FIPS Product: YES FIPS Kernel: NO FIPS Mode: NO NSS DB directory: sql:/etc/ipsec.d Initializing NSS Opening NSS database "sql:/etc/ipsec.d" read-only NSS initialized NSS crypto library initialized FIPS HMAC integrity support [enabled] FIPS mode disabled for pluto daemon FIPS HMAC integrity verification self-test FAILED libcap-ng support [enabled] Linux audit support [enabled] Linux audit activated Starting Pluto (Libreswan Version v3.28-827-gc9aa82b8a6-master-s2 XFRM(netkey) esp-hw-offload FORK PTHREAD_SETSCHEDPRIO NSS (IPsec profile) DNSSEC SYSTEMD_WATCHDOG FIPS_CHECK LABELED_IPSEC SECCOMP LIBCAP_NG LINUX_AUDIT XAUTH_PAM NETWORKMANAGER CURL(non-NSS)) pid:31876 core dump dir: /var/tmp secrets file: /etc/ipsec.secrets leak-detective disabled NSS crypto [enabled] XAUTH PAM support [enabled] | libevent is using pluto's memory allocator Initializing libevent in pthreads mode: headers: 2.1.8-stable (2010800); library: 2.1.8-stable (2010800) | libevent_malloc: new ptr-libevent@0x56080aee0030 size 40 | libevent_malloc: new ptr-libevent@0x56080aee0060 size 40 | libevent_malloc: new ptr-libevent@0x56080aee1350 size 40 | creating event base | libevent_malloc: new ptr-libevent@0x56080aee1310 size 56 | libevent_malloc: new ptr-libevent@0x56080aee1380 size 664 | libevent_malloc: new ptr-libevent@0x56080aee1620 size 24 | libevent_malloc: new ptr-libevent@0x56080aed2dc0 size 384 | libevent_malloc: new ptr-libevent@0x56080aee1640 size 16 | libevent_malloc: new ptr-libevent@0x56080aee1660 size 40 | libevent_malloc: new ptr-libevent@0x56080aee1690 size 48 | libevent_realloc: new ptr-libevent@0x56080ae63370 size 256 | libevent_malloc: new ptr-libevent@0x56080aee16d0 size 16 | libevent_free: release ptr-libevent@0x56080aee1310 | libevent initialized | libevent_realloc: new ptr-libevent@0x56080aee16f0 size 64 | global periodic timer EVENT_RESET_LOG_RATE_LIMIT enabled with interval of 3600 seconds | init_nat_traversal() initialized with keep_alive=0s NAT-Traversal support [enabled] | global one-shot timer EVENT_NAT_T_KEEPALIVE initialized | global one-shot timer EVENT_FREE_ROOT_CERTS initialized | global periodic timer EVENT_REINIT_SECRET enabled with interval of 3600 seconds | global one-shot timer EVENT_REVIVE_CONNS initialized | global periodic timer EVENT_PENDING_DDNS enabled with interval of 60 seconds | global periodic timer EVENT_PENDING_PHASE2 enabled with interval of 120 seconds | encryption algorithm assertion checks | encryption algorithm AES_CCM_16, IKEv1 OAKLEY id: -1, IKEv1 ESP_INFO id: 16, IKEv2 id: 16 | IKEv1 ESP ID id: 16 enum name: AES_CCM_C | IKEv2 ID id: 16 enum name: AES_CCM_C | encryption algorithm AES_CCM_12, IKEv1 OAKLEY id: -1, IKEv1 ESP_INFO id: 15, IKEv2 id: 15 | IKEv1 ESP ID id: 15 enum name: AES_CCM_B | IKEv2 ID id: 15 enum name: AES_CCM_B | encryption algorithm AES_CCM_8, IKEv1 OAKLEY id: -1, IKEv1 ESP_INFO id: 14, IKEv2 id: 14 | IKEv1 ESP ID id: 14 enum name: AES_CCM_A | IKEv2 ID id: 14 enum name: AES_CCM_A | encryption algorithm 3DES_CBC, IKEv1 OAKLEY id: 5, IKEv1 ESP_INFO id: 3, IKEv2 id: 3 | IKEv1 OAKLEY ID id: 5 enum name: 3DES_CBC | IKEv1 ESP ID id: 3 enum name: 3DES | IKEv2 ID id: 3 enum name: 3DES | encryption algorithm CAMELLIA_CTR, IKEv1 OAKLEY id: 24, IKEv1 ESP_INFO id: 24, IKEv2 id: 24 | IKEv1 OAKLEY ID id: 24 enum name: CAMELLIA_CTR | IKEv1 ESP ID id: 24 enum name: CAMELLIA_CTR | IKEv2 ID id: 24 enum name: CAMELLIA_CTR | encryption algorithm CAMELLIA_CBC, IKEv1 OAKLEY id: 8, IKEv1 ESP_INFO id: 22, IKEv2 id: 23 | IKEv1 OAKLEY ID id: 8 enum name: CAMELLIA_CBC | IKEv1 ESP ID id: 22 enum name: CAMELLIA | IKEv2 ID id: 23 enum name: CAMELLIA_CBC | encryption algorithm AES_GCM_16, IKEv1 OAKLEY id: -1, IKEv1 ESP_INFO id: 20, IKEv2 id: 20 | IKEv1 ESP ID id: 20 enum name: AES_GCM_C | IKEv2 ID id: 20 enum name: AES_GCM_C | encryption algorithm AES_GCM_12, IKEv1 OAKLEY id: -1, IKEv1 ESP_INFO id: 19, IKEv2 id: 19 | IKEv1 ESP ID id: 19 enum name: AES_GCM_B | IKEv2 ID id: 19 enum name: AES_GCM_B | encryption algorithm AES_GCM_8, IKEv1 OAKLEY id: -1, IKEv1 ESP_INFO id: 18, IKEv2 id: 18 | IKEv1 ESP ID id: 18 enum name: AES_GCM_A | IKEv2 ID id: 18 enum name: AES_GCM_A | encryption algorithm AES_CTR, IKEv1 OAKLEY id: 13, IKEv1 ESP_INFO id: 13, IKEv2 id: 13 | IKEv1 OAKLEY ID id: 13 enum name: AES_CTR | IKEv1 ESP ID id: 13 enum name: AES_CTR | IKEv2 ID id: 13 enum name: AES_CTR | encryption algorithm AES_CBC, IKEv1 OAKLEY id: 7, IKEv1 ESP_INFO id: 12, IKEv2 id: 12 | IKEv1 OAKLEY ID id: 7 enum name: AES_CBC | IKEv1 ESP ID id: 12 enum name: AES | IKEv2 ID id: 12 enum name: AES_CBC | encryption algorithm SERPENT_CBC, IKEv1 OAKLEY id: 65004, IKEv1 ESP_INFO id: 252, IKEv2 id: 65004 | IKEv1 OAKLEY ID id: 65004 enum name: SERPENT_CBC | IKEv1 ESP ID id: 252 enum name: SERPENT | IKEv2 ID id: 65004 enum name: SERPENT_CBC | encryption algorithm TWOFISH_CBC, IKEv1 OAKLEY id: 65005, IKEv1 ESP_INFO id: 253, IKEv2 id: 65005 | IKEv1 OAKLEY ID id: 65005 enum name: TWOFISH_CBC | IKEv1 ESP ID id: 253 enum name: TWOFISH | IKEv2 ID id: 65005 enum name: TWOFISH_CBC | encryption algorithm TWOFISH_SSH, IKEv1 OAKLEY id: 65289, IKEv1 ESP_INFO id: -1, IKEv2 id: 65289 | IKEv1 OAKLEY ID id: 65289 enum name: TWOFISH_CBC_SSH | IKEv2 ID id: 65289 enum name: TWOFISH_CBC_SSH | encryption algorithm NULL_AUTH_AES_GMAC, IKEv1 OAKLEY id: -1, IKEv1 ESP_INFO id: 23, IKEv2 id: 21 | IKEv1 ESP ID id: 23 enum name: NULL_AUTH_AES_GMAC | IKEv2 ID id: 21 enum name: NULL_AUTH_AES_GMAC | encryption algorithm NULL, IKEv1 OAKLEY id: -1, IKEv1 ESP_INFO id: 11, IKEv2 id: 11 | IKEv1 ESP ID id: 11 enum name: NULL | IKEv2 ID id: 11 enum name: NULL | encryption algorithm CHACHA20_POLY1305, IKEv1 OAKLEY id: -1, IKEv1 ESP_INFO id: -1, IKEv2 id: 28 | IKEv2 ID id: 28 enum name: CHACHA20_POLY1305 Encryption algorithms: AES_CCM_16 IKEv1: ESP IKEv2: ESP FIPS {256,192,*128} aes_ccm, aes_ccm_c AES_CCM_12 IKEv1: ESP IKEv2: ESP FIPS {256,192,*128} aes_ccm_b AES_CCM_8 IKEv1: ESP IKEv2: ESP FIPS {256,192,*128} aes_ccm_a 3DES_CBC IKEv1: IKE ESP IKEv2: IKE ESP FIPS [*192] 3des CAMELLIA_CTR IKEv1: ESP IKEv2: ESP {256,192,*128} CAMELLIA_CBC IKEv1: IKE ESP IKEv2: IKE ESP {256,192,*128} camellia AES_GCM_16 IKEv1: ESP IKEv2: IKE ESP FIPS {256,192,*128} aes_gcm, aes_gcm_c AES_GCM_12 IKEv1: ESP IKEv2: IKE ESP FIPS {256,192,*128} aes_gcm_b AES_GCM_8 IKEv1: ESP IKEv2: IKE ESP FIPS {256,192,*128} aes_gcm_a AES_CTR IKEv1: IKE ESP IKEv2: IKE ESP FIPS {256,192,*128} aesctr AES_CBC IKEv1: IKE ESP IKEv2: IKE ESP FIPS {256,192,*128} aes SERPENT_CBC IKEv1: IKE ESP IKEv2: IKE ESP {256,192,*128} serpent TWOFISH_CBC IKEv1: IKE ESP IKEv2: IKE ESP {256,192,*128} twofish TWOFISH_SSH IKEv1: IKE IKEv2: IKE ESP {256,192,*128} twofish_cbc_ssh NULL_AUTH_AES_GMAC IKEv1: ESP IKEv2: ESP FIPS {256,192,*128} aes_gmac NULL IKEv1: ESP IKEv2: ESP [] CHACHA20_POLY1305 IKEv1: IKEv2: IKE ESP [*256] chacha20poly1305 | hash algorithm assertion checks | hash algorithm MD5, IKEv1 OAKLEY id: 1, IKEv1 ESP_INFO id: -1, IKEv2 id: -1 | IKEv1 OAKLEY ID id: 1 enum name: MD5 | hash algorithm SHA1, IKEv1 OAKLEY id: 2, IKEv1 ESP_INFO id: -1, IKEv2 id: -1 | IKEv1 OAKLEY ID id: 2 enum name: SHA1 | hash algorithm SHA2_256, IKEv1 OAKLEY id: 4, IKEv1 ESP_INFO id: -1, IKEv2 id: -1 | IKEv1 OAKLEY ID id: 4 enum name: SHA2_256 | hash algorithm SHA2_384, IKEv1 OAKLEY id: 5, IKEv1 ESP_INFO id: -1, IKEv2 id: -1 | IKEv1 OAKLEY ID id: 5 enum name: SHA2_384 | hash algorithm SHA2_512, IKEv1 OAKLEY id: 6, IKEv1 ESP_INFO id: -1, IKEv2 id: -1 | IKEv1 OAKLEY ID id: 6 enum name: SHA2_512 Hash algorithms: MD5 IKEv1: IKE IKEv2: SHA1 IKEv1: IKE IKEv2: FIPS sha SHA2_256 IKEv1: IKE IKEv2: FIPS sha2, sha256 SHA2_384 IKEv1: IKE IKEv2: FIPS sha384 SHA2_512 IKEv1: IKE IKEv2: FIPS sha512 | PRF algorithm assertion checks | PRF algorithm HMAC_MD5, IKEv1 OAKLEY id: 1, IKEv1 ESP_INFO id: -1, IKEv2 id: 1 | IKEv1 OAKLEY ID id: 1 enum name: MD5 | IKEv2 ID id: 1 enum name: HMAC_MD5 | PRF algorithm HMAC_SHA1, IKEv1 OAKLEY id: 2, IKEv1 ESP_INFO id: -1, IKEv2 id: 2 | IKEv1 OAKLEY ID id: 2 enum name: SHA1 | IKEv2 ID id: 2 enum name: HMAC_SHA1 | PRF algorithm HMAC_SHA2_256, IKEv1 OAKLEY id: 4, IKEv1 ESP_INFO id: -1, IKEv2 id: 5 | IKEv1 OAKLEY ID id: 4 enum name: SHA2_256 | IKEv2 ID id: 5 enum name: HMAC_SHA2_256 | PRF algorithm HMAC_SHA2_384, IKEv1 OAKLEY id: 5, IKEv1 ESP_INFO id: -1, IKEv2 id: 6 | IKEv1 OAKLEY ID id: 5 enum name: SHA2_384 | IKEv2 ID id: 6 enum name: HMAC_SHA2_384 | PRF algorithm HMAC_SHA2_512, IKEv1 OAKLEY id: 6, IKEv1 ESP_INFO id: -1, IKEv2 id: 7 | IKEv1 OAKLEY ID id: 6 enum name: SHA2_512 | IKEv2 ID id: 7 enum name: HMAC_SHA2_512 | PRF algorithm AES_XCBC, IKEv1 OAKLEY id: -1, IKEv1 ESP_INFO id: -1, IKEv2 id: 4 | IKEv2 ID id: 4 enum name: AES128_XCBC PRF algorithms: HMAC_MD5 IKEv1: IKE IKEv2: IKE md5 HMAC_SHA1 IKEv1: IKE IKEv2: IKE FIPS sha, sha1 HMAC_SHA2_256 IKEv1: IKE IKEv2: IKE FIPS sha2, sha256, sha2_256 HMAC_SHA2_384 IKEv1: IKE IKEv2: IKE FIPS sha384, sha2_384 HMAC_SHA2_512 IKEv1: IKE IKEv2: IKE FIPS sha512, sha2_512 AES_XCBC IKEv1: IKEv2: IKE aes128_xcbc | integrity algorithm assertion checks | integrity algorithm HMAC_MD5_96, IKEv1 OAKLEY id: 1, IKEv1 ESP_INFO id: 1, IKEv2 id: 1 | IKEv1 OAKLEY ID id: 1 enum name: MD5 | IKEv1 ESP ID id: 1 enum name: HMAC_MD5 | IKEv2 ID id: 1 enum name: HMAC_MD5_96 | integrity algorithm HMAC_SHA1_96, IKEv1 OAKLEY id: 2, IKEv1 ESP_INFO id: 2, IKEv2 id: 2 | IKEv1 OAKLEY ID id: 2 enum name: SHA1 | IKEv1 ESP ID id: 2 enum name: HMAC_SHA1 | IKEv2 ID id: 2 enum name: HMAC_SHA1_96 | integrity algorithm HMAC_SHA2_512_256, IKEv1 OAKLEY id: 6, IKEv1 ESP_INFO id: 7, IKEv2 id: 14 | IKEv1 OAKLEY ID id: 6 enum name: SHA2_512 | IKEv1 ESP ID id: 7 enum name: HMAC_SHA2_512 | IKEv2 ID id: 14 enum name: HMAC_SHA2_512_256 | integrity algorithm HMAC_SHA2_384_192, IKEv1 OAKLEY id: 5, IKEv1 ESP_INFO id: 6, IKEv2 id: 13 | IKEv1 OAKLEY ID id: 5 enum name: SHA2_384 | IKEv1 ESP ID id: 6 enum name: HMAC_SHA2_384 | IKEv2 ID id: 13 enum name: HMAC_SHA2_384_192 | integrity algorithm HMAC_SHA2_256_128, IKEv1 OAKLEY id: 4, IKEv1 ESP_INFO id: 5, IKEv2 id: 12 | IKEv1 OAKLEY ID id: 4 enum name: SHA2_256 | IKEv1 ESP ID id: 5 enum name: HMAC_SHA2_256 | IKEv2 ID id: 12 enum name: HMAC_SHA2_256_128 | integrity algorithm HMAC_SHA2_256_TRUNCBUG, IKEv1 OAKLEY id: -1, IKEv1 ESP_INFO id: 252, IKEv2 id: -1 | IKEv1 ESP ID id: 252 enum name: HMAC_SHA2_256_TRUNCBUG | integrity algorithm AES_XCBC_96, IKEv1 OAKLEY id: -1, IKEv1 ESP_INFO id: 9, IKEv2 id: 5 | IKEv1 ESP ID id: 9 enum name: AES_XCBC | IKEv2 ID id: 5 enum name: AES_XCBC_96 | integrity algorithm AES_CMAC_96, IKEv1 OAKLEY id: -1, IKEv1 ESP_INFO id: 250, IKEv2 id: 8 | IKEv1 ESP ID id: 250 enum name: AES_CMAC_96 | IKEv2 ID id: 8 enum name: AES_CMAC_96 | integrity algorithm NONE, IKEv1 OAKLEY id: -1, IKEv1 ESP_INFO id: 0, IKEv2 id: 0 | IKEv1 ESP ID id: 0 enum name: NONE | IKEv2 ID id: 0 enum name: NONE Integrity algorithms: HMAC_MD5_96 IKEv1: IKE ESP AH IKEv2: IKE ESP AH md5, hmac_md5 HMAC_SHA1_96 IKEv1: IKE ESP AH IKEv2: IKE ESP AH FIPS sha, sha1, sha1_96, hmac_sha1 HMAC_SHA2_512_256 IKEv1: IKE ESP AH IKEv2: IKE ESP AH FIPS sha512, sha2_512, sha2_512_256, hmac_sha2_512 HMAC_SHA2_384_192 IKEv1: IKE ESP AH IKEv2: IKE ESP AH FIPS sha384, sha2_384, sha2_384_192, hmac_sha2_384 HMAC_SHA2_256_128 IKEv1: IKE ESP AH IKEv2: IKE ESP AH FIPS sha2, sha256, sha2_256, sha2_256_128, hmac_sha2_256 HMAC_SHA2_256_TRUNCBUG IKEv1: ESP AH IKEv2: AH AES_XCBC_96 IKEv1: ESP AH IKEv2: IKE ESP AH aes_xcbc, aes128_xcbc, aes128_xcbc_96 AES_CMAC_96 IKEv1: ESP AH IKEv2: ESP AH FIPS aes_cmac NONE IKEv1: ESP IKEv2: IKE ESP FIPS null | DH algorithm assertion checks | DH algorithm NONE, IKEv1 OAKLEY id: -1, IKEv1 ESP_INFO id: -1, IKEv2 id: 0 | IKEv2 ID id: 0 enum name: NONE | DH algorithm MODP1536, IKEv1 OAKLEY id: 5, IKEv1 ESP_INFO id: 5, IKEv2 id: 5 | IKEv1 OAKLEY ID id: 5 enum name: MODP1536 | IKEv1 ESP ID id: 5 enum name: MODP1536 | IKEv2 ID id: 5 enum name: MODP1536 | DH algorithm MODP2048, IKEv1 OAKLEY id: 14, IKEv1 ESP_INFO id: 14, IKEv2 id: 14 | IKEv1 OAKLEY ID id: 14 enum name: MODP2048 | IKEv1 ESP ID id: 14 enum name: MODP2048 | IKEv2 ID id: 14 enum name: MODP2048 | DH algorithm MODP3072, IKEv1 OAKLEY id: 15, IKEv1 ESP_INFO id: 15, IKEv2 id: 15 | IKEv1 OAKLEY ID id: 15 enum name: MODP3072 | IKEv1 ESP ID id: 15 enum name: MODP3072 | IKEv2 ID id: 15 enum name: MODP3072 | DH algorithm MODP4096, IKEv1 OAKLEY id: 16, IKEv1 ESP_INFO id: 16, IKEv2 id: 16 | IKEv1 OAKLEY ID id: 16 enum name: MODP4096 | IKEv1 ESP ID id: 16 enum name: MODP4096 | IKEv2 ID id: 16 enum name: MODP4096 | DH algorithm MODP6144, IKEv1 OAKLEY id: 17, IKEv1 ESP_INFO id: 17, IKEv2 id: 17 | IKEv1 OAKLEY ID id: 17 enum name: MODP6144 | IKEv1 ESP ID id: 17 enum name: MODP6144 | IKEv2 ID id: 17 enum name: MODP6144 | DH algorithm MODP8192, IKEv1 OAKLEY id: 18, IKEv1 ESP_INFO id: 18, IKEv2 id: 18 | IKEv1 OAKLEY ID id: 18 enum name: MODP8192 | IKEv1 ESP ID id: 18 enum name: MODP8192 | IKEv2 ID id: 18 enum name: MODP8192 | DH algorithm DH19, IKEv1 OAKLEY id: 19, IKEv1 ESP_INFO id: -1, IKEv2 id: 19 | IKEv1 OAKLEY ID id: 19 enum name: ECP_256 | IKEv2 ID id: 19 enum name: ECP_256 | DH algorithm DH20, IKEv1 OAKLEY id: 20, IKEv1 ESP_INFO id: -1, IKEv2 id: 20 | IKEv1 OAKLEY ID id: 20 enum name: ECP_384 | IKEv2 ID id: 20 enum name: ECP_384 | DH algorithm DH21, IKEv1 OAKLEY id: 21, IKEv1 ESP_INFO id: -1, IKEv2 id: 21 | IKEv1 OAKLEY ID id: 21 enum name: ECP_521 | IKEv2 ID id: 21 enum name: ECP_521 | DH algorithm DH31, IKEv1 OAKLEY id: 31, IKEv1 ESP_INFO id: -1, IKEv2 id: 31 | IKEv1 OAKLEY ID id: 31 enum name: CURVE25519 | IKEv2 ID id: 31 enum name: CURVE25519 DH algorithms: NONE IKEv1: IKEv2: IKE ESP AH FIPS null, dh0 MODP1536 IKEv1: IKE ESP AH IKEv2: IKE ESP AH dh5 MODP2048 IKEv1: IKE ESP AH IKEv2: IKE ESP AH FIPS dh14 MODP3072 IKEv1: IKE ESP AH IKEv2: IKE ESP AH FIPS dh15 MODP4096 IKEv1: IKE ESP AH IKEv2: IKE ESP AH FIPS dh16 MODP6144 IKEv1: IKE ESP AH IKEv2: IKE ESP AH FIPS dh17 MODP8192 IKEv1: IKE ESP AH IKEv2: IKE ESP AH FIPS dh18 DH19 IKEv1: IKE IKEv2: IKE ESP AH FIPS ecp_256, ecp256 DH20 IKEv1: IKE IKEv2: IKE ESP AH FIPS ecp_384, ecp384 DH21 IKEv1: IKE IKEv2: IKE ESP AH FIPS ecp_521, ecp521 DH31 IKEv1: IKE IKEv2: IKE ESP AH curve25519 testing CAMELLIA_CBC: Camellia: 16 bytes with 128-bit key | decode_to_chunk: raw_key: input "0x00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00" | decode_to_chunk: output: | 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 | : ephemeral-key@0x56080ae63080 (16-bytes, AES_KEY_GEN) | CONCATENATE_DATA_AND_BASE: | target: EXTRACT_KEY_FROM_KEY | base: base-key@0x56080ae63080 (16-bytes, AES_KEY_GEN) | params: 16-bytes@0x7fff50900020 | result: symkey-key@0x56080aee47f0 (32-bytes, EXTRACT_KEY_FROM_KEY) | key-offset: 0, key-size: 16 | EXTRACT_KEY_FROM_KEY: | target: CAMELLIA_CBC | flags: ENCRYPT+DECRYPT | key_size: 16-bytes | base: base-key@0x56080aee47f0 (32-bytes, EXTRACT_KEY_FROM_KEY) | operation: FLAGS_ONLY | params: 8-bytes@0x7fff50900008 | result: symkey-key@0x56080aee2f70 (16-bytes, CAMELLIA_CBC) | symkey: release tmp-key@0x56080aee47f0 | decode_to_chunk: IV: : input "0x00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00" | decode_to_chunk: output: | 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 | decode_to_chunk: new IV: : input "0x07 92 3A 39 EB 0A 81 7D 1C 4D 87 BD B8 2D 1F 1C" | decode_to_chunk: output: | 07 92 3a 39 eb 0a 81 7d 1c 4d 87 bd b8 2d 1f 1c | decode_to_chunk: plaintext: : input "0x80 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00" | decode_to_chunk: output: | 80 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 | decode_to_chunk: ciphertext: : input "0x07 92 3A 39 EB 0A 81 7D 1C 4D 87 BD B8 2D 1F 1C" | decode_to_chunk: output: | 07 92 3a 39 eb 0a 81 7d 1c 4d 87 bd b8 2d 1f 1c | NSS ike_alg_nss_cbc: camellia - enter | NSS ike_alg_nss_cbc: camellia - exit | verify_chunk_data: encrypt: ok | verify_chunk_data: updated CBC IV: ok | decode_to_chunk: IV: : input "0x00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00" | decode_to_chunk: output: | 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 | decode_to_chunk: new IV: : input "0x07 92 3A 39 EB 0A 81 7D 1C 4D 87 BD B8 2D 1F 1C" | decode_to_chunk: output: | 07 92 3a 39 eb 0a 81 7d 1c 4d 87 bd b8 2d 1f 1c | decode_to_chunk: cipertext: : input "0x07 92 3A 39 EB 0A 81 7D 1C 4D 87 BD B8 2D 1F 1C" | decode_to_chunk: output: | 07 92 3a 39 eb 0a 81 7d 1c 4d 87 bd b8 2d 1f 1c | decode_to_chunk: plaintext: : input "0x80 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00" | decode_to_chunk: output: | 80 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 | NSS ike_alg_nss_cbc: camellia - enter | NSS ike_alg_nss_cbc: camellia - exit | verify_chunk_data: decrypt: ok | verify_chunk_data: updated CBC IV: ok | test_cbc_vector: release sym_key-key@0x56080aee2f70 | test_ctr_vector: Camellia: 16 bytes with 128-bit key passed Camellia: 16 bytes with 128-bit key | decode_to_chunk: raw_key: input "0x00 11 22 33 44 55 66 77 88 99 AA BB CC DD EE FF" | decode_to_chunk: output: | 00 11 22 33 44 55 66 77 88 99 aa bb cc dd ee ff | : ephemeral-key@0x56080ae63080 (16-bytes, AES_KEY_GEN) | CONCATENATE_DATA_AND_BASE: | target: EXTRACT_KEY_FROM_KEY | base: base-key@0x56080ae63080 (16-bytes, AES_KEY_GEN) | params: 16-bytes@0x7fff50900020 | result: symkey-key@0x56080aee47f0 (32-bytes, EXTRACT_KEY_FROM_KEY) | key-offset: 0, key-size: 16 | EXTRACT_KEY_FROM_KEY: | target: CAMELLIA_CBC | flags: ENCRYPT+DECRYPT | key_size: 16-bytes | base: base-key@0x56080aee47f0 (32-bytes, EXTRACT_KEY_FROM_KEY) | operation: FLAGS_ONLY | params: 8-bytes@0x7fff50900008 | result: symkey-key@0x56080aee2f70 (16-bytes, CAMELLIA_CBC) | symkey: release tmp-key@0x56080aee47f0 | decode_to_chunk: IV: : input "0x00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00" | decode_to_chunk: output: | 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 | decode_to_chunk: new IV: : input "0x14 4D 2B 0F 50 0C 27 B7 EC 2C D1 2D 91 59 6F 37" | decode_to_chunk: output: | 14 4d 2b 0f 50 0c 27 b7 ec 2c d1 2d 91 59 6f 37 | decode_to_chunk: plaintext: : input "0x00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 01 " | decode_to_chunk: output: | 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 01 | decode_to_chunk: ciphertext: : input "0x14 4D 2B 0F 50 0C 27 B7 EC 2C D1 2D 91 59 6F 37" | decode_to_chunk: output: | 14 4d 2b 0f 50 0c 27 b7 ec 2c d1 2d 91 59 6f 37 | NSS ike_alg_nss_cbc: camellia - enter | NSS ike_alg_nss_cbc: camellia - exit | verify_chunk_data: encrypt: ok | verify_chunk_data: updated CBC IV: ok | decode_to_chunk: IV: : input "0x00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00" | decode_to_chunk: output: | 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 | decode_to_chunk: new IV: : input "0x14 4D 2B 0F 50 0C 27 B7 EC 2C D1 2D 91 59 6F 37" | decode_to_chunk: output: | 14 4d 2b 0f 50 0c 27 b7 ec 2c d1 2d 91 59 6f 37 | decode_to_chunk: cipertext: : input "0x14 4D 2B 0F 50 0C 27 B7 EC 2C D1 2D 91 59 6F 37" | decode_to_chunk: output: | 14 4d 2b 0f 50 0c 27 b7 ec 2c d1 2d 91 59 6f 37 | decode_to_chunk: plaintext: : input "0x00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 01 " | decode_to_chunk: output: | 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 01 | NSS ike_alg_nss_cbc: camellia - enter | NSS ike_alg_nss_cbc: camellia - exit | verify_chunk_data: decrypt: ok | verify_chunk_data: updated CBC IV: ok | test_cbc_vector: release sym_key-key@0x56080aee2f70 | test_ctr_vector: Camellia: 16 bytes with 128-bit key passed Camellia: 16 bytes with 256-bit key | decode_to_chunk: raw_key: input "0x00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00" | decode_to_chunk: output: | 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 | 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 | : ephemeral-key@0x56080ae63080 (16-bytes, AES_KEY_GEN) | CONCATENATE_DATA_AND_BASE: | target: EXTRACT_KEY_FROM_KEY | base: base-key@0x56080ae63080 (16-bytes, AES_KEY_GEN) | params: 16-bytes@0x7fff50900020 | result: symkey-key@0x56080aee47f0 (48-bytes, EXTRACT_KEY_FROM_KEY) | key-offset: 0, key-size: 32 | EXTRACT_KEY_FROM_KEY: | target: CAMELLIA_CBC | flags: ENCRYPT+DECRYPT | key_size: 32-bytes | base: base-key@0x56080aee47f0 (48-bytes, EXTRACT_KEY_FROM_KEY) | operation: FLAGS_ONLY | params: 8-bytes@0x7fff50900008 | result: symkey-key@0x56080aee2f70 (32-bytes, CAMELLIA_CBC) | symkey: release tmp-key@0x56080aee47f0 | decode_to_chunk: IV: : input "0x00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00" | decode_to_chunk: output: | 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 | decode_to_chunk: new IV: : input "0xB0 C6 B8 8A EA 51 8A B0 9E 84 72 48 E9 1B 1B 9D" | decode_to_chunk: output: | b0 c6 b8 8a ea 51 8a b0 9e 84 72 48 e9 1b 1b 9d | decode_to_chunk: plaintext: : input "0x80 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00" | decode_to_chunk: output: | 80 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 | decode_to_chunk: ciphertext: : input "0xB0 C6 B8 8A EA 51 8A B0 9E 84 72 48 E9 1B 1B 9D" | decode_to_chunk: output: | b0 c6 b8 8a ea 51 8a b0 9e 84 72 48 e9 1b 1b 9d | NSS ike_alg_nss_cbc: camellia - enter | NSS ike_alg_nss_cbc: camellia - exit | verify_chunk_data: encrypt: ok | verify_chunk_data: updated CBC IV: ok | decode_to_chunk: IV: : input "0x00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00" | decode_to_chunk: output: | 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 | decode_to_chunk: new IV: : input "0xB0 C6 B8 8A EA 51 8A B0 9E 84 72 48 E9 1B 1B 9D" | decode_to_chunk: output: | b0 c6 b8 8a ea 51 8a b0 9e 84 72 48 e9 1b 1b 9d | decode_to_chunk: cipertext: : input "0xB0 C6 B8 8A EA 51 8A B0 9E 84 72 48 E9 1B 1B 9D" | decode_to_chunk: output: | b0 c6 b8 8a ea 51 8a b0 9e 84 72 48 e9 1b 1b 9d | decode_to_chunk: plaintext: : input "0x80 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00" | decode_to_chunk: output: | 80 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 | NSS ike_alg_nss_cbc: camellia - enter | NSS ike_alg_nss_cbc: camellia - exit | verify_chunk_data: decrypt: ok | verify_chunk_data: updated CBC IV: ok | test_cbc_vector: release sym_key-key@0x56080aee2f70 | test_ctr_vector: Camellia: 16 bytes with 256-bit key passed Camellia: 16 bytes with 256-bit key | decode_to_chunk: raw_key: input "0x00 11 22 33 44 55 66 77 88 99 AA BB CC DD EE FF FF EE DD CC BB AA 99 88 77 66 55 44 33 22 11 00" | decode_to_chunk: output: | 00 11 22 33 44 55 66 77 88 99 aa bb cc dd ee ff | ff ee dd cc bb aa 99 88 77 66 55 44 33 22 11 00 | : ephemeral-key@0x56080ae63080 (16-bytes, AES_KEY_GEN) | CONCATENATE_DATA_AND_BASE: | target: EXTRACT_KEY_FROM_KEY | base: base-key@0x56080ae63080 (16-bytes, AES_KEY_GEN) | params: 16-bytes@0x7fff50900020 | result: symkey-key@0x56080aee47f0 (48-bytes, EXTRACT_KEY_FROM_KEY) | key-offset: 0, key-size: 32 | EXTRACT_KEY_FROM_KEY: | target: CAMELLIA_CBC | flags: ENCRYPT+DECRYPT | key_size: 32-bytes | base: base-key@0x56080aee47f0 (48-bytes, EXTRACT_KEY_FROM_KEY) | operation: FLAGS_ONLY | params: 8-bytes@0x7fff50900008 | result: symkey-key@0x56080aee2f70 (32-bytes, CAMELLIA_CBC) | symkey: release tmp-key@0x56080aee47f0 | decode_to_chunk: IV: : input "0x00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00" | decode_to_chunk: output: | 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 | decode_to_chunk: new IV: : input "0xCC 39 FF EE 18 56 D3 EB 61 02 5E 93 21 9B 65 23 " | decode_to_chunk: output: | cc 39 ff ee 18 56 d3 eb 61 02 5e 93 21 9b 65 23 | decode_to_chunk: plaintext: : input "0x00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 01" | decode_to_chunk: output: | 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 01 | decode_to_chunk: ciphertext: : input "0xCC 39 FF EE 18 56 D3 EB 61 02 5E 93 21 9B 65 23 " | decode_to_chunk: output: | cc 39 ff ee 18 56 d3 eb 61 02 5e 93 21 9b 65 23 | NSS ike_alg_nss_cbc: camellia - enter | NSS ike_alg_nss_cbc: camellia - exit | verify_chunk_data: encrypt: ok | verify_chunk_data: updated CBC IV: ok | decode_to_chunk: IV: : input "0x00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00" | decode_to_chunk: output: | 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 | decode_to_chunk: new IV: : input "0xCC 39 FF EE 18 56 D3 EB 61 02 5E 93 21 9B 65 23 " | decode_to_chunk: output: | cc 39 ff ee 18 56 d3 eb 61 02 5e 93 21 9b 65 23 | decode_to_chunk: cipertext: : input "0xCC 39 FF EE 18 56 D3 EB 61 02 5E 93 21 9B 65 23 " | decode_to_chunk: output: | cc 39 ff ee 18 56 d3 eb 61 02 5e 93 21 9b 65 23 | decode_to_chunk: plaintext: : input "0x00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 01" | decode_to_chunk: output: | 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 01 | NSS ike_alg_nss_cbc: camellia - enter | NSS ike_alg_nss_cbc: camellia - exit | verify_chunk_data: decrypt: ok | verify_chunk_data: updated CBC IV: ok | test_cbc_vector: release sym_key-key@0x56080aee2f70 | test_ctr_vector: Camellia: 16 bytes with 256-bit key passed testing AES_GCM_16: empty string | decode_to_chunk: raw_key: input "0xcf063a34d4a9a76c2c86787d3f96db71" | decode_to_chunk: output: | cf 06 3a 34 d4 a9 a7 6c 2c 86 78 7d 3f 96 db 71 | : ephemeral-key@0x56080ae63080 (16-bytes, AES_KEY_GEN) | CONCATENATE_DATA_AND_BASE: | target: EXTRACT_KEY_FROM_KEY | base: base-key@0x56080ae63080 (16-bytes, AES_KEY_GEN) | params: 16-bytes@0x7fff508fffc0 | result: symkey-key@0x56080aee47f0 (32-bytes, EXTRACT_KEY_FROM_KEY) | key-offset: 0, key-size: 16 | EXTRACT_KEY_FROM_KEY: | target: AES_GCM | flags: ENCRYPT+DECRYPT | key_size: 16-bytes | base: base-key@0x56080aee47f0 (32-bytes, EXTRACT_KEY_FROM_KEY) | operation: FLAGS_ONLY | params: 8-bytes@0x7fff508fffa8 | result: symkey-key@0x56080aee2f70 (16-bytes, AES_GCM) | symkey: release tmp-key@0x56080aee47f0 | decode_to_chunk: salted IV: input "0x113b9785971864c83b01c787" | decode_to_chunk: output: | 11 3b 97 85 97 18 64 c8 3b 01 c7 87 | decode_to_chunk: AAD: input "" | decode_to_chunk: output: | | decode_to_chunk: plaintext: input "" | decode_to_chunk: output: | | decode_to_chunk: ciphertext: input "" | decode_to_chunk: output: | | decode_to_chunk: tag: input "0x72ac8493e3a5228b5d130a69d2510e42" | decode_to_chunk: output: | 72 ac 84 93 e3 a5 22 8b 5d 13 0a 69 d2 51 0e 42 | test_gcm_vector: decrypt: aad-size=0 salt-size=4 wire-IV-size=8 text-size=0 tag-size=16 | test_gcm_vector: text+tag on call | 72 ac 84 93 e3 a5 22 8b 5d 13 0a 69 d2 51 0e 42 | verify_chunk_data: output ciphertext: ok | verify_chunk_data: TAG: ok | test_gcm_vector: text+tag on return | 72 ac 84 93 e3 a5 22 8b 5d 13 0a 69 d2 51 0e 42 | test_gcm_vector: encrypt: aad-size=0 salt-size=4 wire-IV-size=8 text-size=0 tag-size=16 | test_gcm_vector: text+tag on call | 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 | verify_chunk_data: output ciphertext: ok | verify_chunk_data: TAG: ok | test_gcm_vector: text+tag on return | 72 ac 84 93 e3 a5 22 8b 5d 13 0a 69 d2 51 0e 42 | test_gcm_vector: release sym_key-key@0x56080aee2f70 | test_gcm_vector: passed one block | decode_to_chunk: raw_key: input "0xe98b72a9881a84ca6b76e0f43e68647a" | decode_to_chunk: output: | e9 8b 72 a9 88 1a 84 ca 6b 76 e0 f4 3e 68 64 7a | : ephemeral-key@0x56080ae63080 (16-bytes, AES_KEY_GEN) | CONCATENATE_DATA_AND_BASE: | target: EXTRACT_KEY_FROM_KEY | base: base-key@0x56080ae63080 (16-bytes, AES_KEY_GEN) | params: 16-bytes@0x7fff508fffc0 | result: symkey-key@0x56080aee47f0 (32-bytes, EXTRACT_KEY_FROM_KEY) | key-offset: 0, key-size: 16 | EXTRACT_KEY_FROM_KEY: | target: AES_GCM | flags: ENCRYPT+DECRYPT | key_size: 16-bytes | base: base-key@0x56080aee47f0 (32-bytes, EXTRACT_KEY_FROM_KEY) | operation: FLAGS_ONLY | params: 8-bytes@0x7fff508fffa8 | result: symkey-key@0x56080aee2f70 (16-bytes, AES_GCM) | symkey: release tmp-key@0x56080aee47f0 | decode_to_chunk: salted IV: input "0x8b23299fde174053f3d652ba" | decode_to_chunk: output: | 8b 23 29 9f de 17 40 53 f3 d6 52 ba | decode_to_chunk: AAD: input "" | decode_to_chunk: output: | | decode_to_chunk: plaintext: input "0x28286a321293253c3e0aa2704a278032" | decode_to_chunk: output: | 28 28 6a 32 12 93 25 3c 3e 0a a2 70 4a 27 80 32 | decode_to_chunk: ciphertext: input "0x5a3c1cf1985dbb8bed818036fdd5ab42" | decode_to_chunk: output: | 5a 3c 1c f1 98 5d bb 8b ed 81 80 36 fd d5 ab 42 | decode_to_chunk: tag: input "0x23c7ab0f952b7091cd324835043b5eb5" | decode_to_chunk: output: | 23 c7 ab 0f 95 2b 70 91 cd 32 48 35 04 3b 5e b5 | test_gcm_vector: decrypt: aad-size=0 salt-size=4 wire-IV-size=8 text-size=16 tag-size=16 | test_gcm_vector: text+tag on call | 5a 3c 1c f1 98 5d bb 8b ed 81 80 36 fd d5 ab 42 | 23 c7 ab 0f 95 2b 70 91 cd 32 48 35 04 3b 5e b5 | verify_chunk_data: output ciphertext: ok | verify_chunk_data: TAG: ok | test_gcm_vector: text+tag on return | 28 28 6a 32 12 93 25 3c 3e 0a a2 70 4a 27 80 32 | 23 c7 ab 0f 95 2b 70 91 cd 32 48 35 04 3b 5e b5 | test_gcm_vector: encrypt: aad-size=0 salt-size=4 wire-IV-size=8 text-size=16 tag-size=16 | test_gcm_vector: text+tag on call | 28 28 6a 32 12 93 25 3c 3e 0a a2 70 4a 27 80 32 | 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 | verify_chunk_data: output ciphertext: ok | verify_chunk_data: TAG: ok | test_gcm_vector: text+tag on return | 5a 3c 1c f1 98 5d bb 8b ed 81 80 36 fd d5 ab 42 | 23 c7 ab 0f 95 2b 70 91 cd 32 48 35 04 3b 5e b5 | test_gcm_vector: release sym_key-key@0x56080aee2f70 | test_gcm_vector: passed two blocks | decode_to_chunk: raw_key: input "0xbfd414a6212958a607a0f5d3ab48471d" | decode_to_chunk: output: | bf d4 14 a6 21 29 58 a6 07 a0 f5 d3 ab 48 47 1d | : ephemeral-key@0x56080ae63080 (16-bytes, AES_KEY_GEN) | CONCATENATE_DATA_AND_BASE: | target: EXTRACT_KEY_FROM_KEY | base: base-key@0x56080ae63080 (16-bytes, AES_KEY_GEN) | params: 16-bytes@0x7fff508fffc0 | result: symkey-key@0x56080aee47f0 (32-bytes, EXTRACT_KEY_FROM_KEY) | key-offset: 0, key-size: 16 | EXTRACT_KEY_FROM_KEY: | target: AES_GCM | flags: ENCRYPT+DECRYPT | key_size: 16-bytes | base: base-key@0x56080aee47f0 (32-bytes, EXTRACT_KEY_FROM_KEY) | operation: FLAGS_ONLY | params: 8-bytes@0x7fff508fffa8 | result: symkey-key@0x56080aee2f70 (16-bytes, AES_GCM) | symkey: release tmp-key@0x56080aee47f0 | decode_to_chunk: salted IV: input "0x86d8ea0ab8e40dcc481cd0e2" | decode_to_chunk: output: | 86 d8 ea 0a b8 e4 0d cc 48 1c d0 e2 | decode_to_chunk: AAD: input "" | decode_to_chunk: output: | | decode_to_chunk: plaintext: input "0xa6b76a066e63392c9443e60272ceaeb9d25c991b0f2e55e2804e168c05ea591a" | decode_to_chunk: output: | a6 b7 6a 06 6e 63 39 2c 94 43 e6 02 72 ce ae b9 | d2 5c 99 1b 0f 2e 55 e2 80 4e 16 8c 05 ea 59 1a | decode_to_chunk: ciphertext: input "0x62171db33193292d930bf6647347652c1ef33316d7feca99d54f1db4fcf513f8" | decode_to_chunk: output: | 62 17 1d b3 31 93 29 2d 93 0b f6 64 73 47 65 2c | 1e f3 33 16 d7 fe ca 99 d5 4f 1d b4 fc f5 13 f8 | decode_to_chunk: tag: input "0xc28280aa5c6c7a8bd366f28c1cfd1f6e" | decode_to_chunk: output: | c2 82 80 aa 5c 6c 7a 8b d3 66 f2 8c 1c fd 1f 6e | test_gcm_vector: decrypt: aad-size=0 salt-size=4 wire-IV-size=8 text-size=32 tag-size=16 | test_gcm_vector: text+tag on call | 62 17 1d b3 31 93 29 2d 93 0b f6 64 73 47 65 2c | 1e f3 33 16 d7 fe ca 99 d5 4f 1d b4 fc f5 13 f8 | c2 82 80 aa 5c 6c 7a 8b d3 66 f2 8c 1c fd 1f 6e | verify_chunk_data: output ciphertext: ok | verify_chunk_data: TAG: ok | test_gcm_vector: text+tag on return | a6 b7 6a 06 6e 63 39 2c 94 43 e6 02 72 ce ae b9 | d2 5c 99 1b 0f 2e 55 e2 80 4e 16 8c 05 ea 59 1a | c2 82 80 aa 5c 6c 7a 8b d3 66 f2 8c 1c fd 1f 6e | test_gcm_vector: encrypt: aad-size=0 salt-size=4 wire-IV-size=8 text-size=32 tag-size=16 | test_gcm_vector: text+tag on call | a6 b7 6a 06 6e 63 39 2c 94 43 e6 02 72 ce ae b9 | d2 5c 99 1b 0f 2e 55 e2 80 4e 16 8c 05 ea 59 1a | 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 | verify_chunk_data: output ciphertext: ok | verify_chunk_data: TAG: ok | test_gcm_vector: text+tag on return | 62 17 1d b3 31 93 29 2d 93 0b f6 64 73 47 65 2c | 1e f3 33 16 d7 fe ca 99 d5 4f 1d b4 fc f5 13 f8 | c2 82 80 aa 5c 6c 7a 8b d3 66 f2 8c 1c fd 1f 6e | test_gcm_vector: release sym_key-key@0x56080aee2f70 | test_gcm_vector: passed two blocks with associated data | decode_to_chunk: raw_key: input "0x006c458100fc5f4d62949d2c833b82d1" | decode_to_chunk: output: | 00 6c 45 81 00 fc 5f 4d 62 94 9d 2c 83 3b 82 d1 | : ephemeral-key@0x56080ae63080 (16-bytes, AES_KEY_GEN) | CONCATENATE_DATA_AND_BASE: | target: EXTRACT_KEY_FROM_KEY | base: base-key@0x56080ae63080 (16-bytes, AES_KEY_GEN) | params: 16-bytes@0x7fff508fffc0 | result: symkey-key@0x56080aee47f0 (32-bytes, EXTRACT_KEY_FROM_KEY) | key-offset: 0, key-size: 16 | EXTRACT_KEY_FROM_KEY: | target: AES_GCM | flags: ENCRYPT+DECRYPT | key_size: 16-bytes | base: base-key@0x56080aee47f0 (32-bytes, EXTRACT_KEY_FROM_KEY) | operation: FLAGS_ONLY | params: 8-bytes@0x7fff508fffa8 | result: symkey-key@0x56080aee2f70 (16-bytes, AES_GCM) | symkey: release tmp-key@0x56080aee47f0 | decode_to_chunk: salted IV: input "0xa4e9c4bc5725a21ff42c82b2" | decode_to_chunk: output: | a4 e9 c4 bc 57 25 a2 1f f4 2c 82 b2 | decode_to_chunk: AAD: input "0x2efb14fb3657cdd6b9a8ff1a5f5a39b9" | decode_to_chunk: output: | 2e fb 14 fb 36 57 cd d6 b9 a8 ff 1a 5f 5a 39 b9 | decode_to_chunk: plaintext: input "0xf381d3bfbee0a879f7a4e17b623278cedd6978053dd313530a18f1a836100950" | decode_to_chunk: output: | f3 81 d3 bf be e0 a8 79 f7 a4 e1 7b 62 32 78 ce | dd 69 78 05 3d d3 13 53 0a 18 f1 a8 36 10 09 50 | decode_to_chunk: ciphertext: input "0xf39b4db3542d8542fb73fd2d66be568f26d7f814b3f87d1eceac3dd09a8d697e" | decode_to_chunk: output: | f3 9b 4d b3 54 2d 85 42 fb 73 fd 2d 66 be 56 8f | 26 d7 f8 14 b3 f8 7d 1e ce ac 3d d0 9a 8d 69 7e | decode_to_chunk: tag: input "0x39f045cb23b698c925db134d56c5" | decode_to_chunk: output: | 39 f0 45 cb 23 b6 98 c9 25 db 13 4d 56 c5 | test_gcm_vector: decrypt: aad-size=16 salt-size=4 wire-IV-size=8 text-size=32 tag-size=14 | test_gcm_vector: text+tag on call | f3 9b 4d b3 54 2d 85 42 fb 73 fd 2d 66 be 56 8f | 26 d7 f8 14 b3 f8 7d 1e ce ac 3d d0 9a 8d 69 7e | 39 f0 45 cb 23 b6 98 c9 25 db 13 4d 56 c5 | verify_chunk_data: output ciphertext: ok | verify_chunk_data: TAG: ok | test_gcm_vector: text+tag on return | f3 81 d3 bf be e0 a8 79 f7 a4 e1 7b 62 32 78 ce | dd 69 78 05 3d d3 13 53 0a 18 f1 a8 36 10 09 50 | 39 f0 45 cb 23 b6 98 c9 25 db 13 4d 56 c5 | test_gcm_vector: encrypt: aad-size=16 salt-size=4 wire-IV-size=8 text-size=32 tag-size=14 | test_gcm_vector: text+tag on call | f3 81 d3 bf be e0 a8 79 f7 a4 e1 7b 62 32 78 ce | dd 69 78 05 3d d3 13 53 0a 18 f1 a8 36 10 09 50 | 00 00 00 00 00 00 00 00 00 00 00 00 00 00 | verify_chunk_data: output ciphertext: ok | verify_chunk_data: TAG: ok | test_gcm_vector: text+tag on return | f3 9b 4d b3 54 2d 85 42 fb 73 fd 2d 66 be 56 8f | 26 d7 f8 14 b3 f8 7d 1e ce ac 3d d0 9a 8d 69 7e | 39 f0 45 cb 23 b6 98 c9 25 db 13 4d 56 c5 | test_gcm_vector: release sym_key-key@0x56080aee2f70 | test_gcm_vector: passed testing AES_CTR: Encrypting 16 octets using AES-CTR with 128-bit key | decode_to_chunk: raw_key: input "0x AE 68 52 F8 12 10 67 CC 4B F7 A5 76 55 77 F3 9E" | decode_to_chunk: output: | ae 68 52 f8 12 10 67 cc 4b f7 a5 76 55 77 f3 9e | : ephemeral-key@0x56080ae63080 (16-bytes, AES_KEY_GEN) | CONCATENATE_DATA_AND_BASE: | target: EXTRACT_KEY_FROM_KEY | base: base-key@0x56080ae63080 (16-bytes, AES_KEY_GEN) | params: 16-bytes@0x7fff50900020 | result: symkey-key@0x56080aee47f0 (32-bytes, EXTRACT_KEY_FROM_KEY) | key-offset: 0, key-size: 16 | EXTRACT_KEY_FROM_KEY: | target: AES_CTR | flags: ENCRYPT+DECRYPT | key_size: 16-bytes | base: base-key@0x56080aee47f0 (32-bytes, EXTRACT_KEY_FROM_KEY) | operation: FLAGS_ONLY | params: 8-bytes@0x7fff50900008 | result: symkey-key@0x56080aee2f70 (16-bytes, AES_CTR) | symkey: release tmp-key@0x56080aee47f0 | decode_to_chunk: input counter-block: : input "0x 00 00 00 30 00 00 00 00 00 00 00 00 00 00 00 01" | decode_to_chunk: output: | 00 00 00 30 00 00 00 00 00 00 00 00 00 00 00 01 | decode_to_chunk: Plaintext: input "0x 53 69 6E 67 6C 65 20 62 6C 6F 63 6B 20 6D 73 67" | decode_to_chunk: output: | 53 69 6e 67 6c 65 20 62 6c 6f 63 6b 20 6d 73 67 | decode_to_chunk: Ciphertext: input "0x E4 09 5D 4F B7 A7 B3 79 2D 61 75 A3 26 13 11 B8" | decode_to_chunk: output: | e4 09 5d 4f b7 a7 b3 79 2d 61 75 a3 26 13 11 b8 | decode_to_chunk: expected counter-block: : input "0x 00 00 00 30 00 00 00 00 00 00 00 00 00 00 00 02" | decode_to_chunk: output: | 00 00 00 30 00 00 00 00 00 00 00 00 00 00 00 02 | do_aes_ctr: enter | do_aes_ctr: counter-block updated from 0x1 to 0x2 for 16 bytes | do_aes_ctr: exit | verify_chunk_data: encrypt: ok | verify_chunk_data: counter-block: ok | decode_to_chunk: input counter-block: : input "0x 00 00 00 30 00 00 00 00 00 00 00 00 00 00 00 01" | decode_to_chunk: output: | 00 00 00 30 00 00 00 00 00 00 00 00 00 00 00 01 | decode_to_chunk: Ciphertext: input "0x E4 09 5D 4F B7 A7 B3 79 2D 61 75 A3 26 13 11 B8" | decode_to_chunk: output: | e4 09 5d 4f b7 a7 b3 79 2d 61 75 a3 26 13 11 b8 | decode_to_chunk: Plaintext: input "0x 53 69 6E 67 6C 65 20 62 6C 6F 63 6B 20 6D 73 67" | decode_to_chunk: output: | 53 69 6e 67 6c 65 20 62 6c 6f 63 6b 20 6d 73 67 | decode_to_chunk: expected counter-block: : input "0x 00 00 00 30 00 00 00 00 00 00 00 00 00 00 00 02" | decode_to_chunk: output: | 00 00 00 30 00 00 00 00 00 00 00 00 00 00 00 02 | do_aes_ctr: enter | do_aes_ctr: counter-block updated from 0x1 to 0x2 for 16 bytes | do_aes_ctr: exit | verify_chunk_data: decrypt: ok | verify_chunk_data: counter-block: ok | test_ctr_vector: release sym_key-key@0x56080aee2f70 | test_ctr_vector: Encrypting 16 octets using AES-CTR with 128-bit key passed Encrypting 32 octets using AES-CTR with 128-bit key | decode_to_chunk: raw_key: input "0x 7E 24 06 78 17 FA E0 D7 43 D6 CE 1F 32 53 91 63" | decode_to_chunk: output: | 7e 24 06 78 17 fa e0 d7 43 d6 ce 1f 32 53 91 63 | : ephemeral-key@0x56080ae63080 (16-bytes, AES_KEY_GEN) | CONCATENATE_DATA_AND_BASE: | target: EXTRACT_KEY_FROM_KEY | base: base-key@0x56080ae63080 (16-bytes, AES_KEY_GEN) | params: 16-bytes@0x7fff50900020 | result: symkey-key@0x56080aee47f0 (32-bytes, EXTRACT_KEY_FROM_KEY) | key-offset: 0, key-size: 16 | EXTRACT_KEY_FROM_KEY: | target: AES_CTR | flags: ENCRYPT+DECRYPT | key_size: 16-bytes | base: base-key@0x56080aee47f0 (32-bytes, EXTRACT_KEY_FROM_KEY) | operation: FLAGS_ONLY | params: 8-bytes@0x7fff50900008 | result: symkey-key@0x56080aee2f70 (16-bytes, AES_CTR) | symkey: release tmp-key@0x56080aee47f0 | decode_to_chunk: input counter-block: : input "0x 00 6C B6 DB C0 54 3B 59 DA 48 D9 0B 00 00 00 01" | decode_to_chunk: output: | 00 6c b6 db c0 54 3b 59 da 48 d9 0b 00 00 00 01 | decode_to_chunk: Plaintext: input "0x00 01 02 03 04 05 06 07 08 09 0A 0B 0C 0D 0E 0F10 11 12 13 14 15 16 17 18 19 1A 1B 1C 1D 1E 1F" | decode_to_chunk: output: | 00 01 02 03 04 05 06 07 08 09 0a 0b 0c 0d 0e 0f | 10 11 12 13 14 15 16 17 18 19 1a 1b 1c 1d 1e 1f | decode_to_chunk: Ciphertext: input "0x51 04 A1 06 16 8A 72 D9 79 0D 41 EE 8E DA D3 88EB 2E 1E FC 46 DA 57 C8 FC E6 30 DF 91 41 BE 28" | decode_to_chunk: output: | 51 04 a1 06 16 8a 72 d9 79 0d 41 ee 8e da d3 88 | eb 2e 1e fc 46 da 57 c8 fc e6 30 df 91 41 be 28 | decode_to_chunk: expected counter-block: : input "0x 00 6C B6 DB C0 54 3B 59 DA 48 D9 0B 00 00 00 03" | decode_to_chunk: output: | 00 6c b6 db c0 54 3b 59 da 48 d9 0b 00 00 00 03 | do_aes_ctr: enter | do_aes_ctr: counter-block updated from 0x1 to 0x3 for 32 bytes | do_aes_ctr: exit | verify_chunk_data: encrypt: ok | verify_chunk_data: counter-block: ok | decode_to_chunk: input counter-block: : input "0x 00 6C B6 DB C0 54 3B 59 DA 48 D9 0B 00 00 00 01" | decode_to_chunk: output: | 00 6c b6 db c0 54 3b 59 da 48 d9 0b 00 00 00 01 | decode_to_chunk: Ciphertext: input "0x51 04 A1 06 16 8A 72 D9 79 0D 41 EE 8E DA D3 88EB 2E 1E FC 46 DA 57 C8 FC E6 30 DF 91 41 BE 28" | decode_to_chunk: output: | 51 04 a1 06 16 8a 72 d9 79 0d 41 ee 8e da d3 88 | eb 2e 1e fc 46 da 57 c8 fc e6 30 df 91 41 be 28 | decode_to_chunk: Plaintext: input "0x00 01 02 03 04 05 06 07 08 09 0A 0B 0C 0D 0E 0F10 11 12 13 14 15 16 17 18 19 1A 1B 1C 1D 1E 1F" | decode_to_chunk: output: | 00 01 02 03 04 05 06 07 08 09 0a 0b 0c 0d 0e 0f | 10 11 12 13 14 15 16 17 18 19 1a 1b 1c 1d 1e 1f | decode_to_chunk: expected counter-block: : input "0x 00 6C B6 DB C0 54 3B 59 DA 48 D9 0B 00 00 00 03" | decode_to_chunk: output: | 00 6c b6 db c0 54 3b 59 da 48 d9 0b 00 00 00 03 | do_aes_ctr: enter | do_aes_ctr: counter-block updated from 0x1 to 0x3 for 32 bytes | do_aes_ctr: exit | verify_chunk_data: decrypt: ok | verify_chunk_data: counter-block: ok | test_ctr_vector: release sym_key-key@0x56080aee2f70 | test_ctr_vector: Encrypting 32 octets using AES-CTR with 128-bit key passed Encrypting 36 octets using AES-CTR with 128-bit key | decode_to_chunk: raw_key: input "0x 76 91 BE 03 5E 50 20 A8 AC 6E 61 85 29 F9 A0 DC" | decode_to_chunk: output: | 76 91 be 03 5e 50 20 a8 ac 6e 61 85 29 f9 a0 dc | : ephemeral-key@0x56080ae63080 (16-bytes, AES_KEY_GEN) | CONCATENATE_DATA_AND_BASE: | target: EXTRACT_KEY_FROM_KEY | base: base-key@0x56080ae63080 (16-bytes, AES_KEY_GEN) | params: 16-bytes@0x7fff50900020 | result: symkey-key@0x56080aee47f0 (32-bytes, EXTRACT_KEY_FROM_KEY) | key-offset: 0, key-size: 16 | EXTRACT_KEY_FROM_KEY: | target: AES_CTR | flags: ENCRYPT+DECRYPT | key_size: 16-bytes | base: base-key@0x56080aee47f0 (32-bytes, EXTRACT_KEY_FROM_KEY) | operation: FLAGS_ONLY | params: 8-bytes@0x7fff50900008 | result: symkey-key@0x56080aee2f70 (16-bytes, AES_CTR) | symkey: release tmp-key@0x56080aee47f0 | decode_to_chunk: input counter-block: : input "0x 00 E0 01 7B 27 77 7F 3F 4A 17 86 F0 00 00 00 01" | decode_to_chunk: output: | 00 e0 01 7b 27 77 7f 3f 4a 17 86 f0 00 00 00 01 | decode_to_chunk: Plaintext: input "0x00 01 02 03 04 05 06 07 08 09 0A 0B 0C 0D 0E 0F10 11 12 13 14 15 16 17 18 19 1A 1B 1C 1D 1E 1F20 21 22 23" | decode_to_chunk: output: | 00 01 02 03 04 05 06 07 08 09 0a 0b 0c 0d 0e 0f | 10 11 12 13 14 15 16 17 18 19 1a 1b 1c 1d 1e 1f | 20 21 22 23 | decode_to_chunk: Ciphertext: input "0xC1 CF 48 A8 9F 2F FD D9 CF 46 52 E9 EF DB 72 D745 40 A4 2B DE 6D 78 36 D5 9A 5C EA AE F3 10 5325 B2 07 2F" | decode_to_chunk: output: | c1 cf 48 a8 9f 2f fd d9 cf 46 52 e9 ef db 72 d7 | 45 40 a4 2b de 6d 78 36 d5 9a 5c ea ae f3 10 53 | 25 b2 07 2f | decode_to_chunk: expected counter-block: : input "0x 00 E0 01 7B 27 77 7F 3F 4A 17 86 F0 00 00 00 04" | decode_to_chunk: output: | 00 e0 01 7b 27 77 7f 3f 4a 17 86 f0 00 00 00 04 | do_aes_ctr: enter | do_aes_ctr: counter-block updated from 0x1 to 0x4 for 36 bytes | do_aes_ctr: exit | verify_chunk_data: encrypt: ok | verify_chunk_data: counter-block: ok | decode_to_chunk: input counter-block: : input "0x 00 E0 01 7B 27 77 7F 3F 4A 17 86 F0 00 00 00 01" | decode_to_chunk: output: | 00 e0 01 7b 27 77 7f 3f 4a 17 86 f0 00 00 00 01 | decode_to_chunk: Ciphertext: input "0xC1 CF 48 A8 9F 2F FD D9 CF 46 52 E9 EF DB 72 D745 40 A4 2B DE 6D 78 36 D5 9A 5C EA AE F3 10 5325 B2 07 2F" | decode_to_chunk: output: | c1 cf 48 a8 9f 2f fd d9 cf 46 52 e9 ef db 72 d7 | 45 40 a4 2b de 6d 78 36 d5 9a 5c ea ae f3 10 53 | 25 b2 07 2f | decode_to_chunk: Plaintext: input "0x00 01 02 03 04 05 06 07 08 09 0A 0B 0C 0D 0E 0F10 11 12 13 14 15 16 17 18 19 1A 1B 1C 1D 1E 1F20 21 22 23" | decode_to_chunk: output: | 00 01 02 03 04 05 06 07 08 09 0a 0b 0c 0d 0e 0f | 10 11 12 13 14 15 16 17 18 19 1a 1b 1c 1d 1e 1f | 20 21 22 23 | decode_to_chunk: expected counter-block: : input "0x 00 E0 01 7B 27 77 7F 3F 4A 17 86 F0 00 00 00 04" | decode_to_chunk: output: | 00 e0 01 7b 27 77 7f 3f 4a 17 86 f0 00 00 00 04 | do_aes_ctr: enter | do_aes_ctr: counter-block updated from 0x1 to 0x4 for 36 bytes | do_aes_ctr: exit | verify_chunk_data: decrypt: ok | verify_chunk_data: counter-block: ok | test_ctr_vector: release sym_key-key@0x56080aee2f70 | test_ctr_vector: Encrypting 36 octets using AES-CTR with 128-bit key passed Encrypting 16 octets using AES-CTR with 192-bit key | decode_to_chunk: raw_key: input "0x16 AF 5B 14 5F C9 F5 79 C1 75 F9 3E 3B FB 0E ED86 3D 06 CC FD B7 85 15" | decode_to_chunk: output: | 16 af 5b 14 5f c9 f5 79 c1 75 f9 3e 3b fb 0e ed | 86 3d 06 cc fd b7 85 15 | : ephemeral-key@0x56080ae63080 (16-bytes, AES_KEY_GEN) | CONCATENATE_DATA_AND_BASE: | target: EXTRACT_KEY_FROM_KEY | base: base-key@0x56080ae63080 (16-bytes, AES_KEY_GEN) | params: 16-bytes@0x7fff50900020 | result: symkey-key@0x56080aee47f0 (40-bytes, EXTRACT_KEY_FROM_KEY) | key-offset: 0, key-size: 24 | EXTRACT_KEY_FROM_KEY: | target: AES_CTR | flags: ENCRYPT+DECRYPT | key_size: 24-bytes | base: base-key@0x56080aee47f0 (40-bytes, EXTRACT_KEY_FROM_KEY) | operation: FLAGS_ONLY | params: 8-bytes@0x7fff50900008 | result: symkey-key@0x56080aee2f70 (24-bytes, AES_CTR) | symkey: release tmp-key@0x56080aee47f0 | decode_to_chunk: input counter-block: : input "0x 00 00 00 48 36 73 3C 14 7D 6D 93 CB 00 00 00 01" | decode_to_chunk: output: | 00 00 00 48 36 73 3c 14 7d 6d 93 cb 00 00 00 01 | decode_to_chunk: Plaintext: input "0x 53 69 6E 67 6C 65 20 62 6C 6F 63 6B 20 6D 73 67" | decode_to_chunk: output: | 53 69 6e 67 6c 65 20 62 6c 6f 63 6b 20 6d 73 67 | decode_to_chunk: Ciphertext: input "0x 4B 55 38 4F E2 59 C9 C8 4E 79 35 A0 03 CB E9 28" | decode_to_chunk: output: | 4b 55 38 4f e2 59 c9 c8 4e 79 35 a0 03 cb e9 28 | decode_to_chunk: expected counter-block: : input "0x 00 00 00 48 36 73 3C 14 7D 6D 93 CB 00 00 00 02" | decode_to_chunk: output: | 00 00 00 48 36 73 3c 14 7d 6d 93 cb 00 00 00 02 | do_aes_ctr: enter | do_aes_ctr: counter-block updated from 0x1 to 0x2 for 16 bytes | do_aes_ctr: exit | verify_chunk_data: encrypt: ok | verify_chunk_data: counter-block: ok | decode_to_chunk: input counter-block: : input "0x 00 00 00 48 36 73 3C 14 7D 6D 93 CB 00 00 00 01" | decode_to_chunk: output: | 00 00 00 48 36 73 3c 14 7d 6d 93 cb 00 00 00 01 | decode_to_chunk: Ciphertext: input "0x 4B 55 38 4F E2 59 C9 C8 4E 79 35 A0 03 CB E9 28" | decode_to_chunk: output: | 4b 55 38 4f e2 59 c9 c8 4e 79 35 a0 03 cb e9 28 | decode_to_chunk: Plaintext: input "0x 53 69 6E 67 6C 65 20 62 6C 6F 63 6B 20 6D 73 67" | decode_to_chunk: output: | 53 69 6e 67 6c 65 20 62 6c 6f 63 6b 20 6d 73 67 | decode_to_chunk: expected counter-block: : input "0x 00 00 00 48 36 73 3C 14 7D 6D 93 CB 00 00 00 02" | decode_to_chunk: output: | 00 00 00 48 36 73 3c 14 7d 6d 93 cb 00 00 00 02 | do_aes_ctr: enter | do_aes_ctr: counter-block updated from 0x1 to 0x2 for 16 bytes | do_aes_ctr: exit | verify_chunk_data: decrypt: ok | verify_chunk_data: counter-block: ok | test_ctr_vector: release sym_key-key@0x56080aee2f70 | test_ctr_vector: Encrypting 16 octets using AES-CTR with 192-bit key passed Encrypting 32 octets using AES-CTR with 192-bit key | decode_to_chunk: raw_key: input "0x7C 5C B2 40 1B 3D C3 3C 19 E7 34 08 19 E0 F6 9C67 8C 3D B8 E6 F6 A9 1A" | decode_to_chunk: output: | 7c 5c b2 40 1b 3d c3 3c 19 e7 34 08 19 e0 f6 9c | 67 8c 3d b8 e6 f6 a9 1a | : ephemeral-key@0x56080ae63080 (16-bytes, AES_KEY_GEN) | CONCATENATE_DATA_AND_BASE: | target: EXTRACT_KEY_FROM_KEY | base: base-key@0x56080ae63080 (16-bytes, AES_KEY_GEN) | params: 16-bytes@0x7fff50900020 | result: symkey-key@0x56080aee47f0 (40-bytes, EXTRACT_KEY_FROM_KEY) | key-offset: 0, key-size: 24 | EXTRACT_KEY_FROM_KEY: | target: AES_CTR | flags: ENCRYPT+DECRYPT | key_size: 24-bytes | base: base-key@0x56080aee47f0 (40-bytes, EXTRACT_KEY_FROM_KEY) | operation: FLAGS_ONLY | params: 8-bytes@0x7fff50900008 | result: symkey-key@0x56080aee2f70 (24-bytes, AES_CTR) | symkey: release tmp-key@0x56080aee47f0 | decode_to_chunk: input counter-block: : input "0x 00 96 B0 3B 02 0C 6E AD C2 CB 50 0D 00 00 00 01" | decode_to_chunk: output: | 00 96 b0 3b 02 0c 6e ad c2 cb 50 0d 00 00 00 01 | decode_to_chunk: Plaintext: input "0x00 01 02 03 04 05 06 07 08 09 0A 0B 0C 0D 0E 0F10 11 12 13 14 15 16 17 18 19 1A 1B 1C 1D 1E 1F" | decode_to_chunk: output: | 00 01 02 03 04 05 06 07 08 09 0a 0b 0c 0d 0e 0f | 10 11 12 13 14 15 16 17 18 19 1a 1b 1c 1d 1e 1f | decode_to_chunk: Ciphertext: input "0x45 32 43 FC 60 9B 23 32 7E DF AA FA 71 31 CD 9F84 90 70 1C 5A D4 A7 9C FC 1F E0 FF 42 F4 FB 00" | decode_to_chunk: output: | 45 32 43 fc 60 9b 23 32 7e df aa fa 71 31 cd 9f | 84 90 70 1c 5a d4 a7 9c fc 1f e0 ff 42 f4 fb 00 | decode_to_chunk: expected counter-block: : input "0x 00 96 B0 3B 02 0C 6E AD C2 CB 50 0D 00 00 00 03" | decode_to_chunk: output: | 00 96 b0 3b 02 0c 6e ad c2 cb 50 0d 00 00 00 03 | do_aes_ctr: enter | do_aes_ctr: counter-block updated from 0x1 to 0x3 for 32 bytes | do_aes_ctr: exit | verify_chunk_data: encrypt: ok | verify_chunk_data: counter-block: ok | decode_to_chunk: input counter-block: : input "0x 00 96 B0 3B 02 0C 6E AD C2 CB 50 0D 00 00 00 01" | decode_to_chunk: output: | 00 96 b0 3b 02 0c 6e ad c2 cb 50 0d 00 00 00 01 | decode_to_chunk: Ciphertext: input "0x45 32 43 FC 60 9B 23 32 7E DF AA FA 71 31 CD 9F84 90 70 1C 5A D4 A7 9C FC 1F E0 FF 42 F4 FB 00" | decode_to_chunk: output: | 45 32 43 fc 60 9b 23 32 7e df aa fa 71 31 cd 9f | 84 90 70 1c 5a d4 a7 9c fc 1f e0 ff 42 f4 fb 00 | decode_to_chunk: Plaintext: input "0x00 01 02 03 04 05 06 07 08 09 0A 0B 0C 0D 0E 0F10 11 12 13 14 15 16 17 18 19 1A 1B 1C 1D 1E 1F" | decode_to_chunk: output: | 00 01 02 03 04 05 06 07 08 09 0a 0b 0c 0d 0e 0f | 10 11 12 13 14 15 16 17 18 19 1a 1b 1c 1d 1e 1f | decode_to_chunk: expected counter-block: : input "0x 00 96 B0 3B 02 0C 6E AD C2 CB 50 0D 00 00 00 03" | decode_to_chunk: output: | 00 96 b0 3b 02 0c 6e ad c2 cb 50 0d 00 00 00 03 | do_aes_ctr: enter | do_aes_ctr: counter-block updated from 0x1 to 0x3 for 32 bytes | do_aes_ctr: exit | verify_chunk_data: decrypt: ok | verify_chunk_data: counter-block: ok | test_ctr_vector: release sym_key-key@0x56080aee2f70 | test_ctr_vector: Encrypting 32 octets using AES-CTR with 192-bit key passed Encrypting 36 octets using AES-CTR with 192-bit key | decode_to_chunk: raw_key: input "0x02 BF 39 1E E8 EC B1 59 B9 59 61 7B 09 65 27 9BF5 9B 60 A7 86 D3 E0 FE" | decode_to_chunk: output: | 02 bf 39 1e e8 ec b1 59 b9 59 61 7b 09 65 27 9b | f5 9b 60 a7 86 d3 e0 fe | : ephemeral-key@0x56080ae63080 (16-bytes, AES_KEY_GEN) | CONCATENATE_DATA_AND_BASE: | target: EXTRACT_KEY_FROM_KEY | base: base-key@0x56080ae63080 (16-bytes, AES_KEY_GEN) | params: 16-bytes@0x7fff50900020 | result: symkey-key@0x56080aee47f0 (40-bytes, EXTRACT_KEY_FROM_KEY) | key-offset: 0, key-size: 24 | EXTRACT_KEY_FROM_KEY: | target: AES_CTR | flags: ENCRYPT+DECRYPT | key_size: 24-bytes | base: base-key@0x56080aee47f0 (40-bytes, EXTRACT_KEY_FROM_KEY) | operation: FLAGS_ONLY | params: 8-bytes@0x7fff50900008 | result: symkey-key@0x56080aee2f70 (24-bytes, AES_CTR) | symkey: release tmp-key@0x56080aee47f0 | decode_to_chunk: input counter-block: : input "0x 00 07 BD FD 5C BD 60 27 8D CC 09 12 00 00 00 01" | decode_to_chunk: output: | 00 07 bd fd 5c bd 60 27 8d cc 09 12 00 00 00 01 | decode_to_chunk: Plaintext: input "0x00 01 02 03 04 05 06 07 08 09 0A 0B 0C 0D 0E 0F10 11 12 13 14 15 16 17 18 19 1A 1B 1C 1D 1E 1F20 21 22 23" | decode_to_chunk: output: | 00 01 02 03 04 05 06 07 08 09 0a 0b 0c 0d 0e 0f | 10 11 12 13 14 15 16 17 18 19 1a 1b 1c 1d 1e 1f | 20 21 22 23 | decode_to_chunk: Ciphertext: input "0x96 89 3F C5 5E 5C 72 2F 54 0B 7D D1 DD F7 E7 58D2 88 BC 95 C6 91 65 88 45 36 C8 11 66 2F 21 88AB EE 09 35" | decode_to_chunk: output: | 96 89 3f c5 5e 5c 72 2f 54 0b 7d d1 dd f7 e7 58 | d2 88 bc 95 c6 91 65 88 45 36 c8 11 66 2f 21 88 | ab ee 09 35 | decode_to_chunk: expected counter-block: : input "0x 00 07 BD FD 5C BD 60 27 8D CC 09 12 00 00 00 04" | decode_to_chunk: output: | 00 07 bd fd 5c bd 60 27 8d cc 09 12 00 00 00 04 | do_aes_ctr: enter | do_aes_ctr: counter-block updated from 0x1 to 0x4 for 36 bytes | do_aes_ctr: exit | verify_chunk_data: encrypt: ok | verify_chunk_data: counter-block: ok | decode_to_chunk: input counter-block: : input "0x 00 07 BD FD 5C BD 60 27 8D CC 09 12 00 00 00 01" | decode_to_chunk: output: | 00 07 bd fd 5c bd 60 27 8d cc 09 12 00 00 00 01 | decode_to_chunk: Ciphertext: input "0x96 89 3F C5 5E 5C 72 2F 54 0B 7D D1 DD F7 E7 58D2 88 BC 95 C6 91 65 88 45 36 C8 11 66 2F 21 88AB EE 09 35" | decode_to_chunk: output: | 96 89 3f c5 5e 5c 72 2f 54 0b 7d d1 dd f7 e7 58 | d2 88 bc 95 c6 91 65 88 45 36 c8 11 66 2f 21 88 | ab ee 09 35 | decode_to_chunk: Plaintext: input "0x00 01 02 03 04 05 06 07 08 09 0A 0B 0C 0D 0E 0F10 11 12 13 14 15 16 17 18 19 1A 1B 1C 1D 1E 1F20 21 22 23" | decode_to_chunk: output: | 00 01 02 03 04 05 06 07 08 09 0a 0b 0c 0d 0e 0f | 10 11 12 13 14 15 16 17 18 19 1a 1b 1c 1d 1e 1f | 20 21 22 23 | decode_to_chunk: expected counter-block: : input "0x 00 07 BD FD 5C BD 60 27 8D CC 09 12 00 00 00 04" | decode_to_chunk: output: | 00 07 bd fd 5c bd 60 27 8d cc 09 12 00 00 00 04 | do_aes_ctr: enter | do_aes_ctr: counter-block updated from 0x1 to 0x4 for 36 bytes | do_aes_ctr: exit | verify_chunk_data: decrypt: ok | verify_chunk_data: counter-block: ok | test_ctr_vector: release sym_key-key@0x56080aee2f70 | test_ctr_vector: Encrypting 36 octets using AES-CTR with 192-bit key passed Encrypting 16 octets using AES-CTR with 256-bit key | decode_to_chunk: raw_key: input "0x77 6B EF F2 85 1D B0 6F 4C 8A 05 42 C8 69 6F 6C6A 81 AF 1E EC 96 B4 D3 7F C1 D6 89 E6 C1 C1 04" | decode_to_chunk: output: | 77 6b ef f2 85 1d b0 6f 4c 8a 05 42 c8 69 6f 6c | 6a 81 af 1e ec 96 b4 d3 7f c1 d6 89 e6 c1 c1 04 | : ephemeral-key@0x56080ae63080 (16-bytes, AES_KEY_GEN) | CONCATENATE_DATA_AND_BASE: | target: EXTRACT_KEY_FROM_KEY | base: base-key@0x56080ae63080 (16-bytes, AES_KEY_GEN) | params: 16-bytes@0x7fff50900020 | result: symkey-key@0x56080aee47f0 (48-bytes, EXTRACT_KEY_FROM_KEY) | key-offset: 0, key-size: 32 | EXTRACT_KEY_FROM_KEY: | target: AES_CTR | flags: ENCRYPT+DECRYPT | key_size: 32-bytes | base: base-key@0x56080aee47f0 (48-bytes, EXTRACT_KEY_FROM_KEY) | operation: FLAGS_ONLY | params: 8-bytes@0x7fff50900008 | result: symkey-key@0x56080aee2f70 (32-bytes, AES_CTR) | symkey: release tmp-key@0x56080aee47f0 | decode_to_chunk: input counter-block: : input "0x 00 00 00 60 DB 56 72 C9 7A A8 F0 B2 00 00 00 01" | decode_to_chunk: output: | 00 00 00 60 db 56 72 c9 7a a8 f0 b2 00 00 00 01 | decode_to_chunk: Plaintext: input "0x 53 69 6E 67 6C 65 20 62 6C 6F 63 6B 20 6D 73 67" | decode_to_chunk: output: | 53 69 6e 67 6c 65 20 62 6c 6f 63 6b 20 6d 73 67 | decode_to_chunk: Ciphertext: input "0x 14 5A D0 1D BF 82 4E C7 56 08 63 DC 71 E3 E0 C0" | decode_to_chunk: output: | 14 5a d0 1d bf 82 4e c7 56 08 63 dc 71 e3 e0 c0 | decode_to_chunk: expected counter-block: : input "0x 00 00 00 60 DB 56 72 C9 7A A8 F0 B2 00 00 00 02" | decode_to_chunk: output: | 00 00 00 60 db 56 72 c9 7a a8 f0 b2 00 00 00 02 | do_aes_ctr: enter | do_aes_ctr: counter-block updated from 0x1 to 0x2 for 16 bytes | do_aes_ctr: exit | verify_chunk_data: encrypt: ok | verify_chunk_data: counter-block: ok | decode_to_chunk: input counter-block: : input "0x 00 00 00 60 DB 56 72 C9 7A A8 F0 B2 00 00 00 01" | decode_to_chunk: output: | 00 00 00 60 db 56 72 c9 7a a8 f0 b2 00 00 00 01 | decode_to_chunk: Ciphertext: input "0x 14 5A D0 1D BF 82 4E C7 56 08 63 DC 71 E3 E0 C0" | decode_to_chunk: output: | 14 5a d0 1d bf 82 4e c7 56 08 63 dc 71 e3 e0 c0 | decode_to_chunk: Plaintext: input "0x 53 69 6E 67 6C 65 20 62 6C 6F 63 6B 20 6D 73 67" | decode_to_chunk: output: | 53 69 6e 67 6c 65 20 62 6c 6f 63 6b 20 6d 73 67 | decode_to_chunk: expected counter-block: : input "0x 00 00 00 60 DB 56 72 C9 7A A8 F0 B2 00 00 00 02" | decode_to_chunk: output: | 00 00 00 60 db 56 72 c9 7a a8 f0 b2 00 00 00 02 | do_aes_ctr: enter | do_aes_ctr: counter-block updated from 0x1 to 0x2 for 16 bytes | do_aes_ctr: exit | verify_chunk_data: decrypt: ok | verify_chunk_data: counter-block: ok | test_ctr_vector: release sym_key-key@0x56080aee2f70 | test_ctr_vector: Encrypting 16 octets using AES-CTR with 256-bit key passed Encrypting 32 octets using AES-CTR with 256-bit key | decode_to_chunk: raw_key: input "0xF6 D6 6D 6B D5 2D 59 BB 07 96 36 58 79 EF F8 86C6 6D D5 1A 5B 6A 99 74 4B 50 59 0C 87 A2 38 84" | decode_to_chunk: output: | f6 d6 6d 6b d5 2d 59 bb 07 96 36 58 79 ef f8 86 | c6 6d d5 1a 5b 6a 99 74 4b 50 59 0c 87 a2 38 84 | : ephemeral-key@0x56080ae63080 (16-bytes, AES_KEY_GEN) | CONCATENATE_DATA_AND_BASE: | target: EXTRACT_KEY_FROM_KEY | base: base-key@0x56080ae63080 (16-bytes, AES_KEY_GEN) | params: 16-bytes@0x7fff50900020 | result: symkey-key@0x56080aee47f0 (48-bytes, EXTRACT_KEY_FROM_KEY) | key-offset: 0, key-size: 32 | EXTRACT_KEY_FROM_KEY: | target: AES_CTR | flags: ENCRYPT+DECRYPT | key_size: 32-bytes | base: base-key@0x56080aee47f0 (48-bytes, EXTRACT_KEY_FROM_KEY) | operation: FLAGS_ONLY | params: 8-bytes@0x7fff50900008 | result: symkey-key@0x56080aee2f70 (32-bytes, AES_CTR) | symkey: release tmp-key@0x56080aee47f0 | decode_to_chunk: input counter-block: : input "0x 00 FA AC 24 C1 58 5E F1 5A 43 D8 75 00 00 00 01" | decode_to_chunk: output: | 00 fa ac 24 c1 58 5e f1 5a 43 d8 75 00 00 00 01 | decode_to_chunk: Plaintext: input "0x00 01 02 03 04 05 06 07 08 09 0A 0B 0C 0D 0E 0F10 11 12 13 14 15 16 17 18 19 1A 1B 1C 1D 1E 1F" | decode_to_chunk: output: | 00 01 02 03 04 05 06 07 08 09 0a 0b 0c 0d 0e 0f | 10 11 12 13 14 15 16 17 18 19 1a 1b 1c 1d 1e 1f | decode_to_chunk: Ciphertext: input "0xF0 5E 23 1B 38 94 61 2C 49 EE 00 0B 80 4E B2 A9B8 30 6B 50 8F 83 9D 6A 55 30 83 1D 93 44 AF 1C" | decode_to_chunk: output: | f0 5e 23 1b 38 94 61 2c 49 ee 00 0b 80 4e b2 a9 | b8 30 6b 50 8f 83 9d 6a 55 30 83 1d 93 44 af 1c | decode_to_chunk: expected counter-block: : input "0x 00 FA AC 24 C1 58 5E F1 5A 43 D8 75 00 00 00 03" | decode_to_chunk: output: | 00 fa ac 24 c1 58 5e f1 5a 43 d8 75 00 00 00 03 | do_aes_ctr: enter | do_aes_ctr: counter-block updated from 0x1 to 0x3 for 32 bytes | do_aes_ctr: exit | verify_chunk_data: encrypt: ok | verify_chunk_data: counter-block: ok | decode_to_chunk: input counter-block: : input "0x 00 FA AC 24 C1 58 5E F1 5A 43 D8 75 00 00 00 01" | decode_to_chunk: output: | 00 fa ac 24 c1 58 5e f1 5a 43 d8 75 00 00 00 01 | decode_to_chunk: Ciphertext: input "0xF0 5E 23 1B 38 94 61 2C 49 EE 00 0B 80 4E B2 A9B8 30 6B 50 8F 83 9D 6A 55 30 83 1D 93 44 AF 1C" | decode_to_chunk: output: | f0 5e 23 1b 38 94 61 2c 49 ee 00 0b 80 4e b2 a9 | b8 30 6b 50 8f 83 9d 6a 55 30 83 1d 93 44 af 1c | decode_to_chunk: Plaintext: input "0x00 01 02 03 04 05 06 07 08 09 0A 0B 0C 0D 0E 0F10 11 12 13 14 15 16 17 18 19 1A 1B 1C 1D 1E 1F" | decode_to_chunk: output: | 00 01 02 03 04 05 06 07 08 09 0a 0b 0c 0d 0e 0f | 10 11 12 13 14 15 16 17 18 19 1a 1b 1c 1d 1e 1f | decode_to_chunk: expected counter-block: : input "0x 00 FA AC 24 C1 58 5E F1 5A 43 D8 75 00 00 00 03" | decode_to_chunk: output: | 00 fa ac 24 c1 58 5e f1 5a 43 d8 75 00 00 00 03 | do_aes_ctr: enter | do_aes_ctr: counter-block updated from 0x1 to 0x3 for 32 bytes | do_aes_ctr: exit | verify_chunk_data: decrypt: ok | verify_chunk_data: counter-block: ok | test_ctr_vector: release sym_key-key@0x56080aee2f70 | test_ctr_vector: Encrypting 32 octets using AES-CTR with 256-bit key passed Encrypting 36 octets using AES-CTR with 256-bit key | decode_to_chunk: raw_key: input "0xFF 7A 61 7C E6 91 48 E4 F1 72 6E 2F 43 58 1D E2AA 62 D9 F8 05 53 2E DF F1 EE D6 87 FB 54 15 3D" | decode_to_chunk: output: | ff 7a 61 7c e6 91 48 e4 f1 72 6e 2f 43 58 1d e2 | aa 62 d9 f8 05 53 2e df f1 ee d6 87 fb 54 15 3d | : ephemeral-key@0x56080ae63080 (16-bytes, AES_KEY_GEN) | CONCATENATE_DATA_AND_BASE: | target: EXTRACT_KEY_FROM_KEY | base: base-key@0x56080ae63080 (16-bytes, AES_KEY_GEN) | params: 16-bytes@0x7fff50900020 | result: symkey-key@0x56080aee47f0 (48-bytes, EXTRACT_KEY_FROM_KEY) | key-offset: 0, key-size: 32 | EXTRACT_KEY_FROM_KEY: | target: AES_CTR | flags: ENCRYPT+DECRYPT | key_size: 32-bytes | base: base-key@0x56080aee47f0 (48-bytes, EXTRACT_KEY_FROM_KEY) | operation: FLAGS_ONLY | params: 8-bytes@0x7fff50900008 | result: symkey-key@0x56080aee2f70 (32-bytes, AES_CTR) | symkey: release tmp-key@0x56080aee47f0 | decode_to_chunk: input counter-block: : input "0x 00 1C C5 B7 51 A5 1D 70 A1 C1 11 48 00 00 00 01" | decode_to_chunk: output: | 00 1c c5 b7 51 a5 1d 70 a1 c1 11 48 00 00 00 01 | decode_to_chunk: Plaintext: input "0x00 01 02 03 04 05 06 07 08 09 0A 0B 0C 0D 0E 0F10 11 12 13 14 15 16 17 18 19 1A 1B 1C 1D 1E 1F20 21 22 23" | decode_to_chunk: output: | 00 01 02 03 04 05 06 07 08 09 0a 0b 0c 0d 0e 0f | 10 11 12 13 14 15 16 17 18 19 1a 1b 1c 1d 1e 1f | 20 21 22 23 | decode_to_chunk: Ciphertext: input "0xEB 6C 52 82 1D 0B BB F7 CE 75 94 46 2A CA 4F AAB4 07 DF 86 65 69 FD 07 F4 8C C0 B5 83 D6 07 1F1E C0 E6 B8" | decode_to_chunk: output: | eb 6c 52 82 1d 0b bb f7 ce 75 94 46 2a ca 4f aa | b4 07 df 86 65 69 fd 07 f4 8c c0 b5 83 d6 07 1f | 1e c0 e6 b8 | decode_to_chunk: expected counter-block: : input "0x 00 1C C5 B7 51 A5 1D 70 A1 C1 11 48 00 00 00 04" | decode_to_chunk: output: | 00 1c c5 b7 51 a5 1d 70 a1 c1 11 48 00 00 00 04 | do_aes_ctr: enter | do_aes_ctr: counter-block updated from 0x1 to 0x4 for 36 bytes | do_aes_ctr: exit | verify_chunk_data: encrypt: ok | verify_chunk_data: counter-block: ok | decode_to_chunk: input counter-block: : input "0x 00 1C C5 B7 51 A5 1D 70 A1 C1 11 48 00 00 00 01" | decode_to_chunk: output: | 00 1c c5 b7 51 a5 1d 70 a1 c1 11 48 00 00 00 01 | decode_to_chunk: Ciphertext: input "0xEB 6C 52 82 1D 0B BB F7 CE 75 94 46 2A CA 4F AAB4 07 DF 86 65 69 FD 07 F4 8C C0 B5 83 D6 07 1F1E C0 E6 B8" | decode_to_chunk: output: | eb 6c 52 82 1d 0b bb f7 ce 75 94 46 2a ca 4f aa | b4 07 df 86 65 69 fd 07 f4 8c c0 b5 83 d6 07 1f | 1e c0 e6 b8 | decode_to_chunk: Plaintext: input "0x00 01 02 03 04 05 06 07 08 09 0A 0B 0C 0D 0E 0F10 11 12 13 14 15 16 17 18 19 1A 1B 1C 1D 1E 1F20 21 22 23" | decode_to_chunk: output: | 00 01 02 03 04 05 06 07 08 09 0a 0b 0c 0d 0e 0f | 10 11 12 13 14 15 16 17 18 19 1a 1b 1c 1d 1e 1f | 20 21 22 23 | decode_to_chunk: expected counter-block: : input "0x 00 1C C5 B7 51 A5 1D 70 A1 C1 11 48 00 00 00 04" | decode_to_chunk: output: | 00 1c c5 b7 51 a5 1d 70 a1 c1 11 48 00 00 00 04 | do_aes_ctr: enter | do_aes_ctr: counter-block updated from 0x1 to 0x4 for 36 bytes | do_aes_ctr: exit | verify_chunk_data: decrypt: ok | verify_chunk_data: counter-block: ok | test_ctr_vector: release sym_key-key@0x56080aee2f70 | test_ctr_vector: Encrypting 36 octets using AES-CTR with 256-bit key passed testing AES_CBC: Encrypting 16 bytes (1 block) using AES-CBC with 128-bit key | decode_to_chunk: raw_key: input "0x06a9214036b8a15b512e03d534120006" | decode_to_chunk: output: | 06 a9 21 40 36 b8 a1 5b 51 2e 03 d5 34 12 00 06 | : ephemeral-key@0x56080ae63080 (16-bytes, AES_KEY_GEN) | CONCATENATE_DATA_AND_BASE: | target: EXTRACT_KEY_FROM_KEY | base: base-key@0x56080ae63080 (16-bytes, AES_KEY_GEN) | params: 16-bytes@0x7fff50900020 | result: symkey-key@0x56080aee47f0 (32-bytes, EXTRACT_KEY_FROM_KEY) | key-offset: 0, key-size: 16 | EXTRACT_KEY_FROM_KEY: | target: AES_CBC | flags: ENCRYPT+DECRYPT | key_size: 16-bytes | base: base-key@0x56080aee47f0 (32-bytes, EXTRACT_KEY_FROM_KEY) | operation: FLAGS_ONLY | params: 8-bytes@0x7fff50900008 | result: symkey-key@0x56080aee2f70 (16-bytes, AES_CBC) | symkey: release tmp-key@0x56080aee47f0 | decode_to_chunk: IV: : input "0x3dafba429d9eb430b422da802c9fac41" | decode_to_chunk: output: | 3d af ba 42 9d 9e b4 30 b4 22 da 80 2c 9f ac 41 | decode_to_chunk: new IV: : input "0xe353779c1079aeb82708942dbe77181a" | decode_to_chunk: output: | e3 53 77 9c 10 79 ae b8 27 08 94 2d be 77 18 1a | decode_to_chunk: plaintext: : input "Single block msg" | decode_to_chunk: output: | 53 69 6e 67 6c 65 20 62 6c 6f 63 6b 20 6d 73 67 | decode_to_chunk: ciphertext: : input "0xe353779c1079aeb82708942dbe77181a" | decode_to_chunk: output: | e3 53 77 9c 10 79 ae b8 27 08 94 2d be 77 18 1a | NSS ike_alg_nss_cbc: aes - enter | NSS ike_alg_nss_cbc: aes - exit | verify_chunk_data: encrypt: ok | verify_chunk_data: updated CBC IV: ok | decode_to_chunk: IV: : input "0x3dafba429d9eb430b422da802c9fac41" | decode_to_chunk: output: | 3d af ba 42 9d 9e b4 30 b4 22 da 80 2c 9f ac 41 | decode_to_chunk: new IV: : input "0xe353779c1079aeb82708942dbe77181a" | decode_to_chunk: output: | e3 53 77 9c 10 79 ae b8 27 08 94 2d be 77 18 1a | decode_to_chunk: cipertext: : input "0xe353779c1079aeb82708942dbe77181a" | decode_to_chunk: output: | e3 53 77 9c 10 79 ae b8 27 08 94 2d be 77 18 1a | decode_to_chunk: plaintext: : input "Single block msg" | decode_to_chunk: output: | 53 69 6e 67 6c 65 20 62 6c 6f 63 6b 20 6d 73 67 | NSS ike_alg_nss_cbc: aes - enter | NSS ike_alg_nss_cbc: aes - exit | verify_chunk_data: decrypt: ok | verify_chunk_data: updated CBC IV: ok | test_cbc_vector: release sym_key-key@0x56080aee2f70 | test_ctr_vector: Encrypting 16 bytes (1 block) using AES-CBC with 128-bit key passed Encrypting 32 bytes (2 blocks) using AES-CBC with 128-bit key | decode_to_chunk: raw_key: input "0xc286696d887c9aa0611bbb3e2025a45a" | decode_to_chunk: output: | c2 86 69 6d 88 7c 9a a0 61 1b bb 3e 20 25 a4 5a | : ephemeral-key@0x56080ae63080 (16-bytes, AES_KEY_GEN) | CONCATENATE_DATA_AND_BASE: | target: EXTRACT_KEY_FROM_KEY | base: base-key@0x56080ae63080 (16-bytes, AES_KEY_GEN) | params: 16-bytes@0x7fff50900020 | result: symkey-key@0x56080aee47f0 (32-bytes, EXTRACT_KEY_FROM_KEY) | key-offset: 0, key-size: 16 | EXTRACT_KEY_FROM_KEY: | target: AES_CBC | flags: ENCRYPT+DECRYPT | key_size: 16-bytes | base: base-key@0x56080aee47f0 (32-bytes, EXTRACT_KEY_FROM_KEY) | operation: FLAGS_ONLY | params: 8-bytes@0x7fff50900008 | result: symkey-key@0x56080aee2f70 (16-bytes, AES_CBC) | symkey: release tmp-key@0x56080aee47f0 | decode_to_chunk: IV: : input "0x562e17996d093d28ddb3ba695a2e6f58" | decode_to_chunk: output: | 56 2e 17 99 6d 09 3d 28 dd b3 ba 69 5a 2e 6f 58 | decode_to_chunk: new IV: : input "0xd296cd94c2cccf8a3a863028b5e1dc0a7586602d253cfff91b8266bea6d61ab1" | decode_to_chunk: output: | d2 96 cd 94 c2 cc cf 8a 3a 86 30 28 b5 e1 dc 0a | 75 86 60 2d 25 3c ff f9 1b 82 66 be a6 d6 1a b1 | decode_to_chunk: plaintext: : input "0x000102030405060708090a0b0c0d0e0f101112131415161718191a1b1c1d1e1f" | decode_to_chunk: output: | 00 01 02 03 04 05 06 07 08 09 0a 0b 0c 0d 0e 0f | 10 11 12 13 14 15 16 17 18 19 1a 1b 1c 1d 1e 1f | decode_to_chunk: ciphertext: : input "0xd296cd94c2cccf8a3a863028b5e1dc0a7586602d253cfff91b8266bea6d61ab1" | decode_to_chunk: output: | d2 96 cd 94 c2 cc cf 8a 3a 86 30 28 b5 e1 dc 0a | 75 86 60 2d 25 3c ff f9 1b 82 66 be a6 d6 1a b1 | NSS ike_alg_nss_cbc: aes - enter | NSS ike_alg_nss_cbc: aes - exit | verify_chunk_data: encrypt: ok | verify_chunk_data: updated CBC IV: ok | decode_to_chunk: IV: : input "0x562e17996d093d28ddb3ba695a2e6f58" | decode_to_chunk: output: | 56 2e 17 99 6d 09 3d 28 dd b3 ba 69 5a 2e 6f 58 | decode_to_chunk: new IV: : input "0xd296cd94c2cccf8a3a863028b5e1dc0a7586602d253cfff91b8266bea6d61ab1" | decode_to_chunk: output: | d2 96 cd 94 c2 cc cf 8a 3a 86 30 28 b5 e1 dc 0a | 75 86 60 2d 25 3c ff f9 1b 82 66 be a6 d6 1a b1 | decode_to_chunk: cipertext: : input "0xd296cd94c2cccf8a3a863028b5e1dc0a7586602d253cfff91b8266bea6d61ab1" | decode_to_chunk: output: | d2 96 cd 94 c2 cc cf 8a 3a 86 30 28 b5 e1 dc 0a | 75 86 60 2d 25 3c ff f9 1b 82 66 be a6 d6 1a b1 | decode_to_chunk: plaintext: : input "0x000102030405060708090a0b0c0d0e0f101112131415161718191a1b1c1d1e1f" | decode_to_chunk: output: | 00 01 02 03 04 05 06 07 08 09 0a 0b 0c 0d 0e 0f | 10 11 12 13 14 15 16 17 18 19 1a 1b 1c 1d 1e 1f | NSS ike_alg_nss_cbc: aes - enter | NSS ike_alg_nss_cbc: aes - exit | verify_chunk_data: decrypt: ok | verify_chunk_data: updated CBC IV: ok | test_cbc_vector: release sym_key-key@0x56080aee2f70 | test_ctr_vector: Encrypting 32 bytes (2 blocks) using AES-CBC with 128-bit key passed Encrypting 48 bytes (3 blocks) using AES-CBC with 128-bit key | decode_to_chunk: raw_key: input "0x6c3ea0477630ce21a2ce334aa746c2cd" | decode_to_chunk: output: | 6c 3e a0 47 76 30 ce 21 a2 ce 33 4a a7 46 c2 cd | : ephemeral-key@0x56080ae63080 (16-bytes, AES_KEY_GEN) | CONCATENATE_DATA_AND_BASE: | target: EXTRACT_KEY_FROM_KEY | base: base-key@0x56080ae63080 (16-bytes, AES_KEY_GEN) | params: 16-bytes@0x7fff50900020 | result: symkey-key@0x56080aee47f0 (32-bytes, EXTRACT_KEY_FROM_KEY) | key-offset: 0, key-size: 16 | EXTRACT_KEY_FROM_KEY: | target: AES_CBC | flags: ENCRYPT+DECRYPT | key_size: 16-bytes | base: base-key@0x56080aee47f0 (32-bytes, EXTRACT_KEY_FROM_KEY) | operation: FLAGS_ONLY | params: 8-bytes@0x7fff50900008 | result: symkey-key@0x56080aee2f70 (16-bytes, AES_CBC) | symkey: release tmp-key@0x56080aee47f0 | decode_to_chunk: IV: : input "0xc782dc4c098c66cbd9cd27d825682c81" | decode_to_chunk: output: | c7 82 dc 4c 09 8c 66 cb d9 cd 27 d8 25 68 2c 81 | decode_to_chunk: new IV: : input "0xd0a02b3836451753d493665d33f0e8862dea54cdb293abc7506939276772f8d5021c19216bad525c8579695d83ba2684" | decode_to_chunk: output: | d0 a0 2b 38 36 45 17 53 d4 93 66 5d 33 f0 e8 86 | 2d ea 54 cd b2 93 ab c7 50 69 39 27 67 72 f8 d5 | 02 1c 19 21 6b ad 52 5c 85 79 69 5d 83 ba 26 84 | decode_to_chunk: plaintext: : input "This is a 48-byte message (exactly 3 AES blocks)" | decode_to_chunk: output: | 54 68 69 73 20 69 73 20 61 20 34 38 2d 62 79 74 | 65 20 6d 65 73 73 61 67 65 20 28 65 78 61 63 74 | 6c 79 20 33 20 41 45 53 20 62 6c 6f 63 6b 73 29 | decode_to_chunk: ciphertext: : input "0xd0a02b3836451753d493665d33f0e8862dea54cdb293abc7506939276772f8d5021c19216bad525c8579695d83ba2684" | decode_to_chunk: output: | d0 a0 2b 38 36 45 17 53 d4 93 66 5d 33 f0 e8 86 | 2d ea 54 cd b2 93 ab c7 50 69 39 27 67 72 f8 d5 | 02 1c 19 21 6b ad 52 5c 85 79 69 5d 83 ba 26 84 | NSS ike_alg_nss_cbc: aes - enter | NSS ike_alg_nss_cbc: aes - exit | verify_chunk_data: encrypt: ok | verify_chunk_data: updated CBC IV: ok | decode_to_chunk: IV: : input "0xc782dc4c098c66cbd9cd27d825682c81" | decode_to_chunk: output: | c7 82 dc 4c 09 8c 66 cb d9 cd 27 d8 25 68 2c 81 | decode_to_chunk: new IV: : input "0xd0a02b3836451753d493665d33f0e8862dea54cdb293abc7506939276772f8d5021c19216bad525c8579695d83ba2684" | decode_to_chunk: output: | d0 a0 2b 38 36 45 17 53 d4 93 66 5d 33 f0 e8 86 | 2d ea 54 cd b2 93 ab c7 50 69 39 27 67 72 f8 d5 | 02 1c 19 21 6b ad 52 5c 85 79 69 5d 83 ba 26 84 | decode_to_chunk: cipertext: : input "0xd0a02b3836451753d493665d33f0e8862dea54cdb293abc7506939276772f8d5021c19216bad525c8579695d83ba2684" | decode_to_chunk: output: | d0 a0 2b 38 36 45 17 53 d4 93 66 5d 33 f0 e8 86 | 2d ea 54 cd b2 93 ab c7 50 69 39 27 67 72 f8 d5 | 02 1c 19 21 6b ad 52 5c 85 79 69 5d 83 ba 26 84 | decode_to_chunk: plaintext: : input "This is a 48-byte message (exactly 3 AES blocks)" | decode_to_chunk: output: | 54 68 69 73 20 69 73 20 61 20 34 38 2d 62 79 74 | 65 20 6d 65 73 73 61 67 65 20 28 65 78 61 63 74 | 6c 79 20 33 20 41 45 53 20 62 6c 6f 63 6b 73 29 | NSS ike_alg_nss_cbc: aes - enter | NSS ike_alg_nss_cbc: aes - exit | verify_chunk_data: decrypt: ok | verify_chunk_data: updated CBC IV: ok | test_cbc_vector: release sym_key-key@0x56080aee2f70 | test_ctr_vector: Encrypting 48 bytes (3 blocks) using AES-CBC with 128-bit key passed Encrypting 64 bytes (4 blocks) using AES-CBC with 128-bit key | decode_to_chunk: raw_key: input "0x56e47a38c5598974bc46903dba290349" | decode_to_chunk: output: | 56 e4 7a 38 c5 59 89 74 bc 46 90 3d ba 29 03 49 | : ephemeral-key@0x56080ae63080 (16-bytes, AES_KEY_GEN) | CONCATENATE_DATA_AND_BASE: | target: EXTRACT_KEY_FROM_KEY | base: base-key@0x56080ae63080 (16-bytes, AES_KEY_GEN) | params: 16-bytes@0x7fff50900020 | result: symkey-key@0x56080aee47f0 (32-bytes, EXTRACT_KEY_FROM_KEY) | key-offset: 0, key-size: 16 | EXTRACT_KEY_FROM_KEY: | target: AES_CBC | flags: ENCRYPT+DECRYPT | key_size: 16-bytes | base: base-key@0x56080aee47f0 (32-bytes, EXTRACT_KEY_FROM_KEY) | operation: FLAGS_ONLY | params: 8-bytes@0x7fff50900008 | result: symkey-key@0x56080aee2f70 (16-bytes, AES_CBC) | symkey: release tmp-key@0x56080aee47f0 | decode_to_chunk: IV: : input "0x8ce82eefbea0da3c44699ed7db51b7d9" | decode_to_chunk: output: | 8c e8 2e ef be a0 da 3c 44 69 9e d7 db 51 b7 d9 | decode_to_chunk: new IV: : input "0xc30e32ffedc0774e6aff6af0869f71aa0f3af07a9a31a9c684db207eb0ef8e4e35907aa632c3ffdf868bb7b29d3d46ad83ce9f9a102ee99d49a53e87f4c3da55" | decode_to_chunk: output: | c3 0e 32 ff ed c0 77 4e 6a ff 6a f0 86 9f 71 aa | 0f 3a f0 7a 9a 31 a9 c6 84 db 20 7e b0 ef 8e 4e | 35 90 7a a6 32 c3 ff df 86 8b b7 b2 9d 3d 46 ad | 83 ce 9f 9a 10 2e e9 9d 49 a5 3e 87 f4 c3 da 55 | decode_to_chunk: plaintext: : input "0xa0a1a2a3a4a5a6a7a8a9aaabacadaeafb0b1b2b3b4b5b6b7b8b9babbbcbdbebfc0c1c2c3c4c5c6c7c8c9cacbcccdcecfd0d1d2d3d4d5d6d7d8d9dadbdcdddedf" | decode_to_chunk: output: | a0 a1 a2 a3 a4 a5 a6 a7 a8 a9 aa ab ac ad ae af | b0 b1 b2 b3 b4 b5 b6 b7 b8 b9 ba bb bc bd be bf | c0 c1 c2 c3 c4 c5 c6 c7 c8 c9 ca cb cc cd ce cf | d0 d1 d2 d3 d4 d5 d6 d7 d8 d9 da db dc dd de df | decode_to_chunk: ciphertext: : input "0xc30e32ffedc0774e6aff6af0869f71aa0f3af07a9a31a9c684db207eb0ef8e4e35907aa632c3ffdf868bb7b29d3d46ad83ce9f9a102ee99d49a53e87f4c3da55" | decode_to_chunk: output: | c3 0e 32 ff ed c0 77 4e 6a ff 6a f0 86 9f 71 aa | 0f 3a f0 7a 9a 31 a9 c6 84 db 20 7e b0 ef 8e 4e | 35 90 7a a6 32 c3 ff df 86 8b b7 b2 9d 3d 46 ad | 83 ce 9f 9a 10 2e e9 9d 49 a5 3e 87 f4 c3 da 55 | NSS ike_alg_nss_cbc: aes - enter | NSS ike_alg_nss_cbc: aes - exit | verify_chunk_data: encrypt: ok | verify_chunk_data: updated CBC IV: ok | decode_to_chunk: IV: : input "0x8ce82eefbea0da3c44699ed7db51b7d9" | decode_to_chunk: output: | 8c e8 2e ef be a0 da 3c 44 69 9e d7 db 51 b7 d9 | decode_to_chunk: new IV: : input "0xc30e32ffedc0774e6aff6af0869f71aa0f3af07a9a31a9c684db207eb0ef8e4e35907aa632c3ffdf868bb7b29d3d46ad83ce9f9a102ee99d49a53e87f4c3da55" | decode_to_chunk: output: | c3 0e 32 ff ed c0 77 4e 6a ff 6a f0 86 9f 71 aa | 0f 3a f0 7a 9a 31 a9 c6 84 db 20 7e b0 ef 8e 4e | 35 90 7a a6 32 c3 ff df 86 8b b7 b2 9d 3d 46 ad | 83 ce 9f 9a 10 2e e9 9d 49 a5 3e 87 f4 c3 da 55 | decode_to_chunk: cipertext: : input "0xc30e32ffedc0774e6aff6af0869f71aa0f3af07a9a31a9c684db207eb0ef8e4e35907aa632c3ffdf868bb7b29d3d46ad83ce9f9a102ee99d49a53e87f4c3da55" | decode_to_chunk: output: | c3 0e 32 ff ed c0 77 4e 6a ff 6a f0 86 9f 71 aa | 0f 3a f0 7a 9a 31 a9 c6 84 db 20 7e b0 ef 8e 4e | 35 90 7a a6 32 c3 ff df 86 8b b7 b2 9d 3d 46 ad | 83 ce 9f 9a 10 2e e9 9d 49 a5 3e 87 f4 c3 da 55 | decode_to_chunk: plaintext: : input "0xa0a1a2a3a4a5a6a7a8a9aaabacadaeafb0b1b2b3b4b5b6b7b8b9babbbcbdbebfc0c1c2c3c4c5c6c7c8c9cacbcccdcecfd0d1d2d3d4d5d6d7d8d9dadbdcdddedf" | decode_to_chunk: output: | a0 a1 a2 a3 a4 a5 a6 a7 a8 a9 aa ab ac ad ae af | b0 b1 b2 b3 b4 b5 b6 b7 b8 b9 ba bb bc bd be bf | c0 c1 c2 c3 c4 c5 c6 c7 c8 c9 ca cb cc cd ce cf | d0 d1 d2 d3 d4 d5 d6 d7 d8 d9 da db dc dd de df | NSS ike_alg_nss_cbc: aes - enter | NSS ike_alg_nss_cbc: aes - exit | verify_chunk_data: decrypt: ok | verify_chunk_data: updated CBC IV: ok | test_cbc_vector: release sym_key-key@0x56080aee2f70 | test_ctr_vector: Encrypting 64 bytes (4 blocks) using AES-CBC with 128-bit key passed testing AES_XCBC: RFC 3566 Test Case #1: AES-XCBC-MAC-96 with 0-byte input | decode_to_chunk: test_prf_vector: input "0x000102030405060708090a0b0c0d0e0f" | decode_to_chunk: output: | 00 01 02 03 04 05 06 07 08 09 0a 0b 0c 0d 0e 0f | decode_to_chunk: test_prf_vector: input "" | decode_to_chunk: output: | | decode_to_chunk: test_prf_vector: input "0x75f0251d528ac01c4573dfd584d79f29" | decode_to_chunk: output: | 75 f0 25 1d 52 8a c0 1c 45 73 df d5 84 d7 9f 29 | PRF chunk interface PRF aes_xcbc init key-chunk@0x56080aee6290 (length 16) | 00 01 02 03 04 05 06 07 08 09 0a 0b 0c 0d 0e 0f | : ephemeral-key@0x56080ae63080 (16-bytes, AES_KEY_GEN) | CONCATENATE_DATA_AND_BASE: | target: EXTRACT_KEY_FROM_KEY | base: base-key@0x56080ae63080 (16-bytes, AES_KEY_GEN) | params: 16-bytes@0x7fff508fffa0 | result: key-key@0x56080aee47f0 (32-bytes, EXTRACT_KEY_FROM_KEY) | key-offset: 0, key-size: 16 | EXTRACT_KEY_FROM_KEY: | target: EXTRACT_KEY_FROM_KEY | key_size: 16-bytes | base: base-key@0x56080aee47f0 (32-bytes, EXTRACT_KEY_FROM_KEY) | operation: FLAGS_ONLY | params: 8-bytes@0x7fff508fff88 | result: key-key@0x56080aee2f70 (16-bytes, EXTRACT_KEY_FROM_KEY) | key: release tmp-key@0x56080aee47f0 | XCBC: Key 16=16 just right | key-offset: 0, key-size: 16 | EXTRACT_KEY_FROM_KEY: | target: AES_ECB | flags: SIGN | key_size: 16-bytes | base: base-key@0x56080aee2f70 (16-bytes, EXTRACT_KEY_FROM_KEY) | operation: FLAGS_ONLY | params: 8-bytes@0x7fff508fff68 | result: key-key@0x56080aee47f0 (16-bytes, AES_ECB) | PRF chunk interface: release clone-key@0x56080aee2f70 | PRF chunk interface PRF aes_xcbc crypt-prf@0x56080aee6090 | PRF chunk interface PRF aes_xcbc update message-bytes@0x56080aee1740 (length 0) | | XCBC: data | K extracting all 16 bytes of key@0x56080aee47f0 | K: symkey-key@0x56080aee47f0 (16-bytes, AES_ECB) | : ephemeral-key@0x56080ae63080 (16-bytes, AES_KEY_GEN) | K: new slot-key@0x56080aee6cc0 (16-bytes, AES_ECB) | sizeof bytes 16 | wrapper: (SECItemType)1351613216: ffffffa2 ffffffb2 fffffff8 fffffffd ffffffdf ffffffd3 ffffff96 11 31 ffffffb6 68 ffffffec ffffffbb ffffffca ffffffdb 14 | K: release slot-key-key@0x56080aee6cc0 | K extracted len 16 bytes at 0x56080aee6360 | unwrapped: 00 01 02 03 04 05 06 07 08 09 0a 0b 0c 0d 0e 0f | XCBC: K: 00 01 02 03 04 05 06 07 08 09 0a 0b 0c 0d 0e 0f | XCBC: K1 c3 52 80 57 54 23 7f 31 1a c0 ff f4 e3 e0 3e 78 | : ephemeral-key@0x56080ae63080 (16-bytes, AES_KEY_GEN) | CONCATENATE_DATA_AND_BASE: | target: EXTRACT_KEY_FROM_KEY | base: base-key@0x56080ae63080 (16-bytes, AES_KEY_GEN) | params: 16-bytes@0x7fff508fff00 | result: k1-key@0x56080aee6f50 (32-bytes, EXTRACT_KEY_FROM_KEY) | key-offset: 0, key-size: 16 | EXTRACT_KEY_FROM_KEY: | target: AES_ECB | flags: SIGN | key_size: 16-bytes | base: base-key@0x56080aee6f50 (32-bytes, EXTRACT_KEY_FROM_KEY) | operation: FLAGS_ONLY | params: 8-bytes@0x7fff508ffee8 | result: k1-key@0x56080aee2f70 (16-bytes, AES_ECB) | k1: release tmp-key@0x56080aee6f50 | Computing E[0] using K3 | XCBC: K3 c1 a7 ab a1 a2 3a 94 06 58 07 a0 8c c8 ee d0 6e | XCBC: E[n-1] 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 | XCBC: M[n] | XCBC: M[n] | XCBC: M[n]:80...^E[n-1]^K3 | 41 a7 ab a1 a2 3a 94 06 58 07 a0 8c c8 ee d0 6e | XCBC: MAC 75 f0 25 1d 52 8a c0 1c 45 73 df d5 84 d7 9f 29 | xcbc: release k1-key@0x56080aee2f70 | PRF chunk interface: release key-key@0x56080aee47f0 | PRF chunk interface PRF aes_xcbc final-chunk@0x56080aee60b0 (length 16) | 75 f0 25 1d 52 8a c0 1c 45 73 df d5 84 d7 9f 29 | chunk output 75 f0 25 1d 52 8a c0 1c 45 73 df d5 84 d7 9f 29 | verify_chunk_data: RFC 3566 Test Case #1: AES-XCBC-MAC-96 with 0-byte input: ok | : ephemeral-key@0x56080ae63080 (16-bytes, AES_KEY_GEN) | CONCATENATE_DATA_AND_BASE: | target: EXTRACT_KEY_FROM_KEY | base: base-key@0x56080ae63080 (16-bytes, AES_KEY_GEN) | params: 16-bytes@0x7fff50900010 | result: key symkey-key@0x56080aee2f70 (32-bytes, EXTRACT_KEY_FROM_KEY) | key-offset: 0, key-size: 16 | EXTRACT_KEY_FROM_KEY: | target: EXTRACT_KEY_FROM_KEY | key_size: 16-bytes | base: base-key@0x56080aee2f70 (32-bytes, EXTRACT_KEY_FROM_KEY) | operation: FLAGS_ONLY | params: 8-bytes@0x7fff508ffff8 | result: key symkey-key@0x56080aee47f0 (16-bytes, EXTRACT_KEY_FROM_KEY) | key symkey: release tmp-key@0x56080aee2f70 | PRF symkey interface PRF aes_xcbc init key symkey-key@0x56080aee47f0 (size 16) | PRF symkey interface: key symkey-key@0x56080aee47f0 (16-bytes, EXTRACT_KEY_FROM_KEY) | XCBC: Key 16=16 just right | key-offset: 0, key-size: 16 | EXTRACT_KEY_FROM_KEY: | target: AES_ECB | flags: SIGN | key_size: 16-bytes | base: base-key@0x56080aee47f0 (16-bytes, EXTRACT_KEY_FROM_KEY) | operation: FLAGS_ONLY | params: 8-bytes@0x7fff508fff98 | result: key symkey-key@0x56080aee2f70 (16-bytes, AES_ECB) | PRF symkey interface PRF aes_xcbc crypt-prf@0x56080aee6090 | PRF symkey interface PRF aes_xcbc update symkey message-key@(nil) (size 0) | PRF symkey interface: symkey message-key@NULL | symkey message NULL key has no bytes | XCBC: data | K extracting all 16 bytes of key@0x56080aee2f70 | K: symkey-key@0x56080aee2f70 (16-bytes, AES_ECB) | : ephemeral-key@0x56080ae63080 (16-bytes, AES_KEY_GEN) | K: new slot-key@0x56080aee6cc0 (16-bytes, AES_ECB) | sizeof bytes 16 | wrapper: (SECItemType)1023: ffffffa2 ffffffb2 fffffff8 fffffffd ffffffdf ffffffd3 ffffff96 11 31 ffffffb6 68 ffffffec ffffffbb ffffffca ffffffdb 14 | K: release slot-key-key@0x56080aee6cc0 | K extracted len 16 bytes at 0x56080aee6d50 | unwrapped: 00 01 02 03 04 05 06 07 08 09 0a 0b 0c 0d 0e 0f | XCBC: K: 00 01 02 03 04 05 06 07 08 09 0a 0b 0c 0d 0e 0f | XCBC: K1 c3 52 80 57 54 23 7f 31 1a c0 ff f4 e3 e0 3e 78 | : ephemeral-key@0x56080ae63080 (16-bytes, AES_KEY_GEN) | CONCATENATE_DATA_AND_BASE: | target: EXTRACT_KEY_FROM_KEY | base: base-key@0x56080ae63080 (16-bytes, AES_KEY_GEN) | params: 16-bytes@0x7fff508fff20 | result: k1-key@0x56080aee8840 (32-bytes, EXTRACT_KEY_FROM_KEY) | key-offset: 0, key-size: 16 | EXTRACT_KEY_FROM_KEY: | target: AES_ECB | flags: SIGN | key_size: 16-bytes | base: base-key@0x56080aee8840 (32-bytes, EXTRACT_KEY_FROM_KEY) | operation: FLAGS_ONLY | params: 8-bytes@0x7fff508fff08 | result: k1-key@0x56080aee6f50 (16-bytes, AES_ECB) | k1: release tmp-key@0x56080aee8840 | Computing E[0] using K3 | XCBC: K3 c1 a7 ab a1 a2 3a 94 06 58 07 a0 8c c8 ee d0 6e | XCBC: E[n-1] 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 | XCBC: M[n] | XCBC: M[n] | XCBC: M[n]:80...^E[n-1]^K3 | 41 a7 ab a1 a2 3a 94 06 58 07 a0 8c c8 ee d0 6e | XCBC: MAC 75 f0 25 1d 52 8a c0 1c 45 73 df d5 84 d7 9f 29 | xcbc: release k1-key@0x56080aee6f50 | : ephemeral-key@0x56080ae63080 (16-bytes, AES_KEY_GEN) | CONCATENATE_DATA_AND_BASE: | target: EXTRACT_KEY_FROM_KEY | base: base-key@0x56080ae63080 (16-bytes, AES_KEY_GEN) | params: 16-bytes@0x7fff508fffb0 | result: xcbc-key@0x56080aee8840 (32-bytes, EXTRACT_KEY_FROM_KEY) | key-offset: 0, key-size: 16 | EXTRACT_KEY_FROM_KEY: | target: EXTRACT_KEY_FROM_KEY | key_size: 16-bytes | base: base-key@0x56080aee8840 (32-bytes, EXTRACT_KEY_FROM_KEY) | operation: FLAGS_ONLY | params: 8-bytes@0x7fff508fff98 | result: xcbc-key@0x56080aee6f50 (16-bytes, EXTRACT_KEY_FROM_KEY) | xcbc: release tmp-key@0x56080aee8840 | PRF symkey interface: release key-key@0x56080aee2f70 | PRF symkey interface PRF aes_xcbc final-key@0x56080aee6f50 (size 16) | PRF symkey interface: key-key@0x56080aee6f50 (16-bytes, EXTRACT_KEY_FROM_KEY) | output: symkey-key@0x56080aee6f50 (16-bytes, EXTRACT_KEY_FROM_KEY) | RFC 3566 Test Case #1: AES-XCBC-MAC-96 with 0-byte input extracting all 16 bytes of key@0x56080aee6f50 | RFC 3566 Test Case #1: AES-XCBC-MAC-96 with 0-byte input: symkey-key@0x56080aee6f50 (16-bytes, EXTRACT_KEY_FROM_KEY) | : ephemeral-key@0x56080ae63080 (16-bytes, AES_KEY_GEN) | RFC 3566 Test Case #1: AES-XCBC-MAC-96 with 0-byte input: new slot-key@0x56080aee6cc0 (16-bytes, EXTRACT_KEY_FROM_KEY) | sizeof bytes 16 | wrapper: (SECItemType)160858585: ffffffa4 ffffffec 08 ffffffad 40 ffffffc3 08 ffffffd0 ffffffde ffffffe9 3f ffffffbf 2e ffffffeb ffffffea 6d | RFC 3566 Test Case #1: AES-XCBC-MAC-96 with 0-byte input: release slot-key-key@0x56080aee6cc0 | RFC 3566 Test Case #1: AES-XCBC-MAC-96 with 0-byte input extracted len 16 bytes at 0x56080aee62b0 | unwrapped: 75 f0 25 1d 52 8a c0 1c 45 73 df d5 84 d7 9f 29 | verify_chunk_data: RFC 3566 Test Case #1: AES-XCBC-MAC-96 with 0-byte input: ok | test_prf_vector: RFC 3566 Test Case #1: AES-XCBC-MAC-96 with 0-byte input passed | test_prf_vector: release symkey-key@0x56080aee6f50 | test_prf_vector: release message-key@NULL | test_prf_vector: release key-key@0x56080aee47f0 | test_prf_vector: release output-key@NULL RFC 3566 Test Case #2: AES-XCBC-MAC-96 with 3-byte input | decode_to_chunk: test_prf_vector: input "0x000102030405060708090a0b0c0d0e0f" | decode_to_chunk: output: | 00 01 02 03 04 05 06 07 08 09 0a 0b 0c 0d 0e 0f | decode_to_chunk: test_prf_vector: input "0x000102" | decode_to_chunk: output: | 00 01 02 | decode_to_chunk: test_prf_vector: input "0x5b376580ae2f19afe7219ceef172756f" | decode_to_chunk: output: | 5b 37 65 80 ae 2f 19 af e7 21 9c ee f1 72 75 6f | PRF chunk interface PRF aes_xcbc init key-chunk@0x56080aee6090 (length 16) | 00 01 02 03 04 05 06 07 08 09 0a 0b 0c 0d 0e 0f | : ephemeral-key@0x56080ae63080 (16-bytes, AES_KEY_GEN) | CONCATENATE_DATA_AND_BASE: | target: EXTRACT_KEY_FROM_KEY | base: base-key@0x56080ae63080 (16-bytes, AES_KEY_GEN) | params: 16-bytes@0x7fff508fffa0 | result: key-key@0x56080aee6f50 (32-bytes, EXTRACT_KEY_FROM_KEY) | key-offset: 0, key-size: 16 | EXTRACT_KEY_FROM_KEY: | target: EXTRACT_KEY_FROM_KEY | key_size: 16-bytes | base: base-key@0x56080aee6f50 (32-bytes, EXTRACT_KEY_FROM_KEY) | operation: FLAGS_ONLY | params: 8-bytes@0x7fff508fff88 | result: key-key@0x56080aee47f0 (16-bytes, EXTRACT_KEY_FROM_KEY) | key: release tmp-key@0x56080aee6f50 | XCBC: Key 16=16 just right | key-offset: 0, key-size: 16 | EXTRACT_KEY_FROM_KEY: | target: AES_ECB | flags: SIGN | key_size: 16-bytes | base: base-key@0x56080aee47f0 (16-bytes, EXTRACT_KEY_FROM_KEY) | operation: FLAGS_ONLY | params: 8-bytes@0x7fff508fff68 | result: key-key@0x56080aee6f50 (16-bytes, AES_ECB) | PRF chunk interface: release clone-key@0x56080aee47f0 | PRF chunk interface PRF aes_xcbc crypt-prf@0x56080aee64c0 | PRF chunk interface PRF aes_xcbc update message-bytes@0x56080aee62b0 (length 3) | 00 01 02 | XCBC: data 00 01 02 | K extracting all 16 bytes of key@0x56080aee6f50 | K: symkey-key@0x56080aee6f50 (16-bytes, AES_ECB) | : ephemeral-key@0x56080ae63080 (16-bytes, AES_KEY_GEN) | K: new slot-key@0x56080aee6cc0 (16-bytes, AES_ECB) | sizeof bytes 16 | wrapper: (SECItemType)1351613216: ffffffa2 ffffffb2 fffffff8 fffffffd ffffffdf ffffffd3 ffffff96 11 31 ffffffb6 68 ffffffec ffffffbb ffffffca ffffffdb 14 | K: release slot-key-key@0x56080aee6cc0 | K extracted len 16 bytes at 0x56080aee6290 | unwrapped: 00 01 02 03 04 05 06 07 08 09 0a 0b 0c 0d 0e 0f | XCBC: K: 00 01 02 03 04 05 06 07 08 09 0a 0b 0c 0d 0e 0f | XCBC: K1 c3 52 80 57 54 23 7f 31 1a c0 ff f4 e3 e0 3e 78 | : ephemeral-key@0x56080ae63080 (16-bytes, AES_KEY_GEN) | CONCATENATE_DATA_AND_BASE: | target: EXTRACT_KEY_FROM_KEY | base: base-key@0x56080ae63080 (16-bytes, AES_KEY_GEN) | params: 16-bytes@0x7fff508fff00 | result: k1-key@0x56080aee2f70 (32-bytes, EXTRACT_KEY_FROM_KEY) | key-offset: 0, key-size: 16 | EXTRACT_KEY_FROM_KEY: | target: AES_ECB | flags: SIGN | key_size: 16-bytes | base: base-key@0x56080aee2f70 (32-bytes, EXTRACT_KEY_FROM_KEY) | operation: FLAGS_ONLY | params: 8-bytes@0x7fff508ffee8 | result: k1-key@0x56080aee47f0 (16-bytes, AES_ECB) | k1: release tmp-key@0x56080aee2f70 | Computing E[1] using K3 | XCBC: K3 c1 a7 ab a1 a2 3a 94 06 58 07 a0 8c c8 ee d0 6e | XCBC: E[n-1] 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 | XCBC: M[n] 00 01 02 | XCBC: M[n] 00 01 02 | XCBC: M[n]:80...^E[n-1]^K3 | c1 a6 a9 21 a2 3a 94 06 58 07 a0 8c c8 ee d0 6e | XCBC: MAC 5b 37 65 80 ae 2f 19 af e7 21 9c ee f1 72 75 6f | xcbc: release k1-key@0x56080aee47f0 | PRF chunk interface: release key-key@0x56080aee6f50 | PRF chunk interface PRF aes_xcbc final-chunk@0x56080aee6070 (length 16) | 5b 37 65 80 ae 2f 19 af e7 21 9c ee f1 72 75 6f | chunk output 5b 37 65 80 ae 2f 19 af e7 21 9c ee f1 72 75 6f | verify_chunk_data: RFC 3566 Test Case #2: AES-XCBC-MAC-96 with 3-byte input: ok | : ephemeral-key@0x56080ae63080 (16-bytes, AES_KEY_GEN) | CONCATENATE_DATA_AND_BASE: | target: EXTRACT_KEY_FROM_KEY | base: base-key@0x56080ae63080 (16-bytes, AES_KEY_GEN) | params: 16-bytes@0x7fff50900010 | result: key symkey-key@0x56080aee47f0 (32-bytes, EXTRACT_KEY_FROM_KEY) | key-offset: 0, key-size: 16 | EXTRACT_KEY_FROM_KEY: | target: EXTRACT_KEY_FROM_KEY | key_size: 16-bytes | base: base-key@0x56080aee47f0 (32-bytes, EXTRACT_KEY_FROM_KEY) | operation: FLAGS_ONLY | params: 8-bytes@0x7fff508ffff8 | result: key symkey-key@0x56080aee6f50 (16-bytes, EXTRACT_KEY_FROM_KEY) | key symkey: release tmp-key@0x56080aee47f0 | PRF symkey interface PRF aes_xcbc init key symkey-key@0x56080aee6f50 (size 16) | PRF symkey interface: key symkey-key@0x56080aee6f50 (16-bytes, EXTRACT_KEY_FROM_KEY) | XCBC: Key 16=16 just right | key-offset: 0, key-size: 16 | EXTRACT_KEY_FROM_KEY: | target: AES_ECB | flags: SIGN | key_size: 16-bytes | base: base-key@0x56080aee6f50 (16-bytes, EXTRACT_KEY_FROM_KEY) | operation: FLAGS_ONLY | params: 8-bytes@0x7fff508fff98 | result: key symkey-key@0x56080aee47f0 (16-bytes, AES_ECB) | PRF symkey interface PRF aes_xcbc crypt-prf@0x56080aee6360 | : ephemeral-key@0x56080ae63080 (16-bytes, AES_KEY_GEN) | CONCATENATE_DATA_AND_BASE: | target: EXTRACT_KEY_FROM_KEY | base: base-key@0x56080ae63080 (16-bytes, AES_KEY_GEN) | params: 16-bytes@0x7fff50900010 | result: message symkey-key@0x56080aee8840 (19-bytes, EXTRACT_KEY_FROM_KEY) | key-offset: 0, key-size: 3 | EXTRACT_KEY_FROM_KEY: | target: EXTRACT_KEY_FROM_KEY | key_size: 3-bytes | base: base-key@0x56080aee8840 (19-bytes, EXTRACT_KEY_FROM_KEY) | operation: FLAGS_ONLY | params: 8-bytes@0x7fff508ffff8 | result: message symkey-key@0x56080aee2f70 (3-bytes, EXTRACT_KEY_FROM_KEY) | message symkey: release tmp-key@0x56080aee8840 | PRF symkey interface PRF aes_xcbc update symkey message-key@0x56080aee2f70 (size 3) | PRF symkey interface: symkey message-key@0x56080aee2f70 (3-bytes, EXTRACT_KEY_FROM_KEY) | symkey message extracting all 3 bytes of key@0x56080aee2f70 | symkey message: symkey-key@0x56080aee2f70 (3-bytes, EXTRACT_KEY_FROM_KEY) | : ephemeral-key@0x56080ae63080 (16-bytes, AES_KEY_GEN) | symkey message: new slot-key@0x56080aee6cc0 (3-bytes, EXTRACT_KEY_FROM_KEY) | sizeof bytes 16 | wrapper: (SECItemType)1351613424: 01 2c ffffff8e 4e ffffffd7 79 47 75 ffffff87 37 ffffffad 7d 03 68 57 ffffffa5 | symkey message: release slot-key-key@0x56080aee6cc0 | symkey message extracted len 16 bytes at 0x56080aee6fe0 | unwrapped: 00 01 02 00 00 00 00 00 00 00 00 00 00 00 00 00 | XCBC: data 00 01 02 | K extracting all 16 bytes of key@0x56080aee47f0 | K: symkey-key@0x56080aee47f0 (16-bytes, AES_ECB) | : ephemeral-key@0x56080ae63080 (16-bytes, AES_KEY_GEN) | K: new slot-key@0x56080aee6cc0 (16-bytes, AES_ECB) | sizeof bytes 16 | wrapper: (SECItemType)1920429685: ffffffa2 ffffffb2 fffffff8 fffffffd ffffffdf ffffffd3 ffffff96 11 31 ffffffb6 68 ffffffec ffffffbb ffffffca ffffffdb 14 | K: release slot-key-key@0x56080aee6cc0 | K extracted len 16 bytes at 0x56080aee64c0 | unwrapped: 00 01 02 03 04 05 06 07 08 09 0a 0b 0c 0d 0e 0f | XCBC: K: 00 01 02 03 04 05 06 07 08 09 0a 0b 0c 0d 0e 0f | XCBC: K1 c3 52 80 57 54 23 7f 31 1a c0 ff f4 e3 e0 3e 78 | : ephemeral-key@0x56080ae63080 (16-bytes, AES_KEY_GEN) | CONCATENATE_DATA_AND_BASE: | target: EXTRACT_KEY_FROM_KEY | base: base-key@0x56080ae63080 (16-bytes, AES_KEY_GEN) | params: 16-bytes@0x7fff508fff20 | result: k1-key@0x56080aeea0c0 (32-bytes, EXTRACT_KEY_FROM_KEY) | key-offset: 0, key-size: 16 | EXTRACT_KEY_FROM_KEY: | target: AES_ECB | flags: SIGN | key_size: 16-bytes | base: base-key@0x56080aeea0c0 (32-bytes, EXTRACT_KEY_FROM_KEY) | operation: FLAGS_ONLY | params: 8-bytes@0x7fff508fff08 | result: k1-key@0x56080aee8840 (16-bytes, AES_ECB) | k1: release tmp-key@0x56080aeea0c0 | Computing E[1] using K3 | XCBC: K3 c1 a7 ab a1 a2 3a 94 06 58 07 a0 8c c8 ee d0 6e | XCBC: E[n-1] 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 | XCBC: M[n] 00 01 02 | XCBC: M[n] 00 01 02 | XCBC: M[n]:80...^E[n-1]^K3 | c1 a6 a9 21 a2 3a 94 06 58 07 a0 8c c8 ee d0 6e | XCBC: MAC 5b 37 65 80 ae 2f 19 af e7 21 9c ee f1 72 75 6f | xcbc: release k1-key@0x56080aee8840 | : ephemeral-key@0x56080ae63080 (16-bytes, AES_KEY_GEN) | CONCATENATE_DATA_AND_BASE: | target: EXTRACT_KEY_FROM_KEY | base: base-key@0x56080ae63080 (16-bytes, AES_KEY_GEN) | params: 16-bytes@0x7fff508fffb0 | result: xcbc-key@0x56080aeea0c0 (32-bytes, EXTRACT_KEY_FROM_KEY) | key-offset: 0, key-size: 16 | EXTRACT_KEY_FROM_KEY: | target: EXTRACT_KEY_FROM_KEY | key_size: 16-bytes | base: base-key@0x56080aeea0c0 (32-bytes, EXTRACT_KEY_FROM_KEY) | operation: FLAGS_ONLY | params: 8-bytes@0x7fff508fff98 | result: xcbc-key@0x56080aee8840 (16-bytes, EXTRACT_KEY_FROM_KEY) | xcbc: release tmp-key@0x56080aeea0c0 | PRF symkey interface: release key-key@0x56080aee47f0 | PRF symkey interface PRF aes_xcbc final-key@0x56080aee8840 (size 16) | PRF symkey interface: key-key@0x56080aee8840 (16-bytes, EXTRACT_KEY_FROM_KEY) | output: symkey-key@0x56080aee8840 (16-bytes, EXTRACT_KEY_FROM_KEY) | RFC 3566 Test Case #2: AES-XCBC-MAC-96 with 3-byte input extracting all 16 bytes of key@0x56080aee8840 | RFC 3566 Test Case #2: AES-XCBC-MAC-96 with 3-byte input: symkey-key@0x56080aee8840 (16-bytes, EXTRACT_KEY_FROM_KEY) | : ephemeral-key@0x56080ae63080 (16-bytes, AES_KEY_GEN) | RFC 3566 Test Case #2: AES-XCBC-MAC-96 with 3-byte input: new slot-key@0x56080aee6cc0 (16-bytes, EXTRACT_KEY_FROM_KEY) | sizeof bytes 16 | wrapper: (SECItemType)160858585: ffffffcc 6f 0b 69 3b 6a 13 07 ffffffcd ffffff91 1b ffffffc9 31 0a 43 ffffff9b | RFC 3566 Test Case #2: AES-XCBC-MAC-96 with 3-byte input: release slot-key-key@0x56080aee6cc0 | RFC 3566 Test Case #2: AES-XCBC-MAC-96 with 3-byte input extracted len 16 bytes at 0x56080aee64c0 | unwrapped: 5b 37 65 80 ae 2f 19 af e7 21 9c ee f1 72 75 6f | verify_chunk_data: RFC 3566 Test Case #2: AES-XCBC-MAC-96 with 3-byte input: ok | test_prf_vector: RFC 3566 Test Case #2: AES-XCBC-MAC-96 with 3-byte input passed | test_prf_vector: release symkey-key@0x56080aee8840 | test_prf_vector: release message-key@0x56080aee2f70 | test_prf_vector: release key-key@0x56080aee6f50 | test_prf_vector: release output-key@NULL RFC 3566 Test Case #3: AES-XCBC-MAC-96 with 16-byte input | decode_to_chunk: test_prf_vector: input "0x000102030405060708090a0b0c0d0e0f" | decode_to_chunk: output: | 00 01 02 03 04 05 06 07 08 09 0a 0b 0c 0d 0e 0f | decode_to_chunk: test_prf_vector: input "0x000102030405060708090a0b0c0d0e0f" | decode_to_chunk: output: | 00 01 02 03 04 05 06 07 08 09 0a 0b 0c 0d 0e 0f | decode_to_chunk: test_prf_vector: input "0xd2a246fa349b68a79998a4394ff7a263" | decode_to_chunk: output: | d2 a2 46 fa 34 9b 68 a7 99 98 a4 39 4f f7 a2 63 | PRF chunk interface PRF aes_xcbc init key-chunk@0x56080aee6fe0 (length 16) | 00 01 02 03 04 05 06 07 08 09 0a 0b 0c 0d 0e 0f | : ephemeral-key@0x56080ae63080 (16-bytes, AES_KEY_GEN) | CONCATENATE_DATA_AND_BASE: | target: EXTRACT_KEY_FROM_KEY | base: base-key@0x56080ae63080 (16-bytes, AES_KEY_GEN) | params: 16-bytes@0x7fff508fffa0 | result: key-key@0x56080aee2f70 (32-bytes, EXTRACT_KEY_FROM_KEY) | key-offset: 0, key-size: 16 | EXTRACT_KEY_FROM_KEY: | target: EXTRACT_KEY_FROM_KEY | key_size: 16-bytes | base: base-key@0x56080aee2f70 (32-bytes, EXTRACT_KEY_FROM_KEY) | operation: FLAGS_ONLY | params: 8-bytes@0x7fff508fff88 | result: key-key@0x56080aee6f50 (16-bytes, EXTRACT_KEY_FROM_KEY) | key: release tmp-key@0x56080aee2f70 | XCBC: Key 16=16 just right | key-offset: 0, key-size: 16 | EXTRACT_KEY_FROM_KEY: | target: AES_ECB | flags: SIGN | key_size: 16-bytes | base: base-key@0x56080aee6f50 (16-bytes, EXTRACT_KEY_FROM_KEY) | operation: FLAGS_ONLY | params: 8-bytes@0x7fff508fff68 | result: key-key@0x56080aee2f70 (16-bytes, AES_ECB) | PRF chunk interface: release clone-key@0x56080aee6f50 | PRF chunk interface PRF aes_xcbc crypt-prf@0x56080aee6290 | PRF chunk interface PRF aes_xcbc update message-bytes@0x56080aee64c0 (length 16) | 00 01 02 03 04 05 06 07 08 09 0a 0b 0c 0d 0e 0f | XCBC: data 00 01 02 03 04 05 06 07 08 09 0a 0b 0c 0d 0e 0f | K extracting all 16 bytes of key@0x56080aee2f70 | K: symkey-key@0x56080aee2f70 (16-bytes, AES_ECB) | : ephemeral-key@0x56080ae63080 (16-bytes, AES_KEY_GEN) | K: new slot-key@0x56080aee6cc0 (16-bytes, AES_ECB) | sizeof bytes 16 | wrapper: (SECItemType)540618784: ffffffa2 ffffffb2 fffffff8 fffffffd ffffffdf ffffffd3 ffffff96 11 31 ffffffb6 68 ffffffec ffffffbb ffffffca ffffffdb 14 | K: release slot-key-key@0x56080aee6cc0 | K extracted len 16 bytes at 0x56080aee62b0 | unwrapped: 00 01 02 03 04 05 06 07 08 09 0a 0b 0c 0d 0e 0f | XCBC: K: 00 01 02 03 04 05 06 07 08 09 0a 0b 0c 0d 0e 0f | XCBC: K1 c3 52 80 57 54 23 7f 31 1a c0 ff f4 e3 e0 3e 78 | : ephemeral-key@0x56080ae63080 (16-bytes, AES_KEY_GEN) | CONCATENATE_DATA_AND_BASE: | target: EXTRACT_KEY_FROM_KEY | base: base-key@0x56080ae63080 (16-bytes, AES_KEY_GEN) | params: 16-bytes@0x7fff508fff00 | result: k1-key@0x56080aee8840 (32-bytes, EXTRACT_KEY_FROM_KEY) | key-offset: 0, key-size: 16 | EXTRACT_KEY_FROM_KEY: | target: AES_ECB | flags: SIGN | key_size: 16-bytes | base: base-key@0x56080aee8840 (32-bytes, EXTRACT_KEY_FROM_KEY) | operation: FLAGS_ONLY | params: 8-bytes@0x7fff508ffee8 | result: k1-key@0x56080aee6f50 (16-bytes, AES_ECB) | k1: release tmp-key@0x56080aee8840 | XCBC: Computing E[1] using K2 | XCBC: K2 bd 86 2f fb 97 ad 2f b8 f8 b8 91 f6 03 2f 36 cb | XCBC: E[n-1] 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 | XCBC: M[n] 00 01 02 03 04 05 06 07 08 09 0a 0b 0c 0d 0e 0f | XCBC: M[n]^E[n-1]^K2 | bd 87 2d f8 93 a8 29 bf f0 b1 9b fd 0f 22 38 c4 | XCBC: MAC d2 a2 46 fa 34 9b 68 a7 99 98 a4 39 4f f7 a2 63 | xcbc: release k1-key@0x56080aee6f50 | PRF chunk interface: release key-key@0x56080aee2f70 | PRF chunk interface PRF aes_xcbc final-chunk@0x56080aee6070 (length 16) | d2 a2 46 fa 34 9b 68 a7 99 98 a4 39 4f f7 a2 63 | chunk output d2 a2 46 fa 34 9b 68 a7 99 98 a4 39 4f f7 a2 63 | verify_chunk_data: RFC 3566 Test Case #3: AES-XCBC-MAC-96 with 16-byte input: ok | : ephemeral-key@0x56080ae63080 (16-bytes, AES_KEY_GEN) | CONCATENATE_DATA_AND_BASE: | target: EXTRACT_KEY_FROM_KEY | base: base-key@0x56080ae63080 (16-bytes, AES_KEY_GEN) | params: 16-bytes@0x7fff50900010 | result: key symkey-key@0x56080aee6f50 (32-bytes, EXTRACT_KEY_FROM_KEY) | key-offset: 0, key-size: 16 | EXTRACT_KEY_FROM_KEY: | target: EXTRACT_KEY_FROM_KEY | key_size: 16-bytes | base: base-key@0x56080aee6f50 (32-bytes, EXTRACT_KEY_FROM_KEY) | operation: FLAGS_ONLY | params: 8-bytes@0x7fff508ffff8 | result: key symkey-key@0x56080aee2f70 (16-bytes, EXTRACT_KEY_FROM_KEY) | key symkey: release tmp-key@0x56080aee6f50 | PRF symkey interface PRF aes_xcbc init key symkey-key@0x56080aee2f70 (size 16) | PRF symkey interface: key symkey-key@0x56080aee2f70 (16-bytes, EXTRACT_KEY_FROM_KEY) | XCBC: Key 16=16 just right | key-offset: 0, key-size: 16 | EXTRACT_KEY_FROM_KEY: | target: AES_ECB | flags: SIGN | key_size: 16-bytes | base: base-key@0x56080aee2f70 (16-bytes, EXTRACT_KEY_FROM_KEY) | operation: FLAGS_ONLY | params: 8-bytes@0x7fff508fff98 | result: key symkey-key@0x56080aee6f50 (16-bytes, AES_ECB) | PRF symkey interface PRF aes_xcbc crypt-prf@0x56080aee60b0 | : ephemeral-key@0x56080ae63080 (16-bytes, AES_KEY_GEN) | CONCATENATE_DATA_AND_BASE: | target: EXTRACT_KEY_FROM_KEY | base: base-key@0x56080ae63080 (16-bytes, AES_KEY_GEN) | params: 16-bytes@0x7fff50900010 | result: message symkey-key@0x56080aee47f0 (32-bytes, EXTRACT_KEY_FROM_KEY) | key-offset: 0, key-size: 16 | EXTRACT_KEY_FROM_KEY: | target: EXTRACT_KEY_FROM_KEY | key_size: 16-bytes | base: base-key@0x56080aee47f0 (32-bytes, EXTRACT_KEY_FROM_KEY) | operation: FLAGS_ONLY | params: 8-bytes@0x7fff508ffff8 | result: message symkey-key@0x56080aee8840 (16-bytes, EXTRACT_KEY_FROM_KEY) | message symkey: release tmp-key@0x56080aee47f0 | PRF symkey interface PRF aes_xcbc update symkey message-key@0x56080aee8840 (size 16) | PRF symkey interface: symkey message-key@0x56080aee8840 (16-bytes, EXTRACT_KEY_FROM_KEY) | symkey message extracting all 16 bytes of key@0x56080aee8840 | symkey message: symkey-key@0x56080aee8840 (16-bytes, EXTRACT_KEY_FROM_KEY) | : ephemeral-key@0x56080ae63080 (16-bytes, AES_KEY_GEN) | symkey message: new slot-key@0x56080aee6cc0 (16-bytes, EXTRACT_KEY_FROM_KEY) | sizeof bytes 16 | wrapper: (SECItemType)1351613424: ffffffa2 ffffffb2 fffffff8 fffffffd ffffffdf ffffffd3 ffffff96 11 31 ffffffb6 68 ffffffec ffffffbb ffffffca ffffffdb 14 | symkey message: release slot-key-key@0x56080aee6cc0 | symkey message extracted len 16 bytes at 0x56080aee6090 | unwrapped: 00 01 02 03 04 05 06 07 08 09 0a 0b 0c 0d 0e 0f | XCBC: data 00 01 02 03 04 05 06 07 08 09 0a 0b 0c 0d 0e 0f | K extracting all 16 bytes of key@0x56080aee6f50 | K: symkey-key@0x56080aee6f50 (16-bytes, AES_ECB) | : ephemeral-key@0x56080ae63080 (16-bytes, AES_KEY_GEN) | K: new slot-key@0x56080aee6cc0 (16-bytes, AES_ECB) | sizeof bytes 16 | wrapper: (SECItemType)1920429685: ffffffa2 ffffffb2 fffffff8 fffffffd ffffffdf ffffffd3 ffffff96 11 31 ffffffb6 68 ffffffec ffffffbb ffffffca ffffffdb 14 | K: release slot-key-key@0x56080aee6cc0 | K extracted len 16 bytes at 0x56080aee6d50 | unwrapped: 00 01 02 03 04 05 06 07 08 09 0a 0b 0c 0d 0e 0f | XCBC: K: 00 01 02 03 04 05 06 07 08 09 0a 0b 0c 0d 0e 0f | XCBC: K1 c3 52 80 57 54 23 7f 31 1a c0 ff f4 e3 e0 3e 78 | : ephemeral-key@0x56080ae63080 (16-bytes, AES_KEY_GEN) | CONCATENATE_DATA_AND_BASE: | target: EXTRACT_KEY_FROM_KEY | base: base-key@0x56080ae63080 (16-bytes, AES_KEY_GEN) | params: 16-bytes@0x7fff508fff20 | result: k1-key@0x56080aeea0c0 (32-bytes, EXTRACT_KEY_FROM_KEY) | key-offset: 0, key-size: 16 | EXTRACT_KEY_FROM_KEY: | target: AES_ECB | flags: SIGN | key_size: 16-bytes | base: base-key@0x56080aeea0c0 (32-bytes, EXTRACT_KEY_FROM_KEY) | operation: FLAGS_ONLY | params: 8-bytes@0x7fff508fff08 | result: k1-key@0x56080aee47f0 (16-bytes, AES_ECB) | k1: release tmp-key@0x56080aeea0c0 | XCBC: Computing E[1] using K2 | XCBC: K2 bd 86 2f fb 97 ad 2f b8 f8 b8 91 f6 03 2f 36 cb | XCBC: E[n-1] 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 | XCBC: M[n] 00 01 02 03 04 05 06 07 08 09 0a 0b 0c 0d 0e 0f | XCBC: M[n]^E[n-1]^K2 | bd 87 2d f8 93 a8 29 bf f0 b1 9b fd 0f 22 38 c4 | XCBC: MAC d2 a2 46 fa 34 9b 68 a7 99 98 a4 39 4f f7 a2 63 | xcbc: release k1-key@0x56080aee47f0 | : ephemeral-key@0x56080ae63080 (16-bytes, AES_KEY_GEN) | CONCATENATE_DATA_AND_BASE: | target: EXTRACT_KEY_FROM_KEY | base: base-key@0x56080ae63080 (16-bytes, AES_KEY_GEN) | params: 16-bytes@0x7fff508fffb0 | result: xcbc-key@0x56080aeea0c0 (32-bytes, EXTRACT_KEY_FROM_KEY) | key-offset: 0, key-size: 16 | EXTRACT_KEY_FROM_KEY: | target: EXTRACT_KEY_FROM_KEY | key_size: 16-bytes | base: base-key@0x56080aeea0c0 (32-bytes, EXTRACT_KEY_FROM_KEY) | operation: FLAGS_ONLY | params: 8-bytes@0x7fff508fff98 | result: xcbc-key@0x56080aee47f0 (16-bytes, EXTRACT_KEY_FROM_KEY) | xcbc: release tmp-key@0x56080aeea0c0 | PRF symkey interface: release key-key@0x56080aee6f50 | PRF symkey interface PRF aes_xcbc final-key@0x56080aee47f0 (size 16) | PRF symkey interface: key-key@0x56080aee47f0 (16-bytes, EXTRACT_KEY_FROM_KEY) | output: symkey-key@0x56080aee47f0 (16-bytes, EXTRACT_KEY_FROM_KEY) | RFC 3566 Test Case #3: AES-XCBC-MAC-96 with 16-byte input extracting all 16 bytes of key@0x56080aee47f0 | RFC 3566 Test Case #3: AES-XCBC-MAC-96 with 16-byte input: symkey-key@0x56080aee47f0 (16-bytes, EXTRACT_KEY_FROM_KEY) | : ephemeral-key@0x56080ae63080 (16-bytes, AES_KEY_GEN) | RFC 3566 Test Case #3: AES-XCBC-MAC-96 with 16-byte input: new slot-key@0x56080aee6cc0 (16-bytes, EXTRACT_KEY_FROM_KEY) | sizeof bytes 16 | wrapper: (SECItemType)160858585: 57 25 71 ffffff9d fffffff6 ffffff97 ffffffab 33 ffffffa3 56 38 74 ffffff9c ffffff8c 18 30 | RFC 3566 Test Case #3: AES-XCBC-MAC-96 with 16-byte input: release slot-key-key@0x56080aee6cc0 | RFC 3566 Test Case #3: AES-XCBC-MAC-96 with 16-byte input extracted len 16 bytes at 0x56080aee6d50 | unwrapped: d2 a2 46 fa 34 9b 68 a7 99 98 a4 39 4f f7 a2 63 | verify_chunk_data: RFC 3566 Test Case #3: AES-XCBC-MAC-96 with 16-byte input: ok | test_prf_vector: RFC 3566 Test Case #3: AES-XCBC-MAC-96 with 16-byte input passed | test_prf_vector: release symkey-key@0x56080aee47f0 | test_prf_vector: release message-key@0x56080aee8840 | test_prf_vector: release key-key@0x56080aee2f70 | test_prf_vector: release output-key@NULL RFC 3566 Test Case #4: AES-XCBC-MAC-96 with 20-byte input | decode_to_chunk: test_prf_vector: input "0x000102030405060708090a0b0c0d0e0f" | decode_to_chunk: output: | 00 01 02 03 04 05 06 07 08 09 0a 0b 0c 0d 0e 0f | decode_to_chunk: test_prf_vector: input "0x000102030405060708090a0b0c0d0e0f10111213" | decode_to_chunk: output: | 00 01 02 03 04 05 06 07 08 09 0a 0b 0c 0d 0e 0f | 10 11 12 13 | decode_to_chunk: test_prf_vector: input "0x47f51b4564966215b8985c63055ed308" | decode_to_chunk: output: | 47 f5 1b 45 64 96 62 15 b8 98 5c 63 05 5e d3 08 | PRF chunk interface PRF aes_xcbc init key-chunk@0x56080aee6090 (length 16) | 00 01 02 03 04 05 06 07 08 09 0a 0b 0c 0d 0e 0f | : ephemeral-key@0x56080ae63080 (16-bytes, AES_KEY_GEN) | CONCATENATE_DATA_AND_BASE: | target: EXTRACT_KEY_FROM_KEY | base: base-key@0x56080ae63080 (16-bytes, AES_KEY_GEN) | params: 16-bytes@0x7fff508fffa0 | result: key-key@0x56080aee8840 (32-bytes, EXTRACT_KEY_FROM_KEY) | key-offset: 0, key-size: 16 | EXTRACT_KEY_FROM_KEY: | target: EXTRACT_KEY_FROM_KEY | key_size: 16-bytes | base: base-key@0x56080aee8840 (32-bytes, EXTRACT_KEY_FROM_KEY) | operation: FLAGS_ONLY | params: 8-bytes@0x7fff508fff88 | result: key-key@0x56080aee2f70 (16-bytes, EXTRACT_KEY_FROM_KEY) | key: release tmp-key@0x56080aee8840 | XCBC: Key 16=16 just right | key-offset: 0, key-size: 16 | EXTRACT_KEY_FROM_KEY: | target: AES_ECB | flags: SIGN | key_size: 16-bytes | base: base-key@0x56080aee2f70 (16-bytes, EXTRACT_KEY_FROM_KEY) | operation: FLAGS_ONLY | params: 8-bytes@0x7fff508fff68 | result: key-key@0x56080aee8840 (16-bytes, AES_ECB) | PRF chunk interface: release clone-key@0x56080aee2f70 | PRF chunk interface PRF aes_xcbc crypt-prf@0x56080aee62b0 | PRF chunk interface PRF aes_xcbc update message-bytes@0x56080aee6d50 (length 20) | 00 01 02 03 04 05 06 07 08 09 0a 0b 0c 0d 0e 0f | 10 11 12 13 | XCBC: data 00 01 02 03 04 05 06 07 08 09 0a 0b 0c 0d 0e 0f | XCBC: data 10 11 12 13 | K extracting all 16 bytes of key@0x56080aee8840 | K: symkey-key@0x56080aee8840 (16-bytes, AES_ECB) | : ephemeral-key@0x56080ae63080 (16-bytes, AES_KEY_GEN) | K: new slot-key@0x56080aee6cc0 (16-bytes, AES_ECB) | sizeof bytes 16 | wrapper: (SECItemType)540618784: ffffffa2 ffffffb2 fffffff8 fffffffd ffffffdf ffffffd3 ffffff96 11 31 ffffffb6 68 ffffffec ffffffbb ffffffca ffffffdb 14 | K: release slot-key-key@0x56080aee6cc0 | K extracted len 16 bytes at 0x56080aee64c0 | unwrapped: 00 01 02 03 04 05 06 07 08 09 0a 0b 0c 0d 0e 0f | XCBC: K: 00 01 02 03 04 05 06 07 08 09 0a 0b 0c 0d 0e 0f | XCBC: K1 c3 52 80 57 54 23 7f 31 1a c0 ff f4 e3 e0 3e 78 | : ephemeral-key@0x56080ae63080 (16-bytes, AES_KEY_GEN) | CONCATENATE_DATA_AND_BASE: | target: EXTRACT_KEY_FROM_KEY | base: base-key@0x56080ae63080 (16-bytes, AES_KEY_GEN) | params: 16-bytes@0x7fff508fff00 | result: k1-key@0x56080aee47f0 (32-bytes, EXTRACT_KEY_FROM_KEY) | key-offset: 0, key-size: 16 | EXTRACT_KEY_FROM_KEY: | target: AES_ECB | flags: SIGN | key_size: 16-bytes | base: base-key@0x56080aee47f0 (32-bytes, EXTRACT_KEY_FROM_KEY) | operation: FLAGS_ONLY | params: 8-bytes@0x7fff508ffee8 | result: k1-key@0x56080aee2f70 (16-bytes, AES_ECB) | k1: release tmp-key@0x56080aee47f0 | Computing E[2] using K3 | XCBC: K3 c1 a7 ab a1 a2 3a 94 06 58 07 a0 8c c8 ee d0 6e | XCBC: E[n-1] 1d 04 48 fa cf 4d 9c 6f 55 b9 93 da 09 80 3d b3 | XCBC: M[n] 10 11 12 13 | XCBC: M[n] 10 11 12 13 | XCBC: M[n]:80...^E[n-1]^K3 | cc b2 f1 48 ed 77 08 69 0d be 33 56 c1 6e ed dd | XCBC: MAC 47 f5 1b 45 64 96 62 15 b8 98 5c 63 05 5e d3 08 | xcbc: release k1-key@0x56080aee2f70 | PRF chunk interface: release key-key@0x56080aee8840 | PRF chunk interface PRF aes_xcbc final-chunk@0x56080aee6360 (length 16) | 47 f5 1b 45 64 96 62 15 b8 98 5c 63 05 5e d3 08 | chunk output 47 f5 1b 45 64 96 62 15 b8 98 5c 63 05 5e d3 08 | verify_chunk_data: RFC 3566 Test Case #4: AES-XCBC-MAC-96 with 20-byte input: ok | : ephemeral-key@0x56080ae63080 (16-bytes, AES_KEY_GEN) | CONCATENATE_DATA_AND_BASE: | target: EXTRACT_KEY_FROM_KEY | base: base-key@0x56080ae63080 (16-bytes, AES_KEY_GEN) | params: 16-bytes@0x7fff50900010 | result: key symkey-key@0x56080aee2f70 (32-bytes, EXTRACT_KEY_FROM_KEY) | key-offset: 0, key-size: 16 | EXTRACT_KEY_FROM_KEY: | target: EXTRACT_KEY_FROM_KEY | key_size: 16-bytes | base: base-key@0x56080aee2f70 (32-bytes, EXTRACT_KEY_FROM_KEY) | operation: FLAGS_ONLY | params: 8-bytes@0x7fff508ffff8 | result: key symkey-key@0x56080aee8840 (16-bytes, EXTRACT_KEY_FROM_KEY) | key symkey: release tmp-key@0x56080aee2f70 | PRF symkey interface PRF aes_xcbc init key symkey-key@0x56080aee8840 (size 16) | PRF symkey interface: key symkey-key@0x56080aee8840 (16-bytes, EXTRACT_KEY_FROM_KEY) | XCBC: Key 16=16 just right | key-offset: 0, key-size: 16 | EXTRACT_KEY_FROM_KEY: | target: AES_ECB | flags: SIGN | key_size: 16-bytes | base: base-key@0x56080aee8840 (16-bytes, EXTRACT_KEY_FROM_KEY) | operation: FLAGS_ONLY | params: 8-bytes@0x7fff508fff98 | result: key symkey-key@0x56080aee2f70 (16-bytes, AES_ECB) | PRF symkey interface PRF aes_xcbc crypt-prf@0x56080aee6290 | : ephemeral-key@0x56080ae63080 (16-bytes, AES_KEY_GEN) | CONCATENATE_DATA_AND_BASE: | target: EXTRACT_KEY_FROM_KEY | base: base-key@0x56080ae63080 (16-bytes, AES_KEY_GEN) | params: 16-bytes@0x7fff50900010 | result: message symkey-key@0x56080aee6f50 (36-bytes, EXTRACT_KEY_FROM_KEY) | key-offset: 0, key-size: 20 | EXTRACT_KEY_FROM_KEY: | target: EXTRACT_KEY_FROM_KEY | key_size: 20-bytes | base: base-key@0x56080aee6f50 (36-bytes, EXTRACT_KEY_FROM_KEY) | operation: FLAGS_ONLY | params: 8-bytes@0x7fff508ffff8 | result: message symkey-key@0x56080aee47f0 (20-bytes, EXTRACT_KEY_FROM_KEY) | message symkey: release tmp-key@0x56080aee6f50 | PRF symkey interface PRF aes_xcbc update symkey message-key@0x56080aee47f0 (size 20) | PRF symkey interface: symkey message-key@0x56080aee47f0 (20-bytes, EXTRACT_KEY_FROM_KEY) | symkey message extracting all 20 bytes of key@0x56080aee47f0 | symkey message: symkey-key@0x56080aee47f0 (20-bytes, EXTRACT_KEY_FROM_KEY) | : ephemeral-key@0x56080ae63080 (16-bytes, AES_KEY_GEN) | symkey message: new slot-key@0x56080aee6cc0 (20-bytes, EXTRACT_KEY_FROM_KEY) | sizeof bytes 32 | wrapper: (SECItemType)1351613424: ffffffa2 ffffffb2 fffffff8 fffffffd ffffffdf ffffffd3 ffffff96 11 31 ffffffb6 68 ffffffec ffffffbb ffffffca ffffffdb 14 6c ffffffe5 ffffffa2 20 fffffffa fffffff4 ffffffeb 59 ffffffe4 18 ffffffa9 23 ffffffdd 20 1c 0e | symkey message: release slot-key-key@0x56080aee6cc0 | symkey message extracted len 32 bytes at 0x56080aee6920 | unwrapped: 00 01 02 03 04 05 06 07 08 09 0a 0b 0c 0d 0e 0f | unwrapped: 10 11 12 13 00 00 00 00 00 00 00 00 00 00 00 00 | XCBC: data 00 01 02 03 04 05 06 07 08 09 0a 0b 0c 0d 0e 0f | XCBC: data 10 11 12 13 | K extracting all 16 bytes of key@0x56080aee2f70 | K: symkey-key@0x56080aee2f70 (16-bytes, AES_ECB) | : ephemeral-key@0x56080ae63080 (16-bytes, AES_KEY_GEN) | K: new slot-key@0x56080aee6cc0 (16-bytes, AES_ECB) | sizeof bytes 16 | wrapper: (SECItemType)1920429685: ffffffa2 ffffffb2 fffffff8 fffffffd ffffffdf ffffffd3 ffffff96 11 31 ffffffb6 68 ffffffec ffffffbb ffffffca ffffffdb 14 | K: release slot-key-key@0x56080aee6cc0 | K extracted len 16 bytes at 0x56080aee1740 | unwrapped: 00 01 02 03 04 05 06 07 08 09 0a 0b 0c 0d 0e 0f | XCBC: K: 00 01 02 03 04 05 06 07 08 09 0a 0b 0c 0d 0e 0f | XCBC: K1 c3 52 80 57 54 23 7f 31 1a c0 ff f4 e3 e0 3e 78 | : ephemeral-key@0x56080ae63080 (16-bytes, AES_KEY_GEN) | CONCATENATE_DATA_AND_BASE: | target: EXTRACT_KEY_FROM_KEY | base: base-key@0x56080ae63080 (16-bytes, AES_KEY_GEN) | params: 16-bytes@0x7fff508fff20 | result: k1-key@0x56080aeea0c0 (32-bytes, EXTRACT_KEY_FROM_KEY) | key-offset: 0, key-size: 16 | EXTRACT_KEY_FROM_KEY: | target: AES_ECB | flags: SIGN | key_size: 16-bytes | base: base-key@0x56080aeea0c0 (32-bytes, EXTRACT_KEY_FROM_KEY) | operation: FLAGS_ONLY | params: 8-bytes@0x7fff508fff08 | result: k1-key@0x56080aee6f50 (16-bytes, AES_ECB) | k1: release tmp-key@0x56080aeea0c0 | Computing E[2] using K3 | XCBC: K3 c1 a7 ab a1 a2 3a 94 06 58 07 a0 8c c8 ee d0 6e | XCBC: E[n-1] 1d 04 48 fa cf 4d 9c 6f 55 b9 93 da 09 80 3d b3 | XCBC: M[n] 10 11 12 13 | XCBC: M[n] 10 11 12 13 | XCBC: M[n]:80...^E[n-1]^K3 | cc b2 f1 48 ed 77 08 69 0d be 33 56 c1 6e ed dd | XCBC: MAC 47 f5 1b 45 64 96 62 15 b8 98 5c 63 05 5e d3 08 | xcbc: release k1-key@0x56080aee6f50 | : ephemeral-key@0x56080ae63080 (16-bytes, AES_KEY_GEN) | CONCATENATE_DATA_AND_BASE: | target: EXTRACT_KEY_FROM_KEY | base: base-key@0x56080ae63080 (16-bytes, AES_KEY_GEN) | params: 16-bytes@0x7fff508fffb0 | result: xcbc-key@0x56080aeea0c0 (32-bytes, EXTRACT_KEY_FROM_KEY) | key-offset: 0, key-size: 16 | EXTRACT_KEY_FROM_KEY: | target: EXTRACT_KEY_FROM_KEY | key_size: 16-bytes | base: base-key@0x56080aeea0c0 (32-bytes, EXTRACT_KEY_FROM_KEY) | operation: FLAGS_ONLY | params: 8-bytes@0x7fff508fff98 | result: xcbc-key@0x56080aee6f50 (16-bytes, EXTRACT_KEY_FROM_KEY) | xcbc: release tmp-key@0x56080aeea0c0 | PRF symkey interface: release key-key@0x56080aee2f70 | PRF symkey interface PRF aes_xcbc final-key@0x56080aee6f50 (size 16) | PRF symkey interface: key-key@0x56080aee6f50 (16-bytes, EXTRACT_KEY_FROM_KEY) | output: symkey-key@0x56080aee6f50 (16-bytes, EXTRACT_KEY_FROM_KEY) | RFC 3566 Test Case #4: AES-XCBC-MAC-96 with 20-byte input extracting all 16 bytes of key@0x56080aee6f50 | RFC 3566 Test Case #4: AES-XCBC-MAC-96 with 20-byte input: symkey-key@0x56080aee6f50 (16-bytes, EXTRACT_KEY_FROM_KEY) | : ephemeral-key@0x56080ae63080 (16-bytes, AES_KEY_GEN) | RFC 3566 Test Case #4: AES-XCBC-MAC-96 with 20-byte input: new slot-key@0x56080aee6cc0 (16-bytes, EXTRACT_KEY_FROM_KEY) | sizeof bytes 16 | wrapper: (SECItemType)160858585: 7e 7a 1d 27 ffffff80 ffffff8d 31 ffffff87 ffffffde ffffffa8 70 15 37 3f 3a ffffffde | RFC 3566 Test Case #4: AES-XCBC-MAC-96 with 20-byte input: release slot-key-key@0x56080aee6cc0 | RFC 3566 Test Case #4: AES-XCBC-MAC-96 with 20-byte input extracted len 16 bytes at 0x56080aee1740 | unwrapped: 47 f5 1b 45 64 96 62 15 b8 98 5c 63 05 5e d3 08 | verify_chunk_data: RFC 3566 Test Case #4: AES-XCBC-MAC-96 with 20-byte input: ok | test_prf_vector: RFC 3566 Test Case #4: AES-XCBC-MAC-96 with 20-byte input passed | test_prf_vector: release symkey-key@0x56080aee6f50 | test_prf_vector: release message-key@0x56080aee47f0 | test_prf_vector: release key-key@0x56080aee8840 | test_prf_vector: release output-key@NULL RFC 3566 Test Case #5: AES-XCBC-MAC-96 with 32-byte input | decode_to_chunk: test_prf_vector: input "0x000102030405060708090a0b0c0d0e0f" | decode_to_chunk: output: | 00 01 02 03 04 05 06 07 08 09 0a 0b 0c 0d 0e 0f | decode_to_chunk: test_prf_vector: input "0x000102030405060708090a0b0c0d0e0f101112131415161718191a1b1c1d1e1f" | decode_to_chunk: output: | 00 01 02 03 04 05 06 07 08 09 0a 0b 0c 0d 0e 0f | 10 11 12 13 14 15 16 17 18 19 1a 1b 1c 1d 1e 1f | decode_to_chunk: test_prf_vector: input "0xf54f0ec8d2b9f3d36807734bd5283fd4" | decode_to_chunk: output: | f5 4f 0e c8 d2 b9 f3 d3 68 07 73 4b d5 28 3f d4 | PRF chunk interface PRF aes_xcbc init key-chunk@0x56080aee64c0 (length 16) | 00 01 02 03 04 05 06 07 08 09 0a 0b 0c 0d 0e 0f | : ephemeral-key@0x56080ae63080 (16-bytes, AES_KEY_GEN) | CONCATENATE_DATA_AND_BASE: | target: EXTRACT_KEY_FROM_KEY | base: base-key@0x56080ae63080 (16-bytes, AES_KEY_GEN) | params: 16-bytes@0x7fff508fffa0 | result: key-key@0x56080aee47f0 (32-bytes, EXTRACT_KEY_FROM_KEY) | key-offset: 0, key-size: 16 | EXTRACT_KEY_FROM_KEY: | target: EXTRACT_KEY_FROM_KEY | key_size: 16-bytes | base: base-key@0x56080aee47f0 (32-bytes, EXTRACT_KEY_FROM_KEY) | operation: FLAGS_ONLY | params: 8-bytes@0x7fff508fff88 | result: key-key@0x56080aee8840 (16-bytes, EXTRACT_KEY_FROM_KEY) | key: release tmp-key@0x56080aee47f0 | XCBC: Key 16=16 just right | key-offset: 0, key-size: 16 | EXTRACT_KEY_FROM_KEY: | target: AES_ECB | flags: SIGN | key_size: 16-bytes | base: base-key@0x56080aee8840 (16-bytes, EXTRACT_KEY_FROM_KEY) | operation: FLAGS_ONLY | params: 8-bytes@0x7fff508fff68 | result: key-key@0x56080aee47f0 (16-bytes, AES_ECB) | PRF chunk interface: release clone-key@0x56080aee8840 | PRF chunk interface PRF aes_xcbc crypt-prf@0x56080aee1900 | PRF chunk interface PRF aes_xcbc update message-bytes@0x56080aee19d0 (length 32) | 00 01 02 03 04 05 06 07 08 09 0a 0b 0c 0d 0e 0f | 10 11 12 13 14 15 16 17 18 19 1a 1b 1c 1d 1e 1f | XCBC: data 00 01 02 03 04 05 06 07 08 09 0a 0b 0c 0d 0e 0f | XCBC: data 10 11 12 13 14 15 16 17 18 19 1a 1b 1c 1d 1e 1f | K extracting all 16 bytes of key@0x56080aee47f0 | K: symkey-key@0x56080aee47f0 (16-bytes, AES_ECB) | : ephemeral-key@0x56080ae63080 (16-bytes, AES_KEY_GEN) | K: new slot-key@0x56080aee6cc0 (16-bytes, AES_ECB) | sizeof bytes 16 | wrapper: (SECItemType)540619040: ffffffa2 ffffffb2 fffffff8 fffffffd ffffffdf ffffffd3 ffffff96 11 31 ffffffb6 68 ffffffec ffffffbb ffffffca ffffffdb 14 | K: release slot-key-key@0x56080aee6cc0 | K extracted len 16 bytes at 0x56080aee1830 | unwrapped: 00 01 02 03 04 05 06 07 08 09 0a 0b 0c 0d 0e 0f | XCBC: K: 00 01 02 03 04 05 06 07 08 09 0a 0b 0c 0d 0e 0f | XCBC: K1 c3 52 80 57 54 23 7f 31 1a c0 ff f4 e3 e0 3e 78 | : ephemeral-key@0x56080ae63080 (16-bytes, AES_KEY_GEN) | CONCATENATE_DATA_AND_BASE: | target: EXTRACT_KEY_FROM_KEY | base: base-key@0x56080ae63080 (16-bytes, AES_KEY_GEN) | params: 16-bytes@0x7fff508fff00 | result: k1-key@0x56080aee6f50 (32-bytes, EXTRACT_KEY_FROM_KEY) | key-offset: 0, key-size: 16 | EXTRACT_KEY_FROM_KEY: | target: AES_ECB | flags: SIGN | key_size: 16-bytes | base: base-key@0x56080aee6f50 (32-bytes, EXTRACT_KEY_FROM_KEY) | operation: FLAGS_ONLY | params: 8-bytes@0x7fff508ffee8 | result: k1-key@0x56080aee8840 (16-bytes, AES_ECB) | k1: release tmp-key@0x56080aee6f50 | XCBC: Computing E[2] using K2 | XCBC: K2 bd 86 2f fb 97 ad 2f b8 f8 b8 91 f6 03 2f 36 cb | XCBC: E[n-1] 1d 04 48 fa cf 4d 9c 6f 55 b9 93 da 09 80 3d b3 | XCBC: M[n] 10 11 12 13 14 15 16 17 18 19 1a 1b 1c 1d 1e 1f | XCBC: M[n]^E[n-1]^K2 | b0 93 75 12 4c f5 a5 c0 b5 18 18 37 16 b2 15 67 | XCBC: MAC f5 4f 0e c8 d2 b9 f3 d3 68 07 73 4b d5 28 3f d4 | xcbc: release k1-key@0x56080aee8840 | PRF chunk interface: release key-key@0x56080aee47f0 | PRF chunk interface PRF aes_xcbc final-chunk@0x56080aee6fe0 (length 16) | f5 4f 0e c8 d2 b9 f3 d3 68 07 73 4b d5 28 3f d4 | chunk output f5 4f 0e c8 d2 b9 f3 d3 68 07 73 4b d5 28 3f d4 | verify_chunk_data: RFC 3566 Test Case #5: AES-XCBC-MAC-96 with 32-byte input: ok | : ephemeral-key@0x56080ae63080 (16-bytes, AES_KEY_GEN) | CONCATENATE_DATA_AND_BASE: | target: EXTRACT_KEY_FROM_KEY | base: base-key@0x56080ae63080 (16-bytes, AES_KEY_GEN) | params: 16-bytes@0x7fff50900010 | result: key symkey-key@0x56080aee8840 (32-bytes, EXTRACT_KEY_FROM_KEY) | key-offset: 0, key-size: 16 | EXTRACT_KEY_FROM_KEY: | target: EXTRACT_KEY_FROM_KEY | key_size: 16-bytes | base: base-key@0x56080aee8840 (32-bytes, EXTRACT_KEY_FROM_KEY) | operation: FLAGS_ONLY | params: 8-bytes@0x7fff508ffff8 | result: key symkey-key@0x56080aee47f0 (16-bytes, EXTRACT_KEY_FROM_KEY) | key symkey: release tmp-key@0x56080aee8840 | PRF symkey interface PRF aes_xcbc init key symkey-key@0x56080aee47f0 (size 16) | PRF symkey interface: key symkey-key@0x56080aee47f0 (16-bytes, EXTRACT_KEY_FROM_KEY) | XCBC: Key 16=16 just right | key-offset: 0, key-size: 16 | EXTRACT_KEY_FROM_KEY: | target: AES_ECB | flags: SIGN | key_size: 16-bytes | base: base-key@0x56080aee47f0 (16-bytes, EXTRACT_KEY_FROM_KEY) | operation: FLAGS_ONLY | params: 8-bytes@0x7fff508fff98 | result: key symkey-key@0x56080aee8840 (16-bytes, AES_ECB) | PRF symkey interface PRF aes_xcbc crypt-prf@0x56080aee60b0 | : ephemeral-key@0x56080ae63080 (16-bytes, AES_KEY_GEN) | CONCATENATE_DATA_AND_BASE: | target: EXTRACT_KEY_FROM_KEY | base: base-key@0x56080ae63080 (16-bytes, AES_KEY_GEN) | params: 16-bytes@0x7fff50900010 | result: message symkey-key@0x56080aee2f70 (48-bytes, EXTRACT_KEY_FROM_KEY) | key-offset: 0, key-size: 32 | EXTRACT_KEY_FROM_KEY: | target: EXTRACT_KEY_FROM_KEY | key_size: 32-bytes | base: base-key@0x56080aee2f70 (48-bytes, EXTRACT_KEY_FROM_KEY) | operation: FLAGS_ONLY | params: 8-bytes@0x7fff508ffff8 | result: message symkey-key@0x56080aee6f50 (32-bytes, EXTRACT_KEY_FROM_KEY) | message symkey: release tmp-key@0x56080aee2f70 | PRF symkey interface PRF aes_xcbc update symkey message-key@0x56080aee6f50 (size 32) | PRF symkey interface: symkey message-key@0x56080aee6f50 (32-bytes, EXTRACT_KEY_FROM_KEY) | symkey message extracting all 32 bytes of key@0x56080aee6f50 | symkey message: symkey-key@0x56080aee6f50 (32-bytes, EXTRACT_KEY_FROM_KEY) | : ephemeral-key@0x56080ae63080 (16-bytes, AES_KEY_GEN) | symkey message: new slot-key@0x56080aee6cc0 (32-bytes, EXTRACT_KEY_FROM_KEY) | sizeof bytes 32 | wrapper: (SECItemType)1351613424: ffffffa2 ffffffb2 fffffff8 fffffffd ffffffdf ffffffd3 ffffff96 11 31 ffffffb6 68 ffffffec ffffffbb ffffffca ffffffdb 14 ffffffd3 65 5d 28 ffffffa4 ffffff89 ffffffd7 40 ffffff80 68 ffffffa6 ffffffe4 1f 01 ffffffa6 08 | symkey message: release slot-key-key@0x56080aee6cc0 | symkey message extracted len 32 bytes at 0x56080aee6d70 | unwrapped: 00 01 02 03 04 05 06 07 08 09 0a 0b 0c 0d 0e 0f | unwrapped: 10 11 12 13 14 15 16 17 18 19 1a 1b 1c 1d 1e 1f | XCBC: data 00 01 02 03 04 05 06 07 08 09 0a 0b 0c 0d 0e 0f | XCBC: data 10 11 12 13 14 15 16 17 18 19 1a 1b 1c 1d 1e 1f | K extracting all 16 bytes of key@0x56080aee8840 | K: symkey-key@0x56080aee8840 (16-bytes, AES_ECB) | : ephemeral-key@0x56080ae63080 (16-bytes, AES_KEY_GEN) | K: new slot-key@0x56080aee6cc0 (16-bytes, AES_ECB) | sizeof bytes 16 | wrapper: (SECItemType)1920429685: ffffffa2 ffffffb2 fffffff8 fffffffd ffffffdf ffffffd3 ffffff96 11 31 ffffffb6 68 ffffffec ffffffbb ffffffca ffffffdb 14 | K: release slot-key-key@0x56080aee6cc0 | K extracted len 16 bytes at 0x56080aee6d50 | unwrapped: 00 01 02 03 04 05 06 07 08 09 0a 0b 0c 0d 0e 0f | XCBC: K: 00 01 02 03 04 05 06 07 08 09 0a 0b 0c 0d 0e 0f | XCBC: K1 c3 52 80 57 54 23 7f 31 1a c0 ff f4 e3 e0 3e 78 | : ephemeral-key@0x56080ae63080 (16-bytes, AES_KEY_GEN) | CONCATENATE_DATA_AND_BASE: | target: EXTRACT_KEY_FROM_KEY | base: base-key@0x56080ae63080 (16-bytes, AES_KEY_GEN) | params: 16-bytes@0x7fff508fff20 | result: k1-key@0x56080aeea0c0 (32-bytes, EXTRACT_KEY_FROM_KEY) | key-offset: 0, key-size: 16 | EXTRACT_KEY_FROM_KEY: | target: AES_ECB | flags: SIGN | key_size: 16-bytes | base: base-key@0x56080aeea0c0 (32-bytes, EXTRACT_KEY_FROM_KEY) | operation: FLAGS_ONLY | params: 8-bytes@0x7fff508fff08 | result: k1-key@0x56080aee2f70 (16-bytes, AES_ECB) | k1: release tmp-key@0x56080aeea0c0 | XCBC: Computing E[2] using K2 | XCBC: K2 bd 86 2f fb 97 ad 2f b8 f8 b8 91 f6 03 2f 36 cb | XCBC: E[n-1] 1d 04 48 fa cf 4d 9c 6f 55 b9 93 da 09 80 3d b3 | XCBC: M[n] 10 11 12 13 14 15 16 17 18 19 1a 1b 1c 1d 1e 1f | XCBC: M[n]^E[n-1]^K2 | b0 93 75 12 4c f5 a5 c0 b5 18 18 37 16 b2 15 67 | XCBC: MAC f5 4f 0e c8 d2 b9 f3 d3 68 07 73 4b d5 28 3f d4 | xcbc: release k1-key@0x56080aee2f70 | : ephemeral-key@0x56080ae63080 (16-bytes, AES_KEY_GEN) | CONCATENATE_DATA_AND_BASE: | target: EXTRACT_KEY_FROM_KEY | base: base-key@0x56080ae63080 (16-bytes, AES_KEY_GEN) | params: 16-bytes@0x7fff508fffb0 | result: xcbc-key@0x56080aeea0c0 (32-bytes, EXTRACT_KEY_FROM_KEY) | key-offset: 0, key-size: 16 | EXTRACT_KEY_FROM_KEY: | target: EXTRACT_KEY_FROM_KEY | key_size: 16-bytes | base: base-key@0x56080aeea0c0 (32-bytes, EXTRACT_KEY_FROM_KEY) | operation: FLAGS_ONLY | params: 8-bytes@0x7fff508fff98 | result: xcbc-key@0x56080aee2f70 (16-bytes, EXTRACT_KEY_FROM_KEY) | xcbc: release tmp-key@0x56080aeea0c0 | PRF symkey interface: release key-key@0x56080aee8840 | PRF symkey interface PRF aes_xcbc final-key@0x56080aee2f70 (size 16) | PRF symkey interface: key-key@0x56080aee2f70 (16-bytes, EXTRACT_KEY_FROM_KEY) | output: symkey-key@0x56080aee2f70 (16-bytes, EXTRACT_KEY_FROM_KEY) | RFC 3566 Test Case #5: AES-XCBC-MAC-96 with 32-byte input extracting all 16 bytes of key@0x56080aee2f70 | RFC 3566 Test Case #5: AES-XCBC-MAC-96 with 32-byte input: symkey-key@0x56080aee2f70 (16-bytes, EXTRACT_KEY_FROM_KEY) | : ephemeral-key@0x56080ae63080 (16-bytes, AES_KEY_GEN) | RFC 3566 Test Case #5: AES-XCBC-MAC-96 with 32-byte input: new slot-key@0x56080aee6cc0 (16-bytes, EXTRACT_KEY_FROM_KEY) | sizeof bytes 16 | wrapper: (SECItemType)160858585: fffffff4 ffffffc1 fffffff6 ffffffbd fffffffa 3e 4b 40 ffffffc2 ffffffbd 50 ffffff81 ffffff9c 65 28 ffffffe6 | RFC 3566 Test Case #5: AES-XCBC-MAC-96 with 32-byte input: release slot-key-key@0x56080aee6cc0 | RFC 3566 Test Case #5: AES-XCBC-MAC-96 with 32-byte input extracted len 16 bytes at 0x56080aee6d50 | unwrapped: f5 4f 0e c8 d2 b9 f3 d3 68 07 73 4b d5 28 3f d4 | verify_chunk_data: RFC 3566 Test Case #5: AES-XCBC-MAC-96 with 32-byte input: ok | test_prf_vector: RFC 3566 Test Case #5: AES-XCBC-MAC-96 with 32-byte input passed | test_prf_vector: release symkey-key@0x56080aee2f70 | test_prf_vector: release message-key@0x56080aee6f50 | test_prf_vector: release key-key@0x56080aee47f0 | test_prf_vector: release output-key@NULL RFC 3566 Test Case #6: AES-XCBC-MAC-96 with 34-byte input | decode_to_chunk: test_prf_vector: input "0x000102030405060708090a0b0c0d0e0f" | decode_to_chunk: output: | 00 01 02 03 04 05 06 07 08 09 0a 0b 0c 0d 0e 0f | decode_to_chunk: test_prf_vector: input "0x000102030405060708090a0b0c0d0e0f101112131415161718191a1b1c1d1e1f2021" | decode_to_chunk: output: | 00 01 02 03 04 05 06 07 08 09 0a 0b 0c 0d 0e 0f | 10 11 12 13 14 15 16 17 18 19 1a 1b 1c 1d 1e 1f | 20 21 | decode_to_chunk: test_prf_vector: input "0xbecbb3bccdb518a30677d5481fb6b4d8" | decode_to_chunk: output: | be cb b3 bc cd b5 18 a3 06 77 d5 48 1f b6 b4 d8 | PRF chunk interface PRF aes_xcbc init key-chunk@0x56080aee60b0 (length 16) | 00 01 02 03 04 05 06 07 08 09 0a 0b 0c 0d 0e 0f | : ephemeral-key@0x56080ae63080 (16-bytes, AES_KEY_GEN) | CONCATENATE_DATA_AND_BASE: | target: EXTRACT_KEY_FROM_KEY | base: base-key@0x56080ae63080 (16-bytes, AES_KEY_GEN) | params: 16-bytes@0x7fff508fffa0 | result: key-key@0x56080aee6f50 (32-bytes, EXTRACT_KEY_FROM_KEY) | key-offset: 0, key-size: 16 | EXTRACT_KEY_FROM_KEY: | target: EXTRACT_KEY_FROM_KEY | key_size: 16-bytes | base: base-key@0x56080aee6f50 (32-bytes, EXTRACT_KEY_FROM_KEY) | operation: FLAGS_ONLY | params: 8-bytes@0x7fff508fff88 | result: key-key@0x56080aee47f0 (16-bytes, EXTRACT_KEY_FROM_KEY) | key: release tmp-key@0x56080aee6f50 | XCBC: Key 16=16 just right | key-offset: 0, key-size: 16 | EXTRACT_KEY_FROM_KEY: | target: AES_ECB | flags: SIGN | key_size: 16-bytes | base: base-key@0x56080aee47f0 (16-bytes, EXTRACT_KEY_FROM_KEY) | operation: FLAGS_ONLY | params: 8-bytes@0x7fff508fff68 | result: key-key@0x56080aee6f50 (16-bytes, AES_ECB) | PRF chunk interface: release clone-key@0x56080aee47f0 | PRF chunk interface PRF aes_xcbc crypt-prf@0x56080aee1830 | PRF chunk interface PRF aes_xcbc update message-bytes@0x56080aee1a00 (length 34) | 00 01 02 03 04 05 06 07 08 09 0a 0b 0c 0d 0e 0f | 10 11 12 13 14 15 16 17 18 19 1a 1b 1c 1d 1e 1f | 20 21 | XCBC: data 00 01 02 03 04 05 06 07 08 09 0a 0b 0c 0d 0e 0f | XCBC: data 10 11 12 13 14 15 16 17 18 19 1a 1b 1c 1d 1e 1f | XCBC: data 20 21 | K extracting all 16 bytes of key@0x56080aee6f50 | K: symkey-key@0x56080aee6f50 (16-bytes, AES_ECB) | : ephemeral-key@0x56080ae63080 (16-bytes, AES_KEY_GEN) | K: new slot-key@0x56080aee6cc0 (16-bytes, AES_ECB) | sizeof bytes 16 | wrapper: (SECItemType)540619040: ffffffa2 ffffffb2 fffffff8 fffffffd ffffffdf ffffffd3 ffffff96 11 31 ffffffb6 68 ffffffec ffffffbb ffffffca ffffffdb 14 | K: release slot-key-key@0x56080aee6cc0 | K extracted len 16 bytes at 0x56080aee1740 | unwrapped: 00 01 02 03 04 05 06 07 08 09 0a 0b 0c 0d 0e 0f | XCBC: K: 00 01 02 03 04 05 06 07 08 09 0a 0b 0c 0d 0e 0f | XCBC: K1 c3 52 80 57 54 23 7f 31 1a c0 ff f4 e3 e0 3e 78 | : ephemeral-key@0x56080ae63080 (16-bytes, AES_KEY_GEN) | CONCATENATE_DATA_AND_BASE: | target: EXTRACT_KEY_FROM_KEY | base: base-key@0x56080ae63080 (16-bytes, AES_KEY_GEN) | params: 16-bytes@0x7fff508fff00 | result: k1-key@0x56080aee2f70 (32-bytes, EXTRACT_KEY_FROM_KEY) | key-offset: 0, key-size: 16 | EXTRACT_KEY_FROM_KEY: | target: AES_ECB | flags: SIGN | key_size: 16-bytes | base: base-key@0x56080aee2f70 (32-bytes, EXTRACT_KEY_FROM_KEY) | operation: FLAGS_ONLY | params: 8-bytes@0x7fff508ffee8 | result: k1-key@0x56080aee47f0 (16-bytes, AES_ECB) | k1: release tmp-key@0x56080aee2f70 | Computing E[3] using K3 | XCBC: K3 c1 a7 ab a1 a2 3a 94 06 58 07 a0 8c c8 ee d0 6e | XCBC: E[n-1] 09 02 5e 5a 67 25 20 72 44 14 5c 6b 80 66 85 79 | XCBC: M[n] 20 21 | XCBC: M[n] 20 21 | XCBC: M[n]:80...^E[n-1]^K3 | e8 84 75 fb c5 1f b4 74 1c 13 fc e7 48 88 55 17 | XCBC: MAC be cb b3 bc cd b5 18 a3 06 77 d5 48 1f b6 b4 d8 | xcbc: release k1-key@0x56080aee47f0 | PRF chunk interface: release key-key@0x56080aee6f50 | PRF chunk interface PRF aes_xcbc final-chunk@0x56080aee6290 (length 16) | be cb b3 bc cd b5 18 a3 06 77 d5 48 1f b6 b4 d8 | chunk output be cb b3 bc cd b5 18 a3 06 77 d5 48 1f b6 b4 d8 | verify_chunk_data: RFC 3566 Test Case #6: AES-XCBC-MAC-96 with 34-byte input: ok | : ephemeral-key@0x56080ae63080 (16-bytes, AES_KEY_GEN) | CONCATENATE_DATA_AND_BASE: | target: EXTRACT_KEY_FROM_KEY | base: base-key@0x56080ae63080 (16-bytes, AES_KEY_GEN) | params: 16-bytes@0x7fff50900010 | result: key symkey-key@0x56080aee47f0 (32-bytes, EXTRACT_KEY_FROM_KEY) | key-offset: 0, key-size: 16 | EXTRACT_KEY_FROM_KEY: | target: EXTRACT_KEY_FROM_KEY | key_size: 16-bytes | base: base-key@0x56080aee47f0 (32-bytes, EXTRACT_KEY_FROM_KEY) | operation: FLAGS_ONLY | params: 8-bytes@0x7fff508ffff8 | result: key symkey-key@0x56080aee6f50 (16-bytes, EXTRACT_KEY_FROM_KEY) | key symkey: release tmp-key@0x56080aee47f0 | PRF symkey interface PRF aes_xcbc init key symkey-key@0x56080aee6f50 (size 16) | PRF symkey interface: key symkey-key@0x56080aee6f50 (16-bytes, EXTRACT_KEY_FROM_KEY) | XCBC: Key 16=16 just right | key-offset: 0, key-size: 16 | EXTRACT_KEY_FROM_KEY: | target: AES_ECB | flags: SIGN | key_size: 16-bytes | base: base-key@0x56080aee6f50 (16-bytes, EXTRACT_KEY_FROM_KEY) | operation: FLAGS_ONLY | params: 8-bytes@0x7fff508fff98 | result: key symkey-key@0x56080aee47f0 (16-bytes, AES_ECB) | PRF symkey interface PRF aes_xcbc crypt-prf@0x56080aee62b0 | : ephemeral-key@0x56080ae63080 (16-bytes, AES_KEY_GEN) | CONCATENATE_DATA_AND_BASE: | target: EXTRACT_KEY_FROM_KEY | base: base-key@0x56080ae63080 (16-bytes, AES_KEY_GEN) | params: 16-bytes@0x7fff50900010 | result: message symkey-key@0x56080aee8840 (50-bytes, EXTRACT_KEY_FROM_KEY) | key-offset: 0, key-size: 34 | EXTRACT_KEY_FROM_KEY: | target: EXTRACT_KEY_FROM_KEY | key_size: 34-bytes | base: base-key@0x56080aee8840 (50-bytes, EXTRACT_KEY_FROM_KEY) | operation: FLAGS_ONLY | params: 8-bytes@0x7fff508ffff8 | result: message symkey-key@0x56080aee2f70 (34-bytes, EXTRACT_KEY_FROM_KEY) | message symkey: release tmp-key@0x56080aee8840 | PRF symkey interface PRF aes_xcbc update symkey message-key@0x56080aee2f70 (size 34) | PRF symkey interface: symkey message-key@0x56080aee2f70 (34-bytes, EXTRACT_KEY_FROM_KEY) | symkey message extracting all 34 bytes of key@0x56080aee2f70 | symkey message: symkey-key@0x56080aee2f70 (34-bytes, EXTRACT_KEY_FROM_KEY) | : ephemeral-key@0x56080ae63080 (16-bytes, AES_KEY_GEN) | symkey message: new slot-key@0x56080aee6cc0 (34-bytes, EXTRACT_KEY_FROM_KEY) | sizeof bytes 48 | wrapper: (SECItemType)1351613424: ffffffa2 ffffffb2 fffffff8 fffffffd ffffffdf ffffffd3 ffffff96 11 31 ffffffb6 68 ffffffec ffffffbb ffffffca ffffffdb 14 ffffffd3 65 5d 28 ffffffa4 ffffff89 ffffffd7 40 ffffff80 68 ffffffa6 ffffffe4 1f 01 ffffffa6 08 ffffffc4 ffffff8d 73 ffffffcb 07 fffffff2 ffffffc2 ffffffb1 fffffff6 ffffffe4 68 5b ffffffb2 ffffffa9 ffffffdf 21 | symkey message: release slot-key-key@0x56080aee6cc0 | symkey message extracted len 48 bytes at 0x56080aee62d0 | unwrapped: 00 01 02 03 04 05 06 07 08 09 0a 0b 0c 0d 0e 0f | unwrapped: 10 11 12 13 14 15 16 17 18 19 1a 1b 1c 1d 1e 1f | unwrapped: 20 21 00 00 00 00 00 00 00 00 00 00 00 00 00 00 | XCBC: data 00 01 02 03 04 05 06 07 08 09 0a 0b 0c 0d 0e 0f | XCBC: data 10 11 12 13 14 15 16 17 18 19 1a 1b 1c 1d 1e 1f | XCBC: data 20 21 | K extracting all 16 bytes of key@0x56080aee47f0 | K: symkey-key@0x56080aee47f0 (16-bytes, AES_ECB) | : ephemeral-key@0x56080ae63080 (16-bytes, AES_KEY_GEN) | K: new slot-key@0x56080aee6cc0 (16-bytes, AES_ECB) | sizeof bytes 16 | wrapper: (SECItemType)1920429685: ffffffa2 ffffffb2 fffffff8 fffffffd ffffffdf ffffffd3 ffffff96 11 31 ffffffb6 68 ffffffec ffffffbb ffffffca ffffffdb 14 | K: release slot-key-key@0x56080aee6cc0 | K extracted len 16 bytes at 0x56080aee1900 | unwrapped: 00 01 02 03 04 05 06 07 08 09 0a 0b 0c 0d 0e 0f | XCBC: K: 00 01 02 03 04 05 06 07 08 09 0a 0b 0c 0d 0e 0f | XCBC: K1 c3 52 80 57 54 23 7f 31 1a c0 ff f4 e3 e0 3e 78 | : ephemeral-key@0x56080ae63080 (16-bytes, AES_KEY_GEN) | CONCATENATE_DATA_AND_BASE: | target: EXTRACT_KEY_FROM_KEY | base: base-key@0x56080ae63080 (16-bytes, AES_KEY_GEN) | params: 16-bytes@0x7fff508fff20 | result: k1-key@0x56080aeea0c0 (32-bytes, EXTRACT_KEY_FROM_KEY) | key-offset: 0, key-size: 16 | EXTRACT_KEY_FROM_KEY: | target: AES_ECB | flags: SIGN | key_size: 16-bytes | base: base-key@0x56080aeea0c0 (32-bytes, EXTRACT_KEY_FROM_KEY) | operation: FLAGS_ONLY | params: 8-bytes@0x7fff508fff08 | result: k1-key@0x56080aee8840 (16-bytes, AES_ECB) | k1: release tmp-key@0x56080aeea0c0 | Computing E[3] using K3 | XCBC: K3 c1 a7 ab a1 a2 3a 94 06 58 07 a0 8c c8 ee d0 6e | XCBC: E[n-1] 09 02 5e 5a 67 25 20 72 44 14 5c 6b 80 66 85 79 | XCBC: M[n] 20 21 | XCBC: M[n] 20 21 | XCBC: M[n]:80...^E[n-1]^K3 | e8 84 75 fb c5 1f b4 74 1c 13 fc e7 48 88 55 17 | XCBC: MAC be cb b3 bc cd b5 18 a3 06 77 d5 48 1f b6 b4 d8 | xcbc: release k1-key@0x56080aee8840 | : ephemeral-key@0x56080ae63080 (16-bytes, AES_KEY_GEN) | CONCATENATE_DATA_AND_BASE: | target: EXTRACT_KEY_FROM_KEY | base: base-key@0x56080ae63080 (16-bytes, AES_KEY_GEN) | params: 16-bytes@0x7fff508fffb0 | result: xcbc-key@0x56080aeea0c0 (32-bytes, EXTRACT_KEY_FROM_KEY) | key-offset: 0, key-size: 16 | EXTRACT_KEY_FROM_KEY: | target: EXTRACT_KEY_FROM_KEY | key_size: 16-bytes | base: base-key@0x56080aeea0c0 (32-bytes, EXTRACT_KEY_FROM_KEY) | operation: FLAGS_ONLY | params: 8-bytes@0x7fff508fff98 | result: xcbc-key@0x56080aee8840 (16-bytes, EXTRACT_KEY_FROM_KEY) | xcbc: release tmp-key@0x56080aeea0c0 | PRF symkey interface: release key-key@0x56080aee47f0 | PRF symkey interface PRF aes_xcbc final-key@0x56080aee8840 (size 16) | PRF symkey interface: key-key@0x56080aee8840 (16-bytes, EXTRACT_KEY_FROM_KEY) | output: symkey-key@0x56080aee8840 (16-bytes, EXTRACT_KEY_FROM_KEY) | RFC 3566 Test Case #6: AES-XCBC-MAC-96 with 34-byte input extracting all 16 bytes of key@0x56080aee8840 | RFC 3566 Test Case #6: AES-XCBC-MAC-96 with 34-byte input: symkey-key@0x56080aee8840 (16-bytes, EXTRACT_KEY_FROM_KEY) | : ephemeral-key@0x56080ae63080 (16-bytes, AES_KEY_GEN) | RFC 3566 Test Case #6: AES-XCBC-MAC-96 with 34-byte input: new slot-key@0x56080aee6cc0 (16-bytes, EXTRACT_KEY_FROM_KEY) | sizeof bytes 16 | wrapper: (SECItemType)160858585: fffffff9 ffffffd6 79 30 ffffffa7 ffffffb9 42 1b ffffffc6 7c 08 2b ffffffde ffffffff 1e ffffffab | RFC 3566 Test Case #6: AES-XCBC-MAC-96 with 34-byte input: release slot-key-key@0x56080aee6cc0 | RFC 3566 Test Case #6: AES-XCBC-MAC-96 with 34-byte input extracted len 16 bytes at 0x56080aee1900 | unwrapped: be cb b3 bc cd b5 18 a3 06 77 d5 48 1f b6 b4 d8 | verify_chunk_data: RFC 3566 Test Case #6: AES-XCBC-MAC-96 with 34-byte input: ok | test_prf_vector: RFC 3566 Test Case #6: AES-XCBC-MAC-96 with 34-byte input passed | test_prf_vector: release symkey-key@0x56080aee8840 | test_prf_vector: release message-key@0x56080aee2f70 | test_prf_vector: release key-key@0x56080aee6f50 | test_prf_vector: release output-key@NULL RFC 3566 Test Case #7: AES-XCBC-MAC-96 with 1000-byte input | decode_to_chunk: test_prf_vector: input "0x000102030405060708090a0b0c0d0e0f" | decode_to_chunk: output: | 00 01 02 03 04 05 06 07 08 09 0a 0b 0c 0d 0e 0f | decode_to_chunk: test_prf_vector: input "0xf0dafee895db30253761103b5d84528f" | decode_to_chunk: output: | f0 da fe e8 95 db 30 25 37 61 10 3b 5d 84 52 8f | PRF chunk interface PRF aes_xcbc init key-chunk@0x56080aee62b0 (length 16) | 00 01 02 03 04 05 06 07 08 09 0a 0b 0c 0d 0e 0f | : ephemeral-key@0x56080ae63080 (16-bytes, AES_KEY_GEN) | CONCATENATE_DATA_AND_BASE: | target: EXTRACT_KEY_FROM_KEY | base: base-key@0x56080ae63080 (16-bytes, AES_KEY_GEN) | params: 16-bytes@0x7fff508fffa0 | result: key-key@0x56080aee2f70 (32-bytes, EXTRACT_KEY_FROM_KEY) | key-offset: 0, key-size: 16 | EXTRACT_KEY_FROM_KEY: | target: EXTRACT_KEY_FROM_KEY | key_size: 16-bytes | base: base-key@0x56080aee2f70 (32-bytes, EXTRACT_KEY_FROM_KEY) | operation: FLAGS_ONLY | params: 8-bytes@0x7fff508fff88 | result: key-key@0x56080aee6f50 (16-bytes, EXTRACT_KEY_FROM_KEY) | key: release tmp-key@0x56080aee2f70 | XCBC: Key 16=16 just right | key-offset: 0, key-size: 16 | EXTRACT_KEY_FROM_KEY: | target: AES_ECB | flags: SIGN | key_size: 16-bytes | base: base-key@0x56080aee6f50 (16-bytes, EXTRACT_KEY_FROM_KEY) | operation: FLAGS_ONLY | params: 8-bytes@0x7fff508fff68 | result: key-key@0x56080aee2f70 (16-bytes, AES_ECB) | PRF chunk interface: release clone-key@0x56080aee6f50 | PRF chunk interface PRF aes_xcbc crypt-prf@0x56080aee1740 | PRF chunk interface PRF aes_xcbc update message-bytes@0x56080aeeb940 (length 1000) | 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 | 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 | 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 | 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 | 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 | 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 | 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 | 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 | 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 | 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 | 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 | 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 | 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 | 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 | 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 | 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 | 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 | 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 | 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 | 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 | 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 | 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 | 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 | 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 | 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 | 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 | 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 | 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 | 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 | 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 | 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 | 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 | 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 | 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 | 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 | 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 | 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 | 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 | 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 | 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 | 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 | 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 | 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 | 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 | 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 | 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 | 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 | 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 | 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 | 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 | 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 | 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 | 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 | 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 | 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 | 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 | 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 | 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 | 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 | 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 | 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 | 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 | 00 00 00 00 00 00 00 00 | XCBC: data 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 | XCBC: data 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 | XCBC: data 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 | XCBC: data 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 | XCBC: data 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 | XCBC: data 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 | XCBC: data 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 | XCBC: data 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 | XCBC: data 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 | XCBC: data 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 | XCBC: data 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 | XCBC: data 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 | XCBC: data 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 | XCBC: data 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 | XCBC: data 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 | XCBC: data 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 | XCBC: data 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 | XCBC: data 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 | XCBC: data 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 | XCBC: data 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 | XCBC: data 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 | XCBC: data 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 | XCBC: data 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 | XCBC: data 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 | XCBC: data 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 | XCBC: data 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 | XCBC: data 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 | XCBC: data 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 | XCBC: data 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 | XCBC: data 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 | XCBC: data 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 | XCBC: data 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 | XCBC: data 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 | XCBC: data 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 | XCBC: data 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 | XCBC: data 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 | XCBC: data 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 | XCBC: data 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 | XCBC: data 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 | XCBC: data 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 | XCBC: data 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 | XCBC: data 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 | XCBC: data 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 | XCBC: data 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 | XCBC: data 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 | XCBC: data 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 | XCBC: data 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 | XCBC: data 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 | XCBC: data 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 | XCBC: data 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 | XCBC: data 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 | XCBC: data 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 | XCBC: data 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 | XCBC: data 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 | XCBC: data 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 | XCBC: data 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 | XCBC: data 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 | XCBC: data 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 | XCBC: data 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 | XCBC: data 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 | XCBC: data 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 | XCBC: data 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 | XCBC: data 00 00 00 00 00 00 00 00 | K extracting all 16 bytes of key@0x56080aee2f70 | K: symkey-key@0x56080aee2f70 (16-bytes, AES_ECB) | : ephemeral-key@0x56080ae63080 (16-bytes, AES_KEY_GEN) | K: new slot-key@0x56080aee6cc0 (16-bytes, AES_ECB) | sizeof bytes 16 | wrapper: (SECItemType)540028960: ffffffa2 ffffffb2 fffffff8 fffffffd ffffffdf ffffffd3 ffffff96 11 31 ffffffb6 68 ffffffec ffffffbb ffffffca ffffffdb 14 | K: release slot-key-key@0x56080aee6cc0 | K extracted len 16 bytes at 0x56080aee6d50 | unwrapped: 00 01 02 03 04 05 06 07 08 09 0a 0b 0c 0d 0e 0f | XCBC: K: 00 01 02 03 04 05 06 07 08 09 0a 0b 0c 0d 0e 0f | XCBC: K1 c3 52 80 57 54 23 7f 31 1a c0 ff f4 e3 e0 3e 78 | : ephemeral-key@0x56080ae63080 (16-bytes, AES_KEY_GEN) | CONCATENATE_DATA_AND_BASE: | target: EXTRACT_KEY_FROM_KEY | base: base-key@0x56080ae63080 (16-bytes, AES_KEY_GEN) | params: 16-bytes@0x7fff508fff00 | result: k1-key@0x56080aee8840 (32-bytes, EXTRACT_KEY_FROM_KEY) | key-offset: 0, key-size: 16 | EXTRACT_KEY_FROM_KEY: | target: AES_ECB | flags: SIGN | key_size: 16-bytes | base: base-key@0x56080aee8840 (32-bytes, EXTRACT_KEY_FROM_KEY) | operation: FLAGS_ONLY | params: 8-bytes@0x7fff508ffee8 | result: k1-key@0x56080aee6f50 (16-bytes, AES_ECB) | k1: release tmp-key@0x56080aee8840 | Computing E[63] using K3 | XCBC: K3 c1 a7 ab a1 a2 3a 94 06 58 07 a0 8c c8 ee d0 6e | XCBC: E[n-1] 5c 88 af cc 1e 1e 83 fc c4 2c 0c e4 12 12 f5 17 | XCBC: M[n] 00 00 00 00 00 00 00 00 | XCBC: M[n] 00 00 00 00 00 00 00 00 | XCBC: M[n]:80...^E[n-1]^K3 | 9d 2f 04 6d bc 24 17 fa 1c 2b ac 68 da fc 25 79 | XCBC: MAC f0 da fe e8 95 db 30 25 37 61 10 3b 5d 84 52 8f | xcbc: release k1-key@0x56080aee6f50 | PRF chunk interface: release key-key@0x56080aee2f70 | PRF chunk interface PRF aes_xcbc final-chunk@0x56080aee6360 (length 16) | f0 da fe e8 95 db 30 25 37 61 10 3b 5d 84 52 8f | chunk output f0 da fe e8 95 db 30 25 37 61 10 3b 5d 84 52 8f | verify_chunk_data: RFC 3566 Test Case #7: AES-XCBC-MAC-96 with 1000-byte input: ok | : ephemeral-key@0x56080ae63080 (16-bytes, AES_KEY_GEN) | CONCATENATE_DATA_AND_BASE: | target: EXTRACT_KEY_FROM_KEY | base: base-key@0x56080ae63080 (16-bytes, AES_KEY_GEN) | params: 16-bytes@0x7fff50900010 | result: key symkey-key@0x56080aee6f50 (32-bytes, EXTRACT_KEY_FROM_KEY) | key-offset: 0, key-size: 16 | EXTRACT_KEY_FROM_KEY: | target: EXTRACT_KEY_FROM_KEY | key_size: 16-bytes | base: base-key@0x56080aee6f50 (32-bytes, EXTRACT_KEY_FROM_KEY) | operation: FLAGS_ONLY | params: 8-bytes@0x7fff508ffff8 | result: key symkey-key@0x56080aee2f70 (16-bytes, EXTRACT_KEY_FROM_KEY) | key symkey: release tmp-key@0x56080aee6f50 | PRF symkey interface PRF aes_xcbc init key symkey-key@0x56080aee2f70 (size 16) | PRF symkey interface: key symkey-key@0x56080aee2f70 (16-bytes, EXTRACT_KEY_FROM_KEY) | XCBC: Key 16=16 just right | key-offset: 0, key-size: 16 | EXTRACT_KEY_FROM_KEY: | target: AES_ECB | flags: SIGN | key_size: 16-bytes | base: base-key@0x56080aee2f70 (16-bytes, EXTRACT_KEY_FROM_KEY) | operation: FLAGS_ONLY | params: 8-bytes@0x7fff508fff98 | result: key symkey-key@0x56080aee6f50 (16-bytes, AES_ECB) | PRF symkey interface PRF aes_xcbc crypt-prf@0x56080aee6070 | : ephemeral-key@0x56080ae63080 (16-bytes, AES_KEY_GEN) | CONCATENATE_DATA_AND_BASE: | target: EXTRACT_KEY_FROM_KEY | base: base-key@0x56080ae63080 (16-bytes, AES_KEY_GEN) | params: 16-bytes@0x7fff50900010 | result: message symkey-key@0x56080aee47f0 (1016-bytes, EXTRACT_KEY_FROM_KEY) | key-offset: 0, key-size: 1000 | EXTRACT_KEY_FROM_KEY: | target: EXTRACT_KEY_FROM_KEY | key_size: 1000-bytes | base: base-key@0x56080aee47f0 (1016-bytes, EXTRACT_KEY_FROM_KEY) | operation: FLAGS_ONLY | params: 8-bytes@0x7fff508ffff8 | result: message symkey-key@0x56080aee8840 (1000-bytes, EXTRACT_KEY_FROM_KEY) | message symkey: release tmp-key@0x56080aee47f0 | PRF symkey interface PRF aes_xcbc update symkey message-key@0x56080aee8840 (size 1000) | PRF symkey interface: symkey message-key@0x56080aee8840 (1000-bytes, EXTRACT_KEY_FROM_KEY) | symkey message extracting all 1000 bytes of key@0x56080aee8840 | symkey message: symkey-key@0x56080aee8840 (1000-bytes, EXTRACT_KEY_FROM_KEY) | : ephemeral-key@0x56080ae63080 (16-bytes, AES_KEY_GEN) | symkey message: new slot-key@0x56080aee6cc0 (1000-bytes, EXTRACT_KEY_FROM_KEY) | sizeof bytes 1008 | wrapper: (SECItemType)1351613424: 74 ffffffda ffffffea ffffffa1 ffffffa0 ffffffd1 ffffffa2 ffffffa8 48 ffffffae ffffff97 ffffff94 7b 22 ffffff9d 2d 74 ffffffda ffffffea ffffffa1 ffffffa0 ffffffd1 ffffffa2 ffffffa8 48 ffffffae ffffff97 ffffff94 7b 22 ffffff9d 2d 74 ffffffda ffffffea ffffffa1 ffffffa0 ffffffd1 ffffffa2 ffffffa8 48 ffffffae ffffff97 ffffff94 7b 22 ffffff9d 2d 74 ffffffda ffffffea ffffffa1 ffffffa0 ffffffd1 ffffffa2 ffffffa8 48 ffffffae ffffff97 ffffff94 7b 22 ffffff9d 2d 74 ffffffda ffffffea ffffffa1 ffffffa0 ffffffd1 ffffffa2 ffffffa8 48 ffffffae ffffff97 ffffff94 7b 22 ffffff9d 2d 74 ffffffda ffffffea ffffffa1 ffffffa0 ffffffd1 ffffffa2 ffffffa8 48 ffffffae ffffff97 ffffff94 7b 22 ffffff9d 2d 74 ffffffda ffffffea ffffffa1 ffffffa0 ffffffd1 ffffffa2 ffffffa8 48 ffffffae ffffff97 ffffff94 7b 22 ffffff9d 2d 74 ffffffda ffffffea ffffffa1 ffffffa0 ffffffd1 ffffffa2 ffffffa8 48 ffffffae ffffff97 ffffff94 7b 22 ffffff9d 2d 74 ffffffda ffffffea ffffffa1 ffffffa0 | symkey message: release slot-key-key@0x56080aee6cc0 | symkey message extracted len 1008 bytes at 0x56080aeed6f0 | unwrapped: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 | unwrapped: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 | unwrapped: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 | unwrapped: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 | unwrapped: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 | unwrapped: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 | unwrapped: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 | unwrapped: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 | unwrapped: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 | unwrapped: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 | unwrapped: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 | unwrapped: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 | unwrapped: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 | unwrapped: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 | unwrapped: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 | unwrapped: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 | unwrapped: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 | unwrapped: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 | unwrapped: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 | unwrapped: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 | unwrapped: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 | unwrapped: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 | unwrapped: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 | unwrapped: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 | unwrapped: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 | unwrapped: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 | unwrapped: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 | unwrapped: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 | unwrapped: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 | unwrapped: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 | unwrapped: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 | unwrapped: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 | unwrapped: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 | unwrapped: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 | unwrapped: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 | unwrapped: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 | unwrapped: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 | unwrapped: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 | unwrapped: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 | unwrapped: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 | unwrapped: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 | unwrapped: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 | unwrapped: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 | unwrapped: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 | unwrapped: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 | unwrapped: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 | unwrapped: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 | unwrapped: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 | unwrapped: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 | unwrapped: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 | unwrapped: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 | unwrapped: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 | unwrapped: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 | unwrapped: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 | unwrapped: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 | unwrapped: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 | unwrapped: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 | unwrapped: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 | unwrapped: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 | unwrapped: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 | unwrapped: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 | unwrapped: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 | unwrapped: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 | XCBC: data 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 | XCBC: data 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 | XCBC: data 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 | XCBC: data 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 | XCBC: data 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 | XCBC: data 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 | XCBC: data 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 | XCBC: data 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 | XCBC: data 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 | XCBC: data 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 | XCBC: data 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 | XCBC: data 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 | XCBC: data 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 | XCBC: data 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 | XCBC: data 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 | XCBC: data 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 | XCBC: data 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 | XCBC: data 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 | XCBC: data 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 | XCBC: data 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 | XCBC: data 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 | XCBC: data 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 | XCBC: data 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 | XCBC: data 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 | XCBC: data 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 | XCBC: data 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 | XCBC: data 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 | XCBC: data 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 | XCBC: data 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 | XCBC: data 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 | XCBC: data 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 | XCBC: data 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 | XCBC: data 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 | XCBC: data 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 | XCBC: data 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 | XCBC: data 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 | XCBC: data 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 | XCBC: data 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 | XCBC: data 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 | XCBC: data 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 | XCBC: data 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 | XCBC: data 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 | XCBC: data 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 | XCBC: data 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 | XCBC: data 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 | XCBC: data 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 | XCBC: data 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 | XCBC: data 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 | XCBC: data 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 | XCBC: data 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 | XCBC: data 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 | XCBC: data 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 | XCBC: data 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 | XCBC: data 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 | XCBC: data 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 | XCBC: data 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 | XCBC: data 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 | XCBC: data 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 | XCBC: data 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 | XCBC: data 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 | XCBC: data 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 | XCBC: data 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 | XCBC: data 00 00 00 00 00 00 00 00 | K extracting all 16 bytes of key@0x56080aee6f50 | K: symkey-key@0x56080aee6f50 (16-bytes, AES_ECB) | : ephemeral-key@0x56080ae63080 (16-bytes, AES_KEY_GEN) | K: new slot-key@0x56080aee6cc0 (16-bytes, AES_ECB) | sizeof bytes 16 | wrapper: (SECItemType)1920429685: ffffffa2 ffffffb2 fffffff8 fffffffd ffffffdf ffffffd3 ffffff96 11 31 ffffffb6 68 ffffffec ffffffbb ffffffca ffffffdb 14 | K: release slot-key-key@0x56080aee6cc0 | K extracted len 16 bytes at 0x56080aee1830 | unwrapped: 00 01 02 03 04 05 06 07 08 09 0a 0b 0c 0d 0e 0f | XCBC: K: 00 01 02 03 04 05 06 07 08 09 0a 0b 0c 0d 0e 0f | XCBC: K1 c3 52 80 57 54 23 7f 31 1a c0 ff f4 e3 e0 3e 78 | : ephemeral-key@0x56080ae63080 (16-bytes, AES_KEY_GEN) | CONCATENATE_DATA_AND_BASE: | target: EXTRACT_KEY_FROM_KEY | base: base-key@0x56080ae63080 (16-bytes, AES_KEY_GEN) | params: 16-bytes@0x7fff508fff20 | result: k1-key@0x56080aeea0c0 (32-bytes, EXTRACT_KEY_FROM_KEY) | key-offset: 0, key-size: 16 | EXTRACT_KEY_FROM_KEY: | target: AES_ECB | flags: SIGN | key_size: 16-bytes | base: base-key@0x56080aeea0c0 (32-bytes, EXTRACT_KEY_FROM_KEY) | operation: FLAGS_ONLY | params: 8-bytes@0x7fff508fff08 | result: k1-key@0x56080aee47f0 (16-bytes, AES_ECB) | k1: release tmp-key@0x56080aeea0c0 | Computing E[63] using K3 | XCBC: K3 c1 a7 ab a1 a2 3a 94 06 58 07 a0 8c c8 ee d0 6e | XCBC: E[n-1] 5c 88 af cc 1e 1e 83 fc c4 2c 0c e4 12 12 f5 17 | XCBC: M[n] 00 00 00 00 00 00 00 00 | XCBC: M[n] 00 00 00 00 00 00 00 00 | XCBC: M[n]:80...^E[n-1]^K3 | 9d 2f 04 6d bc 24 17 fa 1c 2b ac 68 da fc 25 79 | XCBC: MAC f0 da fe e8 95 db 30 25 37 61 10 3b 5d 84 52 8f | xcbc: release k1-key@0x56080aee47f0 | : ephemeral-key@0x56080ae63080 (16-bytes, AES_KEY_GEN) | CONCATENATE_DATA_AND_BASE: | target: EXTRACT_KEY_FROM_KEY | base: base-key@0x56080ae63080 (16-bytes, AES_KEY_GEN) | params: 16-bytes@0x7fff508fffb0 | result: xcbc-key@0x56080aeea0c0 (32-bytes, EXTRACT_KEY_FROM_KEY) | key-offset: 0, key-size: 16 | EXTRACT_KEY_FROM_KEY: | target: EXTRACT_KEY_FROM_KEY | key_size: 16-bytes | base: base-key@0x56080aeea0c0 (32-bytes, EXTRACT_KEY_FROM_KEY) | operation: FLAGS_ONLY | params: 8-bytes@0x7fff508fff98 | result: xcbc-key@0x56080aee47f0 (16-bytes, EXTRACT_KEY_FROM_KEY) | xcbc: release tmp-key@0x56080aeea0c0 | PRF symkey interface: release key-key@0x56080aee6f50 | PRF symkey interface PRF aes_xcbc final-key@0x56080aee47f0 (size 16) | PRF symkey interface: key-key@0x56080aee47f0 (16-bytes, EXTRACT_KEY_FROM_KEY) | output: symkey-key@0x56080aee47f0 (16-bytes, EXTRACT_KEY_FROM_KEY) | RFC 3566 Test Case #7: AES-XCBC-MAC-96 with 1000-byte input extracting all 16 bytes of key@0x56080aee47f0 | RFC 3566 Test Case #7: AES-XCBC-MAC-96 with 1000-byte input: symkey-key@0x56080aee47f0 (16-bytes, EXTRACT_KEY_FROM_KEY) | : ephemeral-key@0x56080ae63080 (16-bytes, AES_KEY_GEN) | RFC 3566 Test Case #7: AES-XCBC-MAC-96 with 1000-byte input: new slot-key@0x56080aee6cc0 (16-bytes, EXTRACT_KEY_FROM_KEY) | sizeof bytes 16 | wrapper: (SECItemType)160858585: ffffff9c 75 fffffff0 56 ffffffb2 1a ffffffd9 fffffff7 fffffff6 68 64 fffffffa ffffffc8 ffffffa0 77 ffffffb4 | RFC 3566 Test Case #7: AES-XCBC-MAC-96 with 1000-byte input: release slot-key-key@0x56080aee6cc0 | RFC 3566 Test Case #7: AES-XCBC-MAC-96 with 1000-byte input extracted len 16 bytes at 0x56080aee1830 | unwrapped: f0 da fe e8 95 db 30 25 37 61 10 3b 5d 84 52 8f | verify_chunk_data: RFC 3566 Test Case #7: AES-XCBC-MAC-96 with 1000-byte input: ok | test_prf_vector: RFC 3566 Test Case #7: AES-XCBC-MAC-96 with 1000-byte input passed | test_prf_vector: release symkey-key@0x56080aee47f0 | test_prf_vector: release message-key@0x56080aee8840 | test_prf_vector: release key-key@0x56080aee2f70 | test_prf_vector: release output-key@NULL RFC 4434 Test Case AES-XCBC-PRF-128 with 20-byte input (key length 16) | decode_to_chunk: test_prf_vector: input "0x000102030405060708090a0b0c0d0e0f" | decode_to_chunk: output: | 00 01 02 03 04 05 06 07 08 09 0a 0b 0c 0d 0e 0f | decode_to_chunk: test_prf_vector: input "0x000102030405060708090a0b0c0d0e0f10111213" | decode_to_chunk: output: | 00 01 02 03 04 05 06 07 08 09 0a 0b 0c 0d 0e 0f | 10 11 12 13 | decode_to_chunk: test_prf_vector: input "0x47f51b4564966215b8985c63055ed308" | decode_to_chunk: output: | 47 f5 1b 45 64 96 62 15 b8 98 5c 63 05 5e d3 08 | PRF chunk interface PRF aes_xcbc init key-chunk@0x56080aee6070 (length 16) | 00 01 02 03 04 05 06 07 08 09 0a 0b 0c 0d 0e 0f | : ephemeral-key@0x56080ae63080 (16-bytes, AES_KEY_GEN) | CONCATENATE_DATA_AND_BASE: | target: EXTRACT_KEY_FROM_KEY | base: base-key@0x56080ae63080 (16-bytes, AES_KEY_GEN) | params: 16-bytes@0x7fff508fffa0 | result: key-key@0x56080aee8840 (32-bytes, EXTRACT_KEY_FROM_KEY) | key-offset: 0, key-size: 16 | EXTRACT_KEY_FROM_KEY: | target: EXTRACT_KEY_FROM_KEY | key_size: 16-bytes | base: base-key@0x56080aee8840 (32-bytes, EXTRACT_KEY_FROM_KEY) | operation: FLAGS_ONLY | params: 8-bytes@0x7fff508fff88 | result: key-key@0x56080aee2f70 (16-bytes, EXTRACT_KEY_FROM_KEY) | key: release tmp-key@0x56080aee8840 | XCBC: Key 16=16 just right | key-offset: 0, key-size: 16 | EXTRACT_KEY_FROM_KEY: | target: AES_ECB | flags: SIGN | key_size: 16-bytes | base: base-key@0x56080aee2f70 (16-bytes, EXTRACT_KEY_FROM_KEY) | operation: FLAGS_ONLY | params: 8-bytes@0x7fff508fff68 | result: key-key@0x56080aee8840 (16-bytes, AES_ECB) | PRF chunk interface: release clone-key@0x56080aee2f70 | PRF chunk interface PRF aes_xcbc crypt-prf@0x56080aee6090 | PRF chunk interface PRF aes_xcbc update message-bytes@0x56080aee1830 (length 20) | 00 01 02 03 04 05 06 07 08 09 0a 0b 0c 0d 0e 0f | 10 11 12 13 | XCBC: data 00 01 02 03 04 05 06 07 08 09 0a 0b 0c 0d 0e 0f | XCBC: data 10 11 12 13 | K extracting all 16 bytes of key@0x56080aee8840 | K: symkey-key@0x56080aee8840 (16-bytes, AES_ECB) | : ephemeral-key@0x56080ae63080 (16-bytes, AES_KEY_GEN) | K: new slot-key@0x56080aee6cc0 (16-bytes, AES_ECB) | sizeof bytes 16 | wrapper: (SECItemType)540618784: ffffffa2 ffffffb2 fffffff8 fffffffd ffffffdf ffffffd3 ffffff96 11 31 ffffffb6 68 ffffffec ffffffbb ffffffca ffffffdb 14 | K: release slot-key-key@0x56080aee6cc0 | K extracted len 16 bytes at 0x56080aee6310 | unwrapped: 00 01 02 03 04 05 06 07 08 09 0a 0b 0c 0d 0e 0f | XCBC: K: 00 01 02 03 04 05 06 07 08 09 0a 0b 0c 0d 0e 0f | XCBC: K1 c3 52 80 57 54 23 7f 31 1a c0 ff f4 e3 e0 3e 78 | : ephemeral-key@0x56080ae63080 (16-bytes, AES_KEY_GEN) | CONCATENATE_DATA_AND_BASE: | target: EXTRACT_KEY_FROM_KEY | base: base-key@0x56080ae63080 (16-bytes, AES_KEY_GEN) | params: 16-bytes@0x7fff508fff00 | result: k1-key@0x56080aee47f0 (32-bytes, EXTRACT_KEY_FROM_KEY) | key-offset: 0, key-size: 16 | EXTRACT_KEY_FROM_KEY: | target: AES_ECB | flags: SIGN | key_size: 16-bytes | base: base-key@0x56080aee47f0 (32-bytes, EXTRACT_KEY_FROM_KEY) | operation: FLAGS_ONLY | params: 8-bytes@0x7fff508ffee8 | result: k1-key@0x56080aee2f70 (16-bytes, AES_ECB) | k1: release tmp-key@0x56080aee47f0 | Computing E[2] using K3 | XCBC: K3 c1 a7 ab a1 a2 3a 94 06 58 07 a0 8c c8 ee d0 6e | XCBC: E[n-1] 1d 04 48 fa cf 4d 9c 6f 55 b9 93 da 09 80 3d b3 | XCBC: M[n] 10 11 12 13 | XCBC: M[n] 10 11 12 13 | XCBC: M[n]:80...^E[n-1]^K3 | cc b2 f1 48 ed 77 08 69 0d be 33 56 c1 6e ed dd | XCBC: MAC 47 f5 1b 45 64 96 62 15 b8 98 5c 63 05 5e d3 08 | xcbc: release k1-key@0x56080aee2f70 | PRF chunk interface: release key-key@0x56080aee8840 | PRF chunk interface PRF aes_xcbc final-chunk@0x56080aee64c0 (length 16) | 47 f5 1b 45 64 96 62 15 b8 98 5c 63 05 5e d3 08 | chunk output 47 f5 1b 45 64 96 62 15 b8 98 5c 63 05 5e d3 08 | verify_chunk_data: RFC 4434 Test Case AES-XCBC-PRF-128 with 20-byte input (key length 16): ok | : ephemeral-key@0x56080ae63080 (16-bytes, AES_KEY_GEN) | CONCATENATE_DATA_AND_BASE: | target: EXTRACT_KEY_FROM_KEY | base: base-key@0x56080ae63080 (16-bytes, AES_KEY_GEN) | params: 16-bytes@0x7fff50900010 | result: key symkey-key@0x56080aee2f70 (32-bytes, EXTRACT_KEY_FROM_KEY) | key-offset: 0, key-size: 16 | EXTRACT_KEY_FROM_KEY: | target: EXTRACT_KEY_FROM_KEY | key_size: 16-bytes | base: base-key@0x56080aee2f70 (32-bytes, EXTRACT_KEY_FROM_KEY) | operation: FLAGS_ONLY | params: 8-bytes@0x7fff508ffff8 | result: key symkey-key@0x56080aee8840 (16-bytes, EXTRACT_KEY_FROM_KEY) | key symkey: release tmp-key@0x56080aee2f70 | PRF symkey interface PRF aes_xcbc init key symkey-key@0x56080aee8840 (size 16) | PRF symkey interface: key symkey-key@0x56080aee8840 (16-bytes, EXTRACT_KEY_FROM_KEY) | XCBC: Key 16=16 just right | key-offset: 0, key-size: 16 | EXTRACT_KEY_FROM_KEY: | target: AES_ECB | flags: SIGN | key_size: 16-bytes | base: base-key@0x56080aee8840 (16-bytes, EXTRACT_KEY_FROM_KEY) | operation: FLAGS_ONLY | params: 8-bytes@0x7fff508fff98 | result: key symkey-key@0x56080aee2f70 (16-bytes, AES_ECB) | PRF symkey interface PRF aes_xcbc crypt-prf@0x56080aee6290 | : ephemeral-key@0x56080ae63080 (16-bytes, AES_KEY_GEN) | CONCATENATE_DATA_AND_BASE: | target: EXTRACT_KEY_FROM_KEY | base: base-key@0x56080ae63080 (16-bytes, AES_KEY_GEN) | params: 16-bytes@0x7fff50900010 | result: message symkey-key@0x56080aee6f50 (36-bytes, EXTRACT_KEY_FROM_KEY) | key-offset: 0, key-size: 20 | EXTRACT_KEY_FROM_KEY: | target: EXTRACT_KEY_FROM_KEY | key_size: 20-bytes | base: base-key@0x56080aee6f50 (36-bytes, EXTRACT_KEY_FROM_KEY) | operation: FLAGS_ONLY | params: 8-bytes@0x7fff508ffff8 | result: message symkey-key@0x56080aee47f0 (20-bytes, EXTRACT_KEY_FROM_KEY) | message symkey: release tmp-key@0x56080aee6f50 | PRF symkey interface PRF aes_xcbc update symkey message-key@0x56080aee47f0 (size 20) | PRF symkey interface: symkey message-key@0x56080aee47f0 (20-bytes, EXTRACT_KEY_FROM_KEY) | symkey message extracting all 20 bytes of key@0x56080aee47f0 | symkey message: symkey-key@0x56080aee47f0 (20-bytes, EXTRACT_KEY_FROM_KEY) | : ephemeral-key@0x56080ae63080 (16-bytes, AES_KEY_GEN) | symkey message: new slot-key@0x56080aee6cc0 (20-bytes, EXTRACT_KEY_FROM_KEY) | sizeof bytes 32 | wrapper: (SECItemType)1351613424: ffffffa2 ffffffb2 fffffff8 fffffffd ffffffdf ffffffd3 ffffff96 11 31 ffffffb6 68 ffffffec ffffffbb ffffffca ffffffdb 14 6c ffffffe5 ffffffa2 20 fffffffa fffffff4 ffffffeb 59 ffffffe4 18 ffffffa9 23 ffffffdd 20 1c 0e | symkey message: release slot-key-key@0x56080aee6cc0 | symkey message extracted len 32 bytes at 0x56080aee6da0 | unwrapped: 00 01 02 03 04 05 06 07 08 09 0a 0b 0c 0d 0e 0f | unwrapped: 10 11 12 13 00 00 00 00 00 00 00 00 00 00 00 00 | XCBC: data 00 01 02 03 04 05 06 07 08 09 0a 0b 0c 0d 0e 0f | XCBC: data 10 11 12 13 | K extracting all 16 bytes of key@0x56080aee2f70 | K: symkey-key@0x56080aee2f70 (16-bytes, AES_ECB) | : ephemeral-key@0x56080ae63080 (16-bytes, AES_KEY_GEN) | K: new slot-key@0x56080aee6cc0 (16-bytes, AES_ECB) | sizeof bytes 16 | wrapper: (SECItemType)1920429685: ffffffa2 ffffffb2 fffffff8 fffffffd ffffffdf ffffffd3 ffffff96 11 31 ffffffb6 68 ffffffec ffffffbb ffffffca ffffffdb 14 | K: release slot-key-key@0x56080aee6cc0 | K extracted len 16 bytes at 0x56080aee6360 | unwrapped: 00 01 02 03 04 05 06 07 08 09 0a 0b 0c 0d 0e 0f | XCBC: K: 00 01 02 03 04 05 06 07 08 09 0a 0b 0c 0d 0e 0f | XCBC: K1 c3 52 80 57 54 23 7f 31 1a c0 ff f4 e3 e0 3e 78 | : ephemeral-key@0x56080ae63080 (16-bytes, AES_KEY_GEN) | CONCATENATE_DATA_AND_BASE: | target: EXTRACT_KEY_FROM_KEY | base: base-key@0x56080ae63080 (16-bytes, AES_KEY_GEN) | params: 16-bytes@0x7fff508fff20 | result: k1-key@0x56080aeea0c0 (32-bytes, EXTRACT_KEY_FROM_KEY) | key-offset: 0, key-size: 16 | EXTRACT_KEY_FROM_KEY: | target: AES_ECB | flags: SIGN | key_size: 16-bytes | base: base-key@0x56080aeea0c0 (32-bytes, EXTRACT_KEY_FROM_KEY) | operation: FLAGS_ONLY | params: 8-bytes@0x7fff508fff08 | result: k1-key@0x56080aee6f50 (16-bytes, AES_ECB) | k1: release tmp-key@0x56080aeea0c0 | Computing E[2] using K3 | XCBC: K3 c1 a7 ab a1 a2 3a 94 06 58 07 a0 8c c8 ee d0 6e | XCBC: E[n-1] 1d 04 48 fa cf 4d 9c 6f 55 b9 93 da 09 80 3d b3 | XCBC: M[n] 10 11 12 13 | XCBC: M[n] 10 11 12 13 | XCBC: M[n]:80...^E[n-1]^K3 | cc b2 f1 48 ed 77 08 69 0d be 33 56 c1 6e ed dd | XCBC: MAC 47 f5 1b 45 64 96 62 15 b8 98 5c 63 05 5e d3 08 | xcbc: release k1-key@0x56080aee6f50 | : ephemeral-key@0x56080ae63080 (16-bytes, AES_KEY_GEN) | CONCATENATE_DATA_AND_BASE: | target: EXTRACT_KEY_FROM_KEY | base: base-key@0x56080ae63080 (16-bytes, AES_KEY_GEN) | params: 16-bytes@0x7fff508fffb0 | result: xcbc-key@0x56080aeea0c0 (32-bytes, EXTRACT_KEY_FROM_KEY) | key-offset: 0, key-size: 16 | EXTRACT_KEY_FROM_KEY: | target: EXTRACT_KEY_FROM_KEY | key_size: 16-bytes | base: base-key@0x56080aeea0c0 (32-bytes, EXTRACT_KEY_FROM_KEY) | operation: FLAGS_ONLY | params: 8-bytes@0x7fff508fff98 | result: xcbc-key@0x56080aee6f50 (16-bytes, EXTRACT_KEY_FROM_KEY) | xcbc: release tmp-key@0x56080aeea0c0 | PRF symkey interface: release key-key@0x56080aee2f70 | PRF symkey interface PRF aes_xcbc final-key@0x56080aee6f50 (size 16) | PRF symkey interface: key-key@0x56080aee6f50 (16-bytes, EXTRACT_KEY_FROM_KEY) | output: symkey-key@0x56080aee6f50 (16-bytes, EXTRACT_KEY_FROM_KEY) | RFC 4434 Test Case AES-XCBC-PRF-128 with 20-byte input (key length 16) extracting all 16 bytes of key@0x56080aee6f50 | RFC 4434 Test Case AES-XCBC-PRF-128 with 20-byte input (key length 16): symkey-key@0x56080aee6f50 (16-bytes, EXTRACT_KEY_FROM_KEY) | : ephemeral-key@0x56080ae63080 (16-bytes, AES_KEY_GEN) | RFC 4434 Test Case AES-XCBC-PRF-128 with 20-byte input (key length 16): new slot-key@0x56080aee6cc0 (16-bytes, EXTRACT_KEY_FROM_KEY) | sizeof bytes 16 | wrapper: (SECItemType)160858585: 7e 7a 1d 27 ffffff80 ffffff8d 31 ffffff87 ffffffde ffffffa8 70 15 37 3f 3a ffffffde | RFC 4434 Test Case AES-XCBC-PRF-128 with 20-byte input (key length 16): release slot-key-key@0x56080aee6cc0 | RFC 4434 Test Case AES-XCBC-PRF-128 with 20-byte input (key length 16) extracted len 16 bytes at 0x56080aee64c0 | unwrapped: 47 f5 1b 45 64 96 62 15 b8 98 5c 63 05 5e d3 08 | verify_chunk_data: RFC 4434 Test Case AES-XCBC-PRF-128 with 20-byte input (key length 16): ok | test_prf_vector: RFC 4434 Test Case AES-XCBC-PRF-128 with 20-byte input (key length 16) passed | test_prf_vector: release symkey-key@0x56080aee6f50 | test_prf_vector: release message-key@0x56080aee47f0 | test_prf_vector: release key-key@0x56080aee8840 | test_prf_vector: release output-key@NULL RFC 4434 Test Case AES-XCBC-PRF-128 with 20-byte input (key length 10) | decode_to_chunk: test_prf_vector: input "0x00010203040506070809" | decode_to_chunk: output: | 00 01 02 03 04 05 06 07 08 09 | decode_to_chunk: test_prf_vector: input "0x000102030405060708090a0b0c0d0e0f10111213" | decode_to_chunk: output: | 00 01 02 03 04 05 06 07 08 09 0a 0b 0c 0d 0e 0f | 10 11 12 13 | decode_to_chunk: test_prf_vector: input "0x0fa087af7d866e7653434e602fdde835" | decode_to_chunk: output: | 0f a0 87 af 7d 86 6e 76 53 43 4e 60 2f dd e8 35 | PRF chunk interface PRF aes_xcbc init key-chunk@0x56080aee6310 (length 10) | 00 01 02 03 04 05 06 07 08 09 | : ephemeral-key@0x56080ae63080 (16-bytes, AES_KEY_GEN) | CONCATENATE_DATA_AND_BASE: | target: EXTRACT_KEY_FROM_KEY | base: base-key@0x56080ae63080 (16-bytes, AES_KEY_GEN) | params: 16-bytes@0x7fff508fffa0 | result: key-key@0x56080aee47f0 (26-bytes, EXTRACT_KEY_FROM_KEY) | key-offset: 0, key-size: 10 | EXTRACT_KEY_FROM_KEY: | target: EXTRACT_KEY_FROM_KEY | key_size: 10-bytes | base: base-key@0x56080aee47f0 (26-bytes, EXTRACT_KEY_FROM_KEY) | operation: FLAGS_ONLY | params: 8-bytes@0x7fff508fff88 | result: key-key@0x56080aee8840 (10-bytes, EXTRACT_KEY_FROM_KEY) | key: release tmp-key@0x56080aee47f0 | XCBC: Key 10<16 too small, padding with zeros | xcbc: reference tmp-key@0x56080aee8840 | CONCATENATE_BASE_AND_DATA: | target: EXTRACT_KEY_FROM_KEY | base: base-key@0x56080aee8840 (10-bytes, EXTRACT_KEY_FROM_KEY) | params: 16-bytes@0x7fff508fff40 | result: tmp+=0-key@0x56080aee47f0 (16-bytes, EXTRACT_KEY_FROM_KEY) | append_symkey_bytes: release lhs-key@0x56080aee8840 | key-offset: 0, key-size: 16 | EXTRACT_KEY_FROM_KEY: | target: AES_ECB | flags: SIGN | key_size: 16-bytes | base: base-key@0x56080aee47f0 (16-bytes, EXTRACT_KEY_FROM_KEY) | operation: FLAGS_ONLY | params: 8-bytes@0x7fff508fff68 | result: PRF chunk interface-key@0x56080aee6f50 (16-bytes, AES_ECB) | PRF chunk interface: release tmp-key@0x56080aee47f0 | PRF chunk interface: release clone-key@0x56080aee8840 | PRF chunk interface PRF aes_xcbc crypt-prf@0x56080aee1740 | PRF chunk interface PRF aes_xcbc update message-bytes@0x56080aee64c0 (length 20) | 00 01 02 03 04 05 06 07 08 09 0a 0b 0c 0d 0e 0f | 10 11 12 13 | XCBC: data 00 01 02 03 04 05 06 07 08 09 0a 0b 0c 0d 0e 0f | XCBC: data 10 11 12 13 | K extracting all 16 bytes of key@0x56080aee6f50 | K: symkey-key@0x56080aee6f50 (16-bytes, AES_ECB) | : ephemeral-key@0x56080ae63080 (16-bytes, AES_KEY_GEN) | K: new slot-key@0x56080aee6cc0 (16-bytes, AES_ECB) | sizeof bytes 16 | wrapper: (SECItemType)540618784: fffffffd ffffff9a 46 ffffffc6 ffffffce fffffff9 ffffff85 0f ffffff99 ffffffa4 ffffff89 05 ffffffa2 ffffff94 ffffffb2 ffffffa2 | K: release slot-key-key@0x56080aee6cc0 | K extracted len 16 bytes at 0x56080aee6290 | unwrapped: 00 01 02 03 04 05 06 07 08 09 00 00 00 00 00 00 | XCBC: K: 00 01 02 03 04 05 06 07 08 09 00 00 00 00 00 00 | XCBC: K1 50 ca b2 4d 03 34 45 5e 40 7b 25 0f dd 7c f8 d5 | : ephemeral-key@0x56080ae63080 (16-bytes, AES_KEY_GEN) | CONCATENATE_DATA_AND_BASE: | target: EXTRACT_KEY_FROM_KEY | base: base-key@0x56080ae63080 (16-bytes, AES_KEY_GEN) | params: 16-bytes@0x7fff508fff00 | result: k1-key@0x56080aee47f0 (32-bytes, EXTRACT_KEY_FROM_KEY) | key-offset: 0, key-size: 16 | EXTRACT_KEY_FROM_KEY: | target: AES_ECB | flags: SIGN | key_size: 16-bytes | base: base-key@0x56080aee47f0 (32-bytes, EXTRACT_KEY_FROM_KEY) | operation: FLAGS_ONLY | params: 8-bytes@0x7fff508ffee8 | result: k1-key@0x56080aee8840 (16-bytes, AES_ECB) | k1: release tmp-key@0x56080aee47f0 | Computing E[2] using K3 | XCBC: K3 8e f7 48 db 56 f1 f7 26 24 72 f2 c5 63 b0 3f 88 | XCBC: E[n-1] fe 1f 63 e9 65 1a 4b bb 3c cc cd 0d cc 83 e4 30 | XCBC: M[n] 10 11 12 13 | XCBC: M[n] 10 11 12 13 | XCBC: M[n]:80...^E[n-1]^K3 | 60 f9 39 21 b3 eb bc 9d 18 be 3f c8 af 33 db b8 | XCBC: MAC 0f a0 87 af 7d 86 6e 76 53 43 4e 60 2f dd e8 35 | xcbc: release k1-key@0x56080aee8840 | PRF chunk interface: release key-key@0x56080aee6f50 | PRF chunk interface PRF aes_xcbc final-chunk@0x56080aee60b0 (length 16) | 0f a0 87 af 7d 86 6e 76 53 43 4e 60 2f dd e8 35 | chunk output 0f a0 87 af 7d 86 6e 76 53 43 4e 60 2f dd e8 35 | verify_chunk_data: RFC 4434 Test Case AES-XCBC-PRF-128 with 20-byte input (key length 10): ok | : ephemeral-key@0x56080ae63080 (16-bytes, AES_KEY_GEN) | CONCATENATE_DATA_AND_BASE: | target: EXTRACT_KEY_FROM_KEY | base: base-key@0x56080ae63080 (16-bytes, AES_KEY_GEN) | params: 16-bytes@0x7fff50900010 | result: key symkey-key@0x56080aee8840 (26-bytes, EXTRACT_KEY_FROM_KEY) | key-offset: 0, key-size: 10 | EXTRACT_KEY_FROM_KEY: | target: EXTRACT_KEY_FROM_KEY | key_size: 10-bytes | base: base-key@0x56080aee8840 (26-bytes, EXTRACT_KEY_FROM_KEY) | operation: FLAGS_ONLY | params: 8-bytes@0x7fff508ffff8 | result: key symkey-key@0x56080aee6f50 (10-bytes, EXTRACT_KEY_FROM_KEY) | key symkey: release tmp-key@0x56080aee8840 | PRF symkey interface PRF aes_xcbc init key symkey-key@0x56080aee6f50 (size 10) | PRF symkey interface: key symkey-key@0x56080aee6f50 (10-bytes, EXTRACT_KEY_FROM_KEY) | XCBC: Key 10<16 too small, padding with zeros | xcbc: reference tmp-key@0x56080aee6f50 | CONCATENATE_BASE_AND_DATA: | target: EXTRACT_KEY_FROM_KEY | base: base-key@0x56080aee6f50 (10-bytes, EXTRACT_KEY_FROM_KEY) | params: 16-bytes@0x7fff508fff70 | result: tmp+=0-key@0x56080aee8840 (16-bytes, EXTRACT_KEY_FROM_KEY) | append_symkey_bytes: release lhs-key@0x56080aee6f50 | key-offset: 0, key-size: 16 | EXTRACT_KEY_FROM_KEY: | target: AES_ECB | flags: SIGN | key_size: 16-bytes | base: base-key@0x56080aee8840 (16-bytes, EXTRACT_KEY_FROM_KEY) | operation: FLAGS_ONLY | params: 8-bytes@0x7fff508fff98 | result: PRF symkey interface-key@0x56080aee47f0 (16-bytes, AES_ECB) | PRF symkey interface: release tmp-key@0x56080aee8840 | PRF symkey interface PRF aes_xcbc crypt-prf@0x56080aee6d50 | : ephemeral-key@0x56080ae63080 (16-bytes, AES_KEY_GEN) | CONCATENATE_DATA_AND_BASE: | target: EXTRACT_KEY_FROM_KEY | base: base-key@0x56080ae63080 (16-bytes, AES_KEY_GEN) | params: 16-bytes@0x7fff50900010 | result: message symkey-key@0x56080aee2f70 (36-bytes, EXTRACT_KEY_FROM_KEY) | key-offset: 0, key-size: 20 | EXTRACT_KEY_FROM_KEY: | target: EXTRACT_KEY_FROM_KEY | key_size: 20-bytes | base: base-key@0x56080aee2f70 (36-bytes, EXTRACT_KEY_FROM_KEY) | operation: FLAGS_ONLY | params: 8-bytes@0x7fff508ffff8 | result: message symkey-key@0x56080aee8840 (20-bytes, EXTRACT_KEY_FROM_KEY) | message symkey: release tmp-key@0x56080aee2f70 | PRF symkey interface PRF aes_xcbc update symkey message-key@0x56080aee8840 (size 20) | PRF symkey interface: symkey message-key@0x56080aee8840 (20-bytes, EXTRACT_KEY_FROM_KEY) | symkey message extracting all 20 bytes of key@0x56080aee8840 | symkey message: symkey-key@0x56080aee8840 (20-bytes, EXTRACT_KEY_FROM_KEY) | : ephemeral-key@0x56080ae63080 (16-bytes, AES_KEY_GEN) | symkey message: new slot-key@0x56080aee6cc0 (20-bytes, EXTRACT_KEY_FROM_KEY) | sizeof bytes 32 | wrapper: (SECItemType)1351613424: ffffffa2 ffffffb2 fffffff8 fffffffd ffffffdf ffffffd3 ffffff96 11 31 ffffffb6 68 ffffffec ffffffbb ffffffca ffffffdb 14 6c ffffffe5 ffffffa2 20 fffffffa fffffff4 ffffffeb 59 ffffffe4 18 ffffffa9 23 ffffffdd 20 1c 0e | symkey message: release slot-key-key@0x56080aee6cc0 | symkey message extracted len 32 bytes at 0x56080aeedaf0 | unwrapped: 00 01 02 03 04 05 06 07 08 09 0a 0b 0c 0d 0e 0f | unwrapped: 10 11 12 13 00 00 00 00 00 00 00 00 00 00 00 00 | XCBC: data 00 01 02 03 04 05 06 07 08 09 0a 0b 0c 0d 0e 0f | XCBC: data 10 11 12 13 | K extracting all 16 bytes of key@0x56080aee47f0 | K: symkey-key@0x56080aee47f0 (16-bytes, AES_ECB) | : ephemeral-key@0x56080ae63080 (16-bytes, AES_KEY_GEN) | K: new slot-key@0x56080aee6cc0 (16-bytes, AES_ECB) | sizeof bytes 16 | wrapper: (SECItemType)1920429685: fffffffd ffffff9a 46 ffffffc6 ffffffce fffffff9 ffffff85 0f ffffff99 ffffffa4 ffffff89 05 ffffffa2 ffffff94 ffffffb2 ffffffa2 | K: release slot-key-key@0x56080aee6cc0 | K extracted len 16 bytes at 0x56080aee1900 | unwrapped: 00 01 02 03 04 05 06 07 08 09 00 00 00 00 00 00 | XCBC: K: 00 01 02 03 04 05 06 07 08 09 00 00 00 00 00 00 | XCBC: K1 50 ca b2 4d 03 34 45 5e 40 7b 25 0f dd 7c f8 d5 | : ephemeral-key@0x56080ae63080 (16-bytes, AES_KEY_GEN) | CONCATENATE_DATA_AND_BASE: | target: EXTRACT_KEY_FROM_KEY | base: base-key@0x56080ae63080 (16-bytes, AES_KEY_GEN) | params: 16-bytes@0x7fff508fff20 | result: k1-key@0x56080aeea0c0 (32-bytes, EXTRACT_KEY_FROM_KEY) | key-offset: 0, key-size: 16 | EXTRACT_KEY_FROM_KEY: | target: AES_ECB | flags: SIGN | key_size: 16-bytes | base: base-key@0x56080aeea0c0 (32-bytes, EXTRACT_KEY_FROM_KEY) | operation: FLAGS_ONLY | params: 8-bytes@0x7fff508fff08 | result: k1-key@0x56080aee2f70 (16-bytes, AES_ECB) | k1: release tmp-key@0x56080aeea0c0 | Computing E[2] using K3 | XCBC: K3 8e f7 48 db 56 f1 f7 26 24 72 f2 c5 63 b0 3f 88 | XCBC: E[n-1] fe 1f 63 e9 65 1a 4b bb 3c cc cd 0d cc 83 e4 30 | XCBC: M[n] 10 11 12 13 | XCBC: M[n] 10 11 12 13 | XCBC: M[n]:80...^E[n-1]^K3 | 60 f9 39 21 b3 eb bc 9d 18 be 3f c8 af 33 db b8 | XCBC: MAC 0f a0 87 af 7d 86 6e 76 53 43 4e 60 2f dd e8 35 | xcbc: release k1-key@0x56080aee2f70 | : ephemeral-key@0x56080ae63080 (16-bytes, AES_KEY_GEN) | CONCATENATE_DATA_AND_BASE: | target: EXTRACT_KEY_FROM_KEY | base: base-key@0x56080ae63080 (16-bytes, AES_KEY_GEN) | params: 16-bytes@0x7fff508fffb0 | result: xcbc-key@0x56080aeea0c0 (32-bytes, EXTRACT_KEY_FROM_KEY) | key-offset: 0, key-size: 16 | EXTRACT_KEY_FROM_KEY: | target: EXTRACT_KEY_FROM_KEY | key_size: 16-bytes | base: base-key@0x56080aeea0c0 (32-bytes, EXTRACT_KEY_FROM_KEY) | operation: FLAGS_ONLY | params: 8-bytes@0x7fff508fff98 | result: xcbc-key@0x56080aee2f70 (16-bytes, EXTRACT_KEY_FROM_KEY) | xcbc: release tmp-key@0x56080aeea0c0 | PRF symkey interface: release key-key@0x56080aee47f0 | PRF symkey interface PRF aes_xcbc final-key@0x56080aee2f70 (size 16) | PRF symkey interface: key-key@0x56080aee2f70 (16-bytes, EXTRACT_KEY_FROM_KEY) | output: symkey-key@0x56080aee2f70 (16-bytes, EXTRACT_KEY_FROM_KEY) | RFC 4434 Test Case AES-XCBC-PRF-128 with 20-byte input (key length 10) extracting all 16 bytes of key@0x56080aee2f70 | RFC 4434 Test Case AES-XCBC-PRF-128 with 20-byte input (key length 10): symkey-key@0x56080aee2f70 (16-bytes, EXTRACT_KEY_FROM_KEY) | : ephemeral-key@0x56080ae63080 (16-bytes, AES_KEY_GEN) | RFC 4434 Test Case AES-XCBC-PRF-128 with 20-byte input (key length 10): new slot-key@0x56080aee6cc0 (16-bytes, EXTRACT_KEY_FROM_KEY) | sizeof bytes 16 | wrapper: (SECItemType)160858585: 48 ffffffca 66 54 ffffffbf 70 39 45 62 66 7f 48 ffffff97 31 3c 45 | RFC 4434 Test Case AES-XCBC-PRF-128 with 20-byte input (key length 10): release slot-key-key@0x56080aee6cc0 | RFC 4434 Test Case AES-XCBC-PRF-128 with 20-byte input (key length 10) extracted len 16 bytes at 0x56080aee60b0 | unwrapped: 0f a0 87 af 7d 86 6e 76 53 43 4e 60 2f dd e8 35 | verify_chunk_data: RFC 4434 Test Case AES-XCBC-PRF-128 with 20-byte input (key length 10): ok | test_prf_vector: RFC 4434 Test Case AES-XCBC-PRF-128 with 20-byte input (key length 10) passed | test_prf_vector: release symkey-key@0x56080aee2f70 | test_prf_vector: release message-key@0x56080aee8840 | test_prf_vector: release key-key@0x56080aee6f50 | test_prf_vector: release output-key@NULL RFC 4434 Test Case AES-XCBC-PRF-128 with 20-byte input (key length 18) | decode_to_chunk: test_prf_vector: input "0x000102030405060708090a0b0c0d0e0fedcb" | decode_to_chunk: output: | 00 01 02 03 04 05 06 07 08 09 0a 0b 0c 0d 0e 0f | ed cb | decode_to_chunk: test_prf_vector: input "0x000102030405060708090a0b0c0d0e0f10111213" | decode_to_chunk: output: | 00 01 02 03 04 05 06 07 08 09 0a 0b 0c 0d 0e 0f | 10 11 12 13 | decode_to_chunk: test_prf_vector: input "0x8cd3c93ae598a9803006ffb67c40e9e4" | decode_to_chunk: output: | 8c d3 c9 3a e5 98 a9 80 30 06 ff b6 7c 40 e9 e4 | PRF chunk interface PRF aes_xcbc init key-chunk@0x56080aee6290 (length 18) | 00 01 02 03 04 05 06 07 08 09 0a 0b 0c 0d 0e 0f | ed cb | : ephemeral-key@0x56080ae63080 (16-bytes, AES_KEY_GEN) | CONCATENATE_DATA_AND_BASE: | target: EXTRACT_KEY_FROM_KEY | base: base-key@0x56080ae63080 (16-bytes, AES_KEY_GEN) | params: 16-bytes@0x7fff508fffa0 | result: key-key@0x56080aee8840 (34-bytes, EXTRACT_KEY_FROM_KEY) | key-offset: 0, key-size: 18 | EXTRACT_KEY_FROM_KEY: | target: EXTRACT_KEY_FROM_KEY | key_size: 18-bytes | base: base-key@0x56080aee8840 (34-bytes, EXTRACT_KEY_FROM_KEY) | operation: FLAGS_ONLY | params: 8-bytes@0x7fff508fff88 | result: key-key@0x56080aee6f50 (18-bytes, EXTRACT_KEY_FROM_KEY) | key: release tmp-key@0x56080aee8840 | XCBC: Key 18>16 too big, rehashing to size | : ephemeral-key@0x56080ae63080 (16-bytes, AES_KEY_GEN) | CONCATENATE_DATA_AND_BASE: | target: EXTRACT_KEY_FROM_KEY | base: base-key@0x56080ae63080 (16-bytes, AES_KEY_GEN) | params: 16-bytes@0x7fff508fff40 | result: key-key@0x56080aee2f70 (32-bytes, EXTRACT_KEY_FROM_KEY) | key-offset: 0, key-size: 16 | EXTRACT_KEY_FROM_KEY: | target: AES_ECB | flags: SIGN | key_size: 16-bytes | base: base-key@0x56080aee2f70 (32-bytes, EXTRACT_KEY_FROM_KEY) | operation: FLAGS_ONLY | params: 8-bytes@0x7fff508fff28 | result: key-key@0x56080aee8840 (16-bytes, AES_ECB) | key: release tmp-key@0x56080aee2f70 | key extracting all 18 bytes of key@0x56080aee6f50 | key: symkey-key@0x56080aee6f50 (18-bytes, EXTRACT_KEY_FROM_KEY) | : ephemeral-key@0x56080ae63080 (16-bytes, AES_KEY_GEN) | key: new slot-key@0x56080aee6cc0 (18-bytes, EXTRACT_KEY_FROM_KEY) | sizeof bytes 32 | wrapper: (SECItemType)1701522796: ffffffa2 ffffffb2 fffffff8 fffffffd ffffffdf ffffffd3 ffffff96 11 31 ffffffb6 68 ffffffec ffffffbb ffffffca ffffffdb 14 6d 64 1c ffffffad ffffffff 18 ffffffec 4a 71 33 ffffffaa ffffff83 0b 3f 64 ffffffc4 | key: release slot-key-key@0x56080aee6cc0 | key extracted len 32 bytes at 0x56080aee6920 | unwrapped: 00 01 02 03 04 05 06 07 08 09 0a 0b 0c 0d 0e 0f | unwrapped: ed cb 00 00 00 00 00 00 00 00 00 00 00 00 00 00 | XCBC: data 00 01 02 03 04 05 06 07 08 09 0a 0b 0c 0d 0e 0f | XCBC: data ed cb | K extracting all 16 bytes of key@0x56080aee8840 | K: symkey-key@0x56080aee8840 (16-bytes, AES_ECB) | : ephemeral-key@0x56080ae63080 (16-bytes, AES_KEY_GEN) | K: new slot-key@0x56080aee6cc0 (16-bytes, AES_ECB) | sizeof bytes 16 | wrapper: (SECItemType)808460336: 74 ffffffda ffffffea ffffffa1 ffffffa0 ffffffd1 ffffffa2 ffffffa8 48 ffffffae ffffff97 ffffff94 7b 22 ffffff9d 2d | K: release slot-key-key@0x56080aee6cc0 | K extracted len 16 bytes at 0x56080aee62b0 | unwrapped: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 | XCBC: K: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 | XCBC: K1 e1 4d 5d 0e e2 77 15 df 08 b4 15 2b a2 3d a8 e0 | : ephemeral-key@0x56080ae63080 (16-bytes, AES_KEY_GEN) | CONCATENATE_DATA_AND_BASE: | target: EXTRACT_KEY_FROM_KEY | base: base-key@0x56080ae63080 (16-bytes, AES_KEY_GEN) | params: 16-bytes@0x7fff508ffec0 | result: k1-key@0x56080aee47f0 (32-bytes, EXTRACT_KEY_FROM_KEY) | key-offset: 0, key-size: 16 | EXTRACT_KEY_FROM_KEY: | target: AES_ECB | flags: SIGN | key_size: 16-bytes | base: base-key@0x56080aee47f0 (32-bytes, EXTRACT_KEY_FROM_KEY) | operation: FLAGS_ONLY | params: 8-bytes@0x7fff508ffea8 | result: k1-key@0x56080aee2f70 (16-bytes, AES_ECB) | k1: release tmp-key@0x56080aee47f0 | Computing E[2] using K3 | XCBC: K3 8d 34 ef cb 3b d5 45 ca 06 2a ec df ef 7c 0b fa | XCBC: E[n-1] 0b 72 b2 ae 0a 37 79 81 75 6a d5 9c 79 c0 e6 96 | XCBC: M[n] ed cb | XCBC: M[n] ed cb | XCBC: M[n]:80...^E[n-1]^K3 | 6b 8d dd 65 31 e2 3c 4b 73 40 39 43 96 bc ed 6c | XCBC: MAC 5d 93 a5 3b 80 a3 e4 06 90 d2 4c ea e1 44 9c 0e | xcbc: release k1-key@0x56080aee2f70 | : ephemeral-key@0x56080ae63080 (16-bytes, AES_KEY_GEN) | CONCATENATE_DATA_AND_BASE: | target: EXTRACT_KEY_FROM_KEY | base: base-key@0x56080ae63080 (16-bytes, AES_KEY_GEN) | params: 16-bytes@0x7fff508fff40 | result: key-key@0x56080aee47f0 (32-bytes, EXTRACT_KEY_FROM_KEY) | key-offset: 0, key-size: 16 | EXTRACT_KEY_FROM_KEY: | target: AES_ECB | flags: SIGN | key_size: 16-bytes | base: base-key@0x56080aee47f0 (32-bytes, EXTRACT_KEY_FROM_KEY) | operation: FLAGS_ONLY | params: 8-bytes@0x7fff508fff28 | result: key-key@0x56080aee2f70 (16-bytes, AES_ECB) | key: release tmp-key@0x56080aee47f0 | PRF chunk interface: release clone-key@0x56080aee6f50 | PRF chunk interface PRF aes_xcbc crypt-prf@0x56080aee1740 | PRF chunk interface PRF aes_xcbc update message-bytes@0x56080aee60b0 (length 20) | 00 01 02 03 04 05 06 07 08 09 0a 0b 0c 0d 0e 0f | 10 11 12 13 | XCBC: data 00 01 02 03 04 05 06 07 08 09 0a 0b 0c 0d 0e 0f | XCBC: data 10 11 12 13 | K extracting all 16 bytes of key@0x56080aee2f70 | K: symkey-key@0x56080aee2f70 (16-bytes, AES_ECB) | : ephemeral-key@0x56080ae63080 (16-bytes, AES_KEY_GEN) | K: new slot-key@0x56080aee6cc0 (16-bytes, AES_ECB) | sizeof bytes 16 | wrapper: (SECItemType)540618784: ffffffe3 ffffffcd 11 2e 7d 2a 3c 40 44 14 31 fffffff8 67 ffffffe7 27 24 | K: release slot-key-key@0x56080aee6cc0 | K extracted len 16 bytes at 0x56080aee6360 | unwrapped: 5d 93 a5 3b 80 a3 e4 06 90 d2 4c ea e1 44 9c 0e | XCBC: K: 5d 93 a5 3b 80 a3 e4 06 90 d2 4c ea e1 44 9c 0e | XCBC: K1 27 f3 88 2f b7 b9 4b a4 16 36 09 d5 d2 39 c5 7f | : ephemeral-key@0x56080ae63080 (16-bytes, AES_KEY_GEN) | CONCATENATE_DATA_AND_BASE: | target: EXTRACT_KEY_FROM_KEY | base: base-key@0x56080ae63080 (16-bytes, AES_KEY_GEN) | params: 16-bytes@0x7fff508fff00 | result: k1-key@0x56080aee47f0 (32-bytes, EXTRACT_KEY_FROM_KEY) | key-offset: 0, key-size: 16 | EXTRACT_KEY_FROM_KEY: | target: AES_ECB | flags: SIGN | key_size: 16-bytes | base: base-key@0x56080aee47f0 (32-bytes, EXTRACT_KEY_FROM_KEY) | operation: FLAGS_ONLY | params: 8-bytes@0x7fff508ffee8 | result: k1-key@0x56080aee6f50 (16-bytes, AES_ECB) | k1: release tmp-key@0x56080aee47f0 | Computing E[2] using K3 | XCBC: K3 50 9e d8 ae 74 5a 75 4c 93 4d 6c 91 98 fe e2 1b | XCBC: E[n-1] ec 26 f6 dd e8 bb 1b d1 ec 76 c4 91 78 37 ca 4b | XCBC: M[n] 10 11 12 13 | XCBC: M[n] 10 11 12 13 | XCBC: M[n]:80...^E[n-1]^K3 | ac a9 3c 60 1c e1 6e 9d 7f 3b a8 00 e0 c9 28 50 | XCBC: MAC 8c d3 c9 3a e5 98 a9 80 30 06 ff b6 7c 40 e9 e4 | xcbc: release k1-key@0x56080aee6f50 | PRF chunk interface: release key-key@0x56080aee2f70 | PRF chunk interface PRF aes_xcbc final-chunk@0x56080aee6d50 (length 16) | 8c d3 c9 3a e5 98 a9 80 30 06 ff b6 7c 40 e9 e4 | chunk output 8c d3 c9 3a e5 98 a9 80 30 06 ff b6 7c 40 e9 e4 | verify_chunk_data: RFC 4434 Test Case AES-XCBC-PRF-128 with 20-byte input (key length 18): ok | : ephemeral-key@0x56080ae63080 (16-bytes, AES_KEY_GEN) | CONCATENATE_DATA_AND_BASE: | target: EXTRACT_KEY_FROM_KEY | base: base-key@0x56080ae63080 (16-bytes, AES_KEY_GEN) | params: 16-bytes@0x7fff50900010 | result: key symkey-key@0x56080aee6f50 (34-bytes, EXTRACT_KEY_FROM_KEY) | key-offset: 0, key-size: 18 | EXTRACT_KEY_FROM_KEY: | target: EXTRACT_KEY_FROM_KEY | key_size: 18-bytes | base: base-key@0x56080aee6f50 (34-bytes, EXTRACT_KEY_FROM_KEY) | operation: FLAGS_ONLY | params: 8-bytes@0x7fff508ffff8 | result: key symkey-key@0x56080aee2f70 (18-bytes, EXTRACT_KEY_FROM_KEY) | key symkey: release tmp-key@0x56080aee6f50 | PRF symkey interface PRF aes_xcbc init key symkey-key@0x56080aee2f70 (size 18) | PRF symkey interface: key symkey-key@0x56080aee2f70 (18-bytes, EXTRACT_KEY_FROM_KEY) | XCBC: Key 18>16 too big, rehashing to size | : ephemeral-key@0x56080ae63080 (16-bytes, AES_KEY_GEN) | CONCATENATE_DATA_AND_BASE: | target: EXTRACT_KEY_FROM_KEY | base: base-key@0x56080ae63080 (16-bytes, AES_KEY_GEN) | params: 16-bytes@0x7fff508fff70 | result: key symkey-key@0x56080aee47f0 (32-bytes, EXTRACT_KEY_FROM_KEY) | key-offset: 0, key-size: 16 | EXTRACT_KEY_FROM_KEY: | target: AES_ECB | flags: SIGN | key_size: 16-bytes | base: base-key@0x56080aee47f0 (32-bytes, EXTRACT_KEY_FROM_KEY) | operation: FLAGS_ONLY | params: 8-bytes@0x7fff508fff58 | result: key symkey-key@0x56080aee6f50 (16-bytes, AES_ECB) | key symkey: release tmp-key@0x56080aee47f0 | key symkey extracting all 18 bytes of key@0x56080aee2f70 | key symkey: symkey-key@0x56080aee2f70 (18-bytes, EXTRACT_KEY_FROM_KEY) | : ephemeral-key@0x56080ae63080 (16-bytes, AES_KEY_GEN) | key symkey: new slot-key@0x56080aee6cc0 (18-bytes, EXTRACT_KEY_FROM_KEY) | sizeof bytes 32 | wrapper: (SECItemType)1701522796: ffffffa2 ffffffb2 fffffff8 fffffffd ffffffdf ffffffd3 ffffff96 11 31 ffffffb6 68 ffffffec ffffffbb ffffffca ffffffdb 14 6d 64 1c ffffffad ffffffff 18 ffffffec 4a 71 33 ffffffaa ffffff83 0b 3f 64 ffffffc4 | key symkey: release slot-key-key@0x56080aee6cc0 | key symkey extracted len 32 bytes at 0x56080aee6920 | unwrapped: 00 01 02 03 04 05 06 07 08 09 0a 0b 0c 0d 0e 0f | unwrapped: ed cb 00 00 00 00 00 00 00 00 00 00 00 00 00 00 | XCBC: data 00 01 02 03 04 05 06 07 08 09 0a 0b 0c 0d 0e 0f | XCBC: data ed cb | K extracting all 16 bytes of key@0x56080aee6f50 | K: symkey-key@0x56080aee6f50 (16-bytes, AES_ECB) | : ephemeral-key@0x56080ae63080 (16-bytes, AES_KEY_GEN) | K: new slot-key@0x56080aee6cc0 (16-bytes, AES_ECB) | sizeof bytes 16 | wrapper: (SECItemType)808460336: 74 ffffffda ffffffea ffffffa1 ffffffa0 ffffffd1 ffffffa2 ffffffa8 48 ffffffae ffffff97 ffffff94 7b 22 ffffff9d 2d | K: release slot-key-key@0x56080aee6cc0 | K extracted len 16 bytes at 0x56080aee1900 | unwrapped: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 | XCBC: K: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 | XCBC: K1 e1 4d 5d 0e e2 77 15 df 08 b4 15 2b a2 3d a8 e0 | : ephemeral-key@0x56080ae63080 (16-bytes, AES_KEY_GEN) | CONCATENATE_DATA_AND_BASE: | target: EXTRACT_KEY_FROM_KEY | base: base-key@0x56080ae63080 (16-bytes, AES_KEY_GEN) | params: 16-bytes@0x7fff508ffef0 | result: k1-key@0x56080aeea0c0 (32-bytes, EXTRACT_KEY_FROM_KEY) | key-offset: 0, key-size: 16 | EXTRACT_KEY_FROM_KEY: | target: AES_ECB | flags: SIGN | key_size: 16-bytes | base: base-key@0x56080aeea0c0 (32-bytes, EXTRACT_KEY_FROM_KEY) | operation: FLAGS_ONLY | params: 8-bytes@0x7fff508ffed8 | result: k1-key@0x56080aee47f0 (16-bytes, AES_ECB) | k1: release tmp-key@0x56080aeea0c0 | Computing E[2] using K3 | XCBC: K3 8d 34 ef cb 3b d5 45 ca 06 2a ec df ef 7c 0b fa | XCBC: E[n-1] 0b 72 b2 ae 0a 37 79 81 75 6a d5 9c 79 c0 e6 96 | XCBC: M[n] ed cb | XCBC: M[n] ed cb | XCBC: M[n]:80...^E[n-1]^K3 | 6b 8d dd 65 31 e2 3c 4b 73 40 39 43 96 bc ed 6c | XCBC: MAC 5d 93 a5 3b 80 a3 e4 06 90 d2 4c ea e1 44 9c 0e | xcbc: release k1-key@0x56080aee47f0 | : ephemeral-key@0x56080ae63080 (16-bytes, AES_KEY_GEN) | CONCATENATE_DATA_AND_BASE: | target: EXTRACT_KEY_FROM_KEY | base: base-key@0x56080ae63080 (16-bytes, AES_KEY_GEN) | params: 16-bytes@0x7fff508fff70 | result: key symkey-key@0x56080aeea0c0 (32-bytes, EXTRACT_KEY_FROM_KEY) | key-offset: 0, key-size: 16 | EXTRACT_KEY_FROM_KEY: | target: AES_ECB | flags: SIGN | key_size: 16-bytes | base: base-key@0x56080aeea0c0 (32-bytes, EXTRACT_KEY_FROM_KEY) | operation: FLAGS_ONLY | params: 8-bytes@0x7fff508fff58 | result: key symkey-key@0x56080aee47f0 (16-bytes, AES_ECB) | key symkey: release tmp-key@0x56080aeea0c0 | PRF symkey interface PRF aes_xcbc crypt-prf@0x56080aee64c0 | : ephemeral-key@0x56080ae63080 (16-bytes, AES_KEY_GEN) | CONCATENATE_DATA_AND_BASE: | target: EXTRACT_KEY_FROM_KEY | base: base-key@0x56080ae63080 (16-bytes, AES_KEY_GEN) | params: 16-bytes@0x7fff50900010 | result: message symkey-key@0x56080aeed4f0 (36-bytes, EXTRACT_KEY_FROM_KEY) | key-offset: 0, key-size: 20 | EXTRACT_KEY_FROM_KEY: | target: EXTRACT_KEY_FROM_KEY | key_size: 20-bytes | base: base-key@0x56080aeed4f0 (36-bytes, EXTRACT_KEY_FROM_KEY) | operation: FLAGS_ONLY | params: 8-bytes@0x7fff508ffff8 | result: message symkey-key@0x56080aeea0c0 (20-bytes, EXTRACT_KEY_FROM_KEY) | message symkey: release tmp-key@0x56080aeed4f0 | PRF symkey interface PRF aes_xcbc update symkey message-key@0x56080aeea0c0 (size 20) | PRF symkey interface: symkey message-key@0x56080aeea0c0 (20-bytes, EXTRACT_KEY_FROM_KEY) | symkey message extracting all 20 bytes of key@0x56080aeea0c0 | symkey message: symkey-key@0x56080aeea0c0 (20-bytes, EXTRACT_KEY_FROM_KEY) | : ephemeral-key@0x56080ae63080 (16-bytes, AES_KEY_GEN) | symkey message: new slot-key@0x56080aee6cc0 (20-bytes, EXTRACT_KEY_FROM_KEY) | sizeof bytes 32 | wrapper: (SECItemType)1351613424: ffffffa2 ffffffb2 fffffff8 fffffffd ffffffdf ffffffd3 ffffff96 11 31 ffffffb6 68 ffffffec ffffffbb ffffffca ffffffdb 14 6c ffffffe5 ffffffa2 20 fffffffa fffffff4 ffffffeb 59 ffffffe4 18 ffffffa9 23 ffffffdd 20 1c 0e | symkey message: release slot-key-key@0x56080aee6cc0 | symkey message extracted len 32 bytes at 0x56080aee6920 | unwrapped: 00 01 02 03 04 05 06 07 08 09 0a 0b 0c 0d 0e 0f | unwrapped: 10 11 12 13 00 00 00 00 00 00 00 00 00 00 00 00 | XCBC: data 00 01 02 03 04 05 06 07 08 09 0a 0b 0c 0d 0e 0f | XCBC: data 10 11 12 13 | K extracting all 16 bytes of key@0x56080aee47f0 | K: symkey-key@0x56080aee47f0 (16-bytes, AES_ECB) | : ephemeral-key@0x56080ae63080 (16-bytes, AES_KEY_GEN) | K: new slot-key@0x56080aee6cc0 (16-bytes, AES_ECB) | sizeof bytes 16 | wrapper: (SECItemType)1920429685: ffffffe3 ffffffcd 11 2e 7d 2a 3c 40 44 14 31 fffffff8 67 ffffffe7 27 24 | K: release slot-key-key@0x56080aee6cc0 | K extracted len 16 bytes at 0x56080aee1740 | unwrapped: 5d 93 a5 3b 80 a3 e4 06 90 d2 4c ea e1 44 9c 0e | XCBC: K: 5d 93 a5 3b 80 a3 e4 06 90 d2 4c ea e1 44 9c 0e | XCBC: K1 27 f3 88 2f b7 b9 4b a4 16 36 09 d5 d2 39 c5 7f | : ephemeral-key@0x56080ae63080 (16-bytes, AES_KEY_GEN) | CONCATENATE_DATA_AND_BASE: | target: EXTRACT_KEY_FROM_KEY | base: base-key@0x56080ae63080 (16-bytes, AES_KEY_GEN) | params: 16-bytes@0x7fff508fff20 | result: k1-key@0x56080aeef1b0 (32-bytes, EXTRACT_KEY_FROM_KEY) | key-offset: 0, key-size: 16 | EXTRACT_KEY_FROM_KEY: | target: AES_ECB | flags: SIGN | key_size: 16-bytes | base: base-key@0x56080aeef1b0 (32-bytes, EXTRACT_KEY_FROM_KEY) | operation: FLAGS_ONLY | params: 8-bytes@0x7fff508fff08 | result: k1-key@0x56080aeed4f0 (16-bytes, AES_ECB) | k1: release tmp-key@0x56080aeef1b0 | Computing E[2] using K3 | XCBC: K3 50 9e d8 ae 74 5a 75 4c 93 4d 6c 91 98 fe e2 1b | XCBC: E[n-1] ec 26 f6 dd e8 bb 1b d1 ec 76 c4 91 78 37 ca 4b | XCBC: M[n] 10 11 12 13 | XCBC: M[n] 10 11 12 13 | XCBC: M[n]:80...^E[n-1]^K3 | ac a9 3c 60 1c e1 6e 9d 7f 3b a8 00 e0 c9 28 50 | XCBC: MAC 8c d3 c9 3a e5 98 a9 80 30 06 ff b6 7c 40 e9 e4 | xcbc: release k1-key@0x56080aeed4f0 | : ephemeral-key@0x56080ae63080 (16-bytes, AES_KEY_GEN) | CONCATENATE_DATA_AND_BASE: | target: EXTRACT_KEY_FROM_KEY | base: base-key@0x56080ae63080 (16-bytes, AES_KEY_GEN) | params: 16-bytes@0x7fff508fffb0 | result: xcbc-key@0x56080aeef1b0 (32-bytes, EXTRACT_KEY_FROM_KEY) | key-offset: 0, key-size: 16 | EXTRACT_KEY_FROM_KEY: | target: EXTRACT_KEY_FROM_KEY | key_size: 16-bytes | base: base-key@0x56080aeef1b0 (32-bytes, EXTRACT_KEY_FROM_KEY) | operation: FLAGS_ONLY | params: 8-bytes@0x7fff508fff98 | result: xcbc-key@0x56080aeed4f0 (16-bytes, EXTRACT_KEY_FROM_KEY) | xcbc: release tmp-key@0x56080aeef1b0 | PRF symkey interface: release key-key@0x56080aee47f0 | PRF symkey interface PRF aes_xcbc final-key@0x56080aeed4f0 (size 16) | PRF symkey interface: key-key@0x56080aeed4f0 (16-bytes, EXTRACT_KEY_FROM_KEY) | output: symkey-key@0x56080aeed4f0 (16-bytes, EXTRACT_KEY_FROM_KEY) | RFC 4434 Test Case AES-XCBC-PRF-128 with 20-byte input (key length 18) extracting all 16 bytes of key@0x56080aeed4f0 | RFC 4434 Test Case AES-XCBC-PRF-128 with 20-byte input (key length 18): symkey-key@0x56080aeed4f0 (16-bytes, EXTRACT_KEY_FROM_KEY) | : ephemeral-key@0x56080ae63080 (16-bytes, AES_KEY_GEN) | RFC 4434 Test Case AES-XCBC-PRF-128 with 20-byte input (key length 18): new slot-key@0x56080aee6cc0 (16-bytes, EXTRACT_KEY_FROM_KEY) | sizeof bytes 16 | wrapper: (SECItemType)160858585: ffffffe7 ffffff9c 5b 48 ffffffcf ffffffda 6a ffffff8d 1a 2b 28 ffffffbe fffffffa 6b ffffffb5 02 | RFC 4434 Test Case AES-XCBC-PRF-128 with 20-byte input (key length 18): release slot-key-key@0x56080aee6cc0 | RFC 4434 Test Case AES-XCBC-PRF-128 with 20-byte input (key length 18) extracted len 16 bytes at 0x56080aee62b0 | unwrapped: 8c d3 c9 3a e5 98 a9 80 30 06 ff b6 7c 40 e9 e4 | verify_chunk_data: RFC 4434 Test Case AES-XCBC-PRF-128 with 20-byte input (key length 18): ok | test_prf_vector: RFC 4434 Test Case AES-XCBC-PRF-128 with 20-byte input (key length 18) passed | test_prf_vector: release symkey-key@0x56080aeed4f0 | test_prf_vector: release message-key@0x56080aeea0c0 | test_prf_vector: release key-key@0x56080aee2f70 | test_prf_vector: release output-key@NULL testing HMAC_MD5: RFC 2104: MD5_HMAC test 1 | decode_to_chunk: test_prf_vector: input "0x0b0b0b0b0b0b0b0b0b0b0b0b0b0b0b0b" | decode_to_chunk: output: | 0b 0b 0b 0b 0b 0b 0b 0b 0b 0b 0b 0b 0b 0b 0b 0b | decode_to_chunk: test_prf_vector: input "Hi There" | decode_to_chunk: output: | 48 69 20 54 68 65 72 65 | decode_to_chunk: test_prf_vector: input "0x9294727a3638bb1c13f48ef8158bfc9d" | decode_to_chunk: output: | 92 94 72 7a 36 38 bb 1c 13 f4 8e f8 15 8b fc 9d | PRF chunk interface PRF md5 init key-chunk@0x56080aee64c0 (length 16) | 0b 0b 0b 0b 0b 0b 0b 0b 0b 0b 0b 0b 0b 0b 0b 0b | : ephemeral-key@0x56080ae63080 (16-bytes, AES_KEY_GEN) | CONCATENATE_DATA_AND_BASE: | target: EXTRACT_KEY_FROM_KEY | base: base-key@0x56080ae63080 (16-bytes, AES_KEY_GEN) | params: 16-bytes@0x7fff508fff90 | result: PRF chunk interface-key@0x56080aeea0c0 (32-bytes, EXTRACT_KEY_FROM_KEY) | key-offset: 0, key-size: 16 | EXTRACT_KEY_FROM_KEY: | target: EXTRACT_KEY_FROM_KEY | key_size: 16-bytes | base: base-key@0x56080aeea0c0 (32-bytes, EXTRACT_KEY_FROM_KEY) | operation: FLAGS_ONLY | params: 8-bytes@0x7fff508fff78 | result: PRF chunk interface-key@0x56080aee2f70 (16-bytes, EXTRACT_KEY_FROM_KEY) | PRF chunk interface: release tmp-key@0x56080aeea0c0 | CONCATENATE_BASE_AND_DATA: | target: EXTRACT_KEY_FROM_KEY | base: base-key@0x56080aee2f70 (16-bytes, EXTRACT_KEY_FROM_KEY) | params: 16-bytes@0x7fff508ffed0 | result: trimed key-key@0x56080aeea0c0 (64-bytes, EXTRACT_KEY_FROM_KEY) | append_symkey_bytes: release lhs-key@0x56080aee2f70 | XOR_BASE_AND_DATA: | target: CONCATENATE_BASE_AND_DATA | base: base-key@0x56080aeea0c0 (64-bytes, EXTRACT_KEY_FROM_KEY) | params: 16-bytes@0x7fff508fff10 | result: result-key@0x56080aee2f70 (64-bytes, CONCATENATE_BASE_AND_DATA) | PRF chunk interface PRF md5 crypt-prf@0x56080aee6310 | PRF chunk interface PRF md5 update message-bytes@0x56080aee62b0 (length 8) | 48 69 20 54 68 65 72 65 | CONCATENATE_BASE_AND_DATA: | target: CONCATENATE_BASE_AND_DATA | base: base-key@0x56080aee2f70 (64-bytes, CONCATENATE_BASE_AND_DATA) | params: 16-bytes@0x7fff50900000 | result: message-key@0x56080aeed4f0 (72-bytes, CONCATENATE_BASE_AND_DATA) | append_symkey_bytes: release lhs-key@0x56080aee2f70 | PRF HMAC inner hash hash md5 inner-key@0x56080aeed4f0 (size 72) | PRF HMAC inner hash hash md5 init | PRF HMAC inner hash hash md5 digest inner-key@0x56080aeed4f0 (size 72) | PRF HMAC inner hash: inner-key@0x56080aeed4f0 (72-bytes, CONCATENATE_BASE_AND_DATA) | PRF HMAC inner hash hash md5 final chunk@0x56080aee6fe0 (length 16) | 90 1d 23 73 2e dc c0 f1 a1 06 53 2f 6b e5 ec eb | : ephemeral-key@0x56080ae63080 (16-bytes, AES_KEY_GEN) | CONCATENATE_DATA_AND_BASE: | target: EXTRACT_KEY_FROM_KEY | base: base-key@0x56080ae63080 (16-bytes, AES_KEY_GEN) | params: 16-bytes@0x7fff508ffe90 | result: PRF HMAC inner hash-key@0x56080aee47f0 (32-bytes, EXTRACT_KEY_FROM_KEY) | key-offset: 0, key-size: 16 | EXTRACT_KEY_FROM_KEY: | target: EXTRACT_KEY_FROM_KEY | key_size: 16-bytes | base: base-key@0x56080aee47f0 (32-bytes, EXTRACT_KEY_FROM_KEY) | operation: FLAGS_ONLY | params: 8-bytes@0x7fff508ffe78 | result: PRF HMAC inner hash-key@0x56080aee2f70 (16-bytes, EXTRACT_KEY_FROM_KEY) | PRF HMAC inner hash: release tmp-key@0x56080aee47f0 | PRF chunk interface: release inner-key@0x56080aeed4f0 | XOR_BASE_AND_DATA: | target: CONCATENATE_BASE_AND_DATA | base: base-key@0x56080aeea0c0 (64-bytes, EXTRACT_KEY_FROM_KEY) | params: 16-bytes@0x7fff508fff00 | result: result-key@0x56080aeed4f0 (64-bytes, CONCATENATE_BASE_AND_DATA) | CONCATENATE_BASE_AND_KEY: | target: CONCATENATE_BASE_AND_DATA | base: base-key@0x56080aeed4f0 (64-bytes, CONCATENATE_BASE_AND_DATA) | params: 8-bytes@0x7fff508ffee8 | result: result-key@0x56080aee47f0 (80-bytes, CONCATENATE_BASE_AND_DATA) | append_symkey_symkey: release lhs-key@0x56080aeed4f0 | PRF chunk interface: release hashed-inner-key@0x56080aee2f70 | PRF chunk interface: release key-key@0x56080aeea0c0 | PRF HMAC outer hash hash md5 init | PRF HMAC outer hash hash md5 digest outer-key@0x56080aee47f0 (size 80) | PRF HMAC outer hash: outer-key@0x56080aee47f0 (80-bytes, CONCATENATE_BASE_AND_DATA) | PRF HMAC outer hash hash md5 final bytes@0x56080aee1740 (length 16) | 92 94 72 7a 36 38 bb 1c 13 f4 8e f8 15 8b fc 9d | PRF chunk interface: release outer-key@0x56080aee47f0 | PRF chunk interface PRF md5 final-chunk@0x56080aee1740 (length 16) | 92 94 72 7a 36 38 bb 1c 13 f4 8e f8 15 8b fc 9d | chunk output 92 94 72 7a 36 38 bb 1c 13 f4 8e f8 15 8b fc 9d | verify_chunk_data: RFC 2104: MD5_HMAC test 1: ok | : ephemeral-key@0x56080ae63080 (16-bytes, AES_KEY_GEN) | CONCATENATE_DATA_AND_BASE: | target: EXTRACT_KEY_FROM_KEY | base: base-key@0x56080ae63080 (16-bytes, AES_KEY_GEN) | params: 16-bytes@0x7fff50900010 | result: key symkey-key@0x56080aeea0c0 (32-bytes, EXTRACT_KEY_FROM_KEY) | key-offset: 0, key-size: 16 | EXTRACT_KEY_FROM_KEY: | target: EXTRACT_KEY_FROM_KEY | key_size: 16-bytes | base: base-key@0x56080aeea0c0 (32-bytes, EXTRACT_KEY_FROM_KEY) | operation: FLAGS_ONLY | params: 8-bytes@0x7fff508ffff8 | result: key symkey-key@0x56080aee47f0 (16-bytes, EXTRACT_KEY_FROM_KEY) | key symkey: release tmp-key@0x56080aeea0c0 | PRF symkey interface PRF md5 init key symkey-key@0x56080aee47f0 (size 16) | PRF symkey interface: key symkey-key@0x56080aee47f0 (16-bytes, EXTRACT_KEY_FROM_KEY) | PRF symkey interface: reference key-key@0x56080aee47f0 | CONCATENATE_BASE_AND_DATA: | target: EXTRACT_KEY_FROM_KEY | base: base-key@0x56080aee47f0 (16-bytes, EXTRACT_KEY_FROM_KEY) | params: 16-bytes@0x7fff508ffed0 | result: trimed key-key@0x56080aeea0c0 (64-bytes, EXTRACT_KEY_FROM_KEY) | append_symkey_bytes: release lhs-key@0x56080aee47f0 | XOR_BASE_AND_DATA: | target: CONCATENATE_BASE_AND_DATA | base: base-key@0x56080aeea0c0 (64-bytes, EXTRACT_KEY_FROM_KEY) | params: 16-bytes@0x7fff508fff10 | result: result-key@0x56080aee2f70 (64-bytes, CONCATENATE_BASE_AND_DATA) | PRF symkey interface PRF md5 crypt-prf@0x56080aee6d50 | : ephemeral-key@0x56080ae63080 (16-bytes, AES_KEY_GEN) | CONCATENATE_DATA_AND_BASE: | target: EXTRACT_KEY_FROM_KEY | base: base-key@0x56080ae63080 (16-bytes, AES_KEY_GEN) | params: 16-bytes@0x7fff50900010 | result: message symkey-key@0x56080aeef1b0 (24-bytes, EXTRACT_KEY_FROM_KEY) | key-offset: 0, key-size: 8 | EXTRACT_KEY_FROM_KEY: | target: EXTRACT_KEY_FROM_KEY | key_size: 8-bytes | base: base-key@0x56080aeef1b0 (24-bytes, EXTRACT_KEY_FROM_KEY) | operation: FLAGS_ONLY | params: 8-bytes@0x7fff508ffff8 | result: message symkey-key@0x56080aeed4f0 (8-bytes, EXTRACT_KEY_FROM_KEY) | message symkey: release tmp-key@0x56080aeef1b0 | PRF symkey interface PRF md5 update symkey message-key@0x56080aeed4f0 (size 8) | PRF symkey interface: symkey message-key@0x56080aeed4f0 (8-bytes, EXTRACT_KEY_FROM_KEY) | CONCATENATE_BASE_AND_KEY: | target: CONCATENATE_BASE_AND_DATA | base: base-key@0x56080aee2f70 (64-bytes, CONCATENATE_BASE_AND_DATA) | params: 8-bytes@0x7fff50900028 | result: result-key@0x56080aeef1b0 (72-bytes, CONCATENATE_BASE_AND_DATA) | append_symkey_symkey: release lhs-key@0x56080aee2f70 | PRF HMAC inner hash hash md5 inner-key@0x56080aeef1b0 (size 72) | PRF HMAC inner hash hash md5 init | PRF HMAC inner hash hash md5 digest inner-key@0x56080aeef1b0 (size 72) | PRF HMAC inner hash: inner-key@0x56080aeef1b0 (72-bytes, CONCATENATE_BASE_AND_DATA) | PRF HMAC inner hash hash md5 final chunk@0x56080aee60b0 (length 16) | 90 1d 23 73 2e dc c0 f1 a1 06 53 2f 6b e5 ec eb | : ephemeral-key@0x56080ae63080 (16-bytes, AES_KEY_GEN) | CONCATENATE_DATA_AND_BASE: | target: EXTRACT_KEY_FROM_KEY | base: base-key@0x56080ae63080 (16-bytes, AES_KEY_GEN) | params: 16-bytes@0x7fff508ffeb0 | result: PRF HMAC inner hash-key@0x56080aef0b10 (32-bytes, EXTRACT_KEY_FROM_KEY) | key-offset: 0, key-size: 16 | EXTRACT_KEY_FROM_KEY: | target: EXTRACT_KEY_FROM_KEY | key_size: 16-bytes | base: base-key@0x56080aef0b10 (32-bytes, EXTRACT_KEY_FROM_KEY) | operation: FLAGS_ONLY | params: 8-bytes@0x7fff508ffe98 | result: PRF HMAC inner hash-key@0x56080aee2f70 (16-bytes, EXTRACT_KEY_FROM_KEY) | PRF HMAC inner hash: release tmp-key@0x56080aef0b10 | PRF symkey interface: release inner-key@0x56080aeef1b0 | XOR_BASE_AND_DATA: | target: CONCATENATE_BASE_AND_DATA | base: base-key@0x56080aeea0c0 (64-bytes, EXTRACT_KEY_FROM_KEY) | params: 16-bytes@0x7fff508fff20 | result: result-key@0x56080aeef1b0 (64-bytes, CONCATENATE_BASE_AND_DATA) | CONCATENATE_BASE_AND_KEY: | target: CONCATENATE_BASE_AND_DATA | base: base-key@0x56080aeef1b0 (64-bytes, CONCATENATE_BASE_AND_DATA) | params: 8-bytes@0x7fff508fff08 | result: result-key@0x56080aef0b10 (80-bytes, CONCATENATE_BASE_AND_DATA) | append_symkey_symkey: release lhs-key@0x56080aeef1b0 | PRF symkey interface: release hashed-inner-key@0x56080aee2f70 | PRF symkey interface: release key-key@0x56080aeea0c0 | PRF HMAC outer hash hash md5 outer-key@0x56080aef0b10 (size 80) | PRF HMAC outer hash hash md5 init | PRF HMAC outer hash hash md5 digest outer-key@0x56080aef0b10 (size 80) | PRF HMAC outer hash: outer-key@0x56080aef0b10 (80-bytes, CONCATENATE_BASE_AND_DATA) | PRF HMAC outer hash hash md5 final chunk@0x56080aee6fe0 (length 16) | 92 94 72 7a 36 38 bb 1c 13 f4 8e f8 15 8b fc 9d | : ephemeral-key@0x56080ae63080 (16-bytes, AES_KEY_GEN) | CONCATENATE_DATA_AND_BASE: | target: EXTRACT_KEY_FROM_KEY | base: base-key@0x56080ae63080 (16-bytes, AES_KEY_GEN) | params: 16-bytes@0x7fff508fff70 | result: PRF HMAC outer hash-key@0x56080aee2f70 (32-bytes, EXTRACT_KEY_FROM_KEY) | key-offset: 0, key-size: 16 | EXTRACT_KEY_FROM_KEY: | target: EXTRACT_KEY_FROM_KEY | key_size: 16-bytes | base: base-key@0x56080aee2f70 (32-bytes, EXTRACT_KEY_FROM_KEY) | operation: FLAGS_ONLY | params: 8-bytes@0x7fff508fff58 | result: PRF HMAC outer hash-key@0x56080aeea0c0 (16-bytes, EXTRACT_KEY_FROM_KEY) | PRF HMAC outer hash: release tmp-key@0x56080aee2f70 | PRF symkey interface: release outer-key@0x56080aef0b10 | : hashed-outer-key@0x56080aeea0c0 (16-bytes, EXTRACT_KEY_FROM_KEY) | PRF symkey interface PRF md5 final-key@0x56080aeea0c0 (size 16) | PRF symkey interface: key-key@0x56080aeea0c0 (16-bytes, EXTRACT_KEY_FROM_KEY) | output: symkey-key@0x56080aeea0c0 (16-bytes, EXTRACT_KEY_FROM_KEY) | RFC 2104: MD5_HMAC test 1 extracting all 16 bytes of key@0x56080aeea0c0 | RFC 2104: MD5_HMAC test 1: symkey-key@0x56080aeea0c0 (16-bytes, EXTRACT_KEY_FROM_KEY) | : ephemeral-key@0x56080ae63080 (16-bytes, AES_KEY_GEN) | RFC 2104: MD5_HMAC test 1: new slot-key@0x56080aee6cc0 (16-bytes, EXTRACT_KEY_FROM_KEY) | sizeof bytes 16 | wrapper: (SECItemType)160858585: 16 ffffffb2 ffffff8f ffffff86 25 ffffffec ffffffbc ffffffa7 ffffffe2 1a 74 ffffff98 ffffffdd ffffff91 16 79 | RFC 2104: MD5_HMAC test 1: release slot-key-key@0x56080aee6cc0 | RFC 2104: MD5_HMAC test 1 extracted len 16 bytes at 0x56080aee60b0 | unwrapped: 92 94 72 7a 36 38 bb 1c 13 f4 8e f8 15 8b fc 9d | verify_chunk_data: RFC 2104: MD5_HMAC test 1: ok | test_prf_vector: RFC 2104: MD5_HMAC test 1 passed | test_prf_vector: release symkey-key@0x56080aeea0c0 | test_prf_vector: release message-key@0x56080aeed4f0 | test_prf_vector: release key-key@0x56080aee47f0 | test_prf_vector: release output-key@NULL RFC 2104: MD5_HMAC test 2 | decode_to_chunk: test_prf_vector: input "Jefe" | decode_to_chunk: output: | 4a 65 66 65 | decode_to_chunk: test_prf_vector: input "what do ya want for nothing?" | decode_to_chunk: output: | 77 68 61 74 20 64 6f 20 79 61 20 77 61 6e 74 20 | 66 6f 72 20 6e 6f 74 68 69 6e 67 3f | decode_to_chunk: test_prf_vector: input "0x750c783e6ab0b503eaa86e310a5db738" | decode_to_chunk: output: | 75 0c 78 3e 6a b0 b5 03 ea a8 6e 31 0a 5d b7 38 | PRF chunk interface PRF md5 init key-chunk@0x56080aee6d50 (length 4) | 4a 65 66 65 | : ephemeral-key@0x56080ae63080 (16-bytes, AES_KEY_GEN) | CONCATENATE_DATA_AND_BASE: | target: EXTRACT_KEY_FROM_KEY | base: base-key@0x56080ae63080 (16-bytes, AES_KEY_GEN) | params: 16-bytes@0x7fff508fff90 | result: PRF chunk interface-key@0x56080aeed4f0 (20-bytes, EXTRACT_KEY_FROM_KEY) | key-offset: 0, key-size: 4 | EXTRACT_KEY_FROM_KEY: | target: EXTRACT_KEY_FROM_KEY | key_size: 4-bytes | base: base-key@0x56080aeed4f0 (20-bytes, EXTRACT_KEY_FROM_KEY) | operation: FLAGS_ONLY | params: 8-bytes@0x7fff508fff78 | result: PRF chunk interface-key@0x56080aee47f0 (4-bytes, EXTRACT_KEY_FROM_KEY) | PRF chunk interface: release tmp-key@0x56080aeed4f0 | CONCATENATE_BASE_AND_DATA: | target: EXTRACT_KEY_FROM_KEY | base: base-key@0x56080aee47f0 (4-bytes, EXTRACT_KEY_FROM_KEY) | params: 16-bytes@0x7fff508ffed0 | result: trimed key-key@0x56080aeed4f0 (64-bytes, EXTRACT_KEY_FROM_KEY) | append_symkey_bytes: release lhs-key@0x56080aee47f0 | XOR_BASE_AND_DATA: | target: CONCATENATE_BASE_AND_DATA | base: base-key@0x56080aeed4f0 (64-bytes, EXTRACT_KEY_FROM_KEY) | params: 16-bytes@0x7fff508fff10 | result: result-key@0x56080aee47f0 (64-bytes, CONCATENATE_BASE_AND_DATA) | PRF chunk interface PRF md5 crypt-prf@0x56080aee6fe0 | PRF chunk interface PRF md5 update message-bytes@0x56080aee6920 (length 28) | 77 68 61 74 20 64 6f 20 79 61 20 77 61 6e 74 20 | 66 6f 72 20 6e 6f 74 68 69 6e 67 3f | CONCATENATE_BASE_AND_DATA: | target: CONCATENATE_BASE_AND_DATA | base: base-key@0x56080aee47f0 (64-bytes, CONCATENATE_BASE_AND_DATA) | params: 16-bytes@0x7fff50900000 | result: message-key@0x56080aeea0c0 (92-bytes, CONCATENATE_BASE_AND_DATA) | append_symkey_bytes: release lhs-key@0x56080aee47f0 | PRF HMAC inner hash hash md5 inner-key@0x56080aeea0c0 (size 92) | PRF HMAC inner hash hash md5 init | PRF HMAC inner hash hash md5 digest inner-key@0x56080aeea0c0 (size 92) | PRF HMAC inner hash: inner-key@0x56080aeea0c0 (92-bytes, CONCATENATE_BASE_AND_DATA) | PRF HMAC inner hash hash md5 final chunk@0x56080aee1830 (length 16) | c3 db 14 c0 65 f5 52 03 b0 33 c8 1a 69 7b 97 c5 | : ephemeral-key@0x56080ae63080 (16-bytes, AES_KEY_GEN) | CONCATENATE_DATA_AND_BASE: | target: EXTRACT_KEY_FROM_KEY | base: base-key@0x56080ae63080 (16-bytes, AES_KEY_GEN) | params: 16-bytes@0x7fff508ffe90 | result: PRF HMAC inner hash-key@0x56080aef0b10 (32-bytes, EXTRACT_KEY_FROM_KEY) | key-offset: 0, key-size: 16 | EXTRACT_KEY_FROM_KEY: | target: EXTRACT_KEY_FROM_KEY | key_size: 16-bytes | base: base-key@0x56080aef0b10 (32-bytes, EXTRACT_KEY_FROM_KEY) | operation: FLAGS_ONLY | params: 8-bytes@0x7fff508ffe78 | result: PRF HMAC inner hash-key@0x56080aee47f0 (16-bytes, EXTRACT_KEY_FROM_KEY) | PRF HMAC inner hash: release tmp-key@0x56080aef0b10 | PRF chunk interface: release inner-key@0x56080aeea0c0 | XOR_BASE_AND_DATA: | target: CONCATENATE_BASE_AND_DATA | base: base-key@0x56080aeed4f0 (64-bytes, EXTRACT_KEY_FROM_KEY) | params: 16-bytes@0x7fff508fff00 | result: result-key@0x56080aeea0c0 (64-bytes, CONCATENATE_BASE_AND_DATA) | CONCATENATE_BASE_AND_KEY: | target: CONCATENATE_BASE_AND_DATA | base: base-key@0x56080aeea0c0 (64-bytes, CONCATENATE_BASE_AND_DATA) | params: 8-bytes@0x7fff508ffee8 | result: result-key@0x56080aef0b10 (80-bytes, CONCATENATE_BASE_AND_DATA) | append_symkey_symkey: release lhs-key@0x56080aeea0c0 | PRF chunk interface: release hashed-inner-key@0x56080aee47f0 | PRF chunk interface: release key-key@0x56080aeed4f0 | PRF HMAC outer hash hash md5 init | PRF HMAC outer hash hash md5 digest outer-key@0x56080aef0b10 (size 80) | PRF HMAC outer hash: outer-key@0x56080aef0b10 (80-bytes, CONCATENATE_BASE_AND_DATA) | PRF HMAC outer hash hash md5 final bytes@0x56080aeef310 (length 16) | 75 0c 78 3e 6a b0 b5 03 ea a8 6e 31 0a 5d b7 38 | PRF chunk interface: release outer-key@0x56080aef0b10 | PRF chunk interface PRF md5 final-chunk@0x56080aeef310 (length 16) | 75 0c 78 3e 6a b0 b5 03 ea a8 6e 31 0a 5d b7 38 | chunk output 75 0c 78 3e 6a b0 b5 03 ea a8 6e 31 0a 5d b7 38 | verify_chunk_data: RFC 2104: MD5_HMAC test 2: ok | : ephemeral-key@0x56080ae63080 (16-bytes, AES_KEY_GEN) | CONCATENATE_DATA_AND_BASE: | target: EXTRACT_KEY_FROM_KEY | base: base-key@0x56080ae63080 (16-bytes, AES_KEY_GEN) | params: 16-bytes@0x7fff50900010 | result: key symkey-key@0x56080aeed4f0 (20-bytes, EXTRACT_KEY_FROM_KEY) | key-offset: 0, key-size: 4 | EXTRACT_KEY_FROM_KEY: | target: EXTRACT_KEY_FROM_KEY | key_size: 4-bytes | base: base-key@0x56080aeed4f0 (20-bytes, EXTRACT_KEY_FROM_KEY) | operation: FLAGS_ONLY | params: 8-bytes@0x7fff508ffff8 | result: key symkey-key@0x56080aef0b10 (4-bytes, EXTRACT_KEY_FROM_KEY) | key symkey: release tmp-key@0x56080aeed4f0 | PRF symkey interface PRF md5 init key symkey-key@0x56080aef0b10 (size 4) | PRF symkey interface: key symkey-key@0x56080aef0b10 (4-bytes, EXTRACT_KEY_FROM_KEY) | PRF symkey interface: reference key-key@0x56080aef0b10 | CONCATENATE_BASE_AND_DATA: | target: EXTRACT_KEY_FROM_KEY | base: base-key@0x56080aef0b10 (4-bytes, EXTRACT_KEY_FROM_KEY) | params: 16-bytes@0x7fff508ffed0 | result: trimed key-key@0x56080aeed4f0 (64-bytes, EXTRACT_KEY_FROM_KEY) | append_symkey_bytes: release lhs-key@0x56080aef0b10 | XOR_BASE_AND_DATA: | target: CONCATENATE_BASE_AND_DATA | base: base-key@0x56080aeed4f0 (64-bytes, EXTRACT_KEY_FROM_KEY) | params: 16-bytes@0x7fff508fff10 | result: result-key@0x56080aee47f0 (64-bytes, CONCATENATE_BASE_AND_DATA) | PRF symkey interface PRF md5 crypt-prf@0x56080aee6fe0 | : ephemeral-key@0x56080ae63080 (16-bytes, AES_KEY_GEN) | CONCATENATE_DATA_AND_BASE: | target: EXTRACT_KEY_FROM_KEY | base: base-key@0x56080ae63080 (16-bytes, AES_KEY_GEN) | params: 16-bytes@0x7fff50900010 | result: message symkey-key@0x56080aee2f70 (44-bytes, EXTRACT_KEY_FROM_KEY) | key-offset: 0, key-size: 28 | EXTRACT_KEY_FROM_KEY: | target: EXTRACT_KEY_FROM_KEY | key_size: 28-bytes | base: base-key@0x56080aee2f70 (44-bytes, EXTRACT_KEY_FROM_KEY) | operation: FLAGS_ONLY | params: 8-bytes@0x7fff508ffff8 | result: message symkey-key@0x56080aeea0c0 (28-bytes, EXTRACT_KEY_FROM_KEY) | message symkey: release tmp-key@0x56080aee2f70 | PRF symkey interface PRF md5 update symkey message-key@0x56080aeea0c0 (size 28) | PRF symkey interface: symkey message-key@0x56080aeea0c0 (28-bytes, EXTRACT_KEY_FROM_KEY) | CONCATENATE_BASE_AND_KEY: | target: CONCATENATE_BASE_AND_DATA | base: base-key@0x56080aee47f0 (64-bytes, CONCATENATE_BASE_AND_DATA) | params: 8-bytes@0x7fff50900028 | result: result-key@0x56080aee2f70 (92-bytes, CONCATENATE_BASE_AND_DATA) | append_symkey_symkey: release lhs-key@0x56080aee47f0 | PRF HMAC inner hash hash md5 inner-key@0x56080aee2f70 (size 92) | PRF HMAC inner hash hash md5 init | PRF HMAC inner hash hash md5 digest inner-key@0x56080aee2f70 (size 92) | PRF HMAC inner hash: inner-key@0x56080aee2f70 (92-bytes, CONCATENATE_BASE_AND_DATA) | PRF HMAC inner hash hash md5 final chunk@0x56080aee6290 (length 16) | c3 db 14 c0 65 f5 52 03 b0 33 c8 1a 69 7b 97 c5 | : ephemeral-key@0x56080ae63080 (16-bytes, AES_KEY_GEN) | CONCATENATE_DATA_AND_BASE: | target: EXTRACT_KEY_FROM_KEY | base: base-key@0x56080ae63080 (16-bytes, AES_KEY_GEN) | params: 16-bytes@0x7fff508ffeb0 | result: PRF HMAC inner hash-key@0x56080aeef1b0 (32-bytes, EXTRACT_KEY_FROM_KEY) | key-offset: 0, key-size: 16 | EXTRACT_KEY_FROM_KEY: | target: EXTRACT_KEY_FROM_KEY | key_size: 16-bytes | base: base-key@0x56080aeef1b0 (32-bytes, EXTRACT_KEY_FROM_KEY) | operation: FLAGS_ONLY | params: 8-bytes@0x7fff508ffe98 | result: PRF HMAC inner hash-key@0x56080aee47f0 (16-bytes, EXTRACT_KEY_FROM_KEY) | PRF HMAC inner hash: release tmp-key@0x56080aeef1b0 | PRF symkey interface: release inner-key@0x56080aee2f70 | XOR_BASE_AND_DATA: | target: CONCATENATE_BASE_AND_DATA | base: base-key@0x56080aeed4f0 (64-bytes, EXTRACT_KEY_FROM_KEY) | params: 16-bytes@0x7fff508fff20 | result: result-key@0x56080aee2f70 (64-bytes, CONCATENATE_BASE_AND_DATA) | CONCATENATE_BASE_AND_KEY: | target: CONCATENATE_BASE_AND_DATA | base: base-key@0x56080aee2f70 (64-bytes, CONCATENATE_BASE_AND_DATA) | params: 8-bytes@0x7fff508fff08 | result: result-key@0x56080aeef1b0 (80-bytes, CONCATENATE_BASE_AND_DATA) | append_symkey_symkey: release lhs-key@0x56080aee2f70 | PRF symkey interface: release hashed-inner-key@0x56080aee47f0 | PRF symkey interface: release key-key@0x56080aeed4f0 | PRF HMAC outer hash hash md5 outer-key@0x56080aeef1b0 (size 80) | PRF HMAC outer hash hash md5 init | PRF HMAC outer hash hash md5 digest outer-key@0x56080aeef1b0 (size 80) | PRF HMAC outer hash: outer-key@0x56080aeef1b0 (80-bytes, CONCATENATE_BASE_AND_DATA) | PRF HMAC outer hash hash md5 final chunk@0x56080aee1900 (length 16) | 75 0c 78 3e 6a b0 b5 03 ea a8 6e 31 0a 5d b7 38 | : ephemeral-key@0x56080ae63080 (16-bytes, AES_KEY_GEN) | CONCATENATE_DATA_AND_BASE: | target: EXTRACT_KEY_FROM_KEY | base: base-key@0x56080ae63080 (16-bytes, AES_KEY_GEN) | params: 16-bytes@0x7fff508fff70 | result: PRF HMAC outer hash-key@0x56080aee47f0 (32-bytes, EXTRACT_KEY_FROM_KEY) | key-offset: 0, key-size: 16 | EXTRACT_KEY_FROM_KEY: | target: EXTRACT_KEY_FROM_KEY | key_size: 16-bytes | base: base-key@0x56080aee47f0 (32-bytes, EXTRACT_KEY_FROM_KEY) | operation: FLAGS_ONLY | params: 8-bytes@0x7fff508fff58 | result: PRF HMAC outer hash-key@0x56080aeed4f0 (16-bytes, EXTRACT_KEY_FROM_KEY) | PRF HMAC outer hash: release tmp-key@0x56080aee47f0 | PRF symkey interface: release outer-key@0x56080aeef1b0 | : hashed-outer-key@0x56080aeed4f0 (16-bytes, EXTRACT_KEY_FROM_KEY) | PRF symkey interface PRF md5 final-key@0x56080aeed4f0 (size 16) | PRF symkey interface: key-key@0x56080aeed4f0 (16-bytes, EXTRACT_KEY_FROM_KEY) | output: symkey-key@0x56080aeed4f0 (16-bytes, EXTRACT_KEY_FROM_KEY) | RFC 2104: MD5_HMAC test 2 extracting all 16 bytes of key@0x56080aeed4f0 | RFC 2104: MD5_HMAC test 2: symkey-key@0x56080aeed4f0 (16-bytes, EXTRACT_KEY_FROM_KEY) | : ephemeral-key@0x56080ae63080 (16-bytes, AES_KEY_GEN) | RFC 2104: MD5_HMAC test 2: new slot-key@0x56080aee6cc0 (16-bytes, EXTRACT_KEY_FROM_KEY) | sizeof bytes 16 | wrapper: (SECItemType)160858585: 73 72 ffffffa4 ffffff87 ffffffac ffffffa3 ffffffcc 33 ffffffa7 ffffffa5 20 23 34 2c fffffff3 ffffffcc | RFC 2104: MD5_HMAC test 2: release slot-key-key@0x56080aee6cc0 | RFC 2104: MD5_HMAC test 2 extracted len 16 bytes at 0x56080aee6290 | unwrapped: 75 0c 78 3e 6a b0 b5 03 ea a8 6e 31 0a 5d b7 38 | verify_chunk_data: RFC 2104: MD5_HMAC test 2: ok | test_prf_vector: RFC 2104: MD5_HMAC test 2 passed | test_prf_vector: release symkey-key@0x56080aeed4f0 | test_prf_vector: release message-key@0x56080aeea0c0 | test_prf_vector: release key-key@0x56080aef0b10 | test_prf_vector: release output-key@NULL RFC 2104: MD5_HMAC test 3 | decode_to_chunk: test_prf_vector: input "0xAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAA" | decode_to_chunk: output: | aa aa aa aa aa aa aa aa aa aa aa aa aa aa aa aa | decode_to_chunk: test_prf_vector: input "0xDDDDDDDDDDDDDDDDDDDDDDDDDDDDDDDDDDDDDDDDDDDDDDDDDDDDDDDDDDDDDDDDDDDDDDDDDDDDDDDDDDDDDDDDDDDDDDDDDDDD" | decode_to_chunk: output: | dd dd dd dd dd dd dd dd dd dd dd dd dd dd dd dd | dd dd dd dd dd dd dd dd dd dd dd dd dd dd dd dd | dd dd dd dd dd dd dd dd dd dd dd dd dd dd dd dd | dd dd | decode_to_chunk: test_prf_vector: input "0x56be34521d144c88dbb8c733f0e8b3f6" | decode_to_chunk: output: | 56 be 34 52 1d 14 4c 88 db b8 c7 33 f0 e8 b3 f6 | PRF chunk interface PRF md5 init key-chunk@0x56080aee6fe0 (length 16) | aa aa aa aa aa aa aa aa aa aa aa aa aa aa aa aa | : ephemeral-key@0x56080ae63080 (16-bytes, AES_KEY_GEN) | CONCATENATE_DATA_AND_BASE: | target: EXTRACT_KEY_FROM_KEY | base: base-key@0x56080ae63080 (16-bytes, AES_KEY_GEN) | params: 16-bytes@0x7fff508fff90 | result: PRF chunk interface-key@0x56080aeea0c0 (32-bytes, EXTRACT_KEY_FROM_KEY) | key-offset: 0, key-size: 16 | EXTRACT_KEY_FROM_KEY: | target: EXTRACT_KEY_FROM_KEY | key_size: 16-bytes | base: base-key@0x56080aeea0c0 (32-bytes, EXTRACT_KEY_FROM_KEY) | operation: FLAGS_ONLY | params: 8-bytes@0x7fff508fff78 | result: PRF chunk interface-key@0x56080aef0b10 (16-bytes, EXTRACT_KEY_FROM_KEY) | PRF chunk interface: release tmp-key@0x56080aeea0c0 | CONCATENATE_BASE_AND_DATA: | target: EXTRACT_KEY_FROM_KEY | base: base-key@0x56080aef0b10 (16-bytes, EXTRACT_KEY_FROM_KEY) | params: 16-bytes@0x7fff508ffed0 | result: trimed key-key@0x56080aeea0c0 (64-bytes, EXTRACT_KEY_FROM_KEY) | append_symkey_bytes: release lhs-key@0x56080aef0b10 | XOR_BASE_AND_DATA: | target: CONCATENATE_BASE_AND_DATA | base: base-key@0x56080aeea0c0 (64-bytes, EXTRACT_KEY_FROM_KEY) | params: 16-bytes@0x7fff508fff10 | result: result-key@0x56080aef0b10 (64-bytes, CONCATENATE_BASE_AND_DATA) | PRF chunk interface PRF md5 crypt-prf@0x56080aee1900 | PRF chunk interface PRF md5 update message-bytes@0x56080aee62d0 (length 50) | dd dd dd dd dd dd dd dd dd dd dd dd dd dd dd dd | dd dd dd dd dd dd dd dd dd dd dd dd dd dd dd dd | dd dd dd dd dd dd dd dd dd dd dd dd dd dd dd dd | dd dd | CONCATENATE_BASE_AND_DATA: | target: CONCATENATE_BASE_AND_DATA | base: base-key@0x56080aef0b10 (64-bytes, CONCATENATE_BASE_AND_DATA) | params: 16-bytes@0x7fff50900000 | result: message-key@0x56080aeed4f0 (114-bytes, CONCATENATE_BASE_AND_DATA) | append_symkey_bytes: release lhs-key@0x56080aef0b10 | PRF HMAC inner hash hash md5 inner-key@0x56080aeed4f0 (size 114) | PRF HMAC inner hash hash md5 init | PRF HMAC inner hash hash md5 digest inner-key@0x56080aeed4f0 (size 114) | PRF HMAC inner hash: inner-key@0x56080aeed4f0 (114-bytes, CONCATENATE_BASE_AND_DATA) | PRF HMAC inner hash hash md5 final chunk@0x56080aee64c0 (length 16) | 82 0a 6b 33 5d 18 7b 90 dc ba b1 7e f5 b4 26 ff | : ephemeral-key@0x56080ae63080 (16-bytes, AES_KEY_GEN) | CONCATENATE_DATA_AND_BASE: | target: EXTRACT_KEY_FROM_KEY | base: base-key@0x56080ae63080 (16-bytes, AES_KEY_GEN) | params: 16-bytes@0x7fff508ffe90 | result: PRF HMAC inner hash-key@0x56080aeef1b0 (32-bytes, EXTRACT_KEY_FROM_KEY) | key-offset: 0, key-size: 16 | EXTRACT_KEY_FROM_KEY: | target: EXTRACT_KEY_FROM_KEY | key_size: 16-bytes | base: base-key@0x56080aeef1b0 (32-bytes, EXTRACT_KEY_FROM_KEY) | operation: FLAGS_ONLY | params: 8-bytes@0x7fff508ffe78 | result: PRF HMAC inner hash-key@0x56080aef0b10 (16-bytes, EXTRACT_KEY_FROM_KEY) | PRF HMAC inner hash: release tmp-key@0x56080aeef1b0 | PRF chunk interface: release inner-key@0x56080aeed4f0 | XOR_BASE_AND_DATA: | target: CONCATENATE_BASE_AND_DATA | base: base-key@0x56080aeea0c0 (64-bytes, EXTRACT_KEY_FROM_KEY) | params: 16-bytes@0x7fff508fff00 | result: result-key@0x56080aeed4f0 (64-bytes, CONCATENATE_BASE_AND_DATA) | CONCATENATE_BASE_AND_KEY: | target: CONCATENATE_BASE_AND_DATA | base: base-key@0x56080aeed4f0 (64-bytes, CONCATENATE_BASE_AND_DATA) | params: 8-bytes@0x7fff508ffee8 | result: result-key@0x56080aeef1b0 (80-bytes, CONCATENATE_BASE_AND_DATA) | append_symkey_symkey: release lhs-key@0x56080aeed4f0 | PRF chunk interface: release hashed-inner-key@0x56080aef0b10 | PRF chunk interface: release key-key@0x56080aeea0c0 | PRF HMAC outer hash hash md5 init | PRF HMAC outer hash hash md5 digest outer-key@0x56080aeef1b0 (size 80) | PRF HMAC outer hash: outer-key@0x56080aeef1b0 (80-bytes, CONCATENATE_BASE_AND_DATA) | PRF HMAC outer hash hash md5 final bytes@0x56080aee1830 (length 16) | 56 be 34 52 1d 14 4c 88 db b8 c7 33 f0 e8 b3 f6 | PRF chunk interface: release outer-key@0x56080aeef1b0 | PRF chunk interface PRF md5 final-chunk@0x56080aee1830 (length 16) | 56 be 34 52 1d 14 4c 88 db b8 c7 33 f0 e8 b3 f6 | chunk output 56 be 34 52 1d 14 4c 88 db b8 c7 33 f0 e8 b3 f6 | verify_chunk_data: RFC 2104: MD5_HMAC test 3: ok | : ephemeral-key@0x56080ae63080 (16-bytes, AES_KEY_GEN) | CONCATENATE_DATA_AND_BASE: | target: EXTRACT_KEY_FROM_KEY | base: base-key@0x56080ae63080 (16-bytes, AES_KEY_GEN) | params: 16-bytes@0x7fff50900010 | result: key symkey-key@0x56080aeea0c0 (32-bytes, EXTRACT_KEY_FROM_KEY) | key-offset: 0, key-size: 16 | EXTRACT_KEY_FROM_KEY: | target: EXTRACT_KEY_FROM_KEY | key_size: 16-bytes | base: base-key@0x56080aeea0c0 (32-bytes, EXTRACT_KEY_FROM_KEY) | operation: FLAGS_ONLY | params: 8-bytes@0x7fff508ffff8 | result: key symkey-key@0x56080aeef1b0 (16-bytes, EXTRACT_KEY_FROM_KEY) | key symkey: release tmp-key@0x56080aeea0c0 | PRF symkey interface PRF md5 init key symkey-key@0x56080aeef1b0 (size 16) | PRF symkey interface: key symkey-key@0x56080aeef1b0 (16-bytes, EXTRACT_KEY_FROM_KEY) | PRF symkey interface: reference key-key@0x56080aeef1b0 | CONCATENATE_BASE_AND_DATA: | target: EXTRACT_KEY_FROM_KEY | base: base-key@0x56080aeef1b0 (16-bytes, EXTRACT_KEY_FROM_KEY) | params: 16-bytes@0x7fff508ffed0 | result: trimed key-key@0x56080aeea0c0 (64-bytes, EXTRACT_KEY_FROM_KEY) | append_symkey_bytes: release lhs-key@0x56080aeef1b0 | XOR_BASE_AND_DATA: | target: CONCATENATE_BASE_AND_DATA | base: base-key@0x56080aeea0c0 (64-bytes, EXTRACT_KEY_FROM_KEY) | params: 16-bytes@0x7fff508fff10 | result: result-key@0x56080aef0b10 (64-bytes, CONCATENATE_BASE_AND_DATA) | PRF symkey interface PRF md5 crypt-prf@0x56080aee1900 | : ephemeral-key@0x56080ae63080 (16-bytes, AES_KEY_GEN) | CONCATENATE_DATA_AND_BASE: | target: EXTRACT_KEY_FROM_KEY | base: base-key@0x56080ae63080 (16-bytes, AES_KEY_GEN) | params: 16-bytes@0x7fff50900010 | result: message symkey-key@0x56080aee47f0 (66-bytes, EXTRACT_KEY_FROM_KEY) | key-offset: 0, key-size: 50 | EXTRACT_KEY_FROM_KEY: | target: EXTRACT_KEY_FROM_KEY | key_size: 50-bytes | base: base-key@0x56080aee47f0 (66-bytes, EXTRACT_KEY_FROM_KEY) | operation: FLAGS_ONLY | params: 8-bytes@0x7fff508ffff8 | result: message symkey-key@0x56080aeed4f0 (50-bytes, EXTRACT_KEY_FROM_KEY) | message symkey: release tmp-key@0x56080aee47f0 | PRF symkey interface PRF md5 update symkey message-key@0x56080aeed4f0 (size 50) | PRF symkey interface: symkey message-key@0x56080aeed4f0 (50-bytes, EXTRACT_KEY_FROM_KEY) | CONCATENATE_BASE_AND_KEY: | target: CONCATENATE_BASE_AND_DATA | base: base-key@0x56080aef0b10 (64-bytes, CONCATENATE_BASE_AND_DATA) | params: 8-bytes@0x7fff50900028 | result: result-key@0x56080aee47f0 (114-bytes, CONCATENATE_BASE_AND_DATA) | append_symkey_symkey: release lhs-key@0x56080aef0b10 | PRF HMAC inner hash hash md5 inner-key@0x56080aee47f0 (size 114) | PRF HMAC inner hash hash md5 init | PRF HMAC inner hash hash md5 digest inner-key@0x56080aee47f0 (size 114) | PRF HMAC inner hash: inner-key@0x56080aee47f0 (114-bytes, CONCATENATE_BASE_AND_DATA) | PRF HMAC inner hash hash md5 final chunk@0x56080aee6360 (length 16) | 82 0a 6b 33 5d 18 7b 90 dc ba b1 7e f5 b4 26 ff | : ephemeral-key@0x56080ae63080 (16-bytes, AES_KEY_GEN) | CONCATENATE_DATA_AND_BASE: | target: EXTRACT_KEY_FROM_KEY | base: base-key@0x56080ae63080 (16-bytes, AES_KEY_GEN) | params: 16-bytes@0x7fff508ffeb0 | result: PRF HMAC inner hash-key@0x56080aee2f70 (32-bytes, EXTRACT_KEY_FROM_KEY) | key-offset: 0, key-size: 16 | EXTRACT_KEY_FROM_KEY: | target: EXTRACT_KEY_FROM_KEY | key_size: 16-bytes | base: base-key@0x56080aee2f70 (32-bytes, EXTRACT_KEY_FROM_KEY) | operation: FLAGS_ONLY | params: 8-bytes@0x7fff508ffe98 | result: PRF HMAC inner hash-key@0x56080aef0b10 (16-bytes, EXTRACT_KEY_FROM_KEY) | PRF HMAC inner hash: release tmp-key@0x56080aee2f70 | PRF symkey interface: release inner-key@0x56080aee47f0 | XOR_BASE_AND_DATA: | target: CONCATENATE_BASE_AND_DATA | base: base-key@0x56080aeea0c0 (64-bytes, EXTRACT_KEY_FROM_KEY) | params: 16-bytes@0x7fff508fff20 | result: result-key@0x56080aee47f0 (64-bytes, CONCATENATE_BASE_AND_DATA) | CONCATENATE_BASE_AND_KEY: | target: CONCATENATE_BASE_AND_DATA | base: base-key@0x56080aee47f0 (64-bytes, CONCATENATE_BASE_AND_DATA) | params: 8-bytes@0x7fff508fff08 | result: result-key@0x56080aee2f70 (80-bytes, CONCATENATE_BASE_AND_DATA) | append_symkey_symkey: release lhs-key@0x56080aee47f0 | PRF symkey interface: release hashed-inner-key@0x56080aef0b10 | PRF symkey interface: release key-key@0x56080aeea0c0 | PRF HMAC outer hash hash md5 outer-key@0x56080aee2f70 (size 80) | PRF HMAC outer hash hash md5 init | PRF HMAC outer hash hash md5 digest outer-key@0x56080aee2f70 (size 80) | PRF HMAC outer hash: outer-key@0x56080aee2f70 (80-bytes, CONCATENATE_BASE_AND_DATA) | PRF HMAC outer hash hash md5 final chunk@0x56080aee62b0 (length 16) | 56 be 34 52 1d 14 4c 88 db b8 c7 33 f0 e8 b3 f6 | : ephemeral-key@0x56080ae63080 (16-bytes, AES_KEY_GEN) | CONCATENATE_DATA_AND_BASE: | target: EXTRACT_KEY_FROM_KEY | base: base-key@0x56080ae63080 (16-bytes, AES_KEY_GEN) | params: 16-bytes@0x7fff508fff70 | result: PRF HMAC outer hash-key@0x56080aef0b10 (32-bytes, EXTRACT_KEY_FROM_KEY) | key-offset: 0, key-size: 16 | EXTRACT_KEY_FROM_KEY: | target: EXTRACT_KEY_FROM_KEY | key_size: 16-bytes | base: base-key@0x56080aef0b10 (32-bytes, EXTRACT_KEY_FROM_KEY) | operation: FLAGS_ONLY | params: 8-bytes@0x7fff508fff58 | result: PRF HMAC outer hash-key@0x56080aeea0c0 (16-bytes, EXTRACT_KEY_FROM_KEY) | PRF HMAC outer hash: release tmp-key@0x56080aef0b10 | PRF symkey interface: release outer-key@0x56080aee2f70 | : hashed-outer-key@0x56080aeea0c0 (16-bytes, EXTRACT_KEY_FROM_KEY) | PRF symkey interface PRF md5 final-key@0x56080aeea0c0 (size 16) | PRF symkey interface: key-key@0x56080aeea0c0 (16-bytes, EXTRACT_KEY_FROM_KEY) | output: symkey-key@0x56080aeea0c0 (16-bytes, EXTRACT_KEY_FROM_KEY) | RFC 2104: MD5_HMAC test 3 extracting all 16 bytes of key@0x56080aeea0c0 | RFC 2104: MD5_HMAC test 3: symkey-key@0x56080aeea0c0 (16-bytes, EXTRACT_KEY_FROM_KEY) | : ephemeral-key@0x56080ae63080 (16-bytes, AES_KEY_GEN) | RFC 2104: MD5_HMAC test 3: new slot-key@0x56080aee6cc0 (16-bytes, EXTRACT_KEY_FROM_KEY) | sizeof bytes 16 | wrapper: (SECItemType)160858585: 6c 14 3e 02 ffffffed ffffff9c ffffff8e 73 ffffff91 0e ffffffe8 23 ffffffca ffffffa1 18 ffffffe1 | RFC 2104: MD5_HMAC test 3: release slot-key-key@0x56080aee6cc0 | RFC 2104: MD5_HMAC test 3 extracted len 16 bytes at 0x56080aee6360 | unwrapped: 56 be 34 52 1d 14 4c 88 db b8 c7 33 f0 e8 b3 f6 | verify_chunk_data: RFC 2104: MD5_HMAC test 3: ok | test_prf_vector: RFC 2104: MD5_HMAC test 3 passed | test_prf_vector: release symkey-key@0x56080aeea0c0 | test_prf_vector: release message-key@0x56080aeed4f0 | test_prf_vector: release key-key@0x56080aeef1b0 | test_prf_vector: release output-key@NULL 8 CPU cores online starting up 7 crypto helpers started thread for crypto helper 0 started thread for crypto helper 1 started thread for crypto helper 2 started thread for crypto helper 3 started thread for crypto helper 4 started thread for crypto helper 5 started thread for crypto helper 6 | checking IKEv1 state table | MAIN_R0: category: half-open IKE SA flags: 0: | -> MAIN_R1 EVENT_SO_DISCARD | MAIN_I1: category: half-open IKE SA flags: 0: | -> MAIN_I2 EVENT_RETRANSMIT | MAIN_R1: category: open IKE SA flags: 200: | -> MAIN_R2 EVENT_RETRANSMIT | -> UNDEFINED EVENT_RETRANSMIT | -> UNDEFINED EVENT_RETRANSMIT | MAIN_I2: category: open IKE SA flags: 0: | -> MAIN_I3 EVENT_RETRANSMIT | -> UNDEFINED EVENT_RETRANSMIT | -> UNDEFINED EVENT_RETRANSMIT | MAIN_R2: category: open IKE SA flags: 0: | -> MAIN_R3 EVENT_SA_REPLACE | -> MAIN_R3 EVENT_SA_REPLACE | -> UNDEFINED EVENT_SA_REPLACE | MAIN_I3: category: open IKE SA flags: 0: | -> MAIN_I4 EVENT_SA_REPLACE | -> MAIN_I4 EVENT_SA_REPLACE | -> UNDEFINED EVENT_SA_REPLACE | MAIN_R3: category: established IKE SA flags: 200: | -> UNDEFINED EVENT_NULL | MAIN_I4: category: established IKE SA flags: 0: | -> UNDEFINED EVENT_NULL | AGGR_R0: category: half-open IKE SA flags: 0: | -> AGGR_R1 EVENT_SO_DISCARD | AGGR_I1: category: half-open IKE SA flags: 0: | -> AGGR_I2 EVENT_SA_REPLACE | -> AGGR_I2 EVENT_SA_REPLACE | AGGR_R1: category: open IKE SA flags: 200: | -> AGGR_R2 EVENT_SA_REPLACE | -> AGGR_R2 EVENT_SA_REPLACE | AGGR_I2: category: established IKE SA flags: 200: | -> UNDEFINED EVENT_NULL | AGGR_R2: category: established IKE SA flags: 0: | -> UNDEFINED EVENT_NULL | QUICK_R0: category: established CHILD SA flags: 0: | -> QUICK_R1 EVENT_RETRANSMIT | QUICK_I1: category: established CHILD SA flags: 0: | -> QUICK_I2 EVENT_SA_REPLACE | QUICK_R1: category: established CHILD SA flags: 0: | -> QUICK_R2 EVENT_SA_REPLACE | QUICK_I2: category: established CHILD SA flags: 200: | -> UNDEFINED EVENT_NULL | QUICK_R2: category: established CHILD SA flags: 0: | -> UNDEFINED EVENT_NULL | INFO: category: informational flags: 0: | -> UNDEFINED EVENT_NULL | INFO_PROTECTED: category: informational flags: 0: | -> UNDEFINED EVENT_NULL | XAUTH_R0: category: established IKE SA flags: 0: | -> XAUTH_R1 EVENT_NULL | XAUTH_R1: category: established IKE SA flags: 0: | -> MAIN_R3 EVENT_SA_REPLACE | MODE_CFG_R0: category: informational flags: 0: | -> MODE_CFG_R1 EVENT_SA_REPLACE | MODE_CFG_R1: category: established IKE SA flags: 0: | -> MODE_CFG_R2 EVENT_SA_REPLACE | MODE_CFG_R2: category: established IKE SA flags: 0: | -> UNDEFINED EVENT_NULL | MODE_CFG_I1: category: established IKE SA flags: 0: | -> MAIN_I4 EVENT_SA_REPLACE | XAUTH_I0: category: established IKE SA flags: 0: | -> XAUTH_I1 EVENT_RETRANSMIT | XAUTH_I1: category: established IKE SA flags: 0: | -> MAIN_I4 EVENT_RETRANSMIT | checking IKEv2 state table | PARENT_I0: category: ignore flags: 0: | -> PARENT_I1 EVENT_RETRANSMIT send-request (initiate IKE_SA_INIT) | PARENT_I1: category: half-open IKE SA flags: 0: | -> PARENT_I1 EVENT_RETAIN send-request (Initiator: process SA_INIT reply notification) | -> PARENT_I2 EVENT_RETRANSMIT send-request (Initiator: process IKE_SA_INIT reply, initiate IKE_AUTH) | PARENT_I2: category: open IKE SA flags: 0: | -> PARENT_I2 EVENT_NULL (Initiator: process INVALID_SYNTAX AUTH notification) | -> PARENT_I2 EVENT_NULL (Initiator: process AUTHENTICATION_FAILED AUTH notification) | -> PARENT_I2 EVENT_NULL (Initiator: process UNSUPPORTED_CRITICAL_PAYLOAD AUTH notification) | -> V2_IPSEC_I EVENT_SA_REPLACE (Initiator: process IKE_AUTH response) | -> PARENT_I2 EVENT_NULL (IKE SA: process IKE_AUTH response containing unknown notification) | PARENT_I3: category: established IKE SA flags: 0: | -> PARENT_I3 EVENT_RETAIN (I3: Informational Request) | -> PARENT_I3 EVENT_RETAIN (I3: Informational Response) | -> PARENT_I3 EVENT_RETAIN (I3: INFORMATIONAL Request) | -> PARENT_I3 EVENT_RETAIN (I3: INFORMATIONAL Response) | PARENT_R0: category: half-open IKE SA flags: 0: | -> PARENT_R1 EVENT_SO_DISCARD send-request (Respond to IKE_SA_INIT) | PARENT_R1: category: half-open IKE SA flags: 0: | -> PARENT_R1 EVENT_SA_REPLACE send-request (Responder: process IKE_AUTH request (no SKEYSEED)) | -> V2_IPSEC_R EVENT_SA_REPLACE send-request (Responder: process IKE_AUTH request) | PARENT_R2: category: established IKE SA flags: 0: | -> PARENT_R2 EVENT_RETAIN (R2: process Informational Request) | -> PARENT_R2 EVENT_RETAIN (R2: process Informational Response) | -> PARENT_R2 EVENT_RETAIN (R2: process INFORMATIONAL Request) | -> PARENT_R2 EVENT_RETAIN (R2: process INFORMATIONAL Response) | V2_CREATE_I0: category: established IKE SA flags: 0: | -> V2_CREATE_I EVENT_RETRANSMIT send-request (Initiate CREATE_CHILD_SA IPsec SA) | V2_CREATE_I: category: established IKE SA flags: 0: | -> V2_IPSEC_I EVENT_SA_REPLACE (Process CREATE_CHILD_SA IPsec SA Response) | V2_REKEY_IKE_I0: category: established IKE SA flags: 0: | -> V2_REKEY_IKE_I EVENT_RETRANSMIT send-request (Initiate CREATE_CHILD_SA IKE Rekey) | V2_REKEY_IKE_I: category: established IKE SA flags: 0: | -> PARENT_I3 EVENT_SA_REPLACE (Process CREATE_CHILD_SA IKE Rekey Response) | V2_REKEY_CHILD_I0: category: established IKE SA flags: 0: | -> V2_REKEY_CHILD_I EVENT_RETRANSMIT send-request (Initiate CREATE_CHILD_SA IPsec Rekey SA) | V2_REKEY_CHILD_I: category: established IKE SA flags: 0: | V2_CREATE_R: category: established IKE SA flags: 0: | -> V2_IPSEC_R EVENT_SA_REPLACE send-request (Respond to CREATE_CHILD_SA IPsec SA Request) | V2_REKEY_IKE_R: category: established IKE SA flags: 0: | -> PARENT_R2 EVENT_SA_REPLACE send-request (Respond to CREATE_CHILD_SA IKE Rekey) | V2_REKEY_CHILD_R: category: established IKE SA flags: 0: | V2_IPSEC_I: category: established CHILD SA flags: 0: | V2_IPSEC_R: category: established CHILD SA flags: 0: | IKESA_DEL: category: established IKE SA flags: 0: | -> IKESA_DEL EVENT_RETAIN (IKE_SA_DEL: process INFORMATIONAL) | CHILDSA_DEL: category: informational flags: 0: Using Linux XFRM/NETKEY IPsec interface code on 5.2.11+ | Hard-wiring algorithms | adding AES_CCM_16 to kernel algorithm db | adding AES_CCM_12 to kernel algorithm db | adding AES_CCM_8 to kernel algorithm db | adding 3DES_CBC to kernel algorithm db | adding CAMELLIA_CBC to kernel algorithm db | adding AES_GCM_16 to kernel algorithm db | adding AES_GCM_12 to kernel algorithm db | adding AES_GCM_8 to kernel algorithm db | adding AES_CTR to kernel algorithm db | adding AES_CBC to kernel algorithm db | adding SERPENT_CBC to kernel algorithm db | adding TWOFISH_CBC to kernel algorithm db | adding NULL_AUTH_AES_GMAC to kernel algorithm db | adding NULL to kernel algorithm db | adding CHACHA20_POLY1305 to kernel algorithm db | adding HMAC_MD5_96 to kernel algorithm db | adding HMAC_SHA1_96 to kernel algorithm db | adding HMAC_SHA2_512_256 to kernel algorithm db | adding HMAC_SHA2_384_192 to kernel algorithm db | adding HMAC_SHA2_256_128 to kernel algorithm db | adding HMAC_SHA2_256_TRUNCBUG to kernel algorithm db | adding AES_XCBC_96 to kernel algorithm db | adding AES_CMAC_96 to kernel algorithm db | adding NONE to kernel algorithm db | net.ipv6.conf.all.disable_ipv6=1 ignore ipv6 holes | global periodic timer EVENT_SHUNT_SCAN enabled with interval of 20 seconds | setup kernel fd callback | add_fd_read_event_handler: new KERNEL_XRM_FD-pe@0x56080aee62d0 | libevent_malloc: new ptr-libevent@0x56080aef3060 size 128 | libevent_malloc: new ptr-libevent@0x56080aee1900 size 16 | add_fd_read_event_handler: new KERNEL_ROUTE_FD-pe@0x56080aee1310 | libevent_malloc: new ptr-libevent@0x56080aef30f0 size 128 | libevent_malloc: new ptr-libevent@0x56080aee6360 size 16 | vendor id hash md5 init | vendor id hash md5 digest data-bytes@0x56080998c46b (length 11) | 4b 41 4d 45 2f 72 61 63 6f 6f 6e | vendor id hash md5 final bytes@0x56080aee60b0 (length 16) | 70 03 cb c1 09 7d be 9c 26 00 ba 69 83 bc 8b 35 | vendor id hash md5 init | vendor id hash md5 digest data-bytes@0x56080998d260 (length 46) | 4e 4c 42 53 5f 50 52 45 53 45 4e 54 28 4e 4c 42 | 2f 4d 53 43 53 20 66 61 73 74 20 66 61 69 6c 6f | 76 65 72 20 73 75 70 70 6f 72 74 65 64 29 | vendor id hash md5 final bytes@0x56080aee6d50 (length 16) | ec 22 62 b5 12 32 63 83 67 12 3b ce 3d 37 3c 5e | vendor id hash md5 init | vendor id hash md5 digest data-bytes@0x56080998d290 (length 32) | 4d 53 2d 4d 61 6d 69 65 45 78 69 73 74 73 28 41 | 75 74 68 49 50 20 73 75 70 70 6f 72 74 65 64 29 | vendor id hash md5 final bytes@0x56080aee6290 (length 16) | 6f fe a4 ae ec 37 f4 9a 02 6f 97 cf b5 53 30 6d | vendor id hash md5 init | vendor id hash md5 digest data-bytes@0x56080998c5ee (length 17) | 49 4b 45 20 43 47 41 20 76 65 72 73 69 6f 6e 20 | 31 | vendor id hash md5 final bytes@0x56080aee1830 (length 16) | e3 a5 96 6a 76 37 9f e7 07 22 82 31 e5 ce 86 52 | vendor id hash md5 init | vendor id hash md5 digest data-bytes@0x56080998d2b8 (length 32) | 4d 53 2d 4e 65 67 6f 74 69 61 74 69 6f 6e 20 44 | 69 73 63 6f 76 65 72 79 20 43 61 70 61 62 6c 65 | vendor id hash md5 final bytes@0x56080aee6fe0 (length 16) | fb 1d e3 cd f3 41 b7 ea 16 b7 e5 be 08 55 f1 20 | vendor id hash md5 init | vendor id hash md5 digest data-bytes@0x56080998c600 (length 23) | 4d 69 63 72 6f 73 6f 66 74 20 58 62 6f 78 20 4f | 6e 65 20 32 30 31 33 | vendor id hash md5 final bytes@0x56080aeef2f0 (length 16) | 8a a3 94 cf 8a 55 77 dc 31 10 c1 13 b0 27 a4 f2 | vendor id hash md5 init | vendor id hash md5 digest data-bytes@0x56080998c618 (length 22) | 58 62 6f 78 20 49 4b 45 76 32 20 4e 65 67 6f 74 | 69 61 74 69 6f 6e | vendor id hash md5 final bytes@0x56080aee6310 (length 16) | aa 28 1f cc d6 8c f8 a8 dc b8 5c c0 a7 10 40 2a | vendor id hash md5 init | vendor id hash md5 digest data-bytes@0x56080998c62f (length 28) | 4d 53 46 54 20 49 50 73 65 63 20 53 65 63 75 72 | 69 74 79 20 52 65 61 6c 6d 20 49 64 | vendor id hash md5 final bytes@0x56080aee1740 (length 16) | 68 6a 8c bd fe 63 4b 40 51 46 fb 2b af 33 e9 e8 | vendor id hash md5 init | vendor id hash md5 digest data-bytes@0x56080998d2e0 (length 39) | 41 20 47 53 53 2d 41 50 49 20 41 75 74 68 65 6e | 74 69 63 61 74 69 6f 6e 20 4d 65 74 68 6f 64 20 | 66 6f 72 20 49 4b 45 | vendor id hash md5 final bytes@0x56080aeef310 (length 16) | ad 2c 0d d0 b9 c3 20 83 cc ba 25 b8 86 1e c4 55 | vendor id hash md5 init | vendor id hash md5 digest data-bytes@0x56080998c64c (length 6) | 47 53 53 41 50 49 | vendor id hash md5 final bytes@0x56080aef3300 (length 16) | 62 1b 04 bb 09 88 2a c1 e1 59 35 fe fa 24 ae ee | vendor id hash md5 init | vendor id hash md5 digest data-bytes@0x56080998c653 (length 12) | 53 53 48 20 53 65 6e 74 69 6e 65 6c | vendor id hash md5 final bytes@0x56080aef3320 (length 16) | 05 41 82 a0 7c 7a e2 06 f9 d2 cf 9d 24 32 c4 82 | vendor id hash md5 init | vendor id hash md5 digest data-bytes@0x56080998c660 (length 16) | 53 53 48 20 53 65 6e 74 69 6e 65 6c 20 31 2e 31 | vendor id hash md5 final bytes@0x56080aef3340 (length 16) | b9 16 23 e6 93 ca 18 a5 4c 6a 27 78 55 23 05 e8 | vendor id hash md5 init | vendor id hash md5 digest data-bytes@0x56080998c671 (length 16) | 53 53 48 20 53 65 6e 74 69 6e 65 6c 20 31 2e 32 | vendor id hash md5 final bytes@0x56080aef3360 (length 16) | 54 30 88 8d e0 1a 31 a6 fa 8f 60 22 4e 44 99 58 | vendor id hash md5 init | vendor id hash md5 digest data-bytes@0x56080998c682 (length 16) | 53 53 48 20 53 65 6e 74 69 6e 65 6c 20 31 2e 33 | vendor id hash md5 final bytes@0x56080aef3380 (length 16) | 7e e5 cb 85 f7 1c e2 59 c9 4a 5c 73 1e e4 e7 52 | vendor id hash md5 init | vendor id hash md5 digest data-bytes@0x56080998c693 (length 16) | 53 53 48 20 53 65 6e 74 69 6e 65 6c 20 31 2e 34 | vendor id hash md5 final bytes@0x56080aef33a0 (length 16) | 63 d9 a1 a7 00 94 91 b5 a0 a6 fd eb 2a 82 84 f0 | vendor id hash md5 init | vendor id hash md5 digest data-bytes@0x56080998c6a4 (length 18) | 53 53 48 20 53 65 6e 74 69 6e 65 6c 20 31 2e 34 | 2e 31 | vendor id hash md5 final bytes@0x56080aef33c0 (length 16) | eb 4b 0d 96 27 6b 4e 22 0a d1 62 21 a7 b2 a5 e6 | vendor id hash md5 init | vendor id hash md5 digest data-bytes@0x56080998d308 (length 55) | 53 73 68 20 43 6f 6d 6d 75 6e 69 63 61 74 69 6f | 6e 73 20 53 65 63 75 72 69 74 79 20 49 50 53 45 | 43 20 45 78 70 72 65 73 73 20 76 65 72 73 69 6f | 6e 20 31 2e 31 2e 30 | vendor id hash md5 final bytes@0x56080aef33e0 (length 16) | fb f4 76 14 98 40 31 fa 8e 3b b6 19 80 89 b2 23 | vendor id hash md5 init | vendor id hash md5 digest data-bytes@0x56080998d340 (length 55) | 53 73 68 20 43 6f 6d 6d 75 6e 69 63 61 74 69 6f | 6e 73 20 53 65 63 75 72 69 74 79 20 49 50 53 45 | 43 20 45 78 70 72 65 73 73 20 76 65 72 73 69 6f | 6e 20 31 2e 31 2e 31 | vendor id hash md5 final bytes@0x56080aef3400 (length 16) | 19 52 dc 91 ac 20 f6 46 fb 01 cf 42 a3 3a ee 30 | vendor id hash md5 init | vendor id hash md5 digest data-bytes@0x56080998d378 (length 55) | 53 73 68 20 43 6f 6d 6d 75 6e 69 63 61 74 69 6f | 6e 73 20 53 65 63 75 72 69 74 79 20 49 50 53 45 | 43 20 45 78 70 72 65 73 73 20 76 65 72 73 69 6f | 6e 20 31 2e 31 2e 32 | vendor id hash md5 final bytes@0x56080aef3420 (length 16) | e8 bf fa 64 3e 5c 8f 2c d1 0f da 73 70 b6 eb e5 | vendor id hash md5 init | vendor id hash md5 digest data-bytes@0x56080998d3b0 (length 55) | 53 73 68 20 43 6f 6d 6d 75 6e 69 63 61 74 69 6f | 6e 73 20 53 65 63 75 72 69 74 79 20 49 50 53 45 | 43 20 45 78 70 72 65 73 73 20 76 65 72 73 69 6f | 6e 20 31 2e 32 2e 31 | vendor id hash md5 final bytes@0x56080aef3440 (length 16) | c1 11 1b 2d ee 8c bc 3d 62 05 73 ec 57 aa b9 cb | vendor id hash md5 init | vendor id hash md5 digest data-bytes@0x56080998d3e8 (length 55) | 53 73 68 20 43 6f 6d 6d 75 6e 69 63 61 74 69 6f | 6e 73 20 53 65 63 75 72 69 74 79 20 49 50 53 45 | 43 20 45 78 70 72 65 73 73 20 76 65 72 73 69 6f | 6e 20 31 2e 32 2e 32 | vendor id hash md5 final bytes@0x56080aef3460 (length 16) | 09 ec 27 bf bc 09 c7 58 23 cf ec bf fe 56 5a 2e | vendor id hash md5 init | vendor id hash md5 digest data-bytes@0x56080998d420 (length 55) | 53 53 48 20 43 6f 6d 6d 75 6e 69 63 61 74 69 6f | 6e 73 20 53 65 63 75 72 69 74 79 20 49 50 53 45 | 43 20 45 78 70 72 65 73 73 20 76 65 72 73 69 6f | 6e 20 32 2e 30 2e 30 | vendor id hash md5 final bytes@0x56080aef3480 (length 16) | 7f 21 a5 96 e4 e3 18 f0 b2 f4 94 4c 23 84 cb 84 | vendor id hash md5 init | vendor id hash md5 digest data-bytes@0x56080998d458 (length 55) | 53 53 48 20 43 6f 6d 6d 75 6e 69 63 61 74 69 6f | 6e 73 20 53 65 63 75 72 69 74 79 20 49 50 53 45 | 43 20 45 78 70 72 65 73 73 20 76 65 72 73 69 6f | 6e 20 32 2e 31 2e 30 | vendor id hash md5 final bytes@0x56080aef34a0 (length 16) | 28 36 d1 fd 28 07 bc 9e 5a e3 07 86 32 04 51 ec | vendor id hash md5 init | vendor id hash md5 digest data-bytes@0x56080998d490 (length 55) | 53 53 48 20 43 6f 6d 6d 75 6e 69 63 61 74 69 6f | 6e 73 20 53 65 63 75 72 69 74 79 20 49 50 53 45 | 43 20 45 78 70 72 65 73 73 20 76 65 72 73 69 6f | 6e 20 32 2e 31 2e 31 | vendor id hash md5 final bytes@0x56080aef34c0 (length 16) | a6 8d e7 56 a9 c5 22 9b ae 66 49 80 40 95 1a d5 | vendor id hash md5 init | vendor id hash md5 digest data-bytes@0x56080998d4c8 (length 55) | 53 53 48 20 43 6f 6d 6d 75 6e 69 63 61 74 69 6f | 6e 73 20 53 65 63 75 72 69 74 79 20 49 50 53 45 | 43 20 45 78 70 72 65 73 73 20 76 65 72 73 69 6f | 6e 20 32 2e 31 2e 32 | vendor id hash md5 final bytes@0x56080aef34e0 (length 16) | 3f 23 72 86 7e 23 7c 1c d8 25 0a 75 55 9c ae 20 | vendor id hash md5 init | vendor id hash md5 digest data-bytes@0x56080998d500 (length 55) | 53 53 48 20 43 6f 6d 6d 75 6e 69 63 61 74 69 6f | 6e 73 20 53 65 63 75 72 69 74 79 20 49 50 53 45 | 43 20 45 78 70 72 65 73 73 20 76 65 72 73 69 6f | 6e 20 33 2e 30 2e 30 | vendor id hash md5 final bytes@0x56080aef3500 (length 16) | 0e 58 d5 77 4d f6 02 00 7d 0b 02 44 36 60 f7 eb | vendor id hash md5 init | vendor id hash md5 digest data-bytes@0x56080998d538 (length 55) | 53 53 48 20 43 6f 6d 6d 75 6e 69 63 61 74 69 6f | 6e 73 20 53 65 63 75 72 69 74 79 20 49 50 53 45 | 43 20 45 78 70 72 65 73 73 20 76 65 72 73 69 6f | 6e 20 33 2e 30 2e 31 | vendor id hash md5 final bytes@0x56080aef3520 (length 16) | f5 ce 31 eb c2 10 f4 43 50 cf 71 26 5b 57 38 0f | vendor id hash md5 init | vendor id hash md5 digest data-bytes@0x56080998d570 (length 55) | 53 53 48 20 43 6f 6d 6d 75 6e 69 63 61 74 69 6f | 6e 73 20 53 65 63 75 72 69 74 79 20 49 50 53 45 | 43 20 45 78 70 72 65 73 73 20 76 65 72 73 69 6f | 6e 20 34 2e 30 2e 30 | vendor id hash md5 final bytes@0x56080aef3540 (length 16) | f6 42 60 af 2e 27 42 da dd d5 69 87 06 8a 99 a0 | vendor id hash md5 init | vendor id hash md5 digest data-bytes@0x56080998d5a8 (length 55) | 53 53 48 20 43 6f 6d 6d 75 6e 69 63 61 74 69 6f | 6e 73 20 53 65 63 75 72 69 74 79 20 49 50 53 45 | 43 20 45 78 70 72 65 73 73 20 76 65 72 73 69 6f | 6e 20 34 2e 30 2e 31 | vendor id hash md5 final bytes@0x56080aef3560 (length 16) | 7a 54 d3 bd b3 b1 e6 d9 23 89 20 64 be 2d 98 1c | vendor id hash md5 init | vendor id hash md5 digest data-bytes@0x56080998d5e0 (length 55) | 53 53 48 20 43 6f 6d 6d 75 6e 69 63 61 74 69 6f | 6e 73 20 53 65 63 75 72 69 74 79 20 49 50 53 45 | 43 20 45 78 70 72 65 73 73 20 76 65 72 73 69 6f | 6e 20 34 2e 31 2e 30 | vendor id hash md5 final bytes@0x56080aef3580 (length 16) | 9a a1 f3 b4 34 72 a4 5d 5f 50 6a eb 26 0c f2 14 | vendor id hash md5 init | vendor id hash md5 digest data-bytes@0x56080998d618 (length 55) | starting up helper thread 6 | status value returned by setting the priority of this thread (crypto helper 6) 22 | crypto helper 6 waiting (nothing to do) | 53 53 48 20 43 6f 6d 6d 75 6e 69 63 61 74 69 6f | 6e 73 20 53 65 63 75 72 69 74 79 20 49 50 53 45 | 43 20 45 78 70 72 65 73 73 20 76 65 72 73 69 6f | 6e 20 34 2e 32 2e 30 | vendor id hash md5 final bytes@0x56080aef35a0 (length 16) | 68 80 c7 d0 26 09 91 14 e4 86 c5 54 30 e7 ab ee | vendor id hash md5 init | vendor id hash md5 digest data-bytes@0x56080998d650 (length 41) | 4c 69 6e 75 78 20 46 72 65 65 53 2f 57 41 4e 20 | 32 2e 30 30 20 50 4c 55 54 4f 5f 53 45 4e 44 53 | 5f 56 45 4e 44 4f 52 49 44 | vendor id hash md5 final bytes@0x7fff50900100 (length 16) | 44 76 1b d7 6b 80 85 41 74 87 ee 8a 51 cf fc f3 | vendor id hash md5 init | vendor id hash md5 digest data-bytes@0x56080998d680 (length 53) | 4c 69 6e 75 78 20 46 72 65 65 53 2f 57 41 4e 20 | 32 2e 30 30 20 58 2e 35 30 39 2d 31 2e 33 2e 31 | 20 50 4c 55 54 4f 5f 53 45 4e 44 53 5f 56 45 4e | 44 4f 52 49 44 | vendor id hash md5 final bytes@0x7fff50900100 (length 16) | b7 0e 8a c3 92 b1 6e 05 48 2f c4 dc 36 10 91 68 | vendor id hash md5 init | vendor id hash md5 digest data-bytes@0x56080998d6b8 (length 58) | 4c 69 6e 75 78 20 46 72 65 65 53 2f 57 41 4e 20 | 32 2e 30 30 20 58 2e 35 30 39 2d 31 2e 33 2e 31 | 20 4c 44 41 50 20 50 4c 55 54 4f 5f 53 45 4e 44 | 53 5f 56 45 4e 44 4f 52 49 44 | vendor id hash md5 final bytes@0x7fff50900100 (length 16) | 97 1d ea 93 c3 c2 06 74 f9 ae 35 40 83 de 3e 2f | vendor id hash md5 init | vendor id hash md5 digest data-bytes@0x56080998c791 (length 14) | 4f 70 65 6e 73 77 61 6e 20 32 2e 32 2e 30 | vendor id hash md5 final bytes@0x7fff50900100 (length 16) | 08 72 0b ee 9e 28 95 3c e0 8f 0a 18 b6 e2 9d da | vendor id hash md5 init | vendor id hash md5 digest data-bytes@0x56080998d720 (length 37) | 64 72 61 66 74 2d 73 74 65 6e 62 65 72 67 2d 69 | 70 73 65 63 2d 6e 61 74 2d 74 72 61 76 65 72 73 | 61 6c 2d 30 31 | vendor id hash md5 final bytes@0x56080aef37a0 (length 16) | 27 ba b5 dc 01 ea 07 60 ea 4e 31 90 ac 27 c0 d0 | vendor id hash md5 init | vendor id hash md5 digest data-bytes@0x56080998d748 (length 37) | 64 72 61 66 74 2d 73 74 65 6e 62 65 72 67 2d 69 | 70 73 65 63 2d 6e 61 74 2d 74 72 61 76 65 72 73 | 61 6c 2d 30 32 | vendor id hash md5 final bytes@0x56080aef37c0 (length 16) | 61 05 c4 22 e7 68 47 e4 3f 96 84 80 12 92 ae cd | vendor id hash md5 init | vendor id hash md5 digest data-bytes@0x56080998c7b9 (length 10) | 45 53 50 54 68 72 75 4e 41 54 | vendor id hash md5 final bytes@0x56080aef37e0 (length 16) | 50 76 0f 62 4c 63 e5 c5 3e ea 38 6c 68 5c a0 83 | vendor id hash md5 init | vendor id hash md5 digest data-bytes@0x56080998d770 (length 38) | 64 72 61 66 74 2d 68 75 74 74 75 6e 65 6e 2d 69 | 70 73 65 63 2d 65 73 70 2d 69 6e 2d 75 64 70 2d | 30 30 2e 74 78 74 | vendor id hash md5 final bytes@0x56080aef3800 (length 16) | 6a 74 34 c1 9d 7e 36 34 80 90 a0 23 34 c9 c8 05 | vendor id hash md5 init | vendor id hash md5 digest data-bytes@0x56080998c7c4 (length 29) | 64 72 61 66 74 2d 69 65 74 66 2d 69 70 73 65 63 | 2d 6e 61 74 2d 74 2d 69 6b 65 2d 30 30 | vendor id hash md5 final bytes@0x56080aef3820 (length 16) | 44 85 15 2d 18 b6 bb cd 0b e8 a8 46 95 79 dd cc | vendor id hash md5 init | vendor id hash md5 digest data-bytes@0x56080998c7e2 (length 29) | 64 72 61 66 74 2d 69 65 74 66 2d 69 70 73 65 63 | 2d 6e 61 74 2d 74 2d 69 6b 65 2d 30 31 | vendor id hash md5 final bytes@0x56080aef3840 (length 16) | 16 f6 ca 16 e4 a4 06 6d 83 82 1a 0f 0a ea a8 62 | vendor id hash md5 init | vendor id hash md5 digest data-bytes@0x56080998c800 (length 29) | 64 72 61 66 74 2d 69 65 74 66 2d 69 70 73 65 63 | 2d 6e 61 74 2d 74 2d 69 6b 65 2d 30 32 | vendor id hash md5 final bytes@0x56080aef3860 (length 16) | cd 60 46 43 35 df 21 f8 7c fd b2 fc 68 b6 a4 48 | vendor id hash md5 init | vendor id hash md5 digest data-bytes@0x56080998d798 (length 30) | 64 72 61 66 74 2d 69 65 74 66 2d 69 70 73 65 63 | 2d 6e 61 74 2d 74 2d 69 6b 65 2d 30 32 0a | vendor id hash md5 final bytes@0x56080aef3880 (length 16) | 90 cb 80 91 3e bb 69 6e 08 63 81 b5 ec 42 7b 1f | vendor id hash md5 init | vendor id hash md5 digest data-bytes@0x56080998c81e (length 29) | 64 72 61 66 74 2d 69 65 74 66 2d 69 70 73 65 63 | 2d 6e 61 74 2d 74 2d 69 6b 65 2d 30 33 | vendor id hash md5 final bytes@0x56080aef38a0 (length 16) | 7d 94 19 a6 53 10 ca 6f 2c 17 9d 92 15 52 9d 56 | vendor id hash md5 init | vendor id hash md5 digest data-bytes@0x56080998c83c (length 29) | 64 72 61 66 74 2d 69 65 74 66 2d 69 70 73 65 63 | 2d 6e 61 74 2d 74 2d 69 6b 65 2d 30 34 | vendor id hash md5 final bytes@0x56080aef38c0 (length 16) | 99 09 b6 4e ed 93 7c 65 73 de 52 ac e9 52 fa 6b | vendor id hash md5 init | vendor id hash md5 digest data-bytes@0x56080998c85a (length 29) | 64 72 61 66 74 2d 69 65 74 66 2d 69 70 73 65 63 | 2d 6e 61 74 2d 74 2d 69 6b 65 2d 30 35 | vendor id hash md5 final bytes@0x56080aef38e0 (length 16) | 80 d0 bb 3d ef 54 56 5e e8 46 45 d4 c8 5c e3 ee | vendor id hash md5 init | vendor id hash md5 digest data-bytes@0x56080998c878 (length 29) | 64 72 61 66 74 2d 69 65 74 66 2d 69 70 73 65 63 | 2d 6e 61 74 2d 74 2d 69 6b 65 2d 30 36 | vendor id hash md5 final bytes@0x56080aef3900 (length 16) | 4d 1e 0e 13 6d ea fa 34 c4 f3 ea 9f 02 ec 72 85 | vendor id hash md5 init | vendor id hash md5 digest data-bytes@0x56080998c896 (length 29) | 64 72 61 66 74 2d 69 65 74 66 2d 69 70 73 65 63 | 2d 6e 61 74 2d 74 2d 69 6b 65 2d 30 37 | vendor id hash md5 final bytes@0x56080aef3920 (length 16) | 43 9b 59 f8 ba 67 6c 4c 77 37 ae 22 ea b8 f5 82 | vendor id hash md5 init | vendor id hash md5 digest data-bytes@0x56080998c8b4 (length 29) | 64 72 61 66 74 2d 69 65 74 66 2d 69 70 73 65 63 | 2d 6e 61 74 2d 74 2d 69 6b 65 2d 30 38 | vendor id hash md5 final bytes@0x56080aef3940 (length 16) | 8f 8d 83 82 6d 24 6b 6f c7 a8 a6 a4 28 c1 1d e8 | vendor id hash md5 init | vendor id hash md5 digest data-bytes@0x56080998c8d2 (length 26) | 64 72 61 66 74 2d 69 65 74 66 2d 69 70 73 65 63 | 2d 6e 61 74 2d 74 2d 69 6b 65 | vendor id hash md5 final bytes@0x56080aef3960 (length 16) | 4d f3 79 28 e9 fc 4f d1 b3 26 21 70 d5 15 c6 62 | vendor id hash md5 init | vendor id hash md5 digest data-bytes@0x56080998c8ed (length 8) | 52 46 43 20 33 39 34 37 | vendor id hash md5 final bytes@0x56080aef3980 (length 16) | 4a 13 1c 81 07 03 58 45 5c 57 28 f2 0e 95 45 2f | vendor id hash md5 init | vendor id hash md5 digest data-bytes@0x560809995707 (length 13) | 46 52 41 47 4d 45 4e 54 41 54 49 4f 4e | vendor id hash md5 final bytes@0x56080aef3600 (length 16) | 40 48 b7 d5 6e bc e8 85 25 e7 de 7f 00 d6 c2 d3 | vendor id hash md5 init | vendor id hash md5 digest data-bytes@0x56080998c99d (length 19) | 56 69 64 2d 49 6e 69 74 69 61 6c 2d 43 6f 6e 74 | 61 63 74 | vendor id hash md5 final bytes@0x56080aef3640 (length 16) | 26 24 4d 38 ed db 61 b3 17 2a 36 e3 d0 cf b8 19 | vendor id hash md5 init | vendor id hash md5 digest data-bytes@0x56080998d2b8 (length 32) | 4d 53 2d 4e 65 67 6f 74 69 61 74 69 6f 6e 20 44 | 69 73 63 6f 76 65 72 79 20 43 61 70 61 62 6c 65 | vendor id hash md5 final bytes@0x56080aef3620 (length 16) | fb 1d e3 cd f3 41 b7 ea 16 b7 e5 be 08 55 f1 20 | vendor id hash md5 init | starting up helper thread 0 | status value returned by setting the priority of this thread (crypto helper 0) 22 | crypto helper 0 waiting (nothing to do) | starting up helper thread 1 | status value returned by setting the priority of this thread (crypto helper 1) 22 | crypto helper 1 waiting (nothing to do) | vendor id hash md5 digest data-bytes@0x56080998c5ee (length 17) | 49 4b 45 20 43 47 41 20 76 65 72 73 69 6f 6e 20 | 31 | vendor id hash md5 final bytes@0x56080aef36d0 (length 16) | e3 a5 96 6a 76 37 9f e7 07 22 82 31 e5 ce 86 52 | vendor id hash md5 init | vendor id hash md5 digest data-bytes@0x56080998c9b1 (length 14) | 4d 53 2d 4d 61 6d 69 65 45 78 69 73 74 73 | vendor id hash md5 final bytes@0x56080aef36f0 (length 16) | 21 4c a4 fa ff a7 f3 2d 67 48 e5 30 33 95 ae 83 | vendor id hash md5 init | vendor id hash md5 digest data-bytes@0x56080997bbfd (length 10) | 73 74 72 6f 6e 67 53 77 61 6e | vendor id hash md5 final bytes@0x56080aef3710 (length 16) | 88 2f e5 6d 6f d2 0d bc 22 51 61 3b 2e be 5b eb | vendor id hash md5 init | vendor id hash md5 digest data-bytes@0x56080998c9c0 (length 16) | 73 74 72 6f 6e 67 53 77 61 6e 20 34 2e 30 2e 30 | vendor id hash md5 final bytes@0x56080aef36b0 (length 16) | 2c e9 c9 46 a4 c8 79 bf 11 b5 0b 76 cc 56 92 cb | vendor id hash md5 init | vendor id hash md5 digest data-bytes@0x56080998c9d1 (length 16) | 73 74 72 6f 6e 67 53 77 61 6e 20 34 2e 30 2e 31 | vendor id hash md5 final bytes@0x56080aef3b40 (length 16) | 9d bb af cf 1d b0 dd 59 5a e0 65 29 40 03 ad 3e | vendor id hash md5 init | vendor id hash md5 digest data-bytes@0x56080998c9e2 (length 16) | 73 74 72 6f 6e 67 53 77 61 6e 20 34 2e 30 2e 32 | vendor id hash md5 final bytes@0x56080aef3b60 (length 16) | 77 e8 ee a6 f5 56 a4 99 de 3f fe 7f 7f 95 66 1c | vendor id hash md5 init | vendor id hash md5 digest data-bytes@0x56080998c9f3 (length 16) | 73 74 72 6f 6e 67 53 77 61 6e 20 34 2e 30 2e 33 | vendor id hash md5 final bytes@0x56080aef3b80 (length 16) | b1 81 b1 8e 11 4f c2 09 b3 c6 e2 6c 3a 80 71 8e | vendor id hash md5 init | vendor id hash md5 digest data-bytes@0x56080998ca04 (length 16) | 73 74 72 6f 6e 67 53 77 61 6e 20 34 2e 30 2e 34 | vendor id hash md5 final bytes@0x56080aef3ba0 (length 16) | 1e f2 83 f8 35 49 b5 ff 96 08 b6 d6 34 f8 4d 75 | vendor id hash md5 init | vendor id hash md5 digest data-bytes@0x56080998ca15 (length 16) | 73 74 72 6f 6e 67 53 77 61 6e 20 34 2e 30 2e 35 | vendor id hash md5 final bytes@0x56080aef3bc0 (length 16) | dd 18 0d 21 e5 ce 65 5a 76 8b a3 22 11 dd 8a d9 | vendor id hash md5 init | vendor id hash md5 digest data-bytes@0x56080998ca26 (length 16) | 73 74 72 6f 6e 67 53 77 61 6e 20 34 2e 30 2e 36 | vendor id hash md5 final bytes@0x56080aef3be0 (length 16) | 4c 90 13 69 46 57 7b 51 91 9d 8d 9a 6b 8e 4a 9f | vendor id hash md5 init | vendor id hash md5 digest data-bytes@0x56080998ca37 (length 16) | 73 74 72 6f 6e 67 53 77 61 6e 20 34 2e 30 2e 37 | vendor id hash md5 final bytes@0x56080aef3c00 (length 16) | ab 07 46 22 1c c8 fd 0d 52 38 f7 3a 9b 3d a5 57 | vendor id hash md5 init | vendor id hash md5 digest data-bytes@0x56080998ca48 (length 16) | 73 74 72 6f 6e 67 53 77 61 6e 20 34 2e 31 2e 30 | vendor id hash md5 final bytes@0x56080aef3c20 (length 16) | 47 94 ce f6 84 34 22 98 0d 1a 3d 06 af 41 c5 cd | vendor id hash md5 init | vendor id hash md5 digest data-bytes@0x56080998ca59 (length 16) | 73 74 72 6f 6e 67 53 77 61 6e 20 34 2e 31 2e 31 | vendor id hash md5 final bytes@0x56080aef3c40 (length 16) | d3 f1 c4 88 c3 68 17 5d 5f 40 a8 f5 ca 5f 5e 12 | vendor id hash md5 init | vendor id hash md5 digest data-bytes@0x56080998ca6a (length 16) | 73 74 72 6f 6e 67 53 77 61 6e 20 34 2e 31 2e 32 | vendor id hash md5 final bytes@0x56080aef3c60 (length 16) | 15 a1 ac e7 ee 52 fd df ef 04 f9 28 db 2d d1 34 | vendor id hash md5 init | vendor id hash md5 digest data-bytes@0x56080998ca7b (length 16) | 73 74 72 6f 6e 67 53 77 61 6e 20 34 2e 31 2e 33 | vendor id hash md5 final bytes@0x56080aef3c80 (length 16) | 58 49 ab 6d 8b ea bd 6e 4d 09 e5 a3 b8 8c 08 9a | vendor id hash md5 init | vendor id hash md5 digest data-bytes@0x56080998ca8c (length 16) | 73 74 72 6f 6e 67 53 77 61 6e 20 34 2e 31 2e 34 | vendor id hash md5 final bytes@0x56080aef3ca0 (length 16) | 31 2f 9c b1 a6 b9 0e 19 de 75 28 c9 04 ac 30 87 | vendor id hash md5 init | vendor id hash md5 digest data-bytes@0x56080998ca9d (length 16) | 73 74 72 6f 6e 67 53 77 61 6e 20 34 2e 31 2e 35 | vendor id hash md5 final bytes@0x56080aef3cc0 (length 16) | bf 0f bf 73 06 eb b7 82 70 42 d8 93 53 98 86 e2 | vendor id hash md5 init | vendor id hash md5 digest data-bytes@0x56080998caae (length 16) | 73 74 72 6f 6e 67 53 77 61 6e 20 34 2e 31 2e 36 | vendor id hash md5 final bytes@0x56080aef3ce0 (length 16) | d1 96 83 36 8a f4 b0 ed c2 1c cd e9 82 b1 d1 b0 | vendor id hash md5 init | vendor id hash md5 digest data-bytes@0x56080998cabf (length 16) | 73 74 72 6f 6e 67 53 77 61 6e 20 34 2e 31 2e 37 | vendor id hash md5 final bytes@0x56080aef3d00 (length 16) | ea 84 0a a4 df c9 71 2d 6c 32 b5 a1 6e b3 29 a3 | vendor id hash md5 init | vendor id hash md5 digest data-bytes@0x56080998cad0 (length 16) | 73 74 72 6f 6e 67 53 77 61 6e 20 34 2e 31 2e 38 | vendor id hash md5 final bytes@0x56080aef3d20 (length 16) | 66 a2 04 55 07 c1 19 da 78 a4 66 62 59 cd ea 48 | vendor id hash md5 init | vendor id hash md5 digest data-bytes@0x56080998cae1 (length 16) | 73 74 72 6f 6e 67 53 77 61 6e 20 34 2e 31 2e 39 | vendor id hash md5 final bytes@0x56080aef3d40 (length 16) | 78 fd d2 87 de f0 1a 3f 07 4b 53 69 ea b4 fd 1c | vendor id hash md5 init | vendor id hash md5 digest data-bytes@0x56080998caf2 (length 17) | 73 74 72 6f 6e 67 53 77 61 6e 20 34 2e 31 2e 31 | 30 | vendor id hash md5 final bytes@0x56080aef3d60 (length 16) | bf 3a 89 ae 5b ef 8e 72 d4 4d ac 8b b8 8d 7d 5f | vendor id hash md5 init | vendor id hash md5 digest data-bytes@0x56080998cb04 (length 17) | 73 74 72 6f 6e 67 53 77 61 6e 20 34 2e 31 2e 31 | 31 | vendor id hash md5 final bytes@0x56080aef3d80 (length 16) | b7 bd 9f 2f 97 8e 32 59 a7 aa 9f 7a 13 96 ad 6c | vendor id hash md5 init | vendor id hash md5 digest data-bytes@0x56080998cb16 (length 16) | 73 74 72 6f 6e 67 53 77 61 6e 20 34 2e 32 2e 30 | vendor id hash md5 final bytes@0x56080aef3da0 (length 16) | 9f 68 90 13 25 a9 72 89 43 35 30 2a 95 31 ab 9f | vendor id hash md5 init | vendor id hash md5 digest data-bytes@0x56080998cb27 (length 16) | 73 74 72 6f 6e 67 53 77 61 6e 20 34 2e 32 2e 31 | vendor id hash md5 final bytes@0x56080aef3dc0 (length 16) | ba b2 53 f4 cb 10 a8 10 8a 7c 92 7c 56 c8 78 86 | vendor id hash md5 init | vendor id hash md5 digest data-bytes@0x56080998cb38 (length 16) | 73 74 72 6f 6e 67 53 77 61 6e 20 34 2e 32 2e 32 | vendor id hash md5 final bytes@0x56080aef3de0 (length 16) | 2a 51 7d 0d 23 c3 7d 08 bc e7 c2 92 a0 21 7b 39 | vendor id hash md5 init | vendor id hash md5 digest data-bytes@0x56080998cb49 (length 16) | 73 74 72 6f 6e 67 53 77 61 6e 20 34 2e 32 2e 33 | vendor id hash md5 final bytes@0x56080aef3e00 (length 16) | 2d 1f 40 61 18 fb d5 d2 84 74 79 1f fa 00 48 8a | vendor id hash md5 init | vendor id hash md5 digest data-bytes@0x56080998cb5a (length 16) | 73 74 72 6f 6e 67 53 77 61 6e 20 32 2e 38 2e 38 | vendor id hash md5 final bytes@0x56080aef3e20 (length 16) | 8c 4a 3b cb 72 9b 11 f7 03 d2 2a 5b 39 64 0c a8 | vendor id hash md5 init | vendor id hash md5 digest data-bytes@0x56080998cb6b (length 16) | 73 74 72 6f 6e 67 53 77 61 6e 20 32 2e 38 2e 37 | vendor id hash md5 final bytes@0x56080aef3e40 (length 16) | 3a 0d 4e 7c a4 e4 92 ed 4d fe 47 6d 1a c6 01 8b | vendor id hash md5 init | vendor id hash md5 digest data-bytes@0x56080998cb7c (length 16) | 73 74 72 6f 6e 67 53 77 61 6e 20 32 2e 38 2e 36 | vendor id hash md5 final bytes@0x56080aef3e60 (length 16) | fe 3f 49 70 6e 26 a9 fb 36 a8 7b fc e9 ea 36 ce | vendor id hash md5 init | vendor id hash md5 digest data-bytes@0x56080998cb8d (length 16) | 73 74 72 6f 6e 67 53 77 61 6e 20 32 2e 38 2e 35 | vendor id hash md5 final bytes@0x56080aef3e80 (length 16) | 4c 7e fa 31 b3 9e 51 04 32 a3 17 57 0d 97 bb b9 | vendor id hash md5 init | vendor id hash md5 digest data-bytes@0x56080998cb9e (length 16) | 73 74 72 6f 6e 67 53 77 61 6e 20 32 2e 38 2e 34 | vendor id hash md5 final bytes@0x56080aef3ea0 (length 16) | 76 c7 2b fd 39 84 24 dd 00 1b 86 d0 01 2f e0 61 | vendor id hash md5 init | vendor id hash md5 digest data-bytes@0x56080998cbaf (length 16) | 73 74 72 6f 6e 67 53 77 61 6e 20 32 2e 38 2e 33 | vendor id hash md5 final bytes@0x56080aef3ec0 (length 16) | fb 46 41 ad 0e eb 2a 34 49 1d 15 f4 ef f5 10 63 | vendor id hash md5 init | vendor id hash md5 digest data-bytes@0x56080998cbc0 (length 16) | 73 74 72 6f 6e 67 53 77 61 6e 20 32 2e 38 2e 32 | vendor id hash md5 final bytes@0x56080aef3ee0 (length 16) | 29 99 32 27 7b 7d fe 38 2c e2 34 65 33 3a 7d 23 | vendor id hash md5 init | vendor id hash md5 digest data-bytes@0x56080998cbd1 (length 16) | 73 74 72 6f 6e 67 53 77 61 6e 20 32 2e 38 2e 31 | vendor id hash md5 final bytes@0x56080aef3f00 (length 16) | e3 7f 2d 5b a8 9a 62 cd 20 2e e2 7d ac 06 c8 a8 | vendor id hash md5 init | vendor id hash md5 digest data-bytes@0x56080998cbe2 (length 16) | 73 74 72 6f 6e 67 53 77 61 6e 20 32 2e 38 2e 30 | vendor id hash md5 final bytes@0x56080aef3f20 (length 16) | starting up helper thread 3 | starting up helper thread 2 | starting up helper thread 4 | starting up helper thread 5 | status value returned by setting the priority of this thread (crypto helper 3) 22 | status value returned by setting the priority of this thread (crypto helper 5) 22 | crypto helper 3 waiting (nothing to do) | 32 f0 e9 b9 c0 6d fe 8c 9a d5 59 9a 63 69 71 a1 | vendor id hash md5 init | vendor id hash md5 digest data-bytes@0x56080998cbf3 (length 16) | 73 74 72 6f 6e 67 53 77 61 6e 20 32 2e 37 2e 33 | vendor id hash md5 final bytes@0x56080aef3f40 (length 16) | 7f 50 cc 4e bf 04 c2 d9 da 73 ab fd 69 b7 7a a2 | vendor id hash md5 init | vendor id hash md5 digest data-bytes@0x56080998cc04 (length 16) | 73 74 72 6f 6e 67 53 77 61 6e 20 32 2e 37 2e 32 | vendor id hash md5 final bytes@0x56080aef3f60 (length 16) | a1 94 e2 aa dd d0 ba fb 95 25 3d d9 6d c7 33 eb | vendor id hash md5 init | vendor id hash md5 digest data-bytes@0x56080998cc15 (length 16) | 73 74 72 6f 6e 67 53 77 61 6e 20 32 2e 37 2e 31 | vendor id hash md5 final bytes@0x56080aef3f80 (length 16) | 81 34 87 85 82 12 17 85 ba 65 ea 34 5d 6b a7 24 | vendor id hash md5 init | vendor id hash md5 digest data-bytes@0x56080998cc26 (length 16) | 73 74 72 6f 6e 67 53 77 61 6e 20 32 2e 37 2e 30 | vendor id hash md5 final bytes@0x56080aef3fa0 (length 16) | 07 fa 12 8e 47 54 f9 44 7b 1d d4 63 74 ee f3 60 | vendor id hash md5 init | vendor id hash md5 digest data-bytes@0x56080998cc37 (length 16) | 73 74 72 6f 6e 67 53 77 61 6e 20 32 2e 36 2e 34 | vendor id hash md5 final bytes@0x56080aef3fc0 (length 16) | b9 27 f9 52 19 a0 fe 36 00 db a3 c1 18 2a e5 5f | vendor id hash md5 init | vendor id hash md5 digest data-bytes@0x56080998cc48 (length 16) | 73 74 72 6f 6e 67 53 77 61 6e 20 32 2e 36 2e 33 | vendor id hash md5 final bytes@0x56080aef3fe0 (length 16) | b2 86 0e 78 37 f7 11 be f3 d0 ee b1 06 87 2d ed | vendor id hash md5 init | vendor id hash md5 digest data-bytes@0x56080998cc59 (length 16) | 73 74 72 6f 6e 67 53 77 61 6e 20 32 2e 36 2e 32 | vendor id hash md5 final bytes@0x56080aef4000 (length 16) | 5b 1c d6 fe 7d 05 0e da 6c 93 87 1c 10 7d b3 d2 | vendor id hash md5 init | vendor id hash md5 digest data-bytes@0x56080998cc6a (length 16) | 73 74 72 6f 6e 67 53 77 61 6e 20 32 2e 36 2e 31 | vendor id hash md5 final bytes@0x56080aef4020 (length 16) | 66 af bc 12 bb fe 6c e1 08 b1 f6 9f 4b c9 17 b7 | vendor id hash md5 init | vendor id hash md5 digest data-bytes@0x56080998cc7b (length 16) | 73 74 72 6f 6e 67 53 77 61 6e 20 32 2e 36 2e 30 | vendor id hash md5 final bytes@0x56080aef4040 (length 16) | 3f 32 66 49 9f fd bd 85 95 0e 70 22 98 06 28 44 | vendor id hash md5 init | vendor id hash md5 digest data-bytes@0x56080998cc8c (length 16) | 73 74 72 6f 6e 67 53 77 61 6e 20 32 2e 35 2e 37 | vendor id hash md5 final bytes@0x56080aef4060 (length 16) | 1f 44 42 29 6b 83 d7 e3 3a 8b 45 20 9b a0 e5 90 | vendor id hash md5 init | vendor id hash md5 digest data-bytes@0x56080998cc9d (length 16) | 73 74 72 6f 6e 67 53 77 61 6e 20 32 2e 35 2e 36 | vendor id hash md5 final bytes@0x56080aef4080 (length 16) | 3c 5e ba 3d 85 64 92 8e 32 ae 43 c3 d9 92 4d ee | vendor id hash md5 init | vendor id hash md5 digest data-bytes@0x56080998ccae (length 16) | 73 74 72 6f 6e 67 53 77 61 6e 20 32 2e 35 2e 35 | vendor id hash md5 final bytes@0x56080aef40a0 (length 16) | 3f 26 7e d6 21 ad a7 ee 6c 7d 88 93 cc b0 b1 4b | vendor id hash md5 init | vendor id hash md5 digest data-bytes@0x56080998ccbf (length 16) | 73 74 72 6f 6e 67 53 77 61 6e 20 32 2e 35 2e 34 | vendor id hash md5 final bytes@0x56080aef40c0 (length 16) | 7a 6b f5 b7 df 89 64 2a 75 a7 8e f7 d6 57 c1 c0 | vendor id hash md5 init | vendor id hash md5 digest data-bytes@0x56080998ccd0 (length 16) | 73 74 72 6f 6e 67 53 77 61 6e 20 32 2e 35 2e 33 | vendor id hash md5 final bytes@0x56080aef40e0 (length 16) | df 5b 1f 0f 1d 56 79 d9 f8 51 2b 16 c5 5a 60 65 | vendor id hash md5 init | vendor id hash md5 digest data-bytes@0x56080998cce1 (length 16) | 73 74 72 6f 6e 67 53 77 61 6e 20 32 2e 35 2e 32 | vendor id hash md5 final bytes@0x56080aef4100 (length 16) | 86 1c e5 eb 72 16 4b 19 0e 9e 62 9a 31 cf 49 01 | vendor id hash md5 init | vendor id hash md5 digest data-bytes@0x56080998ccf2 (length 16) | 73 74 72 6f 6e 67 53 77 61 6e 20 32 2e 35 2e 31 | vendor id hash md5 final bytes@0x56080aef4120 (length 16) | 9a 4a 46 48 f6 0f 8e da 7c fc bf e2 71 ee 5b 7d | vendor id hash md5 init | vendor id hash md5 digest data-bytes@0x56080998cd03 (length 16) | 73 74 72 6f 6e 67 53 77 61 6e 20 32 2e 35 2e 30 | vendor id hash md5 final bytes@0x56080aef4140 (length 16) | 9e b3 d9 07 ed 7a da 4e 3c bc ac b9 17 ab c8 e4 | vendor id hash md5 init | vendor id hash md5 digest data-bytes@0x56080998cd14 (length 16) | 73 74 72 6f 6e 67 53 77 61 6e 20 32 2e 34 2e 34 | vendor id hash md5 final bytes@0x56080aef4160 (length 16) | 48 5a 70 36 1b 44 33 b3 1d ea 1c 6b e0 df 24 3e | vendor id hash md5 init | vendor id hash md5 digest data-bytes@0x56080998cd25 (length 16) | 73 74 72 6f 6e 67 53 77 61 6e 20 32 2e 34 2e 33 | vendor id hash md5 final bytes@0x56080aef4180 (length 16) | 98 2b 7a 06 3a 33 c1 43 a8 ea dc 88 24 9f 6b cc | vendor id hash md5 init | vendor id hash md5 digest data-bytes@0x56080998cd36 (length 16) | 73 74 72 6f 6e 67 53 77 61 6e 20 32 2e 34 2e 32 | vendor id hash md5 final bytes@0x56080aef41a0 (length 16) | e7 a3 fd 0c 6d 77 1a 8f 1b 8a 86 a4 16 9c 9e a4 | vendor id hash md5 init | vendor id hash md5 digest data-bytes@0x56080998cd47 (length 16) | 73 74 72 6f 6e 67 53 77 61 6e 20 32 2e 34 2e 31 | vendor id hash md5 final bytes@0x56080aef41c0 (length 16) | 75 b0 65 3c b2 81 eb 26 d3 1e de 38 c8 e1 e2 28 | vendor id hash md5 init | vendor id hash md5 digest data-bytes@0x56080998cd58 (length 16) | 73 74 72 6f 6e 67 53 77 61 6e 20 32 2e 34 2e 30 | vendor id hash md5 final bytes@0x56080aef41e0 (length 16) | e8 29 c8 81 49 ba b3 c0 ce e8 5d a6 0e 18 ae 9b | vendor id hash md5 init | vendor id hash md5 digest data-bytes@0x56080998cd69 (length 16) | 73 74 72 6f 6e 67 53 77 61 6e 20 32 2e 33 2e 32 | vendor id hash md5 final bytes@0x56080aef4200 (length 16) | 42 a4 83 4c 92 ab 9a 77 77 06 3a fa 25 4b cb 69 | vendor id hash md5 init | vendor id hash md5 digest data-bytes@0x56080998cd7a (length 16) | 73 74 72 6f 6e 67 53 77 61 6e 20 32 2e 33 2e 31 | vendor id hash md5 final bytes@0x56080aef4220 (length 16) | f6 97 c1 af cc 2e c8 dd cd f9 9d c7 af 03 a6 7f | vendor id hash md5 init | vendor id hash md5 digest data-bytes@0x56080998cd8b (length 16) | 73 74 72 6f 6e 67 53 77 61 6e 20 32 2e 33 2e 30 | vendor id hash md5 final bytes@0x56080aef4240 (length 16) | b8 f9 2b 2f a2 d3 fe 5f e1 58 34 4b da 1c c6 ae | vendor id hash md5 init | vendor id hash md5 digest data-bytes@0x56080998cd9c (length 16) | 73 74 72 6f 6e 67 53 77 61 6e 20 32 2e 32 2e 32 | vendor id hash md5 final bytes@0x56080aef4260 (length 16) | 99 dc 7c c8 23 37 6b 3b 33 d0 43 57 89 6a e0 7b | vendor id hash md5 init | vendor id hash md5 digest data-bytes@0x56080998cdad (length 16) | 73 74 72 6f 6e 67 53 77 61 6e 20 32 2e 32 2e 31 | vendor id hash md5 final bytes@0x56080aef4280 (length 16) | d9 11 8b 1e 9d e5 ef ce d9 cc 9d 88 3f 21 68 ff | vendor id hash md5 init | vendor id hash md5 digest data-bytes@0x56080998cdbe (length 16) | 73 74 72 6f 6e 67 53 77 61 6e 20 32 2e 32 2e 30 | vendor id hash md5 final bytes@0x56080aef42a0 (length 16) | 85 b6 cb ec 48 0d 5c 8c d9 88 2c 82 5a c2 c2 44 | vendor id hash md5 init | vendor id hash md5 digest data-bytes@0x560809995707 (length 13) | 46 52 41 47 4d 45 4e 54 41 54 49 4f 4e | vendor id hash md5 final bytes@0x56080aef42c0 (length 16) | 40 48 b7 d5 6e bc e8 85 25 e7 de 7f 00 d6 c2 d3 | global one-shot timer EVENT_CHECK_CRLS initialized selinux support is enabled. systemd watchdog not enabled - not sending watchdog keepalives | crypto helper 5 waiting (nothing to do) | status value returned by setting the priority of this thread (crypto helper 2) 22 | crypto helper 2 waiting (nothing to do) | unbound context created - setting debug level to 5 | /etc/hosts lookups activated | /etc/resolv.conf usage activated | outgoing-port-avoid set 0-65535 | outgoing-port-permit set 32768-60999 | Loading dnssec root key from:/var/lib/unbound/root.key | No additional dnssec trust anchors defined via dnssec-trusted= option | Setting up events, loop start | add_fd_read_event_handler: new PLUTO_CTL_FD-pe@0x56080aee61e0 | libevent_malloc: new ptr-libevent@0x56080aefd5a0 size 128 | libevent_malloc: new ptr-libevent@0x56080aefd630 size 16 | libevent_realloc: new ptr-libevent@0x56080ae615b0 size 256 | libevent_malloc: new ptr-libevent@0x56080aefd650 size 8 | libevent_realloc: new ptr-libevent@0x56080aef22f0 size 144 | libevent_malloc: new ptr-libevent@0x56080aefd670 size 152 | libevent_malloc: new ptr-libevent@0x56080aefd710 size 16 | signal event handler PLUTO_SIGCHLD installed | libevent_malloc: new ptr-libevent@0x56080aefd730 size 8 | libevent_malloc: new ptr-libevent@0x56080aefd750 size 152 | signal event handler PLUTO_SIGTERM installed | libevent_malloc: new ptr-libevent@0x56080aefd7f0 size 8 | libevent_malloc: new ptr-libevent@0x56080aefd810 size 152 | signal event handler PLUTO_SIGHUP installed | libevent_malloc: new ptr-libevent@0x56080aefd8b0 size 8 | libevent_realloc: release ptr-libevent@0x56080aef22f0 | libevent_realloc: new ptr-libevent@0x56080aefd8d0 size 256 | libevent_malloc: new ptr-libevent@0x56080aef22f0 size 152 | signal event handler PLUTO_SIGSYS installed | created addconn helper (pid:32108) using fork+execve | forked child 32108 | accept(whackctlfd, (struct sockaddr *)&whackaddr, &whackaddrlen) -> fd@16 (in whack_handle() at rcv_whack.c:721) | pluto_sd: executing action action: reloading(4), status 0 listening for IKE messages | Inspecting interface lo | found lo with address 127.0.0.1 | Inspecting interface eth0 | found eth0 with address 192.0.1.254 | Inspecting interface eth1 | found eth1 with address 192.1.2.45 | Inspecting interface eth1 | found eth1 with address 192.0.11.254 Kernel supports NIC esp-hw-offload | status value returned by setting the priority of this thread (crypto helper 4) 22 | crypto helper 4 waiting (nothing to do) adding interface eth1/eth1 (esp-hw-offload not supported by kernel) 192.0.11.254:500 | NAT-Traversal: Trying sockopt style NAT-T | NAT-Traversal: ESPINUDP(2) setup succeeded for sockopt style NAT-T family IPv4 adding interface eth1/eth1 192.0.11.254:4500 adding interface eth1/eth1 (esp-hw-offload not supported by kernel) 192.1.2.45:500 | NAT-Traversal: Trying sockopt style NAT-T | NAT-Traversal: ESPINUDP(2) setup succeeded for sockopt style NAT-T family IPv4 adding interface eth1/eth1 192.1.2.45:4500 adding interface eth0/eth0 (esp-hw-offload not supported by kernel) 192.0.1.254:500 | NAT-Traversal: Trying sockopt style NAT-T | NAT-Traversal: ESPINUDP(2) setup succeeded for sockopt style NAT-T family IPv4 adding interface eth0/eth0 192.0.1.254:4500 adding interface lo/lo (esp-hw-offload not supported by kernel) 127.0.0.1:500 | NAT-Traversal: Trying sockopt style NAT-T | NAT-Traversal: ESPINUDP(2) setup succeeded for sockopt style NAT-T family IPv4 adding interface lo/lo 127.0.0.1:4500 | no interfaces to sort | FOR_EACH_UNORIENTED_CONNECTION_... in check_orientations | add_fd_read_event_handler: new ethX-pe@0x56080aefdde0 | libevent_malloc: new ptr-libevent@0x56080aefde20 size 128 | libevent_malloc: new ptr-libevent@0x56080aefdeb0 size 16 | setup callback for interface lo 127.0.0.1:4500 fd 24 | add_fd_read_event_handler: new ethX-pe@0x56080aefded0 | libevent_malloc: new ptr-libevent@0x56080aefdf10 size 128 | libevent_malloc: new ptr-libevent@0x56080aefdfa0 size 16 | setup callback for interface lo 127.0.0.1:500 fd 23 | add_fd_read_event_handler: new ethX-pe@0x56080aefdfc0 | libevent_malloc: new ptr-libevent@0x56080aefe000 size 128 | libevent_malloc: new ptr-libevent@0x56080aefe090 size 16 | setup callback for interface eth0 192.0.1.254:4500 fd 22 | add_fd_read_event_handler: new ethX-pe@0x56080aefe0b0 | libevent_malloc: new ptr-libevent@0x56080aefe0f0 size 128 | libevent_malloc: new ptr-libevent@0x56080aefe180 size 16 | setup callback for interface eth0 192.0.1.254:500 fd 21 | add_fd_read_event_handler: new ethX-pe@0x56080aefe1a0 | libevent_malloc: new ptr-libevent@0x56080aefe1e0 size 128 | libevent_malloc: new ptr-libevent@0x56080aefe270 size 16 | setup callback for interface eth1 192.1.2.45:4500 fd 20 | add_fd_read_event_handler: new ethX-pe@0x56080aefe290 | libevent_malloc: new ptr-libevent@0x56080aefe2d0 size 128 | libevent_malloc: new ptr-libevent@0x56080aefe360 size 16 | setup callback for interface eth1 192.1.2.45:500 fd 19 | add_fd_read_event_handler: new ethX-pe@0x56080aefe380 | libevent_malloc: new ptr-libevent@0x56080aefe9c0 size 128 | libevent_malloc: new ptr-libevent@0x56080aefe3c0 size 16 | setup callback for interface eth1 192.0.11.254:4500 fd 18 | add_fd_read_event_handler: new ethX-pe@0x56080aefea50 | libevent_malloc: new ptr-libevent@0x56080aefea90 size 128 | libevent_malloc: new ptr-libevent@0x56080aefeb20 size 16 | setup callback for interface eth1 192.0.11.254:500 fd 17 | certs and keys locked by 'free_preshared_secrets' | certs and keys unlocked by 'free_preshared_secrets' loading secrets from "/etc/ipsec.secrets" | saving Modulus | saving PublicExponent | ignoring PrivateExponent | ignoring Prime1 | ignoring Prime2 | ignoring Exponent1 | ignoring Exponent2 | ignoring Coefficient | ignoring CKAIDNSS | computed rsa CKAID b4 9f 1a ac 9e 45 6e 79 29 c8 81 97 3a 0c 6a d3 | computed rsa CKAID 7f 0f 03 50 loaded private key for keyid: PKK_RSA:AQOm9dY/4 | certs and keys locked by 'process_secret' | certs and keys unlocked by 'process_secret' | pluto_sd: executing action action: ready(5), status 0 | close_any(fd@16) (in whack_process() at rcv_whack.c:700) | accept(whackctlfd, (struct sockaddr *)&whackaddr, &whackaddrlen) -> fd@16 (in whack_handle() at rcv_whack.c:721) | pluto_sd: executing action action: reloading(4), status 0 listening for IKE messages | Inspecting interface lo | found lo with address 127.0.0.1 | Inspecting interface eth0 | found eth0 with address 192.0.1.254 | Inspecting interface eth1 | found eth1 with address 192.1.2.45 | Inspecting interface eth1 | found eth1 with address 192.0.11.254 | no interfaces to sort | libevent_free: release ptr-libevent@0x56080aefde20 | free_event_entry: release EVENT_NULL-pe@0x56080aefdde0 | add_fd_read_event_handler: new ethX-pe@0x56080aefdde0 | libevent_malloc: new ptr-libevent@0x56080aefde20 size 128 | setup callback for interface lo 127.0.0.1:4500 fd 24 | libevent_free: release ptr-libevent@0x56080aefdf10 | free_event_entry: release EVENT_NULL-pe@0x56080aefded0 | add_fd_read_event_handler: new ethX-pe@0x56080aefded0 | libevent_malloc: new ptr-libevent@0x56080aefdf10 size 128 | setup callback for interface lo 127.0.0.1:500 fd 23 | libevent_free: release ptr-libevent@0x56080aefe000 | free_event_entry: release EVENT_NULL-pe@0x56080aefdfc0 | add_fd_read_event_handler: new ethX-pe@0x56080aefdfc0 | libevent_malloc: new ptr-libevent@0x56080aefe000 size 128 | setup callback for interface eth0 192.0.1.254:4500 fd 22 | libevent_free: release ptr-libevent@0x56080aefe0f0 | free_event_entry: release EVENT_NULL-pe@0x56080aefe0b0 | add_fd_read_event_handler: new ethX-pe@0x56080aefe0b0 | libevent_malloc: new ptr-libevent@0x56080aefe0f0 size 128 | setup callback for interface eth0 192.0.1.254:500 fd 21 | libevent_free: release ptr-libevent@0x56080aefe1e0 | free_event_entry: release EVENT_NULL-pe@0x56080aefe1a0 | add_fd_read_event_handler: new ethX-pe@0x56080aefe1a0 | libevent_malloc: new ptr-libevent@0x56080aefe1e0 size 128 | setup callback for interface eth1 192.1.2.45:4500 fd 20 | libevent_free: release ptr-libevent@0x56080aefe2d0 | free_event_entry: release EVENT_NULL-pe@0x56080aefe290 | add_fd_read_event_handler: new ethX-pe@0x56080aefe290 | libevent_malloc: new ptr-libevent@0x56080aefe2d0 size 128 | setup callback for interface eth1 192.1.2.45:500 fd 19 | libevent_free: release ptr-libevent@0x56080aefe9c0 | free_event_entry: release EVENT_NULL-pe@0x56080aefe380 | add_fd_read_event_handler: new ethX-pe@0x56080aefe380 | libevent_malloc: new ptr-libevent@0x56080aefe9c0 size 128 | setup callback for interface eth1 192.0.11.254:4500 fd 18 | libevent_free: release ptr-libevent@0x56080aefea90 | free_event_entry: release EVENT_NULL-pe@0x56080aefea50 | add_fd_read_event_handler: new ethX-pe@0x56080aefea50 | libevent_malloc: new ptr-libevent@0x56080aefea90 size 128 | setup callback for interface eth1 192.0.11.254:500 fd 17 | certs and keys locked by 'free_preshared_secrets' forgetting secrets | certs and keys unlocked by 'free_preshared_secrets' loading secrets from "/etc/ipsec.secrets" | saving Modulus | saving PublicExponent | ignoring PrivateExponent | ignoring Prime1 | ignoring Prime2 | ignoring Exponent1 | ignoring Exponent2 | ignoring Coefficient | ignoring CKAIDNSS | computed rsa CKAID b4 9f 1a ac 9e 45 6e 79 29 c8 81 97 3a 0c 6a d3 | computed rsa CKAID 7f 0f 03 50 loaded private key for keyid: PKK_RSA:AQOm9dY/4 | certs and keys locked by 'process_secret' | certs and keys unlocked by 'process_secret' | pluto_sd: executing action action: ready(5), status 0 | close_any(fd@16) (in whack_process() at rcv_whack.c:700) | processing signal PLUTO_SIGCHLD | waitpid returned pid 32108 (exited with status 0) | reaped addconn helper child (status 0) | waitpid returned ECHILD (no child processes left) | accept(whackctlfd, (struct sockaddr *)&whackaddr, &whackaddrlen) -> fd@16 (in whack_handle() at rcv_whack.c:721) | old debugging base+crypt + none | base debugging = base+crypt | old impairing none + suppress-retransmits | base impairing = suppress-retransmits | close_any(fd@16) (in whack_process() at rcv_whack.c:700) | accept(whackctlfd, (struct sockaddr *)&whackaddr, &whackaddrlen) -> fd@16 (in whack_handle() at rcv_whack.c:721) | FOR_EACH_CONNECTION_... in conn_by_name | FOR_EACH_CONNECTION_... in foreach_connection_by_alias | FOR_EACH_CONNECTION_... in conn_by_name | FOR_EACH_CONNECTION_... in foreach_connection_by_alias | FOR_EACH_CONNECTION_... in conn_by_name | Added new connection westnets-eastnet/1x0 with policy ENCRYPT+TUNNEL+PFS+IKEV1_ALLOW+SAREF_TRACK+IKE_FRAG_ALLOW+ESN_NO | No AUTH policy was set - defaulting to RSASIG | counting wild cards for @west is 0 | counting wild cards for @east is 0 | connect_to_host_pair: 192.1.2.45:500 192.1.2.23:500 -> hp@(nil): none | new hp@0x56080aeca530 added connection description "westnets-eastnet/1x0" | ike_life: 3600s; ipsec_life: 28800s; rekey_margin: 540s; rekey_fuzz: 100%; keyingtries: 0; replay_window: 32; policy: RSASIG+ENCRYPT+TUNNEL+PFS+IKEV1_ALLOW+SAREF_TRACK+IKE_FRAG_ALLOW+ESN_NO | 192.0.1.0/24===192.1.2.45<192.1.2.45>[@west]...192.1.2.23<192.1.2.23>[@east]===192.0.2.0/24 | close_any(fd@16) (in whack_process() at rcv_whack.c:700) | accept(whackctlfd, (struct sockaddr *)&whackaddr, &whackaddrlen) -> fd@16 (in whack_handle() at rcv_whack.c:721) add keyid @west | add pubkey 01 03 a6 f5 d6 3f e3 8f 6c 01 6a fc 7b 7c 6d 57 | add pubkey 8b 49 39 0d 77 f7 ac e2 85 f1 98 1e 4b 6d a5 3e | add pubkey b3 96 9a d1 99 5a bc 10 f2 97 de f2 28 f9 5f 92 | add pubkey 09 f0 c8 d4 12 e4 60 6e 9c 60 98 10 01 7d 26 b7 | add pubkey 8f 95 62 2d 87 dd cd de f6 d3 8f 35 b0 50 d0 18 | add pubkey f5 99 f8 04 f1 ff 61 5b bc 7f 1f c0 04 d8 e4 8c | add pubkey ac 34 ad 7a c1 da 3c 2d 8c 30 ae d6 3c 59 b1 3a | add pubkey 94 d3 d5 2a 73 91 bd 59 5f 3e 72 bf 4a 1b 9d c5 | add pubkey b2 2b 4d e7 0d 24 3e 77 f9 7f 2d d6 9d 29 ef 70 | add pubkey 7d 7a 6d a2 b8 61 0c 4b 09 4a 06 71 84 70 85 9a | add pubkey 8f 52 a1 80 06 fd c6 fc 3e 27 fa 16 fa 32 83 a9 | add pubkey ca 80 db 0f 4a bf f7 e9 55 8e bd 29 4d 23 a6 dc | add pubkey 2a b3 5d 62 a9 21 1e be 83 d8 69 3c 03 0a 48 8e | add pubkey d3 3a 11 f2 86 5a d1 30 65 bd c8 f4 83 87 ff 04 | add pubkey 87 33 05 4f e0 d8 8c fe b3 19 4c dd 85 40 f3 4d | add pubkey 6e e8 49 14 06 2c 1f 59 59 05 8f 20 b0 ca 46 3f | add pubkey c9 20 7e 04 30 7d 9a 80 6c 3f 0a 89 f7 d3 af d8 | add pubkey 15 04 37 f9 | computed rsa CKAID b4 9f 1a ac 9e 45 6e 79 29 c8 81 97 3a 0c 6a d3 | computed rsa CKAID 7f 0f 03 50 | keyid: *AQOm9dY/4 | n a6 f5 d6 3f e3 8f 6c 01 6a fc 7b 7c 6d 57 8b 49 | n 39 0d 77 f7 ac e2 85 f1 98 1e 4b 6d a5 3e b3 96 | n 9a d1 99 5a bc 10 f2 97 de f2 28 f9 5f 92 09 f0 | n c8 d4 12 e4 60 6e 9c 60 98 10 01 7d 26 b7 8f 95 | n 62 2d 87 dd cd de f6 d3 8f 35 b0 50 d0 18 f5 99 | n f8 04 f1 ff 61 5b bc 7f 1f c0 04 d8 e4 8c ac 34 | n ad 7a c1 da 3c 2d 8c 30 ae d6 3c 59 b1 3a 94 d3 | n d5 2a 73 91 bd 59 5f 3e 72 bf 4a 1b 9d c5 b2 2b | n 4d e7 0d 24 3e 77 f9 7f 2d d6 9d 29 ef 70 7d 7a | n 6d a2 b8 61 0c 4b 09 4a 06 71 84 70 85 9a 8f 52 | n a1 80 06 fd c6 fc 3e 27 fa 16 fa 32 83 a9 ca 80 | n db 0f 4a bf f7 e9 55 8e bd 29 4d 23 a6 dc 2a b3 | n 5d 62 a9 21 1e be 83 d8 69 3c 03 0a 48 8e d3 3a | n 11 f2 86 5a d1 30 65 bd c8 f4 83 87 ff 04 87 33 | n 05 4f e0 d8 8c fe b3 19 4c dd 85 40 f3 4d 6e e8 | n 49 14 06 2c 1f 59 59 05 8f 20 b0 ca 46 3f c9 20 | n 7e 04 30 7d 9a 80 6c 3f 0a 89 f7 d3 af d8 15 04 | n 37 f9 | e 03 | CKAID b4 9f 1a ac 9e 45 6e 79 29 c8 81 97 3a 0c 6a d3 | CKAID 7f 0f 03 50 | close_any(fd@16) (in whack_process() at rcv_whack.c:700) | accept(whackctlfd, (struct sockaddr *)&whackaddr, &whackaddrlen) -> fd@16 (in whack_handle() at rcv_whack.c:721) add keyid @east | add pubkey 01 03 bd 6c 96 eb df 78 89 b3 ed 77 0d a1 7f 7b | add pubkey e5 16 c2 c9 e4 7d 92 0a 90 9d 55 43 b4 62 13 03 | add pubkey 85 7a e0 26 7b 54 1f ca 09 93 cf ff 25 c9 02 4c | add pubkey 78 ca 94 e5 3e ac d1 f9 a8 e5 bb 7f cc 20 84 e0 | add pubkey 21 c9 f0 0d c5 44 ba f3 48 64 61 58 f6 0f 63 0d | add pubkey d2 67 1e 59 8b ec f3 50 39 71 fb 39 da 11 64 b6 | add pubkey 62 cd 5f d3 8d 2e c1 50 ed 9c 6e 22 0c 39 a7 ce | add pubkey 62 b5 af 8a 80 0f 2e 4c 05 5c 82 c7 8d 29 02 2e | add pubkey bb 23 5f db f2 9e b5 7d e2 20 70 1a 63 f3 8e 5d | add pubkey ac 47 f0 5c 26 4e b1 d0 42 60 52 4a b0 77 25 ce | add pubkey e0 98 2b 43 f4 c7 59 1a 64 01 83 ea 4e e3 1a 2a | add pubkey 92 b8 55 ab 63 dd 4b 70 47 29 dc e9 b4 60 bf 43 | add pubkey 4d 58 8f 64 73 95 70 ac 35 89 b2 c2 9c d4 62 c0 | add pubkey 5f 56 5f ad 1b e5 dd 49 93 6a f5 23 82 ed d4 e7 | add pubkey d5 f1 55 f2 2d a2 26 a6 36 53 2f 94 fb 99 22 5c | add pubkey 47 cc 6d 80 30 88 96 38 0c f5 f2 ed 37 d0 09 d5 | add pubkey 07 8f 69 ef a9 99 ce 4d 1a 77 9e 39 c4 38 f3 c5 | add pubkey 51 51 48 ef | computed rsa CKAID 61 55 99 73 d3 ac ef 7d 3a 37 0e 3e 82 ad 92 c1 | computed rsa CKAID 8a 82 25 f1 | keyid: *AQO9bJbr3 | n bd 6c 96 eb df 78 89 b3 ed 77 0d a1 7f 7b e5 16 | n c2 c9 e4 7d 92 0a 90 9d 55 43 b4 62 13 03 85 7a | n e0 26 7b 54 1f ca 09 93 cf ff 25 c9 02 4c 78 ca | n 94 e5 3e ac d1 f9 a8 e5 bb 7f cc 20 84 e0 21 c9 | n f0 0d c5 44 ba f3 48 64 61 58 f6 0f 63 0d d2 67 | n 1e 59 8b ec f3 50 39 71 fb 39 da 11 64 b6 62 cd | n 5f d3 8d 2e c1 50 ed 9c 6e 22 0c 39 a7 ce 62 b5 | n af 8a 80 0f 2e 4c 05 5c 82 c7 8d 29 02 2e bb 23 | n 5f db f2 9e b5 7d e2 20 70 1a 63 f3 8e 5d ac 47 | n f0 5c 26 4e b1 d0 42 60 52 4a b0 77 25 ce e0 98 | n 2b 43 f4 c7 59 1a 64 01 83 ea 4e e3 1a 2a 92 b8 | n 55 ab 63 dd 4b 70 47 29 dc e9 b4 60 bf 43 4d 58 | n 8f 64 73 95 70 ac 35 89 b2 c2 9c d4 62 c0 5f 56 | n 5f ad 1b e5 dd 49 93 6a f5 23 82 ed d4 e7 d5 f1 | n 55 f2 2d a2 26 a6 36 53 2f 94 fb 99 22 5c 47 cc | n 6d 80 30 88 96 38 0c f5 f2 ed 37 d0 09 d5 07 8f | n 69 ef a9 99 ce 4d 1a 77 9e 39 c4 38 f3 c5 51 51 | n 48 ef | e 03 | CKAID 61 55 99 73 d3 ac ef 7d 3a 37 0e 3e 82 ad 92 c1 | CKAID 8a 82 25 f1 | close_any(fd@16) (in whack_process() at rcv_whack.c:700) | accept(whackctlfd, (struct sockaddr *)&whackaddr, &whackaddrlen) -> fd@16 (in whack_handle() at rcv_whack.c:721) | FOR_EACH_CONNECTION_... in conn_by_name | FOR_EACH_CONNECTION_... in foreach_connection_by_alias | FOR_EACH_CONNECTION_... in conn_by_name | FOR_EACH_CONNECTION_... in foreach_connection_by_alias | FOR_EACH_CONNECTION_... in conn_by_name | Added new connection westnets-eastnet/2x0 with policy ENCRYPT+TUNNEL+PFS+IKEV1_ALLOW+SAREF_TRACK+IKE_FRAG_ALLOW+ESN_NO | No AUTH policy was set - defaulting to RSASIG | counting wild cards for @west is 0 | counting wild cards for @east is 0 | find_host_pair: comparing 192.1.2.45:500 to 192.1.2.23:500 but ignoring ports | connect_to_host_pair: 192.1.2.45:500 192.1.2.23:500 -> hp@0x56080aeca530: westnets-eastnet/1x0 added connection description "westnets-eastnet/2x0" | ike_life: 3600s; ipsec_life: 28800s; rekey_margin: 540s; rekey_fuzz: 100%; keyingtries: 0; replay_window: 32; policy: RSASIG+ENCRYPT+TUNNEL+PFS+IKEV1_ALLOW+SAREF_TRACK+IKE_FRAG_ALLOW+ESN_NO | 192.0.11.0/24===192.1.2.45<192.1.2.45>[@west]...192.1.2.23<192.1.2.23>[@east]===192.0.2.0/24 | close_any(fd@16) (in whack_process() at rcv_whack.c:700) | accept(whackctlfd, (struct sockaddr *)&whackaddr, &whackaddrlen) -> fd@16 (in whack_handle() at rcv_whack.c:721) add keyid @west | unreference key: 0x56080ae588f0 @west cnt 1-- | add pubkey 01 03 a6 f5 d6 3f e3 8f 6c 01 6a fc 7b 7c 6d 57 | add pubkey 8b 49 39 0d 77 f7 ac e2 85 f1 98 1e 4b 6d a5 3e | add pubkey b3 96 9a d1 99 5a bc 10 f2 97 de f2 28 f9 5f 92 | add pubkey 09 f0 c8 d4 12 e4 60 6e 9c 60 98 10 01 7d 26 b7 | add pubkey 8f 95 62 2d 87 dd cd de f6 d3 8f 35 b0 50 d0 18 | add pubkey f5 99 f8 04 f1 ff 61 5b bc 7f 1f c0 04 d8 e4 8c | add pubkey ac 34 ad 7a c1 da 3c 2d 8c 30 ae d6 3c 59 b1 3a | add pubkey 94 d3 d5 2a 73 91 bd 59 5f 3e 72 bf 4a 1b 9d c5 | add pubkey b2 2b 4d e7 0d 24 3e 77 f9 7f 2d d6 9d 29 ef 70 | add pubkey 7d 7a 6d a2 b8 61 0c 4b 09 4a 06 71 84 70 85 9a | add pubkey 8f 52 a1 80 06 fd c6 fc 3e 27 fa 16 fa 32 83 a9 | add pubkey ca 80 db 0f 4a bf f7 e9 55 8e bd 29 4d 23 a6 dc | add pubkey 2a b3 5d 62 a9 21 1e be 83 d8 69 3c 03 0a 48 8e | add pubkey d3 3a 11 f2 86 5a d1 30 65 bd c8 f4 83 87 ff 04 | add pubkey 87 33 05 4f e0 d8 8c fe b3 19 4c dd 85 40 f3 4d | add pubkey 6e e8 49 14 06 2c 1f 59 59 05 8f 20 b0 ca 46 3f | add pubkey c9 20 7e 04 30 7d 9a 80 6c 3f 0a 89 f7 d3 af d8 | add pubkey 15 04 37 f9 | computed rsa CKAID b4 9f 1a ac 9e 45 6e 79 29 c8 81 97 3a 0c 6a d3 | computed rsa CKAID 7f 0f 03 50 | keyid: *AQOm9dY/4 | n a6 f5 d6 3f e3 8f 6c 01 6a fc 7b 7c 6d 57 8b 49 | n 39 0d 77 f7 ac e2 85 f1 98 1e 4b 6d a5 3e b3 96 | n 9a d1 99 5a bc 10 f2 97 de f2 28 f9 5f 92 09 f0 | n c8 d4 12 e4 60 6e 9c 60 98 10 01 7d 26 b7 8f 95 | n 62 2d 87 dd cd de f6 d3 8f 35 b0 50 d0 18 f5 99 | n f8 04 f1 ff 61 5b bc 7f 1f c0 04 d8 e4 8c ac 34 | n ad 7a c1 da 3c 2d 8c 30 ae d6 3c 59 b1 3a 94 d3 | n d5 2a 73 91 bd 59 5f 3e 72 bf 4a 1b 9d c5 b2 2b | n 4d e7 0d 24 3e 77 f9 7f 2d d6 9d 29 ef 70 7d 7a | n 6d a2 b8 61 0c 4b 09 4a 06 71 84 70 85 9a 8f 52 | n a1 80 06 fd c6 fc 3e 27 fa 16 fa 32 83 a9 ca 80 | n db 0f 4a bf f7 e9 55 8e bd 29 4d 23 a6 dc 2a b3 | n 5d 62 a9 21 1e be 83 d8 69 3c 03 0a 48 8e d3 3a | n 11 f2 86 5a d1 30 65 bd c8 f4 83 87 ff 04 87 33 | n 05 4f e0 d8 8c fe b3 19 4c dd 85 40 f3 4d 6e e8 | n 49 14 06 2c 1f 59 59 05 8f 20 b0 ca 46 3f c9 20 | n 7e 04 30 7d 9a 80 6c 3f 0a 89 f7 d3 af d8 15 04 | n 37 f9 | e 03 | CKAID b4 9f 1a ac 9e 45 6e 79 29 c8 81 97 3a 0c 6a d3 | CKAID 7f 0f 03 50 | close_any(fd@16) (in whack_process() at rcv_whack.c:700) | accept(whackctlfd, (struct sockaddr *)&whackaddr, &whackaddrlen) -> fd@16 (in whack_handle() at rcv_whack.c:721) add keyid @east | unreference key: 0x56080ae616c0 @east cnt 1-- | add pubkey 01 03 bd 6c 96 eb df 78 89 b3 ed 77 0d a1 7f 7b | add pubkey e5 16 c2 c9 e4 7d 92 0a 90 9d 55 43 b4 62 13 03 | add pubkey 85 7a e0 26 7b 54 1f ca 09 93 cf ff 25 c9 02 4c | add pubkey 78 ca 94 e5 3e ac d1 f9 a8 e5 bb 7f cc 20 84 e0 | add pubkey 21 c9 f0 0d c5 44 ba f3 48 64 61 58 f6 0f 63 0d | add pubkey d2 67 1e 59 8b ec f3 50 39 71 fb 39 da 11 64 b6 | add pubkey 62 cd 5f d3 8d 2e c1 50 ed 9c 6e 22 0c 39 a7 ce | add pubkey 62 b5 af 8a 80 0f 2e 4c 05 5c 82 c7 8d 29 02 2e | add pubkey bb 23 5f db f2 9e b5 7d e2 20 70 1a 63 f3 8e 5d | add pubkey ac 47 f0 5c 26 4e b1 d0 42 60 52 4a b0 77 25 ce | add pubkey e0 98 2b 43 f4 c7 59 1a 64 01 83 ea 4e e3 1a 2a | add pubkey 92 b8 55 ab 63 dd 4b 70 47 29 dc e9 b4 60 bf 43 | add pubkey 4d 58 8f 64 73 95 70 ac 35 89 b2 c2 9c d4 62 c0 | add pubkey 5f 56 5f ad 1b e5 dd 49 93 6a f5 23 82 ed d4 e7 | add pubkey d5 f1 55 f2 2d a2 26 a6 36 53 2f 94 fb 99 22 5c | add pubkey 47 cc 6d 80 30 88 96 38 0c f5 f2 ed 37 d0 09 d5 | add pubkey 07 8f 69 ef a9 99 ce 4d 1a 77 9e 39 c4 38 f3 c5 | add pubkey 51 51 48 ef | computed rsa CKAID 61 55 99 73 d3 ac ef 7d 3a 37 0e 3e 82 ad 92 c1 | computed rsa CKAID 8a 82 25 f1 | keyid: *AQO9bJbr3 | n bd 6c 96 eb df 78 89 b3 ed 77 0d a1 7f 7b e5 16 | n c2 c9 e4 7d 92 0a 90 9d 55 43 b4 62 13 03 85 7a | n e0 26 7b 54 1f ca 09 93 cf ff 25 c9 02 4c 78 ca | n 94 e5 3e ac d1 f9 a8 e5 bb 7f cc 20 84 e0 21 c9 | n f0 0d c5 44 ba f3 48 64 61 58 f6 0f 63 0d d2 67 | n 1e 59 8b ec f3 50 39 71 fb 39 da 11 64 b6 62 cd | n 5f d3 8d 2e c1 50 ed 9c 6e 22 0c 39 a7 ce 62 b5 | n af 8a 80 0f 2e 4c 05 5c 82 c7 8d 29 02 2e bb 23 | n 5f db f2 9e b5 7d e2 20 70 1a 63 f3 8e 5d ac 47 | n f0 5c 26 4e b1 d0 42 60 52 4a b0 77 25 ce e0 98 | n 2b 43 f4 c7 59 1a 64 01 83 ea 4e e3 1a 2a 92 b8 | n 55 ab 63 dd 4b 70 47 29 dc e9 b4 60 bf 43 4d 58 | n 8f 64 73 95 70 ac 35 89 b2 c2 9c d4 62 c0 5f 56 | n 5f ad 1b e5 dd 49 93 6a f5 23 82 ed d4 e7 d5 f1 | n 55 f2 2d a2 26 a6 36 53 2f 94 fb 99 22 5c 47 cc | n 6d 80 30 88 96 38 0c f5 f2 ed 37 d0 09 d5 07 8f | n 69 ef a9 99 ce 4d 1a 77 9e 39 c4 38 f3 c5 51 51 | n 48 ef | e 03 | CKAID 61 55 99 73 d3 ac ef 7d 3a 37 0e 3e 82 ad 92 c1 | CKAID 8a 82 25 f1 | close_any(fd@16) (in whack_process() at rcv_whack.c:700) | accept(whackctlfd, (struct sockaddr *)&whackaddr, &whackaddrlen) -> fd@16 (in whack_handle() at rcv_whack.c:721) | dup_any(fd@16) -> fd@25 (in whack_process() at rcv_whack.c:590) | FOR_EACH_CONNECTION_... in conn_by_name initiating all conns with alias='westnets-eastnet' | FOR_EACH_CONNECTION_... in foreach_connection_by_alias | start processing: connection "westnets-eastnet/2x0" (in initiate_a_connection() at initiate.c:186) | empty esp_info, returning defaults for ENCRYPT | connection 'westnets-eastnet/2x0' +POLICY_UP | dup_any(fd@25) -> fd@26 (in initiate_a_connection() at initiate.c:342) | FOR_EACH_STATE_... in find_phase1_state | creating state object #1 at 0x56080aeffdf0 | State DB: adding IKEv1 state #1 in UNDEFINED | pstats #1 ikev1.isakmp started | suspend processing: connection "westnets-eastnet/2x0" (in main_outI1() at ikev1_main.c:118) | start processing: state #1 connection "westnets-eastnet/2x0" from 192.1.2.23:500 (in main_outI1() at ikev1_main.c:118) | parent state #1: UNDEFINED(ignore) => MAIN_I1(half-open IKE SA) | dup_any(fd@26) -> fd@27 (in main_outI1() at ikev1_main.c:123) | Queuing pending IPsec SA negotiating with 192.1.2.23 "westnets-eastnet/2x0" IKE SA #1 "westnets-eastnet/2x0" "westnets-eastnet/2x0" #1: initiating Main Mode | **emit ISAKMP Message: | initiator cookie: | 3c e4 38 3f ed 34 7c e6 | responder cookie: | 00 00 00 00 00 00 00 00 | next payload type: ISAKMP_NEXT_SA (0x1) | ISAKMP version: ISAKMP Version 1.0 (rfc2407) (0x10) | exchange type: ISAKMP_XCHG_IDPROT (0x2) | flags: none (0x0) | Message ID: 0 (0x0) | next payload chain: saving message location 'ISAKMP Message'.'next payload type' | next payload chain: ignoring supplied 'ISAKMP Message'.'next payload type' value 1:ISAKMP_NEXT_SA | no specific IKE algorithms specified - using defaults | oakley_alg_makedb() processing ealg=aes=7 halg=sha2_256=4 modp=MODP2048=14 eklen=0 | oakley_alg_makedb() processing ealg=aes=7 halg=sha2_512=6 modp=MODP2048=14 eklen=0 | oakley_alg_makedb() processing ealg=aes=7 halg=sha=2 modp=MODP2048=14 eklen=0 | oakley_alg_makedb() processing ealg=aes=7 halg=sha2_256=4 modp=MODP1536=5 eklen=0 | oakley_alg_makedb() processing ealg=aes=7 halg=sha2_512=6 modp=MODP1536=5 eklen=0 | oakley_alg_makedb() processing ealg=aes=7 halg=sha=2 modp=MODP1536=5 eklen=0 | oakley_alg_makedb() processing ealg=3des_cbc=5 halg=sha2_256=4 modp=MODP2048=14 eklen=0 | oakley_alg_makedb() processing ealg=3des_cbc=5 halg=sha2_512=6 modp=MODP2048=14 eklen=0 | oakley_alg_makedb() processing ealg=3des_cbc=5 halg=sha=2 modp=MODP2048=14 eklen=0 | oakley_alg_makedb() processing ealg=3des_cbc=5 halg=sha2_256=4 modp=MODP1536=5 eklen=0 | oakley_alg_makedb() processing ealg=3des_cbc=5 halg=sha2_512=6 modp=MODP1536=5 eklen=0 | oakley_alg_makedb() processing ealg=3des_cbc=5 halg=sha=2 modp=MODP1536=5 eklen=0 | oakley_alg_makedb() returning 0x56080af01130 | ***emit ISAKMP Security Association Payload: | next payload type: ISAKMP_NEXT_VID (0xd) | DOI: ISAKMP_DOI_IPSEC (0x1) | next payload chain: ignoring supplied 'ISAKMP Security Association Payload'.'next payload type' value 13:ISAKMP_NEXT_VID | next payload chain: setting previous 'ISAKMP Message'.'next payload type' to current ISAKMP Security Association Payload (1:ISAKMP_NEXT_SA) | next payload chain: saving location 'ISAKMP Security Association Payload'.'next payload type' in 'reply packet' | ****emit IPsec DOI SIT: | IPsec DOI SIT: SIT_IDENTITY_ONLY (0x1) | ikev1_out_sa pcn: 0 has 1 valid proposals | ikev1_out_sa pcn: 0 pn: 0<1 valid_count: 1 trans_cnt: 18 | ****emit ISAKMP Proposal Payload: | next payload type: ISAKMP_NEXT_NONE (0x0) | proposal number: 0 (0x0) | protocol ID: PROTO_ISAKMP (0x1) | SPI size: 0 (0x0) | number of transforms: 18 (0x12) | last substructure: saving location 'ISAKMP Security Association Payload'.'ISAKMP Proposal Payload'.'next payload type' | *****emit ISAKMP Transform Payload (ISAKMP): | next payload type: ISAKMP_NEXT_T (0x3) | ISAKMP transform number: 0 (0x0) | ISAKMP transform ID: KEY_IKE (0x1) | last substructure: saving location 'ISAKMP Proposal Payload'.'ISAKMP Transform Payload (ISAKMP)'.'next payload type' | ******emit ISAKMP Oakley attribute: | af+type: AF+OAKLEY_LIFE_TYPE (0x800b) | length/value: 1 (0x1) | [1 is OAKLEY_LIFE_SECONDS] | ******emit ISAKMP Oakley attribute: | af+type: AF+OAKLEY_LIFE_DURATION (variable length) (0x800c) | length/value: 3600 (0xe10) | ******emit ISAKMP Oakley attribute: | af+type: AF+OAKLEY_ENCRYPTION_ALGORITHM (0x8001) | length/value: 7 (0x7) | [7 is OAKLEY_AES_CBC] | ******emit ISAKMP Oakley attribute: | af+type: AF+OAKLEY_HASH_ALGORITHM (0x8002) | length/value: 4 (0x4) | [4 is OAKLEY_SHA2_256] | ******emit ISAKMP Oakley attribute: | af+type: AF+OAKLEY_AUTHENTICATION_METHOD (0x8003) | length/value: 3 (0x3) | [3 is OAKLEY_RSA_SIG] | ******emit ISAKMP Oakley attribute: | af+type: AF+OAKLEY_GROUP_DESCRIPTION (0x8004) | length/value: 14 (0xe) | [14 is OAKLEY_GROUP_MODP2048] | ******emit ISAKMP Oakley attribute: | af+type: AF+OAKLEY_KEY_LENGTH (0x800e) | length/value: 256 (0x100) | emitting length of ISAKMP Transform Payload (ISAKMP): 36 | *****emit ISAKMP Transform Payload (ISAKMP): | next payload type: ISAKMP_NEXT_T (0x3) | ISAKMP transform number: 1 (0x1) | ISAKMP transform ID: KEY_IKE (0x1) | last substructure: checking 'ISAKMP Proposal Payload'.'ISAKMP Transform Payload (ISAKMP)'.'next payload type' is ISAKMP_NEXT_T (0x3) | last substructure: saving location 'ISAKMP Proposal Payload'.'ISAKMP Transform Payload (ISAKMP)'.'next payload type' | ******emit ISAKMP Oakley attribute: | af+type: AF+OAKLEY_LIFE_TYPE (0x800b) | length/value: 1 (0x1) | [1 is OAKLEY_LIFE_SECONDS] | ******emit ISAKMP Oakley attribute: | af+type: AF+OAKLEY_LIFE_DURATION (variable length) (0x800c) | length/value: 3600 (0xe10) | ******emit ISAKMP Oakley attribute: | af+type: AF+OAKLEY_ENCRYPTION_ALGORITHM (0x8001) | length/value: 7 (0x7) | [7 is OAKLEY_AES_CBC] | ******emit ISAKMP Oakley attribute: | af+type: AF+OAKLEY_HASH_ALGORITHM (0x8002) | length/value: 4 (0x4) | [4 is OAKLEY_SHA2_256] | ******emit ISAKMP Oakley attribute: | af+type: AF+OAKLEY_AUTHENTICATION_METHOD (0x8003) | length/value: 3 (0x3) | [3 is OAKLEY_RSA_SIG] | ******emit ISAKMP Oakley attribute: | af+type: AF+OAKLEY_GROUP_DESCRIPTION (0x8004) | length/value: 14 (0xe) | [14 is OAKLEY_GROUP_MODP2048] | ******emit ISAKMP Oakley attribute: | af+type: AF+OAKLEY_KEY_LENGTH (0x800e) | length/value: 128 (0x80) | emitting length of ISAKMP Transform Payload (ISAKMP): 36 | *****emit ISAKMP Transform Payload (ISAKMP): | next payload type: ISAKMP_NEXT_T (0x3) | ISAKMP transform number: 2 (0x2) | ISAKMP transform ID: KEY_IKE (0x1) | last substructure: checking 'ISAKMP Proposal Payload'.'ISAKMP Transform Payload (ISAKMP)'.'next payload type' is ISAKMP_NEXT_T (0x3) | last substructure: saving location 'ISAKMP Proposal Payload'.'ISAKMP Transform Payload (ISAKMP)'.'next payload type' | ******emit ISAKMP Oakley attribute: | af+type: AF+OAKLEY_LIFE_TYPE (0x800b) | length/value: 1 (0x1) | [1 is OAKLEY_LIFE_SECONDS] | ******emit ISAKMP Oakley attribute: | af+type: AF+OAKLEY_LIFE_DURATION (variable length) (0x800c) | length/value: 3600 (0xe10) | ******emit ISAKMP Oakley attribute: | af+type: AF+OAKLEY_ENCRYPTION_ALGORITHM (0x8001) | length/value: 7 (0x7) | [7 is OAKLEY_AES_CBC] | ******emit ISAKMP Oakley attribute: | af+type: AF+OAKLEY_HASH_ALGORITHM (0x8002) | length/value: 6 (0x6) | [6 is OAKLEY_SHA2_512] | ******emit ISAKMP Oakley attribute: | af+type: AF+OAKLEY_AUTHENTICATION_METHOD (0x8003) | length/value: 3 (0x3) | [3 is OAKLEY_RSA_SIG] | ******emit ISAKMP Oakley attribute: | af+type: AF+OAKLEY_GROUP_DESCRIPTION (0x8004) | length/value: 14 (0xe) | [14 is OAKLEY_GROUP_MODP2048] | ******emit ISAKMP Oakley attribute: | af+type: AF+OAKLEY_KEY_LENGTH (0x800e) | length/value: 256 (0x100) | emitting length of ISAKMP Transform Payload (ISAKMP): 36 | *****emit ISAKMP Transform Payload (ISAKMP): | next payload type: ISAKMP_NEXT_T (0x3) | ISAKMP transform number: 3 (0x3) | ISAKMP transform ID: KEY_IKE (0x1) | last substructure: checking 'ISAKMP Proposal Payload'.'ISAKMP Transform Payload (ISAKMP)'.'next payload type' is ISAKMP_NEXT_T (0x3) | last substructure: saving location 'ISAKMP Proposal Payload'.'ISAKMP Transform Payload (ISAKMP)'.'next payload type' | ******emit ISAKMP Oakley attribute: | af+type: AF+OAKLEY_LIFE_TYPE (0x800b) | length/value: 1 (0x1) | [1 is OAKLEY_LIFE_SECONDS] | ******emit ISAKMP Oakley attribute: | af+type: AF+OAKLEY_LIFE_DURATION (variable length) (0x800c) | length/value: 3600 (0xe10) | ******emit ISAKMP Oakley attribute: | af+type: AF+OAKLEY_ENCRYPTION_ALGORITHM (0x8001) | length/value: 7 (0x7) | [7 is OAKLEY_AES_CBC] | ******emit ISAKMP Oakley attribute: | af+type: AF+OAKLEY_HASH_ALGORITHM (0x8002) | length/value: 6 (0x6) | [6 is OAKLEY_SHA2_512] | ******emit ISAKMP Oakley attribute: | af+type: AF+OAKLEY_AUTHENTICATION_METHOD (0x8003) | length/value: 3 (0x3) | [3 is OAKLEY_RSA_SIG] | ******emit ISAKMP Oakley attribute: | af+type: AF+OAKLEY_GROUP_DESCRIPTION (0x8004) | length/value: 14 (0xe) | [14 is OAKLEY_GROUP_MODP2048] | ******emit ISAKMP Oakley attribute: | af+type: AF+OAKLEY_KEY_LENGTH (0x800e) | length/value: 128 (0x80) | emitting length of ISAKMP Transform Payload (ISAKMP): 36 | *****emit ISAKMP Transform Payload (ISAKMP): | next payload type: ISAKMP_NEXT_T (0x3) | ISAKMP transform number: 4 (0x4) | ISAKMP transform ID: KEY_IKE (0x1) | last substructure: checking 'ISAKMP Proposal Payload'.'ISAKMP Transform Payload (ISAKMP)'.'next payload type' is ISAKMP_NEXT_T (0x3) | last substructure: saving location 'ISAKMP Proposal Payload'.'ISAKMP Transform Payload (ISAKMP)'.'next payload type' | ******emit ISAKMP Oakley attribute: | af+type: AF+OAKLEY_LIFE_TYPE (0x800b) | length/value: 1 (0x1) | [1 is OAKLEY_LIFE_SECONDS] | ******emit ISAKMP Oakley attribute: | af+type: AF+OAKLEY_LIFE_DURATION (variable length) (0x800c) | length/value: 3600 (0xe10) | ******emit ISAKMP Oakley attribute: | af+type: AF+OAKLEY_ENCRYPTION_ALGORITHM (0x8001) | length/value: 7 (0x7) | [7 is OAKLEY_AES_CBC] | ******emit ISAKMP Oakley attribute: | af+type: AF+OAKLEY_HASH_ALGORITHM (0x8002) | length/value: 2 (0x2) | [2 is OAKLEY_SHA1] | ******emit ISAKMP Oakley attribute: | af+type: AF+OAKLEY_AUTHENTICATION_METHOD (0x8003) | length/value: 3 (0x3) | [3 is OAKLEY_RSA_SIG] | ******emit ISAKMP Oakley attribute: | af+type: AF+OAKLEY_GROUP_DESCRIPTION (0x8004) | length/value: 14 (0xe) | [14 is OAKLEY_GROUP_MODP2048] | ******emit ISAKMP Oakley attribute: | af+type: AF+OAKLEY_KEY_LENGTH (0x800e) | length/value: 256 (0x100) | emitting length of ISAKMP Transform Payload (ISAKMP): 36 | *****emit ISAKMP Transform Payload (ISAKMP): | next payload type: ISAKMP_NEXT_T (0x3) | ISAKMP transform number: 5 (0x5) | ISAKMP transform ID: KEY_IKE (0x1) | last substructure: checking 'ISAKMP Proposal Payload'.'ISAKMP Transform Payload (ISAKMP)'.'next payload type' is ISAKMP_NEXT_T (0x3) | last substructure: saving location 'ISAKMP Proposal Payload'.'ISAKMP Transform Payload (ISAKMP)'.'next payload type' | ******emit ISAKMP Oakley attribute: | af+type: AF+OAKLEY_LIFE_TYPE (0x800b) | length/value: 1 (0x1) | [1 is OAKLEY_LIFE_SECONDS] | ******emit ISAKMP Oakley attribute: | af+type: AF+OAKLEY_LIFE_DURATION (variable length) (0x800c) | length/value: 3600 (0xe10) | ******emit ISAKMP Oakley attribute: | af+type: AF+OAKLEY_ENCRYPTION_ALGORITHM (0x8001) | length/value: 7 (0x7) | [7 is OAKLEY_AES_CBC] | ******emit ISAKMP Oakley attribute: | af+type: AF+OAKLEY_HASH_ALGORITHM (0x8002) | length/value: 2 (0x2) | [2 is OAKLEY_SHA1] | ******emit ISAKMP Oakley attribute: | af+type: AF+OAKLEY_AUTHENTICATION_METHOD (0x8003) | length/value: 3 (0x3) | [3 is OAKLEY_RSA_SIG] | ******emit ISAKMP Oakley attribute: | af+type: AF+OAKLEY_GROUP_DESCRIPTION (0x8004) | length/value: 14 (0xe) | [14 is OAKLEY_GROUP_MODP2048] | ******emit ISAKMP Oakley attribute: | af+type: AF+OAKLEY_KEY_LENGTH (0x800e) | length/value: 128 (0x80) | emitting length of ISAKMP Transform Payload (ISAKMP): 36 | *****emit ISAKMP Transform Payload (ISAKMP): | next payload type: ISAKMP_NEXT_T (0x3) | ISAKMP transform number: 6 (0x6) | ISAKMP transform ID: KEY_IKE (0x1) | last substructure: checking 'ISAKMP Proposal Payload'.'ISAKMP Transform Payload (ISAKMP)'.'next payload type' is ISAKMP_NEXT_T (0x3) | last substructure: saving location 'ISAKMP Proposal Payload'.'ISAKMP Transform Payload (ISAKMP)'.'next payload type' | ******emit ISAKMP Oakley attribute: | af+type: AF+OAKLEY_LIFE_TYPE (0x800b) | length/value: 1 (0x1) | [1 is OAKLEY_LIFE_SECONDS] | ******emit ISAKMP Oakley attribute: | af+type: AF+OAKLEY_LIFE_DURATION (variable length) (0x800c) | length/value: 3600 (0xe10) | ******emit ISAKMP Oakley attribute: | af+type: AF+OAKLEY_ENCRYPTION_ALGORITHM (0x8001) | length/value: 7 (0x7) | [7 is OAKLEY_AES_CBC] | ******emit ISAKMP Oakley attribute: | af+type: AF+OAKLEY_HASH_ALGORITHM (0x8002) | length/value: 4 (0x4) | [4 is OAKLEY_SHA2_256] | ******emit ISAKMP Oakley attribute: | af+type: AF+OAKLEY_AUTHENTICATION_METHOD (0x8003) | length/value: 3 (0x3) | [3 is OAKLEY_RSA_SIG] | ******emit ISAKMP Oakley attribute: | af+type: AF+OAKLEY_GROUP_DESCRIPTION (0x8004) | length/value: 5 (0x5) | [5 is OAKLEY_GROUP_MODP1536] | ******emit ISAKMP Oakley attribute: | af+type: AF+OAKLEY_KEY_LENGTH (0x800e) | length/value: 256 (0x100) | emitting length of ISAKMP Transform Payload (ISAKMP): 36 | *****emit ISAKMP Transform Payload (ISAKMP): | next payload type: ISAKMP_NEXT_T (0x3) | ISAKMP transform number: 7 (0x7) | ISAKMP transform ID: KEY_IKE (0x1) | last substructure: checking 'ISAKMP Proposal Payload'.'ISAKMP Transform Payload (ISAKMP)'.'next payload type' is ISAKMP_NEXT_T (0x3) | last substructure: saving location 'ISAKMP Proposal Payload'.'ISAKMP Transform Payload (ISAKMP)'.'next payload type' | ******emit ISAKMP Oakley attribute: | af+type: AF+OAKLEY_LIFE_TYPE (0x800b) | length/value: 1 (0x1) | [1 is OAKLEY_LIFE_SECONDS] | ******emit ISAKMP Oakley attribute: | af+type: AF+OAKLEY_LIFE_DURATION (variable length) (0x800c) | length/value: 3600 (0xe10) | ******emit ISAKMP Oakley attribute: | af+type: AF+OAKLEY_ENCRYPTION_ALGORITHM (0x8001) | length/value: 7 (0x7) | [7 is OAKLEY_AES_CBC] | ******emit ISAKMP Oakley attribute: | af+type: AF+OAKLEY_HASH_ALGORITHM (0x8002) | length/value: 4 (0x4) | [4 is OAKLEY_SHA2_256] | ******emit ISAKMP Oakley attribute: | af+type: AF+OAKLEY_AUTHENTICATION_METHOD (0x8003) | length/value: 3 (0x3) | [3 is OAKLEY_RSA_SIG] | ******emit ISAKMP Oakley attribute: | af+type: AF+OAKLEY_GROUP_DESCRIPTION (0x8004) | length/value: 5 (0x5) | [5 is OAKLEY_GROUP_MODP1536] | ******emit ISAKMP Oakley attribute: | af+type: AF+OAKLEY_KEY_LENGTH (0x800e) | length/value: 128 (0x80) | emitting length of ISAKMP Transform Payload (ISAKMP): 36 | *****emit ISAKMP Transform Payload (ISAKMP): | next payload type: ISAKMP_NEXT_T (0x3) | ISAKMP transform number: 8 (0x8) | ISAKMP transform ID: KEY_IKE (0x1) | last substructure: checking 'ISAKMP Proposal Payload'.'ISAKMP Transform Payload (ISAKMP)'.'next payload type' is ISAKMP_NEXT_T (0x3) | last substructure: saving location 'ISAKMP Proposal Payload'.'ISAKMP Transform Payload (ISAKMP)'.'next payload type' | ******emit ISAKMP Oakley attribute: | af+type: AF+OAKLEY_LIFE_TYPE (0x800b) | length/value: 1 (0x1) | [1 is OAKLEY_LIFE_SECONDS] | ******emit ISAKMP Oakley attribute: | af+type: AF+OAKLEY_LIFE_DURATION (variable length) (0x800c) | length/value: 3600 (0xe10) | ******emit ISAKMP Oakley attribute: | af+type: AF+OAKLEY_ENCRYPTION_ALGORITHM (0x8001) | length/value: 7 (0x7) | [7 is OAKLEY_AES_CBC] | ******emit ISAKMP Oakley attribute: | af+type: AF+OAKLEY_HASH_ALGORITHM (0x8002) | length/value: 6 (0x6) | [6 is OAKLEY_SHA2_512] | ******emit ISAKMP Oakley attribute: | af+type: AF+OAKLEY_AUTHENTICATION_METHOD (0x8003) | length/value: 3 (0x3) | [3 is OAKLEY_RSA_SIG] | ******emit ISAKMP Oakley attribute: | af+type: AF+OAKLEY_GROUP_DESCRIPTION (0x8004) | length/value: 5 (0x5) | [5 is OAKLEY_GROUP_MODP1536] | ******emit ISAKMP Oakley attribute: | af+type: AF+OAKLEY_KEY_LENGTH (0x800e) | length/value: 256 (0x100) | emitting length of ISAKMP Transform Payload (ISAKMP): 36 | *****emit ISAKMP Transform Payload (ISAKMP): | next payload type: ISAKMP_NEXT_T (0x3) | ISAKMP transform number: 9 (0x9) | ISAKMP transform ID: KEY_IKE (0x1) | last substructure: checking 'ISAKMP Proposal Payload'.'ISAKMP Transform Payload (ISAKMP)'.'next payload type' is ISAKMP_NEXT_T (0x3) | last substructure: saving location 'ISAKMP Proposal Payload'.'ISAKMP Transform Payload (ISAKMP)'.'next payload type' | ******emit ISAKMP Oakley attribute: | af+type: AF+OAKLEY_LIFE_TYPE (0x800b) | length/value: 1 (0x1) | [1 is OAKLEY_LIFE_SECONDS] | ******emit ISAKMP Oakley attribute: | af+type: AF+OAKLEY_LIFE_DURATION (variable length) (0x800c) | length/value: 3600 (0xe10) | ******emit ISAKMP Oakley attribute: | af+type: AF+OAKLEY_ENCRYPTION_ALGORITHM (0x8001) | length/value: 7 (0x7) | [7 is OAKLEY_AES_CBC] | ******emit ISAKMP Oakley attribute: | af+type: AF+OAKLEY_HASH_ALGORITHM (0x8002) | length/value: 6 (0x6) | [6 is OAKLEY_SHA2_512] | ******emit ISAKMP Oakley attribute: | af+type: AF+OAKLEY_AUTHENTICATION_METHOD (0x8003) | length/value: 3 (0x3) | [3 is OAKLEY_RSA_SIG] | ******emit ISAKMP Oakley attribute: | af+type: AF+OAKLEY_GROUP_DESCRIPTION (0x8004) | length/value: 5 (0x5) | [5 is OAKLEY_GROUP_MODP1536] | ******emit ISAKMP Oakley attribute: | af+type: AF+OAKLEY_KEY_LENGTH (0x800e) | length/value: 128 (0x80) | emitting length of ISAKMP Transform Payload (ISAKMP): 36 | *****emit ISAKMP Transform Payload (ISAKMP): | next payload type: ISAKMP_NEXT_T (0x3) | ISAKMP transform number: 10 (0xa) | ISAKMP transform ID: KEY_IKE (0x1) | last substructure: checking 'ISAKMP Proposal Payload'.'ISAKMP Transform Payload (ISAKMP)'.'next payload type' is ISAKMP_NEXT_T (0x3) | last substructure: saving location 'ISAKMP Proposal Payload'.'ISAKMP Transform Payload (ISAKMP)'.'next payload type' | ******emit ISAKMP Oakley attribute: | af+type: AF+OAKLEY_LIFE_TYPE (0x800b) | length/value: 1 (0x1) | [1 is OAKLEY_LIFE_SECONDS] | ******emit ISAKMP Oakley attribute: | af+type: AF+OAKLEY_LIFE_DURATION (variable length) (0x800c) | length/value: 3600 (0xe10) | ******emit ISAKMP Oakley attribute: | af+type: AF+OAKLEY_ENCRYPTION_ALGORITHM (0x8001) | length/value: 7 (0x7) | [7 is OAKLEY_AES_CBC] | ******emit ISAKMP Oakley attribute: | af+type: AF+OAKLEY_HASH_ALGORITHM (0x8002) | length/value: 2 (0x2) | [2 is OAKLEY_SHA1] | ******emit ISAKMP Oakley attribute: | af+type: AF+OAKLEY_AUTHENTICATION_METHOD (0x8003) | length/value: 3 (0x3) | [3 is OAKLEY_RSA_SIG] | ******emit ISAKMP Oakley attribute: | af+type: AF+OAKLEY_GROUP_DESCRIPTION (0x8004) | length/value: 5 (0x5) | [5 is OAKLEY_GROUP_MODP1536] | ******emit ISAKMP Oakley attribute: | af+type: AF+OAKLEY_KEY_LENGTH (0x800e) | length/value: 256 (0x100) | emitting length of ISAKMP Transform Payload (ISAKMP): 36 | *****emit ISAKMP Transform Payload (ISAKMP): | next payload type: ISAKMP_NEXT_T (0x3) | ISAKMP transform number: 11 (0xb) | ISAKMP transform ID: KEY_IKE (0x1) | last substructure: checking 'ISAKMP Proposal Payload'.'ISAKMP Transform Payload (ISAKMP)'.'next payload type' is ISAKMP_NEXT_T (0x3) | last substructure: saving location 'ISAKMP Proposal Payload'.'ISAKMP Transform Payload (ISAKMP)'.'next payload type' | ******emit ISAKMP Oakley attribute: | af+type: AF+OAKLEY_LIFE_TYPE (0x800b) | length/value: 1 (0x1) | [1 is OAKLEY_LIFE_SECONDS] | ******emit ISAKMP Oakley attribute: | af+type: AF+OAKLEY_LIFE_DURATION (variable length) (0x800c) | length/value: 3600 (0xe10) | ******emit ISAKMP Oakley attribute: | af+type: AF+OAKLEY_ENCRYPTION_ALGORITHM (0x8001) | length/value: 7 (0x7) | [7 is OAKLEY_AES_CBC] | ******emit ISAKMP Oakley attribute: | af+type: AF+OAKLEY_HASH_ALGORITHM (0x8002) | length/value: 2 (0x2) | [2 is OAKLEY_SHA1] | ******emit ISAKMP Oakley attribute: | af+type: AF+OAKLEY_AUTHENTICATION_METHOD (0x8003) | length/value: 3 (0x3) | [3 is OAKLEY_RSA_SIG] | ******emit ISAKMP Oakley attribute: | af+type: AF+OAKLEY_GROUP_DESCRIPTION (0x8004) | length/value: 5 (0x5) | [5 is OAKLEY_GROUP_MODP1536] | ******emit ISAKMP Oakley attribute: | af+type: AF+OAKLEY_KEY_LENGTH (0x800e) | length/value: 128 (0x80) | emitting length of ISAKMP Transform Payload (ISAKMP): 36 | *****emit ISAKMP Transform Payload (ISAKMP): | next payload type: ISAKMP_NEXT_T (0x3) | ISAKMP transform number: 12 (0xc) | ISAKMP transform ID: KEY_IKE (0x1) | last substructure: checking 'ISAKMP Proposal Payload'.'ISAKMP Transform Payload (ISAKMP)'.'next payload type' is ISAKMP_NEXT_T (0x3) | last substructure: saving location 'ISAKMP Proposal Payload'.'ISAKMP Transform Payload (ISAKMP)'.'next payload type' | ******emit ISAKMP Oakley attribute: | af+type: AF+OAKLEY_LIFE_TYPE (0x800b) | length/value: 1 (0x1) | [1 is OAKLEY_LIFE_SECONDS] | ******emit ISAKMP Oakley attribute: | af+type: AF+OAKLEY_LIFE_DURATION (variable length) (0x800c) | length/value: 3600 (0xe10) | ******emit ISAKMP Oakley attribute: | af+type: AF+OAKLEY_ENCRYPTION_ALGORITHM (0x8001) | length/value: 5 (0x5) | [5 is OAKLEY_3DES_CBC] | ******emit ISAKMP Oakley attribute: | af+type: AF+OAKLEY_HASH_ALGORITHM (0x8002) | length/value: 4 (0x4) | [4 is OAKLEY_SHA2_256] | ******emit ISAKMP Oakley attribute: | af+type: AF+OAKLEY_AUTHENTICATION_METHOD (0x8003) | length/value: 3 (0x3) | [3 is OAKLEY_RSA_SIG] | ******emit ISAKMP Oakley attribute: | af+type: AF+OAKLEY_GROUP_DESCRIPTION (0x8004) | length/value: 14 (0xe) | [14 is OAKLEY_GROUP_MODP2048] | emitting length of ISAKMP Transform Payload (ISAKMP): 32 | *****emit ISAKMP Transform Payload (ISAKMP): | next payload type: ISAKMP_NEXT_T (0x3) | ISAKMP transform number: 13 (0xd) | ISAKMP transform ID: KEY_IKE (0x1) | last substructure: checking 'ISAKMP Proposal Payload'.'ISAKMP Transform Payload (ISAKMP)'.'next payload type' is ISAKMP_NEXT_T (0x3) | last substructure: saving location 'ISAKMP Proposal Payload'.'ISAKMP Transform Payload (ISAKMP)'.'next payload type' | ******emit ISAKMP Oakley attribute: | af+type: AF+OAKLEY_LIFE_TYPE (0x800b) | length/value: 1 (0x1) | [1 is OAKLEY_LIFE_SECONDS] | ******emit ISAKMP Oakley attribute: | af+type: AF+OAKLEY_LIFE_DURATION (variable length) (0x800c) | length/value: 3600 (0xe10) | ******emit ISAKMP Oakley attribute: | af+type: AF+OAKLEY_ENCRYPTION_ALGORITHM (0x8001) | length/value: 5 (0x5) | [5 is OAKLEY_3DES_CBC] | ******emit ISAKMP Oakley attribute: | af+type: AF+OAKLEY_HASH_ALGORITHM (0x8002) | length/value: 6 (0x6) | [6 is OAKLEY_SHA2_512] | ******emit ISAKMP Oakley attribute: | af+type: AF+OAKLEY_AUTHENTICATION_METHOD (0x8003) | length/value: 3 (0x3) | [3 is OAKLEY_RSA_SIG] | ******emit ISAKMP Oakley attribute: | af+type: AF+OAKLEY_GROUP_DESCRIPTION (0x8004) | length/value: 14 (0xe) | [14 is OAKLEY_GROUP_MODP2048] | emitting length of ISAKMP Transform Payload (ISAKMP): 32 | *****emit ISAKMP Transform Payload (ISAKMP): | next payload type: ISAKMP_NEXT_T (0x3) | ISAKMP transform number: 14 (0xe) | ISAKMP transform ID: KEY_IKE (0x1) | last substructure: checking 'ISAKMP Proposal Payload'.'ISAKMP Transform Payload (ISAKMP)'.'next payload type' is ISAKMP_NEXT_T (0x3) | last substructure: saving location 'ISAKMP Proposal Payload'.'ISAKMP Transform Payload (ISAKMP)'.'next payload type' | ******emit ISAKMP Oakley attribute: | af+type: AF+OAKLEY_LIFE_TYPE (0x800b) | length/value: 1 (0x1) | [1 is OAKLEY_LIFE_SECONDS] | ******emit ISAKMP Oakley attribute: | af+type: AF+OAKLEY_LIFE_DURATION (variable length) (0x800c) | length/value: 3600 (0xe10) | ******emit ISAKMP Oakley attribute: | af+type: AF+OAKLEY_ENCRYPTION_ALGORITHM (0x8001) | length/value: 5 (0x5) | [5 is OAKLEY_3DES_CBC] | ******emit ISAKMP Oakley attribute: | af+type: AF+OAKLEY_HASH_ALGORITHM (0x8002) | length/value: 2 (0x2) | [2 is OAKLEY_SHA1] | ******emit ISAKMP Oakley attribute: | af+type: AF+OAKLEY_AUTHENTICATION_METHOD (0x8003) | length/value: 3 (0x3) | [3 is OAKLEY_RSA_SIG] | ******emit ISAKMP Oakley attribute: | af+type: AF+OAKLEY_GROUP_DESCRIPTION (0x8004) | length/value: 14 (0xe) | [14 is OAKLEY_GROUP_MODP2048] | emitting length of ISAKMP Transform Payload (ISAKMP): 32 | *****emit ISAKMP Transform Payload (ISAKMP): | next payload type: ISAKMP_NEXT_T (0x3) | ISAKMP transform number: 15 (0xf) | ISAKMP transform ID: KEY_IKE (0x1) | last substructure: checking 'ISAKMP Proposal Payload'.'ISAKMP Transform Payload (ISAKMP)'.'next payload type' is ISAKMP_NEXT_T (0x3) | last substructure: saving location 'ISAKMP Proposal Payload'.'ISAKMP Transform Payload (ISAKMP)'.'next payload type' | ******emit ISAKMP Oakley attribute: | af+type: AF+OAKLEY_LIFE_TYPE (0x800b) | length/value: 1 (0x1) | [1 is OAKLEY_LIFE_SECONDS] | ******emit ISAKMP Oakley attribute: | af+type: AF+OAKLEY_LIFE_DURATION (variable length) (0x800c) | length/value: 3600 (0xe10) | ******emit ISAKMP Oakley attribute: | af+type: AF+OAKLEY_ENCRYPTION_ALGORITHM (0x8001) | length/value: 5 (0x5) | [5 is OAKLEY_3DES_CBC] | ******emit ISAKMP Oakley attribute: | af+type: AF+OAKLEY_HASH_ALGORITHM (0x8002) | length/value: 4 (0x4) | [4 is OAKLEY_SHA2_256] | ******emit ISAKMP Oakley attribute: | af+type: AF+OAKLEY_AUTHENTICATION_METHOD (0x8003) | length/value: 3 (0x3) | [3 is OAKLEY_RSA_SIG] | ******emit ISAKMP Oakley attribute: | af+type: AF+OAKLEY_GROUP_DESCRIPTION (0x8004) | length/value: 5 (0x5) | [5 is OAKLEY_GROUP_MODP1536] | emitting length of ISAKMP Transform Payload (ISAKMP): 32 | *****emit ISAKMP Transform Payload (ISAKMP): | next payload type: ISAKMP_NEXT_T (0x3) | ISAKMP transform number: 16 (0x10) | ISAKMP transform ID: KEY_IKE (0x1) | last substructure: checking 'ISAKMP Proposal Payload'.'ISAKMP Transform Payload (ISAKMP)'.'next payload type' is ISAKMP_NEXT_T (0x3) | last substructure: saving location 'ISAKMP Proposal Payload'.'ISAKMP Transform Payload (ISAKMP)'.'next payload type' | ******emit ISAKMP Oakley attribute: | af+type: AF+OAKLEY_LIFE_TYPE (0x800b) | length/value: 1 (0x1) | [1 is OAKLEY_LIFE_SECONDS] | ******emit ISAKMP Oakley attribute: | af+type: AF+OAKLEY_LIFE_DURATION (variable length) (0x800c) | length/value: 3600 (0xe10) | ******emit ISAKMP Oakley attribute: | af+type: AF+OAKLEY_ENCRYPTION_ALGORITHM (0x8001) | length/value: 5 (0x5) | [5 is OAKLEY_3DES_CBC] | ******emit ISAKMP Oakley attribute: | af+type: AF+OAKLEY_HASH_ALGORITHM (0x8002) | length/value: 6 (0x6) | [6 is OAKLEY_SHA2_512] | ******emit ISAKMP Oakley attribute: | af+type: AF+OAKLEY_AUTHENTICATION_METHOD (0x8003) | length/value: 3 (0x3) | [3 is OAKLEY_RSA_SIG] | ******emit ISAKMP Oakley attribute: | af+type: AF+OAKLEY_GROUP_DESCRIPTION (0x8004) | length/value: 5 (0x5) | [5 is OAKLEY_GROUP_MODP1536] | emitting length of ISAKMP Transform Payload (ISAKMP): 32 | *****emit ISAKMP Transform Payload (ISAKMP): | next payload type: ISAKMP_NEXT_NONE (0x0) | ISAKMP transform number: 17 (0x11) | ISAKMP transform ID: KEY_IKE (0x1) | last substructure: checking 'ISAKMP Proposal Payload'.'ISAKMP Transform Payload (ISAKMP)'.'next payload type' is ISAKMP_NEXT_T (0x3) | last substructure: saving location 'ISAKMP Proposal Payload'.'ISAKMP Transform Payload (ISAKMP)'.'next payload type' | ******emit ISAKMP Oakley attribute: | af+type: AF+OAKLEY_LIFE_TYPE (0x800b) | length/value: 1 (0x1) | [1 is OAKLEY_LIFE_SECONDS] | ******emit ISAKMP Oakley attribute: | af+type: AF+OAKLEY_LIFE_DURATION (variable length) (0x800c) | length/value: 3600 (0xe10) | ******emit ISAKMP Oakley attribute: | af+type: AF+OAKLEY_ENCRYPTION_ALGORITHM (0x8001) | length/value: 5 (0x5) | [5 is OAKLEY_3DES_CBC] | ******emit ISAKMP Oakley attribute: | af+type: AF+OAKLEY_HASH_ALGORITHM (0x8002) | length/value: 2 (0x2) | [2 is OAKLEY_SHA1] | ******emit ISAKMP Oakley attribute: | af+type: AF+OAKLEY_AUTHENTICATION_METHOD (0x8003) | length/value: 3 (0x3) | [3 is OAKLEY_RSA_SIG] | ******emit ISAKMP Oakley attribute: | af+type: AF+OAKLEY_GROUP_DESCRIPTION (0x8004) | length/value: 5 (0x5) | [5 is OAKLEY_GROUP_MODP1536] | emitting length of ISAKMP Transform Payload (ISAKMP): 32 | emitting length of ISAKMP Proposal Payload: 632 | last substructure: checking 'ISAKMP Proposal Payload'.'ISAKMP Transform Payload (ISAKMP)'.'next payload type' is 0 | emitting length of ISAKMP Security Association Payload: 644 | last substructure: checking 'ISAKMP Security Association Payload'.'ISAKMP Proposal Payload'.'next payload type' is 0 | out_vid(): sending [FRAGMENTATION] | ***emit ISAKMP Vendor ID Payload: | next payload type: ISAKMP_NEXT_VID (0xd) | next payload chain: ignoring supplied 'ISAKMP Vendor ID Payload'.'next payload type' value 13:ISAKMP_NEXT_VID | next payload chain: setting previous 'ISAKMP Security Association Payload'.'next payload type' to current ISAKMP Vendor ID Payload (13:ISAKMP_NEXT_VID) | next payload chain: saving location 'ISAKMP Vendor ID Payload'.'next payload type' in 'reply packet' | emitting 16 raw bytes of V_ID into ISAKMP Vendor ID Payload | V_ID 40 48 b7 d5 6e bc e8 85 25 e7 de 7f 00 d6 c2 d3 | emitting length of ISAKMP Vendor ID Payload: 20 | out_vid(): sending [Dead Peer Detection] | ***emit ISAKMP Vendor ID Payload: | next payload type: ISAKMP_NEXT_NONE (0x0) | next payload chain: setting previous 'ISAKMP Vendor ID Payload'.'next payload type' to current ISAKMP Vendor ID Payload (13:ISAKMP_NEXT_VID) | next payload chain: saving location 'ISAKMP Vendor ID Payload'.'next payload type' in 'reply packet' | emitting 16 raw bytes of V_ID into ISAKMP Vendor ID Payload | V_ID af ca d7 13 68 a1 f1 c9 6b 86 96 fc 77 57 01 00 | emitting length of ISAKMP Vendor ID Payload: 20 | nat add vid | sending draft and RFC NATT VIDs | out_vid(): sending [RFC 3947] | ***emit ISAKMP Vendor ID Payload: | next payload type: ISAKMP_NEXT_VID (0xd) | next payload chain: ignoring supplied 'ISAKMP Vendor ID Payload'.'next payload type' value 13:ISAKMP_NEXT_VID | next payload chain: setting previous 'ISAKMP Vendor ID Payload'.'next payload type' to current ISAKMP Vendor ID Payload (13:ISAKMP_NEXT_VID) | next payload chain: saving location 'ISAKMP Vendor ID Payload'.'next payload type' in 'reply packet' | emitting 16 raw bytes of V_ID into ISAKMP Vendor ID Payload | V_ID 4a 13 1c 81 07 03 58 45 5c 57 28 f2 0e 95 45 2f | emitting length of ISAKMP Vendor ID Payload: 20 | skipping VID_NATT_RFC | out_vid(): sending [draft-ietf-ipsec-nat-t-ike-03] | ***emit ISAKMP Vendor ID Payload: | next payload type: ISAKMP_NEXT_VID (0xd) | next payload chain: ignoring supplied 'ISAKMP Vendor ID Payload'.'next payload type' value 13:ISAKMP_NEXT_VID | next payload chain: setting previous 'ISAKMP Vendor ID Payload'.'next payload type' to current ISAKMP Vendor ID Payload (13:ISAKMP_NEXT_VID) | next payload chain: saving location 'ISAKMP Vendor ID Payload'.'next payload type' in 'reply packet' | emitting 16 raw bytes of V_ID into ISAKMP Vendor ID Payload | V_ID 7d 94 19 a6 53 10 ca 6f 2c 17 9d 92 15 52 9d 56 | emitting length of ISAKMP Vendor ID Payload: 20 | out_vid(): sending [draft-ietf-ipsec-nat-t-ike-02_n] | ***emit ISAKMP Vendor ID Payload: | next payload type: ISAKMP_NEXT_VID (0xd) | next payload chain: ignoring supplied 'ISAKMP Vendor ID Payload'.'next payload type' value 13:ISAKMP_NEXT_VID | next payload chain: setting previous 'ISAKMP Vendor ID Payload'.'next payload type' to current ISAKMP Vendor ID Payload (13:ISAKMP_NEXT_VID) | next payload chain: saving location 'ISAKMP Vendor ID Payload'.'next payload type' in 'reply packet' | emitting 16 raw bytes of V_ID into ISAKMP Vendor ID Payload | V_ID 90 cb 80 91 3e bb 69 6e 08 63 81 b5 ec 42 7b 1f | emitting length of ISAKMP Vendor ID Payload: 20 | out_vid(): sending [draft-ietf-ipsec-nat-t-ike-02] | ***emit ISAKMP Vendor ID Payload: | next payload type: ISAKMP_NEXT_NONE (0x0) | next payload chain: setting previous 'ISAKMP Vendor ID Payload'.'next payload type' to current ISAKMP Vendor ID Payload (13:ISAKMP_NEXT_VID) | next payload chain: saving location 'ISAKMP Vendor ID Payload'.'next payload type' in 'reply packet' | emitting 16 raw bytes of V_ID into ISAKMP Vendor ID Payload | V_ID cd 60 46 43 35 df 21 f8 7c fd b2 fc 68 b6 a4 48 | emitting length of ISAKMP Vendor ID Payload: 20 | no IKEv1 message padding required | emitting length of ISAKMP Message: 792 | sending 792 bytes for reply packet for main_outI1 through eth1 from 192.1.2.45:500 to 192.1.2.23:500 (using #1) | 3c e4 38 3f ed 34 7c e6 00 00 00 00 00 00 00 00 | 01 10 02 00 00 00 00 00 00 00 03 18 0d 00 02 84 | 00 00 00 01 00 00 00 01 00 00 02 78 00 01 00 12 | 03 00 00 24 00 01 00 00 80 0b 00 01 80 0c 0e 10 | 80 01 00 07 80 02 00 04 80 03 00 03 80 04 00 0e | 80 0e 01 00 03 00 00 24 01 01 00 00 80 0b 00 01 | 80 0c 0e 10 80 01 00 07 80 02 00 04 80 03 00 03 | 80 04 00 0e 80 0e 00 80 03 00 00 24 02 01 00 00 | 80 0b 00 01 80 0c 0e 10 80 01 00 07 80 02 00 06 | 80 03 00 03 80 04 00 0e 80 0e 01 00 03 00 00 24 | 03 01 00 00 80 0b 00 01 80 0c 0e 10 80 01 00 07 | 80 02 00 06 80 03 00 03 80 04 00 0e 80 0e 00 80 | 03 00 00 24 04 01 00 00 80 0b 00 01 80 0c 0e 10 | 80 01 00 07 80 02 00 02 80 03 00 03 80 04 00 0e | 80 0e 01 00 03 00 00 24 05 01 00 00 80 0b 00 01 | 80 0c 0e 10 80 01 00 07 80 02 00 02 80 03 00 03 | 80 04 00 0e 80 0e 00 80 03 00 00 24 06 01 00 00 | 80 0b 00 01 80 0c 0e 10 80 01 00 07 80 02 00 04 | 80 03 00 03 80 04 00 05 80 0e 01 00 03 00 00 24 | 07 01 00 00 80 0b 00 01 80 0c 0e 10 80 01 00 07 | 80 02 00 04 80 03 00 03 80 04 00 05 80 0e 00 80 | 03 00 00 24 08 01 00 00 80 0b 00 01 80 0c 0e 10 | 80 01 00 07 80 02 00 06 80 03 00 03 80 04 00 05 | 80 0e 01 00 03 00 00 24 09 01 00 00 80 0b 00 01 | 80 0c 0e 10 80 01 00 07 80 02 00 06 80 03 00 03 | 80 04 00 05 80 0e 00 80 03 00 00 24 0a 01 00 00 | 80 0b 00 01 80 0c 0e 10 80 01 00 07 80 02 00 02 | 80 03 00 03 80 04 00 05 80 0e 01 00 03 00 00 24 | 0b 01 00 00 80 0b 00 01 80 0c 0e 10 80 01 00 07 | 80 02 00 02 80 03 00 03 80 04 00 05 80 0e 00 80 | 03 00 00 20 0c 01 00 00 80 0b 00 01 80 0c 0e 10 | 80 01 00 05 80 02 00 04 80 03 00 03 80 04 00 0e | 03 00 00 20 0d 01 00 00 80 0b 00 01 80 0c 0e 10 | 80 01 00 05 80 02 00 06 80 03 00 03 80 04 00 0e | 03 00 00 20 0e 01 00 00 80 0b 00 01 80 0c 0e 10 | 80 01 00 05 80 02 00 02 80 03 00 03 80 04 00 0e | 03 00 00 20 0f 01 00 00 80 0b 00 01 80 0c 0e 10 | 80 01 00 05 80 02 00 04 80 03 00 03 80 04 00 05 | 03 00 00 20 10 01 00 00 80 0b 00 01 80 0c 0e 10 | 80 01 00 05 80 02 00 06 80 03 00 03 80 04 00 05 | 00 00 00 20 11 01 00 00 80 0b 00 01 80 0c 0e 10 | 80 01 00 05 80 02 00 02 80 03 00 03 80 04 00 05 | 0d 00 00 14 40 48 b7 d5 6e bc e8 85 25 e7 de 7f | 00 d6 c2 d3 0d 00 00 14 af ca d7 13 68 a1 f1 c9 | 6b 86 96 fc 77 57 01 00 0d 00 00 14 4a 13 1c 81 | 07 03 58 45 5c 57 28 f2 0e 95 45 2f 0d 00 00 14 | 7d 94 19 a6 53 10 ca 6f 2c 17 9d 92 15 52 9d 56 | 0d 00 00 14 90 cb 80 91 3e bb 69 6e 08 63 81 b5 | ec 42 7b 1f 00 00 00 14 cd 60 46 43 35 df 21 f8 | 7c fd b2 fc 68 b6 a4 48 "westnets-eastnet/2x0" #1: IMPAIR: suppressing retransmits; scheduling timeout in 60 seconds | event_schedule: new EVENT_RETRANSMIT-pe@0x56080af00af0 | inserting event EVENT_RETRANSMIT, timeout in 60 seconds for #1 | libevent_malloc: new ptr-libevent@0x56080af02140 size 128 | #1 STATE_MAIN_I1: retransmits: first event in 60 seconds; timeout in 60 seconds; limit of 12 retransmits; current time is 50065.800071 | stop processing: state #1 connection "westnets-eastnet/2x0" from 192.1.2.23:500 (in main_outI1() at ikev1_main.c:228) | resume processing: connection "westnets-eastnet/2x0" (in main_outI1() at ikev1_main.c:228) | stop processing: connection "westnets-eastnet/2x0" (in initiate_a_connection() at initiate.c:349) | start processing: connection "westnets-eastnet/1x0" (in initiate_a_connection() at initiate.c:186) | empty esp_info, returning defaults for ENCRYPT | connection 'westnets-eastnet/1x0' +POLICY_UP | dup_any(fd@25) -> fd@28 (in initiate_a_connection() at initiate.c:342) | FOR_EACH_STATE_... in find_phase1_state | Queuing pending IPsec SA negotiating with 192.1.2.23 "westnets-eastnet/1x0" IKE SA #1 "westnets-eastnet/2x0" | stop processing: connection "westnets-eastnet/1x0" (in initiate_a_connection() at initiate.c:349) | close_any(fd@25) (in initiate_connection() at initiate.c:384) | close_any(fd@16) (in whack_process() at rcv_whack.c:700) | *received 144 bytes from 192.1.2.23:500 on eth1 (192.1.2.45:500) | 3c e4 38 3f ed 34 7c e6 29 82 ac 69 b5 22 4f 63 | 01 10 02 00 00 00 00 00 00 00 00 90 0d 00 00 38 | 00 00 00 01 00 00 00 01 00 00 00 2c 00 01 00 01 | 00 00 00 24 00 01 00 00 80 0b 00 01 80 0c 0e 10 | 80 01 00 07 80 02 00 04 80 03 00 03 80 04 00 0e | 80 0e 01 00 0d 00 00 14 40 48 b7 d5 6e bc e8 85 | 25 e7 de 7f 00 d6 c2 d3 0d 00 00 14 af ca d7 13 | 68 a1 f1 c9 6b 86 96 fc 77 57 01 00 00 00 00 14 | 4a 13 1c 81 07 03 58 45 5c 57 28 f2 0e 95 45 2f | start processing: from 192.1.2.23:500 (in process_md() at demux.c:378) | **parse ISAKMP Message: | initiator cookie: | 3c e4 38 3f ed 34 7c e6 | responder cookie: | 29 82 ac 69 b5 22 4f 63 | next payload type: ISAKMP_NEXT_SA (0x1) | ISAKMP version: ISAKMP Version 1.0 (rfc2407) (0x10) | exchange type: ISAKMP_XCHG_IDPROT (0x2) | flags: none (0x0) | Message ID: 0 (0x0) | length: 144 (0x90) | processing version=1.0 packet with exchange type=ISAKMP_XCHG_IDPROT (2) | State DB: IKEv1 state not found (find_state_ikev1) | State DB: found IKEv1 state #1 in MAIN_I1 (find_state_ikev1_init) | start processing: state #1 connection "westnets-eastnet/2x0" from 192.1.2.23:500 (in process_v1_packet() at ikev1.c:1435) | #1 is idle | #1 idle | got payload 0x2 (ISAKMP_NEXT_SA) needed: 0x2 opt: 0x2080 | ***parse ISAKMP Security Association Payload: | next payload type: ISAKMP_NEXT_VID (0xd) | length: 56 (0x38) | DOI: ISAKMP_DOI_IPSEC (0x1) | got payload 0x2000 (ISAKMP_NEXT_VID) needed: 0x0 opt: 0x2080 | ***parse ISAKMP Vendor ID Payload: | next payload type: ISAKMP_NEXT_VID (0xd) | length: 20 (0x14) | got payload 0x2000 (ISAKMP_NEXT_VID) needed: 0x0 opt: 0x2080 | ***parse ISAKMP Vendor ID Payload: | next payload type: ISAKMP_NEXT_VID (0xd) | length: 20 (0x14) | got payload 0x2000 (ISAKMP_NEXT_VID) needed: 0x0 opt: 0x2080 | ***parse ISAKMP Vendor ID Payload: | next payload type: ISAKMP_NEXT_NONE (0x0) | length: 20 (0x14) | message 'main_inR1_outI2' HASH payload not checked early | received Vendor ID payload [FRAGMENTATION] | received Vendor ID payload [Dead Peer Detection] | quirks.qnat_traversal_vid set to=117 [RFC 3947] | received Vendor ID payload [RFC 3947] | ****parse IPsec DOI SIT: | IPsec DOI SIT: SIT_IDENTITY_ONLY (0x1) | ****parse ISAKMP Proposal Payload: | next payload type: ISAKMP_NEXT_NONE (0x0) | length: 44 (0x2c) | proposal number: 0 (0x0) | protocol ID: PROTO_ISAKMP (0x1) | SPI size: 0 (0x0) | number of transforms: 1 (0x1) | *****parse ISAKMP Transform Payload (ISAKMP): | next payload type: ISAKMP_NEXT_NONE (0x0) | length: 36 (0x24) | ISAKMP transform number: 0 (0x0) | ISAKMP transform ID: KEY_IKE (0x1) | ******parse ISAKMP Oakley attribute: | af+type: AF+OAKLEY_LIFE_TYPE (0x800b) | length/value: 1 (0x1) | [1 is OAKLEY_LIFE_SECONDS] | ******parse ISAKMP Oakley attribute: | af+type: AF+OAKLEY_LIFE_DURATION (variable length) (0x800c) | length/value: 3600 (0xe10) | ******parse ISAKMP Oakley attribute: | af+type: AF+OAKLEY_ENCRYPTION_ALGORITHM (0x8001) | length/value: 7 (0x7) | [7 is OAKLEY_AES_CBC] | encryption ike_alg_lookup_by_id id: AES_CBC=7, found AES_CBC | ******parse ISAKMP Oakley attribute: | af+type: AF+OAKLEY_HASH_ALGORITHM (0x8002) | length/value: 4 (0x4) | [4 is OAKLEY_SHA2_256] | PRF ike_alg_lookup_by_id id: SHA2_256=4, found HMAC_SHA2_256 | ******parse ISAKMP Oakley attribute: | af+type: AF+OAKLEY_AUTHENTICATION_METHOD (0x8003) | length/value: 3 (0x3) | [3 is OAKLEY_RSA_SIG] | ******parse ISAKMP Oakley attribute: | af+type: AF+OAKLEY_GROUP_DESCRIPTION (0x8004) | length/value: 14 (0xe) | [14 is OAKLEY_GROUP_MODP2048] | DH ike_alg_lookup_by_id id: MODP2048=14, found MODP2048 | ******parse ISAKMP Oakley attribute: | af+type: AF+OAKLEY_KEY_LENGTH (0x800e) | length/value: 256 (0x100) | OAKLEY proposal verified unconditionally; no alg_info to check against | Oakley Transform 0 accepted | sender checking NAT-T: enabled; VID 117 | returning NAT-T method NAT_TRAVERSAL_METHOD_IETF_RFC | enabling possible NAT-traversal with method RFC 3947 (NAT-Traversal) | adding outI2 KE work-order 1 for state #1 | state #1 requesting EVENT_RETRANSMIT to be deleted | #1 STATE_MAIN_I1: retransmits: cleared | libevent_free: release ptr-libevent@0x56080af02140 | free_event_entry: release EVENT_RETRANSMIT-pe@0x56080af00af0 | event_schedule: new EVENT_CRYPTO_TIMEOUT-pe@0x56080af00af0 | inserting event EVENT_CRYPTO_TIMEOUT, timeout in 60 seconds for #1 | libevent_malloc: new ptr-libevent@0x56080af02140 size 128 | complete v1 state transition with STF_SUSPEND | [RE]START processing: state #1 connection "westnets-eastnet/2x0" from 192.1.2.23:500 (in complete_v1_state_transition() at ikev1.c:2624) | suspending state #1 and saving MD | #1 is busy; has a suspended MD | stop processing: from 192.1.2.23:500 (BACKGROUND) (in process_md() at demux.c:380) | stop processing: state #1 connection "westnets-eastnet/2x0" from 192.1.2.23:500 (in process_md() at demux.c:382) | processing: STOP connection NULL (in process_md() at demux.c:383) | crypto helper 6 resuming | crypto helper 6 starting work-order 1 for state #1 | crypto helper 6 doing build KE and nonce (outI2 KE); request ID 1 | NSS: Value of Prime: | ff ff ff ff ff ff ff ff c9 0f da a2 21 68 c2 34 | c4 c6 62 8b 80 dc 1c d1 29 02 4e 08 8a 67 cc 74 | 02 0b be a6 3b 13 9b 22 51 4a 08 79 8e 34 04 dd | ef 95 19 b3 cd 3a 43 1b 30 2b 0a 6d f2 5f 14 37 | 4f e1 35 6d 6d 51 c2 45 e4 85 b5 76 62 5e 7e c6 | f4 4c 42 e9 a6 37 ed 6b 0b ff 5c b6 f4 06 b7 ed | ee 38 6b fb 5a 89 9f a5 ae 9f 24 11 7c 4b 1f e6 | 49 28 66 51 ec e4 5b 3d c2 00 7c b8 a1 63 bf 05 | 98 da 48 36 1c 55 d3 9a 69 16 3f a8 fd 24 cf 5f | 83 65 5d 23 dc a3 ad 96 1c 62 f3 56 20 85 52 bb | 9e d5 29 07 70 96 96 6d 67 0c 35 4e 4a bc 98 04 | f1 74 6c 08 ca 18 21 7c 32 90 5e 46 2e 36 ce 3b | e3 9e 77 2c 18 0e 86 03 9b 27 83 a2 ec 07 a2 8f | b5 c5 5d f0 6f 4c 52 c9 de 2b cb f6 95 58 17 18 | 39 95 49 7c ea 95 6a e5 15 d2 26 18 98 fa 05 10 | 15 72 8e 5a 8a ac aa 68 ff ff ff ff ff ff ff ff | NSS: Value of base: 02 | DH secret MODP2048@0x7f83e8000d60: created | NSS: Local DH MODP2048 secret (pointer): 0x7f83e8000d60 | NSS: Public DH wire value: | 50 43 4b bf 5b 98 6c f0 aa 05 05 9b b2 75 bd 4b | b5 cd fe d0 08 21 50 3c 84 d0 42 d8 82 0e 7a 4b | c2 25 3b 42 51 e6 b5 33 12 b7 0b 52 f1 72 d1 bc | 88 37 8b a8 02 3f a9 5f bb ef 52 c8 13 26 72 87 | 61 f7 55 e3 7a 3d dd f7 22 24 e5 94 15 7a b4 37 | f8 d0 93 4a 76 b9 ee 80 9b 4d f5 b2 05 9b ff 21 | 39 31 89 35 3d 5a 05 7d d4 ac 21 9a 4e 72 79 47 | b7 36 6e d6 05 15 68 b9 e0 08 50 ac 52 59 56 09 | 2c 24 3b 9f 00 de d6 fe 42 41 f5 d4 5f 28 b4 e3 | 3d 71 80 9f dc cb 84 2b 4a 09 4d 0c df 39 84 cf | bb 5c 8d 2e fd b9 47 da 5e a1 0e 3c 4b 7e a4 f1 | d0 be 94 d7 d3 ed 7c 93 fc fd 77 47 90 72 5f ce | ff 41 4d ed c9 a5 2e 4a de 3a 60 9e 71 64 66 c4 | f2 46 d5 46 7d ed 5f 35 96 4e bf ab bb 43 eb d5 | f9 5e 8e 1a 4c fd 69 bd 91 f6 b7 d5 84 62 d5 ff | d8 e4 37 6a 94 88 12 97 85 53 20 e9 25 dc 41 ec | Generated nonce: 5e 62 52 43 ea b4 37 97 b3 83 d9 a7 c5 a3 db 5d | Generated nonce: ae 65 14 24 ab fc 70 74 36 32 67 e9 38 5d ad 68 | crypto helper 6 finished build KE and nonce (outI2 KE); request ID 1 time elapsed 0.000899 seconds | crypto helper 6 sending results from work-order 1 for state #1 to event queue | scheduling resume sending helper answer for #1 | libevent_malloc: new ptr-libevent@0x7f83e8006900 size 128 | crypto helper 6 waiting (nothing to do) | processing resume sending helper answer for #1 | start processing: state #1 connection "westnets-eastnet/2x0" from 192.1.2.23:500 (in resume_handler() at server.c:797) | crypto helper 6 replies to request ID 1 | calling continuation function 0x56080990f630 | main_inR1_outI2_continue for #1: calculated ke+nonce, sending I2 | **emit ISAKMP Message: | initiator cookie: | 3c e4 38 3f ed 34 7c e6 | responder cookie: | 29 82 ac 69 b5 22 4f 63 | next payload type: ISAKMP_NEXT_NONE (0x0) | ISAKMP version: ISAKMP Version 1.0 (rfc2407) (0x10) | exchange type: ISAKMP_XCHG_IDPROT (0x2) | flags: none (0x0) | Message ID: 0 (0x0) | next payload chain: saving message location 'ISAKMP Message'.'next payload type' | wire (crypto helper) group MODP2048 and state group MODP2048 match | DH secret MODP2048@0x7f83e8000d60: transferring ownership from helper KE to state #1 | ***emit ISAKMP Key Exchange Payload: | next payload type: ISAKMP_NEXT_NONCE (0xa) | next payload chain: ignoring supplied 'ISAKMP Key Exchange Payload'.'next payload type' value 10:ISAKMP_NEXT_NONCE | next payload chain: setting previous 'ISAKMP Message'.'next payload type' to current ISAKMP Key Exchange Payload (4:ISAKMP_NEXT_KE) | next payload chain: saving location 'ISAKMP Key Exchange Payload'.'next payload type' in 'reply packet' | emitting 256 raw bytes of keyex value into ISAKMP Key Exchange Payload | keyex value 50 43 4b bf 5b 98 6c f0 aa 05 05 9b b2 75 bd 4b | keyex value b5 cd fe d0 08 21 50 3c 84 d0 42 d8 82 0e 7a 4b | keyex value c2 25 3b 42 51 e6 b5 33 12 b7 0b 52 f1 72 d1 bc | keyex value 88 37 8b a8 02 3f a9 5f bb ef 52 c8 13 26 72 87 | keyex value 61 f7 55 e3 7a 3d dd f7 22 24 e5 94 15 7a b4 37 | keyex value f8 d0 93 4a 76 b9 ee 80 9b 4d f5 b2 05 9b ff 21 | keyex value 39 31 89 35 3d 5a 05 7d d4 ac 21 9a 4e 72 79 47 | keyex value b7 36 6e d6 05 15 68 b9 e0 08 50 ac 52 59 56 09 | keyex value 2c 24 3b 9f 00 de d6 fe 42 41 f5 d4 5f 28 b4 e3 | keyex value 3d 71 80 9f dc cb 84 2b 4a 09 4d 0c df 39 84 cf | keyex value bb 5c 8d 2e fd b9 47 da 5e a1 0e 3c 4b 7e a4 f1 | keyex value d0 be 94 d7 d3 ed 7c 93 fc fd 77 47 90 72 5f ce | keyex value ff 41 4d ed c9 a5 2e 4a de 3a 60 9e 71 64 66 c4 | keyex value f2 46 d5 46 7d ed 5f 35 96 4e bf ab bb 43 eb d5 | keyex value f9 5e 8e 1a 4c fd 69 bd 91 f6 b7 d5 84 62 d5 ff | keyex value d8 e4 37 6a 94 88 12 97 85 53 20 e9 25 dc 41 ec | emitting length of ISAKMP Key Exchange Payload: 260 | ***emit ISAKMP Nonce Payload: | next payload type: ISAKMP_NEXT_NONE (0x0) | next payload chain: setting previous 'ISAKMP Key Exchange Payload'.'next payload type' to current ISAKMP Nonce Payload (10:ISAKMP_NEXT_NONCE) | next payload chain: saving location 'ISAKMP Nonce Payload'.'next payload type' in 'reply packet' | emitting 32 raw bytes of Ni into ISAKMP Nonce Payload | Ni 5e 62 52 43 ea b4 37 97 b3 83 d9 a7 c5 a3 db 5d | Ni ae 65 14 24 ab fc 70 74 36 32 67 e9 38 5d ad 68 | emitting length of ISAKMP Nonce Payload: 36 | NAT-T checking st_nat_traversal | NAT-T found (implies NAT_T_WITH_NATD) | sending NAT-D payloads | NATD hash sha2_256 init | NATD hash sha2_256 digest ICOOKIE/IKE SPIi-bytes@0x7fff508fe890 (length 8) | 3c e4 38 3f ed 34 7c e6 | NATD hash sha2_256 digest RCOOKIE/IKE SPIr-bytes@0x7fff508fe898 (length 8) | 29 82 ac 69 b5 22 4f 63 | NATD hash sha2_256 digest IP addr-bytes@0x7fff508fe814 (length 4) | c0 01 02 17 | NATD hash sha2_256 digest PORT-bytes@0x7fff508fe806 (length 2) | 01 f4 | NATD hash sha2_256 final bytes@0x7fff508fe8e0 (length 32) | 7c 54 a4 71 c7 a5 6a 47 bb 8d ac 54 1d 8a 0c de | 36 e0 25 2d d9 20 21 98 2c a7 34 c8 10 c3 bd 2a | natd_hash: hasher=0x5608099e5c40(32) | natd_hash: icookie= 3c e4 38 3f ed 34 7c e6 | natd_hash: rcookie= 29 82 ac 69 b5 22 4f 63 | natd_hash: ip= c0 01 02 17 | natd_hash: port= 01 f4 | natd_hash: hash= 7c 54 a4 71 c7 a5 6a 47 bb 8d ac 54 1d 8a 0c de | natd_hash: hash= 36 e0 25 2d d9 20 21 98 2c a7 34 c8 10 c3 bd 2a | ***emit ISAKMP NAT-D Payload: | next payload type: ISAKMP_NEXT_NATD_RFC (0x14) | next payload chain: ignoring supplied 'ISAKMP NAT-D Payload'.'next payload type' value 20:ISAKMP_NEXT_NATD_RFC | next payload chain: setting previous 'ISAKMP Nonce Payload'.'next payload type' to current ISAKMP NAT-D Payload (20:ISAKMP_NEXT_NATD_RFC) | next payload chain: saving location 'ISAKMP NAT-D Payload'.'next payload type' in 'reply packet' | emitting 32 raw bytes of NAT-D into ISAKMP NAT-D Payload | NAT-D 7c 54 a4 71 c7 a5 6a 47 bb 8d ac 54 1d 8a 0c de | NAT-D 36 e0 25 2d d9 20 21 98 2c a7 34 c8 10 c3 bd 2a | emitting length of ISAKMP NAT-D Payload: 36 | NATD hash sha2_256 init | NATD hash sha2_256 digest ICOOKIE/IKE SPIi-bytes@0x7fff508fe890 (length 8) | 3c e4 38 3f ed 34 7c e6 | NATD hash sha2_256 digest RCOOKIE/IKE SPIr-bytes@0x7fff508fe898 (length 8) | 29 82 ac 69 b5 22 4f 63 | NATD hash sha2_256 digest IP addr-bytes@0x7fff508fe814 (length 4) | c0 01 02 2d | NATD hash sha2_256 digest PORT-bytes@0x7fff508fe806 (length 2) | 01 f4 | NATD hash sha2_256 final bytes@0x7fff508fe8e0 (length 32) | 89 51 1b 74 c8 23 a8 a8 79 67 5f 16 3a af 10 26 | e2 96 e4 22 05 4b 42 9c b3 25 b4 e5 68 14 6c 57 | natd_hash: hasher=0x5608099e5c40(32) | natd_hash: icookie= 3c e4 38 3f ed 34 7c e6 | natd_hash: rcookie= 29 82 ac 69 b5 22 4f 63 | natd_hash: ip= c0 01 02 2d | natd_hash: port= 01 f4 | natd_hash: hash= 89 51 1b 74 c8 23 a8 a8 79 67 5f 16 3a af 10 26 | natd_hash: hash= e2 96 e4 22 05 4b 42 9c b3 25 b4 e5 68 14 6c 57 | ***emit ISAKMP NAT-D Payload: | next payload type: ISAKMP_NEXT_NONE (0x0) | next payload chain: setting previous 'ISAKMP NAT-D Payload'.'next payload type' to current ISAKMP NAT-D Payload (20:ISAKMP_NEXT_NATD_RFC) | next payload chain: saving location 'ISAKMP NAT-D Payload'.'next payload type' in 'reply packet' | emitting 32 raw bytes of NAT-D into ISAKMP NAT-D Payload | NAT-D 89 51 1b 74 c8 23 a8 a8 79 67 5f 16 3a af 10 26 | NAT-D e2 96 e4 22 05 4b 42 9c b3 25 b4 e5 68 14 6c 57 | emitting length of ISAKMP NAT-D Payload: 36 | no IKEv1 message padding required | emitting length of ISAKMP Message: 396 | State DB: re-hashing IKEv1 state #1 IKE SPIi and SPI[ir] | complete v1 state transition with STF_OK | [RE]START processing: state #1 connection "westnets-eastnet/2x0" from 192.1.2.23:500 (in complete_v1_state_transition() at ikev1.c:2649) | #1 is idle | doing_xauth:no, t_xauth_client_done:no | peer supports fragmentation | peer supports DPD | IKEv1: transition from state STATE_MAIN_I1 to state STATE_MAIN_I2 | parent state #1: MAIN_I1(half-open IKE SA) => MAIN_I2(open IKE SA) | event_already_set, deleting event | state #1 requesting EVENT_CRYPTO_TIMEOUT to be deleted | libevent_free: release ptr-libevent@0x56080af02140 | free_event_entry: release EVENT_CRYPTO_TIMEOUT-pe@0x56080af00af0 | sending reply packet to 192.1.2.23:500 (from 192.1.2.45:500) | sending 396 bytes for STATE_MAIN_I1 through eth1 from 192.1.2.45:500 to 192.1.2.23:500 (using #1) | 3c e4 38 3f ed 34 7c e6 29 82 ac 69 b5 22 4f 63 | 04 10 02 00 00 00 00 00 00 00 01 8c 0a 00 01 04 | 50 43 4b bf 5b 98 6c f0 aa 05 05 9b b2 75 bd 4b | b5 cd fe d0 08 21 50 3c 84 d0 42 d8 82 0e 7a 4b | c2 25 3b 42 51 e6 b5 33 12 b7 0b 52 f1 72 d1 bc | 88 37 8b a8 02 3f a9 5f bb ef 52 c8 13 26 72 87 | 61 f7 55 e3 7a 3d dd f7 22 24 e5 94 15 7a b4 37 | f8 d0 93 4a 76 b9 ee 80 9b 4d f5 b2 05 9b ff 21 | 39 31 89 35 3d 5a 05 7d d4 ac 21 9a 4e 72 79 47 | b7 36 6e d6 05 15 68 b9 e0 08 50 ac 52 59 56 09 | 2c 24 3b 9f 00 de d6 fe 42 41 f5 d4 5f 28 b4 e3 | 3d 71 80 9f dc cb 84 2b 4a 09 4d 0c df 39 84 cf | bb 5c 8d 2e fd b9 47 da 5e a1 0e 3c 4b 7e a4 f1 | d0 be 94 d7 d3 ed 7c 93 fc fd 77 47 90 72 5f ce | ff 41 4d ed c9 a5 2e 4a de 3a 60 9e 71 64 66 c4 | f2 46 d5 46 7d ed 5f 35 96 4e bf ab bb 43 eb d5 | f9 5e 8e 1a 4c fd 69 bd 91 f6 b7 d5 84 62 d5 ff | d8 e4 37 6a 94 88 12 97 85 53 20 e9 25 dc 41 ec | 14 00 00 24 5e 62 52 43 ea b4 37 97 b3 83 d9 a7 | c5 a3 db 5d ae 65 14 24 ab fc 70 74 36 32 67 e9 | 38 5d ad 68 14 00 00 24 7c 54 a4 71 c7 a5 6a 47 | bb 8d ac 54 1d 8a 0c de 36 e0 25 2d d9 20 21 98 | 2c a7 34 c8 10 c3 bd 2a 00 00 00 24 89 51 1b 74 | c8 23 a8 a8 79 67 5f 16 3a af 10 26 e2 96 e4 22 | 05 4b 42 9c b3 25 b4 e5 68 14 6c 57 | !event_already_set at reschedule "westnets-eastnet/2x0" #1: IMPAIR: suppressing retransmits; scheduling timeout in 60 seconds | event_schedule: new EVENT_RETRANSMIT-pe@0x56080af00af0 | inserting event EVENT_RETRANSMIT, timeout in 60 seconds for #1 | libevent_malloc: new ptr-libevent@0x56080af02140 size 128 | #1 STATE_MAIN_I2: retransmits: first event in 60 seconds; timeout in 60 seconds; limit of 12 retransmits; current time is 50065.802046 "westnets-eastnet/2x0" #1: STATE_MAIN_I2: sent MI2, expecting MR2 | modecfg pull: noquirk policy:push not-client | phase 1 is done, looking for phase 2 to unpend | resume sending helper answer for #1 suppresed complete_v1_state_transition() | stop processing: state #1 connection "westnets-eastnet/2x0" from 192.1.2.23:500 (in resume_handler() at server.c:833) | libevent_free: release ptr-libevent@0x7f83e8006900 | *received 396 bytes from 192.1.2.23:500 on eth1 (192.1.2.45:500) | 3c e4 38 3f ed 34 7c e6 29 82 ac 69 b5 22 4f 63 | 04 10 02 00 00 00 00 00 00 00 01 8c 0a 00 01 04 | 0e 51 86 c4 5d 2b d0 3d 04 bc 38 4e 03 02 88 10 | 36 d4 be 74 a6 bd 6a 33 08 8a ab 43 0b 55 14 44 | 62 f6 7f 9d f7 36 8d 02 da 49 2a f3 c5 b2 08 be | c1 29 02 ff fe a4 ef 77 b8 e1 89 a8 f9 48 9d a1 | b4 07 ab 0e 04 5f 4c 94 b7 cc 6d c3 5c 9d 65 e8 | 84 f9 89 c8 f1 ed 78 41 70 d3 37 29 ac bf c6 f1 | cb fb a6 45 24 15 e1 a7 61 ad 89 b6 96 2b 5b 8e | 58 7f 1a d3 60 6c 58 d2 3f 5c c4 17 19 35 d6 8b | a1 02 0e b4 65 81 a6 6c be 85 88 88 31 9a 1e dd | 33 7c 2d fe da 04 3e 85 0d 75 83 f6 b5 3a 18 6f | e7 3c 1f cc f4 3a 7f ce c3 fb da af eb 1d 84 44 | 5d b0 cc af 9e 13 f8 75 de 05 51 d2 be c4 7d 0f | f3 40 49 f6 d8 a3 60 4b c5 b1 3b 63 8b 95 2d 3e | 61 cd 0f 3c 95 b0 30 e6 de d1 48 26 bd 91 15 b6 | e8 72 d8 50 91 97 9c ad aa 49 f4 bd c9 b2 a8 1d | 32 d0 a8 08 db 96 a7 55 3d 58 5d 4a 11 b5 56 40 | 14 00 00 24 45 4a 19 2d 87 17 bc 7c 21 70 ed 80 | 47 18 4d 2f 23 70 03 c5 68 e7 68 72 36 2f 56 ff | 7e 40 05 1f 14 00 00 24 89 51 1b 74 c8 23 a8 a8 | 79 67 5f 16 3a af 10 26 e2 96 e4 22 05 4b 42 9c | b3 25 b4 e5 68 14 6c 57 00 00 00 24 7c 54 a4 71 | c7 a5 6a 47 bb 8d ac 54 1d 8a 0c de 36 e0 25 2d | d9 20 21 98 2c a7 34 c8 10 c3 bd 2a | start processing: from 192.1.2.23:500 (in process_md() at demux.c:378) | **parse ISAKMP Message: | initiator cookie: | 3c e4 38 3f ed 34 7c e6 | responder cookie: | 29 82 ac 69 b5 22 4f 63 | next payload type: ISAKMP_NEXT_KE (0x4) | ISAKMP version: ISAKMP Version 1.0 (rfc2407) (0x10) | exchange type: ISAKMP_XCHG_IDPROT (0x2) | flags: none (0x0) | Message ID: 0 (0x0) | length: 396 (0x18c) | processing version=1.0 packet with exchange type=ISAKMP_XCHG_IDPROT (2) | State DB: found IKEv1 state #1 in MAIN_I2 (find_state_ikev1) | start processing: state #1 connection "westnets-eastnet/2x0" from 192.1.2.23:500 (in process_v1_packet() at ikev1.c:1435) | #1 is idle | #1 idle | got payload 0x10 (ISAKMP_NEXT_KE) needed: 0x410 opt: 0x102080 | ***parse ISAKMP Key Exchange Payload: | next payload type: ISAKMP_NEXT_NONCE (0xa) | length: 260 (0x104) | got payload 0x400 (ISAKMP_NEXT_NONCE) needed: 0x400 opt: 0x102080 | ***parse ISAKMP Nonce Payload: | next payload type: ISAKMP_NEXT_NATD_RFC (0x14) | length: 36 (0x24) | got payload 0x100000 (ISAKMP_NEXT_NATD_RFC) needed: 0x0 opt: 0x102080 | ***parse ISAKMP NAT-D Payload: | next payload type: ISAKMP_NEXT_NATD_RFC (0x14) | length: 36 (0x24) | got payload 0x100000 (ISAKMP_NEXT_NATD_RFC) needed: 0x0 opt: 0x102080 | ***parse ISAKMP NAT-D Payload: | next payload type: ISAKMP_NEXT_NONE (0x0) | length: 36 (0x24) | message 'main_inR2_outI3' HASH payload not checked early | DH public value received: | 0e 51 86 c4 5d 2b d0 3d 04 bc 38 4e 03 02 88 10 | 36 d4 be 74 a6 bd 6a 33 08 8a ab 43 0b 55 14 44 | 62 f6 7f 9d f7 36 8d 02 da 49 2a f3 c5 b2 08 be | c1 29 02 ff fe a4 ef 77 b8 e1 89 a8 f9 48 9d a1 | b4 07 ab 0e 04 5f 4c 94 b7 cc 6d c3 5c 9d 65 e8 | 84 f9 89 c8 f1 ed 78 41 70 d3 37 29 ac bf c6 f1 | cb fb a6 45 24 15 e1 a7 61 ad 89 b6 96 2b 5b 8e | 58 7f 1a d3 60 6c 58 d2 3f 5c c4 17 19 35 d6 8b | a1 02 0e b4 65 81 a6 6c be 85 88 88 31 9a 1e dd | 33 7c 2d fe da 04 3e 85 0d 75 83 f6 b5 3a 18 6f | e7 3c 1f cc f4 3a 7f ce c3 fb da af eb 1d 84 44 | 5d b0 cc af 9e 13 f8 75 de 05 51 d2 be c4 7d 0f | f3 40 49 f6 d8 a3 60 4b c5 b1 3b 63 8b 95 2d 3e | 61 cd 0f 3c 95 b0 30 e6 de d1 48 26 bd 91 15 b6 | e8 72 d8 50 91 97 9c ad aa 49 f4 bd c9 b2 a8 1d | 32 d0 a8 08 db 96 a7 55 3d 58 5d 4a 11 b5 56 40 | started looking for secret for @west->@east of kind PKK_PSK | actually looking for secret for @west->@east of kind PKK_PSK | line 1: key type PKK_PSK(@west) to type PKK_RSA | concluding with best_match=000 best=(nil) (lineno=-1) | no PreShared Key Found | DH secret MODP2048@0x7f83e8000d60: transferring ownership from state #1 to helper IKEv1 DH+IV | adding aggr outR1 DH work-order 2 for state #1 | state #1 requesting EVENT_RETRANSMIT to be deleted | #1 STATE_MAIN_I2: retransmits: cleared | libevent_free: release ptr-libevent@0x56080af02140 | free_event_entry: release EVENT_RETRANSMIT-pe@0x56080af00af0 | event_schedule: new EVENT_CRYPTO_TIMEOUT-pe@0x7f83e8002b20 | inserting event EVENT_CRYPTO_TIMEOUT, timeout in 60 seconds for #1 | libevent_malloc: new ptr-libevent@0x56080af02140 size 128 | complete v1 state transition with STF_SUSPEND | [RE]START processing: state #1 connection "westnets-eastnet/2x0" from 192.1.2.23:500 (in complete_v1_state_transition() at ikev1.c:2624) | suspending state #1 and saving MD | #1 is busy; has a suspended MD | stop processing: from 192.1.2.23:500 (BACKGROUND) (in process_md() at demux.c:380) | stop processing: state #1 connection "westnets-eastnet/2x0" from 192.1.2.23:500 (in process_md() at demux.c:382) | processing: STOP connection NULL (in process_md() at demux.c:383) | crypto helper 0 resuming | crypto helper 0 starting work-order 2 for state #1 | crypto helper 0 doing compute dh+iv (V1 Phase 1) (aggr outR1 DH); request ID 2 | peer's g: 0e 51 86 c4 5d 2b d0 3d 04 bc 38 4e 03 02 88 10 | peer's g: 36 d4 be 74 a6 bd 6a 33 08 8a ab 43 0b 55 14 44 | peer's g: 62 f6 7f 9d f7 36 8d 02 da 49 2a f3 c5 b2 08 be | peer's g: c1 29 02 ff fe a4 ef 77 b8 e1 89 a8 f9 48 9d a1 | peer's g: b4 07 ab 0e 04 5f 4c 94 b7 cc 6d c3 5c 9d 65 e8 | peer's g: 84 f9 89 c8 f1 ed 78 41 70 d3 37 29 ac bf c6 f1 | peer's g: cb fb a6 45 24 15 e1 a7 61 ad 89 b6 96 2b 5b 8e | peer's g: 58 7f 1a d3 60 6c 58 d2 3f 5c c4 17 19 35 d6 8b | peer's g: a1 02 0e b4 65 81 a6 6c be 85 88 88 31 9a 1e dd | peer's g: 33 7c 2d fe da 04 3e 85 0d 75 83 f6 b5 3a 18 6f | peer's g: e7 3c 1f cc f4 3a 7f ce c3 fb da af eb 1d 84 44 | peer's g: 5d b0 cc af 9e 13 f8 75 de 05 51 d2 be c4 7d 0f | peer's g: f3 40 49 f6 d8 a3 60 4b c5 b1 3b 63 8b 95 2d 3e | peer's g: 61 cd 0f 3c 95 b0 30 e6 de d1 48 26 bd 91 15 b6 | peer's g: e8 72 d8 50 91 97 9c ad aa 49 f4 bd c9 b2 a8 1d | peer's g: 32 d0 a8 08 db 96 a7 55 3d 58 5d 4a 11 b5 56 40 | Started DH shared-secret computation in NSS: | new : g_ir-key@0x56080aeef1b0 (256-bytes, CONCATENATE_DATA_AND_BASE) | DH secret MODP2048@0x7f83e8000d60: computed shared DH secret key@0x56080aeef1b0 | dh-shared : g^ir-key@0x56080aeef1b0 (256-bytes, CONCATENATE_DATA_AND_BASE) | SKEYID sig PRF sha2_256 init Ni|Nr-chunk@0x7f83e0001ef0 (length 64) | 5e 62 52 43 ea b4 37 97 b3 83 d9 a7 c5 a3 db 5d | ae 65 14 24 ab fc 70 74 36 32 67 e9 38 5d ad 68 | 45 4a 19 2d 87 17 bc 7c 21 70 ed 80 47 18 4d 2f | 23 70 03 c5 68 e7 68 72 36 2f 56 ff 7e 40 05 1f | : ephemeral-key@0x56080ae63080 (16-bytes, AES_KEY_GEN) | CONCATENATE_DATA_AND_BASE: | target: EXTRACT_KEY_FROM_KEY | base: base-key@0x56080ae63080 (16-bytes, AES_KEY_GEN) | params: 16-bytes@0x7f83f0b9c6c0 | result: Ni|Nr-key@0x56080aeea0c0 (80-bytes, EXTRACT_KEY_FROM_KEY) | key-offset: 0, key-size: 64 | EXTRACT_KEY_FROM_KEY: | target: SHA256_HMAC | flags: SIGN | key_size: 64-bytes | base: base-key@0x56080aeea0c0 (80-bytes, EXTRACT_KEY_FROM_KEY) | operation: FLAGS_ONLY | params: 8-bytes@0x7f83f0b9c6a8 | result: Ni|Nr-key@0x56080aeed4f0 (64-bytes, SHA256_HMAC) | Ni|Nr: release tmp-key@0x56080aeea0c0 | SKEYID sig prf: created sha2_256 context 0x7f83e0002e80 from Ni|Nr-key@0x56080aeed4f0 | SKEYID sig prf: begin sha2_256 with context 0x7f83e0002e80 from Ni|Nr-key@0x56080aeed4f0 | SKEYID sig: release clone-key@0x56080aeed4f0 | SKEYID sig PRF sha2_256 crypt-prf@0x7f83e00016b0 | SKEYID sig PRF sha2_256 update g^xy-key@0x56080aeef1b0 (size 256) | SKEYID sig: g^xy-key@0x56080aeef1b0 (256-bytes, CONCATENATE_DATA_AND_BASE) | nss hmac digest hack extracting all 256 bytes of key@0x56080aeef1b0 | nss hmac digest hack: symkey-key@0x56080aeef1b0 (256-bytes, CONCATENATE_DATA_AND_BASE) | : ephemeral-key@0x56080ae63080 (16-bytes, AES_KEY_GEN) | nss hmac digest hack: new slot-key@0x56080aee6cc0 (256-bytes, CONCATENATE_DATA_AND_BASE) | sizeof bytes 256 | wrapper: (SECItemType)-256261344: 5c 51 0f 14 ffffffe2 ffffff9c 56 ffffffe5 ffffff91 fffffff9 55 21 47 5c 48 ffffffa0 3c 5d ffffffe1 ffffff96 ffffff95 7a ffffffe0 0a 00 ffffff93 ffffff84 fffffff2 6d ffffffbf 2f 46 40 ffffffb9 ffffffec ffffffce 17 04 31 ffffffa3 ffffffec ffffffe6 2c 46 45 52 39 61 1d ffffff9a ffffff99 77 01 67 ffffff96 ffffff93 ffffffe1 ffffffae ffffffc1 ffffffb0 27 64 fffffff2 45 1a ffffffc0 6c 20 ffffff9b 38 4a ffffffd6 29 4a 03 0d ffffffb7 4a ffffffc8 44 27 79 ffffffd3 ffffff83 ffffffd1 fffffff6 06 ffffffdb 6c ffffffaa 36 fffffffd ffffffa9 ffffffb4 54 ffffffdb ffffff93 ffffffda 02 6d fffffffb ffffffa5 ffffffde 16 38 ffffff88 ffffffd7 43 3a 36 ffffffda 0c fffffff0 2d 4e 71 37 ffffffb1 61 ffffffa9 0c ffffff91 ffffffa1 ffffffb5 ffffff83 ffffff9f ffffffd0 19 ffffff8b ffffff9c ffffffc7 53 ffffffdb 3f ffffffdc 0c ffffff9b 0f ffffffaf 4d 08 ffffffa2 ffffff8b ffffffd0 65 7e ffffff9d 07 ffffff92 ffffffdb ffffff9b 02 27 70 fffffff2 ffffffc2 ffffffa4 fffff | nss hmac digest hack: release slot-key-key@0x56080aee6cc0 | nss hmac digest hack extracted len 256 bytes at 0x7f83e0003ee0 | unwrapped: c7 2b d9 0d f9 ce a8 5a d3 f8 7a 58 8f ee b6 e6 | unwrapped: 93 d9 2b 8b 79 27 df d5 df ec 9f 42 71 1e c4 ad | unwrapped: 8c 1c cf c2 87 b6 b2 e5 b1 63 af 9e dd f4 74 86 | unwrapped: 6c da 58 dc 69 91 bd d6 1b 8e 18 12 8b b6 9e 37 | unwrapped: 6c 70 8b 7d 76 c5 38 eb 12 a5 63 58 ca 99 98 73 | unwrapped: ed 8a ad 6d 2c c0 ef 1a 94 76 37 3c f5 a1 bc 40 | unwrapped: b1 ca d4 3c 2c fe 3f fe 00 32 0b 11 32 da 0a 26 | unwrapped: 4f 84 62 fd e9 20 35 27 2a 8b 33 09 f2 06 7e 27 | unwrapped: d5 35 22 f0 9e f2 e7 05 89 89 fa df 82 cc 25 25 | unwrapped: 01 7f b9 21 a9 ab 70 9e 2f 87 e8 18 6c 36 f1 97 | unwrapped: 45 37 cc 92 28 ec 42 df 6b 9a bd b9 c3 de 41 70 | unwrapped: de c8 c1 df 7a bc a0 78 34 21 7a 04 fd 73 2d cd | unwrapped: fe 08 ee ae 58 8c 19 9a 84 43 af 62 24 10 c7 c3 | unwrapped: 81 ae 03 d6 a6 97 78 50 74 d8 12 e4 9a 99 b8 94 | unwrapped: 81 da 7a a6 55 8b 04 5a 55 1c 0b f3 dc 9f 9e 4e | unwrapped: e9 8b ec 4d 34 70 df 3f ab 35 89 2b 41 85 99 49 | : ephemeral-key@0x56080ae63080 (16-bytes, AES_KEY_GEN) | CONCATENATE_DATA_AND_BASE: | target: EXTRACT_KEY_FROM_KEY | base: base-key@0x56080ae63080 (16-bytes, AES_KEY_GEN) | params: 16-bytes@0x7f83f0b9c6e0 | result: final-key@0x56080aeea0c0 (48-bytes, EXTRACT_KEY_FROM_KEY) | key-offset: 0, key-size: 32 | EXTRACT_KEY_FROM_KEY: | target: EXTRACT_KEY_FROM_KEY | key_size: 32-bytes | base: base-key@0x56080aeea0c0 (48-bytes, EXTRACT_KEY_FROM_KEY) | operation: FLAGS_ONLY | params: 8-bytes@0x7f83f0b9c6c8 | result: final-key@0x56080aeed4f0 (32-bytes, EXTRACT_KEY_FROM_KEY) | final: release tmp-key@0x56080aeea0c0 | SKEYID sig PRF sha2_256 final-key@0x56080aeed4f0 (size 32) | SKEYID sig: key-key@0x56080aeed4f0 (32-bytes, EXTRACT_KEY_FROM_KEY) | SKEYID_d PRF sha2_256 init SKEYID-key@0x56080aeed4f0 (size 32) | SKEYID_d: SKEYID-key@0x56080aeed4f0 (32-bytes, EXTRACT_KEY_FROM_KEY) | key-offset: 0, key-size: 32 | EXTRACT_KEY_FROM_KEY: | target: SHA256_HMAC | flags: SIGN | key_size: 32-bytes | base: base-key@0x56080aeed4f0 (32-bytes, EXTRACT_KEY_FROM_KEY) | operation: FLAGS_ONLY | params: 8-bytes@0x7f83f0b9c6b8 | result: clone-key@0x56080aeea0c0 (32-bytes, SHA256_HMAC) | SKEYID_d prf: created sha2_256 context 0x7f83e0002e80 from SKEYID-key@0x56080aeea0c0 | SKEYID_d prf: begin sha2_256 with context 0x7f83e0002e80 from SKEYID-key@0x56080aeea0c0 | SKEYID_d: release clone-key@0x56080aeea0c0 | SKEYID_d PRF sha2_256 crypt-prf@0x7f83e0001f40 | SKEYID_d PRF sha2_256 update g^xy-key@0x56080aeef1b0 (size 256) | SKEYID_d: g^xy-key@0x56080aeef1b0 (256-bytes, CONCATENATE_DATA_AND_BASE) | nss hmac digest hack extracting all 256 bytes of key@0x56080aeef1b0 | nss hmac digest hack: symkey-key@0x56080aeef1b0 (256-bytes, CONCATENATE_DATA_AND_BASE) | : ephemeral-key@0x56080ae63080 (16-bytes, AES_KEY_GEN) | nss hmac digest hack: new slot-key@0x56080aee6cc0 (256-bytes, CONCATENATE_DATA_AND_BASE) | sizeof bytes 256 | wrapper: (SECItemType)-256261376: 5c 51 0f 14 ffffffe2 ffffff9c 56 ffffffe5 ffffff91 fffffff9 55 21 47 5c 48 ffffffa0 3c 5d ffffffe1 ffffff96 ffffff95 7a ffffffe0 0a 00 ffffff93 ffffff84 fffffff2 6d ffffffbf 2f 46 40 ffffffb9 ffffffec ffffffce 17 04 31 ffffffa3 ffffffec ffffffe6 2c 46 45 52 39 61 1d ffffff9a ffffff99 77 01 67 ffffff96 ffffff93 ffffffe1 ffffffae ffffffc1 ffffffb0 27 64 fffffff2 45 1a ffffffc0 6c 20 ffffff9b 38 4a ffffffd6 29 4a 03 0d ffffffb7 4a ffffffc8 44 27 79 ffffffd3 ffffff83 ffffffd1 fffffff6 06 ffffffdb 6c ffffffaa 36 fffffffd ffffffa9 ffffffb4 54 ffffffdb ffffff93 ffffffda 02 6d fffffffb ffffffa5 ffffffde 16 38 ffffff88 ffffffd7 43 3a 36 ffffffda 0c fffffff0 2d 4e 71 37 ffffffb1 61 ffffffa9 0c ffffff91 ffffffa1 ffffffb5 ffffff83 ffffff9f ffffffd0 19 ffffff8b ffffff9c ffffffc7 53 ffffffdb 3f ffffffdc 0c ffffff9b 0f ffffffaf 4d 08 ffffffa2 ffffff8b ffffffd0 65 7e ffffff9d 07 ffffff92 ffffffdb ffffff9b 02 27 70 fffffff2 ffffffc2 ffffffa4 fffff | nss hmac digest hack: release slot-key-key@0x56080aee6cc0 | nss hmac digest hack extracted len 256 bytes at 0x7f83e0003a60 | unwrapped: c7 2b d9 0d f9 ce a8 5a d3 f8 7a 58 8f ee b6 e6 | unwrapped: 93 d9 2b 8b 79 27 df d5 df ec 9f 42 71 1e c4 ad | unwrapped: 8c 1c cf c2 87 b6 b2 e5 b1 63 af 9e dd f4 74 86 | unwrapped: 6c da 58 dc 69 91 bd d6 1b 8e 18 12 8b b6 9e 37 | unwrapped: 6c 70 8b 7d 76 c5 38 eb 12 a5 63 58 ca 99 98 73 | unwrapped: ed 8a ad 6d 2c c0 ef 1a 94 76 37 3c f5 a1 bc 40 | unwrapped: b1 ca d4 3c 2c fe 3f fe 00 32 0b 11 32 da 0a 26 | unwrapped: 4f 84 62 fd e9 20 35 27 2a 8b 33 09 f2 06 7e 27 | unwrapped: d5 35 22 f0 9e f2 e7 05 89 89 fa df 82 cc 25 25 | unwrapped: 01 7f b9 21 a9 ab 70 9e 2f 87 e8 18 6c 36 f1 97 | unwrapped: 45 37 cc 92 28 ec 42 df 6b 9a bd b9 c3 de 41 70 | unwrapped: de c8 c1 df 7a bc a0 78 34 21 7a 04 fd 73 2d cd | unwrapped: fe 08 ee ae 58 8c 19 9a 84 43 af 62 24 10 c7 c3 | unwrapped: 81 ae 03 d6 a6 97 78 50 74 d8 12 e4 9a 99 b8 94 | unwrapped: 81 da 7a a6 55 8b 04 5a 55 1c 0b f3 dc 9f 9e 4e | unwrapped: e9 8b ec 4d 34 70 df 3f ab 35 89 2b 41 85 99 49 | SKEYID_d PRF sha2_256 update CKI_i-bytes@0x56080af03860 (length 8) | 3c e4 38 3f ed 34 7c e6 | SKEYID_d PRF sha2_256 update CKI_r-bytes@0x56080af03868 (length 8) | 29 82 ac 69 b5 22 4f 63 | SKEYID_d PRF sha2_256 update 0-byte@0x0 (0) | 00 | : ephemeral-key@0x56080ae63080 (16-bytes, AES_KEY_GEN) | CONCATENATE_DATA_AND_BASE: | target: EXTRACT_KEY_FROM_KEY | base: base-key@0x56080ae63080 (16-bytes, AES_KEY_GEN) | params: 16-bytes@0x7f83f0b9c6c0 | result: final-key@0x56080aee2f70 (48-bytes, EXTRACT_KEY_FROM_KEY) | key-offset: 0, key-size: 32 | EXTRACT_KEY_FROM_KEY: | target: EXTRACT_KEY_FROM_KEY | key_size: 32-bytes | base: base-key@0x56080aee2f70 (48-bytes, EXTRACT_KEY_FROM_KEY) | operation: FLAGS_ONLY | params: 8-bytes@0x7f83f0b9c6a8 | result: final-key@0x56080aeea0c0 (32-bytes, EXTRACT_KEY_FROM_KEY) | final: release tmp-key@0x56080aee2f70 | SKEYID_d PRF sha2_256 final-key@0x56080aeea0c0 (size 32) | SKEYID_d: key-key@0x56080aeea0c0 (32-bytes, EXTRACT_KEY_FROM_KEY) | SKEYID_a PRF sha2_256 init SKEYID-key@0x56080aeed4f0 (size 32) | SKEYID_a: SKEYID-key@0x56080aeed4f0 (32-bytes, EXTRACT_KEY_FROM_KEY) | key-offset: 0, key-size: 32 | EXTRACT_KEY_FROM_KEY: | target: SHA256_HMAC | flags: SIGN | key_size: 32-bytes | base: base-key@0x56080aeed4f0 (32-bytes, EXTRACT_KEY_FROM_KEY) | operation: FLAGS_ONLY | params: 8-bytes@0x7f83f0b9c698 | result: clone-key@0x56080aee2f70 (32-bytes, SHA256_HMAC) | SKEYID_a prf: created sha2_256 context 0x7f83e0002e80 from SKEYID-key@0x56080aee2f70 | SKEYID_a prf: begin sha2_256 with context 0x7f83e0002e80 from SKEYID-key@0x56080aee2f70 | SKEYID_a: release clone-key@0x56080aee2f70 | SKEYID_a PRF sha2_256 crypt-prf@0x7f83e00016b0 | SKEYID_a PRF sha2_256 update SKEYID_d-key@0x56080aeea0c0 (size 32) | SKEYID_a: SKEYID_d-key@0x56080aeea0c0 (32-bytes, EXTRACT_KEY_FROM_KEY) | nss hmac digest hack extracting all 32 bytes of key@0x56080aeea0c0 | nss hmac digest hack: symkey-key@0x56080aeea0c0 (32-bytes, EXTRACT_KEY_FROM_KEY) | : ephemeral-key@0x56080ae63080 (16-bytes, AES_KEY_GEN) | nss hmac digest hack: new slot-key@0x56080aee6cc0 (32-bytes, EXTRACT_KEY_FROM_KEY) | sizeof bytes 32 | wrapper: (SECItemType)-256261408: 16 ffffffa9 4f 3a 2c 6e 7d 09 51 ffffffc0 ffffffe3 0f 23 ffffffb7 4e 5a 2c ffffffc1 2e 2e ffffff9d ffffff87 1f 68 25 ffffffe0 21 4d fffffffa ffffffea fffffff1 ffffffba | nss hmac digest hack: release slot-key-key@0x56080aee6cc0 | nss hmac digest hack extracted len 32 bytes at 0x7f83e00040d0 | unwrapped: 62 9d 08 0e e6 af 6f 30 5b 1c eb 40 db 0a d3 e7 | unwrapped: 38 f3 75 ac 5e 38 6c d1 8e 79 05 24 f3 4d d4 ea | SKEYID_a PRF sha2_256 update g^xy-key@0x56080aeef1b0 (size 256) | SKEYID_a: g^xy-key@0x56080aeef1b0 (256-bytes, CONCATENATE_DATA_AND_BASE) | nss hmac digest hack extracting all 256 bytes of key@0x56080aeef1b0 | nss hmac digest hack: symkey-key@0x56080aeef1b0 (256-bytes, CONCATENATE_DATA_AND_BASE) | : ephemeral-key@0x56080ae63080 (16-bytes, AES_KEY_GEN) | nss hmac digest hack: new slot-key@0x56080aee6cc0 (256-bytes, CONCATENATE_DATA_AND_BASE) | sizeof bytes 256 | wrapper: (SECItemType)-256261408: 5c 51 0f 14 ffffffe2 ffffff9c 56 ffffffe5 ffffff91 fffffff9 55 21 47 5c 48 ffffffa0 3c 5d ffffffe1 ffffff96 ffffff95 7a ffffffe0 0a 00 ffffff93 ffffff84 fffffff2 6d ffffffbf 2f 46 40 ffffffb9 ffffffec ffffffce 17 04 31 ffffffa3 ffffffec ffffffe6 2c 46 45 52 39 61 1d ffffff9a ffffff99 77 01 67 ffffff96 ffffff93 ffffffe1 ffffffae ffffffc1 ffffffb0 27 64 fffffff2 45 1a ffffffc0 6c 20 ffffff9b 38 4a ffffffd6 29 4a 03 0d ffffffb7 4a ffffffc8 44 27 79 ffffffd3 ffffff83 ffffffd1 fffffff6 06 ffffffdb 6c ffffffaa 36 fffffffd ffffffa9 ffffffb4 54 ffffffdb ffffff93 ffffffda 02 6d fffffffb ffffffa5 ffffffde 16 38 ffffff88 ffffffd7 43 3a 36 ffffffda 0c fffffff0 2d 4e 71 37 ffffffb1 61 ffffffa9 0c ffffff91 ffffffa1 ffffffb5 ffffff83 ffffff9f ffffffd0 19 ffffff8b ffffff9c ffffffc7 53 ffffffdb 3f ffffffdc 0c ffffff9b 0f ffffffaf 4d 08 ffffffa2 ffffff8b ffffffd0 65 7e ffffff9d 07 ffffff92 ffffffdb ffffff9b 02 27 70 fffffff2 ffffffc2 ffffffa4 fffff | nss hmac digest hack: release slot-key-key@0x56080aee6cc0 | nss hmac digest hack extracted len 256 bytes at 0x7f83e0003950 | unwrapped: c7 2b d9 0d f9 ce a8 5a d3 f8 7a 58 8f ee b6 e6 | unwrapped: 93 d9 2b 8b 79 27 df d5 df ec 9f 42 71 1e c4 ad | unwrapped: 8c 1c cf c2 87 b6 b2 e5 b1 63 af 9e dd f4 74 86 | unwrapped: 6c da 58 dc 69 91 bd d6 1b 8e 18 12 8b b6 9e 37 | unwrapped: 6c 70 8b 7d 76 c5 38 eb 12 a5 63 58 ca 99 98 73 | unwrapped: ed 8a ad 6d 2c c0 ef 1a 94 76 37 3c f5 a1 bc 40 | unwrapped: b1 ca d4 3c 2c fe 3f fe 00 32 0b 11 32 da 0a 26 | unwrapped: 4f 84 62 fd e9 20 35 27 2a 8b 33 09 f2 06 7e 27 | unwrapped: d5 35 22 f0 9e f2 e7 05 89 89 fa df 82 cc 25 25 | unwrapped: 01 7f b9 21 a9 ab 70 9e 2f 87 e8 18 6c 36 f1 97 | unwrapped: 45 37 cc 92 28 ec 42 df 6b 9a bd b9 c3 de 41 70 | unwrapped: de c8 c1 df 7a bc a0 78 34 21 7a 04 fd 73 2d cd | unwrapped: fe 08 ee ae 58 8c 19 9a 84 43 af 62 24 10 c7 c3 | unwrapped: 81 ae 03 d6 a6 97 78 50 74 d8 12 e4 9a 99 b8 94 | unwrapped: 81 da 7a a6 55 8b 04 5a 55 1c 0b f3 dc 9f 9e 4e | unwrapped: e9 8b ec 4d 34 70 df 3f ab 35 89 2b 41 85 99 49 | SKEYID_a PRF sha2_256 update CKI_i-bytes@0x56080af03860 (length 8) | 3c e4 38 3f ed 34 7c e6 | SKEYID_a PRF sha2_256 update CKI_r-bytes@0x56080af03868 (length 8) | 29 82 ac 69 b5 22 4f 63 | SKEYID_a PRF sha2_256 update 1-byte@0x1 (1) | 01 | : ephemeral-key@0x56080ae63080 (16-bytes, AES_KEY_GEN) | CONCATENATE_DATA_AND_BASE: | target: EXTRACT_KEY_FROM_KEY | base: base-key@0x56080ae63080 (16-bytes, AES_KEY_GEN) | params: 16-bytes@0x7f83f0b9c6a0 | result: final-key@0x56080aef0b10 (48-bytes, EXTRACT_KEY_FROM_KEY) | key-offset: 0, key-size: 32 | EXTRACT_KEY_FROM_KEY: | target: EXTRACT_KEY_FROM_KEY | key_size: 32-bytes | base: base-key@0x56080aef0b10 (48-bytes, EXTRACT_KEY_FROM_KEY) | operation: FLAGS_ONLY | params: 8-bytes@0x7f83f0b9c688 | result: final-key@0x56080aee2f70 (32-bytes, EXTRACT_KEY_FROM_KEY) | final: release tmp-key@0x56080aef0b10 | SKEYID_a PRF sha2_256 final-key@0x56080aee2f70 (size 32) | SKEYID_a: key-key@0x56080aee2f70 (32-bytes, EXTRACT_KEY_FROM_KEY) | SKEYID_e PRF sha2_256 init SKEYID-key@0x56080aeed4f0 (size 32) | SKEYID_e: SKEYID-key@0x56080aeed4f0 (32-bytes, EXTRACT_KEY_FROM_KEY) | key-offset: 0, key-size: 32 | EXTRACT_KEY_FROM_KEY: | target: SHA256_HMAC | flags: SIGN | key_size: 32-bytes | base: base-key@0x56080aeed4f0 (32-bytes, EXTRACT_KEY_FROM_KEY) | operation: FLAGS_ONLY | params: 8-bytes@0x7f83f0b9c6a8 | result: clone-key@0x56080aef0b10 (32-bytes, SHA256_HMAC) | SKEYID_e prf: created sha2_256 context 0x7f83e0002e80 from SKEYID-key@0x56080aef0b10 | SKEYID_e prf: begin sha2_256 with context 0x7f83e0002e80 from SKEYID-key@0x56080aef0b10 | SKEYID_e: release clone-key@0x56080aef0b10 | SKEYID_e PRF sha2_256 crypt-prf@0x7f83e0001f40 | SKEYID_e PRF sha2_256 update SKEYID_a-key@0x56080aee2f70 (size 32) | SKEYID_e: SKEYID_a-key@0x56080aee2f70 (32-bytes, EXTRACT_KEY_FROM_KEY) | nss hmac digest hack extracting all 32 bytes of key@0x56080aee2f70 | nss hmac digest hack: symkey-key@0x56080aee2f70 (32-bytes, EXTRACT_KEY_FROM_KEY) | : ephemeral-key@0x56080ae63080 (16-bytes, AES_KEY_GEN) | nss hmac digest hack: new slot-key@0x56080aee6cc0 (32-bytes, EXTRACT_KEY_FROM_KEY) | sizeof bytes 32 | wrapper: (SECItemType)-256261392: ffffff82 ffffffe1 36 37 ffffffd3 ffffffc3 4c ffffffab ffffffbb 3f ffffffb5 ffffff82 ffffffe3 ffffff80 26 2c ffffff84 fffffffa 61 fffffffe ffffffb0 03 5f fffffff5 66 ffffffa5 61 fffffffc fffffffa 6a ffffffcd 69 | nss hmac digest hack: release slot-key-key@0x56080aee6cc0 | nss hmac digest hack extracted len 32 bytes at 0x7f83e0004100 | unwrapped: 95 ec 0f 3d fa 17 c1 4d 20 5a c9 18 06 4f da 66 | unwrapped: d7 f5 1e f7 fc f7 42 5c 5a 43 44 3e ba b1 a2 c8 | SKEYID_e PRF sha2_256 update g^xy-key@0x56080aeef1b0 (size 256) | SKEYID_e: g^xy-key@0x56080aeef1b0 (256-bytes, CONCATENATE_DATA_AND_BASE) | nss hmac digest hack extracting all 256 bytes of key@0x56080aeef1b0 | nss hmac digest hack: symkey-key@0x56080aeef1b0 (256-bytes, CONCATENATE_DATA_AND_BASE) | : ephemeral-key@0x56080ae63080 (16-bytes, AES_KEY_GEN) | nss hmac digest hack: new slot-key@0x56080aee6cc0 (256-bytes, CONCATENATE_DATA_AND_BASE) | sizeof bytes 256 | wrapper: (SECItemType)-256261392: 5c 51 0f 14 ffffffe2 ffffff9c 56 ffffffe5 ffffff91 fffffff9 55 21 47 5c 48 ffffffa0 3c 5d ffffffe1 ffffff96 ffffff95 7a ffffffe0 0a 00 ffffff93 ffffff84 fffffff2 6d ffffffbf 2f 46 40 ffffffb9 ffffffec ffffffce 17 04 31 ffffffa3 ffffffec ffffffe6 2c 46 45 52 39 61 1d ffffff9a ffffff99 77 01 67 ffffff96 ffffff93 ffffffe1 ffffffae ffffffc1 ffffffb0 27 64 fffffff2 45 1a ffffffc0 6c 20 ffffff9b 38 4a ffffffd6 29 4a 03 0d ffffffb7 4a ffffffc8 44 27 79 ffffffd3 ffffff83 ffffffd1 fffffff6 06 ffffffdb 6c ffffffaa 36 fffffffd ffffffa9 ffffffb4 54 ffffffdb ffffff93 ffffffda 02 6d fffffffb ffffffa5 ffffffde 16 38 ffffff88 ffffffd7 43 3a 36 ffffffda 0c fffffff0 2d 4e 71 37 ffffffb1 61 ffffffa9 0c ffffff91 ffffffa1 ffffffb5 ffffff83 ffffff9f ffffffd0 19 ffffff8b ffffff9c ffffffc7 53 ffffffdb 3f ffffffdc 0c ffffff9b 0f ffffffaf 4d 08 ffffffa2 ffffff8b ffffffd0 65 7e ffffff9d 07 ffffff92 ffffffdb ffffff9b 02 27 70 fffffff2 ffffffc2 ffffffa4 fffff | nss hmac digest hack: release slot-key-key@0x56080aee6cc0 | nss hmac digest hack extracted len 256 bytes at 0x7f83e0001cd0 | unwrapped: c7 2b d9 0d f9 ce a8 5a d3 f8 7a 58 8f ee b6 e6 | unwrapped: 93 d9 2b 8b 79 27 df d5 df ec 9f 42 71 1e c4 ad | unwrapped: 8c 1c cf c2 87 b6 b2 e5 b1 63 af 9e dd f4 74 86 | unwrapped: 6c da 58 dc 69 91 bd d6 1b 8e 18 12 8b b6 9e 37 | unwrapped: 6c 70 8b 7d 76 c5 38 eb 12 a5 63 58 ca 99 98 73 | unwrapped: ed 8a ad 6d 2c c0 ef 1a 94 76 37 3c f5 a1 bc 40 | unwrapped: b1 ca d4 3c 2c fe 3f fe 00 32 0b 11 32 da 0a 26 | unwrapped: 4f 84 62 fd e9 20 35 27 2a 8b 33 09 f2 06 7e 27 | unwrapped: d5 35 22 f0 9e f2 e7 05 89 89 fa df 82 cc 25 25 | unwrapped: 01 7f b9 21 a9 ab 70 9e 2f 87 e8 18 6c 36 f1 97 | unwrapped: 45 37 cc 92 28 ec 42 df 6b 9a bd b9 c3 de 41 70 | unwrapped: de c8 c1 df 7a bc a0 78 34 21 7a 04 fd 73 2d cd | unwrapped: fe 08 ee ae 58 8c 19 9a 84 43 af 62 24 10 c7 c3 | unwrapped: 81 ae 03 d6 a6 97 78 50 74 d8 12 e4 9a 99 b8 94 | unwrapped: 81 da 7a a6 55 8b 04 5a 55 1c 0b f3 dc 9f 9e 4e | unwrapped: e9 8b ec 4d 34 70 df 3f ab 35 89 2b 41 85 99 49 | SKEYID_e PRF sha2_256 update CKI_i-bytes@0x56080af03860 (length 8) | 3c e4 38 3f ed 34 7c e6 | SKEYID_e PRF sha2_256 update CKI_r-bytes@0x56080af03868 (length 8) | 29 82 ac 69 b5 22 4f 63 | SKEYID_e PRF sha2_256 update 2-byte@0x2 (2) | 02 | : ephemeral-key@0x56080ae63080 (16-bytes, AES_KEY_GEN) | CONCATENATE_DATA_AND_BASE: | target: EXTRACT_KEY_FROM_KEY | base: base-key@0x56080ae63080 (16-bytes, AES_KEY_GEN) | params: 16-bytes@0x7f83f0b9c6b0 | result: final-key@0x56080aee47f0 (48-bytes, EXTRACT_KEY_FROM_KEY) | key-offset: 0, key-size: 32 | EXTRACT_KEY_FROM_KEY: | target: EXTRACT_KEY_FROM_KEY | key_size: 32-bytes | base: base-key@0x56080aee47f0 (48-bytes, EXTRACT_KEY_FROM_KEY) | operation: FLAGS_ONLY | params: 8-bytes@0x7f83f0b9c698 | result: final-key@0x56080aef0b10 (32-bytes, EXTRACT_KEY_FROM_KEY) | final: release tmp-key@0x56080aee47f0 | SKEYID_e PRF sha2_256 final-key@0x56080aef0b10 (size 32) | SKEYID_e: key-key@0x56080aef0b10 (32-bytes, EXTRACT_KEY_FROM_KEY) | key-offset: 0, key-size: 32 | EXTRACT_KEY_FROM_KEY: | target: AES_CBC | flags: ENCRYPT+DECRYPT | key_size: 32-bytes | base: base-key@0x56080aef0b10 (32-bytes, EXTRACT_KEY_FROM_KEY) | operation: FLAGS_ONLY | params: 8-bytes@0x7f83f0b9c6f8 | result: keymat-key@0x56080aee47f0 (32-bytes, AES_CBC) | NSS: pointers skeyid_d 0x56080aeea0c0, skeyid_a 0x56080aee2f70, skeyid_e 0x56080aef0b10, enc_key 0x56080aee47f0 | DH_i: 50 43 4b bf 5b 98 6c f0 aa 05 05 9b b2 75 bd 4b | DH_i: b5 cd fe d0 08 21 50 3c 84 d0 42 d8 82 0e 7a 4b | DH_i: c2 25 3b 42 51 e6 b5 33 12 b7 0b 52 f1 72 d1 bc | DH_i: 88 37 8b a8 02 3f a9 5f bb ef 52 c8 13 26 72 87 | DH_i: 61 f7 55 e3 7a 3d dd f7 22 24 e5 94 15 7a b4 37 | DH_i: f8 d0 93 4a 76 b9 ee 80 9b 4d f5 b2 05 9b ff 21 | DH_i: 39 31 89 35 3d 5a 05 7d d4 ac 21 9a 4e 72 79 47 | DH_i: b7 36 6e d6 05 15 68 b9 e0 08 50 ac 52 59 56 09 | DH_i: 2c 24 3b 9f 00 de d6 fe 42 41 f5 d4 5f 28 b4 e3 | DH_i: 3d 71 80 9f dc cb 84 2b 4a 09 4d 0c df 39 84 cf | DH_i: bb 5c 8d 2e fd b9 47 da 5e a1 0e 3c 4b 7e a4 f1 | DH_i: d0 be 94 d7 d3 ed 7c 93 fc fd 77 47 90 72 5f ce | DH_i: ff 41 4d ed c9 a5 2e 4a de 3a 60 9e 71 64 66 c4 | DH_i: f2 46 d5 46 7d ed 5f 35 96 4e bf ab bb 43 eb d5 | DH_i: f9 5e 8e 1a 4c fd 69 bd 91 f6 b7 d5 84 62 d5 ff | DH_i: d8 e4 37 6a 94 88 12 97 85 53 20 e9 25 dc 41 ec | DH_r: 0e 51 86 c4 5d 2b d0 3d 04 bc 38 4e 03 02 88 10 | DH_r: 36 d4 be 74 a6 bd 6a 33 08 8a ab 43 0b 55 14 44 | DH_r: 62 f6 7f 9d f7 36 8d 02 da 49 2a f3 c5 b2 08 be | DH_r: c1 29 02 ff fe a4 ef 77 b8 e1 89 a8 f9 48 9d a1 | DH_r: b4 07 ab 0e 04 5f 4c 94 b7 cc 6d c3 5c 9d 65 e8 | DH_r: 84 f9 89 c8 f1 ed 78 41 70 d3 37 29 ac bf c6 f1 | DH_r: cb fb a6 45 24 15 e1 a7 61 ad 89 b6 96 2b 5b 8e | DH_r: 58 7f 1a d3 60 6c 58 d2 3f 5c c4 17 19 35 d6 8b | DH_r: a1 02 0e b4 65 81 a6 6c be 85 88 88 31 9a 1e dd | DH_r: 33 7c 2d fe da 04 3e 85 0d 75 83 f6 b5 3a 18 6f | DH_r: e7 3c 1f cc f4 3a 7f ce c3 fb da af eb 1d 84 44 | DH_r: 5d b0 cc af 9e 13 f8 75 de 05 51 d2 be c4 7d 0f | DH_r: f3 40 49 f6 d8 a3 60 4b c5 b1 3b 63 8b 95 2d 3e | DH_r: 61 cd 0f 3c 95 b0 30 e6 de d1 48 26 bd 91 15 b6 | DH_r: e8 72 d8 50 91 97 9c ad aa 49 f4 bd c9 b2 a8 1d | DH_r: 32 d0 a8 08 db 96 a7 55 3d 58 5d 4a 11 b5 56 40 | new IV hash sha2_256 init | new IV hash sha2_256 digest GI-bytes@0x56080af03660 (length 256) | 50 43 4b bf 5b 98 6c f0 aa 05 05 9b b2 75 bd 4b | b5 cd fe d0 08 21 50 3c 84 d0 42 d8 82 0e 7a 4b | c2 25 3b 42 51 e6 b5 33 12 b7 0b 52 f1 72 d1 bc | 88 37 8b a8 02 3f a9 5f bb ef 52 c8 13 26 72 87 | 61 f7 55 e3 7a 3d dd f7 22 24 e5 94 15 7a b4 37 | f8 d0 93 4a 76 b9 ee 80 9b 4d f5 b2 05 9b ff 21 | 39 31 89 35 3d 5a 05 7d d4 ac 21 9a 4e 72 79 47 | b7 36 6e d6 05 15 68 b9 e0 08 50 ac 52 59 56 09 | 2c 24 3b 9f 00 de d6 fe 42 41 f5 d4 5f 28 b4 e3 | 3d 71 80 9f dc cb 84 2b 4a 09 4d 0c df 39 84 cf | bb 5c 8d 2e fd b9 47 da 5e a1 0e 3c 4b 7e a4 f1 | d0 be 94 d7 d3 ed 7c 93 fc fd 77 47 90 72 5f ce | ff 41 4d ed c9 a5 2e 4a de 3a 60 9e 71 64 66 c4 | f2 46 d5 46 7d ed 5f 35 96 4e bf ab bb 43 eb d5 | f9 5e 8e 1a 4c fd 69 bd 91 f6 b7 d5 84 62 d5 ff | d8 e4 37 6a 94 88 12 97 85 53 20 e9 25 dc 41 ec | new IV hash sha2_256 digest GR-bytes@0x56080af03760 (length 256) | 0e 51 86 c4 5d 2b d0 3d 04 bc 38 4e 03 02 88 10 | 36 d4 be 74 a6 bd 6a 33 08 8a ab 43 0b 55 14 44 | 62 f6 7f 9d f7 36 8d 02 da 49 2a f3 c5 b2 08 be | c1 29 02 ff fe a4 ef 77 b8 e1 89 a8 f9 48 9d a1 | b4 07 ab 0e 04 5f 4c 94 b7 cc 6d c3 5c 9d 65 e8 | 84 f9 89 c8 f1 ed 78 41 70 d3 37 29 ac bf c6 f1 | cb fb a6 45 24 15 e1 a7 61 ad 89 b6 96 2b 5b 8e | 58 7f 1a d3 60 6c 58 d2 3f 5c c4 17 19 35 d6 8b | a1 02 0e b4 65 81 a6 6c be 85 88 88 31 9a 1e dd | 33 7c 2d fe da 04 3e 85 0d 75 83 f6 b5 3a 18 6f | e7 3c 1f cc f4 3a 7f ce c3 fb da af eb 1d 84 44 | 5d b0 cc af 9e 13 f8 75 de 05 51 d2 be c4 7d 0f | f3 40 49 f6 d8 a3 60 4b c5 b1 3b 63 8b 95 2d 3e | 61 cd 0f 3c 95 b0 30 e6 de d1 48 26 bd 91 15 b6 | e8 72 d8 50 91 97 9c ad aa 49 f4 bd c9 b2 a8 1d | 32 d0 a8 08 db 96 a7 55 3d 58 5d 4a 11 b5 56 40 | new IV hash sha2_256 final chunk@0x7f83e0004100 (length 32) | 31 d6 e1 b0 8a 8f dd d8 cf 01 b7 fe cc 1d 3d e7 | 97 1e 11 08 3c 7a 11 c8 50 21 65 c0 68 6a c5 f1 | crypto helper 0 finished compute dh+iv (V1 Phase 1) (aggr outR1 DH); request ID 2 time elapsed 0.002178 seconds | crypto helper 0 sending results from work-order 2 for state #1 to event queue | scheduling resume sending helper answer for #1 | libevent_malloc: new ptr-libevent@0x7f83e0004f00 size 128 | crypto helper 0 waiting (nothing to do) | processing resume sending helper answer for #1 | start processing: state #1 connection "westnets-eastnet/2x0" from 192.1.2.23:500 (in resume_handler() at server.c:797) | crypto helper 0 replies to request ID 2 | calling continuation function 0x56080990f630 | main_inR2_outI3_cryptotail for #1: calculated DH, sending R1 | **emit ISAKMP Message: | initiator cookie: | 3c e4 38 3f ed 34 7c e6 | responder cookie: | 29 82 ac 69 b5 22 4f 63 | next payload type: ISAKMP_NEXT_ID (0x5) | ISAKMP version: ISAKMP Version 1.0 (rfc2407) (0x10) | exchange type: ISAKMP_XCHG_IDPROT (0x2) | flags: ISAKMP_FLAG_v1_ENCRYPTION (0x1) | Message ID: 0 (0x0) | next payload chain: saving message location 'ISAKMP Message'.'next payload type' | next payload chain: ignoring supplied 'ISAKMP Message'.'next payload type' value 5:ISAKMP_NEXT_ID | DH secret MODP2048@0x7f83e8000d60: transferring ownership from helper IKEv1 DH+IV to state #1 | thinking about whether to send my certificate: | I have RSA key: OAKLEY_RSA_SIG cert.type: 0?? | sendcert: CERT_ALWAYSSEND and I did not get a certificate request | so do not send cert. | I did not send a certificate because I do not have one. | I am not sending a certificate request | I will NOT send an initial contact payload | init checking NAT-T: enabled; RFC 3947 (NAT-Traversal) | NATD hash sha2_256 init | NATD hash sha2_256 digest ICOOKIE/IKE SPIi-bytes@0x56080af00388 (length 8) | 3c e4 38 3f ed 34 7c e6 | NATD hash sha2_256 digest RCOOKIE/IKE SPIr-bytes@0x56080af00390 (length 8) | 29 82 ac 69 b5 22 4f 63 | NATD hash sha2_256 digest IP addr-bytes@0x7fff508fe264 (length 4) | c0 01 02 2d | NATD hash sha2_256 digest PORT-bytes@0x7fff508fe256 (length 2) | 01 f4 | NATD hash sha2_256 final bytes@0x7fff508fe300 (length 32) | 89 51 1b 74 c8 23 a8 a8 79 67 5f 16 3a af 10 26 | e2 96 e4 22 05 4b 42 9c b3 25 b4 e5 68 14 6c 57 | natd_hash: hasher=0x5608099e5c40(32) | natd_hash: icookie= 3c e4 38 3f ed 34 7c e6 | natd_hash: rcookie= 29 82 ac 69 b5 22 4f 63 | natd_hash: ip= c0 01 02 2d | natd_hash: port= 01 f4 | natd_hash: hash= 89 51 1b 74 c8 23 a8 a8 79 67 5f 16 3a af 10 26 | natd_hash: hash= e2 96 e4 22 05 4b 42 9c b3 25 b4 e5 68 14 6c 57 | NATD hash sha2_256 init | NATD hash sha2_256 digest ICOOKIE/IKE SPIi-bytes@0x56080af00388 (length 8) | 3c e4 38 3f ed 34 7c e6 | NATD hash sha2_256 digest RCOOKIE/IKE SPIr-bytes@0x56080af00390 (length 8) | 29 82 ac 69 b5 22 4f 63 | NATD hash sha2_256 digest IP addr-bytes@0x7fff508fe264 (length 4) | c0 01 02 17 | NATD hash sha2_256 digest PORT-bytes@0x7fff508fe256 (length 2) | 01 f4 | NATD hash sha2_256 final bytes@0x7fff508fe340 (length 32) | 7c 54 a4 71 c7 a5 6a 47 bb 8d ac 54 1d 8a 0c de | 36 e0 25 2d d9 20 21 98 2c a7 34 c8 10 c3 bd 2a | natd_hash: hasher=0x5608099e5c40(32) | natd_hash: icookie= 3c e4 38 3f ed 34 7c e6 | natd_hash: rcookie= 29 82 ac 69 b5 22 4f 63 | natd_hash: ip= c0 01 02 17 | natd_hash: port= 01 f4 | natd_hash: hash= 7c 54 a4 71 c7 a5 6a 47 bb 8d ac 54 1d 8a 0c de | natd_hash: hash= 36 e0 25 2d d9 20 21 98 2c a7 34 c8 10 c3 bd 2a | expected NAT-D(me): 89 51 1b 74 c8 23 a8 a8 79 67 5f 16 3a af 10 26 | expected NAT-D(me): e2 96 e4 22 05 4b 42 9c b3 25 b4 e5 68 14 6c 57 | expected NAT-D(him): | 7c 54 a4 71 c7 a5 6a 47 bb 8d ac 54 1d 8a 0c de | 36 e0 25 2d d9 20 21 98 2c a7 34 c8 10 c3 bd 2a | received NAT-D: 89 51 1b 74 c8 23 a8 a8 79 67 5f 16 3a af 10 26 | received NAT-D: e2 96 e4 22 05 4b 42 9c b3 25 b4 e5 68 14 6c 57 | received NAT-D: 7c 54 a4 71 c7 a5 6a 47 bb 8d ac 54 1d 8a 0c de | received NAT-D: 36 e0 25 2d d9 20 21 98 2c a7 34 c8 10 c3 bd 2a | NAT_TRAVERSAL encaps using auto-detect | NAT_TRAVERSAL this end is NOT behind NAT | NAT_TRAVERSAL that end is NOT behind NAT | NAT_TRAVERSAL nat-keepalive enabled 192.1.2.23 | NAT-Traversal: Result using RFC 3947 (NAT-Traversal) sender port 500: no NAT detected | NAT_T_WITH_KA detected | global one-shot timer EVENT_NAT_T_KEEPALIVE scheduled in 20 seconds | ***emit ISAKMP Identification Payload (IPsec DOI): | next payload type: ISAKMP_NEXT_SIG (0x9) | ID type: ID_FQDN (0x2) | Protocol ID: 0 (0x0) | port: 0 (0x0) | next payload chain: ignoring supplied 'ISAKMP Identification Payload (IPsec DOI)'.'next payload type' value 9:ISAKMP_NEXT_SIG | next payload chain: setting previous 'ISAKMP Message'.'next payload type' to current ISAKMP Identification Payload (IPsec DOI) (5:ISAKMP_NEXT_ID) | next payload chain: saving location 'ISAKMP Identification Payload (IPsec DOI)'.'next payload type' in 'reply packet' | emitting 4 raw bytes of my identity into ISAKMP Identification Payload (IPsec DOI) | my identity 77 65 73 74 | emitting length of ISAKMP Identification Payload (IPsec DOI): 12 | hmac PRF sha2_256 init symkey-key@0x56080aeed4f0 (size 32) | hmac: symkey-key@0x56080aeed4f0 (32-bytes, EXTRACT_KEY_FROM_KEY) | key-offset: 0, key-size: 32 | EXTRACT_KEY_FROM_KEY: | target: SHA256_HMAC | flags: SIGN | key_size: 32-bytes | base: base-key@0x56080aeed4f0 (32-bytes, EXTRACT_KEY_FROM_KEY) | operation: FLAGS_ONLY | params: 8-bytes@0x7fff508fe258 | result: clone-key@0x7f83e8006900 (32-bytes, SHA256_HMAC) | hmac prf: created sha2_256 context 0x56080aee6220 from symkey-key@0x7f83e8006900 | hmac prf: begin sha2_256 with context 0x56080aee6220 from symkey-key@0x7f83e8006900 | hmac: release clone-key@0x7f83e8006900 | hmac PRF sha2_256 crypt-prf@0x56080af010d0 | hmac PRF sha2_256 update data-bytes@0x7f83e8000b20 (length 256) | 50 43 4b bf 5b 98 6c f0 aa 05 05 9b b2 75 bd 4b | b5 cd fe d0 08 21 50 3c 84 d0 42 d8 82 0e 7a 4b | c2 25 3b 42 51 e6 b5 33 12 b7 0b 52 f1 72 d1 bc | 88 37 8b a8 02 3f a9 5f bb ef 52 c8 13 26 72 87 | 61 f7 55 e3 7a 3d dd f7 22 24 e5 94 15 7a b4 37 | f8 d0 93 4a 76 b9 ee 80 9b 4d f5 b2 05 9b ff 21 | 39 31 89 35 3d 5a 05 7d d4 ac 21 9a 4e 72 79 47 | b7 36 6e d6 05 15 68 b9 e0 08 50 ac 52 59 56 09 | 2c 24 3b 9f 00 de d6 fe 42 41 f5 d4 5f 28 b4 e3 | 3d 71 80 9f dc cb 84 2b 4a 09 4d 0c df 39 84 cf | bb 5c 8d 2e fd b9 47 da 5e a1 0e 3c 4b 7e a4 f1 | d0 be 94 d7 d3 ed 7c 93 fc fd 77 47 90 72 5f ce | ff 41 4d ed c9 a5 2e 4a de 3a 60 9e 71 64 66 c4 | f2 46 d5 46 7d ed 5f 35 96 4e bf ab bb 43 eb d5 | f9 5e 8e 1a 4c fd 69 bd 91 f6 b7 d5 84 62 d5 ff | d8 e4 37 6a 94 88 12 97 85 53 20 e9 25 dc 41 ec | hmac PRF sha2_256 update data-bytes@0x56080af01610 (length 256) | 0e 51 86 c4 5d 2b d0 3d 04 bc 38 4e 03 02 88 10 | 36 d4 be 74 a6 bd 6a 33 08 8a ab 43 0b 55 14 44 | 62 f6 7f 9d f7 36 8d 02 da 49 2a f3 c5 b2 08 be | c1 29 02 ff fe a4 ef 77 b8 e1 89 a8 f9 48 9d a1 | b4 07 ab 0e 04 5f 4c 94 b7 cc 6d c3 5c 9d 65 e8 | 84 f9 89 c8 f1 ed 78 41 70 d3 37 29 ac bf c6 f1 | cb fb a6 45 24 15 e1 a7 61 ad 89 b6 96 2b 5b 8e | 58 7f 1a d3 60 6c 58 d2 3f 5c c4 17 19 35 d6 8b | a1 02 0e b4 65 81 a6 6c be 85 88 88 31 9a 1e dd | 33 7c 2d fe da 04 3e 85 0d 75 83 f6 b5 3a 18 6f | e7 3c 1f cc f4 3a 7f ce c3 fb da af eb 1d 84 44 | 5d b0 cc af 9e 13 f8 75 de 05 51 d2 be c4 7d 0f | f3 40 49 f6 d8 a3 60 4b c5 b1 3b 63 8b 95 2d 3e | 61 cd 0f 3c 95 b0 30 e6 de d1 48 26 bd 91 15 b6 | e8 72 d8 50 91 97 9c ad aa 49 f4 bd c9 b2 a8 1d | 32 d0 a8 08 db 96 a7 55 3d 58 5d 4a 11 b5 56 40 | hmac PRF sha2_256 update data-bytes@0x56080af00388 (length 8) | 3c e4 38 3f ed 34 7c e6 | hmac PRF sha2_256 update data-bytes@0x56080af00390 (length 8) | 29 82 ac 69 b5 22 4f 63 | hashing 640 bytes of SA | hmac PRF sha2_256 update data-bytes@0x56080af01b94 (length 640) | 00 00 00 01 00 00 00 01 00 00 02 78 00 01 00 12 | 03 00 00 24 00 01 00 00 80 0b 00 01 80 0c 0e 10 | 80 01 00 07 80 02 00 04 80 03 00 03 80 04 00 0e | 80 0e 01 00 03 00 00 24 01 01 00 00 80 0b 00 01 | 80 0c 0e 10 80 01 00 07 80 02 00 04 80 03 00 03 | 80 04 00 0e 80 0e 00 80 03 00 00 24 02 01 00 00 | 80 0b 00 01 80 0c 0e 10 80 01 00 07 80 02 00 06 | 80 03 00 03 80 04 00 0e 80 0e 01 00 03 00 00 24 | 03 01 00 00 80 0b 00 01 80 0c 0e 10 80 01 00 07 | 80 02 00 06 80 03 00 03 80 04 00 0e 80 0e 00 80 | 03 00 00 24 04 01 00 00 80 0b 00 01 80 0c 0e 10 | 80 01 00 07 80 02 00 02 80 03 00 03 80 04 00 0e | 80 0e 01 00 03 00 00 24 05 01 00 00 80 0b 00 01 | 80 0c 0e 10 80 01 00 07 80 02 00 02 80 03 00 03 | 80 04 00 0e 80 0e 00 80 03 00 00 24 06 01 00 00 | 80 0b 00 01 80 0c 0e 10 80 01 00 07 80 02 00 04 | 80 03 00 03 80 04 00 05 80 0e 01 00 03 00 00 24 | 07 01 00 00 80 0b 00 01 80 0c 0e 10 80 01 00 07 | 80 02 00 04 80 03 00 03 80 04 00 05 80 0e 00 80 | 03 00 00 24 08 01 00 00 80 0b 00 01 80 0c 0e 10 | 80 01 00 07 80 02 00 06 80 03 00 03 80 04 00 05 | 80 0e 01 00 03 00 00 24 09 01 00 00 80 0b 00 01 | 80 0c 0e 10 80 01 00 07 80 02 00 06 80 03 00 03 | 80 04 00 05 80 0e 00 80 03 00 00 24 0a 01 00 00 | 80 0b 00 01 80 0c 0e 10 80 01 00 07 80 02 00 02 | 80 03 00 03 80 04 00 05 80 0e 01 00 03 00 00 24 | 0b 01 00 00 80 0b 00 01 80 0c 0e 10 80 01 00 07 | 80 02 00 02 80 03 00 03 80 04 00 05 80 0e 00 80 | 03 00 00 20 0c 01 00 00 80 0b 00 01 80 0c 0e 10 | 80 01 00 05 80 02 00 04 80 03 00 03 80 04 00 0e | 03 00 00 20 0d 01 00 00 80 0b 00 01 80 0c 0e 10 | 80 01 00 05 80 02 00 06 80 03 00 03 80 04 00 0e | 03 00 00 20 0e 01 00 00 80 0b 00 01 80 0c 0e 10 | 80 01 00 05 80 02 00 02 80 03 00 03 80 04 00 0e | 03 00 00 20 0f 01 00 00 80 0b 00 01 80 0c 0e 10 | 80 01 00 05 80 02 00 04 80 03 00 03 80 04 00 05 | 03 00 00 20 10 01 00 00 80 0b 00 01 80 0c 0e 10 | 80 01 00 05 80 02 00 06 80 03 00 03 80 04 00 05 | 00 00 00 20 11 01 00 00 80 0b 00 01 80 0c 0e 10 | 80 01 00 05 80 02 00 02 80 03 00 03 80 04 00 05 | hmac PRF sha2_256 update data-bytes@0x560809a0e960 (length 8) | 02 00 00 00 77 65 73 74 | hmac PRF sha2_256 final-bytes@0x7fff508fe560 (length 32) | c5 08 35 9e 94 f9 98 c8 b8 94 db 85 c3 b9 7c 11 | 34 61 a8 d5 2b 1a 64 f4 2f cf 75 68 26 43 15 c1 | started looking for secret for @west->@east of kind PKK_RSA | actually looking for secret for @west->@east of kind PKK_RSA | line 1: key type PKK_RSA(@west) to type PKK_RSA | 1: compared key (none) to @west / @east -> 002 | 2: compared key (none) to @west / @east -> 002 | line 1: match=002 | match 002 beats previous best_match 000 match=0x56080aef3240 (line=1) | concluding with best_match=002 best=0x56080aef3240 (lineno=1) | RSA key AQOm9dY/4 found | RSA_sign_hash: Started using NSS | NSS: Authentication to NSS successful | RSA_sign_hash: Ended using NSS | ***emit ISAKMP Signature Payload: | next payload type: ISAKMP_NEXT_NONE (0x0) | next payload chain: setting previous 'ISAKMP Identification Payload (IPsec DOI)'.'next payload type' to current ISAKMP Signature Payload (9:ISAKMP_NEXT_SIG) | next payload chain: saving location 'ISAKMP Signature Payload'.'next payload type' in 'reply packet' | emitting 274 raw bytes of SIG_I into ISAKMP Signature Payload | SIG_I 83 c8 52 43 8b f6 19 fc fc 98 bd ea a5 2b b0 8c | SIG_I a9 d2 fe de 6a 5d 5c 8d 76 82 54 4a b2 b9 db 28 | SIG_I 94 82 e8 ab 4a 62 3b a9 79 57 2a ce 18 50 44 54 | SIG_I 97 3b 60 89 65 56 49 fd cf d8 0f 6b a4 c5 ff d6 | SIG_I b6 dd 19 7f 77 a2 dd 95 b5 37 cd 47 43 2e 32 88 | SIG_I 26 7f 94 53 27 a1 38 bb 5b e5 de d8 82 c1 8a 4a | SIG_I 88 62 88 8b 41 25 1a e0 e7 04 7b 85 49 f9 37 91 | SIG_I 8d c1 a8 67 91 df f1 f5 8f 47 23 58 3c a7 62 07 | SIG_I cb 33 a7 0e ee da 89 d0 96 b7 a3 2d 50 05 60 68 | SIG_I 22 90 14 92 4f 19 a0 43 f6 76 35 b8 c0 f8 1b ca | SIG_I a4 59 b6 5b 13 fd af d2 27 02 70 1f 5e ee 8b 90 | SIG_I 49 3c 90 5b 1d 20 06 61 b0 19 7c bb c9 0c f8 84 | SIG_I 4e 52 ab 55 74 d5 b1 85 67 3c 90 be 64 df e2 d1 | SIG_I 19 19 a0 44 4b 77 e2 e4 f6 1c c2 19 bb e2 45 2e | SIG_I 41 26 36 0d b3 6a 86 1e cc 2a 43 fd ed b1 27 68 | SIG_I 5a f4 36 2a 91 2d 7b eb bc ad e0 b6 2c 89 e4 97 | SIG_I 76 83 e9 c5 de ff dc 62 8b ec 33 a2 44 a2 16 23 | SIG_I e9 9f | emitting length of ISAKMP Signature Payload: 278 | Not sending INITIAL_CONTACT | encrypting: 09 00 00 0c 02 00 00 00 77 65 73 74 00 00 01 16 | encrypting: 83 c8 52 43 8b f6 19 fc fc 98 bd ea a5 2b b0 8c | encrypting: a9 d2 fe de 6a 5d 5c 8d 76 82 54 4a b2 b9 db 28 | encrypting: 94 82 e8 ab 4a 62 3b a9 79 57 2a ce 18 50 44 54 | encrypting: 97 3b 60 89 65 56 49 fd cf d8 0f 6b a4 c5 ff d6 | encrypting: b6 dd 19 7f 77 a2 dd 95 b5 37 cd 47 43 2e 32 88 | encrypting: 26 7f 94 53 27 a1 38 bb 5b e5 de d8 82 c1 8a 4a | encrypting: 88 62 88 8b 41 25 1a e0 e7 04 7b 85 49 f9 37 91 | encrypting: 8d c1 a8 67 91 df f1 f5 8f 47 23 58 3c a7 62 07 | encrypting: cb 33 a7 0e ee da 89 d0 96 b7 a3 2d 50 05 60 68 | encrypting: 22 90 14 92 4f 19 a0 43 f6 76 35 b8 c0 f8 1b ca | encrypting: a4 59 b6 5b 13 fd af d2 27 02 70 1f 5e ee 8b 90 | encrypting: 49 3c 90 5b 1d 20 06 61 b0 19 7c bb c9 0c f8 84 | encrypting: 4e 52 ab 55 74 d5 b1 85 67 3c 90 be 64 df e2 d1 | encrypting: 19 19 a0 44 4b 77 e2 e4 f6 1c c2 19 bb e2 45 2e | encrypting: 41 26 36 0d b3 6a 86 1e cc 2a 43 fd ed b1 27 68 | encrypting: 5a f4 36 2a 91 2d 7b eb bc ad e0 b6 2c 89 e4 97 | encrypting: 76 83 e9 c5 de ff dc 62 8b ec 33 a2 44 a2 16 23 | encrypting: e9 9f | IV: 31 d6 e1 b0 8a 8f dd d8 cf 01 b7 fe cc 1d 3d e7 | IV: 97 1e 11 08 3c 7a 11 c8 50 21 65 c0 68 6a c5 f1 | unpadded size is: 290 | emitting 14 zero bytes of encryption padding into ISAKMP Message | encrypting 304 using AES_CBC | no IKEv1 message padding required | emitting length of ISAKMP Message: 332 | NSS ike_alg_nss_cbc: aes - enter | NSS ike_alg_nss_cbc: aes - exit | next IV: af b0 a2 01 c8 01 e3 31 86 22 4d 00 39 66 26 d3 | complete v1 state transition with STF_OK | [RE]START processing: state #1 connection "westnets-eastnet/2x0" from 192.1.2.23:500 (in complete_v1_state_transition() at ikev1.c:2649) | #1 is idle | doing_xauth:no, t_xauth_client_done:no | IKEv1: transition from state STATE_MAIN_I2 to state STATE_MAIN_I3 | parent state #1: MAIN_I2(open IKE SA) => MAIN_I3(open IKE SA) | event_already_set, deleting event | state #1 requesting EVENT_CRYPTO_TIMEOUT to be deleted | libevent_free: release ptr-libevent@0x56080af02140 | free_event_entry: release EVENT_CRYPTO_TIMEOUT-pe@0x7f83e8002b20 | sending reply packet to 192.1.2.23:500 (from 192.1.2.45:500) | sending 332 bytes for STATE_MAIN_I2 through eth1 from 192.1.2.45:500 to 192.1.2.23:500 (using #1) | 3c e4 38 3f ed 34 7c e6 29 82 ac 69 b5 22 4f 63 | 05 10 02 01 00 00 00 00 00 00 01 4c 5c 49 58 2a | 8f 9e ab 1e 80 01 05 3d 9f 6d d6 ee f6 19 1e 92 | 51 62 21 55 ad bf d0 a3 d9 eb b5 4c 10 f6 3f 4d | 41 9c 44 e5 14 67 1c ee b0 ba 14 35 51 35 78 c5 | eb 0c 20 05 85 f9 48 00 5e be 35 98 c6 de 33 9f | 83 27 ef 9a 76 c9 50 63 01 09 e4 49 34 14 7c c1 | 7f 83 c6 3e 4b dd b3 86 51 78 9b cd 52 2b 34 64 | 1e b0 6e 0c 72 57 33 90 fb 47 7a 97 b2 3a 01 9b | 5f 79 b5 95 26 e6 f5 db f4 e5 4c 50 b5 33 04 d6 | bc 76 aa 08 26 07 53 c2 dd 4b f1 d2 48 61 84 26 | f8 48 ea e1 e2 87 15 2f 9b 4b 72 00 a5 0d 94 95 | eb e3 83 ba 00 89 78 11 8e fa 58 49 d0 df 03 6e | 4b 29 e8 3d 58 48 59 3b 5b af c8 27 fe e7 46 2b | fe 83 88 85 53 b4 39 ea fb 38 b3 2f ff a0 37 b4 | 6e 14 1b bc df fc 70 7e 75 e7 a5 1e c7 f2 bc 39 | 34 74 a0 3b 36 04 14 f5 82 a4 70 f0 db 6a c3 1e | 2d 92 50 b8 1a f0 32 75 65 ae f5 75 55 8f f3 64 | 7b 8b f6 06 c1 71 d2 cd 40 93 d7 c4 58 54 04 4f | c9 e8 39 5c e8 10 ef 75 8d 2f 50 8f af b0 a2 01 | c8 01 e3 31 86 22 4d 00 39 66 26 d3 | !event_already_set at reschedule "westnets-eastnet/2x0" #1: IMPAIR: suppressing retransmits; scheduling timeout in 60 seconds | event_schedule: new EVENT_RETRANSMIT-pe@0x56080af008f0 | inserting event EVENT_RETRANSMIT, timeout in 60 seconds for #1 | libevent_malloc: new ptr-libevent@0x56080af02140 size 128 | #1 STATE_MAIN_I3: retransmits: first event in 60 seconds; timeout in 60 seconds; limit of 12 retransmits; current time is 50065.81283 "westnets-eastnet/2x0" #1: STATE_MAIN_I3: sent MI3, expecting MR3 | modecfg pull: noquirk policy:push not-client | phase 1 is done, looking for phase 2 to unpend | resume sending helper answer for #1 suppresed complete_v1_state_transition() | stop processing: state #1 connection "westnets-eastnet/2x0" from 192.1.2.23:500 (in resume_handler() at server.c:833) | libevent_free: release ptr-libevent@0x7f83e0004f00 | *received 332 bytes from 192.1.2.23:500 on eth1 (192.1.2.45:500) | 3c e4 38 3f ed 34 7c e6 29 82 ac 69 b5 22 4f 63 | 05 10 02 01 00 00 00 00 00 00 01 4c 7f 8c 41 9d | 2f 23 43 25 00 88 57 2a c2 3a 84 f3 27 92 94 60 | 2e 55 1c bb 79 37 6c bf cc cc 0c 0e 23 4f 62 43 | 27 1f b7 ad 3c 31 20 1a a5 a1 aa 75 6c b1 64 df | 02 a5 d3 50 ba 9f 94 d8 d7 ea 77 ce bd 5e 97 00 | db 28 6a 22 cc 20 da c3 d4 52 2b 98 d7 f9 f4 9d | 01 f6 03 fc 6e e8 a2 f5 d2 28 85 ae 13 ad 41 68 | f9 42 4b d5 61 73 84 03 ca 27 4c ff ef 6a da 1b | 8b ae 29 21 d5 b4 f8 bc 20 3f b6 e4 8a c9 9f 2d | 51 b1 ef b4 35 0f f8 66 cb 55 4d 06 fd ac 99 cd | 2f ff a8 5d 7c 5d 7e 6e 28 94 99 ae fc b9 1a f7 | c5 76 bd c0 07 86 93 1e f1 17 db 8c 77 13 d4 9d | a5 dd 2e 93 a2 d0 a9 32 4f 0e 6b 34 8b 72 a4 f6 | 08 bc dc 5d 55 5b c8 4b 99 92 f7 79 42 5e 3e 32 | 10 9b 06 36 bf 19 43 77 f3 50 c7 04 2f 99 1c 89 | 36 67 23 df f9 50 47 3f 08 b6 9e 87 4c ae e5 99 | db 5b 92 5e 66 86 c8 0b f6 49 f2 98 07 13 04 de | b8 40 0a 5e 28 42 09 03 c6 da 2d fd cb 08 a6 1f | 01 c4 b1 97 b8 92 43 2b d4 2a 1a d4 c8 ea e9 b3 | 51 0b ea 24 90 87 5d b9 c1 a4 ec 95 | start processing: from 192.1.2.23:500 (in process_md() at demux.c:378) | **parse ISAKMP Message: | initiator cookie: | 3c e4 38 3f ed 34 7c e6 | responder cookie: | 29 82 ac 69 b5 22 4f 63 | next payload type: ISAKMP_NEXT_ID (0x5) | ISAKMP version: ISAKMP Version 1.0 (rfc2407) (0x10) | exchange type: ISAKMP_XCHG_IDPROT (0x2) | flags: ISAKMP_FLAG_v1_ENCRYPTION (0x1) | Message ID: 0 (0x0) | length: 332 (0x14c) | processing version=1.0 packet with exchange type=ISAKMP_XCHG_IDPROT (2) | State DB: found IKEv1 state #1 in MAIN_I3 (find_state_ikev1) | start processing: state #1 connection "westnets-eastnet/2x0" from 192.1.2.23:500 (in process_v1_packet() at ikev1.c:1435) | #1 is idle | #1 idle | received encrypted packet from 192.1.2.23:500 | decrypting 304 bytes using algorithm AES_CBC | IV before: af b0 a2 01 c8 01 e3 31 86 22 4d 00 39 66 26 d3 | NSS ike_alg_nss_cbc: aes - enter | NSS ike_alg_nss_cbc: aes - exit | IV after: c8 ea e9 b3 51 0b ea 24 90 87 5d b9 c1 a4 ec 95 | decrypted payload (starts at offset -304): | 3c e4 38 3f ed 34 7c e6 29 82 ac 69 b5 22 4f 63 | 05 10 02 01 00 00 00 00 00 00 01 4c 09 00 00 0c | 02 00 00 00 65 61 73 74 00 00 01 16 4e c8 aa bf | ae 2f 7b 44 c1 70 e4 bd 9d 4d ec 70 dc 12 12 a8 | 68 4a 1f 3b 32 61 85 cb b1 cc ea 6d f3 8f 08 72 | a3 2e ca dc bd 01 88 2f 0c b6 10 32 3f 84 bc 2c | 92 ec dd 9a 95 6b 94 13 aa 82 1e 1b a2 f8 8b 32 | 1a a1 0f 54 f5 9a 5d b4 35 c2 50 11 2d 6d 29 88 | 70 aa 9f cc 86 7e 03 d4 16 ba d0 d5 7c 37 6d 19 | 8c b2 f9 65 a1 a0 15 18 89 a7 90 8d 4c 7b 3a 2f | 7f ec 6e 82 fc be ff 48 73 32 77 5d 64 ea 9e 09 | dd ae 40 d5 88 6d 57 c8 e4 d2 88 b9 86 91 cb 6e | 50 41 a8 78 77 70 07 71 fe 80 15 64 58 57 a2 21 | b0 9f 96 15 cb 0f d4 84 c2 98 8a cc 16 20 0a ac | 18 ca e5 f0 e1 35 8c 86 44 d3 21 b1 51 3b b0 f1 | d7 64 a7 64 79 35 b9 26 90 78 cb 44 3e d6 b1 1d | 5c 8c 4e 77 5f c3 df 59 38 65 38 b6 ee b8 31 63 | 30 33 81 cf 88 4a e2 a7 87 26 70 84 66 21 6e fe | 4e 47 c5 0c e0 46 6d 05 2e 4e 7e 62 06 f0 29 c4 | 31 43 bd a0 73 fa 20 3b e2 3a ab 6c 50 4e 00 00 | 00 00 00 00 00 00 00 00 00 00 00 00 | got payload 0x20 (ISAKMP_NEXT_ID) needed: 0x220 opt: 0x20c0 | ***parse ISAKMP Identification Payload: | next payload type: ISAKMP_NEXT_SIG (0x9) | length: 12 (0xc) | ID type: ID_FQDN (0x2) | DOI specific A: 0 (0x0) | DOI specific B: 0 (0x0) | obj: 65 61 73 74 | got payload 0x200 (ISAKMP_NEXT_SIG) needed: 0x200 opt: 0x20c0 | ***parse ISAKMP Signature Payload: | next payload type: ISAKMP_NEXT_NONE (0x0) | length: 278 (0x116) | removing 14 bytes of padding | message 'main_inR3' HASH payload not checked early "westnets-eastnet/2x0" #1: Peer ID is ID_FQDN: '@east' | X509: no CERT payloads to process | hmac PRF sha2_256 init symkey-key@0x56080aeed4f0 (size 32) | hmac: symkey-key@0x56080aeed4f0 (32-bytes, EXTRACT_KEY_FROM_KEY) | key-offset: 0, key-size: 32 | EXTRACT_KEY_FROM_KEY: | target: SHA256_HMAC | flags: SIGN | key_size: 32-bytes | base: base-key@0x56080aeed4f0 (32-bytes, EXTRACT_KEY_FROM_KEY) | operation: FLAGS_ONLY | params: 8-bytes@0x7fff508feaf8 | result: clone-key@0x7f83e8006900 (32-bytes, SHA256_HMAC) | hmac prf: created sha2_256 context 0x56080aee6220 from symkey-key@0x7f83e8006900 | hmac prf: begin sha2_256 with context 0x56080aee6220 from symkey-key@0x7f83e8006900 | hmac: release clone-key@0x7f83e8006900 | hmac PRF sha2_256 crypt-prf@0x56080af015f0 | hmac PRF sha2_256 update data-bytes@0x56080af01610 (length 256) | 0e 51 86 c4 5d 2b d0 3d 04 bc 38 4e 03 02 88 10 | 36 d4 be 74 a6 bd 6a 33 08 8a ab 43 0b 55 14 44 | 62 f6 7f 9d f7 36 8d 02 da 49 2a f3 c5 b2 08 be | c1 29 02 ff fe a4 ef 77 b8 e1 89 a8 f9 48 9d a1 | b4 07 ab 0e 04 5f 4c 94 b7 cc 6d c3 5c 9d 65 e8 | 84 f9 89 c8 f1 ed 78 41 70 d3 37 29 ac bf c6 f1 | cb fb a6 45 24 15 e1 a7 61 ad 89 b6 96 2b 5b 8e | 58 7f 1a d3 60 6c 58 d2 3f 5c c4 17 19 35 d6 8b | a1 02 0e b4 65 81 a6 6c be 85 88 88 31 9a 1e dd | 33 7c 2d fe da 04 3e 85 0d 75 83 f6 b5 3a 18 6f | e7 3c 1f cc f4 3a 7f ce c3 fb da af eb 1d 84 44 | 5d b0 cc af 9e 13 f8 75 de 05 51 d2 be c4 7d 0f | f3 40 49 f6 d8 a3 60 4b c5 b1 3b 63 8b 95 2d 3e | 61 cd 0f 3c 95 b0 30 e6 de d1 48 26 bd 91 15 b6 | e8 72 d8 50 91 97 9c ad aa 49 f4 bd c9 b2 a8 1d | 32 d0 a8 08 db 96 a7 55 3d 58 5d 4a 11 b5 56 40 | hmac PRF sha2_256 update data-bytes@0x7f83e8000b20 (length 256) | 50 43 4b bf 5b 98 6c f0 aa 05 05 9b b2 75 bd 4b | b5 cd fe d0 08 21 50 3c 84 d0 42 d8 82 0e 7a 4b | c2 25 3b 42 51 e6 b5 33 12 b7 0b 52 f1 72 d1 bc | 88 37 8b a8 02 3f a9 5f bb ef 52 c8 13 26 72 87 | 61 f7 55 e3 7a 3d dd f7 22 24 e5 94 15 7a b4 37 | f8 d0 93 4a 76 b9 ee 80 9b 4d f5 b2 05 9b ff 21 | 39 31 89 35 3d 5a 05 7d d4 ac 21 9a 4e 72 79 47 | b7 36 6e d6 05 15 68 b9 e0 08 50 ac 52 59 56 09 | 2c 24 3b 9f 00 de d6 fe 42 41 f5 d4 5f 28 b4 e3 | 3d 71 80 9f dc cb 84 2b 4a 09 4d 0c df 39 84 cf | bb 5c 8d 2e fd b9 47 da 5e a1 0e 3c 4b 7e a4 f1 | d0 be 94 d7 d3 ed 7c 93 fc fd 77 47 90 72 5f ce | ff 41 4d ed c9 a5 2e 4a de 3a 60 9e 71 64 66 c4 | f2 46 d5 46 7d ed 5f 35 96 4e bf ab bb 43 eb d5 | f9 5e 8e 1a 4c fd 69 bd 91 f6 b7 d5 84 62 d5 ff | d8 e4 37 6a 94 88 12 97 85 53 20 e9 25 dc 41 ec | hmac PRF sha2_256 update data-bytes@0x56080af00390 (length 8) | 29 82 ac 69 b5 22 4f 63 | hmac PRF sha2_256 update data-bytes@0x56080af00388 (length 8) | 3c e4 38 3f ed 34 7c e6 | hashing 640 bytes of SA | hmac PRF sha2_256 update data-bytes@0x56080af01b94 (length 640) | 00 00 00 01 00 00 00 01 00 00 02 78 00 01 00 12 | 03 00 00 24 00 01 00 00 80 0b 00 01 80 0c 0e 10 | 80 01 00 07 80 02 00 04 80 03 00 03 80 04 00 0e | 80 0e 01 00 03 00 00 24 01 01 00 00 80 0b 00 01 | 80 0c 0e 10 80 01 00 07 80 02 00 04 80 03 00 03 | 80 04 00 0e 80 0e 00 80 03 00 00 24 02 01 00 00 | 80 0b 00 01 80 0c 0e 10 80 01 00 07 80 02 00 06 | 80 03 00 03 80 04 00 0e 80 0e 01 00 03 00 00 24 | 03 01 00 00 80 0b 00 01 80 0c 0e 10 80 01 00 07 | 80 02 00 06 80 03 00 03 80 04 00 0e 80 0e 00 80 | 03 00 00 24 04 01 00 00 80 0b 00 01 80 0c 0e 10 | 80 01 00 07 80 02 00 02 80 03 00 03 80 04 00 0e | 80 0e 01 00 03 00 00 24 05 01 00 00 80 0b 00 01 | 80 0c 0e 10 80 01 00 07 80 02 00 02 80 03 00 03 | 80 04 00 0e 80 0e 00 80 03 00 00 24 06 01 00 00 | 80 0b 00 01 80 0c 0e 10 80 01 00 07 80 02 00 04 | 80 03 00 03 80 04 00 05 80 0e 01 00 03 00 00 24 | 07 01 00 00 80 0b 00 01 80 0c 0e 10 80 01 00 07 | 80 02 00 04 80 03 00 03 80 04 00 05 80 0e 00 80 | 03 00 00 24 08 01 00 00 80 0b 00 01 80 0c 0e 10 | 80 01 00 07 80 02 00 06 80 03 00 03 80 04 00 05 | 80 0e 01 00 03 00 00 24 09 01 00 00 80 0b 00 01 | 80 0c 0e 10 80 01 00 07 80 02 00 06 80 03 00 03 | 80 04 00 05 80 0e 00 80 03 00 00 24 0a 01 00 00 | 80 0b 00 01 80 0c 0e 10 80 01 00 07 80 02 00 02 | 80 03 00 03 80 04 00 05 80 0e 01 00 03 00 00 24 | 0b 01 00 00 80 0b 00 01 80 0c 0e 10 80 01 00 07 | 80 02 00 02 80 03 00 03 80 04 00 05 80 0e 00 80 | 03 00 00 20 0c 01 00 00 80 0b 00 01 80 0c 0e 10 | 80 01 00 05 80 02 00 04 80 03 00 03 80 04 00 0e | 03 00 00 20 0d 01 00 00 80 0b 00 01 80 0c 0e 10 | 80 01 00 05 80 02 00 06 80 03 00 03 80 04 00 0e | 03 00 00 20 0e 01 00 00 80 0b 00 01 80 0c 0e 10 | 80 01 00 05 80 02 00 02 80 03 00 03 80 04 00 0e | 03 00 00 20 0f 01 00 00 80 0b 00 01 80 0c 0e 10 | 80 01 00 05 80 02 00 04 80 03 00 03 80 04 00 05 | 03 00 00 20 10 01 00 00 80 0b 00 01 80 0c 0e 10 | 80 01 00 05 80 02 00 06 80 03 00 03 80 04 00 05 | 00 00 00 20 11 01 00 00 80 0b 00 01 80 0c 0e 10 | 80 01 00 05 80 02 00 02 80 03 00 03 80 04 00 05 | hmac PRF sha2_256 update data-bytes@0x56080ae853d0 (length 8) | 02 00 00 00 65 61 73 74 | hmac PRF sha2_256 final-bytes@0x7fff508fec80 (length 32) | f3 ff 55 96 ed fb 62 89 e2 fb 17 ba 40 30 df 3f | 29 8c 37 7b 4c 2d 3c 6c fa 35 40 e7 66 b0 ef 0d | required RSA CA is '%any' | checking RSA keyid '@east' for match with '@east' | RSA key issuer CA is '%any' | NSS RSA verify: decrypted sig: siBuffer: fffffff3 ffffffff 55 ffffff96 ffffffed fffffffb 62 ffffff89 ffffffe2 fffffffb 17 ffffffba 40 30 ffffffdf 3f 29 ffffff8c 37 7b 4c 2d 3c 6c fffffffa 35 40 ffffffe7 66 ffffffb0 ffffffef 0d | NSS RSA verify: hash value: | f3 ff 55 96 ed fb 62 89 e2 fb 17 ba 40 30 df 3f | 29 8c 37 7b 4c 2d 3c 6c fa 35 40 e7 66 b0 ef 0d | RSA Signature verified | an RSA Sig check passed with *AQO9bJbr3 [preloaded keys] "westnets-eastnet/2x0" #1: Authenticated using RSA | authentication succeeded | FOR_EACH_CONNECTION_... in ISAKMP_SA_established | complete v1 state transition with STF_OK | [RE]START processing: state #1 connection "westnets-eastnet/2x0" from 192.1.2.23:500 (in complete_v1_state_transition() at ikev1.c:2649) | #1 is idle | doing_xauth:no, t_xauth_client_done:no | IKEv1: transition from state STATE_MAIN_I3 to state STATE_MAIN_I4 | parent state #1: MAIN_I3(open IKE SA) => MAIN_I4(established IKE SA) | event_already_set, deleting event | state #1 requesting EVENT_RETRANSMIT to be deleted | #1 STATE_MAIN_I4: retransmits: cleared | libevent_free: release ptr-libevent@0x56080af02140 | free_event_entry: release EVENT_RETRANSMIT-pe@0x56080af008f0 | !event_already_set at reschedule | event_schedule: new EVENT_SA_REPLACE-pe@0x56080af008f0 | inserting event EVENT_SA_REPLACE, timeout in 2607 seconds for #1 | libevent_malloc: new ptr-libevent@0x56080af02140 size 128 | pstats #1 ikev1.isakmp established "westnets-eastnet/2x0" #1: STATE_MAIN_I4: ISAKMP SA established {auth=RSA_SIG cipher=AES_CBC_256 integ=HMAC_SHA2_256 group=MODP2048} | DPD: dpd_init() called on ISAKMP SA | DPD: Peer supports Dead Peer Detection | DPD: not initializing DPD because DPD is disabled locally | modecfg pull: noquirk policy:push not-client | phase 1 is done, looking for phase 2 to unpend | unpending state #1 | creating state object #2 at 0x56080af035b0 | State DB: adding IKEv1 state #2 in UNDEFINED | pstats #2 ikev1.ipsec started | duplicating state object #1 "westnets-eastnet/2x0" as #2 for IPSEC SA | #2 setting local endpoint to 192.1.2.45:500 from #1.st_localport (in duplicate_state() at state.c:1481) | duplicate_state: reference st_skeyid_nss-key@0x56080aeed4f0 | duplicate_state: reference st_skey_d_nss-key@0x56080aeea0c0 | duplicate_state: reference st_skey_ai_nss-key@0x56080aee2f70 | duplicate_state: reference st_skey_ar_nss-key@NULL | duplicate_state: reference st_skey_ei_nss-key@0x56080aef0b10 | duplicate_state: reference st_skey_er_nss-key@NULL | duplicate_state: reference st_skey_pi_nss-key@NULL | duplicate_state: reference st_skey_pr_nss-key@NULL | duplicate_state: reference st_enc_key_nss-key@0x56080aee47f0 | duplicate_state: reference st_sk_d_no_ppk-key@NULL | duplicate_state: reference st_sk_pi_no_ppk-key@NULL | duplicate_state: reference st_sk_pr_no_ppk-key@NULL | in connection_discard for connection westnets-eastnet/2x0 | suspend processing: state #1 connection "westnets-eastnet/2x0" from 192.1.2.23:500 (in quick_outI1() at ikev1_quick.c:683) | start processing: state #2 connection "westnets-eastnet/1x0" from 192.1.2.23:500 (in quick_outI1() at ikev1_quick.c:683) | child state #2: UNDEFINED(ignore) => QUICK_I1(established CHILD SA) "westnets-eastnet/1x0" #2: initiating Quick Mode RSASIG+ENCRYPT+TUNNEL+PFS+UP+IKEV1_ALLOW+SAREF_TRACK+IKE_FRAG_ALLOW+ESN_NO {using isakmp#1 msgid:d9d208cd proposal=defaults pfsgroup=MODP2048} | adding quick_outI1 KE work-order 3 for state #2 | event_schedule: new EVENT_CRYPTO_TIMEOUT-pe@0x56080aeffa20 | inserting event EVENT_CRYPTO_TIMEOUT, timeout in 60 seconds for #2 | libevent_malloc: new ptr-libevent@0x7f83e0004f00 size 128 | crypto helper 1 resuming | crypto helper 1 starting work-order 3 for state #2 | crypto helper 1 doing build KE and nonce (quick_outI1 KE); request ID 3 | NSS: Value of Prime: | ff ff ff ff ff ff ff ff c9 0f da a2 21 68 c2 34 | c4 c6 62 8b 80 dc 1c d1 29 02 4e 08 8a 67 cc 74 | 02 0b be a6 3b 13 9b 22 51 4a 08 79 8e 34 04 dd | ef 95 19 b3 cd 3a 43 1b 30 2b 0a 6d f2 5f 14 37 | 4f e1 35 6d 6d 51 c2 45 e4 85 b5 76 62 5e 7e c6 | f4 4c 42 e9 a6 37 ed 6b 0b ff 5c b6 f4 06 b7 ed | ee 38 6b fb 5a 89 9f a5 ae 9f 24 11 7c 4b 1f e6 | 49 28 66 51 ec e4 5b 3d c2 00 7c b8 a1 63 bf 05 | 98 da 48 36 1c 55 d3 9a 69 16 3f a8 fd 24 cf 5f | 83 65 5d 23 dc a3 ad 96 1c 62 f3 56 20 85 52 bb | 9e d5 29 07 70 96 96 6d 67 0c 35 4e 4a bc 98 04 | f1 74 6c 08 ca 18 21 7c 32 90 5e 46 2e 36 ce 3b | e3 9e 77 2c 18 0e 86 03 9b 27 83 a2 ec 07 a2 8f | b5 c5 5d f0 6f 4c 52 c9 de 2b cb f6 95 58 17 18 | 39 95 49 7c ea 95 6a e5 15 d2 26 18 98 fa 05 10 | 15 72 8e 5a 8a ac aa 68 ff ff ff ff ff ff ff ff | NSS: Value of base: 02 | DH secret MODP2048@0x7f83e4000d60: created | NSS: Local DH MODP2048 secret (pointer): 0x7f83e4000d60 | NSS: Public DH wire value: | 0d 1c c4 f0 0b 4c 7b f6 8c 93 b0 92 a9 e9 a6 12 | b4 07 db 0a 93 bb 12 09 1b 57 84 52 64 b5 d7 4b | 41 b4 b0 a9 97 18 a8 1a 01 5b 14 45 07 16 94 0e | ed 75 c7 df d3 90 87 fc 70 07 3d 90 9c 90 8a 50 | da 0a f3 3f 61 d1 f1 06 36 46 83 15 d6 27 cf 4a | 05 06 9c f1 6b 26 e6 cc ef 65 d9 f2 c5 c4 34 a8 | d6 e1 3b 75 92 23 f5 c3 b6 cd e1 6d 2f a0 1a c9 | 75 f5 e4 d0 32 bf 8c 27 5d cc c7 35 33 4a af 26 | 69 4e c9 d2 b4 93 f9 7e 31 6d 3d 1f 0e e7 ba 59 | f1 87 54 4c 18 70 fe 0a ae 1f 9c ac fa 84 a3 75 | 24 b7 81 54 f7 e4 ea 69 ee 16 fd 11 cb ea 90 14 | 95 65 72 bb 20 87 ce 1b 6f e2 2d b5 83 a5 09 af | ad 16 bf 37 6a 89 1f 98 eb 9c 5e 05 8e 97 23 8b | b6 83 3a 1f ac 7e 1b 0a 07 6d 84 62 95 2b 8e 46 | 6c 61 04 9b 73 57 ad 55 0a 36 45 08 29 f9 02 94 | 89 25 da 6e ac 29 a9 fa 20 0f 2f 04 19 99 cd a3 | Generated nonce: b7 87 a8 1c 7e 8e 08 46 c7 91 ba c0 44 1f 0b b0 | Generated nonce: 6e 66 81 b9 55 b3 5a 24 a0 e8 84 20 92 87 00 ec | crypto helper 1 finished build KE and nonce (quick_outI1 KE); request ID 3 time elapsed 0.001169 seconds | crypto helper 1 sending results from work-order 3 for state #2 to event queue | scheduling resume sending helper answer for #2 | libevent_malloc: new ptr-libevent@0x7f83e4007fa0 size 128 | libevent_realloc: release ptr-libevent@0x56080aee16f0 | libevent_realloc: new ptr-libevent@0x56080aeffb20 size 128 | crypto helper 1 waiting (nothing to do) | stop processing: state #2 connection "westnets-eastnet/1x0" from 192.1.2.23:500 (in quick_outI1() at ikev1_quick.c:762) | resume processing: state #1 connection "westnets-eastnet/2x0" from 192.1.2.23:500 (in quick_outI1() at ikev1_quick.c:762) | unqueuing pending Quick Mode with 192.1.2.23 "westnets-eastnet/1x0" | removing pending policy for no connection {0x56080ae88ba0} | creating state object #3 at 0x56080af0be60 | State DB: adding IKEv1 state #3 in UNDEFINED | pstats #3 ikev1.ipsec started | duplicating state object #1 "westnets-eastnet/2x0" as #3 for IPSEC SA | #3 setting local endpoint to 192.1.2.45:500 from #1.st_localport (in duplicate_state() at state.c:1481) | duplicate_state: reference st_skeyid_nss-key@0x56080aeed4f0 | duplicate_state: reference st_skey_d_nss-key@0x56080aeea0c0 | duplicate_state: reference st_skey_ai_nss-key@0x56080aee2f70 | duplicate_state: reference st_skey_ar_nss-key@NULL | duplicate_state: reference st_skey_ei_nss-key@0x56080aef0b10 | duplicate_state: reference st_skey_er_nss-key@NULL | duplicate_state: reference st_skey_pi_nss-key@NULL | duplicate_state: reference st_skey_pr_nss-key@NULL | duplicate_state: reference st_enc_key_nss-key@0x56080aee47f0 | duplicate_state: reference st_sk_d_no_ppk-key@NULL | duplicate_state: reference st_sk_pi_no_ppk-key@NULL | duplicate_state: reference st_sk_pr_no_ppk-key@NULL | suspend processing: state #1 connection "westnets-eastnet/2x0" from 192.1.2.23:500 (in quick_outI1() at ikev1_quick.c:683) | start processing: state #3 connection "westnets-eastnet/2x0" from 192.1.2.23:500 (in quick_outI1() at ikev1_quick.c:683) | child state #3: UNDEFINED(ignore) => QUICK_I1(established CHILD SA) "westnets-eastnet/2x0" #3: initiating Quick Mode RSASIG+ENCRYPT+TUNNEL+PFS+UP+IKEV1_ALLOW+SAREF_TRACK+IKE_FRAG_ALLOW+ESN_NO {using isakmp#1 msgid:ce09ca89 proposal=defaults pfsgroup=MODP2048} | adding quick_outI1 KE work-order 4 for state #3 | event_schedule: new EVENT_CRYPTO_TIMEOUT-pe@0x56080af00a30 | inserting event EVENT_CRYPTO_TIMEOUT, timeout in 60 seconds for #3 | libevent_malloc: new ptr-libevent@0x56080af00da0 size 128 | crypto helper 3 resuming | crypto helper 3 starting work-order 4 for state #3 | crypto helper 3 doing build KE and nonce (quick_outI1 KE); request ID 4 | NSS: Value of Prime: | ff ff ff ff ff ff ff ff c9 0f da a2 21 68 c2 34 | c4 c6 62 8b 80 dc 1c d1 29 02 4e 08 8a 67 cc 74 | 02 0b be a6 3b 13 9b 22 51 4a 08 79 8e 34 04 dd | ef 95 19 b3 cd 3a 43 1b 30 2b 0a 6d f2 5f 14 37 | 4f e1 35 6d 6d 51 c2 45 e4 85 b5 76 62 5e 7e c6 | f4 4c 42 e9 a6 37 ed 6b 0b ff 5c b6 f4 06 b7 ed | ee 38 6b fb 5a 89 9f a5 ae 9f 24 11 7c 4b 1f e6 | 49 28 66 51 ec e4 5b 3d c2 00 7c b8 a1 63 bf 05 | 98 da 48 36 1c 55 d3 9a 69 16 3f a8 fd 24 cf 5f | 83 65 5d 23 dc a3 ad 96 1c 62 f3 56 20 85 52 bb | 9e d5 29 07 70 96 96 6d 67 0c 35 4e 4a bc 98 04 | f1 74 6c 08 ca 18 21 7c 32 90 5e 46 2e 36 ce 3b | e3 9e 77 2c 18 0e 86 03 9b 27 83 a2 ec 07 a2 8f | b5 c5 5d f0 6f 4c 52 c9 de 2b cb f6 95 58 17 18 | 39 95 49 7c ea 95 6a e5 15 d2 26 18 98 fa 05 10 | 15 72 8e 5a 8a ac aa 68 ff ff ff ff ff ff ff ff | NSS: Value of base: 02 | DH secret MODP2048@0x7f83d8000d60: created | NSS: Local DH MODP2048 secret (pointer): 0x7f83d8000d60 | NSS: Public DH wire value: | ea ec e3 9c e7 9e 02 b8 7a 15 6d 12 5d 9e 42 b5 | 79 05 31 96 27 70 a6 a4 d4 b2 95 44 cb fc 50 72 | 7c 79 54 a9 0a b1 b7 26 7e 68 3f 8a 21 41 9e 99 | a5 d2 12 5c 6e bd 4c f0 d0 79 21 f3 08 e6 56 51 | e3 49 ed b1 51 6f 8a e3 29 48 6c ea 24 da 42 f5 | 5e 05 5e 38 69 aa 13 58 fe 4b 49 85 97 87 41 92 | 66 75 46 60 29 d9 88 3b 28 08 9a 8b ae e6 39 b0 | 21 3b 3b 2b 4e e6 33 d2 e6 01 b6 76 b0 6e a8 08 | ca 43 f1 60 fa 8e 2e e2 fb db 12 5a 52 52 d1 cb | e8 57 bc 89 4d 0b e6 89 86 c2 69 a2 92 f5 ef 91 | c6 9d ac 87 4c 07 fd 0e c1 79 fe b4 aa e5 4c 24 | 74 fb b4 eb 51 a0 52 ce f4 fd 22 a6 32 33 17 dd | 55 f1 47 64 f5 4d 04 94 85 5e 47 2e 90 b8 9d 70 | 97 6a 80 6c ad a4 c1 af 8e a0 61 8e 24 b8 ad 13 | 4c a0 f7 83 5a 07 52 87 63 01 96 56 63 4c 32 51 | dc d1 ea e4 e1 a6 72 17 ad 88 73 e4 32 b5 94 b3 | Generated nonce: e1 12 49 b3 fd 77 92 7e 73 9a a9 b4 ea 9d 0d 2a | Generated nonce: 8d 04 cc d5 e8 85 37 a6 44 2d 0f 8c 5a ad 96 4e | crypto helper 3 finished build KE and nonce (quick_outI1 KE); request ID 4 time elapsed 0.000907 seconds | crypto helper 3 sending results from work-order 4 for state #3 to event queue | scheduling resume sending helper answer for #3 | libevent_malloc: new ptr-libevent@0x7f83d8009640 size 128 | crypto helper 3 waiting (nothing to do) | stop processing: state #3 connection "westnets-eastnet/2x0" from 192.1.2.23:500 (in quick_outI1() at ikev1_quick.c:762) | resume processing: state #1 connection "westnets-eastnet/2x0" from 192.1.2.23:500 (in quick_outI1() at ikev1_quick.c:762) | unqueuing pending Quick Mode with 192.1.2.23 "westnets-eastnet/2x0" | removing pending policy for no connection {0x56080ae87210} | close_any(fd@26) (in release_whack() at state.c:654) | stop processing: from 192.1.2.23:500 (BACKGROUND) (in process_md() at demux.c:380) | stop processing: state #1 connection "westnets-eastnet/2x0" from 192.1.2.23:500 (in process_md() at demux.c:382) | processing: STOP connection NULL (in process_md() at demux.c:383) | processing resume sending helper answer for #2 | start processing: state #2 connection "westnets-eastnet/1x0" from 192.1.2.23:500 (in resume_handler() at server.c:797) | crypto helper 1 replies to request ID 3 | calling continuation function 0x56080990f630 | quick_outI1_continue for #2: calculated ke+nonce, sending I1 | **emit ISAKMP Message: | initiator cookie: | 3c e4 38 3f ed 34 7c e6 | responder cookie: | 29 82 ac 69 b5 22 4f 63 | next payload type: ISAKMP_NEXT_NONE (0x0) | ISAKMP version: ISAKMP Version 1.0 (rfc2407) (0x10) | exchange type: ISAKMP_XCHG_QUICK (0x20) | flags: ISAKMP_FLAG_v1_ENCRYPTION (0x1) | Message ID: 3654420685 (0xd9d208cd) | next payload chain: saving message location 'ISAKMP Message'.'next payload type' | ***emit ISAKMP Hash Payload: | next payload type: ISAKMP_NEXT_NONE (0x0) | next payload chain: setting previous 'ISAKMP Message'.'next payload type' to current ISAKMP Hash Payload (8:ISAKMP_NEXT_HASH) | next payload chain: saving location 'ISAKMP Hash Payload'.'next payload type' in 'reply packet' | emitting 32 zero bytes of HASH DATA into ISAKMP Hash Payload | emitting length of ISAKMP Hash Payload: 36 | emitting quick defaults using policy none | empty esp_info, returning defaults for ENCRYPT | ***emit ISAKMP Security Association Payload: | next payload type: ISAKMP_NEXT_NONCE (0xa) | DOI: ISAKMP_DOI_IPSEC (0x1) | next payload chain: ignoring supplied 'ISAKMP Security Association Payload'.'next payload type' value 10:ISAKMP_NEXT_NONCE | next payload chain: setting previous 'ISAKMP Hash Payload'.'next payload type' to current ISAKMP Security Association Payload (1:ISAKMP_NEXT_SA) | next payload chain: saving location 'ISAKMP Security Association Payload'.'next payload type' in 'reply packet' | ****emit IPsec DOI SIT: | IPsec DOI SIT: SIT_IDENTITY_ONLY (0x1) | ikev1_out_sa pcn: 0 has 1 valid proposals | ikev1_out_sa pcn: 0 pn: 0<1 valid_count: 1 trans_cnt: 2 | ****emit ISAKMP Proposal Payload: | next payload type: ISAKMP_NEXT_NONE (0x0) | proposal number: 0 (0x0) | protocol ID: PROTO_IPSEC_ESP (0x3) | SPI size: 4 (0x4) | number of transforms: 2 (0x2) | last substructure: saving location 'ISAKMP Security Association Payload'.'ISAKMP Proposal Payload'.'next payload type' | netlink_get_spi: allocated 0x66bd1d79 for esp.0@192.1.2.45 | emitting 4 raw bytes of SPI into ISAKMP Proposal Payload | SPI 66 bd 1d 79 | *****emit ISAKMP Transform Payload (ESP): | next payload type: ISAKMP_NEXT_T (0x3) | ESP transform number: 0 (0x0) | ESP transform ID: ESP_AES (0xc) | last substructure: saving location 'ISAKMP Proposal Payload'.'ISAKMP Transform Payload (ESP)'.'next payload type' | ******emit ISAKMP IPsec DOI attribute: | af+type: AF+GROUP_DESCRIPTION (0x8003) | length/value: 14 (0xe) | [14 is OAKLEY_GROUP_MODP2048] | ******emit ISAKMP IPsec DOI attribute: | af+type: AF+ENCAPSULATION_MODE (0x8004) | length/value: 1 (0x1) | [1 is ENCAPSULATION_MODE_TUNNEL] | ******emit ISAKMP IPsec DOI attribute: | af+type: AF+SA_LIFE_TYPE (0x8001) | length/value: 1 (0x1) | [1 is SA_LIFE_TYPE_SECONDS] | ******emit ISAKMP IPsec DOI attribute: | af+type: AF+SA_LIFE_DURATION (variable length) (0x8002) | length/value: 28800 (0x7080) | ******emit ISAKMP IPsec DOI attribute: | af+type: AF+AUTH_ALGORITHM (0x8005) | length/value: 2 (0x2) | [2 is AUTH_ALGORITHM_HMAC_SHA1] | ******emit ISAKMP IPsec DOI attribute: | af+type: AF+KEY_LENGTH (0x8006) | length/value: 128 (0x80) | emitting length of ISAKMP Transform Payload (ESP): 32 | *****emit ISAKMP Transform Payload (ESP): | next payload type: ISAKMP_NEXT_NONE (0x0) | ESP transform number: 1 (0x1) | ESP transform ID: ESP_3DES (0x3) | last substructure: checking 'ISAKMP Proposal Payload'.'ISAKMP Transform Payload (ESP)'.'next payload type' is ISAKMP_NEXT_T (0x3) | last substructure: saving location 'ISAKMP Proposal Payload'.'ISAKMP Transform Payload (ESP)'.'next payload type' | ******emit ISAKMP IPsec DOI attribute: | af+type: AF+GROUP_DESCRIPTION (0x8003) | length/value: 14 (0xe) | [14 is OAKLEY_GROUP_MODP2048] | ******emit ISAKMP IPsec DOI attribute: | af+type: AF+ENCAPSULATION_MODE (0x8004) | length/value: 1 (0x1) | [1 is ENCAPSULATION_MODE_TUNNEL] | ******emit ISAKMP IPsec DOI attribute: | af+type: AF+SA_LIFE_TYPE (0x8001) | length/value: 1 (0x1) | [1 is SA_LIFE_TYPE_SECONDS] | ******emit ISAKMP IPsec DOI attribute: | af+type: AF+SA_LIFE_DURATION (variable length) (0x8002) | length/value: 28800 (0x7080) | ******emit ISAKMP IPsec DOI attribute: | af+type: AF+AUTH_ALGORITHM (0x8005) | length/value: 2 (0x2) | [2 is AUTH_ALGORITHM_HMAC_SHA1] | emitting length of ISAKMP Transform Payload (ESP): 28 | emitting length of ISAKMP Proposal Payload: 72 | last substructure: checking 'ISAKMP Proposal Payload'.'ISAKMP Transform Payload (ESP)'.'next payload type' is 0 | emitting length of ISAKMP Security Association Payload: 84 | last substructure: checking 'ISAKMP Security Association Payload'.'ISAKMP Proposal Payload'.'next payload type' is 0 | ***emit ISAKMP Nonce Payload: | next payload type: ISAKMP_NEXT_KE (0x4) | next payload chain: ignoring supplied 'ISAKMP Nonce Payload'.'next payload type' value 4:ISAKMP_NEXT_KE | next payload chain: setting previous 'ISAKMP Security Association Payload'.'next payload type' to current ISAKMP Nonce Payload (10:ISAKMP_NEXT_NONCE) | next payload chain: saving location 'ISAKMP Nonce Payload'.'next payload type' in 'reply packet' | emitting 32 raw bytes of Ni into ISAKMP Nonce Payload | Ni b7 87 a8 1c 7e 8e 08 46 c7 91 ba c0 44 1f 0b b0 | Ni 6e 66 81 b9 55 b3 5a 24 a0 e8 84 20 92 87 00 ec | emitting length of ISAKMP Nonce Payload: 36 | wire (crypto helper) group MODP2048 and state group MODP2048 match | DH secret MODP2048@0x7f83e4000d60: transferring ownership from helper KE to state #2 | ***emit ISAKMP Key Exchange Payload: | next payload type: ISAKMP_NEXT_ID (0x5) | next payload chain: ignoring supplied 'ISAKMP Key Exchange Payload'.'next payload type' value 5:ISAKMP_NEXT_ID | next payload chain: setting previous 'ISAKMP Nonce Payload'.'next payload type' to current ISAKMP Key Exchange Payload (4:ISAKMP_NEXT_KE) | next payload chain: saving location 'ISAKMP Key Exchange Payload'.'next payload type' in 'reply packet' | emitting 256 raw bytes of keyex value into ISAKMP Key Exchange Payload | keyex value 0d 1c c4 f0 0b 4c 7b f6 8c 93 b0 92 a9 e9 a6 12 | keyex value b4 07 db 0a 93 bb 12 09 1b 57 84 52 64 b5 d7 4b | keyex value 41 b4 b0 a9 97 18 a8 1a 01 5b 14 45 07 16 94 0e | keyex value ed 75 c7 df d3 90 87 fc 70 07 3d 90 9c 90 8a 50 | keyex value da 0a f3 3f 61 d1 f1 06 36 46 83 15 d6 27 cf 4a | keyex value 05 06 9c f1 6b 26 e6 cc ef 65 d9 f2 c5 c4 34 a8 | keyex value d6 e1 3b 75 92 23 f5 c3 b6 cd e1 6d 2f a0 1a c9 | keyex value 75 f5 e4 d0 32 bf 8c 27 5d cc c7 35 33 4a af 26 | keyex value 69 4e c9 d2 b4 93 f9 7e 31 6d 3d 1f 0e e7 ba 59 | keyex value f1 87 54 4c 18 70 fe 0a ae 1f 9c ac fa 84 a3 75 | keyex value 24 b7 81 54 f7 e4 ea 69 ee 16 fd 11 cb ea 90 14 | keyex value 95 65 72 bb 20 87 ce 1b 6f e2 2d b5 83 a5 09 af | keyex value ad 16 bf 37 6a 89 1f 98 eb 9c 5e 05 8e 97 23 8b | keyex value b6 83 3a 1f ac 7e 1b 0a 07 6d 84 62 95 2b 8e 46 | keyex value 6c 61 04 9b 73 57 ad 55 0a 36 45 08 29 f9 02 94 | keyex value 89 25 da 6e ac 29 a9 fa 20 0f 2f 04 19 99 cd a3 | emitting length of ISAKMP Key Exchange Payload: 260 | ***emit ISAKMP Identification Payload (IPsec DOI): | next payload type: ISAKMP_NEXT_ID (0x5) | ID type: ID_IPV4_ADDR_SUBNET (0x4) | Protocol ID: 0 (0x0) | port: 0 (0x0) | next payload chain: ignoring supplied 'ISAKMP Identification Payload (IPsec DOI)'.'next payload type' value 5:ISAKMP_NEXT_ID | next payload chain: setting previous 'ISAKMP Key Exchange Payload'.'next payload type' to current ISAKMP Identification Payload (IPsec DOI) (5:ISAKMP_NEXT_ID) | next payload chain: saving location 'ISAKMP Identification Payload (IPsec DOI)'.'next payload type' in 'reply packet' | emitting 4 raw bytes of client network into ISAKMP Identification Payload (IPsec DOI) | client network c0 00 01 00 | emitting 4 raw bytes of client mask into ISAKMP Identification Payload (IPsec DOI) | client mask ff ff ff 00 | emitting length of ISAKMP Identification Payload (IPsec DOI): 16 | ***emit ISAKMP Identification Payload (IPsec DOI): | next payload type: ISAKMP_NEXT_NONE (0x0) | ID type: ID_IPV4_ADDR_SUBNET (0x4) | Protocol ID: 0 (0x0) | port: 0 (0x0) | next payload chain: setting previous 'ISAKMP Identification Payload (IPsec DOI)'.'next payload type' to current ISAKMP Identification Payload (IPsec DOI) (5:ISAKMP_NEXT_ID) | next payload chain: saving location 'ISAKMP Identification Payload (IPsec DOI)'.'next payload type' in 'reply packet' | emitting 4 raw bytes of client network into ISAKMP Identification Payload (IPsec DOI) | client network c0 00 02 00 | emitting 4 raw bytes of client mask into ISAKMP Identification Payload (IPsec DOI) | client mask ff ff ff 00 | emitting length of ISAKMP Identification Payload (IPsec DOI): 16 | HASH(1) PRF sha2_256 init SKEYID_a-key@0x56080aee2f70 (size 32) | HASH(1): SKEYID_a-key@0x56080aee2f70 (32-bytes, EXTRACT_KEY_FROM_KEY) | key-offset: 0, key-size: 32 | EXTRACT_KEY_FROM_KEY: | target: SHA256_HMAC | flags: SIGN | key_size: 32-bytes | base: base-key@0x56080aee2f70 (32-bytes, EXTRACT_KEY_FROM_KEY) | operation: FLAGS_ONLY | params: 8-bytes@0x7fff508fe858 | result: clone-key@0x7f83e8006900 (32-bytes, SHA256_HMAC) | HASH(1) prf: created sha2_256 context 0x56080aee6220 from SKEYID_a-key@0x7f83e8006900 | HASH(1) prf: begin sha2_256 with context 0x56080aee6220 from SKEYID_a-key@0x7f83e8006900 | HASH(1): release clone-key@0x7f83e8006900 | HASH(1) PRF sha2_256 crypt-prf@0x56080af01090 | HASH(1) PRF sha2_256 update M-ID-bytes@0x7fff508fe93c (length 4) | d9 d2 08 cd | HASH(1) PRF sha2_256 update payload-bytes@0x560809a0e980 (length 412) | 0a 00 00 54 00 00 00 01 00 00 00 01 00 00 00 48 | 00 03 04 02 66 bd 1d 79 03 00 00 20 00 0c 00 00 | 80 03 00 0e 80 04 00 01 80 01 00 01 80 02 70 80 | 80 05 00 02 80 06 00 80 00 00 00 1c 01 03 00 00 | 80 03 00 0e 80 04 00 01 80 01 00 01 80 02 70 80 | 80 05 00 02 04 00 00 24 b7 87 a8 1c 7e 8e 08 46 | c7 91 ba c0 44 1f 0b b0 6e 66 81 b9 55 b3 5a 24 | a0 e8 84 20 92 87 00 ec 05 00 01 04 0d 1c c4 f0 | 0b 4c 7b f6 8c 93 b0 92 a9 e9 a6 12 b4 07 db 0a | 93 bb 12 09 1b 57 84 52 64 b5 d7 4b 41 b4 b0 a9 | 97 18 a8 1a 01 5b 14 45 07 16 94 0e ed 75 c7 df | d3 90 87 fc 70 07 3d 90 9c 90 8a 50 da 0a f3 3f | 61 d1 f1 06 36 46 83 15 d6 27 cf 4a 05 06 9c f1 | 6b 26 e6 cc ef 65 d9 f2 c5 c4 34 a8 d6 e1 3b 75 | 92 23 f5 c3 b6 cd e1 6d 2f a0 1a c9 75 f5 e4 d0 | 32 bf 8c 27 5d cc c7 35 33 4a af 26 69 4e c9 d2 | b4 93 f9 7e 31 6d 3d 1f 0e e7 ba 59 f1 87 54 4c | 18 70 fe 0a ae 1f 9c ac fa 84 a3 75 24 b7 81 54 | f7 e4 ea 69 ee 16 fd 11 cb ea 90 14 95 65 72 bb | 20 87 ce 1b 6f e2 2d b5 83 a5 09 af ad 16 bf 37 | 6a 89 1f 98 eb 9c 5e 05 8e 97 23 8b b6 83 3a 1f | ac 7e 1b 0a 07 6d 84 62 95 2b 8e 46 6c 61 04 9b | 73 57 ad 55 0a 36 45 08 29 f9 02 94 89 25 da 6e | ac 29 a9 fa 20 0f 2f 04 19 99 cd a3 05 00 00 10 | 04 00 00 00 c0 00 01 00 ff ff ff 00 00 00 00 10 | 04 00 00 00 c0 00 02 00 ff ff ff 00 | HASH(1) PRF sha2_256 final-bytes@0x560809a0e960 (length 32) | 4c 29 43 53 68 58 45 ba 95 da bd 58 71 56 4d 09 | 8a dd 42 0d 99 62 fb 53 41 1c 67 57 aa c1 33 31 | outI1 HASH(1): | 4c 29 43 53 68 58 45 ba 95 da bd 58 71 56 4d 09 | 8a dd 42 0d 99 62 fb 53 41 1c 67 57 aa c1 33 31 | last Phase 1 IV: c8 ea e9 b3 51 0b ea 24 90 87 5d b9 c1 a4 ec 95 | current Phase 1 IV: c8 ea e9 b3 51 0b ea 24 90 87 5d b9 c1 a4 ec 95 | Phase 2 IV hash sha2_256 init | Phase 2 IV hash sha2_256 digest PH1_IV-bytes@0x56080af00280 (length 16) | c8 ea e9 b3 51 0b ea 24 90 87 5d b9 c1 a4 ec 95 | Phase 2 IV hash sha2_256 digest MSGID-bytes@0x7fff508fe94c (length 4) | d9 d2 08 cd | Phase 2 IV hash sha2_256 final bytes@0x56080af00200 (length 32) | 99 e0 b6 21 46 5b ca 6c c4 a5 56 1b 33 2d a2 cf | 35 c5 d1 75 37 7a df 91 95 2d c2 e2 89 4e 09 c4 | encrypting: 01 00 00 24 4c 29 43 53 68 58 45 ba 95 da bd 58 | encrypting: 71 56 4d 09 8a dd 42 0d 99 62 fb 53 41 1c 67 57 | encrypting: aa c1 33 31 0a 00 00 54 00 00 00 01 00 00 00 01 | encrypting: 00 00 00 48 00 03 04 02 66 bd 1d 79 03 00 00 20 | encrypting: 00 0c 00 00 80 03 00 0e 80 04 00 01 80 01 00 01 | encrypting: 80 02 70 80 80 05 00 02 80 06 00 80 00 00 00 1c | encrypting: 01 03 00 00 80 03 00 0e 80 04 00 01 80 01 00 01 | encrypting: 80 02 70 80 80 05 00 02 04 00 00 24 b7 87 a8 1c | encrypting: 7e 8e 08 46 c7 91 ba c0 44 1f 0b b0 6e 66 81 b9 | encrypting: 55 b3 5a 24 a0 e8 84 20 92 87 00 ec 05 00 01 04 | encrypting: 0d 1c c4 f0 0b 4c 7b f6 8c 93 b0 92 a9 e9 a6 12 | encrypting: b4 07 db 0a 93 bb 12 09 1b 57 84 52 64 b5 d7 4b | encrypting: 41 b4 b0 a9 97 18 a8 1a 01 5b 14 45 07 16 94 0e | encrypting: ed 75 c7 df d3 90 87 fc 70 07 3d 90 9c 90 8a 50 | encrypting: da 0a f3 3f 61 d1 f1 06 36 46 83 15 d6 27 cf 4a | encrypting: 05 06 9c f1 6b 26 e6 cc ef 65 d9 f2 c5 c4 34 a8 | encrypting: d6 e1 3b 75 92 23 f5 c3 b6 cd e1 6d 2f a0 1a c9 | encrypting: 75 f5 e4 d0 32 bf 8c 27 5d cc c7 35 33 4a af 26 | encrypting: 69 4e c9 d2 b4 93 f9 7e 31 6d 3d 1f 0e e7 ba 59 | encrypting: f1 87 54 4c 18 70 fe 0a ae 1f 9c ac fa 84 a3 75 | encrypting: 24 b7 81 54 f7 e4 ea 69 ee 16 fd 11 cb ea 90 14 | encrypting: 95 65 72 bb 20 87 ce 1b 6f e2 2d b5 83 a5 09 af | encrypting: ad 16 bf 37 6a 89 1f 98 eb 9c 5e 05 8e 97 23 8b | encrypting: b6 83 3a 1f ac 7e 1b 0a 07 6d 84 62 95 2b 8e 46 | encrypting: 6c 61 04 9b 73 57 ad 55 0a 36 45 08 29 f9 02 94 | encrypting: 89 25 da 6e ac 29 a9 fa 20 0f 2f 04 19 99 cd a3 | encrypting: 05 00 00 10 04 00 00 00 c0 00 01 00 ff ff ff 00 | encrypting: 00 00 00 10 04 00 00 00 c0 00 02 00 ff ff ff 00 | IV: 99 e0 b6 21 46 5b ca 6c c4 a5 56 1b 33 2d a2 cf | IV: 35 c5 d1 75 37 7a df 91 95 2d c2 e2 89 4e 09 c4 | unpadded size is: 448 | encrypting 448 using AES_CBC | no IKEv1 message padding required | emitting length of ISAKMP Message: 476 | NSS ike_alg_nss_cbc: aes - enter | NSS ike_alg_nss_cbc: aes - exit | next IV: 3e 85 9b 77 57 4a 02 62 06 d7 eb ed e0 dd d2 dd | sending 476 bytes for reply packet from quick_outI1 through eth1 from 192.1.2.45:500 to 192.1.2.23:500 (using #2) | 3c e4 38 3f ed 34 7c e6 29 82 ac 69 b5 22 4f 63 | 08 10 20 01 d9 d2 08 cd 00 00 01 dc 1c da a1 fb | 54 5b 8f d9 47 6f 71 39 e1 86 b8 11 22 14 5e a2 | 69 5c df 47 d3 dc ed 58 8c 4c 5e 51 0d ec 95 6f | 36 66 76 9d 13 a9 8a 0e 43 b0 1a 0d 07 1c 0d e9 | f7 74 0d 76 52 5b 4a 56 22 8e 53 45 fe b5 59 a9 | 5a 94 c0 50 d6 64 5a f9 38 ff 68 e2 7c aa 4f 8b | a6 3a 74 6b d8 a1 b0 e5 ad ff ad 48 03 83 39 56 | 13 fd 44 ee 4c 26 e1 0e 6e 85 47 08 0f bf 5b 2c | 84 15 7a 88 d3 50 0e 6c 84 51 e7 43 35 dc 6f e7 | 95 65 36 1f 56 b7 54 55 9f 9e 44 cd b0 18 06 77 | ba 70 2c bb 11 ec 33 97 f5 16 9e 87 e3 9c 48 2f | 34 15 cf 77 4c a4 97 ba 22 c5 a5 47 15 cd 7e b7 | 38 7e 3b 63 34 c3 db 75 a8 c1 86 07 62 7d 5b a3 | c0 3a 1b 80 e1 ab 7c 7c 64 cc 3a 11 d0 9e 0d d4 | 76 42 85 56 fd a2 d0 27 33 e6 fa 9c d3 3b 94 db | 65 d7 91 80 b2 96 9f 22 3f e3 8b 1b 10 aa d8 61 | c2 8c d5 e4 e2 13 4b 9b 16 0b aa 02 41 f9 3d f2 | 44 11 cd 60 fc a4 4c a2 f7 8e 99 6f b9 dd 01 65 | 7e ca cd 85 03 bc b2 45 32 93 f7 51 b7 48 67 8d | 1c 88 94 51 45 19 06 be 65 77 1b 5d dd e5 c9 ed | 7b 80 5c 73 c5 e8 2c 00 cb 30 38 2a 80 ce 6c d3 | 66 9b 04 c0 34 42 16 61 c2 a8 b8 14 a8 85 66 4c | 0c 61 9a c6 e7 79 be b0 35 f9 92 6a c5 90 df 2e | d5 f0 35 5f 83 dd 55 4f 27 56 94 53 16 4c 9b 54 | c4 15 7b 8f 71 30 ba 92 4e 08 8c 85 2b c4 92 62 | f3 d1 0b b4 be 9e 87 a2 48 83 2d 13 03 42 14 a0 | 87 56 50 ac 12 d2 4e 4e 35 37 99 57 a4 6e d4 e5 | 2f 8c 27 23 e2 09 96 e4 18 7a b1 2b 3e 85 9b 77 | 57 4a 02 62 06 d7 eb ed e0 dd d2 dd | state #2 requesting EVENT_CRYPTO_TIMEOUT to be deleted | libevent_free: release ptr-libevent@0x7f83e0004f00 | free_event_entry: release EVENT_CRYPTO_TIMEOUT-pe@0x56080aeffa20 "westnets-eastnet/1x0" #2: IMPAIR: suppressing retransmits; scheduling timeout in 60 seconds | event_schedule: new EVENT_RETRANSMIT-pe@0x56080aeffa20 | inserting event EVENT_RETRANSMIT, timeout in 60 seconds for #2 | libevent_malloc: new ptr-libevent@0x7f83e0004f00 size 128 | #2 STATE_QUICK_I1: retransmits: first event in 60 seconds; timeout in 60 seconds; limit of 12 retransmits; current time is 50065.825004 | resume sending helper answer for #2 suppresed complete_v1_state_transition() | stop processing: state #2 connection "westnets-eastnet/1x0" from 192.1.2.23:500 (in resume_handler() at server.c:833) | libevent_free: release ptr-libevent@0x7f83e4007fa0 | processing resume sending helper answer for #3 | start processing: state #3 connection "westnets-eastnet/2x0" from 192.1.2.23:500 (in resume_handler() at server.c:797) | crypto helper 3 replies to request ID 4 | calling continuation function 0x56080990f630 | quick_outI1_continue for #3: calculated ke+nonce, sending I1 | **emit ISAKMP Message: | initiator cookie: | 3c e4 38 3f ed 34 7c e6 | responder cookie: | 29 82 ac 69 b5 22 4f 63 | next payload type: ISAKMP_NEXT_NONE (0x0) | ISAKMP version: ISAKMP Version 1.0 (rfc2407) (0x10) | exchange type: ISAKMP_XCHG_QUICK (0x20) | flags: ISAKMP_FLAG_v1_ENCRYPTION (0x1) | Message ID: 3456748169 (0xce09ca89) | next payload chain: saving message location 'ISAKMP Message'.'next payload type' | ***emit ISAKMP Hash Payload: | next payload type: ISAKMP_NEXT_NONE (0x0) | next payload chain: setting previous 'ISAKMP Message'.'next payload type' to current ISAKMP Hash Payload (8:ISAKMP_NEXT_HASH) | next payload chain: saving location 'ISAKMP Hash Payload'.'next payload type' in 'reply packet' | emitting 32 zero bytes of HASH DATA into ISAKMP Hash Payload | emitting length of ISAKMP Hash Payload: 36 | emitting quick defaults using policy none | empty esp_info, returning defaults for ENCRYPT | ***emit ISAKMP Security Association Payload: | next payload type: ISAKMP_NEXT_NONCE (0xa) | DOI: ISAKMP_DOI_IPSEC (0x1) | next payload chain: ignoring supplied 'ISAKMP Security Association Payload'.'next payload type' value 10:ISAKMP_NEXT_NONCE | next payload chain: setting previous 'ISAKMP Hash Payload'.'next payload type' to current ISAKMP Security Association Payload (1:ISAKMP_NEXT_SA) | next payload chain: saving location 'ISAKMP Security Association Payload'.'next payload type' in 'reply packet' | ****emit IPsec DOI SIT: | IPsec DOI SIT: SIT_IDENTITY_ONLY (0x1) | ikev1_out_sa pcn: 0 has 1 valid proposals | ikev1_out_sa pcn: 0 pn: 0<1 valid_count: 1 trans_cnt: 2 | ****emit ISAKMP Proposal Payload: | next payload type: ISAKMP_NEXT_NONE (0x0) | proposal number: 0 (0x0) | protocol ID: PROTO_IPSEC_ESP (0x3) | SPI size: 4 (0x4) | number of transforms: 2 (0x2) | last substructure: saving location 'ISAKMP Security Association Payload'.'ISAKMP Proposal Payload'.'next payload type' | netlink_get_spi: allocated 0x1d23a034 for esp.0@192.1.2.45 | emitting 4 raw bytes of SPI into ISAKMP Proposal Payload | SPI 1d 23 a0 34 | *****emit ISAKMP Transform Payload (ESP): | next payload type: ISAKMP_NEXT_T (0x3) | ESP transform number: 0 (0x0) | ESP transform ID: ESP_AES (0xc) | last substructure: saving location 'ISAKMP Proposal Payload'.'ISAKMP Transform Payload (ESP)'.'next payload type' | ******emit ISAKMP IPsec DOI attribute: | af+type: AF+GROUP_DESCRIPTION (0x8003) | length/value: 14 (0xe) | [14 is OAKLEY_GROUP_MODP2048] | ******emit ISAKMP IPsec DOI attribute: | af+type: AF+ENCAPSULATION_MODE (0x8004) | length/value: 1 (0x1) | [1 is ENCAPSULATION_MODE_TUNNEL] | ******emit ISAKMP IPsec DOI attribute: | af+type: AF+SA_LIFE_TYPE (0x8001) | length/value: 1 (0x1) | [1 is SA_LIFE_TYPE_SECONDS] | ******emit ISAKMP IPsec DOI attribute: | af+type: AF+SA_LIFE_DURATION (variable length) (0x8002) | length/value: 28800 (0x7080) | ******emit ISAKMP IPsec DOI attribute: | af+type: AF+AUTH_ALGORITHM (0x8005) | length/value: 2 (0x2) | [2 is AUTH_ALGORITHM_HMAC_SHA1] | ******emit ISAKMP IPsec DOI attribute: | af+type: AF+KEY_LENGTH (0x8006) | length/value: 128 (0x80) | emitting length of ISAKMP Transform Payload (ESP): 32 | *****emit ISAKMP Transform Payload (ESP): | next payload type: ISAKMP_NEXT_NONE (0x0) | ESP transform number: 1 (0x1) | ESP transform ID: ESP_3DES (0x3) | last substructure: checking 'ISAKMP Proposal Payload'.'ISAKMP Transform Payload (ESP)'.'next payload type' is ISAKMP_NEXT_T (0x3) | last substructure: saving location 'ISAKMP Proposal Payload'.'ISAKMP Transform Payload (ESP)'.'next payload type' | ******emit ISAKMP IPsec DOI attribute: | af+type: AF+GROUP_DESCRIPTION (0x8003) | length/value: 14 (0xe) | [14 is OAKLEY_GROUP_MODP2048] | ******emit ISAKMP IPsec DOI attribute: | af+type: AF+ENCAPSULATION_MODE (0x8004) | length/value: 1 (0x1) | [1 is ENCAPSULATION_MODE_TUNNEL] | ******emit ISAKMP IPsec DOI attribute: | af+type: AF+SA_LIFE_TYPE (0x8001) | length/value: 1 (0x1) | [1 is SA_LIFE_TYPE_SECONDS] | ******emit ISAKMP IPsec DOI attribute: | af+type: AF+SA_LIFE_DURATION (variable length) (0x8002) | length/value: 28800 (0x7080) | ******emit ISAKMP IPsec DOI attribute: | af+type: AF+AUTH_ALGORITHM (0x8005) | length/value: 2 (0x2) | [2 is AUTH_ALGORITHM_HMAC_SHA1] | emitting length of ISAKMP Transform Payload (ESP): 28 | emitting length of ISAKMP Proposal Payload: 72 | last substructure: checking 'ISAKMP Proposal Payload'.'ISAKMP Transform Payload (ESP)'.'next payload type' is 0 | emitting length of ISAKMP Security Association Payload: 84 | last substructure: checking 'ISAKMP Security Association Payload'.'ISAKMP Proposal Payload'.'next payload type' is 0 | ***emit ISAKMP Nonce Payload: | next payload type: ISAKMP_NEXT_KE (0x4) | next payload chain: ignoring supplied 'ISAKMP Nonce Payload'.'next payload type' value 4:ISAKMP_NEXT_KE | next payload chain: setting previous 'ISAKMP Security Association Payload'.'next payload type' to current ISAKMP Nonce Payload (10:ISAKMP_NEXT_NONCE) | next payload chain: saving location 'ISAKMP Nonce Payload'.'next payload type' in 'reply packet' | emitting 32 raw bytes of Ni into ISAKMP Nonce Payload | Ni e1 12 49 b3 fd 77 92 7e 73 9a a9 b4 ea 9d 0d 2a | Ni 8d 04 cc d5 e8 85 37 a6 44 2d 0f 8c 5a ad 96 4e | emitting length of ISAKMP Nonce Payload: 36 | wire (crypto helper) group MODP2048 and state group MODP2048 match | DH secret MODP2048@0x7f83d8000d60: transferring ownership from helper KE to state #3 | ***emit ISAKMP Key Exchange Payload: | next payload type: ISAKMP_NEXT_ID (0x5) | next payload chain: ignoring supplied 'ISAKMP Key Exchange Payload'.'next payload type' value 5:ISAKMP_NEXT_ID | next payload chain: setting previous 'ISAKMP Nonce Payload'.'next payload type' to current ISAKMP Key Exchange Payload (4:ISAKMP_NEXT_KE) | next payload chain: saving location 'ISAKMP Key Exchange Payload'.'next payload type' in 'reply packet' | emitting 256 raw bytes of keyex value into ISAKMP Key Exchange Payload | keyex value ea ec e3 9c e7 9e 02 b8 7a 15 6d 12 5d 9e 42 b5 | keyex value 79 05 31 96 27 70 a6 a4 d4 b2 95 44 cb fc 50 72 | keyex value 7c 79 54 a9 0a b1 b7 26 7e 68 3f 8a 21 41 9e 99 | keyex value a5 d2 12 5c 6e bd 4c f0 d0 79 21 f3 08 e6 56 51 | keyex value e3 49 ed b1 51 6f 8a e3 29 48 6c ea 24 da 42 f5 | keyex value 5e 05 5e 38 69 aa 13 58 fe 4b 49 85 97 87 41 92 | keyex value 66 75 46 60 29 d9 88 3b 28 08 9a 8b ae e6 39 b0 | keyex value 21 3b 3b 2b 4e e6 33 d2 e6 01 b6 76 b0 6e a8 08 | keyex value ca 43 f1 60 fa 8e 2e e2 fb db 12 5a 52 52 d1 cb | keyex value e8 57 bc 89 4d 0b e6 89 86 c2 69 a2 92 f5 ef 91 | keyex value c6 9d ac 87 4c 07 fd 0e c1 79 fe b4 aa e5 4c 24 | keyex value 74 fb b4 eb 51 a0 52 ce f4 fd 22 a6 32 33 17 dd | keyex value 55 f1 47 64 f5 4d 04 94 85 5e 47 2e 90 b8 9d 70 | keyex value 97 6a 80 6c ad a4 c1 af 8e a0 61 8e 24 b8 ad 13 | keyex value 4c a0 f7 83 5a 07 52 87 63 01 96 56 63 4c 32 51 | keyex value dc d1 ea e4 e1 a6 72 17 ad 88 73 e4 32 b5 94 b3 | emitting length of ISAKMP Key Exchange Payload: 260 | ***emit ISAKMP Identification Payload (IPsec DOI): | next payload type: ISAKMP_NEXT_ID (0x5) | ID type: ID_IPV4_ADDR_SUBNET (0x4) | Protocol ID: 0 (0x0) | port: 0 (0x0) | next payload chain: ignoring supplied 'ISAKMP Identification Payload (IPsec DOI)'.'next payload type' value 5:ISAKMP_NEXT_ID | next payload chain: setting previous 'ISAKMP Key Exchange Payload'.'next payload type' to current ISAKMP Identification Payload (IPsec DOI) (5:ISAKMP_NEXT_ID) | next payload chain: saving location 'ISAKMP Identification Payload (IPsec DOI)'.'next payload type' in 'reply packet' | emitting 4 raw bytes of client network into ISAKMP Identification Payload (IPsec DOI) | client network c0 00 0b 00 | emitting 4 raw bytes of client mask into ISAKMP Identification Payload (IPsec DOI) | client mask ff ff ff 00 | emitting length of ISAKMP Identification Payload (IPsec DOI): 16 | ***emit ISAKMP Identification Payload (IPsec DOI): | next payload type: ISAKMP_NEXT_NONE (0x0) | ID type: ID_IPV4_ADDR_SUBNET (0x4) | Protocol ID: 0 (0x0) | port: 0 (0x0) | next payload chain: setting previous 'ISAKMP Identification Payload (IPsec DOI)'.'next payload type' to current ISAKMP Identification Payload (IPsec DOI) (5:ISAKMP_NEXT_ID) | next payload chain: saving location 'ISAKMP Identification Payload (IPsec DOI)'.'next payload type' in 'reply packet' | emitting 4 raw bytes of client network into ISAKMP Identification Payload (IPsec DOI) | client network c0 00 02 00 | emitting 4 raw bytes of client mask into ISAKMP Identification Payload (IPsec DOI) | client mask ff ff ff 00 | emitting length of ISAKMP Identification Payload (IPsec DOI): 16 | HASH(1) PRF sha2_256 init SKEYID_a-key@0x56080aee2f70 (size 32) | HASH(1): SKEYID_a-key@0x56080aee2f70 (32-bytes, EXTRACT_KEY_FROM_KEY) | key-offset: 0, key-size: 32 | EXTRACT_KEY_FROM_KEY: | target: SHA256_HMAC | flags: SIGN | key_size: 32-bytes | base: base-key@0x56080aee2f70 (32-bytes, EXTRACT_KEY_FROM_KEY) | operation: FLAGS_ONLY | params: 8-bytes@0x7fff508fe858 | result: clone-key@0x7f83e8006900 (32-bytes, SHA256_HMAC) | HASH(1) prf: created sha2_256 context 0x56080aee6220 from SKEYID_a-key@0x7f83e8006900 | HASH(1) prf: begin sha2_256 with context 0x56080aee6220 from SKEYID_a-key@0x7f83e8006900 | HASH(1): release clone-key@0x7f83e8006900 | HASH(1) PRF sha2_256 crypt-prf@0x56080af01090 | HASH(1) PRF sha2_256 update M-ID-bytes@0x7fff508fe93c (length 4) | ce 09 ca 89 | HASH(1) PRF sha2_256 update payload-bytes@0x560809a0e980 (length 412) | 0a 00 00 54 00 00 00 01 00 00 00 01 00 00 00 48 | 00 03 04 02 1d 23 a0 34 03 00 00 20 00 0c 00 00 | 80 03 00 0e 80 04 00 01 80 01 00 01 80 02 70 80 | 80 05 00 02 80 06 00 80 00 00 00 1c 01 03 00 00 | 80 03 00 0e 80 04 00 01 80 01 00 01 80 02 70 80 | 80 05 00 02 04 00 00 24 e1 12 49 b3 fd 77 92 7e | 73 9a a9 b4 ea 9d 0d 2a 8d 04 cc d5 e8 85 37 a6 | 44 2d 0f 8c 5a ad 96 4e 05 00 01 04 ea ec e3 9c | e7 9e 02 b8 7a 15 6d 12 5d 9e 42 b5 79 05 31 96 | 27 70 a6 a4 d4 b2 95 44 cb fc 50 72 7c 79 54 a9 | 0a b1 b7 26 7e 68 3f 8a 21 41 9e 99 a5 d2 12 5c | 6e bd 4c f0 d0 79 21 f3 08 e6 56 51 e3 49 ed b1 | 51 6f 8a e3 29 48 6c ea 24 da 42 f5 5e 05 5e 38 | 69 aa 13 58 fe 4b 49 85 97 87 41 92 66 75 46 60 | 29 d9 88 3b 28 08 9a 8b ae e6 39 b0 21 3b 3b 2b | 4e e6 33 d2 e6 01 b6 76 b0 6e a8 08 ca 43 f1 60 | fa 8e 2e e2 fb db 12 5a 52 52 d1 cb e8 57 bc 89 | 4d 0b e6 89 86 c2 69 a2 92 f5 ef 91 c6 9d ac 87 | 4c 07 fd 0e c1 79 fe b4 aa e5 4c 24 74 fb b4 eb | 51 a0 52 ce f4 fd 22 a6 32 33 17 dd 55 f1 47 64 | f5 4d 04 94 85 5e 47 2e 90 b8 9d 70 97 6a 80 6c | ad a4 c1 af 8e a0 61 8e 24 b8 ad 13 4c a0 f7 83 | 5a 07 52 87 63 01 96 56 63 4c 32 51 dc d1 ea e4 | e1 a6 72 17 ad 88 73 e4 32 b5 94 b3 05 00 00 10 | 04 00 00 00 c0 00 0b 00 ff ff ff 00 00 00 00 10 | 04 00 00 00 c0 00 02 00 ff ff ff 00 | HASH(1) PRF sha2_256 final-bytes@0x560809a0e960 (length 32) | 87 7f 12 9f 2c 76 18 60 ec fc b1 3b 73 8b a2 7d | 1e b6 91 29 27 82 ac 9b 46 34 4d 9f f6 91 d4 cb | outI1 HASH(1): | 87 7f 12 9f 2c 76 18 60 ec fc b1 3b 73 8b a2 7d | 1e b6 91 29 27 82 ac 9b 46 34 4d 9f f6 91 d4 cb | last Phase 1 IV: c8 ea e9 b3 51 0b ea 24 90 87 5d b9 c1 a4 ec 95 | current Phase 1 IV: c8 ea e9 b3 51 0b ea 24 90 87 5d b9 c1 a4 ec 95 | Phase 2 IV hash sha2_256 init | Phase 2 IV hash sha2_256 digest PH1_IV-bytes@0x56080af00280 (length 16) | c8 ea e9 b3 51 0b ea 24 90 87 5d b9 c1 a4 ec 95 | Phase 2 IV hash sha2_256 digest MSGID-bytes@0x7fff508fe94c (length 4) | ce 09 ca 89 | Phase 2 IV hash sha2_256 final bytes@0x56080af00200 (length 32) | 3d 44 9e 80 a2 3d 94 99 48 b4 fa 9a 19 14 e3 d8 | e6 63 06 1f cc 07 5f 9f b3 c5 4e 73 f6 67 80 42 | encrypting: 01 00 00 24 87 7f 12 9f 2c 76 18 60 ec fc b1 3b | encrypting: 73 8b a2 7d 1e b6 91 29 27 82 ac 9b 46 34 4d 9f | encrypting: f6 91 d4 cb 0a 00 00 54 00 00 00 01 00 00 00 01 | encrypting: 00 00 00 48 00 03 04 02 1d 23 a0 34 03 00 00 20 | encrypting: 00 0c 00 00 80 03 00 0e 80 04 00 01 80 01 00 01 | encrypting: 80 02 70 80 80 05 00 02 80 06 00 80 00 00 00 1c | encrypting: 01 03 00 00 80 03 00 0e 80 04 00 01 80 01 00 01 | encrypting: 80 02 70 80 80 05 00 02 04 00 00 24 e1 12 49 b3 | encrypting: fd 77 92 7e 73 9a a9 b4 ea 9d 0d 2a 8d 04 cc d5 | encrypting: e8 85 37 a6 44 2d 0f 8c 5a ad 96 4e 05 00 01 04 | encrypting: ea ec e3 9c e7 9e 02 b8 7a 15 6d 12 5d 9e 42 b5 | encrypting: 79 05 31 96 27 70 a6 a4 d4 b2 95 44 cb fc 50 72 | encrypting: 7c 79 54 a9 0a b1 b7 26 7e 68 3f 8a 21 41 9e 99 | encrypting: a5 d2 12 5c 6e bd 4c f0 d0 79 21 f3 08 e6 56 51 | encrypting: e3 49 ed b1 51 6f 8a e3 29 48 6c ea 24 da 42 f5 | encrypting: 5e 05 5e 38 69 aa 13 58 fe 4b 49 85 97 87 41 92 | encrypting: 66 75 46 60 29 d9 88 3b 28 08 9a 8b ae e6 39 b0 | encrypting: 21 3b 3b 2b 4e e6 33 d2 e6 01 b6 76 b0 6e a8 08 | encrypting: ca 43 f1 60 fa 8e 2e e2 fb db 12 5a 52 52 d1 cb | encrypting: e8 57 bc 89 4d 0b e6 89 86 c2 69 a2 92 f5 ef 91 | encrypting: c6 9d ac 87 4c 07 fd 0e c1 79 fe b4 aa e5 4c 24 | encrypting: 74 fb b4 eb 51 a0 52 ce f4 fd 22 a6 32 33 17 dd | encrypting: 55 f1 47 64 f5 4d 04 94 85 5e 47 2e 90 b8 9d 70 | encrypting: 97 6a 80 6c ad a4 c1 af 8e a0 61 8e 24 b8 ad 13 | encrypting: 4c a0 f7 83 5a 07 52 87 63 01 96 56 63 4c 32 51 | encrypting: dc d1 ea e4 e1 a6 72 17 ad 88 73 e4 32 b5 94 b3 | encrypting: 05 00 00 10 04 00 00 00 c0 00 0b 00 ff ff ff 00 | encrypting: 00 00 00 10 04 00 00 00 c0 00 02 00 ff ff ff 00 | IV: 3d 44 9e 80 a2 3d 94 99 48 b4 fa 9a 19 14 e3 d8 | IV: e6 63 06 1f cc 07 5f 9f b3 c5 4e 73 f6 67 80 42 | unpadded size is: 448 | encrypting 448 using AES_CBC | no IKEv1 message padding required | emitting length of ISAKMP Message: 476 | NSS ike_alg_nss_cbc: aes - enter | NSS ike_alg_nss_cbc: aes - exit | next IV: 24 49 47 3d 16 7b 72 5f 61 3f aa 57 47 8d 47 25 | sending 476 bytes for reply packet from quick_outI1 through eth1 from 192.1.2.45:500 to 192.1.2.23:500 (using #3) | 3c e4 38 3f ed 34 7c e6 29 82 ac 69 b5 22 4f 63 | 08 10 20 01 ce 09 ca 89 00 00 01 dc c1 a5 aa 83 | c7 59 5e f7 d4 6c e7 75 c8 67 56 73 9c ad 3f 4c | 14 a3 45 2d f9 45 21 a9 92 6c 8c 31 cf f7 f3 80 | c9 6e df a0 f5 e4 97 aa 3b 96 87 4a dc 83 07 df | 8b d9 17 ac 62 ee 8b 6f 1e 0c 4d 38 eb 74 f8 b8 | 0b cf 03 90 4b 2b 48 df 67 a0 bb 7d ad 20 27 54 | 9c 23 d2 28 3e a0 70 ff 13 f8 15 a6 d5 32 a4 7e | 3c bf 3c b8 c3 1c 8e 0b 8a af 03 3d b3 c7 a7 10 | b2 ba 2e 4e d2 f9 87 ef 68 96 55 12 af 71 ea 81 | 93 93 f0 d9 41 8b ce e6 95 0d bc b5 fb 1a a6 94 | 21 40 0f 09 a1 0a 86 f3 89 e3 25 ba 2a 5d 69 6f | 1a 4e dc 2b b3 6f 44 fc be 6f 34 b1 b3 3b 34 7e | 53 ae 0e 97 d5 8f 70 ac 45 fc 52 57 30 73 d5 5a | dc 1c 15 9a d5 9a 94 5d ee 52 1b 69 37 3f 29 75 | 34 e3 e6 0f 61 51 13 82 cd 9e 0b e5 79 5c c2 a3 | bf f6 4e ff 13 02 6b 9a 77 ca 63 7c 11 00 8b 9b | 21 25 c6 c5 c8 27 f8 07 fb a7 ce c9 93 e7 52 8d | 13 d6 4f 47 4f 62 20 f3 20 49 6c 53 b1 9d 4b f0 | ca 1a 2b c4 83 52 08 7f 88 99 97 18 db a2 4c 75 | 96 11 5e 8d a1 d9 fd 2b 82 f8 69 91 38 33 bc 5e | f0 9b 31 28 af 14 08 29 bb 99 1f f9 7a ac 4d 8e | ff ae c8 71 e7 2a 0b 7b 07 82 85 1b d7 80 4b 6f | 77 0a 76 33 d4 e8 7d b8 42 5b a3 3d 9d 4f 8f 3b | b2 d5 c0 ce 45 82 56 c1 99 b9 13 b3 6b ce e1 45 | 7c b9 95 e3 d9 f1 4a a8 fe 1f 8c bb 99 95 c4 3c | 30 d0 70 82 39 bd 35 af fd 75 46 d9 9e 64 12 1d | eb 15 84 55 6e 6b 27 53 44 89 99 67 98 ba 0a 9b | d6 9d de 8f 75 67 2f d0 43 d0 f2 82 24 49 47 3d | 16 7b 72 5f 61 3f aa 57 47 8d 47 25 | state #3 requesting EVENT_CRYPTO_TIMEOUT to be deleted | libevent_free: release ptr-libevent@0x56080af00da0 | free_event_entry: release EVENT_CRYPTO_TIMEOUT-pe@0x56080af00a30 "westnets-eastnet/2x0" #3: IMPAIR: suppressing retransmits; scheduling timeout in 60 seconds | event_schedule: new EVENT_RETRANSMIT-pe@0x56080af00a30 | inserting event EVENT_RETRANSMIT, timeout in 60 seconds for #3 | libevent_malloc: new ptr-libevent@0x56080af00da0 size 128 | #3 STATE_QUICK_I1: retransmits: first event in 60 seconds; timeout in 60 seconds; limit of 12 retransmits; current time is 50065.825964 | resume sending helper answer for #3 suppresed complete_v1_state_transition() | stop processing: state #3 connection "westnets-eastnet/2x0" from 192.1.2.23:500 (in resume_handler() at server.c:833) | libevent_free: release ptr-libevent@0x7f83d8009640 | *received 460 bytes from 192.1.2.23:500 on eth1 (192.1.2.45:500) | 3c e4 38 3f ed 34 7c e6 29 82 ac 69 b5 22 4f 63 | 08 10 20 01 ce 09 ca 89 00 00 01 cc 98 d3 d2 0f | 95 47 b2 d1 0a e7 a3 3f 4f 9f 39 cc c1 90 18 35 | 15 bc e8 1f 43 7c f8 2f 43 77 8e 2b 0f 0a 46 76 | f8 d0 6d 3b e1 bd 55 e8 8a b7 8e 68 54 36 fa 08 | 4c 99 cc e3 66 56 a5 d5 0a e8 8b 50 03 62 79 f1 | bb ec d4 b2 e3 92 40 5a 55 22 b3 38 f2 89 c2 6d | 12 9b 11 c5 2d 1b b4 b9 87 ef d1 e2 d3 55 e9 5f | 51 d8 45 49 85 aa d5 0d 5a 1b 7e 1b 84 29 0c d6 | f5 77 6e 19 c0 09 34 a7 8f af 5c cb 3a 0d 46 45 | 3c c4 53 bc a4 94 b9 77 16 08 f3 7c fd 7e d6 72 | ef bc a0 6b 20 a0 33 9d 34 74 83 5d 3a e2 b5 37 | 15 95 60 4b b1 9b 64 ad 90 62 d5 79 4d 2a c0 c5 | 8d 5b 0e f6 1d 00 89 0a aa 2b 3f 8c 4d ea 53 e5 | 6e 62 fb 07 7a 45 15 08 f7 37 a8 9f b4 29 c6 1f | 97 ad 8a f0 eb 78 39 04 33 aa 7c b2 8c ff 05 81 | 1a cb 2a 79 6b 00 80 04 24 ed 5e 26 38 15 96 50 | 8a 38 86 aa 93 8f 3f d6 d4 91 fd 42 d3 07 b0 ac | 84 36 6d 3e 86 40 67 c9 e6 ec af 60 90 b6 77 a1 | e6 46 4f 15 11 23 82 0a ec a5 93 85 cf 50 ec a4 | 70 fd 76 46 17 24 71 c0 a2 d7 24 c3 74 ae 42 9d | 79 68 4c d8 c8 c7 6d 59 4c f0 66 bd 58 cc 9d 7c | 83 b7 98 86 82 e8 b0 3b f8 13 e5 b6 1b 10 14 db | 9c d7 0e ea 15 ad 02 ec e5 7d 88 94 c3 d4 06 e1 | 0c ab 89 70 63 79 d8 46 2f c6 fc b7 77 1d 3c a6 | b8 dc de b8 c0 5f 73 4f c1 92 ba c0 db a8 5c 31 | 90 62 cd 36 d6 ff 3b 29 f5 9f 39 33 de 3f 31 33 | 4f 10 13 4a ff bb b5 c6 a8 c7 64 fe 95 3c 38 79 | e4 7d ed a0 08 fc 4a c2 c0 87 80 d8 | start processing: from 192.1.2.23:500 (in process_md() at demux.c:378) | **parse ISAKMP Message: | initiator cookie: | 3c e4 38 3f ed 34 7c e6 | responder cookie: | 29 82 ac 69 b5 22 4f 63 | next payload type: ISAKMP_NEXT_HASH (0x8) | ISAKMP version: ISAKMP Version 1.0 (rfc2407) (0x10) | exchange type: ISAKMP_XCHG_QUICK (0x20) | flags: ISAKMP_FLAG_v1_ENCRYPTION (0x1) | Message ID: 3456748169 (0xce09ca89) | length: 460 (0x1cc) | processing version=1.0 packet with exchange type=ISAKMP_XCHG_QUICK (32) | State DB: found IKEv1 state #3 in QUICK_I1 (find_state_ikev1) | start processing: state #3 connection "westnets-eastnet/2x0" from 192.1.2.23:500 (in process_v1_packet() at ikev1.c:1609) | #3 is idle | #3 idle | received encrypted packet from 192.1.2.23:500 | decrypting 432 bytes using algorithm AES_CBC | IV before: 24 49 47 3d 16 7b 72 5f 61 3f aa 57 47 8d 47 25 | NSS ike_alg_nss_cbc: aes - enter | NSS ike_alg_nss_cbc: aes - exit | IV after: 95 3c 38 79 e4 7d ed a0 08 fc 4a c2 c0 87 80 d8 | decrypted payload (starts at offset -432): | 3c e4 38 3f ed 34 7c e6 29 82 ac 69 b5 22 4f 63 | 08 10 20 01 ce 09 ca 89 00 00 01 cc 01 00 00 24 | 5a c6 92 92 35 6a e2 94 b7 29 fc 6a ab b6 fd 75 | 8d c3 ba 56 ba 38 8b 60 81 dd 1c 85 99 40 a8 f6 | 0a 00 00 38 00 00 00 01 00 00 00 01 00 00 00 2c | 00 03 04 01 c7 e7 75 c9 00 00 00 20 00 0c 00 00 | 80 03 00 0e 80 04 00 01 80 01 00 01 80 02 70 80 | 80 05 00 02 80 06 00 80 04 00 00 24 04 1b cd 3a | dd b3 c5 4b 41 e8 b4 e7 6a 3a c6 95 44 c5 bb a1 | fd 32 1f 74 d6 f1 73 51 1b cb 81 a8 05 00 01 04 | a5 71 8d 52 ec eb 5f 53 ad 9a a4 86 51 76 ec ef | 1b 39 85 0a 79 40 d7 b5 e5 37 3f 48 3e 17 1f d6 | 4b 82 24 1a d4 df 31 b6 42 88 65 2e 87 97 a5 db | 14 02 b3 c3 3a 9b a4 81 c1 d7 c5 96 cd 03 2a e5 | 6d 0f b4 60 d7 a5 83 96 c6 8b 93 62 0a 21 2f 23 | 35 77 56 86 c2 a4 05 5b db c5 91 a6 73 18 cd 87 | 7a 89 eb dd e2 48 ab f2 83 42 b0 7f 0b c8 98 bf | df 80 aa 8d 4b 70 0a 18 53 7b f1 39 a7 d2 f9 54 | 93 da 45 e6 67 4d fa cd 25 1e 61 22 2c 8b 66 98 | 5a 0a 3e 29 89 c3 46 e9 d0 ef 35 d1 d1 aa 11 70 | 8d c5 f6 f6 e3 8f bb 5a 25 5b 42 3b 92 6b 5a fc | 29 f3 fe 4b 79 62 6e 6a 0c 31 b8 44 ff e8 d8 3c | 71 c2 e2 1f ea fd 6a dd 52 f3 0b 3f 35 4c a3 23 | 02 c5 85 51 0f 7f 70 f7 63 ec da ba ed a3 84 f3 | 12 b7 eb b1 3c 5f a8 a6 83 2a f1 99 91 55 c6 e9 | 97 41 73 28 1a 1f 34 5f 56 fa 54 f4 28 32 64 e4 | 05 00 00 10 04 00 00 00 c0 00 0b 00 ff ff ff 00 | 00 00 00 10 04 00 00 00 c0 00 02 00 ff ff ff 00 | 00 00 00 00 00 00 00 00 00 00 00 00 | got payload 0x100 (ISAKMP_NEXT_HASH) needed: 0x502 opt: 0x200030 | ***parse ISAKMP Hash Payload: | next payload type: ISAKMP_NEXT_SA (0x1) | length: 36 (0x24) | got payload 0x2 (ISAKMP_NEXT_SA) needed: 0x402 opt: 0x200030 | ***parse ISAKMP Security Association Payload: | next payload type: ISAKMP_NEXT_NONCE (0xa) | length: 56 (0x38) | DOI: ISAKMP_DOI_IPSEC (0x1) | got payload 0x400 (ISAKMP_NEXT_NONCE) needed: 0x400 opt: 0x200030 | ***parse ISAKMP Nonce Payload: | next payload type: ISAKMP_NEXT_KE (0x4) | length: 36 (0x24) | got payload 0x10 (ISAKMP_NEXT_KE) needed: 0x0 opt: 0x200030 | ***parse ISAKMP Key Exchange Payload: | next payload type: ISAKMP_NEXT_ID (0x5) | length: 260 (0x104) | got payload 0x20 (ISAKMP_NEXT_ID) needed: 0x0 opt: 0x200030 | ***parse ISAKMP Identification Payload (IPsec DOI): | next payload type: ISAKMP_NEXT_ID (0x5) | length: 16 (0x10) | ID type: ID_IPV4_ADDR_SUBNET (0x4) | Protocol ID: 0 (0x0) | port: 0 (0x0) | obj: c0 00 0b 00 ff ff ff 00 | got payload 0x20 (ISAKMP_NEXT_ID) needed: 0x0 opt: 0x200030 | ***parse ISAKMP Identification Payload (IPsec DOI): | next payload type: ISAKMP_NEXT_NONE (0x0) | length: 16 (0x10) | ID type: ID_IPV4_ADDR_SUBNET (0x4) | Protocol ID: 0 (0x0) | port: 0 (0x0) | obj: c0 00 02 00 ff ff ff 00 | removing 12 bytes of padding | HASH(1) PRF sha2_256 init SKEYID_a-key@0x56080aee2f70 (size 32) | HASH(1): SKEYID_a-key@0x56080aee2f70 (32-bytes, EXTRACT_KEY_FROM_KEY) | key-offset: 0, key-size: 32 | EXTRACT_KEY_FROM_KEY: | target: SHA256_HMAC | flags: SIGN | key_size: 32-bytes | base: base-key@0x56080aee2f70 (32-bytes, EXTRACT_KEY_FROM_KEY) | operation: FLAGS_ONLY | params: 8-bytes@0x7fff508feb48 | result: clone-key@0x7f83e8006900 (32-bytes, SHA256_HMAC) | HASH(1) prf: created sha2_256 context 0x56080aee6220 from SKEYID_a-key@0x7f83e8006900 | HASH(1) prf: begin sha2_256 with context 0x56080aee6220 from SKEYID_a-key@0x7f83e8006900 | HASH(1): release clone-key@0x7f83e8006900 | HASH(1) PRF sha2_256 crypt-prf@0x56080af01090 | HASH(1) PRF sha2_256 update M-ID-bytes@0x7fff508fec2c (length 4) | ce 09 ca 89 | HASH(1) PRF sha2_256 update Ni_b-bytes@0x7f83d8005830 (length 32) | e1 12 49 b3 fd 77 92 7e 73 9a a9 b4 ea 9d 0d 2a | 8d 04 cc d5 e8 85 37 a6 44 2d 0f 8c 5a ad 96 4e | HASH(1) PRF sha2_256 update payload-bytes@0x56080af07df0 (length 384) | 0a 00 00 38 00 00 00 01 00 00 00 01 00 00 00 2c | 00 03 04 01 c7 e7 75 c9 00 00 00 20 00 0c 00 00 | 80 03 00 0e 80 04 00 01 80 01 00 01 80 02 70 80 | 80 05 00 02 80 06 00 80 04 00 00 24 04 1b cd 3a | dd b3 c5 4b 41 e8 b4 e7 6a 3a c6 95 44 c5 bb a1 | fd 32 1f 74 d6 f1 73 51 1b cb 81 a8 05 00 01 04 | a5 71 8d 52 ec eb 5f 53 ad 9a a4 86 51 76 ec ef | 1b 39 85 0a 79 40 d7 b5 e5 37 3f 48 3e 17 1f d6 | 4b 82 24 1a d4 df 31 b6 42 88 65 2e 87 97 a5 db | 14 02 b3 c3 3a 9b a4 81 c1 d7 c5 96 cd 03 2a e5 | 6d 0f b4 60 d7 a5 83 96 c6 8b 93 62 0a 21 2f 23 | 35 77 56 86 c2 a4 05 5b db c5 91 a6 73 18 cd 87 | 7a 89 eb dd e2 48 ab f2 83 42 b0 7f 0b c8 98 bf | df 80 aa 8d 4b 70 0a 18 53 7b f1 39 a7 d2 f9 54 | 93 da 45 e6 67 4d fa cd 25 1e 61 22 2c 8b 66 98 | 5a 0a 3e 29 89 c3 46 e9 d0 ef 35 d1 d1 aa 11 70 | 8d c5 f6 f6 e3 8f bb 5a 25 5b 42 3b 92 6b 5a fc | 29 f3 fe 4b 79 62 6e 6a 0c 31 b8 44 ff e8 d8 3c | 71 c2 e2 1f ea fd 6a dd 52 f3 0b 3f 35 4c a3 23 | 02 c5 85 51 0f 7f 70 f7 63 ec da ba ed a3 84 f3 | 12 b7 eb b1 3c 5f a8 a6 83 2a f1 99 91 55 c6 e9 | 97 41 73 28 1a 1f 34 5f 56 fa 54 f4 28 32 64 e4 | 05 00 00 10 04 00 00 00 c0 00 0b 00 ff ff ff 00 | 00 00 00 10 04 00 00 00 c0 00 02 00 ff ff ff 00 | HASH(1) PRF sha2_256 final-bytes@0x7fff508fecb0 (length 32) | 5a c6 92 92 35 6a e2 94 b7 29 fc 6a ab b6 fd 75 | 8d c3 ba 56 ba 38 8b 60 81 dd 1c 85 99 40 a8 f6 | quick_inR1_outI2 HASH(2): | 5a c6 92 92 35 6a e2 94 b7 29 fc 6a ab b6 fd 75 | 8d c3 ba 56 ba 38 8b 60 81 dd 1c 85 99 40 a8 f6 | received 'quick_inR1_outI2' message HASH(2) data ok | ****parse IPsec DOI SIT: | IPsec DOI SIT: SIT_IDENTITY_ONLY (0x1) | ****parse ISAKMP Proposal Payload: | next payload type: ISAKMP_NEXT_NONE (0x0) | length: 44 (0x2c) | proposal number: 0 (0x0) | protocol ID: PROTO_IPSEC_ESP (0x3) | SPI size: 4 (0x4) | number of transforms: 1 (0x1) | parsing 4 raw bytes of ISAKMP Proposal Payload into SPI | SPI c7 e7 75 c9 | *****parse ISAKMP Transform Payload (ESP): | next payload type: ISAKMP_NEXT_NONE (0x0) | length: 32 (0x20) | ESP transform number: 0 (0x0) | ESP transform ID: ESP_AES (0xc) | encryption ike_alg_lookup_by_id id: AES=12, found AES_CBC | ******parse ISAKMP IPsec DOI attribute: | af+type: AF+GROUP_DESCRIPTION (0x8003) | length/value: 14 (0xe) | [14 is OAKLEY_GROUP_MODP2048] | DH ike_alg_lookup_by_id id: MODP2048=14, found MODP2048 | ******parse ISAKMP IPsec DOI attribute: | af+type: AF+ENCAPSULATION_MODE (0x8004) | length/value: 1 (0x1) | [1 is ENCAPSULATION_MODE_TUNNEL] | NAT-T non-encap: Installing IPsec SA without ENCAP, st->hidden_variables.st_nat_traversal is none | ******parse ISAKMP IPsec DOI attribute: | af+type: AF+SA_LIFE_TYPE (0x8001) | length/value: 1 (0x1) | [1 is SA_LIFE_TYPE_SECONDS] | ******parse ISAKMP IPsec DOI attribute: | af+type: AF+SA_LIFE_DURATION (variable length) (0x8002) | length/value: 28800 (0x7080) | ******parse ISAKMP IPsec DOI attribute: | af+type: AF+AUTH_ALGORITHM (0x8005) | length/value: 2 (0x2) | [2 is AUTH_ALGORITHM_HMAC_SHA1] | integrity ike_alg_lookup_by_id id: HMAC_SHA1=2, found HMAC_SHA1_96 | ******parse ISAKMP IPsec DOI attribute: | af+type: AF+KEY_LENGTH (0x8006) | length/value: 128 (0x80) | ESP IPsec Transform verified unconditionally; no alg_info to check against | DH public value received: | a5 71 8d 52 ec eb 5f 53 ad 9a a4 86 51 76 ec ef | 1b 39 85 0a 79 40 d7 b5 e5 37 3f 48 3e 17 1f d6 | 4b 82 24 1a d4 df 31 b6 42 88 65 2e 87 97 a5 db | 14 02 b3 c3 3a 9b a4 81 c1 d7 c5 96 cd 03 2a e5 | 6d 0f b4 60 d7 a5 83 96 c6 8b 93 62 0a 21 2f 23 | 35 77 56 86 c2 a4 05 5b db c5 91 a6 73 18 cd 87 | 7a 89 eb dd e2 48 ab f2 83 42 b0 7f 0b c8 98 bf | df 80 aa 8d 4b 70 0a 18 53 7b f1 39 a7 d2 f9 54 | 93 da 45 e6 67 4d fa cd 25 1e 61 22 2c 8b 66 98 | 5a 0a 3e 29 89 c3 46 e9 d0 ef 35 d1 d1 aa 11 70 | 8d c5 f6 f6 e3 8f bb 5a 25 5b 42 3b 92 6b 5a fc | 29 f3 fe 4b 79 62 6e 6a 0c 31 b8 44 ff e8 d8 3c | 71 c2 e2 1f ea fd 6a dd 52 f3 0b 3f 35 4c a3 23 | 02 c5 85 51 0f 7f 70 f7 63 ec da ba ed a3 84 f3 | 12 b7 eb b1 3c 5f a8 a6 83 2a f1 99 91 55 c6 e9 | 97 41 73 28 1a 1f 34 5f 56 fa 54 f4 28 32 64 e4 | started looking for secret for @west->@east of kind PKK_PSK | actually looking for secret for @west->@east of kind PKK_PSK | line 1: key type PKK_PSK(@west) to type PKK_RSA | concluding with best_match=000 best=(nil) (lineno=-1) | no PreShared Key Found | DH secret MODP2048@0x7f83d8000d60: transferring ownership from state #3 to helper IKEv1 DH | adding quick outI2 DH work-order 5 for state #3 | state #3 requesting EVENT_RETRANSMIT to be deleted | #3 STATE_QUICK_I1: retransmits: cleared | libevent_free: release ptr-libevent@0x56080af00da0 | free_event_entry: release EVENT_RETRANSMIT-pe@0x56080af00a30 | event_schedule: new EVENT_CRYPTO_TIMEOUT-pe@0x56080af00a30 | inserting event EVENT_CRYPTO_TIMEOUT, timeout in 60 seconds for #3 | libevent_malloc: new ptr-libevent@0x56080af00da0 size 128 | crypto helper 5 resuming | crypto helper 5 starting work-order 5 for state #3 | crypto helper 5 doing compute dh (V1 Phase 2 PFS) (quick outI2 DH); request ID 5 | peer's g: a5 71 8d 52 ec eb 5f 53 ad 9a a4 86 51 76 ec ef | peer's g: 1b 39 85 0a 79 40 d7 b5 e5 37 3f 48 3e 17 1f d6 | peer's g: 4b 82 24 1a d4 df 31 b6 42 88 65 2e 87 97 a5 db | peer's g: 14 02 b3 c3 3a 9b a4 81 c1 d7 c5 96 cd 03 2a e5 | peer's g: 6d 0f b4 60 d7 a5 83 96 c6 8b 93 62 0a 21 2f 23 | peer's g: 35 77 56 86 c2 a4 05 5b db c5 91 a6 73 18 cd 87 | peer's g: 7a 89 eb dd e2 48 ab f2 83 42 b0 7f 0b c8 98 bf | peer's g: df 80 aa 8d 4b 70 0a 18 53 7b f1 39 a7 d2 f9 54 | peer's g: 93 da 45 e6 67 4d fa cd 25 1e 61 22 2c 8b 66 98 | peer's g: 5a 0a 3e 29 89 c3 46 e9 d0 ef 35 d1 d1 aa 11 70 | peer's g: 8d c5 f6 f6 e3 8f bb 5a 25 5b 42 3b 92 6b 5a fc | peer's g: 29 f3 fe 4b 79 62 6e 6a 0c 31 b8 44 ff e8 d8 3c | peer's g: 71 c2 e2 1f ea fd 6a dd 52 f3 0b 3f 35 4c a3 23 | peer's g: 02 c5 85 51 0f 7f 70 f7 63 ec da ba ed a3 84 f3 | peer's g: 12 b7 eb b1 3c 5f a8 a6 83 2a f1 99 91 55 c6 e9 | peer's g: 97 41 73 28 1a 1f 34 5f 56 fa 54 f4 28 32 64 e4 | Started DH shared-secret computation in NSS: | new : g_ir-key@0x7f83e8006900 (256-bytes, CONCATENATE_DATA_AND_BASE) | DH secret MODP2048@0x7f83d8000d60: computed shared DH secret key@0x7f83e8006900 | dh-shared : g^ir-key@0x7f83e8006900 (256-bytes, CONCATENATE_DATA_AND_BASE) | crypto helper 5 finished compute dh (V1 Phase 2 PFS) (quick outI2 DH); request ID 5 time elapsed 0.000855 seconds | crypto helper 5 sending results from work-order 5 for state #3 to event queue | scheduling resume sending helper answer for #3 | libevent_malloc: new ptr-libevent@0x7f83dc001ef0 size 128 | crypto helper 5 waiting (nothing to do) | complete v1 state transition with STF_SUSPEND | [RE]START processing: state #3 connection "westnets-eastnet/2x0" from 192.1.2.23:500 (in complete_v1_state_transition() at ikev1.c:2624) | suspending state #3 and saving MD | #3 is busy; has a suspended MD | stop processing: from 192.1.2.23:500 (BACKGROUND) (in process_md() at demux.c:380) | stop processing: state #3 connection "westnets-eastnet/2x0" from 192.1.2.23:500 (in process_md() at demux.c:382) | processing: STOP connection NULL (in process_md() at demux.c:383) | *received 460 bytes from 192.1.2.23:500 on eth1 (192.1.2.45:500) | 3c e4 38 3f ed 34 7c e6 29 82 ac 69 b5 22 4f 63 | 08 10 20 01 d9 d2 08 cd 00 00 01 cc 26 2a 0f 2f | 06 f5 05 47 1a 10 3e 50 8a a5 88 d6 e2 9b 35 65 | dd bd 56 db 96 f6 61 df 07 3c 87 b9 12 f7 b3 48 | 6c 26 0c 57 09 53 34 22 d8 7d 2c 8e f0 13 1e 5a | b6 11 32 05 26 10 17 5e 35 ff 5f 8f 68 ea 2c 1a | 62 30 50 ed 7f 5c 3e 82 cf ec e4 01 9a 56 2a 65 | 8b 95 f9 d4 7c 94 2c 0c 3d 78 a3 13 7e 06 8d 59 | 2f 4b cb f2 95 5c 63 b8 df d3 da 2b f7 fb 81 c6 | 9e f0 32 1c 39 e7 39 5a ae 93 8e 37 3b 00 80 e3 | ab af 70 0b 18 7b 4d 51 db 61 3b d5 c7 b8 86 8a | 67 11 2e 59 ec db 2b 3f cf e1 d1 f5 ed 94 67 46 | c5 55 a2 de 1a df 95 51 c9 8b c4 38 d4 8c ff 8f | 75 54 52 4d 3d 01 38 0b 6e 4e 62 3b 8a 99 d5 12 | d7 b1 3e 21 01 91 1b 74 3c fe d4 3f a0 62 bc 8a | 6e 2a 92 52 a1 61 f8 bc 1a d8 01 ac b3 72 c7 a8 | 48 37 c7 78 f6 0c 69 7d 8a d2 f0 08 6d 0b 02 15 | 76 94 19 b1 3a 4e 87 f0 80 a1 b8 84 bb 0e a6 52 | 43 21 be a0 cf 86 87 d9 af 22 a1 2a 84 91 b4 f2 | 54 c6 9b 90 81 0d 4c 7a 98 f3 a9 cc 08 53 a4 e3 | 07 09 5f 8c 4e f2 34 ea 38 0e ee 1b 45 e2 5d 42 | c5 f2 69 f8 70 9f 1d f0 a5 27 8b a9 95 f4 cc 42 | a0 78 ad 04 32 b8 63 2a 0e 47 af 35 95 41 1f 18 | 6d fb e4 77 d0 56 22 b6 02 e4 b2 f5 d8 0b 13 9f | 57 a7 d6 8c 4d 5e c9 69 8e 08 c3 b4 eb ab eb 48 | 3c 77 08 ae cc c5 c5 ef f4 f5 7d 15 c3 79 5d 62 | 82 7e 0d 00 52 f8 ec d5 b8 23 89 fd 7a ec 30 34 | 83 72 3b 86 89 44 02 c6 7d 11 83 b8 a1 b5 5c ae | aa bf 6b c9 a6 eb 76 9f db 4b c1 a4 | start processing: from 192.1.2.23:500 (in process_md() at demux.c:378) | **parse ISAKMP Message: | initiator cookie: | 3c e4 38 3f ed 34 7c e6 | responder cookie: | 29 82 ac 69 b5 22 4f 63 | next payload type: ISAKMP_NEXT_HASH (0x8) | ISAKMP version: ISAKMP Version 1.0 (rfc2407) (0x10) | exchange type: ISAKMP_XCHG_QUICK (0x20) | flags: ISAKMP_FLAG_v1_ENCRYPTION (0x1) | Message ID: 3654420685 (0xd9d208cd) | length: 460 (0x1cc) | processing version=1.0 packet with exchange type=ISAKMP_XCHG_QUICK (32) | State DB: found IKEv1 state #2 in QUICK_I1 (find_state_ikev1) | start processing: state #2 connection "westnets-eastnet/1x0" from 192.1.2.23:500 (in process_v1_packet() at ikev1.c:1609) | #2 is idle | #2 idle | received encrypted packet from 192.1.2.23:500 | decrypting 432 bytes using algorithm AES_CBC | IV before: 3e 85 9b 77 57 4a 02 62 06 d7 eb ed e0 dd d2 dd | NSS ike_alg_nss_cbc: aes - enter | NSS ike_alg_nss_cbc: aes - exit | IV after: a1 b5 5c ae aa bf 6b c9 a6 eb 76 9f db 4b c1 a4 | decrypted payload (starts at offset -432): | 3c e4 38 3f ed 34 7c e6 29 82 ac 69 b5 22 4f 63 | 08 10 20 01 d9 d2 08 cd 00 00 01 cc 01 00 00 24 | 2e 34 6f 59 6c 1e 04 00 85 37 31 00 e3 f9 bf f1 | 45 bf 9d d5 99 d7 fd e8 b4 91 cd 6e 70 b8 90 dd | 0a 00 00 38 00 00 00 01 00 00 00 01 00 00 00 2c | 00 03 04 01 45 ec 10 4f 00 00 00 20 00 0c 00 00 | 80 03 00 0e 80 04 00 01 80 01 00 01 80 02 70 80 | 80 05 00 02 80 06 00 80 04 00 00 24 b7 79 51 b8 | 86 24 80 c2 ef 6d 55 26 21 b7 80 3f d6 ca d2 61 | 2a a4 73 9a 75 2c 8e a0 c5 8b 48 e9 05 00 01 04 | 87 07 ec ec e5 90 9d c7 3b 37 cb 01 8a cf 79 1b | 54 99 23 c2 70 bf 5a 2e da 8e 4e b6 7a c5 b9 05 | e3 ef dd 9f 07 03 6a b5 17 da 39 34 64 bb c6 83 | 7a d8 f1 cd e4 98 8e 8c fd 65 3b 18 42 b7 5f da | 82 75 d9 aa c2 ea 33 a0 04 57 16 52 89 af b5 13 | ed af b5 b5 73 9a fa 68 a6 a4 45 74 22 14 c5 92 | 9d 18 4d a8 04 e5 f9 b8 4e 09 d6 3d 09 35 61 d8 | 75 0c 00 c4 c8 53 cb f0 60 33 fb e9 37 7e 0d 01 | 8c c5 6a 9e 72 ef 4f 73 9e 5f c6 06 8f 98 f8 9c | 83 cf 52 19 ea 31 2a 93 6d 60 e5 2d fb a2 c7 b8 | 9c 4a b5 50 5c ac 48 1f ca eb c7 93 92 6c 71 ac | ec 36 b1 61 04 51 ec ec c8 e7 23 a3 19 50 bd 4a | 5c 50 52 87 cf 5b c9 0e 30 63 96 5c c6 4f d9 92 | d9 bf 2f c8 9f da 80 9f 0c b5 4c d0 3d 39 23 ef | 78 4c 5c 0f b9 9a 3b fa de 58 6e b3 89 6b 79 58 | 38 06 3d 6d 3a 0d 5a f4 15 d2 e5 2d e2 a7 62 75 | 05 00 00 10 04 00 00 00 c0 00 01 00 ff ff ff 00 | 00 00 00 10 04 00 00 00 c0 00 02 00 ff ff ff 00 | 00 00 00 00 00 00 00 00 00 00 00 00 | got payload 0x100 (ISAKMP_NEXT_HASH) needed: 0x502 opt: 0x200030 | ***parse ISAKMP Hash Payload: | next payload type: ISAKMP_NEXT_SA (0x1) | length: 36 (0x24) | got payload 0x2 (ISAKMP_NEXT_SA) needed: 0x402 opt: 0x200030 | ***parse ISAKMP Security Association Payload: | next payload type: ISAKMP_NEXT_NONCE (0xa) | length: 56 (0x38) | DOI: ISAKMP_DOI_IPSEC (0x1) | got payload 0x400 (ISAKMP_NEXT_NONCE) needed: 0x400 opt: 0x200030 | ***parse ISAKMP Nonce Payload: | next payload type: ISAKMP_NEXT_KE (0x4) | length: 36 (0x24) | got payload 0x10 (ISAKMP_NEXT_KE) needed: 0x0 opt: 0x200030 | ***parse ISAKMP Key Exchange Payload: | next payload type: ISAKMP_NEXT_ID (0x5) | length: 260 (0x104) | got payload 0x20 (ISAKMP_NEXT_ID) needed: 0x0 opt: 0x200030 | ***parse ISAKMP Identification Payload (IPsec DOI): | next payload type: ISAKMP_NEXT_ID (0x5) | length: 16 (0x10) | ID type: ID_IPV4_ADDR_SUBNET (0x4) | Protocol ID: 0 (0x0) | port: 0 (0x0) | obj: c0 00 01 00 ff ff ff 00 | got payload 0x20 (ISAKMP_NEXT_ID) needed: 0x0 opt: 0x200030 | ***parse ISAKMP Identification Payload (IPsec DOI): | next payload type: ISAKMP_NEXT_NONE (0x0) | length: 16 (0x10) | ID type: ID_IPV4_ADDR_SUBNET (0x4) | Protocol ID: 0 (0x0) | port: 0 (0x0) | obj: c0 00 02 00 ff ff ff 00 | removing 12 bytes of padding | HASH(1) PRF sha2_256 init SKEYID_a-key@0x56080aee2f70 (size 32) | HASH(1): SKEYID_a-key@0x56080aee2f70 (32-bytes, EXTRACT_KEY_FROM_KEY) | key-offset: 0, key-size: 32 | EXTRACT_KEY_FROM_KEY: | target: SHA256_HMAC | flags: SIGN | key_size: 32-bytes | base: base-key@0x56080aee2f70 (32-bytes, EXTRACT_KEY_FROM_KEY) | operation: FLAGS_ONLY | params: 8-bytes@0x7fff508feb48 | result: clone-key@0x7f83d8009640 (32-bytes, SHA256_HMAC) | HASH(1) prf: created sha2_256 context 0x56080aee6220 from SKEYID_a-key@0x7f83d8009640 | HASH(1) prf: begin sha2_256 with context 0x56080aee6220 from SKEYID_a-key@0x7f83d8009640 | HASH(1): release clone-key@0x7f83d8009640 | HASH(1) PRF sha2_256 crypt-prf@0x56080af015f0 | HASH(1) PRF sha2_256 update M-ID-bytes@0x7fff508fec2c (length 4) | d9 d2 08 cd | HASH(1) PRF sha2_256 update Ni_b-bytes@0x7f83e4004190 (length 32) | b7 87 a8 1c 7e 8e 08 46 c7 91 ba c0 44 1f 0b b0 | 6e 66 81 b9 55 b3 5a 24 a0 e8 84 20 92 87 00 ec | HASH(1) PRF sha2_256 update payload-bytes@0x56080af06a30 (length 384) | 0a 00 00 38 00 00 00 01 00 00 00 01 00 00 00 2c | 00 03 04 01 45 ec 10 4f 00 00 00 20 00 0c 00 00 | 80 03 00 0e 80 04 00 01 80 01 00 01 80 02 70 80 | 80 05 00 02 80 06 00 80 04 00 00 24 b7 79 51 b8 | 86 24 80 c2 ef 6d 55 26 21 b7 80 3f d6 ca d2 61 | 2a a4 73 9a 75 2c 8e a0 c5 8b 48 e9 05 00 01 04 | 87 07 ec ec e5 90 9d c7 3b 37 cb 01 8a cf 79 1b | 54 99 23 c2 70 bf 5a 2e da 8e 4e b6 7a c5 b9 05 | e3 ef dd 9f 07 03 6a b5 17 da 39 34 64 bb c6 83 | 7a d8 f1 cd e4 98 8e 8c fd 65 3b 18 42 b7 5f da | 82 75 d9 aa c2 ea 33 a0 04 57 16 52 89 af b5 13 | ed af b5 b5 73 9a fa 68 a6 a4 45 74 22 14 c5 92 | 9d 18 4d a8 04 e5 f9 b8 4e 09 d6 3d 09 35 61 d8 | 75 0c 00 c4 c8 53 cb f0 60 33 fb e9 37 7e 0d 01 | 8c c5 6a 9e 72 ef 4f 73 9e 5f c6 06 8f 98 f8 9c | 83 cf 52 19 ea 31 2a 93 6d 60 e5 2d fb a2 c7 b8 | 9c 4a b5 50 5c ac 48 1f ca eb c7 93 92 6c 71 ac | ec 36 b1 61 04 51 ec ec c8 e7 23 a3 19 50 bd 4a | 5c 50 52 87 cf 5b c9 0e 30 63 96 5c c6 4f d9 92 | d9 bf 2f c8 9f da 80 9f 0c b5 4c d0 3d 39 23 ef | 78 4c 5c 0f b9 9a 3b fa de 58 6e b3 89 6b 79 58 | 38 06 3d 6d 3a 0d 5a f4 15 d2 e5 2d e2 a7 62 75 | 05 00 00 10 04 00 00 00 c0 00 01 00 ff ff ff 00 | 00 00 00 10 04 00 00 00 c0 00 02 00 ff ff ff 00 | HASH(1) PRF sha2_256 final-bytes@0x7fff508fecb0 (length 32) | 2e 34 6f 59 6c 1e 04 00 85 37 31 00 e3 f9 bf f1 | 45 bf 9d d5 99 d7 fd e8 b4 91 cd 6e 70 b8 90 dd | quick_inR1_outI2 HASH(2): | 2e 34 6f 59 6c 1e 04 00 85 37 31 00 e3 f9 bf f1 | 45 bf 9d d5 99 d7 fd e8 b4 91 cd 6e 70 b8 90 dd | received 'quick_inR1_outI2' message HASH(2) data ok | ****parse IPsec DOI SIT: | IPsec DOI SIT: SIT_IDENTITY_ONLY (0x1) | ****parse ISAKMP Proposal Payload: | next payload type: ISAKMP_NEXT_NONE (0x0) | length: 44 (0x2c) | proposal number: 0 (0x0) | protocol ID: PROTO_IPSEC_ESP (0x3) | SPI size: 4 (0x4) | number of transforms: 1 (0x1) | parsing 4 raw bytes of ISAKMP Proposal Payload into SPI | SPI 45 ec 10 4f | *****parse ISAKMP Transform Payload (ESP): | next payload type: ISAKMP_NEXT_NONE (0x0) | length: 32 (0x20) | ESP transform number: 0 (0x0) | ESP transform ID: ESP_AES (0xc) | encryption ike_alg_lookup_by_id id: AES=12, found AES_CBC | ******parse ISAKMP IPsec DOI attribute: | af+type: AF+GROUP_DESCRIPTION (0x8003) | length/value: 14 (0xe) | [14 is OAKLEY_GROUP_MODP2048] | DH ike_alg_lookup_by_id id: MODP2048=14, found MODP2048 | ******parse ISAKMP IPsec DOI attribute: | af+type: AF+ENCAPSULATION_MODE (0x8004) | length/value: 1 (0x1) | [1 is ENCAPSULATION_MODE_TUNNEL] | NAT-T non-encap: Installing IPsec SA without ENCAP, st->hidden_variables.st_nat_traversal is none | ******parse ISAKMP IPsec DOI attribute: | af+type: AF+SA_LIFE_TYPE (0x8001) | length/value: 1 (0x1) | [1 is SA_LIFE_TYPE_SECONDS] | ******parse ISAKMP IPsec DOI attribute: | af+type: AF+SA_LIFE_DURATION (variable length) (0x8002) | length/value: 28800 (0x7080) | ******parse ISAKMP IPsec DOI attribute: | af+type: AF+AUTH_ALGORITHM (0x8005) | length/value: 2 (0x2) | [2 is AUTH_ALGORITHM_HMAC_SHA1] | integrity ike_alg_lookup_by_id id: HMAC_SHA1=2, found HMAC_SHA1_96 | ******parse ISAKMP IPsec DOI attribute: | af+type: AF+KEY_LENGTH (0x8006) | length/value: 128 (0x80) | ESP IPsec Transform verified unconditionally; no alg_info to check against | DH public value received: | 87 07 ec ec e5 90 9d c7 3b 37 cb 01 8a cf 79 1b | 54 99 23 c2 70 bf 5a 2e da 8e 4e b6 7a c5 b9 05 | e3 ef dd 9f 07 03 6a b5 17 da 39 34 64 bb c6 83 | 7a d8 f1 cd e4 98 8e 8c fd 65 3b 18 42 b7 5f da | 82 75 d9 aa c2 ea 33 a0 04 57 16 52 89 af b5 13 | ed af b5 b5 73 9a fa 68 a6 a4 45 74 22 14 c5 92 | 9d 18 4d a8 04 e5 f9 b8 4e 09 d6 3d 09 35 61 d8 | 75 0c 00 c4 c8 53 cb f0 60 33 fb e9 37 7e 0d 01 | 8c c5 6a 9e 72 ef 4f 73 9e 5f c6 06 8f 98 f8 9c | 83 cf 52 19 ea 31 2a 93 6d 60 e5 2d fb a2 c7 b8 | 9c 4a b5 50 5c ac 48 1f ca eb c7 93 92 6c 71 ac | ec 36 b1 61 04 51 ec ec c8 e7 23 a3 19 50 bd 4a | 5c 50 52 87 cf 5b c9 0e 30 63 96 5c c6 4f d9 92 | d9 bf 2f c8 9f da 80 9f 0c b5 4c d0 3d 39 23 ef | 78 4c 5c 0f b9 9a 3b fa de 58 6e b3 89 6b 79 58 | 38 06 3d 6d 3a 0d 5a f4 15 d2 e5 2d e2 a7 62 75 | started looking for secret for @west->@east of kind PKK_PSK | actually looking for secret for @west->@east of kind PKK_PSK | line 1: key type PKK_PSK(@west) to type PKK_RSA | concluding with best_match=000 best=(nil) (lineno=-1) | no PreShared Key Found | DH secret MODP2048@0x7f83e4000d60: transferring ownership from state #2 to helper IKEv1 DH | adding quick outI2 DH work-order 6 for state #2 | state #2 requesting EVENT_RETRANSMIT to be deleted | #2 STATE_QUICK_I1: retransmits: cleared | libevent_free: release ptr-libevent@0x7f83e0004f00 | free_event_entry: release EVENT_RETRANSMIT-pe@0x56080aeffa20 | event_schedule: new EVENT_CRYPTO_TIMEOUT-pe@0x56080aeffa20 | inserting event EVENT_CRYPTO_TIMEOUT, timeout in 60 seconds for #2 | libevent_malloc: new ptr-libevent@0x7f83e0004f00 size 128 | crypto helper 2 resuming | crypto helper 2 starting work-order 6 for state #2 | crypto helper 2 doing compute dh (V1 Phase 2 PFS) (quick outI2 DH); request ID 6 | peer's g: 87 07 ec ec e5 90 9d c7 3b 37 cb 01 8a cf 79 1b | peer's g: 54 99 23 c2 70 bf 5a 2e da 8e 4e b6 7a c5 b9 05 | peer's g: e3 ef dd 9f 07 03 6a b5 17 da 39 34 64 bb c6 83 | peer's g: 7a d8 f1 cd e4 98 8e 8c fd 65 3b 18 42 b7 5f da | peer's g: 82 75 d9 aa c2 ea 33 a0 04 57 16 52 89 af b5 13 | peer's g: ed af b5 b5 73 9a fa 68 a6 a4 45 74 22 14 c5 92 | peer's g: 9d 18 4d a8 04 e5 f9 b8 4e 09 d6 3d 09 35 61 d8 | peer's g: 75 0c 00 c4 c8 53 cb f0 60 33 fb e9 37 7e 0d 01 | peer's g: 8c c5 6a 9e 72 ef 4f 73 9e 5f c6 06 8f 98 f8 9c | peer's g: 83 cf 52 19 ea 31 2a 93 6d 60 e5 2d fb a2 c7 b8 | peer's g: 9c 4a b5 50 5c ac 48 1f ca eb c7 93 92 6c 71 ac | peer's g: ec 36 b1 61 04 51 ec ec c8 e7 23 a3 19 50 bd 4a | peer's g: 5c 50 52 87 cf 5b c9 0e 30 63 96 5c c6 4f d9 92 | peer's g: d9 bf 2f c8 9f da 80 9f 0c b5 4c d0 3d 39 23 ef | peer's g: 78 4c 5c 0f b9 9a 3b fa de 58 6e b3 89 6b 79 58 | peer's g: 38 06 3d 6d 3a 0d 5a f4 15 d2 e5 2d e2 a7 62 75 | Started DH shared-secret computation in NSS: | new : g_ir-key@0x7f83d8009640 (256-bytes, CONCATENATE_DATA_AND_BASE) | DH secret MODP2048@0x7f83e4000d60: computed shared DH secret key@0x7f83d8009640 | dh-shared : g^ir-key@0x7f83d8009640 (256-bytes, CONCATENATE_DATA_AND_BASE) | crypto helper 2 finished compute dh (V1 Phase 2 PFS) (quick outI2 DH); request ID 6 time elapsed 0.000933 seconds | crypto helper 2 sending results from work-order 6 for state #2 to event queue | scheduling resume sending helper answer for #2 | libevent_malloc: new ptr-libevent@0x7f83d0001ef0 size 128 | crypto helper 2 waiting (nothing to do) | complete v1 state transition with STF_SUSPEND | [RE]START processing: state #2 connection "westnets-eastnet/1x0" from 192.1.2.23:500 (in complete_v1_state_transition() at ikev1.c:2624) | suspending state #2 and saving MD | #2 is busy; has a suspended MD | stop processing: from 192.1.2.23:500 (BACKGROUND) (in process_md() at demux.c:380) | stop processing: state #2 connection "westnets-eastnet/1x0" from 192.1.2.23:500 (in process_md() at demux.c:382) | processing: STOP connection NULL (in process_md() at demux.c:383) | processing resume sending helper answer for #3 | start processing: state #3 connection "westnets-eastnet/2x0" from 192.1.2.23:500 (in resume_handler() at server.c:797) | crypto helper 5 replies to request ID 5 | calling continuation function 0x56080990f630 | quick_inR1_outI2_continue for #3: calculated ke+nonce, calculating DH | **emit ISAKMP Message: | initiator cookie: | 3c e4 38 3f ed 34 7c e6 | responder cookie: | 29 82 ac 69 b5 22 4f 63 | next payload type: ISAKMP_NEXT_NONE (0x0) | ISAKMP version: ISAKMP Version 1.0 (rfc2407) (0x10) | exchange type: ISAKMP_XCHG_QUICK (0x20) | flags: ISAKMP_FLAG_v1_ENCRYPTION (0x1) | Message ID: 3456748169 (0xce09ca89) | next payload chain: saving message location 'ISAKMP Message'.'next payload type' | DH secret MODP2048@0x7f83d8000d60: transferring ownership from helper IKEv1 DH to state #3 | parsing 4 raw bytes of ISAKMP Identification Payload (IPsec DOI) into ID address | ID address c0 00 0b 00 | parsing 4 raw bytes of ISAKMP Identification Payload (IPsec DOI) into ID mask | ID mask ff ff ff 00 | our client is subnet 192.0.11.0/24 | our client protocol/port is 0/0 | parsing 4 raw bytes of ISAKMP Identification Payload (IPsec DOI) into ID address | ID address c0 00 02 00 | parsing 4 raw bytes of ISAKMP Identification Payload (IPsec DOI) into ID mask | ID mask ff ff ff 00 | peer client is subnet 192.0.2.0/24 | peer client protocol/port is 0/0 | ***emit ISAKMP Hash Payload: | next payload type: ISAKMP_NEXT_NONE (0x0) | next payload chain: setting previous 'ISAKMP Message'.'next payload type' to current ISAKMP Hash Payload (8:ISAKMP_NEXT_HASH) | next payload chain: saving location 'ISAKMP Hash Payload'.'next payload type' in 'reply packet' | emitting 32 zero bytes of HASH DATA into ISAKMP Hash Payload | emitting length of ISAKMP Hash Payload: 36 | HASH(1) PRF sha2_256 init SKEYID_a-key@0x56080aee2f70 (size 32) | HASH(1): SKEYID_a-key@0x56080aee2f70 (32-bytes, EXTRACT_KEY_FROM_KEY) | key-offset: 0, key-size: 32 | EXTRACT_KEY_FROM_KEY: | target: SHA256_HMAC | flags: SIGN | key_size: 32-bytes | base: base-key@0x56080aee2f70 (32-bytes, EXTRACT_KEY_FROM_KEY) | operation: FLAGS_ONLY | params: 8-bytes@0x7fff508fe628 | result: clone-key@0x7f83e4007fa0 (32-bytes, SHA256_HMAC) | HASH(1) prf: created sha2_256 context 0x56080aee6220 from SKEYID_a-key@0x7f83e4007fa0 | HASH(1) prf: begin sha2_256 with context 0x56080aee6220 from SKEYID_a-key@0x7f83e4007fa0 | HASH(1): release clone-key@0x7f83e4007fa0 | HASH(1) PRF sha2_256 crypt-prf@0x56080af01110 | HASH(1) PRF sha2_256 update 0-byte@0x0 (0) | 00 | HASH(1) PRF sha2_256 update M-ID-bytes@0x7fff508fe70c (length 4) | ce 09 ca 89 | HASH(1) PRF sha2_256 update Ni_b-bytes@0x7f83d8005830 (length 32) | e1 12 49 b3 fd 77 92 7e 73 9a a9 b4 ea 9d 0d 2a | 8d 04 cc d5 e8 85 37 a6 44 2d 0f 8c 5a ad 96 4e | HASH(1) PRF sha2_256 update Nr_b-bytes@0x56080aefe530 (length 32) | 04 1b cd 3a dd b3 c5 4b 41 e8 b4 e7 6a 3a c6 95 | 44 c5 bb a1 fd 32 1f 74 d6 f1 73 51 1b cb 81 a8 | HASH(1) PRF sha2_256 final-bytes@0x560809a0e960 (length 32) | bb 83 49 bf ae 78 fc 50 3b 8a 93 51 a7 62 7d d7 | 60 03 ec 9c 6a 3c 06 91 95 b3 1c 67 46 26 7e 6b | quick_inR1_outI2 HASH(3): | bb 83 49 bf ae 78 fc 50 3b 8a 93 51 a7 62 7d d7 | 60 03 ec 9c 6a 3c 06 91 95 b3 1c 67 46 26 7e 6b | compute_proto_keymat: needed_len (after ESP enc)=16 | compute_proto_keymat: needed_len (after ESP auth)=36 | hmac PRF sha2_256 init symkey-key@0x56080aeea0c0 (size 32) | hmac: symkey-key@0x56080aeea0c0 (32-bytes, EXTRACT_KEY_FROM_KEY) | key-offset: 0, key-size: 32 | EXTRACT_KEY_FROM_KEY: | target: SHA256_HMAC | flags: SIGN | key_size: 32-bytes | base: base-key@0x56080aeea0c0 (32-bytes, EXTRACT_KEY_FROM_KEY) | operation: FLAGS_ONLY | params: 8-bytes@0x7fff508fe5a8 | result: clone-key@0x7f83e4007fa0 (32-bytes, SHA256_HMAC) | hmac prf: created sha2_256 context 0x56080aee6220 from symkey-key@0x7f83e4007fa0 | hmac prf: begin sha2_256 with context 0x56080aee6220 from symkey-key@0x7f83e4007fa0 | hmac: release clone-key@0x7f83e4007fa0 | hmac PRF sha2_256 crypt-prf@0x56080af010d0 | hmac PRF sha2_256 init symkey-key@0x56080aeea0c0 (size 32) | hmac: symkey-key@0x56080aeea0c0 (32-bytes, EXTRACT_KEY_FROM_KEY) | key-offset: 0, key-size: 32 | EXTRACT_KEY_FROM_KEY: | target: SHA256_HMAC | flags: SIGN | key_size: 32-bytes | base: base-key@0x56080aeea0c0 (32-bytes, EXTRACT_KEY_FROM_KEY) | operation: FLAGS_ONLY | params: 8-bytes@0x7fff508fe5a8 | result: clone-key@0x56080af09fc0 (32-bytes, SHA256_HMAC) | hmac prf: created sha2_256 context 0x56080aee60d0 from symkey-key@0x56080af09fc0 | hmac prf: begin sha2_256 with context 0x56080aee60d0 from symkey-key@0x56080af09fc0 | hmac: release clone-key@0x56080af09fc0 | hmac PRF sha2_256 crypt-prf@0x56080aeff410 | hmac PRF sha2_256 update g^xy-key@0x7f83e8006900 (size 256) | hmac: g^xy-key@0x7f83e8006900 (256-bytes, CONCATENATE_DATA_AND_BASE) | nss hmac digest hack extracting all 256 bytes of key@0x7f83e8006900 | nss hmac digest hack: symkey-key@0x7f83e8006900 (256-bytes, CONCATENATE_DATA_AND_BASE) | : ephemeral-key@0x56080ae63080 (16-bytes, AES_KEY_GEN) | nss hmac digest hack: new slot-key@0x56080aee6cc0 (256-bytes, CONCATENATE_DATA_AND_BASE) | sizeof bytes 256 | wrapper: (SECItemType)1351606816: 6b ffffff91 ffffff99 ffffffed 7a 10 09 fffffff6 2d ffffffe9 4d 20 ffffffa5 20 1c ffffffdc 2a 6e ffffffd4 ffffffd1 4b ffffff84 3e fffffff9 6d ffffffca 5b fffffff6 ffffff80 ffffffa4 ffffffad ffffff8e 1b ffffffd3 34 4f 28 ffffff88 ffffffde ffffff8e ffffffc6 ffffffd8 ffffffdc 18 70 58 75 ffffffc2 ffffffdc 2d 44 40 ffffff92 7f ffffff99 ffffffbb fffffffb 23 ffffffea ffffffd7 77 ffffffeb ffffffb5 7a ffffffe3 14 4d ffffffe8 fffffff9 ffffff80 fffffff6 ffffffcc ffffff9b ffffff8e 41 31 ffffffac 0f ffffffa3 ffffffd5 24 ffffffb3 04 3d ffffffb7 ffffffd4 6c ffffffe6 15 fffffff1 ffffffe1 ffffffc2 6e 0d fffffff6 fffffff7 ffffffe9 ffffffab 61 ffffffbb 3d 41 ffffff88 ffffffa3 68 ffffffbe 60 07 ffffff91 ffffffeb ffffffb6 ffffffea ffffffb1 3e 5f 01 77 fffffffb 6c ffffffa1 ffffff9e fffffffc 5d ffffffc8 25 fffffff9 fffffff5 26 ffffffe2 1c 4a ffffffb2 52 ffffffaf 75 ffffffb2 ffffffd8 39 3f 5e 6d ffffffdd 64 fffffffe 50 ffffffdb ffffffc5 33 19 ffffffd2 2e f | nss hmac digest hack: release slot-key-key@0x56080aee6cc0 | nss hmac digest hack extracted len 256 bytes at 0x56080af15510 | unwrapped: 75 fb 24 59 b5 05 84 87 80 30 6e e7 00 9b 85 a1 | unwrapped: 55 eb d6 53 9f 35 ef 5a 45 18 6c 83 df 7e 79 53 | unwrapped: fc ec a6 ef 4f 04 f7 3d cf 8f 8d d8 d4 ed 7c 07 | unwrapped: 0d f0 da 38 17 3e 7b 04 02 6e 81 70 51 f9 61 3d | unwrapped: 38 b3 ed 6b 67 5c f6 6d 0f 65 a1 84 a9 38 82 e8 | unwrapped: bc 2a c7 2e 77 89 52 19 d3 6b 38 76 d4 55 02 be | unwrapped: 53 27 21 1d ab 42 d8 2c ed 21 ed 5c 2a fe 00 d4 | unwrapped: 84 5d e4 65 1c bc 18 0b 9c 8b 50 2b 98 83 32 31 | unwrapped: 0f cc 5f cc 5f 3a e5 04 fe 8b 46 40 06 71 e9 42 | unwrapped: 32 6f 34 c9 17 d7 32 96 f6 5c a3 83 b1 71 9f 63 | unwrapped: df 33 16 5f 19 f4 10 71 21 bc eb d6 e4 45 b5 b2 | unwrapped: 04 87 1f 47 ab 62 7d 27 e2 45 f6 53 f2 74 53 2a | unwrapped: f8 3b 40 6c ae e8 01 3f d9 a3 92 d1 c3 38 be 4f | unwrapped: 38 a0 b7 f6 78 30 cb 8a 11 5f 6e d8 ec cb a0 ee | unwrapped: fd ab 8c fe 24 5c cc 4c 28 fc 34 5c ca 04 bc 78 | unwrapped: 5d ca 53 d1 59 4b 31 51 b7 7d d4 f5 2d 95 b5 63 | hmac PRF sha2_256 update g^xy-key@0x7f83e8006900 (size 256) | hmac: g^xy-key@0x7f83e8006900 (256-bytes, CONCATENATE_DATA_AND_BASE) | nss hmac digest hack extracting all 256 bytes of key@0x7f83e8006900 | nss hmac digest hack: symkey-key@0x7f83e8006900 (256-bytes, CONCATENATE_DATA_AND_BASE) | : ephemeral-key@0x56080ae63080 (16-bytes, AES_KEY_GEN) | nss hmac digest hack: new slot-key@0x56080aee6cc0 (256-bytes, CONCATENATE_DATA_AND_BASE) | sizeof bytes 256 | wrapper: (SECItemType)1351606816: 6b ffffff91 ffffff99 ffffffed 7a 10 09 fffffff6 2d ffffffe9 4d 20 ffffffa5 20 1c ffffffdc 2a 6e ffffffd4 ffffffd1 4b ffffff84 3e fffffff9 6d ffffffca 5b fffffff6 ffffff80 ffffffa4 ffffffad ffffff8e 1b ffffffd3 34 4f 28 ffffff88 ffffffde ffffff8e ffffffc6 ffffffd8 ffffffdc 18 70 58 75 ffffffc2 ffffffdc 2d 44 40 ffffff92 7f ffffff99 ffffffbb fffffffb 23 ffffffea ffffffd7 77 ffffffeb ffffffb5 7a ffffffe3 14 4d ffffffe8 fffffff9 ffffff80 fffffff6 ffffffcc ffffff9b ffffff8e 41 31 ffffffac 0f ffffffa3 ffffffd5 24 ffffffb3 04 3d ffffffb7 ffffffd4 6c ffffffe6 15 fffffff1 ffffffe1 ffffffc2 6e 0d fffffff6 fffffff7 ffffffe9 ffffffab 61 ffffffbb 3d 41 ffffff88 ffffffa3 68 ffffffbe 60 07 ffffff91 ffffffeb ffffffb6 ffffffea ffffffb1 3e 5f 01 77 fffffffb 6c ffffffa1 ffffff9e fffffffc 5d ffffffc8 25 fffffff9 fffffff5 26 ffffffe2 1c 4a ffffffb2 52 ffffffaf 75 ffffffb2 ffffffd8 39 3f 5e 6d ffffffdd 64 fffffffe 50 ffffffdb ffffffc5 33 19 ffffffd2 2e f | nss hmac digest hack: release slot-key-key@0x56080aee6cc0 | nss hmac digest hack extracted len 256 bytes at 0x56080af15400 | unwrapped: 75 fb 24 59 b5 05 84 87 80 30 6e e7 00 9b 85 a1 | unwrapped: 55 eb d6 53 9f 35 ef 5a 45 18 6c 83 df 7e 79 53 | unwrapped: fc ec a6 ef 4f 04 f7 3d cf 8f 8d d8 d4 ed 7c 07 | unwrapped: 0d f0 da 38 17 3e 7b 04 02 6e 81 70 51 f9 61 3d | unwrapped: 38 b3 ed 6b 67 5c f6 6d 0f 65 a1 84 a9 38 82 e8 | unwrapped: bc 2a c7 2e 77 89 52 19 d3 6b 38 76 d4 55 02 be | unwrapped: 53 27 21 1d ab 42 d8 2c ed 21 ed 5c 2a fe 00 d4 | unwrapped: 84 5d e4 65 1c bc 18 0b 9c 8b 50 2b 98 83 32 31 | unwrapped: 0f cc 5f cc 5f 3a e5 04 fe 8b 46 40 06 71 e9 42 | unwrapped: 32 6f 34 c9 17 d7 32 96 f6 5c a3 83 b1 71 9f 63 | unwrapped: df 33 16 5f 19 f4 10 71 21 bc eb d6 e4 45 b5 b2 | unwrapped: 04 87 1f 47 ab 62 7d 27 e2 45 f6 53 f2 74 53 2a | unwrapped: f8 3b 40 6c ae e8 01 3f d9 a3 92 d1 c3 38 be 4f | unwrapped: 38 a0 b7 f6 78 30 cb 8a 11 5f 6e d8 ec cb a0 ee | unwrapped: fd ab 8c fe 24 5c cc 4c 28 fc 34 5c ca 04 bc 78 | unwrapped: 5d ca 53 d1 59 4b 31 51 b7 7d d4 f5 2d 95 b5 63 | hmac PRF sha2_256 update data-bytes@0x7fff508fe6dc (length 1) | 03 | hmac PRF sha2_256 update data-bytes@0x7fff508fe6dc (length 1) | 03 | hmac PRF sha2_256 update data-bytes@0x56080af0c068 (length 4) | 1d 23 a0 34 | hmac PRF sha2_256 update data-bytes@0x56080af0c048 (length 4) | c7 e7 75 c9 | hmac PRF sha2_256 update data-bytes@0x7f83d8005830 (length 32) | e1 12 49 b3 fd 77 92 7e 73 9a a9 b4 ea 9d 0d 2a | 8d 04 cc d5 e8 85 37 a6 44 2d 0f 8c 5a ad 96 4e | hmac PRF sha2_256 update data-bytes@0x7f83d8005830 (length 32) | e1 12 49 b3 fd 77 92 7e 73 9a a9 b4 ea 9d 0d 2a | 8d 04 cc d5 e8 85 37 a6 44 2d 0f 8c 5a ad 96 4e | hmac PRF sha2_256 update data-bytes@0x56080aefe530 (length 32) | 04 1b cd 3a dd b3 c5 4b 41 e8 b4 e7 6a 3a c6 95 | 44 c5 bb a1 fd 32 1f 74 d6 f1 73 51 1b cb 81 a8 | hmac PRF sha2_256 update data-bytes@0x56080aefe530 (length 32) | 04 1b cd 3a dd b3 c5 4b 41 e8 b4 e7 6a 3a c6 95 | 44 c5 bb a1 fd 32 1f 74 d6 f1 73 51 1b cb 81 a8 | hmac PRF sha2_256 final-bytes@0x56080aefe3f0 (length 32) | 22 99 19 0f 71 fc e4 70 7f bb 60 a2 a4 c2 a5 73 | 5e d5 7a ff 38 c8 a8 34 94 ef c9 4b 4c 0a ad 85 | hmac PRF sha2_256 final-bytes@0x56080af01260 (length 32) | e7 ad a1 03 40 cb 67 48 45 87 1b c2 e6 85 9c 4f | ea 43 61 f8 6c b9 61 33 db 41 e0 b1 18 32 af 00 | hmac PRF sha2_256 init symkey-key@0x56080aeea0c0 (size 32) | hmac: symkey-key@0x56080aeea0c0 (32-bytes, EXTRACT_KEY_FROM_KEY) | key-offset: 0, key-size: 32 | EXTRACT_KEY_FROM_KEY: | target: SHA256_HMAC | flags: SIGN | key_size: 32-bytes | base: base-key@0x56080aeea0c0 (32-bytes, EXTRACT_KEY_FROM_KEY) | operation: FLAGS_ONLY | params: 8-bytes@0x7fff508fe5a8 | result: clone-key@0x56080af09fc0 (32-bytes, SHA256_HMAC) | hmac prf: created sha2_256 context 0x56080aee60d0 from symkey-key@0x56080af09fc0 | hmac prf: begin sha2_256 with context 0x56080aee60d0 from symkey-key@0x56080af09fc0 | hmac: release clone-key@0x56080af09fc0 | hmac PRF sha2_256 crypt-prf@0x56080af010d0 | hmac PRF sha2_256 init symkey-key@0x56080aeea0c0 (size 32) | hmac: symkey-key@0x56080aeea0c0 (32-bytes, EXTRACT_KEY_FROM_KEY) | key-offset: 0, key-size: 32 | EXTRACT_KEY_FROM_KEY: | target: SHA256_HMAC | flags: SIGN | key_size: 32-bytes | base: base-key@0x56080aeea0c0 (32-bytes, EXTRACT_KEY_FROM_KEY) | operation: FLAGS_ONLY | params: 8-bytes@0x7fff508fe5a8 | result: clone-key@0x7f83e4007fa0 (32-bytes, SHA256_HMAC) | hmac prf: created sha2_256 context 0x56080aee6220 from symkey-key@0x7f83e4007fa0 | hmac prf: begin sha2_256 with context 0x56080aee6220 from symkey-key@0x7f83e4007fa0 | hmac: release clone-key@0x7f83e4007fa0 | hmac PRF sha2_256 crypt-prf@0x56080af00e30 | hmac PRF sha2_256 update data-bytes@0x56080aefe3f0 (length 32) | 22 99 19 0f 71 fc e4 70 7f bb 60 a2 a4 c2 a5 73 | 5e d5 7a ff 38 c8 a8 34 94 ef c9 4b 4c 0a ad 85 | hmac PRF sha2_256 update data-bytes@0x56080af01260 (length 32) | e7 ad a1 03 40 cb 67 48 45 87 1b c2 e6 85 9c 4f | ea 43 61 f8 6c b9 61 33 db 41 e0 b1 18 32 af 00 | hmac PRF sha2_256 update g^xy-key@0x7f83e8006900 (size 256) | hmac: g^xy-key@0x7f83e8006900 (256-bytes, CONCATENATE_DATA_AND_BASE) | nss hmac digest hack extracting all 256 bytes of key@0x7f83e8006900 | nss hmac digest hack: symkey-key@0x7f83e8006900 (256-bytes, CONCATENATE_DATA_AND_BASE) | : ephemeral-key@0x56080ae63080 (16-bytes, AES_KEY_GEN) | nss hmac digest hack: new slot-key@0x56080aee6cc0 (256-bytes, CONCATENATE_DATA_AND_BASE) | sizeof bytes 256 | wrapper: (SECItemType)1351606816: 6b ffffff91 ffffff99 ffffffed 7a 10 09 fffffff6 2d ffffffe9 4d 20 ffffffa5 20 1c ffffffdc 2a 6e ffffffd4 ffffffd1 4b ffffff84 3e fffffff9 6d ffffffca 5b fffffff6 ffffff80 ffffffa4 ffffffad ffffff8e 1b ffffffd3 34 4f 28 ffffff88 ffffffde ffffff8e ffffffc6 ffffffd8 ffffffdc 18 70 58 75 ffffffc2 ffffffdc 2d 44 40 ffffff92 7f ffffff99 ffffffbb fffffffb 23 ffffffea ffffffd7 77 ffffffeb ffffffb5 7a ffffffe3 14 4d ffffffe8 fffffff9 ffffff80 fffffff6 ffffffcc ffffff9b ffffff8e 41 31 ffffffac 0f ffffffa3 ffffffd5 24 ffffffb3 04 3d ffffffb7 ffffffd4 6c ffffffe6 15 fffffff1 ffffffe1 ffffffc2 6e 0d fffffff6 fffffff7 ffffffe9 ffffffab 61 ffffffbb 3d 41 ffffff88 ffffffa3 68 ffffffbe 60 07 ffffff91 ffffffeb ffffffb6 ffffffea ffffffb1 3e 5f 01 77 fffffffb 6c ffffffa1 ffffff9e fffffffc 5d ffffffc8 25 fffffff9 fffffff5 26 ffffffe2 1c 4a ffffffb2 52 ffffffaf 75 ffffffb2 ffffffd8 39 3f 5e 6d ffffffdd 64 fffffffe 50 ffffffdb ffffffc5 33 19 ffffffd2 2e f | nss hmac digest hack: release slot-key-key@0x56080aee6cc0 | nss hmac digest hack extracted len 256 bytes at 0x56080af152f0 | unwrapped: 75 fb 24 59 b5 05 84 87 80 30 6e e7 00 9b 85 a1 | unwrapped: 55 eb d6 53 9f 35 ef 5a 45 18 6c 83 df 7e 79 53 | unwrapped: fc ec a6 ef 4f 04 f7 3d cf 8f 8d d8 d4 ed 7c 07 | unwrapped: 0d f0 da 38 17 3e 7b 04 02 6e 81 70 51 f9 61 3d | unwrapped: 38 b3 ed 6b 67 5c f6 6d 0f 65 a1 84 a9 38 82 e8 | unwrapped: bc 2a c7 2e 77 89 52 19 d3 6b 38 76 d4 55 02 be | unwrapped: 53 27 21 1d ab 42 d8 2c ed 21 ed 5c 2a fe 00 d4 | unwrapped: 84 5d e4 65 1c bc 18 0b 9c 8b 50 2b 98 83 32 31 | unwrapped: 0f cc 5f cc 5f 3a e5 04 fe 8b 46 40 06 71 e9 42 | unwrapped: 32 6f 34 c9 17 d7 32 96 f6 5c a3 83 b1 71 9f 63 | unwrapped: df 33 16 5f 19 f4 10 71 21 bc eb d6 e4 45 b5 b2 | unwrapped: 04 87 1f 47 ab 62 7d 27 e2 45 f6 53 f2 74 53 2a | unwrapped: f8 3b 40 6c ae e8 01 3f d9 a3 92 d1 c3 38 be 4f | unwrapped: 38 a0 b7 f6 78 30 cb 8a 11 5f 6e d8 ec cb a0 ee | unwrapped: fd ab 8c fe 24 5c cc 4c 28 fc 34 5c ca 04 bc 78 | unwrapped: 5d ca 53 d1 59 4b 31 51 b7 7d d4 f5 2d 95 b5 63 | hmac PRF sha2_256 update g^xy-key@0x7f83e8006900 (size 256) | hmac: g^xy-key@0x7f83e8006900 (256-bytes, CONCATENATE_DATA_AND_BASE) | nss hmac digest hack extracting all 256 bytes of key@0x7f83e8006900 | nss hmac digest hack: symkey-key@0x7f83e8006900 (256-bytes, CONCATENATE_DATA_AND_BASE) | : ephemeral-key@0x56080ae63080 (16-bytes, AES_KEY_GEN) | nss hmac digest hack: new slot-key@0x56080aee6cc0 (256-bytes, CONCATENATE_DATA_AND_BASE) | sizeof bytes 256 | wrapper: (SECItemType)1351606816: 6b ffffff91 ffffff99 ffffffed 7a 10 09 fffffff6 2d ffffffe9 4d 20 ffffffa5 20 1c ffffffdc 2a 6e ffffffd4 ffffffd1 4b ffffff84 3e fffffff9 6d ffffffca 5b fffffff6 ffffff80 ffffffa4 ffffffad ffffff8e 1b ffffffd3 34 4f 28 ffffff88 ffffffde ffffff8e ffffffc6 ffffffd8 ffffffdc 18 70 58 75 ffffffc2 ffffffdc 2d 44 40 ffffff92 7f ffffff99 ffffffbb fffffffb 23 ffffffea ffffffd7 77 ffffffeb ffffffb5 7a ffffffe3 14 4d ffffffe8 fffffff9 ffffff80 fffffff6 ffffffcc ffffff9b ffffff8e 41 31 ffffffac 0f ffffffa3 ffffffd5 24 ffffffb3 04 3d ffffffb7 ffffffd4 6c ffffffe6 15 fffffff1 ffffffe1 ffffffc2 6e 0d fffffff6 fffffff7 ffffffe9 ffffffab 61 ffffffbb 3d 41 ffffff88 ffffffa3 68 ffffffbe 60 07 ffffff91 ffffffeb ffffffb6 ffffffea ffffffb1 3e 5f 01 77 fffffffb 6c ffffffa1 ffffff9e fffffffc 5d ffffffc8 25 fffffff9 fffffff5 26 ffffffe2 1c 4a ffffffb2 52 ffffffaf 75 ffffffb2 ffffffd8 39 3f 5e 6d ffffffdd 64 fffffffe 50 ffffffdb ffffffc5 33 19 ffffffd2 2e f | nss hmac digest hack: release slot-key-key@0x56080aee6cc0 | nss hmac digest hack extracted len 256 bytes at 0x56080af099c0 | unwrapped: 75 fb 24 59 b5 05 84 87 80 30 6e e7 00 9b 85 a1 | unwrapped: 55 eb d6 53 9f 35 ef 5a 45 18 6c 83 df 7e 79 53 | unwrapped: fc ec a6 ef 4f 04 f7 3d cf 8f 8d d8 d4 ed 7c 07 | unwrapped: 0d f0 da 38 17 3e 7b 04 02 6e 81 70 51 f9 61 3d | unwrapped: 38 b3 ed 6b 67 5c f6 6d 0f 65 a1 84 a9 38 82 e8 | unwrapped: bc 2a c7 2e 77 89 52 19 d3 6b 38 76 d4 55 02 be | unwrapped: 53 27 21 1d ab 42 d8 2c ed 21 ed 5c 2a fe 00 d4 | unwrapped: 84 5d e4 65 1c bc 18 0b 9c 8b 50 2b 98 83 32 31 | unwrapped: 0f cc 5f cc 5f 3a e5 04 fe 8b 46 40 06 71 e9 42 | unwrapped: 32 6f 34 c9 17 d7 32 96 f6 5c a3 83 b1 71 9f 63 | unwrapped: df 33 16 5f 19 f4 10 71 21 bc eb d6 e4 45 b5 b2 | unwrapped: 04 87 1f 47 ab 62 7d 27 e2 45 f6 53 f2 74 53 2a | unwrapped: f8 3b 40 6c ae e8 01 3f d9 a3 92 d1 c3 38 be 4f | unwrapped: 38 a0 b7 f6 78 30 cb 8a 11 5f 6e d8 ec cb a0 ee | unwrapped: fd ab 8c fe 24 5c cc 4c 28 fc 34 5c ca 04 bc 78 | unwrapped: 5d ca 53 d1 59 4b 31 51 b7 7d d4 f5 2d 95 b5 63 | hmac PRF sha2_256 update data-bytes@0x7fff508fe6dc (length 1) | 03 | hmac PRF sha2_256 update data-bytes@0x7fff508fe6dc (length 1) | 03 | hmac PRF sha2_256 update data-bytes@0x56080af0c068 (length 4) | 1d 23 a0 34 | hmac PRF sha2_256 update data-bytes@0x56080af0c048 (length 4) | c7 e7 75 c9 | hmac PRF sha2_256 update data-bytes@0x7f83d8005830 (length 32) | e1 12 49 b3 fd 77 92 7e 73 9a a9 b4 ea 9d 0d 2a | 8d 04 cc d5 e8 85 37 a6 44 2d 0f 8c 5a ad 96 4e | hmac PRF sha2_256 update data-bytes@0x7f83d8005830 (length 32) | e1 12 49 b3 fd 77 92 7e 73 9a a9 b4 ea 9d 0d 2a | 8d 04 cc d5 e8 85 37 a6 44 2d 0f 8c 5a ad 96 4e | hmac PRF sha2_256 update data-bytes@0x56080aefe530 (length 32) | 04 1b cd 3a dd b3 c5 4b 41 e8 b4 e7 6a 3a c6 95 | 44 c5 bb a1 fd 32 1f 74 d6 f1 73 51 1b cb 81 a8 | hmac PRF sha2_256 update data-bytes@0x56080aefe530 (length 32) | 04 1b cd 3a dd b3 c5 4b 41 e8 b4 e7 6a 3a c6 95 | 44 c5 bb a1 fd 32 1f 74 d6 f1 73 51 1b cb 81 a8 | hmac PRF sha2_256 final-bytes@0x56080aefe410 (length 32) | 8d ad a2 67 58 04 55 08 cd af b3 46 83 31 ae 26 | 50 45 51 ce 74 62 1b f1 6d 9a e4 f8 99 87 3d b5 | hmac PRF sha2_256 final-bytes@0x56080af01280 (length 32) | fb 67 7b bf b9 f2 b3 96 9a 83 cd 8a 5b cd 49 1d | d4 de fd 7e f3 79 c4 e3 a1 24 a0 2f 98 6e 56 c2 | install_ipsec_sa() for #3: inbound and outbound | could_route called for westnets-eastnet/2x0 (kind=CK_PERMANENT) | FOR_EACH_CONNECTION_... in route_owner | conn westnets-eastnet/2x0 mark 0/00000000, 0/00000000 vs | conn westnets-eastnet/2x0 mark 0/00000000, 0/00000000 | conn westnets-eastnet/2x0 mark 0/00000000, 0/00000000 vs | conn westnets-eastnet/1x0 mark 0/00000000, 0/00000000 | route owner of "westnets-eastnet/2x0" unrouted: NULL; eroute owner: NULL | looking for alg with encrypt: AES_CBC keylen: 128 integ: HMAC_SHA1_96 | encrypt AES_CBC keylen=128 transid=12, key_size=16, encryptalg=12 | st->st_esp.keymat_len=36 is encrypt_keymat_size=16 + integ_keymat_size=20 | setting IPsec SA replay-window to 32 | NIC esp-hw-offload not for connection 'westnets-eastnet/2x0' not available on interface eth1 | netlink: enabling tunnel mode | netlink: setting IPsec SA replay-window to 32 using old-style req | netlink: esp-hw-offload not set for IPsec SA | netlink response for Add SA esp.c7e775c9@192.1.2.23 included non-error error | set up outgoing SA, ref=0/0 | looking for alg with encrypt: AES_CBC keylen: 128 integ: HMAC_SHA1_96 | encrypt AES_CBC keylen=128 transid=12, key_size=16, encryptalg=12 | st->st_esp.keymat_len=36 is encrypt_keymat_size=16 + integ_keymat_size=20 | setting IPsec SA replay-window to 32 | NIC esp-hw-offload not for connection 'westnets-eastnet/2x0' not available on interface eth1 | netlink: enabling tunnel mode | netlink: setting IPsec SA replay-window to 32 using old-style req | netlink: esp-hw-offload not set for IPsec SA | netlink response for Add SA esp.1d23a034@192.1.2.45 included non-error error | priority calculation of connection "westnets-eastnet/2x0" is 0xfe7e7 | add inbound eroute 192.0.2.0/24:0 --0-> 192.0.11.0/24:0 => tun.10000@192.1.2.45 (raw_eroute) | IPsec Sa SPD priority set to 1042407 | raw_eroute result=success | set up incoming SA, ref=0/0 | sr for #3: unrouted | route_and_eroute() for proto 0, and source port 0 dest port 0 | FOR_EACH_CONNECTION_... in route_owner | conn westnets-eastnet/2x0 mark 0/00000000, 0/00000000 vs | conn westnets-eastnet/2x0 mark 0/00000000, 0/00000000 | conn westnets-eastnet/2x0 mark 0/00000000, 0/00000000 vs | conn westnets-eastnet/1x0 mark 0/00000000, 0/00000000 | route owner of "westnets-eastnet/2x0" unrouted: NULL; eroute owner: NULL | route_and_eroute with c: westnets-eastnet/2x0 (next: none) ero:null esr:{(nil)} ro:null rosr:{(nil)} and state: #3 | priority calculation of connection "westnets-eastnet/2x0" is 0xfe7e7 | eroute_connection add eroute 192.0.11.0/24:0 --0-> 192.0.2.0/24:0 => tun.0@192.1.2.23 (raw_eroute) | IPsec Sa SPD priority set to 1042407 | raw_eroute result=success | running updown command "ipsec _updown" for verb up | command executing up-client | executing up-client: PLUTO_VERB='up-client' PLUTO_VERSION='2.0' PLUTO_CONNECTION='westnets-eastnet/2x0' PLUTO_INTERFACE='eth1' PLUTO_NEXT_HOP='192.1.2.23' PLUTO_ME='192.1.2.45' PLUTO_MY_ID='@west' PLUTO_MY_CLIENT='192.0.11.0/24' PLUTO_MY_CLIENT_NET='192.0.11.0' PLUTO_MY_CLIENT_MASK='255.255.255.0' PLUTO_MY_PORT='0' PLUTO_MY_PROTOCOL='0' PLUTO_SA_REQID='16392' PLUTO_SA_TYPE='ESP' PLUTO_PEER='192.1.2.23' PLUTO_PEER_ID='@east' PLUTO_PEER_CLIENT='192.0.2.0/24' PLUTO_PEER_CLIENT_NET='192.0.2.0' PLUTO_PEER_CLIENT_MASK='255.255.255.0' PLUTO_PEER_PORT='0' PLUTO_PEER_PROTOCOL='0' PLUTO_PEER_CA='' PLUTO_STACK='netkey' PLUTO_ADDTIME='0' PLUTO_CONN_POLICY='RSASIG+ENCRYPT+TUNNEL+PFS+UP+IKEV1_ALLOW+SAREF_TRACK+IKE_FRAG_ALLOW+ESN_NO' PLUTO_CONN_KIND='CK_PERMANENT' PLUTO_CONN_ADDRFAMILY='ipv4' XAUTH_FAILED=0 PLUTO_IS_PEER_CISCO='0' PLUTO_PEER_DNS_INFO='' PLUTO_PEER_DOMAIN_INFO='' PLUTO_PEER_BANNER='' PLUTO_CFG_SERVER='0' PLUTO_CFG_CLIENT='0' PLUTO_NM_CONFIGURED='0' VTI_IFACE='' VTI_ROUTING='no' VTI_SHARED='no' SPI_IN= | popen cmd is 1044 chars long | cmd( 0):PLUTO_VERB='up-client' PLUTO_VERSION='2.0' PLUTO_CONNECTION='westnets-eastnet/2x: | cmd( 80):0' PLUTO_INTERFACE='eth1' PLUTO_NEXT_HOP='192.1.2.23' PLUTO_ME='192.1.2.45' PLUT: | cmd( 160):O_MY_ID='@west' PLUTO_MY_CLIENT='192.0.11.0/24' PLUTO_MY_CLIENT_NET='192.0.11.0': | cmd( 240): PLUTO_MY_CLIENT_MASK='255.255.255.0' PLUTO_MY_PORT='0' PLUTO_MY_PROTOCOL='0' PL: | cmd( 320):UTO_SA_REQID='16392' PLUTO_SA_TYPE='ESP' PLUTO_PEER='192.1.2.23' PLUTO_PEER_ID=': | cmd( 400):@east' PLUTO_PEER_CLIENT='192.0.2.0/24' PLUTO_PEER_CLIENT_NET='192.0.2.0' PLUTO_: | cmd( 480):PEER_CLIENT_MASK='255.255.255.0' PLUTO_PEER_PORT='0' PLUTO_PEER_PROTOCOL='0' PLU: | cmd( 560):TO_PEER_CA='' PLUTO_STACK='netkey' PLUTO_ADDTIME='0' PLUTO_CONN_POLICY='RSASIG+E: | cmd( 640):NCRYPT+TUNNEL+PFS+UP+IKEV1_ALLOW+SAREF_TRACK+IKE_FRAG_ALLOW+ESN_NO' PLUTO_CONN_K: | cmd( 720):IND='CK_PERMANENT' PLUTO_CONN_ADDRFAMILY='ipv4' XAUTH_FAILED=0 PLUTO_IS_PEER_CIS: | cmd( 800):CO='0' PLUTO_PEER_DNS_INFO='' PLUTO_PEER_DOMAIN_INFO='' PLUTO_PEER_BANNER='' PLU: | cmd( 880):TO_CFG_SERVER='0' PLUTO_CFG_CLIENT='0' PLUTO_NM_CONFIGURED='0' VTI_IFACE='' VTI_: | cmd( 960):ROUTING='no' VTI_SHARED='no' SPI_IN=0xc7e775c9 SPI_OUT=0x1d23a034 ipsec _updown : | cmd(1040):2>&1: | route_and_eroute: firewall_notified: true | running updown command "ipsec _updown" for verb prepare | command executing prepare-client | executing prepare-client: PLUTO_VERB='prepare-client' PLUTO_VERSION='2.0' PLUTO_CONNECTION='westnets-eastnet/2x0' PLUTO_INTERFACE='eth1' PLUTO_NEXT_HOP='192.1.2.23' PLUTO_ME='192.1.2.45' PLUTO_MY_ID='@west' PLUTO_MY_CLIENT='192.0.11.0/24' PLUTO_MY_CLIENT_NET='192.0.11.0' PLUTO_MY_CLIENT_MASK='255.255.255.0' PLUTO_MY_PORT='0' PLUTO_MY_PROTOCOL='0' PLUTO_SA_REQID='16392' PLUTO_SA_TYPE='ESP' PLUTO_PEER='192.1.2.23' PLUTO_PEER_ID='@east' PLUTO_PEER_CLIENT='192.0.2.0/24' PLUTO_PEER_CLIENT_NET='192.0.2.0' PLUTO_PEER_CLIENT_MASK='255.255.255.0' PLUTO_PEER_PORT='0' PLUTO_PEER_PROTOCOL='0' PLUTO_PEER_CA='' PLUTO_STACK='netkey' PLUTO_ADDTIME='0' PLUTO_CONN_POLICY='RSASIG+ENCRYPT+TUNNEL+PFS+UP+IKEV1_ALLOW+SAREF_TRACK+IKE_FRAG_ALLOW+ESN_NO' PLUTO_CONN_KIND='CK_PERMANENT' PLUTO_CONN_ADDRFAMILY='ipv4' XAUTH_FAILED=0 PLUTO_IS_PEER_CISCO='0' PLUTO_PEER_DNS_INFO='' PLUTO_PEER_DOMAIN_INFO='' PLUTO_PEER_BANNER='' PLUTO_CFG_SERVER='0' PLUTO_CFG_CLIENT='0' PLUTO_NM_CONFIGURED='0' VTI_IFACE='' VTI_ROUTING='no' VTI_SHARED='n | popen cmd is 1049 chars long | cmd( 0):PLUTO_VERB='prepare-client' PLUTO_VERSION='2.0' PLUTO_CONNECTION='westnets-eastn: | cmd( 80):et/2x0' PLUTO_INTERFACE='eth1' PLUTO_NEXT_HOP='192.1.2.23' PLUTO_ME='192.1.2.45': | cmd( 160): PLUTO_MY_ID='@west' PLUTO_MY_CLIENT='192.0.11.0/24' PLUTO_MY_CLIENT_NET='192.0.: | cmd( 240):11.0' PLUTO_MY_CLIENT_MASK='255.255.255.0' PLUTO_MY_PORT='0' PLUTO_MY_PROTOCOL=': | cmd( 320):0' PLUTO_SA_REQID='16392' PLUTO_SA_TYPE='ESP' PLUTO_PEER='192.1.2.23' PLUTO_PEER: | cmd( 400):_ID='@east' PLUTO_PEER_CLIENT='192.0.2.0/24' PLUTO_PEER_CLIENT_NET='192.0.2.0' P: | cmd( 480):LUTO_PEER_CLIENT_MASK='255.255.255.0' PLUTO_PEER_PORT='0' PLUTO_PEER_PROTOCOL='0: | cmd( 560):' PLUTO_PEER_CA='' PLUTO_STACK='netkey' PLUTO_ADDTIME='0' PLUTO_CONN_POLICY='RSA: | cmd( 640):SIG+ENCRYPT+TUNNEL+PFS+UP+IKEV1_ALLOW+SAREF_TRACK+IKE_FRAG_ALLOW+ESN_NO' PLUTO_C: | cmd( 720):ONN_KIND='CK_PERMANENT' PLUTO_CONN_ADDRFAMILY='ipv4' XAUTH_FAILED=0 PLUTO_IS_PEE: | cmd( 800):R_CISCO='0' PLUTO_PEER_DNS_INFO='' PLUTO_PEER_DOMAIN_INFO='' PLUTO_PEER_BANNER=': | cmd( 880):' PLUTO_CFG_SERVER='0' PLUTO_CFG_CLIENT='0' PLUTO_NM_CONFIGURED='0' VTI_IFACE='': | cmd( 960): VTI_ROUTING='no' VTI_SHARED='no' SPI_IN=0xc7e775c9 SPI_OUT=0x1d23a034 ipsec _up: | cmd(1040):down 2>&1: | running updown command "ipsec _updown" for verb route | command executing route-client | executing route-client: PLUTO_VERB='route-client' PLUTO_VERSION='2.0' PLUTO_CONNECTION='westnets-eastnet/2x0' PLUTO_INTERFACE='eth1' PLUTO_NEXT_HOP='192.1.2.23' PLUTO_ME='192.1.2.45' PLUTO_MY_ID='@west' PLUTO_MY_CLIENT='192.0.11.0/24' PLUTO_MY_CLIENT_NET='192.0.11.0' PLUTO_MY_CLIENT_MASK='255.255.255.0' PLUTO_MY_PORT='0' PLUTO_MY_PROTOCOL='0' PLUTO_SA_REQID='16392' PLUTO_SA_TYPE='ESP' PLUTO_PEER='192.1.2.23' PLUTO_PEER_ID='@east' PLUTO_PEER_CLIENT='192.0.2.0/24' PLUTO_PEER_CLIENT_NET='192.0.2.0' PLUTO_PEER_CLIENT_MASK='255.255.255.0' PLUTO_PEER_PORT='0' PLUTO_PEER_PROTOCOL='0' PLUTO_PEER_CA='' PLUTO_STACK='netkey' PLUTO_ADDTIME='0' PLUTO_CONN_POLICY='RSASIG+ENCRYPT+TUNNEL+PFS+UP+IKEV1_ALLOW+SAREF_TRACK+IKE_FRAG_ALLOW+ESN_NO' PLUTO_CONN_KIND='CK_PERMANENT' PLUTO_CONN_ADDRFAMILY='ipv4' XAUTH_FAILED=0 PLUTO_IS_PEER_CISCO='0' PLUTO_PEER_DNS_INFO='' PLUTO_PEER_DOMAIN_INFO='' PLUTO_PEER_BANNER='' PLUTO_CFG_SERVER='0' PLUTO_CFG_CLIENT='0' PLUTO_NM_CONFIGURED='0' VTI_IFACE='' VTI_ROUTING='no' VTI_SHARED='no' S | popen cmd is 1047 chars long | cmd( 0):PLUTO_VERB='route-client' PLUTO_VERSION='2.0' PLUTO_CONNECTION='westnets-eastnet: | cmd( 80):/2x0' PLUTO_INTERFACE='eth1' PLUTO_NEXT_HOP='192.1.2.23' PLUTO_ME='192.1.2.45' P: | cmd( 160):LUTO_MY_ID='@west' PLUTO_MY_CLIENT='192.0.11.0/24' PLUTO_MY_CLIENT_NET='192.0.11: | cmd( 240):.0' PLUTO_MY_CLIENT_MASK='255.255.255.0' PLUTO_MY_PORT='0' PLUTO_MY_PROTOCOL='0': | cmd( 320): PLUTO_SA_REQID='16392' PLUTO_SA_TYPE='ESP' PLUTO_PEER='192.1.2.23' PLUTO_PEER_I: | cmd( 400):D='@east' PLUTO_PEER_CLIENT='192.0.2.0/24' PLUTO_PEER_CLIENT_NET='192.0.2.0' PLU: | cmd( 480):TO_PEER_CLIENT_MASK='255.255.255.0' PLUTO_PEER_PORT='0' PLUTO_PEER_PROTOCOL='0' : | cmd( 560):PLUTO_PEER_CA='' PLUTO_STACK='netkey' PLUTO_ADDTIME='0' PLUTO_CONN_POLICY='RSASI: | cmd( 640):G+ENCRYPT+TUNNEL+PFS+UP+IKEV1_ALLOW+SAREF_TRACK+IKE_FRAG_ALLOW+ESN_NO' PLUTO_CON: | cmd( 720):N_KIND='CK_PERMANENT' PLUTO_CONN_ADDRFAMILY='ipv4' XAUTH_FAILED=0 PLUTO_IS_PEER_: | cmd( 800):CISCO='0' PLUTO_PEER_DNS_INFO='' PLUTO_PEER_DOMAIN_INFO='' PLUTO_PEER_BANNER='' : | cmd( 880):PLUTO_CFG_SERVER='0' PLUTO_CFG_CLIENT='0' PLUTO_NM_CONFIGURED='0' VTI_IFACE='' V: | cmd( 960):TI_ROUTING='no' VTI_SHARED='no' SPI_IN=0xc7e775c9 SPI_OUT=0x1d23a034 ipsec _updo: | cmd(1040):wn 2>&1: | route_and_eroute: instance "westnets-eastnet/2x0", setting eroute_owner {spd=0x56080aeff5c0,sr=0x56080aeff5c0} to #3 (was #0) (newest_ipsec_sa=#0) | encrypting: 00 00 00 24 bb 83 49 bf ae 78 fc 50 3b 8a 93 51 | encrypting: a7 62 7d d7 60 03 ec 9c 6a 3c 06 91 95 b3 1c 67 | encrypting: 46 26 7e 6b | IV: 95 3c 38 79 e4 7d ed a0 08 fc 4a c2 c0 87 80 d8 | unpadded size is: 36 | emitting 12 zero bytes of encryption padding into ISAKMP Message | encrypting 48 using AES_CBC | no IKEv1 message padding required | emitting length of ISAKMP Message: 76 | NSS ike_alg_nss_cbc: aes - enter | NSS ike_alg_nss_cbc: aes - exit | next IV: e0 4c 3f 86 3b ab a0 f8 71 0a 57 32 b0 a1 c9 c9 | inR1_outI2: instance westnets-eastnet/2x0[0], setting IKEv1 newest_ipsec_sa to #3 (was #0) (spd.eroute=#3) cloned from #1 | DPD: dpd_init() called on IPsec SA | DPD: Peer does not support Dead Peer Detection | complete v1 state transition with STF_OK | [RE]START processing: state #3 connection "westnets-eastnet/2x0" from 192.1.2.23:500 (in complete_v1_state_transition() at ikev1.c:2649) | #3 is idle | doing_xauth:no, t_xauth_client_done:no | IKEv1: transition from state STATE_QUICK_I1 to state STATE_QUICK_I2 | child state #3: QUICK_I1(established CHILD SA) => QUICK_I2(established CHILD SA) | event_already_set, deleting event | state #3 requesting EVENT_CRYPTO_TIMEOUT to be deleted | libevent_free: release ptr-libevent@0x56080af00da0 | free_event_entry: release EVENT_CRYPTO_TIMEOUT-pe@0x56080af00a30 | sending reply packet to 192.1.2.23:500 (from 192.1.2.45:500) | sending 76 bytes for STATE_QUICK_I1 through eth1 from 192.1.2.45:500 to 192.1.2.23:500 (using #3) | 3c e4 38 3f ed 34 7c e6 29 82 ac 69 b5 22 4f 63 | 08 10 20 01 ce 09 ca 89 00 00 00 4c 62 ac e4 b9 | bf e3 87 3a 3d 91 4a c5 54 53 5b 46 c2 fd 5b 70 | 21 ee 60 0f a9 fc 4a 5b 83 d9 ca 7a e0 4c 3f 86 | 3b ab a0 f8 71 0a 57 32 b0 a1 c9 c9 | !event_already_set at reschedule | event_schedule: new EVENT_SA_REPLACE-pe@0x56080af00a30 | inserting event EVENT_SA_REPLACE, timeout in 28048 seconds for #3 | libevent_malloc: new ptr-libevent@0x56080af00da0 size 128 | pstats #3 ikev1.ipsec established | NAT-T: encaps is 'auto' "westnets-eastnet/2x0" #3: STATE_QUICK_I2: sent QI2, IPsec SA established tunnel mode {ESP=>0xc7e775c9 <0x1d23a034 xfrm=AES_CBC_128-HMAC_SHA1_96 NATOA=none NATD=none DPD=passive} | modecfg pull: noquirk policy:push not-client | phase 1 is done, looking for phase 2 to unpend | close_any(fd@27) (in release_whack() at state.c:654) | resume sending helper answer for #3 suppresed complete_v1_state_transition() | stop processing: state #3 connection "westnets-eastnet/2x0" from 192.1.2.23:500 (in resume_handler() at server.c:833) | libevent_free: release ptr-libevent@0x7f83dc001ef0 | processing resume sending helper answer for #2 | start processing: state #2 connection "westnets-eastnet/1x0" from 192.1.2.23:500 (in resume_handler() at server.c:797) | crypto helper 2 replies to request ID 6 | calling continuation function 0x56080990f630 | quick_inR1_outI2_continue for #2: calculated ke+nonce, calculating DH | **emit ISAKMP Message: | initiator cookie: | 3c e4 38 3f ed 34 7c e6 | responder cookie: | 29 82 ac 69 b5 22 4f 63 | next payload type: ISAKMP_NEXT_NONE (0x0) | ISAKMP version: ISAKMP Version 1.0 (rfc2407) (0x10) | exchange type: ISAKMP_XCHG_QUICK (0x20) | flags: ISAKMP_FLAG_v1_ENCRYPTION (0x1) | Message ID: 3654420685 (0xd9d208cd) | next payload chain: saving message location 'ISAKMP Message'.'next payload type' | DH secret MODP2048@0x7f83e4000d60: transferring ownership from helper IKEv1 DH to state #2 | parsing 4 raw bytes of ISAKMP Identification Payload (IPsec DOI) into ID address | ID address c0 00 01 00 | parsing 4 raw bytes of ISAKMP Identification Payload (IPsec DOI) into ID mask | ID mask ff ff ff 00 | our client is subnet 192.0.1.0/24 | our client protocol/port is 0/0 | parsing 4 raw bytes of ISAKMP Identification Payload (IPsec DOI) into ID address | ID address c0 00 02 00 | parsing 4 raw bytes of ISAKMP Identification Payload (IPsec DOI) into ID mask | ID mask ff ff ff 00 | peer client is subnet 192.0.2.0/24 | peer client protocol/port is 0/0 | ***emit ISAKMP Hash Payload: | next payload type: ISAKMP_NEXT_NONE (0x0) | next payload chain: setting previous 'ISAKMP Message'.'next payload type' to current ISAKMP Hash Payload (8:ISAKMP_NEXT_HASH) | next payload chain: saving location 'ISAKMP Hash Payload'.'next payload type' in 'reply packet' | emitting 32 zero bytes of HASH DATA into ISAKMP Hash Payload | emitting length of ISAKMP Hash Payload: 36 | HASH(1) PRF sha2_256 init SKEYID_a-key@0x56080aee2f70 (size 32) | HASH(1): SKEYID_a-key@0x56080aee2f70 (32-bytes, EXTRACT_KEY_FROM_KEY) | key-offset: 0, key-size: 32 | EXTRACT_KEY_FROM_KEY: | target: SHA256_HMAC | flags: SIGN | key_size: 32-bytes | base: base-key@0x56080aee2f70 (32-bytes, EXTRACT_KEY_FROM_KEY) | operation: FLAGS_ONLY | params: 8-bytes@0x7fff508fe628 | result: clone-key@0x7f83e4007fa0 (32-bytes, SHA256_HMAC) | HASH(1) prf: created sha2_256 context 0x56080aee6220 from SKEYID_a-key@0x7f83e4007fa0 | HASH(1) prf: begin sha2_256 with context 0x56080aee6220 from SKEYID_a-key@0x7f83e4007fa0 | HASH(1): release clone-key@0x7f83e4007fa0 | HASH(1) PRF sha2_256 crypt-prf@0x56080af00930 | HASH(1) PRF sha2_256 update 0-byte@0x0 (0) | 00 | HASH(1) PRF sha2_256 update M-ID-bytes@0x7fff508fe70c (length 4) | d9 d2 08 cd | HASH(1) PRF sha2_256 update Ni_b-bytes@0x7f83e4004190 (length 32) | b7 87 a8 1c 7e 8e 08 46 c7 91 ba c0 44 1f 0b b0 | 6e 66 81 b9 55 b3 5a 24 a0 e8 84 20 92 87 00 ec | HASH(1) PRF sha2_256 update Nr_b-bytes@0x7f83e0004100 (length 32) | b7 79 51 b8 86 24 80 c2 ef 6d 55 26 21 b7 80 3f | d6 ca d2 61 2a a4 73 9a 75 2c 8e a0 c5 8b 48 e9 | HASH(1) PRF sha2_256 final-bytes@0x560809a0e960 (length 32) | 4a 05 af d8 80 b3 b0 42 5a 64 3a c1 79 c7 cd 98 | d4 8d 78 dc 2d b9 4c 56 4e c7 90 18 a9 3f 27 a5 | quick_inR1_outI2 HASH(3): | 4a 05 af d8 80 b3 b0 42 5a 64 3a c1 79 c7 cd 98 | d4 8d 78 dc 2d b9 4c 56 4e c7 90 18 a9 3f 27 a5 | compute_proto_keymat: needed_len (after ESP enc)=16 | compute_proto_keymat: needed_len (after ESP auth)=36 | hmac PRF sha2_256 init symkey-key@0x56080aeea0c0 (size 32) | hmac: symkey-key@0x56080aeea0c0 (32-bytes, EXTRACT_KEY_FROM_KEY) | key-offset: 0, key-size: 32 | EXTRACT_KEY_FROM_KEY: | target: SHA256_HMAC | flags: SIGN | key_size: 32-bytes | base: base-key@0x56080aeea0c0 (32-bytes, EXTRACT_KEY_FROM_KEY) | operation: FLAGS_ONLY | params: 8-bytes@0x7fff508fe5a8 | result: clone-key@0x7f83e4007fa0 (32-bytes, SHA256_HMAC) | hmac prf: created sha2_256 context 0x56080aee6220 from symkey-key@0x7f83e4007fa0 | hmac prf: begin sha2_256 with context 0x56080aee6220 from symkey-key@0x7f83e4007fa0 | hmac: release clone-key@0x7f83e4007fa0 | hmac PRF sha2_256 crypt-prf@0x56080af01090 | hmac PRF sha2_256 init symkey-key@0x56080aeea0c0 (size 32) | hmac: symkey-key@0x56080aeea0c0 (32-bytes, EXTRACT_KEY_FROM_KEY) | key-offset: 0, key-size: 32 | EXTRACT_KEY_FROM_KEY: | target: SHA256_HMAC | flags: SIGN | key_size: 32-bytes | base: base-key@0x56080aeea0c0 (32-bytes, EXTRACT_KEY_FROM_KEY) | operation: FLAGS_ONLY | params: 8-bytes@0x7fff508fe5a8 | result: clone-key@0x56080af09fc0 (32-bytes, SHA256_HMAC) | hmac prf: created sha2_256 context 0x56080aee60d0 from symkey-key@0x56080af09fc0 | hmac prf: begin sha2_256 with context 0x56080aee60d0 from symkey-key@0x56080af09fc0 | hmac: release clone-key@0x56080af09fc0 | hmac PRF sha2_256 crypt-prf@0x56080af010f0 | hmac PRF sha2_256 update g^xy-key@0x7f83d8009640 (size 256) | hmac: g^xy-key@0x7f83d8009640 (256-bytes, CONCATENATE_DATA_AND_BASE) | nss hmac digest hack extracting all 256 bytes of key@0x7f83d8009640 | nss hmac digest hack: symkey-key@0x7f83d8009640 (256-bytes, CONCATENATE_DATA_AND_BASE) | : ephemeral-key@0x56080ae63080 (16-bytes, AES_KEY_GEN) | nss hmac digest hack: new slot-key@0x56080aee6cc0 (256-bytes, CONCATENATE_DATA_AND_BASE) | sizeof bytes 256 | wrapper: (SECItemType)1351606816: 33 ffffffae ffffffa1 7c 5f 6f fffffffb ffffff84 ffffffbb ffffffa9 5d ffffff9f ffffff83 4a ffffffd6 7d 2a 7e 3c fffffffa 1d ffffffb9 57 fffffff0 fffffff7 ffffffd8 2c 22 ffffffb4 ffffff8f 24 ffffffb1 44 1e 34 3f ffffff85 51 ffffff99 ffffffd8 33 1f 27 24 00 47 41 54 ffffffad ffffffce ffffffb0 40 10 08 7f 13 ffffffa1 ffffff82 4d ffffffb9 3f ffffffaa 0a 06 ffffffeb 14 ffffffc6 6f 49 ffffffbe ffffffcb ffffffab ffffffdd ffffffff 03 63 49 33 ffffff91 56 46 17 ffffffab ffffffe6 38 ffffffde ffffff92 ffffffe7 ffffff84 5c ffffff96 02 35 62 ffffffd1 0f ffffffe9 ffffffd1 ffffffab 6d fffffffc 0e 7b 01 ffffffa2 7d 24 ffffffa8 ffffff8e ffffffc8 1c 64 ffffffe8 ffffffac 4f 0a 67 ffffffe0 ffffffdd 0e 0e ffffff9c 2b 66 0e 1f 15 fffffff5 ffffff9f ffffff93 36 77 ffffff80 74 ffffffe2 7c 0b ffffff87 ffffffc0 ffffffc0 ffffffcc ffffffba 55 4a ffffffb4 ffffff82 14 0b ffffffcf 21 ffffff98 1b ffffffdb 1e 2f ffffffb8 ffffffaf ffffffb4 36 ffffffc8 6d ffffffff 4 | nss hmac digest hack: release slot-key-key@0x56080aee6cc0 | nss hmac digest hack extracted len 256 bytes at 0x56080af0c920 | unwrapped: 5b 52 ab 23 81 4e 14 9a 8d 4f 3f 42 78 d8 85 62 | unwrapped: 86 de 76 82 df 2b 3c ef c4 c4 68 41 8f 84 82 9d | unwrapped: 72 56 16 d5 d0 db 94 f4 03 7a 1f 5d ac 12 0b 90 | unwrapped: 4d 28 5e 80 87 5e 36 7c 79 34 7e 82 47 13 a4 e3 | unwrapped: bc cc 9e d7 1a 45 0a a4 ac 07 4a 8a a3 46 22 dc | unwrapped: 97 35 41 b6 82 03 5a 0c 67 a6 4a f6 24 c1 c2 98 | unwrapped: 39 31 81 f7 8d 6b cb 33 39 05 95 e8 41 d2 fb b6 | unwrapped: 32 28 53 ef 54 8d be 35 a3 48 68 e0 32 d4 c0 8f | unwrapped: 70 87 25 8a d8 f0 e9 ad c5 4d f1 4a e7 21 30 97 | unwrapped: 0d 09 62 6c 73 1c a8 e1 88 97 ae 41 c3 d0 cd 1b | unwrapped: a4 70 81 94 32 a7 32 43 e8 e5 5e 46 a7 47 16 23 | unwrapped: f2 51 bc 90 58 44 0c a6 83 79 0b 2f ac c4 bd 2b | unwrapped: c1 46 1f a6 f7 39 18 f6 43 f0 ef f5 61 7e 81 2e | unwrapped: 9a ed b5 c8 5b 1a 87 3b 9f f3 44 5f 1f b7 24 39 | unwrapped: 33 fd 81 01 e1 1d 78 8d bc bb 26 de 17 13 1a 26 | unwrapped: 33 7b 47 3e ee b6 1c ab 7b b1 2c 52 91 80 9d e9 | hmac PRF sha2_256 update g^xy-key@0x7f83d8009640 (size 256) | hmac: g^xy-key@0x7f83d8009640 (256-bytes, CONCATENATE_DATA_AND_BASE) | nss hmac digest hack extracting all 256 bytes of key@0x7f83d8009640 | nss hmac digest hack: symkey-key@0x7f83d8009640 (256-bytes, CONCATENATE_DATA_AND_BASE) | : ephemeral-key@0x56080ae63080 (16-bytes, AES_KEY_GEN) | nss hmac digest hack: new slot-key@0x56080aee6cc0 (256-bytes, CONCATENATE_DATA_AND_BASE) | sizeof bytes 256 | wrapper: (SECItemType)1351606816: 33 ffffffae ffffffa1 7c 5f 6f fffffffb ffffff84 ffffffbb ffffffa9 5d ffffff9f ffffff83 4a ffffffd6 7d 2a 7e 3c fffffffa 1d ffffffb9 57 fffffff0 fffffff7 ffffffd8 2c 22 ffffffb4 ffffff8f 24 ffffffb1 44 1e 34 3f ffffff85 51 ffffff99 ffffffd8 33 1f 27 24 00 47 41 54 ffffffad ffffffce ffffffb0 40 10 08 7f 13 ffffffa1 ffffff82 4d ffffffb9 3f ffffffaa 0a 06 ffffffeb 14 ffffffc6 6f 49 ffffffbe ffffffcb ffffffab ffffffdd ffffffff 03 63 49 33 ffffff91 56 46 17 ffffffab ffffffe6 38 ffffffde ffffff92 ffffffe7 ffffff84 5c ffffff96 02 35 62 ffffffd1 0f ffffffe9 ffffffd1 ffffffab 6d fffffffc 0e 7b 01 ffffffa2 7d 24 ffffffa8 ffffff8e ffffffc8 1c 64 ffffffe8 ffffffac 4f 0a 67 ffffffe0 ffffffdd 0e 0e ffffff9c 2b 66 0e 1f 15 fffffff5 ffffff9f ffffff93 36 77 ffffff80 74 ffffffe2 7c 0b ffffff87 ffffffc0 ffffffc0 ffffffcc ffffffba 55 4a ffffffb4 ffffff82 14 0b ffffffcf 21 ffffff98 1b ffffffdb 1e 2f ffffffb8 ffffffaf ffffffb4 36 ffffffc8 6d ffffffff 4 | nss hmac digest hack: release slot-key-key@0x56080aee6cc0 | nss hmac digest hack extracted len 256 bytes at 0x56080af15510 | unwrapped: 5b 52 ab 23 81 4e 14 9a 8d 4f 3f 42 78 d8 85 62 | unwrapped: 86 de 76 82 df 2b 3c ef c4 c4 68 41 8f 84 82 9d | unwrapped: 72 56 16 d5 d0 db 94 f4 03 7a 1f 5d ac 12 0b 90 | unwrapped: 4d 28 5e 80 87 5e 36 7c 79 34 7e 82 47 13 a4 e3 | unwrapped: bc cc 9e d7 1a 45 0a a4 ac 07 4a 8a a3 46 22 dc | unwrapped: 97 35 41 b6 82 03 5a 0c 67 a6 4a f6 24 c1 c2 98 | unwrapped: 39 31 81 f7 8d 6b cb 33 39 05 95 e8 41 d2 fb b6 | unwrapped: 32 28 53 ef 54 8d be 35 a3 48 68 e0 32 d4 c0 8f | unwrapped: 70 87 25 8a d8 f0 e9 ad c5 4d f1 4a e7 21 30 97 | unwrapped: 0d 09 62 6c 73 1c a8 e1 88 97 ae 41 c3 d0 cd 1b | unwrapped: a4 70 81 94 32 a7 32 43 e8 e5 5e 46 a7 47 16 23 | unwrapped: f2 51 bc 90 58 44 0c a6 83 79 0b 2f ac c4 bd 2b | unwrapped: c1 46 1f a6 f7 39 18 f6 43 f0 ef f5 61 7e 81 2e | unwrapped: 9a ed b5 c8 5b 1a 87 3b 9f f3 44 5f 1f b7 24 39 | unwrapped: 33 fd 81 01 e1 1d 78 8d bc bb 26 de 17 13 1a 26 | unwrapped: 33 7b 47 3e ee b6 1c ab 7b b1 2c 52 91 80 9d e9 | hmac PRF sha2_256 update data-bytes@0x7fff508fe6dc (length 1) | 03 | hmac PRF sha2_256 update data-bytes@0x7fff508fe6dc (length 1) | 03 | hmac PRF sha2_256 update data-bytes@0x56080af037b8 (length 4) | 66 bd 1d 79 | hmac PRF sha2_256 update data-bytes@0x56080af03798 (length 4) | 45 ec 10 4f | hmac PRF sha2_256 update data-bytes@0x7f83e4004190 (length 32) | b7 87 a8 1c 7e 8e 08 46 c7 91 ba c0 44 1f 0b b0 | 6e 66 81 b9 55 b3 5a 24 a0 e8 84 20 92 87 00 ec | hmac PRF sha2_256 update data-bytes@0x7f83e4004190 (length 32) | b7 87 a8 1c 7e 8e 08 46 c7 91 ba c0 44 1f 0b b0 | 6e 66 81 b9 55 b3 5a 24 a0 e8 84 20 92 87 00 ec | hmac PRF sha2_256 update data-bytes@0x7f83e0004100 (length 32) | b7 79 51 b8 86 24 80 c2 ef 6d 55 26 21 b7 80 3f | d6 ca d2 61 2a a4 73 9a 75 2c 8e a0 c5 8b 48 e9 | hmac PRF sha2_256 update data-bytes@0x7f83e0004100 (length 32) | b7 79 51 b8 86 24 80 c2 ef 6d 55 26 21 b7 80 3f | d6 ca d2 61 2a a4 73 9a 75 2c 8e a0 c5 8b 48 e9 | hmac PRF sha2_256 final-bytes@0x56080af00e50 (length 32) | a4 c6 94 45 02 03 2d 3a 92 42 c6 76 01 b2 c8 25 | 9b 99 9a d2 5c b1 d3 3b 21 7c d9 1b b6 f9 c3 b7 | hmac PRF sha2_256 final-bytes@0x56080af009b0 (length 32) | ac cc d4 24 77 29 61 c4 32 c2 18 7b 98 eb 1a 46 | 20 0c 52 79 b7 c9 98 7a 7c 2c 31 34 7b f8 1e 19 | hmac PRF sha2_256 init symkey-key@0x56080aeea0c0 (size 32) | hmac: symkey-key@0x56080aeea0c0 (32-bytes, EXTRACT_KEY_FROM_KEY) | key-offset: 0, key-size: 32 | EXTRACT_KEY_FROM_KEY: | target: SHA256_HMAC | flags: SIGN | key_size: 32-bytes | base: base-key@0x56080aeea0c0 (32-bytes, EXTRACT_KEY_FROM_KEY) | operation: FLAGS_ONLY | params: 8-bytes@0x7fff508fe5a8 | result: clone-key@0x56080af09fc0 (32-bytes, SHA256_HMAC) | hmac prf: created sha2_256 context 0x56080aee60d0 from symkey-key@0x56080af09fc0 | hmac prf: begin sha2_256 with context 0x56080aee60d0 from symkey-key@0x56080af09fc0 | hmac: release clone-key@0x56080af09fc0 | hmac PRF sha2_256 crypt-prf@0x56080af010d0 | hmac PRF sha2_256 init symkey-key@0x56080aeea0c0 (size 32) | hmac: symkey-key@0x56080aeea0c0 (32-bytes, EXTRACT_KEY_FROM_KEY) | key-offset: 0, key-size: 32 | EXTRACT_KEY_FROM_KEY: | target: SHA256_HMAC | flags: SIGN | key_size: 32-bytes | base: base-key@0x56080aeea0c0 (32-bytes, EXTRACT_KEY_FROM_KEY) | operation: FLAGS_ONLY | params: 8-bytes@0x7fff508fe5a8 | result: clone-key@0x7f83e4007fa0 (32-bytes, SHA256_HMAC) | hmac prf: created sha2_256 context 0x56080aee6220 from symkey-key@0x7f83e4007fa0 | hmac prf: begin sha2_256 with context 0x56080aee6220 from symkey-key@0x7f83e4007fa0 | hmac: release clone-key@0x7f83e4007fa0 | hmac PRF sha2_256 crypt-prf@0x56080af00930 | hmac PRF sha2_256 update data-bytes@0x56080af00e50 (length 32) | a4 c6 94 45 02 03 2d 3a 92 42 c6 76 01 b2 c8 25 | 9b 99 9a d2 5c b1 d3 3b 21 7c d9 1b b6 f9 c3 b7 | hmac PRF sha2_256 update data-bytes@0x56080af009b0 (length 32) | ac cc d4 24 77 29 61 c4 32 c2 18 7b 98 eb 1a 46 | 20 0c 52 79 b7 c9 98 7a 7c 2c 31 34 7b f8 1e 19 | hmac PRF sha2_256 update g^xy-key@0x7f83d8009640 (size 256) | hmac: g^xy-key@0x7f83d8009640 (256-bytes, CONCATENATE_DATA_AND_BASE) | nss hmac digest hack extracting all 256 bytes of key@0x7f83d8009640 | nss hmac digest hack: symkey-key@0x7f83d8009640 (256-bytes, CONCATENATE_DATA_AND_BASE) | : ephemeral-key@0x56080ae63080 (16-bytes, AES_KEY_GEN) | nss hmac digest hack: new slot-key@0x56080aee6cc0 (256-bytes, CONCATENATE_DATA_AND_BASE) | sizeof bytes 256 | wrapper: (SECItemType)1351606816: 33 ffffffae ffffffa1 7c 5f 6f fffffffb ffffff84 ffffffbb ffffffa9 5d ffffff9f ffffff83 4a ffffffd6 7d 2a 7e 3c fffffffa 1d ffffffb9 57 fffffff0 fffffff7 ffffffd8 2c 22 ffffffb4 ffffff8f 24 ffffffb1 44 1e 34 3f ffffff85 51 ffffff99 ffffffd8 33 1f 27 24 00 47 41 54 ffffffad ffffffce ffffffb0 40 10 08 7f 13 ffffffa1 ffffff82 4d ffffffb9 3f ffffffaa 0a 06 ffffffeb 14 ffffffc6 6f 49 ffffffbe ffffffcb ffffffab ffffffdd ffffffff 03 63 49 33 ffffff91 56 46 17 ffffffab ffffffe6 38 ffffffde ffffff92 ffffffe7 ffffff84 5c ffffff96 02 35 62 ffffffd1 0f ffffffe9 ffffffd1 ffffffab 6d fffffffc 0e 7b 01 ffffffa2 7d 24 ffffffa8 ffffff8e ffffffc8 1c 64 ffffffe8 ffffffac 4f 0a 67 ffffffe0 ffffffdd 0e 0e ffffff9c 2b 66 0e 1f 15 fffffff5 ffffff9f ffffff93 36 77 ffffff80 74 ffffffe2 7c 0b ffffff87 ffffffc0 ffffffc0 ffffffcc ffffffba 55 4a ffffffb4 ffffff82 14 0b ffffffcf 21 ffffff98 1b ffffffdb 1e 2f ffffffb8 ffffffaf ffffffb4 36 ffffffc8 6d ffffffff 4 | nss hmac digest hack: release slot-key-key@0x56080aee6cc0 | nss hmac digest hack extracted len 256 bytes at 0x56080af15400 | unwrapped: 5b 52 ab 23 81 4e 14 9a 8d 4f 3f 42 78 d8 85 62 | unwrapped: 86 de 76 82 df 2b 3c ef c4 c4 68 41 8f 84 82 9d | unwrapped: 72 56 16 d5 d0 db 94 f4 03 7a 1f 5d ac 12 0b 90 | unwrapped: 4d 28 5e 80 87 5e 36 7c 79 34 7e 82 47 13 a4 e3 | unwrapped: bc cc 9e d7 1a 45 0a a4 ac 07 4a 8a a3 46 22 dc | unwrapped: 97 35 41 b6 82 03 5a 0c 67 a6 4a f6 24 c1 c2 98 | unwrapped: 39 31 81 f7 8d 6b cb 33 39 05 95 e8 41 d2 fb b6 | unwrapped: 32 28 53 ef 54 8d be 35 a3 48 68 e0 32 d4 c0 8f | unwrapped: 70 87 25 8a d8 f0 e9 ad c5 4d f1 4a e7 21 30 97 | unwrapped: 0d 09 62 6c 73 1c a8 e1 88 97 ae 41 c3 d0 cd 1b | unwrapped: a4 70 81 94 32 a7 32 43 e8 e5 5e 46 a7 47 16 23 | unwrapped: f2 51 bc 90 58 44 0c a6 83 79 0b 2f ac c4 bd 2b | unwrapped: c1 46 1f a6 f7 39 18 f6 43 f0 ef f5 61 7e 81 2e | unwrapped: 9a ed b5 c8 5b 1a 87 3b 9f f3 44 5f 1f b7 24 39 | unwrapped: 33 fd 81 01 e1 1d 78 8d bc bb 26 de 17 13 1a 26 | unwrapped: 33 7b 47 3e ee b6 1c ab 7b b1 2c 52 91 80 9d e9 | hmac PRF sha2_256 update g^xy-key@0x7f83d8009640 (size 256) | hmac: g^xy-key@0x7f83d8009640 (256-bytes, CONCATENATE_DATA_AND_BASE) | nss hmac digest hack extracting all 256 bytes of key@0x7f83d8009640 | nss hmac digest hack: symkey-key@0x7f83d8009640 (256-bytes, CONCATENATE_DATA_AND_BASE) | : ephemeral-key@0x56080ae63080 (16-bytes, AES_KEY_GEN) | nss hmac digest hack: new slot-key@0x56080aee6cc0 (256-bytes, CONCATENATE_DATA_AND_BASE) | sizeof bytes 256 | wrapper: (SECItemType)1351606816: 33 ffffffae ffffffa1 7c 5f 6f fffffffb ffffff84 ffffffbb ffffffa9 5d ffffff9f ffffff83 4a ffffffd6 7d 2a 7e 3c fffffffa 1d ffffffb9 57 fffffff0 fffffff7 ffffffd8 2c 22 ffffffb4 ffffff8f 24 ffffffb1 44 1e 34 3f ffffff85 51 ffffff99 ffffffd8 33 1f 27 24 00 47 41 54 ffffffad ffffffce ffffffb0 40 10 08 7f 13 ffffffa1 ffffff82 4d ffffffb9 3f ffffffaa 0a 06 ffffffeb 14 ffffffc6 6f 49 ffffffbe ffffffcb ffffffab ffffffdd ffffffff 03 63 49 33 ffffff91 56 46 17 ffffffab ffffffe6 38 ffffffde ffffff92 ffffffe7 ffffff84 5c ffffff96 02 35 62 ffffffd1 0f ffffffe9 ffffffd1 ffffffab 6d fffffffc 0e 7b 01 ffffffa2 7d 24 ffffffa8 ffffff8e ffffffc8 1c 64 ffffffe8 ffffffac 4f 0a 67 ffffffe0 ffffffdd 0e 0e ffffff9c 2b 66 0e 1f 15 fffffff5 ffffff9f ffffff93 36 77 ffffff80 74 ffffffe2 7c 0b ffffff87 ffffffc0 ffffffc0 ffffffcc ffffffba 55 4a ffffffb4 ffffff82 14 0b ffffffcf 21 ffffff98 1b ffffffdb 1e 2f ffffffb8 ffffffaf ffffffb4 36 ffffffc8 6d ffffffff 4 | nss hmac digest hack: release slot-key-key@0x56080aee6cc0 | nss hmac digest hack extracted len 256 bytes at 0x56080af152f0 | unwrapped: 5b 52 ab 23 81 4e 14 9a 8d 4f 3f 42 78 d8 85 62 | unwrapped: 86 de 76 82 df 2b 3c ef c4 c4 68 41 8f 84 82 9d | unwrapped: 72 56 16 d5 d0 db 94 f4 03 7a 1f 5d ac 12 0b 90 | unwrapped: 4d 28 5e 80 87 5e 36 7c 79 34 7e 82 47 13 a4 e3 | unwrapped: bc cc 9e d7 1a 45 0a a4 ac 07 4a 8a a3 46 22 dc | unwrapped: 97 35 41 b6 82 03 5a 0c 67 a6 4a f6 24 c1 c2 98 | unwrapped: 39 31 81 f7 8d 6b cb 33 39 05 95 e8 41 d2 fb b6 | unwrapped: 32 28 53 ef 54 8d be 35 a3 48 68 e0 32 d4 c0 8f | unwrapped: 70 87 25 8a d8 f0 e9 ad c5 4d f1 4a e7 21 30 97 | unwrapped: 0d 09 62 6c 73 1c a8 e1 88 97 ae 41 c3 d0 cd 1b | unwrapped: a4 70 81 94 32 a7 32 43 e8 e5 5e 46 a7 47 16 23 | unwrapped: f2 51 bc 90 58 44 0c a6 83 79 0b 2f ac c4 bd 2b | unwrapped: c1 46 1f a6 f7 39 18 f6 43 f0 ef f5 61 7e 81 2e | unwrapped: 9a ed b5 c8 5b 1a 87 3b 9f f3 44 5f 1f b7 24 39 | unwrapped: 33 fd 81 01 e1 1d 78 8d bc bb 26 de 17 13 1a 26 | unwrapped: 33 7b 47 3e ee b6 1c ab 7b b1 2c 52 91 80 9d e9 | hmac PRF sha2_256 update data-bytes@0x7fff508fe6dc (length 1) | 03 | hmac PRF sha2_256 update data-bytes@0x7fff508fe6dc (length 1) | 03 | hmac PRF sha2_256 update data-bytes@0x56080af037b8 (length 4) | 66 bd 1d 79 | hmac PRF sha2_256 update data-bytes@0x56080af03798 (length 4) | 45 ec 10 4f | hmac PRF sha2_256 update data-bytes@0x7f83e4004190 (length 32) | b7 87 a8 1c 7e 8e 08 46 c7 91 ba c0 44 1f 0b b0 | 6e 66 81 b9 55 b3 5a 24 a0 e8 84 20 92 87 00 ec | hmac PRF sha2_256 update data-bytes@0x7f83e4004190 (length 32) | b7 87 a8 1c 7e 8e 08 46 c7 91 ba c0 44 1f 0b b0 | 6e 66 81 b9 55 b3 5a 24 a0 e8 84 20 92 87 00 ec | hmac PRF sha2_256 update data-bytes@0x7f83e0004100 (length 32) | b7 79 51 b8 86 24 80 c2 ef 6d 55 26 21 b7 80 3f | d6 ca d2 61 2a a4 73 9a 75 2c 8e a0 c5 8b 48 e9 | hmac PRF sha2_256 update data-bytes@0x7f83e0004100 (length 32) | b7 79 51 b8 86 24 80 c2 ef 6d 55 26 21 b7 80 3f | d6 ca d2 61 2a a4 73 9a 75 2c 8e a0 c5 8b 48 e9 | hmac PRF sha2_256 final-bytes@0x56080af00e70 (length 32) | 0f 6e 6d 9e 0c c7 4f 48 73 54 7e 3a 30 d2 7c bd | 22 14 b8 65 1b 1c 72 b0 48 43 13 fe 1b d2 44 86 | hmac PRF sha2_256 final-bytes@0x56080af009d0 (length 32) | 9b d1 f8 83 f7 2f 74 c2 87 67 ef f7 0d 6a 14 d7 | c1 25 cf 72 88 98 96 ce 7e 79 8a 3e db 86 83 97 | install_ipsec_sa() for #2: inbound and outbound | could_route called for westnets-eastnet/1x0 (kind=CK_PERMANENT) | FOR_EACH_CONNECTION_... in route_owner | conn westnets-eastnet/1x0 mark 0/00000000, 0/00000000 vs | conn westnets-eastnet/2x0 mark 0/00000000, 0/00000000 | conn westnets-eastnet/1x0 mark 0/00000000, 0/00000000 vs | conn westnets-eastnet/1x0 mark 0/00000000, 0/00000000 | route owner of "westnets-eastnet/1x0" unrouted: "westnets-eastnet/2x0" erouted; eroute owner: NULL | looking for alg with encrypt: AES_CBC keylen: 128 integ: HMAC_SHA1_96 | encrypt AES_CBC keylen=128 transid=12, key_size=16, encryptalg=12 | st->st_esp.keymat_len=36 is encrypt_keymat_size=16 + integ_keymat_size=20 | setting IPsec SA replay-window to 32 | NIC esp-hw-offload not for connection 'westnets-eastnet/1x0' not available on interface eth1 | netlink: enabling tunnel mode | netlink: setting IPsec SA replay-window to 32 using old-style req | netlink: esp-hw-offload not set for IPsec SA | netlink response for Add SA esp.45ec104f@192.1.2.23 included non-error error | set up outgoing SA, ref=0/0 | looking for alg with encrypt: AES_CBC keylen: 128 integ: HMAC_SHA1_96 | encrypt AES_CBC keylen=128 transid=12, key_size=16, encryptalg=12 | st->st_esp.keymat_len=36 is encrypt_keymat_size=16 + integ_keymat_size=20 | setting IPsec SA replay-window to 32 | NIC esp-hw-offload not for connection 'westnets-eastnet/1x0' not available on interface eth1 | netlink: enabling tunnel mode | netlink: setting IPsec SA replay-window to 32 using old-style req | netlink: esp-hw-offload not set for IPsec SA | netlink response for Add SA esp.66bd1d79@192.1.2.45 included non-error error | priority calculation of connection "westnets-eastnet/1x0" is 0xfe7e7 | add inbound eroute 192.0.2.0/24:0 --0-> 192.0.1.0/24:0 => tun.10000@192.1.2.45 (raw_eroute) | IPsec Sa SPD priority set to 1042407 | raw_eroute result=success | set up incoming SA, ref=0/0 | sr for #2: unrouted | route_and_eroute() for proto 0, and source port 0 dest port 0 | FOR_EACH_CONNECTION_... in route_owner | conn westnets-eastnet/1x0 mark 0/00000000, 0/00000000 vs | conn westnets-eastnet/2x0 mark 0/00000000, 0/00000000 | conn westnets-eastnet/1x0 mark 0/00000000, 0/00000000 vs | conn westnets-eastnet/1x0 mark 0/00000000, 0/00000000 | route owner of "westnets-eastnet/1x0" unrouted: "westnets-eastnet/2x0" erouted; eroute owner: NULL | route_and_eroute with c: westnets-eastnet/1x0 (next: none) ero:null esr:{(nil)} ro:westnets-eastnet/2x0 rosr:{0x56080aeff5c0} and state: #2 | priority calculation of connection "westnets-eastnet/1x0" is 0xfe7e7 | eroute_connection add eroute 192.0.1.0/24:0 --0-> 192.0.2.0/24:0 => tun.0@192.1.2.23 (raw_eroute) | IPsec Sa SPD priority set to 1042407 | raw_eroute result=success | running updown command "ipsec _updown" for verb up | command executing up-client | executing up-client: PLUTO_VERB='up-client' PLUTO_VERSION='2.0' PLUTO_CONNECTION='westnets-eastnet/1x0' PLUTO_INTERFACE='eth1' PLUTO_NEXT_HOP='192.1.2.23' PLUTO_ME='192.1.2.45' PLUTO_MY_ID='@west' PLUTO_MY_CLIENT='192.0.1.0/24' PLUTO_MY_CLIENT_NET='192.0.1.0' PLUTO_MY_CLIENT_MASK='255.255.255.0' PLUTO_MY_PORT='0' PLUTO_MY_PROTOCOL='0' PLUTO_SA_REQID='16388' PLUTO_SA_TYPE='ESP' PLUTO_PEER='192.1.2.23' PLUTO_PEER_ID='@east' PLUTO_PEER_CLIENT='192.0.2.0/24' PLUTO_PEER_CLIENT_NET='192.0.2.0' PLUTO_PEER_CLIENT_MASK='255.255.255.0' PLUTO_PEER_PORT='0' PLUTO_PEER_PROTOCOL='0' PLUTO_PEER_CA='' PLUTO_STACK='netkey' PLUTO_ADDTIME='0' PLUTO_CONN_POLICY='RSASIG+ENCRYPT+TUNNEL+PFS+UP+IKEV1_ALLOW+SAREF_TRACK+IKE_FRAG_ALLOW+ESN_NO' PLUTO_CONN_KIND='CK_PERMANENT' PLUTO_CONN_ADDRFAMILY='ipv4' XAUTH_FAILED=0 PLUTO_IS_PEER_CISCO='0' PLUTO_PEER_DNS_INFO='' PLUTO_PEER_DOMAIN_INFO='' PLUTO_PEER_BANNER='' PLUTO_CFG_SERVER='0' PLUTO_CFG_CLIENT='0' PLUTO_NM_CONFIGURED='0' VTI_IFACE='' VTI_ROUTING='no' VTI_SHARED='no' SPI_IN=0x | popen cmd is 1042 chars long | cmd( 0):PLUTO_VERB='up-client' PLUTO_VERSION='2.0' PLUTO_CONNECTION='westnets-eastnet/1x: | cmd( 80):0' PLUTO_INTERFACE='eth1' PLUTO_NEXT_HOP='192.1.2.23' PLUTO_ME='192.1.2.45' PLUT: | cmd( 160):O_MY_ID='@west' PLUTO_MY_CLIENT='192.0.1.0/24' PLUTO_MY_CLIENT_NET='192.0.1.0' P: | cmd( 240):LUTO_MY_CLIENT_MASK='255.255.255.0' PLUTO_MY_PORT='0' PLUTO_MY_PROTOCOL='0' PLUT: | cmd( 320):O_SA_REQID='16388' PLUTO_SA_TYPE='ESP' PLUTO_PEER='192.1.2.23' PLUTO_PEER_ID='@e: | cmd( 400):ast' PLUTO_PEER_CLIENT='192.0.2.0/24' PLUTO_PEER_CLIENT_NET='192.0.2.0' PLUTO_PE: | cmd( 480):ER_CLIENT_MASK='255.255.255.0' PLUTO_PEER_PORT='0' PLUTO_PEER_PROTOCOL='0' PLUTO: | cmd( 560):_PEER_CA='' PLUTO_STACK='netkey' PLUTO_ADDTIME='0' PLUTO_CONN_POLICY='RSASIG+ENC: | cmd( 640):RYPT+TUNNEL+PFS+UP+IKEV1_ALLOW+SAREF_TRACK+IKE_FRAG_ALLOW+ESN_NO' PLUTO_CONN_KIN: | cmd( 720):D='CK_PERMANENT' PLUTO_CONN_ADDRFAMILY='ipv4' XAUTH_FAILED=0 PLUTO_IS_PEER_CISCO: | cmd( 800):='0' PLUTO_PEER_DNS_INFO='' PLUTO_PEER_DOMAIN_INFO='' PLUTO_PEER_BANNER='' PLUTO: | cmd( 880):_CFG_SERVER='0' PLUTO_CFG_CLIENT='0' PLUTO_NM_CONFIGURED='0' VTI_IFACE='' VTI_RO: | cmd( 960):UTING='no' VTI_SHARED='no' SPI_IN=0x45ec104f SPI_OUT=0x66bd1d79 ipsec _updown 2>: | cmd(1040):&1: | route_and_eroute: firewall_notified: true | route_and_eroute: instance "westnets-eastnet/1x0", setting eroute_owner {spd=0x56080aefecf0,sr=0x56080aefecf0} to #2 (was #0) (newest_ipsec_sa=#0) | encrypting: 00 00 00 24 4a 05 af d8 80 b3 b0 42 5a 64 3a c1 | encrypting: 79 c7 cd 98 d4 8d 78 dc 2d b9 4c 56 4e c7 90 18 | encrypting: a9 3f 27 a5 | IV: a1 b5 5c ae aa bf 6b c9 a6 eb 76 9f db 4b c1 a4 | unpadded size is: 36 | emitting 12 zero bytes of encryption padding into ISAKMP Message | encrypting 48 using AES_CBC | no IKEv1 message padding required | emitting length of ISAKMP Message: 76 | NSS ike_alg_nss_cbc: aes - enter | NSS ike_alg_nss_cbc: aes - exit | next IV: c2 1d 22 ff f2 a2 da e0 83 5b 21 ad 0d f0 98 cf | inR1_outI2: instance westnets-eastnet/1x0[0], setting IKEv1 newest_ipsec_sa to #2 (was #0) (spd.eroute=#2) cloned from #1 | DPD: dpd_init() called on IPsec SA | DPD: Peer does not support Dead Peer Detection | complete v1 state transition with STF_OK | [RE]START processing: state #2 connection "westnets-eastnet/1x0" from 192.1.2.23:500 (in complete_v1_state_transition() at ikev1.c:2649) | #2 is idle | doing_xauth:no, t_xauth_client_done:no | IKEv1: transition from state STATE_QUICK_I1 to state STATE_QUICK_I2 | child state #2: QUICK_I1(established CHILD SA) => QUICK_I2(established CHILD SA) | event_already_set, deleting event | state #2 requesting EVENT_CRYPTO_TIMEOUT to be deleted | libevent_free: release ptr-libevent@0x7f83e0004f00 | free_event_entry: release EVENT_CRYPTO_TIMEOUT-pe@0x56080aeffa20 | sending reply packet to 192.1.2.23:500 (from 192.1.2.45:500) | sending 76 bytes for STATE_QUICK_I1 through eth1 from 192.1.2.45:500 to 192.1.2.23:500 (using #2) | 3c e4 38 3f ed 34 7c e6 29 82 ac 69 b5 22 4f 63 | 08 10 20 01 d9 d2 08 cd 00 00 00 4c 6f 5a 81 7a | de 96 de 5e 2f ba e4 1f 66 7c 8a 16 fe 5b 79 26 | ad 41 2b 37 c9 bd 87 86 e0 07 de cf c2 1d 22 ff | f2 a2 da e0 83 5b 21 ad 0d f0 98 cf | !event_already_set at reschedule | event_schedule: new EVENT_SA_REPLACE-pe@0x56080aeffa20 | inserting event EVENT_SA_REPLACE, timeout in 27838 seconds for #2 | libevent_malloc: new ptr-libevent@0x7f83e0004f00 size 128 | pstats #2 ikev1.ipsec established | NAT-T: encaps is 'auto' "westnets-eastnet/1x0" #2: STATE_QUICK_I2: sent QI2, IPsec SA established tunnel mode {ESP=>0x45ec104f <0x66bd1d79 xfrm=AES_CBC_128-HMAC_SHA1_96 NATOA=none NATD=none DPD=passive} | modecfg pull: noquirk policy:push not-client | phase 1 is done, looking for phase 2 to unpend | close_any(fd@28) (in release_whack() at state.c:654) | resume sending helper answer for #2 suppresed complete_v1_state_transition() | stop processing: state #2 connection "westnets-eastnet/1x0" from 192.1.2.23:500 (in resume_handler() at server.c:833) | libevent_free: release ptr-libevent@0x7f83d0001ef0 | processing signal PLUTO_SIGCHLD | waitpid returned ECHILD (no child processes left) | processing signal PLUTO_SIGCHLD | waitpid returned ECHILD (no child processes left) | processing signal PLUTO_SIGCHLD | waitpid returned ECHILD (no child processes left) | processing signal PLUTO_SIGCHLD | waitpid returned ECHILD (no child processes left) | accept(whackctlfd, (struct sockaddr *)&whackaddr, &whackaddrlen) -> fd@16 (in whack_handle() at rcv_whack.c:721) | FOR_EACH_STATE_... in show_traffic_status (sort_states) | FOR_EACH_STATE_... in sort_states | get_sa_info esp.66bd1d79@192.1.2.45 | get_sa_info esp.45ec104f@192.1.2.23 | get_sa_info esp.1d23a034@192.1.2.45 | get_sa_info esp.c7e775c9@192.1.2.23 | close_any(fd@16) (in whack_process() at rcv_whack.c:700) | accept(whackctlfd, (struct sockaddr *)&whackaddr, &whackaddrlen) -> fd@16 (in whack_handle() at rcv_whack.c:721) | FOR_EACH_CONNECTION_... in show_connections_status | FOR_EACH_CONNECTION_... in show_connections_status | FOR_EACH_STATE_... in show_states_status (sort_states) | FOR_EACH_STATE_... in sort_states | get_sa_info esp.66bd1d79@192.1.2.45 | get_sa_info esp.45ec104f@192.1.2.23 | get_sa_info esp.1d23a034@192.1.2.45 | get_sa_info esp.c7e775c9@192.1.2.23 | close_any(fd@16) (in whack_process() at rcv_whack.c:700) | *received 92 bytes from 192.1.2.23:500 on eth1 (192.1.2.45:500) | 3c e4 38 3f ed 34 7c e6 29 82 ac 69 b5 22 4f 63 | 08 10 05 01 48 4f fa bd 00 00 00 5c 6b 93 65 b4 | 49 d0 94 17 01 03 78 c3 28 45 36 68 ea 70 9e 70 | d5 1b b9 3b 1d 91 ed fb 9e c8 0a 6b d1 bd c3 0b | ce 81 1f c6 b0 ea 43 4e 82 0a e5 bb 95 ae ea f5 | 8e af 32 a0 e3 c5 58 70 c8 28 d8 a8 | start processing: from 192.1.2.23:500 (in process_md() at demux.c:378) | **parse ISAKMP Message: | initiator cookie: | 3c e4 38 3f ed 34 7c e6 | responder cookie: | 29 82 ac 69 b5 22 4f 63 | next payload type: ISAKMP_NEXT_HASH (0x8) | ISAKMP version: ISAKMP Version 1.0 (rfc2407) (0x10) | exchange type: ISAKMP_XCHG_INFO (0x5) | flags: ISAKMP_FLAG_v1_ENCRYPTION (0x1) | Message ID: 1213201085 (0x484ffabd) | length: 92 (0x5c) | processing version=1.0 packet with exchange type=ISAKMP_XCHG_INFO (5) | peer and cookies match on #3; msgid=00000000 st_msgid=ce09ca89 st_msgid_phase15=00000000 | peer and cookies match on #2; msgid=00000000 st_msgid=d9d208cd st_msgid_phase15=00000000 | peer and cookies match on #1; msgid=00000000 st_msgid=00000000 st_msgid_phase15=00000000 | p15 state object #1 found, in STATE_MAIN_I4 | State DB: found IKEv1 state #1 in MAIN_I4 (find_v1_info_state) | start processing: state #1 connection "westnets-eastnet/2x0" from 192.1.2.23:500 (in process_v1_packet() at ikev1.c:1455) | last Phase 1 IV: c8 ea e9 b3 51 0b ea 24 90 87 5d b9 c1 a4 ec 95 | current Phase 1 IV: c8 ea e9 b3 51 0b ea 24 90 87 5d b9 c1 a4 ec 95 | Phase 2 IV hash sha2_256 init | Phase 2 IV hash sha2_256 digest PH1_IV-bytes@0x56080af00280 (length 16) | c8 ea e9 b3 51 0b ea 24 90 87 5d b9 c1 a4 ec 95 | Phase 2 IV hash sha2_256 digest MSGID-bytes@0x7fff508fedec (length 4) | 48 4f fa bd | Phase 2 IV hash sha2_256 final bytes@0x56080af00200 (length 32) | 1c c2 3d 23 80 d1 35 2b df 66 fd 60 a6 a6 22 1d | 16 89 ea 88 87 9a 92 49 75 85 d8 4c 2f 04 a3 f6 | #1 is idle | #1 idle | received encrypted packet from 192.1.2.23:500 | decrypting 64 bytes using algorithm AES_CBC | IV before: 1c c2 3d 23 80 d1 35 2b df 66 fd 60 a6 a6 22 1d | NSS ike_alg_nss_cbc: aes - enter | NSS ike_alg_nss_cbc: aes - exit | IV after: 95 ae ea f5 8e af 32 a0 e3 c5 58 70 c8 28 d8 a8 | decrypted payload (starts at offset -64): | 3c e4 38 3f ed 34 7c e6 29 82 ac 69 b5 22 4f 63 | 08 10 05 01 48 4f fa bd 00 00 00 5c 0c 00 00 24 | a4 16 72 e4 79 66 f7 d2 e1 1f cd d3 6c af da 00 | d7 09 de 0a fe 2e c3 db 77 47 e0 1d 09 79 e7 58 | 00 00 00 10 00 00 00 01 03 04 00 01 c7 e7 75 c9 | 00 00 00 00 00 00 00 00 00 00 00 00 | got payload 0x100 (ISAKMP_NEXT_HASH) needed: 0x100 opt: 0x0 | ***parse ISAKMP Hash Payload: | next payload type: ISAKMP_NEXT_D (0xc) | length: 36 (0x24) | got payload 0x1000 (ISAKMP_NEXT_D) needed: 0x0 opt: 0x0 | ***parse ISAKMP Delete Payload: | next payload type: ISAKMP_NEXT_NONE (0x0) | length: 16 (0x10) | DOI: ISAKMP_DOI_IPSEC (0x1) | protocol ID: 3 (0x3) | SPI size: 4 (0x4) | number of SPIs: 1 (0x1) | removing 12 bytes of padding | HASH(1) PRF sha2_256 init SKEYID_a-key@0x56080aee2f70 (size 32) | HASH(1): SKEYID_a-key@0x56080aee2f70 (32-bytes, EXTRACT_KEY_FROM_KEY) | key-offset: 0, key-size: 32 | EXTRACT_KEY_FROM_KEY: | target: SHA256_HMAC | flags: SIGN | key_size: 32-bytes | base: base-key@0x56080aee2f70 (32-bytes, EXTRACT_KEY_FROM_KEY) | operation: FLAGS_ONLY | params: 8-bytes@0x7fff508feb48 | result: clone-key@0x7f83e4007fa0 (32-bytes, SHA256_HMAC) | HASH(1) prf: created sha2_256 context 0x56080aef2390 from SKEYID_a-key@0x7f83e4007fa0 | HASH(1) prf: begin sha2_256 with context 0x56080aef2390 from SKEYID_a-key@0x7f83e4007fa0 | HASH(1): release clone-key@0x7f83e4007fa0 | HASH(1) PRF sha2_256 crypt-prf@0x56080af01090 | HASH(1) PRF sha2_256 update M-ID-bytes@0x7fff508fec2c (length 4) | 48 4f fa bd | HASH(1) PRF sha2_256 update payload-bytes@0x56080aee6260 (length 16) | 00 00 00 10 00 00 00 01 03 04 00 01 c7 e7 75 c9 | HASH(1) PRF sha2_256 final-bytes@0x7fff508fecb0 (length 32) | a4 16 72 e4 79 66 f7 d2 e1 1f cd d3 6c af da 00 | d7 09 de 0a fe 2e c3 db 77 47 e0 1d 09 79 e7 58 | informational HASH(1): | a4 16 72 e4 79 66 f7 d2 e1 1f cd d3 6c af da 00 | d7 09 de 0a fe 2e c3 db 77 47 e0 1d 09 79 e7 58 | received 'informational' message HASH(1) data ok | parsing 4 raw bytes of ISAKMP Delete Payload into SPI | SPI c7 e7 75 c9 | FOR_EACH_STATE_... in find_phase2_state_to_delete | start processing: connection "westnets-eastnet/2x0" (BACKGROUND) (in accept_delete() at ikev1_main.c:2506) "westnets-eastnet/2x0" #1: received Delete SA payload: replace IPsec State #3 now | state #3 requesting EVENT_SA_REPLACE to be deleted | libevent_free: release ptr-libevent@0x56080af00da0 | free_event_entry: release EVENT_SA_REPLACE-pe@0x56080af00a30 | event_schedule: new EVENT_SA_REPLACE-pe@0x56080af00a30 | inserting event EVENT_SA_REPLACE, timeout in 0 seconds for #3 | libevent_malloc: new ptr-libevent@0x56080af00da0 size 128 | stop processing: connection "westnets-eastnet/2x0" (BACKGROUND) (in accept_delete() at ikev1_main.c:2550) | del: | complete v1 state transition with STF_IGNORE | stop processing: from 192.1.2.23:500 (BACKGROUND) (in process_md() at demux.c:380) | stop processing: state #1 connection "westnets-eastnet/2x0" from 192.1.2.23:500 (in process_md() at demux.c:382) | processing: STOP connection NULL (in process_md() at demux.c:383) | timer_event_cb: processing event@0x56080af00a30 | handling event EVENT_SA_REPLACE for child state #3 | start processing: state #3 connection "westnets-eastnet/2x0" from 192.1.2.23:500 (in timer_event_cb() at timer.c:250) | picked newest_ipsec_sa #3 for #3 | replacing stale IPsec SA | dup_any(fd@-1) -> fd@-1 (in ipsecdoi_replace() at ipsec_doi.c:351) | FOR_EACH_STATE_... in find_phase1_state | creating state object #4 at 0x56080af0b2b0 | State DB: adding IKEv1 state #4 in UNDEFINED | pstats #4 ikev1.ipsec started | duplicating state object #1 "westnets-eastnet/2x0" as #4 for IPSEC SA | #4 setting local endpoint to 192.1.2.45:500 from #1.st_localport (in duplicate_state() at state.c:1481) | duplicate_state: reference st_skeyid_nss-key@0x56080aeed4f0 | duplicate_state: reference st_skey_d_nss-key@0x56080aeea0c0 | duplicate_state: reference st_skey_ai_nss-key@0x56080aee2f70 | duplicate_state: reference st_skey_ar_nss-key@NULL | duplicate_state: reference st_skey_ei_nss-key@0x56080aef0b10 | duplicate_state: reference st_skey_er_nss-key@NULL | duplicate_state: reference st_skey_pi_nss-key@NULL | duplicate_state: reference st_skey_pr_nss-key@NULL | duplicate_state: reference st_enc_key_nss-key@0x56080aee47f0 | duplicate_state: reference st_sk_d_no_ppk-key@NULL | duplicate_state: reference st_sk_pi_no_ppk-key@NULL | duplicate_state: reference st_sk_pr_no_ppk-key@NULL | suspend processing: state #3 connection "westnets-eastnet/2x0" from 192.1.2.23:500 (in quick_outI1() at ikev1_quick.c:683) | start processing: state #4 connection "westnets-eastnet/2x0" from 192.1.2.23:500 (in quick_outI1() at ikev1_quick.c:683) | child state #4: UNDEFINED(ignore) => QUICK_I1(established CHILD SA) "westnets-eastnet/2x0" #4: initiating Quick Mode RSASIG+ENCRYPT+TUNNEL+PFS+UP+IKEV1_ALLOW+SAREF_TRACK+IKE_FRAG_ALLOW+ESN_NO to replace #3 {using isakmp#1 msgid:ba31d75c proposal=defaults pfsgroup=MODP2048} | adding quick_outI1 KE work-order 7 for state #4 | event_schedule: new EVENT_CRYPTO_TIMEOUT-pe@0x7f83d8005860 | inserting event EVENT_CRYPTO_TIMEOUT, timeout in 60 seconds for #4 | libevent_malloc: new ptr-libevent@0x7f83d0001ef0 size 128 | stop processing: state #4 connection "westnets-eastnet/2x0" from 192.1.2.23:500 (in quick_outI1() at ikev1_quick.c:762) | resume processing: state #3 connection "westnets-eastnet/2x0" from 192.1.2.23:500 (in quick_outI1() at ikev1_quick.c:762) | event_schedule: new EVENT_SA_EXPIRE-pe@0x7f83e40041c0 | inserting event EVENT_SA_EXPIRE, timeout in 0 seconds for #3 | libevent_malloc: new ptr-libevent@0x7f83dc001ef0 size 128 | libevent_free: release ptr-libevent@0x56080af00da0 | free_event_entry: release EVENT_SA_REPLACE-pe@0x56080af00a30 | stop processing: state #3 connection "westnets-eastnet/2x0" from 192.1.2.23:500 (in timer_event_cb() at timer.c:557) | timer_event_cb: processing event@0x7f83e40041c0 | handling event EVENT_SA_EXPIRE for child state #3 | start processing: state #3 connection "westnets-eastnet/2x0" from 192.1.2.23:500 (in timer_event_cb() at timer.c:250) | picked newest_ipsec_sa #3 for #3 | un-established partial CHILD SA timeout (SA expired) | pstats #3 ikev1.ipsec re-failed exchange-timeout | pstats #3 ikev1.ipsec deleted completed | [RE]START processing: state #3 connection "westnets-eastnet/2x0" from 192.1.2.23:500 (in delete_state() at state.c:879) "westnets-eastnet/2x0" #3: deleting state (STATE_QUICK_I2) aged 8.217s and sending notification | child state #3: QUICK_I2(established CHILD SA) => delete | get_sa_info esp.c7e775c9@192.1.2.23 | get_sa_info esp.1d23a034@192.1.2.45 "westnets-eastnet/2x0" #3: ESP traffic information: in=336B out=336B | #3 send IKEv1 delete notification for STATE_QUICK_I2 | FOR_EACH_STATE_... in find_phase1_state | **emit ISAKMP Message: | initiator cookie: | 3c e4 38 3f ed 34 7c e6 | responder cookie: | 29 82 ac 69 b5 22 4f 63 | next payload type: ISAKMP_NEXT_NONE (0x0) | ISAKMP version: ISAKMP Version 1.0 (rfc2407) (0x10) | exchange type: ISAKMP_XCHG_INFO (0x5) | flags: ISAKMP_FLAG_v1_ENCRYPTION (0x1) | Message ID: 928987392 (0x375f3900) | next payload chain: saving message location 'ISAKMP Message'.'next payload type' | ***emit ISAKMP Hash Payload: | next payload type: ISAKMP_NEXT_NONE (0x0) | next payload chain: setting previous 'ISAKMP Message'.'next payload type' to current ISAKMP Hash Payload (8:ISAKMP_NEXT_HASH) | next payload chain: saving location 'ISAKMP Hash Payload'.'next payload type' in 'delete msg' | emitting 32 zero bytes of HASH DATA into ISAKMP Hash Payload | emitting length of ISAKMP Hash Payload: 36 | ***emit ISAKMP Delete Payload: | next payload type: ISAKMP_NEXT_NONE (0x0) | DOI: ISAKMP_DOI_IPSEC (0x1) | protocol ID: 3 (0x3) | SPI size: 4 (0x4) | number of SPIs: 1 (0x1) | next payload chain: setting previous 'ISAKMP Hash Payload'.'next payload type' to current ISAKMP Delete Payload (12:ISAKMP_NEXT_D) | next payload chain: saving location 'ISAKMP Delete Payload'.'next payload type' in 'delete msg' | emitting 4 raw bytes of delete payload into ISAKMP Delete Payload | delete payload 1d 23 a0 34 | emitting length of ISAKMP Delete Payload: 16 | HASH(1) PRF sha2_256 init SKEYID_a-key@0x56080aee2f70 (size 32) | HASH(1): SKEYID_a-key@0x56080aee2f70 (32-bytes, EXTRACT_KEY_FROM_KEY) | key-offset: 0, key-size: 32 | EXTRACT_KEY_FROM_KEY: | target: SHA256_HMAC | flags: SIGN | key_size: 32-bytes | base: base-key@0x56080aee2f70 (32-bytes, EXTRACT_KEY_FROM_KEY) | operation: FLAGS_ONLY | params: 8-bytes@0x7fff508fc608 | result: clone-key@0x7f83e4007fa0 (32-bytes, SHA256_HMAC) | HASH(1) prf: created sha2_256 context 0x56080aee6220 from SKEYID_a-key@0x7f83e4007fa0 | HASH(1) prf: begin sha2_256 with context 0x56080aee6220 from SKEYID_a-key@0x7f83e4007fa0 | HASH(1): release clone-key@0x7f83e4007fa0 | HASH(1) PRF sha2_256 crypt-prf@0x56080af010d0 | HASH(1) PRF sha2_256 update M-ID-bytes@0x7fff508fc6ec (length 4) | 37 5f 39 00 | HASH(1) PRF sha2_256 update payload-bytes@0x7fff508fcaa0 (length 16) | 00 00 00 10 00 00 00 01 03 04 00 01 1d 23 a0 34 | HASH(1) PRF sha2_256 final-bytes@0x7fff508fca80 (length 32) | ee bf 12 b5 36 71 d5 7d 01 7d 01 c2 88 aa 32 3b | 60 34 c9 db eb 3e 80 2a bd 65 9b ef 45 2e 09 e2 | send delete HASH(1): | ee bf 12 b5 36 71 d5 7d 01 7d 01 c2 88 aa 32 3b | 60 34 c9 db eb 3e 80 2a bd 65 9b ef 45 2e 09 e2 | last Phase 1 IV: c8 ea e9 b3 51 0b ea 24 90 87 5d b9 c1 a4 ec 95 | current Phase 1 IV: c8 ea e9 b3 51 0b ea 24 90 87 5d b9 c1 a4 ec 95 | Phase 2 IV hash sha2_256 init | Phase 2 IV hash sha2_256 digest PH1_IV-bytes@0x56080af00280 (length 16) | c8 ea e9 b3 51 0b ea 24 90 87 5d b9 c1 a4 ec 95 | Phase 2 IV hash sha2_256 digest MSGID-bytes@0x7fff508fc6fc (length 4) | 37 5f 39 00 | Phase 2 IV hash sha2_256 final bytes@0x56080af00200 (length 32) | 3e 23 c1 ee 6d 04 6f 60 f4 af 53 3b 97 45 00 39 | 66 3d 9d f6 f9 b5 ae b4 7a 04 d8 a3 b3 c0 d4 ac | encrypting: 0c 00 00 24 ee bf 12 b5 36 71 d5 7d 01 7d 01 c2 | encrypting: 88 aa 32 3b 60 34 c9 db eb 3e 80 2a bd 65 9b ef | encrypting: 45 2e 09 e2 00 00 00 10 00 00 00 01 03 04 00 01 | encrypting: 1d 23 a0 34 | IV: 3e 23 c1 ee 6d 04 6f 60 f4 af 53 3b 97 45 00 39 | IV: 66 3d 9d f6 f9 b5 ae b4 7a 04 d8 a3 b3 c0 d4 ac | unpadded size is: 52 | emitting 12 zero bytes of encryption padding into ISAKMP Message | encrypting 64 using AES_CBC | no IKEv1 message padding required | emitting length of ISAKMP Message: 92 | NSS ike_alg_nss_cbc: aes - enter | NSS ike_alg_nss_cbc: aes - exit | next IV: 89 c1 0c f9 0b 56 7b 7f 79 78 e8 f4 d4 c6 2b c4 | sending 92 bytes for delete notify through eth1 from 192.1.2.45:500 to 192.1.2.23:500 (using #1) | 3c e4 38 3f ed 34 7c e6 29 82 ac 69 b5 22 4f 63 | 08 10 05 01 37 5f 39 00 00 00 00 5c 89 fd 5e 49 | 5b ce dd ea d8 80 f3 bc bd 48 9e d2 c5 07 23 9d | b0 06 52 15 eb 83 88 70 73 b5 ea 2e ca 59 3b 72 | 7f e7 d3 64 27 ad 33 44 a3 91 c2 ca 89 c1 0c f9 | 0b 56 7b 7f 79 78 e8 f4 d4 c6 2b c4 | crypto helper 4 resuming | crypto helper 4 starting work-order 7 for state #4 | crypto helper 4 doing build KE and nonce (quick_outI1 KE); request ID 7 | NSS: Value of Prime: | ff ff ff ff ff ff ff ff c9 0f da a2 21 68 c2 34 | c4 c6 62 8b 80 dc 1c d1 29 02 4e 08 8a 67 cc 74 | 02 0b be a6 3b 13 9b 22 51 4a 08 79 8e 34 04 dd | ef 95 19 b3 cd 3a 43 1b 30 2b 0a 6d f2 5f 14 37 | 4f e1 35 6d 6d 51 c2 45 e4 85 b5 76 62 5e 7e c6 | f4 4c 42 e9 a6 37 ed 6b 0b ff 5c b6 f4 06 b7 ed | ee 38 6b fb 5a 89 9f a5 ae 9f 24 11 7c 4b 1f e6 | 49 28 66 51 ec e4 5b 3d c2 00 7c b8 a1 63 bf 05 | 98 da 48 36 1c 55 d3 9a 69 16 3f a8 fd 24 cf 5f | 83 65 5d 23 dc a3 ad 96 1c 62 f3 56 20 85 52 bb | 9e d5 29 07 70 96 96 6d 67 0c 35 4e 4a bc 98 04 | f1 74 6c 08 ca 18 21 7c 32 90 5e 46 2e 36 ce 3b | e3 9e 77 2c 18 0e 86 03 9b 27 83 a2 ec 07 a2 8f | b5 c5 5d f0 6f 4c 52 c9 de 2b cb f6 95 58 17 18 | 39 95 49 7c ea 95 6a e5 15 d2 26 18 98 fa 05 10 | 15 72 8e 5a 8a ac aa 68 ff ff ff ff ff ff ff ff | NSS: Value of base: 02 | DH secret MODP2048@0x7f83d4000d60: created | NSS: Local DH MODP2048 secret (pointer): 0x7f83d4000d60 | NSS: Public DH wire value: | 56 9f c3 96 c7 9e db b8 9f 68 9b c5 2f 24 57 58 | 51 fe ae 8e 66 79 5c 6d aa 35 2a d0 f4 ef f6 c0 | 8d 8d fb 78 7d b6 b8 56 e9 28 d3 a2 b4 98 90 77 | 25 fc d9 11 78 2b b8 63 8a b0 d0 d7 0d 60 25 61 | 62 68 ff 10 20 c9 ff 90 c4 e8 5a c7 c3 10 94 1f | b8 c2 73 e0 50 67 b2 69 7d 67 39 dd f7 53 7e 28 | d0 86 68 df 32 78 62 c3 b9 e9 e6 8d 23 f6 90 ad | f5 5b 0a 08 f9 62 f9 d7 c6 db f3 01 07 a8 4d 1d | 24 41 05 f6 a8 08 09 9c 76 61 8d 33 71 88 e7 b3 | ba 82 de 06 80 7c 12 c7 af ce 7a 6a 99 5e 68 85 | 24 74 67 c7 e8 f1 6a 77 43 d9 9e eb 77 d4 1b 0c | 9e b2 b5 f3 5a 86 56 87 b4 7c 4a a5 d3 02 3c 94 | ca a0 40 40 97 22 33 18 2d b8 10 b5 8f 3e 80 7e | 14 81 e8 ee 10 c4 6e bb 21 a6 15 e3 75 3b af bf | ff 8c 37 64 87 d3 66 5b 3e a9 86 69 84 b0 0a 9a | 8d ef 1b 3c d3 63 25 39 39 71 f1 71 ee b3 3a da | Generated nonce: 54 c5 83 cd 0b 00 b6 e3 f5 5a cb ab a0 27 b7 a8 | Generated nonce: 88 6d 63 9a 9d 4c 57 49 7c f1 eb 57 8e 8c e0 78 | crypto helper 4 finished build KE and nonce (quick_outI1 KE); request ID 7 time elapsed 0.000965 seconds | crypto helper 4 sending results from work-order 7 for state #4 to event queue | scheduling resume sending helper answer for #4 | libevent_malloc: new ptr-libevent@0x7f83d4006900 size 128 | crypto helper 4 waiting (nothing to do) | running updown command "ipsec _updown" for verb down | command executing down-client | executing down-client: PLUTO_VERB='down-client' PLUTO_VERSION='2.0' PLUTO_CONNECTION='westnets-eastnet/2x0' PLUTO_INTERFACE='eth1' PLUTO_NEXT_HOP='192.1.2.23' PLUTO_ME='192.1.2.45' PLUTO_MY_ID='@west' PLUTO_MY_CLIENT='192.0.11.0/24' PLUTO_MY_CLIENT_NET='192.0.11.0' PLUTO_MY_CLIENT_MASK='255.255.255.0' PLUTO_MY_PORT='0' PLUTO_MY_PROTOCOL='0' PLUTO_SA_REQID='16392' PLUTO_SA_TYPE='ESP' PLUTO_PEER='192.1.2.23' PLUTO_PEER_ID='@east' PLUTO_PEER_CLIENT='192.0.2.0/24' PLUTO_PEER_CLIENT_NET='192.0.2.0' PLUTO_PEER_CLIENT_MASK='255.255.255.0' PLUTO_PEER_PORT='0' PLUTO_PEER_PROTOCOL='0' PLUTO_PEER_CA='' PLUTO_STACK='netkey' PLUTO_ADDTIME='1569051419' PLUTO_CONN_POLICY='RSASIG+ENCRYPT+TUNNEL+PFS+UP+IKEV1_ALLOW+SAREF_TRACK+IKE_FRAG_ALLOW+ESN_NO' PLUTO_CONN_KIND='CK_PERMANENT' PLUTO_CONN_ADDRFAMILY='ipv4' XAUTH_FAILED=0 PLUTO_IS_PEER_CISCO='0' PLUTO_PEER_DNS_INFO='' PLUTO_PEER_DOMAIN_INFO='' PLUTO_PEER_BANNER='' PLUTO_CFG_SERVER='0' PLUTO_CFG_CLIENT='0' PLUTO_NM_CONFIGURED='0' VTI_IFACE='' VTI_ROUTING='no' VTI_SHARED | popen cmd is 1055 chars long | cmd( 0):PLUTO_VERB='down-client' PLUTO_VERSION='2.0' PLUTO_CONNECTION='westnets-eastnet/: | cmd( 80):2x0' PLUTO_INTERFACE='eth1' PLUTO_NEXT_HOP='192.1.2.23' PLUTO_ME='192.1.2.45' PL: | cmd( 160):UTO_MY_ID='@west' PLUTO_MY_CLIENT='192.0.11.0/24' PLUTO_MY_CLIENT_NET='192.0.11.: | cmd( 240):0' PLUTO_MY_CLIENT_MASK='255.255.255.0' PLUTO_MY_PORT='0' PLUTO_MY_PROTOCOL='0' : | cmd( 320):PLUTO_SA_REQID='16392' PLUTO_SA_TYPE='ESP' PLUTO_PEER='192.1.2.23' PLUTO_PEER_ID: | cmd( 400):='@east' PLUTO_PEER_CLIENT='192.0.2.0/24' PLUTO_PEER_CLIENT_NET='192.0.2.0' PLUT: | cmd( 480):O_PEER_CLIENT_MASK='255.255.255.0' PLUTO_PEER_PORT='0' PLUTO_PEER_PROTOCOL='0' P: | cmd( 560):LUTO_PEER_CA='' PLUTO_STACK='netkey' PLUTO_ADDTIME='1569051419' PLUTO_CONN_POLIC: | cmd( 640):Y='RSASIG+ENCRYPT+TUNNEL+PFS+UP+IKEV1_ALLOW+SAREF_TRACK+IKE_FRAG_ALLOW+ESN_NO' P: | cmd( 720):LUTO_CONN_KIND='CK_PERMANENT' PLUTO_CONN_ADDRFAMILY='ipv4' XAUTH_FAILED=0 PLUTO_: | cmd( 800):IS_PEER_CISCO='0' PLUTO_PEER_DNS_INFO='' PLUTO_PEER_DOMAIN_INFO='' PLUTO_PEER_BA: | cmd( 880):NNER='' PLUTO_CFG_SERVER='0' PLUTO_CFG_CLIENT='0' PLUTO_NM_CONFIGURED='0' VTI_IF: | cmd( 960):ACE='' VTI_ROUTING='no' VTI_SHARED='no' SPI_IN=0xc7e775c9 SPI_OUT=0x1d23a034 ips: | cmd(1040):ec _updown 2>&1: | shunt_eroute() called for connection 'westnets-eastnet/2x0' to 'replace with shunt' for rt_kind 'prospective erouted' using protoports 192.0.11.0/24:0 --0->- 192.0.2.0/24:0 | netlink_shunt_eroute for proto 0, and source 192.0.11.0/24:0 dest 192.0.2.0/24:0 | priority calculation of connection "westnets-eastnet/2x0" is 0xfe7e7 | IPsec Sa SPD priority set to 1042407 | delete esp.c7e775c9@192.1.2.23 | netlink response for Del SA esp.c7e775c9@192.1.2.23 included non-error error | priority calculation of connection "westnets-eastnet/2x0" is 0xfe7e7 | delete inbound eroute 192.0.2.0/24:0 --0-> 192.0.11.0/24:0 => unk255.10000@192.1.2.45 (raw_eroute) | raw_eroute result=success | delete esp.1d23a034@192.1.2.45 | netlink response for Del SA esp.1d23a034@192.1.2.45 included non-error error | in connection_discard for connection westnets-eastnet/2x0 | State DB: deleting IKEv1 state #3 in QUICK_I2 | child state #3: QUICK_I2(established CHILD SA) => UNDEFINED(ignore) | DH secret MODP2048@0x7f83d8000d60: destroyed | stop processing: state #3 from 192.1.2.23:500 (in delete_state() at state.c:1143) | delete_state: release st->st_shared_nss-key@0x7f83e8006900 | delete_state: release st->st_skeyid_nss-key@0x56080aeed4f0 | delete_state: release st->st_skey_d_nss-key@0x56080aeea0c0 | delete_state: release st->st_skey_ai_nss-key@0x56080aee2f70 | delete_state: release st->st_skey_ar_nss-key@NULL | delete_state: release st->st_skey_ei_nss-key@0x56080aef0b10 | delete_state: release st->st_skey_er_nss-key@NULL | delete_state: release st->st_skey_pi_nss-key@NULL | delete_state: release st->st_skey_pr_nss-key@NULL | delete_state: release st->st_enc_key_nss-key@0x56080aee47f0 | delete_state: release st->st_sk_d_no_ppk-key@NULL | delete_state: release st->st_sk_pi_no_ppk-key@NULL | delete_state: release st->st_sk_pr_no_ppk-key@NULL | libevent_free: release ptr-libevent@0x7f83dc001ef0 | free_event_entry: release EVENT_SA_EXPIRE-pe@0x7f83e40041c0 | in statetime_stop() and could not find #3 | processing: STOP state #0 (in timer_event_cb() at timer.c:557) | *received 92 bytes from 192.1.2.23:500 on eth1 (192.1.2.45:500) | 3c e4 38 3f ed 34 7c e6 29 82 ac 69 b5 22 4f 63 | 08 10 05 01 29 13 ec 39 00 00 00 5c 56 59 f5 ad | 18 6d c3 77 40 b7 5c 7d 0b 9d be 52 43 4c 89 b3 | 06 6f 43 97 3d 2d 94 a5 7f ef c3 98 dc 4a 5b d7 | cb ad 9f 77 56 2a 54 3f 24 55 1e f8 f2 a3 6c cf | 9d 5c 75 80 8d 1d a8 e9 88 23 3d ad | start processing: from 192.1.2.23:500 (in process_md() at demux.c:378) | **parse ISAKMP Message: | initiator cookie: | 3c e4 38 3f ed 34 7c e6 | responder cookie: | 29 82 ac 69 b5 22 4f 63 | next payload type: ISAKMP_NEXT_HASH (0x8) | ISAKMP version: ISAKMP Version 1.0 (rfc2407) (0x10) | exchange type: ISAKMP_XCHG_INFO (0x5) | flags: ISAKMP_FLAG_v1_ENCRYPTION (0x1) | Message ID: 689171513 (0x2913ec39) | length: 92 (0x5c) | processing version=1.0 packet with exchange type=ISAKMP_XCHG_INFO (5) | peer and cookies match on #4; msgid=00000000 st_msgid=ba31d75c st_msgid_phase15=00000000 | peer and cookies match on #2; msgid=00000000 st_msgid=d9d208cd st_msgid_phase15=00000000 | peer and cookies match on #1; msgid=00000000 st_msgid=00000000 st_msgid_phase15=00000000 | p15 state object #1 found, in STATE_MAIN_I4 | State DB: found IKEv1 state #1 in MAIN_I4 (find_v1_info_state) | start processing: state #1 connection "westnets-eastnet/2x0" from 192.1.2.23:500 (in process_v1_packet() at ikev1.c:1455) | last Phase 1 IV: c8 ea e9 b3 51 0b ea 24 90 87 5d b9 c1 a4 ec 95 | current Phase 1 IV: c8 ea e9 b3 51 0b ea 24 90 87 5d b9 c1 a4 ec 95 | Phase 2 IV hash sha2_256 init | Phase 2 IV hash sha2_256 digest PH1_IV-bytes@0x56080af00280 (length 16) | c8 ea e9 b3 51 0b ea 24 90 87 5d b9 c1 a4 ec 95 | Phase 2 IV hash sha2_256 digest MSGID-bytes@0x7fff508fedec (length 4) | 29 13 ec 39 | Phase 2 IV hash sha2_256 final bytes@0x56080af00200 (length 32) | 07 1a 2e ad b4 bb 85 9e e4 52 af 66 05 58 57 2f | c3 87 e4 ae 32 50 13 fe 51 ff 9d 79 b1 57 77 df | #1 is idle | #1 idle | received encrypted packet from 192.1.2.23:500 | decrypting 64 bytes using algorithm AES_CBC | IV before: 07 1a 2e ad b4 bb 85 9e e4 52 af 66 05 58 57 2f | NSS ike_alg_nss_cbc: aes - enter | NSS ike_alg_nss_cbc: aes - exit | IV after: f2 a3 6c cf 9d 5c 75 80 8d 1d a8 e9 88 23 3d ad | decrypted payload (starts at offset -64): | 3c e4 38 3f ed 34 7c e6 29 82 ac 69 b5 22 4f 63 | 08 10 05 01 29 13 ec 39 00 00 00 5c 0c 00 00 24 | 25 49 a1 4a e5 04 40 bb 70 30 54 f5 5c fd bc 17 | 5d 3f 80 fc 0d 89 4f 1c 65 60 a0 79 9d 25 58 da | 00 00 00 10 00 00 00 01 03 04 00 01 45 ec 10 4f | 00 00 00 00 00 00 00 00 00 00 00 00 | got payload 0x100 (ISAKMP_NEXT_HASH) needed: 0x100 opt: 0x0 | ***parse ISAKMP Hash Payload: | next payload type: ISAKMP_NEXT_D (0xc) | length: 36 (0x24) | got payload 0x1000 (ISAKMP_NEXT_D) needed: 0x0 opt: 0x0 | ***parse ISAKMP Delete Payload: | next payload type: ISAKMP_NEXT_NONE (0x0) | length: 16 (0x10) | DOI: ISAKMP_DOI_IPSEC (0x1) | protocol ID: 3 (0x3) | SPI size: 4 (0x4) | number of SPIs: 1 (0x1) | removing 12 bytes of padding | HASH(1) PRF sha2_256 init SKEYID_a-key@0x56080aee2f70 (size 32) | HASH(1): SKEYID_a-key@0x56080aee2f70 (32-bytes, EXTRACT_KEY_FROM_KEY) | key-offset: 0, key-size: 32 | EXTRACT_KEY_FROM_KEY: | target: SHA256_HMAC | flags: SIGN | key_size: 32-bytes | base: base-key@0x56080aee2f70 (32-bytes, EXTRACT_KEY_FROM_KEY) | operation: FLAGS_ONLY | params: 8-bytes@0x7fff508feb48 | result: clone-key@0x7f83e8006900 (32-bytes, SHA256_HMAC) | HASH(1) prf: created sha2_256 context 0x56080aef2390 from SKEYID_a-key@0x7f83e8006900 | HASH(1) prf: begin sha2_256 with context 0x56080aef2390 from SKEYID_a-key@0x7f83e8006900 | HASH(1): release clone-key@0x7f83e8006900 | HASH(1) PRF sha2_256 crypt-prf@0x56080af010d0 | HASH(1) PRF sha2_256 update M-ID-bytes@0x7fff508fec2c (length 4) | 29 13 ec 39 | HASH(1) PRF sha2_256 update payload-bytes@0x56080aee6260 (length 16) | 00 00 00 10 00 00 00 01 03 04 00 01 45 ec 10 4f | HASH(1) PRF sha2_256 final-bytes@0x7fff508fecb0 (length 32) | 25 49 a1 4a e5 04 40 bb 70 30 54 f5 5c fd bc 17 | 5d 3f 80 fc 0d 89 4f 1c 65 60 a0 79 9d 25 58 da | informational HASH(1): | 25 49 a1 4a e5 04 40 bb 70 30 54 f5 5c fd bc 17 | 5d 3f 80 fc 0d 89 4f 1c 65 60 a0 79 9d 25 58 da | received 'informational' message HASH(1) data ok | parsing 4 raw bytes of ISAKMP Delete Payload into SPI | SPI 45 ec 10 4f | FOR_EACH_STATE_... in find_phase2_state_to_delete | start processing: connection "westnets-eastnet/1x0" (BACKGROUND) (in accept_delete() at ikev1_main.c:2506) "westnets-eastnet/2x0" #1: received Delete SA payload: replace IPsec State #2 now | state #2 requesting EVENT_SA_REPLACE to be deleted | libevent_free: release ptr-libevent@0x7f83e0004f00 | free_event_entry: release EVENT_SA_REPLACE-pe@0x56080aeffa20 | event_schedule: new EVENT_SA_REPLACE-pe@0x56080aeffa20 | inserting event EVENT_SA_REPLACE, timeout in 0 seconds for #2 | libevent_malloc: new ptr-libevent@0x7f83e0004f00 size 128 | stop processing: connection "westnets-eastnet/1x0" (BACKGROUND) (in accept_delete() at ikev1_main.c:2550) | del: | complete v1 state transition with STF_IGNORE | stop processing: from 192.1.2.23:500 (BACKGROUND) (in process_md() at demux.c:380) | stop processing: state #1 connection "westnets-eastnet/2x0" from 192.1.2.23:500 (in process_md() at demux.c:382) | processing: STOP connection NULL (in process_md() at demux.c:383) | processing resume sending helper answer for #4 | start processing: state #4 connection "westnets-eastnet/2x0" from 192.1.2.23:500 (in resume_handler() at server.c:797) | crypto helper 4 replies to request ID 7 | calling continuation function 0x56080990f630 | quick_outI1_continue for #4: calculated ke+nonce, sending I1 | **emit ISAKMP Message: | initiator cookie: | 3c e4 38 3f ed 34 7c e6 | responder cookie: | 29 82 ac 69 b5 22 4f 63 | next payload type: ISAKMP_NEXT_NONE (0x0) | ISAKMP version: ISAKMP Version 1.0 (rfc2407) (0x10) | exchange type: ISAKMP_XCHG_QUICK (0x20) | flags: ISAKMP_FLAG_v1_ENCRYPTION (0x1) | Message ID: 3123828572 (0xba31d75c) | next payload chain: saving message location 'ISAKMP Message'.'next payload type' | ***emit ISAKMP Hash Payload: | next payload type: ISAKMP_NEXT_NONE (0x0) | next payload chain: setting previous 'ISAKMP Message'.'next payload type' to current ISAKMP Hash Payload (8:ISAKMP_NEXT_HASH) | next payload chain: saving location 'ISAKMP Hash Payload'.'next payload type' in 'reply packet' | emitting 32 zero bytes of HASH DATA into ISAKMP Hash Payload | emitting length of ISAKMP Hash Payload: 36 | emitting quick defaults using policy none | empty esp_info, returning defaults for ENCRYPT | ***emit ISAKMP Security Association Payload: | next payload type: ISAKMP_NEXT_NONCE (0xa) | DOI: ISAKMP_DOI_IPSEC (0x1) | next payload chain: ignoring supplied 'ISAKMP Security Association Payload'.'next payload type' value 10:ISAKMP_NEXT_NONCE | next payload chain: setting previous 'ISAKMP Hash Payload'.'next payload type' to current ISAKMP Security Association Payload (1:ISAKMP_NEXT_SA) | next payload chain: saving location 'ISAKMP Security Association Payload'.'next payload type' in 'reply packet' | ****emit IPsec DOI SIT: | IPsec DOI SIT: SIT_IDENTITY_ONLY (0x1) | ikev1_out_sa pcn: 0 has 1 valid proposals | ikev1_out_sa pcn: 0 pn: 0<1 valid_count: 1 trans_cnt: 2 | ****emit ISAKMP Proposal Payload: | next payload type: ISAKMP_NEXT_NONE (0x0) | proposal number: 0 (0x0) | protocol ID: PROTO_IPSEC_ESP (0x3) | SPI size: 4 (0x4) | number of transforms: 2 (0x2) | last substructure: saving location 'ISAKMP Security Association Payload'.'ISAKMP Proposal Payload'.'next payload type' | netlink_get_spi: allocated 0x41b04480 for esp.0@192.1.2.45 | emitting 4 raw bytes of SPI into ISAKMP Proposal Payload | SPI 41 b0 44 80 | *****emit ISAKMP Transform Payload (ESP): | next payload type: ISAKMP_NEXT_T (0x3) | ESP transform number: 0 (0x0) | ESP transform ID: ESP_AES (0xc) | last substructure: saving location 'ISAKMP Proposal Payload'.'ISAKMP Transform Payload (ESP)'.'next payload type' | ******emit ISAKMP IPsec DOI attribute: | af+type: AF+GROUP_DESCRIPTION (0x8003) | length/value: 14 (0xe) | [14 is OAKLEY_GROUP_MODP2048] | ******emit ISAKMP IPsec DOI attribute: | af+type: AF+ENCAPSULATION_MODE (0x8004) | length/value: 1 (0x1) | [1 is ENCAPSULATION_MODE_TUNNEL] | ******emit ISAKMP IPsec DOI attribute: | af+type: AF+SA_LIFE_TYPE (0x8001) | length/value: 1 (0x1) | [1 is SA_LIFE_TYPE_SECONDS] | ******emit ISAKMP IPsec DOI attribute: | af+type: AF+SA_LIFE_DURATION (variable length) (0x8002) | length/value: 28800 (0x7080) | ******emit ISAKMP IPsec DOI attribute: | af+type: AF+AUTH_ALGORITHM (0x8005) | length/value: 2 (0x2) | [2 is AUTH_ALGORITHM_HMAC_SHA1] | ******emit ISAKMP IPsec DOI attribute: | af+type: AF+KEY_LENGTH (0x8006) | length/value: 128 (0x80) | emitting length of ISAKMP Transform Payload (ESP): 32 | *****emit ISAKMP Transform Payload (ESP): | next payload type: ISAKMP_NEXT_NONE (0x0) | ESP transform number: 1 (0x1) | ESP transform ID: ESP_3DES (0x3) | last substructure: checking 'ISAKMP Proposal Payload'.'ISAKMP Transform Payload (ESP)'.'next payload type' is ISAKMP_NEXT_T (0x3) | last substructure: saving location 'ISAKMP Proposal Payload'.'ISAKMP Transform Payload (ESP)'.'next payload type' | ******emit ISAKMP IPsec DOI attribute: | af+type: AF+GROUP_DESCRIPTION (0x8003) | length/value: 14 (0xe) | [14 is OAKLEY_GROUP_MODP2048] | ******emit ISAKMP IPsec DOI attribute: | af+type: AF+ENCAPSULATION_MODE (0x8004) | length/value: 1 (0x1) | [1 is ENCAPSULATION_MODE_TUNNEL] | ******emit ISAKMP IPsec DOI attribute: | af+type: AF+SA_LIFE_TYPE (0x8001) | length/value: 1 (0x1) | [1 is SA_LIFE_TYPE_SECONDS] | ******emit ISAKMP IPsec DOI attribute: | af+type: AF+SA_LIFE_DURATION (variable length) (0x8002) | length/value: 28800 (0x7080) | ******emit ISAKMP IPsec DOI attribute: | af+type: AF+AUTH_ALGORITHM (0x8005) | length/value: 2 (0x2) | [2 is AUTH_ALGORITHM_HMAC_SHA1] | emitting length of ISAKMP Transform Payload (ESP): 28 | emitting length of ISAKMP Proposal Payload: 72 | last substructure: checking 'ISAKMP Proposal Payload'.'ISAKMP Transform Payload (ESP)'.'next payload type' is 0 | emitting length of ISAKMP Security Association Payload: 84 | last substructure: checking 'ISAKMP Security Association Payload'.'ISAKMP Proposal Payload'.'next payload type' is 0 | ***emit ISAKMP Nonce Payload: | next payload type: ISAKMP_NEXT_KE (0x4) | next payload chain: ignoring supplied 'ISAKMP Nonce Payload'.'next payload type' value 4:ISAKMP_NEXT_KE | next payload chain: setting previous 'ISAKMP Security Association Payload'.'next payload type' to current ISAKMP Nonce Payload (10:ISAKMP_NEXT_NONCE) | next payload chain: saving location 'ISAKMP Nonce Payload'.'next payload type' in 'reply packet' | emitting 32 raw bytes of Ni into ISAKMP Nonce Payload | Ni 54 c5 83 cd 0b 00 b6 e3 f5 5a cb ab a0 27 b7 a8 | Ni 88 6d 63 9a 9d 4c 57 49 7c f1 eb 57 8e 8c e0 78 | emitting length of ISAKMP Nonce Payload: 36 | wire (crypto helper) group MODP2048 and state group MODP2048 match | DH secret MODP2048@0x7f83d4000d60: transferring ownership from helper KE to state #4 | ***emit ISAKMP Key Exchange Payload: | next payload type: ISAKMP_NEXT_ID (0x5) | next payload chain: ignoring supplied 'ISAKMP Key Exchange Payload'.'next payload type' value 5:ISAKMP_NEXT_ID | next payload chain: setting previous 'ISAKMP Nonce Payload'.'next payload type' to current ISAKMP Key Exchange Payload (4:ISAKMP_NEXT_KE) | next payload chain: saving location 'ISAKMP Key Exchange Payload'.'next payload type' in 'reply packet' | emitting 256 raw bytes of keyex value into ISAKMP Key Exchange Payload | keyex value 56 9f c3 96 c7 9e db b8 9f 68 9b c5 2f 24 57 58 | keyex value 51 fe ae 8e 66 79 5c 6d aa 35 2a d0 f4 ef f6 c0 | keyex value 8d 8d fb 78 7d b6 b8 56 e9 28 d3 a2 b4 98 90 77 | keyex value 25 fc d9 11 78 2b b8 63 8a b0 d0 d7 0d 60 25 61 | keyex value 62 68 ff 10 20 c9 ff 90 c4 e8 5a c7 c3 10 94 1f | keyex value b8 c2 73 e0 50 67 b2 69 7d 67 39 dd f7 53 7e 28 | keyex value d0 86 68 df 32 78 62 c3 b9 e9 e6 8d 23 f6 90 ad | keyex value f5 5b 0a 08 f9 62 f9 d7 c6 db f3 01 07 a8 4d 1d | keyex value 24 41 05 f6 a8 08 09 9c 76 61 8d 33 71 88 e7 b3 | keyex value ba 82 de 06 80 7c 12 c7 af ce 7a 6a 99 5e 68 85 | keyex value 24 74 67 c7 e8 f1 6a 77 43 d9 9e eb 77 d4 1b 0c | keyex value 9e b2 b5 f3 5a 86 56 87 b4 7c 4a a5 d3 02 3c 94 | keyex value ca a0 40 40 97 22 33 18 2d b8 10 b5 8f 3e 80 7e | keyex value 14 81 e8 ee 10 c4 6e bb 21 a6 15 e3 75 3b af bf | keyex value ff 8c 37 64 87 d3 66 5b 3e a9 86 69 84 b0 0a 9a | keyex value 8d ef 1b 3c d3 63 25 39 39 71 f1 71 ee b3 3a da | emitting length of ISAKMP Key Exchange Payload: 260 | ***emit ISAKMP Identification Payload (IPsec DOI): | next payload type: ISAKMP_NEXT_ID (0x5) | ID type: ID_IPV4_ADDR_SUBNET (0x4) | Protocol ID: 0 (0x0) | port: 0 (0x0) | next payload chain: ignoring supplied 'ISAKMP Identification Payload (IPsec DOI)'.'next payload type' value 5:ISAKMP_NEXT_ID | next payload chain: setting previous 'ISAKMP Key Exchange Payload'.'next payload type' to current ISAKMP Identification Payload (IPsec DOI) (5:ISAKMP_NEXT_ID) | next payload chain: saving location 'ISAKMP Identification Payload (IPsec DOI)'.'next payload type' in 'reply packet' | emitting 4 raw bytes of client network into ISAKMP Identification Payload (IPsec DOI) | client network c0 00 0b 00 | emitting 4 raw bytes of client mask into ISAKMP Identification Payload (IPsec DOI) | client mask ff ff ff 00 | emitting length of ISAKMP Identification Payload (IPsec DOI): 16 | ***emit ISAKMP Identification Payload (IPsec DOI): | next payload type: ISAKMP_NEXT_NONE (0x0) | ID type: ID_IPV4_ADDR_SUBNET (0x4) | Protocol ID: 0 (0x0) | port: 0 (0x0) | next payload chain: setting previous 'ISAKMP Identification Payload (IPsec DOI)'.'next payload type' to current ISAKMP Identification Payload (IPsec DOI) (5:ISAKMP_NEXT_ID) | next payload chain: saving location 'ISAKMP Identification Payload (IPsec DOI)'.'next payload type' in 'reply packet' | emitting 4 raw bytes of client network into ISAKMP Identification Payload (IPsec DOI) | client network c0 00 02 00 | emitting 4 raw bytes of client mask into ISAKMP Identification Payload (IPsec DOI) | client mask ff ff ff 00 | emitting length of ISAKMP Identification Payload (IPsec DOI): 16 | HASH(1) PRF sha2_256 init SKEYID_a-key@0x56080aee2f70 (size 32) | HASH(1): SKEYID_a-key@0x56080aee2f70 (32-bytes, EXTRACT_KEY_FROM_KEY) | key-offset: 0, key-size: 32 | EXTRACT_KEY_FROM_KEY: | target: SHA256_HMAC | flags: SIGN | key_size: 32-bytes | base: base-key@0x56080aee2f70 (32-bytes, EXTRACT_KEY_FROM_KEY) | operation: FLAGS_ONLY | params: 8-bytes@0x7fff508fe858 | result: clone-key@0x7f83e8006900 (32-bytes, SHA256_HMAC) | HASH(1) prf: created sha2_256 context 0x56080aee6220 from SKEYID_a-key@0x7f83e8006900 | HASH(1) prf: begin sha2_256 with context 0x56080aee6220 from SKEYID_a-key@0x7f83e8006900 | HASH(1): release clone-key@0x7f83e8006900 | HASH(1) PRF sha2_256 crypt-prf@0x56080af01110 | HASH(1) PRF sha2_256 update M-ID-bytes@0x7fff508fe93c (length 4) | ba 31 d7 5c | HASH(1) PRF sha2_256 update payload-bytes@0x560809a0e980 (length 412) | 0a 00 00 54 00 00 00 01 00 00 00 01 00 00 00 48 | 00 03 04 02 41 b0 44 80 03 00 00 20 00 0c 00 00 | 80 03 00 0e 80 04 00 01 80 01 00 01 80 02 70 80 | 80 05 00 02 80 06 00 80 00 00 00 1c 01 03 00 00 | 80 03 00 0e 80 04 00 01 80 01 00 01 80 02 70 80 | 80 05 00 02 04 00 00 24 54 c5 83 cd 0b 00 b6 e3 | f5 5a cb ab a0 27 b7 a8 88 6d 63 9a 9d 4c 57 49 | 7c f1 eb 57 8e 8c e0 78 05 00 01 04 56 9f c3 96 | c7 9e db b8 9f 68 9b c5 2f 24 57 58 51 fe ae 8e | 66 79 5c 6d aa 35 2a d0 f4 ef f6 c0 8d 8d fb 78 | 7d b6 b8 56 e9 28 d3 a2 b4 98 90 77 25 fc d9 11 | 78 2b b8 63 8a b0 d0 d7 0d 60 25 61 62 68 ff 10 | 20 c9 ff 90 c4 e8 5a c7 c3 10 94 1f b8 c2 73 e0 | 50 67 b2 69 7d 67 39 dd f7 53 7e 28 d0 86 68 df | 32 78 62 c3 b9 e9 e6 8d 23 f6 90 ad f5 5b 0a 08 | f9 62 f9 d7 c6 db f3 01 07 a8 4d 1d 24 41 05 f6 | a8 08 09 9c 76 61 8d 33 71 88 e7 b3 ba 82 de 06 | 80 7c 12 c7 af ce 7a 6a 99 5e 68 85 24 74 67 c7 | e8 f1 6a 77 43 d9 9e eb 77 d4 1b 0c 9e b2 b5 f3 | 5a 86 56 87 b4 7c 4a a5 d3 02 3c 94 ca a0 40 40 | 97 22 33 18 2d b8 10 b5 8f 3e 80 7e 14 81 e8 ee | 10 c4 6e bb 21 a6 15 e3 75 3b af bf ff 8c 37 64 | 87 d3 66 5b 3e a9 86 69 84 b0 0a 9a 8d ef 1b 3c | d3 63 25 39 39 71 f1 71 ee b3 3a da 05 00 00 10 | 04 00 00 00 c0 00 0b 00 ff ff ff 00 00 00 00 10 | 04 00 00 00 c0 00 02 00 ff ff ff 00 | HASH(1) PRF sha2_256 final-bytes@0x560809a0e960 (length 32) | a9 45 87 07 2b ca 6c be 97 b0 6f 46 fd 39 e9 c1 | e1 1f 7f 4a 4e 56 a5 f4 c8 b3 b6 2e 05 90 00 60 | outI1 HASH(1): | a9 45 87 07 2b ca 6c be 97 b0 6f 46 fd 39 e9 c1 | e1 1f 7f 4a 4e 56 a5 f4 c8 b3 b6 2e 05 90 00 60 | last Phase 1 IV: c8 ea e9 b3 51 0b ea 24 90 87 5d b9 c1 a4 ec 95 | current Phase 1 IV: c8 ea e9 b3 51 0b ea 24 90 87 5d b9 c1 a4 ec 95 | Phase 2 IV hash sha2_256 init | Phase 2 IV hash sha2_256 digest PH1_IV-bytes@0x56080af00280 (length 16) | c8 ea e9 b3 51 0b ea 24 90 87 5d b9 c1 a4 ec 95 | Phase 2 IV hash sha2_256 digest MSGID-bytes@0x7fff508fe94c (length 4) | ba 31 d7 5c | Phase 2 IV hash sha2_256 final bytes@0x56080af00200 (length 32) | 43 b3 cf db bb 78 f5 64 b6 51 c4 0f 6a 96 d2 9e | dc df c6 31 be fe 35 38 63 b6 88 28 3d 68 a6 02 | encrypting: 01 00 00 24 a9 45 87 07 2b ca 6c be 97 b0 6f 46 | encrypting: fd 39 e9 c1 e1 1f 7f 4a 4e 56 a5 f4 c8 b3 b6 2e | encrypting: 05 90 00 60 0a 00 00 54 00 00 00 01 00 00 00 01 | encrypting: 00 00 00 48 00 03 04 02 41 b0 44 80 03 00 00 20 | encrypting: 00 0c 00 00 80 03 00 0e 80 04 00 01 80 01 00 01 | encrypting: 80 02 70 80 80 05 00 02 80 06 00 80 00 00 00 1c | encrypting: 01 03 00 00 80 03 00 0e 80 04 00 01 80 01 00 01 | encrypting: 80 02 70 80 80 05 00 02 04 00 00 24 54 c5 83 cd | encrypting: 0b 00 b6 e3 f5 5a cb ab a0 27 b7 a8 88 6d 63 9a | encrypting: 9d 4c 57 49 7c f1 eb 57 8e 8c e0 78 05 00 01 04 | encrypting: 56 9f c3 96 c7 9e db b8 9f 68 9b c5 2f 24 57 58 | encrypting: 51 fe ae 8e 66 79 5c 6d aa 35 2a d0 f4 ef f6 c0 | encrypting: 8d 8d fb 78 7d b6 b8 56 e9 28 d3 a2 b4 98 90 77 | encrypting: 25 fc d9 11 78 2b b8 63 8a b0 d0 d7 0d 60 25 61 | encrypting: 62 68 ff 10 20 c9 ff 90 c4 e8 5a c7 c3 10 94 1f | encrypting: b8 c2 73 e0 50 67 b2 69 7d 67 39 dd f7 53 7e 28 | encrypting: d0 86 68 df 32 78 62 c3 b9 e9 e6 8d 23 f6 90 ad | encrypting: f5 5b 0a 08 f9 62 f9 d7 c6 db f3 01 07 a8 4d 1d | encrypting: 24 41 05 f6 a8 08 09 9c 76 61 8d 33 71 88 e7 b3 | encrypting: ba 82 de 06 80 7c 12 c7 af ce 7a 6a 99 5e 68 85 | encrypting: 24 74 67 c7 e8 f1 6a 77 43 d9 9e eb 77 d4 1b 0c | encrypting: 9e b2 b5 f3 5a 86 56 87 b4 7c 4a a5 d3 02 3c 94 | encrypting: ca a0 40 40 97 22 33 18 2d b8 10 b5 8f 3e 80 7e | encrypting: 14 81 e8 ee 10 c4 6e bb 21 a6 15 e3 75 3b af bf | encrypting: ff 8c 37 64 87 d3 66 5b 3e a9 86 69 84 b0 0a 9a | encrypting: 8d ef 1b 3c d3 63 25 39 39 71 f1 71 ee b3 3a da | encrypting: 05 00 00 10 04 00 00 00 c0 00 0b 00 ff ff ff 00 | encrypting: 00 00 00 10 04 00 00 00 c0 00 02 00 ff ff ff 00 | IV: 43 b3 cf db bb 78 f5 64 b6 51 c4 0f 6a 96 d2 9e | IV: dc df c6 31 be fe 35 38 63 b6 88 28 3d 68 a6 02 | unpadded size is: 448 | encrypting 448 using AES_CBC | no IKEv1 message padding required | emitting length of ISAKMP Message: 476 | NSS ike_alg_nss_cbc: aes - enter | NSS ike_alg_nss_cbc: aes - exit | next IV: 87 51 28 95 86 11 6d 55 44 cb d4 a8 6f e2 c1 07 | sending 476 bytes for reply packet from quick_outI1 through eth1 from 192.1.2.45:500 to 192.1.2.23:500 (using #4) | 3c e4 38 3f ed 34 7c e6 29 82 ac 69 b5 22 4f 63 | 08 10 20 01 ba 31 d7 5c 00 00 01 dc 34 9c a8 eb | ea 7b a4 ed 5b 88 67 ee 73 0b b1 2c 50 6b 20 94 | b6 a7 f0 46 89 04 26 f0 1c 99 60 62 71 06 74 d5 | 1e af 7a 81 f6 17 11 a9 a3 7a ca 0e 91 71 44 66 | e1 84 b6 66 3f 5c a4 7e 12 cf bf d7 1d ce d3 85 | 70 a8 3e 2c a3 e7 18 30 03 ec f9 a5 6e 04 e0 03 | 9d 19 48 37 dc 5b e5 ce f1 04 c9 6a 79 27 b0 d2 | a6 d5 04 3d 5b d8 a3 9a 55 93 21 4d d0 aa 0a b3 | d7 15 1c 52 b9 2e db 11 39 63 b5 93 37 10 fa 6f | fa f7 1c c2 10 46 30 33 a8 7a d7 30 11 66 3a ed | 48 d5 75 fc 89 50 6a f9 d5 d1 4d c3 9c f9 9c 98 | a4 dc ce c7 d0 d4 f2 bd 07 62 b2 5b 3c 6d a5 69 | e4 c1 65 a3 a4 6b 5a 4c b6 10 cb 89 cd bc c7 0e | f8 db 4b 17 85 ac fa e4 4f 58 55 85 ee ed a2 3d | e9 23 5e d5 73 c4 c6 1f c2 60 8c 08 99 ee 6d be | 12 c1 b4 32 ae 57 d6 d1 3f 6b f6 61 67 50 0c e1 | 89 f3 2f 8e 28 00 65 a4 6a 9b 7b a5 f7 e7 9f be | 5c f1 c9 46 29 e1 76 5c 8d bb 51 cb 78 b6 18 2e | 0b 80 dd 4c 35 96 ae 63 91 ad dc d4 25 3b a0 3f | 96 33 f8 37 59 76 7d 36 ec 60 59 17 7b 17 5e 0f | aa 15 bf 11 53 77 6d 13 ad db f3 f1 72 e8 9d a5 | 71 ac 22 e9 f3 1a 99 6f 0c b7 43 2b c3 ce c6 f5 | 56 85 3e 28 16 6b 0b 35 bc 2d 96 5f 0e 17 d0 0a | 6a 81 83 fb a9 b0 2e 61 46 46 a8 48 3b 84 ef 2e | df 63 8f 8f 36 f8 95 fc 5f f1 d2 29 f3 c4 cf 91 | 0a 3c 9b f7 b9 fe 2a aa 14 06 23 fb 4d 2a 81 36 | 58 47 dd 9c 6f c4 90 a1 49 01 9b bb 38 6b aa 8f | b2 bc 65 88 10 10 a9 ee e9 b5 db 05 87 51 28 95 | 86 11 6d 55 44 cb d4 a8 6f e2 c1 07 | state #4 requesting EVENT_CRYPTO_TIMEOUT to be deleted | libevent_free: release ptr-libevent@0x7f83d0001ef0 | free_event_entry: release EVENT_CRYPTO_TIMEOUT-pe@0x7f83d8005860 "westnets-eastnet/2x0" #4: IMPAIR: suppressing retransmits; scheduling timeout in 60 seconds | event_schedule: new EVENT_RETRANSMIT-pe@0x7f83d8005860 | inserting event EVENT_RETRANSMIT, timeout in 60 seconds for #4 | libevent_malloc: new ptr-libevent@0x7f83d0001ef0 size 128 | #4 STATE_QUICK_I1: retransmits: first event in 60 seconds; timeout in 60 seconds; limit of 12 retransmits; current time is 50074.128452 | resume sending helper answer for #4 suppresed complete_v1_state_transition() | stop processing: state #4 connection "westnets-eastnet/2x0" from 192.1.2.23:500 (in resume_handler() at server.c:833) | libevent_free: release ptr-libevent@0x7f83d4006900 | processing signal PLUTO_SIGCHLD | waitpid returned ECHILD (no child processes left) | timer_event_cb: processing event@0x56080aeffa20 | handling event EVENT_SA_REPLACE for child state #2 | start processing: state #2 connection "westnets-eastnet/1x0" from 192.1.2.23:500 (in timer_event_cb() at timer.c:250) | picked newest_ipsec_sa #2 for #2 | replacing stale IPsec SA | dup_any(fd@-1) -> fd@-1 (in ipsecdoi_replace() at ipsec_doi.c:351) | FOR_EACH_STATE_... in find_phase1_state | creating state object #5 at 0x56080af0bd70 | State DB: adding IKEv1 state #5 in UNDEFINED | pstats #5 ikev1.ipsec started | duplicating state object #1 "westnets-eastnet/2x0" as #5 for IPSEC SA | #5 setting local endpoint to 192.1.2.45:500 from #1.st_localport (in duplicate_state() at state.c:1481) | duplicate_state: reference st_skeyid_nss-key@0x56080aeed4f0 | duplicate_state: reference st_skey_d_nss-key@0x56080aeea0c0 | duplicate_state: reference st_skey_ai_nss-key@0x56080aee2f70 | duplicate_state: reference st_skey_ar_nss-key@NULL | duplicate_state: reference st_skey_ei_nss-key@0x56080aef0b10 | duplicate_state: reference st_skey_er_nss-key@NULL | duplicate_state: reference st_skey_pi_nss-key@NULL | duplicate_state: reference st_skey_pr_nss-key@NULL | duplicate_state: reference st_enc_key_nss-key@0x56080aee47f0 | duplicate_state: reference st_sk_d_no_ppk-key@NULL | duplicate_state: reference st_sk_pi_no_ppk-key@NULL | duplicate_state: reference st_sk_pr_no_ppk-key@NULL | in connection_discard for connection westnets-eastnet/2x0 | suspend processing: state #2 connection "westnets-eastnet/1x0" from 192.1.2.23:500 (in quick_outI1() at ikev1_quick.c:683) | start processing: state #5 connection "westnets-eastnet/1x0" from 192.1.2.23:500 (in quick_outI1() at ikev1_quick.c:683) | child state #5: UNDEFINED(ignore) => QUICK_I1(established CHILD SA) "westnets-eastnet/1x0" #5: initiating Quick Mode RSASIG+ENCRYPT+TUNNEL+PFS+UP+IKEV1_ALLOW+SAREF_TRACK+IKE_FRAG_ALLOW+ESN_NO to replace #2 {using isakmp#1 msgid:6680ec6b proposal=defaults pfsgroup=MODP2048} | adding quick_outI1 KE work-order 8 for state #5 | event_schedule: new EVENT_CRYPTO_TIMEOUT-pe@0x7f83d4002b20 | inserting event EVENT_CRYPTO_TIMEOUT, timeout in 60 seconds for #5 | libevent_malloc: new ptr-libevent@0x7f83d4006900 size 128 | stop processing: state #5 connection "westnets-eastnet/1x0" from 192.1.2.23:500 (in quick_outI1() at ikev1_quick.c:762) | resume processing: state #2 connection "westnets-eastnet/1x0" from 192.1.2.23:500 (in quick_outI1() at ikev1_quick.c:762) | event_schedule: new EVENT_SA_EXPIRE-pe@0x7f83e40041c0 | inserting event EVENT_SA_EXPIRE, timeout in 0 seconds for #2 | libevent_malloc: new ptr-libevent@0x7f83dc001ef0 size 128 | libevent_free: release ptr-libevent@0x7f83e0004f00 | free_event_entry: release EVENT_SA_REPLACE-pe@0x56080aeffa20 | stop processing: state #2 connection "westnets-eastnet/1x0" from 192.1.2.23:500 (in timer_event_cb() at timer.c:557) | timer_event_cb: processing event@0x7f83e40041c0 | handling event EVENT_SA_EXPIRE for child state #2 | start processing: state #2 connection "westnets-eastnet/1x0" from 192.1.2.23:500 (in timer_event_cb() at timer.c:250) | picked newest_ipsec_sa #2 for #2 | un-established partial CHILD SA timeout (SA expired) | pstats #2 ikev1.ipsec re-failed exchange-timeout | pstats #2 ikev1.ipsec deleted completed | [RE]START processing: state #2 connection "westnets-eastnet/1x0" from 192.1.2.23:500 (in delete_state() at state.c:879) "westnets-eastnet/1x0" #2: deleting state (STATE_QUICK_I2) aged 8.307s and sending notification | child state #2: QUICK_I2(established CHILD SA) => delete | get_sa_info esp.45ec104f@192.1.2.23 | get_sa_info esp.66bd1d79@192.1.2.45 "westnets-eastnet/1x0" #2: ESP traffic information: in=336B out=336B | #2 send IKEv1 delete notification for STATE_QUICK_I2 | FOR_EACH_STATE_... in find_phase1_state | **emit ISAKMP Message: | initiator cookie: | 3c e4 38 3f ed 34 7c e6 | responder cookie: | 29 82 ac 69 b5 22 4f 63 | next payload type: ISAKMP_NEXT_NONE (0x0) | ISAKMP version: ISAKMP Version 1.0 (rfc2407) (0x10) | exchange type: ISAKMP_XCHG_INFO (0x5) | flags: ISAKMP_FLAG_v1_ENCRYPTION (0x1) | Message ID: 176725747 (0xa889ef3) | next payload chain: saving message location 'ISAKMP Message'.'next payload type' | ***emit ISAKMP Hash Payload: | next payload type: ISAKMP_NEXT_NONE (0x0) | next payload chain: setting previous 'ISAKMP Message'.'next payload type' to current ISAKMP Hash Payload (8:ISAKMP_NEXT_HASH) | next payload chain: saving location 'ISAKMP Hash Payload'.'next payload type' in 'delete msg' | emitting 32 zero bytes of HASH DATA into ISAKMP Hash Payload | emitting length of ISAKMP Hash Payload: 36 | ***emit ISAKMP Delete Payload: | next payload type: ISAKMP_NEXT_NONE (0x0) | DOI: ISAKMP_DOI_IPSEC (0x1) | protocol ID: 3 (0x3) | SPI size: 4 (0x4) | number of SPIs: 1 (0x1) | next payload chain: setting previous 'ISAKMP Hash Payload'.'next payload type' to current ISAKMP Delete Payload (12:ISAKMP_NEXT_D) | next payload chain: saving location 'ISAKMP Delete Payload'.'next payload type' in 'delete msg' | emitting 4 raw bytes of delete payload into ISAKMP Delete Payload | delete payload 66 bd 1d 79 | emitting length of ISAKMP Delete Payload: 16 | HASH(1) PRF sha2_256 init SKEYID_a-key@0x56080aee2f70 (size 32) | HASH(1): SKEYID_a-key@0x56080aee2f70 (32-bytes, EXTRACT_KEY_FROM_KEY) | key-offset: 0, key-size: 32 | EXTRACT_KEY_FROM_KEY: | target: SHA256_HMAC | flags: SIGN | key_size: 32-bytes | base: base-key@0x56080aee2f70 (32-bytes, EXTRACT_KEY_FROM_KEY) | operation: FLAGS_ONLY | params: 8-bytes@0x7fff508fc608 | result: clone-key@0x7f83e8006900 (32-bytes, SHA256_HMAC) | HASH(1) prf: created sha2_256 context 0x56080aee6220 from SKEYID_a-key@0x7f83e8006900 | HASH(1) prf: begin sha2_256 with context 0x56080aee6220 from SKEYID_a-key@0x7f83e8006900 | HASH(1): release clone-key@0x7f83e8006900 | HASH(1) PRF sha2_256 crypt-prf@0x56080af01b70 | HASH(1) PRF sha2_256 update M-ID-bytes@0x7fff508fc6ec (length 4) | 0a 88 9e f3 | HASH(1) PRF sha2_256 update payload-bytes@0x7fff508fcaa0 (length 16) | 00 00 00 10 00 00 00 01 03 04 00 01 66 bd 1d 79 | HASH(1) PRF sha2_256 final-bytes@0x7fff508fca80 (length 32) | 5b 94 dc 59 da 89 78 c2 59 a6 16 c1 7e 9f 73 e7 | 83 a6 58 c4 66 ce 25 ad 1c b1 a9 03 cc 66 78 4e | send delete HASH(1): | 5b 94 dc 59 da 89 78 c2 59 a6 16 c1 7e 9f 73 e7 | 83 a6 58 c4 66 ce 25 ad 1c b1 a9 03 cc 66 78 4e | last Phase 1 IV: c8 ea e9 b3 51 0b ea 24 90 87 5d b9 c1 a4 ec 95 | current Phase 1 IV: c8 ea e9 b3 51 0b ea 24 90 87 5d b9 c1 a4 ec 95 | Phase 2 IV hash sha2_256 init | Phase 2 IV hash sha2_256 digest PH1_IV-bytes@0x56080af00280 (length 16) | c8 ea e9 b3 51 0b ea 24 90 87 5d b9 c1 a4 ec 95 | Phase 2 IV hash sha2_256 digest MSGID-bytes@0x7fff508fc6fc (length 4) | 0a 88 9e f3 | Phase 2 IV hash sha2_256 final bytes@0x56080af00200 (length 32) | b4 da a9 12 ef f8 c8 22 91 ef 0d 7a da e3 4a 48 | 1a ee 02 63 68 10 30 77 92 c0 59 8f 49 ef 1f 66 | encrypting: 0c 00 00 24 5b 94 dc 59 da 89 78 c2 59 a6 16 c1 | encrypting: 7e 9f 73 e7 83 a6 58 c4 66 ce 25 ad 1c b1 a9 03 | encrypting: cc 66 78 4e 00 00 00 10 00 00 00 01 03 04 00 01 | encrypting: 66 bd 1d 79 | IV: b4 da a9 12 ef f8 c8 22 91 ef 0d 7a da e3 4a 48 | IV: 1a ee 02 63 68 10 30 77 92 c0 59 8f 49 ef 1f 66 | unpadded size is: 52 | emitting 12 zero bytes of encryption padding into ISAKMP Message | encrypting 64 using AES_CBC | no IKEv1 message padding required | emitting length of ISAKMP Message: 92 | NSS ike_alg_nss_cbc: aes - enter | NSS ike_alg_nss_cbc: aes - exit | next IV: bd 5e 2c 2c ea 2a 55 83 d4 1d 8f eb 69 74 2a a8 | sending 92 bytes for delete notify through eth1 from 192.1.2.45:500 to 192.1.2.23:500 (using #1) | 3c e4 38 3f ed 34 7c e6 29 82 ac 69 b5 22 4f 63 | 08 10 05 01 0a 88 9e f3 00 00 00 5c 62 b3 9f 09 | 94 b0 b4 50 57 b6 f5 8b 33 0c 7d fc 3d 27 e5 eb | f6 db 52 20 e6 b9 ea 4e 00 87 59 8a e7 3e 17 af | 9b b2 ef d0 29 fc c8 3d d5 22 c8 0f bd 5e 2c 2c | ea 2a 55 83 d4 1d 8f eb 69 74 2a a8 | crypto helper 6 resuming | crypto helper 6 starting work-order 8 for state #5 | crypto helper 6 doing build KE and nonce (quick_outI1 KE); request ID 8 | NSS: Value of Prime: | ff ff ff ff ff ff ff ff c9 0f da a2 21 68 c2 34 | c4 c6 62 8b 80 dc 1c d1 29 02 4e 08 8a 67 cc 74 | 02 0b be a6 3b 13 9b 22 51 4a 08 79 8e 34 04 dd | ef 95 19 b3 cd 3a 43 1b 30 2b 0a 6d f2 5f 14 37 | 4f e1 35 6d 6d 51 c2 45 e4 85 b5 76 62 5e 7e c6 | f4 4c 42 e9 a6 37 ed 6b 0b ff 5c b6 f4 06 b7 ed | ee 38 6b fb 5a 89 9f a5 ae 9f 24 11 7c 4b 1f e6 | 49 28 66 51 ec e4 5b 3d c2 00 7c b8 a1 63 bf 05 | 98 da 48 36 1c 55 d3 9a 69 16 3f a8 fd 24 cf 5f | 83 65 5d 23 dc a3 ad 96 1c 62 f3 56 20 85 52 bb | 9e d5 29 07 70 96 96 6d 67 0c 35 4e 4a bc 98 04 | f1 74 6c 08 ca 18 21 7c 32 90 5e 46 2e 36 ce 3b | e3 9e 77 2c 18 0e 86 03 9b 27 83 a2 ec 07 a2 8f | b5 c5 5d f0 6f 4c 52 c9 de 2b cb f6 95 58 17 18 | 39 95 49 7c ea 95 6a e5 15 d2 26 18 98 fa 05 10 | 15 72 8e 5a 8a ac aa 68 ff ff ff ff ff ff ff ff | NSS: Value of base: 02 | DH secret MODP2048@0x7f83e80010c0: created | NSS: Local DH MODP2048 secret (pointer): 0x7f83e80010c0 | NSS: Public DH wire value: | 2c d6 70 d6 1b aa 27 fe fe cc 64 53 60 7c b3 c2 | b7 89 93 51 8a 26 94 d7 02 76 5e 67 4f 93 5e ad | 4d 78 5b a4 fc 6a 90 4b cc 4a c7 52 ef 82 e8 22 | 5a 79 19 3d 22 1f 7a 34 dd 4b d1 76 f5 4f 32 46 | dd 00 93 03 3e b0 14 ff 7b 8c ae 46 d5 e3 82 e9 | 89 2d 23 77 64 20 c1 93 30 e6 91 43 a8 89 a9 2c | dd da eb b2 8b ae f6 89 9b d9 dc 1a 2b f8 6c cd | fb 98 ae 81 d0 3c bd 76 56 6c 88 83 bf 72 9d 47 | c0 83 4d 10 ac 85 1d f3 d6 fb e8 99 62 5a 00 bd | 3d 5f a9 75 da 98 ad f9 58 13 1b c0 16 f5 0f 05 | 58 3c 32 4d 30 cc 5e 5d 26 d4 cc ee 95 0b 94 3b | 5d 76 7b 72 2e 87 f3 dc 53 d0 20 7a cb 0d 1c fc | 92 49 58 a7 7b 06 e9 95 fe 7a b2 0a c5 63 d5 b3 | a4 8c 89 92 d6 a0 20 45 9d d5 48 92 a3 e1 01 15 | f7 b7 cb 6c 7c 79 8c d9 67 d3 2e 75 3b 36 e1 43 | 06 0e 3d e3 9b b7 23 1d a8 d5 dd e2 71 b3 fe 62 | Generated nonce: bb cc 13 15 d3 08 4f 34 22 fb 8f 98 4e 54 3d 04 | Generated nonce: 75 82 8c 72 cd 1f 2d 0f 0e 26 33 78 ca 05 18 59 | crypto helper 6 finished build KE and nonce (quick_outI1 KE); request ID 8 time elapsed 0.001057 seconds | crypto helper 6 sending results from work-order 8 for state #5 to event queue | scheduling resume sending helper answer for #5 | libevent_malloc: new ptr-libevent@0x7f83e8007500 size 128 | crypto helper 6 waiting (nothing to do) | running updown command "ipsec _updown" for verb down | command executing down-client | executing down-client: PLUTO_VERB='down-client' PLUTO_VERSION='2.0' PLUTO_CONNECTION='westnets-eastnet/1x0' PLUTO_INTERFACE='eth1' PLUTO_NEXT_HOP='192.1.2.23' PLUTO_ME='192.1.2.45' PLUTO_MY_ID='@west' PLUTO_MY_CLIENT='192.0.1.0/24' PLUTO_MY_CLIENT_NET='192.0.1.0' PLUTO_MY_CLIENT_MASK='255.255.255.0' PLUTO_MY_PORT='0' PLUTO_MY_PROTOCOL='0' PLUTO_SA_REQID='16388' PLUTO_SA_TYPE='ESP' PLUTO_PEER='192.1.2.23' PLUTO_PEER_ID='@east' PLUTO_PEER_CLIENT='192.0.2.0/24' PLUTO_PEER_CLIENT_NET='192.0.2.0' PLUTO_PEER_CLIENT_MASK='255.255.255.0' PLUTO_PEER_PORT='0' PLUTO_PEER_PROTOCOL='0' PLUTO_PEER_CA='' PLUTO_STACK='netkey' PLUTO_ADDTIME='1569051419' PLUTO_CONN_POLICY='RSASIG+ENCRYPT+TUNNEL+PFS+UP+IKEV1_ALLOW+SAREF_TRACK+IKE_FRAG_ALLOW+ESN_NO' PLUTO_CONN_KIND='CK_PERMANENT' PLUTO_CONN_ADDRFAMILY='ipv4' XAUTH_FAILED=0 PLUTO_IS_PEER_CISCO='0' PLUTO_PEER_DNS_INFO='' PLUTO_PEER_DOMAIN_INFO='' PLUTO_PEER_BANNER='' PLUTO_CFG_SERVER='0' PLUTO_CFG_CLIENT='0' PLUTO_NM_CONFIGURED='0' VTI_IFACE='' VTI_ROUTING='no' VTI_SHARED=' | popen cmd is 1053 chars long | cmd( 0):PLUTO_VERB='down-client' PLUTO_VERSION='2.0' PLUTO_CONNECTION='westnets-eastnet/: | cmd( 80):1x0' PLUTO_INTERFACE='eth1' PLUTO_NEXT_HOP='192.1.2.23' PLUTO_ME='192.1.2.45' PL: | cmd( 160):UTO_MY_ID='@west' PLUTO_MY_CLIENT='192.0.1.0/24' PLUTO_MY_CLIENT_NET='192.0.1.0': | cmd( 240): PLUTO_MY_CLIENT_MASK='255.255.255.0' PLUTO_MY_PORT='0' PLUTO_MY_PROTOCOL='0' PL: | cmd( 320):UTO_SA_REQID='16388' PLUTO_SA_TYPE='ESP' PLUTO_PEER='192.1.2.23' PLUTO_PEER_ID=': | cmd( 400):@east' PLUTO_PEER_CLIENT='192.0.2.0/24' PLUTO_PEER_CLIENT_NET='192.0.2.0' PLUTO_: | cmd( 480):PEER_CLIENT_MASK='255.255.255.0' PLUTO_PEER_PORT='0' PLUTO_PEER_PROTOCOL='0' PLU: | cmd( 560):TO_PEER_CA='' PLUTO_STACK='netkey' PLUTO_ADDTIME='1569051419' PLUTO_CONN_POLICY=: | cmd( 640):'RSASIG+ENCRYPT+TUNNEL+PFS+UP+IKEV1_ALLOW+SAREF_TRACK+IKE_FRAG_ALLOW+ESN_NO' PLU: | cmd( 720):TO_CONN_KIND='CK_PERMANENT' PLUTO_CONN_ADDRFAMILY='ipv4' XAUTH_FAILED=0 PLUTO_IS: | cmd( 800):_PEER_CISCO='0' PLUTO_PEER_DNS_INFO='' PLUTO_PEER_DOMAIN_INFO='' PLUTO_PEER_BANN: | cmd( 880):ER='' PLUTO_CFG_SERVER='0' PLUTO_CFG_CLIENT='0' PLUTO_NM_CONFIGURED='0' VTI_IFAC: | cmd( 960):E='' VTI_ROUTING='no' VTI_SHARED='no' SPI_IN=0x45ec104f SPI_OUT=0x66bd1d79 ipsec: | cmd(1040): _updown 2>&1: | shunt_eroute() called for connection 'westnets-eastnet/1x0' to 'replace with shunt' for rt_kind 'prospective erouted' using protoports 192.0.1.0/24:0 --0->- 192.0.2.0/24:0 | netlink_shunt_eroute for proto 0, and source 192.0.1.0/24:0 dest 192.0.2.0/24:0 | priority calculation of connection "westnets-eastnet/1x0" is 0xfe7e7 | IPsec Sa SPD priority set to 1042407 | delete esp.45ec104f@192.1.2.23 | netlink response for Del SA esp.45ec104f@192.1.2.23 included non-error error | priority calculation of connection "westnets-eastnet/1x0" is 0xfe7e7 | delete inbound eroute 192.0.2.0/24:0 --0-> 192.0.1.0/24:0 => unk255.10000@192.1.2.45 (raw_eroute) | raw_eroute result=success | delete esp.66bd1d79@192.1.2.45 | netlink response for Del SA esp.66bd1d79@192.1.2.45 included non-error error | in connection_discard for connection westnets-eastnet/1x0 | State DB: deleting IKEv1 state #2 in QUICK_I2 | child state #2: QUICK_I2(established CHILD SA) => UNDEFINED(ignore) | DH secret MODP2048@0x7f83e4000d60: destroyed | stop processing: state #2 from 192.1.2.23:500 (in delete_state() at state.c:1143) | delete_state: release st->st_shared_nss-key@0x7f83d8009640 | delete_state: release st->st_skeyid_nss-key@0x56080aeed4f0 | delete_state: release st->st_skey_d_nss-key@0x56080aeea0c0 | delete_state: release st->st_skey_ai_nss-key@0x56080aee2f70 | delete_state: release st->st_skey_ar_nss-key@NULL | delete_state: release st->st_skey_ei_nss-key@0x56080aef0b10 | delete_state: release st->st_skey_er_nss-key@NULL | delete_state: release st->st_skey_pi_nss-key@NULL | delete_state: release st->st_skey_pr_nss-key@NULL | delete_state: release st->st_enc_key_nss-key@0x56080aee47f0 | delete_state: release st->st_sk_d_no_ppk-key@NULL | delete_state: release st->st_sk_pi_no_ppk-key@NULL | delete_state: release st->st_sk_pr_no_ppk-key@NULL | libevent_free: release ptr-libevent@0x7f83dc001ef0 | free_event_entry: release EVENT_SA_EXPIRE-pe@0x7f83e40041c0 | in statetime_stop() and could not find #2 | processing: STOP state #0 (in timer_event_cb() at timer.c:557) | processing resume sending helper answer for #5 | start processing: state #5 connection "westnets-eastnet/1x0" from 192.1.2.23:500 (in resume_handler() at server.c:797) | crypto helper 6 replies to request ID 8 | calling continuation function 0x56080990f630 | quick_outI1_continue for #5: calculated ke+nonce, sending I1 | **emit ISAKMP Message: | initiator cookie: | 3c e4 38 3f ed 34 7c e6 | responder cookie: | 29 82 ac 69 b5 22 4f 63 | next payload type: ISAKMP_NEXT_NONE (0x0) | ISAKMP version: ISAKMP Version 1.0 (rfc2407) (0x10) | exchange type: ISAKMP_XCHG_QUICK (0x20) | flags: ISAKMP_FLAG_v1_ENCRYPTION (0x1) | Message ID: 1719725163 (0x6680ec6b) | next payload chain: saving message location 'ISAKMP Message'.'next payload type' | ***emit ISAKMP Hash Payload: | next payload type: ISAKMP_NEXT_NONE (0x0) | next payload chain: setting previous 'ISAKMP Message'.'next payload type' to current ISAKMP Hash Payload (8:ISAKMP_NEXT_HASH) | next payload chain: saving location 'ISAKMP Hash Payload'.'next payload type' in 'reply packet' | emitting 32 zero bytes of HASH DATA into ISAKMP Hash Payload | emitting length of ISAKMP Hash Payload: 36 | emitting quick defaults using policy none | empty esp_info, returning defaults for ENCRYPT | ***emit ISAKMP Security Association Payload: | next payload type: ISAKMP_NEXT_NONCE (0xa) | DOI: ISAKMP_DOI_IPSEC (0x1) | next payload chain: ignoring supplied 'ISAKMP Security Association Payload'.'next payload type' value 10:ISAKMP_NEXT_NONCE | next payload chain: setting previous 'ISAKMP Hash Payload'.'next payload type' to current ISAKMP Security Association Payload (1:ISAKMP_NEXT_SA) | next payload chain: saving location 'ISAKMP Security Association Payload'.'next payload type' in 'reply packet' | ****emit IPsec DOI SIT: | IPsec DOI SIT: SIT_IDENTITY_ONLY (0x1) | ikev1_out_sa pcn: 0 has 1 valid proposals | ikev1_out_sa pcn: 0 pn: 0<1 valid_count: 1 trans_cnt: 2 | ****emit ISAKMP Proposal Payload: | next payload type: ISAKMP_NEXT_NONE (0x0) | proposal number: 0 (0x0) | protocol ID: PROTO_IPSEC_ESP (0x3) | SPI size: 4 (0x4) | number of transforms: 2 (0x2) | last substructure: saving location 'ISAKMP Security Association Payload'.'ISAKMP Proposal Payload'.'next payload type' | netlink_get_spi: allocated 0x71e7a347 for esp.0@192.1.2.45 | emitting 4 raw bytes of SPI into ISAKMP Proposal Payload | SPI 71 e7 a3 47 | *****emit ISAKMP Transform Payload (ESP): | next payload type: ISAKMP_NEXT_T (0x3) | ESP transform number: 0 (0x0) | ESP transform ID: ESP_AES (0xc) | last substructure: saving location 'ISAKMP Proposal Payload'.'ISAKMP Transform Payload (ESP)'.'next payload type' | ******emit ISAKMP IPsec DOI attribute: | af+type: AF+GROUP_DESCRIPTION (0x8003) | length/value: 14 (0xe) | [14 is OAKLEY_GROUP_MODP2048] | ******emit ISAKMP IPsec DOI attribute: | af+type: AF+ENCAPSULATION_MODE (0x8004) | length/value: 1 (0x1) | [1 is ENCAPSULATION_MODE_TUNNEL] | ******emit ISAKMP IPsec DOI attribute: | af+type: AF+SA_LIFE_TYPE (0x8001) | length/value: 1 (0x1) | [1 is SA_LIFE_TYPE_SECONDS] | ******emit ISAKMP IPsec DOI attribute: | af+type: AF+SA_LIFE_DURATION (variable length) (0x8002) | length/value: 28800 (0x7080) | ******emit ISAKMP IPsec DOI attribute: | af+type: AF+AUTH_ALGORITHM (0x8005) | length/value: 2 (0x2) | [2 is AUTH_ALGORITHM_HMAC_SHA1] | ******emit ISAKMP IPsec DOI attribute: | af+type: AF+KEY_LENGTH (0x8006) | length/value: 128 (0x80) | emitting length of ISAKMP Transform Payload (ESP): 32 | *****emit ISAKMP Transform Payload (ESP): | next payload type: ISAKMP_NEXT_NONE (0x0) | ESP transform number: 1 (0x1) | ESP transform ID: ESP_3DES (0x3) | last substructure: checking 'ISAKMP Proposal Payload'.'ISAKMP Transform Payload (ESP)'.'next payload type' is ISAKMP_NEXT_T (0x3) | last substructure: saving location 'ISAKMP Proposal Payload'.'ISAKMP Transform Payload (ESP)'.'next payload type' | ******emit ISAKMP IPsec DOI attribute: | af+type: AF+GROUP_DESCRIPTION (0x8003) | length/value: 14 (0xe) | [14 is OAKLEY_GROUP_MODP2048] | ******emit ISAKMP IPsec DOI attribute: | af+type: AF+ENCAPSULATION_MODE (0x8004) | length/value: 1 (0x1) | [1 is ENCAPSULATION_MODE_TUNNEL] | ******emit ISAKMP IPsec DOI attribute: | af+type: AF+SA_LIFE_TYPE (0x8001) | length/value: 1 (0x1) | [1 is SA_LIFE_TYPE_SECONDS] | ******emit ISAKMP IPsec DOI attribute: | af+type: AF+SA_LIFE_DURATION (variable length) (0x8002) | length/value: 28800 (0x7080) | ******emit ISAKMP IPsec DOI attribute: | af+type: AF+AUTH_ALGORITHM (0x8005) | length/value: 2 (0x2) | [2 is AUTH_ALGORITHM_HMAC_SHA1] | emitting length of ISAKMP Transform Payload (ESP): 28 | emitting length of ISAKMP Proposal Payload: 72 | last substructure: checking 'ISAKMP Proposal Payload'.'ISAKMP Transform Payload (ESP)'.'next payload type' is 0 | emitting length of ISAKMP Security Association Payload: 84 | last substructure: checking 'ISAKMP Security Association Payload'.'ISAKMP Proposal Payload'.'next payload type' is 0 | ***emit ISAKMP Nonce Payload: | next payload type: ISAKMP_NEXT_KE (0x4) | next payload chain: ignoring supplied 'ISAKMP Nonce Payload'.'next payload type' value 4:ISAKMP_NEXT_KE | next payload chain: setting previous 'ISAKMP Security Association Payload'.'next payload type' to current ISAKMP Nonce Payload (10:ISAKMP_NEXT_NONCE) | next payload chain: saving location 'ISAKMP Nonce Payload'.'next payload type' in 'reply packet' | emitting 32 raw bytes of Ni into ISAKMP Nonce Payload | Ni bb cc 13 15 d3 08 4f 34 22 fb 8f 98 4e 54 3d 04 | Ni 75 82 8c 72 cd 1f 2d 0f 0e 26 33 78 ca 05 18 59 | emitting length of ISAKMP Nonce Payload: 36 | wire (crypto helper) group MODP2048 and state group MODP2048 match | DH secret MODP2048@0x7f83e80010c0: transferring ownership from helper KE to state #5 | ***emit ISAKMP Key Exchange Payload: | next payload type: ISAKMP_NEXT_ID (0x5) | next payload chain: ignoring supplied 'ISAKMP Key Exchange Payload'.'next payload type' value 5:ISAKMP_NEXT_ID | next payload chain: setting previous 'ISAKMP Nonce Payload'.'next payload type' to current ISAKMP Key Exchange Payload (4:ISAKMP_NEXT_KE) | next payload chain: saving location 'ISAKMP Key Exchange Payload'.'next payload type' in 'reply packet' | emitting 256 raw bytes of keyex value into ISAKMP Key Exchange Payload | keyex value 2c d6 70 d6 1b aa 27 fe fe cc 64 53 60 7c b3 c2 | keyex value b7 89 93 51 8a 26 94 d7 02 76 5e 67 4f 93 5e ad | keyex value 4d 78 5b a4 fc 6a 90 4b cc 4a c7 52 ef 82 e8 22 | keyex value 5a 79 19 3d 22 1f 7a 34 dd 4b d1 76 f5 4f 32 46 | keyex value dd 00 93 03 3e b0 14 ff 7b 8c ae 46 d5 e3 82 e9 | keyex value 89 2d 23 77 64 20 c1 93 30 e6 91 43 a8 89 a9 2c | keyex value dd da eb b2 8b ae f6 89 9b d9 dc 1a 2b f8 6c cd | keyex value fb 98 ae 81 d0 3c bd 76 56 6c 88 83 bf 72 9d 47 | keyex value c0 83 4d 10 ac 85 1d f3 d6 fb e8 99 62 5a 00 bd | keyex value 3d 5f a9 75 da 98 ad f9 58 13 1b c0 16 f5 0f 05 | keyex value 58 3c 32 4d 30 cc 5e 5d 26 d4 cc ee 95 0b 94 3b | keyex value 5d 76 7b 72 2e 87 f3 dc 53 d0 20 7a cb 0d 1c fc | keyex value 92 49 58 a7 7b 06 e9 95 fe 7a b2 0a c5 63 d5 b3 | keyex value a4 8c 89 92 d6 a0 20 45 9d d5 48 92 a3 e1 01 15 | keyex value f7 b7 cb 6c 7c 79 8c d9 67 d3 2e 75 3b 36 e1 43 | keyex value 06 0e 3d e3 9b b7 23 1d a8 d5 dd e2 71 b3 fe 62 | emitting length of ISAKMP Key Exchange Payload: 260 | ***emit ISAKMP Identification Payload (IPsec DOI): | next payload type: ISAKMP_NEXT_ID (0x5) | ID type: ID_IPV4_ADDR_SUBNET (0x4) | Protocol ID: 0 (0x0) | port: 0 (0x0) | next payload chain: ignoring supplied 'ISAKMP Identification Payload (IPsec DOI)'.'next payload type' value 5:ISAKMP_NEXT_ID | next payload chain: setting previous 'ISAKMP Key Exchange Payload'.'next payload type' to current ISAKMP Identification Payload (IPsec DOI) (5:ISAKMP_NEXT_ID) | next payload chain: saving location 'ISAKMP Identification Payload (IPsec DOI)'.'next payload type' in 'reply packet' | emitting 4 raw bytes of client network into ISAKMP Identification Payload (IPsec DOI) | client network c0 00 01 00 | emitting 4 raw bytes of client mask into ISAKMP Identification Payload (IPsec DOI) | client mask ff ff ff 00 | emitting length of ISAKMP Identification Payload (IPsec DOI): 16 | ***emit ISAKMP Identification Payload (IPsec DOI): | next payload type: ISAKMP_NEXT_NONE (0x0) | ID type: ID_IPV4_ADDR_SUBNET (0x4) | Protocol ID: 0 (0x0) | port: 0 (0x0) | next payload chain: setting previous 'ISAKMP Identification Payload (IPsec DOI)'.'next payload type' to current ISAKMP Identification Payload (IPsec DOI) (5:ISAKMP_NEXT_ID) | next payload chain: saving location 'ISAKMP Identification Payload (IPsec DOI)'.'next payload type' in 'reply packet' | emitting 4 raw bytes of client network into ISAKMP Identification Payload (IPsec DOI) | client network c0 00 02 00 | emitting 4 raw bytes of client mask into ISAKMP Identification Payload (IPsec DOI) | client mask ff ff ff 00 | emitting length of ISAKMP Identification Payload (IPsec DOI): 16 | HASH(1) PRF sha2_256 init SKEYID_a-key@0x56080aee2f70 (size 32) | HASH(1): SKEYID_a-key@0x56080aee2f70 (32-bytes, EXTRACT_KEY_FROM_KEY) | key-offset: 0, key-size: 32 | EXTRACT_KEY_FROM_KEY: | target: SHA256_HMAC | flags: SIGN | key_size: 32-bytes | base: base-key@0x56080aee2f70 (32-bytes, EXTRACT_KEY_FROM_KEY) | operation: FLAGS_ONLY | params: 8-bytes@0x7fff508fe858 | result: clone-key@0x7f83d8009640 (32-bytes, SHA256_HMAC) | HASH(1) prf: created sha2_256 context 0x56080aee6220 from SKEYID_a-key@0x7f83d8009640 | HASH(1) prf: begin sha2_256 with context 0x56080aee6220 from SKEYID_a-key@0x7f83d8009640 | HASH(1): release clone-key@0x7f83d8009640 | HASH(1) PRF sha2_256 crypt-prf@0x56080af01b70 | HASH(1) PRF sha2_256 update M-ID-bytes@0x7fff508fe93c (length 4) | 66 80 ec 6b | HASH(1) PRF sha2_256 update payload-bytes@0x560809a0e980 (length 412) | 0a 00 00 54 00 00 00 01 00 00 00 01 00 00 00 48 | 00 03 04 02 71 e7 a3 47 03 00 00 20 00 0c 00 00 | 80 03 00 0e 80 04 00 01 80 01 00 01 80 02 70 80 | 80 05 00 02 80 06 00 80 00 00 00 1c 01 03 00 00 | 80 03 00 0e 80 04 00 01 80 01 00 01 80 02 70 80 | 80 05 00 02 04 00 00 24 bb cc 13 15 d3 08 4f 34 | 22 fb 8f 98 4e 54 3d 04 75 82 8c 72 cd 1f 2d 0f | 0e 26 33 78 ca 05 18 59 05 00 01 04 2c d6 70 d6 | 1b aa 27 fe fe cc 64 53 60 7c b3 c2 b7 89 93 51 | 8a 26 94 d7 02 76 5e 67 4f 93 5e ad 4d 78 5b a4 | fc 6a 90 4b cc 4a c7 52 ef 82 e8 22 5a 79 19 3d | 22 1f 7a 34 dd 4b d1 76 f5 4f 32 46 dd 00 93 03 | 3e b0 14 ff 7b 8c ae 46 d5 e3 82 e9 89 2d 23 77 | 64 20 c1 93 30 e6 91 43 a8 89 a9 2c dd da eb b2 | 8b ae f6 89 9b d9 dc 1a 2b f8 6c cd fb 98 ae 81 | d0 3c bd 76 56 6c 88 83 bf 72 9d 47 c0 83 4d 10 | ac 85 1d f3 d6 fb e8 99 62 5a 00 bd 3d 5f a9 75 | da 98 ad f9 58 13 1b c0 16 f5 0f 05 58 3c 32 4d | 30 cc 5e 5d 26 d4 cc ee 95 0b 94 3b 5d 76 7b 72 | 2e 87 f3 dc 53 d0 20 7a cb 0d 1c fc 92 49 58 a7 | 7b 06 e9 95 fe 7a b2 0a c5 63 d5 b3 a4 8c 89 92 | d6 a0 20 45 9d d5 48 92 a3 e1 01 15 f7 b7 cb 6c | 7c 79 8c d9 67 d3 2e 75 3b 36 e1 43 06 0e 3d e3 | 9b b7 23 1d a8 d5 dd e2 71 b3 fe 62 05 00 00 10 | 04 00 00 00 c0 00 01 00 ff ff ff 00 00 00 00 10 | 04 00 00 00 c0 00 02 00 ff ff ff 00 | HASH(1) PRF sha2_256 final-bytes@0x560809a0e960 (length 32) | 02 e0 bc af b9 ec 22 15 5b f1 c2 ad ed 64 bf bf | 67 27 7f db 53 ac b1 65 09 b1 df 4e ba 0c e2 c5 | outI1 HASH(1): | 02 e0 bc af b9 ec 22 15 5b f1 c2 ad ed 64 bf bf | 67 27 7f db 53 ac b1 65 09 b1 df 4e ba 0c e2 c5 | last Phase 1 IV: c8 ea e9 b3 51 0b ea 24 90 87 5d b9 c1 a4 ec 95 | current Phase 1 IV: c8 ea e9 b3 51 0b ea 24 90 87 5d b9 c1 a4 ec 95 | Phase 2 IV hash sha2_256 init | Phase 2 IV hash sha2_256 digest PH1_IV-bytes@0x56080af00280 (length 16) | c8 ea e9 b3 51 0b ea 24 90 87 5d b9 c1 a4 ec 95 | Phase 2 IV hash sha2_256 digest MSGID-bytes@0x7fff508fe94c (length 4) | 66 80 ec 6b | Phase 2 IV hash sha2_256 final bytes@0x56080af00200 (length 32) | 5d d8 96 bb 95 30 64 11 04 dc 5d 70 6e e8 a3 51 | 8b ea 4b c0 39 44 fe 40 6b 30 ad 4e d6 ef 3a e4 | encrypting: 01 00 00 24 02 e0 bc af b9 ec 22 15 5b f1 c2 ad | encrypting: ed 64 bf bf 67 27 7f db 53 ac b1 65 09 b1 df 4e | encrypting: ba 0c e2 c5 0a 00 00 54 00 00 00 01 00 00 00 01 | encrypting: 00 00 00 48 00 03 04 02 71 e7 a3 47 03 00 00 20 | encrypting: 00 0c 00 00 80 03 00 0e 80 04 00 01 80 01 00 01 | encrypting: 80 02 70 80 80 05 00 02 80 06 00 80 00 00 00 1c | encrypting: 01 03 00 00 80 03 00 0e 80 04 00 01 80 01 00 01 | encrypting: 80 02 70 80 80 05 00 02 04 00 00 24 bb cc 13 15 | encrypting: d3 08 4f 34 22 fb 8f 98 4e 54 3d 04 75 82 8c 72 | encrypting: cd 1f 2d 0f 0e 26 33 78 ca 05 18 59 05 00 01 04 | encrypting: 2c d6 70 d6 1b aa 27 fe fe cc 64 53 60 7c b3 c2 | encrypting: b7 89 93 51 8a 26 94 d7 02 76 5e 67 4f 93 5e ad | encrypting: 4d 78 5b a4 fc 6a 90 4b cc 4a c7 52 ef 82 e8 22 | encrypting: 5a 79 19 3d 22 1f 7a 34 dd 4b d1 76 f5 4f 32 46 | encrypting: dd 00 93 03 3e b0 14 ff 7b 8c ae 46 d5 e3 82 e9 | encrypting: 89 2d 23 77 64 20 c1 93 30 e6 91 43 a8 89 a9 2c | encrypting: dd da eb b2 8b ae f6 89 9b d9 dc 1a 2b f8 6c cd | encrypting: fb 98 ae 81 d0 3c bd 76 56 6c 88 83 bf 72 9d 47 | encrypting: c0 83 4d 10 ac 85 1d f3 d6 fb e8 99 62 5a 00 bd | encrypting: 3d 5f a9 75 da 98 ad f9 58 13 1b c0 16 f5 0f 05 | encrypting: 58 3c 32 4d 30 cc 5e 5d 26 d4 cc ee 95 0b 94 3b | encrypting: 5d 76 7b 72 2e 87 f3 dc 53 d0 20 7a cb 0d 1c fc | encrypting: 92 49 58 a7 7b 06 e9 95 fe 7a b2 0a c5 63 d5 b3 | encrypting: a4 8c 89 92 d6 a0 20 45 9d d5 48 92 a3 e1 01 15 | encrypting: f7 b7 cb 6c 7c 79 8c d9 67 d3 2e 75 3b 36 e1 43 | encrypting: 06 0e 3d e3 9b b7 23 1d a8 d5 dd e2 71 b3 fe 62 | encrypting: 05 00 00 10 04 00 00 00 c0 00 01 00 ff ff ff 00 | encrypting: 00 00 00 10 04 00 00 00 c0 00 02 00 ff ff ff 00 | IV: 5d d8 96 bb 95 30 64 11 04 dc 5d 70 6e e8 a3 51 | IV: 8b ea 4b c0 39 44 fe 40 6b 30 ad 4e d6 ef 3a e4 | unpadded size is: 448 | encrypting 448 using AES_CBC | no IKEv1 message padding required | emitting length of ISAKMP Message: 476 | NSS ike_alg_nss_cbc: aes - enter | NSS ike_alg_nss_cbc: aes - exit | next IV: 05 63 c1 95 a2 c8 94 20 b1 4d 8d a5 4e 63 a1 42 | sending 476 bytes for reply packet from quick_outI1 through eth1 from 192.1.2.45:500 to 192.1.2.23:500 (using #5) | 3c e4 38 3f ed 34 7c e6 29 82 ac 69 b5 22 4f 63 | 08 10 20 01 66 80 ec 6b 00 00 01 dc 2a bb 69 02 | 14 cd 26 33 a4 04 1a 62 42 d7 a7 d4 d4 77 24 ff | b1 a5 47 71 06 a0 fd a5 56 85 1d d7 77 6b 29 45 | 6b 02 ab 35 0e 9d c2 e5 18 10 45 ad 94 b1 57 2d | f6 6e ea 29 d5 de 82 8f 51 31 13 63 16 2f 36 f0 | f9 cf 60 13 4e 89 68 cb 4d 6f b4 47 6d 05 49 43 | 44 0d ca 9f 83 d5 0d 94 bc ae 47 22 99 fb 6b 86 | 49 90 f6 5c 5e d1 8a 8e 28 e1 a8 4c 66 3e 03 1a | eb 7c 3c b9 c6 0a 41 66 9f 34 34 29 5f a7 03 5c | bd e0 36 f1 b7 5f 68 d4 54 73 91 3e 5d fd 40 69 | ca 19 f3 ed 7e e4 87 f2 52 6a df 67 7f 77 61 29 | 9c ba 71 67 fd 3d 95 1f 37 f2 07 eb 3f 90 aa 20 | 58 2d 3b 94 aa 13 ef 44 0a 23 3c 88 92 74 a8 d4 | ef 20 72 52 59 07 35 25 58 c5 46 7b 6e a8 ba 9b | 2f 64 64 dc 23 51 14 ef 8d cf eb c8 31 bf f8 0a | a3 9e 0f 98 fe 73 90 0a 66 48 60 ab 99 b7 69 53 | 67 6c a1 52 a3 0e 46 f7 25 af 14 d8 b0 0e d9 7b | 65 b2 7b 4f 5f 54 a1 05 b1 ff a2 ad 0c 9d f8 5e | a9 1a f1 5d 79 b3 22 62 08 37 7c 77 f1 4e 96 e3 | 0e 71 d7 06 23 d8 32 18 8e 8b 68 9b fd 93 aa 3d | 51 f1 6d c5 0e 73 a8 83 85 1d 62 9b 89 71 36 80 | 4f c8 cd 02 08 c2 2c e3 54 67 99 cd e3 b7 c7 9e | c7 0c 15 9d 3e 7b 1a 17 48 62 23 99 a2 64 90 a8 | 91 81 73 b1 c2 d4 29 78 9f 98 16 dd 13 2a 47 72 | f0 5b 0a c6 8d 25 9d db 42 0b d5 c7 ce 31 c9 f8 | d3 ef 6d f7 c0 23 a8 d1 27 9f 91 80 2d 6d d2 42 | 88 c4 1b db 8c 20 1e 4b 9f a5 8c d1 c7 f3 91 96 | 54 8d 6f a9 b7 48 9b c6 80 e0 19 5b 05 63 c1 95 | a2 c8 94 20 b1 4d 8d a5 4e 63 a1 42 | state #5 requesting EVENT_CRYPTO_TIMEOUT to be deleted | libevent_free: release ptr-libevent@0x7f83d4006900 | free_event_entry: release EVENT_CRYPTO_TIMEOUT-pe@0x7f83d4002b20 "westnets-eastnet/1x0" #5: IMPAIR: suppressing retransmits; scheduling timeout in 60 seconds | event_schedule: new EVENT_RETRANSMIT-pe@0x7f83e40041c0 | inserting event EVENT_RETRANSMIT, timeout in 60 seconds for #5 | libevent_malloc: new ptr-libevent@0x7f83d4006900 size 128 | #5 STATE_QUICK_I1: retransmits: first event in 60 seconds; timeout in 60 seconds; limit of 12 retransmits; current time is 50074.155993 | resume sending helper answer for #5 suppresed complete_v1_state_transition() | stop processing: state #5 connection "westnets-eastnet/1x0" from 192.1.2.23:500 (in resume_handler() at server.c:833) | libevent_free: release ptr-libevent@0x7f83e8007500 | processing signal PLUTO_SIGCHLD | waitpid returned ECHILD (no child processes left) | *received 92 bytes from 192.1.2.23:500 on eth1 (192.1.2.45:500) | 3c e4 38 3f ed 34 7c e6 29 82 ac 69 b5 22 4f 63 | 08 10 05 01 06 08 d6 5f 00 00 00 5c ec 74 4f b6 | bb 8d ee ac fe a0 58 de 05 21 6d d2 48 14 97 d4 | ad 04 73 07 61 f9 77 e5 c7 26 3e b6 76 34 ce e8 | 47 d9 29 f1 b5 c5 fa 32 93 a4 c3 e2 56 8c 4b 43 | a9 46 c0 93 0e 26 45 f3 03 13 8f 07 | start processing: from 192.1.2.23:500 (in process_md() at demux.c:378) | **parse ISAKMP Message: | initiator cookie: | 3c e4 38 3f ed 34 7c e6 | responder cookie: | 29 82 ac 69 b5 22 4f 63 | next payload type: ISAKMP_NEXT_HASH (0x8) | ISAKMP version: ISAKMP Version 1.0 (rfc2407) (0x10) | exchange type: ISAKMP_XCHG_INFO (0x5) | flags: ISAKMP_FLAG_v1_ENCRYPTION (0x1) | Message ID: 101242463 (0x608d65f) | length: 92 (0x5c) | processing version=1.0 packet with exchange type=ISAKMP_XCHG_INFO (5) | peer and cookies match on #5; msgid=00000000 st_msgid=6680ec6b st_msgid_phase15=00000000 | peer and cookies match on #4; msgid=00000000 st_msgid=ba31d75c st_msgid_phase15=00000000 | peer and cookies match on #1; msgid=00000000 st_msgid=00000000 st_msgid_phase15=00000000 | p15 state object #1 found, in STATE_MAIN_I4 | State DB: found IKEv1 state #1 in MAIN_I4 (find_v1_info_state) | start processing: state #1 connection "westnets-eastnet/2x0" from 192.1.2.23:500 (in process_v1_packet() at ikev1.c:1455) | last Phase 1 IV: c8 ea e9 b3 51 0b ea 24 90 87 5d b9 c1 a4 ec 95 | current Phase 1 IV: c8 ea e9 b3 51 0b ea 24 90 87 5d b9 c1 a4 ec 95 | Phase 2 IV hash sha2_256 init | Phase 2 IV hash sha2_256 digest PH1_IV-bytes@0x56080af00280 (length 16) | c8 ea e9 b3 51 0b ea 24 90 87 5d b9 c1 a4 ec 95 | Phase 2 IV hash sha2_256 digest MSGID-bytes@0x7fff508fedec (length 4) | 06 08 d6 5f | Phase 2 IV hash sha2_256 final bytes@0x56080af00200 (length 32) | aa 49 39 cf da 5b 88 e5 a1 45 7f 9b a8 7b 11 19 | 43 e8 ed 28 19 9e a3 bd ec 3e 24 5d 2d 0e 63 e1 | #1 is idle | #1 idle | received encrypted packet from 192.1.2.23:500 | decrypting 64 bytes using algorithm AES_CBC | IV before: aa 49 39 cf da 5b 88 e5 a1 45 7f 9b a8 7b 11 19 | NSS ike_alg_nss_cbc: aes - enter | NSS ike_alg_nss_cbc: aes - exit | IV after: 56 8c 4b 43 a9 46 c0 93 0e 26 45 f3 03 13 8f 07 | decrypted payload (starts at offset -64): | 3c e4 38 3f ed 34 7c e6 29 82 ac 69 b5 22 4f 63 | 08 10 05 01 06 08 d6 5f 00 00 00 5c 0c 00 00 24 | 57 a1 db 47 73 27 f9 b0 5d b9 ba cf 0b 40 a6 3c | a4 1c ab eb 7c 40 1b 4e ba 1a 28 a7 0b 96 b5 66 | 00 00 00 1c 00 00 00 01 01 10 00 01 3c e4 38 3f | ed 34 7c e6 29 82 ac 69 b5 22 4f 63 | got payload 0x100 (ISAKMP_NEXT_HASH) needed: 0x100 opt: 0x0 | ***parse ISAKMP Hash Payload: | next payload type: ISAKMP_NEXT_D (0xc) | length: 36 (0x24) | got payload 0x1000 (ISAKMP_NEXT_D) needed: 0x0 opt: 0x0 | ***parse ISAKMP Delete Payload: | next payload type: ISAKMP_NEXT_NONE (0x0) | length: 28 (0x1c) | DOI: ISAKMP_DOI_IPSEC (0x1) | protocol ID: 1 (0x1) | SPI size: 16 (0x10) | number of SPIs: 1 (0x1) | HASH(1) PRF sha2_256 init SKEYID_a-key@0x56080aee2f70 (size 32) | HASH(1): SKEYID_a-key@0x56080aee2f70 (32-bytes, EXTRACT_KEY_FROM_KEY) | key-offset: 0, key-size: 32 | EXTRACT_KEY_FROM_KEY: | target: SHA256_HMAC | flags: SIGN | key_size: 32-bytes | base: base-key@0x56080aee2f70 (32-bytes, EXTRACT_KEY_FROM_KEY) | operation: FLAGS_ONLY | params: 8-bytes@0x7fff508feb48 | result: clone-key@0x7f83d8009640 (32-bytes, SHA256_HMAC) | HASH(1) prf: created sha2_256 context 0x56080aef2390 from SKEYID_a-key@0x7f83d8009640 | HASH(1) prf: begin sha2_256 with context 0x56080aef2390 from SKEYID_a-key@0x7f83d8009640 | HASH(1): release clone-key@0x7f83d8009640 | HASH(1) PRF sha2_256 crypt-prf@0x7f83e4000d60 | HASH(1) PRF sha2_256 update M-ID-bytes@0x7fff508fec2c (length 4) | 06 08 d6 5f | HASH(1) PRF sha2_256 update payload-bytes@0x56080aee6260 (length 28) | 00 00 00 1c 00 00 00 01 01 10 00 01 3c e4 38 3f | ed 34 7c e6 29 82 ac 69 b5 22 4f 63 | HASH(1) PRF sha2_256 final-bytes@0x7fff508fecb0 (length 32) | 57 a1 db 47 73 27 f9 b0 5d b9 ba cf 0b 40 a6 3c | a4 1c ab eb 7c 40 1b 4e ba 1a 28 a7 0b 96 b5 66 | informational HASH(1): | 57 a1 db 47 73 27 f9 b0 5d b9 ba cf 0b 40 a6 3c | a4 1c ab eb 7c 40 1b 4e ba 1a 28 a7 0b 96 b5 66 | received 'informational' message HASH(1) data ok | parsing 8 raw bytes of ISAKMP Delete Payload into iCookie | iCookie 3c e4 38 3f ed 34 7c e6 | parsing 8 raw bytes of ISAKMP Delete Payload into rCookie | rCookie 29 82 ac 69 b5 22 4f 63 | State DB: found IKEv1 state #1 in MAIN_I4 (find_state_ikev1) | del: "westnets-eastnet/2x0" #1: received Delete SA payload: self-deleting ISAKMP State #1 | pstats #1 ikev1.isakmp deleted completed | [RE]START processing: state #1 connection "westnets-eastnet/2x0" from 192.1.2.23:500 (in delete_state() at state.c:879) "westnets-eastnet/2x0" #1: deleting state (STATE_MAIN_I4) aged 8.362s and sending notification | parent state #1: MAIN_I4(established IKE SA) => delete | #1 send IKEv1 delete notification for STATE_MAIN_I4 | **emit ISAKMP Message: | initiator cookie: | 3c e4 38 3f ed 34 7c e6 | responder cookie: | 29 82 ac 69 b5 22 4f 63 | next payload type: ISAKMP_NEXT_NONE (0x0) | ISAKMP version: ISAKMP Version 1.0 (rfc2407) (0x10) | exchange type: ISAKMP_XCHG_INFO (0x5) | flags: ISAKMP_FLAG_v1_ENCRYPTION (0x1) | Message ID: 4109520327 (0xf4f24dc7) | next payload chain: saving message location 'ISAKMP Message'.'next payload type' | ***emit ISAKMP Hash Payload: | next payload type: ISAKMP_NEXT_NONE (0x0) | next payload chain: setting previous 'ISAKMP Message'.'next payload type' to current ISAKMP Hash Payload (8:ISAKMP_NEXT_HASH) | next payload chain: saving location 'ISAKMP Hash Payload'.'next payload type' in 'delete msg' | emitting 32 zero bytes of HASH DATA into ISAKMP Hash Payload | emitting length of ISAKMP Hash Payload: 36 | ***emit ISAKMP Delete Payload: | next payload type: ISAKMP_NEXT_NONE (0x0) | DOI: ISAKMP_DOI_IPSEC (0x1) | protocol ID: 1 (0x1) | SPI size: 16 (0x10) | number of SPIs: 1 (0x1) | next payload chain: setting previous 'ISAKMP Hash Payload'.'next payload type' to current ISAKMP Delete Payload (12:ISAKMP_NEXT_D) | next payload chain: saving location 'ISAKMP Delete Payload'.'next payload type' in 'delete msg' | emitting 8 raw bytes of initiator SPI into ISAKMP Delete Payload | initiator SPI 3c e4 38 3f ed 34 7c e6 | emitting 8 raw bytes of responder SPI into ISAKMP Delete Payload | responder SPI 29 82 ac 69 b5 22 4f 63 | emitting length of ISAKMP Delete Payload: 28 | HASH(1) PRF sha2_256 init SKEYID_a-key@0x56080aee2f70 (size 32) | HASH(1): SKEYID_a-key@0x56080aee2f70 (32-bytes, EXTRACT_KEY_FROM_KEY) | key-offset: 0, key-size: 32 | EXTRACT_KEY_FROM_KEY: | target: SHA256_HMAC | flags: SIGN | key_size: 32-bytes | base: base-key@0x56080aee2f70 (32-bytes, EXTRACT_KEY_FROM_KEY) | operation: FLAGS_ONLY | params: 8-bytes@0x7fff508fc3f8 | result: clone-key@0x7f83d8009640 (32-bytes, SHA256_HMAC) | HASH(1) prf: created sha2_256 context 0x56080aef2390 from SKEYID_a-key@0x7f83d8009640 | HASH(1) prf: begin sha2_256 with context 0x56080aef2390 from SKEYID_a-key@0x7f83d8009640 | HASH(1): release clone-key@0x7f83d8009640 | HASH(1) PRF sha2_256 crypt-prf@0x56080af01b70 | HASH(1) PRF sha2_256 update M-ID-bytes@0x7fff508fc4dc (length 4) | f4 f2 4d c7 | HASH(1) PRF sha2_256 update payload-bytes@0x7fff508fc890 (length 28) | 00 00 00 1c 00 00 00 01 01 10 00 01 3c e4 38 3f | ed 34 7c e6 29 82 ac 69 b5 22 4f 63 | HASH(1) PRF sha2_256 final-bytes@0x7fff508fc870 (length 32) | 97 d9 4d d4 ea fa 0f ce 9c 8b 43 c3 e2 62 ce 8d | 7b ae f7 66 e2 83 05 4d 31 92 6b f0 52 9f 93 cf | send delete HASH(1): | 97 d9 4d d4 ea fa 0f ce 9c 8b 43 c3 e2 62 ce 8d | 7b ae f7 66 e2 83 05 4d 31 92 6b f0 52 9f 93 cf | last Phase 1 IV: c8 ea e9 b3 51 0b ea 24 90 87 5d b9 c1 a4 ec 95 | current Phase 1 IV: c8 ea e9 b3 51 0b ea 24 90 87 5d b9 c1 a4 ec 95 | Phase 2 IV hash sha2_256 init | Phase 2 IV hash sha2_256 digest PH1_IV-bytes@0x56080af00280 (length 16) | c8 ea e9 b3 51 0b ea 24 90 87 5d b9 c1 a4 ec 95 | Phase 2 IV hash sha2_256 digest MSGID-bytes@0x7fff508fc4ec (length 4) | f4 f2 4d c7 | Phase 2 IV hash sha2_256 final bytes@0x56080af00200 (length 32) | bc ab 13 33 d9 a4 40 b5 fe 0d 23 2b 22 16 a7 bb | 34 6e ff 24 ce a9 24 47 07 f0 c7 bb 3c bb 41 86 | encrypting: 0c 00 00 24 97 d9 4d d4 ea fa 0f ce 9c 8b 43 c3 | encrypting: e2 62 ce 8d 7b ae f7 66 e2 83 05 4d 31 92 6b f0 | encrypting: 52 9f 93 cf 00 00 00 1c 00 00 00 01 01 10 00 01 | encrypting: 3c e4 38 3f ed 34 7c e6 29 82 ac 69 b5 22 4f 63 | IV: bc ab 13 33 d9 a4 40 b5 fe 0d 23 2b 22 16 a7 bb | IV: 34 6e ff 24 ce a9 24 47 07 f0 c7 bb 3c bb 41 86 | unpadded size is: 64 | encrypting 64 using AES_CBC | no IKEv1 message padding required | emitting length of ISAKMP Message: 92 | NSS ike_alg_nss_cbc: aes - enter | NSS ike_alg_nss_cbc: aes - exit | next IV: 70 1e d6 29 83 a1 35 6c f3 24 90 af 8d 3a 6f 9f | sending 92 bytes for delete notify through eth1 from 192.1.2.45:500 to 192.1.2.23:500 (using #1) | 3c e4 38 3f ed 34 7c e6 29 82 ac 69 b5 22 4f 63 | 08 10 05 01 f4 f2 4d c7 00 00 00 5c 98 ce 71 3f | 8a d0 57 1c 4b dd 04 43 77 62 c0 1f 7d c4 eb 20 | 03 30 57 84 06 62 d5 e3 f1 fe e2 72 e6 c9 fb 00 | 36 55 a0 5a 52 77 4d 47 31 86 ab d2 70 1e d6 29 | 83 a1 35 6c f3 24 90 af 8d 3a 6f 9f | state #1 requesting EVENT_SA_REPLACE to be deleted | libevent_free: release ptr-libevent@0x56080af02140 | free_event_entry: release EVENT_SA_REPLACE-pe@0x56080af008f0 "westnets-eastnet/2x0" #1: reschedule pending child #5 STATE_QUICK_I1 of connection "westnets-eastnet/1x0" - the parent is going away | state #5 requesting EVENT_RETRANSMIT to be deleted | #5 STATE_QUICK_I1: retransmits: cleared | libevent_free: release ptr-libevent@0x7f83d4006900 | free_event_entry: release EVENT_RETRANSMIT-pe@0x7f83e40041c0 | event_schedule: new EVENT_SA_REPLACE-pe@0x56080af008f0 | inserting event EVENT_SA_REPLACE, timeout in 0 seconds for #5 | libevent_malloc: new ptr-libevent@0x7f83d4006900 size 128 "westnets-eastnet/2x0" #1: reschedule pending child #4 STATE_QUICK_I1 of connection "westnets-eastnet/2x0" - the parent is going away | state #4 requesting EVENT_RETRANSMIT to be deleted | #4 STATE_QUICK_I1: retransmits: cleared | libevent_free: release ptr-libevent@0x7f83d0001ef0 | free_event_entry: release EVENT_RETRANSMIT-pe@0x7f83d8005860 | event_schedule: new EVENT_SA_REPLACE-pe@0x7f83d8005860 | inserting event EVENT_SA_REPLACE, timeout in 0 seconds for #4 | libevent_malloc: new ptr-libevent@0x7f83d0001ef0 size 128 | State DB: IKEv1 state not found (flush_incomplete_children) | picked newest_isakmp_sa #0 for #1 "westnets-eastnet/2x0" #1: deleting IKE SA for connection 'westnets-eastnet/2x0' but connection is supposed to remain up; schedule EVENT_REVIVE_CONNS | add revival: connection 'westnets-eastnet/2x0' added to the list and scheduled for 0 seconds | global one-shot timer EVENT_REVIVE_CONNS scheduled in 0 seconds | in connection_discard for connection westnets-eastnet/2x0 | State DB: deleting IKEv1 state #1 in MAIN_I4 | parent state #1: MAIN_I4(established IKE SA) => UNDEFINED(ignore) | unreference key: 0x56080ae616c0 @east cnt 2-- | DH secret MODP2048@0x7f83e8000d60: destroyed | stop processing: state #1 from 192.1.2.23:500 (in delete_state() at state.c:1143) | delete_state: release st->st_shared_nss-key@0x56080aeef1b0 | delete_state: release st->st_skeyid_nss-key@0x56080aeed4f0 | delete_state: release st->st_skey_d_nss-key@0x56080aeea0c0 | delete_state: release st->st_skey_ai_nss-key@0x56080aee2f70 | delete_state: release st->st_skey_ar_nss-key@NULL | delete_state: release st->st_skey_ei_nss-key@0x56080aef0b10 | delete_state: release st->st_skey_er_nss-key@NULL | delete_state: release st->st_skey_pi_nss-key@NULL | delete_state: release st->st_skey_pr_nss-key@NULL | delete_state: release st->st_enc_key_nss-key@0x56080aee47f0 | delete_state: release st->st_sk_d_no_ppk-key@NULL | delete_state: release st->st_sk_pi_no_ppk-key@NULL | delete_state: release st->st_sk_pr_no_ppk-key@NULL | in statetime_start() with no state | complete v1 state transition with STF_IGNORE | stop processing: from 192.1.2.23:500 (in process_md() at demux.c:380) | processing: STOP state #0 (in process_md() at demux.c:382) | processing: STOP connection NULL (in process_md() at demux.c:383) | timer_event_cb: processing event@0x56080af008f0 | handling event EVENT_SA_REPLACE for child state #5 | start processing: state #5 connection "westnets-eastnet/1x0" from 192.1.2.23:500 (in timer_event_cb() at timer.c:250) | picked newest_ipsec_sa #0 for #5 | replacing stale IPsec SA | dup_any(fd@-1) -> fd@-1 (in ipsecdoi_replace() at ipsec_doi.c:351) | FOR_EACH_STATE_... in find_phase1_state | creating state object #6 at 0x56080aeffdf0 | State DB: adding IKEv1 state #6 in UNDEFINED | pstats #6 ikev1.isakmp started | suspend processing: state #5 connection "westnets-eastnet/1x0" from 192.1.2.23:500 (in main_outI1() at ikev1_main.c:118) | start processing: state #6 connection "westnets-eastnet/1x0" from 192.1.2.23:500 (in main_outI1() at ikev1_main.c:118) | parent state #6: UNDEFINED(ignore) => MAIN_I1(half-open IKE SA) | dup_any(fd@-1) -> fd@-1 (in main_outI1() at ikev1_main.c:123) | Queuing pending IPsec SA negotiating with 192.1.2.23 "westnets-eastnet/1x0" IKE SA #6 "westnets-eastnet/1x0" "westnets-eastnet/1x0" #6: initiating Main Mode | **emit ISAKMP Message: | initiator cookie: | 20 c4 f2 a2 1c c1 19 06 | responder cookie: | 00 00 00 00 00 00 00 00 | next payload type: ISAKMP_NEXT_SA (0x1) | ISAKMP version: ISAKMP Version 1.0 (rfc2407) (0x10) | exchange type: ISAKMP_XCHG_IDPROT (0x2) | flags: none (0x0) | Message ID: 0 (0x0) | next payload chain: saving message location 'ISAKMP Message'.'next payload type' | next payload chain: ignoring supplied 'ISAKMP Message'.'next payload type' value 1:ISAKMP_NEXT_SA | no specific IKE algorithms specified - using defaults | oakley_alg_makedb() processing ealg=aes=7 halg=sha2_256=4 modp=MODP2048=14 eklen=0 | oakley_alg_makedb() processing ealg=aes=7 halg=sha2_512=6 modp=MODP2048=14 eklen=0 | oakley_alg_makedb() processing ealg=aes=7 halg=sha=2 modp=MODP2048=14 eklen=0 | oakley_alg_makedb() processing ealg=aes=7 halg=sha2_256=4 modp=MODP1536=5 eklen=0 | oakley_alg_makedb() processing ealg=aes=7 halg=sha2_512=6 modp=MODP1536=5 eklen=0 | oakley_alg_makedb() processing ealg=aes=7 halg=sha=2 modp=MODP1536=5 eklen=0 | oakley_alg_makedb() processing ealg=3des_cbc=5 halg=sha2_256=4 modp=MODP2048=14 eklen=0 | oakley_alg_makedb() processing ealg=3des_cbc=5 halg=sha2_512=6 modp=MODP2048=14 eklen=0 | oakley_alg_makedb() processing ealg=3des_cbc=5 halg=sha=2 modp=MODP2048=14 eklen=0 | oakley_alg_makedb() processing ealg=3des_cbc=5 halg=sha2_256=4 modp=MODP1536=5 eklen=0 | oakley_alg_makedb() processing ealg=3des_cbc=5 halg=sha2_512=6 modp=MODP1536=5 eklen=0 | oakley_alg_makedb() processing ealg=3des_cbc=5 halg=sha=2 modp=MODP1536=5 eklen=0 | oakley_alg_makedb() returning 0x56080af089f0 | ***emit ISAKMP Security Association Payload: | next payload type: ISAKMP_NEXT_VID (0xd) | DOI: ISAKMP_DOI_IPSEC (0x1) | next payload chain: ignoring supplied 'ISAKMP Security Association Payload'.'next payload type' value 13:ISAKMP_NEXT_VID | next payload chain: setting previous 'ISAKMP Message'.'next payload type' to current ISAKMP Security Association Payload (1:ISAKMP_NEXT_SA) | next payload chain: saving location 'ISAKMP Security Association Payload'.'next payload type' in 'reply packet' | ****emit IPsec DOI SIT: | IPsec DOI SIT: SIT_IDENTITY_ONLY (0x1) | ikev1_out_sa pcn: 0 has 1 valid proposals | ikev1_out_sa pcn: 0 pn: 0<1 valid_count: 1 trans_cnt: 18 | ****emit ISAKMP Proposal Payload: | next payload type: ISAKMP_NEXT_NONE (0x0) | proposal number: 0 (0x0) | protocol ID: PROTO_ISAKMP (0x1) | SPI size: 0 (0x0) | number of transforms: 18 (0x12) | last substructure: saving location 'ISAKMP Security Association Payload'.'ISAKMP Proposal Payload'.'next payload type' | *****emit ISAKMP Transform Payload (ISAKMP): | next payload type: ISAKMP_NEXT_T (0x3) | ISAKMP transform number: 0 (0x0) | ISAKMP transform ID: KEY_IKE (0x1) | last substructure: saving location 'ISAKMP Proposal Payload'.'ISAKMP Transform Payload (ISAKMP)'.'next payload type' | ******emit ISAKMP Oakley attribute: | af+type: AF+OAKLEY_LIFE_TYPE (0x800b) | length/value: 1 (0x1) | [1 is OAKLEY_LIFE_SECONDS] | ******emit ISAKMP Oakley attribute: | af+type: AF+OAKLEY_LIFE_DURATION (variable length) (0x800c) | length/value: 3600 (0xe10) | ******emit ISAKMP Oakley attribute: | af+type: AF+OAKLEY_ENCRYPTION_ALGORITHM (0x8001) | length/value: 7 (0x7) | [7 is OAKLEY_AES_CBC] | ******emit ISAKMP Oakley attribute: | af+type: AF+OAKLEY_HASH_ALGORITHM (0x8002) | length/value: 4 (0x4) | [4 is OAKLEY_SHA2_256] | ******emit ISAKMP Oakley attribute: | af+type: AF+OAKLEY_AUTHENTICATION_METHOD (0x8003) | length/value: 3 (0x3) | [3 is OAKLEY_RSA_SIG] | ******emit ISAKMP Oakley attribute: | af+type: AF+OAKLEY_GROUP_DESCRIPTION (0x8004) | length/value: 14 (0xe) | [14 is OAKLEY_GROUP_MODP2048] | ******emit ISAKMP Oakley attribute: | af+type: AF+OAKLEY_KEY_LENGTH (0x800e) | length/value: 256 (0x100) | emitting length of ISAKMP Transform Payload (ISAKMP): 36 | *****emit ISAKMP Transform Payload (ISAKMP): | next payload type: ISAKMP_NEXT_T (0x3) | ISAKMP transform number: 1 (0x1) | ISAKMP transform ID: KEY_IKE (0x1) | last substructure: checking 'ISAKMP Proposal Payload'.'ISAKMP Transform Payload (ISAKMP)'.'next payload type' is ISAKMP_NEXT_T (0x3) | last substructure: saving location 'ISAKMP Proposal Payload'.'ISAKMP Transform Payload (ISAKMP)'.'next payload type' | ******emit ISAKMP Oakley attribute: | af+type: AF+OAKLEY_LIFE_TYPE (0x800b) | length/value: 1 (0x1) | [1 is OAKLEY_LIFE_SECONDS] | ******emit ISAKMP Oakley attribute: | af+type: AF+OAKLEY_LIFE_DURATION (variable length) (0x800c) | length/value: 3600 (0xe10) | ******emit ISAKMP Oakley attribute: | af+type: AF+OAKLEY_ENCRYPTION_ALGORITHM (0x8001) | length/value: 7 (0x7) | [7 is OAKLEY_AES_CBC] | ******emit ISAKMP Oakley attribute: | af+type: AF+OAKLEY_HASH_ALGORITHM (0x8002) | length/value: 4 (0x4) | [4 is OAKLEY_SHA2_256] | ******emit ISAKMP Oakley attribute: | af+type: AF+OAKLEY_AUTHENTICATION_METHOD (0x8003) | length/value: 3 (0x3) | [3 is OAKLEY_RSA_SIG] | ******emit ISAKMP Oakley attribute: | af+type: AF+OAKLEY_GROUP_DESCRIPTION (0x8004) | length/value: 14 (0xe) | [14 is OAKLEY_GROUP_MODP2048] | ******emit ISAKMP Oakley attribute: | af+type: AF+OAKLEY_KEY_LENGTH (0x800e) | length/value: 128 (0x80) | emitting length of ISAKMP Transform Payload (ISAKMP): 36 | *****emit ISAKMP Transform Payload (ISAKMP): | next payload type: ISAKMP_NEXT_T (0x3) | ISAKMP transform number: 2 (0x2) | ISAKMP transform ID: KEY_IKE (0x1) | last substructure: checking 'ISAKMP Proposal Payload'.'ISAKMP Transform Payload (ISAKMP)'.'next payload type' is ISAKMP_NEXT_T (0x3) | last substructure: saving location 'ISAKMP Proposal Payload'.'ISAKMP Transform Payload (ISAKMP)'.'next payload type' | ******emit ISAKMP Oakley attribute: | af+type: AF+OAKLEY_LIFE_TYPE (0x800b) | length/value: 1 (0x1) | [1 is OAKLEY_LIFE_SECONDS] | ******emit ISAKMP Oakley attribute: | af+type: AF+OAKLEY_LIFE_DURATION (variable length) (0x800c) | length/value: 3600 (0xe10) | ******emit ISAKMP Oakley attribute: | af+type: AF+OAKLEY_ENCRYPTION_ALGORITHM (0x8001) | length/value: 7 (0x7) | [7 is OAKLEY_AES_CBC] | ******emit ISAKMP Oakley attribute: | af+type: AF+OAKLEY_HASH_ALGORITHM (0x8002) | length/value: 6 (0x6) | [6 is OAKLEY_SHA2_512] | ******emit ISAKMP Oakley attribute: | af+type: AF+OAKLEY_AUTHENTICATION_METHOD (0x8003) | length/value: 3 (0x3) | [3 is OAKLEY_RSA_SIG] | ******emit ISAKMP Oakley attribute: | af+type: AF+OAKLEY_GROUP_DESCRIPTION (0x8004) | length/value: 14 (0xe) | [14 is OAKLEY_GROUP_MODP2048] | ******emit ISAKMP Oakley attribute: | af+type: AF+OAKLEY_KEY_LENGTH (0x800e) | length/value: 256 (0x100) | emitting length of ISAKMP Transform Payload (ISAKMP): 36 | *****emit ISAKMP Transform Payload (ISAKMP): | next payload type: ISAKMP_NEXT_T (0x3) | ISAKMP transform number: 3 (0x3) | ISAKMP transform ID: KEY_IKE (0x1) | last substructure: checking 'ISAKMP Proposal Payload'.'ISAKMP Transform Payload (ISAKMP)'.'next payload type' is ISAKMP_NEXT_T (0x3) | last substructure: saving location 'ISAKMP Proposal Payload'.'ISAKMP Transform Payload (ISAKMP)'.'next payload type' | ******emit ISAKMP Oakley attribute: | af+type: AF+OAKLEY_LIFE_TYPE (0x800b) | length/value: 1 (0x1) | [1 is OAKLEY_LIFE_SECONDS] | ******emit ISAKMP Oakley attribute: | af+type: AF+OAKLEY_LIFE_DURATION (variable length) (0x800c) | length/value: 3600 (0xe10) | ******emit ISAKMP Oakley attribute: | af+type: AF+OAKLEY_ENCRYPTION_ALGORITHM (0x8001) | length/value: 7 (0x7) | [7 is OAKLEY_AES_CBC] | ******emit ISAKMP Oakley attribute: | af+type: AF+OAKLEY_HASH_ALGORITHM (0x8002) | length/value: 6 (0x6) | [6 is OAKLEY_SHA2_512] | ******emit ISAKMP Oakley attribute: | af+type: AF+OAKLEY_AUTHENTICATION_METHOD (0x8003) | length/value: 3 (0x3) | [3 is OAKLEY_RSA_SIG] | ******emit ISAKMP Oakley attribute: | af+type: AF+OAKLEY_GROUP_DESCRIPTION (0x8004) | length/value: 14 (0xe) | [14 is OAKLEY_GROUP_MODP2048] | ******emit ISAKMP Oakley attribute: | af+type: AF+OAKLEY_KEY_LENGTH (0x800e) | length/value: 128 (0x80) | emitting length of ISAKMP Transform Payload (ISAKMP): 36 | *****emit ISAKMP Transform Payload (ISAKMP): | next payload type: ISAKMP_NEXT_T (0x3) | ISAKMP transform number: 4 (0x4) | ISAKMP transform ID: KEY_IKE (0x1) | last substructure: checking 'ISAKMP Proposal Payload'.'ISAKMP Transform Payload (ISAKMP)'.'next payload type' is ISAKMP_NEXT_T (0x3) | last substructure: saving location 'ISAKMP Proposal Payload'.'ISAKMP Transform Payload (ISAKMP)'.'next payload type' | ******emit ISAKMP Oakley attribute: | af+type: AF+OAKLEY_LIFE_TYPE (0x800b) | length/value: 1 (0x1) | [1 is OAKLEY_LIFE_SECONDS] | ******emit ISAKMP Oakley attribute: | af+type: AF+OAKLEY_LIFE_DURATION (variable length) (0x800c) | length/value: 3600 (0xe10) | ******emit ISAKMP Oakley attribute: | af+type: AF+OAKLEY_ENCRYPTION_ALGORITHM (0x8001) | length/value: 7 (0x7) | [7 is OAKLEY_AES_CBC] | ******emit ISAKMP Oakley attribute: | af+type: AF+OAKLEY_HASH_ALGORITHM (0x8002) | length/value: 2 (0x2) | [2 is OAKLEY_SHA1] | ******emit ISAKMP Oakley attribute: | af+type: AF+OAKLEY_AUTHENTICATION_METHOD (0x8003) | length/value: 3 (0x3) | [3 is OAKLEY_RSA_SIG] | ******emit ISAKMP Oakley attribute: | af+type: AF+OAKLEY_GROUP_DESCRIPTION (0x8004) | length/value: 14 (0xe) | [14 is OAKLEY_GROUP_MODP2048] | ******emit ISAKMP Oakley attribute: | af+type: AF+OAKLEY_KEY_LENGTH (0x800e) | length/value: 256 (0x100) | emitting length of ISAKMP Transform Payload (ISAKMP): 36 | *****emit ISAKMP Transform Payload (ISAKMP): | next payload type: ISAKMP_NEXT_T (0x3) | ISAKMP transform number: 5 (0x5) | ISAKMP transform ID: KEY_IKE (0x1) | last substructure: checking 'ISAKMP Proposal Payload'.'ISAKMP Transform Payload (ISAKMP)'.'next payload type' is ISAKMP_NEXT_T (0x3) | last substructure: saving location 'ISAKMP Proposal Payload'.'ISAKMP Transform Payload (ISAKMP)'.'next payload type' | ******emit ISAKMP Oakley attribute: | af+type: AF+OAKLEY_LIFE_TYPE (0x800b) | length/value: 1 (0x1) | [1 is OAKLEY_LIFE_SECONDS] | ******emit ISAKMP Oakley attribute: | af+type: AF+OAKLEY_LIFE_DURATION (variable length) (0x800c) | length/value: 3600 (0xe10) | ******emit ISAKMP Oakley attribute: | af+type: AF+OAKLEY_ENCRYPTION_ALGORITHM (0x8001) | length/value: 7 (0x7) | [7 is OAKLEY_AES_CBC] | ******emit ISAKMP Oakley attribute: | af+type: AF+OAKLEY_HASH_ALGORITHM (0x8002) | length/value: 2 (0x2) | [2 is OAKLEY_SHA1] | ******emit ISAKMP Oakley attribute: | af+type: AF+OAKLEY_AUTHENTICATION_METHOD (0x8003) | length/value: 3 (0x3) | [3 is OAKLEY_RSA_SIG] | ******emit ISAKMP Oakley attribute: | af+type: AF+OAKLEY_GROUP_DESCRIPTION (0x8004) | length/value: 14 (0xe) | [14 is OAKLEY_GROUP_MODP2048] | ******emit ISAKMP Oakley attribute: | af+type: AF+OAKLEY_KEY_LENGTH (0x800e) | length/value: 128 (0x80) | emitting length of ISAKMP Transform Payload (ISAKMP): 36 | *****emit ISAKMP Transform Payload (ISAKMP): | next payload type: ISAKMP_NEXT_T (0x3) | ISAKMP transform number: 6 (0x6) | ISAKMP transform ID: KEY_IKE (0x1) | last substructure: checking 'ISAKMP Proposal Payload'.'ISAKMP Transform Payload (ISAKMP)'.'next payload type' is ISAKMP_NEXT_T (0x3) | last substructure: saving location 'ISAKMP Proposal Payload'.'ISAKMP Transform Payload (ISAKMP)'.'next payload type' | ******emit ISAKMP Oakley attribute: | af+type: AF+OAKLEY_LIFE_TYPE (0x800b) | length/value: 1 (0x1) | [1 is OAKLEY_LIFE_SECONDS] | ******emit ISAKMP Oakley attribute: | af+type: AF+OAKLEY_LIFE_DURATION (variable length) (0x800c) | length/value: 3600 (0xe10) | ******emit ISAKMP Oakley attribute: | af+type: AF+OAKLEY_ENCRYPTION_ALGORITHM (0x8001) | length/value: 7 (0x7) | [7 is OAKLEY_AES_CBC] | ******emit ISAKMP Oakley attribute: | af+type: AF+OAKLEY_HASH_ALGORITHM (0x8002) | length/value: 4 (0x4) | [4 is OAKLEY_SHA2_256] | ******emit ISAKMP Oakley attribute: | af+type: AF+OAKLEY_AUTHENTICATION_METHOD (0x8003) | length/value: 3 (0x3) | [3 is OAKLEY_RSA_SIG] | ******emit ISAKMP Oakley attribute: | af+type: AF+OAKLEY_GROUP_DESCRIPTION (0x8004) | length/value: 5 (0x5) | [5 is OAKLEY_GROUP_MODP1536] | ******emit ISAKMP Oakley attribute: | af+type: AF+OAKLEY_KEY_LENGTH (0x800e) | length/value: 256 (0x100) | emitting length of ISAKMP Transform Payload (ISAKMP): 36 | *****emit ISAKMP Transform Payload (ISAKMP): | next payload type: ISAKMP_NEXT_T (0x3) | ISAKMP transform number: 7 (0x7) | ISAKMP transform ID: KEY_IKE (0x1) | last substructure: checking 'ISAKMP Proposal Payload'.'ISAKMP Transform Payload (ISAKMP)'.'next payload type' is ISAKMP_NEXT_T (0x3) | last substructure: saving location 'ISAKMP Proposal Payload'.'ISAKMP Transform Payload (ISAKMP)'.'next payload type' | ******emit ISAKMP Oakley attribute: | af+type: AF+OAKLEY_LIFE_TYPE (0x800b) | length/value: 1 (0x1) | [1 is OAKLEY_LIFE_SECONDS] | ******emit ISAKMP Oakley attribute: | af+type: AF+OAKLEY_LIFE_DURATION (variable length) (0x800c) | length/value: 3600 (0xe10) | ******emit ISAKMP Oakley attribute: | af+type: AF+OAKLEY_ENCRYPTION_ALGORITHM (0x8001) | length/value: 7 (0x7) | [7 is OAKLEY_AES_CBC] | ******emit ISAKMP Oakley attribute: | af+type: AF+OAKLEY_HASH_ALGORITHM (0x8002) | length/value: 4 (0x4) | [4 is OAKLEY_SHA2_256] | ******emit ISAKMP Oakley attribute: | af+type: AF+OAKLEY_AUTHENTICATION_METHOD (0x8003) | length/value: 3 (0x3) | [3 is OAKLEY_RSA_SIG] | ******emit ISAKMP Oakley attribute: | af+type: AF+OAKLEY_GROUP_DESCRIPTION (0x8004) | length/value: 5 (0x5) | [5 is OAKLEY_GROUP_MODP1536] | ******emit ISAKMP Oakley attribute: | af+type: AF+OAKLEY_KEY_LENGTH (0x800e) | length/value: 128 (0x80) | emitting length of ISAKMP Transform Payload (ISAKMP): 36 | *****emit ISAKMP Transform Payload (ISAKMP): | next payload type: ISAKMP_NEXT_T (0x3) | ISAKMP transform number: 8 (0x8) | ISAKMP transform ID: KEY_IKE (0x1) | last substructure: checking 'ISAKMP Proposal Payload'.'ISAKMP Transform Payload (ISAKMP)'.'next payload type' is ISAKMP_NEXT_T (0x3) | last substructure: saving location 'ISAKMP Proposal Payload'.'ISAKMP Transform Payload (ISAKMP)'.'next payload type' | ******emit ISAKMP Oakley attribute: | af+type: AF+OAKLEY_LIFE_TYPE (0x800b) | length/value: 1 (0x1) | [1 is OAKLEY_LIFE_SECONDS] | ******emit ISAKMP Oakley attribute: | af+type: AF+OAKLEY_LIFE_DURATION (variable length) (0x800c) | length/value: 3600 (0xe10) | ******emit ISAKMP Oakley attribute: | af+type: AF+OAKLEY_ENCRYPTION_ALGORITHM (0x8001) | length/value: 7 (0x7) | [7 is OAKLEY_AES_CBC] | ******emit ISAKMP Oakley attribute: | af+type: AF+OAKLEY_HASH_ALGORITHM (0x8002) | length/value: 6 (0x6) | [6 is OAKLEY_SHA2_512] | ******emit ISAKMP Oakley attribute: | af+type: AF+OAKLEY_AUTHENTICATION_METHOD (0x8003) | length/value: 3 (0x3) | [3 is OAKLEY_RSA_SIG] | ******emit ISAKMP Oakley attribute: | af+type: AF+OAKLEY_GROUP_DESCRIPTION (0x8004) | length/value: 5 (0x5) | [5 is OAKLEY_GROUP_MODP1536] | ******emit ISAKMP Oakley attribute: | af+type: AF+OAKLEY_KEY_LENGTH (0x800e) | length/value: 256 (0x100) | emitting length of ISAKMP Transform Payload (ISAKMP): 36 | *****emit ISAKMP Transform Payload (ISAKMP): | next payload type: ISAKMP_NEXT_T (0x3) | ISAKMP transform number: 9 (0x9) | ISAKMP transform ID: KEY_IKE (0x1) | last substructure: checking 'ISAKMP Proposal Payload'.'ISAKMP Transform Payload (ISAKMP)'.'next payload type' is ISAKMP_NEXT_T (0x3) | last substructure: saving location 'ISAKMP Proposal Payload'.'ISAKMP Transform Payload (ISAKMP)'.'next payload type' | ******emit ISAKMP Oakley attribute: | af+type: AF+OAKLEY_LIFE_TYPE (0x800b) | length/value: 1 (0x1) | [1 is OAKLEY_LIFE_SECONDS] | ******emit ISAKMP Oakley attribute: | af+type: AF+OAKLEY_LIFE_DURATION (variable length) (0x800c) | length/value: 3600 (0xe10) | ******emit ISAKMP Oakley attribute: | af+type: AF+OAKLEY_ENCRYPTION_ALGORITHM (0x8001) | length/value: 7 (0x7) | [7 is OAKLEY_AES_CBC] | ******emit ISAKMP Oakley attribute: | af+type: AF+OAKLEY_HASH_ALGORITHM (0x8002) | length/value: 6 (0x6) | [6 is OAKLEY_SHA2_512] | ******emit ISAKMP Oakley attribute: | af+type: AF+OAKLEY_AUTHENTICATION_METHOD (0x8003) | length/value: 3 (0x3) | [3 is OAKLEY_RSA_SIG] | ******emit ISAKMP Oakley attribute: | af+type: AF+OAKLEY_GROUP_DESCRIPTION (0x8004) | length/value: 5 (0x5) | [5 is OAKLEY_GROUP_MODP1536] | ******emit ISAKMP Oakley attribute: | af+type: AF+OAKLEY_KEY_LENGTH (0x800e) | length/value: 128 (0x80) | emitting length of ISAKMP Transform Payload (ISAKMP): 36 | *****emit ISAKMP Transform Payload (ISAKMP): | next payload type: ISAKMP_NEXT_T (0x3) | ISAKMP transform number: 10 (0xa) | ISAKMP transform ID: KEY_IKE (0x1) | last substructure: checking 'ISAKMP Proposal Payload'.'ISAKMP Transform Payload (ISAKMP)'.'next payload type' is ISAKMP_NEXT_T (0x3) | last substructure: saving location 'ISAKMP Proposal Payload'.'ISAKMP Transform Payload (ISAKMP)'.'next payload type' | ******emit ISAKMP Oakley attribute: | af+type: AF+OAKLEY_LIFE_TYPE (0x800b) | length/value: 1 (0x1) | [1 is OAKLEY_LIFE_SECONDS] | ******emit ISAKMP Oakley attribute: | af+type: AF+OAKLEY_LIFE_DURATION (variable length) (0x800c) | length/value: 3600 (0xe10) | ******emit ISAKMP Oakley attribute: | af+type: AF+OAKLEY_ENCRYPTION_ALGORITHM (0x8001) | length/value: 7 (0x7) | [7 is OAKLEY_AES_CBC] | ******emit ISAKMP Oakley attribute: | af+type: AF+OAKLEY_HASH_ALGORITHM (0x8002) | length/value: 2 (0x2) | [2 is OAKLEY_SHA1] | ******emit ISAKMP Oakley attribute: | af+type: AF+OAKLEY_AUTHENTICATION_METHOD (0x8003) | length/value: 3 (0x3) | [3 is OAKLEY_RSA_SIG] | ******emit ISAKMP Oakley attribute: | af+type: AF+OAKLEY_GROUP_DESCRIPTION (0x8004) | length/value: 5 (0x5) | [5 is OAKLEY_GROUP_MODP1536] | ******emit ISAKMP Oakley attribute: | af+type: AF+OAKLEY_KEY_LENGTH (0x800e) | length/value: 256 (0x100) | emitting length of ISAKMP Transform Payload (ISAKMP): 36 | *****emit ISAKMP Transform Payload (ISAKMP): | next payload type: ISAKMP_NEXT_T (0x3) | ISAKMP transform number: 11 (0xb) | ISAKMP transform ID: KEY_IKE (0x1) | last substructure: checking 'ISAKMP Proposal Payload'.'ISAKMP Transform Payload (ISAKMP)'.'next payload type' is ISAKMP_NEXT_T (0x3) | last substructure: saving location 'ISAKMP Proposal Payload'.'ISAKMP Transform Payload (ISAKMP)'.'next payload type' | ******emit ISAKMP Oakley attribute: | af+type: AF+OAKLEY_LIFE_TYPE (0x800b) | length/value: 1 (0x1) | [1 is OAKLEY_LIFE_SECONDS] | ******emit ISAKMP Oakley attribute: | af+type: AF+OAKLEY_LIFE_DURATION (variable length) (0x800c) | length/value: 3600 (0xe10) | ******emit ISAKMP Oakley attribute: | af+type: AF+OAKLEY_ENCRYPTION_ALGORITHM (0x8001) | length/value: 7 (0x7) | [7 is OAKLEY_AES_CBC] | ******emit ISAKMP Oakley attribute: | af+type: AF+OAKLEY_HASH_ALGORITHM (0x8002) | length/value: 2 (0x2) | [2 is OAKLEY_SHA1] | ******emit ISAKMP Oakley attribute: | af+type: AF+OAKLEY_AUTHENTICATION_METHOD (0x8003) | length/value: 3 (0x3) | [3 is OAKLEY_RSA_SIG] | ******emit ISAKMP Oakley attribute: | af+type: AF+OAKLEY_GROUP_DESCRIPTION (0x8004) | length/value: 5 (0x5) | [5 is OAKLEY_GROUP_MODP1536] | ******emit ISAKMP Oakley attribute: | af+type: AF+OAKLEY_KEY_LENGTH (0x800e) | length/value: 128 (0x80) | emitting length of ISAKMP Transform Payload (ISAKMP): 36 | *****emit ISAKMP Transform Payload (ISAKMP): | next payload type: ISAKMP_NEXT_T (0x3) | ISAKMP transform number: 12 (0xc) | ISAKMP transform ID: KEY_IKE (0x1) | last substructure: checking 'ISAKMP Proposal Payload'.'ISAKMP Transform Payload (ISAKMP)'.'next payload type' is ISAKMP_NEXT_T (0x3) | last substructure: saving location 'ISAKMP Proposal Payload'.'ISAKMP Transform Payload (ISAKMP)'.'next payload type' | ******emit ISAKMP Oakley attribute: | af+type: AF+OAKLEY_LIFE_TYPE (0x800b) | length/value: 1 (0x1) | [1 is OAKLEY_LIFE_SECONDS] | ******emit ISAKMP Oakley attribute: | af+type: AF+OAKLEY_LIFE_DURATION (variable length) (0x800c) | length/value: 3600 (0xe10) | ******emit ISAKMP Oakley attribute: | af+type: AF+OAKLEY_ENCRYPTION_ALGORITHM (0x8001) | length/value: 5 (0x5) | [5 is OAKLEY_3DES_CBC] | ******emit ISAKMP Oakley attribute: | af+type: AF+OAKLEY_HASH_ALGORITHM (0x8002) | length/value: 4 (0x4) | [4 is OAKLEY_SHA2_256] | ******emit ISAKMP Oakley attribute: | af+type: AF+OAKLEY_AUTHENTICATION_METHOD (0x8003) | length/value: 3 (0x3) | [3 is OAKLEY_RSA_SIG] | ******emit ISAKMP Oakley attribute: | af+type: AF+OAKLEY_GROUP_DESCRIPTION (0x8004) | length/value: 14 (0xe) | [14 is OAKLEY_GROUP_MODP2048] | emitting length of ISAKMP Transform Payload (ISAKMP): 32 | *****emit ISAKMP Transform Payload (ISAKMP): | next payload type: ISAKMP_NEXT_T (0x3) | ISAKMP transform number: 13 (0xd) | ISAKMP transform ID: KEY_IKE (0x1) | last substructure: checking 'ISAKMP Proposal Payload'.'ISAKMP Transform Payload (ISAKMP)'.'next payload type' is ISAKMP_NEXT_T (0x3) | last substructure: saving location 'ISAKMP Proposal Payload'.'ISAKMP Transform Payload (ISAKMP)'.'next payload type' | ******emit ISAKMP Oakley attribute: | af+type: AF+OAKLEY_LIFE_TYPE (0x800b) | length/value: 1 (0x1) | [1 is OAKLEY_LIFE_SECONDS] | ******emit ISAKMP Oakley attribute: | af+type: AF+OAKLEY_LIFE_DURATION (variable length) (0x800c) | length/value: 3600 (0xe10) | ******emit ISAKMP Oakley attribute: | af+type: AF+OAKLEY_ENCRYPTION_ALGORITHM (0x8001) | length/value: 5 (0x5) | [5 is OAKLEY_3DES_CBC] | ******emit ISAKMP Oakley attribute: | af+type: AF+OAKLEY_HASH_ALGORITHM (0x8002) | length/value: 6 (0x6) | [6 is OAKLEY_SHA2_512] | ******emit ISAKMP Oakley attribute: | af+type: AF+OAKLEY_AUTHENTICATION_METHOD (0x8003) | length/value: 3 (0x3) | [3 is OAKLEY_RSA_SIG] | ******emit ISAKMP Oakley attribute: | af+type: AF+OAKLEY_GROUP_DESCRIPTION (0x8004) | length/value: 14 (0xe) | [14 is OAKLEY_GROUP_MODP2048] | emitting length of ISAKMP Transform Payload (ISAKMP): 32 | *****emit ISAKMP Transform Payload (ISAKMP): | next payload type: ISAKMP_NEXT_T (0x3) | ISAKMP transform number: 14 (0xe) | ISAKMP transform ID: KEY_IKE (0x1) | last substructure: checking 'ISAKMP Proposal Payload'.'ISAKMP Transform Payload (ISAKMP)'.'next payload type' is ISAKMP_NEXT_T (0x3) | last substructure: saving location 'ISAKMP Proposal Payload'.'ISAKMP Transform Payload (ISAKMP)'.'next payload type' | ******emit ISAKMP Oakley attribute: | af+type: AF+OAKLEY_LIFE_TYPE (0x800b) | length/value: 1 (0x1) | [1 is OAKLEY_LIFE_SECONDS] | ******emit ISAKMP Oakley attribute: | af+type: AF+OAKLEY_LIFE_DURATION (variable length) (0x800c) | length/value: 3600 (0xe10) | ******emit ISAKMP Oakley attribute: | af+type: AF+OAKLEY_ENCRYPTION_ALGORITHM (0x8001) | length/value: 5 (0x5) | [5 is OAKLEY_3DES_CBC] | ******emit ISAKMP Oakley attribute: | af+type: AF+OAKLEY_HASH_ALGORITHM (0x8002) | length/value: 2 (0x2) | [2 is OAKLEY_SHA1] | ******emit ISAKMP Oakley attribute: | af+type: AF+OAKLEY_AUTHENTICATION_METHOD (0x8003) | length/value: 3 (0x3) | [3 is OAKLEY_RSA_SIG] | ******emit ISAKMP Oakley attribute: | af+type: AF+OAKLEY_GROUP_DESCRIPTION (0x8004) | length/value: 14 (0xe) | [14 is OAKLEY_GROUP_MODP2048] | emitting length of ISAKMP Transform Payload (ISAKMP): 32 | *****emit ISAKMP Transform Payload (ISAKMP): | next payload type: ISAKMP_NEXT_T (0x3) | ISAKMP transform number: 15 (0xf) | ISAKMP transform ID: KEY_IKE (0x1) | last substructure: checking 'ISAKMP Proposal Payload'.'ISAKMP Transform Payload (ISAKMP)'.'next payload type' is ISAKMP_NEXT_T (0x3) | last substructure: saving location 'ISAKMP Proposal Payload'.'ISAKMP Transform Payload (ISAKMP)'.'next payload type' | ******emit ISAKMP Oakley attribute: | af+type: AF+OAKLEY_LIFE_TYPE (0x800b) | length/value: 1 (0x1) | [1 is OAKLEY_LIFE_SECONDS] | ******emit ISAKMP Oakley attribute: | af+type: AF+OAKLEY_LIFE_DURATION (variable length) (0x800c) | length/value: 3600 (0xe10) | ******emit ISAKMP Oakley attribute: | af+type: AF+OAKLEY_ENCRYPTION_ALGORITHM (0x8001) | length/value: 5 (0x5) | [5 is OAKLEY_3DES_CBC] | ******emit ISAKMP Oakley attribute: | af+type: AF+OAKLEY_HASH_ALGORITHM (0x8002) | length/value: 4 (0x4) | [4 is OAKLEY_SHA2_256] | ******emit ISAKMP Oakley attribute: | af+type: AF+OAKLEY_AUTHENTICATION_METHOD (0x8003) | length/value: 3 (0x3) | [3 is OAKLEY_RSA_SIG] | ******emit ISAKMP Oakley attribute: | af+type: AF+OAKLEY_GROUP_DESCRIPTION (0x8004) | length/value: 5 (0x5) | [5 is OAKLEY_GROUP_MODP1536] | emitting length of ISAKMP Transform Payload (ISAKMP): 32 | *****emit ISAKMP Transform Payload (ISAKMP): | next payload type: ISAKMP_NEXT_T (0x3) | ISAKMP transform number: 16 (0x10) | ISAKMP transform ID: KEY_IKE (0x1) | last substructure: checking 'ISAKMP Proposal Payload'.'ISAKMP Transform Payload (ISAKMP)'.'next payload type' is ISAKMP_NEXT_T (0x3) | last substructure: saving location 'ISAKMP Proposal Payload'.'ISAKMP Transform Payload (ISAKMP)'.'next payload type' | ******emit ISAKMP Oakley attribute: | af+type: AF+OAKLEY_LIFE_TYPE (0x800b) | length/value: 1 (0x1) | [1 is OAKLEY_LIFE_SECONDS] | ******emit ISAKMP Oakley attribute: | af+type: AF+OAKLEY_LIFE_DURATION (variable length) (0x800c) | length/value: 3600 (0xe10) | ******emit ISAKMP Oakley attribute: | af+type: AF+OAKLEY_ENCRYPTION_ALGORITHM (0x8001) | length/value: 5 (0x5) | [5 is OAKLEY_3DES_CBC] | ******emit ISAKMP Oakley attribute: | af+type: AF+OAKLEY_HASH_ALGORITHM (0x8002) | length/value: 6 (0x6) | [6 is OAKLEY_SHA2_512] | ******emit ISAKMP Oakley attribute: | af+type: AF+OAKLEY_AUTHENTICATION_METHOD (0x8003) | length/value: 3 (0x3) | [3 is OAKLEY_RSA_SIG] | ******emit ISAKMP Oakley attribute: | af+type: AF+OAKLEY_GROUP_DESCRIPTION (0x8004) | length/value: 5 (0x5) | [5 is OAKLEY_GROUP_MODP1536] | emitting length of ISAKMP Transform Payload (ISAKMP): 32 | *****emit ISAKMP Transform Payload (ISAKMP): | next payload type: ISAKMP_NEXT_NONE (0x0) | ISAKMP transform number: 17 (0x11) | ISAKMP transform ID: KEY_IKE (0x1) | last substructure: checking 'ISAKMP Proposal Payload'.'ISAKMP Transform Payload (ISAKMP)'.'next payload type' is ISAKMP_NEXT_T (0x3) | last substructure: saving location 'ISAKMP Proposal Payload'.'ISAKMP Transform Payload (ISAKMP)'.'next payload type' | ******emit ISAKMP Oakley attribute: | af+type: AF+OAKLEY_LIFE_TYPE (0x800b) | length/value: 1 (0x1) | [1 is OAKLEY_LIFE_SECONDS] | ******emit ISAKMP Oakley attribute: | af+type: AF+OAKLEY_LIFE_DURATION (variable length) (0x800c) | length/value: 3600 (0xe10) | ******emit ISAKMP Oakley attribute: | af+type: AF+OAKLEY_ENCRYPTION_ALGORITHM (0x8001) | length/value: 5 (0x5) | [5 is OAKLEY_3DES_CBC] | ******emit ISAKMP Oakley attribute: | af+type: AF+OAKLEY_HASH_ALGORITHM (0x8002) | length/value: 2 (0x2) | [2 is OAKLEY_SHA1] | ******emit ISAKMP Oakley attribute: | af+type: AF+OAKLEY_AUTHENTICATION_METHOD (0x8003) | length/value: 3 (0x3) | [3 is OAKLEY_RSA_SIG] | ******emit ISAKMP Oakley attribute: | af+type: AF+OAKLEY_GROUP_DESCRIPTION (0x8004) | length/value: 5 (0x5) | [5 is OAKLEY_GROUP_MODP1536] | emitting length of ISAKMP Transform Payload (ISAKMP): 32 | emitting length of ISAKMP Proposal Payload: 632 | last substructure: checking 'ISAKMP Proposal Payload'.'ISAKMP Transform Payload (ISAKMP)'.'next payload type' is 0 | emitting length of ISAKMP Security Association Payload: 644 | last substructure: checking 'ISAKMP Security Association Payload'.'ISAKMP Proposal Payload'.'next payload type' is 0 | out_vid(): sending [FRAGMENTATION] | ***emit ISAKMP Vendor ID Payload: | next payload type: ISAKMP_NEXT_VID (0xd) | next payload chain: ignoring supplied 'ISAKMP Vendor ID Payload'.'next payload type' value 13:ISAKMP_NEXT_VID | next payload chain: setting previous 'ISAKMP Security Association Payload'.'next payload type' to current ISAKMP Vendor ID Payload (13:ISAKMP_NEXT_VID) | next payload chain: saving location 'ISAKMP Vendor ID Payload'.'next payload type' in 'reply packet' | emitting 16 raw bytes of V_ID into ISAKMP Vendor ID Payload | V_ID 40 48 b7 d5 6e bc e8 85 25 e7 de 7f 00 d6 c2 d3 | emitting length of ISAKMP Vendor ID Payload: 20 | out_vid(): sending [Dead Peer Detection] | ***emit ISAKMP Vendor ID Payload: | next payload type: ISAKMP_NEXT_NONE (0x0) | next payload chain: setting previous 'ISAKMP Vendor ID Payload'.'next payload type' to current ISAKMP Vendor ID Payload (13:ISAKMP_NEXT_VID) | next payload chain: saving location 'ISAKMP Vendor ID Payload'.'next payload type' in 'reply packet' | emitting 16 raw bytes of V_ID into ISAKMP Vendor ID Payload | V_ID af ca d7 13 68 a1 f1 c9 6b 86 96 fc 77 57 01 00 | emitting length of ISAKMP Vendor ID Payload: 20 | nat add vid | sending draft and RFC NATT VIDs | out_vid(): sending [RFC 3947] | ***emit ISAKMP Vendor ID Payload: | next payload type: ISAKMP_NEXT_VID (0xd) | next payload chain: ignoring supplied 'ISAKMP Vendor ID Payload'.'next payload type' value 13:ISAKMP_NEXT_VID | next payload chain: setting previous 'ISAKMP Vendor ID Payload'.'next payload type' to current ISAKMP Vendor ID Payload (13:ISAKMP_NEXT_VID) | next payload chain: saving location 'ISAKMP Vendor ID Payload'.'next payload type' in 'reply packet' | emitting 16 raw bytes of V_ID into ISAKMP Vendor ID Payload | V_ID 4a 13 1c 81 07 03 58 45 5c 57 28 f2 0e 95 45 2f | emitting length of ISAKMP Vendor ID Payload: 20 | skipping VID_NATT_RFC | out_vid(): sending [draft-ietf-ipsec-nat-t-ike-03] | ***emit ISAKMP Vendor ID Payload: | next payload type: ISAKMP_NEXT_VID (0xd) | next payload chain: ignoring supplied 'ISAKMP Vendor ID Payload'.'next payload type' value 13:ISAKMP_NEXT_VID | next payload chain: setting previous 'ISAKMP Vendor ID Payload'.'next payload type' to current ISAKMP Vendor ID Payload (13:ISAKMP_NEXT_VID) | next payload chain: saving location 'ISAKMP Vendor ID Payload'.'next payload type' in 'reply packet' | emitting 16 raw bytes of V_ID into ISAKMP Vendor ID Payload | V_ID 7d 94 19 a6 53 10 ca 6f 2c 17 9d 92 15 52 9d 56 | emitting length of ISAKMP Vendor ID Payload: 20 | out_vid(): sending [draft-ietf-ipsec-nat-t-ike-02_n] | ***emit ISAKMP Vendor ID Payload: | next payload type: ISAKMP_NEXT_VID (0xd) | next payload chain: ignoring supplied 'ISAKMP Vendor ID Payload'.'next payload type' value 13:ISAKMP_NEXT_VID | next payload chain: setting previous 'ISAKMP Vendor ID Payload'.'next payload type' to current ISAKMP Vendor ID Payload (13:ISAKMP_NEXT_VID) | next payload chain: saving location 'ISAKMP Vendor ID Payload'.'next payload type' in 'reply packet' | emitting 16 raw bytes of V_ID into ISAKMP Vendor ID Payload | V_ID 90 cb 80 91 3e bb 69 6e 08 63 81 b5 ec 42 7b 1f | emitting length of ISAKMP Vendor ID Payload: 20 | out_vid(): sending [draft-ietf-ipsec-nat-t-ike-02] | ***emit ISAKMP Vendor ID Payload: | next payload type: ISAKMP_NEXT_NONE (0x0) | next payload chain: setting previous 'ISAKMP Vendor ID Payload'.'next payload type' to current ISAKMP Vendor ID Payload (13:ISAKMP_NEXT_VID) | next payload chain: saving location 'ISAKMP Vendor ID Payload'.'next payload type' in 'reply packet' | emitting 16 raw bytes of V_ID into ISAKMP Vendor ID Payload | V_ID cd 60 46 43 35 df 21 f8 7c fd b2 fc 68 b6 a4 48 | emitting length of ISAKMP Vendor ID Payload: 20 | no IKEv1 message padding required | emitting length of ISAKMP Message: 792 | sending 792 bytes for reply packet for main_outI1 through eth1 from 192.1.2.45:500 to 192.1.2.23:500 (using #6) | 20 c4 f2 a2 1c c1 19 06 00 00 00 00 00 00 00 00 | 01 10 02 00 00 00 00 00 00 00 03 18 0d 00 02 84 | 00 00 00 01 00 00 00 01 00 00 02 78 00 01 00 12 | 03 00 00 24 00 01 00 00 80 0b 00 01 80 0c 0e 10 | 80 01 00 07 80 02 00 04 80 03 00 03 80 04 00 0e | 80 0e 01 00 03 00 00 24 01 01 00 00 80 0b 00 01 | 80 0c 0e 10 80 01 00 07 80 02 00 04 80 03 00 03 | 80 04 00 0e 80 0e 00 80 03 00 00 24 02 01 00 00 | 80 0b 00 01 80 0c 0e 10 80 01 00 07 80 02 00 06 | 80 03 00 03 80 04 00 0e 80 0e 01 00 03 00 00 24 | 03 01 00 00 80 0b 00 01 80 0c 0e 10 80 01 00 07 | 80 02 00 06 80 03 00 03 80 04 00 0e 80 0e 00 80 | 03 00 00 24 04 01 00 00 80 0b 00 01 80 0c 0e 10 | 80 01 00 07 80 02 00 02 80 03 00 03 80 04 00 0e | 80 0e 01 00 03 00 00 24 05 01 00 00 80 0b 00 01 | 80 0c 0e 10 80 01 00 07 80 02 00 02 80 03 00 03 | 80 04 00 0e 80 0e 00 80 03 00 00 24 06 01 00 00 | 80 0b 00 01 80 0c 0e 10 80 01 00 07 80 02 00 04 | 80 03 00 03 80 04 00 05 80 0e 01 00 03 00 00 24 | 07 01 00 00 80 0b 00 01 80 0c 0e 10 80 01 00 07 | 80 02 00 04 80 03 00 03 80 04 00 05 80 0e 00 80 | 03 00 00 24 08 01 00 00 80 0b 00 01 80 0c 0e 10 | 80 01 00 07 80 02 00 06 80 03 00 03 80 04 00 05 | 80 0e 01 00 03 00 00 24 09 01 00 00 80 0b 00 01 | 80 0c 0e 10 80 01 00 07 80 02 00 06 80 03 00 03 | 80 04 00 05 80 0e 00 80 03 00 00 24 0a 01 00 00 | 80 0b 00 01 80 0c 0e 10 80 01 00 07 80 02 00 02 | 80 03 00 03 80 04 00 05 80 0e 01 00 03 00 00 24 | 0b 01 00 00 80 0b 00 01 80 0c 0e 10 80 01 00 07 | 80 02 00 02 80 03 00 03 80 04 00 05 80 0e 00 80 | 03 00 00 20 0c 01 00 00 80 0b 00 01 80 0c 0e 10 | 80 01 00 05 80 02 00 04 80 03 00 03 80 04 00 0e | 03 00 00 20 0d 01 00 00 80 0b 00 01 80 0c 0e 10 | 80 01 00 05 80 02 00 06 80 03 00 03 80 04 00 0e | 03 00 00 20 0e 01 00 00 80 0b 00 01 80 0c 0e 10 | 80 01 00 05 80 02 00 02 80 03 00 03 80 04 00 0e | 03 00 00 20 0f 01 00 00 80 0b 00 01 80 0c 0e 10 | 80 01 00 05 80 02 00 04 80 03 00 03 80 04 00 05 | 03 00 00 20 10 01 00 00 80 0b 00 01 80 0c 0e 10 | 80 01 00 05 80 02 00 06 80 03 00 03 80 04 00 05 | 00 00 00 20 11 01 00 00 80 0b 00 01 80 0c 0e 10 | 80 01 00 05 80 02 00 02 80 03 00 03 80 04 00 05 | 0d 00 00 14 40 48 b7 d5 6e bc e8 85 25 e7 de 7f | 00 d6 c2 d3 0d 00 00 14 af ca d7 13 68 a1 f1 c9 | 6b 86 96 fc 77 57 01 00 0d 00 00 14 4a 13 1c 81 | 07 03 58 45 5c 57 28 f2 0e 95 45 2f 0d 00 00 14 | 7d 94 19 a6 53 10 ca 6f 2c 17 9d 92 15 52 9d 56 | 0d 00 00 14 90 cb 80 91 3e bb 69 6e 08 63 81 b5 | ec 42 7b 1f 00 00 00 14 cd 60 46 43 35 df 21 f8 | 7c fd b2 fc 68 b6 a4 48 "westnets-eastnet/1x0" #6: IMPAIR: suppressing retransmits; scheduling timeout in 60 seconds | event_schedule: new EVENT_RETRANSMIT-pe@0x56080aeffae0 | inserting event EVENT_RETRANSMIT, timeout in 60 seconds for #6 | libevent_malloc: new ptr-libevent@0x56080af02140 size 128 | #6 STATE_MAIN_I1: retransmits: first event in 60 seconds; timeout in 60 seconds; limit of 12 retransmits; current time is 50074.161069 | stop processing: state #6 connection "westnets-eastnet/1x0" from 192.1.2.23:500 (in main_outI1() at ikev1_main.c:228) | event_schedule: new EVENT_SA_EXPIRE-pe@0x56080af008b0 | inserting event EVENT_SA_EXPIRE, timeout in 0 seconds for #5 | libevent_malloc: new ptr-libevent@0x7f83e8007500 size 128 | libevent_free: release ptr-libevent@0x7f83d4006900 | free_event_entry: release EVENT_SA_REPLACE-pe@0x56080af008f0 | processing: STOP state #0 (in timer_event_cb() at timer.c:557) | timer_event_cb: processing event@0x7f83d8005860 | handling event EVENT_SA_REPLACE for child state #4 | start processing: state #4 connection "westnets-eastnet/2x0" from 192.1.2.23:500 (in timer_event_cb() at timer.c:250) | picked newest_ipsec_sa #0 for #4 | replacing stale IPsec SA | dup_any(fd@-1) -> fd@-1 (in ipsecdoi_replace() at ipsec_doi.c:351) | FOR_EACH_STATE_... in find_phase1_state | Queuing pending IPsec SA negotiating with 192.1.2.23 "westnets-eastnet/2x0" IKE SA #6 "westnets-eastnet/1x0" | event_schedule: new EVENT_SA_EXPIRE-pe@0x56080af008f0 | inserting event EVENT_SA_EXPIRE, timeout in 0 seconds for #4 | libevent_malloc: new ptr-libevent@0x7f83d4006900 size 128 | libevent_free: release ptr-libevent@0x7f83d0001ef0 | free_event_entry: release EVENT_SA_REPLACE-pe@0x7f83d8005860 | stop processing: state #4 connection "westnets-eastnet/2x0" from 192.1.2.23:500 (in timer_event_cb() at timer.c:557) | processing global timer EVENT_REVIVE_CONNS Initiating connection westnets-eastnet/2x0 which received a Delete/Notify but must remain up per local policy | FOR_EACH_CONNECTION_... in conn_by_name | start processing: connection "westnets-eastnet/2x0" (in initiate_a_connection() at initiate.c:186) | empty esp_info, returning defaults for ENCRYPT | connection 'westnets-eastnet/2x0' +POLICY_UP | dup_any(fd@-1) -> fd@-1 (in initiate_a_connection() at initiate.c:342) | FOR_EACH_STATE_... in find_phase1_state | Ignored already queued up pending IPsec SA negotiation with 192.1.2.23 "westnets-eastnet/2x0" | stop processing: connection "westnets-eastnet/2x0" (in initiate_a_connection() at initiate.c:349) | timer_event_cb: processing event@0x56080af008b0 | handling event EVENT_SA_EXPIRE for child state #5 | start processing: state #5 connection "westnets-eastnet/1x0" from 192.1.2.23:500 (in timer_event_cb() at timer.c:250) | picked newest_ipsec_sa #0 for #5 | un-established partial CHILD SA timeout (SA expired) | pstats #5 ikev1.ipsec failed exchange-timeout | pstats #5 ikev1.ipsec deleted exchange-timeout | [RE]START processing: state #5 connection "westnets-eastnet/1x0" from 192.1.2.23:500 (in delete_state() at state.c:879) "westnets-eastnet/1x0" #5: deleting state (STATE_QUICK_I1) aged 0.032s and NOT sending notification | child state #5: QUICK_I1(established CHILD SA) => delete | child state #5: QUICK_I1(established CHILD SA) => CHILDSA_DEL(informational) | priority calculation of connection "westnets-eastnet/1x0" is 0xfe7e7 | delete inbound eroute 192.0.2.0/24:0 --0-> 192.0.1.0/24:0 => unk255.10000@192.1.2.45 (raw_eroute) | raw_eroute result=success | in connection_discard for connection westnets-eastnet/1x0 | State DB: deleting IKEv1 state #5 in CHILDSA_DEL | child state #5: CHILDSA_DEL(informational) => UNDEFINED(ignore) | DH secret MODP2048@0x7f83e80010c0: destroyed | stop processing: state #5 from 192.1.2.23:500 (in delete_state() at state.c:1143) | delete_state: release st->st_shared_nss-key@NULL | delete_state: release st->st_skeyid_nss-key@0x56080aeed4f0 | delete_state: release st->st_skey_d_nss-key@0x56080aeea0c0 | delete_state: release st->st_skey_ai_nss-key@0x56080aee2f70 | delete_state: release st->st_skey_ar_nss-key@NULL | delete_state: release st->st_skey_ei_nss-key@0x56080aef0b10 | delete_state: release st->st_skey_er_nss-key@NULL | delete_state: release st->st_skey_pi_nss-key@NULL | delete_state: release st->st_skey_pr_nss-key@NULL | delete_state: release st->st_enc_key_nss-key@0x56080aee47f0 | delete_state: release st->st_sk_d_no_ppk-key@NULL | delete_state: release st->st_sk_pi_no_ppk-key@NULL | delete_state: release st->st_sk_pr_no_ppk-key@NULL | libevent_free: release ptr-libevent@0x7f83e8007500 | free_event_entry: release EVENT_SA_EXPIRE-pe@0x56080af008b0 | in statetime_stop() and could not find #5 | processing: STOP state #0 (in timer_event_cb() at timer.c:557) | timer_event_cb: processing event@0x56080af008f0 | handling event EVENT_SA_EXPIRE for child state #4 | start processing: state #4 connection "westnets-eastnet/2x0" from 192.1.2.23:500 (in timer_event_cb() at timer.c:250) | picked newest_ipsec_sa #0 for #4 | un-established partial CHILD SA timeout (SA expired) | pstats #4 ikev1.ipsec failed exchange-timeout | pstats #4 ikev1.ipsec deleted exchange-timeout | [RE]START processing: state #4 connection "westnets-eastnet/2x0" from 192.1.2.23:500 (in delete_state() at state.c:879) "westnets-eastnet/2x0" #4: deleting state (STATE_QUICK_I1) aged 0.120s and NOT sending notification | child state #4: QUICK_I1(established CHILD SA) => delete | child state #4: QUICK_I1(established CHILD SA) => CHILDSA_DEL(informational) | priority calculation of connection "westnets-eastnet/2x0" is 0xfe7e7 | delete inbound eroute 192.0.2.0/24:0 --0-> 192.0.11.0/24:0 => unk255.10000@192.1.2.45 (raw_eroute) | raw_eroute result=success | in connection_discard for connection westnets-eastnet/2x0 | State DB: deleting IKEv1 state #4 in CHILDSA_DEL | child state #4: CHILDSA_DEL(informational) => UNDEFINED(ignore) | DH secret MODP2048@0x7f83d4000d60: destroyed | stop processing: state #4 from 192.1.2.23:500 (in delete_state() at state.c:1143) | delete_state: release st->st_shared_nss-key@NULL | delete_state: release st->st_skeyid_nss-key@0x56080aeed4f0 | delete_state: release st->st_skey_d_nss-key@0x56080aeea0c0 | delete_state: release st->st_skey_ai_nss-key@0x56080aee2f70 | delete_state: release st->st_skey_ar_nss-key@NULL | delete_state: release st->st_skey_ei_nss-key@0x56080aef0b10 | delete_state: release st->st_skey_er_nss-key@NULL | delete_state: release st->st_skey_pi_nss-key@NULL | delete_state: release st->st_skey_pr_nss-key@NULL | delete_state: release st->st_enc_key_nss-key@0x56080aee47f0 | delete_state: release st->st_sk_d_no_ppk-key@NULL | delete_state: release st->st_sk_pi_no_ppk-key@NULL | delete_state: release st->st_sk_pr_no_ppk-key@NULL | libevent_free: release ptr-libevent@0x7f83d4006900 | free_event_entry: release EVENT_SA_EXPIRE-pe@0x56080af008f0 | in statetime_stop() and could not find #4 | processing: STOP state #0 (in timer_event_cb() at timer.c:557) | accept(whackctlfd, (struct sockaddr *)&whackaddr, &whackaddrlen) -> fd@16 (in whack_handle() at rcv_whack.c:721) shutting down | processing: RESET whack log_fd (was fd@16) (in exit_pluto() at plutomain.c:1825) | pluto_sd: executing action action: stopping(6), status 0 | certs and keys locked by 'free_preshared_secrets' forgetting secrets | certs and keys unlocked by 'free_preshared_secrets' | unreference key: 0x56080ae616c0 @east cnt 1-- | unreference key: 0x56080ae588f0 @west cnt 1-- | start processing: connection "westnets-eastnet/2x0" (in delete_connection() at connections.c:189) | removing pending policy for no connection {0x56080af01410} | Deleting states for connection - including all other IPsec SA's of this IKE SA | pass 0 | FOR_EACH_STATE_... in foreach_state_by_connection_func_delete | state #6 | pass 1 | FOR_EACH_STATE_... in foreach_state_by_connection_func_delete | state #6 | shunt_eroute() called for connection 'westnets-eastnet/2x0' to 'delete' for rt_kind 'unrouted' using protoports 192.0.11.0/24:0 --0->- 192.0.2.0/24:0 | netlink_shunt_eroute for proto 0, and source 192.0.11.0/24:0 dest 192.0.2.0/24:0 | priority calculation of connection "westnets-eastnet/2x0" is 0xfe7e7 | priority calculation of connection "westnets-eastnet/2x0" is 0xfe7e7 | FOR_EACH_CONNECTION_... in route_owner | conn westnets-eastnet/2x0 mark 0/00000000, 0/00000000 vs | conn westnets-eastnet/2x0 mark 0/00000000, 0/00000000 | conn westnets-eastnet/2x0 mark 0/00000000, 0/00000000 vs | conn westnets-eastnet/1x0 mark 0/00000000, 0/00000000 | route owner of "westnets-eastnet/2x0" unrouted: "westnets-eastnet/1x0" prospective erouted | flush revival: connection 'westnets-eastnet/2x0' wasn't on the list | stop processing: connection "westnets-eastnet/2x0" (in discard_connection() at connections.c:249) | start processing: connection "westnets-eastnet/1x0" (in delete_connection() at connections.c:189) | removing pending policy for no connection {0x56080af011d0} | Deleting states for connection - including all other IPsec SA's of this IKE SA | pass 0 | FOR_EACH_STATE_... in foreach_state_by_connection_func_delete | state #6 | suspend processing: connection "westnets-eastnet/1x0" (in foreach_state_by_connection_func_delete() at state.c:1310) | start processing: state #6 connection "westnets-eastnet/1x0" from 192.1.2.23:500 (in foreach_state_by_connection_func_delete() at state.c:1310) | pstats #6 ikev1.isakmp deleted other | [RE]START processing: state #6 connection "westnets-eastnet/1x0" from 192.1.2.23:500 (in delete_state() at state.c:879) "westnets-eastnet/1x0" #6: deleting state (STATE_MAIN_I1) aged 1.651s and NOT sending notification | parent state #6: MAIN_I1(half-open IKE SA) => delete | state #6 requesting EVENT_RETRANSMIT to be deleted | #6 STATE_MAIN_I1: retransmits: cleared | libevent_free: release ptr-libevent@0x56080af02140 | free_event_entry: release EVENT_RETRANSMIT-pe@0x56080aeffae0 | State DB: IKEv1 state not found (flush_incomplete_children) | picked newest_isakmp_sa #0 for #6 "westnets-eastnet/1x0" #6: deleting IKE SA for connection 'westnets-eastnet/1x0' but connection is supposed to remain up; schedule EVENT_REVIVE_CONNS | add revival: connection 'westnets-eastnet/1x0' added to the list and scheduled for 0 seconds | global one-shot timer EVENT_REVIVE_CONNS scheduled in 0 seconds | stop processing: connection "westnets-eastnet/1x0" (BACKGROUND) (in update_state_connection() at connections.c:4037) | start processing: connection NULL (in update_state_connection() at connections.c:4038) | in connection_discard for connection westnets-eastnet/1x0 | State DB: deleting IKEv1 state #6 in MAIN_I1 | parent state #6: MAIN_I1(half-open IKE SA) => UNDEFINED(ignore) | stop processing: state #6 from 192.1.2.23:500 (in delete_state() at state.c:1143) | delete_state: release st->st_shared_nss-key@NULL | delete_state: release st->st_skeyid_nss-key@NULL | delete_state: release st->st_skey_d_nss-key@NULL | delete_state: release st->st_skey_ai_nss-key@NULL | delete_state: release st->st_skey_ar_nss-key@NULL | delete_state: release st->st_skey_ei_nss-key@NULL | delete_state: release st->st_skey_er_nss-key@NULL | delete_state: release st->st_skey_pi_nss-key@NULL | delete_state: release st->st_skey_pr_nss-key@NULL | delete_state: release st->st_enc_key_nss-key@NULL | delete_state: release st->st_sk_d_no_ppk-key@NULL | delete_state: release st->st_sk_pi_no_ppk-key@NULL | delete_state: release st->st_sk_pr_no_ppk-key@NULL | processing: STOP state #0 (in foreach_state_by_connection_func_delete() at state.c:1312) | pass 1 | FOR_EACH_STATE_... in foreach_state_by_connection_func_delete | shunt_eroute() called for connection 'westnets-eastnet/1x0' to 'delete' for rt_kind 'unrouted' using protoports 192.0.1.0/24:0 --0->- 192.0.2.0/24:0 | netlink_shunt_eroute for proto 0, and source 192.0.1.0/24:0 dest 192.0.2.0/24:0 | priority calculation of connection "westnets-eastnet/1x0" is 0xfe7e7 | priority calculation of connection "westnets-eastnet/1x0" is 0xfe7e7 | FOR_EACH_CONNECTION_... in route_owner | conn westnets-eastnet/1x0 mark 0/00000000, 0/00000000 vs | conn westnets-eastnet/1x0 mark 0/00000000, 0/00000000 | route owner of "westnets-eastnet/1x0" unrouted: NULL | running updown command "ipsec _updown" for verb unroute | command executing unroute-client | executing unroute-client: PLUTO_VERB='unroute-client' PLUTO_VERSION='2.0' PLUTO_CONNECTION='westnets-eastnet/1x0' PLUTO_INTERFACE='eth1' PLUTO_NEXT_HOP='192.1.2.23' PLUTO_ME='192.1.2.45' PLUTO_MY_ID='@west' PLUTO_MY_CLIENT='192.0.1.0/24' PLUTO_MY_CLIENT_NET='192.0.1.0' PLUTO_MY_CLIENT_MASK='255.255.255.0' PLUTO_MY_PORT='0' PLUTO_MY_PROTOCOL='0' PLUTO_SA_REQID='16388' PLUTO_SA_TYPE='none' PLUTO_PEER='192.1.2.23' PLUTO_PEER_ID='@east' PLUTO_PEER_CLIENT='192.0.2.0/24' PLUTO_PEER_CLIENT_NET='192.0.2.0' PLUTO_PEER_CLIENT_MASK='255.255.255.0' PLUTO_PEER_PORT='0' PLUTO_PEER_PROTOCOL='0' PLUTO_PEER_CA='' PLUTO_STACK='netkey' PLUTO_ADDTIME='0' PLUTO_CONN_POLICY='RSASIG+ENCRYPT+TUNNEL+PFS+UP+IKEV1_ALLOW+SAREF_TRACK+IKE_FRAG_ALLOW+ESN_NO' PLUTO_CONN_KIND='CK_PERMANENT' PLUTO_CONN_ADDRFAMILY='ipv4' XAUTH_FAILED=0 PLUTO_IS_PEER_CISCO='0' PLUTO_PEER_DNS_INFO='' PLUTO_PEER_DOMAIN_INFO='' PLUTO_PEER_BANNER='' PLUTO_CFG_SERVER='0' PLUTO_CFG_CLIENT='0' PLUTO_NM_CONFIGURED='0' VTI_IFACE='' VTI_ROUTING='no' VTI_SHARED='no | popen cmd is 1034 chars long | cmd( 0):PLUTO_VERB='unroute-client' PLUTO_VERSION='2.0' PLUTO_CONNECTION='westnets-eastn: | cmd( 80):et/1x0' PLUTO_INTERFACE='eth1' PLUTO_NEXT_HOP='192.1.2.23' PLUTO_ME='192.1.2.45': | cmd( 160): PLUTO_MY_ID='@west' PLUTO_MY_CLIENT='192.0.1.0/24' PLUTO_MY_CLIENT_NET='192.0.1: | cmd( 240):.0' PLUTO_MY_CLIENT_MASK='255.255.255.0' PLUTO_MY_PORT='0' PLUTO_MY_PROTOCOL='0': | cmd( 320): PLUTO_SA_REQID='16388' PLUTO_SA_TYPE='none' PLUTO_PEER='192.1.2.23' PLUTO_PEER_: | cmd( 400):ID='@east' PLUTO_PEER_CLIENT='192.0.2.0/24' PLUTO_PEER_CLIENT_NET='192.0.2.0' PL: | cmd( 480):UTO_PEER_CLIENT_MASK='255.255.255.0' PLUTO_PEER_PORT='0' PLUTO_PEER_PROTOCOL='0': | cmd( 560): PLUTO_PEER_CA='' PLUTO_STACK='netkey' PLUTO_ADDTIME='0' PLUTO_CONN_POLICY='RSAS: | cmd( 640):IG+ENCRYPT+TUNNEL+PFS+UP+IKEV1_ALLOW+SAREF_TRACK+IKE_FRAG_ALLOW+ESN_NO' PLUTO_CO: | cmd( 720):NN_KIND='CK_PERMANENT' PLUTO_CONN_ADDRFAMILY='ipv4' XAUTH_FAILED=0 PLUTO_IS_PEER: | cmd( 800):_CISCO='0' PLUTO_PEER_DNS_INFO='' PLUTO_PEER_DOMAIN_INFO='' PLUTO_PEER_BANNER='': | cmd( 880): PLUTO_CFG_SERVER='0' PLUTO_CFG_CLIENT='0' PLUTO_NM_CONFIGURED='0' VTI_IFACE='' : | cmd( 960):VTI_ROUTING='no' VTI_SHARED='no' SPI_IN=0x0 SPI_OUT=0x0 ipsec _updown 2>&1: unroute-client output: Error: Peer netns reference is invalid. unroute-client output: Error: Peer netns reference is invalid. unroute-client output: Error: Peer netns reference is invalid. unroute-client output: Error: Peer netns reference is invalid. unroute-client output: Error: Peer netns reference is invalid. unroute-client output: Error: Peer netns reference is invalid. unroute-client output: Error: Peer netns reference is invalid. unroute-client output: Error: Peer netns reference is invalid. unroute-client output: Error: Peer netns reference is invalid. unroute-client output: Error: Peer netns reference is invalid. unroute-client output: Error: Peer netns reference is invalid. unroute-client output: Error: Peer netns reference is invalid. unroute-client output: Error: Peer netns reference is invalid. unroute-client output: Error: Peer netns reference is invalid. unroute-client output: Error: Peer netns reference is invalid. unroute-client output: Error: Peer netns reference is invalid. unroute-client output: Error: Peer netns reference is invalid. unroute-client output: Error: Peer netns reference is invalid. unroute-client output: Error: Peer netns reference is invalid. unroute-client output: Error: Peer netns reference is invalid. unroute-client output: Error: Peer netns reference is invalid. unroute-client output: Error: Peer netns reference is invalid. unroute-client output: Error: Peer netns reference is invalid. unroute-client output: Error: Peer netns reference is invalid. unroute-client output: Error: Peer netns reference is invalid. unroute-client output: Error: Peer netns reference is invalid. unroute-client output: Error: Peer netns reference is invalid. unroute-client output: Error: Peer netns reference is invalid. unroute-client output: Error: Peer netns reference is invalid. unroute-client output: Error: Peer netns reference is invalid. unroute-client output: Error: Peer netns reference is invalid. unroute-client output: Error: Peer netns reference is invalid. unroute-client output: Error: Peer netns reference is invalid. unroute-client output: Error: Peer netns reference is invalid. unroute-client output: Error: Peer netns reference is invalid. unroute-client output: Error: Peer netns reference is invalid. unroute-client output: Error: Peer netns reference is invalid. | free hp@0x56080aeca530 | flush revival: connection 'westnets-eastnet/1x0' revival flushed | processing: STOP connection NULL (in discard_connection() at connections.c:249) | crl fetch request list locked by 'free_crl_fetch' | crl fetch request list unlocked by 'free_crl_fetch' shutting down interface lo/lo 127.0.0.1:4500 shutting down interface lo/lo 127.0.0.1:500 shutting down interface eth0/eth0 192.0.1.254:4500 shutting down interface eth0/eth0 192.0.1.254:500 shutting down interface eth1/eth1 192.1.2.45:4500 shutting down interface eth1/eth1 192.1.2.45:500 shutting down interface eth1/eth1 192.0.11.254:4500 shutting down interface eth1/eth1 192.0.11.254:500 | FOR_EACH_STATE_... in delete_states_dead_interfaces | libevent_free: release ptr-libevent@0x56080aefde20 | free_event_entry: release EVENT_NULL-pe@0x56080aefdde0 | libevent_free: release ptr-libevent@0x56080aefdf10 | free_event_entry: release EVENT_NULL-pe@0x56080aefded0 | libevent_free: release ptr-libevent@0x56080aefe000 | free_event_entry: release EVENT_NULL-pe@0x56080aefdfc0 | libevent_free: release ptr-libevent@0x56080aefe0f0 | free_event_entry: release EVENT_NULL-pe@0x56080aefe0b0 | libevent_free: release ptr-libevent@0x56080aefe1e0 | free_event_entry: release EVENT_NULL-pe@0x56080aefe1a0 | libevent_free: release ptr-libevent@0x56080aefe2d0 | free_event_entry: release EVENT_NULL-pe@0x56080aefe290 | libevent_free: release ptr-libevent@0x56080aefe9c0 | free_event_entry: release EVENT_NULL-pe@0x56080aefe380 | libevent_free: release ptr-libevent@0x56080aefea90 | free_event_entry: release EVENT_NULL-pe@0x56080aefea50 | FOR_EACH_UNORIENTED_CONNECTION_... in check_orientations | libevent_free: release ptr-libevent@0x56080aefd5a0 | free_event_entry: release EVENT_NULL-pe@0x56080aee61e0 | libevent_free: release ptr-libevent@0x56080aef30f0 | free_event_entry: release EVENT_NULL-pe@0x56080aee1310 | libevent_free: release ptr-libevent@0x56080aef3060 | free_event_entry: release EVENT_NULL-pe@0x56080aee62d0 | global timer EVENT_REINIT_SECRET uninitialized | global timer EVENT_SHUNT_SCAN uninitialized | global timer EVENT_PENDING_DDNS uninitialized | global timer EVENT_PENDING_PHASE2 uninitialized | global timer EVENT_CHECK_CRLS uninitialized | global timer EVENT_REVIVE_CONNS uninitialized | global timer EVENT_FREE_ROOT_CERTS uninitialized | global timer EVENT_RESET_LOG_RATE_LIMIT uninitialized | global timer EVENT_NAT_T_KEEPALIVE uninitialized | libevent_free: release ptr-libevent@0x56080aefd670 | signal event handler PLUTO_SIGCHLD uninstalled | libevent_free: release ptr-libevent@0x56080aefd750 | signal event handler PLUTO_SIGTERM uninstalled | libevent_free: release ptr-libevent@0x56080aefd810 | signal event handler PLUTO_SIGHUP uninstalled | libevent_free: release ptr-libevent@0x56080aef22f0 | signal event handler PLUTO_SIGSYS uninstalled | releasing event base | libevent_free: release ptr-libevent@0x56080aefd8d0 | libevent_free: release ptr-libevent@0x56080aed2dc0 | libevent_free: release ptr-libevent@0x56080aee1620 | libevent_free: release ptr-libevent@0x56080aeffb20 | libevent_free: release ptr-libevent@0x56080aee1640 | libevent_free: release ptr-libevent@0x56080aefd630 | libevent_free: release ptr-libevent@0x56080aefd710 | libevent_free: release ptr-libevent@0x56080aee16d0 | libevent_free: release ptr-libevent@0x56080aee1900 | libevent_free: release ptr-libevent@0x56080aee6360 | libevent_free: release ptr-libevent@0x56080aefeb20 | libevent_free: release ptr-libevent@0x56080aefe3c0 | libevent_free: release ptr-libevent@0x56080aefe360 | libevent_free: release ptr-libevent@0x56080aefe270 | libevent_free: release ptr-libevent@0x56080aefe180 | libevent_free: release ptr-libevent@0x56080aefe090 | libevent_free: release ptr-libevent@0x56080aefdfa0 | libevent_free: release ptr-libevent@0x56080aefdeb0 | libevent_free: release ptr-libevent@0x56080ae63370 | libevent_free: release ptr-libevent@0x56080aefd7f0 | libevent_free: release ptr-libevent@0x56080aefd730 | libevent_free: release ptr-libevent@0x56080aefd650 | libevent_free: release ptr-libevent@0x56080aefd8b0 | libevent_free: release ptr-libevent@0x56080ae615b0 | libevent_free: release ptr-libevent@0x56080aee1660 | libevent_free: release ptr-libevent@0x56080aee1690 | libevent_free: release ptr-libevent@0x56080aee1380 | releasing global libevent data | libevent_free: release ptr-libevent@0x56080aee0030 | libevent_free: release ptr-libevent@0x56080aee0060 | libevent_free: release ptr-libevent@0x56080aee1350