0s autopkgtest [17:03:48]: starting date and time: 2026-02-07 17:03:48+0000 1s autopkgtest [17:03:49]: git checkout: 4b346b80 nova: make wait_reboot return success even when a no-op 1s autopkgtest [17:03:49]: host juju-7f2275-prod-proposed-migration-environment-15; command line: /home/ubuntu/autopkgtest/runner/autopkgtest --output-dir /tmp/autopkgtest-work._ga2unce/out --timeout-copy=6000 --needs-internet=try --setup-commands /home/ubuntu/autopkgtest-cloud/worker-config-production/setup-canonical.sh --apt-pocket=proposed=src:glibc --apt-upgrade libreswan --timeout-short=300 --timeout-copy=20000 --timeout-build=20000 --env=ADT_TEST_TRIGGERS=glibc/2.42-2ubuntu5 -- ssh -s /home/ubuntu/autopkgtest/ssh-setup/nova -- --flavor autopkgtest-cpu2-ram4-disk20-s390x --security-groups autopkgtest-juju-7f2275-prod-proposed-migration-environment-15@sto01-s390x-25.secgroup --name adt-resolute-s390x-libreswan-20260207-170348-juju-7f2275-prod-proposed-migration-environment-15-89930aeb-cbd2-4509-bd60-d93d5499de97 --image adt/ubuntu-resolute-s390x-server --keyname testbed-juju-7f2275-prod-proposed-migration-environment-15 --net-id=net_prod-autopkgtest-workers-s390x -e TERM=linux --mirror=http://ftpmaster.internal/ubuntu/ 4s Creating nova instance adt-resolute-s390x-libreswan-20260207-170348-juju-7f2275-prod-proposed-migration-environment-15-89930aeb-cbd2-4509-bd60-d93d5499de97 from image adt/ubuntu-resolute-s390x-server-20260206.img (UUID 49c0a1d9-89cb-4112-bb14-7a2a39e81cac)... 147s autopkgtest [17:06:15]: testbed dpkg architecture: s390x 147s autopkgtest [17:06:15]: testbed apt version: 3.1.15 148s autopkgtest [17:06:16]: @@@@@@@@@@@@@@@@@@@@ test bed setup 149s autopkgtest [17:06:17]: testbed release detected to be: None 150s autopkgtest [17:06:18]: updating testbed package index (apt update) 151s Get:1 http://ftpmaster.internal/ubuntu resolute-proposed InRelease [124 kB] 151s Hit:2 http://ftpmaster.internal/ubuntu resolute InRelease 151s Hit:3 http://ftpmaster.internal/ubuntu resolute-updates InRelease 151s Hit:4 http://ftpmaster.internal/ubuntu resolute-security InRelease 151s Get:5 http://ftpmaster.internal/ubuntu resolute-proposed/main Sources [199 kB] 151s Get:6 http://ftpmaster.internal/ubuntu resolute-proposed/universe Sources [1674 kB] 153s Get:7 http://ftpmaster.internal/ubuntu resolute-proposed/multiverse Sources [36.0 kB] 153s Get:8 http://ftpmaster.internal/ubuntu resolute-proposed/restricted Sources [10.7 kB] 153s Get:9 http://ftpmaster.internal/ubuntu resolute-proposed/main s390x Packages [233 kB] 153s Get:10 http://ftpmaster.internal/ubuntu resolute-proposed/universe s390x Packages [1426 kB] 155s Get:11 http://ftpmaster.internal/ubuntu resolute-proposed/multiverse s390x Packages [10.2 kB] 156s Fetched 3713 kB in 4s (879 kB/s) 160s Reading package lists... 161s Hit:1 http://ftpmaster.internal/ubuntu resolute-proposed InRelease 161s Hit:2 http://ftpmaster.internal/ubuntu resolute InRelease 161s Hit:3 http://ftpmaster.internal/ubuntu resolute-updates InRelease 161s Hit:4 http://ftpmaster.internal/ubuntu resolute-security InRelease 167s Reading package lists... 168s Reading package lists... 170s Building dependency tree... 170s Reading state information... 170s Calculating upgrade... 171s The following packages will be upgraded: 171s 3cpio libc-bin libc-gconv-modules-extra libc6 libevent-core-2.1-7t64 171s libpcap0.8t64 locales 171s 7 upgraded, 0 newly installed, 0 to remove and 0 not upgraded. 171s Need to get 8482 kB of archives. 171s After this operation, 0 B of additional disk space will be used. 171s Get:1 http://ftpmaster.internal/ubuntu resolute-proposed/main s390x libc-gconv-modules-extra s390x 2.42-2ubuntu5 [1369 kB] 173s Get:2 http://ftpmaster.internal/ubuntu resolute-proposed/main s390x libc6 s390x 2.42-2ubuntu5 [1623 kB] 175s Get:3 http://ftpmaster.internal/ubuntu resolute-proposed/main s390x libc-bin s390x 2.42-2ubuntu5 [674 kB] 177s Get:4 http://ftpmaster.internal/ubuntu resolute-proposed/main s390x locales all 2.42-2ubuntu5 [4255 kB] 182s Get:5 http://ftpmaster.internal/ubuntu resolute/main s390x libpcap0.8t64 s390x 1.10.5-2ubuntu3 [155 kB] 182s Get:6 http://ftpmaster.internal/ubuntu resolute/main s390x 3cpio s390x 0.14.0-1ubuntu1 [313 kB] 182s Get:7 http://ftpmaster.internal/ubuntu resolute/main s390x libevent-core-2.1-7t64 s390x 2.1.12-stable-10build2 [93.1 kB] 184s dpkg-preconfigure: unable to re-open stdin: No such file or directory 184s Fetched 8482 kB in 11s (787 kB/s) 187s (Reading database ... (Reading database ... 5% (Reading database ... 10% (Reading database ... 15% (Reading database ... 20% (Reading database ... 25% (Reading database ... 30% (Reading database ... 35% (Reading database ... 40% (Reading database ... 45% (Reading database ... 50% (Reading database ... 55% (Reading database ... 60% (Reading database ... 65% (Reading database ... 70% (Reading database ... 75% (Reading database ... 80% (Reading database ... 85% (Reading database ... 90% (Reading database ... 95% (Reading database ... 100% (Reading database ... 61954 files and directories currently installed.) 187s Preparing to unpack .../libc-gconv-modules-extra_2.42-2ubuntu5_s390x.deb ... 187s Unpacking libc-gconv-modules-extra:s390x (2.42-2ubuntu5) over (2.42-2ubuntu4) ... 187s Setting up libc-gconv-modules-extra:s390x (2.42-2ubuntu5) ... 187s (Reading database ... (Reading database ... 5% (Reading database ... 10% (Reading database ... 15% (Reading database ... 20% (Reading database ... 25% (Reading database ... 30% (Reading database ... 35% (Reading database ... 40% (Reading database ... 45% (Reading database ... 50% (Reading database ... 55% (Reading database ... 60% (Reading database ... 65% (Reading database ... 70% (Reading database ... 75% (Reading database ... 80% (Reading database ... 85% (Reading database ... 90% (Reading database ... 95% (Reading database ... 100% (Reading database ... 61954 files and directories currently installed.) 187s Preparing to unpack .../libc6_2.42-2ubuntu5_s390x.deb ... 188s Unpacking libc6:s390x (2.42-2ubuntu5) over (2.42-2ubuntu4) ... 189s Setting up libc6:s390x (2.42-2ubuntu5) ... 190s (Reading database ... (Reading database ... 5% (Reading database ... 10% (Reading database ... 15% (Reading database ... 20% (Reading database ... 25% (Reading database ... 30% (Reading database ... 35% (Reading database ... 40% (Reading database ... 45% (Reading database ... 50% (Reading database ... 55% (Reading database ... 60% (Reading database ... 65% (Reading database ... 70% (Reading database ... 75% (Reading database ... 80% (Reading database ... 85% (Reading database ... 90% (Reading database ... 95% (Reading database ... 100% (Reading database ... 61954 files and directories currently installed.) 190s Preparing to unpack .../libc-bin_2.42-2ubuntu5_s390x.deb ... 190s Unpacking libc-bin (2.42-2ubuntu5) over (2.42-2ubuntu4) ... 190s Setting up libc-bin (2.42-2ubuntu5) ... 190s (Reading database ... (Reading database ... 5% (Reading database ... 10% (Reading database ... 15% (Reading database ... 20% (Reading database ... 25% (Reading database ... 30% (Reading database ... 35% (Reading database ... 40% (Reading database ... 45% (Reading database ... 50% (Reading database ... 55% (Reading database ... 60% (Reading database ... 65% (Reading database ... 70% (Reading database ... 75% (Reading database ... 80% (Reading database ... 85% (Reading database ... 90% (Reading database ... 95% (Reading database ... 100% (Reading database ... 61954 files and directories currently installed.) 190s Preparing to unpack .../locales_2.42-2ubuntu5_all.deb ... 190s Unpacking locales (2.42-2ubuntu5) over (2.42-2ubuntu4) ... 192s Preparing to unpack .../libpcap0.8t64_1.10.5-2ubuntu3_s390x.deb ... 192s Unpacking libpcap0.8t64:s390x (1.10.5-2ubuntu3) over (1.10.5-2ubuntu2) ... 192s Preparing to unpack .../3cpio_0.14.0-1ubuntu1_s390x.deb ... 192s Unpacking 3cpio (0.14.0-1ubuntu1) over (0.13.1-1ubuntu1) ... 192s Preparing to unpack .../libevent-core-2.1-7t64_2.1.12-stable-10build2_s390x.deb ... 192s Unpacking libevent-core-2.1-7t64:s390x (2.1.12-stable-10build2) over (2.1.12-stable-10build1) ... 192s Setting up 3cpio (0.14.0-1ubuntu1) ... 192s Setting up locales (2.42-2ubuntu5) ... 195s Generating locales (this might take a while)... 203s en_US.UTF-8... done 204s Generation complete. 204s Setting up libpcap0.8t64:s390x (1.10.5-2ubuntu3) ... 204s Setting up libevent-core-2.1-7t64:s390x (2.1.12-stable-10build2) ... 204s Processing triggers for systemd (259-1ubuntu3) ... 207s Processing triggers for man-db (2.13.1-1) ... 212s Processing triggers for libc-bin (2.42-2ubuntu5) ... 213s autopkgtest [17:07:21]: upgrading testbed (apt dist-upgrade and autopurge) 214s Reading package lists... 215s Building dependency tree... 215s Reading state information... 216s Calculating upgrade... 217s 0 upgraded, 0 newly installed, 0 to remove and 0 not upgraded. 217s Reading package lists... 218s Building dependency tree... 218s Reading state information... 218s Solving dependencies... 219s 0 upgraded, 0 newly installed, 0 to remove and 0 not upgraded. 222s autopkgtest [17:07:30]: testbed running kernel: Linux 6.18.0-9-generic #9-Ubuntu SMP Mon Jan 12 15:39:23 UTC 2026 222s autopkgtest [17:07:30]: @@@@@@@@@@@@@@@@@@@@ apt-source libreswan 230s Get:1 http://ftpmaster.internal/ubuntu resolute/universe libreswan 5.2-2.2ubuntu1 (dsc) [2735 B] 230s Get:2 http://ftpmaster.internal/ubuntu resolute/universe libreswan 5.2-2.2ubuntu1 (tar) [4132 kB] 230s Get:3 http://ftpmaster.internal/ubuntu resolute/universe libreswan 5.2-2.2ubuntu1 (asc) [862 B] 230s Get:4 http://ftpmaster.internal/ubuntu resolute/universe libreswan 5.2-2.2ubuntu1 (diff) [16.7 kB] 230s gpgv: Signature made Thu Jul 31 14:30:12 2025 UTC 230s gpgv: using RSA key 25E3FF2D7F469DBE7D0D4E50AFCFEC8E669CE1C2 230s gpgv: Can't check signature: No public key 230s dpkg-source: warning: cannot verify inline signature for ./libreswan_5.2-2.2ubuntu1.dsc: no acceptable signature found 233s autopkgtest [17:07:41]: testing package libreswan version 5.2-2.2ubuntu1 234s autopkgtest [17:07:42]: build not needed 236s autopkgtest [17:07:44]: test opportunistic: preparing testbed 237s Reading package lists... 239s Building dependency tree... 239s Reading state information... 240s Solving dependencies... 240s The following NEW packages will be installed: 240s dns-root-data libevent-2.1-7t64 libevent-pthreads-2.1-7t64 libldns3t64 240s libnss3-tools libreswan libunbound8 240s 0 upgraded, 7 newly installed, 0 to remove and 0 not upgraded. 240s Need to get 2943 kB of archives. 240s After this operation, 11.8 MB of additional disk space will be used. 240s Get:1 http://ftpmaster.internal/ubuntu resolute/main s390x dns-root-data all 2025080400build1 [6022 B] 241s Get:2 http://ftpmaster.internal/ubuntu resolute/main s390x libnss3-tools s390x 2:3.120-1 [637 kB] 241s Get:3 http://ftpmaster.internal/ubuntu resolute/main s390x libevent-pthreads-2.1-7t64 s390x 2.1.12-stable-10build2 [8060 B] 241s Get:4 http://ftpmaster.internal/ubuntu resolute/universe s390x libldns3t64 s390x 1.8.4-2build1 [170 kB] 241s Get:5 http://ftpmaster.internal/ubuntu resolute/main s390x libevent-2.1-7t64 s390x 2.1.12-stable-10build2 [144 kB] 241s Get:6 http://ftpmaster.internal/ubuntu resolute/main s390x libunbound8 s390x 1.24.2-1ubuntu1 [464 kB] 242s Get:7 http://ftpmaster.internal/ubuntu resolute/universe s390x libreswan s390x 5.2-2.2ubuntu1 [1515 kB] 245s Fetched 2943 kB in 4s (763 kB/s) 245s Selecting previously unselected package dns-root-data. 245s (Reading database ... (Reading database ... 5% (Reading database ... 10% (Reading database ... 15% (Reading database ... 20% (Reading database ... 25% (Reading database ... 30% (Reading database ... 35% (Reading database ... 40% (Reading database ... 45% (Reading database ... 50% (Reading database ... 55% (Reading database ... 60% (Reading database ... 65% (Reading database ... 70% (Reading database ... 75% (Reading database ... 80% (Reading database ... 85% (Reading database ... 90% (Reading database ... 95% (Reading database ... 100% (Reading database ... 61954 files and directories currently installed.) 245s Preparing to unpack .../0-dns-root-data_2025080400build1_all.deb ... 245s Unpacking dns-root-data (2025080400build1) ... 245s Selecting previously unselected package libnss3-tools. 245s Preparing to unpack .../1-libnss3-tools_2%3a3.120-1_s390x.deb ... 245s Unpacking libnss3-tools (2:3.120-1) ... 245s Selecting previously unselected package libevent-pthreads-2.1-7t64:s390x. 245s Preparing to unpack .../2-libevent-pthreads-2.1-7t64_2.1.12-stable-10build2_s390x.deb ... 245s Unpacking libevent-pthreads-2.1-7t64:s390x (2.1.12-stable-10build2) ... 245s Selecting previously unselected package libldns3t64:s390x. 245s Preparing to unpack .../3-libldns3t64_1.8.4-2build1_s390x.deb ... 245s Unpacking libldns3t64:s390x (1.8.4-2build1) ... 245s Selecting previously unselected package libevent-2.1-7t64:s390x. 245s Preparing to unpack .../4-libevent-2.1-7t64_2.1.12-stable-10build2_s390x.deb ... 245s Unpacking libevent-2.1-7t64:s390x (2.1.12-stable-10build2) ... 245s Selecting previously unselected package libunbound8:s390x. 245s Preparing to unpack .../5-libunbound8_1.24.2-1ubuntu1_s390x.deb ... 245s Unpacking libunbound8:s390x (1.24.2-1ubuntu1) ... 245s Selecting previously unselected package libreswan. 245s Preparing to unpack .../6-libreswan_5.2-2.2ubuntu1_s390x.deb ... 245s Unpacking libreswan (5.2-2.2ubuntu1) ... 246s Setting up libldns3t64:s390x (1.8.4-2build1) ... 246s Setting up libevent-pthreads-2.1-7t64:s390x (2.1.12-stable-10build2) ... 246s Setting up libevent-2.1-7t64:s390x (2.1.12-stable-10build2) ... 246s Setting up dns-root-data (2025080400build1) ... 246s Setting up libunbound8:s390x (1.24.2-1ubuntu1) ... 246s Setting up libnss3-tools (2:3.120-1) ... 246s Setting up libreswan (5.2-2.2ubuntu1) ... 247s ipsec.service is a disabled or a static unit, not starting it. 247s Processing triggers for man-db (2.13.1-1) ... 251s Processing triggers for libc-bin (2.42-2ubuntu5) ... 254s autopkgtest [17:08:02]: test opportunistic: [----------------------- 255s ping: oe.libreswan.org: No address associated with hostname 256s autopkgtest [17:08:04]: test opportunistic: -----------------------] 256s opportunistic SKIP exit status 77 and marked as skippable 256s autopkgtest [17:08:04]: test opportunistic: - - - - - - - - - - results - - - - - - - - - - 256s autopkgtest [17:08:04]: test cryptocheck: preparing testbed 275s Creating nova instance adt-resolute-s390x-libreswan-20260207-170348-juju-7f2275-prod-proposed-migration-environment-15-89930aeb-cbd2-4509-bd60-d93d5499de97 from image adt/ubuntu-resolute-s390x-server-20260206.img (UUID 49c0a1d9-89cb-4112-bb14-7a2a39e81cac)... 485s autopkgtest [17:11:53]: testbed dpkg architecture: s390x 502s autopkgtest [17:12:10]: testbed apt version: 3.1.15 646s autopkgtest [17:14:30]: @@@@@@@@@@@@@@@@@@@@ test bed setup 658s autopkgtest [17:14:46]: testbed release detected to be: resolute 810s autopkgtest [17:17:18]: updating testbed package index (apt update) 813s Get:1 http://ftpmaster.internal/ubuntu resolute-proposed InRelease [124 kB] 813s Hit:2 http://ftpmaster.internal/ubuntu resolute InRelease 813s Hit:3 http://ftpmaster.internal/ubuntu resolute-updates InRelease 813s Hit:4 http://ftpmaster.internal/ubuntu resolute-security InRelease 813s Get:5 http://ftpmaster.internal/ubuntu resolute-proposed/main Sources [199 kB] 813s Get:6 http://ftpmaster.internal/ubuntu resolute-proposed/multiverse Sources [36.0 kB] 813s Get:7 http://ftpmaster.internal/ubuntu resolute-proposed/restricted Sources [10.7 kB] 813s Get:8 http://ftpmaster.internal/ubuntu resolute-proposed/universe Sources [1674 kB] 813s Get:9 http://ftpmaster.internal/ubuntu resolute-proposed/main s390x Packages [233 kB] 813s Get:10 http://ftpmaster.internal/ubuntu resolute-proposed/universe s390x Packages [1426 kB] 814s Get:11 http://ftpmaster.internal/ubuntu resolute-proposed/multiverse s390x Packages [10.2 kB] 817s Fetched 3713 kB in 3s (1140 kB/s) 821s Reading package lists... 853s Hit:1 http://ftpmaster.internal/ubuntu resolute-proposed InRelease 853s Hit:2 http://ftpmaster.internal/ubuntu resolute InRelease 853s Hit:3 http://ftpmaster.internal/ubuntu resolute-updates InRelease 853s Hit:4 http://ftpmaster.internal/ubuntu resolute-security InRelease 859s Reading package lists... 860s Reading package lists... 861s Building dependency tree... 861s Reading state information... 865s Calculating upgrade... 868s The following packages will be upgraded: 868s 3cpio libc-bin libc-gconv-modules-extra libc6 libevent-core-2.1-7t64 868s libpcap0.8t64 locales 868s 7 upgraded, 0 newly installed, 0 to remove and 0 not upgraded. 868s Need to get 8482 kB of archives. 868s After this operation, 0 B of additional disk space will be used. 868s Get:1 http://ftpmaster.internal/ubuntu resolute-proposed/main s390x libc-gconv-modules-extra s390x 2.42-2ubuntu5 [1369 kB] 868s Get:2 http://ftpmaster.internal/ubuntu resolute-proposed/main s390x libc6 s390x 2.42-2ubuntu5 [1623 kB] 868s Get:3 http://ftpmaster.internal/ubuntu resolute-proposed/main s390x libc-bin s390x 2.42-2ubuntu5 [674 kB] 868s Get:4 http://ftpmaster.internal/ubuntu resolute-proposed/main s390x locales all 2.42-2ubuntu5 [4255 kB] 868s Get:5 http://ftpmaster.internal/ubuntu resolute/main s390x libpcap0.8t64 s390x 1.10.5-2ubuntu3 [155 kB] 868s Get:6 http://ftpmaster.internal/ubuntu resolute/main s390x 3cpio s390x 0.14.0-1ubuntu1 [313 kB] 868s Get:7 http://ftpmaster.internal/ubuntu resolute/main s390x libevent-core-2.1-7t64 s390x 2.1.12-stable-10build2 [93.1 kB] 868s dpkg-preconfigure: unable to re-open stdin: No such file or directory 869s Fetched 8482 kB in 2s (5573 kB/s) 869s (Reading database ... (Reading database ... 5% (Reading database ... 10% (Reading database ... 15% (Reading database ... 20% (Reading database ... 25% (Reading database ... 30% (Reading database ... 35% (Reading database ... 40% (Reading database ... 45% (Reading database ... 50% (Reading database ... 55% (Reading database ... 60% (Reading database ... 65% (Reading database ... 70% (Reading database ... 75% (Reading database ... 80% (Reading database ... 85% (Reading database ... 90% (Reading database ... 95% (Reading database ... 100% (Reading database ... 61954 files and directories currently installed.) 869s Preparing to unpack .../libc-gconv-modules-extra_2.42-2ubuntu5_s390x.deb ... 869s Unpacking libc-gconv-modules-extra:s390x (2.42-2ubuntu5) over (2.42-2ubuntu4) ... 871s Setting up libc-gconv-modules-extra:s390x (2.42-2ubuntu5) ... 872s (Reading database ... (Reading database ... 5% (Reading database ... 10% (Reading database ... 15% (Reading database ... 20% (Reading database ... 25% (Reading database ... 30% (Reading database ... 35% (Reading database ... 40% (Reading database ... 45% (Reading database ... 50% (Reading database ... 55% (Reading database ... 60% (Reading database ... 65% (Reading database ... 70% (Reading database ... 75% (Reading database ... 80% (Reading database ... 85% (Reading database ... 90% (Reading database ... 95% (Reading database ... 100% (Reading database ... 61954 files and directories currently installed.) 872s Preparing to unpack .../libc6_2.42-2ubuntu5_s390x.deb ... 873s Unpacking libc6:s390x (2.42-2ubuntu5) over (2.42-2ubuntu4) ... 874s Setting up libc6:s390x (2.42-2ubuntu5) ... 876s (Reading database ... (Reading database ... 5% (Reading database ... 10% (Reading database ... 15% (Reading database ... 20% (Reading database ... 25% (Reading database ... 30% (Reading database ... 35% (Reading database ... 40% (Reading database ... 45% (Reading database ... 50% (Reading database ... 55% (Reading database ... 60% (Reading database ... 65% (Reading database ... 70% (Reading database ... 75% (Reading database ... 80% (Reading database ... 85% (Reading database ... 90% (Reading database ... 95% (Reading database ... 100% (Reading database ... 61954 files and directories currently installed.) 876s Preparing to unpack .../libc-bin_2.42-2ubuntu5_s390x.deb ... 877s Unpacking libc-bin (2.42-2ubuntu5) over (2.42-2ubuntu4) ... 881s Setting up libc-bin (2.42-2ubuntu5) ... 883s (Reading database ... (Reading database ... 5% (Reading database ... 10% (Reading database ... 15% (Reading database ... 20% (Reading database ... 25% (Reading database ... 30% (Reading database ... 35% (Reading database ... 40% (Reading database ... 45% (Reading database ... 50% (Reading database ... 55% (Reading database ... 60% (Reading database ... 65% (Reading database ... 70% (Reading database ... 75% (Reading database ... 80% (Reading database ... 85% (Reading database ... 90% (Reading database ... 95% (Reading database ... 100% (Reading database ... 61954 files and directories currently installed.) 883s Preparing to unpack .../locales_2.42-2ubuntu5_all.deb ... 883s Unpacking locales (2.42-2ubuntu5) over (2.42-2ubuntu4) ... 883s Preparing to unpack .../libpcap0.8t64_1.10.5-2ubuntu3_s390x.deb ... 883s Unpacking libpcap0.8t64:s390x (1.10.5-2ubuntu3) over (1.10.5-2ubuntu2) ... 883s Preparing to unpack .../3cpio_0.14.0-1ubuntu1_s390x.deb ... 883s Unpacking 3cpio (0.14.0-1ubuntu1) over (0.13.1-1ubuntu1) ... 883s Preparing to unpack .../libevent-core-2.1-7t64_2.1.12-stable-10build2_s390x.deb ... 884s Unpacking libevent-core-2.1-7t64:s390x (2.1.12-stable-10build2) over (2.1.12-stable-10build1) ... 888s Setting up 3cpio (0.14.0-1ubuntu1) ... 899s Setting up locales (2.42-2ubuntu5) ... 899s Generating locales (this might take a while)... 899s en_US.UTF-8... done 899s Generation complete. 899s Setting up libpcap0.8t64:s390x (1.10.5-2ubuntu3) ... 899s Setting up libevent-core-2.1-7t64:s390x (2.1.12-stable-10build2) ... 899s Processing triggers for systemd (259-1ubuntu3) ... 902s Processing triggers for man-db (2.13.1-1) ... 911s Processing triggers for libc-bin (2.42-2ubuntu5) ... 916s autopkgtest [17:19:01]: upgrading testbed (apt dist-upgrade and autopurge) 957s Reading package lists... 957s Building dependency tree... 957s Reading state information... 958s Calculating upgrade... 958s 0 upgraded, 0 newly installed, 0 to remove and 0 not upgraded. 960s Reading package lists... 961s Building dependency tree... 961s Reading state information... 961s Solving dependencies... 961s 0 upgraded, 0 newly installed, 0 to remove and 0 not upgraded. 973s Reading package lists... 974s Building dependency tree... 974s Reading state information... 975s Solving dependencies... 975s The following NEW packages will be installed: 975s dns-root-data libevent-2.1-7t64 libevent-pthreads-2.1-7t64 libldns3t64 975s libnss3-tools libreswan libunbound8 976s 0 upgraded, 7 newly installed, 0 to remove and 0 not upgraded. 976s Need to get 2943 kB of archives. 976s After this operation, 11.8 MB of additional disk space will be used. 976s Get:1 http://ftpmaster.internal/ubuntu resolute/main s390x dns-root-data all 2025080400build1 [6022 B] 976s Get:2 http://ftpmaster.internal/ubuntu resolute/main s390x libnss3-tools s390x 2:3.120-1 [637 kB] 976s Get:3 http://ftpmaster.internal/ubuntu resolute/main s390x libevent-pthreads-2.1-7t64 s390x 2.1.12-stable-10build2 [8060 B] 976s Get:4 http://ftpmaster.internal/ubuntu resolute/universe s390x libldns3t64 s390x 1.8.4-2build1 [170 kB] 976s Get:5 http://ftpmaster.internal/ubuntu resolute/main s390x libevent-2.1-7t64 s390x 2.1.12-stable-10build2 [144 kB] 976s Get:6 http://ftpmaster.internal/ubuntu resolute/main s390x libunbound8 s390x 1.24.2-1ubuntu1 [464 kB] 976s Get:7 http://ftpmaster.internal/ubuntu resolute/universe s390x libreswan s390x 5.2-2.2ubuntu1 [1515 kB] 978s Fetched 2943 kB in 1s (4774 kB/s) 978s Selecting previously unselected package dns-root-data. 978s (Reading database ... (Reading database ... 5% (Reading database ... 10% (Reading database ... 15% (Reading database ... 20% (Reading database ... 25% (Reading database ... 30% (Reading database ... 35% (Reading database ... 40% (Reading database ... 45% (Reading database ... 50% (Reading database ... 55% (Reading database ... 60% (Reading database ... 65% (Reading database ... 70% (Reading database ... 75% (Reading database ... 80% (Reading database ... 85% (Reading database ... 90% (Reading database ... 95% (Reading database ... 100% (Reading database ... 61954 files and directories currently installed.) 978s Preparing to unpack .../0-dns-root-data_2025080400build1_all.deb ... 978s Unpacking dns-root-data (2025080400build1) ... 978s Selecting previously unselected package libnss3-tools. 978s Preparing to unpack .../1-libnss3-tools_2%3a3.120-1_s390x.deb ... 978s Unpacking libnss3-tools (2:3.120-1) ... 978s Selecting previously unselected package libevent-pthreads-2.1-7t64:s390x. 978s Preparing to unpack .../2-libevent-pthreads-2.1-7t64_2.1.12-stable-10build2_s390x.deb ... 978s Unpacking libevent-pthreads-2.1-7t64:s390x (2.1.12-stable-10build2) ... 978s Selecting previously unselected package libldns3t64:s390x. 978s Preparing to unpack .../3-libldns3t64_1.8.4-2build1_s390x.deb ... 978s Unpacking libldns3t64:s390x (1.8.4-2build1) ... 978s Selecting previously unselected package libevent-2.1-7t64:s390x. 978s Preparing to unpack .../4-libevent-2.1-7t64_2.1.12-stable-10build2_s390x.deb ... 978s Unpacking libevent-2.1-7t64:s390x (2.1.12-stable-10build2) ... 978s Selecting previously unselected package libunbound8:s390x. 978s Preparing to unpack .../5-libunbound8_1.24.2-1ubuntu1_s390x.deb ... 978s Unpacking libunbound8:s390x (1.24.2-1ubuntu1) ... 979s Selecting previously unselected package libreswan. 979s Preparing to unpack .../6-libreswan_5.2-2.2ubuntu1_s390x.deb ... 979s Unpacking libreswan (5.2-2.2ubuntu1) ... 979s Setting up libldns3t64:s390x (1.8.4-2build1) ... 979s Setting up libevent-pthreads-2.1-7t64:s390x (2.1.12-stable-10build2) ... 979s Setting up libevent-2.1-7t64:s390x (2.1.12-stable-10build2) ... 979s Setting up dns-root-data (2025080400build1) ... 979s Setting up libunbound8:s390x (1.24.2-1ubuntu1) ... 979s Setting up libnss3-tools (2:3.120-1) ... 979s Setting up libreswan (5.2-2.2ubuntu1) ... 981s ipsec.service is a disabled or a static unit, not starting it. 981s Processing triggers for man-db (2.13.1-1) ... 986s Processing triggers for libc-bin (2.42-2ubuntu5) ... 1012s autopkgtest [17:20:40]: test cryptocheck: [----------------------- 1012s Testing installed binary: /usr/libexec/ipsec/algparse 1012s Testing installed binary: /usr/libexec/ipsec/pluto 1012s testing -tp 1012s algparse -v2 'esp' (expect SUCCESS) 1012s ipsec algparse: Encryption algorithms: 1012s ipsec algparse: AES_CCM_16 {256,192,*128} IKEv1: ESP IKEv2: ESP FIPS aes_ccm, aes_ccm_c 1012s ipsec algparse: AES_CCM_12 {256,192,*128} IKEv1: ESP IKEv2: ESP FIPS aes_ccm_b 1012s ipsec algparse: AES_CCM_8 {256,192,*128} IKEv1: ESP IKEv2: ESP FIPS aes_ccm_a 1012s ipsec algparse: 3DES_CBC [*192] IKEv1: IKE ESP IKEv2: IKE ESP FIPS NSS(CBC) 3des 1012s ipsec algparse: CAMELLIA_CTR {256,192,*128} IKEv1: ESP IKEv2: ESP 1012s ipsec algparse: CAMELLIA_CBC {256,192,*128} IKEv1: IKE ESP IKEv2: IKE ESP NSS(CBC) camellia 1012s ipsec algparse: AES_GCM_16 {256,192,*128} IKEv1: ESP IKEv2: IKE ESP FIPS NSS(AEAD) aes_gcm, aes_gcm_c 1012s ipsec algparse: AES_GCM_12 {256,192,*128} IKEv1: ESP IKEv2: IKE ESP FIPS NSS(AEAD) aes_gcm_b 1012s ipsec algparse: AES_GCM_8 {256,192,*128} IKEv1: ESP IKEv2: IKE ESP FIPS NSS(AEAD) aes_gcm_a 1012s ipsec algparse: AES_CTR {256,192,*128} IKEv1: IKE ESP IKEv2: IKE ESP FIPS NSS(CTR) aesctr 1012s ipsec algparse: AES_CBC {256,192,*128} IKEv1: IKE ESP IKEv2: IKE ESP FIPS NSS(CBC) aes 1012s ipsec algparse: NULL_AUTH_AES_GMAC {256,192,*128} IKEv1: ESP IKEv2: ESP FIPS aes_gmac 1012s ipsec algparse: NULL [] IKEv1: ESP IKEv2: ESP NULL 1012s ipsec algparse: CHACHA20_POLY1305 [*256] IKEv1: IKEv2: IKE ESP NSS(AEAD) chacha20poly1305 1012s ipsec algparse: Hash algorithms: 1012s ipsec algparse: MD5 IKEv1: IKE IKEv2: NSS 1012s ipsec algparse: SHA1 IKEv1: IKE IKEv2: IKE FIPS NSS sha 1012s ipsec algparse: SHA2_256 IKEv1: IKE IKEv2: IKE FIPS NSS sha2, sha256 1012s ipsec algparse: SHA2_384 IKEv1: IKE IKEv2: IKE FIPS NSS sha384 1012s ipsec algparse: SHA2_512 IKEv1: IKE IKEv2: IKE FIPS NSS sha512 1012s ipsec algparse: IDENTITY IKEv1: IKEv2: FIPS 1012s ipsec algparse: PRF algorithms: 1012s ipsec algparse: HMAC_MD5 IKEv1: IKE IKEv2: IKE NSS md5 1012s ipsec algparse: HMAC_SHA1 IKEv1: IKE IKEv2: IKE FIPS NSS sha, sha1 1012s ipsec algparse: HMAC_SHA2_256 IKEv1: IKE IKEv2: IKE FIPS NSS sha2, sha256, sha2_256 1012s ipsec algparse: HMAC_SHA2_384 IKEv1: IKE IKEv2: IKE FIPS NSS sha384, sha2_384 1012s ipsec algparse: HMAC_SHA2_512 IKEv1: IKE IKEv2: IKE FIPS NSS sha512, sha2_512 1012s ipsec algparse: AES_XCBC IKEv1: IKEv2: IKE native(XCBC) aes128_xcbc 1012s ipsec algparse: Integrity algorithms: 1012s ipsec algparse: HMAC_MD5_96 IKEv1: IKE ESP AH IKEv2: IKE ESP AH NSS md5, hmac_md5 1012s ipsec algparse: HMAC_SHA1_96 IKEv1: IKE ESP AH IKEv2: IKE ESP AH FIPS NSS sha, sha1, sha1_96, hmac_sha1 1012s ipsec algparse: HMAC_SHA2_512_256 IKEv1: IKE ESP AH IKEv2: IKE ESP AH FIPS NSS sha512, sha2_512, sha2_512_256, hmac_sha2_512 1012s ipsec algparse: HMAC_SHA2_384_192 IKEv1: IKE ESP AH IKEv2: IKE ESP AH FIPS NSS sha384, sha2_384, sha2_384_192, hmac_sha2_384 1012s ipsec algparse: HMAC_SHA2_256_128 IKEv1: IKE ESP AH IKEv2: IKE ESP AH FIPS NSS sha2, sha256, sha2_256, sha2_256_128, hmac_sha2_256 1012s ipsec algparse: HMAC_SHA2_256_TRUNCBUG IKEv1: ESP AH IKEv2: AH 1012s ipsec algparse: AES_XCBC_96 IKEv1: ESP AH IKEv2: IKE ESP AH native(XCBC) aes_xcbc, aes128_xcbc, aes128_xcbc_96 1012s ipsec algparse: AES_CMAC_96 IKEv1: ESP AH IKEv2: ESP AH FIPS aes_cmac 1012s ipsec algparse: NONE IKEv1: ESP IKEv2: IKE ESP FIPS null 1012s ipsec algparse: DH algorithms: 1012s ipsec algparse: NONE IKEv1: IKEv2: IKE ESP AH FIPS NSS(MODP) null, dh0 1012s ipsec algparse: MODP1536 IKEv1: IKE ESP AH IKEv2: IKE ESP AH NSS(MODP) dh5 1012s ipsec algparse: MODP2048 IKEv1: IKE ESP AH IKEv2: IKE ESP AH FIPS NSS(MODP) dh14 1012s ipsec algparse: MODP3072 IKEv1: IKE ESP AH IKEv2: IKE ESP AH FIPS NSS(MODP) dh15 1012s ipsec algparse: MODP4096 IKEv1: IKE ESP AH IKEv2: IKE ESP AH FIPS NSS(MODP) dh16 1012s ipsec algparse: MODP6144 IKEv1: IKE ESP AH IKEv2: IKE ESP AH FIPS NSS(MODP) dh17 1012s ipsec algparse: MODP8192 IKEv1: IKE ESP AH IKEv2: IKE ESP AH FIPS NSS(MODP) dh18 1012s ipsec algparse: DH19 IKEv1: IKE IKEv2: IKE ESP AH FIPS NSS(ECP) ecp_256, ecp256 1012s ipsec algparse: DH20 IKEv1: IKE IKEv2: IKE ESP AH FIPS NSS(ECP) ecp_384, ecp384 1012s ipsec algparse: DH21 IKEv1: IKE IKEv2: IKE ESP AH FIPS NSS(ECP) ecp_521, ecp521 1012s ipsec algparse: DH31 IKEv1: IKE IKEv2: IKE ESP AH NSS(ECP) curve25519 1012s ipsec algparse: IPCOMP algorithms: 1012s ipsec algparse: DEFLATE IKEv1: ESP AH IKEv2: ESP AH FIPS 1012s ipsec algparse: LZS IKEv1: IKEv2: ESP AH FIPS 1012s ipsec algparse: LZJH IKEv1: IKEv2: ESP AH FIPS 1012s | parsing 'AES_GCM_16_256,AES_GCM_16_128,CHACHA20_POLY1305,AES_CBC_256,AES_CBC_128' for ESP 1012s | proposal: 'AES_GCM_16_256' 1012s | token: '' '' "AES_GCM_16_256" '' 1012s | token: '' "AES_GCM_16_256" '' '' 1012s | ike_alg_byname() failed: ESP encryption algorithm 'AES_GCM_16_256' is not recognized 1012s | token: '' '' '' 1012s | appending ESP encryption algorithm AES_GCM_16[_256] 1012s | appending ESP integrity algorithm NONE[_0] 1012s AES_GCM_16_256-NONE 1012s AES_GCM_16_128-NONE 1012s CHACHA20_POLY1305-NONE 1012s AES_CBC_256-HMAC_SHA2_512_256+HMAC_SHA2_256_128 1012s AES_CBC_128-HMAC_SHA2_512_256+HMAC_SHA2_256_128 1012s algparse -v2 'esp=' (expect ERROR) 1012s ERROR: ESP proposal is empty 1012s algparse -v2 'esp=aes' (expect SUCCESS) 1012s | proposal: 'AES_GCM_16_128' 1012s | token: '' '' "AES_GCM_16_128" '' 1012s | token: '' "AES_GCM_16_128" '' '' 1012s | ike_alg_byname() failed: ESP encryption algorithm 'AES_GCM_16_128' is not recognized 1012s | token: '' '' '' 1012s | appending ESP encryption algorithm AES_GCM_16[_128] 1012s | appending ESP integrity algorithm NONE[_0] 1012s | proposal: 'CHACHA20_POLY1305' 1012s | token: '' '' "CHACHA20_POLY1305" '' 1012s | token: '' "CHACHA20_POLY1305" '' '' 1012s | token: '' '' '' 1012s | appending ESP encryption algorithm CHACHA20_POLY1305[_0] 1012s | appending ESP integrity algorithm NONE[_0] 1012s | proposal: 'AES_CBC_256' 1012s | token: '' '' "AES_CBC_256" '' 1012s | token: '' "AES_CBC_256" '' '' 1012s | ike_alg_byname() failed: ESP encryption algorithm 'AES_CBC_256' is not recognized 1012s | token: '' '' '' 1012s | appending ESP encryption algorithm AES_CBC[_256] 1012s | appending ESP integrity algorithm HMAC_SHA2_512_256[_0] 1012s | appending ESP integrity algorithm HMAC_SHA2_256_128[_0] 1012s | proposal: 'AES_CBC_128' 1012s | token: '' '' "AES_CBC_128" '' 1012s | token: '' "AES_CBC_128" '' '' 1012s | ike_alg_byname() failed: ESP encryption algorithm 'AES_CBC_128' is not recognized 1012s | token: '' '' '' 1012s | appending ESP encryption algorithm AES_CBC[_128] 1012s | appending ESP integrity algorithm HMAC_SHA2_512_256[_0] 1012s | appending ESP integrity algorithm HMAC_SHA2_256_128[_0] 1012s AES_CBC-HMAC_SHA2_512_256+HMAC_SHA2_256_128 1012s algparse -v2 'esp=aes;modp2048' (expect SUCCESS) 1012s | parsing '' for ESP 1012s | parsing 'aes' for ESP 1012s | proposal: 'aes' 1012s | token: '' '' "aes" '' 1012s | token: '' "aes" '' '' 1012s | token: '' '' '' 1012s | appending ESP encryption algorithm AES_CBC[_0] 1012s | appending ESP integrity algorithm HMAC_SHA2_512_256[_0] 1012s | appending ESP integrity algorithm HMAC_SHA2_256_128[_0] 1012s | parsing 'aes;modp2048' for ESP 1012s | proposal: 'aes;modp2048' 1012s | token: '' '' "aes" ';' 1012s | token: '' "aes" ';' "modp2048" '' 1012s | token: ';' "modp2048" '' '' 1012s | appending ESP encryption algorithm AES_CBC[_0] 1012s | parsing dh: 1012s | appending ESP DH algorithm MODP2048[_0] 1012s | token: '' '' '' 1012s | appending ESP integrity algorithm HMAC_SHA2_512_256[_0] 1012s | appending ESP integrity algorithm HMAC_SHA2_256_128[_0] 1012s ipsec algparse: ignoring ESP DH algorithm MODP2048 as PFS policy is disabled 1012s | parsing 'aes-sha1' for ESP 1012s | proposal: 'aes-sha1' 1012s | token: '' '' "aes" '-' 1012s | token: '' "aes" '-' "sha1" '' 1012s AES_CBC-HMAC_SHA2_512_256+HMAC_SHA2_256_128 1012s algparse -v2 'esp=aes-sha1' (expect SUCCESS) 1012s AES_CBC-HMAC_SHA1_96 1012s algparse -v2 'esp=aes-sha1' (expect SUCCESS) 1012s AES_CBC-HMAC_SHA1_96 1012s algparse -v2 'esp=aes-sha1-modp2048' (expect SUCCESS) 1012s AES_CBC-HMAC_SHA1_96 1012s algparse -v2 'esp=aes-128-sha1' (expect SUCCESS) 1012s AES_CBC_128-HMAC_SHA1_96 1012s algparse -v2 'esp=aes-128-sha1' (expect SUCCESS) 1012s AES_CBC_128-HMAC_SHA1_96 1012s algparse -v2 'esp=aes-128-sha1-modp2048' (expect SUCCESS) 1012s AES_CBC_128-HMAC_SHA1_96 1012s algparse -v2 'esp=aes-128' (expect SUCCESS) 1012s AES_CBC_128-HMAC_SHA2_512_256+HMAC_SHA2_256_128 1012s algparse -v2 'esp=aes_gcm_a-128-null' (expect SUCCESS) 1012s AES_GCM_8_128-NONE 1012s algparse -v2 'esp=3des-sha1;modp1024' (expect ERROR) 1012s ERROR: ESP DH algorithm 'modp1024' is not supported 1012s algparse -v2 'esp=3des-sha1;modp1536' (expect SUCCESS) 1012s 3DES_CBC-HMAC_SHA1_96 1012s algparse -v2 'esp=3des-sha1;modp2048' (expect SUCCESS) 1012s 3DES_CBC-HMAC_SHA1_96 1012s algparse -v2 'esp=3des-sha1;dh21' (expect SUCCESS) 1012s 3DES_CBC-HMAC_SHA1_96 1012s algparse -v2 'esp=3des-sha1;ecp_521' (expect SUCCESS) 1012s 3DES_CBC-HMAC_SHA1_96 1012s algparse -v2 'esp=3des-sha1;dh23' (expect ERROR) 1012s ERROR: ESP DH algorithm 'dh23' is not supported 1012s algparse -v2 'esp=3des-sha1;dh24' (expect ERROR) 1012s ERROR: ESP DH algorithm 'dh24' is not supported 1012s algparse -v2 'esp=3des-sha1' (expect SUCCESS) 1012s 3DES_CBC-HMAC_SHA1_96 1012s algparse -v2 'esp=null-sha1' (expect SUCCESS) 1012s NULL-HMAC_SHA1_96 1012s algparse -v2 'esp=aes_cbc' (expect SUCCESS) 1012s AES_CBC-HMAC_SHA2_512_256+HMAC_SHA2_256_128 1012s algparse -v2 'esp=aes-sha' (expect SUCCESS) 1012s AES_CBC-HMAC_SHA1_96 1012s algparse -v2 'esp=aes-sha1' (expect SUCCESS) 1012s AES_CBC-HMAC_SHA1_96 1012s algparse -v2 'esp=aes128-sha1' (expect SUCCESS) 1012s AES_CBC_128-HMAC_SHA1_96 1012s algparse -v2 'esp=aes-sha2' (expect SUCCESS) 1012s AES_CBC-HMAC_SHA2_256_128 1012s algparse -v2 'esp=aes-sha256' (expect SUCCESS) 1012s AES_CBC-HMAC_SHA2_256_128 1012s algparse -v2 'esp=aes-sha384' (expect SUCCESS) 1012s AES_CBC-HMAC_SHA2_384_192 1012s algparse -v2 'esp=aes-sha512' (expect SUCCESS) 1012s AES_CBC-HMAC_SHA2_512_256 1012s algparse -v2 'esp=aes128-aes_xcbc' (expect SUCCESS) 1012s AES_CBC_128-AES_XCBC_96 1012s algparse -v2 'esp=aes192-sha1' (expect SUCCESS) 1012s AES_CBC_192-HMAC_SHA1_96 1012s algparse -v2 'esp=aes256-sha1' (expect SUCCESS) 1012s AES_CBC_256-HMAC_SHA1_96 1012s algparse -v2 'esp=aes256-sha' (expect SUCCESS) 1012s AES_CBC_256-HMAC_SHA1_96 1012s algparse -v2 'esp=aes256-sha2' (expect SUCCESS) 1012s AES_CBC_256-HMAC_SHA2_256_128 1012s algparse -v2 'esp=aes256-sha2_256' (expect SUCCESS) 1012s AES_CBC_256-HMAC_SHA2_256_128 1012s algparse -v2 'esp=aes256-sha2_384' (expect SUCCESS) 1012s AES_CBC_256-HMAC_SHA2_384_192 1012s algparse -v2 'esp=aes256-sha2_512' (expect SUCCESS) 1012s AES_CBC_256-HMAC_SHA2_512_256 1012s algparse -v2 'esp=camellia' (expect SUCCESS) 1012s CAMELLIA_CBC-HMAC_SHA2_512_256+HMAC_SHA2_256_128 1012s algparse -v2 'esp=camellia128' (expect SUCCESS) 1012s CAMELLIA_CBC_128-HMAC_SHA2_512_256+HMAC_SHA2_256_128 1012s algparse -v2 'esp=camellia192' (expect SUCCESS) 1012s CAMELLIA_CBC_192-HMAC_SHA2_512_256+HMAC_SHA2_256_128 1012s algparse -v2 'esp=camellia256' (expect SUCCESS) 1012s CAMELLIA_CBC_256-HMAC_SHA2_512_256+HMAC_SHA2_256_128 1012s algparse -v2 'esp=aes_ccm' (expect SUCCESS) 1012s AES_CCM_16-NONE 1012s algparse -v2 'esp=aes_ccm_a-128-null' (expect SUCCESS) 1012s AES_CCM_8_128-NONE 1012s algparse -v2 'esp=aes_ccm_a-192-null' (expect SUCCESS) 1012s AES_CCM_8_192-NONE 1012s algparse -v2 'esp=aes_ccm_a-256-null' (expect SUCCESS) 1012s AES_CCM_8_256-NONE 1012s algparse -v2 'esp=aes_ccm_b-128-null' (expect SUCCESS) 1012s AES_CCM_12_128-NONE 1012s algparse -v2 'esp=aes_ccm_b-192-null' (expect SUCCESS) 1012s AES_CCM_12_192-NONE 1012s algparse -v2 'esp=aes_ccm_b-256-null' (expect SUCCESS) 1012s AES_CCM_12_256-NONE 1012s algparse -v2 'esp=aes_ccm_c-128-null' (expect SUCCESS) 1012s AES_CCM_16_128-NONE 1012s algparse -v2 'esp=aes_ccm_c-192-null' (expect SUCCESS) 1012s AES_CCM_16_192-NONE 1012s algparse -v2 'esp=aes_ccm_c-256-null' (expect SUCCESS) 1012s AES_CCM_16_256-NONE 1012s algparse -v2 'esp=aes_gcm' (expect SUCCESS) 1012s AES_GCM_16-NONE 1012s algparse -v2 'esp=aes_gcm_a-128-null' (expect SUCCESS) 1012s AES_GCM_8_128-NONE 1012s algparse -v2 'esp=aes_gcm_a-192-null' (expect SUCCESS) 1012s AES_GCM_8_192-NONE 1012s algparse -v2 'esp=aes_gcm_a-256-null' (expect SUCCESS) 1012s AES_GCM_8_256-NONE 1012s algparse -v2 'esp=aes_gcm_b-128-null' (expect SUCCESS) 1012s AES_GCM_12_128-NONE 1012s algparse -v2 'esp=aes_gcm_b-192-null' (expect SUCCESS) 1012s AES_GCM_12_192-NONE 1012s algparse -v2 'esp=aes_gcm_b-256-null' (expect SUCCESS) 1012s AES_GCM_12_256-NONE 1012s algparse -v2 'esp=aes_gcm_c-128-null' (expect SUCCESS) 1012s AES_GCM_16_128-NONE 1012s algparse -v2 'esp=aes_gcm_c-192-null' (expect SUCCESS) 1012s AES_GCM_16_192-NONE 1012s algparse -v2 'esp=aes_gcm_c-256-null' (expect SUCCESS) 1012s AES_GCM_16_256-NONE 1012s algparse -v2 'esp=aes_ccm_a-null' (expect SUCCESS) 1012s AES_CCM_8-NONE 1012s algparse -v2 'esp=aes_ccm_b-null' (expect SUCCESS) 1012s AES_CCM_12-NONE 1012s algparse -v2 'esp=aes_ccm_c-null' (expect SUCCESS) 1012s AES_CCM_16-NONE 1012s algparse -v2 'esp=aes_gcm_a-null' (expect SUCCESS) 1012s AES_GCM_8-NONE 1012s algparse -v2 'esp=aes_gcm_b-null' (expect SUCCESS) 1012s AES_GCM_12-NONE 1012s algparse -v2 'esp=aes_gcm_c-null' (expect SUCCESS) 1012s AES_GCM_16-NONE 1012s algparse -v2 'esp=aes_ccm-null' (expect SUCCESS) 1012s AES_CCM_16-NONE 1012s algparse -v2 'esp=aes_gcm-null' (expect SUCCESS) 1012s AES_GCM_16-NONE 1012s algparse -v2 'esp=aes_ccm-256-null' (expect SUCCESS) 1012s AES_CCM_16_256-NONE 1012s algparse -v2 'esp=aes_gcm-192-null' (expect SUCCESS) 1012s AES_GCM_16_192-NONE 1012s algparse -v2 'esp=aes_ccm_256-null' (expect SUCCESS) 1012s AES_CCM_16_256-NONE 1012s algparse -v2 'esp=aes_gcm_192-null' (expect SUCCESS) 1012s AES_GCM_16_192-NONE 1012s algparse -v2 'esp=aes_ccm_8-null' (expect SUCCESS) 1012s AES_CCM_8-NONE 1012s algparse -v2 'esp=aes_ccm_12-null' (expect SUCCESS) 1012s AES_CCM_12-NONE 1012s algparse -v2 'esp=aes_ccm_16-null' (expect SUCCESS) 1012s AES_CCM_16-NONE 1012s algparse -v2 'esp=aes_gcm_8-null' (expect SUCCESS) 1012s AES_GCM_8-NONE 1012s algparse -v2 'esp=aes_gcm_12-null' (expect SUCCESS) 1012s AES_GCM_12-NONE 1012s algparse -v2 'esp=aes_gcm_16-null' (expect SUCCESS) 1012s AES_GCM_16-NONE 1012s algparse -v2 'esp=aes_ccm_8-128-null' (expect SUCCESS) 1012s AES_CCM_8_128-NONE 1012s algparse -v2 'esp=aes_ccm_12-192-null' (expect SUCCESS) 1012s AES_CCM_12_192-NONE 1012s algparse -v2 'esp=aes_ccm_16-256-null' (expect SUCCESS) 1012s AES_CCM_16_256-NONE 1012s algparse -v2 'esp=aes_gcm_8-128-null' (expect SUCCESS) 1012s AES_GCM_8_128-NONE 1012s algparse -v2 'esp=aes_gcm_12-192-null' (expect SUCCESS) 1012s AES_GCM_12_192-NONE 1012s algparse -v2 'esp=aes_gcm_16-256-null' (expect SUCCESS) 1012s AES_GCM_16_256-NONE 1012s algparse -v2 'esp=aes_ccm_8_128-null' (expect SUCCESS) 1012s AES_CCM_8_128-NONE 1012s algparse -v2 'esp=aes_ccm_12_192-null' (expect SUCCESS) 1012s AES_CCM_12_192-NONE 1012s algparse -v2 'esp=aes_ccm_16_256-null' (expect SUCCESS) 1012s AES_CCM_16_256-NONE 1012s algparse -v2 'esp=aes_gcm_8_128-null' (expect SUCCESS) 1012s AES_GCM_8_128-NONE 1012s algparse -v2 'esp=aes_gcm_12_192-null' (expect SUCCESS) 1012s AES_GCM_12_192-NONE 1012s algparse -v2 'esp=aes_gcm_16_256-null' (expect SUCCESS) 1012s AES_GCM_16_256-NONE 1012s algparse -v2 'esp=aes_ctr' (expect SUCCESS) 1012s AES_CTR-HMAC_SHA2_512_256+HMAC_SHA2_256_128 1012s algparse -v2 'esp=aesctr' (expect SUCCESS) 1012s AES_CTR-HMAC_SHA2_512_256+HMAC_SHA2_256_128 1012s algparse -v2 'esp=aes_ctr128' (expect SUCCESS) 1012s AES_CTR_128-HMAC_SHA2_512_256+HMAC_SHA2_256_128 1012s algparse -v2 'esp=aes_ctr192' (expect SUCCESS) 1012s AES_CTR_192-HMAC_SHA2_512_256+HMAC_SHA2_256_128 1012s algparse -v2 'esp=aes_ctr256' (expect SUCCESS) 1012s AES_CTR_256-HMAC_SHA2_512_256+HMAC_SHA2_256_128 1012s algparse -v2 'esp=camellia_cbc_256-hmac_sha2_512_256;modp8192' (expect SUCCESS) 1012s CAMELLIA_CBC_256-HMAC_SHA2_512_256 1012s algparse -v2 'esp=null_auth_aes_gmac_256-null;modp8192' (expect SUCCESS) 1012s NULL_AUTH_AES_GMAC_256-NONE 1012s algparse -v2 'esp=3des-sha1;modp8192' (expect SUCCESS) 1012s 3DES_CBC-HMAC_SHA1_96 1012s algparse -v2 'esp=3des-sha1-modp8192' (expect SUCCESS) 1012s 3DES_CBC-HMAC_SHA1_96 1012s algparse -v2 'esp=aes-sha1,3des-sha1;modp8192' (expect SUCCESS) 1012s AES_CBC-HMAC_SHA1_96 1012s 3DES_CBC-HMAC_SHA1_96 1012s algparse -v2 'esp=aes-sha1-modp8192,3des-sha1-modp8192' (expect SUCCESS) 1012s AES_CBC-HMAC_SHA1_96 1012s 3DES_CBC-HMAC_SHA1_96 1012s algparse -v2 'esp=aes-sha1-modp8192,aes-sha1-modp8192,aes-sha1-modp8192' (expect SUCCESS) 1012s AES_CBC-HMAC_SHA1_96 1012s algparse -v2 'esp=aes;none' (expect SUCCESS) 1012s AES_CBC-HMAC_SHA2_512_256+HMAC_SHA2_256_128 1012s algparse -v2 'esp=aes;none,aes' (expect SUCCESS) 1012s AES_CBC-HMAC_SHA2_512_256+HMAC_SHA2_256_128 1012s AES_CBC-HMAC_SHA2_512_256+HMAC_SHA2_256_128 1012s algparse -v2 'esp=aes;none,aes;modp2048' (expect SUCCESS) 1012s AES_CBC-HMAC_SHA2_512_256+HMAC_SHA2_256_128 1012s AES_CBC-HMAC_SHA2_512_256+HMAC_SHA2_256_128 1012s algparse -v2 'esp=aes-sha1-none' (expect SUCCESS) 1012s AES_CBC-HMAC_SHA1_96 1012s algparse -v2 'esp=aes-sha1;none' (expect SUCCESS) 1012s AES_CBC-HMAC_SHA1_96 1012s algparse -v2 'esp=3des168-sha1' (expect ERROR) 1012s ERROR: ESP encryption algorithm 3DES_CBC does not allow a key lengths 1012s algparse -v2 'esp=3des-null' (expect ERROR) 1012s ERROR: non-AEAD ESP encryption algorithm 3DES_CBC cannot have 'NONE' as the integrity algorithm 1012s algparse -v2 'esp=aes128-null' (expect ERROR) 1012s ERROR: non-AEAD ESP encryption algorithm AES_CBC cannot have 'NONE' as the integrity algorithm 1012s algparse -v2 'esp=aes224-sha1' (expect ERROR) 1012s ERROR: ESP encryption algorithm AES_CBC with key length 224 invalid; valid key lengths: 128, 192, 256 1012s algparse -v2 'esp=aes-224-sha1' (expect ERROR) 1012s ERROR: ESP encryption algorithm AES_CBC with key length 224 invalid; valid key lengths: 128, 192, 256 1012s algparse -v2 'esp=aes0-sha1' (expect ERROR) 1012s ERROR: ESP encryption key length is zero 1012s algparse -v2 'esp=aes-0-sha1' (expect ERROR) 1012s ERROR: ESP encryption key length is zero 1012s algparse -v2 'esp=aes512-sha1' (expect ERROR) 1012s ERROR: ESP encryption algorithm AES_CBC with key length 512 invalid; valid key lengths: 128, 192, 256 1012s algparse -v2 'esp=aes-sha1555' (expect ERROR) 1012s ERROR: ESP integrity algorithm 'sha1555' is not recognized 1012s algparse -v2 'esp=camellia666-sha1' (expect ERROR) 1012s ERROR: ESP encryption algorithm CAMELLIA_CBC with key length 666 invalid; valid key lengths: 128, 192, 256 1012s algparse -v2 'esp=blowfish' (expect ERROR) 1012s ERROR: ESP encryption algorithm 'blowfish' is not supported 1012s algparse -v2 'esp=des-sha1' (expect ERROR) 1012s ERROR: ESP encryption algorithm 'des' is not supported 1012s algparse -v2 'esp=aes_ctr666' (expect ERROR) 1012s ERROR: ESP encryption algorithm AES_CTR with key length 666 invalid; valid key lengths: 128, 192, 256 1012s algparse -v2 'esp=aes128-sha2_128' (expect ERROR) 1012s ERROR: ESP integrity algorithm 'sha2_128' is not recognized 1012s algparse -v2 'esp=aes256-sha2_256-4096' (expect ERROR) 1012s ERROR: ESP DH algorithm '4096' is not recognized 1012s algparse -v2 'esp=aes256-sha2_256-128' (expect ERROR) 1012s ERROR: ESP DH algorithm '128' is not recognized 1012s algparse -v2 'esp=vanitycipher' (expect ERROR) 1012s ERROR: ESP encryption algorithm 'vanitycipher' is not recognized 1012s algparse -v2 'esp=ase-sah' (expect ERROR) 1012s ERROR: ESP encryption algorithm 'ase' is not recognized 1012s algparse -v2 'esp=aes-sah1' (expect ERROR) 1012s ERROR: ESP integrity algorithm 'sah1' is not recognized 1012s algparse -v2 'esp=id3' (expect ERROR) 1012s ERROR: ESP encryption algorithm 'id3' is not recognized 1012s algparse -v2 'esp=aes-id3' (expect ERROR) 1012s ERROR: ESP integrity algorithm 'id3' is not recognized 1012s algparse -v2 'esp=aes_gcm-md5' (expect ERROR) 1012s ERROR: AEAD ESP encryption algorithm AES_GCM_16 must have 'NONE' as the integrity algorithm 1012s algparse -v2 'esp=mars' (expect ERROR) 1012s ERROR: ESP encryption algorithm 'mars' is not supported 1012s algparse -v2 'esp=aes_gcm-16' (expect ERROR) 1012s ERROR: ESP encryption algorithm AES_GCM_16 with key length 16 invalid; valid key lengths: 128, 192, 256 1012s algparse -v2 'esp=aes_gcm-0' (expect ERROR) 1012s ERROR: ESP encryption key length is zero 1012s algparse -v2 'esp=aes_gcm-123456789012345' (expect ERROR) 1012s ERROR: ESP encryption algorithm 'aes_gcm-123456789012345' key length WAY too big 1012s algparse -v2 'esp=3des-sha1;dh22' (expect ERROR) 1012s ERROR: ESP DH algorithm 'dh22' is not supported 1012s algparse -v2 'esp=3des-sha1;modp8192,3des-sha2' (expect SUCCESS) 1012s 3DES_CBC-HMAC_SHA1_96 1012s 3DES_CBC-HMAC_SHA2_256_128 1012s algparse -v2 'esp=3des-sha1-modp8192,3des-sha2' (expect SUCCESS) 1012s 3DES_CBC-HMAC_SHA1_96 1012s 3DES_CBC-HMAC_SHA2_256_128 1012s algparse -v2 'esp=3des-sha1-modp8192,3des-sha2-modp8192' (expect SUCCESS) 1012s 3DES_CBC-HMAC_SHA1_96 1012s 3DES_CBC-HMAC_SHA2_256_128 1012s algparse -v2 'esp=3des-sha1-modp8192,3des-sha2;modp8192' (expect SUCCESS) 1012s 3DES_CBC-HMAC_SHA1_96 1012s 3DES_CBC-HMAC_SHA2_256_128 1012s algparse -v2 'esp=3des-sha1;modp8192,3des-sha2-modp8192' (expect SUCCESS) 1012s 3DES_CBC-HMAC_SHA1_96 1012s 3DES_CBC-HMAC_SHA2_256_128 1012s algparse -v2 'esp=3des-sha1;modp8192,3des-sha2;modp8192' (expect SUCCESS) 1012s 3DES_CBC-HMAC_SHA1_96 1012s 3DES_CBC-HMAC_SHA2_256_128 1012s algparse -v2 'esp=3des-sha1-modp8192,3des-sha2-modp2048' (expect SUCCESS) 1012s 3DES_CBC-HMAC_SHA1_96 1012s 3DES_CBC-HMAC_SHA2_256_128 1012s algparse -v2 'ah' (expect SUCCESS) 1012s HMAC_SHA2_512_256 1012s HMAC_SHA2_256_128 1012s algparse -v2 'ah=' (expect ERROR) 1012s ERROR: AH proposal is empty 1012s algparse -v2 'ah=md5' (expect SUCCESS) 1012s HMAC_MD5_96 1012s algparse -v2 'ah=sha' (expect SUCCESS) 1012s HMAC_SHA1_96 1012s algparse -v2 'ah=sha;modp2048' (expect SUCCESS) 1012s HMAC_SHA1_96 1012s algparse -v2 'ah=sha1' (expect SUCCESS) 1012s HMAC_SHA1_96 1012s algparse -v2 'ah=sha2' (expect SUCCESS) 1012s HMAC_SHA2_256_128 1012s algparse -v2 'ah=sha256' (expect SUCCESS) 1012s HMAC_SHA2_256_128 1012s algparse -v2 'ah=sha384' (expect SUCCESS) 1012s HMAC_SHA2_384_192 1012s algparse -v2 'ah=sha512' (expect SUCCESS) 1012s HMAC_SHA2_512_256 1012s algparse -v2 'ah=sha2_256' (expect SUCCESS) 1012s HMAC_SHA2_256_128 1012s algparse -v2 'ah=sha2_384' (expect SUCCESS) 1012s HMAC_SHA2_384_192 1012s algparse -v2 'ah=sha2_512' (expect SUCCESS) 1012s HMAC_SHA2_512_256 1012s algparse -v2 'ah=aes_xcbc' (expect SUCCESS) 1012s AES_XCBC_96 1012s algparse -v2 'ah=sha2-none' (expect SUCCESS) 1012s HMAC_SHA2_256_128 1012s algparse -v2 'ah=sha2;none' (expect SUCCESS) 1012s HMAC_SHA2_256_128 1012s algparse -v2 'ah=sha1-modp8192,sha1-modp8192,sha1-modp8192' (expect SUCCESS) 1012s HMAC_SHA1_96 1012s algparse -v2 'ah=aes-sha1' (expect ERROR) 1012s ERROR: AH integrity algorithm 'aes' is not recognized 1012s algparse -v2 'ah=vanityhash1' (expect ERROR) 1012s ERROR: AH integrity algorithm 'vanityhash1' is not recognized 1012s algparse -v2 'ah=aes_gcm_c-256' (expect ERROR) 1012s ERROR: AH integrity algorithm 'aes_gcm_c' is not recognized 1012s algparse -v2 'ah=id3' (expect ERROR) 1012s ERROR: AH integrity algorithm 'id3' is not recognized 1012s algparse -v2 'ah=3des' (expect ERROR) 1012s ERROR: AH integrity algorithm '3des' is not recognized 1012s algparse -v2 'ah=null' (expect ERROR) 1012s ERROR: AH cannot have 'none' as the integrity algorithm 1012s algparse -v2 'ah=aes_gcm' (expect ERROR) 1012s ERROR: AH integrity algorithm 'aes_gcm' is not recognized 1012s algparse -v2 'ah=aes_ccm' (expect ERROR) 1012s ERROR: AH integrity algorithm 'aes_ccm' is not recognized 1012s algparse -v2 'ah=ripemd' (expect ERROR) 1012s ERROR: AH integrity algorithm 'ripemd' is not recognized 1012s algparse -v2 'ike' (expect SUCCESS) 1012s AES_GCM_16_256-HMAC_SHA2_512+HMAC_SHA2_256-DH19+DH20+DH21+DH31+MODP4096+MODP3072+MODP2048+MODP8192 1012s AES_GCM_16_128-HMAC_SHA2_512+HMAC_SHA2_256-DH19+DH20+DH21+DH31+MODP4096+MODP3072+MODP2048+MODP8192 1012s CHACHA20_POLY1305-HMAC_SHA2_512+HMAC_SHA2_256-DH19+DH20+DH21+DH31+MODP4096+MODP3072+MODP2048+MODP8192 1012s AES_CBC_256-HMAC_SHA2_512+HMAC_SHA2_256-DH19+DH20+DH21+DH31+MODP4096+MODP3072+MODP2048+MODP8192 1012s AES_CBC_128-HMAC_SHA2_512+HMAC_SHA2_256-DH19+DH20+DH21+DH31+MODP4096+MODP3072+MODP2048+MODP8192 1012s algparse -v2 'ike=' (expect ERROR) 1012s ERROR: IKE proposal is empty 1012s algparse -v2 'ike=3des-sha1' (expect SUCCESS) 1012s 3DES_CBC-HMAC_SHA1-DH19+DH20+DH21+DH31+MODP4096+MODP3072+MODP2048+MODP8192 1012s algparse -v2 'ike=3des-sha1' (expect SUCCESS) 1012s 3DES_CBC-HMAC_SHA1-DH19+DH20+DH21+DH31+MODP4096+MODP3072+MODP2048+MODP8192 1012s algparse -v2 'ike=3des-sha1;modp1536' (expect SUCCESS) 1012s 3DES_CBC-HMAC_SHA1-MODP1536 1012s algparse -v2 'ike=3des;dh21' (expect SUCCESS) 1012s 3DES_CBC-HMAC_SHA2_512+HMAC_SHA2_256-DH21 1012s algparse -v2 'ike=3des-sha1;dh21' (expect SUCCESS) 1012s 3DES_CBC-HMAC_SHA1-DH21 1012s algparse -v2 'ike=3des-sha1-ecp_521' (expect SUCCESS) 1012s 3DES_CBC-HMAC_SHA1-DH21 1012s algparse -v2 'ike=3des+aes' (expect SUCCESS) 1012s 3DES_CBC+AES_CBC-HMAC_SHA2_512+HMAC_SHA2_256-DH19+DH20+DH21+DH31+MODP4096+MODP3072+MODP2048+MODP8192 1012s algparse -v2 'ike=aes;none' (expect ERROR) 1012s ERROR: IKE DH algorithm 'none' not permitted 1012s algparse -v2 'ike=id2' (expect ERROR) 1012s ERROR: IKE encryption algorithm 'id2' is not recognized 1012s algparse -v2 'ike=3des-id2' (expect ERROR) 1012s ERROR: IKE PRF algorithm 'id2' is not recognized 1012s algparse -v2 'ike=aes_ccm' (expect ERROR) 1012s ERROR: IKE encryption algorithm 'aes_ccm' is not supported 1012s algparse -v2 'ike=aes-sha1-sha2-ecp_521' (expect ERROR) 1012s ERROR: IKE DH algorithm 'sha2' is not recognized 1012s algparse -v2 'ike=aes-sha2-sha2;ecp_521' (expect ERROR) 1012s ERROR: IKE DH algorithm 'sha2' is not recognized 1012s algparse -v2 'ike=aes-sha1_96-sha2-ecp_521' (expect SUCCESS) 1012s AES_CBC-HMAC_SHA1_96-HMAC_SHA2_256-DH21 1012s algparse -v2 'ike=aes-sha1_96-sha2;ecp_521' (expect SUCCESS) 1012s AES_CBC-HMAC_SHA1_96-HMAC_SHA2_256-DH21 1012s algparse -v2 'ike=aes+aes-sha1+sha1-modp8192+modp8192' (expect SUCCESS) 1012s AES_CBC-HMAC_SHA1-MODP8192 1012s algparse -v2 'ike=3des+aes+aes-sha2+sha1+sha1-modp4096+modp8192+modp8192' (expect SUCCESS) 1012s 3DES_CBC+AES_CBC-HMAC_SHA2_256+HMAC_SHA1-MODP4096+MODP8192 1012s algparse -v2 'ike=aes+3des+aes-sha1+sha2+sha1-modp8192+modp4096+modp8192' (expect SUCCESS) 1012s AES_CBC+3DES_CBC-HMAC_SHA1+HMAC_SHA2_256-MODP8192+MODP4096 1012s algparse -v2 'ike=aes+aes+3des-sha1+sha1+sha2-modp8192+modp8192+modp4096' (expect SUCCESS) 1012s AES_CBC+3DES_CBC-HMAC_SHA1+HMAC_SHA2_256-MODP8192+MODP4096 1012s algparse -v2 'ike=aes+aes128+aes256' (expect SUCCESS) 1012s AES_CBC-HMAC_SHA2_512+HMAC_SHA2_256-DH19+DH20+DH21+DH31+MODP4096+MODP3072+MODP2048+MODP8192 1012s algparse -v2 'ike=aes128+aes+aes256' (expect SUCCESS) 1012s AES_CBC_128+AES_CBC-HMAC_SHA2_512+HMAC_SHA2_256-DH19+DH20+DH21+DH31+MODP4096+MODP3072+MODP2048+MODP8192 1012s algparse -v2 'ike=aes128+aes256+aes' (expect SUCCESS) 1012s AES_CBC_128+AES_CBC_256+AES_CBC-HMAC_SHA2_512+HMAC_SHA2_256-DH19+DH20+DH21+DH31+MODP4096+MODP3072+MODP2048+MODP8192 1012s algparse -v2 'ike=aes-sha1-modp8192,aes-sha1-modp8192,aes-sha1-modp8192' (expect SUCCESS) 1012s AES_CBC-HMAC_SHA1-MODP8192 1012s algparse -v2 'ike=aes-sha1-modp8192,aes-sha2-modp8192,aes-sha1-modp8192' (expect SUCCESS) 1012s AES_CBC-HMAC_SHA1-MODP8192 1012s AES_CBC-HMAC_SHA2_256-MODP8192 1012s algparse -v2 'ike=aes_gcm' (expect SUCCESS) 1012s AES_GCM_16-HMAC_SHA2_512+HMAC_SHA2_256-DH19+DH20+DH21+DH31+MODP4096+MODP3072+MODP2048+MODP8192 1012s algparse -v2 'ike=aes_gcm-sha2' (expect SUCCESS) 1012s AES_GCM_16-HMAC_SHA2_256-DH19+DH20+DH21+DH31+MODP4096+MODP3072+MODP2048+MODP8192 1012s algparse -v2 'ike=aes_gcm-sha2-modp2048' (expect SUCCESS) 1012s AES_GCM_16-HMAC_SHA2_256-MODP2048 1012s algparse -v2 'ike=aes_gcm-sha2;modp2048' (expect SUCCESS) 1012s AES_GCM_16-HMAC_SHA2_256-MODP2048 1012s algparse -v2 'ike=aes_gcm-modp2048' (expect ERROR) 1012s ERROR: IKE PRF algorithm 'modp2048' is not recognized 1012s algparse -v2 'ike=aes_gcm;modp2048' (expect SUCCESS) 1012s AES_GCM_16-HMAC_SHA2_512+HMAC_SHA2_256-MODP2048 1012s algparse -v2 'ike=aes_gcm-none' (expect SUCCESS) 1012s AES_GCM_16-HMAC_SHA2_512+HMAC_SHA2_256-DH19+DH20+DH21+DH31+MODP4096+MODP3072+MODP2048+MODP8192 1012s algparse -v2 'ike=aes_gcm-none-sha2' (expect SUCCESS) 1012s AES_GCM_16-HMAC_SHA2_256-DH19+DH20+DH21+DH31+MODP4096+MODP3072+MODP2048+MODP8192 1012s algparse -v2 'ike=aes_gcm-none-sha2-modp2048' (expect SUCCESS) 1012s AES_GCM_16-HMAC_SHA2_256-MODP2048 1012s algparse -v2 'ike=aes_gcm-none-sha2;modp2048' (expect SUCCESS) 1012s AES_GCM_16-HMAC_SHA2_256-MODP2048 1012s algparse -v2 'ike=aes_gcm-none-modp2048' (expect ERROR) 1012s ERROR: IKE PRF algorithm 'modp2048' is not recognized 1012s algparse -v2 'ike=aes_gcm-none;modp2048' (expect SUCCESS) 1012s AES_GCM_16-HMAC_SHA2_512+HMAC_SHA2_256-MODP2048 1012s algparse -v2 'ike=aes_gcm-sha1-none-modp2048' (expect ERROR) 1012s ERROR: IKE proposal contains unexpected 'modp2048' 1012s algparse -v2 'ike=aes_gcm-sha1-none;modp2048' (expect ERROR) 1012s ERROR: IKE proposal contains unexpected 'modp2048' 1012s algparse -v2 'ike=aes+aes_gcm' (expect ERROR) 1012s ERROR: AEAD and non-AEAD IKE encryption algorithm cannot be combined 1012s algparse -v2 'ike=,' (expect ERROR) 1012s ERROR: IKE encryption algorithm is empty 1012s algparse -v2 'ike=aes,' (expect ERROR) 1012s ERROR: IKE encryption algorithm is empty 1012s algparse -v2 'ike=aes,,aes' (expect ERROR) 1012s ERROR: IKE encryption algorithm is empty 1012s algparse -v2 'ike=,aes' (expect ERROR) 1012s ERROR: IKE encryption algorithm is empty 1012s algparse -v2 'ike=-' (expect ERROR) 1012s ERROR: IKE encryption algorithm is empty 1012s algparse -v2 'ike=+' (expect ERROR) 1012s ERROR: IKE encryption algorithm is empty 1012s algparse -v2 'ike=;' (expect ERROR) 1012s ERROR: IKE encryption algorithm is empty 1012s algparse -v2 'ike=aes-' (expect ERROR) 1012s ERROR: IKE PRF algorithm is empty 1012s algparse -v2 'ike=aes+' (expect ERROR) 1012s ERROR: IKE encryption algorithm is empty 1012s algparse -v2 'ike=aes;' (expect ERROR) 1012s ERROR: IKE DH algorithm is empty 1012s algparse -v2 'ike=-aes' (expect ERROR) 1012s ERROR: IKE encryption algorithm is empty 1012s algparse -v2 'ike=+aes' (expect ERROR) 1012s ERROR: IKE encryption algorithm is empty 1012s algparse -v2 'ike=;aes' (expect ERROR) 1012s ERROR: IKE encryption algorithm is empty 1012s algparse -v2 'ike=aes+-' (expect ERROR) 1012s ERROR: IKE encryption algorithm is empty 1012s algparse -v2 'ike=aes+;' (expect ERROR) 1012s ERROR: IKE encryption algorithm is empty 1012s algparse -v2 'ike=aes++' (expect ERROR) 1012s ERROR: IKE encryption algorithm is empty 1012s | token: '-' "sha1" '' '' 1012s | appending ESP encryption algorithm AES_CBC[_0] 1012s | parsing integ: 1012s | appending ESP integrity algorithm HMAC_SHA1_96[_0] 1012s | token: '' '' '' 1012s | parsing 'aes-sha1' for ESP 1012s | proposal: 'aes-sha1' 1012s | token: '' '' "aes" '-' 1012s | token: '' "aes" '-' "sha1" '' 1012s | token: '-' "sha1" '' '' 1012s | appending ESP encryption algorithm AES_CBC[_0] 1012s | parsing integ: 1012s | appending ESP integrity algorithm HMAC_SHA1_96[_0] 1012s | token: '' '' '' 1012s | parsing 'aes-sha1-modp2048' for ESP 1012s | proposal: 'aes-sha1-modp2048' 1012s | token: '' '' "aes" '-' 1012s | token: '' "aes" '-' "sha1" '-' 1012s | token: '-' "sha1" '-' "modp2048" '' 1012s | appending ESP encryption algorithm AES_CBC[_0] 1012s | parsing integ: 1012s | appending ESP integrity algorithm HMAC_SHA1_96[_0] 1012s | token: '-' "modp2048" '' '' 1012s | parsing dh: 1012s | appending ESP DH algorithm MODP2048[_0] 1012s | token: '' '' '' 1012s ipsec algparse: ignoring ESP DH algorithm MODP2048 as PFS policy is disabled 1012s | parsing 'aes-128-sha1' for ESP 1012s | proposal: 'aes-128-sha1' 1012s | token: '' '' "aes" '-' 1012s | token: '' "aes" '-' "128" '-' 1012s | token: '-' "128" '-' "sha1" '' 1012s | token: '-' "sha1" '' '' 1012s | appending ESP encryption algorithm AES_CBC[_128] 1012s | parsing integ: 1012s | appending ESP integrity algorithm HMAC_SHA1_96[_0] 1012s | token: '' '' '' 1012s | parsing 'aes-128-sha1' for ESP 1012s | proposal: 'aes-128-sha1' 1012s | token: '' '' "aes" '-' 1012s | token: '' "aes" '-' "128" '-' 1012s | token: '-' "128" '-' "sha1" '' 1012s | token: '-' "sha1" '' '' 1012s | appending ESP encryption algorithm AES_CBC[_128] 1012s | parsing integ: 1012s | appending ESP integrity algorithm HMAC_SHA1_96[_0] 1012s | token: '' '' '' 1012s | parsing 'aes-128-sha1-modp2048' for ESP 1012s | proposal: 'aes-128-sha1-modp2048' 1012s | token: '' '' "aes" '-' 1012s | token: '' "aes" '-' "128" '-' 1012s | token: '-' "128" '-' "sha1" '-' 1012s | token: '-' "sha1" '-' "modp2048" '' 1012s | appending ESP encryption algorithm AES_CBC[_128] 1012s | parsing integ: 1012s | appending ESP integrity algorithm HMAC_SHA1_96[_0] 1012s | token: '-' "modp2048" '' '' 1012s | parsing dh: 1012s | appending ESP DH algorithm MODP2048[_0] 1012s | token: '' '' '' 1012s ipsec algparse: ignoring ESP DH algorithm MODP2048 as PFS policy is disabled 1012s | parsing 'aes-128' for ESP 1012s | proposal: 'aes-128' 1012s | token: '' '' "aes" '-' 1012s | token: '' "aes" '-' "128" '' 1012s | token: '-' "128" '' '' 1012s | token: '' '' '' 1012s | appending ESP encryption algorithm AES_CBC[_128] 1012s | appending ESP integrity algorithm HMAC_SHA2_512_256[_0] 1012s | appending ESP integrity algorithm HMAC_SHA2_256_128[_0] 1012s | parsing 'aes_gcm_a-128-null' for ESP 1012s | proposal: 'aes_gcm_a-128-null' 1012s | token: '' '' "aes_gcm_a" '-' 1012s | token: '' "aes_gcm_a" '-' "128" '-' 1012s | token: '-' "128" '-' "null" '' 1012s | token: '-' "null" '' '' 1012s | appending ESP encryption algorithm AES_GCM_8[_128] 1012s | parsing integ: 1012s | appending ESP integrity algorithm NONE[_0] 1012s | token: '' '' '' 1012s | parsing '3des-sha1;modp1024' for ESP 1012s | proposal: '3des-sha1;modp1024' 1012s | token: '' '' "3des" '-' 1012s | token: '' "3des" '-' "sha1" ';' 1012s | token: '-' "sha1" ';' "modp1024" '' 1012s | appending ESP encryption algorithm 3DES_CBC[_0] 1012s | parsing integ: 1012s | appending ESP integrity algorithm HMAC_SHA1_96[_0] 1012s | token: ';' "modp1024" '' '' 1012s | parsing dh: 1012s | ike_alg_byname() failed: ESP DH algorithm 'modp1024' is not supported 1012s | lookup for DH algorithm 'modp1024' failed 1012s | ... failed 'ESP DH algorithm 'modp1024' is not supported' 1012s | parsing '3des-sha1;modp1536' for ESP 1012s | proposal: '3des-sha1;modp1536' 1012s | token: '' '' "3des" '-' 1012s | token: '' "3des" '-' "sha1" ';' 1012s | token: '-' "sha1" ';' "modp1536" '' 1012s | appending ESP encryption algorithm 3DES_CBC[_0] 1012s | parsing integ: 1012s | appending ESP integrity algorithm HMAC_SHA1_96[_0] 1012s | token: ';' "modp1536" '' '' 1012s | parsing dh: 1012s | appending ESP DH algorithm MODP1536[_0] 1012s | token: '' '' '' 1012s ipsec algparse: ignoring ESP DH algorithm MODP1536 as PFS policy is disabled 1012s | parsing '3des-sha1;modp2048' for ESP 1012s | proposal: '3des-sha1;modp2048' 1012s | token: '' '' "3des" '-' 1012s | token: '' "3des" '-' "sha1" ';' 1012s | token: '-' "sha1" ';' "modp2048" '' 1012s | appending ESP encryption algorithm 3DES_CBC[_0] 1012s | parsing integ: 1012s | appending ESP integrity algorithm HMAC_SHA1_96[_0] 1012s | token: ';' "modp2048" '' '' 1012s | parsing dh: 1012s | appending ESP DH algorithm MODP2048[_0] 1012s | token: '' '' '' 1012s ipsec algparse: ignoring ESP DH algorithm MODP2048 as PFS policy is disabled 1012s | parsing '3des-sha1;dh21' for ESP 1012s | proposal: '3des-sha1;dh21' 1012s | token: '' '' "3des" '-' 1012s | token: '' "3des" '-' "sha1" ';' 1012s | token: '-' "sha1" ';' "dh21" '' 1012s | appending ESP encryption algorithm 3DES_CBC[_0] 1012s | parsing integ: 1012s | appending ESP integrity algorithm HMAC_SHA1_96[_0] 1012s | token: ';' "dh21" '' '' 1012s | parsing dh: 1012s | appending ESP DH algorithm DH21[_0] 1012s | token: '' '' '' 1012s ipsec algparse: ignoring ESP DH algorithm DH21 as PFS policy is disabled 1012s | parsing '3des-sha1;ecp_521' for ESP 1012s | proposal: '3des-sha1;ecp_521' 1012s | token: '' '' "3des" '-' 1012s | token: '' "3des" '-' "sha1" ';' 1012s | token: '-' "sha1" ';' "ecp_521" '' 1012s | appending ESP encryption algorithm 3DES_CBC[_0] 1012s | parsing integ: 1012s | appending ESP integrity algorithm HMAC_SHA1_96[_0] 1012s | token: ';' "ecp_521" '' '' 1012s | parsing dh: 1012s | appending ESP DH algorithm DH21[_0] 1012s | token: '' '' '' 1012s ipsec algparse: ignoring ESP DH algorithm DH21 as PFS policy is disabled 1012s | parsing '3des-sha1;dh23' for ESP 1012s | proposal: '3des-sha1;dh23' 1012s | token: '' '' "3des" '-' 1012s | token: '' "3des" '-' "sha1" ';' 1012s | token: '-' "sha1" ';' "dh23" '' 1012s | appending ESP encryption algorithm 3DES_CBC[_0] 1012s | parsing integ: 1012s | appending ESP integrity algorithm HMAC_SHA1_96[_0] 1012s | token: ';' "dh23" '' '' 1012s | parsing dh: 1012s | ike_alg_byname() failed: ESP DH algorithm 'dh23' is not supported 1012s | lookup for DH algorithm 'dh23' failed 1012s | ... failed 'ESP DH algorithm 'dh23' is not supported' 1012s | parsing '3des-sha1;dh24' for ESP 1012s | proposal: '3des-sha1;dh24' 1012s | token: '' '' "3des" '-' 1012s | token: '' "3des" '-' "sha1" ';' 1012s | token: '-' "sha1" ';' "dh24" '' 1012s | appending ESP encryption algorithm 3DES_CBC[_0] 1012s | parsing integ: 1012s | appending ESP integrity algorithm HMAC_SHA1_96[_0] 1012s | token: ';' "dh24" '' '' 1012s | parsing dh: 1012s | ike_alg_byname() failed: ESP DH algorithm 'dh24' is not supported 1012s | lookup for DH algorithm 'dh24' failed 1012s | ... failed 'ESP DH algorithm 'dh24' is not supported' 1012s | parsing '3des-sha1' for ESP 1012s | proposal: '3des-sha1' 1012s | token: '' '' "3des" '-' 1012s | token: '' "3des" '-' "sha1" '' 1012s | token: '-' "sha1" '' '' 1012s | appending ESP encryption algorithm 3DES_CBC[_0] 1012s | parsing integ: 1012s | appending ESP integrity algorithm HMAC_SHA1_96[_0] 1012s | token: '' '' '' 1012s | parsing 'null-sha1' for ESP 1012s | proposal: 'null-sha1' 1012s | token: '' '' "null" '-' 1012s | token: '' "null" '-' "sha1" '' 1012s | token: '-' "sha1" '' '' 1012s | appending ESP encryption algorithm NULL[_0] 1012s | parsing integ: 1012s | appending ESP integrity algorithm HMAC_SHA1_96[_0] 1012s | token: '' '' '' 1012s | parsing 'aes_cbc' for ESP 1012s | proposal: 'aes_cbc' 1012s | token: '' '' "aes_cbc" '' 1012s | token: '' "aes_cbc" '' '' 1012s | token: '' '' '' 1012s | appending ESP encryption algorithm AES_CBC[_0] 1012s | appending ESP integrity algorithm HMAC_SHA2_512_256[_0] 1012s | appending ESP integrity algorithm HMAC_SHA2_256_128[_0] 1012s | parsing 'aes-sha' for ESP 1012s | proposal: 'aes-sha' 1012s | token: '' '' "aes" '-' 1012s | token: '' "aes" '-' "sha" '' 1012s | token: '-' "sha" '' '' 1012s | appending ESP encryption algorithm AES_CBC[_0] 1012s | parsing integ: 1012s | appending ESP integrity algorithm HMAC_SHA1_96[_0] 1012s | token: '' '' '' 1012s | parsing 'aes-sha1' for ESP 1012s | proposal: 'aes-sha1' 1012s | token: '' '' "aes" '-' 1012s | token: '' "aes" '-' "sha1" '' 1012s | token: '-' "sha1" '' '' 1012s | appending ESP encryption algorithm AES_CBC[_0] 1012s | parsing integ: 1012s | appending ESP integrity algorithm HMAC_SHA1_96[_0] 1012s | token: '' '' '' 1012s | parsing 'aes128-sha1' for ESP 1012s | proposal: 'aes128-sha1' 1012s | token: '' '' "aes128" '-' 1012s | token: '' "aes128" '-' "sha1" '' 1012s | ike_alg_byname() failed: ESP encryption algorithm 'aes128' is not recognized 1012s | token: '-' "sha1" '' '' 1012s | appending ESP encryption algorithm AES_CBC[_128] 1012s | parsing integ: 1012s | appending ESP integrity algorithm HMAC_SHA1_96[_0] 1012s | token: '' '' '' 1012s | parsing 'aes-sha2' for ESP 1012s | proposal: 'aes-sha2' 1012s | token: '' '' "aes" '-' 1012s | token: '' "aes" '-' "sha2" '' 1012s | token: '-' "sha2" '' '' 1012s | appending ESP encryption algorithm AES_CBC[_0] 1012s | parsing integ: 1012s | appending ESP integrity algorithm HMAC_SHA2_256_128[_0] 1012s | token: '' '' '' 1012s | parsing 'aes-sha256' for ESP 1012s | proposal: 'aes-sha256' 1012s | token: '' '' "aes" '-' 1012s | token: '' "aes" '-' "sha256" '' 1012s | token: '-' "sha256" '' '' 1012s | appending ESP encryption algorithm AES_CBC[_0] 1012s | parsing integ: 1012s | appending ESP integrity algorithm HMAC_SHA2_256_128[_0] 1012s | token: '' '' '' 1012s | parsing 'aes-sha384' for ESP 1012s | proposal: 'aes-sha384' 1012s | token: '' '' "aes" '-' 1012s | token: '' "aes" '-' "sha384" '' 1012s | token: '-' "sha384" '' '' 1012s | appending ESP encryption algorithm AES_CBC[_0] 1012s | parsing integ: 1012s | appending ESP integrity algorithm HMAC_SHA2_384_192[_0] 1012s | token: '' '' '' 1012s | parsing 'aes-sha512' for ESP 1012s | proposal: 'aes-sha512' 1012s | token: '' '' "aes" '-' 1012s | token: '' "aes" '-' "sha512" '' 1012s | token: '-' "sha512" '' '' 1012s | appending ESP encryption algorithm AES_CBC[_0] 1012s | parsing integ: 1012s | appending ESP integrity algorithm HMAC_SHA2_512_256[_0] 1012s | token: '' '' '' 1012s | parsing 'aes128-aes_xcbc' for ESP 1012s | proposal: 'aes128-aes_xcbc' 1012s | token: '' '' "aes128" '-' 1012s | token: '' "aes128" '-' "aes_xcbc" '' 1012s | ike_alg_byname() failed: ESP encryption algorithm 'aes128' is not recognized 1012s | token: '-' "aes_xcbc" '' '' 1012s | appending ESP encryption algorithm AES_CBC[_128] 1012s | parsing integ: 1012s | appending ESP integrity algorithm AES_XCBC_96[_0] 1012s | token: '' '' '' 1012s | parsing 'aes192-sha1' for ESP 1012s | proposal: 'aes192-sha1' 1012s | token: '' '' "aes192" '-' 1012s | token: '' "aes192" '-' "sha1" '' 1012s | ike_alg_byname() failed: ESP encryption algorithm 'aes192' is not recognized 1012s | token: '-' "sha1" '' '' 1012s | appending ESP encryption algorithm AES_CBC[_192] 1012s | parsing integ: 1012s | appending ESP integrity algorithm HMAC_SHA1_96[_0] 1012s | token: '' '' '' 1012s | parsing 'aes256-sha1' for ESP 1012s | proposal: 'aes256-sha1' 1012s | token: '' '' "aes256" '-' 1012s | token: '' "aes256" '-' "sha1" '' 1012s | ike_alg_byname() failed: ESP encryption algorithm 'aes256' is not recognized 1012s | token: '-' "sha1" '' '' 1012s | appending ESP encryption algorithm AES_CBC[_256] 1012s | parsing integ: 1012s | appending ESP integrity algorithm HMAC_SHA1_96[_0] 1012s | token: '' '' '' 1012s | parsing 'aes256-sha' for ESP 1012s | proposal: 'aes256-sha' 1012s | token: '' '' "aes256" '-' 1012s | token: '' "aes256" '-' "sha" '' 1012s | ike_alg_byname() failed: ESP encryption algorithm 'aes256' is not recognized 1012s | token: '-' "sha" '' '' 1012s | appending ESP encryption algorithm AES_CBC[_256] 1012s | parsing integ: 1012s | appending ESP integrity algorithm HMAC_SHA1_96[_0] 1012s | token: '' '' '' 1012s | parsing 'aes256-sha2' for ESP 1012s | proposal: 'aes256-sha2' 1012s | token: '' '' "aes256" '-' 1012s | token: '' "aes256" '-' "sha2" '' 1012s | ike_alg_byname() failed: ESP encryption algorithm 'aes256' is not recognized 1012s | token: '-' "sha2" '' '' 1012s | appending ESP encryption algorithm AES_CBC[_256] 1012s | parsing integ: 1012s | appending ESP integrity algorithm HMAC_SHA2_256_128[_0] 1012s | token: '' '' '' 1012s | parsing 'aes256-sha2_256' for ESP 1012s | proposal: 'aes256-sha2_256' 1012s | token: '' '' "aes256" '-' 1012s | token: '' "aes256" '-' "sha2_256" '' 1012s | ike_alg_byname() failed: ESP encryption algorithm 'aes256' is not recognized 1012s | token: '-' "sha2_256" '' '' 1012s | appending ESP encryption algorithm AES_CBC[_256] 1012s | parsing integ: 1012s | appending ESP integrity algorithm HMAC_SHA2_256_128[_0] 1012s | token: '' '' '' 1012s | parsing 'aes256-sha2_384' for ESP 1012s | proposal: 'aes256-sha2_384' 1012s | token: '' '' "aes256" '-' 1012s | token: '' "aes256" '-' "sha2_384" '' 1012s | ike_alg_byname() failed: ESP encryption algorithm 'aes256' is not recognized 1012s | token: '-' "sha2_384" '' '' 1012s | appending ESP encryption algorithm AES_CBC[_256] 1012s | parsing integ: 1012s | appending ESP integrity algorithm HMAC_SHA2_384_192[_0] 1012s | token: '' '' '' 1012s | parsing 'aes256-sha2_512' for ESP 1012s | proposal: 'aes256-sha2_512' 1012s | token: '' '' "aes256" '-' 1012s | token: '' "aes256" '-' "sha2_512" '' 1012s | ike_alg_byname() failed: ESP encryption algorithm 'aes256' is not recognized 1012s | token: '-' "sha2_512" '' '' 1012s | appending ESP encryption algorithm AES_CBC[_256] 1012s | parsing integ: 1012s | appending ESP integrity algorithm HMAC_SHA2_512_256[_0] 1012s | token: '' '' '' 1012s | parsing 'camellia' for ESP 1012s | proposal: 'camellia' 1012s | token: '' '' "camellia" '' 1012s | token: '' "camellia" '' '' 1012s | token: '' '' '' 1012s | appending ESP encryption algorithm CAMELLIA_CBC[_0] 1012s | appending ESP integrity algorithm HMAC_SHA2_512_256[_0] 1012s | appending ESP integrity algorithm HMAC_SHA2_256_128[_0] 1012s | parsing 'camellia128' for ESP 1012s | proposal: 'camellia128' 1012s | token: '' '' "camellia128" '' 1012s | token: '' "camellia128" '' '' 1012s | ike_alg_byname() failed: ESP encryption algorithm 'camellia128' is not recognized 1012s | token: '' '' '' 1012s | appending ESP encryption algorithm CAMELLIA_CBC[_128] 1012s | appending ESP integrity algorithm HMAC_SHA2_512_256[_0] 1012s | appending ESP integrity algorithm HMAC_SHA2_256_128[_0] 1012s | parsing 'camellia192' for ESP 1012s | proposal: 'camellia192' 1012s | token: '' '' "camellia192" '' 1012s | token: '' "camellia192" '' '' 1012s | ike_alg_byname() failed: ESP encryption algorithm 'camellia192' is not recognized 1012s | token: '' '' '' 1012s | appending ESP encryption algorithm CAMELLIA_CBC[_192] 1012s | appending ESP integrity algorithm HMAC_SHA2_512_256[_0] 1012s | appending ESP integrity algorithm HMAC_SHA2_256_128[_0] 1012s | parsing 'camellia256' for ESP 1012s | proposal: 'camellia256' 1012s | token: '' '' "camellia256" '' 1012s | token: '' "camellia256" '' '' 1012s | ike_alg_byname() failed: ESP encryption algorithm 'camellia256' is not recognized 1012s | token: '' '' '' 1012s | appending ESP encryption algorithm CAMELLIA_CBC[_256] 1012s | appending ESP integrity algorithm HMAC_SHA2_512_256[_0] 1012s | appending ESP integrity algorithm HMAC_SHA2_256_128[_0] 1012s | parsing 'aes_ccm' for ESP 1012s | proposal: 'aes_ccm' 1012s | token: '' '' "aes_ccm" '' 1012s | token: '' "aes_ccm" '' '' 1012s | token: '' '' '' 1012s | appending ESP encryption algorithm AES_CCM_16[_0] 1012s | appending ESP integrity algorithm NONE[_0] 1012s | parsing 'aes_ccm_a-128-null' for ESP 1012s | proposal: 'aes_ccm_a-128-null' 1012s | token: '' '' "aes_ccm_a" '-' 1012s | token: '' "aes_ccm_a" '-' "128" '-' 1012s | token: '-' "128" '-' "null" '' 1012s | token: '-' "null" '' '' 1012s | appending ESP encryption algorithm AES_CCM_8[_128] 1012s | parsing integ: 1012s | appending ESP integrity algorithm NONE[_0] 1012s | token: '' '' '' 1012s | parsing 'aes_ccm_a-192-null' for ESP 1012s | proposal: 'aes_ccm_a-192-null' 1012s | token: '' '' "aes_ccm_a" '-' 1012s | token: '' "aes_ccm_a" '-' "192" '-' 1012s | token: '-' "192" '-' "null" '' 1012s | token: '-' "null" '' '' 1012s | appending ESP encryption algorithm AES_CCM_8[_192] 1012s | parsing integ: 1012s | appending ESP integrity algorithm NONE[_0] 1012s | token: '' '' '' 1012s | parsing 'aes_ccm_a-256-null' for ESP 1012s | proposal: 'aes_ccm_a-256-null' 1012s | token: '' '' "aes_ccm_a" '-' 1012s | token: '' "aes_ccm_a" '-' "256" '-' 1012s | token: '-' "256" '-' "null" '' 1012s | token: '-' "null" '' '' 1012s | appending ESP encryption algorithm AES_CCM_8[_256] 1012s | parsing integ: 1012s | appending ESP integrity algorithm NONE[_0] 1012s | token: '' '' '' 1012s | parsing 'aes_ccm_b-128-null' for ESP 1012s | proposal: 'aes_ccm_b-128-null' 1012s | token: '' '' "aes_ccm_b" '-' 1012s | token: '' "aes_ccm_b" '-' "128" '-' 1012s | token: '-' "128" '-' "null" '' 1012s | token: '-' "null" '' '' 1012s | appending ESP encryption algorithm AES_CCM_12[_128] 1012s | parsing integ: 1012s | appending ESP integrity algorithm NONE[_0] 1012s | token: '' '' '' 1012s | parsing 'aes_ccm_b-192-null' for ESP 1012s | proposal: 'aes_ccm_b-192-null' 1012s | token: '' '' "aes_ccm_b" '-' 1012s | token: '' "aes_ccm_b" '-' "192" '-' 1012s | token: '-' "192" '-' "null" '' 1012s | token: '-' "null" '' '' 1012s | appending ESP encryption algorithm AES_CCM_12[_192] 1012s | parsing integ: 1012s | appending ESP integrity algorithm NONE[_0] 1012s | token: '' '' '' 1012s | parsing 'aes_ccm_b-256-null' for ESP 1012s | proposal: 'aes_ccm_b-256-null' 1012s | token: '' '' "aes_ccm_b" '-' 1012s | token: '' "aes_ccm_b" '-' "256" '-' 1012s | token: '-' "256" '-' "null" '' 1012s | token: '-' "null" '' '' 1012s | appending ESP encryption algorithm AES_CCM_12[_256] 1012s | parsing integ: 1012s | appending ESP integrity algorithm NONE[_0] 1012s | token: '' '' '' 1012s | parsing 'aes_ccm_c-128-null' for ESP 1012s | proposal: 'aes_ccm_c-128-null' 1012s | token: '' '' "aes_ccm_c" '-' 1012s | token: '' "aes_ccm_c" '-' "128" '-' 1012s | token: '-' "128" '-' "null" '' 1012s | token: '-' "null" '' '' 1012s | appending ESP encryption algorithm AES_CCM_16[_128] 1012s | parsing integ: 1012s | appending ESP integrity algorithm NONE[_0] 1012s | token: '' '' '' 1012s | parsing 'aes_ccm_c-192-null' for ESP 1012s | proposal: 'aes_ccm_c-192-null' 1012s | token: '' '' "aes_ccm_c" '-' 1012s | token: '' "aes_ccm_c" '-' "192" '-' 1012s | token: '-' "192" '-' "null" '' 1012s | token: '-' "null" '' '' 1012s | appending ESP encryption algorithm AES_CCM_16[_192] 1012s | parsing integ: 1012s | appending ESP integrity algorithm NONE[_0] 1012s | token: '' '' '' 1012s | parsing 'aes_ccm_c-256-null' for ESP 1012s | proposal: 'aes_ccm_c-256-null' 1012s | token: '' '' "aes_ccm_c" '-' 1012s | token: '' "aes_ccm_c" '-' "256" '-' 1012s | token: '-' "256" '-' "null" '' 1012s | token: '-' "null" '' '' 1012s | appending ESP encryption algorithm AES_CCM_16[_256] 1012s | parsing integ: 1012s | appending ESP integrity algorithm NONE[_0] 1012s | token: '' '' '' 1012s | parsing 'aes_gcm' for ESP 1012s | proposal: 'aes_gcm' 1012s | token: '' '' "aes_gcm" '' 1012s | token: '' "aes_gcm" '' '' 1012s | token: '' '' '' 1012s | appending ESP encryption algorithm AES_GCM_16[_0] 1012s | appending ESP integrity algorithm NONE[_0] 1012s | parsing 'aes_gcm_a-128-null' for ESP 1012s | proposal: 'aes_gcm_a-128-null' 1012s | token: '' '' "aes_gcm_a" '-' 1012s | token: '' "aes_gcm_a" '-' "128" '-' 1012s | token: '-' "128" '-' "null" '' 1012s | token: '-' "null" '' '' 1012s | appending ESP encryption algorithm AES_GCM_8[_128] 1012s | parsing integ: 1012s | appending ESP integrity algorithm NONE[_0] 1012s | token: '' '' '' 1012s | parsing 'aes_gcm_a-192-null' for ESP 1012s | proposal: 'aes_gcm_a-192-null' 1012s | token: '' '' "aes_gcm_a" '-' 1012s | token: '' "aes_gcm_a" '-' "192" '-' 1012s | token: '-' "192" '-' "null" '' 1012s | token: '-' "null" '' '' 1012s | appending ESP encryption algorithm AES_GCM_8[_192] 1012s | parsing integ: 1012s | appending ESP integrity algorithm NONE[_0] 1012s | token: '' '' '' 1012s | parsing 'aes_gcm_a-256-null' for ESP 1012s | proposal: 'aes_gcm_a-256-null' 1012s | token: '' '' "aes_gcm_a" '-' 1012s | token: '' "aes_gcm_a" '-' "256" '-' 1012s | token: '-' "256" '-' "null" '' 1012s | token: '-' "null" '' '' 1012s | appending ESP encryption algorithm AES_GCM_8[_256] 1012s | parsing integ: 1012s | appending ESP integrity algorithm NONE[_0] 1012s | token: '' '' '' 1012s | parsing 'aes_gcm_b-128-null' for ESP 1012s | proposal: 'aes_gcm_b-128-null' 1012s | token: '' '' "aes_gcm_b" '-' 1012s | token: '' "aes_gcm_b" '-' "128" '-' 1012s | token: '-' "128" '-' "null" '' 1012s | token: '-' "null" '' '' 1012s | appending ESP encryption algorithm AES_GCM_12[_128] 1012s | parsing integ: 1012s | appending ESP integrity algorithm NONE[_0] 1012s | token: '' '' '' 1012s | parsing 'aes_gcm_b-192-null' for ESP 1012s | proposal: 'aes_gcm_b-192-null' 1012s | token: '' '' "aes_gcm_b" '-' 1012s | token: '' "aes_gcm_b" '-' "192" '-' 1012s | token: '-' "192" '-' "null" '' 1012s | token: '-' "null" '' '' 1012s | appending ESP encryption algorithm AES_GCM_12[_192] 1012s | parsing integ: 1012s | appending ESP integrity algorithm NONE[_0] 1012s | token: '' '' '' 1012s | parsing 'aes_gcm_b-256-null' for ESP 1012s | proposal: 'aes_gcm_b-256-null' 1012s | token: '' '' "aes_gcm_b" '-' 1012s | token: '' "aes_gcm_b" '-' "256" '-' 1012s | token: '-' "256" '-' "null" '' 1012s | token: '-' "null" '' '' 1012s | appending ESP encryption algorithm AES_GCM_12[_256] 1012s | parsing integ: 1012s | appending ESP integrity algorithm NONE[_0] 1012s | token: '' '' '' 1012s | parsing 'aes_gcm_c-128-null' for ESP 1012s | proposal: 'aes_gcm_c-128-null' 1012s | token: '' '' "aes_gcm_c" '-' 1012s | token: '' "aes_gcm_c" '-' "128" '-' 1012s | token: '-' "128" '-' "null" '' 1012s | token: '-' "null" '' '' 1012s | appending ESP encryption algorithm AES_GCM_16[_128] 1012s | parsing integ: 1012s | appending ESP integrity algorithm NONE[_0] 1012s | token: '' '' '' 1012s | parsing 'aes_gcm_c-192-null' for ESP 1012s | proposal: 'aes_gcm_c-192-null' 1012s | token: '' '' "aes_gcm_c" '-' 1012s | token: '' "aes_gcm_c" '-' "192" '-' 1012s | token: '-' "192" '-' "null" '' 1012s | token: '-' "null" '' '' 1012s | appending ESP encryption algorithm AES_GCM_16[_192] 1012s | parsing integ: 1012s | appending ESP integrity algorithm NONE[_0] 1012s | token: '' '' '' 1012s | parsing 'aes_gcm_c-256-null' for ESP 1012s | proposal: 'aes_gcm_c-256-null' 1012s | token: '' '' "aes_gcm_c" '-' 1012s | token: '' "aes_gcm_c" '-' "256" '-' 1012s | token: '-' "256" '-' "null" '' 1012s | token: '-' "null" '' '' 1012s | appending ESP encryption algorithm AES_GCM_16[_256] 1012s | parsing integ: 1012s | appending ESP integrity algorithm NONE[_0] 1012s | token: '' '' '' 1012s | parsing 'aes_ccm_a-null' for ESP 1012s | proposal: 'aes_ccm_a-null' 1012s | token: '' '' "aes_ccm_a" '-' 1012s | token: '' "aes_ccm_a" '-' "null" '' 1012s | token: '-' "null" '' '' 1012s | appending ESP encryption algorithm AES_CCM_8[_0] 1012s | parsing integ: 1012s | appending ESP integrity algorithm NONE[_0] 1012s | token: '' '' '' 1012s | parsing 'aes_ccm_b-null' for ESP 1012s | proposal: 'aes_ccm_b-null' 1012s | token: '' '' "aes_ccm_b" '-' 1012s | token: '' "aes_ccm_b" '-' "null" '' 1012s | token: '-' "null" '' '' 1012s | appending ESP encryption algorithm AES_CCM_12[_0] 1012s | parsing integ: 1012s | appending ESP integrity algorithm NONE[_0] 1012s | token: '' '' '' 1012s | parsing 'aes_ccm_c-null' for ESP 1012s | proposal: 'aes_ccm_c-null' 1012s | token: '' '' "aes_ccm_c" '-' 1012s | token: '' "aes_ccm_c" '-' "null" '' 1012s | token: '-' "null" '' '' 1012s | appending ESP encryption algorithm AES_CCM_16[_0] 1012s | parsing integ: 1012s | appending ESP integrity algorithm NONE[_0] 1012s | token: '' '' '' 1012s | parsing 'aes_gcm_a-null' for ESP 1012s | proposal: 'aes_gcm_a-null' 1012s | token: '' '' "aes_gcm_a" '-' 1012s | token: '' "aes_gcm_a" '-' "null" '' 1012s | token: '-' "null" '' '' 1012s | appending ESP encryption algorithm AES_GCM_8[_0] 1012s | parsing integ: 1012s | appending ESP integrity algorithm NONE[_0] 1012s | token: '' '' '' 1012s | parsing 'aes_gcm_b-null' for ESP 1012s | proposal: 'aes_gcm_b-null' 1012s | token: '' '' "aes_gcm_b" '-' 1012s | token: '' "aes_gcm_b" '-' "null" '' 1012s | token: '-' "null" '' '' 1012s | appending ESP encryption algorithm AES_GCM_12[_0] 1012s | parsing integ: 1012s | appending ESP integrity algorithm NONE[_0] 1012s | token: '' '' '' 1012s | parsing 'aes_gcm_c-null' for ESP 1012s | proposal: 'aes_gcm_c-null' 1012s | token: '' '' "aes_gcm_c" '-' 1012s | token: '' "aes_gcm_c" '-' "null" '' 1012s | token: '-' "null" '' '' 1012s | appending ESP encryption algorithm AES_GCM_16[_0] 1012s | parsing integ: 1012s | appending ESP integrity algorithm NONE[_0] 1012s | token: '' '' '' 1012s | parsing 'aes_ccm-null' for ESP 1012s | proposal: 'aes_ccm-null' 1012s | token: '' '' "aes_ccm" '-' 1012s | token: '' "aes_ccm" '-' "null" '' 1012s | token: '-' "null" '' '' 1012s | appending ESP encryption algorithm AES_CCM_16[_0] 1012s | parsing integ: 1012s | appending ESP integrity algorithm NONE[_0] 1012s | token: '' '' '' 1012s | parsing 'aes_gcm-null' for ESP 1012s | proposal: 'aes_gcm-null' 1012s | token: '' '' "aes_gcm" '-' 1012s | token: '' "aes_gcm" '-' "null" '' 1012s | token: '-' "null" '' '' 1012s | appending ESP encryption algorithm AES_GCM_16[_0] 1012s | parsing integ: 1012s | appending ESP integrity algorithm NONE[_0] 1012s | token: '' '' '' 1012s | parsing 'aes_ccm-256-null' for ESP 1012s | proposal: 'aes_ccm-256-null' 1012s | token: '' '' "aes_ccm" '-' 1012s | token: '' "aes_ccm" '-' "256" '-' 1012s | token: '-' "256" '-' "null" '' 1012s | token: '-' "null" '' '' 1012s | appending ESP encryption algorithm AES_CCM_16[_256] 1012s | parsing integ: 1012s | appending ESP integrity algorithm NONE[_0] 1012s | token: '' '' '' 1012s | parsing 'aes_gcm-192-null' for ESP 1012s | proposal: 'aes_gcm-192-null' 1012s | token: '' '' "aes_gcm" '-' 1012s | token: '' "aes_gcm" '-' "192" '-' 1012s | token: '-' "192" '-' "null" '' 1012s | token: '-' "null" '' '' 1012s | appending ESP encryption algorithm AES_GCM_16[_192] 1012s | parsing integ: 1012s | appending ESP integrity algorithm NONE[_0] 1012s | token: '' '' '' 1012s | parsing 'aes_ccm_256-null' for ESP 1012s | proposal: 'aes_ccm_256-null' 1012s | token: '' '' "aes_ccm_256" '-' 1012s | token: '' "aes_ccm_256" '-' "null" '' 1012s | ike_alg_byname() failed: ESP encryption algorithm 'aes_ccm_256' is not recognized 1012s | token: '-' "null" '' '' 1012s | appending ESP encryption algorithm AES_CCM_16[_256] 1012s | parsing integ: 1012s | appending ESP integrity algorithm NONE[_0] 1012s | token: '' '' '' 1012s | parsing 'aes_gcm_192-null' for ESP 1012s | proposal: 'aes_gcm_192-null' 1012s | token: '' '' "aes_gcm_192" '-' 1012s | token: '' "aes_gcm_192" '-' "null" '' 1012s | ike_alg_byname() failed: ESP encryption algorithm 'aes_gcm_192' is not recognized 1012s | token: '-' "null" '' '' 1012s | appending ESP encryption algorithm AES_GCM_16[_192] 1012s | parsing integ: 1012s | appending ESP integrity algorithm NONE[_0] 1012s | token: '' '' '' 1012s | parsing 'aes_ccm_8-null' for ESP 1012s | proposal: 'aes_ccm_8-null' 1012s | token: '' '' "aes_ccm_8" '-' 1012s | token: '' "aes_ccm_8" '-' "null" '' 1012s | token: '-' "null" '' '' 1012s | appending ESP encryption algorithm AES_CCM_8[_0] 1012s | parsing integ: 1012s | appending ESP integrity algorithm NONE[_0] 1012s | token: '' '' '' 1012s | parsing 'aes_ccm_12-null' for ESP 1012s | proposal: 'aes_ccm_12-null' 1012s | token: '' '' "aes_ccm_12" '-' 1012s | token: '' "aes_ccm_12" '-' "null" '' 1012s | token: '-' "null" '' '' 1012s | appending ESP encryption algorithm AES_CCM_12[_0] 1012s | parsing integ: 1012s | appending ESP integrity algorithm NONE[_0] 1012s | token: '' '' '' 1012s | parsing 'aes_ccm_16-null' for ESP 1012s | proposal: 'aes_ccm_16-null' 1012s | token: '' '' "aes_ccm_16" '-' 1012s | token: '' "aes_ccm_16" '-' "null" '' 1012s | token: '-' "null" '' '' 1012s | appending ESP encryption algorithm AES_CCM_16[_0] 1012s | parsing integ: 1012s | appending ESP integrity algorithm NONE[_0] 1012s | token: '' '' '' 1012s | parsing 'aes_gcm_8-null' for ESP 1012s | proposal: 'aes_gcm_8-null' 1012s | token: '' '' "aes_gcm_8" '-' 1012s | token: '' "aes_gcm_8" '-' "null" '' 1012s | token: '-' "null" '' '' 1012s | appending ESP encryption algorithm AES_GCM_8[_0] 1012s | parsing integ: 1012s | appending ESP integrity algorithm NONE[_0] 1012s | token: '' '' '' 1012s | parsing 'aes_gcm_12-null' for ESP 1012s | proposal: 'aes_gcm_12-null' 1012s | token: '' '' "aes_gcm_12" '-' 1012s | token: '' "aes_gcm_12" '-' "null" '' 1012s | token: '-' "null" '' '' 1012s | appending ESP encryption algorithm AES_GCM_12[_0] 1012s | parsing integ: 1012s | appending ESP integrity algorithm NONE[_0] 1012s | token: '' '' '' 1012s | parsing 'aes_gcm_16-null' for ESP 1012s | proposal: 'aes_gcm_16-null' 1012s | token: '' '' "aes_gcm_16" '-' 1012s | token: '' "aes_gcm_16" '-' "null" '' 1012s | token: '-' "null" '' '' 1012s | appending ESP encryption algorithm AES_GCM_16[_0] 1012s | parsing integ: 1012s | appending ESP integrity algorithm NONE[_0] 1012s | token: '' '' '' 1012s | parsing 'aes_ccm_8-128-null' for ESP 1012s | proposal: 'aes_ccm_8-128-null' 1012s | token: '' '' "aes_ccm_8" '-' 1012s | token: '' "aes_ccm_8" '-' "128" '-' 1012s | token: '-' "128" '-' "null" '' 1012s | token: '-' "null" '' '' 1012s | appending ESP encryption algorithm AES_CCM_8[_128] 1012s | parsing integ: 1012s | appending ESP integrity algorithm NONE[_0] 1012s | token: '' '' '' 1012s | parsing 'aes_ccm_12-192-null' for ESP 1012s | proposal: 'aes_ccm_12-192-null' 1012s | token: '' '' "aes_ccm_12" '-' 1012s | token: '' "aes_ccm_12" '-' "192" '-' 1012s | token: '-' "192" '-' "null" '' 1012s | token: '-' "null" '' '' 1012s | appending ESP encryption algorithm AES_CCM_12[_192] 1012s | parsing integ: 1012s | appending ESP integrity algorithm NONE[_0] 1012s | token: '' '' '' 1012s | parsing 'aes_ccm_16-256-null' for ESP 1012s | proposal: 'aes_ccm_16-256-null' 1012s | token: '' '' "aes_ccm_16" '-' 1012s | token: '' "aes_ccm_16" '-' "256" '-' 1012s | token: '-' "256" '-' "null" '' 1012s | token: '-' "null" '' '' 1012s | appending ESP encryption algorithm AES_CCM_16[_256] 1012s | parsing integ: 1012s | appending ESP integrity algorithm NONE[_0] 1012s | token: '' '' '' 1012s | parsing 'aes_gcm_8-128-null' for ESP 1012s | proposal: 'aes_gcm_8-128-null' 1012s | token: '' '' "aes_gcm_8" '-' 1012s | token: '' "aes_gcm_8" '-' "128" '-' 1012s | token: '-' "128" '-' "null" '' 1012s | token: '-' "null" '' '' 1012s | appending ESP encryption algorithm AES_GCM_8[_128] 1012s | parsing integ: 1012s | appending ESP integrity algorithm NONE[_0] 1012s | token: '' '' '' 1012s | parsing 'aes_gcm_12-192-null' for ESP 1012s | proposal: 'aes_gcm_12-192-null' 1012s | token: '' '' "aes_gcm_12" '-' 1012s | token: '' "aes_gcm_12" '-' "192" '-' 1012s | token: '-' "192" '-' "null" '' 1012s | token: '-' "null" '' '' 1012s | appending ESP encryption algorithm AES_GCM_12[_192] 1012s | parsing integ: 1012s | appending ESP integrity algorithm NONE[_0] 1012s | token: '' '' '' 1012s | parsing 'aes_gcm_16-256-null' for ESP 1012s | proposal: 'aes_gcm_16-256-null' 1012s | token: '' '' "aes_gcm_16" '-' 1012s | token: '' "aes_gcm_16" '-' "256" '-' 1012s | token: '-' "256" '-' "null" '' 1012s | token: '-' "null" '' '' 1012s | appending ESP encryption algorithm AES_GCM_16[_256] 1012s | parsing integ: 1012s | appending ESP integrity algorithm NONE[_0] 1012s | token: '' '' '' 1012s | parsing 'aes_ccm_8_128-null' for ESP 1012s | proposal: 'aes_ccm_8_128-null' 1012s | token: '' '' "aes_ccm_8_128" '-' 1012s | token: '' "aes_ccm_8_128" '-' "null" '' 1012s | ike_alg_byname() failed: ESP encryption algorithm 'aes_ccm_8_128' is not recognized 1012s | token: '-' "null" '' '' 1012s | appending ESP encryption algorithm AES_CCM_8[_128] 1012s | parsing integ: 1012s | appending ESP integrity algorithm NONE[_0] 1012s | token: '' '' '' 1012s | parsing 'aes_ccm_12_192-null' for ESP 1012s | proposal: 'aes_ccm_12_192-null' 1012s | token: '' '' "aes_ccm_12_192" '-' 1012s | token: '' "aes_ccm_12_192" '-' "null" '' 1012s | ike_alg_byname() failed: ESP encryption algorithm 'aes_ccm_12_192' is not recognized 1012s | token: '-' "null" '' '' 1012s | appending ESP encryption algorithm AES_CCM_12[_192] 1012s | parsing integ: 1012s | appending ESP integrity algorithm NONE[_0] 1012s | token: '' '' '' 1012s | parsing 'aes_ccm_16_256-null' for ESP 1012s | proposal: 'aes_ccm_16_256-null' 1012s | token: '' '' "aes_ccm_16_256" '-' 1012s | token: '' "aes_ccm_16_256" '-' "null" '' 1012s | ike_alg_byname() failed: ESP encryption algorithm 'aes_ccm_16_256' is not recognized 1012s | token: '-' "null" '' '' 1012s | appending ESP encryption algorithm AES_CCM_16[_256] 1012s | parsing integ: 1012s | appending ESP integrity algorithm NONE[_0] 1012s | token: '' '' '' 1012s | parsing 'aes_gcm_8_128-null' for ESP 1012s | proposal: 'aes_gcm_8_128-null' 1012s | token: '' '' "aes_gcm_8_128" '-' 1012s | token: '' "aes_gcm_8_128" '-' "null" '' 1012s | ike_alg_byname() failed: ESP encryption algorithm 'aes_gcm_8_128' is not recognized 1012s | token: '-' "null" '' '' 1012s | appending ESP encryption algorithm AES_GCM_8[_128] 1012s | parsing integ: 1012s | appending ESP integrity algorithm NONE[_0] 1012s | token: '' '' '' 1012s | parsing 'aes_gcm_12_192-null' for ESP 1012s | proposal: 'aes_gcm_12_192-null' 1012s | token: '' '' "aes_gcm_12_192" '-' 1012s | token: '' "aes_gcm_12_192" '-' "null" '' 1012s | ike_alg_byname() failed: ESP encryption algorithm 'aes_gcm_12_192' is not recognized 1012s | token: '-' "null" '' '' 1012s | appending ESP encryption algorithm AES_GCM_12[_192] 1012s | parsing integ: 1012s | appending ESP integrity algorithm NONE[_0] 1012s | token: '' '' '' 1012s | parsing 'aes_gcm_16_256-null' for ESP 1012s | proposal: 'aes_gcm_16_256-null' 1012s | token: '' '' "aes_gcm_16_256" '-' 1012s | token: '' "aes_gcm_16_256" '-' "null" '' 1012s | ike_alg_byname() failed: ESP encryption algorithm 'aes_gcm_16_256' is not recognized 1012s | token: '-' "null" '' '' 1012s | appending ESP encryption algorithm AES_GCM_16[_256] 1012s | parsing integ: 1012s | appending ESP integrity algorithm NONE[_0] 1012s | token: '' '' '' 1012s | parsing 'aes_ctr' for ESP 1012s | proposal: 'aes_ctr' 1012s | token: '' '' "aes_ctr" '' 1012s | token: '' "aes_ctr" '' '' 1012s | token: '' '' '' 1012s | appending ESP encryption algorithm AES_CTR[_0] 1012s | appending ESP integrity algorithm HMAC_SHA2_512_256[_0] 1012s | appending ESP integrity algorithm HMAC_SHA2_256_128[_0] 1012s | parsing 'aesctr' for ESP 1012s | proposal: 'aesctr' 1012s | token: '' '' "aesctr" '' 1012s | token: '' "aesctr" '' '' 1012s | token: '' '' '' 1012s | appending ESP encryption algorithm AES_CTR[_0] 1012s | appending ESP integrity algorithm HMAC_SHA2_512_256[_0] 1012s | appending ESP integrity algorithm HMAC_SHA2_256_128[_0] 1012s | parsing 'aes_ctr128' for ESP 1012s | proposal: 'aes_ctr128' 1012s | token: '' '' "aes_ctr128" '' 1012s | token: '' "aes_ctr128" '' '' 1012s | ike_alg_byname() failed: ESP encryption algorithm 'aes_ctr128' is not recognized 1012s | token: '' '' '' 1012s | appending ESP encryption algorithm AES_CTR[_128] 1012s | appending ESP integrity algorithm HMAC_SHA2_512_256[_0] 1012s | appending ESP integrity algorithm HMAC_SHA2_256_128[_0] 1012s | parsing 'aes_ctr192' for ESP 1012s | proposal: 'aes_ctr192' 1012s | token: '' '' "aes_ctr192" '' 1012s | token: '' "aes_ctr192" '' '' 1012s | ike_alg_byname() failed: ESP encryption algorithm 'aes_ctr192' is not recognized 1012s | token: '' '' '' 1012s | appending ESP encryption algorithm AES_CTR[_192] 1012s | appending ESP integrity algorithm HMAC_SHA2_512_256[_0] 1012s | appending ESP integrity algorithm HMAC_SHA2_256_128[_0] 1012s | parsing 'aes_ctr256' for ESP 1012s | proposal: 'aes_ctr256' 1012s | token: '' '' "aes_ctr256" '' 1012s | token: '' "aes_ctr256" '' '' 1012s | ike_alg_byname() failed: ESP encryption algorithm 'aes_ctr256' is not recognized 1012s | token: '' '' '' 1012s | appending ESP encryption algorithm AES_CTR[_256] 1012s | appending ESP integrity algorithm HMAC_SHA2_512_256[_0] 1012s | appending ESP integrity algorithm HMAC_SHA2_256_128[_0] 1012s | parsing 'camellia_cbc_256-hmac_sha2_512_256;modp8192' for ESP 1012s | proposal: 'camellia_cbc_256-hmac_sha2_512_256;modp8192' 1012s | token: '' '' "camellia_cbc_256" '-' 1012s | token: '' "camellia_cbc_256" '-' "hmac_sha2_512_256" ';' 1012s | ike_alg_byname() failed: ESP encryption algorithm 'camellia_cbc_256' is not recognized 1012s | token: '-' "hmac_sha2_512_256" ';' "modp8192" '' 1012s | appending ESP encryption algorithm CAMELLIA_CBC[_256] 1012s | parsing integ: 1012s | appending ESP integrity algorithm HMAC_SHA2_512_256[_0] 1012s | token: ';' "modp8192" '' '' 1012s | parsing dh: 1012s | appending ESP DH algorithm MODP8192[_0] 1012s | token: '' '' '' 1012s ipsec algparse: ignoring ESP DH algorithm MODP8192 as PFS policy is disabled 1012s | parsing 'null_auth_aes_gmac_256-null;modp8192' for ESP 1012s | proposal: 'null_auth_aes_gmac_256-null;modp8192' 1012s | token: '' '' "null_auth_aes_gmac_256" '-' 1012s | token: '' "null_auth_aes_gmac_256" '-' "null" ';' 1012s | ike_alg_byname() failed: ESP encryption algorithm 'null_auth_aes_gmac_256' is not recognized 1012s | token: '-' "null" ';' "modp8192" '' 1012s | appending ESP encryption algorithm NULL_AUTH_AES_GMAC[_256] 1012s | parsing integ: 1012s | appending ESP integrity algorithm NONE[_0] 1012s | token: ';' "modp8192" '' '' 1012s | parsing dh: 1012s | appending ESP DH algorithm MODP8192[_0] 1012s | token: '' '' '' 1012s ipsec algparse: ignoring ESP DH algorithm MODP8192 as PFS policy is disabled 1012s | parsing '3des-sha1;modp8192' for ESP 1012s | proposal: '3des-sha1;modp8192' 1012s | token: '' '' "3des" '-' 1012s | token: '' "3des" '-' "sha1" ';' 1012s | token: '-' "sha1" ';' "modp8192" '' 1012s | appending ESP encryption algorithm 3DES_CBC[_0] 1012s | parsing integ: 1012s | appending ESP integrity algorithm HMAC_SHA1_96[_0] 1012s | token: ';' "modp8192" '' '' 1012s | parsing dh: 1012s | appending ESP DH algorithm MODP8192[_0] 1012s | token: '' '' '' 1012s ipsec algparse: ignoring ESP DH algorithm MODP8192 as PFS policy is disabled 1012s | parsing '3des-sha1-modp8192' for ESP 1012s | proposal: '3des-sha1-modp8192' 1012s | token: '' '' "3des" '-' 1012s | token: '' "3des" '-' "sha1" '-' 1012s | token: '-' "sha1" '-' "modp8192" '' 1012s | appending ESP encryption algorithm 3DES_CBC[_0] 1012s | parsing integ: 1012s | appending ESP integrity algorithm HMAC_SHA1_96[_0] 1012s | token: '-' "modp8192" '' '' 1012s | parsing dh: 1012s | appending ESP DH algorithm MODP8192[_0] 1012s | token: '' '' '' 1012s ipsec algparse: ignoring ESP DH algorithm MODP8192 as PFS policy is disabled 1012s | parsing 'aes-sha1,3des-sha1;modp8192' for ESP 1012s | proposal: 'aes-sha1' 1012s | token: '' '' "aes" '-' 1012s | token: '' "aes" '-' "sha1" '' 1012s | token: '-' "sha1" '' '' 1012s | appending ESP encryption algorithm AES_CBC[_0] 1012s | parsing integ: 1012s | appending ESP integrity algorithm HMAC_SHA1_96[_0] 1012s | token: '' '' '' 1012s | proposal: '3des-sha1;modp8192' 1012s | token: '' '' "3des" '-' 1012s | token: '' "3des" '-' "sha1" ';' 1012s | token: '-' "sha1" ';' "modp8192" '' 1012s | appending ESP encryption algorithm 3DES_CBC[_0] 1012s | parsing integ: 1012s | appending ESP integrity algorithm HMAC_SHA1_96[_0] 1012s | token: ';' "modp8192" '' '' 1012s | parsing dh: 1012s | appending ESP DH algorithm MODP8192[_0] 1012s | token: '' '' '' 1012s ipsec algparse: ignoring ESP DH algorithm MODP8192 as PFS policy is disabled 1012s | parsing 'aes-sha1-modp8192,3des-sha1-modp8192' for ESP 1012s | proposal: 'aes-sha1-modp8192' 1012s | token: '' '' "aes" '-' 1012s | token: '' "aes" '-' "sha1" '-' 1012s | token: '-' "sha1" '-' "modp8192" '' 1012s | appending ESP encryption algorithm AES_CBC[_0] 1012s | parsing integ: 1012s | appending ESP integrity algorithm HMAC_SHA1_96[_0] 1012s | token: '-' "modp8192" '' '' 1012s | parsing dh: 1012s | appending ESP DH algorithm MODP8192[_0] 1012s | token: '' '' '' 1012s | proposal: '3des-sha1-modp8192' 1012s | token: '' '' "3des" '-' 1012s | token: '' "3des" '-' "sha1" '-' 1012s | token: '-' "sha1" '-' "modp8192" '' 1012s | appending ESP encryption algorithm 3DES_CBC[_0] 1012s | parsing integ: 1012s | appending ESP integrity algorithm HMAC_SHA1_96[_0] 1012s | token: '-' "modp8192" '' '' 1012s | parsing dh: 1012s | appending ESP DH algorithm MODP8192[_0] 1012s | token: '' '' '' 1012s ipsec algparse: ignoring ESP DH algorithm MODP8192 as PFS policy is disabled 1012s ipsec algparse: ignoring ESP DH algorithm MODP8192 as PFS policy is disabled 1012s | parsing 'aes-sha1-modp8192,aes-sha1-modp8192,aes-sha1-modp8192' for ESP 1012s | proposal: 'aes-sha1-modp8192' 1012s | token: '' '' "aes" '-' 1012s | token: '' "aes" '-' "sha1" '-' 1012s | token: '-' "sha1" '-' "modp8192" '' 1012s | appending ESP encryption algorithm AES_CBC[_0] 1012s | parsing integ: 1012s | appending ESP integrity algorithm HMAC_SHA1_96[_0] 1012s | token: '-' "modp8192" '' '' 1012s | parsing dh: 1012s | appending ESP DH algorithm MODP8192[_0] 1012s | token: '' '' '' 1012s | proposal: 'aes-sha1-modp8192' 1012s | token: '' '' "aes" '-' 1012s | token: '' "aes" '-' "sha1" '-' 1012s | token: '-' "sha1" '-' "modp8192" '' 1012s | appending ESP encryption algorithm AES_CBC[_0] 1012s | parsing integ: 1012s | appending ESP integrity algorithm HMAC_SHA1_96[_0] 1012s | token: '-' "modp8192" '' '' 1012s | parsing dh: 1012s | appending ESP DH algorithm MODP8192[_0] 1012s | token: '' '' '' 1012s | proposal: 'aes-sha1-modp8192' 1012s | token: '' '' "aes" '-' 1012s | token: '' "aes" '-' "sha1" '-' 1012s | token: '-' "sha1" '-' "modp8192" '' 1012s | appending ESP encryption algorithm AES_CBC[_0] 1012s | parsing integ: 1012s | appending ESP integrity algorithm HMAC_SHA1_96[_0] 1012s | token: '-' "modp8192" '' '' 1012s | parsing dh: 1012s | appending ESP DH algorithm MODP8192[_0] 1012s | token: '' '' '' 1012s ipsec algparse: ignoring ESP DH algorithm MODP8192 as PFS policy is disabled 1012s | parsing 'aes;none' for ESP 1012s | proposal: 'aes;none' 1012s | token: '' '' "aes" ';' 1012s | token: '' "aes" ';' "none" '' 1012s | token: ';' "none" '' '' 1012s | appending ESP encryption algorithm AES_CBC[_0] 1012s | parsing dh: 1012s | appending ESP DH algorithm NONE[_0] 1012s | token: '' '' '' 1012s | appending ESP integrity algorithm HMAC_SHA2_512_256[_0] 1012s | appending ESP integrity algorithm HMAC_SHA2_256_128[_0] 1012s ipsec algparse: ignoring redundant ESP DH algorithm NONE as PFS policy is disabled 1012s | parsing 'aes;none,aes' for ESP 1012s | proposal: 'aes;none' 1012s | token: '' '' "aes" ';' 1012s | token: '' "aes" ';' "none" '' 1012s | token: ';' "none" '' '' 1012s | appending ESP encryption algorithm AES_CBC[_0] 1012s | parsing dh: 1012s | appending ESP DH algorithm NONE[_0] 1012s | token: '' '' '' 1012s | appending ESP integrity algorithm HMAC_SHA2_512_256[_0] 1012s | appending ESP integrity algorithm HMAC_SHA2_256_128[_0] 1012s | proposal: 'aes' 1012s | token: '' '' "aes" '' 1012s | token: '' "aes" '' '' 1012s | token: '' '' '' 1012s | appending ESP encryption algorithm AES_CBC[_0] 1012s | appending ESP integrity algorithm HMAC_SHA2_512_256[_0] 1012s | appending ESP integrity algorithm HMAC_SHA2_256_128[_0] 1012s ipsec algparse: ignoring redundant ESP DH algorithm NONE as PFS policy is disabled 1012s | parsing 'aes;none,aes;modp2048' for ESP 1012s | proposal: 'aes;none' 1012s | token: '' '' "aes" ';' 1012s | token: '' "aes" ';' "none" '' 1012s | token: ';' "none" '' '' 1012s | appending ESP encryption algorithm AES_CBC[_0] 1012s | parsing dh: 1012s | appending ESP DH algorithm NONE[_0] 1012s | token: '' '' '' 1012s | appending ESP integrity algorithm HMAC_SHA2_512_256[_0] 1012s | appending ESP integrity algorithm HMAC_SHA2_256_128[_0] 1012s | proposal: 'aes;modp2048' 1012s | token: '' '' "aes" ';' 1012s | token: '' "aes" ';' "modp2048" '' 1012s | token: ';' "modp2048" '' '' 1012s | appending ESP encryption algorithm AES_CBC[_0] 1012s | parsing dh: 1012s | appending ESP DH algorithm MODP2048[_0] 1012s | token: '' '' '' 1012s | appending ESP integrity algorithm HMAC_SHA2_512_256[_0] 1012s | appending ESP integrity algorithm HMAC_SHA2_256_128[_0] 1012s ipsec algparse: ignoring redundant ESP DH algorithm NONE as PFS policy is disabled 1012s ipsec algparse: ignoring ESP DH algorithm MODP2048 as PFS policy is disabled 1012s | parsing 'aes-sha1-none' for ESP 1012s | proposal: 'aes-sha1-none' 1012s | token: '' '' "aes" '-' 1012s | token: '' "aes" '-' "sha1" '-' 1012s | token: '-' "sha1" '-' "none" '' 1012s | appending ESP encryption algorithm AES_CBC[_0] 1012s | parsing integ: 1012s | appending ESP integrity algorithm HMAC_SHA1_96[_0] 1012s | token: '-' "none" '' '' 1012s | parsing dh: 1012s | appending ESP DH algorithm NONE[_0] 1012s | token: '' '' '' 1012s ipsec algparse: ignoring redundant ESP DH algorithm NONE as PFS policy is disabled 1012s | parsing 'aes-sha1;none' for ESP 1012s | proposal: 'aes-sha1;none' 1012s | token: '' '' "aes" '-' 1012s | token: '' "aes" '-' "sha1" ';' 1012s | token: '-' "sha1" ';' "none" '' 1012s | appending ESP encryption algorithm AES_CBC[_0] 1012s | parsing integ: 1012s | appending ESP integrity algorithm HMAC_SHA1_96[_0] 1012s | token: ';' "none" '' '' 1012s | parsing dh: 1012s | appending ESP DH algorithm NONE[_0] 1012s | token: '' '' '' 1012s ipsec algparse: ignoring redundant ESP DH algorithm NONE as PFS policy is disabled 1012s | parsing '3des168-sha1' for ESP 1012s | proposal: '3des168-sha1' 1012s | token: '' '' "3des168" '-' 1012s | token: '' "3des168" '-' "sha1" '' 1012s | ike_alg_byname() failed: ESP encryption algorithm '3des168' is not recognized 1012s | parsing '3des-null' for ESP 1012s | proposal: '3des-null' 1012s | token: '' '' "3des" '-' 1012s | token: '' "3des" '-' "null" '' 1012s | token: '-' "null" '' '' 1012s | appending ESP encryption algorithm 3DES_CBC[_0] 1012s | parsing integ: 1012s | appending ESP integrity algorithm NONE[_0] 1012s | token: '' '' '' 1012s | parsing 'aes128-null' for ESP 1012s | proposal: 'aes128-null' 1012s | token: '' '' "aes128" '-' 1012s | token: '' "aes128" '-' "null" '' 1012s | ike_alg_byname() failed: ESP encryption algorithm 'aes128' is not recognized 1012s | token: '-' "null" '' '' 1012s | appending ESP encryption algorithm AES_CBC[_128] 1012s | parsing integ: 1012s | appending ESP integrity algorithm NONE[_0] 1012s | token: '' '' '' 1012s | parsing 'aes224-sha1' for ESP 1012s | proposal: 'aes224-sha1' 1012s | token: '' '' "aes224" '-' 1012s | token: '' "aes224" '-' "sha1" '' 1012s | ike_alg_byname() failed: ESP encryption algorithm 'aes224' is not recognized 1012s | parsing 'aes-224-sha1' for ESP 1012s | proposal: 'aes-224-sha1' 1012s | token: '' '' "aes" '-' 1012s | token: '' "aes" '-' "224" '-' 1012s | byname('aes') with ='224' failed: ESP encryption algorithm AES_CBC with key length 224 invalid; valid key lengths: 128, 192, 256 1012s | parsing 'aes0-sha1' for ESP 1012s | proposal: 'aes0-sha1' 1012s | token: '' '' "aes0" '-' 1012s | token: '' "aes0" '-' "sha1" '' 1012s | ike_alg_byname() failed: ESP encryption algorithm 'aes0' is not recognized 1012s | parsing 'aes-0-sha1' for ESP 1012s | proposal: 'aes-0-sha1' 1012s | token: '' '' "aes" '-' 1012s | token: '' "aes" '-' "0" '-' 1012s | parsing 'aes512-sha1' for ESP 1012s | proposal: 'aes512-sha1' 1012s | token: '' '' "aes512" '-' 1012s | token: '' "aes512" '-' "sha1" '' 1012s | ike_alg_byname() failed: ESP encryption algorithm 'aes512' is not recognized 1012s | parsing 'aes-sha1555' for ESP 1012s | proposal: 'aes-sha1555' 1012s | token: '' '' "aes" '-' 1012s | token: '' "aes" '-' "sha1555" '' 1012s | token: '-' "sha1555" '' '' 1012s | appending ESP encryption algorithm AES_CBC[_0] 1012s | parsing integ: 1012s | ike_alg_byname() failed: ESP integrity algorithm 'sha1555' is not recognized 1012s | lookup for integrity algorithm 'sha1555' failed 1012s | or - failed 'ESP integrity algorithm 'sha1555' is not recognized') 1012s | parsing 'camellia666-sha1' for ESP 1012s | proposal: 'camellia666-sha1' 1012s | token: '' '' "camellia666" '-' 1012s | token: '' "camellia666" '-' "sha1" '' 1012s | ike_alg_byname() failed: ESP encryption algorithm 'camellia666' is not recognized 1012s | parsing 'blowfish' for ESP 1012s | proposal: 'blowfish' 1012s | token: '' '' "blowfish" '' 1012s | token: '' "blowfish" '' '' 1012s | ike_alg_byname() failed: ESP encryption algorithm 'blowfish' is not supported 1012s | parsing 'des-sha1' for ESP 1012s | proposal: 'des-sha1' 1012s | token: '' '' "des" '-' 1012s | token: '' "des" '-' "sha1" '' 1012s | ike_alg_byname() failed: ESP encryption algorithm 'des' is not supported 1012s | parsing 'aes_ctr666' for ESP 1012s | proposal: 'aes_ctr666' 1012s | token: '' '' "aes_ctr666" '' 1012s | token: '' "aes_ctr666" '' '' 1012s | ike_alg_byname() failed: ESP encryption algorithm 'aes_ctr666' is not recognized 1012s | parsing 'aes128-sha2_128' for ESP 1012s | proposal: 'aes128-sha2_128' 1012s | token: '' '' "aes128" '-' 1012s | token: '' "aes128" '-' "sha2_128" '' 1012s | ike_alg_byname() failed: ESP encryption algorithm 'aes128' is not recognized 1012s | token: '-' "sha2_128" '' '' 1012s | appending ESP encryption algorithm AES_CBC[_128] 1012s | parsing integ: 1012s | ike_alg_byname() failed: ESP integrity algorithm 'sha2_128' is not recognized 1012s | lookup for integrity algorithm 'sha2_128' failed 1012s | or - failed 'ESP integrity algorithm 'sha2_128' is not recognized') 1012s | parsing 'aes256-sha2_256-4096' for ESP 1012s | proposal: 'aes256-sha2_256-4096' 1012s | token: '' '' "aes256" '-' 1012s | token: '' "aes256" '-' "sha2_256" '-' 1012s | ike_alg_byname() failed: ESP encryption algorithm 'aes256' is not recognized 1012s | token: '-' "sha2_256" '-' "4096" '' 1012s | appending ESP encryption algorithm AES_CBC[_256] 1012s | parsing integ: 1012s | appending ESP integrity algorithm HMAC_SHA2_256_128[_0] 1012s | token: '-' "4096" '' '' 1012s | parsing dh: 1012s | ike_alg_byname() failed: ESP DH algorithm '4096' is not recognized 1012s | lookup for DH algorithm '4096' failed 1012s | ... failed 'ESP DH algorithm '4096' is not recognized' 1012s | parsing 'aes256-sha2_256-128' for ESP 1012s | proposal: 'aes256-sha2_256-128' 1012s | token: '' '' "aes256" '-' 1012s | token: '' "aes256" '-' "sha2_256" '-' 1012s | ike_alg_byname() failed: ESP encryption algorithm 'aes256' is not recognized 1012s | token: '-' "sha2_256" '-' "128" '' 1012s | appending ESP encryption algorithm AES_CBC[_256] 1012s | parsing integ: 1012s | appending ESP integrity algorithm HMAC_SHA2_256_128[_0] 1012s | token: '-' "128" '' '' 1012s | parsing dh: 1012s | ike_alg_byname() failed: ESP DH algorithm '128' is not recognized 1012s | lookup for DH algorithm '128' failed 1012s | ... failed 'ESP DH algorithm '128' is not recognized' 1012s | parsing 'vanitycipher' for ESP 1012s | proposal: 'vanitycipher' 1012s | token: '' '' "vanitycipher" '' 1012s | token: '' "vanitycipher" '' '' 1012s | ike_alg_byname() failed: ESP encryption algorithm 'vanitycipher' is not recognized 1012s | parsing 'ase-sah' for ESP 1012s | proposal: 'ase-sah' 1012s | token: '' '' "ase" '-' 1012s | token: '' "ase" '-' "sah" '' 1012s | ike_alg_byname() failed: ESP encryption algorithm 'ase' is not recognized 1012s | parsing 'aes-sah1' for ESP 1012s | proposal: 'aes-sah1' 1012s | token: '' '' "aes" '-' 1012s | token: '' "aes" '-' "sah1" '' 1012s | token: '-' "sah1" '' '' 1012s | appending ESP encryption algorithm AES_CBC[_0] 1012s | parsing integ: 1012s | ike_alg_byname() failed: ESP integrity algorithm 'sah1' is not recognized 1012s | lookup for integrity algorithm 'sah1' failed 1012s | or - failed 'ESP integrity algorithm 'sah1' is not recognized') 1012s | parsing 'id3' for ESP 1012s | proposal: 'id3' 1012s | token: '' '' "id3" '' 1012s | token: '' "id3" '' '' 1012s | ike_alg_byname() failed: ESP encryption algorithm 'id3' is not recognized 1012s | ike_alg_byname() failed: ESP encryption algorithm 'id3' is not recognized 1012s | parsing 'aes-id3' for ESP 1012s | proposal: 'aes-id3' 1012s | token: '' '' "aes" '-' 1012s | token: '' "aes" '-' "id3" '' 1012s | token: '-' "id3" '' '' 1012s | appending ESP encryption algorithm AES_CBC[_0] 1012s | parsing integ: 1012s | ike_alg_byname() failed: ESP integrity algorithm 'id3' is not recognized 1012s | lookup for integrity algorithm 'id3' failed 1012s | or - failed 'ESP integrity algorithm 'id3' is not recognized') 1012s | parsing 'aes_gcm-md5' for ESP 1012s | proposal: 'aes_gcm-md5' 1012s | token: '' '' "aes_gcm" '-' 1012s | token: '' "aes_gcm" '-' "md5" '' 1012s | token: '-' "md5" '' '' 1012s | appending ESP encryption algorithm AES_GCM_16[_0] 1012s | parsing integ: 1012s | appending ESP integrity algorithm HMAC_MD5_96[_0] 1012s | token: '' '' '' 1012s | parsing 'mars' for ESP 1012s | proposal: 'mars' 1012s | token: '' '' "mars" '' 1012s | token: '' "mars" '' '' 1012s | ike_alg_byname() failed: ESP encryption algorithm 'mars' is not supported 1012s | parsing 'aes_gcm-16' for ESP 1012s | proposal: 'aes_gcm-16' 1012s | token: '' '' "aes_gcm" '-' 1012s | token: '' "aes_gcm" '-' "16" '' 1012s | byname('aes_gcm') with ='16' failed: ESP encryption algorithm AES_GCM_16 with key length 16 invalid; valid key lengths: 128, 192, 256 1012s | parsing 'aes_gcm-0' for ESP 1012s | proposal: 'aes_gcm-0' 1012s | token: '' '' "aes_gcm" '-' 1012s | token: '' "aes_gcm" '-' "0" '' 1012s | parsing 'aes_gcm-123456789012345' for ESP 1012s | proposal: 'aes_gcm-123456789012345' 1012s | token: '' '' "aes_gcm" '-' 1012s | token: '' "aes_gcm" '-' "123456789012345" '' 1012s | parsing '3des-sha1;dh22' for ESP 1012s | proposal: '3des-sha1;dh22' 1012s | token: '' '' "3des" '-' 1012s | token: '' "3des" '-' "sha1" ';' 1012s | token: '-' "sha1" ';' "dh22" '' 1012s | appending ESP encryption algorithm 3DES_CBC[_0] 1012s | parsing integ: 1012s | appending ESP integrity algorithm HMAC_SHA1_96[_0] 1012s | token: ';' "dh22" '' '' 1012s | parsing dh: 1012s | ike_alg_byname() failed: ESP DH algorithm 'dh22' is not supported 1012s | lookup for DH algorithm 'dh22' failed 1012s | ... failed 'ESP DH algorithm 'dh22' is not supported' 1012s | parsing '3des-sha1;modp8192,3des-sha2' for ESP 1012s | proposal: '3des-sha1;modp8192' 1012s | token: '' '' "3des" '-' 1012s | token: '' "3des" '-' "sha1" ';' 1012s | token: '-' "sha1" ';' "modp8192" '' 1012s | appending ESP encryption algorithm 3DES_CBC[_0] 1012s | parsing integ: 1012s | appending ESP integrity algorithm HMAC_SHA1_96[_0] 1012s | token: ';' "modp8192" '' '' 1012s | parsing dh: 1012s | appending ESP DH algorithm MODP8192[_0] 1012s | token: '' '' '' 1012s | proposal: '3des-sha2' 1012s | token: '' '' "3des" '-' 1012s | token: '' "3des" '-' "sha2" '' 1012s | token: '-' "sha2" '' '' 1012s | appending ESP encryption algorithm 3DES_CBC[_0] 1012s | parsing integ: 1012s | appending ESP integrity algorithm HMAC_SHA2_256_128[_0] 1012s | token: '' '' '' 1012s ipsec algparse: ignoring ESP DH algorithm MODP8192 as PFS policy is disabled 1012s | parsing '3des-sha1-modp8192,3des-sha2' for ESP 1012s | proposal: '3des-sha1-modp8192' 1012s | token: '' '' "3des" '-' 1012s | token: '' "3des" '-' "sha1" '-' 1012s | token: '-' "sha1" '-' "modp8192" '' 1012s | appending ESP encryption algorithm 3DES_CBC[_0] 1012s | parsing integ: 1012s | appending ESP integrity algorithm HMAC_SHA1_96[_0] 1012s | token: '-' "modp8192" '' '' 1012s | parsing dh: 1012s | appending ESP DH algorithm MODP8192[_0] 1012s | token: '' '' '' 1012s | proposal: '3des-sha2' 1012s | token: '' '' "3des" '-' 1012s | token: '' "3des" '-' "sha2" '' 1012s | token: '-' "sha2" '' '' 1012s | appending ESP encryption algorithm 3DES_CBC[_0] 1012s | parsing integ: 1012s | appending ESP integrity algorithm HMAC_SHA2_256_128[_0] 1012s | token: '' '' '' 1012s ipsec algparse: ignoring ESP DH algorithm MODP8192 as PFS policy is disabled 1012s | parsing '3des-sha1-modp8192,3des-sha2-modp8192' for ESP 1012s | proposal: '3des-sha1-modp8192' 1012s | token: '' '' "3des" '-' 1012s | token: '' "3des" '-' "sha1" '-' 1012s | token: '-' "sha1" '-' "modp8192" '' 1012s | appending ESP encryption algorithm 3DES_CBC[_0] 1012s | parsing integ: 1012s | appending ESP integrity algorithm HMAC_SHA1_96[_0] 1012s | token: '-' "modp8192" '' '' 1012s | parsing dh: 1012s | appending ESP DH algorithm MODP8192[_0] 1012s | token: '' '' '' 1012s | proposal: '3des-sha2-modp8192' 1012s | token: '' '' "3des" '-' 1012s | token: '' "3des" '-' "sha2" '-' 1012s | token: '-' "sha2" '-' "modp8192" '' 1012s | appending ESP encryption algorithm 3DES_CBC[_0] 1012s | parsing integ: 1012s | appending ESP integrity algorithm HMAC_SHA2_256_128[_0] 1012s | token: '-' "modp8192" '' '' 1012s | parsing dh: 1012s | appending ESP DH algorithm MODP8192[_0] 1012s | token: '' '' '' 1012s ipsec algparse: ignoring ESP DH algorithm MODP8192 as PFS policy is disabled 1012s ipsec algparse: ignoring ESP DH algorithm MODP8192 as PFS policy is disabled 1012s | parsing '3des-sha1-modp8192,3des-sha2;modp8192' for ESP 1012s | proposal: '3des-sha1-modp8192' 1012s | token: '' '' "3des" '-' 1012s | token: '' "3des" '-' "sha1" '-' 1012s | token: '-' "sha1" '-' "modp8192" '' 1012s | appending ESP encryption algorithm 3DES_CBC[_0] 1012s | parsing integ: 1012s | appending ESP integrity algorithm HMAC_SHA1_96[_0] 1012s | token: '-' "modp8192" '' '' 1012s | parsing dh: 1012s | appending ESP DH algorithm MODP8192[_0] 1012s | token: '' '' '' 1012s | proposal: '3des-sha2;modp8192' 1012s | token: '' '' "3des" '-' 1012s | token: '' "3des" '-' "sha2" ';' 1012s | token: '-' "sha2" ';' "modp8192" '' 1012s | appending ESP encryption algorithm 3DES_CBC[_0] 1012s | parsing integ: 1012s | appending ESP integrity algorithm HMAC_SHA2_256_128[_0] 1012s | token: ';' "modp8192" '' '' 1012s | parsing dh: 1012s | appending ESP DH algorithm MODP8192[_0] 1012s | token: '' '' '' 1012s ipsec algparse: ignoring ESP DH algorithm MODP8192 as PFS policy is disabled 1012s ipsec algparse: ignoring ESP DH algorithm MODP8192 as PFS policy is disabled 1012s | parsing '3des-sha1;modp8192,3des-sha2-modp8192' for ESP 1012s | proposal: '3des-sha1;modp8192' 1012s | token: '' '' "3des" '-' 1012s | token: '' "3des" '-' "sha1" ';' 1012s | token: '-' "sha1" ';' "modp8192" '' 1012s | appending ESP encryption algorithm 3DES_CBC[_0] 1012s | parsing integ: 1012s | appending ESP integrity algorithm HMAC_SHA1_96[_0] 1012s | token: ';' "modp8192" '' '' 1012s | parsing dh: 1012s | appending ESP DH algorithm MODP8192[_0] 1012s | token: '' '' '' 1012s | proposal: '3des-sha2-modp8192' 1012s | token: '' '' "3des" '-' 1012s | token: '' "3des" '-' "sha2" '-' 1012s | token: '-' "sha2" '-' "modp8192" '' 1012s | appending ESP encryption algorithm 3DES_CBC[_0] 1012s | parsing integ: 1012s | appending ESP integrity algorithm HMAC_SHA2_256_128[_0] 1012s | token: '-' "modp8192" '' '' 1012s | parsing dh: 1012s | appending ESP DH algorithm MODP8192[_0] 1012s | token: '' '' '' 1012s ipsec algparse: ignoring ESP DH algorithm MODP8192 as PFS policy is disabled 1012s ipsec algparse: ignoring ESP DH algorithm MODP8192 as PFS policy is disabled 1012s | parsing '3des-sha1;modp8192,3des-sha2;modp8192' for ESP 1012s | proposal: '3des-sha1;modp8192' 1012s | token: '' '' "3des" '-' 1012s | token: '' "3des" '-' "sha1" ';' 1012s | token: '-' "sha1" ';' "modp8192" '' 1012s | appending ESP encryption algorithm 3DES_CBC[_0] 1012s | parsing integ: 1012s | appending ESP integrity algorithm HMAC_SHA1_96[_0] 1012s | token: ';' "modp8192" '' '' 1012s | parsing dh: 1012s | appending ESP DH algorithm MODP8192[_0] 1012s | token: '' '' '' 1012s | proposal: '3des-sha2;modp8192' 1012s | token: '' '' "3des" '-' 1012s | token: '' "3des" '-' "sha2" ';' 1012s | token: '-' "sha2" ';' "modp8192" '' 1012s | appending ESP encryption algorithm 3DES_CBC[_0] 1012s | parsing integ: 1012s | appending ESP integrity algorithm HMAC_SHA2_256_128[_0] 1012s | token: ';' "modp8192" '' '' 1012s | parsing dh: 1012s | appending ESP DH algorithm MODP8192[_0] 1012s | token: '' '' '' 1012s ipsec algparse: ignoring ESP DH algorithm MODP8192 as PFS policy is disabled 1012s ipsec algparse: ignoring ESP DH algorithm MODP8192 as PFS policy is disabled 1012s | parsing '3des-sha1-modp8192,3des-sha2-modp2048' for ESP 1012s | proposal: '3des-sha1-modp8192' 1012s | token: '' '' "3des" '-' 1012s | token: '' "3des" '-' "sha1" '-' 1012s | token: '-' "sha1" '-' "modp8192" '' 1012s | appending ESP encryption algorithm 3DES_CBC[_0] 1012s | parsing integ: 1012s | appending ESP integrity algorithm HMAC_SHA1_96[_0] 1012s | token: '-' "modp8192" '' '' 1012s | parsing dh: 1012s | appending ESP DH algorithm MODP8192[_0] 1012s | token: '' '' '' 1012s | proposal: '3des-sha2-modp2048' 1012s | token: '' '' "3des" '-' 1012s | token: '' "3des" '-' "sha2" '-' 1012s | token: '-' "sha2" '-' "modp2048" '' 1012s | appending ESP encryption algorithm 3DES_CBC[_0] 1012s | parsing integ: 1012s | appending ESP integrity algorithm HMAC_SHA2_256_128[_0] 1012s | token: '-' "modp2048" '' '' 1012s | parsing dh: 1012s | appending ESP DH algorithm MODP2048[_0] 1012s | token: '' '' '' 1012s ipsec algparse: ignoring ESP DH algorithm MODP8192 as PFS policy is disabled 1012s ipsec algparse: ignoring ESP DH algorithm MODP2048 as PFS policy is disabled 1012s | parsing 'SHA2_512_256,SHA2_256_128' for AH 1012s | proposal: 'SHA2_512_256' 1012s | token: '' '' "SHA2_512_256" '' 1012s | token: '' "SHA2_512_256" '' '' 1012s | parsing integ: 1012s | appending AH integrity algorithm HMAC_SHA2_512_256[_0] 1012s | token: '' '' '' 1012s | proposal: 'SHA2_256_128' 1012s | token: '' '' "SHA2_256_128" '' 1012s | token: '' "SHA2_256_128" '' '' 1012s | parsing integ: 1012s | appending AH integrity algorithm HMAC_SHA2_256_128[_0] 1012s | token: '' '' '' 1012s | parsing '' for AH 1012s | parsing 'md5' for AH 1012s | proposal: 'md5' 1012s | token: '' '' "md5" '' 1012s | token: '' "md5" '' '' 1012s | parsing integ: 1012s | appending AH integrity algorithm HMAC_MD5_96[_0] 1012s | token: '' '' '' 1012s | parsing 'sha' for AH 1012s | proposal: 'sha' 1012s | token: '' '' "sha" '' 1012s | token: '' "sha" '' '' 1012s | parsing integ: 1012s | appending AH integrity algorithm HMAC_SHA1_96[_0] 1012s | token: '' '' '' 1012s | parsing 'sha;modp2048' for AH 1012s | proposal: 'sha;modp2048' 1012s | token: '' '' "sha" ';' 1012s | token: '' "sha" ';' "modp2048" '' 1012s | parsing integ: 1012s | appending AH integrity algorithm HMAC_SHA1_96[_0] 1012s | token: ';' "modp2048" '' '' 1012s | parsing dh: 1012s | appending AH DH algorithm MODP2048[_0] 1012s | token: '' '' '' 1012s ipsec algparse: ignoring AH DH algorithm MODP2048 as PFS policy is disabled 1012s | parsing 'sha1' for AH 1012s | proposal: 'sha1' 1012s | token: '' '' "sha1" '' 1012s | token: '' "sha1" '' '' 1012s | parsing integ: 1012s | appending AH integrity algorithm HMAC_SHA1_96[_0] 1012s | token: '' '' '' 1012s | parsing 'sha2' for AH 1012s | proposal: 'sha2' 1012s | token: '' '' "sha2" '' 1012s | token: '' "sha2" '' '' 1012s | parsing integ: 1012s | appending AH integrity algorithm HMAC_SHA2_256_128[_0] 1012s | token: '' '' '' 1012s | parsing 'sha256' for AH 1012s | proposal: 'sha256' 1012s | token: '' '' "sha256" '' 1012s | token: '' "sha256" '' '' 1012s | parsing integ: 1012s | appending AH integrity algorithm HMAC_SHA2_256_128[_0] 1012s | token: '' '' '' 1012s | parsing 'sha384' for AH 1012s | proposal: 'sha384' 1012s | token: '' '' "sha384" '' 1012s | token: '' "sha384" '' '' 1012s | parsing integ: 1012s | appending AH integrity algorithm HMAC_SHA2_384_192[_0] 1012s | token: '' '' '' 1012s | parsing 'sha512' for AH 1012s | proposal: 'sha512' 1012s | token: '' '' "sha512" '' 1012s | token: '' "sha512" '' '' 1012s | parsing integ: 1012s | appending AH integrity algorithm HMAC_SHA2_512_256[_0] 1012s | token: '' '' '' 1012s | parsing 'sha2_256' for AH 1012s | proposal: 'sha2_256' 1012s | token: '' '' "sha2_256" '' 1012s | token: '' "sha2_256" '' '' 1012s | parsing integ: 1012s | appending AH integrity algorithm HMAC_SHA2_256_128[_0] 1012s | token: '' '' '' 1012s | parsing 'sha2_384' for AH 1012s | proposal: 'sha2_384' 1012s | token: '' '' "sha2_384" '' 1012s | token: '' "sha2_384" '' '' 1012s | parsing integ: 1012s | appending AH integrity algorithm HMAC_SHA2_384_192[_0] 1012s | token: '' '' '' 1012s | parsing 'sha2_512' for AH 1012s | proposal: 'sha2_512' 1012s | token: '' '' "sha2_512" '' 1012s | token: '' "sha2_512" '' '' 1012s | parsing integ: 1012s | appending AH integrity algorithm HMAC_SHA2_512_256[_0] 1012s | token: '' '' '' 1012s | parsing 'aes_xcbc' for AH 1012s | proposal: 'aes_xcbc' 1012s | token: '' '' "aes_xcbc" '' 1012s | token: '' "aes_xcbc" '' '' 1012s | parsing integ: 1012s | appending AH integrity algorithm AES_XCBC_96[_0] 1012s | token: '' '' '' 1012s | parsing 'sha2-none' for AH 1012s | proposal: 'sha2-none' 1012s | token: '' '' "sha2" '-' 1012s | token: '' "sha2" '-' "none" '' 1012s | parsing integ: 1012s | appending AH integrity algorithm HMAC_SHA2_256_128[_0] 1012s | token: '-' "none" '' '' 1012s | parsing dh: 1012s | appending AH DH algorithm NONE[_0] 1012s | token: '' '' '' 1012s ipsec algparse: ignoring redundant AH DH algorithm NONE as PFS policy is disabled 1012s | parsing 'sha2;none' for AH 1012s | proposal: 'sha2;none' 1012s | token: '' '' "sha2" ';' 1012s | token: '' "sha2" ';' "none" '' 1012s | parsing integ: 1012s | appending AH integrity algorithm HMAC_SHA2_256_128[_0] 1012s | token: ';' "none" '' '' 1012s | parsing dh: 1012s | appending AH DH algorithm NONE[_0] 1012s | token: '' '' '' 1012s ipsec algparse: ignoring redundant AH DH algorithm NONE as PFS policy is disabled 1012s | parsing 'sha1-modp8192,sha1-modp8192,sha1-modp8192' for AH 1012s | proposal: 'sha1-modp8192' 1012s | token: '' '' "sha1" '-' 1012s | token: '' "sha1" '-' "modp8192" '' 1012s | parsing integ: 1012s | appending AH integrity algorithm HMAC_SHA1_96[_0] 1012s | token: '-' "modp8192" '' '' 1012s | parsing dh: 1012s | appending AH DH algorithm MODP8192[_0] 1012s | token: '' '' '' 1012s | proposal: 'sha1-modp8192' 1012s | token: '' '' "sha1" '-' 1012s | token: '' "sha1" '-' "modp8192" '' 1012s | parsing integ: 1012s | appending AH integrity algorithm HMAC_SHA1_96[_0] 1012s | token: '-' "modp8192" '' '' 1012s | parsing dh: 1012s | appending AH DH algorithm MODP8192[_0] 1012s | token: '' '' '' 1012s | proposal: 'sha1-modp8192' 1012s | token: '' '' "sha1" '-' 1012s | token: '' "sha1" '-' "modp8192" '' 1012s | parsing integ: 1012s | appending AH integrity algorithm HMAC_SHA1_96[_0] 1012s | token: '-' "modp8192" '' '' 1012s | parsing dh: 1012s | appending AH DH algorithm MODP8192[_0] 1012s | token: '' '' '' 1012s ipsec algparse: ignoring AH DH algorithm MODP8192 as PFS policy is disabled 1012s | parsing 'aes-sha1' for AH 1012s | proposal: 'aes-sha1' 1012s | token: '' '' "aes" '-' 1012s | token: '' "aes" '-' "sha1" '' 1012s | parsing integ: 1012s | ike_alg_byname() failed: AH integrity algorithm 'aes' is not recognized 1012s | lookup for integrity algorithm 'aes' failed 1012s | or - failed 'AH integrity algorithm 'aes' is not recognized') 1012s | parsing 'vanityhash1' for AH 1012s | proposal: 'vanityhash1' 1012s | token: '' '' "vanityhash1" '' 1012s | token: '' "vanityhash1" '' '' 1012s | parsing integ: 1012s | ike_alg_byname() failed: AH integrity algorithm 'vanityhash1' is not recognized 1012s | lookup for integrity algorithm 'vanityhash1' failed 1012s | or - failed 'AH integrity algorithm 'vanityhash1' is not recognized') 1012s | parsing 'aes_gcm_c-256' for AH 1012s | proposal: 'aes_gcm_c-256' 1012s | token: '' '' "aes_gcm_c" '-' 1012s | token: '' "aes_gcm_c" '-' "256" '' 1012s | parsing integ: 1012s | ike_alg_byname() failed: AH integrity algorithm 'aes_gcm_c' is not recognized 1012s | lookup for integrity algorithm 'aes_gcm_c' failed 1012s | or - failed 'AH integrity algorithm 'aes_gcm_c' is not recognized') 1012s | parsing 'id3' for AH 1012s | proposal: 'id3' 1012s | token: '' '' "id3" '' 1012s | token: '' "id3" '' '' 1012s | parsing integ: 1012s | ike_alg_byname() failed: AH integrity algorithm 'id3' is not recognized 1012s | lookup for integrity algorithm 'id3' failed 1012s | or - failed 'AH integrity algorithm 'id3' is not recognized') 1012s | parsing '3des' for AH 1012s | proposal: '3des' 1012s | token: '' '' "3des" '' 1012s | token: '' "3des" '' '' 1012s | parsing integ: 1012s | ike_alg_byname() failed: AH integrity algorithm '3des' is not recognized 1012s | lookup for integrity algorithm '3des' failed 1012s | or - failed 'AH integrity algorithm '3des' is not recognized') 1012s | parsing 'null' for AH 1012s | proposal: 'null' 1012s | token: '' '' "null" '' 1012s | token: '' "null" '' '' 1012s | parsing integ: 1012s | appending AH integrity algorithm NONE[_0] 1012s | token: '' '' '' 1012s | parsing 'aes_gcm' for AH 1012s | proposal: 'aes_gcm' 1012s | token: '' '' "aes_gcm" '' 1012s | token: '' "aes_gcm" '' '' 1012s | parsing integ: 1012s | ike_alg_byname() failed: AH integrity algorithm 'aes_gcm' is not recognized 1012s | lookup for integrity algorithm 'aes_gcm' failed 1012s | or - failed 'AH integrity algorithm 'aes_gcm' is not recognized') 1012s | parsing 'aes_ccm' for AH 1012s | proposal: 'aes_ccm' 1012s | token: '' '' "aes_ccm" '' 1012s | token: '' "aes_ccm" '' '' 1012s | parsing integ: 1012s | ike_alg_byname() failed: AH integrity algorithm 'aes_ccm' is not recognized 1012s | lookup for integrity algorithm 'aes_ccm' failed 1012s | or - failed 'AH integrity algorithm 'aes_ccm' is not recognized') 1012s | parsing 'ripemd' for AH 1012s | proposal: 'ripemd' 1012s | token: '' '' "ripemd" '' 1012s | token: '' "ripemd" '' '' 1012s | parsing integ: 1012s | ike_alg_byname() failed: AH integrity algorithm 'ripemd' is not recognized 1012s | lookup for integrity algorithm 'ripemd' failed 1012s | or - failed 'AH integrity algorithm 'ripemd' is not recognized') 1012s | parsing 'AES_GCM_16_256,AES_GCM_16_128,CHACHA20_POLY1305,AES_CBC_256,AES_CBC_128' for IKE 1012s | proposal: 'AES_GCM_16_256' 1012s | token: '' '' "AES_GCM_16_256" '' 1012s | token: '' "AES_GCM_16_256" '' '' 1012s | ike_alg_byname() failed: IKE encryption algorithm 'AES_GCM_16_256' is not recognized 1012s | token: '' '' '' 1012s | appending IKE encryption algorithm AES_GCM_16[_256] 1012s | appending IKE PRF algorithm HMAC_SHA2_512[_0] 1012s | appending IKE PRF algorithm HMAC_SHA2_256[_0] 1012s | appending IKE integrity algorithm NONE[_0] 1012s | appending IKE DH algorithm DH19[_0] 1012s | appending IKE DH algorithm DH20[_0] 1012s | appending IKE DH algorithm DH21[_0] 1012s | appending IKE DH algorithm DH31[_0] 1012s | appending IKE DH algorithm MODP4096[_0] 1012s | appending IKE DH algorithm MODP3072[_0] 1012s | appending IKE DH algorithm MODP2048[_0] 1012s | appending IKE DH algorithm MODP8192[_0] 1012s | proposal: 'AES_GCM_16_128' 1012s | token: '' '' "AES_GCM_16_128" '' 1012s | token: '' "AES_GCM_16_128" '' '' 1012s | ike_alg_byname() failed: IKE encryption algorithm 'AES_GCM_16_128' is not recognized 1012s | token: '' '' '' 1012s | appending IKE encryption algorithm AES_GCM_16[_128] 1012s | appending IKE PRF algorithm HMAC_SHA2_512[_0] 1012s | appending IKE PRF algorithm HMAC_SHA2_256[_0] 1012s | appending IKE integrity algorithm NONE[_0] 1012s | appending IKE DH algorithm DH19[_0] 1012s | appending IKE DH algorithm DH20[_0] 1012s | appending IKE DH algorithm DH21[_0] 1012s | appending IKE DH algorithm DH31[_0] 1012s | appending IKE DH algorithm MODP4096[_0] 1012s | appending IKE DH algorithm MODP3072[_0] 1012s | appending IKE DH algorithm MODP2048[_0] 1012s | appending IKE DH algorithm MODP8192[_0] 1012s | proposal: 'CHACHA20_POLY1305' 1012s | token: '' '' "CHACHA20_POLY1305" '' 1012s | token: '' "CHACHA20_POLY1305" '' '' 1012s | token: '' '' '' 1012s | appending IKE encryption algorithm CHACHA20_POLY1305[_0] 1012s | appending IKE PRF algorithm HMAC_SHA2_512[_0] 1012s | appending IKE PRF algorithm HMAC_SHA2_256[_0] 1012s | appending IKE integrity algorithm NONE[_0] 1012s | appending IKE DH algorithm DH19[_0] 1012s | appending IKE DH algorithm DH20[_0] 1012s | appending IKE DH algorithm DH21[_0] 1012s | appending IKE DH algorithm DH31[_0] 1012s | appending IKE DH algorithm MODP4096[_0] 1012s | appending IKE DH algorithm MODP3072[_0] 1012s | appending IKE DH algorithm MODP2048[_0] 1012s | appending IKE DH algorithm MODP8192[_0] 1012s | proposal: 'AES_CBC_256' 1012s | token: '' '' "AES_CBC_256" '' 1012s | token: '' "AES_CBC_256" '' '' 1012s | ike_alg_byname() failed: IKE encryption algorithm 'AES_CBC_256' is not recognized 1012s | token: '' '' '' 1012s | appending IKE encryption algorithm AES_CBC[_256] 1012s | appending IKE PRF algorithm HMAC_SHA2_512[_0] 1012s | appending IKE PRF algorithm HMAC_SHA2_256[_0] 1012s | appending IKE integrity algorithm HMAC_SHA2_512_256[_0] 1012s | appending IKE integrity algorithm HMAC_SHA2_256_128[_0] 1012s | appending IKE DH algorithm DH19[_0] 1012s | appending IKE DH algorithm DH20[_0] 1012s | appending IKE DH algorithm DH21[_0] 1012s | appending IKE DH algorithm DH31[_0] 1012s | appending IKE DH algorithm MODP4096[_0] 1012s | appending IKE DH algorithm MODP3072[_0] 1012s | appending IKE DH algorithm MODP2048[_0] 1012s | appending IKE DH algorithm MODP8192[_0] 1012s | proposal: 'AES_CBC_128' 1012s | token: '' '' "AES_CBC_128" '' 1012s | token: '' "AES_CBC_128" '' '' 1012s | ike_alg_byname() failed: IKE encryption algorithm 'AES_CBC_128' is not recognized 1012s | token: '' '' '' 1012s | appending IKE encryption algorithm AES_CBC[_128] 1012s | appending IKE PRF algorithm HMAC_SHA2_512[_0] 1012s | appending IKE PRF algorithm HMAC_SHA2_256[_0] 1012s | appending IKE integrity algorithm HMAC_SHA2_512_256[_0] 1012s | appending IKE integrity algorithm HMAC_SHA2_256_128[_0] 1012s | appending IKE DH algorithm DH19[_0] 1012s | appending IKE DH algorithm DH20[_0] 1012s | appending IKE DH algorithm DH21[_0] 1012s | appending IKE DH algorithm DH31[_0] 1012s | appending IKE DH algorithm MODP4096[_0] 1012s | appending IKE DH algorithm MODP3072[_0] 1012s | appending IKE DH algorithm MODP2048[_0] 1012s | appending IKE DH algorithm MODP8192[_0] 1012s | parsing '' for IKE 1012s | parsing '3des-sha1' for IKE 1012s | proposal: '3des-sha1' 1012s | token: '' '' "3des" '-' 1012s | token: '' "3des" '-' "sha1" '' 1012s | token: '-' "sha1" '' '' 1012s | appending IKE encryption algorithm 3DES_CBC[_0] 1012s | parsing prf: 1012s | appending IKE PRF algorithm HMAC_SHA1[_0] 1012s | token: '' '' '' 1012s | - succeeded, advancing tokens 1012s | appending IKE integrity algorithm HMAC_SHA1_96[_0] 1012s | appending IKE DH algorithm DH19[_0] 1012s | appending IKE DH algorithm DH20[_0] 1012s | appending IKE DH algorithm DH21[_0] 1012s | appending IKE DH algorithm DH31[_0] 1012s | appending IKE DH algorithm MODP4096[_0] 1012s | appending IKE DH algorithm MODP3072[_0] 1012s | appending IKE DH algorithm MODP2048[_0] 1012s | appending IKE DH algorithm MODP8192[_0] 1012s | parsing '3des-sha1' for IKE 1012s | proposal: '3des-sha1' 1012s | token: '' '' "3des" '-' 1012s | token: '' "3des" '-' "sha1" '' 1012s | token: '-' "sha1" '' '' 1012s | appending IKE encryption algorithm 3DES_CBC[_0] 1012s | parsing prf: 1012s | appending IKE PRF algorithm HMAC_SHA1[_0] 1012s | token: '' '' '' 1012s | - succeeded, advancing tokens 1012s | appending IKE integrity algorithm HMAC_SHA1_96[_0] 1012s | appending IKE DH algorithm DH19[_0] 1012s | appending IKE DH algorithm DH20[_0] 1012s | appending IKE DH algorithm DH21[_0] 1012s | appending IKE DH algorithm DH31[_0] 1012s | appending IKE DH algorithm MODP4096[_0] 1012s | appending IKE DH algorithm MODP3072[_0] 1012s | appending IKE DH algorithm MODP2048[_0] 1012s | appending IKE DH algorithm MODP8192[_0] 1012s | parsing '3des-sha1;modp1536' for IKE 1012s | proposal: '3des-sha1;modp1536' 1012s | token: '' '' "3des" '-' 1012s | token: '' "3des" '-' "sha1" ';' 1012s | token: '-' "sha1" ';' "modp1536" '' 1012s | appending IKE encryption algorithm 3DES_CBC[_0] 1012s | parsing prf: 1012s | appending IKE PRF algorithm HMAC_SHA1[_0] 1012s | token: ';' "modp1536" '' '' 1012s | - succeeded, advancing tokens 1012s | parsing dh: 1012s | appending IKE DH algorithm MODP1536[_0] 1012s | token: '' '' '' 1012s | appending IKE integrity algorithm HMAC_SHA1_96[_0] 1012s | parsing '3des;dh21' for IKE 1012s | proposal: '3des;dh21' 1012s | token: '' '' "3des" ';' 1012s | token: '' "3des" ';' "dh21" '' 1012s | token: ';' "dh21" '' '' 1012s | appending IKE encryption algorithm 3DES_CBC[_0] 1012s | parsing dh: 1012s | appending IKE DH algorithm DH21[_0] 1012s | token: '' '' '' 1012s | appending IKE PRF algorithm HMAC_SHA2_512[_0] 1012s | appending IKE PRF algorithm HMAC_SHA2_256[_0] 1012s | appending IKE integrity algorithm HMAC_SHA2_512_256[_0] 1012s | appending IKE integrity algorithm HMAC_SHA2_256_128[_0] 1012s | parsing '3des-sha1;dh21' for IKE 1012s | proposal: '3des-sha1;dh21' 1012s | token: '' '' "3des" '-' 1012s | token: '' "3des" '-' "sha1" ';' 1012s | token: '-' "sha1" ';' "dh21" '' 1012s | appending IKE encryption algorithm 3DES_CBC[_0] 1012s | parsing prf: 1012s | appending IKE PRF algorithm HMAC_SHA1[_0] 1012s | token: ';' "dh21" '' '' 1012s | - succeeded, advancing tokens 1012s | parsing dh: 1012s | appending IKE DH algorithm DH21[_0] 1012s | token: '' '' '' 1012s | appending IKE integrity algorithm HMAC_SHA1_96[_0] 1012s | parsing '3des-sha1-ecp_521' for IKE 1012s | proposal: '3des-sha1-ecp_521' 1012s | token: '' '' "3des" '-' 1012s | token: '' "3des" '-' "sha1" '-' 1012s | token: '-' "sha1" '-' "ecp_521" '' 1012s | appending IKE encryption algorithm 3DES_CBC[_0] 1012s | parsing prf: 1012s | appending IKE PRF algorithm HMAC_SHA1[_0] 1012s | token: '-' "ecp_521" '' '' 1012s | - succeeded, advancing tokens 1012s | parsing dh: 1012s | appending IKE DH algorithm DH21[_0] 1012s | token: '' '' '' 1012s | appending IKE integrity algorithm HMAC_SHA1_96[_0] 1012s | parsing '3des+aes' for IKE 1012s | proposal: '3des+aes' 1012s | token: '' '' "3des" '+' 1012s | token: '' "3des" '+' "aes" '' 1012s | token: '+' "aes" '' '' 1012s | appending IKE encryption algorithm 3DES_CBC[_0] 1012s | token: '' '' '' 1012s | appending IKE encryption algorithm AES_CBC[_0] 1012s | appending IKE PRF algorithm HMAC_SHA2_512[_0] 1012s | appending IKE PRF algorithm HMAC_SHA2_256[_0] 1012s | appending IKE integrity algorithm HMAC_SHA2_512_256[_0] 1012s | appending IKE integrity algorithm HMAC_SHA2_256_128[_0] 1012s | appending IKE DH algorithm DH19[_0] 1012s | appending IKE DH algorithm DH20[_0] 1012s | appending IKE DH algorithm DH21[_0] 1012s | appending IKE DH algorithm DH31[_0] 1012s | appending IKE DH algorithm MODP4096[_0] 1012s | appending IKE DH algorithm MODP3072[_0] 1012s | appending IKE DH algorithm MODP2048[_0] 1012s | appending IKE DH algorithm MODP8192[_0] 1012s | parsing 'aes;none' for IKE 1012s | proposal: 'aes;none' 1012s | token: '' '' "aes" ';' 1012s | token: '' "aes" ';' "none" '' 1012s | token: ';' "none" '' '' 1012s | appending IKE encryption algorithm AES_CBC[_0] 1012s | parsing dh: 1012s | appending IKE DH algorithm NONE[_0] 1012s | token: '' '' '' 1012s | appending IKE PRF algorithm HMAC_SHA2_512[_0] 1012s | appending IKE PRF algorithm HMAC_SHA2_256[_0] 1012s | appending IKE integrity algorithm HMAC_SHA2_512_256[_0] 1012s | appending IKE integrity algorithm HMAC_SHA2_256_128[_0] 1012s | parsing 'id2' for IKE 1012s | proposal: 'id2' 1012s | token: '' '' "id2" '' 1012s | token: '' "id2" '' '' 1012s | ike_alg_byname() failed: IKE encryption algorithm 'id2' is not recognized 1012s | ike_alg_byname() failed: IKE encryption algorithm 'id2' is not recognized 1012s | parsing '3des-id2' for IKE 1012s | proposal: '3des-id2' 1012s | token: '' '' "3des" '-' 1012s | token: '' "3des" '-' "id2" '' 1012s | token: '-' "id2" '' '' 1012s | appending IKE encryption algorithm 3DES_CBC[_0] 1012s | parsing prf: 1012s | ike_alg_byname() failed: IKE PRF algorithm 'id2' is not recognized 1012s | lookup for PRF algorithm 'id2' failed 1012s | - failed, saving error 'IKE PRF algorithm 'id2' is not recognized' and tossing result 1012s | parsing integ: 1012s | ike_alg_byname() failed: IKE integrity algorithm 'id2' is not recognized 1012s | lookup for integrity algorithm 'id2' failed 1012s | - and - failed, returning earlier PRF error 'IKE PRF algorithm 'id2' is not recognized' and discarding INTEG error 'IKE integrity algorithm 'id2' is not recognized') 1012s | parsing 'aes_ccm' for IKE 1012s | proposal: 'aes_ccm' 1012s | token: '' '' "aes_ccm" '' 1012s | token: '' "aes_ccm" '' '' 1012s | alg_byname_ok() failed: IKE encryption algorithm 'aes_ccm' is not supported 1012s | parsing 'aes-sha1-sha2-ecp_521' for IKE 1012s | proposal: 'aes-sha1-sha2-ecp_521' 1012s | token: '' '' "aes" '-' 1012s | token: '' "aes" '-' "sha1" '-' 1012s | token: '-' "sha1" '-' "sha2" '-' 1012s | appending IKE encryption algorithm AES_CBC[_0] 1012s | parsing prf: 1012s | appending IKE PRF algorithm HMAC_SHA1[_0] 1012s | token: '-' "sha2" '-' "ecp_521" '' 1012s | - succeeded, advancing tokens 1012s | parsing dh: 1012s | ike_alg_byname() failed: IKE DH algorithm 'sha2' is not recognized 1012s | lookup for DH algorithm 'sha2' failed 1012s | ... failed 'IKE DH algorithm 'sha2' is not recognized' 1012s | parsing 'aes-sha2-sha2;ecp_521' for IKE 1012s | proposal: 'aes-sha2-sha2;ecp_521' 1012s | token: '' '' "aes" '-' 1012s | token: '' "aes" '-' "sha2" '-' 1012s | token: '-' "sha2" '-' "sha2" ';' 1012s | appending IKE encryption algorithm AES_CBC[_0] 1012s | parsing prf: 1012s | appending IKE PRF algorithm HMAC_SHA2_256[_0] 1012s | token: '-' "sha2" ';' "ecp_521" '' 1012s | - succeeded, advancing tokens 1012s | parsing dh: 1012s | ike_alg_byname() failed: IKE DH algorithm 'sha2' is not recognized 1012s | lookup for DH algorithm 'sha2' failed 1012s | ... failed 'IKE DH algorithm 'sha2' is not recognized' 1012s | parsing 'aes-sha1_96-sha2-ecp_521' for IKE 1012s | proposal: 'aes-sha1_96-sha2-ecp_521' 1012s | token: '' '' "aes" '-' 1012s | token: '' "aes" '-' "sha1_96" '-' 1012s | token: '-' "sha1_96" '-' "sha2" '-' 1012s | appending IKE encryption algorithm AES_CBC[_0] 1012s | parsing prf: 1012s | ike_alg_byname() failed: IKE PRF algorithm 'sha1_96' is not recognized 1012s | lookup for PRF algorithm 'sha1_96' failed 1012s | - failed, saving error 'IKE PRF algorithm 'sha1_96' is not recognized' and tossing result 1012s | parsing integ: 1012s | appending IKE integrity algorithm HMAC_SHA1_96[_0] 1012s | token: '-' "sha2" '-' "ecp_521" '' 1012s | parsing prf: 1012s | appending IKE PRF algorithm HMAC_SHA2_256[_0] 1012s | token: '-' "ecp_521" '' '' 1012s | parsing dh: 1012s | appending IKE DH algorithm DH21[_0] 1012s | token: '' '' '' 1012s | parsing 'aes-sha1_96-sha2;ecp_521' for IKE 1012s | proposal: 'aes-sha1_96-sha2;ecp_521' 1012s | token: '' '' "aes" '-' 1012s | token: '' "aes" '-' "sha1_96" '-' 1012s | token: '-' "sha1_96" '-' "sha2" ';' 1012s | appending IKE encryption algorithm AES_CBC[_0] 1012s | parsing prf: 1012s | ike_alg_byname() failed: IKE PRF algorithm 'sha1_96' is not recognized 1012s | lookup for PRF algorithm 'sha1_96' failed 1012s | - failed, saving error 'IKE PRF algorithm 'sha1_96' is not recognized' and tossing result 1012s | parsing integ: 1012s | appending IKE integrity algorithm HMAC_SHA1_96[_0] 1012s | token: '-' "sha2" ';' "ecp_521" '' 1012s | parsing prf: 1012s | appending IKE PRF algorithm HMAC_SHA2_256[_0] 1012s | token: ';' "ecp_521" '' '' 1012s | parsing dh: 1012s | appending IKE DH algorithm DH21[_0] 1012s | token: '' '' '' 1012s | parsing 'aes+aes-sha1+sha1-modp8192+modp8192' for IKE 1012s | proposal: 'aes+aes-sha1+sha1-modp8192+modp8192' 1012s | token: '' '' "aes" '+' 1012s | token: '' "aes" '+' "aes" '-' 1012s | token: '+' "aes" '-' "sha1" '+' 1012s | appending IKE encryption algorithm AES_CBC[_0] 1012s | token: '-' "sha1" '+' "sha1" '-' 1012s | appending IKE encryption algorithm AES_CBC[_0] 1012s ipsec algparse: discarding duplicate IKE encryption algorithm AES_CBC 1012s | parsing prf: 1012s | appending IKE PRF algorithm HMAC_SHA1[_0] 1012s | token: '+' "sha1" '-' "modp8192" '+' 1012s | appending IKE PRF algorithm HMAC_SHA1[_0] 1012s | token: '-' "modp8192" '+' "modp8192" '' 1012s ipsec algparse: discarding duplicate IKE PRF algorithm HMAC_SHA1 1012s | - succeeded, advancing tokens 1012s | parsing dh: 1012s | appending IKE DH algorithm MODP8192[_0] 1012s | token: '+' "modp8192" '' '' 1012s | appending IKE DH algorithm MODP8192[_0] 1012s | token: '' '' '' 1012s ipsec algparse: discarding duplicate IKE DH algorithm MODP8192 1012s | appending IKE integrity algorithm HMAC_SHA1_96[_0] 1012s | parsing '3des+aes+aes-sha2+sha1+sha1-modp4096+modp8192+modp8192' for IKE 1012s | proposal: '3des+aes+aes-sha2+sha1+sha1-modp4096+modp8192+modp8192' 1012s | token: '' '' "3des" '+' 1012s | token: '' "3des" '+' "aes" '+' 1012s | token: '+' "aes" '+' "aes" '-' 1012s | appending IKE encryption algorithm 3DES_CBC[_0] 1012s | token: '+' "aes" '-' "sha2" '+' 1012s | appending IKE encryption algorithm AES_CBC[_0] 1012s | token: '-' "sha2" '+' "sha1" '+' 1012s | appending IKE encryption algorithm AES_CBC[_0] 1012s ipsec algparse: discarding duplicate IKE encryption algorithm AES_CBC 1012s | parsing prf: 1012s | appending IKE PRF algorithm HMAC_SHA2_256[_0] 1012s | token: '+' "sha1" '+' "sha1" '-' 1012s | appending IKE PRF algorithm HMAC_SHA1[_0] 1012s | token: '+' "sha1" '-' "modp4096" '+' 1012s | appending IKE PRF algorithm HMAC_SHA1[_0] 1012s | token: '-' "modp4096" '+' "modp8192" '+' 1012s ipsec algparse: discarding duplicate IKE PRF algorithm HMAC_SHA1 1012s | - succeeded, advancing tokens 1012s | parsing dh: 1012s | appending IKE DH algorithm MODP4096[_0] 1012s | token: '+' "modp8192" '+' "modp8192" '' 1012s | appending IKE DH algorithm MODP8192[_0] 1012s | token: '+' "modp8192" '' '' 1012s | appending IKE DH algorithm MODP8192[_0] 1012s | token: '' '' '' 1012s ipsec algparse: discarding duplicate IKE DH algorithm MODP8192 1012s | appending IKE integrity algorithm HMAC_SHA2_256_128[_0] 1012s | appending IKE integrity algorithm HMAC_SHA1_96[_0] 1012s | parsing 'aes+3des+aes-sha1+sha2+sha1-modp8192+modp4096+modp8192' for IKE 1012s | proposal: 'aes+3des+aes-sha1+sha2+sha1-modp8192+modp4096+modp8192' 1012s | token: '' '' "aes" '+' 1012s | token: '' "aes" '+' "3des" '+' 1012s | token: '+' "3des" '+' "aes" '-' 1012s | appending IKE encryption algorithm AES_CBC[_0] 1012s | token: '+' "aes" '-' "sha1" '+' 1012s | appending IKE encryption algorithm 3DES_CBC[_0] 1012s | token: '-' "sha1" '+' "sha2" '+' 1012s | appending IKE encryption algorithm AES_CBC[_0] 1012s ipsec algparse: discarding duplicate IKE encryption algorithm AES_CBC 1012s | parsing prf: 1012s | appending IKE PRF algorithm HMAC_SHA1[_0] 1012s | token: '+' "sha2" '+' "sha1" '-' 1012s | appending IKE PRF algorithm HMAC_SHA2_256[_0] 1012s | token: '+' "sha1" '-' "modp8192" '+' 1012s | appending IKE PRF algorithm HMAC_SHA1[_0] 1012s | token: '-' "modp8192" '+' "modp4096" '+' 1012s ipsec algparse: discarding duplicate IKE PRF algorithm HMAC_SHA1 1012s | - succeeded, advancing tokens 1012s | parsing dh: 1012s | appending IKE DH algorithm MODP8192[_0] 1012s | token: '+' "modp4096" '+' "modp8192" '' 1012s | appending IKE DH algorithm MODP4096[_0] 1012s | token: '+' "modp8192" '' '' 1012s | appending IKE DH algorithm MODP8192[_0] 1012s | token: '' '' '' 1012s ipsec algparse: discarding duplicate IKE DH algorithm MODP8192 1012s | appending IKE integrity algorithm HMAC_SHA1_96[_0] 1012s | appending IKE integrity algorithm HMAC_SHA2_256_128[_0] 1012s | parsing 'aes+aes+3des-sha1+sha1+sha2-modp8192+modp8192+modp4096' for IKE 1012s | proposal: 'aes+aes+3des-sha1+sha1+sha2-modp8192+modp8192+modp4096' 1012s | token: '' '' "aes" '+' 1012s | token: '' "aes" '+' "aes" '+' 1012s | token: '+' "aes" '+' "3des" '-' 1012s | appending IKE encryption algorithm AES_CBC[_0] 1012s | token: '+' "3des" '-' "sha1" '+' 1012s | appending IKE encryption algorithm AES_CBC[_0] 1012s | token: '-' "sha1" '+' "sha1" '+' 1012s | appending IKE encryption algorithm 3DES_CBC[_0] 1012s ipsec algparse: discarding duplicate IKE encryption algorithm AES_CBC 1012s | parsing prf: 1012s | appending IKE PRF algorithm HMAC_SHA1[_0] 1012s | token: '+' "sha1" '+' "sha2" '-' 1012s | appending IKE PRF algorithm HMAC_SHA1[_0] 1012s | token: '+' "sha2" '-' "modp8192" '+' 1012s | appending IKE PRF algorithm HMAC_SHA2_256[_0] 1012s | token: '-' "modp8192" '+' "modp8192" '+' 1012s ipsec algparse: discarding duplicate IKE PRF algorithm HMAC_SHA1 1012s | - succeeded, advancing tokens 1012s | parsing dh: 1012s | appending IKE DH algorithm MODP8192[_0] 1012s | token: '+' "modp8192" '+' "modp4096" '' 1012s | appending IKE DH algorithm MODP8192[_0] 1012s | token: '+' "modp4096" '' '' 1012s | appending IKE DH algorithm MODP4096[_0] 1012s | token: '' '' '' 1012s ipsec algparse: discarding duplicate IKE DH algorithm MODP8192 1012s | appending IKE integrity algorithm HMAC_SHA1_96[_0] 1012s | appending IKE integrity algorithm HMAC_SHA2_256_128[_0] 1012s | parsing 'aes+aes128+aes256' for IKE 1012s | proposal: 'aes+aes128+aes256' 1012s | token: '' '' "aes" '+' 1012s | token: '' "aes" '+' "aes128" '+' 1012s | token: '+' "aes128" '+' "aes256" '' 1012s | appending IKE encryption algorithm AES_CBC[_0] 1012s | ike_alg_byname() failed: IKE encryption algorithm 'aes128' is not recognized 1012s | token: '+' "aes256" '' '' 1012s | appending IKE encryption algorithm AES_CBC[_128] 1012s | ike_alg_byname() failed: IKE encryption algorithm 'aes256' is not recognized 1012s | token: '' '' '' 1012s | appending IKE encryption algorithm AES_CBC[_256] 1012s ipsec algparse: discarding duplicate IKE encryption algorithm AES_CBC_128 1012s ipsec algparse: discarding duplicate IKE encryption algorithm AES_CBC_256 1012s | appending IKE PRF algorithm HMAC_SHA2_512[_0] 1012s | appending IKE PRF algorithm HMAC_SHA2_256[_0] 1012s | appending IKE integrity algorithm HMAC_SHA2_512_256[_0] 1012s | appending IKE integrity algorithm HMAC_SHA2_256_128[_0] 1012s | appending IKE DH algorithm DH19[_0] 1012s | appending IKE DH algorithm DH20[_0] 1012s | appending IKE DH algorithm DH21[_0] 1012s | appending IKE DH algorithm DH31[_0] 1012s | appending IKE DH algorithm MODP4096[_0] 1012s | appending IKE DH algorithm MODP3072[_0] 1012s | appending IKE DH algorithm MODP2048[_0] 1012s | appending IKE DH algorithm MODP8192[_0] 1012s | parsing 'aes128+aes+aes256' for IKE 1012s | proposal: 'aes128+aes+aes256' 1012s | token: '' '' "aes128" '+' 1012s | token: '' "aes128" '+' "aes" '+' 1012s | ike_alg_byname() failed: IKE encryption algorithm 'aes128' is not recognized 1012s | token: '+' "aes" '+' "aes256" '' 1012s | appending IKE encryption algorithm AES_CBC[_128] 1012s | token: '+' "aes256" '' '' 1012s | appending IKE encryption algorithm AES_CBC[_0] 1012s | ike_alg_byname() failed: IKE encryption algorithm 'aes256' is not recognized 1012s | token: '' '' '' 1012s | appending IKE encryption algorithm AES_CBC[_256] 1012s ipsec algparse: discarding duplicate IKE encryption algorithm AES_CBC_256 1012s | appending IKE PRF algorithm HMAC_SHA2_512[_0] 1012s | appending IKE PRF algorithm HMAC_SHA2_256[_0] 1012s | appending IKE integrity algorithm HMAC_SHA2_512_256[_0] 1012s | appending IKE integrity algorithm HMAC_SHA2_256_128[_0] 1012s | appending IKE DH algorithm DH19[_0] 1012s | appending IKE DH algorithm DH20[_0] 1012s | appending IKE DH algorithm DH21[_0] 1012s | appending IKE DH algorithm DH31[_0] 1012s | appending IKE DH algorithm MODP4096[_0] 1012s | appending IKE DH algorithm MODP3072[_0] 1012s | appending IKE DH algorithm MODP2048[_0] 1012s | appending IKE DH algorithm MODP8192[_0] 1012s | parsing 'aes128+aes256+aes' for IKE 1012s | proposal: 'aes128+aes256+aes' 1012s | token: '' '' "aes128" '+' 1012s | token: '' "aes128" '+' "aes256" '+' 1012s | ike_alg_byname() failed: IKE encryption algorithm 'aes128' is not recognized 1012s | token: '+' "aes256" '+' "aes" '' 1012s | appending IKE encryption algorithm AES_CBC[_128] 1012s | ike_alg_byname() failed: IKE encryption algorithm 'aes256' is not recognized 1012s | token: '+' "aes" '' '' 1012s | appending IKE encryption algorithm AES_CBC[_256] 1012s | token: '' '' '' 1012s | appending IKE encryption algorithm AES_CBC[_0] 1012s | appending IKE PRF algorithm HMAC_SHA2_512[_0] 1012s | appending IKE PRF algorithm HMAC_SHA2_256[_0] 1012s | appending IKE integrity algorithm HMAC_SHA2_512_256[_0] 1012s | appending IKE integrity algorithm HMAC_SHA2_256_128[_0] 1012s | appending IKE DH algorithm DH19[_0] 1012s | appending IKE DH algorithm DH20[_0] 1012s | appending IKE DH algorithm DH21[_0] 1012s | appending IKE DH algorithm DH31[_0] 1012s | appending IKE DH algorithm MODP4096[_0] 1012s | appending IKE DH algorithm MODP3072[_0] 1012s | appending IKE DH algorithm MODP2048[_0] 1012s | appending IKE DH algorithm MODP8192[_0] 1012s | parsing 'aes-sha1-modp8192,aes-sha1-modp8192,aes-sha1-modp8192' for IKE 1012s | proposal: 'aes-sha1-modp8192' 1012s | token: '' '' "aes" '-' 1012s | token: '' "aes" '-' "sha1" '-' 1012s | token: '-' "sha1" '-' "modp8192" '' 1012s | appending IKE encryption algorithm AES_CBC[_0] 1012s | parsing prf: 1012s | appending IKE PRF algorithm HMAC_SHA1[_0] 1012s | token: '-' "modp8192" '' '' 1012s | - succeeded, advancing tokens 1012s | parsing dh: 1012s | appending IKE DH algorithm MODP8192[_0] 1012s | token: '' '' '' 1012s | appending IKE integrity algorithm HMAC_SHA1_96[_0] 1012s | proposal: 'aes-sha1-modp8192' 1012s | token: '' '' "aes" '-' 1012s | token: '' "aes" '-' "sha1" '-' 1012s | token: '-' "sha1" '-' "modp8192" '' 1012s | appending IKE encryption algorithm AES_CBC[_0] 1012s | parsing prf: 1012s | appending IKE PRF algorithm HMAC_SHA1[_0] 1012s | token: '-' "modp8192" '' '' 1012s | - succeeded, advancing tokens 1012s | parsing dh: 1012s | appending IKE DH algorithm MODP8192[_0] 1012s | token: '' '' '' 1012s | appending IKE integrity algorithm HMAC_SHA1_96[_0] 1012s | proposal: 'aes-sha1-modp8192' 1012s | token: '' '' "aes" '-' 1012s | token: '' "aes" '-' "sha1" '-' 1012s | token: '-' "sha1" '-' "modp8192" '' 1012s | appending IKE encryption algorithm AES_CBC[_0] 1012s | parsing prf: 1012s | appending IKE PRF algorithm HMAC_SHA1[_0] 1012s | token: '-' "modp8192" '' '' 1012s | - succeeded, advancing tokens 1012s | parsing dh: 1012s | appending IKE DH algorithm MODP8192[_0] 1012s | token: '' '' '' 1012s | appending IKE integrity algorithm HMAC_SHA1_96[_0] 1012s | parsing 'aes-sha1-modp8192,aes-sha2-modp8192,aes-sha1-modp8192' for IKE 1012s | proposal: 'aes-sha1-modp8192' 1012s | token: '' '' "aes" '-' 1012s | token: '' "aes" '-' "sha1" '-' 1012s | token: '-' "sha1" '-' "modp8192" '' 1012s | appending IKE encryption algorithm AES_CBC[_0] 1012s | parsing prf: 1012s | appending IKE PRF algorithm HMAC_SHA1[_0] 1012s | token: '-' "modp8192" '' '' 1012s | - succeeded, advancing tokens 1012s | parsing dh: 1012s | appending IKE DH algorithm MODP8192[_0] 1012s | token: '' '' '' 1012s | appending IKE integrity algorithm HMAC_SHA1_96[_0] 1012s | proposal: 'aes-sha2-modp8192' 1012s | token: '' '' "aes" '-' 1012s | token: '' "aes" '-' "sha2" '-' 1012s | token: '-' "sha2" '-' "modp8192" '' 1012s | appending IKE encryption algorithm AES_CBC[_0] 1012s | parsing prf: 1012s | appending IKE PRF algorithm HMAC_SHA2_256[_0] 1012s | token: '-' "modp8192" '' '' 1012s | - succeeded, advancing tokens 1012s | parsing dh: 1012s | appending IKE DH algorithm MODP8192[_0] 1012s | token: '' '' '' 1012s | appending IKE integrity algorithm HMAC_SHA2_256_128[_0] 1012s | proposal: 'aes-sha1-modp8192' 1012s | token: '' '' "aes" '-' 1012s | token: '' "aes" '-' "sha1" '-' 1012s | token: '-' "sha1" '-' "modp8192" '' 1012s | appending IKE encryption algorithm AES_CBC[_0] 1012s | parsing prf: 1012s | appending IKE PRF algorithm HMAC_SHA1[_0] 1012s | token: '-' "modp8192" '' '' 1012s | - succeeded, advancing tokens 1012s | parsing dh: 1012s | appending IKE DH algorithm MODP8192[_0] 1012s | token: '' '' '' 1012s | appending IKE integrity algorithm HMAC_SHA1_96[_0] 1012s | parsing 'aes_gcm' for IKE 1012s | proposal: 'aes_gcm' 1012s | token: '' '' "aes_gcm" '' 1012s | token: '' "aes_gcm" '' '' 1012s | token: '' '' '' 1012s | appending IKE encryption algorithm AES_GCM_16[_0] 1012s | appending IKE PRF algorithm HMAC_SHA2_512[_0] 1012s | appending IKE PRF algorithm HMAC_SHA2_256[_0] 1012s | appending IKE integrity algorithm NONE[_0] 1012s | appending IKE DH algorithm DH19[_0] 1012s | appending IKE DH algorithm DH20[_0] 1012s | appending IKE DH algorithm DH21[_0] 1012s | appending IKE DH algorithm DH31[_0] 1012s | appending IKE DH algorithm MODP4096[_0] 1012s | appending IKE DH algorithm MODP3072[_0] 1012s | appending IKE DH algorithm MODP2048[_0] 1012s | appending IKE DH algorithm MODP8192[_0] 1012s | parsing 'aes_gcm-sha2' for IKE 1012s | proposal: 'aes_gcm-sha2' 1012s | token: '' '' "aes_gcm" '-' 1012s | token: '' "aes_gcm" '-' "sha2" '' 1012s | token: '-' "sha2" '' '' 1012s | appending IKE encryption algorithm AES_GCM_16[_0] 1012s | parsing prf: 1012s | appending IKE PRF algorithm HMAC_SHA2_256[_0] 1012s | token: '' '' '' 1012s | - succeeded, advancing tokens 1012s | appending IKE integrity algorithm NONE[_0] 1012s | appending IKE DH algorithm DH19[_0] 1012s | appending IKE DH algorithm DH20[_0] 1012s | appending IKE DH algorithm DH21[_0] 1012s | appending IKE DH algorithm DH31[_0] 1012s | appending IKE DH algorithm MODP4096[_0] 1012s | appending IKE DH algorithm MODP3072[_0] 1012s | appending IKE DH algorithm MODP2048[_0] 1012s | appending IKE DH algorithm MODP8192[_0] 1012s | parsing 'aes_gcm-sha2-modp2048' for IKE 1012s | proposal: 'aes_gcm-sha2-modp2048' 1012s | token: '' '' "aes_gcm" '-' 1012s | token: '' "aes_gcm" '-' "sha2" '-' 1012s | token: '-' "sha2" '-' "modp2048" '' 1012s | appending IKE encryption algorithm AES_GCM_16[_0] 1012s | parsing prf: 1012s | appending IKE PRF algorithm HMAC_SHA2_256[_0] 1012s | token: '-' "modp2048" '' '' 1012s | - succeeded, advancing tokens 1012s | parsing dh: 1012s | appending IKE DH algorithm MODP2048[_0] 1012s | token: '' '' '' 1012s | appending IKE integrity algorithm NONE[_0] 1012s | parsing 'aes_gcm-sha2;modp2048' for IKE 1012s | proposal: 'aes_gcm-sha2;modp2048' 1012s | token: '' '' "aes_gcm" '-' 1012s | token: '' "aes_gcm" '-' "sha2" ';' 1012s | token: '-' "sha2" ';' "modp2048" '' 1012s | appending IKE encryption algorithm AES_GCM_16[_0] 1012s | parsing prf: 1012s | appending IKE PRF algorithm HMAC_SHA2_256[_0] 1012s | token: ';' "modp2048" '' '' 1012s | - succeeded, advancing tokens 1012s | parsing dh: 1012s | appending IKE DH algorithm MODP2048[_0] 1012s | token: '' '' '' 1012s | appending IKE integrity algorithm NONE[_0] 1012s | parsing 'aes_gcm-modp2048' for IKE 1012s | proposal: 'aes_gcm-modp2048' 1012s | token: '' '' "aes_gcm" '-' 1012s | token: '' "aes_gcm" '-' "modp2048" '' 1012s | token: '-' "modp2048" '' '' 1012s | appending IKE encryption algorithm AES_GCM_16[_0] 1012s | parsing prf: 1012s | ike_alg_byname() failed: IKE PRF algorithm 'modp2048' is not recognized 1012s | lookup for PRF algorithm 'modp2048' failed 1012s | - failed, saving error 'IKE PRF algorithm 'modp2048' is not recognized' and tossing result 1012s | parsing integ: 1012s | ike_alg_byname() failed: IKE integrity algorithm 'modp2048' is not recognized 1012s | lookup for integrity algorithm 'modp2048' failed 1012s | - and - failed, returning earlier PRF error 'IKE PRF algorithm 'modp2048' is not recognized' and discarding INTEG error 'IKE integrity algorithm 'modp2048' is not recognized') 1012s | parsing 'aes_gcm;modp2048' for IKE 1012s | proposal: 'aes_gcm;modp2048' 1012s | token: '' '' "aes_gcm" ';' 1012s | token: '' "aes_gcm" ';' "modp2048" '' 1012s | token: ';' "modp2048" '' '' 1012s | appending IKE encryption algorithm AES_GCM_16[_0] 1012s | parsing dh: 1012s | appending IKE DH algorithm MODP2048[_0] 1012s | token: '' '' '' 1012s | appending IKE PRF algorithm HMAC_SHA2_512[_0] 1012s | appending IKE PRF algorithm HMAC_SHA2_256[_0] 1012s | appending IKE integrity algorithm NONE[_0] 1012s | parsing 'aes_gcm-none' for IKE 1012s | proposal: 'aes_gcm-none' 1012s | token: '' '' "aes_gcm" '-' 1012s | token: '' "aes_gcm" '-' "none" '' 1012s | token: '-' "none" '' '' 1012s | appending IKE encryption algorithm AES_GCM_16[_0] 1012s | parsing prf: 1012s | ike_alg_byname() failed: IKE PRF algorithm 'none' is not recognized 1012s | lookup for PRF algorithm 'none' failed 1012s | - failed, saving error 'IKE PRF algorithm 'none' is not recognized' and tossing result 1012s | parsing integ: 1012s | appending IKE integrity algorithm NONE[_0] 1012s | token: '' '' '' 1012s | appending IKE PRF algorithm HMAC_SHA2_512[_0] 1012s | appending IKE PRF algorithm HMAC_SHA2_256[_0] 1012s | appending IKE DH algorithm DH19[_0] 1012s | appending IKE DH algorithm DH20[_0] 1012s | appending IKE DH algorithm DH21[_0] 1012s | appending IKE DH algorithm DH31[_0] 1012s | appending IKE DH algorithm MODP4096[_0] 1012s | appending IKE DH algorithm MODP3072[_0] 1012s | appending IKE DH algorithm MODP2048[_0] 1012s | appending IKE DH algorithm MODP8192[_0] 1012s | parsing 'aes_gcm-none-sha2' for IKE 1012s | proposal: 'aes_gcm-none-sha2' 1012s | token: '' '' "aes_gcm" '-' 1012s | token: '' "aes_gcm" '-' "none" '-' 1012s | token: '-' "none" '-' "sha2" '' 1012s | appending IKE encryption algorithm AES_GCM_16[_0] 1012s | parsing prf: 1012s | ike_alg_byname() failed: IKE PRF algorithm 'none' is not recognized 1012s | lookup for PRF algorithm 'none' failed 1012s | - failed, saving error 'IKE PRF algorithm 'none' is not recognized' and tossing result 1012s | parsing integ: 1012s | appending IKE integrity algorithm NONE[_0] 1012s | token: '-' "sha2" '' '' 1012s | parsing prf: 1012s | appending IKE PRF algorithm HMAC_SHA2_256[_0] 1012s | token: '' '' '' 1012s | appending IKE DH algorithm DH19[_0] 1012s | appending IKE DH algorithm DH20[_0] 1012s | appending IKE DH algorithm DH21[_0] 1012s | appending IKE DH algorithm DH31[_0] 1012s | appending IKE DH algorithm MODP4096[_0] 1012s | appending IKE DH algorithm MODP3072[_0] 1012s | appending IKE DH algorithm MODP2048[_0] 1012s | appending IKE DH algorithm MODP8192[_0] 1012s | parsing 'aes_gcm-none-sha2-modp2048' for IKE 1012s | proposal: 'aes_gcm-none-sha2-modp2048' 1012s | token: '' '' "aes_gcm" '-' 1012s | token: '' "aes_gcm" '-' "none" '-' 1012s | token: '-' "none" '-' "sha2" '-' 1012s | appending IKE encryption algorithm AES_GCM_16[_0] 1012s | parsing prf: 1012s | ike_alg_byname() failed: IKE PRF algorithm 'none' is not recognized 1012s | lookup for PRF algorithm 'none' failed 1012s | - failed, saving error 'IKE PRF algorithm 'none' is not recognized' and tossing result 1012s | parsing integ: 1012s | appending IKE integrity algorithm NONE[_0] 1012s | token: '-' "sha2" '-' "modp2048" '' 1012s | parsing prf: 1012s | appending IKE PRF algorithm HMAC_SHA2_256[_0] 1012s | token: '-' "modp2048" '' '' 1012s | parsing dh: 1012s | appending IKE DH algorithm MODP2048[_0] 1012s | token: '' '' '' 1012s | parsing 'aes_gcm-none-sha2;modp2048' for IKE 1012s | proposal: 'aes_gcm-none-sha2;modp2048' 1012s | token: '' '' "aes_gcm" '-' 1012s | token: '' "aes_gcm" '-' "none" '-' 1012s | token: '-' "none" '-' "sha2" ';' 1012s | appending IKE encryption algorithm AES_GCM_16[_0] 1012s | parsing prf: 1012s | ike_alg_byname() failed: IKE PRF algorithm 'none' is not recognized 1012s | lookup for PRF algorithm 'none' failed 1012s | - failed, saving error 'IKE PRF algorithm 'none' is not recognized' and tossing result 1012s | parsing integ: 1012s | appending IKE integrity algorithm NONE[_0] 1012s | token: '-' "sha2" ';' "modp2048" '' 1012s | parsing prf: 1012s | appending IKE PRF algorithm HMAC_SHA2_256[_0] 1012s | token: ';' "modp2048" '' '' 1012s | parsing dh: 1012s | appending IKE DH algorithm MODP2048[_0] 1012s | token: '' '' '' 1012s | parsing 'aes_gcm-none-modp2048' for IKE 1012s | proposal: 'aes_gcm-none-modp2048' 1012s | token: '' '' "aes_gcm" '-' 1012s | token: '' "aes_gcm" '-' "none" '-' 1012s | token: '-' "none" '-' "modp2048" '' 1012s | appending IKE encryption algorithm AES_GCM_16[_0] 1012s | parsing prf: 1012s | ike_alg_byname() failed: IKE PRF algorithm 'none' is not recognized 1012s | lookup for PRF algorithm 'none' failed 1012s | - failed, saving error 'IKE PRF algorithm 'none' is not recognized' and tossing result 1012s | parsing integ: 1012s | appending IKE integrity algorithm NONE[_0] 1012s | token: '-' "modp2048" '' '' 1012s | parsing prf: 1012s | ike_alg_byname() failed: IKE PRF algorithm 'modp2048' is not recognized 1012s | lookup for PRF algorithm 'modp2048' failed 1012s | -- failed 'IKE PRF algorithm 'modp2048' is not recognized' 1012s | parsing 'aes_gcm-none;modp2048' for IKE 1012s | proposal: 'aes_gcm-none;modp2048' 1012s | token: '' '' "aes_gcm" '-' 1012s | token: '' "aes_gcm" '-' "none" ';' 1012s | token: '-' "none" ';' "modp2048" '' 1012s | appending IKE encryption algorithm AES_GCM_16[_0] 1012s | parsing prf: 1012s | ike_alg_byname() failed: IKE PRF algorithm 'none' is not recognized 1012s | lookup for PRF algorithm 'none' failed 1012s | - failed, saving error 'IKE PRF algorithm 'none' is not recognized' and tossing result 1012s | parsing integ: 1012s | appending IKE integrity algorithm NONE[_0] 1012s | token: ';' "modp2048" '' '' 1012s | parsing dh: 1012s | appending IKE DH algorithm MODP2048[_0] 1012s | token: '' '' '' 1012s | appending IKE PRF algorithm HMAC_SHA2_512[_0] 1012s | appending IKE PRF algorithm HMAC_SHA2_256[_0] 1012s | parsing 'aes_gcm-sha1-none-modp2048' for IKE 1012s | proposal: 'aes_gcm-sha1-none-modp2048' 1012s | token: '' '' "aes_gcm" '-' 1012s | token: '' "aes_gcm" '-' "sha1" '-' 1012s | token: '-' "sha1" '-' "none" '-' 1012s | appending IKE encryption algorithm AES_GCM_16[_0] 1012s | parsing prf: 1012s | appending IKE PRF algorithm HMAC_SHA1[_0] 1012s | token: '-' "none" '-' "modp2048" '' 1012s | - succeeded, advancing tokens 1012s | parsing dh: 1012s | appending IKE DH algorithm NONE[_0] 1012s | token: '-' "modp2048" '' '' 1012s | parsing 'aes_gcm-sha1-none;modp2048' for IKE 1012s | proposal: 'aes_gcm-sha1-none;modp2048' 1012s | token: '' '' "aes_gcm" '-' 1012s | token: '' "aes_gcm" '-' "sha1" '-' 1012s | token: '-' "sha1testing -ta 1012s " '-' "none" ';' 1012s | appending IKE encryption algorithm AES_GCM_16[_0] 1012s | parsing prf: 1012s | appending IKE PRF algorithm HMAC_SHA1[_0] 1012s | token: '-' "none" ';' "modp2048" '' 1012s | - succeeded, advancing tokens 1012s | parsing dh: 1012s | appending IKE DH algorithm NONE[_0] 1012s | token: ';' "modp2048" '' '' 1012s | parsing 'aes+aes_gcm' for IKE 1012s | proposal: 'aes+aes_gcm' 1012s | token: '' '' "aes" '+' 1012s | token: '' "aes" '+' "aes_gcm" '' 1012s | token: '+' "aes_gcm" '' '' 1012s | appending IKE encryption algorithm AES_CBC[_0] 1012s | token: '' '' '' 1012s | appending IKE encryption algorithm AES_GCM_16[_0] 1012s | appending IKE PRF algorithm HMAC_SHA2_512[_0] 1012s | appending IKE PRF algorithm HMAC_SHA2_256[_0] 1012s | appending IKE DH algorithm DH19[_0] 1012s | appending IKE DH algorithm DH20[_0] 1012s | appending IKE DH algorithm DH21[_0] 1012s | appending IKE DH algorithm DH31[_0] 1012s | appending IKE DH algorithm MODP4096[_0] 1012s | appending IKE DH algorithm MODP3072[_0] 1012s | appending IKE DH algorithm MODP2048[_0] 1012s | appending IKE DH algorithm MODP8192[_0] 1012s | parsing ',' for IKE 1012s | proposal: '' 1012s | token: '' '' "" '' 1012s | token: '' "" '' '' 1012s | parsing 'aes,' for IKE 1012s | proposal: 'aes' 1012s | token: '' '' "aes" '' 1012s | token: '' "aes" '' '' 1012s | token: '' '' '' 1012s | appending IKE encryption algorithm AES_CBC[_0] 1012s | appending IKE PRF algorithm HMAC_SHA2_512[_0] 1012s | appending IKE PRF algorithm HMAC_SHA2_256[_0] 1012s | appending IKE integrity algorithm HMAC_SHA2_512_256[_0] 1012s | appending IKE integrity algorithm HMAC_SHA2_256_128[_0] 1012s | appending IKE DH algorithm DH19[_0] 1012s | appending IKE DH algorithm DH20[_0] 1012s | appending IKE DH algorithm DH21[_0] 1012s | appending IKE DH algorithm DH31[_0] 1012s | appending IKE DH algorithm MODP4096[_0] 1012s | appending IKE DH algorithm MODP3072[_0] 1012s | appending IKE DH algorithm MODP2048[_0] 1012s | appending IKE DH algorithm MODP8192[_0] 1012s | proposal: '' 1012s | token: '' '' "" '' 1012s | token: '' "" '' '' 1012s | parsing 'aes,,aes' for IKE 1012s | proposal: 'aes' 1012s | token: '' '' "aes" '' 1012s | token: '' "aes" '' '' 1012s | token: '' '' '' 1012s | appending IKE encryption algorithm AES_CBC[_0] 1012s | appending IKE PRF algorithm HMAC_SHA2_512[_0] 1012s | appending IKE PRF algorithm HMAC_SHA2_256[_0] 1012s | appending IKE integrity algorithm HMAC_SHA2_512_256[_0] 1012s | appending IKE integrity algorithm HMAC_SHA2_256_128[_0] 1012s | appending IKE DH algorithm DH19[_0] 1012s | appending IKE DH algorithm DH20[_0] 1012s | appending IKE DH algorithm DH21[_0] 1012s | appending IKE DH algorithm DH31[_0] 1012s | appending IKE DH algorithm MODP4096[_0] 1012s | appending IKE DH algorithm MODP3072[_0] 1012s | appending IKE DH algorithm MODP2048[_0] 1012s | appending IKE DH algorithm MODP8192[_0] 1012s | proposal: '' 1012s | token: '' '' "" '' 1012s | token: '' "" '' '' 1012s | parsing ',aes' for IKE 1012s | proposal: '' 1012s | token: '' '' "" '' 1012s | token: '' "" '' '' 1012s | parsing '-' for IKE 1012s | proposal: '-' 1012s | token: '' '' "" '-' 1012s | token: '' "" '-' "" '' 1012s | parsing '+' for IKE 1012s | proposal: '+' 1012s | token: '' '' "" '+' 1012s | token: '' "" '+' "" '' 1012s | parsing ';' for IKE 1012s | proposal: ';' 1012s | token: '' '' "" ';' 1012s | token: '' "" ';' "" '' 1012s | parsing 'aes-' for IKE 1012s | proposal: 'aes-' 1012s | token: '' '' "aes" '-' 1012s | token: '' "aes" '-' "" '' 1012s | token: '-' "" '' '' 1012s | appending IKE encryption algorithm AES_CBC[_0] 1012s | parsing prf: 1012s | - failed, saving error 'IKE PRF algorithm is empty' and tossing result 1012s | parsing integ: 1012s | - and - failed, returning earlier PRF error 'IKE PRF algorithm is empty' and discarding INTEG error 'IKE integrity algorithm is empty') 1012s | parsing 'aes+' for IKE 1012s | proposal: 'aes+' 1012s | token: '' '' "aes" '+' 1012s | token: '' "aes" '+' "" '' 1012s | token: '+' "" '' '' 1012s | appending IKE encryption algorithm AES_CBC[_0] 1012s | parsing 'aes;' for IKE 1012s | proposal: 'aes;' 1012s | token: '' '' "aes" ';' 1012s | token: '' "aes" ';' "" '' 1012s | token: ';' "" '' '' 1012s | appending IKE encryption algorithm AES_CBC[_0] 1012s | parsing dh: 1012s | ... failed 'IKE DH algorithm is empty' 1012s | parsing '-aes' for IKE 1012s | proposal: '-aes' 1012s | token: '' '' "" '-' 1012s | token: '' "" '-' "aes" '' 1012s | parsing '+aes' for IKE 1012s | proposal: '+aes' 1012s | token: '' '' "" '+' 1012s | token: '' "" '+' "aes" '' 1012s | parsing ';aes' for IKE 1012s | proposal: ';aes' 1012s | token: '' '' "" ';' 1012s | token: '' "" ';' "aes" '' 1012s | parsing 'aes+-' for IKE 1012s | proposal: 'aes+-' 1012s | token: '' '' "aes" '+' 1012s | token: '' "aes" '+' "" '-' 1012s | token: '+' "" '-' "" '' 1012s | appending IKE encryption algorithm AES_CBC[_0] 1012s | parsing 'aes+;' for IKE 1012s | proposal: 'aes+;' 1012s | token: '' '' "aes" '+' 1012s | token: '' "aes" '+' "" ';' 1012s | token: '+' "" ';' "" '' 1012s | appending IKE encryption algorithm AES_CBC[_0] 1012s | parsing 'aes++' for IKE 1012s | proposal: 'aes++' 1012s | token: '' '' "aes" '+' 1012s | token: '' "aes" '+' "" '+' 1012s | token: '+' "" '+' "" '' 1012s | appending IKE encryption algorithm AES_CBC[_0] 1012s ipsec algparse: leak detective found no leaks 1012s ipsec algparse: Encryption algorithms: 1012s ipsec algparse: AES_CCM_16 {256,192,*128} IKEv1: ESP IKEv2: ESP FIPS aes_ccm, aes_ccm_c 1012s ipsec algparse: AES_CCM_12 {256,192,*128} IKEv1: ESP IKEv2: ESP FIPS aes_ccm_b 1012s ipsec algparse: AES_CCM_8 {256,192,*128} IKEv1: ESP IKEv2: ESP FIPS aes_ccm_a 1012s ipsec algparse: 3DES_CBC [*192] IKEv1: IKE ESP IKEv2: IKE ESP FIPS NSS(CBC) 3des 1012s ipsec algparse: CAMELLIA_CTR {256,192,*128} IKEv1: ESP IKEv2: ESP 1012s ipsec algparse: CAMELLIA_CBC {256,192,*128} IKEv1: IKE ESP IKEv2: IKE ESP NSS(CBC) camellia 1012s ipsec algparse: AES_GCM_16 {256,192,*128} IKEv1: ESP IKEv2: IKE ESP FIPS NSS(AEAD) aes_gcm, aes_gcm_c 1012s ipsec algparse: AES_GCM_12 {256,192,*128} IKEv1: ESP IKEv2: IKE ESP FIPS NSS(AEAD) aes_gcm_b 1012s ipsec algparse: AES_GCM_8 {256,192,*128} IKEv1: ESP IKEv2: IKE ESP FIPS NSS(AEAD) aes_gcm_a 1012s ipsec algparse: AES_CTR {256,192,*128} IKEv1: IKE ESP IKEv2: IKE ESP FIPS NSS(CTR) aesctr 1012s ipsec algparse: AES_CBC {256,192,*128} IKEv1: IKE ESP IKEv2: IKE ESP FIPS NSS(CBC) aes 1012s ipsec algparse: NULL_AUTH_AES_GMAC {256,192,*128} IKEv1: ESP IKEv2: ESP FIPS aes_gmac 1012s ipsec algparse: NULL [] IKEv1: ESP IKEv2: ESP NULL 1012s ipsec algparse: CHACHA20_POLY1305 [*256] IKEv1: IKEv2: IKE ESP NSS(AEAD) chacha20poly1305 1012s ipsec algparse: Hash algorithms: 1012s ipsec algparse: MD5 IKEv1: IKE IKEv2: NSS 1012s ipsec algparse: SHA1 IKEv1: IKE IKEv2: IKE FIPS NSS sha 1012s ipsec algparse: SHA2_256 IKEv1: IKE IKEv2: IKE FIPS NSS sha2, sha256 1012s ipsec algparse: SHA2_384 IKEv1: IKE IKEv2: IKE FIPS NSS sha384 1012s ipsec algparse: SHA2_512 IKEv1: IKE IKEv2: IKE FIPS NSS sha512 1012s ipsec algparse: IDENTITY IKEv1: IKEv2: FIPS 1012s ipsec algparse: PRF algorithms: 1012s ipsec algparse: HMAC_MD5 IKEv1: IKE IKEv2: IKE NSS md5 1012s ipsec algparse: HMAC_SHA1 IKEv1: IKE IKEv2: IKE FIPS NSS sha, sha1 1012s ipsec algparse: HMAC_SHA2_256 IKEv1: IKE IKEv2: IKE FIPS NSS sha2, sha256, sha2_256 1012s ipsec algparse: HMAC_SHA2_384 IKEv1: IKE IKEv2: IKE FIPS NSS sha384, sha2_384 1012s ipsec algparse: HMAC_SHA2_512 IKEv1: IKE IKEv2: IKE FIPS NSS sha512, sha2_512 1012s ipsec algparse: AES_XCBC IKEv1: IKEv2: IKE native(XCBC) aes128_xcbc 1012s ipsec algparse: Integrity algorithms: 1012s ipsec algparse: HMAC_MD5_96 IKEv1: IKE ESP AH IKEv2: IKE ESP AH NSS md5, hmac_md5 1012s ipsec algparse: HMAC_SHA1_96 IKEv1: IKE ESP AH IKEv2: IKE ESP AH FIPS NSS sha, sha1, sha1_96, hmac_sha1 1012s ipsec algparse: HMAC_SHA2_512_256 IKEv1: IKE ESP AH IKEv2: IKE ESP AH FIPS NSS sha512, sha2_512, sha2_512_256, hmac_sha2_512 1012s ipsec algparse: HMAC_SHA2_384_192 IKEv1: IKE ESP AH IKEv2: IKE ESP AH FIPS NSS sha384, sha2_384, sha2_384_192, hmac_sha2_384 1012s ipsec algparse: HMAC_SHA2_256_128 IKEv1: IKE ESP AH IKEv2: IKE ESP AH FIPS NSS sha2, sha256, sha2_256, sha2_256_128, hmac_sha2_256 1012s ipsec algparse: HMAC_SHA2_256_TRUNCBUG IKEv1: ESP AH IKEv2: AH 1012s ipsec algparse: AES_XCBC_96 IKEv1: ESP AH IKEv2: IKE ESP AH native(XCBC) aes_xcbc, aes128_xcbc, aes128_xcbc_96 1012s ipsec algparse: AES_CMAC_96 IKEv1: ESP AH IKEv2: ESP AH FIPS aes_cmac 1012s ipsec algparse: NONE IKEv1: ESP IKEv2: IKE ESP FIPS null 1012s ipsec algparse: DH algorithms: 1012s ipsec algparse: NONE IKEv1: IKEv2: IKE ESP AH FIPS NSS(MODP) null, dh0 1012s ipsec algparse: MODP1536 IKEv1: IKE ESP AH IKEv2: IKE ESP AH NSS(MODP) dh5 1012s ipsec algparse: MODP2048 IKEv1: IKE ESP AH IKEv2: IKE ESP AH FIPS NSS(MODP) dh14 1012s ipsec algparse: MODP3072 IKEv1: IKE ESP AH IKEv2: IKE ESP AH FIPS NSS(MODP) dh15 1012s ipsec algparse: MODP4096 IKEv1: IKE ESP AH IKEv2: IKE ESP AH FIPS NSS(MODP) dh16 1012s ipsec algparse: MODP6144 IKEv1: IKE ESP AH IKEv2: IKE ESP AH FIPS NSS(MODP) dh17 1012s ipsec algparse: MODP8192 IKEv1: IKE ESP AH IKEv2: IKE ESP AH FIPS NSS(MODP) dh18 1012s ipsec algparse: DH19 IKEv1: IKE IKEv2: IKE ESP AH FIPS NSS(ECP) ecp_256, ecp256 1012s ipsec algparse: DH20 IKEv1: IKE IKEv2: IKE ESP AH FIPS NSS(ECP) ecp_384, ecp384 1012s ipsec algparse: DH21 IKEv1: IKE IKEv2: IKE ESP AH FIPS NSS(ECP) ecp_521, ecp521 1012s ipsec algparse: DH31 IKEv1: IKE IKEv2: IKE ESP AH NSS(ECP) curve25519 1012s ipsec algparse: IPCOMP algorithms: 1012s ipsec algparse: DEFLATE IKEv1: ESP AH IKEv2: ESP AH FIPS 1012s ipsec algparse: LZS IKEv1: IKEv2: ESP AH FIPS 1012s ipsec algparse: LZJH IKEv1: IKEv2: ESP AH FIPS 1012s ipsec algparse: testing CAMELLIA_CBC: 1012s ipsec algparse: Camellia: 16 bytes with 128-bit key 1012s | decode_to_chunk() raw_key: input "0x00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00" 1012s | decode_to_chunk() output: 1012s | 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................ 1012s | CONCATENATE_DATA_AND_BASE: 1012s | target: EXTRACT_KEY_FROM_KEY 1012s | base: base-key@0x2aa278c8350 (16-bytes, AES_KEY_GEN) 1012s | params: 16-bytes@0x3ffd54f7148 1012s | key-offset: 0, key-size: 16 1012s | EXTRACT_KEY_FROM_KEY: 1012s | target: CAMELLIA_CBC 1012s | flags: ENCRYPT+DECRYPT 1012s | key_size: 16-bytes 1012s | base: base-key@0x2aa278cb360 (32-bytes, EXTRACT_KEY_FROM_KEY) 1012s | operation: FLAGS_ONLY 1012s | params: 8-bytes@0x3ffd54f7098 1012s | decode_to_mac() IV: : input "0x00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00" 1012s | decode_to_mac() output: 1012s | 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................ 1012s | decode_to_chunk() new IV: : input "0x07 92 3A 39 EB 0A 81 7D 1C 4D 87 BD B8 2D 1F 1C" 1012s | decode_to_chunk() output: 1012s | 07 92 3a 39 eb 0a 81 7d 1c 4d 87 bd b8 2d 1f 1c ..:9...}.M...-.. 1012s | decode_to_chunk() plaintext: : input "0x80 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00" 1012s | decode_to_chunk() output: 1012s | 80 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................ 1012s | decode_to_chunk() ciphertext: : input "0x07 92 3A 39 EB 0A 81 7D 1C 4D 87 BD B8 2D 1F 1C" 1012s | decode_to_chunk() output: 1012s | 07 92 3a 39 eb 0a 81 7d 1c 4d 87 bd b8 2d 1f 1c ..:9...}.M...-.. 1012s | NSS ike_alg_nss_cbc: CAMELLIA_CBC - enter (nil) 1012s | using IKEv1 IV 1012s | NSS ike_alg_nss_cbc: CAMELLIA_CBC - exit 1012s | verify_bytes() Camellia: 16 bytes with 128-bit key: encrypt: ok 1012s | verify_bytes() Camellia: 16 bytes with 128-bit key: updated CBC IV: ok 1012s | decode_to_mac() IV: : input "0x00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00" 1012s | decode_to_mac() output: 1012s | 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................ 1012s | decode_to_chunk() new IV: : input "0x07 92 3A 39 EB 0A 81 7D 1C 4D 87 BD B8 2D 1F 1C" 1012s | decode_to_chunk() output: 1012s | 07 92 3a 39 eb 0a 81 7d 1c 4d 87 bd b8 2d 1f 1c ..:9...}.M...-.. 1012s | decode_to_chunk() ciphertext: : input "0x07 92 3A 39 EB 0A 81 7D 1C 4D 87 BD B8 2D 1F 1C" 1012s | decode_to_chunk() output: 1012s | 07 92 3a 39 eb 0a 81 7d 1c 4d 87 bd b8 2d 1f 1c ..:9...}.M...-.. 1012s | decode_to_chunk() plaintext: : input "0x80 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00" 1012s | decode_to_chunk() output: 1012s | 80 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................ 1012s | NSS ike_alg_nss_cbc: CAMELLIA_CBC - enter (nil) 1012s | using IKEv1 IV 1012s | NSS ike_alg_nss_cbc: CAMELLIA_CBC - exit 1012s | verify_bytes() Camellia: 16 bytes with 128-bit key: decrypt: ok 1012s | verify_bytes() Camellia: 16 bytes with 128-bit key: updated CBC IV: ok 1012s ipsec algparse: Camellia: 16 bytes with 128-bit key 1012s | decode_to_chunk() raw_key: input "0x00 11 22 33 44 55 66 77 88 99 AA BB CC DD EE FF" 1012s | decode_to_chunk() output: 1012s | 00 11 22 33 44 55 66 77 88 99 aa bb cc dd ee ff .."3DUfw........ 1012s | CONCATENATE_DATA_AND_BASE: 1012s | target: EXTRACT_KEY_FROM_KEY 1012s | base: base-key@0x2aa278c8350 (16-bytes, AES_KEY_GEN) 1012s | params: 16-bytes@0x3ffd54f7148 1012s | key-offset: 0, key-size: 16 1012s | EXTRACT_KEY_FROM_KEY: 1012s | target: CAMELLIA_CBC 1012s | flags: ENCRYPT+DECRYPT 1012s | key_size: 16-bytes 1012s | base: base-key@0x2aa278cb360 (32-bytes, EXTRACT_KEY_FROM_KEY) 1012s | operation: FLAGS_ONLY 1012s | params: 8-bytes@0x3ffd54f7098 1012s | decode_to_mac() IV: : input "0x00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00" 1012s | decode_to_mac() output: 1012s | 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................ 1012s | decode_to_chunk() new IV: : input "0x14 4D 2B 0F 50 0C 27 B7 EC 2C D1 2D 91 59 6F 37" 1012s | decode_to_chunk() output: 1012s | 14 4d 2b 0f 50 0c 27 b7 ec 2c d1 2d 91 59 6f 37 .M+.P.'..,.-.Yo7 1012s | decode_to_chunk() plaintext: : input "0x00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 01 " 1012s | decode_to_chunk() output: 1012s | 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 01 ................ 1012s | decode_to_chunk() ciphertext: : input "0x14 4D 2B 0F 50 0C 27 B7 EC 2C D1 2D 91 59 6F 37" 1012s | decode_to_chunk() output: 1012s | 14 4d 2b 0f 50 0c 27 b7 ec 2c d1 2d 91 59 6f 37 .M+.P.'..,.-.Yo7 1012s | NSS ike_alg_nss_cbc: CAMELLIA_CBC - enter (nil) 1012s | using IKEv1 IV 1012s | NSS ike_alg_nss_cbc: CAMELLIA_CBC - exit 1012s | verify_bytes() Camellia: 16 bytes with 128-bit key: encrypt: ok 1012s | verify_bytes() Camellia: 16 bytes with 128-bit key: updated CBC IV: ok 1012s | decode_to_mac() IV: : input "0x00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00" 1012s | decode_to_mac() output: 1012s | 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................ 1012s | decode_to_chunk() new IV: : input "0x14 4D 2B 0F 50 0C 27 B7 EC 2C D1 2D 91 59 6F 37" 1012s | decode_to_chunk() output: 1012s | 14 4d 2b 0f 50 0c 27 b7 ec 2c d1 2d 91 59 6f 37 .M+.P.'..,.-.Yo7 1012s | decode_to_chunk() ciphertext: : input "0x14 4D 2B 0F 50 0C 27 B7 EC 2C D1 2D 91 59 6F 37" 1012s | decode_to_chunk() output: 1012s | 14 4d 2b 0f 50 0c 27 b7 ec 2c d1 2d 91 59 6f 37 .M+.P.'..,.-.Yo7 1012s | decode_to_chunk() plaintext: : input "0x00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 01 " 1012s | decode_to_chunk() output: 1012s | 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 01 ................ 1012s | NSS ike_alg_nss_cbc: CAMELLIA_CBC - enter (nil) 1012s | using IKEv1 IV 1012s | NSS ike_alg_nss_cbc: CAMELLIA_CBC - exit 1012s | verify_bytes() Camellia: 16 bytes with 128-bit key: decrypt: ok 1012s | verify_bytes() Camellia: 16 bytes with 128-bit key: updated CBC IV: ok 1012s ipsec algparse: Camellia: 16 bytes with 256-bit key 1012s | decode_to_chunk() raw_key: input "0x00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00" 1012s | decode_to_chunk() output: 1012s | 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................ 1012s | 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................ 1012s | CONCATENATE_DATA_AND_BASE: 1012s | target: EXTRACT_KEY_FROM_KEY 1012s | base: base-key@0x2aa278c8350 (16-bytes, AES_KEY_GEN) 1012s | params: 16-bytes@0x3ffd54f7148 1012s | key-offset: 0, key-size: 32 1012s | EXTRACT_KEY_FROM_KEY: 1012s | target: CAMELLIA_CBC 1012s | flags: ENCRYPT+DECRYPT 1012s | key_size: 32-bytes 1012s | base: base-key@0x2aa278cb360 (48-bytes, EXTRACT_KEY_FROM_KEY) 1012s | operation: FLAGS_ONLY 1012s | params: 8-bytes@0x3ffd54f7098 1012s | decode_to_mac() IV: : input "0x00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00" 1012s | decode_to_mac() output: 1012s | 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................ 1012s | decode_to_chunk() new IV: : input "0xB0 C6 B8 8A EA 51 8A B0 9E 84 72 48 E9 1B 1B 9D" 1012s | decode_to_chunk() output: 1012s | b0 c6 b8 8a ea 51 8a b0 9e 84 72 48 e9 1b 1b 9d .....Q....rH.... 1012s | decode_to_chunk() plaintext: : input "0x80 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00" 1012s | decode_to_chunk() output: 1012s | 80 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................ 1012s | decode_to_chunk() ciphertext: : input "0xB0 C6 B8 8A EA 51 8A B0 9E 84 72 48 E9 1B 1B 9D" 1012s | decode_to_chunk() output: 1012s | b0 c6 b8 8a ea 51 8a b0 9e 84 72 48 e9 1b 1b 9d .....Q....rH.... 1012s | NSS ike_alg_nss_cbc: CAMELLIA_CBC - enter (nil) 1012s | using IKEv1 IV 1012s | NSS ike_alg_nss_cbc: CAMELLIA_CBC - exit 1012s | verify_bytes() Camellia: 16 bytes with 256-bit key: encrypt: ok 1012s | verify_bytes() Camellia: 16 bytes with 256-bit key: updated CBC IV: ok 1012s | decode_to_mac() IV: : input "0x00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00" 1012s | decode_to_mac() output: 1012s | 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................ 1012s | decode_to_chunk() new IV: : input "0xB0 C6 B8 8A EA 51 8A B0 9E 84 72 48 E9 1B 1B 9D" 1012s | decode_to_chunk() output: 1012s | b0 c6 b8 8a ea 51 8a b0 9e 84 72 48 e9 1b 1b 9d .....Q....rH.... 1012s | decode_to_chunk() ciphertext: : input "0xB0 C6 B8 8A EA 51 8A B0 9E 84 72 48 E9 1B 1B 9D" 1012s | decode_to_chunk() output: 1012s | b0 c6 b8 8a ea 51 8a b0 9e 84 72 48 e9 1b 1b 9d .....Q....rH.... 1012s | decode_to_chunk() plaintext: : input "0x80 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00" 1012s | decode_to_chunk() output: 1012s | 80 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................ 1012s | NSS ike_alg_nss_cbc: CAMELLIA_CBC - enter (nil) 1012s | using IKEv1 IV 1012s | NSS ike_alg_nss_cbc: CAMELLIA_CBC - exit 1012s | verify_bytes() Camellia: 16 bytes with 256-bit key: decrypt: ok 1012s | verify_bytes() Camellia: 16 bytes with 256-bit key: updated CBC IV: ok 1012s ipsec algparse: Camellia: 16 bytes with 256-bit key 1012s | decode_to_chunk() raw_key: input "0x00 11 22 33 44 55 66 77 88 99 AA BB CC DD EE FF FF EE DD CC BB AA 99 88 77 66 55 44 33 22 11 00" 1012s | decode_to_chunk() output: 1012s | 00 11 22 33 44 55 66 77 88 99 aa bb cc dd ee ff .."3DUfw........ 1012s | ff ee dd cc bb aa 99 88 77 66 55 44 33 22 11 00 ........wfUD3".. 1012s | CONCATENATE_DATA_AND_BASE: 1012s | target: EXTRACT_KEY_FROM_KEY 1012s | base: base-key@0x2aa278c8350 (16-bytes, AES_KEY_GEN) 1012s | params: 16-bytes@0x3ffd54f7148 1012s | key-offset: 0, key-size: 32 1012s | EXTRACT_KEY_FROM_KEY: 1012s | target: CAMELLIA_CBC 1012s | flags: ENCRYPT+DECRYPT 1012s | key_size: 32-bytes 1012s | base: base-key@0x2aa278cb360 (48-bytes, EXTRACT_KEY_FROM_KEY) 1012s | operation: FLAGS_ONLY 1012s | params: 8-bytes@0x3ffd54f7098 1012s | decode_to_mac() IV: : input "0x00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00" 1012s | decode_to_mac() output: 1012s | 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................ 1012s | decode_to_chunk() new IV: : input "0xCC 39 FF EE 18 56 D3 EB 61 02 5E 93 21 9B 65 23 " 1012s | decode_to_chunk() output: 1012s | cc 39 ff ee 18 56 d3 eb 61 02 5e 93 21 9b 65 23 .9...V..a.^.!.e# 1012s | decode_to_chunk() plaintext: : input "0x00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 01" 1012s | decode_to_chunk() output: 1012s | 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 01 ................ 1012s | decode_to_chunk() ciphertext: : input "0xCC 39 FF EE 18 56 D3 EB 61 02 5E 93 21 9B 65 23 " 1012s | decode_to_chunk() output: 1012s | cc 39 ff ee 18 56 d3 eb 61 02 5e 93 21 9b 65 23 .9...V..a.^.!.e# 1012s | NSS ike_alg_nss_cbc: CAMELLIA_CBC - enter (nil) 1012s | using IKEv1 IV 1012s | NSS ike_alg_nss_cbc: CAMELLIA_CBC - exit 1012s | verify_bytes() Camellia: 16 bytes with 256-bit key: encrypt: ok 1012s | verify_bytes() Camellia: 16 bytes with 256-bit key: updated CBC IV: ok 1012s | decode_to_mac() IV: : input "0x00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00" 1012s | decode_to_mac() output: 1012s | 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................ 1012s | decode_to_chunk() new IV: : input "0xCC 39 FF EE 18 56 D3 EB 61 02 5E 93 21 9B 65 23 " 1012s | decode_to_chunk() output: 1012s | cc 39 ff ee 18 56 d3 eb 61 02 5e 93 21 9b 65 23 .9...V..a.^.!.e# 1012s | decode_to_chunk() ciphertext: : input "0xCC 39 FF EE 18 56 D3 EB 61 02 5E 93 21 9B 65 23 " 1012s | decode_to_chunk() output: 1012s | cc 39 ff ee 18 56 d3 eb 61 02 5e 93 21 9b 65 23 .9...V..a.^.!.e# 1012s | decode_to_chunk() plaintext: : input "0x00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 01" 1012s | decode_to_chunk() output: 1012s | 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 01 ................ 1012s | NSS ike_alg_nss_cbc: CAMELLIA_CBC - enter (nil) 1012s | using IKEv1 IV 1012s | NSS ike_alg_nss_cbc: CAMELLIA_CBC - exit 1012s | verify_bytes() Camellia: 16 bytes with 256-bit key: decrypt: ok 1012s | verify_bytes() Camellia: 16 bytes with 256-bit key: updated CBC IV: ok 1012s ipsec algparse: testing AES_GCM_16: 1012s ipsec algparse: empty string 1012s | decode_to_chunk() raw_key: input "0xcf063a34d4a9a76c2c86787d3f96db71" 1012s | decode_to_chunk() output: 1012s | cf 06 3a 34 d4 a9 a7 6c 2c 86 78 7d 3f 96 db 71 ..:4...l,.x}?..q 1012s | CONCATENATE_DATA_AND_BASE: 1012s | target: EXTRACT_KEY_FROM_KEY 1012s | base: base-key@0x2aa278c8350 (16-bytes, AES_KEY_GEN) 1012s | params: 16-bytes@0x3ffd54f7030 1012s | key-offset: 0, key-size: 16 1012s | EXTRACT_KEY_FROM_KEY: 1012s | target: AES_GCM 1012s | flags: ENCRYPT+DECRYPT 1012s | key_size: 16-bytes 1012s | base: base-key@0x2aa278cb360 (32-bytes, EXTRACT_KEY_FROM_KEY) 1012s | operation: FLAGS_ONLY 1012s | params: 8-bytes@0x3ffd54f6f80 1012s | decode_to_chunk() salted IV: input "0x113b9785971864c83b01c787" 1012s | decode_to_chunk() output: 1012s | 11 3b 97 85 97 18 64 c8 3b 01 c7 87 .;....d.;... 1012s | decode_to_chunk() AAD: input "" 1012s | decode_to_chunk() output: 1012s | 1012s | decode_to_chunk() plaintext: input "" 1012s | decode_to_chunk() output: 1012s | 1012s | decode_to_chunk() ciphertext: input "" 1012s | decode_to_chunk() output: 1012s | 1012s | decode_to_chunk() tag: input "0x72ac8493e3a5228b5d130a69d2510e42" 1012s | decode_to_chunk() output: 1012s | 72 ac 84 93 e3 a5 22 8b 5d 13 0a 69 d2 51 0e 42 r.....".]..i.Q.B 1012s | test_gcm_vector() DECRYPT: aad-size=0 salt-size=4 wire-IV-size=8 text-size=0 tag-size=16 text+tag in: 1012s | 72 ac 84 93 e3 a5 22 8b 5d 13 0a 69 d2 51 0e 42 r.....".]..i.Q.B 1012s | verify_bytes() empty string: output ciphertext: ok 1012s | verify_bytes() empty string: TAG: ok 1012s | test_gcm_vector() text+tag out: 1012s | 72 ac 84 93 e3 a5 22 8b 5d 13 0a 69 d2 51 0e 42 r.....".]..i.Q.B 1012s | test_gcm_vector() ENCRYPT: aad-size=0 salt-size=4 wire-IV-size=8 text-size=0 tag-size=16 text+tag in: 1012s | 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................ 1012s | verify_bytes() empty string: output ciphertext: ok 1012s | verify_bytes() empty string: TAG: ok 1012s | test_gcm_vector() text+tag out: 1012s | 72 ac 84 93 e3 a5 22 8b 5d 13 0a 69 d2 51 0e 42 r.....".]..i.Q.B 1012s ipsec algparse: one block 1012s | decode_to_chunk() raw_key: input "0xe98b72a9881a84ca6b76e0f43e68647a" 1012s | decode_to_chunk() output: 1012s | e9 8b 72 a9 88 1a 84 ca 6b 76 e0 f4 3e 68 64 7a ..r.....kv..>hdz 1012s | CONCATENATE_DATA_AND_BASE: 1012s | target: EXTRACT_KEY_FROM_KEY 1012s | base: base-key@0x2aa278c8350 (16-bytes, AES_KEY_GEN) 1012s | params: 16-bytes@0x3ffd54f7030 1012s | key-offset: 0, key-size: 16 1012s | EXTRACT_KEY_FROM_KEY: 1012s | target: AES_GCM 1012s | flags: ENCRYPT+DECRYPT 1012s | key_size: 16-bytes 1012s | base: base-key@0x2aa278cb360 (32-bytes, EXTRACT_KEY_FROM_KEY) 1012s | operation: FLAGS_ONLY 1012s | params: 8-bytes@0x3ffd54f6f80 1012s | decode_to_chunk() salted IV: input "0x8b23299fde174053f3d652ba" 1012s | decode_to_chunk() output: 1012s | 8b 23 29 9f de 17 40 53 f3 d6 52 ba .#)...@S..R. 1012s | decode_to_chunk() AAD: input "" 1012s | decode_to_chunk() output: 1012s | 1012s | decode_to_chunk() plaintext: input "0x28286a321293253c3e0aa2704a278032" 1012s | decode_to_chunk() output: 1012s | 28 28 6a 32 12 93 25 3c 3e 0a a2 70 4a 27 80 32 ((j2..%<>..pJ'.2 1012s | decode_to_chunk() ciphertext: input "0x5a3c1cf1985dbb8bed818036fdd5ab42" 1012s | decode_to_chunk() output: 1012s | 5a 3c 1c f1 98 5d bb 8b ed 81 80 36 fd d5 ab 42 Z<...].....6...B 1012s | decode_to_chunk() tag: input "0x23c7ab0f952b7091cd324835043b5eb5" 1012s | decode_to_chunk() output: 1012s | 23 c7 ab 0f 95 2b 70 91 cd 32 48 35 04 3b 5e b5 #....+p..2H5.;^. 1012s | test_gcm_vector() DECRYPT: aad-size=0 salt-size=4 wire-IV-size=8 text-size=16 tag-size=16 text+tag in: 1012s | 5a 3c 1c f1 98 5d bb 8b ed 81 80 36 fd d5 ab 42 Z<...].....6...B 1012s | 23 c7 ab 0f 95 2b 70 91 cd 32 48 35 04 3b 5e b5 #....+p..2H5.;^. 1012s | verify_bytes() one block: output ciphertext: ok 1012s | verify_bytes() one block: TAG: ok 1012s | test_gcm_vector() text+tag out: 1012s | 28 28 6a 32 12 93 25 3c 3e 0a a2 70 4a 27 80 32 ((j2..%<>..pJ'.2 1012s | 23 c7 ab 0f 95 2b 70 91 cd 32 48 35 04 3b 5e b5 #....+p..2H5.;^. 1012s | test_gcm_vector() ENCRYPT: aad-size=0 salt-size=4 wire-IV-size=8 text-size=16 tag-size=16 text+tag in: 1012s | 28 28 6a 32 12 93 25 3c 3e 0a a2 70 4a 27 80 32 ((j2..%<>..pJ'.2 1012s | 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................ 1012s | verify_bytes() one block: output ciphertext: ok 1012s | verify_bytes() one block: TAG: ok 1012s | test_gcm_vector() text+tag out: 1012s | 5a 3c 1c f1 98 5d bb 8b ed 81 80 36 fd d5 ab 42 Z<...].....6...B 1012s | 23 c7 ab 0f 95 2b 70 91 cd 32 48 35 04 3b 5e b5 #....+p..2H5.;^. 1012s ipsec algparse: two blocks 1012s | decode_to_chunk() raw_key: input "0xbfd414a6212958a607a0f5d3ab48471d" 1012s | decode_to_chunk() output: 1012s | bf d4 14 a6 21 29 58 a6 07 a0 f5 d3 ab 48 47 1d ....!)X......HG. 1012s | CONCATENATE_DATA_AND_BASE: 1012s | target: EXTRACT_KEY_FROM_KEY 1012s | base: base-key@0x2aa278c8350 (16-bytes, AES_KEY_GEN) 1012s | params: 16-bytes@0x3ffd54f7030 1012s | key-offset: 0, key-size: 16 1012s | EXTRACT_KEY_FROM_KEY: 1012s | target: AES_GCM 1012s | flags: ENCRYPT+DECRYPT 1012s | key_size: 16-bytes 1012s | base: base-key@0x2aa278cb360 (32-bytes, EXTRACT_KEY_FROM_KEY) 1012s | operation: FLAGS_ONLY 1012s | params: 8-bytes@0x3ffd54f6f80 1012s | decode_to_chunk() salted IV: input "0x86d8ea0ab8e40dcc481cd0e2" 1012s | decode_to_chunk() output: 1012s | 86 d8 ea 0a b8 e4 0d cc 48 1c d0 e2 ........H... 1012s | decode_to_chunk() AAD: input "" 1012s | decode_to_chunk() output: 1012s | 1012s | decode_to_chunk() plaintext: input "0xa6b76a066e63392c9443e60272ceaeb9d25c991b0f2e55e2804e168c05ea591a" 1012s | decode_to_chunk() output: 1012s | a6 b7 6a 06 6e 63 39 2c 94 43 e6 02 72 ce ae b9 ..j.nc9,.C..r... 1012s | d2 5c 99 1b 0f 2e 55 e2 80 4e 16 8c 05 ea 59 1a .\....U..N....Y. 1012s | decode_to_chunk() ciphertext: input "0x62171db33193292d930bf6647347652c1ef33316d7feca99d54f1db4fcf513f8" 1012s | decode_to_chunk() output: 1012s | 62 17 1d b3 31 93 29 2d 93 0b f6 64 73 47 65 2c b...1.)-...dsGe, 1012s | 1e f3 33 16 d7 fe ca 99 d5 4f 1d b4 fc f5 13 f8 ..3......O...... 1012s | decode_to_chunk() tag: input "0xc28280aa5c6c7a8bd366f28c1cfd1f6e" 1012s | decode_to_chunk() output: 1012s | c2 82 80 aa 5c 6c 7a 8b d3 66 f2 8c 1c fd 1f 6e ....\lz..f.....n 1012s | test_gcm_vector() DECRYPT: aad-size=0 salt-size=4 wire-IV-size=8 text-size=32 tag-size=16 text+tag in: 1012s | 62 17 1d b3 31 93 29 2d 93 0b f6 64 73 47 65 2c b...1.)-...dsGe, 1012s | 1e f3 33 16 d7 fe ca 99 d5 4f 1d b4 fc f5 13 f8 ..3......O...... 1012s | c2 82 80 aa 5c 6c 7a 8b d3 66 f2 8c 1c fd 1f 6e ....\lz..f.....n 1012s | verify_bytes() two blocks: output ciphertext: ok 1012s | verify_bytes() two blocks: TAG: ok 1012s | test_gcm_vector() text+tag out: 1012s | a6 b7 6a 06 6e 63 39 2c 94 43 e6 02 72 ce ae b9 ..j.nc9,.C..r... 1012s | d2 5c 99 1b 0f 2e 55 e2 80 4e 16 8c 05 ea 59 1a .\....U..N....Y. 1012s | c2 82 80 aa 5c 6c 7a 8b d3 66 f2 8c 1c fd 1f 6e ....\lz..f.....n 1012s | test_gcm_vector() ENCRYPT: aad-size=0 salt-size=4 wire-IV-size=8 text-size=32 tag-size=16 text+tag in: 1012s | a6 b7 6a 06 6e 63 39 2c 94 43 e6 02 72 ce ae b9 ..j.nc9,.C..r... 1012s | d2 5c 99 1b 0f 2e 55 e2 80 4e 16 8c 05 ea 59 1a .\....U..N....Y. 1012s | 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................ 1012s | verify_bytes() two blocks: output ciphertext: ok 1012s | verify_bytes() two blocks: TAG: ok 1012s | test_gcm_vector() text+tag out: 1012s | 62 17 1d b3 31 93 29 2d 93 0b f6 64 73 47 65 2c b...1.)-...dsGe, 1012s | 1e f3 33 16 d7 fe ca 99 d5 4f 1d b4 fc f5 13 f8 ..3......O...... 1012s | c2 82 80 aa 5c 6c 7a 8b d3 66 f2 8c 1c fd 1f 6e ....\lz..f.....n 1012s ipsec algparse: two blocks with associated data 1012s | decode_to_chunk() raw_key: input "0x95bcde70c094f04e3dd8259cafd88ce8" 1012s | decode_to_chunk() output: 1012s | 95 bc de 70 c0 94 f0 4e 3d d8 25 9c af d8 8c e8 ...p...N=.%..... 1012s | CONCATENATE_DATA_AND_BASE: 1012s | target: EXTRACT_KEY_FROM_KEY 1012s | base: base-key@0x2aa278c8350 (16-bytes, AES_KEY_GEN) 1012s | params: 16-bytes@0x3ffd54f7030 1012s | key-offset: 0, key-size: 16 1012s | EXTRACT_KEY_FROM_KEY: 1012s | target: AES_GCM 1012s | flags: ENCRYPT+DECRYPT 1012s | key_size: 16-bytes 1012s | base: base-key@0x2aa278cb360 (32-bytes, EXTRACT_KEY_FROM_KEY) 1012s | operation: FLAGS_ONLY 1012s | params: 8-bytes@0x3ffd54f6f80 1012s | decode_to_chunk() salted IV: input "0x12cf097ad22380432ff40a5c" 1012s | decode_to_chunk() output: 1012s | 12 cf 09 7a d2 23 80 43 2f f4 0a 5c ...z.#.C/..\ 1012s | decode_to_chunk() AAD: input "0xc783a0cca10a8d9fb8d27d69659463f2" 1012s | decode_to_chunk() output: 1012s | c7 83 a0 cc a1 0a 8d 9f b8 d2 7d 69 65 94 63 f2 ..........}ie.c. 1012s | decode_to_chunk() plaintext: input "0x32f51e837a9748838925066d69e87180f34a6437e6b396e5643b34cb2ee4f7b1" 1012s | decode_to_chunk() output: 1012s | 32 f5 1e 83 7a 97 48 83 89 25 06 6d 69 e8 71 80 2...z.H..%.mi.q. 1012s | f3 4a 64 37 e6 b3 96 e5 64 3b 34 cb 2e e4 f7 b1 .Jd7....d;4..... 1012s | decode_to_chunk() ciphertext: input "0x8a023ba477f5b809bddcda8f55e09064d6d88aaec99c1e141212ea5b08503660" 1012s | decode_to_chunk() output: 1012s | 8a 02 3b a4 77 f5 b8 09 bd dc da 8f 55 e0 90 64 ..;.w.......U..d 1012s | d6 d8 8a ae c9 9c 1e 14 12 12 ea 5b 08 50 36 60 ...........[.P6` 1012s | decode_to_chunk() tag: input "0x562f500dae635d60a769b466e15acd1e" 1012s | decode_to_chunk() output: 1012s | 56 2f 50 0d ae 63 5d 60 a7 69 b4 66 e1 5a cd 1e V/P..c]`.i.f.Z.. 1012s | test_gcm_vector() DECRYPT: aad-size=16 salt-size=4 wire-IV-size=8 text-size=32 tag-size=16 text+tag in: 1012s | 8a 02 3b a4 77 f5 b8 09 bd dc da 8f 55 e0 90 64 ..;.w.......U..d 1012s | d6 d8 8a ae c9 9c 1e 14 12 12 ea 5b 08 50 36 60 ...........[.P6` 1012s | 56 2f 50 0d ae 63 5d 60 a7 69 b4 66 e1 5a cd 1e V/P..c]`.i.f.Z.. 1012s | verify_bytes() two blocks with associated data: output ciphertext: ok 1012s | verify_bytes() two blocks with associated data: TAG: ok 1012s | test_gcm_vector() text+tag out: 1012s | 32 f5 1e 83 7a 97 48 83 89 25 06 6d 69 e8 71 80 2...z.H..%.mi.q. 1012s | f3 4a 64 37 e6 b3 96 e5 64 3b 34 cb 2e e4 f7 b1 .Jd7....d;4..... 1012s | 56 2f 50 0d ae 63 5d 60 a7 69 b4 66 e1 5a cd 1e V/P..c]`.i.f.Z.. 1012s | test_gcm_vector() ENCRYPT: aad-size=16 salt-size=4 wire-IV-size=8 text-size=32 tag-size=16 text+tag in: 1012s | 32 f5 1e 83 7a 97 48 83 89 25 06 6d 69 e8 71 80 2...z.H..%.mi.q. 1012s | f3 4a 64 37 e6 b3 96 e5 64 3b 34 cb 2e e4 f7 b1 .Jd7....d;4..... 1012s | 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................ 1012s | verify_bytes() two blocks with associated data: output ciphertext: ok 1012s | verify_bytes() two blocks with associated data: TAG: ok 1012s | test_gcm_vector() text+tag out: 1012s | 8a 02 3b a4 77 f5 b8 09 bd dc da 8f 55 e0 90 64 ..;.w.......U..d 1012s | d6 d8 8a ae c9 9c 1e 14 12 12 ea 5b 08 50 36 60 ...........[.P6` 1012s | 56 2f 50 0d ae 63 5d 60 a7 69 b4 66 e1 5a cd 1e V/P..c]`.i.f.Z.. 1012s ipsec algparse: testing AES_CTR: 1012s ipsec algparse: Encrypting 16 octets using AES-CTR with 128-bit key 1012s | decode_to_chunk() raw_key: input "0x AE 68 52 F8 12 10 67 CC 4B F7 A5 76 55 77 F3 9E" 1012s | decode_to_chunk() output: 1012s | ae 68 52 f8 12 10 67 cc 4b f7 a5 76 55 77 f3 9e .hR...g.K..vUw.. 1012s | CONCATENATE_DATA_AND_BASE: 1012s | target: EXTRACT_KEY_FROM_KEY 1012s | base: base-key@0x2aa278c8350 (16-bytes, AES_KEY_GEN) 1012s | params: 16-bytes@0x3ffd54f7140 1012s | key-offset: 0, key-size: 16 1012s | EXTRACT_KEY_FROM_KEY: 1012s | target: AES_CTR 1012s | flags: ENCRYPT+DECRYPT 1012s | key_size: 16-bytes 1012s | base: base-key@0x2aa278cb360 (32-bytes, EXTRACT_KEY_FROM_KEY) 1012s | operation: FLAGS_ONLY 1012s | params: 8-bytes@0x3ffd54f7090 1012s | decode_to_mac() input counter-block: : input "0x 00 00 00 30 00 00 00 00 00 00 00 00 00 00 00 01" 1012s | decode_to_mac() output: 1012s | 00 00 00 30 00 00 00 00 00 00 00 00 00 00 00 01 ...0............ 1012s | decode_to_chunk() Plaintext: input "0x 53 69 6E 67 6C 65 20 62 6C 6F 63 6B 20 6D 73 67" 1012s | decode_to_chunk() output: 1012s | 53 69 6e 67 6c 65 20 62 6c 6f 63 6b 20 6d 73 67 Single block msg 1012s | decode_to_chunk() Ciphertext: input "0x E4 09 5D 4F B7 A7 B3 79 2D 61 75 A3 26 13 11 B8" 1012s | decode_to_chunk() output: 1012s | e4 09 5d 4f b7 a7 b3 79 2d 61 75 a3 26 13 11 b8 ..]O...y-au.&... 1012s | decode_to_chunk() expected counter-block: : input "0x 00 00 00 30 00 00 00 00 00 00 00 00 00 00 00 02" 1012s | decode_to_chunk() output: 1012s | 00 00 00 30 00 00 00 00 00 00 00 00 00 00 00 02 ...0............ 1012s | cipher_op_ctr_nss() enter AES_CTR 0x2aa278cbd00 use IKEv1 IV wire_iv 0 count 0 1012s | ctr_param: count 32 iv 00000030000000000000000000000001 1012s | cipher_op_ctr_nss() counter-block updated from 0x1 to 0x2 for 16 bytes 1012s | do_aes_ctr: exit 1012s | cipher_op_context_destroy_ctr_nss() 1012s | verify_bytes() Encrypting 16 octets using AES-CTR with 128-bit key: encrypt: ok 1012s | verify_bytes() Encrypting 16 octets using AES-CTR with 128-bit key: counter-block: ok 1012s | decode_to_mac() input counter-block: : input "0x 00 00 00 30 00 00 00 00 00 00 00 00 00 00 00 01" 1012s | decode_to_mac() output: 1012s | 00 00 00 30 00 00 00 00 00 00 00 00 00 00 00 01 ...0............ 1012s | decode_to_chunk() Ciphertext: input "0x E4 09 5D 4F B7 A7 B3 79 2D 61 75 A3 26 13 11 B8" 1012s | decode_to_chunk() output: 1012s | e4 09 5d 4f b7 a7 b3 79 2d 61 75 a3 26 13 11 b8 ..]O...y-au.&... 1012s | decode_to_chunk() Plaintext: input "0x 53 69 6E 67 6C 65 20 62 6C 6F 63 6B 20 6D 73 67" 1012s | decode_to_chunk() output: 1012s | 53 69 6e 67 6c 65 20 62 6c 6f 63 6b 20 6d 73 67 Single block msg 1012s | decode_to_chunk() expected counter-block: : input "0x 00 00 00 30 00 00 00 00 00 00 00 00 00 00 00 02" 1012s | decode_to_chunk() output: 1012s | 00 00 00 30 00 00 00 00 00 00 00 00 00 00 00 02 ...0............ 1012s | cipher_op_ctr_nss() enter AES_CTR 0x2aa278cbd00 use IKEv1 IV wire_iv 0 count 0 1012s | ctr_param: count 32 iv 00000030000000000000000000000001 1012s | cipher_op_ctr_nss() counter-block updated from 0x1 to 0x2 for 16 bytes 1012s | do_aes_ctr: exit 1012s | cipher_op_context_destroy_ctr_nss() 1012s | verify_bytes() Encrypting 16 octets using AES-CTR with 128-bit key: decrypt: ok 1012s | verify_bytes() Encrypting 16 octets using AES-CTR with 128-bit key: counter-block: ok 1012s ipsec algparse: Encrypting 32 octets using AES-CTR with 128-bit key 1012s | decode_to_chunk() raw_key: input "0x 7E 24 06 78 17 FA E0 D7 43 D6 CE 1F 32 53 91 63" 1012s | decode_to_chunk() output: 1012s | 7e 24 06 78 17 fa e0 d7 43 d6 ce 1f 32 53 91 63 ~$.x....C...2S.c 1012s | CONCATENATE_DATA_AND_BASE: 1012s | target: EXTRACT_KEY_FROM_KEY 1012s | base: base-key@0x2aa278c8350 (16-bytes, AES_KEY_GEN) 1012s | params: 16-bytes@0x3ffd54f7140 1012s | key-offset: 0, key-size: 16 1012s | EXTRACT_KEY_FROM_KEY: 1012s | target: AES_CTR 1012s | flags: ENCRYPT+DECRYPT 1012s | key_size: 16-bytes 1012s | base: base-key@0x2aa278cb360 (32-bytes, EXTRACT_KEY_FROM_KEY) 1012s | operation: FLAGS_ONLY 1012s | params: 8-bytes@0x3ffd54f7090 1012s | decode_to_mac() input counter-block: : input "0x 00 6C B6 DB C0 54 3B 59 DA 48 D9 0B 00 00 00 01" 1012s | decode_to_mac() output: 1012s | 00 6c b6 db c0 54 3b 59 da 48 d9 0b 00 00 00 01 .l...T;Y.H...... 1012s | decode_to_chunk() Plaintext: input "0x00 01 02 03 04 05 06 07 08 09 0A 0B 0C 0D 0E 0F10 11 12 13 14 15 16 17 18 19 1A 1B 1C 1D 1E 1F" 1012s | decode_to_chunk() output: 1012s | 00 01 02 03 04 05 06 07 08 09 0a 0b 0c 0d 0e 0f ................ 1012s | 10 11 12 13 14 15 16 17 18 19 1a 1b 1c 1d 1e 1f ................ 1012s | decode_to_chunk() Ciphertext: input "0x51 04 A1 06 16 8A 72 D9 79 0D 41 EE 8E DA D3 88EB 2E 1E FC 46 DA 57 C8 FC E6 30 DF 91 41 BE 28" 1012s | decode_to_chunk() output: 1012s | 51 04 a1 06 16 8a 72 d9 79 0d 41 ee 8e da d3 88 Q.....r.y.A..... 1012s | eb 2e 1e fc 46 da 57 c8 fc e6 30 df 91 41 be 28 ....F.W...0..A.( 1012s | decode_to_chunk() expected counter-block: : input "0x 00 6C B6 DB C0 54 3B 59 DA 48 D9 0B 00 00 00 03" 1012s | decode_to_chunk() output: 1012s | 00 6c b6 db c0 54 3b 59 da 48 d9 0b 00 00 00 03 .l...T;Y.H...... 1012s | cipher_op_ctr_nss() enter AES_CTR 0x2aa278c8220 use IKEv1 IV wire_iv 0 count 0 1012s | ctr_param: count 32 iv 006cb6dbc0543b59da48d90b00000001 1012s | cipher_op_ctr_nss() counter-block updated from 0x1 to 0x3 for 32 bytes 1012s | do_aes_ctr: exit 1012s | cipher_op_context_destroy_ctr_nss() 1012s | verify_bytes() Encrypting 32 octets using AES-CTR with 128-bit key: encrypt: ok 1012s | verify_bytes() Encrypting 32 octets using AES-CTR with 128-bit key: counter-block: ok 1012s | decode_to_mac() input counter-block: : input "0x 00 6C B6 DB C0 54 3B 59 DA 48 D9 0B 00 00 00 01" 1012s | decode_to_mac() output: 1012s | 00 6c b6 db c0 54 3b 59 da 48 d9 0b 00 00 00 01 .l...T;Y.H...... 1012s | decode_to_chunk() Ciphertext: input "0x51 04 A1 06 16 8A 72 D9 79 0D 41 EE 8E DA D3 88EB 2E 1E FC 46 DA 57 C8 FC E6 30 DF 91 41 BE 28" 1012s | decode_to_chunk() output: 1012s | 51 04 a1 06 16 8a 72 d9 79 0d 41 ee 8e da d3 88 Q.....r.y.A..... 1012s | eb 2e 1e fc 46 da 57 c8 fc e6 30 df 91 41 be 28 ....F.W...0..A.( 1012s | decode_to_chunk() Plaintext: input "0x00 01 02 03 04 05 06 07 08 09 0A 0B 0C 0D 0E 0F10 11 12 13 14 15 16 17 18 19 1A 1B 1C 1D 1E 1F" 1012s | decode_to_chunk() output: 1012s | 00 01 02 03 04 05 06 07 08 09 0a 0b 0c 0d 0e 0f ................ 1012s | 10 11 12 13 14 15 16 17 18 19 1a 1b 1c 1d 1e 1f ................ 1012s | decode_to_chunk() expected counter-block: : input "0x 00 6C B6 DB C0 54 3B 59 DA 48 D9 0B 00 00 00 03" 1012s | decode_to_chunk() output: 1012s | 00 6c b6 db c0 54 3b 59 da 48 d9 0b 00 00 00 03 .l...T;Y.H...... 1012s | cipher_op_ctr_nss() enter AES_CTR 0x2aa278c8220 use IKEv1 IV wire_iv 0 count 0 1012s | ctr_param: count 32 iv 006cb6dbc0543b59da48d90b00000001 1012s | cipher_op_ctr_nss() counter-block updated from 0x1 to 0x3 for 32 bytes 1012s | do_aes_ctr: exit 1012s | cipher_op_context_destroy_ctr_nss() 1012s | verify_bytes() Encrypting 32 octets using AES-CTR with 128-bit key: decrypt: ok 1012s | verify_bytes() Encrypting 32 octets using AES-CTR with 128-bit key: counter-block: ok 1012s ipsec algparse: Encrypting 36 octets using AES-CTR with 128-bit key 1012s | decode_to_chunk() raw_key: input "0x 76 91 BE 03 5E 50 20 A8 AC 6E 61 85 29 F9 A0 DC" 1012s | decode_to_chunk() output: 1012s | 76 91 be 03 5e 50 20 a8 ac 6e 61 85 29 f9 a0 dc v...^P ..na.)... 1012s | CONCATENATE_DATA_AND_BASE: 1012s | target: EXTRACT_KEY_FROM_KEY 1012s | base: base-key@0x2aa278c8350 (16-bytes, AES_KEY_GEN) 1012s | params: 16-bytes@0x3ffd54f7140 1012s | key-offset: 0, key-size: 16 1012s | EXTRACT_KEY_FROM_KEY: 1012s | target: AES_CTR 1012s | flags: ENCRYPT+DECRYPT 1012s | key_size: 16-bytes 1012s | base: base-key@0x2aa278cb360 (32-bytes, EXTRACT_KEY_FROM_KEY) 1012s | operation: FLAGS_ONLY 1012s | params: 8-bytes@0x3ffd54f7090 1012s | decode_to_mac() input counter-block: : input "0x 00 E0 01 7B 27 77 7F 3F 4A 17 86 F0 00 00 00 01" 1012s | decode_to_mac() output: 1012s | 00 e0 01 7b 27 77 7f 3f 4a 17 86 f0 00 00 00 01 ...{'w.?J....... 1012s | decode_to_chunk() Plaintext: input "0x00 01 02 03 04 05 06 07 08 09 0A 0B 0C 0D 0E 0F10 11 12 13 14 15 16 17 18 19 1A 1B 1C 1D 1E 1F20 21 22 23" 1012s | decode_to_chunk() output: 1012s | 00 01 02 03 04 05 06 07 08 09 0a 0b 0c 0d 0e 0f ................ 1012s | 10 11 12 13 14 15 16 17 18 19 1a 1b 1c 1d 1e 1f ................ 1012s | 20 21 22 23 !"# 1012s | decode_to_chunk() Ciphertext: input "0xC1 CF 48 A8 9F 2F FD D9 CF 46 52 E9 EF DB 72 D745 40 A4 2B DE 6D 78 36 D5 9A 5C EA AE F3 10 5325 B2 07 2F" 1012s | decode_to_chunk() output: 1012s | c1 cf 48 a8 9f 2f fd d9 cf 46 52 e9 ef db 72 d7 ..H../...FR...r. 1012s | 45 40 a4 2b de 6d 78 36 d5 9a 5c ea ae f3 10 53 E@.+.mx6..\....S 1012s | 25 b2 07 2f %../ 1012s | decode_to_chunk() expected counter-block: : input "0x 00 E0 01 7B 27 77 7F 3F 4A 17 86 F0 00 00 00 04" 1012s | decode_to_chunk() output: 1012s | 00 e0 01 7b 27 77 7f 3f 4a 17 86 f0 00 00 00 04 ...{'w.?J....... 1012s | cipher_op_ctr_nss() enter AES_CTR 0x2aa278c8080 use IKEv1 IV wire_iv 0 count 0 1012s | ctr_param: count 32 iv 00e0017b27777f3f4a1786f000000001 1012s | cipher_op_ctr_nss() counter-block updated from 0x1 to 0x4 for 36 bytes 1012s | do_aes_ctr: exit 1012s | cipher_op_context_destroy_ctr_nss() 1012s | verify_bytes() Encrypting 36 octets using AES-CTR with 128-bit key: encrypt: ok 1012s | verify_bytes() Encrypting 36 octets using AES-CTR with 128-bit key: counter-block: ok 1012s | decode_to_mac() input counter-block: : input "0x 00 E0 01 7B 27 77 7F 3F 4A 17 86 F0 00 00 00 01" 1012s | decode_to_mac() output: 1012s | 00 e0 01 7b 27 77 7f 3f 4a 17 86 f0 00 00 00 01 ...{'w.?J....... 1012s | decode_to_chunk() Ciphertext: input "0xC1 CF 48 A8 9F 2F FD D9 CF 46 52 E9 EF DB 72 D745 40 A4 2B DE 6D 78 36 D5 9A 5C EA AE F3 10 5325 B2 07 2F" 1012s | decode_to_chunk() output: 1012s | c1 cf 48 a8 9f 2f fd d9 cf 46 52 e9 ef db 72 d7 ..H../...FR...r. 1012s | 45 40 a4 2b de 6d 78 36 d5 9a 5c ea ae f3 10 53 E@.+.mx6..\....S 1012s | 25 b2 07 2f %../ 1012s | decode_to_chunk() Plaintext: input "0x00 01 02 03 04 05 06 07 08 09 0A 0B 0C 0D 0E 0F10 11 12 13 14 15 16 17 18 19 1A 1B 1C 1D 1E 1F20 21 22 23" 1012s | decode_to_chunk() output: 1012s | 00 01 02 03 04 05 06 07 08 09 0a 0b 0c 0d 0e 0f ................ 1012s | 10 11 12 13 14 15 16 17 18 19 1a 1b 1c 1d 1e 1f ................ 1012s | 20 21 22 23 !"# 1012s | decode_to_chunk() expected counter-block: : input "0x 00 E0 01 7B 27 77 7F 3F 4A 17 86 F0 00 00 00 04" 1012s | decode_to_chunk() output: 1012s | 00 e0 01 7b 27 77 7f 3f 4a 17 86 f0 00 00 00 04 ...{'w.?J....... 1012s | cipher_op_ctr_nss() enter AES_CTR 0x2aa278c8080 use IKEv1 IV wire_iv 0 count 0 1012s | ctr_param: count 32 iv 00e0017b27777f3f4a1786f000000001 1012s | cipher_op_ctr_nss() counter-block updated from 0x1 to 0x4 for 36 bytes 1012s | do_aes_ctr: exit 1012s | cipher_op_context_destroy_ctr_nss() 1012s | verify_bytes() Encrypting 36 octets using AES-CTR with 128-bit key: decrypt: ok 1012s | verify_bytes() Encrypting 36 octets using AES-CTR with 128-bit key: counter-block: ok 1012s ipsec algparse: Encrypting 16 octets using AES-CTR with 192-bit key 1012s | decode_to_chunk() raw_key: input "0x16 AF 5B 14 5F C9 F5 79 C1 75 F9 3E 3B FB 0E ED86 3D 06 CC FD B7 85 15" 1012s | decode_to_chunk() output: 1012s | 16 af 5b 14 5f c9 f5 79 c1 75 f9 3e 3b fb 0e ed ..[._..y.u.>;... 1012s | 86 3d 06 cc fd b7 85 15 .=...... 1012s | CONCATENATE_DATA_AND_BASE: 1012s | target: EXTRACT_KEY_FROM_KEY 1012s | base: base-key@0x2aa278c8350 (16-bytes, AES_KEY_GEN) 1012s | params: 16-bytes@0x3ffd54f7140 1012s | key-offset: 0, key-size: 24 1012s | EXTRACT_KEY_FROM_KEY: 1012s | target: AES_CTR 1012s | flags: ENCRYPT+DECRYPT 1012s | key_size: 24-bytes 1012s | base: base-key@0x2aa278cb360 (40-bytes, EXTRACT_KEY_FROM_KEY) 1012s | operation: FLAGS_ONLY 1012s | params: 8-bytes@0x3ffd54f7090 1012s | decode_to_mac() input counter-block: : input "0x 00 00 00 48 36 73 3C 14 7D 6D 93 CB 00 00 00 01" 1012s | decode_to_mac() output: 1012s | 00 00 00 48 36 73 3c 14 7d 6d 93 cb 00 00 00 01 ...H6s<.}m...... 1012s | decode_to_chunk() Plaintext: input "0x 53 69 6E 67 6C 65 20 62 6C 6F 63 6B 20 6D 73 67" 1012s | decode_to_chunk() output: 1012s | 53 69 6e 67 6c 65 20 62 6c 6f 63 6b 20 6d 73 67 Single block msg 1012s | decode_to_chunk() Ciphertext: input "0x 4B 55 38 4F E2 59 C9 C8 4E 79 35 A0 03 CB E9 28" 1012s | decode_to_chunk() output: 1012s | 4b 55 38 4f e2 59 c9 c8 4e 79 35 a0 03 cb e9 28 KU8O.Y..Ny5....( 1012s | decode_to_chunk() expected counter-block: : input "0x 00 00 00 48 36 73 3C 14 7D 6D 93 CB 00 00 00 02" 1012s | decode_to_chunk() output: 1012s | 00 00 00 48 36 73 3c 14 7d 6d 93 cb 00 00 00 02 ...H6s<.}m...... 1012s | cipher_op_ctr_nss() enter AES_CTR 0x2aa278cbce0 use IKEv1 IV wire_iv 0 count 0 1012s | ctr_param: count 32 iv 0000004836733c147d6d93cb00000001 1012s | cipher_op_ctr_nss() counter-block updated from 0x1 to 0x2 for 16 bytes 1012s | do_aes_ctr: exit 1012s | cipher_op_context_destroy_ctr_nss() 1012s | verify_bytes() Encrypting 16 octets using AES-CTR with 192-bit key: encrypt: ok 1012s | verify_bytes() Encrypting 16 octets using AES-CTR with 192-bit key: counter-block: ok 1012s | decode_to_mac() input counter-block: : input "0x 00 00 00 48 36 73 3C 14 7D 6D 93 CB 00 00 00 01" 1012s | decode_to_mac() output: 1012s | 00 00 00 48 36 73 3c 14 7d 6d 93 cb 00 00 00 01 ...H6s<.}m...... 1012s | decode_to_chunk() Ciphertext: input "0x 4B 55 38 4F E2 59 C9 C8 4E 79 35 A0 03 CB E9 28" 1012s | decode_to_chunk() output: 1012s | 4b 55 38 4f e2 59 c9 c8 4e 79 35 a0 03 cb e9 28 KU8O.Y..Ny5....( 1012s | decode_to_chunk() Plaintext: input "0x 53 69 6E 67 6C 65 20 62 6C 6F 63 6B 20 6D 73 67" 1012s | decode_to_chunk() output: 1012s | 53 69 6e 67 6c 65 20 62 6c 6f 63 6b 20 6d 73 67 Single block msg 1012s | decode_to_chunk() expected counter-block: : input "0x 00 00 00 48 36 73 3C 14 7D 6D 93 CB 00 00 00 02" 1012s | decode_to_chunk() output: 1012s | 00 00 00 48 36 73 3c 14 7d 6d 93 cb 00 00 00 02 ...H6s<.}m...... 1012s | cipher_op_ctr_nss() enter AES_CTR 0x2aa278cbce0 use IKEv1 IV wire_iv 0 count 0 1012s | ctr_param: count 32 iv 0000004836733c147d6d93cb00000001 1012s | cipher_op_ctr_nss() counter-block updated from 0x1 to 0x2 for 16 bytes 1012s | do_aes_ctr: exit 1012s | cipher_op_context_destroy_ctr_nss() 1012s | verify_bytes() Encrypting 16 octets using AES-CTR with 192-bit key: decrypt: ok 1012s | verify_bytes() Encrypting 16 octets using AES-CTR with 192-bit key: counter-block: ok 1012s ipsec algparse: Encrypting 32 octets using AES-CTR with 192-bit key 1012s | decode_to_chunk() raw_key: input "0x7C 5C B2 40 1B 3D C3 3C 19 E7 34 08 19 E0 F6 9C67 8C 3D B8 E6 F6 A9 1A" 1012s | decode_to_chunk() output: 1012s | 7c 5c b2 40 1b 3d c3 3c 19 e7 34 08 19 e0 f6 9c |\.@.=.<..4..... 1012s | 67 8c 3d b8 e6 f6 a9 1a g.=..... 1012s | CONCATENATE_DATA_AND_BASE: 1012s | target: EXTRACT_KEY_FROM_KEY 1012s | base: base-key@0x2aa278c8350 (16-bytes, AES_KEY_GEN) 1012s | params: 16-bytes@0x3ffd54f7140 1012s | key-offset: 0, key-size: 24 1012s | EXTRACT_KEY_FROM_KEY: 1012s | target: AES_CTR 1012s | flags: ENCRYPT+DECRYPT 1012s | key_size: 24-bytes 1012s | base: base-key@0x2aa278cb360 (40-bytes, EXTRACT_KEY_FROM_KEY) 1012s | operation: FLAGS_ONLY 1012s | params: 8-bytes@0x3ffd54f7090 1012s | decode_to_mac() input counter-block: : input "0x 00 96 B0 3B 02 0C 6E AD C2 CB 50 0D 00 00 00 01" 1012s | decode_to_mac() output: 1012s | 00 96 b0 3b 02 0c 6e ad c2 cb 50 0d 00 00 00 01 ...;..n...P..... 1012s | decode_to_chunk() Plaintext: input "0x00 01 02 03 04 05 06 07 08 09 0A 0B 0C 0D 0E 0F10 11 12 13 14 15 16 17 18 19 1A 1B 1C 1D 1E 1F" 1012s | decode_to_chunk() output: 1012s | 00 01 02 03 04 05 06 07 08 09 0a 0b 0c 0d 0e 0f ................ 1012s | 10 11 12 13 14 15 16 17 18 19 1a 1b 1c 1d 1e 1f ................ 1012s | decode_to_chunk() Ciphertext: input "0x45 32 43 FC 60 9B 23 32 7E DF AA FA 71 31 CD 9F84 90 70 1C 5A D4 A7 9C FC 1F E0 FF 42 F4 FB 00" 1012s | decode_to_chunk() output: 1012s | 45 32 43 fc 60 9b 23 32 7e df aa fa 71 31 cd 9f E2C.`.#2~...q1.. 1012s | 84 90 70 1c 5a d4 a7 9c fc 1f e0 ff 42 f4 fb 00 ..p.Z.......B... 1012s | decode_to_chunk() expected counter-block: : input "0x 00 96 B0 3B 02 0C 6E AD C2 CB 50 0D 00 00 00 03" 1012s | decode_to_chunk() output: 1012s | 00 96 b0 3b 02 0c 6e ad c2 cb 50 0d 00 00 00 03 ...;..n...P..... 1012s | cipher_op_ctr_nss() enter AES_CTR 0x2aa278c8080 use IKEv1 IV wire_iv 0 count 0 1012s | ctr_param: count 32 iv 0096b03b020c6eadc2cb500d00000001 1012s | cipher_op_ctr_nss() counter-block updated from 0x1 to 0x3 for 32 bytes 1012s | do_aes_ctr: exit 1012s | cipher_op_context_destroy_ctr_nss() 1012s | verify_bytes() Encrypting 32 octets using AES-CTR with 192-bit key: encrypt: ok 1012s | verify_bytes() Encrypting 32 octets using AES-CTR with 192-bit key: counter-block: ok 1012s | decode_to_mac() input counter-block: : input "0x 00 96 B0 3B 02 0C 6E AD C2 CB 50 0D 00 00 00 01" 1012s | decode_to_mac() output: 1012s | 00 96 b0 3b 02 0c 6e ad c2 cb 50 0d 00 00 00 01 ...;..n...P..... 1012s | decode_to_chunk() Ciphertext: input "0x45 32 43 FC 60 9B 23 32 7E DF AA FA 71 31 CD 9F84 90 70 1C 5A D4 A7 9C FC 1F E0 FF 42 F4 FB 00" 1012s | decode_to_chunk() output: 1012s | 45 32 43 fc 60 9b 23 32 7e df aa fa 71 31 cd 9f E2C.`.#2~...q1.. 1012s | 84 90 70 1c 5a d4 a7 9c fc 1f e0 ff 42 f4 fb 00 ..p.Z.......B... 1012s | decode_to_chunk() Plaintext: input "0x00 01 02 03 04 05 06 07 08 09 0A 0B 0C 0D 0E 0F10 11 12 13 14 15 16 17 18 19 1A 1B 1C 1D 1E 1F" 1012s | decode_to_chunk() output: 1012s | 00 01 02 03 04 05 06 07 08 09 0a 0b 0c 0d 0e 0f ................ 1012s | 10 11 12 13 14 15 16 17 18 19 1a 1b 1c 1d 1e 1f ................ 1012s | decode_to_chunk() expected counter-block: : input "0x 00 96 B0 3B 02 0C 6E AD C2 CB 50 0D 00 00 00 03" 1012s | decode_to_chunk() output: 1012s | 00 96 b0 3b 02 0c 6e ad c2 cb 50 0d 00 00 00 03 ...;..n...P..... 1012s | cipher_op_ctr_nss() enter AES_CTR 0x2aa278c8080 use IKEv1 IV wire_iv 0 count 0 1012s | ctr_param: count 32 iv 0096b03b020c6eadc2cb500d00000001 1012s | cipher_op_ctr_nss() counter-block updated from 0x1 to 0x3 for 32 bytes 1012s | do_aes_ctr: exit 1012s | cipher_op_context_destroy_ctr_nss() 1012s | verify_bytes() Encrypting 32 octets using AES-CTR with 192-bit key: decrypt: ok 1012s | verify_bytes() Encrypting 32 octets using AES-CTR with 192-bit key: counter-block: ok 1012s ipsec algparse: Encrypting 36 octets using AES-CTR with 192-bit key 1012s | decode_to_chunk() raw_key: input "0x02 BF 39 1E E8 EC B1 59 B9 59 61 7B 09 65 27 9BF5 9B 60 A7 86 D3 E0 FE" 1012s | decode_to_chunk() output: 1012s | 02 bf 39 1e e8 ec b1 59 b9 59 61 7b 09 65 27 9b ..9....Y.Ya{.e'. 1012s | f5 9b 60 a7 86 d3 e0 fe ..`..... 1012s | CONCATENATE_DATA_AND_BASE: 1012s | target: EXTRACT_KEY_FROM_KEY 1012s | base: base-key@0x2aa278c8350 (16-bytes, AES_KEY_GEN) 1012s | params: 16-bytes@0x3ffd54f7140 1012s | key-offset: 0, key-size: 24 1012s | EXTRACT_KEY_FROM_KEY: 1012s | target: AES_CTR 1012s | flags: ENCRYPT+DECRYPT 1012s | key_size: 24-bytes 1012s | base: base-key@0x2aa278cb360 (40-bytes, EXTRACT_KEY_FROM_KEY) 1012s | operation: FLAGS_ONLY 1012s | params: 8-bytes@0x3ffd54f7090 1012s | decode_to_mac() input counter-block: : input "0x 00 07 BD FD 5C BD 60 27 8D CC 09 12 00 00 00 01" 1012s | decode_to_mac() output: 1012s | 00 07 bd fd 5c bd 60 27 8d cc 09 12 00 00 00 01 ....\.`'........ 1012s | decode_to_chunk() Plaintext: input "0x00 01 02 03 04 05 06 07 08 09 0A 0B 0C 0D 0E 0F10 11 12 13 14 15 16 17 18 19 1A 1B 1C 1D 1E 1F20 21 22 23" 1012s | decode_to_chunk() output: 1012s | 00 01 02 03 04 05 06 07 08 09 0a 0b 0c 0d 0e 0f ................ 1012s | 10 11 12 13 14 15 16 17 18 19 1a 1b 1c 1d 1e 1f ................ 1012s | 20 21 22 23 !"# 1012s | decode_to_chunk() Ciphertext: input "0x96 89 3F C5 5E 5C 72 2F 54 0B 7D D1 DD F7 E7 58D2 88 BC 95 C6 91 65 88 45 36 C8 11 66 2F 21 88AB EE 09 35" 1012s | decode_to_chunk() output: 1012s | 96 89 3f c5 5e 5c 72 2f 54 0b 7d d1 dd f7 e7 58 ..?.^\r/T.}....X 1012s | d2 88 bc 95 c6 91 65 88 45 36 c8 11 66 2f 21 88 ......e.E6..f/!. 1012s | ab ee 09 35 ...5 1012s | decode_to_chunk() expected counter-block: : input "0x 00 07 BD FD 5C BD 60 27 8D CC 09 12 00 00 00 04" 1012s | decode_to_chunk() output: 1012s | 00 07 bd fd 5c bd 60 27 8d cc 09 12 00 00 00 04 ....\.`'........ 1012s | cipher_op_ctr_nss() enter AES_CTR 0x2aa278c8080 use IKEv1 IV wire_iv 0 count 0 1012s | ctr_param: count 32 iv 0007bdfd5cbd60278dcc091200000001 1012s | cipher_op_ctr_nss() counter-block updated from 0x1 to 0x4 for 36 bytes 1012s | do_aes_ctr: exit 1012s | cipher_op_context_destroy_ctr_nss() 1012s | verify_bytes() Encrypting 36 octets using AES-CTR with 192-bit key: encrypt: ok 1012s | verify_bytes() Encrypting 36 octets using AES-CTR with 192-bit key: counter-block: ok 1012s | decode_to_mac() input counter-block: : input "0x 00 07 BD FD 5C BD 60 27 8D CC 09 12 00 00 00 01" 1012s | decode_to_mac() output: 1012s | 00 07 bd fd 5c bd 60 27 8d cc 09 12 00 00 00 01 ....\.`'........ 1012s | decode_to_chunk() Ciphertext: input "0x96 89 3F C5 5E 5C 72 2F 54 0B 7D D1 DD F7 E7 58D2 88 BC 95 C6 91 65 88 45 36 C8 11 66 2F 21 88AB EE 09 35" 1012s | decode_to_chunk() output: 1012s | 96 89 3f c5 5e 5c 72 2f 54 0b 7d d1 dd f7 e7 58 ..?.^\r/T.}....X 1012s | d2 88 bc 95 c6 91 65 88 45 36 c8 11 66 2f 21 88 ......e.E6..f/!. 1012s | ab ee 09 35 ...5 1012s | decode_to_chunk() Plaintext: input "0x00 01 02 03 04 05 06 07 08 09 0A 0B 0C 0D 0E 0F10 11 12 13 14 15 16 17 18 19 1A 1B 1C 1D 1E 1F20 21 22 23" 1012s | decode_to_chunk() output: 1012s | 00 01 02 03 04 05 06 07 08 09 0a 0b 0c 0d 0e 0f ................ 1012s | 10 11 12 13 14 15 16 17 18 19 1a 1b 1c 1d 1e 1f ................ 1012s | 20 21 22 23 !"# 1012s | decode_to_chunk() expected counter-block: : input "0x 00 07 BD FD 5C BD 60 27 8D CC 09 12 00 00 00 04" 1012s | decode_to_chunk() output: 1012s | 00 07 bd fd 5c bd 60 27 8d cc 09 12 00 00 00 04 ....\.`'........ 1012s | cipher_op_ctr_nss() enter AES_CTR 0x2aa278c8080 use IKEv1 IV wire_iv 0 count 0 1012s | ctr_param: count 32 iv 0007bdfd5cbd60278dcc091200000001 1012s | cipher_op_ctr_nss() counter-block updated from 0x1 to 0x4 for 36 bytes 1012s | do_aes_ctr: exit 1012s | cipher_op_context_destroy_ctr_nss() 1012s | verify_bytes() Encrypting 36 octets using AES-CTR with 192-bit key: decrypt: ok 1012s | verify_bytes() Encrypting 36 octets using AES-CTR with 192-bit key: counter-block: ok 1012s ipsec algparse: Encrypting 16 octets using AES-CTR with 256-bit key 1012s | decode_to_chunk() raw_key: input "0x77 6B EF F2 85 1D B0 6F 4C 8A 05 42 C8 69 6F 6C6A 81 AF 1E EC 96 B4 D3 7F C1 D6 89 E6 C1 C1 04" 1012s | decode_to_chunk() output: 1012s | 77 6b ef f2 85 1d b0 6f 4c 8a 05 42 c8 69 6f 6c wk.....oL..B.iol 1012s | 6a 81 af 1e ec 96 b4 d3 7f c1 d6 89 e6 c1 c1 04 j............... 1012s | CONCATENATE_DATA_AND_BASE: 1012s | target: EXTRACT_KEY_FROM_KEY 1012s | base: base-key@0x2aa278c8350 (16-bytes, AES_KEY_GEN) 1012s | params: 16-bytes@0x3ffd54f7140 1012s | key-offset: 0, key-size: 32 1012s | EXTRACT_KEY_FROM_KEY: 1012s | target: AES_CTR 1012s | flags: ENCRYPT+DECRYPT 1012s | key_size: 32-bytes 1012s | base: base-key@0x2aa278cb360 (48-bytes, EXTRACT_KEY_FROM_KEY) 1012s | operation: FLAGS_ONLY 1012s | params: 8-bytes@0x3ffd54f7090 1012s | decode_to_mac() input counter-block: : input "0x 00 00 00 60 DB 56 72 C9 7A A8 F0 B2 00 00 00 01" 1012s | decode_to_mac() output: 1012s | 00 00 00 60 db 56 72 c9 7a a8 f0 b2 00 00 00 01 ...`.Vr.z....... 1012s | decode_to_chunk() Plaintext: input "0x 53 69 6E 67 6C 65 20 62 6C 6F 63 6B 20 6D 73 67" 1012s | decode_to_chunk() output: 1012s | 53 69 6e 67 6c 65 20 62 6c 6f 63 6b 20 6d 73 67 Single block msg 1012s | decode_to_chunk() Ciphertext: input "0x 14 5A D0 1D BF 82 4E C7 56 08 63 DC 71 E3 E0 C0" 1012s | decode_to_chunk() output: 1012s | 14 5a d0 1d bf 82 4e c7 56 08 63 dc 71 e3 e0 c0 .Z....N.V.c.q... 1012s | decode_to_chunk() expected counter-block: : input "0x 00 00 00 60 DB 56 72 C9 7A A8 F0 B2 00 00 00 02" 1012s | decode_to_chunk() output: 1012s | 00 00 00 60 db 56 72 c9 7a a8 f0 b2 00 00 00 02 ...`.Vr.z....... 1012s | cipher_op_ctr_nss() enter AES_CTR 0x2aa278cbce0 use IKEv1 IV wire_iv 0 count 0 1012s | ctr_param: count 32 iv 00000060db5672c97aa8f0b200000001 1012s | cipher_op_ctr_nss() counter-block updated from 0x1 to 0x2 for 16 bytes 1012s | do_aes_ctr: exit 1012s | cipher_op_context_destroy_ctr_nss() 1012s | verify_bytes() Encrypting 16 octets using AES-CTR with 256-bit key: encrypt: ok 1012s | verify_bytes() Encrypting 16 octets using AES-CTR with 256-bit key: counter-block: ok 1012s | decode_to_mac() input counter-block: : input "0x 00 00 00 60 DB 56 72 C9 7A A8 F0 B2 00 00 00 01" 1012s | decode_to_mac() output: 1012s | 00 00 00 60 db 56 72 c9 7a a8 f0 b2 00 00 00 01 ...`.Vr.z....... 1012s | decode_to_chunk() Ciphertext: input "0x 14 5A D0 1D BF 82 4E C7 56 08 63 DC 71 E3 E0 C0" 1012s | decode_to_chunk() output: 1012s | 14 5a d0 1d bf 82 4e c7 56 08 63 dc 71 e3 e0 c0 .Z....N.V.c.q... 1012s | decode_to_chunk() Plaintext: input "0x 53 69 6E 67 6C 65 20 62 6C 6F 63 6B 20 6D 73 67" 1012s | decode_to_chunk() output: 1012s | 53 69 6e 67 6c 65 20 62 6c 6f 63 6b 20 6d 73 67 Single block msg 1012s | decode_to_chunk() expected counter-block: : input "0x 00 00 00 60 DB 56 72 C9 7A A8 F0 B2 00 00 00 02" 1012s | decode_to_chunk() output: 1012s | 00 00 00 60 db 56 72 c9 7a a8 f0 b2 00 00 00 02 ...`.Vr.z....... 1012s | cipher_op_ctr_nss() enter AES_CTR 0x2aa278cbce0 use IKEv1 IV wire_iv 0 count 0 1012s | ctr_param: count 32 iv 00000060db5672c97aa8f0b200000001 1012s | cipher_op_ctr_nss() counter-block updated from 0x1 to 0x2 for 16 bytes 1012s | do_aes_ctr: exit 1012s | cipher_op_context_destroy_ctr_nss() 1012s | verify_bytes() Encrypting 16 octets using AES-CTR with 256-bit key: decrypt: ok 1012s | verify_bytes() Encrypting 16 octets using AES-CTR with 256-bit key: counter-block: ok 1012s ipsec algparse: Encrypting 32 octets using AES-CTR with 256-bit key 1012s | decode_to_chunk() raw_key: input "0xF6 D6 6D 6B D5 2D 59 BB 07 96 36 58 79 EF F8 86C6 6D D5 1A 5B 6A 99 74 4B 50 59 0C 87 A2 38 84" 1012s | decode_to_chunk() output: 1012s | f6 d6 6d 6b d5 2d 59 bb 07 96 36 58 79 ef f8 86 ..mk.-Y...6Xy... 1012s | c6 6d d5 1a 5b 6a 99 74 4b 50 59 0c 87 a2 38 84 .m..[j.tKPY...8. 1012s | CONCATENATE_DATA_AND_BASE: 1012s | target: EXTRACT_KEY_FROM_KEY 1012s | base: base-key@0x2aa278c8350 (16-bytes, AES_KEY_GEN) 1012s | params: 16-bytes@0x3ffd54f7140 1012s | key-offset: 0, key-size: 32 1012s | EXTRACT_KEY_FROM_KEY: 1012s | target: AES_CTR 1012s | flags: ENCRYPT+DECRYPT 1012s | key_size: 32-bytes 1012s | base: base-key@0x2aa278cb360 (48-bytes, EXTRACT_KEY_FROM_KEY) 1012s | operation: FLAGS_ONLY 1012s | params: 8-bytes@0x3ffd54f7090 1012s | decode_to_mac() input counter-block: : input "0x 00 FA AC 24 C1 58 5E F1 5A 43 D8 75 00 00 00 01" 1012s | decode_to_mac() output: 1012s | 00 fa ac 24 c1 58 5e f1 5a 43 d8 75 00 00 00 01 ...$.X^.ZC.u.... 1012s | decode_to_chunk() Plaintext: input "0x00 01 02 03 04 05 06 07 08 09 0A 0B 0C 0D 0E 0F10 11 12 13 14 15 16 17 18 19 1A 1B 1C 1D 1E 1F" 1012s | decode_to_chunk() output: 1012s | 00 01 02 03 04 05 06 07 08 09 0a 0b 0c 0d 0e 0f ................ 1012s | 10 11 12 13 14 15 16 17 18 19 1a 1b 1c 1d 1e 1f ................ 1012s | decode_to_chunk() Ciphertext: input "0xF0 5E 23 1B 38 94 61 2C 49 EE 00 0B 80 4E B2 A9B8 30 6B 50 8F 83 9D 6A 55 30 83 1D 93 44 AF 1C" 1012s | decode_to_chunk() output: 1012s | f0 5e 23 1b 38 94 61 2c 49 ee 00 0b 80 4e b2 a9 .^#.8.a,I....N.. 1012s | b8 30 6b 50 8f 83 9d 6a 55 30 83 1d 93 44 af 1c .0kP...jU0...D.. 1012s | decode_to_chunk() expected counter-block: : input "0x 00 FA AC 24 C1 58 5E F1 5A 43 D8 75 00 00 00 03" 1012s | decode_to_chunk() output: 1012s | 00 fa ac 24 c1 58 5e f1 5a 43 d8 75 00 00 00 03 ...$.X^.ZC.u.... 1012s | cipher_op_ctr_nss() enter AES_CTR 0x2aa278c8080 use IKEv1 IV wire_iv 0 count 0 1012s | ctr_param: count 32 iv 00faac24c1585ef15a43d87500000001 1012s | cipher_op_ctr_nss() counter-block updated from 0x1 to 0x3 for 32 bytes 1012s | do_aes_ctr: exit 1012s | cipher_op_context_destroy_ctr_nss() 1012s | verify_bytes() Encrypting 32 octets using AES-CTR with 256-bit key: encrypt: ok 1012s | verify_bytes() Encrypting 32 octets using AES-CTR with 256-bit key: counter-block: ok 1012s | decode_to_mac() input counter-block: : input "0x 00 FA AC 24 C1 58 5E F1 5A 43 D8 75 00 00 00 01" 1012s | decode_to_mac() output: 1012s | 00 fa ac 24 c1 58 5e f1 5a 43 d8 75 00 00 00 01 ...$.X^.ZC.u.... 1012s | decode_to_chunk() Ciphertext: input "0xF0 5E 23 1B 38 94 61 2C 49 EE 00 0B 80 4E B2 A9B8 30 6B 50 8F 83 9D 6A 55 30 83 1D 93 44 AF 1C" 1012s | decode_to_chunk() output: 1012s | f0 5e 23 1b 38 94 61 2c 49 ee 00 0b 80 4e b2 a9 .^#.8.a,I....N.. 1012s | b8 30 6b 50 8f 83 9d 6a 55 30 83 1d 93 44 af 1c .0kP...jU0...D.. 1012s | decode_to_chunk() Plaintext: input "0x00 01 02 03 04 05 06 07 08 09 0A 0B 0C 0D 0E 0F10 11 12 13 14 15 16 17 18 19 1A 1B 1C 1D 1E 1F" 1012s | decode_to_chunk() output: 1012s | 00 01 02 03 04 05 06 07 08 09 0a 0b 0c 0d 0e 0f ................ 1012s | 10 11 12 13 14 15 16 17 18 19 1a 1b 1c 1d 1e 1f ................ 1012s | decode_to_chunk() expected counter-block: : input "0x 00 FA AC 24 C1 58 5E F1 5A 43 D8 75 00 00 00 03" 1012s | decode_to_chunk() output: 1012s | 00 fa ac 24 c1 58 5e f1 5a 43 d8 75 00 00 00 03 ...$.X^.ZC.u.... 1012s | cipher_op_ctr_nss() enter AES_CTR 0x2aa278c8080 use IKEv1 IV wire_iv 0 count 0 1012s | ctr_param: count 32 iv 00faac24c1585ef15a43d87500000001 1012s | cipher_op_ctr_nss() counter-block updated from 0x1 to 0x3 for 32 bytes 1012s | do_aes_ctr: exit 1012s | cipher_op_context_destroy_ctr_nss() 1012s | verify_bytes() Encrypting 32 octets using AES-CTR with 256-bit key: decrypt: ok 1012s | verify_bytes() Encrypting 32 octets using AES-CTR with 256-bit key: counter-block: ok 1012s ipsec algparse: Encrypting 36 octets using AES-CTR with 256-bit key 1012s | decode_to_chunk() raw_key: input "0xFF 7A 61 7C E6 91 48 E4 F1 72 6E 2F 43 58 1D E2AA 62 D9 F8 05 53 2E DF F1 EE D6 87 FB 54 15 3D" 1012s | decode_to_chunk() output: 1012s | ff 7a 61 7c e6 91 48 e4 f1 72 6e 2f 43 58 1d e2 .za|..H..rn/CX.. 1012s | aa 62 d9 f8 05 53 2e df f1 ee d6 87 fb 54 15 3d .b...S.......T.= 1012s | CONCATENATE_DATA_AND_BASE: 1012s | target: EXTRACT_KEY_FROM_KEY 1012s | base: base-key@0x2aa278c8350 (16-bytes, AES_KEY_GEN) 1012s | params: 16-bytes@0x3ffd54f7140 1012s | key-offset: 0, key-size: 32 1012s | EXTRACT_KEY_FROM_KEY: 1012s | target: AES_CTR 1012s | flags: ENCRYPT+DECRYPT 1012s | key_size: 32-bytes 1012s | base: base-key@0x2aa278cb360 (48-bytes, EXTRACT_KEY_FROM_KEY) 1012s | operation: FLAGS_ONLY 1012s | params: 8-bytes@0x3ffd54f7090 1012s | decode_to_mac() input counter-block: : input "0x 00 1C C5 B7 51 A5 1D 70 A1 C1 11 48 00 00 00 01" 1012s | decode_to_mac() output: 1012s | 00 1c c5 b7 51 a5 1d 70 a1 c1 11 48 00 00 00 01 ....Q..p...H.... 1012s | decode_to_chunk() Plaintext: input "0x00 01 02 03 04 05 06 07 08 09 0A 0B 0C 0D 0E 0F10 11 12 13 14 15 16 17 18 19 1A 1B 1C 1D 1E 1F20 21 22 23" 1012s | decode_to_chunk() output: 1012s | 00 01 02 03 04 05 06 07 08 09 0a 0b 0c 0d 0e 0f ................ 1012s | 10 11 12 13 14 15 16 17 18 19 1a 1b 1c 1d 1e 1f ................ 1012s | 20 21 22 23 !"# 1012s | decode_to_chunk() Ciphertext: input "0xEB 6C 52 82 1D 0B BB F7 CE 75 94 46 2A CA 4F AAB4 07 DF 86 65 69 FD 07 F4 8C C0 B5 83 D6 07 1F1E C0 E6 B8" 1012s | decode_to_chunk() output: 1012s | eb 6c 52 82 1d 0b bb f7 ce 75 94 46 2a ca 4f aa .lR......u.F*.O. 1012s | b4 07 df 86 65 69 fd 07 f4 8c c0 b5 83 d6 07 1f ....ei.......... 1012s | 1e c0 e6 b8 .... 1012s | decode_to_chunk() expected counter-block: : input "0x 00 1C C5 B7 51 A5 1D 70 A1 C1 11 48 00 00 00 04" 1012s | decode_to_chunk() output: 1012s | 00 1c c5 b7 51 a5 1d 70 a1 c1 11 48 00 00 00 04 ....Q..p...H.... 1012s | cipher_op_ctr_nss() enter AES_CTR 0x2aa278c8080 use IKEv1 IV wire_iv 0 count 0 1012s | ctr_param: count 32 iv 001cc5b751a51d70a1c1114800000001 1012s | cipher_op_ctr_nss() counter-block updated from 0x1 to 0x4 for 36 bytes 1012s | do_aes_ctr: exit 1012s | cipher_op_context_destroy_ctr_nss() 1012s | verify_bytes() Encrypting 36 octets using AES-CTR with 256-bit key: encrypt: ok 1012s | verify_bytes() Encrypting 36 octets using AES-CTR with 256-bit key: counter-block: ok 1012s | decode_to_mac() input counter-block: : input "0x 00 1C C5 B7 51 A5 1D 70 A1 C1 11 48 00 00 00 01" 1012s | decode_to_mac() output: 1012s | 00 1c c5 b7 51 a5 1d 70 a1 c1 11 48 00 00 00 01 ....Q..p...H.... 1012s | decode_to_chunk() Ciphertext: input "0xEB 6C 52 82 1D 0B BB F7 CE 75 94 46 2A CA 4F AAB4 07 DF 86 65 69 FD 07 F4 8C C0 B5 83 D6 07 1F1E C0 E6 B8" 1012s | decode_to_chunk() output: 1012s | eb 6c 52 82 1d 0b bb f7 ce 75 94 46 2a ca 4f aa .lR......u.F*.O. 1012s | b4 07 df 86 65 69 fd 07 f4 8c c0 b5 83 d6 07 1f ....ei.......... 1012s | 1e c0 e6 b8 .... 1012s | decode_to_chunk() Plaintext: input "0x00 01 02 03 04 05 06 07 08 09 0A 0B 0C 0D 0E 0F10 11 12 13 14 15 16 17 18 19 1A 1B 1C 1D 1E 1F20 21 22 23" 1012s | decode_to_chunk() output: 1012s | 00 01 02 03 04 05 06 07 08 09 0a 0b 0c 0d 0e 0f ................ 1012s | 10 11 12 13 14 15 16 17 18 19 1a 1b 1c 1d 1e 1f ................ 1012s | 20 21 22 23 !"# 1012s | decode_to_chunk() expected counter-block: : input "0x 00 1C C5 B7 51 A5 1D 70 A1 C1 11 48 00 00 00 04" 1012s | decode_to_chunk() output: 1012s | 00 1c c5 b7 51 a5 1d 70 a1 c1 11 48 00 00 00 04 ....Q..p...H.... 1012s | cipher_op_ctr_nss() enter AES_CTR 0x2aa278c8080 use IKEv1 IV wire_iv 0 count 0 1012s | ctr_param: count 32 iv 001cc5b751a51d70a1c1114800000001 1012s | cipher_op_ctr_nss() counter-block updated from 0x1 to 0x4 for 36 bytes 1012s | do_aes_ctr: exit 1012s | cipher_op_context_destroy_ctr_nss() 1012s | verify_bytes() Encrypting 36 octets using AES-CTR with 256-bit key: decrypt: ok 1012s | verify_bytes() Encrypting 36 octets using AES-CTR with 256-bit key: counter-block: ok 1012s ipsec algparse: testing AES_CBC: 1012s ipsec algparse: Encrypting 16 bytes (1 block) using AES-CBC with 128-bit key 1012s | decode_to_chunk() raw_key: input "0x06a9214036b8a15b512e03d534120006" 1012s | decode_to_chunk() output: 1012s | 06 a9 21 40 36 b8 a1 5b 51 2e 03 d5 34 12 00 06 ..!@6..[Q...4... 1012s | CONCATENATE_DATA_AND_BASE: 1012s | target: EXTRACT_KEY_FROM_KEY 1012s | base: base-key@0x2aa278c8350 (16-bytes, AES_KEY_GEN) 1012s | params: 16-bytes@0x3ffd54f7148 1012s | key-offset: 0, key-size: 16 1012s | EXTRACT_KEY_FROM_KEY: 1012s | target: AES_CBC 1012s | flags: ENCRYPT+DECRYPT 1012s | key_size: 16-bytes 1012s | base: base-key@0x2aa278cb360 (32-bytes, EXTRACT_KEY_FROM_KEY) 1012s | operation: FLAGS_ONLY 1012s | params: 8-bytes@0x3ffd54f7098 1012s | decode_to_mac() IV: : input "0x3dafba429d9eb430b422da802c9fac41" 1012s | decode_to_mac() output: 1012s | 3d af ba 42 9d 9e b4 30 b4 22 da 80 2c 9f ac 41 =..B...0."..,..A 1012s | decode_to_chunk() new IV: : input "0xe353779c1079aeb82708942dbe77181a" 1012s | decode_to_chunk() output: 1012s | e3 53 77 9c 10 79 ae b8 27 08 94 2d be 77 18 1a .Sw..y..'..-.w.. 1012s | decode_to_chunk() plaintext: : input "Single block msg" 1012s | decode_to_chunk() output: 1012s | 53 69 6e 67 6c 65 20 62 6c 6f 63 6b 20 6d 73 67 Single block msg 1012s | decode_to_chunk() ciphertext: : input "0xe353779c1079aeb82708942dbe77181a" 1012s | decode_to_chunk() output: 1012s | e3 53 77 9c 10 79 ae b8 27 08 94 2d be 77 18 1a .Sw..y..'..-.w.. 1012s | NSS ike_alg_nss_cbc: AES_CBC - enter (nil) 1012s | using IKEv1 IV 1012s | NSS ike_alg_nss_cbc: AES_CBC - exit 1012s | verify_bytes() Encrypting 16 bytes (1 block) using AES-CBC with 128-bit key: encrypt: ok 1012s | verify_bytes() Encrypting 16 bytes (1 block) using AES-CBC with 128-bit key: updated CBC IV: ok 1012s | decode_to_mac() IV: : input "0x3dafba429d9eb430b422da802c9fac41" 1012s | decode_to_mac() output: 1012s | 3d af ba 42 9d 9e b4 30 b4 22 da 80 2c 9f ac 41 =..B...0."..,..A 1012s | decode_to_chunk() new IV: : input "0xe353779c1079aeb82708942dbe77181a" 1012s | decode_to_chunk() output: 1012s | e3 53 77 9c 10 79 ae b8 27 08 94 2d be 77 18 1a .Sw..y..'..-.w.. 1012s | decode_to_chunk() ciphertext: : input "0xe353779c1079aeb82708942dbe77181a" 1012s | decode_to_chunk() output: 1012s | e3 53 77 9c 10 79 ae b8 27 08 94 2d be 77 18 1a .Sw..y..'..-.w.. 1012s | decode_to_chunk() plaintext: : input "Single block msg" 1012s | decode_to_chunk() output: 1012s | 53 69 6e 67 6c 65 20 62 6c 6f 63 6b 20 6d 73 67 Single block msg 1012s | NSS ike_alg_nss_cbc: AES_CBC - enter (nil) 1012s | using IKEv1 IV 1012s | NSS ike_alg_nss_cbc: AES_CBC - exit 1012s | verify_bytes() Encrypting 16 bytes (1 block) using AES-CBC with 128-bit key: decrypt: ok 1012s | verify_bytes() Encrypting 16 bytes (1 block) using AES-CBC with 128-bit key: updated CBC IV: ok 1012s ipsec algparse: Encrypting 32 bytes (2 blocks) using AES-CBC with 128-bit key 1012s | decode_to_chunk() raw_key: input "0xc286696d887c9aa0611bbb3e2025a45a" 1012s | decode_to_chunk() output: 1012s | c2 86 69 6d 88 7c 9a a0 61 1b bb 3e 20 25 a4 5a ..im.|..a..> %.Z 1012s | CONCATENATE_DATA_AND_BASE: 1012s | target: EXTRACT_KEY_FROM_KEY 1012s | base: base-key@0x2aa278c8350 (16-bytes, AES_KEY_GEN) 1012s | params: 16-bytes@0x3ffd54f7148 1012s | key-offset: 0, key-size: 16 1012s | EXTRACT_KEY_FROM_KEY: 1012s | target: AES_CBC 1012s | flags: ENCRYPT+DECRYPT 1012s | key_size: 16-bytes 1012s | base: base-key@0x2aa278cb360 (32-bytes, EXTRACT_KEY_FROM_KEY) 1012s | operation: FLAGS_ONLY 1012s | params: 8-bytes@0x3ffd54f7098 1012s | decode_to_mac() IV: : input "0x562e17996d093d28ddb3ba695a2e6f58" 1012s | decode_to_mac() output: 1012s | 56 2e 17 99 6d 09 3d 28 dd b3 ba 69 5a 2e 6f 58 V...m.=(...iZ.oX 1012s | decode_to_chunk() new IV: : input "0xd296cd94c2cccf8a3a863028b5e1dc0a7586602d253cfff91b8266bea6d61ab1" 1012s | decode_to_chunk() output: 1012s | d2 96 cd 94 c2 cc cf 8a 3a 86 30 28 b5 e1 dc 0a ........:.0(.... 1012s | 75 86 60 2d 25 3c ff f9 1b 82 66 be a6 d6 1a b1 u.`-%<....f..... 1012s | decode_to_chunk() plaintext: : input "0x000102030405060708090a0b0c0d0e0f101112131415161718191a1b1c1d1e1f" 1012s | decode_to_chunk() output: 1012s | 00 01 02 03 04 05 06 07 08 09 0a 0b 0c 0d 0e 0f ................ 1012s | 10 11 12 13 14 15 16 17 18 19 1a 1b 1c 1d 1e 1f ................ 1012s | decode_to_chunk() ciphertext: : input "0xd296cd94c2cccf8a3a863028b5e1dc0a7586602d253cfff91b8266bea6d61ab1" 1012s | decode_to_chunk() output: 1012s | d2 96 cd 94 c2 cc cf 8a 3a 86 30 28 b5 e1 dc 0a ........:.0(.... 1012s | 75 86 60 2d 25 3c ff f9 1b 82 66 be a6 d6 1a b1 u.`-%<....f..... 1012s | NSS ike_alg_nss_cbc: AES_CBC - enter (nil) 1012s | using IKEv1 IV 1012s | NSS ike_alg_nss_cbc: AES_CBC - exit 1012s | verify_bytes() Encrypting 32 bytes (2 blocks) using AES-CBC with 128-bit key: encrypt: ok 1012s | verify_bytes() Encrypting 32 bytes (2 blocks) using AES-CBC with 128-bit key: updated CBC IV: ok 1012s | decode_to_mac() IV: : input "0x562e17996d093d28ddb3ba695a2e6f58" 1012s | decode_to_mac() output: 1012s | 56 2e 17 99 6d 09 3d 28 dd b3 ba 69 5a 2e 6f 58 V...m.=(...iZ.oX 1012s | decode_to_chunk() new IV: : input "0xd296cd94c2cccf8a3a863028b5e1dc0a7586602d253cfff91b8266bea6d61ab1" 1012s | decode_to_chunk() output: 1012s | d2 96 cd 94 c2 cc cf 8a 3a 86 30 28 b5 e1 dc 0a ........:.0(.... 1012s | 75 86 60 2d 25 3c ff f9 1b 82 66 be a6 d6 1a b1 u.`-%<....f..... 1012s | decode_to_chunk() ciphertext: : input "0xd296cd94c2cccf8a3a863028b5e1dc0a7586602d253cfff91b8266bea6d61ab1" 1012s | decode_to_chunk() output: 1012s | d2 96 cd 94 c2 cc cf 8a 3a 86 30 28 b5 e1 dc 0a ........:.0(.... 1012s | 75 86 60 2d 25 3c ff f9 1b 82 66 be a6 d6 1a b1 u.`-%<....f..... 1012s | decode_to_chunk() plaintext: : input "0x000102030405060708090a0b0c0d0e0f101112131415161718191a1b1c1d1e1f" 1012s | decode_to_chunk() output: 1012s | 00 01 02 03 04 05 06 07 08 09 0a 0b 0c 0d 0e 0f ................ 1012s | 10 11 12 13 14 15 16 17 18 19 1a 1b 1c 1d 1e 1f ................ 1012s | NSS ike_alg_nss_cbc: AES_CBC - enter (nil) 1012s | using IKEv1 IV 1012s | NSS ike_alg_nss_cbc: AES_CBC - exit 1012s | verify_bytes() Encrypting 32 bytes (2 blocks) using AES-CBC with 128-bit key: decrypt: ok 1012s | verify_bytes() Encrypting 32 bytes (2 blocks) using AES-CBC with 128-bit key: updated CBC IV: ok 1012s ipsec algparse: Encrypting 48 bytes (3 blocks) using AES-CBC with 128-bit key 1012s | decode_to_chunk() raw_key: input "0x6c3ea0477630ce21a2ce334aa746c2cd" 1012s | decode_to_chunk() output: 1012s | 6c 3e a0 47 76 30 ce 21 a2 ce 33 4a a7 46 c2 cd l>.Gv0.!..3J.F.. 1012s | CONCATENATE_DATA_AND_BASE: 1012s | target: EXTRACT_KEY_FROM_KEY 1012s | base: base-key@0x2aa278c8350 (16-bytes, AES_KEY_GEN) 1012s | params: 16-bytes@0x3ffd54f7148 1012s | key-offset: 0, key-size: 16 1012s | EXTRACT_KEY_FROM_KEY: 1012s | target: AES_CBC 1012s | flags: ENCRYPT+DECRYPT 1012s | key_size: 16-bytes 1012s | base: base-key@0x2aa278cb360 (32-bytes, EXTRACT_KEY_FROM_KEY) 1012s | operation: FLAGS_ONLY 1012s | params: 8-bytes@0x3ffd54f7098 1012s | decode_to_mac() IV: : input "0xc782dc4c098c66cbd9cd27d825682c81" 1012s | decode_to_mac() output: 1012s | c7 82 dc 4c 09 8c 66 cb d9 cd 27 d8 25 68 2c 81 ...L..f...'.%h,. 1012s | decode_to_chunk() new IV: : input "0xd0a02b3836451753d493665d33f0e8862dea54cdb293abc7506939276772f8d5021c19216bad525c8579695d83ba2684" 1012s | decode_to_chunk() output: 1012s | d0 a0 2b 38 36 45 17 53 d4 93 66 5d 33 f0 e8 86 ..+86E.S..f]3... 1012s | 2d ea 54 cd b2 93 ab c7 50 69 39 27 67 72 f8 d5 -.T.....Pi9'gr.. 1012s | 02 1c 19 21 6b ad 52 5c 85 79 69 5d 83 ba 26 84 ...!k.R\.yi]..&. 1012s | decode_to_chunk() plaintext: : input "This is a 48-byte message (exactly 3 AES blocks)" 1012s | decode_to_chunk() output: 1012s | 54 68 69 73 20 69 73 20 61 20 34 38 2d 62 79 74 This is a 48-byt 1012s | 65 20 6d 65 73 73 61 67 65 20 28 65 78 61 63 74 e message (exact 1012s | 6c 79 20 33 20 41 45 53 20 62 6c 6f 63 6b 73 29 ly 3 AES blocks) 1012s | decode_to_chunk() ciphertext: : input "0xd0a02b3836451753d493665d33f0e8862dea54cdb293abc7506939276772f8d5021c19216bad525c8579695d83ba2684" 1012s | decode_to_chunk() output: 1012s | d0 a0 2b 38 36 45 17 53 d4 93 66 5d 33 f0 e8 86 ..+86E.S..f]3... 1012s | 2d ea 54 cd b2 93 ab c7 50 69 39 27 67 72 f8 d5 -.T.....Pi9'gr.. 1012s | 02 1c 19 21 6b ad 52 5c 85 79 69 5d 83 ba 26 84 ...!k.R\.yi]..&. 1012s | NSS ike_alg_nss_cbc: AES_CBC - enter (nil) 1012s | using IKEv1 IV 1012s | NSS ike_alg_nss_cbc: AES_CBC - exit 1012s | verify_bytes() Encrypting 48 bytes (3 blocks) using AES-CBC with 128-bit key: encrypt: ok 1012s | verify_bytes() Encrypting 48 bytes (3 blocks) using AES-CBC with 128-bit key: updated CBC IV: ok 1012s | decode_to_mac() IV: : input "0xc782dc4c098c66cbd9cd27d825682c81" 1012s | decode_to_mac() output: 1012s | c7 82 dc 4c 09 8c 66 cb d9 cd 27 d8 25 68 2c 81 ...L..f...'.%h,. 1012s | decode_to_chunk() new IV: : input "0xd0a02b3836451753d493665d33f0e8862dea54cdb293abc7506939276772f8d5021c19216bad525c8579695d83ba2684" 1012s | decode_to_chunk() output: 1012s | d0 a0 2b 38 36 45 17 53 d4 93 66 5d 33 f0 e8 86 ..+86E.S..f]3... 1012s | 2d ea 54 cd b2 93 ab c7 50 69 39 27 67 72 f8 d5 -.T.....Pi9'gr.. 1012s | 02 1c 19 21 6b ad 52 5c 85 79 69 5d 83 ba 26 84 ...!k.R\.yi]..&. 1012s | decode_to_chunk() ciphertext: : input "0xd0a02b3836451753d493665d33f0e8862dea54cdb293abc7506939276772f8d5021c19216bad525c8579695d83ba2684" 1012s | decode_to_chunk() output: 1012s | d0 a0 2b 38 36 45 17 53 d4 93 66 5d 33 f0 e8 86 ..+86E.S..f]3... 1012s | 2d ea 54 cd b2 93 ab c7 50 69 39 27 67 72 f8 d5 -.T.....Pi9'gr.. 1012s | 02 1c 19 21 6b ad 52 5c 85 79 69 5d 83 ba 26 84 ...!k.R\.yi]..&. 1012s | decode_to_chunk() plaintext: : input "This is a 48-byte message (exactly 3 AES blocks)" 1012s | decode_to_chunk() output: 1012s | 54 68 69 73 20 69 73 20 61 20 34 38 2d 62 79 74 This is a 48-byt 1012s | 65 20 6d 65 73 73 61 67 65 20 28 65 78 61 63 74 e message (exact 1012s | 6c 79 20 33 20 41 45 53 20 62 6c 6f 63 6b 73 29 ly 3 AES blocks) 1012s | NSS ike_alg_nss_cbc: AES_CBC - enter (nil) 1012s | using IKEv1 IV 1012s | NSS ike_alg_nss_cbc: AES_CBC - exit 1012s | verify_bytes() Encrypting 48 bytes (3 blocks) using AES-CBC with 128-bit key: decrypt: ok 1012s | verify_bytes() Encrypting 48 bytes (3 blocks) using AES-CBC with 128-bit key: updated CBC IV: ok 1012s ipsec algparse: Encrypting 64 bytes (4 blocks) using AES-CBC with 128-bit key 1012s | decode_to_chunk() raw_key: input "0x56e47a38c5598974bc46903dba290349" 1012s | decode_to_chunk() output: 1012s | 56 e4 7a 38 c5 59 89 74 bc 46 90 3d ba 29 03 49 V.z8.Y.t.F.=.).I 1012s | CONCATENATE_DATA_AND_BASE: 1012s | target: EXTRACT_KEY_FROM_KEY 1012s | base: base-key@0x2aa278c8350 (16-bytes, AES_KEY_GEN) 1012s | params: 16-bytes@0x3ffd54f7148 1012s | key-offset: 0, key-size: 16 1012s | EXTRACT_KEY_FROM_KEY: 1012s | target: AES_CBC 1012s | flags: ENCRYPT+DECRYPT 1012s | key_size: 16-bytes 1012s | base: base-key@0x2aa278cb360 (32-bytes, EXTRACT_KEY_FROM_KEY) 1012s | operation: FLAGS_ONLY 1012s | params: 8-bytes@0x3ffd54f7098 1012s | decode_to_mac() IV: : input "0x8ce82eefbea0da3c44699ed7db51b7d9" 1012s | decode_to_mac() output: 1012s | 8c e8 2e ef be a0 da 3c 44 69 9e d7 db 51 b7 d9 ...........U 1012s | decode_to_chunk() plaintext: : input "0xa0a1a2a3a4a5a6a7a8a9aaabacadaeafb0b1b2b3b4b5b6b7b8b9babbbcbdbebfc0c1c2c3c4c5c6c7c8c9cacbcccdcecfd0d1d2d3d4d5d6d7d8d9dadbdcdddedf" 1012s | decode_to_chunk() output: 1012s | a0 a1 a2 a3 a4 a5 a6 a7 a8 a9 aa ab ac ad ae af ................ 1012s | b0 b1 b2 b3 b4 b5 b6 b7 b8 b9 ba bb bc bd be bf ................ 1012s | c0 c1 c2 c3 c4 c5 c6 c7 c8 c9 ca cb cc cd ce cf ................ 1012s | d0 d1 d2 d3 d4 d5 d6 d7 d8 d9 da db dc dd de df ................ 1012s | decode_to_chunk() ciphertext: : input "0xc30e32ffedc0774e6aff6af0869f71aa0f3af07a9a31a9c684db207eb0ef8e4e35907aa632c3ffdf868bb7b29d3d46ad83ce9f9a102ee99d49a53e87f4c3da55" 1012s | decode_to_chunk() output: 1012s | c3 0e 32 ff ed c0 77 4e 6a ff 6a f0 86 9f 71 aa ..2...wNj.j...q. 1012s | 0f 3a f0 7a 9a 31 a9 c6 84 db 20 7e b0 ef 8e 4e .:.z.1.... ~...N 1012s | 35 90 7a a6 32 c3 ff df 86 8b b7 b2 9d 3d 46 ad 5.z.2........=F. 1012s | 83 ce 9f 9a 10 2e e9 9d 49 a5 3e 87 f4 c3 da 55 ........I.>....U 1012s | NSS ike_alg_nss_cbc: AES_CBC - enter (nil) 1012s | using IKEv1 IV 1012s | NSS ike_alg_nss_cbc: AES_CBC - exit 1012s | verify_bytes() Encrypting 64 bytes (4 blocks) using AES-CBC with 128-bit key: encrypt: ok 1012s | verify_bytes() Encrypting 64 bytes (4 blocks) using AES-CBC with 128-bit key: updated CBC IV: ok 1012s | decode_to_mac() IV: : input "0x8ce82eefbea0da3c44699ed7db51b7d9" 1012s | decode_to_mac() output: 1012s | 8c e8 2e ef be a0 da 3c 44 69 9e d7 db 51 b7 d9 ...........U 1012s | decode_to_chunk() ciphertext: : input "0xc30e32ffedc0774e6aff6af0869f71aa0f3af07a9a31a9c684db207eb0ef8e4e35907aa632c3ffdf868bb7b29d3d46ad83ce9f9a102ee99d49a53e87f4c3da55" 1012s | decode_to_chunk() output: 1012s | c3 0e 32 ff ed c0 77 4e 6a ff 6a f0 86 9f 71 aa ..2...wNj.j...q. 1012s | 0f 3a f0 7a 9a 31 a9 c6 84 db 20 7e b0 ef 8e 4e .:.z.1.... ~...N 1012s | 35 90 7a a6 32 c3 ff df 86 8b b7 b2 9d 3d 46 ad 5.z.2........=F. 1012s | 83 ce 9f 9a 10 2e e9 9d 49 a5 3e 87 f4 c3 da 55 ........I.>....U 1012s | decode_to_chunk() plaintext: : input "0xa0a1a2a3a4a5a6a7a8a9aaabacadaeafb0b1b2b3b4b5b6b7b8b9babbbcbdbebfc0c1c2c3c4c5c6c7c8c9cacbcccdcecfd0d1d2d3d4d5d6d7d8d9dadbdcdddedf" 1012s | decode_to_chunk() output: 1012s | a0 a1 a2 a3 a4 a5 a6 a7 a8 a9 aa ab ac ad ae af ................ 1012s | b0 b1 b2 b3 b4 b5 b6 b7 b8 b9 ba bb bc bd be bf ................ 1012s | c0 c1 c2 c3 c4 c5 c6 c7 c8 c9 ca cb cc cd ce cf ................ 1012s | d0 d1 d2 d3 d4 d5 d6 d7 d8 d9 da db dc dd de df ................ 1012s | NSS ike_alg_nss_cbc: AES_CBC - enter (nil) 1012s | using IKEv1 IV 1012s | NSS ike_alg_nss_cbc: AES_CBC - exit 1012s | verify_bytes() Encrypting 64 bytes (4 blocks) using AES-CBC with 128-bit key: decrypt: ok 1012s | verify_bytes() Encrypting 64 bytes (4 blocks) using AES-CBC with 128-bit key: updated CBC IV: ok 1012s ipsec algparse: testing AES_XCBC: 1012s ipsec algparse: RFC 3566 Test Case 1: AES-XCBC-MAC-96 with 0-byte input 1012s | decode_to_chunk() test_prf_vector: input "0x000102030405060708090a0b0c0d0e0f" 1012s | decode_to_chunk() output: 1012s | 00 01 02 03 04 05 06 07 08 09 0a 0b 0c 0d 0e 0f ................ 1012s | decode_to_chunk() test_prf_vector: input "" 1012s | decode_to_chunk() output: 1012s | 1012s | decode_to_chunk() test_prf_vector: input "0x75f0251d528ac01c4573dfd584d79f29" 1012s | decode_to_chunk() output: 1012s | 75 f0 25 1d 52 8a c0 1c 45 73 df d5 84 d7 9f 29 u.%.R...Es.....) 1012s | PRF chunk interface PRF AES_XCBC init key hunk 0x2aa278cb690 (length 16) 1012s | 00 01 02 03 04 05 06 07 08 09 0a 0b 0c 0d 0e 0f ................ 1012s | CONCATENATE_DATA_AND_BASE: 1012s | target: EXTRACT_KEY_FROM_KEY 1012s | base: base-key@0x2aa278c8350 (16-bytes, AES_KEY_GEN) 1012s | params: 16-bytes@0x3ffd54f7050 1012s | key-offset: 0, key-size: 16 1012s | EXTRACT_KEY_FROM_KEY: 1012s | target: EXTRACT_KEY_FROM_KEY 1012s | key_size: 16-bytes 1012s | base: base-key@0x2aa278cb360 (32-bytes, EXTRACT_KEY_FROM_KEY) 1012s | operation: FLAGS_ONLY 1012s | params: 8-bytes@0x3ffd54f6f60 1012s | XCBC: Key 16=16 just right 1012s | key-offset: 0, key-size: 16 1012s | EXTRACT_KEY_FROM_KEY: 1012s | target: AES_ECB 1012s | flags: SIGN 1012s | key_size: 16-bytes 1012s | base: base-key@0x2aa278c9c70 (16-bytes, EXTRACT_KEY_FROM_KEY) 1012s | operation: FLAGS_ONLY 1012s | params: 8-bytes@0x3ffd54f6f10 1012s | PRF chunk interface PRF AES_XCBC 0x2aa278c82f0 1012s | PRF chunk interface PRF AES_XCBC update message (0x2aa278c9ba0 length 0) 1012s | 1012s | XCBC: data 1012s | 1012s | K extracting all 16 bytes of key@0x2aa278cb360 1012s | K: symkey-key@0x2aa278cb360 (16-bytes, AES_ECB) 1012s | sizeof bytes 16 1012s | wrapper: (SECItemType)1111695477: 36 f7 24 82 ad db a1 a3 86 75 9f 31 e8 d4 78 4a 1012s | K extracted len 16 bytes at 0x2aa278cbf20 1012s | unwrapped: 1012s | 00 01 02 03 04 05 06 07 08 09 0a 0b 0c 0d 0e 0f ................ 1012s | XCBC: K: 1012s | 00 01 02 03 04 05 06 07 08 09 0a 0b 0c 0d 0e 0f ................ 1012s | XCBC: K1 1012s | c3 52 80 57 54 23 7f 31 1a c0 ff f4 e3 e0 3e 78 .R.WT#.1......>x 1012s | CONCATENATE_DATA_AND_BASE: 1012s | target: EXTRACT_KEY_FROM_KEY 1012s | base: base-key@0x2aa278c8350 (16-bytes, AES_KEY_GEN) 1012s | params: 16-bytes@0x3ffd54f6de8 1012s | key-offset: 0, key-size: 16 1012s | EXTRACT_KEY_FROM_KEY: 1012s | target: AES_ECB 1012s | flags: SIGN 1012s | key_size: 16-bytes 1012s | base: base-key@0x2aa278cc0b0 (32-bytes, EXTRACT_KEY_FROM_KEY) 1012s | operation: FLAGS_ONLY 1012s | params: 8-bytes@0x3ffd54f6df0 1012s | Computing E[0] using K3 1012s | XCBC: K3 1012s | c1 a7 ab a1 a2 3a 94 06 58 07 a0 8c c8 ee d0 6e .....:..X......n 1012s | XCBC: E[n-1] 1012s | 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................ 1012s | XCBC: M[n] 1012s | 1012s | XCBC: M[n] 1012s | 1012s | XCBC: M[n]:80...^E[n-1]^K3 1012s | 41 a7 ab a1 a2 3a 94 06 58 07 a0 8c c8 ee d0 6e A....:..X......n 1012s | XCBC: MAC 1012s | 75 f0 25 1d 52 8a c0 1c 45 73 df d5 84 d7 9f 29 u.%.R...Es.....) 1012s | PRF chunk interface PRF AES_XCBC final length 16 1012s | 75 f0 25 1d 52 8a c0 1c 45 73 df d5 84 d7 9f 29 u.%.R...Es.....) 1012s | chunk output 1012s | 75 f0 25 1d 52 8a c0 1c 45 73 df d5 84 d7 9f 29 u.%.R...Es.....) 1012s | verify_bytes() RFC 3566 Test Case 1: AES-XCBC-MAC-96 with 0-byte input: prf OUT: ok 1012s | CONCATENATE_DATA_AND_BASE: 1012s | target: EXTRACT_KEY_FROM_KEY 1012s | base: base-key@0x2aa278c8350 (16-bytes, AES_KEY_GEN) 1012s | params: 16-bytes@0x3ffd54f71b8 1012s | key-offset: 0, key-size: 16 1012s | EXTRACT_KEY_FROM_KEY: 1012s | target: EXTRACT_KEY_FROM_KEY 1012s | key_size: 16-bytes 1012s | base: base-key@0x2aa278c9c70 (32-bytes, EXTRACT_KEY_FROM_KEY) 1012s | operation: FLAGS_ONLY 1012s | params: 8-bytes@0x3ffd54f70c8 1012s | PRF symkey interface PRF AES_XCBC init key symkey-key@0x2aa278cb360 (size 16) 1012s | PRF symkey interface: key symkey-key@0x2aa278cb360 (16-bytes, EXTRACT_KEY_FROM_KEY) 1012s | XCBC: Key 16=16 just right 1012s | key-offset: 0, key-size: 16 1012s | EXTRACT_KEY_FROM_KEY: 1012s | target: AES_ECB 1012s | flags: SIGN 1012s | key_size: 16-bytes 1012s | base: base-key@0x2aa278cb360 (16-bytes, EXTRACT_KEY_FROM_KEY) 1012s | operation: FLAGS_ONLY 1012s | params: 8-bytes@0x3ffd54f6fd0 1012s | PRF symkey interface PRF AES_XCBC 0x2aa278c82f0 1012s | PRF symkey interface PRF AES_XCBC update symkey message-key@(nil) (size 0) 1012s | PRF symkey interface: symkey message-key@NULL 1012s | symkey message NULL key has no bytes 1012s | XCBC: data 1012s | 1012s | K extracting all 16 bytes of key@0x2aa278c9c70 1012s | K: symkey-key@0x2aa278c9c70 (16-bytes, AES_ECB) 1012s | sizeof bytes 16 1012s | wrapper: (SECItemType)1023: 36 f7 24 82 ad db a1 a3 86 75 9f 31 e8 d4 78 4a 1012s | K extracted len 16 bytes at 0x2aa278cbf20 1012s | unwrapped: 1012s | 00 01 02 03 04 05 06 07 08 09 0a 0b 0c 0d 0e 0f ................ 1012s | XCBC: K: 1012s | 00 01 02 03 04 05 06 07 08 09 0a 0b 0c 0d 0e 0f ................ 1012s | XCBC: K1 1012s | c3 52 80 57 54 23 7f 31 1a c0 ff f4 e3 e0 3e 78 .R.WT#.1......>x 1012s | CONCATENATE_DATA_AND_BASE: 1012s | target: EXTRACT_KEY_FROM_KEY 1012s | base: base-key@0x2aa278c8350 (16-bytes, AES_KEY_GEN) 1012s | params: 16-bytes@0x3ffd54f6e28 1012s | key-offset: 0, key-size: 16 1012s | EXTRACT_KEY_FROM_KEY: 1012s | target: AES_ECB 1012s | flags: SIGN 1012s | key_size: 16-bytes 1012s | base: base-key@0x2aa278cc3f0 (32-bytes, EXTRACT_KEY_FROM_KEY) 1012s | operation: FLAGS_ONLY 1012s | params: 8-bytes@0x3ffd54f6e30 1012s | Computing E[0] using K3 1012s | XCBC: K3 1012s | c1 a7 ab a1 a2 3a 94 06 58 07 a0 8c c8 ee d0 6e .....:..X......n 1012s | XCBC: E[n-1] 1012s | 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................ 1012s | XCBC: M[n] 1012s | 1012s | XCBC: M[n] 1012s | 1012s | XCBC: M[n]:80...^E[n-1]^K3 1012s | 41 a7 ab a1 a2 3a 94 06 58 07 a0 8c c8 ee d0 6e A....:..X......n 1012s | XCBC: MAC 1012s | 75 f0 25 1d 52 8a c0 1c 45 73 df d5 84 d7 9f 29 u.%.R...Es.....) 1012s | CONCATENATE_DATA_AND_BASE: 1012s | target: EXTRACT_KEY_FROM_KEY 1012s | base: base-key@0x2aa278c8350 (16-bytes, AES_KEY_GEN) 1012s | params: 16-bytes@0x3ffd54f7040 1012s | key-offset: 0, key-size: 16 1012s | EXTRACT_KEY_FROM_KEY: 1012s | target: EXTRACT_KEY_FROM_KEY 1012s | key_size: 16-bytes 1012s | base: base-key@0x2aa278cc3f0 (32-bytes, EXTRACT_KEY_FROM_KEY) 1012s | operation: FLAGS_ONLY 1012s | params: 8-bytes@0x3ffd54f6f50 1012s | PRF symkey interface PRF AES_XCBC final-key@0x2aa278cc0b0 (size 16) 1012s | PRF symkey interface: key-key@0x2aa278cc0b0 (16-bytes, EXTRACT_KEY_FROM_KEY) 1012s | output: symkey-key@0x2aa278cc0b0 (16-bytes, EXTRACT_KEY_FROM_KEY) 1012s | RFC 3566 Test Case 1: AES-XCBC-MAC-96 with 0-byte input extracting all 16 bytes of key@0x2aa278cc0b0 1012s | RFC 3566 Test Case 1: AES-XCBC-MAC-96 with 0-byte input: symkey-key@0x2aa278cc0b0 (16-bytes, EXTRACT_KEY_FROM_KEY) 1012s | sizeof bytes 16 1012s | wrapper: (SECItemType)682: 10 ed ed 56 5c 79 ac 16 db b5 5d 6d 9d 08 27 d8 1012s | RFC 3566 Test Case 1: AES-XCBC-MAC-96 with 0-byte input extracted len 16 bytes at 0x2aa278cc090 1012s | unwrapped: 1012s | 75 f0 25 1d 52 8a c0 1c 45 73 df d5 84 d7 9f 29 u.%.R...Es.....) 1012s | verify_bytes() RFC 3566 Test Case 1: AES-XCBC-MAC-96 with 0-byte input: symkey: ok 1012s ipsec algparse: RFC 3566 Test Case 2: AES-XCBC-MAC-96 with 3-byte input 1012s | decode_to_chunk() test_prf_vector: input "0x000102030405060708090a0b0c0d0e0f" 1012s | decode_to_chunk() output: 1012s | 00 01 02 03 04 05 06 07 08 09 0a 0b 0c 0d 0e 0f ................ 1012s | decode_to_chunk() test_prf_vector: input "0x000102" 1012s | decode_to_chunk() output: 1012s | 00 01 02 ... 1012s | decode_to_chunk() test_prf_vector: input "0x5b376580ae2f19afe7219ceef172756f" 1012s | decode_to_chunk() output: 1012s | 5b 37 65 80 ae 2f 19 af e7 21 9c ee f1 72 75 6f [7e../...!...ruo 1012s | PRF chunk interface PRF AES_XCBC init key hunk 0x2aa278cb690 (length 16) 1012s | 00 01 02 03 04 05 06 07 08 09 0a 0b 0c 0d 0e 0f ................ 1012s | CONCATENATE_DATA_AND_BASE: 1012s | target: EXTRACT_KEY_FROM_KEY 1012s | base: base-key@0x2aa278c8350 (16-bytes, AES_KEY_GEN) 1012s | params: 16-bytes@0x3ffd54f7050 1012s | key-offset: 0, key-size: 16 1012s | EXTRACT_KEY_FROM_KEY: 1012s | target: EXTRACT_KEY_FROM_KEY 1012s | key_size: 16-bytes 1012s | base: base-key@0x2aa278cb360 (32-bytes, EXTRACT_KEY_FROM_KEY) 1012s | operation: FLAGS_ONLY 1012s | params: 8-bytes@0x3ffd54f6f60 1012s | XCBC: Key 16=16 just right 1012s | key-offset: 0, key-size: 16 1012s | EXTRACT_KEY_FROM_KEY: 1012s | target: AES_ECB 1012s | flags: SIGN 1012s | key_size: 16-bytes 1012s | base: base-key@0x2aa278cc0b0 (16-bytes, EXTRACT_KEY_FROM_KEY) 1012s | operation: FLAGS_ONLY 1012s | params: 8-bytes@0x3ffd54f6f10 1012s | PRF chunk interface PRF AES_XCBC 0x2aa278c82f0 1012s | PRF chunk interface PRF AES_XCBC update message (0x2aa278c9ba0 length 3) 1012s | 00 01 02 ... 1012s | XCBC: data 1012s | 00 01 02 ... 1012s | K extracting all 16 bytes of key@0x2aa278cb360 1012s | K: symkey-key@0x2aa278cb360 (16-bytes, AES_ECB) 1012s | sizeof bytes 16 1012s | wrapper: (SECItemType)1111695477: 36 f7 24 82 ad db a1 a3 86 75 9f 31 e8 d4 78 4a 1012s | K extracted len 16 bytes at 0x2aa278cb6b0 1012s | unwrapped: 1012s | 00 01 02 03 04 05 06 07 08 09 0a 0b 0c 0d 0e 0f ................ 1012s | XCBC: K: 1012s | 00 01 02 03 04 05 06 07 08 09 0a 0b 0c 0d 0e 0f ................ 1012s | XCBC: K1 1012s | c3 52 80 57 54 23 7f 31 1a c0 ff f4 e3 e0 3e 78 .R.WT#.1......>x 1012s | CONCATENATE_DATA_AND_BASE: 1012s | target: EXTRACT_KEY_FROM_KEY 1012s | base: base-key@0x2aa278c8350 (16-bytes, AES_KEY_GEN) 1012s | params: 16-bytes@0x3ffd54f6de8 1012s | key-offset: 0, key-size: 16 1012s | EXTRACT_KEY_FROM_KEY: 1012s | target: AES_ECB 1012s | flags: SIGN 1012s | key_size: 16-bytes 1012s | base: base-key@0x2aa278c9c70 (32-bytes, EXTRACT_KEY_FROM_KEY) 1012s | operation: FLAGS_ONLY 1012s | params: 8-bytes@0x3ffd54f6df0 1012s | Computing E[1] using K3 1012s | XCBC: K3 1012s | c1 a7 ab a1 a2 3a 94 06 58 07 a0 8c c8 ee d0 6e .....:..X......n 1012s | XCBC: E[n-1] 1012s | 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................ 1012s | XCBC: M[n] 1012s | 00 01 02 ... 1012s | XCBC: M[n] 1012s | 00 01 02 ... 1012s | XCBC: M[n]:80...^E[n-1]^K3 1012s | c1 a6 a9 21 a2 3a 94 06 58 07 a0 8c c8 ee d0 6e ...!.:..X......n 1012s | XCBC: MAC 1012s | 5b 37 65 80 ae 2f 19 af e7 21 9c ee f1 72 75 6f [7e../...!...ruo 1012s | PRF chunk interface PRF AES_XCBC final length 16 1012s | 5b 37 65 80 ae 2f 19 af e7 21 9c ee f1 72 75 6f [7e../...!...ruo 1012s | chunk output 1012s | 5b 37 65 80 ae 2f 19 af e7 21 9c ee f1 72 75 6f [7e../...!...ruo 1012s | verify_bytes() RFC 3566 Test Case 2: AES-XCBC-MAC-96 with 3-byte input: prf OUT: ok 1012s | CONCATENATE_DATA_AND_BASE: 1012s | target: EXTRACT_KEY_FROM_KEY 1012s | base: base-key@0x2aa278c8350 (16-bytes, AES_KEY_GEN) 1012s | params: 16-bytes@0x3ffd54f71b8 1012s | key-offset: 0, key-size: 16 1012s | EXTRACT_KEY_FROM_KEY: 1012s | target: EXTRACT_KEY_FROM_KEY 1012s | key_size: 16-bytes 1012s | base: base-key@0x2aa278cc0b0 (32-bytes, EXTRACT_KEY_FROM_KEY) 1012s | operation: FLAGS_ONLY 1012s | params: 8-bytes@0x3ffd54f70c8 1012s | PRF symkey interface PRF AES_XCBC init key symkey-key@0x2aa278cb360 (size 16) 1012s | PRF symkey interface: key symkey-key@0x2aa278cb360 (16-bytes, EXTRACT_KEY_FROM_KEY) 1012s | XCBC: Key 16=16 just right 1012s | key-offset: 0, key-size: 16 1012s | EXTRACT_KEY_FROM_KEY: 1012s | target: AES_ECB 1012s | flags: SIGN 1012s | key_size: 16-bytes 1012s | base: base-key@0x2aa278cb360 (16-bytes, EXTRACT_KEY_FROM_KEY) 1012s | operation: FLAGS_ONLY 1012s | params: 8-bytes@0x3ffd54f6fd0 1012s | PRF symkey interface PRF AES_XCBC 0x2aa278c82f0 1012s | CONCATENATE_DATA_AND_BASE: 1012s | target: EXTRACT_KEY_FROM_KEY 1012s | base: base-key@0x2aa278c8350 (16-bytes, AES_KEY_GEN) 1012s | params: 16-bytes@0x3ffd54f71b8 1012s | key-offset: 0, key-size: 3 1012s | EXTRACT_KEY_FROM_KEY: 1012s | target: EXTRACT_KEY_FROM_KEY 1012s | key_size: 3-bytes 1012s | base: base-key@0x2aa278cc3f0 (19-bytes, EXTRACT_KEY_FROM_KEY) 1012s | operation: FLAGS_ONLY 1012s | params: 8-bytes@0x3ffd54f70c8 1012s | PRF symkey interface PRF AES_XCBC update symkey message-key@0x2aa278c9c70 (size 3) 1012s | PRF symkey interface: symkey message-key@0x2aa278c9c70 (3-bytes, EXTRACT_KEY_FROM_KEY) 1012s | symkey message extracting all 3 bytes of key@0x2aa278c9c70 1012s | symkey message: symkey-key@0x2aa278c9c70 (3-bytes, EXTRACT_KEY_FROM_KEY) 1012s | sizeof bytes 16 1012s | wrapper: (SECItemType)682: 84 3c 8d 26 1f 55 ef 4d 66 f4 16 36 cf cd 63 ab 1012s | symkey message extracted len 16 bytes at 0x2aa278cb6b0 1012s | unwrapped: 1012s | 00 01 02 00 00 00 00 00 00 00 00 00 00 00 00 00 ................ 1012s | XCBC: data 1012s | 00 01 02 ... 1012s | K extracting all 16 bytes of key@0x2aa278cc0b0 1012s | K: symkey-key@0x2aa278cc0b0 (16-bytes, AES_ECB) 1012s | sizeof bytes 16 1012s | wrapper: (SECItemType)1023: 36 f7 24 82 ad db a1 a3 86 75 9f 31 e8 d4 78 4a 1012s | K extracted len 16 bytes at 0x2aa278c8220 1012s | unwrapped: 1012s | 00 01 02 03 04 05 06 07 08 09 0a 0b 0c 0d 0e 0f ................ 1012s | XCBC: K: 1012s | 00 01 02 03 04 05 06 07 08 09 0a 0b 0c 0d 0e 0f ................ 1012s | XCBC: K1 1012s | c3 52 80 57 54 23 7f 31 1a c0 ff f4 e3 e0 3e 78 .R.WT#.1......>x 1012s | CONCATENATE_DATA_AND_BASE: 1012s | target: EXTRACT_KEY_FROM_KEY 1012s | base: base-key@0x2aa278c8350 (16-bytes, AES_KEY_GEN) 1012s | params: 16-bytes@0x3ffd54f6e28 1012s | key-offset: 0, key-size: 16 1012s | EXTRACT_KEY_FROM_KEY: 1012s | target: AES_ECB 1012s | flags: SIGN 1012s | key_size: 16-bytes 1012s | base: base-key@0x2aa278cc750 (32-bytes, EXTRACT_KEY_FROM_KEY) 1012s | operation: FLAGS_ONLY 1012s | params: 8-bytes@0x3ffd54f6e30 1012s | Computing E[1] using K3 1012s | XCBC: K3 1012s | c1 a7 ab a1 a2 3a 94 06 58 07 a0 8c c8 ee d0 6e .....:..X......n 1012s | XCBC: E[n-1] 1012s | 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................ 1012s | XCBC: M[n] 1012s | 00 01 02 ... 1012s | XCBC: M[n] 1012s | 00 01 02 ... 1012s | XCBC: M[n]:80...^E[n-1]^K3 1012s | c1 a6 a9 21 a2 3a 94 06 58 07 a0 8c c8 ee d0 6e ...!.:..X......n 1012s | XCBC: MAC 1012s | 5b 37 65 80 ae 2f 19 af e7 21 9c ee f1 72 75 6f [7e../...!...ruo 1012s | CONCATENATE_DATA_AND_BASE: 1012s | target: EXTRACT_KEY_FROM_KEY 1012s | base: base-key@0x2aa278c8350 (16-bytes, AES_KEY_GEN) 1012s | params: 16-bytes@0x3ffd54f7040 1012s | key-offset: 0, key-size: 16 1012s | EXTRACT_KEY_FROM_KEY: 1012s | target: EXTRACT_KEY_FROM_KEY 1012s | key_size: 16-bytes 1012s | base: base-key@0x2aa278cc750 (32-bytes, EXTRACT_KEY_FROM_KEY) 1012s | operation: FLAGS_ONLY 1012s | params: 8-bytes@0x3ffd54f6f50 1012s | PRF symkey interface PRF AES_XCBC final-key@0x2aa278cc3f0 (size 16) 1012s | PRF symkey interface: key-key@0x2aa278cc3f0 (16-bytes, EXTRACT_KEY_FROM_KEY) 1012s | output: symkey-key@0x2aa278cc3f0 (16-bytes, EXTRACT_KEY_FROM_KEY) 1012s | RFC 3566 Test Case 2: AES-XCBC-MAC-96 with 3-byte input extracting all 16 bytes of key@0x2aa278cc3f0 1012s | RFC 3566 Test Case 2: AES-XCBC-MAC-96 with 3-byte input: symkey-key@0x2aa278cc3f0 (16-bytes, EXTRACT_KEY_FROM_KEY) 1012s | sizeof bytes 16 1012s | wrapper: (SECItemType)682: 90 29 14 56 f2 04 bf 0c c8 d0 c3 11 19 c0 59 ae 1012s | RFC 3566 Test Case 2: AES-XCBC-MAC-96 with 3-byte input extracted len 16 bytes at 0x2aa278c8220 1012s | unwrapped: 1012s | 5b 37 65 80 ae 2f 19 af e7 21 9c ee f1 72 75 6f [7e../...!...ruo 1012s | verify_bytes() RFC 3566 Test Case 2: AES-XCBC-MAC-96 with 3-byte input: symkey: ok 1012s ipsec algparse: RFC 3566 Test Case 3: AES-XCBC-MAC-96 with 16-byte input 1012s | decode_to_chunk() test_prf_vector: input "0x000102030405060708090a0b0c0d0e0f" 1012s | decode_to_chunk() output: 1012s | 00 01 02 03 04 05 06 07 08 09 0a 0b 0c 0d 0e 0f ................ 1012s | decode_to_chunk() test_prf_vector: input "0x000102030405060708090a0b0c0d0e0f" 1012s | decode_to_chunk() output: 1012s | 00 01 02 03 04 05 06 07 08 09 0a 0b 0c 0d 0e 0f ................ 1012s | decode_to_chunk() test_prf_vector: input "0xd2a246fa349b68a79998a4394ff7a263" 1012s | decode_to_chunk() output: 1012s | d2 a2 46 fa 34 9b 68 a7 99 98 a4 39 4f f7 a2 63 ..F.4.h....9O..c 1012s | PRF chunk interface PRF AES_XCBC init key hunk 0x2aa278cb690 (length 16) 1012s | 00 01 02 03 04 05 06 07 08 09 0a 0b 0c 0d 0e 0f ................ 1012s | CONCATENATE_DATA_AND_BASE: 1012s | target: EXTRACT_KEY_FROM_KEY 1012s | base: base-key@0x2aa278c8350 (16-bytes, AES_KEY_GEN) 1012s | params: 16-bytes@0x3ffd54f7050 1012s | key-offset: 0, key-size: 16 1012s | EXTRACT_KEY_FROM_KEY: 1012s | target: EXTRACT_KEY_FROM_KEY 1012s | key_size: 16-bytes 1012s | base: base-key@0x2aa278cb360 (32-bytes, EXTRACT_KEY_FROM_KEY) 1012s | operation: FLAGS_ONLY 1012s | params: 8-bytes@0x3ffd54f6f60 1012s | XCBC: Key 16=16 just right 1012s | key-offset: 0, key-size: 16 1012s | EXTRACT_KEY_FROM_KEY: 1012s | target: AES_ECB 1012s | flags: SIGN 1012s | key_size: 16-bytes 1012s | base: base-key@0x2aa278cc3f0 (16-bytes, EXTRACT_KEY_FROM_KEY) 1012s | operation: FLAGS_ONLY 1012s | params: 8-bytes@0x3ffd54f6f10 1012s | PRF chunk interface PRF AES_XCBC 0x2aa278c82f0 1012s | PRF chunk interface PRF AES_XCBC update message (0x2aa278c9ba0 length 16) 1012s | 00 01 02 03 04 05 06 07 08 09 0a 0b 0c 0d 0e 0f ................ 1012s | XCBC: data 1012s | 00 01 02 03 04 05 06 07 08 09 0a 0b 0c 0d 0e 0f ................ 1012s | K extracting all 16 bytes of key@0x2aa278cb360 1012s | K: symkey-key@0x2aa278cb360 (16-bytes, AES_ECB) 1012s | sizeof bytes 16 1012s | wrapper: (SECItemType)1111695477: 36 f7 24 82 ad db a1 a3 86 75 9f 31 e8 d4 78 4a 1012s | K extracted len 16 bytes at 0x2aa278cbf20 1012s | unwrapped: 1012s | 00 01 02 03 04 05 06 07 08 09 0a 0b 0c 0d 0e 0f ................ 1012s | XCBC: K: 1012s | 00 01 02 03 04 05 06 07 08 09 0a 0b 0c 0d 0e 0f ................ 1012s | XCBC: K1 1012s | c3 52 80 57 54 23 7f 31 1a c0 ff f4 e3 e0 3e 78 .R.WT#.1......>x 1012s | CONCATENATE_DATA_AND_BASE: 1012s | target: EXTRACT_KEY_FROM_KEY 1012s | base: base-key@0x2aa278c8350 (16-bytes, AES_KEY_GEN) 1012s | params: 16-bytes@0x3ffd54f6de8 1012s | key-offset: 0, key-size: 16 1012s | EXTRACT_KEY_FROM_KEY: 1012s | target: AES_ECB 1012s | flags: SIGN 1012s | key_size: 16-bytes 1012s | base: base-key@0x2aa278c9c70 (32-bytes, EXTRACT_KEY_FROM_KEY) 1012s | operation: FLAGS_ONLY 1012s | params: 8-bytes@0x3ffd54f6df0 1012s | XCBC: Computing E[1] using K2 1012s | XCBC: K2 1012s | bd 86 2f fb 97 ad 2f b8 f8 b8 91 f6 03 2f 36 cb ../.../....../6. 1012s | XCBC: E[n-1] 1012s | 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................ 1012s | XCBC: M[n] 1012s | 00 01 02 03 04 05 06 07 08 09 0a 0b 0c 0d 0e 0f ................ 1012s | XCBC: M[n]^E[n-1]^K2 1012s | bd 87 2d f8 93 a8 29 bf f0 b1 9b fd 0f 22 38 c4 ..-...)......"8. 1012s | XCBC: MAC 1012s | d2 a2 46 fa 34 9b 68 a7 99 98 a4 39 4f f7 a2 63 ..F.4.h....9O..c 1012s | PRF chunk interface PRF AES_XCBC final length 16 1012s | d2 a2 46 fa 34 9b 68 a7 99 98 a4 39 4f f7 a2 63 ..F.4.h....9O..c 1012s | chunk output 1012s | d2 a2 46 fa 34 9b 68 a7 99 98 a4 39 4f f7 a2 63 ..F.4.h....9O..c 1012s | verify_bytes() RFC 3566 Test Case 3: AES-XCBC-MAC-96 with 16-byte input: prf OUT: ok 1012s | CONCATENATE_DATA_AND_BASE: 1012s | target: EXTRACT_KEY_FROM_KEY 1012s | base: base-key@0x2aa278c8350 (16-bytes, AES_KEY_GEN) 1012s | params: 16-bytes@0x3ffd54f71b8 1012s | key-offset: 0, key-size: 16 1012s | EXTRACT_KEY_FROM_KEY: 1012s | target: EXTRACT_KEY_FROM_KEY 1012s | key_size: 16-bytes 1012s | base: base-key@0x2aa278cc3f0 (32-bytes, EXTRACT_KEY_FROM_KEY) 1012s | operation: FLAGS_ONLY 1012s | params: 8-bytes@0x3ffd54f70c8 1012s | PRF symkey interface PRF AES_XCBC init key symkey-key@0x2aa278cb360 (size 16) 1012s | PRF symkey interface: key symkey-key@0x2aa278cb360 (16-bytes, EXTRACT_KEY_FROM_KEY) 1012s | XCBC: Key 16=16 just right 1012s | key-offset: 0, key-size: 16 1012s | EXTRACT_KEY_FROM_KEY: 1012s | target: AES_ECB 1012s | flags: SIGN 1012s | key_size: 16-bytes 1012s | base: base-key@0x2aa278cb360 (16-bytes, EXTRACT_KEY_FROM_KEY) 1012s | operation: FLAGS_ONLY 1012s | params: 8-bytes@0x3ffd54f6fd0 1012s | PRF symkey interface PRF AES_XCBC 0x2aa278c82f0 1012s | CONCATENATE_DATA_AND_BASE: 1012s | target: EXTRACT_KEY_FROM_KEY 1012s | base: base-key@0x2aa278c8350 (16-bytes, AES_KEY_GEN) 1012s | params: 16-bytes@0x3ffd54f71b8 1012s | key-offset: 0, key-size: 16 1012s | EXTRACT_KEY_FROM_KEY: 1012s | target: EXTRACT_KEY_FROM_KEY 1012s | key_size: 16-bytes 1012s | base: base-key@0x2aa278cc0b0 (32-bytes, EXTRACT_KEY_FROM_KEY) 1012s | operation: FLAGS_ONLY 1012s | params: 8-bytes@0x3ffd54f70c8 1012s | PRF symkey interface PRF AES_XCBC update symkey message-key@0x2aa278c9c70 (size 16) 1012s | PRF symkey interface: symkey message-key@0x2aa278c9c70 (16-bytes, EXTRACT_KEY_FROM_KEY) 1012s | symkey message extracting all 16 bytes of key@0x2aa278c9c70 1012s | symkey message: symkey-key@0x2aa278c9c70 (16-bytes, EXTRACT_KEY_FROM_KEY) 1012s | sizeof bytes 16 1012s | wrapper: (SECItemType)682: 36 f7 24 82 ad db a1 a3 86 75 9f 31 e8 d4 78 4a 1012s | symkey message extracted len 16 bytes at 0x2aa278cbf20 1012s | unwrapped: 1012s | 00 01 02 03 04 05 06 07 08 09 0a 0b 0c 0d 0e 0f ................ 1012s | XCBC: data 1012s | 00 01 02 03 04 05 06 07 08 09 0a 0b 0c 0d 0e 0f ................ 1012s | K extracting all 16 bytes of key@0x2aa278cc3f0 1012s | K: symkey-key@0x2aa278cc3f0 (16-bytes, AES_ECB) 1012s | sizeof bytes 16 1012s | wrapper: (SECItemType)1023: 36 f7 24 82 ad db a1 a3 86 75 9f 31 e8 d4 78 4a 1012s | K extracted len 16 bytes at 0x2aa278c8080 1012s | unwrapped: 1012s | 00 01 02 03 04 05 06 07 08 09 0a 0b 0c 0d 0e 0f ................ 1012s | XCBC: K: 1012s | 00 01 02 03 04 05 06 07 08 09 0a 0b 0c 0d 0e 0f ................ 1012s | XCBC: K1 1012s | c3 52 80 57 54 23 7f 31 1a c0 ff f4 e3 e0 3e 78 .R.WT#.1......>x 1012s | CONCATENATE_DATA_AND_BASE: 1012s | target: EXTRACT_KEY_FROM_KEY 1012s | base: base-key@0x2aa278c8350 (16-bytes, AES_KEY_GEN) 1012s | params: 16-bytes@0x3ffd54f6e28 1012s | key-offset: 0, key-size: 16 1012s | EXTRACT_KEY_FROM_KEY: 1012s | target: AES_ECB 1012s | flags: SIGN 1012s | key_size: 16-bytes 1012s | base: base-key@0x2aa278cc750 (32-bytes, EXTRACT_KEY_FROM_KEY) 1012s | operation: FLAGS_ONLY 1012s | params: 8-bytes@0x3ffd54f6e30 1012s | XCBC: Computing E[1] using K2 1012s | XCBC: K2 1012s | bd 86 2f fb 97 ad 2f b8 f8 b8 91 f6 03 2f 36 cb ../.../....../6. 1012s | XCBC: E[n-1] 1012s | 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................ 1012s | XCBC: M[n] 1012s | 00 01 02 03 04 05 06 07 08 09 0a 0b 0c 0d 0e 0f ................ 1012s | XCBC: M[n]^E[n-1]^K2 1012s | bd 87 2d f8 93 a8 29 bf f0 b1 9b fd 0f 22 38 c4 ..-...)......"8. 1012s | XCBC: MAC 1012s | d2 a2 46 fa 34 9b 68 a7 99 98 a4 39 4f f7 a2 63 ..F.4.h....9O..c 1012s | CONCATENATE_DATA_AND_BASE: 1012s | target: EXTRACT_KEY_FROM_KEY 1012s | base: base-key@0x2aa278c8350 (16-bytes, AES_KEY_GEN) 1012s | params: 16-bytes@0x3ffd54f7040 1012s | key-offset: 0, key-size: 16 1012s | EXTRACT_KEY_FROM_KEY: 1012s | target: EXTRACT_KEY_FROM_KEY 1012s | key_size: 16-bytes 1012s | base: base-key@0x2aa278cc750 (32-bytes, EXTRACT_KEY_FROM_KEY) 1012s | operation: FLAGS_ONLY 1012s | params: 8-bytes@0x3ffd54f6f50 1012s | PRF symkey interface PRF AES_XCBC final-key@0x2aa278cc0b0 (size 16) 1012s | PRF symkey interface: key-key@0x2aa278cc0b0 (16-bytes, EXTRACT_KEY_FROM_KEY) 1012s | output: symkey-key@0x2aa278cc0b0 (16-bytes, EXTRACT_KEY_FROM_KEY) 1012s | RFC 3566 Test Case 3: AES-XCBC-MAC-96 with 16-byte input extracting all 16 bytes of key@0x2aa278cc0b0 1012s | RFC 3566 Test Case 3: AES-XCBC-MAC-96 with 16-byte input: symkey-key@0x2aa278cc0b0 (16-bytes, EXTRACT_KEY_FROM_KEY) 1012s | sizeof bytes 16 1012s | wrapper: (SECItemType)682: e8 f9 25 f6 6f f5 d9 12 10 a5 67 45 7f a8 8c b8 1012s | RFC 3566 Test Case 3: AES-XCBC-MAC-96 with 16-byte input extracted len 16 bytes at 0x2aa278c8080 1012s | unwrapped: 1012s | d2 a2 46 fa 34 9b 68 a7 99 98 a4 39 4f f7 a2 63 ..F.4.h....9O..c 1012s | verify_bytes() RFC 3566 Test Case 3: AES-XCBC-MAC-96 with 16-byte input: symkey: ok 1012s ipsec algparse: RFC 3566 Test Case 4: AES-XCBC-MAC-96 with 20-byte input 1012s | decode_to_chunk() test_prf_vector: input "0x000102030405060708090a0b0c0d0e0f" 1012s | decode_to_chunk() output: 1012s | 00 01 02 03 04 05 06 07 08 09 0a 0b 0c 0d 0e 0f ................ 1012s | decode_to_chunk() test_prf_vector: input "0x000102030405060708090a0b0c0d0e0f10111213" 1012s | decode_to_chunk() output: 1012s | 00 01 02 03 04 05 06 07 08 09 0a 0b 0c 0d 0e 0f ................ 1012s | 10 11 12 13 .... 1012s | decode_to_chunk() test_prf_vector: input "0x47f51b4564966215b8985c63055ed308" 1012s | decode_to_chunk() output: 1012s | 47 f5 1b 45 64 96 62 15 b8 98 5c 63 05 5e d3 08 G..Ed.b...\c.^.. 1012s | PRF chunk interface PRF AES_XCBC init key hunk 0x2aa278cb690 (length 16) 1012s | 00 01 02 03 04 05 06 07 08 09 0a 0b 0c 0d 0e 0f ................ 1012s | CONCATENATE_DATA_AND_BASE: 1012s | target: EXTRACT_KEY_FROM_KEY 1012s | base: base-key@0x2aa278c8350 (16-bytes, AES_KEY_GEN) 1012s | params: 16-bytes@0x3ffd54f7050 1012s | key-offset: 0, key-size: 16 1012s | EXTRACT_KEY_FROM_KEY: 1012s | target: EXTRACT_KEY_FROM_KEY 1012s | key_size: 16-bytes 1012s | base: base-key@0x2aa278cb360 (32-bytes, EXTRACT_KEY_FROM_KEY) 1012s | operation: FLAGS_ONLY 1012s | params: 8-bytes@0x3ffd54f6f60 1012s | XCBC: Key 16=16 just right 1012s | key-offset: 0, key-size: 16 1012s | EXTRACT_KEY_FROM_KEY: 1012s | target: AES_ECB 1012s | flags: SIGN 1012s | key_size: 16-bytes 1012s | base: base-key@0x2aa278cc0b0 (16-bytes, EXTRACT_KEY_FROM_KEY) 1012s | operation: FLAGS_ONLY 1012s | params: 8-bytes@0x3ffd54f6f10 1012s | PRF chunk interface PRF AES_XCBC 0x2aa278c82f0 1012s | PRF chunk interface PRF AES_XCBC update message (0x2aa278c9ba0 length 20) 1012s | 00 01 02 03 04 05 06 07 08 09 0a 0b 0c 0d 0e 0f ................ 1012s | 10 11 12 13 .... 1012s | XCBC: data 1012s | 00 01 02 03 04 05 06 07 08 09 0a 0b 0c 0d 0e 0f ................ 1012s | 10 11 12 13 .... 1012s | K extracting all 16 bytes of key@0x2aa278cb360 1012s | K: symkey-key@0x2aa278cb360 (16-bytes, AES_ECB) 1012s | sizeof bytes 16 1012s | wrapper: (SECItemType)1111695477: 36 f7 24 82 ad db a1 a3 86 75 9f 31 e8 d4 78 4a 1012s | K extracted len 16 bytes at 0x2aa278cb9a0 1012s | unwrapped: 1012s | 00 01 02 03 04 05 06 07 08 09 0a 0b 0c 0d 0e 0f ................ 1012s | XCBC: K: 1012s | 00 01 02 03 04 05 06 07 08 09 0a 0b 0c 0d 0e 0f ................ 1012s | XCBC: K1 1012s | c3 52 80 57 54 23 7f 31 1a c0 ff f4 e3 e0 3e 78 .R.WT#.1......>x 1012s | CONCATENATE_DATA_AND_BASE: 1012s | target: EXTRACT_KEY_FROM_KEY 1012s | base: base-key@0x2aa278c8350 (16-bytes, AES_KEY_GEN) 1012s | params: 16-bytes@0x3ffd54f6de8 1012s | key-offset: 0, key-size: 16 1012s | EXTRACT_KEY_FROM_KEY: 1012s | target: AES_ECB 1012s | flags: SIGN 1012s | key_size: 16-bytes 1012s | base: base-key@0x2aa278c9c70 (32-bytes, EXTRACT_KEY_FROM_KEY) 1012s | operation: FLAGS_ONLY 1012s | params: 8-bytes@0x3ffd54f6df0 1012s | Computing E[2] using K3 1012s | XCBC: K3 1012s | c1 a7 ab a1 a2 3a 94 06 58 07 a0 8c c8 ee d0 6e .....:..X......n 1012s | XCBC: E[n-1] 1012s | 1d 04 48 fa cf 4d 9c 6f 55 b9 93 da 09 80 3d b3 ..H..M.oU.....=. 1012s | XCBC: M[n] 1012s | 10 11 12 13 .... 1012s | XCBC: M[n] 1012s | 10 11 12 13 .... 1012s | XCBC: M[n]:80...^E[n-1]^K3 1012s | cc b2 f1 48 ed 77 08 69 0d be 33 56 c1 6e ed dd ...H.w.i..3V.n.. 1012s | XCBC: MAC 1012s | 47 f5 1b 45 64 96 62 15 b8 98 5c 63 05 5e d3 08 G..Ed.b...\c.^.. 1012s | PRF chunk interface PRF AES_XCBC final length 16 1012s | 47 f5 1b 45 64 96 62 15 b8 98 5c 63 05 5e d3 08 G..Ed.b...\c.^.. 1012s | chunk output 1012s | 47 f5 1b 45 64 96 62 15 b8 98 5c 63 05 5e d3 08 G..Ed.b...\c.^.. 1012s | verify_bytes() RFC 3566 Test Case 4: AES-XCBC-MAC-96 with 20-byte input: prf OUT: ok 1012s | CONCATENATE_DATA_AND_BASE: 1012s | target: EXTRACT_KEY_FROM_KEY 1012s | base: base-key@0x2aa278c8350 (16-bytes, AES_KEY_GEN) 1012s | params: 16-bytes@0x3ffd54f71b8 1012s | key-offset: 0, key-size: 16 1012s | EXTRACT_KEY_FROM_KEY: 1012s | target: EXTRACT_KEY_FROM_KEY 1012s | key_size: 16-bytes 1012s | base: base-key@0x2aa278cc0b0 (32-bytes, EXTRACT_KEY_FROM_KEY) 1012s | operation: FLAGS_ONLY 1012s | params: 8-bytes@0x3ffd54f70c8 1012s | PRF symkey interface PRF AES_XCBC init key symkey-key@0x2aa278cb360 (size 16) 1012s | PRF symkey interface: key symkey-key@0x2aa278cb360 (16-bytes, EXTRACT_KEY_FROM_KEY) 1012s | XCBC: Key 16=16 just right 1012s | key-offset: 0, key-size: 16 1012s | EXTRACT_KEY_FROM_KEY: 1012s | target: AES_ECB 1012s | flags: SIGN 1012s | key_size: 16-bytes 1012s | base: base-key@0x2aa278cb360 (16-bytes, EXTRACT_KEY_FROM_KEY) 1012s | operation: FLAGS_ONLY 1012s | params: 8-bytes@0x3ffd54f6fd0 1012s | PRF symkey interface PRF AES_XCBC 0x2aa278c82f0 1012s | CONCATENATE_DATA_AND_BASE: 1012s | target: EXTRACT_KEY_FROM_KEY 1012s | base: base-key@0x2aa278c8350 (16-bytes, AES_KEY_GEN) 1012s | params: 16-bytes@0x3ffd54f71b8 1012s | key-offset: 0, key-size: 20 1012s | EXTRACT_KEY_FROM_KEY: 1012s | target: EXTRACT_KEY_FROM_KEY 1012s | key_size: 20-bytes 1012s | base: base-key@0x2aa278cc3f0 (36-bytes, EXTRACT_KEY_FROM_KEY) 1012s | operation: FLAGS_ONLY 1012s | params: 8-bytes@0x3ffd54f70c8 1012s | PRF symkey interface PRF AES_XCBC update symkey message-key@0x2aa278c9c70 (size 20) 1012s | PRF symkey interface: symkey message-key@0x2aa278c9c70 (20-bytes, EXTRACT_KEY_FROM_KEY) 1012s | symkey message extracting all 20 bytes of key@0x2aa278c9c70 1012s | symkey message: symkey-key@0x2aa278c9c70 (20-bytes, EXTRACT_KEY_FROM_KEY) 1012s | sizeof bytes 32 1012s | wrapper: (SECItemType)682: 36 f7 24 82 ad db a1 a3 86 75 9f 31 e8 d4 78 4a 1f 70 e6 9e 56 96 f5 58 44 c6 46 d3 65 94 b2 cb 1012s | symkey message extracted len 32 bytes at 0x2aa278cbd20 1012s | unwrapped: 1012s | 00 01 02 03 04 05 06 07 08 09 0a 0b 0c 0d 0e 0f ................ 1012s | 10 11 12 13 00 00 00 00 00 00 00 00 00 00 00 00 ................ 1012s | XCBC: data 1012s | 00 01 02 03 04 05 06 07 08 09 0a 0b 0c 0d 0e 0f ................ 1012s | 10 11 12 13 .... 1012s | K extracting all 16 bytes of key@0x2aa278cc0b0 1012s | K: symkey-key@0x2aa278cc0b0 (16-bytes, AES_ECB) 1012s | sizeof bytes 16 1012s | wrapper: (SECItemType)1023: 36 f7 24 82 ad db a1 a3 86 75 9f 31 e8 d4 78 4a 1012s | K extracted len 16 bytes at 0x2aa278cb6b0 1012s | unwrapped: 1012s | 00 01 02 03 04 05 06 07 08 09 0a 0b 0c 0d 0e 0f ................ 1012s | XCBC: K: 1012s | 00 01 02 03 04 05 06 07 08 09 0a 0b 0c 0d 0e 0f ................ 1012s | XCBC: K1 1012s | c3 52 80 57 54 23 7f 31 1a c0 ff f4 e3 e0 3e 78 .R.WT#.1......>x 1012s | CONCATENATE_DATA_AND_BASE: 1012s | target: EXTRACT_KEY_FROM_KEY 1012s | base: base-key@0x2aa278c8350 (16-bytes, AES_KEY_GEN) 1012s | params: 16-bytes@0x3ffd54f6e28 1012s | key-offset: 0, key-size: 16 1012s | EXTRACT_KEY_FROM_KEY: 1012s | target: AES_ECB 1012s | flags: SIGN 1012s | key_size: 16-bytes 1012s | base: base-key@0x2aa278cc750 (32-bytes, EXTRACT_KEY_FROM_KEY) 1012s | operation: FLAGS_ONLY 1012s | params: 8-bytes@0x3ffd54f6e30 1012s | Computing E[2] using K3 1012s | XCBC: K3 1012s | c1 a7 ab a1 a2 3a 94 06 58 07 a0 8c c8 ee d0 6e .....:..X......n 1012s | XCBC: E[n-1] 1012s | 1d 04 48 fa cf 4d 9c 6f 55 b9 93 da 09 80 3d b3 ..H..M.oU.....=. 1012s | XCBC: M[n] 1012s | 10 11 12 13 .... 1012s | XCBC: M[n] 1012s | 10 11 12 13 .... 1012s | XCBC: M[n]:80...^E[n-1]^K3 1012s | cc b2 f1 48 ed 77 08 69 0d be 33 56 c1 6e ed dd ...H.w.i..3V.n.. 1012s | XCBC: MAC 1012s | 47 f5 1b 45 64 96 62 15 b8 98 5c 63 05 5e d3 08 G..Ed.b...\c.^.. 1012s | CONCATENATE_DATA_AND_BASE: 1012s | target: EXTRACT_KEY_FROM_KEY 1012s | base: base-key@0x2aa278c8350 (16-bytes, AES_KEY_GEN) 1012s | params: 16-bytes@0x3ffd54f7040 1012s | key-offset: 0, key-size: 16 1012s | EXTRACT_KEY_FROM_KEY: 1012s | target: EXTRACT_KEY_FROM_KEY 1012s | key_size: 16-bytes 1012s | base: base-key@0x2aa278cc750 (32-bytes, EXTRACT_KEY_FROM_KEY) 1012s | operation: FLAGS_ONLY 1012s | params: 8-bytes@0x3ffd54f6f50 1012s | PRF symkey interface PRF AES_XCBC final-key@0x2aa278cc3f0 (size 16) 1012s | PRF symkey interface: key-key@0x2aa278cc3f0 (16-bytes, EXTRACT_KEY_FROM_KEY) 1012s | output: symkey-key@0x2aa278cc3f0 (16-bytes, EXTRACT_KEY_FROM_KEY) 1012s | RFC 3566 Test Case 4: AES-XCBC-MAC-96 with 20-byte input extracting all 16 bytes of key@0x2aa278cc3f0 1012s | RFC 3566 Test Case 4: AES-XCBC-MAC-96 with 20-byte input: symkey-key@0x2aa278cc3f0 (16-bytes, EXTRACT_KEY_FROM_KEY) 1012s | sizeof bytes 16 1012s | wrapper: (SECItemType)682: 3b bb d8 25 4d 10 da ba ee 89 af 36 4d b3 80 a8 1012s | RFC 3566 Test Case 4: AES-XCBC-MAC-96 with 20-byte input extracted len 16 bytes at 0x2aa278cb6b0 1012s | unwrapped: 1012s | 47 f5 1b 45 64 96 62 15 b8 98 5c 63 05 5e d3 08 G..Ed.b...\c.^.. 1012s | verify_bytes() RFC 3566 Test Case 4: AES-XCBC-MAC-96 with 20-byte input: symkey: ok 1012s ipsec algparse: RFC 3566 Test Case 5: AES-XCBC-MAC-96 with 32-byte input 1012s | decode_to_chunk() test_prf_vector: input "0x000102030405060708090a0b0c0d0e0f" 1012s | decode_to_chunk() output: 1012s | 00 01 02 03 04 05 06 07 08 09 0a 0b 0c 0d 0e 0f ................ 1012s | decode_to_chunk() test_prf_vector: input "0x000102030405060708090a0b0c0d0e0f101112131415161718191a1b1c1d1e1f" 1012s | decode_to_chunk() output: 1012s | 00 01 02 03 04 05 06 07 08 09 0a 0b 0c 0d 0e 0f ................ 1012s | 10 11 12 13 14 15 16 17 18 19 1a 1b 1c 1d 1e 1f ................ 1012s | decode_to_chunk() test_prf_vector: input "0xf54f0ec8d2b9f3d36807734bd5283fd4" 1012s | decode_to_chunk() output: 1012s | f5 4f 0e c8 d2 b9 f3 d3 68 07 73 4b d5 28 3f d4 .O......h.sK.(?. 1012s | PRF chunk interface PRF AES_XCBC init key hunk 0x2aa278cb690 (length 16) 1012s | 00 01 02 03 04 05 06 07 08 09 0a 0b 0c 0d 0e 0f ................ 1012s | CONCATENATE_DATA_AND_BASE: 1012s | target: EXTRACT_KEY_FROM_KEY 1012s | base: base-key@0x2aa278c8350 (16-bytes, AES_KEY_GEN) 1012s | params: 16-bytes@0x3ffd54f7050 1012s | key-offset: 0, key-size: 16 1012s | EXTRACT_KEY_FROM_KEY: 1012s | target: EXTRACT_KEY_FROM_KEY 1012s | key_size: 16-bytes 1012s | base: base-key@0x2aa278cb360 (32-bytes, EXTRACT_KEY_FROM_KEY) 1012s | operation: FLAGS_ONLY 1012s | params: 8-bytes@0x3ffd54f6f60 1012s | XCBC: Key 16=16 just right 1012s | key-offset: 0, key-size: 16 1012s | EXTRACT_KEY_FROM_KEY: 1012s | target: AES_ECB 1012s | flags: SIGN 1012s | key_size: 16-bytes 1012s | base: base-key@0x2aa278cc3f0 (16-bytes, EXTRACT_KEY_FROM_KEY) 1012s | operation: FLAGS_ONLY 1012s | params: 8-bytes@0x3ffd54f6f10 1012s | PRF chunk interface PRF AES_XCBC 0x2aa278cbd20 1012s | PRF chunk interface PRF AES_XCBC update message (0x2aa278c82f0 length 32) 1012s | 00 01 02 03 04 05 06 07 08 09 0a 0b 0c 0d 0e 0f ................ 1012s | 10 11 12 13 14 15 16 17 18 19 1a 1b 1c 1d 1e 1f ................ 1012s | XCBC: data 1012s | 00 01 02 03 04 05 06 07 08 09 0a 0b 0c 0d 0e 0f ................ 1012s | 10 11 12 13 14 15 16 17 18 19 1a 1b 1c 1d 1e 1f ................ 1012s | K extracting all 16 bytes of key@0x2aa278cb360 1012s | K: symkey-key@0x2aa278cb360 (16-bytes, AES_ECB) 1012s | sizeof bytes 16 1012s | wrapper: (SECItemType)1111695477: 36 f7 24 82 ad db a1 a3 86 75 9f 31 e8 d4 78 4a 1012s | K extracted len 16 bytes at 0x2aa278c8220 1012s | unwrapped: 1012s | 00 01 02 03 04 05 06 07 08 09 0a 0b 0c 0d 0e 0f ................ 1012s | XCBC: K: 1012s | 00 01 02 03 04 05 06 07 08 09 0a 0b 0c 0d 0e 0f ................ 1012s | XCBC: K1 1012s | c3 52 80 57 54 23 7f 31 1a c0 ff f4 e3 e0 3e 78 .R.WT#.1......>x 1012s | CONCATENATE_DATA_AND_BASE: 1012s | target: EXTRACT_KEY_FROM_KEY 1012s | base: base-key@0x2aa278c8350 (16-bytes, AES_KEY_GEN) 1012s | params: 16-bytes@0x3ffd54f6de8 1012s | key-offset: 0, key-size: 16 1012s | EXTRACT_KEY_FROM_KEY: 1012s | target: AES_ECB 1012s | flags: SIGN 1012s | key_size: 16-bytes 1012s | base: base-key@0x2aa278c9c70 (32-bytes, EXTRACT_KEY_FROM_KEY) 1012s | operation: FLAGS_ONLY 1012s | params: 8-bytes@0x3ffd54f6df0 1012s | XCBC: Computing E[2] using K2 1012s | XCBC: K2 1012s | bd 86 2f fb 97 ad 2f b8 f8 b8 91 f6 03 2f 36 cb ../.../....../6. 1012s | XCBC: E[n-1] 1012s | 1d 04 48 fa cf 4d 9c 6f 55 b9 93 da 09 80 3d b3 ..H..M.oU.....=. 1012s | XCBC: M[n] 1012s | 10 11 12 13 14 15 16 17 18 19 1a 1b 1c 1d 1e 1f ................ 1012s | XCBC: M[n]^E[n-1]^K2 1012s | b0 93 75 12 4c f5 a5 c0 b5 18 18 37 16 b2 15 67 ..u.L......7...g 1012s | XCBC: MAC 1012s | f5 4f 0e c8 d2 b9 f3 d3 68 07 73 4b d5 28 3f d4 .O......h.sK.(?. 1012s | PRF chunk interface PRF AES_XCBC final length 16 1012s | f5 4f 0e c8 d2 b9 f3 d3 68 07 73 4b d5 28 3f d4 .O......h.sK.(?. 1012s | chunk output 1012s | f5 4f 0e c8 d2 b9 f3 d3 68 07 73 4b d5 28 3f d4 .O......h.sK.(?. 1012s | verify_bytes() RFC 3566 Test Case 5: AES-XCBC-MAC-96 with 32-byte input: prf OUT: ok 1012s | CONCATENATE_DATA_AND_BASE: 1012s | target: EXTRACT_KEY_FROM_KEY 1012s | base: base-key@0x2aa278c8350 (16-bytes, AES_KEY_GEN) 1012s | params: 16-bytes@0x3ffd54f71b8 1012s | key-offset: 0, key-size: 16 1012s | EXTRACT_KEY_FROM_KEY: 1012s | target: EXTRACT_KEY_FROM_KEY 1012s | key_size: 16-bytes 1012s | base: base-key@0x2aa278cc3f0 (32-bytes, EXTRACT_KEY_FROM_KEY) 1012s | operation: FLAGS_ONLY 1012s | params: 8-bytes@0x3ffd54f70c8 1012s | PRF symkey interface PRF AES_XCBC init key symkey-key@0x2aa278cb360 (size 16) 1012s | PRF symkey interface: key symkey-key@0x2aa278cb360 (16-bytes, EXTRACT_KEY_FROM_KEY) 1012s | XCBC: Key 16=16 just right 1012s | key-offset: 0, key-size: 16 1012s | EXTRACT_KEY_FROM_KEY: 1012s | target: AES_ECB 1012s | flags: SIGN 1012s | key_size: 16-bytes 1012s | base: base-key@0x2aa278cb360 (16-bytes, EXTRACT_KEY_FROM_KEY) 1012s | operation: FLAGS_ONLY 1012s | params: 8-bytes@0x3ffd54f6fd0 1012s | PRF symkey interface PRF AES_XCBC 0x2aa278cbd20 1012s | CONCATENATE_DATA_AND_BASE: 1012s | target: EXTRACT_KEY_FROM_KEY 1012s | base: base-key@0x2aa278c8350 (16-bytes, AES_KEY_GEN) 1012s | params: 16-bytes@0x3ffd54f71b8 1012s | key-offset: 0, key-size: 32 1012s | EXTRACT_KEY_FROM_KEY: 1012s | target: EXTRACT_KEY_FROM_KEY 1012s | key_size: 32-bytes 1012s | base: base-key@0x2aa278cc0b0 (48-bytes, EXTRACT_KEY_FROM_KEY) 1012s | operation: FLAGS_ONLY 1012s | params: 8-bytes@0x3ffd54f70c8 1012s | PRF symkey interface PRF AES_XCBC update symkey message-key@0x2aa278c9c70 (size 32) 1012s | PRF symkey interface: symkey message-key@0x2aa278c9c70 (32-bytes, EXTRACT_KEY_FROM_KEY) 1012s | symkey message extracting all 32 bytes of key@0x2aa278c9c70 1012s | symkey message: symkey-key@0x2aa278c9c70 (32-bytes, EXTRACT_KEY_FROM_KEY) 1012s | sizeof bytes 32 1012s | wrapper: (SECItemType)682: 36 f7 24 82 ad db a1 a3 86 75 9f 31 e8 d4 78 4a 07 4f cf 2d b2 61 ff e6 48 dd 29 01 8b 3b 78 f3 1012s | symkey message extracted len 32 bytes at 0x2aa278cca10 1012s | unwrapped: 1012s | 00 01 02 03 04 05 06 07 08 09 0a 0b 0c 0d 0e 0f ................ 1012s | 10 11 12 13 14 15 16 17 18 19 1a 1b 1c 1d 1e 1f ................ 1012s | XCBC: data 1012s | 00 01 02 03 04 05 06 07 08 09 0a 0b 0c 0d 0e 0f ................ 1012s | 10 11 12 13 14 15 16 17 18 19 1a 1b 1c 1d 1e 1f ................ 1012s | K extracting all 16 bytes of key@0x2aa278cc3f0 1012s | K: symkey-key@0x2aa278cc3f0 (16-bytes, AES_ECB) 1012s | sizeof bytes 16 1012s | wrapper: (SECItemType)1023: 36 f7 24 82 ad db a1 a3 86 75 9f 31 e8 d4 78 4a 1012s | K extracted len 16 bytes at 0x2aa278cbf20 1012s | unwrapped: 1012s | 00 01 02 03 04 05 06 07 08 09 0a 0b 0c 0d 0e 0f ................ 1012s | XCBC: K: 1012s | 00 01 02 03 04 05 06 07 08 09 0a 0b 0c 0d 0e 0f ................ 1012s | XCBC: K1 1012s | c3 52 80 57 54 23 7f 31 1a c0 ff f4 e3 e0 3e 78 .R.WT#.1......>x 1012s | CONCATENATE_DATA_AND_BASE: 1012s | target: EXTRACT_KEY_FROM_KEY 1012s | base: base-key@0x2aa278c8350 (16-bytes, AES_KEY_GEN) 1012s | params: 16-bytes@0x3ffd54f6e28 1012s | key-offset: 0, key-size: 16 1012s | EXTRACT_KEY_FROM_KEY: 1012s | target: AES_ECB 1012s | flags: SIGN 1012s | key_size: 16-bytes 1012s | base: base-key@0x2aa278cc750 (32-bytes, EXTRACT_KEY_FROM_KEY) 1012s | operation: FLAGS_ONLY 1012s | params: 8-bytes@0x3ffd54f6e30 1012s | XCBC: Computing E[2] using K2 1012s | XCBC: K2 1012s | bd 86 2f fb 97 ad 2f b8 f8 b8 91 f6 03 2f 36 cb ../.../....../6. 1012s | XCBC: E[n-1] 1012s | 1d 04 48 fa cf 4d 9c 6f 55 b9 93 da 09 80 3d b3 ..H..M.oU.....=. 1012s | XCBC: M[n] 1012s | 10 11 12 13 14 15 16 17 18 19 1a 1b 1c 1d 1e 1f ................ 1012s | XCBC: M[n]^E[n-1]^K2 1012s | b0 93 75 12 4c f5 a5 c0 b5 18 18 37 16 b2 15 67 ..u.L......7...g 1012s | XCBC: MAC 1012s | f5 4f 0e c8 d2 b9 f3 d3 68 07 73 4b d5 28 3f d4 .O......h.sK.(?. 1012s | CONCATENATE_DATA_AND_BASE: 1012s | target: EXTRACT_KEY_FROM_KEY 1012s | base: base-key@0x2aa278c8350 (16-bytes, AES_KEY_GEN) 1012s | params: 16-bytes@0x3ffd54f7040 1012s | key-offset: 0, key-size: 16 1012s | EXTRACT_KEY_FROM_KEY: 1012s | target: EXTRACT_KEY_FROM_KEY 1012s | key_size: 16-bytes 1012s | base: base-key@0x2aa278cc750 (32-bytes, EXTRACT_KEY_FROM_KEY) 1012s | operation: FLAGS_ONLY 1012s | params: 8-bytes@0x3ffd54f6f50 1012s | PRF symkey interface PRF AES_XCBC final-key@0x2aa278cc0b0 (size 16) 1012s | PRF symkey interface: key-key@0x2aa278cc0b0 (16-bytes, EXTRACT_KEY_FROM_KEY) 1012s | output: symkey-key@0x2aa278cc0b0 (16-bytes, EXTRACT_KEY_FROM_KEY) 1012s | RFC 3566 Test Case 5: AES-XCBC-MAC-96 with 32-byte input extracting all 16 bytes of key@0x2aa278cc0b0 1012s | RFC 3566 Test Case 5: AES-XCBC-MAC-96 with 32-byte input: symkey-key@0x2aa278cc0b0 (16-bytes, EXTRACT_KEY_FROM_KEY) 1012s | sizeof bytes 16 1012s | wrapper: (SECItemType)682: fa a9 9e 7d 24 47 0d b4 21 bd bf 24 c9 97 da 4b 1012s | RFC 3566 Test Case 5: AES-XCBC-MAC-96 with 32-byte input extracted len 16 bytes at 0x2aa278cb9a0 1012s | unwrapped: 1012s | f5 4f 0e c8 d2 b9 f3 d3 68 07 73 4b d5 28 3f d4 .O......h.sK.(?. 1012s | verify_bytes() RFC 3566 Test Case 5: AES-XCBC-MAC-96 with 32-byte input: symkey: ok 1012s ipsec algparse: RFC 3566 Test Case 6: AES-XCBC-MAC-96 with 34-byte input 1012s | decode_to_chunk() test_prf_vector: input "0x000102030405060708090a0b0c0d0e0f" 1012s | decode_to_chunk() output: 1012s | 00 01 02 03 04 05 06 07 08 09 0a 0b 0c 0d 0e 0f ................ 1012s | decode_to_chunk() test_prf_vector: input "0x000102030405060708090a0b0c0d0e0f101112131415161718191a1b1c1d1e1f2021" 1012s | decode_to_chunk() output: 1012s | 00 01 02 03 04 05 06 07 08 09 0a 0b 0c 0d 0e 0f ................ 1012s | 10 11 12 13 14 15 16 17 18 19 1a 1b 1c 1d 1e 1f ................ 1012s | 20 21 ! 1012s | decode_to_chunk() test_prf_vector: input "0xbecbb3bccdb518a30677d5481fb6b4d8" 1012s | decode_to_chunk() output: 1012s | be cb b3 bc cd b5 18 a3 06 77 d5 48 1f b6 b4 d8 .........w.H.... 1012s | PRF chunk interface PRF AES_XCBC init key hunk 0x2aa278c9ba0 (length 16) 1012s | 00 01 02 03 04 05 06 07 08 09 0a 0b 0c 0d 0e 0f ................ 1012s | CONCATENATE_DATA_AND_BASE: 1012s | target: EXTRACT_KEY_FROM_KEY 1012s | base: base-key@0x2aa278c8350 (16-bytes, AES_KEY_GEN) 1012s | params: 16-bytes@0x3ffd54f7050 1012s | key-offset: 0, key-size: 16 1012s | EXTRACT_KEY_FROM_KEY: 1012s | target: EXTRACT_KEY_FROM_KEY 1012s | key_size: 16-bytes 1012s | base: base-key@0x2aa278cb360 (32-bytes, EXTRACT_KEY_FROM_KEY) 1012s | operation: FLAGS_ONLY 1012s | params: 8-bytes@0x3ffd54f6f60 1012s | XCBC: Key 16=16 just right 1012s | key-offset: 0, key-size: 16 1012s | EXTRACT_KEY_FROM_KEY: 1012s | target: AES_ECB 1012s | flags: SIGN 1012s | key_size: 16-bytes 1012s | base: base-key@0x2aa278cc0b0 (16-bytes, EXTRACT_KEY_FROM_KEY) 1012s | operation: FLAGS_ONLY 1012s | params: 8-bytes@0x3ffd54f6f10 1012s | PRF chunk interface PRF AES_XCBC 0x2aa278c82f0 1012s | PRF chunk interface PRF AES_XCBC update message (0x2aa278c8320 length 34) 1012s | 00 01 02 03 04 05 06 07 08 09 0a 0b 0c 0d 0e 0f ................ 1012s | 10 11 12 13 14 15 16 17 18 19 1a 1b 1c 1d 1e 1f ................ 1012s | 20 21 ! 1012s | XCBC: data 1012s | 00 01 02 03 04 05 06 07 08 09 0a 0b 0c 0d 0e 0f ................ 1012s | 10 11 12 13 14 15 16 17 18 19 1a 1b 1c 1d 1e 1f ................ 1012s | 20 21 ! 1012s | K extracting all 16 bytes of key@0x2aa278cb360 1012s | K: symkey-key@0x2aa278cb360 (16-bytes, AES_ECB) 1012s | sizeof bytes 16 1012s | wrapper: (SECItemType)1111695477: 36 f7 24 82 ad db a1 a3 86 75 9f 31 e8 d4 78 4a 1012s | K extracted len 16 bytes at 0x2aa278cbf20 1012s | unwrapped: 1012s | 00 01 02 03 04 05 06 07 08 09 0a 0b 0c 0d 0e 0f ................ 1012s | XCBC: K: 1012s | 00 01 02 03 04 05 06 07 08 09 0a 0b 0c 0d 0e 0f ................ 1012s | XCBC: K1 1012s | c3 52 80 57 54 23 7f 31 1a c0 ff f4 e3 e0 3e 78 .R.WT#.1......>x 1012s | CONCATENATE_DATA_AND_BASE: 1012s | target: EXTRACT_KEY_FROM_KEY 1012s | base: base-key@0x2aa278c8350 (16-bytes, AES_KEY_GEN) 1012s | params: 16-bytes@0x3ffd54f6de8 1012s | key-offset: 0, key-size: 16 1012s | EXTRACT_KEY_FROM_KEY: 1012s | target: AES_ECB 1012s | flags: SIGN 1012s | key_size: 16-bytes 1012s | base: base-key@0x2aa278c9c70 (32-bytes, EXTRACT_KEY_FROM_KEY) 1012s | operation: FLAGS_ONLY 1012s | params: 8-bytes@0x3ffd54f6df0 1012s | Computing E[3] using K3 1012s | XCBC: K3 1012s | c1 a7 ab a1 a2 3a 94 06 58 07 a0 8c c8 ee d0 6e .....:..X......n 1012s | XCBC: E[n-1] 1012s | 09 02 5e 5a 67 25 20 72 44 14 5c 6b 80 66 85 79 ..^Zg% rD.\k.f.y 1012s | XCBC: M[n] 1012s | 20 21 ! 1012s | XCBC: M[n] 1012s | 20 21 ! 1012s | XCBC: M[n]:80...^E[n-1]^K3 1012s | e8 84 75 fb c5 1f b4 74 1c 13 fc e7 48 88 55 17 ..u....t....H.U. 1012s | XCBC: MAC 1012s | be cb b3 bc cd b5 18 a3 06 77 d5 48 1f b6 b4 d8 .........w.H.... 1012s | PRF chunk interface PRF AES_XCBC final length 16 1012s | be cb b3 bc cd b5 18 a3 06 77 d5 48 1f b6 b4 d8 .........w.H.... 1012s | chunk output 1012s | be cb b3 bc cd b5 18 a3 06 77 d5 48 1f b6 b4 d8 .........w.H.... 1012s | verify_bytes() RFC 3566 Test Case 6: AES-XCBC-MAC-96 with 34-byte input: prf OUT: ok 1012s | CONCATENATE_DATA_AND_BASE: 1012s | target: EXTRACT_KEY_FROM_KEY 1012s | base: base-key@0x2aa278c8350 (16-bytes, AES_KEY_GEN) 1012s | params: 16-bytes@0x3ffd54f71b8 1012s | key-offset: 0, key-size: 16 1012s | EXTRACT_KEY_FROM_KEY: 1012s | target: EXTRACT_KEY_FROM_KEY 1012s | key_size: 16-bytes 1012s | base: base-key@0x2aa278cc0b0 (32-bytes, EXTRACT_KEY_FROM_KEY) 1012s | operation: FLAGS_ONLY 1012s | params: 8-bytes@0x3ffd54f70c8 1012s | PRF symkey interface PRF AES_XCBC init key symkey-key@0x2aa278cb360 (size 16) 1012s | PRF symkey interface: key symkey-key@0x2aa278cb360 (16-bytes, EXTRACT_KEY_FROM_KEY) 1012s | XCBC: Key 16=16 just right 1012s | key-offset: 0, key-size: 16 1012s | EXTRACT_KEY_FROM_KEY: 1012s | target: AES_ECB 1012s | flags: SIGN 1012s | key_size: 16-bytes 1012s | base: base-key@0x2aa278cb360 (16-bytes, EXTRACT_KEY_FROM_KEY) 1012s | operation: FLAGS_ONLY 1012s | params: 8-bytes@0x3ffd54f6fd0 1012s | PRF symkey interface PRF AES_XCBC 0x2aa278c82f0 1012s | CONCATENATE_DATA_AND_BASE: 1012s | target: EXTRACT_KEY_FROM_KEY 1012s | base: base-key@0x2aa278c8350 (16-bytes, AES_KEY_GEN) 1012s | params: 16-bytes@0x3ffd54f71b8 1012s | key-offset: 0, key-size: 34 1012s | EXTRACT_KEY_FROM_KEY: 1012s | target: EXTRACT_KEY_FROM_KEY 1012s | key_size: 34-bytes 1012s | base: base-key@0x2aa278cc3f0 (50-bytes, EXTRACT_KEY_FROM_KEY) 1012s | operation: FLAGS_ONLY 1012s | params: 8-bytes@0x3ffd54f70c8 1012s | PRF symkey interface PRF AES_XCBC update symkey message-key@0x2aa278c9c70 (size 34) 1012s | PRF symkey interface: symkey message-key@0x2aa278c9c70 (34-bytes, EXTRACT_KEY_FROM_KEY) 1012s | symkey message extracting all 34 bytes of key@0x2aa278c9c70 1012s | symkey message: symkey-key@0x2aa278c9c70 (34-bytes, EXTRACT_KEY_FROM_KEY) 1012s | sizeof bytes 48 1012s | wrapper: (SECItemType)682: 36 f7 24 82 ad db a1 a3 86 75 9f 31 e8 d4 78 4a 07 4f cf 2d b2 61 ff e6 48 dd 29 01 8b 3b 78 f3 e0 03 5e 92 5a 80 8e 29 63 0d c8 a6 b9 66 4e e7 1012s | symkey message extracted len 48 bytes at 0x2aa278cb9c0 1012s | unwrapped: 1012s | 00 01 02 03 04 05 06 07 08 09 0a 0b 0c 0d 0e 0f ................ 1012s | 10 11 12 13 14 15 16 17 18 19 1a 1b 1c 1d 1e 1f ................ 1012s | 20 21 00 00 00 00 00 00 00 00 00 00 00 00 00 00 !.............. 1012s | XCBC: data 1012s | 00 01 02 03 04 05 06 07 08 09 0a 0b 0c 0d 0e 0f ................ 1012s | 10 11 12 13 14 15 16 17 18 19 1a 1b 1c 1d 1e 1f ................ 1012s | 20 21 ! 1012s | K extracting all 16 bytes of key@0x2aa278cc0b0 1012s | K: symkey-key@0x2aa278cc0b0 (16-bytes, AES_ECB) 1012s | sizeof bytes 16 1012s | wrapper: (SECItemType)1023: 36 f7 24 82 ad db a1 a3 86 75 9f 31 e8 d4 78 4a 1012s | K extracted len 16 bytes at 0x2aa278c8220 1012s | unwrapped: 1012s | 00 01 02 03 04 05 06 07 08 09 0a 0b 0c 0d 0e 0f ................ 1012s | XCBC: K: 1012s | 00 01 02 03 04 05 06 07 08 09 0a 0b 0c 0d 0e 0f ................ 1012s | XCBC: K1 1012s | c3 52 80 57 54 23 7f 31 1a c0 ff f4 e3 e0 3e 78 .R.WT#.1......>x 1012s | CONCATENATE_DATA_AND_BASE: 1012s | target: EXTRACT_KEY_FROM_KEY 1012s | base: base-key@0x2aa278c8350 (16-bytes, AES_KEY_GEN) 1012s | params: 16-bytes@0x3ffd54f6e28 1012s | key-offset: 0, key-size: 16 1012s | EXTRACT_KEY_FROM_KEY: 1012s | target: AES_ECB 1012s | flags: SIGN 1012s | key_size: 16-bytes 1012s | base: base-key@0x2aa278cc750 (32-bytes, EXTRACT_KEY_FROM_KEY) 1012s | operation: FLAGS_ONLY 1012s | params: 8-bytes@0x3ffd54f6e30 1012s | Computing E[3] using K3 1012s | XCBC: K3 1012s | c1 a7 ab a1 a2 3a 94 06 58 07 a0 8c c8 ee d0 6e .....:..X......n 1012s | XCBC: E[n-1] 1012s | 09 02 5e 5a 67 25 20 72 44 14 5c 6b 80 66 85 79 ..^Zg% rD.\k.f.y 1012s | XCBC: M[n] 1012s | 20 21 ! 1012s | XCBC: M[n] 1012s | 20 21 ! 1012s | XCBC: M[n]:80...^E[n-1]^K3 1012s | e8 84 75 fb c5 1f b4 74 1c 13 fc e7 48 88 55 17 ..u....t....H.U. 1012s | XCBC: MAC 1012s | be cb b3 bc cd b5 18 a3 06 77 d5 48 1f b6 b4 d8 .........w.H.... 1012s | CONCATENATE_DATA_AND_BASE: 1012s | target: EXTRACT_KEY_FROM_KEY 1012s | base: base-key@0x2aa278c8350 (16-bytes, AES_KEY_GEN) 1012s | params: 16-bytes@0x3ffd54f7040 1012s | key-offset: 0, key-size: 16 1012s | EXTRACT_KEY_FROM_KEY: 1012s | target: EXTRACT_KEY_FROM_KEY 1012s | key_size: 16-bytes 1012s | base: base-key@0x2aa278cc750 (32-bytes, EXTRACT_KEY_FROM_KEY) 1012s | operation: FLAGS_ONLY 1012s | params: 8-bytes@0x3ffd54f6f50 1012s | PRF symkey interface PRF AES_XCBC final-key@0x2aa278cc3f0 (size 16) 1012s | PRF symkey interface: key-key@0x2aa278cc3f0 (16-bytes, EXTRACT_KEY_FROM_KEY) 1012s | output: symkey-key@0x2aa278cc3f0 (16-bytes, EXTRACT_KEY_FROM_KEY) 1012s | RFC 3566 Test Case 6: AES-XCBC-MAC-96 with 34-byte input extracting all 16 bytes of key@0x2aa278cc3f0 1012s | RFC 3566 Test Case 6: AES-XCBC-MAC-96 with 34-byte input: symkey-key@0x2aa278cc3f0 (16-bytes, EXTRACT_KEY_FROM_KEY) 1012s | sizeof bytes 16 1012s | wrapper: (SECItemType)682: 67 f2 aa 71 20 51 ef bf 67 12 9d bd bc e4 e0 b4 1012s | RFC 3566 Test Case 6: AES-XCBC-MAC-96 with 34-byte input extracted len 16 bytes at 0x2aa278cb590 1012s | unwrapped: 1012s | be cb b3 bc cd b5 18 a3 06 77 d5 48 1f b6 b4 d8 .........w.H.... 1012s | verify_bytes() RFC 3566 Test Case 6: AES-XCBC-MAC-96 with 34-byte input: symkey: ok 1012s ipsec algparse: RFC 3566 Test Case 7: AES-XCBC-MAC-96 with 1000-byte input 1012s | decode_to_chunk() test_prf_vector: input "0x000102030405060708090a0b0c0d0e0f" 1012s | decode_to_chunk() output: 1012s | 00 01 02 03 04 05 06 07 08 09 0a 0b 0c 0d 0e 0f ................ 1012s | decode_to_chunk() test_prf_vector: input "0xf0dafee895db30253761103b5d84528f" 1012s | decode_to_chunk() output: 1012s | f0 da fe e8 95 db 30 25 37 61 10 3b 5d 84 52 8f ......0%7a.;].R. 1012s | PRF chunk interface PRF AES_XCBC init key hunk 0x2aa278cb6b0 (length 16) 1012s | 00 01 02 03 04 05 06 07 08 09 0a 0b 0c 0d 0e 0f ................ 1012s | CONCATENATE_DATA_AND_BASE: 1012s | target: EXTRACT_KEY_FROM_KEY 1012s | base: base-key@0x2aa278c8350 (16-bytes, AES_KEY_GEN) 1012s | params: 16-bytes@0x3ffd54f7050 1012s | key-offset: 0, key-size: 16 1012s | EXTRACT_KEY_FROM_KEY: 1012s | target: EXTRACT_KEY_FROM_KEY 1012s | key_size: 16-bytes 1012s | base: base-key@0x2aa278cb360 (32-bytes, EXTRACT_KEY_FROM_KEY) 1012s | operation: FLAGS_ONLY 1012s | params: 8-bytes@0x3ffd54f6f60 1012s | XCBC: Key 16=16 just right 1012s | key-offset: 0, key-size: 16 1012s | EXTRACT_KEY_FROM_KEY: 1012s | target: AES_ECB 1012s | flags: SIGN 1012s | key_size: 16-bytes 1012s | base: base-key@0x2aa278cc3f0 (16-bytes, EXTRACT_KEY_FROM_KEY) 1012s | operation: FLAGS_ONLY 1012s | params: 8-bytes@0x3ffd54f6f10 1012s | PRF chunk interface PRF AES_XCBC 0x2aa278cbd20 1012s | PRF chunk interface PRF AES_XCBC update message (0x2aa278c9da0 length 1000) 1012s | 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................ 1012s | 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................ 1012s | 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................ 1012s | 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................ 1012s | 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................ 1012s | 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................ 1012s | 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................ 1012s | 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................ 1012s | 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................ 1012s | 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................ 1012s | 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................ 1012s | 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................ 1012s | 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................ 1012s | 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................ 1012s | 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................ 1012s | 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................ 1012s | 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................ 1012s | 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................ 1012s | 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................ 1012s | 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................ 1012s | 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................ 1012s | 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................ 1012s | 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................ 1012s | 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................ 1012s | 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................ 1012s | 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................ 1012s | 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................ 1012s | 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................ 1012s | 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................ 1012s | 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................ 1012s | 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................ 1012s | 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................ 1012s | 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................ 1012s | 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................ 1012s | 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................ 1012s | 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................ 1012s | 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................ 1012s | 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................ 1012s | 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................ 1012s | 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................ 1012s | 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................ 1012s | 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................ 1012s | 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................ 1012s | 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................ 1012s | 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................ 1012s | 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................ 1012s | 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................ 1012s | 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................ 1012s | 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................ 1012s | 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................ 1012s | 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................ 1012s | 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................ 1012s | 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................ 1012s | 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................ 1012s | 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................ 1012s | 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................ 1012s | 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................ 1012s | 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................ 1012s | 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................ 1012s | 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................ 1012s | 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................ 1012s | 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................ 1012s | 00 00 00 00 00 00 00 00 ........ 1012s | XCBC: data 1012s | 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................ 1012s | 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................ 1012s | 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................ 1012s | 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................ 1012s | 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................ 1012s | 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................ 1012s | 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................ 1012s | 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................ 1012s | 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................ 1012s | 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................ 1012s | 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................ 1012s | 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................ 1012s | 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................ 1012s | 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................ 1012s | 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................ 1012s | 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................ 1012s | 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................ 1012s | 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................ 1012s | 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................ 1012s | 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................ 1012s | 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................ 1012s | 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................ 1012s | 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................ 1012s | 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................ 1012s | 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................ 1012s | 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................ 1012s | 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................ 1012s | 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................ 1012s | 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................ 1012s | 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................ 1012s | 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................ 1012s | 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................ 1012s | 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................ 1012s | 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................ 1012s | 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................ 1012s | 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................ 1012s | 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................ 1012s | 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................ 1012s | 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................ 1012s | 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................ 1012s | 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................ 1012s | 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................ 1012s | 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................ 1012s | 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................ 1012s | 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................ 1012s | 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................ 1012s | 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................ 1012s | 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................ 1012s | 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................ 1012s | 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................ 1012s | 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................ 1012s | 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................ 1012s | 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................ 1012s | 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................ 1012s | 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................ 1012s | 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................ 1012s | 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................ 1012s | 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................ 1012s | 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................ 1012s | 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................ 1012s | 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................ 1012s | 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................ 1012s | 00 00 00 00 00 00 00 00 ........ 1012s | K extracting all 16 bytes of key@0x2aa278cb360 1012s | K: symkey-key@0x2aa278cb360 (16-bytes, AES_ECB) 1012s | sizeof bytes 16 1012s | wrapper: (SECItemType)1111695477: 36 f7 24 82 ad db a1 a3 86 75 9f 31 e8 d4 78 4a 1012s | K extracted len 16 bytes at 0x2aa278c8220 1012s | unwrapped: 1012s | 00 01 02 03 04 05 06 07 08 09 0a 0b 0c 0d 0e 0f ................ 1012s | XCBC: K: 1012s | 00 01 02 03 04 05 06 07 08 09 0a 0b 0c 0d 0e 0f ................ 1012s | XCBC: K1 1012s | c3 52 80 57 54 23 7f 31 1a c0 ff f4 e3 e0 3e 78 .R.WT#.1......>x 1012s | CONCATENATE_DATA_AND_BASE: 1012s | target: EXTRACT_KEY_FROM_KEY 1012s | base: base-key@0x2aa278c8350 (16-bytes, AES_KEY_GEN) 1012s | params: 16-bytes@0x3ffd54f6de8 1012s | key-offset: 0, key-size: 16 1012s | EXTRACT_KEY_FROM_KEY: 1012s | target: AES_ECB 1012s | flags: SIGN 1012s | key_size: 16-bytes 1012s | base: base-key@0x2aa278c9c70 (32-bytes, EXTRACT_KEY_FROM_KEY) 1012s | operation: FLAGS_ONLY 1012s | params: 8-bytes@0x3ffd54f6df0 1012s | Computing E[63] using K3 1012s | XCBC: K3 1012s | c1 a7 ab a1 a2 3a 94 06 58 07 a0 8c c8 ee d0 6e .....:..X......n 1012s | XCBC: E[n-1] 1012s | 5c 88 af cc 1e 1e 83 fc c4 2c 0c e4 12 12 f5 17 \........,...... 1012s | XCBC: M[n] 1012s | 00 00 00 00 00 00 00 00 ........ 1012s | XCBC: M[n] 1012s | 00 00 00 00 00 00 00 00 ........ 1012s | XCBC: M[n]:80...^E[n-1]^K3 1012s | 9d 2f 04 6d bc 24 17 fa 1c 2b ac 68 da fc 25 79 ./.m.$...+.h..%y 1012s | XCBC: MAC 1012s | f0 da fe e8 95 db 30 25 37 61 10 3b 5d 84 52 8f ......0%7a.;].R. 1012s | PRF chunk interface PRF AES_XCBC final length 16 1012s | f0 da fe e8 95 db 30 25 37 61 10 3b 5d 84 52 8f ......0%7a.;].R. 1012s | chunk output 1012s | f0 da fe e8 95 db 30 25 37 61 10 3b 5d 84 52 8f ......0%7a.;].R. 1012s | verify_bytes() RFC 3566 Test Case 7: AES-XCBC-MAC-96 with 1000-byte input: prf OUT: ok 1012s | CONCATENATE_DATA_AND_BASE: 1012s | target: EXTRACT_KEY_FROM_KEY 1012s | base: base-key@0x2aa278c8350 (16-bytes, AES_KEY_GEN) 1012s | params: 16-bytes@0x3ffd54f71b8 1012s | key-offset: 0, key-size: 16 1012s | EXTRACT_KEY_FROM_KEY: 1012s | target: EXTRACT_KEY_FROM_KEY 1012s | key_size: 16-bytes 1012s | base: base-key@0x2aa278cc3f0 (32-bytes, EXTRACT_KEY_FROM_KEY) 1012s | operation: FLAGS_ONLY 1012s | params: 8-bytes@0x3ffd54f70c8 1012s | PRF symkey interface PRF AES_XCBC init key symkey-key@0x2aa278cb360 (size 16) 1012s | PRF symkey interface: key symkey-key@0x2aa278cb360 (16-bytes, EXTRACT_KEY_FROM_KEY) 1012s | XCBC: Key 16=16 just right 1012s | key-offset: 0, key-size: 16 1012s | EXTRACT_KEY_FROM_KEY: 1012s | target: AES_ECB 1012s | flags: SIGN 1012s | key_size: 16-bytes 1012s | base: base-key@0x2aa278cb360 (16-bytes, EXTRACT_KEY_FROM_KEY) 1012s | operation: FLAGS_ONLY 1012s | params: 8-bytes@0x3ffd54f6fd0 1012s | PRF symkey interface PRF AES_XCBC 0x2aa278cbd20 1012s | CONCATENATE_DATA_AND_BASE: 1012s | target: EXTRACT_KEY_FROM_KEY 1012s | base: base-key@0x2aa278c8350 (16-bytes, AES_KEY_GEN) 1012s | params: 16-bytes@0x3ffd54f71b8 1012s | key-offset: 0, key-size: 1000 1012s | EXTRACT_KEY_FROM_KEY: 1012s | target: EXTRACT_KEY_FROM_KEY 1012s | key_size: 1000-bytes 1012s | base: base-key@0x2aa278cc0b0 (1016-bytes, EXTRACT_KEY_FROM_KEY) 1012s | operation: FLAGS_ONLY 1012s | params: 8-bytes@0x3ffd54f70c8 1012s | PRF symkey interface PRF AES_XCBC update symkey message-key@0x2aa278c9c70 (size 1000) 1012s | PRF symkey interface: symkey message-key@0x2aa278c9c70 (1000-bytes, EXTRACT_KEY_FROM_KEY) 1012s | symkey message extracting all 1000 bytes of key@0x2aa278c9c70 1012s | symkey message: symkey-key@0x2aa278c9c70 (1000-bytes, EXTRACT_KEY_FROM_KEY) 1012s | sizeof bytes 1008 1012s | wrapper: (SECItemType)682: 11 86 83 6b b8 0a 9f 34 46 a7 f2 59 cc 78 10 ab 11 86 83 6b b8 0a 9f 34 46 a7 f2 59 cc 78 10 ab 11 86 83 6b b8 0a 9f 34 46 a7 f2 59 cc 78 10 ab 11 86 83 6b b8 0a 9f 34 46 a7 f2 59 cc 78 10 ab 11 86 83 6b b8 0a 9f 34 46 a7 f2 59 cc 78 10 ab 11 86 83 6b b8 0a 9f 34 46 a7 f2 59 cc 78 10 ab 11 86 83 6b b8 0a 9f 34 46 a7 f2 59 cc 78 10 ab 11 86 83 6b b8 0a 9f 34 46 a7 f2 59 cc 78 10 ab 11 86 83 6b b8 0a 9f 34 46 a7 f2 59 cc 78 10 ab 11 86 83 6b b8 0a 9f 34 46 a7 f2 59 cc 78 10 ab 11 86 83 6b b8 0a 9f 34 46 a7 f2 59 cc 78 10 ab 11 86 83 6b b8 0a 9f 34 46 a7 f2 59 cc 78 10 ab 11 86 83 6b b8 0a 9f 34 46 a7 f2 59 cc 78 10 ab 11 86 83 6b b8 0a 9f 34 46 a7 f2 59 cc 78 10 ab 11 86 83 6b b8 0a 9f 34 46 a7 f2 59 cc 78 10 ab 11 86 83 6b b8 0a 9f 34 46 a7 f2 59 cc 78 10 ab 11 86 83 6b b8 0a 9f 34 46 a7 f2 59 cc 78 10 ab 11 86 83 6b b8 0a 9f 34 46 a7 f2 59 cc 78 10 ab 11 86 83 6b b8 0a 9f 34 46 a7 f2 59 cc 78 10 ab 11... 1012s | symkey message extracted len 1008 bytes at 0x2aa278ca980 1012s | unwrapped: 1012s | 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................ 1012s | 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................ 1012s | 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................ 1012s | 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................ 1012s | 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................ 1012s | 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................ 1012s | 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................ 1012s | 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................ 1012s | 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................ 1012s | 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................ 1012s | 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................ 1012s | 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................ 1012s | 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................ 1012s | 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................ 1012s | 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................ 1012s | 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................ 1012s | 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................ 1012s | 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................ 1012s | 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................ 1012s | 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................ 1012s | 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................ 1012s | 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................ 1012s | 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................ 1012s | 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................ 1012s | 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................ 1012s | 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................ 1012s | 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................ 1012s | 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................ 1012s | 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................ 1012s | 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................ 1012s | 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................ 1012s | 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................ 1012s | 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................ 1012s | 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................ 1012s | 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................ 1012s | 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................ 1012s | 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................ 1012s | 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................ 1012s | 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................ 1012s | 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................ 1012s | 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................ 1012s | 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................ 1012s | 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................ 1012s | 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................ 1012s | 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................ 1012s | 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................ 1012s | 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................ 1012s | 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................ 1012s | 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................ 1012s | 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................ 1012s | 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................ 1012s | 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................ 1012s | 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................ 1012s | 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................ 1012s | 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................ 1012s | 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................ 1012s | 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................ 1012s | 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................ 1012s | 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................ 1012s | 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................ 1012s | 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................ 1012s | 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................ 1012s | 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................ 1012s | XCBC: data 1012s | 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................ 1012s | 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................ 1012s | 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................ 1012s | 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................ 1012s | 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................ 1012s | 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................ 1012s | 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................ 1012s | 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................ 1012s | 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................ 1012s | 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................ 1012s | 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................ 1012s | 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................ 1012s | 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................ 1012s | 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................ 1012s | 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................ 1012s | 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................ 1012s | 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................ 1012s | 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................ 1012s | 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................ 1012s | 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................ 1012s | 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................ 1012s | 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................ 1012s | 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................ 1012s | 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................ 1012s | 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................ 1012s | 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................ 1012s | 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................ 1012s | 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................ 1012s | 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................ 1012s | 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................ 1012s | 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................ 1012s | 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................ 1012s | 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................ 1012s | 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................ 1012s | 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................ 1012s | 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................ 1012s | 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................ 1012s | 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................ 1012s | 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................ 1012s | 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................ 1012s | 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................ 1012s | 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................ 1012s | 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................ 1012s | 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................ 1012s | 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................ 1012s | 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................ 1012s | 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................ 1012s | 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................ 1012s | 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................ 1012s | 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................ 1012s | 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................ 1012s | 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................ 1012s | 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................ 1012s | 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................ 1012s | 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................ 1012s | 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................ 1012s | 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................ 1012s | 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................ 1012s | 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................ 1012s | 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................ 1012s | 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................ 1012s | 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................ 1012s | 00 00 00 00 00 00 00 00 ........ 1012s | K extracting all 16 bytes of key@0x2aa278cc3f0 1012s | K: symkey-key@0x2aa278cc3f0 (16-bytes, AES_ECB) 1012s | sizeof bytes 16 1012s | wrapper: (SECItemType)1023: 36 f7 24 82 ad db a1 a3 86 75 9f 31 e8 d4 78 4a 1012s | K extracted len 16 bytes at 0x2aa278cbf20 1012s | unwrapped: 1012s | 00 01 02 03 04 05 06 07 08 09 0a 0b 0c 0d 0e 0f ................ 1012s | XCBC: K: 1012s | 00 01 02 03 04 05 06 07 08 09 0a 0b 0c 0d 0e 0f ................ 1012s | XCBC: K1 1012s | c3 52 80 57 54 23 7f 31 1a c0 ff f4 e3 e0 3e 78 .R.WT#.1......>x 1012s | CONCATENATE_DATA_AND_BASE: 1012s | target: EXTRACT_KEY_FROM_KEY 1012s | base: base-key@0x2aa278c8350 (16-bytes, AES_KEY_GEN) 1012s | params: 16-bytes@0x3ffd54f6e28 1012s | key-offset: 0, key-size: 16 1012s | EXTRACT_KEY_FROM_KEY: 1012s | target: AES_ECB 1012s | flags: SIGN 1012s | key_size: 16-bytes 1012s | base: base-key@0x2aa278cc750 (32-bytes, EXTRACT_KEY_FROM_KEY) 1012s | operation: FLAGS_ONLY 1012s | params: 8-bytes@0x3ffd54f6e30 1012s | Computing E[63] using K3 1012s | XCBC: K3 1012s | c1 a7 ab a1 a2 3a 94 06 58 07 a0 8c c8 ee d0 6e .....:..X......n 1012s | XCBC: E[n-1] 1012s | 5c 88 af cc 1e 1e 83 fc c4 2c 0c e4 12 12 f5 17 \........,...... 1012s | XCBC: M[n] 1012s | 00 00 00 00 00 00 00 00 ........ 1012s | XCBC: M[n] 1012s | 00 00 00 00 00 00 00 00 ........ 1012s | XCBC: M[n]:80...^E[n-1]^K3 1012s | 9d 2f 04 6d bc 24 17 fa 1c 2b ac 68 da fc 25 79 ./.m.$...+.h..%y 1012s | XCBC: MAC 1012s | f0 da fe e8 95 db 30 25 37 61 10 3b 5d 84 52 8f ......0%7a.;].R. 1012s | CONCATENATE_DATA_AND_BASE: 1012s | target: EXTRACT_KEY_FROM_KEY 1012s | base: base-key@0x2aa278c8350 (16-bytes, AES_KEY_GEN) 1012s | params: 16-bytes@0x3ffd54f7040 1012s | key-offset: 0, key-size: 16 1012s | EXTRACT_KEY_FROM_KEY: 1012s | target: EXTRACT_KEY_FROM_KEY 1012s | key_size: 16-bytes 1012s | base: base-key@0x2aa278cc750 (32-bytes, EXTRACT_KEY_FROM_KEY) 1012s | operation: FLAGS_ONLY 1012s | params: 8-bytes@0x3ffd54f6f50 1012s | PRF symkey interface PRF AES_XCBC final-key@0x2aa278cc0b0 (size 16) 1012s | PRF symkey interface: key-key@0x2aa278cc0b0 (16-bytes, EXTRACT_KEY_FROM_KEY) 1012s | output: symkey-key@0x2aa278cc0b0 (16-bytes, EXTRACT_KEY_FROM_KEY) 1012s | RFC 3566 Test Case 7: AES-XCBC-MAC-96 with 1000-byte input extracting all 16 bytes of key@0x2aa278cc0b0 1012s | RFC 3566 Test Case 7: AES-XCBC-MAC-96 with 1000-byte input: symkey-key@0x2aa278cc0b0 (16-bytes, EXTRACT_KEY_FROM_KEY) 1012s | sizeof bytes 16 1012s | wrapper: (SECItemType)682: 6a 3e c8 f6 8b 44 50 7a 15 6b 27 4c eb 20 04 f3 1012s | RFC 3566 Test Case 7: AES-XCBC-MAC-96 with 1000-byte input extracted len 16 bytes at 0x2aa278cb9a0 1012s | unwrapped: 1012s | f0 da fe e8 95 db 30 25 37 61 10 3b 5d 84 52 8f ......0%7a.;].R. 1012s | verify_bytes() RFC 3566 Test Case 7: AES-XCBC-MAC-96 with 1000-byte input: symkey: ok 1012s ipsec algparse: RFC 4434 Test Case AES-XCBC-PRF-128 with 20-byte input (key length 16) 1012s | decode_to_chunk() test_prf_vector: input "0x000102030405060708090a0b0c0d0e0f" 1012s | decode_to_chunk() output: 1012s | 00 01 02 03 04 05 06 07 08 09 0a 0b 0c 0d 0e 0f ................ 1012s | decode_to_chunk() test_prf_vector: input "0x000102030405060708090a0b0c0d0e0f10111213" 1012s | decode_to_chunk() output: 1012s | 00 01 02 03 04 05 06 07 08 09 0a 0b 0c 0d 0e 0f ................ 1012s | 10 11 12 13 .... 1012s | decode_to_chunk() test_prf_vector: input "0x47f51b4564966215b8985c63055ed308" 1012s | decode_to_chunk() output: 1012s | 47 f5 1b 45 64 96 62 15 b8 98 5c 63 05 5e d3 08 G..Ed.b...\c.^.. 1012s | PRF chunk interface PRF AES_XCBC init key hunk 0x2aa278cb690 (length 16) 1012s | 00 01 02 03 04 05 06 07 08 09 0a 0b 0c 0d 0e 0f ................ 1012s | CONCATENATE_DATA_AND_BASE: 1012s | target: EXTRACT_KEY_FROM_KEY 1012s | base: base-key@0x2aa278c8350 (16-bytes, AES_KEY_GEN) 1012s | params: 16-bytes@0x3ffd54f7050 1012s | key-offset: 0, key-size: 16 1012s | EXTRACT_KEY_FROM_KEY: 1012s | target: EXTRACT_KEY_FROM_KEY 1012s | key_size: 16-bytes 1012s | base: base-key@0x2aa278cb360 (32-bytes, EXTRACT_KEY_FROM_KEY) 1012s | operation: FLAGS_ONLY 1012s | params: 8-bytes@0x3ffd54f6f60 1012s | XCBC: Key 16=16 just right 1012s | key-offset: 0, key-size: 16 1012s | EXTRACT_KEY_FROM_KEY: 1012s | target: AES_ECB 1012s | flags: SIGN 1012s | key_size: 16-bytes 1012s | base: base-key@0x2aa278cc0b0 (16-bytes, EXTRACT_KEY_FROM_KEY) 1012s | operation: FLAGS_ONLY 1012s | params: 8-bytes@0x3ffd54f6f10 1012s | PRF chunk interface PRF AES_XCBC 0x2aa278cbd20 1012s | PRF chunk interface PRF AES_XCBC update message (0x2aa278c9ba0 length 20) 1012s | 00 01 02 03 04 05 06 07 08 09 0a 0b 0c 0d 0e 0f ................ 1012s | 10 11 12 13 .... 1012s | XCBC: data 1012s | 00 01 02 03 04 05 06 07 08 09 0a 0b 0c 0d 0e 0f ................ 1012s | 10 11 12 13 .... 1012s | K extracting all 16 bytes of key@0x2aa278cb360 1012s | K: symkey-key@0x2aa278cb360 (16-bytes, AES_ECB) 1012s | sizeof bytes 16 1012s | wrapper: (SECItemType)1111695477: 36 f7 24 82 ad db a1 a3 86 75 9f 31 e8 d4 78 4a 1012s | K extracted len 16 bytes at 0x2aa278cc730 1012s | unwrapped: 1012s | 00 01 02 03 04 05 06 07 08 09 0a 0b 0c 0d 0e 0f ................ 1012s | XCBC: K: 1012s | 00 01 02 03 04 05 06 07 08 09 0a 0b 0c 0d 0e 0f ................ 1012s | XCBC: K1 1012s | c3 52 80 57 54 23 7f 31 1a c0 ff f4 e3 e0 3e 78 .R.WT#.1......>x 1012s | CONCATENATE_DATA_AND_BASE: 1012s | target: EXTRACT_KEY_FROM_KEY 1012s | base: base-key@0x2aa278c8350 (16-bytes, AES_KEY_GEN) 1012s | params: 16-bytes@0x3ffd54f6de8 1012s | key-offset: 0, key-size: 16 1012s | EXTRACT_KEY_FROM_KEY: 1012s | target: AES_ECB 1012s | flags: SIGN 1012s | key_size: 16-bytes 1012s | base: base-key@0x2aa278c9c70 (32-bytes, EXTRACT_KEY_FROM_KEY) 1012s | operation: FLAGS_ONLY 1012s | params: 8-bytes@0x3ffd54f6df0 1012s | Computing E[2] using K3 1012s | XCBC: K3 1012s | c1 a7 ab a1 a2 3a 94 06 58 07 a0 8c c8 ee d0 6e .....:..X......n 1012s | XCBC: E[n-1] 1012s | 1d 04 48 fa cf 4d 9c 6f 55 b9 93 da 09 80 3d b3 ..H..M.oU.....=. 1012s | XCBC: M[n] 1012s | 10 11 12 13 .... 1012s | XCBC: M[n] 1012s | 10 11 12 13 .... 1012s | XCBC: M[n]:80...^E[n-1]^K3 1012s | cc b2 f1 48 ed 77 08 69 0d be 33 56 c1 6e ed dd ...H.w.i..3V.n.. 1012s | XCBC: MAC 1012s | 47 f5 1b 45 64 96 62 15 b8 98 5c 63 05 5e d3 08 G..Ed.b...\c.^.. 1012s | PRF chunk interface PRF AES_XCBC final length 16 1012s | 47 f5 1b 45 64 96 62 15 b8 98 5c 63 05 5e d3 08 G..Ed.b...\c.^.. 1012s | chunk output 1012s | 47 f5 1b 45 64 96 62 15 b8 98 5c 63 05 5e d3 08 G..Ed.b...\c.^.. 1012s | verify_bytes() RFC 4434 Test Case AES-XCBC-PRF-128 with 20-byte input (key length 16): prf OUT: ok 1012s | CONCATENATE_DATA_AND_BASE: 1012s | target: EXTRACT_KEY_FROM_KEY 1012s | base: base-key@0x2aa278c8350 (16-bytes, AES_KEY_GEN) 1012s | params: 16-bytes@0x3ffd54f71b8 1012s | key-offset: 0, key-size: 16 1012s | EXTRACT_KEY_FROM_KEY: 1012s | target: EXTRACT_KEY_FROM_KEY 1012s | key_size: 16-bytes 1012s | base: base-key@0x2aa278cc0b0 (32-bytes, EXTRACT_KEY_FROM_KEY) 1012s | operation: FLAGS_ONLY 1012s | params: 8-bytes@0x3ffd54f70c8 1012s | PRF symkey interface PRF AES_XCBC init key symkey-key@0x2aa278cb360 (size 16) 1012s | PRF symkey interface: key symkey-key@0x2aa278cb360 (16-bytes, EXTRACT_KEY_FROM_KEY) 1012s | XCBC: Key 16=16 just right 1012s | key-offset: 0, key-size: 16 1012s | EXTRACT_KEY_FROM_KEY: 1012s | target: AES_ECB 1012s | flags: SIGN 1012s | key_size: 16-bytes 1012s | base: base-key@0x2aa278cb360 (16-bytes, EXTRACT_KEY_FROM_KEY) 1012s | operation: FLAGS_ONLY 1012s | params: 8-bytes@0x3ffd54f6fd0 1012s | PRF symkey interface PRF AES_XCBC 0x2aa278cbd20 1012s | CONCATENATE_DATA_AND_BASE: 1012s | target: EXTRACT_KEY_FROM_KEY 1012s | base: base-key@0x2aa278c8350 (16-bytes, AES_KEY_GEN) 1012s | params: 16-bytes@0x3ffd54f71b8 1012s | key-offset: 0, key-size: 20 1012s | EXTRACT_KEY_FROM_KEY: 1012s | target: EXTRACT_KEY_FROM_KEY 1012s | key_size: 20-bytes 1012s | base: base-key@0x2aa278cc3f0 (36-bytes, EXTRACT_KEY_FROM_KEY) 1012s | operation: FLAGS_ONLY 1012s | params: 8-bytes@0x3ffd54f70c8 1012s | PRF symkey interface PRF AES_XCBC update symkey message-key@0x2aa278c9c70 (size 20) 1012s | PRF symkey interface: symkey message-key@0x2aa278c9c70 (20-bytes, EXTRACT_KEY_FROM_KEY) 1012s | symkey message extracting all 20 bytes of key@0x2aa278c9c70 1012s | symkey message: symkey-key@0x2aa278c9c70 (20-bytes, EXTRACT_KEY_FROM_KEY) 1012s | sizeof bytes 32 1012s | wrapper: (SECItemType)682: 36 f7 24 82 ad db a1 a3 86 75 9f 31 e8 d4 78 4a 1f 70 e6 9e 56 96 f5 58 44 c6 46 d3 65 94 b2 cb 1012s | symkey message extracted len 32 bytes at 0x2aa278c82f0 1012s | unwrapped: 1012s | 00 01 02 03 04 05 06 07 08 09 0a 0b 0c 0d 0e 0f ................ 1012s | 10 11 12 13 00 00 00 00 00 00 00 00 00 00 00 00 ................ 1012s | XCBC: data 1012s | 00 01 02 03 04 05 06 07 08 09 0a 0b 0c 0d 0e 0f ................ 1012s | 10 11 12 13 .... 1012s | K extracting all 16 bytes of key@0x2aa278cc0b0 1012s | K: symkey-key@0x2aa278cc0b0 (16-bytes, AES_ECB) 1012s | sizeof bytes 16 1012s | wrapper: (SECItemType)1023: 36 f7 24 82 ad db a1 a3 86 75 9f 31 e8 d4 78 4a 1012s | K extracted len 16 bytes at 0x2aa278c8220 1012s | unwrapped: 1012s | 00 01 02 03 04 05 06 07 08 09 0a 0b 0c 0d 0e 0f ................ 1012s | XCBC: K: 1012s | 00 01 02 03 04 05 06 07 08 09 0a 0b 0c 0d 0e 0f ................ 1012s | XCBC: K1 1012s | c3 52 80 57 54 23 7f 31 1a c0 ff f4 e3 e0 3e 78 .R.WT#.1......>x 1012s | CONCATENATE_DATA_AND_BASE: 1012s | target: EXTRACT_KEY_FROM_KEY 1012s | base: base-key@0x2aa278c8350 (16-bytes, AES_KEY_GEN) 1012s | params: 16-bytes@0x3ffd54f6e28 1012s | key-offset: 0, key-size: 16 1012s | EXTRACT_KEY_FROM_KEY: 1012s | target: AES_ECB 1012s | flags: SIGN 1012s | key_size: 16-bytes 1012s | base: base-key@0x2aa278cc750 (32-bytes, EXTRACT_KEY_FROM_KEY) 1012s | operation: FLAGS_ONLY 1012s | params: 8-bytes@0x3ffd54f6e30 1012s | Computing E[2] using K3 1012s | XCBC: K3 1012s | c1 a7 ab a1 a2 3a 94 06 58 07 a0 8c c8 ee d0 6e .....:..X......n 1012s | XCBC: E[n-1] 1012s | 1d 04 48 fa cf 4d 9c 6f 55 b9 93 da 09 80 3d b3 ..H..M.oU.....=. 1012s | XCBC: M[n] 1012s | 10 11 12 13 .... 1012s | XCBC: M[n] 1012s | 10 11 12 13 .... 1012s | XCBC: M[n]:80...^E[n-1]^K3 1012s | cc b2 f1 48 ed 77 08 69 0d be 33 56 c1 6e ed dd ...H.w.i..3V.n.. 1012s | XCBC: MAC 1012s | 47 f5 1b 45 64 96 62 15 b8 98 5c 63 05 5e d3 08 G..Ed.b...\c.^.. 1012s | CONCATENATE_DATA_AND_BASE: 1012s | target: EXTRACT_KEY_FROM_KEY 1012s | base: base-key@0x2aa278c8350 (16-bytes, AES_KEY_GEN) 1012s | params: 16-bytes@0x3ffd54f7040 1012s | key-offset: 0, key-size: 16 1012s | EXTRACT_KEY_FROM_KEY: 1012s | target: EXTRACT_KEY_FROM_KEY 1012s | key_size: 16-bytes 1012s | base: base-key@0x2aa278cc750 (32-bytes, EXTRACT_KEY_FROM_KEY) 1012s | operation: FLAGS_ONLY 1012s | params: 8-bytes@0x3ffd54f6f50 1012s | PRF symkey interface PRF AES_XCBC final-key@0x2aa278cc3f0 (size 16) 1012s | PRF symkey interface: key-key@0x2aa278cc3f0 (16-bytes, EXTRACT_KEY_FROM_KEY) 1012s | output: symkey-key@0x2aa278cc3f0 (16-bytes, EXTRACT_KEY_FROM_KEY) 1012s | RFC 4434 Test Case AES-XCBC-PRF-128 with 20-byte input (key length 16) extracting all 16 bytes of key@0x2aa278cc3f0 1012s | RFC 4434 Test Case AES-XCBC-PRF-128 with 20-byte input (key length 16): symkey-key@0x2aa278cc3f0 (16-bytes, EXTRACT_KEY_FROM_KEY) 1012s | sizeof bytes 16 1012s | wrapper: (SECItemType)682: 3b bb d8 25 4d 10 da ba ee 89 af 36 4d b3 80 a8 1012s | RFC 4434 Test Case AES-XCBC-PRF-128 with 20-byte input (key length 16) extracted len 16 bytes at 0x2aa278c8220 1012s | unwrapped: 1012s | 47 f5 1b 45 64 96 62 15 b8 98 5c 63 05 5e d3 08 G..Ed.b...\c.^.. 1012s | verify_bytes() RFC 4434 Test Case AES-XCBC-PRF-128 with 20-byte input (key length 16): symkey: ok 1012s ipsec algparse: RFC 4434 Test Case AES-XCBC-PRF-128 with 20-byte input (key length 10) 1012s | decode_to_chunk() test_prf_vector: input "0x00010203040506070809" 1012s | decode_to_chunk() output: 1012s | 00 01 02 03 04 05 06 07 08 09 .......... 1012s | decode_to_chunk() test_prf_vector: input "0x000102030405060708090a0b0c0d0e0f10111213" 1012s | decode_to_chunk() output: 1012s | 00 01 02 03 04 05 06 07 08 09 0a 0b 0c 0d 0e 0f ................ 1012s | 10 11 12 13 .... 1012s | decode_to_chunk() test_prf_vector: input "0x0fa087af7d866e7653434e602fdde835" 1012s | decode_to_chunk() output: 1012s | 0f a0 87 af 7d 86 6e 76 53 43 4e 60 2f dd e8 35 ....}.nvSCN`/..5 1012s | PRF chunk interface PRF AES_XCBC init key hunk 0x2aa278cb690 (length 10) 1012s | 00 01 02 03 04 05 06 07 08 09 .......... 1012s | CONCATENATE_DATA_AND_BASE: 1012s | target: EXTRACT_KEY_FROM_KEY 1012s | base: base-key@0x2aa278c8350 (16-bytes, AES_KEY_GEN) 1012s | params: 16-bytes@0x3ffd54f7050 1012s | key-offset: 0, key-size: 10 1012s | EXTRACT_KEY_FROM_KEY: 1012s | target: EXTRACT_KEY_FROM_KEY 1012s | key_size: 10-bytes 1012s | base: base-key@0x2aa278cb360 (26-bytes, EXTRACT_KEY_FROM_KEY) 1012s | operation: FLAGS_ONLY 1012s | params: 8-bytes@0x3ffd54f6f60 1012s | XCBC: Key 10<16 too small, padding with zeros 1012s | CONCATENATE_BASE_AND_DATA: 1012s | target: EXTRACT_KEY_FROM_KEY 1012s | base: base-key@0x2aa278cc3f0 (10-bytes, EXTRACT_KEY_FROM_KEY) 1012s | params: 16-bytes@0x3ffd54f6f10 1012s | key-offset: 0, key-size: 16 1012s | EXTRACT_KEY_FROM_KEY: 1012s | target: AES_ECB 1012s | flags: SIGN 1012s | key_size: 16-bytes 1012s | base: base-key@0x2aa278cb360 (16-bytes, EXTRACT_KEY_FROM_KEY) 1012s | operation: FLAGS_ONLY 1012s | params: 8-bytes@0x3ffd54f6f10 1012s | PRF chunk interface PRF AES_XCBC 0x2aa278cbd20 1012s | PRF chunk interface PRF AES_XCBC update message (0x2aa278c9ba0 length 20) 1012s | 00 01 02 03 04 05 06 07 08 09 0a 0b 0c 0d 0e 0f ................ 1012s | 10 11 12 13 .... 1012s | XCBC: data 1012s | 00 01 02 03 04 05 06 07 08 09 0a 0b 0c 0d 0e 0f ................ 1012s | 10 11 12 13 .... 1012s | K extracting all 16 bytes of key@0x2aa278c9c70 1012s | K: symkey-key@0x2aa278c9c70 (16-bytes, AES_ECB) 1012s | sizeof bytes 16 1012s | wrapper: (SECItemType)1111695477: ea a5 fc 42 21 19 c1 6c a5 95 44 a5 90 a8 7c a8 1012s | K extracted len 16 bytes at 0x2aa278cb6b0 1012s | unwrapped: 1012s | 00 01 02 03 04 05 06 07 08 09 00 00 00 00 00 00 ................ 1012s | XCBC: K: 1012s | 00 01 02 03 04 05 06 07 08 09 00 00 00 00 00 00 ................ 1012s | XCBC: K1 1012s | 50 ca b2 4d 03 34 45 5e 40 7b 25 0f dd 7c f8 d5 P..M.4E^@{%..|.. 1012s | CONCATENATE_DATA_AND_BASE: 1012s | target: EXTRACT_KEY_FROM_KEY 1012s | base: base-key@0x2aa278c8350 (16-bytes, AES_KEY_GEN) 1012s | params: 16-bytes@0x3ffd54f6de8 1012s | key-offset: 0, key-size: 16 1012s | EXTRACT_KEY_FROM_KEY: 1012s | target: AES_ECB 1012s | flags: SIGN 1012s | key_size: 16-bytes 1012s | base: base-key@0x2aa278cb360 (32-bytes, EXTRACT_KEY_FROM_KEY) 1012s | operation: FLAGS_ONLY 1012s | params: 8-bytes@0x3ffd54f6df0 1012s | Computing E[2] using K3 1012s | XCBC: K3 1012s | 8e f7 48 db 56 f1 f7 26 24 72 f2 c5 63 b0 3f 88 ..H.V..&$r..c.?. 1012s | XCBC: E[n-1] 1012s | fe 1f 63 e9 65 1a 4b bb 3c cc cd 0d cc 83 e4 30 ..c.e.K.<......0 1012s | XCBC: M[n] 1012s | 10 11 12 13 .... 1012s | XCBC: M[n] 1012s | 10 11 12 13 .... 1012s | XCBC: M[n]:80...^E[n-1]^K3 1012s | 60 f9 39 21 b3 eb bc 9d 18 be 3f c8 af 33 db b8 `.9!......?..3.. 1012s | XCBC: MAC 1012s | 0f a0 87 af 7d 86 6e 76 53 43 4e 60 2f dd e8 35 ....}.nvSCN`/..5 1012s | PRF chunk interface PRF AES_XCBC final length 16 1012s | 0f a0 87 af 7d 86 6e 76 53 43 4e 60 2f dd e8 35 ....}.nvSCN`/..5 1012s | chunk output 1012s | 0f a0 87 af 7d 86 6e 76 53 43 4e 60 2f dd e8 35 ....}.nvSCN`/..5 1012s | verify_bytes() RFC 4434 Test Case AES-XCBC-PRF-128 with 20-byte input (key length 10): prf OUT: ok 1012s | CONCATENATE_DATA_AND_BASE: 1012s | target: EXTRACT_KEY_FROM_KEY 1012s | base: base-key@0x2aa278c8350 (16-bytes, AES_KEY_GEN) 1012s | params: 16-bytes@0x3ffd54f71b8 1012s | key-offset: 0, key-size: 10 1012s | EXTRACT_KEY_FROM_KEY: 1012s | target: EXTRACT_KEY_FROM_KEY 1012s | key_size: 10-bytes 1012s | base: base-key@0x2aa278cc3f0 (26-bytes, EXTRACT_KEY_FROM_KEY) 1012s | operation: FLAGS_ONLY 1012s | params: 8-bytes@0x3ffd54f70c8 1012s | PRF symkey interface PRF AES_XCBC init key symkey-key@0x2aa278c9c70 (size 10) 1012s | PRF symkey interface: key symkey-key@0x2aa278c9c70 (10-bytes, EXTRACT_KEY_FROM_KEY) 1012s | XCBC: Key 10<16 too small, padding with zeros 1012s | CONCATENATE_BASE_AND_DATA: 1012s | target: EXTRACT_KEY_FROM_KEY 1012s | base: base-key@0x2aa278c9c70 (10-bytes, EXTRACT_KEY_FROM_KEY) 1012s | params: 16-bytes@0x3ffd54f6fd0 1012s | key-offset: 0, key-size: 16 1012s | EXTRACT_KEY_FROM_KEY: 1012s | target: AES_ECB 1012s | flags: SIGN 1012s | key_size: 16-bytes 1012s | base: base-key@0x2aa278cc3f0 (16-bytes, EXTRACT_KEY_FROM_KEY) 1012s | operation: FLAGS_ONLY 1012s | params: 8-bytes@0x3ffd54f6fd0 1012s | PRF symkey interface PRF AES_XCBC 0x2aa278cbd20 1012s | CONCATENATE_DATA_AND_BASE: 1012s | target: EXTRACT_KEY_FROM_KEY 1012s | base: base-key@0x2aa278c8350 (16-bytes, AES_KEY_GEN) 1012s | params: 16-bytes@0x3ffd54f71b8 1012s | key-offset: 0, key-size: 20 1012s | EXTRACT_KEY_FROM_KEY: 1012s | target: EXTRACT_KEY_FROM_KEY 1012s | key_size: 20-bytes 1012s | base: base-key@0x2aa278cc0b0 (36-bytes, EXTRACT_KEY_FROM_KEY) 1012s | operation: FLAGS_ONLY 1012s | params: 8-bytes@0x3ffd54f70c8 1012s | PRF symkey interface PRF AES_XCBC update symkey message-key@0x2aa278cc3f0 (size 20) 1012s | PRF symkey interface: symkey message-key@0x2aa278cc3f0 (20-bytes, EXTRACT_KEY_FROM_KEY) 1012s | symkey message extracting all 20 bytes of key@0x2aa278cc3f0 1012s | symkey message: symkey-key@0x2aa278cc3f0 (20-bytes, EXTRACT_KEY_FROM_KEY) 1012s | sizeof bytes 32 1012s | wrapper: (SECItemType)682: 36 f7 24 82 ad db a1 a3 86 75 9f 31 e8 d4 78 4a 1f 70 e6 9e 56 96 f5 58 44 c6 46 d3 65 94 b2 cb 1012s | symkey message extracted len 32 bytes at 0x2aa278c8320 1012s initializing NSS db 1012s running pluto selftest 1012s | unwrapped: 1012s | 00 01 02 03 04 05 06 07 08 09 0a 0b 0c 0d 0e 0f ................ 1012s | 10 11 12 13 00 00 00 00 00 00 00 00 00 00 00 00 ................ 1012s | XCBC: data 1012s | 00 01 02 03 04 05 06 07 08 09 0a 0b 0c 0d 0e 0f ................ 1012s | 10 11 12 13 .... 1012s | K extracting all 16 bytes of key@0x2aa278cb360 1012s | K: symkey-key@0x2aa278cb360 (16-bytes, AES_ECB) 1012s | sizeof bytes 16 1012s | wrapper: (SECItemType)1023: ea a5 fc 42 21 19 c1 6c a5 95 44 a5 90 a8 7c a8 1012s | K extracted len 16 bytes at 0x2aa278cc090 1012s | unwrapped: 1012s | 00 01 02 03 04 05 06 07 08 09 00 00 00 00 00 00 ................ 1012s | XCBC: K: 1012s | 00 01 02 03 04 05 06 07 08 09 00 00 00 00 00 00 ................ 1012s | XCBC: K1 1012s | 50 ca b2 4d 03 34 45 5e 40 7b 25 0f dd 7c f8 d5 P..M.4E^@{%..|.. 1012s | CONCATENATE_DATA_AND_BASE: 1012s | target: EXTRACT_KEY_FROM_KEY 1012s | base: base-key@0x2aa278c8350 (16-bytes, AES_KEY_GEN) 1012s | params: 16-bytes@0x3ffd54f6e28 1012s | key-offset: 0, key-size: 16 1012s | EXTRACT_KEY_FROM_KEY: 1012s | target: AES_ECB 1012s | flags: SIGN 1012s | key_size: 16-bytes 1012s | base: base-key@0x2aa278cc750 (32-bytes, EXTRACT_KEY_FROM_KEY) 1012s | operation: FLAGS_ONLY 1012s | params: 8-bytes@0x3ffd54f6e30 1012s | Computing E[2] using K3 1012s | XCBC: K3 1012s | 8e f7 48 db 56 f1 f7 26 24 72 f2 c5 63 b0 3f 88 ..H.V..&$r..c.?. 1012s | XCBC: E[n-1] 1012s | fe 1f 63 e9 65 1a 4b bb 3c cc cd 0d cc 83 e4 30 ..c.e.K.<......0 1012s | XCBC: M[n] 1012s | 10 11 12 13 .... 1012s | XCBC: M[n] 1012s | 10 11 12 13 .... 1012s | XCBC: M[n]:80...^E[n-1]^K3 1012s | 60 f9 39 21 b3 eb bc 9d 18 be 3f c8 af 33 db b8 `.9!......?..3.. 1012s | XCBC: MAC 1012s | 0f a0 87 af 7d 86 6e 76 53 43 4e 60 2f dd e8 35 ....}.nvSCN`/..5 1012s | CONCATENATE_DATA_AND_BASE: 1012s | target: EXTRACT_KEY_FROM_KEY 1012s | base: base-key@0x2aa278c8350 (16-bytes, AES_KEY_GEN) 1012s | params: 16-bytes@0x3ffd54f7040 1012s | key-offset: 0, key-size: 16 1012s | EXTRACT_KEY_FROM_KEY: 1012s | target: EXTRACT_KEY_FROM_KEY 1012s | key_size: 16-bytes 1012s | base: base-key@0x2aa278cc750 (32-bytes, EXTRACT_KEY_FROM_KEY) 1012s | operation: FLAGS_ONLY 1012s | params: 8-bytes@0x3ffd54f6f50 1012s | PRF symkey interface PRF AES_XCBC final-key@0x2aa278cc0b0 (size 16) 1012s | PRF symkey interface: key-key@0x2aa278cc0b0 (16-bytes, EXTRACT_KEY_FROM_KEY) 1012s | output: symkey-key@0x2aa278cc0b0 (16-bytes, EXTRACT_KEY_FROM_KEY) 1012s | RFC 4434 Test Case AES-XCBC-PRF-128 with 20-byte input (key length 10) extracting all 16 bytes of key@0x2aa278cc0b0 1012s | RFC 4434 Test Case AES-XCBC-PRF-128 with 20-byte input (key length 10): symkey-key@0x2aa278cc0b0 (16-bytes, EXTRACT_KEY_FROM_KEY) 1012s | sizeof bytes 16 1012s | wrapper: (SECItemType)682: 85 9c a3 2c 5b fa 1d 1e ce c9 a0 90 95 b0 50 dd 1012s | RFC 4434 Test Case AES-XCBC-PRF-128 with 20-byte input (key length 10) extracted len 16 bytes at 0x2aa278cc090 1012s | unwrapped: 1012s | 0f a0 87 af 7d 86 6e 76 53 43 4e 60 2f dd e8 35 ....}.nvSCN`/..5 1012s | verify_bytes() RFC 4434 Test Case AES-XCBC-PRF-128 with 20-byte input (key length 10): symkey: ok 1012s ipsec algparse: RFC 4434 Test Case AES-XCBC-PRF-128 with 20-byte input (key length 18) 1012s | decode_to_chunk() test_prf_vector: input "0x000102030405060708090a0b0c0d0e0fedcb" 1012s | decode_to_chunk() output: 1012s | 00 01 02 03 04 05 06 07 08 09 0a 0b 0c 0d 0e 0f ................ 1012s | ed cb .. 1012s | decode_to_chunk() test_prf_vector: input "0x000102030405060708090a0b0c0d0e0f10111213" 1012s | decode_to_chunk() output: 1012s | 00 01 02 03 04 05 06 07 08 09 0a 0b 0c 0d 0e 0f ................ 1012s | 10 11 12 13 .... 1012s | decode_to_chunk() test_prf_vector: input "0x8cd3c93ae598a9803006ffb67c40e9e4" 1012s | decode_to_chunk() output: 1012s | 8c d3 c9 3a e5 98 a9 80 30 06 ff b6 7c 40 e9 e4 ...:....0...|@.. 1012s | PRF chunk interface PRF AES_XCBC init key hunk 0x2aa278cb690 (length 18) 1012s | 00 01 02 03 04 05 06 07 08 09 0a 0b 0c 0d 0e 0f ................ 1012s | ed cb .. 1012s | CONCATENATE_DATA_AND_BASE: 1012s | target: EXTRACT_KEY_FROM_KEY 1012s | base: base-key@0x2aa278c8350 (16-bytes, AES_KEY_GEN) 1012s | params: 16-bytes@0x3ffd54f7050 1012s | key-offset: 0, key-size: 18 1012s | EXTRACT_KEY_FROM_KEY: 1012s | target: EXTRACT_KEY_FROM_KEY 1012s | key_size: 18-bytes 1012s | base: base-key@0x2aa278c9c70 (34-bytes, EXTRACT_KEY_FROM_KEY) 1012s | operation: FLAGS_ONLY 1012s | params: 8-bytes@0x3ffd54f6f60 1012s | XCBC: Key 18>16 too big, rehashing to size 1012s | CONCATENATE_DATA_AND_BASE: 1012s | target: EXTRACT_KEY_FROM_KEY 1012s | base: base-key@0x2aa278c8350 (16-bytes, AES_KEY_GEN) 1012s | params: 16-bytes@0x3ffd54f6e58 1012s | key-offset: 0, key-size: 16 1012s | EXTRACT_KEY_FROM_KEY: 1012s | target: AES_ECB 1012s | flags: SIGN 1012s | key_size: 16-bytes 1012s | base: base-key@0x2aa278cc3f0 (32-bytes, EXTRACT_KEY_FROM_KEY) 1012s | operation: FLAGS_ONLY 1012s | params: 8-bytes@0x3ffd54f6e60 1012s | draft_chunk extracting all 18 bytes of key@0x2aa278cc0b0 1012s | draft_chunk: symkey-key@0x2aa278cc0b0 (18-bytes, EXTRACT_KEY_FROM_KEY) 1012s | sizeof bytes 32 1012s | wrapper: (SECItemType)682: 36 f7 24 82 ad db a1 a3 86 75 9f 31 e8 d4 78 4a 58 0e 05 ae e2 a1 cf ef e2 73 1e 18 27 3a 33 08 1012s | draft_chunk extracted len 32 bytes at 0x2aa278c8320 1012s | unwrapped: 1012s | 00 01 02 03 04 05 06 07 08 09 0a 0b 0c 0d 0e 0f ................ 1012s | ed cb 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................ 1012s | XCBC: data 1012s | 00 01 02 03 04 05 06 07 08 09 0a 0b 0c 0d 0e 0f ................ 1012s | ed cb .. 1012s | K extracting all 16 bytes of key@0x2aa278c9c70 1012s | K: symkey-key@0x2aa278c9c70 (16-bytes, AES_ECB) 1012s | sizeof bytes 16 1012s | wrapper: (SECItemType)1023: 11 86 83 6b b8 0a 9f 34 46 a7 f2 59 cc 78 10 ab 1012s | K extracted len 16 bytes at 0x2aa278cc730 1012s | unwrapped: 1012s | 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................ 1012s | XCBC: K: 1012s | 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................ 1012s | XCBC: K1 1012s | e1 4d 5d 0e e2 77 15 df 08 b4 15 2b a2 3d a8 e0 .M]..w.....+.=.. 1012s | CONCATENATE_DATA_AND_BASE: 1012s | target: EXTRACT_KEY_FROM_KEY 1012s | base: base-key@0x2aa278c8350 (16-bytes, AES_KEY_GEN) 1012s | params: 16-bytes@0x3ffd54f6cf8 1012s | key-offset: 0, key-size: 16 1012s | EXTRACT_KEY_FROM_KEY: 1012s | target: AES_ECB 1012s | flags: SIGN 1012s | key_size: 16-bytes 1012s | base: base-key@0x2aa278cb360 (32-bytes, EXTRACT_KEY_FROM_KEY) 1012s | operation: FLAGS_ONLY 1012s | params: 8-bytes@0x3ffd54f6d00 1012s | Computing E[2] using K3 1012s | XCBC: K3 1012s | 8d 34 ef cb 3b d5 45 ca 06 2a ec df ef 7c 0b fa .4..;.E..*...|.. 1012s | XCBC: E[n-1] 1012s | 0b 72 b2 ae 0a 37 79 81 75 6a d5 9c 79 c0 e6 96 .r...7y.uj..y... 1012s | XCBC: M[n] 1012s | ed cb .. 1012s | XCBC: M[n] 1012s | ed cb .. 1012s | XCBC: M[n]:80...^E[n-1]^K3 1012s | 6b 8d dd 65 31 e2 3c 4b 73 40 39 43 96 bc ed 6c k..e1.16 too big, rehashing to size 1012s | CONCATENATE_DATA_AND_BASE: 1012s | target: EXTRACT_KEY_FROM_KEY 1012s | base: base-key@0x2aa278c8350 (16-bytes, AES_KEY_GEN) 1012s | params: 16-bytes@0x3ffd54f6f18 1012s | key-offset: 0, key-size: 16 1012s | EXTRACT_KEY_FROM_KEY: 1012s | target: AES_ECB 1012s | flags: SIGN 1012s | key_size: 16-bytes 1012s | base: base-key@0x2aa278c9c70 (32-bytes, EXTRACT_KEY_FROM_KEY) 1012s | operation: FLAGS_ONLY 1012s | params: 8-bytes@0x3ffd54f6f20 1012s | draft_chunk extracting all 18 bytes of key@0x2aa278cc3f0 1012s | draft_chunk: symkey-key@0x2aa278cc3f0 (18-bytes, EXTRACT_KEY_FROM_KEY) 1012s | sizeof bytes 32 1012s | wrapper: siBuffer: 36 f7 24 82 ad db a1 a3 86 75 9f 31 e8 d4 78 4a 58 0e 05 ae e2 a1 cf ef e2 73 1e 18 27 3a 33 08 1012s | draft_chunk extracted len 32 bytes at 0x2aa278cbd20 1012s | unwrapped: 1012s | 00 01 02 03 04 05 06 07 08 09 0a 0b 0c 0d 0e 0f ................ 1012s | ed cb 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................ 1012s | XCBC: data 1012s | 00 01 02 03 04 05 06 07 08 09 0a 0b 0c 0d 0e 0f ................ 1012s | ed cb .. 1012s | K extracting all 16 bytes of key@0x2aa278cc0b0 1012s | K: symkey-key@0x2aa278cc0b0 (16-bytes, AES_ECB) 1012s | sizeof bytes 16 1012s | wrapper: (SECItemType)1023: 11 86 83 6b b8 0a 9f 34 46 a7 f2 59 cc 78 10 ab 1012s | K extracted len 16 bytes at 0x2aa278cb590 1012s | unwrapped: 1012s | 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................ 1012s | XCBC: K: 1012s | 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................ 1012s | XCBC: K1 1012s | e1 4d 5d 0e e2 77 15 df 08 b4 15 2b a2 3d a8 e0 .M]..w.....+.=.. 1012s | CONCATENATE_DATA_AND_BASE: 1012s | target: EXTRACT_KEY_FROM_KEY 1012s | base: base-key@0x2aa278c8350 (16-bytes, AES_KEY_GEN) 1012s | params: 16-bytes@0x3ffd54f6db8 1012s | key-offset: 0, key-size: 16 1012s | EXTRACT_KEY_FROM_KEY: 1012s | target: AES_ECB 1012s | flags: SIGN 1012s | key_size: 16-bytes 1012s | base: base-key@0x2aa278cb360 (32-bytes, EXTRACT_KEY_FROM_KEY) 1012s | operation: FLAGS_ONLY 1012s | params: 8-bytes@0x3ffd54f6dc0 1012s | Computing E[2] using K3 1012s | XCBC: K3 1012s | 8d 34 ef cb 3b d5 45 ca 06 2a ec df ef 7c 0b fa .4..;.E..*...|.. 1012s | XCBC: E[n-1] 1012s | 0b 72 b2 ae 0a 37 79 81 75 6a d5 9c 79 c0 e6 96 .r...7y.uj..y... 1012s | XCBC: M[n] 1012s | ed cb .. 1012s | XCBC: M[n] 1012s | ed cb .. 1012s | XCBC: M[n]:80...^E[n-1]^K3 1012s | 6b 8d dd 65 31 e2 3c 4b 73 40 39 43 96 bc ed 6c k..e1.j.....n1.].8 1012s | PRF chunk interface PRF HMAC_MD5 init key hunk 0x2aa278c9ba0 (length 4) 1012s | 4a 65 66 65 Jefe 1012s | CONCATENATE_DATA_AND_BASE: 1012s | target: EXTRACT_KEY_FROM_KEY 1012s | base: base-key@0x2aa278c8350 (16-bytes, AES_KEY_GEN) 1012s | params: 16-bytes@0x3ffd54f6f90 1012s | key-offset: 0, key-size: 4 1012s | EXTRACT_KEY_FROM_KEY: 1012s | target: MD5_HMAC 1012s | flags: SIGN 1012s | key_size: 4-bytes 1012s | base: base-key@0x2aa278cb360 (20-bytes, EXTRACT_KEY_FROM_KEY) 1012s | operation: FLAGS_ONLY 1012s | params: 8-bytes@0x3ffd54f6f98 1012s | PRF chunk interface prf: created HMAC_MD5 context 0x2aa278cb6d0 from key-key@0x2aa278cc3f0 1012s | PRF chunk interface prf: begin HMAC_MD5 with context 0x2aa278cb6d0 from key-key@0x2aa278cc3f0 1012s | PRF chunk interface PRF HMAC_MD5 0x2aa278cbdb0 1012s | PRF chunk interface PRF HMAC_MD5 update message (0x2aa278cbd20 length 28) 1012s | 77 68 61 74 20 64 6f 20 79 61 20 77 61 6e 74 20 what do ya want 1012s | 66 6f 72 20 6e 6f 74 68 69 6e 67 3f for nothing? 1012s | PRF chunk interface PRF HMAC_MD5 final length 16 1012s | 75 0c 78 3e 6a b0 b5 03 ea a8 6e 31 0a 5d b7 38 u.x>j.....n1.].8 1012s | chunk output 1012s | 75 0c 78 3e 6a b0 b5 03 ea a8 6e 31 0a 5d b7 38 u.x>j.....n1.].8 1012s | verify_bytes() RFC 2104: MD5_HMAC test 2: prf OUT: ok 1012s | CONCATENATE_DATA_AND_BASE: 1012s | target: EXTRACT_KEY_FROM_KEY 1012s | base: base-key@0x2aa278c8350 (16-bytes, AES_KEY_GEN) 1012s | params: 16-bytes@0x3ffd54f71b8 1012s | key-offset: 0, key-size: 4 1012s | EXTRACT_KEY_FROM_KEY: 1012s | target: EXTRACT_KEY_FROM_KEY 1012s | key_size: 4-bytes 1012s | base: base-key@0x2aa278cb360 (20-bytes, EXTRACT_KEY_FROM_KEY) 1012s | operation: FLAGS_ONLY 1012s | params: 8-bytes@0x3ffd54f70c8 1012s | PRF symkey interface PRF HMAC_MD5 init key symkey-key@0x2aa278cc3f0 (size 4) 1012s | PRF symkey interface: key symkey-key@0x2aa278cc3f0 (4-bytes, EXTRACT_KEY_FROM_KEY) 1012s | key-offset: 0, key-size: 4 1012s | EXTRACT_KEY_FROM_KEY: 1012s | target: MD5_HMAC 1012s | flags: SIGN 1012s | key_size: 4-bytes 1012s | base: base-key@0x2aa278cc3f0 (4-bytes, EXTRACT_KEY_FROM_KEY) 1012s | operation: FLAGS_ONLY 1012s | params: 8-bytes@0x3ffd54f7050 1012s | PRF symkey interface prf: created HMAC_MD5 context 0x2aa278cc890 from key symkey-key@0x2aa278cb360 1012s | PRF symkey interface prf: begin HMAC_MD5 with context 0x2aa278cc890 from key symkey-key@0x2aa278cb360 1012s | PRF symkey interface PRF HMAC_MD5 0x2aa278c82f0 1012s | CONCATENATE_DATA_AND_BASE: 1012s | target: EXTRACT_KEY_FROM_KEY 1012s | base: base-key@0x2aa278c8350 (16-bytes, AES_KEY_GEN) 1012s | params: 16-bytes@0x3ffd54f71b8 1012s | key-offset: 0, key-size: 28 1012s | EXTRACT_KEY_FROM_KEY: 1012s | target: EXTRACT_KEY_FROM_KEY 1012s | key_size: 28-bytes 1012s | base: base-key@0x2aa278c9c70 (44-bytes, EXTRACT_KEY_FROM_KEY) 1012s | operation: FLAGS_ONLY 1012s | params: 8-bytes@0x3ffd54f70c8 1012s | PRF symkey interface PRF HMAC_MD5 update symkey message-key@0x2aa278cc0b0 (size 28) 1012s | PRF symkey interface: symkey message-key@0x2aa278cc0b0 (28-bytes, EXTRACT_KEY_FROM_KEY) 1012s | nss hmac digest hack extracting all 28 bytes of key@0x2aa278cc0b0 1012s | nss hmac digest hack: symkey-key@0x2aa278cc0b0 (28-bytes, EXTRACT_KEY_FROM_KEY) 1012s | sizeof bytes 32 1012s | wrapper: (SECItemType)682: 6e 25 37 e6 d5 61 46 d3 08 ba 7a 87 d3 94 89 9f c3 a9 76 13 7f 31 01 38 70 7f 73 e5 31 45 6d 1d 1012s | nss hmac digest hack extracted len 32 bytes at 0x2aa278d2cc0 1012s | unwrapped: 1012s | 77 68 61 74 20 64 6f 20 79 61 20 77 61 6e 74 20 what do ya want 1012s | 66 6f 72 20 6e 6f 74 68 69 6e 67 3f 00 00 00 00 for nothing?.... 1012s | CONCATENATE_DATA_AND_BASE: 1012s | target: EXTRACT_KEY_FROM_KEY 1012s | base: base-key@0x2aa278c8350 (16-bytes, AES_KEY_GEN) 1012s | params: 16-bytes@0x3ffd54f7068 1012s | key-offset: 0, key-size: 16 1012s | EXTRACT_KEY_FROM_KEY: 1012s | target: EXTRACT_KEY_FROM_KEY 1012s | key_size: 16-bytes 1012s | base: base-key@0x2aa278c9c70 (32-bytes, EXTRACT_KEY_FROM_KEY) 1012s | operation: FLAGS_ONLY 1012s | params: 8-bytes@0x3ffd54f6f78 1012s | PRF symkey interface PRF HMAC_MD5 final-key@0x2aa278cb360 (size 16) 1012s | PRF symkey interface: key-key@0x2aa278cb360 (16-bytes, EXTRACT_KEY_FROM_KEY) 1012s | output: symkey-key@0x2aa278cb360 (16-bytes, EXTRACT_KEY_FROM_KEY) 1012s | RFC 2104: MD5_HMAC test 2 extracting all 16 bytes of key@0x2aa278cb360 1012s | RFC 2104: MD5_HMAC test 2: symkey-key@0x2aa278cb360 (16-bytes, EXTRACT_KEY_FROM_KEY) 1012s | sizeof bytes 16 1012s | wrapper: (SECItemType)682: ab c2 53 a8 20 7a 7b aa 0d 8d 30 cf d3 32 b9 ed 1012s | RFC 2104: MD5_HMAC test 2 extracted len 16 bytes at 0x2aa278cb6b0 1012s | unwrapped: 1012s | 75 0c 78 3e 6a b0 b5 03 ea a8 6e 31 0a 5d b7 38 u.x>j.....n1.].8 1012s | verify_bytes() RFC 2104: MD5_HMAC test 2: symkey: ok 1012s ipsec algparse: RFC 2104: MD5_HMAC test 3 1012s | decode_to_chunk() test_prf_vector: input "0xAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAA" 1012s | decode_to_chunk() output: 1012s | aa aa aa aa aa aa aa aa aa aa aa aa aa aa aa aa ................ 1012s | decode_to_chunk() test_prf_vector: input "0xDDDDDDDDDDDDDDDDDDDDDDDDDDDDDDDDDDDDDDDDDDDDDDDDDDDDDDDDDDDDDDDDDDDDDDDDDDDDDDDDDDDDDDDDDDDDDDDDDDDD" 1012s | decode_to_chunk() output: 1012s | dd dd dd dd dd dd dd dd dd dd dd dd dd dd dd dd ................ 1012s | dd dd dd dd dd dd dd dd dd dd dd dd dd dd dd dd ................ 1012s | dd dd dd dd dd dd dd dd dd dd dd dd dd dd dd dd ................ 1012s | dd dd .. 1012s | decode_to_chunk() test_prf_vector: input "0x56be34521d144c88dbb8c733f0e8b3f6" 1012s | decode_to_chunk() output: 1012s | 56 be 34 52 1d 14 4c 88 db b8 c7 33 f0 e8 b3 f6 V.4R..L....3.... 1012s | PRF chunk interface PRF HMAC_MD5 init key hunk 0x2aa278c8220 (length 16) 1012s | aa aa aa aa aa aa aa aa aa aa aa aa aa aa aa aa ................ 1012s | CONCATENATE_DATA_AND_BASE: 1012s | target: EXTRACT_KEY_FROM_KEY 1012s | base: base-key@0x2aa278c8350 (16-bytes, AES_KEY_GEN) 1012s | params: 16-bytes@0x3ffd54f6f90 1012s | key-offset: 0, key-size: 16 1012s | EXTRACT_KEY_FROM_KEY: 1012s | target: MD5_HMAC 1012s | flags: SIGN 1012s | key_size: 16-bytes 1012s | base: base-key@0x2aa278cc3f0 (32-bytes, EXTRACT_KEY_FROM_KEY) 1012s | operation: FLAGS_ONLY 1012s | params: 8-bytes@0x3ffd54f6f98 1012s | PRF chunk interface prf: created HMAC_MD5 context 0x2aa278cc7e0 from key-key@0x2aa278cb360 1012s | PRF chunk interface prf: begin HMAC_MD5 with context 0x2aa278cc7e0 from key-key@0x2aa278cb360 1012s | PRF chunk interface PRF HMAC_MD5 0x2aa278c8320 1012s | PRF chunk interface PRF HMAC_MD5 update message (0x2aa278cb320 length 50) 1012s | dd dd dd dd dd dd dd dd dd dd dd dd dd dd dd dd ................ 1012s | dd dd dd dd dd dd dd dd dd dd dd dd dd dd dd dd ................ 1012s | dd dd dd dd dd dd dd dd dd dd dd dd dd dd dd dd ................ 1012s | dd dd .. 1012s | PRF chunk interface PRF HMAC_MD5 final length 16 1012s | 56 be 34 52 1d 14 4c 88 db b8 c7 33 f0 e8 b3 f6 V.4R..L....3.... 1012s | chunk output 1012s | 56 be 34 52 1d 14 4c 88 db b8 c7 33 f0 e8 b3 f6 V.4R..L....3.... 1012s | verify_bytes() RFC 2104: MD5_HMAC test 3: prf OUT: ok 1012s | CONCATENATE_DATA_AND_BASE: 1012s | target: EXTRACT_KEY_FROM_KEY 1012s | base: base-key@0x2aa278c8350 (16-bytes, AES_KEY_GEN) 1012s | params: 16-bytes@0x3ffd54f71b8 1012s | key-offset: 0, key-size: 16 1012s | EXTRACT_KEY_FROM_KEY: 1012s | target: EXTRACT_KEY_FROM_KEY 1012s | key_size: 16-bytes 1012s | base: base-key@0x2aa278cc3f0 (32-bytes, EXTRACT_KEY_FROM_KEY) 1012s | operation: FLAGS_ONLY 1012s | params: 8-bytes@0x3ffd54f70c8 1012s | PRF symkey interface PRF HMAC_MD5 init key symkey-key@0x2aa278cb360 (size 16) 1012s | PRF symkey interface: key symkey-key@0x2aa278cb360 (16-bytes, EXTRACT_KEY_FROM_KEY) 1012s | key-offset: 0, key-size: 16 1012s | EXTRACT_KEY_FROM_KEY: 1012s | target: MD5_HMAC 1012s | flags: SIGN 1012s | key_size: 16-bytes 1012s | base: base-key@0x2aa278cb360 (16-bytes, EXTRACT_KEY_FROM_KEY) 1012s | operation: FLAGS_ONLY 1012s | params: 8-bytes@0x3ffd54f7050 1012s | PRF symkey interface prf: created HMAC_MD5 context 0x2aa278d0c40 from key symkey-key@0x2aa278cc3f0 1012s | PRF symkey interface prf: begin HMAC_MD5 with context 0x2aa278d0c40 from key symkey-key@0x2aa278cc3f0 1012s | PRF symkey interface PRF HMAC_MD5 0x2aa278cbd20 1012s | CONCATENATE_DATA_AND_BASE: 1012s | target: EXTRACT_KEY_FROM_KEY 1012s | base: base-key@0x2aa278c8350 (16-bytes, AES_KEY_GEN) 1012s | params: 16-bytes@0x3ffd54f71b8 1012s | key-offset: 0, key-size: 50 1012s | EXTRACT_KEY_FROM_KEY: 1012s | target: EXTRACT_KEY_FROM_KEY 1012s | key_size: 50-bytes 1012s | base: base-key@0x2aa278c9c70 (66-bytes, EXTRACT_KEY_FROM_KEY) 1012s | operation: FLAGS_ONLY 1012s | params: 8-bytes@0x3ffd54f70c8 1012s | PRF symkey interface PRF HMAC_MD5 update symkey message-key@0x2aa278cc0b0 (size 50) 1012s | PRF symkey interface: symkey message-key@0x2aa278cc0b0 (50-bytes, EXTRACT_KEY_FROM_KEY) 1012s | nss hmac digest hack extracting all 50 bytes of key@0x2aa278cc0b0 1012s | nss hmac digest hack: symkey-key@0x2aa278cc0b0 (50-bytes, EXTRACT_KEY_FROM_KEY) 1012s | sizeof bytes 64 1012s | wrapper: (SECItemType)682: 0d 48 51 99 e2 b4 b4 59 d0 71 7f 86 b6 58 08 f5 0d 48 51 99 e2 b4 b4 59 d0 71 7f 86 b6 58 08 f5 0d 48 51 99 e2 b4 b4 59 d0 71 7f 86 b6 58 08 f5 61 d2 60 64 00 82 0a b0 8d e0 31 0f a1 93 10 85 1012s | nss hmac digest hack extracted len 64 bytes at 0x2aa278cbde0 1012s | unwrapped: 1012s | dd dd dd dd dd dd dd dd dd dd dd dd dd dd dd dd ................ 1012s | dd dd dd dd dd dd dd dd dd dd dd dd dd dd dd dd ................ 1012s | dd dd dd dd dd dd dd dd dd dd dd dd dd dd dd dd ................ 1012s | dd dd 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................ 1012s | CONCATENATE_DATA_AND_BASE: 1012s | target: EXTRACT_KEY_FROM_KEY 1012s | base: base-key@0x2aa278c8350 (16-bytes, AES_KEY_GEN) 1012s | params: 16-bytes@0x3ffd54f7068 1012s | key-offset: 0, key-size: 16 1012s | EXTRACT_KEY_FROM_KEY: 1012s | target: EXTRACT_KEY_FROM_KEY 1012s | key_size: 16-bytes 1012s | base: base-key@0x2aa278c9c70 (32-bytes, EXTRACT_KEY_FROM_KEY) 1012s | operation: FLAGS_ONLY 1012s | params: 8-bytes@0x3ffd54f6f78 1012s | PRF symkey interface PRF HMAC_MD5 final-key@0x2aa278cc3f0 (size 16) 1012s | PRF symkey interface: key-key@0x2aa278cc3f0 (16-bytes, EXTRACT_KEY_FROM_KEY) 1012s | output: symkey-key@0x2aa278cc3f0 (16-bytes, EXTRACT_KEY_FROM_KEY) 1012s | RFC 2104: MD5_HMAC test 3 extracting all 16 bytes of key@0x2aa278cc3f0 1012s | RFC 2104: MD5_HMAC test 3: symkey-key@0x2aa278cc3f0 (16-bytes, EXTRACT_KEY_FROM_KEY) 1012s | sizeof bytes 16 1012s | wrapper: (SECItemType)682: 57 fc 56 55 dc cb 50 b1 5b 6a 4d 14 69 4c ca 45 1012s | RFC 2104: MD5_HMAC test 3 extracted len 16 bytes at 0x2aa278cb9a0 1012s | unwrapped: 1012s | 56 be 34 52 1d 14 4c 88 db b8 c7 33 f0 e8 b3 f6 V.4R..L....3.... 1012s | verify_bytes() RFC 2104: MD5_HMAC test 3: symkey: ok 1012s ipsec algparse: testing HMAC_SHA1: 1012s ipsec algparse: CAVP: IKEv2 key derivation with HMAC-SHA1 1012s | decode_to_chunk() test_kdf_vector: input "0x32b50d5f4a3763f3" 1012s | decode_to_chunk() output: 1012s | 32 b5 0d 5f 4a 37 63 f3 2.._J7c. 1012s | decode_to_chunk() test_kdf_vector: input "0x9206a04b26564cb1" 1012s | decode_to_chunk() output: 1012s | 92 06 a0 4b 26 56 4c b1 ...K&VL. 1012s | decode_to_chunk() test_kdf_vector: input "0x34c9e7c188868785" 1012s | decode_to_chunk() output: 1012s | 34 c9 e7 c1 88 86 87 85 4....... 1012s | decode_to_chunk() test_kdf_vector: input "0x3ff77d760d2b2199" 1012s | decode_to_chunk() output: 1012s | 3f f7 7d 76 0d 2b 21 99 ?.}v.+!. 1012s | decode_to_chunk() test_kdf_vector: input "0x4b2c1f971981a8ad8d0abeafabf38cf75fc8349c148142465ed9c8b516b8be52" 1012s | decode_to_chunk() output: 1012s | 4b 2c 1f 97 19 81 a8 ad 8d 0a be af ab f3 8c f7 K,.............. 1012s | 5f c8 34 9c 14 81 42 46 5e d9 c8 b5 16 b8 be 52 _.4...BF^......R 1012s | decode_to_chunk() test_kdf_vector: input "0x863f3c9d06efd39d2b907b97f8699e5dd5251ef64a2a176f36ee40c87d4f9330" 1012s | decode_to_chunk() output: 1012s | 86 3f 3c 9d 06 ef d3 9d 2b 90 7b 97 f8 69 9e 5d .?<.....+.{..i.] 1012s | d5 25 1e f6 4a 2a 17 6f 36 ee 40 c8 7d 4f 93 30 .%..J*.o6.@.}O.0 1012s | decode_to_chunk() test_kdf_vector: input "0xa9a7b222b59f8f48645f28a1db5b5f5d7479cba7" 1012s | decode_to_chunk() output: 1012s | a9 a7 b2 22 b5 9f 8f 48 64 5f 28 a1 db 5b 5f 5d ..."...Hd_(..[_] 1012s | 74 79 cb a7 ty.. 1012s | decode_to_chunk() test_kdf_vector: input "0x63e81194946ebd05df7df5ebf5d8750056bf1f1d" 1012s | decode_to_chunk() output: 1012s | 63 e8 11 94 94 6e bd 05 df 7d f5 eb f5 d8 75 00 c....n...}....u. 1012s | 56 bf 1f 1d V... 1012s | decode_to_chunk() test_kdf_vector: input "0xa14293677cc80ff8f9cc0eee30d895da9d8f405666e30ef0dfcb63c634a46002a2a63080e514a062768b76606f9fa5e992204fc5a670bde3f10d6b027113936a5c55b648a194ae587b0088d52204b702c979fa280870d2ed41efa9c549fd11198af1670b143d384bd275c5f594cf266b05ebadca855e4249520a441a81157435a7a56cc4" 1012s | decode_to_chunk() output: 1012s | a1 42 93 67 7c c8 0f f8 f9 cc 0e ee 30 d8 95 da .B.g|.......0... 1012s | 9d 8f 40 56 66 e3 0e f0 df cb 63 c6 34 a4 60 02 ..@Vf.....c.4.`. 1012s | a2 a6 30 80 e5 14 a0 62 76 8b 76 60 6f 9f a5 e9 ..0....bv.v`o... 1012s | 92 20 4f c5 a6 70 bd e3 f1 0d 6b 02 71 13 93 6a . O..p....k.q..j 1012s | 5c 55 b6 48 a1 94 ae 58 7b 00 88 d5 22 04 b7 02 \U.H...X{..."... 1012s | c9 79 fa 28 08 70 d2 ed 41 ef a9 c5 49 fd 11 19 .y.(.p..A...I... 1012s | 8a f1 67 0b 14 3d 38 4b d2 75 c5 f5 94 cf 26 6b ..g..=8K.u....&k 1012s | 05 eb ad ca 85 5e 42 49 52 0a 44 1a 81 15 74 35 .....^BIR.D...t5 1012s | a7 a5 6c c4 ..l. 1012s | CONCATENATE_DATA_AND_BASE: 1012s | target: EXTRACT_KEY_FROM_KEY 1012s | base: base-key@0x2aa278c8350 (16-bytes, AES_KEY_GEN) 1012s | params: 16-bytes@0x3ffd54f7190 1012s | key-offset: 0, key-size: 32 1012s | EXTRACT_KEY_FROM_KEY: 1012s | target: EXTRACT_KEY_FROM_KEY 1012s | key_size: 32-bytes 1012s | base: base-key@0x2aa278cb360 (48-bytes, EXTRACT_KEY_FROM_KEY) 1012s | operation: FLAGS_ONLY 1012s | params: 8-bytes@0x3ffd54f70a0 1012s | NSS_IKE_PRF_DERIVE: 1012s | target: NSS_IKE_PRF_PLUS_DERIVE 1012s | base: base-key@0x2aa278cc3f0 (32-bytes, EXTRACT_KEY_FROM_KEY) 1012s | params: 56-bytes@0x3ffd54f70c0 1012s | CAVP: IKEv2 key derivation with HMAC-SHA1 extracting all 20 bytes of key@0x2aa278cb360 1012s | CAVP: IKEv2 key derivation with HMAC-SHA1: symkey-key@0x2aa278cb360 (20-bytes, NSS_IKE_PRF_PLUS_DERIVE) 1012s | sizeof bytes 32 1012s | wrapper: (SECItemType)682: fb 9e 03 22 f5 62 62 7e 14 e1 22 4d dd f2 66 38 d3 16 9d b7 a1 05 04 35 f5 c8 0b de 30 2a 73 f8 1012s | CAVP: IKEv2 key derivation with HMAC-SHA1 extracted len 32 bytes at 0x2aa278cbdb0 1012s | unwrapped: 1012s | a9 a7 b2 22 b5 9f 8f 48 64 5f 28 a1 db 5b 5f 5d ..."...Hd_(..[_] 1012s | 74 79 cb a7 00 00 00 00 00 00 00 00 00 00 00 00 ty.............. 1012s | verify_bytes() CAVP: IKEv2 key derivation with HMAC-SHA1: skeyseed: ok 1012s | NSS_IKE_PRF_PLUS_DERIVE: 1012s | target: EXTRACT_KEY_FROM_KEY 1012s | key_size: 132-bytes 1012s | base: base-key@0x2aa278cb360 (20-bytes, NSS_IKE_PRF_PLUS_DERIVE) 1012s | params: 40-bytes@0x3ffd54f7060 1012s | CAVP: IKEv2 key derivation with HMAC-SHA1 extracting all 132 bytes of key@0x2aa278cc0b0 1012s | CAVP: IKEv2 key derivation with HMAC-SHA1: symkey-key@0x2aa278cc0b0 (132-bytes, EXTRACT_KEY_FROM_KEY) 1012s | sizeof bytes 144 1012s | wrapper: (SECItemType)682: ec 10 a5 15 a7 1c 25 6e 21 ce 72 7d aa 3c 4d 04 e4 4a c6 d9 4e e0 3b 2f 9f cf db 13 ae 94 80 d9 2d dc c0 7c 68 cb a0 c0 69 0f e6 e3 2f 0b 46 5a 22 cf c9 8e f5 9c 86 a3 50 28 26 1a 11 e0 d4 e1 18 86 d9 60 c7 b9 67 41 40 a9 08 53 bc 74 25 59 48 aa e2 35 01 e9 38 38 d1 20 e6 3d 81 bc 72 1f 14 d2 ec b2 52 e2 42 32 f2 3b 00 00 7d 94 39 c4 ba ce a1 16 31 cb 6f ca 66 44 05 e7 d6 ed 89 e1 89 f2 63 28 46 44 e5 11 4c 5f 74 ea d3 5c 47 b3 1012s | CAVP: IKEv2 key derivation with HMAC-SHA1 extracted len 144 bytes at 0x2aa278d2a90 1012s | unwrapped: 1012s | a1 42 93 67 7c c8 0f f8 f9 cc 0e ee 30 d8 95 da .B.g|.......0... 1012s | 9d 8f 40 56 66 e3 0e f0 df cb 63 c6 34 a4 60 02 ..@Vf.....c.4.`. 1012s | a2 a6 30 80 e5 14 a0 62 76 8b 76 60 6f 9f a5 e9 ..0....bv.v`o... 1012s | 92 20 4f c5 a6 70 bd e3 f1 0d 6b 02 71 13 93 6a . O..p....k.q..j 1012s | 5c 55 b6 48 a1 94 ae 58 7b 00 88 d5 22 04 b7 02 \U.H...X{..."... 1012s | c9 79 fa 28 08 70 d2 ed 41 ef a9 c5 49 fd 11 19 .y.(.p..A...I... 1012s | 8a f1 67 0b 14 3d 38 4b d2 75 c5 f5 94 cf 26 6b ..g..=8K.u....&k 1012s | 05 eb ad ca 85 5e 42 49 52 0a 44 1a 81 15 74 35 .....^BIR.D...t5 1012s | a7 a5 6c c4 00 00 00 00 00 00 00 00 00 00 00 00 ..l............. 1012s | verify_bytes() CAVP: IKEv2 key derivation with HMAC-SHA1: DKM: ok 1012s | key-offset: 0, key-size: 20 1012s | EXTRACT_KEY_FROM_KEY: 1012s | target: EXTRACT_KEY_FROM_KEY 1012s | key_size: 20-bytes 1012s | base: base-key@0x2aa278cc0b0 (132-bytes, EXTRACT_KEY_FROM_KEY) 1012s | operation: FLAGS_ONLY 1012s | params: 8-bytes@0x3ffd54f7198 1012s | CONCATENATE_DATA_AND_BASE: 1012s | target: EXTRACT_KEY_FROM_KEY 1012s | base: base-key@0x2aa278c8350 (16-bytes, AES_KEY_GEN) 1012s | params: 16-bytes@0x3ffd54f7190 1012s | key-offset: 0, key-size: 32 1012s | EXTRACT_KEY_FROM_KEY: 1012s | target: EXTRACT_KEY_FROM_KEY 1012s | key_size: 32-bytes 1012s | base: base-key@0x2aa278cc1f0 (48-bytes, EXTRACT_KEY_FROM_KEY) 1012s | operation: FLAGS_ONLY 1012s | params: 8-bytes@0x3ffd54f70a0 1012s | NSS_IKE_PRF_DERIVE: 1012s | target: NSS_IKE_PRF_PLUS_DERIVE 1012s | base: base-key@0x2aa278c9c70 (20-bytes, EXTRACT_KEY_FROM_KEY) 1012s | params: 56-bytes@0x3ffd54f70b8 1012s | CAVP: IKEv2 key derivation with HMAC-SHA1 extracting all 20 bytes of key@0x2aa278cc1f0 1012s | CAVP: IKEv2 key derivation with HMAC-SHA1: symkey-key@0x2aa278cc1f0 (20-bytes, NSS_IKE_PRF_PLUS_DERIVE) 1012s | sizeof bytes 32 1012s | wrapper: (SECItemType)682: 40 5a 3b 4d cd 1a 4f fb 4d f0 23 f3 77 06 70 a5 66 7d f0 3f 0d 7b 9a 02 f6 f0 9a 69 e6 bc ae d3 1012s | CAVP: IKEv2 key derivation with HMAC-SHA1 extracted len 32 bytes at 0x2aa278c8320 1012s | unwrapped: 1012s | 63 e8 11 94 94 6e bd 05 df 7d f5 eb f5 d8 75 00 c....n...}....u. 1012s | 56 bf 1f 1d 00 00 00 00 00 00 00 00 00 00 00 00 V............... 1012s | verify_bytes() CAVP: IKEv2 key derivation with HMAC-SHA1: skeyseed_rekey: ok 1012s ipsec algparse: leak detective found no leaks 1012s /usr/libexec/ipsec/pluto: adjusting nssdir to /tmp/tmp.Pq1cAI6JsI 1012s /usr/libexec/ipsec/pluto: selftest: skipping lock 1012s /usr/libexec/ipsec/pluto: selftest: skipping control socket 1012s /usr/libexec/ipsec/pluto: selftest: skipping fork 1012s Starting Pluto (Libreswan Version 5.2 IKEv2 IKEv1 XFRM XFRMI esp-hw-offload FORK PTHREAD_SETSCHEDPRIO NSS (IPsec profile) (NSS-KDF) DNSSEC SYSTEMD_WATCHDOG LABELED_IPSEC (SELINUX) LIBCAP_NG LINUX_AUDIT AUTH_PAM NETWORKMANAGER CURL(non-NSS) LDAP(non-NSS) NFTABLES CAT NFLOG) pid:2771 1012s operating system: Linux 6.18.0 [Linux 6.18.0-9-generic #9-Ubuntu SMP Mon Jan 12 15:39:23 UTC 2026 s390x] 1012s core dump dir: /run/pluto 1012s secrets file: /etc/ipsec.secrets 1012s Initializing NSS using read-only database "sql:/tmp/tmp.Pq1cAI6JsI" 1012s FIPS Mode: OFF 1012s NSS crypto library initialized 1012s FIPS mode disabled for pluto daemon 1012s FIPS HMAC integrity support [not required] 1012s libcap-ng capng_apply failed to apply changes, err=-5. see: man capng_apply 1012s libcap-ng support [enabled] 1012s Linux audit support [enabled] 1012s leak-detective disabled 1012s NSS crypto [enabled] 1012s XAUTH PAM support [enabled] 1012s initializing libevent in pthreads mode: headers: 2.1.12-stable (2010c00); library: 2.1.12-stable (2010c00) 1012s NAT-Traversal: keep-alive period 20s 1012s ERROR: xfrmi is not supported, failed to create ipsec-interface ipsec1 bound to lo 1012s ipsec-interface is not working: xfrmi is not supported 1012s IPsec Interface [disabled] 1012s refreshed session resume keys, issuing key 1 1012s Encryption algorithms: 1012s AES_CCM_16 {256,192,*128} IKEv1: ESP IKEv2: ESP FIPS aes_ccm, aes_ccm_c 1012s AES_CCM_12 {256,192,*128} IKEv1: ESP IKEv2: ESP FIPS aes_ccm_b 1012s AES_CCM_8 {256,192,*128} IKEv1: ESP IKEv2: ESP FIPS aes_ccm_a 1012s 3DES_CBC [*192] IKEv1: IKE ESP IKEv2: IKE ESP FIPS NSS(CBC) 3des 1012s CAMELLIA_CTR {256,192,*128} IKEv1: ESP IKEv2: ESP 1012s CAMELLIA_CBC {256,192,*128} IKEv1: IKE ESP IKEv2: IKE ESP NSS(CBC) camellia 1012s AES_GCM_16 {256,192,*128} IKEv1: ESP IKEv2: IKE ESP FIPS NSS(AEAD) aes_gcm, aes_gcm_c 1012s AES_GCM_12 {256,192,*128} IKEv1: ESP IKEv2: IKE ESP FIPS NSS(AEAD) aes_gcm_b 1012s AES_GCM_8 {256,192,*128} IKEv1: ESP IKEv2: IKE ESP FIPS NSS(AEAD) aes_gcm_a 1012s AES_CTR {256,192,*128} IKEv1: IKE ESP IKEv2: IKE ESP FIPS NSS(CTR) aesctr 1012s AES_CBC {256,192,*128} IKEv1: IKE ESP IKEv2: IKE ESP FIPS NSS(CBC) aes 1012s NULL_AUTH_AES_GMAC {256,192,*128} IKEv1: ESP IKEv2: ESP FIPS aes_gmac 1012s NULL [] IKEv1: ESP IKEv2: ESP NULL 1012s CHACHA20_POLY1305 [*256] IKEv1: IKEv2: IKE ESP NSS(AEAD) chacha20poly1305 1012s Hash algorithms: 1012s MD5 IKEv1: IKE IKEv2: NSS 1012s SHA1 IKEv1: IKE IKEv2: IKE FIPS NSS sha 1012s SHA2_256 IKEv1: IKE IKEv2: IKE FIPS NSS sha2, sha256 1012s SHA2_384 IKEv1: IKE IKEv2: IKE FIPS NSS sha384 1012s SHA2_512 IKEv1: IKE IKEv2: IKE FIPS NSS sha512 1012s IDENTITY IKEv1: IKEv2: FIPS 1012s PRF algorithms: 1012s HMAC_MD5 IKEv1: IKE IKEv2: IKE NSS md5 1012s HMAC_SHA1 IKEv1: IKE IKEv2: IKE FIPS NSS sha, sha1 1012s HMAC_SHA2_256 IKEv1: IKE IKEv2: IKE FIPS NSS sha2, sha256, sha2_256 1012s HMAC_SHA2_384 IKEv1: IKE IKEv2: IKE FIPS NSS sha384, sha2_384 1012s HMAC_SHA2_512 IKEv1: IKE IKEv2: IKE FIPS NSS sha512, sha2_512 1012s AES_XCBC IKEv1: IKEv2: IKE native(XCBC) aes128_xcbc 1012s Integrity algorithms: 1012s HMAC_MD5_96 IKEv1: IKE ESP AH IKEv2: IKE ESP AH NSS md5, hmac_md5 1012s HMAC_SHA1_96 IKEv1: IKE ESP AH IKEv2: IKE ESP AH FIPS NSS sha, sha1, sha1_96, hmac_sha1 1012s HMAC_SHA2_512_256 IKEv1: IKE ESP AH IKEv2: IKE ESP AH FIPS NSS sha512, sha2_512, sha2_512_256, hmac_sha2_512 1012s HMAC_SHA2_384_192 IKEv1: IKE ESP AH IKEv2: IKE ESP AH FIPS NSS sha384, sha2_384, sha2_384_192, hmac_sha2_384 1012s HMAC_SHA2_256_128 IKEv1: IKE ESP AH IKEv2: IKE ESP AH FIPS NSS sha2, sha256, sha2_256, sha2_256_128, hmac_sha2_256 1012s HMAC_SHA2_256_TRUNCBUG IKEv1: ESP AH IKEv2: AH 1012s AES_XCBC_96 IKEv1: ESP AH IKEv2: IKE ESP AH native(XCBC) aes_xcbc, aes128_xcbc, aes128_xcbc_96 1012s AES_CMAC_96 IKEv1: ESP AH IKEv2: ESP AH FIPS aes_cmac 1012s NONE IKEv1: ESP IKEv2: IKE ESP FIPS null 1012s DH algorithms: 1012s NONE IKEv1: IKEv2: IKE ESP AH FIPS NSS(MODP) null, dh0 1012s MODP1536 IKEv1: IKE ESP AH IKEv2: IKE ESP AH NSS(MODP) dh5 1012s MODP2048 IKEv1: IKE ESP AH IKEv2: IKE ESP AH FIPS NSS(MODP) dh14 1012s MODP3072 IKEv1: IKE ESP AH IKEv2: IKE ESP AH FIPS NSS(MODP) dh15 1012s MODP4096 IKEv1: IKE ESP AH IKEv2: IKE ESP AH FIPS NSS(MODP) dh16 1012s MODP6144 IKEv1: IKE ESP AH IKEv2: IKE ESP AH FIPS NSS(MODP) dh17 1012s MODP8192 IKEv1: IKE ESP AH IKEv2: IKE ESP AH FIPS NSS(MODP) dh18 1012s DH19 IKEv1: IKE IKEv2: IKE ESP AH FIPS NSS(ECP) ecp_256, ecp256 1012s DH20 IKEv1: IKE IKEv2: IKE ESP AH FIPS NSS(ECP) ecp_384, ecp384 1012s DH21 IKEv1: IKE IKEv2: IKE ESP AH FIPS NSS(ECP) ecp_521, ecp521 1012s DH31 IKEv1: IKE IKEv2: IKE ESP AH NSS(ECP) curve25519 1012s IPCOMP algorithms: 1012s DEFLATE IKEv1: ESP AH IKEv2: ESP AH FIPS 1012s LZS IKEv1: IKEv2: ESP AH FIPS 1012s LZJH IKEv1: IKEv2: ESP AH FIPS 1012s testing CAMELLIA_CBC: 1012s Camellia: 16 bytes with 128-bit key 1012s Camellia: 16 bytes with 128-bit key 1012s Camellia: 16 bytes with 256-bit key 1012s Camellia: 16 bytes with 256-bit key 1012s testing AES_GCM_16: 1012s empty string 1012s one block 1012s two blocks 1012s two blocks with associated data 1012s testing AES_CTR: 1012s Encrypting 16 octets using AES-CTR with 128-bit key 1012s Encrypting 32 octets using AES-CTR with 128-bit key 1012s Encrypting 36 octets using AES-CTR with 128-bit key 1012s Encrypting 16 octets using AES-CTR with 192-bit key 1012s Encrypting 32 octets using AES-CTR with 192-bit key 1012s Encrypting 36 octets using AES-CTR with 192-bit key 1012s Encrypting 16 octets using AES-CTR with 256-bit key 1012s Encrypting 32 octets using AES-CTR with 256-bit key 1012s Encrypting 36 octets using AES-CTR with 256-bit key 1012s testing AES_CBC: 1012s Encrypting 16 bytes (1 block) using AES-CBC with 128-bit key 1012s Encrypting 32 bytes (2 blocks) using AES-CBC with 128-bit key 1012s Encrypting 48 bytes (3 blocks) using AES-CBC with 128-bit key 1012s Encrypting 64 bytes (4 blocks) using AES-CBC with 128-bit key 1012s testing AES_XCBC: 1012s RFC 3566 Test Case 1: AES-XCBC-MAC-96 with 0-byte input 1012s RFC 3566 Test Case 2: AES-XCBC-MAC-96 with 3-byte input 1012s RFC 3566 Test Case 3: AES-XCBC-MAC-96 with 16-byte input 1012s RFC 3566 Test Case 4: AES-XCBC-MAC-96 with 20-byte input 1012s RFC 3566 Test Case 5: AES-XCBC-MAC-96 with 32-byte input 1012s RFC 3566 Test Case 6: AES-XCBC-MAC-96 with 34-byte input 1012s RFC 3566 Test Case 7: AES-XCBC-MAC-96 with 1000-byte input 1012s RFC 4434 Test Case AES-XCBC-PRF-128 with 20-byte input (key length 16) 1012s RFC 4434 Test Case AES-XCBC-PRF-128 with 20-byte input (key length 10) 1012s RFC 4434 Test Case AES-XCBC-PRF-128 with 20-byte input (key length 18) 1012s testing HMAC_MD5: 1012s RFC 2104: MD5_HMAC test 1 1012s RFC 2104: MD5_HMAC test 2 1012s RFC 2104: MD5_HMAC test 3 1012s testing HMAC_SHA1: 1012s CAVP: IKEv2 key derivation with HMAC-SHA1 1012s selftest: exiting pluto 1013s autopkgtest [17:20:41]: test cryptocheck: -----------------------] 1013s autopkgtest [17:20:41]: test cryptocheck: - - - - - - - - - - results - - - - - - - - - - 1013s cryptocheck PASS 1013s autopkgtest [17:20:41]: test cavp: preparing testbed 1032s Creating nova instance adt-resolute-s390x-libreswan-20260207-170348-juju-7f2275-prod-proposed-migration-environment-15-89930aeb-cbd2-4509-bd60-d93d5499de97 from image adt/ubuntu-resolute-s390x-server-20260206.img (UUID 49c0a1d9-89cb-4112-bb14-7a2a39e81cac)... 1153s autopkgtest [17:23:01]: testbed dpkg architecture: s390x 1154s autopkgtest [17:23:02]: testbed apt version: 3.1.15 1154s autopkgtest [17:23:02]: @@@@@@@@@@@@@@@@@@@@ test bed setup 1154s autopkgtest [17:23:02]: testbed release detected to be: resolute 1155s autopkgtest [17:23:03]: updating testbed package index (apt update) 1155s Get:1 http://ftpmaster.internal/ubuntu resolute-proposed InRelease [124 kB] 1155s Hit:2 http://ftpmaster.internal/ubuntu resolute InRelease 1156s Hit:3 http://ftpmaster.internal/ubuntu resolute-updates InRelease 1156s Hit:4 http://ftpmaster.internal/ubuntu resolute-security InRelease 1156s Get:5 http://ftpmaster.internal/ubuntu resolute-proposed/main Sources [199 kB] 1156s Get:6 http://ftpmaster.internal/ubuntu resolute-proposed/universe Sources [1674 kB] 1158s Get:7 http://ftpmaster.internal/ubuntu resolute-proposed/multiverse Sources [36.0 kB] 1158s Get:8 http://ftpmaster.internal/ubuntu resolute-proposed/restricted Sources [10.7 kB] 1158s Get:9 http://ftpmaster.internal/ubuntu resolute-proposed/main s390x Packages [233 kB] 1158s Get:10 http://ftpmaster.internal/ubuntu resolute-proposed/universe s390x Packages [1426 kB] 1160s Get:11 http://ftpmaster.internal/ubuntu resolute-proposed/multiverse s390x Packages [10.2 kB] 1162s Fetched 3713 kB in 6s (643 kB/s) 1166s Reading package lists... 1168s Hit:1 http://ftpmaster.internal/ubuntu resolute-proposed InRelease 1168s Hit:2 http://ftpmaster.internal/ubuntu resolute InRelease 1168s Hit:3 http://ftpmaster.internal/ubuntu resolute-updates InRelease 1168s Hit:4 http://ftpmaster.internal/ubuntu resolute-security InRelease 1174s Reading package lists... 1174s Reading package lists... 1176s Building dependency tree... 1176s Reading state information... 1177s Calculating upgrade... 1178s The following packages will be upgraded: 1178s 3cpio libc-bin libc-gconv-modules-extra libc6 libevent-core-2.1-7t64 1178s libpcap0.8t64 locales 1178s 7 upgraded, 0 newly installed, 0 to remove and 0 not upgraded. 1178s Need to get 8482 kB of archives. 1178s After this operation, 0 B of additional disk space will be used. 1178s Get:1 http://ftpmaster.internal/ubuntu resolute-proposed/main s390x libc-gconv-modules-extra s390x 2.42-2ubuntu5 [1369 kB] 1178s Get:2 http://ftpmaster.internal/ubuntu resolute-proposed/main s390x libc6 s390x 2.42-2ubuntu5 [1623 kB] 1179s Get:3 http://ftpmaster.internal/ubuntu resolute-proposed/main s390x libc-bin s390x 2.42-2ubuntu5 [674 kB] 1179s Get:4 http://ftpmaster.internal/ubuntu resolute-proposed/main s390x locales all 2.42-2ubuntu5 [4255 kB] 1180s Get:5 http://ftpmaster.internal/ubuntu resolute/main s390x libpcap0.8t64 s390x 1.10.5-2ubuntu3 [155 kB] 1180s Get:6 http://ftpmaster.internal/ubuntu resolute/main s390x 3cpio s390x 0.14.0-1ubuntu1 [313 kB] 1180s Get:7 http://ftpmaster.internal/ubuntu resolute/main s390x libevent-core-2.1-7t64 s390x 2.1.12-stable-10build2 [93.1 kB] 1181s dpkg-preconfigure: unable to re-open stdin: No such file or directory 1181s Fetched 8482 kB in 2s (3551 kB/s) 1182s (Reading database ... (Reading database ... 5% (Reading database ... 10% (Reading database ... 15% (Reading database ... 20% (Reading database ... 25% (Reading database ... 30% (Reading database ... 35% (Reading database ... 40% (Reading database ... 45% (Reading database ... 50% (Reading database ... 55% (Reading database ... 60% (Reading database ... 65% (Reading database ... 70% (Reading database ... 75% (Reading database ... 80% (Reading database ... 85% (Reading database ... 90% (Reading database ... 95% (Reading database ... 100% (Reading database ... 61954 files and directories currently installed.) 1182s Preparing to unpack .../libc-gconv-modules-extra_2.42-2ubuntu5_s390x.deb ... 1182s Unpacking libc-gconv-modules-extra:s390x (2.42-2ubuntu5) over (2.42-2ubuntu4) ... 1183s Setting up libc-gconv-modules-extra:s390x (2.42-2ubuntu5) ... 1184s (Reading database ... (Reading database ... 5% (Reading database ... 10% (Reading database ... 15% (Reading database ... 20% (Reading database ... 25% (Reading database ... 30% (Reading database ... 35% (Reading database ... 40% (Reading database ... 45% (Reading database ... 50% (Reading database ... 55% (Reading database ... 60% (Reading database ... 65% (Reading database ... 70% (Reading database ... 75% (Reading database ... 80% (Reading database ... 85% (Reading database ... 90% (Reading database ... 95% (Reading database ... 100% (Reading database ... 61954 files and directories currently installed.) 1184s Preparing to unpack .../libc6_2.42-2ubuntu5_s390x.deb ... 1184s Unpacking libc6:s390x (2.42-2ubuntu5) over (2.42-2ubuntu4) ... 1184s Setting up libc6:s390x (2.42-2ubuntu5) ... 1185s (Reading database ... (Reading database ... 5% (Reading database ... 10% (Reading database ... 15% (Reading database ... 20% (Reading database ... 25% (Reading database ... 30% (Reading database ... 35% (Reading database ... 40% (Reading database ... 45% (Reading database ... 50% (Reading database ... 55% (Reading database ... 60% (Reading database ... 65% (Reading database ... 70% (Reading database ... 75% (Reading database ... 80% (Reading database ... 85% (Reading database ... 90% (Reading database ... 95% (Reading database ... 100% (Reading database ... 61954 files and directories currently installed.) 1185s Preparing to unpack .../libc-bin_2.42-2ubuntu5_s390x.deb ... 1185s Unpacking libc-bin (2.42-2ubuntu5) over (2.42-2ubuntu4) ... 1185s Setting up libc-bin (2.42-2ubuntu5) ... 1186s (Reading database ... (Reading database ... 5% (Reading database ... 10% (Reading database ... 15% (Reading database ... 20% (Reading database ... 25% (Reading database ... 30% (Reading database ... 35% (Reading database ... 40% (Reading database ... 45% (Reading database ... 50% (Reading database ... 55% (Reading database ... 60% (Reading database ... 65% (Reading database ... 70% (Reading database ... 75% (Reading database ... 80% (Reading database ... 85% (Reading database ... 90% (Reading database ... 95% (Reading database ... 100% (Reading database ... 61954 files and directories currently installed.) 1186s Preparing to unpack .../locales_2.42-2ubuntu5_all.deb ... 1186s Unpacking locales (2.42-2ubuntu5) over (2.42-2ubuntu4) ... 1187s Preparing to unpack .../libpcap0.8t64_1.10.5-2ubuntu3_s390x.deb ... 1187s Unpacking libpcap0.8t64:s390x (1.10.5-2ubuntu3) over (1.10.5-2ubuntu2) ... 1187s Preparing to unpack .../3cpio_0.14.0-1ubuntu1_s390x.deb ... 1188s Unpacking 3cpio (0.14.0-1ubuntu1) over (0.13.1-1ubuntu1) ... 1188s Preparing to unpack .../libevent-core-2.1-7t64_2.1.12-stable-10build2_s390x.deb ... 1188s Unpacking libevent-core-2.1-7t64:s390x (2.1.12-stable-10build2) over (2.1.12-stable-10build1) ... 1188s Setting up 3cpio (0.14.0-1ubuntu1) ... 1188s Setting up locales (2.42-2ubuntu5) ... 1190s Generating locales (this might take a while)... 1196s en_US.UTF-8... done 1196s Generation complete. 1196s Setting up libpcap0.8t64:s390x (1.10.5-2ubuntu3) ... 1196s Setting up libevent-core-2.1-7t64:s390x (2.1.12-stable-10build2) ... 1196s Processing triggers for systemd (259-1ubuntu3) ... 1199s Processing triggers for man-db (2.13.1-1) ... 1203s Processing triggers for libc-bin (2.42-2ubuntu5) ... 1204s autopkgtest [17:23:52]: upgrading testbed (apt dist-upgrade and autopurge) 1204s Reading package lists... 1205s Building dependency tree... 1205s Reading state information... 1206s Calculating upgrade... 1206s 0 upgraded, 0 newly installed, 0 to remove and 0 not upgraded. 1207s Reading package lists... 1208s Building dependency tree... 1208s Reading state information... 1208s Solving dependencies... 1208s 0 upgraded, 0 newly installed, 0 to remove and 0 not upgraded. 1214s Reading package lists... 1216s Building dependency tree... 1216s Reading state information... 1216s Solving dependencies... 1218s The following NEW packages will be installed: 1218s dns-root-data libevent-2.1-7t64 libevent-pthreads-2.1-7t64 libldns3t64 1218s libnss3-tools libreswan libunbound8 1218s 0 upgraded, 7 newly installed, 0 to remove and 0 not upgraded. 1218s Need to get 2943 kB of archives. 1218s After this operation, 11.8 MB of additional disk space will be used. 1218s Get:1 http://ftpmaster.internal/ubuntu resolute/main s390x dns-root-data all 2025080400build1 [6022 B] 1218s Get:2 http://ftpmaster.internal/ubuntu resolute/main s390x libnss3-tools s390x 2:3.120-1 [637 kB] 1219s Get:3 http://ftpmaster.internal/ubuntu resolute/main s390x libevent-pthreads-2.1-7t64 s390x 2.1.12-stable-10build2 [8060 B] 1219s Get:4 http://ftpmaster.internal/ubuntu resolute/universe s390x libldns3t64 s390x 1.8.4-2build1 [170 kB] 1219s Get:5 http://ftpmaster.internal/ubuntu resolute/main s390x libevent-2.1-7t64 s390x 2.1.12-stable-10build2 [144 kB] 1219s Get:6 http://ftpmaster.internal/ubuntu resolute/main s390x libunbound8 s390x 1.24.2-1ubuntu1 [464 kB] 1219s Get:7 http://ftpmaster.internal/ubuntu resolute/universe s390x libreswan s390x 5.2-2.2ubuntu1 [1515 kB] 1221s Fetched 2943 kB in 1s (2119 kB/s) 1221s Selecting previously unselected package dns-root-data. 1221s (Reading database ... (Reading database ... 5% (Reading database ... 10% (Reading database ... 15% (Reading database ... 20% (Reading database ... 25% (Reading database ... 30% (Reading database ... 35% (Reading database ... 40% (Reading database ... 45% (Reading database ... 50% (Reading database ... 55% (Reading database ... 60% (Reading database ... 65% (Reading database ... 70% (Reading database ... 75% (Reading database ... 80% (Reading database ... 85% (Reading database ... 90% (Reading database ... 95% (Reading database ... 100% (Reading database ... 61954 files and directories currently installed.) 1221s Preparing to unpack .../0-dns-root-data_2025080400build1_all.deb ... 1221s Unpacking dns-root-data (2025080400build1) ... 1221s Selecting previously unselected package libnss3-tools. 1221s Preparing to unpack .../1-libnss3-tools_2%3a3.120-1_s390x.deb ... 1221s Unpacking libnss3-tools (2:3.120-1) ... 1221s Selecting previously unselected package libevent-pthreads-2.1-7t64:s390x. 1221s Preparing to unpack .../2-libevent-pthreads-2.1-7t64_2.1.12-stable-10build2_s390x.deb ... 1221s Unpacking libevent-pthreads-2.1-7t64:s390x (2.1.12-stable-10build2) ... 1221s Selecting previously unselected package libldns3t64:s390x. 1221s Preparing to unpack .../3-libldns3t64_1.8.4-2build1_s390x.deb ... 1221s Unpacking libldns3t64:s390x (1.8.4-2build1) ... 1221s Selecting previously unselected package libevent-2.1-7t64:s390x. 1221s Preparing to unpack .../4-libevent-2.1-7t64_2.1.12-stable-10build2_s390x.deb ... 1221s Unpacking libevent-2.1-7t64:s390x (2.1.12-stable-10build2) ... 1221s Selecting previously unselected package libunbound8:s390x. 1221s Preparing to unpack .../5-libunbound8_1.24.2-1ubuntu1_s390x.deb ... 1221s Unpacking libunbound8:s390x (1.24.2-1ubuntu1) ... 1221s Selecting previously unselected package libreswan. 1221s Preparing to unpack .../6-libreswan_5.2-2.2ubuntu1_s390x.deb ... 1221s Unpacking libreswan (5.2-2.2ubuntu1) ... 1222s Setting up libldns3t64:s390x (1.8.4-2build1) ... 1222s Setting up libevent-pthreads-2.1-7t64:s390x (2.1.12-stable-10build2) ... 1222s Setting up libevent-2.1-7t64:s390x (2.1.12-stable-10build2) ... 1222s Setting up dns-root-data (2025080400build1) ... 1222s Setting up libunbound8:s390x (1.24.2-1ubuntu1) ... 1222s Setting up libnss3-tools (2:3.120-1) ... 1222s Setting up libreswan (5.2-2.2ubuntu1) ... 1224s ipsec.service is a disabled or a static unit, not starting it. 1224s Processing triggers for man-db (2.13.1-1) ... 1228s Processing triggers for libc-bin (2.42-2ubuntu5) ... 1241s autopkgtest [17:24:29]: test cavp: [----------------------- 1241s Testing installed CAVP binary: /usr/libexec/ipsec/cavp 1248s test: IKE v2 1248s Reading from ikev2.fax 1261s test: IKE v1 Digital Signature Authentication 1261s Reading from ikev1_dsa.fax 1269s test: IKE v1 Pre-shared Key Authentication 1269s Reading from ikev1_psk.fax 1277s /tmp/autopkgtest.1ziKJn/build.aJo/src 1277s autopkgtest [17:25:05]: test cavp: -----------------------] 1278s autopkgtest [17:25:06]: test cavp: - - - - - - - - - - results - - - - - - - - - - 1278s cavp PASS 1279s autopkgtest [17:25:07]: @@@@@@@@@@@@@@@@@@@@ summary 1279s opportunistic SKIP exit status 77 and marked as skippable 1279s cryptocheck PASS 1279s cavp PASS