeafb0b1b2b3b4b5b6b7b8b9babbbcbdbebfc0c1c2c3c4c5c6c7c8c9cacbcccdcecfd0d1d2d3d4d5d6d7d8d9dadbdcdddedf" 635s | decode_to_chunk() output: 635s | a0 a1 a2 a3 a4 a5 a6 a7 a8 a9 aa ab ac ad ae af ................ 635s | b0 b1 b2 b3 b4 b5 b6 b7 b8 b9 ba bb bc bd be bf ................ 635s | c0 c1 c2 c3 c4 c5 c6 c7 c8 c9 ca cb cc cd ce cf ................ 635s | d0 d1 d2 d3 d4 d5 d6 d7 d8 d9 da db dc dd de df ................ 635s | NSS ike_alg_nss_cbc: AES_CBC - enter (nil) 635s | using IKEv1 IV 635s | NSS ike_alg_nss_cbc: AES_CBC - exit 635s | verify_bytes() Encrypting 64 bytes (4 blocks) using AES-CBC with 128-bit key: decrypt: ok 635s | verify_bytes() Encrypting 64 bytes (4 blocks) using AES-CBC with 128-bit key: updated CBC IV: ok 635s ipsec algparse: testing AES_XCBC: 635s ipsec algparse: RFC 3566 Test Case 1: AES-XCBC-MAC-96 with 0-byte input 635s | decode_to_chunk() test_prf_vector: input "0x000102030405060708090a0b0c0d0e0f" 635s | decode_to_chunk() output: 635s | 00 01 02 03 04 05 06 07 08 09 0a 0b 0c 0d 0e 0f ................ 635s | decode_to_chunk() test_prf_vector: input "" 635s | decode_to_chunk() output: 635s | 635s | decode_to_chunk() test_prf_vector: input "0x75f0251d528ac01c4573dfd584d79f29" 635s | decode_to_chunk() output: 635s | 75 f0 25 1d 52 8a c0 1c 45 73 df d5 84 d7 9f 29 u.%.R...Es.....) 635s | PRF chunk interface PRF AES_XCBC init key hunk 0x2aa3f912690 (length 16) 635s | 00 01 02 03 04 05 06 07 08 09 0a 0b 0c 0d 0e 0f ................ 635s | CONCATENATE_DATA_AND_BASE: 635s | target: EXTRACT_KEY_FROM_KEY 635s | base: base-key@0x2aa3f90f350 (16-bytes, AES_KEY_GEN) 635s | params: 16-bytes@0x3ffeeff6f90 635s | key-offset: 0, key-size: 16 635s | EXTRACT_KEY_FROM_KEY: 635s | target: EXTRACT_KEY_FROM_KEY 635s | key_size: 16-bytes 635s | base: base-key@0x2aa3f912360 (32-bytes, EXTRACT_KEY_FROM_KEY) 635s | operation: FLAGS_ONLY 635s | params: 8-bytes@0x3ffeeff6ea0 635s | XCBC: Key 16=16 just right 635s | key-offset: 0, key-size: 16 635s | EXTRACT_KEY_FROM_KEY: 635s | target: AES_ECB 635s | flags: SIGN 635s | key_size: 16-bytes 635s | base: base-key@0x2aa3f910c70 (16-bytes, EXTRACT_KEY_FROM_KEY) 635s | operation: FLAGS_ONLY 635s | params: 8-bytes@0x3ffeeff6e50 635s | PRF chunk interface PRF AES_XCBC 0x2aa3f90f2f0 635s | PRF chunk interface PRF AES_XCBC update message (0x2aa3f910ba0 length 0) 635s | 635s | XCBC: data 635s | 635s | K extracting all 16 bytes of key@0x2aa3f912360 635s | K: symkey-key@0x2aa3f912360 (16-bytes, AES_ECB) 635s | sizeof bytes 16 635s | wrapper: (SECItemType)1111695477: cd c8 2d 15 00 b6 fa ec 42 85 22 53 10 74 03 62 635s | K extracted len 16 bytes at 0x2aa3f912f20 635s | unwrapped: 635s | 00 01 02 03 04 05 06 07 08 09 0a 0b 0c 0d 0e 0f ................ 635s | XCBC: K: 635s | 00 01 02 03 04 05 06 07 08 09 0a 0b 0c 0d 0e 0f ................ 635s | XCBC: K1 635s | c3 52 80 57 54 23 7f 31 1a c0 ff f4 e3 e0 3e 78 .R.WT#.1......>x 635s | CONCATENATE_DATA_AND_BASE: 635s | target: EXTRACT_KEY_FROM_KEY 635s | base: base-key@0x2aa3f90f350 (16-bytes, AES_KEY_GEN) 635s | params: 16-bytes@0x3ffeeff6d28 635s | key-offset: 0, key-size: 16 635s | EXTRACT_KEY_FROM_KEY: 635s | target: AES_ECB 635s | flags: SIGN 635s | key_size: 16-bytes 635s | base: base-key@0x2aa3f9130b0 (32-bytes, EXTRACT_KEY_FROM_KEY) 635s | operation: FLAGS_ONLY 635s | params: 8-bytes@0x3ffeeff6d30 635s | Computing E[0] using K3 635s | XCBC: K3 635s | c1 a7 ab a1 a2 3a 94 06 58 07 a0 8c c8 ee d0 6e .....:..X......n 635s | XCBC: E[n-1] 635s | 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................ 635s | XCBC: M[n] 635s | 635s | XCBC: M[n] 635s | 635s | XCBC: M[n]:80...^E[n-1]^K3 635s | 41 a7 ab a1 a2 3a 94 06 58 07 a0 8c c8 ee d0 6e A....:..X......n 635s | XCBC: MAC 635s | 75 f0 25 1d 52 8a c0 1c 45 73 df d5 84 d7 9f 29 u.%.R...Es.....) 635s | PRF chunk interface PRF AES_XCBC final length 16 635s | 75 f0 25 1d 52 8a c0 1c 45 73 df d5 84 d7 9f 29 u.%.R...Es.....) 635s | chunk output 635s | 75 f0 25 1d 52 8a c0 1c 45 73 df d5 84 d7 9f 29 u.%.R...Es.....) 635s | verify_bytes() RFC 3566 Test Case 1: AES-XCBC-MAC-96 with 0-byte input: prf OUT: ok 635s | CONCATENATE_DATA_AND_BASE: 635s | target: EXTRACT_KEY_FROM_KEY 635s | base: base-key@0x2aa3f90f350 (16-bytes, AES_KEY_GEN) 635s | params: 16-bytes@0x3ffeeff70f8 635s | key-offset: 0, key-size: 16 635s | EXTRACT_KEY_FROM_KEY: 635s | target: EXTRACT_KEY_FROM_KEY 635s | key_size: 16-bytes 635s | base: base-key@0x2aa3f910c70 (32-bytes, EXTRACT_KEY_FROM_KEY) 635s | operation: FLAGS_ONLY 635s | params: 8-bytes@0x3ffeeff7008 635s | PRF symkey interface PRF AES_XCBC init key symkey-key@0x2aa3f912360 (size 16) 635s | PRF symkey interface: key symkey-key@0x2aa3f912360 (16-bytes, EXTRACT_KEY_FROM_KEY) 635s | XCBC: Key 16=16 just right 635s | key-offset: 0, key-size: 16 635s | EXTRACT_KEY_FROM_KEY: 635s | target: AES_ECB 635s | flags: SIGN 635s | key_size: 16-bytes 635s | base: base-key@0x2aa3f912360 (16-bytes, EXTRACT_KEY_FROM_KEY) 635s | operation: FLAGS_ONLY 635s | params: 8-bytes@0x3ffeeff6f10 635s | PRF symkey interface PRF AES_XCBC 0x2aa3f90f2f0 635s | PRF symkey interface PRF AES_XCBC update symkey message-key@(nil) (size 0) 635s | PRF symkey interface: symkey message-key@NULL 635s | symkey message NULL key has no bytes 635s | XCBC: data 635s | 635s | K extracting all 16 bytes of key@0x2aa3f910c70 635s | K: symkey-key@0x2aa3f910c70 (16-bytes, AES_ECB) 635s | sizeof bytes 16 635s | wrapper: (SECItemType)1023: cd c8 2d 15 00 b6 fa ec 42 85 22 53 10 74 03 62 635s | K extracted len 16 bytes at 0x2aa3f912f20 635s | unwrapped: 635s | 00 01 02 03 04 05 06 07 08 09 0a 0b 0c 0d 0e 0f ................ 635s | XCBC: K: 635s | 00 01 02 03 04 05 06 07 08 09 0a 0b 0c 0d 0e 0f ................ 635s | XCBC: K1 635s | c3 52 80 57 54 23 7f 31 1a c0 ff f4 e3 e0 3e 78 .R.WT#.1......>x 635s | CONCATENATE_DATA_AND_BASE: 635s | target: EXTRACT_KEY_FROM_KEY 635s | base: base-key@0x2aa3f90f350 (16-bytes, AES_KEY_GEN) 635s | params: 16-bytes@0x3ffeeff6d68 635s | key-offset: 0, key-size: 16 635s | EXTRACT_KEY_FROM_KEY: 635s | target: AES_ECB 635s | flags: SIGN 635s | key_size: 16-bytes 635s | base: base-key@0x2aa3f9133f0 (32-bytes, EXTRACT_KEY_FROM_KEY) 635s | operation: FLAGS_ONLY 635s | params: 8-bytes@0x3ffeeff6d70 635s | Computing E[0] using K3 635s | XCBC: K3 635s | c1 a7 ab a1 a2 3a 94 06 58 07 a0 8c c8 ee d0 6e .....:..X......n 635s | XCBC: E[n-1] 635s | 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................ 635s | XCBC: M[n] 635s | 635s | XCBC: M[n] 635s | 635s | XCBC: M[n]:80...^E[n-1]^K3 635s | 41 a7 ab a1 a2 3a 94 06 58 07 a0 8c c8 ee d0 6e A....:..X......n 635s | XCBC: MAC 635s | 75 f0 25 1d 52 8a c0 1c 45 73 df d5 84 d7 9f 29 u.%.R...Es.....) 635s | CONCATENATE_DATA_AND_BASE: 635s | target: EXTRACT_KEY_FROM_KEY 635s | base: base-key@0x2aa3f90f350 (16-bytes, AES_KEY_GEN) 635s | params: 16-bytes@0x3ffeeff6f80 635s | key-offset: 0, key-size: 16 635s | EXTRACT_KEY_FROM_KEY: 635s | target: EXTRACT_KEY_FROM_KEY 635s | key_size: 16-bytes 635s | base: base-key@0x2aa3f9133f0 (32-bytes, EXTRACT_KEY_FROM_KEY) 635s | operation: FLAGS_ONLY 635s | params: 8-bytes@0x3ffeeff6e90 635s | PRF symkey interface PRF AES_XCBC final-key@0x2aa3f9130b0 (size 16) 635s | PRF symkey interface: key-key@0x2aa3f9130b0 (16-bytes, EXTRACT_KEY_FROM_KEY) 635s | output: symkey-key@0x2aa3f9130b0 (16-bytes, EXTRACT_KEY_FROM_KEY) 635s | RFC 3566 Test Case 1: AES-XCBC-MAC-96 with 0-byte input extracting all 16 bytes of key@0x2aa3f9130b0 635s | RFC 3566 Test Case 1: AES-XCBC-MAC-96 with 0-byte input: symkey-key@0x2aa3f9130b0 (16-bytes, EXTRACT_KEY_FROM_KEY) 635s | sizeof bytes 16 635s | wrapper: (SECItemType)682: cd 69 b3 60 f3 75 d4 8f 4a 77 26 dd bf 9b 79 15 635s | RFC 3566 Test Case 1: AES-XCBC-MAC-96 with 0-byte input extracted len 16 bytes at 0x2aa3f913090 635s | unwrapped: 635s | 75 f0 25 1d 52 8a c0 1c 45 73 df d5 84 d7 9f 29 u.%.R...Es.....) 635s | verify_bytes() RFC 3566 Test Case 1: AES-XCBC-MAC-96 with 0-byte input: symkey: ok 635s ipsec algparse: RFC 3566 Test Case 2: AES-XCBC-MAC-96 with 3-byte input 635s | decode_to_chunk() test_prf_vector: input "0x000102030405060708090a0b0c0d0e0f" 635s | decode_to_chunk() output: 635s | 00 01 02 03 04 05 06 07 08 09 0a 0b 0c 0d 0e 0f ................ 635s | decode_to_chunk() test_prf_vector: input "0x000102" 635s | decode_to_chunk() output: 635s | 00 01 02 ... 635s | decode_to_chunk() test_prf_vector: input "0x5b376580ae2f19afe7219ceef172756f" 635s | decode_to_chunk() output: 635s | 5b 37 65 80 ae 2f 19 af e7 21 9c ee f1 72 75 6f [7e../...!...ruo 635s | PRF chunk interface PRF AES_XCBC init key hunk 0x2aa3f912690 (length 16) 635s | 00 01 02 03 04 05 06 07 08 09 0a 0b 0c 0d 0e 0f ................ 635s | CONCATENATE_DATA_AND_BASE: 635s | target: EXTRACT_KEY_FROM_KEY 635s | base: base-key@0x2aa3f90f350 (16-bytes, AES_KEY_GEN) 635s | params: 16-bytes@0x3ffeeff6f90 635s | key-offset: 0, key-size: 16 635s | EXTRACT_KEY_FROM_KEY: 635s | target: EXTRACT_KEY_FROM_KEY 635s | key_size: 16-bytes 635s | base: base-key@0x2aa3f912360 (32-bytes, EXTRACT_KEY_FROM_KEY) 635s | operation: FLAGS_ONLY 635s | params: 8-bytes@0x3ffeeff6ea0 635s | XCBC: Key 16=16 just right 635s | key-offset: 0, key-size: 16 635s | EXTRACT_KEY_FROM_KEY: 635s | target: AES_ECB 635s | flags: SIGN 635s | key_size: 16-bytes 635s | base: base-key@0x2aa3f9130b0 (16-bytes, EXTRACT_KEY_FROM_KEY) 635s | operation: FLAGS_ONLY 635s | params: 8-bytes@0x3ffeeff6e50 635s | PRF chunk interface PRF AES_XCBC 0x2aa3f90f2f0 635s | PRF chunk interface PRF AES_XCBC update message (0x2aa3f910ba0 length 3) 635s | 00 01 02 ... 635s | XCBC: data 635s | 00 01 02 ... 635s | K extracting all 16 bytes of key@0x2aa3f912360 635s | K: symkey-key@0x2aa3f912360 (16-bytes, AES_ECB) 635s | sizeof bytes 16 635s | wrapper: (SECItemType)1111695477: cd c8 2d 15 00 b6 fa ec 42 85 22 53 10 74 03 62 635s | K extracted len 16 bytes at 0x2aa3f9126b0 635s | unwrapped: 635s | 00 01 02 03 04 05 06 07 08 09 0a 0b 0c 0d 0e 0f ................ 635s | XCBC: K: 635s | 00 01 02 03 04 05 06 07 08 09 0a 0b 0c 0d 0e 0f ................ 635s | XCBC: K1 635s | c3 52 80 57 54 23 7f 31 1a c0 ff f4 e3 e0 3e 78 .R.WT#.1......>x 635s | CONCATENATE_DATA_AND_BASE: 635s | target: EXTRACT_KEY_FROM_KEY 635s | base: base-key@0x2aa3f90f350 (16-bytes, AES_KEY_GEN) 635s | params: 16-bytes@0x3ffeeff6d28 635s | key-offset: 0, key-size: 16 635s | EXTRACT_KEY_FROM_KEY: 635s | target: AES_ECB 635s | flags: SIGN 635s | key_size: 16-bytes 635s | base: base-key@0x2aa3f910c70 (32-bytes, EXTRACT_KEY_FROM_KEY) 635s | operation: FLAGS_ONLY 635s | params: 8-bytes@0x3ffeeff6d30 635s | Computing E[1] using K3 635s | XCBC: K3 635s | c1 a7 ab a1 a2 3a 94 06 58 07 a0 8c c8 ee d0 6e .....:..X......n 635s | XCBC: E[n-1] 635s | 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................ 635s | XCBC: M[n] 635s | 00 01 02 ... 635s | XCBC: M[n] 635s | 00 01 02 ... 635s | XCBC: M[n]:80...^E[n-1]^K3 635s | c1 a6 a9 21 a2 3a 94 06 58 07 a0 8c c8 ee d0 6e ...!.:..X......n 635s | XCBC: MAC 635s | 5b 37 65 80 ae 2f 19 af e7 21 9c ee f1 72 75 6f [7e../...!...ruo 635s | PRF chunk interface PRF AES_XCBC final length 16 635s | 5b 37 65 80 ae 2f 19 af e7 21 9c ee f1 72 75 6f [7e../...!...ruo 635s | chunk output 635s | 5b 37 65 80 ae 2f 19 af e7 21 9c ee f1 72 75 6f [7e../...!...ruo 635s | verify_bytes() RFC 3566 Test Case 2: AES-XCBC-MAC-96 with 3-byte input: prf OUT: ok 635s | CONCATENATE_DATA_AND_BASE: 635s | target: EXTRACT_KEY_FROM_KEY 635s | base: base-key@0x2aa3f90f350 (16-bytes, AES_KEY_GEN) 635s | params: 16-bytes@0x3ffeeff70f8 635s | key-offset: 0, key-size: 16 635s | EXTRACT_KEY_FROM_KEY: 635s | target: EXTRACT_KEY_FROM_KEY 635s | key_size: 16-bytes 635s | base: base-key@0x2aa3f9130b0 (32-bytes, EXTRACT_KEY_FROM_KEY) 635s | operation: FLAGS_ONLY 635s | params: 8-bytes@0x3ffeeff7008 635s | PRF symkey interface PRF AES_XCBC init key symkey-key@0x2aa3f912360 (size 16) 635s | PRF symkey interface: key symkey-key@0x2aa3f912360 (16-bytes, EXTRACT_KEY_FROM_KEY) 635s | XCBC: Key 16=16 just right 635s | key-offset: 0, key-size: 16 635s | EXTRACT_KEY_FROM_KEY: 635s | target: AES_ECB 635s | flags: SIGN 635s | key_size: 16-bytes 635s | base: base-key@0x2aa3f912360 (16-bytes, EXTRACT_KEY_FROM_KEY) 635s | operation: FLAGS_ONLY 635s | params: 8-bytes@0x3ffeeff6f10 635s | PRF symkey interface PRF AES_XCBC 0x2aa3f90f2f0 635s | CONCATENATE_DATA_AND_BASE: 635s | target: EXTRACT_KEY_FROM_KEY 635s | base: base-key@0x2aa3f90f350 (16-bytes, AES_KEY_GEN) 635s | params: 16-bytes@0x3ffeeff70f8 635s | key-offset: 0, key-size: 3 635s | EXTRACT_KEY_FROM_KEY: 635s | target: EXTRACT_KEY_FROM_KEY 635s | key_size: 3-bytes 635s | base: base-key@0x2aa3f9133f0 (19-bytes, EXTRACT_KEY_FROM_KEY) 635s | operation: FLAGS_ONLY 635s | params: 8-bytes@0x3ffeeff7008 635s | PRF symkey interface PRF AES_XCBC update symkey message-key@0x2aa3f910c70 (size 3) 635s | PRF symkey interface: symkey message-key@0x2aa3f910c70 (3-bytes, EXTRACT_KEY_FROM_KEY) 635s | symkey message extracting all 3 bytes of key@0x2aa3f910c70 635s | symkey message: symkey-key@0x2aa3f910c70 (3-bytes, EXTRACT_KEY_FROM_KEY) 635s | sizeof bytes 16 635s | wrapper: (SECItemType)682: 6f 31 fd b8 14 03 a2 c0 0c 72 e4 34 0c 4f eb b7 635s | symkey message extracted len 16 bytes at 0x2aa3f9126b0 635s | unwrapped: 635s | 00 01 02 00 00 00 00 00 00 00 00 00 00 00 00 00 ................ 635s | XCBC: data 635s | 00 01 02 ... 635s | K extracting all 16 bytes of key@0x2aa3f9130b0 635s | K: symkey-key@0x2aa3f9130b0 (16-bytes, AES_ECB) 635s | sizeof bytes 16 635s | wrapper: (SECItemType)1023: cd c8 2d 15 00 b6 fa ec 42 85 22 53 10 74 03 62 635s | K extracted len 16 bytes at 0x2aa3f90f220 635s | unwrapped: 635s | 00 01 02 03 04 05 06 07 08 09 0a 0b 0c 0d 0e 0f ................ 635s | XCBC: K: 635s | 00 01 02 03 04 05 06 07 08 09 0a 0b 0c 0d 0e 0f ................ 635s | XCBC: K1 635s | c3 52 80 57 54 23 7f 31 1a c0 ff f4 e3 e0 3e 78 .R.WT#.1......>x 635s | CONCATENATE_DATA_AND_BASE: 635s | target: EXTRACT_KEY_FROM_KEY 635s | base: base-key@0x2aa3f90f350 (16-bytes, AES_KEY_GEN) 635s | params: 16-bytes@0x3ffeeff6d68 635s | key-offset: 0, key-size: 16 635s | EXTRACT_KEY_FROM_KEY: 635s | target: AES_ECB 635s | flags: SIGN 635s | key_size: 16-bytes 635s | base: base-key@0x2aa3f913750 (32-bytes, EXTRACT_KEY_FROM_KEY) 635s | operation: FLAGS_ONLY 635s | params: 8-bytes@0x3ffeeff6d70 635s | Computing E[1] using K3 635s | XCBC: K3 635s | c1 a7 ab a1 a2 3a 94 06 58 07 a0 8c c8 ee d0 6e .....:..X......n 635s | XCBC: E[n-1] 635s | 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................ 635s | XCBC: M[n] 635s | 00 01 02 ... 635s | XCBC: M[n] 635s | 00 01 02 ... 635s | XCBC: M[n]:80...^E[n-1]^K3 635s | c1 a6 a9 21 a2 3a 94 06 58 07 a0 8c c8 ee d0 6e ...!.:..X......n 635s | XCBC: MAC 635s | 5b 37 65 80 ae 2f 19 af e7 21 9c ee f1 72 75 6f [7e../...!...ruo 635s | CONCATENATE_DATA_AND_BASE: 635s | target: EXTRACT_KEY_FROM_KEY 635s | base: base-key@0x2aa3f90f350 (16-bytes, AES_KEY_GEN) 635s | params: 16-bytes@0x3ffeeff6f80 635s | key-offset: 0, key-size: 16 635s | EXTRACT_KEY_FROM_KEY: 635s | target: EXTRACT_KEY_FROM_KEY 635s | key_size: 16-bytes 635s | base: base-key@0x2aa3f913750 (32-bytes, EXTRACT_KEY_FROM_KEY) 635s | operation: FLAGS_ONLY 635s | params: 8-bytes@0x3ffeeff6e90 635s | PRF symkey interface PRF AES_XCBC final-key@0x2aa3f9133f0 (size 16) 635s | PRF symkey interface: key-key@0x2aa3f9133f0 (16-bytes, EXTRACT_KEY_FROM_KEY) 635s | output: symkey-key@0x2aa3f9133f0 (16-bytes, EXTRACT_KEY_FROM_KEY) 635s | RFC 3566 Test Case 2: AES-XCBC-MAC-96 with 3-byte input extracting all 16 bytes of key@0x2aa3f9133f0 635s | RFC 3566 Test Case 2: AES-XCBC-MAC-96 with 3-byte input: symkey-key@0x2aa3f9133f0 (16-bytes, EXTRACT_KEY_FROM_KEY) 635s | sizeof bytes 16 635s | wrapper: (SECItemType)682: 34 d3 b7 d1 c1 f6 cc aa 88 fa 09 e3 8b 19 78 2d 635s | RFC 3566 Test Case 2: AES-XCBC-MAC-96 with 3-byte input extracted len 16 bytes at 0x2aa3f90f220 635s | unwrapped: 635s | 5b 37 65 80 ae 2f 19 af e7 21 9c ee f1 72 75 6f [7e../...!...ruo 635s | verify_bytes() RFC 3566 Test Case 2: AES-XCBC-MAC-96 with 3-byte input: symkey: ok 635s ipsec algparse: RFC 3566 Test Case 3: AES-XCBC-MAC-96 with 16-byte input 635s | decode_to_chunk() test_prf_vector: input "0x000102030405060708090a0b0c0d0e0f" 635s | decode_to_chunk() output: 635s | 00 01 02 03 04 05 06 07 08 09 0a 0b 0c 0d 0e 0f ................ 635s | decode_to_chunk() test_prf_vector: input "0x000102030405060708090a0b0c0d0e0f" 635s | decode_to_chunk() output: 635s | 00 01 02 03 04 05 06 07 08 09 0a 0b 0c 0d 0e 0f ................ 635s | decode_to_chunk() test_prf_vector: input "0xd2a246fa349b68a79998a4394ff7a263" 635s | decode_to_chunk() output: 635s | d2 a2 46 fa 34 9b 68 a7 99 98 a4 39 4f f7 a2 63 ..F.4.h....9O..c 635s | PRF chunk interface PRF AES_XCBC init key hunk 0x2aa3f912690 (length 16) 635s | 00 01 02 03 04 05 06 07 08 09 0a 0b 0c 0d 0e 0f ................ 635s | CONCATENATE_DATA_AND_BASE: 635s | target: EXTRACT_KEY_FROM_KEY 635s | base: base-key@0x2aa3f90f350 (16-bytes, AES_KEY_GEN) 635s | params: 16-bytes@0x3ffeeff6f90 635s | key-offset: 0, key-size: 16 635s | EXTRACT_KEY_FROM_KEY: 635s | target: EXTRACT_KEY_FROM_KEY 635s | key_size: 16-bytes 635s | base: base-key@0x2aa3f912360 (32-bytes, EXTRACT_KEY_FROM_KEY) 635s | operation: FLAGS_ONLY 635s | params: 8-bytes@0x3ffeeff6ea0 635s | XCBC: Key 16=16 just right 635s | key-offset: 0, key-size: 16 635s | EXTRACT_KEY_FROM_KEY: 635s | target: AES_ECB 635s | flags: SIGN 635s | key_size: 16-bytes 635s | base: base-key@0x2aa3f9133f0 (16-bytes, EXTRACT_KEY_FROM_KEY) 635s | operation: FLAGS_ONLY 635s | params: 8-bytes@0x3ffeeff6e50 635s | PRF chunk interface PRF AES_XCBC 0x2aa3f90f2f0 635s | PRF chunk interface PRF AES_XCBC update message (0x2aa3f910ba0 length 16) 635s | 00 01 02 03 04 05 06 07 08 09 0a 0b 0c 0d 0e 0f ................ 635s | XCBC: data 635s | 00 01 02 03 04 05 06 07 08 09 0a 0b 0c 0d 0e 0f ................ 635s | K extracting all 16 bytes of key@0x2aa3f912360 635s | K: symkey-key@0x2aa3f912360 (16-bytes, AES_ECB) 635s | sizeof bytes 16 635s | wrapper: (SECItemType)1111695477: cd c8 2d 15 00 b6 fa ec 42 85 22 53 10 74 03 62 635s | K extracted len 16 bytes at 0x2aa3f912f20 635s | unwrapped: 635s | 00 01 02 03 04 05 06 07 08 09 0a 0b 0c 0d 0e 0f ................ 635s | XCBC: K: 635s | 00 01 02 03 04 05 06 07 08 09 0a 0b 0c 0d 0e 0f ................ 635s | XCBC: K1 635s | c3 52 80 57 54 23 7f 31 1a c0 ff f4 e3 e0 3e 78 .R.WT#.1......>x 635s | CONCATENATE_DATA_AND_BASE: 635s | target: EXTRACT_KEY_FROM_KEY 635s | base: base-key@0x2aa3f90f350 (16-bytes, AES_KEY_GEN) 635s | params: 16-bytes@0x3ffeeff6d28 635s | key-offset: 0, key-size: 16 635s | EXTRACT_KEY_FROM_KEY: 635s | target: AES_ECB 635s | flags: SIGN 635s | key_size: 16-bytes 635s | base: base-key@0x2aa3f910c70 (32-bytes, EXTRACT_KEY_FROM_KEY) 635s | operation: FLAGS_ONLY 635s | params: 8-bytes@0x3ffeeff6d30 635s | XCBC: Computing E[1] using K2 635s | XCBC: K2 635s | bd 86 2f fb 97 ad 2f b8 f8 b8 91 f6 03 2f 36 cb ../.../....../6. 635s | XCBC: E[n-1] 635s | 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................ 635s | XCBC: M[n] 635s | 00 01 02 03 04 05 06 07 08 09 0a 0b 0c 0d 0e 0f ................ 635s | XCBC: M[n]^E[n-1]^K2 635s | bd 87 2d f8 93 a8 29 bf f0 b1 9b fd 0f 22 38 c4 ..-...)......"8. 635s | XCBC: MAC 635s | d2 a2 46 fa 34 9b 68 a7 99 98 a4 39 4f f7 a2 63 ..F.4.h....9O..c 635s | PRF chunk interface PRF AES_XCBC final length 16 635s | d2 a2 46 fa 34 9b 68 a7 99 98 a4 39 4f f7 a2 63 ..F.4.h....9O..c 635s | chunk output 635s | d2 a2 46 fa 34 9b 68 a7 99 98 a4 39 4f f7 a2 63 ..F.4.h....9O..c 635s | verify_bytes() RFC 3566 Test Case 3: AES-XCBC-MAC-96 with 16-byte input: prf OUT: ok 635s | CONCATENATE_DATA_AND_BASE: 635s | target: EXTRACT_KEY_FROM_KEY 635s | base: base-key@0x2aa3f90f350 (16-bytes, AES_KEY_GEN) 635s | params: 16-bytes@0x3ffeeff70f8 635s | key-offset: 0, key-size: 16 635s | EXTRACT_KEY_FROM_KEY: 635s | target: EXTRACT_KEY_FROM_KEY 635s | key_size: 16-bytes 635s | base: base-key@0x2aa3f9133f0 (32-bytes, EXTRACT_KEY_FROM_KEY) 635s | operation: FLAGS_ONLY 635s | params: 8-bytes@0x3ffeeff7008 635s | PRF symkey interface PRF AES_XCBC init key symkey-key@0x2aa3f912360 (size 16) 635s | PRF symkey interface: key symkey-key@0x2aa3f912360 (16-bytes, EXTRACT_KEY_FROM_KEY) 635s | XCBC: Key 16=16 just right 635s | key-offset: 0, key-size: 16 635s | EXTRACT_KEY_FROM_KEY: 635s | target: AES_ECB 635s | flags: SIGN 635s | key_size: 16-bytes 635s | base: base-key@0x2aa3f912360 (16-bytes, EXTRACT_KEY_FROM_KEY) 635s | operation: FLAGS_ONLY 635s | params: 8-bytes@0x3ffeeff6f10 635s | PRF symkey interface PRF AES_XCBC 0x2aa3f90f2f0 635s | CONCATENATE_DATA_AND_BASE: 635s | target: EXTRACT_KEY_FROM_KEY 635s | base: base-key@0x2aa3f90f350 (16-bytes, AES_KEY_GEN) 635s | params: 16-bytes@0x3ffeeff70f8 635s | key-offset: 0, key-size: 16 635s | EXTRACT_KEY_FROM_KEY: 635s | target: EXTRACT_KEY_FROM_KEY 635s | key_size: 16-bytes 635s | base: base-key@0x2aa3f9130b0 (32-bytes, EXTRACT_KEY_FROM_KEY) 635s | operation: FLAGS_ONLY 635s | params: 8-bytes@0x3ffeeff7008 635s | PRF symkey interface PRF AES_XCBC update symkey message-key@0x2aa3f910c70 (size 16) 635s | PRF symkey interface: symkey message-key@0x2aa3f910c70 (16-bytes, EXTRACT_KEY_FROM_KEY) 635s | symkey message extracting all 16 bytes of key@0x2aa3f910c70 635s | symkey message: symkey-key@0x2aa3f910c70 (16-bytes, EXTRACT_KEY_FROM_KEY) 635s | sizeof bytes 16 635s | wrapper: (SECItemType)682: cd c8 2d 15 00 b6 fa ec 42 85 22 53 10 74 03 62 635s | symkey message extracted len 16 bytes at 0x2aa3f912f20 635s | unwrapped: 635s | 00 01 02 03 04 05 06 07 08 09 0a 0b 0c 0d 0e 0f ................ 635s | XCBC: data 635s | 00 01 02 03 04 05 06 07 08 09 0a 0b 0c 0d 0e 0f ................ 635s | K extracting all 16 bytes of key@0x2aa3f9133f0 635s | K: symkey-key@0x2aa3f9133f0 (16-bytes, AES_ECB) 635s | sizeof bytes 16 635s | wrapper: (SECItemType)1023: cd c8 2d 15 00 b6 fa ec 42 85 22 53 10 74 03 62 635s | K extracted len 16 bytes at 0x2aa3f90f080 635s | unwrapped: 635s | 00 01 02 03 04 05 06 07 08 09 0a 0b 0c 0d 0e 0f ................ 635s | XCBC: K: 635s | 00 01 02 03 04 05 06 07 08 09 0a 0b 0c 0d 0e 0f ................ 635s | XCBC: K1 635s | c3 52 80 57 54 23 7f 31 1a c0 ff f4 e3 e0 3e 78 .R.WT#.1......>x 635s | CONCATENATE_DATA_AND_BASE: 635s | target: EXTRACT_KEY_FROM_KEY 635s | base: base-key@0x2aa3f90f350 (16-bytes, AES_KEY_GEN) 635s | params: 16-bytes@0x3ffeeff6d68 635s | key-offset: 0, key-size: 16 635s | EXTRACT_KEY_FROM_KEY: 635s | target: AES_ECB 635s | flags: SIGN 635s | key_size: 16-bytes 635s | base: base-key@0x2aa3f913750 (32-bytes, EXTRACT_KEY_FROM_KEY) 635s | operation: FLAGS_ONLY 635s | params: 8-bytes@0x3ffeeff6d70 635s | XCBC: Computing E[1] using K2 635s | XCBC: K2 635s | bd 86 2f fb 97 ad 2f b8 f8 b8 91 f6 03 2f 36 cb ../.../....../6. 635s | XCBC: E[n-1] 635s | 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................ 635s | XCBC: M[n] 635s | 00 01 02 03 04 05 06 07 08 09 0a 0b 0c 0d 0e 0f ................ 635s | XCBC: M[n]^E[n-1]^K2 635s | bd 87 2d f8 93 a8 29 bf f0 b1 9b fd 0f 22 38 c4 ..-...)......"8. 635s | XCBC: MAC 635s | d2 a2 46 fa 34 9b 68 a7 99 98 a4 39 4f f7 a2 63 ..F.4.h....9O..c 635s | CONCATENATE_DATA_AND_BASE: 635s | target: EXTRACT_KEY_FROM_KEY 635s | base: base-key@0x2aa3f90f350 (16-bytes, AES_KEY_GEN) 635s | params: 16-bytes@0x3ffeeff6f80 635s | key-offset: 0, key-size: 16 635s | EXTRACT_KEY_FROM_KEY: 635s | target: EXTRACT_KEY_FROM_KEY 635s | key_size: 16-bytes 635s | base: base-key@0x2aa3f913750 (32-bytes, EXTRACT_KEY_FROM_KEY) 635s | operation: FLAGS_ONLY 635s | params: 8-bytes@0x3ffeeff6e90 635s | PRF symkey interface PRF AES_XCBC final-key@0x2aa3f9130b0 (size 16) 635s | PRF symkey interface: key-key@0x2aa3f9130b0 (16-bytes, EXTRACT_KEY_FROM_KEY) 635s | output: symkey-key@0x2aa3f9130b0 (16-bytes, EXTRACT_KEY_FROM_KEY) 635s | RFC 3566 Test Case 3: AES-XCBC-MAC-96 with 16-byte input extracting all 16 bytes of key@0x2aa3f9130b0 635s | RFC 3566 Test Case 3: AES-XCBC-MAC-96 with 16-byte input: symkey-key@0x2aa3f9130b0 (16-bytes, EXTRACT_KEY_FROM_KEY) 635s | sizeof bytes 16 635s | wrapper: (SECItemType)682: ad 19 55 84 33 74 71 32 61 6d 8f 7c c8 b6 3e d7 635s | RFC 3566 Test Case 3: AES-XCBC-MAC-96 with 16-byte input extracted len 16 bytes at 0x2aa3f90f080 635s | unwrapped: 635s | d2 a2 46 fa 34 9b 68 a7 99 98 a4 39 4f f7 a2 63 ..F.4.h....9O..c 635s | verify_bytes() RFC 3566 Test Case 3: AES-XCBC-MAC-96 with 16-byte input: symkey: ok 635s ipsec algparse: RFC 3566 Test Case 4: AES-XCBC-MAC-96 with 20-byte input 635s | decode_to_chunk() test_prf_vector: input "0x000102030405060708090a0b0c0d0e0f" 635s | decode_to_chunk() output: 635s | 00 01 02 03 04 05 06 07 08 09 0a 0b 0c 0d 0e 0f ................ 635s | decode_to_chunk() test_prf_vector: input "0x000102030405060708090a0b0c0d0e0f10111213" 635s | decode_to_chunk() output: 635s | 00 01 02 03 04 05 06 07 08 09 0a 0b 0c 0d 0e 0f ................ 635s | 10 11 12 13 .... 635s | decode_to_chunk() test_prf_vector: input "0x47f51b4564966215b8985c63055ed308" 635s | decode_to_chunk() output: 635s | 47 f5 1b 45 64 96 62 15 b8 98 5c 63 05 5e d3 08 G..Ed.b...\c.^.. 635s | PRF chunk interface PRF AES_XCBC init key hunk 0x2aa3f912690 (length 16) 635s | 00 01 02 03 04 05 06 07 08 09 0a 0b 0c 0d 0e 0f ................ 635s | CONCATENATE_DATA_AND_BASE: 635s | target: EXTRACT_KEY_FROM_KEY 635s | base: base-key@0x2aa3f90f350 (16-bytes, AES_KEY_GEN) 635s | params: 16-bytes@0x3ffeeff6f90 635s | key-offset: 0, key-size: 16 635s | EXTRACT_KEY_FROM_KEY: 635s | target: EXTRACT_KEY_FROM_KEY 635s | key_size: 16-bytes 635s | base: base-key@0x2aa3f912360 (32-bytes, EXTRACT_KEY_FROM_KEY) 635s | operation: FLAGS_ONLY 635s | params: 8-bytes@0x3ffeeff6ea0 635s | XCBC: Key 16=16 just right 635s | key-offset: 0, key-size: 16 635s | EXTRACT_KEY_FROM_KEY: 635s | target: AES_ECB 635s | flags: SIGN 635s | key_size: 16-bytes 635s | base: base-key@0x2aa3f9130b0 (16-bytes, EXTRACT_KEY_FROM_KEY) 635s | operation: FLAGS_ONLY 635s | params: 8-bytes@0x3ffeeff6e50 635s | PRF chunk interface PRF AES_XCBC 0x2aa3f90f2f0 635s | PRF chunk interface PRF AES_XCBC update message (0x2aa3f910ba0 length 20) 635s | 00 01 02 03 04 05 06 07 08 09 0a 0b 0c 0d 0e 0f ................ 635s | 10 11 12 13 .... 635s | XCBC: data 635s | 00 01 02 03 04 05 06 07 08 09 0a 0b 0c 0d 0e 0f ................ 635s | 10 11 12 13 .... 635s | K extracting all 16 bytes of key@0x2aa3f912360 635s | K: symkey-key@0x2aa3f912360 (16-bytes, AES_ECB) 635s | sizeof bytes 16 635s | wrapper: (SECItemType)1111695477: cd c8 2d 15 00 b6 fa ec 42 85 22 53 10 74 03 62 635s | K extracted len 16 bytes at 0x2aa3f9129a0 635s | unwrapped: 635s | 00 01 02 03 04 05 06 07 08 09 0a 0b 0c 0d 0e 0f ................ 635s | XCBC: K: 635s | 00 01 02 03 04 05 06 07 08 09 0a 0b 0c 0d 0e 0f ................ 635s | XCBC: K1 635s | c3 52 80 57 54 23 7f 31 1a c0 ff f4 e3 e0 3e 78 .R.WT#.1......>x 635s | CONCATENATE_DATA_AND_BASE: 635s | target: EXTRACT_KEY_FROM_KEY 635s | base: base-key@0x2aa3f90f350 (16-bytes, AES_KEY_GEN) 635s | params: 16-bytes@0x3ffeeff6d28 635s | key-offset: 0, key-size: 16 635s | EXTRACT_KEY_FROM_KEY: 635s | target: AES_ECB 635s | flags: SIGN 635s | key_size: 16-bytes 635s | base: base-key@0x2aa3f910c70 (32-bytes, EXTRACT_KEY_FROM_KEY) 635s | operation: FLAGS_ONLY 635s | params: 8-bytes@0x3ffeeff6d30 635s | Computing E[2] using K3 635s | XCBC: K3 635s | c1 a7 ab a1 a2 3a 94 06 58 07 a0 8c c8 ee d0 6e .....:..X......n 635s | XCBC: E[n-1] 635s | 1d 04 48 fa cf 4d 9c 6f 55 b9 93 da 09 80 3d b3 ..H..M.oU.....=. 635s | XCBC: M[n] 635s | 10 11 12 13 .... 635s | XCBC: M[n] 635s | 10 11 12 13 .... 635s | XCBC: M[n]:80...^E[n-1]^K3 635s | cc b2 f1 48 ed 77 08 69 0d be 33 56 c1 6e ed dd ...H.w.i..3V.n.. 635s | XCBC: MAC 635s | 47 f5 1b 45 64 96 62 15 b8 98 5c 63 05 5e d3 08 G..Ed.b...\c.^.. 635s | PRF chunk interface PRF AES_XCBC final length 16 635s | 47 f5 1b 45 64 96 62 15 b8 98 5c 63 05 5e d3 08 G..Ed.b...\c.^.. 635s | chunk output 635s | 47 f5 1b 45 64 96 62 15 b8 98 5c 63 05 5e d3 08 G..Ed.b...\c.^.. 635s | verify_bytes() RFC 3566 Test Case 4: AES-XCBC-MAC-96 with 20-byte input: prf OUT: ok 635s | CONCATENATE_DATA_AND_BASE: 635s | target: EXTRACT_KEY_FROM_KEY 635s | base: base-key@0x2aa3f90f350 (16-bytes, AES_KEY_GEN) 635s | params: 16-bytes@0x3ffeeff70f8 635s | key-offset: 0, key-size: 16 635s | EXTRACT_KEY_FROM_KEY: 635s | target: EXTRACT_KEY_FROM_KEY 635s | key_size: 16-bytes 635s | base: base-key@0x2aa3f9130b0 (32-bytes, EXTRACT_KEY_FROM_KEY) 635s | operation: FLAGS_ONLY 635s | params: 8-bytes@0x3ffeeff7008 635s | PRF symkey interface PRF AES_XCBC init key symkey-key@0x2aa3f912360 (size 16) 635s | PRF symkey interface: key symkey-key@0x2aa3f912360 (16-bytes, EXTRACT_KEY_FROM_KEY) 635s | XCBC: Key 16=16 just right 635s | key-offset: 0, key-size: 16 635s | EXTRACT_KEY_FROM_KEY: 635s | target: AES_ECB 635s | flags: SIGN 635s | key_size: 16-bytes 635s | base: base-key@0x2aa3f912360 (16-bytes, EXTRACT_KEY_FROM_KEY) 635s | operation: FLAGS_ONLY 635s | params: 8-bytes@0x3ffeeff6f10 635s | PRF symkey interface PRF AES_XCBC 0x2aa3f90f2f0 635s | CONCATENATE_DATA_AND_BASE: 635s | target: EXTRACT_KEY_FROM_KEY 635s | base: base-key@0x2aa3f90f350 (16-bytes, AES_KEY_GEN) 635s | params: 16-bytes@0x3ffeeff70f8 635s | key-offset: 0, key-size: 20 635s | EXTRACT_KEY_FROM_KEY: 635s | target: EXTRACT_KEY_FROM_KEY 635s | key_size: 20-bytes 635s | base: base-key@0x2aa3f9133f0 (36-bytes, EXTRACT_KEY_FROM_KEY) 635s | operation: FLAGS_ONLY 635s | params: 8-bytes@0x3ffeeff7008 635s | PRF symkey interface PRF AES_XCBC update symkey message-key@0x2aa3f910c70 (size 20) 635s | PRF symkey interface: symkey message-key@0x2aa3f910c70 (20-bytes, EXTRACT_KEY_FROM_KEY) 635s | symkey message extracting all 20 bytes of key@0x2aa3f910c70 635s | symkey message: symkey-key@0x2aa3f910c70 (20-bytes, EXTRACT_KEY_FROM_KEY) 635s | sizeof bytes 32 635s | wrapper: (SECItemType)682: cd c8 2d 15 00 b6 fa ec 42 85 22 53 10 74 03 62 e1 8d 4c f0 b3 18 08 88 eb 6e 62 38 f0 f1 97 b0 635s | symkey message extracted len 32 bytes at 0x2aa3f912d20 635s | unwrapped: 635s | 00 01 02 03 04 05 06 07 08 09 0a 0b 0c 0d 0e 0f ................ 635s | 10 11 12 13 00 00 00 00 00 00 00 00 00 00 00 00 ................ 635s | XCBC: data 635s | 00 01 02 03 04 05 06 07 08 09 0a 0b 0c 0d 0e 0f ................ 635s | 10 11 12 13 .... 635s | K extracting all 16 bytes of key@0x2aa3f9130b0 635s | K: symkey-key@0x2aa3f9130b0 (16-bytes, AES_ECB) 635s | sizeof bytes 16 635s | wrapper: (SECItemType)1023: cd c8 2d 15 00 b6 fa ec 42 85 22 53 10 74 03 62 635s | K extracted len 16 bytes at 0x2aa3f9126b0 635s | unwrapped: 635s | 00 01 02 03 04 05 06 07 08 09 0a 0b 0c 0d 0e 0f ................ 635s | XCBC: K: 635s | 00 01 02 03 04 05 06 07 08 09 0a 0b 0c 0d 0e 0f ................ 635s | XCBC: K1 635s | c3 52 80 57 54 23 7f 31 1a c0 ff f4 e3 e0 3e 78 .R.WT#.1......>x 635s | CONCATENATE_DATA_AND_BASE: 635s | target: EXTRACT_KEY_FROM_KEY 635s | base: base-key@0x2aa3f90f350 (16-bytes, AES_KEY_GEN) 635s | params: 16-bytes@0x3ffeeff6d68 635s | key-offset: 0, key-size: 16 635s | EXTRACT_KEY_FROM_KEY: 635s | target: AES_ECB 635s | flags: SIGN 635s | key_size: 16-bytes 635s | base: base-key@0x2aa3f913750 (32-bytes, EXTRACT_KEY_FROM_KEY) 635s | operation: FLAGS_ONLY 635s | params: 8-bytes@0x3ffeeff6d70 635s | Computing E[2] using K3 635s | XCBC: K3 635s | c1 a7 ab a1 a2 3a 94 06 58 07 a0 8c c8 ee d0 6e .....:..X......n 635s | XCBC: E[n-1] 635s | 1d 04 48 fa cf 4d 9c 6f 55 b9 93 da 09 80 3d b3 ..H..M.oU.....=. 635s | XCBC: M[n] 635s | 10 11 12 13 .... 635s | XCBC: M[n] 635s | 10 11 12 13 .... 635s | XCBC: M[n]:80...^E[n-1]^K3 635s | cc b2 f1 48 ed 77 08 69 0d be 33 56 c1 6e ed dd ...H.w.i..3V.n.. 635s | XCBC: MAC 635s | 47 f5 1b 45 64 96 62 15 b8 98 5c 63 05 5e d3 08 G..Ed.b...\c.^.. 635s | CONCATENATE_DATA_AND_BASE: 635s | target: EXTRACT_KEY_FROM_KEY 635s | base: base-key@0x2aa3f90f350 (16-bytes, AES_KEY_GEN) 635s | params: 16-bytes@0x3ffeeff6f80 635s | key-offset: 0, key-size: 16 635s | EXTRACT_KEY_FROM_KEY: 635s | target: EXTRACT_KEY_FROM_KEY 635s | key_size: 16-bytes 635s | base: base-key@0x2aa3f913750 (32-bytes, EXTRACT_KEY_FROM_KEY) 635s | operation: FLAGS_ONLY 635s | params: 8-bytes@0x3ffeeff6e90 635s | PRF symkey interface PRF AES_XCBC final-key@0x2aa3f9133f0 (size 16) 635s | PRF symkey interface: key-key@0x2aa3f9133f0 (16-bytes, EXTRACT_KEY_FROM_KEY) 635s | output: symkey-key@0x2aa3f9133f0 (16-bytes, EXTRACT_KEY_FROM_KEY) 635s | RFC 3566 Test Case 4: AES-XCBC-MAC-96 with 20-byte input extracting all 16 bytes of key@0x2aa3f9133f0 635s | RFC 3566 Test Case 4: AES-XCBC-MAC-96 with 20-byte input: symkey-key@0x2aa3f9133f0 (16-bytes, EXTRACT_KEY_FROM_KEY) 635s | sizeof bytes 16 635s | wrapper: (SECItemType)682: ff a0 76 c1 d9 c2 bf 13 64 5c 7f 25 d5 ca bf 93 635s | RFC 3566 Test Case 4: AES-XCBC-MAC-96 with 20-byte input extracted len 16 bytes at 0x2aa3f9126b0 635s | unwrapped: 635s | 47 f5 1b 45 64 96 62 15 b8 98 5c 63 05 5e d3 08 G..Ed.b...\c.^.. 635s | verify_bytes() RFC 3566 Test Case 4: AES-XCBC-MAC-96 with 20-byte input: symkey: ok 635s ipsec algparse: RFC 3566 Test Case 5: AES-XCBC-MAC-96 with 32-byte input 635s | decode_to_chunk() test_prf_vector: input "0x000102030405060708090a0b0c0d0e0f" 635s | decode_to_chunk() output: 635s | 00 01 02 03 04 05 06 07 08 09 0a 0b 0c 0d 0e 0f ................ 635s | decode_to_chunk() test_prf_vector: input "0x000102030405060708090a0b0c0d0e0f101112131415161718191a1b1c1d1e1f" 635s | decode_to_chunk() output: 635s | 00 01 02 03 04 05 06 07 08 09 0a 0b 0c 0d 0e 0f ................ 635s | 10 11 12 13 14 15 16 17 18 19 1a 1b 1c 1d 1e 1f ................ 635s | decode_to_chunk() test_prf_vector: input "0xf54f0ec8d2b9f3d36807734bd5283fd4" 635s | decode_to_chunk() output: 635s | f5 4f 0e c8 d2 b9 f3 d3 68 07 73 4b d5 28 3f d4 .O......h.sK.(?. 635s | PRF chunk interface PRF AES_XCBC init key hunk 0x2aa3f912690 (length 16) 635s | 00 01 02 03 04 05 06 07 08 09 0a 0b 0c 0d 0e 0f ................ 635s | CONCATENATE_DATA_AND_BASE: 635s | target: EXTRACT_KEY_FROM_KEY 635s | base: base-key@0x2aa3f90f350 (16-bytes, AES_KEY_GEN) 635s | params: 16-bytes@0x3ffeeff6f90 635s | key-offset: 0, key-size: 16 635s | EXTRACT_KEY_FROM_KEY: 635s | target: EXTRACT_KEY_FROM_KEY 635s | key_size: 16-bytes 635s | base: base-key@0x2aa3f912360 (32-bytes, EXTRACT_KEY_FROM_KEY) 635s | operation: FLAGS_ONLY 635s | params: 8-bytes@0x3ffeeff6ea0 635s | XCBC: Key 16=16 just right 635s | key-offset: 0, key-size: 16 635s | EXTRACT_KEY_FROM_KEY: 635s | target: AES_ECB 635s | flags: SIGN 635s | key_size: 16-bytes 635s | base: base-key@0x2aa3f9133f0 (16-bytes, EXTRACT_KEY_FROM_KEY) 635s | operation: FLAGS_ONLY 635s | params: 8-bytes@0x3ffeeff6e50 635s | PRF chunk interface PRF AES_XCBC 0x2aa3f912d20 635s | PRF chunk interface PRF AES_XCBC update message (0x2aa3f90f2f0 length 32) 635s | 00 01 02 03 04 05 06 07 08 09 0a 0b 0c 0d 0e 0f ................ 635s | 10 11 12 13 14 15 16 17 18 19 1a 1b 1c 1d 1e 1f ................ 635s | XCBC: data 635s | 00 01 02 03 04 05 06 07 08 09 0a 0b 0c 0d 0e 0f ................ 635s | 10 11 12 13 14 15 16 17 18 19 1a 1b 1c 1d 1e 1f ................ 635s | K extracting all 16 bytes of key@0x2aa3f912360 635s | K: symkey-key@0x2aa3f912360 (16-bytes, AES_ECB) 635s | sizeof bytes 16 635s | wrapper: (SECItemType)1111695477: cd c8 2d 15 00 b6 fa ec 42 85 22 53 10 74 03 62 635s | K extracted len 16 bytes at 0x2aa3f90f220 635s | unwrapped: 635s | 00 01 02 03 04 05 06 07 08 09 0a 0b 0c 0d 0e 0f ................ 635s | XCBC: K: 635s | 00 01 02 03 04 05 06 07 08 09 0a 0b 0c 0d 0e 0f ................ 635s | XCBC: K1 635s | c3 52 80 57 54 23 7f 31 1a c0 ff f4 e3 e0 3e 78 .R.WT#.1......>x 635s | CONCATENATE_DATA_AND_BASE: 635s | target: EXTRACT_KEY_FROM_KEY 635s | base: base-key@0x2aa3f90f350 (16-bytes, AES_KEY_GEN) 635s | params: 16-bytes@0x3ffeeff6d28 635s | key-offset: 0, key-size: 16 635s | EXTRACT_KEY_FROM_KEY: 635s | target: AES_ECB 635s | flags: SIGN 635s | key_size: 16-bytes 635s | base: base-key@0x2aa3f910c70 (32-bytes, EXTRACT_KEY_FROM_KEY) 635s | operation: FLAGS_ONLY 635s | params: 8-bytes@0x3ffeeff6d30 635s | XCBC: Computing E[2] using K2 635s | XCBC: K2 635s | bd 86 2f fb 97 ad 2f b8 f8 b8 91 f6 03 2f 36 cb ../.../....../6. 635s | XCBC: E[n-1] 635s | 1d 04 48 fa cf 4d 9c 6f 55 b9 93 da 09 80 3d b3 ..H..M.oU.....=. 635s | XCBC: M[n] 635s | 10 11 12 13 14 15 16 17 18 19 1a 1b 1c 1d 1e 1f ................ 635s | XCBC: M[n]^E[n-1]^K2 635s | b0 93 75 12 4c f5 a5 c0 b5 18 18 37 16 b2 15 67 ..u.L......7...g 635s | XCBC: MAC 635s | f5 4f 0e c8 d2 b9 f3 d3 68 07 73 4b d5 28 3f d4 .O......h.sK.(?. 635s | PRF chunk interface PRF AES_XCBC final length 16 635s | f5 4f 0e c8 d2 b9 f3 d3 68 07 73 4b d5 28 3f d4 .O......h.sK.(?. 635s | chunk output 635s | f5 4f 0e c8 d2 b9 f3 d3 68 07 73 4b d5 28 3f d4 .O......h.sK.(?. 635s | verify_bytes() RFC 3566 Test Case 5: AES-XCBC-MAC-96 with 32-byte input: prf OUT: ok 635s | CONCATENATE_DATA_AND_BASE: 635s | target: EXTRACT_KEY_FROM_KEY 635s | base: base-key@0x2aa3f90f350 (16-bytes, AES_KEY_GEN) 635s | params: 16-bytes@0x3ffeeff70f8 635s | key-offset: 0, key-size: 16 635s | EXTRACT_KEY_FROM_KEY: 635s | target: EXTRACT_KEY_FROM_KEY 635s | key_size: 16-bytes 635s | base: base-key@0x2aa3f9133f0 (32-bytes, EXTRACT_KEY_FROM_KEY) 635s | operation: FLAGS_ONLY 635s | params: 8-bytes@0x3ffeeff7008 635s | PRF symkey interface PRF AES_XCBC init key symkey-key@0x2aa3f912360 (size 16) 635s | PRF symkey interface: key symkey-key@0x2aa3f912360 (16-bytes, EXTRACT_KEY_FROM_KEY) 635s | XCBC: Key 16=16 just right 635s | key-offset: 0, key-size: 16 635s | EXTRACT_KEY_FROM_KEY: 635s | target: AES_ECB 635s | flags: SIGN 635s | key_size: 16-bytes 635s | base: base-key@0x2aa3f912360 (16-bytes, EXTRACT_KEY_FROM_KEY) 635s | operation: FLAGS_ONLY 635s | params: 8-bytes@0x3ffeeff6f10 635s | PRF symkey interface PRF AES_XCBC 0x2aa3f912d20 635s | CONCATENATE_DATA_AND_BASE: 635s | target: EXTRACT_KEY_FROM_KEY 635s | base: base-key@0x2aa3f90f350 (16-bytes, AES_KEY_GEN) 635s | params: 16-bytes@0x3ffeeff70f8 635s | key-offset: 0, key-size: 32 635s | EXTRACT_KEY_FROM_KEY: 635s | target: EXTRACT_KEY_FROM_KEY 635s | key_size: 32-bytes 635s | base: base-key@0x2aa3f9130b0 (48-bytes, EXTRACT_KEY_FROM_KEY) 635s | operation: FLAGS_ONLY 635s | params: 8-bytes@0x3ffeeff7008 635s | PRF symkey interface PRF AES_XCBC update symkey message-key@0x2aa3f910c70 (size 32) 635s | PRF symkey interface: symkey message-key@0x2aa3f910c70 (32-bytes, EXTRACT_KEY_FROM_KEY) 635s | symkey message extracting all 32 bytes of key@0x2aa3f910c70 635s | symkey message: symkey-key@0x2aa3f910c70 (32-bytes, EXTRACT_KEY_FROM_KEY) 635s | sizeof bytes 32 635s | wrapper: (SECItemType)682: cd c8 2d 15 00 b6 fa ec 42 85 22 53 10 74 03 62 27 fd dc 41 eb bb 70 6d 99 e9 fe 08 34 72 63 32 635s | symkey message extracted len 32 bytes at 0x2aa3f913a10 635s | unwrapped: 635s | 00 01 02 03 04 05 06 07 08 09 0a 0b 0c 0d 0e 0f ................ 635s | 10 11 12 13 14 15 16 17 18 19 1a 1b 1c 1d 1e 1f ................ 635s | XCBC: data 635s | 00 01 02 03 04 05 06 07 08 09 0a 0b 0c 0d 0e 0f ................ 635s | 10 11 12 13 14 15 16 17 18 19 1a 1b 1c 1d 1e 1f ................ 635s | K extracting all 16 bytes of key@0x2aa3f9133f0 635s | K: symkey-key@0x2aa3f9133f0 (16-bytes, AES_ECB) 635s | sizeof bytes 16 635s | wrapper: (SECItemType)1023: cd c8 2d 15 00 b6 fa ec 42 85 22 53 10 74 03 62 635s | K extracted len 16 bytes at 0x2aa3f912f20 635s | unwrapped: 635s | 00 01 02 03 04 05 06 07 08 09 0a 0b 0c 0d 0e 0f ................ 635s | XCBC: K: 635s | 00 01 02 03 04 05 06 07 08 09 0a 0b 0c 0d 0e 0f ................ 635s | XCBC: K1 635s | c3 52 80 57 54 23 7f 31 1a c0 ff f4 e3 e0 3e 78 .R.WT#.1......>x 635s | CONCATENATE_DATA_AND_BASE: 635s | target: EXTRACT_KEY_FROM_KEY 635s | base: base-key@0x2aa3f90f350 (16-bytes, AES_KEY_GEN) 635s | params: 16-bytes@0x3ffeeff6d68 635s | key-offset: 0, key-size: 16 635s | EXTRACT_KEY_FROM_KEY: 635s | target: AES_ECB 635s | flags: SIGN 635s | key_size: 16-bytes 635s | base: base-key@0x2aa3f913750 (32-bytes, EXTRACT_KEY_FROM_KEY) 635s | operation: FLAGS_ONLY 635s | params: 8-bytes@0x3ffeeff6d70 635s | XCBC: Computing E[2] using K2 635s | XCBC: K2 635s | bd 86 2f fb 97 ad 2f b8 f8 b8 91 f6 03 2f 36 cb ../.../....../6. 635s | XCBC: E[n-1] 635s | 1d 04 48 fa cf 4d 9c 6f 55 b9 93 da 09 80 3d b3 ..H..M.oU.....=. 635s | XCBC: M[n] 635s | 10 11 12 13 14 15 16 17 18 19 1a 1b 1c 1d 1e 1f ................ 635s | XCBC: M[n]^E[n-1]^K2 635s | b0 93 75 12 4c f5 a5 c0 b5 18 18 37 16 b2 15 67 ..u.L......7...g 635s | XCBC: MAC 635s | f5 4f 0e c8 d2 b9 f3 d3 68 07 73 4b d5 28 3f d4 .O......h.sK.(?. 635s | CONCATENATE_DATA_AND_BASE: 635s | target: EXTRACT_KEY_FROM_KEY 635s | base: base-key@0x2aa3f90f350 (16-bytes, AES_KEY_GEN) 635s | params: 16-bytes@0x3ffeeff6f80 635s | key-offset: 0, key-size: 16 635s | EXTRACT_KEY_FROM_KEY: 635s | target: EXTRACT_KEY_FROM_KEY 635s | key_size: 16-bytes 635s | base: base-key@0x2aa3f913750 (32-bytes, EXTRACT_KEY_FROM_KEY) 635s | operation: FLAGS_ONLY 635s | params: 8-bytes@0x3ffeeff6e90 635s | PRF symkey interface PRF AES_XCBC final-key@0x2aa3f9130b0 (size 16) 635s | PRF symkey interface: key-key@0x2aa3f9130b0 (16-bytes, EXTRACT_KEY_FROM_KEY) 635s | output: symkey-key@0x2aa3f9130b0 (16-bytes, EXTRACT_KEY_FROM_KEY) 635s | RFC 3566 Test Case 5: AES-XCBC-MAC-96 with 32-byte input extracting all 16 bytes of key@0x2aa3f9130b0 635s | RFC 3566 Test Case 5: AES-XCBC-MAC-96 with 32-byte input: symkey-key@0x2aa3f9130b0 (16-bytes, EXTRACT_KEY_FROM_KEY) 635s | sizeof bytes 16 635s | wrapper: (SECItemType)682: c3 bb 2b 8e 7b 67 ec 42 f6 1d 07 56 cb ba 09 e5 635s | RFC 3566 Test Case 5: AES-XCBC-MAC-96 with 32-byte input extracted len 16 bytes at 0x2aa3f9129a0 635s | unwrapped: 635s | f5 4f 0e c8 d2 b9 f3 d3 68 07 73 4b d5 28 3f d4 .O......h.sK.(?. 635s | verify_bytes() RFC 3566 Test Case 5: AES-XCBC-MAC-96 with 32-byte input: symkey: ok 635s ipsec algparse: RFC 3566 Test Case 6: AES-XCBC-MAC-96 with 34-byte input 635s | decode_to_chunk() test_prf_vector: input "0x000102030405060708090a0b0c0d0e0f" 635s | decode_to_chunk() output: 635s | 00 01 02 03 04 05 06 07 08 09 0a 0b 0c 0d 0e 0f ................ 635s | decode_to_chunk() test_prf_vector: input "0x000102030405060708090a0b0c0d0e0f101112131415161718191a1b1c1d1e1f2021" 635s | decode_to_chunk() output: 635s | 00 01 02 03 04 05 06 07 08 09 0a 0b 0c 0d 0e 0f ................ 635s | 10 11 12 13 14 15 16 17 18 19 1a 1b 1c 1d 1e 1f ................ 635s | 20 21 ! 635s | decode_to_chunk() test_prf_vector: input "0xbecbb3bccdb518a30677d5481fb6b4d8" 635s | decode_to_chunk() output: 635s | be cb b3 bc cd b5 18 a3 06 77 d5 48 1f b6 b4 d8 .........w.H.... 635s | PRF chunk interface PRF AES_XCBC init key hunk 0x2aa3f910ba0 (length 16) 635s | 00 01 02 03 04 05 06 07 08 09 0a 0b 0c 0d 0e 0f ................ 635s | CONCATENATE_DATA_AND_BASE: 635s | target: EXTRACT_KEY_FROM_KEY 635s | base: base-key@0x2aa3f90f350 (16-bytes, AES_KEY_GEN) 635s | params: 16-bytes@0x3ffeeff6f90 635s | key-offset: 0, key-size: 16 635s | EXTRACT_KEY_FROM_KEY: 635s | target: EXTRACT_KEY_FROM_KEY 635s | key_size: 16-bytes 635s | base: base-key@0x2aa3f912360 (32-bytes, EXTRACT_KEY_FROM_KEY) 635s | operation: FLAGS_ONLY 635s | params: 8-bytes@0x3ffeeff6ea0 635s | XCBC: Key 16=16 just right 635s | key-offset: 0, key-size: 16 635s | EXTRACT_KEY_FROM_KEY: 635s | target: AES_ECB 635s | flags: SIGN 635s | key_size: 16-bytes 635s | base: base-key@0x2aa3f9130b0 (16-bytes, EXTRACT_KEY_FROM_KEY) 635s | operation: FLAGS_ONLY 635s | params: 8-bytes@0x3ffeeff6e50 635s | PRF chunk interface PRF AES_XCBC 0x2aa3f90f2f0 635s | PRF chunk interface PRF AES_XCBC update message (0x2aa3f90f320 length 34) 635s | 00 01 02 03 04 05 06 07 08 09 0a 0b 0c 0d 0e 0f ................ 635s | 10 11 12 13 14 15 16 17 18 19 1a 1b 1c 1d 1e 1f ................ 635s | 20 21 ! 635s | XCBC: data 635s | 00 01 02 03 04 05 06 07 08 09 0a 0b 0c 0d 0e 0f ................ 635s | 10 11 12 13 14 15 16 17 18 19 1a 1b 1c 1d 1e 1f ................ 635s | 20 21 ! 635s | K extracting all 16 bytes of key@0x2aa3f912360 635s | K: symkey-key@0x2aa3f912360 (16-bytes, AES_ECB) 635s | sizeof bytes 16 635s | wrapper: (SECItemType)1111695477: cd c8 2d 15 00 b6 fa ec 42 85 22 53 10 74 03 62 635s | K extracted len 16 bytes at 0x2aa3f912f20 635s | unwrapped: 635s | 00 01 02 03 04 05 06 07 08 09 0a 0b 0c 0d 0e 0f ................ 635s | XCBC: K: 635s | 00 01 02 03 04 05 06 07 08 09 0a 0b 0c 0d 0e 0f ................ 635s | XCBC: K1 635s | c3 52 80 57 54 23 7f 31 1a c0 ff f4 e3 e0 3e 78 .R.WT#.1......>x 635s | CONCATENATE_DATA_AND_BASE: 635s | target: EXTRACT_KEY_FROM_KEY 635s | base: base-key@0x2aa3f90f350 (16-bytes, AES_KEY_GEN) 635s | params: 16-bytes@0x3ffeeff6d28 635s | key-offset: 0, key-size: 16 635s | EXTRACT_KEY_FROM_KEY: 635s | target: AES_ECB 635s | flags: SIGN 635s | key_size: 16-bytes 635s | base: base-key@0x2aa3f910c70 (32-bytes, EXTRACT_KEY_FROM_KEY) 635s | operation: FLAGS_ONLY 635s | params: 8-bytes@0x3ffeeff6d30 635s | Computing E[3] using K3 635s | XCBC: K3 635s | c1 a7 ab a1 a2 3a 94 06 58 07 a0 8c c8 ee d0 6e .....:..X......n 635s | XCBC: E[n-1] 635s | 09 02 5e 5a 67 25 20 72 44 14 5c 6b 80 66 85 79 ..^Zg% rD.\k.f.y 635s | XCBC: M[n] 635s | 20 21 ! 635s | XCBC: M[n] 635s | 20 21 ! 635s | XCBC: M[n]:80...^E[n-1]^K3 635s | e8 84 75 fb c5 1f b4 74 1c 13 fc e7 48 88 55 17 ..u....t....H.U. 635s | XCBC: MAC 635s | be cb b3 bc cd b5 18 a3 06 77 d5 48 1f b6 b4 d8 .........w.H.... 635s | PRF chunk interface PRF AES_XCBC final length 16 635s | be cb b3 bc cd b5 18 a3 06 77 d5 48 1f b6 b4 d8 .........w.H.... 635s | chunk output 635s | be cb b3 bc cd b5 18 a3 06 77 d5 48 1f b6 b4 d8 .........w.H.... 635s | verify_bytes() RFC 3566 Test Case 6: AES-XCBC-MAC-96 with 34-byte input: prf OUT: ok 635s | CONCATENATE_DATA_AND_BASE: 635s | target: EXTRACT_KEY_FROM_KEY 635s | base: base-key@0x2aa3f90f350 (16-bytes, AES_KEY_GEN) 635s | params: 16-bytes@0x3ffeeff70f8 635s | key-offset: 0, key-size: 16 635s | EXTRACT_KEY_FROM_KEY: 635s | target: EXTRACT_KEY_FROM_KEY 635s | key_size: 16-bytes 635s | base: base-key@0x2aa3f9130b0 (32-bytes, EXTRACT_KEY_FROM_KEY) 635s | operation: FLAGS_ONLY 635s | params: 8-bytes@0x3ffeeff7008 635s | PRF symkey interface PRF AES_XCBC init key symkey-key@0x2aa3f912360 (size 16) 635s | PRF symkey interface: key symkey-key@0x2aa3f912360 (16-bytes, EXTRACT_KEY_FROM_KEY) 635s | XCBC: Key 16=16 just right 635s | key-offset: 0, key-size: 16 635s | EXTRACT_KEY_FROM_KEY: 635s | target: AES_ECB 635s | flags: SIGN 635s | key_size: 16-bytes 635s | base: base-key@0x2aa3f912360 (16-bytes, EXTRACT_KEY_FROM_KEY) 635s | operation: FLAGS_ONLY 635s | params: 8-bytes@0x3ffeeff6f10 635s | PRF symkey interface PRF AES_XCBC 0x2aa3f90f2f0 635s | CONCATENATE_DATA_AND_BASE: 635s | target: EXTRACT_KEY_FROM_KEY 635s | base: base-key@0x2aa3f90f350 (16-bytes, AES_KEY_GEN) 635s | params: 16-bytes@0x3ffeeff70f8 635s | key-offset: 0, key-size: 34 635s | EXTRACT_KEY_FROM_KEY: 635s | target: EXTRACT_KEY_FROM_KEY 635s | key_size: 34-bytes 635s | base: base-key@0x2aa3f9133f0 (50-bytes, EXTRACT_KEY_FROM_KEY) 635s | operation: FLAGS_ONLY 635s | params: 8-bytes@0x3ffeeff7008 635s | PRF symkey interface PRF AES_XCBC update symkey message-key@0x2aa3f910c70 (size 34) 635s | PRF symkey interface: symkey message-key@0x2aa3f910c70 (34-bytes, EXTRACT_KEY_FROM_KEY) 635s | symkey message extracting all 34 bytes of key@0x2aa3f910c70 635s | symkey message: symkey-key@0x2aa3f910c70 (34-bytes, EXTRACT_KEY_FROM_KEY) 635s | sizeof bytes 48 635s | wrapper: (SECItemType)682: cd c8 2d 15 00 b6 fa ec 42 85 22 53 10 74 03 62 27 fd dc 41 eb bb 70 6d 99 e9 fe 08 34 72 63 32 45 91 aa ea 1a ad 9f 91 d7 96 5a 49 56 75 3e 3b 635s | symkey message extracted len 48 bytes at 0x2aa3f9129c0 635s | unwrapped: 635s | 00 01 02 03 04 05 06 07 08 09 0a 0b 0c 0d 0e 0f ................ 635s | 10 11 12 13 14 15 16 17 18 19 1a 1b 1c 1d 1e 1f ................ 635s | 20 21 00 00 00 00 00 00 00 00 00 00 00 00 00 00 !.............. 635s | XCBC: data 635s | 00 01 02 03 04 05 06 07 08 09 0a 0b 0c 0d 0e 0f ................ 635s | 10 11 12 13 14 15 16 17 18 19 1a 1b 1c 1d 1e 1f ................ 635s | 20 21 ! 635s | K extracting all 16 bytes of key@0x2aa3f9130b0 635s | K: symkey-key@0x2aa3f9130b0 (16-bytes, AES_ECB) 635s | sizeof bytes 16 635s | wrapper: (SECItemType)1023: cd c8 2d 15 00 b6 fa ec 42 85 22 53 10 74 03 62 635s | K extracted len 16 bytes at 0x2aa3f90f220 635s | unwrapped: 635s | 00 01 02 03 04 05 06 07 08 09 0a 0b 0c 0d 0e 0f ................ 635s | XCBC: K: 635s | 00 01 02 03 04 05 06 07 08 09 0a 0b 0c 0d 0e 0f ................ 635s | XCBC: K1 635s | c3 52 80 57 54 23 7f 31 1a c0 ff f4 e3 e0 3e 78 .R.WT#.1......>x 635s | CONCATENATE_DATA_AND_BASE: 635s | target: EXTRACT_KEY_FROM_KEY 635s | base: base-key@0x2aa3f90f350 (16-bytes, AES_KEY_GEN) 635s | params: 16-bytes@0x3ffeeff6d68 635s | key-offset: 0, key-size: 16 635s | EXTRACT_KEY_FROM_KEY: 635s | target: AES_ECB 635s | flags: SIGN 635s | key_size: 16-bytes 635s | base: base-key@0x2aa3f913750 (32-bytes, EXTRACT_KEY_FROM_KEY) 635s | operation: FLAGS_ONLY 635s | params: 8-bytes@0x3ffeeff6d70 635s | Computing E[3] using K3 635s | XCBC: K3 635s | c1 a7 ab a1 a2 3a 94 06 58 07 a0 8c c8 ee d0 6e .....:..X......n 635s | XCBC: E[n-1] 635s | 09 02 5e 5a 67 25 20 72 44 14 5c 6b 80 66 85 79 ..^Zg% rD.\k.f.y 635s | XCBC: M[n] 635s | 20 21 ! 635s | XCBC: M[n] 635s | 20 21 ! 635s | XCBC: M[n]:80...^E[n-1]^K3 635s | e8 84 75 fb c5 1f b4 74 1c 13 fc e7 48 88 55 17 ..u....t....H.U. 635s | XCBC: MAC 635s | be cb b3 bc cd b5 18 a3 06 77 d5 48 1f b6 b4 d8 .........w.H.... 635s | CONCATENATE_DATA_AND_BASE: 635s | target: EXTRACT_KEY_FROM_KEY 635s | base: base-key@0x2aa3f90f350 (16-bytes, AES_KEY_GEN) 635s | params: 16-bytes@0x3ffeeff6f80 635s | key-offset: 0, key-size: 16 635s | EXTRACT_KEY_FROM_KEY: 635s | target: EXTRACT_KEY_FROM_KEY 635s | key_size: 16-bytes 635s | base: base-key@0x2aa3f913750 (32-bytes, EXTRACT_KEY_FROM_KEY) 635s | operation: FLAGS_ONLY 635s | params: 8-bytes@0x3ffeeff6e90 635s | PRF symkey interface PRF AES_XCBC final-key@0x2aa3f9133f0 (size 16) 635s | PRF symkey interface: key-key@0x2aa3f9133f0 (16-bytes, EXTRACT_KEY_FROM_KEY) 635s | output: symkey-key@0x2aa3f9133f0 (16-bytes, EXTRACT_KEY_FROM_KEY) 635s | RFC 3566 Test Case 6: AES-XCBC-MAC-96 with 34-byte input extracting all 16 bytes of key@0x2aa3f9133f0 635s | RFC 3566 Test Case 6: AES-XCBC-MAC-96 with 34-byte input: symkey-key@0x2aa3f9133f0 (16-bytes, EXTRACT_KEY_FROM_KEY) 635s | sizeof bytes 16 635s | wrapper: (SECItemType)682: 23 63 0d 8e 4a fb e7 c2 c7 cb 72 c0 8d ea 23 fb 635s | RFC 3566 Test Case 6: AES-XCBC-MAC-96 with 34-byte input extracted len 16 bytes at 0x2aa3f912590 635s | unwrapped: 635s | be cb b3 bc cd b5 18 a3 06 77 d5 48 1f b6 b4 d8 .........w.H.... 635s | verify_bytes() RFC 3566 Test Case 6: AES-XCBC-MAC-96 with 34-byte input: symkey: ok 635s ipsec algparse: RFC 3566 Test Case 7: AES-XCBC-MAC-96 with 1000-byte input 635s | decode_to_chunk() test_prf_vector: input "0x000102030405060708090a0b0c0d0e0f" 635s | decode_to_chunk() output: 635s | 00 01 02 03 04 05 06 07 08 09 0a 0b 0c 0d 0e 0f ................ 635s | decode_to_chunk() test_prf_vector: input "0xf0dafee895db30253761103b5d84528f" 635s | decode_to_chunk() output: 635s | f0 da fe e8 95 db 30 25 37 61 10 3b 5d 84 52 8f ......0%7a.;].R. 635s | PRF chunk interface PRF AES_XCBC init key hunk 0x2aa3f9126b0 (length 16) 635s | 00 01 02 03 04 05 06 07 08 09 0a 0b 0c 0d 0e 0f ................ 635s | CONCATENATE_DATA_AND_BASE: 635s | target: EXTRACT_KEY_FROM_KEY 635s | base: base-key@0x2aa3f90f350 (16-bytes, AES_KEY_GEN) 635s | params: 16-bytes@0x3ffeeff6f90 635s | key-offset: 0, key-size: 16 635s | EXTRACT_KEY_FROM_KEY: 635s | target: EXTRACT_KEY_FROM_KEY 635s | key_size: 16-bytes 635s | base: base-key@0x2aa3f912360 (32-bytes, EXTRACT_KEY_FROM_KEY) 635s | operation: FLAGS_ONLY 635s | params: 8-bytes@0x3ffeeff6ea0 635s | XCBC: Key 16=16 just right 635s | key-offset: 0, key-size: 16 635s | EXTRACT_KEY_FROM_KEY: 635s | target: AES_ECB 635s | flags: SIGN 635s | key_size: 16-bytes 635s | base: base-key@0x2aa3f9133f0 (16-bytes, EXTRACT_KEY_FROM_KEY) 635s | operation: FLAGS_ONLY 635s | params: 8-bytes@0x3ffeeff6e50 635s | PRF chunk interface PRF AES_XCBC 0x2aa3f912d20 635s | PRF chunk interface PRF AES_XCBC update message (0x2aa3f910da0 length 1000) 635s | 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................ 635s | 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................ 635s | 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................ 635s | 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................ 635s | 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................ 635s | 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................ 635s | 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................ 635s | 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................ 635s | 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................ 635s | 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................ 635s | 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................ 635s | 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................ 635s | 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................ 635s | 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................ 635s | 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................ 635s | 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................ 635s | 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................ 635s | 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................ 635s | 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................ 635s | 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................ 635s | 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................ 635s | 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................ 635s | 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................ 635s | 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................ 635s | 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................ 635s | 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................ 635s | 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................ 635s | 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................ 635s | 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................ 635s | 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................ 635s | 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................ 635s | 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................ 635s | 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................ 635s | 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................ 635s | 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................ 635s | 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................ 635s | 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................ 635s | 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................ 635s | 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................ 635s | 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................ 635s | 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................ 635s | 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................ 635s | 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................ 635s | 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................ 635s | 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................ 635s | 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................ 635s | 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................ 635s | 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................ 635s | 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................ 635s | 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................ 635s | 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................ 635s | 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................ 635s | 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................ 635s | 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................ 635s | 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................ 635s | 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................ 635s | 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................ 635s | 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................ 635s | 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................ 635s | 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................ 635s | 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................ 635s | 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................ 635s | 00 00 00 00 00 00 00 00 ........ 635s | XCBC: data 635s | 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................ 635s | 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................ 635s | 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................ 635s | 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................ 635s | 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................ 635s | 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................ 635s | 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................ 635s | 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................ 635s | 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................ 635s | 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................ 635s | 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................ 635s | 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................ 635s | 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................ 635s | 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................ 635s | 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................ 635s | 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................ 635s | 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................ 635s | 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................ 635s | 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................ 635s | 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................ 635s | 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................ 635s | 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................ 635s | 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................ 635s | 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................ 635s | 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................ 635s | 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................ 635s | 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................ 635s | 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................ 635s | 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................ 635s | 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................ 635s | 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................ 635s | 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................ 635s | 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................ 635s | 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................ 635s | 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................ 635s | 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................ 635s | 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................ 635s | 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................ 635s | 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................ 635s | 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................ 635s | 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................ 635s | 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................ 635s | 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................ 635s | 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................ 635s | 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................ 635s | 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................ 635s | 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................ 635s | 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................ 635s | 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................ 635s | 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................ 635s | 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................ 635s | 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................ 635s | 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................ 635s | 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................ 635s | 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................ 635s | 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................ 635s | 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................ 635s | 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................ 635s | 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................ 635s | 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................ 635s | 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................ 635s | 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................ 635s | 00 00 00 00 00 00 00 00 ........ 635s | K extracting all 16 bytes of key@0x2aa3f912360 635s | K: symkey-key@0x2aa3f912360 (16-bytes, AES_ECB) 635s | sizeof bytes 16 635s | wrapper: (SECItemType)1111695477: cd c8 2d 15 00 b6 fa ec 42 85 22 53 10 74 03 62 635s | K extracted len 16 bytes at 0x2aa3f90f220 635s | unwrapped: 635s | 00 01 02 03 04 05 06 07 08 09 0a 0b 0c 0d 0e 0f ................ 635s | XCBC: K: 635s | 00 01 02 03 04 05 06 07 08 09 0a 0b 0c 0d 0e 0f ................ 635s | XCBC: K1 635s | c3 52 80 57 54 23 7f 31 1a c0 ff f4 e3 e0 3e 78 .R.WT#.1......>x 635s | CONCATENATE_DATA_AND_BASE: 635s | target: EXTRACT_KEY_FROM_KEY 635s | base: base-key@0x2aa3f90f350 (16-bytes, AES_KEY_GEN) 635s | params: 16-bytes@0x3ffeeff6d28 635s | key-offset: 0, key-size: 16 635s | EXTRACT_KEY_FROM_KEY: 635s | target: AES_ECB 635s | flags: SIGN 635s | key_size: 16-bytes 635s | base: base-key@0x2aa3f910c70 (32-bytes, EXTRACT_KEY_FROM_KEY) 635s | operation: FLAGS_ONLY 635s | params: 8-bytes@0x3ffeeff6d30 635s | Computing E[63] using K3 635s | XCBC: K3 635s | c1 a7 ab a1 a2 3a 94 06 58 07 a0 8c c8 ee d0 6e .....:..X......n 635s | XCBC: E[n-1] 635s | 5c 88 af cc 1e 1e 83 fc c4 2c 0c e4 12 12 f5 17 \........,...... 635s | XCBC: M[n] 635s | 00 00 00 00 00 00 00 00 ........ 635s | XCBC: M[n] 635s | 00 00 00 00 00 00 00 00 ........ 635s | XCBC: M[n]:80...^E[n-1]^K3 635s | 9d 2f 04 6d bc 24 17 fa 1c 2b ac 68 da fc 25 79 ./.m.$...+.h..%y 635s | XCBC: MAC 635s | f0 da fe e8 95 db 30 25 37 61 10 3b 5d 84 52 8f ......0%7a.;].R. 635s | PRF chunk interface PRF AES_XCBC final length 16 635s | f0 da fe e8 95 db 30 25 37 61 10 3b 5d 84 52 8f ......0%7a.;].R. 635s | chunk output 635s | f0 da fe e8 95 db 30 25 37 61 10 3b 5d 84 52 8f ......0%7a.;].R. 635s | verify_bytes() RFC 3566 Test Case 7: AES-XCBC-MAC-96 with 1000-byte input: prf OUT: ok 635s | CONCATENATE_DATA_AND_BASE: 635s | target: EXTRACT_KEY_FROM_KEY 635s | base: base-key@0x2aa3f90f350 (16-bytes, AES_KEY_GEN) 635s | params: 16-bytes@0x3ffeeff70f8 635s | key-offset: 0, key-size: 16 635s | EXTRACT_KEY_FROM_KEY: 635s | target: EXTRACT_KEY_FROM_KEY 635s | key_size: 16-bytes 635s | base: base-key@0x2aa3f9133f0 (32-bytes, EXTRACT_KEY_FROM_KEY) 635s | operation: FLAGS_ONLY 635s | params: 8-bytes@0x3ffeeff7008 635s | PRF symkey interface PRF AES_XCBC init key symkey-key@0x2aa3f912360 (size 16) 635s | PRF symkey interface: key symkey-key@0x2aa3f912360 (16-bytes, EXTRACT_KEY_FROM_KEY) 635s | XCBC: Key 16=16 just right 635s | key-offset: 0, key-size: 16 635s | EXTRACT_KEY_FROM_KEY: 635s | target: AES_ECB 635s | flags: SIGN 635s | key_size: 16-bytes 635s | base: base-key@0x2aa3f912360 (16-bytes, EXTRACT_KEY_FROM_KEY) 635s | operation: FLAGS_ONLY 635s | params: 8-bytes@0x3ffeeff6f10 635s | PRF symkey interface PRF AES_XCBC 0x2aa3f912d20 635s | CONCATENATE_DATA_AND_BASE: 635s | target: EXTRACT_KEY_FROM_KEY 635s | base: base-key@0x2aa3f90f350 (16-bytes, AES_KEY_GEN) 635s | params: 16-bytes@0x3ffeeff70f8 635s | key-offset: 0, key-size: 1000 635s | EXTRACT_KEY_FROM_KEY: 635s | target: EXTRACT_KEY_FROM_KEY 635s | key_size: 1000-bytes 635s | base: base-key@0x2aa3f9130b0 (1016-bytes, EXTRACT_KEY_FROM_KEY) 635s | operation: FLAGS_ONLY 635s | params: 8-bytes@0x3ffeeff7008 635s | PRF symkey interface PRF AES_XCBC update symkey message-key@0x2aa3f910c70 (size 1000) 635s | PRF symkey interface: symkey message-key@0x2aa3f910c70 (1000-bytes, EXTRACT_KEY_FROM_KEY) 635s | symkey message extracting all 1000 bytes of key@0x2aa3f910c70 635s | symkey message: symkey-key@0x2aa3f910c70 (1000-bytes, EXTRACT_KEY_FROM_KEY) 635s | sizeof bytes 1008 635s | wrapper: (SECItemType)682: c3 a8 bc 1f b6 f8 47 9b ff e0 72 0e 91 39 f7 13 c3 a8 bc 1f b6 f8 47 9b ff e0 72 0e 91 39 f7 13 c3 a8 bc 1f b6 f8 47 9b ff e0 72 0e 91 39 f7 13 c3 a8 bc 1f b6 f8 47 9b ff e0 72 0e 91 39 f7 13 c3 a8 bc 1f b6 f8 47 9b ff e0 72 0e 91 39 f7 13 c3 a8 bc 1f b6 f8 47 9b ff e0 72 0e 91 39 f7 13 c3 a8 bc 1f b6 f8 47 9b ff e0 72 0e 91 39 f7 13 c3 a8 bc 1f b6 f8 47 9b ff e0 72 0e 91 39 f7 13 c3 a8 bc 1f b6 f8 47 9b ff e0 72 0e 91 39 f7 13 c3 a8 bc 1f b6 f8 47 9b ff e0 72 0e 91 39 f7 13 c3 a8 bc 1f b6 f8 47 9b ff e0 72 0e 91 39 f7 13 c3 a8 bc 1f b6 f8 47 9b ff e0 72 0e 91 39 f7 13 c3 a8 bc 1f b6 f8 47 9b ff e0 72 0e 91 39 f7 13 c3 a8 bc 1f b6 f8 47 9b ff e0 72 0e 91 39 f7 13 c3 a8 bc 1f b6 f8 47 9b ff e0 72 0e 91 39 f7 13 c3 a8 bc 1f b6 f8 47 9b ff e0 72 0e 91 39 f7 13 c3 a8 bc 1f b6 f8 47 9b ff e0 72 0e 91 39 f7 13 c3 a8 bc 1f b6 f8 47 9b ff e0 72 0e 91 39 f7 13 c3 a8 bc 1f b6 f8 47 9b ff e0 72 0e 91 39 f7 13 c3... 635s | symkey message extracted len 1008 bytes at 0x2aa3f911980 635s | unwrapped: 635s | 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................ 635s | 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................ 635s | 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................ 635s | 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................ 635s | 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................ 635s | 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................ 635s | 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................ 635s | 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................ 635s | 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................ 635s | 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................ 635s | 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................ 635s | 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................ 635s | 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................ 635s | 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................ 635s | 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................ 635s | 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................ 635s | 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................ 635s | 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................ 635s | 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................ 635s | 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................ 635s | 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................ 635s | 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................ 635s | 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................ 635s | 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................ 635s | 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................ 635s | 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................ 635s | 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................ 635s | 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................ 635s | 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................ 635s | 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................ 635s | 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................ 635s | 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................ 635s | 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................ 635s | 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................ 635s | 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................ 635s | 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................ 635s | 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................ 635s | 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................ 635s | 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................ 635s | 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................ 635s | 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................ 635s | 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................ 635s | 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................ 635s | 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................ 635s | 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................ 635s | 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................ 635s | 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................ 635s | 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................ 635s | 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................ 635s | 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................ 635s | 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................ 635s | 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................ 635s | 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................ 635s | 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................ 635s | 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................ 635s | 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................ 635s | 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................ 635s | 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................ 635s | 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................ 635s | 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................ 635s | 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................ 635s | 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................ 635s | 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................ 635s | XCBC: data 635s | 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................ 635s | 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................ 635s | 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................ 635s | 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................ 635s | 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................ 635s | 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................ 635s | 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................ 635s | 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................ 635s | 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................ 635s | 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................ 635s | 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................ 635s | 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................ 635s | 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................ 635s | 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................ 635s | 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................ 635s | 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................ 635s | 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................ 635s | 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................ 635s | 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................ 635s | 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 .........initializing NSS db 635s ....... 635s | 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................ 635s | 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................ 635s | 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................ 635s | 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................ 635s | 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................ 635s | 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................ 635s | 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................ 635s | 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................ 635s | 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................ 635s | 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................ 635s | 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................ 635s | 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................ 635s | 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................ 635s | 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................ 635s | 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................ 635s | 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................ 635s | 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................ 635s | 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................ 635s | 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................ 635s | 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................ 635s | 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................ 635s | 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................ 635s | 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................ 635s | 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................ 635s | 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................ 635s | 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................ 635s | 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................ 635s | 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................ 635s | 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................ 635s | 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................ 635s | 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................ 635s | 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................ 635s | 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................ 635s | 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................ 635s | 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................ 635s | 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................ 635s | 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................ 635s | 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................ 635s | 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................ 635s | 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................ 635s | 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................ 635s | 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................ 635s | 00 00 00 00 00 00 00 00 ........ 635s | K extracting all 16 bytes of key@0x2aa3f9133f0 635s | K: symkey-key@0x2aa3f9133f0 (16-bytes, AES_ECB) 635s | sizeof bytes 16 635s | wrapper: (SECItemType)1023: cd c8 2d 15 00 b6 fa ec 42 85 22 53 10 74 03 62 635s | K extracted len 16 bytes at 0x2aa3f912f20 635s | unwrapped: 635s | 00 01 02 03 04 05 06 07 08 09 0a 0b 0c 0d 0e 0f ................ 635s | XCBC: K: 635s | 00 01 02 03 04 05 06 07 08 09 0a 0b 0c 0d 0e 0f ................ 635s | XCBC: K1 635s | c3 52 80 57 54 23 7f 31 1a c0 ff f4 e3 e0 3e 78 .R.WT#.1......>x 635s | CONCATENATE_DATA_AND_BASE: 635s | target: EXTRACT_KEY_FROM_KEY 635s | base: base-key@0x2aa3f90f350 (16-bytes, AES_KEY_GEN) 635s | params: 16-bytes@0x3ffeeff6d68 635s | key-offset: 0, key-size: 16 635s | EXTRACT_KEY_FROM_KEY: 635s | target: AES_ECB 635s | flags: SIGN 635s | key_size: 16-bytes 635s | base: base-key@0x2aa3f913750 (32-bytes, EXTRACT_KEY_FROM_KEY) 635s | operation: FLAGS_ONLY 635s | params: 8-bytes@0x3ffeeff6d70 635s | Computing E[63] using K3 635s | XCBC: K3 635s | c1 a7 ab a1 a2 3a 94 06 58 07 a0 8c c8 ee d0 6e .....:..X......n 635s | XCBC: E[n-1] 635s | 5c 88 af cc 1e 1e 83 fc c4 2c 0c e4 12 12 f5 17 \........,...... 635s | XCBC: M[n] 635s | 00 00 00 00 00 00 00 00 ........ 635s | XCBC: M[n] 635s | 00 00 00 00 00 00 00 00 ........ 635s | XCBC: M[n]:80...^E[n-1]^K3 635s | 9d 2f 04 6d bc 24 17 fa 1c 2b ac 68 da fc 25 79 ./.m.$...+.h..%y 635s | XCBC: MAC 635s | f0 da fe e8 95 db 30 25 37 61 10 3b 5d 84 52 8f ......0%7a.;].R. 635s | CONCATENATE_DATA_AND_BASE: 635s | target: EXTRACT_KEY_FROM_KEY 635s | base: base-key@0x2aa3f90f350 (16-bytes, AES_KEY_GEN) 635s | params: 16-bytes@0x3ffeeff6f80 635s | key-offset: 0, key-size: 16 635s | EXTRACT_KEY_FROM_KEY: 635s | target: EXTRACT_KEY_FROM_KEY 635s | key_size: 16-bytes 635s | base: base-key@0x2aa3f913750 (32-bytes, EXTRACT_KEY_FROM_KEY) 635s | operation: FLAGS_ONLY 635s | params: 8-bytes@0x3ffeeff6e90 635s | PRF symkey interface PRF AES_XCBC final-key@0x2aa3f9130b0 (size 16) 635s | PRF symkey interface: key-key@0x2aa3f9130b0 (16-bytes, EXTRACT_KEY_FROM_KEY) 635s | output: symkey-key@0x2aa3f9130b0 (16-bytes, EXTRACT_KEY_FROM_KEY) 635s | RFC 3566 Test Case 7: AES-XCBC-MAC-96 with 1000-byte input extracting all 16 bytes of key@0x2aa3f9130b0 635s | RFC 3566 Test Case 7: AES-XCBC-MAC-96 with 1000-byte input: symkey-key@0x2aa3f9130b0 (16-bytes, EXTRACT_KEY_FROM_KEY) 635s | sizeof bytes 16 635s | wrapper: (SECItemType)682: b4 1e 12 b4 9d b4 85 a6 66 ff ac fe 20 1f 93 16 635s | RFC 3566 Test Case 7: AES-XCBC-MAC-96 with 1000-byte input extracted len 16 bytes at 0x2aa3f9129a0 635s | unwrapped: 635s | f0 da fe e8 95 db 30 25 37 61 10 3b 5d 84 52 8f ......0%7a.;].R. 635s | verify_bytes() RFC 3566 Test Case 7: AES-XCBC-MAC-96 with 1000-byte input: symkey: ok 635s ipsec algparse: RFC 4434 Test Case AES-XCBC-PRF-128 with 20-byte input (key length 16) 635s | decode_to_chunk() test_prf_vector: input "0x000102030405060708090a0b0c0d0e0f" 635s | decode_to_chunk() output: 635s | 00 01 02 03 04 05 06 07 08 09 0a 0b 0c 0d 0e 0f ................ 635s | decode_to_chunk() test_prf_vector: input "0x000102030405060708090a0b0c0d0e0f10111213" 635s | decode_to_chunk() output: 635s | 00 01 02 03 04 05 06 07 08 09 0a 0b 0c 0d 0e 0f ................ 635s | 10 11 12 13 .... 635s | decode_to_chunk() test_prf_vector: input "0x47f51b4564966215b8985c63055ed308" 635s | decode_to_chunk() output: 635s | 47 f5 1b 45 64 96 62 15 b8 98 5c 63 05 5e d3 08 G..Ed.b...\c.^.. 635s | PRF chunk interface PRF AES_XCBC init key hunk 0x2aa3f912690 (length 16) 635s | 00 01 02 03 04 05 06 07 08 09 0a 0b 0c 0d 0e 0f ................ 635s | CONCATENATE_DATA_AND_BASE: 635s | target: EXTRACT_KEY_FROM_KEY 635s | base: base-key@0x2aa3f90f350 (16-bytes, AES_KEY_GEN) 635s | params: 16-bytes@0x3ffeeff6f90 635s | key-offset: 0, key-size: 16 635s | EXTRACT_KEY_FROM_KEY: 635s | target: EXTRACT_KEY_FROM_KEY 635s | key_size: 16-bytes 635s | base: base-key@0x2aa3f912360 (32-bytes, EXTRACT_KEY_FROM_KEY) 635s | operation: FLAGS_ONLY 635s | params: 8-bytes@0x3ffeeff6ea0 635s | XCBC: Key 16=16 just right 635s | key-offset: 0, key-size: 16 635s | EXTRACT_KEY_FROM_KEY: 635s | target: AES_ECB 635s | flags: SIGN 635s | key_size: 16-bytes 635s | base: base-key@0x2aa3f9130b0 (16-bytes, EXTRACT_KEY_FROM_KEY) 635s | operation: FLAGS_ONLY 635s | params: 8-bytes@0x3ffeeff6e50 635s | PRF chunk interface PRF AES_XCBC 0x2aa3f912d20 635s | PRF chunk interface PRF AES_XCBC update message (0x2aa3f910ba0 length 20) 635s | 00 01 02 03 04 05 06 07 08 09 0a 0b 0c 0d 0e 0f ................ 635s | 10 11 12 13 .... 635s | XCBC: data 635s | 00 01 02 03 04 05 06 07 08 09 0a 0b 0c 0d 0e 0f ................ 635s | 10 11 12 13 .... 635s | K extracting all 16 bytes of key@0x2aa3f912360 635s | K: symkey-key@0x2aa3f912360 (16-bytes, AES_ECB) 635s | sizeof bytes 16 635s | wrapper: (SECItemType)1111695477: cd c8 2d 15 00 b6 fa ec 42 85 22 53 10 74 03 62 635s | K extracted len 16 bytes at 0x2aa3f913730 635s | unwrapped: 635s | 00 01 02 03 04 05 06 07 08 09 0a 0b 0c 0d 0e 0f ................ 635s | XCBC: K: 635s | 00 01 02 03 04 05 06 07 08 09 0a 0b 0c 0d 0e 0f ................ 635s | XCBC: K1 635s | c3 52 80 57 54 23 7f 31 1a c0 ff f4 e3 e0 3e 78 .R.WT#.1......>x 635s | CONCATENATE_DATA_AND_BASE: 635s | target: EXTRACT_KEY_FROM_KEY 635s | base: base-key@0x2aa3f90f350 (16-bytes, AES_KEY_GEN) 635s | params: 16-bytes@0x3ffeeff6d28 635s | key-offset: 0, key-size: 16 635s | EXTRACT_KEY_FROM_KEY: 635s | target: AES_ECB 635s | flags: SIGN 635s | key_size: 16-bytes 635s | base: base-key@0x2aa3f910c70 (32-bytes, EXTRACT_KEY_FROM_KEY) 635s | operation: FLAGS_ONLY 635s | params: 8-bytes@0x3ffeeff6d30 635s | Computing E[2] using K3 635s | XCBC: K3 635s | c1 a7 ab a1 a2 3a 94 06 58 07 a0 8c c8 ee d0 6e .....:..X......n 635s | XCBC: E[n-1] 635s | 1d 04 48 fa cf 4d 9c 6f 55 b9 93 da 09 80 3d b3 ..H..M.oU.....=. 635s | XCBC: M[n] 635s | 10 11 12 13 .... 635s | XCBC: M[n] 635s | 10 11 12 13 .... 635s | XCBC: M[n]:80...^E[n-1]^K3 635s | cc b2 f1 48 ed 77 08 69 0d be 33 56 c1 6e ed dd ...H.w.i..3V.n.. 635s | XCBC: MAC 635s | 47 f5 1b 45 64 96 62 15 b8 98 5c 63 05 5e d3 08 G..Ed.b...\c.^.. 635s | PRF chunk interface PRF AES_XCBC final length 16 635s | 47 f5 1b 45 64 96 62 15 b8 98 5c 63 05 5e d3 08 G..Ed.b...\c.^.. 635s | chunk output 635s | 47 f5 1b 45 64 96 62 15 b8 98 5c 63 05 5e d3 08 G..Ed.b...\c.^.. 635s | verify_bytes() RFC 4434 Test Case AES-XCBC-PRF-128 with 20-byte input (key length 16): prf OUT: ok 635s | CONCATENATE_DATA_AND_BASE: 635s | target: EXTRACT_KEY_FROM_KEY 635s | base: base-key@0x2aa3f90f350 (16-bytes, AES_KEY_GEN) 635s | params: 16-bytes@0x3ffeeff70f8 635s | key-offset: 0, key-size: 16 635s | EXTRACT_KEY_FROM_KEY: 635s | target: EXTRACT_KEY_FROM_KEY 635s | key_size: 16-bytes 635s | base: base-key@0x2aa3f9130b0 (32-bytes, EXTRACT_KEY_FROM_KEY) 635s | operation: FLAGS_ONLY 635s | params: 8-bytes@0x3ffeeff7008 635s | PRF symkey interface PRF AES_XCBC init key symkey-key@0x2aa3f912360 (size 16) 635s | PRF symkey interface: key symkey-key@0x2aa3f912360 (16-bytes, EXTRACT_KEY_FROM_KEY) 635s | XCBC: Key 16=16 just right 635s | key-offset: 0, key-size: 16 635s | EXTRACT_KEY_FROM_KEY: 635s | target: AES_ECB 635s | flags: SIGN 635s | key_size: 16-bytes 635s | base: base-key@0x2aa3f912360 (16-bytes, EXTRACT_KEY_FROM_KEY) 635s | operation: FLAGS_ONLY 635s | params: 8-bytes@0x3ffeeff6f10 635s | PRF symkey interface PRF AES_XCBC 0x2aa3f912d20 635s | CONCATENATE_DATA_AND_BASE: 635s | target: EXTRACT_KEY_FROM_KEY 635s | base: base-key@0x2aa3f90f350 (16-bytes, AES_KEY_GEN) 635s | params: 16-bytes@0x3ffeeff70f8 635s | key-offset: 0, key-size: 20 635s | EXTRACT_KEY_FROM_KEY: 635s | target: EXTRACT_KEY_FROM_KEY 635s | key_size: 20-bytes 635s | base: base-key@0x2aa3f9133f0 (36-bytes, EXTRACT_KEY_FROM_KEY) 635s | operation: FLAGS_ONLY 635s | params: 8-bytes@0x3ffeeff7008 635s | PRF symkey interface PRF AES_XCBC update symkey message-key@0x2aa3f910c70 (size 20) 635s | PRF symkey interface: symkey message-key@0x2aa3f910c70 (20-bytes, EXTRACT_KEY_FROM_KEY) 635s | symkey message extracting all 20 bytes of key@0x2aa3f910c70 635s | symkey message: symkey-key@0x2aa3f910c70 (20-bytes, EXTRACT_KEY_FROM_KEY) 635s | sizeof bytes 32 635s | wrapper: (SECItemType)682: cd c8 2d 15 00 b6 fa ec 42 85 22 53 10 74 03 62 e1 8d 4c f0 b3 18 08 88 eb 6e 62 38 f0 f1 97 b0 635s | symkey message extracted len 32 bytes at 0x2aa3f90f2f0 635s | unwrapped: 635s | 00 01 02 03 04 05 06 07 08 09 0a 0b 0c 0d 0e 0f ................ 635s | 10 11 12 13 00 00 00 00 00 00 00 00 00 00 00 00 ................ 635s | XCBC: data 635s | 00 01 02 03 04 05 06 07 08 09 0a 0b 0c 0d 0e 0f ................ 635s | 10 11 12 13 .... 635s | K extracting all 16 bytes of key@0x2aa3f9130b0 635s | K: symkey-key@0x2aa3f9130b0 (16-bytes, AES_ECB) 635s | sizeof bytes 16 635s | wrapper: (SECItemType)1023: cd c8 2d 15 00 b6 fa ec 42 85 22 53 10 74 03 62 635s | K extracted len 16 bytes at 0x2aa3f90f220 635s | unwrapped: 635s | 00 01 02 03 04 05 06 07 08 09 0a 0b 0c 0d 0e 0f ................ 635s | XCBC: K: 635s | 00 01 02 03 04 05 06 07 08 09 0a 0b 0c 0d 0e 0f ................ 635s | XCBC: K1 635s | c3 52 80 57 54 23 7f 31 1a c0 ff f4 e3 e0 3e 78 .R.WT#.1......>x 635s | CONCATENATE_DATA_AND_BASE: 635s | target: EXTRACT_KEY_FROM_KEY 635s | base: base-key@0x2aa3f90f350 (16-bytes, AES_KEY_GEN) 635s | params: 16-bytes@0x3ffeeff6d68 635s | key-offset: 0, key-size: 16 635s | EXTRACT_KEY_FROM_KEY: 635s | target: AES_ECB 635s | flags: SIGN 635s | key_size: 16-bytes 635s | base: base-key@0x2aa3f913750 (32-bytes, EXTRACT_KEY_FROM_KEY) 635s | operation: FLAGS_ONLY 635s | params: 8-bytes@0x3ffeeff6d70 635s | Computing E[2] using K3 635s | XCBC: K3 635s | c1 a7 ab a1 a2 3a 94 06 58 07 a0 8c c8 ee d0 6e .....:..X......n 635s | XCBC: E[n-1] 635s | 1d 04 48 fa cf 4d 9c 6f 55 b9 93 da 09 80 3d b3 ..H..M.oU.....=. 635s | XCBC: M[n] 635s | 10 11 12 13 .... 635s | XCBC: M[n] 635s | 10 11 12 13 .... 635s | XCBC: M[n]:80...^E[n-1]^K3 635s | cc b2 f1 48 ed 77 08 69 0d be 33 56 c1 6e ed dd ...H.w.i..3V.n.. 635s | XCBC: MAC 635s | 47 f5 1b 45 64 96 62 15 b8 98 5c 63 05 5e d3 08 G..Ed.b...\c.^.. 635s | CONCATENATE_DATA_AND_BASE: 635s | target: EXTRACT_KEY_FROM_KEY 635s | base: base-key@0x2aa3f90f350 (16-bytes, AES_KEY_GEN) 635s | params: 16-bytes@0x3ffeeff6f80 635s | key-offset: 0, key-size: 16 635s | EXTRACT_KEY_FROM_KEY: 635s | target: EXTRACT_KEY_FROM_KEY 635s | key_size: 16-bytes 635s | base: base-key@0x2aa3f913750 (32-bytes, EXTRACT_KEY_FROM_KEY) 635s | operation: FLAGS_ONLY 635s | params: 8-bytes@0x3ffeeff6e90 635s | PRF symkey interface PRF AES_XCBC final-key@0x2aa3f9133f0 (size 16) 635s | PRF symkey interface: key-key@0x2aa3f9133f0 (16-bytes, EXTRACT_KEY_FROM_KEY) 635s | output: symkey-key@0x2aa3f9133f0 (16-bytes, EXTRACT_KEY_FROM_KEY) 635s | RFC 4434 Test Case AES-XCBC-PRF-128 with 20-byte input (key length 16) extracting all 16 bytes of key@0x2aa3f9133f0 635s | RFC 4434 Test Case AES-XCBC-PRF-128 with 20-byte input (key length 16): symkey-key@0x2aa3f9133f0 (16-bytes, EXTRACT_KEY_FROM_KEY) 635s | sizeof bytes 16 635s | wrapper: (SECItemType)682: ff a0 76 c1 d9 c2 bf 13 64 5c 7f 25 d5 ca bf 93 635s | RFC 4434 Test Case AES-XCBC-PRF-128 with 20-byte input (key length 16) extracted len 16 bytes at 0x2aa3f90f220 635s | unwrapped: 635s | 47 f5 1b 45 64 96 62 15 b8 98 5c 63 05 5e d3 08 G..Ed.b...\c.^.. 635s | verify_bytes() RFC 4434 Test Case AES-XCBC-PRF-128 with 20-byte input (key length 16): symkey: ok 635s ipsec algparse: RFC 4434 Test Case AES-XCBC-PRF-128 with 20-byte input (key length 10) 635s | decode_to_chunk() test_prf_vector: input "0x00010203040506070809" 635s | decode_to_chunk() output: 635s | 00 01 02 03 04 05 06 07 08 09 .......... 635s | decode_to_chunk() test_prf_vector: input "0x000102030405060708090a0b0c0d0e0f10111213" 635s | decode_to_chunk() output: 635s | 00 01 02 03 04 05 06 07 08 09 0a 0b 0c 0d 0e 0f ................ 635s | 10 11 12 13 .... 635s | decode_to_chunk() test_prf_vector: input "0x0fa087af7d866e7653434e602fdde835" 635s | decode_to_chunk() output: 635s | 0f a0 87 af 7d 86 6e 76 53 43 4e 60 2f dd e8 35 ....}.nvSCN`/..5 635s | PRF chunk interface PRF AES_XCBC init key hunk 0x2aa3f912690 (length 10) 635s | 00 01 02 03 04 05 06 07 08 09 .......... 635s | CONCATENATE_DATA_AND_BASE: 635s | target: EXTRACT_KEY_FROM_KEY 635s | base: base-key@0x2aa3f90f350 (16-bytes, AES_KEY_GEN) 635s | params: 16-bytes@0x3ffeeff6f90 635s | key-offset: 0, key-size: 10 635s | EXTRACT_KEY_FROM_KEY: 635s | target: EXTRACT_KEY_FROM_KEY 635s | key_size: 10-bytes 635s | base: base-key@0x2aa3f912360 (26-bytes, EXTRACT_KEY_FROM_KEY) 635s | operation: FLAGS_ONLY 635s | params: 8-bytes@0x3ffeeff6ea0 635s | XCBC: Key 10<16 too small, padding with zeros 635s | CONCATENATE_BASE_AND_DATA: 635s | target: EXTRACT_KEY_FROM_KEY 635s | base: base-key@0x2aa3f9133f0 (10-bytes, EXTRACT_KEY_FROM_KEY) 635s | params: 16-bytes@0x3ffeeff6e50 635s | key-offset: 0, key-size: 16 635s | EXTRACT_KEY_FROM_KEY: 635s | target: AES_ECB 635s | flags: SIGN 635s | key_size: 16-bytes 635s | base: base-key@0x2aa3f912360 (16-bytes, EXTRACT_KEY_FROM_KEY) 635s | operation: FLAGS_ONLY 635s | params: 8-bytes@0x3ffeeff6e50 635s | PRF chunk interface PRF AES_XCBC 0x2aa3f912d20 635s | PRF chunk interface PRF AES_XCBC update message (0x2aa3f910ba0 length 20) 635s | 00 01 02 03 04 05 06 07 08 09 0a 0b 0c 0d 0e 0f ................ 635s | 10 11 12 13 .... 635s | XCBC: data 635s | 00 01 02 03 04 05 06 07 08 09 0a 0b 0c 0d 0e 0f ................ 635s | 10 11 12 13 .... 635s | K extracting all 16 bytes of key@0x2aa3f910c70 635s | K: symkey-key@0x2aa3f910c70 (16-bytes, AES_ECB) 635s | sizeof bytes 16 635s | wrapper: (SECItemType)1111695477: 17 e7 d6 9e 2d 0a 63 3c b8 c3 eb f5 a1 ff 7b 4f 635s | K extracted len 16 bytes at 0x2aa3f9126b0 635s | unwrapped: 635s | 00 01 02 03 04 05 06 07 08 09 00 00 00 00 00 00 ................ 635s | XCBC: K: 635s | 00 01 02 03 04 05 06 07 08 09 00 00 00 00 00 00 ................ 635s | XCBC: K1 635s | 50 ca b2 4d 03 34 45 5e 40 7b 25 0f dd 7c f8 d5 P..M.4E^@{%..|.. 635s | CONCATENATE_DATA_AND_BASE: 635s | target: EXTRACT_KEY_FROM_KEY 635s | base: base-key@0x2aa3f90f350 (16-bytes, AES_KEY_GEN) 635s | params: 16-bytes@0x3ffeeff6d28 635s | key-offset: 0, key-size: 16 635s | EXTRACT_KEY_FROM_KEY: 635s | target: AES_ECB 635s | flags: SIGN 635s | key_size: 16-bytes 635s | base: base-key@0x2aa3f912360 (32-bytes, EXTRACT_KEY_FROM_KEY) 635s | operation: FLAGS_ONLY 635s | params: 8-bytes@0x3ffeeff6d30 635s | Computing E[2] using K3 635s | XCBC: K3 635s | 8e f7 48 db 56 f1 f7 26 24 72 f2 c5 63 b0 3f 88 ..H.V..&$r..c.?. 635s | XCBC: E[n-1] 635s | fe 1f 63 e9 65 1a 4b bb 3c cc cd 0d cc 83 e4 30 ..c.e.K.<......0 635s | XCBC: M[n] 635s | 10 11 12 13 .... 635s | XCBC: M[n] 635s | 10 11 12 13 .... 635s | XCBC: M[n]:80...^E[n-1]^K3 635s | 60 f9 39 21 b3 eb bc 9d 18 be 3f c8 af 33 db b8 `.9!......?..3.. 635s | XCBC: MAC 635s | 0f a0 87 af 7d 86 6e 76 53 43 4e 60 2f dd e8 35 ....}.nvSCN`/..5 635s | PRF chunk interface PRF AES_XCBC final length 16 635s | 0f a0 87 af 7d 86 6e 76 53 43 4e 60 2f dd e8 35 ....}.nvSCN`/..5 635s | chunk output 635s | 0f a0 87 af 7d 86 6e 76 53 43 4e 60 2f dd e8 35 ....}.nvSCN`/..5 635s | verify_bytes() RFC 4434 Test Case AES-XCBC-PRF-128 with 20-byte input (key length 10): prf OUT: ok 635s | CONCATENATE_DATA_AND_BASE: 635s | target: EXTRACT_KEY_FROM_KEY 635s | base: base-key@0x2aa3f90f350 (16-bytes, AES_KEY_GEN) 635s | params: 16-bytes@0x3ffeeff70f8 635s | key-offset: 0, key-size: 10 635s | EXTRACT_KEY_FROM_KEY: 635s | target: EXTRACT_KEY_FROM_KEY 635s | key_size: 10-bytes 635s | base: base-key@0x2aa3f9133f0 (26-bytes, EXTRACT_KEY_FROM_KEY) 635s | operation: FLAGS_ONLY 635s | params: 8-bytes@0x3ffeeff7008 635s | PRF symkey interface PRF AES_XCBC init key symkey-key@0x2aa3f910c70 (size 10) 635s | PRF symkey interface: key symkey-key@0x2aa3f910c70 (10-bytes, EXTRACT_KEY_FROM_KEY) 635s | XCBC: Key 10<16 too small, padding with zeros 635s | CONCATENATE_BASE_AND_DATA: 635s | target: EXTRACT_KEY_FROM_KEY 635s | base: base-key@0x2aa3f910c70 (10-bytes, EXTRACT_KEY_FROM_KEY) 635s | params: 16-bytes@0x3ffeeff6f10 635s | key-offset: 0, key-size: 16 635s | EXTRACT_KEY_FROM_KEY: 635s | target: AES_ECB 635s | flags: SIGN 635s | key_size: 16-bytes 635s | base: base-key@0x2aa3f9133f0 (16-bytes, EXTRACT_KEY_FROM_KEY) 635s | operation: FLAGS_ONLY 635s | params: 8-bytes@0x3ffeeff6f10 635s | PRF symkey interface PRF AES_XCBC 0x2aa3f912d20 635s | CONCATENATE_DATA_AND_BASE: 635s | target: EXTRACT_KEY_FROM_KEY 635s | base: base-key@0x2aa3f90f350 (16-bytes, AES_KEY_GEN) 635s | params: 16-bytes@0x3ffeeff70f8 635s | key-offset: 0, key-size: 20 635s | EXTRACT_KEY_FROM_KEY: 635s | target: EXTRACT_KEY_FROM_KEY 635s | key_size: 20-bytes 635s | base: base-key@0x2aa3f9130b0 (36-bytes, EXTRACT_KEY_FROM_KEY) 635s | operation: FLAGS_ONLY 635s | params: 8-bytes@0x3ffeeff7008 635s | PRF symkey interface PRF AES_XCBC update symkey message-key@0x2aa3f9133f0 (size 20) 635s | PRF symkey interface: symkey message-key@0x2aa3f9133f0 (20-bytes, EXTRACT_KEY_FROM_KEY) 635s | symkey message extracting all 20 bytes of key@0x2aa3f9133f0 635s | symkey message: symkey-key@0x2aa3f9133f0 (20-bytes, EXTRACT_KEY_FROM_KEY) 635s | sizeof bytes 32 635s | wrapper: (SECItemType)682: cd c8 2d 15 00 b6 fa ec 42 85 22 53 10 74 03 62 e1 8d 4c f0 b3 18 08 88 eb 6e 62 38 f0 f1 97 b0 635s | symkey message extracted len 32 bytes at 0x2aa3f90f320 635s | unwrapped: 635s | 00 01 02 03 04 05 06 07 08 09 0a 0b 0c 0d 0e 0f ................ 635s | 10 11 12 13 00 00 00 00 00 00 00 00 00 00 00 00 ................ 635s | XCBC: data 635s | 00 01 02 03 04 05 06 07 08 09 0a 0b 0c 0d 0e 0f ................ 635s | 10 11 12 13 .... 635s | K extracting all 16 bytes of key@0x2aa3f912360 635s | K: symkey-key@0x2aa3f912360 (16-bytes, AES_ECB) 635s | sizeof bytes 16 635s | wrapper: (SECItemType)1023: 17 e7 d6 9e 2d 0a 63 3c b8 c3 eb f5 a1 ff 7b 4f 635s | K extracted len 16 bytes at 0x2aa3f913090 635s | unwrapped: 635s | 00 01 02 03 04 05 06 07 08 09 00 00 00 00 00 00 ................ 635s | XCBC: K: 635s | 00 01 02 03 04 05 06 07 08 09 00 00 00 00 00 00 ................ 635s | XCBC: K1 635s | 50 ca b2 4d 03 34 45 5e 40 7b 25 0f dd 7c f8 d5 P..M.4E^@{%..|.. 635s | CONCATENATE_DATA_AND_BASE: 635s | target: EXTRACT_KEY_FROM_KEY 635s | base: base-key@0x2aa3f90f350 (16-bytes, AES_KEY_GEN) 635s | params: 16-bytes@0x3ffeeff6d68 635s | key-offset: 0, key-size: 16 635s | EXTRACT_KEY_FROM_KEY: 635s | target: AES_ECB 635s | flags: SIGN 635s | key_size: 16-bytes 635s | base: base-key@0x2aa3f913750 (32-bytes, EXTRACT_KEY_FROM_KEY) 635s | operation: FLAGS_ONLY 635s | params: 8-bytes@0x3ffeeff6d70 635s | Computing E[2] using K3 635s | XCBC: K3 635s | 8e f7 48 db 56 f1 f7 26 24 72 f2 c5 63 b0 3f 88 ..H.V..&$r..c.?. 635s | XCBC: E[n-1] 635s | fe 1f 63 e9 65 1a 4b bb 3c cc cd 0d cc 83 e4 30 ..c.e.K.<......0 635s | XCBC: M[n] 635s | 10 11 12 13 .... 635s | XCBC: M[n] 635s | 10 11 12 13 .... 635s | XCBC: M[n]:80...^E[n-1]^K3 635s | 60 f9 39 21 b3 eb bc 9d 18 be 3f c8 af 33 db b8 `.9!......?..3.. 635s | XCBC: MAC 635s | 0f a0 87 af 7d 86 6e 76 53 43 4e 60 2f dd e8 35 ....}.nvSCN`/..5 635s | CONCATENATE_DATA_AND_BASE: 635s | target: EXTRACT_KEY_FROM_KEY 635s | base: base-key@0x2aa3f90f350 (16-bytes, AES_KEY_GEN) 635s | params: 16-bytes@0x3ffeeff6f80 635s | key-offset: 0, key-size: 16 635s | EXTRACT_KEY_FROM_KEY: 635s | target: EXTRACT_KEY_FROM_KEY 635s | key_size: 16-bytes 635s | base: base-key@0x2aa3f913750 (32-bytes, EXTRACT_KEY_FROM_KEY) 635s | operation: FLAGS_ONLY 635s | params: 8-bytes@0x3ffeeff6e90 635s | PRF symkey interface PRF AES_XCBC final-key@0x2aa3f9130b0 (size 16) 635s | PRF symkey interface: key-key@0x2aa3f9130b0 (16-bytes, EXTRACT_KEY_FROM_KEY) 635s | output: symkey-key@0x2aa3f9130b0 (16-bytes, EXTRACT_KEY_FROM_KEY) 635s | RFC 4434 Test Case AES-XCBC-PRF-128 with 20-byte input (key length 10) extracting all 16 bytes of key@0x2aa3f9130b0 635s | RFC 4434 Test Case AES-XCBC-PRF-128 with 20-byte input (key length 10): symkey-key@0x2aa3f9130b0 (16-bytes, EXTRACT_KEY_FROM_KEY) 635s | sizeof bytes 16 635s | wrapper: (SECItemType)682: ef e4 de 29 3f 96 47 2d ef 9a b2 9c 43 97 4a e9 635s | RFC 4434 Test Case AES-XCBC-PRF-128 with 20-byte input (key length 10) extracted len 16 bytes at 0x2aa3f913090 635s | unwrapped: 635s | 0f a0 87 af 7d 86 6e 76 53 43 4e 60 2f dd e8 35 ....}.nvSCN`/..5 635s | verify_bytes() RFC 4434 Test Case AES-XCBC-PRF-128 with 20-byte input (key length 10): symkey: ok 635s ipsec algparse: RFC 4434 Test Case AES-XCBC-PRF-128 with 20-byte input (key length 18) 635s | decode_to_chunk() test_prf_vector: input "0x000102030405060708090a0b0c0d0e0fedcb" 635s | decode_to_chunk() output: 635s | 00 01 02 03 04 05 06 07 08 09 0a 0b 0c 0d 0e 0f ................ 635s | ed cb .. 635s | decode_to_chunk() test_prf_vector: input "0x000102030405060708090a0b0c0d0e0f10111213" 635s | decode_to_chunk() output: 635s | 00 01 02 03 04 05 06 07 08 09 0a 0b 0c 0d 0e 0f ................ 635s | 10 11 12 13 .... 635s | decode_to_chunk() test_prf_vector: input "0x8cd3c93ae598a9803006ffb67c40e9e4" 635s | decode_to_chunk() output: 635s | 8c d3 c9 3a e5 98 a9 80 30 06 ff b6 7c 40 e9 e4 ...:....0...|@.. 635s | PRF chunk interface PRF AES_XCBC init key hunk 0x2aa3f912690 (length 18) 635s | 00 01 02 03 04 05 06 07 08 09 0a 0b 0c 0d 0e 0f ................ 635s | ed cb .. 635s | CONCATENATE_DATA_AND_BASE: 635s | target: EXTRACT_KEY_FROM_KEY 635s | base: base-key@0x2aa3f90f350 (16-bytes, AES_KEY_GEN) 635s | params: 16-bytes@0x3ffeeff6f90 635s | key-offset: 0, key-size: 18 635s | EXTRACT_KEY_FROM_KEY: 635s | target: EXTRACT_KEY_FROM_KEY 635s | key_size: 18-bytes 635s | base: base-key@0x2aa3f910c70 (34-bytes, EXTRACT_KEY_FROM_KEY) 635s | operation: FLAGS_ONLY 635s | params: 8-bytes@0x3ffeeff6ea0 635s | XCBC: Key 18>16 too big, rehashing to size 635s | CONCATENATE_DATA_AND_BASE: 635s | target: EXTRACT_KEY_FROM_KEY 635s | base: base-key@0x2aa3f90f350 (16-bytes, AES_KEY_GEN) 635s | params: 16-bytes@0x3ffeeff6d98 635s | key-offset: 0, key-size: 16 635s | EXTRACT_KEY_FROM_KEY: 635s | target: AES_ECB 635s | flags: SIGN 635s | key_size: 16-bytes 635s | base: base-key@0x2aa3f9133f0 (32-bytes, EXTRACT_KEY_FROM_KEY) 635s | operation: FLAGS_ONLY 635s | params: 8-bytes@0x3ffeeff6da0 635s | draft_chunk extracting all 18 bytes of key@0x2aa3f9130b0 635s | draft_chunk: symkey-key@0x2aa3f9130b0 (18-bytes, EXTRACT_KEY_FROM_KEY) 635s | sizeof bytes 32 635s | wrapper: (SECItemType)682: cd c8 2d 15 00 b6 fa ec 42 85 22 53 10 74 03 62 58 13 fa 09 12 70 52 b4 75 03 19 ce f8 5f 5b ff 635s | draft_chunk extracted len 32 bytes at 0x2aa3f90f320 635s | unwrapped: 635s | 00 01 02 03 04 05 06 07 08 09 0a 0b 0c 0d 0e 0f ................ 635s | ed cb 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................ 635s | XCBC: data 635s | 00 01 02 03 04 05 06 07 08 09 0a 0b 0c 0d 0e 0f ................ 635s | ed cb .. 635s | K extracting all 16 bytes of key@0x2aa3f910c70 635s | K: symkey-key@0x2aa3f910c70 (16-bytes, AES_ECB) 635s | sizeof bytes 16 635s | wrapper: (SECItemType)1023: c3 a8 bc 1f b6 f8 47 9b ff e0 72 0e 91 39 f7 13 635s | K extracted len 16 bytes at 0x2aa3f913730 635s | unwrapped: 635s | 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................ 635s | XCBC: K: 635s | 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................ 635s | XCBC: K1 635s | e1 4d 5d 0e e2 77 15 df 08 b4 15 2b a2 3d a8 e0 .M]..w.....+.=.. 635s | CONCATENATE_DATA_AND_BASE: 635s | target: EXTRACT_KEY_FROM_KEY 635s | base: base-key@0x2aa3f90f350 (16-bytes, AES_KEY_GEN) 635s | params: 16-bytes@0x3ffeeff6c38 635s | key-offset: 0, key-size: 16 635s | EXTRACT_KEY_FROM_KEY: 635s | target: AES_ECB 635s | flags: SIGN 635s | key_size: 16-bytes 635s | base: base-key@0x2aa3f912360 (32-bytes, EXTRACT_KEY_FROM_KEY) 635s | operation: FLAGS_ONLY 635s | params: 8-bytes@0x3ffeeff6c40 635s | Computing E[2] using K3 635s | XCBC: K3 635s | 8d 34 ef cb 3b d5 45 ca 06 2a ec df ef 7c 0b fa .4..;.E..*...|.. 635s | XCBC: E[n-1] 635s | 0b 72 b2 ae 0a 37 79 81 75 6a d5 9c 79 c0 e6 96 .r...7y.uj..y... 635s | XCBC: M[n] 635s | ed cb .. 635s | XCBC: M[n] 635s | ed cb .. 635s | XCBC: M[n]:80...^E[n-1]^K3 635s | 6b 8d dd 65 31 e2 3c 4b 73 40 39 43 96 bc ed 6c k..e1.16 too big, rehashing to size 635s | CONCATENATE_DATA_AND_BASE: 635s | target: EXTRACT_KEY_FROM_KEY 635s | base: base-key@0x2aa3f90f350 (16-bytes, AES_KEY_GEN) 635s | params: 16-bytes@0x3ffeeff6e58 635s | key-offset: 0, key-size: 16 635s | EXTRACT_KEY_FROM_KEY: 635s | target: AES_ECB 635s | flags: SIGN 635s | key_size: 16-bytes 635s | base: base-key@0x2aa3f910c70 (32-bytes, EXTRACT_KEY_FROM_KEY) 635s | operation: FLAGS_ONLY 635s | params: 8-bytes@0x3ffeeff6e60 635s | draft_chunk extracting all 18 bytes of key@0x2aa3f9133f0 635s | draft_chunk: symkey-key@0x2aa3f9133f0 (18-bytes, EXTRACT_KEY_FROM_KEY) 635s | sizeof bytes 32 635s | wrapper: siBuffer: cd c8 2d 15 00 b6 fa ec 42 85 22 53 10 74 03 62 58 13 fa 09 12 70 52 b4 75 03 19 ce f8 5f 5b ff 635s | draft_chunk extracted len 32 bytes at 0x2aa3f912d20 635s | unwrapped: 635s | 00 01 02 03 04 05 06 07 08 09 0a 0b 0c 0d 0e 0f ................ 635s | ed cb 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................ 635s | XCBC: data 635s | 00 01 02 03 04 05 06 07 08 09 0a 0b 0c 0d 0e 0f ................ 635s | ed cb .. 635s | K extracting all 16 bytes of key@0x2aa3f9130b0 635s | K: symkey-key@0x2aa3f9130b0 (16-bytes, AES_ECB) 635s | sizeof bytes 16 635s | wrapper: (SECItemType)1023: c3 a8 bc 1f b6 f8 47 9b ff e0 72 0e 91 39 f7 13 635s | K extracted len 16 bytes at 0x2aa3f912590 635s | unwrapped: 635s | 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................ 635s | XCBC: K: 635s | 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................ 635s | XCBC: K1 635s | e1 4d 5d 0e e2 77 15 df 08 b4 15 2b a2 3d a8 e0 .M]..w.....+.=.. 635s | CONCATENATE_DATA_AND_BASE: 635s | target: EXTRACT_KEY_FROM_KEY 635s | base: base-key@0x2aa3f90f350 (16-bytes, AES_KEY_GEN) 635s | params: 16-bytes@0x3ffeeff6cf8 635s | key-offset: 0, key-size: 16 635s | EXTRACT_KEY_FROM_KEY: 635s | target: AES_ECB 635s | flags: SIGN 635s | key_size: 16-bytes 635s | base: base-key@0x2aa3f912360 (32-bytes, EXTRACT_KEY_FROM_KEY) 635s | operation: FLAGS_ONLY 635s | params: 8-bytes@0x3ffeeff6d00 635s | Computing E[2] using K3 635s | XCBC: K3 635s | 8d 34 ef cb 3b d5 45 ca 06 2a ec df ef 7c 0b fa .4..;.E..*...|.. 635s | XCBC: E[n-1] 635s | 0b 72 b2 ae 0a 37 79 81 75 6a d5 9c 79 c0 e6 96 .r...7y.uj..y... 635s | XCBC: M[n] 635s | ed cb .. 635s | XCBC: M[n] 635s | ed cb .. 635s | XCBC: M[n]:80...^E[n-1]^K3 635s | 6b 8d dd 65 31 e2 3c 4b 73 40 39 43 96 bc ed 6c k..e1.j.....n1.].8 635s | PRF chunk interface PRF HMAC_MD5 init key hunk 0x2aa3f910ba0 (length 4) 635s | 4a 65 66 65 Jefe 635s | CONCATENATE_DATA_AND_BASE: 635s | target: EXTRACT_KEY_FROM_KEY 635s | base: base-key@0x2aa3f90f350 (16-bytes, AES_KEY_GEN) 635s | params: 16-bytes@0x3ffeeff6ed0 635s | key-offset: 0, key-size: 4 635s | EXTRACT_KEY_FROM_KEY: 635s | target: MD5_HMAC 635s | flags: SIGN 635s | key_size: 4-bytes 635s | base: base-key@0x2aa3f912360 (20-bytes, EXTRACT_KEY_FROM_KEY) 635s | operation: FLAGS_ONLY 635s | params: 8-bytes@0x3ffeeff6ed8 635s | PRF chunk interface prf: created HMAC_MD5 context 0x2aa3f9126d0 from key-key@0x2aa3f9133f0 635s | PRF chunk interface prf: begin HMAC_MD5 with context 0x2aa3f9126d0 from key-key@0x2aa3f9133f0 635s | PRF chunk interface PRF HMAC_MD5 0x2aa3f912db0 635s | PRF chunk interface PRF HMAC_MD5 update message (0x2aa3f912d20 length 28) 635s | 77 68 61 74 20 64 6f 20 79 61 20 77 61 6e 74 20 what do ya want 635s | 66 6f 72 20 6e 6f 74 68 69 6e 67 3f for nothing? 635s | PRF chunk interface PRF HMAC_MD5 final length 16 635s | 75 0c 78 3e 6a b0 b5 03 ea a8 6e 31 0a 5d b7 38 u.x>j.....n1.].8 635s | chunk output 635s | 75 0c 78 3e 6a b0 b5 03 ea a8 6e 31 0a 5d b7 38 u.x>j.....n1.].8 635s | verify_bytes() RFC 2104: MD5_HMAC test 2: prf OUT: ok 635s | CONCATENATE_DATA_AND_BASE: 635s | target: EXTRACT_KEY_FROM_KEY 635s | base: base-key@0x2aa3f90f350 (16-bytes, AES_KEY_GEN) 635s | params: 16-bytes@0x3ffeeff70f8 635s | key-offset: 0, key-size: 4 635s | EXTRACT_KEY_FROM_KEY: 635s | target: EXTRACT_KEY_FROM_KEY 635s | key_size: 4-bytes 635s | base: base-key@0x2aa3f912360 (20-bytes, EXTRACT_KEY_FROM_KEY) 635s | operation: FLAGS_ONLY 635s | params: 8-bytes@0x3ffeeff7008 635s | PRF symkey interface PRF HMAC_MD5 init key symkey-key@0x2aa3f9133f0 (size 4) 635s | PRF symkey interface: key symkey-key@0x2aa3f9133f0 (4-bytes, EXTRACT_KEY_FROM_KEY) 635s | key-offset: 0, key-size: 4 635s | EXTRACT_KEY_FROM_KEY: 635s | target: MD5_HMAC 635s | flags: SIGN 635s | key_size: 4-bytes 635s | base: base-key@0x2aa3f9133f0 (4-bytes, EXTRACT_KEY_FROM_KEY) 635s | operation: FLAGS_ONLY 635s | params: 8-bytes@0x3ffeeff6f90 635s | PRF symkey interface prf: created HMAC_MD5 context 0x2aa3f913890 from key symkey-key@0x2aa3f912360 635s | PRF symkey interface prf: begin HMAC_MD5 with context 0x2aa3f913890 from key symkey-key@0x2aa3f912360 635s | PRF symkey interface PRF HMAC_MD5 0x2aa3f90f2f0 635s | CONCATENATE_DATA_AND_BASE: 635s | target: EXTRACT_KEY_FROM_KEY 635s | base: base-key@0x2aa3f90f350 (16-bytes, AES_KEY_GEN) 635s | params: 16-bytes@0x3ffeeff70f8 635s | key-offset: 0, key-size: 28 635s | EXTRACT_KEY_FROM_KEY: 635s | target: EXTRACT_KEY_FROM_KEY 635s | key_size: 28-bytes 635s | base: base-key@0x2aa3f910c70 (44-bytes, EXTRACT_KEY_FROM_KEY) 635s | operation: FLAGS_ONLY 635s | params: 8-bytes@0x3ffeeff7008 635s | PRF symkey interface PRF HMAC_MD5 update symkey message-key@0x2aa3f9130b0 (size 28) 635s | PRF symkey interface: symkey message-key@0x2aa3f9130b0 (28-bytes, EXTRACT_KEY_FROM_KEY) 635s | nss hmac digest hack extracting all 28 bytes of key@0x2aa3f9130b0 635s | nss hmac digest hack: symkey-key@0x2aa3f9130b0 (28-bytes, EXTRACT_KEY_FROM_KEY) 635s | sizeof bytes 32 635s | wrapper: (SECItemType)682: e1 81 e6 c8 1a d6 6f 77 81 f5 1b b2 85 d9 80 0b 97 ee 0f fb 85 61 8c 8c f4 e2 bf 1d 8f 46 6b c5 635s | nss hmac digest hack extracted len 32 bytes at 0x2aa3f919cc0 635s | unwrapped: 635s | 77 68 61 74 20 64 6f 20 79 61 20 77 61 6e 74 20 what do ya want 635s | 66 6f 72 20 6e 6f 74 68 69 6e 67 3f 00 00 00 00 for nothing?.... 635s | CONCATENATE_DATA_AND_BASE: 635s | target: EXTRACT_KEY_FROM_KEY 635s | base: base-key@0x2aa3f90f350 (16-bytes, AES_KEY_GEN) 635s | params: 16-bytes@0x3ffeeff6fa8 635s | key-offset: 0, key-size: 16 635s | EXTRACT_KEY_FROM_KEY: 635s | target: EXTRACT_KEY_FROM_KEY 635s | key_size: 16-bytes 635s | base: base-key@0x2aa3f910c70 (32-bytes, EXTRACT_KEY_FROM_KEY) 635s | operation: FLAGS_ONLY 635s | params: 8-bytes@0x3ffeeff6eb8 635s | PRF symkey interface PRF HMAC_MD5 final-key@0x2aa3f912360 (size 16) 635s | PRF symkey interface: key-key@0x2aa3f912360 (16-bytes, EXTRACT_KEY_FROM_KEY) 635s | output: symkey-key@0x2aa3f912360 (16-bytes, EXTRACT_KEY_FROM_KEY) 635s | RFC 2104: MD5_HMAC test 2 extracting all 16 bytes of key@0x2aa3f912360 635s | RFC 2104: MD5_HMAC test 2: symkey-key@0x2aa3f912360 (16-bytes, EXTRACT_KEY_FROM_KEY) 635s | sizeof bytes 16 635s | wrapper: (SECItemType)682: 6b e1 de 1c 3a 43 8e bc 20 1b 52 a3 3d ea ea 1c 635s | RFC 2104: MD5_HMAC test 2 extracted len 16 bytes at 0x2aa3f9126b0 635s | unwrapped: 635s | 75 0c 78 3e 6a b0 b5 03 ea a8 6e 31 0a 5d b7 38 u.x>j.....n1.].8 635s | verify_bytes() RFC 2104: MD5_HMAC test 2: symkey: ok 635s ipsec algparse: RFC 2104: MD5_HMAC test 3 635s | decode_to_chunk() test_prf_vector: input "0xAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAA" 635s | decode_to_chunk() output: 635s | aa aa aa aa aa aa aa aa aa aa aa aa aa aa aa aa ................ 635s | decode_to_chunk() test_prf_vector: input "0xDDDDDDDDDDDDDDDDDDDDDDDDDDDDDDDDDDDDDDDDDDDDDDDDDDDDDDDDDDDDDDDDDDDDDDDDDDDDDDDDDDDDDDDDDDDDDDDDDDDD" 635s | decode_to_chunk() output: 635s | dd dd dd dd dd dd dd dd dd dd dd dd dd dd dd dd ................ 635s | dd dd dd dd dd dd dd dd dd dd dd dd dd dd dd dd ................ 635s | dd dd dd dd dd dd dd dd dd dd dd dd dd dd dd dd ................ 635s | dd dd .. 635s | decode_to_chunk() test_prf_vector: input "0x56be34521d144c88dbb8c733f0e8b3f6" 635s | decode_to_chunk() output: 635s | 56 be 34 52 1d 14 4c 88 db b8 c7 33 f0 e8 b3 f6 V.4R..L....3.... 635s | PRF chunk interface PRF HMAC_MD5 init key hunk 0x2aa3f90f220 (length 16) 635s | aa aa aa aa aa aa aa aa aa aa aa aa aa aa aa aa ................ 635s | CONCATENATE_DATA_AND_BASE: 635s | target: EXTRACT_KEY_FROM_KEY 635s | base: base-key@0x2aa3f90f350 (16-bytes, AES_KEY_GEN) 635s | params: 16-bytes@0x3ffeeff6ed0 635s | key-offset: 0, key-size: 16 635s | EXTRACT_KEY_FROM_KEY: 635s | target: MD5_HMAC 635s | flags: SIGN 635s | key_size: 16-bytes 635s | base: base-key@0x2aa3f9133f0 (32-bytes, EXTRACT_KEY_FROM_KEY) 635s | operation: FLAGS_ONLY 635s | params: 8-bytes@0x3ffeeff6ed8 635s | PRF chunk interface prf: created HMAC_MD5 context 0x2aa3f9137e0 from key-key@0x2aa3f912360 635s | PRF chunk interface prf: begin HMAC_MD5 with context 0x2aa3f9137e0 from key-key@0x2aa3f912360 635s | PRF chunk interface PRF HMAC_MD5 0x2aa3f90f320 635s | PRF chunk interface PRF HMAC_MD5 update message (0x2aa3f912320 length 50) 635s | dd dd dd dd dd dd dd dd dd dd dd dd dd dd dd dd ................ 635s | dd dd dd dd dd dd dd dd dd dd dd dd dd dd dd dd ................ 635s | dd dd dd dd dd dd dd dd dd dd dd dd dd dd dd dd ................ 635s | dd dd .. 635s | PRF chunk interface PRF HMAC_MD5 final length 16 635s | 56 be 34 52 1d 14 4c 88 db b8 c7 33 f0 e8 b3 f6 V.4R..L....3.... 635s | chunk output 635s | 56 be 34 52 1d 14 4c 88 db b8 c7 33 f0 e8 b3 f6 V.4R..L....3.... 635s | verify_bytes() RFC 2104: MD5_HMAC test 3: prf OUT: ok 635s | CONCATENATE_DATA_AND_BASE: 635s | target: EXTRACT_KEY_FROM_KEY 635s | base: base-key@0x2aa3f90f350 (16-bytes, AES_KEY_GEN) 635s | params: 16-bytes@0x3ffeeff70f8 635s | key-offset: 0, key-size: 16 635s | EXTRACT_KEY_FROM_KEY: 635s | target: EXTRACT_KEY_FROM_KEY 635s | key_size: 16-bytes 635s | base: base-key@0x2aa3f9133f0 (32-bytes, EXTRACT_KEY_FROM_KEY) 635s | operation: FLAGS_ONLY 635s | params: 8-bytes@0x3ffeeff7008 635s | PRF symkey interface PRF HMAC_MD5 init key symkey-key@0x2aa3f912360 (size 16) 635s | PRF symkey interface: key symkey-key@0x2aa3f912360 (16-bytes, EXTRACT_KEY_FROM_KEY) 635s | key-offset: 0, key-size: 16 635s | EXTRACT_KEY_FROM_KEY: 635s | target: MD5_HMAC 635s | flags: SIGN 635s | key_size: 16-bytes 635s | base: base-key@0x2aa3f912360 (16-bytes, EXTRACT_KEY_FROM_KEY) 635s | operation: FLAGS_ONLY 635s | params: 8-bytes@0x3ffeeff6f90 635s | PRF symkey interface prf: created HMAC_MD5 context 0x2aa3f917c40 from key symkey-key@0x2aa3f9133f0 635s | PRF symkey interface prf: begin HMAC_MD5 with context 0x2aa3f917c40 from key symkey-key@0x2aa3f9133f0 635s | PRF symkey interface PRF HMAC_MD5 0x2aa3f912d20 635s | CONCATENATE_DATA_AND_BASE: 635s | target: EXTRACT_KEY_FROM_KEY 635s | base: base-key@0x2aa3f90f350 (16-bytes, AES_KEY_GEN) 635s | params: 16-bytes@0x3ffeeff70f8 635s | key-offset: 0, key-size: 50 635s | EXTRACT_KEY_FROM_KEY: 635s | target: EXTRACT_KEY_FROM_KEY 635s | key_size: 50-bytes 635s | base: base-key@0x2aa3f910c70 (66-bytes, EXTRACT_KEY_FROM_KEY) 635s | operation: FLAGS_ONLY 635s | params: 8-bytes@0x3ffeeff7008 635s | PRF symkey interface PRF HMAC_MD5 update symkey message-key@0x2aa3f9130b0 (size 50) 635s | PRF symkey interface: symkey message-key@0x2aa3f9130b0 (50-bytes, EXTRACT_KEY_FROM_KEY) 635s | nss hmac digest hack extracting all 50 bytes of key@0x2aa3f9130b0 635s | nss hmac digest hack: symkey-key@0x2aa3f9130b0 (50-bytes, EXTRACT_KEY_FROM_KEY) 635s | sizeof bytes 64 635s | wrapper: (SECItemType)682: 2c cc 17 89 9d 07 7b 4d 42 1e 4c f9 b0 89 b4 91 2c cc 17 89 9d 07 7b 4d 42 1e 4c f9 b0 89 b4 91 2c cc 17 89 9d 07 7b 4d 42 1e 4c f9 b0 89 b4 91 95 91 24 c7 56 7e 0c fc 13 cb e3 d4 da 8a d5 ac 635s | nss hmac digest hack extracted len 64 bytes at 0x2aa3f912de0 635s | unwrapped: 635s | dd dd dd dd dd dd dd dd dd dd dd dd dd dd dd dd ................ 635s | dd dd dd dd dd dd dd dd dd dd dd dd dd dd dd dd ................ 635s | dd dd dd dd dd dd dd dd dd dd dd dd dd dd dd dd ................ 635s | dd dd 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................ 635s | CONCATENATE_DATA_AND_BASE: 635s | target: EXTRACT_KEY_FROM_KEY 635s | base: base-key@0x2aa3f90f350 (16-bytes, AES_KEY_GEN) 635s | params: 16-bytes@0x3ffeeff6fa8 635s | key-offset: 0, key-size: 16 635s | EXTRACT_KEY_FROM_KEY: 635s | target: EXTRACT_KEY_FROM_KEY 635s | key_size: 16-bytes 635s | base: base-key@0x2aa3f910c70 (32-bytes, EXTRACT_KEY_FROM_KEY) 635s | operation: FLAGS_ONLY 635s | params: 8-bytes@0x3ffeeff6eb8 635s | PRF symkey interface PRF HMAC_MD5 final-key@0x2aa3f9133f0 (size 16) 635s | PRF symkey interface: key-key@0x2aa3f9133f0 (16-bytes, EXTRACT_KEY_FROM_KEY) 635s | output: symkey-key@0x2aa3f9133f0 (16-bytes, EXTRACT_KEY_FROM_KEY) 635s | RFC 2104: MD5_HMAC test 3 extracting all 16 bytes of key@0x2aa3f9133f0 635s | RFC 2104: MD5_HMAC test 3: symkey-key@0x2aa3f9133f0 (16-bytes, EXTRACT_KEY_FROM_KEY) 635s | sizeof bytes 16 635s | wrapper: (SECItemType)682: 3d ae f9 54 8d 0e 12 a5 d5 78 10 5a 64 31 19 7b 635s | RFC 2104: MD5_HMAC test 3 extracted len 16 bytes at 0x2aa3f9129a0 635s | unwrapped: 635s | 56 be 34 52 1d 14 4c 88 db b8 c7 33 f0 e8 b3 f6 V.4R..L....3.... 635s | verify_bytes() RFC 2104: MD5_HMAC test 3: symkey: ok 635s ipsec algparse: testing HMAC_SHA1: 635s ipsec algparse: CAVP: IKEv2 key derivation with HMAC-SHA1 635s | decode_to_chunk() test_kdf_vector: input "0x32b50d5f4a3763f3" 635s | decode_to_chunk() output: 635s | 32 b5 0d 5f 4a 37 63 f3 2.._J7c. 635s | decode_to_chunk() test_kdf_vector: input "0x9206a04b26564cb1" 635s | decode_to_chunk() output: 635s | 92 06 a0 4b 26 56 4c b1 ...K&VL. 635s | decode_to_chunk() test_kdf_vector: input "0x34c9e7c188868785" 635s | decode_to_chunk() output: 635s | 34 c9 e7 c1 88 86 87 85 4....... 635s | decode_to_chunk() test_kdf_vector: input "0x3ff77d760d2b2199" 635s | decode_to_chunk() output: 635s | 3f f7 7d 76 0d 2b 21 99 ?.}v.+!. 635s | decode_to_chunk() test_kdf_vector: input "0x4b2c1f971981a8ad8d0abeafabf38cf75fc8349c148142465ed9c8b516b8be52" 635s | decode_to_chunk() output: 635s | 4b 2c 1f 97 19 81 a8 ad 8d 0a be af ab f3 8c f7 K,.............. 635s | 5f c8 34 9c 14 81 42 46 5e d9 c8 b5 16 b8 be 52 _.4...BF^......R 635s | decode_to_chunk() test_kdf_vector: input "0x863f3c9d06efd39d2b907b97f8699e5dd5251ef64a2a176f36ee40c87d4f9330" 635s | decode_to_chunk() output: 635s | 86 3f 3c 9d 06 ef d3 9d 2b 90 7b 97 f8 69 9e 5d .?<.....+.{..i.] 635s | d5 25 1e f6 4a 2a 17 6f 36 ee 40 c8 7d 4f 93 30 .%..J*.o6.@.}O.0 635s | decode_to_chunk() test_kdf_vector: input "0xa9a7b222b59f8f48645f28a1db5b5f5d7479cba7" 635s | decode_to_chunk() output: 635s | a9 a7 b2 22 b5 9f 8f 48 64 5f 28 a1 db 5b 5f 5d ..."...Hd_(..[_] 635s | 74 79 cb a7 ty.. 635s | decode_to_chunk() test_kdf_vector: input "0x63e81194946ebd05df7df5ebf5d8750056bf1f1d" 635s | decode_to_chunk() output: 635s | 63 e8 11 94 94 6e bd 05 df 7d f5 eb f5 d8 75 00 c....n...}....u. 635s | 56 bf 1f 1d V... 635s | decode_to_chunk() test_kdf_vector: input "0xa14293677cc80ff8f9cc0eee30d895da9d8f405666e30ef0dfcb63c634a46002a2a63080e514a062768b76606f9fa5e992204fc5a670bde3f10d6b027113936a5c55b648a194ae587b0088d52204b702c979fa280870d2ed41efa9c549fd11198af1670b143d384bd275c5f594cf266b05ebadca855e4249520a441a81157435a7a56cc4" 635s | decode_to_chunk() output: 635s | a1 42 93 67 7c c8 0f f8 f9 cc 0e ee 30 d8 95 da .B.g|.......0... 635s | 9d 8f 40 56 66 e3 0e f0 df cb 63 c6 34 a4 60 02 ..@Vf.....c.4.`. 635s | a2 a6 30 80 e5 14 a0 62 76 8b 76 60 6f 9f a5 e9 ..0....bv.v`o... 635s | 92 20 4f c5 a6 70 bd e3 f1 0d 6b 02 71 13 93 6a . O..p....k.q..j 635s | 5c 55 b6 48 a1 94 ae 58 7b 00 88 d5 22 04 b7 02 \U.H...X{..."... 635s | c9 79 fa 28 08 70 d2 ed 41 ef a9 c5 49 fd 11 19 .y.(.p..A...I... 635s | 8a f1 67 0b 14 3d 38 4b d2 75 c5 f5 94 cf 26 6b ..g..=8K.u....&k 635s | 05 eb ad ca 85 5e 42 49 52 0a 44 1a 81 15 74 35 .....^BIR.D...t5 635s | a7 a5 6c c4 ..l. 635s | CONCATENATE_DATA_AND_BASE: 635s | target: EXTRACT_KEY_FROM_KEY 635s | base: base-key@0x2aa3f90f350 (16-bytes, AES_KEY_GEN) 635s | params: 16-bytes@0x3ffeeff70d0 635s | key-offset: 0, key-size: 32 635s | EXTRACT_KEY_FROM_KEY: 635s | target: EXTRACT_KEY_FROM_KEY 635s | key_size: 32-bytes 635s | base: base-key@0x2aa3f912360 (48-bytes, EXTRACT_KEY_FROM_KEY) 635s | operation: FLAGS_ONLY 635s | params: 8-bytes@0x3ffeeff6fe0 635s | NSS_IKE_PRF_DERIVE: 635s | target: NSS_IKE_PRF_PLUS_DERIVE 635s | base: base-key@0x2aa3f9133f0 (32-bytes, EXTRACT_KEY_FROM_KEY) 635s | params: 56-bytes@0x3ffeeff7000 635s | CAVP: IKEv2 key derivation with HMAC-SHA1 extracting all 20 bytes of key@0x2aa3f912360 635s | CAVP: IKEv2 key derivation with HMAC-SHA1: symkey-key@0x2aa3f912360 (20-bytes, NSS_IKE_PRF_PLUS_DERIVE) 635s | sizeof bytes 32 635s | wrapper: (SECItemType)682: 2c 81 e3 6f 40 fe a4 ab f9 b9 ea 52 ea 5c 1a 31 63 4d 42 5f 13 ed 3f 02 65 4d 86 d4 fd ae 2c 3c 635s | CAVP: IKEv2 key derivation with HMAC-SHA1 extracted len 32 bytes at 0x2aa3f912db0 635s | unwrapped: 635s | a9 a7 b2 22 b5 9f 8f 48 64 5f 28 a1 db 5b 5f 5d ..."...Hd_(..[_] 635s | 74 79 cb a7 00 00 00 00 00 00 00 00 00 00 00 00 ty.............. 635s | verify_bytes() CAVP: IKEv2 key derivation with HMAC-SHA1: skeyseed: ok 635s | NSS_IKE_PRF_PLUS_DERIVE: 635s | target: EXTRACT_KEY_FROM_KEY 635s | key_size: 132-bytes 635s | base: base-key@0x2aa3f912360 (20-bytes, NSS_IKE_PRF_PLUS_DERIVE) 635s | params: 40-bytes@0x3ffeeff6fa0 635s | CAVP: IKEv2 key derivation with HMAC-SHA1 extracting all 132 bytes of key@0x2aa3f9130b0 635s | CAVP: IKEv2 key derivation with HMAC-SHA1: symkey-key@0x2aa3f9130b0 (132-bytes, EXTRACT_KEY_FROM_KEY) 635s | sizeof bytes 144 635s | wrapper: (SECItemType)682: 07 62 30 92 8e 6d ff 66 92 5c 4c 6a bc d1 b0 28 9b 2c 52 40 87 97 fc c2 84 98 62 65 13 d3 8c 44 a1 79 18 f6 ba 9d 70 f0 16 ff 02 20 92 d4 3a 8b b1 83 0c 60 32 51 fb f1 3b af d7 ef 7a 7b 3b eb 47 ad bd 79 dd 82 d7 26 eb 9a de e3 59 32 6c b4 dc 9b 39 cc 88 5d 22 5c 3b 2e a9 6b 36 1c e5 4e 07 ad 04 37 fe ea b3 83 51 85 3c 3e e9 ba d6 83 30 eb 1e 36 e4 c5 6a e6 b3 bc 47 45 29 b3 6a 60 6e f9 a9 c5 2f 05 63 8e e8 e5 fc 95 81 d7 82 3b 635s | CAVP: IKEv2 key derivation with HMAC-SHA1 extracted len 144 bytes at 0x2aa3f919a90 635s | unwrapped: 635s | a1 42 93 67 7c c8 0f f8 f9 cc 0e ee 30 d8 95 da .B.g|.......0... 635s | 9d 8f 40 56 66 e3 0e f0 df cb 63 c6 34 a4 60 02 ..@Vf.....c.4.`. 635s | a2 a6 30 80 e5 14 a0 62 76 8b 76 60 6f 9f a5 e9 ..0....bv.v`o... 635s | 92 20 4f c5 a6 70 bd e3 f1 0d 6b 02 71 13 93 6a . O..p....k.q..j 635s | 5c 55 b6 48 a1 94 ae 58 7b 00 88 d5 22 04 b7 02 \U.H...X{..."... 635s | c9 79 fa 28 08 70 d2 ed 41 ef a9 c5 49 fd 11 19 .y.(.p..A...I... 635s | 8a f1 67 0b 14 3d 38 4b d2 75 c5 f5 94 cf 26 6b ..g..=8K.u....&k 635s | 05 eb ad ca 85 5e 42 49 52 0a 44 1a 81 15 74 35 .....^BIR.D...t5 635s | a7 a5 6c c4 00 00 00 00 00 00 00 00 00 00 00 00 ..l............. 635s | verify_bytes() CAVP: IKEv2 key derivation with HMAC-SHA1: DKM: ok 635s | key-offset: 0, key-size: 20 635s | EXTRACT_KEY_FROM_KEY: 635s | target: EXTRACT_KEY_FROM_KEY 635s | key_size: 20-bytes 635s | base: base-key@0x2aa3f9130b0 (132-bytes, EXTRACT_KEY_FROM_KEY) 635s | operation: FLAGS_ONLY 635s | params: 8-bytes@0x3ffeeff70d8 635s | CONCATENATE_DATA_AND_BASE: 635s | target: EXTRACT_KEY_FROM_KEY 635s | base: base-key@0x2aa3f90f350 (16-bytes, AES_KEY_GEN) 635s | params: 16-bytes@0x3ffeeff70d0 635s | key-offset: 0, key-size: 32 635s | EXTRACT_KEY_FROM_KEY: 635s | target: EXTRACT_KEY_FROM_KEY 635s | key_size: 32-bytes 635s | base: base-key@0x2aa3f9131f0 (48-bytes, EXTRACT_KEY_FROM_KEY) 635s | operation: FLAGS_ONLY 635s | params: 8-bytes@0x3ffeeff6fe0 635s | NSS_IKE_PRF_DERIVE: 635s | target: NSS_IKE_PRF_PLUS_DERIVE 635s | base: base-key@0x2aa3f910c70 (20-bytes, EXTRACT_KEY_FROM_KEY) 635s | params: 56-bytes@0x3ffeeff6ff8 635s | CAVP: IKEv2 key derivation with HMAC-SHA1 extracting all 20 bytes of key@0x2aa3f9131f0 635s | CAVP: IKEv2 key derivation with HMAC-SHA1: symkey-key@0x2aa3f9131f0 (20-bytes, NSS_IKE_PRF_PLUS_DERIVE) 635s | sizeof bytes 32 635s | wrapper: (SECItemType)682: 34 fb 19 63 3b 1e 57 4d bc 7c 60 54 54 9a d5 2d 5b f2 6f 12 e7 3e 72 7d 9b ac 5f 28 d4 bc 59 29 635s | CAVP: IKEv2 key derivation with HMAC-SHA1 extracted len 32 bytes at 0x2aa3f90f320 635s | unwrapped: 635s | 63 e8 11 94 94 6e bd 05 df 7d f5 eb f5 d8 75 00 c....n...}....u. 635s | 56 bf 1f 1d 00 00 00 00 00 00 00 00 00 00 00 00 V............... 635s | verify_bytes() CAVP: IKEv2 key derivation with HMAC-SHA1: skeyseed_rekey: ok 635s ipsec algparse: leak detective found no leaks 635s running pluto selftest 635s /usr/libexec/ipsec/pluto: adjusting nssdir to /tmp/tmp.0QvHk8L4li 635s /usr/libexec/ipsec/pluto: selftest: skipping lock 635s /usr/libexec/ipsec/pluto: selftest: skipping control socket 635s /usr/libexec/ipsec/pluto: selftest: skipping fork 635s Starting Pluto (Libreswan Version 5.2 IKEv2 IKEv1 XFRM XFRMI esp-hw-offload FORK PTHREAD_SETSCHEDPRIO NSS (IPsec profile) (NSS-KDF) DNSSEC SYSTEMD_WATCHDOG LABELED_IPSEC (SELINUX) LIBCAP_NG LINUX_AUDIT AUTH_PAM NETWORKMANAGER CURL(non-NSS) LDAP(non-NSS) NFTABLES CAT NFLOG) pid:2070 635s operating system: Linux 6.18.0 [Linux 6.18.0-9-generic #9-Ubuntu SMP Mon Jan 12 15:39:23 UTC 2026 s390x] 635s core dump dir: /run/pluto 635s secrets file: /etc/ipsec.secrets 635s Initializing NSS using read-only database "sql:/tmp/tmp.0QvHk8L4li" 635s FIPS Mode: OFF 635s NSS crypto library initialized 635s FIPS mode disabled for pluto daemon 635s FIPS HMAC integrity support [not required] 635s libcap-ng capng_apply failed to apply changes, err=-5. see: man capng_apply 635s libcap-ng support [enabled] 635s Linux audit support [enabled] 635s leak-detective disabled 635s NSS crypto [enabled] 635s XAUTH PAM support [enabled] 635s initializing libevent in pthreads mode: headers: 2.1.12-stable (2010c00); library: 2.1.12-stable (2010c00) 635s NAT-Traversal: keep-alive period 20s 635s ERROR: xfrmi is not supported, failed to create ipsec-interface ipsec1 bound to lo 635s ipsec-interface is not working: xfrmi is not supported 635s IPsec Interface [disabled] 635s refreshed session resume keys, issuing key 1 635s Encryption algorithms: 635s AES_CCM_16 {256,192,*128} IKEv1: ESP IKEv2: ESP FIPS aes_ccm, aes_ccm_c 635s AES_CCM_12 {256,192,*128} IKEv1: ESP IKEv2: ESP FIPS aes_ccm_b 635s AES_CCM_8 {256,192,*128} IKEv1: ESP IKEv2: ESP FIPS aes_ccm_a 635s 3DES_CBC [*192] IKEv1: IKE ESP IKEv2: IKE ESP FIPS NSS(CBC) 3des 635s CAMELLIA_CTR {256,192,*128} IKEv1: ESP IKEv2: ESP 635s CAMELLIA_CBC {256,192,*128} IKEv1: IKE ESP IKEv2: IKE ESP NSS(CBC) camellia 635s AES_GCM_16 {256,192,*128} IKEv1: ESP IKEv2: IKE ESP FIPS NSS(AEAD) aes_gcm, aes_gcm_c 635s AES_GCM_12 {256,192,*128} IKEv1: ESP IKEv2: IKE ESP FIPS NSS(AEAD) aes_gcm_b 635s AES_GCM_8 {256,192,*128} IKEv1: ESP IKEv2: IKE ESP FIPS NSS(AEAD) aes_gcm_a 635s AES_CTR {256,192,*128} IKEv1: IKE ESP IKEv2: IKE ESP FIPS NSS(CTR) aesctr 635s AES_CBC {256,192,*128} IKEv1: IKE ESP IKEv2: IKE ESP FIPS NSS(CBC) aes 635s NULL_AUTH_AES_GMAC {256,192,*128} IKEv1: ESP IKEv2: ESP FIPS aes_gmac 635s NULL [] IKEv1: ESP IKEv2: ESP NULL 635s CHACHA20_POLY1305 [*256] IKEv1: IKEv2: IKE ESP NSS(AEAD) chacha20poly1305 635s Hash algorithms: 635s MD5 IKEv1: IKE IKEv2: NSS 635s SHA1 IKEv1: IKE IKEv2: IKE FIPS NSS sha 635s SHA2_256 IKEv1: IKE IKEv2: IKE FIPS NSS sha2, sha256 635s SHA2_384 IKEv1: IKE IKEv2: IKE FIPS NSS sha384 635s SHA2_512 IKEv1: IKE IKEv2: IKE FIPS NSS sha512 635s IDENTITY IKEv1: IKEv2: FIPS 635s PRF algorithms: 635s HMAC_MD5 IKEv1: IKE IKEv2: IKE NSS md5 635s HMAC_SHA1 IKEv1: IKE IKEv2: IKE FIPS NSS sha, sha1 635s HMAC_SHA2_256 IKEv1: IKE IKEv2: IKE FIPS NSS sha2, sha256, sha2_256 635s HMAC_SHA2_384 IKEv1: IKE IKEv2: IKE FIPS NSS sha384, sha2_384 635s HMAC_SHA2_512 IKEv1: IKE IKEv2: IKE FIPS NSS sha512, sha2_512 635s AES_XCBC IKEv1: IKEv2: IKE native(XCBC) aes128_xcbc 635s Integrity algorithms: 635s HMAC_MD5_96 IKEv1: IKE ESP AH IKEv2: IKE ESP AH NSS md5, hmac_md5 635s HMAC_SHA1_96 IKEv1: IKE ESP AH IKEv2: IKE ESP AH FIPS NSS sha, sha1, sha1_96, hmac_sha1 635s HMAC_SHA2_512_256 IKEv1: IKE ESP AH IKEv2: IKE ESP AH FIPS NSS sha512, sha2_512, sha2_512_256, hmac_sha2_512 635s HMAC_SHA2_384_192 IKEv1: IKE ESP AH IKEv2: IKE ESP AH FIPS NSS sha384, sha2_384, sha2_384_192, hmac_sha2_384 635s HMAC_SHA2_256_128 IKEv1: IKE ESP AH IKEv2: IKE ESP AH FIPS NSS sha2, sha256, sha2_256, sha2_256_128, hmac_sha2_256 635s HMAC_SHA2_256_TRUNCBUG IKEv1: ESP AH IKEv2: AH 635s AES_XCBC_96 IKEv1: ESP AH IKEv2: IKE ESP AH native(XCBC) aes_xcbc, aes128_xcbc, aes128_xcbc_96 635s AES_CMAC_96 IKEv1: ESP AH IKEv2: ESP AH FIPS aes_cmac 635s NONE IKEv1: ESP IKEv2: IKE ESP FIPS null 635s DH algorithms: 635s NONE IKEv1: IKEv2: IKE ESP AH FIPS NSS(MODP) null, dh0 635s MODP1536 IKEv1: IKE ESP AH IKEv2: IKE ESP AH NSS(MODP) dh5 635s MODP2048 IKEv1: IKE ESP AH IKEv2: IKE ESP AH FIPS NSS(MODP) dh14 635s MODP3072 IKEv1: IKE ESP AH IKEv2: IKE ESP AH FIPS NSS(MODP) dh15 635s MODP4096 IKEv1: IKE ESP AH IKEv2: IKE ESP AH FIPS NSS(MODP) dh16 635s MODP6144 IKEv1: IKE ESP AH IKEv2: IKE ESP AH FIPS NSS(MODP) dh17 635s MODP8192 IKEv1: IKE ESP AH IKEv2: IKE ESP AH FIPS NSS(MODP) dh18 635s DH19 IKEv1: IKE IKEv2: IKE ESP AH FIPS NSS(ECP) ecp_256, ecp256 635s DH20 IKEv1: IKE IKEv2: IKE ESP AH FIPS NSS(ECP) ecp_384, ecp384 635s DH21 IKEv1: IKE IKEv2: IKE ESP AH FIPS NSS(ECP) ecp_521, ecp521 635s DH31 IKEv1: IKE IKEv2: IKE ESP AH NSS(ECP) curve25519 635s IPCOMP algorithms: 635s DEFLATE IKEv1: ESP AH IKEv2: ESP AH FIPS 635s LZS IKEv1: IKEv2: ESP AH FIPS 635s LZJH IKEv1: IKEv2: ESP AH FIPS 635s testing CAMELLIA_CBC: 635s Camellia: 16 bytes with 128-bit key 635s Camellia: 16 bytes with 128-bit key 635s Camellia: 16 bytes with 256-bit key 635s Camellia: 16 bytes with 256-bit key 635s testing AES_GCM_16: 635s empty string 635s one block 635s two blocks 635s two blocks with associated data 635s testing AES_CTR: 635s Encrypting 16 octets using AES-CTR with 128-bit key 635s Encrypting 32 octets using AES-CTR with 128-bit key 635s Encrypting 36 octets using AES-CTR with 128-bit key 635s Encrypting 16 octets using AES-CTR with 192-bit key 635s Encrypting 32 octets using AES-CTR with 192-bit key 635s Encrypting 36 octets using AES-CTR with 192-bit key 635s Encrypting 16 octets using AES-CTR with 256-bit key 635s Encrypting 32 octets using AES-CTR with 256-bit key 635s Encrypting 36 octets using AES-CTR with 256-bit key 635s testing AES_CBC: 635s Encrypting 16 bytes (1 block) using AES-CBC with 128-bit key 635s Encrypting 32 bytes (2 blocks) using AES-CBC with 128-bit key 635s Encrypting 48 bytes (3 blocks) using AES-CBC with 128-bit key 635s Encrypting 64 bytes (4 blocks) using AES-CBC with 128-bit key 635s testing AES_XCBC: 635s RFC 3566 Test Case 1: AES-XCBC-MAC-96 with 0-byte input 635s RFC 3566 Test Case 2: AES-XCBC-MAC-96 with 3-byte input 635s RFC 3566 Test Case 3: AES-XCBC-MAC-96 with 16-byte input 635s RFC 3566 Test Case 4: AES-XCBC-MAC-96 with 20-byte input 635s RFC 3566 Test Case 5: AES-XCBC-MAC-96 with 32-byte input 635s RFC 3566 Test Case 6: AES-XCBC-MAC-96 with 34-byte input 635s RFC 3566 Test Case 7: AES-XCBC-MAC-96 with 1000-byte input 635s RFC 4434 Test Case AES-XCBC-PRF-128 with 20-byte input (key length 16) 635s RFC 4434 Test Case AES-XCBC-PRF-128 with 20-byte input (key length 10) 635s RFC 4434 Test Case AES-XCBC-PRF-128 with 20-byte input (key length 18) 635s testing HMAC_MD5: 635s RFC 2104: MD5_HMAC test 1 635s RFC 2104: MD5_HMAC test 2 635s RFC 2104: MD5_HMAC test 3 635s testing HMAC_SHA1: 635s CAVP: IKEv2 key derivation with HMAC-SHA1 635s selftest: exiting pluto 636s autopkgtest [09:29:44]: test cryptocheck: -----------------------] 637s autopkgtest [09:29:45]: test cryptocheck: - - - - - - - - - - results - - - - - - - - - - 637s cryptocheck PASS 637s autopkgtest [09:29:45]: test cavp: preparing testbed 657s Creating nova instance adt-resolute-s390x-libreswan-20260204-091908-juju-7f2275-prod-proposed-migration-environment-20-1a5ee991-f772-4f21-8781-b29e8f104431 from image adt/ubuntu-resolute-s390x-server-20260203.img (UUID 733879ca-10c9-4d0b-9d4a-492c78d47079)... 667s nova [E] nova boot failed (attempt #0): 667s nova [E] DEBUG (extension:189) found extension EntryPoint.parse('v1password = swiftclient.authv1:PasswordLoader') 667s DEBUG (extension:189) found extension EntryPoint.parse('noauth = cinderclient.contrib.noauth:CinderNoAuthLoader') 667s DEBUG (extension:189) found extension EntryPoint.parse('admin_token = keystoneauth1.loading._plugins.admin_token:AdminToken') 667s DEBUG (extension:189) found extension EntryPoint.parse('none = keystoneauth1.loading._plugins.noauth:NoAuth') 667s DEBUG (extension:189) found extension EntryPoint.parse('password = keystoneauth1.loading._plugins.identity.generic:Password') 667s DEBUG (extension:189) found extension EntryPoint.parse('token = keystoneauth1.loading._plugins.identity.generic:Token') 667s DEBUG (extension:189) found extension EntryPoint.parse('v2password = keystoneauth1.loading._plugins.identity.v2:Password') 667s DEBUG (extension:189) found extension EntryPoint.parse('v2token = keystoneauth1.loading._plugins.identity.v2:Token') 667s DEBUG (extension:189) found extension EntryPoint.parse('v3adfspassword = keystoneauth1.extras._saml2._loading:ADFSPassword') 667s DEBUG (extension:189) found extension EntryPoint.parse('v3applicationcredential = keystoneauth1.loading._plugins.identity.v3:ApplicationCredential') 667s DEBUG (extension:189) found extension EntryPoint.parse('v3fedkerb = keystoneauth1.extras.kerberos._loading:MappedKerberos') 667s DEBUG (extension:189) found extension EntryPoint.parse('v3kerberos = keystoneauth1.extras.kerberos._loading:Kerberos') 667s DEBUG (extension:189) found extension EntryPoint.parse('v3multifactor = keystoneauth1.loading._plugins.identity.v3:MultiFactor') 667s DEBUG (extension:189) found extension EntryPoint.parse('v3oauth1 = keystoneauth1.extras.oauth1._loading:V3OAuth1') 667s DEBUG (extension:189) found extension EntryPoint.parse('v3oidcaccesstoken = keystoneauth1.loading._plugins.identity.v3:OpenIDConnectAccessToken') 667s DEBUG (extension:189) found extension EntryPoint.parse('v3oidcauthcode = keystoneauth1.loading._plugins.identity.v3:OpenIDConnectAuthorizationCode') 667s DEBUG (extension:189) found extension EntryPoint.parse('v3oidcclientcredentials = keystoneauth1.loading._plugins.identity.v3:OpenIDConnectClientCredentials') 667s DEBUG (extension:189) found extension EntryPoint.parse('v3oidcpassword = keystoneauth1.loading._plugins.identity.v3:OpenIDConnectPassword') 667s DEBUG (extension:189) found extension EntryPoint.parse('v3password = keystoneauth1.loading._plugins.identity.v3:Password') 667s DEBUG (extension:189) found extension EntryPoint.parse('v3samlpassword = keystoneauth1.extras._saml2._loading:Saml2Password') 667s DEBUG (extension:189) found extension EntryPoint.parse('v3token = keystoneauth1.loading._plugins.identity.v3:Token') 667s DEBUG (extension:189) found extension EntryPoint.parse('v3tokenlessauth = keystoneauth1.loading._plugins.identity.v3:TokenlessAuth') 667s DEBUG (extension:189) found extension EntryPoint.parse('v3totp = keystoneauth1.loading._plugins.identity.v3:TOTP') 667s DEBUG (session:517) REQ: curl -g -i -X GET https://keystone.ps7.canonical.com:5000/v3 -H "Accept: application/json" -H "User-Agent: nova keystoneauth1/4.0.0 python-requests/2.22.0 CPython/3.8.10" 667s DEBUG (connectionpool:939) Starting new HTTPS connection (1): keystone.ps7.canonical.com:5000 667s DEBUG (connectionpool:429) https://keystone.ps7.canonical.com:5000 "GET /v3 HTTP/1.1" 200 267 667s DEBUG (session:548) RESP: [200] Connection: Keep-Alive Content-Length: 267 Content-Type: application/json Date: Wed, 04 Feb 2026 09:30:08 GMT Keep-Alive: timeout=75, max=1000 Server: Apache/2.4.52 (Ubuntu) Vary: X-Auth-Token x-openstack-request-id: req-dadb2214-97d7-4918-974c-06c933ae09f8 667s DEBUG (session:580) RESP BODY: {"version": {"id": "v3.14", "status": "stable", "updated": "2020-04-07T00:00:00Z", "links": [{"rel": "self", "href": "https://keystone.ps7.canonical.com:5000/v3/"}], "media-types": [{"base": "application/json", "type": "application/vnd.openstack.identity-v3+json"}]}} 667s DEBUG (session:946) GET call to https://keystone.ps7.canonical.com:5000/v3 used request id req-dadb2214-97d7-4918-974c-06c933ae09f8 667s DEBUG (base:182) Making authentication request to https://keystone.ps7.canonical.com:5000/v3/auth/tokens 667s DEBUG (connectionpool:429) https://keystone.ps7.canonical.com:5000 "POST /v3/auth/tokens HTTP/1.1" 201 12962 667s DEBUG (base:187) {"token": {"methods": ["password"], "user": {"domain": {"id": "default", "name": "Default"}, "id": "9be12b7a7a7444fdba023d067f039a4a", "name": "prod-autopkgtest-workers-s390x", "password_expires_at": null}, "audit_ids": ["RSthGoiHTo6xp11c44NSpA"], "expires_at": "2026-02-05T09:30:08.000000Z", "issued_at": "2026-02-04T09:30:08.000000Z", "project": {"domain": {"id": "default", "name": "Default"}, "id": "893eec2fc86d4c948fb8c70f765f14df", "name": "prod-autopkgtest-workers-s390x_project"}, "is_domain": false, "roles": [{"id": "c4de4cd4a6e842c48c193225243b4507", "name": "reader"}, {"id": "a31fb543f37543d3b12c7fcb6e29636f", "name": "load-balancer_member"}, {"id": "9531825e299647e9b8713fcf36566f08", "name": "member"}], "is_admin_project": false, "catalog": [{"endpoints": [{"id": "09e03191c89d4421aebaa8dcff0e22e3", "interface": "admin", "region_id": "prodstack7", "url": "https://heat-admin.ps7.canonical.com:8004/v1/893eec2fc86d4c948fb8c70f765f14df", "region": "prodstack7"}, {"id": "0b44af32db1b408da5b67a834350711b", "interface": "internal", "region_id": "prodstack7", "url": "https://heat-internal.ps7.canonical.com:8004/v1/893eec2fc86d4c948fb8c70f765f14df", "region": "prodstack7"}, {"id": "325f3c044aa54591be49e39f7260483d", "interface": "public", "region_id": "prodstack7", "url": "https://heat.ps7.canonical.com:8004/v1/893eec2fc86d4c948fb8c70f765f14df", "region": "prodstack7"}], "id": "07902f28d63c4792bef57723f11a597e", "type": "orchestration", "name": "heat"}, {"endpoints": [{"id": "296a5126b56949f8abc8663ba48d7c69", "interface": "admin", "region_id": "prodstack7", "url": "https://nova-admin.ps7.canonical.com:8774/v2.1", "region": "prodstack7"}, {"id": "4ed46fd286814be9ad5f53c713db2b21", "interface": "public", "region_id": "prodstack7", "url": "https://nova.ps7.canonical.com:8774/v2.1", "region": "prodstack7"}, {"id": "f920fb8274c74c72b50e57ac95f88f51", "interface": "internal", "region_id": "prodstack7", "url": "https://nova-internal.ps7.canonical.com:8774/v2.1", "region": "prodstack7"}], "id": "0f4ee03d0c134dceb7ed6b2fa51eb189", "type": "compute", "name": "nova"}, {"endpoints": [{"id": "074ea936d15d47e8ba1b8f1347fdaeec", "interface": "admin", "region_id": "prodstack7", "url": "https://neutron-admin.ps7.canonical.com:9696", "region": "prodstack7"}, {"id": "4d5667208af943eab425bb1952f67d2f", "interface": "public", "region_id": "prodstack7", "url": "https://neutron.ps7.canonical.com:9696", "region": "prodstack7"}, {"id": "ae71a7dd75fc495fa3dd207ac977346d", "interface": "internal", "region_id": "prodstack7", "url": "https://neutron-internal.ps7.canonical.com:9696", "region": "prodstack7"}], "id": "1fde991012bf4a91a97b5b02cd662e5d", "type": "network", "name": "neutron"}, {"endpoints": [{"id": "5f3171f69df346c9a40ff13f8a9f3feb", "interface": "public", "region_id": "prodstack7", "url": "https://heat.ps7.canonical.com:8000/v1", "region": "prodstack7"}, {"id": "951c2c04417d456eb29a4cbd2675f1bc", "interface": "internal", "region_id": "prodstack7", "url": "https://heat-internal.ps7.canonical.com:8000/v1", "region": "prodstack7"}, {"id": "e4062e144ad243cbb53c8ce87aefee44", "interface": "admin", "region_id": "prodstack7", "url": "https://heat-admin.ps7.canonical.com:8000/v1", "region": "prodstack7"}], "id": "2c59c0123c304ef3824d75e9779ac5a3", "type": "cloudformation", "name": "heat-cfn"}, {"endpoints": [{"id": "4a95fbf112804721b96a3578858faf45", "interface": "internal", "region_id": "prodstack7", "url": "https://octavia-internal.ps7.canonical.com:9876", "region": "prodstack7"}, {"id": "56bed7c3efd54a57bae11cc93844edc5", "interface": "public", "region_id": "prodstack7", "url": "https://octavia.ps7.canonical.com:9876", "region": "prodstack7"}, {"id": "e9c2ec6bc0e94e1e8ca6b15aa24b9294", "interface": "admin", "region_id": "prodstack7", "url": "https://octavia-admin.ps7.canonical.com:9876", "region": "prodstack7"}], "id": "4e42217a7f46428b87e7458a8a73942c", "type": "load-balancer", "name": "octavia"}, {"endpoints": [{"id": "29929a56ac7944d8867150f9d9a51ffe", "interface": "public", "region_id": "prodstack7", "url": "https://gnocchi.ps7.canonical.com:8041", "region": "prodstack7"}, {"id": "d1146fdec43e4c339f3c0766fda1923d", "interface": "internal", "region_id": "prodstack7", "url": "https://gnocchi-internal.ps7.canonical.com:8041", "region": "prodstack7"}, {"id": "ff5d256a28064e13b52758d6206687eb", "interface": "admin", "region_id": "prodstack7", "url": "https://gnocchi-admin.ps7.canonical.com:8041", "region": "prodstack7"}], "id": "50872dac84974216b104c7eef043dfe6", "type": "metric", "name": "gnocchi"}, {"endpoints": [{"id": "3901a2889b584fe5baf1325da2d5571c", "interface": "internal", "region_id": "prodstack7", "url": "https://aodh-internal.ps7.canonical.com:8042", "region": "prodstack7"}, {"id": "94f9e723537a4d0ab35ab53fe1af6f01", "interface": "public", "region_id": "prodstack7", "url": "https://aodh.ps7.canonical.com:8042", "region": "prodstack7"}, {"id": "f3fc8781a98149c680bd7f34c6893410", "interface": "admin", "region_id": "prodstack7", "url": "https://aodh-admin.ps7.canonical.com:8042", "region": "prodstack7"}], "id": "6f7af5495c2447c9bf258f72605a99b1", "type": "alarming", "name": "aodh"}, {"endpoints": [{"id": "0592d4bf15d54ba8aac00dfc34292295", "interface": "admin", "region_id": "prodstack7", "url": "https://keystone-admin.ps7.canonical.com:35357/v3", "region": "prodstack7"}, {"id": "1f5df236ded54026af4f5e947a599b2f", "interface": "internal", "region_id": "prodstack7", "url": "https://keystone-internal.ps7.canonical.com:5000/v3", "region": "prodstack7"}, {"id": "cd17fef7e3d246b3974b2ffe55b7889c", "interface": "public", "region_id": "prodstack7", "url": "https://keystone.ps7.canonical.com:5000/v3", "region": "prodstack7"}], "id": "7ad024307b634ea989f1e03d73d7737b", "type": "identity", "name": "keystone"}, {"endpoints": [{"id": "001dac935b6c44b1ad62c90175538578", "interface": "admin", "region_id": "prodstack7", "url": "https://cinder-admin.ps7.canonical.com:8776/v3/893eec2fc86d4c948fb8c70f765f14df", "region": "prodstack7"}, {"id": "90abac2983a34488bb6ada4e5004bb99", "interface": "public", "region_id": "prodstack7", "url": "https://cinder.ps7.canonical.com:8776/v3/893eec2fc86d4c948fb8c70f765f14df", "region": "prodstack7"}, {"id": "e49add7152684a8e9e1e3ea9502b5dc6", "interface": "internal", "region_id": "prodstack7", "url": "https://cinder-internal.ps7.canonical.com:8776/v3/893eec2fc86d4c948fb8c70f765f14df", "region": "prodstack7"}], "id": "7bea8b97c0304a62afd8325515928cc0", "type": "volumev3", "name": "cinderv3"}, {"endpoints": [{"id": "2450babeee5e4fe49947cbe7bcc0f3c3", "interface": "public", "region_id": "prodstack7", "url": "https://designate.ps7.canonical.com:9001", "region": "prodstack7"}, {"id": "c2e77ece29cd4dc7bf518bb51c619cce", "interface": "internal", "region_id": "prodstack7", "url": "https://designate-internal.ps7.canonical.com:9001", "region": "prodstack7"}, {"id": "fc292615aa2d43ff943da365870944ce", "interface": "admin", "region_id": "prodstack7", "url": "https://designate-admin.ps7.canonical.com:9001", "region": "prodstack7"}], "id": "8d13654c658644c4a375ce8428638f3d", "type": "dns", "name": "designate"}, {"endpoints": [{"id": "604f1f7088c54ec4a558d1747b0e7396", "interface": "public", "region_id": "prodstack7", "url": "https://barbican.ps7.canonical.com:9311", "region": "prodstack7"}, {"id": "81268c6bd3524a4d85af3d6faa426863", "interface": "admin", "region_id": "prodstack7", "url": "https://barbican-admin.ps7.canonical.com:9312", "region": "prodstack7"}, {"id": "becc73f676f34e66ab1daf0fbcb42366", "interface": "internal", "region_id": "prodstack7", "url": "https://barbican-internal.ps7.canonical.com:9311", "region": "prodstack7"}], "id": "8df4ed7c02d44fe28ec72b1e19e3f66f", "type": "key-manager", "name": "barbican"}, {"endpoints": [{"id": "38557e1243014f1abaa578a61bb0a387", "interface": "public", "region_id": "prodstack7", "url": "https://manila.ps7.canonical.com:8786/v1/893eec2fc86d4c948fb8c70f765f14df", "region": "prodstack7"}, {"id": "b12d5a4329f94a1fa6dbd2cd38ebcd52", "interface": "internal", "region_id": "prodstack7", "url": "https://manila-internal.ps7.canonical.com:8786/v1/893eec2fc86d4c948fb8c70f765f14df", "region": "prodstack7"}, {"id": "bc081c0d5d954446b7ee77886f5d68a3", "interface": "admin", "region_id": "prodstack7", "url": "https://manila-admin.ps7.canonical.com:8786/v1/893eec2fc86d4c948fb8c70f765f14df", "region": "prodstack7"}], "id": "8e7967c2620d49448787e035e8f21af0", "type": "share", "name": "manila"}, {"endpoints": [{"id": "03802d072c514ae484a2d26be0c906af", "interface": "public", "region_id": "prodstack7", "url": "https://radosgw.ps7.canonical.com:443/", "region": "prodstack7"}, {"id": "c07a315e261f430d94542a872596d654", "interface": "admin", "region_id": "prodstack7", "url": "https://radosgw-admin.ps7.canonical.com:443/", "region": "prodstack7"}, {"id": "d62fcd20c1e34d64930fbec97503a40a", "interface": "internal", "region_id": "prodstack7", "url": "https://radosgw-internal.ps7.canonical.com:443/", "region": "prodstack7"}], "id": "9569f1b0b4714254a3d116760dc3968d", "type": "s3", "name": "s3"}, {"endpoints": [{"id": "0e64627804e741e5948b4d35e1914624", "interface": "internal", "region_id": "RegionOne", "url": "http://10.150.13.75", "region": "RegionOne"}, {"id": "12d47bbd1cc64dbf8d4e442b821c64f2", "interface": "admin", "region_id": "prodstack7", "url": "https://radosgw-admin.ps7.canonical.com:443/swift/simplestreams/data", "region": "prodstack7"}, {"id": "35aba6c3a1fc4041b30963e8b6c7b929", "interface": "public", "region_id": "prodstack7", "url": "https://radosgw.ps7.canonical.com:443/swift/v1/AUTH_588a6b5285ea4ed38ae122d264c01490/simplestreams/data", "region": "prodstack7"}, {"id": "35bc5168fcc2414a9d89313cdef8bca9", "interface": "admin", "region_id": "RegionOne", "url": "http://10.150.13.75", "region": "RegionOne"}, {"id": "5f7980b3f8e746e6bbd66c9cef81714e", "interface": "public", "region_id": "RegionOne", "url": "http://10.150.13.75", "region": "RegionOne"}, {"id": "739ab5131dff4cdbb3151f6de36b36f6", "interface": "internal", "region_id": "prodstack7", "url": "https://radosgw-internal.ps7.canonical.com:443/swift/v1/AUTH_588a6b5285ea4ed38ae122d264c01490/simplestreams/data", "region": "prodstack7"}], "id": "b28a039721b147af8e77d77242d4297f", "type": "product-streams", "name": "image-stream"}, {"endpoints": [{"id": "9321fba4588641dbb1c9f89508f1bf23", "interface": "internal", "region_id": "prodstack7", "url": "https://placement-internal.ps7.canonical.com:8778", "region": "prodstack7"}, {"id": "9a75eebf33e7409d9b69dc7e650f756c", "interface": "admin", "region_id": "prodstack7", "url": "https://placement-admin.ps7.canonical.com:8778", "region": "prodstack7"}, {"id": "c03942ddacb94fe39c1529aa74bd31c1", "interface": "public", "region_id": "prodstack7", "url": "https://placement.ps7.canonical.com:8778", "region": "prodstack7"}], "id": "bc5c019477934e89bab2a097e8df84b6", "type": "placement", "name": "placement"}, {"endpoints": [{"id": "b8152f5e649d4603ac092897639d38c9", "interface": "admin", "region_id": "prodstack7", "url": "https://radosgw-admin.ps7.canonical.com:443/swift", "region": "prodstack7"}, {"id": "baa313d85b904c308b7a5c98505fc32c", "interface": "internal", "region_id": "prodstack7", "url": "https://radosgw-internal.ps7.canonical.com:443/swift/v1/AUTH_893eec2fc86d4c948fb8c70f765f14df", "region": "prodstack7"}, {"id": "c17c3db416224561b5e045562bbe76bf", "interface": "public", "region_id": "prodstack7", "url": "https://radosgw.ps7.canonical.com:443/swift/v1/AUTH_893eec2fc86d4c948fb8c70f765f14df", "region": "prodstack7"}], "id": "c6dd2bcf96bf44c2a99e39d1302563f1", "type": "object-store", "name": "swift"}, {"endpoints": [{"id": "526da263451648898c9187c65f441a1c", "interface": "public", "region_id": "prodstack7", "url": "https://glance.ps7.canonical.com:9292", "region": "prodstack7"}, {"id": "61b55755ca9e4e2ab04a144f92cb6e97", "interface": "admin", "region_id": "prodstack7", "url": "https://glance-admin.ps7.canonical.com:9292", "region": "prodstack7"}, {"id": "9080969b2cde4926b647f63b9591233c", "interface": "internal", "region_id": "prodstack7", "url": "https://glance-internal.ps7.canonical.com:9292", "region": "prodstack7"}], "id": "dd3a22e287464998be0514a67dafb7e4", "type": "image", "name": "glance"}, {"endpoints": [{"id": "2f4dcba2a4ce46b2a2e3cf103fd929f4", "interface": "admin", "region_id": "prodstack7", "url": "https://manila-admin.ps7.canonical.com:8786/v2/893eec2fc86d4c948fb8c70f765f14df", "region": "prodstack7"}, {"id": "789faa303fb54473b9449fa2f52866b3", "interface": "internal", "region_id": "prodstack7", "url": "https://manila-internal.ps7.canonical.com:8786/v2/893eec2fc86d4c948fb8c70f765f14df", "region": "prodstack7"}, {"id": "fa7fa08da5e147df8dbc9528f3d7135b", "interface": "public", "region_id": "prodstack7", "url": "https://manila.ps7.canonical.com:8786/v2/893eec2fc86d4c948fb8c70f765f14df", "region": "prodstack7"}], "id": "f6880aea736446b8a4232e0cf3528a12", "type": "sharev2", "name": "manilav2"}]}} 667s REQ: curl -g -i -X GET https://nova.ps7.canonical.com:8774/v2.1 -H "Accept: application/json" -H "User-Agent: python-novaclient" -H "X-Auth-Token: {SHA256}4bf5063bce7ea771876454cf6ace2df9fdb4e3d3f06e07526f10e3909a9ebd33" 667s DEBUG (session:517) REQ: curl -g -i -X GET https://nova.ps7.canonical.com:8774/v2.1 -H "Accept: application/json" -H "User-Agent: python-novaclient" -H "X-Auth-Token: {SHA256}4bf5063bce7ea771876454cf6ace2df9fdb4e3d3f06e07526f10e3909a9ebd33" 667s DEBUG (connectionpool:939) Starting new HTTPS connection (1): nova.ps7.canonical.com:8774 667s DEBUG (connectionpool:429) https://nova.ps7.canonical.com:8774 "GET /v2.1 HTTP/1.1" 302 0 667s RESP: [302] Connection: Keep-Alive Content-Length: 0 Content-Type: text/plain; charset=utf8 Date: Wed, 04 Feb 2026 09:30:09 GMT Keep-Alive: timeout=75, max=1000 Location: https://nova.ps7.canonical.com:8774/v2.1/ Server: Apache/2.4.52 (Ubuntu) x-compute-request-id: req-7bb4bb3b-c0ca-4c55-9bad-7d61935fd2a8 x-openstack-request-id: req-7bb4bb3b-c0ca-4c55-9bad-7d61935fd2a8 667s DEBUG (session:548) RESP: [302] Connection: Keep-Alive Content-Length: 0 Content-Type: text/plain; charset=utf8 Date: Wed, 04 Feb 2026 09:30:09 GMT Keep-Alive: timeout=75, max=1000 Location: https://nova.ps7.canonical.com:8774/v2.1/ Server: Apache/2.4.52 (Ubuntu) x-compute-request-id: req-7bb4bb3b-c0ca-4c55-9bad-7d61935fd2a8 x-openstack-request-id: req-7bb4bb3b-c0ca-4c55-9bad-7d61935fd2a8 667s RESP BODY: Omitted, Content-Type is set to text/plain; charset=utf8. Only application/json responses have their bodies logged. 667s DEBUG (session:580) RESP BODY: Omitted, Content-Type is set to text/plain; charset=utf8. Only application/json responses have their bodies logged. 667s DEBUG (connectionpool:429) https://nova.ps7.canonical.com:8774 "GET /v2.1/ HTTP/1.1" 200 397 667s RESP: [200] Connection: Keep-Alive Content-Length: 397 Content-Type: application/json Date: Wed, 04 Feb 2026 09:30:09 GMT Keep-Alive: timeout=75, max=999 OpenStack-API-Version: compute 2.1 Server: Apache/2.4.52 (Ubuntu) Vary: OpenStack-API-Version,X-OpenStack-Nova-API-Version X-OpenStack-Nova-API-Version: 2.1 x-compute-request-id: req-d26eb0fb-27c1-465a-b3e8-d8b77a5857cf x-openstack-request-id: req-d26eb0fb-27c1-465a-b3e8-d8b77a5857cf 667s DEBUG (session:548) RESP: [200] Connection: Keep-Alive Content-Length: 397 Content-Type: application/json Date: Wed, 04 Feb 2026 09:30:09 GMT Keep-Alive: timeout=75, max=999 OpenStack-API-Version: compute 2.1 Server: Apache/2.4.52 (Ubuntu) Vary: OpenStack-API-Version,X-OpenStack-Nova-API-Version X-OpenStack-Nova-API-Version: 2.1 x-compute-request-id: req-d26eb0fb-27c1-465a-b3e8-d8b77a5857cf x-openstack-request-id: req-d26eb0fb-27c1-465a-b3e8-d8b77a5857cf 667s RESP BODY: {"version": {"id": "v2.1", "status": "CURRENT", "version": "2.96", "min_version": "2.1", "updated": "2013-07-23T11:33:21Z", "links": [{"rel": "self", "href": "https://nova.ps7.canonical.com:8774/v2.1/"}, {"rel": "describedby", "type": "text/html", "href": "http://docs.openstack.org/"}], "media-types": [{"base": "application/json", "type": "application/vnd.openstack.compute+json;version=2.1"}]}} 667s DEBUG (session:580) RESP BODY: {"version": {"id": "v2.1", "status": "CURRENT", "version": "2.96", "min_version": "2.1", "updated": "2013-07-23T11:33:21Z", "links": [{"rel": "self", "href": "https://nova.ps7.canonical.com:8774/v2.1/"}, {"rel": "describedby", "type": "text/html", "href": "http://docs.openstack.org/"}], "media-types": [{"base": "application/json", "type": "application/vnd.openstack.compute+json;version=2.1"}]}} 667s GET call to compute for https://nova.ps7.canonical.com:8774/v2.1/ used request id req-d26eb0fb-27c1-465a-b3e8-d8b77a5857cf 667s DEBUG (session:936) GET call to compute for https://nova.ps7.canonical.com:8774/v2.1/ used request id req-d26eb0fb-27c1-465a-b3e8-d8b77a5857cf 667s DEBUG (extension:189) found extension EntryPoint.parse('v1password = swiftclient.authv1:PasswordLoader') 667s DEBUG (extension:189) found extension EntryPoint.parse('noauth = cinderclient.contrib.noauth:CinderNoAuthLoader') 667s DEBUG (extension:189) found extension EntryPoint.parse('admin_token = keystoneauth1.loading._plugins.admin_token:AdminToken') 667s DEBUG (extension:189) found extension EntryPoint.parse('none = keystoneauth1.loading._plugins.noauth:NoAuth') 667s DEBUG (extension:189) found extension EntryPoint.parse('password = keystoneauth1.loading._plugins.identity.generic:Password') 667s DEBUG (extension:189) found extension EntryPoint.parse('token = keystoneauth1.loading._plugins.identity.generic:Token') 667s DEBUG (extension:189) found extension EntryPoint.parse('v2password = keystoneauth1.loading._plugins.identity.v2:Password') 667s DEBUG (extension:189) found extension EntryPoint.parse('v2token = keystoneauth1.loading._plugins.identity.v2:Token') 667s DEBUG (extension:189) found extension EntryPoint.parse('v3adfspassword = keystoneauth1.extras._saml2._loading:ADFSPassword') 667s DEBUG (extension:189) found extension EntryPoint.parse('v3applicationcredential = keystoneauth1.loading._plugins.identity.v3:ApplicationCredential') 667s DEBUG (extension:189) found extension EntryPoint.parse('v3fedkerb = keystoneauth1.extras.kerberos._loading:MappedKerberos') 667s DEBUG (extension:189) found extension EntryPoint.parse('v3kerberos = keystoneauth1.extras.kerberos._loading:Kerberos') 667s DEBUG (extension:189) found extension EntryPoint.parse('v3multifactor = keystoneauth1.loading._plugins.identity.v3:MultiFactor') 667s DEBUG (extension:189) found extension EntryPoint.parse('v3oauth1 = keystoneauth1.extras.oauth1._loading:V3OAuth1') 667s DEBUG (extension:189) found extension EntryPoint.parse('v3oidcaccesstoken = keystoneauth1.loading._plugins.identity.v3:OpenIDConnectAccessToken') 667s DEBUG (extension:189) found extension EntryPoint.parse('v3oidcauthcode = keystoneauth1.loading._plugins.identity.v3:OpenIDConnectAuthorizationCode') 667s DEBUG (extension:189) found extension EntryPoint.parse('v3oidcclientcredentials = keystoneauth1.loading._plugins.identity.v3:OpenIDConnectClientCredentials') 667s DEBUG (extension:189) found extension EntryPoint.parse('v3oidcpassword = keystoneauth1.loading._plugins.identity.v3:OpenIDConnectPassword') 667s DEBUG (extension:189) found extension EntryPoint.parse('v3password = keystoneauth1.loading._plugins.identity.v3:Password') 667s DEBUG (extension:189) found extension EntryPoint.parse('v3samlpassword = keystoneauth1.extras._saml2._loading:Saml2Password') 667s DEBUG (extension:189) found extension EntryPoint.parse('v3token = keystoneauth1.loading._plugins.identity.v3:Token') 667s DEBUG (extension:189) found extension EntryPoint.parse('v3tokenlessauth = keystoneauth1.loading._plugins.identity.v3:TokenlessAuth') 667s DEBUG (extension:189) found extension EntryPoint.parse('v3totp = keystoneauth1.loading._plugins.identity.v3:TOTP') 667s DEBUG (session:517) REQ: curl -g -i -X GET https://glance.ps7.canonical.com:9292/v2/images/733879ca-10c9-4d0b-9d4a-492c78d47079 -H "Accept: application/json" -H "OpenStack-API-Version: compute 2.87" -H "User-Agent: python-novaclient" -H "X-Auth-Token: {SHA256}4bf5063bce7ea771876454cf6ace2df9fdb4e3d3f06e07526f10e3909a9ebd33" -H "X-OpenStack-Nova-API-Version: 2.87" 667s DEBUG (connectionpool:939) Starting new HTTPS connection (1): glance.ps7.canonical.com:9292 667s DEBUG (connectionpool:429) https://glance.ps7.canonical.com:9292 "GET /v2/images/733879ca-10c9-4d0b-9d4a-492c78d47079 HTTP/1.1" 200 2240 667s DEBUG (session:548) RESP: [200] Connection: Keep-Alive Content-Length: 2240 Content-Type: application/json Date: Wed, 04 Feb 2026 09:30:09 GMT Keep-Alive: timeout=75, max=1000 Server: Apache/2.4.52 (Ubuntu) X-Openstack-Request-Id: req-a41dd4c2-6472-405f-a7d3-24f69e358666 667s DEBUG (session:580) RESP BODY: {"architecture": "s390x", "base_image_ref": "2dd19fd1-572f-4228-8cc3-8a2340c18bdd", "boot_roles": "load-balancer_member,member,reader", "content_id": "auto.sync", "hw_cdrom_bus": "scsi", "hw_disk_bus": "virtio", "hw_machine_type": "s390-ccw-virtio", "hw_vif_model": "virtio", "image_location": "snapshot", "image_state": "available", "image_type": "snapshot", "img_config_drive": "mandatory", "instance_uuid": "d1bad1b6-2f04-488a-9ca6-9e103e092d67", "item_name": "disk1.img", "os_distro": "ubuntu", "os_version": "26.04", "owner_id": "893eec2fc86d4c948fb8c70f765f14df", "owner_project_name": "prod-autopkgtest-workers-s390x_project", "owner_user_name": "prod-autopkgtest-workers-s390x", "product_name": "com.ubuntu.cloud.daily:server:26.04:s390x", "simplestreams_metadata": "{\"aliases\": \"26.04,r,resolute,devel\", \"arch\": \"s390x\", \"ftype\": \"disk1.img\", \"label\": \"daily\", \"os\": \"ubuntu\", \"pubname\": \"ubuntu-resolute-daily-s390x-server-20260127\", \"release\": \"resolute\", \"release_codename\": \"Resolute Raccoon\", \"release_title\": \"26.04", "source_content_id": "com.ubuntu.cloud:daily:download", "user_id": "9be12b7a7a7444fdba023d067f039a4a", "version_name": "20260127", "name": "adt/ubuntu-resolute-s390x-server-20260203.img", "disk_format": "qcow2", "container_format": "bare", "visibility": "private", "size": 1800798208, "virtual_size": 21474836480, "status": "active", "checksum": "9b3d6be9947811e5212bcf008eaf03f5", "protected": false, "min_ram": 0, "min_disk": 20, "owner": "893eec2fc86d4c948fb8c70f765f14df", "os_hidden": false, "os_hash_algo": "sha256", "os_hash_value": "ee48b319eff984c28d76b7a37902acf659f0a7416412582606befe1c9ed4f623", "id": "733879ca-10c9-4d0b-9d4a-492c78d47079", "created_at": "2026-02-03T04:15:55Z", "updated_at": "2026-02-03T04:16:38Z", "locations": [{"url": "rbd://d8b83d88-b70a-11ef-be0b-2390f458e7bc/glance/733879ca-10c9-4d0b-9d4a-492c78d47079/snap", "metadata": {"store": "ceph"}}], "direct_url": "rbd://d8b83d88-b70a-11ef-be0b-2390f458e7bc/glance/733879ca-10c9-4d0b-9d4a-492c78d47079/snap", "tags": [], "self": "/v2/images/733879ca-10c9-4d0b-9d4a-492c78d47079", "file": "/v2/images/733879ca-10c9-4d0b-9d4a-492c78d47079/file", "schema": "/v2/schemas/image", "stores": "ceph"} 667s DEBUG (session:936) GET call to image for https://glance.ps7.canonical.com:9292/v2/images/733879ca-10c9-4d0b-9d4a-492c78d47079 used request id req-a41dd4c2-6472-405f-a7d3-24f69e358666 667s DEBUG (session:517) REQ: curl -g -i -X GET https://nova.ps7.canonical.com:8774/v2.1/flavors/autopkgtest-cpu2-ram4-disk20-s390x -H "Accept: application/json" -H "OpenStack-API-Version: compute 2.87" -H "User-Agent: python-novaclient" -H "X-Auth-Token: {SHA256}4bf5063bce7ea771876454cf6ace2df9fdb4e3d3f06e07526f10e3909a9ebd33" -H "X-OpenStack-Nova-API-Version: 2.87" 667s DEBUG (connectionpool:429) https://nova.ps7.canonical.com:8774 "GET /v2.1/flavors/autopkgtest-cpu2-ram4-disk20-s390x HTTP/1.1" 404 107 667s DEBUG (session:548) RESP: [404] Connection: Keep-Alive Content-Length: 107 Content-Type: application/json; charset=UTF-8 Date: Wed, 04 Feb 2026 09:30:09 GMT Keep-Alive: timeout=75, max=998 OpenStack-API-Version: compute 2.87 Server: Apache/2.4.52 (Ubuntu) Vary: OpenStack-API-Version,X-OpenStack-Nova-API-Version X-OpenStack-Nova-API-Version: 2.87 x-compute-request-id: req-a2f384d8-88ec-4fef-9038-618c088394d3 x-openstack-request-id: req-a2f384d8-88ec-4fef-9038-618c088394d3 667s DEBUG (session:580) RESP BODY: {"itemNotFound": {"code": 404, "message": "Flavor autopkgtest-cpu2-ram4-disk20-s390x could not be found."}} 667s DEBUG (session:936) GET call to compute for https://nova.ps7.canonical.com:8774/v2.1/flavors/autopkgtest-cpu2-ram4-disk20-s390x used request id req-a2f384d8-88ec-4fef-9038-618c088394d3 667s DEBUG (session:517) REQ: curl -g -i -X GET https://nova.ps7.canonical.com:8774/v2.1/flavors?is_public=None -H "Accept: application/json" -H "OpenStack-API-Version: compute 2.87" -H "User-Agent: python-novaclient" -H "X-Auth-Token: {SHA256}4bf5063bce7ea771876454cf6ace2df9fdb4e3d3f06e07526f10e3909a9ebd33" -H "X-OpenStack-Nova-API-Version: 2.87" 667s DEBUG (connectionpool:429) https://nova.ps7.canonical.com:8774 "GET /v2.1/flavors?is_public=None HTTP/1.1" 200 2409 667s DEBUG (session:548) RESP: [200] Connection: Keep-Alive Content-Length: 2409 Content-Type: application/json Date: Wed, 04 Feb 2026 09:30:09 GMT Keep-Alive: timeout=75, max=997 OpenStack-API-Version: compute 2.87 Server: Apache/2.4.52 (Ubuntu) Vary: OpenStack-API-Version,X-OpenStack-Nova-API-Version X-OpenStack-Nova-API-Version: 2.87 x-compute-request-id: req-bb0877dd-a16b-44a5-9dc6-cc4ea1ab6780 x-openstack-request-id: req-bb0877dd-a16b-44a5-9dc6-cc4ea1ab6780 667s DEBUG (session:580) RESP BODY: {"flavors": [{"id": "0d9903a9-d153-419d-a33f-d1b0c9f04c79", "name": "autopkgtest-cpu2-ram4-disk20-s390x", "links": [{"rel": "self", "href": "https://nova.ps7.canonical.com:8774/v2.1/flavors/0d9903a9-d153-419d-a33f-d1b0c9f04c79"}, {"rel": "bookmark", "href": "https://nova.ps7.canonical.com:8774/flavors/0d9903a9-d153-419d-a33f-d1b0c9f04c79"}], "description": null}, {"id": "0eff4bd0-1c15-4ab7-8408-aa4aa9913aea", "name": "autopkgtest-cpu4-ram16-disk100-s390x", "links": [{"rel": "self", "href": "https://nova.ps7.canonical.com:8774/v2.1/flavors/0eff4bd0-1c15-4ab7-8408-aa4aa9913aea"}, {"rel": "bookmark", "href": "https://nova.ps7.canonical.com:8774/flavors/0eff4bd0-1c15-4ab7-8408-aa4aa9913aea"}], "description": null}, {"id": "66f510f6-ebf4-4ca4-a453-b85efa7296a8", "name": "shared.xsmall.s390x", "links": [{"rel": "self", "href": "https://nova.ps7.canonical.com:8774/v2.1/flavors/66f510f6-ebf4-4ca4-a453-b85efa7296a8"}, {"rel": "bookmark", "href": "https://nova.ps7.canonical.com:8774/flavors/66f510f6-ebf4-4ca4-a453-b85efa7296a8"}], "description": null}, {"id": "73fd8637-56bd-447b-8da0-35eb261b86ab", "name": "shared.small.s390x", "links": [{"rel": "self", "href": "https://nova.ps7.canonical.com:8774/v2.1/flavors/73fd8637-56bd-447b-8da0-35eb261b86ab"}, {"rel": "bookmark", "href": "https://nova.ps7.canonical.com:8774/flavors/73fd8637-56bd-447b-8da0-35eb261b86ab"}], "description": null}, {"id": "74e5aeed-cd90-4dda-8255-6a1798fa3309", "name": "shared.xlarge.s390x", "links": [{"rel": "self", "href": "https://nova.ps7.canonical.com:8774/v2.1/flavors/74e5aeed-cd90-4dda-8255-6a1798fa3309"}, {"rel": "bookmark", "href": "https://nova.ps7.canonical.com:8774/flavors/74e5aeed-cd90-4dda-8255-6a1798fa3309"}], "description": null}, {"id": "a7abd388-ba14-407d-8339-5533a300b75a", "name": "shared.medium.s390x", "links": [{"rel": "self", "href": "https://nova.ps7.canonical.com:8774/v2.1/flavors/a7abd388-ba14-407d-8339-5533a300b75a"}, {"rel": "bookmark", "href": "https://nova.ps7.canonical.com:8774/flavors/a7abd388-ba14-407d-8339-5533a300b75a"}], "description": null}, {"id": "d4826921-56cc-46ed-a7c3-56a7b371dd23", "name": "shared.large.s390x", "links": [{"rel": "self", "href": "https://nova.ps7.canonical.com:8774/v2.1/flavors/d4826921-56cc-46ed-a7c3-56a7b371dd23"}, {"rel": "bookmark", "href": "https://nova.ps7.canonical.com:8774/flavors/d4826921-56cc-46ed-a7c3-56a7b371dd23"}], "description": null}]} 667s DEBUG (session:936) GET call to compute for https://nova.ps7.canonical.com:8774/v2.1/flavors?is_public=None used request id req-bb0877dd-a16b-44a5-9dc6-cc4ea1ab6780 667s DEBUG (session:517) REQ: curl -g -i -X GET https://nova.ps7.canonical.com:8774/v2.1/flavors/0d9903a9-d153-419d-a33f-d1b0c9f04c79 -H "Accept: application/json" -H "OpenStack-API-Version: compute 2.87" -H "User-Agent: python-novaclient" -H "X-Auth-Token: {SHA256}4bf5063bce7ea771876454cf6ace2df9fdb4e3d3f06e07526f10e3909a9ebd33" -H "X-OpenStack-Nova-API-Version: 2.87" 667s DEBUG (connectionpool:429) https://nova.ps7.canonical.com:8774 "GET /v2.1/flavors/0d9903a9-d153-419d-a33f-d1b0c9f04c79 HTTP/1.1" 200 702 667s DEBUG (session:548) RESP: [200] Connection: Keep-Alive Content-Length: 702 Content-Type: application/json Date: Wed, 04 Feb 2026 09:30:09 GMT Keep-Alive: timeout=75, max=996 OpenStack-API-Version: compute 2.87 Server: Apache/2.4.52 (Ubuntu) Vary: OpenStack-API-Version,X-OpenStack-Nova-API-Version X-OpenStack-Nova-API-Version: 2.87 x-compute-request-id: req-c931c9c0-5de8-4c6a-8d1e-9cb707bb82b3 x-openstack-request-id: req-c931c9c0-5de8-4c6a-8d1e-9cb707bb82b3 667s DEBUG (session:580) RESP BODY: {"flavor": {"id": "0d9903a9-d153-419d-a33f-d1b0c9f04c79", "name": "autopkgtest-cpu2-ram4-disk20-s390x", "ram": 4096, "disk": 20, "swap": 0, "OS-FLV-EXT-DATA:ephemeral": 0, "OS-FLV-DISABLED:disabled": false, "vcpus": 2, "os-flavor-access:is_public": false, "rxtx_factor": 1.0, "links": [{"rel": "self", "href": "https://nova.ps7.canonical.com:8774/v2.1/flavors/0d9903a9-d153-419d-a33f-d1b0c9f04c79"}, {"rel": "bookmark", "href": "https://nova.ps7.canonical.com:8774/flavors/0d9903a9-d153-419d-a33f-d1b0c9f04c79"}], "description": null, "extra_specs": {"aggregate_instance_extra_specs:commit": "s390x", "hw:cpu_policy": "shared", "hw:mem_page_size": "large", "hw:pci_numa_affinity_policy": "preferred"}}} 667s DEBUG (session:936) GET call to compute for https://nova.ps7.canonical.com:8774/v2.1/flavors/0d9903a9-d153-419d-a33f-d1b0c9f04c79 used request id req-c931c9c0-5de8-4c6a-8d1e-9cb707bb82b3 667s DEBUG (session:517) REQ: curl -g -i -X POST https://nova.ps7.canonical.com:8774/v2.1/servers -H "Accept: application/json" -H "Content-Type: application/json" -H "OpenStack-API-Version: compute 2.87" -H "User-Agent: python-novaclient" -H "X-Auth-Token: {SHA256}4bf5063bce7ea771876454cf6ace2df9fdb4e3d3f06e07526f10e3909a9ebd33" -H "X-OpenStack-Nova-API-Version: 2.87" -d '{"server": {"name": "adt-resolute-s390x-libreswan-20260204-091908-juju-7f2275-prod-proposed-migration-environment-20-1a5ee991-f772-4f21-8781-b29e8f104431", "imageRef": "733879ca-10c9-4d0b-9d4a-492c78d47079", "flavorRef": "0d9903a9-d153-419d-a33f-d1b0c9f04c79", "user_data": "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", "key_name": "testbed-juju-7f2275-prod-proposed-migration-environment-20", "min_count": 1, "max_count": 1, "security_groups": [{"name": "autopkgtest-juju-7f2275-prod-proposed-migration-environment-20@sto01-s390x-8.secgroup"}], "networks": [{"uuid": "c851a748-7a18-419a-85a2-b23130bc3582"}]}}' 667s DEBUG (connectionpool:429) https://nova.ps7.canonical.com:8774 "POST /v2.1/servers HTTP/1.1" 202 476 667s DEBUG (session:548) RESP: [202] Connection: Keep-Alive Content-Length: 476 Content-Type: application/json Date: Wed, 04 Feb 2026 09:30:09 GMT Keep-Alive: timeout=75, max=995 OpenStack-API-Version: compute 2.87 Server: Apache/2.4.52 (Ubuntu) Vary: OpenStack-API-Version,X-OpenStack-Nova-API-Version X-OpenStack-Nova-API-Version: 2.87 location: https://nova.ps7.canonical.com:8774/v2.1/servers/c320e9e9-d1e6-47c7-adbc-1d0ad1135dae x-compute-request-id: req-7281f884-3111-4a40-9917-080dd7714c58 x-openstack-request-id: req-7281f884-3111-4a40-9917-080dd7714c58 667s DEBUG (session:580) RESP BODY: {"server": {"id": "c320e9e9-d1e6-47c7-adbc-1d0ad1135dae", "links": [{"rel": "self", "href": "https://nova.ps7.canonical.com:8774/v2.1/servers/c320e9e9-d1e6-47c7-adbc-1d0ad1135dae"}, {"rel": "bookmark", "href": "https://nova.ps7.canonical.com:8774/servers/c320e9e9-d1e6-47c7-adbc-1d0ad1135dae"}], "OS-DCF:diskConfig": "MANUAL", "security_groups": [{"name": "autopkgtest-juju-7f2275-prod-proposed-migration-environment-20@sto01-s390x-8.secgroup"}], "adminPass": "3snJtVYdNF2g"}} 667s DEBUG (session:936) POST call to compute for https://nova.ps7.canonical.com:8774/v2.1/servers used request id req-7281f884-3111-4a40-9917-080dd7714c58 667s DEBUG (session:517) REQ: curl -g -i -X GET https://nova.ps7.canonical.com:8774/v2.1/servers/c320e9e9-d1e6-47c7-adbc-1d0ad1135dae -H "Accept: application/json" -H "OpenStack-API-Version: compute 2.87" -H "User-Agent: python-novaclient" -H "X-Auth-Token: {SHA256}4bf5063bce7ea771876454cf6ace2df9fdb4e3d3f06e07526f10e3909a9ebd33" -H "X-OpenStack-Nova-API-Version: 2.87" 667s DEBUG (connectionpool:429) https://nova.ps7.canonical.com:8774 "GET /v2.1/servers/c320e9e9-d1e6-47c7-adbc-1d0ad1135dae HTTP/1.1" 200 2712 667s DEBUG (session:548) RESP: [200] Connection: Keep-Alive Content-Length: 2712 Content-Type: application/json Date: Wed, 04 Feb 2026 09:30:10 GMT Keep-Alive: timeout=75, max=994 OpenStack-API-Version: compute 2.87 Server: Apache/2.4.52 (Ubuntu) Vary: OpenStack-API-Version,X-OpenStack-Nova-API-Version X-OpenStack-Nova-API-Version: 2.87 x-compute-request-id: req-305880de-8b3e-4445-8f19-6589d39aed59 x-openstack-request-id: req-305880de-8b3e-4445-8f19-6589d39aed59 667s DEBUG (session:580) RESP BODY: {"server": {"id": "c320e9e9-d1e6-47c7-adbc-1d0ad1135dae", "name": "adt-resolute-s390x-libreswan-20260204-091908-juju-7f2275-prod-proposed-migration-environment-20-1a5ee991-f772-4f21-8781-b29e8f104431", "status": "BUILD", "tenant_id": "893eec2fc86d4c948fb8c70f765f14df", "user_id": "9be12b7a7a7444fdba023d067f039a4a", "metadata": {}, "hostId": "", "image": {"id": "733879ca-10c9-4d0b-9d4a-492c78d47079", "links": [{"rel": "bookmark", "href": "https://nova.ps7.canonical.com:8774/images/733879ca-10c9-4d0b-9d4a-492c78d47079"}]}, "flavor": {"vcpus": 2, "ram": 4096, "disk": 20, "ephemeral": 0, "swap": 0, "original_name": "autopkgtest-cpu2-ram4-disk20-s390x", "extra_specs": {"aggregate_instance_extra_specs:commit": "s390x", "hw:cpu_policy": "shared", "hw:mem_page_size": "large", "hw:pci_numa_affinity_policy": "preferred"}}, "created": "2026-02-04T09:30:10Z", "updated": "2026-02-04T09:30:10Z", "addresses": {}, "accessIPv4": "", "accessIPv6": "", "links": [{"rel": "self", "href": "https://nova.ps7.canonical.com:8774/v2.1/servers/c320e9e9-d1e6-47c7-adbc-1d0ad1135dae"}, {"rel": "bookmark", "href": "https://nova.ps7.canonical.com:8774/servers/c320e9e9-d1e6-47c7-adbc-1d0ad1135dae"}], "OS-DCF:diskConfig": "MANUAL", "progress": 0, "OS-EXT-AZ:availability_zone": "", "config_drive": "", "key_name": "testbed-juju-7f2275-prod-proposed-migration-environment-20", "OS-SRV-USG:launched_at": null, "OS-SRV-USG:terminated_at": null, "OS-EXT-SRV-ATTR:host": null, "OS-EXT-SRV-ATTR:instance_name": "", "OS-EXT-SRV-ATTR:hypervisor_hostname": null, "OS-EXT-SRV-ATTR:reservation_id": "r-slvl6w05", "OS-EXT-SRV-ATTR:launch_index": 0, "OS-EXT-SRV-ATTR:hostname": "adt-resolute-s390x-libreswan-20260204-091908-juju-7f2275-prod-p", "OS-EXT-SRV-ATTR:kernel_id": "", "OS-EXT-SRV-ATTR:ramdisk_id": "", "OS-EXT-SRV-ATTR:root_device_name": null, "OS-EXT-SRV-ATTR:user_data": "I2Nsb3VkLWNvbmZpZwpob3N0bmFtZTogYXV0b3BrZ3Rlc3QKZnFkbjogYXV0b3BrZ3Rlc3QubG9jYWwKbWFuYWdlX2V0Y19ob3N0czogdHJ1ZQphcHRfdXBkYXRlOiB0cnVlCmFwdF91cGdyYWRlOiBmYWxzZQphcHRfbWlycm9yOiBodHRwOi8vZnRwbWFzdGVyLmludGVybmFsL3VidW50dS8KCnJ1bmNtZDoKIC0gZWNobyAnQWNxdWlyZTo6TGFuZ3VhZ2VzICJub25lIjsnID4gL2V0Yy9hcHQvYXB0LmNvbmYuZC85MG5vbGFuZ3VhZ2VzCiAtIGVjaG8gJ2ZvcmNlLXVuc2FmZS1pbycgPiAvZXRjL2Rwa2cvZHBrZy5jZmcuZC9hdXRvcGtndGVzdAogLSBwcmludGYgJ1xuVEVSTT1saW51eFxuJyA+PiAvZXRjL2Vudmlyb25tZW50CiAtIHNlZCAtaSAtciAnL14xMjcuMC4xLjEvIHMvYXV0b3BrZ3Rlc3QtW14gXStcLi9hdXRvcGtndGVzdFwuLycgL2V0Yy9ob3N0cwo=", "OS-EXT-STS:task_state": "scheduling", "OS-EXT-STS:vm_state": "building", "OS-EXT-STS:power_state": 0, "os-extended-volumes:volumes_attached": [], "locked": false, "locked_reason": null, "description": null, "tags": [], "trusted_image_certificates": null, "server_groups": []}} 667s DEBUG (session:936) GET call to compute for https://nova.ps7.canonical.com:8774/v2.1/servers/c320e9e9-d1e6-47c7-adbc-1d0ad1135dae used request id req-305880de-8b3e-4445-8f19-6589d39aed59 667s DEBUG (session:517) REQ: curl -g -i -X GET https://glance.ps7.canonical.com:9292/v2/images/733879ca-10c9-4d0b-9d4a-492c78d47079 -H "Accept: application/json" -H "OpenStack-API-Version: compute 2.87" -H "User-Agent: python-novaclient" -H "X-Auth-Token: {SHA256}4bf5063bce7ea771876454cf6ace2df9fdb4e3d3f06e07526f10e3909a9ebd33" -H "X-OpenStack-Nova-API-Version: 2.87" 667s DEBUG (connectionpool:429) https://glance.ps7.canonical.com:9292 "GET /v2/images/733879ca-10c9-4d0b-9d4a-492c78d47079 HTTP/1.1" 200 2240 667s DEBUG (session:548) RESP: [200] Connection: Keep-Alive Content-Length: 2240 Content-Type: application/json Date: Wed, 04 Feb 2026 09:30:10 GMT Keep-Alive: timeout=75, max=999 Server: Apache/2.4.52 (Ubuntu) X-Openstack-Request-Id: req-ddbac197-78aa-487f-abe0-2bf0cbf985a5 667s DEBUG (session:580) RESP BODY: {"architecture": "s390x", "base_image_ref": "2dd19fd1-572f-4228-8cc3-8a2340c18bdd", "boot_roles": "load-balancer_member,member,reader", "content_id": "auto.sync", "hw_cdrom_bus": "scsi", "hw_disk_bus": "virtio", "hw_machine_type": "s390-ccw-virtio", "hw_vif_model": "virtio", "image_location": "snapshot", "image_state": "available", "image_type": "snapshot", "img_config_drive": "mandatory", "instance_uuid": "d1bad1b6-2f04-488a-9ca6-9e103e092d67", "item_name": "disk1.img", "os_distro": "ubuntu", "os_version": "26.04", "owner_id": "893eec2fc86d4c948fb8c70f765f14df", "owner_project_name": "prod-autopkgtest-workers-s390x_project", "owner_user_name": "prod-autopkgtest-workers-s390x", "product_name": "com.ubuntu.cloud.daily:server:26.04:s390x", "simplestreams_metadata": "{\"aliases\": \"26.04,r,resolute,devel\", \"arch\": \"s390x\", \"ftype\": \"disk1.img\", \"label\": \"daily\", \"os\": \"ubuntu\", \"pubname\": \"ubuntu-resolute-daily-s390x-server-20260127\", \"release\": \"resolute\", \"release_codename\": \"Resolute Raccoon\", \"release_title\": \"26.04", "source_content_id": "com.ubuntu.cloud:daily:download", "user_id": "9be12b7a7a7444fdba023d067f039a4a", "version_name": "20260127", "name": "adt/ubuntu-resolute-s390x-server-20260203.img", "disk_format": "qcow2", "container_format": "bare", "visibility": "private", "size": 1800798208, "virtual_size": 21474836480, "status": "active", "checksum": "9b3d6be9947811e5212bcf008eaf03f5", "protected": false, "min_ram": 0, "min_disk": 20, "owner": "893eec2fc86d4c948fb8c70f765f14df", "os_hidden": false, "os_hash_algo": "sha256", "os_hash_value": "ee48b319eff984c28d76b7a37902acf659f0a7416412582606befe1c9ed4f623", "id": "733879ca-10c9-4d0b-9d4a-492c78d47079", "created_at": "2026-02-03T04:15:55Z", "updated_at": "2026-02-03T04:16:38Z", "locations": [{"url": "rbd://d8b83d88-b70a-11ef-be0b-2390f458e7bc/glance/733879ca-10c9-4d0b-9d4a-492c78d47079/snap", "metadata": {"store": "ceph"}}], "direct_url": "rbd://d8b83d88-b70a-11ef-be0b-2390f458e7bc/glance/733879ca-10c9-4d0b-9d4a-492c78d47079/snap", "tags": [], "self": "/v2/images/733879ca-10c9-4d0b-9d4a-492c78d47079", "file": "/v2/images/733879ca-10c9-4d0b-9d4a-492c78d47079/file", "schema": "/v2/schemas/image", "stores": "ceph"} 667s DEBUG (session:936) GET call to image for https://glance.ps7.canonical.com:9292/v2/images/733879ca-10c9-4d0b-9d4a-492c78d47079 used request id req-ddbac197-78aa-487f-abe0-2bf0cbf985a5 667s +--------------------------------------+--------------------------------------------------------------------------------------------------------------------------------------------------------+ 667s | Property | Value | 667s +--------------------------------------+--------------------------------------------------------------------------------------------------------------------------------------------------------+ 667s | OS-DCF:diskConfig | MANUAL | 667s | OS-EXT-AZ:availability_zone | | 667s | OS-EXT-SRV-ATTR:host | - | 667s | OS-EXT-SRV-ATTR:hostname | adt-resolute-s390x-libreswan-20260204-091908-juju-7f2275-prod-p | 667s | OS-EXT-SRV-ATTR:hypervisor_hostname | - | 667s | OS-EXT-SRV-ATTR:instance_name | | 667s | OS-EXT-SRV-ATTR:kernel_id | | 667s | OS-EXT-SRV-ATTR:launch_index | 0 | 667s | OS-EXT-SRV-ATTR:ramdisk_id | | 667s | OS-EXT-SRV-ATTR:reservation_id | r-slvl6w05 | 667s | OS-EXT-SRV-ATTR:root_device_name | - | 667s | OS-EXT-STS:power_state | 0 | 667s | OS-EXT-STS:task_state | scheduling | 667s | OS-EXT-STS:vm_state | building | 667s | OS-SRV-USG:launched_at | - | 667s | OS-SRV-USG:terminated_at | - | 667s | accessIPv4 | | 667s | accessIPv6 | | 667s | adminPass | 3snJtVYdNF2g | 667s | config_drive | | 667s | created | 2026-02-04T09:30:10Z | 667s | description | - | 667s | flavor:disk | 20 | 667s | flavor:ephemeral | 0 | 667s | flavor:extra_specs | {"aggregate_instance_extra_specs:commit": "s390x", "hw:cpu_policy": "shared", "hw:mem_page_size": "large", "hw:pci_numa_affinity_policy": "preferred"} | 667s | flavor:original_name | autopkgtest-cpu2-ram4-disk20-s390x | 667s | flavor:ram | 4096 | 667s | flavor:swap | 0 | 667s | flavor:vcpus | 2 | 667s | hostId | | 667s | id | c320e9e9-d1e6-47c7-adbc-1d0ad1135dae | 667s | image | adt/ubuntu-resolute-s390x-server-20260203.img (733879ca-10c9-4d0b-9d4a-492c78d47079) | 667s | key_name | testbed-juju-7f2275-prod-proposed-migration-environment-20 | 667s | locked | False | 667s | locked_reason | - | 667s | metadata | {} | 667s | name | adt-resolute-s390x-libreswan-20260204-091908-juju-7f2275-prod-proposed-migration-environment-20-1a5ee991-f772-4f21-8781-b29e8f104431 | 667s | os-extended-volumes:volumes_attached | [] | 667s | progress | 0 | 667s | security_groups | autopkgtest-juju-7f2275-prod-proposed-migration-environment-20@sto01-s390x-8.secgroup | 667s | server_groups | [] | 667s | status | BUILD | 667s | tags | [] | 667s | tenant_id | 893eec2fc86d4c948fb8c70f765f14df | 667s | trusted_image_certificates | - | 667s | updated | 2026-02-04T09:30:10Z | 667s | user_id | 9be12b7a7a7444fdba023d067f039a4a | 667s +--------------------------------------+--------------------------------------------------------------------------------------------------------------------------------------------------------+DEBUG (session:517) REQ: curl -g -i -X GET https://nova.ps7.canonical.com:8774/v2.1/servers/c320e9e9-d1e6-47c7-adbc-1d0ad1135dae -H "Accept: application/json" -H "OpenStack-API-Version: compute 2.87" -H "User-Agent: python-novaclient" -H "X-Auth-Token: {SHA256}4bf5063bce7ea771876454cf6ace2df9fdb4e3d3f06e07526f10e3909a9ebd33" -H "X-OpenStack-Nova-API-Version: 2.87" 667s DEBUG (connectionpool:429) https://nova.ps7.canonical.com:8774 "GET /v2.1/servers/c320e9e9-d1e6-47c7-adbc-1d0ad1135dae HTTP/1.1" 200 2712 667s DEBUG (session:548) RESP: [200] Connection: Keep-Alive Content-Length: 2712 Content-Type: application/json Date: Wed, 04 Feb 2026 09:30:10 GMT Keep-Alive: timeout=75, max=993 OpenStack-API-Version: compute 2.87 Server: Apache/2.4.52 (Ubuntu) Vary: OpenStack-API-Version,X-OpenStack-Nova-API-Version X-OpenStack-Nova-API-Version: 2.87 x-compute-request-id: req-939fdea9-aa8d-46db-9cf8-7d6a1648b137 x-openstack-request-id: req-939fdea9-aa8d-46db-9cf8-7d6a1648b137 667s DEBUG (session:580) RESP BODY: {"server": {"id": "c320e9e9-d1e6-47c7-adbc-1d0ad1135dae", "name": "adt-resolute-s390x-libreswan-20260204-091908-juju-7f2275-prod-proposed-migration-environment-20-1a5ee991-f772-4f21-8781-b29e8f104431", "status": "BUILD", "tenant_id": "893eec2fc86d4c948fb8c70f765f14df", "user_id": "9be12b7a7a7444fdba023d067f039a4a", "metadata": {}, "hostId": "", "image": {"id": "733879ca-10c9-4d0b-9d4a-492c78d47079", "links": [{"rel": "bookmark", "href": "https://nova.ps7.canonical.com:8774/images/733879ca-10c9-4d0b-9d4a-492c78d47079"}]}, "flavor": {"vcpus": 2, "ram": 4096, "disk": 20, "ephemeral": 0, "swap": 0, "original_name": "autopkgtest-cpu2-ram4-disk20-s390x", "extra_specs": {"aggregate_instance_extra_specs:commit": "s390x", "hw:cpu_policy": "shared", "hw:mem_page_size": "large", "hw:pci_numa_affinity_policy": "preferred"}}, "created": "2026-02-04T09:30:10Z", "updated": "2026-02-04T09:30:10Z", "addresses": {}, "accessIPv4": "", "accessIPv6": "", "links": [{"rel": "self", "href": "https://nova.ps7.canonical.com:8774/v2.1/servers/c320e9e9-d1e6-47c7-adbc-1d0ad1135dae"}, {"rel": "bookmark", "href": "https://nova.ps7.canonical.com:8774/servers/c320e9e9-d1e6-47c7-adbc-1d0ad1135dae"}], "OS-DCF:diskConfig": "MANUAL", "progress": 0, "OS-EXT-AZ:availability_zone": "", "config_drive": "", "key_name": "testbed-juju-7f2275-prod-proposed-migration-environment-20", "OS-SRV-USG:launched_at": null, "OS-SRV-USG:terminated_at": null, "OS-EXT-SRV-ATTR:host": null, "OS-EXT-SRV-ATTR:instance_name": "", "OS-EXT-SRV-ATTR:hypervisor_hostname": null, "OS-EXT-SRV-ATTR:reservation_id": "r-slvl6w05", "OS-EXT-SRV-ATTR:launch_index": 0, "OS-EXT-SRV-ATTR:hostname": "adt-resolute-s390x-libreswan-20260204-091908-juju-7f2275-prod-p", "OS-EXT-SRV-ATTR:kernel_id": "", "OS-EXT-SRV-ATTR:ramdisk_id": "", "OS-EXT-SRV-ATTR:root_device_name": null, "OS-EXT-SRV-ATTR:user_data": "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", "OS-EXT-STS:task_state": "scheduling", "OS-EXT-STS:vm_state": "building", "OS-EXT-STS:power_state": 0, "os-extended-volumes:volumes_attached": [], "locked": false, "locked_reason": null, "description": null, "tags": [], "trusted_image_certificates": null, "server_groups": []}} 667s DEBUG (session:936) GET call to compute for https://nova.ps7.canonical.com:8774/v2.1/servers/c320e9e9-d1e6-47c7-adbc-1d0ad1135dae used request id req-939fdea9-aa8d-46db-9cf8-7d6a1648b137 667s 667s 667s Server building... 0% completeDEBUG (session:517) REQ: curl -g -i -X GET https://nova.ps7.canonical.com:8774/v2.1/servers/c320e9e9-d1e6-47c7-adbc-1d0ad1135dae -H "Accept: application/json" -H "OpenStack-API-Version: compute 2.87" -H "User-Agent: python-novaclient" -H "X-Auth-Token: {SHA256}4bf5063bce7ea771876454cf6ace2df9fdb4e3d3f06e07526f10e3909a9ebd33" -H "X-OpenStack-Nova-API-Version: 2.87" 667s DEBUG (connectionpool:429) https://nova.ps7.canonical.com:8774 "GET /v2.1/servers/c320e9e9-d1e6-47c7-adbc-1d0ad1135dae HTTP/1.1" 200 2839 667s DEBUG (session:548) RESP: [200] Connection: Keep-Alive Content-Length: 2839 Content-Type: application/json Date: Wed, 04 Feb 2026 09:30:15 GMT Keep-Alive: timeout=75, max=992 OpenStack-API-Version: compute 2.87 Server: Apache/2.4.52 (Ubuntu) Vary: OpenStack-API-Version,X-OpenStack-Nova-API-Version X-OpenStack-Nova-API-Version: 2.87 x-compute-request-id: req-29ffdb72-3a62-4ffc-9049-fa3d97fdd35e x-openstack-request-id: req-29ffdb72-3a62-4ffc-9049-fa3d97fdd35e 667s DEBUG (session:580) RESP BODY: {"server": {"id": "c320e9e9-d1e6-47c7-adbc-1d0ad1135dae", "name": "adt-resolute-s390x-libreswan-20260204-091908-juju-7f2275-prod-proposed-migration-environment-20-1a5ee991-f772-4f21-8781-b29e8f104431", "status": "ERROR", "tenant_id": "893eec2fc86d4c948fb8c70f765f14df", "user_id": "9be12b7a7a7444fdba023d067f039a4a", "metadata": {}, "hostId": "", "image": {"id": "733879ca-10c9-4d0b-9d4a-492c78d47079", "links": [{"rel": "bookmark", "href": "https://nova.ps7.canonical.com:8774/images/733879ca-10c9-4d0b-9d4a-492c78d47079"}]}, "flavor": {"vcpus": 2, "ram": 4096, "disk": 20, "ephemeral": 0, "swap": 0, "original_name": "autopkgtest-cpu2-ram4-disk20-s390x", "extra_specs": {"aggregate_instance_extra_specs:commit": "s390x", "hw:cpu_policy": "shared", "hw:mem_page_size": "large", "hw:pci_numa_affinity_policy": "preferred"}}, "created": "2026-02-04T09:30:10Z", "updated": "2026-02-04T09:30:11Z", "addresses": {}, "accessIPv4": "", "accessIPv6": "", "links": [{"rel": "self", "href": "https://nova.ps7.canonical.com:8774/v2.1/servers/c320e9e9-d1e6-47c7-adbc-1d0ad1135dae"}, {"rel": "bookmark", "href": "https://nova.ps7.canonical.com:8774/servers/c320e9e9-d1e6-47c7-adbc-1d0ad1135dae"}], "OS-DCF:diskConfig": "MANUAL", "fault": {"code": 500, "created": "2026-02-04T09:30:11Z", "message": "No valid host was found. There are not enough hosts available."}, "OS-EXT-AZ:availability_zone": "", "config_drive": "", "key_name": "testbed-juju-7f2275-prod-proposed-migration-environment-20", "OS-SRV-USG:launched_at": null, "OS-SRV-USG:terminated_at": null, "OS-EXT-SRV-ATTR:host": null, "OS-EXT-SRV-ATTR:instance_name": "instance-00025196", "OS-EXT-SRV-ATTR:hypervisor_hostname": null, "OS-EXT-SRV-ATTR:reservation_id": "r-slvl6w05", "OS-EXT-SRV-ATTR:launch_index": 0, "OS-EXT-SRV-ATTR:hostname": "adt-resolute-s390x-libreswan-20260204-091908-juju-7f2275-prod-p", "OS-EXT-SRV-ATTR:kernel_id": "", "OS-EXT-SRV-ATTR:ramdisk_id": "", "OS-EXT-SRV-ATTR:root_device_name": null, "OS-EXT-SRV-ATTR:user_data": "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", "OS-EXT-STS:task_state": null, "OS-EXT-STS:vm_state": "error", "OS-EXT-STS:power_state": 0, "os-extended-volumes:volumes_attached": [], "locked": false, "locked_reason": null, "description": null, "tags": [], "trusted_image_certificates": null, "server_groups": []}} 667s DEBUG (session:936) GET call to compute for https://nova.ps7.canonical.com:8774/v2.1/servers/c320e9e9-d1e6-47c7-adbc-1d0ad1135dae used request id req-29ffdb72-3a62-4ffc-9049-fa3d97fdd35e 667s DEBUG (shell:822) 667s Traceback (most recent call last): 667s File "/usr/lib/python3/dist-packages/novaclient/shell.py", line 820, in main 667s OpenStackComputeShell().main(argv) 667s File "/usr/lib/python3/dist-packages/novaclient/shell.py", line 742, in main 667s args.func(self.cs, args) 667s File "/usr/lib/python3/dist-packages/novaclient/v2/shell.py", line 980, in do_boot 667s _poll_for_status(cs.servers.get, server.id, 'building', ['active']) 667s File "/usr/lib/python3/dist-packages/novaclient/v2/shell.py", line 1019, in _poll_for_status 667s raise exceptions.ResourceInErrorState(obj) 667s novaclient.exceptions.ResourceInErrorState: 667s ERROR (ResourceInErrorState): 667s 667s Error building server 1045s autopkgtest [09:36:33]: testbed dpkg architecture: s390x 1045s autopkgtest [09:36:33]: testbed apt version: 3.1.14 1046s autopkgtest [09:36:34]: @@@@@@@@@@@@@@@@@@@@ test bed setup 1046s autopkgtest [09:36:34]: testbed release detected to be: resolute 1048s autopkgtest [09:36:36]: updating testbed package index (apt update) 1048s Get:1 http://ftpmaster.internal/ubuntu resolute-proposed InRelease [124 kB] 1048s Hit:2 http://ftpmaster.internal/ubuntu resolute InRelease 1048s Hit:3 http://ftpmaster.internal/ubuntu resolute-updates InRelease 1048s Hit:4 http://ftpmaster.internal/ubuntu resolute-security InRelease 1048s Get:5 http://ftpmaster.internal/ubuntu resolute-proposed/universe Sources [1720 kB] 1049s Get:6 http://ftpmaster.internal/ubuntu resolute-proposed/multiverse Sources [35.1 kB] 1049s Get:7 http://ftpmaster.internal/ubuntu resolute-proposed/restricted Sources [5260 B] 1049s Get:8 http://ftpmaster.internal/ubuntu resolute-proposed/main Sources [229 kB] 1049s Get:9 http://ftpmaster.internal/ubuntu resolute-proposed/main s390x Packages [257 kB] 1049s Get:10 http://ftpmaster.internal/ubuntu resolute-proposed/universe s390x Packages [1449 kB] 1049s Get:11 http://ftpmaster.internal/ubuntu resolute-proposed/multiverse s390x Packages [9648 B] 1051s Fetched 3830 kB in 3s (1442 kB/s) 1055s Reading package lists... 1056s Hit:1 http://ftpmaster.internal/ubuntu resolute-proposed InRelease 1056s Hit:2 http://ftpmaster.internal/ubuntu resolute InRelease 1056s Hit:3 http://ftpmaster.internal/ubuntu resolute-updates InRelease 1056s Hit:4 http://ftpmaster.internal/ubuntu resolute-security InRelease 1059s Reading package lists... 1059s Reading package lists... 1060s Building dependency tree... 1060s Reading state information... 1061s Calculating upgrade... 1062s The following packages will be upgraded: 1062s debconf debconf-i18n htop libmd0 libzstd1 powermgmt-base python3-debconf 1062s python3-lazr.restfulclient systemd-hwe-hwdb zstd 1062s 10 upgraded, 0 newly installed, 0 to remove and 0 not upgraded. 1062s Need to get 1700 kB of archives. 1062s After this operation, 1024 B of additional disk space will be used. 1062s Get:1 http://ftpmaster.internal/ubuntu resolute-proposed/main s390x python3-debconf all 1.5.91build1 [4174 B] 1062s Get:2 http://ftpmaster.internal/ubuntu resolute-proposed/main s390x debconf-i18n all 1.5.91build1 [227 kB] 1062s Get:3 http://ftpmaster.internal/ubuntu resolute-proposed/main s390x debconf all 1.5.91build1 [126 kB] 1062s Get:4 http://ftpmaster.internal/ubuntu resolute/main s390x libmd0 s390x 1.1.0-2build4 [23.7 kB] 1062s Get:5 http://ftpmaster.internal/ubuntu resolute/main s390x libzstd1 s390x 1.5.7+dfsg-3 [346 kB] 1062s Get:6 http://ftpmaster.internal/ubuntu resolute/main s390x systemd-hwe-hwdb all 259.0.1 [3152 B] 1062s Get:7 http://ftpmaster.internal/ubuntu resolute/main s390x powermgmt-base all 1.38ubuntu2 [7878 B] 1062s Get:8 http://ftpmaster.internal/ubuntu resolute/main s390x htop s390x 3.4.1-5build2 [188 kB] 1062s Get:9 http://ftpmaster.internal/ubuntu resolute/main s390x python3-lazr.restfulclient all 0.14.6-3build1 [51.1 kB] 1062s Get:10 http://ftpmaster.internal/ubuntu resolute/main s390x zstd s390x 1.5.7+dfsg-3 [724 kB] 1063s dpkg-preconfigure: unable to re-open stdin: No such file or directory 1064s Fetched 1700 kB in 0s (5369 kB/s) 1064s (Reading database ... (Reading database ... 5% (Reading database ... 10% (Reading database ... 15% (Reading database ... 20% (Reading database ... 25% (Reading database ... 30% (Reading database ... 35% (Reading database ... 40% (Reading database ... 45% (Reading database ... 50% (Reading database ... 55% (Reading database ... 60% (Reading database ... 65% (Reading database ... 70% (Reading database ... 75% (Reading database ... 80% (Reading database ... 85% (Reading database ... 90% (Reading database ... 95% (Reading database ... 100% (Reading database ... 61953 files and directories currently installed.) 1064s Preparing to unpack .../python3-debconf_1.5.91build1_all.deb ... 1064s Unpacking python3-debconf (1.5.91build1) over (1.5.91) ... 1064s Preparing to unpack .../debconf-i18n_1.5.91build1_all.deb ... 1064s Unpacking debconf-i18n (1.5.91build1) over (1.5.91) ... 1065s Preparing to unpack .../debconf_1.5.91build1_all.deb ... 1065s Unpacking debconf (1.5.91build1) over (1.5.91) ... 1065s Setting up debconf (1.5.91build1) ... 1066s (Reading database ... (Reading database ... 5% (Reading database ... 10% (Reading database ... 15% (Reading database ... 20% (Reading database ... 25% (Reading database ... 30% (Reading database ... 35% (Reading database ... 40% (Reading database ... 45% (Reading database ... 50% (Reading database ... 55% (Reading database ... 60% (Reading database ... 65% (Reading database ... 70% (Reading database ... 75% (Reading database ... 80% (Reading database ... 85% (Reading database ... 90% (Reading database ... 95% (Reading database ... 100% (Reading database ... 61953 files and directories currently installed.) 1066s Preparing to unpack .../libmd0_1.1.0-2build4_s390x.deb ... 1066s Unpacking libmd0:s390x (1.1.0-2build4) over (1.1.0-2build3) ... 1066s Setting up libmd0:s390x (1.1.0-2build4) ... 1066s (Reading database ... (Reading database ... 5% (Reading database ... 10% (Reading database ... 15% (Reading database ... 20% (Reading database ... 25% (Reading database ... 30% (Reading database ... 35% (Reading database ... 40% (Reading database ... 45% (Reading database ... 50% (Reading database ... 55% (Reading database ... 60% (Reading database ... 65% (Reading database ... 70% (Reading database ... 75% (Reading database ... 80% (Reading database ... 85% (Reading database ... 90% (Reading database ... 95% (Reading database ... 100% (Reading database ... 61953 files and directories currently installed.) 1066s Preparing to unpack .../libzstd1_1.5.7+dfsg-3_s390x.deb ... 1066s Unpacking libzstd1:s390x (1.5.7+dfsg-3) over (1.5.7+dfsg-2) ... 1066s Setting up libzstd1:s390x (1.5.7+dfsg-3) ... 1067s (Reading database ... (Reading database ... 5% (Reading database ... 10% (Reading database ... 15% (Reading database ... 20% (Reading database ... 25% (Reading database ... 30% (Reading database ... 35% (Reading database ... 40% (Reading database ... 45% (Reading database ... 50% (Reading database ... 55% (Reading database ... 60% (Reading database ... 65% (Reading database ... 70% (Reading database ... 75% (Reading database ... 80% (Reading database ... 85% (Reading database ... 90% (Reading database ... 95% (Reading database ... 100% (Reading database ... 61953 files and directories currently installed.) 1067s Preparing to unpack .../systemd-hwe-hwdb_259.0.1_all.deb ... 1067s Unpacking systemd-hwe-hwdb (259.0.1) over (257.7.1) ... 1067s Preparing to unpack .../powermgmt-base_1.38ubuntu2_all.deb ... 1067s Unpacking powermgmt-base (1.38ubuntu2) over (1.38ubuntu1) ... 1067s Preparing to unpack .../htop_3.4.1-5build2_s390x.deb ... 1067s Unpacking htop (3.4.1-5build2) over (3.4.1-5build1) ... 1067s Preparing to unpack .../python3-lazr.restfulclient_0.14.6-3build1_all.deb ... 1067s Unpacking python3-lazr.restfulclient (0.14.6-3build1) over (0.14.6-3) ... 1067s Preparing to unpack .../zstd_1.5.7+dfsg-3_s390x.deb ... 1068s Unpacking zstd (1.5.7+dfsg-3) over (1.5.7+dfsg-2) ... 1068s Setting up powermgmt-base (1.38ubuntu2) ... 1068s Setting up htop (3.4.1-5build2) ... 1068s Setting up python3-debconf (1.5.91build1) ... 1068s Setting up debconf-i18n (1.5.91build1) ... 1068s Setting up systemd-hwe-hwdb (259.0.1) ... 1071s Setting up python3-lazr.restfulclient (0.14.6-3build1) ... 1072s Setting up zstd (1.5.7+dfsg-3) ... 1072s Processing triggers for man-db (2.13.1-1) ... 1076s Processing triggers for udev (259-1ubuntu3) ... 1078s Processing triggers for libc-bin (2.42-2ubuntu4) ... 1078s autopkgtest [09:37:06]: upgrading testbed (apt dist-upgrade and autopurge) 1078s Reading package lists... 1079s Building dependency tree... 1079s Reading state information... 1080s Calculating upgrade... 1081s 0 upgraded, 0 newly installed, 0 to remove and 0 not upgraded. 1081s Reading package lists... 1081s Building dependency tree... 1081s Reading state information... 1081s Solving dependencies... 1081s 0 upgraded, 0 newly installed, 0 to remove and 0 not upgraded. 1087s Reading package lists... 1088s Building dependency tree... 1088s Reading state information... 1089s Solving dependencies... 1089s The following NEW packages will be installed: 1089s dns-root-data libevent-2.1-7t64 libevent-pthreads-2.1-7t64 libldns3t64 1089s libnss3-tools libreswan libunbound8 1090s 0 upgraded, 7 newly installed, 0 to remove and 0 not upgraded. 1090s Need to get 2943 kB of archives. 1090s After this operation, 11.8 MB of additional disk space will be used. 1090s Get:1 http://ftpmaster.internal/ubuntu resolute/main s390x dns-root-data all 2025080400build1 [6022 B] 1090s Get:2 http://ftpmaster.internal/ubuntu resolute/main s390x libnss3-tools s390x 2:3.120-1 [637 kB] 1090s Get:3 http://ftpmaster.internal/ubuntu resolute/main s390x libevent-pthreads-2.1-7t64 s390x 2.1.12-stable-10build1 [8060 B] 1090s Get:4 http://ftpmaster.internal/ubuntu resolute/universe s390x libldns3t64 s390x 1.8.4-2build1 [170 kB] 1090s Get:5 http://ftpmaster.internal/ubuntu resolute/main s390x libevent-2.1-7t64 s390x 2.1.12-stable-10build1 [144 kB] 1090s Get:6 http://ftpmaster.internal/ubuntu resolute/main s390x libunbound8 s390x 1.24.2-1ubuntu1 [464 kB] 1090s Get:7 http://ftpmaster.internal/ubuntu resolute/universe s390x libreswan s390x 5.2-2.2ubuntu1 [1515 kB] 1092s Fetched 2943 kB in 1s (2906 kB/s) 1092s Selecting previously unselected package dns-root-data. 1092s (Reading database ... (Reading database ... 5% (Reading database ... 10% (Reading database ... 15% (Reading database ... 20% (Reading database ... 25% (Reading database ... 30% (Reading database ... 35% (Reading database ... 40% (Reading database ... 45% (Reading database ... 50% (Reading database ... 55% (Reading database ... 60% (Reading database ... 65% (Reading database ... 70% (Reading database ... 75% (Reading database ... 80% (Reading database ... 85% (Reading database ... 90% (Reading database ... 95% (Reading database ... 100% (Reading database ... 61954 files and directories currently installed.) 1092s Preparing to unpack .../0-dns-root-data_2025080400build1_all.deb ... 1092s Unpacking dns-root-data (2025080400build1) ... 1092s Selecting previously unselected package libnss3-tools. 1092s Preparing to unpack .../1-libnss3-tools_2%3a3.120-1_s390x.deb ... 1092s Unpacking libnss3-tools (2:3.120-1) ... 1092s Selecting previously unselected package libevent-pthreads-2.1-7t64:s390x. 1092s Preparing to unpack .../2-libevent-pthreads-2.1-7t64_2.1.12-stable-10build1_s390x.deb ... 1092s Unpacking libevent-pthreads-2.1-7t64:s390x (2.1.12-stable-10build1) ... 1092s Selecting previously unselected package libldns3t64:s390x. 1092s Preparing to unpack .../3-libldns3t64_1.8.4-2build1_s390x.deb ... 1092s Unpacking libldns3t64:s390x (1.8.4-2build1) ... 1092s Selecting previously unselected package libevent-2.1-7t64:s390x. 1092s Preparing to unpack .../4-libevent-2.1-7t64_2.1.12-stable-10build1_s390x.deb ... 1092s Unpacking libevent-2.1-7t64:s390x (2.1.12-stable-10build1) ... 1092s Selecting previously unselected package libunbound8:s390x. 1092s Preparing to unpack .../5-libunbound8_1.24.2-1ubuntu1_s390x.deb ... 1092s Unpacking libunbound8:s390x (1.24.2-1ubuntu1) ... 1093s Selecting previously unselected package libreswan. 1093s Preparing to unpack .../6-libreswan_5.2-2.2ubuntu1_s390x.deb ... 1093s Unpacking libreswan (5.2-2.2ubuntu1) ... 1093s Setting up libldns3t64:s390x (1.8.4-2build1) ... 1093s Setting up libevent-pthreads-2.1-7t64:s390x (2.1.12-stable-10build1) ... 1093s Setting up libevent-2.1-7t64:s390x (2.1.12-stable-10build1) ... 1093s Setting up dns-root-data (2025080400build1) ... 1093s Setting up libunbound8:s390x (1.24.2-1ubuntu1) ... 1093s Setting up libnss3-tools (2:3.120-1) ... 1093s Setting up libreswan (5.2-2.2ubuntu1) ... 1095s ipsec.service is a disabled or a static unit, not starting it. 1095s Processing triggers for man-db (2.13.1-1) ... 1097s Processing triggers for libc-bin (2.42-2ubuntu4) ... 1128s autopkgtest [09:37:56]: test cavp: [----------------------- 1129s Testing installed CAVP binary: /usr/libexec/ipsec/cavp 1133s test: IKE v2 1133s Reading from ikev2.fax 1144s test: IKE v1 Digital Signature Authentication 1144s Reading from ikev1_dsa.fax 1150s test: IKE v1 Pre-shared Key Authentication 1150s Reading from ikev1_psk.fax 1157s /tmp/autopkgtest.GYPXqp/build.kDt/src 1157s autopkgtest [09:38:25]: test cavp: -----------------------] 1158s autopkgtest [09:38:26]: test cavp: - - - - - - - - - - results - - - - - - - - - - 1158s cavp PASS 1158s autopkgtest [09:38:26]: @@@@@@@@@@@@@@@@@@@@ summary 1158s opportunistic SKIP exit status 77 and marked as skippable 1158s cryptocheck PASS 1158s cavp PASS