FIPS Product: YES FIPS Kernel: NO FIPS Mode: NO NSS DB directory: sql:/etc/ipsec.d Initializing NSS Opening NSS database "sql:/etc/ipsec.d" read-only NSS initialized NSS crypto library initialized FIPS HMAC integrity support [enabled] FIPS mode disabled for pluto daemon FIPS HMAC integrity verification self-test FAILED libcap-ng support [enabled] Linux audit support [enabled] Linux audit activated Starting Pluto (Libreswan Version v3.28-685-gbfd5aef521-master-s2 XFRM(netkey) esp-hw-offload FORK PTHREAD_SETSCHEDPRIO NSS (IPsec profile) DNSSEC FIPS_CHECK LABELED_IPSEC SECCOMP LIBCAP_NG LINUX_AUDIT XAUTH_PAM NETWORKMANAGER CURL(non-NSS)) pid:26866 core dump dir: /var/tmp secrets file: /etc/ipsec.secrets leak-detective enabled NSS crypto [enabled] XAUTH PAM support [enabled] | libevent is using pluto's memory allocator Initializing libevent in pthreads mode: headers: 2.1.8-stable (2010800); library: 2.1.8-stable (2010800) | libevent_malloc: new ptr-libevent@0x5570e4b5f868 size 40 | libevent_malloc: new ptr-libevent@0x5570e4b5ecd8 size 40 | libevent_malloc: new ptr-libevent@0x5570e4b5edd8 size 40 | creating event base | libevent_malloc: new ptr-libevent@0x5570e4be3308 size 56 | libevent_malloc: new ptr-libevent@0x5570e4b87c28 size 664 | libevent_malloc: new ptr-libevent@0x5570e4be3378 size 24 | libevent_malloc: new ptr-libevent@0x5570e4be33c8 size 384 | libevent_malloc: new ptr-libevent@0x5570e4be32c8 size 16 | libevent_malloc: new ptr-libevent@0x5570e4b5e908 size 40 | libevent_malloc: new ptr-libevent@0x5570e4b5ed38 size 48 | libevent_realloc: new ptr-libevent@0x5570e4b878b8 size 256 | libevent_malloc: new ptr-libevent@0x5570e4be3578 size 16 | libevent_free: release ptr-libevent@0x5570e4be3308 | libevent initialized | libevent_realloc: new ptr-libevent@0x5570e4be3308 size 64 | global periodic timer EVENT_RESET_LOG_RATE_LIMIT enabled with interval of 3600 seconds | init_nat_traversal() initialized with keep_alive=0s NAT-Traversal support [enabled] | global one-shot timer EVENT_NAT_T_KEEPALIVE initialized | global one-shot timer EVENT_FREE_ROOT_CERTS initialized | global periodic timer EVENT_REINIT_SECRET enabled with interval of 3600 seconds | global one-shot timer EVENT_REVIVE_CONNS initialized | global periodic timer EVENT_PENDING_DDNS enabled with interval of 60 seconds | global periodic timer EVENT_PENDING_PHASE2 enabled with interval of 120 seconds | encryption algorithm assertion checks | encryption algorithm AES_CCM_16, IKEv1 OAKLEY id: -1, IKEv1 ESP_INFO id: 16, IKEv2 id: 16 | IKEv1 ESP ID id: 16 enum name: AES_CCM_C | IKEv2 ID id: 16 enum name: AES_CCM_C | encryption algorithm AES_CCM_12, IKEv1 OAKLEY id: -1, IKEv1 ESP_INFO id: 15, IKEv2 id: 15 | IKEv1 ESP ID id: 15 enum name: AES_CCM_B | IKEv2 ID id: 15 enum name: AES_CCM_B | encryption algorithm AES_CCM_8, IKEv1 OAKLEY id: -1, IKEv1 ESP_INFO id: 14, IKEv2 id: 14 | IKEv1 ESP ID id: 14 enum name: AES_CCM_A | IKEv2 ID id: 14 enum name: AES_CCM_A | encryption algorithm 3DES_CBC, IKEv1 OAKLEY id: 5, IKEv1 ESP_INFO id: 3, IKEv2 id: 3 | IKEv1 OAKLEY ID id: 5 enum name: 3DES_CBC | IKEv1 ESP ID id: 3 enum name: 3DES | IKEv2 ID id: 3 enum name: 3DES | encryption algorithm CAMELLIA_CTR, IKEv1 OAKLEY id: 24, IKEv1 ESP_INFO id: 24, IKEv2 id: 24 | IKEv1 OAKLEY ID id: 24 enum name: CAMELLIA_CTR | IKEv1 ESP ID id: 24 enum name: CAMELLIA_CTR | IKEv2 ID id: 24 enum name: CAMELLIA_CTR | encryption algorithm CAMELLIA_CBC, IKEv1 OAKLEY id: 8, IKEv1 ESP_INFO id: 22, IKEv2 id: 23 | IKEv1 OAKLEY ID id: 8 enum name: CAMELLIA_CBC | IKEv1 ESP ID id: 22 enum name: CAMELLIA | IKEv2 ID id: 23 enum name: CAMELLIA_CBC | encryption algorithm AES_GCM_16, IKEv1 OAKLEY id: -1, IKEv1 ESP_INFO id: 20, IKEv2 id: 20 | IKEv1 ESP ID id: 20 enum name: AES_GCM_C | IKEv2 ID id: 20 enum name: AES_GCM_C | encryption algorithm AES_GCM_12, IKEv1 OAKLEY id: -1, IKEv1 ESP_INFO id: 19, IKEv2 id: 19 | IKEv1 ESP ID id: 19 enum name: AES_GCM_B | IKEv2 ID id: 19 enum name: AES_GCM_B | encryption algorithm AES_GCM_8, IKEv1 OAKLEY id: -1, IKEv1 ESP_INFO id: 18, IKEv2 id: 18 | IKEv1 ESP ID id: 18 enum name: AES_GCM_A | IKEv2 ID id: 18 enum name: AES_GCM_A | encryption algorithm AES_CTR, IKEv1 OAKLEY id: 13, IKEv1 ESP_INFO id: 13, IKEv2 id: 13 | IKEv1 OAKLEY ID id: 13 enum name: AES_CTR | IKEv1 ESP ID id: 13 enum name: AES_CTR | IKEv2 ID id: 13 enum name: AES_CTR | encryption algorithm AES_CBC, IKEv1 OAKLEY id: 7, IKEv1 ESP_INFO id: 12, IKEv2 id: 12 | IKEv1 OAKLEY ID id: 7 enum name: AES_CBC | IKEv1 ESP ID id: 12 enum name: AES | IKEv2 ID id: 12 enum name: AES_CBC | encryption algorithm SERPENT_CBC, IKEv1 OAKLEY id: 65004, IKEv1 ESP_INFO id: 252, IKEv2 id: 65004 | IKEv1 OAKLEY ID id: 65004 enum name: SERPENT_CBC | IKEv1 ESP ID id: 252 enum name: SERPENT | IKEv2 ID id: 65004 enum name: SERPENT_CBC | encryption algorithm TWOFISH_CBC, IKEv1 OAKLEY id: 65005, IKEv1 ESP_INFO id: 253, IKEv2 id: 65005 | IKEv1 OAKLEY ID id: 65005 enum name: TWOFISH_CBC | IKEv1 ESP ID id: 253 enum name: TWOFISH | IKEv2 ID id: 65005 enum name: TWOFISH_CBC | encryption algorithm TWOFISH_SSH, IKEv1 OAKLEY id: 65289, IKEv1 ESP_INFO id: -1, IKEv2 id: 65289 | IKEv1 OAKLEY ID id: 65289 enum name: TWOFISH_CBC_SSH | IKEv2 ID id: 65289 enum name: TWOFISH_CBC_SSH | encryption algorithm NULL_AUTH_AES_GMAC, IKEv1 OAKLEY id: -1, IKEv1 ESP_INFO id: 23, IKEv2 id: 21 | IKEv1 ESP ID id: 23 enum name: NULL_AUTH_AES_GMAC | IKEv2 ID id: 21 enum name: NULL_AUTH_AES_GMAC | encryption algorithm NULL, IKEv1 OAKLEY id: -1, IKEv1 ESP_INFO id: 11, IKEv2 id: 11 | IKEv1 ESP ID id: 11 enum name: NULL | IKEv2 ID id: 11 enum name: NULL | encryption algorithm CHACHA20_POLY1305, IKEv1 OAKLEY id: -1, IKEv1 ESP_INFO id: -1, IKEv2 id: 28 | IKEv2 ID id: 28 enum name: CHACHA20_POLY1305 Encryption algorithms: AES_CCM_16 IKEv1: ESP IKEv2: ESP FIPS {256,192,*128} aes_ccm, aes_ccm_c AES_CCM_12 IKEv1: ESP IKEv2: ESP FIPS {256,192,*128} aes_ccm_b AES_CCM_8 IKEv1: ESP IKEv2: ESP FIPS {256,192,*128} aes_ccm_a 3DES_CBC IKEv1: IKE ESP IKEv2: IKE ESP FIPS [*192] 3des CAMELLIA_CTR IKEv1: ESP IKEv2: ESP {256,192,*128} CAMELLIA_CBC IKEv1: IKE ESP IKEv2: IKE ESP {256,192,*128} camellia AES_GCM_16 IKEv1: ESP IKEv2: IKE ESP FIPS {256,192,*128} aes_gcm, aes_gcm_c AES_GCM_12 IKEv1: ESP IKEv2: IKE ESP FIPS {256,192,*128} aes_gcm_b AES_GCM_8 IKEv1: ESP IKEv2: IKE ESP FIPS {256,192,*128} aes_gcm_a AES_CTR IKEv1: IKE ESP IKEv2: IKE ESP FIPS {256,192,*128} aesctr AES_CBC IKEv1: IKE ESP IKEv2: IKE ESP FIPS {256,192,*128} aes SERPENT_CBC IKEv1: IKE ESP IKEv2: IKE ESP {256,192,*128} serpent TWOFISH_CBC IKEv1: IKE ESP IKEv2: IKE ESP {256,192,*128} twofish TWOFISH_SSH IKEv1: IKE IKEv2: IKE ESP {256,192,*128} twofish_cbc_ssh NULL_AUTH_AES_GMAC IKEv1: ESP IKEv2: ESP FIPS {256,192,*128} aes_gmac NULL IKEv1: ESP IKEv2: ESP [] CHACHA20_POLY1305 IKEv1: IKEv2: IKE ESP [*256] chacha20poly1305 | hash algorithm assertion checks | hash algorithm MD5, IKEv1 OAKLEY id: 1, IKEv1 ESP_INFO id: -1, IKEv2 id: -1 | IKEv1 OAKLEY ID id: 1 enum name: MD5 | hash algorithm SHA1, IKEv1 OAKLEY id: 2, IKEv1 ESP_INFO id: -1, IKEv2 id: -1 | IKEv1 OAKLEY ID id: 2 enum name: SHA1 | hash algorithm SHA2_256, IKEv1 OAKLEY id: 4, IKEv1 ESP_INFO id: -1, IKEv2 id: -1 | IKEv1 OAKLEY ID id: 4 enum name: SHA2_256 | hash algorithm SHA2_384, IKEv1 OAKLEY id: 5, IKEv1 ESP_INFO id: -1, IKEv2 id: -1 | IKEv1 OAKLEY ID id: 5 enum name: SHA2_384 | hash algorithm SHA2_512, IKEv1 OAKLEY id: 6, IKEv1 ESP_INFO id: -1, IKEv2 id: -1 | IKEv1 OAKLEY ID id: 6 enum name: SHA2_512 Hash algorithms: MD5 IKEv1: IKE IKEv2: SHA1 IKEv1: IKE IKEv2: FIPS sha SHA2_256 IKEv1: IKE IKEv2: FIPS sha2, sha256 SHA2_384 IKEv1: IKE IKEv2: FIPS sha384 SHA2_512 IKEv1: IKE IKEv2: FIPS sha512 | PRF algorithm assertion checks | PRF algorithm HMAC_MD5, IKEv1 OAKLEY id: 1, IKEv1 ESP_INFO id: -1, IKEv2 id: 1 | IKEv1 OAKLEY ID id: 1 enum name: MD5 | IKEv2 ID id: 1 enum name: HMAC_MD5 | PRF algorithm HMAC_SHA1, IKEv1 OAKLEY id: 2, IKEv1 ESP_INFO id: -1, IKEv2 id: 2 | IKEv1 OAKLEY ID id: 2 enum name: SHA1 | IKEv2 ID id: 2 enum name: HMAC_SHA1 | PRF algorithm HMAC_SHA2_256, IKEv1 OAKLEY id: 4, IKEv1 ESP_INFO id: -1, IKEv2 id: 5 | IKEv1 OAKLEY ID id: 4 enum name: SHA2_256 | IKEv2 ID id: 5 enum name: HMAC_SHA2_256 | PRF algorithm HMAC_SHA2_384, IKEv1 OAKLEY id: 5, IKEv1 ESP_INFO id: -1, IKEv2 id: 6 | IKEv1 OAKLEY ID id: 5 enum name: SHA2_384 | IKEv2 ID id: 6 enum name: HMAC_SHA2_384 | PRF algorithm HMAC_SHA2_512, IKEv1 OAKLEY id: 6, IKEv1 ESP_INFO id: -1, IKEv2 id: 7 | IKEv1 OAKLEY ID id: 6 enum name: SHA2_512 | IKEv2 ID id: 7 enum name: HMAC_SHA2_512 | PRF algorithm AES_XCBC, IKEv1 OAKLEY id: -1, IKEv1 ESP_INFO id: -1, IKEv2 id: 4 | IKEv2 ID id: 4 enum name: AES128_XCBC PRF algorithms: HMAC_MD5 IKEv1: IKE IKEv2: IKE md5 HMAC_SHA1 IKEv1: IKE IKEv2: IKE FIPS sha, sha1 HMAC_SHA2_256 IKEv1: IKE IKEv2: IKE FIPS sha2, sha256, sha2_256 HMAC_SHA2_384 IKEv1: IKE IKEv2: IKE FIPS sha384, sha2_384 HMAC_SHA2_512 IKEv1: IKE IKEv2: IKE FIPS sha512, sha2_512 AES_XCBC IKEv1: IKEv2: IKE aes128_xcbc | integrity algorithm assertion checks | integrity algorithm HMAC_MD5_96, IKEv1 OAKLEY id: 1, IKEv1 ESP_INFO id: 1, IKEv2 id: 1 | IKEv1 OAKLEY ID id: 1 enum name: MD5 | IKEv1 ESP ID id: 1 enum name: HMAC_MD5 | IKEv2 ID id: 1 enum name: HMAC_MD5_96 | integrity algorithm HMAC_SHA1_96, IKEv1 OAKLEY id: 2, IKEv1 ESP_INFO id: 2, IKEv2 id: 2 | IKEv1 OAKLEY ID id: 2 enum name: SHA1 | IKEv1 ESP ID id: 2 enum name: HMAC_SHA1 | IKEv2 ID id: 2 enum name: HMAC_SHA1_96 | integrity algorithm HMAC_SHA2_512_256, IKEv1 OAKLEY id: 6, IKEv1 ESP_INFO id: 7, IKEv2 id: 14 | IKEv1 OAKLEY ID id: 6 enum name: SHA2_512 | IKEv1 ESP ID id: 7 enum name: HMAC_SHA2_512 | IKEv2 ID id: 14 enum name: HMAC_SHA2_512_256 | integrity algorithm HMAC_SHA2_384_192, IKEv1 OAKLEY id: 5, IKEv1 ESP_INFO id: 6, IKEv2 id: 13 | IKEv1 OAKLEY ID id: 5 enum name: SHA2_384 | IKEv1 ESP ID id: 6 enum name: HMAC_SHA2_384 | IKEv2 ID id: 13 enum name: HMAC_SHA2_384_192 | integrity algorithm HMAC_SHA2_256_128, IKEv1 OAKLEY id: 4, IKEv1 ESP_INFO id: 5, IKEv2 id: 12 | IKEv1 OAKLEY ID id: 4 enum name: SHA2_256 | IKEv1 ESP ID id: 5 enum name: HMAC_SHA2_256 | IKEv2 ID id: 12 enum name: HMAC_SHA2_256_128 | integrity algorithm HMAC_SHA2_256_TRUNCBUG, IKEv1 OAKLEY id: -1, IKEv1 ESP_INFO id: 252, IKEv2 id: -1 | IKEv1 ESP ID id: 252 enum name: HMAC_SHA2_256_TRUNCBUG | integrity algorithm AES_XCBC_96, IKEv1 OAKLEY id: -1, IKEv1 ESP_INFO id: 9, IKEv2 id: 5 | IKEv1 ESP ID id: 9 enum name: AES_XCBC | IKEv2 ID id: 5 enum name: AES_XCBC_96 | integrity algorithm AES_CMAC_96, IKEv1 OAKLEY id: -1, IKEv1 ESP_INFO id: 250, IKEv2 id: 8 | IKEv1 ESP ID id: 250 enum name: AES_CMAC_96 | IKEv2 ID id: 8 enum name: AES_CMAC_96 | integrity algorithm NONE, IKEv1 OAKLEY id: -1, IKEv1 ESP_INFO id: 0, IKEv2 id: 0 | IKEv1 ESP ID id: 0 enum name: NONE | IKEv2 ID id: 0 enum name: NONE Integrity algorithms: HMAC_MD5_96 IKEv1: IKE ESP AH IKEv2: IKE ESP AH md5, hmac_md5 HMAC_SHA1_96 IKEv1: IKE ESP AH IKEv2: IKE ESP AH FIPS sha, sha1, sha1_96, hmac_sha1 HMAC_SHA2_512_256 IKEv1: IKE ESP AH IKEv2: IKE ESP AH FIPS sha512, sha2_512, sha2_512_256, hmac_sha2_512 HMAC_SHA2_384_192 IKEv1: IKE ESP AH IKEv2: IKE ESP AH FIPS sha384, sha2_384, sha2_384_192, hmac_sha2_384 HMAC_SHA2_256_128 IKEv1: IKE ESP AH IKEv2: IKE ESP AH FIPS sha2, sha256, sha2_256, sha2_256_128, hmac_sha2_256 HMAC_SHA2_256_TRUNCBUG IKEv1: ESP AH IKEv2: AH AES_XCBC_96 IKEv1: ESP AH IKEv2: IKE ESP AH aes_xcbc, aes128_xcbc, aes128_xcbc_96 AES_CMAC_96 IKEv1: ESP AH IKEv2: ESP AH FIPS aes_cmac NONE IKEv1: ESP IKEv2: IKE ESP FIPS null | DH algorithm assertion checks | DH algorithm NONE, IKEv1 OAKLEY id: -1, IKEv1 ESP_INFO id: -1, IKEv2 id: 0 | IKEv2 ID id: 0 enum name: NONE | DH algorithm MODP1536, IKEv1 OAKLEY id: 5, IKEv1 ESP_INFO id: 5, IKEv2 id: 5 | IKEv1 OAKLEY ID id: 5 enum name: MODP1536 | IKEv1 ESP ID id: 5 enum name: MODP1536 | IKEv2 ID id: 5 enum name: MODP1536 | DH algorithm MODP2048, IKEv1 OAKLEY id: 14, IKEv1 ESP_INFO id: 14, IKEv2 id: 14 | IKEv1 OAKLEY ID id: 14 enum name: MODP2048 | IKEv1 ESP ID id: 14 enum name: MODP2048 | IKEv2 ID id: 14 enum name: MODP2048 | DH algorithm MODP3072, IKEv1 OAKLEY id: 15, IKEv1 ESP_INFO id: 15, IKEv2 id: 15 | IKEv1 OAKLEY ID id: 15 enum name: MODP3072 | IKEv1 ESP ID id: 15 enum name: MODP3072 | IKEv2 ID id: 15 enum name: MODP3072 | DH algorithm MODP4096, IKEv1 OAKLEY id: 16, IKEv1 ESP_INFO id: 16, IKEv2 id: 16 | IKEv1 OAKLEY ID id: 16 enum name: MODP4096 | IKEv1 ESP ID id: 16 enum name: MODP4096 | IKEv2 ID id: 16 enum name: MODP4096 | DH algorithm MODP6144, IKEv1 OAKLEY id: 17, IKEv1 ESP_INFO id: 17, IKEv2 id: 17 | IKEv1 OAKLEY ID id: 17 enum name: MODP6144 | IKEv1 ESP ID id: 17 enum name: MODP6144 | IKEv2 ID id: 17 enum name: MODP6144 | DH algorithm MODP8192, IKEv1 OAKLEY id: 18, IKEv1 ESP_INFO id: 18, IKEv2 id: 18 | IKEv1 OAKLEY ID id: 18 enum name: MODP8192 | IKEv1 ESP ID id: 18 enum name: MODP8192 | IKEv2 ID id: 18 enum name: MODP8192 | DH algorithm DH19, IKEv1 OAKLEY id: 19, IKEv1 ESP_INFO id: -1, IKEv2 id: 19 | IKEv1 OAKLEY ID id: 19 enum name: ECP_256 | IKEv2 ID id: 19 enum name: ECP_256 | DH algorithm DH20, IKEv1 OAKLEY id: 20, IKEv1 ESP_INFO id: -1, IKEv2 id: 20 | IKEv1 OAKLEY ID id: 20 enum name: ECP_384 | IKEv2 ID id: 20 enum name: ECP_384 | DH algorithm DH21, IKEv1 OAKLEY id: 21, IKEv1 ESP_INFO id: -1, IKEv2 id: 21 | IKEv1 OAKLEY ID id: 21 enum name: ECP_521 | IKEv2 ID id: 21 enum name: ECP_521 | DH algorithm DH31, IKEv1 OAKLEY id: 31, IKEv1 ESP_INFO id: -1, IKEv2 id: 31 | IKEv1 OAKLEY ID id: 31 enum name: CURVE25519 | IKEv2 ID id: 31 enum name: CURVE25519 DH algorithms: NONE IKEv1: IKEv2: IKE ESP AH FIPS null, dh0 MODP1536 IKEv1: IKE ESP AH IKEv2: IKE ESP AH dh5 MODP2048 IKEv1: IKE ESP AH IKEv2: IKE ESP AH FIPS dh14 MODP3072 IKEv1: IKE ESP AH IKEv2: IKE ESP AH FIPS dh15 MODP4096 IKEv1: IKE ESP AH IKEv2: IKE ESP AH FIPS dh16 MODP6144 IKEv1: IKE ESP AH IKEv2: IKE ESP AH FIPS dh17 MODP8192 IKEv1: IKE ESP AH IKEv2: IKE ESP AH FIPS dh18 DH19 IKEv1: IKE IKEv2: IKE ESP AH FIPS ecp_256, ecp256 DH20 IKEv1: IKE IKEv2: IKE ESP AH FIPS ecp_384, ecp384 DH21 IKEv1: IKE IKEv2: IKE ESP AH FIPS ecp_521, ecp521 DH31 IKEv1: IKE IKEv2: IKE ESP AH curve25519 testing CAMELLIA_CBC: Camellia: 16 bytes with 128-bit key | decode_to_chunk: raw_key: input "0x00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00" | decode_to_chunk: output: | 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 | : ephemeral-key@0x5570e4b65080 (16-bytes, AES_KEY_GEN) | CONCATENATE_DATA_AND_BASE: | target: EXTRACT_KEY_FROM_KEY | base: base-key@0x5570e4b65080 (16-bytes, AES_KEY_GEN) | params: 16-bytes@0x7ffe19a09670 | result: symkey-key@0x5570e4be6640 (32-bytes, EXTRACT_KEY_FROM_KEY) | key-offset: 0, key-size: 16 | EXTRACT_KEY_FROM_KEY: | target: CAMELLIA_CBC | flags: ENCRYPT+DECRYPT | key_size: 16-bytes | base: base-key@0x5570e4be6640 (32-bytes, EXTRACT_KEY_FROM_KEY) | operation: FLAGS_ONLY | params: 8-bytes@0x7ffe19a09658 | result: symkey-key@0x5570e4be4dc0 (16-bytes, CAMELLIA_CBC) | symkey: release tmp-key@0x5570e4be6640 | decode_to_chunk: IV: : input "0x00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00" | decode_to_chunk: output: | 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 | decode_to_chunk: new IV: : input "0x07 92 3A 39 EB 0A 81 7D 1C 4D 87 BD B8 2D 1F 1C" | decode_to_chunk: output: | 07 92 3a 39 eb 0a 81 7d 1c 4d 87 bd b8 2d 1f 1c | decode_to_chunk: plaintext: : input "0x80 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00" | decode_to_chunk: output: | 80 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 | decode_to_chunk: ciphertext: : input "0x07 92 3A 39 EB 0A 81 7D 1C 4D 87 BD B8 2D 1F 1C" | decode_to_chunk: output: | 07 92 3a 39 eb 0a 81 7d 1c 4d 87 bd b8 2d 1f 1c | NSS ike_alg_nss_cbc: camellia - enter | NSS ike_alg_nss_cbc: camellia - exit | verify_chunk_data: encrypt: ok | verify_chunk_data: updated CBC IV: ok | decode_to_chunk: IV: : input "0x00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00" | decode_to_chunk: output: | 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 | decode_to_chunk: new IV: : input "0x07 92 3A 39 EB 0A 81 7D 1C 4D 87 BD B8 2D 1F 1C" | decode_to_chunk: output: | 07 92 3a 39 eb 0a 81 7d 1c 4d 87 bd b8 2d 1f 1c | decode_to_chunk: cipertext: : input "0x07 92 3A 39 EB 0A 81 7D 1C 4D 87 BD B8 2D 1F 1C" | decode_to_chunk: output: | 07 92 3a 39 eb 0a 81 7d 1c 4d 87 bd b8 2d 1f 1c | decode_to_chunk: plaintext: : input "0x80 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00" | decode_to_chunk: output: | 80 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 | NSS ike_alg_nss_cbc: camellia - enter | NSS ike_alg_nss_cbc: camellia - exit | verify_chunk_data: decrypt: ok | verify_chunk_data: updated CBC IV: ok | test_cbc_vector: release sym_key-key@0x5570e4be4dc0 | test_ctr_vector: Camellia: 16 bytes with 128-bit key passed Camellia: 16 bytes with 128-bit key | decode_to_chunk: raw_key: input "0x00 11 22 33 44 55 66 77 88 99 AA BB CC DD EE FF" | decode_to_chunk: output: | 00 11 22 33 44 55 66 77 88 99 aa bb cc dd ee ff | : ephemeral-key@0x5570e4b65080 (16-bytes, AES_KEY_GEN) | CONCATENATE_DATA_AND_BASE: | target: EXTRACT_KEY_FROM_KEY | base: base-key@0x5570e4b65080 (16-bytes, AES_KEY_GEN) | params: 16-bytes@0x7ffe19a09670 | result: symkey-key@0x5570e4be6640 (32-bytes, EXTRACT_KEY_FROM_KEY) | key-offset: 0, key-size: 16 | EXTRACT_KEY_FROM_KEY: | target: CAMELLIA_CBC | flags: ENCRYPT+DECRYPT | key_size: 16-bytes | base: base-key@0x5570e4be6640 (32-bytes, EXTRACT_KEY_FROM_KEY) | operation: FLAGS_ONLY | params: 8-bytes@0x7ffe19a09658 | result: symkey-key@0x5570e4be4dc0 (16-bytes, CAMELLIA_CBC) | symkey: release tmp-key@0x5570e4be6640 | decode_to_chunk: IV: : input "0x00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00" | decode_to_chunk: output: | 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 | decode_to_chunk: new IV: : input "0x14 4D 2B 0F 50 0C 27 B7 EC 2C D1 2D 91 59 6F 37" | decode_to_chunk: output: | 14 4d 2b 0f 50 0c 27 b7 ec 2c d1 2d 91 59 6f 37 | decode_to_chunk: plaintext: : input "0x00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 01 " | decode_to_chunk: output: | 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 01 | decode_to_chunk: ciphertext: : input "0x14 4D 2B 0F 50 0C 27 B7 EC 2C D1 2D 91 59 6F 37" | decode_to_chunk: output: | 14 4d 2b 0f 50 0c 27 b7 ec 2c d1 2d 91 59 6f 37 | NSS ike_alg_nss_cbc: camellia - enter | NSS ike_alg_nss_cbc: camellia - exit | verify_chunk_data: encrypt: ok | verify_chunk_data: updated CBC IV: ok | decode_to_chunk: IV: : input "0x00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00" | decode_to_chunk: output: | 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 | decode_to_chunk: new IV: : input "0x14 4D 2B 0F 50 0C 27 B7 EC 2C D1 2D 91 59 6F 37" | decode_to_chunk: output: | 14 4d 2b 0f 50 0c 27 b7 ec 2c d1 2d 91 59 6f 37 | decode_to_chunk: cipertext: : input "0x14 4D 2B 0F 50 0C 27 B7 EC 2C D1 2D 91 59 6F 37" | decode_to_chunk: output: | 14 4d 2b 0f 50 0c 27 b7 ec 2c d1 2d 91 59 6f 37 | decode_to_chunk: plaintext: : input "0x00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 01 " | decode_to_chunk: output: | 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 01 | NSS ike_alg_nss_cbc: camellia - enter | NSS ike_alg_nss_cbc: camellia - exit | verify_chunk_data: decrypt: ok | verify_chunk_data: updated CBC IV: ok | test_cbc_vector: release sym_key-key@0x5570e4be4dc0 | test_ctr_vector: Camellia: 16 bytes with 128-bit key passed Camellia: 16 bytes with 256-bit key | decode_to_chunk: raw_key: input "0x00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00" | decode_to_chunk: output: | 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 | 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 | : ephemeral-key@0x5570e4b65080 (16-bytes, AES_KEY_GEN) | CONCATENATE_DATA_AND_BASE: | target: EXTRACT_KEY_FROM_KEY | base: base-key@0x5570e4b65080 (16-bytes, AES_KEY_GEN) | params: 16-bytes@0x7ffe19a09670 | result: symkey-key@0x5570e4be6640 (48-bytes, EXTRACT_KEY_FROM_KEY) | key-offset: 0, key-size: 32 | EXTRACT_KEY_FROM_KEY: | target: CAMELLIA_CBC | flags: ENCRYPT+DECRYPT | key_size: 32-bytes | base: base-key@0x5570e4be6640 (48-bytes, EXTRACT_KEY_FROM_KEY) | operation: FLAGS_ONLY | params: 8-bytes@0x7ffe19a09658 | result: symkey-key@0x5570e4be4dc0 (32-bytes, CAMELLIA_CBC) | symkey: release tmp-key@0x5570e4be6640 | decode_to_chunk: IV: : input "0x00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00" | decode_to_chunk: output: | 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 | decode_to_chunk: new IV: : input "0xB0 C6 B8 8A EA 51 8A B0 9E 84 72 48 E9 1B 1B 9D" | decode_to_chunk: output: | b0 c6 b8 8a ea 51 8a b0 9e 84 72 48 e9 1b 1b 9d | decode_to_chunk: plaintext: : input "0x80 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00" | decode_to_chunk: output: | 80 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 | decode_to_chunk: ciphertext: : input "0xB0 C6 B8 8A EA 51 8A B0 9E 84 72 48 E9 1B 1B 9D" | decode_to_chunk: output: | b0 c6 b8 8a ea 51 8a b0 9e 84 72 48 e9 1b 1b 9d | NSS ike_alg_nss_cbc: camellia - enter | NSS ike_alg_nss_cbc: camellia - exit | verify_chunk_data: encrypt: ok | verify_chunk_data: updated CBC IV: ok | decode_to_chunk: IV: : input "0x00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00" | decode_to_chunk: output: | 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 | decode_to_chunk: new IV: : input "0xB0 C6 B8 8A EA 51 8A B0 9E 84 72 48 E9 1B 1B 9D" | decode_to_chunk: output: | b0 c6 b8 8a ea 51 8a b0 9e 84 72 48 e9 1b 1b 9d | decode_to_chunk: cipertext: : input "0xB0 C6 B8 8A EA 51 8A B0 9E 84 72 48 E9 1B 1B 9D" | decode_to_chunk: output: | b0 c6 b8 8a ea 51 8a b0 9e 84 72 48 e9 1b 1b 9d | decode_to_chunk: plaintext: : input "0x80 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00" | decode_to_chunk: output: | 80 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 | NSS ike_alg_nss_cbc: camellia - enter | NSS ike_alg_nss_cbc: camellia - exit | verify_chunk_data: decrypt: ok | verify_chunk_data: updated CBC IV: ok | test_cbc_vector: release sym_key-key@0x5570e4be4dc0 | test_ctr_vector: Camellia: 16 bytes with 256-bit key passed Camellia: 16 bytes with 256-bit key | decode_to_chunk: raw_key: input "0x00 11 22 33 44 55 66 77 88 99 AA BB CC DD EE FF FF EE DD CC BB AA 99 88 77 66 55 44 33 22 11 00" | decode_to_chunk: output: | 00 11 22 33 44 55 66 77 88 99 aa bb cc dd ee ff | ff ee dd cc bb aa 99 88 77 66 55 44 33 22 11 00 | : ephemeral-key@0x5570e4b65080 (16-bytes, AES_KEY_GEN) | CONCATENATE_DATA_AND_BASE: | target: EXTRACT_KEY_FROM_KEY | base: base-key@0x5570e4b65080 (16-bytes, AES_KEY_GEN) | params: 16-bytes@0x7ffe19a09670 | result: symkey-key@0x5570e4be6640 (48-bytes, EXTRACT_KEY_FROM_KEY) | key-offset: 0, key-size: 32 | EXTRACT_KEY_FROM_KEY: | target: CAMELLIA_CBC | flags: ENCRYPT+DECRYPT | key_size: 32-bytes | base: base-key@0x5570e4be6640 (48-bytes, EXTRACT_KEY_FROM_KEY) | operation: FLAGS_ONLY | params: 8-bytes@0x7ffe19a09658 | result: symkey-key@0x5570e4be4dc0 (32-bytes, CAMELLIA_CBC) | symkey: release tmp-key@0x5570e4be6640 | decode_to_chunk: IV: : input "0x00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00" | decode_to_chunk: output: | 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 | decode_to_chunk: new IV: : input "0xCC 39 FF EE 18 56 D3 EB 61 02 5E 93 21 9B 65 23 " | decode_to_chunk: output: | cc 39 ff ee 18 56 d3 eb 61 02 5e 93 21 9b 65 23 | decode_to_chunk: plaintext: : input "0x00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 01" | decode_to_chunk: output: | 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 01 | decode_to_chunk: ciphertext: : input "0xCC 39 FF EE 18 56 D3 EB 61 02 5E 93 21 9B 65 23 " | decode_to_chunk: output: | cc 39 ff ee 18 56 d3 eb 61 02 5e 93 21 9b 65 23 | NSS ike_alg_nss_cbc: camellia - enter | NSS ike_alg_nss_cbc: camellia - exit | verify_chunk_data: encrypt: ok | verify_chunk_data: updated CBC IV: ok | decode_to_chunk: IV: : input "0x00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00" | decode_to_chunk: output: | 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 | decode_to_chunk: new IV: : input "0xCC 39 FF EE 18 56 D3 EB 61 02 5E 93 21 9B 65 23 " | decode_to_chunk: output: | cc 39 ff ee 18 56 d3 eb 61 02 5e 93 21 9b 65 23 | decode_to_chunk: cipertext: : input "0xCC 39 FF EE 18 56 D3 EB 61 02 5E 93 21 9B 65 23 " | decode_to_chunk: output: | cc 39 ff ee 18 56 d3 eb 61 02 5e 93 21 9b 65 23 | decode_to_chunk: plaintext: : input "0x00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 01" | decode_to_chunk: output: | 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 01 | NSS ike_alg_nss_cbc: camellia - enter | NSS ike_alg_nss_cbc: camellia - exit | verify_chunk_data: decrypt: ok | verify_chunk_data: updated CBC IV: ok | test_cbc_vector: release sym_key-key@0x5570e4be4dc0 | test_ctr_vector: Camellia: 16 bytes with 256-bit key passed testing AES_GCM_16: empty string | decode_to_chunk: raw_key: input "0xcf063a34d4a9a76c2c86787d3f96db71" | decode_to_chunk: output: | cf 06 3a 34 d4 a9 a7 6c 2c 86 78 7d 3f 96 db 71 | : ephemeral-key@0x5570e4b65080 (16-bytes, AES_KEY_GEN) | CONCATENATE_DATA_AND_BASE: | target: EXTRACT_KEY_FROM_KEY | base: base-key@0x5570e4b65080 (16-bytes, AES_KEY_GEN) | params: 16-bytes@0x7ffe19a09610 | result: symkey-key@0x5570e4be6640 (32-bytes, EXTRACT_KEY_FROM_KEY) | key-offset: 0, key-size: 16 | EXTRACT_KEY_FROM_KEY: | target: AES_GCM | flags: ENCRYPT+DECRYPT | key_size: 16-bytes | base: base-key@0x5570e4be6640 (32-bytes, EXTRACT_KEY_FROM_KEY) | operation: FLAGS_ONLY | params: 8-bytes@0x7ffe19a095f8 | result: symkey-key@0x5570e4be4dc0 (16-bytes, AES_GCM) | symkey: release tmp-key@0x5570e4be6640 | decode_to_chunk: salted IV: input "0x113b9785971864c83b01c787" | decode_to_chunk: output: | 11 3b 97 85 97 18 64 c8 3b 01 c7 87 | decode_to_chunk: AAD: input "" | decode_to_chunk: output: | | decode_to_chunk: plaintext: input "" | decode_to_chunk: output: | | decode_to_chunk: ciphertext: input "" | decode_to_chunk: output: | | decode_to_chunk: tag: input "0x72ac8493e3a5228b5d130a69d2510e42" | decode_to_chunk: output: | 72 ac 84 93 e3 a5 22 8b 5d 13 0a 69 d2 51 0e 42 | test_gcm_vector: decrypt: aad-size=0 salt-size=4 wire-IV-size=8 text-size=0 tag-size=16 | test_gcm_vector: text+tag on call | 72 ac 84 93 e3 a5 22 8b 5d 13 0a 69 d2 51 0e 42 | verify_chunk_data: output ciphertext: ok | verify_chunk_data: TAG: ok | test_gcm_vector: text+tag on return | 72 ac 84 93 e3 a5 22 8b 5d 13 0a 69 d2 51 0e 42 | test_gcm_vector: encrypt: aad-size=0 salt-size=4 wire-IV-size=8 text-size=0 tag-size=16 | test_gcm_vector: text+tag on call | 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 | verify_chunk_data: output ciphertext: ok | verify_chunk_data: TAG: ok | test_gcm_vector: text+tag on return | 72 ac 84 93 e3 a5 22 8b 5d 13 0a 69 d2 51 0e 42 | test_gcm_vector: release sym_key-key@0x5570e4be4dc0 | test_gcm_vector: passed one block | decode_to_chunk: raw_key: input "0xe98b72a9881a84ca6b76e0f43e68647a" | decode_to_chunk: output: | e9 8b 72 a9 88 1a 84 ca 6b 76 e0 f4 3e 68 64 7a | : ephemeral-key@0x5570e4b65080 (16-bytes, AES_KEY_GEN) | CONCATENATE_DATA_AND_BASE: | target: EXTRACT_KEY_FROM_KEY | base: base-key@0x5570e4b65080 (16-bytes, AES_KEY_GEN) | params: 16-bytes@0x7ffe19a09610 | result: symkey-key@0x5570e4be6640 (32-bytes, EXTRACT_KEY_FROM_KEY) | key-offset: 0, key-size: 16 | EXTRACT_KEY_FROM_KEY: | target: AES_GCM | flags: ENCRYPT+DECRYPT | key_size: 16-bytes | base: base-key@0x5570e4be6640 (32-bytes, EXTRACT_KEY_FROM_KEY) | operation: FLAGS_ONLY | params: 8-bytes@0x7ffe19a095f8 | result: symkey-key@0x5570e4be4dc0 (16-bytes, AES_GCM) | symkey: release tmp-key@0x5570e4be6640 | decode_to_chunk: salted IV: input "0x8b23299fde174053f3d652ba" | decode_to_chunk: output: | 8b 23 29 9f de 17 40 53 f3 d6 52 ba | decode_to_chunk: AAD: input "" | decode_to_chunk: output: | | decode_to_chunk: plaintext: input "0x28286a321293253c3e0aa2704a278032" | decode_to_chunk: output: | 28 28 6a 32 12 93 25 3c 3e 0a a2 70 4a 27 80 32 | decode_to_chunk: ciphertext: input "0x5a3c1cf1985dbb8bed818036fdd5ab42" | decode_to_chunk: output: | 5a 3c 1c f1 98 5d bb 8b ed 81 80 36 fd d5 ab 42 | decode_to_chunk: tag: input "0x23c7ab0f952b7091cd324835043b5eb5" | decode_to_chunk: output: | 23 c7 ab 0f 95 2b 70 91 cd 32 48 35 04 3b 5e b5 | test_gcm_vector: decrypt: aad-size=0 salt-size=4 wire-IV-size=8 text-size=16 tag-size=16 | test_gcm_vector: text+tag on call | 5a 3c 1c f1 98 5d bb 8b ed 81 80 36 fd d5 ab 42 | 23 c7 ab 0f 95 2b 70 91 cd 32 48 35 04 3b 5e b5 | verify_chunk_data: output ciphertext: ok | verify_chunk_data: TAG: ok | test_gcm_vector: text+tag on return | 28 28 6a 32 12 93 25 3c 3e 0a a2 70 4a 27 80 32 | 23 c7 ab 0f 95 2b 70 91 cd 32 48 35 04 3b 5e b5 | test_gcm_vector: encrypt: aad-size=0 salt-size=4 wire-IV-size=8 text-size=16 tag-size=16 | test_gcm_vector: text+tag on call | 28 28 6a 32 12 93 25 3c 3e 0a a2 70 4a 27 80 32 | 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 | verify_chunk_data: output ciphertext: ok | verify_chunk_data: TAG: ok | test_gcm_vector: text+tag on return | 5a 3c 1c f1 98 5d bb 8b ed 81 80 36 fd d5 ab 42 | 23 c7 ab 0f 95 2b 70 91 cd 32 48 35 04 3b 5e b5 | test_gcm_vector: release sym_key-key@0x5570e4be4dc0 | test_gcm_vector: passed two blocks | decode_to_chunk: raw_key: input "0xbfd414a6212958a607a0f5d3ab48471d" | decode_to_chunk: output: | bf d4 14 a6 21 29 58 a6 07 a0 f5 d3 ab 48 47 1d | : ephemeral-key@0x5570e4b65080 (16-bytes, AES_KEY_GEN) | CONCATENATE_DATA_AND_BASE: | target: EXTRACT_KEY_FROM_KEY | base: base-key@0x5570e4b65080 (16-bytes, AES_KEY_GEN) | params: 16-bytes@0x7ffe19a09610 | result: symkey-key@0x5570e4be6640 (32-bytes, EXTRACT_KEY_FROM_KEY) | key-offset: 0, key-size: 16 | EXTRACT_KEY_FROM_KEY: | target: AES_GCM | flags: ENCRYPT+DECRYPT | key_size: 16-bytes | base: base-key@0x5570e4be6640 (32-bytes, EXTRACT_KEY_FROM_KEY) | operation: FLAGS_ONLY | params: 8-bytes@0x7ffe19a095f8 | result: symkey-key@0x5570e4be4dc0 (16-bytes, AES_GCM) | symkey: release tmp-key@0x5570e4be6640 | decode_to_chunk: salted IV: input "0x86d8ea0ab8e40dcc481cd0e2" | decode_to_chunk: output: | 86 d8 ea 0a b8 e4 0d cc 48 1c d0 e2 | decode_to_chunk: AAD: input "" | decode_to_chunk: output: | | decode_to_chunk: plaintext: input "0xa6b76a066e63392c9443e60272ceaeb9d25c991b0f2e55e2804e168c05ea591a" | decode_to_chunk: output: | a6 b7 6a 06 6e 63 39 2c 94 43 e6 02 72 ce ae b9 | d2 5c 99 1b 0f 2e 55 e2 80 4e 16 8c 05 ea 59 1a | decode_to_chunk: ciphertext: input "0x62171db33193292d930bf6647347652c1ef33316d7feca99d54f1db4fcf513f8" | decode_to_chunk: output: | 62 17 1d b3 31 93 29 2d 93 0b f6 64 73 47 65 2c | 1e f3 33 16 d7 fe ca 99 d5 4f 1d b4 fc f5 13 f8 | decode_to_chunk: tag: input "0xc28280aa5c6c7a8bd366f28c1cfd1f6e" | decode_to_chunk: output: | c2 82 80 aa 5c 6c 7a 8b d3 66 f2 8c 1c fd 1f 6e | test_gcm_vector: decrypt: aad-size=0 salt-size=4 wire-IV-size=8 text-size=32 tag-size=16 | test_gcm_vector: text+tag on call | 62 17 1d b3 31 93 29 2d 93 0b f6 64 73 47 65 2c | 1e f3 33 16 d7 fe ca 99 d5 4f 1d b4 fc f5 13 f8 | c2 82 80 aa 5c 6c 7a 8b d3 66 f2 8c 1c fd 1f 6e | verify_chunk_data: output ciphertext: ok | verify_chunk_data: TAG: ok | test_gcm_vector: text+tag on return | a6 b7 6a 06 6e 63 39 2c 94 43 e6 02 72 ce ae b9 | d2 5c 99 1b 0f 2e 55 e2 80 4e 16 8c 05 ea 59 1a | c2 82 80 aa 5c 6c 7a 8b d3 66 f2 8c 1c fd 1f 6e | test_gcm_vector: encrypt: aad-size=0 salt-size=4 wire-IV-size=8 text-size=32 tag-size=16 | test_gcm_vector: text+tag on call | a6 b7 6a 06 6e 63 39 2c 94 43 e6 02 72 ce ae b9 | d2 5c 99 1b 0f 2e 55 e2 80 4e 16 8c 05 ea 59 1a | 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 | verify_chunk_data: output ciphertext: ok | verify_chunk_data: TAG: ok | test_gcm_vector: text+tag on return | 62 17 1d b3 31 93 29 2d 93 0b f6 64 73 47 65 2c | 1e f3 33 16 d7 fe ca 99 d5 4f 1d b4 fc f5 13 f8 | c2 82 80 aa 5c 6c 7a 8b d3 66 f2 8c 1c fd 1f 6e | test_gcm_vector: release sym_key-key@0x5570e4be4dc0 | test_gcm_vector: passed two blocks with associated data | decode_to_chunk: raw_key: input "0x006c458100fc5f4d62949d2c833b82d1" | decode_to_chunk: output: | 00 6c 45 81 00 fc 5f 4d 62 94 9d 2c 83 3b 82 d1 | : ephemeral-key@0x5570e4b65080 (16-bytes, AES_KEY_GEN) | CONCATENATE_DATA_AND_BASE: | target: EXTRACT_KEY_FROM_KEY | base: base-key@0x5570e4b65080 (16-bytes, AES_KEY_GEN) | params: 16-bytes@0x7ffe19a09610 | result: symkey-key@0x5570e4be6640 (32-bytes, EXTRACT_KEY_FROM_KEY) | key-offset: 0, key-size: 16 | EXTRACT_KEY_FROM_KEY: | target: AES_GCM | flags: ENCRYPT+DECRYPT | key_size: 16-bytes | base: base-key@0x5570e4be6640 (32-bytes, EXTRACT_KEY_FROM_KEY) | operation: FLAGS_ONLY | params: 8-bytes@0x7ffe19a095f8 | result: symkey-key@0x5570e4be4dc0 (16-bytes, AES_GCM) | symkey: release tmp-key@0x5570e4be6640 | decode_to_chunk: salted IV: input "0xa4e9c4bc5725a21ff42c82b2" | decode_to_chunk: output: | a4 e9 c4 bc 57 25 a2 1f f4 2c 82 b2 | decode_to_chunk: AAD: input "0x2efb14fb3657cdd6b9a8ff1a5f5a39b9" | decode_to_chunk: output: | 2e fb 14 fb 36 57 cd d6 b9 a8 ff 1a 5f 5a 39 b9 | decode_to_chunk: plaintext: input "0xf381d3bfbee0a879f7a4e17b623278cedd6978053dd313530a18f1a836100950" | decode_to_chunk: output: | f3 81 d3 bf be e0 a8 79 f7 a4 e1 7b 62 32 78 ce | dd 69 78 05 3d d3 13 53 0a 18 f1 a8 36 10 09 50 | decode_to_chunk: ciphertext: input "0xf39b4db3542d8542fb73fd2d66be568f26d7f814b3f87d1eceac3dd09a8d697e" | decode_to_chunk: output: | f3 9b 4d b3 54 2d 85 42 fb 73 fd 2d 66 be 56 8f | 26 d7 f8 14 b3 f8 7d 1e ce ac 3d d0 9a 8d 69 7e | decode_to_chunk: tag: input "0x39f045cb23b698c925db134d56c5" | decode_to_chunk: output: | 39 f0 45 cb 23 b6 98 c9 25 db 13 4d 56 c5 | test_gcm_vector: decrypt: aad-size=16 salt-size=4 wire-IV-size=8 text-size=32 tag-size=14 | test_gcm_vector: text+tag on call | f3 9b 4d b3 54 2d 85 42 fb 73 fd 2d 66 be 56 8f | 26 d7 f8 14 b3 f8 7d 1e ce ac 3d d0 9a 8d 69 7e | 39 f0 45 cb 23 b6 98 c9 25 db 13 4d 56 c5 | verify_chunk_data: output ciphertext: ok | verify_chunk_data: TAG: ok | test_gcm_vector: text+tag on return | f3 81 d3 bf be e0 a8 79 f7 a4 e1 7b 62 32 78 ce | dd 69 78 05 3d d3 13 53 0a 18 f1 a8 36 10 09 50 | 39 f0 45 cb 23 b6 98 c9 25 db 13 4d 56 c5 | test_gcm_vector: encrypt: aad-size=16 salt-size=4 wire-IV-size=8 text-size=32 tag-size=14 | test_gcm_vector: text+tag on call | f3 81 d3 bf be e0 a8 79 f7 a4 e1 7b 62 32 78 ce | dd 69 78 05 3d d3 13 53 0a 18 f1 a8 36 10 09 50 | 00 00 00 00 00 00 00 00 00 00 00 00 00 00 | verify_chunk_data: output ciphertext: ok | verify_chunk_data: TAG: ok | test_gcm_vector: text+tag on return | f3 9b 4d b3 54 2d 85 42 fb 73 fd 2d 66 be 56 8f | 26 d7 f8 14 b3 f8 7d 1e ce ac 3d d0 9a 8d 69 7e | 39 f0 45 cb 23 b6 98 c9 25 db 13 4d 56 c5 | test_gcm_vector: release sym_key-key@0x5570e4be4dc0 | test_gcm_vector: passed testing AES_CTR: Encrypting 16 octets using AES-CTR with 128-bit key | decode_to_chunk: raw_key: input "0x AE 68 52 F8 12 10 67 CC 4B F7 A5 76 55 77 F3 9E" | decode_to_chunk: output: | ae 68 52 f8 12 10 67 cc 4b f7 a5 76 55 77 f3 9e | : ephemeral-key@0x5570e4b65080 (16-bytes, AES_KEY_GEN) | CONCATENATE_DATA_AND_BASE: | target: EXTRACT_KEY_FROM_KEY | base: base-key@0x5570e4b65080 (16-bytes, AES_KEY_GEN) | params: 16-bytes@0x7ffe19a09670 | result: symkey-key@0x5570e4be6640 (32-bytes, EXTRACT_KEY_FROM_KEY) | key-offset: 0, key-size: 16 | EXTRACT_KEY_FROM_KEY: | target: AES_CTR | flags: ENCRYPT+DECRYPT | key_size: 16-bytes | base: base-key@0x5570e4be6640 (32-bytes, EXTRACT_KEY_FROM_KEY) | operation: FLAGS_ONLY | params: 8-bytes@0x7ffe19a09658 | result: symkey-key@0x5570e4be4dc0 (16-bytes, AES_CTR) | symkey: release tmp-key@0x5570e4be6640 | decode_to_chunk: input counter-block: : input "0x 00 00 00 30 00 00 00 00 00 00 00 00 00 00 00 01" | decode_to_chunk: output: | 00 00 00 30 00 00 00 00 00 00 00 00 00 00 00 01 | decode_to_chunk: Plaintext: input "0x 53 69 6E 67 6C 65 20 62 6C 6F 63 6B 20 6D 73 67" | decode_to_chunk: output: | 53 69 6e 67 6c 65 20 62 6c 6f 63 6b 20 6d 73 67 | decode_to_chunk: Ciphertext: input "0x E4 09 5D 4F B7 A7 B3 79 2D 61 75 A3 26 13 11 B8" | decode_to_chunk: output: | e4 09 5d 4f b7 a7 b3 79 2d 61 75 a3 26 13 11 b8 | decode_to_chunk: expected counter-block: : input "0x 00 00 00 30 00 00 00 00 00 00 00 00 00 00 00 02" | decode_to_chunk: output: | 00 00 00 30 00 00 00 00 00 00 00 00 00 00 00 02 | do_aes_ctr: enter | do_aes_ctr: counter-block updated from 0x1 to 0x2 for 16 bytes | do_aes_ctr: exit | verify_chunk_data: encrypt: ok | verify_chunk_data: counter-block: ok | decode_to_chunk: input counter-block: : input "0x 00 00 00 30 00 00 00 00 00 00 00 00 00 00 00 01" | decode_to_chunk: output: | 00 00 00 30 00 00 00 00 00 00 00 00 00 00 00 01 | decode_to_chunk: Ciphertext: input "0x E4 09 5D 4F B7 A7 B3 79 2D 61 75 A3 26 13 11 B8" | decode_to_chunk: output: | e4 09 5d 4f b7 a7 b3 79 2d 61 75 a3 26 13 11 b8 | decode_to_chunk: Plaintext: input "0x 53 69 6E 67 6C 65 20 62 6C 6F 63 6B 20 6D 73 67" | decode_to_chunk: output: | 53 69 6e 67 6c 65 20 62 6c 6f 63 6b 20 6d 73 67 | decode_to_chunk: expected counter-block: : input "0x 00 00 00 30 00 00 00 00 00 00 00 00 00 00 00 02" | decode_to_chunk: output: | 00 00 00 30 00 00 00 00 00 00 00 00 00 00 00 02 | do_aes_ctr: enter | do_aes_ctr: counter-block updated from 0x1 to 0x2 for 16 bytes | do_aes_ctr: exit | verify_chunk_data: decrypt: ok | verify_chunk_data: counter-block: ok | test_ctr_vector: release sym_key-key@0x5570e4be4dc0 | test_ctr_vector: Encrypting 16 octets using AES-CTR with 128-bit key passed Encrypting 32 octets using AES-CTR with 128-bit key | decode_to_chunk: raw_key: input "0x 7E 24 06 78 17 FA E0 D7 43 D6 CE 1F 32 53 91 63" | decode_to_chunk: output: | 7e 24 06 78 17 fa e0 d7 43 d6 ce 1f 32 53 91 63 | : ephemeral-key@0x5570e4b65080 (16-bytes, AES_KEY_GEN) | CONCATENATE_DATA_AND_BASE: | target: EXTRACT_KEY_FROM_KEY | base: base-key@0x5570e4b65080 (16-bytes, AES_KEY_GEN) | params: 16-bytes@0x7ffe19a09670 | result: symkey-key@0x5570e4be6640 (32-bytes, EXTRACT_KEY_FROM_KEY) | key-offset: 0, key-size: 16 | EXTRACT_KEY_FROM_KEY: | target: AES_CTR | flags: ENCRYPT+DECRYPT | key_size: 16-bytes | base: base-key@0x5570e4be6640 (32-bytes, EXTRACT_KEY_FROM_KEY) | operation: FLAGS_ONLY | params: 8-bytes@0x7ffe19a09658 | result: symkey-key@0x5570e4be4dc0 (16-bytes, AES_CTR) | symkey: release tmp-key@0x5570e4be6640 | decode_to_chunk: input counter-block: : input "0x 00 6C B6 DB C0 54 3B 59 DA 48 D9 0B 00 00 00 01" | decode_to_chunk: output: | 00 6c b6 db c0 54 3b 59 da 48 d9 0b 00 00 00 01 | decode_to_chunk: Plaintext: input "0x00 01 02 03 04 05 06 07 08 09 0A 0B 0C 0D 0E 0F10 11 12 13 14 15 16 17 18 19 1A 1B 1C 1D 1E 1F" | decode_to_chunk: output: | 00 01 02 03 04 05 06 07 08 09 0a 0b 0c 0d 0e 0f | 10 11 12 13 14 15 16 17 18 19 1a 1b 1c 1d 1e 1f | decode_to_chunk: Ciphertext: input "0x51 04 A1 06 16 8A 72 D9 79 0D 41 EE 8E DA D3 88EB 2E 1E FC 46 DA 57 C8 FC E6 30 DF 91 41 BE 28" | decode_to_chunk: output: | 51 04 a1 06 16 8a 72 d9 79 0d 41 ee 8e da d3 88 | eb 2e 1e fc 46 da 57 c8 fc e6 30 df 91 41 be 28 | decode_to_chunk: expected counter-block: : input "0x 00 6C B6 DB C0 54 3B 59 DA 48 D9 0B 00 00 00 03" | decode_to_chunk: output: | 00 6c b6 db c0 54 3b 59 da 48 d9 0b 00 00 00 03 | do_aes_ctr: enter | do_aes_ctr: counter-block updated from 0x1 to 0x3 for 32 bytes | do_aes_ctr: exit | verify_chunk_data: encrypt: ok | verify_chunk_data: counter-block: ok | decode_to_chunk: input counter-block: : input "0x 00 6C B6 DB C0 54 3B 59 DA 48 D9 0B 00 00 00 01" | decode_to_chunk: output: | 00 6c b6 db c0 54 3b 59 da 48 d9 0b 00 00 00 01 | decode_to_chunk: Ciphertext: input "0x51 04 A1 06 16 8A 72 D9 79 0D 41 EE 8E DA D3 88EB 2E 1E FC 46 DA 57 C8 FC E6 30 DF 91 41 BE 28" | decode_to_chunk: output: | 51 04 a1 06 16 8a 72 d9 79 0d 41 ee 8e da d3 88 | eb 2e 1e fc 46 da 57 c8 fc e6 30 df 91 41 be 28 | decode_to_chunk: Plaintext: input "0x00 01 02 03 04 05 06 07 08 09 0A 0B 0C 0D 0E 0F10 11 12 13 14 15 16 17 18 19 1A 1B 1C 1D 1E 1F" | decode_to_chunk: output: | 00 01 02 03 04 05 06 07 08 09 0a 0b 0c 0d 0e 0f | 10 11 12 13 14 15 16 17 18 19 1a 1b 1c 1d 1e 1f | decode_to_chunk: expected counter-block: : input "0x 00 6C B6 DB C0 54 3B 59 DA 48 D9 0B 00 00 00 03" | decode_to_chunk: output: | 00 6c b6 db c0 54 3b 59 da 48 d9 0b 00 00 00 03 | do_aes_ctr: enter | do_aes_ctr: counter-block updated from 0x1 to 0x3 for 32 bytes | do_aes_ctr: exit | verify_chunk_data: decrypt: ok | verify_chunk_data: counter-block: ok | test_ctr_vector: release sym_key-key@0x5570e4be4dc0 | test_ctr_vector: Encrypting 32 octets using AES-CTR with 128-bit key passed Encrypting 36 octets using AES-CTR with 128-bit key | decode_to_chunk: raw_key: input "0x 76 91 BE 03 5E 50 20 A8 AC 6E 61 85 29 F9 A0 DC" | decode_to_chunk: output: | 76 91 be 03 5e 50 20 a8 ac 6e 61 85 29 f9 a0 dc | : ephemeral-key@0x5570e4b65080 (16-bytes, AES_KEY_GEN) | CONCATENATE_DATA_AND_BASE: | target: EXTRACT_KEY_FROM_KEY | base: base-key@0x5570e4b65080 (16-bytes, AES_KEY_GEN) | params: 16-bytes@0x7ffe19a09670 | result: symkey-key@0x5570e4be6640 (32-bytes, EXTRACT_KEY_FROM_KEY) | key-offset: 0, key-size: 16 | EXTRACT_KEY_FROM_KEY: | target: AES_CTR | flags: ENCRYPT+DECRYPT | key_size: 16-bytes | base: base-key@0x5570e4be6640 (32-bytes, EXTRACT_KEY_FROM_KEY) | operation: FLAGS_ONLY | params: 8-bytes@0x7ffe19a09658 | result: symkey-key@0x5570e4be4dc0 (16-bytes, AES_CTR) | symkey: release tmp-key@0x5570e4be6640 | decode_to_chunk: input counter-block: : input "0x 00 E0 01 7B 27 77 7F 3F 4A 17 86 F0 00 00 00 01" | decode_to_chunk: output: | 00 e0 01 7b 27 77 7f 3f 4a 17 86 f0 00 00 00 01 | decode_to_chunk: Plaintext: input "0x00 01 02 03 04 05 06 07 08 09 0A 0B 0C 0D 0E 0F10 11 12 13 14 15 16 17 18 19 1A 1B 1C 1D 1E 1F20 21 22 23" | decode_to_chunk: output: | 00 01 02 03 04 05 06 07 08 09 0a 0b 0c 0d 0e 0f | 10 11 12 13 14 15 16 17 18 19 1a 1b 1c 1d 1e 1f | 20 21 22 23 | decode_to_chunk: Ciphertext: input "0xC1 CF 48 A8 9F 2F FD D9 CF 46 52 E9 EF DB 72 D745 40 A4 2B DE 6D 78 36 D5 9A 5C EA AE F3 10 5325 B2 07 2F" | decode_to_chunk: output: | c1 cf 48 a8 9f 2f fd d9 cf 46 52 e9 ef db 72 d7 | 45 40 a4 2b de 6d 78 36 d5 9a 5c ea ae f3 10 53 | 25 b2 07 2f | decode_to_chunk: expected counter-block: : input "0x 00 E0 01 7B 27 77 7F 3F 4A 17 86 F0 00 00 00 04" | decode_to_chunk: output: | 00 e0 01 7b 27 77 7f 3f 4a 17 86 f0 00 00 00 04 | do_aes_ctr: enter | do_aes_ctr: counter-block updated from 0x1 to 0x4 for 36 bytes | do_aes_ctr: exit | verify_chunk_data: encrypt: ok | verify_chunk_data: counter-block: ok | decode_to_chunk: input counter-block: : input "0x 00 E0 01 7B 27 77 7F 3F 4A 17 86 F0 00 00 00 01" | decode_to_chunk: output: | 00 e0 01 7b 27 77 7f 3f 4a 17 86 f0 00 00 00 01 | decode_to_chunk: Ciphertext: input "0xC1 CF 48 A8 9F 2F FD D9 CF 46 52 E9 EF DB 72 D745 40 A4 2B DE 6D 78 36 D5 9A 5C EA AE F3 10 5325 B2 07 2F" | decode_to_chunk: output: | c1 cf 48 a8 9f 2f fd d9 cf 46 52 e9 ef db 72 d7 | 45 40 a4 2b de 6d 78 36 d5 9a 5c ea ae f3 10 53 | 25 b2 07 2f | decode_to_chunk: Plaintext: input "0x00 01 02 03 04 05 06 07 08 09 0A 0B 0C 0D 0E 0F10 11 12 13 14 15 16 17 18 19 1A 1B 1C 1D 1E 1F20 21 22 23" | decode_to_chunk: output: | 00 01 02 03 04 05 06 07 08 09 0a 0b 0c 0d 0e 0f | 10 11 12 13 14 15 16 17 18 19 1a 1b 1c 1d 1e 1f | 20 21 22 23 | decode_to_chunk: expected counter-block: : input "0x 00 E0 01 7B 27 77 7F 3F 4A 17 86 F0 00 00 00 04" | decode_to_chunk: output: | 00 e0 01 7b 27 77 7f 3f 4a 17 86 f0 00 00 00 04 | do_aes_ctr: enter | do_aes_ctr: counter-block updated from 0x1 to 0x4 for 36 bytes | do_aes_ctr: exit | verify_chunk_data: decrypt: ok | verify_chunk_data: counter-block: ok | test_ctr_vector: release sym_key-key@0x5570e4be4dc0 | test_ctr_vector: Encrypting 36 octets using AES-CTR with 128-bit key passed Encrypting 16 octets using AES-CTR with 192-bit key | decode_to_chunk: raw_key: input "0x16 AF 5B 14 5F C9 F5 79 C1 75 F9 3E 3B FB 0E ED86 3D 06 CC FD B7 85 15" | decode_to_chunk: output: | 16 af 5b 14 5f c9 f5 79 c1 75 f9 3e 3b fb 0e ed | 86 3d 06 cc fd b7 85 15 | : ephemeral-key@0x5570e4b65080 (16-bytes, AES_KEY_GEN) | CONCATENATE_DATA_AND_BASE: | target: EXTRACT_KEY_FROM_KEY | base: base-key@0x5570e4b65080 (16-bytes, AES_KEY_GEN) | params: 16-bytes@0x7ffe19a09670 | result: symkey-key@0x5570e4be6640 (40-bytes, EXTRACT_KEY_FROM_KEY) | key-offset: 0, key-size: 24 | EXTRACT_KEY_FROM_KEY: | target: AES_CTR | flags: ENCRYPT+DECRYPT | key_size: 24-bytes | base: base-key@0x5570e4be6640 (40-bytes, EXTRACT_KEY_FROM_KEY) | operation: FLAGS_ONLY | params: 8-bytes@0x7ffe19a09658 | result: symkey-key@0x5570e4be4dc0 (24-bytes, AES_CTR) | symkey: release tmp-key@0x5570e4be6640 | decode_to_chunk: input counter-block: : input "0x 00 00 00 48 36 73 3C 14 7D 6D 93 CB 00 00 00 01" | decode_to_chunk: output: | 00 00 00 48 36 73 3c 14 7d 6d 93 cb 00 00 00 01 | decode_to_chunk: Plaintext: input "0x 53 69 6E 67 6C 65 20 62 6C 6F 63 6B 20 6D 73 67" | decode_to_chunk: output: | 53 69 6e 67 6c 65 20 62 6c 6f 63 6b 20 6d 73 67 | decode_to_chunk: Ciphertext: input "0x 4B 55 38 4F E2 59 C9 C8 4E 79 35 A0 03 CB E9 28" | decode_to_chunk: output: | 4b 55 38 4f e2 59 c9 c8 4e 79 35 a0 03 cb e9 28 | decode_to_chunk: expected counter-block: : input "0x 00 00 00 48 36 73 3C 14 7D 6D 93 CB 00 00 00 02" | decode_to_chunk: output: | 00 00 00 48 36 73 3c 14 7d 6d 93 cb 00 00 00 02 | do_aes_ctr: enter | do_aes_ctr: counter-block updated from 0x1 to 0x2 for 16 bytes | do_aes_ctr: exit | verify_chunk_data: encrypt: ok | verify_chunk_data: counter-block: ok | decode_to_chunk: input counter-block: : input "0x 00 00 00 48 36 73 3C 14 7D 6D 93 CB 00 00 00 01" | decode_to_chunk: output: | 00 00 00 48 36 73 3c 14 7d 6d 93 cb 00 00 00 01 | decode_to_chunk: Ciphertext: input "0x 4B 55 38 4F E2 59 C9 C8 4E 79 35 A0 03 CB E9 28" | decode_to_chunk: output: | 4b 55 38 4f e2 59 c9 c8 4e 79 35 a0 03 cb e9 28 | decode_to_chunk: Plaintext: input "0x 53 69 6E 67 6C 65 20 62 6C 6F 63 6B 20 6D 73 67" | decode_to_chunk: output: | 53 69 6e 67 6c 65 20 62 6c 6f 63 6b 20 6d 73 67 | decode_to_chunk: expected counter-block: : input "0x 00 00 00 48 36 73 3C 14 7D 6D 93 CB 00 00 00 02" | decode_to_chunk: output: | 00 00 00 48 36 73 3c 14 7d 6d 93 cb 00 00 00 02 | do_aes_ctr: enter | do_aes_ctr: counter-block updated from 0x1 to 0x2 for 16 bytes | do_aes_ctr: exit | verify_chunk_data: decrypt: ok | verify_chunk_data: counter-block: ok | test_ctr_vector: release sym_key-key@0x5570e4be4dc0 | test_ctr_vector: Encrypting 16 octets using AES-CTR with 192-bit key passed Encrypting 32 octets using AES-CTR with 192-bit key | decode_to_chunk: raw_key: input "0x7C 5C B2 40 1B 3D C3 3C 19 E7 34 08 19 E0 F6 9C67 8C 3D B8 E6 F6 A9 1A" | decode_to_chunk: output: | 7c 5c b2 40 1b 3d c3 3c 19 e7 34 08 19 e0 f6 9c | 67 8c 3d b8 e6 f6 a9 1a | : ephemeral-key@0x5570e4b65080 (16-bytes, AES_KEY_GEN) | CONCATENATE_DATA_AND_BASE: | target: EXTRACT_KEY_FROM_KEY | base: base-key@0x5570e4b65080 (16-bytes, AES_KEY_GEN) | params: 16-bytes@0x7ffe19a09670 | result: symkey-key@0x5570e4be6640 (40-bytes, EXTRACT_KEY_FROM_KEY) | key-offset: 0, key-size: 24 | EXTRACT_KEY_FROM_KEY: | target: AES_CTR | flags: ENCRYPT+DECRYPT | key_size: 24-bytes | base: base-key@0x5570e4be6640 (40-bytes, EXTRACT_KEY_FROM_KEY) | operation: FLAGS_ONLY | params: 8-bytes@0x7ffe19a09658 | result: symkey-key@0x5570e4be4dc0 (24-bytes, AES_CTR) | symkey: release tmp-key@0x5570e4be6640 | decode_to_chunk: input counter-block: : input "0x 00 96 B0 3B 02 0C 6E AD C2 CB 50 0D 00 00 00 01" | decode_to_chunk: output: | 00 96 b0 3b 02 0c 6e ad c2 cb 50 0d 00 00 00 01 | decode_to_chunk: Plaintext: input "0x00 01 02 03 04 05 06 07 08 09 0A 0B 0C 0D 0E 0F10 11 12 13 14 15 16 17 18 19 1A 1B 1C 1D 1E 1F" | decode_to_chunk: output: | 00 01 02 03 04 05 06 07 08 09 0a 0b 0c 0d 0e 0f | 10 11 12 13 14 15 16 17 18 19 1a 1b 1c 1d 1e 1f | decode_to_chunk: Ciphertext: input "0x45 32 43 FC 60 9B 23 32 7E DF AA FA 71 31 CD 9F84 90 70 1C 5A D4 A7 9C FC 1F E0 FF 42 F4 FB 00" | decode_to_chunk: output: | 45 32 43 fc 60 9b 23 32 7e df aa fa 71 31 cd 9f | 84 90 70 1c 5a d4 a7 9c fc 1f e0 ff 42 f4 fb 00 | decode_to_chunk: expected counter-block: : input "0x 00 96 B0 3B 02 0C 6E AD C2 CB 50 0D 00 00 00 03" | decode_to_chunk: output: | 00 96 b0 3b 02 0c 6e ad c2 cb 50 0d 00 00 00 03 | do_aes_ctr: enter | do_aes_ctr: counter-block updated from 0x1 to 0x3 for 32 bytes | do_aes_ctr: exit | verify_chunk_data: encrypt: ok | verify_chunk_data: counter-block: ok | decode_to_chunk: input counter-block: : input "0x 00 96 B0 3B 02 0C 6E AD C2 CB 50 0D 00 00 00 01" | decode_to_chunk: output: | 00 96 b0 3b 02 0c 6e ad c2 cb 50 0d 00 00 00 01 | decode_to_chunk: Ciphertext: input "0x45 32 43 FC 60 9B 23 32 7E DF AA FA 71 31 CD 9F84 90 70 1C 5A D4 A7 9C FC 1F E0 FF 42 F4 FB 00" | decode_to_chunk: output: | 45 32 43 fc 60 9b 23 32 7e df aa fa 71 31 cd 9f | 84 90 70 1c 5a d4 a7 9c fc 1f e0 ff 42 f4 fb 00 | decode_to_chunk: Plaintext: input "0x00 01 02 03 04 05 06 07 08 09 0A 0B 0C 0D 0E 0F10 11 12 13 14 15 16 17 18 19 1A 1B 1C 1D 1E 1F" | decode_to_chunk: output: | 00 01 02 03 04 05 06 07 08 09 0a 0b 0c 0d 0e 0f | 10 11 12 13 14 15 16 17 18 19 1a 1b 1c 1d 1e 1f | decode_to_chunk: expected counter-block: : input "0x 00 96 B0 3B 02 0C 6E AD C2 CB 50 0D 00 00 00 03" | decode_to_chunk: output: | 00 96 b0 3b 02 0c 6e ad c2 cb 50 0d 00 00 00 03 | do_aes_ctr: enter | do_aes_ctr: counter-block updated from 0x1 to 0x3 for 32 bytes | do_aes_ctr: exit | verify_chunk_data: decrypt: ok | verify_chunk_data: counter-block: ok | test_ctr_vector: release sym_key-key@0x5570e4be4dc0 | test_ctr_vector: Encrypting 32 octets using AES-CTR with 192-bit key passed Encrypting 36 octets using AES-CTR with 192-bit key | decode_to_chunk: raw_key: input "0x02 BF 39 1E E8 EC B1 59 B9 59 61 7B 09 65 27 9BF5 9B 60 A7 86 D3 E0 FE" | decode_to_chunk: output: | 02 bf 39 1e e8 ec b1 59 b9 59 61 7b 09 65 27 9b | f5 9b 60 a7 86 d3 e0 fe | : ephemeral-key@0x5570e4b65080 (16-bytes, AES_KEY_GEN) | CONCATENATE_DATA_AND_BASE: | target: EXTRACT_KEY_FROM_KEY | base: base-key@0x5570e4b65080 (16-bytes, AES_KEY_GEN) | params: 16-bytes@0x7ffe19a09670 | result: symkey-key@0x5570e4be6640 (40-bytes, EXTRACT_KEY_FROM_KEY) | key-offset: 0, key-size: 24 | EXTRACT_KEY_FROM_KEY: | target: AES_CTR | flags: ENCRYPT+DECRYPT | key_size: 24-bytes | base: base-key@0x5570e4be6640 (40-bytes, EXTRACT_KEY_FROM_KEY) | operation: FLAGS_ONLY | params: 8-bytes@0x7ffe19a09658 | result: symkey-key@0x5570e4be4dc0 (24-bytes, AES_CTR) | symkey: release tmp-key@0x5570e4be6640 | decode_to_chunk: input counter-block: : input "0x 00 07 BD FD 5C BD 60 27 8D CC 09 12 00 00 00 01" | decode_to_chunk: output: | 00 07 bd fd 5c bd 60 27 8d cc 09 12 00 00 00 01 | decode_to_chunk: Plaintext: input "0x00 01 02 03 04 05 06 07 08 09 0A 0B 0C 0D 0E 0F10 11 12 13 14 15 16 17 18 19 1A 1B 1C 1D 1E 1F20 21 22 23" | decode_to_chunk: output: | 00 01 02 03 04 05 06 07 08 09 0a 0b 0c 0d 0e 0f | 10 11 12 13 14 15 16 17 18 19 1a 1b 1c 1d 1e 1f | 20 21 22 23 | decode_to_chunk: Ciphertext: input "0x96 89 3F C5 5E 5C 72 2F 54 0B 7D D1 DD F7 E7 58D2 88 BC 95 C6 91 65 88 45 36 C8 11 66 2F 21 88AB EE 09 35" | decode_to_chunk: output: | 96 89 3f c5 5e 5c 72 2f 54 0b 7d d1 dd f7 e7 58 | d2 88 bc 95 c6 91 65 88 45 36 c8 11 66 2f 21 88 | ab ee 09 35 | decode_to_chunk: expected counter-block: : input "0x 00 07 BD FD 5C BD 60 27 8D CC 09 12 00 00 00 04" | decode_to_chunk: output: | 00 07 bd fd 5c bd 60 27 8d cc 09 12 00 00 00 04 | do_aes_ctr: enter | do_aes_ctr: counter-block updated from 0x1 to 0x4 for 36 bytes | do_aes_ctr: exit | verify_chunk_data: encrypt: ok | verify_chunk_data: counter-block: ok | decode_to_chunk: input counter-block: : input "0x 00 07 BD FD 5C BD 60 27 8D CC 09 12 00 00 00 01" | decode_to_chunk: output: | 00 07 bd fd 5c bd 60 27 8d cc 09 12 00 00 00 01 | decode_to_chunk: Ciphertext: input "0x96 89 3F C5 5E 5C 72 2F 54 0B 7D D1 DD F7 E7 58D2 88 BC 95 C6 91 65 88 45 36 C8 11 66 2F 21 88AB EE 09 35" | decode_to_chunk: output: | 96 89 3f c5 5e 5c 72 2f 54 0b 7d d1 dd f7 e7 58 | d2 88 bc 95 c6 91 65 88 45 36 c8 11 66 2f 21 88 | ab ee 09 35 | decode_to_chunk: Plaintext: input "0x00 01 02 03 04 05 06 07 08 09 0A 0B 0C 0D 0E 0F10 11 12 13 14 15 16 17 18 19 1A 1B 1C 1D 1E 1F20 21 22 23" | decode_to_chunk: output: | 00 01 02 03 04 05 06 07 08 09 0a 0b 0c 0d 0e 0f | 10 11 12 13 14 15 16 17 18 19 1a 1b 1c 1d 1e 1f | 20 21 22 23 | decode_to_chunk: expected counter-block: : input "0x 00 07 BD FD 5C BD 60 27 8D CC 09 12 00 00 00 04" | decode_to_chunk: output: | 00 07 bd fd 5c bd 60 27 8d cc 09 12 00 00 00 04 | do_aes_ctr: enter | do_aes_ctr: counter-block updated from 0x1 to 0x4 for 36 bytes | do_aes_ctr: exit | verify_chunk_data: decrypt: ok | verify_chunk_data: counter-block: ok | test_ctr_vector: release sym_key-key@0x5570e4be4dc0 | test_ctr_vector: Encrypting 36 octets using AES-CTR with 192-bit key passed Encrypting 16 octets using AES-CTR with 256-bit key | decode_to_chunk: raw_key: input "0x77 6B EF F2 85 1D B0 6F 4C 8A 05 42 C8 69 6F 6C6A 81 AF 1E EC 96 B4 D3 7F C1 D6 89 E6 C1 C1 04" | decode_to_chunk: output: | 77 6b ef f2 85 1d b0 6f 4c 8a 05 42 c8 69 6f 6c | 6a 81 af 1e ec 96 b4 d3 7f c1 d6 89 e6 c1 c1 04 | : ephemeral-key@0x5570e4b65080 (16-bytes, AES_KEY_GEN) | CONCATENATE_DATA_AND_BASE: | target: EXTRACT_KEY_FROM_KEY | base: base-key@0x5570e4b65080 (16-bytes, AES_KEY_GEN) | params: 16-bytes@0x7ffe19a09670 | result: symkey-key@0x5570e4be6640 (48-bytes, EXTRACT_KEY_FROM_KEY) | key-offset: 0, key-size: 32 | EXTRACT_KEY_FROM_KEY: | target: AES_CTR | flags: ENCRYPT+DECRYPT | key_size: 32-bytes | base: base-key@0x5570e4be6640 (48-bytes, EXTRACT_KEY_FROM_KEY) | operation: FLAGS_ONLY | params: 8-bytes@0x7ffe19a09658 | result: symkey-key@0x5570e4be4dc0 (32-bytes, AES_CTR) | symkey: release tmp-key@0x5570e4be6640 | decode_to_chunk: input counter-block: : input "0x 00 00 00 60 DB 56 72 C9 7A A8 F0 B2 00 00 00 01" | decode_to_chunk: output: | 00 00 00 60 db 56 72 c9 7a a8 f0 b2 00 00 00 01 | decode_to_chunk: Plaintext: input "0x 53 69 6E 67 6C 65 20 62 6C 6F 63 6B 20 6D 73 67" | decode_to_chunk: output: | 53 69 6e 67 6c 65 20 62 6c 6f 63 6b 20 6d 73 67 | decode_to_chunk: Ciphertext: input "0x 14 5A D0 1D BF 82 4E C7 56 08 63 DC 71 E3 E0 C0" | decode_to_chunk: output: | 14 5a d0 1d bf 82 4e c7 56 08 63 dc 71 e3 e0 c0 | decode_to_chunk: expected counter-block: : input "0x 00 00 00 60 DB 56 72 C9 7A A8 F0 B2 00 00 00 02" | decode_to_chunk: output: | 00 00 00 60 db 56 72 c9 7a a8 f0 b2 00 00 00 02 | do_aes_ctr: enter | do_aes_ctr: counter-block updated from 0x1 to 0x2 for 16 bytes | do_aes_ctr: exit | verify_chunk_data: encrypt: ok | verify_chunk_data: counter-block: ok | decode_to_chunk: input counter-block: : input "0x 00 00 00 60 DB 56 72 C9 7A A8 F0 B2 00 00 00 01" | decode_to_chunk: output: | 00 00 00 60 db 56 72 c9 7a a8 f0 b2 00 00 00 01 | decode_to_chunk: Ciphertext: input "0x 14 5A D0 1D BF 82 4E C7 56 08 63 DC 71 E3 E0 C0" | decode_to_chunk: output: | 14 5a d0 1d bf 82 4e c7 56 08 63 dc 71 e3 e0 c0 | decode_to_chunk: Plaintext: input "0x 53 69 6E 67 6C 65 20 62 6C 6F 63 6B 20 6D 73 67" | decode_to_chunk: output: | 53 69 6e 67 6c 65 20 62 6c 6f 63 6b 20 6d 73 67 | decode_to_chunk: expected counter-block: : input "0x 00 00 00 60 DB 56 72 C9 7A A8 F0 B2 00 00 00 02" | decode_to_chunk: output: | 00 00 00 60 db 56 72 c9 7a a8 f0 b2 00 00 00 02 | do_aes_ctr: enter | do_aes_ctr: counter-block updated from 0x1 to 0x2 for 16 bytes | do_aes_ctr: exit | verify_chunk_data: decrypt: ok | verify_chunk_data: counter-block: ok | test_ctr_vector: release sym_key-key@0x5570e4be4dc0 | test_ctr_vector: Encrypting 16 octets using AES-CTR with 256-bit key passed Encrypting 32 octets using AES-CTR with 256-bit key | decode_to_chunk: raw_key: input "0xF6 D6 6D 6B D5 2D 59 BB 07 96 36 58 79 EF F8 86C6 6D D5 1A 5B 6A 99 74 4B 50 59 0C 87 A2 38 84" | decode_to_chunk: output: | f6 d6 6d 6b d5 2d 59 bb 07 96 36 58 79 ef f8 86 | c6 6d d5 1a 5b 6a 99 74 4b 50 59 0c 87 a2 38 84 | : ephemeral-key@0x5570e4b65080 (16-bytes, AES_KEY_GEN) | CONCATENATE_DATA_AND_BASE: | target: EXTRACT_KEY_FROM_KEY | base: base-key@0x5570e4b65080 (16-bytes, AES_KEY_GEN) | params: 16-bytes@0x7ffe19a09670 | result: symkey-key@0x5570e4be6640 (48-bytes, EXTRACT_KEY_FROM_KEY) | key-offset: 0, key-size: 32 | EXTRACT_KEY_FROM_KEY: | target: AES_CTR | flags: ENCRYPT+DECRYPT | key_size: 32-bytes | base: base-key@0x5570e4be6640 (48-bytes, EXTRACT_KEY_FROM_KEY) | operation: FLAGS_ONLY | params: 8-bytes@0x7ffe19a09658 | result: symkey-key@0x5570e4be4dc0 (32-bytes, AES_CTR) | symkey: release tmp-key@0x5570e4be6640 | decode_to_chunk: input counter-block: : input "0x 00 FA AC 24 C1 58 5E F1 5A 43 D8 75 00 00 00 01" | decode_to_chunk: output: | 00 fa ac 24 c1 58 5e f1 5a 43 d8 75 00 00 00 01 | decode_to_chunk: Plaintext: input "0x00 01 02 03 04 05 06 07 08 09 0A 0B 0C 0D 0E 0F10 11 12 13 14 15 16 17 18 19 1A 1B 1C 1D 1E 1F" | decode_to_chunk: output: | 00 01 02 03 04 05 06 07 08 09 0a 0b 0c 0d 0e 0f | 10 11 12 13 14 15 16 17 18 19 1a 1b 1c 1d 1e 1f | decode_to_chunk: Ciphertext: input "0xF0 5E 23 1B 38 94 61 2C 49 EE 00 0B 80 4E B2 A9B8 30 6B 50 8F 83 9D 6A 55 30 83 1D 93 44 AF 1C" | decode_to_chunk: output: | f0 5e 23 1b 38 94 61 2c 49 ee 00 0b 80 4e b2 a9 | b8 30 6b 50 8f 83 9d 6a 55 30 83 1d 93 44 af 1c | decode_to_chunk: expected counter-block: : input "0x 00 FA AC 24 C1 58 5E F1 5A 43 D8 75 00 00 00 03" | decode_to_chunk: output: | 00 fa ac 24 c1 58 5e f1 5a 43 d8 75 00 00 00 03 | do_aes_ctr: enter | do_aes_ctr: counter-block updated from 0x1 to 0x3 for 32 bytes | do_aes_ctr: exit | verify_chunk_data: encrypt: ok | verify_chunk_data: counter-block: ok | decode_to_chunk: input counter-block: : input "0x 00 FA AC 24 C1 58 5E F1 5A 43 D8 75 00 00 00 01" | decode_to_chunk: output: | 00 fa ac 24 c1 58 5e f1 5a 43 d8 75 00 00 00 01 | decode_to_chunk: Ciphertext: input "0xF0 5E 23 1B 38 94 61 2C 49 EE 00 0B 80 4E B2 A9B8 30 6B 50 8F 83 9D 6A 55 30 83 1D 93 44 AF 1C" | decode_to_chunk: output: | f0 5e 23 1b 38 94 61 2c 49 ee 00 0b 80 4e b2 a9 | b8 30 6b 50 8f 83 9d 6a 55 30 83 1d 93 44 af 1c | decode_to_chunk: Plaintext: input "0x00 01 02 03 04 05 06 07 08 09 0A 0B 0C 0D 0E 0F10 11 12 13 14 15 16 17 18 19 1A 1B 1C 1D 1E 1F" | decode_to_chunk: output: | 00 01 02 03 04 05 06 07 08 09 0a 0b 0c 0d 0e 0f | 10 11 12 13 14 15 16 17 18 19 1a 1b 1c 1d 1e 1f | decode_to_chunk: expected counter-block: : input "0x 00 FA AC 24 C1 58 5E F1 5A 43 D8 75 00 00 00 03" | decode_to_chunk: output: | 00 fa ac 24 c1 58 5e f1 5a 43 d8 75 00 00 00 03 | do_aes_ctr: enter | do_aes_ctr: counter-block updated from 0x1 to 0x3 for 32 bytes | do_aes_ctr: exit | verify_chunk_data: decrypt: ok | verify_chunk_data: counter-block: ok | test_ctr_vector: release sym_key-key@0x5570e4be4dc0 | test_ctr_vector: Encrypting 32 octets using AES-CTR with 256-bit key passed Encrypting 36 octets using AES-CTR with 256-bit key | decode_to_chunk: raw_key: input "0xFF 7A 61 7C E6 91 48 E4 F1 72 6E 2F 43 58 1D E2AA 62 D9 F8 05 53 2E DF F1 EE D6 87 FB 54 15 3D" | decode_to_chunk: output: | ff 7a 61 7c e6 91 48 e4 f1 72 6e 2f 43 58 1d e2 | aa 62 d9 f8 05 53 2e df f1 ee d6 87 fb 54 15 3d | : ephemeral-key@0x5570e4b65080 (16-bytes, AES_KEY_GEN) | CONCATENATE_DATA_AND_BASE: | target: EXTRACT_KEY_FROM_KEY | base: base-key@0x5570e4b65080 (16-bytes, AES_KEY_GEN) | params: 16-bytes@0x7ffe19a09670 | result: symkey-key@0x5570e4be6640 (48-bytes, EXTRACT_KEY_FROM_KEY) | key-offset: 0, key-size: 32 | EXTRACT_KEY_FROM_KEY: | target: AES_CTR | flags: ENCRYPT+DECRYPT | key_size: 32-bytes | base: base-key@0x5570e4be6640 (48-bytes, EXTRACT_KEY_FROM_KEY) | operation: FLAGS_ONLY | params: 8-bytes@0x7ffe19a09658 | result: symkey-key@0x5570e4be4dc0 (32-bytes, AES_CTR) | symkey: release tmp-key@0x5570e4be6640 | decode_to_chunk: input counter-block: : input "0x 00 1C C5 B7 51 A5 1D 70 A1 C1 11 48 00 00 00 01" | decode_to_chunk: output: | 00 1c c5 b7 51 a5 1d 70 a1 c1 11 48 00 00 00 01 | decode_to_chunk: Plaintext: input "0x00 01 02 03 04 05 06 07 08 09 0A 0B 0C 0D 0E 0F10 11 12 13 14 15 16 17 18 19 1A 1B 1C 1D 1E 1F20 21 22 23" | decode_to_chunk: output: | 00 01 02 03 04 05 06 07 08 09 0a 0b 0c 0d 0e 0f | 10 11 12 13 14 15 16 17 18 19 1a 1b 1c 1d 1e 1f | 20 21 22 23 | decode_to_chunk: Ciphertext: input "0xEB 6C 52 82 1D 0B BB F7 CE 75 94 46 2A CA 4F AAB4 07 DF 86 65 69 FD 07 F4 8C C0 B5 83 D6 07 1F1E C0 E6 B8" | decode_to_chunk: output: | eb 6c 52 82 1d 0b bb f7 ce 75 94 46 2a ca 4f aa | b4 07 df 86 65 69 fd 07 f4 8c c0 b5 83 d6 07 1f | 1e c0 e6 b8 | decode_to_chunk: expected counter-block: : input "0x 00 1C C5 B7 51 A5 1D 70 A1 C1 11 48 00 00 00 04" | decode_to_chunk: output: | 00 1c c5 b7 51 a5 1d 70 a1 c1 11 48 00 00 00 04 | do_aes_ctr: enter | do_aes_ctr: counter-block updated from 0x1 to 0x4 for 36 bytes | do_aes_ctr: exit | verify_chunk_data: encrypt: ok | verify_chunk_data: counter-block: ok | decode_to_chunk: input counter-block: : input "0x 00 1C C5 B7 51 A5 1D 70 A1 C1 11 48 00 00 00 01" | decode_to_chunk: output: | 00 1c c5 b7 51 a5 1d 70 a1 c1 11 48 00 00 00 01 | decode_to_chunk: Ciphertext: input "0xEB 6C 52 82 1D 0B BB F7 CE 75 94 46 2A CA 4F AAB4 07 DF 86 65 69 FD 07 F4 8C C0 B5 83 D6 07 1F1E C0 E6 B8" | decode_to_chunk: output: | eb 6c 52 82 1d 0b bb f7 ce 75 94 46 2a ca 4f aa | b4 07 df 86 65 69 fd 07 f4 8c c0 b5 83 d6 07 1f | 1e c0 e6 b8 | decode_to_chunk: Plaintext: input "0x00 01 02 03 04 05 06 07 08 09 0A 0B 0C 0D 0E 0F10 11 12 13 14 15 16 17 18 19 1A 1B 1C 1D 1E 1F20 21 22 23" | decode_to_chunk: output: | 00 01 02 03 04 05 06 07 08 09 0a 0b 0c 0d 0e 0f | 10 11 12 13 14 15 16 17 18 19 1a 1b 1c 1d 1e 1f | 20 21 22 23 | decode_to_chunk: expected counter-block: : input "0x 00 1C C5 B7 51 A5 1D 70 A1 C1 11 48 00 00 00 04" | decode_to_chunk: output: | 00 1c c5 b7 51 a5 1d 70 a1 c1 11 48 00 00 00 04 | do_aes_ctr: enter | do_aes_ctr: counter-block updated from 0x1 to 0x4 for 36 bytes | do_aes_ctr: exit | verify_chunk_data: decrypt: ok | verify_chunk_data: counter-block: ok | test_ctr_vector: release sym_key-key@0x5570e4be4dc0 | test_ctr_vector: Encrypting 36 octets using AES-CTR with 256-bit key passed testing AES_CBC: Encrypting 16 bytes (1 block) using AES-CBC with 128-bit key | decode_to_chunk: raw_key: input "0x06a9214036b8a15b512e03d534120006" | decode_to_chunk: output: | 06 a9 21 40 36 b8 a1 5b 51 2e 03 d5 34 12 00 06 | : ephemeral-key@0x5570e4b65080 (16-bytes, AES_KEY_GEN) | CONCATENATE_DATA_AND_BASE: | target: EXTRACT_KEY_FROM_KEY | base: base-key@0x5570e4b65080 (16-bytes, AES_KEY_GEN) | params: 16-bytes@0x7ffe19a09670 | result: symkey-key@0x5570e4be6640 (32-bytes, EXTRACT_KEY_FROM_KEY) | key-offset: 0, key-size: 16 | EXTRACT_KEY_FROM_KEY: | target: AES_CBC | flags: ENCRYPT+DECRYPT | key_size: 16-bytes | base: base-key@0x5570e4be6640 (32-bytes, EXTRACT_KEY_FROM_KEY) | operation: FLAGS_ONLY | params: 8-bytes@0x7ffe19a09658 | result: symkey-key@0x5570e4be4dc0 (16-bytes, AES_CBC) | symkey: release tmp-key@0x5570e4be6640 | decode_to_chunk: IV: : input "0x3dafba429d9eb430b422da802c9fac41" | decode_to_chunk: output: | 3d af ba 42 9d 9e b4 30 b4 22 da 80 2c 9f ac 41 | decode_to_chunk: new IV: : input "0xe353779c1079aeb82708942dbe77181a" | decode_to_chunk: output: | e3 53 77 9c 10 79 ae b8 27 08 94 2d be 77 18 1a | decode_to_chunk: plaintext: : input "Single block msg" | decode_to_chunk: output: | 53 69 6e 67 6c 65 20 62 6c 6f 63 6b 20 6d 73 67 | decode_to_chunk: ciphertext: : input "0xe353779c1079aeb82708942dbe77181a" | decode_to_chunk: output: | e3 53 77 9c 10 79 ae b8 27 08 94 2d be 77 18 1a | NSS ike_alg_nss_cbc: aes - enter | NSS ike_alg_nss_cbc: aes - exit | verify_chunk_data: encrypt: ok | verify_chunk_data: updated CBC IV: ok | decode_to_chunk: IV: : input "0x3dafba429d9eb430b422da802c9fac41" | decode_to_chunk: output: | 3d af ba 42 9d 9e b4 30 b4 22 da 80 2c 9f ac 41 | decode_to_chunk: new IV: : input "0xe353779c1079aeb82708942dbe77181a" | decode_to_chunk: output: | e3 53 77 9c 10 79 ae b8 27 08 94 2d be 77 18 1a | decode_to_chunk: cipertext: : input "0xe353779c1079aeb82708942dbe77181a" | decode_to_chunk: output: | e3 53 77 9c 10 79 ae b8 27 08 94 2d be 77 18 1a | decode_to_chunk: plaintext: : input "Single block msg" | decode_to_chunk: output: | 53 69 6e 67 6c 65 20 62 6c 6f 63 6b 20 6d 73 67 | NSS ike_alg_nss_cbc: aes - enter | NSS ike_alg_nss_cbc: aes - exit | verify_chunk_data: decrypt: ok | verify_chunk_data: updated CBC IV: ok | test_cbc_vector: release sym_key-key@0x5570e4be4dc0 | test_ctr_vector: Encrypting 16 bytes (1 block) using AES-CBC with 128-bit key passed Encrypting 32 bytes (2 blocks) using AES-CBC with 128-bit key | decode_to_chunk: raw_key: input "0xc286696d887c9aa0611bbb3e2025a45a" | decode_to_chunk: output: | c2 86 69 6d 88 7c 9a a0 61 1b bb 3e 20 25 a4 5a | : ephemeral-key@0x5570e4b65080 (16-bytes, AES_KEY_GEN) | CONCATENATE_DATA_AND_BASE: | target: EXTRACT_KEY_FROM_KEY | base: base-key@0x5570e4b65080 (16-bytes, AES_KEY_GEN) | params: 16-bytes@0x7ffe19a09670 | result: symkey-key@0x5570e4be6640 (32-bytes, EXTRACT_KEY_FROM_KEY) | key-offset: 0, key-size: 16 | EXTRACT_KEY_FROM_KEY: | target: AES_CBC | flags: ENCRYPT+DECRYPT | key_size: 16-bytes | base: base-key@0x5570e4be6640 (32-bytes, EXTRACT_KEY_FROM_KEY) | operation: FLAGS_ONLY | params: 8-bytes@0x7ffe19a09658 | result: symkey-key@0x5570e4be4dc0 (16-bytes, AES_CBC) | symkey: release tmp-key@0x5570e4be6640 | decode_to_chunk: IV: : input "0x562e17996d093d28ddb3ba695a2e6f58" | decode_to_chunk: output: | 56 2e 17 99 6d 09 3d 28 dd b3 ba 69 5a 2e 6f 58 | decode_to_chunk: new IV: : input "0xd296cd94c2cccf8a3a863028b5e1dc0a7586602d253cfff91b8266bea6d61ab1" | decode_to_chunk: output: | d2 96 cd 94 c2 cc cf 8a 3a 86 30 28 b5 e1 dc 0a | 75 86 60 2d 25 3c ff f9 1b 82 66 be a6 d6 1a b1 | decode_to_chunk: plaintext: : input "0x000102030405060708090a0b0c0d0e0f101112131415161718191a1b1c1d1e1f" | decode_to_chunk: output: | 00 01 02 03 04 05 06 07 08 09 0a 0b 0c 0d 0e 0f | 10 11 12 13 14 15 16 17 18 19 1a 1b 1c 1d 1e 1f | decode_to_chunk: ciphertext: : input "0xd296cd94c2cccf8a3a863028b5e1dc0a7586602d253cfff91b8266bea6d61ab1" | decode_to_chunk: output: | d2 96 cd 94 c2 cc cf 8a 3a 86 30 28 b5 e1 dc 0a | 75 86 60 2d 25 3c ff f9 1b 82 66 be a6 d6 1a b1 | NSS ike_alg_nss_cbc: aes - enter | NSS ike_alg_nss_cbc: aes - exit | verify_chunk_data: encrypt: ok | verify_chunk_data: updated CBC IV: ok | decode_to_chunk: IV: : input "0x562e17996d093d28ddb3ba695a2e6f58" | decode_to_chunk: output: | 56 2e 17 99 6d 09 3d 28 dd b3 ba 69 5a 2e 6f 58 | decode_to_chunk: new IV: : input "0xd296cd94c2cccf8a3a863028b5e1dc0a7586602d253cfff91b8266bea6d61ab1" | decode_to_chunk: output: | d2 96 cd 94 c2 cc cf 8a 3a 86 30 28 b5 e1 dc 0a | 75 86 60 2d 25 3c ff f9 1b 82 66 be a6 d6 1a b1 | decode_to_chunk: cipertext: : input "0xd296cd94c2cccf8a3a863028b5e1dc0a7586602d253cfff91b8266bea6d61ab1" | decode_to_chunk: output: | d2 96 cd 94 c2 cc cf 8a 3a 86 30 28 b5 e1 dc 0a | 75 86 60 2d 25 3c ff f9 1b 82 66 be a6 d6 1a b1 | decode_to_chunk: plaintext: : input "0x000102030405060708090a0b0c0d0e0f101112131415161718191a1b1c1d1e1f" | decode_to_chunk: output: | 00 01 02 03 04 05 06 07 08 09 0a 0b 0c 0d 0e 0f | 10 11 12 13 14 15 16 17 18 19 1a 1b 1c 1d 1e 1f | NSS ike_alg_nss_cbc: aes - enter | NSS ike_alg_nss_cbc: aes - exit | verify_chunk_data: decrypt: ok | verify_chunk_data: updated CBC IV: ok | test_cbc_vector: release sym_key-key@0x5570e4be4dc0 | test_ctr_vector: Encrypting 32 bytes (2 blocks) using AES-CBC with 128-bit key passed Encrypting 48 bytes (3 blocks) using AES-CBC with 128-bit key | decode_to_chunk: raw_key: input "0x6c3ea0477630ce21a2ce334aa746c2cd" | decode_to_chunk: output: | 6c 3e a0 47 76 30 ce 21 a2 ce 33 4a a7 46 c2 cd | : ephemeral-key@0x5570e4b65080 (16-bytes, AES_KEY_GEN) | CONCATENATE_DATA_AND_BASE: | target: EXTRACT_KEY_FROM_KEY | base: base-key@0x5570e4b65080 (16-bytes, AES_KEY_GEN) | params: 16-bytes@0x7ffe19a09670 | result: symkey-key@0x5570e4be6640 (32-bytes, EXTRACT_KEY_FROM_KEY) | key-offset: 0, key-size: 16 | EXTRACT_KEY_FROM_KEY: | target: AES_CBC | flags: ENCRYPT+DECRYPT | key_size: 16-bytes | base: base-key@0x5570e4be6640 (32-bytes, EXTRACT_KEY_FROM_KEY) | operation: FLAGS_ONLY | params: 8-bytes@0x7ffe19a09658 | result: symkey-key@0x5570e4be4dc0 (16-bytes, AES_CBC) | symkey: release tmp-key@0x5570e4be6640 | decode_to_chunk: IV: : input "0xc782dc4c098c66cbd9cd27d825682c81" | decode_to_chunk: output: | c7 82 dc 4c 09 8c 66 cb d9 cd 27 d8 25 68 2c 81 | decode_to_chunk: new IV: : input "0xd0a02b3836451753d493665d33f0e8862dea54cdb293abc7506939276772f8d5021c19216bad525c8579695d83ba2684" | decode_to_chunk: output: | d0 a0 2b 38 36 45 17 53 d4 93 66 5d 33 f0 e8 86 | 2d ea 54 cd b2 93 ab c7 50 69 39 27 67 72 f8 d5 | 02 1c 19 21 6b ad 52 5c 85 79 69 5d 83 ba 26 84 | decode_to_chunk: plaintext: : input "This is a 48-byte message (exactly 3 AES blocks)" | decode_to_chunk: output: | 54 68 69 73 20 69 73 20 61 20 34 38 2d 62 79 74 | 65 20 6d 65 73 73 61 67 65 20 28 65 78 61 63 74 | 6c 79 20 33 20 41 45 53 20 62 6c 6f 63 6b 73 29 | decode_to_chunk: ciphertext: : input "0xd0a02b3836451753d493665d33f0e8862dea54cdb293abc7506939276772f8d5021c19216bad525c8579695d83ba2684" | decode_to_chunk: output: | d0 a0 2b 38 36 45 17 53 d4 93 66 5d 33 f0 e8 86 | 2d ea 54 cd b2 93 ab c7 50 69 39 27 67 72 f8 d5 | 02 1c 19 21 6b ad 52 5c 85 79 69 5d 83 ba 26 84 | NSS ike_alg_nss_cbc: aes - enter | NSS ike_alg_nss_cbc: aes - exit | verify_chunk_data: encrypt: ok | verify_chunk_data: updated CBC IV: ok | decode_to_chunk: IV: : input "0xc782dc4c098c66cbd9cd27d825682c81" | decode_to_chunk: output: | c7 82 dc 4c 09 8c 66 cb d9 cd 27 d8 25 68 2c 81 | decode_to_chunk: new IV: : input "0xd0a02b3836451753d493665d33f0e8862dea54cdb293abc7506939276772f8d5021c19216bad525c8579695d83ba2684" | decode_to_chunk: output: | d0 a0 2b 38 36 45 17 53 d4 93 66 5d 33 f0 e8 86 | 2d ea 54 cd b2 93 ab c7 50 69 39 27 67 72 f8 d5 | 02 1c 19 21 6b ad 52 5c 85 79 69 5d 83 ba 26 84 | decode_to_chunk: cipertext: : input "0xd0a02b3836451753d493665d33f0e8862dea54cdb293abc7506939276772f8d5021c19216bad525c8579695d83ba2684" | decode_to_chunk: output: | d0 a0 2b 38 36 45 17 53 d4 93 66 5d 33 f0 e8 86 | 2d ea 54 cd b2 93 ab c7 50 69 39 27 67 72 f8 d5 | 02 1c 19 21 6b ad 52 5c 85 79 69 5d 83 ba 26 84 | decode_to_chunk: plaintext: : input "This is a 48-byte message (exactly 3 AES blocks)" | decode_to_chunk: output: | 54 68 69 73 20 69 73 20 61 20 34 38 2d 62 79 74 | 65 20 6d 65 73 73 61 67 65 20 28 65 78 61 63 74 | 6c 79 20 33 20 41 45 53 20 62 6c 6f 63 6b 73 29 | NSS ike_alg_nss_cbc: aes - enter | NSS ike_alg_nss_cbc: aes - exit | verify_chunk_data: decrypt: ok | verify_chunk_data: updated CBC IV: ok | test_cbc_vector: release sym_key-key@0x5570e4be4dc0 | test_ctr_vector: Encrypting 48 bytes (3 blocks) using AES-CBC with 128-bit key passed Encrypting 64 bytes (4 blocks) using AES-CBC with 128-bit key | decode_to_chunk: raw_key: input "0x56e47a38c5598974bc46903dba290349" | decode_to_chunk: output: | 56 e4 7a 38 c5 59 89 74 bc 46 90 3d ba 29 03 49 | : ephemeral-key@0x5570e4b65080 (16-bytes, AES_KEY_GEN) | CONCATENATE_DATA_AND_BASE: | target: EXTRACT_KEY_FROM_KEY | base: base-key@0x5570e4b65080 (16-bytes, AES_KEY_GEN) | params: 16-bytes@0x7ffe19a09670 | result: symkey-key@0x5570e4be6640 (32-bytes, EXTRACT_KEY_FROM_KEY) | key-offset: 0, key-size: 16 | EXTRACT_KEY_FROM_KEY: | target: AES_CBC | flags: ENCRYPT+DECRYPT | key_size: 16-bytes | base: base-key@0x5570e4be6640 (32-bytes, EXTRACT_KEY_FROM_KEY) | operation: FLAGS_ONLY | params: 8-bytes@0x7ffe19a09658 | result: symkey-key@0x5570e4be4dc0 (16-bytes, AES_CBC) | symkey: release tmp-key@0x5570e4be6640 | decode_to_chunk: IV: : input "0x8ce82eefbea0da3c44699ed7db51b7d9" | decode_to_chunk: output: | 8c e8 2e ef be a0 da 3c 44 69 9e d7 db 51 b7 d9 | decode_to_chunk: new IV: : input "0xc30e32ffedc0774e6aff6af0869f71aa0f3af07a9a31a9c684db207eb0ef8e4e35907aa632c3ffdf868bb7b29d3d46ad83ce9f9a102ee99d49a53e87f4c3da55" | decode_to_chunk: output: | c3 0e 32 ff ed c0 77 4e 6a ff 6a f0 86 9f 71 aa | 0f 3a f0 7a 9a 31 a9 c6 84 db 20 7e b0 ef 8e 4e | 35 90 7a a6 32 c3 ff df 86 8b b7 b2 9d 3d 46 ad | 83 ce 9f 9a 10 2e e9 9d 49 a5 3e 87 f4 c3 da 55 | decode_to_chunk: plaintext: : input "0xa0a1a2a3a4a5a6a7a8a9aaabacadaeafb0b1b2b3b4b5b6b7b8b9babbbcbdbebfc0c1c2c3c4c5c6c7c8c9cacbcccdcecfd0d1d2d3d4d5d6d7d8d9dadbdcdddedf" | decode_to_chunk: output: | a0 a1 a2 a3 a4 a5 a6 a7 a8 a9 aa ab ac ad ae af | b0 b1 b2 b3 b4 b5 b6 b7 b8 b9 ba bb bc bd be bf | c0 c1 c2 c3 c4 c5 c6 c7 c8 c9 ca cb cc cd ce cf | d0 d1 d2 d3 d4 d5 d6 d7 d8 d9 da db dc dd de df | decode_to_chunk: ciphertext: : input "0xc30e32ffedc0774e6aff6af0869f71aa0f3af07a9a31a9c684db207eb0ef8e4e35907aa632c3ffdf868bb7b29d3d46ad83ce9f9a102ee99d49a53e87f4c3da55" | decode_to_chunk: output: | c3 0e 32 ff ed c0 77 4e 6a ff 6a f0 86 9f 71 aa | 0f 3a f0 7a 9a 31 a9 c6 84 db 20 7e b0 ef 8e 4e | 35 90 7a a6 32 c3 ff df 86 8b b7 b2 9d 3d 46 ad | 83 ce 9f 9a 10 2e e9 9d 49 a5 3e 87 f4 c3 da 55 | NSS ike_alg_nss_cbc: aes - enter | NSS ike_alg_nss_cbc: aes - exit | verify_chunk_data: encrypt: ok | verify_chunk_data: updated CBC IV: ok | decode_to_chunk: IV: : input "0x8ce82eefbea0da3c44699ed7db51b7d9" | decode_to_chunk: output: | 8c e8 2e ef be a0 da 3c 44 69 9e d7 db 51 b7 d9 | decode_to_chunk: new IV: : input "0xc30e32ffedc0774e6aff6af0869f71aa0f3af07a9a31a9c684db207eb0ef8e4e35907aa632c3ffdf868bb7b29d3d46ad83ce9f9a102ee99d49a53e87f4c3da55" | decode_to_chunk: output: | c3 0e 32 ff ed c0 77 4e 6a ff 6a f0 86 9f 71 aa | 0f 3a f0 7a 9a 31 a9 c6 84 db 20 7e b0 ef 8e 4e | 35 90 7a a6 32 c3 ff df 86 8b b7 b2 9d 3d 46 ad | 83 ce 9f 9a 10 2e e9 9d 49 a5 3e 87 f4 c3 da 55 | decode_to_chunk: cipertext: : input "0xc30e32ffedc0774e6aff6af0869f71aa0f3af07a9a31a9c684db207eb0ef8e4e35907aa632c3ffdf868bb7b29d3d46ad83ce9f9a102ee99d49a53e87f4c3da55" | decode_to_chunk: output: | c3 0e 32 ff ed c0 77 4e 6a ff 6a f0 86 9f 71 aa | 0f 3a f0 7a 9a 31 a9 c6 84 db 20 7e b0 ef 8e 4e | 35 90 7a a6 32 c3 ff df 86 8b b7 b2 9d 3d 46 ad | 83 ce 9f 9a 10 2e e9 9d 49 a5 3e 87 f4 c3 da 55 | decode_to_chunk: plaintext: : input "0xa0a1a2a3a4a5a6a7a8a9aaabacadaeafb0b1b2b3b4b5b6b7b8b9babbbcbdbebfc0c1c2c3c4c5c6c7c8c9cacbcccdcecfd0d1d2d3d4d5d6d7d8d9dadbdcdddedf" | decode_to_chunk: output: | a0 a1 a2 a3 a4 a5 a6 a7 a8 a9 aa ab ac ad ae af | b0 b1 b2 b3 b4 b5 b6 b7 b8 b9 ba bb bc bd be bf | c0 c1 c2 c3 c4 c5 c6 c7 c8 c9 ca cb cc cd ce cf | d0 d1 d2 d3 d4 d5 d6 d7 d8 d9 da db dc dd de df | NSS ike_alg_nss_cbc: aes - enter | NSS ike_alg_nss_cbc: aes - exit | verify_chunk_data: decrypt: ok | verify_chunk_data: updated CBC IV: ok | test_cbc_vector: release sym_key-key@0x5570e4be4dc0 | test_ctr_vector: Encrypting 64 bytes (4 blocks) using AES-CBC with 128-bit key passed testing AES_XCBC: RFC 3566 Test Case #1: AES-XCBC-MAC-96 with 0-byte input | decode_to_chunk: test_prf_vector: input "0x000102030405060708090a0b0c0d0e0f" | decode_to_chunk: output: | 00 01 02 03 04 05 06 07 08 09 0a 0b 0c 0d 0e 0f | decode_to_chunk: test_prf_vector: input "" | decode_to_chunk: output: | | decode_to_chunk: test_prf_vector: input "0x75f0251d528ac01c4573dfd584d79f29" | decode_to_chunk: output: | 75 f0 25 1d 52 8a c0 1c 45 73 df d5 84 d7 9f 29 | PRF chunk interface PRF aes_xcbc init key-chunk@0x5570e4be8128 (length 16) | 00 01 02 03 04 05 06 07 08 09 0a 0b 0c 0d 0e 0f | : ephemeral-key@0x5570e4b65080 (16-bytes, AES_KEY_GEN) | CONCATENATE_DATA_AND_BASE: | target: EXTRACT_KEY_FROM_KEY | base: base-key@0x5570e4b65080 (16-bytes, AES_KEY_GEN) | params: 16-bytes@0x7ffe19a095f0 | result: key-key@0x5570e4be6640 (32-bytes, EXTRACT_KEY_FROM_KEY) | key-offset: 0, key-size: 16 | EXTRACT_KEY_FROM_KEY: | target: EXTRACT_KEY_FROM_KEY | key_size: 16-bytes | base: base-key@0x5570e4be6640 (32-bytes, EXTRACT_KEY_FROM_KEY) | operation: FLAGS_ONLY | params: 8-bytes@0x7ffe19a095d8 | result: key-key@0x5570e4be4dc0 (16-bytes, EXTRACT_KEY_FROM_KEY) | key: release tmp-key@0x5570e4be6640 | XCBC: Key 16=16 just right | key-offset: 0, key-size: 16 | EXTRACT_KEY_FROM_KEY: | target: AES_ECB | flags: SIGN | key_size: 16-bytes | base: base-key@0x5570e4be4dc0 (16-bytes, EXTRACT_KEY_FROM_KEY) | operation: FLAGS_ONLY | params: 8-bytes@0x7ffe19a095b8 | result: key-key@0x5570e4be6640 (16-bytes, AES_ECB) | PRF chunk interface: release clone-key@0x5570e4be4dc0 | PRF chunk interface PRF aes_xcbc crypt-prf@0x5570e4be35b8 | PRF chunk interface PRF aes_xcbc update message-bytes@0x5570e4be81d8 (length 0) | | XCBC: data | K extracting all 16 bytes of key@0x5570e4be6640 | K: symkey-key@0x5570e4be6640 (16-bytes, AES_ECB) | : ephemeral-key@0x5570e4b65080 (16-bytes, AES_KEY_GEN) | K: new slot-key@0x5570e4be8ee0 (16-bytes, AES_ECB) | sizeof bytes 16 | wrapper: (SECItemType)-464313456: 4e 1f 9a 69 f6 4d ed 6d ea d6 4e f0 90 30 8a 92 | K: release slot-key-key@0x5570e4be8ee0 | K extracted len 16 bytes at 0x5570e4be8ad8 | unwrapped: 00 01 02 03 04 05 06 07 08 09 0a 0b 0c 0d 0e 0f | XCBC: K: 00 01 02 03 04 05 06 07 08 09 0a 0b 0c 0d 0e 0f | XCBC: K1 c3 52 80 57 54 23 7f 31 1a c0 ff f4 e3 e0 3e 78 | : ephemeral-key@0x5570e4b65080 (16-bytes, AES_KEY_GEN) | CONCATENATE_DATA_AND_BASE: | target: EXTRACT_KEY_FROM_KEY | base: base-key@0x5570e4b65080 (16-bytes, AES_KEY_GEN) | params: 16-bytes@0x7ffe19a09550 | result: k1-key@0x5570e4be90c0 (32-bytes, EXTRACT_KEY_FROM_KEY) | key-offset: 0, key-size: 16 | EXTRACT_KEY_FROM_KEY: | target: AES_ECB | flags: SIGN | key_size: 16-bytes | base: base-key@0x5570e4be90c0 (32-bytes, EXTRACT_KEY_FROM_KEY) | operation: FLAGS_ONLY | params: 8-bytes@0x7ffe19a09538 | result: k1-key@0x5570e4be4dc0 (16-bytes, AES_ECB) | k1: release tmp-key@0x5570e4be90c0 | Computing E[0] using K3 | XCBC: K3 c1 a7 ab a1 a2 3a 94 06 58 07 a0 8c c8 ee d0 6e | XCBC: E[n-1] 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 | XCBC: M[n] | XCBC: M[n] | XCBC: M[n]:80...^E[n-1]^K3 | 41 a7 ab a1 a2 3a 94 06 58 07 a0 8c c8 ee d0 6e | XCBC: MAC 75 f0 25 1d 52 8a c0 1c 45 73 df d5 84 d7 9f 29 | xcbc: release k1-key@0x5570e4be4dc0 | PRF chunk interface: release key-key@0x5570e4be6640 | PRF chunk interface PRF aes_xcbc final-chunk@0x5570e4be87e8 (length 16) | 75 f0 25 1d 52 8a c0 1c 45 73 df d5 84 d7 9f 29 | chunk output 75 f0 25 1d 52 8a c0 1c 45 73 df d5 84 d7 9f 29 | verify_chunk_data: RFC 3566 Test Case #1: AES-XCBC-MAC-96 with 0-byte input: ok | : ephemeral-key@0x5570e4b65080 (16-bytes, AES_KEY_GEN) | CONCATENATE_DATA_AND_BASE: | target: EXTRACT_KEY_FROM_KEY | base: base-key@0x5570e4b65080 (16-bytes, AES_KEY_GEN) | params: 16-bytes@0x7ffe19a09660 | result: key symkey-key@0x5570e4be4dc0 (32-bytes, EXTRACT_KEY_FROM_KEY) | key-offset: 0, key-size: 16 | EXTRACT_KEY_FROM_KEY: | target: EXTRACT_KEY_FROM_KEY | key_size: 16-bytes | base: base-key@0x5570e4be4dc0 (32-bytes, EXTRACT_KEY_FROM_KEY) | operation: FLAGS_ONLY | params: 8-bytes@0x7ffe19a09648 | result: key symkey-key@0x5570e4be6640 (16-bytes, EXTRACT_KEY_FROM_KEY) | key symkey: release tmp-key@0x5570e4be4dc0 | PRF symkey interface PRF aes_xcbc init key symkey-key@0x5570e4be6640 (size 16) | PRF symkey interface: key symkey-key@0x5570e4be6640 (16-bytes, EXTRACT_KEY_FROM_KEY) | XCBC: Key 16=16 just right | key-offset: 0, key-size: 16 | EXTRACT_KEY_FROM_KEY: | target: AES_ECB | flags: SIGN | key_size: 16-bytes | base: base-key@0x5570e4be6640 (16-bytes, EXTRACT_KEY_FROM_KEY) | operation: FLAGS_ONLY | params: 8-bytes@0x7ffe19a095e8 | result: key symkey-key@0x5570e4be4dc0 (16-bytes, AES_ECB) | PRF symkey interface PRF aes_xcbc crypt-prf@0x5570e4be35b8 | PRF symkey interface PRF aes_xcbc update symkey message-key@(nil) (size 0) | PRF symkey interface: symkey message-key@NULL | symkey message NULL key has no bytes | XCBC: data | K extracting all 16 bytes of key@0x5570e4be4dc0 | K: symkey-key@0x5570e4be4dc0 (16-bytes, AES_ECB) | : ephemeral-key@0x5570e4b65080 (16-bytes, AES_KEY_GEN) | K: new slot-key@0x5570e4be8ee0 (16-bytes, AES_ECB) | sizeof bytes 16 | wrapper: (SECItemType)1023: 4e 1f 9a 69 f6 4d ed 6d ea d6 4e f0 90 30 8a 92 | K: release slot-key-key@0x5570e4be8ee0 | K extracted len 16 bytes at 0x5570e4be80e8 | unwrapped: 00 01 02 03 04 05 06 07 08 09 0a 0b 0c 0d 0e 0f | XCBC: K: 00 01 02 03 04 05 06 07 08 09 0a 0b 0c 0d 0e 0f | XCBC: K1 c3 52 80 57 54 23 7f 31 1a c0 ff f4 e3 e0 3e 78 | : ephemeral-key@0x5570e4b65080 (16-bytes, AES_KEY_GEN) | CONCATENATE_DATA_AND_BASE: | target: EXTRACT_KEY_FROM_KEY | base: base-key@0x5570e4b65080 (16-bytes, AES_KEY_GEN) | params: 16-bytes@0x7ffe19a09570 | result: k1-key@0x5570e4bea940 (32-bytes, EXTRACT_KEY_FROM_KEY) | key-offset: 0, key-size: 16 | EXTRACT_KEY_FROM_KEY: | target: AES_ECB | flags: SIGN | key_size: 16-bytes | base: base-key@0x5570e4bea940 (32-bytes, EXTRACT_KEY_FROM_KEY) | operation: FLAGS_ONLY | params: 8-bytes@0x7ffe19a09558 | result: k1-key@0x5570e4be90c0 (16-bytes, AES_ECB) | k1: release tmp-key@0x5570e4bea940 | Computing E[0] using K3 | XCBC: K3 c1 a7 ab a1 a2 3a 94 06 58 07 a0 8c c8 ee d0 6e | XCBC: E[n-1] 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 | XCBC: M[n] | XCBC: M[n] | XCBC: M[n]:80...^E[n-1]^K3 | 41 a7 ab a1 a2 3a 94 06 58 07 a0 8c c8 ee d0 6e | XCBC: MAC 75 f0 25 1d 52 8a c0 1c 45 73 df d5 84 d7 9f 29 | xcbc: release k1-key@0x5570e4be90c0 | : ephemeral-key@0x5570e4b65080 (16-bytes, AES_KEY_GEN) | CONCATENATE_DATA_AND_BASE: | target: EXTRACT_KEY_FROM_KEY | base: base-key@0x5570e4b65080 (16-bytes, AES_KEY_GEN) | params: 16-bytes@0x7ffe19a09600 | result: xcbc-key@0x5570e4bea940 (32-bytes, EXTRACT_KEY_FROM_KEY) | key-offset: 0, key-size: 16 | EXTRACT_KEY_FROM_KEY: | target: EXTRACT_KEY_FROM_KEY | key_size: 16-bytes | base: base-key@0x5570e4bea940 (32-bytes, EXTRACT_KEY_FROM_KEY) | operation: FLAGS_ONLY | params: 8-bytes@0x7ffe19a095e8 | result: xcbc-key@0x5570e4be90c0 (16-bytes, EXTRACT_KEY_FROM_KEY) | xcbc: release tmp-key@0x5570e4bea940 | PRF symkey interface: release key-key@0x5570e4be4dc0 | PRF symkey interface PRF aes_xcbc final-key@0x5570e4be90c0 (size 16) | PRF symkey interface: key-key@0x5570e4be90c0 (16-bytes, EXTRACT_KEY_FROM_KEY) | output: symkey-key@0x5570e4be90c0 (16-bytes, EXTRACT_KEY_FROM_KEY) | RFC 3566 Test Case #1: AES-XCBC-MAC-96 with 0-byte input extracting all 16 bytes of key@0x5570e4be90c0 | RFC 3566 Test Case #1: AES-XCBC-MAC-96 with 0-byte input: symkey-key@0x5570e4be90c0 (16-bytes, EXTRACT_KEY_FROM_KEY) | : ephemeral-key@0x5570e4b65080 (16-bytes, AES_KEY_GEN) | RFC 3566 Test Case #1: AES-XCBC-MAC-96 with 0-byte input: new slot-key@0x5570e4be8ee0 (16-bytes, EXTRACT_KEY_FROM_KEY) | sizeof bytes 16 | wrapper: (SECItemType)-464429206: 37 cf 70 73 a8 42 a1 81 69 b7 6a 9c 8c 2b 73 ef | RFC 3566 Test Case #1: AES-XCBC-MAC-96 with 0-byte input: release slot-key-key@0x5570e4be8ee0 | RFC 3566 Test Case #1: AES-XCBC-MAC-96 with 0-byte input extracted len 16 bytes at 0x5570e4be87a8 | unwrapped: 75 f0 25 1d 52 8a c0 1c 45 73 df d5 84 d7 9f 29 | verify_chunk_data: RFC 3566 Test Case #1: AES-XCBC-MAC-96 with 0-byte input: ok | test_prf_vector: RFC 3566 Test Case #1: AES-XCBC-MAC-96 with 0-byte input passed | test_prf_vector: release symkey-key@0x5570e4be90c0 | test_prf_vector: release message-key@NULL | test_prf_vector: release key-key@0x5570e4be6640 | test_prf_vector: release output-key@NULL RFC 3566 Test Case #2: AES-XCBC-MAC-96 with 3-byte input | decode_to_chunk: test_prf_vector: input "0x000102030405060708090a0b0c0d0e0f" | decode_to_chunk: output: | 00 01 02 03 04 05 06 07 08 09 0a 0b 0c 0d 0e 0f | decode_to_chunk: test_prf_vector: input "0x000102" | decode_to_chunk: output: | 00 01 02 | decode_to_chunk: test_prf_vector: input "0x5b376580ae2f19afe7219ceef172756f" | decode_to_chunk: output: | 5b 37 65 80 ae 2f 19 af e7 21 9c ee f1 72 75 6f | PRF chunk interface PRF aes_xcbc init key-chunk@0x5570e4be81d8 (length 16) | 00 01 02 03 04 05 06 07 08 09 0a 0b 0c 0d 0e 0f | : ephemeral-key@0x5570e4b65080 (16-bytes, AES_KEY_GEN) | CONCATENATE_DATA_AND_BASE: | target: EXTRACT_KEY_FROM_KEY | base: base-key@0x5570e4b65080 (16-bytes, AES_KEY_GEN) | params: 16-bytes@0x7ffe19a095f0 | result: key-key@0x5570e4be90c0 (32-bytes, EXTRACT_KEY_FROM_KEY) | key-offset: 0, key-size: 16 | EXTRACT_KEY_FROM_KEY: | target: EXTRACT_KEY_FROM_KEY | key_size: 16-bytes | base: base-key@0x5570e4be90c0 (32-bytes, EXTRACT_KEY_FROM_KEY) | operation: FLAGS_ONLY | params: 8-bytes@0x7ffe19a095d8 | result: key-key@0x5570e4be6640 (16-bytes, EXTRACT_KEY_FROM_KEY) | key: release tmp-key@0x5570e4be90c0 | XCBC: Key 16=16 just right | key-offset: 0, key-size: 16 | EXTRACT_KEY_FROM_KEY: | target: AES_ECB | flags: SIGN | key_size: 16-bytes | base: base-key@0x5570e4be6640 (16-bytes, EXTRACT_KEY_FROM_KEY) | operation: FLAGS_ONLY | params: 8-bytes@0x7ffe19a095b8 | result: key-key@0x5570e4be90c0 (16-bytes, AES_ECB) | PRF chunk interface: release clone-key@0x5570e4be6640 | PRF chunk interface PRF aes_xcbc crypt-prf@0x5570e4be35b8 | PRF chunk interface PRF aes_xcbc update message-bytes@0x5570e4be87a8 (length 3) | 00 01 02 | XCBC: data 00 01 02 | K extracting all 16 bytes of key@0x5570e4be90c0 | K: symkey-key@0x5570e4be90c0 (16-bytes, AES_ECB) | : ephemeral-key@0x5570e4b65080 (16-bytes, AES_KEY_GEN) | K: new slot-key@0x5570e4be8ee0 (16-bytes, AES_ECB) | sizeof bytes 16 | wrapper: (SECItemType)-464313456: 4e 1f 9a 69 f6 4d ed 6d ea d6 4e f0 90 30 8a 92 | K: release slot-key-key@0x5570e4be8ee0 | K extracted len 16 bytes at 0x5570e4be8bf8 | unwrapped: 00 01 02 03 04 05 06 07 08 09 0a 0b 0c 0d 0e 0f | XCBC: K: 00 01 02 03 04 05 06 07 08 09 0a 0b 0c 0d 0e 0f | XCBC: K1 c3 52 80 57 54 23 7f 31 1a c0 ff f4 e3 e0 3e 78 | : ephemeral-key@0x5570e4b65080 (16-bytes, AES_KEY_GEN) | CONCATENATE_DATA_AND_BASE: | target: EXTRACT_KEY_FROM_KEY | base: base-key@0x5570e4b65080 (16-bytes, AES_KEY_GEN) | params: 16-bytes@0x7ffe19a09550 | result: k1-key@0x5570e4be4dc0 (32-bytes, EXTRACT_KEY_FROM_KEY) | key-offset: 0, key-size: 16 | EXTRACT_KEY_FROM_KEY: | target: AES_ECB | flags: SIGN | key_size: 16-bytes | base: base-key@0x5570e4be4dc0 (32-bytes, EXTRACT_KEY_FROM_KEY) | operation: FLAGS_ONLY | params: 8-bytes@0x7ffe19a09538 | result: k1-key@0x5570e4be6640 (16-bytes, AES_ECB) | k1: release tmp-key@0x5570e4be4dc0 | Computing E[1] using K3 | XCBC: K3 c1 a7 ab a1 a2 3a 94 06 58 07 a0 8c c8 ee d0 6e | XCBC: E[n-1] 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 | XCBC: M[n] 00 01 02 | XCBC: M[n] 00 01 02 | XCBC: M[n]:80...^E[n-1]^K3 | c1 a6 a9 21 a2 3a 94 06 58 07 a0 8c c8 ee d0 6e | XCBC: MAC 5b 37 65 80 ae 2f 19 af e7 21 9c ee f1 72 75 6f | xcbc: release k1-key@0x5570e4be6640 | PRF chunk interface: release key-key@0x5570e4be90c0 | PRF chunk interface PRF aes_xcbc final-chunk@0x5570e4be8c98 (length 16) | 5b 37 65 80 ae 2f 19 af e7 21 9c ee f1 72 75 6f | chunk output 5b 37 65 80 ae 2f 19 af e7 21 9c ee f1 72 75 6f | verify_chunk_data: RFC 3566 Test Case #2: AES-XCBC-MAC-96 with 3-byte input: ok | : ephemeral-key@0x5570e4b65080 (16-bytes, AES_KEY_GEN) | CONCATENATE_DATA_AND_BASE: | target: EXTRACT_KEY_FROM_KEY | base: base-key@0x5570e4b65080 (16-bytes, AES_KEY_GEN) | params: 16-bytes@0x7ffe19a09660 | result: key symkey-key@0x5570e4be6640 (32-bytes, EXTRACT_KEY_FROM_KEY) | key-offset: 0, key-size: 16 | EXTRACT_KEY_FROM_KEY: | target: EXTRACT_KEY_FROM_KEY | key_size: 16-bytes | base: base-key@0x5570e4be6640 (32-bytes, EXTRACT_KEY_FROM_KEY) | operation: FLAGS_ONLY | params: 8-bytes@0x7ffe19a09648 | result: key symkey-key@0x5570e4be90c0 (16-bytes, EXTRACT_KEY_FROM_KEY) | key symkey: release tmp-key@0x5570e4be6640 | PRF symkey interface PRF aes_xcbc init key symkey-key@0x5570e4be90c0 (size 16) | PRF symkey interface: key symkey-key@0x5570e4be90c0 (16-bytes, EXTRACT_KEY_FROM_KEY) | XCBC: Key 16=16 just right | key-offset: 0, key-size: 16 | EXTRACT_KEY_FROM_KEY: | target: AES_ECB | flags: SIGN | key_size: 16-bytes | base: base-key@0x5570e4be90c0 (16-bytes, EXTRACT_KEY_FROM_KEY) | operation: FLAGS_ONLY | params: 8-bytes@0x7ffe19a095e8 | result: key symkey-key@0x5570e4be6640 (16-bytes, AES_ECB) | PRF symkey interface PRF aes_xcbc crypt-prf@0x5570e4be35b8 | : ephemeral-key@0x5570e4b65080 (16-bytes, AES_KEY_GEN) | CONCATENATE_DATA_AND_BASE: | target: EXTRACT_KEY_FROM_KEY | base: base-key@0x5570e4b65080 (16-bytes, AES_KEY_GEN) | params: 16-bytes@0x7ffe19a09660 | result: message symkey-key@0x5570e4bea940 (19-bytes, EXTRACT_KEY_FROM_KEY) | key-offset: 0, key-size: 3 | EXTRACT_KEY_FROM_KEY: | target: EXTRACT_KEY_FROM_KEY | key_size: 3-bytes | base: base-key@0x5570e4bea940 (19-bytes, EXTRACT_KEY_FROM_KEY) | operation: FLAGS_ONLY | params: 8-bytes@0x7ffe19a09648 | result: message symkey-key@0x5570e4be4dc0 (3-bytes, EXTRACT_KEY_FROM_KEY) | message symkey: release tmp-key@0x5570e4bea940 | PRF symkey interface PRF aes_xcbc update symkey message-key@0x5570e4be4dc0 (size 3) | PRF symkey interface: symkey message-key@0x5570e4be4dc0 (3-bytes, EXTRACT_KEY_FROM_KEY) | symkey message extracting all 3 bytes of key@0x5570e4be4dc0 | symkey message: symkey-key@0x5570e4be4dc0 (3-bytes, EXTRACT_KEY_FROM_KEY) | : ephemeral-key@0x5570e4b65080 (16-bytes, AES_KEY_GEN) | symkey message: new slot-key@0x5570e4be8ee0 (3-bytes, EXTRACT_KEY_FROM_KEY) | sizeof bytes 16 | wrapper: (SECItemType)-464429152: 09 a1 fc a8 bc ce 3a 93 ed 60 77 8b 15 64 98 42 | symkey message: release slot-key-key@0x5570e4be8ee0 | symkey message extracted len 16 bytes at 0x5570e4be80e8 | unwrapped: 00 01 02 00 00 00 00 00 00 00 00 00 00 00 00 00 | XCBC: data 00 01 02 | K extracting all 16 bytes of key@0x5570e4be6640 | K: symkey-key@0x5570e4be6640 (16-bytes, AES_ECB) | : ephemeral-key@0x5570e4b65080 (16-bytes, AES_KEY_GEN) | K: new slot-key@0x5570e4be8ee0 (16-bytes, AES_ECB) | sizeof bytes 16 | wrapper: (SECItemType)1920429685: 4e 1f 9a 69 f6 4d ed 6d ea d6 4e f0 90 30 8a 92 | K: release slot-key-key@0x5570e4be8ee0 | K extracted len 16 bytes at 0x5570e4be8ad8 | unwrapped: 00 01 02 03 04 05 06 07 08 09 0a 0b 0c 0d 0e 0f | XCBC: K: 00 01 02 03 04 05 06 07 08 09 0a 0b 0c 0d 0e 0f | XCBC: K1 c3 52 80 57 54 23 7f 31 1a c0 ff f4 e3 e0 3e 78 | : ephemeral-key@0x5570e4b65080 (16-bytes, AES_KEY_GEN) | CONCATENATE_DATA_AND_BASE: | target: EXTRACT_KEY_FROM_KEY | base: base-key@0x5570e4b65080 (16-bytes, AES_KEY_GEN) | params: 16-bytes@0x7ffe19a09570 | result: k1-key@0x5570e4bec1c0 (32-bytes, EXTRACT_KEY_FROM_KEY) | key-offset: 0, key-size: 16 | EXTRACT_KEY_FROM_KEY: | target: AES_ECB | flags: SIGN | key_size: 16-bytes | base: base-key@0x5570e4bec1c0 (32-bytes, EXTRACT_KEY_FROM_KEY) | operation: FLAGS_ONLY | params: 8-bytes@0x7ffe19a09558 | result: k1-key@0x5570e4bea940 (16-bytes, AES_ECB) | k1: release tmp-key@0x5570e4bec1c0 | Computing E[1] using K3 | XCBC: K3 c1 a7 ab a1 a2 3a 94 06 58 07 a0 8c c8 ee d0 6e | XCBC: E[n-1] 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 | XCBC: M[n] 00 01 02 | XCBC: M[n] 00 01 02 | XCBC: M[n]:80...^E[n-1]^K3 | c1 a6 a9 21 a2 3a 94 06 58 07 a0 8c c8 ee d0 6e | XCBC: MAC 5b 37 65 80 ae 2f 19 af e7 21 9c ee f1 72 75 6f | xcbc: release k1-key@0x5570e4bea940 | : ephemeral-key@0x5570e4b65080 (16-bytes, AES_KEY_GEN) | CONCATENATE_DATA_AND_BASE: | target: EXTRACT_KEY_FROM_KEY | base: base-key@0x5570e4b65080 (16-bytes, AES_KEY_GEN) | params: 16-bytes@0x7ffe19a09600 | result: xcbc-key@0x5570e4bec1c0 (32-bytes, EXTRACT_KEY_FROM_KEY) | key-offset: 0, key-size: 16 | EXTRACT_KEY_FROM_KEY: | target: EXTRACT_KEY_FROM_KEY | key_size: 16-bytes | base: base-key@0x5570e4bec1c0 (32-bytes, EXTRACT_KEY_FROM_KEY) | operation: FLAGS_ONLY | params: 8-bytes@0x7ffe19a095e8 | result: xcbc-key@0x5570e4bea940 (16-bytes, EXTRACT_KEY_FROM_KEY) | xcbc: release tmp-key@0x5570e4bec1c0 | PRF symkey interface: release key-key@0x5570e4be6640 | PRF symkey interface PRF aes_xcbc final-key@0x5570e4bea940 (size 16) | PRF symkey interface: key-key@0x5570e4bea940 (16-bytes, EXTRACT_KEY_FROM_KEY) | output: symkey-key@0x5570e4bea940 (16-bytes, EXTRACT_KEY_FROM_KEY) | RFC 3566 Test Case #2: AES-XCBC-MAC-96 with 3-byte input extracting all 16 bytes of key@0x5570e4bea940 | RFC 3566 Test Case #2: AES-XCBC-MAC-96 with 3-byte input: symkey-key@0x5570e4bea940 (16-bytes, EXTRACT_KEY_FROM_KEY) | : ephemeral-key@0x5570e4b65080 (16-bytes, AES_KEY_GEN) | RFC 3566 Test Case #2: AES-XCBC-MAC-96 with 3-byte input: new slot-key@0x5570e4be8ee0 (16-bytes, EXTRACT_KEY_FROM_KEY) | sizeof bytes 16 | wrapper: (SECItemType)-464429206: ed 37 80 10 d1 31 40 a4 b9 66 a6 31 e1 8a 1b 64 | RFC 3566 Test Case #2: AES-XCBC-MAC-96 with 3-byte input: release slot-key-key@0x5570e4be8ee0 | RFC 3566 Test Case #2: AES-XCBC-MAC-96 with 3-byte input extracted len 16 bytes at 0x5570e4be80e8 | unwrapped: 5b 37 65 80 ae 2f 19 af e7 21 9c ee f1 72 75 6f | verify_chunk_data: RFC 3566 Test Case #2: AES-XCBC-MAC-96 with 3-byte input: ok | test_prf_vector: RFC 3566 Test Case #2: AES-XCBC-MAC-96 with 3-byte input passed | test_prf_vector: release symkey-key@0x5570e4bea940 | test_prf_vector: release message-key@0x5570e4be4dc0 | test_prf_vector: release key-key@0x5570e4be90c0 | test_prf_vector: release output-key@NULL RFC 3566 Test Case #3: AES-XCBC-MAC-96 with 16-byte input | decode_to_chunk: test_prf_vector: input "0x000102030405060708090a0b0c0d0e0f" | decode_to_chunk: output: | 00 01 02 03 04 05 06 07 08 09 0a 0b 0c 0d 0e 0f | decode_to_chunk: test_prf_vector: input "0x000102030405060708090a0b0c0d0e0f" | decode_to_chunk: output: | 00 01 02 03 04 05 06 07 08 09 0a 0b 0c 0d 0e 0f | decode_to_chunk: test_prf_vector: input "0xd2a246fa349b68a79998a4394ff7a263" | decode_to_chunk: output: | d2 a2 46 fa 34 9b 68 a7 99 98 a4 39 4f f7 a2 63 | PRF chunk interface PRF aes_xcbc init key-chunk@0x5570e4be87a8 (length 16) | 00 01 02 03 04 05 06 07 08 09 0a 0b 0c 0d 0e 0f | : ephemeral-key@0x5570e4b65080 (16-bytes, AES_KEY_GEN) | CONCATENATE_DATA_AND_BASE: | target: EXTRACT_KEY_FROM_KEY | base: base-key@0x5570e4b65080 (16-bytes, AES_KEY_GEN) | params: 16-bytes@0x7ffe19a095f0 | result: key-key@0x5570e4be4dc0 (32-bytes, EXTRACT_KEY_FROM_KEY) | key-offset: 0, key-size: 16 | EXTRACT_KEY_FROM_KEY: | target: EXTRACT_KEY_FROM_KEY | key_size: 16-bytes | base: base-key@0x5570e4be4dc0 (32-bytes, EXTRACT_KEY_FROM_KEY) | operation: FLAGS_ONLY | params: 8-bytes@0x7ffe19a095d8 | result: key-key@0x5570e4be90c0 (16-bytes, EXTRACT_KEY_FROM_KEY) | key: release tmp-key@0x5570e4be4dc0 | XCBC: Key 16=16 just right | key-offset: 0, key-size: 16 | EXTRACT_KEY_FROM_KEY: | target: AES_ECB | flags: SIGN | key_size: 16-bytes | base: base-key@0x5570e4be90c0 (16-bytes, EXTRACT_KEY_FROM_KEY) | operation: FLAGS_ONLY | params: 8-bytes@0x7ffe19a095b8 | result: key-key@0x5570e4be4dc0 (16-bytes, AES_ECB) | PRF chunk interface: release clone-key@0x5570e4be90c0 | PRF chunk interface PRF aes_xcbc crypt-prf@0x5570e4be35b8 | PRF chunk interface PRF aes_xcbc update message-bytes@0x5570e4be80e8 (length 16) | 00 01 02 03 04 05 06 07 08 09 0a 0b 0c 0d 0e 0f | XCBC: data 00 01 02 03 04 05 06 07 08 09 0a 0b 0c 0d 0e 0f | K extracting all 16 bytes of key@0x5570e4be4dc0 | K: symkey-key@0x5570e4be4dc0 (16-bytes, AES_ECB) | : ephemeral-key@0x5570e4b65080 (16-bytes, AES_KEY_GEN) | K: new slot-key@0x5570e4be8ee0 (16-bytes, AES_ECB) | sizeof bytes 16 | wrapper: (SECItemType)540618784: 4e 1f 9a 69 f6 4d ed 6d ea d6 4e f0 90 30 8a 92 | K: release slot-key-key@0x5570e4be8ee0 | K extracted len 16 bytes at 0x5570e4be8218 | unwrapped: 00 01 02 03 04 05 06 07 08 09 0a 0b 0c 0d 0e 0f | XCBC: K: 00 01 02 03 04 05 06 07 08 09 0a 0b 0c 0d 0e 0f | XCBC: K1 c3 52 80 57 54 23 7f 31 1a c0 ff f4 e3 e0 3e 78 | : ephemeral-key@0x5570e4b65080 (16-bytes, AES_KEY_GEN) | CONCATENATE_DATA_AND_BASE: | target: EXTRACT_KEY_FROM_KEY | base: base-key@0x5570e4b65080 (16-bytes, AES_KEY_GEN) | params: 16-bytes@0x7ffe19a09550 | result: k1-key@0x5570e4bea940 (32-bytes, EXTRACT_KEY_FROM_KEY) | key-offset: 0, key-size: 16 | EXTRACT_KEY_FROM_KEY: | target: AES_ECB | flags: SIGN | key_size: 16-bytes | base: base-key@0x5570e4bea940 (32-bytes, EXTRACT_KEY_FROM_KEY) | operation: FLAGS_ONLY | params: 8-bytes@0x7ffe19a09538 | result: k1-key@0x5570e4be90c0 (16-bytes, AES_ECB) | k1: release tmp-key@0x5570e4bea940 | XCBC: Computing E[1] using K2 | XCBC: K2 bd 86 2f fb 97 ad 2f b8 f8 b8 91 f6 03 2f 36 cb | XCBC: E[n-1] 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 | XCBC: M[n] 00 01 02 03 04 05 06 07 08 09 0a 0b 0c 0d 0e 0f | XCBC: M[n]^E[n-1]^K2 | bd 87 2d f8 93 a8 29 bf f0 b1 9b fd 0f 22 38 c4 | XCBC: MAC d2 a2 46 fa 34 9b 68 a7 99 98 a4 39 4f f7 a2 63 | xcbc: release k1-key@0x5570e4be90c0 | PRF chunk interface: release key-key@0x5570e4be4dc0 | PRF chunk interface PRF aes_xcbc final-chunk@0x5570e4be8128 (length 16) | d2 a2 46 fa 34 9b 68 a7 99 98 a4 39 4f f7 a2 63 | chunk output d2 a2 46 fa 34 9b 68 a7 99 98 a4 39 4f f7 a2 63 | verify_chunk_data: RFC 3566 Test Case #3: AES-XCBC-MAC-96 with 16-byte input: ok | : ephemeral-key@0x5570e4b65080 (16-bytes, AES_KEY_GEN) | CONCATENATE_DATA_AND_BASE: | target: EXTRACT_KEY_FROM_KEY | base: base-key@0x5570e4b65080 (16-bytes, AES_KEY_GEN) | params: 16-bytes@0x7ffe19a09660 | result: key symkey-key@0x5570e4be90c0 (32-bytes, EXTRACT_KEY_FROM_KEY) | key-offset: 0, key-size: 16 | EXTRACT_KEY_FROM_KEY: | target: EXTRACT_KEY_FROM_KEY | key_size: 16-bytes | base: base-key@0x5570e4be90c0 (32-bytes, EXTRACT_KEY_FROM_KEY) | operation: FLAGS_ONLY | params: 8-bytes@0x7ffe19a09648 | result: key symkey-key@0x5570e4be4dc0 (16-bytes, EXTRACT_KEY_FROM_KEY) | key symkey: release tmp-key@0x5570e4be90c0 | PRF symkey interface PRF aes_xcbc init key symkey-key@0x5570e4be4dc0 (size 16) | PRF symkey interface: key symkey-key@0x5570e4be4dc0 (16-bytes, EXTRACT_KEY_FROM_KEY) | XCBC: Key 16=16 just right | key-offset: 0, key-size: 16 | EXTRACT_KEY_FROM_KEY: | target: AES_ECB | flags: SIGN | key_size: 16-bytes | base: base-key@0x5570e4be4dc0 (16-bytes, EXTRACT_KEY_FROM_KEY) | operation: FLAGS_ONLY | params: 8-bytes@0x7ffe19a095e8 | result: key symkey-key@0x5570e4be90c0 (16-bytes, AES_ECB) | PRF symkey interface PRF aes_xcbc crypt-prf@0x5570e4be35b8 | : ephemeral-key@0x5570e4b65080 (16-bytes, AES_KEY_GEN) | CONCATENATE_DATA_AND_BASE: | target: EXTRACT_KEY_FROM_KEY | base: base-key@0x5570e4b65080 (16-bytes, AES_KEY_GEN) | params: 16-bytes@0x7ffe19a09660 | result: message symkey-key@0x5570e4be6640 (32-bytes, EXTRACT_KEY_FROM_KEY) | key-offset: 0, key-size: 16 | EXTRACT_KEY_FROM_KEY: | target: EXTRACT_KEY_FROM_KEY | key_size: 16-bytes | base: base-key@0x5570e4be6640 (32-bytes, EXTRACT_KEY_FROM_KEY) | operation: FLAGS_ONLY | params: 8-bytes@0x7ffe19a09648 | result: message symkey-key@0x5570e4bea940 (16-bytes, EXTRACT_KEY_FROM_KEY) | message symkey: release tmp-key@0x5570e4be6640 | PRF symkey interface PRF aes_xcbc update symkey message-key@0x5570e4bea940 (size 16) | PRF symkey interface: symkey message-key@0x5570e4bea940 (16-bytes, EXTRACT_KEY_FROM_KEY) | symkey message extracting all 16 bytes of key@0x5570e4bea940 | symkey message: symkey-key@0x5570e4bea940 (16-bytes, EXTRACT_KEY_FROM_KEY) | : ephemeral-key@0x5570e4b65080 (16-bytes, AES_KEY_GEN) | symkey message: new slot-key@0x5570e4be8ee0 (16-bytes, EXTRACT_KEY_FROM_KEY) | sizeof bytes 16 | wrapper: (SECItemType)-464429152: 4e 1f 9a 69 f6 4d ed 6d ea d6 4e f0 90 30 8a 92 | symkey message: release slot-key-key@0x5570e4be8ee0 | symkey message extracted len 16 bytes at 0x5570e4be8ad8 | unwrapped: 00 01 02 03 04 05 06 07 08 09 0a 0b 0c 0d 0e 0f | XCBC: data 00 01 02 03 04 05 06 07 08 09 0a 0b 0c 0d 0e 0f | K extracting all 16 bytes of key@0x5570e4be90c0 | K: symkey-key@0x5570e4be90c0 (16-bytes, AES_ECB) | : ephemeral-key@0x5570e4b65080 (16-bytes, AES_KEY_GEN) | K: new slot-key@0x5570e4be8ee0 (16-bytes, AES_ECB) | sizeof bytes 16 | wrapper: (SECItemType)1920429685: 4e 1f 9a 69 f6 4d ed 6d ea d6 4e f0 90 30 8a 92 | K: release slot-key-key@0x5570e4be8ee0 | K extracted len 16 bytes at 0x5570e4be8bf8 | unwrapped: 00 01 02 03 04 05 06 07 08 09 0a 0b 0c 0d 0e 0f | XCBC: K: 00 01 02 03 04 05 06 07 08 09 0a 0b 0c 0d 0e 0f | XCBC: K1 c3 52 80 57 54 23 7f 31 1a c0 ff f4 e3 e0 3e 78 | : ephemeral-key@0x5570e4b65080 (16-bytes, AES_KEY_GEN) | CONCATENATE_DATA_AND_BASE: | target: EXTRACT_KEY_FROM_KEY | base: base-key@0x5570e4b65080 (16-bytes, AES_KEY_GEN) | params: 16-bytes@0x7ffe19a09570 | result: k1-key@0x5570e4bec1c0 (32-bytes, EXTRACT_KEY_FROM_KEY) | key-offset: 0, key-size: 16 | EXTRACT_KEY_FROM_KEY: | target: AES_ECB | flags: SIGN | key_size: 16-bytes | base: base-key@0x5570e4bec1c0 (32-bytes, EXTRACT_KEY_FROM_KEY) | operation: FLAGS_ONLY | params: 8-bytes@0x7ffe19a09558 | result: k1-key@0x5570e4be6640 (16-bytes, AES_ECB) | k1: release tmp-key@0x5570e4bec1c0 | XCBC: Computing E[1] using K2 | XCBC: K2 bd 86 2f fb 97 ad 2f b8 f8 b8 91 f6 03 2f 36 cb | XCBC: E[n-1] 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 | XCBC: M[n] 00 01 02 03 04 05 06 07 08 09 0a 0b 0c 0d 0e 0f | XCBC: M[n]^E[n-1]^K2 | bd 87 2d f8 93 a8 29 bf f0 b1 9b fd 0f 22 38 c4 | XCBC: MAC d2 a2 46 fa 34 9b 68 a7 99 98 a4 39 4f f7 a2 63 | xcbc: release k1-key@0x5570e4be6640 | : ephemeral-key@0x5570e4b65080 (16-bytes, AES_KEY_GEN) | CONCATENATE_DATA_AND_BASE: | target: EXTRACT_KEY_FROM_KEY | base: base-key@0x5570e4b65080 (16-bytes, AES_KEY_GEN) | params: 16-bytes@0x7ffe19a09600 | result: xcbc-key@0x5570e4bec1c0 (32-bytes, EXTRACT_KEY_FROM_KEY) | key-offset: 0, key-size: 16 | EXTRACT_KEY_FROM_KEY: | target: EXTRACT_KEY_FROM_KEY | key_size: 16-bytes | base: base-key@0x5570e4bec1c0 (32-bytes, EXTRACT_KEY_FROM_KEY) | operation: FLAGS_ONLY | params: 8-bytes@0x7ffe19a095e8 | result: xcbc-key@0x5570e4be6640 (16-bytes, EXTRACT_KEY_FROM_KEY) | xcbc: release tmp-key@0x5570e4bec1c0 | PRF symkey interface: release key-key@0x5570e4be90c0 | PRF symkey interface PRF aes_xcbc final-key@0x5570e4be6640 (size 16) | PRF symkey interface: key-key@0x5570e4be6640 (16-bytes, EXTRACT_KEY_FROM_KEY) | output: symkey-key@0x5570e4be6640 (16-bytes, EXTRACT_KEY_FROM_KEY) | RFC 3566 Test Case #3: AES-XCBC-MAC-96 with 16-byte input extracting all 16 bytes of key@0x5570e4be6640 | RFC 3566 Test Case #3: AES-XCBC-MAC-96 with 16-byte input: symkey-key@0x5570e4be6640 (16-bytes, EXTRACT_KEY_FROM_KEY) | : ephemeral-key@0x5570e4b65080 (16-bytes, AES_KEY_GEN) | RFC 3566 Test Case #3: AES-XCBC-MAC-96 with 16-byte input: new slot-key@0x5570e4be8ee0 (16-bytes, EXTRACT_KEY_FROM_KEY) | sizeof bytes 16 | wrapper: (SECItemType)-464429206: 56 b5 bf f8 51 7d 52 85 64 34 42 57 d8 cd 80 71 | RFC 3566 Test Case #3: AES-XCBC-MAC-96 with 16-byte input: release slot-key-key@0x5570e4be8ee0 | RFC 3566 Test Case #3: AES-XCBC-MAC-96 with 16-byte input extracted len 16 bytes at 0x5570e4be8ad8 | unwrapped: d2 a2 46 fa 34 9b 68 a7 99 98 a4 39 4f f7 a2 63 | verify_chunk_data: RFC 3566 Test Case #3: AES-XCBC-MAC-96 with 16-byte input: ok | test_prf_vector: RFC 3566 Test Case #3: AES-XCBC-MAC-96 with 16-byte input passed | test_prf_vector: release symkey-key@0x5570e4be6640 | test_prf_vector: release message-key@0x5570e4bea940 | test_prf_vector: release key-key@0x5570e4be4dc0 | test_prf_vector: release output-key@NULL RFC 3566 Test Case #4: AES-XCBC-MAC-96 with 20-byte input | decode_to_chunk: test_prf_vector: input "0x000102030405060708090a0b0c0d0e0f" | decode_to_chunk: output: | 00 01 02 03 04 05 06 07 08 09 0a 0b 0c 0d 0e 0f | decode_to_chunk: test_prf_vector: input "0x000102030405060708090a0b0c0d0e0f10111213" | decode_to_chunk: output: | 00 01 02 03 04 05 06 07 08 09 0a 0b 0c 0d 0e 0f | 10 11 12 13 | decode_to_chunk: test_prf_vector: input "0x47f51b4564966215b8985c63055ed308" | decode_to_chunk: output: | 47 f5 1b 45 64 96 62 15 b8 98 5c 63 05 5e d3 08 | PRF chunk interface PRF aes_xcbc init key-chunk@0x5570e4be80e8 (length 16) | 00 01 02 03 04 05 06 07 08 09 0a 0b 0c 0d 0e 0f | : ephemeral-key@0x5570e4b65080 (16-bytes, AES_KEY_GEN) | CONCATENATE_DATA_AND_BASE: | target: EXTRACT_KEY_FROM_KEY | base: base-key@0x5570e4b65080 (16-bytes, AES_KEY_GEN) | params: 16-bytes@0x7ffe19a095f0 | result: key-key@0x5570e4bea940 (32-bytes, EXTRACT_KEY_FROM_KEY) | key-offset: 0, key-size: 16 | EXTRACT_KEY_FROM_KEY: | target: EXTRACT_KEY_FROM_KEY | key_size: 16-bytes | base: base-key@0x5570e4bea940 (32-bytes, EXTRACT_KEY_FROM_KEY) | operation: FLAGS_ONLY | params: 8-bytes@0x7ffe19a095d8 | result: key-key@0x5570e4be4dc0 (16-bytes, EXTRACT_KEY_FROM_KEY) | key: release tmp-key@0x5570e4bea940 | XCBC: Key 16=16 just right | key-offset: 0, key-size: 16 | EXTRACT_KEY_FROM_KEY: | target: AES_ECB | flags: SIGN | key_size: 16-bytes | base: base-key@0x5570e4be4dc0 (16-bytes, EXTRACT_KEY_FROM_KEY) | operation: FLAGS_ONLY | params: 8-bytes@0x7ffe19a095b8 | result: key-key@0x5570e4bea940 (16-bytes, AES_ECB) | PRF chunk interface: release clone-key@0x5570e4be4dc0 | PRF chunk interface PRF aes_xcbc crypt-prf@0x5570e4be7ee8 | PRF chunk interface PRF aes_xcbc update message-bytes@0x5570e4be35b8 (length 20) | 00 01 02 03 04 05 06 07 08 09 0a 0b 0c 0d 0e 0f | 10 11 12 13 | XCBC: data 00 01 02 03 04 05 06 07 08 09 0a 0b 0c 0d 0e 0f | XCBC: data 10 11 12 13 | K extracting all 16 bytes of key@0x5570e4bea940 | K: symkey-key@0x5570e4bea940 (16-bytes, AES_ECB) | : ephemeral-key@0x5570e4b65080 (16-bytes, AES_KEY_GEN) | K: new slot-key@0x5570e4be8ee0 (16-bytes, AES_ECB) | sizeof bytes 16 | wrapper: (SECItemType)540618784: 4e 1f 9a 69 f6 4d ed 6d ea d6 4e f0 90 30 8a 92 | K: release slot-key-key@0x5570e4be8ee0 | K extracted len 16 bytes at 0x5570e4be81d8 | unwrapped: 00 01 02 03 04 05 06 07 08 09 0a 0b 0c 0d 0e 0f | XCBC: K: 00 01 02 03 04 05 06 07 08 09 0a 0b 0c 0d 0e 0f | XCBC: K1 c3 52 80 57 54 23 7f 31 1a c0 ff f4 e3 e0 3e 78 | : ephemeral-key@0x5570e4b65080 (16-bytes, AES_KEY_GEN) | CONCATENATE_DATA_AND_BASE: | target: EXTRACT_KEY_FROM_KEY | base: base-key@0x5570e4b65080 (16-bytes, AES_KEY_GEN) | params: 16-bytes@0x7ffe19a09550 | result: k1-key@0x5570e4be6640 (32-bytes, EXTRACT_KEY_FROM_KEY) | key-offset: 0, key-size: 16 | EXTRACT_KEY_FROM_KEY: | target: AES_ECB | flags: SIGN | key_size: 16-bytes | base: base-key@0x5570e4be6640 (32-bytes, EXTRACT_KEY_FROM_KEY) | operation: FLAGS_ONLY | params: 8-bytes@0x7ffe19a09538 | result: k1-key@0x5570e4be4dc0 (16-bytes, AES_ECB) | k1: release tmp-key@0x5570e4be6640 | Computing E[2] using K3 | XCBC: K3 c1 a7 ab a1 a2 3a 94 06 58 07 a0 8c c8 ee d0 6e | XCBC: E[n-1] 1d 04 48 fa cf 4d 9c 6f 55 b9 93 da 09 80 3d b3 | XCBC: M[n] 10 11 12 13 | XCBC: M[n] 10 11 12 13 | XCBC: M[n]:80...^E[n-1]^K3 | cc b2 f1 48 ed 77 08 69 0d be 33 56 c1 6e ed dd | XCBC: MAC 47 f5 1b 45 64 96 62 15 b8 98 5c 63 05 5e d3 08 | xcbc: release k1-key@0x5570e4be4dc0 | PRF chunk interface: release key-key@0x5570e4bea940 | PRF chunk interface PRF aes_xcbc final-chunk@0x5570e4be8128 (length 16) | 47 f5 1b 45 64 96 62 15 b8 98 5c 63 05 5e d3 08 | chunk output 47 f5 1b 45 64 96 62 15 b8 98 5c 63 05 5e d3 08 | verify_chunk_data: RFC 3566 Test Case #4: AES-XCBC-MAC-96 with 20-byte input: ok | : ephemeral-key@0x5570e4b65080 (16-bytes, AES_KEY_GEN) | CONCATENATE_DATA_AND_BASE: | target: EXTRACT_KEY_FROM_KEY | base: base-key@0x5570e4b65080 (16-bytes, AES_KEY_GEN) | params: 16-bytes@0x7ffe19a09660 | result: key symkey-key@0x5570e4be4dc0 (32-bytes, EXTRACT_KEY_FROM_KEY) | key-offset: 0, key-size: 16 | EXTRACT_KEY_FROM_KEY: | target: EXTRACT_KEY_FROM_KEY | key_size: 16-bytes | base: base-key@0x5570e4be4dc0 (32-bytes, EXTRACT_KEY_FROM_KEY) | operation: FLAGS_ONLY | params: 8-bytes@0x7ffe19a09648 | result: key symkey-key@0x5570e4bea940 (16-bytes, EXTRACT_KEY_FROM_KEY) | key symkey: release tmp-key@0x5570e4be4dc0 | PRF symkey interface PRF aes_xcbc init key symkey-key@0x5570e4bea940 (size 16) | PRF symkey interface: key symkey-key@0x5570e4bea940 (16-bytes, EXTRACT_KEY_FROM_KEY) | XCBC: Key 16=16 just right | key-offset: 0, key-size: 16 | EXTRACT_KEY_FROM_KEY: | target: AES_ECB | flags: SIGN | key_size: 16-bytes | base: base-key@0x5570e4bea940 (16-bytes, EXTRACT_KEY_FROM_KEY) | operation: FLAGS_ONLY | params: 8-bytes@0x7ffe19a095e8 | result: key symkey-key@0x5570e4be4dc0 (16-bytes, AES_ECB) | PRF symkey interface PRF aes_xcbc crypt-prf@0x5570e4be7ee8 | : ephemeral-key@0x5570e4b65080 (16-bytes, AES_KEY_GEN) | CONCATENATE_DATA_AND_BASE: | target: EXTRACT_KEY_FROM_KEY | base: base-key@0x5570e4b65080 (16-bytes, AES_KEY_GEN) | params: 16-bytes@0x7ffe19a09660 | result: message symkey-key@0x5570e4be90c0 (36-bytes, EXTRACT_KEY_FROM_KEY) | key-offset: 0, key-size: 20 | EXTRACT_KEY_FROM_KEY: | target: EXTRACT_KEY_FROM_KEY | key_size: 20-bytes | base: base-key@0x5570e4be90c0 (36-bytes, EXTRACT_KEY_FROM_KEY) | operation: FLAGS_ONLY | params: 8-bytes@0x7ffe19a09648 | result: message symkey-key@0x5570e4be6640 (20-bytes, EXTRACT_KEY_FROM_KEY) | message symkey: release tmp-key@0x5570e4be90c0 | PRF symkey interface PRF aes_xcbc update symkey message-key@0x5570e4be6640 (size 20) | PRF symkey interface: symkey message-key@0x5570e4be6640 (20-bytes, EXTRACT_KEY_FROM_KEY) | symkey message extracting all 20 bytes of key@0x5570e4be6640 | symkey message: symkey-key@0x5570e4be6640 (20-bytes, EXTRACT_KEY_FROM_KEY) | : ephemeral-key@0x5570e4b65080 (16-bytes, AES_KEY_GEN) | symkey message: new slot-key@0x5570e4be8ee0 (20-bytes, EXTRACT_KEY_FROM_KEY) | sizeof bytes 32 | wrapper: (SECItemType)-464429152: 4e 1f 9a 69 f6 4d ed 6d ea d6 4e f0 90 30 8a 92 e7 ea 4a a7 b5 bc 5b ad 11 0e d8 fe 14 d6 b1 d7 | symkey message: release slot-key-key@0x5570e4be8ee0 | symkey message extracted len 32 bytes at 0x5570e4be7f88 | unwrapped: 00 01 02 03 04 05 06 07 08 09 0a 0b 0c 0d 0e 0f | unwrapped: 10 11 12 13 00 00 00 00 00 00 00 00 00 00 00 00 | XCBC: data 00 01 02 03 04 05 06 07 08 09 0a 0b 0c 0d 0e 0f | XCBC: data 10 11 12 13 | K extracting all 16 bytes of key@0x5570e4be4dc0 | K: symkey-key@0x5570e4be4dc0 (16-bytes, AES_ECB) | : ephemeral-key@0x5570e4b65080 (16-bytes, AES_KEY_GEN) | K: new slot-key@0x5570e4be8ee0 (16-bytes, AES_ECB) | sizeof bytes 16 | wrapper: (SECItemType)1920429685: 4e 1f 9a 69 f6 4d ed 6d ea d6 4e f0 90 30 8a 92 | K: release slot-key-key@0x5570e4be8ee0 | K extracted len 16 bytes at 0x5570e4be8bf8 | unwrapped: 00 01 02 03 04 05 06 07 08 09 0a 0b 0c 0d 0e 0f | XCBC: K: 00 01 02 03 04 05 06 07 08 09 0a 0b 0c 0d 0e 0f | XCBC: K1 c3 52 80 57 54 23 7f 31 1a c0 ff f4 e3 e0 3e 78 | : ephemeral-key@0x5570e4b65080 (16-bytes, AES_KEY_GEN) | CONCATENATE_DATA_AND_BASE: | target: EXTRACT_KEY_FROM_KEY | base: base-key@0x5570e4b65080 (16-bytes, AES_KEY_GEN) | params: 16-bytes@0x7ffe19a09570 | result: k1-key@0x5570e4bec1c0 (32-bytes, EXTRACT_KEY_FROM_KEY) | key-offset: 0, key-size: 16 | EXTRACT_KEY_FROM_KEY: | target: AES_ECB | flags: SIGN | key_size: 16-bytes | base: base-key@0x5570e4bec1c0 (32-bytes, EXTRACT_KEY_FROM_KEY) | operation: FLAGS_ONLY | params: 8-bytes@0x7ffe19a09558 | result: k1-key@0x5570e4be90c0 (16-bytes, AES_ECB) | k1: release tmp-key@0x5570e4bec1c0 | Computing E[2] using K3 | XCBC: K3 c1 a7 ab a1 a2 3a 94 06 58 07 a0 8c c8 ee d0 6e | XCBC: E[n-1] 1d 04 48 fa cf 4d 9c 6f 55 b9 93 da 09 80 3d b3 | XCBC: M[n] 10 11 12 13 | XCBC: M[n] 10 11 12 13 | XCBC: M[n]:80...^E[n-1]^K3 | cc b2 f1 48 ed 77 08 69 0d be 33 56 c1 6e ed dd | XCBC: MAC 47 f5 1b 45 64 96 62 15 b8 98 5c 63 05 5e d3 08 | xcbc: release k1-key@0x5570e4be90c0 | : ephemeral-key@0x5570e4b65080 (16-bytes, AES_KEY_GEN) | CONCATENATE_DATA_AND_BASE: | target: EXTRACT_KEY_FROM_KEY | base: base-key@0x5570e4b65080 (16-bytes, AES_KEY_GEN) | params: 16-bytes@0x7ffe19a09600 | result: xcbc-key@0x5570e4bec1c0 (32-bytes, EXTRACT_KEY_FROM_KEY) | key-offset: 0, key-size: 16 | EXTRACT_KEY_FROM_KEY: | target: EXTRACT_KEY_FROM_KEY | key_size: 16-bytes | base: base-key@0x5570e4bec1c0 (32-bytes, EXTRACT_KEY_FROM_KEY) | operation: FLAGS_ONLY | params: 8-bytes@0x7ffe19a095e8 | result: xcbc-key@0x5570e4be90c0 (16-bytes, EXTRACT_KEY_FROM_KEY) | xcbc: release tmp-key@0x5570e4bec1c0 | PRF symkey interface: release key-key@0x5570e4be4dc0 | PRF symkey interface PRF aes_xcbc final-key@0x5570e4be90c0 (size 16) | PRF symkey interface: key-key@0x5570e4be90c0 (16-bytes, EXTRACT_KEY_FROM_KEY) | output: symkey-key@0x5570e4be90c0 (16-bytes, EXTRACT_KEY_FROM_KEY) | RFC 3566 Test Case #4: AES-XCBC-MAC-96 with 20-byte input extracting all 16 bytes of key@0x5570e4be90c0 | RFC 3566 Test Case #4: AES-XCBC-MAC-96 with 20-byte input: symkey-key@0x5570e4be90c0 (16-bytes, EXTRACT_KEY_FROM_KEY) | : ephemeral-key@0x5570e4b65080 (16-bytes, AES_KEY_GEN) | RFC 3566 Test Case #4: AES-XCBC-MAC-96 with 20-byte input: new slot-key@0x5570e4be8ee0 (16-bytes, EXTRACT_KEY_FROM_KEY) | sizeof bytes 16 | wrapper: (SECItemType)-464429206: 45 53 39 1b e9 d5 20 ba 28 e2 4b 0f 17 ee 3c 4f | RFC 3566 Test Case #4: AES-XCBC-MAC-96 with 20-byte input: release slot-key-key@0x5570e4be8ee0 | RFC 3566 Test Case #4: AES-XCBC-MAC-96 with 20-byte input extracted len 16 bytes at 0x5570e4be8bf8 | unwrapped: 47 f5 1b 45 64 96 62 15 b8 98 5c 63 05 5e d3 08 | verify_chunk_data: RFC 3566 Test Case #4: AES-XCBC-MAC-96 with 20-byte input: ok | test_prf_vector: RFC 3566 Test Case #4: AES-XCBC-MAC-96 with 20-byte input passed | test_prf_vector: release symkey-key@0x5570e4be90c0 | test_prf_vector: release message-key@0x5570e4be6640 | test_prf_vector: release key-key@0x5570e4bea940 | test_prf_vector: release output-key@NULL RFC 3566 Test Case #5: AES-XCBC-MAC-96 with 32-byte input | decode_to_chunk: test_prf_vector: input "0x000102030405060708090a0b0c0d0e0f" | decode_to_chunk: output: | 00 01 02 03 04 05 06 07 08 09 0a 0b 0c 0d 0e 0f | decode_to_chunk: test_prf_vector: input "0x000102030405060708090a0b0c0d0e0f101112131415161718191a1b1c1d1e1f" | decode_to_chunk: output: | 00 01 02 03 04 05 06 07 08 09 0a 0b 0c 0d 0e 0f | 10 11 12 13 14 15 16 17 18 19 1a 1b 1c 1d 1e 1f | decode_to_chunk: test_prf_vector: input "0xf54f0ec8d2b9f3d36807734bd5283fd4" | decode_to_chunk: output: | f5 4f 0e c8 d2 b9 f3 d3 68 07 73 4b d5 28 3f d4 | PRF chunk interface PRF aes_xcbc init key-chunk@0x5570e4be8ad8 (length 16) | 00 01 02 03 04 05 06 07 08 09 0a 0b 0c 0d 0e 0f | : ephemeral-key@0x5570e4b65080 (16-bytes, AES_KEY_GEN) | CONCATENATE_DATA_AND_BASE: | target: EXTRACT_KEY_FROM_KEY | base: base-key@0x5570e4b65080 (16-bytes, AES_KEY_GEN) | params: 16-bytes@0x7ffe19a095f0 | result: key-key@0x5570e4be6640 (32-bytes, EXTRACT_KEY_FROM_KEY) | key-offset: 0, key-size: 16 | EXTRACT_KEY_FROM_KEY: | target: EXTRACT_KEY_FROM_KEY | key_size: 16-bytes | base: base-key@0x5570e4be6640 (32-bytes, EXTRACT_KEY_FROM_KEY) | operation: FLAGS_ONLY | params: 8-bytes@0x7ffe19a095d8 | result: key-key@0x5570e4bea940 (16-bytes, EXTRACT_KEY_FROM_KEY) | key: release tmp-key@0x5570e4be6640 | XCBC: Key 16=16 just right | key-offset: 0, key-size: 16 | EXTRACT_KEY_FROM_KEY: | target: AES_ECB | flags: SIGN | key_size: 16-bytes | base: base-key@0x5570e4bea940 (16-bytes, EXTRACT_KEY_FROM_KEY) | operation: FLAGS_ONLY | params: 8-bytes@0x7ffe19a095b8 | result: key-key@0x5570e4be6640 (16-bytes, AES_ECB) | PRF chunk interface: release clone-key@0x5570e4bea940 | PRF chunk interface PRF aes_xcbc crypt-prf@0x5570e4be7ee8 | PRF chunk interface PRF aes_xcbc update message-bytes@0x5570e4be35b8 (length 32) | 00 01 02 03 04 05 06 07 08 09 0a 0b 0c 0d 0e 0f | 10 11 12 13 14 15 16 17 18 19 1a 1b 1c 1d 1e 1f | XCBC: data 00 01 02 03 04 05 06 07 08 09 0a 0b 0c 0d 0e 0f | XCBC: data 10 11 12 13 14 15 16 17 18 19 1a 1b 1c 1d 1e 1f | K extracting all 16 bytes of key@0x5570e4be6640 | K: symkey-key@0x5570e4be6640 (16-bytes, AES_ECB) | : ephemeral-key@0x5570e4b65080 (16-bytes, AES_KEY_GEN) | K: new slot-key@0x5570e4be8ee0 (16-bytes, AES_ECB) | sizeof bytes 16 | wrapper: (SECItemType)540619040: 4e 1f 9a 69 f6 4d ed 6d ea d6 4e f0 90 30 8a 92 | K: release slot-key-key@0x5570e4be8ee0 | K extracted len 16 bytes at 0x5570e4be87e8 | unwrapped: 00 01 02 03 04 05 06 07 08 09 0a 0b 0c 0d 0e 0f | XCBC: K: 00 01 02 03 04 05 06 07 08 09 0a 0b 0c 0d 0e 0f | XCBC: K1 c3 52 80 57 54 23 7f 31 1a c0 ff f4 e3 e0 3e 78 | : ephemeral-key@0x5570e4b65080 (16-bytes, AES_KEY_GEN) | CONCATENATE_DATA_AND_BASE: | target: EXTRACT_KEY_FROM_KEY | base: base-key@0x5570e4b65080 (16-bytes, AES_KEY_GEN) | params: 16-bytes@0x7ffe19a09550 | result: k1-key@0x5570e4be90c0 (32-bytes, EXTRACT_KEY_FROM_KEY) | key-offset: 0, key-size: 16 | EXTRACT_KEY_FROM_KEY: | target: AES_ECB | flags: SIGN | key_size: 16-bytes | base: base-key@0x5570e4be90c0 (32-bytes, EXTRACT_KEY_FROM_KEY) | operation: FLAGS_ONLY | params: 8-bytes@0x7ffe19a09538 | result: k1-key@0x5570e4bea940 (16-bytes, AES_ECB) | k1: release tmp-key@0x5570e4be90c0 | XCBC: Computing E[2] using K2 | XCBC: K2 bd 86 2f fb 97 ad 2f b8 f8 b8 91 f6 03 2f 36 cb | XCBC: E[n-1] 1d 04 48 fa cf 4d 9c 6f 55 b9 93 da 09 80 3d b3 | XCBC: M[n] 10 11 12 13 14 15 16 17 18 19 1a 1b 1c 1d 1e 1f | XCBC: M[n]^E[n-1]^K2 | b0 93 75 12 4c f5 a5 c0 b5 18 18 37 16 b2 15 67 | XCBC: MAC f5 4f 0e c8 d2 b9 f3 d3 68 07 73 4b d5 28 3f d4 | xcbc: release k1-key@0x5570e4bea940 | PRF chunk interface: release key-key@0x5570e4be6640 | PRF chunk interface PRF aes_xcbc final-chunk@0x5570e4be8bf8 (length 16) | f5 4f 0e c8 d2 b9 f3 d3 68 07 73 4b d5 28 3f d4 | chunk output f5 4f 0e c8 d2 b9 f3 d3 68 07 73 4b d5 28 3f d4 | verify_chunk_data: RFC 3566 Test Case #5: AES-XCBC-MAC-96 with 32-byte input: ok | : ephemeral-key@0x5570e4b65080 (16-bytes, AES_KEY_GEN) | CONCATENATE_DATA_AND_BASE: | target: EXTRACT_KEY_FROM_KEY | base: base-key@0x5570e4b65080 (16-bytes, AES_KEY_GEN) | params: 16-bytes@0x7ffe19a09660 | result: key symkey-key@0x5570e4bea940 (32-bytes, EXTRACT_KEY_FROM_KEY) | key-offset: 0, key-size: 16 | EXTRACT_KEY_FROM_KEY: | target: EXTRACT_KEY_FROM_KEY | key_size: 16-bytes | base: base-key@0x5570e4bea940 (32-bytes, EXTRACT_KEY_FROM_KEY) | operation: FLAGS_ONLY | params: 8-bytes@0x7ffe19a09648 | result: key symkey-key@0x5570e4be6640 (16-bytes, EXTRACT_KEY_FROM_KEY) | key symkey: release tmp-key@0x5570e4bea940 | PRF symkey interface PRF aes_xcbc init key symkey-key@0x5570e4be6640 (size 16) | PRF symkey interface: key symkey-key@0x5570e4be6640 (16-bytes, EXTRACT_KEY_FROM_KEY) | XCBC: Key 16=16 just right | key-offset: 0, key-size: 16 | EXTRACT_KEY_FROM_KEY: | target: AES_ECB | flags: SIGN | key_size: 16-bytes | base: base-key@0x5570e4be6640 (16-bytes, EXTRACT_KEY_FROM_KEY) | operation: FLAGS_ONLY | params: 8-bytes@0x7ffe19a095e8 | result: key symkey-key@0x5570e4bea940 (16-bytes, AES_ECB) | PRF symkey interface PRF aes_xcbc crypt-prf@0x5570e4be7ee8 | : ephemeral-key@0x5570e4b65080 (16-bytes, AES_KEY_GEN) | CONCATENATE_DATA_AND_BASE: | target: EXTRACT_KEY_FROM_KEY | base: base-key@0x5570e4b65080 (16-bytes, AES_KEY_GEN) | params: 16-bytes@0x7ffe19a09660 | result: message symkey-key@0x5570e4be4dc0 (48-bytes, EXTRACT_KEY_FROM_KEY) | key-offset: 0, key-size: 32 | EXTRACT_KEY_FROM_KEY: | target: EXTRACT_KEY_FROM_KEY | key_size: 32-bytes | base: base-key@0x5570e4be4dc0 (48-bytes, EXTRACT_KEY_FROM_KEY) | operation: FLAGS_ONLY | params: 8-bytes@0x7ffe19a09648 | result: message symkey-key@0x5570e4be90c0 (32-bytes, EXTRACT_KEY_FROM_KEY) | message symkey: release tmp-key@0x5570e4be4dc0 | PRF symkey interface PRF aes_xcbc update symkey message-key@0x5570e4be90c0 (size 32) | PRF symkey interface: symkey message-key@0x5570e4be90c0 (32-bytes, EXTRACT_KEY_FROM_KEY) | symkey message extracting all 32 bytes of key@0x5570e4be90c0 | symkey message: symkey-key@0x5570e4be90c0 (32-bytes, EXTRACT_KEY_FROM_KEY) | : ephemeral-key@0x5570e4b65080 (16-bytes, AES_KEY_GEN) | symkey message: new slot-key@0x5570e4be8ee0 (32-bytes, EXTRACT_KEY_FROM_KEY) | sizeof bytes 32 | wrapper: (SECItemType)-464429152: 4e 1f 9a 69 f6 4d ed 6d ea d6 4e f0 90 30 8a 92 0f 4e 53 eb a6 39 e9 11 5d 01 cf cc c4 3b a9 5b | symkey message: release slot-key-key@0x5570e4be8ee0 | symkey message extracted len 32 bytes at 0x5570e4be7f88 | unwrapped: 00 01 02 03 04 05 06 07 08 09 0a 0b 0c 0d 0e 0f | unwrapped: 10 11 12 13 14 15 16 17 18 19 1a 1b 1c 1d 1e 1f | XCBC: data 00 01 02 03 04 05 06 07 08 09 0a 0b 0c 0d 0e 0f | XCBC: data 10 11 12 13 14 15 16 17 18 19 1a 1b 1c 1d 1e 1f | K extracting all 16 bytes of key@0x5570e4bea940 | K: symkey-key@0x5570e4bea940 (16-bytes, AES_ECB) | : ephemeral-key@0x5570e4b65080 (16-bytes, AES_KEY_GEN) | K: new slot-key@0x5570e4be8ee0 (16-bytes, AES_ECB) | sizeof bytes 16 | wrapper: (SECItemType)1920429685: 4e 1f 9a 69 f6 4d ed 6d ea d6 4e f0 90 30 8a 92 | K: release slot-key-key@0x5570e4be8ee0 | K extracted len 16 bytes at 0x5570e4be8128 | unwrapped: 00 01 02 03 04 05 06 07 08 09 0a 0b 0c 0d 0e 0f | XCBC: K: 00 01 02 03 04 05 06 07 08 09 0a 0b 0c 0d 0e 0f | XCBC: K1 c3 52 80 57 54 23 7f 31 1a c0 ff f4 e3 e0 3e 78 | : ephemeral-key@0x5570e4b65080 (16-bytes, AES_KEY_GEN) | CONCATENATE_DATA_AND_BASE: | target: EXTRACT_KEY_FROM_KEY | base: base-key@0x5570e4b65080 (16-bytes, AES_KEY_GEN) | params: 16-bytes@0x7ffe19a09570 | result: k1-key@0x5570e4bec1c0 (32-bytes, EXTRACT_KEY_FROM_KEY) | key-offset: 0, key-size: 16 | EXTRACT_KEY_FROM_KEY: | target: AES_ECB | flags: SIGN | key_size: 16-bytes | base: base-key@0x5570e4bec1c0 (32-bytes, EXTRACT_KEY_FROM_KEY) | operation: FLAGS_ONLY | params: 8-bytes@0x7ffe19a09558 | result: k1-key@0x5570e4be4dc0 (16-bytes, AES_ECB) | k1: release tmp-key@0x5570e4bec1c0 | XCBC: Computing E[2] using K2 | XCBC: K2 bd 86 2f fb 97 ad 2f b8 f8 b8 91 f6 03 2f 36 cb | XCBC: E[n-1] 1d 04 48 fa cf 4d 9c 6f 55 b9 93 da 09 80 3d b3 | XCBC: M[n] 10 11 12 13 14 15 16 17 18 19 1a 1b 1c 1d 1e 1f | XCBC: M[n]^E[n-1]^K2 | b0 93 75 12 4c f5 a5 c0 b5 18 18 37 16 b2 15 67 | XCBC: MAC f5 4f 0e c8 d2 b9 f3 d3 68 07 73 4b d5 28 3f d4 | xcbc: release k1-key@0x5570e4be4dc0 | : ephemeral-key@0x5570e4b65080 (16-bytes, AES_KEY_GEN) | CONCATENATE_DATA_AND_BASE: | target: EXTRACT_KEY_FROM_KEY | base: base-key@0x5570e4b65080 (16-bytes, AES_KEY_GEN) | params: 16-bytes@0x7ffe19a09600 | result: xcbc-key@0x5570e4bec1c0 (32-bytes, EXTRACT_KEY_FROM_KEY) | key-offset: 0, key-size: 16 | EXTRACT_KEY_FROM_KEY: | target: EXTRACT_KEY_FROM_KEY | key_size: 16-bytes | base: base-key@0x5570e4bec1c0 (32-bytes, EXTRACT_KEY_FROM_KEY) | operation: FLAGS_ONLY | params: 8-bytes@0x7ffe19a095e8 | result: xcbc-key@0x5570e4be4dc0 (16-bytes, EXTRACT_KEY_FROM_KEY) | xcbc: release tmp-key@0x5570e4bec1c0 | PRF symkey interface: release key-key@0x5570e4bea940 | PRF symkey interface PRF aes_xcbc final-key@0x5570e4be4dc0 (size 16) | PRF symkey interface: key-key@0x5570e4be4dc0 (16-bytes, EXTRACT_KEY_FROM_KEY) | output: symkey-key@0x5570e4be4dc0 (16-bytes, EXTRACT_KEY_FROM_KEY) | RFC 3566 Test Case #5: AES-XCBC-MAC-96 with 32-byte input extracting all 16 bytes of key@0x5570e4be4dc0 | RFC 3566 Test Case #5: AES-XCBC-MAC-96 with 32-byte input: symkey-key@0x5570e4be4dc0 (16-bytes, EXTRACT_KEY_FROM_KEY) | : ephemeral-key@0x5570e4b65080 (16-bytes, AES_KEY_GEN) | RFC 3566 Test Case #5: AES-XCBC-MAC-96 with 32-byte input: new slot-key@0x5570e4be8ee0 (16-bytes, EXTRACT_KEY_FROM_KEY) | sizeof bytes 16 | wrapper: (SECItemType)-464429206: 02 77 a4 45 87 72 18 db 19 64 87 09 2f 3d 45 38 | RFC 3566 Test Case #5: AES-XCBC-MAC-96 with 32-byte input: release slot-key-key@0x5570e4be8ee0 | RFC 3566 Test Case #5: AES-XCBC-MAC-96 with 32-byte input extracted len 16 bytes at 0x5570e4be8128 | unwrapped: f5 4f 0e c8 d2 b9 f3 d3 68 07 73 4b d5 28 3f d4 | verify_chunk_data: RFC 3566 Test Case #5: AES-XCBC-MAC-96 with 32-byte input: ok | test_prf_vector: RFC 3566 Test Case #5: AES-XCBC-MAC-96 with 32-byte input passed | test_prf_vector: release symkey-key@0x5570e4be4dc0 | test_prf_vector: release message-key@0x5570e4be90c0 | test_prf_vector: release key-key@0x5570e4be6640 | test_prf_vector: release output-key@NULL RFC 3566 Test Case #6: AES-XCBC-MAC-96 with 34-byte input | decode_to_chunk: test_prf_vector: input "0x000102030405060708090a0b0c0d0e0f" | decode_to_chunk: output: | 00 01 02 03 04 05 06 07 08 09 0a 0b 0c 0d 0e 0f | decode_to_chunk: test_prf_vector: input "0x000102030405060708090a0b0c0d0e0f101112131415161718191a1b1c1d1e1f2021" | decode_to_chunk: output: | 00 01 02 03 04 05 06 07 08 09 0a 0b 0c 0d 0e 0f | 10 11 12 13 14 15 16 17 18 19 1a 1b 1c 1d 1e 1f | 20 21 | decode_to_chunk: test_prf_vector: input "0xbecbb3bccdb518a30677d5481fb6b4d8" | decode_to_chunk: output: | be cb b3 bc cd b5 18 a3 06 77 d5 48 1f b6 b4 d8 | PRF chunk interface PRF aes_xcbc init key-chunk@0x5570e4be80e8 (length 16) | 00 01 02 03 04 05 06 07 08 09 0a 0b 0c 0d 0e 0f | : ephemeral-key@0x5570e4b65080 (16-bytes, AES_KEY_GEN) | CONCATENATE_DATA_AND_BASE: | target: EXTRACT_KEY_FROM_KEY | base: base-key@0x5570e4b65080 (16-bytes, AES_KEY_GEN) | params: 16-bytes@0x7ffe19a095f0 | result: key-key@0x5570e4be90c0 (32-bytes, EXTRACT_KEY_FROM_KEY) | key-offset: 0, key-size: 16 | EXTRACT_KEY_FROM_KEY: | target: EXTRACT_KEY_FROM_KEY | key_size: 16-bytes | base: base-key@0x5570e4be90c0 (32-bytes, EXTRACT_KEY_FROM_KEY) | operation: FLAGS_ONLY | params: 8-bytes@0x7ffe19a095d8 | result: key-key@0x5570e4be6640 (16-bytes, EXTRACT_KEY_FROM_KEY) | key: release tmp-key@0x5570e4be90c0 | XCBC: Key 16=16 just right | key-offset: 0, key-size: 16 | EXTRACT_KEY_FROM_KEY: | target: AES_ECB | flags: SIGN | key_size: 16-bytes | base: base-key@0x5570e4be6640 (16-bytes, EXTRACT_KEY_FROM_KEY) | operation: FLAGS_ONLY | params: 8-bytes@0x7ffe19a095b8 | result: key-key@0x5570e4be90c0 (16-bytes, AES_ECB) | PRF chunk interface: release clone-key@0x5570e4be6640 | PRF chunk interface PRF aes_xcbc crypt-prf@0x5570e4be35b8 | PRF chunk interface PRF aes_xcbc update message-bytes@0x5570e4be8c38 (length 34) | 00 01 02 03 04 05 06 07 08 09 0a 0b 0c 0d 0e 0f | 10 11 12 13 14 15 16 17 18 19 1a 1b 1c 1d 1e 1f | 20 21 | XCBC: data 00 01 02 03 04 05 06 07 08 09 0a 0b 0c 0d 0e 0f | XCBC: data 10 11 12 13 14 15 16 17 18 19 1a 1b 1c 1d 1e 1f | XCBC: data 20 21 | K extracting all 16 bytes of key@0x5570e4be90c0 | K: symkey-key@0x5570e4be90c0 (16-bytes, AES_ECB) | : ephemeral-key@0x5570e4b65080 (16-bytes, AES_KEY_GEN) | K: new slot-key@0x5570e4be8ee0 (16-bytes, AES_ECB) | sizeof bytes 16 | wrapper: (SECItemType)540619040: 4e 1f 9a 69 f6 4d ed 6d ea d6 4e f0 90 30 8a 92 | K: release slot-key-key@0x5570e4be8ee0 | K extracted len 16 bytes at 0x5570e4be8218 | unwrapped: 00 01 02 03 04 05 06 07 08 09 0a 0b 0c 0d 0e 0f | XCBC: K: 00 01 02 03 04 05 06 07 08 09 0a 0b 0c 0d 0e 0f | XCBC: K1 c3 52 80 57 54 23 7f 31 1a c0 ff f4 e3 e0 3e 78 | : ephemeral-key@0x5570e4b65080 (16-bytes, AES_KEY_GEN) | CONCATENATE_DATA_AND_BASE: | target: EXTRACT_KEY_FROM_KEY | base: base-key@0x5570e4b65080 (16-bytes, AES_KEY_GEN) | params: 16-bytes@0x7ffe19a09550 | result: k1-key@0x5570e4be4dc0 (32-bytes, EXTRACT_KEY_FROM_KEY) | key-offset: 0, key-size: 16 | EXTRACT_KEY_FROM_KEY: | target: AES_ECB | flags: SIGN | key_size: 16-bytes | base: base-key@0x5570e4be4dc0 (32-bytes, EXTRACT_KEY_FROM_KEY) | operation: FLAGS_ONLY | params: 8-bytes@0x7ffe19a09538 | result: k1-key@0x5570e4be6640 (16-bytes, AES_ECB) | k1: release tmp-key@0x5570e4be4dc0 | Computing E[3] using K3 | XCBC: K3 c1 a7 ab a1 a2 3a 94 06 58 07 a0 8c c8 ee d0 6e | XCBC: E[n-1] 09 02 5e 5a 67 25 20 72 44 14 5c 6b 80 66 85 79 | XCBC: M[n] 20 21 | XCBC: M[n] 20 21 | XCBC: M[n]:80...^E[n-1]^K3 | e8 84 75 fb c5 1f b4 74 1c 13 fc e7 48 88 55 17 | XCBC: MAC be cb b3 bc cd b5 18 a3 06 77 d5 48 1f b6 b4 d8 | xcbc: release k1-key@0x5570e4be6640 | PRF chunk interface: release key-key@0x5570e4be90c0 | PRF chunk interface PRF aes_xcbc final-chunk@0x5570e4be8128 (length 16) | be cb b3 bc cd b5 18 a3 06 77 d5 48 1f b6 b4 d8 | chunk output be cb b3 bc cd b5 18 a3 06 77 d5 48 1f b6 b4 d8 | verify_chunk_data: RFC 3566 Test Case #6: AES-XCBC-MAC-96 with 34-byte input: ok | : ephemeral-key@0x5570e4b65080 (16-bytes, AES_KEY_GEN) | CONCATENATE_DATA_AND_BASE: | target: EXTRACT_KEY_FROM_KEY | base: base-key@0x5570e4b65080 (16-bytes, AES_KEY_GEN) | params: 16-bytes@0x7ffe19a09660 | result: key symkey-key@0x5570e4be6640 (32-bytes, EXTRACT_KEY_FROM_KEY) | key-offset: 0, key-size: 16 | EXTRACT_KEY_FROM_KEY: | target: EXTRACT_KEY_FROM_KEY | key_size: 16-bytes | base: base-key@0x5570e4be6640 (32-bytes, EXTRACT_KEY_FROM_KEY) | operation: FLAGS_ONLY | params: 8-bytes@0x7ffe19a09648 | result: key symkey-key@0x5570e4be90c0 (16-bytes, EXTRACT_KEY_FROM_KEY) | key symkey: release tmp-key@0x5570e4be6640 | PRF symkey interface PRF aes_xcbc init key symkey-key@0x5570e4be90c0 (size 16) | PRF symkey interface: key symkey-key@0x5570e4be90c0 (16-bytes, EXTRACT_KEY_FROM_KEY) | XCBC: Key 16=16 just right | key-offset: 0, key-size: 16 | EXTRACT_KEY_FROM_KEY: | target: AES_ECB | flags: SIGN | key_size: 16-bytes | base: base-key@0x5570e4be90c0 (16-bytes, EXTRACT_KEY_FROM_KEY) | operation: FLAGS_ONLY | params: 8-bytes@0x7ffe19a095e8 | result: key symkey-key@0x5570e4be6640 (16-bytes, AES_ECB) | PRF symkey interface PRF aes_xcbc crypt-prf@0x5570e4be35b8 | : ephemeral-key@0x5570e4b65080 (16-bytes, AES_KEY_GEN) | CONCATENATE_DATA_AND_BASE: | target: EXTRACT_KEY_FROM_KEY | base: base-key@0x5570e4b65080 (16-bytes, AES_KEY_GEN) | params: 16-bytes@0x7ffe19a09660 | result: message symkey-key@0x5570e4bea940 (50-bytes, EXTRACT_KEY_FROM_KEY) | key-offset: 0, key-size: 34 | EXTRACT_KEY_FROM_KEY: | target: EXTRACT_KEY_FROM_KEY | key_size: 34-bytes | base: base-key@0x5570e4bea940 (50-bytes, EXTRACT_KEY_FROM_KEY) | operation: FLAGS_ONLY | params: 8-bytes@0x7ffe19a09648 | result: message symkey-key@0x5570e4be4dc0 (34-bytes, EXTRACT_KEY_FROM_KEY) | message symkey: release tmp-key@0x5570e4bea940 | PRF symkey interface PRF aes_xcbc update symkey message-key@0x5570e4be4dc0 (size 34) | PRF symkey interface: symkey message-key@0x5570e4be4dc0 (34-bytes, EXTRACT_KEY_FROM_KEY) | symkey message extracting all 34 bytes of key@0x5570e4be4dc0 | symkey message: symkey-key@0x5570e4be4dc0 (34-bytes, EXTRACT_KEY_FROM_KEY) | : ephemeral-key@0x5570e4b65080 (16-bytes, AES_KEY_GEN) | symkey message: new slot-key@0x5570e4be8ee0 (34-bytes, EXTRACT_KEY_FROM_KEY) | sizeof bytes 48 | wrapper: (SECItemType)-464429152: 4e 1f 9a 69 f6 4d ed 6d ea d6 4e f0 90 30 8a 92 0f 4e 53 eb a6 39 e9 11 5d 01 cf cc c4 3b a9 5b 8b d2 3b 9f 10 bf 16 40 e3 2f 6a 5b ca e4 27 18 | symkey message: release slot-key-key@0x5570e4be8ee0 | symkey message extracted len 48 bytes at 0x5570e4be8e38 | unwrapped: 00 01 02 03 04 05 06 07 08 09 0a 0b 0c 0d 0e 0f | unwrapped: 10 11 12 13 14 15 16 17 18 19 1a 1b 1c 1d 1e 1f | unwrapped: 20 21 00 00 00 00 00 00 00 00 00 00 00 00 00 00 | XCBC: data 00 01 02 03 04 05 06 07 08 09 0a 0b 0c 0d 0e 0f | XCBC: data 10 11 12 13 14 15 16 17 18 19 1a 1b 1c 1d 1e 1f | XCBC: data 20 21 | K extracting all 16 bytes of key@0x5570e4be6640 | K: symkey-key@0x5570e4be6640 (16-bytes, AES_ECB) | : ephemeral-key@0x5570e4b65080 (16-bytes, AES_KEY_GEN) | K: new slot-key@0x5570e4be8ee0 (16-bytes, AES_ECB) | sizeof bytes 16 | wrapper: (SECItemType)1920429685: 4e 1f 9a 69 f6 4d ed 6d ea d6 4e f0 90 30 8a 92 | K: release slot-key-key@0x5570e4be8ee0 | K extracted len 16 bytes at 0x5570e4be87a8 | unwrapped: 00 01 02 03 04 05 06 07 08 09 0a 0b 0c 0d 0e 0f | XCBC: K: 00 01 02 03 04 05 06 07 08 09 0a 0b 0c 0d 0e 0f | XCBC: K1 c3 52 80 57 54 23 7f 31 1a c0 ff f4 e3 e0 3e 78 | : ephemeral-key@0x5570e4b65080 (16-bytes, AES_KEY_GEN) | CONCATENATE_DATA_AND_BASE: | target: EXTRACT_KEY_FROM_KEY | base: base-key@0x5570e4b65080 (16-bytes, AES_KEY_GEN) | params: 16-bytes@0x7ffe19a09570 | result: k1-key@0x5570e4bec1c0 (32-bytes, EXTRACT_KEY_FROM_KEY) | key-offset: 0, key-size: 16 | EXTRACT_KEY_FROM_KEY: | target: AES_ECB | flags: SIGN | key_size: 16-bytes | base: base-key@0x5570e4bec1c0 (32-bytes, EXTRACT_KEY_FROM_KEY) | operation: FLAGS_ONLY | params: 8-bytes@0x7ffe19a09558 | result: k1-key@0x5570e4bea940 (16-bytes, AES_ECB) | k1: release tmp-key@0x5570e4bec1c0 | Computing E[3] using K3 | XCBC: K3 c1 a7 ab a1 a2 3a 94 06 58 07 a0 8c c8 ee d0 6e | XCBC: E[n-1] 09 02 5e 5a 67 25 20 72 44 14 5c 6b 80 66 85 79 | XCBC: M[n] 20 21 | XCBC: M[n] 20 21 | XCBC: M[n]:80...^E[n-1]^K3 | e8 84 75 fb c5 1f b4 74 1c 13 fc e7 48 88 55 17 | XCBC: MAC be cb b3 bc cd b5 18 a3 06 77 d5 48 1f b6 b4 d8 | xcbc: release k1-key@0x5570e4bea940 | : ephemeral-key@0x5570e4b65080 (16-bytes, AES_KEY_GEN) | CONCATENATE_DATA_AND_BASE: | target: EXTRACT_KEY_FROM_KEY | base: base-key@0x5570e4b65080 (16-bytes, AES_KEY_GEN) | params: 16-bytes@0x7ffe19a09600 | result: xcbc-key@0x5570e4bec1c0 (32-bytes, EXTRACT_KEY_FROM_KEY) | key-offset: 0, key-size: 16 | EXTRACT_KEY_FROM_KEY: | target: EXTRACT_KEY_FROM_KEY | key_size: 16-bytes | base: base-key@0x5570e4bec1c0 (32-bytes, EXTRACT_KEY_FROM_KEY) | operation: FLAGS_ONLY | params: 8-bytes@0x7ffe19a095e8 | result: xcbc-key@0x5570e4bea940 (16-bytes, EXTRACT_KEY_FROM_KEY) | xcbc: release tmp-key@0x5570e4bec1c0 | PRF symkey interface: release key-key@0x5570e4be6640 | PRF symkey interface PRF aes_xcbc final-key@0x5570e4bea940 (size 16) | PRF symkey interface: key-key@0x5570e4bea940 (16-bytes, EXTRACT_KEY_FROM_KEY) | output: symkey-key@0x5570e4bea940 (16-bytes, EXTRACT_KEY_FROM_KEY) | RFC 3566 Test Case #6: AES-XCBC-MAC-96 with 34-byte input extracting all 16 bytes of key@0x5570e4bea940 | RFC 3566 Test Case #6: AES-XCBC-MAC-96 with 34-byte input: symkey-key@0x5570e4bea940 (16-bytes, EXTRACT_KEY_FROM_KEY) | : ephemeral-key@0x5570e4b65080 (16-bytes, AES_KEY_GEN) | RFC 3566 Test Case #6: AES-XCBC-MAC-96 with 34-byte input: new slot-key@0x5570e4be8ee0 (16-bytes, EXTRACT_KEY_FROM_KEY) | sizeof bytes 16 | wrapper: (SECItemType)-464429206: 68 11 54 ce 09 a2 52 5a 1a fd df a3 00 ec 79 48 | RFC 3566 Test Case #6: AES-XCBC-MAC-96 with 34-byte input: release slot-key-key@0x5570e4be8ee0 | RFC 3566 Test Case #6: AES-XCBC-MAC-96 with 34-byte input extracted len 16 bytes at 0x5570e4be87a8 | unwrapped: be cb b3 bc cd b5 18 a3 06 77 d5 48 1f b6 b4 d8 | verify_chunk_data: RFC 3566 Test Case #6: AES-XCBC-MAC-96 with 34-byte input: ok | test_prf_vector: RFC 3566 Test Case #6: AES-XCBC-MAC-96 with 34-byte input passed | test_prf_vector: release symkey-key@0x5570e4bea940 | test_prf_vector: release message-key@0x5570e4be4dc0 | test_prf_vector: release key-key@0x5570e4be90c0 | test_prf_vector: release output-key@NULL RFC 3566 Test Case #7: AES-XCBC-MAC-96 with 1000-byte input | decode_to_chunk: test_prf_vector: input "0x000102030405060708090a0b0c0d0e0f" | decode_to_chunk: output: | 00 01 02 03 04 05 06 07 08 09 0a 0b 0c 0d 0e 0f | decode_to_chunk: test_prf_vector: input "0xf0dafee895db30253761103b5d84528f" | decode_to_chunk: output: | f0 da fe e8 95 db 30 25 37 61 10 3b 5d 84 52 8f | PRF chunk interface PRF aes_xcbc init key-chunk@0x5570e4be87a8 (length 16) | 00 01 02 03 04 05 06 07 08 09 0a 0b 0c 0d 0e 0f | : ephemeral-key@0x5570e4b65080 (16-bytes, AES_KEY_GEN) | CONCATENATE_DATA_AND_BASE: | target: EXTRACT_KEY_FROM_KEY | base: base-key@0x5570e4b65080 (16-bytes, AES_KEY_GEN) | params: 16-bytes@0x7ffe19a095f0 | result: key-key@0x5570e4be4dc0 (32-bytes, EXTRACT_KEY_FROM_KEY) | key-offset: 0, key-size: 16 | EXTRACT_KEY_FROM_KEY: | target: EXTRACT_KEY_FROM_KEY | key_size: 16-bytes | base: base-key@0x5570e4be4dc0 (32-bytes, EXTRACT_KEY_FROM_KEY) | operation: FLAGS_ONLY | params: 8-bytes@0x7ffe19a095d8 | result: key-key@0x5570e4be90c0 (16-bytes, EXTRACT_KEY_FROM_KEY) | key: release tmp-key@0x5570e4be4dc0 | XCBC: Key 16=16 just right | key-offset: 0, key-size: 16 | EXTRACT_KEY_FROM_KEY: | target: AES_ECB | flags: SIGN | key_size: 16-bytes | base: base-key@0x5570e4be90c0 (16-bytes, EXTRACT_KEY_FROM_KEY) | operation: FLAGS_ONLY | params: 8-bytes@0x7ffe19a095b8 | result: key-key@0x5570e4be4dc0 (16-bytes, AES_ECB) | PRF chunk interface: release clone-key@0x5570e4be90c0 | PRF chunk interface PRF aes_xcbc crypt-prf@0x5570e4be35b8 | PRF chunk interface PRF aes_xcbc update message-bytes@0x5570e4beda68 (length 1000) | 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 | 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 | 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 | 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 | 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 | 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 | 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 | 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 | 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 | 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 | 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 | 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 | 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 | 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 | 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 | 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 | 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 | 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 | 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 | 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 | 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 | 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 | 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 | 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 | 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 | 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 | 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 | 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 | 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 | 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 | 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 | 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 | 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 | 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 | 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 | 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 | 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 | 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 | 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 | 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 | 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 | 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 | 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 | 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 | 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 | 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 | 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 | 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 | 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 | 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 | 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 | 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 | 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 | 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 | 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 | 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 | 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 | 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 | 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 | 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 | 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 | 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 | 00 00 00 00 00 00 00 00 | XCBC: data 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 | XCBC: data 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 | XCBC: data 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 | XCBC: data 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 | XCBC: data 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 | XCBC: data 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 | XCBC: data 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 | XCBC: data 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 | XCBC: data 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 | XCBC: data 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 | XCBC: data 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 | XCBC: data 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 | XCBC: data 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 | XCBC: data 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 | XCBC: data 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 | XCBC: data 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 | XCBC: data 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 | XCBC: data 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 | XCBC: data 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 | XCBC: data 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 | XCBC: data 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 | XCBC: data 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 | XCBC: data 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 | XCBC: data 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 | XCBC: data 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 | XCBC: data 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 | XCBC: data 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 | XCBC: data 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 | XCBC: data 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 | XCBC: data 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 | XCBC: data 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 | XCBC: data 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 | XCBC: data 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 | XCBC: data 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 | XCBC: data 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 | XCBC: data 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 | XCBC: data 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 | XCBC: data 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 | XCBC: data 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 | XCBC: data 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 | XCBC: data 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 | XCBC: data 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 | XCBC: data 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 | XCBC: data 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 | XCBC: data 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 | XCBC: data 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 | XCBC: data 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 | XCBC: data 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 | XCBC: data 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 | XCBC: data 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 | XCBC: data 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 | XCBC: data 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 | XCBC: data 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 | XCBC: data 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 | XCBC: data 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 | XCBC: data 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 | XCBC: data 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 | XCBC: data 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 | XCBC: data 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 | XCBC: data 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 | XCBC: data 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 | XCBC: data 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 | XCBC: data 00 00 00 00 00 00 00 00 | K extracting all 16 bytes of key@0x5570e4be4dc0 | K: symkey-key@0x5570e4be4dc0 (16-bytes, AES_ECB) | : ephemeral-key@0x5570e4b65080 (16-bytes, AES_KEY_GEN) | K: new slot-key@0x5570e4be8ee0 (16-bytes, AES_ECB) | sizeof bytes 16 | wrapper: (SECItemType)540028960: 4e 1f 9a 69 f6 4d ed 6d ea d6 4e f0 90 30 8a 92 | K: release slot-key-key@0x5570e4be8ee0 | K extracted len 16 bytes at 0x5570e4be8218 | unwrapped: 00 01 02 03 04 05 06 07 08 09 0a 0b 0c 0d 0e 0f | XCBC: K: 00 01 02 03 04 05 06 07 08 09 0a 0b 0c 0d 0e 0f | XCBC: K1 c3 52 80 57 54 23 7f 31 1a c0 ff f4 e3 e0 3e 78 | : ephemeral-key@0x5570e4b65080 (16-bytes, AES_KEY_GEN) | CONCATENATE_DATA_AND_BASE: | target: EXTRACT_KEY_FROM_KEY | base: base-key@0x5570e4b65080 (16-bytes, AES_KEY_GEN) | params: 16-bytes@0x7ffe19a09550 | result: k1-key@0x5570e4bea940 (32-bytes, EXTRACT_KEY_FROM_KEY) | key-offset: 0, key-size: 16 | EXTRACT_KEY_FROM_KEY: | target: AES_ECB | flags: SIGN | key_size: 16-bytes | base: base-key@0x5570e4bea940 (32-bytes, EXTRACT_KEY_FROM_KEY) | operation: FLAGS_ONLY | params: 8-bytes@0x7ffe19a09538 | result: k1-key@0x5570e4be90c0 (16-bytes, AES_ECB) | k1: release tmp-key@0x5570e4bea940 | Computing E[63] using K3 | XCBC: K3 c1 a7 ab a1 a2 3a 94 06 58 07 a0 8c c8 ee d0 6e | XCBC: E[n-1] 5c 88 af cc 1e 1e 83 fc c4 2c 0c e4 12 12 f5 17 | XCBC: M[n] 00 00 00 00 00 00 00 00 | XCBC: M[n] 00 00 00 00 00 00 00 00 | XCBC: M[n]:80...^E[n-1]^K3 | 9d 2f 04 6d bc 24 17 fa 1c 2b ac 68 da fc 25 79 | XCBC: MAC f0 da fe e8 95 db 30 25 37 61 10 3b 5d 84 52 8f | xcbc: release k1-key@0x5570e4be90c0 | PRF chunk interface: release key-key@0x5570e4be4dc0 | PRF chunk interface PRF aes_xcbc final-chunk@0x5570e4be8bf8 (length 16) | f0 da fe e8 95 db 30 25 37 61 10 3b 5d 84 52 8f | chunk output f0 da fe e8 95 db 30 25 37 61 10 3b 5d 84 52 8f | verify_chunk_data: RFC 3566 Test Case #7: AES-XCBC-MAC-96 with 1000-byte input: ok | : ephemeral-key@0x5570e4b65080 (16-bytes, AES_KEY_GEN) | CONCATENATE_DATA_AND_BASE: | target: EXTRACT_KEY_FROM_KEY | base: base-key@0x5570e4b65080 (16-bytes, AES_KEY_GEN) | params: 16-bytes@0x7ffe19a09660 | result: key symkey-key@0x5570e4be90c0 (32-bytes, EXTRACT_KEY_FROM_KEY) | key-offset: 0, key-size: 16 | EXTRACT_KEY_FROM_KEY: | target: EXTRACT_KEY_FROM_KEY | key_size: 16-bytes | base: base-key@0x5570e4be90c0 (32-bytes, EXTRACT_KEY_FROM_KEY) | operation: FLAGS_ONLY | params: 8-bytes@0x7ffe19a09648 | result: key symkey-key@0x5570e4be4dc0 (16-bytes, EXTRACT_KEY_FROM_KEY) | key symkey: release tmp-key@0x5570e4be90c0 | PRF symkey interface PRF aes_xcbc init key symkey-key@0x5570e4be4dc0 (size 16) | PRF symkey interface: key symkey-key@0x5570e4be4dc0 (16-bytes, EXTRACT_KEY_FROM_KEY) | XCBC: Key 16=16 just right | key-offset: 0, key-size: 16 | EXTRACT_KEY_FROM_KEY: | target: AES_ECB | flags: SIGN | key_size: 16-bytes | base: base-key@0x5570e4be4dc0 (16-bytes, EXTRACT_KEY_FROM_KEY) | operation: FLAGS_ONLY | params: 8-bytes@0x7ffe19a095e8 | result: key symkey-key@0x5570e4be90c0 (16-bytes, AES_ECB) | PRF symkey interface PRF aes_xcbc crypt-prf@0x5570e4be35b8 | : ephemeral-key@0x5570e4b65080 (16-bytes, AES_KEY_GEN) | CONCATENATE_DATA_AND_BASE: | target: EXTRACT_KEY_FROM_KEY | base: base-key@0x5570e4b65080 (16-bytes, AES_KEY_GEN) | params: 16-bytes@0x7ffe19a09660 | result: message symkey-key@0x5570e4be6640 (1016-bytes, EXTRACT_KEY_FROM_KEY) | key-offset: 0, key-size: 1000 | EXTRACT_KEY_FROM_KEY: | target: EXTRACT_KEY_FROM_KEY | key_size: 1000-bytes | base: base-key@0x5570e4be6640 (1016-bytes, EXTRACT_KEY_FROM_KEY) | operation: FLAGS_ONLY | params: 8-bytes@0x7ffe19a09648 | result: message symkey-key@0x5570e4bea940 (1000-bytes, EXTRACT_KEY_FROM_KEY) | message symkey: release tmp-key@0x5570e4be6640 | PRF symkey interface PRF aes_xcbc update symkey message-key@0x5570e4bea940 (size 1000) | PRF symkey interface: symkey message-key@0x5570e4bea940 (1000-bytes, EXTRACT_KEY_FROM_KEY) | symkey message extracting all 1000 bytes of key@0x5570e4bea940 | symkey message: symkey-key@0x5570e4bea940 (1000-bytes, EXTRACT_KEY_FROM_KEY) | : ephemeral-key@0x5570e4b65080 (16-bytes, AES_KEY_GEN) | symkey message: new slot-key@0x5570e4be8ee0 (1000-bytes, EXTRACT_KEY_FROM_KEY) | sizeof bytes 1008 | wrapper: (SECItemType)-464429152: ac 74 c2 9c 0e e7 5f 8f 8c 3f 4f 9e e6 76 bf 22 ac 74 c2 9c 0e e7 5f 8f 8c 3f 4f 9e e6 76 bf 22 ac 74 c2 9c 0e e7 5f 8f 8c 3f 4f 9e e6 76 bf 22 ac 74 c2 9c 0e e7 5f 8f 8c 3f 4f 9e e6 76 bf 22 ac 74 c2 9c 0e e7 5f 8f 8c 3f 4f 9e e6 76 bf 22 ac 74 c2 9c 0e e7 5f 8f 8c 3f 4f 9e e6 76 bf 22 ac 74 c2 9c 0e e7 5f 8f 8c 3f 4f 9e e6 76 bf 22 ac 74 c2 9c 0e e7 5f 8f 8c 3f 4f 9e e6 76 bf 22 ac 74 c2 9c 0e e7 5f 8f 8c 3f 4f 9e e6 76 bf 22 ac 74 c2 9c 0e e7 5f 8f 8c 3f 4f 9e e6 76 bf 22 ac 74 c2 9c 0e e7 5f 8f 8c 3f 4f 9e e6 76 bf 22 ac 74 c2 9c 0e e7 5f 8f 8c 3f 4f 9e e6 76 bf 22 ac 74 c2 9c 0e e7 5f 8f 8c 3f 4f 9e e6 76 bf 22 ac 74 c2 9c 0e e7 5f 8f 8c 3f 4f 9e e6 76 bf 22 ac 74 c2 9c 0e e7 5f 8f 8c 3f 4f 9e e6 76 bf 22 ac 74 c2 9c 0e e7 5f 8f 8c 3f 4f 9e e6 76 bf 22 ac 74 c2 9c 0e e7 5f 8f 8c 3f 4f 9e e6 76 bf 22 ac 74 c2 9c 0e e7 5f 8f 8c 3f 4f 9e e6 76 bf 22 ac 74 c2 9c 0e e7 5f 8f 8c 3f 4f 9e e6 76 bf | symkey message: release slot-key-key@0x5570e4be8ee0 | symkey message extracted len 1008 bytes at 0x5570e4bf0068 | unwrapped: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 | unwrapped: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 | unwrapped: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 | unwrapped: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 | unwrapped: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 | unwrapped: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 | unwrapped: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 | unwrapped: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 | unwrapped: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 | unwrapped: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 | unwrapped: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 | unwrapped: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 | unwrapped: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 | unwrapped: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 | unwrapped: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 | unwrapped: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 | unwrapped: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 | unwrapped: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 | unwrapped: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 | unwrapped: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 | unwrapped: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 | unwrapped: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 | unwrapped: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 | unwrapped: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 | unwrapped: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 | unwrapped: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 | unwrapped: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 | unwrapped: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 | unwrapped: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 | unwrapped: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 | unwrapped: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 | unwrapped: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 | unwrapped: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 | unwrapped: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 | unwrapped: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 | unwrapped: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 | unwrapped: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 | unwrapped: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 | unwrapped: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 | unwrapped: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 | unwrapped: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 | unwrapped: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 | unwrapped: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 | unwrapped: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 | unwrapped: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 | unwrapped: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 | unwrapped: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 | unwrapped: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 | unwrapped: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 | unwrapped: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 | unwrapped: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 | unwrapped: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 | unwrapped: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 | unwrapped: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 | unwrapped: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 | unwrapped: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 | unwrapped: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 | unwrapped: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 | unwrapped: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 | unwrapped: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 | unwrapped: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 | unwrapped: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 | unwrapped: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 | XCBC: data 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 | XCBC: data 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 | XCBC: data 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 | XCBC: data 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 | XCBC: data 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 | XCBC: data 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 | XCBC: data 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 | XCBC: data 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 | XCBC: data 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 | XCBC: data 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 | XCBC: data 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 | XCBC: data 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 | XCBC: data 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 | XCBC: data 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 | XCBC: data 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 | XCBC: data 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 | XCBC: data 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 | XCBC: data 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 | XCBC: data 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 | XCBC: data 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 | XCBC: data 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 | XCBC: data 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 | XCBC: data 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 | XCBC: data 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 | XCBC: data 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 | XCBC: data 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 | XCBC: data 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 | XCBC: data 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 | XCBC: data 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 | XCBC: data 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 | XCBC: data 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 | XCBC: data 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 | XCBC: data 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 | XCBC: data 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 | XCBC: data 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 | XCBC: data 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 | XCBC: data 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 | XCBC: data 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 | XCBC: data 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 | XCBC: data 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 | XCBC: data 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 | XCBC: data 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 | XCBC: data 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 | XCBC: data 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 | XCBC: data 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 | XCBC: data 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 | XCBC: data 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 | XCBC: data 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 | XCBC: data 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 | XCBC: data 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 | XCBC: data 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 | XCBC: data 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 | XCBC: data 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 | XCBC: data 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 | XCBC: data 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 | XCBC: data 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 | XCBC: data 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 | XCBC: data 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 | XCBC: data 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 | XCBC: data 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 | XCBC: data 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 | XCBC: data 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 | XCBC: data 00 00 00 00 00 00 00 00 | K extracting all 16 bytes of key@0x5570e4be90c0 | K: symkey-key@0x5570e4be90c0 (16-bytes, AES_ECB) | : ephemeral-key@0x5570e4b65080 (16-bytes, AES_KEY_GEN) | K: new slot-key@0x5570e4be8ee0 (16-bytes, AES_ECB) | sizeof bytes 16 | wrapper: (SECItemType)1920429685: 4e 1f 9a 69 f6 4d ed 6d ea d6 4e f0 90 30 8a 92 | K: release slot-key-key@0x5570e4be8ee0 | K extracted len 16 bytes at 0x5570e4be8128 | unwrapped: 00 01 02 03 04 05 06 07 08 09 0a 0b 0c 0d 0e 0f | XCBC: K: 00 01 02 03 04 05 06 07 08 09 0a 0b 0c 0d 0e 0f | XCBC: K1 c3 52 80 57 54 23 7f 31 1a c0 ff f4 e3 e0 3e 78 | : ephemeral-key@0x5570e4b65080 (16-bytes, AES_KEY_GEN) | CONCATENATE_DATA_AND_BASE: | target: EXTRACT_KEY_FROM_KEY | base: base-key@0x5570e4b65080 (16-bytes, AES_KEY_GEN) | params: 16-bytes@0x7ffe19a09570 | result: k1-key@0x5570e4bec1c0 (32-bytes, EXTRACT_KEY_FROM_KEY) | key-offset: 0, key-size: 16 | EXTRACT_KEY_FROM_KEY: | target: AES_ECB | flags: SIGN | key_size: 16-bytes | base: base-key@0x5570e4bec1c0 (32-bytes, EXTRACT_KEY_FROM_KEY) | operation: FLAGS_ONLY | params: 8-bytes@0x7ffe19a09558 | result: k1-key@0x5570e4be6640 (16-bytes, AES_ECB) | k1: release tmp-key@0x5570e4bec1c0 | Computing E[63] using K3 | XCBC: K3 c1 a7 ab a1 a2 3a 94 06 58 07 a0 8c c8 ee d0 6e | XCBC: E[n-1] 5c 88 af cc 1e 1e 83 fc c4 2c 0c e4 12 12 f5 17 | XCBC: M[n] 00 00 00 00 00 00 00 00 | XCBC: M[n] 00 00 00 00 00 00 00 00 | XCBC: M[n]:80...^E[n-1]^K3 | 9d 2f 04 6d bc 24 17 fa 1c 2b ac 68 da fc 25 79 | XCBC: MAC f0 da fe e8 95 db 30 25 37 61 10 3b 5d 84 52 8f | xcbc: release k1-key@0x5570e4be6640 | : ephemeral-key@0x5570e4b65080 (16-bytes, AES_KEY_GEN) | CONCATENATE_DATA_AND_BASE: | target: EXTRACT_KEY_FROM_KEY | base: base-key@0x5570e4b65080 (16-bytes, AES_KEY_GEN) | params: 16-bytes@0x7ffe19a09600 | result: xcbc-key@0x5570e4bec1c0 (32-bytes, EXTRACT_KEY_FROM_KEY) | key-offset: 0, key-size: 16 | EXTRACT_KEY_FROM_KEY: | target: EXTRACT_KEY_FROM_KEY | key_size: 16-bytes | base: base-key@0x5570e4bec1c0 (32-bytes, EXTRACT_KEY_FROM_KEY) | operation: FLAGS_ONLY | params: 8-bytes@0x7ffe19a095e8 | result: xcbc-key@0x5570e4be6640 (16-bytes, EXTRACT_KEY_FROM_KEY) | xcbc: release tmp-key@0x5570e4bec1c0 | PRF symkey interface: release key-key@0x5570e4be90c0 | PRF symkey interface PRF aes_xcbc final-key@0x5570e4be6640 (size 16) | PRF symkey interface: key-key@0x5570e4be6640 (16-bytes, EXTRACT_KEY_FROM_KEY) | output: symkey-key@0x5570e4be6640 (16-bytes, EXTRACT_KEY_FROM_KEY) | RFC 3566 Test Case #7: AES-XCBC-MAC-96 with 1000-byte input extracting all 16 bytes of key@0x5570e4be6640 | RFC 3566 Test Case #7: AES-XCBC-MAC-96 with 1000-byte input: symkey-key@0x5570e4be6640 (16-bytes, EXTRACT_KEY_FROM_KEY) | : ephemeral-key@0x5570e4b65080 (16-bytes, AES_KEY_GEN) | RFC 3566 Test Case #7: AES-XCBC-MAC-96 with 1000-byte input: new slot-key@0x5570e4be8ee0 (16-bytes, EXTRACT_KEY_FROM_KEY) | sizeof bytes 16 | wrapper: (SECItemType)-464429206: f4 97 8c d7 0f 8a 52 02 ea f7 47 ae ff cb 05 ca | RFC 3566 Test Case #7: AES-XCBC-MAC-96 with 1000-byte input: release slot-key-key@0x5570e4be8ee0 | RFC 3566 Test Case #7: AES-XCBC-MAC-96 with 1000-byte input extracted len 16 bytes at 0x5570e4be8128 | unwrapped: f0 da fe e8 95 db 30 25 37 61 10 3b 5d 84 52 8f | verify_chunk_data: RFC 3566 Test Case #7: AES-XCBC-MAC-96 with 1000-byte input: ok | test_prf_vector: RFC 3566 Test Case #7: AES-XCBC-MAC-96 with 1000-byte input passed | test_prf_vector: release symkey-key@0x5570e4be6640 | test_prf_vector: release message-key@0x5570e4bea940 | test_prf_vector: release key-key@0x5570e4be4dc0 | test_prf_vector: release output-key@NULL RFC 4434 Test Case AES-XCBC-PRF-128 with 20-byte input (key length 16) | decode_to_chunk: test_prf_vector: input "0x000102030405060708090a0b0c0d0e0f" | decode_to_chunk: output: | 00 01 02 03 04 05 06 07 08 09 0a 0b 0c 0d 0e 0f | decode_to_chunk: test_prf_vector: input "0x000102030405060708090a0b0c0d0e0f10111213" | decode_to_chunk: output: | 00 01 02 03 04 05 06 07 08 09 0a 0b 0c 0d 0e 0f | 10 11 12 13 | decode_to_chunk: test_prf_vector: input "0x47f51b4564966215b8985c63055ed308" | decode_to_chunk: output: | 47 f5 1b 45 64 96 62 15 b8 98 5c 63 05 5e d3 08 | PRF chunk interface PRF aes_xcbc init key-chunk@0x5570e4be8c98 (length 16) | 00 01 02 03 04 05 06 07 08 09 0a 0b 0c 0d 0e 0f | : ephemeral-key@0x5570e4b65080 (16-bytes, AES_KEY_GEN) | CONCATENATE_DATA_AND_BASE: | target: EXTRACT_KEY_FROM_KEY | base: base-key@0x5570e4b65080 (16-bytes, AES_KEY_GEN) | params: 16-bytes@0x7ffe19a095f0 | result: key-key@0x5570e4bea940 (32-bytes, EXTRACT_KEY_FROM_KEY) | key-offset: 0, key-size: 16 | EXTRACT_KEY_FROM_KEY: | target: EXTRACT_KEY_FROM_KEY | key_size: 16-bytes | base: base-key@0x5570e4bea940 (32-bytes, EXTRACT_KEY_FROM_KEY) | operation: FLAGS_ONLY | params: 8-bytes@0x7ffe19a095d8 | result: key-key@0x5570e4be4dc0 (16-bytes, EXTRACT_KEY_FROM_KEY) | key: release tmp-key@0x5570e4bea940 | XCBC: Key 16=16 just right | key-offset: 0, key-size: 16 | EXTRACT_KEY_FROM_KEY: | target: AES_ECB | flags: SIGN | key_size: 16-bytes | base: base-key@0x5570e4be4dc0 (16-bytes, EXTRACT_KEY_FROM_KEY) | operation: FLAGS_ONLY | params: 8-bytes@0x7ffe19a095b8 | result: key-key@0x5570e4bea940 (16-bytes, AES_ECB) | PRF chunk interface: release clone-key@0x5570e4be4dc0 | PRF chunk interface PRF aes_xcbc crypt-prf@0x5570e4be7ee8 | PRF chunk interface PRF aes_xcbc update message-bytes@0x5570e4be35b8 (length 20) | 00 01 02 03 04 05 06 07 08 09 0a 0b 0c 0d 0e 0f | 10 11 12 13 | XCBC: data 00 01 02 03 04 05 06 07 08 09 0a 0b 0c 0d 0e 0f | XCBC: data 10 11 12 13 | K extracting all 16 bytes of key@0x5570e4bea940 | K: symkey-key@0x5570e4bea940 (16-bytes, AES_ECB) | : ephemeral-key@0x5570e4b65080 (16-bytes, AES_KEY_GEN) | K: new slot-key@0x5570e4be8ee0 (16-bytes, AES_ECB) | sizeof bytes 16 | wrapper: (SECItemType)540618784: 4e 1f 9a 69 f6 4d ed 6d ea d6 4e f0 90 30 8a 92 | K: release slot-key-key@0x5570e4be8ee0 | K extracted len 16 bytes at 0x5570e4be87e8 | unwrapped: 00 01 02 03 04 05 06 07 08 09 0a 0b 0c 0d 0e 0f | XCBC: K: 00 01 02 03 04 05 06 07 08 09 0a 0b 0c 0d 0e 0f | XCBC: K1 c3 52 80 57 54 23 7f 31 1a c0 ff f4 e3 e0 3e 78 | : ephemeral-key@0x5570e4b65080 (16-bytes, AES_KEY_GEN) | CONCATENATE_DATA_AND_BASE: | target: EXTRACT_KEY_FROM_KEY | base: base-key@0x5570e4b65080 (16-bytes, AES_KEY_GEN) | params: 16-bytes@0x7ffe19a09550 | result: k1-key@0x5570e4be6640 (32-bytes, EXTRACT_KEY_FROM_KEY) | key-offset: 0, key-size: 16 | EXTRACT_KEY_FROM_KEY: | target: AES_ECB | flags: SIGN | key_size: 16-bytes | base: base-key@0x5570e4be6640 (32-bytes, EXTRACT_KEY_FROM_KEY) | operation: FLAGS_ONLY | params: 8-bytes@0x7ffe19a09538 | result: k1-key@0x5570e4be4dc0 (16-bytes, AES_ECB) | k1: release tmp-key@0x5570e4be6640 | Computing E[2] using K3 | XCBC: K3 c1 a7 ab a1 a2 3a 94 06 58 07 a0 8c c8 ee d0 6e | XCBC: E[n-1] 1d 04 48 fa cf 4d 9c 6f 55 b9 93 da 09 80 3d b3 | XCBC: M[n] 10 11 12 13 | XCBC: M[n] 10 11 12 13 | XCBC: M[n]:80...^E[n-1]^K3 | cc b2 f1 48 ed 77 08 69 0d be 33 56 c1 6e ed dd | XCBC: MAC 47 f5 1b 45 64 96 62 15 b8 98 5c 63 05 5e d3 08 | xcbc: release k1-key@0x5570e4be4dc0 | PRF chunk interface: release key-key@0x5570e4bea940 | PRF chunk interface PRF aes_xcbc final-chunk@0x5570e4be8128 (length 16) | 47 f5 1b 45 64 96 62 15 b8 98 5c 63 05 5e d3 08 | chunk output 47 f5 1b 45 64 96 62 15 b8 98 5c 63 05 5e d3 08 | verify_chunk_data: RFC 4434 Test Case AES-XCBC-PRF-128 with 20-byte input (key length 16): ok | : ephemeral-key@0x5570e4b65080 (16-bytes, AES_KEY_GEN) | CONCATENATE_DATA_AND_BASE: | target: EXTRACT_KEY_FROM_KEY | base: base-key@0x5570e4b65080 (16-bytes, AES_KEY_GEN) | params: 16-bytes@0x7ffe19a09660 | result: key symkey-key@0x5570e4be4dc0 (32-bytes, EXTRACT_KEY_FROM_KEY) | key-offset: 0, key-size: 16 | EXTRACT_KEY_FROM_KEY: | target: EXTRACT_KEY_FROM_KEY | key_size: 16-bytes | base: base-key@0x5570e4be4dc0 (32-bytes, EXTRACT_KEY_FROM_KEY) | operation: FLAGS_ONLY | params: 8-bytes@0x7ffe19a09648 | result: key symkey-key@0x5570e4bea940 (16-bytes, EXTRACT_KEY_FROM_KEY) | key symkey: release tmp-key@0x5570e4be4dc0 | PRF symkey interface PRF aes_xcbc init key symkey-key@0x5570e4bea940 (size 16) | PRF symkey interface: key symkey-key@0x5570e4bea940 (16-bytes, EXTRACT_KEY_FROM_KEY) | XCBC: Key 16=16 just right | key-offset: 0, key-size: 16 | EXTRACT_KEY_FROM_KEY: | target: AES_ECB | flags: SIGN | key_size: 16-bytes | base: base-key@0x5570e4bea940 (16-bytes, EXTRACT_KEY_FROM_KEY) | operation: FLAGS_ONLY | params: 8-bytes@0x7ffe19a095e8 | result: key symkey-key@0x5570e4be4dc0 (16-bytes, AES_ECB) | PRF symkey interface PRF aes_xcbc crypt-prf@0x5570e4be7ee8 | : ephemeral-key@0x5570e4b65080 (16-bytes, AES_KEY_GEN) | CONCATENATE_DATA_AND_BASE: | target: EXTRACT_KEY_FROM_KEY | base: base-key@0x5570e4b65080 (16-bytes, AES_KEY_GEN) | params: 16-bytes@0x7ffe19a09660 | result: message symkey-key@0x5570e4be90c0 (36-bytes, EXTRACT_KEY_FROM_KEY) | key-offset: 0, key-size: 20 | EXTRACT_KEY_FROM_KEY: | target: EXTRACT_KEY_FROM_KEY | key_size: 20-bytes | base: base-key@0x5570e4be90c0 (36-bytes, EXTRACT_KEY_FROM_KEY) | operation: FLAGS_ONLY | params: 8-bytes@0x7ffe19a09648 | result: message symkey-key@0x5570e4be6640 (20-bytes, EXTRACT_KEY_FROM_KEY) | message symkey: release tmp-key@0x5570e4be90c0 | PRF symkey interface PRF aes_xcbc update symkey message-key@0x5570e4be6640 (size 20) | PRF symkey interface: symkey message-key@0x5570e4be6640 (20-bytes, EXTRACT_KEY_FROM_KEY) | symkey message extracting all 20 bytes of key@0x5570e4be6640 | symkey message: symkey-key@0x5570e4be6640 (20-bytes, EXTRACT_KEY_FROM_KEY) | : ephemeral-key@0x5570e4b65080 (16-bytes, AES_KEY_GEN) | symkey message: new slot-key@0x5570e4be8ee0 (20-bytes, EXTRACT_KEY_FROM_KEY) | sizeof bytes 32 | wrapper: (SECItemType)-464429152: 4e 1f 9a 69 f6 4d ed 6d ea d6 4e f0 90 30 8a 92 e7 ea 4a a7 b5 bc 5b ad 11 0e d8 fe 14 d6 b1 d7 | symkey message: release slot-key-key@0x5570e4be8ee0 | symkey message extracted len 32 bytes at 0x5570e4be7f88 | unwrapped: 00 01 02 03 04 05 06 07 08 09 0a 0b 0c 0d 0e 0f | unwrapped: 10 11 12 13 00 00 00 00 00 00 00 00 00 00 00 00 | XCBC: data 00 01 02 03 04 05 06 07 08 09 0a 0b 0c 0d 0e 0f | XCBC: data 10 11 12 13 | K extracting all 16 bytes of key@0x5570e4be4dc0 | K: symkey-key@0x5570e4be4dc0 (16-bytes, AES_ECB) | : ephemeral-key@0x5570e4b65080 (16-bytes, AES_KEY_GEN) | K: new slot-key@0x5570e4be8ee0 (16-bytes, AES_ECB) | sizeof bytes 16 | wrapper: (SECItemType)1920429685: 4e 1f 9a 69 f6 4d ed 6d ea d6 4e f0 90 30 8a 92 | K: release slot-key-key@0x5570e4be8ee0 | K extracted len 16 bytes at 0x5570e4be8bf8 | unwrapped: 00 01 02 03 04 05 06 07 08 09 0a 0b 0c 0d 0e 0f | XCBC: K: 00 01 02 03 04 05 06 07 08 09 0a 0b 0c 0d 0e 0f | XCBC: K1 c3 52 80 57 54 23 7f 31 1a c0 ff f4 e3 e0 3e 78 | : ephemeral-key@0x5570e4b65080 (16-bytes, AES_KEY_GEN) | CONCATENATE_DATA_AND_BASE: | target: EXTRACT_KEY_FROM_KEY | base: base-key@0x5570e4b65080 (16-bytes, AES_KEY_GEN) | params: 16-bytes@0x7ffe19a09570 | result: k1-key@0x5570e4bec1c0 (32-bytes, EXTRACT_KEY_FROM_KEY) | key-offset: 0, key-size: 16 | EXTRACT_KEY_FROM_KEY: | target: AES_ECB | flags: SIGN | key_size: 16-bytes | base: base-key@0x5570e4bec1c0 (32-bytes, EXTRACT_KEY_FROM_KEY) | operation: FLAGS_ONLY | params: 8-bytes@0x7ffe19a09558 | result: k1-key@0x5570e4be90c0 (16-bytes, AES_ECB) | k1: release tmp-key@0x5570e4bec1c0 | Computing E[2] using K3 | XCBC: K3 c1 a7 ab a1 a2 3a 94 06 58 07 a0 8c c8 ee d0 6e | XCBC: E[n-1] 1d 04 48 fa cf 4d 9c 6f 55 b9 93 da 09 80 3d b3 | XCBC: M[n] 10 11 12 13 | XCBC: M[n] 10 11 12 13 | XCBC: M[n]:80...^E[n-1]^K3 | cc b2 f1 48 ed 77 08 69 0d be 33 56 c1 6e ed dd | XCBC: MAC 47 f5 1b 45 64 96 62 15 b8 98 5c 63 05 5e d3 08 | xcbc: release k1-key@0x5570e4be90c0 | : ephemeral-key@0x5570e4b65080 (16-bytes, AES_KEY_GEN) | CONCATENATE_DATA_AND_BASE: | target: EXTRACT_KEY_FROM_KEY | base: base-key@0x5570e4b65080 (16-bytes, AES_KEY_GEN) | params: 16-bytes@0x7ffe19a09600 | result: xcbc-key@0x5570e4bec1c0 (32-bytes, EXTRACT_KEY_FROM_KEY) | key-offset: 0, key-size: 16 | EXTRACT_KEY_FROM_KEY: | target: EXTRACT_KEY_FROM_KEY | key_size: 16-bytes | base: base-key@0x5570e4bec1c0 (32-bytes, EXTRACT_KEY_FROM_KEY) | operation: FLAGS_ONLY | params: 8-bytes@0x7ffe19a095e8 | result: xcbc-key@0x5570e4be90c0 (16-bytes, EXTRACT_KEY_FROM_KEY) | xcbc: release tmp-key@0x5570e4bec1c0 | PRF symkey interface: release key-key@0x5570e4be4dc0 | PRF symkey interface PRF aes_xcbc final-key@0x5570e4be90c0 (size 16) | PRF symkey interface: key-key@0x5570e4be90c0 (16-bytes, EXTRACT_KEY_FROM_KEY) | output: symkey-key@0x5570e4be90c0 (16-bytes, EXTRACT_KEY_FROM_KEY) | RFC 4434 Test Case AES-XCBC-PRF-128 with 20-byte input (key length 16) extracting all 16 bytes of key@0x5570e4be90c0 | RFC 4434 Test Case AES-XCBC-PRF-128 with 20-byte input (key length 16): symkey-key@0x5570e4be90c0 (16-bytes, EXTRACT_KEY_FROM_KEY) | : ephemeral-key@0x5570e4b65080 (16-bytes, AES_KEY_GEN) | RFC 4434 Test Case AES-XCBC-PRF-128 with 20-byte input (key length 16): new slot-key@0x5570e4be8ee0 (16-bytes, EXTRACT_KEY_FROM_KEY) | sizeof bytes 16 | wrapper: (SECItemType)-464429206: 45 53 39 1b e9 d5 20 ba 28 e2 4b 0f 17 ee 3c 4f | RFC 4434 Test Case AES-XCBC-PRF-128 with 20-byte input (key length 16): release slot-key-key@0x5570e4be8ee0 | RFC 4434 Test Case AES-XCBC-PRF-128 with 20-byte input (key length 16) extracted len 16 bytes at 0x5570e4be8bf8 | unwrapped: 47 f5 1b 45 64 96 62 15 b8 98 5c 63 05 5e d3 08 | verify_chunk_data: RFC 4434 Test Case AES-XCBC-PRF-128 with 20-byte input (key length 16): ok | test_prf_vector: RFC 4434 Test Case AES-XCBC-PRF-128 with 20-byte input (key length 16) passed | test_prf_vector: release symkey-key@0x5570e4be90c0 | test_prf_vector: release message-key@0x5570e4be6640 | test_prf_vector: release key-key@0x5570e4bea940 | test_prf_vector: release output-key@NULL RFC 4434 Test Case AES-XCBC-PRF-128 with 20-byte input (key length 10) | decode_to_chunk: test_prf_vector: input "0x00010203040506070809" | decode_to_chunk: output: | 00 01 02 03 04 05 06 07 08 09 | decode_to_chunk: test_prf_vector: input "0x000102030405060708090a0b0c0d0e0f10111213" | decode_to_chunk: output: | 00 01 02 03 04 05 06 07 08 09 0a 0b 0c 0d 0e 0f | 10 11 12 13 | decode_to_chunk: test_prf_vector: input "0x0fa087af7d866e7653434e602fdde835" | decode_to_chunk: output: | 0f a0 87 af 7d 86 6e 76 53 43 4e 60 2f dd e8 35 | PRF chunk interface PRF aes_xcbc init key-chunk@0x5570e4be87a8 (length 10) | 00 01 02 03 04 05 06 07 08 09 | : ephemeral-key@0x5570e4b65080 (16-bytes, AES_KEY_GEN) | CONCATENATE_DATA_AND_BASE: | target: EXTRACT_KEY_FROM_KEY | base: base-key@0x5570e4b65080 (16-bytes, AES_KEY_GEN) | params: 16-bytes@0x7ffe19a095f0 | result: key-key@0x5570e4be6640 (26-bytes, EXTRACT_KEY_FROM_KEY) | key-offset: 0, key-size: 10 | EXTRACT_KEY_FROM_KEY: | target: EXTRACT_KEY_FROM_KEY | key_size: 10-bytes | base: base-key@0x5570e4be6640 (26-bytes, EXTRACT_KEY_FROM_KEY) | operation: FLAGS_ONLY | params: 8-bytes@0x7ffe19a095d8 | result: key-key@0x5570e4bea940 (10-bytes, EXTRACT_KEY_FROM_KEY) | key: release tmp-key@0x5570e4be6640 | XCBC: Key 10<16 too small, padding with zeros | xcbc: reference tmp-key@0x5570e4bea940 | CONCATENATE_BASE_AND_DATA: | target: EXTRACT_KEY_FROM_KEY | base: base-key@0x5570e4bea940 (10-bytes, EXTRACT_KEY_FROM_KEY) | params: 16-bytes@0x7ffe19a09590 | result: tmp+=0-key@0x5570e4be6640 (16-bytes, EXTRACT_KEY_FROM_KEY) | append_symkey_bytes: release lhs-key@0x5570e4bea940 | key-offset: 0, key-size: 16 | EXTRACT_KEY_FROM_KEY: | target: AES_ECB | flags: SIGN | key_size: 16-bytes | base: base-key@0x5570e4be6640 (16-bytes, EXTRACT_KEY_FROM_KEY) | operation: FLAGS_ONLY | params: 8-bytes@0x7ffe19a095b8 | result: PRF chunk interface-key@0x5570e4be90c0 (16-bytes, AES_ECB) | PRF chunk interface: release tmp-key@0x5570e4be6640 | PRF chunk interface: release clone-key@0x5570e4bea940 | PRF chunk interface PRF aes_xcbc crypt-prf@0x5570e4be7ee8 | PRF chunk interface PRF aes_xcbc update message-bytes@0x5570e4be35b8 (length 20) | 00 01 02 03 04 05 06 07 08 09 0a 0b 0c 0d 0e 0f | 10 11 12 13 | XCBC: data 00 01 02 03 04 05 06 07 08 09 0a 0b 0c 0d 0e 0f | XCBC: data 10 11 12 13 | K extracting all 16 bytes of key@0x5570e4be90c0 | K: symkey-key@0x5570e4be90c0 (16-bytes, AES_ECB) | : ephemeral-key@0x5570e4b65080 (16-bytes, AES_KEY_GEN) | K: new slot-key@0x5570e4be8ee0 (16-bytes, AES_ECB) | sizeof bytes 16 | wrapper: (SECItemType)540618784: 00 97 d2 ba 26 24 4a 53 ff 05 05 55 49 6c 24 98 | K: release slot-key-key@0x5570e4be8ee0 | K extracted len 16 bytes at 0x5570e4be81d8 | unwrapped: 00 01 02 03 04 05 06 07 08 09 00 00 00 00 00 00 | XCBC: K: 00 01 02 03 04 05 06 07 08 09 00 00 00 00 00 00 | XCBC: K1 50 ca b2 4d 03 34 45 5e 40 7b 25 0f dd 7c f8 d5 | : ephemeral-key@0x5570e4b65080 (16-bytes, AES_KEY_GEN) | CONCATENATE_DATA_AND_BASE: | target: EXTRACT_KEY_FROM_KEY | base: base-key@0x5570e4b65080 (16-bytes, AES_KEY_GEN) | params: 16-bytes@0x7ffe19a09550 | result: k1-key@0x5570e4be6640 (32-bytes, EXTRACT_KEY_FROM_KEY) | key-offset: 0, key-size: 16 | EXTRACT_KEY_FROM_KEY: | target: AES_ECB | flags: SIGN | key_size: 16-bytes | base: base-key@0x5570e4be6640 (32-bytes, EXTRACT_KEY_FROM_KEY) | operation: FLAGS_ONLY | params: 8-bytes@0x7ffe19a09538 | result: k1-key@0x5570e4bea940 (16-bytes, AES_ECB) | k1: release tmp-key@0x5570e4be6640 | Computing E[2] using K3 | XCBC: K3 8e f7 48 db 56 f1 f7 26 24 72 f2 c5 63 b0 3f 88 | XCBC: E[n-1] fe 1f 63 e9 65 1a 4b bb 3c cc cd 0d cc 83 e4 30 | XCBC: M[n] 10 11 12 13 | XCBC: M[n] 10 11 12 13 | XCBC: M[n]:80...^E[n-1]^K3 | 60 f9 39 21 b3 eb bc 9d 18 be 3f c8 af 33 db b8 | XCBC: MAC 0f a0 87 af 7d 86 6e 76 53 43 4e 60 2f dd e8 35 | xcbc: release k1-key@0x5570e4bea940 | PRF chunk interface: release key-key@0x5570e4be90c0 | PRF chunk interface PRF aes_xcbc final-chunk@0x5570e4be8bf8 (length 16) | 0f a0 87 af 7d 86 6e 76 53 43 4e 60 2f dd e8 35 | chunk output 0f a0 87 af 7d 86 6e 76 53 43 4e 60 2f dd e8 35 | verify_chunk_data: RFC 4434 Test Case AES-XCBC-PRF-128 with 20-byte input (key length 10): ok | : ephemeral-key@0x5570e4b65080 (16-bytes, AES_KEY_GEN) | CONCATENATE_DATA_AND_BASE: | target: EXTRACT_KEY_FROM_KEY | base: base-key@0x5570e4b65080 (16-bytes, AES_KEY_GEN) | params: 16-bytes@0x7ffe19a09660 | result: key symkey-key@0x5570e4bea940 (26-bytes, EXTRACT_KEY_FROM_KEY) | key-offset: 0, key-size: 10 | EXTRACT_KEY_FROM_KEY: | target: EXTRACT_KEY_FROM_KEY | key_size: 10-bytes | base: base-key@0x5570e4bea940 (26-bytes, EXTRACT_KEY_FROM_KEY) | operation: FLAGS_ONLY | params: 8-bytes@0x7ffe19a09648 | result: key symkey-key@0x5570e4be90c0 (10-bytes, EXTRACT_KEY_FROM_KEY) | key symkey: release tmp-key@0x5570e4bea940 | PRF symkey interface PRF aes_xcbc init key symkey-key@0x5570e4be90c0 (size 10) | PRF symkey interface: key symkey-key@0x5570e4be90c0 (10-bytes, EXTRACT_KEY_FROM_KEY) | XCBC: Key 10<16 too small, padding with zeros | xcbc: reference tmp-key@0x5570e4be90c0 | CONCATENATE_BASE_AND_DATA: | target: EXTRACT_KEY_FROM_KEY | base: base-key@0x5570e4be90c0 (10-bytes, EXTRACT_KEY_FROM_KEY) | params: 16-bytes@0x7ffe19a095c0 | result: tmp+=0-key@0x5570e4bea940 (16-bytes, EXTRACT_KEY_FROM_KEY) | append_symkey_bytes: release lhs-key@0x5570e4be90c0 | key-offset: 0, key-size: 16 | EXTRACT_KEY_FROM_KEY: | target: AES_ECB | flags: SIGN | key_size: 16-bytes | base: base-key@0x5570e4bea940 (16-bytes, EXTRACT_KEY_FROM_KEY) | operation: FLAGS_ONLY | params: 8-bytes@0x7ffe19a095e8 | result: PRF symkey interface-key@0x5570e4be6640 (16-bytes, AES_ECB) | PRF symkey interface: release tmp-key@0x5570e4bea940 | PRF symkey interface PRF aes_xcbc crypt-prf@0x5570e4be7ee8 | : ephemeral-key@0x5570e4b65080 (16-bytes, AES_KEY_GEN) | CONCATENATE_DATA_AND_BASE: | target: EXTRACT_KEY_FROM_KEY | base: base-key@0x5570e4b65080 (16-bytes, AES_KEY_GEN) | params: 16-bytes@0x7ffe19a09660 | result: message symkey-key@0x5570e4be4dc0 (36-bytes, EXTRACT_KEY_FROM_KEY) | key-offset: 0, key-size: 20 | EXTRACT_KEY_FROM_KEY: | target: EXTRACT_KEY_FROM_KEY | key_size: 20-bytes | base: base-key@0x5570e4be4dc0 (36-bytes, EXTRACT_KEY_FROM_KEY) | operation: FLAGS_ONLY | params: 8-bytes@0x7ffe19a09648 | result: message symkey-key@0x5570e4bea940 (20-bytes, EXTRACT_KEY_FROM_KEY) | message symkey: release tmp-key@0x5570e4be4dc0 | PRF symkey interface PRF aes_xcbc update symkey message-key@0x5570e4bea940 (size 20) | PRF symkey interface: symkey message-key@0x5570e4bea940 (20-bytes, EXTRACT_KEY_FROM_KEY) | symkey message extracting all 20 bytes of key@0x5570e4bea940 | symkey message: symkey-key@0x5570e4bea940 (20-bytes, EXTRACT_KEY_FROM_KEY) | : ephemeral-key@0x5570e4b65080 (16-bytes, AES_KEY_GEN) | symkey message: new slot-key@0x5570e4be8ee0 (20-bytes, EXTRACT_KEY_FROM_KEY) | sizeof bytes 32 | wrapper: (SECItemType)-464429152: 4e 1f 9a 69 f6 4d ed 6d ea d6 4e f0 90 30 8a 92 e7 ea 4a a7 b5 bc 5b ad 11 0e d8 fe 14 d6 b1 d7 | symkey message: release slot-key-key@0x5570e4be8ee0 | symkey message extracted len 32 bytes at 0x5570e4be7f88 | unwrapped: 00 01 02 03 04 05 06 07 08 09 0a 0b 0c 0d 0e 0f | unwrapped: 10 11 12 13 00 00 00 00 00 00 00 00 00 00 00 00 | XCBC: data 00 01 02 03 04 05 06 07 08 09 0a 0b 0c 0d 0e 0f | XCBC: data 10 11 12 13 | K extracting all 16 bytes of key@0x5570e4be6640 | K: symkey-key@0x5570e4be6640 (16-bytes, AES_ECB) | : ephemeral-key@0x5570e4b65080 (16-bytes, AES_KEY_GEN) | K: new slot-key@0x5570e4be8ee0 (16-bytes, AES_ECB) | sizeof bytes 16 | wrapper: (SECItemType)1920429685: 00 97 d2 ba 26 24 4a 53 ff 05 05 55 49 6c 24 98 | K: release slot-key-key@0x5570e4be8ee0 | K extracted len 16 bytes at 0x5570e4be8128 | unwrapped: 00 01 02 03 04 05 06 07 08 09 00 00 00 00 00 00 | XCBC: K: 00 01 02 03 04 05 06 07 08 09 00 00 00 00 00 00 | XCBC: K1 50 ca b2 4d 03 34 45 5e 40 7b 25 0f dd 7c f8 d5 | : ephemeral-key@0x5570e4b65080 (16-bytes, AES_KEY_GEN) | CONCATENATE_DATA_AND_BASE: | target: EXTRACT_KEY_FROM_KEY | base: base-key@0x5570e4b65080 (16-bytes, AES_KEY_GEN) | params: 16-bytes@0x7ffe19a09570 | result: k1-key@0x5570e4bec1c0 (32-bytes, EXTRACT_KEY_FROM_KEY) | key-offset: 0, key-size: 16 | EXTRACT_KEY_FROM_KEY: | target: AES_ECB | flags: SIGN | key_size: 16-bytes | base: base-key@0x5570e4bec1c0 (32-bytes, EXTRACT_KEY_FROM_KEY) | operation: FLAGS_ONLY | params: 8-bytes@0x7ffe19a09558 | result: k1-key@0x5570e4be4dc0 (16-bytes, AES_ECB) | k1: release tmp-key@0x5570e4bec1c0 | Computing E[2] using K3 | XCBC: K3 8e f7 48 db 56 f1 f7 26 24 72 f2 c5 63 b0 3f 88 | XCBC: E[n-1] fe 1f 63 e9 65 1a 4b bb 3c cc cd 0d cc 83 e4 30 | XCBC: M[n] 10 11 12 13 | XCBC: M[n] 10 11 12 13 | XCBC: M[n]:80...^E[n-1]^K3 | 60 f9 39 21 b3 eb bc 9d 18 be 3f c8 af 33 db b8 | XCBC: MAC 0f a0 87 af 7d 86 6e 76 53 43 4e 60 2f dd e8 35 | xcbc: release k1-key@0x5570e4be4dc0 | : ephemeral-key@0x5570e4b65080 (16-bytes, AES_KEY_GEN) | CONCATENATE_DATA_AND_BASE: | target: EXTRACT_KEY_FROM_KEY | base: base-key@0x5570e4b65080 (16-bytes, AES_KEY_GEN) | params: 16-bytes@0x7ffe19a09600 | result: xcbc-key@0x5570e4bec1c0 (32-bytes, EXTRACT_KEY_FROM_KEY) | key-offset: 0, key-size: 16 | EXTRACT_KEY_FROM_KEY: | target: EXTRACT_KEY_FROM_KEY | key_size: 16-bytes | base: base-key@0x5570e4bec1c0 (32-bytes, EXTRACT_KEY_FROM_KEY) | operation: FLAGS_ONLY | params: 8-bytes@0x7ffe19a095e8 | result: xcbc-key@0x5570e4be4dc0 (16-bytes, EXTRACT_KEY_FROM_KEY) | xcbc: release tmp-key@0x5570e4bec1c0 | PRF symkey interface: release key-key@0x5570e4be6640 | PRF symkey interface PRF aes_xcbc final-key@0x5570e4be4dc0 (size 16) | PRF symkey interface: key-key@0x5570e4be4dc0 (16-bytes, EXTRACT_KEY_FROM_KEY) | output: symkey-key@0x5570e4be4dc0 (16-bytes, EXTRACT_KEY_FROM_KEY) | RFC 4434 Test Case AES-XCBC-PRF-128 with 20-byte input (key length 10) extracting all 16 bytes of key@0x5570e4be4dc0 | RFC 4434 Test Case AES-XCBC-PRF-128 with 20-byte input (key length 10): symkey-key@0x5570e4be4dc0 (16-bytes, EXTRACT_KEY_FROM_KEY) | : ephemeral-key@0x5570e4b65080 (16-bytes, AES_KEY_GEN) | RFC 4434 Test Case AES-XCBC-PRF-128 with 20-byte input (key length 10): new slot-key@0x5570e4be8ee0 (16-bytes, EXTRACT_KEY_FROM_KEY) | sizeof bytes 16 | wrapper: (SECItemType)-464429206: 13 97 4f 0a e7 be 6d 55 41 0a 80 7e 03 38 40 e5 | RFC 4434 Test Case AES-XCBC-PRF-128 with 20-byte input (key length 10): release slot-key-key@0x5570e4be8ee0 | RFC 4434 Test Case AES-XCBC-PRF-128 with 20-byte input (key length 10) extracted len 16 bytes at 0x5570e4be8128 | unwrapped: 0f a0 87 af 7d 86 6e 76 53 43 4e 60 2f dd e8 35 | verify_chunk_data: RFC 4434 Test Case AES-XCBC-PRF-128 with 20-byte input (key length 10): ok | test_prf_vector: RFC 4434 Test Case AES-XCBC-PRF-128 with 20-byte input (key length 10) passed | test_prf_vector: release symkey-key@0x5570e4be4dc0 | test_prf_vector: release message-key@0x5570e4bea940 | test_prf_vector: release key-key@0x5570e4be90c0 | test_prf_vector: release output-key@NULL RFC 4434 Test Case AES-XCBC-PRF-128 with 20-byte input (key length 18) | decode_to_chunk: test_prf_vector: input "0x000102030405060708090a0b0c0d0e0fedcb" | decode_to_chunk: output: | 00 01 02 03 04 05 06 07 08 09 0a 0b 0c 0d 0e 0f | ed cb | decode_to_chunk: test_prf_vector: input "0x000102030405060708090a0b0c0d0e0f10111213" | decode_to_chunk: output: | 00 01 02 03 04 05 06 07 08 09 0a 0b 0c 0d 0e 0f | 10 11 12 13 | decode_to_chunk: test_prf_vector: input "0x8cd3c93ae598a9803006ffb67c40e9e4" | decode_to_chunk: output: | 8c d3 c9 3a e5 98 a9 80 30 06 ff b6 7c 40 e9 e4 | PRF chunk interface PRF aes_xcbc init key-chunk@0x5570e4be35b8 (length 18) | 00 01 02 03 04 05 06 07 08 09 0a 0b 0c 0d 0e 0f | ed cb | : ephemeral-key@0x5570e4b65080 (16-bytes, AES_KEY_GEN) | CONCATENATE_DATA_AND_BASE: | target: EXTRACT_KEY_FROM_KEY | base: base-key@0x5570e4b65080 (16-bytes, AES_KEY_GEN) | params: 16-bytes@0x7ffe19a095f0 | result: key-key@0x5570e4bea940 (34-bytes, EXTRACT_KEY_FROM_KEY) | key-offset: 0, key-size: 18 | EXTRACT_KEY_FROM_KEY: | target: EXTRACT_KEY_FROM_KEY | key_size: 18-bytes | base: base-key@0x5570e4bea940 (34-bytes, EXTRACT_KEY_FROM_KEY) | operation: FLAGS_ONLY | params: 8-bytes@0x7ffe19a095d8 | result: key-key@0x5570e4be90c0 (18-bytes, EXTRACT_KEY_FROM_KEY) | key: release tmp-key@0x5570e4bea940 | XCBC: Key 18>16 too big, rehashing to size | : ephemeral-key@0x5570e4b65080 (16-bytes, AES_KEY_GEN) | CONCATENATE_DATA_AND_BASE: | target: EXTRACT_KEY_FROM_KEY | base: base-key@0x5570e4b65080 (16-bytes, AES_KEY_GEN) | params: 16-bytes@0x7ffe19a09590 | result: key-key@0x5570e4be4dc0 (32-bytes, EXTRACT_KEY_FROM_KEY) | key-offset: 0, key-size: 16 | EXTRACT_KEY_FROM_KEY: | target: AES_ECB | flags: SIGN | key_size: 16-bytes | base: base-key@0x5570e4be4dc0 (32-bytes, EXTRACT_KEY_FROM_KEY) | operation: FLAGS_ONLY | params: 8-bytes@0x7ffe19a09578 | result: key-key@0x5570e4bea940 (16-bytes, AES_ECB) | key: release tmp-key@0x5570e4be4dc0 | key extracting all 18 bytes of key@0x5570e4be90c0 | key: symkey-key@0x5570e4be90c0 (18-bytes, EXTRACT_KEY_FROM_KEY) | : ephemeral-key@0x5570e4b65080 (16-bytes, AES_KEY_GEN) | key: new slot-key@0x5570e4be8ee0 (18-bytes, EXTRACT_KEY_FROM_KEY) | sizeof bytes 32 | wrapper: (SECItemType)1701522796: 4e 1f 9a 69 f6 4d ed 6d ea d6 4e f0 90 30 8a 92 b4 49 69 e5 c5 72 83 89 0b c5 15 fc 31 df 26 db | key: release slot-key-key@0x5570e4be8ee0 | key extracted len 32 bytes at 0x5570e4be7f88 | unwrapped: 00 01 02 03 04 05 06 07 08 09 0a 0b 0c 0d 0e 0f | unwrapped: ed cb 00 00 00 00 00 00 00 00 00 00 00 00 00 00 | XCBC: data 00 01 02 03 04 05 06 07 08 09 0a 0b 0c 0d 0e 0f | XCBC: data ed cb | K extracting all 16 bytes of key@0x5570e4bea940 | K: symkey-key@0x5570e4bea940 (16-bytes, AES_ECB) | : ephemeral-key@0x5570e4b65080 (16-bytes, AES_KEY_GEN) | K: new slot-key@0x5570e4be8ee0 (16-bytes, AES_ECB) | sizeof bytes 16 | wrapper: (SECItemType)808460336: ac 74 c2 9c 0e e7 5f 8f 8c 3f 4f 9e e6 76 bf 22 | K: release slot-key-key@0x5570e4be8ee0 | K extracted len 16 bytes at 0x5570e4be8128 | unwrapped: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 | XCBC: K: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 | XCBC: K1 e1 4d 5d 0e e2 77 15 df 08 b4 15 2b a2 3d a8 e0 | : ephemeral-key@0x5570e4b65080 (16-bytes, AES_KEY_GEN) | CONCATENATE_DATA_AND_BASE: | target: EXTRACT_KEY_FROM_KEY | base: base-key@0x5570e4b65080 (16-bytes, AES_KEY_GEN) | params: 16-bytes@0x7ffe19a09510 | result: k1-key@0x5570e4be6640 (32-bytes, EXTRACT_KEY_FROM_KEY) | key-offset: 0, key-size: 16 | EXTRACT_KEY_FROM_KEY: | target: AES_ECB | flags: SIGN | key_size: 16-bytes | base: base-key@0x5570e4be6640 (32-bytes, EXTRACT_KEY_FROM_KEY) | operation: FLAGS_ONLY | params: 8-bytes@0x7ffe19a094f8 | result: k1-key@0x5570e4be4dc0 (16-bytes, AES_ECB) | k1: release tmp-key@0x5570e4be6640 | Computing E[2] using K3 | XCBC: K3 8d 34 ef cb 3b d5 45 ca 06 2a ec df ef 7c 0b fa | XCBC: E[n-1] 0b 72 b2 ae 0a 37 79 81 75 6a d5 9c 79 c0 e6 96 | XCBC: M[n] ed cb | XCBC: M[n] ed cb | XCBC: M[n]:80...^E[n-1]^K3 | 6b 8d dd 65 31 e2 3c 4b 73 40 39 43 96 bc ed 6c | XCBC: MAC 5d 93 a5 3b 80 a3 e4 06 90 d2 4c ea e1 44 9c 0e | xcbc: release k1-key@0x5570e4be4dc0 | : ephemeral-key@0x5570e4b65080 (16-bytes, AES_KEY_GEN) | CONCATENATE_DATA_AND_BASE: | target: EXTRACT_KEY_FROM_KEY | base: base-key@0x5570e4b65080 (16-bytes, AES_KEY_GEN) | params: 16-bytes@0x7ffe19a09590 | result: key-key@0x5570e4be6640 (32-bytes, EXTRACT_KEY_FROM_KEY) | key-offset: 0, key-size: 16 | EXTRACT_KEY_FROM_KEY: | target: AES_ECB | flags: SIGN | key_size: 16-bytes | base: base-key@0x5570e4be6640 (32-bytes, EXTRACT_KEY_FROM_KEY) | operation: FLAGS_ONLY | params: 8-bytes@0x7ffe19a09578 | result: key-key@0x5570e4be4dc0 (16-bytes, AES_ECB) | key: release tmp-key@0x5570e4be6640 | PRF chunk interface: release clone-key@0x5570e4be90c0 | PRF chunk interface PRF aes_xcbc crypt-prf@0x5570e4be7f88 | PRF chunk interface PRF aes_xcbc update message-bytes@0x5570e4be7ee8 (length 20) | 00 01 02 03 04 05 06 07 08 09 0a 0b 0c 0d 0e 0f | 10 11 12 13 | XCBC: data 00 01 02 03 04 05 06 07 08 09 0a 0b 0c 0d 0e 0f | XCBC: data 10 11 12 13 | K extracting all 16 bytes of key@0x5570e4be4dc0 | K: symkey-key@0x5570e4be4dc0 (16-bytes, AES_ECB) | : ephemeral-key@0x5570e4b65080 (16-bytes, AES_KEY_GEN) | K: new slot-key@0x5570e4be8ee0 (16-bytes, AES_ECB) | sizeof bytes 16 | wrapper: (SECItemType)540618784: 42 4d 75 fc 55 92 df 1a ad 67 a9 c1 fd 61 b3 d7 | K: release slot-key-key@0x5570e4be8ee0 | K extracted len 16 bytes at 0x5570e4be8218 | unwrapped: 5d 93 a5 3b 80 a3 e4 06 90 d2 4c ea e1 44 9c 0e | XCBC: K: 5d 93 a5 3b 80 a3 e4 06 90 d2 4c ea e1 44 9c 0e | XCBC: K1 27 f3 88 2f b7 b9 4b a4 16 36 09 d5 d2 39 c5 7f | : ephemeral-key@0x5570e4b65080 (16-bytes, AES_KEY_GEN) | CONCATENATE_DATA_AND_BASE: | target: EXTRACT_KEY_FROM_KEY | base: base-key@0x5570e4b65080 (16-bytes, AES_KEY_GEN) | params: 16-bytes@0x7ffe19a09550 | result: k1-key@0x5570e4be6640 (32-bytes, EXTRACT_KEY_FROM_KEY) | key-offset: 0, key-size: 16 | EXTRACT_KEY_FROM_KEY: | target: AES_ECB | flags: SIGN | key_size: 16-bytes | base: base-key@0x5570e4be6640 (32-bytes, EXTRACT_KEY_FROM_KEY) | operation: FLAGS_ONLY | params: 8-bytes@0x7ffe19a09538 | result: k1-key@0x5570e4be90c0 (16-bytes, AES_ECB) | k1: release tmp-key@0x5570e4be6640 | Computing E[2] using K3 | XCBC: K3 50 9e d8 ae 74 5a 75 4c 93 4d 6c 91 98 fe e2 1b | XCBC: E[n-1] ec 26 f6 dd e8 bb 1b d1 ec 76 c4 91 78 37 ca 4b | XCBC: M[n] 10 11 12 13 | XCBC: M[n] 10 11 12 13 | XCBC: M[n]:80...^E[n-1]^K3 | ac a9 3c 60 1c e1 6e 9d 7f 3b a8 00 e0 c9 28 50 | XCBC: MAC 8c d3 c9 3a e5 98 a9 80 30 06 ff b6 7c 40 e9 e4 | xcbc: release k1-key@0x5570e4be90c0 | PRF chunk interface: release key-key@0x5570e4be4dc0 | PRF chunk interface PRF aes_xcbc final-chunk@0x5570e4be87a8 (length 16) | 8c d3 c9 3a e5 98 a9 80 30 06 ff b6 7c 40 e9 e4 | chunk output 8c d3 c9 3a e5 98 a9 80 30 06 ff b6 7c 40 e9 e4 | verify_chunk_data: RFC 4434 Test Case AES-XCBC-PRF-128 with 20-byte input (key length 18): ok | : ephemeral-key@0x5570e4b65080 (16-bytes, AES_KEY_GEN) | CONCATENATE_DATA_AND_BASE: | target: EXTRACT_KEY_FROM_KEY | base: base-key@0x5570e4b65080 (16-bytes, AES_KEY_GEN) | params: 16-bytes@0x7ffe19a09660 | result: key symkey-key@0x5570e4be90c0 (34-bytes, EXTRACT_KEY_FROM_KEY) | key-offset: 0, key-size: 18 | EXTRACT_KEY_FROM_KEY: | target: EXTRACT_KEY_FROM_KEY | key_size: 18-bytes | base: base-key@0x5570e4be90c0 (34-bytes, EXTRACT_KEY_FROM_KEY) | operation: FLAGS_ONLY | params: 8-bytes@0x7ffe19a09648 | result: key symkey-key@0x5570e4be4dc0 (18-bytes, EXTRACT_KEY_FROM_KEY) | key symkey: release tmp-key@0x5570e4be90c0 | PRF symkey interface PRF aes_xcbc init key symkey-key@0x5570e4be4dc0 (size 18) | PRF symkey interface: key symkey-key@0x5570e4be4dc0 (18-bytes, EXTRACT_KEY_FROM_KEY) | XCBC: Key 18>16 too big, rehashing to size | : ephemeral-key@0x5570e4b65080 (16-bytes, AES_KEY_GEN) | CONCATENATE_DATA_AND_BASE: | target: EXTRACT_KEY_FROM_KEY | base: base-key@0x5570e4b65080 (16-bytes, AES_KEY_GEN) | params: 16-bytes@0x7ffe19a095c0 | result: key symkey-key@0x5570e4be6640 (32-bytes, EXTRACT_KEY_FROM_KEY) | key-offset: 0, key-size: 16 | EXTRACT_KEY_FROM_KEY: | target: AES_ECB | flags: SIGN | key_size: 16-bytes | base: base-key@0x5570e4be6640 (32-bytes, EXTRACT_KEY_FROM_KEY) | operation: FLAGS_ONLY | params: 8-bytes@0x7ffe19a095a8 | result: key symkey-key@0x5570e4be90c0 (16-bytes, AES_ECB) | key symkey: release tmp-key@0x5570e4be6640 | key symkey extracting all 18 bytes of key@0x5570e4be4dc0 | key symkey: symkey-key@0x5570e4be4dc0 (18-bytes, EXTRACT_KEY_FROM_KEY) | : ephemeral-key@0x5570e4b65080 (16-bytes, AES_KEY_GEN) | key symkey: new slot-key@0x5570e4be8ee0 (18-bytes, EXTRACT_KEY_FROM_KEY) | sizeof bytes 32 | wrapper: (SECItemType)1701522796: 4e 1f 9a 69 f6 4d ed 6d ea d6 4e f0 90 30 8a 92 b4 49 69 e5 c5 72 83 89 0b c5 15 fc 31 df 26 db | key symkey: release slot-key-key@0x5570e4be8ee0 | key symkey extracted len 32 bytes at 0x5570e4be7f38 | unwrapped: 00 01 02 03 04 05 06 07 08 09 0a 0b 0c 0d 0e 0f | unwrapped: ed cb 00 00 00 00 00 00 00 00 00 00 00 00 00 00 | XCBC: data 00 01 02 03 04 05 06 07 08 09 0a 0b 0c 0d 0e 0f | XCBC: data ed cb | K extracting all 16 bytes of key@0x5570e4be90c0 | K: symkey-key@0x5570e4be90c0 (16-bytes, AES_ECB) | : ephemeral-key@0x5570e4b65080 (16-bytes, AES_KEY_GEN) | K: new slot-key@0x5570e4be8ee0 (16-bytes, AES_ECB) | sizeof bytes 16 | wrapper: (SECItemType)808460336: ac 74 c2 9c 0e e7 5f 8f 8c 3f 4f 9e e6 76 bf 22 | K: release slot-key-key@0x5570e4be8ee0 | K extracted len 16 bytes at 0x5570e4be8128 | unwrapped: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 | XCBC: K: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 | XCBC: K1 e1 4d 5d 0e e2 77 15 df 08 b4 15 2b a2 3d a8 e0 | : ephemeral-key@0x5570e4b65080 (16-bytes, AES_KEY_GEN) | CONCATENATE_DATA_AND_BASE: | target: EXTRACT_KEY_FROM_KEY | base: base-key@0x5570e4b65080 (16-bytes, AES_KEY_GEN) | params: 16-bytes@0x7ffe19a09540 | result: k1-key@0x5570e4bec1c0 (32-bytes, EXTRACT_KEY_FROM_KEY) | key-offset: 0, key-size: 16 | EXTRACT_KEY_FROM_KEY: | target: AES_ECB | flags: SIGN | key_size: 16-bytes | base: base-key@0x5570e4bec1c0 (32-bytes, EXTRACT_KEY_FROM_KEY) | operation: FLAGS_ONLY | params: 8-bytes@0x7ffe19a09528 | result: k1-key@0x5570e4be6640 (16-bytes, AES_ECB) | k1: release tmp-key@0x5570e4bec1c0 | Computing E[2] using K3 | XCBC: K3 8d 34 ef cb 3b d5 45 ca 06 2a ec df ef 7c 0b fa | XCBC: E[n-1] 0b 72 b2 ae 0a 37 79 81 75 6a d5 9c 79 c0 e6 96 | XCBC: M[n] ed cb | XCBC: M[n] ed cb | XCBC: M[n]:80...^E[n-1]^K3 | 6b 8d dd 65 31 e2 3c 4b 73 40 39 43 96 bc ed 6c | XCBC: MAC 5d 93 a5 3b 80 a3 e4 06 90 d2 4c ea e1 44 9c 0e | xcbc: release k1-key@0x5570e4be6640 | : ephemeral-key@0x5570e4b65080 (16-bytes, AES_KEY_GEN) | CONCATENATE_DATA_AND_BASE: | target: EXTRACT_KEY_FROM_KEY | base: base-key@0x5570e4b65080 (16-bytes, AES_KEY_GEN) | params: 16-bytes@0x7ffe19a095c0 | result: key symkey-key@0x5570e4bec1c0 (32-bytes, EXTRACT_KEY_FROM_KEY) | key-offset: 0, key-size: 16 | EXTRACT_KEY_FROM_KEY: | target: AES_ECB | flags: SIGN | key_size: 16-bytes | base: base-key@0x5570e4bec1c0 (32-bytes, EXTRACT_KEY_FROM_KEY) | operation: FLAGS_ONLY | params: 8-bytes@0x7ffe19a095a8 | result: key symkey-key@0x5570e4be6640 (16-bytes, AES_ECB) | key symkey: release tmp-key@0x5570e4bec1c0 | PRF symkey interface PRF aes_xcbc crypt-prf@0x5570e4be7f38 | : ephemeral-key@0x5570e4b65080 (16-bytes, AES_KEY_GEN) | CONCATENATE_DATA_AND_BASE: | target: EXTRACT_KEY_FROM_KEY | base: base-key@0x5570e4b65080 (16-bytes, AES_KEY_GEN) | params: 16-bytes@0x7ffe19a09660 | result: message symkey-key@0x5570e4bedc70 (36-bytes, EXTRACT_KEY_FROM_KEY) | key-offset: 0, key-size: 20 | EXTRACT_KEY_FROM_KEY: | target: EXTRACT_KEY_FROM_KEY | key_size: 20-bytes | base: base-key@0x5570e4bedc70 (36-bytes, EXTRACT_KEY_FROM_KEY) | operation: FLAGS_ONLY | params: 8-bytes@0x7ffe19a09648 | result: message symkey-key@0x5570e4bec1c0 (20-bytes, EXTRACT_KEY_FROM_KEY) | message symkey: release tmp-key@0x5570e4bedc70 | PRF symkey interface PRF aes_xcbc update symkey message-key@0x5570e4bec1c0 (size 20) | PRF symkey interface: symkey message-key@0x5570e4bec1c0 (20-bytes, EXTRACT_KEY_FROM_KEY) | symkey message extracting all 20 bytes of key@0x5570e4bec1c0 | symkey message: symkey-key@0x5570e4bec1c0 (20-bytes, EXTRACT_KEY_FROM_KEY) | : ephemeral-key@0x5570e4b65080 (16-bytes, AES_KEY_GEN) | symkey message: new slot-key@0x5570e4be8ee0 (20-bytes, EXTRACT_KEY_FROM_KEY) | sizeof bytes 32 | wrapper: (SECItemType)-464429152: 4e 1f 9a 69 f6 4d ed 6d ea d6 4e f0 90 30 8a 92 e7 ea 4a a7 b5 bc 5b ad 11 0e d8 fe 14 d6 b1 d7 | symkey message: release slot-key-key@0x5570e4be8ee0 | symkey message extracted len 32 bytes at 0x5570e4bede18 | unwrapped: 00 01 02 03 04 05 06 07 08 09 0a 0b 0c 0d 0e 0f | unwrapped: 10 11 12 13 00 00 00 00 00 00 00 00 00 00 00 00 | XCBC: data 00 01 02 03 04 05 06 07 08 09 0a 0b 0c 0d 0e 0f | XCBC: data 10 11 12 13 | K extracting all 16 bytes of key@0x5570e4be6640 | K: symkey-key@0x5570e4be6640 (16-bytes, AES_ECB) | : ephemeral-key@0x5570e4b65080 (16-bytes, AES_KEY_GEN) | K: new slot-key@0x5570e4be8ee0 (16-bytes, AES_ECB) | sizeof bytes 16 | wrapper: (SECItemType)1920429685: 42 4d 75 fc 55 92 df 1a ad 67 a9 c1 fd 61 b3 d7 | K: release slot-key-key@0x5570e4be8ee0 | K extracted len 16 bytes at 0x5570e4be8128 | unwrapped: 5d 93 a5 3b 80 a3 e4 06 90 d2 4c ea e1 44 9c 0e | XCBC: K: 5d 93 a5 3b 80 a3 e4 06 90 d2 4c ea e1 44 9c 0e | XCBC: K1 27 f3 88 2f b7 b9 4b a4 16 36 09 d5 d2 39 c5 7f | : ephemeral-key@0x5570e4b65080 (16-bytes, AES_KEY_GEN) | CONCATENATE_DATA_AND_BASE: | target: EXTRACT_KEY_FROM_KEY | base: base-key@0x5570e4b65080 (16-bytes, AES_KEY_GEN) | params: 16-bytes@0x7ffe19a09570 | result: k1-key@0x5570e4bef6d0 (32-bytes, EXTRACT_KEY_FROM_KEY) | key-offset: 0, key-size: 16 | EXTRACT_KEY_FROM_KEY: | target: AES_ECB | flags: SIGN | key_size: 16-bytes | base: base-key@0x5570e4bef6d0 (32-bytes, EXTRACT_KEY_FROM_KEY) | operation: FLAGS_ONLY | params: 8-bytes@0x7ffe19a09558 | result: k1-key@0x5570e4bedc70 (16-bytes, AES_ECB) | k1: release tmp-key@0x5570e4bef6d0 | Computing E[2] using K3 | XCBC: K3 50 9e d8 ae 74 5a 75 4c 93 4d 6c 91 98 fe e2 1b | XCBC: E[n-1] ec 26 f6 dd e8 bb 1b d1 ec 76 c4 91 78 37 ca 4b | XCBC: M[n] 10 11 12 13 | XCBC: M[n] 10 11 12 13 | XCBC: M[n]:80...^E[n-1]^K3 | ac a9 3c 60 1c e1 6e 9d 7f 3b a8 00 e0 c9 28 50 | XCBC: MAC 8c d3 c9 3a e5 98 a9 80 30 06 ff b6 7c 40 e9 e4 | xcbc: release k1-key@0x5570e4bedc70 | : ephemeral-key@0x5570e4b65080 (16-bytes, AES_KEY_GEN) | CONCATENATE_DATA_AND_BASE: | target: EXTRACT_KEY_FROM_KEY | base: base-key@0x5570e4b65080 (16-bytes, AES_KEY_GEN) | params: 16-bytes@0x7ffe19a09600 | result: xcbc-key@0x5570e4bef6d0 (32-bytes, EXTRACT_KEY_FROM_KEY) | key-offset: 0, key-size: 16 | EXTRACT_KEY_FROM_KEY: | target: EXTRACT_KEY_FROM_KEY | key_size: 16-bytes | base: base-key@0x5570e4bef6d0 (32-bytes, EXTRACT_KEY_FROM_KEY) | operation: FLAGS_ONLY | params: 8-bytes@0x7ffe19a095e8 | result: xcbc-key@0x5570e4bedc70 (16-bytes, EXTRACT_KEY_FROM_KEY) | xcbc: release tmp-key@0x5570e4bef6d0 | PRF symkey interface: release key-key@0x5570e4be6640 | PRF symkey interface PRF aes_xcbc final-key@0x5570e4bedc70 (size 16) | PRF symkey interface: key-key@0x5570e4bedc70 (16-bytes, EXTRACT_KEY_FROM_KEY) | output: symkey-key@0x5570e4bedc70 (16-bytes, EXTRACT_KEY_FROM_KEY) | RFC 4434 Test Case AES-XCBC-PRF-128 with 20-byte input (key length 18) extracting all 16 bytes of key@0x5570e4bedc70 | RFC 4434 Test Case AES-XCBC-PRF-128 with 20-byte input (key length 18): symkey-key@0x5570e4bedc70 (16-bytes, EXTRACT_KEY_FROM_KEY) | : ephemeral-key@0x5570e4b65080 (16-bytes, AES_KEY_GEN) | RFC 4434 Test Case AES-XCBC-PRF-128 with 20-byte input (key length 18): new slot-key@0x5570e4be8ee0 (16-bytes, EXTRACT_KEY_FROM_KEY) | sizeof bytes 16 | wrapper: (SECItemType)-464429206: af f8 38 b0 07 ab a8 29 cc 29 97 78 f8 68 49 e7 | RFC 4434 Test Case AES-XCBC-PRF-128 with 20-byte input (key length 18): release slot-key-key@0x5570e4be8ee0 | RFC 4434 Test Case AES-XCBC-PRF-128 with 20-byte input (key length 18) extracted len 16 bytes at 0x5570e4be8128 | unwrapped: 8c d3 c9 3a e5 98 a9 80 30 06 ff b6 7c 40 e9 e4 | verify_chunk_data: RFC 4434 Test Case AES-XCBC-PRF-128 with 20-byte input (key length 18): ok | test_prf_vector: RFC 4434 Test Case AES-XCBC-PRF-128 with 20-byte input (key length 18) passed | test_prf_vector: release symkey-key@0x5570e4bedc70 | test_prf_vector: release message-key@0x5570e4bec1c0 | test_prf_vector: release key-key@0x5570e4be4dc0 | test_prf_vector: release output-key@NULL testing HMAC_MD5: RFC 2104: MD5_HMAC test 1 | decode_to_chunk: test_prf_vector: input "0x0b0b0b0b0b0b0b0b0b0b0b0b0b0b0b0b" | decode_to_chunk: output: | 0b 0b 0b 0b 0b 0b 0b 0b 0b 0b 0b 0b 0b 0b 0b 0b | decode_to_chunk: test_prf_vector: input "Hi There" | decode_to_chunk: output: | 48 69 20 54 68 65 72 65 | decode_to_chunk: test_prf_vector: input "0x9294727a3638bb1c13f48ef8158bfc9d" | decode_to_chunk: output: | 92 94 72 7a 36 38 bb 1c 13 f4 8e f8 15 8b fc 9d | PRF chunk interface PRF md5 init key-chunk@0x5570e4be8c98 (length 16) | 0b 0b 0b 0b 0b 0b 0b 0b 0b 0b 0b 0b 0b 0b 0b 0b | : ephemeral-key@0x5570e4b65080 (16-bytes, AES_KEY_GEN) | CONCATENATE_DATA_AND_BASE: | target: EXTRACT_KEY_FROM_KEY | base: base-key@0x5570e4b65080 (16-bytes, AES_KEY_GEN) | params: 16-bytes@0x7ffe19a095e0 | result: PRF chunk interface-key@0x5570e4bec1c0 (32-bytes, EXTRACT_KEY_FROM_KEY) | key-offset: 0, key-size: 16 | EXTRACT_KEY_FROM_KEY: | target: EXTRACT_KEY_FROM_KEY | key_size: 16-bytes | base: base-key@0x5570e4bec1c0 (32-bytes, EXTRACT_KEY_FROM_KEY) | operation: FLAGS_ONLY | params: 8-bytes@0x7ffe19a095c8 | result: PRF chunk interface-key@0x5570e4be4dc0 (16-bytes, EXTRACT_KEY_FROM_KEY) | PRF chunk interface: release tmp-key@0x5570e4bec1c0 | CONCATENATE_BASE_AND_DATA: | target: EXTRACT_KEY_FROM_KEY | base: base-key@0x5570e4be4dc0 (16-bytes, EXTRACT_KEY_FROM_KEY) | params: 16-bytes@0x7ffe19a09520 | result: trimed key-key@0x5570e4bec1c0 (64-bytes, EXTRACT_KEY_FROM_KEY) | append_symkey_bytes: release lhs-key@0x5570e4be4dc0 | XOR_BASE_AND_DATA: | target: CONCATENATE_BASE_AND_DATA | base: base-key@0x5570e4bec1c0 (64-bytes, EXTRACT_KEY_FROM_KEY) | params: 16-bytes@0x7ffe19a09560 | result: result-key@0x5570e4be4dc0 (64-bytes, CONCATENATE_BASE_AND_DATA) | PRF chunk interface PRF md5 crypt-prf@0x5570e4bedbe8 | PRF chunk interface PRF md5 update message-bytes@0x5570e4be8128 (length 8) | 48 69 20 54 68 65 72 65 | CONCATENATE_BASE_AND_DATA: | target: CONCATENATE_BASE_AND_DATA | base: base-key@0x5570e4be4dc0 (64-bytes, CONCATENATE_BASE_AND_DATA) | params: 16-bytes@0x7ffe19a09650 | result: message-key@0x5570e4bedc70 (72-bytes, CONCATENATE_BASE_AND_DATA) | append_symkey_bytes: release lhs-key@0x5570e4be4dc0 | PRF HMAC inner hash hash md5 inner-key@0x5570e4bedc70 (size 72) | PRF HMAC inner hash hash md5 init | PRF HMAC inner hash hash md5 digest inner-key@0x5570e4bedc70 (size 72) | PRF HMAC inner hash: inner-key@0x5570e4bedc70 (72-bytes, CONCATENATE_BASE_AND_DATA) | PRF HMAC inner hash hash md5 final chunk@0x5570e4be81d8 (length 16) | 90 1d 23 73 2e dc c0 f1 a1 06 53 2f 6b e5 ec eb | : ephemeral-key@0x5570e4b65080 (16-bytes, AES_KEY_GEN) | CONCATENATE_DATA_AND_BASE: | target: EXTRACT_KEY_FROM_KEY | base: base-key@0x5570e4b65080 (16-bytes, AES_KEY_GEN) | params: 16-bytes@0x7ffe19a094e0 | result: PRF HMAC inner hash-key@0x5570e4be6640 (32-bytes, EXTRACT_KEY_FROM_KEY) | key-offset: 0, key-size: 16 | EXTRACT_KEY_FROM_KEY: | target: EXTRACT_KEY_FROM_KEY | key_size: 16-bytes | base: base-key@0x5570e4be6640 (32-bytes, EXTRACT_KEY_FROM_KEY) | operation: FLAGS_ONLY | params: 8-bytes@0x7ffe19a094c8 | result: PRF HMAC inner hash-key@0x5570e4be4dc0 (16-bytes, EXTRACT_KEY_FROM_KEY) | PRF HMAC inner hash: release tmp-key@0x5570e4be6640 | PRF chunk interface: release inner-key@0x5570e4bedc70 | XOR_BASE_AND_DATA: | target: CONCATENATE_BASE_AND_DATA | base: base-key@0x5570e4bec1c0 (64-bytes, EXTRACT_KEY_FROM_KEY) | params: 16-bytes@0x7ffe19a09550 | result: result-key@0x5570e4bedc70 (64-bytes, CONCATENATE_BASE_AND_DATA) | CONCATENATE_BASE_AND_KEY: | target: CONCATENATE_BASE_AND_DATA | base: base-key@0x5570e4bedc70 (64-bytes, CONCATENATE_BASE_AND_DATA) | params: 8-bytes@0x7ffe19a09538 | result: result-key@0x5570e4be6640 (80-bytes, CONCATENATE_BASE_AND_DATA) | append_symkey_symkey: release lhs-key@0x5570e4bedc70 | PRF chunk interface: release hashed-inner-key@0x5570e4be4dc0 | PRF chunk interface: release key-key@0x5570e4bec1c0 | PRF HMAC outer hash hash md5 init | PRF HMAC outer hash hash md5 digest outer-key@0x5570e4be6640 (size 80) | PRF HMAC outer hash: outer-key@0x5570e4be6640 (80-bytes, CONCATENATE_BASE_AND_DATA) | PRF HMAC outer hash hash md5 final bytes@0x5570e4be8218 (length 16) | 92 94 72 7a 36 38 bb 1c 13 f4 8e f8 15 8b fc 9d | PRF chunk interface: release outer-key@0x5570e4be6640 | PRF chunk interface PRF md5 final-chunk@0x5570e4be8218 (length 16) | 92 94 72 7a 36 38 bb 1c 13 f4 8e f8 15 8b fc 9d | chunk output 92 94 72 7a 36 38 bb 1c 13 f4 8e f8 15 8b fc 9d | verify_chunk_data: RFC 2104: MD5_HMAC test 1: ok | : ephemeral-key@0x5570e4b65080 (16-bytes, AES_KEY_GEN) | CONCATENATE_DATA_AND_BASE: | target: EXTRACT_KEY_FROM_KEY | base: base-key@0x5570e4b65080 (16-bytes, AES_KEY_GEN) | params: 16-bytes@0x7ffe19a09660 | result: key symkey-key@0x5570e4bec1c0 (32-bytes, EXTRACT_KEY_FROM_KEY) | key-offset: 0, key-size: 16 | EXTRACT_KEY_FROM_KEY: | target: EXTRACT_KEY_FROM_KEY | key_size: 16-bytes | base: base-key@0x5570e4bec1c0 (32-bytes, EXTRACT_KEY_FROM_KEY) | operation: FLAGS_ONLY | params: 8-bytes@0x7ffe19a09648 | result: key symkey-key@0x5570e4be6640 (16-bytes, EXTRACT_KEY_FROM_KEY) | key symkey: release tmp-key@0x5570e4bec1c0 | PRF symkey interface PRF md5 init key symkey-key@0x5570e4be6640 (size 16) | PRF symkey interface: key symkey-key@0x5570e4be6640 (16-bytes, EXTRACT_KEY_FROM_KEY) | PRF symkey interface: reference key-key@0x5570e4be6640 | CONCATENATE_BASE_AND_DATA: | target: EXTRACT_KEY_FROM_KEY | base: base-key@0x5570e4be6640 (16-bytes, EXTRACT_KEY_FROM_KEY) | params: 16-bytes@0x7ffe19a09520 | result: trimed key-key@0x5570e4bec1c0 (64-bytes, EXTRACT_KEY_FROM_KEY) | append_symkey_bytes: release lhs-key@0x5570e4be6640 | XOR_BASE_AND_DATA: | target: CONCATENATE_BASE_AND_DATA | base: base-key@0x5570e4bec1c0 (64-bytes, EXTRACT_KEY_FROM_KEY) | params: 16-bytes@0x7ffe19a09560 | result: result-key@0x5570e4be4dc0 (64-bytes, CONCATENATE_BASE_AND_DATA) | PRF symkey interface PRF md5 crypt-prf@0x5570e4bede18 | : ephemeral-key@0x5570e4b65080 (16-bytes, AES_KEY_GEN) | CONCATENATE_DATA_AND_BASE: | target: EXTRACT_KEY_FROM_KEY | base: base-key@0x5570e4b65080 (16-bytes, AES_KEY_GEN) | params: 16-bytes@0x7ffe19a09660 | result: message symkey-key@0x5570e4bef6d0 (24-bytes, EXTRACT_KEY_FROM_KEY) | key-offset: 0, key-size: 8 | EXTRACT_KEY_FROM_KEY: | target: EXTRACT_KEY_FROM_KEY | key_size: 8-bytes | base: base-key@0x5570e4bef6d0 (24-bytes, EXTRACT_KEY_FROM_KEY) | operation: FLAGS_ONLY | params: 8-bytes@0x7ffe19a09648 | result: message symkey-key@0x5570e4bedc70 (8-bytes, EXTRACT_KEY_FROM_KEY) | message symkey: release tmp-key@0x5570e4bef6d0 | PRF symkey interface PRF md5 update symkey message-key@0x5570e4bedc70 (size 8) | PRF symkey interface: symkey message-key@0x5570e4bedc70 (8-bytes, EXTRACT_KEY_FROM_KEY) | CONCATENATE_BASE_AND_KEY: | target: CONCATENATE_BASE_AND_DATA | base: base-key@0x5570e4be4dc0 (64-bytes, CONCATENATE_BASE_AND_DATA) | params: 8-bytes@0x7ffe19a09678 | result: result-key@0x5570e4bef6d0 (72-bytes, CONCATENATE_BASE_AND_DATA) | append_symkey_symkey: release lhs-key@0x5570e4be4dc0 | PRF HMAC inner hash hash md5 inner-key@0x5570e4bef6d0 (size 72) | PRF HMAC inner hash hash md5 init | PRF HMAC inner hash hash md5 digest inner-key@0x5570e4bef6d0 (size 72) | PRF HMAC inner hash: inner-key@0x5570e4bef6d0 (72-bytes, CONCATENATE_BASE_AND_DATA) | PRF HMAC inner hash hash md5 final chunk@0x5570e4be8218 (length 16) | 90 1d 23 73 2e dc c0 f1 a1 06 53 2f 6b e5 ec eb | : ephemeral-key@0x5570e4b65080 (16-bytes, AES_KEY_GEN) | CONCATENATE_DATA_AND_BASE: | target: EXTRACT_KEY_FROM_KEY | base: base-key@0x5570e4b65080 (16-bytes, AES_KEY_GEN) | params: 16-bytes@0x7ffe19a09500 | result: PRF HMAC inner hash-key@0x5570e4befab0 (32-bytes, EXTRACT_KEY_FROM_KEY) | key-offset: 0, key-size: 16 | EXTRACT_KEY_FROM_KEY: | target: EXTRACT_KEY_FROM_KEY | key_size: 16-bytes | base: base-key@0x5570e4befab0 (32-bytes, EXTRACT_KEY_FROM_KEY) | operation: FLAGS_ONLY | params: 8-bytes@0x7ffe19a094e8 | result: PRF HMAC inner hash-key@0x5570e4be4dc0 (16-bytes, EXTRACT_KEY_FROM_KEY) | PRF HMAC inner hash: release tmp-key@0x5570e4befab0 | PRF symkey interface: release inner-key@0x5570e4bef6d0 | XOR_BASE_AND_DATA: | target: CONCATENATE_BASE_AND_DATA | base: base-key@0x5570e4bec1c0 (64-bytes, EXTRACT_KEY_FROM_KEY) | params: 16-bytes@0x7ffe19a09570 | result: result-key@0x5570e4bef6d0 (64-bytes, CONCATENATE_BASE_AND_DATA) | CONCATENATE_BASE_AND_KEY: | target: CONCATENATE_BASE_AND_DATA | base: base-key@0x5570e4bef6d0 (64-bytes, CONCATENATE_BASE_AND_DATA) | params: 8-bytes@0x7ffe19a09558 | result: result-key@0x5570e4befab0 (80-bytes, CONCATENATE_BASE_AND_DATA) | append_symkey_symkey: release lhs-key@0x5570e4bef6d0 | PRF symkey interface: release hashed-inner-key@0x5570e4be4dc0 | PRF symkey interface: release key-key@0x5570e4bec1c0 | PRF HMAC outer hash hash md5 outer-key@0x5570e4befab0 (size 80) | PRF HMAC outer hash hash md5 init | PRF HMAC outer hash hash md5 digest outer-key@0x5570e4befab0 (size 80) | PRF HMAC outer hash: outer-key@0x5570e4befab0 (80-bytes, CONCATENATE_BASE_AND_DATA) | PRF HMAC outer hash hash md5 final chunk@0x5570e4be8218 (length 16) | 92 94 72 7a 36 38 bb 1c 13 f4 8e f8 15 8b fc 9d | : ephemeral-key@0x5570e4b65080 (16-bytes, AES_KEY_GEN) | CONCATENATE_DATA_AND_BASE: | target: EXTRACT_KEY_FROM_KEY | base: base-key@0x5570e4b65080 (16-bytes, AES_KEY_GEN) | params: 16-bytes@0x7ffe19a095c0 | result: PRF HMAC outer hash-key@0x5570e4be4dc0 (32-bytes, EXTRACT_KEY_FROM_KEY) | key-offset: 0, key-size: 16 | EXTRACT_KEY_FROM_KEY: | target: EXTRACT_KEY_FROM_KEY | key_size: 16-bytes | base: base-key@0x5570e4be4dc0 (32-bytes, EXTRACT_KEY_FROM_KEY) | operation: FLAGS_ONLY | params: 8-bytes@0x7ffe19a095a8 | result: PRF HMAC outer hash-key@0x5570e4bec1c0 (16-bytes, EXTRACT_KEY_FROM_KEY) | PRF HMAC outer hash: release tmp-key@0x5570e4be4dc0 | PRF symkey interface: release outer-key@0x5570e4befab0 | : hashed-outer-key@0x5570e4bec1c0 (16-bytes, EXTRACT_KEY_FROM_KEY) | PRF symkey interface PRF md5 final-key@0x5570e4bec1c0 (size 16) | PRF symkey interface: key-key@0x5570e4bec1c0 (16-bytes, EXTRACT_KEY_FROM_KEY) | output: symkey-key@0x5570e4bec1c0 (16-bytes, EXTRACT_KEY_FROM_KEY) | RFC 2104: MD5_HMAC test 1 extracting all 16 bytes of key@0x5570e4bec1c0 | RFC 2104: MD5_HMAC test 1: symkey-key@0x5570e4bec1c0 (16-bytes, EXTRACT_KEY_FROM_KEY) | : ephemeral-key@0x5570e4b65080 (16-bytes, AES_KEY_GEN) | RFC 2104: MD5_HMAC test 1: new slot-key@0x5570e4be8ee0 (16-bytes, EXTRACT_KEY_FROM_KEY) | sizeof bytes 16 | wrapper: (SECItemType)-464429206: 57 4c 44 27 3f fb 27 82 b8 0d be d4 58 4e 75 d8 | RFC 2104: MD5_HMAC test 1: release slot-key-key@0x5570e4be8ee0 | RFC 2104: MD5_HMAC test 1 extracted len 16 bytes at 0x5570e4be81d8 | unwrapped: 92 94 72 7a 36 38 bb 1c 13 f4 8e f8 15 8b fc 9d | verify_chunk_data: RFC 2104: MD5_HMAC test 1: ok | test_prf_vector: RFC 2104: MD5_HMAC test 1 passed | test_prf_vector: release symkey-key@0x5570e4bec1c0 | test_prf_vector: release message-key@0x5570e4bedc70 | test_prf_vector: release key-key@0x5570e4be6640 | test_prf_vector: release output-key@NULL RFC 2104: MD5_HMAC test 2 | decode_to_chunk: test_prf_vector: input "Jefe" | decode_to_chunk: output: | 4a 65 66 65 | decode_to_chunk: test_prf_vector: input "what do ya want for nothing?" | decode_to_chunk: output: | 77 68 61 74 20 64 6f 20 79 61 20 77 61 6e 74 20 | 66 6f 72 20 6e 6f 74 68 69 6e 67 3f | decode_to_chunk: test_prf_vector: input "0x750c783e6ab0b503eaa86e310a5db738" | decode_to_chunk: output: | 75 0c 78 3e 6a b0 b5 03 ea a8 6e 31 0a 5d b7 38 | PRF chunk interface PRF md5 init key-chunk@0x5570e4be87a8 (length 4) | 4a 65 66 65 | : ephemeral-key@0x5570e4b65080 (16-bytes, AES_KEY_GEN) | CONCATENATE_DATA_AND_BASE: | target: EXTRACT_KEY_FROM_KEY | base: base-key@0x5570e4b65080 (16-bytes, AES_KEY_GEN) | params: 16-bytes@0x7ffe19a095e0 | result: PRF chunk interface-key@0x5570e4bedc70 (20-bytes, EXTRACT_KEY_FROM_KEY) | key-offset: 0, key-size: 4 | EXTRACT_KEY_FROM_KEY: | target: EXTRACT_KEY_FROM_KEY | key_size: 4-bytes | base: base-key@0x5570e4bedc70 (20-bytes, EXTRACT_KEY_FROM_KEY) | operation: FLAGS_ONLY | params: 8-bytes@0x7ffe19a095c8 | result: PRF chunk interface-key@0x5570e4be6640 (4-bytes, EXTRACT_KEY_FROM_KEY) | PRF chunk interface: release tmp-key@0x5570e4bedc70 | CONCATENATE_BASE_AND_DATA: | target: EXTRACT_KEY_FROM_KEY | base: base-key@0x5570e4be6640 (4-bytes, EXTRACT_KEY_FROM_KEY) | params: 16-bytes@0x7ffe19a09520 | result: trimed key-key@0x5570e4bedc70 (64-bytes, EXTRACT_KEY_FROM_KEY) | append_symkey_bytes: release lhs-key@0x5570e4be6640 | XOR_BASE_AND_DATA: | target: CONCATENATE_BASE_AND_DATA | base: base-key@0x5570e4bedc70 (64-bytes, EXTRACT_KEY_FROM_KEY) | params: 16-bytes@0x7ffe19a09560 | result: result-key@0x5570e4be6640 (64-bytes, CONCATENATE_BASE_AND_DATA) | PRF chunk interface PRF md5 crypt-prf@0x5570e4befa38 | PRF chunk interface PRF md5 update message-bytes@0x5570e4be35b8 (length 28) | 77 68 61 74 20 64 6f 20 79 61 20 77 61 6e 74 20 | 66 6f 72 20 6e 6f 74 68 69 6e 67 3f | CONCATENATE_BASE_AND_DATA: | target: CONCATENATE_BASE_AND_DATA | base: base-key@0x5570e4be6640 (64-bytes, CONCATENATE_BASE_AND_DATA) | params: 16-bytes@0x7ffe19a09650 | result: message-key@0x5570e4bec1c0 (92-bytes, CONCATENATE_BASE_AND_DATA) | append_symkey_bytes: release lhs-key@0x5570e4be6640 | PRF HMAC inner hash hash md5 inner-key@0x5570e4bec1c0 (size 92) | PRF HMAC inner hash hash md5 init | PRF HMAC inner hash hash md5 digest inner-key@0x5570e4bec1c0 (size 92) | PRF HMAC inner hash: inner-key@0x5570e4bec1c0 (92-bytes, CONCATENATE_BASE_AND_DATA) | PRF HMAC inner hash hash md5 final chunk@0x5570e4be81d8 (length 16) | c3 db 14 c0 65 f5 52 03 b0 33 c8 1a 69 7b 97 c5 | : ephemeral-key@0x5570e4b65080 (16-bytes, AES_KEY_GEN) | CONCATENATE_DATA_AND_BASE: | target: EXTRACT_KEY_FROM_KEY | base: base-key@0x5570e4b65080 (16-bytes, AES_KEY_GEN) | params: 16-bytes@0x7ffe19a094e0 | result: PRF HMAC inner hash-key@0x5570e4befab0 (32-bytes, EXTRACT_KEY_FROM_KEY) | key-offset: 0, key-size: 16 | EXTRACT_KEY_FROM_KEY: | target: EXTRACT_KEY_FROM_KEY | key_size: 16-bytes | base: base-key@0x5570e4befab0 (32-bytes, EXTRACT_KEY_FROM_KEY) | operation: FLAGS_ONLY | params: 8-bytes@0x7ffe19a094c8 | result: PRF HMAC inner hash-key@0x5570e4be6640 (16-bytes, EXTRACT_KEY_FROM_KEY) | PRF HMAC inner hash: release tmp-key@0x5570e4befab0 | PRF chunk interface: release inner-key@0x5570e4bec1c0 | XOR_BASE_AND_DATA: | target: CONCATENATE_BASE_AND_DATA | base: base-key@0x5570e4bedc70 (64-bytes, EXTRACT_KEY_FROM_KEY) | params: 16-bytes@0x7ffe19a09550 | result: result-key@0x5570e4bec1c0 (64-bytes, CONCATENATE_BASE_AND_DATA) | CONCATENATE_BASE_AND_KEY: | target: CONCATENATE_BASE_AND_DATA | base: base-key@0x5570e4bec1c0 (64-bytes, CONCATENATE_BASE_AND_DATA) | params: 8-bytes@0x7ffe19a09538 | result: result-key@0x5570e4befab0 (80-bytes, CONCATENATE_BASE_AND_DATA) | append_symkey_symkey: release lhs-key@0x5570e4bec1c0 | PRF chunk interface: release hashed-inner-key@0x5570e4be6640 | PRF chunk interface: release key-key@0x5570e4bedc70 | PRF HMAC outer hash hash md5 init | PRF HMAC outer hash hash md5 digest outer-key@0x5570e4befab0 (size 80) | PRF HMAC outer hash: outer-key@0x5570e4befab0 (80-bytes, CONCATENATE_BASE_AND_DATA) | PRF HMAC outer hash hash md5 final bytes@0x5570e4be8128 (length 16) | 75 0c 78 3e 6a b0 b5 03 ea a8 6e 31 0a 5d b7 38 | PRF chunk interface: release outer-key@0x5570e4befab0 | PRF chunk interface PRF md5 final-chunk@0x5570e4be8128 (length 16) | 75 0c 78 3e 6a b0 b5 03 ea a8 6e 31 0a 5d b7 38 | chunk output 75 0c 78 3e 6a b0 b5 03 ea a8 6e 31 0a 5d b7 38 | verify_chunk_data: RFC 2104: MD5_HMAC test 2: ok | : ephemeral-key@0x5570e4b65080 (16-bytes, AES_KEY_GEN) | CONCATENATE_DATA_AND_BASE: | target: EXTRACT_KEY_FROM_KEY | base: base-key@0x5570e4b65080 (16-bytes, AES_KEY_GEN) | params: 16-bytes@0x7ffe19a09660 | result: key symkey-key@0x5570e4bedc70 (20-bytes, EXTRACT_KEY_FROM_KEY) | key-offset: 0, key-size: 4 | EXTRACT_KEY_FROM_KEY: | target: EXTRACT_KEY_FROM_KEY | key_size: 4-bytes | base: base-key@0x5570e4bedc70 (20-bytes, EXTRACT_KEY_FROM_KEY) | operation: FLAGS_ONLY | params: 8-bytes@0x7ffe19a09648 | result: key symkey-key@0x5570e4befab0 (4-bytes, EXTRACT_KEY_FROM_KEY) | key symkey: release tmp-key@0x5570e4bedc70 | PRF symkey interface PRF md5 init key symkey-key@0x5570e4befab0 (size 4) | PRF symkey interface: key symkey-key@0x5570e4befab0 (4-bytes, EXTRACT_KEY_FROM_KEY) | PRF symkey interface: reference key-key@0x5570e4befab0 | CONCATENATE_BASE_AND_DATA: | target: EXTRACT_KEY_FROM_KEY | base: base-key@0x5570e4befab0 (4-bytes, EXTRACT_KEY_FROM_KEY) | params: 16-bytes@0x7ffe19a09520 | result: trimed key-key@0x5570e4bedc70 (64-bytes, EXTRACT_KEY_FROM_KEY) | append_symkey_bytes: release lhs-key@0x5570e4befab0 | XOR_BASE_AND_DATA: | target: CONCATENATE_BASE_AND_DATA | base: base-key@0x5570e4bedc70 (64-bytes, EXTRACT_KEY_FROM_KEY) | params: 16-bytes@0x7ffe19a09560 | result: result-key@0x5570e4be6640 (64-bytes, CONCATENATE_BASE_AND_DATA) | PRF symkey interface PRF md5 crypt-prf@0x5570e4bedbe8 | : ephemeral-key@0x5570e4b65080 (16-bytes, AES_KEY_GEN) | CONCATENATE_DATA_AND_BASE: | target: EXTRACT_KEY_FROM_KEY | base: base-key@0x5570e4b65080 (16-bytes, AES_KEY_GEN) | params: 16-bytes@0x7ffe19a09660 | result: message symkey-key@0x5570e4be4dc0 (44-bytes, EXTRACT_KEY_FROM_KEY) | key-offset: 0, key-size: 28 | EXTRACT_KEY_FROM_KEY: | target: EXTRACT_KEY_FROM_KEY | key_size: 28-bytes | base: base-key@0x5570e4be4dc0 (44-bytes, EXTRACT_KEY_FROM_KEY) | operation: FLAGS_ONLY | params: 8-bytes@0x7ffe19a09648 | result: message symkey-key@0x5570e4bec1c0 (28-bytes, EXTRACT_KEY_FROM_KEY) | message symkey: release tmp-key@0x5570e4be4dc0 | PRF symkey interface PRF md5 update symkey message-key@0x5570e4bec1c0 (size 28) | PRF symkey interface: symkey message-key@0x5570e4bec1c0 (28-bytes, EXTRACT_KEY_FROM_KEY) | CONCATENATE_BASE_AND_KEY: | target: CONCATENATE_BASE_AND_DATA | base: base-key@0x5570e4be6640 (64-bytes, CONCATENATE_BASE_AND_DATA) | params: 8-bytes@0x7ffe19a09678 | result: result-key@0x5570e4be4dc0 (92-bytes, CONCATENATE_BASE_AND_DATA) | append_symkey_symkey: release lhs-key@0x5570e4be6640 | PRF HMAC inner hash hash md5 inner-key@0x5570e4be4dc0 (size 92) | PRF HMAC inner hash hash md5 init | PRF HMAC inner hash hash md5 digest inner-key@0x5570e4be4dc0 (size 92) | PRF HMAC inner hash: inner-key@0x5570e4be4dc0 (92-bytes, CONCATENATE_BASE_AND_DATA) | PRF HMAC inner hash hash md5 final chunk@0x5570e4be8128 (length 16) | c3 db 14 c0 65 f5 52 03 b0 33 c8 1a 69 7b 97 c5 | : ephemeral-key@0x5570e4b65080 (16-bytes, AES_KEY_GEN) | CONCATENATE_DATA_AND_BASE: | target: EXTRACT_KEY_FROM_KEY | base: base-key@0x5570e4b65080 (16-bytes, AES_KEY_GEN) | params: 16-bytes@0x7ffe19a09500 | result: PRF HMAC inner hash-key@0x5570e4bef6d0 (32-bytes, EXTRACT_KEY_FROM_KEY) | key-offset: 0, key-size: 16 | EXTRACT_KEY_FROM_KEY: | target: EXTRACT_KEY_FROM_KEY | key_size: 16-bytes | base: base-key@0x5570e4bef6d0 (32-bytes, EXTRACT_KEY_FROM_KEY) | operation: FLAGS_ONLY | params: 8-bytes@0x7ffe19a094e8 | result: PRF HMAC inner hash-key@0x5570e4be6640 (16-bytes, EXTRACT_KEY_FROM_KEY) | PRF HMAC inner hash: release tmp-key@0x5570e4bef6d0 | PRF symkey interface: release inner-key@0x5570e4be4dc0 | XOR_BASE_AND_DATA: | target: CONCATENATE_BASE_AND_DATA | base: base-key@0x5570e4bedc70 (64-bytes, EXTRACT_KEY_FROM_KEY) | params: 16-bytes@0x7ffe19a09570 | result: result-key@0x5570e4be4dc0 (64-bytes, CONCATENATE_BASE_AND_DATA) | CONCATENATE_BASE_AND_KEY: | target: CONCATENATE_BASE_AND_DATA | base: base-key@0x5570e4be4dc0 (64-bytes, CONCATENATE_BASE_AND_DATA) | params: 8-bytes@0x7ffe19a09558 | result: result-key@0x5570e4bef6d0 (80-bytes, CONCATENATE_BASE_AND_DATA) | append_symkey_symkey: release lhs-key@0x5570e4be4dc0 | PRF symkey interface: release hashed-inner-key@0x5570e4be6640 | PRF symkey interface: release key-key@0x5570e4bedc70 | PRF HMAC outer hash hash md5 outer-key@0x5570e4bef6d0 (size 80) | PRF HMAC outer hash hash md5 init | PRF HMAC outer hash hash md5 digest outer-key@0x5570e4bef6d0 (size 80) | PRF HMAC outer hash: outer-key@0x5570e4bef6d0 (80-bytes, CONCATENATE_BASE_AND_DATA) | PRF HMAC outer hash hash md5 final chunk@0x5570e4be8128 (length 16) | 75 0c 78 3e 6a b0 b5 03 ea a8 6e 31 0a 5d b7 38 | : ephemeral-key@0x5570e4b65080 (16-bytes, AES_KEY_GEN) | CONCATENATE_DATA_AND_BASE: | target: EXTRACT_KEY_FROM_KEY | base: base-key@0x5570e4b65080 (16-bytes, AES_KEY_GEN) | params: 16-bytes@0x7ffe19a095c0 | result: PRF HMAC outer hash-key@0x5570e4be6640 (32-bytes, EXTRACT_KEY_FROM_KEY) | key-offset: 0, key-size: 16 | EXTRACT_KEY_FROM_KEY: | target: EXTRACT_KEY_FROM_KEY | key_size: 16-bytes | base: base-key@0x5570e4be6640 (32-bytes, EXTRACT_KEY_FROM_KEY) | operation: FLAGS_ONLY | params: 8-bytes@0x7ffe19a095a8 | result: PRF HMAC outer hash-key@0x5570e4bedc70 (16-bytes, EXTRACT_KEY_FROM_KEY) | PRF HMAC outer hash: release tmp-key@0x5570e4be6640 | PRF symkey interface: release outer-key@0x5570e4bef6d0 | : hashed-outer-key@0x5570e4bedc70 (16-bytes, EXTRACT_KEY_FROM_KEY) | PRF symkey interface PRF md5 final-key@0x5570e4bedc70 (size 16) | PRF symkey interface: key-key@0x5570e4bedc70 (16-bytes, EXTRACT_KEY_FROM_KEY) | output: symkey-key@0x5570e4bedc70 (16-bytes, EXTRACT_KEY_FROM_KEY) | RFC 2104: MD5_HMAC test 2 extracting all 16 bytes of key@0x5570e4bedc70 | RFC 2104: MD5_HMAC test 2: symkey-key@0x5570e4bedc70 (16-bytes, EXTRACT_KEY_FROM_KEY) | : ephemeral-key@0x5570e4b65080 (16-bytes, AES_KEY_GEN) | RFC 2104: MD5_HMAC test 2: new slot-key@0x5570e4be8ee0 (16-bytes, EXTRACT_KEY_FROM_KEY) | sizeof bytes 16 | wrapper: (SECItemType)-464429206: 72 a3 de 44 49 07 5f b4 f8 36 9e 04 52 e6 51 0f | RFC 2104: MD5_HMAC test 2: release slot-key-key@0x5570e4be8ee0 | RFC 2104: MD5_HMAC test 2 extracted len 16 bytes at 0x5570e4be81d8 | unwrapped: 75 0c 78 3e 6a b0 b5 03 ea a8 6e 31 0a 5d b7 38 | verify_chunk_data: RFC 2104: MD5_HMAC test 2: ok | test_prf_vector: RFC 2104: MD5_HMAC test 2 passed | test_prf_vector: release symkey-key@0x5570e4bedc70 | test_prf_vector: release message-key@0x5570e4bec1c0 | test_prf_vector: release key-key@0x5570e4befab0 | test_prf_vector: release output-key@NULL RFC 2104: MD5_HMAC test 3 | decode_to_chunk: test_prf_vector: input "0xAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAA" | decode_to_chunk: output: | aa aa aa aa aa aa aa aa aa aa aa aa aa aa aa aa | decode_to_chunk: test_prf_vector: input "0xDDDDDDDDDDDDDDDDDDDDDDDDDDDDDDDDDDDDDDDDDDDDDDDDDDDDDDDDDDDDDDDDDDDDDDDDDDDDDDDDDDDDDDDDDDDDDDDDDDDD" | decode_to_chunk: output: | dd dd dd dd dd dd dd dd dd dd dd dd dd dd dd dd | dd dd dd dd dd dd dd dd dd dd dd dd dd dd dd dd | dd dd dd dd dd dd dd dd dd dd dd dd dd dd dd dd | dd dd | decode_to_chunk: test_prf_vector: input "0x56be34521d144c88dbb8c733f0e8b3f6" | decode_to_chunk: output: | 56 be 34 52 1d 14 4c 88 db b8 c7 33 f0 e8 b3 f6 | PRF chunk interface PRF md5 init key-chunk@0x5570e4be8c98 (length 16) | aa aa aa aa aa aa aa aa aa aa aa aa aa aa aa aa | : ephemeral-key@0x5570e4b65080 (16-bytes, AES_KEY_GEN) | CONCATENATE_DATA_AND_BASE: | target: EXTRACT_KEY_FROM_KEY | base: base-key@0x5570e4b65080 (16-bytes, AES_KEY_GEN) | params: 16-bytes@0x7ffe19a095e0 | result: PRF chunk interface-key@0x5570e4bec1c0 (32-bytes, EXTRACT_KEY_FROM_KEY) | key-offset: 0, key-size: 16 | EXTRACT_KEY_FROM_KEY: | target: EXTRACT_KEY_FROM_KEY | key_size: 16-bytes | base: base-key@0x5570e4bec1c0 (32-bytes, EXTRACT_KEY_FROM_KEY) | operation: FLAGS_ONLY | params: 8-bytes@0x7ffe19a095c8 | result: PRF chunk interface-key@0x5570e4befab0 (16-bytes, EXTRACT_KEY_FROM_KEY) | PRF chunk interface: release tmp-key@0x5570e4bec1c0 | CONCATENATE_BASE_AND_DATA: | target: EXTRACT_KEY_FROM_KEY | base: base-key@0x5570e4befab0 (16-bytes, EXTRACT_KEY_FROM_KEY) | params: 16-bytes@0x7ffe19a09520 | result: trimed key-key@0x5570e4bec1c0 (64-bytes, EXTRACT_KEY_FROM_KEY) | append_symkey_bytes: release lhs-key@0x5570e4befab0 | XOR_BASE_AND_DATA: | target: CONCATENATE_BASE_AND_DATA | base: base-key@0x5570e4bec1c0 (64-bytes, EXTRACT_KEY_FROM_KEY) | params: 16-bytes@0x7ffe19a09560 | result: result-key@0x5570e4befab0 (64-bytes, CONCATENATE_BASE_AND_DATA) | PRF chunk interface PRF md5 crypt-prf@0x5570e4befa88 | PRF chunk interface PRF md5 update message-bytes@0x5570e4be7fd8 (length 50) | dd dd dd dd dd dd dd dd dd dd dd dd dd dd dd dd | dd dd dd dd dd dd dd dd dd dd dd dd dd dd dd dd | dd dd dd dd dd dd dd dd dd dd dd dd dd dd dd dd | dd dd | CONCATENATE_BASE_AND_DATA: | target: CONCATENATE_BASE_AND_DATA | base: base-key@0x5570e4befab0 (64-bytes, CONCATENATE_BASE_AND_DATA) | params: 16-bytes@0x7ffe19a09650 | result: message-key@0x5570e4bedc70 (114-bytes, CONCATENATE_BASE_AND_DATA) | append_symkey_bytes: release lhs-key@0x5570e4befab0 | PRF HMAC inner hash hash md5 inner-key@0x5570e4bedc70 (size 114) | PRF HMAC inner hash hash md5 init | PRF HMAC inner hash hash md5 digest inner-key@0x5570e4bedc70 (size 114) | PRF HMAC inner hash: inner-key@0x5570e4bedc70 (114-bytes, CONCATENATE_BASE_AND_DATA) | PRF HMAC inner hash hash md5 final chunk@0x5570e4be8128 (length 16) | 82 0a 6b 33 5d 18 7b 90 dc ba b1 7e f5 b4 26 ff | : ephemeral-key@0x5570e4b65080 (16-bytes, AES_KEY_GEN) | CONCATENATE_DATA_AND_BASE: | target: EXTRACT_KEY_FROM_KEY | base: base-key@0x5570e4b65080 (16-bytes, AES_KEY_GEN) | params: 16-bytes@0x7ffe19a094e0 | result: PRF HMAC inner hash-key@0x5570e4bef6d0 (32-bytes, EXTRACT_KEY_FROM_KEY) | key-offset: 0, key-size: 16 | EXTRACT_KEY_FROM_KEY: | target: EXTRACT_KEY_FROM_KEY | key_size: 16-bytes | base: base-key@0x5570e4bef6d0 (32-bytes, EXTRACT_KEY_FROM_KEY) | operation: FLAGS_ONLY | params: 8-bytes@0x7ffe19a094c8 | result: PRF HMAC inner hash-key@0x5570e4befab0 (16-bytes, EXTRACT_KEY_FROM_KEY) | PRF HMAC inner hash: release tmp-key@0x5570e4bef6d0 | PRF chunk interface: release inner-key@0x5570e4bedc70 | XOR_BASE_AND_DATA: | target: CONCATENATE_BASE_AND_DATA | base: base-key@0x5570e4bec1c0 (64-bytes, EXTRACT_KEY_FROM_KEY) | params: 16-bytes@0x7ffe19a09550 | result: result-key@0x5570e4bedc70 (64-bytes, CONCATENATE_BASE_AND_DATA) | CONCATENATE_BASE_AND_KEY: | target: CONCATENATE_BASE_AND_DATA | base: base-key@0x5570e4bedc70 (64-bytes, CONCATENATE_BASE_AND_DATA) | params: 8-bytes@0x7ffe19a09538 | result: result-key@0x5570e4bef6d0 (80-bytes, CONCATENATE_BASE_AND_DATA) | append_symkey_symkey: release lhs-key@0x5570e4bedc70 | PRF chunk interface: release hashed-inner-key@0x5570e4befab0 | PRF chunk interface: release key-key@0x5570e4bec1c0 | PRF HMAC outer hash hash md5 init | PRF HMAC outer hash hash md5 digest outer-key@0x5570e4bef6d0 (size 80) | PRF HMAC outer hash: outer-key@0x5570e4bef6d0 (80-bytes, CONCATENATE_BASE_AND_DATA) | PRF HMAC outer hash hash md5 final bytes@0x5570e4be81d8 (length 16) | 56 be 34 52 1d 14 4c 88 db b8 c7 33 f0 e8 b3 f6 | PRF chunk interface: release outer-key@0x5570e4bef6d0 | PRF chunk interface PRF md5 final-chunk@0x5570e4be81d8 (length 16) | 56 be 34 52 1d 14 4c 88 db b8 c7 33 f0 e8 b3 f6 | chunk output 56 be 34 52 1d 14 4c 88 db b8 c7 33 f0 e8 b3 f6 | verify_chunk_data: RFC 2104: MD5_HMAC test 3: ok | : ephemeral-key@0x5570e4b65080 (16-bytes, AES_KEY_GEN) | CONCATENATE_DATA_AND_BASE: | target: EXTRACT_KEY_FROM_KEY | base: base-key@0x5570e4b65080 (16-bytes, AES_KEY_GEN) | params: 16-bytes@0x7ffe19a09660 | result: key symkey-key@0x5570e4bec1c0 (32-bytes, EXTRACT_KEY_FROM_KEY) | key-offset: 0, key-size: 16 | EXTRACT_KEY_FROM_KEY: | target: EXTRACT_KEY_FROM_KEY | key_size: 16-bytes | base: base-key@0x5570e4bec1c0 (32-bytes, EXTRACT_KEY_FROM_KEY) | operation: FLAGS_ONLY | params: 8-bytes@0x7ffe19a09648 | result: key symkey-key@0x5570e4bef6d0 (16-bytes, EXTRACT_KEY_FROM_KEY) | key symkey: release tmp-key@0x5570e4bec1c0 | PRF symkey interface PRF md5 init key symkey-key@0x5570e4bef6d0 (size 16) | PRF symkey interface: key symkey-key@0x5570e4bef6d0 (16-bytes, EXTRACT_KEY_FROM_KEY) | PRF symkey interface: reference key-key@0x5570e4bef6d0 | CONCATENATE_BASE_AND_DATA: | target: EXTRACT_KEY_FROM_KEY | base: base-key@0x5570e4bef6d0 (16-bytes, EXTRACT_KEY_FROM_KEY) | params: 16-bytes@0x7ffe19a09520 | result: trimed key-key@0x5570e4bec1c0 (64-bytes, EXTRACT_KEY_FROM_KEY) | append_symkey_bytes: release lhs-key@0x5570e4bef6d0 | XOR_BASE_AND_DATA: | target: CONCATENATE_BASE_AND_DATA | base: base-key@0x5570e4bec1c0 (64-bytes, EXTRACT_KEY_FROM_KEY) | params: 16-bytes@0x7ffe19a09560 | result: result-key@0x5570e4befab0 (64-bytes, CONCATENATE_BASE_AND_DATA) | PRF symkey interface PRF md5 crypt-prf@0x5570e4be7f88 | : ephemeral-key@0x5570e4b65080 (16-bytes, AES_KEY_GEN) | CONCATENATE_DATA_AND_BASE: | target: EXTRACT_KEY_FROM_KEY | base: base-key@0x5570e4b65080 (16-bytes, AES_KEY_GEN) | params: 16-bytes@0x7ffe19a09660 | result: message symkey-key@0x5570e4be6640 (66-bytes, EXTRACT_KEY_FROM_KEY) | key-offset: 0, key-size: 50 | EXTRACT_KEY_FROM_KEY: | target: EXTRACT_KEY_FROM_KEY | key_size: 50-bytes | base: base-key@0x5570e4be6640 (66-bytes, EXTRACT_KEY_FROM_KEY) | operation: FLAGS_ONLY | params: 8-bytes@0x7ffe19a09648 | result: message symkey-key@0x5570e4bedc70 (50-bytes, EXTRACT_KEY_FROM_KEY) | message symkey: release tmp-key@0x5570e4be6640 | PRF symkey interface PRF md5 update symkey message-key@0x5570e4bedc70 (size 50) | PRF symkey interface: symkey message-key@0x5570e4bedc70 (50-bytes, EXTRACT_KEY_FROM_KEY) | CONCATENATE_BASE_AND_KEY: | target: CONCATENATE_BASE_AND_DATA | base: base-key@0x5570e4befab0 (64-bytes, CONCATENATE_BASE_AND_DATA) | params: 8-bytes@0x7ffe19a09678 | result: result-key@0x5570e4be6640 (114-bytes, CONCATENATE_BASE_AND_DATA) | append_symkey_symkey: release lhs-key@0x5570e4befab0 | PRF HMAC inner hash hash md5 inner-key@0x5570e4be6640 (size 114) | PRF HMAC inner hash hash md5 init | PRF HMAC inner hash hash md5 digest inner-key@0x5570e4be6640 (size 114) | PRF HMAC inner hash: inner-key@0x5570e4be6640 (114-bytes, CONCATENATE_BASE_AND_DATA) | PRF HMAC inner hash hash md5 final chunk@0x5570e4be81d8 (length 16) | 82 0a 6b 33 5d 18 7b 90 dc ba b1 7e f5 b4 26 ff | : ephemeral-key@0x5570e4b65080 (16-bytes, AES_KEY_GEN) | CONCATENATE_DATA_AND_BASE: | target: EXTRACT_KEY_FROM_KEY | base: base-key@0x5570e4b65080 (16-bytes, AES_KEY_GEN) | params: 16-bytes@0x7ffe19a09500 | result: PRF HMAC inner hash-key@0x5570e4be4dc0 (32-bytes, EXTRACT_KEY_FROM_KEY) | key-offset: 0, key-size: 16 | EXTRACT_KEY_FROM_KEY: | target: EXTRACT_KEY_FROM_KEY | key_size: 16-bytes | base: base-key@0x5570e4be4dc0 (32-bytes, EXTRACT_KEY_FROM_KEY) | operation: FLAGS_ONLY | params: 8-bytes@0x7ffe19a094e8 | result: PRF HMAC inner hash-key@0x5570e4befab0 (16-bytes, EXTRACT_KEY_FROM_KEY) | PRF HMAC inner hash: release tmp-key@0x5570e4be4dc0 | PRF symkey interface: release inner-key@0x5570e4be6640 | XOR_BASE_AND_DATA: | target: CONCATENATE_BASE_AND_DATA | base: base-key@0x5570e4bec1c0 (64-bytes, EXTRACT_KEY_FROM_KEY) | params: 16-bytes@0x7ffe19a09570 | result: result-key@0x5570e4be6640 (64-bytes, CONCATENATE_BASE_AND_DATA) | CONCATENATE_BASE_AND_KEY: | target: CONCATENATE_BASE_AND_DATA | base: base-key@0x5570e4be6640 (64-bytes, CONCATENATE_BASE_AND_DATA) | params: 8-bytes@0x7ffe19a09558 | result: result-key@0x5570e4be4dc0 (80-bytes, CONCATENATE_BASE_AND_DATA) | append_symkey_symkey: release lhs-key@0x5570e4be6640 | PRF symkey interface: release hashed-inner-key@0x5570e4befab0 | PRF symkey interface: release key-key@0x5570e4bec1c0 | PRF HMAC outer hash hash md5 outer-key@0x5570e4be4dc0 (size 80) | PRF HMAC outer hash hash md5 init | PRF HMAC outer hash hash md5 digest outer-key@0x5570e4be4dc0 (size 80) | PRF HMAC outer hash: outer-key@0x5570e4be4dc0 (80-bytes, CONCATENATE_BASE_AND_DATA) | PRF HMAC outer hash hash md5 final chunk@0x5570e4be81d8 (length 16) | 56 be 34 52 1d 14 4c 88 db b8 c7 33 f0 e8 b3 f6 | : ephemeral-key@0x5570e4b65080 (16-bytes, AES_KEY_GEN) | CONCATENATE_DATA_AND_BASE: | target: EXTRACT_KEY_FROM_KEY | base: base-key@0x5570e4b65080 (16-bytes, AES_KEY_GEN) | params: 16-bytes@0x7ffe19a095c0 | result: PRF HMAC outer hash-key@0x5570e4befab0 (32-bytes, EXTRACT_KEY_FROM_KEY) | key-offset: 0, key-size: 16 | EXTRACT_KEY_FROM_KEY: | target: EXTRACT_KEY_FROM_KEY | key_size: 16-bytes | base: base-key@0x5570e4befab0 (32-bytes, EXTRACT_KEY_FROM_KEY) | operation: FLAGS_ONLY | params: 8-bytes@0x7ffe19a095a8 | result: PRF HMAC outer hash-key@0x5570e4bec1c0 (16-bytes, EXTRACT_KEY_FROM_KEY) | PRF HMAC outer hash: release tmp-key@0x5570e4befab0 | PRF symkey interface: release outer-key@0x5570e4be4dc0 | : hashed-outer-key@0x5570e4bec1c0 (16-bytes, EXTRACT_KEY_FROM_KEY) | PRF symkey interface PRF md5 final-key@0x5570e4bec1c0 (size 16) | PRF symkey interface: key-key@0x5570e4bec1c0 (16-bytes, EXTRACT_KEY_FROM_KEY) | output: symkey-key@0x5570e4bec1c0 (16-bytes, EXTRACT_KEY_FROM_KEY) | RFC 2104: MD5_HMAC test 3 extracting all 16 bytes of key@0x5570e4bec1c0 | RFC 2104: MD5_HMAC test 3: symkey-key@0x5570e4bec1c0 (16-bytes, EXTRACT_KEY_FROM_KEY) | : ephemeral-key@0x5570e4b65080 (16-bytes, AES_KEY_GEN) | RFC 2104: MD5_HMAC test 3: new slot-key@0x5570e4be8ee0 (16-bytes, EXTRACT_KEY_FROM_KEY) | sizeof bytes 16 | wrapper: (SECItemType)-464429206: b5 90 07 48 a9 05 79 e6 af 6c 6f 54 eb 27 09 8d | RFC 2104: MD5_HMAC test 3: release slot-key-key@0x5570e4be8ee0 | RFC 2104: MD5_HMAC test 3 extracted len 16 bytes at 0x5570e4be8128 | unwrapped: 56 be 34 52 1d 14 4c 88 db b8 c7 33 f0 e8 b3 f6 | verify_chunk_data: RFC 2104: MD5_HMAC test 3: ok | test_prf_vector: RFC 2104: MD5_HMAC test 3 passed | test_prf_vector: release symkey-key@0x5570e4bec1c0 | test_prf_vector: release message-key@0x5570e4bedc70 | test_prf_vector: release key-key@0x5570e4bef6d0 | test_prf_vector: release output-key@NULL 8 CPU cores online starting up 7 crypto helpers started thread for crypto helper 0 | starting up helper thread 0 started thread for crypto helper 1 | status value returned by setting the priority of this thread (crypto helper 0) 22 | crypto helper 0 waiting (nothing to do) | starting up helper thread 1 started thread for crypto helper 2 | starting up helper thread 2 | status value returned by setting the priority of this thread (crypto helper 1) 22 | crypto helper 1 waiting (nothing to do) started thread for crypto helper 3 | starting up helper thread 3 | status value returned by setting the priority of this thread (crypto helper 2) 22 | crypto helper 2 waiting (nothing to do) | status value returned by setting the priority of this thread (crypto helper 3) 22 | crypto helper 3 waiting (nothing to do) started thread for crypto helper 4 | starting up helper thread 4 | status value returned by setting the priority of this thread (crypto helper 4) 22 | crypto helper 4 waiting (nothing to do) started thread for crypto helper 5 | starting up helper thread 5 | status value returned by setting the priority of this thread (crypto helper 5) 22 | crypto helper 5 waiting (nothing to do) started thread for crypto helper 6 | starting up helper thread 6 | status value returned by setting the priority of this thread (crypto helper 6) 22 | crypto helper 6 waiting (nothing to do) | checking IKEv1 state table | MAIN_R0: category: half-open IKE SA flags: 0: | -> MAIN_R1 EVENT_SO_DISCARD | MAIN_I1: category: half-open IKE SA flags: 0: | -> MAIN_I2 EVENT_RETRANSMIT | MAIN_R1: category: open IKE SA flags: 200: | -> MAIN_R2 EVENT_RETRANSMIT | -> UNDEFINED EVENT_RETRANSMIT | -> UNDEFINED EVENT_RETRANSMIT | MAIN_I2: category: open IKE SA flags: 0: | -> MAIN_I3 EVENT_RETRANSMIT | -> UNDEFINED EVENT_RETRANSMIT | -> UNDEFINED EVENT_RETRANSMIT | MAIN_R2: category: open IKE SA flags: 0: | -> MAIN_R3 EVENT_SA_REPLACE | -> MAIN_R3 EVENT_SA_REPLACE | -> UNDEFINED EVENT_SA_REPLACE | MAIN_I3: category: open IKE SA flags: 0: | -> MAIN_I4 EVENT_SA_REPLACE | -> MAIN_I4 EVENT_SA_REPLACE | -> UNDEFINED EVENT_SA_REPLACE | MAIN_R3: category: established IKE SA flags: 200: | -> UNDEFINED EVENT_NULL | MAIN_I4: category: established IKE SA flags: 0: | -> UNDEFINED EVENT_NULL | AGGR_R0: category: half-open IKE SA flags: 0: | -> AGGR_R1 EVENT_SO_DISCARD | AGGR_I1: category: half-open IKE SA flags: 0: | -> AGGR_I2 EVENT_SA_REPLACE | -> AGGR_I2 EVENT_SA_REPLACE | AGGR_R1: category: open IKE SA flags: 200: | -> AGGR_R2 EVENT_SA_REPLACE | -> AGGR_R2 EVENT_SA_REPLACE | AGGR_I2: category: established IKE SA flags: 200: | -> UNDEFINED EVENT_NULL | AGGR_R2: category: established IKE SA flags: 0: | -> UNDEFINED EVENT_NULL | QUICK_R0: category: established CHILD SA flags: 0: | -> QUICK_R1 EVENT_RETRANSMIT | QUICK_I1: category: established CHILD SA flags: 0: | -> QUICK_I2 EVENT_SA_REPLACE | QUICK_R1: category: established CHILD SA flags: 0: | -> QUICK_R2 EVENT_SA_REPLACE | QUICK_I2: category: established CHILD SA flags: 200: | -> UNDEFINED EVENT_NULL | QUICK_R2: category: established CHILD SA flags: 0: | -> UNDEFINED EVENT_NULL | INFO: category: informational flags: 0: | -> UNDEFINED EVENT_NULL | INFO_PROTECTED: category: informational flags: 0: | -> UNDEFINED EVENT_NULL | XAUTH_R0: category: established IKE SA flags: 0: | -> XAUTH_R1 EVENT_NULL | XAUTH_R1: category: established IKE SA flags: 0: | -> MAIN_R3 EVENT_SA_REPLACE | MODE_CFG_R0: category: informational flags: 0: | -> MODE_CFG_R1 EVENT_SA_REPLACE | MODE_CFG_R1: category: established IKE SA flags: 0: | -> MODE_CFG_R2 EVENT_SA_REPLACE | MODE_CFG_R2: category: established IKE SA flags: 0: | -> UNDEFINED EVENT_NULL | MODE_CFG_I1: category: established IKE SA flags: 0: | -> MAIN_I4 EVENT_SA_REPLACE | XAUTH_I0: category: established IKE SA flags: 0: | -> XAUTH_I1 EVENT_RETRANSMIT | XAUTH_I1: category: established IKE SA flags: 0: | -> MAIN_I4 EVENT_RETRANSMIT | checking IKEv2 state table | PARENT_I0: category: ignore flags: 0: | -> PARENT_I1 EVENT_RETRANSMIT send-request (initiate IKE_SA_INIT) | PARENT_I1: category: half-open IKE SA flags: 0: | -> PARENT_I1 EVENT_RETAIN send-request (Initiator: process SA_INIT reply notification) | -> PARENT_I2 EVENT_RETRANSMIT send-request (Initiator: process IKE_SA_INIT reply, initiate IKE_AUTH) | PARENT_I2: category: open IKE SA flags: 0: | -> PARENT_I2 EVENT_NULL (Initiator: process INVALID_SYNTAX AUTH notification) | -> PARENT_I2 EVENT_NULL (Initiator: process AUTHENTICATION_FAILED AUTH notification) | -> PARENT_I2 EVENT_NULL (Initiator: process UNSUPPORTED_CRITICAL_PAYLOAD AUTH notification) | -> V2_IPSEC_I EVENT_SA_REPLACE (Initiator: process IKE_AUTH response) | -> PARENT_I2 EVENT_NULL (IKE SA: process IKE_AUTH response containing unknown notification) | PARENT_I3: category: established IKE SA flags: 0: | -> PARENT_I3 EVENT_RETAIN (I3: Informational Request) | -> PARENT_I3 EVENT_RETAIN (I3: Informational Response) | -> PARENT_I3 EVENT_RETAIN (I3: INFORMATIONAL Request) | -> PARENT_I3 EVENT_RETAIN (I3: INFORMATIONAL Response) | PARENT_R0: category: half-open IKE SA flags: 0: | -> PARENT_R1 EVENT_SO_DISCARD send-request (Respond to IKE_SA_INIT) | PARENT_R1: category: half-open IKE SA flags: 0: | -> PARENT_R1 EVENT_SA_REPLACE send-request (Responder: process IKE_AUTH request (no SKEYSEED)) | -> V2_IPSEC_R EVENT_SA_REPLACE send-request (Responder: process IKE_AUTH request) | PARENT_R2: category: established IKE SA flags: 0: | -> PARENT_R2 EVENT_RETAIN (R2: process Informational Request) | -> PARENT_R2 EVENT_RETAIN (R2: process Informational Response) | -> PARENT_R2 EVENT_RETAIN (R2: process INFORMATIONAL Request) | -> PARENT_R2 EVENT_RETAIN (R2: process INFORMATIONAL Response) | V2_CREATE_I0: category: established IKE SA flags: 0: | -> V2_CREATE_I EVENT_RETRANSMIT send-request (Initiate CREATE_CHILD_SA IPsec SA) | V2_CREATE_I: category: established IKE SA flags: 0: | -> V2_IPSEC_I EVENT_SA_REPLACE (Process CREATE_CHILD_SA IPsec SA Response) | V2_REKEY_IKE_I0: category: established IKE SA flags: 0: | -> V2_REKEY_IKE_I EVENT_RETRANSMIT send-request (Initiate CREATE_CHILD_SA IKE Rekey) | V2_REKEY_IKE_I: category: established IKE SA flags: 0: | -> PARENT_I3 EVENT_SA_REPLACE (Process CREATE_CHILD_SA IKE Rekey Response) | V2_REKEY_CHILD_I0: category: established IKE SA flags: 0: | -> V2_REKEY_CHILD_I EVENT_RETRANSMIT send-request (Initiate CREATE_CHILD_SA IPsec Rekey SA) | V2_REKEY_CHILD_I: category: established IKE SA flags: 0: | V2_CREATE_R: category: established IKE SA flags: 0: | -> V2_IPSEC_R EVENT_SA_REPLACE send-request (Respond to CREATE_CHILD_SA IPsec SA Request) | V2_REKEY_IKE_R: category: established IKE SA flags: 0: | -> PARENT_R2 EVENT_SA_REPLACE send-request (Respond to CREATE_CHILD_SA IKE Rekey) | V2_REKEY_CHILD_R: category: established IKE SA flags: 0: | V2_IPSEC_I: category: established CHILD SA flags: 0: | V2_IPSEC_R: category: established CHILD SA flags: 0: | IKESA_DEL: category: established IKE SA flags: 0: | -> IKESA_DEL EVENT_RETAIN (IKE_SA_DEL: process INFORMATIONAL) | CHILDSA_DEL: category: informational flags: 0: Using Linux XFRM/NETKEY IPsec interface code on 5.1.18-200.fc29.x86_64 | Hard-wiring algorithms | adding AES_CCM_16 to kernel algorithm db | adding AES_CCM_12 to kernel algorithm db | adding AES_CCM_8 to kernel algorithm db | adding 3DES_CBC to kernel algorithm db | adding CAMELLIA_CBC to kernel algorithm db | adding AES_GCM_16 to kernel algorithm db | adding AES_GCM_12 to kernel algorithm db | adding AES_GCM_8 to kernel algorithm db | adding AES_CTR to kernel algorithm db | adding AES_CBC to kernel algorithm db | adding SERPENT_CBC to kernel algorithm db | adding TWOFISH_CBC to kernel algorithm db | adding NULL_AUTH_AES_GMAC to kernel algorithm db | adding NULL to kernel algorithm db | adding CHACHA20_POLY1305 to kernel algorithm db | adding HMAC_MD5_96 to kernel algorithm db | adding HMAC_SHA1_96 to kernel algorithm db | adding HMAC_SHA2_512_256 to kernel algorithm db | adding HMAC_SHA2_384_192 to kernel algorithm db | adding HMAC_SHA2_256_128 to kernel algorithm db | adding HMAC_SHA2_256_TRUNCBUG to kernel algorithm db | adding AES_XCBC_96 to kernel algorithm db | adding AES_CMAC_96 to kernel algorithm db | adding NONE to kernel algorithm db | net.ipv6.conf.all.disable_ipv6=1 ignore ipv6 holes | global periodic timer EVENT_SHUNT_SCAN enabled with interval of 20 seconds | setup kernel fd callback | add_fd_read_event_handler: new KERNEL_XRM_FD-pe@0x5570e4be7fd8 | libevent_malloc: new ptr-libevent@0x5570e4bcc428 size 128 | libevent_malloc: new ptr-libevent@0x5570e4be87a8 size 16 | add_fd_read_event_handler: new KERNEL_ROUTE_FD-pe@0x5570e4be8b18 | libevent_malloc: new ptr-libevent@0x5570e4b89078 size 128 | libevent_malloc: new ptr-libevent@0x5570e4be8c98 size 16 | vendor id hash md5 init | vendor id hash md5 digest data-bytes@0x5570e453a20b (length 11) | 4b 41 4d 45 2f 72 61 63 6f 6f 6e | vendor id hash md5 final bytes@0x5570e4be81d8 (length 16) | 70 03 cb c1 09 7d be 9c 26 00 ba 69 83 bc 8b 35 | vendor id hash md5 init | vendor id hash md5 digest data-bytes@0x5570e453b000 (length 46) | 4e 4c 42 53 5f 50 52 45 53 45 4e 54 28 4e 4c 42 | 2f 4d 53 43 53 20 66 61 73 74 20 66 61 69 6c 6f | 76 65 72 20 73 75 70 70 6f 72 74 65 64 29 | vendor id hash md5 final bytes@0x5570e4be8218 (length 16) | ec 22 62 b5 12 32 63 83 67 12 3b ce 3d 37 3c 5e | vendor id hash md5 init | vendor id hash md5 digest data-bytes@0x5570e453b030 (length 32) | 4d 53 2d 4d 61 6d 69 65 45 78 69 73 74 73 28 41 | 75 74 68 49 50 20 73 75 70 70 6f 72 74 65 64 29 | vendor id hash md5 final bytes@0x5570e4be8bf8 (length 16) | 6f fe a4 ae ec 37 f4 9a 02 6f 97 cf b5 53 30 6d | vendor id hash md5 init | vendor id hash md5 digest data-bytes@0x5570e453a38e (length 17) | 49 4b 45 20 43 47 41 20 76 65 72 73 69 6f 6e 20 | 31 | vendor id hash md5 final bytes@0x5570e4be87e8 (length 16) | e3 a5 96 6a 76 37 9f e7 07 22 82 31 e5 ce 86 52 | vendor id hash md5 init | vendor id hash md5 digest data-bytes@0x5570e453b058 (length 32) | 4d 53 2d 4e 65 67 6f 74 69 61 74 69 6f 6e 20 44 | 69 73 63 6f 76 65 72 79 20 43 61 70 61 62 6c 65 | vendor id hash md5 final bytes@0x5570e4be8cd8 (length 16) | fb 1d e3 cd f3 41 b7 ea 16 b7 e5 be 08 55 f1 20 | vendor id hash md5 init | vendor id hash md5 digest data-bytes@0x5570e453a3a0 (length 23) | 4d 69 63 72 6f 73 6f 66 74 20 58 62 6f 78 20 4f | 6e 65 20 32 30 31 33 | vendor id hash md5 final bytes@0x5570e4be80e8 (length 16) | 8a a3 94 cf 8a 55 77 dc 31 10 c1 13 b0 27 a4 f2 | vendor id hash md5 init | vendor id hash md5 digest data-bytes@0x5570e453a3b8 (length 22) | 58 62 6f 78 20 49 4b 45 76 32 20 4e 65 67 6f 74 | 69 61 74 69 6f 6e | vendor id hash md5 final bytes@0x5570e4be8ad8 (length 16) | aa 28 1f cc d6 8c f8 a8 dc b8 5c c0 a7 10 40 2a | vendor id hash md5 init | vendor id hash md5 digest data-bytes@0x5570e453a3cf (length 28) | 4d 53 46 54 20 49 50 73 65 63 20 53 65 63 75 72 | 69 74 79 20 52 65 61 6c 6d 20 49 64 | vendor id hash md5 final bytes@0x5570e4befc18 (length 16) | 68 6a 8c bd fe 63 4b 40 51 46 fb 2b af 33 e9 e8 | vendor id hash md5 init | vendor id hash md5 digest data-bytes@0x5570e453b080 (length 39) | 41 20 47 53 53 2d 41 50 49 20 41 75 74 68 65 6e | 74 69 63 61 74 69 6f 6e 20 4d 65 74 68 6f 64 20 | 66 6f 72 20 49 4b 45 | vendor id hash md5 final bytes@0x5570e4bf4ef8 (length 16) | ad 2c 0d d0 b9 c3 20 83 cc ba 25 b8 86 1e c4 55 | vendor id hash md5 init | vendor id hash md5 digest data-bytes@0x5570e453a3ec (length 6) | 47 53 53 41 50 49 | vendor id hash md5 final bytes@0x5570e4bf4f38 (length 16) | 62 1b 04 bb 09 88 2a c1 e1 59 35 fe fa 24 ae ee | vendor id hash md5 init | vendor id hash md5 digest data-bytes@0x5570e453a3f3 (length 12) | 53 53 48 20 53 65 6e 74 69 6e 65 6c | vendor id hash md5 final bytes@0x5570e4bf4f78 (length 16) | 05 41 82 a0 7c 7a e2 06 f9 d2 cf 9d 24 32 c4 82 | vendor id hash md5 init | vendor id hash md5 digest data-bytes@0x5570e453a400 (length 16) | 53 53 48 20 53 65 6e 74 69 6e 65 6c 20 31 2e 31 | vendor id hash md5 final bytes@0x5570e4bf4fb8 (length 16) | b9 16 23 e6 93 ca 18 a5 4c 6a 27 78 55 23 05 e8 | vendor id hash md5 init | vendor id hash md5 digest data-bytes@0x5570e453a411 (length 16) | 53 53 48 20 53 65 6e 74 69 6e 65 6c 20 31 2e 32 | vendor id hash md5 final bytes@0x5570e4bf4ff8 (length 16) | 54 30 88 8d e0 1a 31 a6 fa 8f 60 22 4e 44 99 58 | vendor id hash md5 init | vendor id hash md5 digest data-bytes@0x5570e453a422 (length 16) | 53 53 48 20 53 65 6e 74 69 6e 65 6c 20 31 2e 33 | vendor id hash md5 final bytes@0x5570e4bf5038 (length 16) | 7e e5 cb 85 f7 1c e2 59 c9 4a 5c 73 1e e4 e7 52 | vendor id hash md5 init | vendor id hash md5 digest data-bytes@0x5570e453a433 (length 16) | 53 53 48 20 53 65 6e 74 69 6e 65 6c 20 31 2e 34 | vendor id hash md5 final bytes@0x5570e4bf5078 (length 16) | 63 d9 a1 a7 00 94 91 b5 a0 a6 fd eb 2a 82 84 f0 | vendor id hash md5 init | vendor id hash md5 digest data-bytes@0x5570e453a444 (length 18) | 53 53 48 20 53 65 6e 74 69 6e 65 6c 20 31 2e 34 | 2e 31 | vendor id hash md5 final bytes@0x5570e4bf50b8 (length 16) | eb 4b 0d 96 27 6b 4e 22 0a d1 62 21 a7 b2 a5 e6 | vendor id hash md5 init | vendor id hash md5 digest data-bytes@0x5570e453b0a8 (length 55) | 53 73 68 20 43 6f 6d 6d 75 6e 69 63 61 74 69 6f | 6e 73 20 53 65 63 75 72 69 74 79 20 49 50 53 45 | 43 20 45 78 70 72 65 73 73 20 76 65 72 73 69 6f | 6e 20 31 2e 31 2e 30 | vendor id hash md5 final bytes@0x5570e4bf50f8 (length 16) | fb f4 76 14 98 40 31 fa 8e 3b b6 19 80 89 b2 23 | vendor id hash md5 init | vendor id hash md5 digest data-bytes@0x5570e453b0e0 (length 55) | 53 73 68 20 43 6f 6d 6d 75 6e 69 63 61 74 69 6f | 6e 73 20 53 65 63 75 72 69 74 79 20 49 50 53 45 | 43 20 45 78 70 72 65 73 73 20 76 65 72 73 69 6f | 6e 20 31 2e 31 2e 31 | vendor id hash md5 final bytes@0x5570e4bf5138 (length 16) | 19 52 dc 91 ac 20 f6 46 fb 01 cf 42 a3 3a ee 30 | vendor id hash md5 init | vendor id hash md5 digest data-bytes@0x5570e453b118 (length 55) | 53 73 68 20 43 6f 6d 6d 75 6e 69 63 61 74 69 6f | 6e 73 20 53 65 63 75 72 69 74 79 20 49 50 53 45 | 43 20 45 78 70 72 65 73 73 20 76 65 72 73 69 6f | 6e 20 31 2e 31 2e 32 | vendor id hash md5 final bytes@0x5570e4bf5178 (length 16) | e8 bf fa 64 3e 5c 8f 2c d1 0f da 73 70 b6 eb e5 | vendor id hash md5 init | vendor id hash md5 digest data-bytes@0x5570e453b150 (length 55) | 53 73 68 20 43 6f 6d 6d 75 6e 69 63 61 74 69 6f | 6e 73 20 53 65 63 75 72 69 74 79 20 49 50 53 45 | 43 20 45 78 70 72 65 73 73 20 76 65 72 73 69 6f | 6e 20 31 2e 32 2e 31 | vendor id hash md5 final bytes@0x5570e4bf51b8 (length 16) | c1 11 1b 2d ee 8c bc 3d 62 05 73 ec 57 aa b9 cb | vendor id hash md5 init | vendor id hash md5 digest data-bytes@0x5570e453b188 (length 55) | 53 73 68 20 43 6f 6d 6d 75 6e 69 63 61 74 69 6f | 6e 73 20 53 65 63 75 72 69 74 79 20 49 50 53 45 | 43 20 45 78 70 72 65 73 73 20 76 65 72 73 69 6f | 6e 20 31 2e 32 2e 32 | vendor id hash md5 final bytes@0x5570e4bf51f8 (length 16) | 09 ec 27 bf bc 09 c7 58 23 cf ec bf fe 56 5a 2e | vendor id hash md5 init | vendor id hash md5 digest data-bytes@0x5570e453b1c0 (length 55) | 53 53 48 20 43 6f 6d 6d 75 6e 69 63 61 74 69 6f | 6e 73 20 53 65 63 75 72 69 74 79 20 49 50 53 45 | 43 20 45 78 70 72 65 73 73 20 76 65 72 73 69 6f | 6e 20 32 2e 30 2e 30 | vendor id hash md5 final bytes@0x5570e4bf5238 (length 16) | 7f 21 a5 96 e4 e3 18 f0 b2 f4 94 4c 23 84 cb 84 | vendor id hash md5 init | vendor id hash md5 digest data-bytes@0x5570e453b1f8 (length 55) | 53 53 48 20 43 6f 6d 6d 75 6e 69 63 61 74 69 6f | 6e 73 20 53 65 63 75 72 69 74 79 20 49 50 53 45 | 43 20 45 78 70 72 65 73 73 20 76 65 72 73 69 6f | 6e 20 32 2e 31 2e 30 | vendor id hash md5 final bytes@0x5570e4bf5278 (length 16) | 28 36 d1 fd 28 07 bc 9e 5a e3 07 86 32 04 51 ec | vendor id hash md5 init | vendor id hash md5 digest data-bytes@0x5570e453b230 (length 55) | 53 53 48 20 43 6f 6d 6d 75 6e 69 63 61 74 69 6f | 6e 73 20 53 65 63 75 72 69 74 79 20 49 50 53 45 | 43 20 45 78 70 72 65 73 73 20 76 65 72 73 69 6f | 6e 20 32 2e 31 2e 31 | vendor id hash md5 final bytes@0x5570e4bf52b8 (length 16) | a6 8d e7 56 a9 c5 22 9b ae 66 49 80 40 95 1a d5 | vendor id hash md5 init | vendor id hash md5 digest data-bytes@0x5570e453b268 (length 55) | 53 53 48 20 43 6f 6d 6d 75 6e 69 63 61 74 69 6f | 6e 73 20 53 65 63 75 72 69 74 79 20 49 50 53 45 | 43 20 45 78 70 72 65 73 73 20 76 65 72 73 69 6f | 6e 20 32 2e 31 2e 32 | vendor id hash md5 final bytes@0x5570e4bf52f8 (length 16) | 3f 23 72 86 7e 23 7c 1c d8 25 0a 75 55 9c ae 20 | vendor id hash md5 init | vendor id hash md5 digest data-bytes@0x5570e453b2a0 (length 55) | 53 53 48 20 43 6f 6d 6d 75 6e 69 63 61 74 69 6f | 6e 73 20 53 65 63 75 72 69 74 79 20 49 50 53 45 | 43 20 45 78 70 72 65 73 73 20 76 65 72 73 69 6f | 6e 20 33 2e 30 2e 30 | vendor id hash md5 final bytes@0x5570e4bf5338 (length 16) | 0e 58 d5 77 4d f6 02 00 7d 0b 02 44 36 60 f7 eb | vendor id hash md5 init | vendor id hash md5 digest data-bytes@0x5570e453b2d8 (length 55) | 53 53 48 20 43 6f 6d 6d 75 6e 69 63 61 74 69 6f | 6e 73 20 53 65 63 75 72 69 74 79 20 49 50 53 45 | 43 20 45 78 70 72 65 73 73 20 76 65 72 73 69 6f | 6e 20 33 2e 30 2e 31 | vendor id hash md5 final bytes@0x5570e4bf5378 (length 16) | f5 ce 31 eb c2 10 f4 43 50 cf 71 26 5b 57 38 0f | vendor id hash md5 init | vendor id hash md5 digest data-bytes@0x5570e453b310 (length 55) | 53 53 48 20 43 6f 6d 6d 75 6e 69 63 61 74 69 6f | 6e 73 20 53 65 63 75 72 69 74 79 20 49 50 53 45 | 43 20 45 78 70 72 65 73 73 20 76 65 72 73 69 6f | 6e 20 34 2e 30 2e 30 | vendor id hash md5 final bytes@0x5570e4bf53b8 (length 16) | f6 42 60 af 2e 27 42 da dd d5 69 87 06 8a 99 a0 | vendor id hash md5 init | vendor id hash md5 digest data-bytes@0x5570e453b348 (length 55) | 53 53 48 20 43 6f 6d 6d 75 6e 69 63 61 74 69 6f | 6e 73 20 53 65 63 75 72 69 74 79 20 49 50 53 45 | 43 20 45 78 70 72 65 73 73 20 76 65 72 73 69 6f | 6e 20 34 2e 30 2e 31 | vendor id hash md5 final bytes@0x5570e4bf53f8 (length 16) | 7a 54 d3 bd b3 b1 e6 d9 23 89 20 64 be 2d 98 1c | vendor id hash md5 init | vendor id hash md5 digest data-bytes@0x5570e453b380 (length 55) | 53 53 48 20 43 6f 6d 6d 75 6e 69 63 61 74 69 6f | 6e 73 20 53 65 63 75 72 69 74 79 20 49 50 53 45 | 43 20 45 78 70 72 65 73 73 20 76 65 72 73 69 6f | 6e 20 34 2e 31 2e 30 | vendor id hash md5 final bytes@0x5570e4bf5438 (length 16) | 9a a1 f3 b4 34 72 a4 5d 5f 50 6a eb 26 0c f2 14 | vendor id hash md5 init | vendor id hash md5 digest data-bytes@0x5570e453b3b8 (length 55) | 53 53 48 20 43 6f 6d 6d 75 6e 69 63 61 74 69 6f | 6e 73 20 53 65 63 75 72 69 74 79 20 49 50 53 45 | 43 20 45 78 70 72 65 73 73 20 76 65 72 73 69 6f | 6e 20 34 2e 32 2e 30 | vendor id hash md5 final bytes@0x5570e4bf5478 (length 16) | 68 80 c7 d0 26 09 91 14 e4 86 c5 54 30 e7 ab ee | vendor id hash md5 init | vendor id hash md5 digest data-bytes@0x5570e453b3f0 (length 41) | 4c 69 6e 75 78 20 46 72 65 65 53 2f 57 41 4e 20 | 32 2e 30 30 20 50 4c 55 54 4f 5f 53 45 4e 44 53 | 5f 56 45 4e 44 4f 52 49 44 | vendor id hash md5 final bytes@0x7ffe19a09740 (length 16) | 44 76 1b d7 6b 80 85 41 74 87 ee 8a 51 cf fc f3 | vendor id hash md5 init | vendor id hash md5 digest data-bytes@0x5570e453b420 (length 53) | 4c 69 6e 75 78 20 46 72 65 65 53 2f 57 41 4e 20 | 32 2e 30 30 20 58 2e 35 30 39 2d 31 2e 33 2e 31 | 20 50 4c 55 54 4f 5f 53 45 4e 44 53 5f 56 45 4e | 44 4f 52 49 44 | vendor id hash md5 final bytes@0x7ffe19a09740 (length 16) | b7 0e 8a c3 92 b1 6e 05 48 2f c4 dc 36 10 91 68 | vendor id hash md5 init | vendor id hash md5 digest data-bytes@0x5570e453b458 (length 58) | 4c 69 6e 75 78 20 46 72 65 65 53 2f 57 41 4e 20 | 32 2e 30 30 20 58 2e 35 30 39 2d 31 2e 33 2e 31 | 20 4c 44 41 50 20 50 4c 55 54 4f 5f 53 45 4e 44 | 53 5f 56 45 4e 44 4f 52 49 44 | vendor id hash md5 final bytes@0x7ffe19a09740 (length 16) | 97 1d ea 93 c3 c2 06 74 f9 ae 35 40 83 de 3e 2f | vendor id hash md5 init | vendor id hash md5 digest data-bytes@0x5570e453a531 (length 14) | 4f 70 65 6e 73 77 61 6e 20 32 2e 32 2e 30 | vendor id hash md5 final bytes@0x7ffe19a09740 (length 16) | 08 72 0b ee 9e 28 95 3c e0 8f 0a 18 b6 e2 9d da | vendor id hash md5 init | vendor id hash md5 digest data-bytes@0x5570e453b4c0 (length 37) | 64 72 61 66 74 2d 73 74 65 6e 62 65 72 67 2d 69 | 70 73 65 63 2d 6e 61 74 2d 74 72 61 76 65 72 73 | 61 6c 2d 30 31 | vendor id hash md5 final bytes@0x5570e4bf5638 (length 16) | 27 ba b5 dc 01 ea 07 60 ea 4e 31 90 ac 27 c0 d0 | vendor id hash md5 init | vendor id hash md5 digest data-bytes@0x5570e453b4e8 (length 37) | 64 72 61 66 74 2d 73 74 65 6e 62 65 72 67 2d 69 | 70 73 65 63 2d 6e 61 74 2d 74 72 61 76 65 72 73 | 61 6c 2d 30 32 | vendor id hash md5 final bytes@0x5570e4bf5678 (length 16) | 61 05 c4 22 e7 68 47 e4 3f 96 84 80 12 92 ae cd | vendor id hash md5 init | vendor id hash md5 digest data-bytes@0x5570e453a559 (length 10) | 45 53 50 54 68 72 75 4e 41 54 | vendor id hash md5 final bytes@0x5570e4bf56b8 (length 16) | 50 76 0f 62 4c 63 e5 c5 3e ea 38 6c 68 5c a0 83 | vendor id hash md5 init | vendor id hash md5 digest data-bytes@0x5570e453b510 (length 38) | 64 72 61 66 74 2d 68 75 74 74 75 6e 65 6e 2d 69 | 70 73 65 63 2d 65 73 70 2d 69 6e 2d 75 64 70 2d | 30 30 2e 74 78 74 | vendor id hash md5 final bytes@0x5570e4bf56f8 (length 16) | 6a 74 34 c1 9d 7e 36 34 80 90 a0 23 34 c9 c8 05 | vendor id hash md5 init | vendor id hash md5 digest data-bytes@0x5570e453a564 (length 29) | 64 72 61 66 74 2d 69 65 74 66 2d 69 70 73 65 63 | 2d 6e 61 74 2d 74 2d 69 6b 65 2d 30 30 | vendor id hash md5 final bytes@0x5570e4bf5738 (length 16) | 44 85 15 2d 18 b6 bb cd 0b e8 a8 46 95 79 dd cc | vendor id hash md5 init | vendor id hash md5 digest data-bytes@0x5570e453a582 (length 29) | 64 72 61 66 74 2d 69 65 74 66 2d 69 70 73 65 63 | 2d 6e 61 74 2d 74 2d 69 6b 65 2d 30 31 | vendor id hash md5 final bytes@0x5570e4bf5778 (length 16) | 16 f6 ca 16 e4 a4 06 6d 83 82 1a 0f 0a ea a8 62 | vendor id hash md5 init | vendor id hash md5 digest data-bytes@0x5570e453a5a0 (length 29) | 64 72 61 66 74 2d 69 65 74 66 2d 69 70 73 65 63 | 2d 6e 61 74 2d 74 2d 69 6b 65 2d 30 32 | vendor id hash md5 final bytes@0x5570e4bf57b8 (length 16) | cd 60 46 43 35 df 21 f8 7c fd b2 fc 68 b6 a4 48 | vendor id hash md5 init | vendor id hash md5 digest data-bytes@0x5570e453b538 (length 30) | 64 72 61 66 74 2d 69 65 74 66 2d 69 70 73 65 63 | 2d 6e 61 74 2d 74 2d 69 6b 65 2d 30 32 0a | vendor id hash md5 final bytes@0x5570e4bf57f8 (length 16) | 90 cb 80 91 3e bb 69 6e 08 63 81 b5 ec 42 7b 1f | vendor id hash md5 init | vendor id hash md5 digest data-bytes@0x5570e453a5be (length 29) | 64 72 61 66 74 2d 69 65 74 66 2d 69 70 73 65 63 | 2d 6e 61 74 2d 74 2d 69 6b 65 2d 30 33 | vendor id hash md5 final bytes@0x5570e4bf5838 (length 16) | 7d 94 19 a6 53 10 ca 6f 2c 17 9d 92 15 52 9d 56 | vendor id hash md5 init | vendor id hash md5 digest data-bytes@0x5570e453a5dc (length 29) | 64 72 61 66 74 2d 69 65 74 66 2d 69 70 73 65 63 | 2d 6e 61 74 2d 74 2d 69 6b 65 2d 30 34 | vendor id hash md5 final bytes@0x5570e4bf5878 (length 16) | 99 09 b6 4e ed 93 7c 65 73 de 52 ac e9 52 fa 6b | vendor id hash md5 init | vendor id hash md5 digest data-bytes@0x5570e453a5fa (length 29) | 64 72 61 66 74 2d 69 65 74 66 2d 69 70 73 65 63 | 2d 6e 61 74 2d 74 2d 69 6b 65 2d 30 35 | vendor id hash md5 final bytes@0x5570e4bf58b8 (length 16) | 80 d0 bb 3d ef 54 56 5e e8 46 45 d4 c8 5c e3 ee | vendor id hash md5 init | vendor id hash md5 digest data-bytes@0x5570e453a618 (length 29) | 64 72 61 66 74 2d 69 65 74 66 2d 69 70 73 65 63 | 2d 6e 61 74 2d 74 2d 69 6b 65 2d 30 36 | vendor id hash md5 final bytes@0x5570e4bf58f8 (length 16) | 4d 1e 0e 13 6d ea fa 34 c4 f3 ea 9f 02 ec 72 85 | vendor id hash md5 init | vendor id hash md5 digest data-bytes@0x5570e453a636 (length 29) | 64 72 61 66 74 2d 69 65 74 66 2d 69 70 73 65 63 | 2d 6e 61 74 2d 74 2d 69 6b 65 2d 30 37 | vendor id hash md5 final bytes@0x5570e4bf5938 (length 16) | 43 9b 59 f8 ba 67 6c 4c 77 37 ae 22 ea b8 f5 82 | vendor id hash md5 init | vendor id hash md5 digest data-bytes@0x5570e453a654 (length 29) | 64 72 61 66 74 2d 69 65 74 66 2d 69 70 73 65 63 | 2d 6e 61 74 2d 74 2d 69 6b 65 2d 30 38 | vendor id hash md5 final bytes@0x5570e4bf5978 (length 16) | 8f 8d 83 82 6d 24 6b 6f c7 a8 a6 a4 28 c1 1d e8 | vendor id hash md5 init | vendor id hash md5 digest data-bytes@0x5570e453a672 (length 26) | 64 72 61 66 74 2d 69 65 74 66 2d 69 70 73 65 63 | 2d 6e 61 74 2d 74 2d 69 6b 65 | vendor id hash md5 final bytes@0x5570e4bf59b8 (length 16) | 4d f3 79 28 e9 fc 4f d1 b3 26 21 70 d5 15 c6 62 | vendor id hash md5 init | vendor id hash md5 digest data-bytes@0x5570e453a68d (length 8) | 52 46 43 20 33 39 34 37 | vendor id hash md5 final bytes@0x5570e4bf59f8 (length 16) | 4a 13 1c 81 07 03 58 45 5c 57 28 f2 0e 95 45 2f | vendor id hash md5 init | vendor id hash md5 digest data-bytes@0x5570e45434f9 (length 13) | 46 52 41 47 4d 45 4e 54 41 54 49 4f 4e | vendor id hash md5 final bytes@0x5570e4bf5ab8 (length 16) | 40 48 b7 d5 6e bc e8 85 25 e7 de 7f 00 d6 c2 d3 | vendor id hash md5 init | vendor id hash md5 digest data-bytes@0x5570e453a73d (length 19) | 56 69 64 2d 49 6e 69 74 69 61 6c 2d 43 6f 6e 74 | 61 63 74 | vendor id hash md5 final bytes@0x5570e4bf5af8 (length 16) | 26 24 4d 38 ed db 61 b3 17 2a 36 e3 d0 cf b8 19 | vendor id hash md5 init | vendor id hash md5 digest data-bytes@0x5570e453b058 (length 32) | 4d 53 2d 4e 65 67 6f 74 69 61 74 69 6f 6e 20 44 | 69 73 63 6f 76 65 72 79 20 43 61 70 61 62 6c 65 | vendor id hash md5 final bytes@0x5570e4bf5b38 (length 16) | fb 1d e3 cd f3 41 b7 ea 16 b7 e5 be 08 55 f1 20 | vendor id hash md5 init | vendor id hash md5 digest data-bytes@0x5570e453a38e (length 17) | 49 4b 45 20 43 47 41 20 76 65 72 73 69 6f 6e 20 | 31 | vendor id hash md5 final bytes@0x5570e4bf5b78 (length 16) | e3 a5 96 6a 76 37 9f e7 07 22 82 31 e5 ce 86 52 | vendor id hash md5 init | vendor id hash md5 digest data-bytes@0x5570e453a751 (length 14) | 4d 53 2d 4d 61 6d 69 65 45 78 69 73 74 73 | vendor id hash md5 final bytes@0x5570e4bf5bb8 (length 16) | 21 4c a4 fa ff a7 f3 2d 67 48 e5 30 33 95 ae 83 | vendor id hash md5 init | vendor id hash md5 digest data-bytes@0x5570e45298dd (length 10) | 73 74 72 6f 6e 67 53 77 61 6e | vendor id hash md5 final bytes@0x5570e4bf5bf8 (length 16) | 88 2f e5 6d 6f d2 0d bc 22 51 61 3b 2e be 5b eb | vendor id hash md5 init | vendor id hash md5 digest data-bytes@0x5570e453a760 (length 16) | 73 74 72 6f 6e 67 53 77 61 6e 20 34 2e 30 2e 30 | vendor id hash md5 final bytes@0x5570e4bf5c38 (length 16) | 2c e9 c9 46 a4 c8 79 bf 11 b5 0b 76 cc 56 92 cb | vendor id hash md5 init | vendor id hash md5 digest data-bytes@0x5570e453a771 (length 16) | 73 74 72 6f 6e 67 53 77 61 6e 20 34 2e 30 2e 31 | vendor id hash md5 final bytes@0x5570e4bf5c78 (length 16) | 9d bb af cf 1d b0 dd 59 5a e0 65 29 40 03 ad 3e | vendor id hash md5 init | vendor id hash md5 digest data-bytes@0x5570e453a782 (length 16) | 73 74 72 6f 6e 67 53 77 61 6e 20 34 2e 30 2e 32 | vendor id hash md5 final bytes@0x5570e4bf5cb8 (length 16) | 77 e8 ee a6 f5 56 a4 99 de 3f fe 7f 7f 95 66 1c | vendor id hash md5 init | vendor id hash md5 digest data-bytes@0x5570e453a793 (length 16) | 73 74 72 6f 6e 67 53 77 61 6e 20 34 2e 30 2e 33 | vendor id hash md5 final bytes@0x5570e4bf5cf8 (length 16) | b1 81 b1 8e 11 4f c2 09 b3 c6 e2 6c 3a 80 71 8e | vendor id hash md5 init | vendor id hash md5 digest data-bytes@0x5570e453a7a4 (length 16) | 73 74 72 6f 6e 67 53 77 61 6e 20 34 2e 30 2e 34 | vendor id hash md5 final bytes@0x5570e4bf5d38 (length 16) | 1e f2 83 f8 35 49 b5 ff 96 08 b6 d6 34 f8 4d 75 | vendor id hash md5 init | vendor id hash md5 digest data-bytes@0x5570e453a7b5 (length 16) | 73 74 72 6f 6e 67 53 77 61 6e 20 34 2e 30 2e 35 | vendor id hash md5 final bytes@0x5570e4bf5d78 (length 16) | dd 18 0d 21 e5 ce 65 5a 76 8b a3 22 11 dd 8a d9 | vendor id hash md5 init | vendor id hash md5 digest data-bytes@0x5570e453a7c6 (length 16) | 73 74 72 6f 6e 67 53 77 61 6e 20 34 2e 30 2e 36 | vendor id hash md5 final bytes@0x5570e4bf5db8 (length 16) | 4c 90 13 69 46 57 7b 51 91 9d 8d 9a 6b 8e 4a 9f | vendor id hash md5 init | vendor id hash md5 digest data-bytes@0x5570e453a7d7 (length 16) | 73 74 72 6f 6e 67 53 77 61 6e 20 34 2e 30 2e 37 | vendor id hash md5 final bytes@0x5570e4bf5df8 (length 16) | ab 07 46 22 1c c8 fd 0d 52 38 f7 3a 9b 3d a5 57 | vendor id hash md5 init | vendor id hash md5 digest data-bytes@0x5570e453a7e8 (length 16) | 73 74 72 6f 6e 67 53 77 61 6e 20 34 2e 31 2e 30 | vendor id hash md5 final bytes@0x5570e4bf5e38 (length 16) | 47 94 ce f6 84 34 22 98 0d 1a 3d 06 af 41 c5 cd | vendor id hash md5 init | vendor id hash md5 digest data-bytes@0x5570e453a7f9 (length 16) | 73 74 72 6f 6e 67 53 77 61 6e 20 34 2e 31 2e 31 | vendor id hash md5 final bytes@0x5570e4bf5e78 (length 16) | d3 f1 c4 88 c3 68 17 5d 5f 40 a8 f5 ca 5f 5e 12 | vendor id hash md5 init | vendor id hash md5 digest data-bytes@0x5570e453a80a (length 16) | 73 74 72 6f 6e 67 53 77 61 6e 20 34 2e 31 2e 32 | vendor id hash md5 final bytes@0x5570e4bf5eb8 (length 16) | 15 a1 ac e7 ee 52 fd df ef 04 f9 28 db 2d d1 34 | vendor id hash md5 init | vendor id hash md5 digest data-bytes@0x5570e453a81b (length 16) | 73 74 72 6f 6e 67 53 77 61 6e 20 34 2e 31 2e 33 | vendor id hash md5 final bytes@0x5570e4bf5ef8 (length 16) | 58 49 ab 6d 8b ea bd 6e 4d 09 e5 a3 b8 8c 08 9a | vendor id hash md5 init | vendor id hash md5 digest data-bytes@0x5570e453a82c (length 16) | 73 74 72 6f 6e 67 53 77 61 6e 20 34 2e 31 2e 34 | vendor id hash md5 final bytes@0x5570e4bf5f38 (length 16) | 31 2f 9c b1 a6 b9 0e 19 de 75 28 c9 04 ac 30 87 | vendor id hash md5 init | vendor id hash md5 digest data-bytes@0x5570e453a83d (length 16) | 73 74 72 6f 6e 67 53 77 61 6e 20 34 2e 31 2e 35 | vendor id hash md5 final bytes@0x5570e4bf5f78 (length 16) | bf 0f bf 73 06 eb b7 82 70 42 d8 93 53 98 86 e2 | vendor id hash md5 init | vendor id hash md5 digest data-bytes@0x5570e453a84e (length 16) | 73 74 72 6f 6e 67 53 77 61 6e 20 34 2e 31 2e 36 | vendor id hash md5 final bytes@0x5570e4bf5fb8 (length 16) | d1 96 83 36 8a f4 b0 ed c2 1c cd e9 82 b1 d1 b0 | vendor id hash md5 init | vendor id hash md5 digest data-bytes@0x5570e453a85f (length 16) | 73 74 72 6f 6e 67 53 77 61 6e 20 34 2e 31 2e 37 | vendor id hash md5 final bytes@0x5570e4bf5ff8 (length 16) | ea 84 0a a4 df c9 71 2d 6c 32 b5 a1 6e b3 29 a3 | vendor id hash md5 init | vendor id hash md5 digest data-bytes@0x5570e453a870 (length 16) | 73 74 72 6f 6e 67 53 77 61 6e 20 34 2e 31 2e 38 | vendor id hash md5 final bytes@0x5570e4bf6038 (length 16) | 66 a2 04 55 07 c1 19 da 78 a4 66 62 59 cd ea 48 | vendor id hash md5 init | vendor id hash md5 digest data-bytes@0x5570e453a881 (length 16) | 73 74 72 6f 6e 67 53 77 61 6e 20 34 2e 31 2e 39 | vendor id hash md5 final bytes@0x5570e4bf6078 (length 16) | 78 fd d2 87 de f0 1a 3f 07 4b 53 69 ea b4 fd 1c | vendor id hash md5 init | vendor id hash md5 digest data-bytes@0x5570e453a892 (length 17) | 73 74 72 6f 6e 67 53 77 61 6e 20 34 2e 31 2e 31 | 30 | vendor id hash md5 final bytes@0x5570e4bf60b8 (length 16) | bf 3a 89 ae 5b ef 8e 72 d4 4d ac 8b b8 8d 7d 5f | vendor id hash md5 init | vendor id hash md5 digest data-bytes@0x5570e453a8a4 (length 17) | 73 74 72 6f 6e 67 53 77 61 6e 20 34 2e 31 2e 31 | 31 | vendor id hash md5 final bytes@0x5570e4bf60f8 (length 16) | b7 bd 9f 2f 97 8e 32 59 a7 aa 9f 7a 13 96 ad 6c | vendor id hash md5 init | vendor id hash md5 digest data-bytes@0x5570e453a8b6 (length 16) | 73 74 72 6f 6e 67 53 77 61 6e 20 34 2e 32 2e 30 | vendor id hash md5 final bytes@0x5570e4bf6138 (length 16) | 9f 68 90 13 25 a9 72 89 43 35 30 2a 95 31 ab 9f | vendor id hash md5 init | vendor id hash md5 digest data-bytes@0x5570e453a8c7 (length 16) | 73 74 72 6f 6e 67 53 77 61 6e 20 34 2e 32 2e 31 | vendor id hash md5 final bytes@0x5570e4bf6178 (length 16) | ba b2 53 f4 cb 10 a8 10 8a 7c 92 7c 56 c8 78 86 | vendor id hash md5 init | vendor id hash md5 digest data-bytes@0x5570e453a8d8 (length 16) | 73 74 72 6f 6e 67 53 77 61 6e 20 34 2e 32 2e 32 | vendor id hash md5 final bytes@0x5570e4bf61b8 (length 16) | 2a 51 7d 0d 23 c3 7d 08 bc e7 c2 92 a0 21 7b 39 | vendor id hash md5 init | vendor id hash md5 digest data-bytes@0x5570e453a8e9 (length 16) | 73 74 72 6f 6e 67 53 77 61 6e 20 34 2e 32 2e 33 | vendor id hash md5 final bytes@0x5570e4bf61f8 (length 16) | 2d 1f 40 61 18 fb d5 d2 84 74 79 1f fa 00 48 8a | vendor id hash md5 init | vendor id hash md5 digest data-bytes@0x5570e453a8fa (length 16) | 73 74 72 6f 6e 67 53 77 61 6e 20 32 2e 38 2e 38 | vendor id hash md5 final bytes@0x5570e4bf6238 (length 16) | 8c 4a 3b cb 72 9b 11 f7 03 d2 2a 5b 39 64 0c a8 | vendor id hash md5 init | vendor id hash md5 digest data-bytes@0x5570e453a90b (length 16) | 73 74 72 6f 6e 67 53 77 61 6e 20 32 2e 38 2e 37 | vendor id hash md5 final bytes@0x5570e4bf6278 (length 16) | 3a 0d 4e 7c a4 e4 92 ed 4d fe 47 6d 1a c6 01 8b | vendor id hash md5 init | vendor id hash md5 digest data-bytes@0x5570e453a91c (length 16) | 73 74 72 6f 6e 67 53 77 61 6e 20 32 2e 38 2e 36 | vendor id hash md5 final bytes@0x5570e4bf62b8 (length 16) | fe 3f 49 70 6e 26 a9 fb 36 a8 7b fc e9 ea 36 ce | vendor id hash md5 init | vendor id hash md5 digest data-bytes@0x5570e453a92d (length 16) | 73 74 72 6f 6e 67 53 77 61 6e 20 32 2e 38 2e 35 | vendor id hash md5 final bytes@0x5570e4bf62f8 (length 16) | 4c 7e fa 31 b3 9e 51 04 32 a3 17 57 0d 97 bb b9 | vendor id hash md5 init | vendor id hash md5 digest data-bytes@0x5570e453a93e (length 16) | 73 74 72 6f 6e 67 53 77 61 6e 20 32 2e 38 2e 34 | vendor id hash md5 final bytes@0x5570e4bf6338 (length 16) | 76 c7 2b fd 39 84 24 dd 00 1b 86 d0 01 2f e0 61 | vendor id hash md5 init | vendor id hash md5 digest data-bytes@0x5570e453a94f (length 16) | 73 74 72 6f 6e 67 53 77 61 6e 20 32 2e 38 2e 33 | vendor id hash md5 final bytes@0x5570e4bf6378 (length 16) | fb 46 41 ad 0e eb 2a 34 49 1d 15 f4 ef f5 10 63 | vendor id hash md5 init | vendor id hash md5 digest data-bytes@0x5570e453a960 (length 16) | 73 74 72 6f 6e 67 53 77 61 6e 20 32 2e 38 2e 32 | vendor id hash md5 final bytes@0x5570e4bf63b8 (length 16) | 29 99 32 27 7b 7d fe 38 2c e2 34 65 33 3a 7d 23 | vendor id hash md5 init | vendor id hash md5 digest data-bytes@0x5570e453a971 (length 16) | 73 74 72 6f 6e 67 53 77 61 6e 20 32 2e 38 2e 31 | vendor id hash md5 final bytes@0x5570e4bf63f8 (length 16) | e3 7f 2d 5b a8 9a 62 cd 20 2e e2 7d ac 06 c8 a8 | vendor id hash md5 init | vendor id hash md5 digest data-bytes@0x5570e453a982 (length 16) | 73 74 72 6f 6e 67 53 77 61 6e 20 32 2e 38 2e 30 | vendor id hash md5 final bytes@0x5570e4bf6438 (length 16) | 32 f0 e9 b9 c0 6d fe 8c 9a d5 59 9a 63 69 71 a1 | vendor id hash md5 init | vendor id hash md5 digest data-bytes@0x5570e453a993 (length 16) | 73 74 72 6f 6e 67 53 77 61 6e 20 32 2e 37 2e 33 | vendor id hash md5 final bytes@0x5570e4bf6478 (length 16) | 7f 50 cc 4e bf 04 c2 d9 da 73 ab fd 69 b7 7a a2 | vendor id hash md5 init | vendor id hash md5 digest data-bytes@0x5570e453a9a4 (length 16) | 73 74 72 6f 6e 67 53 77 61 6e 20 32 2e 37 2e 32 | vendor id hash md5 final bytes@0x5570e4bf64b8 (length 16) | a1 94 e2 aa dd d0 ba fb 95 25 3d d9 6d c7 33 eb | vendor id hash md5 init | vendor id hash md5 digest data-bytes@0x5570e453a9b5 (length 16) | 73 74 72 6f 6e 67 53 77 61 6e 20 32 2e 37 2e 31 | vendor id hash md5 final bytes@0x5570e4bf64f8 (length 16) | 81 34 87 85 82 12 17 85 ba 65 ea 34 5d 6b a7 24 | vendor id hash md5 init | vendor id hash md5 digest data-bytes@0x5570e453a9c6 (length 16) | 73 74 72 6f 6e 67 53 77 61 6e 20 32 2e 37 2e 30 | vendor id hash md5 final bytes@0x5570e4bf6538 (length 16) | 07 fa 12 8e 47 54 f9 44 7b 1d d4 63 74 ee f3 60 | vendor id hash md5 init | vendor id hash md5 digest data-bytes@0x5570e453a9d7 (length 16) | 73 74 72 6f 6e 67 53 77 61 6e 20 32 2e 36 2e 34 | vendor id hash md5 final bytes@0x5570e4bf6578 (length 16) | b9 27 f9 52 19 a0 fe 36 00 db a3 c1 18 2a e5 5f | vendor id hash md5 init | vendor id hash md5 digest data-bytes@0x5570e453a9e8 (length 16) | 73 74 72 6f 6e 67 53 77 61 6e 20 32 2e 36 2e 33 | vendor id hash md5 final bytes@0x5570e4bf65b8 (length 16) | b2 86 0e 78 37 f7 11 be f3 d0 ee b1 06 87 2d ed | vendor id hash md5 init | vendor id hash md5 digest data-bytes@0x5570e453a9f9 (length 16) | 73 74 72 6f 6e 67 53 77 61 6e 20 32 2e 36 2e 32 | vendor id hash md5 final bytes@0x5570e4bf65f8 (length 16) | 5b 1c d6 fe 7d 05 0e da 6c 93 87 1c 10 7d b3 d2 | vendor id hash md5 init | vendor id hash md5 digest data-bytes@0x5570e453aa0a (length 16) | 73 74 72 6f 6e 67 53 77 61 6e 20 32 2e 36 2e 31 | vendor id hash md5 final bytes@0x5570e4bf6638 (length 16) | 66 af bc 12 bb fe 6c e1 08 b1 f6 9f 4b c9 17 b7 | vendor id hash md5 init | vendor id hash md5 digest data-bytes@0x5570e453aa1b (length 16) | 73 74 72 6f 6e 67 53 77 61 6e 20 32 2e 36 2e 30 | vendor id hash md5 final bytes@0x5570e4bf6678 (length 16) | 3f 32 66 49 9f fd bd 85 95 0e 70 22 98 06 28 44 | vendor id hash md5 init | vendor id hash md5 digest data-bytes@0x5570e453aa2c (length 16) | 73 74 72 6f 6e 67 53 77 61 6e 20 32 2e 35 2e 37 | vendor id hash md5 final bytes@0x5570e4bf66b8 (length 16) | 1f 44 42 29 6b 83 d7 e3 3a 8b 45 20 9b a0 e5 90 | vendor id hash md5 init | vendor id hash md5 digest data-bytes@0x5570e453aa3d (length 16) | 73 74 72 6f 6e 67 53 77 61 6e 20 32 2e 35 2e 36 | vendor id hash md5 final bytes@0x5570e4bf66f8 (length 16) | 3c 5e ba 3d 85 64 92 8e 32 ae 43 c3 d9 92 4d ee | vendor id hash md5 init | vendor id hash md5 digest data-bytes@0x5570e453aa4e (length 16) | 73 74 72 6f 6e 67 53 77 61 6e 20 32 2e 35 2e 35 | vendor id hash md5 final bytes@0x5570e4bf6738 (length 16) | 3f 26 7e d6 21 ad a7 ee 6c 7d 88 93 cc b0 b1 4b | vendor id hash md5 init | vendor id hash md5 digest data-bytes@0x5570e453aa5f (length 16) | 73 74 72 6f 6e 67 53 77 61 6e 20 32 2e 35 2e 34 | vendor id hash md5 final bytes@0x5570e4bf6778 (length 16) | 7a 6b f5 b7 df 89 64 2a 75 a7 8e f7 d6 57 c1 c0 | vendor id hash md5 init | vendor id hash md5 digest data-bytes@0x5570e453aa70 (length 16) | 73 74 72 6f 6e 67 53 77 61 6e 20 32 2e 35 2e 33 | vendor id hash md5 final bytes@0x5570e4bf67b8 (length 16) | df 5b 1f 0f 1d 56 79 d9 f8 51 2b 16 c5 5a 60 65 | vendor id hash md5 init | vendor id hash md5 digest data-bytes@0x5570e453aa81 (length 16) | 73 74 72 6f 6e 67 53 77 61 6e 20 32 2e 35 2e 32 | vendor id hash md5 final bytes@0x5570e4bf67f8 (length 16) | 86 1c e5 eb 72 16 4b 19 0e 9e 62 9a 31 cf 49 01 | vendor id hash md5 init | vendor id hash md5 digest data-bytes@0x5570e453aa92 (length 16) | 73 74 72 6f 6e 67 53 77 61 6e 20 32 2e 35 2e 31 | vendor id hash md5 final bytes@0x5570e4bf6838 (length 16) | 9a 4a 46 48 f6 0f 8e da 7c fc bf e2 71 ee 5b 7d | vendor id hash md5 init | vendor id hash md5 digest data-bytes@0x5570e453aaa3 (length 16) | 73 74 72 6f 6e 67 53 77 61 6e 20 32 2e 35 2e 30 | vendor id hash md5 final bytes@0x5570e4bf6878 (length 16) | 9e b3 d9 07 ed 7a da 4e 3c bc ac b9 17 ab c8 e4 | vendor id hash md5 init | vendor id hash md5 digest data-bytes@0x5570e453aab4 (length 16) | 73 74 72 6f 6e 67 53 77 61 6e 20 32 2e 34 2e 34 | vendor id hash md5 final bytes@0x5570e4bf68b8 (length 16) | 48 5a 70 36 1b 44 33 b3 1d ea 1c 6b e0 df 24 3e | vendor id hash md5 init | vendor id hash md5 digest data-bytes@0x5570e453aac5 (length 16) | 73 74 72 6f 6e 67 53 77 61 6e 20 32 2e 34 2e 33 | vendor id hash md5 final bytes@0x5570e4bf68f8 (length 16) | 98 2b 7a 06 3a 33 c1 43 a8 ea dc 88 24 9f 6b cc | vendor id hash md5 init | vendor id hash md5 digest data-bytes@0x5570e453aad6 (length 16) | 73 74 72 6f 6e 67 53 77 61 6e 20 32 2e 34 2e 32 | vendor id hash md5 final bytes@0x5570e4bf6938 (length 16) | e7 a3 fd 0c 6d 77 1a 8f 1b 8a 86 a4 16 9c 9e a4 | vendor id hash md5 init | vendor id hash md5 digest data-bytes@0x5570e453aae7 (length 16) | 73 74 72 6f 6e 67 53 77 61 6e 20 32 2e 34 2e 31 | vendor id hash md5 final bytes@0x5570e4bf6978 (length 16) | 75 b0 65 3c b2 81 eb 26 d3 1e de 38 c8 e1 e2 28 | vendor id hash md5 init | vendor id hash md5 digest data-bytes@0x5570e453aaf8 (length 16) | 73 74 72 6f 6e 67 53 77 61 6e 20 32 2e 34 2e 30 | vendor id hash md5 final bytes@0x5570e4bf69b8 (length 16) | e8 29 c8 81 49 ba b3 c0 ce e8 5d a6 0e 18 ae 9b | vendor id hash md5 init | vendor id hash md5 digest data-bytes@0x5570e453ab09 (length 16) | 73 74 72 6f 6e 67 53 77 61 6e 20 32 2e 33 2e 32 | vendor id hash md5 final bytes@0x5570e4bf69f8 (length 16) | 42 a4 83 4c 92 ab 9a 77 77 06 3a fa 25 4b cb 69 | vendor id hash md5 init | vendor id hash md5 digest data-bytes@0x5570e453ab1a (length 16) | 73 74 72 6f 6e 67 53 77 61 6e 20 32 2e 33 2e 31 | vendor id hash md5 final bytes@0x5570e4bf6a38 (length 16) | f6 97 c1 af cc 2e c8 dd cd f9 9d c7 af 03 a6 7f | vendor id hash md5 init | vendor id hash md5 digest data-bytes@0x5570e453ab2b (length 16) | 73 74 72 6f 6e 67 53 77 61 6e 20 32 2e 33 2e 30 | vendor id hash md5 final bytes@0x5570e4bf6a78 (length 16) | b8 f9 2b 2f a2 d3 fe 5f e1 58 34 4b da 1c c6 ae | vendor id hash md5 init | vendor id hash md5 digest data-bytes@0x5570e453ab3c (length 16) | 73 74 72 6f 6e 67 53 77 61 6e 20 32 2e 32 2e 32 | vendor id hash md5 final bytes@0x5570e4bf6ab8 (length 16) | 99 dc 7c c8 23 37 6b 3b 33 d0 43 57 89 6a e0 7b | vendor id hash md5 init | vendor id hash md5 digest data-bytes@0x5570e453ab4d (length 16) | 73 74 72 6f 6e 67 53 77 61 6e 20 32 2e 32 2e 31 | vendor id hash md5 final bytes@0x5570e4bf6af8 (length 16) | d9 11 8b 1e 9d e5 ef ce d9 cc 9d 88 3f 21 68 ff | vendor id hash md5 init | vendor id hash md5 digest data-bytes@0x5570e453ab5e (length 16) | 73 74 72 6f 6e 67 53 77 61 6e 20 32 2e 32 2e 30 | vendor id hash md5 final bytes@0x5570e4bf6b38 (length 16) | 85 b6 cb ec 48 0d 5c 8c d9 88 2c 82 5a c2 c2 44 | vendor id hash md5 init | vendor id hash md5 digest data-bytes@0x5570e45434f9 (length 13) | 46 52 41 47 4d 45 4e 54 41 54 49 4f 4e | vendor id hash md5 final bytes@0x5570e4bf6b78 (length 16) | 40 48 b7 d5 6e bc e8 85 25 e7 de 7f 00 d6 c2 d3 | global one-shot timer EVENT_CHECK_CRLS initialized selinux support is enabled. | unbound context created - setting debug level to 5 | /etc/hosts lookups activated | /etc/resolv.conf usage activated | outgoing-port-avoid set 0-65535 | outgoing-port-permit set 32768-60999 | Loading dnssec root key from:/var/lib/unbound/root.key | No additional dnssec trust anchors defined via dnssec-trusted= option | Setting up events, loop start | add_fd_read_event_handler: new PLUTO_CTL_FD-pe@0x5570e4be8b88 | libevent_malloc: new ptr-libevent@0x5570e4bf4e48 size 128 | libevent_malloc: new ptr-libevent@0x5570e4c00018 size 16 | libevent_realloc: new ptr-libevent@0x5570e4c00058 size 256 | libevent_malloc: new ptr-libevent@0x5570e4c00188 size 8 | libevent_realloc: new ptr-libevent@0x5570e4c001c8 size 144 | libevent_malloc: new ptr-libevent@0x5570e4b88788 size 152 | libevent_malloc: new ptr-libevent@0x5570e4c00288 size 16 | signal event handler PLUTO_SIGCHLD installed | libevent_malloc: new ptr-libevent@0x5570e4c002c8 size 8 | libevent_malloc: new ptr-libevent@0x5570e4b8b518 size 152 | signal event handler PLUTO_SIGTERM installed | libevent_malloc: new ptr-libevent@0x5570e4c00308 size 8 | libevent_malloc: new ptr-libevent@0x5570e4c00348 size 152 | signal event handler PLUTO_SIGHUP installed | libevent_malloc: new ptr-libevent@0x5570e4c00418 size 8 | libevent_realloc: release ptr-libevent@0x5570e4c001c8 | libevent_realloc: new ptr-libevent@0x5570e4c00458 size 256 | libevent_malloc: new ptr-libevent@0x5570e4c00588 size 152 | signal event handler PLUTO_SIGSYS installed | created addconn helper (pid:27048) using fork+execve | forked child 27048 | accept(whackctlfd, (struct sockaddr *)&whackaddr, &whackaddrlen) -> fd@16 (in whack_handle() at rcv_whack.c:722) listening for IKE messages | Inspecting interface lo | found lo with address 127.0.0.1 | Inspecting interface eth0 | found eth0 with address 192.0.1.254 | Inspecting interface eth1 | found eth1 with address 192.1.2.45 | Inspecting interface eth1 | found eth1 with address 192.0.11.254 Kernel supports NIC esp-hw-offload adding interface eth1/eth1 (esp-hw-offload not supported by kernel) 192.0.11.254:500 | NAT-Traversal: Trying sockopt style NAT-T | NAT-Traversal: ESPINUDP(2) setup succeeded for sockopt style NAT-T family IPv4 adding interface eth1/eth1 192.0.11.254:4500 adding interface eth1/eth1 (esp-hw-offload not supported by kernel) 192.1.2.45:500 | NAT-Traversal: Trying sockopt style NAT-T | NAT-Traversal: ESPINUDP(2) setup succeeded for sockopt style NAT-T family IPv4 adding interface eth1/eth1 192.1.2.45:4500 adding interface eth0/eth0 (esp-hw-offload not supported by kernel) 192.0.1.254:500 | NAT-Traversal: Trying sockopt style NAT-T | NAT-Traversal: ESPINUDP(2) setup succeeded for sockopt style NAT-T family IPv4 adding interface eth0/eth0 192.0.1.254:4500 adding interface lo/lo (esp-hw-offload not supported by kernel) 127.0.0.1:500 | NAT-Traversal: Trying sockopt style NAT-T | NAT-Traversal: ESPINUDP(2) setup succeeded for sockopt style NAT-T family IPv4 adding interface lo/lo 127.0.0.1:4500 | no interfaces to sort | FOR_EACH_UNORIENTED_CONNECTION_... in check_orientations | add_fd_read_event_handler: new ethX-pe@0x5570e4c00d48 | libevent_malloc: new ptr-libevent@0x5570e4bf4d98 size 128 | libevent_malloc: new ptr-libevent@0x5570e4c00db8 size 16 | setup callback for interface lo 127.0.0.1:4500 fd 24 | add_fd_read_event_handler: new ethX-pe@0x5570e4c00df8 | libevent_malloc: new ptr-libevent@0x5570e4b8aad8 size 128 | libevent_malloc: new ptr-libevent@0x5570e4c00e68 size 16 | setup callback for interface lo 127.0.0.1:500 fd 23 | add_fd_read_event_handler: new ethX-pe@0x5570e4c00ea8 | libevent_malloc: new ptr-libevent@0x5570e4b8aa28 size 128 | libevent_malloc: new ptr-libevent@0x5570e4c00f18 size 16 | setup callback for interface eth0 192.0.1.254:4500 fd 22 | add_fd_read_event_handler: new ethX-pe@0x5570e4c00f58 | libevent_malloc: new ptr-libevent@0x5570e4b8b448 size 128 | libevent_malloc: new ptr-libevent@0x5570e4c01438 size 16 | setup callback for interface eth0 192.0.1.254:500 fd 21 | add_fd_read_event_handler: new ethX-pe@0x5570e4c01478 | libevent_malloc: new ptr-libevent@0x5570e4b5f4e8 size 128 | libevent_malloc: new ptr-libevent@0x5570e4c014e8 size 16 | setup callback for interface eth1 192.1.2.45:4500 fd 20 | add_fd_read_event_handler: new ethX-pe@0x5570e4c01528 | libevent_malloc: new ptr-libevent@0x5570e4b5f1d8 size 128 | libevent_malloc: new ptr-libevent@0x5570e4c01598 size 16 | setup callback for interface eth1 192.1.2.45:500 fd 19 | add_fd_read_event_handler: new ethX-pe@0x5570e4c015d8 | libevent_malloc: new ptr-libevent@0x5570e4c01648 size 128 | libevent_malloc: new ptr-libevent@0x5570e4c016f8 size 16 | setup callback for interface eth1 192.0.11.254:4500 fd 18 | add_fd_read_event_handler: new ethX-pe@0x5570e4c01738 | libevent_malloc: new ptr-libevent@0x5570e4c017a8 size 128 | libevent_malloc: new ptr-libevent@0x5570e4c01858 size 16 | setup callback for interface eth1 192.0.11.254:500 fd 17 | certs and keys locked by 'free_preshared_secrets' | certs and keys unlocked by 'free_preshared_secrets' loading secrets from "/etc/ipsec.secrets" | saving Modulus | saving PublicExponent | ignoring PrivateExponent | ignoring Prime1 | ignoring Prime2 | ignoring Exponent1 | ignoring Exponent2 | ignoring Coefficient | ignoring CKAIDNSS | computed rsa CKAID b4 9f 1a ac 9e 45 6e 79 29 c8 81 97 3a 0c 6a d3 | computed rsa CKAID 7f 0f 03 50 loaded private key for keyid: PKK_RSA:AQOm9dY/4 | certs and keys locked by 'process_secret' | certs and keys unlocked by 'process_secret' | close_any(fd@16) (in whack_process() at rcv_whack.c:700) | accept(whackctlfd, (struct sockaddr *)&whackaddr, &whackaddrlen) -> fd@16 (in whack_handle() at rcv_whack.c:722) listening for IKE messages | Inspecting interface lo | found lo with address 127.0.0.1 | Inspecting interface eth0 | found eth0 with address 192.0.1.254 | Inspecting interface eth1 | found eth1 with address 192.1.2.45 | Inspecting interface eth1 | found eth1 with address 192.0.11.254 | no interfaces to sort | libevent_free: release ptr-libevent@0x5570e4bf4d98 | free_event_entry: release EVENT_NULL-pe@0x5570e4c00d48 | add_fd_read_event_handler: new ethX-pe@0x5570e4c00d48 | libevent_malloc: new ptr-libevent@0x5570e4bf4d98 size 128 | setup callback for interface lo 127.0.0.1:4500 fd 24 | libevent_free: release ptr-libevent@0x5570e4b8aad8 | free_event_entry: release EVENT_NULL-pe@0x5570e4c00df8 | add_fd_read_event_handler: new ethX-pe@0x5570e4c00df8 | libevent_malloc: new ptr-libevent@0x5570e4b8aad8 size 128 | setup callback for interface lo 127.0.0.1:500 fd 23 | libevent_free: release ptr-libevent@0x5570e4b8aa28 | free_event_entry: release EVENT_NULL-pe@0x5570e4c00ea8 | add_fd_read_event_handler: new ethX-pe@0x5570e4c00ea8 | libevent_malloc: new ptr-libevent@0x5570e4b8aa28 size 128 | setup callback for interface eth0 192.0.1.254:4500 fd 22 | libevent_free: release ptr-libevent@0x5570e4b8b448 | free_event_entry: release EVENT_NULL-pe@0x5570e4c00f58 | add_fd_read_event_handler: new ethX-pe@0x5570e4c018f8 | libevent_malloc: new ptr-libevent@0x5570e4b8b448 size 128 | setup callback for interface eth0 192.0.1.254:500 fd 21 | libevent_free: release ptr-libevent@0x5570e4b5f4e8 | free_event_entry: release EVENT_NULL-pe@0x5570e4c01478 | add_fd_read_event_handler: new ethX-pe@0x5570e4c01478 | libevent_malloc: new ptr-libevent@0x5570e4b5f4e8 size 128 | setup callback for interface eth1 192.1.2.45:4500 fd 20 | libevent_free: release ptr-libevent@0x5570e4b5f1d8 | free_event_entry: release EVENT_NULL-pe@0x5570e4c01528 | add_fd_read_event_handler: new ethX-pe@0x5570e4c01528 | libevent_malloc: new ptr-libevent@0x5570e4b5f1d8 size 128 | setup callback for interface eth1 192.1.2.45:500 fd 19 | libevent_free: release ptr-libevent@0x5570e4c01648 | free_event_entry: release EVENT_NULL-pe@0x5570e4c015d8 | add_fd_read_event_handler: new ethX-pe@0x5570e4c015d8 | libevent_malloc: new ptr-libevent@0x5570e4c01648 size 128 | setup callback for interface eth1 192.0.11.254:4500 fd 18 | libevent_free: release ptr-libevent@0x5570e4c017a8 | free_event_entry: release EVENT_NULL-pe@0x5570e4c01738 | add_fd_read_event_handler: new ethX-pe@0x5570e4c01738 | libevent_malloc: new ptr-libevent@0x5570e4c017a8 size 128 | setup callback for interface eth1 192.0.11.254:500 fd 17 | certs and keys locked by 'free_preshared_secrets' forgetting secrets | certs and keys unlocked by 'free_preshared_secrets' loading secrets from "/etc/ipsec.secrets" | saving Modulus | saving PublicExponent | ignoring PrivateExponent | ignoring Prime1 | ignoring Prime2 | ignoring Exponent1 | ignoring Exponent2 | ignoring Coefficient | ignoring CKAIDNSS | computed rsa CKAID b4 9f 1a ac 9e 45 6e 79 29 c8 81 97 3a 0c 6a d3 | computed rsa CKAID 7f 0f 03 50 loaded private key for keyid: PKK_RSA:AQOm9dY/4 | certs and keys locked by 'process_secret' | certs and keys unlocked by 'process_secret' | close_any(fd@16) (in whack_process() at rcv_whack.c:700) | processing signal PLUTO_SIGCHLD | waitpid returned pid 27048 (exited with status 0) | reaped addconn helper child (status 0) | waitpid returned ECHILD (no child processes left) | accept(whackctlfd, (struct sockaddr *)&whackaddr, &whackaddrlen) -> fd@16 (in whack_handle() at rcv_whack.c:722) | old debugging base+crypt + none | base debugging = base+crypt | old impairing none + suppress-retransmits | base impairing = suppress-retransmits | close_any(fd@16) (in whack_process() at rcv_whack.c:700) | accept(whackctlfd, (struct sockaddr *)&whackaddr, &whackaddrlen) -> fd@16 (in whack_handle() at rcv_whack.c:722) | FOR_EACH_CONNECTION_... in conn_by_name | FOR_EACH_CONNECTION_... in foreach_connection_by_alias | FOR_EACH_CONNECTION_... in conn_by_name | FOR_EACH_CONNECTION_... in foreach_connection_by_alias | FOR_EACH_CONNECTION_... in conn_by_name | Added new connection westnets-eastnet/1x0 with policy ENCRYPT+TUNNEL+PFS+IKEV1_ALLOW+SAREF_TRACK+IKE_FRAG_ALLOW+ESN_NO | No AUTH policy was set - defaulting to RSASIG | counting wild cards for @west is 0 | counting wild cards for @east is 0 | connect_to_host_pair: 192.1.2.45:500 192.1.2.23:500 -> hp@(nil): none | new hp@0x5570e4c02288 added connection description "westnets-eastnet/1x0" | ike_life: 3600s; ipsec_life: 28800s; rekey_margin: 540s; rekey_fuzz: 100%; keyingtries: 0; replay_window: 32; policy: RSASIG+ENCRYPT+TUNNEL+PFS+IKEV1_ALLOW+SAREF_TRACK+IKE_FRAG_ALLOW+ESN_NO | 192.0.1.0/24===192.1.2.45<192.1.2.45>[@west]...192.1.2.23<192.1.2.23>[@east]===192.0.2.0/24 | close_any(fd@16) (in whack_process() at rcv_whack.c:700) | accept(whackctlfd, (struct sockaddr *)&whackaddr, &whackaddrlen) -> fd@16 (in whack_handle() at rcv_whack.c:722) add keyid @west | add pubkey 01 03 a6 f5 d6 3f e3 8f 6c 01 6a fc 7b 7c 6d 57 | add pubkey 8b 49 39 0d 77 f7 ac e2 85 f1 98 1e 4b 6d a5 3e | add pubkey b3 96 9a d1 99 5a bc 10 f2 97 de f2 28 f9 5f 92 | add pubkey 09 f0 c8 d4 12 e4 60 6e 9c 60 98 10 01 7d 26 b7 | add pubkey 8f 95 62 2d 87 dd cd de f6 d3 8f 35 b0 50 d0 18 | add pubkey f5 99 f8 04 f1 ff 61 5b bc 7f 1f c0 04 d8 e4 8c | add pubkey ac 34 ad 7a c1 da 3c 2d 8c 30 ae d6 3c 59 b1 3a | add pubkey 94 d3 d5 2a 73 91 bd 59 5f 3e 72 bf 4a 1b 9d c5 | add pubkey b2 2b 4d e7 0d 24 3e 77 f9 7f 2d d6 9d 29 ef 70 | add pubkey 7d 7a 6d a2 b8 61 0c 4b 09 4a 06 71 84 70 85 9a | add pubkey 8f 52 a1 80 06 fd c6 fc 3e 27 fa 16 fa 32 83 a9 | add pubkey ca 80 db 0f 4a bf f7 e9 55 8e bd 29 4d 23 a6 dc | add pubkey 2a b3 5d 62 a9 21 1e be 83 d8 69 3c 03 0a 48 8e | add pubkey d3 3a 11 f2 86 5a d1 30 65 bd c8 f4 83 87 ff 04 | add pubkey 87 33 05 4f e0 d8 8c fe b3 19 4c dd 85 40 f3 4d | add pubkey 6e e8 49 14 06 2c 1f 59 59 05 8f 20 b0 ca 46 3f | add pubkey c9 20 7e 04 30 7d 9a 80 6c 3f 0a 89 f7 d3 af d8 | add pubkey 15 04 37 f9 | computed rsa CKAID b4 9f 1a ac 9e 45 6e 79 29 c8 81 97 3a 0c 6a d3 | computed rsa CKAID 7f 0f 03 50 | close_any(fd@16) (in whack_process() at rcv_whack.c:700) | accept(whackctlfd, (struct sockaddr *)&whackaddr, &whackaddrlen) -> fd@16 (in whack_handle() at rcv_whack.c:722) add keyid @east | add pubkey 01 03 bd 6c 96 eb df 78 89 b3 ed 77 0d a1 7f 7b | add pubkey e5 16 c2 c9 e4 7d 92 0a 90 9d 55 43 b4 62 13 03 | add pubkey 85 7a e0 26 7b 54 1f ca 09 93 cf ff 25 c9 02 4c | add pubkey 78 ca 94 e5 3e ac d1 f9 a8 e5 bb 7f cc 20 84 e0 | add pubkey 21 c9 f0 0d c5 44 ba f3 48 64 61 58 f6 0f 63 0d | add pubkey d2 67 1e 59 8b ec f3 50 39 71 fb 39 da 11 64 b6 | add pubkey 62 cd 5f d3 8d 2e c1 50 ed 9c 6e 22 0c 39 a7 ce | add pubkey 62 b5 af 8a 80 0f 2e 4c 05 5c 82 c7 8d 29 02 2e | add pubkey bb 23 5f db f2 9e b5 7d e2 20 70 1a 63 f3 8e 5d | add pubkey ac 47 f0 5c 26 4e b1 d0 42 60 52 4a b0 77 25 ce | add pubkey e0 98 2b 43 f4 c7 59 1a 64 01 83 ea 4e e3 1a 2a | add pubkey 92 b8 55 ab 63 dd 4b 70 47 29 dc e9 b4 60 bf 43 | add pubkey 4d 58 8f 64 73 95 70 ac 35 89 b2 c2 9c d4 62 c0 | add pubkey 5f 56 5f ad 1b e5 dd 49 93 6a f5 23 82 ed d4 e7 | add pubkey d5 f1 55 f2 2d a2 26 a6 36 53 2f 94 fb 99 22 5c | add pubkey 47 cc 6d 80 30 88 96 38 0c f5 f2 ed 37 d0 09 d5 | add pubkey 07 8f 69 ef a9 99 ce 4d 1a 77 9e 39 c4 38 f3 c5 | add pubkey 51 51 48 ef | computed rsa CKAID 61 55 99 73 d3 ac ef 7d 3a 37 0e 3e 82 ad 92 c1 | computed rsa CKAID 8a 82 25 f1 | close_any(fd@16) (in whack_process() at rcv_whack.c:700) | accept(whackctlfd, (struct sockaddr *)&whackaddr, &whackaddrlen) -> fd@16 (in whack_handle() at rcv_whack.c:722) | FOR_EACH_CONNECTION_... in conn_by_name | FOR_EACH_CONNECTION_... in foreach_connection_by_alias | FOR_EACH_CONNECTION_... in conn_by_name | FOR_EACH_CONNECTION_... in foreach_connection_by_alias | FOR_EACH_CONNECTION_... in conn_by_name | Added new connection westnets-eastnet/2x0 with policy ENCRYPT+TUNNEL+PFS+IKEV1_ALLOW+SAREF_TRACK+IKE_FRAG_ALLOW+ESN_NO | No AUTH policy was set - defaulting to RSASIG | counting wild cards for @west is 0 | counting wild cards for @east is 0 | find_host_pair: comparing 192.1.2.45:500 to 192.1.2.23:500 but ignoring ports | connect_to_host_pair: 192.1.2.45:500 192.1.2.23:500 -> hp@0x5570e4c02288: westnets-eastnet/1x0 added connection description "westnets-eastnet/2x0" | ike_life: 3600s; ipsec_life: 28800s; rekey_margin: 540s; rekey_fuzz: 100%; keyingtries: 0; replay_window: 32; policy: RSASIG+ENCRYPT+TUNNEL+PFS+IKEV1_ALLOW+SAREF_TRACK+IKE_FRAG_ALLOW+ESN_NO | 192.0.11.0/24===192.1.2.45<192.1.2.45>[@west]...192.1.2.23<192.1.2.23>[@east]===192.0.2.0/24 | close_any(fd@16) (in whack_process() at rcv_whack.c:700) | accept(whackctlfd, (struct sockaddr *)&whackaddr, &whackaddrlen) -> fd@16 (in whack_handle() at rcv_whack.c:722) add keyid @west | unreference key: 0x5570e4b5ac48 @west cnt 1-- | add pubkey 01 03 a6 f5 d6 3f e3 8f 6c 01 6a fc 7b 7c 6d 57 | add pubkey 8b 49 39 0d 77 f7 ac e2 85 f1 98 1e 4b 6d a5 3e | add pubkey b3 96 9a d1 99 5a bc 10 f2 97 de f2 28 f9 5f 92 | add pubkey 09 f0 c8 d4 12 e4 60 6e 9c 60 98 10 01 7d 26 b7 | add pubkey 8f 95 62 2d 87 dd cd de f6 d3 8f 35 b0 50 d0 18 | add pubkey f5 99 f8 04 f1 ff 61 5b bc 7f 1f c0 04 d8 e4 8c | add pubkey ac 34 ad 7a c1 da 3c 2d 8c 30 ae d6 3c 59 b1 3a | add pubkey 94 d3 d5 2a 73 91 bd 59 5f 3e 72 bf 4a 1b 9d c5 | add pubkey b2 2b 4d e7 0d 24 3e 77 f9 7f 2d d6 9d 29 ef 70 | add pubkey 7d 7a 6d a2 b8 61 0c 4b 09 4a 06 71 84 70 85 9a | add pubkey 8f 52 a1 80 06 fd c6 fc 3e 27 fa 16 fa 32 83 a9 | add pubkey ca 80 db 0f 4a bf f7 e9 55 8e bd 29 4d 23 a6 dc | add pubkey 2a b3 5d 62 a9 21 1e be 83 d8 69 3c 03 0a 48 8e | add pubkey d3 3a 11 f2 86 5a d1 30 65 bd c8 f4 83 87 ff 04 | add pubkey 87 33 05 4f e0 d8 8c fe b3 19 4c dd 85 40 f3 4d | add pubkey 6e e8 49 14 06 2c 1f 59 59 05 8f 20 b0 ca 46 3f | add pubkey c9 20 7e 04 30 7d 9a 80 6c 3f 0a 89 f7 d3 af d8 | add pubkey 15 04 37 f9 | computed rsa CKAID b4 9f 1a ac 9e 45 6e 79 29 c8 81 97 3a 0c 6a d3 | computed rsa CKAID 7f 0f 03 50 | close_any(fd@16) (in whack_process() at rcv_whack.c:700) | accept(whackctlfd, (struct sockaddr *)&whackaddr, &whackaddrlen) -> fd@16 (in whack_handle() at rcv_whack.c:722) add keyid @east | unreference key: 0x5570e4c025f8 @east cnt 1-- | add pubkey 01 03 bd 6c 96 eb df 78 89 b3 ed 77 0d a1 7f 7b | add pubkey e5 16 c2 c9 e4 7d 92 0a 90 9d 55 43 b4 62 13 03 | add pubkey 85 7a e0 26 7b 54 1f ca 09 93 cf ff 25 c9 02 4c | add pubkey 78 ca 94 e5 3e ac d1 f9 a8 e5 bb 7f cc 20 84 e0 | add pubkey 21 c9 f0 0d c5 44 ba f3 48 64 61 58 f6 0f 63 0d | add pubkey d2 67 1e 59 8b ec f3 50 39 71 fb 39 da 11 64 b6 | add pubkey 62 cd 5f d3 8d 2e c1 50 ed 9c 6e 22 0c 39 a7 ce | add pubkey 62 b5 af 8a 80 0f 2e 4c 05 5c 82 c7 8d 29 02 2e | add pubkey bb 23 5f db f2 9e b5 7d e2 20 70 1a 63 f3 8e 5d | add pubkey ac 47 f0 5c 26 4e b1 d0 42 60 52 4a b0 77 25 ce | add pubkey e0 98 2b 43 f4 c7 59 1a 64 01 83 ea 4e e3 1a 2a | add pubkey 92 b8 55 ab 63 dd 4b 70 47 29 dc e9 b4 60 bf 43 | add pubkey 4d 58 8f 64 73 95 70 ac 35 89 b2 c2 9c d4 62 c0 | add pubkey 5f 56 5f ad 1b e5 dd 49 93 6a f5 23 82 ed d4 e7 | add pubkey d5 f1 55 f2 2d a2 26 a6 36 53 2f 94 fb 99 22 5c | add pubkey 47 cc 6d 80 30 88 96 38 0c f5 f2 ed 37 d0 09 d5 | add pubkey 07 8f 69 ef a9 99 ce 4d 1a 77 9e 39 c4 38 f3 c5 | add pubkey 51 51 48 ef | computed rsa CKAID 61 55 99 73 d3 ac ef 7d 3a 37 0e 3e 82 ad 92 c1 | computed rsa CKAID 8a 82 25 f1 | close_any(fd@16) (in whack_process() at rcv_whack.c:700) | accept(whackctlfd, (struct sockaddr *)&whackaddr, &whackaddrlen) -> fd@16 (in whack_handle() at rcv_whack.c:722) | dup_any(fd@16) -> fd@25 (in whack_process() at rcv_whack.c:590) | FOR_EACH_CONNECTION_... in conn_by_name initiating all conns with alias='westnets-eastnet' | FOR_EACH_CONNECTION_... in foreach_connection_by_alias | start processing: connection "westnets-eastnet/2x0" (in initiate_a_connection() at initiate.c:186) | empty esp_info, returning defaults for ENCRYPT | connection 'westnets-eastnet/2x0' +POLICY_UP | dup_any(fd@25) -> fd@26 (in initiate_a_connection() at initiate.c:342) | FOR_EACH_STATE_... in find_phase1_state | creating state object #1 at 0x5570e4c035d8 | State DB: adding IKEv1 state #1 in UNDEFINED | pstats #1 ikev1.isakmp started | suspend processing: connection "westnets-eastnet/2x0" (in main_outI1() at ikev1_main.c:118) | start processing: state #1 connection "westnets-eastnet/2x0" from 192.1.2.23 (in main_outI1() at ikev1_main.c:118) | parent state #1: UNDEFINED(ignore) => MAIN_I1(half-open IKE SA) | dup_any(fd@26) -> fd@27 (in main_outI1() at ikev1_main.c:123) | Queuing pending IPsec SA negotiating with 192.1.2.23 "westnets-eastnet/2x0" IKE SA #1 "westnets-eastnet/2x0" "westnets-eastnet/2x0" #1: initiating Main Mode | **emit ISAKMP Message: | initiator cookie: | 9f 65 42 37 54 9b 07 77 | responder cookie: | 00 00 00 00 00 00 00 00 | next payload type: ISAKMP_NEXT_SA (0x1) | ISAKMP version: ISAKMP Version 1.0 (rfc2407) (0x10) | exchange type: ISAKMP_XCHG_IDPROT (0x2) | flags: none (0x0) | Message ID: 0 (0x0) | next payload chain: saving message location 'ISAKMP Message'.'next payload type' | next payload chain: ignoring supplied 'ISAKMP Message'.'next payload type' value 1:ISAKMP_NEXT_SA | no specific IKE algorithms specified - using defaults | oakley_alg_makedb() processing ealg=aes=7 halg=sha2_256=4 modp=MODP2048=14 eklen=0 | oakley_alg_makedb() processing ealg=aes=7 halg=sha2_512=6 modp=MODP2048=14 eklen=0 | oakley_alg_makedb() processing ealg=aes=7 halg=sha=2 modp=MODP2048=14 eklen=0 | oakley_alg_makedb() processing ealg=aes=7 halg=sha2_256=4 modp=MODP1536=5 eklen=0 | oakley_alg_makedb() processing ealg=aes=7 halg=sha2_512=6 modp=MODP1536=5 eklen=0 | oakley_alg_makedb() processing ealg=aes=7 halg=sha=2 modp=MODP1536=5 eklen=0 | oakley_alg_makedb() processing ealg=3des_cbc=5 halg=sha2_256=4 modp=MODP2048=14 eklen=0 | oakley_alg_makedb() processing ealg=3des_cbc=5 halg=sha2_512=6 modp=MODP2048=14 eklen=0 | oakley_alg_makedb() processing ealg=3des_cbc=5 halg=sha=2 modp=MODP2048=14 eklen=0 | oakley_alg_makedb() processing ealg=3des_cbc=5 halg=sha2_256=4 modp=MODP1536=5 eklen=0 | oakley_alg_makedb() processing ealg=3des_cbc=5 halg=sha2_512=6 modp=MODP1536=5 eklen=0 | oakley_alg_makedb() processing ealg=3des_cbc=5 halg=sha=2 modp=MODP1536=5 eklen=0 | oakley_alg_makedb() returning 0x5570e4c06528 | ***emit ISAKMP Security Association Payload: | next payload type: ISAKMP_NEXT_VID (0xd) | DOI: ISAKMP_DOI_IPSEC (0x1) | next payload chain: ignoring supplied 'ISAKMP Security Association Payload'.'next payload type' value 13:ISAKMP_NEXT_VID | next payload chain: setting previous 'ISAKMP Message'.'next payload type' to current ISAKMP Security Association Payload (1:ISAKMP_NEXT_SA) | next payload chain: saving location 'ISAKMP Security Association Payload'.'next payload type' in 'reply packet' | ****emit IPsec DOI SIT: | IPsec DOI SIT: SIT_IDENTITY_ONLY (0x1) | ikev1_out_sa pcn: 0 has 1 valid proposals | ikev1_out_sa pcn: 0 pn: 0<1 valid_count: 1 trans_cnt: 18 | ****emit ISAKMP Proposal Payload: | next payload type: ISAKMP_NEXT_NONE (0x0) | proposal number: 0 (0x0) | protocol ID: PROTO_ISAKMP (0x1) | SPI size: 0 (0x0) | number of transforms: 18 (0x12) | last substructure: saving location 'ISAKMP Security Association Payload'.'ISAKMP Proposal Payload'.'next payload type' | *****emit ISAKMP Transform Payload (ISAKMP): | next payload type: ISAKMP_NEXT_T (0x3) | ISAKMP transform number: 0 (0x0) | ISAKMP transform ID: KEY_IKE (0x1) | last substructure: saving location 'ISAKMP Proposal Payload'.'ISAKMP Transform Payload (ISAKMP)'.'next payload type' | ******emit ISAKMP Oakley attribute: | af+type: AF+OAKLEY_LIFE_TYPE (0x800b) | length/value: 1 (0x1) | [1 is OAKLEY_LIFE_SECONDS] | ******emit ISAKMP Oakley attribute: | af+type: AF+OAKLEY_LIFE_DURATION (variable length) (0x800c) | length/value: 3600 (0xe10) | ******emit ISAKMP Oakley attribute: | af+type: AF+OAKLEY_ENCRYPTION_ALGORITHM (0x8001) | length/value: 7 (0x7) | [7 is OAKLEY_AES_CBC] | ******emit ISAKMP Oakley attribute: | af+type: AF+OAKLEY_HASH_ALGORITHM (0x8002) | length/value: 4 (0x4) | [4 is OAKLEY_SHA2_256] | ******emit ISAKMP Oakley attribute: | af+type: AF+OAKLEY_AUTHENTICATION_METHOD (0x8003) | length/value: 3 (0x3) | [3 is OAKLEY_RSA_SIG] | ******emit ISAKMP Oakley attribute: | af+type: AF+OAKLEY_GROUP_DESCRIPTION (0x8004) | length/value: 14 (0xe) | [14 is OAKLEY_GROUP_MODP2048] | ******emit ISAKMP Oakley attribute: | af+type: AF+OAKLEY_KEY_LENGTH (0x800e) | length/value: 256 (0x100) | emitting length of ISAKMP Transform Payload (ISAKMP): 36 | *****emit ISAKMP Transform Payload (ISAKMP): | next payload type: ISAKMP_NEXT_T (0x3) | ISAKMP transform number: 1 (0x1) | ISAKMP transform ID: KEY_IKE (0x1) | last substructure: checking 'ISAKMP Proposal Payload'.'ISAKMP Transform Payload (ISAKMP)'.'next payload type' is ISAKMP_NEXT_T (0x3) | last substructure: saving location 'ISAKMP Proposal Payload'.'ISAKMP Transform Payload (ISAKMP)'.'next payload type' | ******emit ISAKMP Oakley attribute: | af+type: AF+OAKLEY_LIFE_TYPE (0x800b) | length/value: 1 (0x1) | [1 is OAKLEY_LIFE_SECONDS] | ******emit ISAKMP Oakley attribute: | af+type: AF+OAKLEY_LIFE_DURATION (variable length) (0x800c) | length/value: 3600 (0xe10) | ******emit ISAKMP Oakley attribute: | af+type: AF+OAKLEY_ENCRYPTION_ALGORITHM (0x8001) | length/value: 7 (0x7) | [7 is OAKLEY_AES_CBC] | ******emit ISAKMP Oakley attribute: | af+type: AF+OAKLEY_HASH_ALGORITHM (0x8002) | length/value: 4 (0x4) | [4 is OAKLEY_SHA2_256] | ******emit ISAKMP Oakley attribute: | af+type: AF+OAKLEY_AUTHENTICATION_METHOD (0x8003) | length/value: 3 (0x3) | [3 is OAKLEY_RSA_SIG] | ******emit ISAKMP Oakley attribute: | af+type: AF+OAKLEY_GROUP_DESCRIPTION (0x8004) | length/value: 14 (0xe) | [14 is OAKLEY_GROUP_MODP2048] | ******emit ISAKMP Oakley attribute: | af+type: AF+OAKLEY_KEY_LENGTH (0x800e) | length/value: 128 (0x80) | emitting length of ISAKMP Transform Payload (ISAKMP): 36 | *****emit ISAKMP Transform Payload (ISAKMP): | next payload type: ISAKMP_NEXT_T (0x3) | ISAKMP transform number: 2 (0x2) | ISAKMP transform ID: KEY_IKE (0x1) | last substructure: checking 'ISAKMP Proposal Payload'.'ISAKMP Transform Payload (ISAKMP)'.'next payload type' is ISAKMP_NEXT_T (0x3) | last substructure: saving location 'ISAKMP Proposal Payload'.'ISAKMP Transform Payload (ISAKMP)'.'next payload type' | ******emit ISAKMP Oakley attribute: | af+type: AF+OAKLEY_LIFE_TYPE (0x800b) | length/value: 1 (0x1) | [1 is OAKLEY_LIFE_SECONDS] | ******emit ISAKMP Oakley attribute: | af+type: AF+OAKLEY_LIFE_DURATION (variable length) (0x800c) | length/value: 3600 (0xe10) | ******emit ISAKMP Oakley attribute: | af+type: AF+OAKLEY_ENCRYPTION_ALGORITHM (0x8001) | length/value: 7 (0x7) | [7 is OAKLEY_AES_CBC] | ******emit ISAKMP Oakley attribute: | af+type: AF+OAKLEY_HASH_ALGORITHM (0x8002) | length/value: 6 (0x6) | [6 is OAKLEY_SHA2_512] | ******emit ISAKMP Oakley attribute: | af+type: AF+OAKLEY_AUTHENTICATION_METHOD (0x8003) | length/value: 3 (0x3) | [3 is OAKLEY_RSA_SIG] | ******emit ISAKMP Oakley attribute: | af+type: AF+OAKLEY_GROUP_DESCRIPTION (0x8004) | length/value: 14 (0xe) | [14 is OAKLEY_GROUP_MODP2048] | ******emit ISAKMP Oakley attribute: | af+type: AF+OAKLEY_KEY_LENGTH (0x800e) | length/value: 256 (0x100) | emitting length of ISAKMP Transform Payload (ISAKMP): 36 | *****emit ISAKMP Transform Payload (ISAKMP): | next payload type: ISAKMP_NEXT_T (0x3) | ISAKMP transform number: 3 (0x3) | ISAKMP transform ID: KEY_IKE (0x1) | last substructure: checking 'ISAKMP Proposal Payload'.'ISAKMP Transform Payload (ISAKMP)'.'next payload type' is ISAKMP_NEXT_T (0x3) | last substructure: saving location 'ISAKMP Proposal Payload'.'ISAKMP Transform Payload (ISAKMP)'.'next payload type' | ******emit ISAKMP Oakley attribute: | af+type: AF+OAKLEY_LIFE_TYPE (0x800b) | length/value: 1 (0x1) | [1 is OAKLEY_LIFE_SECONDS] | ******emit ISAKMP Oakley attribute: | af+type: AF+OAKLEY_LIFE_DURATION (variable length) (0x800c) | length/value: 3600 (0xe10) | ******emit ISAKMP Oakley attribute: | af+type: AF+OAKLEY_ENCRYPTION_ALGORITHM (0x8001) | length/value: 7 (0x7) | [7 is OAKLEY_AES_CBC] | ******emit ISAKMP Oakley attribute: | af+type: AF+OAKLEY_HASH_ALGORITHM (0x8002) | length/value: 6 (0x6) | [6 is OAKLEY_SHA2_512] | ******emit ISAKMP Oakley attribute: | af+type: AF+OAKLEY_AUTHENTICATION_METHOD (0x8003) | length/value: 3 (0x3) | [3 is OAKLEY_RSA_SIG] | ******emit ISAKMP Oakley attribute: | af+type: AF+OAKLEY_GROUP_DESCRIPTION (0x8004) | length/value: 14 (0xe) | [14 is OAKLEY_GROUP_MODP2048] | ******emit ISAKMP Oakley attribute: | af+type: AF+OAKLEY_KEY_LENGTH (0x800e) | length/value: 128 (0x80) | emitting length of ISAKMP Transform Payload (ISAKMP): 36 | *****emit ISAKMP Transform Payload (ISAKMP): | next payload type: ISAKMP_NEXT_T (0x3) | ISAKMP transform number: 4 (0x4) | ISAKMP transform ID: KEY_IKE (0x1) | last substructure: checking 'ISAKMP Proposal Payload'.'ISAKMP Transform Payload (ISAKMP)'.'next payload type' is ISAKMP_NEXT_T (0x3) | last substructure: saving location 'ISAKMP Proposal Payload'.'ISAKMP Transform Payload (ISAKMP)'.'next payload type' | ******emit ISAKMP Oakley attribute: | af+type: AF+OAKLEY_LIFE_TYPE (0x800b) | length/value: 1 (0x1) | [1 is OAKLEY_LIFE_SECONDS] | ******emit ISAKMP Oakley attribute: | af+type: AF+OAKLEY_LIFE_DURATION (variable length) (0x800c) | length/value: 3600 (0xe10) | ******emit ISAKMP Oakley attribute: | af+type: AF+OAKLEY_ENCRYPTION_ALGORITHM (0x8001) | length/value: 7 (0x7) | [7 is OAKLEY_AES_CBC] | ******emit ISAKMP Oakley attribute: | af+type: AF+OAKLEY_HASH_ALGORITHM (0x8002) | length/value: 2 (0x2) | [2 is OAKLEY_SHA1] | ******emit ISAKMP Oakley attribute: | af+type: AF+OAKLEY_AUTHENTICATION_METHOD (0x8003) | length/value: 3 (0x3) | [3 is OAKLEY_RSA_SIG] | ******emit ISAKMP Oakley attribute: | af+type: AF+OAKLEY_GROUP_DESCRIPTION (0x8004) | length/value: 14 (0xe) | [14 is OAKLEY_GROUP_MODP2048] | ******emit ISAKMP Oakley attribute: | af+type: AF+OAKLEY_KEY_LENGTH (0x800e) | length/value: 256 (0x100) | emitting length of ISAKMP Transform Payload (ISAKMP): 36 | *****emit ISAKMP Transform Payload (ISAKMP): | next payload type: ISAKMP_NEXT_T (0x3) | ISAKMP transform number: 5 (0x5) | ISAKMP transform ID: KEY_IKE (0x1) | last substructure: checking 'ISAKMP Proposal Payload'.'ISAKMP Transform Payload (ISAKMP)'.'next payload type' is ISAKMP_NEXT_T (0x3) | last substructure: saving location 'ISAKMP Proposal Payload'.'ISAKMP Transform Payload (ISAKMP)'.'next payload type' | ******emit ISAKMP Oakley attribute: | af+type: AF+OAKLEY_LIFE_TYPE (0x800b) | length/value: 1 (0x1) | [1 is OAKLEY_LIFE_SECONDS] | ******emit ISAKMP Oakley attribute: | af+type: AF+OAKLEY_LIFE_DURATION (variable length) (0x800c) | length/value: 3600 (0xe10) | ******emit ISAKMP Oakley attribute: | af+type: AF+OAKLEY_ENCRYPTION_ALGORITHM (0x8001) | length/value: 7 (0x7) | [7 is OAKLEY_AES_CBC] | ******emit ISAKMP Oakley attribute: | af+type: AF+OAKLEY_HASH_ALGORITHM (0x8002) | length/value: 2 (0x2) | [2 is OAKLEY_SHA1] | ******emit ISAKMP Oakley attribute: | af+type: AF+OAKLEY_AUTHENTICATION_METHOD (0x8003) | length/value: 3 (0x3) | [3 is OAKLEY_RSA_SIG] | ******emit ISAKMP Oakley attribute: | af+type: AF+OAKLEY_GROUP_DESCRIPTION (0x8004) | length/value: 14 (0xe) | [14 is OAKLEY_GROUP_MODP2048] | ******emit ISAKMP Oakley attribute: | af+type: AF+OAKLEY_KEY_LENGTH (0x800e) | length/value: 128 (0x80) | emitting length of ISAKMP Transform Payload (ISAKMP): 36 | *****emit ISAKMP Transform Payload (ISAKMP): | next payload type: ISAKMP_NEXT_T (0x3) | ISAKMP transform number: 6 (0x6) | ISAKMP transform ID: KEY_IKE (0x1) | last substructure: checking 'ISAKMP Proposal Payload'.'ISAKMP Transform Payload (ISAKMP)'.'next payload type' is ISAKMP_NEXT_T (0x3) | last substructure: saving location 'ISAKMP Proposal Payload'.'ISAKMP Transform Payload (ISAKMP)'.'next payload type' | ******emit ISAKMP Oakley attribute: | af+type: AF+OAKLEY_LIFE_TYPE (0x800b) | length/value: 1 (0x1) | [1 is OAKLEY_LIFE_SECONDS] | ******emit ISAKMP Oakley attribute: | af+type: AF+OAKLEY_LIFE_DURATION (variable length) (0x800c) | length/value: 3600 (0xe10) | ******emit ISAKMP Oakley attribute: | af+type: AF+OAKLEY_ENCRYPTION_ALGORITHM (0x8001) | length/value: 7 (0x7) | [7 is OAKLEY_AES_CBC] | ******emit ISAKMP Oakley attribute: | af+type: AF+OAKLEY_HASH_ALGORITHM (0x8002) | length/value: 4 (0x4) | [4 is OAKLEY_SHA2_256] | ******emit ISAKMP Oakley attribute: | af+type: AF+OAKLEY_AUTHENTICATION_METHOD (0x8003) | length/value: 3 (0x3) | [3 is OAKLEY_RSA_SIG] | ******emit ISAKMP Oakley attribute: | af+type: AF+OAKLEY_GROUP_DESCRIPTION (0x8004) | length/value: 5 (0x5) | [5 is OAKLEY_GROUP_MODP1536] | ******emit ISAKMP Oakley attribute: | af+type: AF+OAKLEY_KEY_LENGTH (0x800e) | length/value: 256 (0x100) | emitting length of ISAKMP Transform Payload (ISAKMP): 36 | *****emit ISAKMP Transform Payload (ISAKMP): | next payload type: ISAKMP_NEXT_T (0x3) | ISAKMP transform number: 7 (0x7) | ISAKMP transform ID: KEY_IKE (0x1) | last substructure: checking 'ISAKMP Proposal Payload'.'ISAKMP Transform Payload (ISAKMP)'.'next payload type' is ISAKMP_NEXT_T (0x3) | last substructure: saving location 'ISAKMP Proposal Payload'.'ISAKMP Transform Payload (ISAKMP)'.'next payload type' | ******emit ISAKMP Oakley attribute: | af+type: AF+OAKLEY_LIFE_TYPE (0x800b) | length/value: 1 (0x1) | [1 is OAKLEY_LIFE_SECONDS] | ******emit ISAKMP Oakley attribute: | af+type: AF+OAKLEY_LIFE_DURATION (variable length) (0x800c) | length/value: 3600 (0xe10) | ******emit ISAKMP Oakley attribute: | af+type: AF+OAKLEY_ENCRYPTION_ALGORITHM (0x8001) | length/value: 7 (0x7) | [7 is OAKLEY_AES_CBC] | ******emit ISAKMP Oakley attribute: | af+type: AF+OAKLEY_HASH_ALGORITHM (0x8002) | length/value: 4 (0x4) | [4 is OAKLEY_SHA2_256] | ******emit ISAKMP Oakley attribute: | af+type: AF+OAKLEY_AUTHENTICATION_METHOD (0x8003) | length/value: 3 (0x3) | [3 is OAKLEY_RSA_SIG] | ******emit ISAKMP Oakley attribute: | af+type: AF+OAKLEY_GROUP_DESCRIPTION (0x8004) | length/value: 5 (0x5) | [5 is OAKLEY_GROUP_MODP1536] | ******emit ISAKMP Oakley attribute: | af+type: AF+OAKLEY_KEY_LENGTH (0x800e) | length/value: 128 (0x80) | emitting length of ISAKMP Transform Payload (ISAKMP): 36 | *****emit ISAKMP Transform Payload (ISAKMP): | next payload type: ISAKMP_NEXT_T (0x3) | ISAKMP transform number: 8 (0x8) | ISAKMP transform ID: KEY_IKE (0x1) | last substructure: checking 'ISAKMP Proposal Payload'.'ISAKMP Transform Payload (ISAKMP)'.'next payload type' is ISAKMP_NEXT_T (0x3) | last substructure: saving location 'ISAKMP Proposal Payload'.'ISAKMP Transform Payload (ISAKMP)'.'next payload type' | ******emit ISAKMP Oakley attribute: | af+type: AF+OAKLEY_LIFE_TYPE (0x800b) | length/value: 1 (0x1) | [1 is OAKLEY_LIFE_SECONDS] | ******emit ISAKMP Oakley attribute: | af+type: AF+OAKLEY_LIFE_DURATION (variable length) (0x800c) | length/value: 3600 (0xe10) | ******emit ISAKMP Oakley attribute: | af+type: AF+OAKLEY_ENCRYPTION_ALGORITHM (0x8001) | length/value: 7 (0x7) | [7 is OAKLEY_AES_CBC] | ******emit ISAKMP Oakley attribute: | af+type: AF+OAKLEY_HASH_ALGORITHM (0x8002) | length/value: 6 (0x6) | [6 is OAKLEY_SHA2_512] | ******emit ISAKMP Oakley attribute: | af+type: AF+OAKLEY_AUTHENTICATION_METHOD (0x8003) | length/value: 3 (0x3) | [3 is OAKLEY_RSA_SIG] | ******emit ISAKMP Oakley attribute: | af+type: AF+OAKLEY_GROUP_DESCRIPTION (0x8004) | length/value: 5 (0x5) | [5 is OAKLEY_GROUP_MODP1536] | ******emit ISAKMP Oakley attribute: | af+type: AF+OAKLEY_KEY_LENGTH (0x800e) | length/value: 256 (0x100) | emitting length of ISAKMP Transform Payload (ISAKMP): 36 | *****emit ISAKMP Transform Payload (ISAKMP): | next payload type: ISAKMP_NEXT_T (0x3) | ISAKMP transform number: 9 (0x9) | ISAKMP transform ID: KEY_IKE (0x1) | last substructure: checking 'ISAKMP Proposal Payload'.'ISAKMP Transform Payload (ISAKMP)'.'next payload type' is ISAKMP_NEXT_T (0x3) | last substructure: saving location 'ISAKMP Proposal Payload'.'ISAKMP Transform Payload (ISAKMP)'.'next payload type' | ******emit ISAKMP Oakley attribute: | af+type: AF+OAKLEY_LIFE_TYPE (0x800b) | length/value: 1 (0x1) | [1 is OAKLEY_LIFE_SECONDS] | ******emit ISAKMP Oakley attribute: | af+type: AF+OAKLEY_LIFE_DURATION (variable length) (0x800c) | length/value: 3600 (0xe10) | ******emit ISAKMP Oakley attribute: | af+type: AF+OAKLEY_ENCRYPTION_ALGORITHM (0x8001) | length/value: 7 (0x7) | [7 is OAKLEY_AES_CBC] | ******emit ISAKMP Oakley attribute: | af+type: AF+OAKLEY_HASH_ALGORITHM (0x8002) | length/value: 6 (0x6) | [6 is OAKLEY_SHA2_512] | ******emit ISAKMP Oakley attribute: | af+type: AF+OAKLEY_AUTHENTICATION_METHOD (0x8003) | length/value: 3 (0x3) | [3 is OAKLEY_RSA_SIG] | ******emit ISAKMP Oakley attribute: | af+type: AF+OAKLEY_GROUP_DESCRIPTION (0x8004) | length/value: 5 (0x5) | [5 is OAKLEY_GROUP_MODP1536] | ******emit ISAKMP Oakley attribute: | af+type: AF+OAKLEY_KEY_LENGTH (0x800e) | length/value: 128 (0x80) | emitting length of ISAKMP Transform Payload (ISAKMP): 36 | *****emit ISAKMP Transform Payload (ISAKMP): | next payload type: ISAKMP_NEXT_T (0x3) | ISAKMP transform number: 10 (0xa) | ISAKMP transform ID: KEY_IKE (0x1) | last substructure: checking 'ISAKMP Proposal Payload'.'ISAKMP Transform Payload (ISAKMP)'.'next payload type' is ISAKMP_NEXT_T (0x3) | last substructure: saving location 'ISAKMP Proposal Payload'.'ISAKMP Transform Payload (ISAKMP)'.'next payload type' | ******emit ISAKMP Oakley attribute: | af+type: AF+OAKLEY_LIFE_TYPE (0x800b) | length/value: 1 (0x1) | [1 is OAKLEY_LIFE_SECONDS] | ******emit ISAKMP Oakley attribute: | af+type: AF+OAKLEY_LIFE_DURATION (variable length) (0x800c) | length/value: 3600 (0xe10) | ******emit ISAKMP Oakley attribute: | af+type: AF+OAKLEY_ENCRYPTION_ALGORITHM (0x8001) | length/value: 7 (0x7) | [7 is OAKLEY_AES_CBC] | ******emit ISAKMP Oakley attribute: | af+type: AF+OAKLEY_HASH_ALGORITHM (0x8002) | length/value: 2 (0x2) | [2 is OAKLEY_SHA1] | ******emit ISAKMP Oakley attribute: | af+type: AF+OAKLEY_AUTHENTICATION_METHOD (0x8003) | length/value: 3 (0x3) | [3 is OAKLEY_RSA_SIG] | ******emit ISAKMP Oakley attribute: | af+type: AF+OAKLEY_GROUP_DESCRIPTION (0x8004) | length/value: 5 (0x5) | [5 is OAKLEY_GROUP_MODP1536] | ******emit ISAKMP Oakley attribute: | af+type: AF+OAKLEY_KEY_LENGTH (0x800e) | length/value: 256 (0x100) | emitting length of ISAKMP Transform Payload (ISAKMP): 36 | *****emit ISAKMP Transform Payload (ISAKMP): | next payload type: ISAKMP_NEXT_T (0x3) | ISAKMP transform number: 11 (0xb) | ISAKMP transform ID: KEY_IKE (0x1) | last substructure: checking 'ISAKMP Proposal Payload'.'ISAKMP Transform Payload (ISAKMP)'.'next payload type' is ISAKMP_NEXT_T (0x3) | last substructure: saving location 'ISAKMP Proposal Payload'.'ISAKMP Transform Payload (ISAKMP)'.'next payload type' | ******emit ISAKMP Oakley attribute: | af+type: AF+OAKLEY_LIFE_TYPE (0x800b) | length/value: 1 (0x1) | [1 is OAKLEY_LIFE_SECONDS] | ******emit ISAKMP Oakley attribute: | af+type: AF+OAKLEY_LIFE_DURATION (variable length) (0x800c) | length/value: 3600 (0xe10) | ******emit ISAKMP Oakley attribute: | af+type: AF+OAKLEY_ENCRYPTION_ALGORITHM (0x8001) | length/value: 7 (0x7) | [7 is OAKLEY_AES_CBC] | ******emit ISAKMP Oakley attribute: | af+type: AF+OAKLEY_HASH_ALGORITHM (0x8002) | length/value: 2 (0x2) | [2 is OAKLEY_SHA1] | ******emit ISAKMP Oakley attribute: | af+type: AF+OAKLEY_AUTHENTICATION_METHOD (0x8003) | length/value: 3 (0x3) | [3 is OAKLEY_RSA_SIG] | ******emit ISAKMP Oakley attribute: | af+type: AF+OAKLEY_GROUP_DESCRIPTION (0x8004) | length/value: 5 (0x5) | [5 is OAKLEY_GROUP_MODP1536] | ******emit ISAKMP Oakley attribute: | af+type: AF+OAKLEY_KEY_LENGTH (0x800e) | length/value: 128 (0x80) | emitting length of ISAKMP Transform Payload (ISAKMP): 36 | *****emit ISAKMP Transform Payload (ISAKMP): | next payload type: ISAKMP_NEXT_T (0x3) | ISAKMP transform number: 12 (0xc) | ISAKMP transform ID: KEY_IKE (0x1) | last substructure: checking 'ISAKMP Proposal Payload'.'ISAKMP Transform Payload (ISAKMP)'.'next payload type' is ISAKMP_NEXT_T (0x3) | last substructure: saving location 'ISAKMP Proposal Payload'.'ISAKMP Transform Payload (ISAKMP)'.'next payload type' | ******emit ISAKMP Oakley attribute: | af+type: AF+OAKLEY_LIFE_TYPE (0x800b) | length/value: 1 (0x1) | [1 is OAKLEY_LIFE_SECONDS] | ******emit ISAKMP Oakley attribute: | af+type: AF+OAKLEY_LIFE_DURATION (variable length) (0x800c) | length/value: 3600 (0xe10) | ******emit ISAKMP Oakley attribute: | af+type: AF+OAKLEY_ENCRYPTION_ALGORITHM (0x8001) | length/value: 5 (0x5) | [5 is OAKLEY_3DES_CBC] | ******emit ISAKMP Oakley attribute: | af+type: AF+OAKLEY_HASH_ALGORITHM (0x8002) | length/value: 4 (0x4) | [4 is OAKLEY_SHA2_256] | ******emit ISAKMP Oakley attribute: | af+type: AF+OAKLEY_AUTHENTICATION_METHOD (0x8003) | length/value: 3 (0x3) | [3 is OAKLEY_RSA_SIG] | ******emit ISAKMP Oakley attribute: | af+type: AF+OAKLEY_GROUP_DESCRIPTION (0x8004) | length/value: 14 (0xe) | [14 is OAKLEY_GROUP_MODP2048] | emitting length of ISAKMP Transform Payload (ISAKMP): 32 | *****emit ISAKMP Transform Payload (ISAKMP): | next payload type: ISAKMP_NEXT_T (0x3) | ISAKMP transform number: 13 (0xd) | ISAKMP transform ID: KEY_IKE (0x1) | last substructure: checking 'ISAKMP Proposal Payload'.'ISAKMP Transform Payload (ISAKMP)'.'next payload type' is ISAKMP_NEXT_T (0x3) | last substructure: saving location 'ISAKMP Proposal Payload'.'ISAKMP Transform Payload (ISAKMP)'.'next payload type' | ******emit ISAKMP Oakley attribute: | af+type: AF+OAKLEY_LIFE_TYPE (0x800b) | length/value: 1 (0x1) | [1 is OAKLEY_LIFE_SECONDS] | ******emit ISAKMP Oakley attribute: | af+type: AF+OAKLEY_LIFE_DURATION (variable length) (0x800c) | length/value: 3600 (0xe10) | ******emit ISAKMP Oakley attribute: | af+type: AF+OAKLEY_ENCRYPTION_ALGORITHM (0x8001) | length/value: 5 (0x5) | [5 is OAKLEY_3DES_CBC] | ******emit ISAKMP Oakley attribute: | af+type: AF+OAKLEY_HASH_ALGORITHM (0x8002) | length/value: 6 (0x6) | [6 is OAKLEY_SHA2_512] | ******emit ISAKMP Oakley attribute: | af+type: AF+OAKLEY_AUTHENTICATION_METHOD (0x8003) | length/value: 3 (0x3) | [3 is OAKLEY_RSA_SIG] | ******emit ISAKMP Oakley attribute: | af+type: AF+OAKLEY_GROUP_DESCRIPTION (0x8004) | length/value: 14 (0xe) | [14 is OAKLEY_GROUP_MODP2048] | emitting length of ISAKMP Transform Payload (ISAKMP): 32 | *****emit ISAKMP Transform Payload (ISAKMP): | next payload type: ISAKMP_NEXT_T (0x3) | ISAKMP transform number: 14 (0xe) | ISAKMP transform ID: KEY_IKE (0x1) | last substructure: checking 'ISAKMP Proposal Payload'.'ISAKMP Transform Payload (ISAKMP)'.'next payload type' is ISAKMP_NEXT_T (0x3) | last substructure: saving location 'ISAKMP Proposal Payload'.'ISAKMP Transform Payload (ISAKMP)'.'next payload type' | ******emit ISAKMP Oakley attribute: | af+type: AF+OAKLEY_LIFE_TYPE (0x800b) | length/value: 1 (0x1) | [1 is OAKLEY_LIFE_SECONDS] | ******emit ISAKMP Oakley attribute: | af+type: AF+OAKLEY_LIFE_DURATION (variable length) (0x800c) | length/value: 3600 (0xe10) | ******emit ISAKMP Oakley attribute: | af+type: AF+OAKLEY_ENCRYPTION_ALGORITHM (0x8001) | length/value: 5 (0x5) | [5 is OAKLEY_3DES_CBC] | ******emit ISAKMP Oakley attribute: | af+type: AF+OAKLEY_HASH_ALGORITHM (0x8002) | length/value: 2 (0x2) | [2 is OAKLEY_SHA1] | ******emit ISAKMP Oakley attribute: | af+type: AF+OAKLEY_AUTHENTICATION_METHOD (0x8003) | length/value: 3 (0x3) | [3 is OAKLEY_RSA_SIG] | ******emit ISAKMP Oakley attribute: | af+type: AF+OAKLEY_GROUP_DESCRIPTION (0x8004) | length/value: 14 (0xe) | [14 is OAKLEY_GROUP_MODP2048] | emitting length of ISAKMP Transform Payload (ISAKMP): 32 | *****emit ISAKMP Transform Payload (ISAKMP): | next payload type: ISAKMP_NEXT_T (0x3) | ISAKMP transform number: 15 (0xf) | ISAKMP transform ID: KEY_IKE (0x1) | last substructure: checking 'ISAKMP Proposal Payload'.'ISAKMP Transform Payload (ISAKMP)'.'next payload type' is ISAKMP_NEXT_T (0x3) | last substructure: saving location 'ISAKMP Proposal Payload'.'ISAKMP Transform Payload (ISAKMP)'.'next payload type' | ******emit ISAKMP Oakley attribute: | af+type: AF+OAKLEY_LIFE_TYPE (0x800b) | length/value: 1 (0x1) | [1 is OAKLEY_LIFE_SECONDS] | ******emit ISAKMP Oakley attribute: | af+type: AF+OAKLEY_LIFE_DURATION (variable length) (0x800c) | length/value: 3600 (0xe10) | ******emit ISAKMP Oakley attribute: | af+type: AF+OAKLEY_ENCRYPTION_ALGORITHM (0x8001) | length/value: 5 (0x5) | [5 is OAKLEY_3DES_CBC] | ******emit ISAKMP Oakley attribute: | af+type: AF+OAKLEY_HASH_ALGORITHM (0x8002) | length/value: 4 (0x4) | [4 is OAKLEY_SHA2_256] | ******emit ISAKMP Oakley attribute: | af+type: AF+OAKLEY_AUTHENTICATION_METHOD (0x8003) | length/value: 3 (0x3) | [3 is OAKLEY_RSA_SIG] | ******emit ISAKMP Oakley attribute: | af+type: AF+OAKLEY_GROUP_DESCRIPTION (0x8004) | length/value: 5 (0x5) | [5 is OAKLEY_GROUP_MODP1536] | emitting length of ISAKMP Transform Payload (ISAKMP): 32 | *****emit ISAKMP Transform Payload (ISAKMP): | next payload type: ISAKMP_NEXT_T (0x3) | ISAKMP transform number: 16 (0x10) | ISAKMP transform ID: KEY_IKE (0x1) | last substructure: checking 'ISAKMP Proposal Payload'.'ISAKMP Transform Payload (ISAKMP)'.'next payload type' is ISAKMP_NEXT_T (0x3) | last substructure: saving location 'ISAKMP Proposal Payload'.'ISAKMP Transform Payload (ISAKMP)'.'next payload type' | ******emit ISAKMP Oakley attribute: | af+type: AF+OAKLEY_LIFE_TYPE (0x800b) | length/value: 1 (0x1) | [1 is OAKLEY_LIFE_SECONDS] | ******emit ISAKMP Oakley attribute: | af+type: AF+OAKLEY_LIFE_DURATION (variable length) (0x800c) | length/value: 3600 (0xe10) | ******emit ISAKMP Oakley attribute: | af+type: AF+OAKLEY_ENCRYPTION_ALGORITHM (0x8001) | length/value: 5 (0x5) | [5 is OAKLEY_3DES_CBC] | ******emit ISAKMP Oakley attribute: | af+type: AF+OAKLEY_HASH_ALGORITHM (0x8002) | length/value: 6 (0x6) | [6 is OAKLEY_SHA2_512] | ******emit ISAKMP Oakley attribute: | af+type: AF+OAKLEY_AUTHENTICATION_METHOD (0x8003) | length/value: 3 (0x3) | [3 is OAKLEY_RSA_SIG] | ******emit ISAKMP Oakley attribute: | af+type: AF+OAKLEY_GROUP_DESCRIPTION (0x8004) | length/value: 5 (0x5) | [5 is OAKLEY_GROUP_MODP1536] | emitting length of ISAKMP Transform Payload (ISAKMP): 32 | *****emit ISAKMP Transform Payload (ISAKMP): | next payload type: ISAKMP_NEXT_NONE (0x0) | ISAKMP transform number: 17 (0x11) | ISAKMP transform ID: KEY_IKE (0x1) | last substructure: checking 'ISAKMP Proposal Payload'.'ISAKMP Transform Payload (ISAKMP)'.'next payload type' is ISAKMP_NEXT_T (0x3) | last substructure: saving location 'ISAKMP Proposal Payload'.'ISAKMP Transform Payload (ISAKMP)'.'next payload type' | ******emit ISAKMP Oakley attribute: | af+type: AF+OAKLEY_LIFE_TYPE (0x800b) | length/value: 1 (0x1) | [1 is OAKLEY_LIFE_SECONDS] | ******emit ISAKMP Oakley attribute: | af+type: AF+OAKLEY_LIFE_DURATION (variable length) (0x800c) | length/value: 3600 (0xe10) | ******emit ISAKMP Oakley attribute: | af+type: AF+OAKLEY_ENCRYPTION_ALGORITHM (0x8001) | length/value: 5 (0x5) | [5 is OAKLEY_3DES_CBC] | ******emit ISAKMP Oakley attribute: | af+type: AF+OAKLEY_HASH_ALGORITHM (0x8002) | length/value: 2 (0x2) | [2 is OAKLEY_SHA1] | ******emit ISAKMP Oakley attribute: | af+type: AF+OAKLEY_AUTHENTICATION_METHOD (0x8003) | length/value: 3 (0x3) | [3 is OAKLEY_RSA_SIG] | ******emit ISAKMP Oakley attribute: | af+type: AF+OAKLEY_GROUP_DESCRIPTION (0x8004) | length/value: 5 (0x5) | [5 is OAKLEY_GROUP_MODP1536] | emitting length of ISAKMP Transform Payload (ISAKMP): 32 | emitting length of ISAKMP Proposal Payload: 632 | last substructure: checking 'ISAKMP Proposal Payload'.'ISAKMP Transform Payload (ISAKMP)'.'next payload type' is 0 | emitting length of ISAKMP Security Association Payload: 644 | last substructure: checking 'ISAKMP Security Association Payload'.'ISAKMP Proposal Payload'.'next payload type' is 0 | out_vid(): sending [FRAGMENTATION] | ***emit ISAKMP Vendor ID Payload: | next payload type: ISAKMP_NEXT_VID (0xd) | next payload chain: ignoring supplied 'ISAKMP Vendor ID Payload'.'next payload type' value 13:ISAKMP_NEXT_VID | next payload chain: setting previous 'ISAKMP Security Association Payload'.'next payload type' to current ISAKMP Vendor ID Payload (13:ISAKMP_NEXT_VID) | next payload chain: saving location 'ISAKMP Vendor ID Payload'.'next payload type' in 'reply packet' | emitting 16 raw bytes of V_ID into ISAKMP Vendor ID Payload | V_ID 40 48 b7 d5 6e bc e8 85 25 e7 de 7f 00 d6 c2 d3 | emitting length of ISAKMP Vendor ID Payload: 20 | out_vid(): sending [Dead Peer Detection] | ***emit ISAKMP Vendor ID Payload: | next payload type: ISAKMP_NEXT_NONE (0x0) | next payload chain: setting previous 'ISAKMP Vendor ID Payload'.'next payload type' to current ISAKMP Vendor ID Payload (13:ISAKMP_NEXT_VID) | next payload chain: saving location 'ISAKMP Vendor ID Payload'.'next payload type' in 'reply packet' | emitting 16 raw bytes of V_ID into ISAKMP Vendor ID Payload | V_ID af ca d7 13 68 a1 f1 c9 6b 86 96 fc 77 57 01 00 | emitting length of ISAKMP Vendor ID Payload: 20 | nat add vid | sending draft and RFC NATT VIDs | out_vid(): sending [RFC 3947] | ***emit ISAKMP Vendor ID Payload: | next payload type: ISAKMP_NEXT_VID (0xd) | next payload chain: ignoring supplied 'ISAKMP Vendor ID Payload'.'next payload type' value 13:ISAKMP_NEXT_VID | next payload chain: setting previous 'ISAKMP Vendor ID Payload'.'next payload type' to current ISAKMP Vendor ID Payload (13:ISAKMP_NEXT_VID) | next payload chain: saving location 'ISAKMP Vendor ID Payload'.'next payload type' in 'reply packet' | emitting 16 raw bytes of V_ID into ISAKMP Vendor ID Payload | V_ID 4a 13 1c 81 07 03 58 45 5c 57 28 f2 0e 95 45 2f | emitting length of ISAKMP Vendor ID Payload: 20 | skipping VID_NATT_RFC | out_vid(): sending [draft-ietf-ipsec-nat-t-ike-03] | ***emit ISAKMP Vendor ID Payload: | next payload type: ISAKMP_NEXT_VID (0xd) | next payload chain: ignoring supplied 'ISAKMP Vendor ID Payload'.'next payload type' value 13:ISAKMP_NEXT_VID | next payload chain: setting previous 'ISAKMP Vendor ID Payload'.'next payload type' to current ISAKMP Vendor ID Payload (13:ISAKMP_NEXT_VID) | next payload chain: saving location 'ISAKMP Vendor ID Payload'.'next payload type' in 'reply packet' | emitting 16 raw bytes of V_ID into ISAKMP Vendor ID Payload | V_ID 7d 94 19 a6 53 10 ca 6f 2c 17 9d 92 15 52 9d 56 | emitting length of ISAKMP Vendor ID Payload: 20 | out_vid(): sending [draft-ietf-ipsec-nat-t-ike-02_n] | ***emit ISAKMP Vendor ID Payload: | next payload type: ISAKMP_NEXT_VID (0xd) | next payload chain: ignoring supplied 'ISAKMP Vendor ID Payload'.'next payload type' value 13:ISAKMP_NEXT_VID | next payload chain: setting previous 'ISAKMP Vendor ID Payload'.'next payload type' to current ISAKMP Vendor ID Payload (13:ISAKMP_NEXT_VID) | next payload chain: saving location 'ISAKMP Vendor ID Payload'.'next payload type' in 'reply packet' | emitting 16 raw bytes of V_ID into ISAKMP Vendor ID Payload | V_ID 90 cb 80 91 3e bb 69 6e 08 63 81 b5 ec 42 7b 1f | emitting length of ISAKMP Vendor ID Payload: 20 | out_vid(): sending [draft-ietf-ipsec-nat-t-ike-02] | ***emit ISAKMP Vendor ID Payload: | next payload type: ISAKMP_NEXT_NONE (0x0) | next payload chain: setting previous 'ISAKMP Vendor ID Payload'.'next payload type' to current ISAKMP Vendor ID Payload (13:ISAKMP_NEXT_VID) | next payload chain: saving location 'ISAKMP Vendor ID Payload'.'next payload type' in 'reply packet' | emitting 16 raw bytes of V_ID into ISAKMP Vendor ID Payload | V_ID cd 60 46 43 35 df 21 f8 7c fd b2 fc 68 b6 a4 48 | emitting length of ISAKMP Vendor ID Payload: 20 | no IKEv1 message padding required | emitting length of ISAKMP Message: 792 | sending 792 bytes for reply packet for main_outI1 through eth1 from 192.1.2.45:500 to 192.1.2.23:500 (using #1) | 9f 65 42 37 54 9b 07 77 00 00 00 00 00 00 00 00 | 01 10 02 00 00 00 00 00 00 00 03 18 0d 00 02 84 | 00 00 00 01 00 00 00 01 00 00 02 78 00 01 00 12 | 03 00 00 24 00 01 00 00 80 0b 00 01 80 0c 0e 10 | 80 01 00 07 80 02 00 04 80 03 00 03 80 04 00 0e | 80 0e 01 00 03 00 00 24 01 01 00 00 80 0b 00 01 | 80 0c 0e 10 80 01 00 07 80 02 00 04 80 03 00 03 | 80 04 00 0e 80 0e 00 80 03 00 00 24 02 01 00 00 | 80 0b 00 01 80 0c 0e 10 80 01 00 07 80 02 00 06 | 80 03 00 03 80 04 00 0e 80 0e 01 00 03 00 00 24 | 03 01 00 00 80 0b 00 01 80 0c 0e 10 80 01 00 07 | 80 02 00 06 80 03 00 03 80 04 00 0e 80 0e 00 80 | 03 00 00 24 04 01 00 00 80 0b 00 01 80 0c 0e 10 | 80 01 00 07 80 02 00 02 80 03 00 03 80 04 00 0e | 80 0e 01 00 03 00 00 24 05 01 00 00 80 0b 00 01 | 80 0c 0e 10 80 01 00 07 80 02 00 02 80 03 00 03 | 80 04 00 0e 80 0e 00 80 03 00 00 24 06 01 00 00 | 80 0b 00 01 80 0c 0e 10 80 01 00 07 80 02 00 04 | 80 03 00 03 80 04 00 05 80 0e 01 00 03 00 00 24 | 07 01 00 00 80 0b 00 01 80 0c 0e 10 80 01 00 07 | 80 02 00 04 80 03 00 03 80 04 00 05 80 0e 00 80 | 03 00 00 24 08 01 00 00 80 0b 00 01 80 0c 0e 10 | 80 01 00 07 80 02 00 06 80 03 00 03 80 04 00 05 | 80 0e 01 00 03 00 00 24 09 01 00 00 80 0b 00 01 | 80 0c 0e 10 80 01 00 07 80 02 00 06 80 03 00 03 | 80 04 00 05 80 0e 00 80 03 00 00 24 0a 01 00 00 | 80 0b 00 01 80 0c 0e 10 80 01 00 07 80 02 00 02 | 80 03 00 03 80 04 00 05 80 0e 01 00 03 00 00 24 | 0b 01 00 00 80 0b 00 01 80 0c 0e 10 80 01 00 07 | 80 02 00 02 80 03 00 03 80 04 00 05 80 0e 00 80 | 03 00 00 20 0c 01 00 00 80 0b 00 01 80 0c 0e 10 | 80 01 00 05 80 02 00 04 80 03 00 03 80 04 00 0e | 03 00 00 20 0d 01 00 00 80 0b 00 01 80 0c 0e 10 | 80 01 00 05 80 02 00 06 80 03 00 03 80 04 00 0e | 03 00 00 20 0e 01 00 00 80 0b 00 01 80 0c 0e 10 | 80 01 00 05 80 02 00 02 80 03 00 03 80 04 00 0e | 03 00 00 20 0f 01 00 00 80 0b 00 01 80 0c 0e 10 | 80 01 00 05 80 02 00 04 80 03 00 03 80 04 00 05 | 03 00 00 20 10 01 00 00 80 0b 00 01 80 0c 0e 10 | 80 01 00 05 80 02 00 06 80 03 00 03 80 04 00 05 | 00 00 00 20 11 01 00 00 80 0b 00 01 80 0c 0e 10 | 80 01 00 05 80 02 00 02 80 03 00 03 80 04 00 05 | 0d 00 00 14 40 48 b7 d5 6e bc e8 85 25 e7 de 7f | 00 d6 c2 d3 0d 00 00 14 af ca d7 13 68 a1 f1 c9 | 6b 86 96 fc 77 57 01 00 0d 00 00 14 4a 13 1c 81 | 07 03 58 45 5c 57 28 f2 0e 95 45 2f 0d 00 00 14 | 7d 94 19 a6 53 10 ca 6f 2c 17 9d 92 15 52 9d 56 | 0d 00 00 14 90 cb 80 91 3e bb 69 6e 08 63 81 b5 | ec 42 7b 1f 00 00 00 14 cd 60 46 43 35 df 21 f8 | 7c fd b2 fc 68 b6 a4 48 "westnets-eastnet/2x0" #1: IMPAIR: suppressing retransmits; scheduling timeout in 60 seconds | event_schedule: new EVENT_RETRANSMIT-pe@0x5570e4c02368 | inserting event EVENT_RETRANSMIT, timeout in 60 seconds for #1 | libevent_malloc: new ptr-libevent@0x5570e4c026e8 size 128 | #1 STATE_MAIN_I1: retransmits: first event in 60 seconds; timeout in 60 seconds; limit of 12 retransmits; current time is 11343.42476 | stop processing: state #1 connection "westnets-eastnet/2x0" from 192.1.2.23 (in main_outI1() at ikev1_main.c:228) | resume processing: connection "westnets-eastnet/2x0" (in main_outI1() at ikev1_main.c:228) | stop processing: connection "westnets-eastnet/2x0" (in initiate_a_connection() at initiate.c:349) | start processing: connection "westnets-eastnet/1x0" (in initiate_a_connection() at initiate.c:186) | empty esp_info, returning defaults for ENCRYPT | connection 'westnets-eastnet/1x0' +POLICY_UP | dup_any(fd@25) -> fd@28 (in initiate_a_connection() at initiate.c:342) | FOR_EACH_STATE_... in find_phase1_state | Queuing pending IPsec SA negotiating with 192.1.2.23 "westnets-eastnet/1x0" IKE SA #1 "westnets-eastnet/2x0" | stop processing: connection "westnets-eastnet/1x0" (in initiate_a_connection() at initiate.c:349) | close_any(fd@25) (in initiate_connection() at initiate.c:384) | close_any(fd@16) (in whack_process() at rcv_whack.c:700) | *received 144 bytes from 192.1.2.23:500 on eth1 (192.1.2.45:500) | 9f 65 42 37 54 9b 07 77 c4 88 e3 f7 e7 56 66 9c | 01 10 02 00 00 00 00 00 00 00 00 90 0d 00 00 38 | 00 00 00 01 00 00 00 01 00 00 00 2c 00 01 00 01 | 00 00 00 24 00 01 00 00 80 0b 00 01 80 0c 0e 10 | 80 01 00 07 80 02 00 04 80 03 00 03 80 04 00 0e | 80 0e 01 00 0d 00 00 14 40 48 b7 d5 6e bc e8 85 | 25 e7 de 7f 00 d6 c2 d3 0d 00 00 14 af ca d7 13 | 68 a1 f1 c9 6b 86 96 fc 77 57 01 00 00 00 00 14 | 4a 13 1c 81 07 03 58 45 5c 57 28 f2 0e 95 45 2f | start processing: from 192.1.2.23:500 (in process_md() at demux.c:378) | **parse ISAKMP Message: | initiator cookie: | 9f 65 42 37 54 9b 07 77 | responder cookie: | c4 88 e3 f7 e7 56 66 9c | next payload type: ISAKMP_NEXT_SA (0x1) | ISAKMP version: ISAKMP Version 1.0 (rfc2407) (0x10) | exchange type: ISAKMP_XCHG_IDPROT (0x2) | flags: none (0x0) | Message ID: 0 (0x0) | length: 144 (0x90) | processing version=1.0 packet with exchange type=ISAKMP_XCHG_IDPROT (2) | State DB: IKEv1 state not found (find_state_ikev1) | State DB: found IKEv1 state #1 in MAIN_I1 (find_state_ikev1_init) | start processing: state #1 connection "westnets-eastnet/2x0" from 192.1.2.23 (in process_v1_packet() at ikev1.c:1459) | #1 is idle | #1 idle | got payload 0x2 (ISAKMP_NEXT_SA) needed: 0x2 opt: 0x2080 | ***parse ISAKMP Security Association Payload: | next payload type: ISAKMP_NEXT_VID (0xd) | length: 56 (0x38) | DOI: ISAKMP_DOI_IPSEC (0x1) | got payload 0x2000 (ISAKMP_NEXT_VID) needed: 0x0 opt: 0x2080 | ***parse ISAKMP Vendor ID Payload: | next payload type: ISAKMP_NEXT_VID (0xd) | length: 20 (0x14) | got payload 0x2000 (ISAKMP_NEXT_VID) needed: 0x0 opt: 0x2080 | ***parse ISAKMP Vendor ID Payload: | next payload type: ISAKMP_NEXT_VID (0xd) | length: 20 (0x14) | got payload 0x2000 (ISAKMP_NEXT_VID) needed: 0x0 opt: 0x2080 | ***parse ISAKMP Vendor ID Payload: | next payload type: ISAKMP_NEXT_NONE (0x0) | length: 20 (0x14) | message 'main_inR1_outI2' HASH payload not checked early | received Vendor ID payload [FRAGMENTATION] | received Vendor ID payload [Dead Peer Detection] | quirks.qnat_traversal_vid set to=117 [RFC 3947] | received Vendor ID payload [RFC 3947] | ****parse IPsec DOI SIT: | IPsec DOI SIT: SIT_IDENTITY_ONLY (0x1) | ****parse ISAKMP Proposal Payload: | next payload type: ISAKMP_NEXT_NONE (0x0) | length: 44 (0x2c) | proposal number: 0 (0x0) | protocol ID: PROTO_ISAKMP (0x1) | SPI size: 0 (0x0) | number of transforms: 1 (0x1) | *****parse ISAKMP Transform Payload (ISAKMP): | next payload type: ISAKMP_NEXT_NONE (0x0) | length: 36 (0x24) | ISAKMP transform number: 0 (0x0) | ISAKMP transform ID: KEY_IKE (0x1) | ******parse ISAKMP Oakley attribute: | af+type: AF+OAKLEY_LIFE_TYPE (0x800b) | length/value: 1 (0x1) | [1 is OAKLEY_LIFE_SECONDS] | ******parse ISAKMP Oakley attribute: | af+type: AF+OAKLEY_LIFE_DURATION (variable length) (0x800c) | length/value: 3600 (0xe10) | ******parse ISAKMP Oakley attribute: | af+type: AF+OAKLEY_ENCRYPTION_ALGORITHM (0x8001) | length/value: 7 (0x7) | [7 is OAKLEY_AES_CBC] | encryption ike_alg_lookup_by_id id: AES_CBC=7, found AES_CBC | ******parse ISAKMP Oakley attribute: | af+type: AF+OAKLEY_HASH_ALGORITHM (0x8002) | length/value: 4 (0x4) | [4 is OAKLEY_SHA2_256] | PRF ike_alg_lookup_by_id id: SHA2_256=4, found HMAC_SHA2_256 | ******parse ISAKMP Oakley attribute: | af+type: AF+OAKLEY_AUTHENTICATION_METHOD (0x8003) | length/value: 3 (0x3) | [3 is OAKLEY_RSA_SIG] | ******parse ISAKMP Oakley attribute: | af+type: AF+OAKLEY_GROUP_DESCRIPTION (0x8004) | length/value: 14 (0xe) | [14 is OAKLEY_GROUP_MODP2048] | DH ike_alg_lookup_by_id id: MODP2048=14, found MODP2048 | ******parse ISAKMP Oakley attribute: | af+type: AF+OAKLEY_KEY_LENGTH (0x800e) | length/value: 256 (0x100) | OAKLEY proposal verified unconditionally; no alg_info to check against | Oakley Transform 0 accepted | sender checking NAT-T: enabled; VID 117 | returning NAT-T method NAT_TRAVERSAL_METHOD_IETF_RFC | enabling possible NAT-traversal with method RFC 3947 (NAT-Traversal) | adding outI2 KE work-order 1 for state #1 | state #1 requesting EVENT_RETRANSMIT to be deleted | #1 STATE_MAIN_I1: retransmits: cleared | libevent_free: release ptr-libevent@0x5570e4c026e8 | free_event_entry: release EVENT_RETRANSMIT-pe@0x5570e4c02368 | event_schedule: new EVENT_CRYPTO_TIMEOUT-pe@0x5570e4c02368 | inserting event EVENT_CRYPTO_TIMEOUT, timeout in 60 seconds for #1 | libevent_malloc: new ptr-libevent@0x5570e4c026e8 size 128 | complete v1 state transition with STF_SUSPEND | [RE]START processing: state #1 connection "westnets-eastnet/2x0" from 192.1.2.23 (in complete_v1_state_transition() at ikev1.c:2648) | suspending state #1 and saving MD | #1 is busy; has a suspended MD | crypto helper 0 resuming | stop processing: from 192.1.2.23:500 (BACKGROUND) (in process_md() at demux.c:380) | stop processing: state #1 connection "westnets-eastnet/2x0" from 192.1.2.23 (in process_md() at demux.c:382) | crypto helper 0 starting work-order 1 for state #1 | processing: STOP connection NULL (in process_md() at demux.c:383) | crypto helper 0 doing build KE and nonce (outI2 KE); request ID 1 | NSS: Value of Prime: | ff ff ff ff ff ff ff ff c9 0f da a2 21 68 c2 34 | c4 c6 62 8b 80 dc 1c d1 29 02 4e 08 8a 67 cc 74 | 02 0b be a6 3b 13 9b 22 51 4a 08 79 8e 34 04 dd | ef 95 19 b3 cd 3a 43 1b 30 2b 0a 6d f2 5f 14 37 | 4f e1 35 6d 6d 51 c2 45 e4 85 b5 76 62 5e 7e c6 | f4 4c 42 e9 a6 37 ed 6b 0b ff 5c b6 f4 06 b7 ed | ee 38 6b fb 5a 89 9f a5 ae 9f 24 11 7c 4b 1f e6 | 49 28 66 51 ec e4 5b 3d c2 00 7c b8 a1 63 bf 05 | 98 da 48 36 1c 55 d3 9a 69 16 3f a8 fd 24 cf 5f | 83 65 5d 23 dc a3 ad 96 1c 62 f3 56 20 85 52 bb | 9e d5 29 07 70 96 96 6d 67 0c 35 4e 4a bc 98 04 | f1 74 6c 08 ca 18 21 7c 32 90 5e 46 2e 36 ce 3b | e3 9e 77 2c 18 0e 86 03 9b 27 83 a2 ec 07 a2 8f | b5 c5 5d f0 6f 4c 52 c9 de 2b cb f6 95 58 17 18 | 39 95 49 7c ea 95 6a e5 15 d2 26 18 98 fa 05 10 | 15 72 8e 5a 8a ac aa 68 ff ff ff ff ff ff ff ff | NSS: Value of base: 02 | DH secret MODP2048@0x7fa9e4003a28: created | NSS: Local DH MODP2048 secret (pointer): 0x7fa9e4003a28 | NSS: Public DH wire value: | ca 5e 47 de 60 65 fe 48 3e 8c 29 7a e2 77 fe a0 | c0 b7 2b 5a cb a5 70 8a 19 b3 35 4c e5 9b 2b 85 | f2 a1 79 ca 3b 4a 5d 8a 93 83 2f 58 49 77 74 2d | 5f 5a 1e ad 67 cc de 9d 45 03 11 c8 20 47 eb b7 | df 8e 08 7e b6 d4 c3 f1 fb be fa f5 a3 1f e6 e9 | 77 91 d5 89 3f 1a 8c dc fc 0f 02 35 63 c8 7f 8f | 54 47 06 cb 38 ae 20 b6 72 d3 d2 d4 b1 27 1f a9 | 54 12 16 c6 b2 6b f6 f6 69 ad 92 c7 1a 6b 91 4b | 2e 36 80 0d 0c aa 8e 86 cd 03 aa a7 f6 7c 51 79 | 84 67 85 65 0b 0d 00 3e 2c 7d 5f 96 88 72 9f 18 | a6 dd c9 18 01 04 b4 30 74 35 0d 39 d4 7b 4e b2 | 8d 5f f4 04 0b bd d7 44 be ac 4f d3 18 fd 2d 6f | 46 da 03 d4 79 6c a6 14 93 ac 97 1b 45 9e 99 a6 | ed af e1 92 6d f7 b6 f7 63 0e af 9a 05 f6 c0 32 | f4 56 86 49 cc 4b 9b f6 9a f0 24 cb 04 cc 4e 60 | 56 f6 0c 4a e9 8b 90 0f 00 db 53 b3 2d a5 f8 90 | Generated nonce: ad 8a ef 4d 62 64 7b ee 55 6d 04 08 c9 09 c3 f6 | Generated nonce: 77 04 60 e3 6c d5 30 af 91 0e 46 6c 33 18 13 bb | crypto helper 0 finished build KE and nonce (outI2 KE); request ID 1 time elapsed 0.000724 seconds | crypto helper 0 sending results from work-order 1 for state #1 to event queue | scheduling resume sending helper answer for #1 | libevent_malloc: new ptr-libevent@0x7fa9e4002888 size 128 | crypto helper 0 waiting (nothing to do) | processing resume sending helper answer for #1 | start processing: state #1 connection "westnets-eastnet/2x0" from 192.1.2.23 (in resume_handler() at server.c:797) | crypto helper 0 replies to request ID 1 | calling continuation function 0x5570e44bdb50 | main_inR1_outI2_continue for #1: calculated ke+nonce, sending I2 | **emit ISAKMP Message: | initiator cookie: | 9f 65 42 37 54 9b 07 77 | responder cookie: | c4 88 e3 f7 e7 56 66 9c | next payload type: ISAKMP_NEXT_NONE (0x0) | ISAKMP version: ISAKMP Version 1.0 (rfc2407) (0x10) | exchange type: ISAKMP_XCHG_IDPROT (0x2) | flags: none (0x0) | Message ID: 0 (0x0) | next payload chain: saving message location 'ISAKMP Message'.'next payload type' | wire (crypto helper) group MODP2048 and state group MODP2048 match | DH secret MODP2048@0x7fa9e4003a28: transferring ownership from helper KE to state #1 | ***emit ISAKMP Key Exchange Payload: | next payload type: ISAKMP_NEXT_NONCE (0xa) | next payload chain: ignoring supplied 'ISAKMP Key Exchange Payload'.'next payload type' value 10:ISAKMP_NEXT_NONCE | next payload chain: setting previous 'ISAKMP Message'.'next payload type' to current ISAKMP Key Exchange Payload (4:ISAKMP_NEXT_KE) | next payload chain: saving location 'ISAKMP Key Exchange Payload'.'next payload type' in 'reply packet' | emitting 256 raw bytes of keyex value into ISAKMP Key Exchange Payload | keyex value ca 5e 47 de 60 65 fe 48 3e 8c 29 7a e2 77 fe a0 | keyex value c0 b7 2b 5a cb a5 70 8a 19 b3 35 4c e5 9b 2b 85 | keyex value f2 a1 79 ca 3b 4a 5d 8a 93 83 2f 58 49 77 74 2d | keyex value 5f 5a 1e ad 67 cc de 9d 45 03 11 c8 20 47 eb b7 | keyex value df 8e 08 7e b6 d4 c3 f1 fb be fa f5 a3 1f e6 e9 | keyex value 77 91 d5 89 3f 1a 8c dc fc 0f 02 35 63 c8 7f 8f | keyex value 54 47 06 cb 38 ae 20 b6 72 d3 d2 d4 b1 27 1f a9 | keyex value 54 12 16 c6 b2 6b f6 f6 69 ad 92 c7 1a 6b 91 4b | keyex value 2e 36 80 0d 0c aa 8e 86 cd 03 aa a7 f6 7c 51 79 | keyex value 84 67 85 65 0b 0d 00 3e 2c 7d 5f 96 88 72 9f 18 | keyex value a6 dd c9 18 01 04 b4 30 74 35 0d 39 d4 7b 4e b2 | keyex value 8d 5f f4 04 0b bd d7 44 be ac 4f d3 18 fd 2d 6f | keyex value 46 da 03 d4 79 6c a6 14 93 ac 97 1b 45 9e 99 a6 | keyex value ed af e1 92 6d f7 b6 f7 63 0e af 9a 05 f6 c0 32 | keyex value f4 56 86 49 cc 4b 9b f6 9a f0 24 cb 04 cc 4e 60 | keyex value 56 f6 0c 4a e9 8b 90 0f 00 db 53 b3 2d a5 f8 90 | emitting length of ISAKMP Key Exchange Payload: 260 | ***emit ISAKMP Nonce Payload: | next payload type: ISAKMP_NEXT_NONE (0x0) | next payload chain: setting previous 'ISAKMP Key Exchange Payload'.'next payload type' to current ISAKMP Nonce Payload (10:ISAKMP_NEXT_NONCE) | next payload chain: saving location 'ISAKMP Nonce Payload'.'next payload type' in 'reply packet' | emitting 32 raw bytes of Ni into ISAKMP Nonce Payload | Ni ad 8a ef 4d 62 64 7b ee 55 6d 04 08 c9 09 c3 f6 | Ni 77 04 60 e3 6c d5 30 af 91 0e 46 6c 33 18 13 bb | emitting length of ISAKMP Nonce Payload: 36 | NAT-T checking st_nat_traversal | NAT-T found (implies NAT_T_WITH_NATD) | sending NAT-D payloads | NATD hash sha2_256 init | NATD hash sha2_256 digest ICOOKIE/IKE SPIi-bytes@0x7ffe19a07ed0 (length 8) | 9f 65 42 37 54 9b 07 77 | NATD hash sha2_256 digest RCOOKIE/IKE SPIr-bytes@0x7ffe19a07ed8 (length 8) | c4 88 e3 f7 e7 56 66 9c | NATD hash sha2_256 digest IP addr-bytes@0x7ffe19a07e54 (length 4) | c0 01 02 17 | NATD hash sha2_256 digest PORT-bytes@0x7ffe19a07e46 (length 2) | 01 f4 | NATD hash sha2_256 final bytes@0x7ffe19a07f20 (length 32) | 0e bd c2 5c df 9f a5 6d 13 5f 0b 74 43 32 57 c9 | 31 31 80 9a 4d ce f7 21 6a cd ec 82 f3 0e 16 97 | natd_hash: hasher=0x5570e4592ca0(32) | natd_hash: icookie= 9f 65 42 37 54 9b 07 77 | natd_hash: rcookie= c4 88 e3 f7 e7 56 66 9c | natd_hash: ip= c0 01 02 17 | natd_hash: port=500 | natd_hash: hash= 0e bd c2 5c df 9f a5 6d 13 5f 0b 74 43 32 57 c9 | natd_hash: hash= 31 31 80 9a 4d ce f7 21 6a cd ec 82 f3 0e 16 97 | ***emit ISAKMP NAT-D Payload: | next payload type: ISAKMP_NEXT_NATD_RFC (0x14) | next payload chain: ignoring supplied 'ISAKMP NAT-D Payload'.'next payload type' value 20:ISAKMP_NEXT_NATD_RFC | next payload chain: setting previous 'ISAKMP Nonce Payload'.'next payload type' to current ISAKMP NAT-D Payload (20:ISAKMP_NEXT_NATD_RFC) | next payload chain: saving location 'ISAKMP NAT-D Payload'.'next payload type' in 'reply packet' | emitting 32 raw bytes of NAT-D into ISAKMP NAT-D Payload | NAT-D 0e bd c2 5c df 9f a5 6d 13 5f 0b 74 43 32 57 c9 | NAT-D 31 31 80 9a 4d ce f7 21 6a cd ec 82 f3 0e 16 97 | emitting length of ISAKMP NAT-D Payload: 36 | NATD hash sha2_256 init | NATD hash sha2_256 digest ICOOKIE/IKE SPIi-bytes@0x7ffe19a07ed0 (length 8) | 9f 65 42 37 54 9b 07 77 | NATD hash sha2_256 digest RCOOKIE/IKE SPIr-bytes@0x7ffe19a07ed8 (length 8) | c4 88 e3 f7 e7 56 66 9c | NATD hash sha2_256 digest IP addr-bytes@0x7ffe19a07e54 (length 4) | c0 01 02 2d | NATD hash sha2_256 digest PORT-bytes@0x7ffe19a07e46 (length 2) | 01 f4 | NATD hash sha2_256 final bytes@0x7ffe19a07f20 (length 32) | 8b f2 ab 51 be c1 f7 01 c3 98 d1 b5 80 24 a4 72 | f9 2b 17 57 c5 bd 62 19 14 22 ea e1 2d f0 62 3b | natd_hash: hasher=0x5570e4592ca0(32) | natd_hash: icookie= 9f 65 42 37 54 9b 07 77 | natd_hash: rcookie= c4 88 e3 f7 e7 56 66 9c | natd_hash: ip= c0 01 02 2d | natd_hash: port=500 | natd_hash: hash= 8b f2 ab 51 be c1 f7 01 c3 98 d1 b5 80 24 a4 72 | natd_hash: hash= f9 2b 17 57 c5 bd 62 19 14 22 ea e1 2d f0 62 3b | ***emit ISAKMP NAT-D Payload: | next payload type: ISAKMP_NEXT_NONE (0x0) | next payload chain: setting previous 'ISAKMP NAT-D Payload'.'next payload type' to current ISAKMP NAT-D Payload (20:ISAKMP_NEXT_NATD_RFC) | next payload chain: saving location 'ISAKMP NAT-D Payload'.'next payload type' in 'reply packet' | emitting 32 raw bytes of NAT-D into ISAKMP NAT-D Payload | NAT-D 8b f2 ab 51 be c1 f7 01 c3 98 d1 b5 80 24 a4 72 | NAT-D f9 2b 17 57 c5 bd 62 19 14 22 ea e1 2d f0 62 3b | emitting length of ISAKMP NAT-D Payload: 36 | no IKEv1 message padding required | emitting length of ISAKMP Message: 396 | State DB: re-hashing IKEv1 state #1 IKE SPIi and SPI[ir] | complete v1 state transition with STF_OK | [RE]START processing: state #1 connection "westnets-eastnet/2x0" from 192.1.2.23 (in complete_v1_state_transition() at ikev1.c:2673) | #1 is idle | doing_xauth:no, t_xauth_client_done:no | peer supports fragmentation | peer supports DPD | IKEv1: transition from state STATE_MAIN_I1 to state STATE_MAIN_I2 | parent state #1: MAIN_I1(half-open IKE SA) => MAIN_I2(open IKE SA) | event_already_set, deleting event | state #1 requesting EVENT_CRYPTO_TIMEOUT to be deleted | libevent_free: release ptr-libevent@0x5570e4c026e8 | free_event_entry: release EVENT_CRYPTO_TIMEOUT-pe@0x5570e4c02368 | sending reply packet to 192.1.2.23:500 (from 192.1.2.45:500) | sending 396 bytes for STATE_MAIN_I1 through eth1 from 192.1.2.45:500 to 192.1.2.23:500 (using #1) | 9f 65 42 37 54 9b 07 77 c4 88 e3 f7 e7 56 66 9c | 04 10 02 00 00 00 00 00 00 00 01 8c 0a 00 01 04 | ca 5e 47 de 60 65 fe 48 3e 8c 29 7a e2 77 fe a0 | c0 b7 2b 5a cb a5 70 8a 19 b3 35 4c e5 9b 2b 85 | f2 a1 79 ca 3b 4a 5d 8a 93 83 2f 58 49 77 74 2d | 5f 5a 1e ad 67 cc de 9d 45 03 11 c8 20 47 eb b7 | df 8e 08 7e b6 d4 c3 f1 fb be fa f5 a3 1f e6 e9 | 77 91 d5 89 3f 1a 8c dc fc 0f 02 35 63 c8 7f 8f | 54 47 06 cb 38 ae 20 b6 72 d3 d2 d4 b1 27 1f a9 | 54 12 16 c6 b2 6b f6 f6 69 ad 92 c7 1a 6b 91 4b | 2e 36 80 0d 0c aa 8e 86 cd 03 aa a7 f6 7c 51 79 | 84 67 85 65 0b 0d 00 3e 2c 7d 5f 96 88 72 9f 18 | a6 dd c9 18 01 04 b4 30 74 35 0d 39 d4 7b 4e b2 | 8d 5f f4 04 0b bd d7 44 be ac 4f d3 18 fd 2d 6f | 46 da 03 d4 79 6c a6 14 93 ac 97 1b 45 9e 99 a6 | ed af e1 92 6d f7 b6 f7 63 0e af 9a 05 f6 c0 32 | f4 56 86 49 cc 4b 9b f6 9a f0 24 cb 04 cc 4e 60 | 56 f6 0c 4a e9 8b 90 0f 00 db 53 b3 2d a5 f8 90 | 14 00 00 24 ad 8a ef 4d 62 64 7b ee 55 6d 04 08 | c9 09 c3 f6 77 04 60 e3 6c d5 30 af 91 0e 46 6c | 33 18 13 bb 14 00 00 24 0e bd c2 5c df 9f a5 6d | 13 5f 0b 74 43 32 57 c9 31 31 80 9a 4d ce f7 21 | 6a cd ec 82 f3 0e 16 97 00 00 00 24 8b f2 ab 51 | be c1 f7 01 c3 98 d1 b5 80 24 a4 72 f9 2b 17 57 | c5 bd 62 19 14 22 ea e1 2d f0 62 3b | !event_already_set at reschedule "westnets-eastnet/2x0" #1: IMPAIR: suppressing retransmits; scheduling timeout in 60 seconds | event_schedule: new EVENT_RETRANSMIT-pe@0x5570e4c02368 | inserting event EVENT_RETRANSMIT, timeout in 60 seconds for #1 | libevent_malloc: new ptr-libevent@0x5570e4c06188 size 128 | #1 STATE_MAIN_I2: retransmits: first event in 60 seconds; timeout in 60 seconds; limit of 12 retransmits; current time is 11343.426317 "westnets-eastnet/2x0" #1: STATE_MAIN_I2: sent MI2, expecting MR2 | modecfg pull: noquirk policy:push not-client | phase 1 is done, looking for phase 2 to unpend | resume sending helper answer for #1 suppresed complete_v1_state_transition() | stop processing: state #1 connection "westnets-eastnet/2x0" from 192.1.2.23 (in resume_handler() at server.c:833) | libevent_free: release ptr-libevent@0x7fa9e4002888 | *received 396 bytes from 192.1.2.23:500 on eth1 (192.1.2.45:500) | 9f 65 42 37 54 9b 07 77 c4 88 e3 f7 e7 56 66 9c | 04 10 02 00 00 00 00 00 00 00 01 8c 0a 00 01 04 | 8a 0a 00 d1 84 e7 90 f9 c1 e1 b2 56 05 f6 b2 3d | 51 91 b9 72 45 3a ed 5a a4 1d 59 7e 53 ea 88 b6 | 38 55 5b 6f 9d 60 6e 3c fe 50 10 fa b1 64 ff a0 | ac 77 5c 75 e8 b1 2f 02 d5 57 ce ce ca 00 58 f5 | 48 3f 14 f7 28 32 49 cf b2 24 b5 03 6c 25 44 61 | 5f 14 38 b4 8c 8b 96 86 e1 f0 a5 91 d4 d0 5a 5e | 69 74 ff 07 eb d6 e6 e0 f9 68 60 18 4f ef eb 6e | cc f6 83 e8 9e d3 de 6a 76 a9 d7 c4 b4 ce fe b3 | c0 da 3b 0d c9 9a 24 1d eb 3d ef 2d be f3 50 3c | b3 ef 06 8b 64 63 01 1c 76 5d 89 fd 06 37 f5 0f | 55 7a 2d 94 e7 0e c9 5f 97 9d 8f b6 e9 ea 31 14 | 98 91 49 0a 81 31 54 ae 2e f0 08 aa c9 29 dd b8 | b6 18 61 4b 30 49 26 8d 3f 14 20 17 a6 fb d4 79 | 48 d7 3c 4e ea 10 dc 13 fe 48 6b bc 45 eb b1 57 | 56 11 1d fc 29 3c 32 c6 89 33 69 b8 d2 f4 03 4f | ba ae bd e1 78 1c 6d 7a 45 cf 9a 58 da 36 da f7 | 14 00 00 24 b5 a2 20 c1 f1 0e 7f 31 da 45 22 3e | 01 3f 76 76 f3 9f dc 9f 73 bd be a4 f3 a1 9b 34 | e8 02 00 72 14 00 00 24 8b f2 ab 51 be c1 f7 01 | c3 98 d1 b5 80 24 a4 72 f9 2b 17 57 c5 bd 62 19 | 14 22 ea e1 2d f0 62 3b 00 00 00 24 0e bd c2 5c | df 9f a5 6d 13 5f 0b 74 43 32 57 c9 31 31 80 9a | 4d ce f7 21 6a cd ec 82 f3 0e 16 97 | start processing: from 192.1.2.23:500 (in process_md() at demux.c:378) | **parse ISAKMP Message: | initiator cookie: | 9f 65 42 37 54 9b 07 77 | responder cookie: | c4 88 e3 f7 e7 56 66 9c | next payload type: ISAKMP_NEXT_KE (0x4) | ISAKMP version: ISAKMP Version 1.0 (rfc2407) (0x10) | exchange type: ISAKMP_XCHG_IDPROT (0x2) | flags: none (0x0) | Message ID: 0 (0x0) | length: 396 (0x18c) | processing version=1.0 packet with exchange type=ISAKMP_XCHG_IDPROT (2) | State DB: found IKEv1 state #1 in MAIN_I2 (find_state_ikev1) | start processing: state #1 connection "westnets-eastnet/2x0" from 192.1.2.23 (in process_v1_packet() at ikev1.c:1459) | #1 is idle | #1 idle | got payload 0x10 (ISAKMP_NEXT_KE) needed: 0x410 opt: 0x102080 | ***parse ISAKMP Key Exchange Payload: | next payload type: ISAKMP_NEXT_NONCE (0xa) | length: 260 (0x104) | got payload 0x400 (ISAKMP_NEXT_NONCE) needed: 0x400 opt: 0x102080 | ***parse ISAKMP Nonce Payload: | next payload type: ISAKMP_NEXT_NATD_RFC (0x14) | length: 36 (0x24) | got payload 0x100000 (ISAKMP_NEXT_NATD_RFC) needed: 0x0 opt: 0x102080 | ***parse ISAKMP NAT-D Payload: | next payload type: ISAKMP_NEXT_NATD_RFC (0x14) | length: 36 (0x24) | got payload 0x100000 (ISAKMP_NEXT_NATD_RFC) needed: 0x0 opt: 0x102080 | ***parse ISAKMP NAT-D Payload: | next payload type: ISAKMP_NEXT_NONE (0x0) | length: 36 (0x24) | message 'main_inR2_outI3' HASH payload not checked early | DH public value received: | 8a 0a 00 d1 84 e7 90 f9 c1 e1 b2 56 05 f6 b2 3d | 51 91 b9 72 45 3a ed 5a a4 1d 59 7e 53 ea 88 b6 | 38 55 5b 6f 9d 60 6e 3c fe 50 10 fa b1 64 ff a0 | ac 77 5c 75 e8 b1 2f 02 d5 57 ce ce ca 00 58 f5 | 48 3f 14 f7 28 32 49 cf b2 24 b5 03 6c 25 44 61 | 5f 14 38 b4 8c 8b 96 86 e1 f0 a5 91 d4 d0 5a 5e | 69 74 ff 07 eb d6 e6 e0 f9 68 60 18 4f ef eb 6e | cc f6 83 e8 9e d3 de 6a 76 a9 d7 c4 b4 ce fe b3 | c0 da 3b 0d c9 9a 24 1d eb 3d ef 2d be f3 50 3c | b3 ef 06 8b 64 63 01 1c 76 5d 89 fd 06 37 f5 0f | 55 7a 2d 94 e7 0e c9 5f 97 9d 8f b6 e9 ea 31 14 | 98 91 49 0a 81 31 54 ae 2e f0 08 aa c9 29 dd b8 | b6 18 61 4b 30 49 26 8d 3f 14 20 17 a6 fb d4 79 | 48 d7 3c 4e ea 10 dc 13 fe 48 6b bc 45 eb b1 57 | 56 11 1d fc 29 3c 32 c6 89 33 69 b8 d2 f4 03 4f | ba ae bd e1 78 1c 6d 7a 45 cf 9a 58 da 36 da f7 | started looking for secret for @west->@east of kind PKK_PSK | actually looking for secret for @west->@east of kind PKK_PSK | line 1: key type PKK_PSK(@west) to type PKK_RSA | concluding with best_match=000 best=(nil) (lineno=-1) | no PreShared Key Found | DH secret MODP2048@0x7fa9e4003a28: transferring ownership from state #1 to helper IKEv1 DH+IV | adding aggr outR1 DH work-order 2 for state #1 | state #1 requesting EVENT_RETRANSMIT to be deleted | #1 STATE_MAIN_I2: retransmits: cleared | libevent_free: release ptr-libevent@0x5570e4c06188 | free_event_entry: release EVENT_RETRANSMIT-pe@0x5570e4c02368 | event_schedule: new EVENT_CRYPTO_TIMEOUT-pe@0x5570e4c02368 | inserting event EVENT_CRYPTO_TIMEOUT, timeout in 60 seconds for #1 | libevent_malloc: new ptr-libevent@0x7fa9e4002888 size 128 | complete v1 state transition with STF_SUSPEND | [RE]START processing: state #1 connection "westnets-eastnet/2x0" from 192.1.2.23 (in complete_v1_state_transition() at ikev1.c:2648) | suspending state #1 and saving MD | crypto helper 1 resuming | #1 is busy; has a suspended MD | crypto helper 1 starting work-order 2 for state #1 | stop processing: from 192.1.2.23:500 (BACKGROUND) (in process_md() at demux.c:380) | crypto helper 1 doing compute dh+iv (V1 Phase 1) (aggr outR1 DH); request ID 2 | peer's g: 8a 0a 00 d1 84 e7 90 f9 c1 e1 b2 56 05 f6 b2 3d | peer's g: 51 91 b9 72 45 3a ed 5a a4 1d 59 7e 53 ea 88 b6 | stop processing: state #1 connection "westnets-eastnet/2x0" from 192.1.2.23 (in process_md() at demux.c:382) | peer's g: 38 55 5b 6f 9d 60 6e 3c fe 50 10 fa b1 64 ff a0 | peer's g: ac 77 5c 75 e8 b1 2f 02 d5 57 ce ce ca 00 58 f5 | peer's g: 48 3f 14 f7 28 32 49 cf b2 24 b5 03 6c 25 44 61 | peer's g: 5f 14 38 b4 8c 8b 96 86 e1 f0 a5 91 d4 d0 5a 5e | processing: STOP connection NULL (in process_md() at demux.c:383) | peer's g: 69 74 ff 07 eb d6 e6 e0 f9 68 60 18 4f ef eb 6e | peer's g: cc f6 83 e8 9e d3 de 6a 76 a9 d7 c4 b4 ce fe b3 | peer's g: c0 da 3b 0d c9 9a 24 1d eb 3d ef 2d be f3 50 3c | peer's g: b3 ef 06 8b 64 63 01 1c 76 5d 89 fd 06 37 f5 0f | peer's g: 55 7a 2d 94 e7 0e c9 5f 97 9d 8f b6 e9 ea 31 14 | peer's g: 98 91 49 0a 81 31 54 ae 2e f0 08 aa c9 29 dd b8 | peer's g: b6 18 61 4b 30 49 26 8d 3f 14 20 17 a6 fb d4 79 | peer's g: 48 d7 3c 4e ea 10 dc 13 fe 48 6b bc 45 eb b1 57 | peer's g: 56 11 1d fc 29 3c 32 c6 89 33 69 b8 d2 f4 03 4f | peer's g: ba ae bd e1 78 1c 6d 7a 45 cf 9a 58 da 36 da f7 | Started DH shared-secret computation in NSS: | new : g_ir-key@0x5570e4bef6d0 (256-bytes, CONCATENATE_DATA_AND_BASE) | DH secret MODP2048@0x7fa9e4003a28: computed shared DH secret key@0x5570e4bef6d0 | dh-shared : g^ir-key@0x5570e4bef6d0 (256-bytes, CONCATENATE_DATA_AND_BASE) | SKEYID sig PRF sha2_256 init Ni|Nr-chunk@0x7fa9dc001f18 (length 64) | ad 8a ef 4d 62 64 7b ee 55 6d 04 08 c9 09 c3 f6 | 77 04 60 e3 6c d5 30 af 91 0e 46 6c 33 18 13 bb | b5 a2 20 c1 f1 0e 7f 31 da 45 22 3e 01 3f 76 76 | f3 9f dc 9f 73 bd be a4 f3 a1 9b 34 e8 02 00 72 | : ephemeral-key@0x5570e4b65080 (16-bytes, AES_KEY_GEN) | CONCATENATE_DATA_AND_BASE: | target: EXTRACT_KEY_FROM_KEY | base: base-key@0x5570e4b65080 (16-bytes, AES_KEY_GEN) | params: 16-bytes@0x7fa9ed0ec720 | result: Ni|Nr-key@0x5570e4bec1c0 (80-bytes, EXTRACT_KEY_FROM_KEY) | key-offset: 0, key-size: 64 | EXTRACT_KEY_FROM_KEY: | target: SHA256_HMAC | flags: SIGN | key_size: 64-bytes | base: base-key@0x5570e4bec1c0 (80-bytes, EXTRACT_KEY_FROM_KEY) | operation: FLAGS_ONLY | params: 8-bytes@0x7fa9ed0ec708 | result: Ni|Nr-key@0x5570e4bedc70 (64-bytes, SHA256_HMAC) | Ni|Nr: release tmp-key@0x5570e4bec1c0 | SKEYID sig prf: created sha2_256 context 0x7fa9dc002fa0 from Ni|Nr-key@0x5570e4bedc70 | SKEYID sig prf: begin sha2_256 with context 0x7fa9dc002fa0 from Ni|Nr-key@0x5570e4bedc70 | SKEYID sig: release clone-key@0x5570e4bedc70 | SKEYID sig PRF sha2_256 crypt-prf@0x7fa9dc003aa8 | SKEYID sig PRF sha2_256 update g^xy-key@0x5570e4bef6d0 (size 256) | SKEYID sig: g^xy-key@0x5570e4bef6d0 (256-bytes, CONCATENATE_DATA_AND_BASE) | nss hmac digest hack extracting all 256 bytes of key@0x5570e4bef6d0 | nss hmac digest hack: symkey-key@0x5570e4bef6d0 (256-bytes, CONCATENATE_DATA_AND_BASE) | : ephemeral-key@0x5570e4b65080 (16-bytes, AES_KEY_GEN) | nss hmac digest hack: new slot-key@0x5570e4be8ee0 (256-bytes, CONCATENATE_DATA_AND_BASE) | sizeof bytes 256 | wrapper: (SECItemType)-464375087: e1 44 02 e6 da 6e b7 76 32 d7 10 23 40 cb f7 80 21 8f 57 f5 1a a9 eb f8 49 97 15 85 08 30 fd 2a 94 6b fc e5 58 54 49 2a f4 5b fc 1e 9a 09 1c c1 c7 ca 30 08 13 35 be 17 0d 88 fa 0b cb f9 2c cb 72 e6 cf 3c 0f 2d c6 37 db b2 72 ae fc a5 2e 68 d2 49 05 35 cb 7a 1a e4 17 c9 10 28 ac ab 02 c5 67 bb d3 60 04 12 40 db ba 5a 6f da 2b 52 f5 e9 90 6f 1c 49 a7 6e c4 da 47 8e 3b 73 b9 44 a2 17 99 65 8d 98 b9 f4 63 cf fc f8 45 ef 36 55 7f 13 4b 7d 34 42 63 af 58 56 76 ee d6 75 44 87 be 43 f6 2f 82 c6 34 76 d9 98 8c 79 9e d9 fb 3a ef 73 ed 92 33 91 3c 93 7b 02 e3 cf 54 65 72 5f cd c6 03 40 c3 38 fd e1 ec c4 08 e8 ed f3 58 f3 78 88 13 d5 40 26 95 90 0e b7 fe bd 59 79 72 78 e9 6a 9c fb 8c 72 6b 27 d7 09 bd 93 e0 16 2b f3 f0 a5 f6 c7 f8 01 af 0c ae 76 19 1f 3d e2 e2 24 33 d3 | nss hmac digest hack: release slot-key-key@0x5570e4be8ee0 | nss hmac digest hack extracted len 256 bytes at 0x7fa9dc003fd8 | unwrapped: 66 4c ca 10 06 74 2a 8e 7e c2 6b a0 e6 8d ac 00 | unwrapped: 74 b5 d0 e7 cf 95 3e 5d 69 8f 15 87 a1 e2 33 18 | unwrapped: b2 1a c0 73 67 3e a6 da d9 b2 36 91 9c fa 33 80 | unwrapped: 5b a6 b1 8e e8 bb 95 94 7a 72 e2 0b 4d 14 c5 58 | unwrapped: 15 70 f1 09 3f cc fd 33 3a ec 35 71 d2 29 68 5a | unwrapped: 89 45 57 a4 56 27 c9 ab 50 ed 3d d8 a0 45 49 89 | unwrapped: cb e1 8a 6e c8 25 a0 87 76 aa 0c 7a 8e 83 53 d8 | unwrapped: 80 97 8f ba 81 13 cd 7d 89 fe fe 51 1f 92 25 bd | unwrapped: 6e 06 71 36 52 f5 49 7e 82 f1 51 75 60 68 aa 3d | unwrapped: 09 31 02 24 9f fc 01 4f 45 77 cd 4d 48 17 fa 89 | unwrapped: dd 78 85 6e c7 1f be 3d c6 f0 72 ca c7 5b 15 5e | unwrapped: 8d 83 97 f4 24 24 5c 11 aa 60 65 41 a0 6d 11 df | unwrapped: a4 8c 93 42 07 5b f0 27 09 3d a9 e6 be 2a e5 d4 | unwrapped: 05 e3 46 30 bd af 4f da 5f 2f c6 8f cf c1 38 e4 | unwrapped: 5a 15 89 ed c0 af f7 f3 ac 5b a9 c4 b7 00 cf f3 | unwrapped: 5d 25 d8 fb db 68 12 5c 3c 01 eb c7 86 8a e4 16 | : ephemeral-key@0x5570e4b65080 (16-bytes, AES_KEY_GEN) | CONCATENATE_DATA_AND_BASE: | target: EXTRACT_KEY_FROM_KEY | base: base-key@0x5570e4b65080 (16-bytes, AES_KEY_GEN) | params: 16-bytes@0x7fa9ed0ec740 | result: final-key@0x5570e4bec1c0 (48-bytes, EXTRACT_KEY_FROM_KEY) | key-offset: 0, key-size: 32 | EXTRACT_KEY_FROM_KEY: | target: EXTRACT_KEY_FROM_KEY | key_size: 32-bytes | base: base-key@0x5570e4bec1c0 (48-bytes, EXTRACT_KEY_FROM_KEY) | operation: FLAGS_ONLY | params: 8-bytes@0x7fa9ed0ec728 | result: final-key@0x5570e4bedc70 (32-bytes, EXTRACT_KEY_FROM_KEY) | final: release tmp-key@0x5570e4bec1c0 | SKEYID sig PRF sha2_256 final-key@0x5570e4bedc70 (size 32) | SKEYID sig: key-key@0x5570e4bedc70 (32-bytes, EXTRACT_KEY_FROM_KEY) | SKEYID_d PRF sha2_256 init SKEYID-key@0x5570e4bedc70 (size 32) | SKEYID_d: SKEYID-key@0x5570e4bedc70 (32-bytes, EXTRACT_KEY_FROM_KEY) | key-offset: 0, key-size: 32 | EXTRACT_KEY_FROM_KEY: | target: SHA256_HMAC | flags: SIGN | key_size: 32-bytes | base: base-key@0x5570e4bedc70 (32-bytes, EXTRACT_KEY_FROM_KEY) | operation: FLAGS_ONLY | params: 8-bytes@0x7fa9ed0ec718 | result: clone-key@0x5570e4bec1c0 (32-bytes, SHA256_HMAC) | SKEYID_d prf: created sha2_256 context 0x7fa9dc002fa0 from SKEYID-key@0x5570e4bec1c0 | SKEYID_d prf: begin sha2_256 with context 0x7fa9dc002fa0 from SKEYID-key@0x5570e4bec1c0 | SKEYID_d: release clone-key@0x5570e4bec1c0 | SKEYID_d PRF sha2_256 crypt-prf@0x7fa9dc002f28 | SKEYID_d PRF sha2_256 update g^xy-key@0x5570e4bef6d0 (size 256) | SKEYID_d: g^xy-key@0x5570e4bef6d0 (256-bytes, CONCATENATE_DATA_AND_BASE) | nss hmac digest hack extracting all 256 bytes of key@0x5570e4bef6d0 | nss hmac digest hack: symkey-key@0x5570e4bef6d0 (256-bytes, CONCATENATE_DATA_AND_BASE) | : ephemeral-key@0x5570e4b65080 (16-bytes, AES_KEY_GEN) | nss hmac digest hack: new slot-key@0x5570e4be8ee0 (256-bytes, CONCATENATE_DATA_AND_BASE) | sizeof bytes 256 | wrapper: (SECItemType)-464375087: e1 44 02 e6 da 6e b7 76 32 d7 10 23 40 cb f7 80 21 8f 57 f5 1a a9 eb f8 49 97 15 85 08 30 fd 2a 94 6b fc e5 58 54 49 2a f4 5b fc 1e 9a 09 1c c1 c7 ca 30 08 13 35 be 17 0d 88 fa 0b cb f9 2c cb 72 e6 cf 3c 0f 2d c6 37 db b2 72 ae fc a5 2e 68 d2 49 05 35 cb 7a 1a e4 17 c9 10 28 ac ab 02 c5 67 bb d3 60 04 12 40 db ba 5a 6f da 2b 52 f5 e9 90 6f 1c 49 a7 6e c4 da 47 8e 3b 73 b9 44 a2 17 99 65 8d 98 b9 f4 63 cf fc f8 45 ef 36 55 7f 13 4b 7d 34 42 63 af 58 56 76 ee d6 75 44 87 be 43 f6 2f 82 c6 34 76 d9 98 8c 79 9e d9 fb 3a ef 73 ed 92 33 91 3c 93 7b 02 e3 cf 54 65 72 5f cd c6 03 40 c3 38 fd e1 ec c4 08 e8 ed f3 58 f3 78 88 13 d5 40 26 95 90 0e b7 fe bd 59 79 72 78 e9 6a 9c fb 8c 72 6b 27 d7 09 bd 93 e0 16 2b f3 f0 a5 f6 c7 f8 01 af 0c ae 76 19 1f 3d e2 e2 24 33 d3 | nss hmac digest hack: release slot-key-key@0x5570e4be8ee0 | nss hmac digest hack extracted len 256 bytes at 0x7fa9dc003c08 | unwrapped: 66 4c ca 10 06 74 2a 8e 7e c2 6b a0 e6 8d ac 00 | unwrapped: 74 b5 d0 e7 cf 95 3e 5d 69 8f 15 87 a1 e2 33 18 | unwrapped: b2 1a c0 73 67 3e a6 da d9 b2 36 91 9c fa 33 80 | unwrapped: 5b a6 b1 8e e8 bb 95 94 7a 72 e2 0b 4d 14 c5 58 | unwrapped: 15 70 f1 09 3f cc fd 33 3a ec 35 71 d2 29 68 5a | unwrapped: 89 45 57 a4 56 27 c9 ab 50 ed 3d d8 a0 45 49 89 | unwrapped: cb e1 8a 6e c8 25 a0 87 76 aa 0c 7a 8e 83 53 d8 | unwrapped: 80 97 8f ba 81 13 cd 7d 89 fe fe 51 1f 92 25 bd | unwrapped: 6e 06 71 36 52 f5 49 7e 82 f1 51 75 60 68 aa 3d | unwrapped: 09 31 02 24 9f fc 01 4f 45 77 cd 4d 48 17 fa 89 | unwrapped: dd 78 85 6e c7 1f be 3d c6 f0 72 ca c7 5b 15 5e | unwrapped: 8d 83 97 f4 24 24 5c 11 aa 60 65 41 a0 6d 11 df | unwrapped: a4 8c 93 42 07 5b f0 27 09 3d a9 e6 be 2a e5 d4 | unwrapped: 05 e3 46 30 bd af 4f da 5f 2f c6 8f cf c1 38 e4 | unwrapped: 5a 15 89 ed c0 af f7 f3 ac 5b a9 c4 b7 00 cf f3 | unwrapped: 5d 25 d8 fb db 68 12 5c 3c 01 eb c7 86 8a e4 16 | SKEYID_d PRF sha2_256 update CKI_i-bytes@0x5570e4c04378 (length 8) | 9f 65 42 37 54 9b 07 77 | SKEYID_d PRF sha2_256 update CKI_r-bytes@0x5570e4c04380 (length 8) | c4 88 e3 f7 e7 56 66 9c | SKEYID_d PRF sha2_256 update 0-byte@0x0 (0) | 00 | : ephemeral-key@0x5570e4b65080 (16-bytes, AES_KEY_GEN) | CONCATENATE_DATA_AND_BASE: | target: EXTRACT_KEY_FROM_KEY | base: base-key@0x5570e4b65080 (16-bytes, AES_KEY_GEN) | params: 16-bytes@0x7fa9ed0ec720 | result: final-key@0x5570e4be4dc0 (48-bytes, EXTRACT_KEY_FROM_KEY) | key-offset: 0, key-size: 32 | EXTRACT_KEY_FROM_KEY: | target: EXTRACT_KEY_FROM_KEY | key_size: 32-bytes | base: base-key@0x5570e4be4dc0 (48-bytes, EXTRACT_KEY_FROM_KEY) | operation: FLAGS_ONLY | params: 8-bytes@0x7fa9ed0ec708 | result: final-key@0x5570e4bec1c0 (32-bytes, EXTRACT_KEY_FROM_KEY) | final: release tmp-key@0x5570e4be4dc0 | SKEYID_d PRF sha2_256 final-key@0x5570e4bec1c0 (size 32) | SKEYID_d: key-key@0x5570e4bec1c0 (32-bytes, EXTRACT_KEY_FROM_KEY) | SKEYID_a PRF sha2_256 init SKEYID-key@0x5570e4bedc70 (size 32) | SKEYID_a: SKEYID-key@0x5570e4bedc70 (32-bytes, EXTRACT_KEY_FROM_KEY) | key-offset: 0, key-size: 32 | EXTRACT_KEY_FROM_KEY: | target: SHA256_HMAC | flags: SIGN | key_size: 32-bytes | base: base-key@0x5570e4bedc70 (32-bytes, EXTRACT_KEY_FROM_KEY) | operation: FLAGS_ONLY | params: 8-bytes@0x7fa9ed0ec6f8 | result: clone-key@0x5570e4be4dc0 (32-bytes, SHA256_HMAC) | SKEYID_a prf: created sha2_256 context 0x7fa9dc002fa0 from SKEYID-key@0x5570e4be4dc0 | SKEYID_a prf: begin sha2_256 with context 0x7fa9dc002fa0 from SKEYID-key@0x5570e4be4dc0 | SKEYID_a: release clone-key@0x5570e4be4dc0 | SKEYID_a PRF sha2_256 crypt-prf@0x7fa9dc003aa8 | SKEYID_a PRF sha2_256 update SKEYID_d-key@0x5570e4bec1c0 (size 32) | SKEYID_a: SKEYID_d-key@0x5570e4bec1c0 (32-bytes, EXTRACT_KEY_FROM_KEY) | nss hmac digest hack extracting all 32 bytes of key@0x5570e4bec1c0 | nss hmac digest hack: symkey-key@0x5570e4bec1c0 (32-bytes, EXTRACT_KEY_FROM_KEY) | : ephemeral-key@0x5570e4b65080 (16-bytes, AES_KEY_GEN) | nss hmac digest hack: new slot-key@0x5570e4be8ee0 (32-bytes, EXTRACT_KEY_FROM_KEY) | sizeof bytes 32 | wrapper: (SECItemType)-464191123: e1 74 ae 8d 5a b0 bd 47 87 48 6b 1d 83 9b 42 a1 fa 89 91 8a 59 ca 00 83 cf f9 77 40 f7 0b ba b0 | nss hmac digest hack: release slot-key-key@0x5570e4be8ee0 | nss hmac digest hack extracted len 32 bytes at 0x7fa9dc002f78 | unwrapped: 7a 31 f1 b9 d3 67 0c 39 da d9 ab c0 b1 ca 2f 88 | unwrapped: dd b1 25 69 11 5b 4d ef 11 11 7b cc 94 c1 8c 6e | SKEYID_a PRF sha2_256 update g^xy-key@0x5570e4bef6d0 (size 256) | SKEYID_a: g^xy-key@0x5570e4bef6d0 (256-bytes, CONCATENATE_DATA_AND_BASE) | nss hmac digest hack extracting all 256 bytes of key@0x5570e4bef6d0 | nss hmac digest hack: symkey-key@0x5570e4bef6d0 (256-bytes, CONCATENATE_DATA_AND_BASE) | : ephemeral-key@0x5570e4b65080 (16-bytes, AES_KEY_GEN) | nss hmac digest hack: new slot-key@0x5570e4be8ee0 (256-bytes, CONCATENATE_DATA_AND_BASE) | sizeof bytes 256 | wrapper: (SECItemType)-464375087: e1 44 02 e6 da 6e b7 76 32 d7 10 23 40 cb f7 80 21 8f 57 f5 1a a9 eb f8 49 97 15 85 08 30 fd 2a 94 6b fc e5 58 54 49 2a f4 5b fc 1e 9a 09 1c c1 c7 ca 30 08 13 35 be 17 0d 88 fa 0b cb f9 2c cb 72 e6 cf 3c 0f 2d c6 37 db b2 72 ae fc a5 2e 68 d2 49 05 35 cb 7a 1a e4 17 c9 10 28 ac ab 02 c5 67 bb d3 60 04 12 40 db ba 5a 6f da 2b 52 f5 e9 90 6f 1c 49 a7 6e c4 da 47 8e 3b 73 b9 44 a2 17 99 65 8d 98 b9 f4 63 cf fc f8 45 ef 36 55 7f 13 4b 7d 34 42 63 af 58 56 76 ee d6 75 44 87 be 43 f6 2f 82 c6 34 76 d9 98 8c 79 9e d9 fb 3a ef 73 ed 92 33 91 3c 93 7b 02 e3 cf 54 65 72 5f cd c6 03 40 c3 38 fd e1 ec c4 08 e8 ed f3 58 f3 78 88 13 d5 40 26 95 90 0e b7 fe bd 59 79 72 78 e9 6a 9c fb 8c 72 6b 27 d7 09 bd 93 e0 16 2b f3 f0 a5 f6 c7 f8 01 af 0c ae 76 19 1f 3d e2 e2 24 33 d3 | nss hmac digest hack: release slot-key-key@0x5570e4be8ee0 | nss hmac digest hack extracted len 256 bytes at 0x7fa9dc003fd8 | unwrapped: 66 4c ca 10 06 74 2a 8e 7e c2 6b a0 e6 8d ac 00 | unwrapped: 74 b5 d0 e7 cf 95 3e 5d 69 8f 15 87 a1 e2 33 18 | unwrapped: b2 1a c0 73 67 3e a6 da d9 b2 36 91 9c fa 33 80 | unwrapped: 5b a6 b1 8e e8 bb 95 94 7a 72 e2 0b 4d 14 c5 58 | unwrapped: 15 70 f1 09 3f cc fd 33 3a ec 35 71 d2 29 68 5a | unwrapped: 89 45 57 a4 56 27 c9 ab 50 ed 3d d8 a0 45 49 89 | unwrapped: cb e1 8a 6e c8 25 a0 87 76 aa 0c 7a 8e 83 53 d8 | unwrapped: 80 97 8f ba 81 13 cd 7d 89 fe fe 51 1f 92 25 bd | unwrapped: 6e 06 71 36 52 f5 49 7e 82 f1 51 75 60 68 aa 3d | unwrapped: 09 31 02 24 9f fc 01 4f 45 77 cd 4d 48 17 fa 89 | unwrapped: dd 78 85 6e c7 1f be 3d c6 f0 72 ca c7 5b 15 5e | unwrapped: 8d 83 97 f4 24 24 5c 11 aa 60 65 41 a0 6d 11 df | unwrapped: a4 8c 93 42 07 5b f0 27 09 3d a9 e6 be 2a e5 d4 | unwrapped: 05 e3 46 30 bd af 4f da 5f 2f c6 8f cf c1 38 e4 | unwrapped: 5a 15 89 ed c0 af f7 f3 ac 5b a9 c4 b7 00 cf f3 | unwrapped: 5d 25 d8 fb db 68 12 5c 3c 01 eb c7 86 8a e4 16 | SKEYID_a PRF sha2_256 update CKI_i-bytes@0x5570e4c04378 (length 8) | 9f 65 42 37 54 9b 07 77 | SKEYID_a PRF sha2_256 update CKI_r-bytes@0x5570e4c04380 (length 8) | c4 88 e3 f7 e7 56 66 9c | SKEYID_a PRF sha2_256 update 1-byte@0x1 (1) | 01 | : ephemeral-key@0x5570e4b65080 (16-bytes, AES_KEY_GEN) | CONCATENATE_DATA_AND_BASE: | target: EXTRACT_KEY_FROM_KEY | base: base-key@0x5570e4b65080 (16-bytes, AES_KEY_GEN) | params: 16-bytes@0x7fa9ed0ec700 | result: final-key@0x5570e4befab0 (48-bytes, EXTRACT_KEY_FROM_KEY) | key-offset: 0, key-size: 32 | EXTRACT_KEY_FROM_KEY: | target: EXTRACT_KEY_FROM_KEY | key_size: 32-bytes | base: base-key@0x5570e4befab0 (48-bytes, EXTRACT_KEY_FROM_KEY) | operation: FLAGS_ONLY | params: 8-bytes@0x7fa9ed0ec6e8 | result: final-key@0x5570e4be4dc0 (32-bytes, EXTRACT_KEY_FROM_KEY) | final: release tmp-key@0x5570e4befab0 | SKEYID_a PRF sha2_256 final-key@0x5570e4be4dc0 (size 32) | SKEYID_a: key-key@0x5570e4be4dc0 (32-bytes, EXTRACT_KEY_FROM_KEY) | SKEYID_e PRF sha2_256 init SKEYID-key@0x5570e4bedc70 (size 32) | SKEYID_e: SKEYID-key@0x5570e4bedc70 (32-bytes, EXTRACT_KEY_FROM_KEY) | key-offset: 0, key-size: 32 | EXTRACT_KEY_FROM_KEY: | target: SHA256_HMAC | flags: SIGN | key_size: 32-bytes | base: base-key@0x5570e4bedc70 (32-bytes, EXTRACT_KEY_FROM_KEY) | operation: FLAGS_ONLY | params: 8-bytes@0x7fa9ed0ec708 | result: clone-key@0x5570e4befab0 (32-bytes, SHA256_HMAC) | SKEYID_e prf: created sha2_256 context 0x7fa9dc002fa0 from SKEYID-key@0x5570e4befab0 | SKEYID_e prf: begin sha2_256 with context 0x7fa9dc002fa0 from SKEYID-key@0x5570e4befab0 | SKEYID_e: release clone-key@0x5570e4befab0 | SKEYID_e PRF sha2_256 crypt-prf@0x7fa9dc002f28 | SKEYID_e PRF sha2_256 update SKEYID_a-key@0x5570e4be4dc0 (size 32) | SKEYID_e: SKEYID_a-key@0x5570e4be4dc0 (32-bytes, EXTRACT_KEY_FROM_KEY) | nss hmac digest hack extracting all 32 bytes of key@0x5570e4be4dc0 | nss hmac digest hack: symkey-key@0x5570e4be4dc0 (32-bytes, EXTRACT_KEY_FROM_KEY) | : ephemeral-key@0x5570e4b65080 (16-bytes, AES_KEY_GEN) | nss hmac digest hack: new slot-key@0x5570e4be8ee0 (32-bytes, EXTRACT_KEY_FROM_KEY) | sizeof bytes 32 | wrapper: (SECItemType)-464358420: 38 0f 4e e0 1f 44 e2 85 25 b6 be 65 01 4d 25 e5 22 be 60 7c 65 fb d5 b3 0c 6c f9 af 63 4d a7 80 | nss hmac digest hack: release slot-key-key@0x5570e4be8ee0 | nss hmac digest hack extracted len 32 bytes at 0x7fa9dc0030d8 | unwrapped: 9a 97 02 3d 25 47 ee d4 35 a7 0c 63 8e 61 ab f0 | unwrapped: a7 9a 54 f8 cf 57 17 56 ef 38 ef e5 bb 33 ba 05 | SKEYID_e PRF sha2_256 update g^xy-key@0x5570e4bef6d0 (size 256) | SKEYID_e: g^xy-key@0x5570e4bef6d0 (256-bytes, CONCATENATE_DATA_AND_BASE) | nss hmac digest hack extracting all 256 bytes of key@0x5570e4bef6d0 | nss hmac digest hack: symkey-key@0x5570e4bef6d0 (256-bytes, CONCATENATE_DATA_AND_BASE) | : ephemeral-key@0x5570e4b65080 (16-bytes, AES_KEY_GEN) | nss hmac digest hack: new slot-key@0x5570e4be8ee0 (256-bytes, CONCATENATE_DATA_AND_BASE) | sizeof bytes 256 | wrapper: (SECItemType)-464375087: e1 44 02 e6 da 6e b7 76 32 d7 10 23 40 cb f7 80 21 8f 57 f5 1a a9 eb f8 49 97 15 85 08 30 fd 2a 94 6b fc e5 58 54 49 2a f4 5b fc 1e 9a 09 1c c1 c7 ca 30 08 13 35 be 17 0d 88 fa 0b cb f9 2c cb 72 e6 cf 3c 0f 2d c6 37 db b2 72 ae fc a5 2e 68 d2 49 05 35 cb 7a 1a e4 17 c9 10 28 ac ab 02 c5 67 bb d3 60 04 12 40 db ba 5a 6f da 2b 52 f5 e9 90 6f 1c 49 a7 6e c4 da 47 8e 3b 73 b9 44 a2 17 99 65 8d 98 b9 f4 63 cf fc f8 45 ef 36 55 7f 13 4b 7d 34 42 63 af 58 56 76 ee d6 75 44 87 be 43 f6 2f 82 c6 34 76 d9 98 8c 79 9e d9 fb 3a ef 73 ed 92 33 91 3c 93 7b 02 e3 cf 54 65 72 5f cd c6 03 40 c3 38 fd e1 ec c4 08 e8 ed f3 58 f3 78 88 13 d5 40 26 95 90 0e b7 fe bd 59 79 72 78 e9 6a 9c fb 8c 72 6b 27 d7 09 bd 93 e0 16 2b f3 f0 a5 f6 c7 f8 01 af 0c ae 76 19 1f 3d e2 e2 24 33 d3 | nss hmac digest hack: release slot-key-key@0x5570e4be8ee0 | nss hmac digest hack extracted len 256 bytes at 0x7fa9dc003c08 | unwrapped: 66 4c ca 10 06 74 2a 8e 7e c2 6b a0 e6 8d ac 00 | unwrapped: 74 b5 d0 e7 cf 95 3e 5d 69 8f 15 87 a1 e2 33 18 | unwrapped: b2 1a c0 73 67 3e a6 da d9 b2 36 91 9c fa 33 80 | unwrapped: 5b a6 b1 8e e8 bb 95 94 7a 72 e2 0b 4d 14 c5 58 | unwrapped: 15 70 f1 09 3f cc fd 33 3a ec 35 71 d2 29 68 5a | unwrapped: 89 45 57 a4 56 27 c9 ab 50 ed 3d d8 a0 45 49 89 | unwrapped: cb e1 8a 6e c8 25 a0 87 76 aa 0c 7a 8e 83 53 d8 | unwrapped: 80 97 8f ba 81 13 cd 7d 89 fe fe 51 1f 92 25 bd | unwrapped: 6e 06 71 36 52 f5 49 7e 82 f1 51 75 60 68 aa 3d | unwrapped: 09 31 02 24 9f fc 01 4f 45 77 cd 4d 48 17 fa 89 | unwrapped: dd 78 85 6e c7 1f be 3d c6 f0 72 ca c7 5b 15 5e | unwrapped: 8d 83 97 f4 24 24 5c 11 aa 60 65 41 a0 6d 11 df | unwrapped: a4 8c 93 42 07 5b f0 27 09 3d a9 e6 be 2a e5 d4 | unwrapped: 05 e3 46 30 bd af 4f da 5f 2f c6 8f cf c1 38 e4 | unwrapped: 5a 15 89 ed c0 af f7 f3 ac 5b a9 c4 b7 00 cf f3 | unwrapped: 5d 25 d8 fb db 68 12 5c 3c 01 eb c7 86 8a e4 16 | SKEYID_e PRF sha2_256 update CKI_i-bytes@0x5570e4c04378 (length 8) | 9f 65 42 37 54 9b 07 77 | SKEYID_e PRF sha2_256 update CKI_r-bytes@0x5570e4c04380 (length 8) | c4 88 e3 f7 e7 56 66 9c | SKEYID_e PRF sha2_256 update 2-byte@0x2 (2) | 02 | : ephemeral-key@0x5570e4b65080 (16-bytes, AES_KEY_GEN) | CONCATENATE_DATA_AND_BASE: | target: EXTRACT_KEY_FROM_KEY | base: base-key@0x5570e4b65080 (16-bytes, AES_KEY_GEN) | params: 16-bytes@0x7fa9ed0ec710 | result: final-key@0x5570e4be6640 (48-bytes, EXTRACT_KEY_FROM_KEY) | key-offset: 0, key-size: 32 | EXTRACT_KEY_FROM_KEY: | target: EXTRACT_KEY_FROM_KEY | key_size: 32-bytes | base: base-key@0x5570e4be6640 (48-bytes, EXTRACT_KEY_FROM_KEY) | operation: FLAGS_ONLY | params: 8-bytes@0x7fa9ed0ec6f8 | result: final-key@0x5570e4befab0 (32-bytes, EXTRACT_KEY_FROM_KEY) | final: release tmp-key@0x5570e4be6640 | SKEYID_e PRF sha2_256 final-key@0x5570e4befab0 (size 32) | SKEYID_e: key-key@0x5570e4befab0 (32-bytes, EXTRACT_KEY_FROM_KEY) | key-offset: 0, key-size: 32 | EXTRACT_KEY_FROM_KEY: | target: AES_CBC | flags: ENCRYPT+DECRYPT | key_size: 32-bytes | base: base-key@0x5570e4befab0 (32-bytes, EXTRACT_KEY_FROM_KEY) | operation: FLAGS_ONLY | params: 8-bytes@0x7fa9ed0ec768 | result: keymat-key@0x5570e4be6640 (32-bytes, AES_CBC) | NSS: pointers skeyid_d 0x5570e4bec1c0, skeyid_a 0x5570e4be4dc0, skeyid_e 0x5570e4befab0, enc_key 0x5570e4be6640 | DH_i: ca 5e 47 de 60 65 fe 48 3e 8c 29 7a e2 77 fe a0 | DH_i: c0 b7 2b 5a cb a5 70 8a 19 b3 35 4c e5 9b 2b 85 | DH_i: f2 a1 79 ca 3b 4a 5d 8a 93 83 2f 58 49 77 74 2d | DH_i: 5f 5a 1e ad 67 cc de 9d 45 03 11 c8 20 47 eb b7 | DH_i: df 8e 08 7e b6 d4 c3 f1 fb be fa f5 a3 1f e6 e9 | DH_i: 77 91 d5 89 3f 1a 8c dc fc 0f 02 35 63 c8 7f 8f | DH_i: 54 47 06 cb 38 ae 20 b6 72 d3 d2 d4 b1 27 1f a9 | DH_i: 54 12 16 c6 b2 6b f6 f6 69 ad 92 c7 1a 6b 91 4b | DH_i: 2e 36 80 0d 0c aa 8e 86 cd 03 aa a7 f6 7c 51 79 | DH_i: 84 67 85 65 0b 0d 00 3e 2c 7d 5f 96 88 72 9f 18 | DH_i: a6 dd c9 18 01 04 b4 30 74 35 0d 39 d4 7b 4e b2 | DH_i: 8d 5f f4 04 0b bd d7 44 be ac 4f d3 18 fd 2d 6f | DH_i: 46 da 03 d4 79 6c a6 14 93 ac 97 1b 45 9e 99 a6 | DH_i: ed af e1 92 6d f7 b6 f7 63 0e af 9a 05 f6 c0 32 | DH_i: f4 56 86 49 cc 4b 9b f6 9a f0 24 cb 04 cc 4e 60 | DH_i: 56 f6 0c 4a e9 8b 90 0f 00 db 53 b3 2d a5 f8 90 | DH_r: 8a 0a 00 d1 84 e7 90 f9 c1 e1 b2 56 05 f6 b2 3d | DH_r: 51 91 b9 72 45 3a ed 5a a4 1d 59 7e 53 ea 88 b6 | DH_r: 38 55 5b 6f 9d 60 6e 3c fe 50 10 fa b1 64 ff a0 | DH_r: ac 77 5c 75 e8 b1 2f 02 d5 57 ce ce ca 00 58 f5 | DH_r: 48 3f 14 f7 28 32 49 cf b2 24 b5 03 6c 25 44 61 | DH_r: 5f 14 38 b4 8c 8b 96 86 e1 f0 a5 91 d4 d0 5a 5e | DH_r: 69 74 ff 07 eb d6 e6 e0 f9 68 60 18 4f ef eb 6e | DH_r: cc f6 83 e8 9e d3 de 6a 76 a9 d7 c4 b4 ce fe b3 | DH_r: c0 da 3b 0d c9 9a 24 1d eb 3d ef 2d be f3 50 3c | DH_r: b3 ef 06 8b 64 63 01 1c 76 5d 89 fd 06 37 f5 0f | DH_r: 55 7a 2d 94 e7 0e c9 5f 97 9d 8f b6 e9 ea 31 14 | DH_r: 98 91 49 0a 81 31 54 ae 2e f0 08 aa c9 29 dd b8 | DH_r: b6 18 61 4b 30 49 26 8d 3f 14 20 17 a6 fb d4 79 | DH_r: 48 d7 3c 4e ea 10 dc 13 fe 48 6b bc 45 eb b1 57 | DH_r: 56 11 1d fc 29 3c 32 c6 89 33 69 b8 d2 f4 03 4f | DH_r: ba ae bd e1 78 1c 6d 7a 45 cf 9a 58 da 36 da f7 | new IV hash sha2_256 init | new IV hash sha2_256 digest GI-bytes@0x5570e4c04178 (length 256) | ca 5e 47 de 60 65 fe 48 3e 8c 29 7a e2 77 fe a0 | c0 b7 2b 5a cb a5 70 8a 19 b3 35 4c e5 9b 2b 85 | f2 a1 79 ca 3b 4a 5d 8a 93 83 2f 58 49 77 74 2d | 5f 5a 1e ad 67 cc de 9d 45 03 11 c8 20 47 eb b7 | df 8e 08 7e b6 d4 c3 f1 fb be fa f5 a3 1f e6 e9 | 77 91 d5 89 3f 1a 8c dc fc 0f 02 35 63 c8 7f 8f | 54 47 06 cb 38 ae 20 b6 72 d3 d2 d4 b1 27 1f a9 | 54 12 16 c6 b2 6b f6 f6 69 ad 92 c7 1a 6b 91 4b | 2e 36 80 0d 0c aa 8e 86 cd 03 aa a7 f6 7c 51 79 | 84 67 85 65 0b 0d 00 3e 2c 7d 5f 96 88 72 9f 18 | a6 dd c9 18 01 04 b4 30 74 35 0d 39 d4 7b 4e b2 | 8d 5f f4 04 0b bd d7 44 be ac 4f d3 18 fd 2d 6f | 46 da 03 d4 79 6c a6 14 93 ac 97 1b 45 9e 99 a6 | ed af e1 92 6d f7 b6 f7 63 0e af 9a 05 f6 c0 32 | f4 56 86 49 cc 4b 9b f6 9a f0 24 cb 04 cc 4e 60 | 56 f6 0c 4a e9 8b 90 0f 00 db 53 b3 2d a5 f8 90 | new IV hash sha2_256 digest GR-bytes@0x5570e4c04278 (length 256) | 8a 0a 00 d1 84 e7 90 f9 c1 e1 b2 56 05 f6 b2 3d | 51 91 b9 72 45 3a ed 5a a4 1d 59 7e 53 ea 88 b6 | 38 55 5b 6f 9d 60 6e 3c fe 50 10 fa b1 64 ff a0 | ac 77 5c 75 e8 b1 2f 02 d5 57 ce ce ca 00 58 f5 | 48 3f 14 f7 28 32 49 cf b2 24 b5 03 6c 25 44 61 | 5f 14 38 b4 8c 8b 96 86 e1 f0 a5 91 d4 d0 5a 5e | 69 74 ff 07 eb d6 e6 e0 f9 68 60 18 4f ef eb 6e | cc f6 83 e8 9e d3 de 6a 76 a9 d7 c4 b4 ce fe b3 | c0 da 3b 0d c9 9a 24 1d eb 3d ef 2d be f3 50 3c | b3 ef 06 8b 64 63 01 1c 76 5d 89 fd 06 37 f5 0f | 55 7a 2d 94 e7 0e c9 5f 97 9d 8f b6 e9 ea 31 14 | 98 91 49 0a 81 31 54 ae 2e f0 08 aa c9 29 dd b8 | b6 18 61 4b 30 49 26 8d 3f 14 20 17 a6 fb d4 79 | 48 d7 3c 4e ea 10 dc 13 fe 48 6b bc 45 eb b1 57 | 56 11 1d fc 29 3c 32 c6 89 33 69 b8 d2 f4 03 4f | ba ae bd e1 78 1c 6d 7a 45 cf 9a 58 da 36 da f7 | new IV hash sha2_256 final chunk@0x7fa9dc0030d8 (length 32) | 8c 0d ce 44 1f ce 0f d9 c0 02 3f 3f 40 da c3 d6 | ec 73 ff 5b 7d 41 23 27 79 f0 ee 61 4a 1d 98 a7 | crypto helper 1 finished compute dh+iv (V1 Phase 1) (aggr outR1 DH); request ID 2 time elapsed 0.001962 seconds | crypto helper 1 sending results from work-order 2 for state #1 to event queue | scheduling resume sending helper answer for #1 | libevent_malloc: new ptr-libevent@0x7fa9dc000f48 size 128 | crypto helper 1 waiting (nothing to do) | processing resume sending helper answer for #1 | start processing: state #1 connection "westnets-eastnet/2x0" from 192.1.2.23 (in resume_handler() at server.c:797) | crypto helper 1 replies to request ID 2 | calling continuation function 0x5570e44bdb50 | main_inR2_outI3_cryptotail for #1: calculated DH, sending R1 | **emit ISAKMP Message: | initiator cookie: | 9f 65 42 37 54 9b 07 77 | responder cookie: | c4 88 e3 f7 e7 56 66 9c | next payload type: ISAKMP_NEXT_ID (0x5) | ISAKMP version: ISAKMP Version 1.0 (rfc2407) (0x10) | exchange type: ISAKMP_XCHG_IDPROT (0x2) | flags: ISAKMP_FLAG_v1_ENCRYPTION (0x1) | Message ID: 0 (0x0) | next payload chain: saving message location 'ISAKMP Message'.'next payload type' | next payload chain: ignoring supplied 'ISAKMP Message'.'next payload type' value 5:ISAKMP_NEXT_ID | DH secret MODP2048@0x7fa9e4003a28: transferring ownership from helper IKEv1 DH+IV to state #1 | thinking about whether to send my certificate: | I have RSA key: OAKLEY_RSA_SIG cert.type: 0?? | sendcert: CERT_ALWAYSSEND and I did not get a certificate request | so do not send cert. | I did not send a certificate because I do not have one. | I am not sending a certificate request | I will NOT send an initial contact payload | init checking NAT-T: enabled; RFC 3947 (NAT-Traversal) | NATD hash sha2_256 init | NATD hash sha2_256 digest ICOOKIE/IKE SPIi-bytes@0x5570e4c03b70 (length 8) | 9f 65 42 37 54 9b 07 77 | NATD hash sha2_256 digest RCOOKIE/IKE SPIr-bytes@0x5570e4c03b78 (length 8) | c4 88 e3 f7 e7 56 66 9c | NATD hash sha2_256 digest IP addr-bytes@0x7ffe19a07894 (length 4) | c0 01 02 2d | NATD hash sha2_256 digest PORT-bytes@0x7ffe19a07886 (length 2) | 01 f4 | NATD hash sha2_256 final bytes@0x7ffe19a07930 (length 32) | 8b f2 ab 51 be c1 f7 01 c3 98 d1 b5 80 24 a4 72 | f9 2b 17 57 c5 bd 62 19 14 22 ea e1 2d f0 62 3b | natd_hash: hasher=0x5570e4592ca0(32) | natd_hash: icookie= 9f 65 42 37 54 9b 07 77 | natd_hash: rcookie= c4 88 e3 f7 e7 56 66 9c | natd_hash: ip= c0 01 02 2d | natd_hash: port=500 | natd_hash: hash= 8b f2 ab 51 be c1 f7 01 c3 98 d1 b5 80 24 a4 72 | natd_hash: hash= f9 2b 17 57 c5 bd 62 19 14 22 ea e1 2d f0 62 3b | NATD hash sha2_256 init | NATD hash sha2_256 digest ICOOKIE/IKE SPIi-bytes@0x5570e4c03b70 (length 8) | 9f 65 42 37 54 9b 07 77 | NATD hash sha2_256 digest RCOOKIE/IKE SPIr-bytes@0x5570e4c03b78 (length 8) | c4 88 e3 f7 e7 56 66 9c | NATD hash sha2_256 digest IP addr-bytes@0x7ffe19a07894 (length 4) | c0 01 02 17 | NATD hash sha2_256 digest PORT-bytes@0x7ffe19a07886 (length 2) | 01 f4 | NATD hash sha2_256 final bytes@0x7ffe19a07970 (length 32) | 0e bd c2 5c df 9f a5 6d 13 5f 0b 74 43 32 57 c9 | 31 31 80 9a 4d ce f7 21 6a cd ec 82 f3 0e 16 97 | natd_hash: hasher=0x5570e4592ca0(32) | natd_hash: icookie= 9f 65 42 37 54 9b 07 77 | natd_hash: rcookie= c4 88 e3 f7 e7 56 66 9c | natd_hash: ip= c0 01 02 17 | natd_hash: port=500 | natd_hash: hash= 0e bd c2 5c df 9f a5 6d 13 5f 0b 74 43 32 57 c9 | natd_hash: hash= 31 31 80 9a 4d ce f7 21 6a cd ec 82 f3 0e 16 97 | expected NAT-D(me): 8b f2 ab 51 be c1 f7 01 c3 98 d1 b5 80 24 a4 72 | expected NAT-D(me): f9 2b 17 57 c5 bd 62 19 14 22 ea e1 2d f0 62 3b | expected NAT-D(him): | 0e bd c2 5c df 9f a5 6d 13 5f 0b 74 43 32 57 c9 | 31 31 80 9a 4d ce f7 21 6a cd ec 82 f3 0e 16 97 | received NAT-D: 8b f2 ab 51 be c1 f7 01 c3 98 d1 b5 80 24 a4 72 | received NAT-D: f9 2b 17 57 c5 bd 62 19 14 22 ea e1 2d f0 62 3b | received NAT-D: 0e bd c2 5c df 9f a5 6d 13 5f 0b 74 43 32 57 c9 | received NAT-D: 31 31 80 9a 4d ce f7 21 6a cd ec 82 f3 0e 16 97 | NAT_TRAVERSAL encaps using auto-detect | NAT_TRAVERSAL this end is NOT behind NAT | NAT_TRAVERSAL that end is NOT behind NAT | NAT_TRAVERSAL nat-keepalive enabled 192.1.2.23 | NAT-Traversal: Result using RFC 3947 (NAT-Traversal) sender port 500: no NAT detected | NAT_T_WITH_KA detected | global one-shot timer EVENT_NAT_T_KEEPALIVE scheduled in 20 seconds | ***emit ISAKMP Identification Payload (IPsec DOI): | next payload type: ISAKMP_NEXT_SIG (0x9) | ID type: ID_FQDN (0x2) | Protocol ID: 0 (0x0) | port: 0 (0x0) | next payload chain: ignoring supplied 'ISAKMP Identification Payload (IPsec DOI)'.'next payload type' value 9:ISAKMP_NEXT_SIG | next payload chain: setting previous 'ISAKMP Message'.'next payload type' to current ISAKMP Identification Payload (IPsec DOI) (5:ISAKMP_NEXT_ID) | next payload chain: saving location 'ISAKMP Identification Payload (IPsec DOI)'.'next payload type' in 'reply packet' | emitting 4 raw bytes of my identity into ISAKMP Identification Payload (IPsec DOI) | my identity 77 65 73 74 | emitting length of ISAKMP Identification Payload (IPsec DOI): 12 | hmac PRF sha2_256 init symkey-key@0x5570e4bedc70 (size 32) | hmac: symkey-key@0x5570e4bedc70 (32-bytes, EXTRACT_KEY_FROM_KEY) | key-offset: 0, key-size: 32 | EXTRACT_KEY_FROM_KEY: | target: SHA256_HMAC | flags: SIGN | key_size: 32-bytes | base: base-key@0x5570e4bedc70 (32-bytes, EXTRACT_KEY_FROM_KEY) | operation: FLAGS_ONLY | params: 8-bytes@0x7ffe19a07888 | result: clone-key@0x5570e4c00630 (32-bytes, SHA256_HMAC) | hmac prf: created sha2_256 context 0x7fa9e4002b50 from symkey-key@0x5570e4c00630 | hmac prf: begin sha2_256 with context 0x7fa9e4002b50 from symkey-key@0x5570e4c00630 | hmac: release clone-key@0x5570e4c00630 | hmac PRF sha2_256 crypt-prf@0x5570e4c062d8 | hmac PRF sha2_256 update data-bytes@0x7fa9e4000b48 (length 256) | ca 5e 47 de 60 65 fe 48 3e 8c 29 7a e2 77 fe a0 | c0 b7 2b 5a cb a5 70 8a 19 b3 35 4c e5 9b 2b 85 | f2 a1 79 ca 3b 4a 5d 8a 93 83 2f 58 49 77 74 2d | 5f 5a 1e ad 67 cc de 9d 45 03 11 c8 20 47 eb b7 | df 8e 08 7e b6 d4 c3 f1 fb be fa f5 a3 1f e6 e9 | 77 91 d5 89 3f 1a 8c dc fc 0f 02 35 63 c8 7f 8f | 54 47 06 cb 38 ae 20 b6 72 d3 d2 d4 b1 27 1f a9 | 54 12 16 c6 b2 6b f6 f6 69 ad 92 c7 1a 6b 91 4b | 2e 36 80 0d 0c aa 8e 86 cd 03 aa a7 f6 7c 51 79 | 84 67 85 65 0b 0d 00 3e 2c 7d 5f 96 88 72 9f 18 | a6 dd c9 18 01 04 b4 30 74 35 0d 39 d4 7b 4e b2 | 8d 5f f4 04 0b bd d7 44 be ac 4f d3 18 fd 2d 6f | 46 da 03 d4 79 6c a6 14 93 ac 97 1b 45 9e 99 a6 | ed af e1 92 6d f7 b6 f7 63 0e af 9a 05 f6 c0 32 | f4 56 86 49 cc 4b 9b f6 9a f0 24 cb 04 cc 4e 60 | 56 f6 0c 4a e9 8b 90 0f 00 db 53 b3 2d a5 f8 90 | hmac PRF sha2_256 update data-bytes@0x5570e4c055b8 (length 256) | 8a 0a 00 d1 84 e7 90 f9 c1 e1 b2 56 05 f6 b2 3d | 51 91 b9 72 45 3a ed 5a a4 1d 59 7e 53 ea 88 b6 | 38 55 5b 6f 9d 60 6e 3c fe 50 10 fa b1 64 ff a0 | ac 77 5c 75 e8 b1 2f 02 d5 57 ce ce ca 00 58 f5 | 48 3f 14 f7 28 32 49 cf b2 24 b5 03 6c 25 44 61 | 5f 14 38 b4 8c 8b 96 86 e1 f0 a5 91 d4 d0 5a 5e | 69 74 ff 07 eb d6 e6 e0 f9 68 60 18 4f ef eb 6e | cc f6 83 e8 9e d3 de 6a 76 a9 d7 c4 b4 ce fe b3 | c0 da 3b 0d c9 9a 24 1d eb 3d ef 2d be f3 50 3c | b3 ef 06 8b 64 63 01 1c 76 5d 89 fd 06 37 f5 0f | 55 7a 2d 94 e7 0e c9 5f 97 9d 8f b6 e9 ea 31 14 | 98 91 49 0a 81 31 54 ae 2e f0 08 aa c9 29 dd b8 | b6 18 61 4b 30 49 26 8d 3f 14 20 17 a6 fb d4 79 | 48 d7 3c 4e ea 10 dc 13 fe 48 6b bc 45 eb b1 57 | 56 11 1d fc 29 3c 32 c6 89 33 69 b8 d2 f4 03 4f | ba ae bd e1 78 1c 6d 7a 45 cf 9a 58 da 36 da f7 | hmac PRF sha2_256 update data-bytes@0x5570e4c03b70 (length 8) | 9f 65 42 37 54 9b 07 77 | hmac PRF sha2_256 update data-bytes@0x5570e4c03b78 (length 8) | c4 88 e3 f7 e7 56 66 9c | hashing 640 bytes of SA | hmac PRF sha2_256 update data-bytes@0x5570e4c06a6c (length 640) | 00 00 00 01 00 00 00 01 00 00 02 78 00 01 00 12 | 03 00 00 24 00 01 00 00 80 0b 00 01 80 0c 0e 10 | 80 01 00 07 80 02 00 04 80 03 00 03 80 04 00 0e | 80 0e 01 00 03 00 00 24 01 01 00 00 80 0b 00 01 | 80 0c 0e 10 80 01 00 07 80 02 00 04 80 03 00 03 | 80 04 00 0e 80 0e 00 80 03 00 00 24 02 01 00 00 | 80 0b 00 01 80 0c 0e 10 80 01 00 07 80 02 00 06 | 80 03 00 03 80 04 00 0e 80 0e 01 00 03 00 00 24 | 03 01 00 00 80 0b 00 01 80 0c 0e 10 80 01 00 07 | 80 02 00 06 80 03 00 03 80 04 00 0e 80 0e 00 80 | 03 00 00 24 04 01 00 00 80 0b 00 01 80 0c 0e 10 | 80 01 00 07 80 02 00 02 80 03 00 03 80 04 00 0e | 80 0e 01 00 03 00 00 24 05 01 00 00 80 0b 00 01 | 80 0c 0e 10 80 01 00 07 80 02 00 02 80 03 00 03 | 80 04 00 0e 80 0e 00 80 03 00 00 24 06 01 00 00 | 80 0b 00 01 80 0c 0e 10 80 01 00 07 80 02 00 04 | 80 03 00 03 80 04 00 05 80 0e 01 00 03 00 00 24 | 07 01 00 00 80 0b 00 01 80 0c 0e 10 80 01 00 07 | 80 02 00 04 80 03 00 03 80 04 00 05 80 0e 00 80 | 03 00 00 24 08 01 00 00 80 0b 00 01 80 0c 0e 10 | 80 01 00 07 80 02 00 06 80 03 00 03 80 04 00 05 | 80 0e 01 00 03 00 00 24 09 01 00 00 80 0b 00 01 | 80 0c 0e 10 80 01 00 07 80 02 00 06 80 03 00 03 | 80 04 00 05 80 0e 00 80 03 00 00 24 0a 01 00 00 | 80 0b 00 01 80 0c 0e 10 80 01 00 07 80 02 00 02 | 80 03 00 03 80 04 00 05 80 0e 01 00 03 00 00 24 | 0b 01 00 00 80 0b 00 01 80 0c 0e 10 80 01 00 07 | 80 02 00 02 80 03 00 03 80 04 00 05 80 0e 00 80 | 03 00 00 20 0c 01 00 00 80 0b 00 01 80 0c 0e 10 | 80 01 00 05 80 02 00 04 80 03 00 03 80 04 00 0e | 03 00 00 20 0d 01 00 00 80 0b 00 01 80 0c 0e 10 | 80 01 00 05 80 02 00 06 80 03 00 03 80 04 00 0e | 03 00 00 20 0e 01 00 00 80 0b 00 01 80 0c 0e 10 | 80 01 00 05 80 02 00 02 80 03 00 03 80 04 00 0e | 03 00 00 20 0f 01 00 00 80 0b 00 01 80 0c 0e 10 | 80 01 00 05 80 02 00 04 80 03 00 03 80 04 00 05 | 03 00 00 20 10 01 00 00 80 0b 00 01 80 0c 0e 10 | 80 01 00 05 80 02 00 06 80 03 00 03 80 04 00 05 | 00 00 00 20 11 01 00 00 80 0b 00 01 80 0c 0e 10 | 80 01 00 05 80 02 00 02 80 03 00 03 80 04 00 05 | hmac PRF sha2_256 update data-bytes@0x5570e45bb8e0 (length 8) | 02 00 00 00 77 65 73 74 | hmac PRF sha2_256 final-bytes@0x7ffe19a07ba0 (length 32) | ae cc 5d 43 ba 68 ea 11 37 41 c0 85 fe 3f df 29 | 86 74 41 f7 55 64 a2 83 68 c3 e9 55 cd c6 a7 6a | started looking for secret for @west->@east of kind PKK_RSA | actually looking for secret for @west->@east of kind PKK_RSA | line 1: key type PKK_RSA(@west) to type PKK_RSA | 1: compared key (none) to @west / @east -> 002 | 2: compared key (none) to @west / @east -> 002 | line 1: match=002 | match 002 beats previous best_match 000 match=0x5570e4b5ab58 (line=1) | concluding with best_match=002 best=0x5570e4b5ab58 (lineno=1) | RSA key AQOm9dY/4 found | RSA_sign_hash: Started using NSS | NSS: Authentication to NSS successful | RSA_sign_hash: Ended using NSS | ***emit ISAKMP Signature Payload: | next payload type: ISAKMP_NEXT_NONE (0x0) | next payload chain: setting previous 'ISAKMP Identification Payload (IPsec DOI)'.'next payload type' to current ISAKMP Signature Payload (9:ISAKMP_NEXT_SIG) | next payload chain: saving location 'ISAKMP Signature Payload'.'next payload type' in 'reply packet' | emitting 274 raw bytes of SIG_I into ISAKMP Signature Payload | SIG_I 22 59 9c 56 a9 94 51 13 5f b4 2f 5b 8a a3 b5 31 | SIG_I a1 03 38 82 a3 6a 82 54 20 2a d0 34 c0 ad 0d fd | SIG_I 74 b1 e7 51 a8 b1 5c 7b 93 11 af 05 4d c5 ea b2 | SIG_I 91 21 38 5c c1 64 27 62 c5 5e f9 09 3c ce 96 8e | SIG_I 8b 55 38 b0 e2 30 63 32 64 20 8d 2b 31 22 9e 40 | SIG_I 01 1e 5d ca ab 78 75 fb ac 41 4e 26 56 2a cb 01 | SIG_I 95 0a 20 5b 9f 44 f7 87 65 5e 56 4e 1d 9b bc c0 | SIG_I 89 34 63 66 22 94 09 49 0b bb 90 b3 84 1c ca 83 | SIG_I b7 17 58 bc 0f c0 13 a6 3d 68 c6 e1 f0 09 4f b9 | SIG_I e8 05 39 cf f9 78 ae ac 3f 68 1e b6 55 ef 6a 01 | SIG_I 53 b9 2a 73 65 33 8e ab a7 68 ac 7d be 46 52 f0 | SIG_I e7 c1 95 6f 1a 95 bf 0a 01 7f 52 ee ce e4 ec 74 | SIG_I af d5 05 27 69 35 aa da 99 44 c0 73 69 e4 a2 fe | SIG_I d0 b0 36 84 a9 a8 d3 fd 3d 8e d7 57 c8 9e d0 5b | SIG_I 20 c3 9b b8 6b 46 37 b8 6e fa a3 14 f5 22 57 bd | SIG_I b7 81 3a 63 d3 e6 1c 84 be 90 a0 a4 b6 3c 87 36 | SIG_I c9 1e bc 9e ff a2 17 6c c7 b6 5f 80 7b 10 24 03 | SIG_I 51 90 | emitting length of ISAKMP Signature Payload: 278 | Not sending INITIAL_CONTACT | encrypting: 09 00 00 0c 02 00 00 00 77 65 73 74 00 00 01 16 | encrypting: 22 59 9c 56 a9 94 51 13 5f b4 2f 5b 8a a3 b5 31 | encrypting: a1 03 38 82 a3 6a 82 54 20 2a d0 34 c0 ad 0d fd | encrypting: 74 b1 e7 51 a8 b1 5c 7b 93 11 af 05 4d c5 ea b2 | encrypting: 91 21 38 5c c1 64 27 62 c5 5e f9 09 3c ce 96 8e | encrypting: 8b 55 38 b0 e2 30 63 32 64 20 8d 2b 31 22 9e 40 | encrypting: 01 1e 5d ca ab 78 75 fb ac 41 4e 26 56 2a cb 01 | encrypting: 95 0a 20 5b 9f 44 f7 87 65 5e 56 4e 1d 9b bc c0 | encrypting: 89 34 63 66 22 94 09 49 0b bb 90 b3 84 1c ca 83 | encrypting: b7 17 58 bc 0f c0 13 a6 3d 68 c6 e1 f0 09 4f b9 | encrypting: e8 05 39 cf f9 78 ae ac 3f 68 1e b6 55 ef 6a 01 | encrypting: 53 b9 2a 73 65 33 8e ab a7 68 ac 7d be 46 52 f0 | encrypting: e7 c1 95 6f 1a 95 bf 0a 01 7f 52 ee ce e4 ec 74 | encrypting: af d5 05 27 69 35 aa da 99 44 c0 73 69 e4 a2 fe | encrypting: d0 b0 36 84 a9 a8 d3 fd 3d 8e d7 57 c8 9e d0 5b | encrypting: 20 c3 9b b8 6b 46 37 b8 6e fa a3 14 f5 22 57 bd | encrypting: b7 81 3a 63 d3 e6 1c 84 be 90 a0 a4 b6 3c 87 36 | encrypting: c9 1e bc 9e ff a2 17 6c c7 b6 5f 80 7b 10 24 03 | encrypting: 51 90 | IV: 8c 0d ce 44 1f ce 0f d9 c0 02 3f 3f 40 da c3 d6 | IV: ec 73 ff 5b 7d 41 23 27 79 f0 ee 61 4a 1d 98 a7 | unpadded size is: 290 | emitting 14 zero bytes of encryption padding into ISAKMP Message | encrypting 304 using AES_CBC | no IKEv1 message padding required | emitting length of ISAKMP Message: 332 | NSS ike_alg_nss_cbc: aes - enter | NSS ike_alg_nss_cbc: aes - exit | next IV: 59 cb 49 99 9e b0 1e 4c 2d bc 48 75 a1 af 73 c1 | complete v1 state transition with STF_OK | [RE]START processing: state #1 connection "westnets-eastnet/2x0" from 192.1.2.23 (in complete_v1_state_transition() at ikev1.c:2673) | #1 is idle | doing_xauth:no, t_xauth_client_done:no | IKEv1: transition from state STATE_MAIN_I2 to state STATE_MAIN_I3 | parent state #1: MAIN_I2(open IKE SA) => MAIN_I3(open IKE SA) | event_already_set, deleting event | state #1 requesting EVENT_CRYPTO_TIMEOUT to be deleted | libevent_free: release ptr-libevent@0x7fa9e4002888 | free_event_entry: release EVENT_CRYPTO_TIMEOUT-pe@0x5570e4c02368 | sending reply packet to 192.1.2.23:500 (from 192.1.2.45:500) | sending 332 bytes for STATE_MAIN_I2 through eth1 from 192.1.2.45:500 to 192.1.2.23:500 (using #1) | 9f 65 42 37 54 9b 07 77 c4 88 e3 f7 e7 56 66 9c | 05 10 02 01 00 00 00 00 00 00 01 4c 1c f1 f4 70 | 78 66 75 ee b8 91 88 2a 5b 05 21 81 6f 1c 91 5e | e3 b5 6d 30 47 39 d7 0b 5b 5f 3f 87 0c ce 83 5f | bc 60 26 b2 fb f5 f7 eb 6c 0d b2 11 84 62 05 55 | 59 a2 40 18 d9 eb ce 89 04 7b 76 a0 db b2 3d 46 | 6c ff 2f ad 96 3d e8 dd 5b 76 82 89 59 bb 71 f1 | 96 6f 06 a4 17 54 3c bb 0c 62 10 1e 2c 04 16 5c | f8 f1 73 26 53 42 fe 34 69 e9 46 94 11 b2 10 be | c7 c1 c9 41 df 52 c5 64 b8 5b 44 a4 0b be 35 ef | c9 2f 12 c6 c6 10 ab e0 fb 62 bc 30 d9 fd 7d cf | 74 d2 22 0a d9 1b 5e 90 08 7a 6d ae f4 81 b6 1b | a2 d6 f8 d1 4a 6b a9 bd 55 81 3a 9d 48 fe ee 59 | 9d ab 90 b6 cd d7 09 cb f7 40 b8 34 74 76 d2 b3 | 6f 88 dc 74 20 51 7c c0 74 23 b4 39 9b 79 f6 b9 | fc 37 5e 03 c7 56 9f 9f 65 6f 49 fd 71 6e 31 fa | 63 98 4f d6 f0 0c 1f 57 79 dc a9 7c e5 f4 98 38 | ec 00 27 69 cc a5 ed 8a 29 a6 41 8c 69 fa 56 7a | 62 b4 6e e7 e3 1d 78 12 aa a4 4c b4 67 e2 e6 49 | 22 e3 e8 f5 77 d4 26 47 48 07 5d 28 59 cb 49 99 | 9e b0 1e 4c 2d bc 48 75 a1 af 73 c1 | !event_already_set at reschedule "westnets-eastnet/2x0" #1: IMPAIR: suppressing retransmits; scheduling timeout in 60 seconds | event_schedule: new EVENT_RETRANSMIT-pe@0x5570e4c02368 | inserting event EVENT_RETRANSMIT, timeout in 60 seconds for #1 | libevent_malloc: new ptr-libevent@0x5570e4c026e8 size 128 | #1 STATE_MAIN_I3: retransmits: first event in 60 seconds; timeout in 60 seconds; limit of 12 retransmits; current time is 11343.435064 "westnets-eastnet/2x0" #1: STATE_MAIN_I3: sent MI3, expecting MR3 | modecfg pull: noquirk policy:push not-client | phase 1 is done, looking for phase 2 to unpend | resume sending helper answer for #1 suppresed complete_v1_state_transition() | stop processing: state #1 connection "westnets-eastnet/2x0" from 192.1.2.23 (in resume_handler() at server.c:833) | libevent_free: release ptr-libevent@0x7fa9dc000f48 | *received 332 bytes from 192.1.2.23:500 on eth1 (192.1.2.45:500) | 9f 65 42 37 54 9b 07 77 c4 88 e3 f7 e7 56 66 9c | 05 10 02 01 00 00 00 00 00 00 01 4c 25 6b e1 4e | 3d c4 4d 61 3e ef 5a c2 b3 45 78 07 dc b6 69 b6 | 6c c7 bd 80 83 c2 7d 58 9d 16 45 f2 1e cb 17 b2 | c2 a8 d8 72 71 3b 04 24 a9 83 3e 63 9a a6 2d c7 | 0e 5c 20 0f 1d b7 34 73 41 60 fc 38 8b 61 d0 21 | 7a e1 dc c5 11 34 9f 3e 9f 34 d0 60 8f ea 20 45 | 2f 39 27 be 3d f9 e3 9e 6b 09 19 8e 5c 19 8b d8 | 3f cb 16 76 b8 1d 65 a8 a1 7a 93 66 e1 75 86 fe | f6 f0 aa bb 29 2b 08 61 9a 09 69 36 d9 fc 00 f5 | 27 c2 2b 87 72 79 fb d2 9b 1c c2 36 50 40 a9 d8 | f3 3c d3 f5 d8 ee 3b 00 f1 a3 a7 a3 85 a1 59 11 | 8a 37 1e ad 89 c8 ab 91 7f 92 de 9a 1d 69 b6 3d | 93 03 96 40 93 64 d4 80 1e 1c 0a 67 66 b3 ea cc | e7 83 f6 18 09 83 a1 1a eb 90 c9 cf 9a bd dc db | ab 75 96 fa 07 00 2e b7 70 1a 27 95 33 9e 55 c9 | 20 e6 38 4d f4 87 44 24 dc 2f 67 21 7d de f3 32 | a7 57 c3 e3 37 8b 60 aa 01 62 f7 4d 77 1b d4 cc | 0f 13 57 dc bb fd 34 cd fb a5 62 8d 8b 1c ba b9 | 17 e5 58 31 0d e5 b3 3f 98 2e 85 56 c4 de d8 a6 | 42 0d c2 6b 1d b3 07 ce d1 0b 22 13 | start processing: from 192.1.2.23:500 (in process_md() at demux.c:378) | **parse ISAKMP Message: | initiator cookie: | 9f 65 42 37 54 9b 07 77 | responder cookie: | c4 88 e3 f7 e7 56 66 9c | next payload type: ISAKMP_NEXT_ID (0x5) | ISAKMP version: ISAKMP Version 1.0 (rfc2407) (0x10) | exchange type: ISAKMP_XCHG_IDPROT (0x2) | flags: ISAKMP_FLAG_v1_ENCRYPTION (0x1) | Message ID: 0 (0x0) | length: 332 (0x14c) | processing version=1.0 packet with exchange type=ISAKMP_XCHG_IDPROT (2) | State DB: found IKEv1 state #1 in MAIN_I3 (find_state_ikev1) | start processing: state #1 connection "westnets-eastnet/2x0" from 192.1.2.23 (in process_v1_packet() at ikev1.c:1459) | #1 is idle | #1 idle | received encrypted packet from 192.1.2.23:500 | decrypting 304 bytes using algorithm AES_CBC | IV before: 59 cb 49 99 9e b0 1e 4c 2d bc 48 75 a1 af 73 c1 | NSS ike_alg_nss_cbc: aes - enter | NSS ike_alg_nss_cbc: aes - exit | IV after: c4 de d8 a6 42 0d c2 6b 1d b3 07 ce d1 0b 22 13 | decrypted payload (starts at offset -304): | 9f 65 42 37 54 9b 07 77 c4 88 e3 f7 e7 56 66 9c | 05 10 02 01 00 00 00 00 00 00 01 4c 09 00 00 0c | 02 00 00 00 65 61 73 74 00 00 01 16 6c 56 e4 d9 | 02 22 75 16 af 58 52 e4 bc a9 08 b0 02 54 f7 80 | 4f 9f 6a 57 90 0f 19 67 bf 40 1a db b6 8a 57 5b | 31 25 c4 07 28 2f 07 fc c5 7f d2 e7 0d d1 2f 01 | a3 f7 aa 4c 8b 59 da b4 eb b2 20 ee d3 52 30 15 | 46 07 36 33 10 2d 55 17 b2 4e 8a d5 e2 7a 22 22 | ba c4 ec cc 2c 83 99 34 e1 e8 85 e9 01 2b 34 20 | ac b4 7e 5b 2c 9e 19 8d b5 c3 45 e0 87 5c 02 ee | 15 22 11 f6 d2 9c 95 0c 05 36 85 ae 56 f4 ea 19 | b6 e7 49 43 13 56 37 b0 a8 fa 20 bd dd ab 28 56 | 89 51 ab 40 4d a2 42 51 d7 77 98 d9 27 d9 68 df | 84 41 4d fa de 50 e7 fc 97 d0 49 29 0a d4 02 d7 | f6 c7 2c 87 4a c0 16 3e 0b db a7 27 e2 c3 b4 84 | 94 c5 f2 41 14 a6 24 d4 cd 59 5e 5d 4d eb 1a cd | ac 10 70 af ef 63 39 38 8d 5b c9 26 14 df 02 26 | 1a e0 12 97 c6 f6 95 b1 c1 8a e3 38 b7 1f 59 ed | 46 78 62 3c c6 c1 71 16 c9 b9 bd ca 76 40 4f 6e | ed 31 53 5d 7a ac 02 9d d8 5f a8 9d 7e d5 00 00 | 00 00 00 00 00 00 00 00 00 00 00 00 | got payload 0x20 (ISAKMP_NEXT_ID) needed: 0x220 opt: 0x20c0 | ***parse ISAKMP Identification Payload: | next payload type: ISAKMP_NEXT_SIG (0x9) | length: 12 (0xc) | ID type: ID_FQDN (0x2) | DOI specific A: 0 (0x0) | DOI specific B: 0 (0x0) | obj: 65 61 73 74 | got payload 0x200 (ISAKMP_NEXT_SIG) needed: 0x200 opt: 0x20c0 | ***parse ISAKMP Signature Payload: | next payload type: ISAKMP_NEXT_NONE (0x0) | length: 278 (0x116) | removing 14 bytes of padding | message 'main_inR3' HASH payload not checked early "westnets-eastnet/2x0" #1: Peer ID is ID_FQDN: '@east' | X509: no CERT payloads to process | hmac PRF sha2_256 init symkey-key@0x5570e4bedc70 (size 32) | hmac: symkey-key@0x5570e4bedc70 (32-bytes, EXTRACT_KEY_FROM_KEY) | key-offset: 0, key-size: 32 | EXTRACT_KEY_FROM_KEY: | target: SHA256_HMAC | flags: SIGN | key_size: 32-bytes | base: base-key@0x5570e4bedc70 (32-bytes, EXTRACT_KEY_FROM_KEY) | operation: FLAGS_ONLY | params: 8-bytes@0x7ffe19a08138 | result: clone-key@0x5570e4c00630 (32-bytes, SHA256_HMAC) | hmac prf: created sha2_256 context 0x7fa9e4002b50 from symkey-key@0x5570e4c00630 | hmac prf: begin sha2_256 with context 0x7fa9e4002b50 from symkey-key@0x5570e4c00630 | hmac: release clone-key@0x5570e4c00630 | hmac PRF sha2_256 crypt-prf@0x7fa9dc0030d8 | hmac PRF sha2_256 update data-bytes@0x5570e4c055b8 (length 256) | 8a 0a 00 d1 84 e7 90 f9 c1 e1 b2 56 05 f6 b2 3d | 51 91 b9 72 45 3a ed 5a a4 1d 59 7e 53 ea 88 b6 | 38 55 5b 6f 9d 60 6e 3c fe 50 10 fa b1 64 ff a0 | ac 77 5c 75 e8 b1 2f 02 d5 57 ce ce ca 00 58 f5 | 48 3f 14 f7 28 32 49 cf b2 24 b5 03 6c 25 44 61 | 5f 14 38 b4 8c 8b 96 86 e1 f0 a5 91 d4 d0 5a 5e | 69 74 ff 07 eb d6 e6 e0 f9 68 60 18 4f ef eb 6e | cc f6 83 e8 9e d3 de 6a 76 a9 d7 c4 b4 ce fe b3 | c0 da 3b 0d c9 9a 24 1d eb 3d ef 2d be f3 50 3c | b3 ef 06 8b 64 63 01 1c 76 5d 89 fd 06 37 f5 0f | 55 7a 2d 94 e7 0e c9 5f 97 9d 8f b6 e9 ea 31 14 | 98 91 49 0a 81 31 54 ae 2e f0 08 aa c9 29 dd b8 | b6 18 61 4b 30 49 26 8d 3f 14 20 17 a6 fb d4 79 | 48 d7 3c 4e ea 10 dc 13 fe 48 6b bc 45 eb b1 57 | 56 11 1d fc 29 3c 32 c6 89 33 69 b8 d2 f4 03 4f | ba ae bd e1 78 1c 6d 7a 45 cf 9a 58 da 36 da f7 | hmac PRF sha2_256 update data-bytes@0x7fa9e4000b48 (length 256) | ca 5e 47 de 60 65 fe 48 3e 8c 29 7a e2 77 fe a0 | c0 b7 2b 5a cb a5 70 8a 19 b3 35 4c e5 9b 2b 85 | f2 a1 79 ca 3b 4a 5d 8a 93 83 2f 58 49 77 74 2d | 5f 5a 1e ad 67 cc de 9d 45 03 11 c8 20 47 eb b7 | df 8e 08 7e b6 d4 c3 f1 fb be fa f5 a3 1f e6 e9 | 77 91 d5 89 3f 1a 8c dc fc 0f 02 35 63 c8 7f 8f | 54 47 06 cb 38 ae 20 b6 72 d3 d2 d4 b1 27 1f a9 | 54 12 16 c6 b2 6b f6 f6 69 ad 92 c7 1a 6b 91 4b | 2e 36 80 0d 0c aa 8e 86 cd 03 aa a7 f6 7c 51 79 | 84 67 85 65 0b 0d 00 3e 2c 7d 5f 96 88 72 9f 18 | a6 dd c9 18 01 04 b4 30 74 35 0d 39 d4 7b 4e b2 | 8d 5f f4 04 0b bd d7 44 be ac 4f d3 18 fd 2d 6f | 46 da 03 d4 79 6c a6 14 93 ac 97 1b 45 9e 99 a6 | ed af e1 92 6d f7 b6 f7 63 0e af 9a 05 f6 c0 32 | f4 56 86 49 cc 4b 9b f6 9a f0 24 cb 04 cc 4e 60 | 56 f6 0c 4a e9 8b 90 0f 00 db 53 b3 2d a5 f8 90 | hmac PRF sha2_256 update data-bytes@0x5570e4c03b78 (length 8) | c4 88 e3 f7 e7 56 66 9c | hmac PRF sha2_256 update data-bytes@0x5570e4c03b70 (length 8) | 9f 65 42 37 54 9b 07 77 | hashing 640 bytes of SA | hmac PRF sha2_256 update data-bytes@0x5570e4c06a6c (length 640) | 00 00 00 01 00 00 00 01 00 00 02 78 00 01 00 12 | 03 00 00 24 00 01 00 00 80 0b 00 01 80 0c 0e 10 | 80 01 00 07 80 02 00 04 80 03 00 03 80 04 00 0e | 80 0e 01 00 03 00 00 24 01 01 00 00 80 0b 00 01 | 80 0c 0e 10 80 01 00 07 80 02 00 04 80 03 00 03 | 80 04 00 0e 80 0e 00 80 03 00 00 24 02 01 00 00 | 80 0b 00 01 80 0c 0e 10 80 01 00 07 80 02 00 06 | 80 03 00 03 80 04 00 0e 80 0e 01 00 03 00 00 24 | 03 01 00 00 80 0b 00 01 80 0c 0e 10 80 01 00 07 | 80 02 00 06 80 03 00 03 80 04 00 0e 80 0e 00 80 | 03 00 00 24 04 01 00 00 80 0b 00 01 80 0c 0e 10 | 80 01 00 07 80 02 00 02 80 03 00 03 80 04 00 0e | 80 0e 01 00 03 00 00 24 05 01 00 00 80 0b 00 01 | 80 0c 0e 10 80 01 00 07 80 02 00 02 80 03 00 03 | 80 04 00 0e 80 0e 00 80 03 00 00 24 06 01 00 00 | 80 0b 00 01 80 0c 0e 10 80 01 00 07 80 02 00 04 | 80 03 00 03 80 04 00 05 80 0e 01 00 03 00 00 24 | 07 01 00 00 80 0b 00 01 80 0c 0e 10 80 01 00 07 | 80 02 00 04 80 03 00 03 80 04 00 05 80 0e 00 80 | 03 00 00 24 08 01 00 00 80 0b 00 01 80 0c 0e 10 | 80 01 00 07 80 02 00 06 80 03 00 03 80 04 00 05 | 80 0e 01 00 03 00 00 24 09 01 00 00 80 0b 00 01 | 80 0c 0e 10 80 01 00 07 80 02 00 06 80 03 00 03 | 80 04 00 05 80 0e 00 80 03 00 00 24 0a 01 00 00 | 80 0b 00 01 80 0c 0e 10 80 01 00 07 80 02 00 02 | 80 03 00 03 80 04 00 05 80 0e 01 00 03 00 00 24 | 0b 01 00 00 80 0b 00 01 80 0c 0e 10 80 01 00 07 | 80 02 00 02 80 03 00 03 80 04 00 05 80 0e 00 80 | 03 00 00 20 0c 01 00 00 80 0b 00 01 80 0c 0e 10 | 80 01 00 05 80 02 00 04 80 03 00 03 80 04 00 0e | 03 00 00 20 0d 01 00 00 80 0b 00 01 80 0c 0e 10 | 80 01 00 05 80 02 00 06 80 03 00 03 80 04 00 0e | 03 00 00 20 0e 01 00 00 80 0b 00 01 80 0c 0e 10 | 80 01 00 05 80 02 00 02 80 03 00 03 80 04 00 0e | 03 00 00 20 0f 01 00 00 80 0b 00 01 80 0c 0e 10 | 80 01 00 05 80 02 00 04 80 03 00 03 80 04 00 05 | 03 00 00 20 10 01 00 00 80 0b 00 01 80 0c 0e 10 | 80 01 00 05 80 02 00 06 80 03 00 03 80 04 00 05 | 00 00 00 20 11 01 00 00 80 0b 00 01 80 0c 0e 10 | 80 01 00 05 80 02 00 02 80 03 00 03 80 04 00 05 | hmac PRF sha2_256 update data-bytes@0x5570e4c0c048 (length 8) | 02 00 00 00 65 61 73 74 | hmac PRF sha2_256 final-bytes@0x7ffe19a082c0 (length 32) | 18 f1 48 9a 7b 05 4e e2 89 77 61 8f 33 4e cb 47 | 8c 5e ac a6 fe 82 95 e0 db 15 44 75 92 48 e4 ef | required RSA CA is '%any' | checking RSA keyid '@east' for match with '@east' | key issuer CA is '%any' | NSS RSA verify: decrypted sig: siBuffer: 18 f1 48 9a 7b 05 4e e2 89 77 61 8f 33 4e cb 47 8c 5e ac a6 fe 82 95 e0 db 15 44 75 92 48 e4 ef | NSS RSA verify: hash value: | 18 f1 48 9a 7b 05 4e e2 89 77 61 8f 33 4e cb 47 | 8c 5e ac a6 fe 82 95 e0 db 15 44 75 92 48 e4 ef | RSA Signature verified | an RSA Sig check passed with *AQO9bJbr3 [preloaded key] "westnets-eastnet/2x0" #1: Authenticated using RSA | authentication succeeded | FOR_EACH_CONNECTION_... in ISAKMP_SA_established | complete v1 state transition with STF_OK | [RE]START processing: state #1 connection "westnets-eastnet/2x0" from 192.1.2.23 (in complete_v1_state_transition() at ikev1.c:2673) | #1 is idle | doing_xauth:no, t_xauth_client_done:no | IKEv1: transition from state STATE_MAIN_I3 to state STATE_MAIN_I4 | parent state #1: MAIN_I3(open IKE SA) => MAIN_I4(established IKE SA) | event_already_set, deleting event | state #1 requesting EVENT_RETRANSMIT to be deleted | #1 STATE_MAIN_I4: retransmits: cleared | libevent_free: release ptr-libevent@0x5570e4c026e8 | free_event_entry: release EVENT_RETRANSMIT-pe@0x5570e4c02368 | !event_already_set at reschedule | event_schedule: new EVENT_SA_REPLACE-pe@0x5570e4c02368 | inserting event EVENT_SA_REPLACE, timeout in 2607 seconds for #1 | libevent_malloc: new ptr-libevent@0x7fa9dc000f48 size 128 | pstats #1 ikev1.isakmp established "westnets-eastnet/2x0" #1: STATE_MAIN_I4: ISAKMP SA established {auth=RSA_SIG cipher=AES_CBC_256 integ=HMAC_SHA2_256 group=MODP2048} | DPD: dpd_init() called on ISAKMP SA | DPD: Peer supports Dead Peer Detection | DPD: not initializing DPD because DPD is disabled locally | modecfg pull: noquirk policy:push not-client | phase 1 is done, looking for phase 2 to unpend | unpending state #1 | creating state object #2 at 0x5570e4c040c8 | State DB: adding IKEv1 state #2 in UNDEFINED | pstats #2 ikev1.ipsec started | duplicating state object #1 "westnets-eastnet/2x0" as #2 for IPSEC SA | #2 setting local endpoint to 192.1.2.45:500 from #1.st_localport (in duplicate_state() at state.c:1484) | duplicate_state: reference st_skeyid_nss-key@0x5570e4bedc70 | duplicate_state: reference st_skey_d_nss-key@0x5570e4bec1c0 | duplicate_state: reference st_skey_ai_nss-key@0x5570e4be4dc0 | duplicate_state: reference st_skey_ar_nss-key@NULL | duplicate_state: reference st_skey_ei_nss-key@0x5570e4befab0 | duplicate_state: reference st_skey_er_nss-key@NULL | duplicate_state: reference st_skey_pi_nss-key@NULL | duplicate_state: reference st_skey_pr_nss-key@NULL | duplicate_state: reference st_enc_key_nss-key@0x5570e4be6640 | duplicate_state: reference st_sk_d_no_ppk-key@NULL | duplicate_state: reference st_sk_pi_no_ppk-key@NULL | duplicate_state: reference st_sk_pr_no_ppk-key@NULL | in connection_discard for connection westnets-eastnet/2x0 | suspend processing: state #1 connection "westnets-eastnet/2x0" from 192.1.2.23 (in quick_outI1() at ikev1_quick.c:685) | start processing: state #2 connection "westnets-eastnet/1x0" from 192.1.2.23 (in quick_outI1() at ikev1_quick.c:685) | child state #2: UNDEFINED(ignore) => QUICK_I1(established CHILD SA) "westnets-eastnet/1x0" #2: initiating Quick Mode RSASIG+ENCRYPT+TUNNEL+PFS+UP+IKEV1_ALLOW+SAREF_TRACK+IKE_FRAG_ALLOW+ESN_NO {using isakmp#1 msgid:904e7608 proposal=defaults pfsgroup=MODP2048} | adding quick_outI1 KE work-order 3 for state #2 | event_schedule: new EVENT_CRYPTO_TIMEOUT-pe@0x7fa9e4002b78 | inserting event EVENT_CRYPTO_TIMEOUT, timeout in 60 seconds for #2 | libevent_malloc: new ptr-libevent@0x5570e4c02488 size 128 | stop processing: state #2 connection "westnets-eastnet/1x0" from 192.1.2.23 (in quick_outI1() at ikev1_quick.c:764) | resume processing: state #1 connection "westnets-eastnet/2x0" from 192.1.2.23 (in quick_outI1() at ikev1_quick.c:764) | crypto helper 2 resuming | crypto helper 2 starting work-order 3 for state #2 | unqueuing pending Quick Mode with 192.1.2.23 "westnets-eastnet/1x0" | crypto helper 2 doing build KE and nonce (quick_outI1 KE); request ID 3 | removing pending policy for no connection {0x5570e4b5a898} | creating state object #3 at 0x5570e4c0f458 | State DB: adding IKEv1 state #3 in UNDEFINED | pstats #3 ikev1.ipsec started | duplicating state object #1 "westnets-eastnet/2x0" as #3 for IPSEC SA | NSS: Value of Prime: | ff ff ff ff ff ff ff ff c9 0f da a2 21 68 c2 34 | c4 c6 62 8b 80 dc 1c d1 29 02 4e 08 8a 67 cc 74 | 02 0b be a6 3b 13 9b 22 51 4a 08 79 8e 34 04 dd | ef 95 19 b3 cd 3a 43 1b 30 2b 0a 6d f2 5f 14 37 | 4f e1 35 6d 6d 51 c2 45 e4 85 b5 76 62 5e 7e c6 | f4 4c 42 e9 a6 37 ed 6b 0b ff 5c b6 f4 06 b7 ed | ee 38 6b fb 5a 89 9f a5 ae 9f 24 11 7c 4b 1f e6 | 49 28 66 51 ec e4 5b 3d c2 00 7c b8 a1 63 bf 05 | 98 da 48 36 1c 55 d3 9a 69 16 3f a8 fd 24 cf 5f | 83 65 5d 23 dc a3 ad 96 1c 62 f3 56 20 85 52 bb | 9e d5 29 07 70 96 96 6d 67 0c 35 4e 4a bc 98 04 | f1 74 6c 08 ca 18 21 7c 32 90 5e 46 2e 36 ce 3b | e3 9e 77 2c 18 0e 86 03 9b 27 83 a2 ec 07 a2 8f | b5 c5 5d f0 6f 4c 52 c9 de 2b cb f6 95 58 17 18 | 39 95 49 7c ea 95 6a e5 15 d2 26 18 98 fa 05 10 | 15 72 8e 5a 8a ac aa 68 ff ff ff ff ff ff ff ff | NSS: Value of base: 02 | DH secret MODP2048@0x7fa9e0004cb8: created | NSS: Local DH MODP2048 secret (pointer): 0x7fa9e0004cb8 | NSS: Public DH wire value: | 18 ff 23 22 32 04 45 8c 2f 9d 0e 79 20 e9 f1 75 | 30 e4 eb 0f de 8e 67 7f 4e d9 6f 52 17 e8 bf 9f | 56 98 d5 2d ae 75 4b c5 6d ec ab af de e3 bb 90 | 0a 2e 24 c7 24 24 43 26 ee 87 fa f3 81 aa 3b 7a | 85 72 e8 f0 c6 c5 51 4f 86 4c d0 29 93 b5 3b c6 | c0 82 44 82 75 ab 71 2b 99 dc db a4 8f fe 9d cd | 9e 49 82 f0 d7 0d 87 16 f2 79 96 6d 87 a8 e4 8a | 1c b5 6f 4e 59 e7 c0 f5 96 07 3a ef d0 e3 4e e3 | d9 d0 e2 5f 1b 98 e7 fa 9c 89 bc 49 a0 a0 77 f4 | 66 61 1d c1 b3 15 a3 35 67 11 52 95 5a 09 08 f4 | ac 28 74 55 95 63 62 0f a3 b7 3f 7c 94 32 77 2d | c5 fb c4 ab 75 4c 63 bb e1 e2 7c 61 a9 6f 5f 80 | 72 31 93 19 01 b9 44 e6 c0 89 1c d5 a5 6f 8b be | 8e af b6 fd f4 c8 fa 9c 14 21 e6 8b f2 45 85 51 | 94 2c 4c de 39 e8 b8 9e 43 58 ae 4d 2c 12 15 70 | f8 9e ca 1d 22 2d 38 73 1d 2d 59 a7 22 94 ed de | Generated nonce: ef 7a 81 6f fe 0f c0 3b dc 16 f5 a9 c5 42 87 88 | Generated nonce: 69 94 30 65 c2 10 1c c7 ad ce 59 9f 9e c7 ff 2a | crypto helper 2 finished build KE and nonce (quick_outI1 KE); request ID 3 time elapsed 0.000926 seconds | crypto helper 2 sending results from work-order 3 for state #2 to event queue | scheduling resume sending helper answer for #2 | libevent_malloc: new ptr-libevent@0x7fa9e0003f28 size 128 | libevent_realloc: release ptr-libevent@0x5570e4be3308 | libevent_realloc: new ptr-libevent@0x7fa9e0003e78 size 128 | crypto helper 2 waiting (nothing to do) | #3 setting local endpoint to 192.1.2.45:500 from #1.st_localport (in duplicate_state() at state.c:1484) | duplicate_state: reference st_skeyid_nss-key@0x5570e4bedc70 | duplicate_state: reference st_skey_d_nss-key@0x5570e4bec1c0 | duplicate_state: reference st_skey_ai_nss-key@0x5570e4be4dc0 | duplicate_state: reference st_skey_ar_nss-key@NULL | duplicate_state: reference st_skey_ei_nss-key@0x5570e4befab0 | duplicate_state: reference st_skey_er_nss-key@NULL | duplicate_state: reference st_skey_pi_nss-key@NULL | duplicate_state: reference st_skey_pr_nss-key@NULL | duplicate_state: reference st_enc_key_nss-key@0x5570e4be6640 | duplicate_state: reference st_sk_d_no_ppk-key@NULL | duplicate_state: reference st_sk_pi_no_ppk-key@NULL | duplicate_state: reference st_sk_pr_no_ppk-key@NULL | suspend processing: state #1 connection "westnets-eastnet/2x0" from 192.1.2.23 (in quick_outI1() at ikev1_quick.c:685) | start processing: state #3 connection "westnets-eastnet/2x0" from 192.1.2.23 (in quick_outI1() at ikev1_quick.c:685) | child state #3: UNDEFINED(ignore) => QUICK_I1(established CHILD SA) "westnets-eastnet/2x0" #3: initiating Quick Mode RSASIG+ENCRYPT+TUNNEL+PFS+UP+IKEV1_ALLOW+SAREF_TRACK+IKE_FRAG_ALLOW+ESN_NO {using isakmp#1 msgid:757ce58f proposal=defaults pfsgroup=MODP2048} | adding quick_outI1 KE work-order 4 for state #3 | event_schedule: new EVENT_CRYPTO_TIMEOUT-pe@0x5570e4c064d8 | inserting event EVENT_CRYPTO_TIMEOUT, timeout in 60 seconds for #3 | libevent_malloc: new ptr-libevent@0x5570e4c023d8 size 128 | stop processing: state #3 connection "westnets-eastnet/2x0" from 192.1.2.23 (in quick_outI1() at ikev1_quick.c:764) | crypto helper 3 resuming | crypto helper 3 starting work-order 4 for state #3 | resume processing: state #1 connection "westnets-eastnet/2x0" from 192.1.2.23 (in quick_outI1() at ikev1_quick.c:764) | crypto helper 3 doing build KE and nonce (quick_outI1 KE); request ID 4 | unqueuing pending Quick Mode with 192.1.2.23 "westnets-eastnet/2x0" | removing pending policy for no connection {0x5570e4c00f58} | close_any(fd@26) (in release_whack() at state.c:654) | stop processing: from 192.1.2.23:500 (BACKGROUND) (in process_md() at demux.c:380) | stop processing: state #1 connection "westnets-eastnet/2x0" from 192.1.2.23 (in process_md() at demux.c:382) | processing: STOP connection NULL (in process_md() at demux.c:383) | NSS: Value of Prime: | ff ff ff ff ff ff ff ff c9 0f da a2 21 68 c2 34 | c4 c6 62 8b 80 dc 1c d1 29 02 4e 08 8a 67 cc 74 | 02 0b be a6 3b 13 9b 22 51 4a 08 79 8e 34 04 dd | ef 95 19 b3 cd 3a 43 1b 30 2b 0a 6d f2 5f 14 37 | 4f e1 35 6d 6d 51 c2 45 e4 85 b5 76 62 5e 7e c6 | f4 4c 42 e9 a6 37 ed 6b 0b ff 5c b6 f4 06 b7 ed | ee 38 6b fb 5a 89 9f a5 ae 9f 24 11 7c 4b 1f e6 | 49 28 66 51 ec e4 5b 3d c2 00 7c b8 a1 63 bf 05 | 98 da 48 36 1c 55 d3 9a 69 16 3f a8 fd 24 cf 5f | 83 65 5d 23 dc a3 ad 96 1c 62 f3 56 20 85 52 bb | 9e d5 29 07 70 96 96 6d 67 0c 35 4e 4a bc 98 04 | f1 74 6c 08 ca 18 21 7c 32 90 5e 46 2e 36 ce 3b | e3 9e 77 2c 18 0e 86 03 9b 27 83 a2 ec 07 a2 8f | b5 c5 5d f0 6f 4c 52 c9 de 2b cb f6 95 58 17 18 | 39 95 49 7c ea 95 6a e5 15 d2 26 18 98 fa 05 10 | 15 72 8e 5a 8a ac aa 68 ff ff ff ff ff ff ff ff | NSS: Value of base: 02 | processing resume sending helper answer for #2 | start processing: state #2 connection "westnets-eastnet/1x0" from 192.1.2.23 (in resume_handler() at server.c:797) | crypto helper 2 replies to request ID 3 | calling continuation function 0x5570e44bdb50 | quick_outI1_continue for #2: calculated ke+nonce, sending I1 | **emit ISAKMP Message: | initiator cookie: | 9f 65 42 37 54 9b 07 77 | responder cookie: | c4 88 e3 f7 e7 56 66 9c | next payload type: ISAKMP_NEXT_NONE (0x0) | ISAKMP version: ISAKMP Version 1.0 (rfc2407) (0x10) | exchange type: ISAKMP_XCHG_QUICK (0x20) | flags: ISAKMP_FLAG_v1_ENCRYPTION (0x1) | Message ID: 2421061128 (0x904e7608) | next payload chain: saving message location 'ISAKMP Message'.'next payload type' | ***emit ISAKMP Hash Payload: | next payload type: ISAKMP_NEXT_NONE (0x0) | next payload chain: setting previous 'ISAKMP Message'.'next payload type' to current ISAKMP Hash Payload (8:ISAKMP_NEXT_HASH) | next payload chain: saving location 'ISAKMP Hash Payload'.'next payload type' in 'reply packet' | emitting 32 zero bytes of HASH DATA into ISAKMP Hash Payload | emitting length of ISAKMP Hash Payload: 36 | emitting quick defaults using policy none | empty esp_info, returning defaults for ENCRYPT | ***emit ISAKMP Security Association Payload: | next payload type: ISAKMP_NEXT_NONCE (0xa) | DOI: ISAKMP_DOI_IPSEC (0x1) | next payload chain: ignoring supplied 'ISAKMP Security Association Payload'.'next payload type' value 10:ISAKMP_NEXT_NONCE | next payload chain: setting previous 'ISAKMP Hash Payload'.'next payload type' to current ISAKMP Security Association Payload (1:ISAKMP_NEXT_SA) | next payload chain: saving location 'ISAKMP Security Association Payload'.'next payload type' in 'reply packet' | ****emit IPsec DOI SIT: | IPsec DOI SIT: SIT_IDENTITY_ONLY (0x1) | ikev1_out_sa pcn: 0 has 1 valid proposals | ikev1_out_sa pcn: 0 pn: 0<1 valid_count: 1 trans_cnt: 2 | ****emit ISAKMP Proposal Payload: | next payload type: ISAKMP_NEXT_NONE (0x0) | proposal number: 0 (0x0) | protocol ID: PROTO_IPSEC_ESP (0x3) | SPI size: 4 (0x4) | number of transforms: 2 (0x2) | last substructure: saving location 'ISAKMP Security Association Payload'.'ISAKMP Proposal Payload'.'next payload type' | netlink_get_spi: allocated 0xb40a241d for esp.0@192.1.2.45 | emitting 4 raw bytes of SPI into ISAKMP Proposal Payload | SPI b4 0a 24 1d | *****emit ISAKMP Transform Payload (ESP): | next payload type: ISAKMP_NEXT_T (0x3) | ESP transform number: 0 (0x0) | ESP transform ID: ESP_AES (0xc) | last substructure: saving location 'ISAKMP Proposal Payload'.'ISAKMP Transform Payload (ESP)'.'next payload type' | ******emit ISAKMP IPsec DOI attribute: | af+type: AF+GROUP_DESCRIPTION (0x8003) | length/value: 14 (0xe) | [14 is OAKLEY_GROUP_MODP2048] | ******emit ISAKMP IPsec DOI attribute: | af+type: AF+ENCAPSULATION_MODE (0x8004) | length/value: 1 (0x1) | [1 is ENCAPSULATION_MODE_TUNNEL] | ******emit ISAKMP IPsec DOI attribute: | af+type: AF+SA_LIFE_TYPE (0x8001) | length/value: 1 (0x1) | [1 is SA_LIFE_TYPE_SECONDS] | ******emit ISAKMP IPsec DOI attribute: | af+type: AF+SA_LIFE_DURATION (variable length) (0x8002) | length/value: 28800 (0x7080) | ******emit ISAKMP IPsec DOI attribute: | af+type: AF+AUTH_ALGORITHM (0x8005) | length/value: 2 (0x2) | [2 is AUTH_ALGORITHM_HMAC_SHA1] | ******emit ISAKMP IPsec DOI attribute: | af+type: AF+KEY_LENGTH (0x8006) | length/value: 128 (0x80) | emitting length of ISAKMP Transform Payload (ESP): 32 | *****emit ISAKMP Transform Payload (ESP): | next payload type: ISAKMP_NEXT_NONE (0x0) | ESP transform number: 1 (0x1) | ESP transform ID: ESP_3DES (0x3) | last substructure: checking 'ISAKMP Proposal Payload'.'ISAKMP Transform Payload (ESP)'.'next payload type' is ISAKMP_NEXT_T (0x3) | last substructure: saving location 'ISAKMP Proposal Payload'.'ISAKMP Transform Payload (ESP)'.'next payload type' | ******emit ISAKMP IPsec DOI attribute: | af+type: AF+GROUP_DESCRIPTION (0x8003) | length/value: 14 (0xe) | [14 is OAKLEY_GROUP_MODP2048] | ******emit ISAKMP IPsec DOI attribute: | af+type: AF+ENCAPSULATION_MODE (0x8004) | length/value: 1 (0x1) | [1 is ENCAPSULATION_MODE_TUNNEL] | ******emit ISAKMP IPsec DOI attribute: | af+type: AF+SA_LIFE_TYPE (0x8001) | length/value: 1 (0x1) | [1 is SA_LIFE_TYPE_SECONDS] | ******emit ISAKMP IPsec DOI attribute: | af+type: AF+SA_LIFE_DURATION (variable length) (0x8002) | length/value: 28800 (0x7080) | ******emit ISAKMP IPsec DOI attribute: | af+type: AF+AUTH_ALGORITHM (0x8005) | length/value: 2 (0x2) | [2 is AUTH_ALGORITHM_HMAC_SHA1] | emitting length of ISAKMP Transform Payload (ESP): 28 | emitting length of ISAKMP Proposal Payload: 72 | last substructure: checking 'ISAKMP Proposal Payload'.'ISAKMP Transform Payload (ESP)'.'next payload type' is 0 | emitting length of ISAKMP Security Association Payload: 84 | last substructure: checking 'ISAKMP Security Association Payload'.'ISAKMP Proposal Payload'.'next payload type' is 0 | ***emit ISAKMP Nonce Payload: | next payload type: ISAKMP_NEXT_KE (0x4) | next payload chain: ignoring supplied 'ISAKMP Nonce Payload'.'next payload type' value 4:ISAKMP_NEXT_KE | next payload chain: setting previous 'ISAKMP Security Association Payload'.'next payload type' to current ISAKMP Nonce Payload (10:ISAKMP_NEXT_NONCE) | next payload chain: saving location 'ISAKMP Nonce Payload'.'next payload type' in 'reply packet' | emitting 32 raw bytes of Ni into ISAKMP Nonce Payload | Ni ef 7a 81 6f fe 0f c0 3b dc 16 f5 a9 c5 42 87 88 | Ni 69 94 30 65 c2 10 1c c7 ad ce 59 9f 9e c7 ff 2a | emitting length of ISAKMP Nonce Payload: 36 | wire (crypto helper) group MODP2048 and state group MODP2048 match | DH secret MODP2048@0x7fa9e0004cb8: transferring ownership from helper KE to state #2 | ***emit ISAKMP Key Exchange Payload: | next payload type: ISAKMP_NEXT_ID (0x5) | next payload chain: ignoring supplied 'ISAKMP Key Exchange Payload'.'next payload type' value 5:ISAKMP_NEXT_ID | next payload chain: setting previous 'ISAKMP Nonce Payload'.'next payload type' to current ISAKMP Key Exchange Payload (4:ISAKMP_NEXT_KE) | next payload chain: saving location 'ISAKMP Key Exchange Payload'.'next payload type' in 'reply packet' | emitting 256 raw bytes of keyex value into ISAKMP Key Exchange Payload | keyex value 18 ff 23 22 32 04 45 8c 2f 9d 0e 79 20 e9 f1 75 | keyex value 30 e4 eb 0f de 8e 67 7f 4e d9 6f 52 17 e8 bf 9f | keyex value 56 98 d5 2d ae 75 4b c5 6d ec ab af de e3 bb 90 | keyex value 0a 2e 24 c7 24 24 43 26 ee 87 fa f3 81 aa 3b 7a | keyex value 85 72 e8 f0 c6 c5 51 4f 86 4c d0 29 93 b5 3b c6 | keyex value c0 82 44 82 75 ab 71 2b 99 dc db a4 8f fe 9d cd | keyex value 9e 49 82 f0 d7 0d 87 16 f2 79 96 6d 87 a8 e4 8a | keyex value 1c b5 6f 4e 59 e7 c0 f5 96 07 3a ef d0 e3 4e e3 | keyex value d9 d0 e2 5f 1b 98 e7 fa 9c 89 bc 49 a0 a0 77 f4 | keyex value 66 61 1d c1 b3 15 a3 35 67 11 52 95 5a 09 08 f4 | keyex value ac 28 74 55 95 63 62 0f a3 b7 3f 7c 94 32 77 2d | keyex value c5 fb c4 ab 75 4c 63 bb e1 e2 7c 61 a9 6f 5f 80 | keyex value 72 31 93 19 01 b9 44 e6 c0 89 1c d5 a5 6f 8b be | keyex value 8e af b6 fd f4 c8 fa 9c 14 21 e6 8b f2 45 85 51 | keyex value 94 2c 4c de 39 e8 b8 9e 43 58 ae 4d 2c 12 15 70 | keyex value f8 9e ca 1d 22 2d 38 73 1d 2d 59 a7 22 94 ed de | emitting length of ISAKMP Key Exchange Payload: 260 | ***emit ISAKMP Identification Payload (IPsec DOI): | next payload type: ISAKMP_NEXT_ID (0x5) | ID type: ID_IPV4_ADDR_SUBNET (0x4) | Protocol ID: 0 (0x0) | port: 0 (0x0) | next payload chain: ignoring supplied 'ISAKMP Identification Payload (IPsec DOI)'.'next payload type' value 5:ISAKMP_NEXT_ID | next payload chain: setting previous 'ISAKMP Key Exchange Payload'.'next payload type' to current ISAKMP Identification Payload (IPsec DOI) (5:ISAKMP_NEXT_ID) | next payload chain: saving location 'ISAKMP Identification Payload (IPsec DOI)'.'next payload type' in 'reply packet' | emitting 4 raw bytes of client network into ISAKMP Identification Payload (IPsec DOI) | client network c0 00 01 00 | emitting 4 raw bytes of client mask into ISAKMP Identification Payload (IPsec DOI) | client mask ff ff ff 00 | emitting length of ISAKMP Identification Payload (IPsec DOI): 16 | ***emit ISAKMP Identification Payload (IPsec DOI): | next payload type: ISAKMP_NEXT_NONE (0x0) | ID type: ID_IPV4_ADDR_SUBNET (0x4) | Protocol ID: 0 (0x0) | port: 0 (0x0) | next payload chain: setting previous 'ISAKMP Identification Payload (IPsec DOI)'.'next payload type' to current ISAKMP Identification Payload (IPsec DOI) (5:ISAKMP_NEXT_ID) | next payload chain: saving location 'ISAKMP Identification Payload (IPsec DOI)'.'next payload type' in 'reply packet' | emitting 4 raw bytes of client network into ISAKMP Identification Payload (IPsec DOI) | client network c0 00 02 00 | emitting 4 raw bytes of client mask into ISAKMP Identification Payload (IPsec DOI) | client mask ff ff ff 00 | emitting length of ISAKMP Identification Payload (IPsec DOI): 16 | HASH(1) PRF sha2_256 init SKEYID_a-key@0x5570e4be4dc0 (size 32) | HASH(1): SKEYID_a-key@0x5570e4be4dc0 (32-bytes, EXTRACT_KEY_FROM_KEY) | key-offset: 0, key-size: 32 | EXTRACT_KEY_FROM_KEY: | target: SHA256_HMAC | flags: SIGN | key_size: 32-bytes | base: base-key@0x5570e4be4dc0 (32-bytes, EXTRACT_KEY_FROM_KEY) | operation: FLAGS_ONLY | params: 8-bytes@0x7ffe19a07e98 | result: clone-key@0x5570e4c00630 (32-bytes, SHA256_HMAC) | HASH(1) prf: created sha2_256 context 0x5570e4c0d4d0 from SKEYID_a-key@0x5570e4c00630 | HASH(1) prf: begin sha2_256 with context 0x5570e4c0d4d0 from SKEYID_a-key@0x5570e4c00630 | HASH(1): release clone-key@0x5570e4c00630 | HASH(1) PRF sha2_256 crypt-prf@0x5570e4c05288 | HASH(1) PRF sha2_256 update M-ID-bytes@0x7ffe19a07f7c (length 4) | 90 4e 76 08 | HASH(1) PRF sha2_256 update payload-bytes@0x5570e45bb900 (length 412) | 0a 00 00 54 00 00 00 01 00 00 00 01 00 00 00 48 | 00 03 04 02 b4 0a 24 1d 03 00 00 20 00 0c 00 00 | 80 03 00 0e 80 04 00 01 80 01 00 01 80 02 70 80 | 80 05 00 02 80 06 00 80 00 00 00 1c 01 03 00 00 | 80 03 00 0e 80 04 00 01 80 01 00 01 80 02 70 80 | 80 05 00 02 04 00 00 24 ef 7a 81 6f fe 0f c0 3b | dc 16 f5 a9 c5 42 87 88 69 94 30 65 c2 10 1c c7 | ad ce 59 9f 9e c7 ff 2a 05 00 01 04 18 ff 23 22 | 32 04 45 8c 2f 9d 0e 79 20 e9 f1 75 30 e4 eb 0f | de 8e 67 7f 4e d9 6f 52 17 e8 bf 9f 56 98 d5 2d | ae 75 4b c5 6d ec ab af de e3 bb 90 0a 2e 24 c7 | 24 24 43 26 ee 87 fa f3 81 aa 3b 7a 85 72 e8 f0 | c6 c5 51 4f 86 4c d0 29 93 b5 3b c6 c0 82 44 82 | 75 ab 71 2b 99 dc db a4 8f fe 9d cd 9e 49 82 f0 | d7 0d 87 16 f2 79 96 6d 87 a8 e4 8a 1c b5 6f 4e | 59 e7 c0 f5 96 07 3a ef d0 e3 4e e3 d9 d0 e2 5f | 1b 98 e7 fa 9c 89 bc 49 a0 a0 77 f4 66 61 1d c1 | b3 15 a3 35 67 11 52 95 5a 09 08 f4 ac 28 74 55 | 95 63 62 0f a3 b7 3f 7c 94 32 77 2d c5 fb c4 ab | 75 4c 63 bb e1 e2 7c 61 a9 6f 5f 80 72 31 93 19 | 01 b9 44 e6 c0 89 1c d5 a5 6f 8b be 8e af b6 fd | f4 c8 fa 9c 14 21 e6 8b f2 45 85 51 94 2c 4c de | 39 e8 b8 9e 43 58 ae 4d 2c 12 15 70 f8 9e ca 1d | 22 2d 38 73 1d 2d 59 a7 22 94 ed de 05 00 00 10 | 04 00 00 00 c0 00 01 00 ff ff ff 00 00 00 00 10 | 04 00 00 00 c0 00 02 00 ff ff ff 00 | HASH(1) PRF sha2_256 final-bytes@0x5570e45bb8e0 (length 32) | a7 ba 5a c0 87 41 40 ef de e7 8e 58 38 37 ff 5f | 70 48 bb 1c 3e e8 33 6d a1 b9 84 f3 16 90 a9 24 | outI1 HASH(1): | a7 ba 5a c0 87 41 40 ef de e7 8e 58 38 37 ff 5f | 70 48 bb 1c 3e e8 33 6d a1 b9 84 f3 16 90 a9 24 | last Phase 1 IV: c4 de d8 a6 42 0d c2 6b 1d b3 07 ce d1 0b 22 13 | current Phase 1 IV: c4 de d8 a6 42 0d c2 6b 1d b3 07 ce d1 0b 22 13 | Phase 2 IV hash sha2_256 init | Phase 2 IV hash sha2_256 digest PH1_IV-bytes@0x5570e4c03a68 (length 16) | c4 de d8 a6 42 0d c2 6b 1d b3 07 ce d1 0b 22 13 | Phase 2 IV hash sha2_256 digest MSGID-bytes@0x7ffe19a07f8c (length 4) | 90 4e 76 08 | Phase 2 IV hash sha2_256 final bytes@0x5570e4c039e8 (length 32) | de 4b 67 18 06 0d a1 dd 52 b0 15 e2 eb 40 41 3f | 2d 45 0c b4 d7 c9 b4 13 e4 58 07 d5 fa 87 75 7a | encrypting: 01 00 00 24 a7 ba 5a c0 87 41 40 ef de e7 8e 58 | encrypting: 38 37 ff 5f 70 48 bb 1c 3e e8 33 6d a1 b9 84 f3 | encrypting: 16 90 a9 24 0a 00 00 54 00 00 00 01 00 00 00 01 | encrypting: 00 00 00 48 00 03 04 02 b4 0a 24 1d 03 00 00 20 | encrypting: 00 0c 00 00 80 03 00 0e 80 04 00 01 80 01 00 01 | encrypting: 80 02 70 80 80 05 00 02 80 06 00 80 00 00 00 1c | encrypting: 01 03 00 00 80 03 00 0e 80 04 00 01 80 01 00 01 | encrypting: 80 02 70 80 80 05 00 02 04 00 00 24 ef 7a 81 6f | encrypting: fe 0f c0 3b dc 16 f5 a9 c5 42 87 88 69 94 30 65 | encrypting: c2 10 1c c7 ad ce 59 9f 9e c7 ff 2a 05 00 01 04 | encrypting: 18 ff 23 22 32 04 45 8c 2f 9d 0e 79 20 e9 f1 75 | encrypting: 30 e4 eb 0f de 8e 67 7f 4e d9 6f 52 17 e8 bf 9f | encrypting: 56 98 d5 2d ae 75 4b c5 6d ec ab af de e3 bb 90 | encrypting: 0a 2e 24 c7 24 24 43 26 ee 87 fa f3 81 aa 3b 7a | encrypting: 85 72 e8 f0 c6 c5 51 4f 86 4c d0 29 93 b5 3b c6 | encrypting: c0 82 44 82 75 ab 71 2b 99 dc db a4 8f fe 9d cd | encrypting: 9e 49 82 f0 d7 0d 87 16 f2 79 96 6d 87 a8 e4 8a | encrypting: 1c b5 6f 4e 59 e7 c0 f5 96 07 3a ef d0 e3 4e e3 | encrypting: d9 d0 e2 5f 1b 98 e7 fa 9c 89 bc 49 a0 a0 77 f4 | encrypting: 66 61 1d c1 b3 15 a3 35 67 11 52 95 5a 09 08 f4 | encrypting: ac 28 74 55 95 63 62 0f a3 b7 3f 7c 94 32 77 2d | encrypting: c5 fb c4 ab 75 4c 63 bb e1 e2 7c 61 a9 6f 5f 80 | encrypting: 72 31 93 19 01 b9 44 e6 c0 89 1c d5 a5 6f 8b be | encrypting: 8e af b6 fd f4 c8 fa 9c 14 21 e6 8b f2 45 85 51 | encrypting: 94 2c 4c de 39 e8 b8 9e 43 58 ae 4d 2c 12 15 70 | encrypting: f8 9e ca 1d 22 2d 38 73 1d 2d 59 a7 22 94 ed de | encrypting: 05 00 00 10 04 00 00 00 c0 00 01 00 ff ff ff 00 | encrypting: 00 00 00 10 04 00 00 00 c0 00 02 00 ff ff ff 00 | IV: de 4b 67 18 06 0d a1 dd 52 b0 15 e2 eb 40 41 3f | IV: 2d 45 0c b4 d7 c9 b4 13 e4 58 07 d5 fa 87 75 7a | unpadded size is: 448 | encrypting 448 using AES_CBC | no IKEv1 message padding required | emitting length of ISAKMP Message: 476 | NSS ike_alg_nss_cbc: aes - enter | NSS ike_alg_nss_cbc: aes - exit | next IV: f9 7b bf 79 62 7d b9 22 bc 56 d7 ef f4 eb 13 2f | sending 476 bytes for reply packet from quick_outI1 through eth1 from 192.1.2.45:500 to 192.1.2.23:500 (using #2) | 9f 65 42 37 54 9b 07 77 c4 88 e3 f7 e7 56 66 9c | 08 10 20 01 90 4e 76 08 00 00 01 dc d5 67 2b f4 | 92 bc fa 16 c0 7c aa 88 54 11 b6 4e 17 a7 10 32 | 68 ef f5 e0 14 76 07 ad 52 c3 6d 7d b3 7c 7a 65 | 49 f1 cb 09 c1 c1 80 3d 2f 3f 78 4d 52 32 4d b6 | 11 db 54 69 b3 c3 c5 f4 6e 5c 9b 56 30 5f a3 79 | f2 92 b0 b0 c4 cb 39 b7 00 9f e8 a6 70 65 90 aa | 9f c9 26 a7 45 78 a6 f9 0d d4 87 0c 28 10 1b 9f | 13 bf 5e 28 c7 39 c7 62 fd e5 36 b8 80 30 eb 14 | c6 ff c4 03 b6 2d db bf a7 9f dd 1d 3c 78 9c 1d | a6 08 84 66 eb 81 aa aa 7b b2 8d 72 b1 63 e7 05 | f0 bb a2 0e b6 e5 2e 9f 21 22 71 8f 90 a3 d8 3d | 6c a9 62 3f 2b 18 64 4d e8 cf 3b 49 69 2b ea e2 | 60 d4 38 8a e6 ec 47 75 6b 58 9b 31 b1 e7 78 25 | 4d 6e 1e 1e 31 22 cb a0 2e 14 32 96 99 08 7c 91 | 08 f5 77 d4 9d 22 8c ff b1 f0 86 bb cd b2 da 93 | 42 aa 54 3a 93 43 46 9d e9 1b 0b 96 a1 a0 af ad | a9 30 a7 a2 53 8e 37 a0 27 df e1 f6 3e e9 f0 40 | aa 63 89 3d 59 d1 11 9d c7 ea 54 3c 4c a7 b3 55 | 25 ab ff 7d 15 38 5b b6 8d dc 94 31 35 71 7c 7a | 97 0a 79 03 3e 6c 61 07 22 c8 40 e4 81 38 b1 14 | ab d5 f0 0e 70 e9 f1 6c a1 8e d6 8c 16 2d 73 f7 | 73 42 a2 e1 d4 e1 d5 78 a0 49 44 99 77 88 03 83 | 5d 30 8f 85 90 c4 03 c3 97 62 cd 21 b9 f7 6c 06 | e2 13 5d 18 e7 ac 40 7a 90 6c a5 99 d5 5e 6a 82 | c7 72 e8 d0 23 20 94 ec ae 4e 15 df aa 71 ee 2c | 84 e2 9e f0 30 96 8f 7f 5b 16 98 af fd 45 1e 27 | a2 50 fb 10 4c 68 29 3e 98 c7 34 2f b3 e4 64 2f | 27 a7 7e 46 c7 8b d5 75 40 7c 72 84 f9 7b bf 79 | 62 7d b9 22 bc 56 d7 ef f4 eb 13 2f | state #2 requesting EVENT_CRYPTO_TIMEOUT to be deleted | libevent_free: release ptr-libevent@0x5570e4c02488 | free_event_entry: release EVENT_CRYPTO_TIMEOUT-pe@0x7fa9e4002b78 "westnets-eastnet/1x0" #2: IMPAIR: suppressing retransmits; scheduling timeout in 60 seconds | event_schedule: new EVENT_RETRANSMIT-pe@0x7fa9e4002b78 | inserting event EVENT_RETRANSMIT, timeout in 60 seconds for #2 | libevent_malloc: new ptr-libevent@0x5570e4c04e08 size 128 | DH secret MODP2048@0x7fa9d4006358: created | #2 STATE_QUICK_I1: retransmits: first event in 60 seconds; timeout in 60 seconds; limit of 12 retransmits; current time is 11343.443623 | NSS: Local DH MODP2048 secret (pointer): 0x7fa9d4006358 | resume sending helper answer for #2 suppresed complete_v1_state_transition() | NSS: Public DH wire value: | f2 70 f6 72 84 58 34 dd f6 79 4a b2 cf d7 3e 52 | ed 53 31 21 f0 03 4c bb 1e 29 17 b2 44 7f 7e 8a | 21 78 5f 41 8d 91 66 8f f0 f1 f0 ef 93 7b e5 7a | de 84 63 8a 1c 3e a6 67 d8 7f d9 55 22 d7 79 06 | d0 dd f7 24 0d 66 d8 a4 76 1c 1e 3c f0 04 93 42 | d1 fb 6d 01 d4 29 6f ee 93 b5 b0 b5 1b 59 c9 07 | 21 93 d2 b9 0b 1a d2 3c f3 fb 6c e3 64 dd d2 cf | ab de 80 b8 4e 3d 92 04 7f cf eb 9f f8 31 4d 36 | 2e e2 34 bf 25 2e 05 57 52 8d e2 ee 91 c5 18 af | 99 c5 0d 24 4a ba f1 9f 9b dd 54 91 32 50 67 61 | a8 ad b0 f0 33 06 75 dc ce 46 3e 9e 7f e5 78 f5 | ee 6b 1d 1e 54 b6 af a6 09 d4 fe ba 66 c2 2a 6e | 98 b3 7e 1f 28 82 d7 f6 12 e8 a3 0e c9 7e fb ce | e5 83 7e 6b 66 b2 55 96 64 7c 5b ac e2 7e f8 03 | bf 41 f0 4c 92 31 47 79 37 76 cd 8d 41 ce 93 e3 | ca 7e 94 f6 b2 93 81 55 8d 59 bb e3 c8 40 61 90 | Generated nonce: 1f 88 28 10 87 a1 1a e5 c3 75 ba 33 ee f2 c0 f5 | Generated nonce: 9f d8 45 4d 30 33 02 8f f3 97 51 1f 4d fe 7a df | crypto helper 3 finished build KE and nonce (quick_outI1 KE); request ID 4 time elapsed 0.000822 seconds | crypto helper 3 sending results from work-order 4 for state #3 to event queue | scheduling resume sending helper answer for #3 | libevent_malloc: new ptr-libevent@0x7fa9d40055c8 size 128 | crypto helper 3 waiting (nothing to do) | stop processing: state #2 connection "westnets-eastnet/1x0" from 192.1.2.23 (in resume_handler() at server.c:833) | libevent_free: release ptr-libevent@0x7fa9e0003f28 | processing resume sending helper answer for #3 | start processing: state #3 connection "westnets-eastnet/2x0" from 192.1.2.23 (in resume_handler() at server.c:797) | crypto helper 3 replies to request ID 4 | calling continuation function 0x5570e44bdb50 | quick_outI1_continue for #3: calculated ke+nonce, sending I1 | **emit ISAKMP Message: | initiator cookie: | 9f 65 42 37 54 9b 07 77 | responder cookie: | c4 88 e3 f7 e7 56 66 9c | next payload type: ISAKMP_NEXT_NONE (0x0) | ISAKMP version: ISAKMP Version 1.0 (rfc2407) (0x10) | exchange type: ISAKMP_XCHG_QUICK (0x20) | flags: ISAKMP_FLAG_v1_ENCRYPTION (0x1) | Message ID: 1971119503 (0x757ce58f) | next payload chain: saving message location 'ISAKMP Message'.'next payload type' | ***emit ISAKMP Hash Payload: | next payload type: ISAKMP_NEXT_NONE (0x0) | next payload chain: setting previous 'ISAKMP Message'.'next payload type' to current ISAKMP Hash Payload (8:ISAKMP_NEXT_HASH) | next payload chain: saving location 'ISAKMP Hash Payload'.'next payload type' in 'reply packet' | emitting 32 zero bytes of HASH DATA into ISAKMP Hash Payload | emitting length of ISAKMP Hash Payload: 36 | emitting quick defaults using policy none | empty esp_info, returning defaults for ENCRYPT | ***emit ISAKMP Security Association Payload: | next payload type: ISAKMP_NEXT_NONCE (0xa) | DOI: ISAKMP_DOI_IPSEC (0x1) | next payload chain: ignoring supplied 'ISAKMP Security Association Payload'.'next payload type' value 10:ISAKMP_NEXT_NONCE | next payload chain: setting previous 'ISAKMP Hash Payload'.'next payload type' to current ISAKMP Security Association Payload (1:ISAKMP_NEXT_SA) | next payload chain: saving location 'ISAKMP Security Association Payload'.'next payload type' in 'reply packet' | ****emit IPsec DOI SIT: | IPsec DOI SIT: SIT_IDENTITY_ONLY (0x1) | ikev1_out_sa pcn: 0 has 1 valid proposals | ikev1_out_sa pcn: 0 pn: 0<1 valid_count: 1 trans_cnt: 2 | ****emit ISAKMP Proposal Payload: | next payload type: ISAKMP_NEXT_NONE (0x0) | proposal number: 0 (0x0) | protocol ID: PROTO_IPSEC_ESP (0x3) | SPI size: 4 (0x4) | number of transforms: 2 (0x2) | last substructure: saving location 'ISAKMP Security Association Payload'.'ISAKMP Proposal Payload'.'next payload type' | netlink_get_spi: allocated 0xff124bc8 for esp.0@192.1.2.45 | emitting 4 raw bytes of SPI into ISAKMP Proposal Payload | SPI ff 12 4b c8 | *****emit ISAKMP Transform Payload (ESP): | next payload type: ISAKMP_NEXT_T (0x3) | ESP transform number: 0 (0x0) | ESP transform ID: ESP_AES (0xc) | last substructure: saving location 'ISAKMP Proposal Payload'.'ISAKMP Transform Payload (ESP)'.'next payload type' | ******emit ISAKMP IPsec DOI attribute: | af+type: AF+GROUP_DESCRIPTION (0x8003) | length/value: 14 (0xe) | [14 is OAKLEY_GROUP_MODP2048] | ******emit ISAKMP IPsec DOI attribute: | af+type: AF+ENCAPSULATION_MODE (0x8004) | length/value: 1 (0x1) | [1 is ENCAPSULATION_MODE_TUNNEL] | ******emit ISAKMP IPsec DOI attribute: | af+type: AF+SA_LIFE_TYPE (0x8001) | length/value: 1 (0x1) | [1 is SA_LIFE_TYPE_SECONDS] | ******emit ISAKMP IPsec DOI attribute: | af+type: AF+SA_LIFE_DURATION (variable length) (0x8002) | length/value: 28800 (0x7080) | ******emit ISAKMP IPsec DOI attribute: | af+type: AF+AUTH_ALGORITHM (0x8005) | length/value: 2 (0x2) | [2 is AUTH_ALGORITHM_HMAC_SHA1] | ******emit ISAKMP IPsec DOI attribute: | af+type: AF+KEY_LENGTH (0x8006) | length/value: 128 (0x80) | emitting length of ISAKMP Transform Payload (ESP): 32 | *****emit ISAKMP Transform Payload (ESP): | next payload type: ISAKMP_NEXT_NONE (0x0) | ESP transform number: 1 (0x1) | ESP transform ID: ESP_3DES (0x3) | last substructure: checking 'ISAKMP Proposal Payload'.'ISAKMP Transform Payload (ESP)'.'next payload type' is ISAKMP_NEXT_T (0x3) | last substructure: saving location 'ISAKMP Proposal Payload'.'ISAKMP Transform Payload (ESP)'.'next payload type' | ******emit ISAKMP IPsec DOI attribute: | af+type: AF+GROUP_DESCRIPTION (0x8003) | length/value: 14 (0xe) | [14 is OAKLEY_GROUP_MODP2048] | ******emit ISAKMP IPsec DOI attribute: | af+type: AF+ENCAPSULATION_MODE (0x8004) | length/value: 1 (0x1) | [1 is ENCAPSULATION_MODE_TUNNEL] | ******emit ISAKMP IPsec DOI attribute: | af+type: AF+SA_LIFE_TYPE (0x8001) | length/value: 1 (0x1) | [1 is SA_LIFE_TYPE_SECONDS] | ******emit ISAKMP IPsec DOI attribute: | af+type: AF+SA_LIFE_DURATION (variable length) (0x8002) | length/value: 28800 (0x7080) | ******emit ISAKMP IPsec DOI attribute: | af+type: AF+AUTH_ALGORITHM (0x8005) | length/value: 2 (0x2) | [2 is AUTH_ALGORITHM_HMAC_SHA1] | emitting length of ISAKMP Transform Payload (ESP): 28 | emitting length of ISAKMP Proposal Payload: 72 | last substructure: checking 'ISAKMP Proposal Payload'.'ISAKMP Transform Payload (ESP)'.'next payload type' is 0 | emitting length of ISAKMP Security Association Payload: 84 | last substructure: checking 'ISAKMP Security Association Payload'.'ISAKMP Proposal Payload'.'next payload type' is 0 | ***emit ISAKMP Nonce Payload: | next payload type: ISAKMP_NEXT_KE (0x4) | next payload chain: ignoring supplied 'ISAKMP Nonce Payload'.'next payload type' value 4:ISAKMP_NEXT_KE | next payload chain: setting previous 'ISAKMP Security Association Payload'.'next payload type' to current ISAKMP Nonce Payload (10:ISAKMP_NEXT_NONCE) | next payload chain: saving location 'ISAKMP Nonce Payload'.'next payload type' in 'reply packet' | emitting 32 raw bytes of Ni into ISAKMP Nonce Payload | Ni 1f 88 28 10 87 a1 1a e5 c3 75 ba 33 ee f2 c0 f5 | Ni 9f d8 45 4d 30 33 02 8f f3 97 51 1f 4d fe 7a df | emitting length of ISAKMP Nonce Payload: 36 | wire (crypto helper) group MODP2048 and state group MODP2048 match | DH secret MODP2048@0x7fa9d4006358: transferring ownership from helper KE to state #3 | ***emit ISAKMP Key Exchange Payload: | next payload type: ISAKMP_NEXT_ID (0x5) | next payload chain: ignoring supplied 'ISAKMP Key Exchange Payload'.'next payload type' value 5:ISAKMP_NEXT_ID | next payload chain: setting previous 'ISAKMP Nonce Payload'.'next payload type' to current ISAKMP Key Exchange Payload (4:ISAKMP_NEXT_KE) | next payload chain: saving location 'ISAKMP Key Exchange Payload'.'next payload type' in 'reply packet' | emitting 256 raw bytes of keyex value into ISAKMP Key Exchange Payload | keyex value f2 70 f6 72 84 58 34 dd f6 79 4a b2 cf d7 3e 52 | keyex value ed 53 31 21 f0 03 4c bb 1e 29 17 b2 44 7f 7e 8a | keyex value 21 78 5f 41 8d 91 66 8f f0 f1 f0 ef 93 7b e5 7a | keyex value de 84 63 8a 1c 3e a6 67 d8 7f d9 55 22 d7 79 06 | keyex value d0 dd f7 24 0d 66 d8 a4 76 1c 1e 3c f0 04 93 42 | keyex value d1 fb 6d 01 d4 29 6f ee 93 b5 b0 b5 1b 59 c9 07 | keyex value 21 93 d2 b9 0b 1a d2 3c f3 fb 6c e3 64 dd d2 cf | keyex value ab de 80 b8 4e 3d 92 04 7f cf eb 9f f8 31 4d 36 | keyex value 2e e2 34 bf 25 2e 05 57 52 8d e2 ee 91 c5 18 af | keyex value 99 c5 0d 24 4a ba f1 9f 9b dd 54 91 32 50 67 61 | keyex value a8 ad b0 f0 33 06 75 dc ce 46 3e 9e 7f e5 78 f5 | keyex value ee 6b 1d 1e 54 b6 af a6 09 d4 fe ba 66 c2 2a 6e | keyex value 98 b3 7e 1f 28 82 d7 f6 12 e8 a3 0e c9 7e fb ce | keyex value e5 83 7e 6b 66 b2 55 96 64 7c 5b ac e2 7e f8 03 | keyex value bf 41 f0 4c 92 31 47 79 37 76 cd 8d 41 ce 93 e3 | keyex value ca 7e 94 f6 b2 93 81 55 8d 59 bb e3 c8 40 61 90 | emitting length of ISAKMP Key Exchange Payload: 260 | ***emit ISAKMP Identification Payload (IPsec DOI): | next payload type: ISAKMP_NEXT_ID (0x5) | ID type: ID_IPV4_ADDR_SUBNET (0x4) | Protocol ID: 0 (0x0) | port: 0 (0x0) | next payload chain: ignoring supplied 'ISAKMP Identification Payload (IPsec DOI)'.'next payload type' value 5:ISAKMP_NEXT_ID | next payload chain: setting previous 'ISAKMP Key Exchange Payload'.'next payload type' to current ISAKMP Identification Payload (IPsec DOI) (5:ISAKMP_NEXT_ID) | next payload chain: saving location 'ISAKMP Identification Payload (IPsec DOI)'.'next payload type' in 'reply packet' | emitting 4 raw bytes of client network into ISAKMP Identification Payload (IPsec DOI) | client network c0 00 0b 00 | emitting 4 raw bytes of client mask into ISAKMP Identification Payload (IPsec DOI) | client mask ff ff ff 00 | emitting length of ISAKMP Identification Payload (IPsec DOI): 16 | ***emit ISAKMP Identification Payload (IPsec DOI): | next payload type: ISAKMP_NEXT_NONE (0x0) | ID type: ID_IPV4_ADDR_SUBNET (0x4) | Protocol ID: 0 (0x0) | port: 0 (0x0) | next payload chain: setting previous 'ISAKMP Identification Payload (IPsec DOI)'.'next payload type' to current ISAKMP Identification Payload (IPsec DOI) (5:ISAKMP_NEXT_ID) | next payload chain: saving location 'ISAKMP Identification Payload (IPsec DOI)'.'next payload type' in 'reply packet' | emitting 4 raw bytes of client network into ISAKMP Identification Payload (IPsec DOI) | client network c0 00 02 00 | emitting 4 raw bytes of client mask into ISAKMP Identification Payload (IPsec DOI) | client mask ff ff ff 00 | emitting length of ISAKMP Identification Payload (IPsec DOI): 16 | HASH(1) PRF sha2_256 init SKEYID_a-key@0x5570e4be4dc0 (size 32) | HASH(1): SKEYID_a-key@0x5570e4be4dc0 (32-bytes, EXTRACT_KEY_FROM_KEY) | key-offset: 0, key-size: 32 | EXTRACT_KEY_FROM_KEY: | target: SHA256_HMAC | flags: SIGN | key_size: 32-bytes | base: base-key@0x5570e4be4dc0 (32-bytes, EXTRACT_KEY_FROM_KEY) | operation: FLAGS_ONLY | params: 8-bytes@0x7ffe19a07e98 | result: clone-key@0x5570e4c00630 (32-bytes, SHA256_HMAC) | HASH(1) prf: created sha2_256 context 0x7fa9e00041f0 from SKEYID_a-key@0x5570e4c00630 | HASH(1) prf: begin sha2_256 with context 0x7fa9e00041f0 from SKEYID_a-key@0x5570e4c00630 | HASH(1): release clone-key@0x5570e4c00630 | HASH(1) PRF sha2_256 crypt-prf@0x7fa9dc0030d8 | HASH(1) PRF sha2_256 update M-ID-bytes@0x7ffe19a07f7c (length 4) | 75 7c e5 8f | HASH(1) PRF sha2_256 update payload-bytes@0x5570e45bb900 (length 412) | 0a 00 00 54 00 00 00 01 00 00 00 01 00 00 00 48 | 00 03 04 02 ff 12 4b c8 03 00 00 20 00 0c 00 00 | 80 03 00 0e 80 04 00 01 80 01 00 01 80 02 70 80 | 80 05 00 02 80 06 00 80 00 00 00 1c 01 03 00 00 | 80 03 00 0e 80 04 00 01 80 01 00 01 80 02 70 80 | 80 05 00 02 04 00 00 24 1f 88 28 10 87 a1 1a e5 | c3 75 ba 33 ee f2 c0 f5 9f d8 45 4d 30 33 02 8f | f3 97 51 1f 4d fe 7a df 05 00 01 04 f2 70 f6 72 | 84 58 34 dd f6 79 4a b2 cf d7 3e 52 ed 53 31 21 | f0 03 4c bb 1e 29 17 b2 44 7f 7e 8a 21 78 5f 41 | 8d 91 66 8f f0 f1 f0 ef 93 7b e5 7a de 84 63 8a | 1c 3e a6 67 d8 7f d9 55 22 d7 79 06 d0 dd f7 24 | 0d 66 d8 a4 76 1c 1e 3c f0 04 93 42 d1 fb 6d 01 | d4 29 6f ee 93 b5 b0 b5 1b 59 c9 07 21 93 d2 b9 | 0b 1a d2 3c f3 fb 6c e3 64 dd d2 cf ab de 80 b8 | 4e 3d 92 04 7f cf eb 9f f8 31 4d 36 2e e2 34 bf | 25 2e 05 57 52 8d e2 ee 91 c5 18 af 99 c5 0d 24 | 4a ba f1 9f 9b dd 54 91 32 50 67 61 a8 ad b0 f0 | 33 06 75 dc ce 46 3e 9e 7f e5 78 f5 ee 6b 1d 1e | 54 b6 af a6 09 d4 fe ba 66 c2 2a 6e 98 b3 7e 1f | 28 82 d7 f6 12 e8 a3 0e c9 7e fb ce e5 83 7e 6b | 66 b2 55 96 64 7c 5b ac e2 7e f8 03 bf 41 f0 4c | 92 31 47 79 37 76 cd 8d 41 ce 93 e3 ca 7e 94 f6 | b2 93 81 55 8d 59 bb e3 c8 40 61 90 05 00 00 10 | 04 00 00 00 c0 00 0b 00 ff ff ff 00 00 00 00 10 | 04 00 00 00 c0 00 02 00 ff ff ff 00 | HASH(1) PRF sha2_256 final-bytes@0x5570e45bb8e0 (length 32) | 3f b3 12 c4 9c db 0c da 62 4a 22 95 e7 5c c7 23 | 6b 6c 17 d2 9a fd 92 da 12 c3 b3 a0 ef e0 21 75 | outI1 HASH(1): | 3f b3 12 c4 9c db 0c da 62 4a 22 95 e7 5c c7 23 | 6b 6c 17 d2 9a fd 92 da 12 c3 b3 a0 ef e0 21 75 | last Phase 1 IV: c4 de d8 a6 42 0d c2 6b 1d b3 07 ce d1 0b 22 13 | current Phase 1 IV: c4 de d8 a6 42 0d c2 6b 1d b3 07 ce d1 0b 22 13 | Phase 2 IV hash sha2_256 init | Phase 2 IV hash sha2_256 digest PH1_IV-bytes@0x5570e4c03a68 (length 16) | c4 de d8 a6 42 0d c2 6b 1d b3 07 ce d1 0b 22 13 | Phase 2 IV hash sha2_256 digest MSGID-bytes@0x7ffe19a07f8c (length 4) | 75 7c e5 8f | Phase 2 IV hash sha2_256 final bytes@0x5570e4c039e8 (length 32) | c7 ca 60 9c 24 53 b1 a4 c6 d9 fa 7e 40 9e a6 28 | 8a b8 27 7b 74 30 5b fd a9 d3 2b d9 23 cf c5 b5 | encrypting: 01 00 00 24 3f b3 12 c4 9c db 0c da 62 4a 22 95 | encrypting: e7 5c c7 23 6b 6c 17 d2 9a fd 92 da 12 c3 b3 a0 | encrypting: ef e0 21 75 0a 00 00 54 00 00 00 01 00 00 00 01 | encrypting: 00 00 00 48 00 03 04 02 ff 12 4b c8 03 00 00 20 | encrypting: 00 0c 00 00 80 03 00 0e 80 04 00 01 80 01 00 01 | encrypting: 80 02 70 80 80 05 00 02 80 06 00 80 00 00 00 1c | encrypting: 01 03 00 00 80 03 00 0e 80 04 00 01 80 01 00 01 | encrypting: 80 02 70 80 80 05 00 02 04 00 00 24 1f 88 28 10 | encrypting: 87 a1 1a e5 c3 75 ba 33 ee f2 c0 f5 9f d8 45 4d | encrypting: 30 33 02 8f f3 97 51 1f 4d fe 7a df 05 00 01 04 | encrypting: f2 70 f6 72 84 58 34 dd f6 79 4a b2 cf d7 3e 52 | encrypting: ed 53 31 21 f0 03 4c bb 1e 29 17 b2 44 7f 7e 8a | encrypting: 21 78 5f 41 8d 91 66 8f f0 f1 f0 ef 93 7b e5 7a | encrypting: de 84 63 8a 1c 3e a6 67 d8 7f d9 55 22 d7 79 06 | encrypting: d0 dd f7 24 0d 66 d8 a4 76 1c 1e 3c f0 04 93 42 | encrypting: d1 fb 6d 01 d4 29 6f ee 93 b5 b0 b5 1b 59 c9 07 | encrypting: 21 93 d2 b9 0b 1a d2 3c f3 fb 6c e3 64 dd d2 cf | encrypting: ab de 80 b8 4e 3d 92 04 7f cf eb 9f f8 31 4d 36 | encrypting: 2e e2 34 bf 25 2e 05 57 52 8d e2 ee 91 c5 18 af | encrypting: 99 c5 0d 24 4a ba f1 9f 9b dd 54 91 32 50 67 61 | encrypting: a8 ad b0 f0 33 06 75 dc ce 46 3e 9e 7f e5 78 f5 | encrypting: ee 6b 1d 1e 54 b6 af a6 09 d4 fe ba 66 c2 2a 6e | encrypting: 98 b3 7e 1f 28 82 d7 f6 12 e8 a3 0e c9 7e fb ce | encrypting: e5 83 7e 6b 66 b2 55 96 64 7c 5b ac e2 7e f8 03 | encrypting: bf 41 f0 4c 92 31 47 79 37 76 cd 8d 41 ce 93 e3 | encrypting: ca 7e 94 f6 b2 93 81 55 8d 59 bb e3 c8 40 61 90 | encrypting: 05 00 00 10 04 00 00 00 c0 00 0b 00 ff ff ff 00 | encrypting: 00 00 00 10 04 00 00 00 c0 00 02 00 ff ff ff 00 | IV: c7 ca 60 9c 24 53 b1 a4 c6 d9 fa 7e 40 9e a6 28 | IV: 8a b8 27 7b 74 30 5b fd a9 d3 2b d9 23 cf c5 b5 | unpadded size is: 448 | encrypting 448 using AES_CBC | no IKEv1 message padding required | emitting length of ISAKMP Message: 476 | NSS ike_alg_nss_cbc: aes - enter | NSS ike_alg_nss_cbc: aes - exit | next IV: d9 7f b7 ac 14 05 ab 36 f3 a0 d3 13 fd 81 02 d6 | sending 476 bytes for reply packet from quick_outI1 through eth1 from 192.1.2.45:500 to 192.1.2.23:500 (using #3) | 9f 65 42 37 54 9b 07 77 c4 88 e3 f7 e7 56 66 9c | 08 10 20 01 75 7c e5 8f 00 00 01 dc 05 87 aa 44 | 73 f6 b3 b7 0f 41 9a 16 a9 42 55 30 71 ad f1 7a | 27 c9 3e da e2 74 a7 98 99 55 e1 b1 7d 19 0a 83 | 0f 54 4e 97 2a 70 78 a8 30 9b d1 9e 6a c9 c1 07 | 54 bc 26 66 d8 e8 17 a5 59 35 40 be 4f 04 60 20 | 52 6f 41 a4 cb c1 fd 16 cd d1 59 f2 68 1e c8 6e | f0 7e fd eb 93 85 d2 1c 58 a5 74 73 89 8a b5 d6 | 74 e2 90 fa 1c 8f cd bc 7a ea 1a b2 de 5a 03 a4 | b0 24 f3 e8 77 8a 9e 2c 48 13 48 a2 76 f4 f8 1f | c9 d7 53 68 c3 f5 b2 1a 4c b5 86 7d 7e 3c b7 71 | fb 04 a4 e4 27 45 ab 08 32 ba 2c 69 9e 79 5a ce | 80 86 e2 ea 8d 1e 46 3c ca b6 d7 88 17 29 e8 f8 | 24 74 ff 29 ee d2 e3 ad 01 1e 55 be 48 c9 55 c2 | 97 39 09 93 6f 65 08 7c 8b 2c ed ec 62 bc 66 69 | 9e 06 1f 0b 15 5f 5c 0a bb b4 27 19 46 22 c2 f5 | c5 5f 4b b2 29 86 e9 2b c0 3a 17 f5 05 38 05 ae | 8e 15 ce 96 db 79 13 7d 7f 9b 12 0e 20 12 50 19 | 75 a2 c8 eb ec c6 c1 07 0d 47 60 c3 5d 6e a2 64 | fe a3 22 9b 5e f0 18 0b 88 cc a8 db ed dd 71 a8 | e5 21 38 16 ed ca d9 35 82 4f cd 2c 9e 4a 2b bb | 5c fb 5d a4 0b 65 a4 d7 be 98 e6 37 65 35 67 52 | 95 3b c6 95 d9 a4 ee e2 60 ed 4e 48 85 08 8e bf | 64 6e f4 5c 43 fc e6 52 48 a1 95 15 c7 c3 13 d0 | 71 ca c2 56 53 10 25 ed 7c 20 a9 a9 fb 54 ea 6d | 0e 69 c4 e7 42 bc 64 15 a1 02 bc 66 b3 80 d0 89 | 8e 55 50 f1 fc ec c8 6a b8 7d de 01 95 de 3a 87 | 47 d2 7f 69 45 64 60 e5 65 8d 86 62 1b 0e bd b8 | 96 8f 3c e1 0c dd 34 b4 b1 ba db 6b d9 7f b7 ac | 14 05 ab 36 f3 a0 d3 13 fd 81 02 d6 | state #3 requesting EVENT_CRYPTO_TIMEOUT to be deleted | libevent_free: release ptr-libevent@0x5570e4c023d8 | free_event_entry: release EVENT_CRYPTO_TIMEOUT-pe@0x5570e4c064d8 "westnets-eastnet/2x0" #3: IMPAIR: suppressing retransmits; scheduling timeout in 60 seconds | event_schedule: new EVENT_RETRANSMIT-pe@0x5570e4c064d8 | inserting event EVENT_RETRANSMIT, timeout in 60 seconds for #3 | libevent_malloc: new ptr-libevent@0x7fa9e0003f28 size 128 | #3 STATE_QUICK_I1: retransmits: first event in 60 seconds; timeout in 60 seconds; limit of 12 retransmits; current time is 11343.444396 | resume sending helper answer for #3 suppresed complete_v1_state_transition() | stop processing: state #3 connection "westnets-eastnet/2x0" from 192.1.2.23 (in resume_handler() at server.c:833) | libevent_free: release ptr-libevent@0x7fa9d40055c8 | *received 460 bytes from 192.1.2.23:500 on eth1 (192.1.2.45:500) | 9f 65 42 37 54 9b 07 77 c4 88 e3 f7 e7 56 66 9c | 08 10 20 01 75 7c e5 8f 00 00 01 cc dc a5 f7 0e | fb a7 c1 b1 21 ca d5 dc 29 a5 69 b2 98 9a 49 d7 | 34 b6 50 18 83 d2 08 bd 7b e8 50 3c d2 d2 99 b5 | 6a 41 3d d6 7d 8a 6e 5d a8 f1 4d 39 fc e1 3a fc | 07 c7 d6 dc 1f 3d 5a 9f 56 f5 15 5a e7 ec 61 82 | 32 fc 90 6e 13 4c 28 04 0c ce 97 d1 d5 f2 46 87 | 59 cb b8 86 76 21 f7 3c c7 65 45 11 8e 7d 58 ac | a5 1e 19 1c 71 96 84 f0 25 d3 05 8a 3a 02 b0 ee | fc 2f f1 71 d6 83 96 81 5a cc 50 01 b7 a5 d5 c5 | 49 52 f3 d8 34 70 40 53 ce d8 40 ed f5 ce 0c fc | 43 51 0f e9 31 cc f9 ae 40 f9 28 e6 54 69 6a e2 | 4c 27 66 ce d6 93 6f 37 97 ac 10 c9 da f6 02 fe | 56 67 11 97 2c b9 85 d6 f8 b9 d2 16 68 03 a7 05 | 92 62 84 36 7e 9e 6a 73 b2 2f f4 c0 73 f6 38 24 | 21 0d dc c4 40 90 ed bd 16 c6 e7 94 c5 cb 2d f8 | af 70 06 12 9d 90 63 97 c6 ed 50 75 18 09 1a c7 | 78 18 76 e8 70 02 7a 82 ac 2a b5 8f aa d3 51 f0 | cc 24 0b 53 33 8e 65 86 02 8e ef f4 81 61 07 02 | f8 0a 6b 14 44 3e fe f2 50 15 17 7b bf cd 7f eb | ca f2 e9 15 17 67 65 27 0e 6c c8 30 cf 4b b1 03 | bf fe df 08 4a b8 87 b6 c1 9c 63 e0 5a 3f 49 60 | a1 1d 27 c2 a7 b1 58 05 f0 f0 f0 91 ce 51 ce 04 | 9f 78 32 f5 45 50 26 fd 17 99 32 d3 74 18 0c 0e | 0e 23 1c 1e 86 38 14 55 ee 7c be 17 63 dc 0c 90 | b2 8f fd 96 75 2a 05 d1 8d 07 78 e1 dd d2 03 a6 | c4 c1 24 df 87 78 2a 58 9c 8c 28 79 34 4d 2c c4 | e1 dc fb 32 95 cb 8d ef 98 d0 36 99 b6 94 e4 81 | 9b 46 3c b2 4a 85 15 8d bf 38 77 e0 | start processing: from 192.1.2.23:500 (in process_md() at demux.c:378) | **parse ISAKMP Message: | initiator cookie: | 9f 65 42 37 54 9b 07 77 | responder cookie: | c4 88 e3 f7 e7 56 66 9c | next payload type: ISAKMP_NEXT_HASH (0x8) | ISAKMP version: ISAKMP Version 1.0 (rfc2407) (0x10) | exchange type: ISAKMP_XCHG_QUICK (0x20) | flags: ISAKMP_FLAG_v1_ENCRYPTION (0x1) | Message ID: 1971119503 (0x757ce58f) | length: 460 (0x1cc) | processing version=1.0 packet with exchange type=ISAKMP_XCHG_QUICK (32) | State DB: found IKEv1 state #3 in QUICK_I1 (find_state_ikev1) | start processing: state #3 connection "westnets-eastnet/2x0" from 192.1.2.23 (in process_v1_packet() at ikev1.c:1633) | #3 is idle | #3 idle | received encrypted packet from 192.1.2.23:500 | decrypting 432 bytes using algorithm AES_CBC | IV before: d9 7f b7 ac 14 05 ab 36 f3 a0 d3 13 fd 81 02 d6 | NSS ike_alg_nss_cbc: aes - enter | NSS ike_alg_nss_cbc: aes - exit | IV after: b6 94 e4 81 9b 46 3c b2 4a 85 15 8d bf 38 77 e0 | decrypted payload (starts at offset -432): | 9f 65 42 37 54 9b 07 77 c4 88 e3 f7 e7 56 66 9c | 08 10 20 01 75 7c e5 8f 00 00 01 cc 01 00 00 24 | 1f c8 52 01 e8 fa a5 60 58 a2 11 24 27 5a ee 39 | 2b 0c c6 57 a9 6a cd 94 67 4f c5 b2 54 a2 11 47 | 0a 00 00 38 00 00 00 01 00 00 00 01 00 00 00 2c | 00 03 04 01 d9 a1 5c c9 00 00 00 20 00 0c 00 00 | 80 03 00 0e 80 04 00 01 80 01 00 01 80 02 70 80 | 80 05 00 02 80 06 00 80 04 00 00 24 9d 29 be 51 | 4c a5 f9 0d c1 27 71 d6 92 35 2b be 58 38 c5 da | 8c 7b f9 0b 6b 0f 67 fd 7c c8 59 a0 05 00 01 04 | 74 22 f3 29 65 67 57 a7 25 5e 22 e4 fd 8f 8a e2 | 94 06 79 30 ca 11 72 8f 18 07 5a ce 39 34 0a 97 | 5b bb 83 10 7b 78 64 60 d5 ee be 6a 29 24 2c 57 | 2d db 42 9a 5c 4a 3d 12 16 a5 e1 77 31 e7 62 7f | 20 6a 17 8b 78 91 8b 07 17 23 18 59 68 aa 0b 9d | 62 81 ee 2e 39 b0 e9 85 bd eb e0 34 f3 18 78 05 | 01 ec bb 39 3b 4c 20 a1 4b a3 1b 84 ea 05 d0 fa | 83 f3 68 a8 60 13 f6 2f 07 f4 ee c2 2a 07 e8 8a | 8a 7c 5c 23 7b 34 59 d7 bd b9 20 ef 64 1e f4 2c | 52 d2 76 d4 8e 26 34 88 d8 9e a1 e3 ce 89 ce cf | e9 84 57 be 36 e2 81 bc e6 fe 34 76 34 f8 67 dc | 61 1d 35 7c 59 a7 9a 01 0a 3d b7 42 e6 15 82 1c | 29 cb e3 83 bc 5b ef 1a b7 9a dd 75 52 43 63 eb | bf 83 0b 47 7d be 1b f6 34 b4 bb 48 ac b7 e8 6d | 90 6e f3 ce e7 60 4b ff 1b 66 de c5 77 aa 83 f0 | 69 d5 be de 2d 71 24 c2 ff f2 01 fb f6 1c 1d 2d | 05 00 00 10 04 00 00 00 c0 00 0b 00 ff ff ff 00 | 00 00 00 10 04 00 00 00 c0 00 02 00 ff ff ff 00 | 00 00 00 00 00 00 00 00 00 00 00 00 | got payload 0x100 (ISAKMP_NEXT_HASH) needed: 0x502 opt: 0x200030 | ***parse ISAKMP Hash Payload: | next payload type: ISAKMP_NEXT_SA (0x1) | length: 36 (0x24) | got payload 0x2 (ISAKMP_NEXT_SA) needed: 0x402 opt: 0x200030 | ***parse ISAKMP Security Association Payload: | next payload type: ISAKMP_NEXT_NONCE (0xa) | length: 56 (0x38) | DOI: ISAKMP_DOI_IPSEC (0x1) | got payload 0x400 (ISAKMP_NEXT_NONCE) needed: 0x400 opt: 0x200030 | ***parse ISAKMP Nonce Payload: | next payload type: ISAKMP_NEXT_KE (0x4) | length: 36 (0x24) | got payload 0x10 (ISAKMP_NEXT_KE) needed: 0x0 opt: 0x200030 | ***parse ISAKMP Key Exchange Payload: | next payload type: ISAKMP_NEXT_ID (0x5) | length: 260 (0x104) | got payload 0x20 (ISAKMP_NEXT_ID) needed: 0x0 opt: 0x200030 | ***parse ISAKMP Identification Payload (IPsec DOI): | next payload type: ISAKMP_NEXT_ID (0x5) | length: 16 (0x10) | ID type: ID_IPV4_ADDR_SUBNET (0x4) | Protocol ID: 0 (0x0) | port: 0 (0x0) | obj: c0 00 0b 00 ff ff ff 00 | got payload 0x20 (ISAKMP_NEXT_ID) needed: 0x0 opt: 0x200030 | ***parse ISAKMP Identification Payload (IPsec DOI): | next payload type: ISAKMP_NEXT_NONE (0x0) | length: 16 (0x10) | ID type: ID_IPV4_ADDR_SUBNET (0x4) | Protocol ID: 0 (0x0) | port: 0 (0x0) | obj: c0 00 02 00 ff ff ff 00 | removing 12 bytes of padding | HASH(1) PRF sha2_256 init SKEYID_a-key@0x5570e4be4dc0 (size 32) | HASH(1): SKEYID_a-key@0x5570e4be4dc0 (32-bytes, EXTRACT_KEY_FROM_KEY) | key-offset: 0, key-size: 32 | EXTRACT_KEY_FROM_KEY: | target: SHA256_HMAC | flags: SIGN | key_size: 32-bytes | base: base-key@0x5570e4be4dc0 (32-bytes, EXTRACT_KEY_FROM_KEY) | operation: FLAGS_ONLY | params: 8-bytes@0x7ffe19a08188 | result: clone-key@0x5570e4c00630 (32-bytes, SHA256_HMAC) | HASH(1) prf: created sha2_256 context 0x7fa9d4005890 from SKEYID_a-key@0x5570e4c00630 | HASH(1) prf: begin sha2_256 with context 0x7fa9d4005890 from SKEYID_a-key@0x5570e4c00630 | HASH(1): release clone-key@0x5570e4c00630 | HASH(1) PRF sha2_256 crypt-prf@0x7fa9dc0030d8 | HASH(1) PRF sha2_256 update M-ID-bytes@0x7ffe19a0826c (length 4) | 75 7c e5 8f | HASH(1) PRF sha2_256 update Ni_b-bytes@0x7fa9d4003fb8 (length 32) | 1f 88 28 10 87 a1 1a e5 c3 75 ba 33 ee f2 c0 f5 | 9f d8 45 4d 30 33 02 8f f3 97 51 1f 4d fe 7a df | HASH(1) PRF sha2_256 update payload-bytes@0x5570e4c0d818 (length 384) | 0a 00 00 38 00 00 00 01 00 00 00 01 00 00 00 2c | 00 03 04 01 d9 a1 5c c9 00 00 00 20 00 0c 00 00 | 80 03 00 0e 80 04 00 01 80 01 00 01 80 02 70 80 | 80 05 00 02 80 06 00 80 04 00 00 24 9d 29 be 51 | 4c a5 f9 0d c1 27 71 d6 92 35 2b be 58 38 c5 da | 8c 7b f9 0b 6b 0f 67 fd 7c c8 59 a0 05 00 01 04 | 74 22 f3 29 65 67 57 a7 25 5e 22 e4 fd 8f 8a e2 | 94 06 79 30 ca 11 72 8f 18 07 5a ce 39 34 0a 97 | 5b bb 83 10 7b 78 64 60 d5 ee be 6a 29 24 2c 57 | 2d db 42 9a 5c 4a 3d 12 16 a5 e1 77 31 e7 62 7f | 20 6a 17 8b 78 91 8b 07 17 23 18 59 68 aa 0b 9d | 62 81 ee 2e 39 b0 e9 85 bd eb e0 34 f3 18 78 05 | 01 ec bb 39 3b 4c 20 a1 4b a3 1b 84 ea 05 d0 fa | 83 f3 68 a8 60 13 f6 2f 07 f4 ee c2 2a 07 e8 8a | 8a 7c 5c 23 7b 34 59 d7 bd b9 20 ef 64 1e f4 2c | 52 d2 76 d4 8e 26 34 88 d8 9e a1 e3 ce 89 ce cf | e9 84 57 be 36 e2 81 bc e6 fe 34 76 34 f8 67 dc | 61 1d 35 7c 59 a7 9a 01 0a 3d b7 42 e6 15 82 1c | 29 cb e3 83 bc 5b ef 1a b7 9a dd 75 52 43 63 eb | bf 83 0b 47 7d be 1b f6 34 b4 bb 48 ac b7 e8 6d | 90 6e f3 ce e7 60 4b ff 1b 66 de c5 77 aa 83 f0 | 69 d5 be de 2d 71 24 c2 ff f2 01 fb f6 1c 1d 2d | 05 00 00 10 04 00 00 00 c0 00 0b 00 ff ff ff 00 | 00 00 00 10 04 00 00 00 c0 00 02 00 ff ff ff 00 | HASH(1) PRF sha2_256 final-bytes@0x7ffe19a082f0 (length 32) | 1f c8 52 01 e8 fa a5 60 58 a2 11 24 27 5a ee 39 | 2b 0c c6 57 a9 6a cd 94 67 4f c5 b2 54 a2 11 47 | quick_inR1_outI2 HASH(2): | 1f c8 52 01 e8 fa a5 60 58 a2 11 24 27 5a ee 39 | 2b 0c c6 57 a9 6a cd 94 67 4f c5 b2 54 a2 11 47 | received 'quick_inR1_outI2' message HASH(2) data ok | ****parse IPsec DOI SIT: | IPsec DOI SIT: SIT_IDENTITY_ONLY (0x1) | ****parse ISAKMP Proposal Payload: | next payload type: ISAKMP_NEXT_NONE (0x0) | length: 44 (0x2c) | proposal number: 0 (0x0) | protocol ID: PROTO_IPSEC_ESP (0x3) | SPI size: 4 (0x4) | number of transforms: 1 (0x1) | parsing 4 raw bytes of ISAKMP Proposal Payload into SPI | SPI d9 a1 5c c9 | *****parse ISAKMP Transform Payload (ESP): | next payload type: ISAKMP_NEXT_NONE (0x0) | length: 32 (0x20) | ESP transform number: 0 (0x0) | ESP transform ID: ESP_AES (0xc) | encryption ike_alg_lookup_by_id id: AES=12, found AES_CBC | ******parse ISAKMP IPsec DOI attribute: | af+type: AF+GROUP_DESCRIPTION (0x8003) | length/value: 14 (0xe) | [14 is OAKLEY_GROUP_MODP2048] | DH ike_alg_lookup_by_id id: MODP2048=14, found MODP2048 | ******parse ISAKMP IPsec DOI attribute: | af+type: AF+ENCAPSULATION_MODE (0x8004) | length/value: 1 (0x1) | [1 is ENCAPSULATION_MODE_TUNNEL] | NAT-T non-encap: Installing IPsec SA without ENCAP, st->hidden_variables.st_nat_traversal is none | ******parse ISAKMP IPsec DOI attribute: | af+type: AF+SA_LIFE_TYPE (0x8001) | length/value: 1 (0x1) | [1 is SA_LIFE_TYPE_SECONDS] | ******parse ISAKMP IPsec DOI attribute: | af+type: AF+SA_LIFE_DURATION (variable length) (0x8002) | length/value: 28800 (0x7080) | ******parse ISAKMP IPsec DOI attribute: | af+type: AF+AUTH_ALGORITHM (0x8005) | length/value: 2 (0x2) | [2 is AUTH_ALGORITHM_HMAC_SHA1] | integrity ike_alg_lookup_by_id id: HMAC_SHA1=2, found HMAC_SHA1_96 | ******parse ISAKMP IPsec DOI attribute: | af+type: AF+KEY_LENGTH (0x8006) | length/value: 128 (0x80) | ESP IPsec Transform verified unconditionally; no alg_info to check against | DH public value received: | 74 22 f3 29 65 67 57 a7 25 5e 22 e4 fd 8f 8a e2 | 94 06 79 30 ca 11 72 8f 18 07 5a ce 39 34 0a 97 | 5b bb 83 10 7b 78 64 60 d5 ee be 6a 29 24 2c 57 | 2d db 42 9a 5c 4a 3d 12 16 a5 e1 77 31 e7 62 7f | 20 6a 17 8b 78 91 8b 07 17 23 18 59 68 aa 0b 9d | 62 81 ee 2e 39 b0 e9 85 bd eb e0 34 f3 18 78 05 | 01 ec bb 39 3b 4c 20 a1 4b a3 1b 84 ea 05 d0 fa | 83 f3 68 a8 60 13 f6 2f 07 f4 ee c2 2a 07 e8 8a | 8a 7c 5c 23 7b 34 59 d7 bd b9 20 ef 64 1e f4 2c | 52 d2 76 d4 8e 26 34 88 d8 9e a1 e3 ce 89 ce cf | e9 84 57 be 36 e2 81 bc e6 fe 34 76 34 f8 67 dc | 61 1d 35 7c 59 a7 9a 01 0a 3d b7 42 e6 15 82 1c | 29 cb e3 83 bc 5b ef 1a b7 9a dd 75 52 43 63 eb | bf 83 0b 47 7d be 1b f6 34 b4 bb 48 ac b7 e8 6d | 90 6e f3 ce e7 60 4b ff 1b 66 de c5 77 aa 83 f0 | 69 d5 be de 2d 71 24 c2 ff f2 01 fb f6 1c 1d 2d | started looking for secret for @west->@east of kind PKK_PSK | actually looking for secret for @west->@east of kind PKK_PSK | line 1: key type PKK_PSK(@west) to type PKK_RSA | concluding with best_match=000 best=(nil) (lineno=-1) | no PreShared Key Found | DH secret MODP2048@0x7fa9d4006358: transferring ownership from state #3 to helper IKEv1 DH | adding quick outI2 DH work-order 5 for state #3 | state #3 requesting EVENT_RETRANSMIT to be deleted | #3 STATE_QUICK_I1: retransmits: cleared | libevent_free: release ptr-libevent@0x7fa9e0003f28 | free_event_entry: release EVENT_RETRANSMIT-pe@0x5570e4c064d8 | event_schedule: new EVENT_CRYPTO_TIMEOUT-pe@0x5570e4c064d8 | inserting event EVENT_CRYPTO_TIMEOUT, timeout in 60 seconds for #3 | libevent_malloc: new ptr-libevent@0x7fa9d40055c8 size 128 | complete v1 state transition with STF_SUSPEND | [RE]START processing: state #3 connection "westnets-eastnet/2x0" from 192.1.2.23 (in complete_v1_state_transition() at ikev1.c:2648) | suspending state #3 and saving MD | crypto helper 4 resuming | #3 is busy; has a suspended MD | crypto helper 4 starting work-order 5 for state #3 | stop processing: from 192.1.2.23:500 (BACKGROUND) (in process_md() at demux.c:380) | crypto helper 4 doing compute dh (V1 Phase 2 PFS) (quick outI2 DH); request ID 5 | stop processing: state #3 connection "westnets-eastnet/2x0" from 192.1.2.23 (in process_md() at demux.c:382) | peer's g: 74 22 f3 29 65 67 57 a7 25 5e 22 e4 fd 8f 8a e2 | peer's g: 94 06 79 30 ca 11 72 8f 18 07 5a ce 39 34 0a 97 | peer's g: 5b bb 83 10 7b 78 64 60 d5 ee be 6a 29 24 2c 57 | peer's g: 2d db 42 9a 5c 4a 3d 12 16 a5 e1 77 31 e7 62 7f | peer's g: 20 6a 17 8b 78 91 8b 07 17 23 18 59 68 aa 0b 9d | processing: STOP connection NULL (in process_md() at demux.c:383) | peer's g: 62 81 ee 2e 39 b0 e9 85 bd eb e0 34 f3 18 78 05 | peer's g: 01 ec bb 39 3b 4c 20 a1 4b a3 1b 84 ea 05 d0 fa | peer's g: 83 f3 68 a8 60 13 f6 2f 07 f4 ee c2 2a 07 e8 8a | peer's g: 8a 7c 5c 23 7b 34 59 d7 bd b9 20 ef 64 1e f4 2c | peer's g: 52 d2 76 d4 8e 26 34 88 d8 9e a1 e3 ce 89 ce cf | peer's g: e9 84 57 be 36 e2 81 bc e6 fe 34 76 34 f8 67 dc | peer's g: 61 1d 35 7c 59 a7 9a 01 0a 3d b7 42 e6 15 82 1c | peer's g: 29 cb e3 83 bc 5b ef 1a b7 9a dd 75 52 43 63 eb | peer's g: bf 83 0b 47 7d be 1b f6 34 b4 bb 48 ac b7 e8 6d | *received 460 bytes from 192.1.2.23:500 on eth1 (192.1.2.45:500) | 9f 65 42 37 54 9b 07 77 c4 88 e3 f7 e7 56 66 9c | 08 10 20 01 90 4e 76 08 00 00 01 cc cc c4 2a 1a | 7a 24 19 23 9e ed f6 91 71 45 ce ca d3 67 da 23 | 68 87 74 f3 1d cb 0e 57 07 3d a1 82 b7 8b a8 79 | 3c fc e9 93 02 07 ca 6b e5 f0 9d 53 fa 16 95 a7 | 5b bf ee d8 dc a7 a1 50 5e 68 61 6e d7 d2 38 c4 | 32 e7 24 bb 34 02 1c d9 7c 2c 95 2c b9 9f 93 71 | f1 c2 2c cb df f9 cb ae c4 be 7b e7 6c a8 51 cb | 85 44 17 3c 44 31 fa 19 14 fb 2f cc 38 26 99 5b | 7e d5 ce a6 39 27 b9 98 a1 af bf 35 c1 09 7a ba | 1d 9c 69 06 6c 7d d5 b8 0f 04 86 95 79 a7 89 a6 | d5 4b fa a4 8c 79 9f 82 79 18 b5 ef 4b 76 ff 5a | peer's g: 90 6e f3 ce e7 60 4b ff 1b 66 de c5 77 aa 83 f0 | peer's g: 69 d5 be de 2d 71 24 c2 ff f2 01 fb f6 1c 1d 2d | Started DH shared-secret computation in NSS: | 89 09 d5 25 46 9d 3c f7 4b c7 ba 1c b9 ce b7 38 | 61 8d 48 08 91 10 45 5d 7a 91 1f 17 7c a4 3b 33 | 47 55 90 9c 14 99 e6 08 f3 5a d3 91 d9 68 45 b6 | 59 20 8c 5f 6b 50 03 95 15 69 cb 9d bd 54 3a 57 | 0e 59 06 41 46 fa 04 33 77 4d a1 9a 55 67 2b de | ab 60 7f 14 bd fe 25 00 56 81 9f af d6 d1 3a 83 | e4 a4 8f 92 9e bd e5 4c cd 3a c7 4e 8b a1 26 da | 17 c3 5c 62 2e 5a e6 13 e8 16 22 57 63 fc a0 1d | c9 9e 10 44 75 6d a4 45 27 f5 0d 60 e9 5e 0c f7 | 14 7f 4b aa a5 8d 05 ab ce 72 0a f1 98 05 71 02 | 10 7d 5d d5 5d 68 e4 e3 52 9e 4b 72 a5 44 e0 04 | 8e 9f 1a f2 1f d9 d6 f8 45 73 8a 71 41 38 4b d4 | c3 83 b8 e6 bc 90 ca 14 02 b6 eb 01 c9 17 7c 82 | 73 69 70 3c 92 56 c1 7b 07 ad c3 05 16 05 5a 66 | 68 bd 7a 48 d7 f6 d5 bd 68 3a 4b 41 4e 16 9a 92 | 91 98 28 fe 95 ff 6a 4c 53 48 bc 1e ed 8f 40 59 | 62 74 fc 05 07 87 b7 6b d7 e9 7b 8c | start processing: from 192.1.2.23:500 (in process_md() at demux.c:378) | **parse ISAKMP Message: | initiator cookie: | 9f 65 42 37 54 9b 07 77 | responder cookie: | c4 88 e3 f7 e7 56 66 9c | next payload type: ISAKMP_NEXT_HASH (0x8) | ISAKMP version: ISAKMP Version 1.0 (rfc2407) (0x10) | exchange type: ISAKMP_XCHG_QUICK (0x20) | flags: ISAKMP_FLAG_v1_ENCRYPTION (0x1) | Message ID: 2421061128 (0x904e7608) | length: 460 (0x1cc) | processing version=1.0 packet with exchange type=ISAKMP_XCHG_QUICK (32) | State DB: found IKEv1 state #2 in QUICK_I1 (find_state_ikev1) | start processing: state #2 connection "westnets-eastnet/1x0" from 192.1.2.23 (in process_v1_packet() at ikev1.c:1633) | #2 is idle | #2 idle | received encrypted packet from 192.1.2.23:500 | decrypting 432 bytes using algorithm AES_CBC | IV before: f9 7b bf 79 62 7d b9 22 bc 56 d7 ef f4 eb 13 2f | NSS ike_alg_nss_cbc: aes - enter | new : g_ir-key@0x5570e4c00630 (256-bytes, CONCATENATE_DATA_AND_BASE) | DH secret MODP2048@0x7fa9d4006358: computed shared DH secret key@0x5570e4c00630 | dh-shared : g^ir-key@0x5570e4c00630 (256-bytes, CONCATENATE_DATA_AND_BASE) | NSS ike_alg_nss_cbc: aes - exit | IV after: ed 8f 40 59 62 74 fc 05 07 87 b7 6b d7 e9 7b 8c | crypto helper 4 finished compute dh (V1 Phase 2 PFS) (quick outI2 DH); request ID 5 time elapsed 0.000833 seconds | crypto helper 4 sending results from work-order 5 for state #3 to event queue | decrypted payload (starts at offset -432): | scheduling resume sending helper answer for #3 | libevent_malloc: new ptr-libevent@0x7fa9d8001f78 size 128 | crypto helper 4 waiting (nothing to do) | 9f 65 42 37 54 9b 07 77 c4 88 e3 f7 e7 56 66 9c | 08 10 20 01 90 4e 76 08 00 00 01 cc 01 00 00 24 | 56 a5 1b e0 2a f7 46 b8 e1 7d bb 08 d3 be 9c 24 | 81 1b e6 84 a1 ab be 29 a2 fd 3a 29 3e 4e c5 c7 | 0a 00 00 38 00 00 00 01 00 00 00 01 00 00 00 2c | 00 03 04 01 15 9e 45 5d 00 00 00 20 00 0c 00 00 | 80 03 00 0e 80 04 00 01 80 01 00 01 80 02 70 80 | 80 05 00 02 80 06 00 80 04 00 00 24 a8 07 4a de | d9 1e c9 04 93 a4 a1 dd 65 8f 3e bc 5e 57 d5 38 | d8 50 86 08 9f be c0 f3 83 82 9d 3a 05 00 01 04 | 19 73 55 3b c5 c6 6b 7f dd 19 4d 13 ea 5f dc 2c | 82 fe 3a da bb 5e cf 3d 84 34 9b b1 f9 43 8a d5 | 6e 14 3b 94 8d 71 e9 a1 29 c5 70 c4 39 d5 71 00 | 56 85 ae a9 e7 ab b1 c4 39 7c 0a ec d1 ec 4b 24 | bb 71 c2 ec 1f d0 b9 fd 70 81 e8 7d 63 65 ee 64 | 57 21 96 a4 cc df 8d de 60 bb 85 ac c1 9a 66 c8 | b3 7d 45 04 a5 d1 46 33 4c 4e 46 f9 7b 02 9c f7 | 36 48 fe 29 48 10 4c 83 9a 85 59 33 59 95 c2 92 | 10 00 80 5c 2d 01 2e e0 04 88 9c e4 f3 42 9f f2 | 3f 5c e9 6c 65 a6 60 d7 b3 a1 a8 07 08 37 97 22 | 9d 32 81 0d 19 ea ce 83 94 06 72 25 0c de de 65 | 2f 43 de 25 d6 c4 1c d2 32 d4 a3 7c 5d 57 ed 16 | 0b 6f aa 86 d5 f4 86 0e 35 58 61 77 e1 51 4c e6 | d5 6a d6 3e aa 0f 82 d8 38 00 59 e9 ba 98 ac 35 | 1a 1b 37 fd b8 53 33 4d 3e b9 5e cd 71 27 fd 7f | 7a 67 7f 6c 8c 67 2f 89 b9 90 71 22 0d 81 49 01 | 05 00 00 10 04 00 00 00 c0 00 01 00 ff ff ff 00 | 00 00 00 10 04 00 00 00 c0 00 02 00 ff ff ff 00 | 00 00 00 00 00 00 00 00 00 00 00 00 | got payload 0x100 (ISAKMP_NEXT_HASH) needed: 0x502 opt: 0x200030 | ***parse ISAKMP Hash Payload: | next payload type: ISAKMP_NEXT_SA (0x1) | length: 36 (0x24) | got payload 0x2 (ISAKMP_NEXT_SA) needed: 0x402 opt: 0x200030 | ***parse ISAKMP Security Association Payload: | next payload type: ISAKMP_NEXT_NONCE (0xa) | length: 56 (0x38) | DOI: ISAKMP_DOI_IPSEC (0x1) | got payload 0x400 (ISAKMP_NEXT_NONCE) needed: 0x400 opt: 0x200030 | ***parse ISAKMP Nonce Payload: | next payload type: ISAKMP_NEXT_KE (0x4) | length: 36 (0x24) | got payload 0x10 (ISAKMP_NEXT_KE) needed: 0x0 opt: 0x200030 | ***parse ISAKMP Key Exchange Payload: | next payload type: ISAKMP_NEXT_ID (0x5) | length: 260 (0x104) | got payload 0x20 (ISAKMP_NEXT_ID) needed: 0x0 opt: 0x200030 | ***parse ISAKMP Identification Payload (IPsec DOI): | next payload type: ISAKMP_NEXT_ID (0x5) | length: 16 (0x10) | ID type: ID_IPV4_ADDR_SUBNET (0x4) | Protocol ID: 0 (0x0) | port: 0 (0x0) | obj: c0 00 01 00 ff ff ff 00 | got payload 0x20 (ISAKMP_NEXT_ID) needed: 0x0 opt: 0x200030 | ***parse ISAKMP Identification Payload (IPsec DOI): | next payload type: ISAKMP_NEXT_NONE (0x0) | length: 16 (0x10) | ID type: ID_IPV4_ADDR_SUBNET (0x4) | Protocol ID: 0 (0x0) | port: 0 (0x0) | obj: c0 00 02 00 ff ff ff 00 | removing 12 bytes of padding | HASH(1) PRF sha2_256 init SKEYID_a-key@0x5570e4be4dc0 (size 32) | HASH(1): SKEYID_a-key@0x5570e4be4dc0 (32-bytes, EXTRACT_KEY_FROM_KEY) | key-offset: 0, key-size: 32 | EXTRACT_KEY_FROM_KEY: | target: SHA256_HMAC | flags: SIGN | key_size: 32-bytes | base: base-key@0x5570e4be4dc0 (32-bytes, EXTRACT_KEY_FROM_KEY) | operation: FLAGS_ONLY | params: 8-bytes@0x7ffe19a08188 | result: clone-key@0x5570e4c05500 (32-bytes, SHA256_HMAC) | HASH(1) prf: created sha2_256 context 0x7fa9d4005890 from SKEYID_a-key@0x5570e4c05500 | HASH(1) prf: begin sha2_256 with context 0x7fa9d4005890 from SKEYID_a-key@0x5570e4c05500 | HASH(1): release clone-key@0x5570e4c05500 | HASH(1) PRF sha2_256 crypt-prf@0x5570e4c06798 | HASH(1) PRF sha2_256 update M-ID-bytes@0x7ffe19a0826c (length 4) | 90 4e 76 08 | HASH(1) PRF sha2_256 update Ni_b-bytes@0x7fa9e0002918 (length 32) | ef 7a 81 6f fe 0f c0 3b dc 16 f5 a9 c5 42 87 88 | 69 94 30 65 c2 10 1c c7 ad ce 59 9f 9e c7 ff 2a | HASH(1) PRF sha2_256 update payload-bytes@0x5570e4c0dc18 (length 384) | 0a 00 00 38 00 00 00 01 00 00 00 01 00 00 00 2c | 00 03 04 01 15 9e 45 5d 00 00 00 20 00 0c 00 00 | 80 03 00 0e 80 04 00 01 80 01 00 01 80 02 70 80 | 80 05 00 02 80 06 00 80 04 00 00 24 a8 07 4a de | d9 1e c9 04 93 a4 a1 dd 65 8f 3e bc 5e 57 d5 38 | d8 50 86 08 9f be c0 f3 83 82 9d 3a 05 00 01 04 | 19 73 55 3b c5 c6 6b 7f dd 19 4d 13 ea 5f dc 2c | 82 fe 3a da bb 5e cf 3d 84 34 9b b1 f9 43 8a d5 | 6e 14 3b 94 8d 71 e9 a1 29 c5 70 c4 39 d5 71 00 | 56 85 ae a9 e7 ab b1 c4 39 7c 0a ec d1 ec 4b 24 | bb 71 c2 ec 1f d0 b9 fd 70 81 e8 7d 63 65 ee 64 | 57 21 96 a4 cc df 8d de 60 bb 85 ac c1 9a 66 c8 | b3 7d 45 04 a5 d1 46 33 4c 4e 46 f9 7b 02 9c f7 | 36 48 fe 29 48 10 4c 83 9a 85 59 33 59 95 c2 92 | 10 00 80 5c 2d 01 2e e0 04 88 9c e4 f3 42 9f f2 | 3f 5c e9 6c 65 a6 60 d7 b3 a1 a8 07 08 37 97 22 | 9d 32 81 0d 19 ea ce 83 94 06 72 25 0c de de 65 | 2f 43 de 25 d6 c4 1c d2 32 d4 a3 7c 5d 57 ed 16 | 0b 6f aa 86 d5 f4 86 0e 35 58 61 77 e1 51 4c e6 | d5 6a d6 3e aa 0f 82 d8 38 00 59 e9 ba 98 ac 35 | 1a 1b 37 fd b8 53 33 4d 3e b9 5e cd 71 27 fd 7f | 7a 67 7f 6c 8c 67 2f 89 b9 90 71 22 0d 81 49 01 | 05 00 00 10 04 00 00 00 c0 00 01 00 ff ff ff 00 | 00 00 00 10 04 00 00 00 c0 00 02 00 ff ff ff 00 | HASH(1) PRF sha2_256 final-bytes@0x7ffe19a082f0 (length 32) | 56 a5 1b e0 2a f7 46 b8 e1 7d bb 08 d3 be 9c 24 | 81 1b e6 84 a1 ab be 29 a2 fd 3a 29 3e 4e c5 c7 | quick_inR1_outI2 HASH(2): | 56 a5 1b e0 2a f7 46 b8 e1 7d bb 08 d3 be 9c 24 | 81 1b e6 84 a1 ab be 29 a2 fd 3a 29 3e 4e c5 c7 | received 'quick_inR1_outI2' message HASH(2) data ok | ****parse IPsec DOI SIT: | IPsec DOI SIT: SIT_IDENTITY_ONLY (0x1) | ****parse ISAKMP Proposal Payload: | next payload type: ISAKMP_NEXT_NONE (0x0) | length: 44 (0x2c) | proposal number: 0 (0x0) | protocol ID: PROTO_IPSEC_ESP (0x3) | SPI size: 4 (0x4) | number of transforms: 1 (0x1) | parsing 4 raw bytes of ISAKMP Proposal Payload into SPI | SPI 15 9e 45 5d | *****parse ISAKMP Transform Payload (ESP): | next payload type: ISAKMP_NEXT_NONE (0x0) | length: 32 (0x20) | ESP transform number: 0 (0x0) | ESP transform ID: ESP_AES (0xc) | encryption ike_alg_lookup_by_id id: AES=12, found AES_CBC | ******parse ISAKMP IPsec DOI attribute: | af+type: AF+GROUP_DESCRIPTION (0x8003) | length/value: 14 (0xe) | [14 is OAKLEY_GROUP_MODP2048] | DH ike_alg_lookup_by_id id: MODP2048=14, found MODP2048 | ******parse ISAKMP IPsec DOI attribute: | af+type: AF+ENCAPSULATION_MODE (0x8004) | length/value: 1 (0x1) | [1 is ENCAPSULATION_MODE_TUNNEL] | NAT-T non-encap: Installing IPsec SA without ENCAP, st->hidden_variables.st_nat_traversal is none | ******parse ISAKMP IPsec DOI attribute: | af+type: AF+SA_LIFE_TYPE (0x8001) | length/value: 1 (0x1) | [1 is SA_LIFE_TYPE_SECONDS] | ******parse ISAKMP IPsec DOI attribute: | af+type: AF+SA_LIFE_DURATION (variable length) (0x8002) | length/value: 28800 (0x7080) | ******parse ISAKMP IPsec DOI attribute: | af+type: AF+AUTH_ALGORITHM (0x8005) | length/value: 2 (0x2) | [2 is AUTH_ALGORITHM_HMAC_SHA1] | integrity ike_alg_lookup_by_id id: HMAC_SHA1=2, found HMAC_SHA1_96 | ******parse ISAKMP IPsec DOI attribute: | af+type: AF+KEY_LENGTH (0x8006) | length/value: 128 (0x80) | ESP IPsec Transform verified unconditionally; no alg_info to check against | DH public value received: | 19 73 55 3b c5 c6 6b 7f dd 19 4d 13 ea 5f dc 2c | 82 fe 3a da bb 5e cf 3d 84 34 9b b1 f9 43 8a d5 | 6e 14 3b 94 8d 71 e9 a1 29 c5 70 c4 39 d5 71 00 | 56 85 ae a9 e7 ab b1 c4 39 7c 0a ec d1 ec 4b 24 | bb 71 c2 ec 1f d0 b9 fd 70 81 e8 7d 63 65 ee 64 | 57 21 96 a4 cc df 8d de 60 bb 85 ac c1 9a 66 c8 | b3 7d 45 04 a5 d1 46 33 4c 4e 46 f9 7b 02 9c f7 | 36 48 fe 29 48 10 4c 83 9a 85 59 33 59 95 c2 92 | 10 00 80 5c 2d 01 2e e0 04 88 9c e4 f3 42 9f f2 | 3f 5c e9 6c 65 a6 60 d7 b3 a1 a8 07 08 37 97 22 | 9d 32 81 0d 19 ea ce 83 94 06 72 25 0c de de 65 | 2f 43 de 25 d6 c4 1c d2 32 d4 a3 7c 5d 57 ed 16 | 0b 6f aa 86 d5 f4 86 0e 35 58 61 77 e1 51 4c e6 | d5 6a d6 3e aa 0f 82 d8 38 00 59 e9 ba 98 ac 35 | 1a 1b 37 fd b8 53 33 4d 3e b9 5e cd 71 27 fd 7f | 7a 67 7f 6c 8c 67 2f 89 b9 90 71 22 0d 81 49 01 | started looking for secret for @west->@east of kind PKK_PSK | actually looking for secret for @west->@east of kind PKK_PSK | line 1: key type PKK_PSK(@west) to type PKK_RSA | concluding with best_match=000 best=(nil) (lineno=-1) | no PreShared Key Found | DH secret MODP2048@0x7fa9e0004cb8: transferring ownership from state #2 to helper IKEv1 DH | adding quick outI2 DH work-order 6 for state #2 | state #2 requesting EVENT_RETRANSMIT to be deleted | #2 STATE_QUICK_I1: retransmits: cleared | libevent_free: release ptr-libevent@0x5570e4c04e08 | free_event_entry: release EVENT_RETRANSMIT-pe@0x7fa9e4002b78 | event_schedule: new EVENT_CRYPTO_TIMEOUT-pe@0x7fa9e4002b78 | inserting event EVENT_CRYPTO_TIMEOUT, timeout in 60 seconds for #2 | libevent_malloc: new ptr-libevent@0x5570e4c0e8e8 size 128 | complete v1 state transition with STF_SUSPEND | [RE]START processing: state #2 connection "westnets-eastnet/1x0" from 192.1.2.23 (in complete_v1_state_transition() at ikev1.c:2648) | suspending state #2 and saving MD | #2 is busy; has a suspended MD | crypto helper 5 resuming | stop processing: from 192.1.2.23:500 (BACKGROUND) (in process_md() at demux.c:380) | crypto helper 5 starting work-order 6 for state #2 | stop processing: state #2 connection "westnets-eastnet/1x0" from 192.1.2.23 (in process_md() at demux.c:382) | processing: STOP connection NULL (in process_md() at demux.c:383) | crypto helper 5 doing compute dh (V1 Phase 2 PFS) (quick outI2 DH); request ID 6 | peer's g: 19 73 55 3b c5 c6 6b 7f dd 19 4d 13 ea 5f dc 2c | peer's g: 82 fe 3a da bb 5e cf 3d 84 34 9b b1 f9 43 8a d5 | peer's g: 6e 14 3b 94 8d 71 e9 a1 29 c5 70 c4 39 d5 71 00 | peer's g: 56 85 ae a9 e7 ab b1 c4 39 7c 0a ec d1 ec 4b 24 | peer's g: bb 71 c2 ec 1f d0 b9 fd 70 81 e8 7d 63 65 ee 64 | peer's g: 57 21 96 a4 cc df 8d de 60 bb 85 ac c1 9a 66 c8 | peer's g: b3 7d 45 04 a5 d1 46 33 4c 4e 46 f9 7b 02 9c f7 | peer's g: 36 48 fe 29 48 10 4c 83 9a 85 59 33 59 95 c2 92 | peer's g: 10 00 80 5c 2d 01 2e e0 04 88 9c e4 f3 42 9f f2 | peer's g: 3f 5c e9 6c 65 a6 60 d7 b3 a1 a8 07 08 37 97 22 | peer's g: 9d 32 81 0d 19 ea ce 83 94 06 72 25 0c de de 65 | peer's g: 2f 43 de 25 d6 c4 1c d2 32 d4 a3 7c 5d 57 ed 16 | peer's g: 0b 6f aa 86 d5 f4 86 0e 35 58 61 77 e1 51 4c e6 | peer's g: d5 6a d6 3e aa 0f 82 d8 38 00 59 e9 ba 98 ac 35 | peer's g: 1a 1b 37 fd b8 53 33 4d 3e b9 5e cd 71 27 fd 7f | peer's g: 7a 67 7f 6c 8c 67 2f 89 b9 90 71 22 0d 81 49 01 | processing resume sending helper answer for #3 | start processing: state #3 connection "westnets-eastnet/2x0" from 192.1.2.23 (in resume_handler() at server.c:797) | crypto helper 4 replies to request ID 5 | calling continuation function 0x5570e44bdb50 | quick_inR1_outI2_continue for #3: calculated ke+nonce, calculating DH | Started DH shared-secret computation in NSS: | **emit ISAKMP Message: | initiator cookie: | 9f 65 42 37 54 9b 07 77 | responder cookie: | c4 88 e3 f7 e7 56 66 9c | next payload type: ISAKMP_NEXT_NONE (0x0) | ISAKMP version: ISAKMP Version 1.0 (rfc2407) (0x10) | exchange type: ISAKMP_XCHG_QUICK (0x20) | flags: ISAKMP_FLAG_v1_ENCRYPTION (0x1) | Message ID: 1971119503 (0x757ce58f) | next payload chain: saving message location 'ISAKMP Message'.'next payload type' | DH secret MODP2048@0x7fa9d4006358: transferring ownership from helper IKEv1 DH to state #3 | parsing 4 raw bytes of ISAKMP Identification Payload (IPsec DOI) into ID address | ID address c0 00 0b 00 | parsing 4 raw bytes of ISAKMP Identification Payload (IPsec DOI) into ID mask | ID mask ff ff ff 00 | our client is subnet 192.0.11.0/24 | our client protocol/port is 0/0 | parsing 4 raw bytes of ISAKMP Identification Payload (IPsec DOI) into ID address | ID address c0 00 02 00 | parsing 4 raw bytes of ISAKMP Identification Payload (IPsec DOI) into ID mask | ID mask ff ff ff 00 | peer client is subnet 192.0.2.0/24 | peer client protocol/port is 0/0 | ***emit ISAKMP Hash Payload: | next payload type: ISAKMP_NEXT_NONE (0x0) | next payload chain: setting previous 'ISAKMP Message'.'next payload type' to current ISAKMP Hash Payload (8:ISAKMP_NEXT_HASH) | next payload chain: saving location 'ISAKMP Hash Payload'.'next payload type' in 'reply packet' | emitting 32 zero bytes of HASH DATA into ISAKMP Hash Payload | emitting length of ISAKMP Hash Payload: 36 | HASH(1) PRF sha2_256 init SKEYID_a-key@0x5570e4be4dc0 (size 32) | HASH(1): SKEYID_a-key@0x5570e4be4dc0 (32-bytes, EXTRACT_KEY_FROM_KEY) | key-offset: 0, key-size: 32 | EXTRACT_KEY_FROM_KEY: | target: SHA256_HMAC | flags: SIGN | key_size: 32-bytes | base: base-key@0x5570e4be4dc0 (32-bytes, EXTRACT_KEY_FROM_KEY) | operation: FLAGS_ONLY | params: 8-bytes@0x7ffe19a07c78 | result: clone-key@0x5570e4c0eb70 (32-bytes, SHA256_HMAC) | HASH(1) prf: created sha2_256 context 0x7fa9d4005890 from SKEYID_a-key@0x5570e4c0eb70 | HASH(1) prf: begin sha2_256 with context 0x7fa9d4005890 from SKEYID_a-key@0x5570e4c0eb70 | HASH(1): release clone-key@0x5570e4c0eb70 | HASH(1) PRF sha2_256 crypt-prf@0x7fa9dc0030d8 | HASH(1) PRF sha2_256 update 0-byte@0x0 (0) | 00 | HASH(1) PRF sha2_256 update M-ID-bytes@0x7ffe19a07d5c (length 4) | 75 7c e5 8f | HASH(1) PRF sha2_256 update Ni_b-bytes@0x7fa9d4003fb8 (length 32) | 1f 88 28 10 87 a1 1a e5 c3 75 ba 33 ee f2 c0 f5 | 9f d8 45 4d 30 33 02 8f f3 97 51 1f 4d fe 7a df | HASH(1) PRF sha2_256 update Nr_b-bytes@0x5570e4c06748 (length 32) | 9d 29 be 51 4c a5 f9 0d c1 27 71 d6 92 35 2b be | 58 38 c5 da 8c 7b f9 0b 6b 0f 67 fd 7c c8 59 a0 | HASH(1) PRF sha2_256 final-bytes@0x5570e45bb8e0 (length 32) | 0a 28 07 14 d0 0a 90 33 09 45 31 67 5e 57 b3 02 | fd c7 f6 37 07 8e 0e 52 44 b4 43 b8 72 c8 9f d9 | quick_inR1_outI2 HASH(3): | 0a 28 07 14 d0 0a 90 33 09 45 31 67 5e 57 b3 02 | fd c7 f6 37 07 8e 0e 52 44 b4 43 b8 72 c8 9f d9 | compute_proto_keymat: needed_len (after ESP enc)=16 | compute_proto_keymat: needed_len (after ESP auth)=36 | hmac PRF sha2_256 init symkey-key@0x5570e4bec1c0 (size 32) | hmac: symkey-key@0x5570e4bec1c0 (32-bytes, EXTRACT_KEY_FROM_KEY) | key-offset: 0, key-size: 32 | EXTRACT_KEY_FROM_KEY: | target: SHA256_HMAC | flags: SIGN | key_size: 32-bytes | base: base-key@0x5570e4bec1c0 (32-bytes, EXTRACT_KEY_FROM_KEY) | operation: FLAGS_ONLY | params: 8-bytes@0x7ffe19a07bf8 | result: clone-key@0x5570e4c0eb70 (32-bytes, SHA256_HMAC) | hmac prf: created sha2_256 context 0x7fa9d4005890 from symkey-key@0x5570e4c0eb70 | hmac prf: begin sha2_256 with context 0x7fa9d4005890 from symkey-key@0x5570e4c0eb70 | hmac: release clone-key@0x5570e4c0eb70 | hmac PRF sha2_256 crypt-prf@0x5570e4c06798 | hmac PRF sha2_256 init symkey-key@0x5570e4bec1c0 (size 32) | hmac: symkey-key@0x5570e4bec1c0 (32-bytes, EXTRACT_KEY_FROM_KEY) | key-offset: 0, key-size: 32 | EXTRACT_KEY_FROM_KEY: | target: SHA256_HMAC | flags: SIGN | key_size: 32-bytes | base: base-key@0x5570e4bec1c0 (32-bytes, EXTRACT_KEY_FROM_KEY) | operation: FLAGS_ONLY | params: 8-bytes@0x7ffe19a07bf8 | result: clone-key@0x5570e4c16390 (32-bytes, SHA256_HMAC) | hmac prf: created sha2_256 context 0x7fa9e00041f0 from symkey-key@0x5570e4c16390 | hmac prf: begin sha2_256 with context 0x7fa9e00041f0 from symkey-key@0x5570e4c16390 | hmac: release clone-key@0x5570e4c16390 | hmac PRF sha2_256 crypt-prf@0x5570e4c054d8 | hmac PRF sha2_256 update g^xy-key@0x5570e4c00630 (size 256) | hmac: g^xy-key@0x5570e4c00630 (256-bytes, CONCATENATE_DATA_AND_BASE) | nss hmac digest hack extracting all 256 bytes of key@0x5570e4c00630 | nss hmac digest hack: symkey-key@0x5570e4c00630 (256-bytes, CONCATENATE_DATA_AND_BASE) | : ephemeral-key@0x5570e4b65080 (16-bytes, AES_KEY_GEN) | nss hmac digest hack: new slot-key@0x5570e4be8ee0 (256-bytes, CONCATENATE_DATA_AND_BASE) | sizeof bytes 256 | wrapper: (SECItemType)-464375087: 76 f7 0d 54 db 5e d1 fc 43 07 32 5f 56 af 54 ce c7 0f 3f 07 2b e4 be 91 26 b2 f4 01 1f e3 e5 29 91 83 8a e2 3b 88 50 22 06 f5 1b 27 59 bf 18 ba 79 0f 5b 99 d1 4b 41 45 7d 31 c3 51 0c 15 22 cc d8 fb b2 b7 50 d6 dc 98 98 ab 98 fc 8d 7d 90 00 b0 95 94 98 24 37 47 34 9a ce fb eb 9e 81 ed a3 e7 d3 4d aa 55 f5 e9 29 8e 67 2f e2 54 cb 95 9f 46 4e 1d 8e 79 f8 3d 91 02 97 65 01 61 94 d2 94 38 e8 26 f9 6a 49 68 f1 d9 3f c5 ec bc 34 b9 d9 cf 5d 3e 4c ad 33 77 ba 15 88 4d 12 6a 2f 68 81 7c 3a 01 c7 ae df 72 00 4a b3 dd 1d 6a 3e 90 74 a0 88 b1 7f 7b 53 48 17 ca 2c e1 44 3f d3 1b c9 1e 58 11 05 81 f9 c5 c5 b4 f1 81 2f 54 17 cd 60 8d dd 7e c8 10 ce a1 cb 43 fc da a4 c6 b3 3a 9c b6 11 57 2d eb fb 37 80 b9 ca 9a 14 51 f8 ce 51 23 50 0d ed af f3 48 40 4e 3d 04 a8 51 78 c3 cb | nss hmac digest hack: release slot-key-key@0x5570e4be8ee0 | nss hmac digest hack extracted len 256 bytes at 0x5570e4c19c98 | unwrapped: 3a 7c 6a 2f 6b d5 28 e8 f6 a2 63 1e e0 1b fe ce | unwrapped: 9f 8a 8a c4 c8 ec a9 06 58 a4 76 79 7a 4e 07 3e | unwrapped: 3f e0 c4 70 6e 0c 95 5c 35 a0 b8 3f 61 3d fe 8a | unwrapped: 58 07 9d f0 44 00 2a 86 7a 13 ee f6 f3 a3 a5 1b | unwrapped: 35 e6 c6 fb bd 87 5c 5d 7d 53 6b fd 1d e7 65 ab | unwrapped: 29 95 04 f0 a6 ee 77 49 5e 49 62 89 d3 6c 0a 9d | unwrapped: 2f 23 53 6c df 03 5c 94 e4 32 b6 15 a6 86 01 7b | unwrapped: 81 f5 14 fc 93 49 a3 1a f4 67 d4 08 e2 69 97 36 | unwrapped: d6 54 f8 bf e2 cd 6d 42 62 ea 69 04 70 7b 6f 34 | unwrapped: 8b ab 8c 67 75 92 53 d1 34 62 91 0b 1b 19 ec d2 | unwrapped: bf c8 57 9c 7e 8a 85 c0 be b4 9a 92 7d 07 3b 17 | unwrapped: 57 64 fd 97 28 17 da 54 72 90 56 07 b0 71 d1 f4 | unwrapped: 44 24 0f 11 d1 2d 42 53 2e d7 e2 41 1f 7f 6c f0 | unwrapped: fc c3 45 4f dc e1 0a 49 43 15 78 10 d5 a8 78 f0 | unwrapped: cf b6 80 bf cc 96 64 f3 d7 c9 17 4f 8f 55 83 f4 | unwrapped: 6f fc 43 ff c3 6a bf 2e fc 5b d2 49 84 69 7c 6b | hmac PRF sha2_256 update g^xy-key@0x5570e4c00630 (size 256) | hmac: g^xy-key@0x5570e4c00630 (256-bytes, CONCATENATE_DATA_AND_BASE) | nss hmac digest hack extracting all 256 bytes of key@0x5570e4c00630 | nss hmac digest hack: symkey-key@0x5570e4c00630 (256-bytes, CONCATENATE_DATA_AND_BASE) | : ephemeral-key@0x5570e4b65080 (16-bytes, AES_KEY_GEN) | nss hmac digest hack: new slot-key@0x5570e4be8ee0 (256-bytes, CONCATENATE_DATA_AND_BASE) | sizeof bytes 256 | wrapper: (SECItemType)-464375087: 76 f7 0d 54 db 5e d1 fc 43 07 32 5f 56 af 54 ce c7 0f 3f 07 2b e4 be 91 26 b2 f4 01 1f e3 e5 29 91 83 8a e2 3b 88 50 22 06 f5 1b 27 59 bf 18 ba 79 0f 5b 99 d1 4b 41 45 7d 31 c3 51 0c 15 22 cc d8 fb b2 b7 50 d6 dc 98 98 ab 98 fc 8d 7d 90 00 b0 95 94 98 24 37 47 34 9a ce fb eb 9e 81 ed a3 e7 d3 4d aa 55 f5 e9 29 8e 67 2f e2 54 cb 95 9f 46 4e 1d 8e 79 f8 3d 91 02 97 65 01 61 94 d2 94 38 e8 26 f9 6a 49 68 f1 d9 3f c5 ec bc 34 b9 d9 cf 5d 3e 4c ad 33 77 ba 15 88 4d 12 6a 2f 68 81 7c 3a 01 c7 ae df 72 00 4a b3 dd 1d 6a 3e 90 74 a0 88 b1 7f 7b 53 48 17 ca 2c e1 44 3f d3 1b c9 1e 58 11 05 81 f9 c5 c5 b4 f1 81 2f 54 17 cd 60 8d dd 7e c8 10 ce a1 cb 43 fc da a4 c6 b3 3a 9c b6 11 57 2d eb fb 37 80 b9 ca 9a 14 51 f8 ce 51 23 50 0d ed af f3 48 40 4e 3d 04 a8 51 78 c3 cb | nss hmac digest hack: release slot-key-key@0x5570e4be8ee0 | nss hmac digest hack extracted len 256 bytes at 0x5570e4c19948 | unwrapped: 3a 7c 6a 2f 6b d5 28 e8 f6 a2 63 1e e0 1b fe ce | unwrapped: 9f 8a 8a c4 c8 ec a9 06 58 a4 76 79 7a 4e 07 3e | unwrapped: 3f e0 c4 70 6e 0c 95 5c 35 a0 b8 3f 61 3d fe 8a | unwrapped: 58 07 9d f0 44 00 2a 86 7a 13 ee f6 f3 a3 a5 1b | unwrapped: 35 e6 c6 fb bd 87 5c 5d 7d 53 6b fd 1d e7 65 ab | unwrapped: 29 95 04 f0 a6 ee 77 49 5e 49 62 89 d3 6c 0a 9d | unwrapped: 2f 23 53 6c df 03 5c 94 e4 32 b6 15 a6 86 01 7b | unwrapped: 81 f5 14 fc 93 49 a3 1a f4 67 d4 08 e2 69 97 36 | unwrapped: d6 54 f8 bf e2 cd 6d 42 62 ea 69 04 70 7b 6f 34 | unwrapped: 8b ab 8c 67 75 92 53 d1 34 62 91 0b 1b 19 ec d2 | unwrapped: bf c8 57 9c 7e 8a 85 c0 be b4 9a 92 7d 07 3b 17 | unwrapped: 57 64 fd 97 28 17 da 54 72 90 56 07 b0 71 d1 f4 | unwrapped: 44 24 0f 11 d1 2d 42 53 2e d7 e2 41 1f 7f 6c f0 | unwrapped: fc c3 45 4f dc e1 0a 49 43 15 78 10 d5 a8 78 f0 | unwrapped: cf b6 80 bf cc 96 64 f3 d7 c9 17 4f 8f 55 83 f4 | unwrapped: 6f fc 43 ff c3 6a bf 2e fc 5b d2 49 84 69 7c 6b | hmac PRF sha2_256 update data-bytes@0x7ffe19a07d2c (length 1) | 03 | hmac PRF sha2_256 update data-bytes@0x7ffe19a07d2c (length 1) | 03 | hmac PRF sha2_256 update data-bytes@0x5570e4c0f660 (length 4) | ff 12 4b c8 | hmac PRF sha2_256 update data-bytes@0x5570e4c0f640 (length 4) | d9 a1 5c c9 | hmac PRF sha2_256 update data-bytes@0x7fa9d4003fb8 (length 32) | 1f 88 28 10 87 a1 1a e5 c3 75 ba 33 ee f2 c0 f5 | 9f d8 45 4d 30 33 02 8f f3 97 51 1f 4d fe 7a df | hmac PRF sha2_256 update data-bytes@0x7fa9d4003fb8 (length 32) | 1f 88 28 10 87 a1 1a e5 c3 75 ba 33 ee f2 c0 f5 | 9f d8 45 4d 30 33 02 8f f3 97 51 1f 4d fe 7a df | hmac PRF sha2_256 update data-bytes@0x5570e4c06748 (length 32) | 9d 29 be 51 4c a5 f9 0d c1 27 71 d6 92 35 2b be | 58 38 c5 da 8c 7b f9 0b 6b 0f 67 fd 7c c8 59 a0 | hmac PRF sha2_256 update data-bytes@0x5570e4c06748 (length 32) | 9d 29 be 51 4c a5 f9 0d c1 27 71 d6 92 35 2b be | 58 38 c5 da 8c 7b f9 0b 6b 0f 67 fd 7c c8 59 a0 | hmac PRF sha2_256 final-bytes@0x5570e4c0d4f8 (length 32) | d6 12 c7 de b6 f8 17 c4 70 1f d3 6f a1 bb 85 1f | a7 a7 04 da b7 af c2 77 a5 41 e2 dd ae ff 0c 74 | hmac PRF sha2_256 final-bytes@0x5570e4c0ac88 (length 32) | 49 58 ac a9 c3 34 36 a6 61 51 8e 01 c7 ba 76 34 | f2 36 23 8e 34 f2 2b 74 3a 22 c6 ac d5 0d 89 fc | hmac PRF sha2_256 init symkey-key@0x5570e4bec1c0 (size 32) | hmac: symkey-key@0x5570e4bec1c0 (32-bytes, EXTRACT_KEY_FROM_KEY) | key-offset: 0, key-size: 32 | EXTRACT_KEY_FROM_KEY: | target: SHA256_HMAC | flags: SIGN | key_size: 32-bytes | base: base-key@0x5570e4bec1c0 (32-bytes, EXTRACT_KEY_FROM_KEY) | operation: FLAGS_ONLY | params: 8-bytes@0x7ffe19a07bf8 | result: clone-key@0x5570e4c16390 (32-bytes, SHA256_HMAC) | hmac prf: created sha2_256 context 0x7fa9e00041f0 from symkey-key@0x5570e4c16390 | hmac prf: begin sha2_256 with context 0x7fa9e00041f0 from symkey-key@0x5570e4c16390 | hmac: release clone-key@0x5570e4c16390 | hmac PRF sha2_256 crypt-prf@0x5570e4c05288 | hmac PRF sha2_256 init symkey-key@0x5570e4bec1c0 (size 32) | hmac: symkey-key@0x5570e4bec1c0 (32-bytes, EXTRACT_KEY_FROM_KEY) | key-offset: 0, key-size: 32 | EXTRACT_KEY_FROM_KEY: | target: SHA256_HMAC | flags: SIGN | key_size: 32-bytes | base: base-key@0x5570e4bec1c0 (32-bytes, EXTRACT_KEY_FROM_KEY) | operation: FLAGS_ONLY | params: 8-bytes@0x7ffe19a07bf8 | result: clone-key@0x5570e4c0eb70 (32-bytes, SHA256_HMAC) | hmac prf: created sha2_256 context 0x7fa9d4005890 from symkey-key@0x5570e4c0eb70 | hmac prf: begin sha2_256 with context 0x7fa9d4005890 from symkey-key@0x5570e4c0eb70 | hmac: release clone-key@0x5570e4c0eb70 | hmac PRF sha2_256 crypt-prf@0x7fa9dc0030d8 | hmac PRF sha2_256 update data-bytes@0x5570e4c0d4f8 (length 32) | d6 12 c7 de b6 f8 17 c4 70 1f d3 6f a1 bb 85 1f | a7 a7 04 da b7 af c2 77 a5 41 e2 dd ae ff 0c 74 | hmac PRF sha2_256 update data-bytes@0x5570e4c0ac88 (length 32) | 49 58 ac a9 c3 34 36 a6 61 51 8e 01 c7 ba 76 34 | f2 36 23 8e 34 f2 2b 74 3a 22 c6 ac d5 0d 89 fc | hmac PRF sha2_256 update g^xy-key@0x5570e4c00630 (size 256) | hmac: g^xy-key@0x5570e4c00630 (256-bytes, CONCATENATE_DATA_AND_BASE) | nss hmac digest hack extracting all 256 bytes of key@0x5570e4c00630 | nss hmac digest hack: symkey-key@0x5570e4c00630 (256-bytes, CONCATENATE_DATA_AND_BASE) | : ephemeral-key@0x5570e4b65080 (16-bytes, AES_KEY_GEN) | nss hmac digest hack: new slot-key@0x5570e4be8ee0 (256-bytes, CONCATENATE_DATA_AND_BASE) | sizeof bytes 256 | wrapper: (SECItemType)-464375087: 76 f7 0d 54 db 5e d1 fc 43 07 32 5f 56 af 54 ce c7 0f 3f 07 2b e4 be 91 26 b2 f4 01 1f e3 e5 29 91 83 8a e2 3b 88 50 22 06 f5 1b 27 59 bf 18 ba 79 0f 5b 99 d1 4b 41 45 7d 31 c3 51 0c 15 22 cc d8 fb b2 b7 50 d6 dc 98 98 ab 98 fc 8d 7d 90 00 b0 95 94 98 24 37 47 34 9a ce fb eb 9e 81 ed a3 e7 d3 4d aa 55 f5 e9 29 8e 67 2f e2 54 cb 95 9f 46 4e 1d 8e 79 f8 3d 91 02 97 65 01 61 94 d2 94 38 e8 26 f9 6a 49 68 f1 d9 3f c5 ec bc 34 b9 d9 cf 5d 3e 4c ad 33 77 ba 15 88 4d 12 6a 2f 68 81 7c 3a 01 c7 ae df 72 00 4a b3 dd 1d 6a 3e 90 74 a0 88 b1 7f 7b 53 48 17 ca 2c e1 44 3f d3 1b c9 1e 58 11 05 81 f9 c5 c5 b4 f1 81 2f 54 17 cd 60 8d dd 7e c8 10 ce a1 cb 43 fc da a4 c6 b3 3a 9c b6 11 57 2d eb fb 37 80 b9 ca 9a 14 51 f8 ce 51 23 50 0d ed af f3 48 40 4e 3d 04 a8 51 78 c3 cb | nss hmac digest hack: release slot-key-key@0x5570e4be8ee0 | nss hmac digest hack extracted len 256 bytes at 0x5570e4c19c98 | unwrapped: 3a 7c 6a 2f 6b d5 28 e8 f6 a2 63 1e e0 1b fe ce | unwrapped: 9f 8a 8a c4 c8 ec a9 06 58 a4 76 79 7a 4e 07 3e | unwrapped: 3f e0 c4 70 6e 0c 95 5c 35 a0 b8 3f 61 3d fe 8a | unwrapped: 58 07 9d f0 44 00 2a 86 7a 13 ee f6 f3 a3 a5 1b | unwrapped: 35 e6 c6 fb bd 87 5c 5d 7d 53 6b fd 1d e7 65 ab | unwrapped: 29 95 04 f0 a6 ee 77 49 5e 49 62 89 d3 6c 0a 9d | unwrapped: 2f 23 53 6c df 03 5c 94 e4 32 b6 15 a6 86 01 7b | unwrapped: 81 f5 14 fc 93 49 a3 1a f4 67 d4 08 e2 69 97 36 | unwrapped: d6 54 f8 bf e2 cd 6d 42 62 ea 69 04 70 7b 6f 34 | unwrapped: 8b ab 8c 67 75 92 53 d1 34 62 91 0b 1b 19 ec d2 | unwrapped: bf c8 57 9c 7e 8a 85 c0 be b4 9a 92 7d 07 3b 17 | unwrapped: 57 64 fd 97 28 17 da 54 72 90 56 07 b0 71 d1 f4 | unwrapped: 44 24 0f 11 d1 2d 42 53 2e d7 e2 41 1f 7f 6c f0 | unwrapped: fc c3 45 4f dc e1 0a 49 43 15 78 10 d5 a8 78 f0 | unwrapped: cf b6 80 bf cc 96 64 f3 d7 c9 17 4f 8f 55 83 f4 | unwrapped: 6f fc 43 ff c3 6a bf 2e fc 5b d2 49 84 69 7c 6b | hmac PRF sha2_256 update g^xy-key@0x5570e4c00630 (size 256) | hmac: g^xy-key@0x5570e4c00630 (256-bytes, CONCATENATE_DATA_AND_BASE) | nss hmac digest hack extracting all 256 bytes of key@0x5570e4c00630 | nss hmac digest hack: symkey-key@0x5570e4c00630 (256-bytes, CONCATENATE_DATA_AND_BASE) | : ephemeral-key@0x5570e4b65080 (16-bytes, AES_KEY_GEN) | nss hmac digest hack: new slot-key@0x5570e4be8ee0 (256-bytes, CONCATENATE_DATA_AND_BASE) | sizeof bytes 256 | wrapper: (SECItemType)-464375087: 76 f7 0d 54 db 5e d1 fc 43 07 32 5f 56 af 54 ce c7 0f 3f 07 2b e4 be 91 26 b2 f4 01 1f e3 e5 29 91 83 8a e2 3b 88 50 22 06 f5 1b 27 59 bf 18 ba 79 0f 5b 99 d1 4b 41 45 7d 31 c3 51 0c 15 22 cc d8 fb b2 b7 50 d6 dc 98 98 ab 98 fc 8d 7d 90 00 b0 95 94 98 24 37 47 34 9a ce fb eb 9e 81 ed a3 e7 d3 4d aa 55 f5 e9 29 8e 67 2f e2 54 cb 95 9f 46 4e 1d 8e 79 f8 3d 91 02 97 65 01 61 94 d2 94 38 e8 26 f9 6a 49 68 f1 d9 3f c5 ec bc 34 b9 d9 cf 5d 3e 4c ad 33 77 ba 15 88 4d 12 6a 2f 68 81 7c 3a 01 c7 ae df 72 00 4a b3 dd 1d 6a 3e 90 74 a0 88 b1 7f 7b 53 48 17 ca 2c e1 44 3f d3 1b c9 1e 58 11 05 81 f9 c5 c5 b4 f1 81 2f 54 17 cd 60 8d dd 7e c8 10 ce a1 cb 43 fc da a4 c6 b3 3a 9c b6 11 57 2d eb fb 37 80 b9 ca 9a 14 51 f8 ce 51 23 50 0d ed af f3 48 40 4e 3d 04 a8 51 78 c3 cb | nss hmac digest hack: release slot-key-key@0x5570e4be8ee0 | nss hmac digest hack extracted len 256 bytes at 0x5570e4c19948 | unwrapped: 3a 7c 6a 2f 6b d5 28 e8 f6 a2 63 1e e0 1b fe ce | unwrapped: 9f 8a 8a c4 c8 ec a9 06 58 a4 76 79 7a 4e 07 3e | unwrapped: 3f e0 c4 70 6e 0c 95 5c 35 a0 b8 3f 61 3d fe 8a | unwrapped: 58 07 9d f0 44 00 2a 86 7a 13 ee f6 f3 a3 a5 1b | unwrapped: 35 e6 c6 fb bd 87 5c 5d 7d 53 6b fd 1d e7 65 ab | unwrapped: 29 95 04 f0 a6 ee 77 49 5e 49 62 89 d3 6c 0a 9d | unwrapped: 2f 23 53 6c df 03 5c 94 e4 32 b6 15 a6 86 01 7b | unwrapped: 81 f5 14 fc 93 49 a3 1a f4 67 d4 08 e2 69 97 36 | unwrapped: d6 54 f8 bf e2 cd 6d 42 62 ea 69 04 70 7b 6f 34 | unwrapped: 8b ab 8c 67 75 92 53 d1 34 62 91 0b 1b 19 ec d2 | unwrapped: bf c8 57 9c 7e 8a 85 c0 be b4 9a 92 7d 07 3b 17 | unwrapped: 57 64 fd 97 28 17 da 54 72 90 56 07 b0 71 d1 f4 | new : g_ir-key@0x5570e4c05500 (256-bytes, CONCATENATE_DATA_AND_BASE) | unwrapped: 44 24 0f 11 d1 2d 42 53 2e d7 e2 41 1f 7f 6c f0 | DH secret MODP2048@0x7fa9e0004cb8: computed shared DH secret key@0x5570e4c05500 | dh-shared : g^ir-key@0x5570e4c05500 (256-bytes, CONCATENATE_DATA_AND_BASE) | crypto helper 5 finished compute dh (V1 Phase 2 PFS) (quick outI2 DH); request ID 6 time elapsed 0.000972 seconds | crypto helper 5 sending results from work-order 6 for state #2 to event queue | scheduling resume sending helper answer for #2 | libevent_malloc: new ptr-libevent@0x7fa9cc001f78 size 128 | crypto helper 5 waiting (nothing to do) | unwrapped: fc c3 45 4f dc e1 0a 49 43 15 78 10 d5 a8 78 f0 | unwrapped: cf b6 80 bf cc 96 64 f3 d7 c9 17 4f 8f 55 83 f4 | unwrapped: 6f fc 43 ff c3 6a bf 2e fc 5b d2 49 84 69 7c 6b | hmac PRF sha2_256 update data-bytes@0x7ffe19a07d2c (length 1) | 03 | hmac PRF sha2_256 update data-bytes@0x7ffe19a07d2c (length 1) | 03 | hmac PRF sha2_256 update data-bytes@0x5570e4c0f660 (length 4) | ff 12 4b c8 | hmac PRF sha2_256 update data-bytes@0x5570e4c0f640 (length 4) | d9 a1 5c c9 | hmac PRF sha2_256 update data-bytes@0x7fa9d4003fb8 (length 32) | 1f 88 28 10 87 a1 1a e5 c3 75 ba 33 ee f2 c0 f5 | 9f d8 45 4d 30 33 02 8f f3 97 51 1f 4d fe 7a df | hmac PRF sha2_256 update data-bytes@0x7fa9d4003fb8 (length 32) | 1f 88 28 10 87 a1 1a e5 c3 75 ba 33 ee f2 c0 f5 | 9f d8 45 4d 30 33 02 8f f3 97 51 1f 4d fe 7a df | hmac PRF sha2_256 update data-bytes@0x5570e4c06748 (length 32) | 9d 29 be 51 4c a5 f9 0d c1 27 71 d6 92 35 2b be | 58 38 c5 da 8c 7b f9 0b 6b 0f 67 fd 7c c8 59 a0 | hmac PRF sha2_256 update data-bytes@0x5570e4c06748 (length 32) | 9d 29 be 51 4c a5 f9 0d c1 27 71 d6 92 35 2b be | 58 38 c5 da 8c 7b f9 0b 6b 0f 67 fd 7c c8 59 a0 | hmac PRF sha2_256 final-bytes@0x5570e4c0d518 (length 32) | a6 73 08 71 80 27 74 bc 94 ec d9 e7 37 77 ad ce | 38 1a 8f e0 5c 72 10 bd 6e c8 67 c1 a0 92 0b 2f | hmac PRF sha2_256 final-bytes@0x5570e4c0aca8 (length 32) | 18 02 78 36 a9 c2 4e 69 a0 24 14 c5 07 5f 39 24 | 93 25 b3 2f d2 68 bd ae 87 75 6e 6f fe 07 c2 68 | install_ipsec_sa() for #3: inbound and outbound | could_route called for westnets-eastnet/2x0 (kind=CK_PERMANENT) | FOR_EACH_CONNECTION_... in route_owner | conn westnets-eastnet/2x0 mark 0/00000000, 0/00000000 vs | conn westnets-eastnet/2x0 mark 0/00000000, 0/00000000 | conn westnets-eastnet/2x0 mark 0/00000000, 0/00000000 vs | conn westnets-eastnet/1x0 mark 0/00000000, 0/00000000 | route owner of "westnets-eastnet/2x0" unrouted: NULL; eroute owner: NULL | looking for alg with encrypt: AES_CBC keylen: 128 integ: HMAC_SHA1_96 | encrypt AES_CBC keylen=128 transid=12, key_size=16, encryptalg=12 | st->st_esp.keymat_len=36 is encrypt_keymat_size=16 + integ_keymat_size=20 | setting IPsec SA replay-window to 32 | NIC esp-hw-offload not for connection 'westnets-eastnet/2x0' not available on interface eth1 | netlink: enabling tunnel mode | netlink: setting IPsec SA replay-window to 32 using old-style req | netlink: esp-hw-offload not set for IPsec SA | netlink response for Add SA esp.d9a15cc9@192.1.2.23 included non-error error | set up outgoing SA, ref=0/0 | looking for alg with encrypt: AES_CBC keylen: 128 integ: HMAC_SHA1_96 | encrypt AES_CBC keylen=128 transid=12, key_size=16, encryptalg=12 | st->st_esp.keymat_len=36 is encrypt_keymat_size=16 + integ_keymat_size=20 | setting IPsec SA replay-window to 32 | NIC esp-hw-offload not for connection 'westnets-eastnet/2x0' not available on interface eth1 | netlink: enabling tunnel mode | netlink: setting IPsec SA replay-window to 32 using old-style req | netlink: esp-hw-offload not set for IPsec SA | netlink response for Add SA esp.ff124bc8@192.1.2.45 included non-error error | priority calculation of connection "westnets-eastnet/2x0" is 0xfe7e7 | add inbound eroute 192.0.2.0/24:0 --0-> 192.0.11.0/24:0 => tun.10000@192.1.2.45 (raw_eroute) | IPsec Sa SPD priority set to 1042407 | raw_eroute result=success | set up incoming SA, ref=0/0 | sr for #3: unrouted | route_and_eroute() for proto 0, and source port 0 dest port 0 | FOR_EACH_CONNECTION_... in route_owner | conn westnets-eastnet/2x0 mark 0/00000000, 0/00000000 vs | conn westnets-eastnet/2x0 mark 0/00000000, 0/00000000 | conn westnets-eastnet/2x0 mark 0/00000000, 0/00000000 vs | conn westnets-eastnet/1x0 mark 0/00000000, 0/00000000 | route owner of "westnets-eastnet/2x0" unrouted: NULL; eroute owner: NULL | route_and_eroute with c: westnets-eastnet/2x0 (next: none) ero:null esr:{(nil)} ro:null rosr:{(nil)} and state: #3 | priority calculation of connection "westnets-eastnet/2x0" is 0xfe7e7 | eroute_connection add eroute 192.0.11.0/24:0 --0-> 192.0.2.0/24:0 => tun.0@192.1.2.23 (raw_eroute) | IPsec Sa SPD priority set to 1042407 | raw_eroute result=success | running updown command "ipsec _updown" for verb up | command executing up-client | executing up-client: PLUTO_VERB='up-client' PLUTO_VERSION='2.0' PLUTO_CONNECTION='westnets-eastnet/2x0' PLUTO_INTERFACE='eth1' PLUTO_NEXT_HOP='192.1.2.23' PLUTO_ME='192.1.2.45' PLUTO_MY_ID='@west' PLUTO_MY_CLIENT='192.0.11.0/24' PLUTO_MY_CLIENT_NET='192.0.11.0' PLUTO_MY_CLIENT_MASK='255.255.255.0' PLUTO_MY_PORT='0' PLUTO_MY_PROTOCOL='0' PLUTO_SA_REQID='16392' PLUTO_SA_TYPE='ESP' PLUTO_PEER='192.1.2.23' PLUTO_PEER_ID='@east' PLUTO_PEER_CLIENT='192.0.2.0/24' PLUTO_PEER_CLIENT_NET='192.0.2.0' PLUTO_PEER_CLIENT_MASK='255.255.255.0' PLUTO_PEER_PORT='0' PLUTO_PEER_PROTOCOL='0' PLUTO_PEER_CA='' PLUTO_STACK='netkey' PLUTO_ADDTIME='0' PLUTO_CONN_POLICY='RSASIG+ENCRYPT+TUNNEL+PFS+UP+IKEV1_ALLOW+SAREF_TRACK+IKE_FRAG_ALLOW+ESN_NO' PLUTO_CONN_KIND='CK_PERMANENT' PLUTO_CONN_ADDRFAMILY='ipv4' XAUTH_FAILED=0 PLUTO_IS_PEER_CISCO='0' PLUTO_PEER_DNS_INFO='' PLUTO_PEER_DOMAIN_INFO='' PLUTO_PEER_BANNER='' PLUTO_CFG_SERVER='0' PLUTO_CFG_CLIENT='0' PLUTO_NM_CONFIGURED='0' VTI_IFACE='' VTI_ROUTING='no' VTI_SHARED='no' SPI_IN= | popen cmd is 1044 chars long | cmd( 0):PLUTO_VERB='up-client' PLUTO_VERSION='2.0' PLUTO_CONNECTION='westnets-eastnet/2x: | cmd( 80):0' PLUTO_INTERFACE='eth1' PLUTO_NEXT_HOP='192.1.2.23' PLUTO_ME='192.1.2.45' PLUT: | cmd( 160):O_MY_ID='@west' PLUTO_MY_CLIENT='192.0.11.0/24' PLUTO_MY_CLIENT_NET='192.0.11.0': | cmd( 240): PLUTO_MY_CLIENT_MASK='255.255.255.0' PLUTO_MY_PORT='0' PLUTO_MY_PROTOCOL='0' PL: | cmd( 320):UTO_SA_REQID='16392' PLUTO_SA_TYPE='ESP' PLUTO_PEER='192.1.2.23' PLUTO_PEER_ID=': | cmd( 400):@east' PLUTO_PEER_CLIENT='192.0.2.0/24' PLUTO_PEER_CLIENT_NET='192.0.2.0' PLUTO_: | cmd( 480):PEER_CLIENT_MASK='255.255.255.0' PLUTO_PEER_PORT='0' PLUTO_PEER_PROTOCOL='0' PLU: | cmd( 560):TO_PEER_CA='' PLUTO_STACK='netkey' PLUTO_ADDTIME='0' PLUTO_CONN_POLICY='RSASIG+E: | cmd( 640):NCRYPT+TUNNEL+PFS+UP+IKEV1_ALLOW+SAREF_TRACK+IKE_FRAG_ALLOW+ESN_NO' PLUTO_CONN_K: | cmd( 720):IND='CK_PERMANENT' PLUTO_CONN_ADDRFAMILY='ipv4' XAUTH_FAILED=0 PLUTO_IS_PEER_CIS: | cmd( 800):CO='0' PLUTO_PEER_DNS_INFO='' PLUTO_PEER_DOMAIN_INFO='' PLUTO_PEER_BANNER='' PLU: | cmd( 880):TO_CFG_SERVER='0' PLUTO_CFG_CLIENT='0' PLUTO_NM_CONFIGURED='0' VTI_IFACE='' VTI_: | cmd( 960):ROUTING='no' VTI_SHARED='no' SPI_IN=0xd9a15cc9 SPI_OUT=0xff124bc8 ipsec _updown : | cmd(1040):2>&1: | route_and_eroute: firewall_notified: true | running updown command "ipsec _updown" for verb prepare | command executing prepare-client | executing prepare-client: PLUTO_VERB='prepare-client' PLUTO_VERSION='2.0' PLUTO_CONNECTION='westnets-eastnet/2x0' PLUTO_INTERFACE='eth1' PLUTO_NEXT_HOP='192.1.2.23' PLUTO_ME='192.1.2.45' PLUTO_MY_ID='@west' PLUTO_MY_CLIENT='192.0.11.0/24' PLUTO_MY_CLIENT_NET='192.0.11.0' PLUTO_MY_CLIENT_MASK='255.255.255.0' PLUTO_MY_PORT='0' PLUTO_MY_PROTOCOL='0' PLUTO_SA_REQID='16392' PLUTO_SA_TYPE='ESP' PLUTO_PEER='192.1.2.23' PLUTO_PEER_ID='@east' PLUTO_PEER_CLIENT='192.0.2.0/24' PLUTO_PEER_CLIENT_NET='192.0.2.0' PLUTO_PEER_CLIENT_MASK='255.255.255.0' PLUTO_PEER_PORT='0' PLUTO_PEER_PROTOCOL='0' PLUTO_PEER_CA='' PLUTO_STACK='netkey' PLUTO_ADDTIME='0' PLUTO_CONN_POLICY='RSASIG+ENCRYPT+TUNNEL+PFS+UP+IKEV1_ALLOW+SAREF_TRACK+IKE_FRAG_ALLOW+ESN_NO' PLUTO_CONN_KIND='CK_PERMANENT' PLUTO_CONN_ADDRFAMILY='ipv4' XAUTH_FAILED=0 PLUTO_IS_PEER_CISCO='0' PLUTO_PEER_DNS_INFO='' PLUTO_PEER_DOMAIN_INFO='' PLUTO_PEER_BANNER='' PLUTO_CFG_SERVER='0' PLUTO_CFG_CLIENT='0' PLUTO_NM_CONFIGURED='0' VTI_IFACE='' VTI_ROUTING='no' VTI_SHARED='n | popen cmd is 1049 chars long | cmd( 0):PLUTO_VERB='prepare-client' PLUTO_VERSION='2.0' PLUTO_CONNECTION='westnets-eastn: | cmd( 80):et/2x0' PLUTO_INTERFACE='eth1' PLUTO_NEXT_HOP='192.1.2.23' PLUTO_ME='192.1.2.45': | cmd( 160): PLUTO_MY_ID='@west' PLUTO_MY_CLIENT='192.0.11.0/24' PLUTO_MY_CLIENT_NET='192.0.: | cmd( 240):11.0' PLUTO_MY_CLIENT_MASK='255.255.255.0' PLUTO_MY_PORT='0' PLUTO_MY_PROTOCOL=': | cmd( 320):0' PLUTO_SA_REQID='16392' PLUTO_SA_TYPE='ESP' PLUTO_PEER='192.1.2.23' PLUTO_PEER: | cmd( 400):_ID='@east' PLUTO_PEER_CLIENT='192.0.2.0/24' PLUTO_PEER_CLIENT_NET='192.0.2.0' P: | cmd( 480):LUTO_PEER_CLIENT_MASK='255.255.255.0' PLUTO_PEER_PORT='0' PLUTO_PEER_PROTOCOL='0: | cmd( 560):' PLUTO_PEER_CA='' PLUTO_STACK='netkey' PLUTO_ADDTIME='0' PLUTO_CONN_POLICY='RSA: | cmd( 640):SIG+ENCRYPT+TUNNEL+PFS+UP+IKEV1_ALLOW+SAREF_TRACK+IKE_FRAG_ALLOW+ESN_NO' PLUTO_C: | cmd( 720):ONN_KIND='CK_PERMANENT' PLUTO_CONN_ADDRFAMILY='ipv4' XAUTH_FAILED=0 PLUTO_IS_PEE: | cmd( 800):R_CISCO='0' PLUTO_PEER_DNS_INFO='' PLUTO_PEER_DOMAIN_INFO='' PLUTO_PEER_BANNER=': | cmd( 880):' PLUTO_CFG_SERVER='0' PLUTO_CFG_CLIENT='0' PLUTO_NM_CONFIGURED='0' VTI_IFACE='': | cmd( 960): VTI_ROUTING='no' VTI_SHARED='no' SPI_IN=0xd9a15cc9 SPI_OUT=0xff124bc8 ipsec _up: | cmd(1040):down 2>&1: | running updown command "ipsec _updown" for verb route | command executing route-client | executing route-client: PLUTO_VERB='route-client' PLUTO_VERSION='2.0' PLUTO_CONNECTION='westnets-eastnet/2x0' PLUTO_INTERFACE='eth1' PLUTO_NEXT_HOP='192.1.2.23' PLUTO_ME='192.1.2.45' PLUTO_MY_ID='@west' PLUTO_MY_CLIENT='192.0.11.0/24' PLUTO_MY_CLIENT_NET='192.0.11.0' PLUTO_MY_CLIENT_MASK='255.255.255.0' PLUTO_MY_PORT='0' PLUTO_MY_PROTOCOL='0' PLUTO_SA_REQID='16392' PLUTO_SA_TYPE='ESP' PLUTO_PEER='192.1.2.23' PLUTO_PEER_ID='@east' PLUTO_PEER_CLIENT='192.0.2.0/24' PLUTO_PEER_CLIENT_NET='192.0.2.0' PLUTO_PEER_CLIENT_MASK='255.255.255.0' PLUTO_PEER_PORT='0' PLUTO_PEER_PROTOCOL='0' PLUTO_PEER_CA='' PLUTO_STACK='netkey' PLUTO_ADDTIME='0' PLUTO_CONN_POLICY='RSASIG+ENCRYPT+TUNNEL+PFS+UP+IKEV1_ALLOW+SAREF_TRACK+IKE_FRAG_ALLOW+ESN_NO' PLUTO_CONN_KIND='CK_PERMANENT' PLUTO_CONN_ADDRFAMILY='ipv4' XAUTH_FAILED=0 PLUTO_IS_PEER_CISCO='0' PLUTO_PEER_DNS_INFO='' PLUTO_PEER_DOMAIN_INFO='' PLUTO_PEER_BANNER='' PLUTO_CFG_SERVER='0' PLUTO_CFG_CLIENT='0' PLUTO_NM_CONFIGURED='0' VTI_IFACE='' VTI_ROUTING='no' VTI_SHARED='no' S | popen cmd is 1047 chars long | cmd( 0):PLUTO_VERB='route-client' PLUTO_VERSION='2.0' PLUTO_CONNECTION='westnets-eastnet: | cmd( 80):/2x0' PLUTO_INTERFACE='eth1' PLUTO_NEXT_HOP='192.1.2.23' PLUTO_ME='192.1.2.45' P: | cmd( 160):LUTO_MY_ID='@west' PLUTO_MY_CLIENT='192.0.11.0/24' PLUTO_MY_CLIENT_NET='192.0.11: | cmd( 240):.0' PLUTO_MY_CLIENT_MASK='255.255.255.0' PLUTO_MY_PORT='0' PLUTO_MY_PROTOCOL='0': | cmd( 320): PLUTO_SA_REQID='16392' PLUTO_SA_TYPE='ESP' PLUTO_PEER='192.1.2.23' PLUTO_PEER_I: | cmd( 400):D='@east' PLUTO_PEER_CLIENT='192.0.2.0/24' PLUTO_PEER_CLIENT_NET='192.0.2.0' PLU: | cmd( 480):TO_PEER_CLIENT_MASK='255.255.255.0' PLUTO_PEER_PORT='0' PLUTO_PEER_PROTOCOL='0' : | cmd( 560):PLUTO_PEER_CA='' PLUTO_STACK='netkey' PLUTO_ADDTIME='0' PLUTO_CONN_POLICY='RSASI: | cmd( 640):G+ENCRYPT+TUNNEL+PFS+UP+IKEV1_ALLOW+SAREF_TRACK+IKE_FRAG_ALLOW+ESN_NO' PLUTO_CON: | cmd( 720):N_KIND='CK_PERMANENT' PLUTO_CONN_ADDRFAMILY='ipv4' XAUTH_FAILED=0 PLUTO_IS_PEER_: | cmd( 800):CISCO='0' PLUTO_PEER_DNS_INFO='' PLUTO_PEER_DOMAIN_INFO='' PLUTO_PEER_BANNER='' : | cmd( 880):PLUTO_CFG_SERVER='0' PLUTO_CFG_CLIENT='0' PLUTO_NM_CONFIGURED='0' VTI_IFACE='' V: | cmd( 960):TI_ROUTING='no' VTI_SHARED='no' SPI_IN=0xd9a15cc9 SPI_OUT=0xff124bc8 ipsec _updo: | cmd(1040):wn 2>&1: | route_and_eroute: instance "westnets-eastnet/2x0", setting eroute_owner {spd=0x5570e4c02e08,sr=0x5570e4c02e08} to #3 (was #0) (newest_ipsec_sa=#0) | encrypting: 00 00 00 24 0a 28 07 14 d0 0a 90 33 09 45 31 67 | encrypting: 5e 57 b3 02 fd c7 f6 37 07 8e 0e 52 44 b4 43 b8 | encrypting: 72 c8 9f d9 | IV: b6 94 e4 81 9b 46 3c b2 4a 85 15 8d bf 38 77 e0 | unpadded size is: 36 | emitting 12 zero bytes of encryption padding into ISAKMP Message | encrypting 48 using AES_CBC | no IKEv1 message padding required | emitting length of ISAKMP Message: 76 | NSS ike_alg_nss_cbc: aes - enter | NSS ike_alg_nss_cbc: aes - exit | next IV: a3 19 37 73 a6 10 47 b7 d5 7d 64 89 37 6c 1d 46 | inR1_outI2: instance westnets-eastnet/2x0[0], setting IKEv1 newest_ipsec_sa to #3 (was #0) (spd.eroute=#3) cloned from #1 | DPD: dpd_init() called on IPsec SA | DPD: Peer does not support Dead Peer Detection | complete v1 state transition with STF_OK | [RE]START processing: state #3 connection "westnets-eastnet/2x0" from 192.1.2.23 (in complete_v1_state_transition() at ikev1.c:2673) | #3 is idle | doing_xauth:no, t_xauth_client_done:no | IKEv1: transition from state STATE_QUICK_I1 to state STATE_QUICK_I2 | child state #3: QUICK_I1(established CHILD SA) => QUICK_I2(established CHILD SA) | event_already_set, deleting event | state #3 requesting EVENT_CRYPTO_TIMEOUT to be deleted | libevent_free: release ptr-libevent@0x7fa9d40055c8 | free_event_entry: release EVENT_CRYPTO_TIMEOUT-pe@0x5570e4c064d8 | sending reply packet to 192.1.2.23:500 (from 192.1.2.45:500) | sending 76 bytes for STATE_QUICK_I1 through eth1 from 192.1.2.45:500 to 192.1.2.23:500 (using #3) | 9f 65 42 37 54 9b 07 77 c4 88 e3 f7 e7 56 66 9c | 08 10 20 01 75 7c e5 8f 00 00 00 4c dd 25 95 a5 | 40 93 79 aa b9 0d 31 2a 56 cc 31 cf a8 37 89 6b | 53 e6 b3 5c 0d b1 f5 1c ce fc aa 44 a3 19 37 73 | a6 10 47 b7 d5 7d 64 89 37 6c 1d 46 | !event_already_set at reschedule | event_schedule: new EVENT_SA_REPLACE-pe@0x5570e4c064d8 | inserting event EVENT_SA_REPLACE, timeout in 28048 seconds for #3 | libevent_malloc: new ptr-libevent@0x5570e4c15ee8 size 128 | pstats #3 ikev1.ipsec established | NAT-T: encaps is 'auto' "westnets-eastnet/2x0" #3: STATE_QUICK_I2: sent QI2, IPsec SA established tunnel mode {ESP=>0xd9a15cc9 <0xff124bc8 xfrm=AES_CBC_128-HMAC_SHA1_96 NATOA=none NATD=none DPD=passive} | modecfg pull: noquirk policy:push not-client | phase 1 is done, looking for phase 2 to unpend | close_any(fd@27) (in release_whack() at state.c:654) | resume sending helper answer for #3 suppresed complete_v1_state_transition() | stop processing: state #3 connection "westnets-eastnet/2x0" from 192.1.2.23 (in resume_handler() at server.c:833) | libevent_free: release ptr-libevent@0x7fa9d8001f78 | processing resume sending helper answer for #2 | start processing: state #2 connection "westnets-eastnet/1x0" from 192.1.2.23 (in resume_handler() at server.c:797) | crypto helper 5 replies to request ID 6 | calling continuation function 0x5570e44bdb50 | quick_inR1_outI2_continue for #2: calculated ke+nonce, calculating DH | **emit ISAKMP Message: | initiator cookie: | 9f 65 42 37 54 9b 07 77 | responder cookie: | c4 88 e3 f7 e7 56 66 9c | next payload type: ISAKMP_NEXT_NONE (0x0) | ISAKMP version: ISAKMP Version 1.0 (rfc2407) (0x10) | exchange type: ISAKMP_XCHG_QUICK (0x20) | flags: ISAKMP_FLAG_v1_ENCRYPTION (0x1) | Message ID: 2421061128 (0x904e7608) | next payload chain: saving message location 'ISAKMP Message'.'next payload type' | DH secret MODP2048@0x7fa9e0004cb8: transferring ownership from helper IKEv1 DH to state #2 | parsing 4 raw bytes of ISAKMP Identification Payload (IPsec DOI) into ID address | ID address c0 00 01 00 | parsing 4 raw bytes of ISAKMP Identification Payload (IPsec DOI) into ID mask | ID mask ff ff ff 00 | our client is subnet 192.0.1.0/24 | our client protocol/port is 0/0 | parsing 4 raw bytes of ISAKMP Identification Payload (IPsec DOI) into ID address | ID address c0 00 02 00 | parsing 4 raw bytes of ISAKMP Identification Payload (IPsec DOI) into ID mask | ID mask ff ff ff 00 | peer client is subnet 192.0.2.0/24 | peer client protocol/port is 0/0 | ***emit ISAKMP Hash Payload: | next payload type: ISAKMP_NEXT_NONE (0x0) | next payload chain: setting previous 'ISAKMP Message'.'next payload type' to current ISAKMP Hash Payload (8:ISAKMP_NEXT_HASH) | next payload chain: saving location 'ISAKMP Hash Payload'.'next payload type' in 'reply packet' | emitting 32 zero bytes of HASH DATA into ISAKMP Hash Payload | emitting length of ISAKMP Hash Payload: 36 | HASH(1) PRF sha2_256 init SKEYID_a-key@0x5570e4be4dc0 (size 32) | HASH(1): SKEYID_a-key@0x5570e4be4dc0 (32-bytes, EXTRACT_KEY_FROM_KEY) | key-offset: 0, key-size: 32 | EXTRACT_KEY_FROM_KEY: | target: SHA256_HMAC | flags: SIGN | key_size: 32-bytes | base: base-key@0x5570e4be4dc0 (32-bytes, EXTRACT_KEY_FROM_KEY) | operation: FLAGS_ONLY | params: 8-bytes@0x7ffe19a07c78 | result: clone-key@0x5570e4c0eb70 (32-bytes, SHA256_HMAC) | HASH(1) prf: created sha2_256 context 0x7fa9d4005890 from SKEYID_a-key@0x5570e4c0eb70 | HASH(1) prf: begin sha2_256 with context 0x7fa9d4005890 from SKEYID_a-key@0x5570e4c0eb70 | HASH(1): release clone-key@0x5570e4c0eb70 | HASH(1) PRF sha2_256 crypt-prf@0x5570e4c06798 | HASH(1) PRF sha2_256 update 0-byte@0x0 (0) | 00 | HASH(1) PRF sha2_256 update M-ID-bytes@0x7ffe19a07d5c (length 4) | 90 4e 76 08 | HASH(1) PRF sha2_256 update Ni_b-bytes@0x7fa9e0002918 (length 32) | ef 7a 81 6f fe 0f c0 3b dc 16 f5 a9 c5 42 87 88 | 69 94 30 65 c2 10 1c c7 ad ce 59 9f 9e c7 ff 2a | HASH(1) PRF sha2_256 update Nr_b-bytes@0x5570e4c03508 (length 32) | a8 07 4a de d9 1e c9 04 93 a4 a1 dd 65 8f 3e bc | 5e 57 d5 38 d8 50 86 08 9f be c0 f3 83 82 9d 3a | HASH(1) PRF sha2_256 final-bytes@0x5570e45bb8e0 (length 32) | 75 99 02 a0 4f f1 1e d7 52 46 23 81 c5 19 e2 1d | 9f 82 c9 50 84 ed 1a a0 f4 71 87 c9 c7 d9 84 67 | quick_inR1_outI2 HASH(3): | 75 99 02 a0 4f f1 1e d7 52 46 23 81 c5 19 e2 1d | 9f 82 c9 50 84 ed 1a a0 f4 71 87 c9 c7 d9 84 67 | compute_proto_keymat: needed_len (after ESP enc)=16 | compute_proto_keymat: needed_len (after ESP auth)=36 | hmac PRF sha2_256 init symkey-key@0x5570e4bec1c0 (size 32) | hmac: symkey-key@0x5570e4bec1c0 (32-bytes, EXTRACT_KEY_FROM_KEY) | key-offset: 0, key-size: 32 | EXTRACT_KEY_FROM_KEY: | target: SHA256_HMAC | flags: SIGN | key_size: 32-bytes | base: base-key@0x5570e4bec1c0 (32-bytes, EXTRACT_KEY_FROM_KEY) | operation: FLAGS_ONLY | params: 8-bytes@0x7ffe19a07bf8 | result: clone-key@0x5570e4c0eb70 (32-bytes, SHA256_HMAC) | hmac prf: created sha2_256 context 0x7fa9d4005890 from symkey-key@0x5570e4c0eb70 | hmac prf: begin sha2_256 with context 0x7fa9d4005890 from symkey-key@0x5570e4c0eb70 | hmac: release clone-key@0x5570e4c0eb70 | hmac PRF sha2_256 crypt-prf@0x7fa9dc0030d8 | hmac PRF sha2_256 init symkey-key@0x5570e4bec1c0 (size 32) | hmac: symkey-key@0x5570e4bec1c0 (32-bytes, EXTRACT_KEY_FROM_KEY) | key-offset: 0, key-size: 32 | EXTRACT_KEY_FROM_KEY: | target: SHA256_HMAC | flags: SIGN | key_size: 32-bytes | base: base-key@0x5570e4bec1c0 (32-bytes, EXTRACT_KEY_FROM_KEY) | operation: FLAGS_ONLY | params: 8-bytes@0x7ffe19a07bf8 | result: clone-key@0x5570e4c16390 (32-bytes, SHA256_HMAC) | hmac prf: created sha2_256 context 0x7fa9e00041f0 from symkey-key@0x5570e4c16390 | hmac prf: begin sha2_256 with context 0x7fa9e00041f0 from symkey-key@0x5570e4c16390 | hmac: release clone-key@0x5570e4c16390 | hmac PRF sha2_256 crypt-prf@0x5570e4c054d8 | hmac PRF sha2_256 update g^xy-key@0x5570e4c05500 (size 256) | hmac: g^xy-key@0x5570e4c05500 (256-bytes, CONCATENATE_DATA_AND_BASE) | nss hmac digest hack extracting all 256 bytes of key@0x5570e4c05500 | nss hmac digest hack: symkey-key@0x5570e4c05500 (256-bytes, CONCATENATE_DATA_AND_BASE) | : ephemeral-key@0x5570e4b65080 (16-bytes, AES_KEY_GEN) | nss hmac digest hack: new slot-key@0x5570e4be8ee0 (256-bytes, CONCATENATE_DATA_AND_BASE) | sizeof bytes 256 | wrapper: (SECItemType)-464375087: c6 37 c0 7f f9 9a ed 43 dd e3 50 f4 b6 f4 fc 91 20 d5 e1 cf 53 99 c6 59 e5 66 98 71 e1 9d b8 85 19 f1 96 b6 c1 d5 e7 31 52 e7 45 3a dd f1 8b f5 76 78 6d 50 3a 16 73 a6 20 9c 3c a8 2b 1d 6f 52 99 88 88 0f 16 75 e3 6a 82 71 ba 85 df ca e7 a8 76 e7 26 33 bd fa b0 25 c6 30 5b 1f 5e 1b 45 af 29 aa 80 82 0d ba 8c b6 6b d4 af fb 81 7e ce fa d0 1a ab 89 29 60 0a ed ed f1 6e 19 c2 6c f1 e6 8f 63 cd 84 37 75 a6 b4 78 bd 28 c5 b3 24 7f 64 8f 4e 50 63 64 92 db 29 ff f3 30 eb d8 a8 7a fe 3d 12 ce 83 20 b8 29 d2 de f4 78 f1 75 64 09 2d e6 81 22 8d fe 34 9e 96 92 0e 8d cb f0 2d b5 97 3e 2d 68 8d 5a d9 16 bd c4 4b 09 be 74 48 6e ad 90 d0 1e 9f 20 6d 62 37 14 5f 3f 15 2e 04 06 1f 5a 38 c1 87 52 ce 22 9e 64 bc 59 97 66 93 d2 83 03 08 29 3f 60 83 de 06 c9 bc 89 74 b2 e4 03 d8 | nss hmac digest hack: release slot-key-key@0x5570e4be8ee0 | nss hmac digest hack extracted len 256 bytes at 0x5570e4c19c98 | unwrapped: 60 17 91 07 f0 13 14 ff 02 0a 8c 2e 8e 4e d4 77 | unwrapped: 49 39 0e f9 5b 7f 3e 55 67 9a 46 d9 f2 99 94 26 | unwrapped: 47 17 80 e3 0f 52 6e 4b 55 d3 35 bf f4 fc fb 0c | unwrapped: a1 11 59 69 3b 6d a9 4f 2c 29 37 03 36 89 3d 0d | unwrapped: 16 f8 be ee 6c b7 01 e2 e9 fd 4e 91 f1 32 ba 28 | unwrapped: 35 4a a5 13 33 55 77 0c 6d b4 80 6d 15 a6 9c 8a | unwrapped: 1f a1 02 bf f6 1c e1 c4 e5 91 23 0b 69 b2 f7 02 | unwrapped: bf d0 20 d8 cc 8a 9c 7c 8c cf d8 60 3a a3 23 5b | unwrapped: d3 27 e0 db ac 59 d1 b8 5c 70 b9 dc 0d eb ef 26 | unwrapped: 99 1e 07 18 94 13 dd 22 53 13 89 a0 1f da fa 70 | unwrapped: ae 0d 28 b7 d4 0a 62 39 00 27 1f 67 94 fb 27 b8 | unwrapped: a2 7a cf 62 75 38 3e 9a 31 8c 68 b2 2d 8f a9 59 | unwrapped: 9f 5f 9a 3f 7f eb 14 af fa 7f 4b f5 dc d6 ec f7 | unwrapped: e3 cb 10 16 1b 10 47 19 f7 d9 a9 1e 3f 60 23 0d | unwrapped: 70 63 fc 9d e6 9e 9c 3c 3d f9 b4 82 ee d4 d0 82 | unwrapped: b7 40 b7 96 f3 ef 72 4c ee 1e 46 8b f9 b6 5b 59 | hmac PRF sha2_256 update g^xy-key@0x5570e4c05500 (size 256) | hmac: g^xy-key@0x5570e4c05500 (256-bytes, CONCATENATE_DATA_AND_BASE) | nss hmac digest hack extracting all 256 bytes of key@0x5570e4c05500 | nss hmac digest hack: symkey-key@0x5570e4c05500 (256-bytes, CONCATENATE_DATA_AND_BASE) | : ephemeral-key@0x5570e4b65080 (16-bytes, AES_KEY_GEN) | nss hmac digest hack: new slot-key@0x5570e4be8ee0 (256-bytes, CONCATENATE_DATA_AND_BASE) | sizeof bytes 256 | wrapper: (SECItemType)-464375087: c6 37 c0 7f f9 9a ed 43 dd e3 50 f4 b6 f4 fc 91 20 d5 e1 cf 53 99 c6 59 e5 66 98 71 e1 9d b8 85 19 f1 96 b6 c1 d5 e7 31 52 e7 45 3a dd f1 8b f5 76 78 6d 50 3a 16 73 a6 20 9c 3c a8 2b 1d 6f 52 99 88 88 0f 16 75 e3 6a 82 71 ba 85 df ca e7 a8 76 e7 26 33 bd fa b0 25 c6 30 5b 1f 5e 1b 45 af 29 aa 80 82 0d ba 8c b6 6b d4 af fb 81 7e ce fa d0 1a ab 89 29 60 0a ed ed f1 6e 19 c2 6c f1 e6 8f 63 cd 84 37 75 a6 b4 78 bd 28 c5 b3 24 7f 64 8f 4e 50 63 64 92 db 29 ff f3 30 eb d8 a8 7a fe 3d 12 ce 83 20 b8 29 d2 de f4 78 f1 75 64 09 2d e6 81 22 8d fe 34 9e 96 92 0e 8d cb f0 2d b5 97 3e 2d 68 8d 5a d9 16 bd c4 4b 09 be 74 48 6e ad 90 d0 1e 9f 20 6d 62 37 14 5f 3f 15 2e 04 06 1f 5a 38 c1 87 52 ce 22 9e 64 bc 59 97 66 93 d2 83 03 08 29 3f 60 83 de 06 c9 bc 89 74 b2 e4 03 d8 | nss hmac digest hack: release slot-key-key@0x5570e4be8ee0 | nss hmac digest hack extracted len 256 bytes at 0x5570e4c19948 | unwrapped: 60 17 91 07 f0 13 14 ff 02 0a 8c 2e 8e 4e d4 77 | unwrapped: 49 39 0e f9 5b 7f 3e 55 67 9a 46 d9 f2 99 94 26 | unwrapped: 47 17 80 e3 0f 52 6e 4b 55 d3 35 bf f4 fc fb 0c | unwrapped: a1 11 59 69 3b 6d a9 4f 2c 29 37 03 36 89 3d 0d | unwrapped: 16 f8 be ee 6c b7 01 e2 e9 fd 4e 91 f1 32 ba 28 | unwrapped: 35 4a a5 13 33 55 77 0c 6d b4 80 6d 15 a6 9c 8a | unwrapped: 1f a1 02 bf f6 1c e1 c4 e5 91 23 0b 69 b2 f7 02 | unwrapped: bf d0 20 d8 cc 8a 9c 7c 8c cf d8 60 3a a3 23 5b | unwrapped: d3 27 e0 db ac 59 d1 b8 5c 70 b9 dc 0d eb ef 26 | unwrapped: 99 1e 07 18 94 13 dd 22 53 13 89 a0 1f da fa 70 | unwrapped: ae 0d 28 b7 d4 0a 62 39 00 27 1f 67 94 fb 27 b8 | unwrapped: a2 7a cf 62 75 38 3e 9a 31 8c 68 b2 2d 8f a9 59 | unwrapped: 9f 5f 9a 3f 7f eb 14 af fa 7f 4b f5 dc d6 ec f7 | unwrapped: e3 cb 10 16 1b 10 47 19 f7 d9 a9 1e 3f 60 23 0d | unwrapped: 70 63 fc 9d e6 9e 9c 3c 3d f9 b4 82 ee d4 d0 82 | unwrapped: b7 40 b7 96 f3 ef 72 4c ee 1e 46 8b f9 b6 5b 59 | hmac PRF sha2_256 update data-bytes@0x7ffe19a07d2c (length 1) | 03 | hmac PRF sha2_256 update data-bytes@0x7ffe19a07d2c (length 1) | 03 | hmac PRF sha2_256 update data-bytes@0x5570e4c042d0 (length 4) | b4 0a 24 1d | hmac PRF sha2_256 update data-bytes@0x5570e4c042b0 (length 4) | 15 9e 45 5d | hmac PRF sha2_256 update data-bytes@0x7fa9e0002918 (length 32) | ef 7a 81 6f fe 0f c0 3b dc 16 f5 a9 c5 42 87 88 | 69 94 30 65 c2 10 1c c7 ad ce 59 9f 9e c7 ff 2a | hmac PRF sha2_256 update data-bytes@0x7fa9e0002918 (length 32) | ef 7a 81 6f fe 0f c0 3b dc 16 f5 a9 c5 42 87 88 | 69 94 30 65 c2 10 1c c7 ad ce 59 9f 9e c7 ff 2a | hmac PRF sha2_256 update data-bytes@0x5570e4c03508 (length 32) | a8 07 4a de d9 1e c9 04 93 a4 a1 dd 65 8f 3e bc | 5e 57 d5 38 d8 50 86 08 9f be c0 f3 83 82 9d 3a | hmac PRF sha2_256 update data-bytes@0x5570e4c03508 (length 32) | a8 07 4a de d9 1e c9 04 93 a4 a1 dd 65 8f 3e bc | 5e 57 d5 38 d8 50 86 08 9f be c0 f3 83 82 9d 3a | hmac PRF sha2_256 final-bytes@0x5570e4c160f8 (length 32) | 87 60 73 96 34 26 d8 71 91 b3 7d ca 26 da 94 85 | 71 46 55 54 be 38 c0 92 e1 61 06 93 49 dc f7 4c | hmac PRF sha2_256 final-bytes@0x5570e4c16348 (length 32) | bf d3 df 95 07 e4 9d cf d7 81 82 13 b7 ec da 83 | 99 90 50 79 19 c8 75 1a ff 22 54 f8 a9 5f a5 15 | hmac PRF sha2_256 init symkey-key@0x5570e4bec1c0 (size 32) | hmac: symkey-key@0x5570e4bec1c0 (32-bytes, EXTRACT_KEY_FROM_KEY) | key-offset: 0, key-size: 32 | EXTRACT_KEY_FROM_KEY: | target: SHA256_HMAC | flags: SIGN | key_size: 32-bytes | base: base-key@0x5570e4bec1c0 (32-bytes, EXTRACT_KEY_FROM_KEY) | operation: FLAGS_ONLY | params: 8-bytes@0x7ffe19a07bf8 | result: clone-key@0x5570e4c16390 (32-bytes, SHA256_HMAC) | hmac prf: created sha2_256 context 0x7fa9e00041f0 from symkey-key@0x5570e4c16390 | hmac prf: begin sha2_256 with context 0x7fa9e00041f0 from symkey-key@0x5570e4c16390 | hmac: release clone-key@0x5570e4c16390 | hmac PRF sha2_256 crypt-prf@0x5570e4c05288 | hmac PRF sha2_256 init symkey-key@0x5570e4bec1c0 (size 32) | hmac: symkey-key@0x5570e4bec1c0 (32-bytes, EXTRACT_KEY_FROM_KEY) | key-offset: 0, key-size: 32 | EXTRACT_KEY_FROM_KEY: | target: SHA256_HMAC | flags: SIGN | key_size: 32-bytes | base: base-key@0x5570e4bec1c0 (32-bytes, EXTRACT_KEY_FROM_KEY) | operation: FLAGS_ONLY | params: 8-bytes@0x7ffe19a07bf8 | result: clone-key@0x5570e4c0eb70 (32-bytes, SHA256_HMAC) | hmac prf: created sha2_256 context 0x7fa9d4005890 from symkey-key@0x5570e4c0eb70 | hmac prf: begin sha2_256 with context 0x7fa9d4005890 from symkey-key@0x5570e4c0eb70 | hmac: release clone-key@0x5570e4c0eb70 | hmac PRF sha2_256 crypt-prf@0x5570e4c06798 | hmac PRF sha2_256 update data-bytes@0x5570e4c160f8 (length 32) | 87 60 73 96 34 26 d8 71 91 b3 7d ca 26 da 94 85 | 71 46 55 54 be 38 c0 92 e1 61 06 93 49 dc f7 4c | hmac PRF sha2_256 update data-bytes@0x5570e4c16348 (length 32) | bf d3 df 95 07 e4 9d cf d7 81 82 13 b7 ec da 83 | 99 90 50 79 19 c8 75 1a ff 22 54 f8 a9 5f a5 15 | hmac PRF sha2_256 update g^xy-key@0x5570e4c05500 (size 256) | hmac: g^xy-key@0x5570e4c05500 (256-bytes, CONCATENATE_DATA_AND_BASE) | nss hmac digest hack extracting all 256 bytes of key@0x5570e4c05500 | nss hmac digest hack: symkey-key@0x5570e4c05500 (256-bytes, CONCATENATE_DATA_AND_BASE) | : ephemeral-key@0x5570e4b65080 (16-bytes, AES_KEY_GEN) | nss hmac digest hack: new slot-key@0x5570e4be8ee0 (256-bytes, CONCATENATE_DATA_AND_BASE) | sizeof bytes 256 | wrapper: (SECItemType)-464375087: c6 37 c0 7f f9 9a ed 43 dd e3 50 f4 b6 f4 fc 91 20 d5 e1 cf 53 99 c6 59 e5 66 98 71 e1 9d b8 85 19 f1 96 b6 c1 d5 e7 31 52 e7 45 3a dd f1 8b f5 76 78 6d 50 3a 16 73 a6 20 9c 3c a8 2b 1d 6f 52 99 88 88 0f 16 75 e3 6a 82 71 ba 85 df ca e7 a8 76 e7 26 33 bd fa b0 25 c6 30 5b 1f 5e 1b 45 af 29 aa 80 82 0d ba 8c b6 6b d4 af fb 81 7e ce fa d0 1a ab 89 29 60 0a ed ed f1 6e 19 c2 6c f1 e6 8f 63 cd 84 37 75 a6 b4 78 bd 28 c5 b3 24 7f 64 8f 4e 50 63 64 92 db 29 ff f3 30 eb d8 a8 7a fe 3d 12 ce 83 20 b8 29 d2 de f4 78 f1 75 64 09 2d e6 81 22 8d fe 34 9e 96 92 0e 8d cb f0 2d b5 97 3e 2d 68 8d 5a d9 16 bd c4 4b 09 be 74 48 6e ad 90 d0 1e 9f 20 6d 62 37 14 5f 3f 15 2e 04 06 1f 5a 38 c1 87 52 ce 22 9e 64 bc 59 97 66 93 d2 83 03 08 29 3f 60 83 de 06 c9 bc 89 74 b2 e4 03 d8 | nss hmac digest hack: release slot-key-key@0x5570e4be8ee0 | nss hmac digest hack extracted len 256 bytes at 0x5570e4c19c98 | unwrapped: 60 17 91 07 f0 13 14 ff 02 0a 8c 2e 8e 4e d4 77 | unwrapped: 49 39 0e f9 5b 7f 3e 55 67 9a 46 d9 f2 99 94 26 | unwrapped: 47 17 80 e3 0f 52 6e 4b 55 d3 35 bf f4 fc fb 0c | unwrapped: a1 11 59 69 3b 6d a9 4f 2c 29 37 03 36 89 3d 0d | unwrapped: 16 f8 be ee 6c b7 01 e2 e9 fd 4e 91 f1 32 ba 28 | unwrapped: 35 4a a5 13 33 55 77 0c 6d b4 80 6d 15 a6 9c 8a | unwrapped: 1f a1 02 bf f6 1c e1 c4 e5 91 23 0b 69 b2 f7 02 | unwrapped: bf d0 20 d8 cc 8a 9c 7c 8c cf d8 60 3a a3 23 5b | unwrapped: d3 27 e0 db ac 59 d1 b8 5c 70 b9 dc 0d eb ef 26 | unwrapped: 99 1e 07 18 94 13 dd 22 53 13 89 a0 1f da fa 70 | unwrapped: ae 0d 28 b7 d4 0a 62 39 00 27 1f 67 94 fb 27 b8 | unwrapped: a2 7a cf 62 75 38 3e 9a 31 8c 68 b2 2d 8f a9 59 | unwrapped: 9f 5f 9a 3f 7f eb 14 af fa 7f 4b f5 dc d6 ec f7 | unwrapped: e3 cb 10 16 1b 10 47 19 f7 d9 a9 1e 3f 60 23 0d | unwrapped: 70 63 fc 9d e6 9e 9c 3c 3d f9 b4 82 ee d4 d0 82 | unwrapped: b7 40 b7 96 f3 ef 72 4c ee 1e 46 8b f9 b6 5b 59 | hmac PRF sha2_256 update g^xy-key@0x5570e4c05500 (size 256) | hmac: g^xy-key@0x5570e4c05500 (256-bytes, CONCATENATE_DATA_AND_BASE) | nss hmac digest hack extracting all 256 bytes of key@0x5570e4c05500 | nss hmac digest hack: symkey-key@0x5570e4c05500 (256-bytes, CONCATENATE_DATA_AND_BASE) | : ephemeral-key@0x5570e4b65080 (16-bytes, AES_KEY_GEN) | nss hmac digest hack: new slot-key@0x5570e4be8ee0 (256-bytes, CONCATENATE_DATA_AND_BASE) | sizeof bytes 256 | wrapper: (SECItemType)-464375087: c6 37 c0 7f f9 9a ed 43 dd e3 50 f4 b6 f4 fc 91 20 d5 e1 cf 53 99 c6 59 e5 66 98 71 e1 9d b8 85 19 f1 96 b6 c1 d5 e7 31 52 e7 45 3a dd f1 8b f5 76 78 6d 50 3a 16 73 a6 20 9c 3c a8 2b 1d 6f 52 99 88 88 0f 16 75 e3 6a 82 71 ba 85 df ca e7 a8 76 e7 26 33 bd fa b0 25 c6 30 5b 1f 5e 1b 45 af 29 aa 80 82 0d ba 8c b6 6b d4 af fb 81 7e ce fa d0 1a ab 89 29 60 0a ed ed f1 6e 19 c2 6c f1 e6 8f 63 cd 84 37 75 a6 b4 78 bd 28 c5 b3 24 7f 64 8f 4e 50 63 64 92 db 29 ff f3 30 eb d8 a8 7a fe 3d 12 ce 83 20 b8 29 d2 de f4 78 f1 75 64 09 2d e6 81 22 8d fe 34 9e 96 92 0e 8d cb f0 2d b5 97 3e 2d 68 8d 5a d9 16 bd c4 4b 09 be 74 48 6e ad 90 d0 1e 9f 20 6d 62 37 14 5f 3f 15 2e 04 06 1f 5a 38 c1 87 52 ce 22 9e 64 bc 59 97 66 93 d2 83 03 08 29 3f 60 83 de 06 c9 bc 89 74 b2 e4 03 d8 | nss hmac digest hack: release slot-key-key@0x5570e4be8ee0 | nss hmac digest hack extracted len 256 bytes at 0x5570e4c19948 | unwrapped: 60 17 91 07 f0 13 14 ff 02 0a 8c 2e 8e 4e d4 77 | unwrapped: 49 39 0e f9 5b 7f 3e 55 67 9a 46 d9 f2 99 94 26 | unwrapped: 47 17 80 e3 0f 52 6e 4b 55 d3 35 bf f4 fc fb 0c | unwrapped: a1 11 59 69 3b 6d a9 4f 2c 29 37 03 36 89 3d 0d | unwrapped: 16 f8 be ee 6c b7 01 e2 e9 fd 4e 91 f1 32 ba 28 | unwrapped: 35 4a a5 13 33 55 77 0c 6d b4 80 6d 15 a6 9c 8a | unwrapped: 1f a1 02 bf f6 1c e1 c4 e5 91 23 0b 69 b2 f7 02 | unwrapped: bf d0 20 d8 cc 8a 9c 7c 8c cf d8 60 3a a3 23 5b | unwrapped: d3 27 e0 db ac 59 d1 b8 5c 70 b9 dc 0d eb ef 26 | unwrapped: 99 1e 07 18 94 13 dd 22 53 13 89 a0 1f da fa 70 | unwrapped: ae 0d 28 b7 d4 0a 62 39 00 27 1f 67 94 fb 27 b8 | unwrapped: a2 7a cf 62 75 38 3e 9a 31 8c 68 b2 2d 8f a9 59 | unwrapped: 9f 5f 9a 3f 7f eb 14 af fa 7f 4b f5 dc d6 ec f7 | unwrapped: e3 cb 10 16 1b 10 47 19 f7 d9 a9 1e 3f 60 23 0d | unwrapped: 70 63 fc 9d e6 9e 9c 3c 3d f9 b4 82 ee d4 d0 82 | unwrapped: b7 40 b7 96 f3 ef 72 4c ee 1e 46 8b f9 b6 5b 59 | hmac PRF sha2_256 update data-bytes@0x7ffe19a07d2c (length 1) | 03 | hmac PRF sha2_256 update data-bytes@0x7ffe19a07d2c (length 1) | 03 | hmac PRF sha2_256 update data-bytes@0x5570e4c042d0 (length 4) | b4 0a 24 1d | hmac PRF sha2_256 update data-bytes@0x5570e4c042b0 (length 4) | 15 9e 45 5d | hmac PRF sha2_256 update data-bytes@0x7fa9e0002918 (length 32) | ef 7a 81 6f fe 0f c0 3b dc 16 f5 a9 c5 42 87 88 | 69 94 30 65 c2 10 1c c7 ad ce 59 9f 9e c7 ff 2a | hmac PRF sha2_256 update data-bytes@0x7fa9e0002918 (length 32) | ef 7a 81 6f fe 0f c0 3b dc 16 f5 a9 c5 42 87 88 | 69 94 30 65 c2 10 1c c7 ad ce 59 9f 9e c7 ff 2a | hmac PRF sha2_256 update data-bytes@0x5570e4c03508 (length 32) | a8 07 4a de d9 1e c9 04 93 a4 a1 dd 65 8f 3e bc | 5e 57 d5 38 d8 50 86 08 9f be c0 f3 83 82 9d 3a | hmac PRF sha2_256 update data-bytes@0x5570e4c03508 (length 32) | a8 07 4a de d9 1e c9 04 93 a4 a1 dd 65 8f 3e bc | 5e 57 d5 38 d8 50 86 08 9f be c0 f3 83 82 9d 3a | hmac PRF sha2_256 final-bytes@0x5570e4c16118 (length 32) | 32 10 a7 a4 d2 72 e7 eb b7 9f 55 c2 b0 87 eb fe | 26 10 ba 5f b4 8d 33 26 3d 96 a6 34 8c 44 88 b8 | hmac PRF sha2_256 final-bytes@0x5570e4c16368 (length 32) | 74 f2 06 d0 7e af 90 8b 88 04 80 a5 02 54 e3 72 | 0d d5 97 f9 4f 24 29 1b bc 08 62 46 29 c9 20 04 | install_ipsec_sa() for #2: inbound and outbound | could_route called for westnets-eastnet/1x0 (kind=CK_PERMANENT) | FOR_EACH_CONNECTION_... in route_owner | conn westnets-eastnet/1x0 mark 0/00000000, 0/00000000 vs | conn westnets-eastnet/2x0 mark 0/00000000, 0/00000000 | conn westnets-eastnet/1x0 mark 0/00000000, 0/00000000 vs | conn westnets-eastnet/1x0 mark 0/00000000, 0/00000000 | route owner of "westnets-eastnet/1x0" unrouted: "westnets-eastnet/2x0" erouted; eroute owner: NULL | looking for alg with encrypt: AES_CBC keylen: 128 integ: HMAC_SHA1_96 | encrypt AES_CBC keylen=128 transid=12, key_size=16, encryptalg=12 | st->st_esp.keymat_len=36 is encrypt_keymat_size=16 + integ_keymat_size=20 | setting IPsec SA replay-window to 32 | NIC esp-hw-offload not for connection 'westnets-eastnet/1x0' not available on interface eth1 | netlink: enabling tunnel mode | netlink: setting IPsec SA replay-window to 32 using old-style req | netlink: esp-hw-offload not set for IPsec SA | netlink response for Add SA esp.159e455d@192.1.2.23 included non-error error | set up outgoing SA, ref=0/0 | looking for alg with encrypt: AES_CBC keylen: 128 integ: HMAC_SHA1_96 | encrypt AES_CBC keylen=128 transid=12, key_size=16, encryptalg=12 | st->st_esp.keymat_len=36 is encrypt_keymat_size=16 + integ_keymat_size=20 | setting IPsec SA replay-window to 32 | NIC esp-hw-offload not for connection 'westnets-eastnet/1x0' not available on interface eth1 | netlink: enabling tunnel mode | netlink: setting IPsec SA replay-window to 32 using old-style req | netlink: esp-hw-offload not set for IPsec SA | netlink response for Add SA esp.b40a241d@192.1.2.45 included non-error error | priority calculation of connection "westnets-eastnet/1x0" is 0xfe7e7 | add inbound eroute 192.0.2.0/24:0 --0-> 192.0.1.0/24:0 => tun.10000@192.1.2.45 (raw_eroute) | IPsec Sa SPD priority set to 1042407 | raw_eroute result=success | set up incoming SA, ref=0/0 | sr for #2: unrouted | route_and_eroute() for proto 0, and source port 0 dest port 0 | FOR_EACH_CONNECTION_... in route_owner | conn westnets-eastnet/1x0 mark 0/00000000, 0/00000000 vs | conn westnets-eastnet/2x0 mark 0/00000000, 0/00000000 | conn westnets-eastnet/1x0 mark 0/00000000, 0/00000000 vs | conn westnets-eastnet/1x0 mark 0/00000000, 0/00000000 | route owner of "westnets-eastnet/1x0" unrouted: "westnets-eastnet/2x0" erouted; eroute owner: NULL | route_and_eroute with c: westnets-eastnet/1x0 (next: none) ero:null esr:{(nil)} ro:westnets-eastnet/2x0 rosr:{0x5570e4c02e08} and state: #2 | priority calculation of connection "westnets-eastnet/1x0" is 0xfe7e7 | eroute_connection add eroute 192.0.1.0/24:0 --0-> 192.0.2.0/24:0 => tun.0@192.1.2.23 (raw_eroute) | IPsec Sa SPD priority set to 1042407 | raw_eroute result=success | running updown command "ipsec _updown" for verb up | command executing up-client | executing up-client: PLUTO_VERB='up-client' PLUTO_VERSION='2.0' PLUTO_CONNECTION='westnets-eastnet/1x0' PLUTO_INTERFACE='eth1' PLUTO_NEXT_HOP='192.1.2.23' PLUTO_ME='192.1.2.45' PLUTO_MY_ID='@west' PLUTO_MY_CLIENT='192.0.1.0/24' PLUTO_MY_CLIENT_NET='192.0.1.0' PLUTO_MY_CLIENT_MASK='255.255.255.0' PLUTO_MY_PORT='0' PLUTO_MY_PROTOCOL='0' PLUTO_SA_REQID='16388' PLUTO_SA_TYPE='ESP' PLUTO_PEER='192.1.2.23' PLUTO_PEER_ID='@east' PLUTO_PEER_CLIENT='192.0.2.0/24' PLUTO_PEER_CLIENT_NET='192.0.2.0' PLUTO_PEER_CLIENT_MASK='255.255.255.0' PLUTO_PEER_PORT='0' PLUTO_PEER_PROTOCOL='0' PLUTO_PEER_CA='' PLUTO_STACK='netkey' PLUTO_ADDTIME='0' PLUTO_CONN_POLICY='RSASIG+ENCRYPT+TUNNEL+PFS+UP+IKEV1_ALLOW+SAREF_TRACK+IKE_FRAG_ALLOW+ESN_NO' PLUTO_CONN_KIND='CK_PERMANENT' PLUTO_CONN_ADDRFAMILY='ipv4' XAUTH_FAILED=0 PLUTO_IS_PEER_CISCO='0' PLUTO_PEER_DNS_INFO='' PLUTO_PEER_DOMAIN_INFO='' PLUTO_PEER_BANNER='' PLUTO_CFG_SERVER='0' PLUTO_CFG_CLIENT='0' PLUTO_NM_CONFIGURED='0' VTI_IFACE='' VTI_ROUTING='no' VTI_SHARED='no' SPI_IN=0x | popen cmd is 1042 chars long | cmd( 0):PLUTO_VERB='up-client' PLUTO_VERSION='2.0' PLUTO_CONNECTION='westnets-eastnet/1x: | cmd( 80):0' PLUTO_INTERFACE='eth1' PLUTO_NEXT_HOP='192.1.2.23' PLUTO_ME='192.1.2.45' PLUT: | cmd( 160):O_MY_ID='@west' PLUTO_MY_CLIENT='192.0.1.0/24' PLUTO_MY_CLIENT_NET='192.0.1.0' P: | cmd( 240):LUTO_MY_CLIENT_MASK='255.255.255.0' PLUTO_MY_PORT='0' PLUTO_MY_PROTOCOL='0' PLUT: | cmd( 320):O_SA_REQID='16388' PLUTO_SA_TYPE='ESP' PLUTO_PEER='192.1.2.23' PLUTO_PEER_ID='@e: | cmd( 400):ast' PLUTO_PEER_CLIENT='192.0.2.0/24' PLUTO_PEER_CLIENT_NET='192.0.2.0' PLUTO_PE: | cmd( 480):ER_CLIENT_MASK='255.255.255.0' PLUTO_PEER_PORT='0' PLUTO_PEER_PROTOCOL='0' PLUTO: | cmd( 560):_PEER_CA='' PLUTO_STACK='netkey' PLUTO_ADDTIME='0' PLUTO_CONN_POLICY='RSASIG+ENC: | cmd( 640):RYPT+TUNNEL+PFS+UP+IKEV1_ALLOW+SAREF_TRACK+IKE_FRAG_ALLOW+ESN_NO' PLUTO_CONN_KIN: | cmd( 720):D='CK_PERMANENT' PLUTO_CONN_ADDRFAMILY='ipv4' XAUTH_FAILED=0 PLUTO_IS_PEER_CISCO: | cmd( 800):='0' PLUTO_PEER_DNS_INFO='' PLUTO_PEER_DOMAIN_INFO='' PLUTO_PEER_BANNER='' PLUTO: | cmd( 880):_CFG_SERVER='0' PLUTO_CFG_CLIENT='0' PLUTO_NM_CONFIGURED='0' VTI_IFACE='' VTI_RO: | cmd( 960):UTING='no' VTI_SHARED='no' SPI_IN=0x159e455d SPI_OUT=0xb40a241d ipsec _updown 2>: | cmd(1040):&1: | route_and_eroute: firewall_notified: true | route_and_eroute: instance "westnets-eastnet/1x0", setting eroute_owner {spd=0x5570e4c01c18,sr=0x5570e4c01c18} to #2 (was #0) (newest_ipsec_sa=#0) | encrypting: 00 00 00 24 75 99 02 a0 4f f1 1e d7 52 46 23 81 | encrypting: c5 19 e2 1d 9f 82 c9 50 84 ed 1a a0 f4 71 87 c9 | encrypting: c7 d9 84 67 | IV: ed 8f 40 59 62 74 fc 05 07 87 b7 6b d7 e9 7b 8c | unpadded size is: 36 | emitting 12 zero bytes of encryption padding into ISAKMP Message | encrypting 48 using AES_CBC | no IKEv1 message padding required | emitting length of ISAKMP Message: 76 | NSS ike_alg_nss_cbc: aes - enter | NSS ike_alg_nss_cbc: aes - exit | next IV: 2d ff fe fc 0a 2c 8d b2 e0 39 43 a1 5e c1 49 2b | inR1_outI2: instance westnets-eastnet/1x0[0], setting IKEv1 newest_ipsec_sa to #2 (was #0) (spd.eroute=#2) cloned from #1 | DPD: dpd_init() called on IPsec SA | DPD: Peer does not support Dead Peer Detection | complete v1 state transition with STF_OK | [RE]START processing: state #2 connection "westnets-eastnet/1x0" from 192.1.2.23 (in complete_v1_state_transition() at ikev1.c:2673) | #2 is idle | doing_xauth:no, t_xauth_client_done:no | IKEv1: transition from state STATE_QUICK_I1 to state STATE_QUICK_I2 | child state #2: QUICK_I1(established CHILD SA) => QUICK_I2(established CHILD SA) | event_already_set, deleting event | state #2 requesting EVENT_CRYPTO_TIMEOUT to be deleted | libevent_free: release ptr-libevent@0x5570e4c0e8e8 | free_event_entry: release EVENT_CRYPTO_TIMEOUT-pe@0x7fa9e4002b78 | sending reply packet to 192.1.2.23:500 (from 192.1.2.45:500) | sending 76 bytes for STATE_QUICK_I1 through eth1 from 192.1.2.45:500 to 192.1.2.23:500 (using #2) | 9f 65 42 37 54 9b 07 77 c4 88 e3 f7 e7 56 66 9c | 08 10 20 01 90 4e 76 08 00 00 00 4c 43 b2 62 14 | 36 7f e1 8e ea 29 98 b9 13 e1 bb 7f ed 83 29 11 | 7b 93 a0 b7 7b 97 13 3c 7f 4f 62 62 2d ff fe fc | 0a 2c 8d b2 e0 39 43 a1 5e c1 49 2b | !event_already_set at reschedule | event_schedule: new EVENT_SA_REPLACE-pe@0x7fa9e4002b78 | inserting event EVENT_SA_REPLACE, timeout in 27838 seconds for #2 | libevent_malloc: new ptr-libevent@0x7fa9d8001f78 size 128 | pstats #2 ikev1.ipsec established | NAT-T: encaps is 'auto' "westnets-eastnet/1x0" #2: STATE_QUICK_I2: sent QI2, IPsec SA established tunnel mode {ESP=>0x159e455d <0xb40a241d xfrm=AES_CBC_128-HMAC_SHA1_96 NATOA=none NATD=none DPD=passive} | modecfg pull: noquirk policy:push not-client | phase 1 is done, looking for phase 2 to unpend | close_any(fd@28) (in release_whack() at state.c:654) | resume sending helper answer for #2 suppresed complete_v1_state_transition() | stop processing: state #2 connection "westnets-eastnet/1x0" from 192.1.2.23 (in resume_handler() at server.c:833) | libevent_free: release ptr-libevent@0x7fa9cc001f78 | processing signal PLUTO_SIGCHLD | waitpid returned ECHILD (no child processes left) | processing signal PLUTO_SIGCHLD | waitpid returned ECHILD (no child processes left) | processing signal PLUTO_SIGCHLD | waitpid returned ECHILD (no child processes left) | processing signal PLUTO_SIGCHLD | waitpid returned ECHILD (no child processes left) | accept(whackctlfd, (struct sockaddr *)&whackaddr, &whackaddrlen) -> fd@16 (in whack_handle() at rcv_whack.c:722) | FOR_EACH_STATE_... in show_traffic_status (sort_states) | FOR_EACH_STATE_... in sort_states | get_sa_info esp.b40a241d@192.1.2.45 | get_sa_info esp.159e455d@192.1.2.23 | get_sa_info esp.ff124bc8@192.1.2.45 | get_sa_info esp.d9a15cc9@192.1.2.23 | close_any(fd@16) (in whack_process() at rcv_whack.c:700) | accept(whackctlfd, (struct sockaddr *)&whackaddr, &whackaddrlen) -> fd@16 (in whack_handle() at rcv_whack.c:722) | FOR_EACH_CONNECTION_... in show_connections_status | FOR_EACH_CONNECTION_... in show_connections_status | FOR_EACH_STATE_... in show_states_status (sort_states) | FOR_EACH_STATE_... in sort_states | get_sa_info esp.b40a241d@192.1.2.45 | get_sa_info esp.159e455d@192.1.2.23 | get_sa_info esp.ff124bc8@192.1.2.45 | get_sa_info esp.d9a15cc9@192.1.2.23 | close_any(fd@16) (in whack_process() at rcv_whack.c:700) | *received 92 bytes from 192.1.2.23:500 on eth1 (192.1.2.45:500) | 9f 65 42 37 54 9b 07 77 c4 88 e3 f7 e7 56 66 9c | 08 10 05 01 35 37 25 9e 00 00 00 5c 7a 80 22 65 | 7c f5 0f bf 9a af 2f 66 84 d2 1c 91 8c d1 e0 99 | c1 2e 38 82 9c e3 3f b7 b9 bd 1f 82 06 85 a7 1f | ce 26 c6 08 d2 a9 5a 8a 9a f8 0f 7a 7e 96 67 d8 | b2 80 1c 55 ff 0a cc e7 48 da 42 ac | start processing: from 192.1.2.23:500 (in process_md() at demux.c:378) | **parse ISAKMP Message: | initiator cookie: | 9f 65 42 37 54 9b 07 77 | responder cookie: | c4 88 e3 f7 e7 56 66 9c | next payload type: ISAKMP_NEXT_HASH (0x8) | ISAKMP version: ISAKMP Version 1.0 (rfc2407) (0x10) | exchange type: ISAKMP_XCHG_INFO (0x5) | flags: ISAKMP_FLAG_v1_ENCRYPTION (0x1) | Message ID: 892806558 (0x3537259e) | length: 92 (0x5c) | processing version=1.0 packet with exchange type=ISAKMP_XCHG_INFO (5) | peer and cookies match on #3; msgid=00000000 st_msgid=757ce58f st_msgid_phase15=00000000 | peer and cookies match on #2; msgid=00000000 st_msgid=904e7608 st_msgid_phase15=00000000 | peer and cookies match on #1; msgid=00000000 st_msgid=00000000 st_msgid_phase15=00000000 | p15 state object #1 found, in STATE_MAIN_I4 | State DB: found IKEv1 state #1 in MAIN_I4 (find_v1_info_state) | start processing: state #1 connection "westnets-eastnet/2x0" from 192.1.2.23 (in process_v1_packet() at ikev1.c:1479) | last Phase 1 IV: c4 de d8 a6 42 0d c2 6b 1d b3 07 ce d1 0b 22 13 | current Phase 1 IV: c4 de d8 a6 42 0d c2 6b 1d b3 07 ce d1 0b 22 13 | Phase 2 IV hash sha2_256 init | Phase 2 IV hash sha2_256 digest PH1_IV-bytes@0x5570e4c03a68 (length 16) | c4 de d8 a6 42 0d c2 6b 1d b3 07 ce d1 0b 22 13 | Phase 2 IV hash sha2_256 digest MSGID-bytes@0x7ffe19a0842c (length 4) | 35 37 25 9e | Phase 2 IV hash sha2_256 final bytes@0x5570e4c039e8 (length 32) | e8 a2 ef 10 f6 a2 18 73 e8 d4 b6 d5 e2 1d a1 49 | 0d 75 e9 42 60 e4 30 a8 73 6f 25 64 e9 b6 4a ef | #1 is idle | #1 idle | received encrypted packet from 192.1.2.23:500 | decrypting 64 bytes using algorithm AES_CBC | IV before: e8 a2 ef 10 f6 a2 18 73 e8 d4 b6 d5 e2 1d a1 49 | NSS ike_alg_nss_cbc: aes - enter | NSS ike_alg_nss_cbc: aes - exit | IV after: 7e 96 67 d8 b2 80 1c 55 ff 0a cc e7 48 da 42 ac | decrypted payload (starts at offset -64): | 9f 65 42 37 54 9b 07 77 c4 88 e3 f7 e7 56 66 9c | 08 10 05 01 35 37 25 9e 00 00 00 5c 0c 00 00 24 | 5a ff 24 4c cb 9d 05 5c 0d 91 33 a8 95 e1 6f 6b | 58 5e 4d a3 cf 5e 9b 6e 25 5d 1e 59 a4 13 17 0c | 00 00 00 10 00 00 00 01 03 04 00 01 d9 a1 5c c9 | 00 00 00 00 00 00 00 00 00 00 00 00 | got payload 0x100 (ISAKMP_NEXT_HASH) needed: 0x100 opt: 0x0 | ***parse ISAKMP Hash Payload: | next payload type: ISAKMP_NEXT_D (0xc) | length: 36 (0x24) | got payload 0x1000 (ISAKMP_NEXT_D) needed: 0x0 opt: 0x0 | ***parse ISAKMP Delete Payload: | next payload type: ISAKMP_NEXT_NONE (0x0) | length: 16 (0x10) | DOI: ISAKMP_DOI_IPSEC (0x1) | protocol ID: 3 (0x3) | SPI size: 4 (0x4) | number of SPIs: 1 (0x1) | removing 12 bytes of padding | HASH(1) PRF sha2_256 init SKEYID_a-key@0x5570e4be4dc0 (size 32) | HASH(1): SKEYID_a-key@0x5570e4be4dc0 (32-bytes, EXTRACT_KEY_FROM_KEY) | key-offset: 0, key-size: 32 | EXTRACT_KEY_FROM_KEY: | target: SHA256_HMAC | flags: SIGN | key_size: 32-bytes | base: base-key@0x5570e4be4dc0 (32-bytes, EXTRACT_KEY_FROM_KEY) | operation: FLAGS_ONLY | params: 8-bytes@0x7ffe19a08188 | result: clone-key@0x5570e4c0eb70 (32-bytes, SHA256_HMAC) | HASH(1) prf: created sha2_256 context 0x7fa9d4005890 from SKEYID_a-key@0x5570e4c0eb70 | HASH(1) prf: begin sha2_256 with context 0x7fa9d4005890 from SKEYID_a-key@0x5570e4c0eb70 | HASH(1): release clone-key@0x5570e4c0eb70 | HASH(1) PRF sha2_256 crypt-prf@0x5570e4c06798 | HASH(1) PRF sha2_256 update M-ID-bytes@0x7ffe19a0826c (length 4) | 35 37 25 9e | HASH(1) PRF sha2_256 update payload-bytes@0x5570e4c162d8 (length 16) | 00 00 00 10 00 00 00 01 03 04 00 01 d9 a1 5c c9 | HASH(1) PRF sha2_256 final-bytes@0x7ffe19a082f0 (length 32) | 5a ff 24 4c cb 9d 05 5c 0d 91 33 a8 95 e1 6f 6b | 58 5e 4d a3 cf 5e 9b 6e 25 5d 1e 59 a4 13 17 0c | informational HASH(1): | 5a ff 24 4c cb 9d 05 5c 0d 91 33 a8 95 e1 6f 6b | 58 5e 4d a3 cf 5e 9b 6e 25 5d 1e 59 a4 13 17 0c | received 'informational' message HASH(1) data ok | parsing 4 raw bytes of ISAKMP Delete Payload into SPI | SPI d9 a1 5c c9 | FOR_EACH_STATE_... in find_phase2_state_to_delete | start processing: connection "westnets-eastnet/2x0" (BACKGROUND) (in accept_delete() at ikev1_main.c:2515) "westnets-eastnet/2x0" #1: received Delete SA payload: replace IPsec State #3 now | state #3 requesting EVENT_SA_REPLACE to be deleted | libevent_free: release ptr-libevent@0x5570e4c15ee8 | free_event_entry: release EVENT_SA_REPLACE-pe@0x5570e4c064d8 | event_schedule: new EVENT_SA_REPLACE-pe@0x5570e4c064d8 | inserting event EVENT_SA_REPLACE, timeout in 0 seconds for #3 | libevent_malloc: new ptr-libevent@0x7fa9cc001f78 size 128 | stop processing: connection "westnets-eastnet/2x0" (BACKGROUND) (in accept_delete() at ikev1_main.c:2559) | del: | complete v1 state transition with STF_IGNORE | stop processing: from 192.1.2.23:500 (BACKGROUND) (in process_md() at demux.c:380) | stop processing: state #1 connection "westnets-eastnet/2x0" from 192.1.2.23 (in process_md() at demux.c:382) | processing: STOP connection NULL (in process_md() at demux.c:383) | timer_event_cb: processing event@0x5570e4c064d8 | handling event EVENT_SA_REPLACE for child state #3 | start processing: state #3 connection "westnets-eastnet/2x0" from 192.1.2.23 (in timer_event_cb() at timer.c:250) | picked newest_ipsec_sa #3 for #3 | replacing stale IPsec SA | dup_any(fd@-1) -> fd@-1 (in ipsecdoi_replace() at ipsec_doi.c:351) | FOR_EACH_STATE_... in find_phase1_state | creating state object #4 at 0x5570e4c0ae28 | State DB: adding IKEv1 state #4 in UNDEFINED | pstats #4 ikev1.ipsec started | duplicating state object #1 "westnets-eastnet/2x0" as #4 for IPSEC SA | #4 setting local endpoint to 192.1.2.45:500 from #1.st_localport (in duplicate_state() at state.c:1484) | duplicate_state: reference st_skeyid_nss-key@0x5570e4bedc70 | duplicate_state: reference st_skey_d_nss-key@0x5570e4bec1c0 | duplicate_state: reference st_skey_ai_nss-key@0x5570e4be4dc0 | duplicate_state: reference st_skey_ar_nss-key@NULL | duplicate_state: reference st_skey_ei_nss-key@0x5570e4befab0 | duplicate_state: reference st_skey_er_nss-key@NULL | duplicate_state: reference st_skey_pi_nss-key@NULL | duplicate_state: reference st_skey_pr_nss-key@NULL | duplicate_state: reference st_enc_key_nss-key@0x5570e4be6640 | duplicate_state: reference st_sk_d_no_ppk-key@NULL | duplicate_state: reference st_sk_pi_no_ppk-key@NULL | duplicate_state: reference st_sk_pr_no_ppk-key@NULL | suspend processing: state #3 connection "westnets-eastnet/2x0" from 192.1.2.23 (in quick_outI1() at ikev1_quick.c:685) | start processing: state #4 connection "westnets-eastnet/2x0" from 192.1.2.23 (in quick_outI1() at ikev1_quick.c:685) | child state #4: UNDEFINED(ignore) => QUICK_I1(established CHILD SA) "westnets-eastnet/2x0" #4: initiating Quick Mode RSASIG+ENCRYPT+TUNNEL+PFS+UP+IKEV1_ALLOW+SAREF_TRACK+IKE_FRAG_ALLOW+ESN_NO to replace #3 {using isakmp#1 msgid:a554ee0d proposal=defaults pfsgroup=MODP2048} | adding quick_outI1 KE work-order 7 for state #4 | event_schedule: new EVENT_CRYPTO_TIMEOUT-pe@0x7fa9d40058b8 | inserting event EVENT_CRYPTO_TIMEOUT, timeout in 60 seconds for #4 | libevent_malloc: new ptr-libevent@0x5570e4b87ef8 size 128 | stop processing: state #4 connection "westnets-eastnet/2x0" from 192.1.2.23 (in quick_outI1() at ikev1_quick.c:764) | resume processing: state #3 connection "westnets-eastnet/2x0" from 192.1.2.23 (in quick_outI1() at ikev1_quick.c:764) | crypto helper 6 resuming | event_schedule: new EVENT_SA_EXPIRE-pe@0x7fa9e0004218 | crypto helper 6 starting work-order 7 for state #4 | inserting event EVENT_SA_EXPIRE, timeout in 0 seconds for #3 | libevent_malloc: new ptr-libevent@0x5570e4c0d2e8 size 128 | crypto helper 6 doing build KE and nonce (quick_outI1 KE); request ID 7 | libevent_free: release ptr-libevent@0x7fa9cc001f78 | free_event_entry: release EVENT_SA_REPLACE-pe@0x5570e4c064d8 | stop processing: state #3 connection "westnets-eastnet/2x0" from 192.1.2.23 (in timer_event_cb() at timer.c:557) | timer_event_cb: processing event@0x7fa9e0004218 | handling event EVENT_SA_EXPIRE for child state #3 | start processing: state #3 connection "westnets-eastnet/2x0" from 192.1.2.23 (in timer_event_cb() at timer.c:250) | picked newest_ipsec_sa #3 for #3 | un-established partial CHILD SA timeout (SA expired) | pstats #3 ikev1.ipsec re-failed exchange-timeout | pstats #3 ikev1.ipsec deleted completed | NSS: Value of Prime: | ff ff ff ff ff ff ff ff c9 0f da a2 21 68 c2 34 | c4 c6 62 8b 80 dc 1c d1 29 02 4e 08 8a 67 cc 74 | 02 0b be a6 3b 13 9b 22 51 4a 08 79 8e 34 04 dd | [RE]START processing: state #3 connection "westnets-eastnet/2x0" from 192.1.2.23 (in delete_state() at state.c:879) | ef 95 19 b3 cd 3a 43 1b 30 2b 0a 6d f2 5f 14 37 | 4f e1 35 6d 6d 51 c2 45 e4 85 b5 76 62 5e 7e c6 "westnets-eastnet/2x0" #3: deleting state (STATE_QUICK_I2) aged 7.211s and sending notification | f4 4c 42 e9 a6 37 ed 6b 0b ff 5c b6 f4 06 b7 ed | child state #3: QUICK_I2(established CHILD SA) => delete | ee 38 6b fb 5a 89 9f a5 ae 9f 24 11 7c 4b 1f e6 | 49 28 66 51 ec e4 5b 3d c2 00 7c b8 a1 63 bf 05 | 98 da 48 36 1c 55 d3 9a 69 16 3f a8 fd 24 cf 5f | 83 65 5d 23 dc a3 ad 96 1c 62 f3 56 20 85 52 bb | get_sa_info esp.d9a15cc9@192.1.2.23 | 9e d5 29 07 70 96 96 6d 67 0c 35 4e 4a bc 98 04 | f1 74 6c 08 ca 18 21 7c 32 90 5e 46 2e 36 ce 3b | e3 9e 77 2c 18 0e 86 03 9b 27 83 a2 ec 07 a2 8f | b5 c5 5d f0 6f 4c 52 c9 de 2b cb f6 95 58 17 18 | 39 95 49 7c ea 95 6a e5 15 d2 26 18 98 fa 05 10 | 15 72 8e 5a 8a ac aa 68 ff ff ff ff ff ff ff ff | NSS: Value of base: 02 | get_sa_info esp.ff124bc8@192.1.2.45 "westnets-eastnet/2x0" #3: ESP traffic information: in=336B out=336B | #3 send IKEv1 delete notification for STATE_QUICK_I2 | FOR_EACH_STATE_... in find_phase1_state | **emit ISAKMP Message: | initiator cookie: | 9f 65 42 37 54 9b 07 77 | responder cookie: | c4 88 e3 f7 e7 56 66 9c | next payload type: ISAKMP_NEXT_NONE (0x0) | ISAKMP version: ISAKMP Version 1.0 (rfc2407) (0x10) | exchange type: ISAKMP_XCHG_INFO (0x5) | flags: ISAKMP_FLAG_v1_ENCRYPTION (0x1) | Message ID: 1664820272 (0x633b2430) | next payload chain: saving message location 'ISAKMP Message'.'next payload type' | ***emit ISAKMP Hash Payload: | next payload type: ISAKMP_NEXT_NONE (0x0) | next payload chain: setting previous 'ISAKMP Message'.'next payload type' to current ISAKMP Hash Payload (8:ISAKMP_NEXT_HASH) | next payload chain: saving location 'ISAKMP Hash Payload'.'next payload type' in 'delete msg' | emitting 32 zero bytes of HASH DATA into ISAKMP Hash Payload | emitting length of ISAKMP Hash Payload: 36 | ***emit ISAKMP Delete Payload: | next payload type: ISAKMP_NEXT_NONE (0x0) | DOI: ISAKMP_DOI_IPSEC (0x1) | protocol ID: 3 (0x3) | SPI size: 4 (0x4) | number of SPIs: 1 (0x1) | next payload chain: setting previous 'ISAKMP Hash Payload'.'next payload type' to current ISAKMP Delete Payload (12:ISAKMP_NEXT_D) | next payload chain: saving location 'ISAKMP Delete Payload'.'next payload type' in 'delete msg' | emitting 4 raw bytes of delete payload into ISAKMP Delete Payload | delete payload ff 12 4b c8 | emitting length of ISAKMP Delete Payload: 16 | HASH(1) PRF sha2_256 init SKEYID_a-key@0x5570e4be4dc0 (size 32) | HASH(1): SKEYID_a-key@0x5570e4be4dc0 (32-bytes, EXTRACT_KEY_FROM_KEY) | key-offset: 0, key-size: 32 | EXTRACT_KEY_FROM_KEY: | target: SHA256_HMAC | flags: SIGN | key_size: 32-bytes | base: base-key@0x5570e4be4dc0 (32-bytes, EXTRACT_KEY_FROM_KEY) | operation: FLAGS_ONLY | params: 8-bytes@0x7ffe19a05c58 | result: clone-key@0x5570e4c0eb70 (32-bytes, SHA256_HMAC) | HASH(1) prf: created sha2_256 context 0x5570e4c064b0 from SKEYID_a-key@0x5570e4c0eb70 | HASH(1) prf: begin sha2_256 with context 0x5570e4c064b0 from SKEYID_a-key@0x5570e4c0eb70 | HASH(1): release clone-key@0x5570e4c0eb70 | HASH(1) PRF sha2_256 crypt-prf@0x5570e4c054d8 | HASH(1) PRF sha2_256 update M-ID-bytes@0x7ffe19a05d3c (length 4) | 63 3b 24 30 | HASH(1) PRF sha2_256 update payload-bytes@0x7ffe19a060f0 (length 16) | 00 00 00 10 00 00 00 01 03 04 00 01 ff 12 4b c8 | HASH(1) PRF sha2_256 final-bytes@0x7ffe19a060d0 (length 32) | 14 68 62 81 b8 b0 f6 f6 5d 27 34 af 08 66 9d 9b | 65 af ff 15 c9 96 95 86 d4 f9 15 45 d5 d5 ee 5d | send delete HASH(1): | 14 68 62 81 b8 b0 f6 f6 5d 27 34 af 08 66 9d 9b | 65 af ff 15 c9 96 95 86 d4 f9 15 45 d5 d5 ee 5d | last Phase 1 IV: c4 de d8 a6 42 0d c2 6b 1d b3 07 ce d1 0b 22 13 | current Phase 1 IV: c4 de d8 a6 42 0d c2 6b 1d b3 07 ce d1 0b 22 13 | Phase 2 IV hash sha2_256 init | Phase 2 IV hash sha2_256 digest PH1_IV-bytes@0x5570e4c03a68 (length 16) | c4 de d8 a6 42 0d c2 6b 1d b3 07 ce d1 0b 22 13 | Phase 2 IV hash sha2_256 digest MSGID-bytes@0x7ffe19a05d4c (length 4) | 63 3b 24 30 | Phase 2 IV hash sha2_256 final bytes@0x5570e4c039e8 (length 32) | 29 53 a6 c1 39 d6 7e 99 fc 42 b0 9b eb c6 16 6b | 09 f4 e1 d3 6c 36 f6 67 9b ac 79 e1 f3 d6 b6 47 | encrypting: 0c 00 00 24 14 68 62 81 b8 b0 f6 f6 5d 27 34 af | encrypting: 08 66 9d 9b 65 af ff 15 c9 96 95 86 d4 f9 15 45 | encrypting: d5 d5 ee 5d 00 00 00 10 00 00 00 01 03 04 00 01 | encrypting: ff 12 4b c8 | IV: 29 53 a6 c1 39 d6 7e 99 fc 42 b0 9b eb c6 16 6b | IV: 09 f4 e1 d3 6c 36 f6 67 9b ac 79 e1 f3 d6 b6 47 | unpadded size is: 52 | emitting 12 zero bytes of encryption padding into ISAKMP Message | encrypting 64 using AES_CBC | no IKEv1 message padding required | emitting length of ISAKMP Message: 92 | NSS ike_alg_nss_cbc: aes - enter | NSS ike_alg_nss_cbc: aes - exit | next IV: 10 42 25 8a ff f6 52 1a de d3 84 5f 62 08 aa ff | sending 92 bytes for delete notify through eth1 from 192.1.2.45:500 to 192.1.2.23:500 (using #1) | 9f 65 42 37 54 9b 07 77 c4 88 e3 f7 e7 56 66 9c | 08 10 05 01 63 3b 24 30 00 00 00 5c b6 b5 fe a2 | 1a 7b 63 d3 75 d8 3f fa 51 fa cb fc c5 85 00 55 | c0 c9 60 81 74 ed 09 70 60 c1 26 4b 29 84 92 73 | 1b 0e fe 3a e2 27 f3 78 5a 50 e3 15 10 42 25 8a | ff f6 52 1a de d3 84 5f 62 08 aa ff | running updown command "ipsec _updown" for verb down | command executing down-client | executing down-client: PLUTO_VERB='down-client' PLUTO_VERSION='2.0' PLUTO_CONNECTION='westnets-eastnet/2x0' PLUTO_INTERFACE='eth1' PLUTO_NEXT_HOP='192.1.2.23' PLUTO_ME='192.1.2.45' PLUTO_MY_ID='@west' PLUTO_MY_CLIENT='192.0.11.0/24' PLUTO_MY_CLIENT_NET='192.0.11.0' PLUTO_MY_CLIENT_MASK='255.255.255.0' PLUTO_MY_PORT='0' PLUTO_MY_PROTOCOL='0' PLUTO_SA_REQID='16392' PLUTO_SA_TYPE='ESP' PLUTO_PEER='192.1.2.23' PLUTO_PEER_ID='@east' PLUTO_PEER_CLIENT='192.0.2.0/24' PLUTO_PEER_CLIENT_NET='192.0.2.0' PLUTO_PEER_CLIENT_MASK='255.255.255.0' PLUTO_PEER_PORT='0' PLUTO_PEER_PROTOCOL='0' PLUTO_PEER_CA='' PLUTO_STACK='netkey' PLUTO_ADDTIME='1566826057' PLUTO_CONN_POLICY='RSASIG+ENCRYPT+TUNNEL+PFS+UP+IKEV1_ALLOW+SAREF_TRACK+IKE_FRAG_ALLOW+ESN_NO' PLUTO_CONN_KIND='CK_PERMANENT' PLUTO_CONN_ADDRFAMILY='ipv4' XAUTH_FAILED=0 PLUTO_IS_PEER_CISCO='0' PLUTO_PEER_DNS_INFO='' PLUTO_PEER_DOMAIN_INFO='' PLUTO_PEER_BANNER='' PLUTO_CFG_SERVER='0' PLUTO_CFG_CLIENT='0' PLUTO_NM_CONFIGURED='0' VTI_IFACE='' VTI_ROUTING='no' VTI_SHARED | popen cmd is 1055 chars long | cmd( 0):PLUTO_VERB='down-client' PLUTO_VERSION='2.0' PLUTO_CONNECTION='westnets-eastnet/: | cmd( 80):2x0' PLUTO_INTERFACE='eth1' PLUTO_NEXT_HOP='192.1.2.23' PLUTO_ME='192.1.2.45' PL: | cmd( 160):UTO_MY_ID='@west' PLUTO_MY_CLIENT='192.0.11.0/24' PLUTO_MY_CLIENT_NET='192.0.11.: | cmd( 240):0' PLUTO_MY_CLIENT_MASK='255.255.255.0' PLUTO_MY_PORT='0' PLUTO_MY_PROTOCOL='0' : | cmd( 320):PLUTO_SA_REQID='16392' PLUTO_SA_TYPE='ESP' PLUTO_PEER='192.1.2.23' PLUTO_PEER_ID: | cmd( 400):='@east' PLUTO_PEER_CLIENT='192.0.2.0/24' PLUTO_PEER_CLIENT_NET='192.0.2.0' PLUT: | cmd( 480):O_PEER_CLIENT_MASK='255.255.255.0' PLUTO_PEER_PORT='0' PLUTO_PEER_PROTOCOL='0' P: | cmd( 560):LUTO_PEER_CA='' PLUTO_STACK='netkey' PLUTO_ADDTIME='1566826057' PLUTO_CONN_POLIC: | cmd( 640):Y='RSASIG+ENCRYPT+TUNNEL+PFS+UP+IKEV1_ALLOW+SAREF_TRACK+IKE_FRAG_ALLOW+ESN_NO' P: | cmd( 720):LUTO_CONN_KIND='CK_PERMANENT' PLUTO_CONN_ADDRFAMILY='ipv4' XAUTH_FAILED=0 PLUTO_: | cmd( 800):IS_PEER_CISCO='0' PLUTO_PEER_DNS_INFO='' PLUTO_PEER_DOMAIN_INFO='' PLUTO_PEER_BA: | cmd( 880):NNER='' PLUTO_CFG_SERVER='0' PLUTO_CFG_CLIENT='0' PLUTO_NM_CONFIGURED='0' VTI_IF: | cmd( 960):ACE='' VTI_ROUTING='no' VTI_SHARED='no' SPI_IN=0xd9a15cc9 SPI_OUT=0xff124bc8 ips: | cmd(1040):ec _updown 2>&1: | DH secret MODP2048@0x7fa9d0003618: created | NSS: Local DH MODP2048 secret (pointer): 0x7fa9d0003618 | NSS: Public DH wire value: | b0 a1 f7 e4 33 d3 81 ac 53 8f c3 97 aa 4f 6c 6f | f6 e0 a3 b8 27 ce 4c 48 bf 3a d8 79 d6 c8 62 db | 00 72 32 6e 00 d9 0d 99 4f bf a1 0d 37 d9 01 64 | 23 36 ce 5b 33 9e da c6 c7 3a c3 ec e6 95 0f 34 | 84 35 3e e8 d4 b4 08 43 45 a2 56 97 4e 46 fb f4 | 68 de 25 17 f0 ae d0 0a bf 64 10 0f c5 92 7b 7b | bc bb 1b 02 b5 82 65 60 49 8b 7c eb e3 bf 10 63 | bd cd 19 d3 b9 ab de b9 c3 57 97 b5 2d e1 3a 3c | cb 06 f5 c4 1b 3c c4 b7 0b 25 9d 6b fa 83 0a 27 | 7b ed e2 fd dc cb 91 56 8b 41 48 c9 66 26 5e d3 | 73 6b 7d ca 00 49 53 e0 35 60 c7 ae 9c 1a bd 97 | 3a f0 83 d6 6c d4 64 84 44 93 39 ce 6f 65 c2 af | 85 e4 99 45 3a ee e3 41 61 3f 28 36 16 06 4f bb | ea e5 ff 0d 9e ae c8 08 65 3c e6 35 03 8b fc 74 | 75 9f 24 79 4e a4 bc 0b 44 d6 e4 49 87 47 35 14 | 68 69 f4 e9 fe 77 53 0c 08 61 a2 4d bf d3 fc f8 | Generated nonce: 47 6a b2 30 3c cd 7e e1 51 45 a4 01 6a 90 74 b8 | Generated nonce: fe 5f 1a f7 83 a1 ef 4f ab 5b cd 7c 89 33 2e c3 | crypto helper 6 finished build KE and nonce (quick_outI1 KE); request ID 7 time elapsed 0.000934 seconds | crypto helper 6 sending results from work-order 7 for state #4 to event queue | scheduling resume sending helper answer for #4 | libevent_malloc: new ptr-libevent@0x7fa9d0002888 size 128 | crypto helper 6 waiting (nothing to do) | shunt_eroute() called for connection 'westnets-eastnet/2x0' to 'replace with shunt' for rt_kind 'prospective erouted' using protoports 0--0->-0 | netlink_shunt_eroute for proto 0, and source port 0 dest port 0 | priority calculation of connection "westnets-eastnet/2x0" is 0xfe7e7 | IPsec Sa SPD priority set to 1042407 | delete esp.d9a15cc9@192.1.2.23 | netlink response for Del SA esp.d9a15cc9@192.1.2.23 included non-error error | priority calculation of connection "westnets-eastnet/2x0" is 0xfe7e7 | delete inbound eroute 192.0.2.0/24:0 --0-> 192.0.11.0/24:0 => unk255.10000@192.1.2.45 (raw_eroute) | raw_eroute result=success | delete esp.ff124bc8@192.1.2.45 | netlink response for Del SA esp.ff124bc8@192.1.2.45 included non-error error | in connection_discard for connection westnets-eastnet/2x0 | State DB: deleting IKEv1 state #3 in QUICK_I2 | child state #3: QUICK_I2(established CHILD SA) => UNDEFINED(ignore) | DH secret MODP2048@0x7fa9d4006358: destroyed | stop processing: state #3 from 192.1.2.23 (in delete_state() at state.c:1143) | delete_state: release st->st_shared_nss-key@0x5570e4c00630 | delete_state: release st->st_skeyid_nss-key@0x5570e4bedc70 | delete_state: release st->st_skey_d_nss-key@0x5570e4bec1c0 | delete_state: release st->st_skey_ai_nss-key@0x5570e4be4dc0 | delete_state: release st->st_skey_ar_nss-key@NULL | delete_state: release st->st_skey_ei_nss-key@0x5570e4befab0 | delete_state: release st->st_skey_er_nss-key@NULL | delete_state: release st->st_skey_pi_nss-key@NULL | delete_state: release st->st_skey_pr_nss-key@NULL | delete_state: release st->st_enc_key_nss-key@0x5570e4be6640 | delete_state: release st->st_sk_d_no_ppk-key@NULL | delete_state: release st->st_sk_pi_no_ppk-key@NULL | delete_state: release st->st_sk_pr_no_ppk-key@NULL | libevent_free: release ptr-libevent@0x5570e4c0d2e8 | free_event_entry: release EVENT_SA_EXPIRE-pe@0x7fa9e0004218 | in statetime_stop() and could not find #3 | processing: STOP state #0 (in timer_event_cb() at timer.c:557) | *received 92 bytes from 192.1.2.23:500 on eth1 (192.1.2.45:500) | 9f 65 42 37 54 9b 07 77 c4 88 e3 f7 e7 56 66 9c | 08 10 05 01 b6 4b 95 0b 00 00 00 5c df b3 aa 4b | c8 10 02 32 8f a8 46 6f d8 cf f4 de eb ed 44 45 | 52 e5 5f a6 aa c0 db 77 5b 6a 22 a1 26 6a 91 dc | dc 07 e1 ef 6c 97 f9 db 4f e3 68 6a f4 d7 82 96 | 4d c1 f5 43 6b 33 8f 5c ef 4d 59 26 | start processing: from 192.1.2.23:500 (in process_md() at demux.c:378) | **parse ISAKMP Message: | initiator cookie: | 9f 65 42 37 54 9b 07 77 | responder cookie: | c4 88 e3 f7 e7 56 66 9c | next payload type: ISAKMP_NEXT_HASH (0x8) | ISAKMP version: ISAKMP Version 1.0 (rfc2407) (0x10) | exchange type: ISAKMP_XCHG_INFO (0x5) | flags: ISAKMP_FLAG_v1_ENCRYPTION (0x1) | Message ID: 3058406667 (0xb64b950b) | length: 92 (0x5c) | processing version=1.0 packet with exchange type=ISAKMP_XCHG_INFO (5) | peer and cookies match on #4; msgid=00000000 st_msgid=a554ee0d st_msgid_phase15=00000000 | peer and cookies match on #2; msgid=00000000 st_msgid=904e7608 st_msgid_phase15=00000000 | peer and cookies match on #1; msgid=00000000 st_msgid=00000000 st_msgid_phase15=00000000 | p15 state object #1 found, in STATE_MAIN_I4 | State DB: found IKEv1 state #1 in MAIN_I4 (find_v1_info_state) | start processing: state #1 connection "westnets-eastnet/2x0" from 192.1.2.23 (in process_v1_packet() at ikev1.c:1479) | last Phase 1 IV: c4 de d8 a6 42 0d c2 6b 1d b3 07 ce d1 0b 22 13 | current Phase 1 IV: c4 de d8 a6 42 0d c2 6b 1d b3 07 ce d1 0b 22 13 | Phase 2 IV hash sha2_256 init | Phase 2 IV hash sha2_256 digest PH1_IV-bytes@0x5570e4c03a68 (length 16) | c4 de d8 a6 42 0d c2 6b 1d b3 07 ce d1 0b 22 13 | Phase 2 IV hash sha2_256 digest MSGID-bytes@0x7ffe19a0842c (length 4) | b6 4b 95 0b | Phase 2 IV hash sha2_256 final bytes@0x5570e4c039e8 (length 32) | 42 d6 3b a0 87 8b b7 17 b8 41 26 89 32 13 2c c8 | 9c 31 40 22 2f 49 f4 7f af 47 8e 19 58 dc ce f8 | #1 is idle | #1 idle | received encrypted packet from 192.1.2.23:500 | decrypting 64 bytes using algorithm AES_CBC | IV before: 42 d6 3b a0 87 8b b7 17 b8 41 26 89 32 13 2c c8 | NSS ike_alg_nss_cbc: aes - enter | NSS ike_alg_nss_cbc: aes - exit | IV after: f4 d7 82 96 4d c1 f5 43 6b 33 8f 5c ef 4d 59 26 | decrypted payload (starts at offset -64): | 9f 65 42 37 54 9b 07 77 c4 88 e3 f7 e7 56 66 9c | 08 10 05 01 b6 4b 95 0b 00 00 00 5c 0c 00 00 24 | da ba e6 12 67 39 65 bc 04 e6 a3 16 c9 f8 fd 8f | 6e a4 f5 15 72 cc fd 22 85 d3 e7 41 d6 ea 85 ac | 00 00 00 10 00 00 00 01 03 04 00 01 15 9e 45 5d | 00 00 00 00 00 00 00 00 00 00 00 00 | got payload 0x100 (ISAKMP_NEXT_HASH) needed: 0x100 opt: 0x0 | ***parse ISAKMP Hash Payload: | next payload type: ISAKMP_NEXT_D (0xc) | length: 36 (0x24) | got payload 0x1000 (ISAKMP_NEXT_D) needed: 0x0 opt: 0x0 | ***parse ISAKMP Delete Payload: | next payload type: ISAKMP_NEXT_NONE (0x0) | length: 16 (0x10) | DOI: ISAKMP_DOI_IPSEC (0x1) | protocol ID: 3 (0x3) | SPI size: 4 (0x4) | number of SPIs: 1 (0x1) | removing 12 bytes of padding | HASH(1) PRF sha2_256 init SKEYID_a-key@0x5570e4be4dc0 (size 32) | HASH(1): SKEYID_a-key@0x5570e4be4dc0 (32-bytes, EXTRACT_KEY_FROM_KEY) | key-offset: 0, key-size: 32 | EXTRACT_KEY_FROM_KEY: | target: SHA256_HMAC | flags: SIGN | key_size: 32-bytes | base: base-key@0x5570e4be4dc0 (32-bytes, EXTRACT_KEY_FROM_KEY) | operation: FLAGS_ONLY | params: 8-bytes@0x7ffe19a08188 | result: clone-key@0x5570e4c00630 (32-bytes, SHA256_HMAC) | HASH(1) prf: created sha2_256 context 0x7fa9e00041f0 from SKEYID_a-key@0x5570e4c00630 | HASH(1) prf: begin sha2_256 with context 0x7fa9e00041f0 from SKEYID_a-key@0x5570e4c00630 | HASH(1): release clone-key@0x5570e4c00630 | HASH(1) PRF sha2_256 crypt-prf@0x7fa9d4005868 | HASH(1) PRF sha2_256 update M-ID-bytes@0x7ffe19a0826c (length 4) | b6 4b 95 0b | HASH(1) PRF sha2_256 update payload-bytes@0x5570e4c162d8 (length 16) | 00 00 00 10 00 00 00 01 03 04 00 01 15 9e 45 5d | HASH(1) PRF sha2_256 final-bytes@0x7ffe19a082f0 (length 32) | da ba e6 12 67 39 65 bc 04 e6 a3 16 c9 f8 fd 8f | 6e a4 f5 15 72 cc fd 22 85 d3 e7 41 d6 ea 85 ac | informational HASH(1): | da ba e6 12 67 39 65 bc 04 e6 a3 16 c9 f8 fd 8f | 6e a4 f5 15 72 cc fd 22 85 d3 e7 41 d6 ea 85 ac | received 'informational' message HASH(1) data ok | parsing 4 raw bytes of ISAKMP Delete Payload into SPI | SPI 15 9e 45 5d | FOR_EACH_STATE_... in find_phase2_state_to_delete | start processing: connection "westnets-eastnet/1x0" (BACKGROUND) (in accept_delete() at ikev1_main.c:2515) "westnets-eastnet/2x0" #1: received Delete SA payload: replace IPsec State #2 now | state #2 requesting EVENT_SA_REPLACE to be deleted | libevent_free: release ptr-libevent@0x7fa9d8001f78 | free_event_entry: release EVENT_SA_REPLACE-pe@0x7fa9e4002b78 | event_schedule: new EVENT_SA_REPLACE-pe@0x7fa9e4002b78 | inserting event EVENT_SA_REPLACE, timeout in 0 seconds for #2 | libevent_malloc: new ptr-libevent@0x5570e4c19b18 size 128 | stop processing: connection "westnets-eastnet/1x0" (BACKGROUND) (in accept_delete() at ikev1_main.c:2559) | del: | complete v1 state transition with STF_IGNORE | stop processing: from 192.1.2.23:500 (BACKGROUND) (in process_md() at demux.c:380) | stop processing: state #1 connection "westnets-eastnet/2x0" from 192.1.2.23 (in process_md() at demux.c:382) | processing: STOP connection NULL (in process_md() at demux.c:383) | processing resume sending helper answer for #4 | start processing: state #4 connection "westnets-eastnet/2x0" from 192.1.2.23 (in resume_handler() at server.c:797) | crypto helper 6 replies to request ID 7 | calling continuation function 0x5570e44bdb50 | quick_outI1_continue for #4: calculated ke+nonce, sending I1 | **emit ISAKMP Message: | initiator cookie: | 9f 65 42 37 54 9b 07 77 | responder cookie: | c4 88 e3 f7 e7 56 66 9c | next payload type: ISAKMP_NEXT_NONE (0x0) | ISAKMP version: ISAKMP Version 1.0 (rfc2407) (0x10) | exchange type: ISAKMP_XCHG_QUICK (0x20) | flags: ISAKMP_FLAG_v1_ENCRYPTION (0x1) | Message ID: 2773806605 (0xa554ee0d) | next payload chain: saving message location 'ISAKMP Message'.'next payload type' | ***emit ISAKMP Hash Payload: | next payload type: ISAKMP_NEXT_NONE (0x0) | next payload chain: setting previous 'ISAKMP Message'.'next payload type' to current ISAKMP Hash Payload (8:ISAKMP_NEXT_HASH) | next payload chain: saving location 'ISAKMP Hash Payload'.'next payload type' in 'reply packet' | emitting 32 zero bytes of HASH DATA into ISAKMP Hash Payload | emitting length of ISAKMP Hash Payload: 36 | emitting quick defaults using policy none | empty esp_info, returning defaults for ENCRYPT | ***emit ISAKMP Security Association Payload: | next payload type: ISAKMP_NEXT_NONCE (0xa) | DOI: ISAKMP_DOI_IPSEC (0x1) | next payload chain: ignoring supplied 'ISAKMP Security Association Payload'.'next payload type' value 10:ISAKMP_NEXT_NONCE | next payload chain: setting previous 'ISAKMP Hash Payload'.'next payload type' to current ISAKMP Security Association Payload (1:ISAKMP_NEXT_SA) | next payload chain: saving location 'ISAKMP Security Association Payload'.'next payload type' in 'reply packet' | ****emit IPsec DOI SIT: | IPsec DOI SIT: SIT_IDENTITY_ONLY (0x1) | ikev1_out_sa pcn: 0 has 1 valid proposals | ikev1_out_sa pcn: 0 pn: 0<1 valid_count: 1 trans_cnt: 2 | ****emit ISAKMP Proposal Payload: | next payload type: ISAKMP_NEXT_NONE (0x0) | proposal number: 0 (0x0) | protocol ID: PROTO_IPSEC_ESP (0x3) | SPI size: 4 (0x4) | number of transforms: 2 (0x2) | last substructure: saving location 'ISAKMP Security Association Payload'.'ISAKMP Proposal Payload'.'next payload type' | netlink_get_spi: allocated 0x53181ffc for esp.0@192.1.2.45 | emitting 4 raw bytes of SPI into ISAKMP Proposal Payload | SPI 53 18 1f fc | *****emit ISAKMP Transform Payload (ESP): | next payload type: ISAKMP_NEXT_T (0x3) | ESP transform number: 0 (0x0) | ESP transform ID: ESP_AES (0xc) | last substructure: saving location 'ISAKMP Proposal Payload'.'ISAKMP Transform Payload (ESP)'.'next payload type' | ******emit ISAKMP IPsec DOI attribute: | af+type: AF+GROUP_DESCRIPTION (0x8003) | length/value: 14 (0xe) | [14 is OAKLEY_GROUP_MODP2048] | ******emit ISAKMP IPsec DOI attribute: | af+type: AF+ENCAPSULATION_MODE (0x8004) | length/value: 1 (0x1) | [1 is ENCAPSULATION_MODE_TUNNEL] | ******emit ISAKMP IPsec DOI attribute: | af+type: AF+SA_LIFE_TYPE (0x8001) | length/value: 1 (0x1) | [1 is SA_LIFE_TYPE_SECONDS] | ******emit ISAKMP IPsec DOI attribute: | af+type: AF+SA_LIFE_DURATION (variable length) (0x8002) | length/value: 28800 (0x7080) | ******emit ISAKMP IPsec DOI attribute: | af+type: AF+AUTH_ALGORITHM (0x8005) | length/value: 2 (0x2) | [2 is AUTH_ALGORITHM_HMAC_SHA1] | ******emit ISAKMP IPsec DOI attribute: | af+type: AF+KEY_LENGTH (0x8006) | length/value: 128 (0x80) | emitting length of ISAKMP Transform Payload (ESP): 32 | *****emit ISAKMP Transform Payload (ESP): | next payload type: ISAKMP_NEXT_NONE (0x0) | ESP transform number: 1 (0x1) | ESP transform ID: ESP_3DES (0x3) | last substructure: checking 'ISAKMP Proposal Payload'.'ISAKMP Transform Payload (ESP)'.'next payload type' is ISAKMP_NEXT_T (0x3) | last substructure: saving location 'ISAKMP Proposal Payload'.'ISAKMP Transform Payload (ESP)'.'next payload type' | ******emit ISAKMP IPsec DOI attribute: | af+type: AF+GROUP_DESCRIPTION (0x8003) | length/value: 14 (0xe) | [14 is OAKLEY_GROUP_MODP2048] | ******emit ISAKMP IPsec DOI attribute: | af+type: AF+ENCAPSULATION_MODE (0x8004) | length/value: 1 (0x1) | [1 is ENCAPSULATION_MODE_TUNNEL] | ******emit ISAKMP IPsec DOI attribute: | af+type: AF+SA_LIFE_TYPE (0x8001) | length/value: 1 (0x1) | [1 is SA_LIFE_TYPE_SECONDS] | ******emit ISAKMP IPsec DOI attribute: | af+type: AF+SA_LIFE_DURATION (variable length) (0x8002) | length/value: 28800 (0x7080) | ******emit ISAKMP IPsec DOI attribute: | af+type: AF+AUTH_ALGORITHM (0x8005) | length/value: 2 (0x2) | [2 is AUTH_ALGORITHM_HMAC_SHA1] | emitting length of ISAKMP Transform Payload (ESP): 28 | emitting length of ISAKMP Proposal Payload: 72 | last substructure: checking 'ISAKMP Proposal Payload'.'ISAKMP Transform Payload (ESP)'.'next payload type' is 0 | emitting length of ISAKMP Security Association Payload: 84 | last substructure: checking 'ISAKMP Security Association Payload'.'ISAKMP Proposal Payload'.'next payload type' is 0 | ***emit ISAKMP Nonce Payload: | next payload type: ISAKMP_NEXT_KE (0x4) | next payload chain: ignoring supplied 'ISAKMP Nonce Payload'.'next payload type' value 4:ISAKMP_NEXT_KE | next payload chain: setting previous 'ISAKMP Security Association Payload'.'next payload type' to current ISAKMP Nonce Payload (10:ISAKMP_NEXT_NONCE) | next payload chain: saving location 'ISAKMP Nonce Payload'.'next payload type' in 'reply packet' | emitting 32 raw bytes of Ni into ISAKMP Nonce Payload | Ni 47 6a b2 30 3c cd 7e e1 51 45 a4 01 6a 90 74 b8 | Ni fe 5f 1a f7 83 a1 ef 4f ab 5b cd 7c 89 33 2e c3 | emitting length of ISAKMP Nonce Payload: 36 | wire (crypto helper) group MODP2048 and state group MODP2048 match | DH secret MODP2048@0x7fa9d0003618: transferring ownership from helper KE to state #4 | ***emit ISAKMP Key Exchange Payload: | next payload type: ISAKMP_NEXT_ID (0x5) | next payload chain: ignoring supplied 'ISAKMP Key Exchange Payload'.'next payload type' value 5:ISAKMP_NEXT_ID | next payload chain: setting previous 'ISAKMP Nonce Payload'.'next payload type' to current ISAKMP Key Exchange Payload (4:ISAKMP_NEXT_KE) | next payload chain: saving location 'ISAKMP Key Exchange Payload'.'next payload type' in 'reply packet' | emitting 256 raw bytes of keyex value into ISAKMP Key Exchange Payload | keyex value b0 a1 f7 e4 33 d3 81 ac 53 8f c3 97 aa 4f 6c 6f | keyex value f6 e0 a3 b8 27 ce 4c 48 bf 3a d8 79 d6 c8 62 db | keyex value 00 72 32 6e 00 d9 0d 99 4f bf a1 0d 37 d9 01 64 | keyex value 23 36 ce 5b 33 9e da c6 c7 3a c3 ec e6 95 0f 34 | keyex value 84 35 3e e8 d4 b4 08 43 45 a2 56 97 4e 46 fb f4 | keyex value 68 de 25 17 f0 ae d0 0a bf 64 10 0f c5 92 7b 7b | keyex value bc bb 1b 02 b5 82 65 60 49 8b 7c eb e3 bf 10 63 | keyex value bd cd 19 d3 b9 ab de b9 c3 57 97 b5 2d e1 3a 3c | keyex value cb 06 f5 c4 1b 3c c4 b7 0b 25 9d 6b fa 83 0a 27 | keyex value 7b ed e2 fd dc cb 91 56 8b 41 48 c9 66 26 5e d3 | keyex value 73 6b 7d ca 00 49 53 e0 35 60 c7 ae 9c 1a bd 97 | keyex value 3a f0 83 d6 6c d4 64 84 44 93 39 ce 6f 65 c2 af | keyex value 85 e4 99 45 3a ee e3 41 61 3f 28 36 16 06 4f bb | keyex value ea e5 ff 0d 9e ae c8 08 65 3c e6 35 03 8b fc 74 | keyex value 75 9f 24 79 4e a4 bc 0b 44 d6 e4 49 87 47 35 14 | keyex value 68 69 f4 e9 fe 77 53 0c 08 61 a2 4d bf d3 fc f8 | emitting length of ISAKMP Key Exchange Payload: 260 | ***emit ISAKMP Identification Payload (IPsec DOI): | next payload type: ISAKMP_NEXT_ID (0x5) | ID type: ID_IPV4_ADDR_SUBNET (0x4) | Protocol ID: 0 (0x0) | port: 0 (0x0) | next payload chain: ignoring supplied 'ISAKMP Identification Payload (IPsec DOI)'.'next payload type' value 5:ISAKMP_NEXT_ID | next payload chain: setting previous 'ISAKMP Key Exchange Payload'.'next payload type' to current ISAKMP Identification Payload (IPsec DOI) (5:ISAKMP_NEXT_ID) | next payload chain: saving location 'ISAKMP Identification Payload (IPsec DOI)'.'next payload type' in 'reply packet' | emitting 4 raw bytes of client network into ISAKMP Identification Payload (IPsec DOI) | client network c0 00 0b 00 | emitting 4 raw bytes of client mask into ISAKMP Identification Payload (IPsec DOI) | client mask ff ff ff 00 | emitting length of ISAKMP Identification Payload (IPsec DOI): 16 | ***emit ISAKMP Identification Payload (IPsec DOI): | next payload type: ISAKMP_NEXT_NONE (0x0) | ID type: ID_IPV4_ADDR_SUBNET (0x4) | Protocol ID: 0 (0x0) | port: 0 (0x0) | next payload chain: setting previous 'ISAKMP Identification Payload (IPsec DOI)'.'next payload type' to current ISAKMP Identification Payload (IPsec DOI) (5:ISAKMP_NEXT_ID) | next payload chain: saving location 'ISAKMP Identification Payload (IPsec DOI)'.'next payload type' in 'reply packet' | emitting 4 raw bytes of client network into ISAKMP Identification Payload (IPsec DOI) | client network c0 00 02 00 | emitting 4 raw bytes of client mask into ISAKMP Identification Payload (IPsec DOI) | client mask ff ff ff 00 | emitting length of ISAKMP Identification Payload (IPsec DOI): 16 | HASH(1) PRF sha2_256 init SKEYID_a-key@0x5570e4be4dc0 (size 32) | HASH(1): SKEYID_a-key@0x5570e4be4dc0 (32-bytes, EXTRACT_KEY_FROM_KEY) | key-offset: 0, key-size: 32 | EXTRACT_KEY_FROM_KEY: | target: SHA256_HMAC | flags: SIGN | key_size: 32-bytes | base: base-key@0x5570e4be4dc0 (32-bytes, EXTRACT_KEY_FROM_KEY) | operation: FLAGS_ONLY | params: 8-bytes@0x7ffe19a07e98 | result: clone-key@0x5570e4c00630 (32-bytes, SHA256_HMAC) | HASH(1) prf: created sha2_256 context 0x7fa9e00041f0 from SKEYID_a-key@0x5570e4c00630 | HASH(1) prf: begin sha2_256 with context 0x7fa9e00041f0 from SKEYID_a-key@0x5570e4c00630 | HASH(1): release clone-key@0x5570e4c00630 | HASH(1) PRF sha2_256 crypt-prf@0x7fa9d4004df8 | HASH(1) PRF sha2_256 update M-ID-bytes@0x7ffe19a07f7c (length 4) | a5 54 ee 0d | HASH(1) PRF sha2_256 update payload-bytes@0x5570e45bb900 (length 412) | 0a 00 00 54 00 00 00 01 00 00 00 01 00 00 00 48 | 00 03 04 02 53 18 1f fc 03 00 00 20 00 0c 00 00 | 80 03 00 0e 80 04 00 01 80 01 00 01 80 02 70 80 | 80 05 00 02 80 06 00 80 00 00 00 1c 01 03 00 00 | 80 03 00 0e 80 04 00 01 80 01 00 01 80 02 70 80 | 80 05 00 02 04 00 00 24 47 6a b2 30 3c cd 7e e1 | 51 45 a4 01 6a 90 74 b8 fe 5f 1a f7 83 a1 ef 4f | ab 5b cd 7c 89 33 2e c3 05 00 01 04 b0 a1 f7 e4 | 33 d3 81 ac 53 8f c3 97 aa 4f 6c 6f f6 e0 a3 b8 | 27 ce 4c 48 bf 3a d8 79 d6 c8 62 db 00 72 32 6e | 00 d9 0d 99 4f bf a1 0d 37 d9 01 64 23 36 ce 5b | 33 9e da c6 c7 3a c3 ec e6 95 0f 34 84 35 3e e8 | d4 b4 08 43 45 a2 56 97 4e 46 fb f4 68 de 25 17 | f0 ae d0 0a bf 64 10 0f c5 92 7b 7b bc bb 1b 02 | b5 82 65 60 49 8b 7c eb e3 bf 10 63 bd cd 19 d3 | b9 ab de b9 c3 57 97 b5 2d e1 3a 3c cb 06 f5 c4 | 1b 3c c4 b7 0b 25 9d 6b fa 83 0a 27 7b ed e2 fd | dc cb 91 56 8b 41 48 c9 66 26 5e d3 73 6b 7d ca | 00 49 53 e0 35 60 c7 ae 9c 1a bd 97 3a f0 83 d6 | 6c d4 64 84 44 93 39 ce 6f 65 c2 af 85 e4 99 45 | 3a ee e3 41 61 3f 28 36 16 06 4f bb ea e5 ff 0d | 9e ae c8 08 65 3c e6 35 03 8b fc 74 75 9f 24 79 | 4e a4 bc 0b 44 d6 e4 49 87 47 35 14 68 69 f4 e9 | fe 77 53 0c 08 61 a2 4d bf d3 fc f8 05 00 00 10 | 04 00 00 00 c0 00 0b 00 ff ff ff 00 00 00 00 10 | 04 00 00 00 c0 00 02 00 ff ff ff 00 | HASH(1) PRF sha2_256 final-bytes@0x5570e45bb8e0 (length 32) | a5 60 27 fa f9 73 0a bd 15 6f e4 05 a4 27 81 72 | 36 e8 d8 23 7e 41 1a f3 f9 8f ec 48 5d 29 4d a1 | outI1 HASH(1): | a5 60 27 fa f9 73 0a bd 15 6f e4 05 a4 27 81 72 | 36 e8 d8 23 7e 41 1a f3 f9 8f ec 48 5d 29 4d a1 | last Phase 1 IV: c4 de d8 a6 42 0d c2 6b 1d b3 07 ce d1 0b 22 13 | current Phase 1 IV: c4 de d8 a6 42 0d c2 6b 1d b3 07 ce d1 0b 22 13 | Phase 2 IV hash sha2_256 init | Phase 2 IV hash sha2_256 digest PH1_IV-bytes@0x5570e4c03a68 (length 16) | c4 de d8 a6 42 0d c2 6b 1d b3 07 ce d1 0b 22 13 | Phase 2 IV hash sha2_256 digest MSGID-bytes@0x7ffe19a07f8c (length 4) | a5 54 ee 0d | Phase 2 IV hash sha2_256 final bytes@0x5570e4c039e8 (length 32) | cf 64 9d 9b d9 aa 63 50 8f f2 99 f6 46 d7 a9 fb | af 58 3f 76 3d d3 3e f9 27 5e b9 93 2f a5 03 ee | encrypting: 01 00 00 24 a5 60 27 fa f9 73 0a bd 15 6f e4 05 | encrypting: a4 27 81 72 36 e8 d8 23 7e 41 1a f3 f9 8f ec 48 | encrypting: 5d 29 4d a1 0a 00 00 54 00 00 00 01 00 00 00 01 | encrypting: 00 00 00 48 00 03 04 02 53 18 1f fc 03 00 00 20 | encrypting: 00 0c 00 00 80 03 00 0e 80 04 00 01 80 01 00 01 | encrypting: 80 02 70 80 80 05 00 02 80 06 00 80 00 00 00 1c | encrypting: 01 03 00 00 80 03 00 0e 80 04 00 01 80 01 00 01 | encrypting: 80 02 70 80 80 05 00 02 04 00 00 24 47 6a b2 30 | encrypting: 3c cd 7e e1 51 45 a4 01 6a 90 74 b8 fe 5f 1a f7 | encrypting: 83 a1 ef 4f ab 5b cd 7c 89 33 2e c3 05 00 01 04 | encrypting: b0 a1 f7 e4 33 d3 81 ac 53 8f c3 97 aa 4f 6c 6f | encrypting: f6 e0 a3 b8 27 ce 4c 48 bf 3a d8 79 d6 c8 62 db | encrypting: 00 72 32 6e 00 d9 0d 99 4f bf a1 0d 37 d9 01 64 | encrypting: 23 36 ce 5b 33 9e da c6 c7 3a c3 ec e6 95 0f 34 | encrypting: 84 35 3e e8 d4 b4 08 43 45 a2 56 97 4e 46 fb f4 | encrypting: 68 de 25 17 f0 ae d0 0a bf 64 10 0f c5 92 7b 7b | encrypting: bc bb 1b 02 b5 82 65 60 49 8b 7c eb e3 bf 10 63 | encrypting: bd cd 19 d3 b9 ab de b9 c3 57 97 b5 2d e1 3a 3c | encrypting: cb 06 f5 c4 1b 3c c4 b7 0b 25 9d 6b fa 83 0a 27 | encrypting: 7b ed e2 fd dc cb 91 56 8b 41 48 c9 66 26 5e d3 | encrypting: 73 6b 7d ca 00 49 53 e0 35 60 c7 ae 9c 1a bd 97 | encrypting: 3a f0 83 d6 6c d4 64 84 44 93 39 ce 6f 65 c2 af | encrypting: 85 e4 99 45 3a ee e3 41 61 3f 28 36 16 06 4f bb | encrypting: ea e5 ff 0d 9e ae c8 08 65 3c e6 35 03 8b fc 74 | encrypting: 75 9f 24 79 4e a4 bc 0b 44 d6 e4 49 87 47 35 14 | encrypting: 68 69 f4 e9 fe 77 53 0c 08 61 a2 4d bf d3 fc f8 | encrypting: 05 00 00 10 04 00 00 00 c0 00 0b 00 ff ff ff 00 | encrypting: 00 00 00 10 04 00 00 00 c0 00 02 00 ff ff ff 00 | IV: cf 64 9d 9b d9 aa 63 50 8f f2 99 f6 46 d7 a9 fb | IV: af 58 3f 76 3d d3 3e f9 27 5e b9 93 2f a5 03 ee | unpadded size is: 448 | encrypting 448 using AES_CBC | no IKEv1 message padding required | emitting length of ISAKMP Message: 476 | NSS ike_alg_nss_cbc: aes - enter | NSS ike_alg_nss_cbc: aes - exit | next IV: be 49 52 79 b1 12 13 e6 b1 0b 96 93 62 0b 43 85 | sending 476 bytes for reply packet from quick_outI1 through eth1 from 192.1.2.45:500 to 192.1.2.23:500 (using #4) | 9f 65 42 37 54 9b 07 77 c4 88 e3 f7 e7 56 66 9c | 08 10 20 01 a5 54 ee 0d 00 00 01 dc 2c f4 96 0c | 02 ea 15 a7 9d 7b b4 03 2f 0c e0 e8 e0 49 46 17 | 8d 91 33 aa 13 21 5c 89 66 64 0d e1 68 62 6b 80 | 71 0d ea 03 ce 69 8c 35 21 d8 97 92 2d 0e 07 6d | 85 4b ed 71 83 cc 02 11 9d 80 fb 6a ba 66 ce b8 | 61 39 08 e9 da 8d 6b 5f 64 ed 92 66 dd 5c a4 b2 | 07 b4 d5 d1 a4 01 28 be 3b ff cf bd 05 7a c3 15 | 42 7c e6 88 ba 5a 69 ac 30 40 1d 8e df 6b 11 ee | 3d 6c 31 62 4c 36 14 5d 76 ea 78 8c 67 a1 d1 21 | 57 21 d9 83 ea eb 10 3b b9 cc f6 dc 8f fd b6 da | 05 2d cc b7 39 c6 15 ff 33 52 fd 25 a9 36 65 74 | 02 84 f6 fd 2f 6a 81 05 1a 1e 06 6b 61 e2 f1 db | 4d 7e e1 b2 87 f1 aa c4 3d 57 6d 67 79 cb 4e c7 | 5e 63 cb 0f e2 0a 28 67 ce 74 bd a7 ee 56 dc 75 | 31 fc 40 67 31 19 06 bf 51 6b a5 08 27 e6 7c c9 | 96 5e d1 db ef 4d 66 74 79 24 68 0a b8 b3 3f 84 | f0 36 3d 44 63 fe 6e 88 68 99 ce 7d 11 67 38 9d | 11 a9 6f 2f 8e cc b8 29 5b 69 2b 8b 1f c7 83 c0 | 5f 95 c7 b4 8e d7 fd 9d a1 fd 4d 69 6e ea 4c 5c | 2e de f1 9c 8a a7 e1 c4 d4 a4 9d e8 f2 00 6c 1a | 28 49 c5 ca 40 32 1f 59 1e 0e 52 e6 26 2b a2 61 | 30 b9 74 83 f8 63 58 c2 48 a7 82 62 88 45 2f fb | 26 bb 2b 01 b3 13 ea bc 9b d3 31 c4 7d 82 e0 1e | 3b 61 41 fa 64 70 fc c8 a8 c8 18 8a 87 e5 50 3e | b2 ba e3 f3 48 e8 af d0 0e 5c 96 71 29 3b 57 17 | 58 98 93 e7 82 cc 64 3a fb 67 5f 82 c9 3c 38 dd | ee 2a dd ae 95 66 6c b3 9b 53 5f 8f ef c3 ff b7 | da 4a 1f ca 5a 7e a0 56 de 52 78 94 be 49 52 79 | b1 12 13 e6 b1 0b 96 93 62 0b 43 85 | state #4 requesting EVENT_CRYPTO_TIMEOUT to be deleted | libevent_free: release ptr-libevent@0x5570e4b87ef8 | free_event_entry: release EVENT_CRYPTO_TIMEOUT-pe@0x7fa9d40058b8 "westnets-eastnet/2x0" #4: IMPAIR: suppressing retransmits; scheduling timeout in 60 seconds | event_schedule: new EVENT_RETRANSMIT-pe@0x7fa9d40058b8 | inserting event EVENT_RETRANSMIT, timeout in 60 seconds for #4 | libevent_malloc: new ptr-libevent@0x5570e4c0d2e8 size 128 | #4 STATE_QUICK_I1: retransmits: first event in 60 seconds; timeout in 60 seconds; limit of 12 retransmits; current time is 11350.664137 | resume sending helper answer for #4 suppresed complete_v1_state_transition() | stop processing: state #4 connection "westnets-eastnet/2x0" from 192.1.2.23 (in resume_handler() at server.c:833) | libevent_free: release ptr-libevent@0x7fa9d0002888 | processing signal PLUTO_SIGCHLD | waitpid returned ECHILD (no child processes left) | timer_event_cb: processing event@0x7fa9e4002b78 | handling event EVENT_SA_REPLACE for child state #2 | start processing: state #2 connection "westnets-eastnet/1x0" from 192.1.2.23 (in timer_event_cb() at timer.c:250) | picked newest_ipsec_sa #2 for #2 | replacing stale IPsec SA | dup_any(fd@-1) -> fd@-1 (in ipsecdoi_replace() at ipsec_doi.c:351) | FOR_EACH_STATE_... in find_phase1_state | creating state object #5 at 0x5570e4c0f458 | State DB: adding IKEv1 state #5 in UNDEFINED | pstats #5 ikev1.ipsec started | duplicating state object #1 "westnets-eastnet/2x0" as #5 for IPSEC SA | #5 setting local endpoint to 192.1.2.45:500 from #1.st_localport (in duplicate_state() at state.c:1484) | duplicate_state: reference st_skeyid_nss-key@0x5570e4bedc70 | duplicate_state: reference st_skey_d_nss-key@0x5570e4bec1c0 | duplicate_state: reference st_skey_ai_nss-key@0x5570e4be4dc0 | duplicate_state: reference st_skey_ar_nss-key@NULL | duplicate_state: reference st_skey_ei_nss-key@0x5570e4befab0 | duplicate_state: reference st_skey_er_nss-key@NULL | duplicate_state: reference st_skey_pi_nss-key@NULL | duplicate_state: reference st_skey_pr_nss-key@NULL | duplicate_state: reference st_enc_key_nss-key@0x5570e4be6640 | duplicate_state: reference st_sk_d_no_ppk-key@NULL | duplicate_state: reference st_sk_pi_no_ppk-key@NULL | duplicate_state: reference st_sk_pr_no_ppk-key@NULL | in connection_discard for connection westnets-eastnet/2x0 | suspend processing: state #2 connection "westnets-eastnet/1x0" from 192.1.2.23 (in quick_outI1() at ikev1_quick.c:685) | start processing: state #5 connection "westnets-eastnet/1x0" from 192.1.2.23 (in quick_outI1() at ikev1_quick.c:685) | child state #5: UNDEFINED(ignore) => QUICK_I1(established CHILD SA) "westnets-eastnet/1x0" #5: initiating Quick Mode RSASIG+ENCRYPT+TUNNEL+PFS+UP+IKEV1_ALLOW+SAREF_TRACK+IKE_FRAG_ALLOW+ESN_NO to replace #2 {using isakmp#1 msgid:878bd573 proposal=defaults pfsgroup=MODP2048} | adding quick_outI1 KE work-order 8 for state #5 | event_schedule: new EVENT_CRYPTO_TIMEOUT-pe@0x7fa9d0002b78 | inserting event EVENT_CRYPTO_TIMEOUT, timeout in 60 seconds for #5 | libevent_malloc: new ptr-libevent@0x7fa9d0002888 size 128 | stop processing: state #5 connection "westnets-eastnet/1x0" from 192.1.2.23 (in quick_outI1() at ikev1_quick.c:764) | resume processing: state #2 connection "westnets-eastnet/1x0" from 192.1.2.23 (in quick_outI1() at ikev1_quick.c:764) | event_schedule: new EVENT_SA_EXPIRE-pe@0x7fa9e0004218 | inserting event EVENT_SA_EXPIRE, timeout in 0 seconds for #2 | libevent_malloc: new ptr-libevent@0x5570e4c02488 size 128 | libevent_free: release ptr-libevent@0x5570e4c19b18 | crypto helper 0 resuming | crypto helper 0 starting work-order 8 for state #5 | free_event_entry: release EVENT_SA_REPLACE-pe@0x7fa9e4002b78 | crypto helper 0 doing build KE and nonce (quick_outI1 KE); request ID 8 | stop processing: state #2 connection "westnets-eastnet/1x0" from 192.1.2.23 (in timer_event_cb() at timer.c:557) | timer_event_cb: processing event@0x7fa9e0004218 | handling event EVENT_SA_EXPIRE for child state #2 | NSS: Value of Prime: | start processing: state #2 connection "westnets-eastnet/1x0" from 192.1.2.23 (in timer_event_cb() at timer.c:250) | ff ff ff ff ff ff ff ff c9 0f da a2 21 68 c2 34 | c4 c6 62 8b 80 dc 1c d1 29 02 4e 08 8a 67 cc 74 | 02 0b be a6 3b 13 9b 22 51 4a 08 79 8e 34 04 dd | ef 95 19 b3 cd 3a 43 1b 30 2b 0a 6d f2 5f 14 37 | 4f e1 35 6d 6d 51 c2 45 e4 85 b5 76 62 5e 7e c6 | f4 4c 42 e9 a6 37 ed 6b 0b ff 5c b6 f4 06 b7 ed | ee 38 6b fb 5a 89 9f a5 ae 9f 24 11 7c 4b 1f e6 | 49 28 66 51 ec e4 5b 3d c2 00 7c b8 a1 63 bf 05 | picked newest_ipsec_sa #2 for #2 | un-established partial CHILD SA timeout (SA expired) | 98 da 48 36 1c 55 d3 9a 69 16 3f a8 fd 24 cf 5f | 83 65 5d 23 dc a3 ad 96 1c 62 f3 56 20 85 52 bb | 9e d5 29 07 70 96 96 6d 67 0c 35 4e 4a bc 98 04 | f1 74 6c 08 ca 18 21 7c 32 90 5e 46 2e 36 ce 3b | e3 9e 77 2c 18 0e 86 03 9b 27 83 a2 ec 07 a2 8f | b5 c5 5d f0 6f 4c 52 c9 de 2b cb f6 95 58 17 18 | 39 95 49 7c ea 95 6a e5 15 d2 26 18 98 fa 05 10 | 15 72 8e 5a 8a ac aa 68 ff ff ff ff ff ff ff ff | NSS: Value of base: 02 | pstats #2 ikev1.ipsec re-failed exchange-timeout | pstats #2 ikev1.ipsec deleted completed | [RE]START processing: state #2 connection "westnets-eastnet/1x0" from 192.1.2.23 (in delete_state() at state.c:879) "westnets-eastnet/1x0" #2: deleting state (STATE_QUICK_I2) aged 7.222s and sending notification | child state #2: QUICK_I2(established CHILD SA) => delete | get_sa_info esp.159e455d@192.1.2.23 | get_sa_info esp.b40a241d@192.1.2.45 "westnets-eastnet/1x0" #2: ESP traffic information: in=336B out=336B | #2 send IKEv1 delete notification for STATE_QUICK_I2 | FOR_EACH_STATE_... in find_phase1_state | **emit ISAKMP Message: | initiator cookie: | 9f 65 42 37 54 9b 07 77 | responder cookie: | c4 88 e3 f7 e7 56 66 9c | next payload type: ISAKMP_NEXT_NONE (0x0) | ISAKMP version: ISAKMP Version 1.0 (rfc2407) (0x10) | exchange type: ISAKMP_XCHG_INFO (0x5) | flags: ISAKMP_FLAG_v1_ENCRYPTION (0x1) | Message ID: 1368104166 (0x518b9ce6) | next payload chain: saving message location 'ISAKMP Message'.'next payload type' | ***emit ISAKMP Hash Payload: | next payload type: ISAKMP_NEXT_NONE (0x0) | next payload chain: setting previous 'ISAKMP Message'.'next payload type' to current ISAKMP Hash Payload (8:ISAKMP_NEXT_HASH) | next payload chain: saving location 'ISAKMP Hash Payload'.'next payload type' in 'delete msg' | emitting 32 zero bytes of HASH DATA into ISAKMP Hash Payload | emitting length of ISAKMP Hash Payload: 36 | ***emit ISAKMP Delete Payload: | next payload type: ISAKMP_NEXT_NONE (0x0) | DOI: ISAKMP_DOI_IPSEC (0x1) | protocol ID: 3 (0x3) | SPI size: 4 (0x4) | number of SPIs: 1 (0x1) | next payload chain: setting previous 'ISAKMP Hash Payload'.'next payload type' to current ISAKMP Delete Payload (12:ISAKMP_NEXT_D) | next payload chain: saving location 'ISAKMP Delete Payload'.'next payload type' in 'delete msg' | emitting 4 raw bytes of delete payload into ISAKMP Delete Payload | delete payload b4 0a 24 1d | emitting length of ISAKMP Delete Payload: 16 | HASH(1) PRF sha2_256 init SKEYID_a-key@0x5570e4be4dc0 (size 32) | HASH(1): SKEYID_a-key@0x5570e4be4dc0 (32-bytes, EXTRACT_KEY_FROM_KEY) | key-offset: 0, key-size: 32 | EXTRACT_KEY_FROM_KEY: | target: SHA256_HMAC | flags: SIGN | key_size: 32-bytes | base: base-key@0x5570e4be4dc0 (32-bytes, EXTRACT_KEY_FROM_KEY) | operation: FLAGS_ONLY | params: 8-bytes@0x7ffe19a05c58 | result: clone-key@0x5570e4c00630 (32-bytes, SHA256_HMAC) | HASH(1) prf: created sha2_256 context 0x7fa9e4002b50 from SKEYID_a-key@0x5570e4c00630 | HASH(1) prf: begin sha2_256 with context 0x7fa9e4002b50 from SKEYID_a-key@0x5570e4c00630 | HASH(1): release clone-key@0x5570e4c00630 | HASH(1) PRF sha2_256 crypt-prf@0x7fa9d4006158 | HASH(1) PRF sha2_256 update M-ID-bytes@0x7ffe19a05d3c (length 4) | 51 8b 9c e6 | HASH(1) PRF sha2_256 update payload-bytes@0x7ffe19a060f0 (length 16) | 00 00 00 10 00 00 00 01 03 04 00 01 b4 0a 24 1d | HASH(1) PRF sha2_256 final-bytes@0x7ffe19a060d0 (length 32) | aa ef ff 18 14 d6 14 e0 fe fb 49 a8 4e 8c ec 5d | ad 17 1a ca b6 84 63 08 57 02 c7 1e 98 e1 3f 41 | send delete HASH(1): | aa ef ff 18 14 d6 14 e0 fe fb 49 a8 4e 8c ec 5d | ad 17 1a ca b6 84 63 08 57 02 c7 1e 98 e1 3f 41 | last Phase 1 IV: c4 de d8 a6 42 0d c2 6b 1d b3 07 ce d1 0b 22 13 | current Phase 1 IV: c4 de d8 a6 42 0d c2 6b 1d b3 07 ce d1 0b 22 13 | Phase 2 IV hash sha2_256 init | Phase 2 IV hash sha2_256 digest PH1_IV-bytes@0x5570e4c03a68 (length 16) | c4 de d8 a6 42 0d c2 6b 1d b3 07 ce d1 0b 22 13 | Phase 2 IV hash sha2_256 digest MSGID-bytes@0x7ffe19a05d4c (length 4) | 51 8b 9c e6 | Phase 2 IV hash sha2_256 final bytes@0x5570e4c039e8 (length 32) | 14 a2 84 b3 8e 6f 27 d0 6b f7 6c 2b fc 40 d7 0f | 51 cd 1e e9 58 8a c5 81 a3 73 ef 0c d1 06 10 e5 | encrypting: 0c 00 00 24 aa ef ff 18 14 d6 14 e0 fe fb 49 a8 | encrypting: 4e 8c ec 5d ad 17 1a ca b6 84 63 08 57 02 c7 1e | encrypting: 98 e1 3f 41 00 00 00 10 00 00 00 01 03 04 00 01 | encrypting: b4 0a 24 1d | IV: 14 a2 84 b3 8e 6f 27 d0 6b f7 6c 2b fc 40 d7 0f | IV: 51 cd 1e e9 58 8a c5 81 a3 73 ef 0c d1 06 10 e5 | unpadded size is: 52 | emitting 12 zero bytes of encryption padding into ISAKMP Message | encrypting 64 using AES_CBC | no IKEv1 message padding required | emitting length of ISAKMP Message: 92 | NSS ike_alg_nss_cbc: aes - enter | NSS ike_alg_nss_cbc: aes - exit | next IV: b9 f7 3d 84 ab ae 01 6b 2f d3 bc 87 e4 e5 bb d5 | sending 92 bytes for delete notify through eth1 from 192.1.2.45:500 to 192.1.2.23:500 (using #1) | 9f 65 42 37 54 9b 07 77 c4 88 e3 f7 e7 56 66 9c | 08 10 05 01 51 8b 9c e6 00 00 00 5c 45 c5 4d cd | ae b3 23 5e 91 63 e7 00 c8 1b 60 1b 5e 0d 31 9f | b2 0f ae b9 e8 28 dc 11 93 6b f0 cc fd 01 4b bf | 13 43 04 7c 1d 15 3a 00 55 be ff f0 b9 f7 3d 84 | ab ae 01 6b 2f d3 bc 87 e4 e5 bb d5 | running updown command "ipsec _updown" for verb down | command executing down-client | executing down-client: PLUTO_VERB='down-client' PLUTO_VERSION='2.0' PLUTO_CONNECTION='westnets-eastnet/1x0' PLUTO_INTERFACE='eth1' PLUTO_NEXT_HOP='192.1.2.23' PLUTO_ME='192.1.2.45' PLUTO_MY_ID='@west' PLUTO_MY_CLIENT='192.0.1.0/24' PLUTO_MY_CLIENT_NET='192.0.1.0' PLUTO_MY_CLIENT_MASK='255.255.255.0' PLUTO_MY_PORT='0' PLUTO_MY_PROTOCOL='0' PLUTO_SA_REQID='16388' PLUTO_SA_TYPE='ESP' PLUTO_PEER='192.1.2.23' PLUTO_PEER_ID='@east' PLUTO_PEER_CLIENT='192.0.2.0/24' PLUTO_PEER_CLIENT_NET='192.0.2.0' PLUTO_PEER_CLIENT_MASK='255.255.255.0' PLUTO_PEER_PORT='0' PLUTO_PEER_PROTOCOL='0' PLUTO_PEER_CA='' PLUTO_STACK='netkey' PLUTO_ADDTIME='1566826057' PLUTO_CONN_POLICY='RSASIG+ENCRYPT+TUNNEL+PFS+UP+IKEV1_ALLOW+SAREF_TRACK+IKE_FRAG_ALLOW+ESN_NO' PLUTO_CONN_KIND='CK_PERMANENT' PLUTO_CONN_ADDRFAMILY='ipv4' XAUTH_FAILED=0 PLUTO_IS_PEER_CISCO='0' PLUTO_PEER_DNS_INFO='' PLUTO_PEER_DOMAIN_INFO='' PLUTO_PEER_BANNER='' PLUTO_CFG_SERVER='0' PLUTO_CFG_CLIENT='0' PLUTO_NM_CONFIGURED='0' VTI_IFACE='' VTI_ROUTING='no' VTI_SHARED=' | popen cmd is 1053 chars long | cmd( 0):PLUTO_VERB='down-client' PLUTO_VERSION='2.0' PLUTO_CONNECTION='westnets-eastnet/: | cmd( 80):1x0' PLUTO_INTERFACE='eth1' PLUTO_NEXT_HOP='192.1.2.23' PLUTO_ME='192.1.2.45' PL: | cmd( 160):UTO_MY_ID='@west' PLUTO_MY_CLIENT='192.0.1.0/24' PLUTO_MY_CLIENT_NET='192.0.1.0': | cmd( 240): PLUTO_MY_CLIENT_MASK='255.255.255.0' PLUTO_MY_PORT='0' PLUTO_MY_PROTOCOL='0' PL: | cmd( 320):UTO_SA_REQID='16388' PLUTO_SA_TYPE='ESP' PLUTO_PEER='192.1.2.23' PLUTO_PEER_ID=': | cmd( 400):@east' PLUTO_PEER_CLIENT='192.0.2.0/24' PLUTO_PEER_CLIENT_NET='192.0.2.0' PLUTO_: | cmd( 480):PEER_CLIENT_MASK='255.255.255.0' PLUTO_PEER_PORT='0' PLUTO_PEER_PROTOCOL='0' PLU: | cmd( 560):TO_PEER_CA='' PLUTO_STACK='netkey' PLUTO_ADDTIME='1566826057' PLUTO_CONN_POLICY=: | cmd( 640):'RSASIG+ENCRYPT+TUNNEL+PFS+UP+IKEV1_ALLOW+SAREF_TRACK+IKE_FRAG_ALLOW+ESN_NO' PLU: | cmd( 720):TO_CONN_KIND='CK_PERMANENT' PLUTO_CONN_ADDRFAMILY='ipv4' XAUTH_FAILED=0 PLUTO_IS: | cmd( 800):_PEER_CISCO='0' PLUTO_PEER_DNS_INFO='' PLUTO_PEER_DOMAIN_INFO='' PLUTO_PEER_BANN: | cmd( 880):ER='' PLUTO_CFG_SERVER='0' PLUTO_CFG_CLIENT='0' PLUTO_NM_CONFIGURED='0' VTI_IFAC: | cmd( 960):E='' VTI_ROUTING='no' VTI_SHARED='no' SPI_IN=0x159e455d SPI_OUT=0xb40a241d ipsec: | cmd(1040): _updown 2>&1: | DH secret MODP2048@0x7fa9e4007148: created | NSS: Local DH MODP2048 secret (pointer): 0x7fa9e4007148 | NSS: Public DH wire value: | 01 55 22 fe 4d c8 c3 01 92 e0 da bc 3d 27 9d af | 3f a9 13 09 cf a2 40 0c df ce 13 4c 33 0b 72 fc | 03 50 c4 4e 2d 4d 45 78 a8 f8 d6 f6 67 66 41 1a | c9 c2 ff 27 7b 02 db 96 59 ed 06 a2 71 77 e7 b3 | 7e 0b 42 2c df e5 4d f3 5e c4 b8 ab 1c d0 d1 7d | 67 fb e3 c9 49 86 d7 88 f2 4e 3b 71 bd e0 5d 3f | 6b a4 57 43 8e 6b aa 41 56 fe 34 f9 5e dd 78 ef | d3 93 f7 1d f0 29 7a a2 98 40 83 81 3f 83 1f b6 | 89 e1 99 d9 ba be 62 46 58 6f 56 43 9b 3f 0b a0 | 5e 00 41 12 8f 11 cd f0 79 42 44 33 6b ab 62 1e | da 8e 7d ea f9 d8 87 53 a5 d3 13 36 fa 96 54 1e | f3 c0 f3 54 7e 07 ce 96 0c 3d f7 28 a4 32 c2 6e | 3a 0a 7b ec f0 ed 58 0e d0 68 62 8f 59 af c2 e9 | eb da f3 94 9e 00 6e 93 5e 6d 78 82 b1 2d 16 19 | 53 72 cf ec 52 39 65 f9 6d 78 4d 9d 92 b1 89 12 | 0a 58 60 3c 94 cf 1b 05 41 f2 c4 c4 e2 68 2a 39 | Generated nonce: 1b 97 94 9c 01 b1 5e e1 47 6c 1a 91 b9 7d d6 d1 | Generated nonce: 75 cc 49 02 b1 2c ef c7 39 42 61 a5 f6 d1 e8 9a | crypto helper 0 finished build KE and nonce (quick_outI1 KE); request ID 8 time elapsed 0.001043 seconds | crypto helper 0 sending results from work-order 8 for state #5 to event queue | scheduling resume sending helper answer for #5 | libevent_malloc: new ptr-libevent@0x7fa9e40072f8 size 128 | crypto helper 0 waiting (nothing to do) | shunt_eroute() called for connection 'westnets-eastnet/1x0' to 'replace with shunt' for rt_kind 'prospective erouted' using protoports 0--0->-0 | netlink_shunt_eroute for proto 0, and source port 0 dest port 0 | priority calculation of connection "westnets-eastnet/1x0" is 0xfe7e7 | IPsec Sa SPD priority set to 1042407 | delete esp.159e455d@192.1.2.23 | netlink response for Del SA esp.159e455d@192.1.2.23 included non-error error | priority calculation of connection "westnets-eastnet/1x0" is 0xfe7e7 | delete inbound eroute 192.0.2.0/24:0 --0-> 192.0.1.0/24:0 => unk255.10000@192.1.2.45 (raw_eroute) | raw_eroute result=success | delete esp.b40a241d@192.1.2.45 | netlink response for Del SA esp.b40a241d@192.1.2.45 included non-error error | in connection_discard for connection westnets-eastnet/1x0 | State DB: deleting IKEv1 state #2 in QUICK_I2 | child state #2: QUICK_I2(established CHILD SA) => UNDEFINED(ignore) | DH secret MODP2048@0x7fa9e0004cb8: destroyed | stop processing: state #2 from 192.1.2.23 (in delete_state() at state.c:1143) | delete_state: release st->st_shared_nss-key@0x5570e4c05500 | delete_state: release st->st_skeyid_nss-key@0x5570e4bedc70 | delete_state: release st->st_skey_d_nss-key@0x5570e4bec1c0 | delete_state: release st->st_skey_ai_nss-key@0x5570e4be4dc0 | delete_state: release st->st_skey_ar_nss-key@NULL | delete_state: release st->st_skey_ei_nss-key@0x5570e4befab0 | delete_state: release st->st_skey_er_nss-key@NULL | delete_state: release st->st_skey_pi_nss-key@NULL | delete_state: release st->st_skey_pr_nss-key@NULL | delete_state: release st->st_enc_key_nss-key@0x5570e4be6640 | delete_state: release st->st_sk_d_no_ppk-key@NULL | delete_state: release st->st_sk_pi_no_ppk-key@NULL | delete_state: release st->st_sk_pr_no_ppk-key@NULL | libevent_free: release ptr-libevent@0x5570e4c02488 | free_event_entry: release EVENT_SA_EXPIRE-pe@0x7fa9e0004218 | in statetime_stop() and could not find #2 | processing: STOP state #0 (in timer_event_cb() at timer.c:557) | *received 92 bytes from 192.1.2.23:500 on eth1 (192.1.2.45:500) | 9f 65 42 37 54 9b 07 77 c4 88 e3 f7 e7 56 66 9c | 08 10 05 01 47 c9 69 f4 00 00 00 5c 21 1b cd e9 | 90 26 b8 77 0c f4 23 9a cf 53 e4 07 a2 2f 17 dc | 52 df d4 e9 b2 f6 e6 a8 d9 2a 5c 02 de c5 1a 59 | 8c 0d 7b df 64 2e 3d 0f 42 5e 70 a4 a2 79 0c 4b | ec d6 9b e6 fa e9 4a 9f 2f 81 70 f0 | start processing: from 192.1.2.23:500 (in process_md() at demux.c:378) | **parse ISAKMP Message: | initiator cookie: | 9f 65 42 37 54 9b 07 77 | responder cookie: | c4 88 e3 f7 e7 56 66 9c | next payload type: ISAKMP_NEXT_HASH (0x8) | ISAKMP version: ISAKMP Version 1.0 (rfc2407) (0x10) | exchange type: ISAKMP_XCHG_INFO (0x5) | flags: ISAKMP_FLAG_v1_ENCRYPTION (0x1) | Message ID: 1204382196 (0x47c969f4) | length: 92 (0x5c) | processing version=1.0 packet with exchange type=ISAKMP_XCHG_INFO (5) | peer and cookies match on #5; msgid=00000000 st_msgid=878bd573 st_msgid_phase15=00000000 | peer and cookies match on #4; msgid=00000000 st_msgid=a554ee0d st_msgid_phase15=00000000 | peer and cookies match on #1; msgid=00000000 st_msgid=00000000 st_msgid_phase15=00000000 | p15 state object #1 found, in STATE_MAIN_I4 | State DB: found IKEv1 state #1 in MAIN_I4 (find_v1_info_state) | start processing: state #1 connection "westnets-eastnet/2x0" from 192.1.2.23 (in process_v1_packet() at ikev1.c:1479) | last Phase 1 IV: c4 de d8 a6 42 0d c2 6b 1d b3 07 ce d1 0b 22 13 | current Phase 1 IV: c4 de d8 a6 42 0d c2 6b 1d b3 07 ce d1 0b 22 13 | Phase 2 IV hash sha2_256 init | Phase 2 IV hash sha2_256 digest PH1_IV-bytes@0x5570e4c03a68 (length 16) | c4 de d8 a6 42 0d c2 6b 1d b3 07 ce d1 0b 22 13 | Phase 2 IV hash sha2_256 digest MSGID-bytes@0x7ffe19a0842c (length 4) | 47 c9 69 f4 | Phase 2 IV hash sha2_256 final bytes@0x5570e4c039e8 (length 32) | 96 e4 e7 0e 83 f4 68 2d f8 d5 c2 e2 45 21 76 7e | 43 e3 85 8b 50 3e 03 3a 79 33 70 1f 10 9c 3d 19 | #1 is idle | #1 idle | received encrypted packet from 192.1.2.23:500 | decrypting 64 bytes using algorithm AES_CBC | IV before: 96 e4 e7 0e 83 f4 68 2d f8 d5 c2 e2 45 21 76 7e | NSS ike_alg_nss_cbc: aes - enter | NSS ike_alg_nss_cbc: aes - exit | IV after: a2 79 0c 4b ec d6 9b e6 fa e9 4a 9f 2f 81 70 f0 | decrypted payload (starts at offset -64): | 9f 65 42 37 54 9b 07 77 c4 88 e3 f7 e7 56 66 9c | 08 10 05 01 47 c9 69 f4 00 00 00 5c 0c 00 00 24 | 05 09 ec 15 d6 2f 8f 3d 71 cb be d3 9d 0d ea fe | 14 c2 0c 7f c7 1d 6a 18 ba 44 c4 f0 3c 70 57 06 | 00 00 00 1c 00 00 00 01 01 10 00 01 9f 65 42 37 | 54 9b 07 77 c4 88 e3 f7 e7 56 66 9c | got payload 0x100 (ISAKMP_NEXT_HASH) needed: 0x100 opt: 0x0 | ***parse ISAKMP Hash Payload: | next payload type: ISAKMP_NEXT_D (0xc) | length: 36 (0x24) | got payload 0x1000 (ISAKMP_NEXT_D) needed: 0x0 opt: 0x0 | ***parse ISAKMP Delete Payload: | next payload type: ISAKMP_NEXT_NONE (0x0) | length: 28 (0x1c) | DOI: ISAKMP_DOI_IPSEC (0x1) | protocol ID: 1 (0x1) | SPI size: 16 (0x10) | number of SPIs: 1 (0x1) | HASH(1) PRF sha2_256 init SKEYID_a-key@0x5570e4be4dc0 (size 32) | HASH(1): SKEYID_a-key@0x5570e4be4dc0 (32-bytes, EXTRACT_KEY_FROM_KEY) | key-offset: 0, key-size: 32 | EXTRACT_KEY_FROM_KEY: | target: SHA256_HMAC | flags: SIGN | key_size: 32-bytes | base: base-key@0x5570e4be4dc0 (32-bytes, EXTRACT_KEY_FROM_KEY) | operation: FLAGS_ONLY | params: 8-bytes@0x7ffe19a08188 | result: clone-key@0x5570e4c05500 (32-bytes, SHA256_HMAC) | HASH(1) prf: created sha2_256 context 0x7fa9e00041f0 from SKEYID_a-key@0x5570e4c05500 | HASH(1) prf: begin sha2_256 with context 0x7fa9e00041f0 from SKEYID_a-key@0x5570e4c05500 | HASH(1): release clone-key@0x5570e4c05500 | HASH(1) PRF sha2_256 crypt-prf@0x7fa9e0004bb8 | HASH(1) PRF sha2_256 update M-ID-bytes@0x7ffe19a0826c (length 4) | 47 c9 69 f4 | HASH(1) PRF sha2_256 update payload-bytes@0x5570e4c162d8 (length 28) | 00 00 00 1c 00 00 00 01 01 10 00 01 9f 65 42 37 | 54 9b 07 77 c4 88 e3 f7 e7 56 66 9c | HASH(1) PRF sha2_256 final-bytes@0x7ffe19a082f0 (length 32) | 05 09 ec 15 d6 2f 8f 3d 71 cb be d3 9d 0d ea fe | 14 c2 0c 7f c7 1d 6a 18 ba 44 c4 f0 3c 70 57 06 | informational HASH(1): | 05 09 ec 15 d6 2f 8f 3d 71 cb be d3 9d 0d ea fe | 14 c2 0c 7f c7 1d 6a 18 ba 44 c4 f0 3c 70 57 06 | received 'informational' message HASH(1) data ok | parsing 8 raw bytes of ISAKMP Delete Payload into iCookie | iCookie 9f 65 42 37 54 9b 07 77 | parsing 8 raw bytes of ISAKMP Delete Payload into rCookie | rCookie c4 88 e3 f7 e7 56 66 9c | State DB: found IKEv1 state #1 in MAIN_I4 (find_state_ikev1) | del: "westnets-eastnet/2x0" #1: received Delete SA payload: self-deleting ISAKMP State #1 | pstats #1 ikev1.isakmp deleted completed | [RE]START processing: state #1 connection "westnets-eastnet/2x0" from 192.1.2.23 (in delete_state() at state.c:879) "westnets-eastnet/2x0" #1: deleting state (STATE_MAIN_I4) aged 7.250s and sending notification | parent state #1: MAIN_I4(established IKE SA) => delete | #1 send IKEv1 delete notification for STATE_MAIN_I4 | **emit ISAKMP Message: | initiator cookie: | 9f 65 42 37 54 9b 07 77 | responder cookie: | c4 88 e3 f7 e7 56 66 9c | next payload type: ISAKMP_NEXT_NONE (0x0) | ISAKMP version: ISAKMP Version 1.0 (rfc2407) (0x10) | exchange type: ISAKMP_XCHG_INFO (0x5) | flags: ISAKMP_FLAG_v1_ENCRYPTION (0x1) | Message ID: 3583470794 (0xd5976cca) | next payload chain: saving message location 'ISAKMP Message'.'next payload type' | ***emit ISAKMP Hash Payload: | next payload type: ISAKMP_NEXT_NONE (0x0) | next payload chain: setting previous 'ISAKMP Message'.'next payload type' to current ISAKMP Hash Payload (8:ISAKMP_NEXT_HASH) | next payload chain: saving location 'ISAKMP Hash Payload'.'next payload type' in 'delete msg' | emitting 32 zero bytes of HASH DATA into ISAKMP Hash Payload | emitting length of ISAKMP Hash Payload: 36 | ***emit ISAKMP Delete Payload: | next payload type: ISAKMP_NEXT_NONE (0x0) | DOI: ISAKMP_DOI_IPSEC (0x1) | protocol ID: 1 (0x1) | SPI size: 16 (0x10) | number of SPIs: 1 (0x1) | next payload chain: setting previous 'ISAKMP Hash Payload'.'next payload type' to current ISAKMP Delete Payload (12:ISAKMP_NEXT_D) | next payload chain: saving location 'ISAKMP Delete Payload'.'next payload type' in 'delete msg' | emitting 8 raw bytes of initiator SPI into ISAKMP Delete Payload | initiator SPI 9f 65 42 37 54 9b 07 77 | emitting 8 raw bytes of responder SPI into ISAKMP Delete Payload | responder SPI c4 88 e3 f7 e7 56 66 9c | emitting length of ISAKMP Delete Payload: 28 | HASH(1) PRF sha2_256 init SKEYID_a-key@0x5570e4be4dc0 (size 32) | HASH(1): SKEYID_a-key@0x5570e4be4dc0 (32-bytes, EXTRACT_KEY_FROM_KEY) | key-offset: 0, key-size: 32 | EXTRACT_KEY_FROM_KEY: | target: SHA256_HMAC | flags: SIGN | key_size: 32-bytes | base: base-key@0x5570e4be4dc0 (32-bytes, EXTRACT_KEY_FROM_KEY) | operation: FLAGS_ONLY | params: 8-bytes@0x7ffe19a05a38 | result: clone-key@0x5570e4c05500 (32-bytes, SHA256_HMAC) | HASH(1) prf: created sha2_256 context 0x7fa9e00041f0 from SKEYID_a-key@0x5570e4c05500 | HASH(1) prf: begin sha2_256 with context 0x7fa9e00041f0 from SKEYID_a-key@0x5570e4c05500 | HASH(1): release clone-key@0x5570e4c05500 | HASH(1) PRF sha2_256 crypt-prf@0x7fa9e0004ab8 | HASH(1) PRF sha2_256 update M-ID-bytes@0x7ffe19a05b1c (length 4) | d5 97 6c ca | HASH(1) PRF sha2_256 update payload-bytes@0x7ffe19a05ed0 (length 28) | 00 00 00 1c 00 00 00 01 01 10 00 01 9f 65 42 37 | 54 9b 07 77 c4 88 e3 f7 e7 56 66 9c | HASH(1) PRF sha2_256 final-bytes@0x7ffe19a05eb0 (length 32) | 2d 4c e0 d4 53 2b b0 c2 df 18 dd 34 d2 5e fd 16 | 62 b8 d9 82 a7 64 94 01 f0 d5 8f 07 f4 68 36 2b | send delete HASH(1): | 2d 4c e0 d4 53 2b b0 c2 df 18 dd 34 d2 5e fd 16 | 62 b8 d9 82 a7 64 94 01 f0 d5 8f 07 f4 68 36 2b | last Phase 1 IV: c4 de d8 a6 42 0d c2 6b 1d b3 07 ce d1 0b 22 13 | current Phase 1 IV: c4 de d8 a6 42 0d c2 6b 1d b3 07 ce d1 0b 22 13 | Phase 2 IV hash sha2_256 init | Phase 2 IV hash sha2_256 digest PH1_IV-bytes@0x5570e4c03a68 (length 16) | c4 de d8 a6 42 0d c2 6b 1d b3 07 ce d1 0b 22 13 | Phase 2 IV hash sha2_256 digest MSGID-bytes@0x7ffe19a05b2c (length 4) | d5 97 6c ca | Phase 2 IV hash sha2_256 final bytes@0x5570e4c039e8 (length 32) | 80 78 0b ec 40 8f d3 17 52 f0 e8 c4 f5 d9 f3 14 | da 6b a7 eb be 3b 20 3b 5b e0 33 34 b7 6c a6 fd | encrypting: 0c 00 00 24 2d 4c e0 d4 53 2b b0 c2 df 18 dd 34 | encrypting: d2 5e fd 16 62 b8 d9 82 a7 64 94 01 f0 d5 8f 07 | encrypting: f4 68 36 2b 00 00 00 1c 00 00 00 01 01 10 00 01 | encrypting: 9f 65 42 37 54 9b 07 77 c4 88 e3 f7 e7 56 66 9c | IV: 80 78 0b ec 40 8f d3 17 52 f0 e8 c4 f5 d9 f3 14 | IV: da 6b a7 eb be 3b 20 3b 5b e0 33 34 b7 6c a6 fd | unpadded size is: 64 | encrypting 64 using AES_CBC | no IKEv1 message padding required | emitting length of ISAKMP Message: 92 | NSS ike_alg_nss_cbc: aes - enter | NSS ike_alg_nss_cbc: aes - exit | next IV: db 37 b0 85 44 6a be 17 68 9a ff 04 2c 3e 18 92 | sending 92 bytes for delete notify through eth1 from 192.1.2.45:500 to 192.1.2.23:500 (using #1) | 9f 65 42 37 54 9b 07 77 c4 88 e3 f7 e7 56 66 9c | 08 10 05 01 d5 97 6c ca 00 00 00 5c 74 f4 f4 1e | 2f 37 05 c5 b2 56 94 cd 43 11 9b c8 f7 57 f0 5f | 49 94 5a 94 4a ae 3a bc 6d a6 16 23 ff 71 46 5f | 57 b5 9c d3 09 65 14 e0 3f 87 44 2a db 37 b0 85 | 44 6a be 17 68 9a ff 04 2c 3e 18 92 | state #1 requesting EVENT_SA_REPLACE to be deleted | libevent_free: release ptr-libevent@0x7fa9dc000f48 | free_event_entry: release EVENT_SA_REPLACE-pe@0x5570e4c02368 "westnets-eastnet/2x0" #1: reschedule pending child #5 STATE_QUICK_I1 of connection "westnets-eastnet/1x0" - the parent is going away | state #5 requesting EVENT_CRYPTO_TIMEOUT to be deleted | libevent_free: release ptr-libevent@0x7fa9d0002888 | free_event_entry: release EVENT_CRYPTO_TIMEOUT-pe@0x7fa9d0002b78 | event_schedule: new EVENT_SA_REPLACE-pe@0x7fa9e0004218 | inserting event EVENT_SA_REPLACE, timeout in 0 seconds for #5 | libevent_malloc: new ptr-libevent@0x5570e4b87ef8 size 128 "westnets-eastnet/2x0" #1: reschedule pending child #4 STATE_QUICK_I1 of connection "westnets-eastnet/2x0" - the parent is going away | state #4 requesting EVENT_RETRANSMIT to be deleted | #4 STATE_QUICK_I1: retransmits: cleared | libevent_free: release ptr-libevent@0x5570e4c0d2e8 | free_event_entry: release EVENT_RETRANSMIT-pe@0x7fa9d40058b8 | event_schedule: new EVENT_SA_REPLACE-pe@0x7fa9d40058b8 | inserting event EVENT_SA_REPLACE, timeout in 0 seconds for #4 | libevent_malloc: new ptr-libevent@0x5570e4c0d2e8 size 128 | State DB: IKEv1 state not found (flush_incomplete_children) | picked newest_isakmp_sa #0 for #1 "westnets-eastnet/2x0" #1: deleting IKE SA for connection 'westnets-eastnet/2x0' but connection is supposed to remain up; schedule EVENT_REVIVE_CONNS | add revival: connection 'westnets-eastnet/2x0' added to the list and scheduled for 0 seconds | global one-shot timer EVENT_REVIVE_CONNS scheduled in 0 seconds | in connection_discard for connection westnets-eastnet/2x0 | State DB: deleting IKEv1 state #1 in MAIN_I4 | parent state #1: MAIN_I4(established IKE SA) => UNDEFINED(ignore) | unreference key: 0x5570e4c025f8 @east cnt 2-- | DH secret MODP2048@0x7fa9e4003a28: destroyed | stop processing: state #1 from 192.1.2.23 (in delete_state() at state.c:1143) | delete_state: release st->st_shared_nss-key@0x5570e4bef6d0 | delete_state: release st->st_skeyid_nss-key@0x5570e4bedc70 | delete_state: release st->st_skey_d_nss-key@0x5570e4bec1c0 | delete_state: release st->st_skey_ai_nss-key@0x5570e4be4dc0 | delete_state: release st->st_skey_ar_nss-key@NULL | delete_state: release st->st_skey_ei_nss-key@0x5570e4befab0 | delete_state: release st->st_skey_er_nss-key@NULL | delete_state: release st->st_skey_pi_nss-key@NULL | delete_state: release st->st_skey_pr_nss-key@NULL | delete_state: release st->st_enc_key_nss-key@0x5570e4be6640 | delete_state: release st->st_sk_d_no_ppk-key@NULL | delete_state: release st->st_sk_pi_no_ppk-key@NULL | delete_state: release st->st_sk_pr_no_ppk-key@NULL | in statetime_start() with no state | complete v1 state transition with STF_IGNORE | stop processing: from 192.1.2.23:500 (in process_md() at demux.c:380) | processing: STOP state #0 (in process_md() at demux.c:382) | processing: STOP connection NULL (in process_md() at demux.c:383) | processing resume sending helper answer for #5 | start processing: state #5 connection "westnets-eastnet/1x0" from 192.1.2.23 (in resume_handler() at server.c:797) | crypto helper 0 replies to request ID 8 | calling continuation function 0x5570e44bdb50 | work-order 8 state #5 crypto result suppressed | DH secret MODP2048@0x7fa9e4007148: destroyed | resume sending helper answer for #5 suppresed complete_v1_state_transition() | stop processing: state #5 connection "westnets-eastnet/1x0" from 192.1.2.23 (in resume_handler() at server.c:833) | libevent_free: release ptr-libevent@0x7fa9e40072f8 | processing signal PLUTO_SIGCHLD | waitpid returned ECHILD (no child processes left) | timer_event_cb: processing event@0x7fa9e0004218 | handling event EVENT_SA_REPLACE for child state #5 | start processing: state #5 connection "westnets-eastnet/1x0" from 192.1.2.23 (in timer_event_cb() at timer.c:250) | picked newest_ipsec_sa #0 for #5 | replacing stale IPsec SA | dup_any(fd@-1) -> fd@-1 (in ipsecdoi_replace() at ipsec_doi.c:351) | FOR_EACH_STATE_... in find_phase1_state | creating state object #6 at 0x5570e4c035d8 | State DB: adding IKEv1 state #6 in UNDEFINED | pstats #6 ikev1.isakmp started | suspend processing: state #5 connection "westnets-eastnet/1x0" from 192.1.2.23 (in main_outI1() at ikev1_main.c:118) | start processing: state #6 connection "westnets-eastnet/1x0" from 192.1.2.23 (in main_outI1() at ikev1_main.c:118) | parent state #6: UNDEFINED(ignore) => MAIN_I1(half-open IKE SA) | dup_any(fd@-1) -> fd@-1 (in main_outI1() at ikev1_main.c:123) | Queuing pending IPsec SA negotiating with 192.1.2.23 "westnets-eastnet/1x0" IKE SA #6 "westnets-eastnet/1x0" "westnets-eastnet/1x0" #6: initiating Main Mode | **emit ISAKMP Message: | initiator cookie: | f6 10 7d 32 d2 59 26 07 | responder cookie: | 00 00 00 00 00 00 00 00 | next payload type: ISAKMP_NEXT_SA (0x1) | ISAKMP version: ISAKMP Version 1.0 (rfc2407) (0x10) | exchange type: ISAKMP_XCHG_IDPROT (0x2) | flags: none (0x0) | Message ID: 0 (0x0) | next payload chain: saving message location 'ISAKMP Message'.'next payload type' | next payload chain: ignoring supplied 'ISAKMP Message'.'next payload type' value 1:ISAKMP_NEXT_SA | no specific IKE algorithms specified - using defaults | oakley_alg_makedb() processing ealg=aes=7 halg=sha2_256=4 modp=MODP2048=14 eklen=0 | oakley_alg_makedb() processing ealg=aes=7 halg=sha2_512=6 modp=MODP2048=14 eklen=0 | oakley_alg_makedb() processing ealg=aes=7 halg=sha=2 modp=MODP2048=14 eklen=0 | oakley_alg_makedb() processing ealg=aes=7 halg=sha2_256=4 modp=MODP1536=5 eklen=0 | oakley_alg_makedb() processing ealg=aes=7 halg=sha2_512=6 modp=MODP1536=5 eklen=0 | oakley_alg_makedb() processing ealg=aes=7 halg=sha=2 modp=MODP1536=5 eklen=0 | oakley_alg_makedb() processing ealg=3des_cbc=5 halg=sha2_256=4 modp=MODP2048=14 eklen=0 | oakley_alg_makedb() processing ealg=3des_cbc=5 halg=sha2_512=6 modp=MODP2048=14 eklen=0 | oakley_alg_makedb() processing ealg=3des_cbc=5 halg=sha=2 modp=MODP2048=14 eklen=0 | oakley_alg_makedb() processing ealg=3des_cbc=5 halg=sha2_256=4 modp=MODP1536=5 eklen=0 | oakley_alg_makedb() processing ealg=3des_cbc=5 halg=sha2_512=6 modp=MODP1536=5 eklen=0 | oakley_alg_makedb() processing ealg=3des_cbc=5 halg=sha=2 modp=MODP1536=5 eklen=0 | oakley_alg_makedb() returning 0x5570e4c045b8 | ***emit ISAKMP Security Association Payload: | next payload type: ISAKMP_NEXT_VID (0xd) | DOI: ISAKMP_DOI_IPSEC (0x1) | next payload chain: ignoring supplied 'ISAKMP Security Association Payload'.'next payload type' value 13:ISAKMP_NEXT_VID | next payload chain: setting previous 'ISAKMP Message'.'next payload type' to current ISAKMP Security Association Payload (1:ISAKMP_NEXT_SA) | next payload chain: saving location 'ISAKMP Security Association Payload'.'next payload type' in 'reply packet' | ****emit IPsec DOI SIT: | IPsec DOI SIT: SIT_IDENTITY_ONLY (0x1) | ikev1_out_sa pcn: 0 has 1 valid proposals | ikev1_out_sa pcn: 0 pn: 0<1 valid_count: 1 trans_cnt: 18 | ****emit ISAKMP Proposal Payload: | next payload type: ISAKMP_NEXT_NONE (0x0) | proposal number: 0 (0x0) | protocol ID: PROTO_ISAKMP (0x1) | SPI size: 0 (0x0) | number of transforms: 18 (0x12) | last substructure: saving location 'ISAKMP Security Association Payload'.'ISAKMP Proposal Payload'.'next payload type' | *****emit ISAKMP Transform Payload (ISAKMP): | next payload type: ISAKMP_NEXT_T (0x3) | ISAKMP transform number: 0 (0x0) | ISAKMP transform ID: KEY_IKE (0x1) | last substructure: saving location 'ISAKMP Proposal Payload'.'ISAKMP Transform Payload (ISAKMP)'.'next payload type' | ******emit ISAKMP Oakley attribute: | af+type: AF+OAKLEY_LIFE_TYPE (0x800b) | length/value: 1 (0x1) | [1 is OAKLEY_LIFE_SECONDS] | ******emit ISAKMP Oakley attribute: | af+type: AF+OAKLEY_LIFE_DURATION (variable length) (0x800c) | length/value: 3600 (0xe10) | ******emit ISAKMP Oakley attribute: | af+type: AF+OAKLEY_ENCRYPTION_ALGORITHM (0x8001) | length/value: 7 (0x7) | [7 is OAKLEY_AES_CBC] | ******emit ISAKMP Oakley attribute: | af+type: AF+OAKLEY_HASH_ALGORITHM (0x8002) | length/value: 4 (0x4) | [4 is OAKLEY_SHA2_256] | ******emit ISAKMP Oakley attribute: | af+type: AF+OAKLEY_AUTHENTICATION_METHOD (0x8003) | length/value: 3 (0x3) | [3 is OAKLEY_RSA_SIG] | ******emit ISAKMP Oakley attribute: | af+type: AF+OAKLEY_GROUP_DESCRIPTION (0x8004) | length/value: 14 (0xe) | [14 is OAKLEY_GROUP_MODP2048] | ******emit ISAKMP Oakley attribute: | af+type: AF+OAKLEY_KEY_LENGTH (0x800e) | length/value: 256 (0x100) | emitting length of ISAKMP Transform Payload (ISAKMP): 36 | *****emit ISAKMP Transform Payload (ISAKMP): | next payload type: ISAKMP_NEXT_T (0x3) | ISAKMP transform number: 1 (0x1) | ISAKMP transform ID: KEY_IKE (0x1) | last substructure: checking 'ISAKMP Proposal Payload'.'ISAKMP Transform Payload (ISAKMP)'.'next payload type' is ISAKMP_NEXT_T (0x3) | last substructure: saving location 'ISAKMP Proposal Payload'.'ISAKMP Transform Payload (ISAKMP)'.'next payload type' | ******emit ISAKMP Oakley attribute: | af+type: AF+OAKLEY_LIFE_TYPE (0x800b) | length/value: 1 (0x1) | [1 is OAKLEY_LIFE_SECONDS] | ******emit ISAKMP Oakley attribute: | af+type: AF+OAKLEY_LIFE_DURATION (variable length) (0x800c) | length/value: 3600 (0xe10) | ******emit ISAKMP Oakley attribute: | af+type: AF+OAKLEY_ENCRYPTION_ALGORITHM (0x8001) | length/value: 7 (0x7) | [7 is OAKLEY_AES_CBC] | ******emit ISAKMP Oakley attribute: | af+type: AF+OAKLEY_HASH_ALGORITHM (0x8002) | length/value: 4 (0x4) | [4 is OAKLEY_SHA2_256] | ******emit ISAKMP Oakley attribute: | af+type: AF+OAKLEY_AUTHENTICATION_METHOD (0x8003) | length/value: 3 (0x3) | [3 is OAKLEY_RSA_SIG] | ******emit ISAKMP Oakley attribute: | af+type: AF+OAKLEY_GROUP_DESCRIPTION (0x8004) | length/value: 14 (0xe) | [14 is OAKLEY_GROUP_MODP2048] | ******emit ISAKMP Oakley attribute: | af+type: AF+OAKLEY_KEY_LENGTH (0x800e) | length/value: 128 (0x80) | emitting length of ISAKMP Transform Payload (ISAKMP): 36 | *****emit ISAKMP Transform Payload (ISAKMP): | next payload type: ISAKMP_NEXT_T (0x3) | ISAKMP transform number: 2 (0x2) | ISAKMP transform ID: KEY_IKE (0x1) | last substructure: checking 'ISAKMP Proposal Payload'.'ISAKMP Transform Payload (ISAKMP)'.'next payload type' is ISAKMP_NEXT_T (0x3) | last substructure: saving location 'ISAKMP Proposal Payload'.'ISAKMP Transform Payload (ISAKMP)'.'next payload type' | ******emit ISAKMP Oakley attribute: | af+type: AF+OAKLEY_LIFE_TYPE (0x800b) | length/value: 1 (0x1) | [1 is OAKLEY_LIFE_SECONDS] | ******emit ISAKMP Oakley attribute: | af+type: AF+OAKLEY_LIFE_DURATION (variable length) (0x800c) | length/value: 3600 (0xe10) | ******emit ISAKMP Oakley attribute: | af+type: AF+OAKLEY_ENCRYPTION_ALGORITHM (0x8001) | length/value: 7 (0x7) | [7 is OAKLEY_AES_CBC] | ******emit ISAKMP Oakley attribute: | af+type: AF+OAKLEY_HASH_ALGORITHM (0x8002) | length/value: 6 (0x6) | [6 is OAKLEY_SHA2_512] | ******emit ISAKMP Oakley attribute: | af+type: AF+OAKLEY_AUTHENTICATION_METHOD (0x8003) | length/value: 3 (0x3) | [3 is OAKLEY_RSA_SIG] | ******emit ISAKMP Oakley attribute: | af+type: AF+OAKLEY_GROUP_DESCRIPTION (0x8004) | length/value: 14 (0xe) | [14 is OAKLEY_GROUP_MODP2048] | ******emit ISAKMP Oakley attribute: | af+type: AF+OAKLEY_KEY_LENGTH (0x800e) | length/value: 256 (0x100) | emitting length of ISAKMP Transform Payload (ISAKMP): 36 | *****emit ISAKMP Transform Payload (ISAKMP): | next payload type: ISAKMP_NEXT_T (0x3) | ISAKMP transform number: 3 (0x3) | ISAKMP transform ID: KEY_IKE (0x1) | last substructure: checking 'ISAKMP Proposal Payload'.'ISAKMP Transform Payload (ISAKMP)'.'next payload type' is ISAKMP_NEXT_T (0x3) | last substructure: saving location 'ISAKMP Proposal Payload'.'ISAKMP Transform Payload (ISAKMP)'.'next payload type' | ******emit ISAKMP Oakley attribute: | af+type: AF+OAKLEY_LIFE_TYPE (0x800b) | length/value: 1 (0x1) | [1 is OAKLEY_LIFE_SECONDS] | ******emit ISAKMP Oakley attribute: | af+type: AF+OAKLEY_LIFE_DURATION (variable length) (0x800c) | length/value: 3600 (0xe10) | ******emit ISAKMP Oakley attribute: | af+type: AF+OAKLEY_ENCRYPTION_ALGORITHM (0x8001) | length/value: 7 (0x7) | [7 is OAKLEY_AES_CBC] | ******emit ISAKMP Oakley attribute: | af+type: AF+OAKLEY_HASH_ALGORITHM (0x8002) | length/value: 6 (0x6) | [6 is OAKLEY_SHA2_512] | ******emit ISAKMP Oakley attribute: | af+type: AF+OAKLEY_AUTHENTICATION_METHOD (0x8003) | length/value: 3 (0x3) | [3 is OAKLEY_RSA_SIG] | ******emit ISAKMP Oakley attribute: | af+type: AF+OAKLEY_GROUP_DESCRIPTION (0x8004) | length/value: 14 (0xe) | [14 is OAKLEY_GROUP_MODP2048] | ******emit ISAKMP Oakley attribute: | af+type: AF+OAKLEY_KEY_LENGTH (0x800e) | length/value: 128 (0x80) | emitting length of ISAKMP Transform Payload (ISAKMP): 36 | *****emit ISAKMP Transform Payload (ISAKMP): | next payload type: ISAKMP_NEXT_T (0x3) | ISAKMP transform number: 4 (0x4) | ISAKMP transform ID: KEY_IKE (0x1) | last substructure: checking 'ISAKMP Proposal Payload'.'ISAKMP Transform Payload (ISAKMP)'.'next payload type' is ISAKMP_NEXT_T (0x3) | last substructure: saving location 'ISAKMP Proposal Payload'.'ISAKMP Transform Payload (ISAKMP)'.'next payload type' | ******emit ISAKMP Oakley attribute: | af+type: AF+OAKLEY_LIFE_TYPE (0x800b) | length/value: 1 (0x1) | [1 is OAKLEY_LIFE_SECONDS] | ******emit ISAKMP Oakley attribute: | af+type: AF+OAKLEY_LIFE_DURATION (variable length) (0x800c) | length/value: 3600 (0xe10) | ******emit ISAKMP Oakley attribute: | af+type: AF+OAKLEY_ENCRYPTION_ALGORITHM (0x8001) | length/value: 7 (0x7) | [7 is OAKLEY_AES_CBC] | ******emit ISAKMP Oakley attribute: | af+type: AF+OAKLEY_HASH_ALGORITHM (0x8002) | length/value: 2 (0x2) | [2 is OAKLEY_SHA1] | ******emit ISAKMP Oakley attribute: | af+type: AF+OAKLEY_AUTHENTICATION_METHOD (0x8003) | length/value: 3 (0x3) | [3 is OAKLEY_RSA_SIG] | ******emit ISAKMP Oakley attribute: | af+type: AF+OAKLEY_GROUP_DESCRIPTION (0x8004) | length/value: 14 (0xe) | [14 is OAKLEY_GROUP_MODP2048] | ******emit ISAKMP Oakley attribute: | af+type: AF+OAKLEY_KEY_LENGTH (0x800e) | length/value: 256 (0x100) | emitting length of ISAKMP Transform Payload (ISAKMP): 36 | *****emit ISAKMP Transform Payload (ISAKMP): | next payload type: ISAKMP_NEXT_T (0x3) | ISAKMP transform number: 5 (0x5) | ISAKMP transform ID: KEY_IKE (0x1) | last substructure: checking 'ISAKMP Proposal Payload'.'ISAKMP Transform Payload (ISAKMP)'.'next payload type' is ISAKMP_NEXT_T (0x3) | last substructure: saving location 'ISAKMP Proposal Payload'.'ISAKMP Transform Payload (ISAKMP)'.'next payload type' | ******emit ISAKMP Oakley attribute: | af+type: AF+OAKLEY_LIFE_TYPE (0x800b) | length/value: 1 (0x1) | [1 is OAKLEY_LIFE_SECONDS] | ******emit ISAKMP Oakley attribute: | af+type: AF+OAKLEY_LIFE_DURATION (variable length) (0x800c) | length/value: 3600 (0xe10) | ******emit ISAKMP Oakley attribute: | af+type: AF+OAKLEY_ENCRYPTION_ALGORITHM (0x8001) | length/value: 7 (0x7) | [7 is OAKLEY_AES_CBC] | ******emit ISAKMP Oakley attribute: | af+type: AF+OAKLEY_HASH_ALGORITHM (0x8002) | length/value: 2 (0x2) | [2 is OAKLEY_SHA1] | ******emit ISAKMP Oakley attribute: | af+type: AF+OAKLEY_AUTHENTICATION_METHOD (0x8003) | length/value: 3 (0x3) | [3 is OAKLEY_RSA_SIG] | ******emit ISAKMP Oakley attribute: | af+type: AF+OAKLEY_GROUP_DESCRIPTION (0x8004) | length/value: 14 (0xe) | [14 is OAKLEY_GROUP_MODP2048] | ******emit ISAKMP Oakley attribute: | af+type: AF+OAKLEY_KEY_LENGTH (0x800e) | length/value: 128 (0x80) | emitting length of ISAKMP Transform Payload (ISAKMP): 36 | *****emit ISAKMP Transform Payload (ISAKMP): | next payload type: ISAKMP_NEXT_T (0x3) | ISAKMP transform number: 6 (0x6) | ISAKMP transform ID: KEY_IKE (0x1) | last substructure: checking 'ISAKMP Proposal Payload'.'ISAKMP Transform Payload (ISAKMP)'.'next payload type' is ISAKMP_NEXT_T (0x3) | last substructure: saving location 'ISAKMP Proposal Payload'.'ISAKMP Transform Payload (ISAKMP)'.'next payload type' | ******emit ISAKMP Oakley attribute: | af+type: AF+OAKLEY_LIFE_TYPE (0x800b) | length/value: 1 (0x1) | [1 is OAKLEY_LIFE_SECONDS] | ******emit ISAKMP Oakley attribute: | af+type: AF+OAKLEY_LIFE_DURATION (variable length) (0x800c) | length/value: 3600 (0xe10) | ******emit ISAKMP Oakley attribute: | af+type: AF+OAKLEY_ENCRYPTION_ALGORITHM (0x8001) | length/value: 7 (0x7) | [7 is OAKLEY_AES_CBC] | ******emit ISAKMP Oakley attribute: | af+type: AF+OAKLEY_HASH_ALGORITHM (0x8002) | length/value: 4 (0x4) | [4 is OAKLEY_SHA2_256] | ******emit ISAKMP Oakley attribute: | af+type: AF+OAKLEY_AUTHENTICATION_METHOD (0x8003) | length/value: 3 (0x3) | [3 is OAKLEY_RSA_SIG] | ******emit ISAKMP Oakley attribute: | af+type: AF+OAKLEY_GROUP_DESCRIPTION (0x8004) | length/value: 5 (0x5) | [5 is OAKLEY_GROUP_MODP1536] | ******emit ISAKMP Oakley attribute: | af+type: AF+OAKLEY_KEY_LENGTH (0x800e) | length/value: 256 (0x100) | emitting length of ISAKMP Transform Payload (ISAKMP): 36 | *****emit ISAKMP Transform Payload (ISAKMP): | next payload type: ISAKMP_NEXT_T (0x3) | ISAKMP transform number: 7 (0x7) | ISAKMP transform ID: KEY_IKE (0x1) | last substructure: checking 'ISAKMP Proposal Payload'.'ISAKMP Transform Payload (ISAKMP)'.'next payload type' is ISAKMP_NEXT_T (0x3) | last substructure: saving location 'ISAKMP Proposal Payload'.'ISAKMP Transform Payload (ISAKMP)'.'next payload type' | ******emit ISAKMP Oakley attribute: | af+type: AF+OAKLEY_LIFE_TYPE (0x800b) | length/value: 1 (0x1) | [1 is OAKLEY_LIFE_SECONDS] | ******emit ISAKMP Oakley attribute: | af+type: AF+OAKLEY_LIFE_DURATION (variable length) (0x800c) | length/value: 3600 (0xe10) | ******emit ISAKMP Oakley attribute: | af+type: AF+OAKLEY_ENCRYPTION_ALGORITHM (0x8001) | length/value: 7 (0x7) | [7 is OAKLEY_AES_CBC] | ******emit ISAKMP Oakley attribute: | af+type: AF+OAKLEY_HASH_ALGORITHM (0x8002) | length/value: 4 (0x4) | [4 is OAKLEY_SHA2_256] | ******emit ISAKMP Oakley attribute: | af+type: AF+OAKLEY_AUTHENTICATION_METHOD (0x8003) | length/value: 3 (0x3) | [3 is OAKLEY_RSA_SIG] | ******emit ISAKMP Oakley attribute: | af+type: AF+OAKLEY_GROUP_DESCRIPTION (0x8004) | length/value: 5 (0x5) | [5 is OAKLEY_GROUP_MODP1536] | ******emit ISAKMP Oakley attribute: | af+type: AF+OAKLEY_KEY_LENGTH (0x800e) | length/value: 128 (0x80) | emitting length of ISAKMP Transform Payload (ISAKMP): 36 | *****emit ISAKMP Transform Payload (ISAKMP): | next payload type: ISAKMP_NEXT_T (0x3) | ISAKMP transform number: 8 (0x8) | ISAKMP transform ID: KEY_IKE (0x1) | last substructure: checking 'ISAKMP Proposal Payload'.'ISAKMP Transform Payload (ISAKMP)'.'next payload type' is ISAKMP_NEXT_T (0x3) | last substructure: saving location 'ISAKMP Proposal Payload'.'ISAKMP Transform Payload (ISAKMP)'.'next payload type' | ******emit ISAKMP Oakley attribute: | af+type: AF+OAKLEY_LIFE_TYPE (0x800b) | length/value: 1 (0x1) | [1 is OAKLEY_LIFE_SECONDS] | ******emit ISAKMP Oakley attribute: | af+type: AF+OAKLEY_LIFE_DURATION (variable length) (0x800c) | length/value: 3600 (0xe10) | ******emit ISAKMP Oakley attribute: | af+type: AF+OAKLEY_ENCRYPTION_ALGORITHM (0x8001) | length/value: 7 (0x7) | [7 is OAKLEY_AES_CBC] | ******emit ISAKMP Oakley attribute: | af+type: AF+OAKLEY_HASH_ALGORITHM (0x8002) | length/value: 6 (0x6) | [6 is OAKLEY_SHA2_512] | ******emit ISAKMP Oakley attribute: | af+type: AF+OAKLEY_AUTHENTICATION_METHOD (0x8003) | length/value: 3 (0x3) | [3 is OAKLEY_RSA_SIG] | ******emit ISAKMP Oakley attribute: | af+type: AF+OAKLEY_GROUP_DESCRIPTION (0x8004) | length/value: 5 (0x5) | [5 is OAKLEY_GROUP_MODP1536] | ******emit ISAKMP Oakley attribute: | af+type: AF+OAKLEY_KEY_LENGTH (0x800e) | length/value: 256 (0x100) | emitting length of ISAKMP Transform Payload (ISAKMP): 36 | *****emit ISAKMP Transform Payload (ISAKMP): | next payload type: ISAKMP_NEXT_T (0x3) | ISAKMP transform number: 9 (0x9) | ISAKMP transform ID: KEY_IKE (0x1) | last substructure: checking 'ISAKMP Proposal Payload'.'ISAKMP Transform Payload (ISAKMP)'.'next payload type' is ISAKMP_NEXT_T (0x3) | last substructure: saving location 'ISAKMP Proposal Payload'.'ISAKMP Transform Payload (ISAKMP)'.'next payload type' | ******emit ISAKMP Oakley attribute: | af+type: AF+OAKLEY_LIFE_TYPE (0x800b) | length/value: 1 (0x1) | [1 is OAKLEY_LIFE_SECONDS] | ******emit ISAKMP Oakley attribute: | af+type: AF+OAKLEY_LIFE_DURATION (variable length) (0x800c) | length/value: 3600 (0xe10) | ******emit ISAKMP Oakley attribute: | af+type: AF+OAKLEY_ENCRYPTION_ALGORITHM (0x8001) | length/value: 7 (0x7) | [7 is OAKLEY_AES_CBC] | ******emit ISAKMP Oakley attribute: | af+type: AF+OAKLEY_HASH_ALGORITHM (0x8002) | length/value: 6 (0x6) | [6 is OAKLEY_SHA2_512] | ******emit ISAKMP Oakley attribute: | af+type: AF+OAKLEY_AUTHENTICATION_METHOD (0x8003) | length/value: 3 (0x3) | [3 is OAKLEY_RSA_SIG] | ******emit ISAKMP Oakley attribute: | af+type: AF+OAKLEY_GROUP_DESCRIPTION (0x8004) | length/value: 5 (0x5) | [5 is OAKLEY_GROUP_MODP1536] | ******emit ISAKMP Oakley attribute: | af+type: AF+OAKLEY_KEY_LENGTH (0x800e) | length/value: 128 (0x80) | emitting length of ISAKMP Transform Payload (ISAKMP): 36 | *****emit ISAKMP Transform Payload (ISAKMP): | next payload type: ISAKMP_NEXT_T (0x3) | ISAKMP transform number: 10 (0xa) | ISAKMP transform ID: KEY_IKE (0x1) | last substructure: checking 'ISAKMP Proposal Payload'.'ISAKMP Transform Payload (ISAKMP)'.'next payload type' is ISAKMP_NEXT_T (0x3) | last substructure: saving location 'ISAKMP Proposal Payload'.'ISAKMP Transform Payload (ISAKMP)'.'next payload type' | ******emit ISAKMP Oakley attribute: | af+type: AF+OAKLEY_LIFE_TYPE (0x800b) | length/value: 1 (0x1) | [1 is OAKLEY_LIFE_SECONDS] | ******emit ISAKMP Oakley attribute: | af+type: AF+OAKLEY_LIFE_DURATION (variable length) (0x800c) | length/value: 3600 (0xe10) | ******emit ISAKMP Oakley attribute: | af+type: AF+OAKLEY_ENCRYPTION_ALGORITHM (0x8001) | length/value: 7 (0x7) | [7 is OAKLEY_AES_CBC] | ******emit ISAKMP Oakley attribute: | af+type: AF+OAKLEY_HASH_ALGORITHM (0x8002) | length/value: 2 (0x2) | [2 is OAKLEY_SHA1] | ******emit ISAKMP Oakley attribute: | af+type: AF+OAKLEY_AUTHENTICATION_METHOD (0x8003) | length/value: 3 (0x3) | [3 is OAKLEY_RSA_SIG] | ******emit ISAKMP Oakley attribute: | af+type: AF+OAKLEY_GROUP_DESCRIPTION (0x8004) | length/value: 5 (0x5) | [5 is OAKLEY_GROUP_MODP1536] | ******emit ISAKMP Oakley attribute: | af+type: AF+OAKLEY_KEY_LENGTH (0x800e) | length/value: 256 (0x100) | emitting length of ISAKMP Transform Payload (ISAKMP): 36 | *****emit ISAKMP Transform Payload (ISAKMP): | next payload type: ISAKMP_NEXT_T (0x3) | ISAKMP transform number: 11 (0xb) | ISAKMP transform ID: KEY_IKE (0x1) | last substructure: checking 'ISAKMP Proposal Payload'.'ISAKMP Transform Payload (ISAKMP)'.'next payload type' is ISAKMP_NEXT_T (0x3) | last substructure: saving location 'ISAKMP Proposal Payload'.'ISAKMP Transform Payload (ISAKMP)'.'next payload type' | ******emit ISAKMP Oakley attribute: | af+type: AF+OAKLEY_LIFE_TYPE (0x800b) | length/value: 1 (0x1) | [1 is OAKLEY_LIFE_SECONDS] | ******emit ISAKMP Oakley attribute: | af+type: AF+OAKLEY_LIFE_DURATION (variable length) (0x800c) | length/value: 3600 (0xe10) | ******emit ISAKMP Oakley attribute: | af+type: AF+OAKLEY_ENCRYPTION_ALGORITHM (0x8001) | length/value: 7 (0x7) | [7 is OAKLEY_AES_CBC] | ******emit ISAKMP Oakley attribute: | af+type: AF+OAKLEY_HASH_ALGORITHM (0x8002) | length/value: 2 (0x2) | [2 is OAKLEY_SHA1] | ******emit ISAKMP Oakley attribute: | af+type: AF+OAKLEY_AUTHENTICATION_METHOD (0x8003) | length/value: 3 (0x3) | [3 is OAKLEY_RSA_SIG] | ******emit ISAKMP Oakley attribute: | af+type: AF+OAKLEY_GROUP_DESCRIPTION (0x8004) | length/value: 5 (0x5) | [5 is OAKLEY_GROUP_MODP1536] | ******emit ISAKMP Oakley attribute: | af+type: AF+OAKLEY_KEY_LENGTH (0x800e) | length/value: 128 (0x80) | emitting length of ISAKMP Transform Payload (ISAKMP): 36 | *****emit ISAKMP Transform Payload (ISAKMP): | next payload type: ISAKMP_NEXT_T (0x3) | ISAKMP transform number: 12 (0xc) | ISAKMP transform ID: KEY_IKE (0x1) | last substructure: checking 'ISAKMP Proposal Payload'.'ISAKMP Transform Payload (ISAKMP)'.'next payload type' is ISAKMP_NEXT_T (0x3) | last substructure: saving location 'ISAKMP Proposal Payload'.'ISAKMP Transform Payload (ISAKMP)'.'next payload type' | ******emit ISAKMP Oakley attribute: | af+type: AF+OAKLEY_LIFE_TYPE (0x800b) | length/value: 1 (0x1) | [1 is OAKLEY_LIFE_SECONDS] | ******emit ISAKMP Oakley attribute: | af+type: AF+OAKLEY_LIFE_DURATION (variable length) (0x800c) | length/value: 3600 (0xe10) | ******emit ISAKMP Oakley attribute: | af+type: AF+OAKLEY_ENCRYPTION_ALGORITHM (0x8001) | length/value: 5 (0x5) | [5 is OAKLEY_3DES_CBC] | ******emit ISAKMP Oakley attribute: | af+type: AF+OAKLEY_HASH_ALGORITHM (0x8002) | length/value: 4 (0x4) | [4 is OAKLEY_SHA2_256] | ******emit ISAKMP Oakley attribute: | af+type: AF+OAKLEY_AUTHENTICATION_METHOD (0x8003) | length/value: 3 (0x3) | [3 is OAKLEY_RSA_SIG] | ******emit ISAKMP Oakley attribute: | af+type: AF+OAKLEY_GROUP_DESCRIPTION (0x8004) | length/value: 14 (0xe) | [14 is OAKLEY_GROUP_MODP2048] | emitting length of ISAKMP Transform Payload (ISAKMP): 32 | *****emit ISAKMP Transform Payload (ISAKMP): | next payload type: ISAKMP_NEXT_T (0x3) | ISAKMP transform number: 13 (0xd) | ISAKMP transform ID: KEY_IKE (0x1) | last substructure: checking 'ISAKMP Proposal Payload'.'ISAKMP Transform Payload (ISAKMP)'.'next payload type' is ISAKMP_NEXT_T (0x3) | last substructure: saving location 'ISAKMP Proposal Payload'.'ISAKMP Transform Payload (ISAKMP)'.'next payload type' | ******emit ISAKMP Oakley attribute: | af+type: AF+OAKLEY_LIFE_TYPE (0x800b) | length/value: 1 (0x1) | [1 is OAKLEY_LIFE_SECONDS] | ******emit ISAKMP Oakley attribute: | af+type: AF+OAKLEY_LIFE_DURATION (variable length) (0x800c) | length/value: 3600 (0xe10) | ******emit ISAKMP Oakley attribute: | af+type: AF+OAKLEY_ENCRYPTION_ALGORITHM (0x8001) | length/value: 5 (0x5) | [5 is OAKLEY_3DES_CBC] | ******emit ISAKMP Oakley attribute: | af+type: AF+OAKLEY_HASH_ALGORITHM (0x8002) | length/value: 6 (0x6) | [6 is OAKLEY_SHA2_512] | ******emit ISAKMP Oakley attribute: | af+type: AF+OAKLEY_AUTHENTICATION_METHOD (0x8003) | length/value: 3 (0x3) | [3 is OAKLEY_RSA_SIG] | ******emit ISAKMP Oakley attribute: | af+type: AF+OAKLEY_GROUP_DESCRIPTION (0x8004) | length/value: 14 (0xe) | [14 is OAKLEY_GROUP_MODP2048] | emitting length of ISAKMP Transform Payload (ISAKMP): 32 | *****emit ISAKMP Transform Payload (ISAKMP): | next payload type: ISAKMP_NEXT_T (0x3) | ISAKMP transform number: 14 (0xe) | ISAKMP transform ID: KEY_IKE (0x1) | last substructure: checking 'ISAKMP Proposal Payload'.'ISAKMP Transform Payload (ISAKMP)'.'next payload type' is ISAKMP_NEXT_T (0x3) | last substructure: saving location 'ISAKMP Proposal Payload'.'ISAKMP Transform Payload (ISAKMP)'.'next payload type' | ******emit ISAKMP Oakley attribute: | af+type: AF+OAKLEY_LIFE_TYPE (0x800b) | length/value: 1 (0x1) | [1 is OAKLEY_LIFE_SECONDS] | ******emit ISAKMP Oakley attribute: | af+type: AF+OAKLEY_LIFE_DURATION (variable length) (0x800c) | length/value: 3600 (0xe10) | ******emit ISAKMP Oakley attribute: | af+type: AF+OAKLEY_ENCRYPTION_ALGORITHM (0x8001) | length/value: 5 (0x5) | [5 is OAKLEY_3DES_CBC] | ******emit ISAKMP Oakley attribute: | af+type: AF+OAKLEY_HASH_ALGORITHM (0x8002) | length/value: 2 (0x2) | [2 is OAKLEY_SHA1] | ******emit ISAKMP Oakley attribute: | af+type: AF+OAKLEY_AUTHENTICATION_METHOD (0x8003) | length/value: 3 (0x3) | [3 is OAKLEY_RSA_SIG] | ******emit ISAKMP Oakley attribute: | af+type: AF+OAKLEY_GROUP_DESCRIPTION (0x8004) | length/value: 14 (0xe) | [14 is OAKLEY_GROUP_MODP2048] | emitting length of ISAKMP Transform Payload (ISAKMP): 32 | *****emit ISAKMP Transform Payload (ISAKMP): | next payload type: ISAKMP_NEXT_T (0x3) | ISAKMP transform number: 15 (0xf) | ISAKMP transform ID: KEY_IKE (0x1) | last substructure: checking 'ISAKMP Proposal Payload'.'ISAKMP Transform Payload (ISAKMP)'.'next payload type' is ISAKMP_NEXT_T (0x3) | last substructure: saving location 'ISAKMP Proposal Payload'.'ISAKMP Transform Payload (ISAKMP)'.'next payload type' | ******emit ISAKMP Oakley attribute: | af+type: AF+OAKLEY_LIFE_TYPE (0x800b) | length/value: 1 (0x1) | [1 is OAKLEY_LIFE_SECONDS] | ******emit ISAKMP Oakley attribute: | af+type: AF+OAKLEY_LIFE_DURATION (variable length) (0x800c) | length/value: 3600 (0xe10) | ******emit ISAKMP Oakley attribute: | af+type: AF+OAKLEY_ENCRYPTION_ALGORITHM (0x8001) | length/value: 5 (0x5) | [5 is OAKLEY_3DES_CBC] | ******emit ISAKMP Oakley attribute: | af+type: AF+OAKLEY_HASH_ALGORITHM (0x8002) | length/value: 4 (0x4) | [4 is OAKLEY_SHA2_256] | ******emit ISAKMP Oakley attribute: | af+type: AF+OAKLEY_AUTHENTICATION_METHOD (0x8003) | length/value: 3 (0x3) | [3 is OAKLEY_RSA_SIG] | ******emit ISAKMP Oakley attribute: | af+type: AF+OAKLEY_GROUP_DESCRIPTION (0x8004) | length/value: 5 (0x5) | [5 is OAKLEY_GROUP_MODP1536] | emitting length of ISAKMP Transform Payload (ISAKMP): 32 | *****emit ISAKMP Transform Payload (ISAKMP): | next payload type: ISAKMP_NEXT_T (0x3) | ISAKMP transform number: 16 (0x10) | ISAKMP transform ID: KEY_IKE (0x1) | last substructure: checking 'ISAKMP Proposal Payload'.'ISAKMP Transform Payload (ISAKMP)'.'next payload type' is ISAKMP_NEXT_T (0x3) | last substructure: saving location 'ISAKMP Proposal Payload'.'ISAKMP Transform Payload (ISAKMP)'.'next payload type' | ******emit ISAKMP Oakley attribute: | af+type: AF+OAKLEY_LIFE_TYPE (0x800b) | length/value: 1 (0x1) | [1 is OAKLEY_LIFE_SECONDS] | ******emit ISAKMP Oakley attribute: | af+type: AF+OAKLEY_LIFE_DURATION (variable length) (0x800c) | length/value: 3600 (0xe10) | ******emit ISAKMP Oakley attribute: | af+type: AF+OAKLEY_ENCRYPTION_ALGORITHM (0x8001) | length/value: 5 (0x5) | [5 is OAKLEY_3DES_CBC] | ******emit ISAKMP Oakley attribute: | af+type: AF+OAKLEY_HASH_ALGORITHM (0x8002) | length/value: 6 (0x6) | [6 is OAKLEY_SHA2_512] | ******emit ISAKMP Oakley attribute: | af+type: AF+OAKLEY_AUTHENTICATION_METHOD (0x8003) | length/value: 3 (0x3) | [3 is OAKLEY_RSA_SIG] | ******emit ISAKMP Oakley attribute: | af+type: AF+OAKLEY_GROUP_DESCRIPTION (0x8004) | length/value: 5 (0x5) | [5 is OAKLEY_GROUP_MODP1536] | emitting length of ISAKMP Transform Payload (ISAKMP): 32 | *****emit ISAKMP Transform Payload (ISAKMP): | next payload type: ISAKMP_NEXT_NONE (0x0) | ISAKMP transform number: 17 (0x11) | ISAKMP transform ID: KEY_IKE (0x1) | last substructure: checking 'ISAKMP Proposal Payload'.'ISAKMP Transform Payload (ISAKMP)'.'next payload type' is ISAKMP_NEXT_T (0x3) | last substructure: saving location 'ISAKMP Proposal Payload'.'ISAKMP Transform Payload (ISAKMP)'.'next payload type' | ******emit ISAKMP Oakley attribute: | af+type: AF+OAKLEY_LIFE_TYPE (0x800b) | length/value: 1 (0x1) | [1 is OAKLEY_LIFE_SECONDS] | ******emit ISAKMP Oakley attribute: | af+type: AF+OAKLEY_LIFE_DURATION (variable length) (0x800c) | length/value: 3600 (0xe10) | ******emit ISAKMP Oakley attribute: | af+type: AF+OAKLEY_ENCRYPTION_ALGORITHM (0x8001) | length/value: 5 (0x5) | [5 is OAKLEY_3DES_CBC] | ******emit ISAKMP Oakley attribute: | af+type: AF+OAKLEY_HASH_ALGORITHM (0x8002) | length/value: 2 (0x2) | [2 is OAKLEY_SHA1] | ******emit ISAKMP Oakley attribute: | af+type: AF+OAKLEY_AUTHENTICATION_METHOD (0x8003) | length/value: 3 (0x3) | [3 is OAKLEY_RSA_SIG] | ******emit ISAKMP Oakley attribute: | af+type: AF+OAKLEY_GROUP_DESCRIPTION (0x8004) | length/value: 5 (0x5) | [5 is OAKLEY_GROUP_MODP1536] | emitting length of ISAKMP Transform Payload (ISAKMP): 32 | emitting length of ISAKMP Proposal Payload: 632 | last substructure: checking 'ISAKMP Proposal Payload'.'ISAKMP Transform Payload (ISAKMP)'.'next payload type' is 0 | emitting length of ISAKMP Security Association Payload: 644 | last substructure: checking 'ISAKMP Security Association Payload'.'ISAKMP Proposal Payload'.'next payload type' is 0 | out_vid(): sending [FRAGMENTATION] | ***emit ISAKMP Vendor ID Payload: | next payload type: ISAKMP_NEXT_VID (0xd) | next payload chain: ignoring supplied 'ISAKMP Vendor ID Payload'.'next payload type' value 13:ISAKMP_NEXT_VID | next payload chain: setting previous 'ISAKMP Security Association Payload'.'next payload type' to current ISAKMP Vendor ID Payload (13:ISAKMP_NEXT_VID) | next payload chain: saving location 'ISAKMP Vendor ID Payload'.'next payload type' in 'reply packet' | emitting 16 raw bytes of V_ID into ISAKMP Vendor ID Payload | V_ID 40 48 b7 d5 6e bc e8 85 25 e7 de 7f 00 d6 c2 d3 | emitting length of ISAKMP Vendor ID Payload: 20 | out_vid(): sending [Dead Peer Detection] | ***emit ISAKMP Vendor ID Payload: | next payload type: ISAKMP_NEXT_NONE (0x0) | next payload chain: setting previous 'ISAKMP Vendor ID Payload'.'next payload type' to current ISAKMP Vendor ID Payload (13:ISAKMP_NEXT_VID) | next payload chain: saving location 'ISAKMP Vendor ID Payload'.'next payload type' in 'reply packet' | emitting 16 raw bytes of V_ID into ISAKMP Vendor ID Payload | V_ID af ca d7 13 68 a1 f1 c9 6b 86 96 fc 77 57 01 00 | emitting length of ISAKMP Vendor ID Payload: 20 | nat add vid | sending draft and RFC NATT VIDs | out_vid(): sending [RFC 3947] | ***emit ISAKMP Vendor ID Payload: | next payload type: ISAKMP_NEXT_VID (0xd) | next payload chain: ignoring supplied 'ISAKMP Vendor ID Payload'.'next payload type' value 13:ISAKMP_NEXT_VID | next payload chain: setting previous 'ISAKMP Vendor ID Payload'.'next payload type' to current ISAKMP Vendor ID Payload (13:ISAKMP_NEXT_VID) | next payload chain: saving location 'ISAKMP Vendor ID Payload'.'next payload type' in 'reply packet' | emitting 16 raw bytes of V_ID into ISAKMP Vendor ID Payload | V_ID 4a 13 1c 81 07 03 58 45 5c 57 28 f2 0e 95 45 2f | emitting length of ISAKMP Vendor ID Payload: 20 | skipping VID_NATT_RFC | out_vid(): sending [draft-ietf-ipsec-nat-t-ike-03] | ***emit ISAKMP Vendor ID Payload: | next payload type: ISAKMP_NEXT_VID (0xd) | next payload chain: ignoring supplied 'ISAKMP Vendor ID Payload'.'next payload type' value 13:ISAKMP_NEXT_VID | next payload chain: setting previous 'ISAKMP Vendor ID Payload'.'next payload type' to current ISAKMP Vendor ID Payload (13:ISAKMP_NEXT_VID) | next payload chain: saving location 'ISAKMP Vendor ID Payload'.'next payload type' in 'reply packet' | emitting 16 raw bytes of V_ID into ISAKMP Vendor ID Payload | V_ID 7d 94 19 a6 53 10 ca 6f 2c 17 9d 92 15 52 9d 56 | emitting length of ISAKMP Vendor ID Payload: 20 | out_vid(): sending [draft-ietf-ipsec-nat-t-ike-02_n] | ***emit ISAKMP Vendor ID Payload: | next payload type: ISAKMP_NEXT_VID (0xd) | next payload chain: ignoring supplied 'ISAKMP Vendor ID Payload'.'next payload type' value 13:ISAKMP_NEXT_VID | next payload chain: setting previous 'ISAKMP Vendor ID Payload'.'next payload type' to current ISAKMP Vendor ID Payload (13:ISAKMP_NEXT_VID) | next payload chain: saving location 'ISAKMP Vendor ID Payload'.'next payload type' in 'reply packet' | emitting 16 raw bytes of V_ID into ISAKMP Vendor ID Payload | V_ID 90 cb 80 91 3e bb 69 6e 08 63 81 b5 ec 42 7b 1f | emitting length of ISAKMP Vendor ID Payload: 20 | out_vid(): sending [draft-ietf-ipsec-nat-t-ike-02] | ***emit ISAKMP Vendor ID Payload: | next payload type: ISAKMP_NEXT_NONE (0x0) | next payload chain: setting previous 'ISAKMP Vendor ID Payload'.'next payload type' to current ISAKMP Vendor ID Payload (13:ISAKMP_NEXT_VID) | next payload chain: saving location 'ISAKMP Vendor ID Payload'.'next payload type' in 'reply packet' | emitting 16 raw bytes of V_ID into ISAKMP Vendor ID Payload | V_ID cd 60 46 43 35 df 21 f8 7c fd b2 fc 68 b6 a4 48 | emitting length of ISAKMP Vendor ID Payload: 20 | no IKEv1 message padding required | emitting length of ISAKMP Message: 792 | sending 792 bytes for reply packet for main_outI1 through eth1 from 192.1.2.45:500 to 192.1.2.23:500 (using #6) | f6 10 7d 32 d2 59 26 07 00 00 00 00 00 00 00 00 | 01 10 02 00 00 00 00 00 00 00 03 18 0d 00 02 84 | 00 00 00 01 00 00 00 01 00 00 02 78 00 01 00 12 | 03 00 00 24 00 01 00 00 80 0b 00 01 80 0c 0e 10 | 80 01 00 07 80 02 00 04 80 03 00 03 80 04 00 0e | 80 0e 01 00 03 00 00 24 01 01 00 00 80 0b 00 01 | 80 0c 0e 10 80 01 00 07 80 02 00 04 80 03 00 03 | 80 04 00 0e 80 0e 00 80 03 00 00 24 02 01 00 00 | 80 0b 00 01 80 0c 0e 10 80 01 00 07 80 02 00 06 | 80 03 00 03 80 04 00 0e 80 0e 01 00 03 00 00 24 | 03 01 00 00 80 0b 00 01 80 0c 0e 10 80 01 00 07 | 80 02 00 06 80 03 00 03 80 04 00 0e 80 0e 00 80 | 03 00 00 24 04 01 00 00 80 0b 00 01 80 0c 0e 10 | 80 01 00 07 80 02 00 02 80 03 00 03 80 04 00 0e | 80 0e 01 00 03 00 00 24 05 01 00 00 80 0b 00 01 | 80 0c 0e 10 80 01 00 07 80 02 00 02 80 03 00 03 | 80 04 00 0e 80 0e 00 80 03 00 00 24 06 01 00 00 | 80 0b 00 01 80 0c 0e 10 80 01 00 07 80 02 00 04 | 80 03 00 03 80 04 00 05 80 0e 01 00 03 00 00 24 | 07 01 00 00 80 0b 00 01 80 0c 0e 10 80 01 00 07 | 80 02 00 04 80 03 00 03 80 04 00 05 80 0e 00 80 | 03 00 00 24 08 01 00 00 80 0b 00 01 80 0c 0e 10 | 80 01 00 07 80 02 00 06 80 03 00 03 80 04 00 05 | 80 0e 01 00 03 00 00 24 09 01 00 00 80 0b 00 01 | 80 0c 0e 10 80 01 00 07 80 02 00 06 80 03 00 03 | 80 04 00 05 80 0e 00 80 03 00 00 24 0a 01 00 00 | 80 0b 00 01 80 0c 0e 10 80 01 00 07 80 02 00 02 | 80 03 00 03 80 04 00 05 80 0e 01 00 03 00 00 24 | 0b 01 00 00 80 0b 00 01 80 0c 0e 10 80 01 00 07 | 80 02 00 02 80 03 00 03 80 04 00 05 80 0e 00 80 | 03 00 00 20 0c 01 00 00 80 0b 00 01 80 0c 0e 10 | 80 01 00 05 80 02 00 04 80 03 00 03 80 04 00 0e | 03 00 00 20 0d 01 00 00 80 0b 00 01 80 0c 0e 10 | 80 01 00 05 80 02 00 06 80 03 00 03 80 04 00 0e | 03 00 00 20 0e 01 00 00 80 0b 00 01 80 0c 0e 10 | 80 01 00 05 80 02 00 02 80 03 00 03 80 04 00 0e | 03 00 00 20 0f 01 00 00 80 0b 00 01 80 0c 0e 10 | 80 01 00 05 80 02 00 04 80 03 00 03 80 04 00 05 | 03 00 00 20 10 01 00 00 80 0b 00 01 80 0c 0e 10 | 80 01 00 05 80 02 00 06 80 03 00 03 80 04 00 05 | 00 00 00 20 11 01 00 00 80 0b 00 01 80 0c 0e 10 | 80 01 00 05 80 02 00 02 80 03 00 03 80 04 00 05 | 0d 00 00 14 40 48 b7 d5 6e bc e8 85 25 e7 de 7f | 00 d6 c2 d3 0d 00 00 14 af ca d7 13 68 a1 f1 c9 | 6b 86 96 fc 77 57 01 00 0d 00 00 14 4a 13 1c 81 | 07 03 58 45 5c 57 28 f2 0e 95 45 2f 0d 00 00 14 | 7d 94 19 a6 53 10 ca 6f 2c 17 9d 92 15 52 9d 56 | 0d 00 00 14 90 cb 80 91 3e bb 69 6e 08 63 81 b5 | ec 42 7b 1f 00 00 00 14 cd 60 46 43 35 df 21 f8 | 7c fd b2 fc 68 b6 a4 48 "westnets-eastnet/1x0" #6: IMPAIR: suppressing retransmits; scheduling timeout in 60 seconds | event_schedule: new EVENT_RETRANSMIT-pe@0x5570e4b63678 | inserting event EVENT_RETRANSMIT, timeout in 60 seconds for #6 | libevent_malloc: new ptr-libevent@0x7fa9e4003878 size 128 | #6 STATE_MAIN_I1: retransmits: first event in 60 seconds; timeout in 60 seconds; limit of 12 retransmits; current time is 11350.676156 | stop processing: state #6 connection "westnets-eastnet/1x0" from 192.1.2.23 (in main_outI1() at ikev1_main.c:228) | event_schedule: new EVENT_SA_EXPIRE-pe@0x5570e4c16348 | inserting event EVENT_SA_EXPIRE, timeout in 0 seconds for #5 | libevent_malloc: new ptr-libevent@0x5570e4c19b18 size 128 | libevent_free: release ptr-libevent@0x5570e4b87ef8 | free_event_entry: release EVENT_SA_REPLACE-pe@0x7fa9e0004218 | processing: STOP state #0 (in timer_event_cb() at timer.c:557) | timer_event_cb: processing event@0x7fa9d40058b8 | handling event EVENT_SA_REPLACE for child state #4 | start processing: state #4 connection "westnets-eastnet/2x0" from 192.1.2.23 (in timer_event_cb() at timer.c:250) | picked newest_ipsec_sa #0 for #4 | replacing stale IPsec SA | dup_any(fd@-1) -> fd@-1 (in ipsecdoi_replace() at ipsec_doi.c:351) | FOR_EACH_STATE_... in find_phase1_state | Queuing pending IPsec SA negotiating with 192.1.2.23 "westnets-eastnet/2x0" IKE SA #6 "westnets-eastnet/1x0" | event_schedule: new EVENT_SA_EXPIRE-pe@0x7fa9e0004218 | inserting event EVENT_SA_EXPIRE, timeout in 0 seconds for #4 | libevent_malloc: new ptr-libevent@0x5570e4b87ef8 size 128 | libevent_free: release ptr-libevent@0x5570e4c0d2e8 | free_event_entry: release EVENT_SA_REPLACE-pe@0x7fa9d40058b8 | stop processing: state #4 connection "westnets-eastnet/2x0" from 192.1.2.23 (in timer_event_cb() at timer.c:557) | processing global timer EVENT_REVIVE_CONNS Initiating connection westnets-eastnet/2x0 which received a Delete/Notify but must remain up per local policy | FOR_EACH_CONNECTION_... in conn_by_name | start processing: connection "westnets-eastnet/2x0" (in initiate_a_connection() at initiate.c:186) | empty esp_info, returning defaults for ENCRYPT | connection 'westnets-eastnet/2x0' +POLICY_UP | dup_any(fd@-1) -> fd@-1 (in initiate_a_connection() at initiate.c:342) | FOR_EACH_STATE_... in find_phase1_state | Ignored already queued up pending IPsec SA negotiation with 192.1.2.23 "westnets-eastnet/2x0" | stop processing: connection "westnets-eastnet/2x0" (in initiate_a_connection() at initiate.c:349) | timer_event_cb: processing event@0x5570e4c16348 | handling event EVENT_SA_EXPIRE for child state #5 | start processing: state #5 connection "westnets-eastnet/1x0" from 192.1.2.23 (in timer_event_cb() at timer.c:250) | picked newest_ipsec_sa #0 for #5 | un-established partial CHILD SA timeout (SA expired) | pstats #5 ikev1.ipsec failed exchange-timeout | pstats #5 ikev1.ipsec deleted exchange-timeout | [RE]START processing: state #5 connection "westnets-eastnet/1x0" from 192.1.2.23 (in delete_state() at state.c:879) "westnets-eastnet/1x0" #5: deleting state (STATE_QUICK_I1) aged 0.012s and NOT sending notification | child state #5: QUICK_I1(established CHILD SA) => delete | child state #5: QUICK_I1(established CHILD SA) => CHILDSA_DEL(informational) | priority calculation of connection "westnets-eastnet/1x0" is 0xfe7e7 | delete inbound eroute 192.0.2.0/24:0 --0-> 192.0.1.0/24:0 => unk255.10000@192.1.2.45 (raw_eroute) | raw_eroute result=success | in connection_discard for connection westnets-eastnet/1x0 | State DB: deleting IKEv1 state #5 in CHILDSA_DEL | child state #5: CHILDSA_DEL(informational) => UNDEFINED(ignore) | stop processing: state #5 from 192.1.2.23 (in delete_state() at state.c:1143) | delete_state: release st->st_shared_nss-key@NULL | delete_state: release st->st_skeyid_nss-key@0x5570e4bedc70 | delete_state: release st->st_skey_d_nss-key@0x5570e4bec1c0 | delete_state: release st->st_skey_ai_nss-key@0x5570e4be4dc0 | delete_state: release st->st_skey_ar_nss-key@NULL | delete_state: release st->st_skey_ei_nss-key@0x5570e4befab0 | delete_state: release st->st_skey_er_nss-key@NULL | delete_state: release st->st_skey_pi_nss-key@NULL | delete_state: release st->st_skey_pr_nss-key@NULL | delete_state: release st->st_enc_key_nss-key@0x5570e4be6640 | delete_state: release st->st_sk_d_no_ppk-key@NULL | delete_state: release st->st_sk_pi_no_ppk-key@NULL | delete_state: release st->st_sk_pr_no_ppk-key@NULL | libevent_free: release ptr-libevent@0x5570e4c19b18 | free_event_entry: release EVENT_SA_EXPIRE-pe@0x5570e4c16348 | in statetime_stop() and could not find #5 | processing: STOP state #0 (in timer_event_cb() at timer.c:557) | timer_event_cb: processing event@0x7fa9e0004218 | handling event EVENT_SA_EXPIRE for child state #4 | start processing: state #4 connection "westnets-eastnet/2x0" from 192.1.2.23 (in timer_event_cb() at timer.c:250) | picked newest_ipsec_sa #0 for #4 | un-established partial CHILD SA timeout (SA expired) | pstats #4 ikev1.ipsec failed exchange-timeout | pstats #4 ikev1.ipsec deleted exchange-timeout | [RE]START processing: state #4 connection "westnets-eastnet/2x0" from 192.1.2.23 (in delete_state() at state.c:879) "westnets-eastnet/2x0" #4: deleting state (STATE_QUICK_I1) aged 0.022s and NOT sending notification | child state #4: QUICK_I1(established CHILD SA) => delete | child state #4: QUICK_I1(established CHILD SA) => CHILDSA_DEL(informational) | priority calculation of connection "westnets-eastnet/2x0" is 0xfe7e7 | delete inbound eroute 192.0.2.0/24:0 --0-> 192.0.11.0/24:0 => unk255.10000@192.1.2.45 (raw_eroute) | raw_eroute result=success | in connection_discard for connection westnets-eastnet/2x0 | State DB: deleting IKEv1 state #4 in CHILDSA_DEL | child state #4: CHILDSA_DEL(informational) => UNDEFINED(ignore) | DH secret MODP2048@0x7fa9d0003618: destroyed | stop processing: state #4 from 192.1.2.23 (in delete_state() at state.c:1143) | delete_state: release st->st_shared_nss-key@NULL | delete_state: release st->st_skeyid_nss-key@0x5570e4bedc70 | delete_state: release st->st_skey_d_nss-key@0x5570e4bec1c0 | delete_state: release st->st_skey_ai_nss-key@0x5570e4be4dc0 | delete_state: release st->st_skey_ar_nss-key@NULL | delete_state: release st->st_skey_ei_nss-key@0x5570e4befab0 | delete_state: release st->st_skey_er_nss-key@NULL | delete_state: release st->st_skey_pi_nss-key@NULL | delete_state: release st->st_skey_pr_nss-key@NULL | delete_state: release st->st_enc_key_nss-key@0x5570e4be6640 | delete_state: release st->st_sk_d_no_ppk-key@NULL | delete_state: release st->st_sk_pi_no_ppk-key@NULL | delete_state: release st->st_sk_pr_no_ppk-key@NULL | libevent_free: release ptr-libevent@0x5570e4b87ef8 | free_event_entry: release EVENT_SA_EXPIRE-pe@0x7fa9e0004218 | in statetime_stop() and could not find #4 | processing: STOP state #0 (in timer_event_cb() at timer.c:557) | accept(whackctlfd, (struct sockaddr *)&whackaddr, &whackaddrlen) -> fd@16 (in whack_handle() at rcv_whack.c:722) shutting down | processing: RESET whack log_fd (was fd@16) (in exit_pluto() at plutomain.c:1825) | certs and keys locked by 'free_preshared_secrets' forgetting secrets | certs and keys unlocked by 'free_preshared_secrets' | unreference key: 0x5570e4c025f8 @east cnt 1-- | unreference key: 0x5570e4b5ac48 @west cnt 1-- | start processing: connection "westnets-eastnet/2x0" (in delete_connection() at connections.c:189) | removing pending policy for no connection {0x5570e4c00f58} | Deleting states for connection - including all other IPsec SA's of this IKE SA | pass 0 | FOR_EACH_STATE_... in foreach_state_by_connection_func_delete | state #6 | pass 1 | FOR_EACH_STATE_... in foreach_state_by_connection_func_delete | state #6 | shunt_eroute() called for connection 'westnets-eastnet/2x0' to 'delete' for rt_kind 'unrouted' using protoports 0--0->-0 | netlink_shunt_eroute for proto 0, and source port 0 dest port 0 | priority calculation of connection "westnets-eastnet/2x0" is 0xfe7e7 | priority calculation of connection "westnets-eastnet/2x0" is 0xfe7e7 | FOR_EACH_CONNECTION_... in route_owner | conn westnets-eastnet/2x0 mark 0/00000000, 0/00000000 vs | conn westnets-eastnet/2x0 mark 0/00000000, 0/00000000 | conn westnets-eastnet/2x0 mark 0/00000000, 0/00000000 vs | conn westnets-eastnet/1x0 mark 0/00000000, 0/00000000 | route owner of "westnets-eastnet/2x0" unrouted: "westnets-eastnet/1x0" prospective erouted | flush revival: connection 'westnets-eastnet/2x0' wasn't on the list | stop processing: connection "westnets-eastnet/2x0" (in discard_connection() at connections.c:249) | start processing: connection "westnets-eastnet/1x0" (in delete_connection() at connections.c:189) | removing pending policy for no connection {0x5570e4b5a898} | Deleting states for connection - including all other IPsec SA's of this IKE SA | pass 0 | FOR_EACH_STATE_... in foreach_state_by_connection_func_delete | state #6 | suspend processing: connection "westnets-eastnet/1x0" (in foreach_state_by_connection_func_delete() at state.c:1310) | start processing: state #6 connection "westnets-eastnet/1x0" from 192.1.2.23 (in foreach_state_by_connection_func_delete() at state.c:1310) | pstats #6 ikev1.isakmp deleted other | [RE]START processing: state #6 connection "westnets-eastnet/1x0" from 192.1.2.23 (in delete_state() at state.c:879) "westnets-eastnet/1x0" #6: deleting state (STATE_MAIN_I1) aged 0.722s and NOT sending notification | parent state #6: MAIN_I1(half-open IKE SA) => delete | state #6 requesting EVENT_RETRANSMIT to be deleted | #6 STATE_MAIN_I1: retransmits: cleared | libevent_free: release ptr-libevent@0x7fa9e4003878 | free_event_entry: release EVENT_RETRANSMIT-pe@0x5570e4b63678 | State DB: IKEv1 state not found (flush_incomplete_children) | picked newest_isakmp_sa #0 for #6 "westnets-eastnet/1x0" #6: deleting IKE SA for connection 'westnets-eastnet/1x0' but connection is supposed to remain up; schedule EVENT_REVIVE_CONNS | add revival: connection 'westnets-eastnet/1x0' added to the list and scheduled for 0 seconds | global one-shot timer EVENT_REVIVE_CONNS scheduled in 0 seconds | stop processing: connection "westnets-eastnet/1x0" (BACKGROUND) (in update_state_connection() at connections.c:4076) | start processing: connection NULL (in update_state_connection() at connections.c:4077) | in connection_discard for connection westnets-eastnet/1x0 | State DB: deleting IKEv1 state #6 in MAIN_I1 | parent state #6: MAIN_I1(half-open IKE SA) => UNDEFINED(ignore) | stop processing: state #6 from 192.1.2.23 (in delete_state() at state.c:1143) | delete_state: release st->st_shared_nss-key@NULL | delete_state: release st->st_skeyid_nss-key@NULL | delete_state: release st->st_skey_d_nss-key@NULL | delete_state: release st->st_skey_ai_nss-key@NULL | delete_state: release st->st_skey_ar_nss-key@NULL | delete_state: release st->st_skey_ei_nss-key@NULL | delete_state: release st->st_skey_er_nss-key@NULL | delete_state: release st->st_skey_pi_nss-key@NULL | delete_state: release st->st_skey_pr_nss-key@NULL | delete_state: release st->st_enc_key_nss-key@NULL | delete_state: release st->st_sk_d_no_ppk-key@NULL | delete_state: release st->st_sk_pi_no_ppk-key@NULL | delete_state: release st->st_sk_pr_no_ppk-key@NULL | processing: STOP state #0 (in foreach_state_by_connection_func_delete() at state.c:1312) | pass 1 | FOR_EACH_STATE_... in foreach_state_by_connection_func_delete | shunt_eroute() called for connection 'westnets-eastnet/1x0' to 'delete' for rt_kind 'unrouted' using protoports 0--0->-0 | netlink_shunt_eroute for proto 0, and source port 0 dest port 0 | priority calculation of connection "westnets-eastnet/1x0" is 0xfe7e7 | priority calculation of connection "westnets-eastnet/1x0" is 0xfe7e7 | FOR_EACH_CONNECTION_... in route_owner | conn westnets-eastnet/1x0 mark 0/00000000, 0/00000000 vs | conn westnets-eastnet/1x0 mark 0/00000000, 0/00000000 | route owner of "westnets-eastnet/1x0" unrouted: NULL | running updown command "ipsec _updown" for verb unroute | command executing unroute-client | executing unroute-client: PLUTO_VERB='unroute-client' PLUTO_VERSION='2.0' PLUTO_CONNECTION='westnets-eastnet/1x0' PLUTO_INTERFACE='eth1' PLUTO_NEXT_HOP='192.1.2.23' PLUTO_ME='192.1.2.45' PLUTO_MY_ID='@west' PLUTO_MY_CLIENT='192.0.1.0/24' PLUTO_MY_CLIENT_NET='192.0.1.0' PLUTO_MY_CLIENT_MASK='255.255.255.0' PLUTO_MY_PORT='0' PLUTO_MY_PROTOCOL='0' PLUTO_SA_REQID='16388' PLUTO_SA_TYPE='none' PLUTO_PEER='192.1.2.23' PLUTO_PEER_ID='@east' PLUTO_PEER_CLIENT='192.0.2.0/24' PLUTO_PEER_CLIENT_NET='192.0.2.0' PLUTO_PEER_CLIENT_MASK='255.255.255.0' PLUTO_PEER_PORT='0' PLUTO_PEER_PROTOCOL='0' PLUTO_PEER_CA='' PLUTO_STACK='netkey' PLUTO_ADDTIME='0' PLUTO_CONN_POLICY='RSASIG+ENCRYPT+TUNNEL+PFS+UP+IKEV1_ALLOW+SAREF_TRACK+IKE_FRAG_ALLOW+ESN_NO' PLUTO_CONN_KIND='CK_PERMANENT' PLUTO_CONN_ADDRFAMILY='ipv4' XAUTH_FAILED=0 PLUTO_IS_PEER_CISCO='0' PLUTO_PEER_DNS_INFO='' PLUTO_PEER_DOMAIN_INFO='' PLUTO_PEER_BANNER='' PLUTO_CFG_SERVER='0' PLUTO_CFG_CLIENT='0' PLUTO_NM_CONFIGURED='0' VTI_IFACE='' VTI_ROUTING='no' VTI_SHARED='no | popen cmd is 1034 chars long | cmd( 0):PLUTO_VERB='unroute-client' PLUTO_VERSION='2.0' PLUTO_CONNECTION='westnets-eastn: | cmd( 80):et/1x0' PLUTO_INTERFACE='eth1' PLUTO_NEXT_HOP='192.1.2.23' PLUTO_ME='192.1.2.45': | cmd( 160): PLUTO_MY_ID='@west' PLUTO_MY_CLIENT='192.0.1.0/24' PLUTO_MY_CLIENT_NET='192.0.1: | cmd( 240):.0' PLUTO_MY_CLIENT_MASK='255.255.255.0' PLUTO_MY_PORT='0' PLUTO_MY_PROTOCOL='0': | cmd( 320): PLUTO_SA_REQID='16388' PLUTO_SA_TYPE='none' PLUTO_PEER='192.1.2.23' PLUTO_PEER_: | cmd( 400):ID='@east' PLUTO_PEER_CLIENT='192.0.2.0/24' PLUTO_PEER_CLIENT_NET='192.0.2.0' PL: | cmd( 480):UTO_PEER_CLIENT_MASK='255.255.255.0' PLUTO_PEER_PORT='0' PLUTO_PEER_PROTOCOL='0': | cmd( 560): PLUTO_PEER_CA='' PLUTO_STACK='netkey' PLUTO_ADDTIME='0' PLUTO_CONN_POLICY='RSAS: | cmd( 640):IG+ENCRYPT+TUNNEL+PFS+UP+IKEV1_ALLOW+SAREF_TRACK+IKE_FRAG_ALLOW+ESN_NO' PLUTO_CO: | cmd( 720):NN_KIND='CK_PERMANENT' PLUTO_CONN_ADDRFAMILY='ipv4' XAUTH_FAILED=0 PLUTO_IS_PEER: | cmd( 800):_CISCO='0' PLUTO_PEER_DNS_INFO='' PLUTO_PEER_DOMAIN_INFO='' PLUTO_PEER_BANNER='': | cmd( 880): PLUTO_CFG_SERVER='0' PLUTO_CFG_CLIENT='0' PLUTO_NM_CONFIGURED='0' VTI_IFACE='' : | cmd( 960):VTI_ROUTING='no' VTI_SHARED='no' SPI_IN=0x0 SPI_OUT=0x0 ipsec _updown 2>&1: unroute-client output: Error: Peer netns reference is invalid. unroute-client output: Error: Peer netns reference is invalid. unroute-client output: Error: Peer netns reference is invalid. unroute-client output: Error: Peer netns reference is invalid. unroute-client output: Error: Peer netns reference is invalid. unroute-client output: Error: Peer netns reference is invalid. unroute-client output: Error: Peer netns reference is invalid. unroute-client output: Error: Peer netns reference is invalid. unroute-client output: Error: Peer netns reference is invalid. unroute-client output: Error: Peer netns reference is invalid. unroute-client output: Error: Peer netns reference is invalid. unroute-client output: Error: Peer netns reference is invalid. unroute-client output: Error: Peer netns reference is invalid. unroute-client output: Error: Peer netns reference is invalid. unroute-client output: Error: Peer netns reference is invalid. unroute-client output: Error: Peer netns reference is invalid. unroute-client output: Error: Peer netns reference is invalid. unroute-client output: Error: Peer netns reference is invalid. unroute-client output: Error: Peer netns reference is invalid. unroute-client output: Error: Peer netns reference is invalid. unroute-client output: Error: Peer netns reference is invalid. unroute-client output: Error: Peer netns reference is invalid. unroute-client output: Error: Peer netns reference is invalid. unroute-client output: Error: Peer netns reference is invalid. unroute-client output: Error: Peer netns reference is invalid. unroute-client output: Error: Peer netns reference is invalid. | free hp@0x5570e4c02288 | flush revival: connection 'westnets-eastnet/1x0' revival flushed | processing: STOP connection NULL (in discard_connection() at connections.c:249) | crl fetch request list locked by 'free_crl_fetch' | crl fetch request list unlocked by 'free_crl_fetch' shutting down interface lo/lo 127.0.0.1:4500 shutting down interface lo/lo 127.0.0.1:500 shutting down interface eth0/eth0 192.0.1.254:4500 shutting down interface eth0/eth0 192.0.1.254:500 shutting down interface eth1/eth1 192.1.2.45:4500 shutting down interface eth1/eth1 192.1.2.45:500 shutting down interface eth1/eth1 192.0.11.254:4500 shutting down interface eth1/eth1 192.0.11.254:500 | FOR_EACH_STATE_... in delete_states_dead_interfaces | libevent_free: release ptr-libevent@0x5570e4bf4d98 | free_event_entry: release EVENT_NULL-pe@0x5570e4c00d48 | libevent_free: release ptr-libevent@0x5570e4b8aad8 | free_event_entry: release EVENT_NULL-pe@0x5570e4c00df8 | libevent_free: release ptr-libevent@0x5570e4b8aa28 | free_event_entry: release EVENT_NULL-pe@0x5570e4c00ea8 | libevent_free: release ptr-libevent@0x5570e4b8b448 | free_event_entry: release EVENT_NULL-pe@0x5570e4c018f8 | libevent_free: release ptr-libevent@0x5570e4b5f4e8 | free_event_entry: release EVENT_NULL-pe@0x5570e4c01478 | libevent_free: release ptr-libevent@0x5570e4b5f1d8 | free_event_entry: release EVENT_NULL-pe@0x5570e4c01528 | libevent_free: release ptr-libevent@0x5570e4c01648 | free_event_entry: release EVENT_NULL-pe@0x5570e4c015d8 | libevent_free: release ptr-libevent@0x5570e4c017a8 | free_event_entry: release EVENT_NULL-pe@0x5570e4c01738 | FOR_EACH_UNORIENTED_CONNECTION_... in check_orientations | libevent_free: release ptr-libevent@0x5570e4bf4e48 | free_event_entry: release EVENT_NULL-pe@0x5570e4be8b88 | libevent_free: release ptr-libevent@0x5570e4b89078 | free_event_entry: release EVENT_NULL-pe@0x5570e4be8b18 | libevent_free: release ptr-libevent@0x5570e4bcc428 | free_event_entry: release EVENT_NULL-pe@0x5570e4be7fd8 | global timer EVENT_REINIT_SECRET uninitialized | global timer EVENT_SHUNT_SCAN uninitialized | global timer EVENT_PENDING_DDNS uninitialized | global timer EVENT_PENDING_PHASE2 uninitialized | global timer EVENT_CHECK_CRLS uninitialized | global timer EVENT_REVIVE_CONNS uninitialized | global timer EVENT_FREE_ROOT_CERTS uninitialized | global timer EVENT_RESET_LOG_RATE_LIMIT uninitialized | global timer EVENT_NAT_T_KEEPALIVE uninitialized | libevent_free: release ptr-libevent@0x5570e4b88788 | signal event handler PLUTO_SIGCHLD uninstalled | libevent_free: release ptr-libevent@0x5570e4b8b518 | signal event handler PLUTO_SIGTERM uninstalled | libevent_free: release ptr-libevent@0x5570e4c00348 | signal event handler PLUTO_SIGHUP uninstalled | libevent_free: release ptr-libevent@0x5570e4c00588 | signal event handler PLUTO_SIGSYS uninstalled | releasing event base | libevent_free: release ptr-libevent@0x5570e4c00458 | libevent_free: release ptr-libevent@0x5570e4be33c8 | libevent_free: release ptr-libevent@0x5570e4be3378 | libevent_free: release ptr-libevent@0x7fa9e0003e78 | libevent_free: release ptr-libevent@0x5570e4be32c8 | libevent_free: release ptr-libevent@0x5570e4c00018 | libevent_free: release ptr-libevent@0x5570e4c00288 | libevent_free: release ptr-libevent@0x5570e4be3578 | libevent_free: release ptr-libevent@0x5570e4be87a8 | libevent_free: release ptr-libevent@0x5570e4be8c98 | libevent_free: release ptr-libevent@0x5570e4c01858 | libevent_free: release ptr-libevent@0x5570e4c016f8 | libevent_free: release ptr-libevent@0x5570e4c01598 | libevent_free: release ptr-libevent@0x5570e4c014e8 | libevent_free: release ptr-libevent@0x5570e4c01438 | libevent_free: release ptr-libevent@0x5570e4c00f18 | libevent_free: release ptr-libevent@0x5570e4c00e68 | libevent_free: release ptr-libevent@0x5570e4c00db8 | libevent_free: release ptr-libevent@0x5570e4b878b8 | libevent_free: release ptr-libevent@0x5570e4c00308 | libevent_free: release ptr-libevent@0x5570e4c002c8 | libevent_free: release ptr-libevent@0x5570e4c00188 | libevent_free: release ptr-libevent@0x5570e4c00418 | libevent_free: release ptr-libevent@0x5570e4c00058 | libevent_free: release ptr-libevent@0x5570e4b5e908 | libevent_free: release ptr-libevent@0x5570e4b5ed38 | libevent_free: release ptr-libevent@0x5570e4b87c28 | releasing global libevent data | libevent_free: release ptr-libevent@0x5570e4b5f868 | libevent_free: release ptr-libevent@0x5570e4b5ecd8 | libevent_free: release ptr-libevent@0x5570e4b5edd8 leak detective found no leaks